xref: /freebsd/sys/netinet6/raw_ip6.c (revision 14ba8add0197c378f0a07a7f377f3fa29b689c7d)
1caf43b02SWarner Losh /*-
282cd038dSYoshinobu Inoue  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
382cd038dSYoshinobu Inoue  * All rights reserved.
482cd038dSYoshinobu Inoue  *
582cd038dSYoshinobu Inoue  * Redistribution and use in source and binary forms, with or without
682cd038dSYoshinobu Inoue  * modification, are permitted provided that the following conditions
782cd038dSYoshinobu Inoue  * are met:
882cd038dSYoshinobu Inoue  * 1. Redistributions of source code must retain the above copyright
982cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer.
1082cd038dSYoshinobu Inoue  * 2. Redistributions in binary form must reproduce the above copyright
1182cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer in the
1282cd038dSYoshinobu Inoue  *    documentation and/or other materials provided with the distribution.
1382cd038dSYoshinobu Inoue  * 3. Neither the name of the project nor the names of its contributors
1482cd038dSYoshinobu Inoue  *    may be used to endorse or promote products derived from this software
1582cd038dSYoshinobu Inoue  *    without specific prior written permission.
1682cd038dSYoshinobu Inoue  *
1782cd038dSYoshinobu Inoue  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
1882cd038dSYoshinobu Inoue  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
1982cd038dSYoshinobu Inoue  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
2082cd038dSYoshinobu Inoue  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
2182cd038dSYoshinobu Inoue  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
2282cd038dSYoshinobu Inoue  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
2382cd038dSYoshinobu Inoue  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
2482cd038dSYoshinobu Inoue  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
2582cd038dSYoshinobu Inoue  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
2682cd038dSYoshinobu Inoue  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
2782cd038dSYoshinobu Inoue  * SUCH DAMAGE.
2882cd038dSYoshinobu Inoue  *
2982cd038dSYoshinobu Inoue  * $FreeBSD$
3082cd038dSYoshinobu Inoue  */
3182cd038dSYoshinobu Inoue 
32caf43b02SWarner Losh /*-
3382cd038dSYoshinobu Inoue  * Copyright (c) 1982, 1986, 1988, 1993
3482cd038dSYoshinobu Inoue  *	The Regents of the University of California.  All rights reserved.
3582cd038dSYoshinobu Inoue  *
3682cd038dSYoshinobu Inoue  * Redistribution and use in source and binary forms, with or without
3782cd038dSYoshinobu Inoue  * modification, are permitted provided that the following conditions
3882cd038dSYoshinobu Inoue  * are met:
3982cd038dSYoshinobu Inoue  * 1. Redistributions of source code must retain the above copyright
4082cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer.
4182cd038dSYoshinobu Inoue  * 2. Redistributions in binary form must reproduce the above copyright
4282cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer in the
4382cd038dSYoshinobu Inoue  *    documentation and/or other materials provided with the distribution.
4482cd038dSYoshinobu Inoue  * 4. Neither the name of the University nor the names of its contributors
4582cd038dSYoshinobu Inoue  *    may be used to endorse or promote products derived from this software
4682cd038dSYoshinobu Inoue  *    without specific prior written permission.
4782cd038dSYoshinobu Inoue  *
4882cd038dSYoshinobu Inoue  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
4982cd038dSYoshinobu Inoue  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
5082cd038dSYoshinobu Inoue  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
5182cd038dSYoshinobu Inoue  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
5282cd038dSYoshinobu Inoue  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
5382cd038dSYoshinobu Inoue  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
5482cd038dSYoshinobu Inoue  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
5582cd038dSYoshinobu Inoue  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
5682cd038dSYoshinobu Inoue  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
5782cd038dSYoshinobu Inoue  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
5882cd038dSYoshinobu Inoue  * SUCH DAMAGE.
5982cd038dSYoshinobu Inoue  *
6082cd038dSYoshinobu Inoue  *	@(#)raw_ip.c	8.2 (Berkeley) 1/4/94
6182cd038dSYoshinobu Inoue  */
6282cd038dSYoshinobu Inoue 
636a800098SYoshinobu Inoue #include "opt_ipsec.h"
6433841545SHajimu UMEMOTO #include "opt_inet6.h"
656a800098SYoshinobu Inoue 
6682cd038dSYoshinobu Inoue #include <sys/param.h>
6782cd038dSYoshinobu Inoue #include <sys/errno.h>
68960ed29cSSeigo Tanimura #include <sys/lock.h>
69960ed29cSSeigo Tanimura #include <sys/malloc.h>
70960ed29cSSeigo Tanimura #include <sys/mbuf.h>
71960ed29cSSeigo Tanimura #include <sys/proc.h>
72960ed29cSSeigo Tanimura #include <sys/protosw.h>
73960ed29cSSeigo Tanimura #include <sys/signalvar.h>
74960ed29cSSeigo Tanimura #include <sys/socket.h>
75960ed29cSSeigo Tanimura #include <sys/socketvar.h>
76960ed29cSSeigo Tanimura #include <sys/sx.h>
7782cd038dSYoshinobu Inoue #include <sys/systm.h>
78a1f7e5f8SHajimu UMEMOTO #include <sys/syslog.h>
7982cd038dSYoshinobu Inoue 
8082cd038dSYoshinobu Inoue #include <net/if.h>
8182cd038dSYoshinobu Inoue #include <net/if_types.h>
82960ed29cSSeigo Tanimura #include <net/route.h>
8382cd038dSYoshinobu Inoue 
8482cd038dSYoshinobu Inoue #include <netinet/in.h>
8582cd038dSYoshinobu Inoue #include <netinet/in_var.h>
8682cd038dSYoshinobu Inoue #include <netinet/in_systm.h>
87686cdd19SJun-ichiro itojun Hagino #include <netinet/icmp6.h>
8882cd038dSYoshinobu Inoue #include <netinet/in_pcb.h>
89960ed29cSSeigo Tanimura #include <netinet/ip6.h>
90686cdd19SJun-ichiro itojun Hagino #include <netinet6/ip6protosw.h>
91960ed29cSSeigo Tanimura #include <netinet6/ip6_mroute.h>
92960ed29cSSeigo Tanimura #include <netinet6/in6_pcb.h>
93960ed29cSSeigo Tanimura #include <netinet6/ip6_var.h>
94960ed29cSSeigo Tanimura #include <netinet6/nd6.h>
95960ed29cSSeigo Tanimura #include <netinet6/raw_ip6.h>
96686cdd19SJun-ichiro itojun Hagino #include <netinet6/scope6_var.h>
9782cd038dSYoshinobu Inoue 
9882cd038dSYoshinobu Inoue #ifdef IPSEC
9982cd038dSYoshinobu Inoue #include <netinet6/ipsec.h>
10082cd038dSYoshinobu Inoue #include <netinet6/ipsec6.h>
10182cd038dSYoshinobu Inoue #endif /*IPSEC*/
10282cd038dSYoshinobu Inoue 
103b9234fafSSam Leffler #ifdef FAST_IPSEC
104b9234fafSSam Leffler #include <netipsec/ipsec.h>
105b9234fafSSam Leffler #include <netipsec/ipsec6.h>
106b9234fafSSam Leffler #endif /* FAST_IPSEC */
107b9234fafSSam Leffler 
10882cd038dSYoshinobu Inoue #include <machine/stdarg.h>
10982cd038dSYoshinobu Inoue 
11082cd038dSYoshinobu Inoue #define	satosin6(sa)	((struct sockaddr_in6 *)(sa))
11182cd038dSYoshinobu Inoue #define	ifatoia6(ifa)	((struct in6_ifaddr *)(ifa))
11282cd038dSYoshinobu Inoue 
11382cd038dSYoshinobu Inoue /*
11482cd038dSYoshinobu Inoue  * Raw interface to IP6 protocol.
