]> git.saurik.com Git - apple/xnu.git/blobdiff - bsd/netinet6/route6.c
xnu-1699.32.7.tar.gz
[apple/xnu.git] / bsd / netinet6 / route6.c
index 25d86cf553612f684a450dcfe73bee089851fe74..a0dc6c6a603decab6de889615a36868b2aa1a311 100644 (file)
@@ -1,4 +1,33 @@
-/*     $KAME: route6.c,v 1.10 2000/02/22 14:04:34 itojun Exp $ */
+/*
+ * Copyright (c) 2000-2010 Apple Inc. All rights reserved.
+ *
+ * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
+ * 
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. The rights granted to you under the License
+ * may not be used to create, or enable the creation or redistribution of,
+ * unlawful or unlicensed copies of an Apple operating system, or to
+ * circumvent, violate, or enable the circumvention or violation of, any
+ * terms of an Apple operating system software license agreement.
+ * 
+ * Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this file.
+ * 
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
+ * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
+ * 
+ * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
+ */
+
+/*     $FreeBSD: src/sys/netinet6/route6.c,v 1.1.2.3 2001/07/03 11:01:55 ume Exp $     */
+/*     $KAME: route6.c,v 1.24 2001/03/14 03:07:05 itojun Exp $ */
 
 /*
  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
 #include <sys/param.h>
 #include <sys/mbuf.h>
 #include <sys/socket.h>
+#include <sys/queue.h>
+#include <string.h>
 
 #include <net/if.h>
+#include <net/route.h>
 
 #include <netinet/in.h>
 #include <netinet6/in6_var.h>
 
 #include <netinet/icmp6.h>
 
-#if MIP6
-#include <netinet6/mip6.h>
-#include <net/if_types.h>
-#endif
-
-static int ip6_rthdr0 __P((struct mbuf *, struct ip6_hdr *,
-    struct ip6_rthdr0 *));
-
+#if IP6_RTHDR0_ALLOWED
+static int ip6_rthdr0(struct mbuf *, struct ip6_hdr *,
+    struct ip6_rthdr0 *);
+#endif /* IP6_RTHDR0_ALLOWED */
 
 int
-route6_input(mp, offp, proto)
-       struct mbuf **mp;
-       int *offp, proto;       /* proto is unused */
+route6_input(struct mbuf **mp, int *offp, int proto)
 {
-       register struct ip6_hdr *ip6;
-       register struct mbuf *m = *mp;
-       register struct ip6_rthdr *rh;
+#pragma unused(proto)
+       struct ip6_hdr *ip6;
+       struct mbuf *m = *mp;
+       struct ip6_rthdr *rh;
        int off = *offp, rhlen;
+       struct ip6aux *ip6a;
+
+       ip6a = ip6_findaux(m);
+       if (ip6a) {
+               /* XXX reject home-address option before rthdr */
+               if (ip6a->ip6a_flags & IP6A_SWAP) {
+                       ip6stat.ip6s_badoptions++;
+                       m_freem(m);
+                       return IPPROTO_DONE;
+               }
+       }
 
 #ifndef PULLDOWN_TEST
-       IP6_EXTHDR_CHECK(m, off, sizeof(*rh), IPPROTO_DONE);
+       IP6_EXTHDR_CHECK(m, off, sizeof(*rh), return IPPROTO_DONE);
        ip6 = mtod(m, struct ip6_hdr *);
        rh = (struct ip6_rthdr *)((caddr_t)ip6 + off);
 #else
@@ -74,39 +112,58 @@ route6_input(mp, offp, proto)
        }
 #endif
 
