]> git.saurik.com Git - apple/xnu.git/blob - bsd/netinet6/raw_ip6.c
xnu-6153.81.5.tar.gz
[apple/xnu.git] / bsd / netinet6 / raw_ip6.c
1 /*
2 * Copyright (c) 2000-2019 Apple Inc. All rights reserved.
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28 /*
29 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
30 * All rights reserved.
31 *
32 * Redistribution and use in source and binary forms, with or without
33 * modification, are permitted provided that the following conditions
34 * are met:
35 * 1. Redistributions of source code must retain the above copyright
36 * notice, this list of conditions and the following disclaimer.
37 * 2. Redistributions in binary form must reproduce the above copyright
38 * notice, this list of conditions and the following disclaimer in the
39 * documentation and/or other materials provided with the distribution.
40 * 3. Neither the name of the project nor the names of its contributors
41 * may be used to endorse or promote products derived from this software
42 * without specific prior written permission.
43 *
44 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
45 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
46 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
47 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
48 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
49 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
50 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
51 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
52 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
53 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
54 * SUCH DAMAGE.
55 *
56 * $FreeBSD: src/sys/netinet6/raw_ip6.c,v 1.7.2.4 2001/07/29 19:32:40 ume Exp $
57 */
58
59 /*
60 * Copyright (c) 1982, 1986, 1988, 1993
61 * The Regents of the University of California. All rights reserved.
62 *
63 * Redistribution and use in source and binary forms, with or without
64 * modification, are permitted provided that the following conditions
65 * are met:
66 * 1. Redistributions of source code must retain the above copyright
67 * notice, this list of conditions and the following disclaimer.
68 * 2. Redistributions in binary form must reproduce the above copyright
69 * notice, this list of conditions and the following disclaimer in the
70 * documentation and/or other materials provided with the distribution.
71 * 3. All advertising materials mentioning features or use of this software
72 * must display the following acknowledgement:
73 * This product includes software developed by the University of
74 * California, Berkeley and its contributors.
75 * 4. Neither the name of the University nor the names of its contributors
76 * may be used to endorse or promote products derived from this software
77 * without specific prior written permission.
78 *
79 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
80 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
81 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
82 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
83 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
84 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
85 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
86 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
87 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
88 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
89 * SUCH DAMAGE.
90 *
91 * @(#)raw_ip.c 8.2 (Berkeley) 1/4/94
92 */
93 #include <sys/param.h>
94 #include <sys/malloc.h>
95 #include <sys/proc.h>
96 #include <sys/mcache.h>
97 #include <sys/mbuf.h>
98 #include <sys/socket.h>
99 #include <sys/protosw.h>
100 #include <sys/socketvar.h>
101 #include <sys/errno.h>
102 #include <sys/systm.h>
103
104 #include <net/if.h>
105 #include <net/net_api_stats.h>
106 #include <net/route.h>
107 #include <net/if_types.h>
108
109 #include <netinet/in.h>
110 #include <netinet/in_var.h>
111 #include <netinet/in_systm.h>
112 #include <netinet/in_tclass.h>
113 #include <netinet/ip6.h>
114 #include <netinet6/ip6_var.h>
115 #include <netinet/icmp6.h>
116 #include <netinet/in_pcb.h>
117 #include <netinet6/in6_pcb.h>
118 #include <netinet6/nd6.h>
119 #include <netinet6/ip6protosw.h>
120 #include <netinet6/scope6_var.h>
121 #include <netinet6/raw_ip6.h>
122
123 #if IPSEC
124 #include <netinet6/ipsec.h>
125 #include <netinet6/ipsec6.h>
126 #endif /*IPSEC*/
127
128 #if NECP
129 #include <net/necp.h>
130 #endif
131
132 /*
133 * Raw interface to IP6 protocol.
134 */
135
136 extern struct inpcbhead ripcb;
137 extern struct inpcbinfo ripcbinfo;
138 extern u_int32_t rip_sendspace;
139 extern u_int32_t rip_recvspace;
140
141 struct rip6stat rip6stat;
142
143 /*
144 * Setup generic address and protocol structures
145 * for raw_input routine, then pass them along with
146 * mbuf chain.
