xref: /freebsd/sys/netinet6/raw_ip6.c (revision f161d294b92732df6254a89f393ab24999e122bf)
1caf43b02SWarner Losh /*-
251369649SPedro F. Giffuni  * SPDX-License-Identifier: BSD-3-Clause
351369649SPedro F. Giffuni  *
482cd038dSYoshinobu Inoue  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
582cd038dSYoshinobu Inoue  * All rights reserved.
682cd038dSYoshinobu Inoue  *
782cd038dSYoshinobu Inoue  * Redistribution and use in source and binary forms, with or without
882cd038dSYoshinobu Inoue  * modification, are permitted provided that the following conditions
982cd038dSYoshinobu Inoue  * are met:
1082cd038dSYoshinobu Inoue  * 1. Redistributions of source code must retain the above copyright
1182cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer.
1282cd038dSYoshinobu Inoue  * 2. Redistributions in binary form must reproduce the above copyright
1382cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer in the
1482cd038dSYoshinobu Inoue  *    documentation and/or other materials provided with the distribution.
1582cd038dSYoshinobu Inoue  * 3. Neither the name of the project nor the names of its contributors
1682cd038dSYoshinobu Inoue  *    may be used to endorse or promote products derived from this software
1782cd038dSYoshinobu Inoue  *    without specific prior written permission.
1882cd038dSYoshinobu Inoue  *
1982cd038dSYoshinobu Inoue  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
2082cd038dSYoshinobu Inoue  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
2182cd038dSYoshinobu Inoue  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
2282cd038dSYoshinobu Inoue  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
2382cd038dSYoshinobu Inoue  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
2482cd038dSYoshinobu Inoue  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
2582cd038dSYoshinobu Inoue  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
2682cd038dSYoshinobu Inoue  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
2782cd038dSYoshinobu Inoue  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
2882cd038dSYoshinobu Inoue  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
2982cd038dSYoshinobu Inoue  * SUCH DAMAGE.
3082cd038dSYoshinobu Inoue  */
3182cd038dSYoshinobu Inoue 
32caf43b02SWarner Losh /*-
3382cd038dSYoshinobu Inoue  * Copyright (c) 1982, 1986, 1988, 1993
340ae76120SRobert Watson  *	The Regents of the University of California.
350ae76120SRobert Watson  * All rights reserved.
3682cd038dSYoshinobu Inoue  *
3782cd038dSYoshinobu Inoue  * Redistribution and use in source and binary forms, with or without
3882cd038dSYoshinobu Inoue  * modification, are permitted provided that the following conditions
3982cd038dSYoshinobu Inoue  * are met:
4082cd038dSYoshinobu Inoue  * 1. Redistributions of source code must retain the above copyright
4182cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer.
4282cd038dSYoshinobu Inoue  * 2. Redistributions in binary form must reproduce the above copyright
4382cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer in the
4482cd038dSYoshinobu Inoue  *    documentation and/or other materials provided with the distribution.
45fbbd9655SWarner Losh  * 3. Neither the name of the University nor the names of its contributors
4682cd038dSYoshinobu Inoue  *    may be used to endorse or promote products derived from this software
4782cd038dSYoshinobu Inoue  *    without specific prior written permission.
4882cd038dSYoshinobu Inoue  *
4982cd038dSYoshinobu Inoue  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
5082cd038dSYoshinobu Inoue  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
5182cd038dSYoshinobu Inoue  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
5282cd038dSYoshinobu Inoue  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
5382cd038dSYoshinobu Inoue  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
5482cd038dSYoshinobu Inoue  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
5582cd038dSYoshinobu Inoue  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
5682cd038dSYoshinobu Inoue  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
5782cd038dSYoshinobu Inoue  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
5882cd038dSYoshinobu Inoue  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
5982cd038dSYoshinobu Inoue  * SUCH DAMAGE.
6082cd038dSYoshinobu Inoue  *
6182cd038dSYoshinobu Inoue  *	@(#)raw_ip.c	8.2 (Berkeley) 1/4/94
6282cd038dSYoshinobu Inoue  */
6382cd038dSYoshinobu Inoue 
64b48287a3SDavid E. O'Brien #include <sys/cdefs.h>
65b48287a3SDavid E. O'Brien __FBSDID("$FreeBSD$");
66b48287a3SDavid E. O'Brien 
676a800098SYoshinobu Inoue #include "opt_ipsec.h"
6833841545SHajimu UMEMOTO #include "opt_inet6.h"
690c325f53SAlexander V. Chernikov #include "opt_route.h"
706a800098SYoshinobu Inoue 
7182cd038dSYoshinobu Inoue #include <sys/param.h>
7282cd038dSYoshinobu Inoue #include <sys/errno.h>
73413628a7SBjoern A. Zeeb #include <sys/jail.h>
74a786f679SAndrey V. Elsukov #include <sys/kernel.h>
75960ed29cSSeigo Tanimura #include <sys/lock.h>
76960ed29cSSeigo Tanimura #include <sys/malloc.h>
77960ed29cSSeigo Tanimura #include <sys/mbuf.h>
78c2259ba4SRobert Watson #include <sys/priv.h>
79960ed29cSSeigo Tanimura #include <sys/proc.h>
80960ed29cSSeigo Tanimura #include <sys/protosw.h>
81960ed29cSSeigo Tanimura #include <sys/signalvar.h>
82960ed29cSSeigo Tanimura #include <sys/socket.h>
83960ed29cSSeigo Tanimura #include <sys/socketvar.h>
84960ed29cSSeigo Tanimura #include <sys/sx.h>
85a1f7e5f8SHajimu UMEMOTO #include <sys/syslog.h>
8682cd038dSYoshinobu Inoue 
8782cd038dSYoshinobu Inoue #include <net/if.h>
8876039bc8SGleb Smirnoff #include <net/if_var.h>
8982cd038dSYoshinobu Inoue #include <net/if_types.h>
90960ed29cSSeigo Tanimura #include <net/route.h>
914b79449eSBjoern A. Zeeb #include <net/vnet.h>
9282cd038dSYoshinobu Inoue 
9382cd038dSYoshinobu Inoue #include <netinet/in.h>
9482cd038dSYoshinobu Inoue #include <netinet/in_var.h>
9582cd038dSYoshinobu Inoue #include <netinet/in_systm.h>
9682cd038dSYoshinobu Inoue #include <netinet/in_pcb.h>
974b79449eSBjoern A. Zeeb 
984b79449eSBjoern A. Zeeb #include <netinet/icmp6.h>
99960ed29cSSeigo Tanimura #include <netinet/ip6.h>
1001db8d1f8SAna Kukec #include <netinet/ip_var.h>
101686cdd19SJun-ichiro itojun Hagino #include <netinet6/ip6protosw.h>
102960ed29cSSeigo Tanimura #include <netinet6/ip6_mroute.h>
103960ed29cSSeigo Tanimura #include <netinet6/in6_pcb.h>
104960ed29cSSeigo Tanimura #include <netinet6/ip6_var.h>
105960ed29cSSeigo Tanimura #include <netinet6/nd6.h>
106960ed29cSSeigo Tanimura #include <netinet6/raw_ip6.h>
1070c325f53SAlexander V. Chernikov #include <netinet6/in6_fib.h>
108686cdd19SJun-ichiro itojun Hagino #include <netinet6/scope6_var.h>
1091db8d1f8SAna Kukec #include <netinet6/send.h>
11082cd038dSYoshinobu Inoue 
111fcf59617SAndrey V. Elsukov #include <netipsec/ipsec_support.h>
112b9234fafSSam Leffler 
11382cd038dSYoshinobu Inoue #include <machine/stdarg.h>
11482cd038dSYoshinobu Inoue 
11582cd038dSYoshinobu Inoue #define	satosin6(sa)	((struct sockaddr_in6 *)(sa))
11682cd038dSYoshinobu Inoue #define	ifatoia6(ifa)	((struct in6_ifaddr *)(ifa))
11782cd038dSYoshinobu Inoue 
11882cd038dSYoshinobu Inoue /*
11982cd038dSYoshinobu Inoue  * Raw interface to IP6 protocol.
12082cd038dSYoshinobu Inoue  */
12182cd038dSYoshinobu Inoue 
122eddfbb76SRobert Watson VNET_DECLARE(struct inpcbhead, ripcb);
123eddfbb76SRobert Watson VNET_DECLARE(struct inpcbinfo, ripcbinfo);
1241e77c105SRobert Watson #define	V_ripcb				VNET(ripcb)
1251e77c105SRobert Watson #define	V_ripcbinfo			VNET(ripcbinfo)
126eddfbb76SRobert Watson 
12797021c24SMarko Zec extern u_long	rip_sendspace;
12897021c24SMarko Zec extern u_long	rip_recvspace;
12997021c24SMarko Zec 
130a786f679SAndrey V. Elsukov VNET_PCPUSTAT_DEFINE(struct rip6stat, rip6stat);
131a786f679SAndrey V. Elsukov VNET_PCPUSTAT_SYSINIT(rip6stat);
132a786f679SAndrey V. Elsukov 
133a786f679SAndrey V. Elsukov #ifdef VIMAGE
134a786f679SAndrey V. Elsukov VNET_PCPUSTAT_SYSUNINIT(rip6stat);
135a786f679SAndrey V. Elsukov #endif /* VIMAGE */
13682cea7e6SBjoern A. Zeeb 
13782cd038dSYoshinobu Inoue /*
13833cde130SBruce M Simpson  * Hooks for multicast routing. They all default to NULL, so leave them not
13933cde130SBruce M Simpson  * initialized and rely on BSS being set to 0.
