1686cdd19SJun-ichiro itojun Hagino /* $FreeBSD$ */ 2686cdd19SJun-ichiro itojun Hagino /* $KAME: ip6_output.c,v 1.115 2000/07/03 13:23:28 itojun Exp $ */ 3686cdd19SJun-ichiro itojun Hagino 482cd038dSYoshinobu Inoue /* 582cd038dSYoshinobu Inoue * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 682cd038dSYoshinobu Inoue * All rights reserved. 782cd038dSYoshinobu Inoue * 882cd038dSYoshinobu Inoue * Redistribution and use in source and binary forms, with or without 982cd038dSYoshinobu Inoue * modification, are permitted provided that the following conditions 1082cd038dSYoshinobu Inoue * are met: 1182cd038dSYoshinobu Inoue * 1. Redistributions of source code must retain the above copyright 1282cd038dSYoshinobu Inoue * notice, this list of conditions and the following disclaimer. 1382cd038dSYoshinobu Inoue * 2. Redistributions in binary form must reproduce the above copyright 1482cd038dSYoshinobu Inoue * notice, this list of conditions and the following disclaimer in the 1582cd038dSYoshinobu Inoue * documentation and/or other materials provided with the distribution. 1682cd038dSYoshinobu Inoue * 3. Neither the name of the project nor the names of its contributors 1782cd038dSYoshinobu Inoue * may be used to endorse or promote products derived from this software 1882cd038dSYoshinobu Inoue * without specific prior written permission. 1982cd038dSYoshinobu Inoue * 2082cd038dSYoshinobu Inoue * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 2182cd038dSYoshinobu Inoue * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 2282cd038dSYoshinobu Inoue * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 2382cd038dSYoshinobu Inoue * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 2482cd038dSYoshinobu Inoue * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 2582cd038dSYoshinobu Inoue * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 2682cd038dSYoshinobu Inoue * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 2782cd038dSYoshinobu Inoue * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 2882cd038dSYoshinobu Inoue * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 2982cd038dSYoshinobu Inoue * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 3082cd038dSYoshinobu Inoue * SUCH DAMAGE. 3182cd038dSYoshinobu Inoue */ 3282cd038dSYoshinobu Inoue 3382cd038dSYoshinobu Inoue /* 3482cd038dSYoshinobu Inoue * Copyright (c) 1982, 1986, 1988, 1990, 1993 3582cd038dSYoshinobu Inoue * The Regents of the University of California. All rights reserved. 3682cd038dSYoshinobu Inoue * 3782cd038dSYoshinobu Inoue * Redistribution and use in source and binary forms, with or without 3882cd038dSYoshinobu Inoue * modification, are permitted provided that the following conditions 3982cd038dSYoshinobu Inoue * are met: 4082cd038dSYoshinobu Inoue * 1. Redistributions of source code must retain the above copyright 4182cd038dSYoshinobu Inoue * notice, this list of conditions and the following disclaimer. 4282cd038dSYoshinobu Inoue * 2. Redistributions in binary form must reproduce the above copyright 4382cd038dSYoshinobu Inoue * notice, this list of conditions and the following disclaimer in the 4482cd038dSYoshinobu Inoue * documentation and/or other materials provided with the distribution. 4582cd038dSYoshinobu Inoue * 3. All advertising materials mentioning features or use of this software 4682cd038dSYoshinobu Inoue * must display the following acknowledgement: 4782cd038dSYoshinobu Inoue * This product includes software developed by the University of 4882cd038dSYoshinobu Inoue * California, Berkeley and its contributors. 4982cd038dSYoshinobu Inoue * 4. Neither the name of the University nor the names of its contributors 5082cd038dSYoshinobu Inoue * may be used to endorse or promote products derived from this software 5182cd038dSYoshinobu Inoue * without specific prior written permission. 5282cd038dSYoshinobu Inoue * 5382cd038dSYoshinobu Inoue * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 5482cd038dSYoshinobu Inoue * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 5582cd038dSYoshinobu Inoue * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 5682cd038dSYoshinobu Inoue * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 5782cd038dSYoshinobu Inoue * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 5882cd038dSYoshinobu Inoue * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 5982cd038dSYoshinobu Inoue * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 6082cd038dSYoshinobu Inoue * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 6182cd038dSYoshinobu Inoue * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 6282cd038dSYoshinobu Inoue * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 6382cd038dSYoshinobu Inoue * SUCH DAMAGE. 6482cd038dSYoshinobu Inoue * 6582cd038dSYoshinobu Inoue * @(#)ip_output.c 8.3 (Berkeley) 1/21/94 6682cd038dSYoshinobu Inoue */ 6782cd038dSYoshinobu Inoue 68210d0432SYoshinobu Inoue #include "opt_ip6fw.h" 69686cdd19SJun-ichiro itojun Hagino #include "opt_inet.h" 70686cdd19SJun-ichiro itojun Hagino #include "opt_inet6.h" 71686cdd19SJun-ichiro itojun Hagino #include "opt_ipsec.h" 72c4ac87eaSDarren Reed #include "opt_pfil_hooks.h" 7382cd038dSYoshinobu Inoue 7482cd038dSYoshinobu Inoue #include <sys/param.h> 7582cd038dSYoshinobu Inoue #include <sys/malloc.h> 7682cd038dSYoshinobu Inoue #include <sys/mbuf.h> 7782cd038dSYoshinobu Inoue #include <sys/errno.h> 7882cd038dSYoshinobu Inoue #include <sys/protosw.h> 7982cd038dSYoshinobu Inoue #include <sys/socket.h> 8082cd038dSYoshinobu Inoue #include <sys/socketvar.h> 8182cd038dSYoshinobu Inoue #include <sys/systm.h> 8282cd038dSYoshinobu Inoue #include <sys/kernel.h> 8382cd038dSYoshinobu Inoue #include <sys/proc.h> 8482cd038dSYoshinobu Inoue 8582cd038dSYoshinobu Inoue #include <net/if.h> 8682cd038dSYoshinobu Inoue #include <net/route.h> 87c4ac87eaSDarren Reed #ifdef PFIL_HOOKS 88c4ac87eaSDarren Reed #include <net/pfil.h> 89c4ac87eaSDarren Reed #endif 9082cd038dSYoshinobu Inoue 9182cd038dSYoshinobu Inoue #include <netinet/in.h> 9282cd038dSYoshinobu Inoue #include <netinet/in_var.h> 93686cdd19SJun-ichiro itojun Hagino #include <netinet/ip6.h> 94686cdd19SJun-ichiro itojun Hagino #include <netinet/icmp6.h> 9582cd038dSYoshinobu Inoue #include <netinet6/ip6_var.h> 96686cdd19SJun-ichiro itojun Hagino #include <netinet/in_pcb.h> 9782cd038dSYoshinobu Inoue #include <netinet6/nd6.h> 9882cd038dSYoshinobu Inoue 9982cd038dSYoshinobu Inoue #ifdef IPSEC 10082cd038dSYoshinobu Inoue #include <netinet6/ipsec.h> 101686cdd19SJun-ichiro itojun Hagino #ifdef INET6 10282cd038dSYoshinobu Inoue #include <netinet6/ipsec6.h> 1036a800098SYoshinobu Inoue #endif 104686cdd19SJun-ichiro itojun Hagino #include <netkey/key.h> 10582cd038dSYoshinobu Inoue #endif /* IPSEC */ 10682cd038dSYoshinobu Inoue 10782cd038dSYoshinobu Inoue #include <net/net_osdep.h> 10882cd038dSYoshinobu Inoue 10982cd038dSYoshinobu Inoue #ifdef IPV6FIREWALL 11082cd038dSYoshinobu Inoue #include <netinet6/ip6_fw.h> 11182cd038dSYoshinobu Inoue #endif 11282cd038dSYoshinobu Inoue 11382cd038dSYoshinobu Inoue static MALLOC_DEFINE(M_IPMOPTS, "ip6_moptions", "internet multicast options"); 11482cd038dSYoshinobu Inoue 11582cd038dSYoshinobu Inoue struct ip6_exthdrs { 11682cd038dSYoshinobu Inoue struct mbuf *ip6e_ip6; 11782cd038dSYoshinobu Inoue struct mbuf *ip6e_hbh; 11882cd038dSYoshinobu Inoue struct mbuf *ip6e_dest1; 11982cd038dSYoshinobu Inoue struct mbuf *ip6e_rthdr; 12082cd038dSYoshinobu Inoue struct mbuf *ip6e_dest2; 12182cd038dSYoshinobu Inoue }; 12282cd038dSYoshinobu Inoue 12382cd038dSYoshinobu Inoue static int ip6_pcbopts __P((struct ip6_pktopts **, struct mbuf *, 12482cd038dSYoshinobu Inoue struct socket *, struct sockopt *sopt)); 12582cd038dSYoshinobu Inoue static int ip6_setmoptions __P((int, struct ip6_moptions **, struct mbuf *)); 12682cd038dSYoshinobu Inoue static int ip6_getmoptions __P((int, struct ip6_moptions *, struct mbuf **)); 12782cd038dSYoshinobu Inoue static int ip6_copyexthdr __P((struct mbuf **, caddr_t, int)); 12882cd038dSYoshinobu Inoue static int ip6_insertfraghdr __P((struct mbuf *, struct mbuf *, int, 12982cd038dSYoshinobu Inoue struct ip6_frag **)); 13082cd038dSYoshinobu Inoue static int ip6_insert_jumboopt __P((struct ip6_exthdrs *, u_int32_t)); 13182cd038dSYoshinobu Inoue static int ip6_splithdr __P((struct mbuf *, struct ip6_exthdrs *)); 13282cd038dSYoshinobu Inoue 13382cd038dSYoshinobu Inoue /* 13482cd038dSYoshinobu Inoue * IP6 output. The packet in mbuf chain m contains a skeletal IP6 13582cd038dSYoshinobu Inoue * header (with pri, len, nxt, hlim, src, dst). 13682cd038dSYoshinobu Inoue * This function may modify ver and hlim only. 13782cd038dSYoshinobu Inoue * The mbuf chain containing the packet will be freed. 13882cd038dSYoshinobu Inoue * The mbuf opt, if present, will not be freed. 13982cd038dSYoshinobu Inoue */ 14082cd038dSYoshinobu Inoue int 14182cd038dSYoshinobu Inoue ip6_output(m0, opt, ro, flags, im6o, ifpp) 14282cd038dSYoshinobu Inoue struct mbuf *m0; 14382cd038dSYoshinobu Inoue struct ip6_pktopts *opt; 14482cd038dSYoshinobu Inoue struct route_in6 *ro; 14582cd038dSYoshinobu Inoue int flags; 14682cd038dSYoshinobu Inoue struct ip6_moptions *im6o; 14782cd038dSYoshinobu Inoue struct ifnet **ifpp; /* XXX: just for statistics */ 14882cd038dSYoshinobu Inoue { 14982cd038dSYoshinobu Inoue struct ip6_hdr *ip6, *mhip6; 150686cdd19SJun-ichiro itojun Hagino struct ifnet *ifp, *origifp; 15182cd038dSYoshinobu Inoue struct mbuf *m = m0; 15282cd038dSYoshinobu Inoue int hlen, tlen, len, off; 15382cd038dSYoshinobu Inoue struct route_in6 ip6route; 15482cd038dSYoshinobu Inoue struct sockaddr_in6 *dst; 15582cd038dSYoshinobu Inoue int error = 0; 15682cd038dSYoshinobu Inoue struct in6_ifaddr *ia; 15782cd038dSYoshinobu Inoue u_long mtu; 15882cd038dSYoshinobu Inoue u_int32_t optlen = 0, plen = 0, unfragpartlen = 0; 15982cd038dSYoshinobu Inoue struct ip6_exthdrs exthdrs; 16082cd038dSYoshinobu Inoue struct in6_addr finaldst; 16182cd038dSYoshinobu Inoue struct route_in6 *ro_pmtu = NULL; 16282cd038dSYoshinobu Inoue int hdrsplit = 0; 16382cd038dSYoshinobu Inoue int needipsec = 0; 164c4ac87eaSDarren Reed #ifdef PFIL_HOOKS 165c4ac87eaSDarren Reed struct packet_filter_hook *pfh; 166c4ac87eaSDarren Reed struct mbuf *m1; 167c4ac87eaSDarren Reed int rv; 168c4ac87eaSDarren Reed #endif /* PFIL_HOOKS */ 16982cd038dSYoshinobu Inoue #ifdef IPSEC 17082cd038dSYoshinobu Inoue int needipsectun = 0; 17182cd038dSYoshinobu Inoue struct socket *so; 17282cd038dSYoshinobu Inoue struct secpolicy *sp = NULL; 17382cd038dSYoshinobu Inoue 17482cd038dSYoshinobu Inoue /* for AH processing. stupid to have "socket" variable in IP layer... */ 175686cdd19SJun-ichiro itojun Hagino so = ipsec_getsocket(m); 176686cdd19SJun-ichiro itojun Hagino ipsec_setsocket(m, NULL); 17782cd038dSYoshinobu Inoue ip6 = mtod(m, struct ip6_hdr *); 17882cd038dSYoshinobu Inoue #endif /* IPSEC */ 17982cd038dSYoshinobu Inoue 18082cd038dSYoshinobu Inoue #define MAKE_EXTHDR(hp, mp) \ 181686cdd19SJun-ichiro itojun Hagino do { \ 18282cd038dSYoshinobu Inoue if (hp) { \ 18382cd038dSYoshinobu Inoue struct ip6_ext *eh = (struct ip6_ext *)(hp); \ 18482cd038dSYoshinobu Inoue error = ip6_copyexthdr((mp), (caddr_t)(hp), \ 18582cd038dSYoshinobu Inoue ((eh)->ip6e_len + 1) << 3); \ 18682cd038dSYoshinobu Inoue if (error) \ 18782cd038dSYoshinobu Inoue goto freehdrs; \ 18882cd038dSYoshinobu Inoue } \ 189686cdd19SJun-ichiro itojun Hagino } while (0) 19082cd038dSYoshinobu Inoue 19182cd038dSYoshinobu Inoue bzero(&exthdrs, sizeof(exthdrs)); 192686cdd19SJun-ichiro itojun Hagino 19382cd038dSYoshinobu Inoue if (opt) { 19482cd038dSYoshinobu Inoue /* Hop-by-Hop options header */ 19582cd038dSYoshinobu Inoue MAKE_EXTHDR(opt->ip6po_hbh, &exthdrs.ip6e_hbh); 19682cd038dSYoshinobu Inoue /* Destination options header(1st part) */ 19782cd038dSYoshinobu Inoue MAKE_EXTHDR(opt->ip6po_dest1, &exthdrs.ip6e_dest1); 19882cd038dSYoshinobu Inoue /* Routing header */ 19982cd038dSYoshinobu Inoue MAKE_EXTHDR(opt->ip6po_rthdr, &exthdrs.ip6e_rthdr); 20082cd038dSYoshinobu Inoue /* Destination options header(2nd part) */ 20182cd038dSYoshinobu Inoue MAKE_EXTHDR(opt->ip6po_dest2, &exthdrs.ip6e_dest2); 20282cd038dSYoshinobu Inoue } 20382cd038dSYoshinobu Inoue 20482cd038dSYoshinobu Inoue #ifdef IPSEC 20582cd038dSYoshinobu Inoue /* get a security policy for this packet */ 20682cd038dSYoshinobu Inoue if (so == NULL) 20782cd038dSYoshinobu Inoue sp = ipsec6_getpolicybyaddr(m, IPSEC_DIR_OUTBOUND, 0, &error); 20882cd038dSYoshinobu Inoue else 20982cd038dSYoshinobu Inoue sp = ipsec6_getpolicybysock(m, IPSEC_DIR_OUTBOUND, so, &error); 21082cd038dSYoshinobu Inoue 21182cd038dSYoshinobu Inoue if (sp == NULL) { 21282cd038dSYoshinobu Inoue ipsec6stat.out_inval++; 213686cdd19SJun-ichiro itojun Hagino goto freehdrs; 21482cd038dSYoshinobu Inoue } 21582cd038dSYoshinobu Inoue 21682cd038dSYoshinobu Inoue error = 0; 21782cd038dSYoshinobu Inoue 21882cd038dSYoshinobu Inoue /* check policy */ 21982cd038dSYoshinobu Inoue switch (sp->policy) { 22082cd038dSYoshinobu Inoue case IPSEC_POLICY_DISCARD: 22182cd038dSYoshinobu Inoue /* 22282cd038dSYoshinobu Inoue * This packet is just discarded. 22382cd038dSYoshinobu Inoue */ 22482cd038dSYoshinobu Inoue ipsec6stat.out_polvio++; 225686cdd19SJun-ichiro itojun Hagino goto freehdrs; 22682cd038dSYoshinobu Inoue 22782cd038dSYoshinobu Inoue case IPSEC_POLICY_BYPASS: 22882cd038dSYoshinobu Inoue case IPSEC_POLICY_NONE: 22982cd038dSYoshinobu Inoue /* no need to do IPsec. */ 23082cd038dSYoshinobu Inoue needipsec = 0; 23182cd038dSYoshinobu Inoue break; 23282cd038dSYoshinobu Inoue 23382cd038dSYoshinobu Inoue case IPSEC_POLICY_IPSEC: 23482cd038dSYoshinobu Inoue if (sp->req == NULL) { 235686cdd19SJun-ichiro itojun Hagino /* acquire a policy */ 236686cdd19SJun-ichiro itojun Hagino error = key_spdacquire(sp); 237686cdd19SJun-ichiro itojun Hagino goto freehdrs; 23882cd038dSYoshinobu Inoue } 23982cd038dSYoshinobu Inoue needipsec = 1; 24082cd038dSYoshinobu Inoue break; 24182cd038dSYoshinobu Inoue 24282cd038dSYoshinobu Inoue case IPSEC_POLICY_ENTRUST: 24382cd038dSYoshinobu Inoue default: 24482cd038dSYoshinobu Inoue printf("ip6_output: Invalid policy found. %d\n", sp->policy); 24582cd038dSYoshinobu Inoue } 24682cd038dSYoshinobu Inoue #endif /* IPSEC */ 24782cd038dSYoshinobu Inoue 24882cd038dSYoshinobu Inoue /* 24982cd038dSYoshinobu Inoue * Calculate the total length of the extension header chain. 