Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
/* $NetBSD: ip6_output.c,v 1.94 2006/01/21 00:15:36 rpaulo Exp $ */
|
2001-03-25 13:58:43 +04:00
|
|
|
/* $KAME: ip6_output.c,v 1.172 2001/03/25 09:55:56 itojun Exp $ */
|
1999-07-04 01:24:45 +04:00
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
|
|
|
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
|
|
|
* All rights reserved.
|
2000-05-19 05:40:18 +04:00
|
|
|
*
|
1999-06-28 10:36:47 +04:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the project nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
2000-05-19 05:40:18 +04:00
|
|
|
*
|
1999-06-28 10:36:47 +04:00
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (c) 1982, 1986, 1988, 1990, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2003-08-07 20:26:28 +04:00
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
1999-06-28 10:36:47 +04:00
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* @(#)ip_output.c 8.3 (Berkeley) 1/21/94
|
|
|
|
*/
|
|
|
|
|
2001-11-13 03:56:55 +03:00
|
|
|
#include <sys/cdefs.h>
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
__KERNEL_RCSID(0, "$NetBSD: ip6_output.c,v 1.94 2006/01/21 00:15:36 rpaulo Exp $");
|
2001-11-13 03:56:55 +03:00
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
#include "opt_inet.h"
|
1999-07-10 02:57:15 +04:00
|
|
|
#include "opt_ipsec.h"
|
2000-02-17 13:59:32 +03:00
|
|
|
#include "opt_pfil_hooks.h"
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/mbuf.h>
|
|
|
|
#include <sys/errno.h>
|
|
|
|
#include <sys/protosw.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/socketvar.h>
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/proc.h>
|
|
|
|
|
|
|
|
#include <net/if.h>
|
|
|
|
#include <net/route.h>
|
2000-02-17 13:59:32 +03:00
|
|
|
#ifdef PFIL_HOOKS
|
|
|
|
#include <net/pfil.h>
|
|
|
|
#endif
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/in_var.h>
|
2000-02-06 15:49:37 +03:00
|
|
|
#include <netinet/ip6.h>
|
|
|
|
#include <netinet/icmp6.h>
|
2005-08-10 17:08:11 +04:00
|
|
|
#include <netinet/in_offload.h>
|
2000-01-06 09:41:18 +03:00
|
|
|
#include <netinet6/ip6_var.h>
|
1999-12-13 18:17:17 +03:00
|
|
|
#include <netinet6/in6_pcb.h>
|
1999-06-28 10:36:47 +04:00
|
|
|
#include <netinet6/nd6.h>
|
2004-02-04 08:17:28 +03:00
|
|
|
#include <netinet6/ip6protosw.h>
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
#include <netinet6/scope6_var.h>
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
#ifdef IPSEC
|
|
|
|
#include <netinet6/ipsec.h>
|
|
|
|
#include <netkey/key.h>
|
|
|
|
#endif /* IPSEC */
|
|
|
|
|
1999-12-13 18:17:17 +03:00
|
|
|
#include <net/net_osdep.h>
|
|
|
|
|
Restructure the PFIL_HOOKS mechanism a bit:
- All packets are passed to PFIL_HOOKS as they come off the wire, i.e.
fields in protocol headers in network order, etc.
- Allow for multiple hooks to be registered, using a "key" and a "dlt".
The "dlt" is a BPF data link type, indicating what type of header is
present.
- INET and INET6 register with key == AF_INET or AF_INET6, and
dlt == DLT_RAW.
- PFIL_HOOKS now take an argument for the filter hook, and mbuf **,
an ifnet *, and a direction (PFIL_IN or PFIL_OUT), thus making them
less IP (really, IP Filter) centric.
Maintain compatibility with IP Filter by adding wrapper functions for
IP Filter.
2000-11-11 03:52:36 +03:00
|
|
|
#ifdef PFIL_HOOKS
|
|
|
|
extern struct pfil_head inet6_pfil_hook; /* XXX */
|
|
|
|
#endif
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ip6_exthdrs {
|
|
|
|
struct mbuf *ip6e_ip6;
|
|
|
|
struct mbuf *ip6e_hbh;
|
|
|
|
struct mbuf *ip6e_dest1;
|
|
|
|
struct mbuf *ip6e_rthdr;
|
|
|
|
struct mbuf *ip6e_dest2;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int ip6_pcbopts __P((struct ip6_pktopts **, struct mbuf *,
|
2002-06-07 18:29:10 +04:00
|
|
|
struct socket *));
|
1999-06-28 10:36:47 +04:00
|
|
|
static int ip6_setmoptions __P((int, struct ip6_moptions **, struct mbuf *));
|
|
|
|
static int ip6_getmoptions __P((int, struct ip6_moptions *, struct mbuf **));
|
|
|
|
static int ip6_copyexthdr __P((struct mbuf **, caddr_t, int));
|
|
|
|
static int ip6_insertfraghdr __P((struct mbuf *, struct mbuf *, int,
|
2002-06-07 18:29:10 +04:00
|
|
|
struct ip6_frag **));
|
1999-06-28 10:36:47 +04:00
|
|
|
static int ip6_insert_jumboopt __P((struct ip6_exthdrs *, u_int32_t));
|
|
|
|
static int ip6_splithdr __P((struct mbuf *, struct ip6_exthdrs *));
|
2005-02-28 12:27:07 +03:00
|
|
|
static int ip6_getpmtu __P((struct route_in6 *, struct route_in6 *,
|
|
|
|
struct ifnet *, struct in6_addr *, u_long *, int *));
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2005-08-10 17:08:11 +04:00
|
|
|
#define IN6_NEED_CHECKSUM(ifp, csum_flags) \
|
|
|
|
(__predict_true(((ifp)->if_flags & IFF_LOOPBACK) == 0 || \
|
|
|
|
(((csum_flags) & M_CSUM_UDPv6) != 0 && udp_do_loopback_cksum) || \
|
|
|
|
(((csum_flags) & M_CSUM_TCPv6) != 0 && tcp_do_loopback_cksum)))
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
|
|
|
* IP6 output. The packet in mbuf chain m contains a skeletal IP6
|
|
|
|
* header (with pri, len, nxt, hlim, src, dst).
|
|
|
|
* This function may modify ver and hlim only.
|
|
|
|
* The mbuf chain containing the packet will be freed.
|
|
|
|
* The mbuf opt, if present, will not be freed.
|
2002-06-07 21:13:56 +04:00
|
|
|
*
|
|
|
|
* type of "mtu": rt_rmx.rmx_mtu is u_long, ifnet.ifr_mtu is int, and
|
|
|
|
* nd_ifinfo.linkmtu is u_int32_t. so we use u_long to hold largest one,
|
|
|
|
* which is rt_rmx.rmx_mtu.
|
1999-06-28 10:36:47 +04:00
|
|
|
*/
|
|
|
|
int
|
2003-08-23 01:53:01 +04:00
|
|
|
ip6_output(m0, opt, ro, flags, im6o, so, ifpp)
|
1999-06-28 10:36:47 +04:00
|
|
|
struct mbuf *m0;
|
|
|
|
struct ip6_pktopts *opt;
|
|
|
|
struct route_in6 *ro;
|
|
|
|
int flags;
|
|
|
|
struct ip6_moptions *im6o;
|
2003-08-23 01:53:01 +04:00
|
|
|
struct socket *so;
|
1999-12-13 18:17:17 +03:00
|
|
|
struct ifnet **ifpp; /* XXX: just for statistics */
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
|
|
|
struct ip6_hdr *ip6, *mhip6;
|
2000-05-19 05:40:18 +04:00
|
|
|
struct ifnet *ifp, *origifp;
|
1999-06-28 10:36:47 +04:00
|
|
|
struct mbuf *m = m0;
|
|
|
|
int hlen, tlen, len, off;
|
|
|
|
struct route_in6 ip6route;
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
struct rtentry *rt = NULL;
|
|
|
|
struct sockaddr_in6 *dst, src_sa, dst_sa;
|
1999-06-28 10:36:47 +04:00
|
|
|
int error = 0;
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
struct in6_ifaddr *ia = NULL;
|
1999-06-28 10:36:47 +04:00
|
|
|
u_long mtu;
|
2004-02-04 08:17:28 +03:00
|
|
|
int alwaysfrag, dontfrag;
|
1999-06-28 10:36:47 +04:00
|
|
|
u_int32_t optlen = 0, plen = 0, unfragpartlen = 0;
|
|
|
|
struct ip6_exthdrs exthdrs;
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
struct in6_addr finaldst, src0, dst0;
|
|
|
|
u_int32_t zone;
|
1999-06-28 10:36:47 +04:00
|
|
|
struct route_in6 *ro_pmtu = NULL;
|
|
|
|
int hdrsplit = 0;
|
|
|
|
int needipsec = 0;
|
|
|
|
#ifdef IPSEC
|
|
|
|
int needipsectun = 0;
|
|
|
|
struct secpolicy *sp = NULL;
|
|
|
|
|
|
|
|
ip6 = mtod(m, struct ip6_hdr *);
|
|
|
|
#endif /* IPSEC */
|
|
|
|
|
2005-08-10 16:58:37 +04:00
|
|
|
M_CSUM_DATA_IPv6_HL_SET(m->m_pkthdr.csum_data, sizeof(struct ip6_hdr));
|
|
|
|
|
2000-06-03 18:36:32 +04:00
|
|
|
#define MAKE_EXTHDR(hp, mp) \
|
|
|
|
do { \
|
1999-06-28 10:36:47 +04:00
|
|
|
if (hp) { \
|
|
|
|
struct ip6_ext *eh = (struct ip6_ext *)(hp); \
|
|
|
|
error = ip6_copyexthdr((mp), (caddr_t)(hp), \
|
2002-06-07 18:29:10 +04:00
|
|
|
((eh)->ip6e_len + 1) << 3); \
|
1999-06-28 10:36:47 +04:00
|
|
|
if (error) \
|
|
|
|
goto freehdrs; \
|
|
|
|
} \
|
2002-11-02 10:30:55 +03:00
|
|
|
} while (/*CONSTCOND*/ 0)
|
2002-06-07 18:48:56 +04:00
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
bzero(&exthdrs, sizeof(exthdrs));
|
|
|
|
if (opt) {
|
|
|
|
/* Hop-by-Hop options header */
|
|
|
|
MAKE_EXTHDR(opt->ip6po_hbh, &exthdrs.ip6e_hbh);
|
|
|
|
/* Destination options header(1st part) */
|
|
|
|
MAKE_EXTHDR(opt->ip6po_dest1, &exthdrs.ip6e_dest1);
|
|
|
|
/* Routing header */
|
|
|
|
MAKE_EXTHDR(opt->ip6po_rthdr, &exthdrs.ip6e_rthdr);
|
|
|
|
/* Destination options header(2nd part) */
|
|
|
|
MAKE_EXTHDR(opt->ip6po_dest2, &exthdrs.ip6e_dest2);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef IPSEC
|
2004-01-19 08:14:58 +03:00
|
|
|
if ((flags & IPV6_FORWARDING) != 0) {
|
|
|
|
needipsec = 0;
|
|
|
|
goto skippolicycheck;
|
|
|
|
}
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/* get a security policy for this packet */
|
|
|
|
if (so == NULL)
|
2000-01-31 17:18:52 +03:00
|
|
|
sp = ipsec6_getpolicybyaddr(m, IPSEC_DIR_OUTBOUND, 0, &error);
|
2004-03-02 05:28:28 +03:00
|
|
|
else {
|
|
|
|
if (IPSEC_PCB_SKIP_IPSEC(sotoinpcb_hdr(so)->inph_sp,
|
|
|
|
IPSEC_DIR_OUTBOUND)) {
|
|
|
|
needipsec = 0;
|
|
|
|
goto skippolicycheck;
|
|
|
|
}
|
2000-01-31 17:18:52 +03:00
|
|
|
sp = ipsec6_getpolicybysock(m, IPSEC_DIR_OUTBOUND, so, &error);
|
2004-03-02 05:28:28 +03:00
|
|
|
}
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
if (sp == NULL) {
|
|
|
|
ipsec6stat.out_inval++;
|
2000-06-20 06:24:42 +04:00
|
|
|
goto freehdrs;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
error = 0;
|
|
|
|
|
|
|
|
/* check policy */
|
|
|
|
switch (sp->policy) {
|
|
|
|
case IPSEC_POLICY_DISCARD:
|
|
|
|
/*
|
|
|
|
* This packet is just discarded.
|
|
|
|
*/
|
|
|
|
ipsec6stat.out_polvio++;
|
2000-06-20 06:24:42 +04:00
|
|
|
goto freehdrs;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
case IPSEC_POLICY_BYPASS:
|
|
|
|
case IPSEC_POLICY_NONE:
|
|
|
|
/* no need to do IPsec. */
|
|
|
|
needipsec = 0;
|
|
|
|
break;
|
2002-06-07 18:48:56 +04:00
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
case IPSEC_POLICY_IPSEC:
|
|
|
|
if (sp->req == NULL) {
|
|
|
|
/* XXX should be panic ? */
|
|
|
|
printf("ip6_output: No IPsec request specified.\n");
|
|
|
|
error = EINVAL;
|
2000-06-20 06:24:42 +04:00
|
|
|
goto freehdrs;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
needipsec = 1;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPSEC_POLICY_ENTRUST:
|
|
|
|
default:
|
|
|
|
printf("ip6_output: Invalid policy found. %d\n", sp->policy);
|
|
|
|
}
|
2004-01-19 08:14:58 +03:00
|
|
|
|
|
|
|
skippolicycheck:;
|
1999-06-28 10:36:47 +04:00
|
|
|
#endif /* IPSEC */
|
|
|
|
|
2005-08-10 16:58:37 +04:00
|
|
|
if (needipsec &&
|
|
|
|
(m->m_pkthdr.csum_flags & (M_CSUM_UDPv6|M_CSUM_TCPv6)) != 0) {
|
|
|
|
in6_delayed_cksum(m);
|
|
|
|
m->m_pkthdr.csum_flags &= ~(M_CSUM_UDPv6|M_CSUM_TCPv6);
|
|
|
|
}
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
|
|
|
* Calculate the total length of the extension header chain.
|
|
|
|
* Keep the length of the unfragmentable part for fragmentation.
|
|
|
|
*/
|
1999-12-13 18:17:17 +03:00
|
|
|
optlen = 0;
|
1999-06-28 10:36:47 +04:00
|
|
|
if (exthdrs.ip6e_hbh) optlen += exthdrs.ip6e_hbh->m_len;
|
|
|
|
if (exthdrs.ip6e_dest1) optlen += exthdrs.ip6e_dest1->m_len;
|
|
|
|
if (exthdrs.ip6e_rthdr) optlen += exthdrs.ip6e_rthdr->m_len;
|
1999-12-13 18:17:17 +03:00
|
|
|
unfragpartlen = optlen + sizeof(struct ip6_hdr);
|
1999-06-28 10:36:47 +04:00
|
|
|
/* NOTE: we don't add AH/ESP length here. do that later. */
|
|
|
|
if (exthdrs.ip6e_dest2) optlen += exthdrs.ip6e_dest2->m_len;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we need IPsec, or there is at least one extension header,
|
|
|
|
* separate IP6 header from the payload.
