xref: /freebsd/sys/netinet6/raw_ip6.c (revision b89e82dd87dec9034c8b7f1a01524dceea11ff49)
1caf43b02SWarner Losh /*-
282cd038dSYoshinobu Inoue  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
382cd038dSYoshinobu Inoue  * All rights reserved.
482cd038dSYoshinobu Inoue  *
582cd038dSYoshinobu Inoue  * Redistribution and use in source and binary forms, with or without
682cd038dSYoshinobu Inoue  * modification, are permitted provided that the following conditions
782cd038dSYoshinobu Inoue  * are met:
882cd038dSYoshinobu Inoue  * 1. Redistributions of source code must retain the above copyright
982cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer.
1082cd038dSYoshinobu Inoue  * 2. Redistributions in binary form must reproduce the above copyright
1182cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer in the
1282cd038dSYoshinobu Inoue  *    documentation and/or other materials provided with the distribution.
1382cd038dSYoshinobu Inoue  * 3. Neither the name of the project nor the names of its contributors
1482cd038dSYoshinobu Inoue  *    may be used to endorse or promote products derived from this software
1582cd038dSYoshinobu Inoue  *    without specific prior written permission.
1682cd038dSYoshinobu Inoue  *
1782cd038dSYoshinobu Inoue  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
1882cd038dSYoshinobu Inoue  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
1982cd038dSYoshinobu Inoue  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
2082cd038dSYoshinobu Inoue  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
2182cd038dSYoshinobu Inoue  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
2282cd038dSYoshinobu Inoue  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
2382cd038dSYoshinobu Inoue  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
2482cd038dSYoshinobu Inoue  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
2582cd038dSYoshinobu Inoue  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
2682cd038dSYoshinobu Inoue  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
2782cd038dSYoshinobu Inoue  * SUCH DAMAGE.
2882cd038dSYoshinobu Inoue  */
2982cd038dSYoshinobu Inoue 
30caf43b02SWarner Losh /*-
3182cd038dSYoshinobu Inoue  * Copyright (c) 1982, 1986, 1988, 1993
320ae76120SRobert Watson  *	The Regents of the University of California.
330ae76120SRobert Watson  * All rights reserved.
3482cd038dSYoshinobu Inoue  *
3582cd038dSYoshinobu Inoue  * Redistribution and use in source and binary forms, with or without
3682cd038dSYoshinobu Inoue  * modification, are permitted provided that the following conditions
3782cd038dSYoshinobu Inoue  * are met:
3882cd038dSYoshinobu Inoue  * 1. Redistributions of source code must retain the above copyright
3982cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer.
4082cd038dSYoshinobu Inoue  * 2. Redistributions in binary form must reproduce the above copyright
4182cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer in the
4282cd038dSYoshinobu Inoue  *    documentation and/or other materials provided with the distribution.
4382cd038dSYoshinobu Inoue  * 4. Neither the name of the University nor the names of its contributors
4482cd038dSYoshinobu Inoue  *    may be used to endorse or promote products derived from this software
4582cd038dSYoshinobu Inoue  *    without specific prior written permission.
4682cd038dSYoshinobu Inoue  *
4782cd038dSYoshinobu Inoue  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
4882cd038dSYoshinobu Inoue  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
4982cd038dSYoshinobu Inoue  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
5082cd038dSYoshinobu Inoue  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
5182cd038dSYoshinobu Inoue  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
5282cd038dSYoshinobu Inoue  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
5382cd038dSYoshinobu Inoue  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
5482cd038dSYoshinobu Inoue  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
5582cd038dSYoshinobu Inoue  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
5682cd038dSYoshinobu Inoue  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
5782cd038dSYoshinobu Inoue  * SUCH DAMAGE.
5882cd038dSYoshinobu Inoue  *
5982cd038dSYoshinobu Inoue  *	@(#)raw_ip.c	8.2 (Berkeley) 1/4/94
6082cd038dSYoshinobu Inoue  */
6182cd038dSYoshinobu Inoue 
62b48287a3SDavid E. O'Brien #include <sys/cdefs.h>
63b48287a3SDavid E. O'Brien __FBSDID("$FreeBSD$");
64b48287a3SDavid E. O'Brien 
656a800098SYoshinobu Inoue #include "opt_ipsec.h"
6633841545SHajimu UMEMOTO #include "opt_inet6.h"
676a800098SYoshinobu Inoue 
6882cd038dSYoshinobu Inoue #include <sys/param.h>
6982cd038dSYoshinobu Inoue #include <sys/errno.h>
70413628a7SBjoern A. Zeeb #include <sys/jail.h>
71960ed29cSSeigo Tanimura #include <sys/lock.h>
72960ed29cSSeigo Tanimura #include <sys/malloc.h>
73960ed29cSSeigo Tanimura #include <sys/mbuf.h>
74c2259ba4SRobert Watson #include <sys/priv.h>
75960ed29cSSeigo Tanimura #include <sys/proc.h>
76960ed29cSSeigo Tanimura #include <sys/protosw.h>
77960ed29cSSeigo Tanimura #include <sys/signalvar.h>
78960ed29cSSeigo Tanimura #include <sys/socket.h>
79960ed29cSSeigo Tanimura #include <sys/socketvar.h>
80960ed29cSSeigo Tanimura #include <sys/sx.h>
81a1f7e5f8SHajimu UMEMOTO #include <sys/syslog.h>
82603724d3SBjoern A. Zeeb #include <sys/vimage.h>
8382cd038dSYoshinobu Inoue 
8482cd038dSYoshinobu Inoue #include <net/if.h>
8582cd038dSYoshinobu Inoue #include <net/if_types.h>
86960ed29cSSeigo Tanimura #include <net/route.h>
874b79449eSBjoern A. Zeeb #include <net/vnet.h>
8882cd038dSYoshinobu Inoue 
8982cd038dSYoshinobu Inoue #include <netinet/in.h>
9082cd038dSYoshinobu Inoue #include <netinet/in_var.h>
9182cd038dSYoshinobu Inoue #include <netinet/in_systm.h>
9282cd038dSYoshinobu Inoue #include <netinet/in_pcb.h>
934b79449eSBjoern A. Zeeb #include <netinet/vinet.h>
944b79449eSBjoern A. Zeeb 
954b79449eSBjoern A. Zeeb #include <netinet/icmp6.h>
96960ed29cSSeigo Tanimura #include <netinet/ip6.h>
97686cdd19SJun-ichiro itojun Hagino #include <netinet6/ip6protosw.h>
98960ed29cSSeigo Tanimura #include <netinet6/ip6_mroute.h>
99960ed29cSSeigo Tanimura #include <netinet6/in6_pcb.h>
100960ed29cSSeigo Tanimura #include <netinet6/ip6_var.h>
101960ed29cSSeigo Tanimura #include <netinet6/nd6.h>
102960ed29cSSeigo Tanimura #include <netinet6/raw_ip6.h>
103686cdd19SJun-ichiro itojun Hagino #include <netinet6/scope6_var.h>
1044b79449eSBjoern A. Zeeb #include <netinet6/vinet6.h>
10582cd038dSYoshinobu Inoue 
106b2630c29SGeorge V. Neville-Neil #ifdef IPSEC
107b9234fafSSam Leffler #include <netipsec/ipsec.h>
108b9234fafSSam Leffler #include <netipsec/ipsec6.h>
109b2630c29SGeorge V. Neville-Neil #endif /* IPSEC */
110b9234fafSSam Leffler 
11182cd038dSYoshinobu Inoue #include <machine/stdarg.h>
11282cd038dSYoshinobu Inoue 
11382cd038dSYoshinobu Inoue #define	satosin6(sa)	((struct sockaddr_in6 *)(sa))
11482cd038dSYoshinobu Inoue #define	ifatoia6(ifa)	((struct in6_ifaddr *)(ifa))
11582cd038dSYoshinobu Inoue 
11682cd038dSYoshinobu Inoue /*
11782cd038dSYoshinobu Inoue  * Raw interface to IP6 protocol.