1406be2e366SBruce M Simpson  */
14133cde130SBruce M Simpson 
14233cde130SBruce M Simpson /*
14333cde130SBruce M Simpson  * The socket used to communicate with the multicast routing daemon.
14433cde130SBruce M Simpson  */
145eddfbb76SRobert Watson VNET_DEFINE(struct socket *, ip6_mrouter);
14633cde130SBruce M Simpson 
14733cde130SBruce M Simpson /*
14833cde130SBruce M Simpson  * The various mrouter functions.
14933cde130SBruce M Simpson  */
1506be2e366SBruce M Simpson int (*ip6_mrouter_set)(struct socket *, struct sockopt *);
1516be2e366SBruce M Simpson int (*ip6_mrouter_get)(struct socket *, struct sockopt *);
1526be2e366SBruce M Simpson int (*ip6_mrouter_done)(void);
1536be2e366SBruce M Simpson int (*ip6_mforward)(struct ip6_hdr *, struct ifnet *, struct mbuf *);
154e40bae9aSRoman Divacky int (*mrt6_ioctl)(u_long, caddr_t);
1556be2e366SBruce M Simpson 
1566be2e366SBruce M Simpson /*
1570ae76120SRobert Watson  * Setup generic address and protocol structures for raw_input routine, then
1580ae76120SRobert Watson  * pass them along with mbuf chain.
15982cd038dSYoshinobu Inoue  */
16082cd038dSYoshinobu Inoue int
1611272577eSXin LI rip6_input(struct mbuf **mp, int *offp, int proto)
16282cd038dSYoshinobu Inoue {
16333cde130SBruce M Simpson 	struct ifnet *ifp;
16482cd038dSYoshinobu Inoue 	struct mbuf *m = *mp;
1653e85b721SEd Maste 	struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
1660ecd976eSBjoern A. Zeeb 	struct inpcb *inp;
167155d72c4SPedro F. Giffuni 	struct inpcb *last = NULL;
16833841545SHajimu UMEMOTO 	struct mbuf *opts = NULL;
169af12e09eSHajimu UMEMOTO 	struct sockaddr_in6 fromsa;
170f42347c3SGleb Smirnoff 
171f42347c3SGleb Smirnoff 	NET_EPOCH_ASSERT();
17282cd038dSYoshinobu Inoue 
173f1d7ebfeSAndrey V. Elsukov 	RIP6STAT_INC(rip6s_ipackets);
17433841545SHajimu UMEMOTO 
175dce33a45SErmal Luçi 	init_sin6(&fromsa, m, 0); /* general init */
17682cd038dSYoshinobu Inoue 
17733cde130SBruce M Simpson 	ifp = m->m_pkthdr.rcvif;
17833cde130SBruce M Simpson 
1790ecd976eSBjoern A. Zeeb 	CK_LIST_FOREACH(inp, &V_ripcb, inp_list) {
180413628a7SBjoern A. Zeeb 		/* XXX inp locking */
1810ecd976eSBjoern A. Zeeb 		if ((inp->inp_vflag & INP_IPV6) == 0)
18282cd038dSYoshinobu Inoue 			continue;
1830ecd976eSBjoern A. Zeeb 		if (inp->inp_ip_p &&
1840ecd976eSBjoern A. Zeeb 		    inp->inp_ip_p != proto)
185b11e21aeSAlexander Motin 			continue;
1860ecd976eSBjoern A. Zeeb 		if (!IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr) &&
1870ecd976eSBjoern A. Zeeb 		    !IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr, &ip6->ip6_dst))
188b11e21aeSAlexander Motin 			continue;
1890ecd976eSBjoern A. Zeeb 		if (!IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_faddr) &&
1900ecd976eSBjoern A. Zeeb 		    !IN6_ARE_ADDR_EQUAL(&inp->in6p_faddr, &ip6->ip6_src))
191b11e21aeSAlexander Motin 			continue;
1921ff6e7a8SBjoern A. Zeeb 		if (last != NULL) {
1931ff6e7a8SBjoern A. Zeeb 			struct mbuf *n = m_copym(m, 0, M_COPYALL, M_NOWAIT);
1941ff6e7a8SBjoern A. Zeeb 
1951ff6e7a8SBjoern A. Zeeb #if defined(IPSEC) || defined(IPSEC_SUPPORT)
1961ff6e7a8SBjoern A. Zeeb 			/*
1971ff6e7a8SBjoern A. Zeeb 			 * Check AH/ESP integrity.
1981ff6e7a8SBjoern A. Zeeb 			 */
1991ff6e7a8SBjoern A. Zeeb 			if (IPSEC_ENABLED(ipv6)) {
2001ff6e7a8SBjoern A. Zeeb 				if (n != NULL &&
2011ff6e7a8SBjoern A. Zeeb 				    IPSEC_CHECK_POLICY(ipv6, n, last) != 0) {
2021ff6e7a8SBjoern A. Zeeb 					m_freem(n);
2031ff6e7a8SBjoern A. Zeeb 					/* Do not inject data into pcb. */
2041ff6e7a8SBjoern A. Zeeb 					n = NULL;
2051ff6e7a8SBjoern A. Zeeb 				}
2061ff6e7a8SBjoern A. Zeeb 			}
2071ff6e7a8SBjoern A. Zeeb #endif /* IPSEC */
2081ff6e7a8SBjoern A. Zeeb 			if (n) {
2091ff6e7a8SBjoern A. Zeeb 				if (last->inp_flags & INP_CONTROLOPTS ||
2101ff6e7a8SBjoern A. Zeeb 				    last->inp_socket->so_options & SO_TIMESTAMP)
2111ff6e7a8SBjoern A. Zeeb 					ip6_savecontrol(last, n, &opts);
2121ff6e7a8SBjoern A. Zeeb 				/* strip intermediate headers */
2131ff6e7a8SBjoern A. Zeeb 				m_adj(n, *offp);
2141ff6e7a8SBjoern A. Zeeb 				if (sbappendaddr(&last->inp_socket->so_rcv,
2151ff6e7a8SBjoern A. Zeeb 						(struct sockaddr *)&fromsa,
2161ff6e7a8SBjoern A. Zeeb 						 n, opts) == 0) {
2171ff6e7a8SBjoern A. Zeeb 					m_freem(n);
2181ff6e7a8SBjoern A. Zeeb 					if (opts)
2191ff6e7a8SBjoern A. Zeeb 						m_freem(opts);
2201ff6e7a8SBjoern A. Zeeb 					RIP6STAT_INC(rip6s_fullsock);
2211ff6e7a8SBjoern A. Zeeb 				} else
2221ff6e7a8SBjoern A. Zeeb 					sorwakeup(last->inp_socket);
2231ff6e7a8SBjoern A. Zeeb 				opts = NULL;
2241ff6e7a8SBjoern A. Zeeb 			}
2251ff6e7a8SBjoern A. Zeeb 			INP_RUNLOCK(last);
2261ff6e7a8SBjoern A. Zeeb 			last = NULL;
2271ff6e7a8SBjoern A. Zeeb 		}
2280ecd976eSBjoern A. Zeeb 		INP_RLOCK(inp);
2290ecd976eSBjoern A. Zeeb 		if (__predict_false(inp->inp_flags2 & INP_FREED))
2301ff6e7a8SBjoern A. Zeeb 			goto skip_2;
2310ecd976eSBjoern A. Zeeb 		if (jailed_without_vnet(inp->inp_cred)) {
23233cde130SBruce M Simpson 			/*
23333cde130SBruce M Simpson 			 * Allow raw socket in jail to receive multicast;
23433cde130SBruce M Simpson 			 * assume process had PRIV_NETINET_RAW at attach,
23533cde130SBruce M Simpson 			 * and fall through into normal filter path if so.
