xref: /freebsd/sys/netinet6/raw_ip6.c (revision 76039bc84fae9915788b54ff28fe0cc4876952d2)
1caf43b02SWarner Losh /*-
282cd038dSYoshinobu Inoue  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
382cd038dSYoshinobu Inoue  * All rights reserved.
482cd038dSYoshinobu Inoue  *
582cd038dSYoshinobu Inoue  * Redistribution and use in source and binary forms, with or without
682cd038dSYoshinobu Inoue  * modification, are permitted provided that the following conditions
782cd038dSYoshinobu Inoue  * are met:
882cd038dSYoshinobu Inoue  * 1. Redistributions of source code must retain the above copyright
982cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer.
1082cd038dSYoshinobu Inoue  * 2. Redistributions in binary form must reproduce the above copyright
1182cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer in the
1282cd038dSYoshinobu Inoue  *    documentation and/or other materials provided with the distribution.
1382cd038dSYoshinobu Inoue  * 3. Neither the name of the project nor the names of its contributors
1482cd038dSYoshinobu Inoue  *    may be used to endorse or promote products derived from this software
1582cd038dSYoshinobu Inoue  *    without specific prior written permission.
1682cd038dSYoshinobu Inoue  *
1782cd038dSYoshinobu Inoue  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
1882cd038dSYoshinobu Inoue  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
1982cd038dSYoshinobu Inoue  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
2082cd038dSYoshinobu Inoue  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
2182cd038dSYoshinobu Inoue  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
2282cd038dSYoshinobu Inoue  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
2382cd038dSYoshinobu Inoue  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
2482cd038dSYoshinobu Inoue  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
2582cd038dSYoshinobu Inoue  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
2682cd038dSYoshinobu Inoue  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
2782cd038dSYoshinobu Inoue  * SUCH DAMAGE.
2882cd038dSYoshinobu Inoue  */
2982cd038dSYoshinobu Inoue 
30caf43b02SWarner Losh /*-
3182cd038dSYoshinobu Inoue  * Copyright (c) 1982, 1986, 1988, 1993
320ae76120SRobert Watson  *	The Regents of the University of California.
330ae76120SRobert Watson  * All rights reserved.
3482cd038dSYoshinobu Inoue  *
3582cd038dSYoshinobu Inoue  * Redistribution and use in source and binary forms, with or without
3682cd038dSYoshinobu Inoue  * modification, are permitted provided that the following conditions
3782cd038dSYoshinobu Inoue  * are met:
3882cd038dSYoshinobu Inoue  * 1. Redistributions of source code must retain the above copyright
3982cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer.
4082cd038dSYoshinobu Inoue  * 2. Redistributions in binary form must reproduce the above copyright
4182cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer in the
4282cd038dSYoshinobu Inoue  *    documentation and/or other materials provided with the distribution.
4382cd038dSYoshinobu Inoue  * 4. Neither the name of the University nor the names of its contributors
4482cd038dSYoshinobu Inoue  *    may be used to endorse or promote products derived from this software
4582cd038dSYoshinobu Inoue  *    without specific prior written permission.
4682cd038dSYoshinobu Inoue  *
4782cd038dSYoshinobu Inoue  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
4882cd038dSYoshinobu Inoue  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
4982cd038dSYoshinobu Inoue  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
5082cd038dSYoshinobu Inoue  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
5182cd038dSYoshinobu Inoue  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
5282cd038dSYoshinobu Inoue  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
5382cd038dSYoshinobu Inoue  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
5482cd038dSYoshinobu Inoue  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
5582cd038dSYoshinobu Inoue  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
5682cd038dSYoshinobu Inoue  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
5782cd038dSYoshinobu Inoue  * SUCH DAMAGE.
5882cd038dSYoshinobu Inoue  *
5982cd038dSYoshinobu Inoue  *	@(#)raw_ip.c	8.2 (Berkeley) 1/4/94
6082cd038dSYoshinobu Inoue  */
6182cd038dSYoshinobu Inoue 
62b48287a3SDavid E. O'Brien #include <sys/cdefs.h>
63b48287a3SDavid E. O'Brien __FBSDID("$FreeBSD$");
64b48287a3SDavid E. O'Brien 
656a800098SYoshinobu Inoue #include "opt_ipsec.h"
6633841545SHajimu UMEMOTO #include "opt_inet6.h"
676a800098SYoshinobu Inoue 
6882cd038dSYoshinobu Inoue #include <sys/param.h>
6982cd038dSYoshinobu Inoue #include <sys/errno.h>
70413628a7SBjoern A. Zeeb #include <sys/jail.h>
71a786f679SAndrey V. Elsukov #include <sys/kernel.h>
72960ed29cSSeigo Tanimura #include <sys/lock.h>
73960ed29cSSeigo Tanimura #include <sys/malloc.h>
74960ed29cSSeigo Tanimura #include <sys/mbuf.h>
75c2259ba4SRobert Watson #include <sys/priv.h>
76960ed29cSSeigo Tanimura #include <sys/proc.h>
77960ed29cSSeigo Tanimura #include <sys/protosw.h>
78960ed29cSSeigo Tanimura #include <sys/signalvar.h>
79960ed29cSSeigo Tanimura #include <sys/socket.h>
80960ed29cSSeigo Tanimura #include <sys/socketvar.h>
81960ed29cSSeigo Tanimura #include <sys/sx.h>
82a1f7e5f8SHajimu UMEMOTO #include <sys/syslog.h>
8382cd038dSYoshinobu Inoue 
8482cd038dSYoshinobu Inoue #include <net/if.h>
85*76039bc8SGleb Smirnoff #include <net/if_var.h>
8682cd038dSYoshinobu Inoue #include <net/if_types.h>
87960ed29cSSeigo Tanimura #include <net/route.h>
884b79449eSBjoern A. Zeeb #include <net/vnet.h>
8982cd038dSYoshinobu Inoue 
9082cd038dSYoshinobu Inoue #include <netinet/in.h>
9182cd038dSYoshinobu Inoue #include <netinet/in_var.h>
9282cd038dSYoshinobu Inoue #include <netinet/in_systm.h>
9382cd038dSYoshinobu Inoue #include <netinet/in_pcb.h>
944b79449eSBjoern A. Zeeb 
954b79449eSBjoern A. Zeeb #include <netinet/icmp6.h>
96960ed29cSSeigo Tanimura #include <netinet/ip6.h>
971db8d1f8SAna Kukec #include <netinet/ip_var.h>
98686cdd19SJun-ichiro itojun Hagino #include <netinet6/ip6protosw.h>
99960ed29cSSeigo Tanimura #include <netinet6/ip6_mroute.h>
100960ed29cSSeigo Tanimura #include <netinet6/in6_pcb.h>
101960ed29cSSeigo Tanimura #include <netinet6/ip6_var.h>
102960ed29cSSeigo Tanimura #include <netinet6/nd6.h>
103960ed29cSSeigo Tanimura #include <netinet6/raw_ip6.h>
104686cdd19SJun-ichiro itojun Hagino #include <netinet6/scope6_var.h>
1051db8d1f8SAna Kukec #include <netinet6/send.h>
10682cd038dSYoshinobu Inoue 
107b2630c29SGeorge V. Neville-Neil #ifdef IPSEC
108b9234fafSSam Leffler #include <netipsec/ipsec.h>
109b9234fafSSam Leffler #include <netipsec/ipsec6.h>
110b2630c29SGeorge V. Neville-Neil #endif /* IPSEC */
111b9234fafSSam Leffler 
11282cd038dSYoshinobu Inoue #include <machine/stdarg.h>
11382cd038dSYoshinobu Inoue 
11482cd038dSYoshinobu Inoue #define	satosin6(sa)	((struct sockaddr_in6 *)(sa))
11582cd038dSYoshinobu Inoue #define	ifatoia6(ifa)	((struct in6_ifaddr *)(ifa))
11682cd038dSYoshinobu Inoue 
11782cd038dSYoshinobu Inoue /*
11882cd038dSYoshinobu Inoue  * Raw interface to IP6 protocol.
11982cd038dSYoshinobu Inoue  */
12082cd038dSYoshinobu Inoue 
121eddfbb76SRobert Watson VNET_DECLARE(struct inpcbhead, ripcb);
122eddfbb76SRobert Watson VNET_DECLARE(struct inpcbinfo, ripcbinfo);
1231e77c105SRobert Watson #define	V_ripcb				VNET(ripcb)
1241e77c105SRobert Watson #define	V_ripcbinfo			VNET(ripcbinfo)
125eddfbb76SRobert Watson 
12697021c24SMarko Zec extern u_long	rip_sendspace;
12797021c24SMarko Zec extern u_long	rip_recvspace;
12897021c24SMarko Zec 
129a786f679SAndrey V. Elsukov VNET_PCPUSTAT_DEFINE(struct rip6stat, rip6stat);
130a786f679SAndrey V. Elsukov VNET_PCPUSTAT_SYSINIT(rip6stat);
131a786f679SAndrey V. Elsukov 
132a786f679SAndrey V. Elsukov #ifdef VIMAGE
133a786f679SAndrey V. Elsukov VNET_PCPUSTAT_SYSUNINIT(rip6stat);
134a786f679SAndrey V. Elsukov #endif /* VIMAGE */
13582cea7e6SBjoern A. Zeeb 
13682cd038dSYoshinobu Inoue /*
13733cde130SBruce M Simpson  * Hooks for multicast routing. They all default to NULL, so leave them not
13833cde130SBruce M Simpson  * initialized and rely on BSS being set to 0.