11882cd038dSYoshinobu Inoue  */
11982cd038dSYoshinobu Inoue 
12097021c24SMarko Zec #ifdef VIMAGE_GLOBALS
12182cd038dSYoshinobu Inoue extern struct	inpcbhead ripcb;
12282cd038dSYoshinobu Inoue extern struct	inpcbinfo ripcbinfo;
12333841545SHajimu UMEMOTO struct rip6stat rip6stat;
12444e33a07SMarko Zec #endif
12533841545SHajimu UMEMOTO 
12697021c24SMarko Zec extern u_long	rip_sendspace;
12797021c24SMarko Zec extern u_long	rip_recvspace;
12897021c24SMarko Zec 
12982cd038dSYoshinobu Inoue /*
1306be2e366SBruce M Simpson  * Hooks for multicast forwarding.
1316be2e366SBruce M Simpson  */
1321291e2a0SBruce M Simpson struct socket *ip6_mrouter = NULL;
1336be2e366SBruce M Simpson int (*ip6_mrouter_set)(struct socket *, struct sockopt *);
1346be2e366SBruce M Simpson int (*ip6_mrouter_get)(struct socket *, struct sockopt *);
1356be2e366SBruce M Simpson int (*ip6_mrouter_done)(void);
1366be2e366SBruce M Simpson int (*ip6_mforward)(struct ip6_hdr *, struct ifnet *, struct mbuf *);
1376be2e366SBruce M Simpson int (*mrt6_ioctl)(int, caddr_t);
1386be2e366SBruce M Simpson 
1396be2e366SBruce M Simpson /*
1400ae76120SRobert Watson  * Setup generic address and protocol structures for raw_input routine, then
1410ae76120SRobert Watson  * pass them along with mbuf chain.
14282cd038dSYoshinobu Inoue  */
14382cd038dSYoshinobu Inoue int
1441272577eSXin LI rip6_input(struct mbuf **mp, int *offp, int proto)
14582cd038dSYoshinobu Inoue {
1468b615593SMarko Zec 	INIT_VNET_INET(curvnet);
1478b615593SMarko Zec 	INIT_VNET_INET6(curvnet);
1488b615593SMarko Zec #ifdef IPSEC
1498b615593SMarko Zec 	INIT_VNET_IPSEC(curvnet);
1508b615593SMarko Zec #endif
15182cd038dSYoshinobu Inoue 	struct mbuf *m = *mp;
15282cd038dSYoshinobu Inoue 	register struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
15382cd038dSYoshinobu Inoue 	register struct inpcb *in6p;
15482cd038dSYoshinobu Inoue 	struct inpcb *last = 0;
15533841545SHajimu UMEMOTO 	struct mbuf *opts = NULL;
156af12e09eSHajimu UMEMOTO 	struct sockaddr_in6 fromsa;
15782cd038dSYoshinobu Inoue 
158603724d3SBjoern A. Zeeb 	V_rip6stat.rip6s_ipackets++;
15933841545SHajimu UMEMOTO 
1609494d596SBrooks Davis 	if (faithprefix_p != NULL && (*faithprefix_p)(&ip6->ip6_dst)) {
1610ae76120SRobert Watson 		/* XXX Send icmp6 host/port unreach? */
16282cd038dSYoshinobu Inoue 		m_freem(m);
1630ae76120SRobert Watson 		return (IPPROTO_DONE);
16482cd038dSYoshinobu Inoue 	}
16533841545SHajimu UMEMOTO 
166af12e09eSHajimu UMEMOTO 	init_sin6(&fromsa, m); /* general init */
16782cd038dSYoshinobu Inoue 
168603724d3SBjoern A. Zeeb 	INP_INFO_RLOCK(&V_ripcbinfo);
169603724d3SBjoern A. Zeeb 	LIST_FOREACH(in6p, &V_ripcb, inp_list) {
170413628a7SBjoern A. Zeeb 		/* XXX inp locking */
171fc384fa5SBjoern A. Zeeb 		if ((in6p->inp_vflag & INP_IPV6) == 0)
17282cd038dSYoshinobu Inoue 			continue;
173fc384fa5SBjoern A. Zeeb 		if (in6p->inp_ip_p &&
174fc384fa5SBjoern A. Zeeb 		    in6p->inp_ip_p != proto)
175b11e21aeSAlexander Motin 			continue;
17682cd038dSYoshinobu Inoue 		if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_laddr) &&
17782cd038dSYoshinobu Inoue 		    !IN6_ARE_ADDR_EQUAL(&in6p->in6p_laddr, &ip6->ip6_dst))
178b11e21aeSAlexander Motin 			continue;
17982cd038dSYoshinobu Inoue 		if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr) &&
18082cd038dSYoshinobu Inoue 		    !IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr, &ip6->ip6_src))
181b11e21aeSAlexander Motin 			continue;
182b89e82ddSJamie Gritton 		if (prison_check_ip6(in6p->inp_cred, &ip6->ip6_dst) != 0)
183413628a7SBjoern A. Zeeb 			continue;
1846c5bbf5cSAlexander Motin 		INP_RLOCK(in6p);
18533841545SHajimu UMEMOTO 		if (in6p->in6p_cksum != -1) {
186603724d3SBjoern A. Zeeb 			V_rip6stat.rip6s_isum++;
1874350fcabSSUZUKI Shinsuke 			if (in6_cksum(m, proto, *offp,
18882cd038dSYoshinobu Inoue 			    m->m_pkthdr.len - *offp)) {
1896c5bbf5cSAlexander Motin 				INP_RUNLOCK(in6p);
190603724d3SBjoern A. Zeeb 				V_rip6stat.rip6s_badsum++;
191b11e21aeSAlexander Motin 				continue;
19282cd038dSYoshinobu Inoue 			}
19333841545SHajimu UMEMOTO 		}
194aba53ef0SKip Macy 		if (last != NULL) {
19582cd038dSYoshinobu Inoue 			struct mbuf *n = m_copy(m, 0, (int)M_COPYALL);
19633841545SHajimu UMEMOTO 
197b2630c29SGeorge V. Neville-Neil #ifdef IPSEC
198da0f4099SHajimu UMEMOTO 			/*
199da0f4099SHajimu UMEMOTO 			 * Check AH/ESP integrity.
200da0f4099SHajimu UMEMOTO 			 */
201da0f4099SHajimu UMEMOTO 			if (n && ipsec6_in_reject(n, last)) {
202da0f4099SHajimu UMEMOTO 				m_freem(n);
203603724d3SBjoern A. Zeeb 				V_ipsec6stat.in_polvio++;
2040ae76120SRobert Watson 				/* Do not inject data into pcb. */
205b9234fafSSam Leffler 			} else
206b2630c29SGeorge V. Neville-Neil #endif /* IPSEC */
20782cd038dSYoshinobu Inoue 			if (n) {
20897590249SBjoern A. Zeeb 				if (last->inp_flags & INP_CONTROLOPTS ||
209fc384fa5SBjoern A. Zeeb 				    last->inp_socket->so_options & SO_TIMESTAMP)
21011de19f4SHajimu UMEMOTO 					ip6_savecontrol(last, n, &opts);
21182cd038dSYoshinobu Inoue 				/* strip intermediate headers */
21282cd038dSYoshinobu Inoue 				m_adj(n, *offp);
213fc384fa5SBjoern A. Zeeb 				if (sbappendaddr(&last->inp_socket->so_rcv,
214af12e09eSHajimu UMEMOTO 						(struct sockaddr *)&fromsa,
21582cd038dSYoshinobu Inoue 						 n, opts) == 0) {
21682cd038dSYoshinobu Inoue 					m_freem(n);
21782cd038dSYoshinobu Inoue 					if (opts)
21882cd038dSYoshinobu Inoue 						m_freem(opts);
219603724d3SBjoern A. Zeeb 					V_rip6stat.rip6s_fullsock++;
2204cc20ab1SSeigo Tanimura 				} else
221fc384fa5SBjoern A. Zeeb 					sorwakeup(last->inp_socket);
22282cd038dSYoshinobu Inoue 				opts = NULL;
22382cd038dSYoshinobu Inoue 			}
2249ad11dd8SRobert Watson 			INP_RUNLOCK(last);
22582cd038dSYoshinobu Inoue 		}
22682cd038dSYoshinobu Inoue 		last = in6p;
22782cd038dSYoshinobu Inoue 	}
228603724d3SBjoern A. Zeeb 	INP_INFO_RUNLOCK(&V_ripcbinfo);
229b2630c29SGeorge V. Neville-Neil #ifdef IPSEC
230da0f4099SHajimu UMEMOTO 	/*
231da0f4099SHajimu UMEMOTO 	 * Check AH/ESP integrity.