25082cd038dSYoshinobu Inoue * Keep the length of the unfragmentable part for fragmentation. 25182cd038dSYoshinobu Inoue */ 25282cd038dSYoshinobu Inoue optlen = 0; 25382cd038dSYoshinobu Inoue if (exthdrs.ip6e_hbh) optlen += exthdrs.ip6e_hbh->m_len; 25482cd038dSYoshinobu Inoue if (exthdrs.ip6e_dest1) optlen += exthdrs.ip6e_dest1->m_len; 25582cd038dSYoshinobu Inoue if (exthdrs.ip6e_rthdr) optlen += exthdrs.ip6e_rthdr->m_len; 25682cd038dSYoshinobu Inoue unfragpartlen = optlen + sizeof(struct ip6_hdr); 25782cd038dSYoshinobu Inoue /* NOTE: we don't add AH/ESP length here. do that later. */ 25882cd038dSYoshinobu Inoue if (exthdrs.ip6e_dest2) optlen += exthdrs.ip6e_dest2->m_len; 25982cd038dSYoshinobu Inoue 26082cd038dSYoshinobu Inoue /* 26182cd038dSYoshinobu Inoue * If we need IPsec, or there is at least one extension header, 26282cd038dSYoshinobu Inoue * separate IP6 header from the payload. 26382cd038dSYoshinobu Inoue */ 26482cd038dSYoshinobu Inoue if ((needipsec || optlen) && !hdrsplit) { 26582cd038dSYoshinobu Inoue if ((error = ip6_splithdr(m, &exthdrs)) != 0) { 26682cd038dSYoshinobu Inoue m = NULL; 26782cd038dSYoshinobu Inoue goto freehdrs; 26882cd038dSYoshinobu Inoue } 26982cd038dSYoshinobu Inoue m = exthdrs.ip6e_ip6; 27082cd038dSYoshinobu Inoue hdrsplit++; 27182cd038dSYoshinobu Inoue } 27282cd038dSYoshinobu Inoue 27382cd038dSYoshinobu Inoue /* adjust pointer */ 27482cd038dSYoshinobu Inoue ip6 = mtod(m, struct ip6_hdr *); 27582cd038dSYoshinobu Inoue 27682cd038dSYoshinobu Inoue /* adjust mbuf packet header length */ 27782cd038dSYoshinobu Inoue m->m_pkthdr.len += optlen; 27882cd038dSYoshinobu Inoue plen = m->m_pkthdr.len - sizeof(*ip6); 27982cd038dSYoshinobu Inoue 28082cd038dSYoshinobu Inoue /* If this is a jumbo payload, insert a jumbo payload option. */ 28182cd038dSYoshinobu Inoue if (plen > IPV6_MAXPACKET) { 28282cd038dSYoshinobu Inoue if (!hdrsplit) { 28382cd038dSYoshinobu Inoue if ((error = ip6_splithdr(m, &exthdrs)) != 0) { 28482cd038dSYoshinobu Inoue m = NULL; 28582cd038dSYoshinobu Inoue goto freehdrs; 28682cd038dSYoshinobu Inoue } 28782cd038dSYoshinobu Inoue m = exthdrs.ip6e_ip6; 28882cd038dSYoshinobu Inoue hdrsplit++; 28982cd038dSYoshinobu Inoue } 29082cd038dSYoshinobu Inoue /* adjust pointer */ 29182cd038dSYoshinobu Inoue ip6 = mtod(m, struct ip6_hdr *); 29282cd038dSYoshinobu Inoue if ((error = ip6_insert_jumboopt(&exthdrs, plen)) != 0) 29382cd038dSYoshinobu Inoue goto freehdrs; 29482cd038dSYoshinobu Inoue ip6->ip6_plen = 0; 29582cd038dSYoshinobu Inoue } else 29682cd038dSYoshinobu Inoue ip6->ip6_plen = htons(plen); 29782cd038dSYoshinobu Inoue 29882cd038dSYoshinobu Inoue /* 29982cd038dSYoshinobu Inoue * Concatenate headers and fill in next header fields. 30082cd038dSYoshinobu Inoue * Here we have, on "m" 30182cd038dSYoshinobu Inoue * IPv6 payload 30282cd038dSYoshinobu Inoue * and we insert headers accordingly. Finally, we should be getting: 30382cd038dSYoshinobu Inoue * IPv6 hbh dest1 rthdr ah* [esp* dest2 payload] 30482cd038dSYoshinobu Inoue * 30582cd038dSYoshinobu Inoue * during the header composing process, "m" points to IPv6 header. 30682cd038dSYoshinobu Inoue * "mprev" points to an extension header prior to esp. 30782cd038dSYoshinobu Inoue */ 30882cd038dSYoshinobu Inoue { 30982cd038dSYoshinobu Inoue u_char *nexthdrp = &ip6->ip6_nxt; 31082cd038dSYoshinobu Inoue struct mbuf *mprev = m; 31182cd038dSYoshinobu Inoue 31282cd038dSYoshinobu Inoue /* 31382cd038dSYoshinobu Inoue * we treat dest2 specially. this makes IPsec processing 31482cd038dSYoshinobu Inoue * much easier. 31582cd038dSYoshinobu Inoue * 31682cd038dSYoshinobu Inoue * result: IPv6 dest2 payload 31782cd038dSYoshinobu Inoue * m and mprev will point to IPv6 header. 31882cd038dSYoshinobu Inoue */ 31982cd038dSYoshinobu Inoue if (exthdrs.ip6e_dest2) { 32082cd038dSYoshinobu Inoue if (!hdrsplit) 32182cd038dSYoshinobu Inoue panic("assumption failed: hdr not split"); 32282cd038dSYoshinobu Inoue exthdrs.ip6e_dest2->m_next = m->m_next; 32382cd038dSYoshinobu Inoue m->m_next = exthdrs.ip6e_dest2; 32482cd038dSYoshinobu Inoue *mtod(exthdrs.ip6e_dest2, u_char *) = ip6->ip6_nxt; 32582cd038dSYoshinobu Inoue ip6->ip6_nxt = IPPROTO_DSTOPTS; 32682cd038dSYoshinobu Inoue } 32782cd038dSYoshinobu Inoue 32882cd038dSYoshinobu Inoue #define MAKE_CHAIN(m, mp, p, i)\ 329686cdd19SJun-ichiro itojun Hagino do {\ 33082cd038dSYoshinobu Inoue if (m) {\ 33182cd038dSYoshinobu Inoue if (!hdrsplit) \ 33282cd038dSYoshinobu Inoue panic("assumption failed: hdr not split"); \ 33382cd038dSYoshinobu Inoue *mtod((m), u_char *) = *(p);\ 33482cd038dSYoshinobu Inoue *(p) = (i);\ 33582cd038dSYoshinobu Inoue p = mtod((m), u_char *);\ 33682cd038dSYoshinobu Inoue (m)->m_next = (mp)->m_next;\ 33782cd038dSYoshinobu Inoue (mp)->m_next = (m);\ 33882cd038dSYoshinobu Inoue (mp) = (m);\ 33982cd038dSYoshinobu Inoue }\ 340686cdd19SJun-ichiro itojun Hagino } while (0) 34182cd038dSYoshinobu Inoue /* 34282cd038dSYoshinobu Inoue * result: IPv6 hbh dest1 rthdr dest2 payload 34382cd038dSYoshinobu Inoue * m will point to IPv6 header. mprev will point to the 34482cd038dSYoshinobu Inoue * extension header prior to dest2 (rthdr in the above case). 34582cd038dSYoshinobu Inoue */ 34682cd038dSYoshinobu Inoue MAKE_CHAIN(exthdrs.ip6e_hbh, mprev, 34782cd038dSYoshinobu Inoue nexthdrp, IPPROTO_HOPOPTS); 34882cd038dSYoshinobu Inoue MAKE_CHAIN(exthdrs.ip6e_dest1, mprev, 34982cd038dSYoshinobu Inoue nexthdrp, IPPROTO_DSTOPTS); 35082cd038dSYoshinobu Inoue MAKE_CHAIN(exthdrs.ip6e_rthdr, mprev, 35182cd038dSYoshinobu Inoue nexthdrp, IPPROTO_ROUTING); 35282cd038dSYoshinobu Inoue 35382cd038dSYoshinobu Inoue #ifdef IPSEC 35482cd038dSYoshinobu Inoue if (!needipsec) 35582cd038dSYoshinobu Inoue goto skip_ipsec2; 35682cd038dSYoshinobu Inoue 35782cd038dSYoshinobu Inoue /* 35882cd038dSYoshinobu Inoue * pointers after IPsec headers are not valid any more. 35982cd038dSYoshinobu Inoue * other pointers need a great care too. 36082cd038dSYoshinobu Inoue * (IPsec routines should not mangle mbufs prior to AH/ESP) 36182cd038dSYoshinobu Inoue */ 36282cd038dSYoshinobu Inoue exthdrs.ip6e_dest2 = NULL; 36382cd038dSYoshinobu Inoue 36482cd038dSYoshinobu Inoue { 36582cd038dSYoshinobu Inoue struct ip6_rthdr *rh = NULL; 36682cd038dSYoshinobu Inoue int segleft_org = 0; 36782cd038dSYoshinobu Inoue struct ipsec_output_state state; 36882cd038dSYoshinobu Inoue 36982cd038dSYoshinobu Inoue if (exthdrs.ip6e_rthdr) { 37082cd038dSYoshinobu Inoue rh = mtod(exthdrs.ip6e_rthdr, struct ip6_rthdr *); 37182cd038dSYoshinobu Inoue segleft_org = rh->ip6r_segleft; 37282cd038dSYoshinobu Inoue rh->ip6r_segleft = 0; 37382cd038dSYoshinobu Inoue } 37482cd038dSYoshinobu Inoue 37582cd038dSYoshinobu Inoue bzero(&state, sizeof(state)); 37682cd038dSYoshinobu Inoue state.m = m; 37782cd038dSYoshinobu Inoue error = ipsec6_output_trans(&state, nexthdrp, mprev, sp, flags, 37882cd038dSYoshinobu Inoue &needipsectun); 37982cd038dSYoshinobu Inoue m = state.m; 38082cd038dSYoshinobu Inoue if (error) { 38182cd038dSYoshinobu Inoue /* mbuf is already reclaimed in ipsec6_output_trans. */ 38282cd038dSYoshinobu Inoue m = NULL; 38382cd038dSYoshinobu Inoue switch (error) { 38482cd038dSYoshinobu Inoue case EHOSTUNREACH: 38582cd038dSYoshinobu Inoue case ENETUNREACH: 38682cd038dSYoshinobu Inoue case EMSGSIZE: 38782cd038dSYoshinobu Inoue case ENOBUFS: 38882cd038dSYoshinobu Inoue case ENOMEM: 38982cd038dSYoshinobu Inoue break; 39082cd038dSYoshinobu Inoue default: 39182cd038dSYoshinobu Inoue printf("ip6_output (ipsec): error code %d\n", error); 39282cd038dSYoshinobu Inoue /*fall through*/ 39382cd038dSYoshinobu Inoue case ENOENT: 39482cd038dSYoshinobu Inoue /* don't show these error codes to the user */ 39582cd038dSYoshinobu Inoue error = 0; 39682cd038dSYoshinobu Inoue break; 39782cd038dSYoshinobu Inoue } 39882cd038dSYoshinobu Inoue goto bad; 39982cd038dSYoshinobu Inoue } 40082cd038dSYoshinobu Inoue if (exthdrs.ip6e_rthdr) { 40182cd038dSYoshinobu Inoue /* ah6_output doesn't modify mbuf chain */ 40282cd038dSYoshinobu Inoue rh->ip6r_segleft = segleft_org; 40382cd038dSYoshinobu Inoue } 40482cd038dSYoshinobu Inoue } 40582cd038dSYoshinobu Inoue skip_ipsec2:; 40682cd038dSYoshinobu Inoue #endif 40782cd038dSYoshinobu Inoue } 40882cd038dSYoshinobu Inoue 40982cd038dSYoshinobu Inoue /* 41082cd038dSYoshinobu Inoue * If there is a routing header, replace destination address field 41182cd038dSYoshinobu Inoue * with the first hop of the routing header. 41282cd038dSYoshinobu Inoue */ 41382cd038dSYoshinobu Inoue if (exthdrs.ip6e_rthdr) { 41482cd038dSYoshinobu Inoue struct ip6_rthdr *rh = 41582cd038dSYoshinobu Inoue (struct ip6_rthdr *)(mtod(exthdrs.ip6e_rthdr, 41682cd038dSYoshinobu Inoue struct ip6_rthdr *)); 41782cd038dSYoshinobu Inoue struct ip6_rthdr0 *rh0; 41882cd038dSYoshinobu Inoue 41982cd038dSYoshinobu Inoue finaldst = ip6->ip6_dst; 42082cd038dSYoshinobu Inoue switch(rh->ip6r_type) { 42182cd038dSYoshinobu Inoue case IPV6_RTHDR_TYPE_0: 42282cd038dSYoshinobu Inoue rh0 = (struct ip6_rthdr0 *)rh; 42382cd038dSYoshinobu Inoue ip6->ip6_dst = rh0->ip6r0_addr[0]; 42482cd038dSYoshinobu Inoue bcopy((caddr_t)&rh0->ip6r0_addr[1], 42582cd038dSYoshinobu Inoue (caddr_t)&rh0->ip6r0_addr[0], 42682cd038dSYoshinobu Inoue sizeof(struct in6_addr)*(rh0->ip6r0_segleft - 1) 42782cd038dSYoshinobu Inoue ); 42882cd038dSYoshinobu Inoue rh0->ip6r0_addr[rh0->ip6r0_segleft - 1] = finaldst; 42982cd038dSYoshinobu Inoue break; 43082cd038dSYoshinobu Inoue default: /* is it possible? */ 43182cd038dSYoshinobu Inoue error = EINVAL; 43282cd038dSYoshinobu Inoue goto bad; 43382cd038dSYoshinobu Inoue } 43482cd038dSYoshinobu Inoue } 43582cd038dSYoshinobu Inoue 43682cd038dSYoshinobu Inoue /* Source address validation */ 43782cd038dSYoshinobu Inoue if (IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_src) && 43882cd038dSYoshinobu Inoue (flags & IPV6_DADOUTPUT) == 0) { 43982cd038dSYoshinobu Inoue error = EOPNOTSUPP; 44082cd038dSYoshinobu Inoue ip6stat.ip6s_badscope++; 44182cd038dSYoshinobu Inoue goto bad; 44282cd038dSYoshinobu Inoue } 44382cd038dSYoshinobu Inoue if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_src)) { 44482cd038dSYoshinobu Inoue error = EOPNOTSUPP; 44582cd038dSYoshinobu Inoue ip6stat.ip6s_badscope++; 44682cd038dSYoshinobu Inoue goto bad; 44782cd038dSYoshinobu Inoue } 44882cd038dSYoshinobu Inoue 44982cd038dSYoshinobu Inoue ip6stat.ip6s_localout++; 45082cd038dSYoshinobu Inoue 45182cd038dSYoshinobu Inoue /* 45282cd038dSYoshinobu Inoue * Route packet. 45382cd038dSYoshinobu Inoue */ 45482cd038dSYoshinobu Inoue if (ro == 0) { 45582cd038dSYoshinobu Inoue ro = &ip6route; 45682cd038dSYoshinobu Inoue bzero((caddr_t)ro, sizeof(*ro)); 45782cd038dSYoshinobu Inoue } 45882cd038dSYoshinobu Inoue ro_pmtu = ro; 45982cd038dSYoshinobu Inoue if (opt && opt->ip6po_rthdr) 46082cd038dSYoshinobu Inoue ro = &opt->ip6po_route; 46182cd038dSYoshinobu Inoue dst = (struct sockaddr_in6 *)&ro->ro_dst; 46282cd038dSYoshinobu Inoue /* 46382cd038dSYoshinobu Inoue * If there is a cached route, 46482cd038dSYoshinobu Inoue * check that it is to the same destination 46582cd038dSYoshinobu Inoue * and is still up. If not, free it and try again. 46682cd038dSYoshinobu Inoue */ 46782cd038dSYoshinobu Inoue if (ro->ro_rt && ((ro->ro_rt->rt_flags & RTF_UP) == 0 || 46882cd038dSYoshinobu Inoue !IN6_ARE_ADDR_EQUAL(&dst->sin6_addr, &ip6->ip6_dst))) { 46982cd038dSYoshinobu Inoue RTFREE(ro->ro_rt); 47082cd038dSYoshinobu Inoue ro->ro_rt = (struct rtentry *)0; 47182cd038dSYoshinobu Inoue } 47282cd038dSYoshinobu Inoue if (ro->ro_rt == 0) { 47382cd038dSYoshinobu Inoue bzero(dst, sizeof(*dst)); 47482cd038dSYoshinobu Inoue dst->sin6_family = AF_INET6; 47582cd038dSYoshinobu Inoue dst->sin6_len = sizeof(struct sockaddr_in6); 47682cd038dSYoshinobu Inoue dst->sin6_addr = ip6->ip6_dst; 477686cdd19SJun-ichiro itojun Hagino #ifdef SCOPEDROUTING 478686cdd19SJun-ichiro itojun Hagino /* XXX: sin6_scope_id should already be fixed at this point */ 479686cdd19SJun-ichiro itojun Hagino if (IN6_IS_SCOPE_LINKLOCAL(&dst->sin6_addr)) 480686cdd19SJun-ichiro itojun Hagino dst->sin6_scope_id = ntohs(dst->sin6_addr.s6_addr16[1]); 481686cdd19SJun-ichiro itojun Hagino #endif 48282cd038dSYoshinobu Inoue } 48382cd038dSYoshinobu Inoue #ifdef IPSEC 48482cd038dSYoshinobu Inoue if (needipsec && needipsectun) { 48582cd038dSYoshinobu Inoue struct ipsec_output_state state; 48682cd038dSYoshinobu Inoue 48782cd038dSYoshinobu Inoue /* 48882cd038dSYoshinobu Inoue * All the extension headers will become inaccessible 48982cd038dSYoshinobu Inoue * (since they can be encrypted). 49082cd038dSYoshinobu Inoue * Don't panic, we need no more updates to extension headers 49182cd038dSYoshinobu Inoue * on inner IPv6 packet (since they are now encapsulated). 49282cd038dSYoshinobu Inoue * 49382cd038dSYoshinobu Inoue * IPv6 [ESP|AH] IPv6 [extension headers] payload 49482cd038dSYoshinobu Inoue */ 49582cd038dSYoshinobu Inoue bzero(&exthdrs, sizeof(exthdrs)); 49682cd038dSYoshinobu Inoue exthdrs.ip6e_ip6 = m; 49782cd038dSYoshinobu Inoue 49882cd038dSYoshinobu Inoue bzero(&state, sizeof(state)); 49982cd038dSYoshinobu Inoue state.m = m; 50082cd038dSYoshinobu Inoue state.ro = (struct route *)ro; 50182cd038dSYoshinobu Inoue state.dst = (struct sockaddr *)dst; 50282cd038dSYoshinobu Inoue 50382cd038dSYoshinobu Inoue error = ipsec6_output_tunnel(&state, sp, flags); 50482cd038dSYoshinobu Inoue 50582cd038dSYoshinobu Inoue m = state.m; 50682cd038dSYoshinobu Inoue ro = (struct route_in6 *)state.ro; 50782cd038dSYoshinobu Inoue dst = (struct sockaddr_in6 *)state.dst; 50882cd038dSYoshinobu Inoue if (error) { 50982cd038dSYoshinobu Inoue /* mbuf is already reclaimed in ipsec6_output_tunnel. */ 51082cd038dSYoshinobu Inoue m0 = m = NULL; 51182cd038dSYoshinobu Inoue m = NULL; 51282cd038dSYoshinobu Inoue switch (error) { 51382cd038dSYoshinobu Inoue case EHOSTUNREACH: 51482cd038dSYoshinobu Inoue case ENETUNREACH: 51582cd038dSYoshinobu Inoue case EMSGSIZE: 51682cd038dSYoshinobu Inoue case ENOBUFS: 51782cd038dSYoshinobu Inoue case ENOMEM: 51882cd038dSYoshinobu Inoue break; 51982cd038dSYoshinobu Inoue default: 52082cd038dSYoshinobu Inoue printf("ip6_output (ipsec): error code %d\n", error); 52182cd038dSYoshinobu Inoue /*fall through*/ 52282cd038dSYoshinobu Inoue case ENOENT: 52382cd038dSYoshinobu Inoue /* don't show these error codes to the user */ 52482cd038dSYoshinobu Inoue error = 0; 52582cd038dSYoshinobu Inoue break; 52682cd038dSYoshinobu Inoue } 52782cd038dSYoshinobu Inoue goto bad; 52882cd038dSYoshinobu Inoue } 52982cd038dSYoshinobu Inoue 53082cd038dSYoshinobu Inoue exthdrs.ip6e_ip6 = m; 53182cd038dSYoshinobu Inoue } 532686cdd19SJun-ichiro itojun Hagino #endif /*IPSEC*/ 53382cd038dSYoshinobu Inoue 53482cd038dSYoshinobu Inoue if (!IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst)) { 53582cd038dSYoshinobu Inoue /* Unicast */ 53682cd038dSYoshinobu Inoue 53782cd038dSYoshinobu Inoue #define ifatoia6(ifa) ((struct in6_ifaddr *)(ifa)) 53882cd038dSYoshinobu Inoue #define sin6tosa(sin6) ((struct sockaddr *)(sin6)) 53982cd038dSYoshinobu Inoue /* xxx 54082cd038dSYoshinobu Inoue * interface selection comes here 54182cd038dSYoshinobu Inoue * if an interface is specified from an upper layer, 54282cd038dSYoshinobu Inoue * ifp must point it. 54382cd038dSYoshinobu Inoue */ 544686cdd19SJun-ichiro itojun Hagino if (ro->ro_rt == 0) { 545686cdd19SJun-ichiro itojun Hagino /* 546686cdd19SJun-ichiro itojun Hagino * non-bsdi always clone routes, if parent is 547686cdd19SJun-ichiro itojun Hagino * PRF_CLONING. 