version 1.113.8.2, 2008/03/24 07:16:24 |
version 1.115, 2008/04/08 23:37:43 |
Line 146 int ip6_sourcecheck_interval; /* XXX */ |
|
Line 146 int ip6_sourcecheck_interval; /* XXX */ |
|
struct pfil_head inet6_pfil_hook; |
struct pfil_head inet6_pfil_hook; |
#endif |
#endif |
|
|
struct ip6stat ip6stat; |
uint64_t ip6stat[IP6_NSTATS]; |
|
|
static void ip6_init2(void *); |
static void ip6_init2(void *); |
static struct m_tag *ip6_setdstifaddr(struct mbuf *, const struct in6_ifaddr *); |
static struct m_tag *ip6_setdstifaddr(struct mbuf *, const struct in6_ifaddr *); |
Line 280 ip6_input(struct mbuf *m) |
|
Line 280 ip6_input(struct mbuf *m) |
|
*/ |
*/ |
if (m->m_flags & M_EXT) { |
if (m->m_flags & M_EXT) { |
if (m->m_next) |
if (m->m_next) |
ip6stat.ip6s_mext2m++; |
ip6stat[IP6_STAT_MEXT2M]++; |
else |
else |
ip6stat.ip6s_mext1++; |
ip6stat[IP6_STAT_MEXT1]++; |
} else { |
} else { |
#define M2MMAX __arraycount(ip6stat.ip6s_m2m) |
#define M2MMAX 32 |
if (m->m_next) { |
if (m->m_next) { |
if (m->m_flags & M_LOOP) { |
if (m->m_flags & M_LOOP) { |
ip6stat.ip6s_m2m[lo0ifp->if_index]++; /* XXX */ |
/*XXX*/ ip6stat[IP6_STAT_M2M + lo0ifp->if_index]++; |
} else if (m->m_pkthdr.rcvif->if_index < M2MMAX) |
} else if (m->m_pkthdr.rcvif->if_index < M2MMAX) { |
ip6stat.ip6s_m2m[m->m_pkthdr.rcvif->if_index]++; |
ip6stat[IP6_STAT_M2M + |
else |
m->m_pkthdr.rcvif->if_index]++; |
ip6stat.ip6s_m2m[0]++; |
} else |
|
ip6stat[IP6_STAT_M2M]++; |
} else |
} else |
ip6stat.ip6s_m1++; |
ip6stat[IP6_STAT_M1]++; |
#undef M2MMAX |
#undef M2MMAX |
} |
} |
|
|
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_receive); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_receive); |
ip6stat.ip6s_total++; |
ip6stat[IP6_STAT_TOTAL]++; |
|
|
/* |
/* |
* If the IPv6 header is not aligned, slurp it up into a new |
* If the IPv6 header is not aligned, slurp it up into a new |
Line 311 ip6_input(struct mbuf *m) |
|
Line 312 ip6_input(struct mbuf *m) |
|
if ((m = m_copyup(m, sizeof(struct ip6_hdr), |
if ((m = m_copyup(m, sizeof(struct ip6_hdr), |
(max_linkhdr + 3) & ~3)) == NULL) { |
(max_linkhdr + 3) & ~3)) == NULL) { |
/* XXXJRT new stat, please */ |
/* XXXJRT new stat, please */ |
ip6stat.ip6s_toosmall++; |
ip6stat[IP6_STAT_TOOSMALL]++; |
in6_ifstat_inc(inifp, ifs6_in_hdrerr); |
in6_ifstat_inc(inifp, ifs6_in_hdrerr); |
return; |
return; |
} |
} |
} else if (__predict_false(m->m_len < sizeof(struct ip6_hdr))) { |
} else if (__predict_false(m->m_len < sizeof(struct ip6_hdr))) { |
struct ifnet *inifp = m->m_pkthdr.rcvif; |
struct ifnet *inifp = m->m_pkthdr.rcvif; |
if ((m = m_pullup(m, sizeof(struct ip6_hdr))) == NULL) { |
if ((m = m_pullup(m, sizeof(struct ip6_hdr))) == NULL) { |