232da0f4099SHajimu UMEMOTO 	 */
23375bab8b8SKip Macy 	if ((last != NULL) && ipsec6_in_reject(m, last)) {
234da0f4099SHajimu UMEMOTO 		m_freem(m);
235603724d3SBjoern A. Zeeb 		V_ipsec6stat.in_polvio++;
236603724d3SBjoern A. Zeeb 		V_ip6stat.ip6s_delivered--;
2370ae76120SRobert Watson 		/* Do not inject data into pcb. */
2389ad11dd8SRobert Watson 		INP_RUNLOCK(last);
239b9234fafSSam Leffler 	} else
240b2630c29SGeorge V. Neville-Neil #endif /* IPSEC */
241aba53ef0SKip Macy 	if (last != NULL) {
24297590249SBjoern A. Zeeb 		if (last->inp_flags & INP_CONTROLOPTS ||
243fc384fa5SBjoern A. Zeeb 		    last->inp_socket->so_options & SO_TIMESTAMP)
24411de19f4SHajimu UMEMOTO 			ip6_savecontrol(last, m, &opts);
2450ae76120SRobert Watson 		/* Strip intermediate headers. */
24682cd038dSYoshinobu Inoue 		m_adj(m, *offp);
247fc384fa5SBjoern A. Zeeb 		if (sbappendaddr(&last->inp_socket->so_rcv,
248af12e09eSHajimu UMEMOTO 		    (struct sockaddr *)&fromsa, m, opts) == 0) {
24982cd038dSYoshinobu Inoue 			m_freem(m);
25082cd038dSYoshinobu Inoue 			if (opts)
25182cd038dSYoshinobu Inoue 				m_freem(opts);
252603724d3SBjoern A. Zeeb 			V_rip6stat.rip6s_fullsock++;
2534cc20ab1SSeigo Tanimura 		} else
254fc384fa5SBjoern A. Zeeb 			sorwakeup(last->inp_socket);
2559ad11dd8SRobert Watson 		INP_RUNLOCK(last);
25682cd038dSYoshinobu Inoue 	} else {
257603724d3SBjoern A. Zeeb 		V_rip6stat.rip6s_nosock++;
25833841545SHajimu UMEMOTO 		if (m->m_flags & M_MCAST)
259603724d3SBjoern A. Zeeb 			V_rip6stat.rip6s_nosockmcast++;
26082cd038dSYoshinobu Inoue 		if (proto == IPPROTO_NONE)
26182cd038dSYoshinobu Inoue 			m_freem(m);
26282cd038dSYoshinobu Inoue 		else {
26382cd038dSYoshinobu Inoue 			char *prvnxtp = ip6_get_prevhdr(m, *offp); /* XXX */
26482cd038dSYoshinobu Inoue 			icmp6_error(m, ICMP6_PARAM_PROB,
26582cd038dSYoshinobu Inoue 			    ICMP6_PARAMPROB_NEXTHEADER,
26682cd038dSYoshinobu Inoue 			    prvnxtp - mtod(m, char *));
26782cd038dSYoshinobu Inoue 		}
268603724d3SBjoern A. Zeeb 		V_ip6stat.ip6s_delivered--;
26982cd038dSYoshinobu Inoue 	}
2700ae76120SRobert Watson 	return (IPPROTO_DONE);
27182cd038dSYoshinobu Inoue }
27282cd038dSYoshinobu Inoue 
273686cdd19SJun-ichiro itojun Hagino void
2741272577eSXin LI rip6_ctlinput(int cmd, struct sockaddr *sa, void *d)
275686cdd19SJun-ichiro itojun Hagino {
2768b615593SMarko Zec 	INIT_VNET_INET(curvnet);
277686cdd19SJun-ichiro itojun Hagino 	struct ip6_hdr *ip6;
278686cdd19SJun-ichiro itojun Hagino 	struct mbuf *m;
279686cdd19SJun-ichiro itojun Hagino 	int off = 0;
28033841545SHajimu UMEMOTO 	struct ip6ctlparam *ip6cp = NULL;
28133841545SHajimu UMEMOTO 	const struct sockaddr_in6 *sa6_src = NULL;
282efddf5c6SHajimu UMEMOTO 	void *cmdarg;
2839233d8f3SDavid E. O'Brien 	struct inpcb *(*notify)(struct inpcb *, int) = in6_rtchange;
284686cdd19SJun-ichiro itojun Hagino 
285686cdd19SJun-ichiro itojun Hagino 	if (sa->sa_family != AF_INET6 ||
286686cdd19SJun-ichiro itojun Hagino 	    sa->sa_len != sizeof(struct sockaddr_in6))
287686cdd19SJun-ichiro itojun Hagino 		return;
288686cdd19SJun-ichiro itojun Hagino 
289686cdd19SJun-ichiro itojun Hagino 	if ((unsigned)cmd >= PRC_NCMDS)
290686cdd19SJun-ichiro itojun Hagino 		return;
291686cdd19SJun-ichiro itojun Hagino 	if (PRC_IS_REDIRECT(cmd))
292686cdd19SJun-ichiro itojun Hagino 		notify = in6_rtchange, d = NULL;
293686cdd19SJun-ichiro itojun Hagino 	else if (cmd == PRC_HOSTDEAD)
294686cdd19SJun-ichiro itojun Hagino 		d = NULL;
295686cdd19SJun-ichiro itojun Hagino 	else if (inet6ctlerrmap[cmd] == 0)
296686cdd19SJun-ichiro itojun Hagino 		return;
297686cdd19SJun-ichiro itojun Hagino 
2980ae76120SRobert Watson 	/*
2990ae76120SRobert Watson 	 * If the parameter is from icmp6, decode it.
3000ae76120SRobert Watson 	 */
301686cdd19SJun-ichiro itojun Hagino 	if (d != NULL) {
30233841545SHajimu UMEMOTO 		ip6cp = (struct ip6ctlparam *)d;
303686cdd19SJun-ichiro itojun Hagino 		m = ip6cp->ip6c_m;
304686cdd19SJun-ichiro itojun Hagino 		ip6 = ip6cp->ip6c_ip6;
305686cdd19SJun-ichiro itojun Hagino 		off = ip6cp->ip6c_off;
306efddf5c6SHajimu UMEMOTO 		cmdarg = ip6cp->ip6c_cmdarg;
30733841545SHajimu UMEMOTO 		sa6_src = ip6cp->ip6c_src;
308686cdd19SJun-ichiro itojun Hagino 	} else {
309686cdd19SJun-ichiro itojun Hagino 		m = NULL;
310686cdd19SJun-ichiro itojun Hagino 		ip6 = NULL;
311efddf5c6SHajimu UMEMOTO 		cmdarg = NULL;
31233841545SHajimu UMEMOTO 		sa6_src = &sa6_any;
313686cdd19SJun-ichiro itojun Hagino 	}
314686cdd19SJun-ichiro itojun Hagino 
315603724d3SBjoern A. Zeeb 	(void) in6_pcbnotify(&V_ripcbinfo, sa, 0,
3160ae76120SRobert Watson 	    (const struct sockaddr *)sa6_src, 0, cmd, cmdarg, notify);
317686cdd19SJun-ichiro itojun Hagino }
318686cdd19SJun-ichiro itojun Hagino 
31982cd038dSYoshinobu Inoue /*
3200ae76120SRobert Watson  * Generate IPv6 header and pass packet to ip6_output.  Tack on options user
3210ae76120SRobert Watson  * may have setup with control call.
