icmp6.c revision 1.7 1 /* $NetBSD: icmp6.c,v 1.7 1999/07/22 03:59:42 itojun Exp $ */
2
3 /*
4 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the project nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 /*
33 * Copyright (c) 1982, 1986, 1988, 1993
34 * The Regents of the University of California. All rights reserved.
35 *
36 * Redistribution and use in source and binary forms, with or without
37 * modification, are permitted provided that the following conditions
38 * are met:
39 * 1. Redistributions of source code must retain the above copyright
40 * notice, this list of conditions and the following disclaimer.
41 * 2. Redistributions in binary form must reproduce the above copyright
42 * notice, this list of conditions and the following disclaimer in the
43 * documentation and/or other materials provided with the distribution.
44 * 3. All advertising materials mentioning features or use of this software
45 * must display the following acknowledgement:
46 * This product includes software developed by the University of
47 * California, Berkeley and its contributors.
48 * 4. Neither the name of the University nor the names of its contributors
49 * may be used to endorse or promote products derived from this software
50 * without specific prior written permission.
51 *
52 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
53 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
54 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
55 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
56 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
57 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
58 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
59 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
60 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
61 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
62 * SUCH DAMAGE.
63 *
64 * @(#)ip_icmp.c 8.2 (Berkeley) 1/4/94
65 */
66
67 #if (defined(__FreeBSD__) && __FreeBSD__ >= 3) || defined(__NetBSD__)
68 #include "opt_inet.h"
69 #include "opt_ipsec.h"
70 #endif
71
72 #include <sys/param.h>
73 #include <sys/systm.h>
74 #include <sys/malloc.h>
75 #include <sys/mbuf.h>
76 #include <sys/protosw.h>
77 #include <sys/socket.h>
78 #include <sys/socketvar.h>
79 #include <sys/time.h>
80 #include <sys/kernel.h>
81 #include <sys/syslog.h>
82
83 #include <net/if.h>
84 #include <net/route.h>
85 #include <net/if_dl.h>
86 #include <net/if_types.h>
87
88 #include <netinet/in.h>
89 #include <netinet/in_var.h>
90 #include <netinet6/in6_systm.h>
91 #include <netinet6/ip6.h>
92 #include <netinet6/ip6_var.h>
93 #include <netinet6/icmp6.h>
94 #include <netinet6/mld6_var.h>
95 #if !defined(__FreeBSD__) || __FreeBSD__ < 3
96 #include <netinet6/in6_pcb.h>
97 #else
98 #include <netinet/in_pcb.h>
99 #endif
100 #include <netinet6/nd6.h>
101 #include <netinet6/in6_ifattach.h>
102
103 #ifdef IPSEC
104 #include <netkey/key.h>
105 #include <netkey/key_debug.h>
106 #endif
107
108 #include "faith.h"
109
110 extern struct protosw inet6sw[];
111 extern u_char ip6_protox[];
112
113 struct icmp6stat icmp6stat;
114
115 #if !defined(__FreeBSD__) || __FreeBSD__ < 3
116 extern struct in6pcb rawin6pcb;
117 #else
118 extern struct inpcbhead ripcb;
119 #endif
120 extern u_int icmp6errratelim;
121 static int icmp6_rip6_input __P((struct mbuf **, int));
122 static int icmp6_ratelimit __P((const struct in6_addr *, const int, const int));
123 static struct mbuf * ni6_input __P((struct mbuf *, int));
124 static int ni6_addrs __P((struct icmp6_nodeinfo *, struct mbuf *,
125 struct ifnet **));
126 static int ni6_store_addrs __P((struct icmp6_nodeinfo *, struct icmp6_nodeinfo *,
127 struct ifnet *, int));
128
129 #ifdef COMPAT_RFC1885
130 static struct route_in6 icmp6_reflect_rt;
131 #endif
132 static struct timeval icmp6_nextsend = {0, 0};
133
134 void
135 icmp6_init()
136 {
137 mld6_init();
138 }
139
140 /*
141 * Generate an error packet of type error in response to bad IP6 packet.
142 */
143 void
144 icmp6_error(m, type, code, param)
145 struct mbuf *m;
146 int type, code, param;
147 {
148 struct ip6_hdr *oip6, *nip6;
149 struct icmp6_hdr *icmp6;
150 u_int prep;
151 int off;
152 u_char nxt;
153
154 icmp6stat.icp6s_error++;
155
156 if (m->m_flags & M_DECRYPTED)
157 goto freeit;
158
159 oip6 = mtod(m, struct ip6_hdr *);
160
161 /*
162 * Multicast destination check. For unrecognized option errors,
163 * this check has already done in ip6_unknown_opt(), so we can
164 * check only for other errors.
165 */
166 if ((m->m_flags & (M_BCAST|M_MCAST) ||
167 IN6_IS_ADDR_MULTICAST(&oip6->ip6_dst)) &&
168 (type != ICMP6_PACKET_TOO_BIG &&
169 (type != ICMP6_PARAM_PROB ||
170 code != ICMP6_PARAMPROB_OPTION)))
171 goto freeit;
172
173 /* Source address check. XXX: the case of anycast source? */
174 if (IN6_IS_ADDR_UNSPECIFIED(&oip6->ip6_src) ||
175 IN6_IS_ADDR_MULTICAST(&oip6->ip6_src))
176 goto freeit;
177
178 /*
179 * If the erroneous packet is also an ICMP error, discard it.
180 */
181 IP6_EXTHDR_CHECK(m, 0, sizeof(struct ip6_hdr), );
182 off = sizeof(struct ip6_hdr);
183 nxt = oip6->ip6_nxt;
184 while(1) { /* XXX: should avoid inf. loop explicitly? */
185 struct ip6_ext *ip6e;
186 struct icmp6_hdr *icp;
187
188 switch(nxt) {
189 case IPPROTO_IPV6:
190 case IPPROTO_IPV4:
191 case IPPROTO_UDP:
192 case IPPROTO_TCP:
193 case IPPROTO_ESP:
194 case IPPROTO_FRAGMENT:
195 /*
196 * ICMPv6 error must not be fragmented.
197 * XXX: but can we trust the sender?
198 */
199 default:
200 /* What if unknown header followed by ICMP error? */
201 goto generate;
202 case IPPROTO_ICMPV6:
203 IP6_EXTHDR_CHECK(m, 0, off + sizeof(struct icmp6_hdr), );
204 icp = (struct icmp6_hdr *)(mtod(m, caddr_t) + off);
205 if (icp->icmp6_type < ICMP6_ECHO_REQUEST
206 || icp->icmp6_type == ND_REDIRECT) {
207 /*
208 * ICMPv6 error
209 * Special case: for redirect (which is
210 * informational) we must not send icmp6 error.
211 */
212 icmp6stat.icp6s_canterror++;
213 goto freeit;
214 } else {
215 /* ICMPv6 informational */
216 goto generate;
217 }
218 case IPPROTO_HOPOPTS:
219 case IPPROTO_DSTOPTS:
220 case IPPROTO_ROUTING:
221 case IPPROTO_AH:
222 IP6_EXTHDR_CHECK(m, 0, off + sizeof(struct ip6_ext), );
223 ip6e = (struct ip6_ext *)(mtod(m, caddr_t) + off);
224 if (nxt == IPPROTO_AH)
225 off += (ip6e->ip6e_len + 2) << 2;
226 else
227 off += (ip6e->ip6e_len + 1) << 3;
228 nxt = ip6e->ip6e_nxt;
229 break;
230 }
231 }
232
233 freeit:
234 /*
235 * If we can't tell wheter or not we can generate ICMP6, free it.
236 */
237 m_freem(m);
238 return;
239
240 generate:
241 oip6 = mtod(m, struct ip6_hdr *); /* adjust pointer */
242
243 /* Finally, do rate limitation check. */
244 if (icmp6_ratelimit(&oip6->ip6_src, type, code)) {
245 icmp6stat.icp6s_toofreq++;
246 goto freeit;
247 }
248
249 /*
250 * OK, ICMP6 can be generated.
251 */
252
253 if (m->m_pkthdr.len >= ICMPV6_PLD_MAXLEN)
254 m_adj(m, ICMPV6_PLD_MAXLEN - m->m_pkthdr.len);
255
256 prep = sizeof(struct ip6_hdr) + sizeof(struct icmp6_hdr);
257 M_PREPEND(m, prep, M_DONTWAIT);
258 if (m && m->m_len < prep)
259 m = m_pullup(m, prep);
260 if (m == NULL) {
261 printf("ENOBUFS in icmp6_error %d\n", __LINE__);
262 return;
263 }
264
265 nip6 = mtod(m, struct ip6_hdr *);
266 nip6->ip6_src = oip6->ip6_src;
267 nip6->ip6_dst = oip6->ip6_dst;
268
269 if (IN6_IS_SCOPE_LINKLOCAL(&oip6->ip6_src))
270 oip6->ip6_src.s6_addr16[1] = 0;
271 if (IN6_IS_SCOPE_LINKLOCAL(&oip6->ip6_dst))
272 oip6->ip6_dst.s6_addr16[1] = 0;
273
274 icmp6 = (struct icmp6_hdr *)(nip6 + 1);
275 icmp6->icmp6_type = type;
276 icmp6->icmp6_code = code;
277 icmp6->icmp6_pptr = htonl((u_int32_t)param);
278
279 icmp6stat.icp6s_outhist[type]++;
280 icmp6_reflect(m, sizeof(struct ip6_hdr)); /*header order: IPv6 - ICMPv6*/
281 }
282
283 /*
284 * Process a received ICMP6 message.