ip6stat.ip6s_toosmall++; |
ip6stat[IP6_STAT_TOOSMALL]++; |
in6_ifstat_inc(inifp, ifs6_in_hdrerr); |
in6_ifstat_inc(inifp, ifs6_in_hdrerr); |
return; |
return; |
} |
} |
Line 327 ip6_input(struct mbuf *m) |
|
Line 328 ip6_input(struct mbuf *m) |
|
ip6 = mtod(m, struct ip6_hdr *); |
ip6 = mtod(m, struct ip6_hdr *); |
|
|
if ((ip6->ip6_vfc & IPV6_VERSION_MASK) != IPV6_VERSION) { |
if ((ip6->ip6_vfc & IPV6_VERSION_MASK) != IPV6_VERSION) { |
ip6stat.ip6s_badvers++; |
ip6stat[IP6_STAT_BADVERS]++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_hdrerr); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_hdrerr); |
goto bad; |
goto bad; |
} |
} |
Line 376 ip6_input(struct mbuf *m) |
|
Line 377 ip6_input(struct mbuf *m) |
|
} |
} |
#endif /* PFIL_HOOKS */ |
#endif /* PFIL_HOOKS */ |
|
|
ip6stat.ip6s_nxthist[ip6->ip6_nxt]++; |
ip6stat[IP6_STAT_NXTHIST + ip6->ip6_nxt]++; |
|
|
#ifdef ALTQ |
#ifdef ALTQ |
if (altq_input != NULL && (*altq_input)(m, AF_INET6) == 0) { |
if (altq_input != NULL && (*altq_input)(m, AF_INET6) == 0) { |
Line 393 ip6_input(struct mbuf *m) |
|
Line 394 ip6_input(struct mbuf *m) |
|
/* |
/* |
* XXX: "badscope" is not very suitable for a multicast source. |
* XXX: "badscope" is not very suitable for a multicast source. |
*/ |
*/ |
ip6stat.ip6s_badscope++; |
ip6stat[IP6_STAT_BADSCOPE]++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr); |
goto bad; |
goto bad; |
} |
} |
Line 411 ip6_input(struct mbuf *m) |
|
Line 412 ip6_input(struct mbuf *m) |
|
*/ |
*/ |
if (IN6_IS_ADDR_V4MAPPED(&ip6->ip6_src) || |
if (IN6_IS_ADDR_V4MAPPED(&ip6->ip6_src) || |
IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst)) { |
IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst)) { |
ip6stat.ip6s_badscope++; |
ip6stat[IP6_STAT_BADSCOPE]++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr); |
goto bad; |
goto bad; |
} |
} |
Line 425 ip6_input(struct mbuf *m) |
|
Line 426 ip6_input(struct mbuf *m) |
|
*/ |
*/ |
if (IN6_IS_ADDR_V4COMPAT(&ip6->ip6_src) || |
if (IN6_IS_ADDR_V4COMPAT(&ip6->ip6_src) || |
IN6_IS_ADDR_V4COMPAT(&ip6->ip6_dst)) { |
IN6_IS_ADDR_V4COMPAT(&ip6->ip6_dst)) { |
ip6stat.ip6s_badscope++; |
ip6stat[IP6_STAT_BADSCOPE]++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr); |
goto bad; |
goto bad; |
} |
} |
Line 446 ip6_input(struct mbuf *m) |
|
Line 447 ip6_input(struct mbuf *m) |
|
goto bad; |
goto bad; |
ip6 = mtod(m, struct ip6_hdr *); |
ip6 = mtod(m, struct ip6_hdr *); |
if (in6_clearscope(&ip6->ip6_src) || in6_clearscope(&ip6->ip6_dst)) { |
if (in6_clearscope(&ip6->ip6_src) || in6_clearscope(&ip6->ip6_dst)) { |
ip6stat.ip6s_badscope++; /* XXX */ |
ip6stat[IP6_STAT_BADSCOPE]++;/*XXX*/ |
goto bad; |
