raw_ip6.c revision 1.132 1 1.132 rtr /* $NetBSD: raw_ip6.c,v 1.132 2014/07/31 03:39:35 rtr Exp $ */
2 1.34 itojun /* $KAME: raw_ip6.c,v 1.82 2001/07/23 18:57:56 jinmei Exp $ */
3 1.3 thorpej
4 1.2 itojun /*
5 1.2 itojun * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6 1.2 itojun * All rights reserved.
7 1.24 itojun *
8 1.2 itojun * Redistribution and use in source and binary forms, with or without
9 1.2 itojun * modification, are permitted provided that the following conditions
10 1.2 itojun * are met:
11 1.2 itojun * 1. Redistributions of source code must retain the above copyright
12 1.2 itojun * notice, this list of conditions and the following disclaimer.
13 1.2 itojun * 2. Redistributions in binary form must reproduce the above copyright
14 1.2 itojun * notice, this list of conditions and the following disclaimer in the
15 1.2 itojun * documentation and/or other materials provided with the distribution.
16 1.2 itojun * 3. Neither the name of the project nor the names of its contributors
17 1.2 itojun * may be used to endorse or promote products derived from this software
18 1.2 itojun * without specific prior written permission.
19 1.24 itojun *
20 1.2 itojun * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21 1.2 itojun * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 1.2 itojun * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 1.2 itojun * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 1.2 itojun * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 1.2 itojun * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 1.2 itojun * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 1.2 itojun * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 1.2 itojun * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 1.2 itojun * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 1.2 itojun * SUCH DAMAGE.
31 1.2 itojun */
32 1.2 itojun
33 1.2 itojun /*
34 1.2 itojun * Copyright (c) 1982, 1986, 1988, 1993
35 1.2 itojun * The Regents of the University of California. All rights reserved.
36 1.2 itojun *
37 1.2 itojun * Redistribution and use in source and binary forms, with or without
38 1.2 itojun * modification, are permitted provided that the following conditions
39 1.2 itojun * are met:
40 1.2 itojun * 1. Redistributions of source code must retain the above copyright
41 1.2 itojun * notice, this list of conditions and the following disclaimer.
42 1.2 itojun * 2. Redistributions in binary form must reproduce the above copyright
43 1.2 itojun * notice, this list of conditions and the following disclaimer in the
44 1.2 itojun * documentation and/or other materials provided with the distribution.
45 1.55 agc * 3. Neither the name of the University nor the names of its contributors
46 1.2 itojun * may be used to endorse or promote products derived from this software
47 1.2 itojun * without specific prior written permission.
48 1.2 itojun *
49 1.2 itojun * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
50 1.2 itojun * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
51 1.2 itojun * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
52 1.2 itojun * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
53 1.2 itojun * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
54 1.2 itojun * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
55 1.2 itojun * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
56 1.2 itojun * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
57 1.2 itojun * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
58 1.2 itojun * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
59 1.2 itojun * SUCH DAMAGE.
60 1.2 itojun *
61 1.2 itojun * @(#)raw_ip.c 8.2 (Berkeley) 1/4/94
62 1.2 itojun */
63 1.39 lukem
64 1.39 lukem #include <sys/cdefs.h>
65 1.132 rtr __KERNEL_RCSID(0, "$NetBSD: raw_ip6.c,v 1.132 2014/07/31 03:39:35 rtr Exp $");
66 1.6 thorpej
67 1.6 thorpej #include "opt_ipsec.h"
68 1.2 itojun
69 1.2 itojun #include <sys/param.h>
70 1.69 atatat #include <sys/sysctl.h>
71 1.2 itojun #include <sys/mbuf.h>
72 1.2 itojun #include <sys/socket.h>
73 1.2 itojun #include <sys/protosw.h>
74 1.2 itojun #include <sys/socketvar.h>
75 1.2 itojun #include <sys/systm.h>
76 1.2 itojun #include <sys/proc.h>
77 1.77 elad #include <sys/kauth.h>
78 1.116 rmind #include <sys/kmem.h>
79 1.2 itojun
80 1.2 itojun #include <net/if.h>
81 1.2 itojun #include <net/route.h>
82 1.2 itojun #include <net/if_types.h>
83 1.97 thorpej #include <net/net_stats.h>
84 1.2 itojun
85 1.2 itojun #include <netinet/in.h>
86 1.2 itojun #include <netinet/in_var.h>
87 1.19 itojun #include <netinet/ip6.h>
88 1.2 itojun #include <netinet6/ip6_var.h>
89 1.94 thorpej #include <netinet6/ip6_private.h>
90 1.2 itojun #include <netinet6/ip6_mroute.h>
91 1.19 itojun #include <netinet/icmp6.h>
92 1.94 thorpej #include <netinet6/icmp6_private.h>
93 1.2 itojun #include <netinet6/in6_pcb.h>
94 1.2 itojun #include <netinet6/nd6.h>
95 1.20 itojun #include <netinet6/ip6protosw.h>
96 1.24 itojun #include <netinet6/scope6_var.h>
97 1.37 itojun #include <netinet6/raw_ip6.h>
98 1.2 itojun
99 1.111 christos #ifdef IPSEC
100 1.81 degroote #include <netipsec/ipsec.h>
101 1.97 thorpej #include <netipsec/ipsec_var.h>
102 1.97 thorpej #include <netipsec/ipsec_private.h>
103 1.81 degroote #include <netipsec/ipsec6.h>
104 1.81 degroote #endif
105 1.81 degroote
106 1.2 itojun #include "faith.h"
107 1.32 itojun #if defined(NFAITH) && 0 < NFAITH
108 1.32 itojun #include <net/if_faith.h>
109 1.32 itojun #endif
110 1.2 itojun
111 1.59 itojun extern struct inpcbtable rawcbtable;
112 1.59 itojun struct inpcbtable raw6cbtable;
113 1.2 itojun #define ifatoia6(ifa) ((struct in6_ifaddr *)(ifa))
114 1.2 itojun
115 1.2 itojun /*
116 1.2 itojun * Raw interface to IP6 protocol.
117 1.2 itojun */
118 1.2 itojun
119 1.95 thorpej static percpu_t *rip6stat_percpu;
120 1.95 thorpej
121 1.97 thorpej #define RIP6_STATINC(x) _NET_STATINC(rip6stat_percpu, x)
122 1.37 itojun
123 1.105 pooka static void sysctl_net_inet6_raw6_setup(struct sysctllog **);
124 1.105 pooka
125 1.2 itojun /*
126 1.2 itojun * Initialize raw connection block queue.
