version 1.37.2.8, 2002/01/08 00:34:19 |
version 1.37.2.9, 2002/06/20 03:49:19 |
Line 110 __KERNEL_RCSID(0, "$NetBSD$"); |
|
Line 110 __KERNEL_RCSID(0, "$NetBSD$"); |
|
#include <netinet/icmp6.h> |
#include <netinet/icmp6.h> |
#include <netinet6/in6_ifattach.h> |
#include <netinet6/in6_ifattach.h> |
#include <netinet6/nd6.h> |
#include <netinet6/nd6.h> |
#include <netinet6/in6_prefix.h> |
|
|
|
#ifdef IPSEC |
#ifdef IPSEC |
#include <netinet6/ipsec.h> |
#include <netinet6/ipsec.h> |
|
|
{ |
{ |
struct ip6protosw *pr; |
struct ip6protosw *pr; |
int i; |
int i; |
struct timeval tv; |
|
|
|
pr = (struct ip6protosw *)pffindproto(PF_INET6, IPPROTO_RAW, SOCK_RAW); |
pr = (struct ip6protosw *)pffindproto(PF_INET6, IPPROTO_RAW, SOCK_RAW); |
if (pr == 0) |
if (pr == 0) |
|
|
ip6intrq.ifq_maxlen = ip6qmaxlen; |
ip6intrq.ifq_maxlen = ip6qmaxlen; |
nd6_init(); |
nd6_init(); |
frag6_init(); |
frag6_init(); |
/* |
ip6_flow_seq = arc4random(); |
* in many cases, random() here does NOT return random number |
|
* as initialization during bootstrap time occur in fixed order. |
|
*/ |
|
microtime(&tv); |
|
ip6_flow_seq = random() ^ tv.tv_usec; |
|
|
|
ip6_init2((void *)0); |
ip6_init2((void *)0); |
|
|
|
|
ip6_init2(dummy) |
ip6_init2(dummy) |
void *dummy; |
void *dummy; |
{ |
{ |
/* |
|
* to route local address of p2p link to loopback, |
|
* assign loopback address first. |
|
*/ |
|
in6_ifattach(&loif[0], NULL); |
|
|
|
/* nd6_timer_init */ |
/* nd6_timer_init */ |
callout_init(&nd6_timer_ch); |
callout_init(&nd6_timer_ch); |
callout_reset(&nd6_timer_ch, hz, nd6_timer, NULL); |
callout_reset(&nd6_timer_ch, hz, nd6_timer, NULL); |
/* router renumbering prefix list maintenance */ |
|
callout_init(&in6_rr_timer_ch); |
|
callout_reset(&in6_rr_timer_ch, hz, in6_rr_timer, NULL); |
|
} |
} |
|
|
/* |
/* |
|
|
if (m->m_len < sizeof(struct ip6_hdr)) { |
if (m->m_len < sizeof(struct ip6_hdr)) { |
struct ifnet *inifp; |
struct ifnet *inifp; |
inifp = m->m_pkthdr.rcvif; |
inifp = m->m_pkthdr.rcvif; |
if ((m = m_pullup(m, sizeof(struct ip6_hdr))) == 0) { |
if ((m = m_pullup(m, sizeof(struct ip6_hdr))) == NULL) { |
ip6stat.ip6s_toosmall++; |
ip6stat.ip6s_toosmall++; |
in6_ifstat_inc(inifp, ifs6_in_hdrerr); |
in6_ifstat_inc(inifp, ifs6_in_hdrerr); |
return; |
return; |
|
|
*/ |
*/ |
if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_src) || |
if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_src) || |
IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_dst)) { |
IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_dst)) { |
|
/* |
|
* XXX: "badscope" is not very suitable for a multicast source. |
|
*/ |
ip6stat.ip6s_badscope++; |
ip6stat.ip6s_badscope++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr); |
goto bad; |
goto bad; |
|
|
* support IPv4-less kernel compilation, we cannot support SIIT |
* support IPv4-less kernel compilation, we cannot support SIIT |
* environment at all. So, it makes more sense for us to reject any |
* environment at all. So, it makes more sense for us to reject any |
* malicious packets for non-SIIT environment, than try to do a |
* malicious packets for non-SIIT environment, than try to do a |
* partical support for SIIT environment. |
* partial support for SIIT environment. |
*/ |
*/ |
if (IN6_IS_ADDR_V4MAPPED(&ip6->ip6_src) || |
if (IN6_IS_ADDR_V4MAPPED(&ip6->ip6_src) || |
IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst)) { |
IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst)) { |
|
|
* Unicast check |
* Unicast check |
*/ |
*/ |
if (ip6_forward_rt.ro_rt != NULL && |
if (ip6_forward_rt.ro_rt != NULL && |
(ip6_forward_rt.ro_rt->rt_flags & RTF_UP) != 0 && |