548686cdd19SJun-ichiro itojun Hagino */ 54982cd038dSYoshinobu Inoue rtalloc((struct route *)ro); 550686cdd19SJun-ichiro itojun Hagino } 55182cd038dSYoshinobu Inoue if (ro->ro_rt == 0) { 55282cd038dSYoshinobu Inoue ip6stat.ip6s_noroute++; 55382cd038dSYoshinobu Inoue error = EHOSTUNREACH; 55482cd038dSYoshinobu Inoue /* XXX in6_ifstat_inc(ifp, ifs6_out_discard); */ 55582cd038dSYoshinobu Inoue goto bad; 55682cd038dSYoshinobu Inoue } 55782cd038dSYoshinobu Inoue ia = ifatoia6(ro->ro_rt->rt_ifa); 55882cd038dSYoshinobu Inoue ifp = ro->ro_rt->rt_ifp; 55982cd038dSYoshinobu Inoue ro->ro_rt->rt_use++; 56082cd038dSYoshinobu Inoue if (ro->ro_rt->rt_flags & RTF_GATEWAY) 56182cd038dSYoshinobu Inoue dst = (struct sockaddr_in6 *)ro->ro_rt->rt_gateway; 56282cd038dSYoshinobu Inoue m->m_flags &= ~(M_BCAST | M_MCAST); /* just in case */ 56382cd038dSYoshinobu Inoue 56482cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_request); 56582cd038dSYoshinobu Inoue 56682cd038dSYoshinobu Inoue /* 567686cdd19SJun-ichiro itojun Hagino * Check if the outgoing interface conflicts with 56882cd038dSYoshinobu Inoue * the interface specified by ifi6_ifindex (if specified). 56982cd038dSYoshinobu Inoue * Note that loopback interface is always okay. 570686cdd19SJun-ichiro itojun Hagino * (this may happen when we are sending a packet to one of 571686cdd19SJun-ichiro itojun Hagino * our own addresses.) 57282cd038dSYoshinobu Inoue */ 57382cd038dSYoshinobu Inoue if (opt && opt->ip6po_pktinfo 57482cd038dSYoshinobu Inoue && opt->ip6po_pktinfo->ipi6_ifindex) { 57582cd038dSYoshinobu Inoue if (!(ifp->if_flags & IFF_LOOPBACK) 57682cd038dSYoshinobu Inoue && ifp->if_index != opt->ip6po_pktinfo->ipi6_ifindex) { 57782cd038dSYoshinobu Inoue ip6stat.ip6s_noroute++; 57882cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_discard); 57982cd038dSYoshinobu Inoue error = EHOSTUNREACH; 58082cd038dSYoshinobu Inoue goto bad; 58182cd038dSYoshinobu Inoue } 58282cd038dSYoshinobu Inoue } 58382cd038dSYoshinobu Inoue 58482cd038dSYoshinobu Inoue if (opt && opt->ip6po_hlim != -1) 58582cd038dSYoshinobu Inoue ip6->ip6_hlim = opt->ip6po_hlim & 0xff; 58682cd038dSYoshinobu Inoue } else { 58782cd038dSYoshinobu Inoue /* Multicast */ 58882cd038dSYoshinobu Inoue struct in6_multi *in6m; 58982cd038dSYoshinobu Inoue 59082cd038dSYoshinobu Inoue m->m_flags = (m->m_flags & ~M_BCAST) | M_MCAST; 59182cd038dSYoshinobu Inoue 59282cd038dSYoshinobu Inoue /* 59382cd038dSYoshinobu Inoue * See if the caller provided any multicast options 59482cd038dSYoshinobu Inoue */ 59582cd038dSYoshinobu Inoue ifp = NULL; 59682cd038dSYoshinobu Inoue if (im6o != NULL) { 59782cd038dSYoshinobu Inoue ip6->ip6_hlim = im6o->im6o_multicast_hlim; 59882cd038dSYoshinobu Inoue if (im6o->im6o_multicast_ifp != NULL) 59982cd038dSYoshinobu Inoue ifp = im6o->im6o_multicast_ifp; 60082cd038dSYoshinobu Inoue } else 60182cd038dSYoshinobu Inoue ip6->ip6_hlim = ip6_defmcasthlim; 60282cd038dSYoshinobu Inoue 60382cd038dSYoshinobu Inoue /* 60482cd038dSYoshinobu Inoue * See if the caller provided the outgoing interface 60582cd038dSYoshinobu Inoue * as an ancillary data. 60682cd038dSYoshinobu Inoue * Boundary check for ifindex is assumed to be already done. 60782cd038dSYoshinobu Inoue */ 60882cd038dSYoshinobu Inoue if (opt && opt->ip6po_pktinfo && opt->ip6po_pktinfo->ipi6_ifindex) 60982cd038dSYoshinobu Inoue ifp = ifindex2ifnet[opt->ip6po_pktinfo->ipi6_ifindex]; 61082cd038dSYoshinobu Inoue 61182cd038dSYoshinobu Inoue /* 61282cd038dSYoshinobu Inoue * If the destination is a node-local scope multicast, 61382cd038dSYoshinobu Inoue * the packet should be loop-backed only. 61482cd038dSYoshinobu Inoue */ 61582cd038dSYoshinobu Inoue if (IN6_IS_ADDR_MC_NODELOCAL(&ip6->ip6_dst)) { 61682cd038dSYoshinobu Inoue /* 61782cd038dSYoshinobu Inoue * If the outgoing interface is already specified, 61882cd038dSYoshinobu Inoue * it should be a loopback interface. 61982cd038dSYoshinobu Inoue */ 62082cd038dSYoshinobu Inoue if (ifp && (ifp->if_flags & IFF_LOOPBACK) == 0) { 62182cd038dSYoshinobu Inoue ip6stat.ip6s_badscope++; 62282cd038dSYoshinobu Inoue error = ENETUNREACH; /* XXX: better error? */ 62382cd038dSYoshinobu Inoue /* XXX correct ifp? */ 62482cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_discard); 62582cd038dSYoshinobu Inoue goto bad; 62682cd038dSYoshinobu Inoue } else { 62782cd038dSYoshinobu Inoue ifp = &loif[0]; 62882cd038dSYoshinobu Inoue } 62982cd038dSYoshinobu Inoue } 63082cd038dSYoshinobu Inoue 63182cd038dSYoshinobu Inoue if (opt && opt->ip6po_hlim != -1) 63282cd038dSYoshinobu Inoue ip6->ip6_hlim = opt->ip6po_hlim & 0xff; 63382cd038dSYoshinobu Inoue 63482cd038dSYoshinobu Inoue /* 63582cd038dSYoshinobu Inoue * If caller did not provide an interface lookup a 63682cd038dSYoshinobu Inoue * default in the routing table. This is either a 63782cd038dSYoshinobu Inoue * default for the speicfied group (i.e. a host 63882cd038dSYoshinobu Inoue * route), or a multicast default (a route for the 63982cd038dSYoshinobu Inoue * ``net'' ff00::/8). 64082cd038dSYoshinobu Inoue */ 64182cd038dSYoshinobu Inoue if (ifp == NULL) { 64282cd038dSYoshinobu Inoue if (ro->ro_rt == 0) { 64382cd038dSYoshinobu Inoue ro->ro_rt = rtalloc1((struct sockaddr *) 64482cd038dSYoshinobu Inoue &ro->ro_dst, 0, 0UL); 64582cd038dSYoshinobu Inoue } 64682cd038dSYoshinobu Inoue if (ro->ro_rt == 0) { 64782cd038dSYoshinobu Inoue ip6stat.ip6s_noroute++; 64882cd038dSYoshinobu Inoue error = EHOSTUNREACH; 64982cd038dSYoshinobu Inoue /* XXX in6_ifstat_inc(ifp, ifs6_out_discard) */ 65082cd038dSYoshinobu Inoue goto bad; 65182cd038dSYoshinobu Inoue } 65282cd038dSYoshinobu Inoue ia = ifatoia6(ro->ro_rt->rt_ifa); 65382cd038dSYoshinobu Inoue ifp = ro->ro_rt->rt_ifp; 65482cd038dSYoshinobu Inoue ro->ro_rt->rt_use++; 65582cd038dSYoshinobu Inoue } 65682cd038dSYoshinobu Inoue 65782cd038dSYoshinobu Inoue if ((flags & IPV6_FORWARDING) == 0) 65882cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_request); 65982cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_mcast); 66082cd038dSYoshinobu Inoue 66182cd038dSYoshinobu Inoue /* 66282cd038dSYoshinobu Inoue * Confirm that the outgoing interface supports multicast. 66382cd038dSYoshinobu Inoue */ 66482cd038dSYoshinobu Inoue if ((ifp->if_flags & IFF_MULTICAST) == 0) { 66582cd038dSYoshinobu Inoue ip6stat.ip6s_noroute++; 66682cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_discard); 66782cd038dSYoshinobu Inoue error = ENETUNREACH; 66882cd038dSYoshinobu Inoue goto bad; 66982cd038dSYoshinobu Inoue } 67082cd038dSYoshinobu Inoue IN6_LOOKUP_MULTI(ip6->ip6_dst, ifp, in6m); 67182cd038dSYoshinobu Inoue if (in6m != NULL && 67282cd038dSYoshinobu Inoue (im6o == NULL || im6o->im6o_multicast_loop)) { 67382cd038dSYoshinobu Inoue /* 67482cd038dSYoshinobu Inoue * If we belong to the destination multicast group 67582cd038dSYoshinobu Inoue * on the outgoing interface, and the caller did not 67682cd038dSYoshinobu Inoue * forbid loopback, loop back a copy. 67782cd038dSYoshinobu Inoue */ 67882cd038dSYoshinobu Inoue ip6_mloopback(ifp, m, dst); 67991ec0a1eSYoshinobu Inoue } else { 68091ec0a1eSYoshinobu Inoue /* 68191ec0a1eSYoshinobu Inoue * If we are acting as a multicast router, perform 68291ec0a1eSYoshinobu Inoue * multicast forwarding as if the packet had just 68391ec0a1eSYoshinobu Inoue * arrived on the interface to which we are about 68491ec0a1eSYoshinobu Inoue * to send. The multicast forwarding function 68591ec0a1eSYoshinobu Inoue * recursively calls this function, using the 68691ec0a1eSYoshinobu Inoue * IPV6_FORWARDING flag to prevent infinite recursion. 68791ec0a1eSYoshinobu Inoue * 68891ec0a1eSYoshinobu Inoue * Multicasts that are looped back by ip6_mloopback(), 68991ec0a1eSYoshinobu Inoue * above, will be forwarded by the ip6_input() routine, 69091ec0a1eSYoshinobu Inoue * if necessary. 69191ec0a1eSYoshinobu Inoue */ 69291ec0a1eSYoshinobu Inoue if (ip6_mrouter && (flags & IPV6_FORWARDING) == 0) { 693686cdd19SJun-ichiro itojun Hagino if (ip6_mforward(ip6, ifp, m) != 0) { 69491ec0a1eSYoshinobu Inoue m_freem(m); 69591ec0a1eSYoshinobu Inoue goto done; 69691ec0a1eSYoshinobu Inoue } 69791ec0a1eSYoshinobu Inoue } 69882cd038dSYoshinobu Inoue } 69982cd038dSYoshinobu Inoue /* 70082cd038dSYoshinobu Inoue * Multicasts with a hoplimit of zero may be looped back, 70182cd038dSYoshinobu Inoue * above, but must not be transmitted on a network. 70282cd038dSYoshinobu Inoue * Also, multicasts addressed to the loopback interface 70382cd038dSYoshinobu Inoue * are not sent -- the above call to ip6_mloopback() will 70482cd038dSYoshinobu Inoue * loop back a copy if this host actually belongs to the 70582cd038dSYoshinobu Inoue * destination group on the loopback interface. 70682cd038dSYoshinobu Inoue */ 70782cd038dSYoshinobu Inoue if (ip6->ip6_hlim == 0 || (ifp->if_flags & IFF_LOOPBACK)) { 70882cd038dSYoshinobu Inoue m_freem(m); 70982cd038dSYoshinobu Inoue goto done; 71082cd038dSYoshinobu Inoue } 71182cd038dSYoshinobu Inoue } 71282cd038dSYoshinobu Inoue 71382cd038dSYoshinobu Inoue /* 71482cd038dSYoshinobu Inoue * Fill the outgoing inteface to tell the upper layer 71582cd038dSYoshinobu Inoue * to increment per-interface statistics. 71682cd038dSYoshinobu Inoue */ 71782cd038dSYoshinobu Inoue if (ifpp) 71882cd038dSYoshinobu Inoue *ifpp = ifp; 71982cd038dSYoshinobu Inoue 72082cd038dSYoshinobu Inoue /* 72182cd038dSYoshinobu Inoue * Determine path MTU. 72282cd038dSYoshinobu Inoue */ 72382cd038dSYoshinobu Inoue if (ro_pmtu != ro) { 72482cd038dSYoshinobu Inoue /* The first hop and the final destination may differ. */ 72582cd038dSYoshinobu Inoue struct sockaddr_in6 *sin6_fin = 72682cd038dSYoshinobu Inoue (struct sockaddr_in6 *)&ro_pmtu->ro_dst; 72782cd038dSYoshinobu Inoue if (ro_pmtu->ro_rt && ((ro->ro_rt->rt_flags & RTF_UP) == 0 || 72882cd038dSYoshinobu Inoue !IN6_ARE_ADDR_EQUAL(&sin6_fin->sin6_addr, 72982cd038dSYoshinobu Inoue &finaldst))) { 73082cd038dSYoshinobu Inoue RTFREE(ro_pmtu->ro_rt); 73182cd038dSYoshinobu Inoue ro_pmtu->ro_rt = (struct rtentry *)0; 73282cd038dSYoshinobu Inoue } 73382cd038dSYoshinobu Inoue if (ro_pmtu->ro_rt == 0) { 73482cd038dSYoshinobu Inoue bzero(sin6_fin, sizeof(*sin6_fin)); 73582cd038dSYoshinobu Inoue sin6_fin->sin6_family = AF_INET6; 73682cd038dSYoshinobu Inoue sin6_fin->sin6_len = sizeof(struct sockaddr_in6); 73782cd038dSYoshinobu Inoue sin6_fin->sin6_addr = finaldst; 73882cd038dSYoshinobu Inoue 739ae5bcbffSYoshinobu Inoue rtalloc((struct route *)ro_pmtu); 74082cd038dSYoshinobu Inoue } 74182cd038dSYoshinobu Inoue } 74282cd038dSYoshinobu Inoue if (ro_pmtu->ro_rt != NULL) { 74382cd038dSYoshinobu Inoue u_int32_t ifmtu = nd_ifinfo[ifp->if_index].linkmtu; 74482cd038dSYoshinobu Inoue 74582cd038dSYoshinobu Inoue mtu = ro_pmtu->ro_rt->rt_rmx.rmx_mtu; 74682cd038dSYoshinobu Inoue if (mtu > ifmtu) { 74782cd038dSYoshinobu Inoue /* 74882cd038dSYoshinobu Inoue * The MTU on the route is larger than the MTU on 74982cd038dSYoshinobu Inoue * the interface! This shouldn't happen, unless the 75082cd038dSYoshinobu Inoue * MTU of the interface has been changed after the 75182cd038dSYoshinobu Inoue * interface was brought up. Change the MTU in the 75282cd038dSYoshinobu Inoue * route to match the interface MTU (as long as the 75382cd038dSYoshinobu Inoue * field isn't locked). 75482cd038dSYoshinobu Inoue */ 75582cd038dSYoshinobu Inoue mtu = ifmtu; 75682cd038dSYoshinobu Inoue if ((ro_pmtu->ro_rt->rt_rmx.rmx_locks & RTV_MTU) == 0) 75782cd038dSYoshinobu Inoue ro_pmtu->ro_rt->rt_rmx.rmx_mtu = mtu; /* XXX */ 75882cd038dSYoshinobu Inoue } 75982cd038dSYoshinobu Inoue } else { 76082cd038dSYoshinobu Inoue mtu = nd_ifinfo[ifp->if_index].linkmtu; 76182cd038dSYoshinobu Inoue } 76282cd038dSYoshinobu Inoue 763686cdd19SJun-ichiro itojun Hagino /* Fake scoped addresses */ 764686cdd19SJun-ichiro itojun Hagino if ((ifp->if_flags & IFF_LOOPBACK) != 0) { 76582cd038dSYoshinobu Inoue /* 766686cdd19SJun-ichiro itojun Hagino * If source or destination address is a scoped address, and 767686cdd19SJun-ichiro itojun Hagino * the packet is going to be sent to a loopback interface, 768686cdd19SJun-ichiro itojun Hagino * we should keep the original interface. 76982cd038dSYoshinobu Inoue */ 770686cdd19SJun-ichiro itojun Hagino 771686cdd19SJun-ichiro itojun Hagino /* 772686cdd19SJun-ichiro itojun Hagino * XXX: this is a very experimental and temporary solution. 773686cdd19SJun-ichiro itojun Hagino * We eventually have sockaddr_in6 and use the sin6_scope_id 774686cdd19SJun-ichiro itojun Hagino * field of the structure here. 775686cdd19SJun-ichiro itojun Hagino * We rely on the consistency between two scope zone ids 776686cdd19SJun-ichiro itojun Hagino * of source add destination, which should already be assured 777686cdd19SJun-ichiro itojun Hagino * Larger scopes than link will be supported in the near 778686cdd19SJun-ichiro itojun Hagino * future. 