285 */
286 int
287 icmp6_input(mp, offp, proto)
288 struct mbuf **mp;
289 int *offp, proto;
290 {
291 struct mbuf *m = *mp, *n;
292 struct ip6_hdr *ip6, *nip6;
293 struct icmp6_hdr *icmp6, *nicmp6;
294 int off = *offp;
295 int icmp6len = m->m_pkthdr.len - *offp;
296 int code, sum, noff;
297 struct sockaddr_in6 icmp6src;
298
299 IP6_EXTHDR_CHECK(m, off, sizeof(struct icmp6_hdr), IPPROTO_DONE);
300 /* m might change if M_LOOP. So, call mtod after this */
301
302 /*
303 * Locate icmp6 structure in mbuf, and check
304 * that not corrupted and of at least minimum length
305 */
306
307 ip6 = mtod(m, struct ip6_hdr *);
308 if (icmp6len < sizeof(struct icmp6_hdr)) {
309 icmp6stat.icp6s_tooshort++;
310 goto freeit;
311 }
312
313 /*
314 * calculate the checksum
315 */
316
317 icmp6 = (struct icmp6_hdr *)((caddr_t)ip6 + off);
318 code = icmp6->icmp6_code;
319
320 if ((sum = in6_cksum(m, IPPROTO_ICMPV6, off, icmp6len)) != 0) {
321 log(LOG_ERR,
322 "ICMP6 checksum error(%d|%x) %s\n",
323 icmp6->icmp6_type,
324 sum,
325 ip6_sprintf(&ip6->ip6_src));
326 icmp6stat.icp6s_checksum++;
327 goto freeit;
328 }
329
330 #if defined(NFAITH) && 0 < NFAITH
331 if (m->m_pkthdr.rcvif && m->m_pkthdr.rcvif->if_type == IFT_FAITH) {
332 /*
333 * Deliver very specific ICMP6 type only.
334 * This is important to deilver TOOBIG. Otherwise PMTUD
335 * will not work.
336 */
337 switch (icmp6->icmp6_type) {
338 case ICMP6_DST_UNREACH:
339 case ICMP6_PACKET_TOO_BIG:
340 case ICMP6_TIME_EXCEEDED:
341 break;
342 default:
343 goto freeit;
344 }
345 }
346 #endif
347
348 #ifdef IPSEC
349 /* drop it if it does not match the default policy */
350 if (ipsec6_in_reject(m, NULL)) {
351 ipsecstat.in_polvio++;
352 goto freeit;
353 }
354 #endif
355
356 icmp6stat.icp6s_inhist[icmp6->icmp6_type]++;
357
358 switch (icmp6->icmp6_type) {
359
360 case ICMP6_DST_UNREACH:
361 switch (code) {
362 case ICMP6_DST_UNREACH_NOROUTE:
363 code = PRC_UNREACH_NET;
364 break;
365 case ICMP6_DST_UNREACH_ADMIN:
366 case ICMP6_DST_UNREACH_ADDR:
367 code = PRC_UNREACH_HOST;
368 break;
369 case ICMP6_DST_UNREACH_NOTNEIGHBOR:
370 code = PRC_UNREACH_SRCFAIL;
371 break;
372 case ICMP6_DST_UNREACH_NOPORT:
373 code = PRC_UNREACH_PORT;
374 break;
375 default:
376 goto badcode;
377 }
378 goto deliver;
379 break;
380
381 case ICMP6_PACKET_TOO_BIG:
382 if (code != 0)
383 goto badcode;
384 {
385 u_int mtu = ntohl(icmp6->icmp6_mtu);
386 struct rtentry *rt;
387 struct sockaddr_in6 sin6;
388 #ifdef __bsdi__
389 struct route_in6 ro6;
390 #endif
391
392 code = PRC_MSGSIZE;
393 bzero(&sin6, sizeof(sin6));
394 sin6.sin6_family = PF_INET6;
395 sin6.sin6_len = sizeof(struct sockaddr_in6);
396 sin6.sin6_addr = ((struct ip6_hdr *)(icmp6 + 1))->ip6_dst;
397 rt = rtalloc1((struct sockaddr *)&sin6, 0
398 #ifdef __FreeBSD__
399 , RTF_CLONING | RTF_PRCLONING
400 #endif /*__FreeBSD__*/
401 );
402 #ifdef __bsdi__
403 bcopy(&sin6, &ro6.ro_dst, sizeof(struct sockaddr_in6));
404 ro6.ro_rt = 0;
405 rtcalloc((struct route *)&ro6);
406 rt = ro6.ro_rt;
407 #endif /*__bsdi__*/
408 if (rt && (rt->rt_flags & RTF_HOST)
409 && !(rt->rt_rmx.rmx_locks & RTV_MTU)) {
410 if (mtu < IPV6_MMTU) {
411 /* xxx */
412 rt->rt_rmx.rmx_locks |= RTV_MTU;
413 } else if (mtu < rt->rt_ifp->if_mtu &&
414 rt->rt_rmx.rmx_mtu > mtu) {
415 rt->rt_rmx.rmx_mtu = mtu;
416 }
417 }
418 if (rt)
419 RTFREE(rt);
420
421 goto deliver;
422 }
423 break;
424
425 case ICMP6_TIME_EXCEEDED:
426 switch (code) {
427 case ICMP6_TIME_EXCEED_TRANSIT:
428 case ICMP6_TIME_EXCEED_REASSEMBLY:
429 code += PRC_TIMXCEED_INTRANS;
430 break;
431 default:
432 goto badcode;
433 }
434 goto deliver;
435 break;
436
437 case ICMP6_PARAM_PROB:
438 switch (code) {
439 case ICMP6_PARAMPROB_NEXTHEADER:
440 code = PRC_UNREACH_PROTOCOL;
441 break;
442 case ICMP6_PARAMPROB_HEADER:
443 case ICMP6_PARAMPROB_OPTION:
444 code = PRC_PARAMPROB;
445 break;
446 default:
447 goto badcode;
448 }
449 goto deliver;
450 break;
451
452 case ICMP6_ECHO_REQUEST:
453 if (code != 0)
454 goto badcode;
455 if ((n = m_copy(m, 0, M_COPYALL)) == NULL) {
456 /* Give up remote */
457 break;
458 }
459 if (n->m_flags & M_EXT) {
460 int gap, move;
461 struct mbuf *n0 = n;
462
463 /*
464 * Prepare an internal mbuf. m_pullup() doesn't
465 * always copy the length we specified.
466 */
467 MGETHDR(n, M_DONTWAIT, n0->m_type);
468 if (n == NULL) {
469 /* Give up remote */
470 m_freem(n0);
471 break;
472 }
473 M_COPY_PKTHDR(n, n0);
474 n0->m_flags &= ~M_PKTHDR;
475 n->m_next = n0;
476 /*
477 * Copy IPv6 and ICMPv6 only.
478 */
479 nip6 = mtod(n, struct ip6_hdr *);
480 bcopy(ip6, nip6, sizeof(struct ip6_hdr));
481 nicmp6 = (struct icmp6_hdr *)(nip6 + 1);
482 bcopy(icmp6, nicmp6, sizeof(struct icmp6_hdr));
483 /*
484 * Adjust mbuf. ip6_plen will be adjusted.
485 */
486 noff = sizeof(struct ip6_hdr);
487 n->m_len = noff + sizeof(struct icmp6_hdr);
488 move = off + sizeof(struct icmp6_hdr);
489 n0->m_len -= move;
490 n0->m_data += move;
491 gap = off - noff;
492 n->m_pkthdr.len -= gap;
493 } else {
494 nip6 = mtod(n, struct ip6_hdr *);
495 nicmp6 = (struct icmp6_hdr *)((caddr_t)nip6 + off);
496 noff = off;
497 }
498 nicmp6->icmp6_type = ICMP6_ECHO_REPLY;
499 nicmp6->icmp6_code = 0;
500 icmp6stat.icp6s_reflect++;
501 icmp6stat.icp6s_outhist[ICMP6_ECHO_REPLY]++;
502 icmp6_reflect(n, noff);
503 break;
504
505 case ICMP6_ECHO_REPLY:
506 if (code != 0)
507 goto badcode;
508 break;
509
510 case MLD6_LISTENER_QUERY:
511 case MLD6_LISTENER_REPORT:
512 if (icmp6len < sizeof(struct mld6_hdr))
513 goto badlen;
514 IP6_EXTHDR_CHECK(m, off, icmp6len, IPPROTO_DONE);
515 mld6_input(m, off);
516 /* m stays. */
517 break;
518
519 case MLD6_LISTENER_DONE:
520 if (icmp6len < sizeof(struct mld6_hdr))
521 goto badlen;
522 break; /* nothing to be done in kernel */
523
524 case ICMP6_WRUREQUEST: /* ICMP6_FQDN_QUERY */
525 {
526 enum { WRU, FQDN } mode;
527
528 if (code != 0)
529 goto badcode;
530 if (icmp6len == sizeof(struct icmp6_hdr) + 4)
531 mode = WRU;
532 else if (icmp6len >= sizeof(struct icmp6_hdr) + 8) /* XXX */
533 mode = FQDN;
534 else
535 goto badlen;
536
537 #ifdef __FreeBSD__
538 #define hostnamelen strlen(hostname)
539 #endif
540 if (mode == FQDN) {
541 IP6_EXTHDR_CHECK(m, off, sizeof(struct icmp6_nodeinfo),
542 IPPROTO_DONE);
543 n = ni6_input(m, off);
544 noff = sizeof(struct ip6_hdr);
545 }
546 else {
547 u_char *p;
548
549 MGETHDR(n, M_DONTWAIT, m->m_type);
550 if (n == NULL) {
551 /* Give up remote */
552 break;
553 }
554 /*
555 * Copy IPv6 and ICMPv6 only.
