xref: /dragonfly/sys/netinet6/raw_ip6.c (revision 20c2db9a)
1 /*
2  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. Neither the name of the project nor the names of its contributors
14  *    may be used to endorse or promote products derived from this software
15  *    without specific prior written permission.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  *
29  * $FreeBSD: src/sys/netinet6/raw_ip6.c,v 1.7.2.7 2003/01/24 05:11:35 sam Exp $
30  */
31 
32 /*
33  * Copyright (c) 1982, 1986, 1988, 1993
34  *	The Regents of the University of California.  All rights reserved.
35  *
36  * Redistribution and use in source and binary forms, with or without
37  * modification, are permitted provided that the following conditions
38  * are met:
39  * 1. Redistributions of source code must retain the above copyright
40  *    notice, this list of conditions and the following disclaimer.
41  * 2. Redistributions in binary form must reproduce the above copyright
42  *    notice, this list of conditions and the following disclaimer in the
43  *    documentation and/or other materials provided with the distribution.
44  * 3. All advertising materials mentioning features or use of this software
45  *    must display the following acknowledgement:
46  *	This product includes software developed by the University of
47  *	California, Berkeley and its contributors.
48  * 4. Neither the name of the University nor the names of its contributors
49  *    may be used to endorse or promote products derived from this software
50  *    without specific prior written permission.
51  *
52  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
53  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
54  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
55  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
56  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
57  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
58  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
59  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
60  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
61  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
62  * SUCH DAMAGE.
63  *
64  *	@(#)raw_ip.c	8.2 (Berkeley) 1/4/94
65  */
66 
67 #include "opt_ipsec.h"
68 #include "opt_inet6.h"
69 
70 #include <sys/param.h>
71 #include <sys/malloc.h>
72 #include <sys/proc.h>
73 #include <sys/priv.h>
74 #include <sys/mbuf.h>
75 #include <sys/socket.h>
76 #include <sys/jail.h>
77 #include <sys/protosw.h>
78 #include <sys/socketvar.h>
79 #include <sys/errno.h>
80 #include <sys/systm.h>
81 
82 #include <sys/thread2.h>
83 #include <sys/socketvar2.h>
84 #include <sys/msgport2.h>
85 
86 #include <net/if.h>
87 #include <net/route.h>
88 #include <net/if_types.h>
89 
90 #include <netinet/in.h>
91 #include <netinet/in_var.h>
92 #include <netinet/in_systm.h>
93 #include <netinet/ip6.h>
94 #include <netinet6/ip6_var.h>
95 #include <netinet6/ip6_mroute.h>
96 #include <netinet/icmp6.h>
97 #include <netinet/in_pcb.h>
98 #include <netinet6/in6_pcb.h>
99 #include <netinet6/nd6.h>
100 #include <netinet6/ip6protosw.h>
101 #ifdef ENABLE_DEFAULT_SCOPE
102 #include <netinet6/scope6_var.h>
103 #endif
104 #include <netinet6/raw_ip6.h>
105 
106 #ifdef IPSEC
107 #include <netinet6/ipsec.h>
108 #include <netinet6/ipsec6.h>
109 #endif /*IPSEC*/
110 
111 #ifdef FAST_IPSEC
112 #include <netproto/ipsec/ipsec.h>
113 #include <netproto/ipsec/ipsec6.h>
114 #endif /* FAST_IPSEC */
115 
116 #include <machine/stdarg.h>
117 
118 #define	satosin6(sa)	((struct sockaddr_in6 *)(sa))
119 #define	ifatoia6(ifa)	((struct in6_ifaddr *)(ifa))
120 
121 /*
122  * Raw interface to IP6 protocol.
123  */
124 
125 extern struct	inpcbinfo ripcbinfo;
126 extern u_long	rip_sendspace;
127 extern u_long	rip_recvspace;
128 
129 struct rip6stat rip6stat;
130 
131 /*
132  * Setup generic address and protocol structures
133  * for raw_input routine, then pass them along with
134  * mbuf chain.
