2 * Copyright (c) 2000-2018 Apple Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
29 /* $FreeBSD: src/sys/net/if_stf.c,v 1.1.2.6 2001/07/24 19:10:18 brooks Exp $ */
30 /* $KAME: if_stf.c,v 1.62 2001/06/07 22:32:16 itojun Exp $ */
33 * Copyright (C) 2000 WIDE Project.
34 * All rights reserved.
36 * Redistribution and use in source and binary forms, with or without
37 * modification, are permitted provided that the following conditions
39 * 1. Redistributions of source code must retain the above copyright
40 * notice, this list of conditions and the following disclaimer.
41 * 2. Redistributions in binary form must reproduce the above copyright
42 * notice, this list of conditions and the following disclaimer in the
43 * documentation and/or other materials provided with the distribution.
44 * 3. Neither the name of the project nor the names of its contributors
45 * may be used to endorse or promote products derived from this software
46 * without specific prior written permission.
48 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
49 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
50 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
51 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
52 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
53 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
54 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
55 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
56 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
57 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
61 * NOTICE: This file was modified by SPARTA, Inc. in 2006 to introduce
62 * support for mandatory and extensible security protections. This notice
63 * is included in support of clause 2.2 (b) of the Apple Public License,
68 * 6to4 interface, based on RFC3056.
70 * 6to4 interface is NOT capable of link-layer (I mean, IPv4) multicasting.
71 * There is no address mapping defined from IPv6 multicast address to IPv4
72 * address. Therefore, we do not have IFF_MULTICAST on the interface.
74 * Due to the lack of address mapping for link-local addresses, we cannot
75 * throw packets toward link-local addresses (fe80::x). Also, we cannot throw
76 * packets to link-local multicast addresses (ff02::x).
78 * Here are interesting symptoms due to the lack of link-local address:
80 * Unicast routing exchange:
81 * - RIPng: Impossible. Uses link-local multicast packet toward ff02::9,
82 * and link-local addresses as nexthop.
83 * - OSPFv6: Impossible. OSPFv6 assumes that there's link-local address
84 * assigned to the link, and makes use of them. Also, HELLO packets use
85 * link-local multicast addresses (ff02::5 and ff02::6).
86 * - BGP4+: Maybe. You can only use global address as nexthop, and global
87 * address as TCP endpoint address.
89 * Multicast routing protocols:
90 * - PIM: Hello packet cannot be used to discover adjacent PIM routers.
91 * Adjacent PIM routers must be configured manually (is it really spec-wise
92 * correct thing to do?).
95 * - Redirects cannot be used due to the lack of link-local address.
97 * stf interface does not have, and will not need, a link-local address.
98 * It seems to have no real benefit and does not help the above symptoms much.
99 * Even if we assign link-locals to interface, we cannot really
100 * use link-local unicast/multicast on top of 6to4 cloud (since there's no
101 * encapsulation defined for link-local address), and the above analysis does
102 * not change. RFC3056 does not mandate the assignment of link-local address
105 * 6to4 interface has security issues. Refer to
106 * http://playground.iijlab.net/i-d/draft-itojun-ipv6-transition-abuse-00.txt
107 * for details. The code tries to filter out some of malicious packets.
108 * Note that there is no way to be 100% secure.
