version 1.57, 2002/06/30 22:40:39 |
version 1.73, 2004/03/24 15:34:54 |
|
|
* 2. Redistributions in binary form must reproduce the above copyright |
* 2. Redistributions in binary form must reproduce the above copyright |
* notice, this list of conditions and the following disclaimer in the |
* notice, this list of conditions and the following disclaimer in the |
* documentation and/or other materials provided with the distribution. |
* documentation and/or other materials provided with the distribution. |
* 3. All advertising materials mentioning features or use of this software |
* 3. Neither the name of the University nor the names of its contributors |
* must display the following acknowledgement: |
|
* This product includes software developed by the University of |
|
* California, Berkeley and its contributors. |
|
* 4. Neither the name of the University nor the names of its contributors |
|
* may be used to endorse or promote products derived from this software |
* may be used to endorse or promote products derived from this software |
* without specific prior written permission. |
* without specific prior written permission. |
* |
* |
Line 149 struct ip6stat ip6stat; |
|
Line 145 struct ip6stat ip6stat; |
|
static void ip6_init2 __P((void *)); |
static void ip6_init2 __P((void *)); |
|
|
static int ip6_hopopts_input __P((u_int32_t *, u_int32_t *, struct mbuf **, int *)); |
static int ip6_hopopts_input __P((u_int32_t *, u_int32_t *, struct mbuf **, int *)); |
|
static struct mbuf *ip6_pullexthdr __P((struct mbuf *, size_t, int)); |
|
|
/* |
/* |
* IP6 initialization: fill in IP6 protocol switch table. |
* IP6 initialization: fill in IP6 protocol switch table. |
|
|
ip6intrq.ifq_maxlen = ip6qmaxlen; |
ip6intrq.ifq_maxlen = ip6qmaxlen; |
nd6_init(); |
nd6_init(); |
frag6_init(); |
frag6_init(); |
ip6_flow_seq = arc4random(); |
|
|
|
ip6_init2((void *)0); |
ip6_init2((void *)0); |
|
|
|
|
u_int32_t rtalert = ~0; |
u_int32_t rtalert = ~0; |
int nxt, ours = 0; |
int nxt, ours = 0; |
struct ifnet *deliverifp = NULL; |
struct ifnet *deliverifp = NULL; |
|
int srcrt = 0; |
|
|
#ifdef IPSEC |
#ifdef IPSEC |
/* |
/* |
|
|
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_receive); |
in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_receive); |
ip6stat.ip6s_total++; |
ip6stat.ip6s_total++; |
|
|
#ifndef PULLDOWN_TEST |
|
/* XXX is the line really necessary? */ |
|
IP6_EXTHDR_CHECK(m, 0, sizeof(struct ip6_hdr), /*nothing*/); |
|
#endif |
|
|
|
/* |
/* |
* If the IPv6 header is not aligned, slurp it up into a new |
* If the IPv6 header is not aligned, slurp it up into a new |
* mbuf with space for link headers, in the event we forward |
* mbuf with space for link headers, in the event we forward |
|
|
if (1) |
if (1) |
#endif |
#endif |
{ |
{ |
|
struct in6_addr odst; |
|
|
|
odst = ip6->ip6_dst; |
if (pfil_run_hooks(&inet6_pfil_hook, &m, m->m_pkthdr.rcvif, |
if (pfil_run_hooks(&inet6_pfil_hook, &m, m->m_pkthdr.rcvif, |
PFIL_IN) != 0) |
PFIL_IN) != 0) |
return; |
return; |
if (m == NULL) |
if (m == NULL) |
return; |
return; |
ip6 = mtod(m, struct ip6_hdr *); |
ip6 = mtod(m, struct ip6_hdr *); |
|
srcrt = !IN6_ARE_ADDR_EQUAL(&odst, &ip6->ip6_dst); |
} |
} |
#endif /* PFIL_HOOKS */ |
#endif /* PFIL_HOOKS */ |
|
|
|
|
if (ip6_forward_rt.ro_rt != NULL && |
if (ip6_forward_rt.ro_rt != NULL && |
(ip6_forward_rt.ro_rt->rt_flags & RTF_UP) != 0 && |
(ip6_forward_rt.ro_rt->rt_flags & RTF_UP) != 0 && |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
&((struct sockaddr_in6 *)(&ip6_forward_rt.ro_dst))->sin6_addr)) |
&((struct sockaddr_in6 *)(&ip6_forward_rt.ro_dst))->sin6_addr)) |