127 1.2 itojun */
128 1.2 itojun void
129 1.103 cegger rip6_init(void)
130 1.2 itojun {
131 1.47 itojun
132 1.105 pooka sysctl_net_inet6_raw6_setup(NULL);
133 1.59 itojun in6_pcbinit(&raw6cbtable, 1, 1);
134 1.95 thorpej
135 1.95 thorpej rip6stat_percpu = percpu_alloc(sizeof(uint64_t) * RIP6_NSTATS);
136 1.2 itojun }
137 1.2 itojun
138 1.2 itojun /*
139 1.2 itojun * Setup generic address and protocol structures
140 1.2 itojun * for raw_input routine, then pass them along with
141 1.2 itojun * mbuf chain.
142 1.2 itojun */
143 1.2 itojun int
144 1.85 christos rip6_input(struct mbuf **mp, int *offp, int proto)
145 1.2 itojun {
146 1.2 itojun struct mbuf *m = *mp;
147 1.27 itojun struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
148 1.59 itojun struct inpcb_hdr *inph;
149 1.27 itojun struct in6pcb *in6p;
150 1.2 itojun struct in6pcb *last = NULL;
151 1.2 itojun struct sockaddr_in6 rip6src;
152 1.2 itojun struct mbuf *opts = NULL;
153 1.2 itojun
154 1.95 thorpej RIP6_STATINC(RIP6_STAT_IPACKETS);
155 1.37 itojun
156 1.2 itojun #if defined(NFAITH) && 0 < NFAITH
157 1.32 itojun if (faithprefix(&ip6->ip6_dst)) {
158 1.32 itojun /* send icmp6 host unreach? */
159 1.32 itojun m_freem(m);
160 1.32 itojun return IPPROTO_DONE;
161 1.2 itojun }
162 1.2 itojun #endif
163 1.14 itojun
164 1.14 itojun /* Be proactive about malicious use of IPv4 mapped address */
165 1.14 itojun if (IN6_IS_ADDR_V4MAPPED(&ip6->ip6_src) ||
166 1.14 itojun IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst)) {
167 1.14 itojun /* XXX stat */
168 1.14 itojun m_freem(m);
169 1.14 itojun return IPPROTO_DONE;
170 1.14 itojun }
171 1.14 itojun
172 1.89 dyoung sockaddr_in6_init(&rip6src, &ip6->ip6_src, 0, 0, 0);
173 1.75 rpaulo if (sa6_recoverscope(&rip6src) != 0) {
174 1.75 rpaulo /* XXX: should be impossible. */
175 1.75 rpaulo m_freem(m);
176 1.75 rpaulo return IPPROTO_DONE;
177 1.75 rpaulo }
178 1.2 itojun
179 1.112 christos TAILQ_FOREACH(inph, &raw6cbtable.inpt_queue, inph_queue) {
180 1.59 itojun in6p = (struct in6pcb *)inph;
181 1.59 itojun if (in6p->in6p_af != AF_INET6)
182 1.59 itojun continue;
183 1.2 itojun if (in6p->in6p_ip6.ip6_nxt &&
184 1.2 itojun in6p->in6p_ip6.ip6_nxt != proto)
185 1.2 itojun continue;
186 1.12 itojun if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_laddr) &&
187 1.37 itojun !IN6_ARE_ADDR_EQUAL(&in6p->in6p_laddr, &ip6->ip6_dst))
188 1.2 itojun continue;
189 1.12 itojun if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr) &&
190 1.37 itojun !IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr, &ip6->ip6_src))
191 1.2 itojun continue;
192 1.37 itojun if (in6p->in6p_cksum != -1) {
193 1.95 thorpej RIP6_STATINC(RIP6_STAT_ISUM);
194 1.64 itojun if (in6_cksum(m, proto, *offp,
195 1.37 itojun m->m_pkthdr.len - *offp)) {
196 1.95 thorpej RIP6_STATINC(RIP6_STAT_BADSUM);
197 1.37 itojun continue;
198 1.37 itojun }
199 1.2 itojun }
200 1.2 itojun if (last) {
201 1.2 itojun struct mbuf *n;
202 1.30 itojun
203 1.111 christos #ifdef IPSEC
204 1.81 degroote /*
205 1.81 degroote * Check AH/ESP integrity
206 1.81 degroote */
207 1.118 christos if (ipsec_used && !ipsec6_in_reject(m, last))
208 1.111 christos #endif /* IPSEC */
209 1.2 itojun if ((n = m_copy(m, 0, (int)M_COPYALL)) != NULL) {
210 1.2 itojun if (last->in6p_flags & IN6P_CONTROLOPTS)
211 1.2 itojun ip6_savecontrol(last, &opts, ip6, n);
212 1.2 itojun /* strip intermediate headers */
213 1.2 itojun m_adj(n, *offp);
214 1.2 itojun if (sbappendaddr(&last->in6p_socket->so_rcv,
215 1.43 itojun (struct sockaddr *)&rip6src, n, opts) == 0) {
216 1.2 itojun /* should notify about lost packet */
217 1.2 itojun m_freem(n);
218 1.2 itojun if (opts)
219 1.2 itojun m_freem(opts);
220 1.95 thorpej RIP6_STATINC(RIP6_STAT_FULLSOCK);
221 1.2 itojun } else
222 1.2 itojun sorwakeup(last->in6p_socket);
223 1.2 itojun opts = NULL;
224 1.2 itojun }
225 1.2 itojun }
226 1.2 itojun last = in6p;
227 1.2 itojun }
228 1.111 christos #ifdef IPSEC
229 1.118 christos if (ipsec_used && last && ipsec6_in_reject(m, last)) {
230 1.81 degroote m_freem(m);
231 1.81 degroote /*
232 1.81 degroote * XXX ipsec6_in_reject update stat if there is an error
233 1.81 degroote * so we just need to update stats by hand in the case of last is
234 1.81 degroote * NULL
235 1.81 degroote */
236 1.81 degroote if (!last)
237 1.97 thorpej IPSEC6_STATINC(IPSEC_STAT_IN_POLVIO);
238 1.94 thorpej IP6_STATDEC(IP6_STAT_DELIVERED);
239 1.81 degroote /* do not inject data into pcb */
240 1.81 degroote } else
241 1.111 christos #endif /* IPSEC */
242 1.2 itojun if (last) {
243 1.2 itojun if (last->in6p_flags & IN6P_CONTROLOPTS)
244 1.2 itojun ip6_savecontrol(last, &opts, ip6, m);
245 1.2 itojun /* strip intermediate headers */
246 1.2 itojun m_adj(m, *offp);
247 1.2 itojun if (sbappendaddr(&last->in6p_socket->so_rcv,
248 1.43 itojun (struct sockaddr *)&rip6src, m, opts) == 0) {
249 1.2 itojun m_freem(m);
250 1.2 itojun if (opts)
