]> git.saurik.com Git - apple/xnu.git/blob - bsd/netinet6/in6_pcb.c
xnu-2050.24.15.tar.gz
[apple/xnu.git] / bsd / netinet6 / in6_pcb.c
1 /*
2 * Copyright (c) 2003-2012 Apple Inc. All rights reserved.
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28 /*
29 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
30 * All rights reserved.
31 *
32 * Redistribution and use in source and binary forms, with or without
33 * modification, are permitted provided that the following conditions
34 * are met:
35 * 1. Redistributions of source code must retain the above copyright
36 * notice, this list of conditions and the following disclaimer.
37 * 2. Redistributions in binary form must reproduce the above copyright
38 * notice, this list of conditions and the following disclaimer in the
39 * documentation and/or other materials provided with the distribution.
40 * 3. Neither the name of the project nor the names of its contributors
41 * may be used to endorse or promote products derived from this software
42 * without specific prior written permission.
43 *
44 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
45 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
46 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
47 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
48 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
49 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
50 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
51 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
52 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
53 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
54 * SUCH DAMAGE.
55 *
56 */
57
58 /*
59 * Copyright (c) 1982, 1986, 1991, 1993
60 * The Regents of the University of California. All rights reserved.
61 *
62 * Redistribution and use in source and binary forms, with or without
63 * modification, are permitted provided that the following conditions
64 * are met:
65 * 1. Redistributions of source code must retain the above copyright
66 * notice, this list of conditions and the following disclaimer.
67 * 2. Redistributions in binary form must reproduce the above copyright
68 * notice, this list of conditions and the following disclaimer in the
69 * documentation and/or other materials provided with the distribution.
70 * 3. All advertising materials mentioning features or use of this software
71 * must display the following acknowledgement:
72 * This product includes software developed by the University of
73 * California, Berkeley and its contributors.
74 * 4. Neither the name of the University nor the names of its contributors
75 * may be used to endorse or promote products derived from this software
76 * without specific prior written permission.
77 *
78 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
79 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
80 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
81 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
82 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
83 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
84 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
85 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
86 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
87 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
88 * SUCH DAMAGE.
89 *
90 * @(#)in_pcb.c 8.2 (Berkeley) 1/4/94
91 */
92
93 #include <sys/param.h>
94 #include <sys/systm.h>
95 #include <sys/malloc.h>
96 #include <sys/mbuf.h>
97 #include <sys/domain.h>
98 #include <sys/protosw.h>
99 #include <sys/socket.h>
100 #include <sys/socketvar.h>
101 #include <sys/sockio.h>
102 #include <sys/errno.h>
103 #include <sys/time.h>
104 #include <sys/proc.h>
105 #include <sys/kauth.h>
106 #include <sys/priv.h>
107
108 #include <net/if.h>
109 #include <net/if_types.h>
110 #include <net/route.h>
111
112 #include <netinet/in.h>
113 #include <netinet/in_var.h>
114 #include <netinet/in_systm.h>
115 #include <netinet/ip6.h>
116 #include <netinet/ip_var.h>
117 #include <netinet6/ip6_var.h>
118 #include <netinet6/nd6.h>
119 #include <netinet/in_pcb.h>
120 #include <netinet6/in6_pcb.h>
121 #include <net/if_types.h>
122 #include <net/if_var.h>
123
124 #include <kern/kern_types.h>
125 #include <kern/zalloc.h>
126
127 #if IPSEC
128 #include <netinet6/ipsec.h>
129 #if INET6
130 #include <netinet6/ipsec6.h>
131 #endif
132 #include <netinet6/ah.h>
133 #if INET6
134 #include <netinet6/ah6.h>
135 #endif
136 #include <netkey/key.h>
137 #endif /* IPSEC */
138
139 struct in6_addr zeroin6_addr;
140
141 /*
142 in6_pcblookup_local_and_cleanup does everything
143 in6_pcblookup_local does but it checks for a socket
144 that's going away. Since we know that the lock is
145 held read+write when this function is called, we
146 can safely dispose of this socket like the slow
147 timer would usually do and return NULL. This is
148 great for bind.
149 */
150 static struct inpcb*
151 in6_pcblookup_local_and_cleanup(
152 struct inpcbinfo *pcbinfo,
153 struct in6_addr *laddr,
154 u_int lport_arg,
155 int wild_okay)
156 {
157 struct inpcb *inp;
158
159 /* Perform normal lookup */
160 inp = in6_pcblookup_local(pcbinfo, laddr, lport_arg, wild_okay);
161
162 /* Check if we found a match but it's waiting to be disposed */
163 if (inp && inp->inp_wantcnt == WNT_STOPUSING) {
164 struct socket *so = inp->inp_socket;
165
166 lck_mtx_lock(&inp->inpcb_mtx);
167
168 if (so->so_usecount == 0) {
169 if (inp->inp_state != INPCB_STATE_DEAD)
170 in6_pcbdetach(inp);
171 in_pcbdispose(inp);
172 inp = NULL;
173 }
174 else {
175 lck_mtx_unlock(&inp->inpcb_mtx);
176 }
177 }
178
179 return inp;
180 }
181
182 int
183 in6_pcbbind(struct inpcb *inp, struct sockaddr *nam, struct proc *p)
184 {
185 struct socket *so = inp->inp_socket;
186 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)NULL;
187 struct inpcbinfo *pcbinfo = inp->inp_pcbinfo;
188 u_short lport = 0;
189 int wild = 0, reuseport = (so->so_options & SO_REUSEPORT);
190 #if !CONFIG_EMBEDDED
191 int error;
192 kauth_cred_t cred;
193 #endif
194
195 if (!in6_ifaddrs) /* XXX broken! */
196 return (EADDRNOTAVAIL);
197 if (inp->inp_lport || !IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr))
198 return(EINVAL);
199 if ((so->so_options & (SO_REUSEADDR|SO_REUSEPORT)) == 0)
200 wild = 1;
201 socket_unlock(so, 0); /* keep reference */
202 lck_rw_lock_exclusive(pcbinfo->mtx);
203 if (nam) {
204 struct ifnet *outif = NULL;
205
206 sin6 = (struct sockaddr_in6 *)(void *)nam;
207 if (nam->sa_len != sizeof(*sin6)) {
208 lck_rw_done(pcbinfo->mtx);
209 socket_lock(so, 0);
210 return(EINVAL);
211 }
212 /*
213 * family check.
