1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244 |
- /* $OpenBSD: ip6_output.c,v 1.177 2015/07/16 21:14:21 mpi Exp $ */
- /* $KAME: ip6_output.c,v 1.172 2001/03/25 09:55:56 itojun Exp $ */
- /*
- * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- * 3. Neither the name of the project nor the names of its contributors
- * may be used to endorse or promote products derived from this software
- * without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
- * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- * SUCH DAMAGE.
- */
- /*
- * Copyright (c) 1982, 1986, 1988, 1990, 1993
- * The Regents of the University of California. All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- * 3. Neither the name of the University nor the names of its contributors
- * may be used to endorse or promote products derived from this software
- * without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
- * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- * SUCH DAMAGE.
- *
- * @(#)ip_output.c 8.3 (Berkeley) 1/21/94
- */
- #include "pf.h"
- #include <sys/param.h>
- #include <sys/malloc.h>
- #include <sys/mbuf.h>
- #include <sys/errno.h>
- #include <sys/protosw.h>
- #include <sys/socket.h>
- #include <sys/socketvar.h>
- #include <sys/proc.h>
- #include <sys/systm.h>
- #include <net/if.h>
- #include <net/if_var.h>
- #include <net/if_enc.h>
- #include <net/route.h>
- #include <netinet/in.h>
- #include <netinet/ip.h>
- #include <netinet/in_pcb.h>
- #include <netinet/udp.h>
- #include <netinet/tcp.h>
- #include <netinet/ip_var.h>
- #include <netinet/tcp_timer.h>
- #include <netinet/tcp_var.h>
- #include <netinet/udp_var.h>
- #include <netinet6/in6_var.h>
- #include <netinet/ip6.h>
- #include <netinet/icmp6.h>
- #include <netinet6/ip6_var.h>
- #include <netinet6/nd6.h>
- #include <netinet6/ip6protosw.h>
- #include <crypto/idgen.h>
- #if NPF > 0
- #include <net/pfvar.h>
- #endif
- #ifdef IPSEC
- #include <netinet/ip_ipsp.h>
- #include <netinet/ip_ah.h>
- #include <netinet/ip_esp.h>
- #endif /* IPSEC */
- struct ip6_exthdrs {
- struct mbuf *ip6e_ip6;
- struct mbuf *ip6e_hbh;
- struct mbuf *ip6e_dest1;
- struct mbuf *ip6e_rthdr;
- struct mbuf *ip6e_dest2;
- };
- int ip6_pcbopt(int, u_char *, int, struct ip6_pktopts **, int, int);
- int ip6_pcbopts(struct ip6_pktopts **, struct mbuf *, struct socket *);
- int ip6_getpcbopt(struct ip6_pktopts *, int, struct mbuf **);
- int ip6_setpktopt(int, u_char *, int, struct ip6_pktopts *, int, int,
- int, int);
- int ip6_setmoptions(int, struct ip6_moptions **, struct mbuf *);
- int ip6_getmoptions(int, struct ip6_moptions *, struct mbuf **);
- int ip6_copyexthdr(struct mbuf **, caddr_t, int);
- int ip6_insertfraghdr(struct mbuf *, struct mbuf *, int,
- struct ip6_frag **);
- int ip6_insert_jumboopt(struct ip6_exthdrs *, u_int32_t);
- int ip6_splithdr(struct mbuf *, struct ip6_exthdrs *);
- int ip6_getpmtu(struct route_in6 *, struct route_in6 *,
- struct ifnet *, struct in6_addr *, u_long *, int *);
- int copypktopts(struct ip6_pktopts *, struct ip6_pktopts *, int);
- static __inline u_int16_t __attribute__((__unused__))
- in6_cksum_phdr(const struct in6_addr *, const struct in6_addr *,
- u_int32_t, u_int32_t);
- void in6_delayed_cksum(struct mbuf *, u_int8_t);
- /* Context for non-repeating IDs */
- struct idgen32_ctx ip6_id_ctx;
- /*
- * IP6 output. The packet in mbuf chain m contains a skeletal IP6
- * header (with pri, len, nxt, hlim, src, dst).
- * This function may modify ver and hlim only.
- * The mbuf chain containing the packet will be freed.
- * The mbuf opt, if present, will not be freed.
- *
- * type of "mtu": rt_rmx.rmx_mtu is u_long, ifnet.ifr_mtu is int, and
- * nd_ifinfo.linkmtu is u_int32_t. so we use u_long to hold largest one,
- * which is rt_rmx.rmx_mtu.
- *
- * ifpp - XXX: just for statistics
- */
- int
- ip6_output(struct mbuf *m0, struct ip6_pktopts *opt, struct route_in6 *ro,
- int flags, struct ip6_moptions *im6o, struct ifnet **ifpp,
- struct inpcb *inp)
- {
- struct ip6_hdr *ip6;
- struct ifnet *ifp;
- struct mbuf *m = m0;
- int hlen, tlen;
- struct route_in6 ip6route;
- struct rtentry *rt = NULL;
- struct sockaddr_in6 *dst, dstsock;
- int error = 0;
- u_long mtu;
- int alwaysfrag, dontfrag;
- u_int16_t src_scope, dst_scope;
- u_int32_t optlen = 0, plen = 0, unfragpartlen = 0;
- struct ip6_exthdrs exthdrs;
- struct in6_addr finaldst;
- struct route_in6 *ro_pmtu = NULL;
- int hdrsplit = 0;
- u_int8_t sproto = 0;
- #ifdef IPSEC
- struct m_tag *mtag;
- union sockaddr_union sdst;
- struct tdb_ident *tdbi;
- u_int32_t sspi;
- struct tdb *tdb;
- #if NPF > 0
- struct ifnet *encif;
- #endif
- #endif /* IPSEC */
- #ifdef IPSEC
- if (inp && (inp->inp_flags & INP_IPV6) == 0)
- panic("ip6_output: IPv4 pcb is passed");
- #endif /* IPSEC */
- ip6 = mtod(m, struct ip6_hdr *);
- finaldst = ip6->ip6_dst;
- #define MAKE_EXTHDR(hp, mp) \
- do { \
- if (hp) { \
- struct ip6_ext *eh = (struct ip6_ext *)(hp); \
- error = ip6_copyexthdr((mp), (caddr_t)(hp), \
- ((eh)->ip6e_len + 1) << 3); \
- if (error) \
- goto freehdrs; \
- } \
- } while (0)
- bzero(&exthdrs, sizeof(exthdrs));
- if (opt) {
- /* Hop-by-Hop options header */
- MAKE_EXTHDR(opt->ip6po_hbh, &exthdrs.ip6e_hbh);
- /* Destination options header(1st part) */
- MAKE_EXTHDR(opt->ip6po_dest1, &exthdrs.ip6e_dest1);
- /* Routing header */
- MAKE_EXTHDR(opt->ip6po_rthdr, &exthdrs.ip6e_rthdr);
- /* Destination options header(2nd part) */
- MAKE_EXTHDR(opt->ip6po_dest2, &exthdrs.ip6e_dest2);
- }
- #ifdef IPSEC
- if (!ipsec_in_use && !inp)
- goto done_spd;
- /*
- * Check if there was an outgoing SA bound to the flow
- * from a transport protocol.
- */
- ip6 = mtod(m, struct ip6_hdr *);
- /* Do we have any pending SAs to apply ? */
- tdb = ipsp_spd_lookup(m, AF_INET6, sizeof(struct ip6_hdr),
- &error, IPSP_DIRECTION_OUT, NULL, inp, 0);
- if (tdb == NULL) {
- if (error == 0) {
- /*
- * No IPsec processing required, we'll just send the
- * packet out.
- */
- sproto = 0;
- /* Fall through to routing/multicast handling */
- } else {
- /*
- * -EINVAL is used to indicate that the packet should
- * be silently dropped, typically because we've asked
- * key management for an SA.
- */
- if (error == -EINVAL) /* Should silently drop packet */
- error = 0;
- goto freehdrs;
- }
- } else {
- /* Loop detection */
- for (mtag = m_tag_first(m); mtag != NULL;
- mtag = m_tag_next(m, mtag)) {
- if (mtag->m_tag_id != PACKET_TAG_IPSEC_OUT_DONE)
- continue;
- tdbi = (struct tdb_ident *)(mtag + 1);
- if (tdbi->spi == tdb->tdb_spi &&
- tdbi->proto == tdb->tdb_sproto &&
- tdbi->rdomain == tdb->tdb_rdomain &&
- !bcmp(&tdbi->dst, &tdb->tdb_dst,
- sizeof(union sockaddr_union))) {
- sproto = 0; /* mark as no-IPsec-needed */
- goto done_spd;
- }
- }
- /* We need to do IPsec */
- bcopy(&tdb->tdb_dst, &sdst, sizeof(sdst));
- sspi = tdb->tdb_spi;
- sproto = tdb->tdb_sproto;
- }
- /* Fall through to the routing/multicast handling code */
- done_spd:
- #endif /* IPSEC */
- /*
- * Calculate the total length of the extension header chain.
- * Keep the length of the unfragmentable part for fragmentation.
- */
- optlen = 0;
- if (exthdrs.ip6e_hbh) optlen += exthdrs.ip6e_hbh->m_len;
- if (exthdrs.ip6e_dest1) optlen += exthdrs.ip6e_dest1->m_len;
- if (exthdrs.ip6e_rthdr) optlen += exthdrs.ip6e_rthdr->m_len;
- unfragpartlen = optlen + sizeof(struct ip6_hdr);
- /* NOTE: we don't add AH/ESP length here. do that later. */
- if (exthdrs.ip6e_dest2) optlen += exthdrs.ip6e_dest2->m_len;
- /*
- * If we need IPsec, or there is at least one extension header,
- * separate IP6 header from the payload.
- */
- if ((sproto || optlen) && !hdrsplit) {
- if ((error = ip6_splithdr(m, &exthdrs)) != 0) {
- m = NULL;
- goto freehdrs;
- }
- m = exthdrs.ip6e_ip6;
- hdrsplit++;
- }
- /* adjust pointer */
- ip6 = mtod(m, struct ip6_hdr *);
- /* adjust mbuf packet header length */
- m->m_pkthdr.len += optlen;
- plen = m->m_pkthdr.len - sizeof(*ip6);
- /* If this is a jumbo payload, insert a jumbo payload option. */
- if (plen > IPV6_MAXPACKET) {
- if (!hdrsplit) {
- if ((error = ip6_splithdr(m, &exthdrs)) != 0) {
- m = NULL;
- goto freehdrs;
- }
- m = exthdrs.ip6e_ip6;
- hdrsplit++;
- }
- /* adjust pointer */
- ip6 = mtod(m, struct ip6_hdr *);
- if ((error = ip6_insert_jumboopt(&exthdrs, plen)) != 0)
- goto freehdrs;
- ip6->ip6_plen = 0;
- } else
- ip6->ip6_plen = htons(plen);
- /*
- * Concatenate headers and fill in next header fields.
- * Here we have, on "m"
- * IPv6 payload
- * and we insert headers accordingly. Finally, we should be getting:
- * IPv6 hbh dest1 rthdr ah* [esp* dest2 payload]
- *
- * during the header composing process, "m" points to IPv6 header.
- * "mprev" points to an extension header prior to esp.
- */
- {
- u_char *nexthdrp = &ip6->ip6_nxt;
- struct mbuf *mprev = m;
- /*
- * we treat dest2 specially. this makes IPsec processing
- * much easier. the goal here is to make mprev point the
- * mbuf prior to dest2.
- *
- * result: IPv6 dest2 payload
- * m and mprev will point to IPv6 header.
- */
- if (exthdrs.ip6e_dest2) {
- if (!hdrsplit)
- panic("assumption failed: hdr not split");
- exthdrs.ip6e_dest2->m_next = m->m_next;
- m->m_next = exthdrs.ip6e_dest2;
- *mtod(exthdrs.ip6e_dest2, u_char *) = ip6->ip6_nxt;
- ip6->ip6_nxt = IPPROTO_DSTOPTS;
- }
- #define MAKE_CHAIN(m, mp, p, i)\
- do {\
- if (m) {\
- if (!hdrsplit) \
- panic("assumption failed: hdr not split"); \
- *mtod((m), u_char *) = *(p);\
- *(p) = (i);\
- p = mtod((m), u_char *);\
- (m)->m_next = (mp)->m_next;\
- (mp)->m_next = (m);\
- (mp) = (m);\
- }\
- } while (0)
- /*
- * result: IPv6 hbh dest1 rthdr dest2 payload
- * m will point to IPv6 header. mprev will point to the
- * extension header prior to dest2 (rthdr in the above case).
- */
- MAKE_CHAIN(exthdrs.ip6e_hbh, mprev, nexthdrp, IPPROTO_HOPOPTS);
- MAKE_CHAIN(exthdrs.ip6e_dest1, mprev, nexthdrp,
- IPPROTO_DSTOPTS);
- MAKE_CHAIN(exthdrs.ip6e_rthdr, mprev, nexthdrp,
- IPPROTO_ROUTING);
- }
- /*
- * If there is a routing header, replace the destination address field
- * with the first hop of the routing header.