111 #include <sys/param.h>
112 #include <sys/systm.h>
113 #include <sys/socket.h>
114 #include <sys/sockio.h>
115 #include <sys/mbuf.h>
116 #include <sys/errno.h>
117 #include <sys/protosw.h>
118 #include <sys/kernel.h>
119 #include <sys/syslog.h>
121 #include <sys/malloc.h>
123 #include <kern/locks.h>
126 #include <net/route.h>
127 #include <net/if_types.h>
129 #include <netinet/in.h>
130 #include <netinet/in_systm.h>
131 #include <netinet/ip.h>
132 #include <netinet/ip_var.h>
133 #include <netinet/in_var.h>
135 #include <netinet/ip6.h>
136 #include <netinet6/ip6_var.h>
137 #include <netinet6/in6_var.h>
138 #include <netinet/ip_ecn.h>
140 #include <netinet/ip_encap.h>
141 #include <net/kpi_interface.h>
142 #include <net/kpi_protocol.h>
145 #include <net/net_osdep.h>
150 #include <security/mac_framework.h>
153 #define GET_V4(x) ((const struct in_addr *)(const void *)(&(x)->s6_addr16[1]))
155 static lck_grp_t
*stf_mtx_grp
;
158 ifnet_t sc_if
; /* common area */
159 u_int32_t sc_protocol_family
; /* dlil protocol attached */
161 struct route __sc_ro4
;
162 struct route_in6 __sc_ro6
; /* just for safety */
164 #define sc_ro __sc_ro46.__sc_ro4
165 decl_lck_mtx_data(, sc_ro_mtx
);
166 const struct encaptab
*encap_cookie
;
167 bpf_tap_mode tap_mode
;
168 bpf_packet_func tap_callback
;
171 void stfattach(void);
173 static int ip_stf_ttl
= 40;
174 static int stf_init_done
;
176 static void in_stf_input(struct mbuf
*, int);
177 static void stfinit(void);
179 static struct protosw in_stf_protosw
=
182 .pr_protocol
= IPPROTO_IPV6
,
183 .pr_flags
= PR_ATOMIC
| PR_ADDR
,
184 .pr_input
= in_stf_input
,
185 .pr_ctloutput
= rip_ctloutput
,
186 .pr_usrreqs
= &rip_usrreqs
,
187 .pr_unlock
= rip_unlock
,
190 static int stf_encapcheck(const struct mbuf
*, int, int, void *);
191 static struct in6_ifaddr
*stf_getsrcifa6(struct ifnet
*);
192 int stf_pre_output(struct ifnet
*, protocol_family_t
, struct mbuf
**,
193 const struct sockaddr
*, void *, char *, char *);
194 static int stf_checkaddr4(struct stf_softc
*, const struct in_addr
*,
196 static int stf_checkaddr6(struct stf_softc
*, struct in6_addr
*,
198 static void stf_rtrequest(int, struct rtentry
*, struct sockaddr
*);
199 static errno_t
stf_ioctl(ifnet_t ifp
, u_long cmd
, void *data
);
200 static errno_t
stf_output(ifnet_t ifp
, mbuf_t m
);
205 if (!stf_init_done
) {
206 stf_mtx_grp
= lck_grp_alloc_init("stf", LCK_GRP_ATTR_NULL
);
212 * gif_input is the input handler for IP and IPv6 attached to gif
216 __unused ifnet_t ifp
,
217 protocol_family_t protocol_family
,
219 __unused
char *frame_header
)
221 if (proto_input(protocol_family
, m
) != 0) {
233 protocol_family_t protocol_family
,
234 __unused
const struct ifnet_demux_desc
*demux_array
,
235 __unused u_int32_t demux_count
)
237 /* Only one protocol may be attached at a time */
238 struct stf_softc
* stf
= ifnet_softc(ifp
);
239 if (stf
->sc_protocol_family
== 0) {
240 stf
->sc_protocol_family
= protocol_family
;
242 printf("stf_add_proto: stf already has a proto\n");
252 protocol_family_t protocol_family
)
254 if (((struct stf_softc
*)ifnet_softc(ifp
))->sc_protocol_family
== protocol_family
) {