ip6stat.ip6s_forward_cachehit++; |
ip6stat.ip6s_forward_cachehit++; |
else { |
else { |
struct sockaddr_in6 *dst6; |
struct sockaddr_in6 *dst6; |
|
|
*/ |
*/ |
#if defined(NFAITH) && 0 < NFAITH |
#if defined(NFAITH) && 0 < NFAITH |
if (ip6_keepfaith) { |
if (ip6_keepfaith) { |
if (ip6_forward_rt.ro_rt && ip6_forward_rt.ro_rt->rt_ifp |
if (ip6_forward_rt.ro_rt && ip6_forward_rt.ro_rt->rt_ifp && |
&& ip6_forward_rt.ro_rt->rt_ifp->if_type == IFT_FAITH) { |
ip6_forward_rt.ro_rt->rt_ifp->if_type == IFT_FAITH) { |
/* XXX do we need more sanity checks? */ |
/* XXX do we need more sanity checks? */ |
ours = 1; |
ours = 1; |
deliverifp = ip6_forward_rt.ro_rt->rt_ifp; /* faith */ |
deliverifp = ip6_forward_rt.ro_rt->rt_ifp; /* faith */ |
|
|
(caddr_t)&ip6->ip6_plen - (caddr_t)ip6); |
(caddr_t)&ip6->ip6_plen - (caddr_t)ip6); |
return; |
return; |
} |
} |
#ifndef PULLDOWN_TEST |
|
/* ip6_hopopts_input() ensures that mbuf is contiguous */ |
|
hbh = (struct ip6_hbh *)(ip6 + 1); |
|
#else |
|
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, sizeof(struct ip6_hdr), |
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, sizeof(struct ip6_hdr), |
sizeof(struct ip6_hbh)); |
sizeof(struct ip6_hbh)); |
if (hbh == NULL) { |
if (hbh == NULL) { |
ip6stat.ip6s_tooshort++; |
ip6stat.ip6s_tooshort++; |
return; |
return; |
} |
} |
#endif |
|
KASSERT(IP6_HDR_ALIGNED_P(hbh)); |
KASSERT(IP6_HDR_ALIGNED_P(hbh)); |
nxt = hbh->ip6h_nxt; |
nxt = hbh->ip6h_nxt; |
|
|
|
|
return; |
return; |
} |
} |
} else if (!ours) { |
} else if (!ours) { |
ip6_forward(m, 0); |
ip6_forward(m, srcrt); |
return; |
return; |
} |
} |
|
|
Line 779 ip6_hopopts_input(plenp, rtalertp, mp, o |
|
Line 770 ip6_hopopts_input(plenp, rtalertp, mp, o |
|
struct mbuf *m = *mp; |
struct mbuf *m = *mp; |
int off = *offp, hbhlen; |
int off = *offp, hbhlen; |
struct ip6_hbh *hbh; |
struct ip6_hbh *hbh; |
u_int8_t *opt; |
|
|
|
/* validation of the length of the header */ |
/* validation of the length of the header */ |
#ifndef PULLDOWN_TEST |
|
IP6_EXTHDR_CHECK(m, off, sizeof(*hbh), -1); |
|
hbh = (struct ip6_hbh *)(mtod(m, caddr_t) + off); |
|
hbhlen = (hbh->ip6h_len + 1) << 3; |
|
|
|
IP6_EXTHDR_CHECK(m, off, hbhlen, -1); |
|
hbh = (struct ip6_hbh *)(mtod(m, caddr_t) + off); |
|
#else |
|
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, |
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, |
sizeof(struct ip6_hdr), sizeof(struct ip6_hbh)); |
sizeof(struct ip6_hdr), sizeof(struct ip6_hbh)); |
if (hbh == NULL) { |
if (hbh == NULL) { |
Line 803 ip6_hopopts_input(plenp, rtalertp, mp, o |
|
Line 785 ip6_hopopts_input(plenp, rtalertp, mp, o |
|
ip6stat.ip6s_tooshort++; |
ip6stat.ip6s_tooshort++; |
return -1; |
return -1; |
} |
} |
#endif |
|
KASSERT(IP6_HDR_ALIGNED_P(hbh)); |
KASSERT(IP6_HDR_ALIGNED_P(hbh)); |
off += hbhlen; |
off += hbhlen; |
hbhlen -= sizeof(struct ip6_hbh); |
hbhlen -= sizeof(struct ip6_hbh); |
opt = (u_int8_t *)hbh + sizeof(struct ip6_hbh); |
|
|
|
if (ip6_process_hopopts(m, (u_int8_t *)hbh + sizeof(struct ip6_hbh), |
if (ip6_process_hopopts(m, (u_int8_t *)hbh + sizeof(struct ip6_hbh), |
hbhlen, rtalertp, plenp) < 0) |
hbhlen, rtalertp, plenp) < 0) |
return(-1); |
return (-1); |
|
|
*offp = off; |
*offp = off; |
*mp = m; |
*mp = m; |
return(0); |
return (0); |
} |
} |
|
|
/* |
/* |
Line 975 ip6_unknown_opt(optp, m, off) |
|
Line 955 ip6_unknown_opt(optp, m, off) |
|
|
|
switch (IP6OPT_TYPE(*optp)) { |
switch (IP6OPT_TYPE(*optp)) { |
case IP6OPT_TYPE_SKIP: /* ignore the option */ |
case IP6OPT_TYPE_SKIP: /* ignore the option */ |
return((int)*(optp + 1)); |