|
|
|
|
*/
|
|
|
|
if ((needipsec || optlen) && !hdrsplit) {
|
|
|
|
if ((error = ip6_splithdr(m, &exthdrs)) != 0) {
|
|
|
|
m = NULL;
|
|
|
|
goto freehdrs;
|
|
|
|
}
|
|
|
|
m = exthdrs.ip6e_ip6;
|
|
|
|
hdrsplit++;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* adjust pointer */
|
|
|
|
ip6 = mtod(m, struct ip6_hdr *);
|
|
|
|
|
|
|
|
/* adjust mbuf packet header length */
|
|
|
|
m->m_pkthdr.len += optlen;
|
|
|
|
plen = m->m_pkthdr.len - sizeof(*ip6);
|
|
|
|
|
|
|
|
/* If this is a jumbo payload, insert a jumbo payload option. */
|
|
|
|
if (plen > IPV6_MAXPACKET) {
|
|
|
|
if (!hdrsplit) {
|
|
|
|
if ((error = ip6_splithdr(m, &exthdrs)) != 0) {
|
|
|
|
m = NULL;
|
|
|
|
goto freehdrs;
|
|
|
|
}
|
|
|
|
m = exthdrs.ip6e_ip6;
|
|
|
|
hdrsplit++;
|
|
|
|
}
|
|
|
|
/* adjust pointer */
|
|
|
|
ip6 = mtod(m, struct ip6_hdr *);
|
|
|
|
if ((error = ip6_insert_jumboopt(&exthdrs, plen)) != 0)
|
|
|
|
goto freehdrs;
|
2005-08-10 16:58:37 +04:00
|
|
|
optlen += 8; /* XXX JUMBOOPTLEN */
|
1999-06-28 10:36:47 +04:00
|
|
|
ip6->ip6_plen = 0;
|
|
|
|
} else
|
|
|
|
ip6->ip6_plen = htons(plen);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Concatenate headers and fill in next header fields.
|
|
|
|
* Here we have, on "m"
|
1999-12-13 18:17:17 +03:00
|
|
|
* IPv6 payload
|
1999-06-28 10:36:47 +04:00
|
|
|
* and we insert headers accordingly. Finally, we should be getting:
|
|
|
|
* IPv6 hbh dest1 rthdr ah* [esp* dest2 payload]
|
1999-12-13 18:17:17 +03:00
|
|
|
*
|
|
|
|
* during the header composing process, "m" points to IPv6 header.
|
|
|
|
* "mprev" points to an extension header prior to esp.
|
1999-06-28 10:36:47 +04:00
|
|
|
*/
|
|
|
|
{
|
|
|
|
u_char *nexthdrp = &ip6->ip6_nxt;
|
|
|
|
struct mbuf *mprev = m;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* we treat dest2 specially. this makes IPsec processing
|
2004-02-04 08:17:28 +03:00
|
|
|
* much easier. the goal here is to make mprev point the
|
|
|
|
* mbuf prior to dest2.
|
1999-12-13 18:17:17 +03:00
|
|
|
*
|
|
|
|
* result: IPv6 dest2 payload
|
|
|
|
* m and mprev will point to IPv6 header.
|
1999-06-28 10:36:47 +04:00
|
|
|
*/
|
|
|
|
if (exthdrs.ip6e_dest2) {
|
|
|
|
if (!hdrsplit)
|
|
|
|
panic("assumption failed: hdr not split");
|
1999-12-13 18:17:17 +03:00
|
|
|
exthdrs.ip6e_dest2->m_next = m->m_next;
|
|
|
|
m->m_next = exthdrs.ip6e_dest2;
|
1999-06-28 10:36:47 +04:00
|
|
|
*mtod(exthdrs.ip6e_dest2, u_char *) = ip6->ip6_nxt;
|
|
|
|
ip6->ip6_nxt = IPPROTO_DSTOPTS;
|
|
|
|
}
|
|
|
|
|
2000-06-03 18:36:32 +04:00
|
|
|
#define MAKE_CHAIN(m, mp, p, i)\
|
|
|
|
do {\
|
1999-06-28 10:36:47 +04:00
|
|
|
if (m) {\
|
|
|
|
if (!hdrsplit) \
|
|
|
|
panic("assumption failed: hdr not split"); \
|
|
|
|
*mtod((m), u_char *) = *(p);\
|
|
|
|
*(p) = (i);\
|
|
|
|
p = mtod((m), u_char *);\
|
|
|
|
(m)->m_next = (mp)->m_next;\
|
|
|
|
(mp)->m_next = (m);\
|
|
|
|
(mp) = (m);\
|
|
|
|
}\
|
2002-11-02 10:30:55 +03:00
|
|
|
} while (/*CONSTCOND*/ 0)
|
1999-12-13 18:17:17 +03:00
|
|
|
/*
|
|
|
|
* result: IPv6 hbh dest1 rthdr dest2 payload
|
|
|
|
* m will point to IPv6 header. mprev will point to the
|
|
|
|
* extension header prior to dest2 (rthdr in the above case).
|
|
|
|
*/
|
2002-06-07 18:29:10 +04:00
|
|
|
MAKE_CHAIN(exthdrs.ip6e_hbh, mprev, nexthdrp, IPPROTO_HOPOPTS);
|
|
|
|
MAKE_CHAIN(exthdrs.ip6e_dest1, mprev, nexthdrp,
|
|
|
|
IPPROTO_DSTOPTS);
|
|
|
|
MAKE_CHAIN(exthdrs.ip6e_rthdr, mprev, nexthdrp,
|
|
|
|
IPPROTO_ROUTING);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2005-08-10 16:58:37 +04:00
|
|
|
M_CSUM_DATA_IPv6_HL_SET(m->m_pkthdr.csum_data,
|
|
|
|
sizeof(struct ip6_hdr) + optlen);
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
#ifdef IPSEC
|
|
|
|
if (!needipsec)
|
|
|
|
goto skip_ipsec2;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* pointers after IPsec headers are not valid any more.
|
|
|
|
* other pointers need a great care too.
|
|
|
|
* (IPsec routines should not mangle mbufs prior to AH/ESP)
|
|
|
|
*/
|
|
|
|
exthdrs.ip6e_dest2 = NULL;
|
|
|
|
|
|
|
|
{
|
|
|
|
struct ip6_rthdr *rh = NULL;
|
|
|
|
int segleft_org = 0;
|
|
|
|
struct ipsec_output_state state;
|
|
|
|
|
|
|
|
if (exthdrs.ip6e_rthdr) {
|
|
|
|
rh = mtod(exthdrs.ip6e_rthdr, struct ip6_rthdr *);
|
|
|
|
segleft_org = rh->ip6r_segleft;
|
|
|
|
rh->ip6r_segleft = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
bzero(&state, sizeof(state));
|
|
|
|
state.m = m;
|
|
|
|
error = ipsec6_output_trans(&state, nexthdrp, mprev, sp, flags,
|
2004-02-04 08:17:28 +03:00
|
|
|
&needipsectun);
|
1999-06-28 10:36:47 +04:00
|
|
|
m = state.m;
|
|
|
|
if (error) {
|
|
|
|
/* mbuf is already reclaimed in ipsec6_output_trans. */
|
|
|
|
m = NULL;
|
|
|
|
switch (error) {
|
|
|
|
case EHOSTUNREACH:
|
|
|
|
case ENETUNREACH:
|
|
|
|
case EMSGSIZE:
|
|
|
|
case ENOBUFS:
|
|
|
|
case ENOMEM:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
printf("ip6_output (ipsec): error code %d\n", error);
|
2002-06-07 08:18:11 +04:00
|
|
|
/* FALLTHROUGH */
|
1999-06-28 10:36:47 +04:00
|
|
|
case ENOENT:
|
|
|
|
/* don't show these error codes to the user */
|
|
|
|
error = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
if (exthdrs.ip6e_rthdr) {
|
|
|
|
/* ah6_output doesn't modify mbuf chain */
|
|
|
|
rh->ip6r_segleft = segleft_org;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
skip_ipsec2:;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If there is a routing header, replace destination address field
|
|
|
|
* with the first hop of the routing header.
|
|
|
|
*/
|
|
|
|
if (exthdrs.ip6e_rthdr) {
|
2002-06-07 18:29:10 +04:00
|
|
|
struct ip6_rthdr *rh;
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ip6_rthdr0 *rh0;
|
2003-06-06 12:13:43 +04:00
|
|
|
struct in6_addr *addr;
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
struct sockaddr_in6 sa;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2002-06-07 18:29:10 +04:00
|
|
|
rh = (struct ip6_rthdr *)(mtod(exthdrs.ip6e_rthdr,
|
|
|
|
struct ip6_rthdr *));
|
1999-06-28 10:36:47 +04:00
|
|
|
finaldst = ip6->ip6_dst;
|
2001-02-10 07:14:26 +03:00
|
|
|
switch (rh->ip6r_type) {
|
1999-06-28 10:36:47 +04:00
|
|
|
case IPV6_RTHDR_TYPE_0:
|
|
|
|
rh0 = (struct ip6_rthdr0 *)rh;
|
2003-06-06 12:13:43 +04:00
|
|
|
addr = (struct in6_addr *)(rh0 + 1);
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* construct a sockaddr_in6 form of
|
|
|
|
* the first hop.
|
|
|
|
*
|
|
|
|
* XXX: we may not have enough
|
|
|
|
* information about its scope zone;
|
|
|
|
* there is no standard API to pass
|
|
|
|
* the information from the
|
|
|
|
* application.
|
|
|
|
*/
|
|
|
|
bzero(&sa, sizeof(sa));
|
|
|
|
sa.sin6_family = AF_INET6;
|
|
|
|
sa.sin6_len = sizeof(sa);
|
|
|
|
sa.sin6_addr = addr[0];
|
|
|
|
if ((error = sa6_embedscope(&sa,
|
|
|
|
ip6_use_defzone)) != 0) {
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
ip6->ip6_dst = sa.sin6_addr;
|
2005-09-24 01:21:58 +04:00
|
|
|
(void)memmove(&addr[0], &addr[1],
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
sizeof(struct in6_addr) *
|
|
|
|
(rh0->ip6r0_segleft - 1));
|
2003-06-06 12:13:43 +04:00
|
|
|
addr[rh0->ip6r0_segleft - 1] = finaldst;
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
/* XXX */
|
|
|
|
in6_clearscope(addr + rh0->ip6r0_segleft - 1);
|
1999-06-28 10:36:47 +04:00
|
|
|
break;
|
|
|
|
default: /* is it possible? */
|
|
|
|
error = EINVAL;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Source address validation */
|
|
|
|
if (IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_src) &&
|
2002-06-09 01:22:29 +04:00
|
|
|
(flags & IPV6_UNSPECSRC) == 0) {
|
1999-06-28 10:36:47 +04:00
|
|
|
error = EOPNOTSUPP;
|
|
|
|
ip6stat.ip6s_badscope++;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_src)) {
|
|
|
|
error = EOPNOTSUPP;
|
|
|
|
ip6stat.ip6s_badscope++;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
|
|
|
|
ip6stat.ip6s_localout++;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Route packet.
|
|
|
|
*/
|
2004-02-04 08:17:28 +03:00
|
|
|
/* initialize cached route */
|
1999-06-28 10:36:47 +04:00
|
|
|
if (ro == 0) {
|
|
|
|
ro = &ip6route;
|
|
|
|
bzero((caddr_t)ro, sizeof(*ro));
|
|
|
|
}
|
|
|
|
ro_pmtu = ro;
|
|
|
|
if (opt && opt->ip6po_rthdr)
|
|
|
|
ro = &opt->ip6po_route;
|
|
|
|
dst = (struct sockaddr_in6 *)&ro->ro_dst;
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
|
|
|
|
#ifdef notyet /* this will be available with the RFC3542 support */
|
|
|
|
/*
|
|
|
|
* if specified, try to fill in the traffic class field.
|
|
|
|
* do not override if a non-zero value is already set.
|
|
|
|
* we check the diffserv field and the ecn field separately.
|
1999-06-28 10:36:47 +04:00
|
|
|
*/
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
if (opt && opt->ip6po_tclass >= 0) {
|
|
|
|
int mask = 0;
|
|
|
|
|
|
|
|
if ((ip6->ip6_flow & htonl(0xfc << 20)) == 0)
|
|
|
|
mask |= 0xfc;
|
|
|
|
if ((ip6->ip6_flow & htonl(0x03 << 20)) == 0)
|
|
|
|
mask |= 0x03;
|
|
|
|
if (mask != 0)
|
|
|
|
ip6->ip6_flow |= htonl((opt->ip6po_tclass & mask) << 20);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/* fill in or override the hop limit field, if necessary. */
|
|
|
|
if (opt && opt->ip6po_hlim != -1)
|
|
|
|
ip6->ip6_hlim = opt->ip6po_hlim & 0xff;
|
|
|
|
else if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst)) {
|
|
|
|
if (im6o != NULL)
|
|
|
|
ip6->ip6_hlim = im6o->im6o_multicast_hlim;
|
|
|
|
else
|
|
|
|
ip6->ip6_hlim = ip6_defmcasthlim;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
#ifdef IPSEC
|
|
|
|
if (needipsec && needipsectun) {
|
|
|
|
struct ipsec_output_state state;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* All the extension headers will become inaccessible
|
|
|
|
* (since they can be encrypted).
|
|
|
|
* Don't panic, we need no more updates to extension headers
|
|
|
|
* on inner IPv6 packet (since they are now encapsulated).
|
|
|
|
*
|
|
|
|
* IPv6 [ESP|AH] IPv6 [extension headers] payload
|
|
|
|
*/
|
|
|
|
bzero(&exthdrs, sizeof(exthdrs));
|
|
|
|
exthdrs.ip6e_ip6 = m;
|
|
|
|
|
|
|
|
bzero(&state, sizeof(state));
|
|
|
|
state.m = m;
|
|
|
|
state.ro = (struct route *)ro;
|
|
|
|
state.dst = (struct sockaddr *)dst;
|
|
|
|
|
|
|
|
error = ipsec6_output_tunnel(&state, sp, flags);
|
|
|
|
|
|
|
|
m = state.m;
|
2004-07-14 07:06:08 +04:00
|
|
|
ro_pmtu = ro = (struct route_in6 *)state.ro;
|
1999-06-28 10:36:47 +04:00
|
|
|
dst = (struct sockaddr_in6 *)state.dst;
|
|
|
|
if (error) {
|
|
|
|
/* mbuf is already reclaimed in ipsec6_output_tunnel. */
|
|
|
|
m0 = m = NULL;
|
|
|
|
m = NULL;
|
|
|
|
switch (error) {
|
|
|
|
case EHOSTUNREACH:
|
|
|
|
case ENETUNREACH:
|
|
|
|
case EMSGSIZE:
|
|
|
|
case ENOBUFS:
|
|
|
|
case ENOMEM:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
printf("ip6_output (ipsec): error code %d\n", error);
|
2002-06-07 08:18:11 +04:00
|
|
|
/* FALLTHROUGH */
|
1999-06-28 10:36:47 +04:00
|
|
|
case ENOENT:
|
|
|
|
/* don't show these error codes to the user */
|
|
|
|
error = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
|
|
|
|
exthdrs.ip6e_ip6 = m;
|
|
|
|
}
|
2001-10-24 10:36:37 +04:00
|
|
|
#endif /* IPSEC */
|
1999-06-28 10:36:47 +04:00
|
|
|
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
/* adjust pointer */
|
|
|
|
ip6 = mtod(m, struct ip6_hdr *);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
bzero(&dst_sa, sizeof(dst_sa));
|
|
|
|
dst_sa.sin6_family = AF_INET6;
|
|
|
|
dst_sa.sin6_len = sizeof(dst_sa);
|
|
|
|
dst_sa.sin6_addr = ip6->ip6_dst;
|
|
|
|
if ((error = in6_selectroute(&dst_sa, opt, im6o, ro, &ifp, &rt, 0))
|
|
|
|
!= 0) {
|
|
|
|
switch (error) {
|
|
|
|
case EHOSTUNREACH:
|
1999-06-28 10:36:47 +04:00
|
|
|
ip6stat.ip6s_noroute++;
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
break;
|
|
|
|
case EADDRNOTAVAIL:
|
|
|
|
default:
|
|
|
|
break; /* XXX statistics? */
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
if (ifp != NULL)
|
|
|
|
in6_ifstat_inc(ifp, ifs6_out_discard);
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
if (rt == NULL) {
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
* If in6_selectroute() does not return a route entry,
|
|
|
|
* dst may not have been updated.
|
1999-06-28 10:36:47 +04:00
|
|
|
*/
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
*dst = dst_sa; /* XXX */
|
|
|
|
}
|
1999-06-28 10:36:47 +04:00
|
|
|
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
/*
|
|
|
|
* then rt (for unicast) and ifp must be non-NULL valid values.