255 ((struct stf_softc
*)ifnet_softc(ifp
))->sc_protocol_family
= 0;
264 protocol_family_t protocol_family
)
266 struct ifnet_attach_proto_param reg
;
269 if (protocol_family
!= PF_INET6
) {
270 return EPROTONOSUPPORT
;
273 bzero(®
, sizeof(reg
));
274 reg
.input
= stf_media_input
;
275 reg
.pre_output
= stf_pre_output
;
277 stat
= ifnet_attach_protocol(ifp
, protocol_family
, ®
);
278 if (stat
&& stat
!= EEXIST
) {
279 printf("stf_attach_proto_family can't attach interface fam=%d\n",
290 __unused
char *frame_ptr
,
291 protocol_family_t
*protocol_family
)
293 struct stf_softc
* stf
= ifnet_softc(ifp
);
294 *protocol_family
= stf
->sc_protocol_family
;
302 bpf_packet_func callback
)
304 struct stf_softc
*sc
= ifnet_softc(ifp
);
307 sc
->tap_callback
= callback
;
315 struct stf_softc
*sc
;
317 const struct encaptab
*p
;
318 struct ifnet_init_eparams stf_init
;
322 error
= proto_register_plumber(PF_INET6
, APPLE_IF_FAM_STF
,
323 stf_attach_inet6
, NULL
);
325 printf("proto_register_plumber failed for AF_INET6 error=%d\n", error
);
328 sc
= _MALLOC(sizeof(struct stf_softc
), M_DEVBUF
, M_WAITOK
| M_ZERO
);
330 printf("stf softc attach failed\n" );
334 p
= encap_attach_func(AF_INET
, IPPROTO_IPV6
, stf_encapcheck
,
335 &in_stf_protosw
, sc
);
337 printf("sftattach encap_attach_func failed\n");
341 sc
->encap_cookie
= p
;
342 lck_mtx_init(&sc
->sc_ro_mtx
, stf_mtx_grp
, LCK_ATTR_NULL
);
344 bzero(&stf_init
, sizeof(stf_init
));
345 stf_init
.ver
= IFNET_INIT_CURRENT_VERSION
;
346 stf_init
.len
= sizeof(stf_init
);
347 stf_init
.flags
= IFNET_INIT_LEGACY
;
348 stf_init
.name
= "stf";
350 stf_init
.type
= IFT_STF
;
351 stf_init
.family
= IFNET_FAMILY_STF
;
352 stf_init
.output
= stf_output
;
353 stf_init
.demux
= stf_demux
;
354 stf_init
.add_proto
= stf_add_proto
;
355 stf_init
.del_proto
= stf_del_proto
;
357 stf_init
.ioctl
= stf_ioctl
;
358 stf_init
.set_bpf_tap
= stf_set_bpf_tap
;
360 error
= ifnet_allocate_extended(&stf_init
, &sc
->sc_if
);
362 printf("stfattach, ifnet_allocate failed - %d\n", error
);
363 encap_detach(sc
->encap_cookie
);
364 lck_mtx_destroy(&sc
->sc_ro_mtx
, stf_mtx_grp
);
368 ifnet_set_mtu(sc
->sc_if
, IPV6_MMTU
);
369 ifnet_set_flags(sc
->sc_if
, 0, 0xffff); /* clear all flags */
371 /* turn off ingress filter */
372 ifnet_set_flags(sc
->sc_if
, IFF_LINK2
, IFF_LINK2
);
376 mac_ifnet_label_init(&sc
->sc_if
);
379 error
= ifnet_attach(sc
->sc_if
, NULL
);
381 printf("stfattach: ifnet_attach returned error=%d\n", error
);
382 encap_detach(sc
->encap_cookie
);
383 ifnet_release(sc
->sc_if
);
384 lck_mtx_destroy(&sc
->sc_ro_mtx
, stf_mtx_grp
);
389 bpfattach(sc
->sc_if
, DLT_NULL
, sizeof(u_int
));
396 const struct mbuf
*m
,
402 struct in6_ifaddr
*ia6
;
403 struct stf_softc
*sc
;
406 sc
= (struct stf_softc
*)arg
;
411 if ((ifnet_flags(sc
->sc_if
) & IFF_UP
) == 0) {
415 /* IFF_LINK0 means "no decapsulation" */
416 if ((ifnet_flags(sc
->sc_if
) & IFF_LINK0
) != 0) {
420 if (proto
!= IPPROTO_IPV6
) {
424 mbuf_copydata((struct mbuf
*)(size_t)m
, 0, sizeof(ip
), &ip
);
430 ia6
= stf_getsrcifa6(sc
->sc_if
);
436 * check if IPv4 dst matches the IPv4 address derived from the
437 * local 6to4 address.