135  */
136 int
137 rip6_input(struct mbuf **mp, int *offp, int proto)
138 {
139 	struct mbuf *m = *mp;
140 	struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
141 	struct inpcb *in6p;
142 	struct inpcb *last = NULL;
143 	struct mbuf *opts = NULL;
144 	struct sockaddr_in6 rip6src;
145 
146 	rip6stat.rip6s_ipackets++;
147 
148 	if (faithprefix_p != NULL && (*faithprefix_p)(&ip6->ip6_dst)) {
149 		/* XXX send icmp6 host/port unreach? */
150 		m_freem(m);
151 		return IPPROTO_DONE;
152 	}
153 
154 	init_sin6(&rip6src, m); /* general init */
155 
156 	LIST_FOREACH(in6p, &ripcbinfo.pcblisthead, inp_list) {
157 		if (in6p->in6p_flags & INP_PLACEMARKER)
158 			continue;
159 		if (!(in6p->in6p_vflag & INP_IPV6))
160 			continue;
161 		if (in6p->in6p_ip6_nxt &&
162 		    in6p->in6p_ip6_nxt != proto)
163 			continue;
164 		if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_laddr) &&
165 		    !IN6_ARE_ADDR_EQUAL(&in6p->in6p_laddr, &ip6->ip6_dst))
166 			continue;
167 		if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr) &&
168 		    !IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr, &ip6->ip6_src))
169 			continue;
170 		if (in6p->in6p_cksum != -1) {
171 			rip6stat.rip6s_isum++;
172 			if (in6_cksum(m, ip6->ip6_nxt, *offp,
173 			    m->m_pkthdr.len - *offp)) {
174 				rip6stat.rip6s_badsum++;
175 				continue;
176 			}
177 		}
178 		if (last) {
179 			struct mbuf *n = m_copy(m, 0, (int)M_COPYALL);
180 
181 #ifdef IPSEC
182 			/*
183 			 * Check AH/ESP integrity.
184 			 */
185 			if (n && ipsec6_in_reject_so(n, last->inp_socket)) {
186 				m_freem(n);
187 				ipsec6stat.in_polvio++;
188 				/* do not inject data into pcb */
189 			} else
190 #endif /*IPSEC*/
191 #ifdef FAST_IPSEC
192 			/*
193 			 * Check AH/ESP integrity.
194 			 */
195 			if (n && ipsec6_in_reject(n, last)) {
196 				m_freem(n);
197 				/* do not inject data into pcb */
198 			} else
199 #endif /*FAST_IPSEC*/
200 			if (n) {
201 				struct socket *so;
202 
203 				so = last->in6p_socket;
204 				if ((last->in6p_flags & IN6P_CONTROLOPTS) ||
205 				    (so->so_options & SO_TIMESTAMP)) {
206 					ip6_savecontrol(last, &opts, ip6, n);
207 				}
208 				/* strip intermediate headers */
209 				m_adj(n, *offp);
210 				lwkt_gettoken(&so->so_rcv.ssb_token);
211 				if (ssb_appendaddr(&so->so_rcv,
212 						(struct sockaddr *)&rip6src,
213 						 n, opts) == 0) {
214 					m_freem(n);
215 					if (opts)
216 						m_freem(opts);
217 					rip6stat.rip6s_fullsock++;
218 				} else {
219 					sorwakeup(so);
220 				}
221 				lwkt_reltoken(&so->so_rcv.ssb_token);
222 				opts = NULL;
223 			}
224 		}
225 		last = in6p;
226 	}
227 #ifdef IPSEC
228 	/*
229 	 * Check AH/ESP integrity.