- */
- if (exthdrs.ip6e_rthdr) {
- struct ip6_rthdr *rh;
- struct ip6_rthdr0 *rh0;
- struct in6_addr *addr;
- rh = (struct ip6_rthdr *)(mtod(exthdrs.ip6e_rthdr,
- struct ip6_rthdr *));
- switch (rh->ip6r_type) {
- case IPV6_RTHDR_TYPE_0:
- rh0 = (struct ip6_rthdr0 *)rh;
- addr = (struct in6_addr *)(rh0 + 1);
- ip6->ip6_dst = addr[0];
- bcopy(&addr[1], &addr[0],
- sizeof(struct in6_addr) * (rh0->ip6r0_segleft - 1));
- addr[rh0->ip6r0_segleft - 1] = finaldst;
- break;
- default: /* is it possible? */
- error = EINVAL;
- goto bad;
- }
- }
- /* Source address validation */
- if (!(flags & IPV6_UNSPECSRC) &&
- IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_src)) {
- /*
- * XXX: we can probably assume validation in the caller, but
- * we explicitly check the address here for safety.
- */
- error = EOPNOTSUPP;
- ip6stat.ip6s_badscope++;
- goto bad;
- }
- if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_src)) {
- error = EOPNOTSUPP;
- ip6stat.ip6s_badscope++;
- goto bad;
- }
- ip6stat.ip6s_localout++;
- /*
- * Route packet.
- */
- #if NPF > 0
- reroute:
- #endif
- /* initialize cached route */
- if (ro == NULL) {
- ro = &ip6route;
- bzero((caddr_t)ro, sizeof(*ro));
- }
- ro_pmtu = ro;
- if (opt && opt->ip6po_rthdr)
- ro = &opt->ip6po_route;
- dst = &ro->ro_dst;
- /*
- * if specified, try to fill in the traffic class field.
- * do not override if a non-zero value is already set.
- * we check the diffserv field and the ecn field separately.
- */
- if (opt && opt->ip6po_tclass >= 0) {
- int mask = 0;
- if ((ip6->ip6_flow & htonl(0xfc << 20)) == 0)
- mask |= 0xfc;
- if ((ip6->ip6_flow & htonl(0x03 << 20)) == 0)
- mask |= 0x03;
- if (mask != 0)
- ip6->ip6_flow |= htonl((opt->ip6po_tclass & mask) << 20);
- }
- /* fill in or override the hop limit field, if necessary. */
- if (opt && opt->ip6po_hlim != -1)
- ip6->ip6_hlim = opt->ip6po_hlim & 0xff;
- else if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst)) {
- if (im6o != NULL)
- ip6->ip6_hlim = im6o->im6o_hlim;
- else
- ip6->ip6_hlim = ip6_defmcasthlim;
- }
- #ifdef IPSEC
- /*
- * Check if the packet needs encapsulation.
- * ipsp_process_packet will never come back to here.
- */
- if (sproto != 0) {
- /*
- * XXX what should we do if ip6_hlim == 0 and the
- * packet gets tunneled?
- */
- tdb = gettdb(rtable_l2(m->m_pkthdr.ph_rtableid),
- sspi, &sdst, sproto);
- if (tdb == NULL) {
- error = EHOSTUNREACH;
- m_freem(m);
- goto done;
- }
- #if NPF > 0
- if ((encif = enc_getif(tdb->tdb_rdomain,
- tdb->tdb_tap)) == NULL ||
- pf_test(AF_INET6, PF_OUT, encif, &m) != PF_PASS) {
- error = EHOSTUNREACH;
- m_freem(m);
- goto done;
- }
- if (m == NULL)
- goto done;
- ip6 = mtod(m, struct ip6_hdr *);
- /*
- * PF_TAG_REROUTE handling or not...
- * Packet is entering IPsec so the routing is
- * already overruled by the IPsec policy.
- * Until now the change was not reconsidered.
- * What's the behaviour?
- */
- #endif
- in6_proto_cksum_out(m, encif);
- m->m_flags &= ~(M_BCAST | M_MCAST); /* just in case */
- /* Callee frees mbuf */
- /*
- * if we are source-routing, do not attempt to tunnel the
- * packet just because ip6_dst is different from what tdb has.
- * XXX
- */
- error = ipsp_process_packet(m, tdb, AF_INET6,
- exthdrs.ip6e_rthdr ? 1 : 0);
- return error; /* Nothing more to be done */
- }
- #endif /* IPSEC */
- bzero(&dstsock, sizeof(dstsock));
- dstsock.sin6_family = AF_INET6;
- dstsock.sin6_addr = ip6->ip6_dst;
- dstsock.sin6_len = sizeof(dstsock);
- ro->ro_tableid = m->m_pkthdr.ph_rtableid;
- if ((error = in6_selectroute(&dstsock, opt, im6o, ro, &ifp,
- &rt, m->m_pkthdr.ph_rtableid)) != 0) {
- switch (error) {
- case EHOSTUNREACH:
- ip6stat.ip6s_noroute++;
- break;
- case EADDRNOTAVAIL:
- default:
- break; /* XXX statistics? */
- }
- if (ifp != NULL)
- in6_ifstat_inc(ifp, ifs6_out_discard);
- goto bad;
- }
- if (rt == NULL) {
- /*
- * If in6_selectroute() does not return a route entry,
- * dst may not have been updated.
- */
- *dst = dstsock; /* XXX */
- }
- /*
- * then rt (for unicast) and ifp must be non-NULL valid values.
- */
- if (rt)
- rt->rt_use++;
- if ((flags & IPV6_FORWARDING) == 0) {
- /* XXX: the FORWARDING flag can be set for mrouting. */
- in6_ifstat_inc(ifp, ifs6_out_request);
- }
- if (rt && !IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst)) {
- if (opt && opt->ip6po_nextroute.ro_rt) {
- /*
- * The nexthop is explicitly specified by the
- * application. We assume the next hop is an IPv6
- * address.
- */
- dst = satosin6(opt->ip6po_nexthop);
- } else if ((rt->rt_flags & RTF_GATEWAY))
- dst = satosin6(rt->rt_gateway);
- }
- if (!IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst)) {
- /* Unicast */
- m->m_flags &= ~(M_BCAST | M_MCAST); /* just in case */
- } else {
- /* Multicast */
- struct in6_multi *in6m;
- m->m_flags = (m->m_flags & ~M_BCAST) | M_MCAST;
- in6_ifstat_inc(ifp, ifs6_out_mcast);
- /*
- * Confirm that the outgoing interface supports multicast.
- */
- if ((ifp->if_flags & IFF_MULTICAST) == 0) {
- ip6stat.ip6s_noroute++;
- in6_ifstat_inc(ifp, ifs6_out_discard);
- error = ENETUNREACH;
- goto bad;
- }
- IN6_LOOKUP_MULTI(ip6->ip6_dst, ifp, in6m);
- if (in6m != NULL &&
- (im6o == NULL || im6o->im6o_loop)) {
- /*
- * If we belong to the destination multicast group
- * on the outgoing interface, and the caller did not
- * forbid loopback, loop back a copy.
- */
- ip6_mloopback(ifp, m, dst);
- } else {
- /*
- * If we are acting as a multicast router, perform
- * multicast forwarding as if the packet had just
- * arrived on the interface to which we are about
- * to send. The multicast forwarding function
- * recursively calls this function, using the
- * IPV6_FORWARDING flag to prevent infinite recursion.
- *
- * Multicasts that are looped back by ip6_mloopback(),
- * above, will be forwarded by the ip6_input() routine,
- * if necessary.
- */
- #ifdef MROUTING
- if (ip6_mforwarding && ip6_mrouter &&
- (flags & IPV6_FORWARDING) == 0) {
- if (ip6_mforward(ip6, ifp, m) != 0) {
- m_freem(m);
- goto done;
- }
- }
- #endif
- }
- /*
- * Multicasts with a hoplimit of zero may be looped back,
- * above, but must not be transmitted on a network.
- * Also, multicasts addressed to the loopback interface
- * are not sent -- the above call to ip6_mloopback() will
- * loop back a copy if this host actually belongs to the
- * destination group on the loopback interface.
- */
- if (ip6->ip6_hlim == 0 || (ifp->if_flags & IFF_LOOPBACK) ||
- IN6_IS_ADDR_MC_INTFACELOCAL(&ip6->ip6_dst)) {
- m_freem(m);
- goto done;
- }
- }
- /*
- * If this packet is going trough a loopback interface we wont
- * be able to restore its scope ID using the interface index.
- */
- if (IN6_IS_SCOPE_EMBED(&ip6->ip6_src)) {
- if (ifp->if_flags & IFF_LOOPBACK)
- src_scope = ip6->ip6_src.s6_addr16[1];
- ip6->ip6_src.s6_addr16[1] = 0;
- }
- if (IN6_IS_SCOPE_EMBED(&ip6->ip6_dst)) {
- if (ifp->if_flags & IFF_LOOPBACK)
- dst_scope = ip6->ip6_dst.s6_addr16[1];
- ip6->ip6_dst.s6_addr16[1] = 0;
- }
- /*
- * Fill the outgoing interface to tell the upper layer
- * to increment per-interface statistics.
- */
- if (ifpp)
- *ifpp = ifp;
- /* Determine path MTU. */
- if ((error = ip6_getpmtu(ro_pmtu, ro, ifp, &finaldst, &mtu,
- &alwaysfrag)) != 0)
- goto bad;
- /*
- * The caller of this function may specify to use the minimum MTU
- * in some cases.
- * An advanced API option (IPV6_USE_MIN_MTU) can also override MTU
- * setting. The logic is a bit complicated; by default, unicast
- * packets will follow path MTU while multicast packets will be sent at
- * the minimum MTU. If IP6PO_MINMTU_ALL is specified, all packets
- * including unicast ones will be sent at the minimum MTU. Multicast
- * packets will always be sent at the minimum MTU unless
- * IP6PO_MINMTU_DISABLE is explicitly specified.
- * See RFC 3542 for more details.
- */
- if (mtu > IPV6_MMTU) {
- if ((flags & IPV6_MINMTU))
- mtu = IPV6_MMTU;
- else if (opt && opt->ip6po_minmtu == IP6PO_MINMTU_ALL)
- mtu = IPV6_MMTU;
- else if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) &&
- (opt == NULL ||
- opt->ip6po_minmtu != IP6PO_MINMTU_DISABLE)) {
- mtu = IPV6_MMTU;
- }
- }
- /*
- * If the outgoing packet contains a hop-by-hop options header,
- * it must be examined and processed even by the source node.
- * (RFC 2460, section 4.)
- */
- if (exthdrs.ip6e_hbh) {
- struct ip6_hbh *hbh = mtod(exthdrs.ip6e_hbh, struct ip6_hbh *);
- u_int32_t dummy1; /* XXX unused */
- u_int32_t dummy2; /* XXX unused */
- /*
- * XXX: if we have to send an ICMPv6 error to the sender,
- * we need the M_LOOP flag since icmp6_error() expects
- * the IPv6 and the hop-by-hop options header are
- * continuous unless the flag is set.
- */
- m->m_flags |= M_LOOP;
- m->m_pkthdr.ph_ifidx = ifp->if_index;
- if (ip6_process_hopopts(m, (u_int8_t *)(hbh + 1),
- ((hbh->ip6h_len + 1) << 3) - sizeof(struct ip6_hbh),
- &dummy1, &dummy2) < 0) {
- /* m was already freed at this point */
- error = EINVAL;/* better error? */
- goto done;
- }
- m->m_flags &= ~M_LOOP; /* XXX */
- m->m_pkthdr.ph_ifidx = 0;
- }
- #if NPF > 0
- if (pf_test(AF_INET6, PF_OUT, ifp, &m) != PF_PASS) {
- error = EHOSTUNREACH;
- m_freem(m);
- goto done;
- }
- if (m == NULL)
- goto done;
- ip6 = mtod(m, struct ip6_hdr *);
- if ((m->m_pkthdr.pf.flags & (PF_TAG_REROUTE | PF_TAG_GENERATED)) ==
- (PF_TAG_REROUTE | PF_TAG_GENERATED)) {
- /* already rerun the route lookup, go on */
- m->m_pkthdr.pf.flags &= ~(PF_TAG_GENERATED | PF_TAG_REROUTE);
- } else if (m->m_pkthdr.pf.flags & PF_TAG_REROUTE) {
- /* tag as generated to skip over pf_test on rerun */
- m->m_pkthdr.pf.flags |= PF_TAG_GENERATED;
- finaldst = ip6->ip6_dst;
- ro = NULL;
- goto reroute;
- }
- #endif
- /*
- * If the packet is not going on the wire it can be destinated
- * to any local address. In this case do not clear its scopes
- * to let ip6_input() find a matching local route.
- */
- if (ifp->if_flags & IFF_LOOPBACK) {
- if (IN6_IS_SCOPE_EMBED(&ip6->ip6_src))
- ip6->ip6_src.s6_addr16[1] = src_scope;
- if (IN6_IS_SCOPE_EMBED(&ip6->ip6_dst))
- ip6->ip6_dst.s6_addr16[1] = dst_scope;
- }
- in6_proto_cksum_out(m, ifp);
- /*
- * Send the packet to the outgoing interface.
- * If necessary, do IPv6 fragmentation before sending.
- *
- * the logic here is rather complex:
- * 1: normal case (dontfrag == 0, alwaysfrag == 0)
- * 1-a: send as is if tlen <= path mtu
- * 1-b: fragment if tlen > path mtu
- *
- * 2: if user asks us not to fragment (dontfrag == 1)
- * 2-a: send as is if tlen <= interface mtu
- * 2-b: error if tlen > interface mtu
- *
- * 3: if we always need to attach fragment header (alwaysfrag == 1)
- * always fragment
- *
- * 4: if dontfrag == 1 && alwaysfrag == 1
- * error, as we cannot handle this conflicting request
- */
- tlen = m->m_pkthdr.len;
- if (opt && (opt->ip6po_flags & IP6PO_DONTFRAG))
- dontfrag = 1;
- else
- dontfrag = 0;
- if (dontfrag && alwaysfrag) { /* case 4 */
- /* conflicting request - can't transmit */
- error = EMSGSIZE;
- goto bad;
- }
- if (dontfrag && tlen > IN6_LINKMTU(ifp)) { /* case 2-b */
- /*
- * Even if the DONTFRAG option is specified, we cannot send the
- * packet when the data length is larger than the MTU of the
- * outgoing interface.