1396be2e366SBruce M Simpson  */
14033cde130SBruce M Simpson 
14133cde130SBruce M Simpson /*
14233cde130SBruce M Simpson  * The socket used to communicate with the multicast routing daemon.
14333cde130SBruce M Simpson  */
144eddfbb76SRobert Watson VNET_DEFINE(struct socket *, ip6_mrouter);
14533cde130SBruce M Simpson 
14633cde130SBruce M Simpson /*
14733cde130SBruce M Simpson  * The various mrouter functions.
14833cde130SBruce M Simpson  */
1496be2e366SBruce M Simpson int (*ip6_mrouter_set)(struct socket *, struct sockopt *);
1506be2e366SBruce M Simpson int (*ip6_mrouter_get)(struct socket *, struct sockopt *);
1516be2e366SBruce M Simpson int (*ip6_mrouter_done)(void);
1526be2e366SBruce M Simpson int (*ip6_mforward)(struct ip6_hdr *, struct ifnet *, struct mbuf *);
153e40bae9aSRoman Divacky int (*mrt6_ioctl)(u_long, caddr_t);
1546be2e366SBruce M Simpson 
1556be2e366SBruce M Simpson /*
1560ae76120SRobert Watson  * Setup generic address and protocol structures for raw_input routine, then
1570ae76120SRobert Watson  * pass them along with mbuf chain.
15882cd038dSYoshinobu Inoue  */
15982cd038dSYoshinobu Inoue int
1601272577eSXin LI rip6_input(struct mbuf **mp, int *offp, int proto)
16182cd038dSYoshinobu Inoue {
16233cde130SBruce M Simpson 	struct ifnet *ifp;
16382cd038dSYoshinobu Inoue 	struct mbuf *m = *mp;
16482cd038dSYoshinobu Inoue 	register struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
16582cd038dSYoshinobu Inoue 	register struct inpcb *in6p;
16682cd038dSYoshinobu Inoue 	struct inpcb *last = 0;
16733841545SHajimu UMEMOTO 	struct mbuf *opts = NULL;
168af12e09eSHajimu UMEMOTO 	struct sockaddr_in6 fromsa;
16982cd038dSYoshinobu Inoue 
170f1d7ebfeSAndrey V. Elsukov 	RIP6STAT_INC(rip6s_ipackets);
17133841545SHajimu UMEMOTO 
1729494d596SBrooks Davis 	if (faithprefix_p != NULL && (*faithprefix_p)(&ip6->ip6_dst)) {
1730ae76120SRobert Watson 		/* XXX Send icmp6 host/port unreach? */
17482cd038dSYoshinobu Inoue 		m_freem(m);
1750ae76120SRobert Watson 		return (IPPROTO_DONE);
17682cd038dSYoshinobu Inoue 	}
17733841545SHajimu UMEMOTO 
178af12e09eSHajimu UMEMOTO 	init_sin6(&fromsa, m); /* general init */
17982cd038dSYoshinobu Inoue 
18033cde130SBruce M Simpson 	ifp = m->m_pkthdr.rcvif;
18133cde130SBruce M Simpson 
182603724d3SBjoern A. Zeeb 	INP_INFO_RLOCK(&V_ripcbinfo);
183603724d3SBjoern A. Zeeb 	LIST_FOREACH(in6p, &V_ripcb, inp_list) {
184413628a7SBjoern A. Zeeb 		/* XXX inp locking */
185fc384fa5SBjoern A. Zeeb 		if ((in6p->inp_vflag & INP_IPV6) == 0)
18682cd038dSYoshinobu Inoue 			continue;
187fc384fa5SBjoern A. Zeeb 		if (in6p->inp_ip_p &&
188fc384fa5SBjoern A. Zeeb 		    in6p->inp_ip_p != proto)
189b11e21aeSAlexander Motin 			continue;
19082cd038dSYoshinobu Inoue 		if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_laddr) &&
19182cd038dSYoshinobu Inoue 		    !IN6_ARE_ADDR_EQUAL(&in6p->in6p_laddr, &ip6->ip6_dst))
192b11e21aeSAlexander Motin 			continue;
19382cd038dSYoshinobu Inoue 		if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr) &&
19482cd038dSYoshinobu Inoue 		    !IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr, &ip6->ip6_src))
195b11e21aeSAlexander Motin 			continue;
196de0bd6f7SBjoern A. Zeeb 		if (jailed_without_vnet(in6p->inp_cred)) {
19733cde130SBruce M Simpson 			/*
19833cde130SBruce M Simpson 			 * Allow raw socket in jail to receive multicast;
19933cde130SBruce M Simpson 			 * assume process had PRIV_NETINET_RAW at attach,
20033cde130SBruce M Simpson 			 * and fall through into normal filter path if so.
20133cde130SBruce M Simpson 			 */
20233cde130SBruce M Simpson 			if (!IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) &&
20333cde130SBruce M Simpson 			    prison_check_ip6(in6p->inp_cred,
20433cde130SBruce M Simpson 			    &ip6->ip6_dst) != 0)
205413628a7SBjoern A. Zeeb 				continue;
20633cde130SBruce M Simpson 		}
207b7c896c9SAndrey V. Elsukov 		INP_RLOCK(in6p);
20833841545SHajimu UMEMOTO 		if (in6p->in6p_cksum != -1) {
209f1d7ebfeSAndrey V. Elsukov 			RIP6STAT_INC(rip6s_isum);
2104350fcabSSUZUKI Shinsuke 			if (in6_cksum(m, proto, *offp,
21182cd038dSYoshinobu Inoue 			    m->m_pkthdr.len - *offp)) {
2126c5bbf5cSAlexander Motin 				INP_RUNLOCK(in6p);
213f1d7ebfeSAndrey V. Elsukov 				RIP6STAT_INC(rip6s_badsum);
214b11e21aeSAlexander Motin 				continue;
21582cd038dSYoshinobu Inoue 			}
21633841545SHajimu UMEMOTO 		}
21733cde130SBruce M Simpson 		/*
21833cde130SBruce M Simpson 		 * If this raw socket has multicast state, and we
21933cde130SBruce M Simpson 		 * have received a multicast, check if this socket
22033cde130SBruce M Simpson 		 * should receive it, as multicast filtering is now
22133cde130SBruce M Simpson 		 * the responsibility of the transport layer.
22233cde130SBruce M Simpson 		 */
22333cde130SBruce M Simpson 		if (in6p->in6p_moptions &&
22433cde130SBruce M Simpson 		    IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst)) {
2257ab5a5cdSBruce M Simpson 			/*
2267ab5a5cdSBruce M Simpson 			 * If the incoming datagram is for MLD, allow it
2277ab5a5cdSBruce M Simpson 			 * through unconditionally to the raw socket.
2287ab5a5cdSBruce M Simpson 			 *
2297ab5a5cdSBruce M Simpson 			 * Use the M_RTALERT_MLD flag to check for MLD
2307ab5a5cdSBruce M Simpson 			 * traffic without having to inspect the mbuf chain
2317ab5a5cdSBruce M Simpson 			 * more deeply, as all MLDv1/v2 host messages MUST
2327ab5a5cdSBruce M Simpson 			 * contain the Router Alert option.
2337ab5a5cdSBruce M Simpson 			 *
2347ab5a5cdSBruce M Simpson 			 * In the case of MLDv1, we may not have explicitly
2357ab5a5cdSBruce M Simpson 			 * joined the group, and may have set IFF_ALLMULTI
2367ab5a5cdSBruce M Simpson 			 * on the interface. im6o_mc_filter() may discard
2377ab5a5cdSBruce M Simpson 			 * control traffic we actually need to see.
2387ab5a5cdSBruce M Simpson 			 *
2397ab5a5cdSBruce M Simpson 			 * Userland multicast routing daemons should continue
2407ab5a5cdSBruce M Simpson 			 * filter the control traffic appropriately.