23633cde130SBruce M Simpson 			 */
23733cde130SBruce M Simpson 			if (!IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) &&
2380ecd976eSBjoern A. Zeeb 			    prison_check_ip6(inp->inp_cred,
23933cde130SBruce M Simpson 			    &ip6->ip6_dst) != 0)
2401ff6e7a8SBjoern A. Zeeb 				goto skip_2;
24133cde130SBruce M Simpson 		}
2420ecd976eSBjoern A. Zeeb 		if (inp->in6p_cksum != -1) {
243f1d7ebfeSAndrey V. Elsukov 			RIP6STAT_INC(rip6s_isum);
2440ecd976eSBjoern A. Zeeb 			if (m->m_pkthdr.len - (*offp + inp->in6p_cksum) < 2 ||
24570a0f3dcSMichael Tuexen 			    in6_cksum(m, proto, *offp,
24682cd038dSYoshinobu Inoue 			    m->m_pkthdr.len - *offp)) {
247f1d7ebfeSAndrey V. Elsukov 				RIP6STAT_INC(rip6s_badsum);
248fb288770SMichael Tuexen 				/*
249fb288770SMichael Tuexen 				 * Drop the received message, don't send an
250fb288770SMichael Tuexen 				 * ICMP6 message. Set proto to IPPROTO_NONE
251fb288770SMichael Tuexen 				 * to achieve that.
252fb288770SMichael Tuexen 				 */
253fb288770SMichael Tuexen 				proto = IPPROTO_NONE;
2541ff6e7a8SBjoern A. Zeeb 				goto skip_2;
25582cd038dSYoshinobu Inoue 			}
25633841545SHajimu UMEMOTO 		}
25733cde130SBruce M Simpson 		/*
25833cde130SBruce M Simpson 		 * If this raw socket has multicast state, and we
25933cde130SBruce M Simpson 		 * have received a multicast, check if this socket
26033cde130SBruce M Simpson 		 * should receive it, as multicast filtering is now
26133cde130SBruce M Simpson 		 * the responsibility of the transport layer.
26233cde130SBruce M Simpson 		 */
2630ecd976eSBjoern A. Zeeb 		if (inp->in6p_moptions &&
26433cde130SBruce M Simpson 		    IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst)) {
2657ab5a5cdSBruce M Simpson 			/*
2667ab5a5cdSBruce M Simpson 			 * If the incoming datagram is for MLD, allow it
2677ab5a5cdSBruce M Simpson 			 * through unconditionally to the raw socket.
2687ab5a5cdSBruce M Simpson 			 *
2697ab5a5cdSBruce M Simpson 			 * Use the M_RTALERT_MLD flag to check for MLD
2707ab5a5cdSBruce M Simpson 			 * traffic without having to inspect the mbuf chain
2717ab5a5cdSBruce M Simpson 			 * more deeply, as all MLDv1/v2 host messages MUST
2727ab5a5cdSBruce M Simpson 			 * contain the Router Alert option.
2737ab5a5cdSBruce M Simpson 			 *
2747ab5a5cdSBruce M Simpson 			 * In the case of MLDv1, we may not have explicitly
2757ab5a5cdSBruce M Simpson 			 * joined the group, and may have set IFF_ALLMULTI
2767ab5a5cdSBruce M Simpson 			 * on the interface. im6o_mc_filter() may discard
2777ab5a5cdSBruce M Simpson 			 * control traffic we actually need to see.
2787ab5a5cdSBruce M Simpson 			 *
2797ab5a5cdSBruce M Simpson 			 * Userland multicast routing daemons should continue
2807ab5a5cdSBruce M Simpson 			 * filter the control traffic appropriately.
2817ab5a5cdSBruce M Simpson 			 */
28233cde130SBruce M Simpson 			int blocked;
28333cde130SBruce M Simpson 
2847ab5a5cdSBruce M Simpson 			blocked = MCAST_PASS;
2857ab5a5cdSBruce M Simpson 			if ((m->m_flags & M_RTALERT_MLD) == 0) {
2867ab5a5cdSBruce M Simpson 				struct sockaddr_in6 mcaddr;
2877ab5a5cdSBruce M Simpson 
28833cde130SBruce M Simpson 				bzero(&mcaddr, sizeof(struct sockaddr_in6));
28933cde130SBruce M Simpson 				mcaddr.sin6_len = sizeof(struct sockaddr_in6);
29033cde130SBruce M Simpson 				mcaddr.sin6_family = AF_INET6;
29133cde130SBruce M Simpson 				mcaddr.sin6_addr = ip6->ip6_dst;
29233cde130SBruce M Simpson 
2930ecd976eSBjoern A. Zeeb 				blocked = im6o_mc_filter(inp->in6p_moptions,
2947ab5a5cdSBruce M Simpson 				    ifp,
29533cde130SBruce M Simpson 				    (struct sockaddr *)&mcaddr,
29633cde130SBruce M Simpson 				    (struct sockaddr *)&fromsa);
2977ab5a5cdSBruce M Simpson 			}
29833cde130SBruce M Simpson 			if (blocked != MCAST_PASS) {
29933cde130SBruce M Simpson 				IP6STAT_INC(ip6s_notmember);
3001ff6e7a8SBjoern A. Zeeb 				goto skip_2;
30133cde130SBruce M Simpson 			}
30233cde130SBruce M Simpson 		}
3030ecd976eSBjoern A. Zeeb 		last = inp;
3041ff6e7a8SBjoern A. Zeeb 		continue;
3051ff6e7a8SBjoern A. Zeeb skip_2:
3060ecd976eSBjoern A. Zeeb 		INP_RUNLOCK(inp);
30782cd038dSYoshinobu Inoue 	}
308fcf59617SAndrey V. Elsukov #if defined(IPSEC) || defined(IPSEC_SUPPORT)
309da0f4099SHajimu UMEMOTO 	/*
310da0f4099SHajimu UMEMOTO 	 * Check AH/ESP integrity.
311da0f4099SHajimu UMEMOTO 	 */
312fcf59617SAndrey V. Elsukov 	if (IPSEC_ENABLED(ipv6) && last != NULL &&
313fcf59617SAndrey V. Elsukov 	    IPSEC_CHECK_POLICY(ipv6, m, last) != 0) {
314da0f4099SHajimu UMEMOTO 		m_freem(m);
3159cb8d207SAndrey V. Elsukov 		IP6STAT_DEC(ip6s_delivered);
3160ae76120SRobert Watson 		/* Do not inject data into pcb. */
3179ad11dd8SRobert Watson 		INP_RUNLOCK(last);
318b9234fafSSam Leffler 	} else
319b2630c29SGeorge V. Neville-Neil #endif /* IPSEC */
320aba53ef0SKip Macy 	if (last != NULL) {
32197590249SBjoern A. Zeeb 		if (last->inp_flags & INP_CONTROLOPTS ||
322fc384fa5SBjoern A. Zeeb 		    last->inp_socket->so_options & SO_TIMESTAMP)
32311de19f4SHajimu UMEMOTO 			ip6_savecontrol(last, m, &opts);
3240ae76120SRobert Watson 		/* Strip intermediate headers. */
32582cd038dSYoshinobu Inoue 		m_adj(m, *offp);
326fc384fa5SBjoern A. Zeeb 		if (sbappendaddr(&last->inp_socket->so_rcv,
327af12e09eSHajimu UMEMOTO 		    (struct sockaddr *)&fromsa, m, opts) == 0) {
32882cd038dSYoshinobu Inoue 			m_freem(m);
32982cd038dSYoshinobu Inoue 			if (opts)
33082cd038dSYoshinobu Inoue 				m_freem(opts);
331f1d7ebfeSAndrey V. Elsukov 			RIP6STAT_INC(rip6s_fullsock);
3324cc20ab1SSeigo Tanimura 		} else
333fc384fa5SBjoern A. Zeeb 			sorwakeup(last->inp_socket);
3349ad11dd8SRobert Watson 		INP_RUNLOCK(last);
33582cd038dSYoshinobu Inoue 	} else {
336f1d7ebfeSAndrey V. Elsukov 		RIP6STAT_INC(rip6s_nosock);
33733841545SHajimu UMEMOTO 		if (m->m_flags & M_MCAST)
338f1d7ebfeSAndrey V. Elsukov 			RIP6STAT_INC(rip6s_nosockmcast);
33982cd038dSYoshinobu Inoue 		if (proto == IPPROTO_NONE)
34082cd038dSYoshinobu Inoue 			m_freem(m);
34168e0e5a6SAndrey V. Elsukov 		else
34282cd038dSYoshinobu Inoue 			icmp6_error(m, ICMP6_PARAM_PROB,
34382cd038dSYoshinobu Inoue 			    ICMP6_PARAMPROB_NEXTHEADER,
34468e0e5a6SAndrey V. Elsukov 			    ip6_get_prevhdr(m, *offp));
3459cb8d207SAndrey V. Elsukov 		IP6STAT_DEC(ip6s_delivered);
34682cd038dSYoshinobu Inoue 	}
3470ae76120SRobert Watson 	return (IPPROTO_DONE);
34882cd038dSYoshinobu Inoue }
34982cd038dSYoshinobu Inoue 
350686cdd19SJun-ichiro itojun Hagino void
3511272577eSXin LI rip6_ctlinput(int cmd, struct sockaddr *sa, void *d)
352686cdd19SJun-ichiro itojun Hagino {
35333841545SHajimu UMEMOTO 	struct ip6ctlparam *ip6cp = NULL;
35433841545SHajimu UMEMOTO 	const struct sockaddr_in6 *sa6_src = NULL;
355efddf5c6SHajimu UMEMOTO 	void *cmdarg;
3569233d8f3SDavid E. O'Brien 	struct inpcb *(*notify)(struct inpcb *, int) = in6_rtchange;
357686cdd19SJun-ichiro itojun Hagino 
358686cdd19SJun-ichiro itojun Hagino 	if (sa->sa_family != AF_INET6 ||
359686cdd19SJun-ichiro itojun Hagino 	    sa->sa_len != sizeof(struct sockaddr_in6))
360686cdd19SJun-ichiro itojun Hagino 		return;
361686cdd19SJun-ichiro itojun Hagino 
362686cdd19SJun-ichiro itojun Hagino 	if ((unsigned)cmd >= PRC_NCMDS)
363686cdd19SJun-ichiro itojun Hagino 		return;
364686cdd19SJun-ichiro itojun Hagino 	if (PRC_IS_REDIRECT(cmd))
365686cdd19SJun-ichiro itojun Hagino 		notify = in6_rtchange, d = NULL;
366686cdd19SJun-ichiro itojun Hagino 	else if (cmd == PRC_HOSTDEAD)
367686cdd19SJun-ichiro itojun Hagino 		d = NULL;
368686cdd19SJun-ichiro itojun Hagino 	else if (inet6ctlerrmap[cmd] == 0)
369686cdd19SJun-ichiro itojun Hagino 		return;
370686cdd19SJun-ichiro itojun Hagino 
3710ae76120SRobert Watson 	/*
3720ae76120SRobert Watson 	 * If the parameter is from icmp6, decode it.