32282cd038dSYoshinobu Inoue  */
32382cd038dSYoshinobu Inoue int
32482cd038dSYoshinobu Inoue #if __STDC__
32582cd038dSYoshinobu Inoue rip6_output(struct mbuf *m, ...)
32682cd038dSYoshinobu Inoue #else
32782cd038dSYoshinobu Inoue rip6_output(m, va_alist)
32882cd038dSYoshinobu Inoue 	struct mbuf *m;
32982cd038dSYoshinobu Inoue 	va_dcl
33082cd038dSYoshinobu Inoue #endif
33182cd038dSYoshinobu Inoue {
3328b615593SMarko Zec 	INIT_VNET_INET6(curvnet);
33307eb2995SHajimu UMEMOTO 	struct mbuf *control;
33482cd038dSYoshinobu Inoue 	struct socket *so;
33582cd038dSYoshinobu Inoue 	struct sockaddr_in6 *dstsock;
33682cd038dSYoshinobu Inoue 	struct in6_addr *dst;
33782cd038dSYoshinobu Inoue 	struct ip6_hdr *ip6;
33882cd038dSYoshinobu Inoue 	struct inpcb *in6p;
33982cd038dSYoshinobu Inoue 	u_int	plen = m->m_pkthdr.len;
34082cd038dSYoshinobu Inoue 	int error = 0;
341e07db7aaSHajimu UMEMOTO 	struct ip6_pktopts opt, *optp;
34282cd038dSYoshinobu Inoue 	struct ifnet *oifp = NULL;
34382cd038dSYoshinobu Inoue 	int type = 0, code = 0;		/* for ICMPv6 output statistics only */
344a1f7e5f8SHajimu UMEMOTO 	int scope_ambiguous = 0;
345f95d4633SHajimu UMEMOTO 	struct in6_addr *in6a;
34682cd038dSYoshinobu Inoue 	va_list ap;
34782cd038dSYoshinobu Inoue 
34882cd038dSYoshinobu Inoue 	va_start(ap, m);
34982cd038dSYoshinobu Inoue 	so = va_arg(ap, struct socket *);
35082cd038dSYoshinobu Inoue 	dstsock = va_arg(ap, struct sockaddr_in6 *);
35182cd038dSYoshinobu Inoue 	control = va_arg(ap, struct mbuf *);
35282cd038dSYoshinobu Inoue 	va_end(ap);
35382cd038dSYoshinobu Inoue 
354fc384fa5SBjoern A. Zeeb 	in6p = sotoinpcb(so);
3558501a69cSRobert Watson 	INP_WLOCK(in6p);
35682cd038dSYoshinobu Inoue 
35782cd038dSYoshinobu Inoue 	dst = &dstsock->sin6_addr;
35875bab8b8SKip Macy 	if (control != NULL) {
359d5e3406dSHajimu UMEMOTO 		if ((error = ip6_setpktopts(control, &opt,
36079ba3952SBjoern A. Zeeb 		    in6p->in6p_outputopts, so->so_cred,
36179ba3952SBjoern A. Zeeb 		    so->so_proto->pr_protocol)) != 0) {
36282cd038dSYoshinobu Inoue 			goto bad;
363f95d4633SHajimu UMEMOTO 		}
364e07db7aaSHajimu UMEMOTO 		optp = &opt;
365e07db7aaSHajimu UMEMOTO 	} else
366e07db7aaSHajimu UMEMOTO 		optp = in6p->in6p_outputopts;
36782cd038dSYoshinobu Inoue 
36882cd038dSYoshinobu Inoue 	/*
369a1f7e5f8SHajimu UMEMOTO 	 * Check and convert scope zone ID into internal form.
3700ae76120SRobert Watson 	 *
371a1f7e5f8SHajimu UMEMOTO 	 * XXX: we may still need to determine the zone later.
372a1f7e5f8SHajimu UMEMOTO 	 */
373a1f7e5f8SHajimu UMEMOTO 	if (!(so->so_state & SS_ISCONNECTED)) {
374603724d3SBjoern A. Zeeb 		if (dstsock->sin6_scope_id == 0 && !V_ip6_use_defzone)
375a1f7e5f8SHajimu UMEMOTO 			scope_ambiguous = 1;
376603724d3SBjoern A. Zeeb 		if ((error = sa6_embedscope(dstsock, V_ip6_use_defzone)) != 0)
377a1f7e5f8SHajimu UMEMOTO 			goto bad;
378a1f7e5f8SHajimu UMEMOTO 	}
379a1f7e5f8SHajimu UMEMOTO 
380a1f7e5f8SHajimu UMEMOTO 	/*
3810ae76120SRobert Watson 	 * For an ICMPv6 packet, we should know its type and code to update
3820ae76120SRobert Watson 	 * statistics.
38382cd038dSYoshinobu Inoue 	 */
38482cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
38582cd038dSYoshinobu Inoue 		struct icmp6_hdr *icmp6;
38682cd038dSYoshinobu Inoue 		if (m->m_len < sizeof(struct icmp6_hdr) &&
38782cd038dSYoshinobu Inoue 		    (m = m_pullup(m, sizeof(struct icmp6_hdr))) == NULL) {
38882cd038dSYoshinobu Inoue 			error = ENOBUFS;
38982cd038dSYoshinobu Inoue 			goto bad;
39082cd038dSYoshinobu Inoue 		}
39182cd038dSYoshinobu Inoue 		icmp6 = mtod(m, struct icmp6_hdr *);
39282cd038dSYoshinobu Inoue 		type = icmp6->icmp6_type;
39382cd038dSYoshinobu Inoue 		code = icmp6->icmp6_code;
39482cd038dSYoshinobu Inoue 	}
39582cd038dSYoshinobu Inoue 
3968a0c4da8SRobert Watson 	M_PREPEND(m, sizeof(*ip6), M_DONTWAIT);
3978a0c4da8SRobert Watson 	if (m == NULL) {
3988a0c4da8SRobert Watson 		error = ENOBUFS;
3998a0c4da8SRobert Watson 		goto bad;
4008a0c4da8SRobert Watson 	}
40182cd038dSYoshinobu Inoue 	ip6 = mtod(m, struct ip6_hdr *);
40282cd038dSYoshinobu Inoue 
40382cd038dSYoshinobu Inoue 	/*
40482cd038dSYoshinobu Inoue 	 * Source address selection.
40582cd038dSYoshinobu Inoue 	 */
406f2f877d3SBjoern A. Zeeb 	if ((in6a = in6_selectsrc(dstsock, optp, in6p, NULL, so->so_cred,
407f2f877d3SBjoern A. Zeeb 	    &oifp, &error)) == NULL) {
40882cd038dSYoshinobu Inoue 		if (error == 0)
40982cd038dSYoshinobu Inoue 			error = EADDRNOTAVAIL;
41082cd038dSYoshinobu Inoue 		goto bad;
41182cd038dSYoshinobu Inoue 	}
412b89e82ddSJamie Gritton 	error = prison_get_ip6(in6p->inp_cred, in6a);
413b89e82ddSJamie Gritton 	if (error != 0)
414413628a7SBjoern A. Zeeb 		goto bad;
41582cd038dSYoshinobu Inoue 	ip6->ip6_src = *in6a;
416a1f7e5f8SHajimu UMEMOTO 
417a1f7e5f8SHajimu UMEMOTO 	if (oifp && scope_ambiguous) {
418a1f7e5f8SHajimu UMEMOTO 		/*
419a1f7e5f8SHajimu UMEMOTO 		 * Application should provide a proper zone ID or the use of
420a1f7e5f8SHajimu UMEMOTO 		 * default zone IDs should be enabled.  Unfortunately, some
421a1f7e5f8SHajimu UMEMOTO 		 * applications do not behave as it should, so we need a
422a1f7e5f8SHajimu UMEMOTO 		 * workaround.  Even if an appropriate ID is not determined
423a1f7e5f8SHajimu UMEMOTO 		 * (when it's required), if we can determine the outgoing
424a1f7e5f8SHajimu UMEMOTO 		 * interface. determine the zone ID based on the interface.