return ((int)*(optp + 1)); |
case IP6OPT_TYPE_DISCARD: /* silently discard */ |
case IP6OPT_TYPE_DISCARD: /* silently discard */ |
m_freem(m); |
m_freem(m); |
return(-1); |
return (-1); |
case IP6OPT_TYPE_FORCEICMP: /* send ICMP even if multicasted */ |
case IP6OPT_TYPE_FORCEICMP: /* send ICMP even if multicasted */ |
ip6stat.ip6s_badoptions++; |
ip6stat.ip6s_badoptions++; |
icmp6_error(m, ICMP6_PARAM_PROB, ICMP6_PARAMPROB_OPTION, off); |
icmp6_error(m, ICMP6_PARAM_PROB, ICMP6_PARAMPROB_OPTION, off); |
return(-1); |
return (-1); |
case IP6OPT_TYPE_ICMP: /* send ICMP if not multicasted */ |
case IP6OPT_TYPE_ICMP: /* send ICMP if not multicasted */ |
ip6stat.ip6s_badoptions++; |
ip6stat.ip6s_badoptions++; |
ip6 = mtod(m, struct ip6_hdr *); |
ip6 = mtod(m, struct ip6_hdr *); |
Line 992 ip6_unknown_opt(optp, m, off) |
|
Line 972 ip6_unknown_opt(optp, m, off) |
|
else |
else |
icmp6_error(m, ICMP6_PARAM_PROB, |
icmp6_error(m, ICMP6_PARAM_PROB, |
ICMP6_PARAMPROB_OPTION, off); |
ICMP6_PARAMPROB_OPTION, off); |
return(-1); |
return (-1); |
} |
} |
|
|
m_freem(m); /* XXX: NOTREACHED */ |
m_freem(m); /* XXX: NOTREACHED */ |
return(-1); |
return (-1); |
} |
} |
|
|
/* |
/* |
Line 1030 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1010 ip6_savecontrol(in6p, mp, ip6, m) |
|
|
|
microtime(&tv); |
microtime(&tv); |
*mp = sbcreatecontrol((caddr_t) &tv, sizeof(tv), |
*mp = sbcreatecontrol((caddr_t) &tv, sizeof(tv), |
SCM_TIMESTAMP, SOL_SOCKET); |
SCM_TIMESTAMP, SOL_SOCKET); |
if (*mp) |
if (*mp) |
mp = &(*mp)->m_next; |
mp = &(*mp)->m_next; |
} |
} |
#endif |
#endif |
if (in6p->in6p_flags & IN6P_RECVDSTADDR) { |
if (in6p->in6p_flags & IN6P_RECVDSTADDR) { |
*mp = sbcreatecontrol((caddr_t) &ip6->ip6_dst, |
*mp = sbcreatecontrol((caddr_t) &ip6->ip6_dst, |
sizeof(struct in6_addr), IPV6_RECVDSTADDR, |
sizeof(struct in6_addr), IPV6_RECVDSTADDR, IPPROTO_IPV6); |
IPPROTO_IPV6); |
|
if (*mp) |
if (*mp) |
mp = &(*mp)->m_next; |
mp = &(*mp)->m_next; |
} |
} |
Line 1062 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1041 ip6_savecontrol(in6p, mp, ip6, m) |
|
? m->m_pkthdr.rcvif->if_index |
? m->m_pkthdr.rcvif->if_index |
: 0; |
: 0; |
*mp = sbcreatecontrol((caddr_t) &pi6, |
*mp = sbcreatecontrol((caddr_t) &pi6, |
sizeof(struct in6_pktinfo), IPV6_PKTINFO, |
sizeof(struct in6_pktinfo), IPV6_PKTINFO, IPPROTO_IPV6); |
IPPROTO_IPV6); |
|
if (*mp) |
if (*mp) |
mp = &(*mp)->m_next; |
mp = &(*mp)->m_next; |
} |
} |
if (in6p->in6p_flags & IN6P_HOPLIMIT) { |
if (in6p->in6p_flags & IN6P_HOPLIMIT) { |
int hlim = ip6->ip6_hlim & 0xff; |
int hlim = ip6->ip6_hlim & 0xff; |
*mp = sbcreatecontrol((caddr_t) &hlim, |
*mp = sbcreatecontrol((caddr_t) &hlim, sizeof(int), |
sizeof(int), IPV6_HOPLIMIT, IPPROTO_IPV6); |
IPV6_HOPLIMIT, IPPROTO_IPV6); |
if (*mp) |
if (*mp) |
mp = &(*mp)->m_next; |
mp = &(*mp)->m_next; |
} |
} |
Line 1094 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1072 ip6_savecontrol(in6p, mp, ip6, m) |
|
if (ip6->ip6_nxt == IPPROTO_HOPOPTS) { |
if (ip6->ip6_nxt == IPPROTO_HOPOPTS) { |
struct ip6_hbh *hbh; |
struct ip6_hbh *hbh; |
int hbhlen; |
int hbhlen; |
|
struct mbuf *ext; |
|
|
#ifndef PULLDOWN_TEST |
ext = ip6_pullexthdr(m, sizeof(struct ip6_hdr), |
hbh = (struct ip6_hbh *)(ip6 + 1); |
ip6->ip6_nxt); |
hbhlen = (hbh->ip6h_len + 1) << 3; |
if (ext == NULL) { |
#else |
|
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, |
|
sizeof(struct ip6_hdr), sizeof(struct ip6_hbh)); |
|
if (hbh == NULL) { |
|
ip6stat.ip6s_tooshort++; |
ip6stat.ip6s_tooshort++; |
return; |
return; |
} |
} |
|
hbh = mtod(ext, struct ip6_hbh *); |
hbhlen = (hbh->ip6h_len + 1) << 3; |