147 */
148 int
149 rip6_input(
150 struct mbuf **mp,
151 int *offp,
152 int proto)
153 {
154 struct mbuf *m = *mp;
155 struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
156 struct inpcb *in6p;
157 struct inpcb *last = 0;
158 struct mbuf *opts = NULL;
159 struct sockaddr_in6 rip6src;
160 int ret;
161 struct ifnet *ifp = m->m_pkthdr.rcvif;
162
163 /* Expect 32-bit aligned data pointer on strict-align platforms */
164 MBUF_STRICT_DATA_ALIGNMENT_CHECK_32(m);
165
166 rip6stat.rip6s_ipackets++;
167
168 init_sin6(&rip6src, m); /* general init */
169
170 lck_rw_lock_shared(ripcbinfo.ipi_lock);
171 LIST_FOREACH(in6p, &ripcb, inp_list) {
172 if ((in6p->in6p_vflag & INP_IPV6) == 0) {
173 continue;
174 }
175 if (in6p->in6p_ip6_nxt &&
176 in6p->in6p_ip6_nxt != proto) {
177 continue;
178 }
179 if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_laddr) &&
180 !IN6_ARE_ADDR_EQUAL(&in6p->in6p_laddr, &ip6->ip6_dst)) {
181 continue;
182 }
183 if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr) &&
184 !IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr, &ip6->ip6_src)) {
185 continue;
186 }
187
188 if (inp_restricted_recv(in6p, ifp)) {
189 continue;
190 }
191
192 if (proto == IPPROTO_ICMPV6 || in6p->in6p_cksum != -1) {
193 rip6stat.rip6s_isum++;
194 if (in6_cksum(m, ip6->ip6_nxt, *offp,
195 m->m_pkthdr.len - *offp)) {
196 rip6stat.rip6s_badsum++;
197 continue;
198 }
199 }
200 if (last) {
201 struct mbuf *n = m_copy(m, 0, (int)M_COPYALL);
202
203 #if NECP
204 if (n && !necp_socket_is_allowed_to_send_recv_v6(in6p, 0, 0,
205 &ip6->ip6_dst, &ip6->ip6_src, ifp, NULL, NULL, NULL)) {
206 m_freem(n);
207 /* do not inject data into pcb */
208 } else
209 #endif /* NECP */
210 if (n) {
211 if ((last->in6p_flags & INP_CONTROLOPTS) != 0 ||
212 (last->in6p_socket->so_options & SO_TIMESTAMP) != 0 ||
213 (last->in6p_socket->so_options & SO_TIMESTAMP_MONOTONIC) != 0 ||
214 (last->in6p_socket->so_options & SO_TIMESTAMP_CONTINUOUS) != 0) {
215 ret = ip6_savecontrol(last, n, &opts);
216 if (ret != 0) {
217 m_freem(n);
218 m_freem(opts);
219 last = in6p;
220 continue;
221 }
222 }
223 /* strip intermediate headers */
224 m_adj(n, *offp);
225 so_recv_data_stat(last->in6p_socket, m, 0);
226 if (sbappendaddr(&last->in6p_socket->so_rcv,
227 (struct sockaddr *)&rip6src,
228 n, opts, NULL) == 0) {
229 rip6stat.rip6s_fullsock++;
230 } else {
231 sorwakeup(last->in6p_socket);
232 }
233 opts = NULL;
234 }
235 }
236 last = in6p;
237 }
238
239 #if NECP
240 if (last && !necp_socket_is_allowed_to_send_recv_v6(in6p, 0, 0,
241 &ip6->ip6_dst, &ip6->ip6_src, ifp, NULL, NULL, NULL)) {
242 m_freem(m);
243 ip6stat.ip6s_delivered--;
244 /* do not inject data into pcb */
245 } else
246 #endif /* NECP */
247 if (last) {
248 if ((last->in6p_flags & INP_CONTROLOPTS) != 0 ||
249 (last->in6p_socket->so_options & SO_TIMESTAMP) != 0 ||
250 (last->in6p_socket->so_options & SO_TIMESTAMP_MONOTONIC) != 0 ||
251 (last->in6p_socket->so_options & SO_TIMESTAMP_CONTINUOUS) != 0) {
252 ret = ip6_savecontrol(last, m, &opts);
253 if (ret != 0) {
254 m_freem(m);
255 m_freem(opts);
256 ip6stat.ip6s_delivered--;
257 goto unlock;
258 }
259 }
260 /* strip intermediate headers */
261 m_adj(m, *offp);
262 so_recv_data_stat(last->in6p_socket, m, 0);
263 if (sbappendaddr(&last->in6p_socket->so_rcv,
264 (struct sockaddr *)&rip6src, m, opts, NULL) == 0) {
265 rip6stat.rip6s_fullsock++;
266 } else {
267 sorwakeup(last->in6p_socket);
268 }
269 } else {
270 rip6stat.rip6s_nosock++;
271 if (m->m_flags & M_MCAST) {
272 rip6stat.rip6s_nosockmcast++;
273 }
274 if (proto == IPPROTO_NONE) {
275 m_freem(m);
276 } else {
277 char *prvnxtp = ip6_get_prevhdr(m, *offp); /* XXX */
278 icmp6_error(m, ICMP6_PARAM_PROB,
279 ICMP6_PARAMPROB_NEXTHEADER,
280 prvnxtp - mtod(m, char *));
281 }
282 ip6stat.ip6s_delivered--;
283 }
284
285 unlock:
286 lck_rw_done(ripcbinfo.ipi_lock);
287
288 return IPPROTO_DONE;
289 }
290
291 void
292 rip6_ctlinput(
293 int cmd,
294 struct sockaddr *sa,
295 void *d,
296 __unused struct ifnet *ifp)
297 {
298 struct ip6_hdr *ip6;
299 struct mbuf *m;
300 void *cmdarg = NULL;
301 int off = 0;
302 struct ip6ctlparam *ip6cp = NULL;
303 const struct sockaddr_in6 *sa6_src = NULL;
304 void (*notify)(struct inpcb *, int) = in6_rtchange;
305
306 if (sa->sa_family != AF_INET6 ||
307 sa->sa_len != sizeof(struct sockaddr_in6)) {
308 return;
309 }
310
311 if ((unsigned)cmd >= PRC_NCMDS) {
312 return;
313 }
314 if (PRC_IS_REDIRECT(cmd)) {
315 notify = in6_rtchange;
316 d = NULL;
317 } else if (cmd == PRC_HOSTDEAD) {
318 d = NULL;
319 } else if (inet6ctlerrmap[cmd] == 0) {
320 return;
321 }
322
323 /* if the parameter is from icmp6, decode it. */
324 if (d != NULL) {
325 ip6cp = (struct ip6ctlparam *)d;
326 m = ip6cp->ip6c_m;
327 ip6 = ip6cp->ip6c_ip6;
328 off = ip6cp->ip6c_off;
329 cmdarg = ip6cp->ip6c_cmdarg;
330 sa6_src = ip6cp->ip6c_src;
331 } else {
332 m = NULL;
333 ip6 = NULL;
334 sa6_src = &sa6_any;
335 }
336
337 (void) in6_pcbnotify(&ripcbinfo, sa, 0, (const struct sockaddr *)sa6_src,
338 0, cmd, cmdarg, notify);
339 }
340
341 /*
342 * Generate IPv6 header and pass packet to ip6_output.