11582cd038dSYoshinobu Inoue  */
11682cd038dSYoshinobu Inoue 
11782cd038dSYoshinobu Inoue extern struct	inpcbhead ripcb;
11882cd038dSYoshinobu Inoue extern struct	inpcbinfo ripcbinfo;
11982cd038dSYoshinobu Inoue extern u_long	rip_sendspace;
12082cd038dSYoshinobu Inoue extern u_long	rip_recvspace;
12182cd038dSYoshinobu Inoue 
12233841545SHajimu UMEMOTO struct rip6stat rip6stat;
12333841545SHajimu UMEMOTO 
12482cd038dSYoshinobu Inoue /*
12582cd038dSYoshinobu Inoue  * Setup generic address and protocol structures
12682cd038dSYoshinobu Inoue  * for raw_input routine, then pass them along with
12782cd038dSYoshinobu Inoue  * mbuf chain.
12882cd038dSYoshinobu Inoue  */
12982cd038dSYoshinobu Inoue int
13082cd038dSYoshinobu Inoue rip6_input(mp, offp, proto)
13182cd038dSYoshinobu Inoue 	struct	mbuf **mp;
13282cd038dSYoshinobu Inoue 	int	*offp, proto;
13382cd038dSYoshinobu Inoue {
13482cd038dSYoshinobu Inoue 	struct mbuf *m = *mp;
13582cd038dSYoshinobu Inoue 	register struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
13682cd038dSYoshinobu Inoue 	register struct inpcb *in6p;
13782cd038dSYoshinobu Inoue 	struct inpcb *last = 0;
13833841545SHajimu UMEMOTO 	struct mbuf *opts = NULL;
139af12e09eSHajimu UMEMOTO 	struct sockaddr_in6 fromsa;
14082cd038dSYoshinobu Inoue 
14133841545SHajimu UMEMOTO 	rip6stat.rip6s_ipackets++;
14233841545SHajimu UMEMOTO 
1439494d596SBrooks Davis 	if (faithprefix_p != NULL && (*faithprefix_p)(&ip6->ip6_dst)) {
14482cd038dSYoshinobu Inoue 		/* XXX send icmp6 host/port unreach? */
14582cd038dSYoshinobu Inoue 		m_freem(m);
14682cd038dSYoshinobu Inoue 		return IPPROTO_DONE;
14782cd038dSYoshinobu Inoue 	}
14833841545SHajimu UMEMOTO 
149af12e09eSHajimu UMEMOTO 	init_sin6(&fromsa, m); /* general init */
15082cd038dSYoshinobu Inoue 
15107385abdSRobert Watson 	INP_INFO_RLOCK(&ripcbinfo);
15282cd038dSYoshinobu Inoue 	LIST_FOREACH(in6p, &ripcb, inp_list) {
15307385abdSRobert Watson 		INP_LOCK(in6p);
15407385abdSRobert Watson 		if ((in6p->in6p_vflag & INP_IPV6) == 0) {
15507385abdSRobert Watson docontinue:
15607385abdSRobert Watson 			INP_UNLOCK(in6p);
15782cd038dSYoshinobu Inoue 			continue;
15807385abdSRobert Watson 		}
15982cd038dSYoshinobu Inoue 		if (in6p->in6p_ip6_nxt &&
16082cd038dSYoshinobu Inoue 		    in6p->in6p_ip6_nxt != proto)
16107385abdSRobert Watson 			goto docontinue;
16282cd038dSYoshinobu Inoue 		if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_laddr) &&
16382cd038dSYoshinobu Inoue 		    !IN6_ARE_ADDR_EQUAL(&in6p->in6p_laddr, &ip6->ip6_dst))
16407385abdSRobert Watson 			goto docontinue;
16582cd038dSYoshinobu Inoue 		if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr) &&
16682cd038dSYoshinobu Inoue 		    !IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr, &ip6->ip6_src))
16707385abdSRobert Watson 			goto docontinue;
16833841545SHajimu UMEMOTO 		if (in6p->in6p_cksum != -1) {
16933841545SHajimu UMEMOTO 			rip6stat.rip6s_isum++;
1704350fcabSSUZUKI Shinsuke 			if (in6_cksum(m, proto, *offp,
17182cd038dSYoshinobu Inoue 			    m->m_pkthdr.len - *offp)) {
17233841545SHajimu UMEMOTO 				rip6stat.rip6s_badsum++;
17307385abdSRobert Watson 				goto docontinue;
17482cd038dSYoshinobu Inoue 			}
17533841545SHajimu UMEMOTO 		}
17682cd038dSYoshinobu Inoue 		if (last) {
17782cd038dSYoshinobu Inoue 			struct mbuf *n = m_copy(m, 0, (int)M_COPYALL);
17833841545SHajimu UMEMOTO 
179da0f4099SHajimu UMEMOTO #if defined(IPSEC) || defined(FAST_IPSEC)
180da0f4099SHajimu UMEMOTO 			/*
181da0f4099SHajimu UMEMOTO 			 * Check AH/ESP integrity.
182da0f4099SHajimu UMEMOTO 			 */
183da0f4099SHajimu UMEMOTO 			if (n && ipsec6_in_reject(n, last)) {
184da0f4099SHajimu UMEMOTO 				m_freem(n);
18533841545SHajimu UMEMOTO #ifdef IPSEC
18633841545SHajimu UMEMOTO 				ipsec6stat.in_polvio++;
18733841545SHajimu UMEMOTO #endif /*IPSEC*/
188b9234fafSSam Leffler 				/* do not inject data into pcb */
189b9234fafSSam Leffler 			} else
190da0f4099SHajimu UMEMOTO #endif /*IPSEC || FAST_IPSEC*/
19182cd038dSYoshinobu Inoue 			if (n) {
1924cc20ab1SSeigo Tanimura 				if (last->in6p_flags & IN6P_CONTROLOPTS ||
1934cc20ab1SSeigo Tanimura 				    last->in6p_socket->so_options & SO_TIMESTAMP)
19411de19f4SHajimu UMEMOTO 					ip6_savecontrol(last, n, &opts);
19582cd038dSYoshinobu Inoue 				/* strip intermediate headers */
19682cd038dSYoshinobu Inoue 				m_adj(n, *offp);
19782cd038dSYoshinobu Inoue 				if (sbappendaddr(&last->in6p_socket->so_rcv,
198af12e09eSHajimu UMEMOTO 						(struct sockaddr *)&fromsa,
19982cd038dSYoshinobu Inoue 						 n, opts) == 0) {
20082cd038dSYoshinobu Inoue 					m_freem(n);
20182cd038dSYoshinobu Inoue 					if (opts)
20282cd038dSYoshinobu Inoue 						m_freem(opts);
20333841545SHajimu UMEMOTO 					rip6stat.rip6s_fullsock++;
2044cc20ab1SSeigo Tanimura 				} else
20582cd038dSYoshinobu Inoue 					sorwakeup(last->in6p_socket);
20682cd038dSYoshinobu Inoue 				opts = NULL;
20782cd038dSYoshinobu Inoue 			}
20807385abdSRobert Watson 			INP_UNLOCK(last);
20982cd038dSYoshinobu Inoue 		}
21082cd038dSYoshinobu Inoue 		last = in6p;
21182cd038dSYoshinobu Inoue 	}
212da0f4099SHajimu UMEMOTO #if defined(IPSEC) || defined(FAST_IPSEC)
213da0f4099SHajimu UMEMOTO 	/*
214da0f4099SHajimu UMEMOTO 	 * Check AH/ESP integrity.