230 	 */
231 	if (last && ipsec6_in_reject_so(m, last->inp_socket)) {
232 		m_freem(m);
233 		ipsec6stat.in_polvio++;
234 		ip6stat.ip6s_delivered--;
235 		/* do not inject data into pcb */
236 	} else
237 #endif /*IPSEC*/
238 #ifdef FAST_IPSEC
239 	/*
240 	 * Check AH/ESP integrity.
241 	 */
242 	if (last && ipsec6_in_reject(m, last)) {
243 		m_freem(m);
244 		ip6stat.ip6s_delivered--;
245 		/* do not inject data into pcb */
246 	} else
247 #endif /*FAST_IPSEC*/
248 	if (last) {
249 		struct socket *so;
250 
251 		so = last->in6p_socket;
252 		if ((last->in6p_flags & IN6P_CONTROLOPTS) ||
253 		    (so->so_options & SO_TIMESTAMP)) {
254 			ip6_savecontrol(last, &opts, ip6, m);
255 		}
256 		/* strip intermediate headers */
257 		m_adj(m, *offp);
258 		lwkt_gettoken(&so->so_rcv.ssb_token);
259 		if (ssb_appendaddr(&so->so_rcv, (struct sockaddr *)&rip6src,
260 				   m, opts) == 0) {
261 			m_freem(m);
262 			if (opts)
263 				m_freem(opts);
264 			rip6stat.rip6s_fullsock++;
265 		} else {
266 			sorwakeup(so);
267 		}
268 		lwkt_reltoken(&so->so_rcv.ssb_token);
269 	} else {
270 		rip6stat.rip6s_nosock++;
271 		if (m->m_flags & M_MCAST)
272 			rip6stat.rip6s_nosockmcast++;
273 		if (proto == IPPROTO_NONE)
274 			m_freem(m);
275 		else {
276 			char *prvnxtp = ip6_get_prevhdr(m, *offp); /* XXX */
277 			icmp6_error(m, ICMP6_PARAM_PROB,
278 				    ICMP6_PARAMPROB_NEXTHEADER,
279 				    prvnxtp - mtod(m, char *));
280 		}
281 		ip6stat.ip6s_delivered--;
282 	}
283 	return IPPROTO_DONE;
284 }
285 
286 void
287 rip6_ctlinput(netmsg_t msg)
288 {
289 	int cmd = msg->ctlinput.nm_cmd;
290 	struct sockaddr *sa = msg->ctlinput.nm_arg;
291 	void *d = msg->ctlinput.nm_extra;
292 	struct ip6ctlparam *ip6cp = NULL;
293 	const struct sockaddr_in6 *sa6_src = NULL;
294 	void (*notify) (struct inpcb *, int) = in6_rtchange;
295 
296 	if (sa->sa_family != AF_INET6 ||
297 	    sa->sa_len != sizeof(struct sockaddr_in6))
298 		goto out;
299 
300 	if ((unsigned)cmd >= PRC_NCMDS)
301 		goto out;
302 	if (PRC_IS_REDIRECT(cmd))
303 		notify = in6_rtchange, d = NULL;
304 	else if (cmd == PRC_HOSTDEAD)
305 		d = NULL;
306 	else if (inet6ctlerrmap[cmd] == 0)
307 		goto out;
308 
309 	/* if the parameter is from icmp6, decode it. */
310 	if (d != NULL) {
311 		ip6cp = (struct ip6ctlparam *)d;
312 		sa6_src = ip6cp->ip6c_src;
313 	} else {
314 		sa6_src = &sa6_any;
315 	}
316 
317 	in6_pcbnotify(&ripcbinfo.pcblisthead, sa, 0,
318 		      (const struct sockaddr *)sa6_src, 0, cmd, 0, notify);
319 out:
320 	lwkt_replymsg(&msg->ctlinput.base.lmsg, 0);
321 }
322 
323 /*
324  * Generate IPv6 header and pass packet to ip6_output.
325  * Tack on options user may have setup with control call.
326  */
327 int
328 rip6_output(struct mbuf *m, struct socket *so, ...)