2417ab5a5cdSBruce M Simpson 			 */
24233cde130SBruce M Simpson 			int blocked;
24333cde130SBruce M Simpson 
2447ab5a5cdSBruce M Simpson 			blocked = MCAST_PASS;
2457ab5a5cdSBruce M Simpson 			if ((m->m_flags & M_RTALERT_MLD) == 0) {
2467ab5a5cdSBruce M Simpson 				struct sockaddr_in6 mcaddr;
2477ab5a5cdSBruce M Simpson 
24833cde130SBruce M Simpson 				bzero(&mcaddr, sizeof(struct sockaddr_in6));
24933cde130SBruce M Simpson 				mcaddr.sin6_len = sizeof(struct sockaddr_in6);
25033cde130SBruce M Simpson 				mcaddr.sin6_family = AF_INET6;
25133cde130SBruce M Simpson 				mcaddr.sin6_addr = ip6->ip6_dst;
25233cde130SBruce M Simpson 
2537ab5a5cdSBruce M Simpson 				blocked = im6o_mc_filter(in6p->in6p_moptions,
2547ab5a5cdSBruce M Simpson 				    ifp,
25533cde130SBruce M Simpson 				    (struct sockaddr *)&mcaddr,
25633cde130SBruce M Simpson 				    (struct sockaddr *)&fromsa);
2577ab5a5cdSBruce M Simpson 			}
25833cde130SBruce M Simpson 			if (blocked != MCAST_PASS) {
25933cde130SBruce M Simpson 				IP6STAT_INC(ip6s_notmember);
2608c09aa57SBjoern A. Zeeb 				INP_RUNLOCK(in6p);
26133cde130SBruce M Simpson 				continue;
26233cde130SBruce M Simpson 			}
26333cde130SBruce M Simpson 		}
264aba53ef0SKip Macy 		if (last != NULL) {
26582cd038dSYoshinobu Inoue 			struct mbuf *n = m_copy(m, 0, (int)M_COPYALL);
26633841545SHajimu UMEMOTO 
267b2630c29SGeorge V. Neville-Neil #ifdef IPSEC
268da0f4099SHajimu UMEMOTO 			/*
269da0f4099SHajimu UMEMOTO 			 * Check AH/ESP integrity.
270da0f4099SHajimu UMEMOTO 			 */
271da0f4099SHajimu UMEMOTO 			if (n && ipsec6_in_reject(n, last)) {
272da0f4099SHajimu UMEMOTO 				m_freem(n);
2736794f460SAndrey V. Elsukov 				IPSEC6STAT_INC(ips_in_polvio);
2740ae76120SRobert Watson 				/* Do not inject data into pcb. */
275b9234fafSSam Leffler 			} else
276b2630c29SGeorge V. Neville-Neil #endif /* IPSEC */
27782cd038dSYoshinobu Inoue 			if (n) {
27897590249SBjoern A. Zeeb 				if (last->inp_flags & INP_CONTROLOPTS ||
279fc384fa5SBjoern A. Zeeb 				    last->inp_socket->so_options & SO_TIMESTAMP)
28011de19f4SHajimu UMEMOTO 					ip6_savecontrol(last, n, &opts);
28182cd038dSYoshinobu Inoue 				/* strip intermediate headers */
28282cd038dSYoshinobu Inoue 				m_adj(n, *offp);
283fc384fa5SBjoern A. Zeeb 				if (sbappendaddr(&last->inp_socket->so_rcv,
284af12e09eSHajimu UMEMOTO 						(struct sockaddr *)&fromsa,
28582cd038dSYoshinobu Inoue 						 n, opts) == 0) {
28682cd038dSYoshinobu Inoue 					m_freem(n);
28782cd038dSYoshinobu Inoue 					if (opts)
28882cd038dSYoshinobu Inoue 						m_freem(opts);
289f1d7ebfeSAndrey V. Elsukov 					RIP6STAT_INC(rip6s_fullsock);
2904cc20ab1SSeigo Tanimura 				} else
291fc384fa5SBjoern A. Zeeb 					sorwakeup(last->inp_socket);
29282cd038dSYoshinobu Inoue 				opts = NULL;
29382cd038dSYoshinobu Inoue 			}
2949ad11dd8SRobert Watson 			INP_RUNLOCK(last);
29582cd038dSYoshinobu Inoue 		}
29682cd038dSYoshinobu Inoue 		last = in6p;
29782cd038dSYoshinobu Inoue 	}
298603724d3SBjoern A. Zeeb 	INP_INFO_RUNLOCK(&V_ripcbinfo);
299b2630c29SGeorge V. Neville-Neil #ifdef IPSEC
300da0f4099SHajimu UMEMOTO 	/*
301da0f4099SHajimu UMEMOTO 	 * Check AH/ESP integrity.
302da0f4099SHajimu UMEMOTO 	 */
30375bab8b8SKip Macy 	if ((last != NULL) && ipsec6_in_reject(m, last)) {
304da0f4099SHajimu UMEMOTO 		m_freem(m);
3056794f460SAndrey V. Elsukov 		IPSEC6STAT_INC(ips_in_polvio);
3069cb8d207SAndrey V. Elsukov 		IP6STAT_DEC(ip6s_delivered);
3070ae76120SRobert Watson 		/* Do not inject data into pcb. */
3089ad11dd8SRobert Watson 		INP_RUNLOCK(last);
309b9234fafSSam Leffler 	} else
310b2630c29SGeorge V. Neville-Neil #endif /* IPSEC */
311aba53ef0SKip Macy 	if (last != NULL) {
31297590249SBjoern A. Zeeb 		if (last->inp_flags & INP_CONTROLOPTS ||
313fc384fa5SBjoern A. Zeeb 		    last->inp_socket->so_options & SO_TIMESTAMP)
31411de19f4SHajimu UMEMOTO 			ip6_savecontrol(last, m, &opts);
3150ae76120SRobert Watson 		/* Strip intermediate headers. */
31682cd038dSYoshinobu Inoue 		m_adj(m, *offp);
317fc384fa5SBjoern A. Zeeb 		if (sbappendaddr(&last->inp_socket->so_rcv,
318af12e09eSHajimu UMEMOTO 		    (struct sockaddr *)&fromsa, m, opts) == 0) {
31982cd038dSYoshinobu Inoue 			m_freem(m);
32082cd038dSYoshinobu Inoue 			if (opts)
32182cd038dSYoshinobu Inoue 				m_freem(opts);
322f1d7ebfeSAndrey V. Elsukov 			RIP6STAT_INC(rip6s_fullsock);
3234cc20ab1SSeigo Tanimura 		} else
324fc384fa5SBjoern A. Zeeb 			sorwakeup(last->inp_socket);
3259ad11dd8SRobert Watson 		INP_RUNLOCK(last);
32682cd038dSYoshinobu Inoue 	} else {
327f1d7ebfeSAndrey V. Elsukov 		RIP6STAT_INC(rip6s_nosock);
32833841545SHajimu UMEMOTO 		if (m->m_flags & M_MCAST)
329f1d7ebfeSAndrey V. Elsukov 			RIP6STAT_INC(rip6s_nosockmcast);
33082cd038dSYoshinobu Inoue 		if (proto == IPPROTO_NONE)
33182cd038dSYoshinobu Inoue 			m_freem(m);
33282cd038dSYoshinobu Inoue 		else {
33382cd038dSYoshinobu Inoue 			char *prvnxtp = ip6_get_prevhdr(m, *offp); /* XXX */
33482cd038dSYoshinobu Inoue 			icmp6_error(m, ICMP6_PARAM_PROB,
33582cd038dSYoshinobu Inoue 			    ICMP6_PARAMPROB_NEXTHEADER,
33682cd038dSYoshinobu Inoue 			    prvnxtp - mtod(m, char *));
33782cd038dSYoshinobu Inoue 		}
3389cb8d207SAndrey V. Elsukov 		IP6STAT_DEC(ip6s_delivered);
33982cd038dSYoshinobu Inoue 	}
3400ae76120SRobert Watson 	return (IPPROTO_DONE);
34182cd038dSYoshinobu Inoue }
34282cd038dSYoshinobu Inoue 
343686cdd19SJun-ichiro itojun Hagino void
3441272577eSXin LI rip6_ctlinput(int cmd, struct sockaddr *sa, void *d)
345686cdd19SJun-ichiro itojun Hagino {
346686cdd19SJun-ichiro itojun Hagino 	struct ip6_hdr *ip6;
347686cdd19SJun-ichiro itojun Hagino 	struct mbuf *m;
348686cdd19SJun-ichiro itojun Hagino 	int off = 0;
34933841545SHajimu UMEMOTO 	struct ip6ctlparam *ip6cp = NULL;
35033841545SHajimu UMEMOTO 	const struct sockaddr_in6 *sa6_src = NULL;
351efddf5c6SHajimu UMEMOTO 	void *cmdarg;
3529233d8f3SDavid E. O'Brien 	struct inpcb *(*notify)(struct inpcb *, int) = in6_rtchange;
353686cdd19SJun-ichiro itojun Hagino 
354686cdd19SJun-ichiro itojun Hagino 	if (sa->sa_family != AF_INET6 ||
355686cdd19SJun-ichiro itojun Hagino 	    sa->sa_len != sizeof(struct sockaddr_in6))
356686cdd19SJun-ichiro itojun Hagino 		return;
357686cdd19SJun-ichiro itojun Hagino 
358686cdd19SJun-ichiro itojun Hagino 	if ((unsigned)cmd >= PRC_NCMDS)
359686cdd19SJun-ichiro itojun Hagino 		return;
360686cdd19SJun-ichiro itojun Hagino 	if (PRC_IS_REDIRECT(cmd))
361686cdd19SJun-ichiro itojun Hagino 		notify = in6_rtchange, d = NULL;
362686cdd19SJun-ichiro itojun Hagino 	else if (cmd == PRC_HOSTDEAD)
363686cdd19SJun-ichiro itojun Hagino 		d = NULL;
364686cdd19SJun-ichiro itojun Hagino 	else if (inet6ctlerrmap[cmd] == 0)
365686cdd19SJun-ichiro itojun Hagino 		return;
366686cdd19SJun-ichiro itojun Hagino 
3670ae76120SRobert Watson 	/*
3680ae76120SRobert Watson 	 * If the parameter is from icmp6, decode it.