251 1.2 itojun m_freem(opts);
252 1.95 thorpej RIP6_STATINC(RIP6_STAT_FULLSOCK);
253 1.2 itojun } else
254 1.2 itojun sorwakeup(last->in6p_socket);
255 1.2 itojun } else {
256 1.95 thorpej RIP6_STATINC(RIP6_STAT_NOSOCK);
257 1.37 itojun if (m->m_flags & M_MCAST)
258 1.95 thorpej RIP6_STATINC(RIP6_STAT_NOSOCKMCAST);
259 1.2 itojun if (proto == IPPROTO_NONE)
260 1.2 itojun m_freem(m);
261 1.2 itojun else {
262 1.50 itojun u_int8_t *prvnxtp = ip6_get_prevhdr(m, *offp); /* XXX */
263 1.27 itojun in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_protounknown);
264 1.2 itojun icmp6_error(m, ICMP6_PARAM_PROB,
265 1.43 itojun ICMP6_PARAMPROB_NEXTHEADER,
266 1.50 itojun prvnxtp - mtod(m, u_int8_t *));
267 1.2 itojun }
268 1.94 thorpej IP6_STATDEC(IP6_STAT_DELIVERED);
269 1.2 itojun }
270 1.2 itojun return IPPROTO_DONE;
271 1.2 itojun }
272 1.2 itojun
273 1.98 ad void *
274 1.82 dyoung rip6_ctlinput(int cmd, const struct sockaddr *sa, void *d)
275 1.20 itojun {
276 1.27 itojun struct ip6_hdr *ip6;
277 1.29 itojun struct ip6ctlparam *ip6cp = NULL;
278 1.29 itojun const struct sockaddr_in6 *sa6_src = NULL;
279 1.29 itojun void *cmdarg;
280 1.88 dyoung void (*notify)(struct in6pcb *, int) = in6_rtchange;
281 1.29 itojun int nxt;
282 1.20 itojun
283 1.20 itojun if (sa->sa_family != AF_INET6 ||
284 1.20 itojun sa->sa_len != sizeof(struct sockaddr_in6))
285 1.102 yamt return NULL;
286 1.20 itojun
287 1.21 itojun if ((unsigned)cmd >= PRC_NCMDS)
288 1.102 yamt return NULL;
289 1.21 itojun if (PRC_IS_REDIRECT(cmd))
290 1.21 itojun notify = in6_rtchange, d = NULL;
291 1.21 itojun else if (cmd == PRC_HOSTDEAD)
292 1.21 itojun d = NULL;
293 1.29 itojun else if (cmd == PRC_MSGSIZE)
294 1.29 itojun ; /* special code is present, see below */
295 1.21 itojun else if (inet6ctlerrmap[cmd] == 0)
296 1.102 yamt return NULL;
297 1.20 itojun
298 1.20 itojun /* if the parameter is from icmp6, decode it. */
299 1.20 itojun if (d != NULL) {
300 1.29 itojun ip6cp = (struct ip6ctlparam *)d;
301 1.20 itojun ip6 = ip6cp->ip6c_ip6;
302 1.29 itojun cmdarg = ip6cp->ip6c_cmdarg;
303 1.29 itojun sa6_src = ip6cp->ip6c_src;
304 1.29 itojun nxt = ip6cp->ip6c_nxt;
305 1.20 itojun } else {
306 1.20 itojun ip6 = NULL;
307 1.29 itojun cmdarg = NULL;
308 1.29 itojun sa6_src = &sa6_any;
309 1.29 itojun nxt = -1;
310 1.20 itojun }
311 1.20 itojun
312 1.29 itojun if (ip6 && cmd == PRC_MSGSIZE) {
313 1.82 dyoung const struct sockaddr_in6 *sa6 = (const struct sockaddr_in6 *)sa;
314 1.29 itojun int valid = 0;
315 1.29 itojun struct in6pcb *in6p;
316 1.20 itojun
317 1.20 itojun /*
318 1.29 itojun * Check to see if we have a valid raw IPv6 socket
319 1.29 itojun * corresponding to the address in the ICMPv6 message
320 1.29 itojun * payload, and the protocol (ip6_nxt) meets the socket.
321 1.29 itojun * XXX chase extension headers, or pass final nxt value
322 1.29 itojun * from icmp6_notify_error()
323 1.20 itojun */
324 1.29 itojun in6p = NULL;
325 1.59 itojun in6p = in6_pcblookup_connect(&raw6cbtable, &sa6->sin6_addr, 0,
326 1.108 dyoung (const struct in6_addr *)&sa6_src->sin6_addr, 0, 0, 0);
327 1.29 itojun #if 0
328 1.29 itojun if (!in6p) {
329 1.29 itojun /*
330 1.29 itojun * As the use of sendto(2) is fairly popular,
331 1.29 itojun * we may want to allow non-connected pcb too.
332 1.29 itojun * But it could be too weak against attacks...
333 1.29 itojun * We should at least check if the local
334 1.29 itojun * address (= s) is really ours.
335 1.29 itojun */
336 1.59 itojun in6p = in6_pcblookup_bind(&raw6cbtable,
337 1.75 rpaulo &sa6->sin6_addr, 0, 0);
338 1.29 itojun }
339 1.29 itojun #endif
340 1.29 itojun
341 1.29 itojun if (in6p && in6p->in6p_ip6.ip6_nxt &&
342 1.29 itojun in6p->in6p_ip6.ip6_nxt == nxt)
343 1.29 itojun valid++;
344 1.20 itojun
345 1.29 itojun /*
346 1.29 itojun * Depending on the value of "valid" and routing table
347 1.29 itojun * size (mtudisc_{hi,lo}wat), we will:
348 1.44 itojun * - recalculate the new MTU and create the
349 1.29 itojun * corresponding routing entry, or
350 1.29 itojun * - ignore the MTU change notification.
351 1.29 itojun */
352 1.29 itojun icmp6_mtudisc_update((struct ip6ctlparam *)d, valid);
353 1.20 itojun
354 1.29 itojun /*
355 1.29 itojun * regardless of if we called icmp6_mtudisc_update(),
356 1.76 rpaulo * we need to call in6_pcbnotify(), to notify path MTU
357 1.76 rpaulo * change to the userland (RFC3542), because some
358 1.76 rpaulo * unconnected sockets may share the same destination
359 1.76 rpaulo * and want to know the path MTU.
360 1.29 itojun */
361 1.20 itojun }
362 1.29 itojun
363 1.59 itojun (void) in6_pcbnotify(&raw6cbtable, sa, 0,
364 1.72 christos (const struct sockaddr *)sa6_src, 0, cmd, cmdarg, notify);
365 1.98 ad return NULL;
366 1.20 itojun }
367 1.20 itojun
368 1.2 itojun /*
369 1.2 itojun * Generate IPv6 header and pass packet to ip6_output.
370 1.2 itojun * Tack on options user may have setup with control call.