3730ae76120SRobert Watson 	 */
374686cdd19SJun-ichiro itojun Hagino 	if (d != NULL) {
37533841545SHajimu UMEMOTO 		ip6cp = (struct ip6ctlparam *)d;
376efddf5c6SHajimu UMEMOTO 		cmdarg = ip6cp->ip6c_cmdarg;
37733841545SHajimu UMEMOTO 		sa6_src = ip6cp->ip6c_src;
378686cdd19SJun-ichiro itojun Hagino 	} else {
379efddf5c6SHajimu UMEMOTO 		cmdarg = NULL;
38033841545SHajimu UMEMOTO 		sa6_src = &sa6_any;
381686cdd19SJun-ichiro itojun Hagino 	}
382686cdd19SJun-ichiro itojun Hagino 
383603724d3SBjoern A. Zeeb 	(void) in6_pcbnotify(&V_ripcbinfo, sa, 0,
3840ae76120SRobert Watson 	    (const struct sockaddr *)sa6_src, 0, cmd, cmdarg, notify);
385686cdd19SJun-ichiro itojun Hagino }
386686cdd19SJun-ichiro itojun Hagino 
38782cd038dSYoshinobu Inoue /*
3880ae76120SRobert Watson  * Generate IPv6 header and pass packet to ip6_output.  Tack on options user
3890ae76120SRobert Watson  * may have setup with control call.
39082cd038dSYoshinobu Inoue  */
39182cd038dSYoshinobu Inoue int
3928f5a8818SKevin Lo rip6_output(struct mbuf *m, struct socket *so, ...)
39382cd038dSYoshinobu Inoue {
394b9555453SGleb Smirnoff 	struct epoch_tracker et;
39507eb2995SHajimu UMEMOTO 	struct mbuf *control;
3961db8d1f8SAna Kukec 	struct m_tag *mtag;
39782cd038dSYoshinobu Inoue 	struct sockaddr_in6 *dstsock;
39882cd038dSYoshinobu Inoue 	struct ip6_hdr *ip6;
3990ecd976eSBjoern A. Zeeb 	struct inpcb *inp;
40082cd038dSYoshinobu Inoue 	u_int	plen = m->m_pkthdr.len;
40182cd038dSYoshinobu Inoue 	int error = 0;
402e07db7aaSHajimu UMEMOTO 	struct ip6_pktopts opt, *optp;
40382cd038dSYoshinobu Inoue 	struct ifnet *oifp = NULL;
40482cd038dSYoshinobu Inoue 	int type = 0, code = 0;		/* for ICMPv6 output statistics only */
405a1f7e5f8SHajimu UMEMOTO 	int scope_ambiguous = 0;
406388288b2SHajimu UMEMOTO 	int use_defzone = 0;
407601c0b8bSAlexander V. Chernikov 	int hlim = 0;
40888d166bfSBjoern A. Zeeb 	struct in6_addr in6a;
40982cd038dSYoshinobu Inoue 	va_list ap;
41082cd038dSYoshinobu Inoue 
4118f5a8818SKevin Lo 	va_start(ap, so);
41282cd038dSYoshinobu Inoue 	dstsock = va_arg(ap, struct sockaddr_in6 *);
41382cd038dSYoshinobu Inoue 	control = va_arg(ap, struct mbuf *);
41482cd038dSYoshinobu Inoue 	va_end(ap);
41582cd038dSYoshinobu Inoue 
4160ecd976eSBjoern A. Zeeb 	inp = sotoinpcb(so);
4170ecd976eSBjoern A. Zeeb 	INP_WLOCK(inp);
41882cd038dSYoshinobu Inoue 
41975bab8b8SKip Macy 	if (control != NULL) {
420d5e3406dSHajimu UMEMOTO 		if ((error = ip6_setpktopts(control, &opt,
4210ecd976eSBjoern A. Zeeb 		    inp->in6p_outputopts, so->so_cred,
42279ba3952SBjoern A. Zeeb 		    so->so_proto->pr_protocol)) != 0) {
42382cd038dSYoshinobu Inoue 			goto bad;
424f95d4633SHajimu UMEMOTO 		}
425e07db7aaSHajimu UMEMOTO 		optp = &opt;
426e07db7aaSHajimu UMEMOTO 	} else
4270ecd976eSBjoern A. Zeeb 		optp = inp->in6p_outputopts;
42882cd038dSYoshinobu Inoue 
42982cd038dSYoshinobu Inoue 	/*
430a1f7e5f8SHajimu UMEMOTO 	 * Check and convert scope zone ID into internal form.
4310ae76120SRobert Watson 	 *
432a1f7e5f8SHajimu UMEMOTO 	 * XXX: we may still need to determine the zone later.
433a1f7e5f8SHajimu UMEMOTO 	 */
434a1f7e5f8SHajimu UMEMOTO 	if (!(so->so_state & SS_ISCONNECTED)) {
435365ccde0SHajimu UMEMOTO 		if (!optp || !optp->ip6po_pktinfo ||
436365ccde0SHajimu UMEMOTO 		    !optp->ip6po_pktinfo->ipi6_ifindex)
437388288b2SHajimu UMEMOTO 			use_defzone = V_ip6_use_defzone;
438388288b2SHajimu UMEMOTO 		if (dstsock->sin6_scope_id == 0 && !use_defzone)
439a1f7e5f8SHajimu UMEMOTO 			scope_ambiguous = 1;
440388288b2SHajimu UMEMOTO 		if ((error = sa6_embedscope(dstsock, use_defzone)) != 0)
441a1f7e5f8SHajimu UMEMOTO 			goto bad;
442a1f7e5f8SHajimu UMEMOTO 	}
443a1f7e5f8SHajimu UMEMOTO 
444a1f7e5f8SHajimu UMEMOTO 	/*
4450ae76120SRobert Watson 	 * For an ICMPv6 packet, we should know its type and code to update
4460ae76120SRobert Watson 	 * statistics.