- * Notify the error by sending IPV6_PATHMTU ancillary data as
- * well as returning an error code (the latter is not described
- * in the API spec.)
- */
- #if 0
- u_int32_t mtu32;
- struct ip6ctlparam ip6cp;
- mtu32 = (u_int32_t)mtu;
- bzero(&ip6cp, sizeof(ip6cp));
- ip6cp.ip6c_cmdarg = (void *)&mtu32;
- pfctlinput2(PRC_MSGSIZE, sin6tosa(&ro_pmtu->ro_dst),
- (void *)&ip6cp);
- #endif
- error = EMSGSIZE;
- goto bad;
- }
- /*
- * transmit packet without fragmentation
- */
- if (dontfrag || (!alwaysfrag && tlen <= mtu)) { /* case 1-a and 2-a */
- error = nd6_output(ifp, m, dst, ro->ro_rt);
- goto done;
- }
- /*
- * try to fragment the packet. case 1-b and 3
- */
- if (mtu < IPV6_MMTU) {
- /* path MTU cannot be less than IPV6_MMTU */
- error = EMSGSIZE;
- in6_ifstat_inc(ifp, ifs6_out_fragfail);
- goto bad;
- } else if (ip6->ip6_plen == 0) {
- /* jumbo payload cannot be fragmented */
- error = EMSGSIZE;
- in6_ifstat_inc(ifp, ifs6_out_fragfail);
- goto bad;
- } else {
- u_char nextproto;
- #if 0
- struct ip6ctlparam ip6cp;
- u_int32_t mtu32;
- #endif
- /*
- * Too large for the destination or interface;
- * fragment if possible.
- * Must be able to put at least 8 bytes per fragment.
- */
- hlen = unfragpartlen;
- if (mtu > IPV6_MAXPACKET)
- mtu = IPV6_MAXPACKET;
- #if 0
- /* Notify a proper path MTU to applications. */
- mtu32 = (u_int32_t)mtu;
- bzero(&ip6cp, sizeof(ip6cp));
- ip6cp.ip6c_cmdarg = (void *)&mtu32;
- pfctlinput2(PRC_MSGSIZE, sin6tosa(&ro_pmtu->ro_dst),
- (void *)&ip6cp);
- #endif
- /*
- * Change the next header field of the last header in the
- * unfragmentable part.
- */
- if (exthdrs.ip6e_rthdr) {
- nextproto = *mtod(exthdrs.ip6e_rthdr, u_char *);
- *mtod(exthdrs.ip6e_rthdr, u_char *) = IPPROTO_FRAGMENT;
- } else if (exthdrs.ip6e_dest1) {
- nextproto = *mtod(exthdrs.ip6e_dest1, u_char *);
- *mtod(exthdrs.ip6e_dest1, u_char *) = IPPROTO_FRAGMENT;
- } else if (exthdrs.ip6e_hbh) {
- nextproto = *mtod(exthdrs.ip6e_hbh, u_char *);
- *mtod(exthdrs.ip6e_hbh, u_char *) = IPPROTO_FRAGMENT;
- } else {
- nextproto = ip6->ip6_nxt;
- ip6->ip6_nxt = IPPROTO_FRAGMENT;
- }
- m0 = m;
- error = ip6_fragment(m0, hlen, nextproto, mtu);
- switch (error) {
- case 0:
- in6_ifstat_inc(ifp, ifs6_out_fragok);
- break;
- case EMSGSIZE:
- in6_ifstat_inc(ifp, ifs6_out_fragfail);
- break;
- default:
- ip6stat.ip6s_odropped++;
- break;
- }
- }
- /*
- * Remove leading garbages.
- */
- m = m0->m_nextpkt;
- m0->m_nextpkt = 0;
- m_freem(m0);
- for (m0 = m; m; m = m0) {
- m0 = m->m_nextpkt;
- m->m_nextpkt = 0;
- if (error == 0) {
- ip6stat.ip6s_ofragments++;
- in6_ifstat_inc(ifp, ifs6_out_fragcreat);
- error = nd6_output(ifp, m, dst, ro->ro_rt);
- } else
- m_freem(m);
- }
- if (error == 0)
- ip6stat.ip6s_fragmented++;
- done:
- if (ro == &ip6route && ro->ro_rt) {
- rtfree(ro->ro_rt);
- } else if (ro_pmtu == &ip6route && ro_pmtu->ro_rt) {
- rtfree(ro_pmtu->ro_rt);
- }
- return (error);
- freehdrs:
- m_freem(exthdrs.ip6e_hbh); /* m_freem will check if mbuf is 0 */
- m_freem(exthdrs.ip6e_dest1);
- m_freem(exthdrs.ip6e_rthdr);
- m_freem(exthdrs.ip6e_dest2);
- /* FALLTHROUGH */
- bad:
- m_freem(m);
- goto done;
- }
- int
- ip6_fragment(struct mbuf *m0, int hlen, u_char nextproto, u_long mtu)
- {
- struct mbuf *m, **mnext, *m_frgpart;
- struct ip6_hdr *mhip6;
- struct ip6_frag *ip6f;
- u_int32_t id;
- int tlen, len, off;
- int error;
- id = htonl(ip6_randomid());
- mnext = &m0->m_nextpkt;
- *mnext = NULL;
- tlen = m0->m_pkthdr.len;
- len = (mtu - hlen - sizeof(struct ip6_frag)) & ~7;
- if (len < 8)
- return (EMSGSIZE);
- /*
- * Loop through length of segment after first fragment,
- * make new header and copy data of each part and link onto
- * chain.
- */
- for (off = hlen; off < tlen; off += len) {
- struct mbuf *mlast;
- if ((m = m_gethdr(M_DONTWAIT, MT_HEADER)) == NULL)
- return (ENOBUFS);
- *mnext = m;
- mnext = &m->m_nextpkt;
- if ((error = m_dup_pkthdr(m, m0, M_DONTWAIT)) != 0)
- return (error);
- m->m_data += max_linkhdr;
- mhip6 = mtod(m, struct ip6_hdr *);
- *mhip6 = *mtod(m0, struct ip6_hdr *);
- m->m_len = sizeof(*mhip6);
- if ((error = ip6_insertfraghdr(m0, m, hlen, &ip6f)) != 0)
- return (error);
- ip6f->ip6f_offlg = htons((u_int16_t)((off - hlen) & ~7));
- if (off + len >= tlen)
- len = tlen - off;
- else
- ip6f->ip6f_offlg |= IP6F_MORE_FRAG;
- mhip6->ip6_plen = htons((u_int16_t)(len + hlen +
- sizeof(*ip6f) - sizeof(struct ip6_hdr)));
- if ((m_frgpart = m_copym(m0, off, len, M_DONTWAIT)) == NULL)
- return (ENOBUFS);
- for (mlast = m; mlast->m_next; mlast = mlast->m_next)
- ;
- mlast->m_next = m_frgpart;
- m->m_pkthdr.len = len + hlen + sizeof(*ip6f);
- ip6f->ip6f_reserved = 0;
- ip6f->ip6f_ident = id;
- ip6f->ip6f_nxt = nextproto;
- }
- return (0);
- }
- int
- ip6_copyexthdr(struct mbuf **mp, caddr_t hdr, int hlen)
- {
- struct mbuf *m;
- if (hlen > MCLBYTES)
- return (ENOBUFS); /* XXX */
- MGET(m, M_DONTWAIT, MT_DATA);
- if (!m)
- return (ENOBUFS);
- if (hlen > MLEN) {
- MCLGET(m, M_DONTWAIT);
- if ((m->m_flags & M_EXT) == 0) {
- m_free(m);
- return (ENOBUFS);
- }
- }
- m->m_len = hlen;
- if (hdr)
- bcopy(hdr, mtod(m, caddr_t), hlen);
- *mp = m;
- return (0);
- }
- /*
- * Insert jumbo payload option.
- */
- int
- ip6_insert_jumboopt(struct ip6_exthdrs *exthdrs, u_int32_t plen)
- {
- struct mbuf *mopt;
- u_int8_t *optbuf;
- u_int32_t v;
- #define JUMBOOPTLEN 8 /* length of jumbo payload option and padding */
- /*
- * If there is no hop-by-hop options header, allocate new one.
- * If there is one but it doesn't have enough space to store the
- * jumbo payload option, allocate a cluster to store the whole options.
- * Otherwise, use it to store the options.
- */
- if (exthdrs->ip6e_hbh == 0) {
- MGET(mopt, M_DONTWAIT, MT_DATA);
- if (mopt == NULL)
- return (ENOBUFS);
- mopt->m_len = JUMBOOPTLEN;
- optbuf = mtod(mopt, u_int8_t *);
- optbuf[1] = 0; /* = ((JUMBOOPTLEN) >> 3) - 1 */
- exthdrs->ip6e_hbh = mopt;
- } else {
- struct ip6_hbh *hbh;
- mopt = exthdrs->ip6e_hbh;
- if (M_TRAILINGSPACE(mopt) < JUMBOOPTLEN) {
- /*
- * XXX assumption:
- * - exthdrs->ip6e_hbh is not referenced from places
- * other than exthdrs.
- * - exthdrs->ip6e_hbh is not an mbuf chain.
- */
- int oldoptlen = mopt->m_len;
- struct mbuf *n;
- /*
- * XXX: give up if the whole (new) hbh header does
- * not fit even in an mbuf cluster.
- */
- if (oldoptlen + JUMBOOPTLEN > MCLBYTES)
- return (ENOBUFS);
- /*
- * As a consequence, we must always prepare a cluster
- * at this point.
- */
- MGET(n, M_DONTWAIT, MT_DATA);
- if (n) {
- MCLGET(n, M_DONTWAIT);
- if ((n->m_flags & M_EXT) == 0) {
- m_freem(n);
- n = NULL;
- }
- }
- if (!n)
- return (ENOBUFS);
- n->m_len = oldoptlen + JUMBOOPTLEN;
- bcopy(mtod(mopt, caddr_t), mtod(n, caddr_t),
- oldoptlen);
- optbuf = mtod(n, u_int8_t *) + oldoptlen;
- m_freem(mopt);
- mopt = exthdrs->ip6e_hbh = n;
- } else {
- optbuf = mtod(mopt, u_int8_t *) + mopt->m_len;
- mopt->m_len += JUMBOOPTLEN;
- }
- optbuf[0] = IP6OPT_PADN;
- optbuf[1] = 0;
- /*
- * Adjust the header length according to the pad and
- * the jumbo payload option.
- */
- hbh = mtod(mopt, struct ip6_hbh *);
- hbh->ip6h_len += (JUMBOOPTLEN >> 3);
- }
- /* fill in the option. */
- optbuf[2] = IP6OPT_JUMBO;
- optbuf[3] = 4;
- v = (u_int32_t)htonl(plen + JUMBOOPTLEN);
- bcopy(&v, &optbuf[4], sizeof(u_int32_t));
- /* finally, adjust the packet header length */
- exthdrs->ip6e_ip6->m_pkthdr.len += JUMBOOPTLEN;
- return (0);
- #undef JUMBOOPTLEN
- }
- /*
- * Insert fragment header and copy unfragmentable header portions.
- */
- int
- ip6_insertfraghdr(struct mbuf *m0, struct mbuf *m, int hlen,
- struct ip6_frag **frghdrp)
- {
- struct mbuf *n, *mlast;
- if (hlen > sizeof(struct ip6_hdr)) {
- n = m_copym(m0, sizeof(struct ip6_hdr),
- hlen - sizeof(struct ip6_hdr), M_DONTWAIT);
- if (n == NULL)
- return (ENOBUFS);
- m->m_next = n;
- } else
- n = m;
- /* Search for the last mbuf of unfragmentable part. */
- for (mlast = n; mlast->m_next; mlast = mlast->m_next)
- ;
- if ((mlast->m_flags & M_EXT) == 0 &&
- M_TRAILINGSPACE(mlast) >= sizeof(struct ip6_frag)) {
- /* use the trailing space of the last mbuf for the fragment hdr */
- *frghdrp = (struct ip6_frag *)(mtod(mlast, caddr_t) +
- mlast->m_len);
- mlast->m_len += sizeof(struct ip6_frag);
- m->m_pkthdr.len += sizeof(struct ip6_frag);
- } else {
- /* allocate a new mbuf for the fragment header */
- struct mbuf *mfrg;
- MGET(mfrg, M_DONTWAIT, MT_DATA);
- if (mfrg == NULL)
- return (ENOBUFS);
- mfrg->m_len = sizeof(struct ip6_frag);
- *frghdrp = mtod(mfrg, struct ip6_frag *);
- mlast->m_next = mfrg;
- }
- return (0);
- }
- int
- ip6_getpmtu(struct route_in6 *ro_pmtu, struct route_in6 *ro,
- struct ifnet *ifp, struct in6_addr *dst, u_long *mtup, int *alwaysfragp)
- {
- u_int32_t mtu = 0;
- int alwaysfrag = 0;
- int error = 0;
- if (ro_pmtu != ro) {
- /* The first hop and the final destination may differ. */
- struct sockaddr_in6 *sa6_dst = &ro_pmtu->ro_dst;
- if (ro_pmtu->ro_rt &&
- ((ro_pmtu->ro_rt->rt_flags & RTF_UP) == 0 ||
- !IN6_ARE_ADDR_EQUAL(&sa6_dst->sin6_addr, dst))) {
- rtfree(ro_pmtu->ro_rt);
- ro_pmtu->ro_rt = NULL;
- }
- if (ro_pmtu->ro_rt == NULL) {
- bzero(ro_pmtu, sizeof(*ro_pmtu));
- ro_pmtu->ro_tableid = ifp->if_rdomain;
- sa6_dst->sin6_family = AF_INET6;
- sa6_dst->sin6_len = sizeof(struct sockaddr_in6);
- sa6_dst->sin6_addr = *dst;
- ro_pmtu->ro_rt = rtalloc(sin6tosa(&ro_pmtu->ro_dst),
- RT_REPORT|RT_RESOLVE, ro_pmtu->ro_tableid);
- }
- }
- if (ro_pmtu->ro_rt) {
- u_int32_t ifmtu;
- if (ifp == NULL)
- ifp = ro_pmtu->ro_rt->rt_ifp;
- ifmtu = IN6_LINKMTU(ifp);
- mtu = ro_pmtu->ro_rt->rt_rmx.rmx_mtu;
- if (mtu == 0)
- mtu = ifmtu;
- else if (mtu < IPV6_MMTU) {
- /*
- * RFC2460 section 5, last paragraph:
- * if we record ICMPv6 too big message with
- * mtu < IPV6_MMTU, transmit packets sized IPV6_MMTU
- * or smaller, with fragment header attached.