214 */
215 if (nam->sa_family != AF_INET6) {
216 lck_rw_done(pcbinfo->mtx);
217 socket_lock(so, 0);
218 return(EAFNOSUPPORT);
219 }
220
221 /* KAME hack: embed scopeid */
222 if (in6_embedscope(&sin6->sin6_addr, sin6, inp, NULL,
223 NULL) != 0) {
224 lck_rw_done(pcbinfo->mtx);
225 socket_lock(so, 0);
226 return EINVAL;
227 }
228 /* this must be cleared for ifa_ifwithaddr() */
229 sin6->sin6_scope_id = 0;
230
231 lport = sin6->sin6_port;
232 if (IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr)) {
233 /*
234 * Treat SO_REUSEADDR as SO_REUSEPORT for multicast;
235 * allow compepte duplication of binding if
236 * SO_REUSEPORT is set, or if SO_REUSEADDR is set
237 * and a multicast address is bound on both
238 * new and duplicated sockets.
239 */
240 if (so->so_options & SO_REUSEADDR)
241 reuseport = SO_REUSEADDR|SO_REUSEPORT;
242 } else if (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
243 struct ifaddr *ifa;
244
245 sin6->sin6_port = 0; /* yech... */
246 if ((ifa = ifa_ifwithaddr((struct sockaddr *)sin6)) == 0) {
247 lck_rw_done(pcbinfo->mtx);
248 socket_lock(so, 0);
249 return(EADDRNOTAVAIL);
250 }
251
252 /*
253 * XXX: bind to an anycast address might accidentally
254 * cause sending a packet with anycast source address.
255 * We should allow to bind to a deprecated address, since
256 * the application dare to use it.
257 */
258 if (ifa != NULL) {
259 IFA_LOCK_SPIN(ifa);
260 if (((struct in6_ifaddr *)ifa)->ia6_flags &
261 (IN6_IFF_ANYCAST|IN6_IFF_NOTREADY|IN6_IFF_DETACHED)) {
262 IFA_UNLOCK(ifa);
263 IFA_REMREF(ifa);
264 lck_rw_done(pcbinfo->mtx);
265 socket_lock(so, 0);
266 return(EADDRNOTAVAIL);
267 }
268 outif = ifa->ifa_ifp;
269 IFA_UNLOCK(ifa);
270 IFA_REMREF(ifa);
271 }
272 }
273 if (lport) {
274 struct inpcb *t;
275
276 /* GROSS */
277 #if !CONFIG_EMBEDDED
278 if (ntohs(lport) < IPV6PORT_RESERVED) {
279 cred = kauth_cred_proc_ref(p);
280 error = priv_check_cred(cred, PRIV_NETINET_RESERVEDPORT, 0);
281 kauth_cred_unref(&cred);
282 if (error != 0) {
283 lck_rw_done(pcbinfo->mtx);
284 socket_lock(so, 0);
285 return(EACCES);
286 }
287 }
288 #endif
289
290 if (kauth_cred_getuid(so->so_cred) &&
291 !IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr)) {
292 t = in6_pcblookup_local_and_cleanup(pcbinfo,
293 &sin6->sin6_addr, lport,
294 INPLOOKUP_WILDCARD);
295 if (t &&
296 (!IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr) ||
297 !IN6_IS_ADDR_UNSPECIFIED(&t->in6p_laddr) ||
298 (t->inp_socket->so_options &
299 SO_REUSEPORT) == 0) &&
300 (kauth_cred_getuid(so->so_cred) !=
301 kauth_cred_getuid(t->inp_socket->so_cred)) &&
302 ((t->inp_socket->so_flags & SOF_REUSESHAREUID) == 0)) {
303 lck_rw_done(pcbinfo->mtx);
304 socket_lock(so, 0);
305 return (EADDRINUSE);
306 }
307 if ((inp->inp_flags & IN6P_IPV6_V6ONLY) == 0 &&
308 IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
309 struct sockaddr_in sin;
310
311 in6_sin6_2_sin(&sin, sin6);
312 t = in_pcblookup_local_and_cleanup(pcbinfo,
313 sin.sin_addr, lport,
314 INPLOOKUP_WILDCARD);
315 if (t && (t->inp_socket->so_options & SO_REUSEPORT) == 0 &&
316 (kauth_cred_getuid(so->so_cred) !=
317 kauth_cred_getuid(t->inp_socket->so_cred)) &&
318 (ntohl(t->inp_laddr.s_addr) !=
319 INADDR_ANY ||
320 INP_SOCKAF(so) ==
321 INP_SOCKAF(t->inp_socket))) {
322
323 lck_rw_done(pcbinfo->mtx);
324 socket_lock(so, 0);
325 return (EADDRINUSE);
326 }
327 }
328 }
329 t = in6_pcblookup_local_and_cleanup(pcbinfo, &sin6->sin6_addr,
330 lport, wild);
331 if (t && (reuseport & t->inp_socket->so_options) == 0) {
332 lck_rw_done(pcbinfo->mtx);
333 socket_lock(so, 0);
334 return(EADDRINUSE);
335 }
336 if ((inp->inp_flags & IN6P_IPV6_V6ONLY) == 0 &&
337 IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
338 struct sockaddr_in sin;
339
340 in6_sin6_2_sin(&sin, sin6);
341 t = in_pcblookup_local_and_cleanup(pcbinfo, sin.sin_addr,
342 lport, wild);
343 if (t &&
344 (reuseport & t->inp_socket->so_options)
345 == 0 &&
346 (ntohl(t->inp_laddr.s_addr)
347 != INADDR_ANY ||
348 INP_SOCKAF(so) ==
349 INP_SOCKAF(t->inp_socket))) {
350 lck_rw_done(pcbinfo->mtx);
351 socket_lock(so, 0);
352 return (EADDRINUSE);
353 }
354 }
355 }
356 inp->in6p_laddr = sin6->sin6_addr;
357 inp->in6p_last_outifp = outif;
358 }
359 socket_lock(so, 0);
360 if (lport == 0) {
361 int e;
362 if ((e = in6_pcbsetport(&inp->in6p_laddr, inp, p, 1)) != 0) {
363 lck_rw_done(pcbinfo->mtx);
364 return(e);
365 }
366 }
367 else {
368 inp->inp_lport = lport;
369 if (in_pcbinshash(inp, 1) != 0) {
370 inp->in6p_laddr = in6addr_any;
371 inp->inp_lport = 0;
372 inp->in6p_last_outifp = NULL;
373 lck_rw_done(pcbinfo->mtx);
374 return (EAGAIN);
375 }
376 }
377 lck_rw_done(pcbinfo->mtx);
378 sflt_notify(so, sock_evt_bound, NULL);
379 return(0);
380 }
381
382 /*
383 * Transform old in6_pcbconnect() into an inner subroutine for new
384 * in6_pcbconnect(): Do some validity-checking on the remote
385 * address (in mbuf 'nam') and then determine local host address
386 * (i.e., which interface) to use to access that remote host.