329 {
330 	struct sockaddr_in6 *dstsock;
331 	struct mbuf *control;
332 	struct in6_addr *dst;
333 	struct ip6_hdr *ip6;
334 	struct inpcb *in6p;
335 	u_int	plen = m->m_pkthdr.len;
336 	int error = 0;
337 	struct ip6_pktopts opt, *optp = NULL;
338 	struct ifnet *oifp = NULL;
339 	int type = 0, code = 0;		/* for ICMPv6 output statistics only */
340 	int priv = 0;
341 	__va_list ap;
342 
343 	__va_start(ap, so);
344 	dstsock = __va_arg(ap, struct sockaddr_in6 *);
345 	control = __va_arg(ap, struct mbuf *);
346 	__va_end(ap);
347 
348 	in6p = so->so_pcb;
349 
350 	priv = 0;
351 	if (so->so_cred->cr_uid == 0)
352 		priv = 1;
353 	dst = &dstsock->sin6_addr;
354 	if (control) {
355 		if ((error = ip6_setpktoptions(control, &opt,
356 		    in6p->in6p_outputopts,
357 		    so->so_proto->pr_protocol, priv)) != 0)
358 			goto bad;
359 		optp = &opt;
360 	} else
361 		optp = in6p->in6p_outputopts;
362 
363 	/*
364 	 * For an ICMPv6 packet, we should know its type and code
365 	 * to update statistics.
366 	 */
367 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
368 		struct icmp6_hdr *icmp6;
369 		if (m->m_len < sizeof(struct icmp6_hdr) &&
370 		    (m = m_pullup(m, sizeof(struct icmp6_hdr))) == NULL) {
371 			error = ENOBUFS;
372 			goto bad;
373 		}
374 		icmp6 = mtod(m, struct icmp6_hdr *);
375 		type = icmp6->icmp6_type;
376 		code = icmp6->icmp6_code;
377 	}
378 
379 	M_PREPEND(m, sizeof(*ip6), MB_WAIT);
380 	ip6 = mtod(m, struct ip6_hdr *);
381 
382 	/*
383 	 * Next header might not be ICMP6 but use its pseudo header anyway.
384 	 */
385 	ip6->ip6_dst = *dst;
386 
387 	/*
388 	 * If the scope of the destination is link-local, embed the interface
389 	 * index in the address.
390 	 *
391 	 * XXX advanced-api value overrides sin6_scope_id
392 	 */
393 	if (IN6_IS_SCOPE_LINKLOCAL(&ip6->ip6_dst)) {
394 		struct in6_pktinfo *pi;
395 
396 		/*
397 		 * XXX Boundary check is assumed to be already done in
398 		 * ip6_setpktoptions().
399 		 */
400 		if (optp && (pi = optp->ip6po_pktinfo) && pi->ipi6_ifindex) {
401 			ip6->ip6_dst.s6_addr16[1] = htons(pi->ipi6_ifindex);
402 			oifp = ifindex2ifnet[pi->ipi6_ifindex];
403 		} else if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) &&
404 			 in6p->in6p_moptions &&
405 			 in6p->in6p_moptions->im6o_multicast_ifp) {
406 			oifp = in6p->in6p_moptions->im6o_multicast_ifp;
407 			ip6->ip6_dst.s6_addr16[1] = htons(oifp->if_index);
408 		} else if (dstsock->sin6_scope_id) {
409 			/* boundary check */
410 			if (dstsock->sin6_scope_id < 0
411 			 || if_index < dstsock->sin6_scope_id) {
412 				error = ENXIO;  /* XXX EINVAL? */
413 				goto bad;
414 			}
415 			ip6->ip6_dst.s6_addr16[1]
416 				= htons(dstsock->sin6_scope_id & 0xffff);/*XXX*/
417 		}
418 	}
419 
420 	/*
421 	 * Source address selection.