- * (fragment header is needed regardless from the
- * packet size, for translators to identify packets)
- */
- alwaysfrag = 1;
- mtu = IPV6_MMTU;
- } else if (mtu > ifmtu) {
- /*
- * The MTU on the route is larger than the MTU on
- * the interface! This shouldn't happen, unless the
- * MTU of the interface has been changed after the
- * interface was brought up. Change the MTU in the
- * route to match the interface MTU (as long as the
- * field isn't locked).
- */
- mtu = ifmtu;
- if (!(ro_pmtu->ro_rt->rt_rmx.rmx_locks & RTV_MTU))
- ro_pmtu->ro_rt->rt_rmx.rmx_mtu = mtu;
- }
- } else if (ifp) {
- mtu = IN6_LINKMTU(ifp);
- } else
- error = EHOSTUNREACH; /* XXX */
- *mtup = mtu;
- if (alwaysfragp)
- *alwaysfragp = alwaysfrag;
- return (error);
- }
- /*
- * IP6 socket option processing.
- */
- int
- ip6_ctloutput(int op, struct socket *so, int level, int optname,
- struct mbuf **mp)
- {
- int privileged, optdatalen, uproto;
- void *optdata;
- struct inpcb *inp = sotoinpcb(so);
- struct mbuf *m = *mp;
- int error, optval;
- struct proc *p = curproc; /* For IPSec and rdomain */
- u_int rtid = 0;
- error = optval = 0;
- privileged = (inp->inp_socket->so_state & SS_PRIV);
- uproto = (int)so->so_proto->pr_protocol;
- if (level == IPPROTO_IPV6) {
- switch (op) {
- case PRCO_SETOPT:
- switch (optname) {
- case IPV6_2292PKTOPTIONS:
- error = ip6_pcbopts(&inp->inp_outputopts6,
- m, so);
- break;
- /*
- * Use of some Hop-by-Hop options or some
- * Destination options, might require special
- * privilege. That is, normal applications
- * (without special privilege) might be forbidden
- * from setting certain options in outgoing packets,
- * and might never see certain options in received
- * packets. [RFC 2292 Section 6]
- * KAME specific note:
- * KAME prevents non-privileged users from sending or
- * receiving ANY hbh/dst options in order to avoid
- * overhead of parsing options in the kernel.
- */
- case IPV6_RECVHOPOPTS:
- case IPV6_RECVDSTOPTS:
- case IPV6_RECVRTHDRDSTOPTS:
- if (!privileged) {
- error = EPERM;
- break;
- }
- /* FALLTHROUGH */
- case IPV6_UNICAST_HOPS:
- case IPV6_HOPLIMIT:
- case IPV6_RECVPKTINFO:
- case IPV6_RECVHOPLIMIT:
- case IPV6_RECVRTHDR:
- case IPV6_RECVPATHMTU:
- case IPV6_RECVTCLASS:
- case IPV6_V6ONLY:
- case IPV6_AUTOFLOWLABEL:
- case IPV6_RECVDSTPORT:
- if (m == NULL || m->m_len != sizeof(int)) {
- error = EINVAL;
- break;
- }
- optval = *mtod(m, int *);
- switch (optname) {
- case IPV6_UNICAST_HOPS:
- if (optval < -1 || optval >= 256)
- error = EINVAL;
- else {
- /* -1 = kernel default */
- inp->inp_hops = optval;
- }
- break;
- #define OPTSET(bit) \
- do { \
- if (optval) \
- inp->inp_flags |= (bit); \
- else \
- inp->inp_flags &= ~(bit); \
- } while (/*CONSTCOND*/ 0)
- #define OPTSET2292(bit) \
- do { \
- inp->inp_flags |= IN6P_RFC2292; \
- if (optval) \
- inp->inp_flags |= (bit); \
- else \
- inp->inp_flags &= ~(bit); \
- } while (/*CONSTCOND*/ 0)
- #define OPTBIT(bit) (inp->inp_flags & (bit) ? 1 : 0)
- case IPV6_RECVPKTINFO:
- /* cannot mix with RFC2292 */
- if (OPTBIT(IN6P_RFC2292)) {
- error = EINVAL;
- break;
- }
- OPTSET(IN6P_PKTINFO);
- break;
- case IPV6_HOPLIMIT:
- {
- struct ip6_pktopts **optp;
- /* cannot mix with RFC2292 */
- if (OPTBIT(IN6P_RFC2292)) {
- error = EINVAL;
- break;
- }
- optp = &inp->inp_outputopts6;
- error = ip6_pcbopt(IPV6_HOPLIMIT,
- (u_char *)&optval,
- sizeof(optval),
- optp,
- privileged, uproto);
- break;
- }
- case IPV6_RECVHOPLIMIT:
- /* cannot mix with RFC2292 */
- if (OPTBIT(IN6P_RFC2292)) {
- error = EINVAL;
- break;
- }
- OPTSET(IN6P_HOPLIMIT);
- break;
- case IPV6_RECVHOPOPTS:
- /* cannot mix with RFC2292 */
- if (OPTBIT(IN6P_RFC2292)) {
- error = EINVAL;
- break;
- }
- OPTSET(IN6P_HOPOPTS);
- break;
- case IPV6_RECVDSTOPTS:
- /* cannot mix with RFC2292 */
- if (OPTBIT(IN6P_RFC2292)) {
- error = EINVAL;
- break;
- }
- OPTSET(IN6P_DSTOPTS);
- break;
- case IPV6_RECVRTHDRDSTOPTS:
- /* cannot mix with RFC2292 */
- if (OPTBIT(IN6P_RFC2292)) {
- error = EINVAL;
- break;
- }
- OPTSET(IN6P_RTHDRDSTOPTS);
- break;
- case IPV6_RECVRTHDR:
- /* cannot mix with RFC2292 */
- if (OPTBIT(IN6P_RFC2292)) {
- error = EINVAL;
- break;
- }
- OPTSET(IN6P_RTHDR);
- break;
- case IPV6_RECVPATHMTU:
- /*
- * We ignore this option for TCP
- * sockets.
- * (RFC3542 leaves this case
- * unspecified.)
- */
- if (uproto != IPPROTO_TCP)
- OPTSET(IN6P_MTU);
- break;
- case IPV6_V6ONLY:
- /*
- * make setsockopt(IPV6_V6ONLY)
- * available only prior to bind(2).
- * see ipng mailing list, Jun 22 2001.
- */
- if (inp->inp_lport ||
- !IN6_IS_ADDR_UNSPECIFIED(&inp->inp_laddr6)) {
- error = EINVAL;
- break;
- }
- if ((ip6_v6only && optval) ||
- (!ip6_v6only && !optval))
- error = 0;
- else
- error = EINVAL;
- break;
- case IPV6_RECVTCLASS:
- /* cannot mix with RFC2292 XXX */
- if (OPTBIT(IN6P_RFC2292)) {
- error = EINVAL;
- break;
- }
- OPTSET(IN6P_TCLASS);
- break;
- case IPV6_AUTOFLOWLABEL:
- OPTSET(IN6P_AUTOFLOWLABEL);
- break;
- case IPV6_RECVDSTPORT:
- OPTSET(IN6P_RECVDSTPORT);
- break;
- }
- break;
- case IPV6_TCLASS:
- case IPV6_DONTFRAG:
- case IPV6_USE_MIN_MTU:
- if (m == NULL || m->m_len != sizeof(optval)) {
- error = EINVAL;
- break;
- }
- optval = *mtod(m, int *);
- {
- struct ip6_pktopts **optp;
- optp = &inp->inp_outputopts6;
- error = ip6_pcbopt(optname,
- (u_char *)&optval,
- sizeof(optval),
- optp,
- privileged, uproto);
- break;
- }
- case IPV6_2292PKTINFO:
- case IPV6_2292HOPLIMIT:
- case IPV6_2292HOPOPTS:
- case IPV6_2292DSTOPTS:
- case IPV6_2292RTHDR:
- /* RFC 2292 */
- if (m == NULL || m->m_len != sizeof(int)) {
- error = EINVAL;
- break;
- }
- optval = *mtod(m, int *);
- switch (optname) {
- case IPV6_2292PKTINFO:
- OPTSET2292(IN6P_PKTINFO);
- break;
- case IPV6_2292HOPLIMIT:
- OPTSET2292(IN6P_HOPLIMIT);
- break;
- case IPV6_2292HOPOPTS:
- /*
- * Check super-user privilege.
- * See comments for IPV6_RECVHOPOPTS.
- */
- if (!privileged)
- return (EPERM);
- OPTSET2292(IN6P_HOPOPTS);
- break;
- case IPV6_2292DSTOPTS:
- if (!privileged)
- return (EPERM);
- OPTSET2292(IN6P_DSTOPTS|IN6P_RTHDRDSTOPTS); /* XXX */
- break;
- case IPV6_2292RTHDR:
- OPTSET2292(IN6P_RTHDR);
- break;
- }
- break;
- case IPV6_PKTINFO:
- case IPV6_HOPOPTS:
- case IPV6_RTHDR:
- case IPV6_DSTOPTS:
- case IPV6_RTHDRDSTOPTS:
- case IPV6_NEXTHOP:
- {
- /* new advanced API (RFC3542) */
- u_char *optbuf;
- int optbuflen;
- struct ip6_pktopts **optp;
- /* cannot mix with RFC2292 */
- if (OPTBIT(IN6P_RFC2292)) {
- error = EINVAL;
- break;
- }
- if (m && m->m_next) {
- error = EINVAL; /* XXX */
- break;
- }
- if (m) {
- optbuf = mtod(m, u_char *);
- optbuflen = m->m_len;
- } else {
- optbuf = NULL;
- optbuflen = 0;
- }
- optp = &inp->inp_outputopts6;
- error = ip6_pcbopt(optname,
- optbuf, optbuflen,
- optp, privileged, uproto);
- break;
- }
- #undef OPTSET
- case IPV6_MULTICAST_IF:
- case IPV6_MULTICAST_HOPS:
- case IPV6_MULTICAST_LOOP:
- case IPV6_JOIN_GROUP:
- case IPV6_LEAVE_GROUP:
- error = ip6_setmoptions(optname,
- &inp->inp_moptions6,
- m);
- break;
- case IPV6_PORTRANGE:
- if (m == NULL || m->m_len != sizeof(int)) {
- error = EINVAL;
- break;
- }
- optval = *mtod(m, int *);
- switch (optval) {
- case IPV6_PORTRANGE_DEFAULT:
- inp->inp_flags &= ~(IN6P_LOWPORT);
- inp->inp_flags &= ~(IN6P_HIGHPORT);
- break;
- case IPV6_PORTRANGE_HIGH:
- inp->inp_flags &= ~(IN6P_LOWPORT);
- inp->inp_flags |= IN6P_HIGHPORT;
- break;
- case IPV6_PORTRANGE_LOW:
- inp->inp_flags &= ~(IN6P_HIGHPORT);
- inp->inp_flags |= IN6P_LOWPORT;
- break;
- default:
- error = EINVAL;
- break;
- }
- break;
- case IPSEC6_OUTSA:
- error = EINVAL;
- break;
- case IPV6_AUTH_LEVEL:
- case IPV6_ESP_TRANS_LEVEL:
- case IPV6_ESP_NETWORK_LEVEL:
- case IPV6_IPCOMP_LEVEL:
- #ifndef IPSEC
- error = EINVAL;
- #else
- if (m == NULL || m->m_len != sizeof(int)) {
- error = EINVAL;
- break;
- }
- optval = *mtod(m, int *);
- if (optval < IPSEC_LEVEL_BYPASS ||
- optval > IPSEC_LEVEL_UNIQUE) {
- error = EINVAL;
- break;
- }
- switch (optname) {
- case IPV6_AUTH_LEVEL:
- if (optval < IPSEC_AUTH_LEVEL_DEFAULT &&
- suser(p, 0)) {
- error = EACCES;
- break;
- }
- inp->inp_seclevel[SL_AUTH] = optval;
- break;
- case IPV6_ESP_TRANS_LEVEL:
- if (optval < IPSEC_ESP_TRANS_LEVEL_DEFAULT &&
- suser(p, 0)) {
- error = EACCES;
- break;
- }
- inp->inp_seclevel[SL_ESP_TRANS] = optval;
- break;
- case IPV6_ESP_NETWORK_LEVEL:
- if (optval < IPSEC_ESP_NETWORK_LEVEL_DEFAULT &&
- suser(p, 0)) {
- error = EACCES;
- break;
- }
- inp->inp_seclevel[SL_ESP_NETWORK] = optval;
- break;
- case IPV6_IPCOMP_LEVEL:
- if (optval < IPSEC_IPCOMP_LEVEL_DEFAULT &&
- suser(p, 0)) {
- error = EACCES;
- break;
- }
- inp->inp_seclevel[SL_IPCOMP] = optval;
- break;
- }
- #endif
- break;
- case SO_RTABLE:
- if (m == NULL || m->m_len < sizeof(u_int)) {
- error = EINVAL;
- break;
- }
- rtid = *mtod(m, u_int *);
- if (inp->inp_rtableid == rtid)
- break;
- /* needs privileges to switch when already set */
- if (p->p_p->ps_rtableid != rtid &&
- p->p_p->ps_rtableid != 0 &&
- (error = suser(p, 0)) != 0)
- break;
- /* table must exist */
- if (!rtable_exists(rtid)) {
- error = EINVAL;
- break;
- }
- inp->inp_rtableid = rtid;
- break;
- case IPV6_PIPEX:
- if (m != NULL && m->m_len == sizeof(int))
- inp->inp_pipex = *mtod(m, int *);
- else
- error = EINVAL;
- break;
- default:
- error = ENOPROTOOPT;
- break;
- }
- if (m)
- (void)m_free(m);
- break;
- case PRCO_GETOPT:
- switch (optname) {
- case IPV6_2292PKTOPTIONS:
- /*
- * RFC3542 (effectively) deprecated the
- * semantics of the 2292-style pktoptions.