|
|
|
|
*/
|
|
|
|
if ((flags & IPV6_FORWARDING) == 0) {
|
|
|
|
/* XXX: the FORWARDING flag can be set for mrouting. */
|
|
|
|
in6_ifstat_inc(ifp, ifs6_out_request);
|
|
|
|
}
|
|
|
|
if (rt != NULL) {
|
|
|
|
ia = (struct in6_ifaddr *)(rt->rt_ifa);
|
|
|
|
rt->rt_use++;
|
|
|
|
}
|
1999-06-28 10:36:47 +04:00
|
|
|
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
/*
|
|
|
|
* The outgoing interface must be in the zone of source and
|
|
|
|
* destination addresses. We should use ia_ifp to support the
|
|
|
|
* case of sending packets to an address of our own.
|
|
|
|
*/
|
|
|
|
if (ia != NULL && ia->ia_ifp)
|
|
|
|
origifp = ia->ia_ifp;
|
|
|
|
else
|
|
|
|
origifp = ifp;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
src0 = ip6->ip6_src;
|
|
|
|
if (in6_setscope(&src0, origifp, &zone))
|
|
|
|
goto badscope;
|
|
|
|
bzero(&src_sa, sizeof(src_sa));
|
|
|
|
src_sa.sin6_family = AF_INET6;
|
|
|
|
src_sa.sin6_len = sizeof(src_sa);
|
|
|
|
src_sa.sin6_addr = ip6->ip6_src;
|
|
|
|
if (sa6_recoverscope(&src_sa) || zone != src_sa.sin6_scope_id)
|
|
|
|
goto badscope;
|
|
|
|
|
|
|
|
dst0 = ip6->ip6_dst;
|
|
|
|
if (in6_setscope(&dst0, origifp, &zone))
|
|
|
|
goto badscope;
|
|
|
|
/* re-initialize to be sure */
|
|
|
|
bzero(&dst_sa, sizeof(dst_sa));
|
|
|
|
dst_sa.sin6_family = AF_INET6;
|
|
|
|
dst_sa.sin6_len = sizeof(dst_sa);
|
|
|
|
dst_sa.sin6_addr = ip6->ip6_dst;
|
|
|
|
if (sa6_recoverscope(&dst_sa) || zone != dst_sa.sin6_scope_id)
|
|
|
|
goto badscope;
|
|
|
|
|
|
|
|
/* scope check is done. */
|
|
|
|
goto routefound;
|
|
|
|
|
|
|
|
badscope:
|
|
|
|
ip6stat.ip6s_badscope++;
|
|
|
|
in6_ifstat_inc(origifp, ifs6_out_discard);
|
|
|
|
if (error == 0)
|
|
|
|
error = EHOSTUNREACH; /* XXX */
|
|
|
|
goto bad;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
routefound:
|
|
|
|
if (rt && !IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst)) {
|
|
|
|
#ifdef notyet /* this will be available with the RFC3542 support */
|
|
|
|
if (opt && opt->ip6po_nextroute.ro_rt) {
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
* The nexthop is explicitly specified by the
|
|
|
|
* application. We assume the next hop is an IPv6
|
|
|
|
* address.
|
1999-06-28 10:36:47 +04:00
|
|
|
*/
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
dst = (struct sockaddr_in6 *)opt->ip6po_nexthop;
|
|
|
|
} else
|
|
|
|
#endif
|
|
|
|
if ((rt->rt_flags & RTF_GATEWAY))
|
|
|
|
dst = (struct sockaddr_in6 *)rt->rt_gateway;
|
|
|
|
}
|
1999-06-28 10:36:47 +04:00
|
|
|
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
/*
|
|
|
|
* XXXXXX: original code follows:
|
|
|
|
*/
|
|
|
|
if (!IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst))
|
|
|
|
m->m_flags &= ~(M_BCAST | M_MCAST); /* just in case */
|
|
|
|
else {
|
|
|
|
struct in6_multi *in6m;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
m->m_flags = (m->m_flags & ~M_BCAST) | M_MCAST;
|
1999-12-13 18:17:17 +03:00
|
|
|
|
|
|
|
in6_ifstat_inc(ifp, ifs6_out_mcast);
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
|
|
|
* Confirm that the outgoing interface supports multicast.
|
|
|
|
*/
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
if (!(ifp->if_flags & IFF_MULTICAST)) {
|
1999-06-28 10:36:47 +04:00
|
|
|
ip6stat.ip6s_noroute++;
|
1999-12-13 18:17:17 +03:00
|
|
|
in6_ifstat_inc(ifp, ifs6_out_discard);
|
1999-06-28 10:36:47 +04:00
|
|
|
error = ENETUNREACH;
|
|
|
|
goto bad;
|
|
|
|
}
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
IN6_LOOKUP_MULTI(ip6->ip6_dst, ifp, in6m);
|
|
|
|
if (in6m != NULL &&
|
|
|
|
(im6o == NULL || im6o->im6o_multicast_loop)) {
|
|
|
|
/*
|
|
|
|
* If we belong to the destination multicast group
|
|
|
|
* on the outgoing interface, and the caller did not
|
|
|
|
* forbid loopback, loop back a copy.
|
|
|
|
*/
|
|
|
|
ip6_mloopback(ifp, m, dst);
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* If we are acting as a multicast router, perform
|
|
|
|
* multicast forwarding as if the packet had just
|
|
|
|
* arrived on the interface to which we are about
|
|
|
|
* to send. The multicast forwarding function
|
|
|
|
* recursively calls this function, using the
|
|
|
|
* IPV6_FORWARDING flag to prevent infinite recursion.
|
|
|
|
*
|
|
|
|
* Multicasts that are looped back by ip6_mloopback(),
|
|
|
|
* above, will be forwarded by the ip6_input() routine,
|
|
|
|
* if necessary.
|
|
|
|
*/
|
|
|
|
if (ip6_mrouter && (flags & IPV6_FORWARDING) == 0) {
|
2000-05-19 08:34:39 +04:00
|
|
|
if (ip6_mforward(ip6, ifp, m) != 0) {
|
1999-06-28 10:36:47 +04:00
|
|
|
m_freem(m);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Multicasts with a hoplimit of zero may be looped back,
|
|
|
|
* above, but must not be transmitted on a network.
|
|
|
|
* Also, multicasts addressed to the loopback interface
|
|
|
|
* are not sent -- the above call to ip6_mloopback() will
|
|
|
|
* loop back a copy if this host actually belongs to the
|
|
|
|
* destination group on the loopback interface.
|
|
|
|
*/
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
if (ip6->ip6_hlim == 0 || (ifp->if_flags & IFF_LOOPBACK) ||
|
|
|
|
IN6_IS_ADDR_MC_INTFACELOCAL(&ip6->ip6_dst)) {
|
1999-06-28 10:36:47 +04:00
|
|
|
m_freem(m);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1999-12-13 18:17:17 +03:00
|
|
|
/*
|
|
|
|
* Fill the outgoing inteface to tell the upper layer
|
|
|
|
* to increment per-interface statistics.
|
|
|
|
*/
|
|
|
|
if (ifpp)
|
|
|
|
*ifpp = ifp;
|
|
|
|
|
2002-05-29 11:53:39 +04:00
|
|
|
/* Determine path MTU. */
|
2004-02-04 08:17:28 +03:00
|
|
|
if ((error = ip6_getpmtu(ro_pmtu, ro, ifp, &finaldst, &mtu,
|
|
|
|
&alwaysfrag)) != 0)
|
2002-05-29 11:53:39 +04:00
|
|
|
goto bad;
|
2004-07-14 07:06:08 +04:00
|
|
|
#ifdef IPSEC
|
|
|
|
if (needipsectun)
|
|
|
|
mtu = IPV6_MMTU;
|
|
|
|
#endif
|
2002-05-29 11:53:39 +04:00
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
2002-05-29 11:53:39 +04:00
|
|
|
* The caller of this function may specify to use the minimum MTU
|
|
|
|
* in some cases.
|
1999-06-28 10:36:47 +04:00
|
|
|
*/
|
2002-05-29 11:53:39 +04:00
|
|
|
if (mtu > IPV6_MMTU) {
|
|
|
|
if ((flags & IPV6_MINMTU))
|
|
|
|
mtu = IPV6_MMTU;
|
2001-12-20 10:26:36 +03:00
|
|
|
}
|
|
|
|
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
/*
|
|
|
|
* clear embedded scope identifiers if necessary.
|
|
|
|
* in6_clearscope will touch the addresses only when necessary.
|
|
|
|
*/
|
|
|
|
in6_clearscope(&ip6->ip6_src);
|
|
|
|
in6_clearscope(&ip6->ip6_dst);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If the outgoing packet contains a hop-by-hop options header,
|
|
|
|
* it must be examined and processed even by the source node.
|
|
|
|
* (RFC 2460, section 4.)
|
|
|
|
*/
|
|
|
|
if (exthdrs.ip6e_hbh) {
|
2001-02-10 07:14:26 +03:00
|
|
|
struct ip6_hbh *hbh = mtod(exthdrs.ip6e_hbh, struct ip6_hbh *);
|
1999-07-22 07:59:42 +04:00
|
|
|
u_int32_t dummy1; /* XXX unused */
|
1999-06-28 10:36:47 +04:00
|
|
|
u_int32_t dummy2; /* XXX unused */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX: if we have to send an ICMPv6 error to the sender,
|
|
|
|
* we need the M_LOOP flag since icmp6_error() expects
|
|
|
|
* the IPv6 and the hop-by-hop options header are
|
|
|
|
* continuous unless the flag is set.
|
|
|
|
*/
|
|
|
|
m->m_flags |= M_LOOP;
|
|
|
|
m->m_pkthdr.rcvif = ifp;
|
2002-06-07 18:29:10 +04:00
|
|
|
if (ip6_process_hopopts(m, (u_int8_t *)(hbh + 1),
|
|
|
|
((hbh->ip6h_len + 1) << 3) - sizeof(struct ip6_hbh),
|
|
|
|
&dummy1, &dummy2) < 0) {
|
1999-06-28 10:36:47 +04:00
|
|
|
/* m was already freed at this point */
|
|
|
|
error = EINVAL;/* better error? */
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
m->m_flags &= ~M_LOOP; /* XXX */
|
|
|
|
m->m_pkthdr.rcvif = NULL;
|
|
|
|
}
|
|
|
|
|
2000-02-17 13:59:32 +03:00
|
|
|
#ifdef PFIL_HOOKS
|
|
|
|
/*
|
|
|
|
* Run through list of hooks for output packets.
|
|
|
|
*/
|
2002-06-07 18:29:10 +04:00
|
|
|
if ((error = pfil_run_hooks(&inet6_pfil_hook, &m, ifp, PFIL_OUT)) != 0)
|
Restructure the PFIL_HOOKS mechanism a bit:
- All packets are passed to PFIL_HOOKS as they come off the wire, i.e.
fields in protocol headers in network order, etc.
- Allow for multiple hooks to be registered, using a "key" and a "dlt".
The "dlt" is a BPF data link type, indicating what type of header is
present.
- INET and INET6 register with key == AF_INET or AF_INET6, and
dlt == DLT_RAW.
- PFIL_HOOKS now take an argument for the filter hook, and mbuf **,
an ifnet *, and a direction (PFIL_IN or PFIL_OUT), thus making them
less IP (really, IP Filter) centric.
Maintain compatibility with IP Filter by adding wrapper functions for
IP Filter.
2000-11-11 03:52:36 +03:00
|
|
|
goto done;
|
|
|
|
if (m == NULL)
|
|
|
|
goto done;
|
|
|
|
ip6 = mtod(m, struct ip6_hdr *);
|
2000-02-17 13:59:32 +03:00
|
|
|
#endif /* PFIL_HOOKS */
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
|
|
|
* Send the packet to the outgoing interface.
|
2000-05-19 05:40:18 +04:00
|
|
|
* If necessary, do IPv6 fragmentation before sending.
|
2004-02-04 08:17:28 +03:00
|
|
|
*
|
|
|
|
* the logic here is rather complex:
|
|
|
|
* 1: normal case (dontfrag == 0, alwaysfrag == 0)
|
|
|
|
* 1-a: send as is if tlen <= path mtu
|
|
|
|
* 1-b: fragment if tlen > path mtu
|
|
|
|
*
|
|
|
|
* 2: if user asks us not to fragment (dontfrag == 1)
|
|
|
|
* 2-a: send as is if tlen <= interface mtu
|
|
|
|
* 2-b: error if tlen > interface mtu
|
|
|
|
*
|
|
|
|
* 3: if we always need to attach fragment header (alwaysfrag == 1)
|
|
|
|
* always fragment
|
|
|
|
*
|
|
|
|
* 4: if dontfrag == 1 && alwaysfrag == 1
|
|
|
|
* error, as we cannot handle this conflicting request
|
1999-06-28 10:36:47 +04:00
|
|
|
*/
|
|
|
|
tlen = m->m_pkthdr.len;
|
2004-02-04 08:17:28 +03:00
|
|
|
|
|
|
|
dontfrag = 0;
|
|
|
|
if (dontfrag && alwaysfrag) { /* case 4 */
|
|
|
|
/* conflicting request - can't transmit */
|
|
|
|
error = EMSGSIZE;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
if (dontfrag && tlen > IN6_LINKMTU(ifp)) { /* case 2-b */
|
|
|
|
/*
|
|
|
|
* Even if the DONTFRAG option is specified, we cannot send the
|
|
|
|
* packet when the data length is larger than the MTU of the
|
|
|
|
* outgoing interface.
|
|
|
|
* Notify the error by sending IPV6_PATHMTU ancillary data as
|
|
|
|
* well as returning an error code (the latter is not described
|
|
|
|
* in the API spec.)
|
|
|
|
*/
|
|
|
|
u_int32_t mtu32;
|
|
|
|
struct ip6ctlparam ip6cp;
|
|
|
|
|
|
|
|
mtu32 = (u_int32_t)mtu;
|
|
|
|
bzero(&ip6cp, sizeof(ip6cp));
|
|
|
|
ip6cp.ip6c_cmdarg = (void *)&mtu32;
|
|
|
|
pfctlinput2(PRC_MSGSIZE, (struct sockaddr *)&ro_pmtu->ro_dst,
|
|
|
|
(void *)&ip6cp);
|
|
|
|
|
|
|
|
error = EMSGSIZE;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* transmit packet without fragmentation
|
|
|
|
*/
|
|
|
|
if (dontfrag || (!alwaysfrag && tlen <= mtu)) { /* case 1-a and 2-a */
|
2000-10-23 07:45:25 +04:00
|
|
|
struct in6_ifaddr *ia6;
|
2005-08-10 16:58:37 +04:00
|
|
|
int sw_csum;
|
2004-02-04 08:17:28 +03:00
|
|
|
|
2000-10-23 07:45:25 +04:00
|
|
|
ip6 = mtod(m, struct ip6_hdr *);
|
|
|
|
ia6 = in6_ifawithifp(ifp, &ip6->ip6_src);
|
|
|
|
if (ia6) {
|
2001-12-18 06:04:02 +03:00
|
|
|
/* Record statistics for this interface address. */
|
2004-02-04 08:17:28 +03:00
|
|
|
ia6->ia_ifa.ifa_data.ifad_outbytes += m->m_pkthdr.len;
|
1999-12-13 18:17:17 +03:00
|
|
|
}
|
2001-01-24 12:04:15 +03:00
|
|
|
#ifdef IPSEC
|
|
|
|
/* clean ipsec history once it goes out of the node */
|
|
|
|
ipsec_delaux(m);
|
|
|
|
#endif
|
2005-08-10 16:58:37 +04:00
|
|
|
|
|
|
|
sw_csum = m->m_pkthdr.csum_flags & ~ifp->if_csum_flags_tx;
|
|
|
|
if ((sw_csum & (M_CSUM_UDPv6|M_CSUM_TCPv6)) != 0) {
|
2005-08-10 17:08:11 +04:00
|
|
|
if (IN6_NEED_CHECKSUM(ifp,
|
|
|
|
sw_csum & (M_CSUM_UDPv6|M_CSUM_TCPv6))) {
|
|
|
|
in6_delayed_cksum(m);
|
|
|
|
}
|
2005-08-10 16:58:37 +04:00
|
|
|
m->m_pkthdr.csum_flags &= ~(M_CSUM_UDPv6|M_CSUM_TCPv6);
|
|
|
|
}
|
|
|
|
|
2000-05-19 05:40:18 +04:00
|
|
|
error = nd6_output(ifp, origifp, m, dst, ro->ro_rt);
|
1999-06-28 10:36:47 +04:00
|
|
|
goto done;
|
2004-02-04 08:17:28 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* try to fragment the packet. case 1-b and 3
|
|
|
|
*/
|
|
|
|
if (mtu < IPV6_MMTU) {
|
|
|
|
/* path MTU cannot be less than IPV6_MMTU */
|
1999-06-28 10:36:47 +04:00
|
|
|
error = EMSGSIZE;
|
1999-12-13 18:17:17 +03:00
|
|
|
in6_ifstat_inc(ifp, ifs6_out_fragfail);
|
1999-06-28 10:36:47 +04:00
|
|
|
goto bad;
|
2004-02-04 08:17:28 +03:00
|
|
|
} else if (ip6->ip6_plen == 0) {
|
|
|
|
/* jumbo payload cannot be fragmented */
|
1999-06-28 10:36:47 +04:00
|
|
|
error = EMSGSIZE;
|
1999-12-13 18:17:17 +03:00
|
|
|
in6_ifstat_inc(ifp, ifs6_out_fragfail);
|
1999-06-28 10:36:47 +04:00
|
|
|
goto bad;
|
|
|
|
} else {
|
|
|
|
struct mbuf **mnext, *m_frgpart;
|
|
|
|
struct ip6_frag *ip6f;
|
2003-09-06 07:36:30 +04:00
|
|
|
u_int32_t id = htonl(ip6_randomid());
|
1999-06-28 10:36:47 +04:00
|
|
|
u_char nextproto;
|
2004-02-04 08:17:28 +03:00
|
|
|
struct ip6ctlparam ip6cp;
|
|
|
|
u_int32_t mtu32;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Too large for the destination or interface;
|
|
|
|
* fragment if possible.