3690ae76120SRobert Watson 	 */
370686cdd19SJun-ichiro itojun Hagino 	if (d != NULL) {
37133841545SHajimu UMEMOTO 		ip6cp = (struct ip6ctlparam *)d;
372686cdd19SJun-ichiro itojun Hagino 		m = ip6cp->ip6c_m;
373686cdd19SJun-ichiro itojun Hagino 		ip6 = ip6cp->ip6c_ip6;
374686cdd19SJun-ichiro itojun Hagino 		off = ip6cp->ip6c_off;
375efddf5c6SHajimu UMEMOTO 		cmdarg = ip6cp->ip6c_cmdarg;
37633841545SHajimu UMEMOTO 		sa6_src = ip6cp->ip6c_src;
377686cdd19SJun-ichiro itojun Hagino 	} else {
378686cdd19SJun-ichiro itojun Hagino 		m = NULL;
379686cdd19SJun-ichiro itojun Hagino 		ip6 = NULL;
380efddf5c6SHajimu UMEMOTO 		cmdarg = NULL;
38133841545SHajimu UMEMOTO 		sa6_src = &sa6_any;
382686cdd19SJun-ichiro itojun Hagino 	}
383686cdd19SJun-ichiro itojun Hagino 
384603724d3SBjoern A. Zeeb 	(void) in6_pcbnotify(&V_ripcbinfo, sa, 0,
3850ae76120SRobert Watson 	    (const struct sockaddr *)sa6_src, 0, cmd, cmdarg, notify);
386686cdd19SJun-ichiro itojun Hagino }
387686cdd19SJun-ichiro itojun Hagino 
38882cd038dSYoshinobu Inoue /*
3890ae76120SRobert Watson  * Generate IPv6 header and pass packet to ip6_output.  Tack on options user
3900ae76120SRobert Watson  * may have setup with control call.
39182cd038dSYoshinobu Inoue  */
39282cd038dSYoshinobu Inoue int
39382cd038dSYoshinobu Inoue #if __STDC__
39482cd038dSYoshinobu Inoue rip6_output(struct mbuf *m, ...)
39582cd038dSYoshinobu Inoue #else
39682cd038dSYoshinobu Inoue rip6_output(m, va_alist)
39782cd038dSYoshinobu Inoue 	struct mbuf *m;
39882cd038dSYoshinobu Inoue 	va_dcl
39982cd038dSYoshinobu Inoue #endif
40082cd038dSYoshinobu Inoue {
40107eb2995SHajimu UMEMOTO 	struct mbuf *control;
4021db8d1f8SAna Kukec 	struct m_tag *mtag;
40382cd038dSYoshinobu Inoue 	struct socket *so;
40482cd038dSYoshinobu Inoue 	struct sockaddr_in6 *dstsock;
40582cd038dSYoshinobu Inoue 	struct in6_addr *dst;
40682cd038dSYoshinobu Inoue 	struct ip6_hdr *ip6;
40782cd038dSYoshinobu Inoue 	struct inpcb *in6p;
40882cd038dSYoshinobu Inoue 	u_int	plen = m->m_pkthdr.len;
40982cd038dSYoshinobu Inoue 	int error = 0;
410e07db7aaSHajimu UMEMOTO 	struct ip6_pktopts opt, *optp;
41182cd038dSYoshinobu Inoue 	struct ifnet *oifp = NULL;
41282cd038dSYoshinobu Inoue 	int type = 0, code = 0;		/* for ICMPv6 output statistics only */
413a1f7e5f8SHajimu UMEMOTO 	int scope_ambiguous = 0;
414388288b2SHajimu UMEMOTO 	int use_defzone = 0;
41588d166bfSBjoern A. Zeeb 	struct in6_addr in6a;
41682cd038dSYoshinobu Inoue 	va_list ap;
41782cd038dSYoshinobu Inoue 
41882cd038dSYoshinobu Inoue 	va_start(ap, m);
41982cd038dSYoshinobu Inoue 	so = va_arg(ap, struct socket *);
42082cd038dSYoshinobu Inoue 	dstsock = va_arg(ap, struct sockaddr_in6 *);
42182cd038dSYoshinobu Inoue 	control = va_arg(ap, struct mbuf *);
42282cd038dSYoshinobu Inoue 	va_end(ap);
42382cd038dSYoshinobu Inoue 
424fc384fa5SBjoern A. Zeeb 	in6p = sotoinpcb(so);
4258501a69cSRobert Watson 	INP_WLOCK(in6p);
42682cd038dSYoshinobu Inoue 
42782cd038dSYoshinobu Inoue 	dst = &dstsock->sin6_addr;
42875bab8b8SKip Macy 	if (control != NULL) {
429d5e3406dSHajimu UMEMOTO 		if ((error = ip6_setpktopts(control, &opt,
43079ba3952SBjoern A. Zeeb 		    in6p->in6p_outputopts, so->so_cred,
43179ba3952SBjoern A. Zeeb 		    so->so_proto->pr_protocol)) != 0) {
43282cd038dSYoshinobu Inoue 			goto bad;
433f95d4633SHajimu UMEMOTO 		}
434e07db7aaSHajimu UMEMOTO 		optp = &opt;
435e07db7aaSHajimu UMEMOTO 	} else
436e07db7aaSHajimu UMEMOTO 		optp = in6p->in6p_outputopts;
43782cd038dSYoshinobu Inoue 
43882cd038dSYoshinobu Inoue 	/*
439a1f7e5f8SHajimu UMEMOTO 	 * Check and convert scope zone ID into internal form.
4400ae76120SRobert Watson 	 *
441a1f7e5f8SHajimu UMEMOTO 	 * XXX: we may still need to determine the zone later.
442a1f7e5f8SHajimu UMEMOTO 	 */
443a1f7e5f8SHajimu UMEMOTO 	if (!(so->so_state & SS_ISCONNECTED)) {
444365ccde0SHajimu UMEMOTO 		if (!optp || !optp->ip6po_pktinfo ||
445365ccde0SHajimu UMEMOTO 		    !optp->ip6po_pktinfo->ipi6_ifindex)
446388288b2SHajimu UMEMOTO 			use_defzone = V_ip6_use_defzone;
447388288b2SHajimu UMEMOTO 		if (dstsock->sin6_scope_id == 0 && !use_defzone)
448a1f7e5f8SHajimu UMEMOTO 			scope_ambiguous = 1;
449388288b2SHajimu UMEMOTO 		if ((error = sa6_embedscope(dstsock, use_defzone)) != 0)
450a1f7e5f8SHajimu UMEMOTO 			goto bad;
451a1f7e5f8SHajimu UMEMOTO 	}
452a1f7e5f8SHajimu UMEMOTO 
453a1f7e5f8SHajimu UMEMOTO 	/*
4540ae76120SRobert Watson 	 * For an ICMPv6 packet, we should know its type and code to update
4550ae76120SRobert Watson 	 * statistics.