779686cdd19SJun-ichiro itojun Hagino */ 780686cdd19SJun-ichiro itojun Hagino if (IN6_IS_SCOPE_LINKLOCAL(&ip6->ip6_src)) 781686cdd19SJun-ichiro itojun Hagino origifp = ifindex2ifnet[ntohs(ip6->ip6_src.s6_addr16[1])]; 782686cdd19SJun-ichiro itojun Hagino else if (IN6_IS_SCOPE_LINKLOCAL(&ip6->ip6_dst)) 783686cdd19SJun-ichiro itojun Hagino origifp = ifindex2ifnet[ntohs(ip6->ip6_dst.s6_addr16[1])]; 784686cdd19SJun-ichiro itojun Hagino else 785686cdd19SJun-ichiro itojun Hagino origifp = ifp; 786686cdd19SJun-ichiro itojun Hagino } 787686cdd19SJun-ichiro itojun Hagino else 788686cdd19SJun-ichiro itojun Hagino origifp = ifp; 789686cdd19SJun-ichiro itojun Hagino #ifndef FAKE_LOOPBACK_IF 790686cdd19SJun-ichiro itojun Hagino if ((ifp->if_flags & IFF_LOOPBACK) == 0) 791686cdd19SJun-ichiro itojun Hagino #else 792686cdd19SJun-ichiro itojun Hagino if (1) 793686cdd19SJun-ichiro itojun Hagino #endif 794686cdd19SJun-ichiro itojun Hagino { 79582cd038dSYoshinobu Inoue if (IN6_IS_SCOPE_LINKLOCAL(&ip6->ip6_src)) 79682cd038dSYoshinobu Inoue ip6->ip6_src.s6_addr16[1] = 0; 79782cd038dSYoshinobu Inoue if (IN6_IS_SCOPE_LINKLOCAL(&ip6->ip6_dst)) 79882cd038dSYoshinobu Inoue ip6->ip6_dst.s6_addr16[1] = 0; 79982cd038dSYoshinobu Inoue } 80082cd038dSYoshinobu Inoue 80182cd038dSYoshinobu Inoue #ifdef IPV6FIREWALL 80282cd038dSYoshinobu Inoue /* 80382cd038dSYoshinobu Inoue * Check with the firewall... 80482cd038dSYoshinobu Inoue */ 80582cd038dSYoshinobu Inoue if (ip6_fw_chk_ptr) { 80682cd038dSYoshinobu Inoue u_short port = 0; 807686cdd19SJun-ichiro itojun Hagino m->m_pkthdr.rcvif = NULL; /*XXX*/ 80882cd038dSYoshinobu Inoue /* If ipfw says divert, we have to just drop packet */ 80982cd038dSYoshinobu Inoue if ((*ip6_fw_chk_ptr)(&ip6, ifp, &port, &m)) { 81082cd038dSYoshinobu Inoue m_freem(m); 81182cd038dSYoshinobu Inoue goto done; 81282cd038dSYoshinobu Inoue } 81382cd038dSYoshinobu Inoue if (!m) { 81482cd038dSYoshinobu Inoue error = EACCES; 81582cd038dSYoshinobu Inoue goto done; 81682cd038dSYoshinobu Inoue } 81782cd038dSYoshinobu Inoue } 81882cd038dSYoshinobu Inoue #endif 81982cd038dSYoshinobu Inoue 82082cd038dSYoshinobu Inoue /* 82182cd038dSYoshinobu Inoue * If the outgoing packet contains a hop-by-hop options header, 82282cd038dSYoshinobu Inoue * it must be examined and processed even by the source node. 82382cd038dSYoshinobu Inoue * (RFC 2460, section 4.) 82482cd038dSYoshinobu Inoue */ 82582cd038dSYoshinobu Inoue if (exthdrs.ip6e_hbh) { 82682cd038dSYoshinobu Inoue struct ip6_hbh *hbh = mtod(exthdrs.ip6e_hbh, 82782cd038dSYoshinobu Inoue struct ip6_hbh *); 82882cd038dSYoshinobu Inoue u_int32_t dummy1; /* XXX unused */ 82982cd038dSYoshinobu Inoue u_int32_t dummy2; /* XXX unused */ 83082cd038dSYoshinobu Inoue 83182cd038dSYoshinobu Inoue /* 83282cd038dSYoshinobu Inoue * XXX: if we have to send an ICMPv6 error to the sender, 83382cd038dSYoshinobu Inoue * we need the M_LOOP flag since icmp6_error() expects 83482cd038dSYoshinobu Inoue * the IPv6 and the hop-by-hop options header are 83582cd038dSYoshinobu Inoue * continuous unless the flag is set. 83682cd038dSYoshinobu Inoue */ 83782cd038dSYoshinobu Inoue m->m_flags |= M_LOOP; 83882cd038dSYoshinobu Inoue m->m_pkthdr.rcvif = ifp; 83982cd038dSYoshinobu Inoue if (ip6_process_hopopts(m, 84082cd038dSYoshinobu Inoue (u_int8_t *)(hbh + 1), 84182cd038dSYoshinobu Inoue ((hbh->ip6h_len + 1) << 3) - 84282cd038dSYoshinobu Inoue sizeof(struct ip6_hbh), 84382cd038dSYoshinobu Inoue &dummy1, &dummy2) < 0) { 84482cd038dSYoshinobu Inoue /* m was already freed at this point */ 84582cd038dSYoshinobu Inoue error = EINVAL;/* better error? */ 84682cd038dSYoshinobu Inoue goto done; 84782cd038dSYoshinobu Inoue } 84882cd038dSYoshinobu Inoue m->m_flags &= ~M_LOOP; /* XXX */ 84982cd038dSYoshinobu Inoue m->m_pkthdr.rcvif = NULL; 85082cd038dSYoshinobu Inoue } 85182cd038dSYoshinobu Inoue 852c4ac87eaSDarren Reed #ifdef PFIL_HOOKS 853c4ac87eaSDarren Reed /* 854c4ac87eaSDarren Reed * Run through list of hooks for output packets. 855c4ac87eaSDarren Reed */ 856c4ac87eaSDarren Reed m1 = m; 857c4ac87eaSDarren Reed pfh = pfil_hook_get(PFIL_OUT, &inetsw[ip_protox[IPPROTO_IPV6]].pr_pfh); 858c4ac87eaSDarren Reed for (; pfh; pfh = pfh->pfil_link.tqe_next) 859c4ac87eaSDarren Reed if (pfh->pfil_func) { 860c4ac87eaSDarren Reed rv = pfh->pfil_func(ip6, sizeof(*ip6), ifp, 1, &m1); 861c4ac87eaSDarren Reed if (rv) { 862c4ac87eaSDarren Reed error = EHOSTUNREACH; 863c4ac87eaSDarren Reed goto done; 864c4ac87eaSDarren Reed } 865c4ac87eaSDarren Reed m = m1; 866c4ac87eaSDarren Reed if (m == NULL) 867c4ac87eaSDarren Reed goto done; 868c4ac87eaSDarren Reed ip6 = mtod(m, struct ip6_hdr *); 869c4ac87eaSDarren Reed } 870c4ac87eaSDarren Reed #endif /* PFIL_HOOKS */ 87182cd038dSYoshinobu Inoue /* 87282cd038dSYoshinobu Inoue * Send the packet to the outgoing interface. 87382cd038dSYoshinobu Inoue * If necessary, do IPv6 fragmentation before sending. 87482cd038dSYoshinobu Inoue */ 87582cd038dSYoshinobu Inoue tlen = m->m_pkthdr.len; 87682cd038dSYoshinobu Inoue if (tlen <= mtu 87782cd038dSYoshinobu Inoue #ifdef notyet 87882cd038dSYoshinobu Inoue /* 87982cd038dSYoshinobu Inoue * On any link that cannot convey a 1280-octet packet in one piece, 88082cd038dSYoshinobu Inoue * link-specific fragmentation and reassembly must be provided at 88182cd038dSYoshinobu Inoue * a layer below IPv6. [RFC 2460, sec.5] 88282cd038dSYoshinobu Inoue * Thus if the interface has ability of link-level fragmentation, 88382cd038dSYoshinobu Inoue * we can just send the packet even if the packet size is 88482cd038dSYoshinobu Inoue * larger than the link's MTU. 88582cd038dSYoshinobu Inoue * XXX: IFF_FRAGMENTABLE (or such) flag has not been defined yet... 88682cd038dSYoshinobu Inoue */ 88782cd038dSYoshinobu Inoue 88882cd038dSYoshinobu Inoue || ifp->if_flags & IFF_FRAGMENTABLE 88982cd038dSYoshinobu Inoue #endif 89082cd038dSYoshinobu Inoue ) 89182cd038dSYoshinobu Inoue { 892686cdd19SJun-ichiro itojun Hagino error = nd6_output(ifp, origifp, m, dst, ro->ro_rt); 89382cd038dSYoshinobu Inoue goto done; 89482cd038dSYoshinobu Inoue } else if (mtu < IPV6_MMTU) { 89582cd038dSYoshinobu Inoue /* 89682cd038dSYoshinobu Inoue * note that path MTU is never less than IPV6_MMTU 89782cd038dSYoshinobu Inoue * (see icmp6_input). 89882cd038dSYoshinobu Inoue */ 89982cd038dSYoshinobu Inoue error = EMSGSIZE; 90082cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_fragfail); 90182cd038dSYoshinobu Inoue goto bad; 90282cd038dSYoshinobu Inoue } else if (ip6->ip6_plen == 0) { /* jumbo payload cannot be fragmented */ 90382cd038dSYoshinobu Inoue error = EMSGSIZE; 90482cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_fragfail); 90582cd038dSYoshinobu Inoue goto bad; 90682cd038dSYoshinobu Inoue } else { 90782cd038dSYoshinobu Inoue struct mbuf **mnext, *m_frgpart; 90882cd038dSYoshinobu Inoue struct ip6_frag *ip6f; 90982cd038dSYoshinobu Inoue u_int32_t id = htonl(ip6_id++); 91082cd038dSYoshinobu Inoue u_char nextproto; 91182cd038dSYoshinobu Inoue 91282cd038dSYoshinobu Inoue /* 91382cd038dSYoshinobu Inoue * Too large for the destination or interface; 91482cd038dSYoshinobu Inoue * fragment if possible. 91582cd038dSYoshinobu Inoue * Must be able to put at least 8 bytes per fragment. 91682cd038dSYoshinobu Inoue */ 91782cd038dSYoshinobu Inoue hlen = unfragpartlen; 91882cd038dSYoshinobu Inoue if (mtu > IPV6_MAXPACKET) 91982cd038dSYoshinobu Inoue mtu = IPV6_MAXPACKET; 92082cd038dSYoshinobu Inoue len = (mtu - hlen - sizeof(struct ip6_frag)) & ~7; 92182cd038dSYoshinobu Inoue if (len < 8) { 92282cd038dSYoshinobu Inoue error = EMSGSIZE; 92382cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_fragfail); 92482cd038dSYoshinobu Inoue goto bad; 92582cd038dSYoshinobu Inoue } 92682cd038dSYoshinobu Inoue 92782cd038dSYoshinobu Inoue mnext = &m->m_nextpkt; 92882cd038dSYoshinobu Inoue 92982cd038dSYoshinobu Inoue /* 93082cd038dSYoshinobu Inoue * Change the next header field of the last header in the 93182cd038dSYoshinobu Inoue * unfragmentable part. 93282cd038dSYoshinobu Inoue */ 93382cd038dSYoshinobu Inoue if (exthdrs.ip6e_rthdr) { 93482cd038dSYoshinobu Inoue nextproto = *mtod(exthdrs.ip6e_rthdr, u_char *); 93582cd038dSYoshinobu Inoue *mtod(exthdrs.ip6e_rthdr, u_char *) = IPPROTO_FRAGMENT; 93682cd038dSYoshinobu Inoue } else if (exthdrs.ip6e_dest1) { 93782cd038dSYoshinobu Inoue nextproto = *mtod(exthdrs.ip6e_dest1, u_char *); 93882cd038dSYoshinobu Inoue *mtod(exthdrs.ip6e_dest1, u_char *) = IPPROTO_FRAGMENT; 93982cd038dSYoshinobu Inoue } else if (exthdrs.ip6e_hbh) { 94082cd038dSYoshinobu Inoue nextproto = *mtod(exthdrs.ip6e_hbh, u_char *); 94182cd038dSYoshinobu Inoue *mtod(exthdrs.ip6e_hbh, u_char *) = IPPROTO_FRAGMENT; 94282cd038dSYoshinobu Inoue } else { 94382cd038dSYoshinobu Inoue nextproto = ip6->ip6_nxt; 94482cd038dSYoshinobu Inoue ip6->ip6_nxt = IPPROTO_FRAGMENT; 94582cd038dSYoshinobu Inoue } 94682cd038dSYoshinobu Inoue 94782cd038dSYoshinobu Inoue /* 94882cd038dSYoshinobu Inoue * Loop through length of segment after first fragment, 94982cd038dSYoshinobu Inoue * make new header and copy data of each part and link onto chain. 95082cd038dSYoshinobu Inoue */ 95182cd038dSYoshinobu Inoue m0 = m; 95282cd038dSYoshinobu Inoue for (off = hlen; off < tlen; off += len) { 95382cd038dSYoshinobu Inoue MGETHDR(m, M_DONTWAIT, MT_HEADER); 95482cd038dSYoshinobu Inoue if (!m) { 95582cd038dSYoshinobu Inoue error = ENOBUFS; 95682cd038dSYoshinobu Inoue ip6stat.ip6s_odropped++; 95782cd038dSYoshinobu Inoue goto sendorfree; 95882cd038dSYoshinobu Inoue } 95982cd038dSYoshinobu Inoue m->m_flags = m0->m_flags & M_COPYFLAGS; 96082cd038dSYoshinobu Inoue *mnext = m; 96182cd038dSYoshinobu Inoue mnext = &m->m_nextpkt; 96282cd038dSYoshinobu Inoue m->m_data += max_linkhdr; 96382cd038dSYoshinobu Inoue mhip6 = mtod(m, struct ip6_hdr *); 96482cd038dSYoshinobu Inoue *mhip6 = *ip6; 96582cd038dSYoshinobu Inoue m->m_len = sizeof(*mhip6); 96682cd038dSYoshinobu Inoue error = ip6_insertfraghdr(m0, m, hlen, &ip6f); 96782cd038dSYoshinobu Inoue if (error) { 96882cd038dSYoshinobu Inoue ip6stat.ip6s_odropped++; 96982cd038dSYoshinobu Inoue goto sendorfree; 97082cd038dSYoshinobu Inoue } 97182cd038dSYoshinobu Inoue ip6f->ip6f_offlg = htons((u_short)((off - hlen) & ~7)); 97282cd038dSYoshinobu Inoue if (off + len >= tlen) 97382cd038dSYoshinobu Inoue len = tlen - off; 97482cd038dSYoshinobu Inoue else 97582cd038dSYoshinobu Inoue ip6f->ip6f_offlg |= IP6F_MORE_FRAG; 97682cd038dSYoshinobu Inoue mhip6->ip6_plen = htons((u_short)(len + hlen + 97782cd038dSYoshinobu Inoue sizeof(*ip6f) - 97882cd038dSYoshinobu Inoue sizeof(struct ip6_hdr))); 97982cd038dSYoshinobu Inoue if ((m_frgpart = m_copy(m0, off, len)) == 0) { 98082cd038dSYoshinobu Inoue error = ENOBUFS; 98182cd038dSYoshinobu Inoue ip6stat.ip6s_odropped++; 98282cd038dSYoshinobu Inoue goto sendorfree; 98382cd038dSYoshinobu Inoue } 98482cd038dSYoshinobu Inoue m_cat(m, m_frgpart); 98582cd038dSYoshinobu Inoue m->m_pkthdr.len = len + hlen + sizeof(*ip6f); 98682cd038dSYoshinobu Inoue m->m_pkthdr.rcvif = (struct ifnet *)0; 98782cd038dSYoshinobu Inoue ip6f->ip6f_reserved = 0; 98882cd038dSYoshinobu Inoue ip6f->ip6f_ident = id; 98982cd038dSYoshinobu Inoue ip6f->ip6f_nxt = nextproto; 99082cd038dSYoshinobu Inoue ip6stat.ip6s_ofragments++; 99182cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_fragcreat); 99282cd038dSYoshinobu Inoue } 99382cd038dSYoshinobu Inoue 99482cd038dSYoshinobu Inoue in6_ifstat_inc(ifp, ifs6_out_fragok); 99582cd038dSYoshinobu Inoue } 99682cd038dSYoshinobu Inoue 99782cd038dSYoshinobu Inoue /* 99882cd038dSYoshinobu Inoue * Remove leading garbages. 99982cd038dSYoshinobu Inoue */ 100082cd038dSYoshinobu Inoue sendorfree: 100182cd038dSYoshinobu Inoue m = m0->m_nextpkt; 100282cd038dSYoshinobu Inoue m0->m_nextpkt = 0; 100382cd038dSYoshinobu Inoue m_freem(m0); 100482cd038dSYoshinobu Inoue for (m0 = m; m; m = m0) { 100582cd038dSYoshinobu Inoue m0 = m->m_nextpkt; 100682cd038dSYoshinobu Inoue m->m_nextpkt = 0; 100782cd038dSYoshinobu Inoue if (error == 0) { 1008686cdd19SJun-ichiro itojun Hagino error = nd6_output(ifp, origifp, m, dst, ro->ro_rt); 100982cd038dSYoshinobu Inoue } else 101082cd038dSYoshinobu Inoue m_freem(m); 101182cd038dSYoshinobu Inoue } 101282cd038dSYoshinobu Inoue 101382cd038dSYoshinobu Inoue if (error == 0) 101482cd038dSYoshinobu Inoue ip6stat.ip6s_fragmented++; 101582cd038dSYoshinobu Inoue 101682cd038dSYoshinobu Inoue done: 101782cd038dSYoshinobu Inoue if (ro == &ip6route && ro->ro_rt) { /* brace necessary for RTFREE */ 101882cd038dSYoshinobu Inoue RTFREE(ro->ro_rt); 101982cd038dSYoshinobu Inoue } else if (ro_pmtu == &ip6route && ro_pmtu->ro_rt) { 102082cd038dSYoshinobu Inoue RTFREE(ro_pmtu->ro_rt); 102182cd038dSYoshinobu Inoue } 102282cd038dSYoshinobu Inoue 102382cd038dSYoshinobu Inoue #ifdef IPSEC 102482cd038dSYoshinobu Inoue if (sp != NULL) 102582cd038dSYoshinobu Inoue key_freesp(sp); 102682cd038dSYoshinobu Inoue #endif /* IPSEC */ 102782cd038dSYoshinobu Inoue 102882cd038dSYoshinobu Inoue return(error); 102982cd038dSYoshinobu Inoue 103082cd038dSYoshinobu Inoue freehdrs: 103182cd038dSYoshinobu Inoue m_freem(exthdrs.ip6e_hbh); /* m_freem will check if mbuf is 0 */ 103282cd038dSYoshinobu Inoue m_freem(exthdrs.ip6e_dest1); 103382cd038dSYoshinobu Inoue m_freem(exthdrs.ip6e_rthdr); 103482cd038dSYoshinobu Inoue m_freem(exthdrs.ip6e_dest2); 103582cd038dSYoshinobu Inoue /* fall through */ 103682cd038dSYoshinobu Inoue bad: 103782cd038dSYoshinobu Inoue m_freem(m); 103882cd038dSYoshinobu Inoue goto done; 103982cd038dSYoshinobu Inoue } 104082cd038dSYoshinobu Inoue 104182cd038dSYoshinobu Inoue static int 104282cd038dSYoshinobu Inoue ip6_copyexthdr(mp, hdr, hlen) 104382cd038dSYoshinobu Inoue struct mbuf **mp; 104482cd038dSYoshinobu Inoue caddr_t hdr; 104582cd038dSYoshinobu Inoue int hlen; 104682cd038dSYoshinobu Inoue { 104782cd038dSYoshinobu Inoue struct mbuf *m; 104882cd038dSYoshinobu Inoue 104982cd038dSYoshinobu Inoue if (hlen > MCLBYTES) 105082cd038dSYoshinobu Inoue return(ENOBUFS); /* XXX */ 105182cd038dSYoshinobu Inoue 105282cd038dSYoshinobu Inoue MGET(m, M_DONTWAIT, MT_DATA); 105382cd038dSYoshinobu Inoue if (!m) 105482cd038dSYoshinobu Inoue return(ENOBUFS); 105582cd038dSYoshinobu Inoue 105682cd038dSYoshinobu Inoue if (hlen > MLEN) { 105782cd038dSYoshinobu Inoue MCLGET(m, M_DONTWAIT); 105882cd038dSYoshinobu Inoue if ((m->m_flags & M_EXT) == 0) { 105982cd038dSYoshinobu Inoue m_free(m); 106082cd038dSYoshinobu Inoue return(ENOBUFS); 106182cd038dSYoshinobu Inoue } 106282cd038dSYoshinobu Inoue } 106382cd038dSYoshinobu Inoue m->m_len = hlen; 106482cd038dSYoshinobu Inoue if (hdr) 106582cd038dSYoshinobu Inoue bcopy(hdr, mtod(m, caddr_t), hlen); 106682cd038dSYoshinobu Inoue 106782cd038dSYoshinobu Inoue *mp = m; 106882cd038dSYoshinobu Inoue return(0); 106982cd038dSYoshinobu Inoue } 107082cd038dSYoshinobu Inoue 107182cd038dSYoshinobu Inoue /* 107282cd038dSYoshinobu Inoue * Insert jumbo payload option. 