215da0f4099SHajimu UMEMOTO 	 */
216da0f4099SHajimu UMEMOTO 	if (last && ipsec6_in_reject(m, last)) {
217da0f4099SHajimu UMEMOTO 		m_freem(m);
21833841545SHajimu UMEMOTO #ifdef IPSEC
21933841545SHajimu UMEMOTO 		ipsec6stat.in_polvio++;
22033841545SHajimu UMEMOTO #endif /*IPSEC*/
221b9234fafSSam Leffler 		ip6stat.ip6s_delivered--;
222b9234fafSSam Leffler 		/* do not inject data into pcb */
2232af9b919SSUZUKI Shinsuke 		INP_UNLOCK(last);
224b9234fafSSam Leffler 	} else
225da0f4099SHajimu UMEMOTO #endif /*IPSEC || FAST_IPSEC*/
22682cd038dSYoshinobu Inoue 	if (last) {
2274cc20ab1SSeigo Tanimura 		if (last->in6p_flags & IN6P_CONTROLOPTS ||
2284cc20ab1SSeigo Tanimura 		    last->in6p_socket->so_options & SO_TIMESTAMP)
22911de19f4SHajimu UMEMOTO 			ip6_savecontrol(last, m, &opts);
23082cd038dSYoshinobu Inoue 		/* strip intermediate headers */
23182cd038dSYoshinobu Inoue 		m_adj(m, *offp);
23282cd038dSYoshinobu Inoue 		if (sbappendaddr(&last->in6p_socket->so_rcv,
233af12e09eSHajimu UMEMOTO 				(struct sockaddr *)&fromsa, m, opts) == 0) {
23482cd038dSYoshinobu Inoue 			m_freem(m);
23582cd038dSYoshinobu Inoue 			if (opts)
23682cd038dSYoshinobu Inoue 				m_freem(opts);
23733841545SHajimu UMEMOTO 			rip6stat.rip6s_fullsock++;
2384cc20ab1SSeigo Tanimura 		} else
23982cd038dSYoshinobu Inoue 			sorwakeup(last->in6p_socket);
24007385abdSRobert Watson 		INP_UNLOCK(last);
24182cd038dSYoshinobu Inoue 	} else {
24233841545SHajimu UMEMOTO 		rip6stat.rip6s_nosock++;
24333841545SHajimu UMEMOTO 		if (m->m_flags & M_MCAST)
24433841545SHajimu UMEMOTO 			rip6stat.rip6s_nosockmcast++;
24582cd038dSYoshinobu Inoue 		if (proto == IPPROTO_NONE)
24682cd038dSYoshinobu Inoue 			m_freem(m);
24782cd038dSYoshinobu Inoue 		else {
24882cd038dSYoshinobu Inoue 			char *prvnxtp = ip6_get_prevhdr(m, *offp); /* XXX */
24982cd038dSYoshinobu Inoue 			icmp6_error(m, ICMP6_PARAM_PROB,
25082cd038dSYoshinobu Inoue 				    ICMP6_PARAMPROB_NEXTHEADER,
25182cd038dSYoshinobu Inoue 				    prvnxtp - mtod(m, char *));
25282cd038dSYoshinobu Inoue 		}
25382cd038dSYoshinobu Inoue 		ip6stat.ip6s_delivered--;
25482cd038dSYoshinobu Inoue 	}
2550b7851faSRobert Watson 	INP_INFO_RUNLOCK(&ripcbinfo);
25682cd038dSYoshinobu Inoue 	return IPPROTO_DONE;
25782cd038dSYoshinobu Inoue }
25882cd038dSYoshinobu Inoue 
259686cdd19SJun-ichiro itojun Hagino void
260686cdd19SJun-ichiro itojun Hagino rip6_ctlinput(cmd, sa, d)
261686cdd19SJun-ichiro itojun Hagino 	int cmd;
262686cdd19SJun-ichiro itojun Hagino 	struct sockaddr *sa;
263686cdd19SJun-ichiro itojun Hagino 	void *d;
264686cdd19SJun-ichiro itojun Hagino {
265686cdd19SJun-ichiro itojun Hagino 	struct ip6_hdr *ip6;
266686cdd19SJun-ichiro itojun Hagino 	struct mbuf *m;
267686cdd19SJun-ichiro itojun Hagino 	int off = 0;
26833841545SHajimu UMEMOTO 	struct ip6ctlparam *ip6cp = NULL;
26933841545SHajimu UMEMOTO 	const struct sockaddr_in6 *sa6_src = NULL;
270efddf5c6SHajimu UMEMOTO 	void *cmdarg;
2713ce144eaSJeffrey Hsu 	struct inpcb *(*notify) __P((struct inpcb *, int)) = in6_rtchange;
272686cdd19SJun-ichiro itojun Hagino 
273686cdd19SJun-ichiro itojun Hagino 	if (sa->sa_family != AF_INET6 ||
274686cdd19SJun-ichiro itojun Hagino 	    sa->sa_len != sizeof(struct sockaddr_in6))
275686cdd19SJun-ichiro itojun Hagino 		return;
276686cdd19SJun-ichiro itojun Hagino 
277686cdd19SJun-ichiro itojun Hagino 	if ((unsigned)cmd >= PRC_NCMDS)
278686cdd19SJun-ichiro itojun Hagino 		return;
279686cdd19SJun-ichiro itojun Hagino 	if (PRC_IS_REDIRECT(cmd))
280686cdd19SJun-ichiro itojun Hagino 		notify = in6_rtchange, d = NULL;
281686cdd19SJun-ichiro itojun Hagino 	else if (cmd == PRC_HOSTDEAD)
282686cdd19SJun-ichiro itojun Hagino 		d = NULL;
283686cdd19SJun-ichiro itojun Hagino 	else if (inet6ctlerrmap[cmd] == 0)
284686cdd19SJun-ichiro itojun Hagino 		return;
285686cdd19SJun-ichiro itojun Hagino 
286686cdd19SJun-ichiro itojun Hagino 	/* if the parameter is from icmp6, decode it. */
287686cdd19SJun-ichiro itojun Hagino 	if (d != NULL) {
28833841545SHajimu UMEMOTO 		ip6cp = (struct ip6ctlparam *)d;
289686cdd19SJun-ichiro itojun Hagino 		m = ip6cp->ip6c_m;
290686cdd19SJun-ichiro itojun Hagino 		ip6 = ip6cp->ip6c_ip6;
291686cdd19SJun-ichiro itojun Hagino 		off = ip6cp->ip6c_off;
292efddf5c6SHajimu UMEMOTO 		cmdarg = ip6cp->ip6c_cmdarg;
29333841545SHajimu UMEMOTO 		sa6_src = ip6cp->ip6c_src;
294686cdd19SJun-ichiro itojun Hagino 	} else {
295686cdd19SJun-ichiro itojun Hagino 		m = NULL;
296686cdd19SJun-ichiro itojun Hagino 		ip6 = NULL;
297efddf5c6SHajimu UMEMOTO 		cmdarg = NULL;
29833841545SHajimu UMEMOTO 		sa6_src = &sa6_any;
299686cdd19SJun-ichiro itojun Hagino 	}
300686cdd19SJun-ichiro itojun Hagino 
301f31f65a7SRobert Watson 	(void) in6_pcbnotify(&ripcbinfo, sa, 0,
302f31f65a7SRobert Watson 			     (const struct sockaddr *)sa6_src,
303efddf5c6SHajimu UMEMOTO 			     0, cmd, cmdarg, notify);
304686cdd19SJun-ichiro itojun Hagino }
305686cdd19SJun-ichiro itojun Hagino 
30682cd038dSYoshinobu Inoue /*
30782cd038dSYoshinobu Inoue  * Generate IPv6 header and pass packet to ip6_output.