371 1.2 itojun */
372 1.2 itojun int
373 1.106 dyoung rip6_output(struct mbuf *m, struct socket * const so,
374 1.106 dyoung struct sockaddr_in6 * const dstsock, struct mbuf * const control)
375 1.2 itojun {
376 1.2 itojun struct in6_addr *dst;
377 1.2 itojun struct ip6_hdr *ip6;
378 1.2 itojun struct in6pcb *in6p;
379 1.2 itojun u_int plen = m->m_pkthdr.len;
380 1.2 itojun int error = 0;
381 1.75 rpaulo struct ip6_pktopts opt, *optp = NULL;
382 1.2 itojun struct ifnet *oifp = NULL;
383 1.12 itojun int type, code; /* for ICMPv6 output statistics only */
384 1.75 rpaulo int scope_ambiguous = 0;
385 1.75 rpaulo struct in6_addr *in6a;
386 1.2 itojun
387 1.2 itojun in6p = sotoin6pcb(so);
388 1.2 itojun
389 1.2 itojun dst = &dstsock->sin6_addr;
390 1.2 itojun if (control) {
391 1.76 rpaulo if ((error = ip6_setpktopts(control, &opt,
392 1.76 rpaulo in6p->in6p_outputopts,
393 1.104 elad kauth_cred_get(), so->so_proto->pr_protocol)) != 0) {
394 1.2 itojun goto bad;
395 1.76 rpaulo }
396 1.2 itojun optp = &opt;
397 1.2 itojun } else
398 1.2 itojun optp = in6p->in6p_outputopts;
399 1.2 itojun
400 1.12 itojun /*
401 1.75 rpaulo * Check and convert scope zone ID into internal form.
402 1.75 rpaulo * XXX: we may still need to determine the zone later.
403 1.75 rpaulo */
404 1.75 rpaulo if (!(so->so_state & SS_ISCONNECTED)) {
405 1.75 rpaulo if (dstsock->sin6_scope_id == 0 && !ip6_use_defzone)
406 1.75 rpaulo scope_ambiguous = 1;
407 1.75 rpaulo if ((error = sa6_embedscope(dstsock, ip6_use_defzone)) != 0)
408 1.75 rpaulo goto bad;
409 1.75 rpaulo }
410 1.75 rpaulo
411 1.75 rpaulo /*
412 1.12 itojun * For an ICMPv6 packet, we should know its type and code
413 1.12 itojun * to update statistics.
414 1.12 itojun */
415 1.12 itojun if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
416 1.12 itojun struct icmp6_hdr *icmp6;
417 1.12 itojun if (m->m_len < sizeof(struct icmp6_hdr) &&
418 1.12 itojun (m = m_pullup(m, sizeof(struct icmp6_hdr))) == NULL) {
419 1.12 itojun error = ENOBUFS;
420 1.12 itojun goto bad;
421 1.12 itojun }
422 1.12 itojun icmp6 = mtod(m, struct icmp6_hdr *);
423 1.12 itojun type = icmp6->icmp6_type;
424 1.12 itojun code = icmp6->icmp6_code;
425 1.62 christos } else {
426 1.62 christos type = 0;
427 1.62 christos code = 0;
428 1.12 itojun }
429 1.12 itojun
430 1.52 itojun M_PREPEND(m, sizeof(*ip6), M_DONTWAIT);
431 1.52 itojun if (!m) {
432 1.52 itojun error = ENOBUFS;
433 1.52 itojun goto bad;
434 1.52 itojun }
435 1.2 itojun ip6 = mtod(m, struct ip6_hdr *);
436 1.2 itojun
437 1.2 itojun /*
438 1.2 itojun * Next header might not be ICMP6 but use its pseudo header anyway.
439 1.2 itojun */
440 1.2 itojun ip6->ip6_dst = *dst;
441 1.2 itojun
442 1.12 itojun /*
443 1.12 itojun * Source address selection.
444 1.12 itojun */
445 1.75 rpaulo if ((in6a = in6_selectsrc(dstsock, optp, in6p->in6p_moptions,
446 1.107 dyoung &in6p->in6p_route, &in6p->in6p_laddr, &oifp,
447 1.82 dyoung &error)) == 0) {
448 1.75 rpaulo if (error == 0)
449 1.75 rpaulo error = EADDRNOTAVAIL;
450 1.75 rpaulo goto bad;
451 1.75 rpaulo }
452 1.75 rpaulo ip6->ip6_src = *in6a;
453 1.2 itojun
454 1.75 rpaulo if (oifp && scope_ambiguous) {
455 1.75 rpaulo /*
456 1.75 rpaulo * Application should provide a proper zone ID or the use of
457 1.75 rpaulo * default zone IDs should be enabled. Unfortunately, some
458 1.75 rpaulo * applications do not behave as it should, so we need a
459 1.75 rpaulo * workaround. Even if an appropriate ID is not determined
460 1.75 rpaulo * (when it's required), if we can determine the outgoing
461 1.75 rpaulo * interface. determine the zone ID based on the interface.
462 1.75 rpaulo */
463 1.75 rpaulo error = in6_setscope(&dstsock->sin6_addr, oifp, NULL);
464 1.75 rpaulo if (error != 0)
465 1.2 itojun goto bad;
466 1.12 itojun }
467 1.75 rpaulo ip6->ip6_dst = dstsock->sin6_addr;
468 1.2 itojun
469 1.75 rpaulo /* fill in the rest of the IPv6 header fields */
470 1.2 itojun ip6->ip6_flow = in6p->in6p_flowinfo & IPV6_FLOWINFO_MASK;
471 1.20 itojun ip6->ip6_vfc &= ~IPV6_VERSION_MASK;
472 1.20 itojun ip6->ip6_vfc |= IPV6_VERSION;
473 1.75 rpaulo /* ip6_plen will be filled in ip6_output, so not fill it here. */
474 1.2 itojun ip6->ip6_nxt = in6p->in6p_ip6.ip6_nxt;
475 1.12 itojun ip6->ip6_hlim = in6_selecthlim(in6p, oifp);
476 1.2 itojun
477 1.2 itojun if (so->so_proto->pr_protocol == IPPROTO_ICMPV6 ||
478 1.2 itojun in6p->in6p_cksum != -1) {
479 1.2 itojun int off;
480 1.67 yamt u_int16_t sum;
481 1.2 itojun
482 1.2 itojun /* compute checksum */
483 1.2 itojun if (so->so_proto->pr_protocol == IPPROTO_ICMPV6)
484 1.2 itojun off = offsetof(struct icmp6_hdr, icmp6_cksum);
485 1.2 itojun else
486 1.2 itojun off = in6p->in6p_cksum;
487 1.2 itojun if (plen < off + 1) {
488 1.2 itojun error = EINVAL;
489 1.2 itojun goto bad;
490 1.2 itojun }
491 1.2 itojun off += sizeof(struct ip6_hdr);
492 1.2 itojun
493 1.68 yamt sum = 0;
494 1.84 christos m = m_copyback_cow(m, off, sizeof(sum), (void *)&sum,
495 1.68 yamt M_DONTWAIT);
496 1.68 yamt if (m == NULL) {
497 1.66 yamt error = ENOBUFS;
498 1.66 yamt goto bad;
499 1.66 yamt }
500 1.67 yamt sum = in6_cksum(m, ip6->ip6_nxt, sizeof(*ip6), plen);
501 1.84 christos m = m_copyback_cow(m, off, sizeof(sum), (void *)&sum,
502 1.68 yamt M_DONTWAIT);
503 1.68 yamt if (m == NULL) {
504 1.68 yamt error = ENOBUFS;
505 1.68 yamt goto bad;
506 1.68 yamt }
507 1.2 itojun }
508 1.27 itojun
509 1.76 rpaulo error = ip6_output(m, optp, &in6p->in6p_route, 0,
510 1.57 itojun in6p->in6p_moptions, so, &oifp);
511 1.12 itojun if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
512 1.12 itojun if (oifp)
513 1.12 itojun icmp6_ifoutstat_inc(oifp, type, code);
514 1.94 thorpej ICMP6_STATINC(ICMP6_STAT_OUTHIST + type);
515 1.37 itojun } else
516 1.95 thorpej RIP6_STATINC(RIP6_STAT_OPACKETS);
517 1.2 itojun
518 1.2 itojun goto freectl;
519 1.2 itojun
520 1.2 itojun bad:
521 1.2 itojun if (m)
522 1.2 itojun m_freem(m);
523 1.2 itojun
524 1.2 itojun freectl:
525 1.76 rpaulo if (control) {
526 1.76 rpaulo ip6_clearpktopts(&opt, -1);
527 1.2 itojun m_freem(control);
528 1.76 rpaulo }
529 1.83 dyoung return error;
530 1.2 itojun }
531 1.2 itojun
532 1.40 itojun /*
533 1.2 itojun * Raw IPv6 socket option processing.