-       switch(rh->ip6r_type) {
-        case IPV6_RTHDR_TYPE_0:
-                rhlen = (rh->ip6r_len + 1) << 3;
+       switch (rh->ip6r_type) {
+#if IP6_RTHDR0_ALLOWED
+       case IPV6_RTHDR_TYPE_0:
+               rhlen = (rh->ip6r_len + 1) << 3;
 #ifndef PULLDOWN_TEST
-                IP6_EXTHDR_CHECK(m, off, rhlen, IPPROTO_DONE);
+               /*
+                * note on option length:
+                * due to IP6_EXTHDR_CHECK assumption, we cannot handle
+                * very big routing header (max rhlen == 2048).
+                */
+               IP6_EXTHDR_CHECK(m, off, rhlen, return IPPROTO_DONE);
 #else
-                IP6_EXTHDR_GET(rh, struct ip6_rthdr *, m, off, rhlen);
-                if (rh == NULL) {
+               /*
+                * note on option length:
+                * maximum rhlen: 2048
+                * max mbuf m_pulldown can handle: MCLBYTES == usually 2048
+                * so, here we are assuming that m_pulldown can handle
+                * rhlen == 2048 case.  this may not be a good thing to
+                * assume - we may want to avoid pulling it up altogether.
+                */
+               IP6_EXTHDR_GET(rh, struct ip6_rthdr *, m, off, rhlen);
+               if (rh == NULL) {
                        ip6stat.ip6s_tooshort++;
                        return IPPROTO_DONE;
-                }
+               }
 #endif
-                if (ip6_rthdr0(m, ip6, (struct ip6_rthdr0 *)rh))
-                        return(IPPROTO_DONE);
-                break;
-        default:
-                /* unknown routing type */
-                if (rh->ip6r_segleft == 0) {
-                        rhlen = (rh->ip6r_len + 1) << 3;
-                        break; /* Final dst. Just ignore the header. */
-                }
-                ip6stat.ip6s_badoptions++;
-                icmp6_error(m, ICMP6_PARAM_PROB, ICMP6_PARAMPROB_HEADER,
-                            (caddr_t)&rh->ip6r_type - (caddr_t)ip6);
-                return(IPPROTO_DONE);
-       }       
-       
+               if (ip6_rthdr0(m, ip6, (struct ip6_rthdr0 *)rh))
+                       return(IPPROTO_DONE);
+               break;
+#endif /* IP6_RTHDR0_ALLOWED */
+       default:
+               /* unknown routing type */
+               if (rh->ip6r_segleft == 0) {
+                       rhlen = (rh->ip6r_len + 1) << 3;
+                       break;  /* Final dst. Just ignore the header. */
+               }
+               ip6stat.ip6s_badoptions++;
+               icmp6_error(m, ICMP6_PARAM_PROB, ICMP6_PARAMPROB_HEADER,
+                           (caddr_t)&rh->ip6r_type - (caddr_t)ip6);
+               return(IPPROTO_DONE);
+       }
+
        *offp += rhlen;
        return(rh->ip6r_nxt);
 }
 
+#if IP6_RTHDR0_ALLOWED
 /*
  * Type0 routing header processing
+ *
+ * RFC2292 backward compatibility warning: no support for strict/loose bitmap,
+ * as it was dropped between RFC1883 and RFC2460.
  */
 static int
 ip6_rthdr0(m, ip6, rh0)
@@ -115,7 +172,8 @@ ip6_rthdr0(m, ip6, rh0)
        struct ip6_rthdr0 *rh0;
 {
        int addrs, index;
-       struct in6_addr *nextaddr, tmpaddr;
+       struct in6_addr *nextaddr, tmpaddr, ia6 = NULL;
+       struct route_in6 ip6forward_rt;
 
        if (rh0->ip6r0_segleft == 0)
                return(0);
@@ -127,25 +185,26 @@ ip6_rthdr0(m, ip6, rh0)
                ) {
                /*
                 * Type 0 routing header can't contain more than 23 addresses.
-                * RFC 2462: this limitation was removed since stict/loose
+                * RFC 2462: this limitation was removed since strict/loose
                 * bitmap field was deleted.
                 */
                ip6stat.ip6s_badoptions++;
                icmp6_error(m, ICMP6_PARAM_PROB, ICMP6_PARAMPROB_HEADER,
                            (caddr_t)&rh0->ip6r0_len - (caddr_t)ip6);
-               return(-1);
+               return (-1);
        }
 