45682cd038dSYoshinobu Inoue 	 */
45782cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
45882cd038dSYoshinobu Inoue 		struct icmp6_hdr *icmp6;
45982cd038dSYoshinobu Inoue 		if (m->m_len < sizeof(struct icmp6_hdr) &&
46082cd038dSYoshinobu Inoue 		    (m = m_pullup(m, sizeof(struct icmp6_hdr))) == NULL) {
46182cd038dSYoshinobu Inoue 			error = ENOBUFS;
46282cd038dSYoshinobu Inoue 			goto bad;
46382cd038dSYoshinobu Inoue 		}
46482cd038dSYoshinobu Inoue 		icmp6 = mtod(m, struct icmp6_hdr *);
46582cd038dSYoshinobu Inoue 		type = icmp6->icmp6_type;
46682cd038dSYoshinobu Inoue 		code = icmp6->icmp6_code;
46782cd038dSYoshinobu Inoue 	}
46882cd038dSYoshinobu Inoue 
469eb1b1807SGleb Smirnoff 	M_PREPEND(m, sizeof(*ip6), M_NOWAIT);
4708a0c4da8SRobert Watson 	if (m == NULL) {
4718a0c4da8SRobert Watson 		error = ENOBUFS;
4728a0c4da8SRobert Watson 		goto bad;
4738a0c4da8SRobert Watson 	}
47482cd038dSYoshinobu Inoue 	ip6 = mtod(m, struct ip6_hdr *);
47582cd038dSYoshinobu Inoue 
47682cd038dSYoshinobu Inoue 	/*
47782cd038dSYoshinobu Inoue 	 * Source address selection.
47882cd038dSYoshinobu Inoue 	 */
47988d166bfSBjoern A. Zeeb 	error = in6_selectsrc(dstsock, optp, in6p, NULL, so->so_cred,
48088d166bfSBjoern A. Zeeb 	    &oifp, &in6a);
48188d166bfSBjoern A. Zeeb 	if (error)
48282cd038dSYoshinobu Inoue 		goto bad;
4837a657e63SBjoern A. Zeeb 	error = prison_check_ip6(in6p->inp_cred, &in6a);
484b89e82ddSJamie Gritton 	if (error != 0)
485413628a7SBjoern A. Zeeb 		goto bad;
48688d166bfSBjoern A. Zeeb 	ip6->ip6_src = in6a;
487a1f7e5f8SHajimu UMEMOTO 
488a1f7e5f8SHajimu UMEMOTO 	if (oifp && scope_ambiguous) {
489a1f7e5f8SHajimu UMEMOTO 		/*
490a1f7e5f8SHajimu UMEMOTO 		 * Application should provide a proper zone ID or the use of
491a1f7e5f8SHajimu UMEMOTO 		 * default zone IDs should be enabled.  Unfortunately, some
492a1f7e5f8SHajimu UMEMOTO 		 * applications do not behave as it should, so we need a
493a1f7e5f8SHajimu UMEMOTO 		 * workaround.  Even if an appropriate ID is not determined
494a1f7e5f8SHajimu UMEMOTO 		 * (when it's required), if we can determine the outgoing
495a1f7e5f8SHajimu UMEMOTO 		 * interface. determine the zone ID based on the interface.
496a1f7e5f8SHajimu UMEMOTO 		 */
497a1f7e5f8SHajimu UMEMOTO 		error = in6_setscope(&dstsock->sin6_addr, oifp, NULL);
498a1f7e5f8SHajimu UMEMOTO 		if (error != 0)
499a1f7e5f8SHajimu UMEMOTO 			goto bad;
500a1f7e5f8SHajimu UMEMOTO 	}
501a1f7e5f8SHajimu UMEMOTO 	ip6->ip6_dst = dstsock->sin6_addr;
502a1f7e5f8SHajimu UMEMOTO 
5030ae76120SRobert Watson 	/*
5040ae76120SRobert Watson 	 * Fill in the rest of the IPv6 header fields.
5050ae76120SRobert Watson 	 */
5066a800098SYoshinobu Inoue 	ip6->ip6_flow = (ip6->ip6_flow & ~IPV6_FLOWINFO_MASK) |
507fc384fa5SBjoern A. Zeeb 	    (in6p->inp_flow & IPV6_FLOWINFO_MASK);
5086a800098SYoshinobu Inoue 	ip6->ip6_vfc = (ip6->ip6_vfc & ~IPV6_VERSION_MASK) |
5096a800098SYoshinobu Inoue 	    (IPV6_VERSION & IPV6_VERSION_MASK);
5100ae76120SRobert Watson 
5110ae76120SRobert Watson 	/*
5120ae76120SRobert Watson 	 * ip6_plen will be filled in ip6_output, so not fill it here.
5130ae76120SRobert Watson 	 */
514fc384fa5SBjoern A. Zeeb 	ip6->ip6_nxt = in6p->inp_ip_p;
51582cd038dSYoshinobu Inoue 	ip6->ip6_hlim = in6_selecthlim(in6p, oifp);
51682cd038dSYoshinobu Inoue 
51782cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6 ||
51882cd038dSYoshinobu Inoue 	    in6p->in6p_cksum != -1) {
51982cd038dSYoshinobu Inoue 		struct mbuf *n;
52082cd038dSYoshinobu Inoue 		int off;
52182cd038dSYoshinobu Inoue 		u_int16_t *p;
52282cd038dSYoshinobu Inoue 
5230ae76120SRobert Watson 		/* Compute checksum. */
52482cd038dSYoshinobu Inoue 		if (so->so_proto->pr_protocol == IPPROTO_ICMPV6)
52582cd038dSYoshinobu Inoue 			off = offsetof(struct icmp6_hdr, icmp6_cksum);
52682cd038dSYoshinobu Inoue 		else
52782cd038dSYoshinobu Inoue 			off = in6p->in6p_cksum;
52882cd038dSYoshinobu Inoue 		if (plen < off + 1) {
52982cd038dSYoshinobu Inoue 			error = EINVAL;
53082cd038dSYoshinobu Inoue 			goto bad;
53182cd038dSYoshinobu Inoue 		}
53282cd038dSYoshinobu Inoue 		off += sizeof(struct ip6_hdr);
53382cd038dSYoshinobu Inoue 
53482cd038dSYoshinobu Inoue 		n = m;
53582cd038dSYoshinobu Inoue 		while (n && n->m_len <= off) {
53682cd038dSYoshinobu Inoue 			off -= n->m_len;
53782cd038dSYoshinobu Inoue 			n = n->m_next;
53882cd038dSYoshinobu Inoue 		}
53982cd038dSYoshinobu Inoue 		if (!n)
54082cd038dSYoshinobu Inoue 			goto bad;
54182cd038dSYoshinobu Inoue 		p = (u_int16_t *)(mtod(n, caddr_t) + off);
54282cd038dSYoshinobu Inoue 		*p = 0;
54382cd038dSYoshinobu Inoue 		*p = in6_cksum(m, ip6->ip6_nxt, sizeof(*ip6), plen);
54482cd038dSYoshinobu Inoue 	}
54582cd038dSYoshinobu Inoue 
5461db8d1f8SAna Kukec 	/*
5471db8d1f8SAna Kukec 	 * Send RA/RS messages to user land for protection, before sending
5481db8d1f8SAna Kukec 	 * them to rtadvd/rtsol.
5491db8d1f8SAna Kukec 	 */
5501db8d1f8SAna Kukec 	if ((send_sendso_input_hook != NULL) &&
5511db8d1f8SAna Kukec 	    so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
5521db8d1f8SAna Kukec 		switch (type) {
5531db8d1f8SAna Kukec 		case ND_ROUTER_ADVERT:
5541db8d1f8SAna Kukec 		case ND_ROUTER_SOLICIT:
5551db8d1f8SAna Kukec 			mtag = m_tag_get(PACKET_TAG_ND_OUTGOING,
5561db8d1f8SAna Kukec 				sizeof(unsigned short), M_NOWAIT);
5571db8d1f8SAna Kukec 			if (mtag == NULL)
5581db8d1f8SAna Kukec 				goto bad;
5591db8d1f8SAna Kukec 			m_tag_prepend(m, mtag);
5601db8d1f8SAna Kukec 		}
5611db8d1f8SAna Kukec 	}
5621db8d1f8SAna Kukec 
563e07db7aaSHajimu UMEMOTO 	error = ip6_output(m, optp, NULL, 0, in6p->in6p_moptions, &oifp, in6p);
56482cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
56582cd038dSYoshinobu Inoue 		if (oifp)
56682cd038dSYoshinobu Inoue 			icmp6_ifoutstat_inc(oifp, type, code);
567e27b0c87SRobert Watson 		ICMP6STAT_INC(icp6s_outhist[type]);
56833841545SHajimu UMEMOTO 	} else
569f1d7ebfeSAndrey V. Elsukov 		RIP6STAT_INC(rip6s_opackets);
57082cd038dSYoshinobu Inoue 
57182cd038dSYoshinobu Inoue 	goto freectl;
57282cd038dSYoshinobu Inoue 
57382cd038dSYoshinobu Inoue  bad:
57482cd038dSYoshinobu Inoue 	if (m)
57582cd038dSYoshinobu Inoue 		m_freem(m);
57682cd038dSYoshinobu Inoue 
57782cd038dSYoshinobu Inoue  freectl:
57875bab8b8SKip Macy 	if (control != NULL) {
579e07db7aaSHajimu UMEMOTO 		ip6_clearpktopts(&opt, -1);
58082cd038dSYoshinobu Inoue 		m_freem(control);
58133841545SHajimu UMEMOTO 	}
5828501a69cSRobert Watson 	INP_WUNLOCK(in6p);
58382cd038dSYoshinobu Inoue 	return (error);
58482cd038dSYoshinobu Inoue }
58582cd038dSYoshinobu Inoue 
58682cd038dSYoshinobu Inoue /*
58782cd038dSYoshinobu Inoue  * Raw IPv6 socket option processing.