534 1.40 itojun */
535 1.2 itojun int
536 1.100 plunky rip6_ctloutput(int op, struct socket *so, struct sockopt *sopt)
537 1.2 itojun {
538 1.2 itojun int error = 0;
539 1.2 itojun
540 1.100 plunky if (sopt->sopt_level == SOL_SOCKET && sopt->sopt_name == SO_NOHEADER) {
541 1.100 plunky int optval;
542 1.100 plunky
543 1.87 dyoung /* need to fiddle w/ opt(IPPROTO_IPV6, IPV6_CHECKSUM)? */
544 1.90 dyoung if (op == PRCO_GETOPT) {
545 1.100 plunky optval = 1;
546 1.100 plunky error = sockopt_set(sopt, &optval, sizeof(optval));
547 1.100 plunky } else if (op == PRCO_SETOPT) {
548 1.100 plunky error = sockopt_getint(sopt, &optval);
549 1.100 plunky if (error)
550 1.100 plunky goto out;
551 1.100 plunky if (optval == 0)
552 1.100 plunky error = EINVAL;
553 1.100 plunky }
554 1.100 plunky
555 1.100 plunky goto out;
556 1.100 plunky } else if (sopt->sopt_level != IPPROTO_IPV6)
557 1.100 plunky return ip6_ctloutput(op, so, sopt);
558 1.87 dyoung
559 1.100 plunky switch (sopt->sopt_name) {
560 1.87 dyoung case MRT6_INIT:
561 1.87 dyoung case MRT6_DONE:
562 1.87 dyoung case MRT6_ADD_MIF:
563 1.87 dyoung case MRT6_DEL_MIF:
564 1.87 dyoung case MRT6_ADD_MFC:
565 1.87 dyoung case MRT6_DEL_MFC:
566 1.87 dyoung case MRT6_PIM:
567 1.87 dyoung if (op == PRCO_SETOPT)
568 1.100 plunky error = ip6_mrouter_set(so, sopt);
569 1.87 dyoung else if (op == PRCO_GETOPT)
570 1.100 plunky error = ip6_mrouter_get(so, sopt);
571 1.87 dyoung else
572 1.87 dyoung error = EINVAL;
573 1.87 dyoung break;
574 1.87 dyoung case IPV6_CHECKSUM:
575 1.100 plunky return ip6_raw_ctloutput(op, so, sopt);
576 1.27 itojun default:
577 1.100 plunky return ip6_ctloutput(op, so, sopt);
578 1.2 itojun }
579 1.100 plunky out:
580 1.87 dyoung return error;
581 1.2 itojun }
582 1.2 itojun
583 1.2 itojun extern u_long rip6_sendspace;
584 1.2 itojun extern u_long rip6_recvspace;
585 1.2 itojun
586 1.2 itojun int
587 1.116 rmind rip6_attach(struct socket *so, int proto)
588 1.116 rmind {
589 1.116 rmind struct in6pcb *in6p;
590 1.116 rmind int s, error;
591 1.116 rmind
592 1.116 rmind KASSERT(sotoin6pcb(so) == NULL);
593 1.116 rmind sosetlock(so);
594 1.116 rmind
595 1.116 rmind error = kauth_authorize_network(curlwp->l_cred,
596 1.116 rmind KAUTH_NETWORK_SOCKET, KAUTH_REQ_NETWORK_SOCKET_RAWSOCK,
597 1.116 rmind KAUTH_ARG(AF_INET6),
598 1.116 rmind KAUTH_ARG(SOCK_RAW),
599 1.116 rmind KAUTH_ARG(so->so_proto->pr_protocol));
600 1.116 rmind if (error) {
601 1.116 rmind return error;
602 1.116 rmind }
603 1.116 rmind s = splsoftnet();
604 1.116 rmind error = soreserve(so, rip6_sendspace, rip6_recvspace);
605 1.116 rmind if (error) {
606 1.116 rmind splx(s);
607 1.116 rmind return error;
608 1.116 rmind }
609 1.116 rmind if ((error = in6_pcballoc(so, &raw6cbtable)) != 0) {
610 1.116 rmind splx(s);
611 1.116 rmind return error;
612 1.116 rmind }
613 1.116 rmind splx(s);
614 1.116 rmind in6p = sotoin6pcb(so);
615 1.116 rmind in6p->in6p_ip6.ip6_nxt = proto;
616 1.116 rmind in6p->in6p_cksum = -1;
617 1.116 rmind
618 1.116 rmind in6p->in6p_icmp6filt = kmem_alloc(sizeof(struct icmp6_filter), KM_SLEEP);
619 1.116 rmind if (in6p->in6p_icmp6filt == NULL) {
620 1.116 rmind in6_pcbdetach(in6p);
621 1.116 rmind return ENOMEM;
622 1.116 rmind }
623 1.116 rmind ICMP6_FILTER_SETPASSALL(in6p->in6p_icmp6filt);
624 1.116 rmind KASSERT(solocked(so));
625 1.116 rmind return error;
626 1.116 rmind }
627 1.116 rmind
628 1.116 rmind static void
629 1.116 rmind rip6_detach(struct socket *so)
630 1.116 rmind {
631 1.116 rmind struct in6pcb *in6p = sotoin6pcb(so);
632 1.116 rmind
633 1.116 rmind KASSERT(solocked(so));
634 1.116 rmind KASSERT(in6p != NULL);
635 1.116 rmind
636 1.116 rmind if (so == ip6_mrouter) {
637 1.116 rmind ip6_mrouter_done();
638 1.116 rmind }
639 1.116 rmind /* xxx: RSVP */
640 1.116 rmind if (in6p->in6p_icmp6filt != NULL) {
641 1.116 rmind kmem_free(in6p->in6p_icmp6filt, sizeof(struct icmp6_filter));
642 1.116 rmind in6p->in6p_icmp6filt = NULL;
643 1.116 rmind }
644 1.116 rmind in6_pcbdetach(in6p);
645 1.116 rmind }
646 1.116 rmind
647 1.119 rtr static int
648 1.127 rtr rip6_accept(struct socket *so, struct mbuf *nam)
649 1.127 rtr {
650 1.127 rtr KASSERT(solocked(so));
651 1.127 rtr
652 1.127 rtr return EOPNOTSUPP;
653 1.127 rtr }
654 1.127 rtr
655 1.127 rtr static int
656 1.129 rtr rip6_bind(struct socket *so, struct mbuf *nam)
657 1.129 rtr {
658 1.129 rtr struct in6pcb *in6p = sotoin6pcb(so);
659 1.129 rtr struct sockaddr_in6 *addr;