422 	 */
423 	{
424 		struct in6_addr *in6a;
425 
426 		if ((in6a = in6_selectsrc(dstsock, optp,
427 					  in6p->in6p_moptions,
428 					  &in6p->in6p_route,
429 					  &in6p->in6p_laddr,
430 					  &error, NULL)) == NULL) {
431 			if (error == 0)
432 				error = EADDRNOTAVAIL;
433 			goto bad;
434 		}
435 		ip6->ip6_src = *in6a;
436 		if (in6p->in6p_route.ro_rt)
437 			oifp = ifindex2ifnet[in6p->in6p_route.ro_rt->rt_ifp->if_index];
438 	}
439 	ip6->ip6_flow = (ip6->ip6_flow & ~IPV6_FLOWINFO_MASK) |
440 		(in6p->in6p_flowinfo & IPV6_FLOWINFO_MASK);
441 	ip6->ip6_vfc = (ip6->ip6_vfc & ~IPV6_VERSION_MASK) |
442 		(IPV6_VERSION & IPV6_VERSION_MASK);
443 	/* ip6_plen will be filled in ip6_output, so not fill it here. */
444 	ip6->ip6_nxt = in6p->in6p_ip6_nxt;
445 	ip6->ip6_hlim = in6_selecthlim(in6p, oifp);
446 
447 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6 ||
448 	    in6p->in6p_cksum != -1) {
449 		struct mbuf *n;
450 		int off;
451 		u_int16_t *p;
452 
453 		/* compute checksum */
454 		if (so->so_proto->pr_protocol == IPPROTO_ICMPV6)
455 			off = offsetof(struct icmp6_hdr, icmp6_cksum);
456 		else
457 			off = in6p->in6p_cksum;
458 		if (plen < off + 1) {
459 			error = EINVAL;
460 			goto bad;
461 		}
462 		off += sizeof(struct ip6_hdr);
463 
464 		n = m;
465 		while (n && n->m_len <= off) {
466 			off -= n->m_len;
467 			n = n->m_next;
468 		}
469 		if (!n)
470 			goto bad;
471 		p = (u_int16_t *)(mtod(n, caddr_t) + off);
472 		*p = 0;
473 		*p = in6_cksum(m, ip6->ip6_nxt, sizeof(*ip6), plen);
474 	}
475 
476 	error = ip6_output(m, optp, &in6p->in6p_route, 0,
477 			   in6p->in6p_moptions, &oifp, in6p);
478 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
479 		if (oifp)
480 			icmp6_ifoutstat_inc(oifp, type, code);
481 		icmp6stat.icp6s_outhist[type]++;
482 	} else
483 		rip6stat.rip6s_opackets++;
484 
485 	goto freectl;
486 
487 bad:
488 	if (m)
489 		m_freem(m);
490 
491 freectl:
492 	if (optp == &opt && optp->ip6po_rthdr && optp->ip6po_route.ro_rt)
493 		RTFREE(optp->ip6po_route.ro_rt);
494 	if (control) {
495 		if (optp == &opt)
496 			ip6_clearpktopts(optp, -1);
497 		m_freem(control);
498 	}
499 	return (error);
500 }
501 
502 /*
503  * Raw IPv6 socket option processing.
504  */
505 void
506 rip6_ctloutput(netmsg_t msg)
507 {
508 	struct socket *so = msg->ctloutput.base.nm_so;
509 	struct sockopt *sopt = msg->ctloutput.nm_sopt;
510 	int error;
511 
512 	if (sopt->sopt_level == IPPROTO_ICMPV6) {
513 		/*
514 		 * XXX: is it better to call icmp6_ctloutput() directly
515 		 * from protosw?