30882cd038dSYoshinobu Inoue  * Tack on options user may have setup with control call.
30982cd038dSYoshinobu Inoue  */
31082cd038dSYoshinobu Inoue int
31182cd038dSYoshinobu Inoue #if __STDC__
31282cd038dSYoshinobu Inoue rip6_output(struct mbuf *m, ...)
31382cd038dSYoshinobu Inoue #else
31482cd038dSYoshinobu Inoue rip6_output(m, va_alist)
31582cd038dSYoshinobu Inoue 	struct mbuf *m;
31682cd038dSYoshinobu Inoue 	va_dcl
31782cd038dSYoshinobu Inoue #endif
31882cd038dSYoshinobu Inoue {
31907eb2995SHajimu UMEMOTO 	struct mbuf *control;
32082cd038dSYoshinobu Inoue 	struct socket *so;
32182cd038dSYoshinobu Inoue 	struct sockaddr_in6 *dstsock;
32282cd038dSYoshinobu Inoue 	struct in6_addr *dst;
32382cd038dSYoshinobu Inoue 	struct ip6_hdr *ip6;
32482cd038dSYoshinobu Inoue 	struct inpcb *in6p;
32582cd038dSYoshinobu Inoue 	u_int	plen = m->m_pkthdr.len;
32682cd038dSYoshinobu Inoue 	int error = 0;
327e07db7aaSHajimu UMEMOTO 	struct ip6_pktopts opt, *optp;
32882cd038dSYoshinobu Inoue 	struct ifnet *oifp = NULL;
32982cd038dSYoshinobu Inoue 	int type = 0, code = 0;		/* for ICMPv6 output statistics only */
33082cd038dSYoshinobu Inoue 	int priv = 0;
331a1f7e5f8SHajimu UMEMOTO 	int scope_ambiguous = 0;
332f95d4633SHajimu UMEMOTO 	struct in6_addr *in6a;
33382cd038dSYoshinobu Inoue 	va_list ap;
33482cd038dSYoshinobu Inoue 
33582cd038dSYoshinobu Inoue 	va_start(ap, m);
33682cd038dSYoshinobu Inoue 	so = va_arg(ap, struct socket *);
33782cd038dSYoshinobu Inoue 	dstsock = va_arg(ap, struct sockaddr_in6 *);
33882cd038dSYoshinobu Inoue 	control = va_arg(ap, struct mbuf *);
33982cd038dSYoshinobu Inoue 	va_end(ap);
34082cd038dSYoshinobu Inoue 
34182cd038dSYoshinobu Inoue 	in6p = sotoin6pcb(so);
34207385abdSRobert Watson 	INP_LOCK(in6p);
34382cd038dSYoshinobu Inoue 
34482cd038dSYoshinobu Inoue 	priv = 0;
34582cd038dSYoshinobu Inoue 	if (so->so_cred->cr_uid == 0)
34682cd038dSYoshinobu Inoue 		priv = 1;
34782cd038dSYoshinobu Inoue 	dst = &dstsock->sin6_addr;
34882cd038dSYoshinobu Inoue 	if (control) {
349d5e3406dSHajimu UMEMOTO 		if ((error = ip6_setpktopts(control, &opt,
350885adbfaSHajimu UMEMOTO 		    in6p->in6p_outputopts, priv, so->so_proto->pr_protocol))
351f95d4633SHajimu UMEMOTO 		    != 0) {
35282cd038dSYoshinobu Inoue 			goto bad;
353f95d4633SHajimu UMEMOTO 		}
354e07db7aaSHajimu UMEMOTO 		optp = &opt;
355e07db7aaSHajimu UMEMOTO 	} else
356e07db7aaSHajimu UMEMOTO 		optp = in6p->in6p_outputopts;
35782cd038dSYoshinobu Inoue 
35882cd038dSYoshinobu Inoue 	/*
359a1f7e5f8SHajimu UMEMOTO 	 * Check and convert scope zone ID into internal form.
360a1f7e5f8SHajimu UMEMOTO 	 * XXX: we may still need to determine the zone later.
361a1f7e5f8SHajimu UMEMOTO 	 */
362a1f7e5f8SHajimu UMEMOTO 	if (!(so->so_state & SS_ISCONNECTED)) {
363a1f7e5f8SHajimu UMEMOTO 		if (dstsock->sin6_scope_id == 0 && !ip6_use_defzone)
364a1f7e5f8SHajimu UMEMOTO 			scope_ambiguous = 1;
365a1f7e5f8SHajimu UMEMOTO 		if ((error = sa6_embedscope(dstsock, ip6_use_defzone)) != 0)
366a1f7e5f8SHajimu UMEMOTO 			goto bad;
367a1f7e5f8SHajimu UMEMOTO 	}
368a1f7e5f8SHajimu UMEMOTO 
369a1f7e5f8SHajimu UMEMOTO 	/*
37082cd038dSYoshinobu Inoue 	 * For an ICMPv6 packet, we should know its type and code
37182cd038dSYoshinobu Inoue 	 * to update statistics.
37282cd038dSYoshinobu Inoue 	 */
37382cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
37482cd038dSYoshinobu Inoue 		struct icmp6_hdr *icmp6;
37582cd038dSYoshinobu Inoue 		if (m->m_len < sizeof(struct icmp6_hdr) &&
37682cd038dSYoshinobu Inoue 		    (m = m_pullup(m, sizeof(struct icmp6_hdr))) == NULL) {
37782cd038dSYoshinobu Inoue 			error = ENOBUFS;
37882cd038dSYoshinobu Inoue 			goto bad;
37982cd038dSYoshinobu Inoue 		}
38082cd038dSYoshinobu Inoue 		icmp6 = mtod(m, struct icmp6_hdr *);
38182cd038dSYoshinobu Inoue 		type = icmp6->icmp6_type;
38282cd038dSYoshinobu Inoue 		code = icmp6->icmp6_code;
38382cd038dSYoshinobu Inoue 	}
38482cd038dSYoshinobu Inoue 
3858a0c4da8SRobert Watson 	M_PREPEND(m, sizeof(*ip6), M_DONTWAIT);
3868a0c4da8SRobert Watson 	if (m == NULL) {
3878a0c4da8SRobert Watson 		error = ENOBUFS;
3888a0c4da8SRobert Watson 		goto bad;
3898a0c4da8SRobert Watson 	}
39082cd038dSYoshinobu Inoue 	ip6 = mtod(m, struct ip6_hdr *);
39182cd038dSYoshinobu Inoue 
39282cd038dSYoshinobu Inoue 	/*
39382cd038dSYoshinobu Inoue 	 * Source address selection.
39482cd038dSYoshinobu Inoue 	 */
395e07db7aaSHajimu UMEMOTO 	if ((in6a = in6_selectsrc(dstsock, optp, in6p->in6p_moptions, NULL,
396a1f7e5f8SHajimu UMEMOTO 	    &in6p->in6p_laddr, &oifp, &error)) == NULL) {
39782cd038dSYoshinobu Inoue 		if (error == 0)
39882cd038dSYoshinobu Inoue 			error = EADDRNOTAVAIL;
39982cd038dSYoshinobu Inoue 		goto bad;
40082cd038dSYoshinobu Inoue 	}
40182cd038dSYoshinobu Inoue 	ip6->ip6_src = *in6a;
402a1f7e5f8SHajimu UMEMOTO 
403a1f7e5f8SHajimu UMEMOTO 	if (oifp && scope_ambiguous) {
404a1f7e5f8SHajimu UMEMOTO 		/*
405a1f7e5f8SHajimu UMEMOTO 		 * Application should provide a proper zone ID or the use of
406a1f7e5f8SHajimu UMEMOTO 		 * default zone IDs should be enabled.  Unfortunately, some
407a1f7e5f8SHajimu UMEMOTO 		 * applications do not behave as it should, so we need a
408a1f7e5f8SHajimu UMEMOTO 		 * workaround.  Even if an appropriate ID is not determined
409a1f7e5f8SHajimu UMEMOTO 		 * (when it's required), if we can determine the outgoing
410a1f7e5f8SHajimu UMEMOTO 		 * interface. determine the zone ID based on the interface.