|
|
|
|
* Must be able to put at least 8 bytes per fragment.
|
|
|
|
*/
|
|
|
|
hlen = unfragpartlen;
|
|
|
|
if (mtu > IPV6_MAXPACKET)
|
|
|
|
mtu = IPV6_MAXPACKET;
|
2004-02-04 08:17:28 +03:00
|
|
|
|
|
|
|
/* Notify a proper path MTU to applications. */
|
|
|
|
mtu32 = (u_int32_t)mtu;
|
|
|
|
bzero(&ip6cp, sizeof(ip6cp));
|
|
|
|
ip6cp.ip6c_cmdarg = (void *)&mtu32;
|
|
|
|
pfctlinput2(PRC_MSGSIZE, (struct sockaddr *)&ro_pmtu->ro_dst,
|
|
|
|
(void *)&ip6cp);
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
len = (mtu - hlen - sizeof(struct ip6_frag)) & ~7;
|
|
|
|
if (len < 8) {
|
|
|
|
error = EMSGSIZE;
|
1999-12-13 18:17:17 +03:00
|
|
|
in6_ifstat_inc(ifp, ifs6_out_fragfail);
|
1999-06-28 10:36:47 +04:00
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
|
|
|
|
mnext = &m->m_nextpkt;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Change the next header field of the last header in the
|
|
|
|
* unfragmentable part.
|
|
|
|
*/
|
|
|
|
if (exthdrs.ip6e_rthdr) {
|
|
|
|
nextproto = *mtod(exthdrs.ip6e_rthdr, u_char *);
|
|
|
|
*mtod(exthdrs.ip6e_rthdr, u_char *) = IPPROTO_FRAGMENT;
|
2000-05-19 05:40:18 +04:00
|
|
|
} else if (exthdrs.ip6e_dest1) {
|
1999-06-28 10:36:47 +04:00
|
|
|
nextproto = *mtod(exthdrs.ip6e_dest1, u_char *);
|
|
|
|
*mtod(exthdrs.ip6e_dest1, u_char *) = IPPROTO_FRAGMENT;
|
2000-05-19 05:40:18 +04:00
|
|
|
} else if (exthdrs.ip6e_hbh) {
|
1999-06-28 10:36:47 +04:00
|
|
|
nextproto = *mtod(exthdrs.ip6e_hbh, u_char *);
|
|
|
|
*mtod(exthdrs.ip6e_hbh, u_char *) = IPPROTO_FRAGMENT;
|
2000-05-19 05:40:18 +04:00
|
|
|
} else {
|
1999-06-28 10:36:47 +04:00
|
|
|
nextproto = ip6->ip6_nxt;
|
|
|
|
ip6->ip6_nxt = IPPROTO_FRAGMENT;
|
|
|
|
}
|
|
|
|
|
2005-08-10 16:58:37 +04:00
|
|
|
if ((m->m_pkthdr.csum_flags & (M_CSUM_UDPv6|M_CSUM_TCPv6))
|
|
|
|
!= 0) {
|
2005-08-10 17:08:11 +04:00
|
|
|
if (IN6_NEED_CHECKSUM(ifp,
|
|
|
|
m->m_pkthdr.csum_flags &
|
|
|
|
(M_CSUM_UDPv6|M_CSUM_TCPv6))) {
|
|
|
|
in6_delayed_cksum(m);
|
|
|
|
}
|
2005-08-10 16:58:37 +04:00
|
|
|
m->m_pkthdr.csum_flags &= ~(M_CSUM_UDPv6|M_CSUM_TCPv6);
|
|
|
|
}
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
|
|
|
* Loop through length of segment after first fragment,
|
2001-12-18 06:04:02 +03:00
|
|
|
* make new header and copy data of each part and link onto
|
|
|
|
* chain.
|
1999-06-28 10:36:47 +04:00
|
|
|
*/
|
|
|
|
m0 = m;
|
|
|
|
for (off = hlen; off < tlen; off += len) {
|
2003-09-04 07:07:33 +04:00
|
|
|
struct mbuf *mlast;
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
MGETHDR(m, M_DONTWAIT, MT_HEADER);
|
|
|
|
if (!m) {
|
|
|
|
error = ENOBUFS;
|
|
|
|
ip6stat.ip6s_odropped++;
|
|
|
|
goto sendorfree;
|
|
|
|
}
|
2004-02-04 08:17:28 +03:00
|
|
|
m->m_pkthdr.rcvif = NULL;
|
1999-06-28 10:36:47 +04:00
|
|
|
m->m_flags = m0->m_flags & M_COPYFLAGS;
|
|
|
|
*mnext = m;
|
|
|
|
mnext = &m->m_nextpkt;
|
|
|
|
m->m_data += max_linkhdr;
|
|
|
|
mhip6 = mtod(m, struct ip6_hdr *);
|
|
|
|
*mhip6 = *ip6;
|
|
|
|
m->m_len = sizeof(*mhip6);
|
2001-12-18 06:04:02 +03:00
|
|
|
error = ip6_insertfraghdr(m0, m, hlen, &ip6f);
|
|
|
|
if (error) {
|
1999-06-28 10:36:47 +04:00
|
|
|
ip6stat.ip6s_odropped++;
|
|
|
|
goto sendorfree;
|
|
|
|
}
|
2003-09-06 03:20:48 +04:00
|
|
|
ip6f->ip6f_offlg = htons((u_int16_t)((off - hlen) & ~7));
|
1999-06-28 10:36:47 +04:00
|
|
|
if (off + len >= tlen)
|
|
|
|
len = tlen - off;
|
|
|
|
else
|
|
|
|
ip6f->ip6f_offlg |= IP6F_MORE_FRAG;
|
2003-09-06 03:20:48 +04:00
|
|
|
mhip6->ip6_plen = htons((u_int16_t)(len + hlen +
|
2002-06-07 18:29:10 +04:00
|
|
|
sizeof(*ip6f) - sizeof(struct ip6_hdr)));
|
1999-06-28 10:36:47 +04:00
|
|
|
if ((m_frgpart = m_copy(m0, off, len)) == 0) {
|
|
|
|
error = ENOBUFS;
|
|
|
|
ip6stat.ip6s_odropped++;
|
|
|
|
goto sendorfree;
|
|
|
|
}
|
2003-09-04 07:07:33 +04:00
|
|
|
for (mlast = m; mlast->m_next; mlast = mlast->m_next)
|
|
|
|
;
|
|
|
|
mlast->m_next = m_frgpart;
|
1999-06-28 10:36:47 +04:00
|
|
|
m->m_pkthdr.len = len + hlen + sizeof(*ip6f);
|
|
|
|
m->m_pkthdr.rcvif = (struct ifnet *)0;
|
|
|
|
ip6f->ip6f_reserved = 0;
|
|
|
|
ip6f->ip6f_ident = id;
|
|
|
|
ip6f->ip6f_nxt = nextproto;
|
|
|
|
ip6stat.ip6s_ofragments++;
|
1999-12-13 18:17:17 +03:00
|
|
|
in6_ifstat_inc(ifp, ifs6_out_fragcreat);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
1999-12-13 18:17:17 +03:00
|
|
|
|
|
|
|
in6_ifstat_inc(ifp, ifs6_out_fragok);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Remove leading garbages.
|
|
|
|
*/
|
|
|
|
sendorfree:
|
|
|
|
m = m0->m_nextpkt;
|
|
|
|
m0->m_nextpkt = 0;
|
|
|
|
m_freem(m0);
|
|
|
|
for (m0 = m; m; m = m0) {
|
|
|
|
m0 = m->m_nextpkt;
|
|
|
|
m->m_nextpkt = 0;
|
|
|
|
if (error == 0) {
|
2000-10-23 07:45:25 +04:00
|
|
|
struct in6_ifaddr *ia6;
|
|
|
|
ip6 = mtod(m, struct ip6_hdr *);
|
|
|
|
ia6 = in6_ifawithifp(ifp, &ip6->ip6_src);
|
|
|
|
if (ia6) {
|
2001-12-18 06:04:02 +03:00
|
|
|
/*
|
|
|
|
* Record statistics for this interface
|
|
|
|
* address.
|
|
|
|
*/
|
2000-10-23 07:45:25 +04:00
|
|
|
ia6->ia_ifa.ifa_data.ifad_outbytes +=
|
2004-02-04 08:17:28 +03:00
|
|
|
m->m_pkthdr.len;
|
1999-12-13 18:17:17 +03:00
|
|
|
}
|
2001-01-24 12:04:15 +03:00
|
|
|
#ifdef IPSEC
|
|
|
|
/* clean ipsec history once it goes out of the node */
|
|
|
|
ipsec_delaux(m);
|
|
|
|
#endif
|
2000-05-19 05:40:18 +04:00
|
|
|
error = nd6_output(ifp, origifp, m, dst, ro->ro_rt);
|
|
|
|
} else
|
1999-06-28 10:36:47 +04:00
|
|
|
m_freem(m);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (error == 0)
|
|
|
|
ip6stat.ip6s_fragmented++;
|
|
|
|
|
|
|
|
done:
|
|
|
|
if (ro == &ip6route && ro->ro_rt) { /* brace necessary for RTFREE */
|
|
|
|
RTFREE(ro->ro_rt);
|
|
|
|
} else if (ro_pmtu == &ip6route && ro_pmtu->ro_rt) {
|
|
|
|
RTFREE(ro_pmtu->ro_rt);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef IPSEC
|
|
|
|
if (sp != NULL)
|
|
|
|
key_freesp(sp);
|
|
|
|
#endif /* IPSEC */
|
|
|
|
|
2002-09-11 06:46:42 +04:00
|
|
|
return (error);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
freehdrs:
|
|
|
|
m_freem(exthdrs.ip6e_hbh); /* m_freem will check if mbuf is 0 */
|
|
|
|
m_freem(exthdrs.ip6e_dest1);
|
|
|
|
m_freem(exthdrs.ip6e_rthdr);
|
|
|
|
m_freem(exthdrs.ip6e_dest2);
|
2002-06-07 08:18:11 +04:00
|
|
|
/* FALLTHROUGH */
|
1999-06-28 10:36:47 +04:00
|
|
|
bad:
|
|
|
|
m_freem(m);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
ip6_copyexthdr(mp, hdr, hlen)
|
|
|
|
struct mbuf **mp;
|
|
|
|
caddr_t hdr;
|
|
|
|
int hlen;
|
|
|
|
{
|
|
|
|
struct mbuf *m;
|
|
|
|
|
|
|
|
if (hlen > MCLBYTES)
|
2002-09-11 06:46:42 +04:00
|
|
|
return (ENOBUFS); /* XXX */
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
MGET(m, M_DONTWAIT, MT_DATA);
|
|
|
|
if (!m)
|
2002-09-11 06:46:42 +04:00
|
|
|
return (ENOBUFS);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
if (hlen > MLEN) {
|
|
|
|
MCLGET(m, M_DONTWAIT);
|
|
|
|
if ((m->m_flags & M_EXT) == 0) {
|
|
|
|
m_free(m);
|
2002-09-11 06:46:42 +04:00
|
|
|
return (ENOBUFS);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
m->m_len = hlen;
|
|
|
|
if (hdr)
|
|
|
|
bcopy(hdr, mtod(m, caddr_t), hlen);
|
|
|
|
|
|
|
|
*mp = m;
|
2002-09-11 06:46:42 +04:00
|
|
|
return (0);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
2005-08-10 16:58:37 +04:00
|
|
|
/*
|
|
|
|
* Process a delayed payload checksum calculation.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
in6_delayed_cksum(struct mbuf *m)
|
|
|
|
{
|
|
|
|
uint16_t csum, offset;
|
|
|
|
|
|
|
|
KASSERT((m->m_pkthdr.csum_flags & (M_CSUM_UDPv6|M_CSUM_TCPv6)) != 0);
|
|
|
|
KASSERT((~m->m_pkthdr.csum_flags & (M_CSUM_UDPv6|M_CSUM_TCPv6)) != 0);
|
|
|
|
KASSERT((m->m_pkthdr.csum_flags
|
|
|
|
& (M_CSUM_UDPv4|M_CSUM_TCPv4|M_CSUM_TSOv4)) == 0);
|
|
|
|
|
|
|
|
offset = M_CSUM_DATA_IPv6_HL(m->m_pkthdr.csum_data);
|
|
|
|
csum = in6_cksum(m, 0, offset, m->m_pkthdr.len - offset);
|
|
|
|
if (csum == 0 && (m->m_pkthdr.csum_flags & M_CSUM_UDPv6) != 0) {
|
|
|
|
csum = 0xffff;
|
|
|
|
}
|
|
|
|
|
|
|
|
offset += M_CSUM_DATA_IPv6_OFFSET(m->m_pkthdr.csum_data);
|
|
|
|
if ((offset + sizeof(csum)) > m->m_len) {
|
|
|
|
m_copyback(m, offset, sizeof(csum), &csum);
|
|
|
|
} else {
|
|
|
|
*(uint16_t *)(mtod(m, caddr_t) + offset) = csum;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
2000-05-19 05:40:18 +04:00
|
|
|
* Insert jumbo payload option.
|
1999-06-28 10:36:47 +04:00
|
|
|
*/
|
|
|
|
static int
|
|
|
|
ip6_insert_jumboopt(exthdrs, plen)
|
|
|
|
struct ip6_exthdrs *exthdrs;
|
|
|
|
u_int32_t plen;
|
|
|
|
{
|
|
|
|
struct mbuf *mopt;
|
2002-09-11 06:41:19 +04:00
|
|
|
u_int8_t *optbuf;
|
2000-08-19 12:15:53 +04:00
|
|
|
u_int32_t v;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
#define JUMBOOPTLEN 8 /* length of jumbo payload option and padding */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If there is no hop-by-hop options header, allocate new one.
|
|
|
|
* If there is one but it doesn't have enough space to store the
|
|
|
|
* jumbo payload option, allocate a cluster to store the whole options.
