version 1.52.2.3, 2002/07/15 10:37:05 |
version 1.53, 2002/05/28 03:04:06 |
Line 109 __KERNEL_RCSID(0, "$NetBSD$"); |
|
Line 109 __KERNEL_RCSID(0, "$NetBSD$"); |
|
#include <netinet/icmp6.h> |
#include <netinet/icmp6.h> |
#include <netinet6/in6_ifattach.h> |
#include <netinet6/in6_ifattach.h> |
#include <netinet6/nd6.h> |
#include <netinet6/nd6.h> |
|
#include <netinet6/in6_prefix.h> |
|
|
#ifdef IPSEC |
#ifdef IPSEC |
#include <netinet6/ipsec.h> |
#include <netinet6/ipsec.h> |
|
|
{ |
{ |
struct ip6protosw *pr; |
struct ip6protosw *pr; |
int i; |
int i; |
|
struct timeval tv; |
|
|
pr = (struct ip6protosw *)pffindproto(PF_INET6, IPPROTO_RAW, SOCK_RAW); |
pr = (struct ip6protosw *)pffindproto(PF_INET6, IPPROTO_RAW, SOCK_RAW); |
if (pr == 0) |
if (pr == 0) |
|
|
ip6intrq.ifq_maxlen = ip6qmaxlen; |
ip6intrq.ifq_maxlen = ip6qmaxlen; |
nd6_init(); |
nd6_init(); |
frag6_init(); |
frag6_init(); |
ip6_flow_seq = arc4random(); |
/* |
|
* in many cases, random() here does NOT return random number |
|
* as initialization during bootstrap time occur in fixed order. |
|
*/ |
|
microtime(&tv); |
|
ip6_flow_seq = random() ^ tv.tv_usec; |
|
|
ip6_init2((void *)0); |
ip6_init2((void *)0); |
|
|
|
|
ip6_init2(dummy) |
ip6_init2(dummy) |
void *dummy; |
void *dummy; |
{ |
{ |
|
/* |
|
* to route local address of p2p link to loopback, |
|
* assign loopback address first. |
|
*/ |
|
in6_ifattach(&loif[0], NULL); |
|
|
/* nd6_timer_init */ |
/* nd6_timer_init */ |
callout_init(&nd6_timer_ch); |
callout_init(&nd6_timer_ch); |
callout_reset(&nd6_timer_ch, hz, nd6_timer, NULL); |
callout_reset(&nd6_timer_ch, hz, nd6_timer, NULL); |
|
/* router renumbering prefix list maintenance */ |
|
callout_init(&in6_rr_timer_ch); |
|
callout_reset(&in6_rr_timer_ch, hz, in6_rr_timer, NULL); |
} |
} |
|
|
/* |
/* |
|
|
IP6_EXTHDR_CHECK(m, 0, sizeof(struct ip6_hdr), /*nothing*/); |
IP6_EXTHDR_CHECK(m, 0, sizeof(struct ip6_hdr), /*nothing*/); |
#endif |
#endif |
|
|
/* |
if (m->m_len < sizeof(struct ip6_hdr)) { |
* If the IPv6 header is not aligned, slurp it up into a new |
struct ifnet *inifp; |
* mbuf with space for link headers, in the event we forward |
inifp = m->m_pkthdr.rcvif; |
* it. OTherwise, if it is aligned, make sure the entire base |
if ((m = m_pullup(m, sizeof(struct ip6_hdr))) == 0) { |
* IPv6 header is in the first mbuf of the chain. |
|
*/ |
|
if (IP6_HDR_ALIGNED_P(mtod(m, caddr_t)) == 0) { |
|
struct ifnet *inifp = m->m_pkthdr.rcvif; |
|
if ((m = m_copyup(m, sizeof(struct ip6_hdr), |
|
(max_linkhdr + 3) & ~3)) == NULL) { |
|
/* XXXJRT new stat, please */ |
|
ip6stat.ip6s_toosmall++; |
|
in6_ifstat_inc(inifp, ifs6_in_hdrerr); |
|
return; |
|
} |
|
} else if (__predict_false(m->m_len < sizeof(struct ip6_hdr))) { |
|
struct ifnet *inifp = m->m_pkthdr.rcvif; |
|
if ((m = m_pullup(m, sizeof(struct ip6_hdr))) == NULL) { |
|
ip6stat.ip6s_toosmall++; |
ip6stat.ip6s_toosmall++; |