hbhlen = (hbh->ip6h_len + 1) << 3; |
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, |
if (hbhlen != ext->m_len) { |
sizeof(struct ip6_hdr), hbhlen); |
m_freem(ext); |
if (hbh == NULL) { |
|
ip6stat.ip6s_tooshort++; |
ip6stat.ip6s_tooshort++; |
return; |
return; |
} |
} |
#endif |
|
|
|
/* |
/* |
* XXX: We copy whole the header even if a jumbo |
* XXX: We copy whole the header even if a jumbo |
Line 1121 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1095 ip6_savecontrol(in6p, mp, ip6, m) |
|
* But it's too painful operation... |
* But it's too painful operation... |
*/ |
*/ |
*mp = sbcreatecontrol((caddr_t)hbh, hbhlen, |
*mp = sbcreatecontrol((caddr_t)hbh, hbhlen, |
IPV6_HOPOPTS, IPPROTO_IPV6); |
IPV6_HOPOPTS, IPPROTO_IPV6); |
if (*mp) |
if (*mp) |
mp = &(*mp)->m_next; |
mp = &(*mp)->m_next; |
|
m_freem(ext); |
} |
} |
} |
} |
|
|
/* IPV6_DSTOPTS and IPV6_RTHDR socket options */ |
/* IPV6_DSTOPTS and IPV6_RTHDR socket options */ |
if (in6p->in6p_flags & (IN6P_DSTOPTS | IN6P_RTHDR)) { |
if (in6p->in6p_flags & (IN6P_DSTOPTS | IN6P_RTHDR)) { |
struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *); |
struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *); |
int nxt = ip6->ip6_nxt, off = sizeof(struct ip6_hdr);; |
int nxt = ip6->ip6_nxt, off = sizeof(struct ip6_hdr); |
|
|
/* |
/* |
* Search for destination options headers or routing |
* Search for destination options headers or routing |
Line 1140 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1115 ip6_savecontrol(in6p, mp, ip6, m) |
|
* the chain of ancillary data. |
* the chain of ancillary data. |
*/ |
*/ |
while (1) { /* is explicit loop prevention necessary? */ |
while (1) { /* is explicit loop prevention necessary? */ |
struct ip6_ext *ip6e; |
struct ip6_ext *ip6e = NULL; |
int elen; |
int elen; |
|
struct mbuf *ext = NULL; |
|
|
#ifndef PULLDOWN_TEST |
/* |
ip6e = (struct ip6_ext *)(mtod(m, caddr_t) + off); |
* if it is not an extension header, don't try to |
if (nxt == IPPROTO_AH) |
* pull it from the chain. |
elen = (ip6e->ip6e_len + 2) << 2; |
*/ |
else |
switch (nxt) { |
elen = (ip6e->ip6e_len + 1) << 3; |
case IPPROTO_DSTOPTS: |
#else |
case IPPROTO_ROUTING: |
IP6_EXTHDR_GET(ip6e, struct ip6_ext *, m, off, |
case IPPROTO_HOPOPTS: |
sizeof(struct ip6_ext)); |
case IPPROTO_AH: /* is it possible? */ |
if (ip6e == NULL) { |
break; |
|
default: |
|
goto loopend; |
|
} |
|
|
|
ext = ip6_pullexthdr(m, off, nxt); |
|
if (ext == NULL) { |
ip6stat.ip6s_tooshort++; |
ip6stat.ip6s_tooshort++; |
return; |
return; |
} |
} |
|
ip6e = mtod(ext, struct ip6_ext *); |
if (nxt == IPPROTO_AH) |
if (nxt == IPPROTO_AH) |
elen = (ip6e->ip6e_len + 2) << 2; |
elen = (ip6e->ip6e_len + 2) << 2; |
else |
else |
elen = (ip6e->ip6e_len + 1) << 3; |
elen = (ip6e->ip6e_len + 1) << 3; |
IP6_EXTHDR_GET(ip6e, struct ip6_ext *, m, off, elen); |
if (elen != ext->m_len) { |
if (ip6e == NULL) { |
m_freem(ext); |
ip6stat.ip6s_tooshort++; |
ip6stat.ip6s_tooshort++; |
return; |
return; |
} |
} |
#endif |
|
KASSERT(IP6_HDR_ALIGNED_P(ip6e)); |
KASSERT(IP6_HDR_ALIGNED_P(ip6e)); |
|
|
switch (nxt) { |
switch (nxt) { |
case IPPROTO_DSTOPTS: |
case IPPROTO_DSTOPTS: |
if (!in6p->in6p_flags & IN6P_DSTOPTS) |
if (!in6p->in6p_flags & IN6P_DSTOPTS) |
break; |
break; |
|
|
Line 1182 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1164 ip6_savecontrol(in6p, mp, ip6, m) |
|
break; |
break; |
|
|
*mp = sbcreatecontrol((caddr_t)ip6e, elen, |
*mp = sbcreatecontrol((caddr_t)ip6e, elen, |
IPV6_DSTOPTS, |
IPV6_DSTOPTS, IPPROTO_IPV6); |
IPPROTO_IPV6); |
|
if (*mp) |
if (*mp) |
mp = &(*mp)->m_next; |
mp = &(*mp)->m_next; |