107382cd038dSYoshinobu Inoue */ 107482cd038dSYoshinobu Inoue static int 107582cd038dSYoshinobu Inoue ip6_insert_jumboopt(exthdrs, plen) 107682cd038dSYoshinobu Inoue struct ip6_exthdrs *exthdrs; 107782cd038dSYoshinobu Inoue u_int32_t plen; 107882cd038dSYoshinobu Inoue { 107982cd038dSYoshinobu Inoue struct mbuf *mopt; 108082cd038dSYoshinobu Inoue u_char *optbuf; 108182cd038dSYoshinobu Inoue 108282cd038dSYoshinobu Inoue #define JUMBOOPTLEN 8 /* length of jumbo payload option and padding */ 108382cd038dSYoshinobu Inoue 108482cd038dSYoshinobu Inoue /* 108582cd038dSYoshinobu Inoue * If there is no hop-by-hop options header, allocate new one. 108682cd038dSYoshinobu Inoue * If there is one but it doesn't have enough space to store the 108782cd038dSYoshinobu Inoue * jumbo payload option, allocate a cluster to store the whole options. 108882cd038dSYoshinobu Inoue * Otherwise, use it to store the options. 108982cd038dSYoshinobu Inoue */ 109082cd038dSYoshinobu Inoue if (exthdrs->ip6e_hbh == 0) { 109182cd038dSYoshinobu Inoue MGET(mopt, M_DONTWAIT, MT_DATA); 109282cd038dSYoshinobu Inoue if (mopt == 0) 109382cd038dSYoshinobu Inoue return(ENOBUFS); 109482cd038dSYoshinobu Inoue mopt->m_len = JUMBOOPTLEN; 109582cd038dSYoshinobu Inoue optbuf = mtod(mopt, u_char *); 109682cd038dSYoshinobu Inoue optbuf[1] = 0; /* = ((JUMBOOPTLEN) >> 3) - 1 */ 109782cd038dSYoshinobu Inoue exthdrs->ip6e_hbh = mopt; 109882cd038dSYoshinobu Inoue } else { 109982cd038dSYoshinobu Inoue struct ip6_hbh *hbh; 110082cd038dSYoshinobu Inoue 110182cd038dSYoshinobu Inoue mopt = exthdrs->ip6e_hbh; 110282cd038dSYoshinobu Inoue if (M_TRAILINGSPACE(mopt) < JUMBOOPTLEN) { 110382cd038dSYoshinobu Inoue caddr_t oldoptp = mtod(mopt, caddr_t); 110482cd038dSYoshinobu Inoue int oldoptlen = mopt->m_len; 110582cd038dSYoshinobu Inoue 110682cd038dSYoshinobu Inoue if (mopt->m_flags & M_EXT) 110782cd038dSYoshinobu Inoue return(ENOBUFS); /* XXX */ 110882cd038dSYoshinobu Inoue MCLGET(mopt, M_DONTWAIT); 110982cd038dSYoshinobu Inoue if ((mopt->m_flags & M_EXT) == 0) 111082cd038dSYoshinobu Inoue return(ENOBUFS); 111182cd038dSYoshinobu Inoue 111282cd038dSYoshinobu Inoue bcopy(oldoptp, mtod(mopt, caddr_t), oldoptlen); 111382cd038dSYoshinobu Inoue optbuf = mtod(mopt, caddr_t) + oldoptlen; 111482cd038dSYoshinobu Inoue mopt->m_len = oldoptlen + JUMBOOPTLEN; 111582cd038dSYoshinobu Inoue } else { 111682cd038dSYoshinobu Inoue optbuf = mtod(mopt, u_char *) + mopt->m_len; 111782cd038dSYoshinobu Inoue mopt->m_len += JUMBOOPTLEN; 111882cd038dSYoshinobu Inoue } 111982cd038dSYoshinobu Inoue optbuf[0] = IP6OPT_PADN; 112082cd038dSYoshinobu Inoue optbuf[1] = 1; 112182cd038dSYoshinobu Inoue 112282cd038dSYoshinobu Inoue /* 112382cd038dSYoshinobu Inoue * Adjust the header length according to the pad and 112482cd038dSYoshinobu Inoue * the jumbo payload option. 112582cd038dSYoshinobu Inoue */ 112682cd038dSYoshinobu Inoue hbh = mtod(mopt, struct ip6_hbh *); 112782cd038dSYoshinobu Inoue hbh->ip6h_len += (JUMBOOPTLEN >> 3); 112882cd038dSYoshinobu Inoue } 112982cd038dSYoshinobu Inoue 113082cd038dSYoshinobu Inoue /* fill in the option. */ 113182cd038dSYoshinobu Inoue optbuf[2] = IP6OPT_JUMBO; 113282cd038dSYoshinobu Inoue optbuf[3] = 4; 113382cd038dSYoshinobu Inoue *(u_int32_t *)&optbuf[4] = htonl(plen + JUMBOOPTLEN); 113482cd038dSYoshinobu Inoue 113582cd038dSYoshinobu Inoue /* finally, adjust the packet header length */ 113682cd038dSYoshinobu Inoue exthdrs->ip6e_ip6->m_pkthdr.len += JUMBOOPTLEN; 113782cd038dSYoshinobu Inoue 113882cd038dSYoshinobu Inoue return(0); 113982cd038dSYoshinobu Inoue #undef JUMBOOPTLEN 114082cd038dSYoshinobu Inoue } 114182cd038dSYoshinobu Inoue 114282cd038dSYoshinobu Inoue /* 114382cd038dSYoshinobu Inoue * Insert fragment header and copy unfragmentable header portions. 114482cd038dSYoshinobu Inoue */ 114582cd038dSYoshinobu Inoue static int 114682cd038dSYoshinobu Inoue ip6_insertfraghdr(m0, m, hlen, frghdrp) 114782cd038dSYoshinobu Inoue struct mbuf *m0, *m; 114882cd038dSYoshinobu Inoue int hlen; 114982cd038dSYoshinobu Inoue struct ip6_frag **frghdrp; 115082cd038dSYoshinobu Inoue { 115182cd038dSYoshinobu Inoue struct mbuf *n, *mlast; 115282cd038dSYoshinobu Inoue 115382cd038dSYoshinobu Inoue if (hlen > sizeof(struct ip6_hdr)) { 115482cd038dSYoshinobu Inoue n = m_copym(m0, sizeof(struct ip6_hdr), 115582cd038dSYoshinobu Inoue hlen - sizeof(struct ip6_hdr), M_DONTWAIT); 115682cd038dSYoshinobu Inoue if (n == 0) 115782cd038dSYoshinobu Inoue return(ENOBUFS); 115882cd038dSYoshinobu Inoue m->m_next = n; 115982cd038dSYoshinobu Inoue } else 116082cd038dSYoshinobu Inoue n = m; 116182cd038dSYoshinobu Inoue 116282cd038dSYoshinobu Inoue /* Search for the last mbuf of unfragmentable part. */ 116382cd038dSYoshinobu Inoue for (mlast = n; mlast->m_next; mlast = mlast->m_next) 116482cd038dSYoshinobu Inoue ; 116582cd038dSYoshinobu Inoue 116682cd038dSYoshinobu Inoue if ((mlast->m_flags & M_EXT) == 0 && 1167686cdd19SJun-ichiro itojun Hagino M_TRAILINGSPACE(mlast) >= sizeof(struct ip6_frag)) { 116882cd038dSYoshinobu Inoue /* use the trailing space of the last mbuf for the fragment hdr */ 116982cd038dSYoshinobu Inoue *frghdrp = 117082cd038dSYoshinobu Inoue (struct ip6_frag *)(mtod(mlast, caddr_t) + mlast->m_len); 117182cd038dSYoshinobu Inoue mlast->m_len += sizeof(struct ip6_frag); 117282cd038dSYoshinobu Inoue m->m_pkthdr.len += sizeof(struct ip6_frag); 117382cd038dSYoshinobu Inoue } else { 117482cd038dSYoshinobu Inoue /* allocate a new mbuf for the fragment header */ 117582cd038dSYoshinobu Inoue struct mbuf *mfrg; 117682cd038dSYoshinobu Inoue 117782cd038dSYoshinobu Inoue MGET(mfrg, M_DONTWAIT, MT_DATA); 117882cd038dSYoshinobu Inoue if (mfrg == 0) 117982cd038dSYoshinobu Inoue return(ENOBUFS); 118082cd038dSYoshinobu Inoue mfrg->m_len = sizeof(struct ip6_frag); 118182cd038dSYoshinobu Inoue *frghdrp = mtod(mfrg, struct ip6_frag *); 118282cd038dSYoshinobu Inoue mlast->m_next = mfrg; 118382cd038dSYoshinobu Inoue } 118482cd038dSYoshinobu Inoue 118582cd038dSYoshinobu Inoue return(0); 118682cd038dSYoshinobu Inoue } 118782cd038dSYoshinobu Inoue 118882cd038dSYoshinobu Inoue /* 118982cd038dSYoshinobu Inoue * IP6 socket option processing. 119082cd038dSYoshinobu Inoue */ 119182cd038dSYoshinobu Inoue int 119282cd038dSYoshinobu Inoue ip6_ctloutput(so, sopt) 119382cd038dSYoshinobu Inoue struct socket *so; 119482cd038dSYoshinobu Inoue struct sockopt *sopt; 119582cd038dSYoshinobu Inoue { 119682cd038dSYoshinobu Inoue int privileged; 119782cd038dSYoshinobu Inoue register struct inpcb *in6p = sotoinpcb(so); 119882cd038dSYoshinobu Inoue int error, optval; 119982cd038dSYoshinobu Inoue int level, op, optname; 120082cd038dSYoshinobu Inoue int optlen; 120182cd038dSYoshinobu Inoue struct proc *p; 120282cd038dSYoshinobu Inoue 120382cd038dSYoshinobu Inoue if (sopt) { 120482cd038dSYoshinobu Inoue level = sopt->sopt_level; 120582cd038dSYoshinobu Inoue op = sopt->sopt_dir; 120682cd038dSYoshinobu Inoue optname = sopt->sopt_name; 120782cd038dSYoshinobu Inoue optlen = sopt->sopt_valsize; 120882cd038dSYoshinobu Inoue p = sopt->sopt_p; 120982cd038dSYoshinobu Inoue } else { 121082cd038dSYoshinobu Inoue panic("ip6_ctloutput: arg soopt is NULL"); 121182cd038dSYoshinobu Inoue } 121282cd038dSYoshinobu Inoue error = optval = 0; 121382cd038dSYoshinobu Inoue 121482cd038dSYoshinobu Inoue privileged = (p == 0 || suser(p)) ? 0 : 1; 121582cd038dSYoshinobu Inoue 121682cd038dSYoshinobu Inoue if (level == IPPROTO_IPV6) { 121782cd038dSYoshinobu Inoue switch (op) { 121882cd038dSYoshinobu Inoue case SOPT_SET: 121982cd038dSYoshinobu Inoue switch (optname) { 122082cd038dSYoshinobu Inoue case IPV6_PKTOPTIONS: 122182cd038dSYoshinobu Inoue { 122282cd038dSYoshinobu Inoue struct mbuf *m; 122382cd038dSYoshinobu Inoue 122482cd038dSYoshinobu Inoue error = soopt_getm(sopt, &m); /* XXX */ 1225369dc8ceSEivind Eklund if (error != 0) 122682cd038dSYoshinobu Inoue break; 122782cd038dSYoshinobu Inoue error = soopt_mcopyin(sopt, m); /* XXX */ 1228369dc8ceSEivind Eklund if (error != 0) 122982cd038dSYoshinobu Inoue break; 123082cd038dSYoshinobu Inoue return (ip6_pcbopts(&in6p->in6p_outputopts, 123182cd038dSYoshinobu Inoue m, so, sopt)); 123282cd038dSYoshinobu Inoue } 123382cd038dSYoshinobu Inoue case IPV6_HOPOPTS: 123482cd038dSYoshinobu Inoue case IPV6_DSTOPTS: 123582cd038dSYoshinobu Inoue if (!privileged) { 123682cd038dSYoshinobu Inoue error = EPERM; 123782cd038dSYoshinobu Inoue break; 123882cd038dSYoshinobu Inoue } 123982cd038dSYoshinobu Inoue /* fall through */ 124082cd038dSYoshinobu Inoue case IPV6_UNICAST_HOPS: 124182cd038dSYoshinobu Inoue case IPV6_PKTINFO: 124282cd038dSYoshinobu Inoue case IPV6_HOPLIMIT: 124382cd038dSYoshinobu Inoue case IPV6_RTHDR: 124482cd038dSYoshinobu Inoue case IPV6_CHECKSUM: 124582cd038dSYoshinobu Inoue case IPV6_FAITH: 124682cd038dSYoshinobu Inoue case IPV6_BINDV6ONLY: 124782cd038dSYoshinobu Inoue if (optlen != sizeof(int)) 124882cd038dSYoshinobu Inoue error = EINVAL; 124982cd038dSYoshinobu Inoue else { 125082cd038dSYoshinobu Inoue error = sooptcopyin(sopt, &optval, 125182cd038dSYoshinobu Inoue sizeof optval, sizeof optval); 125282cd038dSYoshinobu Inoue if (error) 125382cd038dSYoshinobu Inoue break; 125482cd038dSYoshinobu Inoue switch (optname) { 125582cd038dSYoshinobu Inoue 125682cd038dSYoshinobu Inoue case IPV6_UNICAST_HOPS: 125782cd038dSYoshinobu Inoue if (optval < -1 || optval >= 256) 125882cd038dSYoshinobu Inoue error = EINVAL; 125982cd038dSYoshinobu Inoue else { 126082cd038dSYoshinobu Inoue /* -1 = kernel default */ 126182cd038dSYoshinobu Inoue in6p->in6p_hops = optval; 126282cd038dSYoshinobu Inoue if ((in6p->in6p_vflag & 126382cd038dSYoshinobu Inoue INP_IPV4) != 0) 126482cd038dSYoshinobu Inoue in6p->inp_ip_ttl = optval; 126582cd038dSYoshinobu Inoue } 126682cd038dSYoshinobu Inoue break; 126782cd038dSYoshinobu Inoue #define OPTSET(bit) \ 126882cd038dSYoshinobu Inoue if (optval) \ 126982cd038dSYoshinobu Inoue in6p->in6p_flags |= bit; \ 127082cd038dSYoshinobu Inoue else \ 127182cd038dSYoshinobu Inoue in6p->in6p_flags &= ~bit; 127282cd038dSYoshinobu Inoue 127382cd038dSYoshinobu Inoue case IPV6_PKTINFO: 127482cd038dSYoshinobu Inoue OPTSET(IN6P_PKTINFO); 127582cd038dSYoshinobu Inoue break; 127682cd038dSYoshinobu Inoue 127782cd038dSYoshinobu Inoue case IPV6_HOPLIMIT: 127882cd038dSYoshinobu Inoue OPTSET(IN6P_HOPLIMIT); 127982cd038dSYoshinobu Inoue break; 128082cd038dSYoshinobu Inoue 128182cd038dSYoshinobu Inoue case IPV6_HOPOPTS: 128282cd038dSYoshinobu Inoue OPTSET(IN6P_HOPOPTS); 128382cd038dSYoshinobu Inoue break; 128482cd038dSYoshinobu Inoue 128582cd038dSYoshinobu Inoue case IPV6_DSTOPTS: 128682cd038dSYoshinobu Inoue OPTSET(IN6P_DSTOPTS); 128782cd038dSYoshinobu Inoue break; 128882cd038dSYoshinobu Inoue 128982cd038dSYoshinobu Inoue case IPV6_RTHDR: 129082cd038dSYoshinobu Inoue OPTSET(IN6P_RTHDR); 129182cd038dSYoshinobu Inoue break; 129282cd038dSYoshinobu Inoue 129382cd038dSYoshinobu Inoue case IPV6_CHECKSUM: 129482cd038dSYoshinobu Inoue in6p->in6p_cksum = optval; 129582cd038dSYoshinobu Inoue break; 129682cd038dSYoshinobu Inoue 129782cd038dSYoshinobu Inoue case IPV6_FAITH: 129882cd038dSYoshinobu Inoue OPTSET(IN6P_FAITH); 129982cd038dSYoshinobu Inoue break; 130082cd038dSYoshinobu Inoue 130182cd038dSYoshinobu Inoue case IPV6_BINDV6ONLY: 130282cd038dSYoshinobu Inoue OPTSET(IN6P_BINDV6ONLY); 130382cd038dSYoshinobu Inoue break; 130482cd038dSYoshinobu Inoue } 130582cd038dSYoshinobu Inoue } 130682cd038dSYoshinobu Inoue break; 130782cd038dSYoshinobu Inoue #undef OPTSET 130882cd038dSYoshinobu Inoue 130982cd038dSYoshinobu Inoue case IPV6_MULTICAST_IF: 131082cd038dSYoshinobu Inoue case IPV6_MULTICAST_HOPS: 131182cd038dSYoshinobu Inoue case IPV6_MULTICAST_LOOP: 131282cd038dSYoshinobu Inoue case IPV6_JOIN_GROUP: 131382cd038dSYoshinobu Inoue case IPV6_LEAVE_GROUP: 131482cd038dSYoshinobu Inoue { 131582cd038dSYoshinobu Inoue struct mbuf *m; 131682cd038dSYoshinobu Inoue if (sopt->sopt_valsize > MLEN) { 131782cd038dSYoshinobu Inoue error = EMSGSIZE; 131882cd038dSYoshinobu Inoue break; 131982cd038dSYoshinobu Inoue } 132082cd038dSYoshinobu Inoue /* XXX */ 132182cd038dSYoshinobu Inoue MGET(m, sopt->sopt_p ? M_WAIT : M_DONTWAIT, MT_HEADER); 132282cd038dSYoshinobu Inoue if (m == 0) { 132382cd038dSYoshinobu Inoue error = ENOBUFS; 132482cd038dSYoshinobu Inoue break; 132582cd038dSYoshinobu Inoue } 132682cd038dSYoshinobu Inoue m->m_len = sopt->sopt_valsize; 132782cd038dSYoshinobu Inoue error = sooptcopyin(sopt, mtod(m, char *), 132882cd038dSYoshinobu Inoue m->m_len, m->m_len); 132982cd038dSYoshinobu Inoue error = ip6_setmoptions(sopt->sopt_name, 133082cd038dSYoshinobu Inoue &in6p->in6p_moptions, 133182cd038dSYoshinobu Inoue m); 133282cd038dSYoshinobu Inoue (void)m_free(m); 133382cd038dSYoshinobu Inoue } 133482cd038dSYoshinobu Inoue break; 133582cd038dSYoshinobu Inoue 133682cd038dSYoshinobu Inoue case IPV6_PORTRANGE: 1337686cdd19SJun-ichiro itojun Hagino error = sooptcopyin(sopt, &optval, 1338686cdd19SJun-ichiro itojun Hagino sizeof optval, sizeof optval); 133982cd038dSYoshinobu Inoue if (error) 134082cd038dSYoshinobu Inoue break; 134182cd038dSYoshinobu Inoue 134282cd038dSYoshinobu Inoue switch (optval) { 134382cd038dSYoshinobu Inoue case IPV6_PORTRANGE_DEFAULT: 134482cd038dSYoshinobu Inoue in6p->in6p_flags &= ~(IN6P_LOWPORT); 134582cd038dSYoshinobu Inoue in6p->in6p_flags &= ~(IN6P_HIGHPORT); 134682cd038dSYoshinobu Inoue break; 134782cd038dSYoshinobu Inoue 134882cd038dSYoshinobu Inoue case IPV6_PORTRANGE_HIGH: 134982cd038dSYoshinobu Inoue in6p->in6p_flags &= ~(IN6P_LOWPORT); 135082cd038dSYoshinobu Inoue in6p->in6p_flags |= IN6P_HIGHPORT; 135182cd038dSYoshinobu Inoue break; 135282cd038dSYoshinobu Inoue 135382cd038dSYoshinobu Inoue case IPV6_PORTRANGE_LOW: 135482cd038dSYoshinobu Inoue in6p->in6p_flags &= ~(IN6P_HIGHPORT); 135582cd038dSYoshinobu Inoue in6p->in6p_flags |= IN6P_LOWPORT; 135682cd038dSYoshinobu Inoue break; 135782cd038dSYoshinobu Inoue 135882cd038dSYoshinobu Inoue default: 135982cd038dSYoshinobu Inoue error = EINVAL; 136082cd038dSYoshinobu Inoue break; 136182cd038dSYoshinobu Inoue } 136282cd038dSYoshinobu Inoue break; 136382cd038dSYoshinobu Inoue 136482cd038dSYoshinobu Inoue #ifdef IPSEC 136582cd038dSYoshinobu Inoue case IPV6_IPSEC_POLICY: 136682cd038dSYoshinobu Inoue { 136782cd038dSYoshinobu Inoue caddr_t req = NULL; 1368686cdd19SJun-ichiro itojun