387 *
388 * This preserves definition of in6_pcbconnect(), while supporting a
389 * slightly different version for T/TCP. (This is more than
390 * a bit of a kludge, but cleaning up the internal interfaces would
391 * have forced minor changes in every protocol).
392 *
393 * This routine might return an ifp with a reference held if the caller
394 * provides a non-NULL outif, even in the error case. The caller is
395 * responsible for releasing its reference.
396 */
397 int
398 in6_pcbladdr(struct inpcb *inp, struct sockaddr *nam,
399 struct in6_addr *plocal_addr6, struct ifnet **outif)
400 {
401 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)(void *)nam;
402 struct in6_addr *addr6 = NULL;
403 struct in6_addr src_storage;
404 int error = 0;
405 unsigned int ifscope;
406
407 if (outif != NULL)
408 *outif = NULL;
409 if (nam->sa_len != sizeof (*sin6))
410 return (EINVAL);
411 if (sin6->sin6_family != AF_INET6)
412 return (EAFNOSUPPORT);
413 if (sin6->sin6_port == 0)
414 return (EADDRNOTAVAIL);
415
416 /* KAME hack: embed scopeid */
417 if (in6_embedscope(&sin6->sin6_addr, sin6, inp, NULL, NULL) != 0)
418 return (EINVAL);
419
420 if (in6_ifaddrs) {
421 /*
422 * If the destination address is UNSPECIFIED addr,
423 * use the loopback addr, e.g ::1.
424 */
425 if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr))
426 sin6->sin6_addr = in6addr_loopback;
427 }
428
429 ifscope = (inp->inp_flags & INP_BOUND_IF) ?
430 inp->inp_boundifp->if_index : IFSCOPE_NONE;
431
432 /*
433 * XXX: in6_selectsrc might replace the bound local address
434 * with the address specified by setsockopt(IPV6_PKTINFO).
435 * Is it the intended behavior?
436 *
437 * in6_selectsrc() might return outif with its reference held
438 * even in the error case; caller always needs to release it
439 * if non-NULL.
440 */
441 addr6 = in6_selectsrc(sin6, inp->in6p_outputopts, inp,
442 &inp->in6p_route, outif, &src_storage, ifscope, &error);
443
444 if (outif != NULL) {
445 struct rtentry *rt = inp->in6p_route.ro_rt;
446 /*
447 * If in6_selectsrc() returns a route, it should be one
448 * which points to the same ifp as outif. Just in case
449 * it isn't, use the one from the route for consistency.
450 * Otherwise if there is no route, leave outif alone as
451 * it could still be useful to the caller.
452 */
453 if (rt != NULL && rt->rt_ifp != *outif) {
454 ifnet_reference(rt->rt_ifp); /* for caller */
455 if (*outif != NULL)
456 ifnet_release(*outif);
457 *outif = rt->rt_ifp;
458 }
459 }
460
461 if (addr6 == NULL) {
462 if (outif != NULL && (*outif) != NULL &&
463 (inp->inp_flags & INP_NO_IFT_CELLULAR) &&
464 (*outif)->if_type == IFT_CELLULAR)
465 soevent(inp->inp_socket,
466 (SO_FILT_HINT_LOCKED | SO_FILT_HINT_IFDENIED));
467 if (error == 0)
468 error = EADDRNOTAVAIL;
469 return (error);
470 }
471
472 *plocal_addr6 = *addr6;
473 /*
474 * Don't do pcblookup call here; return interface in
475 * plocal_addr6 and exit to caller, that will do the lookup.
476 */
477 return (0);
478 }
479
480 /*
481 * Outer subroutine:
482 * Connect from a socket to a specified address.
483 * Both address and port must be specified in argument sin.
484 * If don't have a local address for this socket yet,
485 * then pick one.
486 */
487 int
488 in6_pcbconnect(
489 struct inpcb *inp,
490 struct sockaddr *nam,
491 struct proc *p)
492 {
493 struct in6_addr addr6;
494 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)(void *)nam;
495 struct inpcb *pcb;
496 int error = 0;
497 struct ifnet *outif = NULL;
498
499 /*
500 * Call inner routine, to assign local interface address.
501 * in6_pcbladdr() may automatically fill in sin6_scope_id.
502 *
503 * in6_pcbladdr() might return an ifp with its reference held
504 * even in the error case, so make sure that it's released
505 * whenever it's non-NULL.