343 * Tack on options user may have setup with control call.
344 */
345 int
346 rip6_output(
347 struct mbuf *m,
348 struct socket *so,
349 struct sockaddr_in6 *dstsock,
350 struct mbuf *control,
351 int israw)
352 {
353 struct in6_addr *dst;
354 struct ip6_hdr *ip6;
355 struct inpcb *in6p;
356 u_int plen = m->m_pkthdr.len;
357 int error = 0;
358 struct ip6_pktopts opt, *optp = NULL;
359 struct ip6_moptions *im6o = NULL;
360 struct ifnet *oifp = NULL;
361 int type = 0, code = 0; /* for ICMPv6 output statistics only */
362 int sotc = SO_TC_UNSPEC;
363 int netsvctype = _NET_SERVICE_TYPE_UNSPEC;
364 struct ip6_out_args ip6oa;
365 int flags = IPV6_OUTARGS;
366
367 in6p = sotoin6pcb(so);
368
369 bzero(&ip6oa, sizeof(ip6oa));
370 ip6oa.ip6oa_boundif = IFSCOPE_NONE;
371 ip6oa.ip6oa_flags = IP6OAF_SELECT_SRCIF;
372
373 if (in6p == NULL
374 #if NECP
375 || (necp_socket_should_use_flow_divert(in6p))
376 #endif /* NECP */
377 ) {
378 if (in6p == NULL) {
379 error = EINVAL;
380 } else {
381 error = EPROTOTYPE;
382 }
383 goto bad;
384 }
385 if (dstsock != NULL && IN6_IS_ADDR_V4MAPPED(&dstsock->sin6_addr)) {
386 error = EINVAL;
387 goto bad;
388 }
389
390 if (in6p->inp_flags & INP_BOUND_IF) {
391 ip6oa.ip6oa_boundif = in6p->inp_boundifp->if_index;
392 ip6oa.ip6oa_flags |= IP6OAF_BOUND_IF;
393 }
394 if (INP_NO_CELLULAR(in6p)) {
395 ip6oa.ip6oa_flags |= IP6OAF_NO_CELLULAR;
396 }
397 if (INP_NO_EXPENSIVE(in6p)) {
398 ip6oa.ip6oa_flags |= IP6OAF_NO_EXPENSIVE;
399 }
400 if (INP_NO_CONSTRAINED(in6p)) {
401 ip6oa.ip6oa_flags |= IP6OAF_NO_CONSTRAINED;
402 }
403 if (INP_AWDL_UNRESTRICTED(in6p)) {
404 ip6oa.ip6oa_flags |= IP6OAF_AWDL_UNRESTRICTED;
405 }
406 if (INP_INTCOPROC_ALLOWED(in6p)) {
407 ip6oa.ip6oa_flags |= IP6OAF_INTCOPROC_ALLOWED;
408 }
409
410 dst = &dstsock->sin6_addr;
411 if (control) {
412 sotc = so_tc_from_control(control, &netsvctype);
413
414 if ((error = ip6_setpktopts(control, &opt, NULL,
415 SOCK_PROTO(so))) != 0) {
416 goto bad;
417 }
418 optp = &opt;
419 } else {
420 optp = in6p->in6p_outputopts;
421 }
422 if (sotc == SO_TC_UNSPEC) {
423 sotc = so->so_traffic_class;
424 netsvctype = so->so_netsvctype;
425 }
426 ip6oa.ip6oa_sotc = sotc;
427 ip6oa.ip6oa_netsvctype = netsvctype;
428
429 /*
430 * For an ICMPv6 packet, we should know its type and code
431 * to update statistics.