- * Since it was not reliable in nature (i.e.,
- * applications had to expect the lack of some
- * information after all), it would make sense
- * to simplify this part by always returning
- * empty data.
- */
- *mp = m_get(M_WAIT, MT_SOOPTS);
- (*mp)->m_len = 0;
- break;
- case IPV6_RECVHOPOPTS:
- case IPV6_RECVDSTOPTS:
- case IPV6_RECVRTHDRDSTOPTS:
- case IPV6_UNICAST_HOPS:
- case IPV6_RECVPKTINFO:
- case IPV6_RECVHOPLIMIT:
- case IPV6_RECVRTHDR:
- case IPV6_RECVPATHMTU:
- case IPV6_V6ONLY:
- case IPV6_PORTRANGE:
- case IPV6_RECVTCLASS:
- case IPV6_AUTOFLOWLABEL:
- case IPV6_RECVDSTPORT:
- switch (optname) {
- case IPV6_RECVHOPOPTS:
- optval = OPTBIT(IN6P_HOPOPTS);
- break;
- case IPV6_RECVDSTOPTS:
- optval = OPTBIT(IN6P_DSTOPTS);
- break;
- case IPV6_RECVRTHDRDSTOPTS:
- optval = OPTBIT(IN6P_RTHDRDSTOPTS);
- break;
- case IPV6_UNICAST_HOPS:
- optval = inp->inp_hops;
- break;
- case IPV6_RECVPKTINFO:
- optval = OPTBIT(IN6P_PKTINFO);
- break;
- case IPV6_RECVHOPLIMIT:
- optval = OPTBIT(IN6P_HOPLIMIT);
- break;
- case IPV6_RECVRTHDR:
- optval = OPTBIT(IN6P_RTHDR);
- break;
- case IPV6_RECVPATHMTU:
- optval = OPTBIT(IN6P_MTU);
- break;
- case IPV6_V6ONLY:
- optval = (ip6_v6only != 0); /* XXX */
- break;
- case IPV6_PORTRANGE:
- {
- int flags;
- flags = inp->inp_flags;
- if (flags & IN6P_HIGHPORT)
- optval = IPV6_PORTRANGE_HIGH;
- else if (flags & IN6P_LOWPORT)
- optval = IPV6_PORTRANGE_LOW;
- else
- optval = 0;
- break;
- }
- case IPV6_RECVTCLASS:
- optval = OPTBIT(IN6P_TCLASS);
- break;
- case IPV6_AUTOFLOWLABEL:
- optval = OPTBIT(IN6P_AUTOFLOWLABEL);
- break;
- case IPV6_RECVDSTPORT:
- optval = OPTBIT(IN6P_RECVDSTPORT);
- break;
- }
- if (error)
- break;
- *mp = m = m_get(M_WAIT, MT_SOOPTS);
- m->m_len = sizeof(int);
- *mtod(m, int *) = optval;
- break;
- case IPV6_PATHMTU:
- {
- u_long pmtu = 0;
- struct ip6_mtuinfo mtuinfo;
- struct route_in6 *ro = (struct route_in6 *)&inp->inp_route6;
- if (!(so->so_state & SS_ISCONNECTED))
- return (ENOTCONN);
- /*
- * XXX: we dot not consider the case of source
- * routing, or optional information to specify
- * the outgoing interface.
- */
- error = ip6_getpmtu(ro, NULL, NULL,
- &inp->inp_faddr6, &pmtu, NULL);
- if (error)
- break;
- if (pmtu > IPV6_MAXPACKET)
- pmtu = IPV6_MAXPACKET;
- bzero(&mtuinfo, sizeof(mtuinfo));
- mtuinfo.ip6m_mtu = (u_int32_t)pmtu;
- optdata = (void *)&mtuinfo;
- optdatalen = sizeof(mtuinfo);
- if (optdatalen > MCLBYTES)
- return (EMSGSIZE); /* XXX */
- *mp = m = m_get(M_WAIT, MT_SOOPTS);
- if (optdatalen > MLEN)
- MCLGET(m, M_WAIT);
- m->m_len = optdatalen;
- bcopy(optdata, mtod(m, void *), optdatalen);
- break;
- }
- case IPV6_2292PKTINFO:
- case IPV6_2292HOPLIMIT:
- case IPV6_2292HOPOPTS:
- case IPV6_2292RTHDR:
- case IPV6_2292DSTOPTS:
- switch (optname) {
- case IPV6_2292PKTINFO:
- optval = OPTBIT(IN6P_PKTINFO);
- break;
- case IPV6_2292HOPLIMIT:
- optval = OPTBIT(IN6P_HOPLIMIT);
- break;
- case IPV6_2292HOPOPTS:
- optval = OPTBIT(IN6P_HOPOPTS);
- break;
- case IPV6_2292RTHDR:
- optval = OPTBIT(IN6P_RTHDR);
- break;
- case IPV6_2292DSTOPTS:
- optval = OPTBIT(IN6P_DSTOPTS|IN6P_RTHDRDSTOPTS);
- break;
- }
- *mp = m = m_get(M_WAIT, MT_SOOPTS);
- m->m_len = sizeof(int);
- *mtod(m, int *) = optval;
- break;
- case IPV6_PKTINFO:
- case IPV6_HOPOPTS:
- case IPV6_RTHDR:
- case IPV6_DSTOPTS:
- case IPV6_RTHDRDSTOPTS:
- case IPV6_NEXTHOP:
- case IPV6_TCLASS:
- case IPV6_DONTFRAG:
- case IPV6_USE_MIN_MTU:
- error = ip6_getpcbopt(inp->inp_outputopts6,
- optname, mp);
- break;
- case IPV6_MULTICAST_IF:
- case IPV6_MULTICAST_HOPS:
- case IPV6_MULTICAST_LOOP:
- case IPV6_JOIN_GROUP:
- case IPV6_LEAVE_GROUP:
- error = ip6_getmoptions(optname,
- inp->inp_moptions6, mp);
- break;
- case IPSEC6_OUTSA:
- error = EINVAL;
- break;
- case IPV6_AUTH_LEVEL:
- case IPV6_ESP_TRANS_LEVEL:
- case IPV6_ESP_NETWORK_LEVEL:
- case IPV6_IPCOMP_LEVEL:
- *mp = m = m_get(M_WAIT, MT_SOOPTS);
- #ifndef IPSEC
- m->m_len = sizeof(int);
- *mtod(m, int *) = IPSEC_LEVEL_NONE;
- #else
- m->m_len = sizeof(int);
- switch (optname) {
- case IPV6_AUTH_LEVEL:
- optval = inp->inp_seclevel[SL_AUTH];
- break;
- case IPV6_ESP_TRANS_LEVEL:
- optval =
- inp->inp_seclevel[SL_ESP_TRANS];
- break;
- case IPV6_ESP_NETWORK_LEVEL:
- optval =
- inp->inp_seclevel[SL_ESP_NETWORK];
- break;
- case IPV6_IPCOMP_LEVEL:
- optval = inp->inp_seclevel[SL_IPCOMP];
- break;
- }
- *mtod(m, int *) = optval;
- #endif
- break;
- case SO_RTABLE:
- *mp = m = m_get(M_WAIT, MT_SOOPTS);
- m->m_len = sizeof(u_int);
- *mtod(m, u_int *) = optval;
- break;
- case IPV6_PIPEX:
- *mp = m = m_get(M_WAIT, MT_SOOPTS);
- m->m_len = sizeof(int);
- *mtod(m, int *) = optval;
- break;
- default:
- error = ENOPROTOOPT;
- break;
- }
- break;
- }
- } else {
- error = EINVAL;
- if (op == PRCO_SETOPT)
- (void)m_free(*mp);
- }
- return (error);
- }
- int
- ip6_raw_ctloutput(int op, struct socket *so, int level, int optname,
- struct mbuf **mp)
- {
- int error = 0, optval;
- const int icmp6off = offsetof(struct icmp6_hdr, icmp6_cksum);
- struct inpcb *inp = sotoinpcb(so);
- struct mbuf *m = *mp;
- if (level != IPPROTO_IPV6) {
- if (op == PRCO_SETOPT)
- (void)m_free(*mp);
- return (EINVAL);
- }
- switch (optname) {
- case IPV6_CHECKSUM:
- /*
- * For ICMPv6 sockets, no modification allowed for checksum
- * offset, permit "no change" values to help existing apps.
- *
- * RFC3542 says: "An attempt to set IPV6_CHECKSUM
- * for an ICMPv6 socket will fail."
- * The current behavior does not meet RFC3542.
- */
- switch (op) {
- case PRCO_SETOPT:
- if (m == NULL || m->m_len != sizeof(int)) {
- error = EINVAL;
- break;
- }
- optval = *mtod(m, int *);
- if ((optval % 2) != 0) {
- /* the API assumes even offset values */
- error = EINVAL;
- } else if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
- if (optval != icmp6off)
- error = EINVAL;
- } else
- inp->inp_cksum6 = optval;
- break;
- case PRCO_GETOPT:
- if (so->so_proto->pr_protocol == IPPROTO_ICMPV6)
- optval = icmp6off;
- else
- optval = inp->inp_cksum6;
- *mp = m = m_get(M_WAIT, MT_SOOPTS);
- m->m_len = sizeof(int);
- *mtod(m, int *) = optval;
- break;
- default:
- error = EINVAL;
- break;
- }
- break;
- default:
- error = ENOPROTOOPT;
- break;
- }
- if (op == PRCO_SETOPT)
- (void)m_free(m);
- return (error);
- }
- /*
- * Set up IP6 options in pcb for insertion in output packets.
- * Store in mbuf with pointer in pcbopt, adding pseudo-option
- * with destination address if source routed.
- */
- int
- ip6_pcbopts(struct ip6_pktopts **pktopt, struct mbuf *m, struct socket *so)
- {
- struct ip6_pktopts *opt = *pktopt;
- int error = 0;
- struct proc *p = curproc; /* XXX */
- int priv = 0;
- /* turn off any old options. */
- if (opt)
- ip6_clearpktopts(opt, -1);
- else
- opt = malloc(sizeof(*opt), M_IP6OPT, M_WAITOK);
- *pktopt = 0;
- if (!m || m->m_len == 0) {
- /*
- * Only turning off any previous options, regardless of
- * whether the opt is just created or given.
- */
- free(opt, M_IP6OPT, 0);
- return (0);
- }
- /* set options specified by user. */
- if (p && !suser(p, 0))
- priv = 1;
- if ((error = ip6_setpktopts(m, opt, NULL, priv,
- so->so_proto->pr_protocol)) != 0) {
- ip6_clearpktopts(opt, -1); /* XXX discard all options */
- free(opt, M_IP6OPT, 0);
- return (error);
- }
- *pktopt = opt;
- return (0);
- }
- /*
- * initialize ip6_pktopts. beware that there are non-zero default values in
- * the struct.