break; |
break; |
Line 1193 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1174 ip6_savecontrol(in6p, mp, ip6, m) |
|
break; |
break; |
|
|
*mp = sbcreatecontrol((caddr_t)ip6e, elen, |
*mp = sbcreatecontrol((caddr_t)ip6e, elen, |
IPV6_RTHDR, |
IPV6_RTHDR, IPPROTO_IPV6); |
IPPROTO_IPV6); |
|
if (*mp) |
if (*mp) |
mp = &(*mp)->m_next; |
mp = &(*mp)->m_next; |
break; |
break; |
|
|
case IPPROTO_UDP: |
case IPPROTO_HOPOPTS: |
case IPPROTO_TCP: |
case IPPROTO_AH: /* is it possible? */ |
case IPPROTO_ICMPV6: |
break; |
|
|
default: |
default: |
/* |
/* |
* stop search if we encounter an upper |
* other cases have been filtered in the above. |
* layer protocol headers. |
* none will visit this case. here we supply |
|
* the code just in case (nxt overwritten or |
|
* other cases). |
*/ |
*/ |
|
m_freem(ext); |
goto loopend; |
goto loopend; |
|
|
case IPPROTO_HOPOPTS: |
|
case IPPROTO_AH: /* is it possible? */ |
|
break; |
|
} |
} |
|
|
/* proceed with the next header. */ |
/* proceed with the next header. */ |
off += elen; |
off += elen; |
nxt = ip6e->ip6e_nxt; |
nxt = ip6e->ip6e_nxt; |
|
ip6e = NULL; |
|
m_freem(ext); |
|
ext = NULL; |
} |
} |
loopend: |
loopend: |
; |
; |
} |
} |
if ((in6p->in6p_flags & IN6P_HOPOPTS) && privileged) { |
} |
/* to be done */ |
|
|
/* |
|
* pull single extension header from mbuf chain. returns single mbuf that |
|
* contains the result, or NULL on error. |
|
*/ |
|
static struct mbuf * |
|
ip6_pullexthdr(m, off, nxt) |
|
struct mbuf *m; |
|
size_t off; |
|
int nxt; |
|
{ |
|
struct ip6_ext ip6e; |
|
size_t elen; |
|
struct mbuf *n; |
|
|
|
#ifdef DIAGNOSTIC |
|
switch (nxt) { |
|
case IPPROTO_DSTOPTS: |
|
case IPPROTO_ROUTING: |
|
case IPPROTO_HOPOPTS: |
|
case IPPROTO_AH: /* is it possible? */ |
|
break; |
|
default: |
|
printf("ip6_pullexthdr: invalid nxt=%d\n", nxt); |
} |
} |
if ((in6p->in6p_flags & IN6P_DSTOPTS) && privileged) { |
#endif |
/* to be done */ |
|
|
m_copydata(m, off, sizeof(ip6e), (caddr_t)&ip6e); |
|
if (nxt == IPPROTO_AH) |
|
elen = (ip6e.ip6e_len + 2) << 2; |
|
else |
|
elen = (ip6e.ip6e_len + 1) << 3; |
|
|
|
MGET(n, M_DONTWAIT, MT_DATA); |
|
if (n && elen >= MLEN) { |
|
MCLGET(n, M_DONTWAIT); |
|
if ((n->m_flags & M_EXT) == 0) { |
|
m_free(n); |
|
n = NULL; |
|
} |
} |
} |
/* IN6P_RTHDR - to be done */ |
if (!n) |
|
return NULL; |
|
|
|
n->m_len = 0; |
|
if (elen >= M_TRAILINGSPACE(n)) { |
|
m_free(n); |
|
return NULL; |
|
} |
|
|
|
m_copydata(m, off, elen, mtod(n, caddr_t)); |
|
n->m_len = elen; |
|
return n; |
} |
} |
|
|
/* |
/* |
Line 1243 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1273 ip6_savecontrol(in6p, mp, ip6, m) |
|
* carefully. Moreover, it will not be used in the near future when |
* carefully. Moreover, it will not be used in the near future when |
* we develop `neater' mechanism to process extension headers. |
* we develop `neater' mechanism to process extension headers. |
*/ |
*/ |
char * |
u_int8_t * |
ip6_get_prevhdr(m, off) |
ip6_get_prevhdr(m, off) |
struct mbuf *m; |
struct mbuf *m; |
int off; |
int off; |
Line 1251 ip6_get_prevhdr(m, off) |
|
Line 1281 ip6_get_prevhdr(m, off) |
|
struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *); |
struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *); |
|
|
if (off == sizeof(struct ip6_hdr)) |
if (off == sizeof(struct ip6_hdr)) |
return(&ip6->ip6_nxt); |
return (&ip6->ip6_nxt); |
else { |
else { |
int len, nxt; |
int len, nxt; |
struct ip6_ext *ip6e = NULL; |
struct ip6_ext *ip6e = NULL; |
Line 1275 ip6_get_prevhdr(m, off) |
|
Line 1305 ip6_get_prevhdr(m, off) |
|
nxt = ip6e->ip6e_nxt; |
nxt = ip6e->ip6e_nxt; |