goto bad; |
} |
} |
if (in6_setscope(&ip6->ip6_src, m->m_pkthdr.rcvif, NULL) || |
if (in6_setscope(&ip6->ip6_src, m->m_pkthdr.rcvif, NULL) || |
in6_setscope(&ip6->ip6_dst, m->m_pkthdr.rcvif, NULL)) { |
in6_setscope(&ip6->ip6_dst, m->m_pkthdr.rcvif, NULL)) { |
ip6stat.ip6s_badscope++; |
ip6stat[IP6_STAT_BADSCOPE]++; |
goto bad; |
goto bad; |
} |
} |
|
|
Line 470 ip6_input(struct mbuf *m) |
|
Line 471 ip6_input(struct mbuf *m) |
|
if (in6m) |
if (in6m) |
ours = 1; |
ours = 1; |
else if (!ip6_mrouter) { |
else if (!ip6_mrouter) { |
ip6stat.ip6s_notmember++; |
ip6stat[IP6_STAT_NOTMEMBER]++; |
ip6stat.ip6s_cantforward++; |
ip6stat[IP6_STAT_CANTFORWARD]++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_discard); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_discard); |
goto bad; |
goto bad; |
} |
} |
Line 486 ip6_input(struct mbuf *m) |
|
Line 487 ip6_input(struct mbuf *m) |
|
*/ |
*/ |
rt = rtcache_lookup2(&ip6_forward_rt, &u.dst, 1, &hit); |
rt = rtcache_lookup2(&ip6_forward_rt, &u.dst, 1, &hit); |
if (hit) |
if (hit) |
ip6stat.ip6s_forward_cachehit++; |
ip6stat[IP6_STAT_FORWARD_CACHEHIT]++; |
else |
else |
ip6stat.ip6s_forward_cachemiss++; |
ip6stat[IP6_STAT_FORWARD_CACHEMISS]++; |
|
|
#define rt6_getkey(__rt) satocsin6(rt_getkey(__rt)) |
#define rt6_getkey(__rt) satocsin6(rt_getkey(__rt)) |
|
|
Line 512 ip6_input(struct mbuf *m) |
|
Line 513 ip6_input(struct mbuf *m) |
|
*/ |
*/ |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, &rt6_getkey(rt)->sin6_addr) && |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, &rt6_getkey(rt)->sin6_addr) && |
#endif |
#endif |
#ifdef MOBILE_IPV6 |
rt->rt_ifp->if_type == IFT_LOOP) { |
((rt->rt_flags & RTF_ANNOUNCE) || |
|
rt->rt_ifp->if_type == IFT_LOOP) |
|
#else |
|
rt->rt_ifp->if_type == IFT_LOOP |
|
#endif /* MOBILE_IPV6 */ |
|
) { |
|
struct in6_ifaddr *ia6 = (struct in6_ifaddr *)rt->rt_ifa; |
struct in6_ifaddr *ia6 = (struct in6_ifaddr *)rt->rt_ifa; |
if (ia6->ia6_flags & IN6_IFF_ANYCAST) |
if (ia6->ia6_flags & IN6_IFF_ANYCAST) |
m->m_flags |= M_ANYCAST6; |
m->m_flags |= M_ANYCAST6; |
#ifdef MOBILE_IPV6 |
|
/* check unicast NS */ |
|
if ((rtcache_validate(&ip6_forward_rt)->rt_flags & RTF_ANNOUNCE) != 0) { |
|
/* This route shows proxy nd. thus the packet was |
|
* captured. this packet should be tunneled to |
|
* actual coa with tunneling unless this is NS. |
|
*/ |
|
int nh, loff; |
|
struct icmp6_hdr *icp; |
|
loff = ip6_lasthdr(m, 0, IPPROTO_IPV6, &nh); |
|
if (loff < 0 || nh != IPPROTO_ICMPV6) |
|
goto mip6_forwarding; |
|
IP6_EXTHDR_GET(icp, struct icmp6_hdr *, m, loff, |
|
sizeof(*icp)); |
|
if (icp == NULL) { |
|
icmp6stat.icp6s_tooshort++; |
|
return; |
|
} |
|