        if ((addrs = rh0->ip6r0_len / 2) < rh0->ip6r0_segleft) {
                ip6stat.ip6s_badoptions++;
                icmp6_error(m, ICMP6_PARAM_PROB, ICMP6_PARAMPROB_HEADER,
                            (caddr_t)&rh0->ip6r0_segleft - (caddr_t)ip6);
-               return(-1);
+               return (-1);
        }
 
        index = addrs - rh0->ip6r0_segleft;
        rh0->ip6r0_segleft--;
-       nextaddr = ((struct in6_addr *)(rh0 + 1)) + index;
+       /* note that ip6r0_addr does not exist in RFC2292bis */
+       nextaddr = rh0->ip6r0_addr + index;
 
        /*
         * reject invalid addresses.  be proactive about malicious use of
@@ -158,36 +217,68 @@ ip6_rthdr0(m, ip6, rh0)
            IN6_IS_ADDR_V4COMPAT(nextaddr)) {
                ip6stat.ip6s_badoptions++;
                m_freem(m);
-               return(-1);
+               return (-1);
        }
        if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) ||
            IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_dst) ||
            IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst) ||
-           IN6_IS_ADDR_V4COMPAT(nextaddr)) {
+           IN6_IS_ADDR_V4COMPAT(&ip6->ip6_dst)) {
                ip6stat.ip6s_badoptions++;
                m_freem(m);
-               return(-1);
+               return (-1);
        }
 
+       /*
+        * Determine the scope zone of the next hop, based on the interface
+        * of the current hop. [RFC4007, Section 9]
+        * Then disambiguate the scope zone for the next hop (if necessary).
+        */
+       if ((ia6 = ip6_getdstifaddr(m)) == NULL)
+               goto bad;
+       if (in6_setscope(nextaddr, ia6->ia_ifp, NULL) != 0) {
+               ip6stat.ip6s_badscope++;
+               IFA_REMREF(&ia6->ia_ifa);
+               ia6 = NULL;
+               goto bad;
+       }
+       IFA_REMREF(&ia6->ia_ifa);
+       ia6 = NULL;
+
        /*
         * Swap the IPv6 destination address and nextaddr. Forward the packet.
         */
        tmpaddr = *nextaddr;
        *nextaddr = ip6->ip6_dst;
-       if (IN6_IS_ADDR_LINKLOCAL(nextaddr))
-               nextaddr->s6_addr16[1] = 0;
+       in6_clearscope(nextaddr); /* XXX */
        ip6->ip6_dst = tmpaddr;
        if (IN6_IS_ADDR_LINKLOCAL(&ip6->ip6_dst))
                ip6->ip6_dst.s6_addr16[1] = htons(m->m_pkthdr.rcvif->if_index);
 
+       /*
+        * Don't use the globally cached route to forward packet having
+        * Type 0 routing header(s); instead, do an explicit lookup using
+        * a local route entry variable, in case the next address in the
+        * packet is bogus (which would otherwise unnecessarily invalidate
+        * the globally cached route).
+        */
+       bzero(&ip6forward_rt, sizeof (ip6forward_rt));
+
 #if COMPAT_RFC1883
        if (rh0->ip6r0_slmap[index / 8] & (1 << (7 - (index % 8))))
-               ip6_forward(m, IPV6_SRCRT_NEIGHBOR);
+               ip6_forward(m, &ip6forward_rt, IPV6_SRCRT_NEIGHBOR, 0);
        else
-               ip6_forward(m, IPV6_SRCRT_NOTNEIGHBOR);
+               ip6_forward(m, &ip6forward_rt, IPV6_SRCRT_NOTNEIGHBOR, 0);
 #else
-       ip6_forward(m, 1);
+       ip6_forward(m, &ip6forward_rt, 1, 0);
 #endif
 
+       /* Release reference to the looked up route */
+       if (ip6forward_rt.ro_rt != NULL) {
+               rtfree(ip6forward_rt.ro_rt);
+               ip6forward_rt.ro_rt = NULL;
+       }
+
        return(-1);                     /* m would be freed in ip6_forward() */
 }
+#endif /* IP6_RTHDR0_ALLOWED */
+