(ip6_forward_rt.ro_rt->rt_flags & RTF_UP) != 0 && |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
&((struct sockaddr_in6 *)(&ip6_forward_rt.ro_dst))->sin6_addr)) |
&((struct sockaddr_in6 *)(&ip6_forward_rt.ro_dst))->sin6_addr)) |
ip6stat.ip6s_forward_cachehit++; |
ip6stat.ip6s_forward_cachehit++; |
|
|
if (ip6_forward_rt.ro_rt && |
if (ip6_forward_rt.ro_rt && |
(ip6_forward_rt.ro_rt->rt_flags & |
(ip6_forward_rt.ro_rt->rt_flags & |
(RTF_HOST|RTF_GATEWAY)) == RTF_HOST && |
(RTF_HOST|RTF_GATEWAY)) == RTF_HOST && |
|
!(ip6_forward_rt.ro_rt->rt_flags & RTF_CLONED) && |
#if 0 |
#if 0 |
/* |
/* |
* The check below is redundant since the comparison of |
* The check below is redundant since the comparison of |
|
|
* already done through looking up the routing table. |
* already done through looking up the routing table. |
*/ |
*/ |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
&rt6_key(ip6_forward_rt.ro_rt)->sin6_addr) && |
&rt6_key(ip6_forward_rt.ro_rt)->sin6_addr) && |
#endif |
#endif |
ip6_forward_rt.ro_rt->rt_ifp->if_type == IFT_LOOP) { |
ip6_forward_rt.ro_rt->rt_ifp->if_type == IFT_LOOP) { |
struct in6_ifaddr *ia6 = |
struct in6_ifaddr *ia6 = |
|
|
} |
} |
|
|
/* |
/* |
* FAITH(Firewall Aided Internet Translator) |
* FAITH (Firewall Aided Internet Translator) |
*/ |
*/ |
#if defined(NFAITH) && 0 < NFAITH |
#if defined(NFAITH) && 0 < NFAITH |
if (ip6_keepfaith) { |
if (ip6_keepfaith) { |
|
|
/* |
/* |
* Note that if a valid jumbo payload option is |
* Note that if a valid jumbo payload option is |
* contained, ip6_hoptops_input() must set a valid |
* contained, ip6_hoptops_input() must set a valid |
* (non-zero) payload length to the variable plen. |
* (non-zero) payload length to the variable plen. |
*/ |
*/ |
ip6stat.ip6s_badoptions++; |
ip6stat.ip6s_badoptions++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_discard); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_discard); |
|
|
} else if (!ours) { |
} else if (!ours) { |
ip6_forward(m, 0); |
ip6_forward(m, 0); |
return; |
return; |
} |
} |
|
|
ip6 = mtod(m, struct ip6_hdr *); |
ip6 = mtod(m, struct ip6_hdr *); |
|
|
|
|
goto bad; |
goto bad; |
} |
} |
#endif |
#endif |
|
|
nxt = (*inet6sw[ip6_protox[nxt]].pr_input)(&m, &off, nxt); |
nxt = (*inet6sw[ip6_protox[nxt]].pr_input)(&m, &off, nxt); |
} |
} |
return; |
return; |
Line 819 ip6_hopopts_input(plenp, rtalertp, mp, o |
|
Line 808 ip6_hopopts_input(plenp, rtalertp, mp, o |
|
* This function is separate from ip6_hopopts_input() in order to |
* This function is separate from ip6_hopopts_input() in order to |
* handle a case where the sending node itself process its hop-by-hop |
* handle a case where the sending node itself process its hop-by-hop |
* options header. In such a case, the function is called from ip6_output(). |
* options header. In such a case, the function is called from ip6_output(). |
|
* |
|
* The function assumes that hbh header is located right after the IPv6 header |
|
* (RFC2460 p7), opthead is pointer into data content in m, and opthead to |
|
* opthead + hbhlen is located in continuous memory region. |
*/ |
*/ |
int |
int |
ip6_process_hopopts(m, opthead, hbhlen, rtalertp, plenp) |
ip6_process_hopopts(m, opthead, hbhlen, rtalertp, plenp) |
Line 833 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 826 ip6_process_hopopts(m, opthead, hbhlen, |
|
u_int8_t *opt = opthead; |
u_int8_t *opt = opthead; |
u_int16_t rtalert_val; |
u_int16_t rtalert_val; |
u_int32_t jumboplen; |
u_int32_t jumboplen; |
|
const int erroff = sizeof(struct ip6_hdr) + sizeof(struct ip6_hbh); |
|
|
for (; hbhlen > 0; hbhlen -= optlen, opt += optlen) { |
for (; hbhlen > 0; hbhlen -= optlen, opt += optlen) { |
switch (*opt) { |
switch (*opt) { |