Hagino size_t len = 0; 136982cd038dSYoshinobu Inoue struct mbuf *m; 137082cd038dSYoshinobu Inoue 1371686cdd19SJun-ichiro itojun Hagino if ((error = soopt_getm(sopt, &m)) != 0) /* XXX */ 137282cd038dSYoshinobu Inoue break; 1373686cdd19SJun-ichiro itojun Hagino if ((error = soopt_mcopyin(sopt, m)) != 0) /* XXX */ 137482cd038dSYoshinobu Inoue break; 1375686cdd19SJun-ichiro itojun Hagino if (m) { 137682cd038dSYoshinobu Inoue req = mtod(m, caddr_t); 1377686cdd19SJun-ichiro itojun Hagino len = m->m_len; 1378686cdd19SJun-ichiro itojun Hagino } 137982cd038dSYoshinobu Inoue error = ipsec6_set_policy(in6p, optname, req, 1380686cdd19SJun-ichiro itojun Hagino len, privileged); 138182cd038dSYoshinobu Inoue m_freem(m); 138282cd038dSYoshinobu Inoue } 138382cd038dSYoshinobu Inoue break; 138482cd038dSYoshinobu Inoue #endif /* IPSEC */ 138582cd038dSYoshinobu Inoue 138682cd038dSYoshinobu Inoue #ifdef IPV6FIREWALL 138782cd038dSYoshinobu Inoue case IPV6_FW_ADD: 138882cd038dSYoshinobu Inoue case IPV6_FW_DEL: 138982cd038dSYoshinobu Inoue case IPV6_FW_FLUSH: 139082cd038dSYoshinobu Inoue case IPV6_FW_ZERO: 139182cd038dSYoshinobu Inoue { 139282cd038dSYoshinobu Inoue struct mbuf *m; 139382cd038dSYoshinobu Inoue struct mbuf **mp = &m; 139482cd038dSYoshinobu Inoue 139582cd038dSYoshinobu Inoue if (ip6_fw_ctl_ptr == NULL) 139682cd038dSYoshinobu Inoue return EINVAL; 13976a800098SYoshinobu Inoue if ((error = soopt_getm(sopt, &m)) 13986a800098SYoshinobu Inoue != 0) /* XXX */ 139982cd038dSYoshinobu Inoue break; 14006a800098SYoshinobu Inoue if ((error = soopt_mcopyin(sopt, m)) 14016a800098SYoshinobu Inoue != 0) /* XXX */ 140282cd038dSYoshinobu Inoue break; 140382cd038dSYoshinobu Inoue error = (*ip6_fw_ctl_ptr)(optname, mp); 140482cd038dSYoshinobu Inoue m = *mp; 140582cd038dSYoshinobu Inoue } 140682cd038dSYoshinobu Inoue break; 140782cd038dSYoshinobu Inoue #endif 140882cd038dSYoshinobu Inoue 140982cd038dSYoshinobu Inoue default: 141082cd038dSYoshinobu Inoue error = ENOPROTOOPT; 141182cd038dSYoshinobu Inoue break; 141282cd038dSYoshinobu Inoue } 141382cd038dSYoshinobu Inoue break; 141482cd038dSYoshinobu Inoue 141582cd038dSYoshinobu Inoue case SOPT_GET: 141682cd038dSYoshinobu Inoue switch (optname) { 141782cd038dSYoshinobu Inoue 141882cd038dSYoshinobu Inoue case IPV6_PKTOPTIONS: 141982cd038dSYoshinobu Inoue if (in6p->in6p_options) { 142082cd038dSYoshinobu Inoue error = soopt_mcopyout(sopt, 142182cd038dSYoshinobu Inoue in6p->in6p_options); 142282cd038dSYoshinobu Inoue } else 142382cd038dSYoshinobu Inoue sopt->sopt_valsize = 0; 142482cd038dSYoshinobu Inoue break; 142582cd038dSYoshinobu Inoue 142682cd038dSYoshinobu Inoue case IPV6_HOPOPTS: 142782cd038dSYoshinobu Inoue case IPV6_DSTOPTS: 142882cd038dSYoshinobu Inoue if (!privileged) { 142982cd038dSYoshinobu Inoue error = EPERM; 143082cd038dSYoshinobu Inoue break; 143182cd038dSYoshinobu Inoue } 143282cd038dSYoshinobu Inoue /* fall through */ 143382cd038dSYoshinobu Inoue case IPV6_UNICAST_HOPS: 143482cd038dSYoshinobu Inoue case IPV6_PKTINFO: 143582cd038dSYoshinobu Inoue case IPV6_HOPLIMIT: 143682cd038dSYoshinobu Inoue case IPV6_RTHDR: 143782cd038dSYoshinobu Inoue case IPV6_CHECKSUM: 143882cd038dSYoshinobu Inoue case IPV6_FAITH: 143982cd038dSYoshinobu Inoue case IPV6_BINDV6ONLY: 1440fa310a7eSYoshinobu Inoue case IPV6_PORTRANGE: 144182cd038dSYoshinobu Inoue switch (optname) { 144282cd038dSYoshinobu Inoue 144382cd038dSYoshinobu Inoue case IPV6_UNICAST_HOPS: 144482cd038dSYoshinobu Inoue optval = in6p->in6p_hops; 144582cd038dSYoshinobu Inoue break; 144682cd038dSYoshinobu Inoue 144782cd038dSYoshinobu Inoue #define OPTBIT(bit) (in6p->in6p_flags & bit ? 1 : 0) 144882cd038dSYoshinobu Inoue 144982cd038dSYoshinobu Inoue case IPV6_PKTINFO: 145082cd038dSYoshinobu Inoue optval = OPTBIT(IN6P_PKTINFO); 145182cd038dSYoshinobu Inoue break; 145282cd038dSYoshinobu Inoue 145382cd038dSYoshinobu Inoue case IPV6_HOPLIMIT: 145482cd038dSYoshinobu Inoue optval = OPTBIT(IN6P_HOPLIMIT); 145582cd038dSYoshinobu Inoue break; 145682cd038dSYoshinobu Inoue 145782cd038dSYoshinobu Inoue case IPV6_HOPOPTS: 145882cd038dSYoshinobu Inoue optval = OPTBIT(IN6P_HOPOPTS); 145982cd038dSYoshinobu Inoue break; 146082cd038dSYoshinobu Inoue 146182cd038dSYoshinobu Inoue case IPV6_DSTOPTS: 146282cd038dSYoshinobu Inoue optval = OPTBIT(IN6P_DSTOPTS); 146382cd038dSYoshinobu Inoue break; 146482cd038dSYoshinobu Inoue 146582cd038dSYoshinobu Inoue case IPV6_RTHDR: 146682cd038dSYoshinobu Inoue optval = OPTBIT(IN6P_RTHDR); 146782cd038dSYoshinobu Inoue break; 146882cd038dSYoshinobu Inoue 146982cd038dSYoshinobu Inoue case IPV6_CHECKSUM: 147082cd038dSYoshinobu Inoue optval = in6p->in6p_cksum; 147182cd038dSYoshinobu Inoue break; 147282cd038dSYoshinobu Inoue 147382cd038dSYoshinobu Inoue case IPV6_FAITH: 147482cd038dSYoshinobu Inoue optval = OPTBIT(IN6P_FAITH); 147582cd038dSYoshinobu Inoue break; 147682cd038dSYoshinobu Inoue 147782cd038dSYoshinobu Inoue case IPV6_BINDV6ONLY: 147882cd038dSYoshinobu Inoue optval = OPTBIT(IN6P_BINDV6ONLY); 147982cd038dSYoshinobu Inoue break; 148082cd038dSYoshinobu Inoue 148182cd038dSYoshinobu Inoue case IPV6_PORTRANGE: 148282cd038dSYoshinobu Inoue { 148382cd038dSYoshinobu Inoue int flags; 148482cd038dSYoshinobu Inoue 148582cd038dSYoshinobu Inoue flags = in6p->in6p_flags; 148682cd038dSYoshinobu Inoue if (flags & IN6P_HIGHPORT) 148782cd038dSYoshinobu Inoue optval = IPV6_PORTRANGE_HIGH; 148882cd038dSYoshinobu Inoue else if (flags & IN6P_LOWPORT) 148982cd038dSYoshinobu Inoue optval = IPV6_PORTRANGE_LOW; 149082cd038dSYoshinobu Inoue else 149182cd038dSYoshinobu Inoue optval = 0; 149282cd038dSYoshinobu Inoue break; 149382cd038dSYoshinobu Inoue } 149482cd038dSYoshinobu Inoue } 149582cd038dSYoshinobu Inoue error = sooptcopyout(sopt, &optval, 149682cd038dSYoshinobu Inoue sizeof optval); 149782cd038dSYoshinobu Inoue break; 149882cd038dSYoshinobu Inoue 149982cd038dSYoshinobu Inoue case IPV6_MULTICAST_IF: 150082cd038dSYoshinobu Inoue case IPV6_MULTICAST_HOPS: 150182cd038dSYoshinobu Inoue case IPV6_MULTICAST_LOOP: 150282cd038dSYoshinobu Inoue case IPV6_JOIN_GROUP: 150382cd038dSYoshinobu Inoue case IPV6_LEAVE_GROUP: 150482cd038dSYoshinobu Inoue { 150582cd038dSYoshinobu Inoue struct mbuf *m; 150682cd038dSYoshinobu Inoue error = ip6_getmoptions(sopt->sopt_name, 150782cd038dSYoshinobu Inoue in6p->in6p_moptions, &m); 150882cd038dSYoshinobu Inoue if (error == 0) 150982cd038dSYoshinobu Inoue error = sooptcopyout(sopt, 151082cd038dSYoshinobu Inoue mtod(m, char *), m->m_len); 151182cd038dSYoshinobu Inoue m_freem(m); 151282cd038dSYoshinobu Inoue } 151382cd038dSYoshinobu Inoue break; 151482cd038dSYoshinobu Inoue 151582cd038dSYoshinobu Inoue #ifdef IPSEC 151682cd038dSYoshinobu Inoue case IPV6_IPSEC_POLICY: 151782cd038dSYoshinobu Inoue { 1518f63e7634SYoshinobu Inoue caddr_t req = NULL; 1519686cdd19SJun-ichiro itojun Hagino size_t len = 0; 1520686cdd19SJun-ichiro itojun Hagino struct mbuf *m = NULL; 1521686cdd19SJun-ichiro itojun Hagino struct mbuf **mp = &m; 1522f63e7634SYoshinobu Inoue 1523686cdd19SJun-ichiro itojun Hagino error = soopt_getm(sopt, &m); /* XXX */ 1524686cdd19SJun-ichiro itojun Hagino if (error != NULL) 1525686cdd19SJun-ichiro itojun Hagino break; 1526686cdd19SJun-ichiro itojun Hagino error = soopt_mcopyin(sopt, m); /* XXX */ 1527686cdd19SJun-ichiro itojun Hagino if (error != NULL) 1528686cdd19SJun-ichiro itojun Hagino break; 1529686cdd19SJun-ichiro itojun Hagino if (m) { 153082cd038dSYoshinobu Inoue req = mtod(m, caddr_t); 1531686cdd19SJun-ichiro itojun Hagino len = m->m_len; 1532686cdd19SJun-ichiro itojun Hagino } 1533686cdd19SJun-ichiro itojun Hagino error = ipsec6_get_policy(in6p, req, len, mp); 153482cd038dSYoshinobu Inoue if (error == 0) 153582cd038dSYoshinobu Inoue error = soopt_mcopyout(sopt, m); /*XXX*/ 153682cd038dSYoshinobu Inoue m_freem(m); 153782cd038dSYoshinobu Inoue break; 153882cd038dSYoshinobu Inoue } 153982cd038dSYoshinobu Inoue #endif /* IPSEC */ 154082cd038dSYoshinobu Inoue 154182cd038dSYoshinobu Inoue #ifdef IPV6FIREWALL 154282cd038dSYoshinobu Inoue case IPV6_FW_GET: 154382cd038dSYoshinobu Inoue { 154482cd038dSYoshinobu Inoue struct mbuf *m; 154582cd038dSYoshinobu Inoue struct mbuf **mp = &m; 154682cd038dSYoshinobu Inoue 154782cd038dSYoshinobu Inoue if (ip6_fw_ctl_ptr == NULL) 154882cd038dSYoshinobu Inoue { 154982cd038dSYoshinobu Inoue return EINVAL; 155082cd038dSYoshinobu Inoue } 155182cd038dSYoshinobu Inoue error = (*ip6_fw_ctl_ptr)(optname, mp); 155282cd038dSYoshinobu Inoue if (error == 0) 155382cd038dSYoshinobu Inoue error = soopt_mcopyout(sopt, m); /* XXX */ 155482cd038dSYoshinobu Inoue if (m) 155582cd038dSYoshinobu Inoue m_freem(m); 155682cd038dSYoshinobu Inoue } 155782cd038dSYoshinobu Inoue break; 155882cd038dSYoshinobu Inoue #endif 155982cd038dSYoshinobu Inoue 156082cd038dSYoshinobu Inoue default: 156182cd038dSYoshinobu Inoue error = ENOPROTOOPT; 156282cd038dSYoshinobu Inoue break; 156382cd038dSYoshinobu Inoue } 156482cd038dSYoshinobu Inoue break; 156582cd038dSYoshinobu Inoue } 156682cd038dSYoshinobu Inoue } else { 156782cd038dSYoshinobu Inoue error = EINVAL; 156882cd038dSYoshinobu Inoue } 156982cd038dSYoshinobu Inoue return(error); 157082cd038dSYoshinobu Inoue } 157182cd038dSYoshinobu Inoue 157282cd038dSYoshinobu Inoue /* 157382cd038dSYoshinobu Inoue * Set up IP6 options in pcb for insertion in output packets. 157482cd038dSYoshinobu Inoue * Store in mbuf with pointer in pcbopt, adding pseudo-option 157582cd038dSYoshinobu Inoue * with destination address if source routed. 157682cd038dSYoshinobu Inoue */ 157782cd038dSYoshinobu Inoue static int 157882cd038dSYoshinobu Inoue ip6_pcbopts(pktopt, m, so, sopt) 157982cd038dSYoshinobu Inoue struct ip6_pktopts **pktopt; 158082cd038dSYoshinobu Inoue register struct mbuf *m; 158182cd038dSYoshinobu Inoue struct socket *so; 158282cd038dSYoshinobu Inoue struct sockopt *sopt; 158382cd038dSYoshinobu Inoue { 158482cd038dSYoshinobu Inoue register struct ip6_pktopts *opt = *pktopt; 158582cd038dSYoshinobu Inoue int error = 0; 158682cd038dSYoshinobu Inoue struct proc *p = sopt->sopt_p; 158782cd038dSYoshinobu Inoue int priv = 0; 158882cd038dSYoshinobu Inoue 158982cd038dSYoshinobu Inoue /* turn off any old options. */ 159082cd038dSYoshinobu Inoue if (opt) { 159182cd038dSYoshinobu Inoue if (opt->ip6po_m) 159282cd038dSYoshinobu Inoue (void)m_free(opt->ip6po_m); 159382cd038dSYoshinobu Inoue } else 159482cd038dSYoshinobu Inoue opt = malloc(sizeof(*opt), M_IP6OPT, M_WAITOK); 159582cd038dSYoshinobu Inoue *pktopt = 0; 159682cd038dSYoshinobu Inoue 159782cd038dSYoshinobu Inoue if (!m || m->m_len == 0) { 159882cd038dSYoshinobu Inoue /* 159982cd038dSYoshinobu Inoue * Only turning off any previous options. 160082cd038dSYoshinobu Inoue */ 160182cd038dSYoshinobu Inoue if (opt) 160282cd038dSYoshinobu Inoue free(opt, M_IP6OPT); 160382cd038dSYoshinobu Inoue if (m) 160482cd038dSYoshinobu Inoue (void)m_free(m); 160582cd038dSYoshinobu Inoue return(0); 160682cd038dSYoshinobu Inoue } 160782cd038dSYoshinobu Inoue 160882cd038dSYoshinobu Inoue /* set options specified by user. */ 160982cd038dSYoshinobu Inoue if (p && !suser(p)) 161082cd038dSYoshinobu Inoue priv = 1; 161182cd038dSYoshinobu Inoue if ((error = ip6_setpktoptions(m, opt, priv)) != 0) { 161282cd038dSYoshinobu Inoue (void)m_free(m); 161382cd038dSYoshinobu Inoue return(error); 161482cd038dSYoshinobu Inoue } 161582cd038dSYoshinobu Inoue *pktopt = opt; 161682cd038dSYoshinobu Inoue return(0); 161782cd038dSYoshinobu Inoue } 161882cd038dSYoshinobu Inoue 161982cd038dSYoshinobu Inoue /* 162082cd038dSYoshinobu Inoue * Set the IP6 multicast options in response to user setsockopt(). 162182cd038dSYoshinobu Inoue */ 162282cd038dSYoshinobu Inoue static int 162382cd038dSYoshinobu Inoue ip6_setmoptions(optname, im6op, m) 162482cd038dSYoshinobu Inoue int optname; 162582cd038dSYoshinobu Inoue struct ip6_moptions **im6op; 162682cd038dSYoshinobu Inoue struct mbuf *m; 162782cd038dSYoshinobu Inoue { 162882cd038dSYoshinobu Inoue int error = 0; 162982cd038dSYoshinobu Inoue u_int loop, ifindex; 163082cd038dSYoshinobu Inoue struct ipv6_mreq *mreq; 163182cd038dSYoshinobu Inoue struct ifnet *ifp; 163282cd038dSYoshinobu Inoue struct ip6_moptions *im6o = *im6op; 163382cd038dSYoshinobu Inoue struct route_in6 ro; 163482cd038dSYoshinobu Inoue struct sockaddr_in6 *dst; 163582cd038dSYoshinobu Inoue struct in6_multi_mship *imm; 163682cd038dSYoshinobu Inoue struct proc *p = curproc; /* XXX */ 163782cd038dSYoshinobu Inoue 163882cd038dSYoshinobu Inoue if (im6o == NULL) { 163982cd038dSYoshinobu Inoue /* 164082cd038dSYoshinobu Inoue * No multicast option buffer attached to the pcb; 164182cd038dSYoshinobu Inoue * allocate one and initialize to default values. 164282cd038dSYoshinobu Inoue */ 164382cd038dSYoshinobu Inoue im6o = (struct ip6_moptions *) 164482cd038dSYoshinobu Inoue malloc(sizeof(*im6o), M_IPMOPTS, M_WAITOK); 164582cd038dSYoshinobu Inoue 164682cd038dSYoshinobu Inoue if (im6o == NULL) 164782cd038dSYoshinobu Inoue return(ENOBUFS); 164882cd038dSYoshinobu Inoue *im6op = im6o; 164982cd038dSYoshinobu Inoue im6o->im6o_multicast_ifp = NULL; 165082cd038dSYoshinobu Inoue im6o->im6o_multicast_hlim = ip6_defmcasthlim; 165182cd038dSYoshinobu Inoue im6o->im6o_multicast_loop = IPV6_DEFAULT_MULTICAST_LOOP; 165282cd038dSYoshinobu Inoue LIST_INIT(&im6o->im6o_memberships); 165382cd038dSYoshinobu Inoue } 165482cd038dSYoshinobu Inoue 165582cd038dSYoshinobu Inoue switch (optname) { 165682cd038dSYoshinobu Inoue 165782cd038dSYoshinobu Inoue case IPV6_MULTICAST_IF: 165882cd038dSYoshinobu Inoue /* 165982cd038dSYoshinobu Inoue * Select the interface for outgoing multicast packets. 166082cd038dSYoshinobu Inoue */ 166182cd038dSYoshinobu Inoue if (m == NULL || m->m_len != sizeof(u_int)) { 166282cd038dSYoshinobu Inoue error = EINVAL; 166382cd038dSYoshinobu Inoue break; 166482cd038dSYoshinobu Inoue } 166582cd038dSYoshinobu Inoue ifindex = *(mtod(m, u_int *)); 166682cd038dSYoshinobu Inoue if (ifindex < 0 || if_index < ifindex) { 166782cd038dSYoshinobu Inoue error = ENXIO; /* XXX EINVAL? */ 166882cd038dSYoshinobu Inoue break; 166982cd038dSYoshinobu Inoue } 167082cd038dSYoshinobu Inoue ifp = ifindex2ifnet[ifindex]; 167182cd038dSYoshinobu Inoue if (ifp == NULL || (ifp->if_flags & IFF_MULTICAST) == 0) { 167282cd038dSYoshinobu Inoue error = EADDRNOTAVAIL; 167382cd038dSYoshinobu Inoue break; 167482cd038dSYoshinobu Inoue } 167582cd038dSYoshinobu Inoue im6o->im6o_multicast_ifp = ifp; 167682cd038dSYoshinobu Inoue break; 167782cd038dSYoshinobu Inoue 167882cd038dSYoshinobu Inoue case IPV6_MULTICAST_HOPS: 167982cd038dSYoshinobu Inoue { 168082cd038dSYoshinobu Inoue /* 168182cd038dSYoshinobu Inoue * Set the IP6 hoplimit for outgoing multicast packets. 