432 */
433 if (SOCK_PROTO(so) == IPPROTO_ICMPV6) {
434 struct icmp6_hdr *icmp6;
435 if (m->m_len < sizeof(struct icmp6_hdr) &&
436 (m = m_pullup(m, sizeof(struct icmp6_hdr))) == NULL) {
437 error = ENOBUFS;
438 goto bad;
439 }
440 icmp6 = mtod(m, struct icmp6_hdr *);
441 type = icmp6->icmp6_type;
442 code = icmp6->icmp6_code;
443 }
444
445 if (in6p->inp_flowhash == 0) {
446 in6p->inp_flowhash = inp_calc_flowhash(in6p);
447 }
448 /* update flowinfo - RFC 6437 */
449 if (in6p->inp_flow == 0 && in6p->in6p_flags & IN6P_AUTOFLOWLABEL) {
450 in6p->inp_flow &= ~IPV6_FLOWLABEL_MASK;
451 in6p->inp_flow |=
452 (htonl(in6p->inp_flowhash) & IPV6_FLOWLABEL_MASK);
453 }
454
455 M_PREPEND(m, sizeof(*ip6), M_WAIT, 1);
456 if (m == NULL) {
457 error = ENOBUFS;
458 goto bad;
459 }
460 ip6 = mtod(m, struct ip6_hdr *);
461
462 /*
463 * Next header might not be ICMP6 but use its pseudo header anyway.
464 */
465 ip6->ip6_dst = *dst;
466
467 im6o = in6p->in6p_moptions;
468
469 /*
470 * If the scope of the destination is link-local, embed the interface
471 * index in the address.
472 *
473 * XXX advanced-api value overrides sin6_scope_id
474 */
475 if (IN6_IS_SCOPE_LINKLOCAL(&ip6->ip6_dst)) {
476 struct in6_pktinfo *pi;
477 struct ifnet *im6o_multicast_ifp = NULL;
478
479 if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) && im6o != NULL) {
480 IM6O_LOCK(im6o);
481 im6o_multicast_ifp = im6o->im6o_multicast_ifp;
482 IM6O_UNLOCK(im6o);
483 }
484 /*
485 * XXX Boundary check is assumed to be already done in
486 * ip6_setpktoptions().
487 */
488 ifnet_head_lock_shared();
489 if (optp && (pi = optp->ip6po_pktinfo) && pi->ipi6_ifindex) {
490 ip6->ip6_dst.s6_addr16[1] = htons(pi->ipi6_ifindex);
491 oifp = ifindex2ifnet[pi->ipi6_ifindex];
492 if (oifp != NULL) {
493 ifnet_reference(oifp);
494 }
495 } else if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) &&
496 im6o != NULL && im6o_multicast_ifp != NULL) {
497 oifp = im6o_multicast_ifp;
498 ifnet_reference(oifp);
499 ip6->ip6_dst.s6_addr16[1] = htons(oifp->if_index);
500 } else if (dstsock->sin6_scope_id) {
501 /*
502 * boundary check
503 *
504 * Sinced stsock->sin6_scope_id is unsigned, we don't
505 * need to check if it's < 0
506 */
507 if (if_index < dstsock->sin6_scope_id) {
508 error = ENXIO; /* XXX EINVAL? */
509 ifnet_head_done();
510 goto bad;
511 }
512 ip6->ip6_dst.s6_addr16[1]
513 = htons(dstsock->sin6_scope_id & 0xffff);/*XXX*/
514 }
515 ifnet_head_done();
516 }
517
518 /*
519 * Source address selection.
520 */
521 {
522 struct in6_addr *in6a;
523 struct in6_addr storage;
524 u_short index = 0;
525
526 if (israw != 0 && optp && optp->ip6po_pktinfo && !IN6_IS_ADDR_UNSPECIFIED(&optp->ip6po_pktinfo->ipi6_addr)) {
527 in6a = &optp->ip6po_pktinfo->ipi6_addr;
528 flags |= IPV6_FLAG_NOSRCIFSEL;
529 } else if ((in6a = in6_selectsrc(dstsock, optp, in6p,
530 &in6p->in6p_route, NULL, &storage, ip6oa.ip6oa_boundif,
531 &error)) == 0) {
532 if (error == 0) {
533 error = EADDRNOTAVAIL;
534 }
535 goto bad;
536 } else {
537 ip6oa.ip6oa_flags |= IP6OAF_BOUND_SRCADDR;
538 }
539 ip6->ip6_src = *in6a;
540 if (in6p->in6p_route.ro_rt != NULL) {
541 RT_LOCK(in6p->in6p_route.ro_rt);
542 if (in6p->in6p_route.ro_rt->rt_ifp != NULL) {
543 index = in6p->in6p_route.ro_rt->rt_ifp->if_index;
544 }
545 RT_UNLOCK(in6p->in6p_route.ro_rt);
546 if (oifp != NULL) {
547 ifnet_release(oifp);
548 }
549 ifnet_head_lock_shared();
550 if (index == 0 || if_index < index) {
551 panic("bad if_index on interface from route");
552 }
553 oifp = ifindex2ifnet[index];
554 if (oifp != NULL) {
555 ifnet_reference(oifp);
556 }
557 ifnet_head_done();
558 }
559 }
560 ip6->ip6_flow = (ip6->ip6_flow & ~IPV6_FLOWINFO_MASK) |
561 (in6p->inp_flow & IPV6_FLOWINFO_MASK);
562 ip6->ip6_vfc = (ip6->ip6_vfc & ~IPV6_VERSION_MASK) |
563 (IPV6_VERSION & IPV6_VERSION_MASK);
564 /* ip6_plen will be filled in ip6_output, so not fill it here. */