425a1f7e5f8SHajimu UMEMOTO 		 */
426a1f7e5f8SHajimu UMEMOTO 		error = in6_setscope(&dstsock->sin6_addr, oifp, NULL);
427a1f7e5f8SHajimu UMEMOTO 		if (error != 0)
428a1f7e5f8SHajimu UMEMOTO 			goto bad;
429a1f7e5f8SHajimu UMEMOTO 	}
430a1f7e5f8SHajimu UMEMOTO 	ip6->ip6_dst = dstsock->sin6_addr;
431a1f7e5f8SHajimu UMEMOTO 
4320ae76120SRobert Watson 	/*
4330ae76120SRobert Watson 	 * Fill in the rest of the IPv6 header fields.
4340ae76120SRobert Watson 	 */
4356a800098SYoshinobu Inoue 	ip6->ip6_flow = (ip6->ip6_flow & ~IPV6_FLOWINFO_MASK) |
436fc384fa5SBjoern A. Zeeb 	    (in6p->inp_flow & IPV6_FLOWINFO_MASK);
4376a800098SYoshinobu Inoue 	ip6->ip6_vfc = (ip6->ip6_vfc & ~IPV6_VERSION_MASK) |
4386a800098SYoshinobu Inoue 	    (IPV6_VERSION & IPV6_VERSION_MASK);
4390ae76120SRobert Watson 
4400ae76120SRobert Watson 	/*
4410ae76120SRobert Watson 	 * ip6_plen will be filled in ip6_output, so not fill it here.
4420ae76120SRobert Watson 	 */
443fc384fa5SBjoern A. Zeeb 	ip6->ip6_nxt = in6p->inp_ip_p;
44482cd038dSYoshinobu Inoue 	ip6->ip6_hlim = in6_selecthlim(in6p, oifp);
44582cd038dSYoshinobu Inoue 
44682cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6 ||
44782cd038dSYoshinobu Inoue 	    in6p->in6p_cksum != -1) {
44882cd038dSYoshinobu Inoue 		struct mbuf *n;
44982cd038dSYoshinobu Inoue 		int off;
45082cd038dSYoshinobu Inoue 		u_int16_t *p;
45182cd038dSYoshinobu Inoue 
4520ae76120SRobert Watson 		/* Compute checksum. */
45382cd038dSYoshinobu Inoue 		if (so->so_proto->pr_protocol == IPPROTO_ICMPV6)
45482cd038dSYoshinobu Inoue 			off = offsetof(struct icmp6_hdr, icmp6_cksum);
45582cd038dSYoshinobu Inoue 		else
45682cd038dSYoshinobu Inoue 			off = in6p->in6p_cksum;
45782cd038dSYoshinobu Inoue 		if (plen < off + 1) {
45882cd038dSYoshinobu Inoue 			error = EINVAL;
45982cd038dSYoshinobu Inoue 			goto bad;
46082cd038dSYoshinobu Inoue 		}
46182cd038dSYoshinobu Inoue 		off += sizeof(struct ip6_hdr);
46282cd038dSYoshinobu Inoue 
46382cd038dSYoshinobu Inoue 		n = m;
46482cd038dSYoshinobu Inoue 		while (n && n->m_len <= off) {
46582cd038dSYoshinobu Inoue 			off -= n->m_len;
46682cd038dSYoshinobu Inoue 			n = n->m_next;
46782cd038dSYoshinobu Inoue 		}
46882cd038dSYoshinobu Inoue 		if (!n)
46982cd038dSYoshinobu Inoue 			goto bad;
47082cd038dSYoshinobu Inoue 		p = (u_int16_t *)(mtod(n, caddr_t) + off);
47182cd038dSYoshinobu Inoue 		*p = 0;
47282cd038dSYoshinobu Inoue 		*p = in6_cksum(m, ip6->ip6_nxt, sizeof(*ip6), plen);
47382cd038dSYoshinobu Inoue 	}
47482cd038dSYoshinobu Inoue 
475e07db7aaSHajimu UMEMOTO 	error = ip6_output(m, optp, NULL, 0, in6p->in6p_moptions, &oifp, in6p);
47682cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
47782cd038dSYoshinobu Inoue 		if (oifp)
47882cd038dSYoshinobu Inoue 			icmp6_ifoutstat_inc(oifp, type, code);
479603724d3SBjoern A. Zeeb 		V_icmp6stat.icp6s_outhist[type]++;
48033841545SHajimu UMEMOTO 	} else
481603724d3SBjoern A. Zeeb 		V_rip6stat.rip6s_opackets++;
48282cd038dSYoshinobu Inoue 
48382cd038dSYoshinobu Inoue 	goto freectl;
48482cd038dSYoshinobu Inoue 
48582cd038dSYoshinobu Inoue  bad:
48682cd038dSYoshinobu Inoue 	if (m)
48782cd038dSYoshinobu Inoue 		m_freem(m);
48882cd038dSYoshinobu Inoue 
48982cd038dSYoshinobu Inoue  freectl:
49075bab8b8SKip Macy 	if (control != NULL) {
491e07db7aaSHajimu UMEMOTO 		ip6_clearpktopts(&opt, -1);
49282cd038dSYoshinobu Inoue 		m_freem(control);
49333841545SHajimu UMEMOTO 	}
4948501a69cSRobert Watson 	INP_WUNLOCK(in6p);
49582cd038dSYoshinobu Inoue 	return (error);
49682cd038dSYoshinobu Inoue }
49782cd038dSYoshinobu Inoue 
49882cd038dSYoshinobu Inoue /*
49982cd038dSYoshinobu Inoue  * Raw IPv6 socket option processing.
50082cd038dSYoshinobu Inoue  */
50182cd038dSYoshinobu Inoue int
5021272577eSXin LI rip6_ctloutput(struct socket *so, struct sockopt *sopt)
50382cd038dSYoshinobu Inoue {
50482cd038dSYoshinobu Inoue 	int error;
50582cd038dSYoshinobu Inoue 
50682cd038dSYoshinobu Inoue 	if (sopt->sopt_level == IPPROTO_ICMPV6)
50782cd038dSYoshinobu Inoue 		/*
50882cd038dSYoshinobu Inoue 		 * XXX: is it better to call icmp6_ctloutput() directly
50982cd038dSYoshinobu Inoue 		 * from protosw?