411a1f7e5f8SHajimu UMEMOTO 		 */
412a1f7e5f8SHajimu UMEMOTO 		error = in6_setscope(&dstsock->sin6_addr, oifp, NULL);
413a1f7e5f8SHajimu UMEMOTO 		if (error != 0)
414a1f7e5f8SHajimu UMEMOTO 			goto bad;
415a1f7e5f8SHajimu UMEMOTO 	}
416a1f7e5f8SHajimu UMEMOTO 	ip6->ip6_dst = dstsock->sin6_addr;
417a1f7e5f8SHajimu UMEMOTO 
418a1f7e5f8SHajimu UMEMOTO 	/* fill in the rest of the IPv6 header fields */
4196a800098SYoshinobu Inoue 	ip6->ip6_flow = (ip6->ip6_flow & ~IPV6_FLOWINFO_MASK) |
4206a800098SYoshinobu Inoue 		(in6p->in6p_flowinfo & IPV6_FLOWINFO_MASK);
4216a800098SYoshinobu Inoue 	ip6->ip6_vfc = (ip6->ip6_vfc & ~IPV6_VERSION_MASK) |
4226a800098SYoshinobu Inoue 		(IPV6_VERSION & IPV6_VERSION_MASK);
42382cd038dSYoshinobu Inoue 	/* ip6_plen will be filled in ip6_output, so not fill it here. */
42482cd038dSYoshinobu Inoue 	ip6->ip6_nxt = in6p->in6p_ip6_nxt;
42582cd038dSYoshinobu Inoue 	ip6->ip6_hlim = in6_selecthlim(in6p, oifp);
42682cd038dSYoshinobu Inoue 
42782cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6 ||
42882cd038dSYoshinobu Inoue 	    in6p->in6p_cksum != -1) {
42982cd038dSYoshinobu Inoue 		struct mbuf *n;
43082cd038dSYoshinobu Inoue 		int off;
43182cd038dSYoshinobu Inoue 		u_int16_t *p;
43282cd038dSYoshinobu Inoue 
43382cd038dSYoshinobu Inoue 		/* compute checksum */
43482cd038dSYoshinobu Inoue 		if (so->so_proto->pr_protocol == IPPROTO_ICMPV6)
43582cd038dSYoshinobu Inoue 			off = offsetof(struct icmp6_hdr, icmp6_cksum);
43682cd038dSYoshinobu Inoue 		else
43782cd038dSYoshinobu Inoue 			off = in6p->in6p_cksum;
43882cd038dSYoshinobu Inoue 		if (plen < off + 1) {
43982cd038dSYoshinobu Inoue 			error = EINVAL;
44082cd038dSYoshinobu Inoue 			goto bad;
44182cd038dSYoshinobu Inoue 		}
44282cd038dSYoshinobu Inoue 		off += sizeof(struct ip6_hdr);
44382cd038dSYoshinobu Inoue 
44482cd038dSYoshinobu Inoue 		n = m;
44582cd038dSYoshinobu Inoue 		while (n && n->m_len <= off) {
44682cd038dSYoshinobu Inoue 			off -= n->m_len;
44782cd038dSYoshinobu Inoue 			n = n->m_next;
44882cd038dSYoshinobu Inoue 		}
44982cd038dSYoshinobu Inoue 		if (!n)
45082cd038dSYoshinobu Inoue 			goto bad;
45182cd038dSYoshinobu Inoue 		p = (u_int16_t *)(mtod(n, caddr_t) + off);
45282cd038dSYoshinobu Inoue 		*p = 0;
45382cd038dSYoshinobu Inoue 		*p = in6_cksum(m, ip6->ip6_nxt, sizeof(*ip6), plen);
45482cd038dSYoshinobu Inoue 	}
45582cd038dSYoshinobu Inoue 
456e07db7aaSHajimu UMEMOTO 	error = ip6_output(m, optp, NULL, 0, in6p->in6p_moptions, &oifp, in6p);
45782cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
45882cd038dSYoshinobu Inoue 		if (oifp)
45982cd038dSYoshinobu Inoue 			icmp6_ifoutstat_inc(oifp, type, code);
46082cd038dSYoshinobu Inoue 		icmp6stat.icp6s_outhist[type]++;
46133841545SHajimu UMEMOTO 	} else
46233841545SHajimu UMEMOTO 		rip6stat.rip6s_opackets++;
46382cd038dSYoshinobu Inoue 
46482cd038dSYoshinobu Inoue 	goto freectl;
46582cd038dSYoshinobu Inoue 
46682cd038dSYoshinobu Inoue  bad:
46782cd038dSYoshinobu Inoue 	if (m)
46882cd038dSYoshinobu Inoue 		m_freem(m);
46982cd038dSYoshinobu Inoue 
47082cd038dSYoshinobu Inoue  freectl:
47133841545SHajimu UMEMOTO 	if (control) {
472e07db7aaSHajimu UMEMOTO 		ip6_clearpktopts(&opt, -1);
47382cd038dSYoshinobu Inoue 		m_freem(control);
47433841545SHajimu UMEMOTO 	}
47507385abdSRobert Watson 	INP_UNLOCK(in6p);
47682cd038dSYoshinobu Inoue 	return (error);
47782cd038dSYoshinobu Inoue }
47882cd038dSYoshinobu Inoue 
47982cd038dSYoshinobu Inoue /*
48082cd038dSYoshinobu Inoue  * Raw IPv6 socket option processing.
48182cd038dSYoshinobu Inoue  */
48282cd038dSYoshinobu Inoue int
48382cd038dSYoshinobu Inoue rip6_ctloutput(so, sopt)
48482cd038dSYoshinobu Inoue 	struct socket *so;
48582cd038dSYoshinobu Inoue 	struct sockopt *sopt;
48682cd038dSYoshinobu Inoue {
48782cd038dSYoshinobu Inoue 	int error;
48882cd038dSYoshinobu Inoue 
48982cd038dSYoshinobu Inoue 	if (sopt->sopt_level == IPPROTO_ICMPV6)
49082cd038dSYoshinobu Inoue 		/*
49182cd038dSYoshinobu Inoue 		 * XXX: is it better to call icmp6_ctloutput() directly
49282cd038dSYoshinobu Inoue 		 * from protosw?