565 ip6->ip6_nxt = in6p->in6p_ip6_nxt;
566 ip6->ip6_hlim = in6_selecthlim(in6p, oifp);
567
568 if (SOCK_PROTO(so) == IPPROTO_ICMPV6 || in6p->in6p_cksum != -1) {
569 struct mbuf *n;
570 int off;
571 u_int16_t *p;
572
573 /* compute checksum */
574 if (SOCK_PROTO(so) == IPPROTO_ICMPV6) {
575 off = offsetof(struct icmp6_hdr, icmp6_cksum);
576 } else {
577 off = in6p->in6p_cksum;
578 }
579 if (plen < (unsigned int)(off + 1)) {
580 error = EINVAL;
581 goto bad;
582 }
583 off += sizeof(struct ip6_hdr);
584
585 n = m;
586 while (n && n->m_len <= off) {
587 off -= n->m_len;
588 n = n->m_next;
589 }
590 if (!n) {
591 goto bad;
592 }
593 p = (u_int16_t *)(void *)(mtod(n, caddr_t) + off);
594 *p = 0;
595 *p = in6_cksum(m, ip6->ip6_nxt, sizeof(*ip6), plen);
596 }
597
598 #if NECP
599 {
600 necp_kernel_policy_id policy_id;
601 necp_kernel_policy_id skip_policy_id;
602 u_int32_t route_rule_id;
603
604 /*
605 * We need a route to perform NECP route rule checks
606 */
607 if (net_qos_policy_restricted != 0 &&
608 ROUTE_UNUSABLE(&in6p->in6p_route)) {
609 struct sockaddr_in6 to;
610 struct sockaddr_in6 from;
611
612 ROUTE_RELEASE(&in6p->in6p_route);
613
614 bzero(&from, sizeof(struct sockaddr_in6));
615 from.sin6_family = AF_INET6;
616 from.sin6_len = sizeof(struct sockaddr_in6);
617 from.sin6_addr = ip6->ip6_src;
618
619 bzero(&to, sizeof(struct sockaddr_in6));
620 to.sin6_family = AF_INET6;
621 to.sin6_len = sizeof(struct sockaddr_in6);
622 to.sin6_addr = ip6->ip6_dst;
623
624 in6p->in6p_route.ro_dst.sin6_family = AF_INET6;
625 in6p->in6p_route.ro_dst.sin6_len = sizeof(struct sockaddr_in6);
626 ((struct sockaddr_in6 *)(void *)&in6p->in6p_route.ro_dst)->sin6_addr =
627 ip6->ip6_dst;
628
629 rtalloc_scoped((struct route *)&in6p->in6p_route, ip6oa.ip6oa_boundif);
630
631 inp_update_necp_policy(in6p, (struct sockaddr *)&from,
632 (struct sockaddr *)&to, ip6oa.ip6oa_boundif);
633 in6p->inp_policyresult.results.qos_marking_gencount = 0;
634 }
635
636 if (!necp_socket_is_allowed_to_send_recv_v6(in6p, 0, 0,
637 &ip6->ip6_src, &ip6->ip6_dst, NULL, &policy_id, &route_rule_id, &skip_policy_id)) {
638 error = EHOSTUNREACH;
639 goto bad;
640 }
641
642 necp_mark_packet_from_socket(m, in6p, policy_id, route_rule_id, skip_policy_id);
643
644 if (net_qos_policy_restricted != 0) {
645 necp_socket_update_qos_marking(in6p, in6p->in6p_route.ro_rt,
646 NULL, route_rule_id);
647 }
648 }
649 #endif /* NECP */
650 if ((so->so_flags1 & SOF1_QOSMARKING_ALLOWED)) {
651 ip6oa.ip6oa_flags |= IP6OAF_QOSMARKING_ALLOWED;
652 }
653
654 #if IPSEC
655 if (in6p->in6p_sp != NULL && ipsec_setsocket(m, so) != 0) {
656 error = ENOBUFS;
657 goto bad;
658 }
659 #endif /*IPSEC*/
660
661 if (ROUTE_UNUSABLE(&in6p->in6p_route)) {
662 ROUTE_RELEASE(&in6p->in6p_route);
663 }
664
665 if (oifp != NULL) {
666 ifnet_release(oifp);
667 oifp = NULL;
668 }
669
670 set_packet_service_class(m, so, sotc, PKT_SCF_IPV6);
671 m->m_pkthdr.pkt_flowsrc = FLOWSRC_INPCB;
672 m->m_pkthdr.pkt_flowid = in6p->inp_flowhash;
673 m->m_pkthdr.pkt_flags |= (PKTF_FLOW_ID | PKTF_FLOW_LOCALSRC |
674 PKTF_FLOW_RAWSOCK);
675 m->m_pkthdr.pkt_proto = in6p->in6p_ip6_nxt;
676 m->m_pkthdr.tx_rawip_pid = so->last_pid;
677 if (so->so_flags & SOF_DELEGATED) {
678 m->m_pkthdr.tx_rawip_e_pid = so->e_pid;
679 } else {
680 m->m_pkthdr.tx_rawip_e_pid = 0;
681 }
682
683 if (im6o != NULL) {
684 IM6O_ADDREF(im6o);
685 }
686
687 error = ip6_output(m, optp, &in6p->in6p_route, flags, im6o,
688 &oifp, &ip6oa);
689
690 if (im6o != NULL) {
691 IM6O_REMREF(im6o);
692 }
693
694 if (in6p->in6p_route.ro_rt != NULL) {
695 struct rtentry *rt = in6p->in6p_route.ro_rt;
696 struct ifnet *outif;
697
698 if ((rt->rt_flags & RTF_MULTICAST) ||
699 in6p->in6p_socket == NULL ||
700 !(in6p->in6p_socket->so_state & SS_ISCONNECTED)) {
701 rt = NULL; /* unusable */
702 }
703 /*
704 * Always discard the cached route for unconnected
705 * socket or if it is a multicast route.