Line 853 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 847 ip6_process_hopopts(m, opthead, hbhlen, |
|
goto bad; |
goto bad; |
} |
} |
if (*(opt + 1) != IP6OPT_RTALERT_LEN - 2) { |
if (*(opt + 1) != IP6OPT_RTALERT_LEN - 2) { |
/* XXX: should we discard the packet? */ |
/* XXX stat */ |
log(LOG_ERR, "length of router alert opt is inconsitent(%d)", |
icmp6_error(m, ICMP6_PARAM_PROB, |
*(opt + 1)); |
ICMP6_PARAMPROB_HEADER, |
|
erroff + opt + 1 - opthead); |
|
return (-1); |
} |
} |
optlen = IP6OPT_RTALERT_LEN; |
optlen = IP6OPT_RTALERT_LEN; |
bcopy((caddr_t)(opt + 2), (caddr_t)&rtalert_val, 2); |
bcopy((caddr_t)(opt + 2), (caddr_t)&rtalert_val, 2); |
Line 868 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 864 ip6_process_hopopts(m, opthead, hbhlen, |
|
goto bad; |
goto bad; |
} |
} |
if (*(opt + 1) != IP6OPT_JUMBO_LEN - 2) { |
if (*(opt + 1) != IP6OPT_JUMBO_LEN - 2) { |
/* XXX: should we discard the packet? */ |
/* XXX stat */ |
log(LOG_ERR, "length of jumbopayload opt " |
icmp6_error(m, ICMP6_PARAM_PROB, |
"is inconsistent(%d)\n", |
ICMP6_PARAMPROB_HEADER, |
*(opt + 1)); |
erroff + opt + 1 - opthead); |
|
return (-1); |
} |
} |
optlen = IP6OPT_JUMBO_LEN; |
optlen = IP6OPT_JUMBO_LEN; |
|
|
Line 883 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 880 ip6_process_hopopts(m, opthead, hbhlen, |
|
if (ip6->ip6_plen) { |
if (ip6->ip6_plen) { |
ip6stat.ip6s_badoptions++; |
ip6stat.ip6s_badoptions++; |
icmp6_error(m, ICMP6_PARAM_PROB, |
icmp6_error(m, ICMP6_PARAM_PROB, |
ICMP6_PARAMPROB_HEADER, |
ICMP6_PARAMPROB_HEADER, |
sizeof(struct ip6_hdr) + |
erroff + opt - opthead); |
sizeof(struct ip6_hbh) + |
return (-1); |
opt - opthead); |
|
return(-1); |
|
} |
} |
|
|
/* |
/* |
Line 909 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 904 ip6_process_hopopts(m, opthead, hbhlen, |
|
if (*plenp != 0) { |
if (*plenp != 0) { |
ip6stat.ip6s_badoptions++; |
ip6stat.ip6s_badoptions++; |
icmp6_error(m, ICMP6_PARAM_PROB, |
icmp6_error(m, ICMP6_PARAM_PROB, |
ICMP6_PARAMPROB_HEADER, |
ICMP6_PARAMPROB_HEADER, |
sizeof(struct ip6_hdr) + |
erroff + opt + 2 - opthead); |
sizeof(struct ip6_hbh) + |
return (-1); |
opt + 2 - opthead); |
|
return(-1); |
|
} |
} |
#endif |
#endif |
|
|
Line 923 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 916 ip6_process_hopopts(m, opthead, hbhlen, |
|
if (jumboplen <= IPV6_MAXPACKET) { |
if (jumboplen <= IPV6_MAXPACKET) { |
ip6stat.ip6s_badoptions++; |
ip6stat.ip6s_badoptions++; |
icmp6_error(m, ICMP6_PARAM_PROB, |
icmp6_error(m, ICMP6_PARAM_PROB, |
ICMP6_PARAMPROB_HEADER, |
ICMP6_PARAMPROB_HEADER, |
sizeof(struct ip6_hdr) + |
erroff + opt + 2 - opthead); |
sizeof(struct ip6_hbh) + |
return (-1); |
opt + 2 - opthead); |
|
return(-1); |
|
} |
} |
*plenp = jumboplen; |
*plenp = jumboplen; |
|
|
Line 937 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 928 ip6_process_hopopts(m, opthead, hbhlen, |
|
ip6stat.ip6s_toosmall++; |
ip6stat.ip6s_toosmall++; |
goto bad; |
goto bad; |
} |
} |
if ((optlen = ip6_unknown_opt(opt, m, |
optlen = ip6_unknown_opt(opt, m, |
sizeof(struct ip6_hdr) + |
erroff + opt - opthead); |
sizeof(struct ip6_hbh) + |
if (optlen == -1) |
opt - opthead)) == -1) |
return (-1); |
return(-1); |
|
optlen += 2; |
optlen += 2; |
break; |
break; |
} |
} |
} |
} |
|
|
return(0); |
return (0); |
|
|
bad: |
bad: |
m_freem(m); |
m_freem(m); |
return(-1); |
return (-1); |
} |
} |
|
|
/* |
/* |
Line 1518 ip6_sysctl(name, namelen, oldp, oldlenp, |
|
Line 1508 ip6_sysctl(name, namelen, oldp, oldlenp, |
|
} |
} |
return (error); |
return (error); |
#endif |
#endif |
|
case IPV6CTL_MAXFRAGS: |
|
return sysctl_int(oldp, oldlenp, newp, newlen, &ip6_maxfrags); |
default: |
default: |
return EOPNOTSUPP; |
return EOPNOTSUPP; |
} |
} |