49382cd038dSYoshinobu Inoue 		 */
49482cd038dSYoshinobu Inoue 		return (icmp6_ctloutput(so, sopt));
49582cd038dSYoshinobu Inoue 	else if (sopt->sopt_level != IPPROTO_IPV6)
49682cd038dSYoshinobu Inoue 		return (EINVAL);
49782cd038dSYoshinobu Inoue 
49882cd038dSYoshinobu Inoue 	error = 0;
49982cd038dSYoshinobu Inoue 
50082cd038dSYoshinobu Inoue 	switch (sopt->sopt_dir) {
50182cd038dSYoshinobu Inoue 	case SOPT_GET:
50282cd038dSYoshinobu Inoue 		switch (sopt->sopt_name) {
50391ec0a1eSYoshinobu Inoue 		case MRT6_INIT:
50491ec0a1eSYoshinobu Inoue 		case MRT6_DONE:
50591ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MIF:
50691ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MIF:
50791ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MFC:
50891ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MFC:
50991ec0a1eSYoshinobu Inoue 		case MRT6_PIM:
51091ec0a1eSYoshinobu Inoue 			error = ip6_mrouter_get(so, sopt);
51191ec0a1eSYoshinobu Inoue 			break;
51202b9a206SHajimu UMEMOTO 		case IPV6_CHECKSUM:
51302b9a206SHajimu UMEMOTO 			error = ip6_raw_ctloutput(so, sopt);
51402b9a206SHajimu UMEMOTO 			break;
51582cd038dSYoshinobu Inoue 		default:
51682cd038dSYoshinobu Inoue 			error = ip6_ctloutput(so, sopt);
51782cd038dSYoshinobu Inoue 			break;
51882cd038dSYoshinobu Inoue 		}
51982cd038dSYoshinobu Inoue 		break;
52082cd038dSYoshinobu Inoue 
52182cd038dSYoshinobu Inoue 	case SOPT_SET:
52282cd038dSYoshinobu Inoue 		switch (sopt->sopt_name) {
52391ec0a1eSYoshinobu Inoue 		case MRT6_INIT:
52491ec0a1eSYoshinobu Inoue 		case MRT6_DONE:
52591ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MIF:
52691ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MIF:
52791ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MFC:
52891ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MFC:
52991ec0a1eSYoshinobu Inoue 		case MRT6_PIM:
53091ec0a1eSYoshinobu Inoue 			error = ip6_mrouter_set(so, sopt);
53191ec0a1eSYoshinobu Inoue 			break;
53202b9a206SHajimu UMEMOTO 		case IPV6_CHECKSUM:
53302b9a206SHajimu UMEMOTO 			error = ip6_raw_ctloutput(so, sopt);
53402b9a206SHajimu UMEMOTO 			break;
53582cd038dSYoshinobu Inoue 		default:
53682cd038dSYoshinobu Inoue 			error = ip6_ctloutput(so, sopt);
53782cd038dSYoshinobu Inoue 			break;
53882cd038dSYoshinobu Inoue 		}
53982cd038dSYoshinobu Inoue 		break;
54082cd038dSYoshinobu Inoue 	}
54182cd038dSYoshinobu Inoue 
54282cd038dSYoshinobu Inoue 	return (error);
54382cd038dSYoshinobu Inoue }
54482cd038dSYoshinobu Inoue 
54582cd038dSYoshinobu Inoue static int
546b40ce416SJulian Elischer rip6_attach(struct socket *so, int proto, struct thread *td)
54782cd038dSYoshinobu Inoue {
54882cd038dSYoshinobu Inoue 	struct inpcb *inp;
5498a9d54dfSSam Leffler 	struct icmp6_filter *filter;
55082cd038dSYoshinobu Inoue 	int error, s;
55182cd038dSYoshinobu Inoue 
55282cd038dSYoshinobu Inoue 	inp = sotoinpcb(so);
55314ba8addSRobert Watson 	KASSERT(inp == NULL, ("rip6_attach: inp != NULL"));
55414ba8addSRobert Watson 	if (td && (error = suser(td)) != 0)
55582cd038dSYoshinobu Inoue 		return error;
55682cd038dSYoshinobu Inoue 	error = soreserve(so, rip_sendspace, rip_recvspace);
55714ba8addSRobert Watson 	if (error)
55882cd038dSYoshinobu Inoue 		return error;
5598a9d54dfSSam Leffler 	MALLOC(filter, struct icmp6_filter *,
5608a9d54dfSSam Leffler 	       sizeof(struct icmp6_filter), M_PCB, M_NOWAIT);
56114ba8addSRobert Watson 	if (filter == NULL)
5628a9d54dfSSam Leffler 		return ENOMEM;
56314ba8addSRobert Watson 	INP_INFO_WLOCK(&ripcbinfo);
56482cd038dSYoshinobu Inoue 	s = splnet();
5656823b823SPawel Jakub Dawidek 	error = in_pcballoc(so, &ripcbinfo, "raw6inp");
56682cd038dSYoshinobu Inoue 	splx(s);
56707385abdSRobert Watson 	if (error) {
56807385abdSRobert Watson 		INP_INFO_WUNLOCK(&ripcbinfo);
5698a9d54dfSSam Leffler 		FREE(filter, M_PCB);
57082cd038dSYoshinobu Inoue 		return error;
57107385abdSRobert Watson 	}
57282cd038dSYoshinobu Inoue 	inp = (struct inpcb *)so->so_pcb;
57307385abdSRobert Watson 	INP_LOCK(inp);
57407385abdSRobert Watson 	INP_INFO_WUNLOCK(&ripcbinfo);
57582cd038dSYoshinobu Inoue 	inp->inp_vflag |= INP_IPV6;
57682cd038dSYoshinobu Inoue 	inp->in6p_ip6_nxt = (long)proto;
57782cd038dSYoshinobu Inoue 	inp->in6p_hops = -1;	/* use kernel default */
57882cd038dSYoshinobu Inoue 	inp->in6p_cksum = -1;
5798a9d54dfSSam Leffler 	inp->in6p_icmp6filt = filter;
58082cd038dSYoshinobu Inoue 	ICMP6_FILTER_SETPASSALL(inp->in6p_icmp6filt);
58107385abdSRobert Watson 	INP_UNLOCK(inp);
58282cd038dSYoshinobu Inoue 	return 0;
58382cd038dSYoshinobu Inoue }
58482cd038dSYoshinobu Inoue 
585bc725eafSRobert Watson static void
58682cd038dSYoshinobu Inoue rip6_detach(struct socket *so)
58782cd038dSYoshinobu Inoue {
58882cd038dSYoshinobu Inoue 	struct inpcb *inp;
58982cd038dSYoshinobu Inoue 
59082cd038dSYoshinobu Inoue 	inp = sotoinpcb(so);
59114ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_detach: inp == NULL"));