706 */
707 if (rt == NULL) {
708 ROUTE_RELEASE(&in6p->in6p_route);
709 }
710
711 /*
712 * If this is a connected socket and the destination
713 * route is not multicast, update outif with that of
714 * the route interface index used by IP.
715 */
716 if (rt != NULL) {
717 /*
718 * When an NECP IP tunnel policy forces the outbound interface,
719 * ip6_output_list() informs the transport layer what is the actual
720 * outgoing interface
721 */
722 if (ip6oa.ip6oa_flags & IP6OAF_BOUND_IF) {
723 outif = ifindex2ifnet[ip6oa.ip6oa_boundif];
724 } else {
725 outif = rt->rt_ifp;
726 }
727 if (outif != NULL) {
728 in6p->in6p_last_outifp = outif;
729 }
730 }
731 } else {
732 ROUTE_RELEASE(&in6p->in6p_route);
733 }
734
735 /*
736 * If output interface was cellular/expensive, and this socket is
737 * denied access to it, generate an event.
738 */
739 if (error != 0 && (ip6oa.ip6oa_retflags & IP6OARF_IFDENIED) &&
740 (INP_NO_CELLULAR(in6p) || INP_NO_EXPENSIVE(in6p) || INP_NO_CONSTRAINED(in6p))) {
741 soevent(in6p->inp_socket, (SO_FILT_HINT_LOCKED |
742 SO_FILT_HINT_IFDENIED));
743 }
744
745 if (SOCK_PROTO(so) == IPPROTO_ICMPV6) {
746 if (oifp) {
747 icmp6_ifoutstat_inc(oifp, type, code);
748 }
749 icmp6stat.icp6s_outhist[type]++;
750 } else {
751 rip6stat.rip6s_opackets++;
752 }
753
754 goto freectl;
755
756 bad:
757 if (m != NULL) {
758 m_freem(m);
759 }
760
761 freectl:
762 if (optp == &opt && optp->ip6po_rthdr) {
763 ROUTE_RELEASE(&optp->ip6po_route);
764 }
765
766 if (control != NULL) {
767 if (optp == &opt) {
768 ip6_clearpktopts(optp, -1);
769 }
770 m_freem(control);
771 }
772 if (oifp != NULL) {
773 ifnet_release(oifp);
774 }
775 return error;
776 }
777
778 /*
779 * Raw IPv6 socket option processing.
780 */
781 int
782 rip6_ctloutput(
783 struct socket *so,
784 struct sockopt *sopt)
785 {
786 int error, optval;
787
788 /* Allow <SOL_SOCKET,SO_FLUSH> at this level */
789 if (sopt->sopt_level == IPPROTO_ICMPV6) {
790 /*
791 * XXX: is it better to call icmp6_ctloutput() directly
792 * from protosw?
793 */
794 return icmp6_ctloutput(so, sopt);
795 } else if (sopt->sopt_level != IPPROTO_IPV6 &&
796 !(sopt->sopt_level == SOL_SOCKET && sopt->sopt_name == SO_FLUSH)) {
797 return EINVAL;
798 }
799
800 error = 0;
801
802 switch (sopt->sopt_dir) {
803 case SOPT_GET:
804 switch (sopt->sopt_name) {
805 case IPV6_CHECKSUM:
806 error = ip6_raw_ctloutput(so, sopt);
807 break;
808 default:
809 error = ip6_ctloutput(so, sopt);
810 break;
811 }
812 break;
813
814 case SOPT_SET:
815 switch (sopt->sopt_name) {
816 case IPV6_CHECKSUM:
817 error = ip6_raw_ctloutput(so, sopt);
818 break;
819
820 case SO_FLUSH:
821 if ((error = sooptcopyin(sopt, &optval, sizeof(optval),
822 sizeof(optval))) != 0) {
823 break;
824 }
825
826 error = inp_flush(sotoinpcb(so), optval);
827 break;
828
829 default:
830 error = ip6_ctloutput(so, sopt);
831 break;
832 }
833 break;
834 }
835
836 return error;
837 }
838
839 static int
840 rip6_attach(struct socket *so, int proto, struct proc *p)
841 {
842 struct inpcb *inp;
843 int error;
844
845 inp = sotoinpcb(so);
846 if (inp) {
847 panic("rip6_attach");
848 }
849 if ((error = proc_suser(p)) != 0) {
850 return error;
851 }
852
853 error = soreserve(so, rip_sendspace, rip_recvspace);
854 if (error) {
855 return error;
856 }
857 error = in_pcballoc(so, &ripcbinfo, p);
858 if (error) {
859 return error;
860 }
861 inp = (struct inpcb *)so->so_pcb;
862 inp->inp_vflag |= INP_IPV6;
863 inp->in6p_ip6_nxt = (char)proto;
864 inp->in6p_hops = -1; /* use kernel default */
865 inp->in6p_cksum = -1;
866 MALLOC(inp->in6p_icmp6filt, struct icmp6_filter *,
867 sizeof(struct icmp6_filter), M_PCB, M_WAITOK);
868 if (inp->in6p_icmp6filt == NULL) {
869 return ENOMEM;