if (icp->icmp6_type != ND_NEIGHBOR_SOLICIT) |
|
goto mip6_forwarding; |
|
} |
|
#endif /* MOBILE_IPV6 */ |
|
/* |
/* |
* packets to a tentative, duplicated, or somehow invalid |
* packets to a tentative, duplicated, or somehow invalid |
* address must not be accepted. |
* address must not be accepted. |
Line 564 ip6_input(struct mbuf *m) |
|
Line 537 ip6_input(struct mbuf *m) |
|
} |
} |
} |
} |
|
|
#ifdef MOBILE_IPV6 |
|
mip6_forwarding: |
|
#endif /* MOBILE_IPV6 */ |
|
|
|
/* |
/* |
* FAITH (Firewall Aided Internet Translator) |
* FAITH (Firewall Aided Internet Translator) |
*/ |
*/ |
Line 610 ip6_input(struct mbuf *m) |
|
Line 579 ip6_input(struct mbuf *m) |
|
* and we're not a router. |
* and we're not a router. |
*/ |
*/ |
if (!ip6_forwarding) { |
if (!ip6_forwarding) { |
ip6stat.ip6s_cantforward++; |
ip6stat[IP6_STAT_CANTFORWARD]++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_discard); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_discard); |
goto bad; |
goto bad; |
} |
} |
Line 665 ip6_input(struct mbuf *m) |
|
Line 634 ip6_input(struct mbuf *m) |
|
* contained, ip6_hopopts_input() must set a valid |
* contained, ip6_hopopts_input() must set a valid |
* (non-zero) payload length to the variable plen. |
* (non-zero) payload length to the variable plen. |
*/ |
*/ |
ip6stat.ip6s_badoptions++; |
ip6stat[IP6_STAT_BADOPTIONS]++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_discard); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_discard); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_hdrerr); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_hdrerr); |
icmp6_error(m, ICMP6_PARAM_PROB, |
icmp6_error(m, ICMP6_PARAM_PROB, |
Line 676 ip6_input(struct mbuf *m) |
|
Line 645 ip6_input(struct mbuf *m) |
|
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, sizeof(struct ip6_hdr), |
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, sizeof(struct ip6_hdr), |
sizeof(struct ip6_hbh)); |
sizeof(struct ip6_hbh)); |
if (hbh == NULL) { |
if (hbh == NULL) { |
ip6stat.ip6s_tooshort++; |
ip6stat[IP6_STAT_TOOSHORT]++; |
return; |
return; |
} |
} |
KASSERT(IP6_HDR_ALIGNED_P(hbh)); |
KASSERT(IP6_HDR_ALIGNED_P(hbh)); |
Line 698 ip6_input(struct mbuf *m) |
|
Line 667 ip6_input(struct mbuf *m) |
|
* Drop packet if shorter than we expect. |
* Drop packet if shorter than we expect. |
*/ |
*/ |
if (m->m_pkthdr.len - sizeof(struct ip6_hdr) < plen) { |
if (m->m_pkthdr.len - sizeof(struct ip6_hdr) < plen) { |
ip6stat.ip6s_tooshort++; |
ip6stat[IP6_STAT_TOOSHORT]++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_truncated); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_truncated); |
goto bad; |
goto bad; |
} |
} |