556 */
557 nip6 = mtod(n, struct ip6_hdr *);
558 bcopy(ip6, nip6, sizeof(struct ip6_hdr));
559 nicmp6 = (struct icmp6_hdr *)(nip6 + 1);
560 bcopy(icmp6, nicmp6, sizeof(struct icmp6_hdr));
561 p = (u_char *)(nicmp6 + 1);
562 bzero(p, 4);
563 bcopy(hostname, p + 4, hostnamelen);
564 noff = sizeof(struct ip6_hdr);
565 M_COPY_PKTHDR(n, m); /* just for recvif */
566 n->m_pkthdr.len = n->m_len = sizeof(struct ip6_hdr) +
567 sizeof(struct icmp6_hdr) + 4 + hostnamelen;
568 nicmp6->icmp6_type = ICMP6_WRUREPLY;
569 nicmp6->icmp6_code = 0;
570 }
571 #undef hostnamelen
572 if (n) {
573 icmp6stat.icp6s_reflect++;
574 icmp6stat.icp6s_outhist[ICMP6_WRUREPLY]++;
575 icmp6_reflect(n, noff);
576 }
577 break;
578 }
579
580 case ICMP6_WRUREPLY:
581 if (code != 0)
582 goto badcode;
583 break;
584
585 case ND_ROUTER_SOLICIT:
586 if (code != 0)
587 goto badcode;
588 if (icmp6len < sizeof(struct nd_router_solicit))
589 goto badlen;
590 IP6_EXTHDR_CHECK(m, off, icmp6len, IPPROTO_DONE);
591 nd6_rs_input(m, off, icmp6len);
592 /* m stays. */
593 break;
594
595 case ND_ROUTER_ADVERT:
596 if (code != 0)
597 goto badcode;
598 if (icmp6len < sizeof(struct nd_router_advert))
599 goto badlen;
600 IP6_EXTHDR_CHECK(m, off, icmp6len, IPPROTO_DONE);
601 nd6_ra_input(m, off, icmp6len);
602 /* m stays. */
603 break;
604
605 case ND_NEIGHBOR_SOLICIT:
606 if (code != 0)
607 goto badcode;
608 if (icmp6len < sizeof(struct nd_neighbor_solicit))
609 goto badlen;
610 IP6_EXTHDR_CHECK(m, off, icmp6len, IPPROTO_DONE);
611 nd6_ns_input(m, off, icmp6len);
612 /* m stays. */
613 break;
614
615 case ND_NEIGHBOR_ADVERT:
616 if (code != 0)
617 goto badcode;
618 if (icmp6len < sizeof(struct nd_neighbor_advert))
619 goto badlen;
620 IP6_EXTHDR_CHECK(m, off, icmp6len, IPPROTO_DONE);
621 nd6_na_input(m, off, icmp6len);
622 /* m stays. */
623 break;
624
625 case ND_REDIRECT:
626 if (code != 0)
627 goto badcode;
628 if (icmp6len < sizeof(struct nd_redirect))
629 goto badlen;
630 icmp6_redirect_input(m, off);
631 /* m stays. */
632 break;
633
634 case ICMP6_ROUTER_RENUMBERING:
635 if (code != ICMP6_ROUTER_RENUMBERING_COMMAND &&
636 code != ICMP6_ROUTER_RENUMBERING_RESULT)
637 goto badcode;
638 if (icmp6len < sizeof(struct icmp6_router_renum))
639 goto badlen;
640 break;
641
642 default:
643 printf("icmp6_input: unknown type %d\n", icmp6->icmp6_type);
644 if (icmp6->icmp6_type < ICMP6_ECHO_REQUEST) {
645 /* ICMPv6 error: MUST deliver it by spec... */
646 code = PRC_NCMDS;
647 /* deliver */
648 } else {
649 /* ICMPv6 informational: MUST not deliver */
650 break;
651 }
652 deliver:
653 if (icmp6len < sizeof(struct icmp6_hdr) + sizeof(struct ip6_hdr)) {
654 icmp6stat.icp6s_tooshort++;
655 goto freeit;
656 }
657 IP6_EXTHDR_CHECK(m, off,
658 sizeof(struct icmp6_hdr) + sizeof(struct ip6_hdr),
659 IPPROTO_DONE);
660 icmp6 = (struct icmp6_hdr *)(mtod(m, caddr_t) + off);
661 bzero(&icmp6src, sizeof(icmp6src));
662 icmp6src.sin6_len = sizeof(struct sockaddr_in6);
663 icmp6src.sin6_family = AF_INET6;
664 icmp6src.sin6_addr = ((struct ip6_hdr *)(icmp6 + 1))->ip6_dst;
665
666 /* Detect the upper level protocol */
667 {
668 void (*ctlfunc) __P((int, struct sockaddr *,
669 struct ip6_hdr *,
670 struct mbuf *, int)); /* XXX */
671 struct ip6_hdr *eip6 = (struct ip6_hdr *)(icmp6 + 1);
672 u_int8_t nxt = eip6->ip6_nxt;
673 int eoff = off + sizeof(struct icmp6_hdr) +
674 sizeof(struct ip6_hdr);
675
676 while (1) { /* XXX: should avoid inf. loop explicitly? */
677 struct ip6_ext *eh;
678
679 switch(nxt) {
680 case IPPROTO_ESP:
681 case IPPROTO_NONE:
682 goto passit;
683 case IPPROTO_HOPOPTS:
684 case IPPROTO_DSTOPTS:
685 case IPPROTO_ROUTING:
686 case IPPROTO_AH:
687 case IPPROTO_FRAGMENT:
688 IP6_EXTHDR_CHECK(m, 0, eoff +
689 sizeof(struct ip6_ext),
690 IPPROTO_DONE);
691 eh = (struct ip6_ext *)(mtod(m, caddr_t)
692 + eoff);
693 if (nxt == IPPROTO_AH)
694 eoff += (eh->ip6e_len + 2) << 2;
695 else if (nxt == IPPROTO_FRAGMENT)
696 eoff += sizeof(struct ip6_frag);
697 else
698 eoff += (eh->ip6e_len + 1) << 3;
699 nxt = eh->ip6e_nxt;
700 break;
701 default:
702 goto notify;
703 }
704 }
705 notify:
706 icmp6 = (struct icmp6_hdr *)(mtod(m, caddr_t) + off);
707 ctlfunc = (void (*) __P((int, struct sockaddr *,
708 struct ip6_hdr *,
709 struct mbuf *, int)))
710 (inet6sw[ip6_protox[nxt]].pr_ctlinput);
711 if (ctlfunc)
712 (*ctlfunc)(code, (struct sockaddr *)&icmp6src,
713 (struct ip6_hdr *)(icmp6 + 1),
714 m, eoff);
715 }
716 break;
717
718 badcode:
719 icmp6stat.icp6s_badcode++;
720 break;
721
722 badlen:
723 icmp6stat.icp6s_badlen++;
724 break;
725 }
726
727 passit:
728 icmp6_rip6_input(&m, *offp);
729 return IPPROTO_DONE;
730
731 freeit:
732 m_freem(m);
733 return IPPROTO_DONE;
734 }
735
736 /*
737 * Process a Node Information Query
738 */
739 #ifdef __FreeBSD__
740 #define hostnamelen strlen(hostname)
741 #endif
742 #ifndef offsetof /* XXX */
743 #define offsetof(type, member) ((size_t)(&((type *)0)->member))
744 #endif
745
746 static struct mbuf *
747 ni6_input(m, off)
748 struct mbuf *m;
749 int off;
750 {
751 struct icmp6_nodeinfo *ni6 =
752 (struct icmp6_nodeinfo *)(mtod(m, caddr_t) + off), *nni6;
753 struct mbuf *n = NULL;
754 u_int16_t qtype = ntohs(ni6->ni_qtype);
755 int replylen = sizeof(struct ip6_hdr) + sizeof(struct icmp6_nodeinfo);
756 struct ni_reply_fqdn *fqdn;
757 int addrs; /* for NI_QTYPE_NODEADDR */
758 struct ifnet *ifp = NULL; /* for NI_QTYPE_NODEADDR */
759
760 switch(qtype) {
761 case NI_QTYPE_NOOP:
762 break; /* no reply data */
763 case NI_QTYPE_SUPTYPES:
764 goto bad; /* xxx: to be implemented */
765 break;
766 case NI_QTYPE_FQDN:
767 replylen += offsetof(struct ni_reply_fqdn, ni_fqdn_name) +
768 hostnamelen;
769 break;
770 case NI_QTYPE_NODEADDR:
771 addrs = ni6_addrs(ni6, m, &ifp);
772 if ((replylen += addrs * sizeof(struct in6_addr)) > MCLBYTES)
773 replylen = MCLBYTES; /* XXX: we'll truncate later */
774
775 break;
776 default:
777 /*
778 * XXX: We must return a reply with the ICMP6 code
779 * `unknown Qtype' in this case. However we regard the case
780 * as an FQDN query for backward compatibility.
781 * Older versions set a random value to this field,
782 * so it rarely varies in the defined qtypes.
783 * But the mechanism is not reliable...
784 * maybe we should obsolete older versions.
785 */
786 qtype = NI_QTYPE_FQDN;
787 replylen += offsetof(struct ni_reply_fqdn, ni_fqdn_name) +
788 hostnamelen;
789 break;
790 }
791
792 /* allocate a mbuf to reply. */
793 MGETHDR(n, M_DONTWAIT, m->m_type);
794 if (n == NULL)
795 return(NULL);
796 M_COPY_PKTHDR(n, m); /* just for recvif */
797 if (replylen > MHLEN) {
798 if (replylen > MCLBYTES)
799 /*
800 * XXX: should we try to allocate more? But MCLBYTES is
801 * probably much larger than IPV6_MMTU...