506 */
507 if ((error = in6_pcbladdr(inp, nam, &addr6, &outif)) != 0) {
508 if ((inp->inp_flags & INP_NO_IFT_CELLULAR) &&
509 outif != NULL &&
510 outif->if_type == IFT_CELLULAR)
511 soevent(inp->inp_socket,
512 (SO_FILT_HINT_LOCKED | SO_FILT_HINT_IFDENIED));
513 goto done;
514 }
515 socket_unlock(inp->inp_socket, 0);
516 pcb = in6_pcblookup_hash(inp->inp_pcbinfo, &sin6->sin6_addr,
517 sin6->sin6_port,
518 IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr)
519 ? &addr6 : &inp->in6p_laddr,
520 inp->inp_lport, 0, NULL);
521 socket_lock(inp->inp_socket, 0);
522 if (pcb != NULL) {
523 in_pcb_checkstate(pcb, WNT_RELEASE, pcb == inp ? 1 : 0);
524 error = EADDRINUSE;
525 goto done;
526 }
527 if (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr)) {
528 if (inp->inp_lport == 0) {
529 error = in6_pcbbind(inp, (struct sockaddr *)0, p);
530 if (error)
531 goto done;
532 }
533 inp->in6p_laddr = addr6;
534 inp->in6p_last_outifp = outif; /* no reference needed */
535 }
536 if (!lck_rw_try_lock_exclusive(inp->inp_pcbinfo->mtx)) {
537 /*lock inversion issue, mostly with udp multicast packets */
538 socket_unlock(inp->inp_socket, 0);
539 lck_rw_lock_exclusive(inp->inp_pcbinfo->mtx);
540 socket_lock(inp->inp_socket, 0);
541 }
542 inp->in6p_faddr = sin6->sin6_addr;
543 inp->inp_fport = sin6->sin6_port;
544 /* update flowinfo - draft-itojun-ipv6-flowlabel-api-00 */
545 inp->in6p_flowinfo &= ~IPV6_FLOWLABEL_MASK;
546 if (inp->in6p_flags & IN6P_AUTOFLOWLABEL)
547 inp->in6p_flowinfo |=
548 (htonl(ip6_flow_seq++) & IPV6_FLOWLABEL_MASK);
549
550 in_pcbrehash(inp);
551 lck_rw_done(inp->inp_pcbinfo->mtx);
552
553 done:
554 if (outif != NULL)
555 ifnet_release(outif);
556
557 return (error);
558 }
559
560 void
561 in6_pcbdisconnect(
562 struct inpcb *inp)
563 {
564 if (!lck_rw_try_lock_exclusive(inp->inp_pcbinfo->mtx)) {
565 /*lock inversion issue, mostly with udp multicast packets */
566 socket_unlock(inp->inp_socket, 0);
567 lck_rw_lock_exclusive(inp->inp_pcbinfo->mtx);
568 socket_lock(inp->inp_socket, 0);
569 }
570 bzero((caddr_t)&inp->in6p_faddr, sizeof(inp->in6p_faddr));
571 inp->inp_fport = 0;
572 /* clear flowinfo - draft-itojun-ipv6-flowlabel-api-00 */
573 inp->in6p_flowinfo &= ~IPV6_FLOWLABEL_MASK;
574 in_pcbrehash(inp);
575 lck_rw_done(inp->inp_pcbinfo->mtx);
576 if (inp->inp_socket->so_state & SS_NOFDREF)
577 in6_pcbdetach(inp);
578 }
579
580 void
581 in6_pcbdetach(
582 struct inpcb *inp)
583 {
584 struct socket *so = inp->inp_socket;
585 struct inpcbinfo *ipi = inp->inp_pcbinfo;
586
587 #if IPSEC
588 if (inp->in6p_sp != NULL) {
589 ipsec6_delete_pcbpolicy(inp);
590 }
591 #endif /* IPSEC */
592
593 if (in_pcb_checkstate(inp, WNT_STOPUSING, 1) != WNT_STOPUSING)
594 printf("in6_pcbdetach so=%p can't be marked dead ok\n", so);
595
596 inp->inp_state = INPCB_STATE_DEAD;
597
598 if ((so->so_flags & SOF_PCBCLEARING) == 0) {
599 struct ip_moptions *imo;
600 struct ip6_moptions *im6o;
601
602 inp->inp_vflag = 0;
603 so->so_flags |= SOF_PCBCLEARING;
604 inp->inp_gencnt = ++ipi->ipi_gencnt;
605 if (inp->in6p_options)
606 m_freem(inp->in6p_options);
607 ip6_freepcbopts(inp->in6p_outputopts);
608 if (inp->in6p_route.ro_rt) {
609 rtfree(inp->in6p_route.ro_rt);
610 inp->in6p_route.ro_rt = NULL;
611 }
612 /* Check and free IPv4 related resources in case of mapped addr */
613 if (inp->inp_options)
614 (void)m_free(inp->inp_options);
615
616 im6o = inp->in6p_moptions;
617 inp->in6p_moptions = NULL;
618 if (im6o != NULL)
619 IM6O_REMREF(im6o);
620
621 imo = inp->inp_moptions;
622 inp->inp_moptions = NULL;
623 if (imo != NULL)
624 IMO_REMREF(imo);
625 }
626 }
627
628 struct sockaddr *
629 in6_sockaddr(
630 in_port_t port,
631 struct in6_addr *addr_p)
632 {
633 struct sockaddr_in6 *sin6;
634
635 MALLOC(sin6, struct sockaddr_in6 *, sizeof *sin6, M_SONAME, M_WAITOK);
636 if (sin6 == NULL)
637 return NULL;
638 bzero(sin6, sizeof *sin6);
639 sin6->sin6_family = AF_INET6;
640 sin6->sin6_len = sizeof(*sin6);
641 sin6->sin6_port = port;
642 sin6->sin6_addr = *addr_p;
643 if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr))
644 sin6->sin6_scope_id = ntohs(sin6->sin6_addr.s6_addr16[1]);
645 else
646 sin6->sin6_scope_id = 0; /*XXX*/
647 if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr))
648 sin6->sin6_addr.s6_addr16[1] = 0;
649
650 return (struct sockaddr *)sin6;
651 }
652
653 struct sockaddr *
654 in6_v4mapsin6_sockaddr(
655 in_port_t port,
656 struct in_addr *addr_p)
657 {
658 struct sockaddr_in sin;