|
|
|
|
* Otherwise, use it to store the options.
|
|
|
|
*/
|
|
|
|
if (exthdrs->ip6e_hbh == 0) {
|
|
|
|
MGET(mopt, M_DONTWAIT, MT_DATA);
|
|
|
|
if (mopt == 0)
|
2002-09-11 06:46:42 +04:00
|
|
|
return (ENOBUFS);
|
1999-06-28 10:36:47 +04:00
|
|
|
mopt->m_len = JUMBOOPTLEN;
|
2002-09-11 06:41:19 +04:00
|
|
|
optbuf = mtod(mopt, u_int8_t *);
|
1999-06-28 10:36:47 +04:00
|
|
|
optbuf[1] = 0; /* = ((JUMBOOPTLEN) >> 3) - 1 */
|
|
|
|
exthdrs->ip6e_hbh = mopt;
|
2000-05-19 05:40:18 +04:00
|
|
|
} else {
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ip6_hbh *hbh;
|
|
|
|
|
|
|
|
mopt = exthdrs->ip6e_hbh;
|
|
|
|
if (M_TRAILINGSPACE(mopt) < JUMBOOPTLEN) {
|
2000-08-19 12:15:53 +04:00
|
|
|
/*
|
|
|
|
* XXX assumption:
|
|
|
|
* - exthdrs->ip6e_hbh is not referenced from places
|
|
|
|
* other than exthdrs.
|
|
|
|
* - exthdrs->ip6e_hbh is not an mbuf chain.
|
|
|
|
*/
|
1999-06-28 10:36:47 +04:00
|
|
|
int oldoptlen = mopt->m_len;
|
2000-08-19 12:15:53 +04:00
|
|
|
struct mbuf *n;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-08-19 12:15:53 +04:00
|
|
|
/*
|
|
|
|
* XXX: give up if the whole (new) hbh header does
|
|
|
|
* not fit even in an mbuf cluster.
|
|
|
|
*/
|
|
|
|
if (oldoptlen + JUMBOOPTLEN > MCLBYTES)
|
2002-09-11 06:46:42 +04:00
|
|
|
return (ENOBUFS);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-08-19 12:15:53 +04:00
|
|
|
/*
|
|
|
|
* As a consequence, we must always prepare a cluster
|
|
|
|
* at this point.
|
|
|
|
*/
|
|
|
|
MGET(n, M_DONTWAIT, MT_DATA);
|
|
|
|
if (n) {
|
|
|
|
MCLGET(n, M_DONTWAIT);
|
|
|
|
if ((n->m_flags & M_EXT) == 0) {
|
|
|
|
m_freem(n);
|
|
|
|
n = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!n)
|
2002-09-11 06:46:42 +04:00
|
|
|
return (ENOBUFS);
|
2000-08-19 12:15:53 +04:00
|
|
|
n->m_len = oldoptlen + JUMBOOPTLEN;
|
|
|
|
bcopy(mtod(mopt, caddr_t), mtod(n, caddr_t),
|
2004-02-04 08:17:28 +03:00
|
|
|
oldoptlen);
|
2002-09-11 06:41:19 +04:00
|
|
|
optbuf = mtod(n, u_int8_t *) + oldoptlen;
|
2000-08-19 12:15:53 +04:00
|
|
|
m_freem(mopt);
|
2001-03-25 13:58:43 +04:00
|
|
|
mopt = exthdrs->ip6e_hbh = n;
|
2000-05-19 05:40:18 +04:00
|
|
|
} else {
|
2002-09-11 06:41:19 +04:00
|
|
|
optbuf = mtod(mopt, u_int8_t *) + mopt->m_len;
|
1999-06-28 10:36:47 +04:00
|
|
|
mopt->m_len += JUMBOOPTLEN;
|
|
|
|
}
|
|
|
|
optbuf[0] = IP6OPT_PADN;
|
2002-09-23 17:28:55 +04:00
|
|
|
optbuf[1] = 0;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Adjust the header length according to the pad and
|
|
|
|
* the jumbo payload option.
|
|
|
|
*/
|
|
|
|
hbh = mtod(mopt, struct ip6_hbh *);
|
|
|
|
hbh->ip6h_len += (JUMBOOPTLEN >> 3);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fill in the option. */
|
|
|
|
optbuf[2] = IP6OPT_JUMBO;
|
|
|
|
optbuf[3] = 4;
|
2000-08-19 12:15:53 +04:00
|
|
|
v = (u_int32_t)htonl(plen + JUMBOOPTLEN);
|
|
|
|
bcopy(&v, &optbuf[4], sizeof(u_int32_t));
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
/* finally, adjust the packet header length */
|
|
|
|
exthdrs->ip6e_ip6->m_pkthdr.len += JUMBOOPTLEN;
|
|
|
|
|
2002-09-11 06:46:42 +04:00
|
|
|
return (0);
|
1999-06-28 10:36:47 +04:00
|
|
|
#undef JUMBOOPTLEN
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Insert fragment header and copy unfragmentable header portions.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
ip6_insertfraghdr(m0, m, hlen, frghdrp)
|
|
|
|
struct mbuf *m0, *m;
|
|
|
|
int hlen;
|
|
|
|
struct ip6_frag **frghdrp;
|
|
|
|
{
|
|
|
|
struct mbuf *n, *mlast;
|
|
|
|
|
|
|
|
if (hlen > sizeof(struct ip6_hdr)) {
|
|
|
|
n = m_copym(m0, sizeof(struct ip6_hdr),
|
2002-06-07 18:29:10 +04:00
|
|
|
hlen - sizeof(struct ip6_hdr), M_DONTWAIT);
|
1999-06-28 10:36:47 +04:00
|
|
|
if (n == 0)
|
2002-09-11 06:46:42 +04:00
|
|
|
return (ENOBUFS);
|
1999-06-28 10:36:47 +04:00
|
|
|
m->m_next = n;
|
2000-05-19 05:40:18 +04:00
|
|
|
} else
|
1999-06-28 10:36:47 +04:00
|
|
|
n = m;
|
|
|
|
|
|
|
|
/* Search for the last mbuf of unfragmentable part. */
|
|
|
|
for (mlast = n; mlast->m_next; mlast = mlast->m_next)
|
|
|
|
;
|
|
|
|
|
|
|
|
if ((mlast->m_flags & M_EXT) == 0 &&
|
2000-06-03 18:36:32 +04:00
|
|
|
M_TRAILINGSPACE(mlast) >= sizeof(struct ip6_frag)) {
|
1999-06-28 10:36:47 +04:00
|
|
|
/* use the trailing space of the last mbuf for the fragment hdr */
|
2002-06-07 18:29:10 +04:00
|
|
|
*frghdrp = (struct ip6_frag *)(mtod(mlast, caddr_t) +
|
|
|
|
mlast->m_len);
|
1999-06-28 10:36:47 +04:00
|
|
|
mlast->m_len += sizeof(struct ip6_frag);
|
|
|
|
m->m_pkthdr.len += sizeof(struct ip6_frag);
|
2000-05-19 05:40:18 +04:00
|
|
|
} else {
|
1999-06-28 10:36:47 +04:00
|
|
|
/* allocate a new mbuf for the fragment header */
|
|
|
|
struct mbuf *mfrg;
|
|
|
|
|
|
|
|
MGET(mfrg, M_DONTWAIT, MT_DATA);
|
|
|
|
if (mfrg == 0)
|
2002-09-11 06:46:42 +04:00
|
|
|
return (ENOBUFS);
|
1999-06-28 10:36:47 +04:00
|
|
|
mfrg->m_len = sizeof(struct ip6_frag);
|
|
|
|
*frghdrp = mtod(mfrg, struct ip6_frag *);
|
|
|
|
mlast->m_next = mfrg;
|
|
|
|
}
|
|
|
|
|
2002-09-11 06:46:42 +04:00
|
|
|
return (0);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
2005-02-28 12:27:07 +03:00
|
|
|
static int
|
2004-02-04 08:17:28 +03:00
|
|
|
ip6_getpmtu(ro_pmtu, ro, ifp, dst, mtup, alwaysfragp)
|
2002-05-29 11:53:39 +04:00
|
|
|
struct route_in6 *ro_pmtu, *ro;
|
|
|
|
struct ifnet *ifp;
|
|
|
|
struct in6_addr *dst;
|
|
|
|
u_long *mtup;
|
2004-02-04 08:17:28 +03:00
|
|
|
int *alwaysfragp;
|
2002-05-29 11:53:39 +04:00
|
|
|
{
|
|
|
|
u_int32_t mtu = 0;
|
2004-02-04 08:17:28 +03:00
|
|
|
int alwaysfrag = 0;
|
2002-05-29 11:53:39 +04:00
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
if (ro_pmtu != ro) {
|
|
|
|
/* The first hop and the final destination may differ. */
|
|
|
|
struct sockaddr_in6 *sa6_dst =
|
|
|
|
(struct sockaddr_in6 *)&ro_pmtu->ro_dst;
|
|
|
|
if (ro_pmtu->ro_rt &&
|
|
|
|
((ro_pmtu->ro_rt->rt_flags & RTF_UP) == 0 ||
|
2004-02-04 08:17:28 +03:00
|
|
|
!IN6_ARE_ADDR_EQUAL(&sa6_dst->sin6_addr, dst))) {
|
2002-05-29 11:53:39 +04:00
|
|
|
RTFREE(ro_pmtu->ro_rt);
|
2004-02-04 08:17:28 +03:00
|
|
|
ro_pmtu->ro_rt = (struct rtentry *)NULL;
|
2002-05-29 11:53:39 +04:00
|
|
|
}
|
2004-02-04 08:17:28 +03:00
|
|
|
if (ro_pmtu->ro_rt == NULL) {
|
|
|
|
bzero(sa6_dst, sizeof(*sa6_dst)); /* for safety */
|
2002-05-29 11:53:39 +04:00
|
|
|
sa6_dst->sin6_family = AF_INET6;
|
|
|
|
sa6_dst->sin6_len = sizeof(struct sockaddr_in6);
|
|
|
|
sa6_dst->sin6_addr = *dst;
|
|
|
|
|
|
|
|
rtalloc((struct route *)ro_pmtu);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (ro_pmtu->ro_rt) {
|
|
|
|
u_int32_t ifmtu;
|
|
|
|
|
|
|
|
if (ifp == NULL)
|
|
|
|
ifp = ro_pmtu->ro_rt->rt_ifp;
|
|
|
|
ifmtu = IN6_LINKMTU(ifp);
|
|
|
|
mtu = ro_pmtu->ro_rt->rt_rmx.rmx_mtu;
|
2002-05-31 07:18:54 +04:00
|
|
|
if (mtu == 0)
|
|
|
|
mtu = ifmtu;
|
2004-02-04 08:17:28 +03:00
|
|
|
else if (mtu < IPV6_MMTU) {
|
|
|
|
/*
|
|
|
|
* RFC2460 section 5, last paragraph:
|
|
|
|
* if we record ICMPv6 too big message with
|
|
|
|
* mtu < IPV6_MMTU, transmit packets sized IPV6_MMTU
|
|
|
|
* or smaller, with fragment header attached.
|
|
|
|
* (fragment header is needed regardless from the
|
|
|
|
* packet size, for translators to identify packets)
|
|
|
|
*/
|
|
|
|
alwaysfrag = 1;
|
|
|
|
mtu = IPV6_MMTU;
|
|
|
|
} else if (mtu > ifmtu) {
|
2002-05-29 11:53:39 +04:00
|
|
|
/*
|
|
|
|
* The MTU on the route is larger than the MTU on
|
|
|
|
* the interface! This shouldn't happen, unless the
|
|
|
|
* MTU of the interface has been changed after the
|
|
|
|
* interface was brought up. Change the MTU in the
|
|
|
|
* route to match the interface MTU (as long as the
|
|
|
|
* field isn't locked).
|
|
|
|
*/
|
|
|
|
mtu = ifmtu;
|
2002-05-31 07:18:54 +04:00
|
|
|
if (!(ro_pmtu->ro_rt->rt_rmx.rmx_locks & RTV_MTU))
|
2002-05-29 11:53:39 +04:00
|
|
|
ro_pmtu->ro_rt->rt_rmx.rmx_mtu = mtu;
|
|
|
|
}
|
|
|
|
} else if (ifp) {
|
|
|
|
mtu = IN6_LINKMTU(ifp);
|
|
|
|
} else
|
|
|
|
error = EHOSTUNREACH; /* XXX */
|
|
|
|
|
|
|
|
*mtup = mtu;
|
2004-02-04 08:17:28 +03:00
|
|
|
if (alwaysfragp)
|
|
|
|
*alwaysfragp = alwaysfrag;
|
2002-09-11 06:46:42 +04:00
|
|
|
return (error);
|
2002-05-29 11:53:39 +04:00
|
|
|
}
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
|
|
|
* IP6 socket option processing.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
ip6_ctloutput(op, so, level, optname, mp)
|
|
|
|
int op;
|
|
|
|
struct socket *so;
|
|
|
|
int level, optname;
|
|
|
|
struct mbuf **mp;
|
|
|
|
{
|
2001-02-10 07:14:26 +03:00
|
|
|
struct in6pcb *in6p = sotoin6pcb(so);
|
|
|
|
struct mbuf *m = *mp;
|
|
|
|
int optval = 0;
|
1999-06-28 10:36:47 +04:00
|
|
|
int error = 0;
|
|
|
|
struct proc *p = curproc; /* XXX */
|
|
|
|
|
2000-05-19 05:40:18 +04:00
|
|
|
if (level == IPPROTO_IPV6) {
|
1999-06-28 10:36:47 +04:00
|
|
|
switch (op) {
|
|
|
|
case PRCO_SETOPT:
|
|
|
|
switch (optname) {
|
|
|
|
case IPV6_PKTOPTIONS:
|
2000-06-03 18:36:32 +04:00
|
|
|
/* m is freed in ip6_pcbopts */
|
2002-09-11 06:46:42 +04:00
|
|
|
return (ip6_pcbopts(&in6p->in6p_outputopts,
|
2002-06-07 18:29:10 +04:00
|
|
|
m, so));
|
1999-06-28 10:36:47 +04:00
|
|
|
case IPV6_HOPOPTS:
|
|
|
|
case IPV6_DSTOPTS:
|
|
|
|
if (p == 0 || suser(p->p_ucred, &p->p_acflag)) {
|
|
|
|
error = EPERM;
|
|
|
|
break;
|
|
|
|
}
|
2002-06-07 08:18:11 +04:00
|
|
|
/* FALLTHROUGH */
|
1999-06-28 10:36:47 +04:00
|
|
|
case IPV6_UNICAST_HOPS:
|
|
|
|
case IPV6_RECVOPTS:
|
|
|
|
case IPV6_RECVRETOPTS:
|
|
|
|
case IPV6_RECVDSTADDR:
|
|
|
|
case IPV6_PKTINFO:
|
|
|
|
case IPV6_HOPLIMIT:
|
|
|
|
case IPV6_RTHDR:
|
|
|
|
case IPV6_FAITH:
|
2001-10-15 13:51:15 +04:00
|
|
|
case IPV6_V6ONLY:
|
2004-06-11 08:10:10 +04:00
|
|
|
case IPV6_USE_MIN_MTU:
|
2001-10-15 13:51:15 +04:00
|
|
|
if (!m || m->m_len != sizeof(int)) {
|
1999-06-28 10:36:47 +04:00
|
|
|
error = EINVAL;
|
2001-10-15 13:51:15 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
optval = *mtod(m, int *);
|
|
|
|
switch (optname) {
|
|
|
|
|
|
|
|
case IPV6_UNICAST_HOPS:
|
|
|
|
if (optval < -1 || optval >= 256)
|
|
|
|
error = EINVAL;
|
|
|
|
else {
|
|
|
|
/* -1 = kernel default */
|
|
|
|
in6p->in6p_hops = optval;
|
|
|
|
}
|
|
|
|
break;
|
1999-06-28 10:36:47 +04:00
|
|
|
#define OPTSET(bit) \
|
2002-06-07 18:29:10 +04:00
|
|
|
do { \
|
|
|
|
if (optval) \
|
|
|
|
in6p->in6p_flags |= (bit); \
|
|
|
|
else \
|
|
|
|
in6p->in6p_flags &= ~(bit); \
|
2002-11-02 10:30:55 +03:00
|
|
|
} while (/*CONSTCOND*/ 0)
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2001-10-15 13:51:15 +04:00
|
|
|
case IPV6_RECVOPTS:
|
|
|
|
OPTSET(IN6P_RECVOPTS);
|
|
|
|
break;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2001-10-15 13:51:15 +04:00
|
|
|
case IPV6_RECVRETOPTS:
|
|
|
|
OPTSET(IN6P_RECVRETOPTS);
|
|
|
|
break;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2001-10-15 13:51:15 +04:00
|
|
|
case IPV6_RECVDSTADDR:
|
|
|
|
OPTSET(IN6P_RECVDSTADDR);
|
|
|
|
break;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2001-10-15 13:51:15 +04:00
|
|
|
case IPV6_PKTINFO:
|
|
|
|
OPTSET(IN6P_PKTINFO);
|
|
|
|
break;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2001-10-15 13:51:15 +04:00
|
|
|
case IPV6_HOPLIMIT:
|
|
|
|
OPTSET(IN6P_HOPLIMIT);
|
|
|
|
break;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2001-10-15 13:51:15 +04:00
|
|
|
case IPV6_HOPOPTS:
|
|
|
|
OPTSET(IN6P_HOPOPTS);
|
|
|
|
break;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2001-10-15 13:51:15 +04:00
|
|
|
case IPV6_DSTOPTS:
|
|
|
|
OPTSET(IN6P_DSTOPTS);
|
|
|
|
break;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2001-10-15 13:51:15 +04:00
|
|
|
case IPV6_RTHDR:
|
|
|
|
OPTSET(IN6P_RTHDR);
|
|
|
|
break;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2001-10-15 13:51:15 +04:00
|
|
|
case IPV6_FAITH:
|
|
|
|
OPTSET(IN6P_FAITH);
|
|
|
|
break;
|
2000-01-06 09:41:18 +03:00
|
|
|
|
2004-06-11 08:10:10 +04:00
|
|
|
case IPV6_USE_MIN_MTU:
|
|
|
|
OPTSET(IN6P_MINMTU);
|
|
|
|
break;
|
|
|
|
|
2001-10-15 13:51:15 +04:00
|
|
|
case IPV6_V6ONLY:
|
|
|
|
/*
|
|
|
|
* make setsockopt(IPV6_V6ONLY)
|
|
|
|
* available only prior to bind(2).