660 1.129 rtr struct ifaddr *ia = NULL;
661 1.129 rtr int error = 0;
662 1.129 rtr
663 1.129 rtr KASSERT(solocked(so));
664 1.129 rtr KASSERT(in6p != NULL);
665 1.129 rtr KASSERT(nam != NULL);
666 1.129 rtr
667 1.129 rtr addr = mtod(nam, struct sockaddr_in6 *);
668 1.129 rtr if (nam->m_len != sizeof(*addr))
669 1.129 rtr return EINVAL;
670 1.131 ozaki if (IFNET_EMPTY() || addr->sin6_family != AF_INET6)
671 1.129 rtr return EADDRNOTAVAIL;
672 1.129 rtr
673 1.129 rtr if ((error = sa6_embedscope(addr, ip6_use_defzone)) != 0)
674 1.129 rtr return error;
675 1.129 rtr
676 1.129 rtr /*
677 1.129 rtr * we don't support mapped address here, it would confuse
678 1.129 rtr * users so reject it
679 1.129 rtr */
680 1.129 rtr if (IN6_IS_ADDR_V4MAPPED(&addr->sin6_addr))
681 1.129 rtr return EADDRNOTAVAIL;
682 1.129 rtr if (!IN6_IS_ADDR_UNSPECIFIED(&addr->sin6_addr) &&
683 1.129 rtr (ia = ifa_ifwithaddr((struct sockaddr *)addr)) == 0)
684 1.129 rtr return EADDRNOTAVAIL;
685 1.129 rtr if (ia && ((struct in6_ifaddr *)ia)->ia6_flags &
686 1.129 rtr (IN6_IFF_ANYCAST|IN6_IFF_NOTREADY|
687 1.129 rtr IN6_IFF_DETACHED|IN6_IFF_DEPRECATED))
688 1.129 rtr return EADDRNOTAVAIL;
689 1.129 rtr in6p->in6p_laddr = addr->sin6_addr;
690 1.129 rtr return 0;
691 1.129 rtr }
692 1.129 rtr
693 1.129 rtr static int
694 1.129 rtr rip6_listen(struct socket *so)
695 1.129 rtr {
696 1.129 rtr KASSERT(solocked(so));
697 1.129 rtr
698 1.129 rtr return EOPNOTSUPP;
699 1.129 rtr }
700 1.129 rtr
701 1.129 rtr static int
702 1.130 rtr rip6_connect(struct socket *so, struct mbuf *nam)
703 1.130 rtr {
704 1.130 rtr struct in6pcb *in6p = sotoin6pcb(so);
705 1.130 rtr struct sockaddr_in6 *addr;
706 1.130 rtr struct in6_addr *in6a = NULL;
707 1.130 rtr struct ifnet *ifp = NULL;
708 1.130 rtr int scope_ambiguous = 0;
709 1.130 rtr int error = 0;
710 1.130 rtr
711 1.130 rtr KASSERT(solocked(so));
712 1.130 rtr KASSERT(in6p != NULL);
713 1.130 rtr KASSERT(nam != NULL);
714 1.130 rtr
715 1.130 rtr addr = mtod(nam, struct sockaddr_in6 *);
716 1.130 rtr
717 1.130 rtr if (nam->m_len != sizeof(*addr))
718 1.130 rtr return EINVAL;
719 1.131 ozaki if (IFNET_EMPTY())
720 1.130 rtr return EADDRNOTAVAIL;
721 1.130 rtr if (addr->sin6_family != AF_INET6)
722 1.130 rtr return EAFNOSUPPORT;
723 1.130 rtr
724 1.130 rtr /*
725 1.130 rtr * Application should provide a proper zone ID or the use of
726 1.130 rtr * default zone IDs should be enabled. Unfortunately, some
727 1.130 rtr * applications do not behave as it should, so we need a
728 1.130 rtr * workaround. Even if an appropriate ID is not determined,
729 1.130 rtr * we'll see if we can determine the outgoing interface. If we
730 1.130 rtr * can, determine the zone ID based on the interface below.
731 1.130 rtr */
732 1.130 rtr if (addr->sin6_scope_id == 0 && !ip6_use_defzone)
733 1.130 rtr scope_ambiguous = 1;
734 1.130 rtr if ((error = sa6_embedscope(addr, ip6_use_defzone)) != 0)
735 1.130 rtr return error;
736 1.130 rtr
737 1.130 rtr /* Source address selection. XXX: need pcblookup? */
738 1.130 rtr in6a = in6_selectsrc(addr, in6p->in6p_outputopts,
739 1.130 rtr in6p->in6p_moptions, &in6p->in6p_route,
740 1.130 rtr &in6p->in6p_laddr, &ifp, &error);
741 1.130 rtr if (in6a == NULL) {
742 1.130 rtr if (error == 0)
743 1.130 rtr return EADDRNOTAVAIL;
744 1.130 rtr return error;
745 1.130 rtr }
746 1.130 rtr /* XXX: see above */
747 1.130 rtr if (ifp && scope_ambiguous &&
748 1.130 rtr (error = in6_setscope(&addr->sin6_addr, ifp, NULL)) != 0) {
749 1.130 rtr return error;
750 1.130 rtr }
751 1.130 rtr in6p->in6p_laddr = *in6a;
752 1.130 rtr in6p->in6p_faddr = addr->sin6_addr;
753 1.130 rtr soisconnected(so);
754 1.130 rtr return error;
755 1.130 rtr }
756 1.130 rtr
757 1.130 rtr static int
758 1.132 rtr rip6_disconnect(struct socket *so)
759 1.132 rtr {
760 1.132 rtr struct in6pcb *in6p = sotoin6pcb(so);
761 1.132 rtr
762 1.132 rtr KASSERT(solocked(so));
763 1.132 rtr KASSERT(in6p != NULL);
764 1.132 rtr
765 1.132 rtr if ((so->so_state & SS_ISCONNECTED) == 0)
766 1.132 rtr return ENOTCONN;
767 1.132 rtr
768 1.132 rtr in6p->in6p_faddr = in6addr_any;
769 1.132 rtr so->so_state &= ~SS_ISCONNECTED; /* XXX */
770 1.132 rtr return 0;
771 1.132 rtr }
772 1.132 rtr
773 1.132 rtr static int
774 1.132 rtr rip6_shutdown(struct socket *so)
775 1.132 rtr {
776 1.132 rtr KASSERT(solocked(so));
777 1.132 rtr
778 1.132 rtr /*
779 1.132 rtr * Mark the connection as being incapable of futther input.