659 struct sockaddr_in6 *sin6_p;
660
661 bzero(&sin, sizeof sin);
662 sin.sin_family = AF_INET;
663 sin.sin_len = sizeof(sin);
664 sin.sin_port = port;
665 sin.sin_addr = *addr_p;
666
667 MALLOC(sin6_p, struct sockaddr_in6 *, sizeof *sin6_p, M_SONAME,
668 M_WAITOK);
669 if (sin6_p == NULL)
670 return NULL;
671 in6_sin_2_v4mapsin6(&sin, sin6_p);
672
673 return (struct sockaddr *)sin6_p;
674 }
675
676 /*
677 * The calling convention of in6_setsockaddr() and in6_setpeeraddr() was
678 * modified to match the pru_sockaddr() and pru_peeraddr() entry points
679 * in struct pr_usrreqs, so that protocols can just reference then directly
680 * without the need for a wrapper function. The socket must have a valid
681 * (i.e., non-nil) PCB, but it should be impossible to get an invalid one
682 * except through a kernel programming error, so it is acceptable to panic
683 * (or in this case trap) if the PCB is invalid. (Actually, we don't trap
684 * because there actually /is/ a programming error somewhere... XXX)
685 */
686 int
687 in6_setsockaddr(
688 struct socket *so,
689 struct sockaddr **nam)
690 {
691 struct inpcb *inp;
692 struct in6_addr addr;
693 in_port_t port;
694
695 inp = sotoinpcb(so);
696 if (!inp) {
697 return EINVAL;
698 }
699 port = inp->inp_lport;
700 addr = inp->in6p_laddr;
701
702 *nam = in6_sockaddr(port, &addr);
703 if (*nam == NULL)
704 return ENOBUFS;
705 return 0;
706 }
707
708 int
709 in6_setpeeraddr(
710 struct socket *so,
711 struct sockaddr **nam)
712 {
713 struct inpcb *inp;
714 struct in6_addr addr;
715 in_port_t port;
716
717 inp = sotoinpcb(so);
718 if (!inp) {
719 return EINVAL;
720 }
721 port = inp->inp_fport;
722 addr = inp->in6p_faddr;
723
724 *nam = in6_sockaddr(port, &addr);
725 if (*nam == NULL)
726 return ENOBUFS;
727 return 0;
728 }
729
730 int
731 in6_mapped_sockaddr(struct socket *so, struct sockaddr **nam)
732 {
733 struct inpcb *inp = sotoinpcb(so);
734 int error;
735
736 if (inp == NULL)
737 return EINVAL;
738 if (inp->inp_vflag & INP_IPV4) {
739 error = in_setsockaddr(so, nam);
740 if (error == 0)
741 error = in6_sin_2_v4mapsin6_in_sock(nam);
742 } else {
743 /* scope issues will be handled in in6_setsockaddr(). */
744 error = in6_setsockaddr(so, nam);
745 }
746 return error;
747 }
748
749 int
750 in6_mapped_peeraddr(struct socket *so, struct sockaddr **nam)
751 {
752 struct inpcb *inp = sotoinpcb(so);
753 int error;
754
755 if (inp == NULL)
756 return EINVAL;
757 if (inp->inp_vflag & INP_IPV4) {
758 error = in_setpeeraddr(so, nam);
759 if (error == 0)
760 error = in6_sin_2_v4mapsin6_in_sock(nam);
761 } else {
762 /* scope issues will be handled in in6_setpeeraddr(). */
763 error = in6_setpeeraddr(so, nam);
764 }
765 return error;
766 }
767
768 /*
769 * Pass some notification to all connections of a protocol
770 * associated with address dst. The local address and/or port numbers
771 * may be specified to limit the search. The "usual action" will be
772 * taken, depending on the ctlinput cmd. The caller must filter any
773 * cmds that are uninteresting (e.g., no error in the map).
774 * Call the protocol specific routine (if any) to report
775 * any errors for each matching socket.
776 */
777 void
778 in6_pcbnotify(pcbinfo, dst, fport_arg, src, lport_arg, cmd, cmdarg, notify)
779 struct inpcbinfo *pcbinfo;
780 struct sockaddr *dst;
781 const struct sockaddr *src;
782 u_int fport_arg, lport_arg;
783 int cmd;
784 void *cmdarg;
785 void (*notify)(struct inpcb *, int);
786 {
787 struct inpcb *inp, *ninp;
788 struct sockaddr_in6 sa6_src, *sa6_dst;
789 u_short fport = fport_arg, lport = lport_arg;
790 u_int32_t flowinfo;
791 int errno;
792 struct inpcbhead *head = pcbinfo->listhead;
793
794 if ((unsigned)cmd > PRC_NCMDS || dst->sa_family != AF_INET6)
795 return;
796
797 sa6_dst = (struct sockaddr_in6 *)(void *)dst;
798 if (IN6_IS_ADDR_UNSPECIFIED(&sa6_dst->sin6_addr))
799 return;
800
801 /*
802 * note that src can be NULL when we get notify by local fragmentation.
803 */
804 sa6_src = (src == NULL) ?
805 sa6_any : *(struct sockaddr_in6 *)(uintptr_t)(size_t)src;
806 flowinfo = sa6_src.sin6_flowinfo;
807
808 /*
809 * Redirects go to all references to the destination,
810 * and use in6_rtchange to invalidate the route cache.
811 * Dead host indications: also use in6_rtchange to invalidate
812 * the cache, and deliver the error to all the sockets.
813 * Otherwise, if we have knowledge of the local port and address,
814 * deliver only to that socket.