58882cd038dSYoshinobu Inoue  */
58982cd038dSYoshinobu Inoue int
5901272577eSXin LI rip6_ctloutput(struct socket *so, struct sockopt *sopt)
59182cd038dSYoshinobu Inoue {
592ee799639SBjoern A. Zeeb 	struct inpcb *inp;
59382cd038dSYoshinobu Inoue 	int error;
59482cd038dSYoshinobu Inoue 
59582cd038dSYoshinobu Inoue 	if (sopt->sopt_level == IPPROTO_ICMPV6)
59682cd038dSYoshinobu Inoue 		/*
59782cd038dSYoshinobu Inoue 		 * XXX: is it better to call icmp6_ctloutput() directly
59882cd038dSYoshinobu Inoue 		 * from protosw?
59982cd038dSYoshinobu Inoue 		 */
60082cd038dSYoshinobu Inoue 		return (icmp6_ctloutput(so, sopt));
601ee799639SBjoern A. Zeeb 	else if (sopt->sopt_level != IPPROTO_IPV6) {
602ee799639SBjoern A. Zeeb 		if (sopt->sopt_level == SOL_SOCKET &&
603ee799639SBjoern A. Zeeb 		    sopt->sopt_name == SO_SETFIB) {
604ee799639SBjoern A. Zeeb 			inp = sotoinpcb(so);
605ee799639SBjoern A. Zeeb 			INP_WLOCK(inp);
606ee799639SBjoern A. Zeeb 			inp->inp_inc.inc_fibnum = so->so_fibnum;
607ee799639SBjoern A. Zeeb 			INP_WUNLOCK(inp);
608ee799639SBjoern A. Zeeb 			return (0);
609ee799639SBjoern A. Zeeb 		}
61082cd038dSYoshinobu Inoue 		return (EINVAL);
611ee799639SBjoern A. Zeeb 	}
61282cd038dSYoshinobu Inoue 
61382cd038dSYoshinobu Inoue 	error = 0;
61482cd038dSYoshinobu Inoue 
61582cd038dSYoshinobu Inoue 	switch (sopt->sopt_dir) {
61682cd038dSYoshinobu Inoue 	case SOPT_GET:
61782cd038dSYoshinobu Inoue 		switch (sopt->sopt_name) {
61891ec0a1eSYoshinobu Inoue 		case MRT6_INIT:
61991ec0a1eSYoshinobu Inoue 		case MRT6_DONE:
62091ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MIF:
62191ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MIF:
62291ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MFC:
62391ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MFC:
62491ec0a1eSYoshinobu Inoue 		case MRT6_PIM:
6256be2e366SBruce M Simpson 			error = ip6_mrouter_get ?  ip6_mrouter_get(so, sopt) :
6266be2e366SBruce M Simpson 			    EOPNOTSUPP;
62791ec0a1eSYoshinobu Inoue 			break;
62802b9a206SHajimu UMEMOTO 		case IPV6_CHECKSUM:
62902b9a206SHajimu UMEMOTO 			error = ip6_raw_ctloutput(so, sopt);
63002b9a206SHajimu UMEMOTO 			break;
63182cd038dSYoshinobu Inoue 		default:
63282cd038dSYoshinobu Inoue 			error = ip6_ctloutput(so, sopt);
63382cd038dSYoshinobu Inoue 			break;
63482cd038dSYoshinobu Inoue 		}
63582cd038dSYoshinobu Inoue 		break;
63682cd038dSYoshinobu Inoue 
63782cd038dSYoshinobu Inoue 	case SOPT_SET:
63882cd038dSYoshinobu Inoue 		switch (sopt->sopt_name) {
63991ec0a1eSYoshinobu Inoue 		case MRT6_INIT:
64091ec0a1eSYoshinobu Inoue 		case MRT6_DONE:
64191ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MIF:
64291ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MIF:
64391ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MFC:
64491ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MFC:
64591ec0a1eSYoshinobu Inoue 		case MRT6_PIM:
6466be2e366SBruce M Simpson 			error = ip6_mrouter_set ?  ip6_mrouter_set(so, sopt) :
6476be2e366SBruce M Simpson 			    EOPNOTSUPP;
64891ec0a1eSYoshinobu Inoue 			break;
64902b9a206SHajimu UMEMOTO 		case IPV6_CHECKSUM:
65002b9a206SHajimu UMEMOTO 			error = ip6_raw_ctloutput(so, sopt);
65102b9a206SHajimu UMEMOTO 			break;
65282cd038dSYoshinobu Inoue 		default:
65382cd038dSYoshinobu Inoue 			error = ip6_ctloutput(so, sopt);
65482cd038dSYoshinobu Inoue 			break;
65582cd038dSYoshinobu Inoue 		}
65682cd038dSYoshinobu Inoue 		break;
65782cd038dSYoshinobu Inoue 	}
65882cd038dSYoshinobu Inoue 
65982cd038dSYoshinobu Inoue 	return (error);
66082cd038dSYoshinobu Inoue }
66182cd038dSYoshinobu Inoue 
66282cd038dSYoshinobu Inoue static int
663b40ce416SJulian Elischer rip6_attach(struct socket *so, int proto, struct thread *td)
66482cd038dSYoshinobu Inoue {
66582cd038dSYoshinobu Inoue 	struct inpcb *inp;
6668a9d54dfSSam Leffler 	struct icmp6_filter *filter;
667ff7425ceSRobert Watson 	int error;
66882cd038dSYoshinobu Inoue 
66982cd038dSYoshinobu Inoue 	inp = sotoinpcb(so);
67014ba8addSRobert Watson 	KASSERT(inp == NULL, ("rip6_attach: inp != NULL"));
6710ae76120SRobert Watson 
67279ba3952SBjoern A. Zeeb 	error = priv_check(td, PRIV_NETINET_RAW);
67379ba3952SBjoern A. Zeeb 	if (error)
6740ae76120SRobert Watson 		return (error);
67582cd038dSYoshinobu Inoue 	error = soreserve(so, rip_sendspace, rip_recvspace);
67614ba8addSRobert Watson 	if (error)
6770ae76120SRobert Watson 		return (error);
6781ede983cSDag-Erling Smørgrav 	filter = malloc(sizeof(struct icmp6_filter), M_PCB, M_NOWAIT);
67914ba8addSRobert Watson 	if (filter == NULL)
6800ae76120SRobert Watson 		return (ENOMEM);
681603724d3SBjoern A. Zeeb 	INP_INFO_WLOCK(&V_ripcbinfo);
682603724d3SBjoern A. Zeeb 	error = in_pcballoc(so, &V_ripcbinfo);
68307385abdSRobert Watson 	if (error) {
684603724d3SBjoern A. Zeeb 		INP_INFO_WUNLOCK(&V_ripcbinfo);
6851ede983cSDag-Erling Smørgrav 		free(filter, M_PCB);
6860ae76120SRobert Watson 		return (error);
68707385abdSRobert Watson 	}
68882cd038dSYoshinobu Inoue 	inp = (struct inpcb *)so->so_pcb;
689603724d3SBjoern A. Zeeb 	INP_INFO_WUNLOCK(&V_ripcbinfo);
69082cd038dSYoshinobu Inoue 	inp->inp_vflag |= INP_IPV6;
691fc384fa5SBjoern A. Zeeb 	inp->inp_ip_p = (long)proto;
69282cd038dSYoshinobu Inoue 	inp->in6p_hops = -1;	/* use kernel default */
69382cd038dSYoshinobu Inoue 	inp->in6p_cksum = -1;
6948a9d54dfSSam Leffler 	inp->in6p_icmp6filt = filter;
69582cd038dSYoshinobu Inoue 	ICMP6_FILTER_SETPASSALL(inp->in6p_icmp6filt);
6968501a69cSRobert Watson 	INP_WUNLOCK(inp);
6970ae76120SRobert Watson 	return (0);
69882cd038dSYoshinobu Inoue }
69982cd038dSYoshinobu Inoue 
700bc725eafSRobert Watson static void
70182cd038dSYoshinobu Inoue rip6_detach(struct socket *so)
70282cd038dSYoshinobu Inoue {
70382cd038dSYoshinobu Inoue 	struct inpcb *inp;
70482cd038dSYoshinobu Inoue 
70582cd038dSYoshinobu Inoue 	inp = sotoinpcb(so);
70614ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_detach: inp == NULL"));
707a152f8a3SRobert Watson 