|
|
|
|
* see ipng mailing list, Jun 22 2001.
|
|
|
|
*/
|
|
|
|
if (in6p->in6p_lport ||
|
2002-06-07 18:29:10 +04:00
|
|
|
!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_laddr)) {
|
2001-10-15 13:51:15 +04:00
|
|
|
error = EINVAL;
|
2000-01-06 09:41:18 +03:00
|
|
|
break;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
2001-10-15 13:51:15 +04:00
|
|
|
#ifdef INET6_BINDV6ONLY
|
|
|
|
if (!optval)
|
|
|
|
error = EINVAL;
|
|
|
|
#else
|
|
|
|
OPTSET(IN6P_IPV6_V6ONLY);
|
|
|
|
#endif
|
|
|
|
break;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
#undef OPTSET
|
|
|
|
|
|
|
|
case IPV6_MULTICAST_IF:
|
|
|
|
case IPV6_MULTICAST_HOPS:
|
|
|
|
case IPV6_MULTICAST_LOOP:
|
|
|
|
case IPV6_JOIN_GROUP:
|
|
|
|
case IPV6_LEAVE_GROUP:
|
2002-06-07 18:29:10 +04:00
|
|
|
error = ip6_setmoptions(optname,
|
|
|
|
&in6p->in6p_moptions, m);
|
1999-06-28 10:36:47 +04:00
|
|
|
break;
|
|
|
|
|
2000-01-26 20:06:36 +03:00
|
|
|
case IPV6_PORTRANGE:
|
|
|
|
optval = *mtod(m, int *);
|
|
|
|
|
|
|
|
switch (optval) {
|
|
|
|
case IPV6_PORTRANGE_DEFAULT:
|
|
|
|
in6p->in6p_flags &= ~(IN6P_LOWPORT);
|
|
|
|
in6p->in6p_flags &= ~(IN6P_HIGHPORT);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_PORTRANGE_HIGH:
|
|
|
|
in6p->in6p_flags &= ~(IN6P_LOWPORT);
|
|
|
|
in6p->in6p_flags |= IN6P_HIGHPORT;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_PORTRANGE_LOW:
|
|
|
|
in6p->in6p_flags &= ~(IN6P_HIGHPORT);
|
|
|
|
in6p->in6p_flags |= IN6P_LOWPORT;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
error = EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
#ifdef IPSEC
|
|
|
|
case IPV6_IPSEC_POLICY:
|
|
|
|
{
|
|
|
|
caddr_t req = NULL;
|
2000-01-31 17:18:52 +03:00
|
|
|
size_t len = 0;
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
int priv = 0;
|
|
|
|
if (p == 0 || suser(p->p_ucred, &p->p_acflag))
|
|
|
|
priv = 0;
|
|
|
|
else
|
|
|
|
priv = 1;
|
2000-01-31 17:18:52 +03:00
|
|
|
if (m) {
|
1999-06-28 10:36:47 +04:00
|
|
|
req = mtod(m, caddr_t);
|
|
|
|
len = m->m_len;
|
|
|
|
}
|
2000-01-31 17:18:52 +03:00
|
|
|
error = ipsec6_set_policy(in6p,
|
|
|
|
optname, req, len, priv);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif /* IPSEC */
|
|
|
|
|
|
|
|
default:
|
|
|
|
error = ENOPROTOOPT;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (m)
|
|
|
|
(void)m_free(m);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PRCO_GETOPT:
|
|
|
|
switch (optname) {
|
|
|
|
|
|
|
|
case IPV6_OPTIONS:
|
|
|
|
case IPV6_RETOPTS:
|
|
|
|
error = ENOPROTOOPT;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_PKTOPTIONS:
|
|
|
|
if (in6p->in6p_options) {
|
|
|
|
*mp = m_copym(in6p->in6p_options, 0,
|
2002-06-07 18:29:10 +04:00
|
|
|
M_COPYALL, M_WAIT);
|
1999-06-28 10:36:47 +04:00
|
|
|
} else {
|
|
|
|
*mp = m_get(M_WAIT, MT_SOOPTS);
|
|
|
|
(*mp)->m_len = 0;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_HOPOPTS:
|
|
|
|
case IPV6_DSTOPTS:
|
|
|
|
if (p == 0 || suser(p->p_ucred, &p->p_acflag)) {
|
|
|
|
error = EPERM;
|
|
|
|
break;
|
|
|
|
}
|
2002-06-07 08:18:11 +04:00
|
|
|
/* FALLTHROUGH */
|
1999-06-28 10:36:47 +04:00
|
|
|
case IPV6_UNICAST_HOPS:
|
|
|
|
case IPV6_RECVOPTS:
|
|
|
|
case IPV6_RECVRETOPTS:
|
|
|
|
case IPV6_RECVDSTADDR:
|
2000-01-26 20:06:36 +03:00
|
|
|
case IPV6_PORTRANGE:
|
1999-06-28 10:36:47 +04:00
|
|
|
case IPV6_PKTINFO:
|
|
|
|
case IPV6_HOPLIMIT:
|
|
|
|
case IPV6_RTHDR:
|
|
|
|
case IPV6_FAITH:
|
2001-10-15 13:51:15 +04:00
|
|
|
case IPV6_V6ONLY:
|
2004-06-11 08:10:10 +04:00
|
|
|
case IPV6_USE_MIN_MTU:
|
1999-06-28 10:36:47 +04:00
|
|
|
*mp = m = m_get(M_WAIT, MT_SOOPTS);
|
|
|
|
m->m_len = sizeof(int);
|
|
|
|
switch (optname) {
|
|
|
|
|
|
|
|
case IPV6_UNICAST_HOPS:
|
|
|
|
optval = in6p->in6p_hops;
|
|
|
|
break;
|
|
|
|
|
|
|
|
#define OPTBIT(bit) (in6p->in6p_flags & bit ? 1 : 0)
|
|
|
|
|
|
|
|
case IPV6_RECVOPTS:
|
|
|
|
optval = OPTBIT(IN6P_RECVOPTS);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_RECVRETOPTS:
|
|
|
|
optval = OPTBIT(IN6P_RECVRETOPTS);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_RECVDSTADDR:
|
|
|
|
optval = OPTBIT(IN6P_RECVDSTADDR);
|
|
|
|
break;
|
|
|
|
|
2000-01-26 20:06:36 +03:00
|
|
|
case IPV6_PORTRANGE:
|
|
|
|
{
|
|
|
|
int flags;
|
|
|
|
flags = in6p->in6p_flags;
|
|
|
|
if (flags & IN6P_HIGHPORT)
|
|
|
|
optval = IPV6_PORTRANGE_HIGH;
|
|
|
|
else if (flags & IN6P_LOWPORT)
|
|
|
|
optval = IPV6_PORTRANGE_LOW;
|
|
|
|
else
|
|
|
|
optval = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
case IPV6_PKTINFO:
|
|
|
|
optval = OPTBIT(IN6P_PKTINFO);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_HOPLIMIT:
|
|
|
|
optval = OPTBIT(IN6P_HOPLIMIT);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_HOPOPTS:
|
|
|
|
optval = OPTBIT(IN6P_HOPOPTS);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_DSTOPTS:
|
|
|
|
optval = OPTBIT(IN6P_DSTOPTS);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_RTHDR:
|
|
|
|
optval = OPTBIT(IN6P_RTHDR);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_FAITH:
|
|
|
|
optval = OPTBIT(IN6P_FAITH);
|
|
|
|
break;
|
2000-01-06 09:41:18 +03:00
|
|
|
|
2001-10-15 13:51:15 +04:00
|
|
|
case IPV6_V6ONLY:
|
|
|
|
optval = OPTBIT(IN6P_IPV6_V6ONLY);
|
2000-01-06 09:41:18 +03:00
|
|
|
break;
|
2004-06-11 08:10:10 +04:00
|
|
|
|
|
|
|
case IPV6_USE_MIN_MTU:
|
|
|
|
optval = OPTBIT(IN6P_MINMTU);
|
|
|
|
break;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
*mtod(m, int *) = optval;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_MULTICAST_IF:
|
|
|
|
case IPV6_MULTICAST_HOPS:
|
|
|
|
case IPV6_MULTICAST_LOOP:
|
|
|
|
case IPV6_JOIN_GROUP:
|
|
|
|
case IPV6_LEAVE_GROUP:
|
|
|
|
error = ip6_getmoptions(optname, in6p->in6p_moptions, mp);
|
|
|
|
break;
|
|
|
|
|
2004-07-06 08:30:27 +04:00
|
|
|
#if 0 /* defined(IPSEC) */
|
|
|
|
/* XXX: code broken */
|
1999-06-28 10:36:47 +04:00
|
|
|
case IPV6_IPSEC_POLICY:
|
2000-01-31 17:18:52 +03:00
|
|
|
{
|
|
|
|
caddr_t req = NULL;
|
|
|
|
size_t len = 0;
|
|
|
|
|
|
|
|
if (m) {
|
|
|
|
req = mtod(m, caddr_t);
|
|
|
|
len = m->m_len;
|
|
|
|
}
|
|
|
|
error = ipsec6_get_policy(in6p, req, len, mp);
|
1999-06-28 10:36:47 +04:00
|
|
|
break;
|
2000-01-31 17:18:52 +03:00
|
|
|
}
|
1999-06-28 10:36:47 +04:00
|
|
|
#endif /* IPSEC */
|
|
|
|
|
|
|
|
default:
|
|
|
|
error = ENOPROTOOPT;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2000-05-19 05:40:18 +04:00
|
|
|
} else {
|
1999-06-28 10:36:47 +04:00
|
|
|
error = EINVAL;
|
|
|
|
if (op == PRCO_SETOPT && *mp)
|
|
|
|
(void)m_free(*mp);
|
|
|
|
}
|
2002-09-11 06:46:42 +04:00
|
|
|
return (error);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
2002-06-08 02:03:02 +04:00
|
|
|
int
|
|
|
|
ip6_raw_ctloutput(op, so, level, optname, mp)
|
|
|
|
int op;
|
|
|
|
struct socket *so;
|
|
|
|
int level, optname;
|
|
|
|
struct mbuf **mp;
|
|
|
|
{
|
|
|
|
int error = 0, optval, optlen;
|
|
|
|
const int icmp6off = offsetof(struct icmp6_hdr, icmp6_cksum);
|
|
|
|
struct in6pcb *in6p = sotoin6pcb(so);
|
|
|
|
struct mbuf *m = *mp;
|
|
|
|
|
|
|
|
optlen = m ? m->m_len : 0;
|
|
|
|
|
|
|
|
if (level != IPPROTO_IPV6) {
|
|
|
|
if (op == PRCO_SETOPT && *mp)
|
|
|
|
(void)m_free(*mp);
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EINVAL);
|
2002-06-08 02:03:02 +04:00
|
|
|
}
|
2002-06-09 18:43:10 +04:00
|
|
|
|
2002-06-08 02:03:02 +04:00
|
|
|
switch (optname) {
|
|
|
|
case IPV6_CHECKSUM:
|
|
|
|
/*
|
|
|
|
* For ICMPv6 sockets, no modification allowed for checksum
|
|
|
|
* offset, permit "no change" values to help existing apps.
|
|
|
|
*
|
|
|
|
* XXX 2292bis says: "An attempt to set IPV6_CHECKSUM
|
|
|
|
* for an ICMPv6 socket will fail."
|
|
|
|
* The current behavior does not meet 2292bis.
|
|
|
|
*/
|
|
|
|
switch (op) {
|
|
|
|
case PRCO_SETOPT:
|
|
|
|
if (optlen != sizeof(int)) {
|
|
|
|
error = EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
optval = *mtod(m, int *);
|
|
|
|
if ((optval % 2) != 0) {
|
|
|
|
/* the API assumes even offset values */
|
|
|
|
error = EINVAL;
|
|
|
|
} else if (so->so_proto->pr_protocol ==
|
|
|
|
IPPROTO_ICMPV6) {
|
|
|
|
if (optval != icmp6off)
|
|
|
|
error = EINVAL;
|
|
|
|
} else
|
|
|
|
in6p->in6p_cksum = optval;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PRCO_GETOPT:
|
|
|
|
if (so->so_proto->pr_protocol == IPPROTO_ICMPV6)
|
|
|
|
optval = icmp6off;
|
|
|
|
else
|
|
|
|
optval = in6p->in6p_cksum;
|
|
|
|
|
|
|
|
*mp = m = m_get(M_WAIT, MT_SOOPTS);
|
|
|
|
m->m_len = sizeof(int);
|
|
|
|
*mtod(m, int *) = optval;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
error = EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
error = ENOPROTOOPT;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (op == PRCO_SETOPT && m)
|
|
|
|
(void)m_free(m);
|
|
|
|
|
2002-09-11 06:46:42 +04:00
|
|
|
return (error);
|
2002-06-08 02:03:02 +04:00
|
|
|
}
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
|
|
|
* Set up IP6 options in pcb for insertion in output packets.
|
|
|
|
* Store in mbuf with pointer in pcbopt, adding pseudo-option
|
|
|
|
* with destination address if source routed.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
ip6_pcbopts(pktopt, m, so)
|
|
|
|
struct ip6_pktopts **pktopt;
|
2001-02-10 07:14:26 +03:00
|
|
|
struct mbuf *m;
|
1999-06-28 10:36:47 +04:00
|
|
|
struct socket *so;
|
|
|
|
{
|
2001-02-10 07:14:26 +03:00
|
|
|
struct ip6_pktopts *opt = *pktopt;
|
1999-06-28 10:36:47 +04:00
|
|
|
int error = 0;
|
|
|
|
struct proc *p = curproc; /* XXX */
|
|
|
|
int priv = 0;
|
|
|
|
|
|
|
|
/* turn off any old options. */
|
|
|
|
if (opt) {
|
|
|
|
if (opt->ip6po_m)
|
|
|
|
(void)m_free(opt->ip6po_m);
|
2000-05-19 05:40:18 +04:00
|
|
|
} else
|
1999-06-28 10:36:47 +04:00
|
|
|
opt = malloc(sizeof(*opt), M_IP6OPT, M_WAITOK);
|
|
|
|
*pktopt = 0;
|
|
|
|
|
|
|
|
if (!m || m->m_len == 0) {
|
|
|
|
/*
|
|
|
|
* Only turning off any previous options.
|
|
|
|
*/
|
2002-10-31 20:36:16 +03:00
|
|
|
free(opt, M_IP6OPT);
|
1999-06-28 10:36:47 +04:00
|
|
|
if (m)
|
|
|
|
(void)m_free(m);
|
2002-09-11 06:46:42 +04:00
|
|
|
return (0);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* set options specified by user. */
|
|
|
|
if (p && !suser(p->p_ucred, &p->p_acflag))
|
|
|
|
priv = 1;
|
|
|
|
if ((error = ip6_setpktoptions(m, opt, priv)) != 0) {
|
|
|
|
(void)m_free(m);
|
2002-10-31 20:36:16 +03:00
|
|
|
free(opt, M_IP6OPT);
|
2002-09-11 06:46:42 +04:00
|
|
|
return (error);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
*pktopt = opt;
|
2002-09-11 06:46:42 +04:00
|
|
|
return (0);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Set the IP6 multicast options in response to user setsockopt().