516 		 */
517 		icmp6_ctloutput(msg);
518 		/* msg invalid now */
519 		return;
520 	}
521 	if (sopt->sopt_level != IPPROTO_IPV6) {
522 		error = EINVAL;
523 		goto out;
524 	}
525 
526 	error = 0;
527 
528 	switch (sopt->sopt_dir) {
529 	case SOPT_GET:
530 		switch (sopt->sopt_name) {
531 		case MRT6_INIT:
532 		case MRT6_DONE:
533 		case MRT6_ADD_MIF:
534 		case MRT6_DEL_MIF:
535 		case MRT6_ADD_MFC:
536 		case MRT6_DEL_MFC:
537 		case MRT6_PIM:
538 			error = ip6_mrouter_get(so, sopt);
539 			break;
540 		case IPV6_CHECKSUM:
541 			error = ip6_raw_ctloutput(so, sopt);
542 			break;
543 		default:
544 			error = ip6_ctloutput(so, sopt);
545 			break;
546 		}
547 		break;
548 
549 	case SOPT_SET:
550 		switch (sopt->sopt_name) {
551 		case MRT6_INIT:
552 		case MRT6_DONE:
553 		case MRT6_ADD_MIF:
554 		case MRT6_DEL_MIF:
555 		case MRT6_ADD_MFC:
556 		case MRT6_DEL_MFC:
557 		case MRT6_PIM:
558 			error = ip6_mrouter_set(so, sopt);
559 			break;
560 		case IPV6_CHECKSUM:
561 			error = ip6_raw_ctloutput(so, sopt);
562 			break;
563 		default:
564 			error = ip6_ctloutput(so, sopt);
565 			break;
566 		}
567 		break;
568 	}
569 out:
570 	lwkt_replymsg(&msg->ctloutput.base.lmsg, error);
571 }
572 
573 static void
574 rip6_attach(netmsg_t msg)
575 {
576 	struct socket *so = msg->attach.base.nm_so;
577 	int proto = msg->attach.nm_proto;
578 	struct pru_attach_info *ai = msg->attach.nm_ai;
579 	struct inpcb *inp;
580 	int error;
581 
582 	inp = so->so_pcb;
583 	if (inp)
584 		panic("rip6_attach");
585 	error = priv_check_cred(ai->p_ucred, PRIV_NETINET_RAW, NULL_CRED_OKAY);
586 	if (error)
587 		goto out;
588 
589 	error = soreserve(so, rip_sendspace, rip_recvspace, ai->sb_rlimit);
590 	if (error)
591 		goto out;
592 	crit_enter();
593 	error = in_pcballoc(so, &ripcbinfo);
594 	crit_exit();
595 	if (error)
596 		goto out;
597 	inp = (struct inpcb *)so->so_pcb;
598 	inp->inp_vflag |= INP_IPV6;
599 	inp->in6p_ip6_nxt = (long)proto;
600 	inp->in6p_hops = -1;	/* use kernel default */
601 	inp->in6p_cksum = -1;
602 	inp->in6p_icmp6filt = kmalloc(sizeof(struct icmp6_filter), M_PCB,
603 				      M_NOWAIT);
604 	if (inp->in6p_icmp6filt != NULL)
605 		ICMP6_FILTER_SETPASSALL(inp->in6p_icmp6filt);
606 	error = 0;
607 out:
608 	lwkt_replymsg(&msg->attach.base.lmsg, error);
609 }
610 
611 static void
612 rip6_detach(netmsg_t msg)
613 {
614 	struct socket *so = msg->detach.base.nm_so;
615 	struct inpcb *inp;
616 
617 	inp = so->so_pcb;
618 	if (inp == NULL)
619 		panic("rip6_detach");
620 	/* xxx: RSVP */
621 	if (so == ip6_mrouter)
622 		ip6_mrouter_done();
623 	if (inp->in6p_icmp6filt) {
624 		kfree(inp->in6p_icmp6filt, M_PCB);
625 		inp->in6p_icmp6filt = NULL;
626 	}
627 	in6_pcbdetach(inp);
628 	lwkt_replymsg(&msg->detach.base.lmsg, 0);
629 }
630 
631 /*
632  * NOTE: (so) is referenced from soabort*() and netmsg_pru_abort()
633  *	 will sofree() it when we return.