59282cd038dSYoshinobu Inoue 	/* xxx: RSVP */
593e7e3ecb6SYoshinobu Inoue 	if (so == ip6_mrouter)
594e7e3ecb6SYoshinobu Inoue 		ip6_mrouter_done();
59582cd038dSYoshinobu Inoue 	if (inp->in6p_icmp6filt) {
59682cd038dSYoshinobu Inoue 		FREE(inp->in6p_icmp6filt, M_PCB);
59782cd038dSYoshinobu Inoue 		inp->in6p_icmp6filt = NULL;
59882cd038dSYoshinobu Inoue 	}
59914ba8addSRobert Watson 	INP_INFO_WLOCK(&ripcbinfo);
60007385abdSRobert Watson 	INP_LOCK(inp);
60182cd038dSYoshinobu Inoue 	in6_pcbdetach(inp);
60214ba8addSRobert Watson 	in6_pcbfree(inp);
60307385abdSRobert Watson 	INP_INFO_WUNLOCK(&ripcbinfo);
60482cd038dSYoshinobu Inoue }
60582cd038dSYoshinobu Inoue 
606ac45e92fSRobert Watson static void
60782cd038dSYoshinobu Inoue rip6_abort(struct socket *so)
60882cd038dSYoshinobu Inoue {
60982cd038dSYoshinobu Inoue 	soisdisconnected(so);
610ac45e92fSRobert Watson 	rip6_detach(so);
61182cd038dSYoshinobu Inoue }
61282cd038dSYoshinobu Inoue 
61382cd038dSYoshinobu Inoue static int
61482cd038dSYoshinobu Inoue rip6_disconnect(struct socket *so)
61582cd038dSYoshinobu Inoue {
61682cd038dSYoshinobu Inoue 	struct inpcb *inp = sotoinpcb(so);
61782cd038dSYoshinobu Inoue 
6184cc20ab1SSeigo Tanimura 	if ((so->so_state & SS_ISCONNECTED) == 0)
61982cd038dSYoshinobu Inoue 		return ENOTCONN;
62082cd038dSYoshinobu Inoue 	inp->in6p_faddr = in6addr_any;
621ac45e92fSRobert Watson 	rip6_abort(so);
62214ba8addSRobert Watson 	return (0);
62382cd038dSYoshinobu Inoue }
62482cd038dSYoshinobu Inoue 
62582cd038dSYoshinobu Inoue static int
626b40ce416SJulian Elischer rip6_bind(struct socket *so, struct sockaddr *nam, struct thread *td)
62782cd038dSYoshinobu Inoue {
62882cd038dSYoshinobu Inoue 	struct inpcb *inp = sotoinpcb(so);
62982cd038dSYoshinobu Inoue 	struct sockaddr_in6 *addr = (struct sockaddr_in6 *)nam;
63082cd038dSYoshinobu Inoue 	struct ifaddr *ia = NULL;
631a1f7e5f8SHajimu UMEMOTO 	int error = 0;
63282cd038dSYoshinobu Inoue 
63314ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_bind: inp == NULL"));
63482cd038dSYoshinobu Inoue 	if (nam->sa_len != sizeof(*addr))
63582cd038dSYoshinobu Inoue 		return EINVAL;
63682cd038dSYoshinobu Inoue 	if (TAILQ_EMPTY(&ifnet) || addr->sin6_family != AF_INET6)
63782cd038dSYoshinobu Inoue 		return EADDRNOTAVAIL;
638a1f7e5f8SHajimu UMEMOTO 	if ((error = sa6_embedscope(addr, ip6_use_defzone)) != 0)
639a1f7e5f8SHajimu UMEMOTO 		return(error);
640a1f7e5f8SHajimu UMEMOTO 
64182cd038dSYoshinobu Inoue 	if (!IN6_IS_ADDR_UNSPECIFIED(&addr->sin6_addr) &&
64282cd038dSYoshinobu Inoue 	    (ia = ifa_ifwithaddr((struct sockaddr *)addr)) == 0)
64382cd038dSYoshinobu Inoue 		return EADDRNOTAVAIL;
64482cd038dSYoshinobu Inoue 	if (ia &&
64582cd038dSYoshinobu Inoue 	    ((struct in6_ifaddr *)ia)->ia6_flags &
64682cd038dSYoshinobu Inoue 	    (IN6_IFF_ANYCAST|IN6_IFF_NOTREADY|
64782cd038dSYoshinobu Inoue 	     IN6_IFF_DETACHED|IN6_IFF_DEPRECATED)) {
64882cd038dSYoshinobu Inoue 		return (EADDRNOTAVAIL);
64982cd038dSYoshinobu Inoue 	}
65007385abdSRobert Watson 	INP_INFO_WLOCK(&ripcbinfo);
65107385abdSRobert Watson 	INP_LOCK(inp);
65282cd038dSYoshinobu Inoue 	inp->in6p_laddr = addr->sin6_addr;
65307385abdSRobert Watson 	INP_UNLOCK(inp);
65407385abdSRobert Watson 	INP_INFO_WUNLOCK(&ripcbinfo);
65582cd038dSYoshinobu Inoue 	return 0;
65682cd038dSYoshinobu Inoue }
65782cd038dSYoshinobu Inoue 
65882cd038dSYoshinobu Inoue static int
659b40ce416SJulian Elischer rip6_connect(struct socket *so, struct sockaddr *nam, struct thread *td)
66082cd038dSYoshinobu Inoue {
66182cd038dSYoshinobu Inoue 	struct inpcb *inp = sotoinpcb(so);
66282cd038dSYoshinobu Inoue 	struct sockaddr_in6 *addr = (struct sockaddr_in6 *)nam;
66382cd038dSYoshinobu Inoue 	struct in6_addr *in6a = NULL;
664a1f7e5f8SHajimu UMEMOTO 	struct ifnet *ifp = NULL;
665a1f7e5f8SHajimu UMEMOTO 	int error = 0, scope_ambiguous = 0;
66682cd038dSYoshinobu Inoue 
66714ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_connect: inp == NULL"));
66882cd038dSYoshinobu Inoue 	if (nam->sa_len != sizeof(*addr))
66982cd038dSYoshinobu Inoue 		return EINVAL;
67082cd038dSYoshinobu Inoue 	if (TAILQ_EMPTY(&ifnet))
67182cd038dSYoshinobu Inoue 		return EADDRNOTAVAIL;
67282cd038dSYoshinobu Inoue 	if (addr->sin6_family != AF_INET6)
67382cd038dSYoshinobu Inoue 		return EAFNOSUPPORT;
674a1f7e5f8SHajimu UMEMOTO 
675a1f7e5f8SHajimu UMEMOTO 	/*
676a1f7e5f8SHajimu UMEMOTO 	 * Application should provide a proper zone ID or the use of
677a1f7e5f8SHajimu UMEMOTO 	 * default zone IDs should be enabled.  Unfortunately, some
678a1f7e5f8SHajimu UMEMOTO 	 * applications do not behave as it should, so we need a
679a1f7e5f8SHajimu UMEMOTO 	 * workaround.  Even if an appropriate ID is not determined,
680a1f7e5f8SHajimu UMEMOTO 	 * we'll see if we can determine the outgoing interface.  If we
681a1f7e5f8SHajimu UMEMOTO 	 * can, determine the zone ID based on the interface below.