438 * success on: dst = 10.1.1.1, ia6->ia_addr = 2002:0a01:0101:...
440 IFA_LOCK(&ia6
->ia_ifa
);
441 if (bcmp(GET_V4(&ia6
->ia_addr
.sin6_addr
), &ip
.ip_dst
,
442 sizeof(ip
.ip_dst
)) != 0) {
443 IFA_UNLOCK(&ia6
->ia_ifa
);
444 IFA_REMREF(&ia6
->ia_ifa
);
448 * check if IPv4 src matches the IPv4 address derived from the
449 * local 6to4 address masked by prefixmask.
450 * success on: src = 10.1.1.1, ia6->ia_addr = 2002:0a00:.../24
451 * fail on: src = 10.1.1.1, ia6->ia_addr = 2002:0b00:.../24
453 bzero(&a
, sizeof(a
));
454 a
.s_addr
= GET_V4(&ia6
->ia_addr
.sin6_addr
)->s_addr
;
455 a
.s_addr
&= GET_V4(&ia6
->ia_prefixmask
.sin6_addr
)->s_addr
;
457 b
.s_addr
&= GET_V4(&ia6
->ia_prefixmask
.sin6_addr
)->s_addr
;
458 if (a
.s_addr
!= b
.s_addr
) {
459 IFA_UNLOCK(&ia6
->ia_ifa
);
460 IFA_REMREF(&ia6
->ia_ifa
);
463 /* stf interface makes single side match only */
464 IFA_UNLOCK(&ia6
->ia_ifa
);
465 IFA_REMREF(&ia6
->ia_ifa
);
469 static struct in6_ifaddr
*
470 stf_getsrcifa6(struct ifnet
*ifp
)
473 struct in_ifaddr
*ia4
;
474 struct sockaddr_in6
*sin6
;
477 ifnet_lock_shared(ifp
);
478 for (ia
= ifp
->if_addrlist
.tqh_first
; ia
; ia
= ia
->ifa_list
.tqe_next
) {
480 if (ia
->ifa_addr
== NULL
) {
484 if (ia
->ifa_addr
->sa_family
!= AF_INET6
) {
488 sin6
= (struct sockaddr_in6
*)(void *)ia
->ifa_addr
;
489 if (!IN6_IS_ADDR_6TO4(&sin6
->sin6_addr
)) {
493 bcopy(GET_V4(&sin6
->sin6_addr
), &in
, sizeof(in
));
495 lck_rw_lock_shared(in_ifaddr_rwlock
);
496 for (ia4
= TAILQ_FIRST(&in_ifaddrhead
);
498 ia4
= TAILQ_NEXT(ia4
, ia_link
)) {
499 IFA_LOCK(&ia4
->ia_ifa
);
500 if (ia4
->ia_addr
.sin_addr
.s_addr
== in
.s_addr
) {
501 IFA_UNLOCK(&ia4
->ia_ifa
);
504 IFA_UNLOCK(&ia4
->ia_ifa
);
506 lck_rw_done(in_ifaddr_rwlock
);
511 IFA_ADDREF(ia
); /* for caller */
512 ifnet_lock_done(ifp
);
513 return (struct in6_ifaddr
*)ia
;
515 ifnet_lock_done(ifp
);
523 __unused protocol_family_t protocol_family
,
525 const struct sockaddr
*dst
,
526 __unused
void *route
,
527 __unused
char *desk_linkaddr
,
528 __unused
char *frame_type
)
530 struct mbuf
*m
= *m0
;
531 struct stf_softc
*sc
;
532 const struct sockaddr_in6
*dst6
;
533 const struct in_addr
*in4
;
537 struct in6_ifaddr
*ia6
;
538 struct sockaddr_in
*dst4
;
539 struct ip_out_args ipoa
;
542 bzero(&ipoa
, sizeof(ipoa
));
543 ipoa
.ipoa_boundif
= IFSCOPE_NONE
;
544 ipoa
.ipoa_flags
= IPOAF_SELECT_SRCIF
;
545 ipoa
.ipoa_sotc
= SO_TC_UNSPEC
;
546 ipoa
.ipoa_netsvctype
= _NET_SERVICE_TYPE_UNSPEC
;
548 sc
= ifnet_softc(ifp
);
549 dst6
= (const struct sockaddr_in6
*)(const void *)dst
;
552 if ((ifnet_flags(ifp
) & IFF_UP
) == 0) {
553 printf("stf: IFF_DOWN\n");
558 * If we don't have an ip4 address that match my inner ip6 address,
559 * we shouldn't generate output. Without this check, we'll end up
560 * using wrong IPv4 source.