} |
} |
if (ip6e) |
if (ip6e) |
return(&ip6e->ip6e_nxt); |
return (&ip6e->ip6e_nxt); |
else |
else |
return NULL; |
return NULL; |
} |
} |
Line 1319 ip6_nexthdr(m, off, proto, nxtp) |
|
Line 1349 ip6_nexthdr(m, off, proto, nxtp) |
|
if (m->m_pkthdr.len < off + sizeof(fh)) |
if (m->m_pkthdr.len < off + sizeof(fh)) |
return -1; |
return -1; |
m_copydata(m, off, sizeof(fh), (caddr_t)&fh); |
m_copydata(m, off, sizeof(fh), (caddr_t)&fh); |
if ((ntohs(fh.ip6f_offlg) & IP6F_OFF_MASK) != 0) |
if ((fh.ip6f_offlg & IP6F_OFF_MASK) != 0) |
return -1; |
return -1; |
if (nxtp) |
if (nxtp) |
*nxtp = fh.ip6f_nxt; |
*nxtp = fh.ip6f_nxt; |
Line 1359 ip6_nexthdr(m, off, proto, nxtp) |
|
Line 1389 ip6_nexthdr(m, off, proto, nxtp) |
|
default: |
default: |
return -1; |
return -1; |
} |
} |
|
|
return -1; |
|
} |
} |
|
|
/* |
/* |
Line 1407 u_char inet6ctlerrmap[PRC_NCMDS] = { |
|
Line 1435 u_char inet6ctlerrmap[PRC_NCMDS] = { |
|
ENOPROTOOPT |
ENOPROTOOPT |
}; |
}; |
|
|
int |
SYSCTL_SETUP(sysctl_net_inet6_ip6_setup, "sysctl net.inet6.ip6 subtree setup") |
ip6_sysctl(name, namelen, oldp, oldlenp, newp, newlen) |
|
int *name; |
|
u_int namelen; |
|
void *oldp; |
|
size_t *oldlenp; |
|
void *newp; |
|
size_t newlen; |
|
{ |
{ |
int old, error; |
|
|
|
/* All sysctl names at this level are terminal. */ |
sysctl_createv(clog, 0, NULL, NULL, |
if (namelen != 1) |
CTLFLAG_PERMANENT, |
return ENOTDIR; |
CTLTYPE_NODE, "net", NULL, |
|
NULL, 0, NULL, 0, |
switch (name[0]) { |
CTL_NET, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
case IPV6CTL_FORWARDING: |
CTLFLAG_PERMANENT, |
return sysctl_int(oldp, oldlenp, newp, newlen, |
CTLTYPE_NODE, "inet6", NULL, |
&ip6_forwarding); |
NULL, 0, NULL, 0, |
case IPV6CTL_SENDREDIRECTS: |
CTL_NET, PF_INET6, CTL_EOL); |
return sysctl_int(oldp, oldlenp, newp, newlen, |
sysctl_createv(clog, 0, NULL, NULL, |
&ip6_sendredirects); |
CTLFLAG_PERMANENT, |
case IPV6CTL_DEFHLIM: |
CTLTYPE_NODE, "ip6", NULL, |
return sysctl_int(oldp, oldlenp, newp, newlen, &ip6_defhlim); |
NULL, 0, NULL, 0, |
case IPV6CTL_MAXFRAGPACKETS: |
CTL_NET, PF_INET6, IPPROTO_IPV6, CTL_EOL); |
return sysctl_int(oldp, oldlenp, newp, newlen, |
|
&ip6_maxfragpackets); |
sysctl_createv(clog, 0, NULL, NULL, |
case IPV6CTL_ACCEPT_RTADV: |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
return sysctl_int(oldp, oldlenp, newp, newlen, |
CTLTYPE_INT, "forwarding", NULL, |
&ip6_accept_rtadv); |
NULL, 0, &ip6_forwarding, 0, |
case IPV6CTL_KEEPFAITH: |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
return sysctl_int(oldp, oldlenp, newp, newlen, &ip6_keepfaith); |
IPV6CTL_FORWARDING, CTL_EOL); |
case IPV6CTL_LOG_INTERVAL: |
sysctl_createv(clog, 0, NULL, NULL, |
return sysctl_int(oldp, oldlenp, newp, newlen, |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
&ip6_log_interval); |
CTLTYPE_INT, "redirect", NULL, |
case IPV6CTL_HDRNESTLIMIT: |
NULL, 0, &ip6_sendredirects, 0, |
return sysctl_int(oldp, oldlenp, newp, newlen, |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
&ip6_hdrnestlimit); |
IPV6CTL_SENDREDIRECTS, CTL_EOL); |
case IPV6CTL_DAD_COUNT: |
sysctl_createv(clog, 0, NULL, NULL, |
return sysctl_int(oldp, oldlenp, newp, newlen, &ip6_dad_count); |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
case IPV6CTL_AUTO_FLOWLABEL: |
CTLTYPE_INT, "hlim", NULL, |
return sysctl_int(oldp, oldlenp, newp, newlen, |
NULL, 0, &ip6_defhlim, 0, |
&ip6_auto_flowlabel); |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
case IPV6CTL_DEFMCASTHLIM: |
IPV6CTL_DEFHLIM, CTL_EOL); |
return sysctl_int(oldp, oldlenp, newp, newlen, |
#ifdef notyet |
&ip6_defmcasthlim); |