634  */
635 static void
636 rip6_abort(netmsg_t msg)
637 {
638 	soisdisconnected(msg->abort.base.nm_so);
639 	rip6_detach(msg);
640 	/* msg invalid now */
641 }
642 
643 static void
644 rip6_disconnect(netmsg_t msg)
645 {
646 	struct socket *so = msg->disconnect.base.nm_so;
647 	struct inpcb *inp = so->so_pcb;
648 
649 	if (so->so_state & SS_ISCONNECTED) {
650 		inp->in6p_faddr = kin6addr_any;
651 		soreference(so);
652 		rip6_abort(msg);
653 		/* msg invalid now */
654 		sofree(so);
655 		return;
656 	}
657 	lwkt_replymsg(&msg->disconnect.base.lmsg, ENOTCONN);
658 }
659 
660 static void
661 rip6_bind(netmsg_t msg)
662 {
663 	struct socket *so = msg->bind.base.nm_so;
664 	struct sockaddr *nam = msg->bind.nm_nam;
665 	struct inpcb *inp = so->so_pcb;
666 	struct sockaddr_in6 *addr = (struct sockaddr_in6 *)nam;
667 	struct ifaddr *ia = NULL;
668 	int error;
669 
670 	if (nam->sa_len != sizeof(*addr)) {
671 		error = EINVAL;
672 		goto out;
673 	}
674 
675 	if (TAILQ_EMPTY(&ifnet) || addr->sin6_family != AF_INET6) {
676 		error = EADDRNOTAVAIL;
677 		goto out;
678 	}
679 #ifdef ENABLE_DEFAULT_SCOPE
680 	if (addr->sin6_scope_id == 0) {	/* not change if specified  */
681 		addr->sin6_scope_id = scope6_addr2default(&addr->sin6_addr);
682 	}
683 #endif
684 	if (!IN6_IS_ADDR_UNSPECIFIED(&addr->sin6_addr) &&
685 	    (ia = ifa_ifwithaddr((struct sockaddr *)addr)) == NULL) {
686 		error = EADDRNOTAVAIL;
687 		goto out;
688 	}
689 	if (ia &&
690 	    ((struct in6_ifaddr *)ia)->ia6_flags &
691 	    (IN6_IFF_ANYCAST|IN6_IFF_NOTREADY|
692 	     IN6_IFF_DETACHED|IN6_IFF_DEPRECATED)) {
693 		error = EADDRNOTAVAIL;
694 		goto out;
695 	}
696 	inp->in6p_laddr = addr->sin6_addr;
697 	error = 0;
698 out:
699 	lwkt_replymsg(&msg->bind.base.lmsg, error);
700 }
701 
702 static void
703 rip6_connect(netmsg_t msg)
704 {
705 	struct socket *so = msg->connect.base.nm_so;
706 	struct sockaddr *nam = msg->connect.nm_nam;
707 	struct inpcb *inp = so->so_pcb;
708 	struct sockaddr_in6 *addr = (struct sockaddr_in6 *)nam;
709 	struct in6_addr *in6a = NULL;
710 	int error = 0;
711 #ifdef ENABLE_DEFAULT_SCOPE
712 	struct sockaddr_in6 tmp;
713 #endif
714 
715 	if (nam->sa_len != sizeof(*addr)) {
716 		error = EINVAL;
717 		goto out;
718 	}
719 	if (TAILQ_EMPTY(&ifnet)) {
720 		error = EADDRNOTAVAIL;
721 		goto out;
722 	}
723 	if (addr->sin6_family != AF_INET6) {
724 		error = EAFNOSUPPORT;
725 		goto out;
726 	}
727 #ifdef ENABLE_DEFAULT_SCOPE
728 	if (addr->sin6_scope_id == 0) {	/* not change if specified  */
729 		/* avoid overwrites */
730 		tmp = *addr;
731 		addr = &tmp;
732 		addr->sin6_scope_id = scope6_addr2default(&addr->sin6_addr);