815 */
816 if (PRC_IS_REDIRECT(cmd) || cmd == PRC_HOSTDEAD) {
817 fport = 0;
818 lport = 0;
819 bzero((caddr_t)&sa6_src.sin6_addr, sizeof(sa6_src.sin6_addr));
820
821 if (cmd != PRC_HOSTDEAD)
822 notify = in6_rtchange;
823 }
824 errno = inet6ctlerrmap[cmd];
825 lck_rw_lock_shared(pcbinfo->mtx);
826 for (inp = LIST_FIRST(head); inp != NULL; inp = ninp) {
827 ninp = LIST_NEXT(inp, inp_list);
828
829 if ((inp->inp_vflag & INP_IPV6) == 0)
830 continue;
831
832 /*
833 * If the error designates a new path MTU for a destination
834 * and the application (associated with this socket) wanted to
835 * know the value, notify. Note that we notify for all
836 * disconnected sockets if the corresponding application
837 * wanted. This is because some UDP applications keep sending
838 * sockets disconnected.
839 * XXX: should we avoid to notify the value to TCP sockets?
840 */
841 if (cmd == PRC_MSGSIZE && (inp->inp_flags & IN6P_MTU) != 0 &&
842 (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_faddr) ||
843 IN6_ARE_ADDR_EQUAL(&inp->in6p_faddr, &sa6_dst->sin6_addr))) {
844 ip6_notify_pmtu(inp, (struct sockaddr_in6 *)(void *)dst,
845 (u_int32_t *)cmdarg);
846 }
847
848 /*
849 * Detect if we should notify the error. If no source and
850 * destination ports are specifed, but non-zero flowinfo and
851 * local address match, notify the error. This is the case
852 * when the error is delivered with an encrypted buffer
853 * by ESP. Otherwise, just compare addresses and ports
854 * as usual.
855 */
856 if (lport == 0 && fport == 0 && flowinfo &&
857 inp->inp_socket != NULL &&
858 flowinfo == (inp->in6p_flowinfo & IPV6_FLOWLABEL_MASK) &&
859 IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr, &sa6_src.sin6_addr))
860 goto do_notify;
861 else if (!IN6_ARE_ADDR_EQUAL(&inp->in6p_faddr,
862 &sa6_dst->sin6_addr) ||
863 inp->inp_socket == 0 ||
864 (lport && inp->inp_lport != lport) ||
865 (!IN6_IS_ADDR_UNSPECIFIED(&sa6_src.sin6_addr) &&
866 !IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr,
867 &sa6_src.sin6_addr)) ||
868 (fport && inp->inp_fport != fport))
869 continue;
870
871
872 do_notify:
873 if (notify) {
874 if (in_pcb_checkstate(inp, WNT_ACQUIRE, 0) == WNT_STOPUSING)
875 continue;
876 socket_lock(inp->inp_socket, 1);
877 (*notify)(inp, errno);
878 (void)in_pcb_checkstate(inp, WNT_RELEASE, 1);
879 socket_unlock(inp->inp_socket, 1);
880 }
881 }
882 lck_rw_done(pcbinfo->mtx);
883 }
884
885 /*
886 * Lookup a PCB based on the local address and port.
887 */
888 struct inpcb *
889 in6_pcblookup_local(
890 struct inpcbinfo *pcbinfo,
891 struct in6_addr *laddr,
892 u_int lport_arg,
893 int wild_okay)
894 {
895 struct inpcb *inp;
896 int matchwild = 3, wildcard;
897 u_short lport = lport_arg;
898
899 if (!wild_okay) {
900 struct inpcbhead *head;
901 /*
902 * Look for an unconnected (wildcard foreign addr) PCB that
903 * matches the local address and port we're looking for.
904 */
905 head = &pcbinfo->hashbase[INP_PCBHASH(INADDR_ANY, lport, 0,
906 pcbinfo->hashmask)];
907 LIST_FOREACH(inp, head, inp_hash) {
908 if ((inp->inp_vflag & INP_IPV6) == 0)
909 continue;
910 if (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_faddr) &&
911 IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr, laddr) &&
912 inp->inp_lport == lport) {
913 /*
914 * Found.
915 */
916 return (inp);
917 }
918 }
919 /*
920 * Not found.
921 */
922 return (NULL);
923 } else {
924 struct inpcbporthead *porthash;
925 struct inpcbport *phd;
926 struct inpcb *match = NULL;
927 /*
928 * Best fit PCB lookup.
929 *
930 * First see if this local port is in use by looking on the
931 * port hash list.
932 */
933 porthash = &pcbinfo->porthashbase[INP_PCBPORTHASH(lport,
934 pcbinfo->porthashmask)];
935 LIST_FOREACH(phd, porthash, phd_hash) {
936 if (phd->phd_port == lport)
937 break;
938 }
939 if (phd != NULL) {
940 /*
941 * Port is in use by one or more PCBs. Look for best
942 * fit.
943 */
944 LIST_FOREACH(inp, &phd->phd_pcblist, inp_portlist) {
945 wildcard = 0;
946 if ((inp->inp_vflag & INP_IPV6) == 0)
947 continue;
948 if (!IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_faddr))
949 wildcard++;
950 if (!IN6_IS_ADDR_UNSPECIFIED(
951 &inp->in6p_laddr)) {
952 if (IN6_IS_ADDR_UNSPECIFIED(laddr))
953 wildcard++;
954 else if (!IN6_ARE_ADDR_EQUAL(
955 &inp->in6p_laddr, laddr))
956 continue;
957 } else {
958 if (!IN6_IS_ADDR_UNSPECIFIED(laddr))
959 wildcard++;
960 }
961 if (wildcard < matchwild) {
962 match = inp;
963 matchwild = wildcard;
964 if (matchwild == 0) {
965 break;
966 }
967 }
968 }
969 }
970 return (match);
971 }
972 }
973
974 /*
975 * Check for alternatives when higher level complains
976 * about service problems. For now, invalidate cached
977 * routing information. If the route was created dynamically
978 * (by a redirect), time to try a default gateway again.