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "mtu", NULL, |
|
NULL, 0, &, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_DEFMTU, CTL_EOL); |
|
#endif |
|
#ifdef __no_idea__ |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "forwsrcrt", NULL, |
|
NULL, 0, &?, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_FORWSRCRT, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_STRUCT, "stats", NULL, |
|
NULL, 0, &?, sizeof(?), |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_STATS, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_STRUCT, "mrtstats", NULL, |
|
NULL, 0, &?, sizeof(?), |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_MRTSTATS, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_?, "mrtproto", NULL, |
|
NULL, 0, &?, sizeof(?), |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_MRTPROTO, CTL_EOL); |
|
#endif |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "maxfragpackets", NULL, |
|
NULL, 0, &ip6_maxfragpackets, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_MAXFRAGPACKETS, CTL_EOL); |
|
#ifdef __no_idea__ |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "sourcecheck", NULL, |
|
NULL, 0, &?, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_SOURCECHECK, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "sourcecheck_logint", NULL, |
|
NULL, 0, &?, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_SOURCECHECK_LOGINT, CTL_EOL); |
|
#endif |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "accept_rtadv", NULL, |
|
NULL, 0, &ip6_accept_rtadv, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_ACCEPT_RTADV, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "keepfaith", NULL, |
|
NULL, 0, &ip6_keepfaith, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_KEEPFAITH, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "log_interval", NULL, |
|
NULL, 0, &ip6_log_interval, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_LOG_INTERVAL, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "hdrnestlimit", NULL, |
|
NULL, 0, &ip6_hdrnestlimit, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_HDRNESTLIMIT, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "dad_count", NULL, |
|
NULL, 0, &ip6_dad_count, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_DAD_COUNT, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "auto_flowlabel", NULL, |
|
NULL, 0, &ip6_auto_flowlabel, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_AUTO_FLOWLABEL, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "defmcasthlim", NULL, |
|
NULL, 0, &ip6_defmcasthlim, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_DEFMCASTHLIM, CTL_EOL); |
#if NGIF > 0 |
#if NGIF > 0 |
case IPV6CTL_GIF_HLIM: |
sysctl_createv(clog, 0, NULL, NULL, |
return sysctl_int(oldp, oldlenp, newp, newlen, |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
&ip6_gif_hlim); |
CTLTYPE_INT, "gifhlim", NULL, |
#endif |
NULL, 0, &ip6_gif_hlim, 0, |
case IPV6CTL_KAME_VERSION: |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
return sysctl_rdstring(oldp, oldlenp, newp, __KAME_VERSION); |
IPV6CTL_GIF_HLIM, CTL_EOL); |
case IPV6CTL_USE_DEPRECATED: |
#endif /* NGIF */ |
return sysctl_int(oldp, oldlenp, newp, newlen, |
sysctl_createv(clog, 0, NULL, NULL, |
&ip6_use_deprecated); |
CTLFLAG_PERMANENT, |
case IPV6CTL_RR_PRUNE: |
CTLTYPE_STRING, "kame_version", NULL, |
return sysctl_int(oldp, oldlenp, newp, newlen, &ip6_rr_prune); |
NULL, 0, __KAME_VERSION, 0, |
case IPV6CTL_V6ONLY: |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
#ifdef INET6_BINDV6ONLY |
IPV6CTL_KAME_VERSION, CTL_EOL); |
return sysctl_rdint(oldp, oldlenp, newp, ip6_v6only); |