in6_ifstat_inc(inifp, ifs6_in_hdrerr); |
in6_ifstat_inc(inifp, ifs6_in_hdrerr); |
return; |
return; |
|
|
*/ |
*/ |
if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_src) || |
if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_src) || |
IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_dst)) { |
IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_dst)) { |
/* |
|
* XXX: "badscope" is not very suitable for a multicast source. |
|
*/ |
|
ip6stat.ip6s_badscope++; |
ip6stat.ip6s_badscope++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr); |
goto bad; |
goto bad; |
|
|
* Unicast check |
* Unicast check |
*/ |
*/ |
if (ip6_forward_rt.ro_rt != NULL && |
if (ip6_forward_rt.ro_rt != NULL && |
(ip6_forward_rt.ro_rt->rt_flags & RTF_UP) != 0 && |
(ip6_forward_rt.ro_rt->rt_flags & RTF_UP) != 0 && |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
&((struct sockaddr_in6 *)(&ip6_forward_rt.ro_dst))->sin6_addr)) |
&((struct sockaddr_in6 *)(&ip6_forward_rt.ro_dst))->sin6_addr)) |
ip6stat.ip6s_forward_cachehit++; |
ip6stat.ip6s_forward_cachehit++; |
|
|
if (ip6_forward_rt.ro_rt && |
if (ip6_forward_rt.ro_rt && |
(ip6_forward_rt.ro_rt->rt_flags & |
(ip6_forward_rt.ro_rt->rt_flags & |
(RTF_HOST|RTF_GATEWAY)) == RTF_HOST && |
(RTF_HOST|RTF_GATEWAY)) == RTF_HOST && |
!(ip6_forward_rt.ro_rt->rt_flags & RTF_CLONED) && |
|
#if 0 |
#if 0 |
/* |
/* |
* The check below is redundant since the comparison of |
* The check below is redundant since the comparison of |
|
|
* already done through looking up the routing table. |
* already done through looking up the routing table. |
*/ |
*/ |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
&rt6_key(ip6_forward_rt.ro_rt)->sin6_addr) && |
&rt6_key(ip6_forward_rt.ro_rt)->sin6_addr) && |
#endif |
#endif |
ip6_forward_rt.ro_rt->rt_ifp->if_type == IFT_LOOP) { |
ip6_forward_rt.ro_rt->rt_ifp->if_type == IFT_LOOP) { |
struct in6_ifaddr *ia6 = |
struct in6_ifaddr *ia6 = |
|
|
} |
} |
|
|
/* |
/* |
* FAITH (Firewall Aided Internet Translator) |
* FAITH(Firewall Aided Internet Translator) |
*/ |
*/ |
#if defined(NFAITH) && 0 < NFAITH |
#if defined(NFAITH) && 0 < NFAITH |
if (ip6_keepfaith) { |
if (ip6_keepfaith) { |
|
|
/* |
/* |
* Note that if a valid jumbo payload option is |
* Note that if a valid jumbo payload option is |
* contained, ip6_hoptops_input() must set a valid |
* contained, ip6_hoptops_input() must set a valid |
* (non-zero) payload length to the variable plen. |
* (non-zero) payload length to the variable plen. |
*/ |
*/ |
ip6stat.ip6s_badoptions++; |
ip6stat.ip6s_badoptions++; |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_discard); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_discard); |
|
|
return; |
return; |
} |
} |
#endif |
#endif |
KASSERT(IP6_HDR_ALIGNED_P(hbh)); |
|
nxt = hbh->ip6h_nxt; |
nxt = hbh->ip6h_nxt; |
|
|
/* |
/* |
|
|
} else if (!ours) { |
} else if (!ours) { |