979 */
980 void
981 in6_losing(
982 struct inpcb *in6p)
983 {
984 struct rtentry *rt;
985 struct rt_addrinfo info;
986
987 if ((rt = in6p->in6p_route.ro_rt) != NULL) {
988 in6p->in6p_route.ro_rt = NULL;
989 RT_LOCK(rt);
990 bzero((caddr_t)&info, sizeof(info));
991 info.rti_info[RTAX_DST] =
992 (struct sockaddr *)&in6p->in6p_route.ro_dst;
993 info.rti_info[RTAX_GATEWAY] = rt->rt_gateway;
994 info.rti_info[RTAX_NETMASK] = rt_mask(rt);
995 rt_missmsg(RTM_LOSING, &info, rt->rt_flags, 0);
996 if (rt->rt_flags & RTF_DYNAMIC) {
997 /*
998 * Prevent another thread from modifying rt_key,
999 * rt_gateway via rt_setgate() after the rt_lock
1000 * is dropped by marking the route as defunct.
1001 */
1002 rt->rt_flags |= RTF_CONDEMNED;
1003 RT_UNLOCK(rt);
1004 (void) rtrequest(RTM_DELETE, rt_key(rt),
1005 rt->rt_gateway, rt_mask(rt), rt->rt_flags, NULL);
1006 } else {
1007 RT_UNLOCK(rt);
1008 }
1009 /*
1010 * A new route can be allocated
1011 * the next time output is attempted.
1012 */
1013 rtfree(rt);
1014 }
1015 }
1016
1017 /*
1018 * After a routing change, flush old routing
1019 * and allocate a (hopefully) better one.
1020 */
1021 void
1022 in6_rtchange(
1023 struct inpcb *inp,
1024 __unused int errno)
1025 {
1026 if (inp->in6p_route.ro_rt) {
1027 rtfree(inp->in6p_route.ro_rt);
1028 inp->in6p_route.ro_rt = 0;
1029 /*
1030 * A new route can be allocated the next time
1031 * output is attempted.
1032 */
1033 }
1034 }
1035
1036 /*
1037 * Check if PCB exists hash list. Also returns uid and gid of socket
1038 */
1039 int
1040 in6_pcblookup_hash_exists(
1041 struct inpcbinfo *pcbinfo,
1042 struct in6_addr *faddr,
1043 u_int fport_arg,
1044 struct in6_addr *laddr,
1045 u_int lport_arg,
1046 int wildcard,
1047 uid_t *uid,
1048 gid_t *gid,
1049 struct ifnet *ifp)
1050 {
1051 struct inpcbhead *head;
1052 struct inpcb *inp;
1053 u_short fport = fport_arg, lport = lport_arg;
1054 int found;
1055
1056 *uid = UID_MAX;
1057 *gid = GID_MAX;
1058
1059 lck_rw_lock_shared(pcbinfo->mtx);
1060
1061 /*
1062 * First look for an exact match.
1063 */
1064 head = &pcbinfo->hashbase[INP_PCBHASH(faddr->s6_addr32[3] /* XXX */,
1065 lport, fport,
1066 pcbinfo->hashmask)];
1067 LIST_FOREACH(inp, head, inp_hash) {
1068 if ((inp->inp_vflag & INP_IPV6) == 0)
1069 continue;
1070
1071 if (ip6_restrictrecvif && ifp != NULL &&
1072 (ifp->if_eflags & IFEF_RESTRICTED_RECV) &&
1073 !(inp->in6p_flags & IN6P_RECV_ANYIF))
1074 continue;
1075
1076 if (IN6_ARE_ADDR_EQUAL(&inp->in6p_faddr, faddr) &&
1077 IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr, laddr) &&
1078 inp->inp_fport == fport &&
1079 inp->inp_lport == lport) {
1080 if ((found = (inp->inp_socket != NULL))) {
1081 /*
1082 * Found. Check if pcb is still valid
1083 */
1084 *uid = kauth_cred_getuid(
1085 inp->inp_socket->so_cred);
1086 *gid = kauth_cred_getgid(
1087 inp->inp_socket->so_cred);
1088 }
1089 lck_rw_done(pcbinfo->mtx);
1090 return (found);
1091 }
1092 }
1093 if (wildcard) {
1094 struct inpcb *local_wild = NULL;
1095
1096 head = &pcbinfo->hashbase[INP_PCBHASH(INADDR_ANY, lport, 0,
1097 pcbinfo->hashmask)];
1098 LIST_FOREACH(inp, head, inp_hash) {
1099 if ((inp->inp_vflag & INP_IPV6) == 0)
1100 continue;
1101
1102 if (ip6_restrictrecvif && ifp != NULL &&
1103 (ifp->if_eflags & IFEF_RESTRICTED_RECV) &&
1104 !(inp->in6p_flags & IN6P_RECV_ANYIF))
1105 continue;
1106
1107 if (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_faddr) &&
1108 inp->inp_lport == lport) {
1109 if (IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr,
1110 laddr)) {
1111 if ((found = (inp->inp_socket != NULL))) {
1112 *uid = kauth_cred_getuid(
1113 inp->inp_socket->so_cred);
1114 *gid = kauth_cred_getgid(
1115 inp->inp_socket->so_cred);
1116 }
1117 lck_rw_done(pcbinfo->mtx);
1118 return (found);
1119 }
1120 else if (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr))
1121 local_wild = inp;
1122 }
1123 }
1124 if (local_wild) {
1125 if ((found = (local_wild->inp_socket != NULL))) {
1126 *uid = kauth_cred_getuid(
1127 local_wild->inp_socket->so_cred);
1128 *gid = kauth_cred_getgid(
1129 local_wild->inp_socket->so_cred);
1130 }
1131 lck_rw_done(pcbinfo->mtx);
1132 return (found);
1133 }
1134 }
1135
1136 /*
1137 * Not found.