70833cde130SBruce M Simpson 	if (so == V_ip6_mrouter && ip6_mrouter_done)
709e7e3ecb6SYoshinobu Inoue 		ip6_mrouter_done();
7106be2e366SBruce M Simpson 	/* xxx: RSVP */
711603724d3SBjoern A. Zeeb 	INP_INFO_WLOCK(&V_ripcbinfo);
7128501a69cSRobert Watson 	INP_WLOCK(inp);
7131ede983cSDag-Erling Smørgrav 	free(inp->in6p_icmp6filt, M_PCB);
7140206cdb8SBjoern A. Zeeb 	in_pcbdetach(inp);
7156aee2fc5SBjoern A. Zeeb 	in_pcbfree(inp);
716603724d3SBjoern A. Zeeb 	INP_INFO_WUNLOCK(&V_ripcbinfo);
71782cd038dSYoshinobu Inoue }
71882cd038dSYoshinobu Inoue 
719a152f8a3SRobert Watson /* XXXRW: This can't ever be called. */
720ac45e92fSRobert Watson static void
72182cd038dSYoshinobu Inoue rip6_abort(struct socket *so)
72282cd038dSYoshinobu Inoue {
723a152f8a3SRobert Watson 	struct inpcb *inp;
724a152f8a3SRobert Watson 
725a152f8a3SRobert Watson 	inp = sotoinpcb(so);
726a152f8a3SRobert Watson 	KASSERT(inp != NULL, ("rip6_abort: inp == NULL"));
727a152f8a3SRobert Watson 
72882cd038dSYoshinobu Inoue 	soisdisconnected(so);
729a152f8a3SRobert Watson }
730a152f8a3SRobert Watson 
731a152f8a3SRobert Watson static void
732a152f8a3SRobert Watson rip6_close(struct socket *so)
733a152f8a3SRobert Watson {
734a152f8a3SRobert Watson 	struct inpcb *inp;
735a152f8a3SRobert Watson 
736a152f8a3SRobert Watson 	inp = sotoinpcb(so);
737a152f8a3SRobert Watson 	KASSERT(inp != NULL, ("rip6_close: inp == NULL"));
738a152f8a3SRobert Watson 
739a152f8a3SRobert Watson 	soisdisconnected(so);
74082cd038dSYoshinobu Inoue }
74182cd038dSYoshinobu Inoue 
74282cd038dSYoshinobu Inoue static int
74382cd038dSYoshinobu Inoue rip6_disconnect(struct socket *so)
74482cd038dSYoshinobu Inoue {
7450ae76120SRobert Watson 	struct inpcb *inp;
7460ae76120SRobert Watson 
7470ae76120SRobert Watson 	inp = sotoinpcb(so);
7480ae76120SRobert Watson 	KASSERT(inp != NULL, ("rip6_disconnect: inp == NULL"));
74982cd038dSYoshinobu Inoue 
7504cc20ab1SSeigo Tanimura 	if ((so->so_state & SS_ISCONNECTED) == 0)
7510ae76120SRobert Watson 		return (ENOTCONN);
75282cd038dSYoshinobu Inoue 	inp->in6p_faddr = in6addr_any;
753ac45e92fSRobert Watson 	rip6_abort(so);
75414ba8addSRobert Watson 	return (0);
75582cd038dSYoshinobu Inoue }
75682cd038dSYoshinobu Inoue 
75782cd038dSYoshinobu Inoue static int
758b40ce416SJulian Elischer rip6_bind(struct socket *so, struct sockaddr *nam, struct thread *td)
75982cd038dSYoshinobu Inoue {
7600ae76120SRobert Watson 	struct inpcb *inp;
76182cd038dSYoshinobu Inoue 	struct sockaddr_in6 *addr = (struct sockaddr_in6 *)nam;
7628c0fec80SRobert Watson 	struct ifaddr *ifa = NULL;
763a1f7e5f8SHajimu UMEMOTO 	int error = 0;
76482cd038dSYoshinobu Inoue 
7650ae76120SRobert Watson 	inp = sotoinpcb(so);
76614ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_bind: inp == NULL"));
7670ae76120SRobert Watson 
76882cd038dSYoshinobu Inoue 	if (nam->sa_len != sizeof(*addr))
7690ae76120SRobert Watson 		return (EINVAL);
770b89e82ddSJamie Gritton 	if ((error = prison_check_ip6(td->td_ucred, &addr->sin6_addr)) != 0)
771b89e82ddSJamie Gritton 		return (error);
772603724d3SBjoern A. Zeeb 	if (TAILQ_EMPTY(&V_ifnet) || addr->sin6_family != AF_INET6)
7730ae76120SRobert Watson 		return (EADDRNOTAVAIL);
774603724d3SBjoern A. Zeeb 	if ((error = sa6_embedscope(addr, V_ip6_use_defzone)) != 0)
775a1f7e5f8SHajimu UMEMOTO 		return (error);
776a1f7e5f8SHajimu UMEMOTO 
77782cd038dSYoshinobu Inoue 	if (!IN6_IS_ADDR_UNSPECIFIED(&addr->sin6_addr) &&
7788c0fec80SRobert Watson 	    (ifa = ifa_ifwithaddr((struct sockaddr *)addr)) == NULL)
7790ae76120SRobert Watson 		return (EADDRNOTAVAIL);
7808c0fec80SRobert Watson 	if (ifa != NULL &&
7818c0fec80SRobert Watson 	    ((struct in6_ifaddr *)ifa)->ia6_flags &
78282cd038dSYoshinobu Inoue 	    (IN6_IFF_ANYCAST|IN6_IFF_NOTREADY|
78382cd038dSYoshinobu Inoue 	     IN6_IFF_DETACHED|IN6_IFF_DEPRECATED)) {
7848c0fec80SRobert Watson 		ifa_free(ifa);
78582cd038dSYoshinobu Inoue 		return (EADDRNOTAVAIL);
78682cd038dSYoshinobu Inoue 	}
7878c0fec80SRobert Watson 	if (ifa != NULL)
7888c0fec80SRobert Watson 		ifa_free(ifa);
789603724d3SBjoern A. Zeeb 	INP_INFO_WLOCK(&V_ripcbinfo);
7908501a69cSRobert Watson 	INP_WLOCK(inp);
79182cd038dSYoshinobu Inoue 	inp->in6p_laddr = addr->sin6_addr;
7928501a69cSRobert Watson 	INP_WUNLOCK(inp);
793603724d3SBjoern A. Zeeb 	INP_INFO_WUNLOCK(&V_ripcbinfo);
7940ae76120SRobert Watson 	return (0);
79582cd038dSYoshinobu Inoue }
79682cd038dSYoshinobu Inoue 
79782cd038dSYoshinobu Inoue static int
798b40ce416SJulian Elischer rip6_connect(struct socket *so, struct sockaddr *nam, struct thread *td)
79982cd038dSYoshinobu Inoue {
8000ae76120SRobert Watson 	struct inpcb *inp;
80182cd038dSYoshinobu Inoue 	struct sockaddr_in6 *addr = (struct sockaddr_in6 *)nam;
80288d166bfSBjoern A. Zeeb 	struct in6_addr in6a;
803a1f7e5f8SHajimu UMEMOTO 	struct ifnet *ifp = NULL;
804a1f7e5f8SHajimu UMEMOTO 	int error = 0, scope_ambiguous = 0;
80582cd038dSYoshinobu Inoue 
8060ae76120SRobert Watson 	inp = sotoinpcb(so);
80714ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_connect: inp == NULL"));
8080ae76120SRobert Watson 
80982cd038dSYoshinobu Inoue 	if (nam->sa_len != sizeof(*addr))
8100ae76120SRobert Watson 		return (EINVAL);
811603724d3SBjoern A. Zeeb 	if (TAILQ_EMPTY(&V_ifnet))
8120ae76120SRobert Watson 		return (EADDRNOTAVAIL);
81382cd038dSYoshinobu Inoue 	if (addr->sin6_family != AF_INET6)
8140ae76120SRobert Watson 		return (EAFNOSUPPORT);
815a1f7e5f8SHajimu UMEMOTO 
816a1f7e5f8SHajimu UMEMOTO 	/*
8170ae76120SRobert Watson 	 * Application should provide a proper zone ID or the use of default
8180ae76120SRobert Watson 	 * zone IDs should be enabled.  Unfortunately, some applications do
8190ae76120SRobert Watson 	 * not behave as it should, so we need a workaround.  Even if an
8200ae76120SRobert Watson 	 * appropriate ID is not determined, we'll see if we can determine
8210ae76120SRobert Watson 	 * the outgoing interface.  If we can, determine the zone ID based on
8220ae76120SRobert Watson 	 * the interface below.