ip6_forward(m, 0); |
ip6_forward(m, 0); |
return; |
return; |
} |
} |
|
|
ip6 = mtod(m, struct ip6_hdr *); |
ip6 = mtod(m, struct ip6_hdr *); |
|
|
|
|
goto bad; |
goto bad; |
} |
} |
#endif |
#endif |
|
|
nxt = (*inet6sw[ip6_protox[nxt]].pr_input)(&m, &off, nxt); |
nxt = (*inet6sw[ip6_protox[nxt]].pr_input)(&m, &off, nxt); |
} |
} |
return; |
return; |
Line 804 ip6_hopopts_input(plenp, rtalertp, mp, o |
|
Line 800 ip6_hopopts_input(plenp, rtalertp, mp, o |
|
return -1; |
return -1; |
} |
} |
#endif |
#endif |
KASSERT(IP6_HDR_ALIGNED_P(hbh)); |
|
off += hbhlen; |
off += hbhlen; |
hbhlen -= sizeof(struct ip6_hbh); |
hbhlen -= sizeof(struct ip6_hbh); |
opt = (u_int8_t *)hbh + sizeof(struct ip6_hbh); |
opt = (u_int8_t *)hbh + sizeof(struct ip6_hbh); |
Line 823 ip6_hopopts_input(plenp, rtalertp, mp, o |
|
Line 818 ip6_hopopts_input(plenp, rtalertp, mp, o |
|
* This function is separate from ip6_hopopts_input() in order to |
* This function is separate from ip6_hopopts_input() in order to |
* handle a case where the sending node itself process its hop-by-hop |
* handle a case where the sending node itself process its hop-by-hop |
* options header. In such a case, the function is called from ip6_output(). |
* options header. In such a case, the function is called from ip6_output(). |
* |
|
* The function assumes that hbh header is located right after the IPv6 header |
|
* (RFC2460 p7), opthead is pointer into data content in m, and opthead to |
|
* opthead + hbhlen is located in continuous memory region. |
|
*/ |
*/ |
int |
int |
ip6_process_hopopts(m, opthead, hbhlen, rtalertp, plenp) |
ip6_process_hopopts(m, opthead, hbhlen, rtalertp, plenp) |
Line 841 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 832 ip6_process_hopopts(m, opthead, hbhlen, |
|
u_int8_t *opt = opthead; |
u_int8_t *opt = opthead; |
u_int16_t rtalert_val; |
u_int16_t rtalert_val; |
u_int32_t jumboplen; |
u_int32_t jumboplen; |
const int erroff = sizeof(struct ip6_hdr) + sizeof(struct ip6_hbh); |
|
|
|
for (; hbhlen > 0; hbhlen -= optlen, opt += optlen) { |
for (; hbhlen > 0; hbhlen -= optlen, opt += optlen) { |
switch (*opt) { |
switch (*opt) { |
Line 862 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 852 ip6_process_hopopts(m, opthead, hbhlen, |
|
goto bad; |
goto bad; |
} |
} |
if (*(opt + 1) != IP6OPT_RTALERT_LEN - 2) { |
if (*(opt + 1) != IP6OPT_RTALERT_LEN - 2) { |
/* XXX stat */ |
/* XXX: should we discard the packet? */ |
icmp6_error(m, ICMP6_PARAM_PROB, |
log(LOG_ERR, "length of router alert opt is inconsitent(%d)", |
ICMP6_PARAMPROB_HEADER, |
*(opt + 1)); |
erroff + opt + 1 - opthead); |
|
return (-1); |
|
} |
} |
optlen = IP6OPT_RTALERT_LEN; |
optlen = IP6OPT_RTALERT_LEN; |
bcopy((caddr_t)(opt + 2), (caddr_t)&rtalert_val, 2); |
bcopy((caddr_t)(opt + 2), (caddr_t)&rtalert_val, 2); |
Line 879 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 867 ip6_process_hopopts(m, opthead, hbhlen, |