802 */
803 goto bad;
804 MCLGET(n, M_DONTWAIT);
805 if ((n->m_flags & M_EXT) == 0) {
806 goto bad;
807 }
808 }
809 n->m_pkthdr.len = n->m_len = replylen;
810
811 /* copy mbuf header and IPv6 + Node Information base headers */
812 bcopy(mtod(m, caddr_t), mtod(n, caddr_t), sizeof(struct ip6_hdr));
813 nni6 = (struct icmp6_nodeinfo *)(mtod(n, struct ip6_hdr *) + 1);
814 bcopy(mtod(m, caddr_t) + off, (caddr_t)nni6, sizeof(struct icmp6_nodeinfo));
815
816 /* qtype dependent procedure */
817 switch (qtype) {
818 case NI_QTYPE_NOOP:
819 nni6->ni_flags = 0;
820 break;
821 case NI_QTYPE_SUPTYPES:
822 goto bad; /* xxx: to be implemented */
823 break;
824 case NI_QTYPE_FQDN:
825 if (hostnamelen > 255) { /* XXX: rare case, but may happen */
826 printf("ni6_input: "
827 "hostname length(%d) is too large for reply\n",
828 hostnamelen);
829 goto bad;
830 }
831 fqdn = (struct ni_reply_fqdn *)(mtod(n, caddr_t) +
832 sizeof(struct ip6_hdr) +
833 sizeof(struct icmp6_nodeinfo));
834 nni6->ni_flags = 0; /* XXX: meaningless TTL */
835 fqdn->ni_fqdn_ttl = 0; /* ditto. */
836 fqdn->ni_fqdn_namelen = hostnamelen;
837 bcopy(hostname, &fqdn->ni_fqdn_name[0], hostnamelen);
838 break;
839 case NI_QTYPE_NODEADDR:
840 {
841 int lenlim, copied;
842
843 if (n->m_flags & M_EXT)
844 lenlim = MCLBYTES - sizeof(struct ip6_hdr) -
845 sizeof(struct icmp6_nodeinfo);
846 else
847 lenlim = MHLEN - sizeof(struct ip6_hdr) -
848 sizeof(struct icmp6_nodeinfo);
849 copied = ni6_store_addrs(ni6, nni6, ifp, lenlim);
850 /* XXX: reset mbuf length */
851 n->m_pkthdr.len = n->m_len = sizeof(struct ip6_hdr) +
852 sizeof(struct icmp6_nodeinfo) + copied;
853 break;
854 }
855 default:
856 break; /* XXX impossible! */
857 }
858
859 nni6->ni_type = ICMP6_NI_REPLY;
860 nni6->ni_code = ICMP6_NI_SUCESS;
861 return(n);
862
863 bad:
864 if (n)
865 m_freem(n);
866 return(NULL);
867 }
868 #undef hostnamelen
869
870 /*
871 * calculate the number of addresses to be returned in the node info reply.
872 */
873 static int
874 ni6_addrs(ni6, m, ifpp)
875 struct icmp6_nodeinfo *ni6;
876 struct mbuf *m;
877 struct ifnet **ifpp;
878 {
879 register struct ifnet *ifp;
880 register struct in6_ifaddr *ifa6;
881 register struct ifaddr *ifa;
882 struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
883 int addrs = 0, addrsofif, iffound = 0;
884
885 #ifdef __NetBSD__
886 for (ifp = TAILQ_FIRST(&ifnet); ifp; ifp = TAILQ_NEXT(ifp, if_list))
887 #else
888 for (ifp = ifnet; ifp; ifp = ifp->if_next)
889 #endif
890 {
891 addrsofif = 0;
892 #ifdef __NetBSD__
893 for (ifa = ifp->if_addrlist.tqh_first; ifa;
894 ifa = ifa->ifa_list.tqe_next)
895 #else
896 for (ifa = ifp->if_addrlist; ifa; ifa = ifa->ifa_next)
897 #endif
898 {
899 if (ifa->ifa_addr->sa_family != AF_INET6)
900 continue;
901 ifa6 = (struct in6_ifaddr *)ifa;
902
903 if (!(ni6->ni_flags & NI_NODEADDR_FLAG_ALL) &&
904 IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst,
905 &ifa6->ia_addr.sin6_addr))
906 iffound = 1;
907
908 if (ifa6->ia6_flags & IN6_IFF_ANYCAST)
909 continue; /* we need only unicast addresses */
910
911 if ((ni6->ni_flags & (NI_NODEADDR_FLAG_LINKLOCAL |
912 NI_NODEADDR_FLAG_SITELOCAL |
913 NI_NODEADDR_FLAG_GLOBAL)) == 0)
914 continue;
915
916 /* What do we have to do about ::1? */
917 switch(in6_addrscope(&ifa6->ia_addr.sin6_addr)) {
918 case IPV6_ADDR_SCOPE_LINKLOCAL:
919 if (ni6->ni_flags & NI_NODEADDR_FLAG_LINKLOCAL)
920 addrsofif++;
921 break;
922 case IPV6_ADDR_SCOPE_SITELOCAL:
923 if (ni6->ni_flags & NI_NODEADDR_FLAG_SITELOCAL)
924 addrsofif++;
925 break;
926 case IPV6_ADDR_SCOPE_GLOBAL:
927 if (ni6->ni_flags & NI_NODEADDR_FLAG_GLOBAL)
928 addrsofif++;
929 break;
930 default:
931 continue;
932 }
933 }
934 if (iffound) {
935 *ifpp = ifp;
936 return(addrsofif);
937 }
938
939 addrs += addrsofif;
940 }
941
942 return(addrs);
943 }
944
945 static int
946 ni6_store_addrs(ni6, nni6, ifp0, resid)
947 struct icmp6_nodeinfo *ni6, *nni6;
948 struct ifnet *ifp0;
949 int resid;
950 {
951 #ifdef __NetBSD__
952 register struct ifnet *ifp = ifp0 ? ifp0 : TAILQ_FIRST(&ifnet);
953 #else
954 register struct ifnet *ifp = ifp0 ? ifp0 : ifnet;
955 #endif
956 register struct in6_ifaddr *ifa6;
957 register struct ifaddr *ifa;
958 int docopy, copied = 0;
959 u_char *cp = (u_char *)(nni6 + 1);
960
961 if (ifp0 == NULL && !(ni6->ni_flags & NI_NODEADDR_FLAG_ALL))
962 return(0); /* needless to copy */
963
964 #ifdef __NetBSD__
965 for (; ifp; ifp = TAILQ_NEXT(ifp, if_list))
966 #else
967 for (; ifp; ifp = ifp->if_next)
968 #endif
969 {
970 #ifdef __NetBSD__
971 for (ifa = ifp->if_addrlist.tqh_first; ifa;
972 ifa = ifa->ifa_list.tqe_next)
973 #else
974 for (ifa = ifp->if_addrlist; ifa; ifa = ifa->ifa_next)
975 #endif
976 {
977 docopy = 0;
978
979 if (ifa->ifa_addr->sa_family != AF_INET6)
980 continue;
981 ifa6 = (struct in6_ifaddr *)ifa;
982
983 if (ifa6->ia6_flags & IN6_IFF_ANYCAST)
984 continue; /* we need only unicast addresses */
985
986 /* What do we have to do about ::1? */
987 switch(in6_addrscope(&ifa6->ia_addr.sin6_addr)) {
988 case IPV6_ADDR_SCOPE_LINKLOCAL:
989 if (ni6->ni_flags & NI_NODEADDR_FLAG_LINKLOCAL)
990 docopy = 1;
991 break;
992 case IPV6_ADDR_SCOPE_SITELOCAL:
993 if (ni6->ni_flags & NI_NODEADDR_FLAG_SITELOCAL)
994 docopy = 1;
995 break;
996 case IPV6_ADDR_SCOPE_GLOBAL:
997 if (ni6->ni_flags & NI_NODEADDR_FLAG_GLOBAL)
998 docopy = 1;
999 break;
1000 default:
1001 continue;
1002 }
1003
1004 if (docopy) {
1005 if (resid < sizeof(struct in6_addr)) {
1006 /*
1007 * We give up much more copy.
1008 * Set the truncate flag and return.
1009 */
1010 nni6->ni_flags |=
1011 NI_NODEADDR_FLAG_TRUNCATE;
1012 return(copied);
1013 }
1014 bcopy(&ifa6->ia_addr.sin6_addr, cp,
1015 sizeof(struct in6_addr));
1016 /* XXX: KAME link-local hack; remove ifindex */
1017 if (IN6_IS_ADDR_LINKLOCAL(&ifa6->ia_addr.sin6_addr))
1018 ((struct in6_addr *)cp)->s6_addr16[1] = 0;
1019 cp += sizeof(struct in6_addr);
1020 resid -= sizeof(struct in6_addr);
1021 copied += sizeof(struct in6_addr);
1022 }
1023 }
1024 if (ifp0) /* we need search only on the specified IF */
1025 break;
1026 }
1027
1028 return(copied);
1029 }
1030
1031 /*
1032 * XXX almost dup'ed code with rip6_input.