51082cd038dSYoshinobu Inoue 		 */
51182cd038dSYoshinobu Inoue 		return (icmp6_ctloutput(so, sopt));
51282cd038dSYoshinobu Inoue 	else if (sopt->sopt_level != IPPROTO_IPV6)
51382cd038dSYoshinobu Inoue 		return (EINVAL);
51482cd038dSYoshinobu Inoue 
51582cd038dSYoshinobu Inoue 	error = 0;
51682cd038dSYoshinobu Inoue 
51782cd038dSYoshinobu Inoue 	switch (sopt->sopt_dir) {
51882cd038dSYoshinobu Inoue 	case SOPT_GET:
51982cd038dSYoshinobu Inoue 		switch (sopt->sopt_name) {
52091ec0a1eSYoshinobu Inoue 		case MRT6_INIT:
52191ec0a1eSYoshinobu Inoue 		case MRT6_DONE:
52291ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MIF:
52391ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MIF:
52491ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MFC:
52591ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MFC:
52691ec0a1eSYoshinobu Inoue 		case MRT6_PIM:
5276be2e366SBruce M Simpson 			error = ip6_mrouter_get ?  ip6_mrouter_get(so, sopt) :
5286be2e366SBruce M Simpson 			    EOPNOTSUPP;
52991ec0a1eSYoshinobu Inoue 			break;
53002b9a206SHajimu UMEMOTO 		case IPV6_CHECKSUM:
53102b9a206SHajimu UMEMOTO 			error = ip6_raw_ctloutput(so, sopt);
53202b9a206SHajimu UMEMOTO 			break;
53382cd038dSYoshinobu Inoue 		default:
53482cd038dSYoshinobu Inoue 			error = ip6_ctloutput(so, sopt);
53582cd038dSYoshinobu Inoue 			break;
53682cd038dSYoshinobu Inoue 		}
53782cd038dSYoshinobu Inoue 		break;
53882cd038dSYoshinobu Inoue 
53982cd038dSYoshinobu Inoue 	case SOPT_SET:
54082cd038dSYoshinobu Inoue 		switch (sopt->sopt_name) {
54191ec0a1eSYoshinobu Inoue 		case MRT6_INIT:
54291ec0a1eSYoshinobu Inoue 		case MRT6_DONE:
54391ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MIF:
54491ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MIF:
54591ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MFC:
54691ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MFC:
54791ec0a1eSYoshinobu Inoue 		case MRT6_PIM:
5486be2e366SBruce M Simpson 			error = ip6_mrouter_set ?  ip6_mrouter_set(so, sopt) :
5496be2e366SBruce M Simpson 			    EOPNOTSUPP;
55091ec0a1eSYoshinobu Inoue 			break;
55102b9a206SHajimu UMEMOTO 		case IPV6_CHECKSUM:
55202b9a206SHajimu UMEMOTO 			error = ip6_raw_ctloutput(so, sopt);
55302b9a206SHajimu UMEMOTO 			break;
55482cd038dSYoshinobu Inoue 		default:
55582cd038dSYoshinobu Inoue 			error = ip6_ctloutput(so, sopt);
55682cd038dSYoshinobu Inoue 			break;
55782cd038dSYoshinobu Inoue 		}
55882cd038dSYoshinobu Inoue 		break;
55982cd038dSYoshinobu Inoue 	}
56082cd038dSYoshinobu Inoue 
56182cd038dSYoshinobu Inoue 	return (error);
56282cd038dSYoshinobu Inoue }
56382cd038dSYoshinobu Inoue 
56482cd038dSYoshinobu Inoue static int
565b40ce416SJulian Elischer rip6_attach(struct socket *so, int proto, struct thread *td)
56682cd038dSYoshinobu Inoue {
5678b615593SMarko Zec 	INIT_VNET_INET(so->so_vnet);
56882cd038dSYoshinobu Inoue 	struct inpcb *inp;
5698a9d54dfSSam Leffler 	struct icmp6_filter *filter;
570ff7425ceSRobert Watson 	int error;
57182cd038dSYoshinobu Inoue 
57282cd038dSYoshinobu Inoue 	inp = sotoinpcb(so);
57314ba8addSRobert Watson 	KASSERT(inp == NULL, ("rip6_attach: inp != NULL"));
5740ae76120SRobert Watson 
57579ba3952SBjoern A. Zeeb 	error = priv_check(td, PRIV_NETINET_RAW);
57679ba3952SBjoern A. Zeeb 	if (error)
5770ae76120SRobert Watson 		return (error);
57882cd038dSYoshinobu Inoue 	error = soreserve(so, rip_sendspace, rip_recvspace);
57914ba8addSRobert Watson 	if (error)
5800ae76120SRobert Watson 		return (error);
5811ede983cSDag-Erling Smørgrav 	filter = malloc(sizeof(struct icmp6_filter), M_PCB, M_NOWAIT);
58214ba8addSRobert Watson 	if (filter == NULL)
5830ae76120SRobert Watson 		return (ENOMEM);
584603724d3SBjoern A. Zeeb 	INP_INFO_WLOCK(&V_ripcbinfo);
585603724d3SBjoern A. Zeeb 	error = in_pcballoc(so, &V_ripcbinfo);
58607385abdSRobert Watson 	if (error) {
587603724d3SBjoern A. Zeeb 		INP_INFO_WUNLOCK(&V_ripcbinfo);
5881ede983cSDag-Erling Smørgrav 		free(filter, M_PCB);
5890ae76120SRobert Watson 		return (error);
59007385abdSRobert Watson 	}
59182cd038dSYoshinobu Inoue 	inp = (struct inpcb *)so->so_pcb;
592603724d3SBjoern A. Zeeb 	INP_INFO_WUNLOCK(&V_ripcbinfo);
59382cd038dSYoshinobu Inoue 	inp->inp_vflag |= INP_IPV6;
594fc384fa5SBjoern A. Zeeb 	inp->inp_ip_p = (long)proto;
59582cd038dSYoshinobu Inoue 	inp->in6p_hops = -1;	/* use kernel default */
59682cd038dSYoshinobu Inoue 	inp->in6p_cksum = -1;
5978a9d54dfSSam Leffler 	inp->in6p_icmp6filt = filter;
59882cd038dSYoshinobu Inoue 	ICMP6_FILTER_SETPASSALL(inp->in6p_icmp6filt);
5998501a69cSRobert Watson 	INP_WUNLOCK(inp);
6000ae76120SRobert Watson 	return (0);
60182cd038dSYoshinobu Inoue }
60282cd038dSYoshinobu Inoue 
603bc725eafSRobert Watson static void
60482cd038dSYoshinobu Inoue rip6_detach(struct socket *so)
60582cd038dSYoshinobu Inoue {
6068b615593SMarko Zec 	INIT_VNET_INET(so->so_vnet);
60782cd038dSYoshinobu Inoue 	struct inpcb *inp;
60882cd038dSYoshinobu Inoue 
60982cd038dSYoshinobu Inoue 	inp = sotoinpcb(so);
61014ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_detach: inp == NULL"));
611a152f8a3SRobert Watson 
6126be2e366SBruce M Simpson 	if (so == ip6_mrouter && ip6_mrouter_done)
613e7e3ecb6SYoshinobu Inoue 		ip6_mrouter_done();
6146be2e366SBruce M Simpson 	/* xxx: RSVP */
615603724d3SBjoern A. Zeeb 	INP_INFO_WLOCK(&V_ripcbinfo);
6168501a69cSRobert Watson 	INP_WLOCK(inp);
6171ede983cSDag-Erling Smørgrav 	free(inp->in6p_icmp6filt, M_PCB);
6180206cdb8SBjoern A. Zeeb 	in_pcbdetach(inp);
6196aee2fc5SBjoern A. Zeeb 	in_pcbfree(inp);
620603724d3SBjoern A. Zeeb 	INP_INFO_WUNLOCK(&V_ripcbinfo);
62182cd038dSYoshinobu Inoue }
62282cd038dSYoshinobu Inoue 