- */
- void
- ip6_initpktopts(struct ip6_pktopts *opt)
- {
- bzero(opt, sizeof(*opt));
- opt->ip6po_hlim = -1; /* -1 means default hop limit */
- opt->ip6po_tclass = -1; /* -1 means default traffic class */
- opt->ip6po_minmtu = IP6PO_MINMTU_MCASTONLY;
- }
- int
- ip6_pcbopt(int optname, u_char *buf, int len, struct ip6_pktopts **pktopt,
- int priv, int uproto)
- {
- struct ip6_pktopts *opt;
- if (*pktopt == NULL) {
- *pktopt = malloc(sizeof(struct ip6_pktopts), M_IP6OPT,
- M_WAITOK);
- ip6_initpktopts(*pktopt);
- }
- opt = *pktopt;
- return (ip6_setpktopt(optname, buf, len, opt, priv, 1, 0, uproto));
- }
- int
- ip6_getpcbopt(struct ip6_pktopts *pktopt, int optname, struct mbuf **mp)
- {
- void *optdata = NULL;
- int optdatalen = 0;
- struct ip6_ext *ip6e;
- int error = 0;
- struct in6_pktinfo null_pktinfo;
- int deftclass = 0, on;
- int defminmtu = IP6PO_MINMTU_MCASTONLY;
- struct mbuf *m;
- switch (optname) {
- case IPV6_PKTINFO:
- if (pktopt && pktopt->ip6po_pktinfo)
- optdata = (void *)pktopt->ip6po_pktinfo;
- else {
- /* XXX: we don't have to do this every time... */
- bzero(&null_pktinfo, sizeof(null_pktinfo));
- optdata = (void *)&null_pktinfo;
- }
- optdatalen = sizeof(struct in6_pktinfo);
- break;
- case IPV6_TCLASS:
- if (pktopt && pktopt->ip6po_tclass >= 0)
- optdata = (void *)&pktopt->ip6po_tclass;
- else
- optdata = (void *)&deftclass;
- optdatalen = sizeof(int);
- break;
- case IPV6_HOPOPTS:
- if (pktopt && pktopt->ip6po_hbh) {
- optdata = (void *)pktopt->ip6po_hbh;
- ip6e = (struct ip6_ext *)pktopt->ip6po_hbh;
- optdatalen = (ip6e->ip6e_len + 1) << 3;
- }
- break;
- case IPV6_RTHDR:
- if (pktopt && pktopt->ip6po_rthdr) {
- optdata = (void *)pktopt->ip6po_rthdr;
- ip6e = (struct ip6_ext *)pktopt->ip6po_rthdr;
- optdatalen = (ip6e->ip6e_len + 1) << 3;
- }
- break;
- case IPV6_RTHDRDSTOPTS:
- if (pktopt && pktopt->ip6po_dest1) {
- optdata = (void *)pktopt->ip6po_dest1;
- ip6e = (struct ip6_ext *)pktopt->ip6po_dest1;
- optdatalen = (ip6e->ip6e_len + 1) << 3;
- }
- break;
- case IPV6_DSTOPTS:
- if (pktopt && pktopt->ip6po_dest2) {
- optdata = (void *)pktopt->ip6po_dest2;
- ip6e = (struct ip6_ext *)pktopt->ip6po_dest2;
- optdatalen = (ip6e->ip6e_len + 1) << 3;
- }
- break;
- case IPV6_NEXTHOP:
- if (pktopt && pktopt->ip6po_nexthop) {
- optdata = (void *)pktopt->ip6po_nexthop;
- optdatalen = pktopt->ip6po_nexthop->sa_len;
- }
- break;
- case IPV6_USE_MIN_MTU:
- if (pktopt)
- optdata = (void *)&pktopt->ip6po_minmtu;
- else
- optdata = (void *)&defminmtu;
- optdatalen = sizeof(int);
- break;
- case IPV6_DONTFRAG:
- if (pktopt && ((pktopt->ip6po_flags) & IP6PO_DONTFRAG))
- on = 1;
- else
- on = 0;
- optdata = (void *)&on;
- optdatalen = sizeof(on);
- break;
- default: /* should not happen */
- #ifdef DIAGNOSTIC
- panic("ip6_getpcbopt: unexpected option");
- #endif
- return (ENOPROTOOPT);
- }
- if (optdatalen > MCLBYTES)
- return (EMSGSIZE); /* XXX */
- *mp = m = m_get(M_WAIT, MT_SOOPTS);
- if (optdatalen > MLEN)
- MCLGET(m, M_WAIT);
- m->m_len = optdatalen;
- if (optdatalen)
- bcopy(optdata, mtod(m, void *), optdatalen);
- return (error);
- }
- void
- ip6_clearpktopts(struct ip6_pktopts *pktopt, int optname)
- {
- if (optname == -1 || optname == IPV6_PKTINFO) {
- if (pktopt->ip6po_pktinfo)
- free(pktopt->ip6po_pktinfo, M_IP6OPT, 0);
- pktopt->ip6po_pktinfo = NULL;
- }
- if (optname == -1 || optname == IPV6_HOPLIMIT)
- pktopt->ip6po_hlim = -1;
- if (optname == -1 || optname == IPV6_TCLASS)
- pktopt->ip6po_tclass = -1;
- if (optname == -1 || optname == IPV6_NEXTHOP) {
- if (pktopt->ip6po_nextroute.ro_rt) {
- rtfree(pktopt->ip6po_nextroute.ro_rt);
- pktopt->ip6po_nextroute.ro_rt = NULL;
- }
- if (pktopt->ip6po_nexthop)
- free(pktopt->ip6po_nexthop, M_IP6OPT, 0);
- pktopt->ip6po_nexthop = NULL;
- }
- if (optname == -1 || optname == IPV6_HOPOPTS) {
- if (pktopt->ip6po_hbh)
- free(pktopt->ip6po_hbh, M_IP6OPT, 0);
- pktopt->ip6po_hbh = NULL;
- }
- if (optname == -1 || optname == IPV6_RTHDRDSTOPTS) {
- if (pktopt->ip6po_dest1)
- free(pktopt->ip6po_dest1, M_IP6OPT, 0);
- pktopt->ip6po_dest1 = NULL;
- }
- if (optname == -1 || optname == IPV6_RTHDR) {
- if (pktopt->ip6po_rhinfo.ip6po_rhi_rthdr)
- free(pktopt->ip6po_rhinfo.ip6po_rhi_rthdr, M_IP6OPT, 0);
- pktopt->ip6po_rhinfo.ip6po_rhi_rthdr = NULL;
- if (pktopt->ip6po_route.ro_rt) {
- rtfree(pktopt->ip6po_route.ro_rt);
- pktopt->ip6po_route.ro_rt = NULL;
- }
- }
- if (optname == -1 || optname == IPV6_DSTOPTS) {
- if (pktopt->ip6po_dest2)
- free(pktopt->ip6po_dest2, M_IP6OPT, 0);
- pktopt->ip6po_dest2 = NULL;
- }
- }
- #define PKTOPT_EXTHDRCPY(type) \
- do {\
- if (src->type) {\
- int hlen = (((struct ip6_ext *)src->type)->ip6e_len + 1) << 3;\
- dst->type = malloc(hlen, M_IP6OPT, canwait);\
- if (dst->type == NULL && canwait == M_NOWAIT)\
- goto bad;\
- bcopy(src->type, dst->type, hlen);\
- }\
- } while (/*CONSTCOND*/ 0)
- int
- copypktopts(struct ip6_pktopts *dst, struct ip6_pktopts *src, int canwait)
- {
- dst->ip6po_hlim = src->ip6po_hlim;
- dst->ip6po_tclass = src->ip6po_tclass;
- dst->ip6po_flags = src->ip6po_flags;
- if (src->ip6po_pktinfo) {
- dst->ip6po_pktinfo = malloc(sizeof(*dst->ip6po_pktinfo),
- M_IP6OPT, canwait);
- if (dst->ip6po_pktinfo == NULL)
- goto bad;
- *dst->ip6po_pktinfo = *src->ip6po_pktinfo;
- }
- if (src->ip6po_nexthop) {
- dst->ip6po_nexthop = malloc(src->ip6po_nexthop->sa_len,
- M_IP6OPT, canwait);
- if (dst->ip6po_nexthop == NULL)
- goto bad;
- bcopy(src->ip6po_nexthop, dst->ip6po_nexthop,
- src->ip6po_nexthop->sa_len);
- }
- PKTOPT_EXTHDRCPY(ip6po_hbh);
- PKTOPT_EXTHDRCPY(ip6po_dest1);
- PKTOPT_EXTHDRCPY(ip6po_dest2);
- PKTOPT_EXTHDRCPY(ip6po_rthdr); /* not copy the cached route */
- return (0);
- bad:
- ip6_clearpktopts(dst, -1);
- return (ENOBUFS);
- }
- #undef PKTOPT_EXTHDRCPY
- void
- ip6_freepcbopts(struct ip6_pktopts *pktopt)
- {
- if (pktopt == NULL)
- return;
- ip6_clearpktopts(pktopt, -1);
- free(pktopt, M_IP6OPT, 0);
- }
- /*
- * Set the IP6 multicast options in response to user setsockopt().
- */
- int
- ip6_setmoptions(int optname, struct ip6_moptions **im6op, struct mbuf *m)
- {
- int error = 0;
- u_int loop, ifindex;
- struct ipv6_mreq *mreq;
- struct ifnet *ifp;
- struct ip6_moptions *im6o = *im6op;
- struct route_in6 ro;
- struct sockaddr_in6 *dst;
- struct in6_multi_mship *imm;
- struct proc *p = curproc; /* XXX */
- if (im6o == NULL) {
- /*
- * No multicast option buffer attached to the pcb;
- * allocate one and initialize to default values.
- */
- im6o = (struct ip6_moptions *)
- malloc(sizeof(*im6o), M_IPMOPTS, M_WAITOK);
- if (im6o == NULL)
- return (ENOBUFS);
- *im6op = im6o;
- im6o->im6o_ifidx = 0;
- im6o->im6o_hlim = ip6_defmcasthlim;
- im6o->im6o_loop = IPV6_DEFAULT_MULTICAST_LOOP;
- LIST_INIT(&im6o->im6o_memberships);
- }
- switch (optname) {
- case IPV6_MULTICAST_IF:
- /*
- * Select the interface for outgoing multicast packets.
- */
- if (m == NULL || m->m_len != sizeof(u_int)) {
- error = EINVAL;
- break;
- }
- bcopy(mtod(m, u_int *), &ifindex, sizeof(ifindex));
- if (ifindex == 0)
- ifp = NULL;
- else {
- ifp = if_get(ifindex);
- if (ifp == NULL) {
- error = ENXIO; /* XXX EINVAL? */
- break;
- }
- if ((ifp->if_flags & IFF_MULTICAST) == 0) {
- error = EADDRNOTAVAIL;
- break;
- }
- }
- im6o->im6o_ifidx = ifindex;
- break;
- case IPV6_MULTICAST_HOPS:
- {
- /*
- * Set the IP6 hoplimit for outgoing multicast packets.
- */
- int optval;
- if (m == NULL || m->m_len != sizeof(int)) {
- error = EINVAL;
- break;
- }
- bcopy(mtod(m, u_int *), &optval, sizeof(optval));
- if (optval < -1 || optval >= 256)
- error = EINVAL;
- else if (optval == -1)
- im6o->im6o_hlim = ip6_defmcasthlim;
- else
- im6o->im6o_hlim = optval;
- break;
- }
- case IPV6_MULTICAST_LOOP:
- /*
- * Set the loopback flag for outgoing multicast packets.
- * Must be zero or one.
- */
- if (m == NULL || m->m_len != sizeof(u_int)) {
- error = EINVAL;
- break;
- }
- bcopy(mtod(m, u_int *), &loop, sizeof(loop));
- if (loop > 1) {
- error = EINVAL;
- break;
- }
- im6o->im6o_loop = loop;
- break;
- case IPV6_JOIN_GROUP:
- /*
- * Add a multicast group membership.
- * Group must be a valid IP6 multicast address.
- */
- if (m == NULL || m->m_len != sizeof(struct ipv6_mreq)) {
- error = EINVAL;
- break;
- }
- mreq = mtod(m, struct ipv6_mreq *);
- if (IN6_IS_ADDR_UNSPECIFIED(&mreq->ipv6mr_multiaddr)) {
- /*
- * We use the unspecified address to specify to accept
- * all multicast addresses. Only super user is allowed
- * to do this.
- */
- if (suser(p, 0))
- {
- error = EACCES;
- break;
- }
- } else if (!IN6_IS_ADDR_MULTICAST(&mreq->ipv6mr_multiaddr)) {
- error = EINVAL;
- break;
- }
- /*
- * If no interface was explicitly specified, choose an
- * appropriate one according to the given multicast address.
- */
- if (mreq->ipv6mr_interface == 0) {
- /*
- * Look up the routing table for the
- * address, and choose the outgoing interface.
- * XXX: is it a good approach?
- */
- bzero(&ro, sizeof(ro));
- ro.ro_tableid = m->m_pkthdr.ph_rtableid;
- dst = &ro.ro_dst;
- dst->sin6_len = sizeof(struct sockaddr_in6);
- dst->sin6_family = AF_INET6;
- dst->sin6_addr = mreq->ipv6mr_multiaddr;
- ro.ro_rt = rtalloc(sin6tosa(&ro.ro_dst),
- RT_REPORT|RT_RESOLVE, ro.ro_tableid);
- if (ro.ro_rt == NULL) {
- error = EADDRNOTAVAIL;
- break;
- }
- ifp = ro.ro_rt->rt_ifp;
- rtfree(ro.ro_rt);
- } else {
- /*
- * If the interface is specified, validate it.
- */
- ifp = if_get(mreq->ipv6mr_interface);
- if (ifp == NULL) {
- error = ENXIO; /* XXX EINVAL? */
- break;
- }
- }
- /*
- * See if we found an interface, and confirm that it
- * supports multicast
- */
- if (ifp == NULL || (ifp->if_flags & IFF_MULTICAST) == 0) {
- error = EADDRNOTAVAIL;
- break;
- }
- /*
- * Put interface index into the multicast address,
- * if the address has link/interface-local scope.