44782cd038dSYoshinobu Inoue 	 */
44882cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
44982cd038dSYoshinobu Inoue 		struct icmp6_hdr *icmp6;
45082cd038dSYoshinobu Inoue 		if (m->m_len < sizeof(struct icmp6_hdr) &&
45182cd038dSYoshinobu Inoue 		    (m = m_pullup(m, sizeof(struct icmp6_hdr))) == NULL) {
45282cd038dSYoshinobu Inoue 			error = ENOBUFS;
45382cd038dSYoshinobu Inoue 			goto bad;
45482cd038dSYoshinobu Inoue 		}
45582cd038dSYoshinobu Inoue 		icmp6 = mtod(m, struct icmp6_hdr *);
45682cd038dSYoshinobu Inoue 		type = icmp6->icmp6_type;
45782cd038dSYoshinobu Inoue 		code = icmp6->icmp6_code;
45882cd038dSYoshinobu Inoue 	}
45982cd038dSYoshinobu Inoue 
460eb1b1807SGleb Smirnoff 	M_PREPEND(m, sizeof(*ip6), M_NOWAIT);
4618a0c4da8SRobert Watson 	if (m == NULL) {
4628a0c4da8SRobert Watson 		error = ENOBUFS;
4638a0c4da8SRobert Watson 		goto bad;
4648a0c4da8SRobert Watson 	}
46582cd038dSYoshinobu Inoue 	ip6 = mtod(m, struct ip6_hdr *);
46682cd038dSYoshinobu Inoue 
4670c325f53SAlexander V. Chernikov #ifdef ROUTE_MPATH
4680c325f53SAlexander V. Chernikov 	if (CALC_FLOWID_OUTBOUND) {
4690c325f53SAlexander V. Chernikov 		uint32_t hash_type, hash_val;
4700c325f53SAlexander V. Chernikov 
4710c325f53SAlexander V. Chernikov 		hash_val = fib6_calc_software_hash(&inp->in6p_laddr,
4720c325f53SAlexander V. Chernikov 		    &dstsock->sin6_addr, 0, 0, so->so_proto->pr_protocol,
4730c325f53SAlexander V. Chernikov 		    &hash_type);
4740c325f53SAlexander V. Chernikov 		inp->inp_flowid = hash_val;
4750c325f53SAlexander V. Chernikov 		inp->inp_flowtype = hash_type;
4760c325f53SAlexander V. Chernikov 	}
4770c325f53SAlexander V. Chernikov #endif
47882cd038dSYoshinobu Inoue 	/*
47982cd038dSYoshinobu Inoue 	 * Source address selection.
48082cd038dSYoshinobu Inoue 	 */
481605284b8SAlexander V. Chernikov 	NET_EPOCH_ENTER(et);
4820ecd976eSBjoern A. Zeeb 	error = in6_selectsrc_socket(dstsock, optp, inp, so->so_cred,
483601c0b8bSAlexander V. Chernikov 	    scope_ambiguous, &in6a, &hlim);
484605284b8SAlexander V. Chernikov 	NET_EPOCH_EXIT(et);
485601c0b8bSAlexander V. Chernikov 
48688d166bfSBjoern A. Zeeb 	if (error)
48782cd038dSYoshinobu Inoue 		goto bad;
4880ecd976eSBjoern A. Zeeb 	error = prison_check_ip6(inp->inp_cred, &in6a);
489b89e82ddSJamie Gritton 	if (error != 0)
490413628a7SBjoern A. Zeeb 		goto bad;
49188d166bfSBjoern A. Zeeb 	ip6->ip6_src = in6a;
492a1f7e5f8SHajimu UMEMOTO 
493a1f7e5f8SHajimu UMEMOTO 	ip6->ip6_dst = dstsock->sin6_addr;
494a1f7e5f8SHajimu UMEMOTO 
4950ae76120SRobert Watson 	/*
4960ae76120SRobert Watson 	 * Fill in the rest of the IPv6 header fields.
4970ae76120SRobert Watson 	 */
4986a800098SYoshinobu Inoue 	ip6->ip6_flow = (ip6->ip6_flow & ~IPV6_FLOWINFO_MASK) |
4990ecd976eSBjoern A. Zeeb 	    (inp->inp_flow & IPV6_FLOWINFO_MASK);
5006a800098SYoshinobu Inoue 	ip6->ip6_vfc = (ip6->ip6_vfc & ~IPV6_VERSION_MASK) |
5016a800098SYoshinobu Inoue 	    (IPV6_VERSION & IPV6_VERSION_MASK);
5020ae76120SRobert Watson 
5030ae76120SRobert Watson 	/*
5040ae76120SRobert Watson 	 * ip6_plen will be filled in ip6_output, so not fill it here.
5050ae76120SRobert Watson 	 */
5060ecd976eSBjoern A. Zeeb 	ip6->ip6_nxt = inp->inp_ip_p;
507601c0b8bSAlexander V. Chernikov 	ip6->ip6_hlim = hlim;
50882cd038dSYoshinobu Inoue 
50982cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6 ||
5100ecd976eSBjoern A. Zeeb 	    inp->in6p_cksum != -1) {
51182cd038dSYoshinobu Inoue 		struct mbuf *n;
51282cd038dSYoshinobu Inoue 		int off;
51382cd038dSYoshinobu Inoue 		u_int16_t *p;
51482cd038dSYoshinobu Inoue 
5150ae76120SRobert Watson 		/* Compute checksum. */
51682cd038dSYoshinobu Inoue 		if (so->so_proto->pr_protocol == IPPROTO_ICMPV6)
51782cd038dSYoshinobu Inoue 			off = offsetof(struct icmp6_hdr, icmp6_cksum);
51882cd038dSYoshinobu Inoue 		else
5190ecd976eSBjoern A. Zeeb 			off = inp->in6p_cksum;
520ae7c65b1SMichael Tuexen 		if (plen < off + 2) {
52182cd038dSYoshinobu Inoue 			error = EINVAL;
52282cd038dSYoshinobu Inoue 			goto bad;
52382cd038dSYoshinobu Inoue 		}
52482cd038dSYoshinobu Inoue 		off += sizeof(struct ip6_hdr);
52582cd038dSYoshinobu Inoue 
52682cd038dSYoshinobu Inoue 		n = m;
52782cd038dSYoshinobu Inoue 		while (n && n->m_len <= off) {
52882cd038dSYoshinobu Inoue 			off -= n->m_len;
52982cd038dSYoshinobu Inoue 			n = n->m_next;
53082cd038dSYoshinobu Inoue 		}
53182cd038dSYoshinobu Inoue 		if (!n)
53282cd038dSYoshinobu Inoue 			goto bad;
53382cd038dSYoshinobu Inoue 		p = (u_int16_t *)(mtod(n, caddr_t) + off);
53482cd038dSYoshinobu Inoue 		*p = 0;
53582cd038dSYoshinobu Inoue 		*p = in6_cksum(m, ip6->ip6_nxt, sizeof(*ip6), plen);
53682cd038dSYoshinobu Inoue 	}
53782cd038dSYoshinobu Inoue 
5381db8d1f8SAna Kukec 	/*
5391db8d1f8SAna Kukec 	 * Send RA/RS messages to user land for protection, before sending
5401db8d1f8SAna Kukec 	 * them to rtadvd/rtsol.
5411db8d1f8SAna Kukec 	 */
5421db8d1f8SAna Kukec 	if ((send_sendso_input_hook != NULL) &&
5431db8d1f8SAna Kukec 	    so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
5441db8d1f8SAna Kukec 		switch (type) {
5451db8d1f8SAna Kukec 		case ND_ROUTER_ADVERT:
5461db8d1f8SAna Kukec 		case ND_ROUTER_SOLICIT:
5471db8d1f8SAna Kukec 			mtag = m_tag_get(PACKET_TAG_ND_OUTGOING,
5481db8d1f8SAna Kukec 				sizeof(unsigned short), M_NOWAIT);
5491db8d1f8SAna Kukec 			if (mtag == NULL)
5501db8d1f8SAna Kukec 				goto bad;
5511db8d1f8SAna Kukec 			m_tag_prepend(m, mtag);
5521db8d1f8SAna Kukec 		}
5531db8d1f8SAna Kukec 	}
5541db8d1f8SAna Kukec 
555b9555453SGleb Smirnoff 	NET_EPOCH_ENTER(et);
5560ecd976eSBjoern A. Zeeb 	error = ip6_output(m, optp, NULL, 0, inp->in6p_moptions, &oifp, inp);
557b9555453SGleb Smirnoff 	NET_EPOCH_EXIT(et);
55882cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
55982cd038dSYoshinobu Inoue 		if (oifp)
56082cd038dSYoshinobu Inoue 			icmp6_ifoutstat_inc(oifp, type, code);
561e27b0c87SRobert Watson 		ICMP6STAT_INC(icp6s_outhist[type]);
56233841545SHajimu UMEMOTO 	} else
563f1d7ebfeSAndrey V. Elsukov 		RIP6STAT_INC(rip6s_opackets);
56482cd038dSYoshinobu Inoue 
56582cd038dSYoshinobu Inoue 	goto freectl;
56682cd038dSYoshinobu Inoue 
56782cd038dSYoshinobu Inoue  bad:
56882cd038dSYoshinobu Inoue 	if (m)
56982cd038dSYoshinobu Inoue 		m_freem(m);
57082cd038dSYoshinobu Inoue 
57182cd038dSYoshinobu Inoue  freectl:
57275bab8b8SKip Macy 	if (control != NULL) {
573e07db7aaSHajimu UMEMOTO 		ip6_clearpktopts(&opt, -1);
57482cd038dSYoshinobu Inoue 		m_freem(control);
57533841545SHajimu UMEMOTO 	}
5760ecd976eSBjoern A. Zeeb 	INP_WUNLOCK(inp);
57782cd038dSYoshinobu Inoue 	return (error);
57882cd038dSYoshinobu Inoue }
57982cd038dSYoshinobu Inoue 
58082cd038dSYoshinobu Inoue /*
58182cd038dSYoshinobu Inoue  * Raw IPv6 socket option processing.