Line 723 ip6_input(struct mbuf *m) |
|
Line 692 ip6_input(struct mbuf *m) |
|
* must be discarded, else it may be accepted below. |
* must be discarded, else it may be accepted below. |
*/ |
*/ |
if (ip6_mrouter && ip6_mforward(ip6, m->m_pkthdr.rcvif, m)) { |
if (ip6_mrouter && ip6_mforward(ip6, m->m_pkthdr.rcvif, m)) { |
ip6stat.ip6s_cantforward++; |
ip6stat[IP6_STAT_CANTFORWARD]++; |
m_freem(m); |
m_freem(m); |
return; |
return; |
} |
} |
Line 749 ip6_input(struct mbuf *m) |
|
Line 718 ip6_input(struct mbuf *m) |
|
*/ |
*/ |
if (IN6_IS_ADDR_V4MAPPED(&ip6->ip6_src) || |
if (IN6_IS_ADDR_V4MAPPED(&ip6->ip6_src) || |
IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst)) { |
IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst)) { |
ip6stat.ip6s_badscope++; |
ip6stat[IP6_STAT_BADSCOPE]++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr); |
goto bad; |
goto bad; |
} |
} |
Line 765 ip6_input(struct mbuf *m) |
|
Line 734 ip6_input(struct mbuf *m) |
|
ia6->ia_ifa.ifa_data.ifad_inbytes += m->m_pkthdr.len; |
ia6->ia_ifa.ifa_data.ifad_inbytes += m->m_pkthdr.len; |
} |
} |
#endif |
#endif |
ip6stat.ip6s_delivered++; |
ip6stat[IP6_STAT_DELIVERED]++; |
in6_ifstat_inc(deliverifp, ifs6_in_deliver); |
in6_ifstat_inc(deliverifp, ifs6_in_deliver); |
nest = 0; |
nest = 0; |
|
|
rh_present = 0; |
rh_present = 0; |
while (nxt != IPPROTO_DONE) { |
while (nxt != IPPROTO_DONE) { |
if (ip6_hdrnestlimit && (++nest > ip6_hdrnestlimit)) { |
if (ip6_hdrnestlimit && (++nest > ip6_hdrnestlimit)) { |
ip6stat.ip6s_toomanyhdr++; |
ip6stat[IP6_STAT_TOOMANYHDR]++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_hdrerr); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_hdrerr); |
goto bad; |
goto bad; |
} |
} |
Line 782 ip6_input(struct mbuf *m) |
|
Line 751 ip6_input(struct mbuf *m) |
|
* more sanity checks in header chain processing. |
* more sanity checks in header chain processing. |
*/ |
*/ |
if (m->m_pkthdr.len < off) { |
if (m->m_pkthdr.len < off) { |
ip6stat.ip6s_tooshort++; |
ip6stat[IP6_STAT_TOOSHORT]++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_truncated); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_truncated); |
goto bad; |
goto bad; |
} |
} |
Line 791 ip6_input(struct mbuf *m) |
|
Line 760 ip6_input(struct mbuf *m) |
|
if (rh_present++) { |
if (rh_present++) { |
in6_ifstat_inc(m->m_pkthdr.rcvif, |
in6_ifstat_inc(m->m_pkthdr.rcvif, |
ifs6_in_hdrerr); |
ifs6_in_hdrerr); |
ip6stat.ip6s_badoptions++; |
ip6stat[IP6_STAT_BADOPTIONS]++; |
goto bad; |
goto bad; |
} |
} |
} |
} |
Line 847 ip6_input(struct mbuf *m) |
|
Line 816 ip6_input(struct mbuf *m) |
|
} |
} |
#endif /* FAST_IPSEC */ |
#endif /* FAST_IPSEC */ |
|
|