- */
- if (IN6_IS_SCOPE_EMBED(&mreq->ipv6mr_multiaddr)) {
- mreq->ipv6mr_multiaddr.s6_addr16[1] =
- htons(ifp->if_index);
- }
- /*
- * See if the membership already exists.
- */
- LIST_FOREACH(imm, &im6o->im6o_memberships, i6mm_chain)
- if (imm->i6mm_maddr->in6m_ifidx == ifp->if_index &&
- IN6_ARE_ADDR_EQUAL(&imm->i6mm_maddr->in6m_addr,
- &mreq->ipv6mr_multiaddr))
- break;
- if (imm != NULL) {
- error = EADDRINUSE;
- break;
- }
- /*
- * Everything looks good; add a new record to the multicast
- * address list for the given interface.
- */
- imm = in6_joingroup(ifp, &mreq->ipv6mr_multiaddr, &error);
- if (!imm)
- break;
- LIST_INSERT_HEAD(&im6o->im6o_memberships, imm, i6mm_chain);
- break;
- case IPV6_LEAVE_GROUP:
- /*
- * Drop a multicast group membership.
- * Group must be a valid IP6 multicast address.
- */
- if (m == NULL || m->m_len != sizeof(struct ipv6_mreq)) {
- error = EINVAL;
- break;
- }
- mreq = mtod(m, struct ipv6_mreq *);
- if (IN6_IS_ADDR_UNSPECIFIED(&mreq->ipv6mr_multiaddr)) {
- if (suser(p, 0))
- {
- error = EACCES;
- break;
- }
- } else if (!IN6_IS_ADDR_MULTICAST(&mreq->ipv6mr_multiaddr)) {
- error = EINVAL;
- break;
- }
- /*
- * If an interface address was specified, get a pointer
- * to its ifnet structure.
- */
- if (mreq->ipv6mr_interface == 0)
- ifp = NULL;
- else {
- ifp = if_get(mreq->ipv6mr_interface);
- if (ifp == NULL) {
- error = ENXIO; /* XXX EINVAL? */
- break;
- }
- }
- /*
- * Put interface index into the multicast address,
- * if the address has link-local scope.
- */
- if (IN6_IS_ADDR_MC_LINKLOCAL(&mreq->ipv6mr_multiaddr)) {
- mreq->ipv6mr_multiaddr.s6_addr16[1] =
- htons(mreq->ipv6mr_interface);
- }
- /*
- * Find the membership in the membership list.
- */
- LIST_FOREACH(imm, &im6o->im6o_memberships, i6mm_chain) {
- if ((ifp == NULL ||
- imm->i6mm_maddr->in6m_ifidx == ifp->if_index) &&
- IN6_ARE_ADDR_EQUAL(&imm->i6mm_maddr->in6m_addr,
- &mreq->ipv6mr_multiaddr))
- break;
- }
- if (imm == NULL) {
- /* Unable to resolve interface */
- error = EADDRNOTAVAIL;
- break;
- }
- /*
- * Give up the multicast address record to which the
- * membership points.
- */
- LIST_REMOVE(imm, i6mm_chain);
- in6_leavegroup(imm);
- break;
- default:
- error = EOPNOTSUPP;
- break;
- }
- /*
- * If all options have default values, no need to keep the option
- * structure.
- */
- if (im6o->im6o_ifidx == 0 &&
- im6o->im6o_hlim == ip6_defmcasthlim &&
- im6o->im6o_loop == IPV6_DEFAULT_MULTICAST_LOOP &&
- LIST_EMPTY(&im6o->im6o_memberships)) {
- free(*im6op, M_IPMOPTS, 0);
- *im6op = NULL;
- }
- return (error);
- }
- /*
- * Return the IP6 multicast options in response to user getsockopt().
- */
- int
- ip6_getmoptions(int optname, struct ip6_moptions *im6o, struct mbuf **mp)
- {
- u_int *hlim, *loop, *ifindex;
- *mp = m_get(M_WAIT, MT_SOOPTS);
- switch (optname) {
- case IPV6_MULTICAST_IF:
- ifindex = mtod(*mp, u_int *);
- (*mp)->m_len = sizeof(u_int);
- if (im6o == NULL || im6o->im6o_ifidx == 0)
- *ifindex = 0;
- else
- *ifindex = im6o->im6o_ifidx;
- return (0);
- case IPV6_MULTICAST_HOPS:
- hlim = mtod(*mp, u_int *);
- (*mp)->m_len = sizeof(u_int);
- if (im6o == NULL)
- *hlim = ip6_defmcasthlim;
- else
- *hlim = im6o->im6o_hlim;
- return (0);
- case IPV6_MULTICAST_LOOP:
- loop = mtod(*mp, u_int *);
- (*mp)->m_len = sizeof(u_int);
- if (im6o == NULL)
- *loop = ip6_defmcasthlim;
- else
- *loop = im6o->im6o_loop;
- return (0);
- default:
- return (EOPNOTSUPP);
- }
- }
- /*
- * Discard the IP6 multicast options.
- */
- void
- ip6_freemoptions(struct ip6_moptions *im6o)
- {
- struct in6_multi_mship *imm;
- if (im6o == NULL)
- return;
- while (!LIST_EMPTY(&im6o->im6o_memberships)) {
- imm = LIST_FIRST(&im6o->im6o_memberships);
- LIST_REMOVE(imm, i6mm_chain);
- in6_leavegroup(imm);
- }
- free(im6o, M_IPMOPTS, 0);
- }
- /*
- * Set IPv6 outgoing packet options based on advanced API.
- */
- int
- ip6_setpktopts(struct mbuf *control, struct ip6_pktopts *opt,
- struct ip6_pktopts *stickyopt, int priv, int uproto)
- {
- u_int clen;
- struct cmsghdr *cm = 0;
- caddr_t cmsgs;
- int error;
- if (control == NULL || opt == NULL)
- return (EINVAL);
- ip6_initpktopts(opt);
- if (stickyopt) {
- int error;
- /*
- * If stickyopt is provided, make a local copy of the options
- * for this particular packet, then override them by ancillary
- * objects.
- * XXX: copypktopts() does not copy the cached route to a next
- * hop (if any). This is not very good in terms of efficiency,
- * but we can allow this since this option should be rarely
- * used.
- */
- if ((error = copypktopts(opt, stickyopt, M_NOWAIT)) != 0)
- return (error);
- }
- /*
- * XXX: Currently, we assume all the optional information is stored
- * in a single mbuf.
- */
- if (control->m_next)
- return (EINVAL);
- clen = control->m_len;
- cmsgs = mtod(control, caddr_t);
- do {
- if (clen < CMSG_LEN(0))
- return (EINVAL);
- cm = (struct cmsghdr *)cmsgs;
- if (cm->cmsg_len < CMSG_LEN(0) || cm->cmsg_len > clen ||
- CMSG_ALIGN(cm->cmsg_len) > clen)
- return (EINVAL);
- if (cm->cmsg_level == IPPROTO_IPV6) {
- error = ip6_setpktopt(cm->cmsg_type, CMSG_DATA(cm),
- cm->cmsg_len - CMSG_LEN(0), opt, priv, 0, 1, uproto);
- if (error)
- return (error);
- }
- clen -= CMSG_ALIGN(cm->cmsg_len);
- cmsgs += CMSG_ALIGN(cm->cmsg_len);
- } while (clen);
- return (0);
- }
- /*
- * Set a particular packet option, as a sticky option or an ancillary data
- * item. "len" can be 0 only when it's a sticky option.
- * We have 4 cases of combination of "sticky" and "cmsg":
- * "sticky=0, cmsg=0": impossible
- * "sticky=0, cmsg=1": RFC2292 or RFC3542 ancillary data
- * "sticky=1, cmsg=0": RFC3542 socket option
- * "sticky=1, cmsg=1": RFC2292 socket option
- */
- int
- ip6_setpktopt(int optname, u_char *buf, int len, struct ip6_pktopts *opt,
- int priv, int sticky, int cmsg, int uproto)
- {
- int minmtupolicy;
- if (!sticky && !cmsg) {
- #ifdef DIAGNOSTIC
- printf("ip6_setpktopt: impossible case\n");
- #endif
- return (EINVAL);
- }
- /*
- * IPV6_2292xxx is for backward compatibility to RFC2292, and should
- * not be specified in the context of RFC3542. Conversely,
- * RFC3542 types should not be specified in the context of RFC2292.
- */
- if (!cmsg) {
- switch (optname) {
- case IPV6_2292PKTINFO:
- case IPV6_2292HOPLIMIT:
- case IPV6_2292NEXTHOP:
- case IPV6_2292HOPOPTS:
- case IPV6_2292DSTOPTS:
- case IPV6_2292RTHDR:
- case IPV6_2292PKTOPTIONS:
- return (ENOPROTOOPT);
- }
- }
- if (sticky && cmsg) {
- switch (optname) {
- case IPV6_PKTINFO:
- case IPV6_HOPLIMIT:
- case IPV6_NEXTHOP:
- case IPV6_HOPOPTS:
- case IPV6_DSTOPTS:
- case IPV6_RTHDRDSTOPTS:
- case IPV6_RTHDR:
- case IPV6_USE_MIN_MTU:
- case IPV6_DONTFRAG:
- case IPV6_TCLASS:
- return (ENOPROTOOPT);
- }
- }
- switch (optname) {
- case IPV6_2292PKTINFO:
- case IPV6_PKTINFO:
- {
- struct ifnet *ifp = NULL;
- struct in6_pktinfo *pktinfo;
- if (len != sizeof(struct in6_pktinfo))
- return (EINVAL);
- pktinfo = (struct in6_pktinfo *)buf;
- /*
- * An application can clear any sticky IPV6_PKTINFO option by
- * doing a "regular" setsockopt with ipi6_addr being
- * in6addr_any and ipi6_ifindex being zero.
- * [RFC 3542, Section 6]
- */
- if (optname == IPV6_PKTINFO && opt->ip6po_pktinfo &&
- pktinfo->ipi6_ifindex == 0 &&
- IN6_IS_ADDR_UNSPECIFIED(&pktinfo->ipi6_addr)) {
- ip6_clearpktopts(opt, optname);
- break;
- }
- if (uproto == IPPROTO_TCP && optname == IPV6_PKTINFO &&
- sticky && !IN6_IS_ADDR_UNSPECIFIED(&pktinfo->ipi6_addr)) {
- return (EINVAL);
- }
- if (pktinfo->ipi6_ifindex) {
- ifp = if_get(pktinfo->ipi6_ifindex);
- if (ifp == NULL)
- return (ENXIO);
- }
- /*
- * We store the address anyway, and let in6_selectsrc()
- * validate the specified address. This is because ipi6_addr
- * may not have enough information about its scope zone, and
- * we may need additional information (such as outgoing
- * interface or the scope zone of a destination address) to
- * disambiguate the scope.
- * XXX: the delay of the validation may confuse the
- * application when it is used as a sticky option.
- */
- if (opt->ip6po_pktinfo == NULL) {
- opt->ip6po_pktinfo = malloc(sizeof(*pktinfo),
- M_IP6OPT, M_NOWAIT);
- if (opt->ip6po_pktinfo == NULL)
- return (ENOBUFS);
- }
- bcopy(pktinfo, opt->ip6po_pktinfo, sizeof(*pktinfo));
- break;
- }
- case IPV6_2292HOPLIMIT:
- case IPV6_HOPLIMIT:
- {
- int *hlimp;
- /*
- * RFC 3542 deprecated the usage of sticky IPV6_HOPLIMIT
- * to simplify the ordering among hoplimit options.
- */
- if (optname == IPV6_HOPLIMIT && sticky)
- return (ENOPROTOOPT);
- if (len != sizeof(int))
- return (EINVAL);
- hlimp = (int *)buf;
- if (*hlimp < -1 || *hlimp > 255)
- return (EINVAL);
- opt->ip6po_hlim = *hlimp;
- break;
- }
- case IPV6_TCLASS:
- {
- int tclass;
- if (len != sizeof(int))
- return (EINVAL);
- tclass = *(int *)buf;
- if (tclass < -1 || tclass > 255)
- return (EINVAL);
- opt->ip6po_tclass = tclass;
- break;
- }
- case IPV6_2292NEXTHOP:
- case IPV6_NEXTHOP:
- if (!priv)
- return (EPERM);
- if (len == 0) { /* just remove the option */
- ip6_clearpktopts(opt, IPV6_NEXTHOP);
- break;
- }
- /* check if cmsg_len is large enough for sa_len */
- if (len < sizeof(struct sockaddr) || len < *buf)
- return (EINVAL);
- switch (((struct sockaddr *)buf)->sa_family) {
- case AF_INET6:
- {
- struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)buf;
- if (sa6->sin6_len != sizeof(struct sockaddr_in6))
- return (EINVAL);
- if (IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr) ||
- IN6_IS_ADDR_MULTICAST(&sa6->sin6_addr)) {
- return (EINVAL);
- }
- if (IN6_IS_SCOPE_EMBED(&sa6->sin6_addr)) {
- if (if_get(sa6->sin6_scope_id) == NULL)
- return (EINVAL);
- sa6->sin6_addr.s6_addr16[1] =
- htonl(sa6->sin6_scope_id);
- } else if (sa6->sin6_scope_id)
- return (EINVAL);
- break;
- }
- case AF_LINK: /* eventually be supported? */
- default:
- return (EAFNOSUPPORT);
- }
- /* turn off the previous option, then set the new option. */
- ip6_clearpktopts(opt, IPV6_NEXTHOP);
- opt->ip6po_nexthop = malloc(*buf, M_IP6OPT, M_NOWAIT);
- if (opt->ip6po_nexthop == NULL)
- return (ENOBUFS);
- bcopy(buf, opt->ip6po_nexthop, *buf);
- break;
- case IPV6_2292HOPOPTS:
- case IPV6_HOPOPTS:
- {
- struct ip6_hbh *hbh;
- int hbhlen;
- /*
- * XXX: We don't allow a non-privileged user to set ANY HbH
- * options, since per-option restriction has too much
- * overhead.