823a1f7e5f8SHajimu UMEMOTO 	 */
824603724d3SBjoern A. Zeeb 	if (addr->sin6_scope_id == 0 && !V_ip6_use_defzone)
825a1f7e5f8SHajimu UMEMOTO 		scope_ambiguous = 1;
826603724d3SBjoern A. Zeeb 	if ((error = sa6_embedscope(addr, V_ip6_use_defzone)) != 0)
827a1f7e5f8SHajimu UMEMOTO 		return (error);
828a1f7e5f8SHajimu UMEMOTO 
829603724d3SBjoern A. Zeeb 	INP_INFO_WLOCK(&V_ripcbinfo);
8308501a69cSRobert Watson 	INP_WLOCK(inp);
83182cd038dSYoshinobu Inoue 	/* Source address selection. XXX: need pcblookup? */
83288d166bfSBjoern A. Zeeb 	error = in6_selectsrc(addr, inp->in6p_outputopts,
83388d166bfSBjoern A. Zeeb 	    inp, NULL, so->so_cred, &ifp, &in6a);
83488d166bfSBjoern A. Zeeb 	if (error) {
8358501a69cSRobert Watson 		INP_WUNLOCK(inp);
836603724d3SBjoern A. Zeeb 		INP_INFO_WUNLOCK(&V_ripcbinfo);
83788d166bfSBjoern A. Zeeb 		return (error);
83807385abdSRobert Watson 	}
839a1f7e5f8SHajimu UMEMOTO 
840a1f7e5f8SHajimu UMEMOTO 	/* XXX: see above */
841a1f7e5f8SHajimu UMEMOTO 	if (ifp && scope_ambiguous &&
842a1f7e5f8SHajimu UMEMOTO 	    (error = in6_setscope(&addr->sin6_addr, ifp, NULL)) != 0) {
8438501a69cSRobert Watson 		INP_WUNLOCK(inp);
844603724d3SBjoern A. Zeeb 		INP_INFO_WUNLOCK(&V_ripcbinfo);
845a1f7e5f8SHajimu UMEMOTO 		return (error);
846a1f7e5f8SHajimu UMEMOTO 	}
84782cd038dSYoshinobu Inoue 	inp->in6p_faddr = addr->sin6_addr;
84888d166bfSBjoern A. Zeeb 	inp->in6p_laddr = in6a;
84982cd038dSYoshinobu Inoue 	soisconnected(so);
8508501a69cSRobert Watson 	INP_WUNLOCK(inp);
851603724d3SBjoern A. Zeeb 	INP_INFO_WUNLOCK(&V_ripcbinfo);
8520ae76120SRobert Watson 	return (0);
85382cd038dSYoshinobu Inoue }
85482cd038dSYoshinobu Inoue 
85582cd038dSYoshinobu Inoue static int
85682cd038dSYoshinobu Inoue rip6_shutdown(struct socket *so)
85782cd038dSYoshinobu Inoue {
85807385abdSRobert Watson 	struct inpcb *inp;
85907385abdSRobert Watson 
86007385abdSRobert Watson 	inp = sotoinpcb(so);
86114ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_shutdown: inp == NULL"));
8620ae76120SRobert Watson 
8638501a69cSRobert Watson 	INP_WLOCK(inp);
86482cd038dSYoshinobu Inoue 	socantsendmore(so);
8658501a69cSRobert Watson 	INP_WUNLOCK(inp);
8660ae76120SRobert Watson 	return (0);
86782cd038dSYoshinobu Inoue }
86882cd038dSYoshinobu Inoue 
86982cd038dSYoshinobu Inoue static int
87082cd038dSYoshinobu Inoue rip6_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *nam,
871b40ce416SJulian Elischer     struct mbuf *control, struct thread *td)
87282cd038dSYoshinobu Inoue {
8730ae76120SRobert Watson 	struct inpcb *inp;
87482cd038dSYoshinobu Inoue 	struct sockaddr_in6 tmp;
87582cd038dSYoshinobu Inoue 	struct sockaddr_in6 *dst;
87607385abdSRobert Watson 	int ret;
87782cd038dSYoshinobu Inoue 
8780ae76120SRobert Watson 	inp = sotoinpcb(so);
87914ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_send: inp == NULL"));
8800ae76120SRobert Watson 
8810ae76120SRobert Watson 	/* Always copy sockaddr to avoid overwrites. */
88207385abdSRobert Watson 	/* Unlocked read. */
88382cd038dSYoshinobu Inoue 	if (so->so_state & SS_ISCONNECTED) {
88482cd038dSYoshinobu Inoue 		if (nam) {
88582cd038dSYoshinobu Inoue 			m_freem(m);
8860ae76120SRobert Watson 			return (EISCONN);
88782cd038dSYoshinobu Inoue 		}
88882cd038dSYoshinobu Inoue 		/* XXX */
88982cd038dSYoshinobu Inoue 		bzero(&tmp, sizeof(tmp));
89082cd038dSYoshinobu Inoue 		tmp.sin6_family = AF_INET6;
89182cd038dSYoshinobu Inoue 		tmp.sin6_len = sizeof(struct sockaddr_in6);
8922209e8f1SRobert Watson 		INP_RLOCK(inp);
89382cd038dSYoshinobu Inoue 		bcopy(&inp->in6p_faddr, &tmp.sin6_addr,
89482cd038dSYoshinobu Inoue 		    sizeof(struct in6_addr));
8952209e8f1SRobert Watson 		INP_RUNLOCK(inp);
89682cd038dSYoshinobu Inoue 		dst = &tmp;
89782cd038dSYoshinobu Inoue 	} else {
89882cd038dSYoshinobu Inoue 		if (nam == NULL) {
89982cd038dSYoshinobu Inoue 			m_freem(m);
9000ae76120SRobert Watson 			return (ENOTCONN);
90182cd038dSYoshinobu Inoue 		}
902a1f7e5f8SHajimu UMEMOTO 		if (nam->sa_len != sizeof(struct sockaddr_in6)) {
903a1f7e5f8SHajimu UMEMOTO 			m_freem(m);
904a1f7e5f8SHajimu UMEMOTO 			return (EINVAL);
905a1f7e5f8SHajimu UMEMOTO 		}
906686cdd19SJun-ichiro itojun Hagino 		tmp = *(struct sockaddr_in6 *)nam;
907686cdd19SJun-ichiro itojun Hagino 		dst = &tmp;
908a1f7e5f8SHajimu UMEMOTO 
909a1f7e5f8SHajimu UMEMOTO 		if (dst->sin6_family == AF_UNSPEC) {
910a1f7e5f8SHajimu UMEMOTO 			/*
911a1f7e5f8SHajimu UMEMOTO 			 * XXX: we allow this case for backward
912a1f7e5f8SHajimu UMEMOTO 			 * compatibility to buggy applications that
913a1f7e5f8SHajimu UMEMOTO 			 * rely on old (and wrong) kernel behavior.
914a1f7e5f8SHajimu UMEMOTO 			 */
915a1f7e5f8SHajimu UMEMOTO 			log(LOG_INFO, "rip6 SEND: address family is "
916a1f7e5f8SHajimu UMEMOTO 			    "unspec. Assume AF_INET6\n");
917a1f7e5f8SHajimu UMEMOTO 			dst->sin6_family = AF_INET6;
918a1f7e5f8SHajimu UMEMOTO 		} else if (dst->sin6_family != AF_INET6) {
919a1f7e5f8SHajimu UMEMOTO 			m_freem(m);
920a1f7e5f8SHajimu UMEMOTO 			return(EAFNOSUPPORT);
92182cd038dSYoshinobu Inoue 		}
922686cdd19SJun-ichiro itojun Hagino 	}
92307385abdSRobert Watson 	ret = rip6_output(m, so, dst, control);
92407385abdSRobert Watson 	return (ret);
92582cd038dSYoshinobu Inoue }
92682cd038dSYoshinobu Inoue 
92782cd038dSYoshinobu Inoue struct pr_usrreqs rip6_usrreqs = {
928756d52a1SPoul-Henning Kamp 	.pru_abort =		rip6_abort,
929756d52a1SPoul-Henning Kamp 	.pru_attach =		rip6_attach,
930756d52a1SPoul-Henning Kamp 	.pru_bind =		rip6_bind,
931756d52a1SPoul-Henning Kamp 	.pru_connect =		rip6_connect,
932756d52a1SPoul-Henning Kamp 	.pru_control =		in6_control,
933756d52a1SPoul-Henning Kamp 	.pru_detach =		rip6_detach,
934756d52a1SPoul-Henning Kamp 	.pru_disconnect =	rip6_disconnect,
93554d642bbSRobert Watson 	.pru_peeraddr =		in6_getpeeraddr,
936756d52a1SPoul-Henning Kamp 	.pru_send =		rip6_send,
937756d52a1SPoul-Henning Kamp 	.pru_shutdown =		rip6_shutdown,
93854d642bbSRobert Watson 	.pru_sockaddr =		in6_getsockaddr,
939a152f8a3SRobert Watson 	.pru_close =		rip6_close,
94082cd038dSYoshinobu Inoue };
941