if (dest6_mip6_hao(m, off, nxt) < 0) |
|
goto bad; |
|
|
|
nxt = (*inet6sw[ip6_protox[nxt]].pr_input)(&m, &off, nxt); |
nxt = (*inet6sw[ip6_protox[nxt]].pr_input)(&m, &off, nxt); |
} |
} |
Line 870 ip6_setdstifaddr(struct mbuf *m, const s |
|
Line 837 ip6_setdstifaddr(struct mbuf *m, const s |
|
struct ip6aux *ip6a; |
struct ip6aux *ip6a; |
|
|
ip6a = (struct ip6aux *)(mtag + 1); |
ip6a = (struct ip6aux *)(mtag + 1); |
in6_setscope(&ip6a->ip6a_src, ia->ia_ifp, &ip6a->ip6a_src_scope_id); |
in6_setscope(&ip6a->ip6a_src, ia->ia_ifp, &ip6a->ip6a_scope_id); |
ip6a->ip6a_src = ia->ia_addr.sin6_addr; |
ip6a->ip6a_src = ia->ia_addr.sin6_addr; |
ip6a->ip6a_src_flags = ia->ia6_flags; |
ip6a->ip6a_flags = ia->ia6_flags; |
} |
} |
return mtag; /* NULL if failed to set */ |
return mtag; /* NULL if failed to set */ |
} |
} |
Line 907 ip6_hopopts_input(u_int32_t *plenp, u_in |
|
Line 874 ip6_hopopts_input(u_int32_t *plenp, u_in |
|
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, |
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, |
sizeof(struct ip6_hdr), sizeof(struct ip6_hbh)); |
sizeof(struct ip6_hdr), sizeof(struct ip6_hbh)); |
if (hbh == NULL) { |
if (hbh == NULL) { |
ip6stat.ip6s_tooshort++; |
ip6stat[IP6_STAT_TOOSHORT]++; |
return -1; |
return -1; |
} |
} |
hbhlen = (hbh->ip6h_len + 1) << 3; |
hbhlen = (hbh->ip6h_len + 1) << 3; |
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, sizeof(struct ip6_hdr), |
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, sizeof(struct ip6_hdr), |
hbhlen); |
hbhlen); |
if (hbh == NULL) { |
if (hbh == NULL) { |
ip6stat.ip6s_tooshort++; |
ip6stat[IP6_STAT_TOOSHORT]++; |
return -1; |
return -1; |
} |
} |
KASSERT(IP6_HDR_ALIGNED_P(hbh)); |
KASSERT(IP6_HDR_ALIGNED_P(hbh)); |
Line 958 ip6_process_hopopts(struct mbuf *m, u_in |
|
Line 925 ip6_process_hopopts(struct mbuf *m, u_in |
|
break; |
break; |
case IP6OPT_PADN: |
case IP6OPT_PADN: |
if (hbhlen < IP6OPT_MINLEN) { |
if (hbhlen < IP6OPT_MINLEN) { |
ip6stat.ip6s_toosmall++; |
ip6stat[IP6_STAT_TOOSMALL]++; |
goto bad; |
goto bad; |
} |
} |
optlen = *(opt + 1) + 2; |
optlen = *(opt + 1) + 2; |
Line 966 ip6_process_hopopts(struct mbuf *m, u_in |
|
Line 933 ip6_process_hopopts(struct mbuf *m, u_in |
|
case IP6OPT_RTALERT: |
case IP6OPT_RTALERT: |
/* XXX may need check for alignment */ |
/* XXX may need check for alignment */ |
if (hbhlen < IP6OPT_RTALERT_LEN) { |
if (hbhlen < IP6OPT_RTALERT_LEN) { |
ip6stat.ip6s_toosmall++; |
ip6stat[IP6_STAT_TOOSMALL]++; |
goto bad; |
goto bad; |
} |
} |
if (*(opt + 1) != IP6OPT_RTALERT_LEN - 2) { |
if (*(opt + 1) != IP6OPT_RTALERT_LEN - 2) { |
Line 983 ip6_process_hopopts(struct mbuf *m, u_in |
|
Line 950 ip6_process_hopopts(struct mbuf *m, u_in |