780 1.132 rtr */
781 1.132 rtr socantsendmore(so);
782 1.132 rtr return 0;
783 1.132 rtr }
784 1.132 rtr
785 1.132 rtr static int
786 1.132 rtr rip6_abort(struct socket *so)
787 1.132 rtr {
788 1.132 rtr KASSERT(solocked(so));
789 1.132 rtr
790 1.132 rtr soisdisconnected(so);
791 1.132 rtr rip6_detach(so);
792 1.132 rtr return 0;
793 1.132 rtr }
794 1.132 rtr
795 1.132 rtr static int
796 1.121 rtr rip6_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp)
797 1.119 rtr {
798 1.121 rtr return in6_control(so, cmd, nam, ifp);
799 1.119 rtr }
800 1.119 rtr
801 1.122 rtr static int
802 1.122 rtr rip6_stat(struct socket *so, struct stat *ub)
803 1.122 rtr {
804 1.125 rtr KASSERT(solocked(so));
805 1.125 rtr
806 1.124 rtr /* stat: don't bother with a blocksize */
807 1.124 rtr return 0;
808 1.122 rtr }
809 1.122 rtr
810 1.126 rtr static int
811 1.126 rtr rip6_peeraddr(struct socket *so, struct mbuf *nam)
812 1.126 rtr {
813 1.126 rtr KASSERT(solocked(so));
814 1.126 rtr KASSERT(sotoin6pcb(so) != NULL);
815 1.126 rtr KASSERT(nam != NULL);
816 1.126 rtr
817 1.126 rtr in6_setpeeraddr(sotoin6pcb(so), nam);
818 1.126 rtr return 0;
819 1.126 rtr }
820 1.126 rtr
821 1.126 rtr static int
822 1.126 rtr rip6_sockaddr(struct socket *so, struct mbuf *nam)
823 1.126 rtr {
824 1.126 rtr KASSERT(solocked(so));
825 1.126 rtr KASSERT(sotoin6pcb(so) != NULL);
826 1.126 rtr KASSERT(nam != NULL);
827 1.126 rtr
828 1.126 rtr in6_setsockaddr(sotoin6pcb(so), nam);
829 1.126 rtr return 0;
830 1.126 rtr }
831 1.126 rtr
832 1.128 rtr static int
833 1.128 rtr rip6_recvoob(struct socket *so, struct mbuf *m, int flags)
834 1.128 rtr {
835 1.128 rtr KASSERT(solocked(so));
836 1.128 rtr
837 1.128 rtr return EOPNOTSUPP;
838 1.128 rtr }
839 1.128 rtr
840 1.128 rtr static int
841 1.128 rtr rip6_sendoob(struct socket *so, struct mbuf *m, struct mbuf *control)
842 1.128 rtr {
843 1.128 rtr KASSERT(solocked(so));
844 1.128 rtr
845 1.128 rtr if (m)
846 1.128 rtr m_freem(m);
847 1.128 rtr
848 1.128 rtr return EOPNOTSUPP;
849 1.128 rtr }
850 1.128 rtr
851 1.116 rmind int
852 1.85 christos rip6_usrreq(struct socket *so, int req, struct mbuf *m,
853 1.85 christos struct mbuf *nam, struct mbuf *control, struct lwp *l)
854 1.2 itojun {
855 1.27 itojun struct in6pcb *in6p = sotoin6pcb(so);
856 1.2 itojun int error = 0;
857 1.2 itojun
858 1.127 rtr KASSERT(req != PRU_ACCEPT);
859 1.129 rtr KASSERT(req != PRU_BIND);
860 1.129 rtr KASSERT(req != PRU_LISTEN);
861 1.130 rtr KASSERT(req != PRU_CONNECT);
862 1.132 rtr KASSERT(req != PRU_DISCONNECT);
863 1.132 rtr KASSERT(req != PRU_SHUTDOWN);
864 1.132 rtr KASSERT(req != PRU_ABORT);
865 1.119 rtr KASSERT(req != PRU_CONTROL);
866 1.122 rtr KASSERT(req != PRU_SENSE);
867 1.126 rtr KASSERT(req != PRU_PEERADDR);
868 1.126 rtr KASSERT(req != PRU_SOCKADDR);
869 1.128 rtr KASSERT(req != PRU_RCVOOB);
870 1.128 rtr KASSERT(req != PRU_SENDOOB);
871 1.17 thorpej
872 1.18 thorpej if (req == PRU_PURGEIF) {
873 1.98 ad mutex_enter(softnet_lock);
874 1.59 itojun in6_pcbpurgeif0(&raw6cbtable, (struct ifnet *)control);
875 1.18 thorpej in6_purgeif((struct ifnet *)control);
876 1.59 itojun in6_pcbpurgeif(&raw6cbtable, (struct ifnet *)control);
877 1.98 ad mutex_exit(softnet_lock);
878 1.83 dyoung return 0;
879 1.17 thorpej }
880 1.2 itojun
881 1.2 itojun switch (req) {
882 1.2 itojun case PRU_CONNECT2:
883 1.2 itojun error = EOPNOTSUPP;
884 1.2 itojun break;
885 1.2 itojun
886 1.2 itojun /*
887 1.2 itojun * Ship a packet out. The appropriate raw output
888 1.2 itojun * routine handles any messaging necessary.