682a1f7e5f8SHajimu UMEMOTO 	 */
683a1f7e5f8SHajimu UMEMOTO 	if (addr->sin6_scope_id == 0 && !ip6_use_defzone)
684a1f7e5f8SHajimu UMEMOTO 		scope_ambiguous = 1;
685a1f7e5f8SHajimu UMEMOTO 	if ((error = sa6_embedscope(addr, ip6_use_defzone)) != 0)
686a1f7e5f8SHajimu UMEMOTO 		return(error);
687a1f7e5f8SHajimu UMEMOTO 
68807385abdSRobert Watson 	INP_INFO_WLOCK(&ripcbinfo);
68907385abdSRobert Watson 	INP_LOCK(inp);
69082cd038dSYoshinobu Inoue 	/* Source address selection. XXX: need pcblookup? */
69182cd038dSYoshinobu Inoue 	in6a = in6_selectsrc(addr, inp->in6p_outputopts,
692fc906dd8SAndre Oppermann 			     inp->in6p_moptions, NULL,
693a1f7e5f8SHajimu UMEMOTO 			     &inp->in6p_laddr, &ifp, &error);
69407385abdSRobert Watson 	if (in6a == NULL) {
69507385abdSRobert Watson 		INP_UNLOCK(inp);
69607385abdSRobert Watson 		INP_INFO_WUNLOCK(&ripcbinfo);
69782cd038dSYoshinobu Inoue 		return (error ? error : EADDRNOTAVAIL);
69807385abdSRobert Watson 	}
699a1f7e5f8SHajimu UMEMOTO 
700a1f7e5f8SHajimu UMEMOTO 	/* XXX: see above */
701a1f7e5f8SHajimu UMEMOTO 	if (ifp && scope_ambiguous &&
702a1f7e5f8SHajimu UMEMOTO 	    (error = in6_setscope(&addr->sin6_addr, ifp, NULL)) != 0) {
703a1f7e5f8SHajimu UMEMOTO 		INP_UNLOCK(inp);
704a1f7e5f8SHajimu UMEMOTO 		INP_INFO_WUNLOCK(&ripcbinfo);
705a1f7e5f8SHajimu UMEMOTO 		return(error);
706a1f7e5f8SHajimu UMEMOTO 	}
70782cd038dSYoshinobu Inoue 	inp->in6p_faddr = addr->sin6_addr;
708a1f7e5f8SHajimu UMEMOTO 	inp->in6p_laddr = *in6a;
70982cd038dSYoshinobu Inoue 	soisconnected(so);
71007385abdSRobert Watson 	INP_UNLOCK(inp);
71107385abdSRobert Watson 	INP_INFO_WUNLOCK(&ripcbinfo);
71282cd038dSYoshinobu Inoue 	return 0;
71382cd038dSYoshinobu Inoue }
71482cd038dSYoshinobu Inoue 
71582cd038dSYoshinobu Inoue static int
71682cd038dSYoshinobu Inoue rip6_shutdown(struct socket *so)
71782cd038dSYoshinobu Inoue {
71807385abdSRobert Watson 	struct inpcb *inp;
71907385abdSRobert Watson 
72007385abdSRobert Watson 	inp = sotoinpcb(so);
72114ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_shutdown: inp == NULL"));
72207385abdSRobert Watson 	INP_LOCK(inp);
72382cd038dSYoshinobu Inoue 	socantsendmore(so);
72407385abdSRobert Watson 	INP_UNLOCK(inp);
72582cd038dSYoshinobu Inoue 	return 0;
72682cd038dSYoshinobu Inoue }
72782cd038dSYoshinobu Inoue 
72882cd038dSYoshinobu Inoue static int
72982cd038dSYoshinobu Inoue rip6_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *nam,
730b40ce416SJulian Elischer 	 struct mbuf *control, struct thread *td)
73182cd038dSYoshinobu Inoue {
73282cd038dSYoshinobu Inoue 	struct inpcb *inp = sotoinpcb(so);
73382cd038dSYoshinobu Inoue 	struct sockaddr_in6 tmp;
73482cd038dSYoshinobu Inoue 	struct sockaddr_in6 *dst;
73507385abdSRobert Watson 	int ret;
73682cd038dSYoshinobu Inoue 
73714ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_send: inp == NULL"));
73807385abdSRobert Watson 	INP_INFO_WLOCK(&ripcbinfo);
739686cdd19SJun-ichiro itojun Hagino 	/* always copy sockaddr to avoid overwrites */
74007385abdSRobert Watson 	/* Unlocked read. */
74182cd038dSYoshinobu Inoue 	if (so->so_state & SS_ISCONNECTED) {
74282cd038dSYoshinobu Inoue 		if (nam) {
74307385abdSRobert Watson 			INP_INFO_WUNLOCK(&ripcbinfo);
74482cd038dSYoshinobu Inoue 			m_freem(m);
74582cd038dSYoshinobu Inoue 			return EISCONN;
74682cd038dSYoshinobu Inoue 		}
74782cd038dSYoshinobu Inoue 		/* XXX */
74882cd038dSYoshinobu Inoue 		bzero(&tmp, sizeof(tmp));
74982cd038dSYoshinobu Inoue 		tmp.sin6_family = AF_INET6;
75082cd038dSYoshinobu Inoue 		tmp.sin6_len = sizeof(struct sockaddr_in6);
75182cd038dSYoshinobu Inoue 		bcopy(&inp->in6p_faddr, &tmp.sin6_addr,
75282cd038dSYoshinobu Inoue 		      sizeof(struct in6_addr));
75382cd038dSYoshinobu Inoue 		dst = &tmp;
75482cd038dSYoshinobu Inoue 	} else {
75582cd038dSYoshinobu Inoue 		if (nam == NULL) {
75607385abdSRobert Watson 			INP_INFO_WUNLOCK(&ripcbinfo);
75782cd038dSYoshinobu Inoue 			m_freem(m);
75882cd038dSYoshinobu Inoue 			return ENOTCONN;
75982cd038dSYoshinobu Inoue 		}
760a1f7e5f8SHajimu UMEMOTO 		if (nam->sa_len != sizeof(struct sockaddr_in6)) {
761a1f7e5f8SHajimu UMEMOTO 			INP_INFO_WUNLOCK(&ripcbinfo);
762a1f7e5f8SHajimu UMEMOTO 			m_freem(m);
763a1f7e5f8SHajimu UMEMOTO 			return(EINVAL);
764a1f7e5f8SHajimu UMEMOTO 		}
765686cdd19SJun-ichiro itojun Hagino 		tmp = *(struct sockaddr_in6 *)nam;
766686cdd19SJun-ichiro itojun Hagino 		dst = &tmp;
767a1f7e5f8SHajimu UMEMOTO 
768a1f7e5f8SHajimu UMEMOTO 		if (dst->sin6_family == AF_UNSPEC) {
769a1f7e5f8SHajimu UMEMOTO 			/*
770a1f7e5f8SHajimu UMEMOTO 			 * XXX: we allow this case for backward
771a1f7e5f8SHajimu UMEMOTO 			 * compatibility to buggy applications that
772a1f7e5f8SHajimu UMEMOTO 			 * rely on old (and wrong) kernel behavior.
773a1f7e5f8SHajimu UMEMOTO 			 */
774a1f7e5f8SHajimu UMEMOTO 			log(LOG_INFO, "rip6 SEND: address family is "
775a1f7e5f8SHajimu UMEMOTO 			    "unspec. Assume AF_INET6\n");
776a1f7e5f8SHajimu UMEMOTO 			dst->sin6_family = AF_INET6;
777a1f7e5f8SHajimu UMEMOTO 		} else if (dst->sin6_family != AF_INET6) {
778a1f7e5f8SHajimu UMEMOTO 			INP_INFO_WUNLOCK(&ripcbinfo);
779a1f7e5f8SHajimu UMEMOTO 			m_freem(m);
780a1f7e5f8SHajimu UMEMOTO 			return(EAFNOSUPPORT);
78182cd038dSYoshinobu Inoue 		}
782686cdd19SJun-ichiro itojun Hagino 	}
78307385abdSRobert Watson 	ret = rip6_output(m, so, dst, control);
78407385abdSRobert Watson 	INP_INFO_WUNLOCK(&ripcbinfo);
78507385abdSRobert Watson 	return (ret);
78682cd038dSYoshinobu Inoue }
78782cd038dSYoshinobu Inoue 
78882cd038dSYoshinobu Inoue struct pr_usrreqs rip6_usrreqs = {
789756d52a1SPoul-Henning Kamp 	.pru_abort =		rip6_abort,
790756d52a1SPoul-Henning Kamp 	.pru_attach =		rip6_attach,
791756d52a1SPoul-Henning Kamp 	.pru_bind =		rip6_bind,
792756d52a1SPoul-Henning Kamp 	.pru_connect =		rip6_connect,
793756d52a1SPoul-Henning Kamp 	.pru_control =		in6_control,
794756d52a1SPoul-Henning Kamp 	.pru_detach =		rip6_detach,
795756d52a1SPoul-Henning Kamp 	.pru_disconnect =	rip6_disconnect,
796756d52a1SPoul-Henning Kamp 	.pru_peeraddr =		in6_setpeeraddr,
797756d52a1SPoul-Henning Kamp 	.pru_send =		rip6_send,
798756d52a1SPoul-Henning Kamp 	.pru_shutdown =		rip6_shutdown,
799756d52a1SPoul-Henning Kamp 	.pru_sockaddr =		in6_setsockaddr,
80082cd038dSYoshinobu Inoue };
801