562 ia6
= stf_getsrcifa6(ifp
);
567 if (mbuf_len(m
) < sizeof(*ip6
)) {
568 m
= m_pullup(m
, sizeof(*ip6
));
570 *m0
= NULL
; /* makes sure this won't be double freed */
571 IFA_REMREF(&ia6
->ia_ifa
);
575 ip6
= mtod(m
, struct ip6_hdr
*);
576 tos
= (ntohl(ip6
->ip6_flow
) >> 20) & 0xff;
579 * Pickup the right outer dst addr from the list of candidates.
580 * ip6_dst has priority as it may be able to give us shorter IPv4 hops.
582 if (IN6_IS_ADDR_6TO4(&ip6
->ip6_dst
)) {
583 in4
= GET_V4(&ip6
->ip6_dst
);
584 } else if (IN6_IS_ADDR_6TO4(&dst6
->sin6_addr
)) {
585 in4
= GET_V4(&dst6
->sin6_addr
);
587 IFA_REMREF(&ia6
->ia_ifa
);
592 /* We need to prepend the address family as a four byte field. */
593 u_int32_t af
= AF_INET6
;
595 bpf_tap_out(ifp
, 0, m
, &af
, sizeof(af
));
598 M_PREPEND(m
, sizeof(struct ip
), M_DONTWAIT
, 1);
599 if (m
&& mbuf_len(m
) < sizeof(struct ip
)) {
600 m
= m_pullup(m
, sizeof(struct ip
));
604 IFA_REMREF(&ia6
->ia_ifa
);
607 ip
= mtod(m
, struct ip
*);
609 bzero(ip
, sizeof(*ip
));
611 IFA_LOCK_SPIN(&ia6
->ia_ifa
);
612 bcopy(GET_V4(&((struct sockaddr_in6
*)&ia6
->ia_addr
)->sin6_addr
),
613 &ip
->ip_src
, sizeof(ip
->ip_src
));
614 IFA_UNLOCK(&ia6
->ia_ifa
);
615 bcopy(in4
, &ip
->ip_dst
, sizeof(ip
->ip_dst
));
616 ip
->ip_p
= IPPROTO_IPV6
;
617 ip
->ip_ttl
= ip_stf_ttl
;
618 ip
->ip_len
= m
->m_pkthdr
.len
; /*host order*/
619 if (ifp
->if_flags
& IFF_LINK1
) {
620 ip_ecn_ingress(ECN_NORMAL
, &ip
->ip_tos
, &tos
);
622 ip_ecn_ingress(ECN_NOCARE
, &ip
->ip_tos
, &tos
);
625 lck_mtx_lock(&sc
->sc_ro_mtx
);
626 dst4
= (struct sockaddr_in
*)(void *)&sc
->sc_ro
.ro_dst
;
627 if (ROUTE_UNUSABLE(&sc
->sc_ro
) || dst4
->sin_family
!= AF_INET
||
628 bcmp(&dst4
->sin_addr
, &ip
->ip_dst
, sizeof(ip
->ip_dst
)) != 0) {
629 ROUTE_RELEASE(&sc
->sc_ro
);
630 /* cache route doesn't match: always the case during the first use */
631 dst4
->sin_family
= AF_INET
;
632 dst4
->sin_len
= sizeof(struct sockaddr_in
);
633 bcopy(&ip
->ip_dst
, &dst4
->sin_addr
, sizeof(dst4
->sin_addr
));
636 result
= ip_output(m
, NULL
, &sc
->sc_ro
, IP_OUTARGS
, NULL
, &ipoa
);
637 lck_mtx_unlock(&sc
->sc_ro_mtx