623a152f8a3SRobert Watson /* XXXRW: This can't ever be called. */
624ac45e92fSRobert Watson static void
62582cd038dSYoshinobu Inoue rip6_abort(struct socket *so)
62682cd038dSYoshinobu Inoue {
627a152f8a3SRobert Watson 	struct inpcb *inp;
628a152f8a3SRobert Watson 
629a152f8a3SRobert Watson 	inp = sotoinpcb(so);
630a152f8a3SRobert Watson 	KASSERT(inp != NULL, ("rip6_abort: inp == NULL"));
631a152f8a3SRobert Watson 
63282cd038dSYoshinobu Inoue 	soisdisconnected(so);
633a152f8a3SRobert Watson }
634a152f8a3SRobert Watson 
635a152f8a3SRobert Watson static void
636a152f8a3SRobert Watson rip6_close(struct socket *so)
637a152f8a3SRobert Watson {
638a152f8a3SRobert Watson 	struct inpcb *inp;
639a152f8a3SRobert Watson 
640a152f8a3SRobert Watson 	inp = sotoinpcb(so);
641a152f8a3SRobert Watson 	KASSERT(inp != NULL, ("rip6_close: inp == NULL"));
642a152f8a3SRobert Watson 
643a152f8a3SRobert Watson 	soisdisconnected(so);
64482cd038dSYoshinobu Inoue }
64582cd038dSYoshinobu Inoue 
64682cd038dSYoshinobu Inoue static int
64782cd038dSYoshinobu Inoue rip6_disconnect(struct socket *so)
64882cd038dSYoshinobu Inoue {
6490ae76120SRobert Watson 	struct inpcb *inp;
6500ae76120SRobert Watson 
6510ae76120SRobert Watson 	inp = sotoinpcb(so);
6520ae76120SRobert Watson 	KASSERT(inp != NULL, ("rip6_disconnect: inp == NULL"));
65382cd038dSYoshinobu Inoue 
6544cc20ab1SSeigo Tanimura 	if ((so->so_state & SS_ISCONNECTED) == 0)
6550ae76120SRobert Watson 		return (ENOTCONN);
65682cd038dSYoshinobu Inoue 	inp->in6p_faddr = in6addr_any;
657ac45e92fSRobert Watson 	rip6_abort(so);
65814ba8addSRobert Watson 	return (0);
65982cd038dSYoshinobu Inoue }
66082cd038dSYoshinobu Inoue 
66182cd038dSYoshinobu Inoue static int
662b40ce416SJulian Elischer rip6_bind(struct socket *so, struct sockaddr *nam, struct thread *td)
66382cd038dSYoshinobu Inoue {
6648b615593SMarko Zec 	INIT_VNET_NET(so->so_vnet);
6658b615593SMarko Zec 	INIT_VNET_INET(so->so_vnet);
6668b615593SMarko Zec 	INIT_VNET_INET6(so->so_vnet);
6670ae76120SRobert Watson 	struct inpcb *inp;
66882cd038dSYoshinobu Inoue 	struct sockaddr_in6 *addr = (struct sockaddr_in6 *)nam;
66982cd038dSYoshinobu Inoue 	struct ifaddr *ia = NULL;
670a1f7e5f8SHajimu UMEMOTO 	int error = 0;
67182cd038dSYoshinobu Inoue 
6720ae76120SRobert Watson 	inp = sotoinpcb(so);
67314ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_bind: inp == NULL"));
6740ae76120SRobert Watson 
67582cd038dSYoshinobu Inoue 	if (nam->sa_len != sizeof(*addr))
6760ae76120SRobert Watson 		return (EINVAL);
677b89e82ddSJamie Gritton 	if ((error = prison_check_ip6(td->td_ucred, &addr->sin6_addr)) != 0)
678b89e82ddSJamie Gritton 		return (error);
679603724d3SBjoern A. Zeeb 	if (TAILQ_EMPTY(&V_ifnet) || addr->sin6_family != AF_INET6)
6800ae76120SRobert Watson 		return (EADDRNOTAVAIL);
681603724d3SBjoern A. Zeeb 	if ((error = sa6_embedscope(addr, V_ip6_use_defzone)) != 0)
682a1f7e5f8SHajimu UMEMOTO 		return (error);
683a1f7e5f8SHajimu UMEMOTO 
68482cd038dSYoshinobu Inoue 	if (!IN6_IS_ADDR_UNSPECIFIED(&addr->sin6_addr) &&
68582cd038dSYoshinobu Inoue 	    (ia = ifa_ifwithaddr((struct sockaddr *)addr)) == 0)
6860ae76120SRobert Watson 		return (EADDRNOTAVAIL);
68782cd038dSYoshinobu Inoue 	if (ia &&
68882cd038dSYoshinobu Inoue 	    ((struct in6_ifaddr *)ia)->ia6_flags &
68982cd038dSYoshinobu Inoue 	    (IN6_IFF_ANYCAST|IN6_IFF_NOTREADY|
69082cd038dSYoshinobu Inoue 	     IN6_IFF_DETACHED|IN6_IFF_DEPRECATED)) {
69182cd038dSYoshinobu Inoue 		return (EADDRNOTAVAIL);
69282cd038dSYoshinobu Inoue 	}
693603724d3SBjoern A. Zeeb 	INP_INFO_WLOCK(&V_ripcbinfo);
6948501a69cSRobert Watson 	INP_WLOCK(inp);
69582cd038dSYoshinobu Inoue 	inp->in6p_laddr = addr->sin6_addr;
6968501a69cSRobert Watson 	INP_WUNLOCK(inp);
697603724d3SBjoern A. Zeeb 	INP_INFO_WUNLOCK(&V_ripcbinfo);
6980ae76120SRobert Watson 	return (0);
69982cd038dSYoshinobu Inoue }
70082cd038dSYoshinobu Inoue 
70182cd038dSYoshinobu Inoue static int
702b40ce416SJulian Elischer rip6_connect(struct socket *so, struct sockaddr *nam, struct thread *td)
70382cd038dSYoshinobu Inoue {
7048b615593SMarko Zec 	INIT_VNET_NET(so->so_vnet);
7058b615593SMarko Zec 	INIT_VNET_INET(so->so_vnet);
7068b615593SMarko Zec 	INIT_VNET_INET6(so->so_vnet);
7070ae76120SRobert Watson 	struct inpcb *inp;
70882cd038dSYoshinobu Inoue 	struct sockaddr_in6 *addr = (struct sockaddr_in6 *)nam;
70982cd038dSYoshinobu Inoue 	struct in6_addr *in6a = NULL;
710a1f7e5f8SHajimu UMEMOTO 	struct ifnet *ifp = NULL;
711a1f7e5f8SHajimu UMEMOTO 	int error = 0, scope_ambiguous = 0;
71282cd038dSYoshinobu Inoue 
7130ae76120SRobert Watson 	inp = sotoinpcb(so);
71414ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_connect: inp == NULL"));
7150ae76120SRobert Watson 
71682cd038dSYoshinobu Inoue 	if (nam->sa_len != sizeof(*addr))
7170ae76120SRobert Watson 		return (EINVAL);
718603724d3SBjoern A. Zeeb 	if (TAILQ_EMPTY(&V_ifnet))
7190ae76120SRobert Watson 		return (EADDRNOTAVAIL);
72082cd038dSYoshinobu Inoue 	if (addr->sin6_family != AF_INET6)
7210ae76120SRobert Watson 		return (EAFNOSUPPORT);
722a1f7e5f8SHajimu UMEMOTO 
723a1f7e5f8SHajimu UMEMOTO 	/*
7240ae76120SRobert Watson 	 * Application should provide a proper zone ID or the use of default
7250ae76120SRobert Watson 	 * zone IDs should be enabled.  Unfortunately, some applications do
7260ae76120SRobert Watson 	 * not behave as it should, so we need a workaround.  Even if an
7270ae76120SRobert Watson 	 * appropriate ID is not determined, we'll see if we can determine
7280ae76120SRobert Watson 	 * the outgoing interface.  If we can, determine the zone ID based on
7290ae76120SRobert Watson 	 * the interface below.