58282cd038dSYoshinobu Inoue  */
58382cd038dSYoshinobu Inoue int
5841272577eSXin LI rip6_ctloutput(struct socket *so, struct sockopt *sopt)
58582cd038dSYoshinobu Inoue {
586ee799639SBjoern A. Zeeb 	struct inpcb *inp;
58782cd038dSYoshinobu Inoue 	int error;
58882cd038dSYoshinobu Inoue 
58982cd038dSYoshinobu Inoue 	if (sopt->sopt_level == IPPROTO_ICMPV6)
59082cd038dSYoshinobu Inoue 		/*
59182cd038dSYoshinobu Inoue 		 * XXX: is it better to call icmp6_ctloutput() directly
59282cd038dSYoshinobu Inoue 		 * from protosw?
59382cd038dSYoshinobu Inoue 		 */
59482cd038dSYoshinobu Inoue 		return (icmp6_ctloutput(so, sopt));
595ee799639SBjoern A. Zeeb 	else if (sopt->sopt_level != IPPROTO_IPV6) {
596ee799639SBjoern A. Zeeb 		if (sopt->sopt_level == SOL_SOCKET &&
597ee799639SBjoern A. Zeeb 		    sopt->sopt_name == SO_SETFIB) {
598ee799639SBjoern A. Zeeb 			inp = sotoinpcb(so);
599ee799639SBjoern A. Zeeb 			INP_WLOCK(inp);
600ee799639SBjoern A. Zeeb 			inp->inp_inc.inc_fibnum = so->so_fibnum;
601ee799639SBjoern A. Zeeb 			INP_WUNLOCK(inp);
602ee799639SBjoern A. Zeeb 			return (0);
603ee799639SBjoern A. Zeeb 		}
60482cd038dSYoshinobu Inoue 		return (EINVAL);
605ee799639SBjoern A. Zeeb 	}
60682cd038dSYoshinobu Inoue 
60782cd038dSYoshinobu Inoue 	error = 0;
60882cd038dSYoshinobu Inoue 
60982cd038dSYoshinobu Inoue 	switch (sopt->sopt_dir) {
61082cd038dSYoshinobu Inoue 	case SOPT_GET:
61182cd038dSYoshinobu Inoue 		switch (sopt->sopt_name) {
61291ec0a1eSYoshinobu Inoue 		case MRT6_INIT:
61391ec0a1eSYoshinobu Inoue 		case MRT6_DONE:
61491ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MIF:
61591ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MIF:
61691ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MFC:
61791ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MFC:
61891ec0a1eSYoshinobu Inoue 		case MRT6_PIM:
6196be2e366SBruce M Simpson 			error = ip6_mrouter_get ?  ip6_mrouter_get(so, sopt) :
6206be2e366SBruce M Simpson 			    EOPNOTSUPP;
62191ec0a1eSYoshinobu Inoue 			break;
62202b9a206SHajimu UMEMOTO 		case IPV6_CHECKSUM:
62302b9a206SHajimu UMEMOTO 			error = ip6_raw_ctloutput(so, sopt);
62402b9a206SHajimu UMEMOTO 			break;
62582cd038dSYoshinobu Inoue 		default:
62682cd038dSYoshinobu Inoue 			error = ip6_ctloutput(so, sopt);
62782cd038dSYoshinobu Inoue 			break;
62882cd038dSYoshinobu Inoue 		}
62982cd038dSYoshinobu Inoue 		break;
63082cd038dSYoshinobu Inoue 
63182cd038dSYoshinobu Inoue 	case SOPT_SET:
63282cd038dSYoshinobu Inoue 		switch (sopt->sopt_name) {
63391ec0a1eSYoshinobu Inoue 		case MRT6_INIT:
63491ec0a1eSYoshinobu Inoue 		case MRT6_DONE:
63591ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MIF:
63691ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MIF:
63791ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MFC:
63891ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MFC:
63991ec0a1eSYoshinobu Inoue 		case MRT6_PIM:
6406be2e366SBruce M Simpson 			error = ip6_mrouter_set ?  ip6_mrouter_set(so, sopt) :
6416be2e366SBruce M Simpson 			    EOPNOTSUPP;
64291ec0a1eSYoshinobu Inoue 			break;
64302b9a206SHajimu UMEMOTO 		case IPV6_CHECKSUM:
64402b9a206SHajimu UMEMOTO 			error = ip6_raw_ctloutput(so, sopt);
64502b9a206SHajimu UMEMOTO 			break;
64682cd038dSYoshinobu Inoue 		default:
64782cd038dSYoshinobu Inoue 			error = ip6_ctloutput(so, sopt);
64882cd038dSYoshinobu Inoue 			break;
64982cd038dSYoshinobu Inoue 		}
65082cd038dSYoshinobu Inoue 		break;
65182cd038dSYoshinobu Inoue 	}
65282cd038dSYoshinobu Inoue 
65382cd038dSYoshinobu Inoue 	return (error);
65482cd038dSYoshinobu Inoue }
65582cd038dSYoshinobu Inoue 
65682cd038dSYoshinobu Inoue static int
657b40ce416SJulian Elischer rip6_attach(struct socket *so, int proto, struct thread *td)
65882cd038dSYoshinobu Inoue {
65982cd038dSYoshinobu Inoue 	struct inpcb *inp;
6608a9d54dfSSam Leffler 	struct icmp6_filter *filter;
661ff7425ceSRobert Watson 	int error;
66282cd038dSYoshinobu Inoue 
66382cd038dSYoshinobu Inoue 	inp = sotoinpcb(so);
66414ba8addSRobert Watson 	KASSERT(inp == NULL, ("rip6_attach: inp != NULL"));
6650ae76120SRobert Watson 
66679ba3952SBjoern A. Zeeb 	error = priv_check(td, PRIV_NETINET_RAW);
66779ba3952SBjoern A. Zeeb 	if (error)
6680ae76120SRobert Watson 		return (error);
66982cd038dSYoshinobu Inoue 	error = soreserve(so, rip_sendspace, rip_recvspace);
67014ba8addSRobert Watson 	if (error)
6710ae76120SRobert Watson 		return (error);
6721ede983cSDag-Erling Smørgrav 	filter = malloc(sizeof(struct icmp6_filter), M_PCB, M_NOWAIT);
67314ba8addSRobert Watson 	if (filter == NULL)
6740ae76120SRobert Watson 		return (ENOMEM);
675603724d3SBjoern A. Zeeb 	INP_INFO_WLOCK(&V_ripcbinfo);
676603724d3SBjoern A. Zeeb 	error = in_pcballoc(so, &V_ripcbinfo);
67707385abdSRobert Watson 	if (error) {
678603724d3SBjoern A. Zeeb 		INP_INFO_WUNLOCK(&V_ripcbinfo);
6791ede983cSDag-Erling Smørgrav 		free(filter, M_PCB);
6800ae76120SRobert Watson 		return (error);
68107385abdSRobert Watson 	}
68282cd038dSYoshinobu Inoue 	inp = (struct inpcb *)so->so_pcb;
683603724d3SBjoern A. Zeeb 	INP_INFO_WUNLOCK(&V_ripcbinfo);
68482cd038dSYoshinobu Inoue 	inp->inp_vflag |= INP_IPV6;
685fc384fa5SBjoern A. Zeeb 	inp->inp_ip_p = (long)proto;
68682cd038dSYoshinobu Inoue 	inp->in6p_hops = -1;	/* use kernel default */
68782cd038dSYoshinobu Inoue 	inp->in6p_cksum = -1;
6888a9d54dfSSam Leffler 	inp->in6p_icmp6filt = filter;
68982cd038dSYoshinobu Inoue 	ICMP6_FILTER_SETPASSALL(inp->in6p_icmp6filt);
6908501a69cSRobert Watson 	INP_WUNLOCK(inp);
6910ae76120SRobert Watson 	return (0);
69282cd038dSYoshinobu Inoue }
69382cd038dSYoshinobu Inoue 
694bc725eafSRobert Watson static void
69582cd038dSYoshinobu Inoue rip6_detach(struct socket *so)
69682cd038dSYoshinobu Inoue {
69782cd038dSYoshinobu Inoue 	struct inpcb *inp;
69882cd038dSYoshinobu Inoue 
69982cd038dSYoshinobu Inoue 	inp = sotoinpcb(so);
70014ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_detach: inp == NULL"));
701a152f8a3SRobert Watson 
70233cde130SBruce M Simpson 	if (so == V_ip6_mrouter && ip6_mrouter_done)
703e7e3ecb6SYoshinobu Inoue 		ip6_mrouter_done();
7046be2e366SBruce M Simpson 	/* xxx: RSVP */
