1686cdd19SJun-ichiro itojun Hagino /* $FreeBSD$ */ 288ff5695SSUZUKI Shinsuke /* $KAME: ip6_output.c,v 1.279 2002/01/26 06:12:30 jinmei Exp $ */ 3686cdd19SJun-ichiro itojun Hagino 482cd038dSYoshinobu Inoue /* 582cd038dSYoshinobu Inoue * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 682cd038dSYoshinobu Inoue * All rights reserved. 782cd038dSYoshinobu Inoue * 882cd038dSYoshinobu Inoue * Redistribution and use in source and binary forms, with or without 982cd038dSYoshinobu Inoue * modification, are permitted provided that the following conditions 1082cd038dSYoshinobu Inoue * are met: 1182cd038dSYoshinobu Inoue * 1. Redistributions of source code must retain the above copyright 1282cd038dSYoshinobu Inoue * notice, this list of conditions and the following disclaimer. 1382cd038dSYoshinobu Inoue * 2. Redistributions in binary form must reproduce the above copyright 1482cd038dSYoshinobu Inoue * notice, this list of conditions and the following disclaimer in the 1582cd038dSYoshinobu Inoue * documentation and/or other materials provided with the distribution. 1682cd038dSYoshinobu Inoue * 3. Neither the name of the project nor the names of its contributors 1782cd038dSYoshinobu Inoue * may be used to endorse or promote products derived from this software 1882cd038dSYoshinobu Inoue * without specific prior written permission. 1982cd038dSYoshinobu Inoue * 2082cd038dSYoshinobu Inoue * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 2182cd038dSYoshinobu Inoue * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 2282cd038dSYoshinobu Inoue * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 2382cd038dSYoshinobu Inoue * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 2482cd038dSYoshinobu Inoue * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 2582cd038dSYoshinobu Inoue * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 2682cd038dSYoshinobu Inoue * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 2782cd038dSYoshinobu Inoue * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 2882cd038dSYoshinobu Inoue * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 2982cd038dSYoshinobu Inoue * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 3082cd038dSYoshinobu Inoue * SUCH DAMAGE. 3182cd038dSYoshinobu Inoue */ 3282cd038dSYoshinobu Inoue 3382cd038dSYoshinobu Inoue /* 3482cd038dSYoshinobu Inoue * Copyright (c) 1982, 1986, 1988, 1990, 1993 3582cd038dSYoshinobu Inoue * The Regents of the University of California. All rights reserved. 3682cd038dSYoshinobu Inoue * 3782cd038dSYoshinobu Inoue * Redistribution and use in source and binary forms, with or without 3882cd038dSYoshinobu Inoue * modification, are permitted provided that the following conditions 3982cd038dSYoshinobu Inoue * are met: 4082cd038dSYoshinobu Inoue * 1. Redistributions of source code must retain the above copyright 4182cd038dSYoshinobu Inoue * notice, this list of conditions and the following disclaimer. 4282cd038dSYoshinobu Inoue * 2. Redistributions in binary form must reproduce the above copyright 4382cd038dSYoshinobu Inoue * notice, this list of conditions and the following disclaimer in the 4482cd038dSYoshinobu Inoue * documentation and/or other materials provided with the distribution. 4582cd038dSYoshinobu Inoue * 3. All advertising materials mentioning features or use of this software 4682cd038dSYoshinobu Inoue * must display the following acknowledgement: 4782cd038dSYoshinobu Inoue * This product includes software developed by the University of 4882cd038dSYoshinobu Inoue * California, Berkeley and its contributors. 4982cd038dSYoshinobu Inoue * 4. Neither the name of the University nor the names of its contributors 5082cd038dSYoshinobu Inoue * may be used to endorse or promote products derived from this software 5182cd038dSYoshinobu Inoue * without specific prior written permission. 5282cd038dSYoshinobu Inoue * 5382cd038dSYoshinobu Inoue * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 5482cd038dSYoshinobu Inoue * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 5582cd038dSYoshinobu Inoue * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 5682cd038dSYoshinobu Inoue * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 5782cd038dSYoshinobu Inoue * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 5882cd038dSYoshinobu Inoue * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 5982cd038dSYoshinobu Inoue * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 6082cd038dSYoshinobu Inoue * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 6182cd038dSYoshinobu Inoue * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 6282cd038dSYoshinobu Inoue * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 6382cd038dSYoshinobu Inoue * SUCH DAMAGE. 6482cd038dSYoshinobu Inoue * 6582cd038dSYoshinobu Inoue * @(#)ip_output.c 8.3 (Berkeley) 1/21/94 6682cd038dSYoshinobu Inoue */ 6782cd038dSYoshinobu Inoue 68210d0432SYoshinobu Inoue #include "opt_ip6fw.h" 69686cdd19SJun-ichiro itojun Hagino #include "opt_inet.h" 70686cdd19SJun-ichiro itojun Hagino #include "opt_inet6.h" 71686cdd19SJun-ichiro itojun Hagino #include "opt_ipsec.h" 72c4ac87eaSDarren Reed #include "opt_pfil_hooks.h" 7329234943SHajimu UMEMOTO #include "opt_random_ip_id.h" 7482cd038dSYoshinobu Inoue 7582cd038dSYoshinobu Inoue #include <sys/param.h> 7682cd038dSYoshinobu Inoue #include <sys/malloc.h> 7782cd038dSYoshinobu Inoue #include <sys/mbuf.h> 78b40ce416SJulian Elischer #include <sys/proc.h> 7982cd038dSYoshinobu Inoue #include <sys/errno.h> 8082cd038dSYoshinobu Inoue #include <sys/protosw.h> 8182cd038dSYoshinobu Inoue #include <sys/socket.h> 8282cd038dSYoshinobu Inoue #include <sys/socketvar.h> 8382cd038dSYoshinobu Inoue #include <sys/systm.h> 8482cd038dSYoshinobu Inoue #include <sys/kernel.h> 8582cd038dSYoshinobu Inoue 8682cd038dSYoshinobu Inoue #include <net/if.h> 8782cd038dSYoshinobu Inoue #include <net/route.h> 88c4ac87eaSDarren Reed #ifdef PFIL_HOOKS 89c4ac87eaSDarren Reed #include <net/pfil.h> 90c4ac87eaSDarren Reed #endif 9182cd038dSYoshinobu Inoue 9282cd038dSYoshinobu Inoue #include <netinet/in.h> 9382cd038dSYoshinobu Inoue #include <netinet/in_var.h> 9433841545SHajimu UMEMOTO #include <netinet6/in6_var.h> 95686cdd19SJun-ichiro itojun Hagino #include <netinet/ip6.h> 96686cdd19SJun-ichiro itojun Hagino #include <netinet/icmp6.h> 9782cd038dSYoshinobu Inoue #include <netinet6/ip6_var.h> 98686cdd19SJun-ichiro itojun Hagino #include <netinet/in_pcb.h> 9982cd038dSYoshinobu Inoue #include <netinet6/nd6.h> 10082cd038dSYoshinobu Inoue 10182cd038dSYoshinobu Inoue #ifdef IPSEC 10282cd038dSYoshinobu Inoue #include <netinet6/ipsec.h> 103686cdd19SJun-ichiro itojun Hagino #ifdef INET6 10482cd038dSYoshinobu Inoue #include <netinet6/ipsec6.h> 1056a800098SYoshinobu Inoue #endif 106686cdd19SJun-ichiro itojun Hagino #include <netkey/key.h> 10782cd038dSYoshinobu Inoue #endif /* IPSEC */ 10882cd038dSYoshinobu Inoue 109b9234fafSSam Leffler #ifdef FAST_IPSEC 110b9234fafSSam Leffler #include <netipsec/ipsec.h> 111b9234fafSSam Leffler #include <netipsec/ipsec6.h> 112b9234fafSSam Leffler #include <netipsec/key.h> 113b9234fafSSam Leffler #endif /* FAST_IPSEC */ 114b9234fafSSam Leffler 11582cd038dSYoshinobu Inoue #include <netinet6/ip6_fw.h> 11682cd038dSYoshinobu Inoue 11733841545SHajimu UMEMOTO #include <net/net_osdep.h> 11833841545SHajimu UMEMOTO 1191469c434SHajimu UMEMOTO #include <netinet6/ip6protosw.h> 1201469c434SHajimu UMEMOTO 12182cd038dSYoshinobu Inoue static MALLOC_DEFINE(M_IPMOPTS, "ip6_moptions", "internet multicast options"); 12282cd038dSYoshinobu Inoue 12382cd038dSYoshinobu Inoue struct ip6_exthdrs { 12482cd038dSYoshinobu Inoue struct mbuf *ip6e_ip6; 12582cd038dSYoshinobu Inoue struct mbuf *ip6e_hbh; 12682cd038dSYoshinobu Inoue struct mbuf *ip6e_dest1; 12782cd038dSYoshinobu Inoue struct mbuf *ip6e_rthdr; 12882cd038dSYoshinobu Inoue struct mbuf *ip6e_dest2; 12982cd038dSYoshinobu Inoue }; 13082cd038dSYoshinobu Inoue 13182cd038dSYoshinobu Inoue static int ip6_pcbopts __P((struct ip6_pktopts **, struct mbuf *, 1327efe5d92SHajimu UMEMOTO struct socket *, struct sockopt *)); 13382cd038dSYoshinobu Inoue static int ip6_setmoptions __P((int, struct ip6_moptions **, struct mbuf *)); 13482cd038dSYoshinobu Inoue static int ip6_getmoptions __P((int, struct ip6_moptions *, struct mbuf **)); 13582cd038dSYoshinobu Inoue static int ip6_copyexthdr __P((struct mbuf **, caddr_t, int)); 13682cd038dSYoshinobu Inoue static int ip6_insertfraghdr __P((struct mbuf *, struct mbuf *, int, 13782cd038dSYoshinobu Inoue struct ip6_frag **)); 13882cd038dSYoshinobu Inoue static int ip6_insert_jumboopt __P((struct ip6_exthdrs *, u_int32_t)); 13982cd038dSYoshinobu Inoue static int ip6_splithdr __P((struct mbuf *, struct ip6_exthdrs *)); 14031b3783cSHajimu UMEMOTO static int ip6_getpmtu __P((struct route_in6 *, struct route_in6 *, 14131b3783cSHajimu UMEMOTO struct ifnet *, struct in6_addr *, u_long *)); 14282cd038dSYoshinobu Inoue 1437efe5d92SHajimu UMEMOTO 14482cd038dSYoshinobu Inoue /* 14582cd038dSYoshinobu Inoue * IP6 output. The packet in mbuf chain m contains a skeletal IP6 14682cd038dSYoshinobu Inoue * header (with pri, len, nxt, hlim, src, dst). 14782cd038dSYoshinobu Inoue * This function may modify ver and hlim only. 14882cd038dSYoshinobu Inoue * The mbuf chain containing the packet will be freed. 14982cd038dSYoshinobu Inoue * The mbuf opt, if present, will not be freed. 15033841545SHajimu UMEMOTO * 15133841545SHajimu UMEMOTO * type of "mtu": rt_rmx.rmx_mtu is u_long, ifnet.ifr_mtu is int, and 15233841545SHajimu UMEMOTO * nd_ifinfo.linkmtu is u_int32_t. so we use u_long to hold largest one, 15333841545SHajimu UMEMOTO * which is rt_rmx.rmx_mtu. 15482cd038dSYoshinobu Inoue */ 15582cd038dSYoshinobu Inoue int 1565d846453SSam Leffler ip6_output(m0, opt, ro, flags, im6o, ifpp, inp) 15782cd038dSYoshinobu Inoue struct mbuf *m0; 15882cd038dSYoshinobu Inoue struct ip6_pktopts *opt; 15982cd038dSYoshinobu Inoue struct route_in6 *ro; 16082cd038dSYoshinobu Inoue int flags; 16182cd038dSYoshinobu Inoue struct ip6_moptions *im6o; 16282cd038dSYoshinobu Inoue struct ifnet **ifpp; /* XXX: just for statistics */ 1635d846453SSam Leffler struct inpcb *inp; 16482cd038dSYoshinobu Inoue { 16582cd038dSYoshinobu Inoue struct ip6_hdr *ip6, *mhip6; 166686cdd19SJun-ichiro itojun Hagino struct ifnet *ifp, *origifp; 16782cd038dSYoshinobu Inoue struct mbuf *m = m0; 16882cd038dSYoshinobu Inoue int hlen, tlen, len, off; 16982cd038dSYoshinobu Inoue struct route_in6 ip6route; 17082cd038dSYoshinobu Inoue struct sockaddr_in6 *dst; 17182cd038dSYoshinobu Inoue int error = 0; 1725da9f8faSJosef Karthauser struct in6_ifaddr *ia = NULL; 17382cd038dSYoshinobu Inoue u_long mtu; 17482cd038dSYoshinobu Inoue u_int32_t optlen = 0, plen = 0, unfragpartlen = 0; 17582cd038dSYoshinobu Inoue struct ip6_exthdrs exthdrs; 17682cd038dSYoshinobu Inoue struct in6_addr finaldst; 17782cd038dSYoshinobu Inoue struct route_in6 *ro_pmtu = NULL; 17882cd038dSYoshinobu Inoue int hdrsplit = 0; 17982cd038dSYoshinobu Inoue int needipsec = 0; 18082cd038dSYoshinobu Inoue #ifdef IPSEC 18182cd038dSYoshinobu Inoue int needipsectun = 0; 18282cd038dSYoshinobu Inoue struct secpolicy *sp = NULL; 18382cd038dSYoshinobu Inoue 18482cd038dSYoshinobu Inoue ip6 = mtod(m, struct ip6_hdr *); 18582cd038dSYoshinobu Inoue #endif /* IPSEC */ 186b9234fafSSam Leffler #ifdef FAST_IPSEC 187b9234fafSSam Leffler int needipsectun = 0; 188b9234fafSSam Leffler struct secpolicy *sp = NULL; 189b9234fafSSam Leffler 190b9234fafSSam Leffler ip6 = mtod(m, struct ip6_hdr *); 191b9234fafSSam Leffler #endif /* FAST_IPSEC */ 19282cd038dSYoshinobu Inoue 19382cd038dSYoshinobu Inoue #define MAKE_EXTHDR(hp, mp) \ 194686cdd19SJun-ichiro itojun Hagino do { \ 19582cd038dSYoshinobu Inoue if (hp) { \ 19682cd038dSYoshinobu Inoue struct ip6_ext *eh = (struct ip6_ext *)(hp); \ 19782cd038dSYoshinobu Inoue error = ip6_copyexthdr((mp), (caddr_t)(hp), \ 19882cd038dSYoshinobu Inoue ((eh)->ip6e_len + 1) << 3); \ 19982cd038dSYoshinobu Inoue if (error) \ 20082cd038dSYoshinobu Inoue goto freehdrs; \ 20182cd038dSYoshinobu Inoue } \ 2027efe5d92SHajimu UMEMOTO } while (/*CONSTCOND*/ 0) 20382cd038dSYoshinobu Inoue 20482cd038dSYoshinobu Inoue bzero(&exthdrs, sizeof(exthdrs)); 205686cdd19SJun-ichiro itojun Hagino 20682cd038dSYoshinobu Inoue if (opt) { 20782cd038dSYoshinobu Inoue /* Hop-by-Hop options header */ 20882cd038dSYoshinobu Inoue MAKE_EXTHDR(opt->ip6po_hbh, &exthdrs.ip6e_hbh); 20982cd038dSYoshinobu Inoue /* Destination options header(1st part) */ 21082cd038dSYoshinobu Inoue MAKE_EXTHDR(opt->ip6po_dest1, &exthdrs.ip6e_dest1); 21182cd038dSYoshinobu Inoue /* Routing header */ 21282cd038dSYoshinobu Inoue MAKE_EXTHDR(opt->ip6po_rthdr, &exthdrs.ip6e_rthdr); 21382cd038dSYoshinobu Inoue /* Destination options header(2nd part) */ 21482cd038dSYoshinobu Inoue MAKE_EXTHDR(opt->ip6po_dest2, &exthdrs.ip6e_dest2); 21582cd038dSYoshinobu Inoue } 21682cd038dSYoshinobu Inoue 21782cd038dSYoshinobu Inoue #ifdef IPSEC 21882cd038dSYoshinobu Inoue /* get a security policy for this packet */ 219340c35deSJonathan Lemon if (inp == NULL) 22082cd038dSYoshinobu Inoue sp = ipsec6_getpolicybyaddr(m, IPSEC_DIR_OUTBOUND, 0, &error); 22182cd038dSYoshinobu Inoue else 222340c35deSJonathan Lemon sp = ipsec6_getpolicybypcb(m, IPSEC_DIR_OUTBOUND, inp, &error); 22382cd038dSYoshinobu Inoue 22482cd038dSYoshinobu Inoue if (sp == NULL) { 22582cd038dSYoshinobu Inoue ipsec6stat.out_inval++; 226686cdd19SJun-ichiro itojun Hagino goto freehdrs; 22782cd038dSYoshinobu Inoue } 22882cd038dSYoshinobu Inoue 22982cd038dSYoshinobu Inoue error = 0; 23082cd038dSYoshinobu Inoue 23182cd038dSYoshinobu Inoue /* check policy */ 23282cd038dSYoshinobu Inoue switch (sp->policy) { 23382cd038dSYoshinobu Inoue case IPSEC_POLICY_DISCARD: 23482cd038dSYoshinobu Inoue /* 23582cd038dSYoshinobu Inoue * This packet is just discarded. 23682cd038dSYoshinobu Inoue */ 23782cd038dSYoshinobu Inoue ipsec6stat.out_polvio++; 238686cdd19SJun-ichiro itojun Hagino goto freehdrs; 23982cd038dSYoshinobu Inoue 24082cd038dSYoshinobu Inoue case IPSEC_POLICY_BYPASS: 24182cd038dSYoshinobu Inoue case IPSEC_POLICY_NONE: 24282cd038dSYoshinobu Inoue /* no need to do IPsec. */ 24382cd038dSYoshinobu Inoue needipsec = 0; 24482cd038dSYoshinobu Inoue break; 24582cd038dSYoshinobu Inoue 24682cd038dSYoshinobu Inoue case IPSEC_POLICY_IPSEC: 24782cd038dSYoshinobu Inoue if (sp->req == NULL) { 248686cdd19SJun-ichiro itojun Hagino /* acquire a policy */ 249686cdd19SJun-ichiro itojun Hagino error = key_spdacquire(sp); 250686cdd19SJun-ichiro itojun Hagino goto freehdrs; 25182cd038dSYoshinobu Inoue } 25282cd038dSYoshinobu Inoue needipsec = 1; 25382cd038dSYoshinobu Inoue break; 25482cd038dSYoshinobu Inoue 25582cd038dSYoshinobu Inoue case IPSEC_POLICY_ENTRUST: 25682cd038dSYoshinobu Inoue default: 25782cd038dSYoshinobu Inoue printf("ip6_output: Invalid policy found. %d\n", sp->policy); 25882cd038dSYoshinobu Inoue } 25982cd038dSYoshinobu Inoue #endif /* IPSEC */ 260b9234fafSSam Leffler #ifdef FAST_IPSEC 261b9234fafSSam Leffler /* get a security policy for this packet */ 262b9234fafSSam Leffler if (inp == NULL) 263b9234fafSSam Leffler sp = ipsec_getpolicybyaddr(m, IPSEC_DIR_OUTBOUND, 0, &error); 264b9234fafSSam Leffler else 265b9234fafSSam Leffler sp = ipsec_getpolicybysock(m, IPSEC_DIR_OUTBOUND, inp, &error); 266b9234fafSSam Leffler 267b9234fafSSam Leffler if (sp == NULL) { 268b9234fafSSam Leffler newipsecstat.ips_out_inval++; 269b9234fafSSam Leffler goto freehdrs; 270b9234fafSSam Leffler } 271b9234fafSSam Leffler 272b9234fafSSam Leffler error = 0; 273b9234fafSSam Leffler 274b9234fafSSam Leffler /* check policy */ 275b9234fafSSam Leffler switch (sp->policy) { 276b9234fafSSam Leffler case IPSEC_POLICY_DISCARD: 277b9234fafSSam Leffler /* 278b9234fafSSam Leffler * This packet is just discarded. 279b9234fafSSam Leffler */ 280b9234fafSSam Leffler newipsecstat.ips_out_polvio++; 281b9234fafSSam Leffler goto freehdrs; 282b9234fafSSam Leffler 283b9234fafSSam Leffler case IPSEC_POLICY_BYPASS: 284b9234fafSSam Leffler case IPSEC_POLICY_NONE: 285b9234fafSSam Leffler /* no need to do IPsec. */ 286b9234fafSSam Leffler needipsec = 0; 287b9234fafSSam Leffler break; 288b9234fafSSam Leffler 289b9234fafSSam Leffler case IPSEC_POLICY_IPSEC: 290b9234fafSSam Leffler if (sp->req == NULL) { 291b9234fafSSam Leffler /* acquire a policy */ 292b9234fafSSam Leffler error = key_spdacquire(sp); 293b9234fafSSam Leffler goto freehdrs; 294b9234fafSSam Leffler } 295b9234fafSSam Leffler needipsec = 1; 296b9234fafSSam Leffler break; 297b9234fafSSam Leffler 298b9234fafSSam Leffler case IPSEC_POLICY_ENTRUST: 299b9234fafSSam Leffler default: 300b9234fafSSam Leffler printf("ip6_output: Invalid policy found. %d\n", sp->policy); 301b9234fafSSam Leffler } 302b9234fafSSam Leffler #endif /* FAST_IPSEC */ 30382cd038dSYoshinobu Inoue 30482cd038dSYoshinobu Inoue /* 30582cd038dSYoshinobu Inoue * Calculate the total length of the extension header chain. 