1033 */
1034 static int
1035 icmp6_rip6_input(mp, off)
1036 struct mbuf **mp;
1037 int off;
1038 {
1039 struct mbuf *m = *mp;
1040 register struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
1041 register struct in6pcb *in6p;
1042 struct in6pcb *last = NULL;
1043 struct sockaddr_in6 rip6src;
1044 struct icmp6_hdr *icmp6;
1045 struct mbuf *opts = NULL;
1046
1047 /* this is assumed to be safe. */
1048 icmp6 = (struct icmp6_hdr *)((caddr_t)ip6 + off);
1049
1050 bzero(&rip6src, sizeof(rip6src));
1051 rip6src.sin6_len = sizeof(struct sockaddr_in6);
1052 rip6src.sin6_family = AF_INET6;
1053 rip6src.sin6_addr = ip6->ip6_src;
1054 if (IN6_IS_SCOPE_LINKLOCAL(&rip6src.sin6_addr))
1055 rip6src.sin6_addr.s6_addr16[1] = 0;
1056 if (m->m_pkthdr.rcvif) {
1057 if (IN6_IS_SCOPE_LINKLOCAL(&rip6src.sin6_addr))
1058 rip6src.sin6_scope_id = m->m_pkthdr.rcvif->if_index;
1059 else
1060 rip6src.sin6_scope_id = 0;
1061 } else
1062 rip6src.sin6_scope_id = 0;
1063
1064 #if !defined(__FreeBSD__) || __FreeBSD__ < 3
1065 for (in6p = rawin6pcb.in6p_next;
1066 in6p != &rawin6pcb; in6p = in6p->in6p_next)
1067 #else
1068 LIST_FOREACH(in6p, &ripcb, inp_list)
1069 #endif
1070 {
1071 #if defined(__FreeBSD__) && __FreeBSD__ >= 3
1072 if ((in6p->inp_vflag & INP_IPV6) == NULL)
1073 continue;
1074 #endif
1075 if (in6p->in6p_ip6_nxt != IPPROTO_ICMPV6)
1076 continue;
1077 if (!IN6_IS_ADDR_ANY(&in6p->in6p_laddr) &&
1078 !IN6_ARE_ADDR_EQUAL(&in6p->in6p_laddr, &ip6->ip6_dst))
1079 continue;
1080 if (!IN6_IS_ADDR_ANY(&in6p->in6p_faddr) &&
1081 !IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr, &ip6->ip6_src))
1082 continue;
1083 if (in6p->in6p_icmp6filt
1084 && ICMP6_FILTER_WILLBLOCK(icmp6->icmp6_type,
1085 in6p->in6p_icmp6filt))
1086 continue;
1087 if (last) {
1088 struct mbuf *n;
1089 if ((n = m_copy(m, 0, (int)M_COPYALL)) != NULL) {
1090 if (last->in6p_flags & IN6P_CONTROLOPTS)
1091 ip6_savecontrol(last, &opts, ip6, n);
1092 /* strip intermediate headers */
1093 m_adj(n, off);
1094 if (sbappendaddr(&last->in6p_socket->so_rcv,
1095 (struct sockaddr *)&rip6src,
1096 n, opts) == 0) {
1097 /* should notify about lost packet */
1098 m_freem(n);
1099 if (opts)
1100 m_freem(opts);
1101 } else
1102 sorwakeup(last->in6p_socket);
1103 opts = NULL;
1104 }
1105 }
1106 last = in6p;
1107 }
1108 if (last) {
1109 if (last->in6p_flags & IN6P_CONTROLOPTS)
1110 ip6_savecontrol(last, &opts, ip6, m);
1111 /* strip intermediate headers */
1112 m_adj(m, off);
1113 if (sbappendaddr(&last->in6p_socket->so_rcv,
1114 (struct sockaddr *)&rip6src, m, opts) == 0) {
1115 m_freem(m);
1116 if (opts)
1117 m_freem(opts);
1118 } else
1119 sorwakeup(last->in6p_socket);
1120 } else {
1121 m_freem(m);
1122 ip6stat.ip6s_delivered--;
1123 }
1124 return IPPROTO_DONE;
1125 }
1126
1127 /*
1128 * Reflect the ip6 packet back to the source.
1129 * The caller MUST check if the destination is multicast or not.
1130 * This function is usually called with a unicast destination which
1131 * can be safely the source of the reply packet. But some exceptions
1132 * exist(e.g. ECHOREPLY, PATCKET_TOOBIG, "10" in OPTION type).
1133 * ``off'' points to the icmp6 header, counted from the top of the mbuf.
1134 */
1135 void
1136 icmp6_reflect(m, off)
1137 struct mbuf *m;
1138 size_t off;
1139 {
1140 struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
1141 struct icmp6_hdr *icmp6;
1142 struct in6_ifaddr *ia;
1143 struct in6_addr t, *src = 0;
1144 int plen = m->m_pkthdr.len - sizeof(struct ip6_hdr);
1145 #ifdef COMPAT_RFC1885
1146 int mtu = IPV6_MMTU;
1147 struct sockaddr_in6 *sin6 = &icmp6_reflect_rt.ro_dst;
1148 #endif
1149
1150 /*
1151 * If there are extra headers between IPv6 and ICMPv6, strip
1152 * off that header first.
1153 */
1154 if (off != sizeof(struct ip6_hdr)) {
1155 size_t siz;
1156
1157 /* sanity checks */
1158 if (off < sizeof(struct ip6_hdr)) {
1159 printf("sanity fail: off=%x, sizeof(ip6)=%x in %s:%d\n",
1160 (unsigned int)off,
1161 (unsigned int)sizeof(struct ip6_hdr),
1162 __FILE__, __LINE__);
1163 goto bad;
1164 }
1165 siz = off - sizeof(struct ip6_hdr);
1166 if (plen < siz) {
1167 printf("sanity fail: siz=%x, payloadlen=%x in %s:%d\n",
1168 (unsigned int)siz, plen, __FILE__, __LINE__);
1169 goto bad;
1170 }
1171 IP6_EXTHDR_CHECK(m, 0, off, /*nothing*/);
1172 IP6_EXTHDR_CHECK(m, off, sizeof(struct icmp6_hdr), /*nothing*/);
1173
1174 bcopy((caddr_t)ip6,
1175 (caddr_t)(mtod(m, u_char *) + siz),
1176 sizeof(struct ip6_hdr));
1177 m->m_data += siz;
1178 m->m_len -= siz;
1179 m->m_pkthdr.len -= siz;
1180 ip6 = mtod(m, struct ip6_hdr *);
1181 ip6->ip6_nxt = IPPROTO_ICMPV6;
1182 plen -= siz;
1183 }
1184
1185 icmp6 = (struct icmp6_hdr *)(ip6 + 1);
1186
1187 t = ip6->ip6_dst;
1188 /*
1189 * ip6_input() drops a packet if its src is multicast.
1190 * So, the src is never multicast.
1191 */
1192 ip6->ip6_dst = ip6->ip6_src;
1193
1194 /* XXX hack for link-local addresses */
1195 if (IN6_IS_ADDR_LINKLOCAL(&ip6->ip6_dst))
1196 ip6->ip6_dst.s6_addr16[1] =
1197 htons(m->m_pkthdr.rcvif->if_index);
1198 if (IN6_IS_ADDR_LINKLOCAL(&t))
1199 t.s6_addr16[1] = htons(m->m_pkthdr.rcvif->if_index);
1200
1201 #ifdef COMPAT_RFC1885
1202 /*
1203 * xxx guess MTU
1204 * RFC 1885 requires that echo reply should be truncated if it
1205 * does not fit in with (return) path MTU, but the description was
1206 * removed in the new spec.
1207 */
1208 if (icmp6_reflect_rt.ro_rt == 0 ||
1209 ! (IN6_ARE_ADDR_EQUAL(&sin6->sin6_addr, &ip6->ip6_dst))) {
1210 if (icmp6_reflect_rt.ro_rt) {
1211 #ifdef __FreeBSD__
1212 RTFREE(icmp6_reflect_rt.ro_rt);
1213 #endif
1214 #ifdef __bsdi__
1215 rtfree(icmp6_reflect_rt.ro_rt);
1216 #endif
1217 icmp6_reflect_rt.ro_rt = 0;
1218 }
1219 bzero(sin6, sizeof(*sin6));
1220 sin6->sin6_family = PF_INET6;
1221 sin6->sin6_len = sizeof(struct sockaddr_in6);
1222 sin6->sin6_addr = ip6->ip6_dst;
1223
1224 #ifdef __NetBSD__
1225 rtalloc((struct route *)&icmp6_reflect_rt.ro_rt);
1226 #else
1227 rtalloc_ign((struct route *)&icmp6_reflect_rt.ro_rt,
1228 RTF_PRCLONING);
1229 #endif
1230 }
1231
1232 if (icmp6_reflect_rt.ro_rt == 0)
1233 goto bad;
1234
1235 if ((icmp6_reflect_rt.ro_rt->rt_flags & RTF_HOST)
1236 && mtu < icmp6_reflect_rt.ro_rt->rt_ifp->if_mtu)
1237 mtu = icmp6_reflect_rt.ro_rt->rt_rmx.rmx_mtu;
1238
1239 if (mtu < m->m_pkthdr.len) {
1240 plen -= (m->m_pkthdr.len - mtu);
1241 m_adj(m, mtu - m->m_pkthdr.len);
1242 }
1243 #endif
1244 /*
1245 * If the incoming packet was addressed directly to us(i.e. unicast),
1246 * use dst as the src for the reply.
1247 */
1248 for (ia = in6_ifaddr; ia; ia = ia->ia_next)
1249 if (IN6_ARE_ADDR_EQUAL(&t, &ia->ia_addr.sin6_addr) &&
1250 (ia->ia6_flags & IN6_IFF_ANYCAST) == 0) {
1251 src = &t;
1252 break;
1253 }
1254 if (ia == NULL && IN6_IS_ADDR_LINKLOCAL(&t) && (m->m_flags & M_LOOP)) {
1255 /*
1256 * This is the case if the dst is our link-local address
1257 * and the sender is also ourseleves.
1258 */
1259 src = &t;
1260 }
1261
1262 if (src == 0)
1263 /*
1264 * We have not multicast routing yet. So this case matches
1265 * to our multicast, our anycast or not to our unicast.
1266 * Select a source address which has the same scope.