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
ip6_setmoptions(optname, im6op, m)
|
|
|
|
int optname;
|
|
|
|
struct ip6_moptions **im6op;
|
|
|
|
struct mbuf *m;
|
|
|
|
{
|
|
|
|
int error = 0;
|
|
|
|
u_int loop, ifindex;
|
|
|
|
struct ipv6_mreq *mreq;
|
|
|
|
struct ifnet *ifp;
|
|
|
|
struct ip6_moptions *im6o = *im6op;
|
|
|
|
struct route_in6 ro;
|
|
|
|
struct in6_multi_mship *imm;
|
|
|
|
struct proc *p = curproc; /* XXX */
|
|
|
|
|
|
|
|
if (im6o == NULL) {
|
|
|
|
/*
|
|
|
|
* No multicast option buffer attached to the pcb;
|
|
|
|
* allocate one and initialize to default values.
|
|
|
|
*/
|
|
|
|
im6o = (struct ip6_moptions *)
|
|
|
|
malloc(sizeof(*im6o), M_IPMOPTS, M_WAITOK);
|
|
|
|
|
|
|
|
if (im6o == NULL)
|
2002-09-11 06:46:42 +04:00
|
|
|
return (ENOBUFS);
|
1999-06-28 10:36:47 +04:00
|
|
|
*im6op = im6o;
|
|
|
|
im6o->im6o_multicast_ifp = NULL;
|
|
|
|
im6o->im6o_multicast_hlim = ip6_defmcasthlim;
|
|
|
|
im6o->im6o_multicast_loop = IPV6_DEFAULT_MULTICAST_LOOP;
|
|
|
|
LIST_INIT(&im6o->im6o_memberships);
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (optname) {
|
|
|
|
|
|
|
|
case IPV6_MULTICAST_IF:
|
|
|
|
/*
|
|
|
|
* Select the interface for outgoing multicast packets.
|
|
|
|
*/
|
|
|
|
if (m == NULL || m->m_len != sizeof(u_int)) {
|
|
|
|
error = EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
2000-08-19 12:15:53 +04:00
|
|
|
bcopy(mtod(m, u_int *), &ifindex, sizeof(ifindex));
|
2004-12-21 14:37:47 +03:00
|
|
|
if (ifindex != 0) {
|
|
|
|
if (ifindex < 0 || if_indexlim <= ifindex ||
|
|
|
|
!ifindex2ifnet[ifindex]) {
|
|
|
|
error = ENXIO; /* XXX EINVAL? */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
ifp = ifindex2ifnet[ifindex];
|
|
|
|
if ((ifp->if_flags & IFF_MULTICAST) == 0) {
|
|
|
|
error = EADDRNOTAVAIL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
ifp = NULL;
|
1999-06-28 10:36:47 +04:00
|
|
|
im6o->im6o_multicast_ifp = ifp;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_MULTICAST_HOPS:
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Set the IP6 hoplimit for outgoing multicast packets.
|
|
|
|
*/
|
|
|
|
int optval;
|
|
|
|
if (m == NULL || m->m_len != sizeof(int)) {
|
|
|
|
error = EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
2000-08-19 12:15:53 +04:00
|
|
|
bcopy(mtod(m, u_int *), &optval, sizeof(optval));
|
1999-06-28 10:36:47 +04:00
|
|
|
if (optval < -1 || optval >= 256)
|
|
|
|
error = EINVAL;
|
|
|
|
else if (optval == -1)
|
|
|
|
im6o->im6o_multicast_hlim = ip6_defmcasthlim;
|
|
|
|
else
|
|
|
|
im6o->im6o_multicast_hlim = optval;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case IPV6_MULTICAST_LOOP:
|
|
|
|
/*
|
|
|
|
* Set the loopback flag for outgoing multicast packets.
|
|
|
|
* Must be zero or one.
|
|
|
|
*/
|
2000-08-19 12:15:53 +04:00
|
|
|
if (m == NULL || m->m_len != sizeof(u_int)) {
|
|
|
|
error = EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
bcopy(mtod(m, u_int *), &loop, sizeof(loop));
|
|
|
|
if (loop > 1) {
|
1999-06-28 10:36:47 +04:00
|
|
|
error = EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
im6o->im6o_multicast_loop = loop;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_JOIN_GROUP:
|
|
|
|
/*
|
|
|
|
* Add a multicast group membership.
|
|
|
|
* Group must be a valid IP6 multicast address.
|
|
|
|
*/
|
|
|
|
if (m == NULL || m->m_len != sizeof(struct ipv6_mreq)) {
|
|
|
|
error = EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
mreq = mtod(m, struct ipv6_mreq *);
|
1999-12-13 18:17:17 +03:00
|
|
|
if (IN6_IS_ADDR_UNSPECIFIED(&mreq->ipv6mr_multiaddr)) {
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
|
|
|
* We use the unspecified address to specify to accept
|
|
|
|
* all multicast addresses. Only super user is allowed
|
|
|
|
* to do this.
|
|
|
|
*/
|
2001-02-10 07:14:26 +03:00
|
|
|
if (suser(p->p_ucred, &p->p_acflag))
|
|
|
|
{
|
1999-06-28 10:36:47 +04:00
|
|
|
error = EACCES;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else if (!IN6_IS_ADDR_MULTICAST(&mreq->ipv6mr_multiaddr)) {
|
|
|
|
error = EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If no interface was explicitly specified, choose an
|
|
|
|
* appropriate one according to the given multicast address.
|
|
|
|
*/
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
if (mreq->ipv6mr_interface == 0) {
|
|
|
|
struct sockaddr_in6 *dst;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Look up the routing table for the
|
|
|
|
* address, and choose the outgoing interface.
|
|
|
|
* XXX: is it a good approach?
|
|
|
|
*/
|
|
|
|
ro.ro_rt = NULL;
|
|
|
|
dst = (struct sockaddr_in6 *)&ro.ro_dst;
|
|
|
|
bzero(dst, sizeof(*dst));
|
|
|
|
dst->sin6_family = AF_INET6;
|
|
|
|
dst->sin6_len = sizeof(*dst);
|
|
|
|
dst->sin6_addr = mreq->ipv6mr_multiaddr;
|
|
|
|
rtalloc((struct route *)&ro);
|
|
|
|
if (ro.ro_rt == NULL) {
|
|
|
|
error = EADDRNOTAVAIL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
ifp = ro.ro_rt->rt_ifp;
|
|
|
|
rtfree(ro.ro_rt);
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* If the interface is specified, validate it.
|
|
|
|
*/
|
2004-12-21 14:37:47 +03:00
|
|
|
if (mreq->ipv6mr_interface < 0 ||
|
|
|
|
if_indexlim <= mreq->ipv6mr_interface ||
|
|
|
|
!ifindex2ifnet[mreq->ipv6mr_interface]) {
|
|
|
|
error = ENXIO; /* XXX EINVAL? */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
ifp = ifindex2ifnet[mreq->ipv6mr_interface];
|
|
|
|
}
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* See if we found an interface, and confirm that it
|
|
|
|
* supports multicast
|
|
|
|
*/
|
|
|
|
if (ifp == NULL || (ifp->if_flags & IFF_MULTICAST) == 0) {
|
|
|
|
error = EADDRNOTAVAIL;
|
|
|
|
break;
|
|
|
|
}
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
|
|
|
|
if (in6_setscope(&mreq->ipv6mr_multiaddr, ifp, NULL)) {
|
|
|
|
error = EADDRNOTAVAIL; /* XXX: should not happen */
|
|
|
|
break;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
|
|
|
* See if the membership already exists.
|
|
|
|
*/
|
|
|
|
for (imm = im6o->im6o_memberships.lh_first;
|
|
|
|
imm != NULL; imm = imm->i6mm_chain.le_next)
|
|
|
|
if (imm->i6mm_maddr->in6m_ifp == ifp &&
|
|
|
|
IN6_ARE_ADDR_EQUAL(&imm->i6mm_maddr->in6m_addr,
|
2002-06-07 18:29:10 +04:00
|
|
|
&mreq->ipv6mr_multiaddr))
|
1999-06-28 10:36:47 +04:00
|
|
|
break;
|
|
|
|
if (imm != NULL) {
|
|
|
|
error = EADDRINUSE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Everything looks good; add a new record to the multicast
|
|
|
|
* address list for the given interface.
|
|
|
|
*/
|
2001-12-20 10:26:36 +03:00
|
|
|
imm = in6_joingroup(ifp, &mreq->ipv6mr_multiaddr, &error);
|
|
|
|
if (!imm)
|
1999-06-28 10:36:47 +04:00
|
|
|
break;
|
|
|
|
LIST_INSERT_HEAD(&im6o->im6o_memberships, imm, i6mm_chain);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_LEAVE_GROUP:
|
|
|
|
/*
|
|
|
|
* Drop a multicast group membership.
|
|
|
|
* Group must be a valid IP6 multicast address.
|
|
|
|
*/
|
|
|
|
if (m == NULL || m->m_len != sizeof(struct ipv6_mreq)) {
|
|
|
|
error = EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
mreq = mtod(m, struct ipv6_mreq *);
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
|
|
|
* If an interface address was specified, get a pointer
|
|
|
|
* to its ifnet structure.
|
|
|
|
*/
|
2004-12-21 14:37:47 +03:00
|
|
|
if (mreq->ipv6mr_interface != 0) {
|
|
|
|
if (mreq->ipv6mr_interface < 0 ||
|
|
|
|
if_indexlim <= mreq->ipv6mr_interface ||
|
|
|
|
!ifindex2ifnet[mreq->ipv6mr_interface]) {
|
|
|
|
error = ENXIO; /* XXX EINVAL? */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
ifp = ifindex2ifnet[mreq->ipv6mr_interface];
|
|
|
|
} else
|
|
|
|
ifp = NULL;
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
|
|
|
|
/* Fill in the scope zone ID */
|
|
|
|
if (ifp) {
|
|
|
|
if (in6_setscope(&mreq->ipv6mr_multiaddr, ifp, NULL)) {
|
|
|
|
/* XXX: should not happen */
|
|
|
|
error = EADDRNOTAVAIL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else if (mreq->ipv6mr_interface != 0) {
|
|
|
|
/*
|
|
|
|
* XXX: This case would happens when the (positive)
|
|
|
|
* index is in the valid range, but the corresponding
|
|
|
|
* interface has been detached dynamically. The above
|
|
|
|
* check probably avoids such case to happen here, but
|
|
|
|
* we check it explicitly for safety.
|
|
|
|
*/
|
|
|
|
error = EADDRNOTAVAIL;
|
|
|
|
break;
|
|
|
|
} else { /* ipv6mr_interface == 0 */
|
|
|
|
struct sockaddr_in6 sa6_mc;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The API spec says as follows:
|
|
|
|
* If the interface index is specified as 0, the
|
|
|
|
* system may choose a multicast group membership to
|
|
|
|
* drop by matching the multicast address only.
|
|
|
|
* On the other hand, we cannot disambiguate the scope
|
|
|
|
* zone unless an interface is provided. Thus, we
|
|
|
|
* check if there's ambiguity with the default scope
|
|
|
|
* zone as the last resort.
|
|
|
|
*/
|
|
|
|
bzero(&sa6_mc, sizeof(sa6_mc));
|
|
|
|
sa6_mc.sin6_family = AF_INET6;
|
|
|
|
sa6_mc.sin6_len = sizeof(sa6_mc);
|
|
|
|
sa6_mc.sin6_addr = mreq->ipv6mr_multiaddr;
|
|
|
|
error = sa6_embedscope(&sa6_mc, ip6_use_defzone);
|
|
|
|
if (error != 0)
|
|
|
|
break;
|
|
|
|
mreq->ipv6mr_multiaddr = sa6_mc.sin6_addr;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
|
|
|
* Find the membership in the membership list.
|
|
|
|
*/
|
|
|
|
for (imm = im6o->im6o_memberships.lh_first;
|
|
|
|
imm != NULL; imm = imm->i6mm_chain.le_next) {
|
2002-06-07 18:29:10 +04:00
|
|
|
if ((ifp == NULL || imm->i6mm_maddr->in6m_ifp == ifp) &&
|
1999-06-28 10:36:47 +04:00
|
|
|
IN6_ARE_ADDR_EQUAL(&imm->i6mm_maddr->in6m_addr,
|
2002-06-07 18:29:10 +04:00
|
|
|
&mreq->ipv6mr_multiaddr))
|
1999-06-28 10:36:47 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (imm == NULL) {
|
|
|
|
/* Unable to resolve interface */
|
|
|
|
error = EADDRNOTAVAIL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Give up the multicast address record to which the
|
|
|
|
* membership points.
|
|
|
|
*/
|
|
|
|
LIST_REMOVE(imm, i6mm_chain);
|
2001-12-20 10:26:36 +03:00
|
|
|
in6_leavegroup(imm);
|
1999-06-28 10:36:47 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
error = EOPNOTSUPP;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If all options have default values, no need to keep the mbuf.
|
|
|
|
*/
|
|
|
|
if (im6o->im6o_multicast_ifp == NULL &&
|
|
|
|
im6o->im6o_multicast_hlim == ip6_defmcasthlim &&
|
|
|
|
im6o->im6o_multicast_loop == IPV6_DEFAULT_MULTICAST_LOOP &&
|
|
|
|
im6o->im6o_memberships.lh_first == NULL) {
|
|
|
|
free(*im6op, M_IPMOPTS);
|
|
|
|
*im6op = NULL;
|
|
|
|
}
|
|
|
|
|
2002-09-11 06:46:42 +04:00
|
|
|
return (error);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Return the IP6 multicast options in response to user getsockopt().