30682cd038dSYoshinobu Inoue * Keep the length of the unfragmentable part for fragmentation. 30782cd038dSYoshinobu Inoue */ 30882cd038dSYoshinobu Inoue optlen = 0; 30982cd038dSYoshinobu Inoue if (exthdrs.ip6e_hbh) optlen += exthdrs.ip6e_hbh->m_len; 31082cd038dSYoshinobu Inoue if (exthdrs.ip6e_dest1) optlen += exthdrs.ip6e_dest1->m_len; 31182cd038dSYoshinobu Inoue if (exthdrs.ip6e_rthdr) optlen += exthdrs.ip6e_rthdr->m_len; 31282cd038dSYoshinobu Inoue unfragpartlen = optlen + sizeof(struct ip6_hdr); 31382cd038dSYoshinobu Inoue /* NOTE: we don't add AH/ESP length here. do that later. */ 31482cd038dSYoshinobu Inoue if (exthdrs.ip6e_dest2) optlen += exthdrs.ip6e_dest2->m_len; 31582cd038dSYoshinobu Inoue 31682cd038dSYoshinobu Inoue /* 31782cd038dSYoshinobu Inoue * If we need IPsec, or there is at least one extension header, 31882cd038dSYoshinobu Inoue * separate IP6 header from the payload. 31982cd038dSYoshinobu Inoue */ 32082cd038dSYoshinobu Inoue if ((needipsec || optlen) && !hdrsplit) { 32182cd038dSYoshinobu Inoue if ((error = ip6_splithdr(m, &exthdrs)) != 0) { 32282cd038dSYoshinobu Inoue m = NULL; 32382cd038dSYoshinobu Inoue goto freehdrs; 32482cd038dSYoshinobu Inoue } 32582cd038dSYoshinobu Inoue m = exthdrs.ip6e_ip6; 32682cd038dSYoshinobu Inoue hdrsplit++; 32782cd038dSYoshinobu Inoue } 32882cd038dSYoshinobu Inoue 32982cd038dSYoshinobu Inoue /* adjust pointer */ 33082cd038dSYoshinobu Inoue ip6 = mtod(m, struct ip6_hdr *); 33182cd038dSYoshinobu Inoue 33282cd038dSYoshinobu Inoue /* adjust mbuf packet header length */ 33382cd038dSYoshinobu Inoue m->m_pkthdr.len += optlen; 33482cd038dSYoshinobu Inoue plen = m->m_pkthdr.len - sizeof(*ip6); 33582cd038dSYoshinobu Inoue 33682cd038dSYoshinobu Inoue /* If this is a jumbo payload, insert a jumbo payload option. */ 33782cd038dSYoshinobu Inoue if (plen > IPV6_MAXPACKET) { 33882cd038dSYoshinobu Inoue if (!hdrsplit) { 33982cd038dSYoshinobu Inoue if ((error = ip6_splithdr(m, &exthdrs)) != 0) { 34082cd038dSYoshinobu Inoue m = NULL; 34182cd038dSYoshinobu Inoue goto freehdrs; 34282cd038dSYoshinobu Inoue } 34382cd038dSYoshinobu Inoue m = exthdrs.ip6e_ip6; 34482cd038dSYoshinobu Inoue hdrsplit++; 34582cd038dSYoshinobu Inoue } 34682cd038dSYoshinobu Inoue /* adjust pointer */ 34782cd038dSYoshinobu Inoue ip6 = mtod(m, struct ip6_hdr *); 34882cd038dSYoshinobu Inoue if ((error = ip6_insert_jumboopt(&exthdrs, plen)) != 0) 34982cd038dSYoshinobu Inoue goto freehdrs; 35082cd038dSYoshinobu Inoue ip6->ip6_plen = 0; 35182cd038dSYoshinobu Inoue } else 35282cd038dSYoshinobu Inoue ip6->ip6_plen = htons(plen); 35382cd038dSYoshinobu Inoue 35482cd038dSYoshinobu Inoue /* 35582cd038dSYoshinobu Inoue * Concatenate headers and fill in next header fields. 35682cd038dSYoshinobu Inoue * Here we have, on "m" 35782cd038dSYoshinobu Inoue * IPv6 payload 35882cd038dSYoshinobu Inoue * and we insert headers accordingly. Finally, we should be getting: 35982cd038dSYoshinobu Inoue * IPv6 hbh dest1 rthdr ah* [esp* dest2 payload] 36082cd038dSYoshinobu Inoue * 36182cd038dSYoshinobu Inoue * during the header composing process, "m" points to IPv6 header. 36282cd038dSYoshinobu Inoue * "mprev" points to an extension header prior to esp. 36382cd038dSYoshinobu Inoue */ 36482cd038dSYoshinobu Inoue { 36582cd038dSYoshinobu Inoue u_char *nexthdrp = &ip6->ip6_nxt; 36682cd038dSYoshinobu Inoue struct mbuf *mprev = m; 36782cd038dSYoshinobu Inoue 36882cd038dSYoshinobu Inoue /* 36982cd038dSYoshinobu Inoue * we treat dest2 specially. this makes IPsec processing 37088ff5695SSUZUKI Shinsuke * much easier. the goal here is to make mprev point the 37188ff5695SSUZUKI Shinsuke * mbuf prior to dest2. 37282cd038dSYoshinobu Inoue * 37382cd038dSYoshinobu Inoue * result: IPv6 dest2 payload 37482cd038dSYoshinobu Inoue * m and mprev will point to IPv6 header. 37582cd038dSYoshinobu Inoue */ 37682cd038dSYoshinobu Inoue if (exthdrs.ip6e_dest2) { 37782cd038dSYoshinobu Inoue if (!hdrsplit) 37882cd038dSYoshinobu Inoue panic("assumption failed: hdr not split"); 37982cd038dSYoshinobu Inoue exthdrs.ip6e_dest2->m_next = m->m_next; 38082cd038dSYoshinobu Inoue m->m_next = exthdrs.ip6e_dest2; 38182cd038dSYoshinobu Inoue *mtod(exthdrs.ip6e_dest2, u_char *) = ip6->ip6_nxt; 38282cd038dSYoshinobu Inoue ip6->ip6_nxt = IPPROTO_DSTOPTS; 38382cd038dSYoshinobu Inoue } 38482cd038dSYoshinobu Inoue 38582cd038dSYoshinobu Inoue #define MAKE_CHAIN(m, mp, p, i)\ 386686cdd19SJun-ichiro itojun Hagino do {\ 38782cd038dSYoshinobu Inoue if (m) {\ 38882cd038dSYoshinobu Inoue if (!hdrsplit) \ 38982cd038dSYoshinobu Inoue panic("assumption failed: hdr not split"); \ 39082cd038dSYoshinobu Inoue *mtod((m), u_char *) = *(p);\ 39182cd038dSYoshinobu Inoue *(p) = (i);\ 39282cd038dSYoshinobu Inoue p = mtod((m), u_char *);\ 39382cd038dSYoshinobu Inoue (m)->m_next = (mp)->m_next;\ 39482cd038dSYoshinobu Inoue (mp)->m_next = (m);\ 39582cd038dSYoshinobu Inoue (mp) = (m);\ 39682cd038dSYoshinobu Inoue }\ 3977efe5d92SHajimu UMEMOTO } while (/*CONSTCOND*/ 0) 39882cd038dSYoshinobu Inoue /* 39982cd038dSYoshinobu Inoue * result: IPv6 hbh dest1 rthdr dest2 payload 40082cd038dSYoshinobu Inoue * m will point to IPv6 header. mprev will point to the 40182cd038dSYoshinobu Inoue * extension header prior to dest2 (rthdr in the above case). 40282cd038dSYoshinobu Inoue */ 4037efe5d92SHajimu UMEMOTO MAKE_CHAIN(exthdrs.ip6e_hbh, mprev, nexthdrp, IPPROTO_HOPOPTS); 4047efe5d92SHajimu UMEMOTO MAKE_CHAIN(exthdrs.ip6e_dest1, mprev, nexthdrp, 4057efe5d92SHajimu UMEMOTO IPPROTO_DSTOPTS); 4067efe5d92SHajimu UMEMOTO MAKE_CHAIN(exthdrs.ip6e_rthdr, mprev, nexthdrp, 4077efe5d92SHajimu UMEMOTO IPPROTO_ROUTING); 40882cd038dSYoshinobu Inoue 409b9234fafSSam Leffler #if defined(IPSEC) || defined(FAST_IPSEC) 41082cd038dSYoshinobu Inoue if (!needipsec) 41182cd038dSYoshinobu Inoue goto skip_ipsec2; 41282cd038dSYoshinobu Inoue 41382cd038dSYoshinobu Inoue /* 41482cd038dSYoshinobu Inoue * pointers after IPsec headers are not valid any more. 41582cd038dSYoshinobu Inoue * other pointers need a great care too. 41682cd038dSYoshinobu Inoue * (IPsec routines should not mangle mbufs prior to AH/ESP) 41782cd038dSYoshinobu Inoue */ 41882cd038dSYoshinobu Inoue exthdrs.ip6e_dest2 = NULL; 41982cd038dSYoshinobu Inoue 42082cd038dSYoshinobu Inoue { 42182cd038dSYoshinobu Inoue struct ip6_rthdr *rh = NULL; 42282cd038dSYoshinobu Inoue int segleft_org = 0; 42382cd038dSYoshinobu Inoue struct ipsec_output_state state; 42482cd038dSYoshinobu Inoue 42582cd038dSYoshinobu Inoue if (exthdrs.ip6e_rthdr) { 42682cd038dSYoshinobu Inoue rh = mtod(exthdrs.ip6e_rthdr, struct ip6_rthdr *); 42782cd038dSYoshinobu Inoue segleft_org = rh->ip6r_segleft; 42882cd038dSYoshinobu Inoue rh->ip6r_segleft = 0; 42982cd038dSYoshinobu Inoue } 43082cd038dSYoshinobu Inoue 43182cd038dSYoshinobu Inoue bzero(&state, sizeof(state)); 43282cd038dSYoshinobu Inoue state.m = m; 43382cd038dSYoshinobu Inoue error = ipsec6_output_trans(&state, nexthdrp, mprev, sp, flags, 43482cd038dSYoshinobu Inoue &needipsectun); 43582cd038dSYoshinobu Inoue m = state.m; 43682cd038dSYoshinobu Inoue if (error) { 43782cd038dSYoshinobu Inoue /* mbuf is already reclaimed in ipsec6_output_trans. */ 43882cd038dSYoshinobu Inoue m = NULL; 43982cd038dSYoshinobu Inoue switch (error) { 44082cd038dSYoshinobu Inoue case EHOSTUNREACH: 44182cd038dSYoshinobu Inoue case ENETUNREACH: 44282cd038dSYoshinobu Inoue case EMSGSIZE: 44382cd038dSYoshinobu Inoue case ENOBUFS: 44482cd038dSYoshinobu Inoue case ENOMEM: 44582cd038dSYoshinobu Inoue break; 44682cd038dSYoshinobu Inoue default: 44782cd038dSYoshinobu Inoue printf("ip6_output (ipsec): error code %d\n", error); 4487efe5d92SHajimu UMEMOTO /* FALLTHROUGH */ 44982cd038dSYoshinobu Inoue case ENOENT: 45082cd038dSYoshinobu Inoue /* don't show these error codes to the user */ 45182cd038dSYoshinobu Inoue error = 0; 45282cd038dSYoshinobu Inoue break; 45382cd038dSYoshinobu Inoue } 45482cd038dSYoshinobu Inoue goto bad; 45582cd038dSYoshinobu Inoue } 45682cd038dSYoshinobu Inoue if (exthdrs.ip6e_rthdr) { 45782cd038dSYoshinobu Inoue /* ah6_output doesn't modify mbuf chain */ 45882cd038dSYoshinobu Inoue rh->ip6r_segleft = segleft_org; 45982cd038dSYoshinobu Inoue } 46082cd038dSYoshinobu Inoue } 46182cd038dSYoshinobu Inoue skip_ipsec2:; 46282cd038dSYoshinobu Inoue #endif 46382cd038dSYoshinobu Inoue } 46482cd038dSYoshinobu Inoue 46582cd038dSYoshinobu Inoue /* 4667efe5d92SHajimu UMEMOTO * If there is a routing header, replace the destination address field 46782cd038dSYoshinobu Inoue * with the first hop of the routing header. 46882cd038dSYoshinobu Inoue */ 46982cd038dSYoshinobu Inoue if (exthdrs.ip6e_rthdr) { 47082cd038dSYoshinobu Inoue struct ip6_rthdr *rh = 47182cd038dSYoshinobu Inoue (struct ip6_rthdr *)(mtod(exthdrs.ip6e_rthdr, 47282cd038dSYoshinobu Inoue struct ip6_rthdr *)); 47382cd038dSYoshinobu Inoue struct ip6_rthdr0 *rh0; 47482cd038dSYoshinobu Inoue 47582cd038dSYoshinobu Inoue finaldst = ip6->ip6_dst; 47682cd038dSYoshinobu Inoue switch (rh->ip6r_type) { 47782cd038dSYoshinobu Inoue case IPV6_RTHDR_TYPE_0: 47882cd038dSYoshinobu Inoue rh0 = (struct ip6_rthdr0 *)rh; 47982cd038dSYoshinobu Inoue ip6->ip6_dst = rh0->ip6r0_addr[0]; 48082cd038dSYoshinobu Inoue bcopy((caddr_t)&rh0->ip6r0_addr[1], 48182cd038dSYoshinobu Inoue (caddr_t)&rh0->ip6r0_addr[0], 48282cd038dSYoshinobu Inoue sizeof(struct in6_addr)*(rh0->ip6r0_segleft - 1) 48382cd038dSYoshinobu Inoue ); 48482cd038dSYoshinobu Inoue rh0->ip6r0_addr[rh0->ip6r0_segleft - 1] = finaldst; 48582cd038dSYoshinobu Inoue break; 48682cd038dSYoshinobu Inoue default: /* is it possible? */ 48782cd038dSYoshinobu Inoue error = EINVAL; 48882cd038dSYoshinobu Inoue goto bad; 48982cd038dSYoshinobu Inoue } 49082cd038dSYoshinobu Inoue } 49182cd038dSYoshinobu Inoue 49282cd038dSYoshinobu Inoue /* Source address validation */ 49382cd038dSYoshinobu Inoue if (IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_src) && 49482cd038dSYoshinobu Inoue (flags & IPV6_DADOUTPUT) == 0) { 49582cd038dSYoshinobu Inoue error = EOPNOTSUPP; 49682cd038dSYoshinobu Inoue ip6stat.ip6s_badscope++; 49782cd038dSYoshinobu Inoue goto bad; 49882cd038dSYoshinobu Inoue } 49982cd038dSYoshinobu Inoue if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_src)) { 50082cd038dSYoshinobu Inoue error = EOPNOTSUPP; 50182cd038dSYoshinobu Inoue ip6stat.ip6s_badscope++; 50282cd038dSYoshinobu Inoue goto bad; 50382cd038dSYoshinobu Inoue } 50482cd038dSYoshinobu Inoue 50582cd038dSYoshinobu Inoue ip6stat.ip6s_localout++; 50682cd038dSYoshinobu Inoue 50782cd038dSYoshinobu Inoue /* 50882cd038dSYoshinobu Inoue * Route packet. 50982cd038dSYoshinobu Inoue */ 51082cd038dSYoshinobu Inoue if (ro == 0) { 51182cd038dSYoshinobu Inoue ro = &ip6route; 51282cd038dSYoshinobu Inoue bzero((caddr_t)ro, sizeof(*ro)); 51382cd038dSYoshinobu Inoue } 51482cd038dSYoshinobu Inoue ro_pmtu = ro; 51582cd038dSYoshinobu Inoue if (opt && opt->ip6po_rthdr) 51682cd038dSYoshinobu Inoue ro = &opt->ip6po_route; 51782cd038dSYoshinobu Inoue dst = (struct sockaddr_in6 *)&ro->ro_dst; 5187efe5d92SHajimu UMEMOTO 51982cd038dSYoshinobu Inoue /* 52082cd038dSYoshinobu Inoue * If there is a cached route, 52182cd038dSYoshinobu Inoue * check that it is to the same destination 52282cd038dSYoshinobu Inoue * and is still up. If not, free it and try again. 52382cd038dSYoshinobu Inoue */ 52482cd038dSYoshinobu Inoue if (ro->ro_rt && ((ro->ro_rt->rt_flags & RTF_UP) == 0 || 5251183d014SHajimu UMEMOTO dst->sin6_family != AF_INET6 || 52682cd038dSYoshinobu Inoue !IN6_ARE_ADDR_EQUAL(&dst->sin6_addr, &ip6->ip6_dst))) { 52782cd038dSYoshinobu Inoue RTFREE(ro->ro_rt); 52882cd038dSYoshinobu Inoue ro->ro_rt = (struct rtentry *)0; 52982cd038dSYoshinobu Inoue } 53082cd038dSYoshinobu Inoue if (ro->ro_rt == 0) { 53182cd038dSYoshinobu Inoue bzero(dst, sizeof(*dst)); 53282cd038dSYoshinobu Inoue dst->sin6_family = AF_INET6; 53382cd038dSYoshinobu Inoue dst->sin6_len = sizeof(struct sockaddr_in6); 53482cd038dSYoshinobu Inoue dst->sin6_addr = ip6->ip6_dst; 53582cd038dSYoshinobu Inoue } 536b9234fafSSam Leffler #if defined(IPSEC) || defined(FAST_IPSEC) 53782cd038dSYoshinobu Inoue if (needipsec && needipsectun) { 53882cd038dSYoshinobu Inoue struct ipsec_output_state state; 53982cd038dSYoshinobu Inoue 54082cd038dSYoshinobu Inoue /* 54182cd038dSYoshinobu Inoue * All the extension headers will become inaccessible 54282cd038dSYoshinobu Inoue * (since they can be encrypted). 54382cd038dSYoshinobu Inoue * Don't panic, we need no more updates to extension headers 54482cd038dSYoshinobu Inoue * on inner IPv6 packet (since they are now encapsulated). 54582cd038dSYoshinobu Inoue * 54682cd038dSYoshinobu Inoue * IPv6 [ESP|AH] IPv6 [extension headers] payload 54782cd038dSYoshinobu Inoue */ 54882cd038dSYoshinobu Inoue bzero(&exthdrs, sizeof(exthdrs)); 54982cd038dSYoshinobu Inoue exthdrs.ip6e_ip6 = m; 55082cd038dSYoshinobu Inoue 55182cd038dSYoshinobu Inoue bzero(&state, sizeof(state)); 55282cd038dSYoshinobu Inoue state.m = m; 55382cd038dSYoshinobu Inoue state.ro = (struct route *)ro; 55482cd038dSYoshinobu Inoue state.dst = (struct sockaddr *)dst; 55582cd038dSYoshinobu Inoue 55682cd038dSYoshinobu Inoue error = ipsec6_output_tunnel(&state, sp, flags); 55782cd038dSYoshinobu Inoue 55882cd038dSYoshinobu Inoue m = state.m; 55982cd038dSYoshinobu Inoue ro = (struct route_in6 *)state.ro; 56082cd038dSYoshinobu Inoue dst = (struct sockaddr_in6 *)state.dst; 56182cd038dSYoshinobu Inoue if (error) { 56282cd038dSYoshinobu Inoue /* mbuf is already reclaimed in ipsec6_output_tunnel. */ 56382cd038dSYoshinobu Inoue m0 = m = NULL; 56482cd038dSYoshinobu Inoue m = NULL; 56582cd038dSYoshinobu Inoue switch (error) { 56682cd038dSYoshinobu Inoue case EHOSTUNREACH: 56782cd038dSYoshinobu Inoue case ENETUNREACH: 56882cd038dSYoshinobu Inoue case EMSGSIZE: 56982cd038dSYoshinobu Inoue case ENOBUFS: 57082cd038dSYoshinobu Inoue case ENOMEM: 57182cd038dSYoshinobu Inoue break; 57282cd038dSYoshinobu Inoue default: 57382cd038dSYoshinobu Inoue printf("ip6_output (ipsec): error code %d\n", error); 5747efe5d92SHajimu UMEMOTO /* FALLTHROUGH */ 57582cd038dSYoshinobu Inoue case ENOENT: 57682cd038dSYoshinobu Inoue /* don't show these error codes to the user */ 57782cd038dSYoshinobu Inoue error = 0; 57882cd038dSYoshinobu Inoue break; 57982cd038dSYoshinobu Inoue } 58082cd038dSYoshinobu Inoue goto bad; 58182cd038dSYoshinobu Inoue } 58282cd038dSYoshinobu Inoue 58382cd038dSYoshinobu Inoue exthdrs.ip6e_ip6 = m; 58482cd038dSYoshinobu Inoue } 585686cdd19SJun-ichiro itojun Hagino #endif /* IPSEC */ 58682cd038dSYoshinobu Inoue 58782cd038dSYoshinobu Inoue if (!IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst)) { 58882cd038dSYoshinobu Inoue /* Unicast */ 58982cd038dSYoshinobu Inoue 59082cd038dSYoshinobu Inoue #define ifatoia6(ifa) ((struct in6_ifaddr *)(ifa)) 59182cd038dSYoshinobu Inoue #define sin6tosa(sin6) ((struct sockaddr *)(sin6)) 59282cd038dSYoshinobu Inoue /* xxx 59382cd038dSYoshinobu Inoue * interface selection comes here 59482cd038dSYoshinobu Inoue * if an interface is specified from an upper layer, 59582cd038dSYoshinobu Inoue * ifp must point it. 59682cd038dSYoshinobu Inoue */ 597686cdd19SJun-ichiro itojun Hagino if (ro->ro_rt == 0) { 598686cdd19SJun-ichiro itojun Hagino /* 599686cdd19SJun-ichiro itojun Hagino * non-bsdi always clone routes, if parent is 600686cdd19SJun-ichiro itojun Hagino * PRF_CLONING. 601686cdd19SJun-ichiro itojun Hagino */ 60282cd038dSYoshinobu Inoue rtalloc((struct route *)ro); 603686cdd19SJun-ichiro itojun Hagino } 60482cd038dSYoshinobu Inoue if (ro->ro_rt == 0) { 60582cd038dSYoshinobu Inoue ip6stat.ip6s_noroute++; 60682cd038dSYoshinobu Inoue error = EHOSTUNREACH; 60782cd038dSYoshinobu Inoue /* XXX in6_ifstat_inc(ifp, ifs6_out_discard); */ 60882cd038dSYoshinobu Inoue goto bad; 60982cd038dSYoshinobu Inoue } 61068974f29SSam Leffler /* XXX rt not locked */ 61182cd038dSYoshinobu Inoue ia = ifatoia6(ro->ro_rt->rt_ifa); 61282cd038dSYoshinobu Inoue ifp = ro->ro_rt->rt_ifp; 61382cd038dSYoshinobu Inoue ro->ro_rt->rt_use++; 61482cd038dSYoshinobu Inoue if (ro->ro_rt->rt_flags & RTF_GATEWAY) 61582cd038dSYoshinobu Inoue dst = (struct sockaddr_in6 *)ro->ro_rt->rt_gateway; 61682cd038dSYoshinobu Inoue m->m_flags &= ~(M_BCAST | M_MCAST); /* just in case */ 61782cd038dSYoshinobu Inoue 61882cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_request); 61982cd038dSYoshinobu Inoue 62082cd038dSYoshinobu Inoue /* 621686cdd19SJun-ichiro itojun Hagino * Check if the outgoing interface conflicts with 62282cd038dSYoshinobu Inoue * the interface specified by ifi6_ifindex (if specified). 62382cd038dSYoshinobu Inoue * Note that loopback interface is always okay. 624686cdd19SJun-ichiro itojun Hagino * (this may happen when we are sending a packet to one of 625686cdd19SJun-ichiro itojun Hagino * our own addresses.) 