870 }
871 ICMP6_FILTER_SETPASSALL(inp->in6p_icmp6filt);
872 return 0;
873 }
874
875 static int
876 rip6_detach(struct socket *so)
877 {
878 struct inpcb *inp;
879
880 inp = sotoinpcb(so);
881 if (inp == 0) {
882 panic("rip6_detach");
883 }
884 /* xxx: RSVP */
885 if (inp->in6p_icmp6filt) {
886 FREE(inp->in6p_icmp6filt, M_PCB);
887 inp->in6p_icmp6filt = NULL;
888 }
889 in6_pcbdetach(inp);
890 return 0;
891 }
892
893 static int
894 rip6_abort(struct socket *so)
895 {
896 soisdisconnected(so);
897 return rip6_detach(so);
898 }
899
900 static int
901 rip6_disconnect(struct socket *so)
902 {
903 struct inpcb *inp = sotoinpcb(so);
904
905 if ((so->so_state & SS_ISCONNECTED) == 0) {
906 return ENOTCONN;
907 }
908 inp->in6p_faddr = in6addr_any;
909 return rip6_abort(so);
910 }
911
912 static int
913 rip6_bind(struct socket *so, struct sockaddr *nam, struct proc *p)
914 {
915 #pragma unused(p)
916 struct inpcb *inp = sotoinpcb(so);
917 struct sockaddr_in6 sin6;
918 struct ifaddr *ifa = NULL;
919 struct ifnet *outif = NULL;
920 int error;
921
922 if (inp == NULL
923 #if NECP
924 || (necp_socket_should_use_flow_divert(inp))
925 #endif /* NECP */
926 ) {
927 return inp == NULL ? EINVAL : EPROTOTYPE;
928 }
929
930 if (nam->sa_len != sizeof(struct sockaddr_in6)) {
931 return EINVAL;
932 }
933
934 if (TAILQ_EMPTY(&ifnet_head) || SIN6(nam)->sin6_family != AF_INET6) {
935 return EADDRNOTAVAIL;
936 }
937
938 bzero(&sin6, sizeof(sin6));
939 *(&sin6) = *SIN6(nam);
940
941 if ((error = sa6_embedscope(&sin6, ip6_use_defzone)) != 0) {
942 return error;
943 }
944
945 /* Sanitize local copy for address searches */
946 sin6.sin6_flowinfo = 0;
947 sin6.sin6_scope_id = 0;
948 sin6.sin6_port = 0;
949
950 if (!IN6_IS_ADDR_UNSPECIFIED(&sin6.sin6_addr) &&
951 (ifa = ifa_ifwithaddr(SA(&sin6))) == 0) {
952 return EADDRNOTAVAIL;
953 }
954 if (ifa != NULL) {
955 IFA_LOCK(ifa);
956 if (((struct in6_ifaddr *)ifa)->ia6_flags &
957 (IN6_IFF_ANYCAST | IN6_IFF_NOTREADY | IN6_IFF_CLAT46 |
958 IN6_IFF_DETACHED | IN6_IFF_DEPRECATED)) {
959 IFA_UNLOCK(ifa);
960 IFA_REMREF(ifa);
961 return EADDRNOTAVAIL;
962 }
963 outif = ifa->ifa_ifp;
964 IFA_UNLOCK(ifa);
965 IFA_REMREF(ifa);
966 }
967 inp->in6p_laddr = sin6.sin6_addr;
968 inp->in6p_last_outifp = outif;
969
970 return 0;
971 }
972
973 static int
974 rip6_connect(struct socket *so, struct sockaddr *nam, __unused struct proc *p)
975 {
976 struct inpcb *inp = sotoinpcb(so);
977 struct sockaddr_in6 *addr = (struct sockaddr_in6 *)(void *)nam;
978 struct in6_addr *in6a = NULL;
979 struct in6_addr storage;
980 int error = 0;
981 #if ENABLE_DEFAULT_SCOPE
982 struct sockaddr_in6 tmp;
983 #endif
984 unsigned int ifscope;
985 struct ifnet *outif = NULL;
986
987 if (inp == NULL
988 #if NECP
989 || (necp_socket_should_use_flow_divert(inp))
990 #endif /* NECP */
991 ) {
992 return inp == NULL ? EINVAL : EPROTOTYPE;
993 }
994 if (nam->sa_len != sizeof(*addr)) {
995 return EINVAL;
996 }
997 if (TAILQ_EMPTY(&ifnet_head)) {
998 return EADDRNOTAVAIL;
999 }
1000 if (addr->sin6_family != AF_INET6) {
1001 return EAFNOSUPPORT;
1002 }
1003
1004 if (!(so->so_flags1 & SOF1_CONNECT_COUNTED)) {
1005 so->so_flags1 |= SOF1_CONNECT_COUNTED;
1006 INC_ATOMIC_INT64_LIM(net_api_stats.nas_socket_inet6_dgram_connected);
1007 }
1008
1009 #if ENABLE_DEFAULT_SCOPE
1010 if (addr->sin6_scope_id == 0) { /* not change if specified */
1011 /* avoid overwrites */
1012 tmp = *addr;
1013 addr = &tmp;
1014 addr->sin6_scope_id = scope6_addr2default(&addr->sin6_addr);
1015 }
1016 #endif
1017
1018 /* KAME hack: embed scopeid */
1019 if (in6_embedscope(&SIN6(nam)->sin6_addr, SIN6(nam), inp, NULL, NULL) != 0) {
1020 return EINVAL;
1021 }
1022
1023 ifscope = (inp->inp_flags & INP_BOUND_IF) ?