);
639 /* Assumption: ip_output will free mbuf on errors */
640 /* All the output processing is done here, don't let stf_output be called */
642 result
= EJUSTRETURN
;
645 IFA_REMREF(&ia6
->ia_ifa
);
650 __unused ifnet_t ifp
,
653 /* All processing is done in stf_pre_output
654 * this shouldn't be called as the pre_output returns "EJUSTRETURN"
661 struct stf_softc
*sc
,
662 const struct in_addr
*in
,
663 struct ifnet
*inifp
) /* incoming interface */
665 struct in_ifaddr
*ia4
;
668 * reject packets with the following address:
669 * 224.0.0.0/4 0.0.0.0/8 127.0.0.0/8 255.0.0.0/8
671 if (IN_MULTICAST(ntohl(in
->s_addr
))) {
674 switch ((ntohl(in
->s_addr
) & 0xff000000) >> 24) {
675 case 0: case 127: case 255:
680 * reject packets with broadcast
682 lck_rw_lock_shared(in_ifaddr_rwlock
);
683 for (ia4
= TAILQ_FIRST(&in_ifaddrhead
);
685 ia4
= TAILQ_NEXT(ia4
, ia_link
)) {
686 IFA_LOCK(&ia4
->ia_ifa
);
687 if ((ia4
->ia_ifa
.ifa_ifp
->if_flags
& IFF_BROADCAST
) == 0) {
688 IFA_UNLOCK(&ia4
->ia_ifa
);
691 if (in
->s_addr
== ia4
->ia_broadaddr
.sin_addr
.s_addr
) {
692 IFA_UNLOCK(&ia4
->ia_ifa
);
693 lck_rw_done(in_ifaddr_rwlock
);
696 IFA_UNLOCK(&ia4
->ia_ifa
);
698 lck_rw_done(in_ifaddr_rwlock
);
701 * perform ingress filter
703 if (sc
&& (ifnet_flags(sc
->sc_if
) & IFF_LINK2
) == 0 && inifp
) {
704 struct sockaddr_in sin
;
707 bzero(&sin
, sizeof(sin
));
708 sin
.sin_family
= AF_INET
;
709 sin
.sin_len
= sizeof(struct sockaddr_in
);
711 rt
= rtalloc1((struct sockaddr
*)&sin
, 0, 0);
715 if (rt
== NULL
|| rt
->rt_ifp
!= inifp
) {
717 log(LOG_WARNING
, "%s: packet from 0x%x dropped "
718 "due to ingress filter\n", if_name(sc
->sc_if
),
719 (u_int32_t
)ntohl(sin
.sin_addr
.s_addr
));
736 struct stf_softc
*sc
,
737 struct in6_addr
*in6
,
738 struct ifnet
*inifp
) /* incoming interface */
741 * check 6to4 addresses
743 if (IN6_IS_ADDR_6TO4(in6
)) {
744 return stf_checkaddr4(sc
, GET_V4(in6
), inifp
);
748 * reject anything that look suspicious. the test is implemented
749 * in ip6_input too, but we check here as well to
750 * (1) reject bad packets earlier, and
751 * (2) to be safe against future ip6_input change.