62682cd038dSYoshinobu Inoue */ 62782cd038dSYoshinobu Inoue if (opt && opt->ip6po_pktinfo 62882cd038dSYoshinobu Inoue && opt->ip6po_pktinfo->ipi6_ifindex) { 62982cd038dSYoshinobu Inoue if (!(ifp->if_flags & IFF_LOOPBACK) 63082cd038dSYoshinobu Inoue && ifp->if_index != opt->ip6po_pktinfo->ipi6_ifindex) { 63182cd038dSYoshinobu Inoue ip6stat.ip6s_noroute++; 63282cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_discard); 63382cd038dSYoshinobu Inoue error = EHOSTUNREACH; 63482cd038dSYoshinobu Inoue goto bad; 63582cd038dSYoshinobu Inoue } 63682cd038dSYoshinobu Inoue } 63782cd038dSYoshinobu Inoue 63882cd038dSYoshinobu Inoue if (opt && opt->ip6po_hlim != -1) 63982cd038dSYoshinobu Inoue ip6->ip6_hlim = opt->ip6po_hlim & 0xff; 64082cd038dSYoshinobu Inoue } else { 64182cd038dSYoshinobu Inoue /* Multicast */ 64282cd038dSYoshinobu Inoue struct in6_multi *in6m; 64382cd038dSYoshinobu Inoue 64482cd038dSYoshinobu Inoue m->m_flags = (m->m_flags & ~M_BCAST) | M_MCAST; 64582cd038dSYoshinobu Inoue 64682cd038dSYoshinobu Inoue /* 64782cd038dSYoshinobu Inoue * See if the caller provided any multicast options 64882cd038dSYoshinobu Inoue */ 64982cd038dSYoshinobu Inoue ifp = NULL; 65082cd038dSYoshinobu Inoue if (im6o != NULL) { 65182cd038dSYoshinobu Inoue ip6->ip6_hlim = im6o->im6o_multicast_hlim; 65282cd038dSYoshinobu Inoue if (im6o->im6o_multicast_ifp != NULL) 65382cd038dSYoshinobu Inoue ifp = im6o->im6o_multicast_ifp; 65482cd038dSYoshinobu Inoue } else 65582cd038dSYoshinobu Inoue ip6->ip6_hlim = ip6_defmcasthlim; 65682cd038dSYoshinobu Inoue 65782cd038dSYoshinobu Inoue /* 65882cd038dSYoshinobu Inoue * See if the caller provided the outgoing interface 65982cd038dSYoshinobu Inoue * as an ancillary data. 66082cd038dSYoshinobu Inoue * Boundary check for ifindex is assumed to be already done. 66182cd038dSYoshinobu Inoue */ 66282cd038dSYoshinobu Inoue if (opt && opt->ip6po_pktinfo && opt->ip6po_pktinfo->ipi6_ifindex) 663f9132cebSJonathan Lemon ifp = ifnet_byindex(opt->ip6po_pktinfo->ipi6_ifindex); 66482cd038dSYoshinobu Inoue 66582cd038dSYoshinobu Inoue /* 66682cd038dSYoshinobu Inoue * If the destination is a node-local scope multicast, 66782cd038dSYoshinobu Inoue * the packet should be loop-backed only. 66882cd038dSYoshinobu Inoue */ 66982cd038dSYoshinobu Inoue if (IN6_IS_ADDR_MC_NODELOCAL(&ip6->ip6_dst)) { 67082cd038dSYoshinobu Inoue /* 67182cd038dSYoshinobu Inoue * If the outgoing interface is already specified, 67282cd038dSYoshinobu Inoue * it should be a loopback interface. 67382cd038dSYoshinobu Inoue */ 67482cd038dSYoshinobu Inoue if (ifp && (ifp->if_flags & IFF_LOOPBACK) == 0) { 67582cd038dSYoshinobu Inoue ip6stat.ip6s_badscope++; 67682cd038dSYoshinobu Inoue error = ENETUNREACH; /* XXX: better error? */ 67782cd038dSYoshinobu Inoue /* XXX correct ifp? */ 67882cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_discard); 67982cd038dSYoshinobu Inoue goto bad; 68082cd038dSYoshinobu Inoue } else { 68182cd038dSYoshinobu Inoue ifp = &loif[0]; 68282cd038dSYoshinobu Inoue } 68382cd038dSYoshinobu Inoue } 68482cd038dSYoshinobu Inoue 68582cd038dSYoshinobu Inoue if (opt && opt->ip6po_hlim != -1) 68682cd038dSYoshinobu Inoue ip6->ip6_hlim = opt->ip6po_hlim & 0xff; 68782cd038dSYoshinobu Inoue 68882cd038dSYoshinobu Inoue /* 68982cd038dSYoshinobu Inoue * If caller did not provide an interface lookup a 69082cd038dSYoshinobu Inoue * default in the routing table. This is either a 69182cd038dSYoshinobu Inoue * default for the speicfied group (i.e. a host 69282cd038dSYoshinobu Inoue * route), or a multicast default (a route for the 69382cd038dSYoshinobu Inoue * ``net'' ff00::/8). 69482cd038dSYoshinobu Inoue */ 69582cd038dSYoshinobu Inoue if (ifp == NULL) { 69668974f29SSam Leffler if (ro->ro_rt == 0) 69782cd038dSYoshinobu Inoue ro->ro_rt = rtalloc1((struct sockaddr *) 69882cd038dSYoshinobu Inoue &ro->ro_dst, 0, 0UL); 69968974f29SSam Leffler else 70068974f29SSam Leffler RT_LOCK(ro->ro_rt); 70182cd038dSYoshinobu Inoue if (ro->ro_rt == 0) { 70282cd038dSYoshinobu Inoue ip6stat.ip6s_noroute++; 70382cd038dSYoshinobu Inoue error = EHOSTUNREACH; 70482cd038dSYoshinobu Inoue /* XXX in6_ifstat_inc(ifp, ifs6_out_discard) */ 70582cd038dSYoshinobu Inoue goto bad; 70682cd038dSYoshinobu Inoue } 70782cd038dSYoshinobu Inoue ia = ifatoia6(ro->ro_rt->rt_ifa); 70882cd038dSYoshinobu Inoue ifp = ro->ro_rt->rt_ifp; 70982cd038dSYoshinobu Inoue ro->ro_rt->rt_use++; 710d1dd20beSSam Leffler RT_UNLOCK(ro->ro_rt); 71182cd038dSYoshinobu Inoue } 71282cd038dSYoshinobu Inoue 71382cd038dSYoshinobu Inoue if ((flags & IPV6_FORWARDING) == 0) 71482cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_request); 71582cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_mcast); 71682cd038dSYoshinobu Inoue 71782cd038dSYoshinobu Inoue /* 71882cd038dSYoshinobu Inoue * Confirm that the outgoing interface supports multicast. 71982cd038dSYoshinobu Inoue */ 72082cd038dSYoshinobu Inoue if ((ifp->if_flags & IFF_MULTICAST) == 0) { 72182cd038dSYoshinobu Inoue ip6stat.ip6s_noroute++; 72282cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_discard); 72382cd038dSYoshinobu Inoue error = ENETUNREACH; 72482cd038dSYoshinobu Inoue goto bad; 72582cd038dSYoshinobu Inoue } 72682cd038dSYoshinobu Inoue IN6_LOOKUP_MULTI(ip6->ip6_dst, ifp, in6m); 72782cd038dSYoshinobu Inoue if (in6m != NULL && 72882cd038dSYoshinobu Inoue (im6o == NULL || im6o->im6o_multicast_loop)) { 72982cd038dSYoshinobu Inoue /* 73082cd038dSYoshinobu Inoue * If we belong to the destination multicast group 73182cd038dSYoshinobu Inoue * on the outgoing interface, and the caller did not 73282cd038dSYoshinobu Inoue * forbid loopback, loop back a copy. 73382cd038dSYoshinobu Inoue */ 73482cd038dSYoshinobu Inoue ip6_mloopback(ifp, m, dst); 73591ec0a1eSYoshinobu Inoue } else { 73691ec0a1eSYoshinobu Inoue /* 73791ec0a1eSYoshinobu Inoue * If we are acting as a multicast router, perform 73891ec0a1eSYoshinobu Inoue * multicast forwarding as if the packet had just 73991ec0a1eSYoshinobu Inoue * arrived on the interface to which we are about 74091ec0a1eSYoshinobu Inoue * to send. The multicast forwarding function 74191ec0a1eSYoshinobu Inoue * recursively calls this function, using the 74291ec0a1eSYoshinobu Inoue * IPV6_FORWARDING flag to prevent infinite recursion. 74391ec0a1eSYoshinobu Inoue * 74491ec0a1eSYoshinobu Inoue * Multicasts that are looped back by ip6_mloopback(), 74591ec0a1eSYoshinobu Inoue * above, will be forwarded by the ip6_input() routine, 74691ec0a1eSYoshinobu Inoue * if necessary. 74791ec0a1eSYoshinobu Inoue */ 74891ec0a1eSYoshinobu Inoue if (ip6_mrouter && (flags & IPV6_FORWARDING) == 0) { 749686cdd19SJun-ichiro itojun Hagino if (ip6_mforward(ip6, ifp, m) != 0) { 75091ec0a1eSYoshinobu Inoue m_freem(m); 75191ec0a1eSYoshinobu Inoue goto done; 75291ec0a1eSYoshinobu Inoue } 75391ec0a1eSYoshinobu Inoue } 75482cd038dSYoshinobu Inoue } 75582cd038dSYoshinobu Inoue /* 75682cd038dSYoshinobu Inoue * Multicasts with a hoplimit of zero may be looped back, 75782cd038dSYoshinobu Inoue * above, but must not be transmitted on a network. 75882cd038dSYoshinobu Inoue * Also, multicasts addressed to the loopback interface 75982cd038dSYoshinobu Inoue * are not sent -- the above call to ip6_mloopback() will 76082cd038dSYoshinobu Inoue * loop back a copy if this host actually belongs to the 76182cd038dSYoshinobu Inoue * destination group on the loopback interface. 76282cd038dSYoshinobu Inoue */ 76382cd038dSYoshinobu Inoue if (ip6->ip6_hlim == 0 || (ifp->if_flags & IFF_LOOPBACK)) { 76482cd038dSYoshinobu Inoue m_freem(m); 76582cd038dSYoshinobu Inoue goto done; 76682cd038dSYoshinobu Inoue } 76782cd038dSYoshinobu Inoue } 76882cd038dSYoshinobu Inoue 76982cd038dSYoshinobu Inoue /* 77082cd038dSYoshinobu Inoue * Fill the outgoing inteface to tell the upper layer 77182cd038dSYoshinobu Inoue * to increment per-interface statistics. 77282cd038dSYoshinobu Inoue */ 77382cd038dSYoshinobu Inoue if (ifpp) 77482cd038dSYoshinobu Inoue *ifpp = ifp; 77582cd038dSYoshinobu Inoue 77631b3783cSHajimu UMEMOTO /* Determine path MTU. */ 77731b3783cSHajimu UMEMOTO if ((error = ip6_getpmtu(ro_pmtu, ro, ifp, &finaldst, &mtu)) != 0) 77831b3783cSHajimu UMEMOTO goto bad; 77982cd038dSYoshinobu Inoue 78033841545SHajimu UMEMOTO /* 78133841545SHajimu UMEMOTO * advanced API (IPV6_USE_MIN_MTU) overrides mtu setting 78233841545SHajimu UMEMOTO */ 78333841545SHajimu UMEMOTO if ((flags & IPV6_MINMTU) != 0 && mtu > IPV6_MMTU) 78433841545SHajimu UMEMOTO mtu = IPV6_MMTU; 78533841545SHajimu UMEMOTO 786686cdd19SJun-ichiro itojun Hagino /* Fake scoped addresses */ 787686cdd19SJun-ichiro itojun Hagino if ((ifp->if_flags & IFF_LOOPBACK) != 0) { 78882cd038dSYoshinobu Inoue /* 789686cdd19SJun-ichiro itojun Hagino * If source or destination address is a scoped address, and 790686cdd19SJun-ichiro itojun Hagino * the packet is going to be sent to a loopback interface, 791686cdd19SJun-ichiro itojun Hagino * we should keep the original interface. 79282cd038dSYoshinobu Inoue */ 793686cdd19SJun-ichiro itojun Hagino 794686cdd19SJun-ichiro itojun Hagino /* 795686cdd19SJun-ichiro itojun Hagino * XXX: this is a very experimental and temporary solution. 796686cdd19SJun-ichiro itojun Hagino * We eventually have sockaddr_in6 and use the sin6_scope_id 797686cdd19SJun-ichiro itojun Hagino * field of the structure here. 798686cdd19SJun-ichiro itojun Hagino * We rely on the consistency between two scope zone ids 79988ff5695SSUZUKI Shinsuke * of source and destination, which should already be assured. 80088ff5695SSUZUKI Shinsuke * Larger scopes than link will be supported in the future. 801686cdd19SJun-ichiro itojun Hagino */ 80233841545SHajimu UMEMOTO origifp = NULL; 803686cdd19SJun-ichiro itojun Hagino if (IN6_IS_SCOPE_LINKLOCAL(&ip6->ip6_src)) 804f9132cebSJonathan Lemon origifp = ifnet_byindex(ntohs(ip6->ip6_src.s6_addr16[1])); 805686cdd19SJun-ichiro itojun Hagino else if (IN6_IS_SCOPE_LINKLOCAL(&ip6->ip6_dst)) 806f9132cebSJonathan Lemon origifp = ifnet_byindex(ntohs(ip6->ip6_dst.s6_addr16[1])); 80733841545SHajimu UMEMOTO /* 80833841545SHajimu UMEMOTO * XXX: origifp can be NULL even in those two cases above. 80933841545SHajimu UMEMOTO * For example, if we remove the (only) link-local address 81033841545SHajimu UMEMOTO * from the loopback interface, and try to send a link-local 81133841545SHajimu UMEMOTO * address without link-id information. Then the source 81233841545SHajimu UMEMOTO * address is ::1, and the destination address is the 81333841545SHajimu UMEMOTO * link-local address with its s6_addr16[1] being zero. 81433841545SHajimu UMEMOTO * What is worse, if the packet goes to the loopback interface 81533841545SHajimu UMEMOTO * by a default rejected route, the null pointer would be 81633841545SHajimu UMEMOTO * passed to looutput, and the kernel would hang. 81733841545SHajimu UMEMOTO * The following last resort would prevent such disaster. 81833841545SHajimu UMEMOTO */ 81933841545SHajimu UMEMOTO if (origifp == NULL) 820686cdd19SJun-ichiro itojun Hagino origifp = ifp; 821686cdd19SJun-ichiro itojun Hagino } 822686cdd19SJun-ichiro itojun Hagino else 823686cdd19SJun-ichiro itojun Hagino origifp = ifp; 82433841545SHajimu UMEMOTO /* 82533841545SHajimu UMEMOTO * clear embedded scope identifiers if necessary. 82633841545SHajimu UMEMOTO * in6_clearscope will touch the addresses only when necessary. 82733841545SHajimu UMEMOTO */ 82833841545SHajimu UMEMOTO in6_clearscope(&ip6->ip6_src); 82933841545SHajimu UMEMOTO in6_clearscope(&ip6->ip6_dst); 83082cd038dSYoshinobu Inoue 83182cd038dSYoshinobu Inoue /* 83282cd038dSYoshinobu Inoue * Check with the firewall... 83382cd038dSYoshinobu Inoue */ 83420cb9f9eSHajimu UMEMOTO if (ip6_fw_enable && ip6_fw_chk_ptr) { 83582cd038dSYoshinobu Inoue u_short port = 0; 836686cdd19SJun-ichiro itojun Hagino m->m_pkthdr.rcvif = NULL; /* XXX */ 83782cd038dSYoshinobu Inoue /* If ipfw says divert, we have to just drop packet */ 83882cd038dSYoshinobu Inoue if ((*ip6_fw_chk_ptr)(&ip6, ifp, &port, &m)) { 83982cd038dSYoshinobu Inoue m_freem(m); 84082cd038dSYoshinobu Inoue goto done; 84182cd038dSYoshinobu Inoue } 84282cd038dSYoshinobu Inoue if (!m) { 84382cd038dSYoshinobu Inoue error = EACCES; 84482cd038dSYoshinobu Inoue goto done; 84582cd038dSYoshinobu Inoue } 84682cd038dSYoshinobu Inoue } 84782cd038dSYoshinobu Inoue 84882cd038dSYoshinobu Inoue /* 84982cd038dSYoshinobu Inoue * If the outgoing packet contains a hop-by-hop options header, 85082cd038dSYoshinobu Inoue * it must be examined and processed even by the source node. 85182cd038dSYoshinobu Inoue * (RFC 2460, section 4.) 85282cd038dSYoshinobu Inoue */ 85382cd038dSYoshinobu Inoue if (exthdrs.ip6e_hbh) { 85433841545SHajimu UMEMOTO struct ip6_hbh *hbh = mtod(exthdrs.ip6e_hbh, struct ip6_hbh *); 85582cd038dSYoshinobu Inoue u_int32_t dummy1; /* XXX unused */ 85682cd038dSYoshinobu Inoue u_int32_t dummy2; /* XXX unused */ 85782cd038dSYoshinobu Inoue 85833841545SHajimu UMEMOTO #ifdef DIAGNOSTIC 85933841545SHajimu UMEMOTO if ((hbh->ip6h_len + 1) << 3 > exthdrs.ip6e_hbh->m_len) 86033841545SHajimu UMEMOTO panic("ip6e_hbh is not continuous"); 86133841545SHajimu UMEMOTO #endif 86282cd038dSYoshinobu Inoue /* 86382cd038dSYoshinobu Inoue * XXX: if we have to send an ICMPv6 error to the sender, 86482cd038dSYoshinobu Inoue * we need the M_LOOP flag since icmp6_error() expects 86582cd038dSYoshinobu Inoue * the IPv6 and the hop-by-hop options header are 86682cd038dSYoshinobu Inoue * continuous unless the flag is set. 86782cd038dSYoshinobu Inoue */ 86882cd038dSYoshinobu Inoue m->m_flags |= M_LOOP; 86982cd038dSYoshinobu Inoue m->m_pkthdr.rcvif = ifp; 8707efe5d92SHajimu UMEMOTO if (ip6_process_hopopts(m, (u_int8_t *)(hbh + 1), 8717efe5d92SHajimu UMEMOTO ((hbh->ip6h_len + 1) << 3) - sizeof(struct ip6_hbh), 87282cd038dSYoshinobu Inoue &dummy1, &dummy2) < 0) { 87382cd038dSYoshinobu Inoue /* m was already freed at this point */ 87482cd038dSYoshinobu Inoue error = EINVAL;/* better error? */ 87582cd038dSYoshinobu Inoue goto done; 87682cd038dSYoshinobu Inoue } 87782cd038dSYoshinobu Inoue m->m_flags &= ~M_LOOP; /* XXX */ 87882cd038dSYoshinobu Inoue m->m_pkthdr.rcvif = NULL; 87982cd038dSYoshinobu Inoue } 88082cd038dSYoshinobu Inoue 881c4ac87eaSDarren Reed #ifdef PFIL_HOOKS 882c4ac87eaSDarren Reed /* 883c4ac87eaSDarren Reed * Run through list of hooks for output packets. 884c4ac87eaSDarren Reed */ 885b140bc1fSSam Leffler error = pfil_run_hooks(&inet6_pfil_hook, &m, ifp, PFIL_OUT); 886b140bc1fSSam Leffler if (error != 0 || m == NULL) 887c4ac87eaSDarren Reed goto done; 888c4ac87eaSDarren Reed ip6 = mtod(m, struct ip6_hdr *); 889c4ac87eaSDarren Reed #endif /* PFIL_HOOKS */ 8907efe5d92SHajimu UMEMOTO 89182cd038dSYoshinobu Inoue /* 89282cd038dSYoshinobu Inoue * Send the packet to the outgoing interface. 89382cd038dSYoshinobu Inoue * If necessary, do IPv6 fragmentation before sending. 89482cd038dSYoshinobu Inoue */ 89582cd038dSYoshinobu Inoue tlen = m->m_pkthdr.len; 89682cd038dSYoshinobu Inoue if (tlen <= mtu 89782cd038dSYoshinobu Inoue #ifdef notyet 89882cd038dSYoshinobu Inoue /* 89982cd038dSYoshinobu Inoue * On any link that cannot convey a 1280-octet packet in one piece, 90082cd038dSYoshinobu Inoue * link-specific fragmentation and reassembly must be provided at 90182cd038dSYoshinobu Inoue * a layer below IPv6. [RFC 2460, sec.5] 90282cd038dSYoshinobu Inoue * Thus if the interface has ability of link-level fragmentation, 90382cd038dSYoshinobu Inoue * we can just send the packet even if the packet size is 90482cd038dSYoshinobu Inoue * larger than the link's MTU. 90582cd038dSYoshinobu Inoue * XXX: IFF_FRAGMENTABLE (or such) flag has not been defined yet... 90682cd038dSYoshinobu Inoue */ 90782cd038dSYoshinobu Inoue 90882cd038dSYoshinobu Inoue || ifp->if_flags & IFF_FRAGMENTABLE 90982cd038dSYoshinobu Inoue #endif 91082cd038dSYoshinobu Inoue ) 91182cd038dSYoshinobu Inoue { 9125da9f8faSJosef Karthauser /* Record statistics for this interface address. */ 9135da9f8faSJosef Karthauser if (ia && !(flags & IPV6_FORWARDING)) { 9145da9f8faSJosef Karthauser ia->ia_ifa.if_opackets++; 9155da9f8faSJosef Karthauser ia->ia_ifa.if_obytes += m->m_pkthdr.len; 9165da9f8faSJosef Karthauser } 91733841545SHajimu UMEMOTO #ifdef IPSEC 91833841545SHajimu UMEMOTO /* clean ipsec history once it goes out of the node */ 91933841545SHajimu UMEMOTO ipsec_delaux(m); 92033841545SHajimu UMEMOTO #endif 921686cdd19SJun-ichiro itojun Hagino error = nd6_output(ifp, origifp, m, dst, ro->ro_rt); 92282cd038dSYoshinobu Inoue goto done; 92382cd038dSYoshinobu Inoue } else if (mtu < IPV6_MMTU) { 92482cd038dSYoshinobu Inoue /* 92582cd038dSYoshinobu Inoue * note that path MTU is never less than IPV6_MMTU 92682cd038dSYoshinobu Inoue * (see icmp6_input). 