705603724d3SBjoern A. Zeeb 	INP_INFO_WLOCK(&V_ripcbinfo);
7068501a69cSRobert Watson 	INP_WLOCK(inp);
7071ede983cSDag-Erling Smørgrav 	free(inp->in6p_icmp6filt, M_PCB);
7080206cdb8SBjoern A. Zeeb 	in_pcbdetach(inp);
7096aee2fc5SBjoern A. Zeeb 	in_pcbfree(inp);
710603724d3SBjoern A. Zeeb 	INP_INFO_WUNLOCK(&V_ripcbinfo);
71182cd038dSYoshinobu Inoue }
71282cd038dSYoshinobu Inoue 
713a152f8a3SRobert Watson /* XXXRW: This can't ever be called. */
714ac45e92fSRobert Watson static void
71582cd038dSYoshinobu Inoue rip6_abort(struct socket *so)
71682cd038dSYoshinobu Inoue {
717a152f8a3SRobert Watson 	struct inpcb *inp;
718a152f8a3SRobert Watson 
719a152f8a3SRobert Watson 	inp = sotoinpcb(so);
720a152f8a3SRobert Watson 	KASSERT(inp != NULL, ("rip6_abort: inp == NULL"));
721a152f8a3SRobert Watson 
72282cd038dSYoshinobu Inoue 	soisdisconnected(so);
723a152f8a3SRobert Watson }
724a152f8a3SRobert Watson 
725a152f8a3SRobert Watson static void
726a152f8a3SRobert Watson rip6_close(struct socket *so)
727a152f8a3SRobert Watson {
728a152f8a3SRobert Watson 	struct inpcb *inp;
729a152f8a3SRobert Watson 
730a152f8a3SRobert Watson 	inp = sotoinpcb(so);
731a152f8a3SRobert Watson 	KASSERT(inp != NULL, ("rip6_close: inp == NULL"));
732a152f8a3SRobert Watson 
733a152f8a3SRobert Watson 	soisdisconnected(so);
73482cd038dSYoshinobu Inoue }
73582cd038dSYoshinobu Inoue 
73682cd038dSYoshinobu Inoue static int
73782cd038dSYoshinobu Inoue rip6_disconnect(struct socket *so)
73882cd038dSYoshinobu Inoue {
7390ae76120SRobert Watson 	struct inpcb *inp;
7400ae76120SRobert Watson 
7410ae76120SRobert Watson 	inp = sotoinpcb(so);
7420ae76120SRobert Watson 	KASSERT(inp != NULL, ("rip6_disconnect: inp == NULL"));
74382cd038dSYoshinobu Inoue 
7444cc20ab1SSeigo Tanimura 	if ((so->so_state & SS_ISCONNECTED) == 0)
7450ae76120SRobert Watson 		return (ENOTCONN);
74682cd038dSYoshinobu Inoue 	inp->in6p_faddr = in6addr_any;
747ac45e92fSRobert Watson 	rip6_abort(so);
74814ba8addSRobert Watson 	return (0);
74982cd038dSYoshinobu Inoue }
75082cd038dSYoshinobu Inoue 
75182cd038dSYoshinobu Inoue static int
752b40ce416SJulian Elischer rip6_bind(struct socket *so, struct sockaddr *nam, struct thread *td)
75382cd038dSYoshinobu Inoue {
7543af7f97cSGleb Smirnoff 	struct epoch_tracker et;
7550ae76120SRobert Watson 	struct inpcb *inp;
75682cd038dSYoshinobu Inoue 	struct sockaddr_in6 *addr = (struct sockaddr_in6 *)nam;
7578c0fec80SRobert Watson 	struct ifaddr *ifa = NULL;
758a1f7e5f8SHajimu UMEMOTO 	int error = 0;
75982cd038dSYoshinobu Inoue 
7600ae76120SRobert Watson 	inp = sotoinpcb(so);
76114ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_bind: inp == NULL"));
7620ae76120SRobert Watson 
763*f161d294SMark Johnston 	if (nam->sa_family != AF_INET6)
764*f161d294SMark Johnston 		return (EAFNOSUPPORT);
76582cd038dSYoshinobu Inoue 	if (nam->sa_len != sizeof(*addr))
7660ae76120SRobert Watson 		return (EINVAL);
767b89e82ddSJamie Gritton 	if ((error = prison_check_ip6(td->td_ucred, &addr->sin6_addr)) != 0)
768b89e82ddSJamie Gritton 		return (error);
7694f6c66ccSMatt Macy 	if (CK_STAILQ_EMPTY(&V_ifnet) || addr->sin6_family != AF_INET6)
7700ae76120SRobert Watson 		return (EADDRNOTAVAIL);
771603724d3SBjoern A. Zeeb 	if ((error = sa6_embedscope(addr, V_ip6_use_defzone)) != 0)
772a1f7e5f8SHajimu UMEMOTO 		return (error);
773a1f7e5f8SHajimu UMEMOTO 
7743af7f97cSGleb Smirnoff 	NET_EPOCH_ENTER(et);
77582cd038dSYoshinobu Inoue 	if (!IN6_IS_ADDR_UNSPECIFIED(&addr->sin6_addr) &&
7763af7f97cSGleb Smirnoff 	    (ifa = ifa_ifwithaddr((struct sockaddr *)addr)) == NULL) {
7773af7f97cSGleb Smirnoff 		NET_EPOCH_EXIT(et);
7780ae76120SRobert Watson 		return (EADDRNOTAVAIL);
7793af7f97cSGleb Smirnoff 	}
7808c0fec80SRobert Watson 	if (ifa != NULL &&
7818c0fec80SRobert Watson 	    ((struct in6_ifaddr *)ifa)->ia6_flags &
78282cd038dSYoshinobu Inoue 	    (IN6_IFF_ANYCAST|IN6_IFF_NOTREADY|
7833af7f97cSGleb Smirnoff 	     IN6_IFF_DETACHED|IN6_IFF_DEPRECATED)) {
7843af7f97cSGleb Smirnoff 		NET_EPOCH_EXIT(et);
78582cd038dSYoshinobu Inoue 		return (EADDRNOTAVAIL);
7863af7f97cSGleb Smirnoff 	}
7873af7f97cSGleb Smirnoff 	NET_EPOCH_EXIT(et);
788603724d3SBjoern A. Zeeb 	INP_INFO_WLOCK(&V_ripcbinfo);
7898501a69cSRobert Watson 	INP_WLOCK(inp);
79082cd038dSYoshinobu Inoue 	inp->in6p_laddr = addr->sin6_addr;
7918501a69cSRobert Watson 	INP_WUNLOCK(inp);
792603724d3SBjoern A. Zeeb 	INP_INFO_WUNLOCK(&V_ripcbinfo);
7930ae76120SRobert Watson 	return (0);
79482cd038dSYoshinobu Inoue }
79582cd038dSYoshinobu Inoue 
79682cd038dSYoshinobu Inoue static int
797b40ce416SJulian Elischer rip6_connect(struct socket *so, struct sockaddr *nam, struct thread *td)
79882cd038dSYoshinobu Inoue {
7990ae76120SRobert Watson 	struct inpcb *inp;
80082cd038dSYoshinobu Inoue 	struct sockaddr_in6 *addr = (struct sockaddr_in6 *)nam;
80188d166bfSBjoern A. Zeeb 	struct in6_addr in6a;
802605284b8SAlexander V. Chernikov 	struct epoch_tracker et;
803a1f7e5f8SHajimu UMEMOTO 	int error = 0, scope_ambiguous = 0;
80482cd038dSYoshinobu Inoue 
8050ae76120SRobert Watson 	inp = sotoinpcb(so);
80614ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_connect: inp == NULL"));
8070ae76120SRobert Watson 
80882cd038dSYoshinobu Inoue 	if (nam->sa_len != sizeof(*addr))
8090ae76120SRobert Watson 		return (EINVAL);
8104f6c66ccSMatt Macy 	if (CK_STAILQ_EMPTY(&V_ifnet))
8110ae76120SRobert Watson 		return (EADDRNOTAVAIL);
81282cd038dSYoshinobu Inoue 	if (addr->sin6_family != AF_INET6)
8130ae76120SRobert Watson 		return (EAFNOSUPPORT);
814a1f7e5f8SHajimu UMEMOTO 
815a1f7e5f8SHajimu UMEMOTO 	/*
8160ae76120SRobert Watson 	 * Application should provide a proper zone ID or the use of default
8170ae76120SRobert Watson 	 * zone IDs should be enabled.  Unfortunately, some applications do
8180ae76120SRobert Watson 	 * not behave as it should, so we need a workaround.  Even if an
8190ae76120SRobert Watson 	 * appropriate ID is not determined, we'll see if we can determine
8200ae76120SRobert Watson 	 * the outgoing interface.  If we can, determine the zone ID based on
8210ae76120SRobert Watson 	 * the interface below.