753 if (IN6_IS_ADDR_V4COMPAT(in6
) || IN6_IS_ADDR_V4MAPPED(in6
)) {
765 struct stf_softc
*sc
;
771 struct ifnet_stat_increment_param stats
;
773 ip
= mtod(m
, struct ip
*);
776 if (proto
!= IPPROTO_IPV6
) {
781 ip
= mtod(m
, struct ip
*);
783 sc
= (struct stf_softc
*)encap_getarg(m
);
785 if (sc
== NULL
|| (ifnet_flags(sc
->sc_if
) & IFF_UP
) == 0) {
793 mac_mbuf_label_associate_ifnet(ifp
, m
);
797 * perform sanity check against outer src/dst.
798 * for source, perform ingress filter as well.
800 if (stf_checkaddr4(sc
, &ip
->ip_dst
, NULL
) < 0 ||
801 stf_checkaddr4(sc
, &ip
->ip_src
, m
->m_pkthdr
.rcvif
) < 0) {
807 mbuf_copydata(m
, off
, sizeof(ip6
), &ip6
);
810 * perform sanity check against inner src/dst.
811 * for source, perform ingress filter as well.
813 if (stf_checkaddr6(sc
, &ip6
.ip6_dst
, NULL
) < 0 ||
814 stf_checkaddr6(sc
, &ip6
.ip6_src
, m
->m_pkthdr
.rcvif
) < 0) {
819 itos
= (ntohl(ip6
.ip6_flow
) >> 20) & 0xff;
820 if ((ifnet_flags(ifp
) & IFF_LINK1
) != 0) {
821 ip_ecn_egress(ECN_NORMAL
, &otos
, &itos
);
823 ip_ecn_egress(ECN_NOCARE
, &otos
, &itos
);
825 ip6
.ip6_flow
&= ~htonl(0xff << 20);
826 ip6
.ip6_flow
|= htonl((u_int32_t
)itos
<< 20);
828 m
->m_pkthdr
.rcvif
= ifp
;
829 mbuf_pkthdr_setheader(m
, mbuf_data(m
));
833 /* We need to prepend the address family as a four byte field. */
834 u_int32_t af
= AF_INET6
;
835 bpf_tap_in(ifp
, 0, m
, &af
, sizeof(af
));
839 * Put the packet to the network layer input queue according to the
840 * specified address family.
841 * See net/if_gif.c for possible issues with packet processing
842 * reorder due to extra queueing.
844 bzero(&stats
, sizeof(stats
));
845 stats
.packets_in
= 1;
846 stats
.bytes_in
= mbuf_pkthdr_len(m
);
847 mbuf_pkthdr_setrcvif(m
, ifp
);
848 ifnet_input(ifp
, m
, &stats
);
857 __unused
struct sockaddr
*sa
)
860 RT_LOCK_ASSERT_HELD(rt
);
861 rt
->rt_rmx
.rmx_mtu
= IPV6_MMTU
;
873 struct sockaddr_in6
*sin6
;
879 ifa
= (struct ifaddr
*)data
;
881 error
= EAFNOSUPPORT
;
885 if (ifa
->ifa_addr
->sa_family
!= AF_INET6
) {
887 error
= EAFNOSUPPORT
;
890 sin6
= (struct sockaddr_in6
*)(void *)ifa
->ifa_addr
;
891 if (IN6_IS_ADDR_6TO4(&sin6
->sin6_addr
)) {
892 if (!(ifnet_flags( ifp
) & IFF_UP
)) {
893 /* do this only if the interface is not already up */
894 ifa
->ifa_rtrequest
= stf_rtrequest
;
896 ifnet_set_flags(ifp
, IFF_UP
, IFF_UP
);
904 IFA_LOCK_ASSERT_NOTHELD(ifa
);
909 ifr
= (struct ifreq
*)data
;
910 if (ifr
&& ifr
->ifr_addr
.sa_family
== AF_INET6
) {
913 error
= EAFNOSUPPORT
;