92782cd038dSYoshinobu Inoue */ 92882cd038dSYoshinobu Inoue error = EMSGSIZE; 92982cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_fragfail); 93082cd038dSYoshinobu Inoue goto bad; 9317efe5d92SHajimu UMEMOTO } else if (ip6->ip6_plen == 0) { 9327efe5d92SHajimu UMEMOTO /* jumbo payload cannot be fragmented */ 93382cd038dSYoshinobu Inoue error = EMSGSIZE; 93482cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_fragfail); 93582cd038dSYoshinobu Inoue goto bad; 93682cd038dSYoshinobu Inoue } else { 93782cd038dSYoshinobu Inoue struct mbuf **mnext, *m_frgpart; 93882cd038dSYoshinobu Inoue struct ip6_frag *ip6f; 93929234943SHajimu UMEMOTO #ifdef RANDOM_IP_ID 9408373d51dSHajimu UMEMOTO u_int32_t id = htonl(ip6_randomid()); 94129234943SHajimu UMEMOTO #else 94229234943SHajimu UMEMOTO u_int32_t id = htonl(ip6_id++); 94329234943SHajimu UMEMOTO #endif 94482cd038dSYoshinobu Inoue u_char nextproto; 94582cd038dSYoshinobu Inoue 94682cd038dSYoshinobu Inoue /* 94782cd038dSYoshinobu Inoue * Too large for the destination or interface; 94882cd038dSYoshinobu Inoue * fragment if possible. 94982cd038dSYoshinobu Inoue * Must be able to put at least 8 bytes per fragment. 95082cd038dSYoshinobu Inoue */ 95182cd038dSYoshinobu Inoue hlen = unfragpartlen; 95282cd038dSYoshinobu Inoue if (mtu > IPV6_MAXPACKET) 95382cd038dSYoshinobu Inoue mtu = IPV6_MAXPACKET; 95433841545SHajimu UMEMOTO 95582cd038dSYoshinobu Inoue len = (mtu - hlen - sizeof(struct ip6_frag)) & ~7; 95682cd038dSYoshinobu Inoue if (len < 8) { 95782cd038dSYoshinobu Inoue error = EMSGSIZE; 95882cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_fragfail); 95982cd038dSYoshinobu Inoue goto bad; 96082cd038dSYoshinobu Inoue } 96182cd038dSYoshinobu Inoue 96282cd038dSYoshinobu Inoue mnext = &m->m_nextpkt; 96382cd038dSYoshinobu Inoue 96482cd038dSYoshinobu Inoue /* 96582cd038dSYoshinobu Inoue * Change the next header field of the last header in the 96682cd038dSYoshinobu Inoue * unfragmentable part. 96782cd038dSYoshinobu Inoue */ 96882cd038dSYoshinobu Inoue if (exthdrs.ip6e_rthdr) { 96982cd038dSYoshinobu Inoue nextproto = *mtod(exthdrs.ip6e_rthdr, u_char *); 97082cd038dSYoshinobu Inoue *mtod(exthdrs.ip6e_rthdr, u_char *) = IPPROTO_FRAGMENT; 97182cd038dSYoshinobu Inoue } else if (exthdrs.ip6e_dest1) { 97282cd038dSYoshinobu Inoue nextproto = *mtod(exthdrs.ip6e_dest1, u_char *); 97382cd038dSYoshinobu Inoue *mtod(exthdrs.ip6e_dest1, u_char *) = IPPROTO_FRAGMENT; 97482cd038dSYoshinobu Inoue } else if (exthdrs.ip6e_hbh) { 97582cd038dSYoshinobu Inoue nextproto = *mtod(exthdrs.ip6e_hbh, u_char *); 97682cd038dSYoshinobu Inoue *mtod(exthdrs.ip6e_hbh, u_char *) = IPPROTO_FRAGMENT; 97782cd038dSYoshinobu Inoue } else { 97882cd038dSYoshinobu Inoue nextproto = ip6->ip6_nxt; 97982cd038dSYoshinobu Inoue ip6->ip6_nxt = IPPROTO_FRAGMENT; 98082cd038dSYoshinobu Inoue } 98182cd038dSYoshinobu Inoue 98282cd038dSYoshinobu Inoue /* 98382cd038dSYoshinobu Inoue * Loop through length of segment after first fragment, 98488ff5695SSUZUKI Shinsuke * make new header and copy data of each part and link onto 98588ff5695SSUZUKI Shinsuke * chain. 98682cd038dSYoshinobu Inoue */ 98782cd038dSYoshinobu Inoue m0 = m; 98882cd038dSYoshinobu Inoue for (off = hlen; off < tlen; off += len) { 989a163d034SWarner Losh MGETHDR(m, M_DONTWAIT, MT_HEADER); 99082cd038dSYoshinobu Inoue if (!m) { 99182cd038dSYoshinobu Inoue error = ENOBUFS; 99282cd038dSYoshinobu Inoue ip6stat.ip6s_odropped++; 99382cd038dSYoshinobu Inoue goto sendorfree; 99482cd038dSYoshinobu Inoue } 99533841545SHajimu UMEMOTO m->m_pkthdr.rcvif = NULL; 99682cd038dSYoshinobu Inoue m->m_flags = m0->m_flags & M_COPYFLAGS; 99782cd038dSYoshinobu Inoue *mnext = m; 99882cd038dSYoshinobu Inoue mnext = &m->m_nextpkt; 99982cd038dSYoshinobu Inoue m->m_data += max_linkhdr; 100082cd038dSYoshinobu Inoue mhip6 = mtod(m, struct ip6_hdr *); 100182cd038dSYoshinobu Inoue *mhip6 = *ip6; 100282cd038dSYoshinobu Inoue m->m_len = sizeof(*mhip6); 100382cd038dSYoshinobu Inoue error = ip6_insertfraghdr(m0, m, hlen, &ip6f); 100482cd038dSYoshinobu Inoue if (error) { 100582cd038dSYoshinobu Inoue ip6stat.ip6s_odropped++; 100682cd038dSYoshinobu Inoue goto sendorfree; 100782cd038dSYoshinobu Inoue } 100882cd038dSYoshinobu Inoue ip6f->ip6f_offlg = htons((u_short)((off - hlen) & ~7)); 100982cd038dSYoshinobu Inoue if (off + len >= tlen) 101082cd038dSYoshinobu Inoue len = tlen - off; 101182cd038dSYoshinobu Inoue else 101282cd038dSYoshinobu Inoue ip6f->ip6f_offlg |= IP6F_MORE_FRAG; 101382cd038dSYoshinobu Inoue mhip6->ip6_plen = htons((u_short)(len + hlen + 10147efe5d92SHajimu UMEMOTO sizeof(*ip6f) - sizeof(struct ip6_hdr))); 101582cd038dSYoshinobu Inoue if ((m_frgpart = m_copy(m0, off, len)) == 0) { 101682cd038dSYoshinobu Inoue error = ENOBUFS; 101782cd038dSYoshinobu Inoue ip6stat.ip6s_odropped++; 101882cd038dSYoshinobu Inoue goto sendorfree; 101982cd038dSYoshinobu Inoue } 102082cd038dSYoshinobu Inoue m_cat(m, m_frgpart); 102182cd038dSYoshinobu Inoue m->m_pkthdr.len = len + hlen + sizeof(*ip6f); 102282cd038dSYoshinobu Inoue m->m_pkthdr.rcvif = (struct ifnet *)0; 102382cd038dSYoshinobu Inoue ip6f->ip6f_reserved = 0; 102482cd038dSYoshinobu Inoue ip6f->ip6f_ident = id; 102582cd038dSYoshinobu Inoue ip6f->ip6f_nxt = nextproto; 102682cd038dSYoshinobu Inoue ip6stat.ip6s_ofragments++; 102782cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_fragcreat); 102882cd038dSYoshinobu Inoue } 102982cd038dSYoshinobu Inoue 103082cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_fragok); 103182cd038dSYoshinobu Inoue } 103282cd038dSYoshinobu Inoue 103382cd038dSYoshinobu Inoue /* 103482cd038dSYoshinobu Inoue * Remove leading garbages. 103582cd038dSYoshinobu Inoue */ 103682cd038dSYoshinobu Inoue sendorfree: 103782cd038dSYoshinobu Inoue m = m0->m_nextpkt; 103882cd038dSYoshinobu Inoue m0->m_nextpkt = 0; 103982cd038dSYoshinobu Inoue m_freem(m0); 104082cd038dSYoshinobu Inoue for (m0 = m; m; m = m0) { 104182cd038dSYoshinobu Inoue m0 = m->m_nextpkt; 104282cd038dSYoshinobu Inoue m->m_nextpkt = 0; 104382cd038dSYoshinobu Inoue if (error == 0) { 1044fe937674SJosef Karthauser /* Record statistics for this interface address. */ 1045fe937674SJosef Karthauser if (ia) { 1046fe937674SJosef Karthauser ia->ia_ifa.if_opackets++; 1047fe937674SJosef Karthauser ia->ia_ifa.if_obytes += m->m_pkthdr.len; 1048fe937674SJosef Karthauser } 104933841545SHajimu UMEMOTO #ifdef IPSEC 105033841545SHajimu UMEMOTO /* clean ipsec history once it goes out of the node */ 105133841545SHajimu UMEMOTO ipsec_delaux(m); 105233841545SHajimu UMEMOTO #endif 1053686cdd19SJun-ichiro itojun Hagino error = nd6_output(ifp, origifp, m, dst, ro->ro_rt); 105482cd038dSYoshinobu Inoue } else 105582cd038dSYoshinobu Inoue m_freem(m); 105682cd038dSYoshinobu Inoue } 105782cd038dSYoshinobu Inoue 105882cd038dSYoshinobu Inoue if (error == 0) 105982cd038dSYoshinobu Inoue ip6stat.ip6s_fragmented++; 106082cd038dSYoshinobu Inoue 106182cd038dSYoshinobu Inoue done: 106282cd038dSYoshinobu Inoue if (ro == &ip6route && ro->ro_rt) { /* brace necessary for RTFREE */ 106382cd038dSYoshinobu Inoue RTFREE(ro->ro_rt); 106482cd038dSYoshinobu Inoue } else if (ro_pmtu == &ip6route && ro_pmtu->ro_rt) { 106582cd038dSYoshinobu Inoue RTFREE(ro_pmtu->ro_rt); 106682cd038dSYoshinobu Inoue } 106782cd038dSYoshinobu Inoue 106882cd038dSYoshinobu Inoue #ifdef IPSEC 106982cd038dSYoshinobu Inoue if (sp != NULL) 107082cd038dSYoshinobu Inoue key_freesp(sp); 107182cd038dSYoshinobu Inoue #endif /* IPSEC */ 1072b9234fafSSam Leffler #ifdef FAST_IPSEC 1073b9234fafSSam Leffler if (sp != NULL) 1074b9234fafSSam Leffler KEY_FREESP(&sp); 1075b9234fafSSam Leffler #endif /* FAST_IPSEC */ 107682cd038dSYoshinobu Inoue 107782cd038dSYoshinobu Inoue return (error); 107882cd038dSYoshinobu Inoue 107982cd038dSYoshinobu Inoue freehdrs: 108082cd038dSYoshinobu Inoue m_freem(exthdrs.ip6e_hbh); /* m_freem will check if mbuf is 0 */ 108182cd038dSYoshinobu Inoue m_freem(exthdrs.ip6e_dest1); 108282cd038dSYoshinobu Inoue m_freem(exthdrs.ip6e_rthdr); 108382cd038dSYoshinobu Inoue m_freem(exthdrs.ip6e_dest2); 10847efe5d92SHajimu UMEMOTO /* FALLTHROUGH */ 108582cd038dSYoshinobu Inoue bad: 108682cd038dSYoshinobu Inoue m_freem(m); 108782cd038dSYoshinobu Inoue goto done; 108882cd038dSYoshinobu Inoue } 108982cd038dSYoshinobu Inoue 109082cd038dSYoshinobu Inoue static int 109182cd038dSYoshinobu Inoue ip6_copyexthdr(mp, hdr, hlen) 109282cd038dSYoshinobu Inoue struct mbuf **mp; 109382cd038dSYoshinobu Inoue caddr_t hdr; 109482cd038dSYoshinobu Inoue int hlen; 109582cd038dSYoshinobu Inoue { 109682cd038dSYoshinobu Inoue struct mbuf *m; 109782cd038dSYoshinobu Inoue 109882cd038dSYoshinobu Inoue if (hlen > MCLBYTES) 109982cd038dSYoshinobu Inoue return (ENOBUFS); /* XXX */ 110082cd038dSYoshinobu Inoue 1101a163d034SWarner Losh MGET(m, M_DONTWAIT, MT_DATA); 110282cd038dSYoshinobu Inoue if (!m) 110382cd038dSYoshinobu Inoue return (ENOBUFS); 110482cd038dSYoshinobu Inoue 110582cd038dSYoshinobu Inoue if (hlen > MLEN) { 1106a163d034SWarner Losh MCLGET(m, M_DONTWAIT); 110782cd038dSYoshinobu Inoue if ((m->m_flags & M_EXT) == 0) { 110882cd038dSYoshinobu Inoue m_free(m); 110982cd038dSYoshinobu Inoue return (ENOBUFS); 111082cd038dSYoshinobu Inoue } 111182cd038dSYoshinobu Inoue } 111282cd038dSYoshinobu Inoue m->m_len = hlen; 111382cd038dSYoshinobu Inoue if (hdr) 111482cd038dSYoshinobu Inoue bcopy(hdr, mtod(m, caddr_t), hlen); 111582cd038dSYoshinobu Inoue 111682cd038dSYoshinobu Inoue *mp = m; 111782cd038dSYoshinobu Inoue return (0); 111882cd038dSYoshinobu Inoue } 111982cd038dSYoshinobu Inoue 112082cd038dSYoshinobu Inoue /* 112182cd038dSYoshinobu Inoue * Insert jumbo payload option. 112282cd038dSYoshinobu Inoue */ 112382cd038dSYoshinobu Inoue static int 112482cd038dSYoshinobu Inoue ip6_insert_jumboopt(exthdrs, plen) 112582cd038dSYoshinobu Inoue struct ip6_exthdrs *exthdrs; 112682cd038dSYoshinobu Inoue u_int32_t plen; 112782cd038dSYoshinobu Inoue { 112882cd038dSYoshinobu Inoue struct mbuf *mopt; 112982cd038dSYoshinobu Inoue u_char *optbuf; 113033841545SHajimu UMEMOTO u_int32_t v; 113182cd038dSYoshinobu Inoue 113282cd038dSYoshinobu Inoue #define JUMBOOPTLEN 8 /* length of jumbo payload option and padding */ 113382cd038dSYoshinobu Inoue 113482cd038dSYoshinobu Inoue /* 113582cd038dSYoshinobu Inoue * If there is no hop-by-hop options header, allocate new one. 113682cd038dSYoshinobu Inoue * If there is one but it doesn't have enough space to store the 113782cd038dSYoshinobu Inoue * jumbo payload option, allocate a cluster to store the whole options. 113882cd038dSYoshinobu Inoue * Otherwise, use it to store the options. 113982cd038dSYoshinobu Inoue */ 114082cd038dSYoshinobu Inoue if (exthdrs->ip6e_hbh == 0) { 1141a163d034SWarner Losh MGET(mopt, M_DONTWAIT, MT_DATA); 114282cd038dSYoshinobu Inoue if (mopt == 0) 114382cd038dSYoshinobu Inoue return (ENOBUFS); 114482cd038dSYoshinobu Inoue mopt->m_len = JUMBOOPTLEN; 114582cd038dSYoshinobu Inoue optbuf = mtod(mopt, u_char *); 114682cd038dSYoshinobu Inoue optbuf[1] = 0; /* = ((JUMBOOPTLEN) >> 3) - 1 */ 114782cd038dSYoshinobu Inoue exthdrs->ip6e_hbh = mopt; 114882cd038dSYoshinobu Inoue } else { 114982cd038dSYoshinobu Inoue struct ip6_hbh *hbh; 115082cd038dSYoshinobu Inoue 115182cd038dSYoshinobu Inoue mopt = exthdrs->ip6e_hbh; 115282cd038dSYoshinobu Inoue if (M_TRAILINGSPACE(mopt) < JUMBOOPTLEN) { 115333841545SHajimu UMEMOTO /* 115433841545SHajimu UMEMOTO * XXX assumption: 115533841545SHajimu UMEMOTO * - exthdrs->ip6e_hbh is not referenced from places 115633841545SHajimu UMEMOTO * other than exthdrs. 115733841545SHajimu UMEMOTO * - exthdrs->ip6e_hbh is not an mbuf chain. 115833841545SHajimu UMEMOTO */ 115982cd038dSYoshinobu Inoue int oldoptlen = mopt->m_len; 116033841545SHajimu UMEMOTO struct mbuf *n; 116182cd038dSYoshinobu Inoue 116233841545SHajimu UMEMOTO /* 116333841545SHajimu UMEMOTO * XXX: give up if the whole (new) hbh header does 116433841545SHajimu UMEMOTO * not fit even in an mbuf cluster. 116533841545SHajimu UMEMOTO */ 116633841545SHajimu UMEMOTO if (oldoptlen + JUMBOOPTLEN > MCLBYTES) 116782cd038dSYoshinobu Inoue return (ENOBUFS); 116882cd038dSYoshinobu Inoue 116933841545SHajimu UMEMOTO /* 117033841545SHajimu UMEMOTO * As a consequence, we must always prepare a cluster 117133841545SHajimu UMEMOTO * at this point. 117233841545SHajimu UMEMOTO */ 1173a163d034SWarner Losh MGET(n, M_DONTWAIT, MT_DATA); 117433841545SHajimu UMEMOTO if (n) { 1175a163d034SWarner Losh MCLGET(n, M_DONTWAIT); 117633841545SHajimu UMEMOTO if ((n->m_flags & M_EXT) == 0) { 117733841545SHajimu UMEMOTO m_freem(n); 117833841545SHajimu UMEMOTO n = NULL; 117933841545SHajimu UMEMOTO } 118033841545SHajimu UMEMOTO } 118133841545SHajimu UMEMOTO if (!n) 118233841545SHajimu UMEMOTO return (ENOBUFS); 118333841545SHajimu UMEMOTO n->m_len = oldoptlen + JUMBOOPTLEN; 118433841545SHajimu UMEMOTO bcopy(mtod(mopt, caddr_t), mtod(n, caddr_t), 118533841545SHajimu UMEMOTO oldoptlen); 118633841545SHajimu UMEMOTO optbuf = mtod(n, caddr_t) + oldoptlen; 118733841545SHajimu UMEMOTO m_freem(mopt); 118833841545SHajimu UMEMOTO mopt = exthdrs->ip6e_hbh = n; 118982cd038dSYoshinobu Inoue } else { 119082cd038dSYoshinobu Inoue optbuf = mtod(mopt, u_char *) + mopt->m_len; 119182cd038dSYoshinobu Inoue mopt->m_len += JUMBOOPTLEN; 119282cd038dSYoshinobu Inoue } 119382cd038dSYoshinobu Inoue optbuf[0] = IP6OPT_PADN; 119482cd038dSYoshinobu Inoue optbuf[1] = 1; 119582cd038dSYoshinobu Inoue 119682cd038dSYoshinobu Inoue /* 119782cd038dSYoshinobu Inoue * Adjust the header length according to the pad and 119882cd038dSYoshinobu Inoue * the jumbo payload option. 119982cd038dSYoshinobu Inoue */ 120082cd038dSYoshinobu Inoue hbh = mtod(mopt, struct ip6_hbh *); 120182cd038dSYoshinobu Inoue hbh->ip6h_len += (JUMBOOPTLEN >> 3); 120282cd038dSYoshinobu Inoue } 120382cd038dSYoshinobu Inoue 120482cd038dSYoshinobu Inoue /* fill in the option. */ 120582cd038dSYoshinobu Inoue optbuf[2] = IP6OPT_JUMBO; 120682cd038dSYoshinobu Inoue optbuf[3] = 4; 120733841545SHajimu UMEMOTO v = (u_int32_t)htonl(plen + JUMBOOPTLEN); 120833841545SHajimu UMEMOTO bcopy(&v, &optbuf[4], sizeof(u_int32_t)); 120982cd038dSYoshinobu Inoue 121082cd038dSYoshinobu Inoue /* finally, adjust the packet header length */ 121182cd038dSYoshinobu Inoue exthdrs->ip6e_ip6->m_pkthdr.len += JUMBOOPTLEN; 121282cd038dSYoshinobu Inoue 121382cd038dSYoshinobu Inoue return (0); 121482cd038dSYoshinobu Inoue #undef JUMBOOPTLEN 121582cd038dSYoshinobu Inoue } 121682cd038dSYoshinobu Inoue 121782cd038dSYoshinobu Inoue /* 121882cd038dSYoshinobu Inoue * Insert fragment header and copy unfragmentable header portions. 