1267 */
1268 if ((ia = in6_ifawithscope(m->m_pkthdr.rcvif, &t)) != 0)
1269 src = &IA6_SIN6(ia)->sin6_addr;
1270
1271 if (src == 0)
1272 goto bad;
1273
1274 ip6->ip6_src = *src;
1275
1276 ip6->ip6_flow = 0;
1277 ip6->ip6_vfc = IPV6_VERSION;
1278 ip6->ip6_nxt = IPPROTO_ICMPV6;
1279 if (m->m_pkthdr.rcvif) {
1280 /* XXX: This may not be the outgoing interface */
1281 ip6->ip6_hlim = nd_ifinfo[m->m_pkthdr.rcvif->if_index].chlim;
1282 }
1283
1284 icmp6->icmp6_cksum = 0;
1285 icmp6->icmp6_cksum = in6_cksum(m, IPPROTO_ICMPV6,
1286 sizeof(struct ip6_hdr), plen);
1287
1288 /*
1289 * xxx option handling
1290 */
1291
1292 m->m_flags &= ~(M_BCAST|M_MCAST);
1293 #ifdef IPSEC
1294 m->m_pkthdr.rcvif = NULL;
1295 #endif /*IPSEC*/
1296
1297 #ifdef COMPAT_RFC1885
1298 ip6_output(m, NULL, &icmp6_reflect_rt, 0, NULL);
1299 #else
1300 ip6_output(m, NULL, NULL, 0, NULL);
1301 #endif
1302
1303 return;
1304
1305 bad:
1306 m_freem(m);
1307 return;
1308 }
1309
1310 void
1311 icmp6_fasttimo()
1312 {
1313 mld6_fasttimeo();
1314 }
1315
1316 void
1317 icmp6_redirect_input(m, off)
1318 register struct mbuf *m;
1319 int off;
1320 {
1321 struct ifnet *ifp = m->m_pkthdr.rcvif;
1322 struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
1323 struct nd_redirect *nd_rd = (struct nd_redirect *)((caddr_t)ip6 + off);
1324 int icmp6len = ntohs(ip6->ip6_plen);
1325 char *lladdr = NULL;
1326 int lladdrlen = 0;
1327 u_char *redirhdr = NULL;
1328 int redirhdrlen = 0;
1329 struct rtentry *rt = NULL;
1330 int is_router;
1331 int is_onlink;
1332 struct in6_addr src6 = ip6->ip6_src;
1333 struct in6_addr redtgt6 = nd_rd->nd_rd_target;
1334 struct in6_addr reddst6 = nd_rd->nd_rd_dst;
1335 union nd_opts ndopts;
1336
1337 if (!m || !ifp)
1338 return;
1339
1340 /* XXX if we are router, we don't update route by icmp6 redirect */
1341 if (ip6_forwarding)
1342 return;
1343 if (!icmp6_rediraccept)
1344 return;
1345
1346 if (IN6_IS_ADDR_LINKLOCAL(&redtgt6))
1347 redtgt6.s6_addr16[1] = htons(ifp->if_index);
1348 if (IN6_IS_ADDR_LINKLOCAL(&reddst6))
1349 reddst6.s6_addr16[1] = htons(ifp->if_index);
1350
1351 /* validation */
1352 if (!IN6_IS_ADDR_LINKLOCAL(&src6)) {
1353 log(LOG_ERR,
1354 "ICMP6 redirect sent from %s rejected; "
1355 "must be from linklocal\n", ip6_sprintf(&src6));
1356 return;
1357 }
1358 if (ip6->ip6_hlim != 255) {
1359 log(LOG_ERR,
1360 "ICMP6 redirect sent from %s rejected; "
1361 "hlim=%d (must be 255)\n",
1362 ip6_sprintf(&src6), ip6->ip6_hlim);
1363 return;
1364 }
1365 {
1366 /* ip6->ip6_src must be equal to gw for icmp6->icmp6_reddst */
1367 struct sockaddr_in6 sin6;
1368 struct in6_addr *gw6;
1369
1370 bzero(&sin6, sizeof(sin6));
1371 sin6.sin6_family = AF_INET6;
1372 sin6.sin6_len = sizeof(struct sockaddr_in6);
1373 bcopy(&reddst6, &sin6.sin6_addr, sizeof(reddst6));
1374 rt = rtalloc1((struct sockaddr *)&sin6, 0
1375 #ifdef __FreeBSD__
1376 , 0UL
1377 #endif
1378 );
1379 if (rt) {
1380 gw6 = &(((struct sockaddr_in6 *)rt->rt_gateway)->sin6_addr);
1381 if (bcmp(&src6, gw6, sizeof(struct in6_addr)) != 0) {
1382 log(LOG_ERR,
1383 "ICMP6 redirect sent from %s rejected; "
1384 "ip src=%s, gw for %s=%s (must be same)\n",
1385 ip6_sprintf(&src6), ip6_sprintf(&src6),
1386 ip6_sprintf(&reddst6), ip6_sprintf(gw6));
1387 RTFREE(rt);
1388 return;
1389 }
1390 } else {
1391 log(LOG_ERR,
1392 "ICMP6 redirect sent from %s rejected; "
1393 "no route found for redirect destination %s\n",
1394 ip6_sprintf(&src6), ip6_sprintf(&reddst6));
1395 return;
1396 }
1397 RTFREE(rt);
1398 rt = NULL;
1399 }
1400 if (IN6_IS_ADDR_MULTICAST(&reddst6)) {
1401 log(LOG_ERR,
1402 "ICMP6 redirect sent from %s rejected; "
1403 "redirect destination=%s (must be unicast)\n",
1404 ip6_sprintf(&src6), ip6_sprintf(&reddst6));
1405 return;
1406 }
1407
1408 is_router = is_onlink = 0;
1409 if (IN6_IS_ADDR_LINKLOCAL(&redtgt6))
1410 is_router = 1; /* router case */
1411 if (bcmp(&redtgt6, &reddst6, sizeof(redtgt6)) == 0)
1412 is_onlink = 1; /* on-link destination case */
1413 if (!is_router && !is_onlink) {
1414 log(LOG_ERR,
1415 "ICMP6 redirect sent from %s rejected; "
1416 "redirect target=%s, destination=%s\n",
1417 ip6_sprintf(&src6), ip6_sprintf(&redtgt6),
1418 ip6_sprintf(&reddst6));
1419 return;
1420 }
1421 /* validation passed */
1422
1423 icmp6len -= sizeof(*nd_rd);
1424 nd6_option_init(nd_rd + 1, icmp6len, &ndopts);
1425 if (nd6_options(&ndopts) < 0) {
1426 log(LOG_INFO, "icmp6_redirect_input: "
1427 "invalid ND option, rejected\n");
1428 return;
1429 }
1430
1431 if (ndopts.nd_opts_tgt_lladdr) {
1432 lladdr = (char *)(ndopts.nd_opts_tgt_lladdr + 1);
1433 lladdrlen = ndopts.nd_opts_tgt_lladdr->nd_opt_len << 3;
1434 }
1435
1436 if (ndopts.nd_opts_rh) {
1437 redirhdrlen = ndopts.nd_opts_rh->nd_opt_rh_len;
1438 redirhdr = (u_char *)(ndopts.nd_opts_rh + 1); /* xxx */
1439 }
1440
1441 if (lladdr && ((ifp->if_addrlen + 2 + 7) & ~7) != lladdrlen) {
1442 log(LOG_INFO,
1443 "icmp6_redirect_input: lladdrlen mismatch for %s "
1444 "(if %d, icmp6 packet %d)\n",
1445 ip6_sprintf(&redtgt6), ifp->if_addrlen, lladdrlen - 2);
1446 }
1447
1448 /* RFC 2461 8.3 */
1449 nd6_cache_lladdr(ifp, &redtgt6, lladdr, lladdrlen, ND_REDIRECT);
1450
1451 if (!is_onlink) { /* better router case. perform rtredirect. */
1452 /* perform rtredirect */
1453 struct sockaddr_in6 sdst;
1454 struct sockaddr_in6 sgw;
1455 struct sockaddr_in6 ssrc;
1456 #ifdef __bsdi__
1457 extern int icmp_redirtimeout; /*XXX*/
1458 #endif
1459
1460 bzero(&sdst, sizeof(sdst));
1461 bzero(&sgw, sizeof(sgw));
1462 bzero(&ssrc, sizeof(ssrc));
1463 sdst.sin6_family = sgw.sin6_family = ssrc.sin6_family = AF_INET6;
1464 sdst.sin6_len = sgw.sin6_len = ssrc.sin6_len =
1465 sizeof(struct sockaddr_in6);
1466 bcopy(&redtgt6, &sgw.sin6_addr, sizeof(struct in6_addr));
1467 bcopy(&reddst6, &sdst.sin6_addr, sizeof(struct in6_addr));
1468 bcopy(&src6, &ssrc.sin6_addr, sizeof(struct in6_addr));
1469 rtredirect((struct sockaddr *)&sdst, (struct sockaddr *)&sgw,
1470 (struct sockaddr *)NULL, RTF_GATEWAY | RTF_HOST,
1471 (struct sockaddr *)&ssrc,
1472 #if defined(__FreeBSD__) || defined(__NetBSD__)
1473 (struct rtentry **)NULL
1474 #elif defined(__bsdi__)
1475 icmp_redirtimeout /*XXX*/
1476 #endif /*__FreeBSD__, __NetBSD__, __bsdi__*/
1477 );
1478 }
1479 /* finally update cached route in each socket via pfctlinput */
1480 {
1481 struct sockaddr_in6 sdst;
1482
1483 bzero(&sdst, sizeof(sdst));
1484 sdst.sin6_family = AF_INET6;
1485 sdst.sin6_len = sizeof(struct sockaddr_in6);
1486 bcopy(&reddst6, &sdst.sin6_addr, sizeof(struct in6_addr));
1487 pfctlinput(PRC_REDIRECT_HOST, (struct sockaddr *)&sdst);
1488 #ifdef IPSEC
1489 key_sa_routechange((struct sockaddr *)&sdst);
1490 #endif
1491 }
1492 }
1493
1494 void
1495 icmp6_redirect_output(m0, rt)
1496 struct mbuf *m0;
1497 struct rtentry *rt;
1498 {
1499 struct ifnet *ifp; /* my outgoing interface */
1500 struct in6_addr *ifp_ll6;
1501 struct in6_addr *router_ll6;
1502 struct ip6_hdr *sip6; /* m0 as struct ip6_hdr */
1503 struct mbuf *m = NULL; /* newly allocated one */
1504 struct ip6_hdr *ip6; /* m as struct ip6_hdr */
1505 struct nd_redirect *nd_rd;
1506 size_t maxlen;
1507 u_char *p;
1508
1509 /* if we are not router, we don't send icmp6 redirect */
1510 if (!ip6_forwarding || ip6_accept_rtadv)
1511 goto fail;
1512
1513 /* sanity check */
1514 if (!m0 || !rt || !(rt->rt_flags & RTF_UP) || !(ifp = rt->rt_ifp))
1515 goto fail;
1516
1517 /*
1518 * Address check:
1519 * the source address must identify a neighbor, and
1520 * the destination address must not be a multicast address
1521 * [RFC 2461, sec 8.2]
1522 */
1523 sip6 = mtod(m0, struct ip6_hdr *);
1524 if (nd6_is_addr_neighbor(&sip6->ip6_src, ifp) == 0)
1525 goto fail;
1526 if (IN6_IS_ADDR_MULTICAST(&sip6->ip6_dst))
1527 goto fail; /* what should we do here? */
1528
1529 /* rate limit */
1530 if (icmp6_ratelimit(&sip6->ip6_src, ND_REDIRECT, 0))
1531 goto fail;
1532
1533 /*
1534 * Since we are going to append up to 1280 bytes (= IPV6_MMTU),
1535 * we almost always ask for an mbuf cluster for simplicity.