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
ip6_getmoptions(optname, im6o, mp)
|
|
|
|
int optname;
|
2001-02-10 07:14:26 +03:00
|
|
|
struct ip6_moptions *im6o;
|
|
|
|
struct mbuf **mp;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
|
|
|
u_int *hlim, *loop, *ifindex;
|
|
|
|
|
|
|
|
*mp = m_get(M_WAIT, MT_SOOPTS);
|
|
|
|
|
|
|
|
switch (optname) {
|
|
|
|
|
|
|
|
case IPV6_MULTICAST_IF:
|
|
|
|
ifindex = mtod(*mp, u_int *);
|
|
|
|
(*mp)->m_len = sizeof(u_int);
|
|
|
|
if (im6o == NULL || im6o->im6o_multicast_ifp == NULL)
|
|
|
|
*ifindex = 0;
|
|
|
|
else
|
|
|
|
*ifindex = im6o->im6o_multicast_ifp->if_index;
|
2002-09-11 06:46:42 +04:00
|
|
|
return (0);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
case IPV6_MULTICAST_HOPS:
|
|
|
|
hlim = mtod(*mp, u_int *);
|
|
|
|
(*mp)->m_len = sizeof(u_int);
|
|
|
|
if (im6o == NULL)
|
|
|
|
*hlim = ip6_defmcasthlim;
|
|
|
|
else
|
|
|
|
*hlim = im6o->im6o_multicast_hlim;
|
2002-09-11 06:46:42 +04:00
|
|
|
return (0);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
case IPV6_MULTICAST_LOOP:
|
|
|
|
loop = mtod(*mp, u_int *);
|
|
|
|
(*mp)->m_len = sizeof(u_int);
|
|
|
|
if (im6o == NULL)
|
|
|
|
*loop = ip6_defmcasthlim;
|
|
|
|
else
|
|
|
|
*loop = im6o->im6o_multicast_loop;
|
2002-09-11 06:46:42 +04:00
|
|
|
return (0);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
default:
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EOPNOTSUPP);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Discard the IP6 multicast options.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
ip6_freemoptions(im6o)
|
2001-02-10 07:14:26 +03:00
|
|
|
struct ip6_moptions *im6o;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
|
|
|
struct in6_multi_mship *imm;
|
|
|
|
|
|
|
|
if (im6o == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
while ((imm = im6o->im6o_memberships.lh_first) != NULL) {
|
|
|
|
LIST_REMOVE(imm, i6mm_chain);
|
2001-12-20 10:26:36 +03:00
|
|
|
in6_leavegroup(imm);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
free(im6o, M_IPMOPTS);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Set IPv6 outgoing packet options based on advanced API.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
ip6_setpktoptions(control, opt, priv)
|
|
|
|
struct mbuf *control;
|
|
|
|
struct ip6_pktopts *opt;
|
|
|
|
int priv;
|
|
|
|
{
|
2001-02-10 07:14:26 +03:00
|
|
|
struct cmsghdr *cm = 0;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
if (control == 0 || opt == 0)
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EINVAL);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
bzero(opt, sizeof(*opt));
|
|
|
|
opt->ip6po_hlim = -1; /* -1 means to use default hop limit */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX: Currently, we assume all the optional information is stored
|
|
|
|
* in a single mbuf.
|
|
|
|
*/
|
|
|
|
if (control->m_next)
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EINVAL);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
opt->ip6po_m = control;
|
|
|
|
|
|
|
|
for (; control->m_len; control->m_data += CMSG_ALIGN(cm->cmsg_len),
|
2002-06-07 18:29:10 +04:00
|
|
|
control->m_len -= CMSG_ALIGN(cm->cmsg_len)) {
|
1999-06-28 10:36:47 +04:00
|
|
|
cm = mtod(control, struct cmsghdr *);
|
|
|
|
if (cm->cmsg_len == 0 || cm->cmsg_len > control->m_len)
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EINVAL);
|
1999-06-28 10:36:47 +04:00
|
|
|
if (cm->cmsg_level != IPPROTO_IPV6)
|
|
|
|
continue;
|
|
|
|
|
2001-02-10 07:14:26 +03:00
|
|
|
switch (cm->cmsg_type) {
|
1999-06-28 10:36:47 +04:00
|
|
|
case IPV6_PKTINFO:
|
|
|
|
if (cm->cmsg_len != CMSG_LEN(sizeof(struct in6_pktinfo)))
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EINVAL);
|
1999-06-28 10:36:47 +04:00
|
|
|
opt->ip6po_pktinfo = (struct in6_pktinfo *)CMSG_DATA(cm);
|
2003-12-10 14:46:33 +03:00
|
|
|
if (opt->ip6po_pktinfo->ipi6_ifindex >= if_indexlim ||
|
2003-12-11 01:35:35 +03:00
|
|
|
opt->ip6po_pktinfo->ipi6_ifindex < 0)
|
|
|
|
return (ENXIO);
|
|
|
|
if (opt->ip6po_pktinfo->ipi6_ifindex > 0 &&
|
|
|
|
!ifindex2ifnet[opt->ip6po_pktinfo->ipi6_ifindex])
|
2002-09-11 06:46:42 +04:00
|
|
|
return (ENXIO);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
if (opt->ip6po_pktinfo->ipi6_ifindex) {
|
|
|
|
struct ifnet *ifp;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
/* ipi6_ifindex must be valid here */
|
|
|
|
ifp = ifindex2ifnet[opt->ip6po_pktinfo->ipi6_ifindex];
|
|
|
|
error = in6_setscope(&opt->ip6po_pktinfo->ipi6_addr,
|
|
|
|
ifp, NULL);
|
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2000-05-19 05:40:18 +04:00
|
|
|
/*
|
|
|
|
* Check if the requested source address is indeed a
|
2001-04-11 08:57:53 +04:00
|
|
|
* unicast address assigned to the node, and can be
|
|
|
|
* used as the packet's source address.
|
2000-05-19 05:40:18 +04:00
|
|
|
*/
|
1999-12-13 18:17:17 +03:00
|
|
|
if (!IN6_IS_ADDR_UNSPECIFIED(&opt->ip6po_pktinfo->ipi6_addr)) {
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ifaddr *ia;
|
2001-04-11 08:57:53 +04:00
|
|
|
struct in6_ifaddr *ia6;
|
1999-06-28 10:36:47 +04:00
|
|
|
struct sockaddr_in6 sin6;
|
|
|
|
|
|
|
|
bzero(&sin6, sizeof(sin6));
|
|
|
|
sin6.sin6_len = sizeof(sin6);
|
|
|
|
sin6.sin6_family = AF_INET6;
|
|
|
|
sin6.sin6_addr =
|
|
|
|
opt->ip6po_pktinfo->ipi6_addr;
|
|
|
|
ia = ifa_ifwithaddr(sin6tosa(&sin6));
|
|
|
|
if (ia == NULL ||
|
|
|
|
(opt->ip6po_pktinfo->ipi6_ifindex &&
|
|
|
|
(ia->ifa_ifp->if_index !=
|
|
|
|
opt->ip6po_pktinfo->ipi6_ifindex))) {
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EADDRNOTAVAIL);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
2001-04-11 08:57:53 +04:00
|
|
|
ia6 = (struct in6_ifaddr *)ia;
|
|
|
|
if ((ia6->ia6_flags & (IN6_IFF_ANYCAST|IN6_IFF_NOTREADY)) != 0) {
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EADDRNOTAVAIL);
|
2001-04-11 08:57:53 +04:00
|
|
|
}
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
|
|
|
* Check if the requested source address is
|
|
|
|
* indeed a unicast address assigned to the
|
|
|
|
* node.
|
|
|
|
*/
|
|
|
|
if (IN6_IS_ADDR_MULTICAST(&opt->ip6po_pktinfo->ipi6_addr))
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EADDRNOTAVAIL);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_HOPLIMIT:
|
|
|
|
if (cm->cmsg_len != CMSG_LEN(sizeof(int)))
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EINVAL);
|
2003-08-25 04:10:27 +04:00
|
|
|
else {
|
|
|
|
int t;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2003-08-25 04:10:27 +04:00
|
|
|
bcopy(CMSG_DATA(cm), &t, sizeof(t));
|
|
|
|
if (t < -1 || t > 255)
|
|
|
|
return (EINVAL);
|
|
|
|
opt->ip6po_hlim = t;
|
|
|
|
}
|
1999-06-28 10:36:47 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_NEXTHOP:
|
|
|
|
if (!priv)
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EPERM);
|
2001-02-10 07:14:26 +03:00
|
|
|
|
2002-06-07 18:29:10 +04:00
|
|
|
/* check if cmsg_len is large enough for sa_len */
|
1999-06-28 10:36:47 +04:00
|
|
|
if (cm->cmsg_len < sizeof(u_char) ||
|
|
|
|
cm->cmsg_len < CMSG_LEN(*CMSG_DATA(cm)))
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EINVAL);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
opt->ip6po_nexthop = (struct sockaddr *)CMSG_DATA(cm);
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_HOPOPTS:
|
|
|
|
if (cm->cmsg_len < CMSG_LEN(sizeof(struct ip6_hbh)))
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EINVAL);
|
2003-08-25 04:10:27 +04:00
|
|
|
else {
|
|
|
|
struct ip6_hbh *t;
|
|
|
|
|
|
|
|
t = (struct ip6_hbh *)CMSG_DATA(cm);
|
|
|
|
if (cm->cmsg_len !=
|
|
|
|
CMSG_LEN((t->ip6h_len + 1) << 3))
|
|
|
|
return (EINVAL);
|
|
|
|
opt->ip6po_hbh = t;
|
|
|
|
}
|
1999-06-28 10:36:47 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_DSTOPTS:
|
|
|
|
if (cm->cmsg_len < CMSG_LEN(sizeof(struct ip6_dest)))
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EINVAL);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If there is no routing header yet, the destination
|
|
|
|
* options header should be put on the 1st part.
|
|
|
|
* Otherwise, the header should be on the 2nd part.
|
|
|
|
* (See RFC 2460, section 4.1)
|
|
|
|
*/
|
|
|
|
if (opt->ip6po_rthdr == NULL) {
|
2003-08-25 04:10:27 +04:00
|
|
|
struct ip6_dest *t;
|
|
|
|
|
|
|
|
t = (struct ip6_dest *)CMSG_DATA(cm);
|
1999-06-28 10:36:47 +04:00
|
|
|
if (cm->cmsg_len !=
|
2003-08-25 04:10:27 +04:00
|
|
|
CMSG_LEN((t->ip6d_len + 1) << 3));
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EINVAL);
|
2003-08-25 04:10:27 +04:00
|
|
|
opt->ip6po_dest1 = t;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
else {
|
2003-08-25 04:10:27 +04:00
|
|
|
struct ip6_dest *t;
|
|
|
|
|
|
|
|
t = (struct ip6_dest *)CMSG_DATA(cm);
|
1999-06-28 10:36:47 +04:00
|
|
|
if (cm->cmsg_len !=
|
2002-06-07 18:29:10 +04:00
|
|
|
CMSG_LEN((opt->ip6po_dest2->ip6d_len + 1) << 3))
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EINVAL);
|
2003-08-25 04:10:27 +04:00
|
|
|
opt->ip6po_dest2 = t;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPV6_RTHDR:
|
|
|
|
if (cm->cmsg_len < CMSG_LEN(sizeof(struct ip6_rthdr)))
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EINVAL);
|
2003-08-25 04:10:27 +04:00
|
|
|
else {
|
|
|
|
struct ip6_rthdr *t;
|
|
|
|
|
|
|
|
t = (struct ip6_rthdr *)CMSG_DATA(cm);
|
|
|
|
if (cm->cmsg_len !=
|
|
|
|
CMSG_LEN((t->ip6r_len + 1) << 3))
|
2002-09-11 06:46:42 +04:00
|
|
|
return (EINVAL);
|
2003-08-25 04:10:27 +04:00
|
|
|
switch (t->ip6r_type) {
|
|
|
|
case IPV6_RTHDR_TYPE_0:
|
|
|
|
if (t->ip6r_segleft == 0)
|
|
|
|
return (EINVAL);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
opt->ip6po_rthdr = t;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
2002-09-11 06:46:42 +04:00
|
|
|
return (ENOPROTOOPT);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-09-11 06:46:42 +04:00
|
|
|
return (0);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Routine called from ip6_output() to loop back a copy of an IP6 multicast
|
|
|
|
* packet to the input queue of a specified interface. Note that this
|
|
|
|
* calls the output routine of the loopback "driver", but with an interface
|
2004-12-04 19:10:25 +03:00
|
|
|
* pointer that might NOT be lo0ifp -- easier than replicating that code here.
|
1999-06-28 10:36:47 +04:00
|
|
|
*/
|
|
|
|
void
|
|
|
|
ip6_mloopback(ifp, m, dst)
|
|
|
|
struct ifnet *ifp;
|
2001-02-10 07:14:26 +03:00
|
|
|
struct mbuf *m;
|
|
|
|
struct sockaddr_in6 *dst;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
2000-06-03 18:36:32 +04:00
|
|
|
struct mbuf *copym;
|
|
|
|
struct ip6_hdr *ip6;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
copym = m_copy(m, 0, M_COPYALL);
|
2000-06-03 18:36:32 +04:00
|
|
|
if (copym == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Make sure to deep-copy IPv6 header portion in case the data
|
|
|
|
* is in an mbuf cluster, so that we can safely override the IPv6
|
|
|
|
* header portion later.
|
|
|
|
*/
|
|
|
|
if ((copym->m_flags & M_EXT) != 0 ||
|
|
|
|
copym->m_len < sizeof(struct ip6_hdr)) {
|
|
|
|
copym = m_pullup(copym, sizeof(struct ip6_hdr));
|
|
|
|
if (copym == NULL)
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
if (copym->m_len < sizeof(*ip6)) {
|
|
|
|
m_freem(copym);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2001-03-30 15:08:56 +04:00
|
|
|
ip6 = mtod(copym, struct ip6_hdr *);
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
/*
|
|
|
|
* clear embedded scope identifiers if necessary.
|
|
|
|
* in6_clearscope will touch the addresses only when necessary.
|
|
|
|
*/
|
|
|
|
in6_clearscope(&ip6->ip6_src);
|
|
|
|
in6_clearscope(&ip6->ip6_dst);
|
2000-06-03 18:36:32 +04:00
|
|
|
|
|
|
|
(void)looutput(ifp, copym, (struct sockaddr *)dst, NULL);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Chop IPv6 header off from the payload.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
ip6_splithdr(m, exthdrs)
|
|
|
|
struct mbuf *m;
|
|
|
|
struct ip6_exthdrs *exthdrs;
|
|
|
|
{
|
|
|
|
struct mbuf *mh;
|
|
|
|
struct ip6_hdr *ip6;
|
|
|
|
|
|
|
|
ip6 = mtod(m, struct ip6_hdr *);
|
|
|
|
if (m->m_len > sizeof(*ip6)) {
|
|
|
|
MGETHDR(mh, M_DONTWAIT, MT_HEADER);
|
|
|
|
if (mh == 0) {
|
|
|
|
m_freem(m);
|
|
|
|
return ENOBUFS;
|
|
|
|
}
|
2005-08-18 04:30:58 +04:00
|
|
|
M_MOVE_PKTHDR(mh, m);
|
1999-06-28 10:36:47 +04:00
|
|
|
MH_ALIGN(mh, sizeof(*ip6));
|
|
|
|
m->m_len -= sizeof(*ip6);
|
|
|
|
m->m_data += sizeof(*ip6);
|
|
|
|
mh->m_next = m;
|
|
|
|
m = mh;
|
|
|
|
m->m_len = sizeof(*ip6);
|
|
|
|
bcopy((caddr_t)ip6, mtod(m, caddr_t), sizeof(*ip6));
|
|
|
|
}
|
|
|
|
exthdrs->ip6e_ip6 = m;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Compute IPv6 extension header length.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
ip6_optlen(in6p)
|
|
|
|
struct in6pcb *in6p;
|
|
|
|
{
|
|
|
|
int len;
|
|
|
|
|
|
|
|
if (!in6p->in6p_outputopts)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
len = 0;
|
|
|
|
#define elen(x) \
|
|
|
|
(((struct ip6_ext *)(x)) ? (((struct ip6_ext *)(x))->ip6e_len + 1) << 3 : 0)
|
|
|
|
|
|
|
|
len += elen(in6p->in6p_outputopts->ip6po_hbh);
|
|
|
|
len += elen(in6p->in6p_outputopts->ip6po_dest1);
|
|
|
|
len += elen(in6p->in6p_outputopts->ip6po_rthdr);
|
|
|
|
len += elen(in6p->in6p_outputopts->ip6po_dest2);
|
|
|
|
return len;
|
|
|
|
#undef elen
|
|
|
|
}
|