121982cd038dSYoshinobu Inoue */ 122082cd038dSYoshinobu Inoue static int 122182cd038dSYoshinobu Inoue ip6_insertfraghdr(m0, m, hlen, frghdrp) 122282cd038dSYoshinobu Inoue struct mbuf *m0, *m; 122382cd038dSYoshinobu Inoue int hlen; 122482cd038dSYoshinobu Inoue struct ip6_frag **frghdrp; 122582cd038dSYoshinobu Inoue { 122682cd038dSYoshinobu Inoue struct mbuf *n, *mlast; 122782cd038dSYoshinobu Inoue 122882cd038dSYoshinobu Inoue if (hlen > sizeof(struct ip6_hdr)) { 122982cd038dSYoshinobu Inoue n = m_copym(m0, sizeof(struct ip6_hdr), 1230a163d034SWarner Losh hlen - sizeof(struct ip6_hdr), M_DONTWAIT); 123182cd038dSYoshinobu Inoue if (n == 0) 123282cd038dSYoshinobu Inoue return (ENOBUFS); 123382cd038dSYoshinobu Inoue m->m_next = n; 123482cd038dSYoshinobu Inoue } else 123582cd038dSYoshinobu Inoue n = m; 123682cd038dSYoshinobu Inoue 123782cd038dSYoshinobu Inoue /* Search for the last mbuf of unfragmentable part. */ 123882cd038dSYoshinobu Inoue for (mlast = n; mlast->m_next; mlast = mlast->m_next) 123982cd038dSYoshinobu Inoue ; 124082cd038dSYoshinobu Inoue 124182cd038dSYoshinobu Inoue if ((mlast->m_flags & M_EXT) == 0 && 1242686cdd19SJun-ichiro itojun Hagino M_TRAILINGSPACE(mlast) >= sizeof(struct ip6_frag)) { 124382cd038dSYoshinobu Inoue /* use the trailing space of the last mbuf for the fragment hdr */ 12447efe5d92SHajimu UMEMOTO *frghdrp = (struct ip6_frag *)(mtod(mlast, caddr_t) + 12457efe5d92SHajimu UMEMOTO mlast->m_len); 124682cd038dSYoshinobu Inoue mlast->m_len += sizeof(struct ip6_frag); 124782cd038dSYoshinobu Inoue m->m_pkthdr.len += sizeof(struct ip6_frag); 124882cd038dSYoshinobu Inoue } else { 124982cd038dSYoshinobu Inoue /* allocate a new mbuf for the fragment header */ 125082cd038dSYoshinobu Inoue struct mbuf *mfrg; 125182cd038dSYoshinobu Inoue 1252a163d034SWarner Losh MGET(mfrg, M_DONTWAIT, MT_DATA); 125382cd038dSYoshinobu Inoue if (mfrg == 0) 125482cd038dSYoshinobu Inoue return (ENOBUFS); 125582cd038dSYoshinobu Inoue mfrg->m_len = sizeof(struct ip6_frag); 125682cd038dSYoshinobu Inoue *frghdrp = mtod(mfrg, struct ip6_frag *); 125782cd038dSYoshinobu Inoue mlast->m_next = mfrg; 125882cd038dSYoshinobu Inoue } 125982cd038dSYoshinobu Inoue 126082cd038dSYoshinobu Inoue return (0); 126182cd038dSYoshinobu Inoue } 126282cd038dSYoshinobu Inoue 126331b3783cSHajimu UMEMOTO static int 126431b3783cSHajimu UMEMOTO ip6_getpmtu(ro_pmtu, ro, ifp, dst, mtup) 126531b3783cSHajimu UMEMOTO struct route_in6 *ro_pmtu, *ro; 126631b3783cSHajimu UMEMOTO struct ifnet *ifp; 126731b3783cSHajimu UMEMOTO struct in6_addr *dst; 126831b3783cSHajimu UMEMOTO u_long *mtup; 126931b3783cSHajimu UMEMOTO { 127031b3783cSHajimu UMEMOTO u_int32_t mtu = 0; 127131b3783cSHajimu UMEMOTO int error = 0; 127231b3783cSHajimu UMEMOTO 127331b3783cSHajimu UMEMOTO /* 127431b3783cSHajimu UMEMOTO * Determine path MTU. 127531b3783cSHajimu UMEMOTO */ 127631b3783cSHajimu UMEMOTO if (ro_pmtu != ro) { 127731b3783cSHajimu UMEMOTO /* The first hop and the final destination may differ. */ 127831b3783cSHajimu UMEMOTO struct sockaddr_in6 *sa6_dst = 127931b3783cSHajimu UMEMOTO (struct sockaddr_in6 *)&ro_pmtu->ro_dst; 128031b3783cSHajimu UMEMOTO if (ro_pmtu->ro_rt && 128131b3783cSHajimu UMEMOTO ((ro->ro_rt->rt_flags & RTF_UP) == 0 || 128231b3783cSHajimu UMEMOTO !IN6_ARE_ADDR_EQUAL(&sa6_dst->sin6_addr, dst))) { 128331b3783cSHajimu UMEMOTO RTFREE(ro_pmtu->ro_rt); 128431b3783cSHajimu UMEMOTO ro_pmtu->ro_rt = (struct rtentry *)NULL; 128531b3783cSHajimu UMEMOTO } 128631b3783cSHajimu UMEMOTO if (ro_pmtu->ro_rt == NULL) { 128731b3783cSHajimu UMEMOTO bzero(sa6_dst, sizeof(*sa6_dst)); 128831b3783cSHajimu UMEMOTO sa6_dst->sin6_family = AF_INET6; 128931b3783cSHajimu UMEMOTO sa6_dst->sin6_len = sizeof(struct sockaddr_in6); 129031b3783cSHajimu UMEMOTO sa6_dst->sin6_addr = *dst; 129131b3783cSHajimu UMEMOTO 129231b3783cSHajimu UMEMOTO rtalloc((struct route *)ro_pmtu); 129331b3783cSHajimu UMEMOTO } 129431b3783cSHajimu UMEMOTO } 129531b3783cSHajimu UMEMOTO if (ro_pmtu->ro_rt) { 129631b3783cSHajimu UMEMOTO u_int32_t ifmtu; 129731b3783cSHajimu UMEMOTO 129831b3783cSHajimu UMEMOTO if (ifp == NULL) 129931b3783cSHajimu UMEMOTO ifp = ro_pmtu->ro_rt->rt_ifp; 130031b3783cSHajimu UMEMOTO ifmtu = IN6_LINKMTU(ifp); 130131b3783cSHajimu UMEMOTO mtu = ro_pmtu->ro_rt->rt_rmx.rmx_mtu; 130231b3783cSHajimu UMEMOTO if (mtu == 0) 130331b3783cSHajimu UMEMOTO mtu = ifmtu; 130431b3783cSHajimu UMEMOTO else if (mtu > ifmtu || mtu == 0) { 130531b3783cSHajimu UMEMOTO /* 130631b3783cSHajimu UMEMOTO * The MTU on the route is larger than the MTU on 130731b3783cSHajimu UMEMOTO * the interface! This shouldn't happen, unless the 130831b3783cSHajimu UMEMOTO * MTU of the interface has been changed after the 130931b3783cSHajimu UMEMOTO * interface was brought up. Change the MTU in the 131031b3783cSHajimu UMEMOTO * route to match the interface MTU (as long as the 131131b3783cSHajimu UMEMOTO * field isn't locked). 131231b3783cSHajimu UMEMOTO */ 131331b3783cSHajimu UMEMOTO mtu = ifmtu; 131431b3783cSHajimu UMEMOTO if (!(ro_pmtu->ro_rt->rt_rmx.rmx_locks & RTV_MTU)) 131531b3783cSHajimu UMEMOTO ro_pmtu->ro_rt->rt_rmx.rmx_mtu = mtu; 131631b3783cSHajimu UMEMOTO } 131731b3783cSHajimu UMEMOTO } else if (ifp) { 131831b3783cSHajimu UMEMOTO mtu = IN6_LINKMTU(ifp); 131931b3783cSHajimu UMEMOTO } else 132031b3783cSHajimu UMEMOTO error = EHOSTUNREACH; /* XXX */ 132131b3783cSHajimu UMEMOTO 132231b3783cSHajimu UMEMOTO *mtup = mtu; 132331b3783cSHajimu UMEMOTO return (error); 132431b3783cSHajimu UMEMOTO } 132531b3783cSHajimu UMEMOTO 132682cd038dSYoshinobu Inoue /* 132782cd038dSYoshinobu Inoue * IP6 socket option processing. 132882cd038dSYoshinobu Inoue */ 132982cd038dSYoshinobu Inoue int 133082cd038dSYoshinobu Inoue ip6_ctloutput(so, sopt) 133182cd038dSYoshinobu Inoue struct socket *so; 133282cd038dSYoshinobu Inoue struct sockopt *sopt; 133382cd038dSYoshinobu Inoue { 133482cd038dSYoshinobu Inoue int privileged; 133533841545SHajimu UMEMOTO struct inpcb *in6p = sotoinpcb(so); 133682cd038dSYoshinobu Inoue int error, optval; 133782cd038dSYoshinobu Inoue int level, op, optname; 133882cd038dSYoshinobu Inoue int optlen; 1339b40ce416SJulian Elischer struct thread *td; 134082cd038dSYoshinobu Inoue 134182cd038dSYoshinobu Inoue if (sopt) { 134282cd038dSYoshinobu Inoue level = sopt->sopt_level; 134382cd038dSYoshinobu Inoue op = sopt->sopt_dir; 134482cd038dSYoshinobu Inoue optname = sopt->sopt_name; 134582cd038dSYoshinobu Inoue optlen = sopt->sopt_valsize; 1346b40ce416SJulian Elischer td = sopt->sopt_td; 134782cd038dSYoshinobu Inoue } else { 134882cd038dSYoshinobu Inoue panic("ip6_ctloutput: arg soopt is NULL"); 134982cd038dSYoshinobu Inoue } 135082cd038dSYoshinobu Inoue error = optval = 0; 135182cd038dSYoshinobu Inoue 135244731cabSJohn Baldwin privileged = (td == 0 || suser(td)) ? 0 : 1; 135382cd038dSYoshinobu Inoue 135482cd038dSYoshinobu Inoue if (level == IPPROTO_IPV6) { 135582cd038dSYoshinobu Inoue switch (op) { 135633841545SHajimu UMEMOTO 135782cd038dSYoshinobu Inoue case SOPT_SET: 135882cd038dSYoshinobu Inoue switch (optname) { 135982cd038dSYoshinobu Inoue case IPV6_PKTOPTIONS: 136082cd038dSYoshinobu Inoue { 136182cd038dSYoshinobu Inoue struct mbuf *m; 136282cd038dSYoshinobu Inoue 136382cd038dSYoshinobu Inoue error = soopt_getm(sopt, &m); /* XXX */ 13647efe5d92SHajimu UMEMOTO if (error != NULL) 136582cd038dSYoshinobu Inoue break; 136682cd038dSYoshinobu Inoue error = soopt_mcopyin(sopt, m); /* XXX */ 13677efe5d92SHajimu UMEMOTO if (error != NULL) 136882cd038dSYoshinobu Inoue break; 136933841545SHajimu UMEMOTO error = ip6_pcbopts(&in6p->in6p_outputopts, 137033841545SHajimu UMEMOTO m, so, sopt); 137133841545SHajimu UMEMOTO m_freem(m); /* XXX */ 137282cd038dSYoshinobu Inoue break; 137382cd038dSYoshinobu Inoue } 137433841545SHajimu UMEMOTO 137533841545SHajimu UMEMOTO /* 137633841545SHajimu UMEMOTO * Use of some Hop-by-Hop options or some 137733841545SHajimu UMEMOTO * Destination options, might require special 137833841545SHajimu UMEMOTO * privilege. That is, normal applications 137933841545SHajimu UMEMOTO * (without special privilege) might be forbidden 138033841545SHajimu UMEMOTO * from setting certain options in outgoing packets, 138133841545SHajimu UMEMOTO * and might never see certain options in received 138233841545SHajimu UMEMOTO * packets. [RFC 2292 Section 6] 138333841545SHajimu UMEMOTO * KAME specific note: 138433841545SHajimu UMEMOTO * KAME prevents non-privileged users from sending or 138533841545SHajimu UMEMOTO * receiving ANY hbh/dst options in order to avoid 138633841545SHajimu UMEMOTO * overhead of parsing options in the kernel. 138733841545SHajimu UMEMOTO */ 138882cd038dSYoshinobu Inoue case IPV6_UNICAST_HOPS: 138982cd038dSYoshinobu Inoue case IPV6_CHECKSUM: 139082cd038dSYoshinobu Inoue case IPV6_FAITH: 139133841545SHajimu UMEMOTO 139233841545SHajimu UMEMOTO case IPV6_V6ONLY: 139333841545SHajimu UMEMOTO if (optlen != sizeof(int)) { 139482cd038dSYoshinobu Inoue error = EINVAL; 139533841545SHajimu UMEMOTO break; 139633841545SHajimu UMEMOTO } 139782cd038dSYoshinobu Inoue error = sooptcopyin(sopt, &optval, 139882cd038dSYoshinobu Inoue sizeof optval, sizeof optval); 139982cd038dSYoshinobu Inoue if (error) 140082cd038dSYoshinobu Inoue break; 140182cd038dSYoshinobu Inoue switch (optname) { 140282cd038dSYoshinobu Inoue 140382cd038dSYoshinobu Inoue case IPV6_UNICAST_HOPS: 140482cd038dSYoshinobu Inoue if (optval < -1 || optval >= 256) 140582cd038dSYoshinobu Inoue error = EINVAL; 140682cd038dSYoshinobu Inoue else { 140782cd038dSYoshinobu Inoue /* -1 = kernel default */ 140882cd038dSYoshinobu Inoue in6p->in6p_hops = optval; 140982cd038dSYoshinobu Inoue if ((in6p->in6p_vflag & 141082cd038dSYoshinobu Inoue INP_IPV4) != 0) 141182cd038dSYoshinobu Inoue in6p->inp_ip_ttl = optval; 141282cd038dSYoshinobu Inoue } 141382cd038dSYoshinobu Inoue break; 141482cd038dSYoshinobu Inoue #define OPTSET(bit) \ 141533841545SHajimu UMEMOTO do { \ 141682cd038dSYoshinobu Inoue if (optval) \ 141733841545SHajimu UMEMOTO in6p->in6p_flags |= (bit); \ 141882cd038dSYoshinobu Inoue else \ 141933841545SHajimu UMEMOTO in6p->in6p_flags &= ~(bit); \ 14207efe5d92SHajimu UMEMOTO } while (/*CONSTCOND*/ 0) 142133841545SHajimu UMEMOTO #define OPTBIT(bit) (in6p->in6p_flags & (bit) ? 1 : 0) 142282cd038dSYoshinobu Inoue 142382cd038dSYoshinobu Inoue case IPV6_CHECKSUM: 142482cd038dSYoshinobu Inoue in6p->in6p_cksum = optval; 142582cd038dSYoshinobu Inoue break; 142682cd038dSYoshinobu Inoue 142782cd038dSYoshinobu Inoue case IPV6_FAITH: 142882cd038dSYoshinobu Inoue OPTSET(IN6P_FAITH); 142982cd038dSYoshinobu Inoue break; 143082cd038dSYoshinobu Inoue 143133841545SHajimu UMEMOTO case IPV6_V6ONLY: 143233841545SHajimu UMEMOTO /* 14330554093bSHajimu UMEMOTO * make setsockopt(IPV6_V6ONLY) 14340554093bSHajimu UMEMOTO * available only prior to bind(2). 14350554093bSHajimu UMEMOTO * see ipng mailing list, Jun 22 2001. 14360554093bSHajimu UMEMOTO */ 14370554093bSHajimu UMEMOTO if (in6p->in6p_lport || 14387efe5d92SHajimu UMEMOTO !IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_laddr)) { 14390554093bSHajimu UMEMOTO error = EINVAL; 14400554093bSHajimu UMEMOTO break; 14410554093bSHajimu UMEMOTO } 144233841545SHajimu UMEMOTO OPTSET(IN6P_IPV6_V6ONLY); 144312253795SHajimu UMEMOTO if (optval) 144412253795SHajimu UMEMOTO in6p->in6p_vflag &= ~INP_IPV4; 144512253795SHajimu UMEMOTO else 144612253795SHajimu UMEMOTO in6p->in6p_vflag |= INP_IPV4; 144782cd038dSYoshinobu Inoue break; 144882cd038dSYoshinobu Inoue } 144933841545SHajimu UMEMOTO break; 145033841545SHajimu UMEMOTO 145133841545SHajimu UMEMOTO case IPV6_PKTINFO: 145233841545SHajimu UMEMOTO case IPV6_HOPLIMIT: 145333841545SHajimu UMEMOTO case IPV6_HOPOPTS: 145433841545SHajimu UMEMOTO case IPV6_DSTOPTS: 145533841545SHajimu UMEMOTO case IPV6_RTHDR: 145633841545SHajimu UMEMOTO /* RFC 2292 */ 145733841545SHajimu UMEMOTO if (optlen != sizeof(int)) { 145833841545SHajimu UMEMOTO error = EINVAL; 145933841545SHajimu UMEMOTO break; 146033841545SHajimu UMEMOTO } 146133841545SHajimu UMEMOTO error = sooptcopyin(sopt, &optval, 146233841545SHajimu UMEMOTO sizeof optval, sizeof optval); 146333841545SHajimu UMEMOTO if (error) 146433841545SHajimu UMEMOTO break; 146533841545SHajimu UMEMOTO switch (optname) { 146633841545SHajimu UMEMOTO case IPV6_PKTINFO: 146733841545SHajimu UMEMOTO OPTSET(IN6P_PKTINFO); 146833841545SHajimu UMEMOTO break; 146933841545SHajimu UMEMOTO case IPV6_HOPLIMIT: 147033841545SHajimu UMEMOTO OPTSET(IN6P_HOPLIMIT); 147133841545SHajimu UMEMOTO break; 147233841545SHajimu UMEMOTO case IPV6_HOPOPTS: 147333841545SHajimu UMEMOTO /* 147433841545SHajimu UMEMOTO * Check super-user privilege. 147533841545SHajimu UMEMOTO * See comments for IPV6_RECVHOPOPTS. 147633841545SHajimu UMEMOTO */ 147733841545SHajimu UMEMOTO if (!privileged) 147833841545SHajimu UMEMOTO return (EPERM); 147933841545SHajimu UMEMOTO OPTSET(IN6P_HOPOPTS); 148033841545SHajimu UMEMOTO break; 148133841545SHajimu UMEMOTO case IPV6_DSTOPTS: 148233841545SHajimu UMEMOTO if (!privileged) 148333841545SHajimu UMEMOTO return (EPERM); 148433841545SHajimu UMEMOTO OPTSET(IN6P_DSTOPTS|IN6P_RTHDRDSTOPTS); /* XXX */ 148533841545SHajimu UMEMOTO break; 148633841545SHajimu UMEMOTO case IPV6_RTHDR: 148733841545SHajimu UMEMOTO OPTSET(IN6P_RTHDR); 148833841545SHajimu UMEMOTO break; 148982cd038dSYoshinobu Inoue } 149082cd038dSYoshinobu Inoue break; 149182cd038dSYoshinobu Inoue #undef OPTSET 149282cd038dSYoshinobu Inoue 149382cd038dSYoshinobu Inoue case IPV6_MULTICAST_IF: 149482cd038dSYoshinobu Inoue case IPV6_MULTICAST_HOPS: 149582cd038dSYoshinobu Inoue case IPV6_MULTICAST_LOOP: 149682cd038dSYoshinobu Inoue case IPV6_JOIN_GROUP: 149782cd038dSYoshinobu Inoue case IPV6_LEAVE_GROUP: 149882cd038dSYoshinobu Inoue { 149982cd038dSYoshinobu Inoue struct mbuf *m; 15007efe5d92SHajimu UMEMOTO 150182cd038dSYoshinobu Inoue if (sopt->sopt_valsize > MLEN) { 150282cd038dSYoshinobu Inoue error = EMSGSIZE; 150382cd038dSYoshinobu Inoue break; 150482cd038dSYoshinobu Inoue } 150582cd038dSYoshinobu Inoue /* XXX */ 1506a163d034SWarner Losh MGET(m, sopt->sopt_td ? M_TRYWAIT : M_DONTWAIT, MT_HEADER); 150782cd038dSYoshinobu Inoue if (m == 0) { 150882cd038dSYoshinobu Inoue error = ENOBUFS; 150982cd038dSYoshinobu Inoue break; 151082cd038dSYoshinobu Inoue } 151182cd038dSYoshinobu Inoue m->m_len = sopt->sopt_valsize; 151282cd038dSYoshinobu Inoue error = sooptcopyin(sopt, mtod(m, char *), 151382cd038dSYoshinobu Inoue m->m_len, m->m_len); 151482cd038dSYoshinobu Inoue error = ip6_setmoptions(sopt->sopt_name, 151582cd038dSYoshinobu Inoue &in6p->in6p_moptions, 151682cd038dSYoshinobu Inoue m); 151782cd038dSYoshinobu Inoue (void)m_free(m); 151882cd038dSYoshinobu Inoue } 151982cd038dSYoshinobu Inoue break; 152082cd038dSYoshinobu Inoue 152182cd038dSYoshinobu Inoue case IPV6_PORTRANGE: 1522686cdd19SJun-ichiro itojun Hagino error = sooptcopyin(sopt, &optval, 1523686cdd19SJun-ichiro itojun Hagino sizeof optval, sizeof optval); 152482cd038dSYoshinobu Inoue if (error) 152582cd038dSYoshinobu Inoue break; 152682cd038dSYoshinobu Inoue 152782cd038dSYoshinobu Inoue switch (optval) { 152882cd038dSYoshinobu Inoue case IPV6_PORTRANGE_DEFAULT: 152982cd038dSYoshinobu Inoue in6p->in6p_flags &= ~(IN6P_LOWPORT); 153082cd038dSYoshinobu Inoue in6p->in6p_flags &= ~(IN6P_HIGHPORT); 153182cd038dSYoshinobu Inoue break; 153282cd038dSYoshinobu Inoue 153382cd038dSYoshinobu Inoue case IPV6_PORTRANGE_HIGH: 153482cd038dSYoshinobu Inoue in6p->in6p_flags &= ~(IN6P_LOWPORT); 153582cd038dSYoshinobu Inoue in6p->in6p_flags |= IN6P_HIGHPORT; 153682cd038dSYoshinobu Inoue break; 153782cd038dSYoshinobu Inoue 153882cd038dSYoshinobu Inoue case IPV6_PORTRANGE_LOW: 153982cd038dSYoshinobu Inoue in6p->in6p_flags &= ~(IN6P_HIGHPORT); 154082cd038dSYoshinobu Inoue in6p->in6p_flags |= IN6P_LOWPORT; 154182cd038dSYoshinobu Inoue break; 154282cd038dSYoshinobu Inoue 154382cd038dSYoshinobu Inoue default: 154482cd038dSYoshinobu Inoue error = EINVAL; 154582cd038dSYoshinobu Inoue break; 154682cd038dSYoshinobu Inoue } 154782cd038dSYoshinobu Inoue break; 154882cd038dSYoshinobu Inoue 1549b9234fafSSam Leffler #if defined(IPSEC) || defined(FAST_IPSEC) 155082cd038dSYoshinobu Inoue case IPV6_IPSEC_POLICY: 155182cd038dSYoshinobu Inoue { 155282cd038dSYoshinobu Inoue caddr_t req = NULL; 1553686cdd19SJun-ichiro itojun Hagino size_t len = 0; 155482cd038dSYoshinobu Inoue struct mbuf *m; 155582cd038dSYoshinobu Inoue 1556686cdd19SJun-ichiro itojun Hagino if ((error = soopt_getm(sopt, &m)) != 0) /* XXX */ 155782cd038dSYoshinobu Inoue break; 1558686cdd19SJun-ichiro itojun Hagino if ((error = soopt_mcopyin(sopt, m)) != 0) /* XXX */ 155982cd038dSYoshinobu Inoue break; 1560686cdd19SJun-ichiro itojun Hagino if (m) { 156182cd038dSYoshinobu Inoue req = mtod(m, caddr_t); 1562686cdd19SJun-ichiro itojun Hagino len = m->m_len; 1563686cdd19SJun-ichiro itojun Hagino } 156482cd038dSYoshinobu Inoue error = ipsec6_set_policy(in6p, optname, req, 1565686cdd19SJun-ichiro itojun Hagino len, privileged); 156682cd038dSYoshinobu Inoue m_freem(m); 156782cd038dSYoshinobu Inoue } 156882cd038dSYoshinobu Inoue break; 156933841545SHajimu UMEMOTO #endif /* KAME IPSEC */ 157082cd038dSYoshinobu Inoue 157182cd038dSYoshinobu Inoue case IPV6_FW_ADD: 157282cd038dSYoshinobu Inoue case IPV6_FW_DEL: 157382cd038dSYoshinobu Inoue case IPV6_FW_FLUSH: 157482cd038dSYoshinobu Inoue case IPV6_FW_ZERO: 157582cd038dSYoshinobu Inoue { 157682cd038dSYoshinobu Inoue struct mbuf *m; 157782cd038dSYoshinobu Inoue struct mbuf **mp = &m; 157882cd038dSYoshinobu Inoue 157982cd038dSYoshinobu Inoue if (ip6_fw_ctl_ptr == NULL) 158082cd038dSYoshinobu Inoue return EINVAL; 15813e617560SHajimu UMEMOTO /* XXX */ 15823e617560SHajimu UMEMOTO if ((error = soopt_getm(sopt, &m)) != 0) 158382cd038dSYoshinobu Inoue break; 15843e617560SHajimu UMEMOTO /* XXX */ 15853e617560SHajimu UMEMOTO if ((error = soopt_mcopyin(sopt, m)) != 0) 158682cd038dSYoshinobu Inoue break; 158782cd038dSYoshinobu Inoue error = (*ip6_fw_ctl_ptr)(optname, mp); 158882cd038dSYoshinobu Inoue m = *mp; 158982cd038dSYoshinobu Inoue } 159082cd038dSYoshinobu Inoue break; 159182cd038dSYoshinobu Inoue 159282cd038dSYoshinobu Inoue default: 159382cd038dSYoshinobu Inoue error = ENOPROTOOPT; 159482cd038dSYoshinobu Inoue break; 159582cd038dSYoshinobu Inoue } 159682cd038dSYoshinobu Inoue break; 159782cd038dSYoshinobu Inoue 159882cd038dSYoshinobu Inoue case SOPT_GET: 159982cd038dSYoshinobu Inoue switch (optname) { 160082cd038dSYoshinobu Inoue 160182cd038dSYoshinobu Inoue case IPV6_PKTOPTIONS: 160282cd038dSYoshinobu Inoue if (in6p->in6p_options) { 160389349143SHajimu UMEMOTO struct mbuf *m; 160489349143SHajimu UMEMOTO m = m_copym(in6p->in6p_options, 1605a163d034SWarner Losh 0, M_COPYALL, M_TRYWAIT); 160689349143SHajimu UMEMOTO error = soopt_mcopyout(sopt, m); 160789349143SHajimu UMEMOTO if (error == 0) 160889349143SHajimu UMEMOTO m_freem(m); 160982cd038dSYoshinobu Inoue } else 161082cd038dSYoshinobu Inoue sopt->sopt_valsize = 0; 161182cd038dSYoshinobu Inoue break; 161282cd038dSYoshinobu Inoue 161382cd038dSYoshinobu Inoue case IPV6_UNICAST_HOPS: 161482cd038dSYoshinobu Inoue case IPV6_CHECKSUM: 161533841545SHajimu UMEMOTO 