730a1f7e5f8SHajimu UMEMOTO 	 */
731603724d3SBjoern A. Zeeb 	if (addr->sin6_scope_id == 0 && !V_ip6_use_defzone)
732a1f7e5f8SHajimu UMEMOTO 		scope_ambiguous = 1;
733603724d3SBjoern A. Zeeb 	if ((error = sa6_embedscope(addr, V_ip6_use_defzone)) != 0)
734a1f7e5f8SHajimu UMEMOTO 		return (error);
735a1f7e5f8SHajimu UMEMOTO 
736603724d3SBjoern A. Zeeb 	INP_INFO_WLOCK(&V_ripcbinfo);
7378501a69cSRobert Watson 	INP_WLOCK(inp);
73882cd038dSYoshinobu Inoue 	/* Source address selection. XXX: need pcblookup? */
73982cd038dSYoshinobu Inoue 	in6a = in6_selectsrc(addr, inp->in6p_outputopts,
740f2f877d3SBjoern A. Zeeb 			     inp, NULL, so->so_cred,
741f2f877d3SBjoern A. Zeeb 			     &ifp, &error);
74207385abdSRobert Watson 	if (in6a == NULL) {
7438501a69cSRobert Watson 		INP_WUNLOCK(inp);
744603724d3SBjoern A. Zeeb 		INP_INFO_WUNLOCK(&V_ripcbinfo);
74582cd038dSYoshinobu Inoue 		return (error ? error : EADDRNOTAVAIL);
74607385abdSRobert Watson 	}
747a1f7e5f8SHajimu UMEMOTO 
748a1f7e5f8SHajimu UMEMOTO 	/* XXX: see above */
749a1f7e5f8SHajimu UMEMOTO 	if (ifp && scope_ambiguous &&
750a1f7e5f8SHajimu UMEMOTO 	    (error = in6_setscope(&addr->sin6_addr, ifp, NULL)) != 0) {
7518501a69cSRobert Watson 		INP_WUNLOCK(inp);
752603724d3SBjoern A. Zeeb 		INP_INFO_WUNLOCK(&V_ripcbinfo);
753a1f7e5f8SHajimu UMEMOTO 		return (error);
754a1f7e5f8SHajimu UMEMOTO 	}
75582cd038dSYoshinobu Inoue 	inp->in6p_faddr = addr->sin6_addr;
756a1f7e5f8SHajimu UMEMOTO 	inp->in6p_laddr = *in6a;
75782cd038dSYoshinobu Inoue 	soisconnected(so);
7588501a69cSRobert Watson 	INP_WUNLOCK(inp);
759603724d3SBjoern A. Zeeb 	INP_INFO_WUNLOCK(&V_ripcbinfo);
7600ae76120SRobert Watson 	return (0);
76182cd038dSYoshinobu Inoue }
76282cd038dSYoshinobu Inoue 
76382cd038dSYoshinobu Inoue static int
76482cd038dSYoshinobu Inoue rip6_shutdown(struct socket *so)
76582cd038dSYoshinobu Inoue {
76607385abdSRobert Watson 	struct inpcb *inp;
76707385abdSRobert Watson 
76807385abdSRobert Watson 	inp = sotoinpcb(so);
76914ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_shutdown: inp == NULL"));
7700ae76120SRobert Watson 
7718501a69cSRobert Watson 	INP_WLOCK(inp);
77282cd038dSYoshinobu Inoue 	socantsendmore(so);
7738501a69cSRobert Watson 	INP_WUNLOCK(inp);
7740ae76120SRobert Watson 	return (0);
77582cd038dSYoshinobu Inoue }
77682cd038dSYoshinobu Inoue 
77782cd038dSYoshinobu Inoue static int
77882cd038dSYoshinobu Inoue rip6_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *nam,
779b40ce416SJulian Elischer     struct mbuf *control, struct thread *td)
78082cd038dSYoshinobu Inoue {
7810ae76120SRobert Watson 	struct inpcb *inp;
78282cd038dSYoshinobu Inoue 	struct sockaddr_in6 tmp;
78382cd038dSYoshinobu Inoue 	struct sockaddr_in6 *dst;
78407385abdSRobert Watson 	int ret;
78582cd038dSYoshinobu Inoue 
7860ae76120SRobert Watson 	inp = sotoinpcb(so);
78714ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_send: inp == NULL"));
7880ae76120SRobert Watson 
7890ae76120SRobert Watson 	/* Always copy sockaddr to avoid overwrites. */
79007385abdSRobert Watson 	/* Unlocked read. */
79182cd038dSYoshinobu Inoue 	if (so->so_state & SS_ISCONNECTED) {
79282cd038dSYoshinobu Inoue 		if (nam) {
79382cd038dSYoshinobu Inoue 			m_freem(m);
7940ae76120SRobert Watson 			return (EISCONN);
79582cd038dSYoshinobu Inoue 		}
79682cd038dSYoshinobu Inoue 		/* XXX */
79782cd038dSYoshinobu Inoue 		bzero(&tmp, sizeof(tmp));
79882cd038dSYoshinobu Inoue 		tmp.sin6_family = AF_INET6;
79982cd038dSYoshinobu Inoue 		tmp.sin6_len = sizeof(struct sockaddr_in6);
8002209e8f1SRobert Watson 		INP_RLOCK(inp);
80182cd038dSYoshinobu Inoue 		bcopy(&inp->in6p_faddr, &tmp.sin6_addr,
80282cd038dSYoshinobu Inoue 		    sizeof(struct in6_addr));
8032209e8f1SRobert Watson 		INP_RUNLOCK(inp);
80482cd038dSYoshinobu Inoue 		dst = &tmp;
80582cd038dSYoshinobu Inoue 	} else {
80682cd038dSYoshinobu Inoue 		if (nam == NULL) {
80782cd038dSYoshinobu Inoue 			m_freem(m);
8080ae76120SRobert Watson 			return (ENOTCONN);
80982cd038dSYoshinobu Inoue 		}
810a1f7e5f8SHajimu UMEMOTO 		if (nam->sa_len != sizeof(struct sockaddr_in6)) {
811a1f7e5f8SHajimu UMEMOTO 			m_freem(m);
812a1f7e5f8SHajimu UMEMOTO 			return (EINVAL);
813a1f7e5f8SHajimu UMEMOTO 		}
814686cdd19SJun-ichiro itojun Hagino 		tmp = *(struct sockaddr_in6 *)nam;
815686cdd19SJun-ichiro itojun Hagino 		dst = &tmp;
816a1f7e5f8SHajimu UMEMOTO 
817a1f7e5f8SHajimu UMEMOTO 		if (dst->sin6_family == AF_UNSPEC) {
818a1f7e5f8SHajimu UMEMOTO 			/*
819a1f7e5f8SHajimu UMEMOTO 			 * XXX: we allow this case for backward
820a1f7e5f8SHajimu UMEMOTO 			 * compatibility to buggy applications that
821a1f7e5f8SHajimu UMEMOTO 			 * rely on old (and wrong) kernel behavior.
822a1f7e5f8SHajimu UMEMOTO 			 */
823a1f7e5f8SHajimu UMEMOTO 			log(LOG_INFO, "rip6 SEND: address family is "
824a1f7e5f8SHajimu UMEMOTO 			    "unspec. Assume AF_INET6\n");
825a1f7e5f8SHajimu UMEMOTO 			dst->sin6_family = AF_INET6;
826a1f7e5f8SHajimu UMEMOTO 		} else if (dst->sin6_family != AF_INET6) {
827a1f7e5f8SHajimu UMEMOTO 			m_freem(m);
828a1f7e5f8SHajimu UMEMOTO 			return(EAFNOSUPPORT);
82982cd038dSYoshinobu Inoue 		}
830686cdd19SJun-ichiro itojun Hagino 	}
83107385abdSRobert Watson 	ret = rip6_output(m, so, dst, control);
83207385abdSRobert Watson 	return (ret);
83382cd038dSYoshinobu Inoue }
83482cd038dSYoshinobu Inoue 
83582cd038dSYoshinobu Inoue struct pr_usrreqs rip6_usrreqs = {
836756d52a1SPoul-Henning Kamp 	.pru_abort =		rip6_abort,
837756d52a1SPoul-Henning Kamp 	.pru_attach =		rip6_attach,
838756d52a1SPoul-Henning Kamp 	.pru_bind =		rip6_bind,
839756d52a1SPoul-Henning Kamp 	.pru_connect =		rip6_connect,
840756d52a1SPoul-Henning Kamp 	.pru_control =		in6_control,
841756d52a1SPoul-Henning Kamp 	.pru_detach =		rip6_detach,
842756d52a1SPoul-Henning Kamp 	.pru_disconnect =	rip6_disconnect,
84354d642bbSRobert Watson 	.pru_peeraddr =		in6_getpeeraddr,
844756d52a1SPoul-Henning Kamp 	.pru_send =		rip6_send,
845756d52a1SPoul-Henning Kamp 	.pru_shutdown =		rip6_shutdown,
84654d642bbSRobert Watson 	.pru_sockaddr =		in6_getsockaddr,
847a152f8a3SRobert Watson 	.pru_close =		rip6_close,
84882cd038dSYoshinobu Inoue };
849