733 	}
734 #endif
735 	/* Source address selection. XXX: need pcblookup? */
736 	in6a = in6_selectsrc(addr, inp->in6p_outputopts,
737 			     inp->in6p_moptions, &inp->in6p_route,
738 			     &inp->in6p_laddr, &error, NULL);
739 	if (in6a == NULL) {
740 		if (error == 0)
741 			error = EADDRNOTAVAIL;
742 	} else {
743 		inp->in6p_laddr = *in6a;
744 		inp->in6p_faddr = addr->sin6_addr;
745 		soisconnected(so);
746 		error = 0;
747 	}
748 out:
749 	lwkt_replymsg(&msg->connect.base.lmsg, error);
750 }
751 
752 static void
753 rip6_shutdown(netmsg_t msg)
754 {
755 	socantsendmore(msg->shutdown.base.nm_so);
756 	lwkt_replymsg(&msg->shutdown.base.lmsg, 0);
757 }
758 
759 static void
760 rip6_send(netmsg_t msg)
761 {
762 	struct socket *so = msg->send.base.nm_so;
763 	struct mbuf *m = msg->send.nm_m;
764 	struct sockaddr *nam = msg->send.nm_addr;
765 	struct mbuf *control = msg->send.nm_control;
766 	struct inpcb *inp = so->so_pcb;
767 	struct sockaddr_in6 tmp;
768 	struct sockaddr_in6 *dst;
769 	int error;
770 
771 	/* always copy sockaddr to avoid overwrites */
772 	if (so->so_state & SS_ISCONNECTED) {
773 		if (nam) {
774 			m_freem(m);
775 			error = EISCONN;
776 			goto out;
777 		}
778 		/* XXX */
779 		bzero(&tmp, sizeof(tmp));
780 		tmp.sin6_family = AF_INET6;
781 		tmp.sin6_len = sizeof(struct sockaddr_in6);
782 		bcopy(&inp->in6p_faddr, &tmp.sin6_addr,
783 		      sizeof(struct in6_addr));
784 		dst = &tmp;
785 	} else {
786 		if (nam == NULL) {
787 			m_freem(m);
788 			error = ENOTCONN;
789 			goto out;
790 		}
791 		tmp = *(struct sockaddr_in6 *)nam;
792 		dst = &tmp;
793 	}
794 #ifdef ENABLE_DEFAULT_SCOPE
795 	if (dst->sin6_scope_id == 0) {	/* not change if specified  */
796 		dst->sin6_scope_id = scope6_addr2default(&dst->sin6_addr);
797 	}
798 #endif
799 	error = rip6_output(m, so, dst, control);
800 out:
801 	lwkt_replymsg(&msg->send.base.lmsg, error);
802 }
803 
804 struct pr_usrreqs rip6_usrreqs = {
805 	.pru_abort = rip6_abort,
806 	.pru_accept = pr_generic_notsupp,
807 	.pru_attach = rip6_attach,
808 	.pru_bind = rip6_bind,
809 	.pru_connect = rip6_connect,
810 	.pru_connect2 = pr_generic_notsupp,
811 	.pru_control = in6_control_dispatch,
812 	.pru_detach = rip6_detach,
813 	.pru_disconnect = rip6_disconnect,
814 	.pru_listen = pr_generic_notsupp,
815 	.pru_peeraddr = in6_setpeeraddr_dispatch,
816 	.pru_rcvd = pr_generic_notsupp,
817 	.pru_rcvoob = pr_generic_notsupp,
818 	.pru_send = rip6_send,
819 	.pru_sense = pru_sense_null,
820 	.pru_shutdown = rip6_shutdown,
821 	.pru_sockaddr = in6_setsockaddr_dispatch,
822 	.pru_sosend = sosend,
823 	.pru_soreceive = soreceive
824 };
825