889 1.2 itojun */
890 1.2 itojun case PRU_SEND:
891 1.40 itojun {
892 1.2 itojun struct sockaddr_in6 tmp;
893 1.2 itojun struct sockaddr_in6 *dst;
894 1.2 itojun
895 1.24 itojun /* always copy sockaddr to avoid overwrites */
896 1.2 itojun if (so->so_state & SS_ISCONNECTED) {
897 1.2 itojun if (nam) {
898 1.2 itojun error = EISCONN;
899 1.2 itojun break;
900 1.2 itojun }
901 1.2 itojun /* XXX */
902 1.89 dyoung sockaddr_in6_init(&tmp, &in6p->in6p_faddr, 0, 0, 0);
903 1.2 itojun dst = &tmp;
904 1.2 itojun } else {
905 1.2 itojun if (nam == NULL) {
906 1.2 itojun error = ENOTCONN;
907 1.2 itojun break;
908 1.2 itojun }
909 1.42 itojun if (nam->m_len != sizeof(tmp)) {
910 1.42 itojun error = EINVAL;
911 1.42 itojun break;
912 1.42 itojun }
913 1.42 itojun
914 1.24 itojun tmp = *mtod(nam, struct sockaddr_in6 *);
915 1.24 itojun dst = &tmp;
916 1.42 itojun
917 1.42 itojun if (dst->sin6_family != AF_INET6) {
918 1.42 itojun error = EAFNOSUPPORT;
919 1.42 itojun break;
920 1.42 itojun }
921 1.2 itojun }
922 1.2 itojun error = rip6_output(m, so, dst, control);
923 1.2 itojun m = NULL;
924 1.2 itojun break;
925 1.40 itojun }
926 1.2 itojun
927 1.2 itojun /*
928 1.2 itojun * Not supported.
929 1.2 itojun */
930 1.2 itojun case PRU_RCVD:
931 1.2 itojun error = EOPNOTSUPP;
932 1.2 itojun break;
933 1.2 itojun
934 1.2 itojun default:
935 1.2 itojun panic("rip6_usrreq");
936 1.2 itojun }
937 1.2 itojun if (m != NULL)
938 1.2 itojun m_freem(m);
939 1.83 dyoung return error;
940 1.2 itojun }
941 1.69 atatat
942 1.95 thorpej static int
943 1.95 thorpej sysctl_net_inet6_raw6_stats(SYSCTLFN_ARGS)
944 1.95 thorpej {
945 1.95 thorpej
946 1.99 thorpej return (NETSTAT_SYSCTL(rip6stat_percpu, RIP6_NSTATS));
947 1.95 thorpej }
948 1.95 thorpej
949 1.105 pooka static void
950 1.105 pooka sysctl_net_inet6_raw6_setup(struct sysctllog **clog)
951 1.69 atatat {
952 1.69 atatat
953 1.69 atatat sysctl_createv(clog, 0, NULL, NULL,
954 1.69 atatat CTLFLAG_PERMANENT,
955 1.69 atatat CTLTYPE_NODE, "inet6", NULL,
956 1.69 atatat NULL, 0, NULL, 0,
957 1.69 atatat CTL_NET, PF_INET6, CTL_EOL);
958 1.69 atatat sysctl_createv(clog, 0, NULL, NULL,
959 1.69 atatat CTLFLAG_PERMANENT,
960 1.69 atatat CTLTYPE_NODE, "raw6",
961 1.69 atatat SYSCTL_DESCR("Raw IPv6 settings"),
962 1.69 atatat NULL, 0, NULL, 0,
963 1.69 atatat CTL_NET, PF_INET6, IPPROTO_RAW, CTL_EOL);
964 1.69 atatat
965 1.69 atatat sysctl_createv(clog, 0, NULL, NULL,
966 1.69 atatat CTLFLAG_PERMANENT,
967 1.71 atatat CTLTYPE_STRUCT, "pcblist",
968 1.69 atatat SYSCTL_DESCR("Raw IPv6 control block list"),
969 1.69 atatat sysctl_inpcblist, 0, &raw6cbtable, 0,
970 1.69 atatat CTL_NET, PF_INET6, IPPROTO_RAW,
971 1.69 atatat CTL_CREATE, CTL_EOL);
972 1.73 rpaulo sysctl_createv(clog, 0, NULL, NULL,
973 1.73 rpaulo CTLFLAG_PERMANENT,
974 1.73 rpaulo CTLTYPE_STRUCT, "stats",
975 1.73 rpaulo SYSCTL_DESCR("Raw IPv6 statistics"),
976 1.95 thorpej sysctl_net_inet6_raw6_stats, 0, NULL, 0,
977 1.73 rpaulo CTL_NET, PF_INET6, IPPROTO_RAW, RAW6CTL_STATS,
978 1.73 rpaulo CTL_EOL);
979 1.69 atatat }
980 1.115 rmind
981 1.117 rmind PR_WRAP_USRREQS(rip6)
982 1.117 rmind #define rip6_attach rip6_attach_wrapper
983 1.117 rmind #define rip6_detach rip6_detach_wrapper
984 1.127 rtr #define rip6_accept rip6_accept_wrapper
985 1.129 rtr #define rip6_bind rip6_bind_wrapper
986 1.129 rtr #define rip6_listen rip6_listen_wrapper
987 1.130 rtr #define rip6_connect rip6_connect_wrapper
988 1.132 rtr #define rip6_disconnect rip6_disconnect_wrapper
989 1.132 rtr #define rip6_shutdown rip6_shutdown_wrapper
990 1.132 rtr #define rip6_abort rip6_abort_wrapper
991 1.119 rtr #define rip6_ioctl rip6_ioctl_wrapper
992 1.122 rtr #define rip6_stat rip6_stat_wrapper
993 1.126 rtr #define rip6_peeraddr rip6_peeraddr_wrapper
994 1.126 rtr #define rip6_sockaddr rip6_sockaddr_wrapper
995 1.128 rtr #define rip6_recvoob rip6_recvoob_wrapper
996 1.128 rtr #define rip6_sendoob rip6_sendoob_wrapper
997 1.115 rmind #define rip6_usrreq rip6_usrreq_wrapper
998 1.115 rmind
999 1.115 rmind const struct pr_usrreqs rip6_usrreqs = {
1000 1.116 rmind .pr_attach = rip6_attach,
1001 1.116 rmind .pr_detach = rip6_detach,
1002 1.127 rtr .pr_accept = rip6_accept,
1003 1.129 rtr .pr_bind = rip6_bind,
1004 1.129 rtr .pr_listen = rip6_listen,
1005 1.130 rtr .pr_connect = rip6_connect,
1006 1.132 rtr .pr_disconnect = rip6_disconnect,
1007 1.132 rtr .pr_shutdown = rip6_shutdown,
1008 1.132 rtr .pr_abort = rip6_abort,
1009 1.119 rtr .pr_ioctl = rip6_ioctl,
1010 1.122 rtr .pr_stat = rip6_stat,
1011 1.126 rtr .pr_peeraddr = rip6_peeraddr,
1012 1.126 rtr .pr_sockaddr = rip6_sockaddr,
1013 1.128 rtr .pr_recvoob = rip6_recvoob,
1014 1.128 rtr .pr_sendoob = rip6_sendoob,
1015 1.115 rmind .pr_generic = rip6_usrreq,
1016 1.115 rmind };
1017