1536 * (MHLEN < IPV6_MMTU is almost always true)
1537 */
1538 MGETHDR(m, M_DONTWAIT, MT_HEADER);
1539 if (!m)
1540 goto fail;
1541 if (MHLEN < IPV6_MMTU)
1542 MCLGET(m, M_DONTWAIT);
1543 maxlen = (m->m_flags & M_EXT) ? MCLBYTES : MHLEN;
1544 maxlen = min(IPV6_MMTU, maxlen);
1545 /* just for safety */
1546 if (maxlen < sizeof(struct ip6_hdr) + sizeof(struct icmp6_hdr))
1547 goto fail;
1548
1549 {
1550 /* get ip6 linklocal address for ifp(my outgoing interface). */
1551 struct in6_ifaddr *ia = in6ifa_ifpforlinklocal(ifp);
1552 if (ia == NULL)
1553 goto fail;
1554 ifp_ll6 = &ia->ia_addr.sin6_addr;
1555 }
1556
1557 /* get ip6 linklocal address for the router. */
1558 if (rt->rt_gateway && (rt->rt_flags & RTF_GATEWAY)) {
1559 struct sockaddr_in6 *sin6;
1560 sin6 = (struct sockaddr_in6 *)rt->rt_gateway;
1561 router_ll6 = &sin6->sin6_addr;
1562 if (!IN6_IS_ADDR_LINKLOCAL(router_ll6))
1563 router_ll6 = (struct in6_addr *)NULL;
1564 } else
1565 router_ll6 = (struct in6_addr *)NULL;
1566
1567 /* ip6 */
1568 ip6 = mtod(m, struct ip6_hdr *);
1569 ip6->ip6_flow = 0;
1570 ip6->ip6_vfc = IPV6_VERSION;
1571 /* ip6->ip6_plen will be set later */
1572 ip6->ip6_nxt = IPPROTO_ICMPV6;
1573 ip6->ip6_hlim = 255;
1574 /* ip6->ip6_src must be linklocal addr for my outgoing if. */
1575 bcopy(ifp_ll6, &ip6->ip6_src, sizeof(struct in6_addr));
1576 bcopy(&sip6->ip6_src, &ip6->ip6_dst, sizeof(struct in6_addr));
1577
1578 /* ND Redirect */
1579 nd_rd = (struct nd_redirect *)(ip6 + 1);
1580 nd_rd->nd_rd_type = ND_REDIRECT;
1581 nd_rd->nd_rd_code = 0;
1582 nd_rd->nd_rd_reserved = 0;
1583 if (rt->rt_flags & RTF_GATEWAY) {
1584 /*
1585 * nd_rd->nd_rd_target must be a link-local address in
1586 * better router cases.
1587 */
1588 if (!router_ll6)
1589 goto fail;
1590 bcopy(router_ll6, &nd_rd->nd_rd_target,
1591 sizeof(nd_rd->nd_rd_target));
1592 bcopy(&sip6->ip6_dst, &nd_rd->nd_rd_dst,
1593 sizeof(nd_rd->nd_rd_dst));
1594 } else {
1595 /* make sure redtgt == reddst */
1596 bcopy(&sip6->ip6_dst, &nd_rd->nd_rd_target,
1597 sizeof(nd_rd->nd_rd_target));
1598 bcopy(&sip6->ip6_dst, &nd_rd->nd_rd_dst,
1599 sizeof(nd_rd->nd_rd_dst));
1600 }
1601
1602 p = (u_char *)(nd_rd + 1);
1603
1604 if (!router_ll6)
1605 goto nolladdropt;
1606
1607 {
1608 /* target lladdr option */
1609 struct rtentry *rt_router = NULL;
1610 int len;
1611 struct sockaddr_dl *sdl;
1612 struct nd_opt_hdr *nd_opt;
1613 char *lladdr;
1614
1615 rt_router = nd6_lookup(router_ll6, 0, ifp);
1616 if (!rt_router)
1617 goto nolladdropt;
1618 if (!(rt_router->rt_flags & RTF_GATEWAY)
1619 && (rt_router->rt_flags & RTF_LLINFO)
1620 && (rt_router->rt_gateway->sa_family == AF_LINK)
1621 && (sdl = (struct sockaddr_dl *)rt_router->rt_gateway)) {
1622 nd_opt = (struct nd_opt_hdr *)p;
1623 nd_opt->nd_opt_type = ND_OPT_TARGET_LINKADDR;
1624 len = 2 + ifp->if_addrlen;
1625 len = (len + 7) & ~7; /*round by 8*/
1626 nd_opt->nd_opt_len = len >> 3;
1627 p += len;
1628 lladdr = (char *)(nd_opt + 1);
1629 bcopy(LLADDR(sdl), lladdr, ifp->if_addrlen);
1630 }
1631 }
1632 nolladdropt:;
1633
1634 m->m_pkthdr.len = m->m_len = p - (u_char *)ip6;
1635
1636 /* just to be safe */
1637 if (m0->m_flags & M_DECRYPTED)
1638 goto noredhdropt;
1639
1640 {
1641 /* redirected header option */
1642 int len;
1643 struct nd_opt_rd_hdr *nd_opt_rh;
1644
1645 /*
1646 * compute the maximum size for icmp6 redirect header option.
1647 * XXX room for auth header?
1648 */
1649 len = maxlen - (p - (u_char *)ip6);
1650 len &= ~7;
1651
1652 /* This is just for simplicity. */
1653 if (m0->m_pkthdr.len != m0->m_len) {
1654 if (m0->m_next) {
1655 m_freem(m0->m_next);
1656 m0->m_next = NULL;
1657 }
1658 m0->m_pkthdr.len = m0->m_len;
1659 }
1660
1661 /*
1662 * Redirected header option spec (RFC2461 4.6.3) talks nothing
1663 * about padding/trancate rule for the original IP packet.
1664 * From the discussion on IPv6imp in Feb 1999, the consensus was:
1665 * - "attach as much as possible" is the goal
1666 * - pad if not aligned (original size can be guessed by original
1667 * ip6 header)
1668 * Following code adds the padding if it is simple enough,
1669 * and truncates if not.