161682cd038dSYoshinobu Inoue case IPV6_FAITH: 161733841545SHajimu UMEMOTO case IPV6_V6ONLY: 1618fa310a7eSYoshinobu Inoue case IPV6_PORTRANGE: 161982cd038dSYoshinobu Inoue switch (optname) { 162082cd038dSYoshinobu Inoue 162182cd038dSYoshinobu Inoue case IPV6_UNICAST_HOPS: 162282cd038dSYoshinobu Inoue optval = in6p->in6p_hops; 162382cd038dSYoshinobu Inoue break; 162482cd038dSYoshinobu Inoue 162582cd038dSYoshinobu Inoue case IPV6_CHECKSUM: 162682cd038dSYoshinobu Inoue optval = in6p->in6p_cksum; 162782cd038dSYoshinobu Inoue break; 162882cd038dSYoshinobu Inoue 162982cd038dSYoshinobu Inoue case IPV6_FAITH: 163082cd038dSYoshinobu Inoue optval = OPTBIT(IN6P_FAITH); 163182cd038dSYoshinobu Inoue break; 163282cd038dSYoshinobu Inoue 163333841545SHajimu UMEMOTO case IPV6_V6ONLY: 1634854d3b19SHajimu UMEMOTO optval = OPTBIT(IN6P_IPV6_V6ONLY); 163582cd038dSYoshinobu Inoue break; 163682cd038dSYoshinobu Inoue 163782cd038dSYoshinobu Inoue case IPV6_PORTRANGE: 163882cd038dSYoshinobu Inoue { 163982cd038dSYoshinobu Inoue int flags; 164082cd038dSYoshinobu Inoue flags = in6p->in6p_flags; 164182cd038dSYoshinobu Inoue if (flags & IN6P_HIGHPORT) 164282cd038dSYoshinobu Inoue optval = IPV6_PORTRANGE_HIGH; 164382cd038dSYoshinobu Inoue else if (flags & IN6P_LOWPORT) 164482cd038dSYoshinobu Inoue optval = IPV6_PORTRANGE_LOW; 164582cd038dSYoshinobu Inoue else 164682cd038dSYoshinobu Inoue optval = 0; 164782cd038dSYoshinobu Inoue break; 164882cd038dSYoshinobu Inoue } 164982cd038dSYoshinobu Inoue } 165082cd038dSYoshinobu Inoue error = sooptcopyout(sopt, &optval, 165182cd038dSYoshinobu Inoue sizeof optval); 165282cd038dSYoshinobu Inoue break; 165382cd038dSYoshinobu Inoue 165433841545SHajimu UMEMOTO case IPV6_PKTINFO: 165533841545SHajimu UMEMOTO case IPV6_HOPLIMIT: 165633841545SHajimu UMEMOTO case IPV6_HOPOPTS: 165733841545SHajimu UMEMOTO case IPV6_RTHDR: 165833841545SHajimu UMEMOTO case IPV6_DSTOPTS: 165933841545SHajimu UMEMOTO if (optname == IPV6_HOPOPTS || 166033841545SHajimu UMEMOTO optname == IPV6_DSTOPTS || 166133841545SHajimu UMEMOTO !privileged) 166233841545SHajimu UMEMOTO return (EPERM); 166333841545SHajimu UMEMOTO switch (optname) { 166433841545SHajimu UMEMOTO case IPV6_PKTINFO: 166533841545SHajimu UMEMOTO optval = OPTBIT(IN6P_PKTINFO); 166633841545SHajimu UMEMOTO break; 166733841545SHajimu UMEMOTO case IPV6_HOPLIMIT: 166833841545SHajimu UMEMOTO optval = OPTBIT(IN6P_HOPLIMIT); 166933841545SHajimu UMEMOTO break; 167033841545SHajimu UMEMOTO case IPV6_HOPOPTS: 167133841545SHajimu UMEMOTO if (!privileged) 167233841545SHajimu UMEMOTO return (EPERM); 167333841545SHajimu UMEMOTO optval = OPTBIT(IN6P_HOPOPTS); 167433841545SHajimu UMEMOTO break; 167533841545SHajimu UMEMOTO case IPV6_RTHDR: 167633841545SHajimu UMEMOTO optval = OPTBIT(IN6P_RTHDR); 167733841545SHajimu UMEMOTO break; 167833841545SHajimu UMEMOTO case IPV6_DSTOPTS: 167933841545SHajimu UMEMOTO if (!privileged) 168033841545SHajimu UMEMOTO return (EPERM); 168133841545SHajimu UMEMOTO optval = OPTBIT(IN6P_DSTOPTS|IN6P_RTHDRDSTOPTS); 168233841545SHajimu UMEMOTO break; 168333841545SHajimu UMEMOTO } 168433841545SHajimu UMEMOTO error = sooptcopyout(sopt, &optval, 168533841545SHajimu UMEMOTO sizeof optval); 168633841545SHajimu UMEMOTO break; 168733841545SHajimu UMEMOTO 168882cd038dSYoshinobu Inoue case IPV6_MULTICAST_IF: 168982cd038dSYoshinobu Inoue case IPV6_MULTICAST_HOPS: 169082cd038dSYoshinobu Inoue case IPV6_MULTICAST_LOOP: 169182cd038dSYoshinobu Inoue case IPV6_JOIN_GROUP: 169282cd038dSYoshinobu Inoue case IPV6_LEAVE_GROUP: 169382cd038dSYoshinobu Inoue { 169482cd038dSYoshinobu Inoue struct mbuf *m; 169582cd038dSYoshinobu Inoue error = ip6_getmoptions(sopt->sopt_name, 169682cd038dSYoshinobu Inoue in6p->in6p_moptions, &m); 169782cd038dSYoshinobu Inoue if (error == 0) 169882cd038dSYoshinobu Inoue error = sooptcopyout(sopt, 169982cd038dSYoshinobu Inoue mtod(m, char *), m->m_len); 170082cd038dSYoshinobu Inoue m_freem(m); 170182cd038dSYoshinobu Inoue } 170282cd038dSYoshinobu Inoue break; 170382cd038dSYoshinobu Inoue 1704b9234fafSSam Leffler #if defined(IPSEC) || defined(FAST_IPSEC) 170582cd038dSYoshinobu Inoue case IPV6_IPSEC_POLICY: 170682cd038dSYoshinobu Inoue { 1707f63e7634SYoshinobu Inoue caddr_t req = NULL; 1708686cdd19SJun-ichiro itojun Hagino size_t len = 0; 1709686cdd19SJun-ichiro itojun Hagino struct mbuf *m = NULL; 1710686cdd19SJun-ichiro itojun Hagino struct mbuf **mp = &m; 1711f63e7634SYoshinobu Inoue 1712686cdd19SJun-ichiro itojun Hagino error = soopt_getm(sopt, &m); /* XXX */ 17137efe5d92SHajimu UMEMOTO if (error != NULL) 1714686cdd19SJun-ichiro itojun Hagino break; 1715686cdd19SJun-ichiro itojun Hagino error = soopt_mcopyin(sopt, m); /* XXX */ 17167efe5d92SHajimu UMEMOTO if (error != NULL) 1717686cdd19SJun-ichiro itojun Hagino break; 1718686cdd19SJun-ichiro itojun Hagino if (m) { 171982cd038dSYoshinobu Inoue req = mtod(m, caddr_t); 1720686cdd19SJun-ichiro itojun Hagino len = m->m_len; 1721686cdd19SJun-ichiro itojun Hagino } 1722686cdd19SJun-ichiro itojun Hagino error = ipsec6_get_policy(in6p, req, len, mp); 172382cd038dSYoshinobu Inoue if (error == 0) 172482cd038dSYoshinobu Inoue error = soopt_mcopyout(sopt, m); /* XXX */ 172533841545SHajimu UMEMOTO if (error == 0 && m) 172682cd038dSYoshinobu Inoue m_freem(m); 172782cd038dSYoshinobu Inoue break; 172882cd038dSYoshinobu Inoue } 172933841545SHajimu UMEMOTO #endif /* KAME IPSEC */ 173082cd038dSYoshinobu Inoue 173182cd038dSYoshinobu Inoue case IPV6_FW_GET: 173282cd038dSYoshinobu Inoue { 173382cd038dSYoshinobu Inoue struct mbuf *m; 173482cd038dSYoshinobu Inoue struct mbuf **mp = &m; 173582cd038dSYoshinobu Inoue 173682cd038dSYoshinobu Inoue if (ip6_fw_ctl_ptr == NULL) 173782cd038dSYoshinobu Inoue { 173882cd038dSYoshinobu Inoue return EINVAL; 173982cd038dSYoshinobu Inoue } 174082cd038dSYoshinobu Inoue error = (*ip6_fw_ctl_ptr)(optname, mp); 174182cd038dSYoshinobu Inoue if (error == 0) 174282cd038dSYoshinobu Inoue error = soopt_mcopyout(sopt, m); /* XXX */ 17436c0bea35SHajimu UMEMOTO if (error == 0 && m) 174482cd038dSYoshinobu Inoue m_freem(m); 174582cd038dSYoshinobu Inoue } 174682cd038dSYoshinobu Inoue break; 174782cd038dSYoshinobu Inoue 174882cd038dSYoshinobu Inoue default: 174982cd038dSYoshinobu Inoue error = ENOPROTOOPT; 175082cd038dSYoshinobu Inoue break; 175182cd038dSYoshinobu Inoue } 175282cd038dSYoshinobu Inoue break; 175382cd038dSYoshinobu Inoue } 175482cd038dSYoshinobu Inoue } else { 175582cd038dSYoshinobu Inoue error = EINVAL; 175682cd038dSYoshinobu Inoue } 175782cd038dSYoshinobu Inoue return (error); 175882cd038dSYoshinobu Inoue } 175982cd038dSYoshinobu Inoue 176082cd038dSYoshinobu Inoue /* 176133841545SHajimu UMEMOTO * Set up IP6 options in pcb for insertion in output packets or 176233841545SHajimu UMEMOTO * specifying behavior of outgoing packets. 176382cd038dSYoshinobu Inoue */ 176482cd038dSYoshinobu Inoue static int 176582cd038dSYoshinobu Inoue ip6_pcbopts(pktopt, m, so, sopt) 176682cd038dSYoshinobu Inoue struct ip6_pktopts **pktopt; 176733841545SHajimu UMEMOTO struct mbuf *m; 176882cd038dSYoshinobu Inoue struct socket *so; 176982cd038dSYoshinobu Inoue struct sockopt *sopt; 177082cd038dSYoshinobu Inoue { 177133841545SHajimu UMEMOTO struct ip6_pktopts *opt = *pktopt; 177282cd038dSYoshinobu Inoue int error = 0; 1773b40ce416SJulian Elischer struct thread *td = sopt->sopt_td; 177482cd038dSYoshinobu Inoue int priv = 0; 177582cd038dSYoshinobu Inoue 177682cd038dSYoshinobu Inoue /* turn off any old options. */ 177782cd038dSYoshinobu Inoue if (opt) { 177833841545SHajimu UMEMOTO #ifdef DIAGNOSTIC 177933841545SHajimu UMEMOTO if (opt->ip6po_pktinfo || opt->ip6po_nexthop || 178033841545SHajimu UMEMOTO opt->ip6po_hbh || opt->ip6po_dest1 || opt->ip6po_dest2 || 178133841545SHajimu UMEMOTO opt->ip6po_rhinfo.ip6po_rhi_rthdr) 178233841545SHajimu UMEMOTO printf("ip6_pcbopts: all specified options are cleared.\n"); 178333841545SHajimu UMEMOTO #endif 178433841545SHajimu UMEMOTO ip6_clearpktopts(opt, 1, -1); 178582cd038dSYoshinobu Inoue } else 1786a163d034SWarner Losh opt = malloc(sizeof(*opt), M_IP6OPT, M_WAITOK); 178733841545SHajimu UMEMOTO *pktopt = NULL; 178882cd038dSYoshinobu Inoue 178982cd038dSYoshinobu Inoue if (!m || m->m_len == 0) { 179082cd038dSYoshinobu Inoue /* 179135f6695bSHajimu UMEMOTO * Only turning off any previous options, regardless of 179235f6695bSHajimu UMEMOTO * whether the opt is just created or given. 179382cd038dSYoshinobu Inoue */ 179482cd038dSYoshinobu Inoue free(opt, M_IP6OPT); 179582cd038dSYoshinobu Inoue return (0); 179682cd038dSYoshinobu Inoue } 179782cd038dSYoshinobu Inoue 179882cd038dSYoshinobu Inoue /* set options specified by user. */ 179944731cabSJohn Baldwin if (td && !suser(td)) 180082cd038dSYoshinobu Inoue priv = 1; 180133841545SHajimu UMEMOTO if ((error = ip6_setpktoptions(m, opt, priv, 1)) != 0) { 180233841545SHajimu UMEMOTO ip6_clearpktopts(opt, 1, -1); /* XXX: discard all options */ 180335f6695bSHajimu UMEMOTO free(opt, M_IP6OPT); 180482cd038dSYoshinobu Inoue return (error); 180582cd038dSYoshinobu Inoue } 180682cd038dSYoshinobu Inoue *pktopt = opt; 180782cd038dSYoshinobu Inoue return (0); 180882cd038dSYoshinobu Inoue } 180982cd038dSYoshinobu Inoue 181082cd038dSYoshinobu Inoue /* 181133841545SHajimu UMEMOTO * initialize ip6_pktopts. beware that there are non-zero default values in 181233841545SHajimu UMEMOTO * the struct. 181333841545SHajimu UMEMOTO */ 181433841545SHajimu UMEMOTO void 181533841545SHajimu UMEMOTO init_ip6pktopts(opt) 181633841545SHajimu UMEMOTO struct ip6_pktopts *opt; 181733841545SHajimu UMEMOTO { 181833841545SHajimu UMEMOTO 181933841545SHajimu UMEMOTO bzero(opt, sizeof(*opt)); 182033841545SHajimu UMEMOTO opt->ip6po_hlim = -1; /* -1 means default hop limit */ 182133841545SHajimu UMEMOTO } 182233841545SHajimu UMEMOTO 182333841545SHajimu UMEMOTO void 182433841545SHajimu UMEMOTO ip6_clearpktopts(pktopt, needfree, optname) 182533841545SHajimu UMEMOTO struct ip6_pktopts *pktopt; 182633841545SHajimu UMEMOTO int needfree, optname; 182733841545SHajimu UMEMOTO { 182833841545SHajimu UMEMOTO if (pktopt == NULL) 182933841545SHajimu UMEMOTO return; 183033841545SHajimu UMEMOTO 183133841545SHajimu UMEMOTO if (optname == -1) { 183233841545SHajimu UMEMOTO if (needfree && pktopt->ip6po_pktinfo) 183333841545SHajimu UMEMOTO free(pktopt->ip6po_pktinfo, M_IP6OPT); 183433841545SHajimu UMEMOTO pktopt->ip6po_pktinfo = NULL; 183533841545SHajimu UMEMOTO } 183633841545SHajimu UMEMOTO if (optname == -1) 183733841545SHajimu UMEMOTO pktopt->ip6po_hlim = -1; 183833841545SHajimu UMEMOTO if (optname == -1) { 183933841545SHajimu UMEMOTO if (needfree && pktopt->ip6po_nexthop) 184033841545SHajimu UMEMOTO free(pktopt->ip6po_nexthop, M_IP6OPT); 184133841545SHajimu UMEMOTO pktopt->ip6po_nexthop = NULL; 184233841545SHajimu UMEMOTO } 184333841545SHajimu UMEMOTO if (optname == -1) { 184433841545SHajimu UMEMOTO if (needfree && pktopt->ip6po_hbh) 184533841545SHajimu UMEMOTO free(pktopt->ip6po_hbh, M_IP6OPT); 184633841545SHajimu UMEMOTO pktopt->ip6po_hbh = NULL; 184733841545SHajimu UMEMOTO } 184833841545SHajimu UMEMOTO if (optname == -1) { 184933841545SHajimu UMEMOTO if (needfree && pktopt->ip6po_dest1) 185033841545SHajimu UMEMOTO free(pktopt->ip6po_dest1, M_IP6OPT); 185133841545SHajimu UMEMOTO pktopt->ip6po_dest1 = NULL; 185233841545SHajimu UMEMOTO } 185333841545SHajimu UMEMOTO if (optname == -1) { 185433841545SHajimu UMEMOTO if (needfree && pktopt->ip6po_rhinfo.ip6po_rhi_rthdr) 185533841545SHajimu UMEMOTO free(pktopt->ip6po_rhinfo.ip6po_rhi_rthdr, M_IP6OPT); 185633841545SHajimu UMEMOTO pktopt->ip6po_rhinfo.ip6po_rhi_rthdr = NULL; 185733841545SHajimu UMEMOTO if (pktopt->ip6po_route.ro_rt) { 185833841545SHajimu UMEMOTO RTFREE(pktopt->ip6po_route.ro_rt); 185933841545SHajimu UMEMOTO pktopt->ip6po_route.ro_rt = NULL; 186033841545SHajimu UMEMOTO } 186133841545SHajimu UMEMOTO } 186233841545SHajimu UMEMOTO if (optname == -1) { 186333841545SHajimu UMEMOTO if (needfree && pktopt->ip6po_dest2) 186433841545SHajimu UMEMOTO free(pktopt->ip6po_dest2, M_IP6OPT); 186533841545SHajimu UMEMOTO pktopt->ip6po_dest2 = NULL; 186633841545SHajimu UMEMOTO } 186733841545SHajimu UMEMOTO } 186833841545SHajimu UMEMOTO 186933841545SHajimu UMEMOTO #define PKTOPT_EXTHDRCPY(type) \ 187033841545SHajimu UMEMOTO do {\ 187133841545SHajimu UMEMOTO if (src->type) {\ 18727efe5d92SHajimu UMEMOTO int hlen = (((struct ip6_ext *)src->type)->ip6e_len + 1) << 3;\ 187333841545SHajimu UMEMOTO dst->type = malloc(hlen, M_IP6OPT, canwait);\ 187433841545SHajimu UMEMOTO if (dst->type == NULL && canwait == M_NOWAIT)\ 187533841545SHajimu UMEMOTO goto bad;\ 187633841545SHajimu UMEMOTO bcopy(src->type, dst->type, hlen);\ 187733841545SHajimu UMEMOTO }\ 18787efe5d92SHajimu UMEMOTO } while (/*CONSTCOND*/ 0) 187933841545SHajimu UMEMOTO 188033841545SHajimu UMEMOTO struct ip6_pktopts * 188133841545SHajimu UMEMOTO ip6_copypktopts(src, canwait) 188233841545SHajimu UMEMOTO struct ip6_pktopts *src; 188333841545SHajimu UMEMOTO int canwait; 188433841545SHajimu UMEMOTO { 188533841545SHajimu UMEMOTO struct ip6_pktopts *dst; 188633841545SHajimu UMEMOTO 188733841545SHajimu UMEMOTO if (src == NULL) { 188833841545SHajimu UMEMOTO printf("ip6_clearpktopts: invalid argument\n"); 188933841545SHajimu UMEMOTO return (NULL); 189033841545SHajimu UMEMOTO } 189133841545SHajimu UMEMOTO 189233841545SHajimu UMEMOTO dst = malloc(sizeof(*dst), M_IP6OPT, canwait); 189333841545SHajimu UMEMOTO if (dst == NULL && canwait == M_NOWAIT) 189435f6695bSHajimu UMEMOTO return (NULL); 189533841545SHajimu UMEMOTO bzero(dst, sizeof(*dst)); 189633841545SHajimu UMEMOTO 189733841545SHajimu UMEMOTO dst->ip6po_hlim = src->ip6po_hlim; 189833841545SHajimu UMEMOTO if (src->ip6po_pktinfo) { 189933841545SHajimu UMEMOTO dst->ip6po_pktinfo = malloc(sizeof(*dst->ip6po_pktinfo), 190033841545SHajimu UMEMOTO M_IP6OPT, canwait); 190133841545SHajimu UMEMOTO if (dst->ip6po_pktinfo == NULL && canwait == M_NOWAIT) 190233841545SHajimu UMEMOTO goto bad; 190333841545SHajimu UMEMOTO *dst->ip6po_pktinfo = *src->ip6po_pktinfo; 190433841545SHajimu UMEMOTO } 190533841545SHajimu UMEMOTO if (src->ip6po_nexthop) { 190633841545SHajimu UMEMOTO dst->ip6po_nexthop = malloc(src->ip6po_nexthop->sa_len, 190733841545SHajimu UMEMOTO M_IP6OPT, canwait); 190833841545SHajimu UMEMOTO if (dst->ip6po_nexthop == NULL && canwait == M_NOWAIT) 190933841545SHajimu UMEMOTO goto bad; 191033841545SHajimu UMEMOTO bcopy(src->ip6po_nexthop, dst->ip6po_nexthop, 191133841545SHajimu UMEMOTO src->ip6po_nexthop->sa_len); 191233841545SHajimu UMEMOTO } 191333841545SHajimu UMEMOTO PKTOPT_EXTHDRCPY(ip6po_hbh); 191433841545SHajimu UMEMOTO PKTOPT_EXTHDRCPY(ip6po_dest1); 191533841545SHajimu UMEMOTO PKTOPT_EXTHDRCPY(ip6po_dest2); 191633841545SHajimu UMEMOTO PKTOPT_EXTHDRCPY(ip6po_rthdr); /* not copy the cached route */ 191733841545SHajimu UMEMOTO return (dst); 191833841545SHajimu UMEMOTO 191933841545SHajimu UMEMOTO bad: 192033841545SHajimu UMEMOTO if (dst->ip6po_pktinfo) free(dst->ip6po_pktinfo, M_IP6OPT); 192133841545SHajimu UMEMOTO if (dst->ip6po_nexthop) free(dst->ip6po_nexthop, M_IP6OPT); 192233841545SHajimu UMEMOTO if (dst->ip6po_hbh) free(dst->ip6po_hbh, M_IP6OPT); 192333841545SHajimu UMEMOTO if (dst->ip6po_dest1) free(dst->ip6po_dest1, M_IP6OPT); 192433841545SHajimu UMEMOTO if (dst->ip6po_dest2) free(dst->ip6po_dest2, M_IP6OPT); 192533841545SHajimu UMEMOTO if (dst->ip6po_rthdr) free(dst->ip6po_rthdr, M_IP6OPT); 192635f6695bSHajimu UMEMOTO free(dst, M_IP6OPT); 192733841545SHajimu UMEMOTO return (NULL); 192833841545SHajimu UMEMOTO } 192933841545SHajimu UMEMOTO #undef PKTOPT_EXTHDRCPY 193033841545SHajimu UMEMOTO 193133841545SHajimu UMEMOTO void 193233841545SHajimu UMEMOTO ip6_freepcbopts(pktopt) 193333841545SHajimu UMEMOTO struct ip6_pktopts *pktopt; 193433841545SHajimu UMEMOTO { 193533841545SHajimu UMEMOTO if (pktopt == NULL) 193633841545SHajimu UMEMOTO return; 193733841545SHajimu UMEMOTO 193833841545SHajimu UMEMOTO ip6_clearpktopts(pktopt, 1, -1); 193933841545SHajimu UMEMOTO 194033841545SHajimu UMEMOTO free(pktopt, M_IP6OPT); 194133841545SHajimu UMEMOTO } 194233841545SHajimu UMEMOTO 194333841545SHajimu UMEMOTO /* 194482cd038dSYoshinobu Inoue * Set the IP6 multicast options in response to user setsockopt(). 194582cd038dSYoshinobu Inoue */ 194682cd038dSYoshinobu Inoue static int 194782cd038dSYoshinobu Inoue ip6_setmoptions(optname, im6op, m) 194882cd038dSYoshinobu Inoue int optname; 194982cd038dSYoshinobu Inoue struct ip6_moptions **im6op; 195082cd038dSYoshinobu Inoue struct mbuf *m; 195182cd038dSYoshinobu Inoue { 195282cd038dSYoshinobu Inoue int error = 0; 195382cd038dSYoshinobu Inoue u_int loop, ifindex; 195482cd038dSYoshinobu Inoue struct ipv6_mreq *mreq; 195582cd038dSYoshinobu Inoue struct ifnet *ifp; 195682cd038dSYoshinobu Inoue struct ip6_moptions *im6o = *im6op; 195782cd038dSYoshinobu Inoue struct route_in6 ro; 195882cd038dSYoshinobu Inoue struct sockaddr_in6 *dst; 195982cd038dSYoshinobu Inoue struct in6_multi_mship *imm; 19607efe5d92SHajimu UMEMOTO struct thread *td = curthread; 196182cd038dSYoshinobu Inoue 196282cd038dSYoshinobu Inoue if (im6o == NULL) { 196382cd038dSYoshinobu Inoue /* 196482cd038dSYoshinobu Inoue * No multicast option buffer attached to the pcb; 196582cd038dSYoshinobu Inoue * allocate one and initialize to default values. 