822a1f7e5f8SHajimu UMEMOTO 	 */
823603724d3SBjoern A. Zeeb 	if (addr->sin6_scope_id == 0 && !V_ip6_use_defzone)
824a1f7e5f8SHajimu UMEMOTO 		scope_ambiguous = 1;
825603724d3SBjoern A. Zeeb 	if ((error = sa6_embedscope(addr, V_ip6_use_defzone)) != 0)
826a1f7e5f8SHajimu UMEMOTO 		return (error);
827a1f7e5f8SHajimu UMEMOTO 
828603724d3SBjoern A. Zeeb 	INP_INFO_WLOCK(&V_ripcbinfo);
8298501a69cSRobert Watson 	INP_WLOCK(inp);
83082cd038dSYoshinobu Inoue 	/* Source address selection. XXX: need pcblookup? */
831605284b8SAlexander V. Chernikov 	NET_EPOCH_ENTER(et);
832601c0b8bSAlexander V. Chernikov 	error = in6_selectsrc_socket(addr, inp->in6p_outputopts,
833601c0b8bSAlexander V. Chernikov 	    inp, so->so_cred, scope_ambiguous, &in6a, NULL);
834605284b8SAlexander V. Chernikov 	NET_EPOCH_EXIT(et);
83588d166bfSBjoern A. Zeeb 	if (error) {
8368501a69cSRobert Watson 		INP_WUNLOCK(inp);
837603724d3SBjoern A. Zeeb 		INP_INFO_WUNLOCK(&V_ripcbinfo);
83888d166bfSBjoern A. Zeeb 		return (error);
83907385abdSRobert Watson 	}
840a1f7e5f8SHajimu UMEMOTO 
84182cd038dSYoshinobu Inoue 	inp->in6p_faddr = addr->sin6_addr;
84288d166bfSBjoern A. Zeeb 	inp->in6p_laddr = in6a;
84382cd038dSYoshinobu Inoue 	soisconnected(so);
8448501a69cSRobert Watson 	INP_WUNLOCK(inp);
845603724d3SBjoern A. Zeeb 	INP_INFO_WUNLOCK(&V_ripcbinfo);
8460ae76120SRobert Watson 	return (0);
84782cd038dSYoshinobu Inoue }
84882cd038dSYoshinobu Inoue 
84982cd038dSYoshinobu Inoue static int
85082cd038dSYoshinobu Inoue rip6_shutdown(struct socket *so)
85182cd038dSYoshinobu Inoue {
85207385abdSRobert Watson 	struct inpcb *inp;
85307385abdSRobert Watson 
85407385abdSRobert Watson 	inp = sotoinpcb(so);
85514ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_shutdown: inp == NULL"));
8560ae76120SRobert Watson 
8578501a69cSRobert Watson 	INP_WLOCK(inp);
85882cd038dSYoshinobu Inoue 	socantsendmore(so);
8598501a69cSRobert Watson 	INP_WUNLOCK(inp);
8600ae76120SRobert Watson 	return (0);
86182cd038dSYoshinobu Inoue }
86282cd038dSYoshinobu Inoue 
86382cd038dSYoshinobu Inoue static int
86482cd038dSYoshinobu Inoue rip6_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *nam,
865b40ce416SJulian Elischer     struct mbuf *control, struct thread *td)
86682cd038dSYoshinobu Inoue {
8670ae76120SRobert Watson 	struct inpcb *inp;
86882cd038dSYoshinobu Inoue 	struct sockaddr_in6 tmp;
86982cd038dSYoshinobu Inoue 	struct sockaddr_in6 *dst;
87007385abdSRobert Watson 	int ret;
87182cd038dSYoshinobu Inoue 
8720ae76120SRobert Watson 	inp = sotoinpcb(so);
87314ba8addSRobert Watson 	KASSERT(inp != NULL, ("rip6_send: inp == NULL"));
8740ae76120SRobert Watson 
8750ae76120SRobert Watson 	/* Always copy sockaddr to avoid overwrites. */
87607385abdSRobert Watson 	/* Unlocked read. */
87782cd038dSYoshinobu Inoue 	if (so->so_state & SS_ISCONNECTED) {
87882cd038dSYoshinobu Inoue 		if (nam) {
87982cd038dSYoshinobu Inoue 			m_freem(m);
8800ae76120SRobert Watson 			return (EISCONN);
88182cd038dSYoshinobu Inoue 		}
88282cd038dSYoshinobu Inoue 		/* XXX */
88382cd038dSYoshinobu Inoue 		bzero(&tmp, sizeof(tmp));
88482cd038dSYoshinobu Inoue 		tmp.sin6_family = AF_INET6;
88582cd038dSYoshinobu Inoue 		tmp.sin6_len = sizeof(struct sockaddr_in6);
8862209e8f1SRobert Watson 		INP_RLOCK(inp);
88782cd038dSYoshinobu Inoue 		bcopy(&inp->in6p_faddr, &tmp.sin6_addr,
88882cd038dSYoshinobu Inoue 		    sizeof(struct in6_addr));
8892209e8f1SRobert Watson 		INP_RUNLOCK(inp);
89082cd038dSYoshinobu Inoue 		dst = &tmp;
89182cd038dSYoshinobu Inoue 	} else {
89282cd038dSYoshinobu Inoue 		if (nam == NULL) {
89382cd038dSYoshinobu Inoue 			m_freem(m);
8940ae76120SRobert Watson 			return (ENOTCONN);
89582cd038dSYoshinobu Inoue 		}
896*f161d294SMark Johnston 		if (nam->sa_family != AF_INET6) {
897*f161d294SMark Johnston 			m_freem(m);
898*f161d294SMark Johnston 			return (EAFNOSUPPORT);
899*f161d294SMark Johnston 		}
900a1f7e5f8SHajimu UMEMOTO 		if (nam->sa_len != sizeof(struct sockaddr_in6)) {
901a1f7e5f8SHajimu UMEMOTO 			m_freem(m);
902a1f7e5f8SHajimu UMEMOTO 			return (EINVAL);
903a1f7e5f8SHajimu UMEMOTO 		}
904686cdd19SJun-ichiro itojun Hagino 		tmp = *(struct sockaddr_in6 *)nam;
905686cdd19SJun-ichiro itojun Hagino 		dst = &tmp;
906a1f7e5f8SHajimu UMEMOTO 
907a1f7e5f8SHajimu UMEMOTO 		if (dst->sin6_family == AF_UNSPEC) {
908a1f7e5f8SHajimu UMEMOTO 			/*
909a1f7e5f8SHajimu UMEMOTO 			 * XXX: we allow this case for backward
910a1f7e5f8SHajimu UMEMOTO 			 * compatibility to buggy applications that
911a1f7e5f8SHajimu UMEMOTO 			 * rely on old (and wrong) kernel behavior.
912a1f7e5f8SHajimu UMEMOTO 			 */
913a1f7e5f8SHajimu UMEMOTO 			log(LOG_INFO, "rip6 SEND: address family is "
914a1f7e5f8SHajimu UMEMOTO 			    "unspec. Assume AF_INET6\n");
915a1f7e5f8SHajimu UMEMOTO 			dst->sin6_family = AF_INET6;
916a1f7e5f8SHajimu UMEMOTO 		} else if (dst->sin6_family != AF_INET6) {
917a1f7e5f8SHajimu UMEMOTO 			m_freem(m);
918a1f7e5f8SHajimu UMEMOTO 			return(EAFNOSUPPORT);
91982cd038dSYoshinobu Inoue 		}
920686cdd19SJun-ichiro itojun Hagino 	}
92107385abdSRobert Watson 	ret = rip6_output(m, so, dst, control);
92207385abdSRobert Watson 	return (ret);
92382cd038dSYoshinobu Inoue }
92482cd038dSYoshinobu Inoue 
92582cd038dSYoshinobu Inoue struct pr_usrreqs rip6_usrreqs = {
926756d52a1SPoul-Henning Kamp 	.pru_abort =		rip6_abort,
927756d52a1SPoul-Henning Kamp 	.pru_attach =		rip6_attach,
928756d52a1SPoul-Henning Kamp 	.pru_bind =		rip6_bind,
929756d52a1SPoul-Henning Kamp 	.pru_connect =		rip6_connect,
930756d52a1SPoul-Henning Kamp 	.pru_control =		in6_control,
931756d52a1SPoul-Henning Kamp 	.pru_detach =		rip6_detach,
932756d52a1SPoul-Henning Kamp 	.pru_disconnect =	rip6_disconnect,
93354d642bbSRobert Watson 	.pru_peeraddr =		in6_getpeeraddr,
934756d52a1SPoul-Henning Kamp 	.pru_send =		rip6_send,
935756d52a1SPoul-Henning Kamp 	.pru_shutdown =		rip6_shutdown,
93654d642bbSRobert Watson 	.pru_sockaddr =		in6_getsockaddr,
937a152f8a3SRobert Watson 	.pru_close =		rip6_close,
93882cd038dSYoshinobu Inoue };
939