1024 inp->inp_boundifp->if_index : IFSCOPE_NONE;
1025
1026 /* Source address selection. XXX: need pcblookup? */
1027 in6a = in6_selectsrc(addr, inp->in6p_outputopts, inp, &inp->in6p_route,
1028 NULL, &storage, ifscope, &error);
1029 if (in6a == NULL) {
1030 return error ? error : EADDRNOTAVAIL;
1031 }
1032 inp->in6p_laddr = *in6a;
1033 inp->in6p_faddr = addr->sin6_addr;
1034 if (inp->in6p_route.ro_rt != NULL) {
1035 outif = inp->in6p_route.ro_rt->rt_ifp;
1036 }
1037 inp->in6p_last_outifp = outif;
1038
1039 soisconnected(so);
1040 return 0;
1041 }
1042
1043 static int
1044 rip6_shutdown(struct socket *so)
1045 {
1046 socantsendmore(so);
1047 return 0;
1048 }
1049
1050 static int
1051 rip6_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *nam,
1052 struct mbuf *control, struct proc *p)
1053 {
1054 #pragma unused(flags, p)
1055 struct inpcb *inp = sotoinpcb(so);
1056 struct sockaddr_in6 tmp;
1057 struct sockaddr_in6 *dst = (struct sockaddr_in6 *)(void *)nam;
1058 int error = 0;
1059
1060 if (inp == NULL
1061 #if NECP
1062 || (necp_socket_should_use_flow_divert(inp))
1063 #endif /* NECP */
1064 ) {
1065 if (inp == NULL) {
1066 error = EINVAL;
1067 } else {
1068 error = EPROTOTYPE;
1069 }
1070 goto bad;
1071 }
1072
1073 /* always copy sockaddr to avoid overwrites */
1074 if (so->so_state & SS_ISCONNECTED) {
1075 if (nam != NULL) {
1076 error = EISCONN;
1077 goto bad;
1078 }
1079 /* XXX */
1080 bzero(&tmp, sizeof(tmp));
1081 tmp.sin6_family = AF_INET6;
1082 tmp.sin6_len = sizeof(struct sockaddr_in6);
1083 bcopy(&inp->in6p_faddr, &tmp.sin6_addr,
1084 sizeof(struct in6_addr));
1085 dst = &tmp;
1086 } else {
1087 if (nam == NULL) {
1088 error = ENOTCONN;
1089 goto bad;
1090 }
1091 tmp = *(struct sockaddr_in6 *)(void *)nam;
1092 dst = &tmp;
1093 }
1094 #if ENABLE_DEFAULT_SCOPE
1095 if (dst->sin6_scope_id == 0) { /* not change if specified */
1096 dst->sin6_scope_id = scope6_addr2default(&dst->sin6_addr);
1097 }
1098 #endif
1099 return rip6_output(m, so, dst, control, 1);
1100
1101 bad:
1102 VERIFY(error != 0);
1103
1104 if (m != NULL) {
1105 m_freem(m);
1106 }
1107 if (control != NULL) {
1108 m_freem(control);
1109 }
1110
1111 return error;
1112 }
1113
1114 struct pr_usrreqs rip6_usrreqs = {
1115 .pru_abort = rip6_abort,
1116 .pru_attach = rip6_attach,
1117 .pru_bind = rip6_bind,
1118 .pru_connect = rip6_connect,
1119 .pru_control = in6_control,
1120 .pru_detach = rip6_detach,
1121 .pru_disconnect = rip6_disconnect,
1122 .pru_peeraddr = in6_getpeeraddr,
1123 .pru_send = rip6_send,
1124 .pru_shutdown = rip6_shutdown,
1125 .pru_sockaddr = in6_getsockaddr,
1126 .pru_sosend = sosend,
1127 .pru_soreceive = soreceive,
1128 };
1129
1130 __private_extern__ struct pr_usrreqs icmp6_dgram_usrreqs = {
1131 .pru_abort = rip6_abort,
1132 .pru_attach = icmp6_dgram_attach,
1133 .pru_bind = rip6_bind,
1134 .pru_connect = rip6_connect,
1135 .pru_control = in6_control,
1136 .pru_detach = rip6_detach,
1137 .pru_disconnect = rip6_disconnect,
1138 .pru_peeraddr = in6_getpeeraddr,
1139 .pru_send = icmp6_dgram_send,
1140 .pru_shutdown = rip6_shutdown,
1141 .pru_sockaddr = in6_getsockaddr,
1142 .pru_sosend = sosend,
1143 .pru_soreceive = soreceive,
1144 };