|
case IP6OPT_JUMBO: |
case IP6OPT_JUMBO: |
/* XXX may need check for alignment */ |
/* XXX may need check for alignment */ |
if (hbhlen < IP6OPT_JUMBO_LEN) { |
if (hbhlen < IP6OPT_JUMBO_LEN) { |
ip6stat.ip6s_toosmall++; |
ip6stat[IP6_STAT_TOOSMALL]++; |
goto bad; |
goto bad; |
} |
} |
if (*(opt + 1) != IP6OPT_JUMBO_LEN - 2) { |
if (*(opt + 1) != IP6OPT_JUMBO_LEN - 2) { |
Line 1001 ip6_process_hopopts(struct mbuf *m, u_in |
|
Line 968 ip6_process_hopopts(struct mbuf *m, u_in |
|
*/ |
*/ |
ip6 = mtod(m, struct ip6_hdr *); |
ip6 = mtod(m, struct ip6_hdr *); |
if (ip6->ip6_plen) { |
if (ip6->ip6_plen) { |
ip6stat.ip6s_badoptions++; |
ip6stat[IP6_STAT_BADOPTIONS]++; |
icmp6_error(m, ICMP6_PARAM_PROB, |
icmp6_error(m, ICMP6_PARAM_PROB, |
ICMP6_PARAMPROB_HEADER, |
ICMP6_PARAMPROB_HEADER, |
erroff + opt - opthead); |
erroff + opt - opthead); |
Line 1025 ip6_process_hopopts(struct mbuf *m, u_in |
|
Line 992 ip6_process_hopopts(struct mbuf *m, u_in |
|
* there's no explicit mention in specification. |
* there's no explicit mention in specification. |
*/ |
*/ |
if (*plenp != 0) { |
if (*plenp != 0) { |
ip6stat.ip6s_badoptions++; |
ip6stat[IP6_STAT_BADOPTIONS]++; |
icmp6_error(m, ICMP6_PARAM_PROB, |
icmp6_error(m, ICMP6_PARAM_PROB, |
ICMP6_PARAMPROB_HEADER, |
ICMP6_PARAMPROB_HEADER, |
erroff + opt + 2 - opthead); |
erroff + opt + 2 - opthead); |
Line 1037 ip6_process_hopopts(struct mbuf *m, u_in |
|
Line 1004 ip6_process_hopopts(struct mbuf *m, u_in |
|
* jumbo payload length must be larger than 65535. |
* jumbo payload length must be larger than 65535. |
*/ |
*/ |
if (jumboplen <= IPV6_MAXPACKET) { |
if (jumboplen <= IPV6_MAXPACKET) { |
ip6stat.ip6s_badoptions++; |
ip6stat[IP6_STAT_BADOPTIONS]++; |
icmp6_error(m, ICMP6_PARAM_PROB, |
icmp6_error(m, ICMP6_PARAM_PROB, |
ICMP6_PARAMPROB_HEADER, |
ICMP6_PARAMPROB_HEADER, |
erroff + opt + 2 - opthead); |
erroff + opt + 2 - opthead); |
Line 1048 ip6_process_hopopts(struct mbuf *m, u_in |
|
Line 1015 ip6_process_hopopts(struct mbuf *m, u_in |
|
break; |
break; |
default: /* unknown option */ |
default: /* unknown option */ |
if (hbhlen < IP6OPT_MINLEN) { |
if (hbhlen < IP6OPT_MINLEN) { |
ip6stat.ip6s_toosmall++; |
ip6stat[IP6_STAT_TOOSMALL]++; |
goto bad; |
goto bad; |
} |
} |
optlen = ip6_unknown_opt(opt, m, |
optlen = ip6_unknown_opt(opt, m, |
Line 1085 ip6_unknown_opt(u_int8_t *optp, struct m |
|
Line 1052 ip6_unknown_opt(u_int8_t *optp, struct m |
|
m_freem(m); |
m_freem(m); |
return (-1); |
return (-1); |
case IP6OPT_TYPE_FORCEICMP: /* send ICMP even if multicasted */ |
case IP6OPT_TYPE_FORCEICMP: /* send ICMP even if multicasted */ |
ip6stat.ip6s_badoptions++; |
ip6stat[IP6_STAT_BADOPTIONS]++; |