168282cd038dSYoshinobu Inoue */ 168382cd038dSYoshinobu Inoue int optval; 168482cd038dSYoshinobu Inoue if (m == NULL || m->m_len != sizeof(int)) { 168582cd038dSYoshinobu Inoue error = EINVAL; 168682cd038dSYoshinobu Inoue break; 168782cd038dSYoshinobu Inoue } 168882cd038dSYoshinobu Inoue optval = *(mtod(m, u_int *)); 168982cd038dSYoshinobu Inoue if (optval < -1 || optval >= 256) 169082cd038dSYoshinobu Inoue error = EINVAL; 169182cd038dSYoshinobu Inoue else if (optval == -1) 169282cd038dSYoshinobu Inoue im6o->im6o_multicast_hlim = ip6_defmcasthlim; 169382cd038dSYoshinobu Inoue else 169482cd038dSYoshinobu Inoue im6o->im6o_multicast_hlim = optval; 169582cd038dSYoshinobu Inoue break; 169682cd038dSYoshinobu Inoue } 169782cd038dSYoshinobu Inoue 169882cd038dSYoshinobu Inoue case IPV6_MULTICAST_LOOP: 169982cd038dSYoshinobu Inoue /* 170082cd038dSYoshinobu Inoue * Set the loopback flag for outgoing multicast packets. 170182cd038dSYoshinobu Inoue * Must be zero or one. 170282cd038dSYoshinobu Inoue */ 170382cd038dSYoshinobu Inoue if (m == NULL || m->m_len != sizeof(u_int) || 170482cd038dSYoshinobu Inoue (loop = *(mtod(m, u_int *))) > 1) { 170582cd038dSYoshinobu Inoue error = EINVAL; 170682cd038dSYoshinobu Inoue break; 170782cd038dSYoshinobu Inoue } 170882cd038dSYoshinobu Inoue im6o->im6o_multicast_loop = loop; 170982cd038dSYoshinobu Inoue break; 171082cd038dSYoshinobu Inoue 171182cd038dSYoshinobu Inoue case IPV6_JOIN_GROUP: 171282cd038dSYoshinobu Inoue /* 171382cd038dSYoshinobu Inoue * Add a multicast group membership. 171482cd038dSYoshinobu Inoue * Group must be a valid IP6 multicast address. 171582cd038dSYoshinobu Inoue */ 171682cd038dSYoshinobu Inoue if (m == NULL || m->m_len != sizeof(struct ipv6_mreq)) { 171782cd038dSYoshinobu Inoue error = EINVAL; 171882cd038dSYoshinobu Inoue break; 171982cd038dSYoshinobu Inoue } 172082cd038dSYoshinobu Inoue mreq = mtod(m, struct ipv6_mreq *); 172182cd038dSYoshinobu Inoue if (IN6_IS_ADDR_UNSPECIFIED(&mreq->ipv6mr_multiaddr)) { 172282cd038dSYoshinobu Inoue /* 172382cd038dSYoshinobu Inoue * We use the unspecified address to specify to accept 172482cd038dSYoshinobu Inoue * all multicast addresses. Only super user is allowed 172582cd038dSYoshinobu Inoue * to do this. 172682cd038dSYoshinobu Inoue */ 1727686cdd19SJun-ichiro itojun Hagino if (suser(p)) 1728686cdd19SJun-ichiro itojun Hagino { 172982cd038dSYoshinobu Inoue error = EACCES; 173082cd038dSYoshinobu Inoue break; 173182cd038dSYoshinobu Inoue } 173282cd038dSYoshinobu Inoue } else if (!IN6_IS_ADDR_MULTICAST(&mreq->ipv6mr_multiaddr)) { 173382cd038dSYoshinobu Inoue error = EINVAL; 173482cd038dSYoshinobu Inoue break; 173582cd038dSYoshinobu Inoue } 173682cd038dSYoshinobu Inoue 173782cd038dSYoshinobu Inoue /* 173882cd038dSYoshinobu Inoue * If the interface is specified, validate it. 173982cd038dSYoshinobu Inoue */ 174082cd038dSYoshinobu Inoue if (mreq->ipv6mr_interface < 0 174182cd038dSYoshinobu Inoue || if_index < mreq->ipv6mr_interface) { 174282cd038dSYoshinobu Inoue error = ENXIO; /* XXX EINVAL? */ 174382cd038dSYoshinobu Inoue break; 174482cd038dSYoshinobu Inoue } 174582cd038dSYoshinobu Inoue /* 174682cd038dSYoshinobu Inoue * If no interface was explicitly specified, choose an 174782cd038dSYoshinobu Inoue * appropriate one according to the given multicast address. 174882cd038dSYoshinobu Inoue */ 174982cd038dSYoshinobu Inoue if (mreq->ipv6mr_interface == 0) { 175082cd038dSYoshinobu Inoue /* 175182cd038dSYoshinobu Inoue * If the multicast address is in node-local scope, 175282cd038dSYoshinobu Inoue * the interface should be a loopback interface. 175382cd038dSYoshinobu Inoue * Otherwise, look up the routing table for the 175482cd038dSYoshinobu Inoue * address, and choose the outgoing interface. 175582cd038dSYoshinobu Inoue * XXX: is it a good approach? 175682cd038dSYoshinobu Inoue */ 175782cd038dSYoshinobu Inoue if (IN6_IS_ADDR_MC_NODELOCAL(&mreq->ipv6mr_multiaddr)) { 175882cd038dSYoshinobu Inoue ifp = &loif[0]; 175982cd038dSYoshinobu Inoue } else { 176082cd038dSYoshinobu Inoue ro.ro_rt = NULL; 176182cd038dSYoshinobu Inoue dst = (struct sockaddr_in6 *)&ro.ro_dst; 176282cd038dSYoshinobu Inoue bzero(dst, sizeof(*dst)); 176382cd038dSYoshinobu Inoue dst->sin6_len = sizeof(struct sockaddr_in6); 176482cd038dSYoshinobu Inoue dst->sin6_family = AF_INET6; 176582cd038dSYoshinobu Inoue dst->sin6_addr = mreq->ipv6mr_multiaddr; 176682cd038dSYoshinobu Inoue rtalloc((struct route *)&ro); 176782cd038dSYoshinobu Inoue if (ro.ro_rt == NULL) { 176882cd038dSYoshinobu Inoue error = EADDRNOTAVAIL; 176982cd038dSYoshinobu Inoue break; 177082cd038dSYoshinobu Inoue } 177182cd038dSYoshinobu Inoue ifp = ro.ro_rt->rt_ifp; 177282cd038dSYoshinobu Inoue rtfree(ro.ro_rt); 177382cd038dSYoshinobu Inoue } 177482cd038dSYoshinobu Inoue } else 177582cd038dSYoshinobu Inoue ifp = ifindex2ifnet[mreq->ipv6mr_interface]; 177682cd038dSYoshinobu Inoue 177782cd038dSYoshinobu Inoue /* 177882cd038dSYoshinobu Inoue * See if we found an interface, and confirm that it 177982cd038dSYoshinobu Inoue * supports multicast 178082cd038dSYoshinobu Inoue */ 178182cd038dSYoshinobu Inoue if (ifp == NULL || (ifp->if_flags & IFF_MULTICAST) == 0) { 178282cd038dSYoshinobu Inoue error = EADDRNOTAVAIL; 178382cd038dSYoshinobu Inoue break; 178482cd038dSYoshinobu Inoue } 178582cd038dSYoshinobu Inoue /* 178682cd038dSYoshinobu Inoue * Put interface index into the multicast address, 178782cd038dSYoshinobu Inoue * if the address has link-local scope. 178882cd038dSYoshinobu Inoue */ 178982cd038dSYoshinobu Inoue if (IN6_IS_ADDR_MC_LINKLOCAL(&mreq->ipv6mr_multiaddr)) { 179082cd038dSYoshinobu Inoue mreq->ipv6mr_multiaddr.s6_addr16[1] 179182cd038dSYoshinobu Inoue = htons(mreq->ipv6mr_interface); 179282cd038dSYoshinobu Inoue } 179382cd038dSYoshinobu Inoue /* 179482cd038dSYoshinobu Inoue * See if the membership already exists. 179582cd038dSYoshinobu Inoue */ 1796686cdd19SJun-ichiro itojun Hagino for (imm = im6o->im6o_memberships.lh_first; 1797686cdd19SJun-ichiro itojun Hagino imm != NULL; imm = imm->i6mm_chain.le_next) 179882cd038dSYoshinobu Inoue if (imm->i6mm_maddr->in6m_ifp == ifp && 179982cd038dSYoshinobu Inoue IN6_ARE_ADDR_EQUAL(&imm->i6mm_maddr->in6m_addr, 180082cd038dSYoshinobu Inoue &mreq->ipv6mr_multiaddr)) 180182cd038dSYoshinobu Inoue break; 180282cd038dSYoshinobu Inoue if (imm != NULL) { 180382cd038dSYoshinobu Inoue error = EADDRINUSE; 180482cd038dSYoshinobu Inoue break; 180582cd038dSYoshinobu Inoue } 180682cd038dSYoshinobu Inoue /* 180782cd038dSYoshinobu Inoue * Everything looks good; add a new record to the multicast 180882cd038dSYoshinobu Inoue * address list for the given interface. 180982cd038dSYoshinobu Inoue */ 181082cd038dSYoshinobu Inoue imm = malloc(sizeof(*imm), M_IPMADDR, M_WAITOK); 181182cd038dSYoshinobu Inoue if (imm == NULL) { 181282cd038dSYoshinobu Inoue error = ENOBUFS; 181382cd038dSYoshinobu Inoue break; 181482cd038dSYoshinobu Inoue } 181582cd038dSYoshinobu Inoue if ((imm->i6mm_maddr = 181682cd038dSYoshinobu Inoue in6_addmulti(&mreq->ipv6mr_multiaddr, ifp, &error)) == NULL) { 181782cd038dSYoshinobu Inoue free(imm, M_IPMADDR); 181882cd038dSYoshinobu Inoue break; 181982cd038dSYoshinobu Inoue } 182082cd038dSYoshinobu Inoue LIST_INSERT_HEAD(&im6o->im6o_memberships, imm, i6mm_chain); 182182cd038dSYoshinobu Inoue break; 182282cd038dSYoshinobu Inoue 182382cd038dSYoshinobu Inoue case IPV6_LEAVE_GROUP: 182482cd038dSYoshinobu Inoue /* 182582cd038dSYoshinobu Inoue * Drop a multicast group membership. 182682cd038dSYoshinobu Inoue * Group must be a valid IP6 multicast address. 182782cd038dSYoshinobu Inoue */ 182882cd038dSYoshinobu Inoue if (m == NULL || m->m_len != sizeof(struct ipv6_mreq)) { 182982cd038dSYoshinobu Inoue error = EINVAL; 183082cd038dSYoshinobu Inoue break; 183182cd038dSYoshinobu Inoue } 183282cd038dSYoshinobu Inoue mreq = mtod(m, struct ipv6_mreq *); 183382cd038dSYoshinobu Inoue if (IN6_IS_ADDR_UNSPECIFIED(&mreq->ipv6mr_multiaddr)) { 183482cd038dSYoshinobu Inoue if (suser(p)) { 183582cd038dSYoshinobu Inoue error = EACCES; 183682cd038dSYoshinobu Inoue break; 183782cd038dSYoshinobu Inoue } 183882cd038dSYoshinobu Inoue } else if (!IN6_IS_ADDR_MULTICAST(&mreq->ipv6mr_multiaddr)) { 183982cd038dSYoshinobu Inoue error = EINVAL; 184082cd038dSYoshinobu Inoue break; 184182cd038dSYoshinobu Inoue } 184282cd038dSYoshinobu Inoue /* 184382cd038dSYoshinobu Inoue * If an interface address was specified, get a pointer 184482cd038dSYoshinobu Inoue * to its ifnet structure. 184582cd038dSYoshinobu Inoue */ 184682cd038dSYoshinobu Inoue if (mreq->ipv6mr_interface < 0 184782cd038dSYoshinobu Inoue || if_index < mreq->ipv6mr_interface) { 184882cd038dSYoshinobu Inoue error = ENXIO; /* XXX EINVAL? */ 184982cd038dSYoshinobu Inoue break; 185082cd038dSYoshinobu Inoue } 185182cd038dSYoshinobu Inoue ifp = ifindex2ifnet[mreq->ipv6mr_interface]; 185282cd038dSYoshinobu Inoue /* 185382cd038dSYoshinobu Inoue * Put interface index into the multicast address, 185482cd038dSYoshinobu Inoue * if the address has link-local scope. 185582cd038dSYoshinobu Inoue */ 185682cd038dSYoshinobu Inoue if (IN6_IS_ADDR_MC_LINKLOCAL(&mreq->ipv6mr_multiaddr)) { 185782cd038dSYoshinobu Inoue mreq->ipv6mr_multiaddr.s6_addr16[1] 185882cd038dSYoshinobu Inoue = htons(mreq->ipv6mr_interface); 185982cd038dSYoshinobu Inoue } 186082cd038dSYoshinobu Inoue /* 186182cd038dSYoshinobu Inoue * Find the membership in the membership list. 186282cd038dSYoshinobu Inoue */ 1863686cdd19SJun-ichiro itojun Hagino for (imm = im6o->im6o_memberships.lh_first; 1864686cdd19SJun-ichiro itojun Hagino imm != NULL; imm = imm->i6mm_chain.le_next) { 186582cd038dSYoshinobu Inoue if ((ifp == NULL || 186682cd038dSYoshinobu Inoue imm->i6mm_maddr->in6m_ifp == ifp) && 186782cd038dSYoshinobu Inoue IN6_ARE_ADDR_EQUAL(&imm->i6mm_maddr->in6m_addr, 186882cd038dSYoshinobu Inoue &mreq->ipv6mr_multiaddr)) 186982cd038dSYoshinobu Inoue break; 187082cd038dSYoshinobu Inoue } 187182cd038dSYoshinobu Inoue if (imm == NULL) { 187282cd038dSYoshinobu Inoue /* Unable to resolve interface */ 187382cd038dSYoshinobu Inoue error = EADDRNOTAVAIL; 187482cd038dSYoshinobu Inoue break; 187582cd038dSYoshinobu Inoue } 187682cd038dSYoshinobu Inoue /* 187782cd038dSYoshinobu Inoue * Give up the multicast address record to which the 187882cd038dSYoshinobu Inoue * membership points. 187982cd038dSYoshinobu Inoue */ 188082cd038dSYoshinobu Inoue LIST_REMOVE(imm, i6mm_chain); 188182cd038dSYoshinobu Inoue in6_delmulti(imm->i6mm_maddr); 188282cd038dSYoshinobu Inoue free(imm, M_IPMADDR); 188382cd038dSYoshinobu Inoue break; 188482cd038dSYoshinobu Inoue 188582cd038dSYoshinobu Inoue default: 188682cd038dSYoshinobu Inoue error = EOPNOTSUPP; 188782cd038dSYoshinobu Inoue break; 188882cd038dSYoshinobu Inoue } 188982cd038dSYoshinobu Inoue 189082cd038dSYoshinobu Inoue /* 189182cd038dSYoshinobu Inoue * If all options have default values, no need to keep the mbuf. 189282cd038dSYoshinobu Inoue */ 189382cd038dSYoshinobu Inoue if (im6o->im6o_multicast_ifp == NULL && 189482cd038dSYoshinobu Inoue im6o->im6o_multicast_hlim == ip6_defmcasthlim && 189582cd038dSYoshinobu Inoue im6o->im6o_multicast_loop == IPV6_DEFAULT_MULTICAST_LOOP && 1896686cdd19SJun-ichiro itojun Hagino im6o->im6o_memberships.lh_first == NULL) { 189782cd038dSYoshinobu Inoue free(*im6op, M_IPMOPTS); 189882cd038dSYoshinobu Inoue *im6op = NULL; 189982cd038dSYoshinobu Inoue } 190082cd038dSYoshinobu Inoue 190182cd038dSYoshinobu Inoue return(error); 190282cd038dSYoshinobu Inoue } 190382cd038dSYoshinobu Inoue 190482cd038dSYoshinobu Inoue /* 190582cd038dSYoshinobu Inoue * Return the IP6 multicast options in response to user getsockopt(). 190682cd038dSYoshinobu Inoue */ 190782cd038dSYoshinobu Inoue static int 190882cd038dSYoshinobu Inoue ip6_getmoptions(optname, im6o, mp) 190982cd038dSYoshinobu Inoue int optname; 191082cd038dSYoshinobu Inoue register struct ip6_moptions *im6o; 191182cd038dSYoshinobu Inoue register struct mbuf **mp; 191282cd038dSYoshinobu Inoue { 191382cd038dSYoshinobu Inoue u_int *hlim, *loop, *ifindex; 191482cd038dSYoshinobu Inoue 191582cd038dSYoshinobu Inoue *mp = m_get(M_WAIT, MT_HEADER); /*XXX*/ 191682cd038dSYoshinobu Inoue 191782cd038dSYoshinobu Inoue switch (optname) { 191882cd038dSYoshinobu Inoue 191982cd038dSYoshinobu Inoue case IPV6_MULTICAST_IF: 192082cd038dSYoshinobu Inoue ifindex = mtod(*mp, u_int *); 192182cd038dSYoshinobu Inoue (*mp)->m_len = sizeof(u_int); 192282cd038dSYoshinobu Inoue if (im6o == NULL || im6o->im6o_multicast_ifp == NULL) 192382cd038dSYoshinobu Inoue *ifindex = 0; 192482cd038dSYoshinobu Inoue else 192582cd038dSYoshinobu Inoue *ifindex = im6o->im6o_multicast_ifp->if_index; 192682cd038dSYoshinobu Inoue return(0); 192782cd038dSYoshinobu Inoue 192882cd038dSYoshinobu Inoue case IPV6_MULTICAST_HOPS: 192982cd038dSYoshinobu Inoue hlim = mtod(*mp, u_int *); 193082cd038dSYoshinobu Inoue (*mp)->m_len = sizeof(u_int); 193182cd038dSYoshinobu Inoue if (im6o == NULL) 193282cd038dSYoshinobu Inoue *hlim = ip6_defmcasthlim; 193382cd038dSYoshinobu Inoue else 193482cd038dSYoshinobu Inoue *hlim = im6o->im6o_multicast_hlim; 193582cd038dSYoshinobu Inoue return(0); 193682cd038dSYoshinobu Inoue 193782cd038dSYoshinobu Inoue case IPV6_MULTICAST_LOOP: 193882cd038dSYoshinobu Inoue loop = mtod(*mp, u_int *); 193982cd038dSYoshinobu Inoue (*mp)->m_len = sizeof(u_int); 194082cd038dSYoshinobu Inoue if (im6o == NULL) 194182cd038dSYoshinobu Inoue *loop = ip6_defmcasthlim; 194282cd038dSYoshinobu Inoue else 194382cd038dSYoshinobu Inoue *loop = im6o->im6o_multicast_loop; 194482cd038dSYoshinobu Inoue return(0); 194582cd038dSYoshinobu Inoue 194682cd038dSYoshinobu Inoue default: 194782cd038dSYoshinobu Inoue return(EOPNOTSUPP); 194882cd038dSYoshinobu Inoue } 194982cd038dSYoshinobu Inoue } 195082cd038dSYoshinobu Inoue 195182cd038dSYoshinobu Inoue /* 195282cd038dSYoshinobu Inoue * Discard the IP6 multicast options. 