- */
- if (!priv)
- return (EPERM);
- if (len == 0) {
- ip6_clearpktopts(opt, IPV6_HOPOPTS);
- break; /* just remove the option */
- }
- /* message length validation */
- if (len < sizeof(struct ip6_hbh))
- return (EINVAL);
- hbh = (struct ip6_hbh *)buf;
- hbhlen = (hbh->ip6h_len + 1) << 3;
- if (len != hbhlen)
- return (EINVAL);
- /* turn off the previous option, then set the new option. */
- ip6_clearpktopts(opt, IPV6_HOPOPTS);
- opt->ip6po_hbh = malloc(hbhlen, M_IP6OPT, M_NOWAIT);
- if (opt->ip6po_hbh == NULL)
- return (ENOBUFS);
- bcopy(hbh, opt->ip6po_hbh, hbhlen);
- break;
- }
- case IPV6_2292DSTOPTS:
- case IPV6_DSTOPTS:
- case IPV6_RTHDRDSTOPTS:
- {
- struct ip6_dest *dest, **newdest = NULL;
- int destlen;
- if (!priv) /* XXX: see the comment for IPV6_HOPOPTS */
- return (EPERM);
- if (len == 0) {
- ip6_clearpktopts(opt, optname);
- break; /* just remove the option */
- }
- /* message length validation */
- if (len < sizeof(struct ip6_dest))
- return (EINVAL);
- dest = (struct ip6_dest *)buf;
- destlen = (dest->ip6d_len + 1) << 3;
- if (len != destlen)
- return (EINVAL);
- /*
- * Determine the position that the destination options header
- * should be inserted; before or after the routing header.
- */
- switch (optname) {
- case IPV6_2292DSTOPTS:
- /*
- * The old advanced API is ambiguous on this point.
- * Our approach is to determine the position based
- * according to the existence of a routing header.
- * Note, however, that this depends on the order of the
- * extension headers in the ancillary data; the 1st
- * part of the destination options header must appear
- * before the routing header in the ancillary data,
- * too.
- * RFC3542 solved the ambiguity by introducing
- * separate ancillary data or option types.
- */
- if (opt->ip6po_rthdr == NULL)
- newdest = &opt->ip6po_dest1;
- else
- newdest = &opt->ip6po_dest2;
- break;
- case IPV6_RTHDRDSTOPTS:
- newdest = &opt->ip6po_dest1;
- break;
- case IPV6_DSTOPTS:
- newdest = &opt->ip6po_dest2;
- break;
- }
- /* turn off the previous option, then set the new option. */
- ip6_clearpktopts(opt, optname);
- *newdest = malloc(destlen, M_IP6OPT, M_NOWAIT);
- if (*newdest == NULL)
- return (ENOBUFS);
- bcopy(dest, *newdest, destlen);
- break;
- }
- case IPV6_2292RTHDR:
- case IPV6_RTHDR:
- {
- struct ip6_rthdr *rth;
- int rthlen;
- if (len == 0) {
- ip6_clearpktopts(opt, IPV6_RTHDR);
- break; /* just remove the option */
- }
- /* message length validation */
- if (len < sizeof(struct ip6_rthdr))
- return (EINVAL);
- rth = (struct ip6_rthdr *)buf;
- rthlen = (rth->ip6r_len + 1) << 3;
- if (len != rthlen)
- return (EINVAL);
- switch (rth->ip6r_type) {
- case IPV6_RTHDR_TYPE_0:
- if (rth->ip6r_len == 0) /* must contain one addr */
- return (EINVAL);
- if (rth->ip6r_len % 2) /* length must be even */
- return (EINVAL);
- if (rth->ip6r_len / 2 != rth->ip6r_segleft)
- return (EINVAL);
- break;
- default:
- return (EINVAL); /* not supported */
- }
- /* turn off the previous option */
- ip6_clearpktopts(opt, IPV6_RTHDR);
- opt->ip6po_rthdr = malloc(rthlen, M_IP6OPT, M_NOWAIT);
- if (opt->ip6po_rthdr == NULL)
- return (ENOBUFS);
- bcopy(rth, opt->ip6po_rthdr, rthlen);
- break;
- }
- case IPV6_USE_MIN_MTU:
- if (len != sizeof(int))
- return (EINVAL);
- minmtupolicy = *(int *)buf;
- if (minmtupolicy != IP6PO_MINMTU_MCASTONLY &&
- minmtupolicy != IP6PO_MINMTU_DISABLE &&
- minmtupolicy != IP6PO_MINMTU_ALL) {
- return (EINVAL);
- }
- opt->ip6po_minmtu = minmtupolicy;
- break;
- case IPV6_DONTFRAG:
- if (len != sizeof(int))
- return (EINVAL);
- if (uproto == IPPROTO_TCP || *(int *)buf == 0) {
- /*
- * we ignore this option for TCP sockets.
- * (RFC3542 leaves this case unspecified.)
- */
- opt->ip6po_flags &= ~IP6PO_DONTFRAG;
- } else
- opt->ip6po_flags |= IP6PO_DONTFRAG;
- break;
- default:
- return (ENOPROTOOPT);
- } /* end of switch */
- return (0);
- }
- /*
- * Routine called from ip6_output() to loop back a copy of an IP6 multicast
- * packet to the input queue of a specified interface. Note that this
- * calls the output routine of the loopback "driver", but with an interface
- * pointer that might NOT be lo0ifp -- easier than replicating that code here.
- */
- void
- ip6_mloopback(struct ifnet *ifp, struct mbuf *m, struct sockaddr_in6 *dst)
- {
- struct mbuf *copym;
- struct ip6_hdr *ip6;
- /*
- * Duplicate the packet.
- */
- copym = m_copym(m, 0, M_COPYALL, M_NOWAIT);
- if (copym == NULL)
- return;
- /*
- * Make sure to deep-copy IPv6 header portion in case the data
- * is in an mbuf cluster, so that we can safely override the IPv6
- * header portion later.
- */
- if ((copym->m_flags & M_EXT) != 0 ||
- copym->m_len < sizeof(struct ip6_hdr)) {
- copym = m_pullup(copym, sizeof(struct ip6_hdr));
- if (copym == NULL)
- return;
- }
- #ifdef DIAGNOSTIC
- if (copym->m_len < sizeof(*ip6)) {
- m_freem(copym);
- return;
- }
- #endif
- ip6 = mtod(copym, struct ip6_hdr *);
- if (IN6_IS_SCOPE_EMBED(&ip6->ip6_src))
- ip6->ip6_src.s6_addr16[1] = 0;
- if (IN6_IS_SCOPE_EMBED(&ip6->ip6_dst))
- ip6->ip6_dst.s6_addr16[1] = 0;
- (void)looutput(ifp, copym, sin6tosa(dst), NULL);
- }
- /*
- * Chop IPv6 header off from the payload.
- */
- int
- ip6_splithdr(struct mbuf *m, struct ip6_exthdrs *exthdrs)
- {
- struct mbuf *mh;
- struct ip6_hdr *ip6;
- ip6 = mtod(m, struct ip6_hdr *);
- if (m->m_len > sizeof(*ip6)) {
- MGETHDR(mh, M_DONTWAIT, MT_HEADER);
- if (mh == NULL) {
- m_freem(m);
- return ENOBUFS;
- }
- M_MOVE_PKTHDR(mh, m);
- MH_ALIGN(mh, sizeof(*ip6));
- m->m_len -= sizeof(*ip6);
- m->m_data += sizeof(*ip6);
- mh->m_next = m;
- m = mh;
- m->m_len = sizeof(*ip6);
- bcopy((caddr_t)ip6, mtod(m, caddr_t), sizeof(*ip6));
- }
- exthdrs->ip6e_ip6 = m;
- return 0;
- }
- u_int32_t
- ip6_randomid(void)
- {
- return idgen32(&ip6_id_ctx);
- }
- void
- ip6_randomid_init(void)
- {
- idgen32_init(&ip6_id_ctx);
- }
- /*
- * Compute significant parts of the IPv6 checksum pseudo-header
- * for use in a delayed TCP/UDP checksum calculation.
- */
- static __inline u_int16_t __attribute__((__unused__))
- in6_cksum_phdr(const struct in6_addr *src, const struct in6_addr *dst,
- u_int32_t len, u_int32_t nxt)
- {
- u_int32_t sum = 0;
- const u_int16_t *w;
- w = (const u_int16_t *) src;
- sum += w[0];
- if (!IN6_IS_SCOPE_EMBED(src))
- sum += w[1];
- sum += w[2]; sum += w[3]; sum += w[4]; sum += w[5];
- sum += w[6]; sum += w[7];
- w = (const u_int16_t *) dst;
- sum += w[0];
- if (!IN6_IS_SCOPE_EMBED(dst))
- sum += w[1];
- sum += w[2]; sum += w[3]; sum += w[4]; sum += w[5];
- sum += w[6]; sum += w[7];
- sum += (u_int16_t)(len >> 16) + (u_int16_t)(len /*& 0xffff*/);
- sum += (u_int16_t)(nxt >> 16) + (u_int16_t)(nxt /*& 0xffff*/);
- sum = (u_int16_t)(sum >> 16) + (u_int16_t)(sum /*& 0xffff*/);
- if (sum > 0xffff)
- sum -= 0xffff;
- return (sum);
- }
- /*
- * Process a delayed payload checksum calculation.
- */
- void
- in6_delayed_cksum(struct mbuf *m, u_int8_t nxt)
- {
- int nxtp, offset;
- u_int16_t csum;
- offset = ip6_lasthdr(m, 0, IPPROTO_IPV6, &nxtp);
- if (offset <= 0 || nxtp != nxt)
- /* If the desired next protocol isn't found, punt. */
- return;
- csum = (u_int16_t)(in6_cksum(m, 0, offset, m->m_pkthdr.len - offset));
- switch (nxt) {
- case IPPROTO_TCP:
- offset += offsetof(struct tcphdr, th_sum);
- break;
- case IPPROTO_UDP:
- offset += offsetof(struct udphdr, uh_sum);
- if (csum == 0)
- csum = 0xffff;
- break;
- case IPPROTO_ICMPV6:
- offset += offsetof(struct icmp6_hdr, icmp6_cksum);
- break;
- }
- if ((offset + sizeof(u_int16_t)) > m->m_len)
- m_copyback(m, offset, sizeof(csum), &csum, M_NOWAIT);
- else
- *(u_int16_t *)(mtod(m, caddr_t) + offset) = csum;
- }
- void
- in6_proto_cksum_out(struct mbuf *m, struct ifnet *ifp)
- {
- /* some hw and in6_delayed_cksum need the pseudo header cksum */
- if (m->m_pkthdr.csum_flags &
- (M_TCP_CSUM_OUT|M_UDP_CSUM_OUT|M_ICMP_CSUM_OUT)) {
- struct ip6_hdr *ip6;
- int nxt, offset;
- u_int16_t csum;
- ip6 = mtod(m, struct ip6_hdr *);
- offset = ip6_lasthdr(m, 0, IPPROTO_IPV6, &nxt);
- csum = in6_cksum_phdr(&ip6->ip6_src, &ip6->ip6_dst,
- htonl(m->m_pkthdr.len - offset), htonl(nxt));
- if (nxt == IPPROTO_TCP)
- offset += offsetof(struct tcphdr, th_sum);
- else if (nxt == IPPROTO_UDP)
- offset += offsetof(struct udphdr, uh_sum);
- else if (nxt == IPPROTO_ICMPV6)
- offset += offsetof(struct icmp6_hdr, icmp6_cksum);
- if ((offset + sizeof(u_int16_t)) > m->m_len)
- m_copyback(m, offset, sizeof(csum), &csum, M_NOWAIT);
- else
- *(u_int16_t *)(mtod(m, caddr_t) + offset) = csum;
- }
- if (m->m_pkthdr.csum_flags & M_TCP_CSUM_OUT) {
- if (!ifp || !(ifp->if_capabilities & IFCAP_CSUM_TCPv6) ||
- ifp->if_bridgeport != NULL) {
- tcpstat.tcps_outswcsum++;
- in6_delayed_cksum(m, IPPROTO_TCP);
- m->m_pkthdr.csum_flags &= ~M_TCP_CSUM_OUT; /* Clear */
- }
- } else if (m->m_pkthdr.csum_flags & M_UDP_CSUM_OUT) {
- if (!ifp || !(ifp->if_capabilities & IFCAP_CSUM_UDPv6) ||
- ifp->if_bridgeport != NULL) {
- udpstat.udps_outswcsum++;
- in6_delayed_cksum(m, IPPROTO_UDP);
- m->m_pkthdr.csum_flags &= ~M_UDP_CSUM_OUT; /* Clear */
- }
- } else if (m->m_pkthdr.csum_flags & M_ICMP_CSUM_OUT) {
- in6_delayed_cksum(m, IPPROTO_ICMPV6);
- m->m_pkthdr.csum_flags &= ~M_ICMP_CSUM_OUT; /* Clear */
- }
- }
|