sysctl_createv(clog, 0, NULL, NULL, |
#else |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
return sysctl_int(oldp, oldlenp, newp, newlen, &ip6_v6only); |
CTLTYPE_INT, "use_deprecated", NULL, |
#endif |
NULL, 0, &ip6_use_deprecated, 0, |
case IPV6CTL_ANONPORTMIN: |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
old = ip6_anonportmin; |
IPV6CTL_USE_DEPRECATED, CTL_EOL); |
error = sysctl_int(oldp, oldlenp, newp, newlen, |
sysctl_createv(clog, 0, NULL, NULL, |
&ip6_anonportmin); |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
if (ip6_anonportmin >= ip6_anonportmax || ip6_anonportmin < 0 || |
CTLTYPE_INT, "rr_prune", NULL, |
ip6_anonportmin > 65535 |
NULL, 0, &ip6_rr_prune, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_RR_PRUNE, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT |
|
#ifndef INET6_BINDV6ONLY |
|
|CTLFLAG_READWRITE, |
|
#endif |
|
CTLTYPE_INT, "v6only", NULL, |
|
NULL, 0, &ip6_v6only, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_V6ONLY, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "anonportmin", NULL, |
|
sysctl_net_inet_ip_ports, 0, &ip6_anonportmin, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_ANONPORTMIN, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "anonportmax", NULL, |
|
sysctl_net_inet_ip_ports, 0, &ip6_anonportmax, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_ANONPORTMAX, CTL_EOL); |
#ifndef IPNOPRIVPORTS |
#ifndef IPNOPRIVPORTS |
|| ip6_anonportmin < IPV6PORT_RESERVED |
sysctl_createv(clog, 0, NULL, NULL, |
#endif |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
) { |
CTLTYPE_INT, "lowportmin", NULL, |
ip6_anonportmin = old; |
sysctl_net_inet_ip_ports, 0, &ip6_lowportmin, 0, |
return (EINVAL); |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
} |
IPV6CTL_LOWPORTMIN, CTL_EOL); |
return (error); |
sysctl_createv(clog, 0, NULL, NULL, |
case IPV6CTL_ANONPORTMAX: |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
old = ip6_anonportmax; |
CTLTYPE_INT, "lowportmax", NULL, |
error = sysctl_int(oldp, oldlenp, newp, newlen, |
sysctl_net_inet_ip_ports, 0, &ip6_lowportmax, 0, |
&ip6_anonportmax); |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
if (ip6_anonportmin >= ip6_anonportmax || ip6_anonportmax < 0 || |
IPV6CTL_LOWPORTMAX, CTL_EOL); |
ip6_anonportmax > 65535 |
#endif /* IPNOPRIVPORTS */ |
#ifndef IPNOPRIVPORTS |
sysctl_createv(clog, 0, NULL, NULL, |
|| ip6_anonportmax < IPV6PORT_RESERVED |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
#endif |
CTLTYPE_INT, "maxfrags", NULL, |
) { |
NULL, 0, &ip6_maxfrags, 0, |
ip6_anonportmax = old; |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
return (EINVAL); |
IPV6CTL_MAXFRAGS, CTL_EOL); |
} |
|
return (error); |
|
#ifndef IPNOPRIVPORTS |
|
case IPV6CTL_LOWPORTMIN: |
|
old = ip6_lowportmin; |
|
error = sysctl_int(oldp, oldlenp, newp, newlen, |
|
&ip6_lowportmin); |
|
if (ip6_lowportmin >= ip6_lowportmax || |
|
ip6_lowportmin > IPV6PORT_RESERVEDMAX || |
|
ip6_lowportmin < IPV6PORT_RESERVEDMIN) { |
|
ip6_lowportmin = old; |
|
return (EINVAL); |
|
} |
|
return (error); |
|
case IPV6CTL_LOWPORTMAX: |
|
old = ip6_lowportmax; |
|
error = sysctl_int(oldp, oldlenp, newp, newlen, |
|
&ip6_lowportmax); |
|
if (ip6_lowportmin >= ip6_lowportmax || |
|
ip6_lowportmax > IPV6PORT_RESERVEDMAX || |
|
ip6_lowportmax < IPV6PORT_RESERVEDMIN) { |
|
ip6_lowportmax = old; |
|
return (EINVAL); |
|
} |
|
return (error); |
|
#endif |
|
case IPV6CTL_MAXFRAGS: |
|
return sysctl_int(oldp, oldlenp, newp, newlen, &ip6_maxfrags); |
|
default: |
|
return EOPNOTSUPP; |
|
} |
|
/* NOTREACHED */ |
|
} |
} |