|
goto bad; |
goto bad; |
} |
} |
if (*(opt + 1) != IP6OPT_JUMBO_LEN - 2) { |
if (*(opt + 1) != IP6OPT_JUMBO_LEN - 2) { |
/* XXX stat */ |
/* XXX: should we discard the packet? */ |
icmp6_error(m, ICMP6_PARAM_PROB, |
log(LOG_ERR, "length of jumbopayload opt " |
ICMP6_PARAMPROB_HEADER, |
"is inconsistent(%d)\n", |
erroff + opt + 1 - opthead); |
*(opt + 1)); |
return (-1); |
|
} |
} |
optlen = IP6OPT_JUMBO_LEN; |
optlen = IP6OPT_JUMBO_LEN; |
|
|
Line 895 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 882 ip6_process_hopopts(m, opthead, hbhlen, |
|
if (ip6->ip6_plen) { |
if (ip6->ip6_plen) { |
ip6stat.ip6s_badoptions++; |
ip6stat.ip6s_badoptions++; |
icmp6_error(m, ICMP6_PARAM_PROB, |
icmp6_error(m, ICMP6_PARAM_PROB, |
ICMP6_PARAMPROB_HEADER, |
ICMP6_PARAMPROB_HEADER, |
erroff + opt - opthead); |
sizeof(struct ip6_hdr) + |
return (-1); |
sizeof(struct ip6_hbh) + |
|
opt - opthead); |
|
return(-1); |
} |
} |
|
|
/* |
/* |
Line 919 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 908 ip6_process_hopopts(m, opthead, hbhlen, |
|
if (*plenp != 0) { |
if (*plenp != 0) { |
ip6stat.ip6s_badoptions++; |
ip6stat.ip6s_badoptions++; |
icmp6_error(m, ICMP6_PARAM_PROB, |
icmp6_error(m, ICMP6_PARAM_PROB, |
ICMP6_PARAMPROB_HEADER, |
ICMP6_PARAMPROB_HEADER, |
erroff + opt + 2 - opthead); |
sizeof(struct ip6_hdr) + |
return (-1); |
sizeof(struct ip6_hbh) + |
|
opt + 2 - opthead); |
|
return(-1); |
} |
} |
#endif |
#endif |
|
|
Line 931 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 922 ip6_process_hopopts(m, opthead, hbhlen, |
|
if (jumboplen <= IPV6_MAXPACKET) { |
if (jumboplen <= IPV6_MAXPACKET) { |
ip6stat.ip6s_badoptions++; |
ip6stat.ip6s_badoptions++; |
icmp6_error(m, ICMP6_PARAM_PROB, |
icmp6_error(m, ICMP6_PARAM_PROB, |
ICMP6_PARAMPROB_HEADER, |
ICMP6_PARAMPROB_HEADER, |
erroff + opt + 2 - opthead); |
sizeof(struct ip6_hdr) + |
return (-1); |
sizeof(struct ip6_hbh) + |
|
opt + 2 - opthead); |
|
return(-1); |
} |
} |
*plenp = jumboplen; |
*plenp = jumboplen; |
|
|
Line 943 ip6_process_hopopts(m, opthead, hbhlen, |
|
Line 936 ip6_process_hopopts(m, opthead, hbhlen, |
|
ip6stat.ip6s_toosmall++; |
ip6stat.ip6s_toosmall++; |
goto bad; |
goto bad; |
} |
} |
optlen = ip6_unknown_opt(opt, m, |
if ((optlen = ip6_unknown_opt(opt, m, |
erroff + opt - opthead); |
sizeof(struct ip6_hdr) + |
if (optlen == -1) |
sizeof(struct ip6_hbh) + |
return (-1); |
opt - opthead)) == -1) |
|
return(-1); |
optlen += 2; |
optlen += 2; |
break; |
break; |
} |
} |
} |
} |
|
|
return (0); |
return(0); |
|
|
bad: |
bad: |
m_freem(m); |
m_freem(m); |
return (-1); |
return(-1); |
} |
} |
|
|
/* |
/* |
Line 1166 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1160 ip6_savecontrol(in6p, mp, ip6, m) |
|
return; |
return; |
} |
} |
#endif |
#endif |
KASSERT(IP6_HDR_ALIGNED_P(ip6e)); |
|
|
|
switch (nxt) { |
switch (nxt) { |
case IPPROTO_DSTOPTS: |
case IPPROTO_DSTOPTS: |