1138 */
1139 lck_rw_done(pcbinfo->mtx);
1140 return (0);
1141 }
1142
1143 /*
1144 * Lookup PCB in hash list.
1145 */
1146 struct inpcb *
1147 in6_pcblookup_hash(
1148 struct inpcbinfo *pcbinfo,
1149 struct in6_addr *faddr,
1150 u_int fport_arg,
1151 struct in6_addr *laddr,
1152 u_int lport_arg,
1153 int wildcard,
1154 __unused struct ifnet *ifp)
1155 {
1156 struct inpcbhead *head;
1157 struct inpcb *inp;
1158 u_short fport = fport_arg, lport = lport_arg;
1159
1160 lck_rw_lock_shared(pcbinfo->mtx);
1161
1162 /*
1163 * First look for an exact match.
1164 */
1165 head = &pcbinfo->hashbase[INP_PCBHASH(faddr->s6_addr32[3] /* XXX */,
1166 lport, fport,
1167 pcbinfo->hashmask)];
1168 LIST_FOREACH(inp, head, inp_hash) {
1169 if ((inp->inp_vflag & INP_IPV6) == 0)
1170 continue;
1171
1172 if (ip6_restrictrecvif && ifp != NULL &&
1173 (ifp->if_eflags & IFEF_RESTRICTED_RECV) &&
1174 !(inp->in6p_flags & IN6P_RECV_ANYIF))
1175 continue;
1176
1177 if (IN6_ARE_ADDR_EQUAL(&inp->in6p_faddr, faddr) &&
1178 IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr, laddr) &&
1179 inp->inp_fport == fport &&
1180 inp->inp_lport == lport) {
1181 /*
1182 * Found. Check if pcb is still valid
1183 */
1184 if (in_pcb_checkstate(inp, WNT_ACQUIRE, 0) != WNT_STOPUSING) {
1185 lck_rw_done(pcbinfo->mtx);
1186 return (inp);
1187 }
1188 else { /* it's there but dead, say it isn't found */
1189 lck_rw_done(pcbinfo->mtx);
1190 return (NULL);
1191 }
1192 }
1193 }
1194 if (wildcard) {
1195 struct inpcb *local_wild = NULL;
1196
1197 head = &pcbinfo->hashbase[INP_PCBHASH(INADDR_ANY, lport, 0,
1198 pcbinfo->hashmask)];
1199 LIST_FOREACH(inp, head, inp_hash) {
1200 if ((inp->inp_vflag & INP_IPV6) == 0)
1201 continue;
1202
1203 if (ip6_restrictrecvif && ifp != NULL &&
1204 (ifp->if_eflags & IFEF_RESTRICTED_RECV) &&
1205 !(inp->in6p_flags & IN6P_RECV_ANYIF))
1206 continue;
1207
1208 if (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_faddr) &&
1209 inp->inp_lport == lport) {
1210 if (IN6_ARE_ADDR_EQUAL(&inp->in6p_laddr,
1211 laddr)) {
1212 if (in_pcb_checkstate(inp, WNT_ACQUIRE, 0) != WNT_STOPUSING) {
1213 lck_rw_done(pcbinfo->mtx);
1214 return (inp);
1215 }
1216 else { /* it's there but dead, say it isn't found */
1217 lck_rw_done(pcbinfo->mtx);
1218 return (NULL);
1219 }
1220 }
1221 else if (IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr))
1222 local_wild = inp;
1223 }
1224 }
1225 if (local_wild && in_pcb_checkstate(local_wild, WNT_ACQUIRE, 0) != WNT_STOPUSING) {
1226 lck_rw_done(pcbinfo->mtx);
1227 return (local_wild);
1228 }
1229 else {
1230 lck_rw_done(pcbinfo->mtx);
1231 return (NULL);
1232 }
1233 }
1234
1235 /*
1236 * Not found.
1237 */
1238 lck_rw_done(pcbinfo->mtx);
1239 return (NULL);
1240 }
1241
1242 void
1243 init_sin6(struct sockaddr_in6 *sin6, struct mbuf *m)
1244 {
1245 struct ip6_hdr *ip;
1246
1247 ip = mtod(m, struct ip6_hdr *);
1248 bzero(sin6, sizeof(*sin6));
1249 sin6->sin6_len = sizeof(*sin6);
1250 sin6->sin6_family = AF_INET6;
1251 sin6->sin6_addr = ip->ip6_src;
1252 if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr))
1253 sin6->sin6_addr.s6_addr16[1] = 0;
1254 sin6->sin6_scope_id =
1255 (m->m_pkthdr.rcvif && IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr))
1256 ? m->m_pkthdr.rcvif->if_index : 0;
1257
1258 return;
1259 }
1260
1261 void
1262 in6p_route_copyout(struct inpcb *inp, struct route_in6 *dst)
1263 {
1264 struct route_in6 *src = &inp->in6p_route;
1265
1266 lck_mtx_assert(&inp->inpcb_mtx, LCK_MTX_ASSERT_OWNED);
1267
1268 /* Minor sanity check */
1269 if (src->ro_rt != NULL && rt_key(src->ro_rt)->sa_family != AF_INET6)
1270 panic("%s: wrong or corrupted route: %p", __func__, src);
1271
1272 route_copyout((struct route *)dst, (struct route *)src, sizeof(*dst));
1273 }
1274
1275 void
1276 in6p_route_copyin(struct inpcb *inp, struct route_in6 *src)
1277 {
1278 struct route_in6 *dst = &inp->in6p_route;
1279
1280 lck_mtx_assert(&inp->inpcb_mtx, LCK_MTX_ASSERT_OWNED);
1281
1282 /* Minor sanity check */
1283 if (src->ro_rt != NULL && rt_key(src->ro_rt)->sa_family != AF_INET6)
1284 panic("%s: wrong or corrupted route: %p", __func__, src);
1285
1286 route_copyin((struct route *)src, (struct route *)dst, sizeof(*src));
1287 }
1288