196682cd038dSYoshinobu Inoue */ 196782cd038dSYoshinobu Inoue im6o = (struct ip6_moptions *) 1968a163d034SWarner Losh malloc(sizeof(*im6o), M_IPMOPTS, M_WAITOK); 196982cd038dSYoshinobu Inoue 197082cd038dSYoshinobu Inoue if (im6o == NULL) 197182cd038dSYoshinobu Inoue return (ENOBUFS); 197282cd038dSYoshinobu Inoue *im6op = im6o; 197382cd038dSYoshinobu Inoue im6o->im6o_multicast_ifp = NULL; 197482cd038dSYoshinobu Inoue im6o->im6o_multicast_hlim = ip6_defmcasthlim; 197582cd038dSYoshinobu Inoue im6o->im6o_multicast_loop = IPV6_DEFAULT_MULTICAST_LOOP; 197682cd038dSYoshinobu Inoue LIST_INIT(&im6o->im6o_memberships); 197782cd038dSYoshinobu Inoue } 197882cd038dSYoshinobu Inoue 197982cd038dSYoshinobu Inoue switch (optname) { 198082cd038dSYoshinobu Inoue 198182cd038dSYoshinobu Inoue case IPV6_MULTICAST_IF: 198282cd038dSYoshinobu Inoue /* 198382cd038dSYoshinobu Inoue * Select the interface for outgoing multicast packets. 198482cd038dSYoshinobu Inoue */ 198582cd038dSYoshinobu Inoue if (m == NULL || m->m_len != sizeof(u_int)) { 198682cd038dSYoshinobu Inoue error = EINVAL; 198782cd038dSYoshinobu Inoue break; 198882cd038dSYoshinobu Inoue } 198933841545SHajimu UMEMOTO bcopy(mtod(m, u_int *), &ifindex, sizeof(ifindex)); 199082cd038dSYoshinobu Inoue if (ifindex < 0 || if_index < ifindex) { 199182cd038dSYoshinobu Inoue error = ENXIO; /* XXX EINVAL? */ 199282cd038dSYoshinobu Inoue break; 199382cd038dSYoshinobu Inoue } 1994f9132cebSJonathan Lemon ifp = ifnet_byindex(ifindex); 199582cd038dSYoshinobu Inoue if (ifp == NULL || (ifp->if_flags & IFF_MULTICAST) == 0) { 199682cd038dSYoshinobu Inoue error = EADDRNOTAVAIL; 199782cd038dSYoshinobu Inoue break; 199882cd038dSYoshinobu Inoue } 199982cd038dSYoshinobu Inoue im6o->im6o_multicast_ifp = ifp; 200082cd038dSYoshinobu Inoue break; 200182cd038dSYoshinobu Inoue 200282cd038dSYoshinobu Inoue case IPV6_MULTICAST_HOPS: 200382cd038dSYoshinobu Inoue { 200482cd038dSYoshinobu Inoue /* 200582cd038dSYoshinobu Inoue * Set the IP6 hoplimit for outgoing multicast packets. 200682cd038dSYoshinobu Inoue */ 200782cd038dSYoshinobu Inoue int optval; 200882cd038dSYoshinobu Inoue if (m == NULL || m->m_len != sizeof(int)) { 200982cd038dSYoshinobu Inoue error = EINVAL; 201082cd038dSYoshinobu Inoue break; 201182cd038dSYoshinobu Inoue } 201233841545SHajimu UMEMOTO bcopy(mtod(m, u_int *), &optval, sizeof(optval)); 201382cd038dSYoshinobu Inoue if (optval < -1 || optval >= 256) 201482cd038dSYoshinobu Inoue error = EINVAL; 201582cd038dSYoshinobu Inoue else if (optval == -1) 201682cd038dSYoshinobu Inoue im6o->im6o_multicast_hlim = ip6_defmcasthlim; 201782cd038dSYoshinobu Inoue else 201882cd038dSYoshinobu Inoue im6o->im6o_multicast_hlim = optval; 201982cd038dSYoshinobu Inoue break; 202082cd038dSYoshinobu Inoue } 202182cd038dSYoshinobu Inoue 202282cd038dSYoshinobu Inoue case IPV6_MULTICAST_LOOP: 202382cd038dSYoshinobu Inoue /* 202482cd038dSYoshinobu Inoue * Set the loopback flag for outgoing multicast packets. 202582cd038dSYoshinobu Inoue * Must be zero or one. 202682cd038dSYoshinobu Inoue */ 202733841545SHajimu UMEMOTO if (m == NULL || m->m_len != sizeof(u_int)) { 202833841545SHajimu UMEMOTO error = EINVAL; 202933841545SHajimu UMEMOTO break; 203033841545SHajimu UMEMOTO } 203133841545SHajimu UMEMOTO bcopy(mtod(m, u_int *), &loop, sizeof(loop)); 203233841545SHajimu UMEMOTO if (loop > 1) { 203382cd038dSYoshinobu Inoue error = EINVAL; 203482cd038dSYoshinobu Inoue break; 203582cd038dSYoshinobu Inoue } 203682cd038dSYoshinobu Inoue im6o->im6o_multicast_loop = loop; 203782cd038dSYoshinobu Inoue break; 203882cd038dSYoshinobu Inoue 203982cd038dSYoshinobu Inoue case IPV6_JOIN_GROUP: 204082cd038dSYoshinobu Inoue /* 204182cd038dSYoshinobu Inoue * Add a multicast group membership. 204282cd038dSYoshinobu Inoue * Group must be a valid IP6 multicast address. 204382cd038dSYoshinobu Inoue */ 204482cd038dSYoshinobu Inoue if (m == NULL || m->m_len != sizeof(struct ipv6_mreq)) { 204582cd038dSYoshinobu Inoue error = EINVAL; 204682cd038dSYoshinobu Inoue break; 204782cd038dSYoshinobu Inoue } 204882cd038dSYoshinobu Inoue mreq = mtod(m, struct ipv6_mreq *); 204982cd038dSYoshinobu Inoue if (IN6_IS_ADDR_UNSPECIFIED(&mreq->ipv6mr_multiaddr)) { 205082cd038dSYoshinobu Inoue /* 205182cd038dSYoshinobu Inoue * We use the unspecified address to specify to accept 205282cd038dSYoshinobu Inoue * all multicast addresses. Only super user is allowed 205382cd038dSYoshinobu Inoue * to do this. 205482cd038dSYoshinobu Inoue */ 20557efe5d92SHajimu UMEMOTO if (suser(td)) { 205682cd038dSYoshinobu Inoue error = EACCES; 205782cd038dSYoshinobu Inoue break; 205882cd038dSYoshinobu Inoue } 205982cd038dSYoshinobu Inoue } else if (!IN6_IS_ADDR_MULTICAST(&mreq->ipv6mr_multiaddr)) { 206082cd038dSYoshinobu Inoue error = EINVAL; 206182cd038dSYoshinobu Inoue break; 206282cd038dSYoshinobu Inoue } 206382cd038dSYoshinobu Inoue 206482cd038dSYoshinobu Inoue /* 206582cd038dSYoshinobu Inoue * If the interface is specified, validate it. 206682cd038dSYoshinobu Inoue */ 206782cd038dSYoshinobu Inoue if (mreq->ipv6mr_interface < 0 206882cd038dSYoshinobu Inoue || if_index < mreq->ipv6mr_interface) { 206982cd038dSYoshinobu Inoue error = ENXIO; /* XXX EINVAL? */ 207082cd038dSYoshinobu Inoue break; 207182cd038dSYoshinobu Inoue } 207282cd038dSYoshinobu Inoue /* 207382cd038dSYoshinobu Inoue * If no interface was explicitly specified, choose an 207482cd038dSYoshinobu Inoue * appropriate one according to the given multicast address. 207582cd038dSYoshinobu Inoue */ 207682cd038dSYoshinobu Inoue if (mreq->ipv6mr_interface == 0) { 207782cd038dSYoshinobu Inoue /* 207882cd038dSYoshinobu Inoue * If the multicast address is in node-local scope, 207982cd038dSYoshinobu Inoue * the interface should be a loopback interface. 208082cd038dSYoshinobu Inoue * Otherwise, look up the routing table for the 208182cd038dSYoshinobu Inoue * address, and choose the outgoing interface. 208282cd038dSYoshinobu Inoue * XXX: is it a good approach? 208382cd038dSYoshinobu Inoue */ 208482cd038dSYoshinobu Inoue if (IN6_IS_ADDR_MC_NODELOCAL(&mreq->ipv6mr_multiaddr)) { 208582cd038dSYoshinobu Inoue ifp = &loif[0]; 208682cd038dSYoshinobu Inoue } else { 208782cd038dSYoshinobu Inoue ro.ro_rt = NULL; 208882cd038dSYoshinobu Inoue dst = (struct sockaddr_in6 *)&ro.ro_dst; 208982cd038dSYoshinobu Inoue bzero(dst, sizeof(*dst)); 209082cd038dSYoshinobu Inoue dst->sin6_len = sizeof(struct sockaddr_in6); 209182cd038dSYoshinobu Inoue dst->sin6_family = AF_INET6; 209282cd038dSYoshinobu Inoue dst->sin6_addr = mreq->ipv6mr_multiaddr; 209382cd038dSYoshinobu Inoue rtalloc((struct route *)&ro); 209482cd038dSYoshinobu Inoue if (ro.ro_rt == NULL) { 209582cd038dSYoshinobu Inoue error = EADDRNOTAVAIL; 209682cd038dSYoshinobu Inoue break; 209782cd038dSYoshinobu Inoue } 209882cd038dSYoshinobu Inoue ifp = ro.ro_rt->rt_ifp; 2099d1dd20beSSam Leffler RTFREE(ro.ro_rt); 210082cd038dSYoshinobu Inoue } 210182cd038dSYoshinobu Inoue } else 2102f9132cebSJonathan Lemon ifp = ifnet_byindex(mreq->ipv6mr_interface); 210382cd038dSYoshinobu Inoue 210482cd038dSYoshinobu Inoue /* 210582cd038dSYoshinobu Inoue * See if we found an interface, and confirm that it 210682cd038dSYoshinobu Inoue * supports multicast 210782cd038dSYoshinobu Inoue */ 210882cd038dSYoshinobu Inoue if (ifp == NULL || (ifp->if_flags & IFF_MULTICAST) == 0) { 210982cd038dSYoshinobu Inoue error = EADDRNOTAVAIL; 211082cd038dSYoshinobu Inoue break; 211182cd038dSYoshinobu Inoue } 211282cd038dSYoshinobu Inoue /* 211382cd038dSYoshinobu Inoue * Put interface index into the multicast address, 211482cd038dSYoshinobu Inoue * if the address has link-local scope. 211582cd038dSYoshinobu Inoue */ 211682cd038dSYoshinobu Inoue if (IN6_IS_ADDR_MC_LINKLOCAL(&mreq->ipv6mr_multiaddr)) { 211782cd038dSYoshinobu Inoue mreq->ipv6mr_multiaddr.s6_addr16[1] 211882cd038dSYoshinobu Inoue = htons(mreq->ipv6mr_interface); 211982cd038dSYoshinobu Inoue } 212082cd038dSYoshinobu Inoue /* 212182cd038dSYoshinobu Inoue * See if the membership already exists. 212282cd038dSYoshinobu Inoue */ 2123686cdd19SJun-ichiro itojun Hagino for (imm = im6o->im6o_memberships.lh_first; 2124686cdd19SJun-ichiro itojun Hagino imm != NULL; imm = imm->i6mm_chain.le_next) 212582cd038dSYoshinobu Inoue if (imm->i6mm_maddr->in6m_ifp == ifp && 212682cd038dSYoshinobu Inoue IN6_ARE_ADDR_EQUAL(&imm->i6mm_maddr->in6m_addr, 212782cd038dSYoshinobu Inoue &mreq->ipv6mr_multiaddr)) 212882cd038dSYoshinobu Inoue break; 212982cd038dSYoshinobu Inoue if (imm != NULL) { 213082cd038dSYoshinobu Inoue error = EADDRINUSE; 213182cd038dSYoshinobu Inoue break; 213282cd038dSYoshinobu Inoue } 213382cd038dSYoshinobu Inoue /* 213482cd038dSYoshinobu Inoue * Everything looks good; add a new record to the multicast 213582cd038dSYoshinobu Inoue * address list for the given interface. 213682cd038dSYoshinobu Inoue */ 2137a163d034SWarner Losh imm = malloc(sizeof(*imm), M_IPMADDR, M_WAITOK); 213882cd038dSYoshinobu Inoue if (imm == NULL) { 213982cd038dSYoshinobu Inoue error = ENOBUFS; 214082cd038dSYoshinobu Inoue break; 214182cd038dSYoshinobu Inoue } 214282cd038dSYoshinobu Inoue if ((imm->i6mm_maddr = 214382cd038dSYoshinobu Inoue in6_addmulti(&mreq->ipv6mr_multiaddr, ifp, &error)) == NULL) { 214482cd038dSYoshinobu Inoue free(imm, M_IPMADDR); 214582cd038dSYoshinobu Inoue break; 214682cd038dSYoshinobu Inoue } 214782cd038dSYoshinobu Inoue LIST_INSERT_HEAD(&im6o->im6o_memberships, imm, i6mm_chain); 214882cd038dSYoshinobu Inoue break; 214982cd038dSYoshinobu Inoue 215082cd038dSYoshinobu Inoue case IPV6_LEAVE_GROUP: 215182cd038dSYoshinobu Inoue /* 215282cd038dSYoshinobu Inoue * Drop a multicast group membership. 215382cd038dSYoshinobu Inoue * Group must be a valid IP6 multicast address. 215482cd038dSYoshinobu Inoue */ 215582cd038dSYoshinobu Inoue if (m == NULL || m->m_len != sizeof(struct ipv6_mreq)) { 215682cd038dSYoshinobu Inoue error = EINVAL; 215782cd038dSYoshinobu Inoue break; 215882cd038dSYoshinobu Inoue } 215982cd038dSYoshinobu Inoue mreq = mtod(m, struct ipv6_mreq *); 216082cd038dSYoshinobu Inoue if (IN6_IS_ADDR_UNSPECIFIED(&mreq->ipv6mr_multiaddr)) { 216144731cabSJohn Baldwin if (suser(td)) { 216282cd038dSYoshinobu Inoue error = EACCES; 216382cd038dSYoshinobu Inoue break; 216482cd038dSYoshinobu Inoue } 216582cd038dSYoshinobu Inoue } else if (!IN6_IS_ADDR_MULTICAST(&mreq->ipv6mr_multiaddr)) { 216682cd038dSYoshinobu Inoue error = EINVAL; 216782cd038dSYoshinobu Inoue break; 216882cd038dSYoshinobu Inoue } 216982cd038dSYoshinobu Inoue /* 217082cd038dSYoshinobu Inoue * If an interface address was specified, get a pointer 217182cd038dSYoshinobu Inoue * to its ifnet structure. 217282cd038dSYoshinobu Inoue */ 217382cd038dSYoshinobu Inoue if (mreq->ipv6mr_interface < 0 217482cd038dSYoshinobu Inoue || if_index < mreq->ipv6mr_interface) { 217582cd038dSYoshinobu Inoue error = ENXIO; /* XXX EINVAL? */ 217682cd038dSYoshinobu Inoue break; 217782cd038dSYoshinobu Inoue } 2178f9132cebSJonathan Lemon ifp = ifnet_byindex(mreq->ipv6mr_interface); 217982cd038dSYoshinobu Inoue /* 218082cd038dSYoshinobu Inoue * Put interface index into the multicast address, 218182cd038dSYoshinobu Inoue * if the address has link-local scope. 218282cd038dSYoshinobu Inoue */ 218382cd038dSYoshinobu Inoue if (IN6_IS_ADDR_MC_LINKLOCAL(&mreq->ipv6mr_multiaddr)) { 218482cd038dSYoshinobu Inoue mreq->ipv6mr_multiaddr.s6_addr16[1] 218582cd038dSYoshinobu Inoue = htons(mreq->ipv6mr_interface); 218682cd038dSYoshinobu Inoue } 21877efe5d92SHajimu UMEMOTO 218882cd038dSYoshinobu Inoue /* 218982cd038dSYoshinobu Inoue * Find the membership in the membership list. 219082cd038dSYoshinobu Inoue */ 2191686cdd19SJun-ichiro itojun Hagino for (imm = im6o->im6o_memberships.lh_first; 2192686cdd19SJun-ichiro itojun Hagino imm != NULL; imm = imm->i6mm_chain.le_next) { 21937efe5d92SHajimu UMEMOTO if ((ifp == NULL || imm->i6mm_maddr->in6m_ifp == ifp) && 219482cd038dSYoshinobu Inoue IN6_ARE_ADDR_EQUAL(&imm->i6mm_maddr->in6m_addr, 219582cd038dSYoshinobu Inoue &mreq->ipv6mr_multiaddr)) 219682cd038dSYoshinobu Inoue break; 219782cd038dSYoshinobu Inoue } 219882cd038dSYoshinobu Inoue if (imm == NULL) { 219982cd038dSYoshinobu Inoue /* Unable to resolve interface */ 220082cd038dSYoshinobu Inoue error = EADDRNOTAVAIL; 220182cd038dSYoshinobu Inoue break; 220282cd038dSYoshinobu Inoue } 220382cd038dSYoshinobu Inoue /* 220482cd038dSYoshinobu Inoue * Give up the multicast address record to which the 220582cd038dSYoshinobu Inoue * membership points. 220682cd038dSYoshinobu Inoue */ 220782cd038dSYoshinobu Inoue LIST_REMOVE(imm, i6mm_chain); 220882cd038dSYoshinobu Inoue in6_delmulti(imm->i6mm_maddr); 220982cd038dSYoshinobu Inoue free(imm, M_IPMADDR); 221082cd038dSYoshinobu Inoue break; 221182cd038dSYoshinobu Inoue 221282cd038dSYoshinobu Inoue default: 221382cd038dSYoshinobu Inoue error = EOPNOTSUPP; 221482cd038dSYoshinobu Inoue break; 221582cd038dSYoshinobu Inoue } 221682cd038dSYoshinobu Inoue 221782cd038dSYoshinobu Inoue /* 221882cd038dSYoshinobu Inoue * If all options have default values, no need to keep the mbuf. 221982cd038dSYoshinobu Inoue */ 222082cd038dSYoshinobu Inoue if (im6o->im6o_multicast_ifp == NULL && 222182cd038dSYoshinobu Inoue im6o->im6o_multicast_hlim == ip6_defmcasthlim && 222282cd038dSYoshinobu Inoue im6o->im6o_multicast_loop == IPV6_DEFAULT_MULTICAST_LOOP && 2223686cdd19SJun-ichiro itojun Hagino im6o->im6o_memberships.lh_first == NULL) { 222482cd038dSYoshinobu Inoue free(*im6op, M_IPMOPTS); 222582cd038dSYoshinobu Inoue *im6op = NULL; 222682cd038dSYoshinobu Inoue } 222782cd038dSYoshinobu Inoue 222882cd038dSYoshinobu Inoue return (error); 222982cd038dSYoshinobu Inoue } 223082cd038dSYoshinobu Inoue 223182cd038dSYoshinobu Inoue /* 223282cd038dSYoshinobu Inoue * Return the IP6 multicast options in response to user getsockopt(). 223382cd038dSYoshinobu Inoue */ 223482cd038dSYoshinobu Inoue static int 223582cd038dSYoshinobu Inoue ip6_getmoptions(optname, im6o, mp) 223682cd038dSYoshinobu Inoue int optname; 223733841545SHajimu UMEMOTO struct ip6_moptions *im6o; 223833841545SHajimu UMEMOTO struct mbuf **mp; 223982cd038dSYoshinobu Inoue { 224082cd038dSYoshinobu Inoue u_int *hlim, *loop, *ifindex; 224182cd038dSYoshinobu Inoue 2242a163d034SWarner Losh *mp = m_get(M_TRYWAIT, MT_HEADER); /* XXX */ 224382cd038dSYoshinobu Inoue 224482cd038dSYoshinobu Inoue switch (optname) { 224582cd038dSYoshinobu Inoue 224682cd038dSYoshinobu Inoue case IPV6_MULTICAST_IF: 224782cd038dSYoshinobu Inoue ifindex = mtod(*mp, u_int *); 224882cd038dSYoshinobu Inoue (*mp)->m_len = sizeof(u_int); 224982cd038dSYoshinobu Inoue if (im6o == NULL || im6o->im6o_multicast_ifp == NULL) 225082cd038dSYoshinobu Inoue *ifindex = 0; 225182cd038dSYoshinobu Inoue else 225282cd038dSYoshinobu Inoue *ifindex = im6o->im6o_multicast_ifp->if_index; 225382cd038dSYoshinobu Inoue return (0); 225482cd038dSYoshinobu Inoue 225582cd038dSYoshinobu Inoue case IPV6_MULTICAST_HOPS: 225682cd038dSYoshinobu Inoue hlim = mtod(*mp, u_int *); 225782cd038dSYoshinobu Inoue (*mp)->m_len = sizeof(u_int); 225882cd038dSYoshinobu Inoue if (im6o == NULL) 225982cd038dSYoshinobu Inoue *hlim = ip6_defmcasthlim; 226082cd038dSYoshinobu Inoue else 226182cd038dSYoshinobu Inoue *hlim = im6o->im6o_multicast_hlim; 226282cd038dSYoshinobu Inoue return (0); 226382cd038dSYoshinobu Inoue 226482cd038dSYoshinobu Inoue case IPV6_MULTICAST_LOOP: 226582cd038dSYoshinobu Inoue loop = mtod(*mp, u_int *); 226682cd038dSYoshinobu Inoue (*mp)->m_len = sizeof(u_int); 226782cd038dSYoshinobu Inoue if (im6o == NULL) 226882cd038dSYoshinobu Inoue *loop = ip6_defmcasthlim; 226982cd038dSYoshinobu Inoue else 227082cd038dSYoshinobu Inoue *loop = im6o->im6o_multicast_loop; 227182cd038dSYoshinobu Inoue return (0); 227282cd038dSYoshinobu Inoue 227382cd038dSYoshinobu Inoue default: 227482cd038dSYoshinobu Inoue return (EOPNOTSUPP); 227582cd038dSYoshinobu Inoue } 227682cd038dSYoshinobu Inoue } 227782cd038dSYoshinobu Inoue 227882cd038dSYoshinobu Inoue /* 227982cd038dSYoshinobu Inoue * Discard the IP6 multicast options. 