1670 */
1671 if (m0->m_next || m0->m_pkthdr.len != m0->m_len)
1672 panic("assumption failed in %s:%d\n", __FILE__, __LINE__);
1673
1674 if (len - sizeof(*nd_opt_rh) < m0->m_pkthdr.len) {
1675 /* not enough room, truncate */
1676 m0->m_pkthdr.len = m0->m_len = len - sizeof(*nd_opt_rh);
1677 } else {
1678 /* enough room, pad or truncate */
1679 size_t extra;
1680
1681 extra = m0->m_pkthdr.len % 8;
1682 if (extra) {
1683 /* pad if easy enough, truncate if not */
1684 if (8 - extra <= M_TRAILINGSPACE(m0)) {
1685 /* pad */
1686 m0->m_len += (8 - extra);
1687 m0->m_pkthdr.len += (8 - extra);
1688 } else {
1689 /* truncate */
1690 m0->m_pkthdr.len -= extra;
1691 m0->m_len -= extra;
1692 }
1693 }
1694 len = m0->m_pkthdr.len + sizeof(*nd_opt_rh);
1695 m0->m_pkthdr.len = m0->m_len = len - sizeof(*nd_opt_rh);
1696 }
1697
1698 nd_opt_rh = (struct nd_opt_rd_hdr *)p;
1699 bzero(nd_opt_rh, sizeof(*nd_opt_rh));
1700 nd_opt_rh->nd_opt_rh_type = ND_OPT_REDIRECTED_HEADER;
1701 nd_opt_rh->nd_opt_rh_len = len >> 3;
1702 p += sizeof(*nd_opt_rh);
1703 m->m_pkthdr.len = m->m_len = p - (u_char *)ip6;
1704
1705 /* connect m0 to m */
1706 m->m_next = m0;
1707 m->m_pkthdr.len = m->m_len + m0->m_len;
1708 }
1709 noredhdropt:;
1710
1711 if (IN6_IS_ADDR_LINKLOCAL(&sip6->ip6_src))
1712 sip6->ip6_src.s6_addr16[1] = 0;
1713 if (IN6_IS_ADDR_LINKLOCAL(&sip6->ip6_dst))
1714 sip6->ip6_dst.s6_addr16[1] = 0;
1715 #if 0
1716 if (IN6_IS_ADDR_LINKLOCAL(&ip6->ip6_src))
1717 ip6->ip6_src.s6_addr16[1] = 0;
1718 if (IN6_IS_ADDR_LINKLOCAL(&ip6->ip6_dst))
1719 ip6->ip6_dst.s6_addr16[1] = 0;
1720 #endif
1721 if (IN6_IS_ADDR_LINKLOCAL(&nd_rd->nd_rd_target))
1722 nd_rd->nd_rd_target.s6_addr16[1] = 0;
1723 if (IN6_IS_ADDR_LINKLOCAL(&nd_rd->nd_rd_dst))
1724 nd_rd->nd_rd_dst.s6_addr16[1] = 0;
1725
1726 ip6->ip6_plen = htons(m->m_pkthdr.len - sizeof(struct ip6_hdr));
1727
1728 nd_rd->nd_rd_cksum = 0;
1729 nd_rd->nd_rd_cksum
1730 = in6_cksum(m, IPPROTO_ICMPV6, sizeof(*ip6), ntohs(ip6->ip6_plen));
1731
1732 /* send the packet to outside... */
1733 #ifdef IPSEC
1734 m->m_pkthdr.rcvif = NULL;
1735 #endif /*IPSEC*/
1736 ip6_output(m, NULL, NULL, 0, NULL);
1737 icmp6stat.icp6s_outhist[ND_REDIRECT]++;
1738
1739 return;
1740
1741 fail:
1742 if (m)
1743 m_freem(m);
1744 if (m0)
1745 m_freem(m0);
1746 }
1747
1748 /*
1749 * ICMPv6 socket option processing.
1750 */
1751 int
1752 icmp6_ctloutput(op, so, level, optname, mp)
1753 int op;
1754 struct socket *so;
1755 int level, optname;
1756 struct mbuf **mp;
1757 {
1758 register struct in6pcb *in6p = sotoin6pcb(so);
1759 register struct mbuf *m = *mp;
1760 int error = 0;
1761
1762 if (level != IPPROTO_ICMPV6) {
1763 error = EINVAL;
1764 if (op == PRCO_SETOPT && m)
1765 (void)m_free(m);
1766 } else switch(op) {
1767 case PRCO_SETOPT:
1768 switch (optname) {
1769 case ICMP6_FILTER:
1770 {
1771 struct icmp6_filter *p;
1772
1773 p = mtod(m, struct icmp6_filter *);
1774 if (!p || !in6p->in6p_icmp6filt) {
1775 error = EINVAL;
1776 break;
1777 }
1778 bcopy(p, in6p->in6p_icmp6filt,
1779 sizeof(struct icmp6_filter));
1780 error = 0;
1781 break;
1782 }
1783
1784 default:
1785 error = ENOPROTOOPT;
1786 break;
1787 }
1788 if (m)
1789 (void)m_free(m);
1790 break;
1791
1792 case PRCO_GETOPT:
1793 switch (optname) {
1794 case ICMP6_FILTER:
1795 {
1796 struct icmp6_filter *p;
1797
1798 p = mtod(m, struct icmp6_filter *);
1799 if (!p || !in6p->in6p_icmp6filt) {
1800 error = EINVAL;
1801 break;
1802 }
1803 bcopy(in6p->in6p_icmp6filt, p,
1804 sizeof(struct icmp6_filter));
1805 error = 0;
1806 break;
1807 }
1808
1809 default:
1810 error = ENOPROTOOPT;
1811 break;
1812 }
1813 break;
1814 }
1815
1816 return(error);
1817 }
1818
1819 /*
1820 * Perform rate limit check.
1821 * Returns 0 if it is okay to send the icmp6 packet.
1822 * Returns 1 if the router SHOULD NOT send this icmp6 packet due to rate
1823 * limitation.
1824 *
1825 * XXX per-destination/type check necessary?
1826 */
1827 static int
1828 icmp6_ratelimit(dst, type, code)
1829 const struct in6_addr *dst; /* not used at this moment */
1830 const int type; /* not used at this moment */
1831 const int code; /* not used at this moment */
1832 {
1833 struct timeval tp;
1834 long sec_diff, usec_diff;
1835
1836 /* If we are not doing rate limitation, it is always okay to send */
1837 if (!icmp6errratelim)
1838 return 0;
1839
1840 #if defined(__FreeBSD__) && __FreeBSD__ >= 3
1841 microtime(&tp);
1842 tp.tv_sec = time_second;
1843 #else
1844 tp = time;
1845 #endif
1846 if (tp.tv_sec < icmp6_nextsend.tv_sec
1847 || (tp.tv_sec == icmp6_nextsend.tv_sec
1848 && tp.tv_usec < icmp6_nextsend.tv_usec)) {
1849 /* The packet is subject to rate limit */
1850 return 1;
1851 }
1852 sec_diff = icmp6errratelim / 1000000;
1853 usec_diff = icmp6errratelim % 1000000;
1854 icmp6_nextsend.tv_sec = tp.tv_sec + sec_diff;
1855 if ((tp.tv_usec = tp.tv_usec + usec_diff) >= 1000000) {
1856 icmp6_nextsend.tv_sec++;
1857 icmp6_nextsend.tv_usec -= 1000000;
1858 }
1859
1860 /* it is okay to send this */
1861 return 0;
1862 }
1863
1864 #ifdef __bsdi__
1865 void
1866 icmp6_mtuexpire(rt, rtt)
1867 struct rtentry *rt;
1868 struct rttimer *rtt;
1869 {
1870 rt->rt_flags |= RTF_PROBEMTU;
1871 Free(rtt);
1872 }
1873
1874 int *icmp6_sysvars[] = ICMPV6CTL_VARS;
1875
1876 int
1877 icmp6_sysctl(name, namelen, oldp, oldlenp, newp, newlen)
1878 int *name;
1879 u_int namelen;
1880 void *oldp;
1881 size_t *oldlenp;
1882 void *newp;
1883 size_t newlen;
1884 {
1885 if (name[0] >= ICMPV6CTL_MAXID)
1886 return (EOPNOTSUPP);
1887 switch (name[0]) {
1888 #if 0
1889 ICMPV6CTL_ND6_PRUNE:
1890 ICMPV6CTL_ND6_DELAY:
1891 ICMPV6CTL_ND6_UMAXTRIES:
1892 ICMPV6CTL_ND6_MMAXTRIES:
1893 ICMPV6CTL_ND6_USELOOPBACK:
1894 ICMPV6CTL_ND6_PROXYALL:
1895 /* need to check the value. */
1896 #endif
1897 case ICMPV6CTL_STATS:
1898 return sysctl_rdtrunc(oldp, oldlenp, newp, &icmp6stat,
1899 sizeof(icmp6stat));
1900
1901 default:
1902 return (sysctl_int_arr(icmp6_sysvars, name, namelen,
1903 oldp, oldlenp, newp, newlen));
1904 }
1905 }
1906 #endif /*__bsdi__*/
1907
1908 #ifdef __NetBSD__
1909 #include <vm/vm.h>
1910 #include <sys/sysctl.h>
1911 int
1912 icmp6_sysctl(name, namelen, oldp, oldlenp, newp, newlen)
1913 int *name;
1914 u_int namelen;
1915 void *oldp;
1916 size_t *oldlenp;
1917 void *newp;
1918 size_t newlen;
1919 {
1920
1921 /* All sysctl names at this level are terminal. */
1922 if (namelen != 1)
1923 return ENOTDIR;
1924
1925 switch (name[0]) {
1926
1927 case ICMPV6CTL_REDIRACCEPT:
1928 return sysctl_int(oldp, oldlenp, newp, newlen,
1929 &icmp6_rediraccept);
1930 case ICMPV6CTL_REDIRTIMEOUT:
1931 return sysctl_int(oldp, oldlenp, newp, newlen,
1932 &icmp6_redirtimeout);
1933 case ICMPV6CTL_STATS:
1934 return sysctl_rdstruct(oldp, oldlenp, newp,
1935 &icmp6stat, sizeof(icmp6stat));
1936 case ICMPV6CTL_ERRRATELIMIT:
1937 return sysctl_int(oldp, oldlenp, newp, newlen,
1938 &icmp6errratelim);
1939 case ICMPV6CTL_ND6_PRUNE:
1940 return sysctl_int(oldp, oldlenp, newp, newlen, &nd6_prune);
1941 case ICMPV6CTL_ND6_DELAY:
1942 return sysctl_int(oldp, oldlenp, newp, newlen, &nd6_delay);
1943 case ICMPV6CTL_ND6_UMAXTRIES:
1944 return sysctl_int(oldp, oldlenp, newp, newlen, &nd6_umaxtries);
1945 case ICMPV6CTL_ND6_MMAXTRIES:
1946 return sysctl_int(oldp, oldlenp, newp, newlen, &nd6_mmaxtries);
1947 case ICMPV6CTL_ND6_USELOOPBACK:
1948 return sysctl_int(oldp, oldlenp, newp, newlen,
1949 &nd6_useloopback);
1950 case ICMPV6CTL_ND6_PROXYALL:
1951 return sysctl_int(oldp, oldlenp, newp, newlen, &nd6_proxyall);
1952 default:
1953 return ENOPROTOOPT;
1954 }
1955 /* NOTREACHED */
1956 }
1957 #endif /* __NetBSD__ */
1958