icmp6_error(m, ICMP6_PARAM_PROB, ICMP6_PARAMPROB_OPTION, off); |
icmp6_error(m, ICMP6_PARAM_PROB, ICMP6_PARAMPROB_OPTION, off); |
return (-1); |
return (-1); |
case IP6OPT_TYPE_ICMP: /* send ICMP if not multicasted */ |
case IP6OPT_TYPE_ICMP: /* send ICMP if not multicasted */ |
ip6stat.ip6s_badoptions++; |
ip6stat[IP6_STAT_BADOPTIONS]++; |
ip6 = mtod(m, struct ip6_hdr *); |
ip6 = mtod(m, struct ip6_hdr *); |
if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) || |
if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) || |
(m->m_flags & (M_BCAST|M_MCAST))) |
(m->m_flags & (M_BCAST|M_MCAST))) |
Line 1204 ip6_savecontrol(struct in6pcb *in6p, str |
|
Line 1171 ip6_savecontrol(struct in6pcb *in6p, str |
|
ext = ip6_pullexthdr(m, sizeof(struct ip6_hdr), |
ext = ip6_pullexthdr(m, sizeof(struct ip6_hdr), |
xip6->ip6_nxt); |
xip6->ip6_nxt); |
if (ext == NULL) { |
if (ext == NULL) { |
ip6stat.ip6s_tooshort++; |
ip6stat[IP6_STAT_TOOSHORT]++; |
return; |
return; |
} |
} |
hbh = mtod(ext, struct ip6_hbh *); |
hbh = mtod(ext, struct ip6_hbh *); |
hbhlen = (hbh->ip6h_len + 1) << 3; |
hbhlen = (hbh->ip6h_len + 1) << 3; |
if (hbhlen != ext->m_len) { |
if (hbhlen != ext->m_len) { |
m_freem(ext); |
m_freem(ext); |
ip6stat.ip6s_tooshort++; |
ip6stat[IP6_STAT_TOOSHORT]++; |
return; |
return; |
} |
} |
|
|
Line 1263 ip6_savecontrol(struct in6pcb *in6p, str |
|
Line 1230 ip6_savecontrol(struct in6pcb *in6p, str |
|
|
|
ext = ip6_pullexthdr(m, off, nxt); |
ext = ip6_pullexthdr(m, off, nxt); |
if (ext == NULL) { |
if (ext == NULL) { |
ip6stat.ip6s_tooshort++; |
ip6stat[IP6_STAT_TOOSHORT]++; |
return; |
return; |
} |
} |
ip6e = mtod(ext, struct ip6_ext *); |
ip6e = mtod(ext, struct ip6_ext *); |
Line 1273 ip6_savecontrol(struct in6pcb *in6p, str |
|
Line 1240 ip6_savecontrol(struct in6pcb *in6p, str |
|
elen = (ip6e->ip6e_len + 1) << 3; |
elen = (ip6e->ip6e_len + 1) << 3; |
if (elen != ext->m_len) { |
if (elen != ext->m_len) { |
m_freem(ext); |
m_freem(ext); |
ip6stat.ip6s_tooshort++; |
ip6stat[IP6_STAT_TOOSHORT]++; |
return; |
return; |
} |
} |
KASSERT(IP6_HDR_ALIGNED_P(ip6e)); |
KASSERT(IP6_HDR_ALIGNED_P(ip6e)); |
Line 1927 SYSCTL_SETUP(sysctl_net_inet6_ip6_setup, |
|
Line 1894 SYSCTL_SETUP(sysctl_net_inet6_ip6_setup, |
|
CTLFLAG_PERMANENT, |
CTLFLAG_PERMANENT, |
CTLTYPE_STRUCT, "stats", |
CTLTYPE_STRUCT, "stats", |
SYSCTL_DESCR("IPv6 statistics"), |
SYSCTL_DESCR("IPv6 statistics"), |
NULL, 0, &ip6stat, sizeof(ip6stat), |
NULL, 0, ip6stat, sizeof(ip6stat), |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
IPV6CTL_STATS, CTL_EOL); |
IPV6CTL_STATS, CTL_EOL); |
sysctl_createv(clog, 0, NULL, NULL, |
sysctl_createv(clog, 0, NULL, NULL, |