228082cd038dSYoshinobu Inoue */ 228182cd038dSYoshinobu Inoue void 228282cd038dSYoshinobu Inoue ip6_freemoptions(im6o) 228333841545SHajimu UMEMOTO struct ip6_moptions *im6o; 228482cd038dSYoshinobu Inoue { 228582cd038dSYoshinobu Inoue struct in6_multi_mship *imm; 228682cd038dSYoshinobu Inoue 228782cd038dSYoshinobu Inoue if (im6o == NULL) 228882cd038dSYoshinobu Inoue return; 228982cd038dSYoshinobu Inoue 2290686cdd19SJun-ichiro itojun Hagino while ((imm = im6o->im6o_memberships.lh_first) != NULL) { 229182cd038dSYoshinobu Inoue LIST_REMOVE(imm, i6mm_chain); 229282cd038dSYoshinobu Inoue if (imm->i6mm_maddr) 229382cd038dSYoshinobu Inoue in6_delmulti(imm->i6mm_maddr); 229482cd038dSYoshinobu Inoue free(imm, M_IPMADDR); 229582cd038dSYoshinobu Inoue } 229682cd038dSYoshinobu Inoue free(im6o, M_IPMOPTS); 229782cd038dSYoshinobu Inoue } 229882cd038dSYoshinobu Inoue 229982cd038dSYoshinobu Inoue /* 230082cd038dSYoshinobu Inoue * Set IPv6 outgoing packet options based on advanced API. 230182cd038dSYoshinobu Inoue */ 230282cd038dSYoshinobu Inoue int 230333841545SHajimu UMEMOTO ip6_setpktoptions(control, opt, priv, needcopy) 230482cd038dSYoshinobu Inoue struct mbuf *control; 230582cd038dSYoshinobu Inoue struct ip6_pktopts *opt; 230633841545SHajimu UMEMOTO int priv, needcopy; 230782cd038dSYoshinobu Inoue { 230833841545SHajimu UMEMOTO struct cmsghdr *cm = 0; 230982cd038dSYoshinobu Inoue 231082cd038dSYoshinobu Inoue if (control == 0 || opt == 0) 231182cd038dSYoshinobu Inoue return (EINVAL); 231282cd038dSYoshinobu Inoue 231333841545SHajimu UMEMOTO init_ip6pktopts(opt); 231482cd038dSYoshinobu Inoue 231582cd038dSYoshinobu Inoue /* 231682cd038dSYoshinobu Inoue * XXX: Currently, we assume all the optional information is stored 231782cd038dSYoshinobu Inoue * in a single mbuf. 231882cd038dSYoshinobu Inoue */ 231982cd038dSYoshinobu Inoue if (control->m_next) 232082cd038dSYoshinobu Inoue return (EINVAL); 232182cd038dSYoshinobu Inoue 232233841545SHajimu UMEMOTO for (; control->m_len; control->m_data += CMSG_ALIGN(cm->cmsg_len), 232333841545SHajimu UMEMOTO control->m_len -= CMSG_ALIGN(cm->cmsg_len)) { 232482cd038dSYoshinobu Inoue cm = mtod(control, struct cmsghdr *); 232582cd038dSYoshinobu Inoue if (cm->cmsg_len == 0 || cm->cmsg_len > control->m_len) 232682cd038dSYoshinobu Inoue return (EINVAL); 232782cd038dSYoshinobu Inoue if (cm->cmsg_level != IPPROTO_IPV6) 232882cd038dSYoshinobu Inoue continue; 232982cd038dSYoshinobu Inoue 233033841545SHajimu UMEMOTO /* 233133841545SHajimu UMEMOTO * XXX should check if RFC2292 API is mixed with 2292bis API 233233841545SHajimu UMEMOTO */ 233382cd038dSYoshinobu Inoue switch (cm->cmsg_type) { 233482cd038dSYoshinobu Inoue case IPV6_PKTINFO: 233582cd038dSYoshinobu Inoue if (cm->cmsg_len != CMSG_LEN(sizeof(struct in6_pktinfo))) 233682cd038dSYoshinobu Inoue return (EINVAL); 233733841545SHajimu UMEMOTO if (needcopy) { 233833841545SHajimu UMEMOTO /* XXX: Is it really WAITOK? */ 233933841545SHajimu UMEMOTO opt->ip6po_pktinfo = 234033841545SHajimu UMEMOTO malloc(sizeof(struct in6_pktinfo), 2341a163d034SWarner Losh M_IP6OPT, M_WAITOK); 234233841545SHajimu UMEMOTO bcopy(CMSG_DATA(cm), opt->ip6po_pktinfo, 234333841545SHajimu UMEMOTO sizeof(struct in6_pktinfo)); 234433841545SHajimu UMEMOTO } else 234533841545SHajimu UMEMOTO opt->ip6po_pktinfo = 234633841545SHajimu UMEMOTO (struct in6_pktinfo *)CMSG_DATA(cm); 234782cd038dSYoshinobu Inoue if (opt->ip6po_pktinfo->ipi6_ifindex && 234882cd038dSYoshinobu Inoue IN6_IS_ADDR_LINKLOCAL(&opt->ip6po_pktinfo->ipi6_addr)) 234982cd038dSYoshinobu Inoue opt->ip6po_pktinfo->ipi6_addr.s6_addr16[1] = 235082cd038dSYoshinobu Inoue htons(opt->ip6po_pktinfo->ipi6_ifindex); 235182cd038dSYoshinobu Inoue 235282cd038dSYoshinobu Inoue if (opt->ip6po_pktinfo->ipi6_ifindex > if_index 235382cd038dSYoshinobu Inoue || opt->ip6po_pktinfo->ipi6_ifindex < 0) { 235482cd038dSYoshinobu Inoue return (ENXIO); 235582cd038dSYoshinobu Inoue } 235682cd038dSYoshinobu Inoue 235733841545SHajimu UMEMOTO /* 235833841545SHajimu UMEMOTO * Check if the requested source address is indeed a 235933841545SHajimu UMEMOTO * unicast address assigned to the node, and can be 236033841545SHajimu UMEMOTO * used as the packet's source address. 236133841545SHajimu UMEMOTO */ 236282cd038dSYoshinobu Inoue if (!IN6_IS_ADDR_UNSPECIFIED(&opt->ip6po_pktinfo->ipi6_addr)) { 236333841545SHajimu UMEMOTO struct in6_ifaddr *ia6; 236482cd038dSYoshinobu Inoue struct sockaddr_in6 sin6; 236582cd038dSYoshinobu Inoue 236682cd038dSYoshinobu Inoue bzero(&sin6, sizeof(sin6)); 236782cd038dSYoshinobu Inoue sin6.sin6_len = sizeof(sin6); 236882cd038dSYoshinobu Inoue sin6.sin6_family = AF_INET6; 236982cd038dSYoshinobu Inoue sin6.sin6_addr = 237082cd038dSYoshinobu Inoue opt->ip6po_pktinfo->ipi6_addr; 237133841545SHajimu UMEMOTO ia6 = (struct in6_ifaddr *)ifa_ifwithaddr(sin6tosa(&sin6)); 237233841545SHajimu UMEMOTO if (ia6 == NULL || 237333841545SHajimu UMEMOTO (ia6->ia6_flags & (IN6_IFF_ANYCAST | 237433841545SHajimu UMEMOTO IN6_IFF_NOTREADY)) != 0) 237582cd038dSYoshinobu Inoue return (EADDRNOTAVAIL); 237682cd038dSYoshinobu Inoue } 237782cd038dSYoshinobu Inoue break; 237882cd038dSYoshinobu Inoue 237982cd038dSYoshinobu Inoue case IPV6_HOPLIMIT: 238082cd038dSYoshinobu Inoue if (cm->cmsg_len != CMSG_LEN(sizeof(int))) 238182cd038dSYoshinobu Inoue return (EINVAL); 238282cd038dSYoshinobu Inoue 238382cd038dSYoshinobu Inoue opt->ip6po_hlim = *(int *)CMSG_DATA(cm); 238482cd038dSYoshinobu Inoue if (opt->ip6po_hlim < -1 || opt->ip6po_hlim > 255) 238582cd038dSYoshinobu Inoue return (EINVAL); 238682cd038dSYoshinobu Inoue break; 238782cd038dSYoshinobu Inoue 238882cd038dSYoshinobu Inoue case IPV6_NEXTHOP: 238982cd038dSYoshinobu Inoue if (!priv) 239082cd038dSYoshinobu Inoue return (EPERM); 239133841545SHajimu UMEMOTO 239282cd038dSYoshinobu Inoue if (cm->cmsg_len < sizeof(u_char) || 239333841545SHajimu UMEMOTO /* check if cmsg_len is large enough for sa_len */ 239482cd038dSYoshinobu Inoue cm->cmsg_len < CMSG_LEN(*CMSG_DATA(cm))) 239582cd038dSYoshinobu Inoue return (EINVAL); 239682cd038dSYoshinobu Inoue 239733841545SHajimu UMEMOTO if (needcopy) { 239833841545SHajimu UMEMOTO opt->ip6po_nexthop = 239933841545SHajimu UMEMOTO malloc(*CMSG_DATA(cm), 2400a163d034SWarner Losh M_IP6OPT, M_WAITOK); 240133841545SHajimu UMEMOTO bcopy(CMSG_DATA(cm), 240233841545SHajimu UMEMOTO opt->ip6po_nexthop, 240333841545SHajimu UMEMOTO *CMSG_DATA(cm)); 240433841545SHajimu UMEMOTO } else 240533841545SHajimu UMEMOTO opt->ip6po_nexthop = 240633841545SHajimu UMEMOTO (struct sockaddr *)CMSG_DATA(cm); 240782cd038dSYoshinobu Inoue break; 240882cd038dSYoshinobu Inoue 240982cd038dSYoshinobu Inoue case IPV6_HOPOPTS: 241033841545SHajimu UMEMOTO { 241133841545SHajimu UMEMOTO struct ip6_hbh *hbh; 241233841545SHajimu UMEMOTO int hbhlen; 241333841545SHajimu UMEMOTO 241482cd038dSYoshinobu Inoue if (cm->cmsg_len < CMSG_LEN(sizeof(struct ip6_hbh))) 241582cd038dSYoshinobu Inoue return (EINVAL); 241633841545SHajimu UMEMOTO hbh = (struct ip6_hbh *)CMSG_DATA(cm); 241733841545SHajimu UMEMOTO hbhlen = (hbh->ip6h_len + 1) << 3; 241833841545SHajimu UMEMOTO if (cm->cmsg_len != CMSG_LEN(hbhlen)) 241982cd038dSYoshinobu Inoue return (EINVAL); 242033841545SHajimu UMEMOTO 242133841545SHajimu UMEMOTO if (needcopy) { 242233841545SHajimu UMEMOTO opt->ip6po_hbh = 2423a163d034SWarner Losh malloc(hbhlen, M_IP6OPT, M_WAITOK); 242433841545SHajimu UMEMOTO bcopy(hbh, opt->ip6po_hbh, hbhlen); 242533841545SHajimu UMEMOTO } else 242633841545SHajimu UMEMOTO opt->ip6po_hbh = hbh; 242782cd038dSYoshinobu Inoue break; 242833841545SHajimu UMEMOTO } 242982cd038dSYoshinobu Inoue 243082cd038dSYoshinobu Inoue case IPV6_DSTOPTS: 243133841545SHajimu UMEMOTO { 243233841545SHajimu UMEMOTO struct ip6_dest *dest, **newdest; 243333841545SHajimu UMEMOTO int destlen; 243433841545SHajimu UMEMOTO 243582cd038dSYoshinobu Inoue if (cm->cmsg_len < CMSG_LEN(sizeof(struct ip6_dest))) 243682cd038dSYoshinobu Inoue return (EINVAL); 243733841545SHajimu UMEMOTO dest = (struct ip6_dest *)CMSG_DATA(cm); 243833841545SHajimu UMEMOTO destlen = (dest->ip6d_len + 1) << 3; 243933841545SHajimu UMEMOTO if (cm->cmsg_len != CMSG_LEN(destlen)) 244033841545SHajimu UMEMOTO return (EINVAL); 244182cd038dSYoshinobu Inoue 244282cd038dSYoshinobu Inoue /* 244333841545SHajimu UMEMOTO * The old advacned API is ambiguous on this 244433841545SHajimu UMEMOTO * point. Our approach is to determine the 244533841545SHajimu UMEMOTO * position based according to the existence 244633841545SHajimu UMEMOTO * of a routing header. Note, however, that 244733841545SHajimu UMEMOTO * this depends on the order of the extension 244833841545SHajimu UMEMOTO * headers in the ancillary data; the 1st part 244933841545SHajimu UMEMOTO * of the destination options header must 245033841545SHajimu UMEMOTO * appear before the routing header in the 245133841545SHajimu UMEMOTO * ancillary data, too. 245233841545SHajimu UMEMOTO * RFC2292bis solved the ambiguity by 245333841545SHajimu UMEMOTO * introducing separate cmsg types. 245482cd038dSYoshinobu Inoue */ 245533841545SHajimu UMEMOTO if (opt->ip6po_rthdr == NULL) 245633841545SHajimu UMEMOTO newdest = &opt->ip6po_dest1; 245733841545SHajimu UMEMOTO else 245833841545SHajimu UMEMOTO newdest = &opt->ip6po_dest2; 245933841545SHajimu UMEMOTO 246033841545SHajimu UMEMOTO if (needcopy) { 2461a163d034SWarner Losh *newdest = malloc(destlen, M_IP6OPT, M_WAITOK); 246233841545SHajimu UMEMOTO bcopy(dest, *newdest, destlen); 246333841545SHajimu UMEMOTO } else 246433841545SHajimu UMEMOTO *newdest = dest; 246533841545SHajimu UMEMOTO 246682cd038dSYoshinobu Inoue break; 246733841545SHajimu UMEMOTO } 246882cd038dSYoshinobu Inoue 246982cd038dSYoshinobu Inoue case IPV6_RTHDR: 247033841545SHajimu UMEMOTO { 247133841545SHajimu UMEMOTO struct ip6_rthdr *rth; 247233841545SHajimu UMEMOTO int rthlen; 247333841545SHajimu UMEMOTO 247482cd038dSYoshinobu Inoue if (cm->cmsg_len < CMSG_LEN(sizeof(struct ip6_rthdr))) 247582cd038dSYoshinobu Inoue return (EINVAL); 247633841545SHajimu UMEMOTO rth = (struct ip6_rthdr *)CMSG_DATA(cm); 247733841545SHajimu UMEMOTO rthlen = (rth->ip6r_len + 1) << 3; 247833841545SHajimu UMEMOTO if (cm->cmsg_len != CMSG_LEN(rthlen)) 247982cd038dSYoshinobu Inoue return (EINVAL); 248033841545SHajimu UMEMOTO 248133841545SHajimu UMEMOTO switch (rth->ip6r_type) { 248282cd038dSYoshinobu Inoue case IPV6_RTHDR_TYPE_0: 248333841545SHajimu UMEMOTO /* must contain one addr */ 248433841545SHajimu UMEMOTO if (rth->ip6r_len == 0) 248533841545SHajimu UMEMOTO return (EINVAL); 248633841545SHajimu UMEMOTO /* length must be even */ 248733841545SHajimu UMEMOTO if (rth->ip6r_len % 2) 248833841545SHajimu UMEMOTO return (EINVAL); 248933841545SHajimu UMEMOTO if (rth->ip6r_len / 2 != rth->ip6r_segleft) 249082cd038dSYoshinobu Inoue return (EINVAL); 249182cd038dSYoshinobu Inoue break; 249282cd038dSYoshinobu Inoue default: 249333841545SHajimu UMEMOTO return (EINVAL); /* not supported */ 249482cd038dSYoshinobu Inoue } 249533841545SHajimu UMEMOTO 249633841545SHajimu UMEMOTO if (needcopy) { 249733841545SHajimu UMEMOTO opt->ip6po_rthdr = malloc(rthlen, M_IP6OPT, 2498a163d034SWarner Losh M_WAITOK); 249933841545SHajimu UMEMOTO bcopy(rth, opt->ip6po_rthdr, rthlen); 250033841545SHajimu UMEMOTO } else 250133841545SHajimu UMEMOTO opt->ip6po_rthdr = rth; 250233841545SHajimu UMEMOTO 250382cd038dSYoshinobu Inoue break; 250433841545SHajimu UMEMOTO } 250582cd038dSYoshinobu Inoue 250682cd038dSYoshinobu Inoue default: 250782cd038dSYoshinobu Inoue return (ENOPROTOOPT); 250882cd038dSYoshinobu Inoue } 250982cd038dSYoshinobu Inoue } 251082cd038dSYoshinobu Inoue 251182cd038dSYoshinobu Inoue return (0); 251282cd038dSYoshinobu Inoue } 251382cd038dSYoshinobu Inoue 251482cd038dSYoshinobu Inoue /* 251582cd038dSYoshinobu Inoue * Routine called from ip6_output() to loop back a copy of an IP6 multicast 251682cd038dSYoshinobu Inoue * packet to the input queue of a specified interface. Note that this 251782cd038dSYoshinobu Inoue * calls the output routine of the loopback "driver", but with an interface 251882cd038dSYoshinobu Inoue * pointer that might NOT be &loif -- easier than replicating that code here. 251982cd038dSYoshinobu Inoue */ 252082cd038dSYoshinobu Inoue void 252182cd038dSYoshinobu Inoue ip6_mloopback(ifp, m, dst) 252282cd038dSYoshinobu Inoue struct ifnet *ifp; 252333841545SHajimu UMEMOTO struct mbuf *m; 252433841545SHajimu UMEMOTO struct sockaddr_in6 *dst; 252582cd038dSYoshinobu Inoue { 252682cd038dSYoshinobu Inoue struct mbuf *copym; 2527686cdd19SJun-ichiro itojun Hagino struct ip6_hdr *ip6; 252882cd038dSYoshinobu Inoue 252982cd038dSYoshinobu Inoue copym = m_copy(m, 0, M_COPYALL); 2530686cdd19SJun-ichiro itojun Hagino if (copym == NULL) 2531686cdd19SJun-ichiro itojun Hagino return; 2532686cdd19SJun-ichiro itojun Hagino 2533686cdd19SJun-ichiro itojun Hagino /* 2534686cdd19SJun-ichiro itojun Hagino * Make sure to deep-copy IPv6 header portion in case the data 2535686cdd19SJun-ichiro itojun Hagino * is in an mbuf cluster, so that we can safely override the IPv6 2536686cdd19SJun-ichiro itojun Hagino * header portion later. 2537686cdd19SJun-ichiro itojun Hagino */ 2538686cdd19SJun-ichiro itojun Hagino if ((copym->m_flags & M_EXT) != 0 || 2539686cdd19SJun-ichiro itojun Hagino copym->m_len < sizeof(struct ip6_hdr)) { 2540686cdd19SJun-ichiro itojun Hagino copym = m_pullup(copym, sizeof(struct ip6_hdr)); 2541686cdd19SJun-ichiro itojun Hagino if (copym == NULL) 2542686cdd19SJun-ichiro itojun Hagino return; 254382cd038dSYoshinobu Inoue } 2544686cdd19SJun-ichiro itojun Hagino 2545686cdd19SJun-ichiro itojun Hagino #ifdef DIAGNOSTIC 2546686cdd19SJun-ichiro itojun Hagino if (copym->m_len < sizeof(*ip6)) { 2547686cdd19SJun-ichiro itojun Hagino m_freem(copym); 2548686cdd19SJun-ichiro itojun Hagino return; 2549686cdd19SJun-ichiro itojun Hagino } 2550686cdd19SJun-ichiro itojun Hagino #endif 2551686cdd19SJun-ichiro itojun Hagino 2552686cdd19SJun-ichiro itojun Hagino ip6 = mtod(copym, struct ip6_hdr *); 255333841545SHajimu UMEMOTO /* 255433841545SHajimu UMEMOTO * clear embedded scope identifiers if necessary. 255533841545SHajimu UMEMOTO * in6_clearscope will touch the addresses only when necessary. 255633841545SHajimu UMEMOTO */ 255733841545SHajimu UMEMOTO in6_clearscope(&ip6->ip6_src); 255833841545SHajimu UMEMOTO in6_clearscope(&ip6->ip6_dst); 2559686cdd19SJun-ichiro itojun Hagino 25607efe5d92SHajimu UMEMOTO (void)if_simloop(ifp, copym, dst->sin6_family, NULL); 256182cd038dSYoshinobu Inoue } 256282cd038dSYoshinobu Inoue 256382cd038dSYoshinobu Inoue /* 256482cd038dSYoshinobu Inoue * Chop IPv6 header off from the payload. 256582cd038dSYoshinobu Inoue */ 256682cd038dSYoshinobu Inoue static int 256782cd038dSYoshinobu Inoue ip6_splithdr(m, exthdrs) 256882cd038dSYoshinobu Inoue struct mbuf *m; 256982cd038dSYoshinobu Inoue struct ip6_exthdrs *exthdrs; 257082cd038dSYoshinobu Inoue { 257182cd038dSYoshinobu Inoue struct mbuf *mh; 257282cd038dSYoshinobu Inoue struct ip6_hdr *ip6; 257382cd038dSYoshinobu Inoue 257482cd038dSYoshinobu Inoue ip6 = mtod(m, struct ip6_hdr *); 257582cd038dSYoshinobu Inoue if (m->m_len > sizeof(*ip6)) { 2576a163d034SWarner Losh MGETHDR(mh, M_DONTWAIT, MT_HEADER); 257782cd038dSYoshinobu Inoue if (mh == 0) { 257882cd038dSYoshinobu Inoue m_freem(m); 257982cd038dSYoshinobu Inoue return ENOBUFS; 258082cd038dSYoshinobu Inoue } 25819967cafcSSam Leffler M_MOVE_PKTHDR(mh, m); 258282cd038dSYoshinobu Inoue MH_ALIGN(mh, sizeof(*ip6)); 258382cd038dSYoshinobu Inoue m->m_len -= sizeof(*ip6); 258482cd038dSYoshinobu Inoue m->m_data += sizeof(*ip6); 258582cd038dSYoshinobu Inoue mh->m_next = m; 258682cd038dSYoshinobu Inoue m = mh; 258782cd038dSYoshinobu Inoue m->m_len = sizeof(*ip6); 258882cd038dSYoshinobu Inoue bcopy((caddr_t)ip6, mtod(m, caddr_t), sizeof(*ip6)); 258982cd038dSYoshinobu Inoue } 259082cd038dSYoshinobu Inoue exthdrs->ip6e_ip6 = m; 259182cd038dSYoshinobu Inoue return 0; 259282cd038dSYoshinobu Inoue } 259382cd038dSYoshinobu Inoue 259482cd038dSYoshinobu Inoue /* 259582cd038dSYoshinobu Inoue * Compute IPv6 extension header length. 259682cd038dSYoshinobu Inoue */ 259782cd038dSYoshinobu Inoue int 259882cd038dSYoshinobu Inoue ip6_optlen(in6p) 259982cd038dSYoshinobu Inoue struct in6pcb *in6p; 260082cd038dSYoshinobu Inoue { 260182cd038dSYoshinobu Inoue int len; 260282cd038dSYoshinobu Inoue 260382cd038dSYoshinobu Inoue if (!in6p->in6p_outputopts) 260482cd038dSYoshinobu Inoue return 0; 260582cd038dSYoshinobu Inoue 260682cd038dSYoshinobu Inoue len = 0; 260782cd038dSYoshinobu Inoue #define elen(x) \ 260882cd038dSYoshinobu Inoue (((struct ip6_ext *)(x)) ? (((struct ip6_ext *)(x))->ip6e_len + 1) << 3 : 0) 260982cd038dSYoshinobu Inoue 261082cd038dSYoshinobu Inoue len += elen(in6p->in6p_outputopts->ip6po_hbh); 261133841545SHajimu UMEMOTO if (in6p->in6p_outputopts->ip6po_rthdr) 261233841545SHajimu UMEMOTO /* dest1 is valid with rthdr only */ 261382cd038dSYoshinobu Inoue len += elen(in6p->in6p_outputopts->ip6po_dest1); 261482cd038dSYoshinobu Inoue len += elen(in6p->in6p_outputopts->ip6po_rthdr); 261582cd038dSYoshinobu Inoue len += elen(in6p->in6p_outputopts->ip6po_dest2); 261682cd038dSYoshinobu Inoue return len; 261782cd038dSYoshinobu Inoue #undef elen 261882cd038dSYoshinobu Inoue } 2619