195382cd038dSYoshinobu Inoue */ 195482cd038dSYoshinobu Inoue void 195582cd038dSYoshinobu Inoue ip6_freemoptions(im6o) 195682cd038dSYoshinobu Inoue register struct ip6_moptions *im6o; 195782cd038dSYoshinobu Inoue { 195882cd038dSYoshinobu Inoue struct in6_multi_mship *imm; 195982cd038dSYoshinobu Inoue 196082cd038dSYoshinobu Inoue if (im6o == NULL) 196182cd038dSYoshinobu Inoue return; 196282cd038dSYoshinobu Inoue 1963686cdd19SJun-ichiro itojun Hagino while ((imm = im6o->im6o_memberships.lh_first) != NULL) { 196482cd038dSYoshinobu Inoue LIST_REMOVE(imm, i6mm_chain); 196582cd038dSYoshinobu Inoue if (imm->i6mm_maddr) 196682cd038dSYoshinobu Inoue in6_delmulti(imm->i6mm_maddr); 196782cd038dSYoshinobu Inoue free(imm, M_IPMADDR); 196882cd038dSYoshinobu Inoue } 196982cd038dSYoshinobu Inoue free(im6o, M_IPMOPTS); 197082cd038dSYoshinobu Inoue } 197182cd038dSYoshinobu Inoue 197282cd038dSYoshinobu Inoue /* 197382cd038dSYoshinobu Inoue * Set IPv6 outgoing packet options based on advanced API. 197482cd038dSYoshinobu Inoue */ 197582cd038dSYoshinobu Inoue int 197682cd038dSYoshinobu Inoue ip6_setpktoptions(control, opt, priv) 197782cd038dSYoshinobu Inoue struct mbuf *control; 197882cd038dSYoshinobu Inoue struct ip6_pktopts *opt; 197982cd038dSYoshinobu Inoue int priv; 198082cd038dSYoshinobu Inoue { 198182cd038dSYoshinobu Inoue register struct cmsghdr *cm = 0; 198282cd038dSYoshinobu Inoue 198382cd038dSYoshinobu Inoue if (control == 0 || opt == 0) 198482cd038dSYoshinobu Inoue return(EINVAL); 198582cd038dSYoshinobu Inoue 198682cd038dSYoshinobu Inoue bzero(opt, sizeof(*opt)); 198782cd038dSYoshinobu Inoue opt->ip6po_hlim = -1; /* -1 means to use default hop limit */ 198882cd038dSYoshinobu Inoue 198982cd038dSYoshinobu Inoue /* 199082cd038dSYoshinobu Inoue * XXX: Currently, we assume all the optional information is stored 199182cd038dSYoshinobu Inoue * in a single mbuf. 199282cd038dSYoshinobu Inoue */ 199382cd038dSYoshinobu Inoue if (control->m_next) 199482cd038dSYoshinobu Inoue return(EINVAL); 199582cd038dSYoshinobu Inoue 19967d0d8dc3SYoshinobu Inoue for (; control->m_len; control->m_data += ALIGN(cm->cmsg_len), 19977d0d8dc3SYoshinobu Inoue control->m_len -= ALIGN(cm->cmsg_len)) { 199882cd038dSYoshinobu Inoue cm = mtod(control, struct cmsghdr *); 199982cd038dSYoshinobu Inoue if (cm->cmsg_len == 0 || cm->cmsg_len > control->m_len) 200082cd038dSYoshinobu Inoue return(EINVAL); 200182cd038dSYoshinobu Inoue if (cm->cmsg_level != IPPROTO_IPV6) 200282cd038dSYoshinobu Inoue continue; 200382cd038dSYoshinobu Inoue 200482cd038dSYoshinobu Inoue switch(cm->cmsg_type) { 200582cd038dSYoshinobu Inoue case IPV6_PKTINFO: 200682cd038dSYoshinobu Inoue if (cm->cmsg_len != CMSG_LEN(sizeof(struct in6_pktinfo))) 200782cd038dSYoshinobu Inoue return(EINVAL); 200882cd038dSYoshinobu Inoue opt->ip6po_pktinfo = (struct in6_pktinfo *)CMSG_DATA(cm); 200982cd038dSYoshinobu Inoue if (opt->ip6po_pktinfo->ipi6_ifindex && 201082cd038dSYoshinobu Inoue IN6_IS_ADDR_LINKLOCAL(&opt->ip6po_pktinfo->ipi6_addr)) 201182cd038dSYoshinobu Inoue opt->ip6po_pktinfo->ipi6_addr.s6_addr16[1] = 201282cd038dSYoshinobu Inoue htons(opt->ip6po_pktinfo->ipi6_ifindex); 201382cd038dSYoshinobu Inoue 201482cd038dSYoshinobu Inoue if (opt->ip6po_pktinfo->ipi6_ifindex > if_index 201582cd038dSYoshinobu Inoue || opt->ip6po_pktinfo->ipi6_ifindex < 0) { 201682cd038dSYoshinobu Inoue return(ENXIO); 201782cd038dSYoshinobu Inoue } 201882cd038dSYoshinobu Inoue 201982cd038dSYoshinobu Inoue if (!IN6_IS_ADDR_UNSPECIFIED(&opt->ip6po_pktinfo->ipi6_addr)) { 202082cd038dSYoshinobu Inoue struct ifaddr *ia; 202182cd038dSYoshinobu Inoue struct sockaddr_in6 sin6; 202282cd038dSYoshinobu Inoue 202382cd038dSYoshinobu Inoue bzero(&sin6, sizeof(sin6)); 202482cd038dSYoshinobu Inoue sin6.sin6_len = sizeof(sin6); 202582cd038dSYoshinobu Inoue sin6.sin6_family = AF_INET6; 202682cd038dSYoshinobu Inoue sin6.sin6_addr = 202782cd038dSYoshinobu Inoue opt->ip6po_pktinfo->ipi6_addr; 202882cd038dSYoshinobu Inoue ia = ifa_ifwithaddr(sin6tosa(&sin6)); 202982cd038dSYoshinobu Inoue if (ia == NULL || 203082cd038dSYoshinobu Inoue (opt->ip6po_pktinfo->ipi6_ifindex && 203182cd038dSYoshinobu Inoue (ia->ifa_ifp->if_index != 203282cd038dSYoshinobu Inoue opt->ip6po_pktinfo->ipi6_ifindex))) { 203382cd038dSYoshinobu Inoue return(EADDRNOTAVAIL); 203482cd038dSYoshinobu Inoue } 203582cd038dSYoshinobu Inoue /* 203682cd038dSYoshinobu Inoue * Check if the requested source address is 203782cd038dSYoshinobu Inoue * indeed a unicast address assigned to the 203882cd038dSYoshinobu Inoue * node. 203982cd038dSYoshinobu Inoue */ 204082cd038dSYoshinobu Inoue if (IN6_IS_ADDR_MULTICAST(&opt->ip6po_pktinfo->ipi6_addr)) 204182cd038dSYoshinobu Inoue return(EADDRNOTAVAIL); 204282cd038dSYoshinobu Inoue } 204382cd038dSYoshinobu Inoue break; 204482cd038dSYoshinobu Inoue 204582cd038dSYoshinobu Inoue case IPV6_HOPLIMIT: 204682cd038dSYoshinobu Inoue if (cm->cmsg_len != CMSG_LEN(sizeof(int))) 204782cd038dSYoshinobu Inoue return(EINVAL); 204882cd038dSYoshinobu Inoue 204982cd038dSYoshinobu Inoue opt->ip6po_hlim = *(int *)CMSG_DATA(cm); 205082cd038dSYoshinobu Inoue if (opt->ip6po_hlim < -1 || opt->ip6po_hlim > 255) 205182cd038dSYoshinobu Inoue return(EINVAL); 205282cd038dSYoshinobu Inoue break; 205382cd038dSYoshinobu Inoue 205482cd038dSYoshinobu Inoue case IPV6_NEXTHOP: 205582cd038dSYoshinobu Inoue if (!priv) 205682cd038dSYoshinobu Inoue return(EPERM); 205782cd038dSYoshinobu Inoue if (cm->cmsg_len < sizeof(u_char) || 205882cd038dSYoshinobu Inoue cm->cmsg_len < CMSG_LEN(*CMSG_DATA(cm))) 205982cd038dSYoshinobu Inoue return(EINVAL); 206082cd038dSYoshinobu Inoue 206182cd038dSYoshinobu Inoue opt->ip6po_nexthop = (struct sockaddr *)CMSG_DATA(cm); 206282cd038dSYoshinobu Inoue 206382cd038dSYoshinobu Inoue break; 206482cd038dSYoshinobu Inoue 206582cd038dSYoshinobu Inoue case IPV6_HOPOPTS: 206682cd038dSYoshinobu Inoue if (cm->cmsg_len < CMSG_LEN(sizeof(struct ip6_hbh))) 206782cd038dSYoshinobu Inoue return(EINVAL); 206882cd038dSYoshinobu Inoue opt->ip6po_hbh = (struct ip6_hbh *)CMSG_DATA(cm); 206982cd038dSYoshinobu Inoue if (cm->cmsg_len != 207082cd038dSYoshinobu Inoue CMSG_LEN((opt->ip6po_hbh->ip6h_len + 1) << 3)) 207182cd038dSYoshinobu Inoue return(EINVAL); 207282cd038dSYoshinobu Inoue break; 207382cd038dSYoshinobu Inoue 207482cd038dSYoshinobu Inoue case IPV6_DSTOPTS: 207582cd038dSYoshinobu Inoue if (cm->cmsg_len < CMSG_LEN(sizeof(struct ip6_dest))) 207682cd038dSYoshinobu Inoue return(EINVAL); 207782cd038dSYoshinobu Inoue 207882cd038dSYoshinobu Inoue /* 207982cd038dSYoshinobu Inoue * If there is no routing header yet, the destination 208082cd038dSYoshinobu Inoue * options header should be put on the 1st part. 208182cd038dSYoshinobu Inoue * Otherwise, the header should be on the 2nd part. 208282cd038dSYoshinobu Inoue * (See RFC 2460, section 4.1) 208382cd038dSYoshinobu Inoue */ 208482cd038dSYoshinobu Inoue if (opt->ip6po_rthdr == NULL) { 208582cd038dSYoshinobu Inoue opt->ip6po_dest1 = 208682cd038dSYoshinobu Inoue (struct ip6_dest *)CMSG_DATA(cm); 208782cd038dSYoshinobu Inoue if (cm->cmsg_len != 208882cd038dSYoshinobu Inoue CMSG_LEN((opt->ip6po_dest1->ip6d_len + 1) 208982cd038dSYoshinobu Inoue << 3)) 209082cd038dSYoshinobu Inoue return(EINVAL); 209182cd038dSYoshinobu Inoue } else { 209282cd038dSYoshinobu Inoue opt->ip6po_dest2 = 209382cd038dSYoshinobu Inoue (struct ip6_dest *)CMSG_DATA(cm); 209482cd038dSYoshinobu Inoue if (cm->cmsg_len != 209582cd038dSYoshinobu Inoue CMSG_LEN((opt->ip6po_dest2->ip6d_len + 1) 209682cd038dSYoshinobu Inoue << 3)) 209782cd038dSYoshinobu Inoue return(EINVAL); 209882cd038dSYoshinobu Inoue } 209982cd038dSYoshinobu Inoue break; 210082cd038dSYoshinobu Inoue 210182cd038dSYoshinobu Inoue case IPV6_RTHDR: 210282cd038dSYoshinobu Inoue if (cm->cmsg_len < CMSG_LEN(sizeof(struct ip6_rthdr))) 210382cd038dSYoshinobu Inoue return(EINVAL); 210482cd038dSYoshinobu Inoue opt->ip6po_rthdr = (struct ip6_rthdr *)CMSG_DATA(cm); 210582cd038dSYoshinobu Inoue if (cm->cmsg_len != 210682cd038dSYoshinobu Inoue CMSG_LEN((opt->ip6po_rthdr->ip6r_len + 1) << 3)) 210782cd038dSYoshinobu Inoue return(EINVAL); 210882cd038dSYoshinobu Inoue switch(opt->ip6po_rthdr->ip6r_type) { 210982cd038dSYoshinobu Inoue case IPV6_RTHDR_TYPE_0: 211082cd038dSYoshinobu Inoue if (opt->ip6po_rthdr->ip6r_segleft == 0) 211182cd038dSYoshinobu Inoue return(EINVAL); 211282cd038dSYoshinobu Inoue break; 211382cd038dSYoshinobu Inoue default: 211482cd038dSYoshinobu Inoue return(EINVAL); 211582cd038dSYoshinobu Inoue } 211682cd038dSYoshinobu Inoue break; 211782cd038dSYoshinobu Inoue 211882cd038dSYoshinobu Inoue default: 211982cd038dSYoshinobu Inoue return(ENOPROTOOPT); 212082cd038dSYoshinobu Inoue } 212182cd038dSYoshinobu Inoue } 212282cd038dSYoshinobu Inoue 212382cd038dSYoshinobu Inoue return(0); 212482cd038dSYoshinobu Inoue } 212582cd038dSYoshinobu Inoue 212682cd038dSYoshinobu Inoue /* 212782cd038dSYoshinobu Inoue * Routine called from ip6_output() to loop back a copy of an IP6 multicast 212882cd038dSYoshinobu Inoue * packet to the input queue of a specified interface. Note that this 212982cd038dSYoshinobu Inoue * calls the output routine of the loopback "driver", but with an interface 213082cd038dSYoshinobu Inoue * pointer that might NOT be &loif -- easier than replicating that code here. 213182cd038dSYoshinobu Inoue */ 213282cd038dSYoshinobu Inoue void 213382cd038dSYoshinobu Inoue ip6_mloopback(ifp, m, dst) 213482cd038dSYoshinobu Inoue struct ifnet *ifp; 213582cd038dSYoshinobu Inoue register struct mbuf *m; 213682cd038dSYoshinobu Inoue register struct sockaddr_in6 *dst; 213782cd038dSYoshinobu Inoue { 213882cd038dSYoshinobu Inoue struct mbuf *copym; 2139686cdd19SJun-ichiro itojun Hagino struct ip6_hdr *ip6; 214082cd038dSYoshinobu Inoue 214182cd038dSYoshinobu Inoue copym = m_copy(m, 0, M_COPYALL); 2142686cdd19SJun-ichiro itojun Hagino if (copym == NULL) 2143686cdd19SJun-ichiro itojun Hagino return; 2144686cdd19SJun-ichiro itojun Hagino 2145686cdd19SJun-ichiro itojun Hagino /* 2146686cdd19SJun-ichiro itojun Hagino * Make sure to deep-copy IPv6 header portion in case the data 2147686cdd19SJun-ichiro itojun Hagino * is in an mbuf cluster, so that we can safely override the IPv6 2148686cdd19SJun-ichiro itojun Hagino * header portion later. 2149686cdd19SJun-ichiro itojun Hagino */ 2150686cdd19SJun-ichiro itojun Hagino if ((copym->m_flags & M_EXT) != 0 || 2151686cdd19SJun-ichiro itojun Hagino copym->m_len < sizeof(struct ip6_hdr)) { 2152686cdd19SJun-ichiro itojun Hagino copym = m_pullup(copym, sizeof(struct ip6_hdr)); 2153686cdd19SJun-ichiro itojun Hagino if (copym == NULL) 2154686cdd19SJun-ichiro itojun Hagino return; 215582cd038dSYoshinobu Inoue } 2156686cdd19SJun-ichiro itojun Hagino 2157686cdd19SJun-ichiro itojun Hagino #ifdef DIAGNOSTIC 2158686cdd19SJun-ichiro itojun Hagino if (copym->m_len < sizeof(*ip6)) { 2159686cdd19SJun-ichiro itojun Hagino m_freem(copym); 2160686cdd19SJun-ichiro itojun Hagino return; 2161686cdd19SJun-ichiro itojun Hagino } 2162686cdd19SJun-ichiro itojun Hagino #endif 2163686cdd19SJun-ichiro itojun Hagino 2164686cdd19SJun-ichiro itojun Hagino #ifndef FAKE_LOOPBACK_IF 2165686cdd19SJun-ichiro itojun Hagino if ((ifp->if_flags & IFF_LOOPBACK) == 0) 2166686cdd19SJun-ichiro itojun Hagino #else 2167686cdd19SJun-ichiro itojun Hagino if (1) 2168686cdd19SJun-ichiro itojun Hagino #endif 2169686cdd19SJun-ichiro itojun Hagino { 2170686cdd19SJun-ichiro itojun Hagino ip6 = mtod(copym, struct ip6_hdr *); 2171686cdd19SJun-ichiro itojun Hagino if (IN6_IS_SCOPE_LINKLOCAL(&ip6->ip6_src)) 2172686cdd19SJun-ichiro itojun Hagino ip6->ip6_src.s6_addr16[1] = 0; 2173686cdd19SJun-ichiro itojun Hagino if (IN6_IS_SCOPE_LINKLOCAL(&ip6->ip6_dst)) 2174686cdd19SJun-ichiro itojun Hagino ip6->ip6_dst.s6_addr16[1] = 0; 2175686cdd19SJun-ichiro itojun Hagino } 2176686cdd19SJun-ichiro itojun Hagino 2177686cdd19SJun-ichiro itojun Hagino (void)if_simloop(ifp, copym, dst->sin6_family, NULL); 217882cd038dSYoshinobu Inoue } 217982cd038dSYoshinobu Inoue 218082cd038dSYoshinobu Inoue /* 218182cd038dSYoshinobu Inoue * Chop IPv6 header off from the payload. 218282cd038dSYoshinobu Inoue */ 218382cd038dSYoshinobu Inoue static int 218482cd038dSYoshinobu Inoue ip6_splithdr(m, exthdrs) 218582cd038dSYoshinobu Inoue struct mbuf *m; 218682cd038dSYoshinobu Inoue struct ip6_exthdrs *exthdrs; 218782cd038dSYoshinobu Inoue { 218882cd038dSYoshinobu Inoue struct mbuf *mh; 218982cd038dSYoshinobu Inoue struct ip6_hdr *ip6; 219082cd038dSYoshinobu Inoue 219182cd038dSYoshinobu Inoue ip6 = mtod(m, struct ip6_hdr *); 219282cd038dSYoshinobu Inoue if (m->m_len > sizeof(*ip6)) { 219382cd038dSYoshinobu Inoue MGETHDR(mh, M_DONTWAIT, MT_HEADER); 219482cd038dSYoshinobu Inoue if (mh == 0) { 219582cd038dSYoshinobu Inoue m_freem(m); 219682cd038dSYoshinobu Inoue return ENOBUFS; 219782cd038dSYoshinobu Inoue } 219882cd038dSYoshinobu Inoue M_COPY_PKTHDR(mh, m); 219982cd038dSYoshinobu Inoue MH_ALIGN(mh, sizeof(*ip6)); 220082cd038dSYoshinobu Inoue m->m_flags &= ~M_PKTHDR; 220182cd038dSYoshinobu Inoue m->m_len -= sizeof(*ip6); 220282cd038dSYoshinobu Inoue m->m_data += sizeof(*ip6); 220382cd038dSYoshinobu Inoue mh->m_next = m; 220482cd038dSYoshinobu Inoue m = mh; 220582cd038dSYoshinobu Inoue m->m_len = sizeof(*ip6); 220682cd038dSYoshinobu Inoue bcopy((caddr_t)ip6, mtod(m, caddr_t), sizeof(*ip6)); 220782cd038dSYoshinobu Inoue } 220882cd038dSYoshinobu Inoue exthdrs->ip6e_ip6 = m; 220982cd038dSYoshinobu Inoue return 0; 221082cd038dSYoshinobu Inoue } 221182cd038dSYoshinobu Inoue 221282cd038dSYoshinobu Inoue /* 221382cd038dSYoshinobu Inoue * Compute IPv6 extension header length. 221482cd038dSYoshinobu Inoue */ 221582cd038dSYoshinobu Inoue int 221682cd038dSYoshinobu Inoue ip6_optlen(in6p) 221782cd038dSYoshinobu Inoue struct in6pcb *in6p; 221882cd038dSYoshinobu Inoue { 221982cd038dSYoshinobu Inoue int len; 222082cd038dSYoshinobu Inoue 222182cd038dSYoshinobu Inoue if (!in6p->in6p_outputopts) 222282cd038dSYoshinobu Inoue return 0; 222382cd038dSYoshinobu Inoue 222482cd038dSYoshinobu Inoue len = 0; 222582cd038dSYoshinobu Inoue #define elen(x) \ 222682cd038dSYoshinobu Inoue (((struct ip6_ext *)(x)) ? (((struct ip6_ext *)(x))->ip6e_len + 1) << 3 : 0) 222782cd038dSYoshinobu Inoue 222882cd038dSYoshinobu Inoue len += elen(in6p->in6p_outputopts->ip6po_hbh); 222982cd038dSYoshinobu Inoue len += elen(in6p->in6p_outputopts->ip6po_dest1); 223082cd038dSYoshinobu Inoue len += elen(in6p->in6p_outputopts->ip6po_rthdr); 223182cd038dSYoshinobu Inoue len += elen(in6p->in6p_outputopts->ip6po_dest2); 223282cd038dSYoshinobu Inoue return len; 223382cd038dSYoshinobu Inoue #undef elen 223482cd038dSYoshinobu Inoue } 223582cd038dSYoshinobu Inoue 2236