version 1.65, 2003/08/07 16:33:26 |
version 1.73.2.1.4.1, 2006/05/24 02:37:19 |
|
|
ip6intrq.ifq_maxlen = ip6qmaxlen; |
ip6intrq.ifq_maxlen = ip6qmaxlen; |
nd6_init(); |
nd6_init(); |
frag6_init(); |
frag6_init(); |
ip6_flow_seq = arc4random(); |
|
|
|
ip6_init2((void *)0); |
ip6_init2((void *)0); |
|
|
|
|
if (ip6_forward_rt.ro_rt != NULL && |
if (ip6_forward_rt.ro_rt != NULL && |
(ip6_forward_rt.ro_rt->rt_flags & RTF_UP) != 0 && |
(ip6_forward_rt.ro_rt->rt_flags & RTF_UP) != 0 && |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
&((struct sockaddr_in6 *)(&ip6_forward_rt.ro_dst))->sin6_addr)) |
&((struct sockaddr_in6 *)(&ip6_forward_rt.ro_dst))->sin6_addr)) |
ip6stat.ip6s_forward_cachehit++; |
ip6stat.ip6s_forward_cachehit++; |
else { |
else { |
struct sockaddr_in6 *dst6; |
struct sockaddr_in6 *dst6; |
|
|
*/ |
*/ |
#if defined(NFAITH) && 0 < NFAITH |
#if defined(NFAITH) && 0 < NFAITH |
if (ip6_keepfaith) { |
if (ip6_keepfaith) { |
if (ip6_forward_rt.ro_rt && ip6_forward_rt.ro_rt->rt_ifp |
if (ip6_forward_rt.ro_rt && ip6_forward_rt.ro_rt->rt_ifp && |
&& ip6_forward_rt.ro_rt->rt_ifp->if_type == IFT_FAITH) { |
ip6_forward_rt.ro_rt->rt_ifp->if_type == IFT_FAITH) { |
/* XXX do we need more sanity checks? */ |
/* XXX do we need more sanity checks? */ |
ours = 1; |
ours = 1; |
deliverifp = ip6_forward_rt.ro_rt->rt_ifp; /* faith */ |
deliverifp = ip6_forward_rt.ro_rt->rt_ifp; /* faith */ |
Line 771 ip6_hopopts_input(plenp, rtalertp, mp, o |
|
Line 770 ip6_hopopts_input(plenp, rtalertp, mp, o |
|
struct mbuf *m = *mp; |
struct mbuf *m = *mp; |
int off = *offp, hbhlen; |
int off = *offp, hbhlen; |
struct ip6_hbh *hbh; |
struct ip6_hbh *hbh; |
u_int8_t *opt; |
|
|
|
/* validation of the length of the header */ |
/* validation of the length of the header */ |
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, |
IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, |
Line 790 ip6_hopopts_input(plenp, rtalertp, mp, o |
|
Line 788 ip6_hopopts_input(plenp, rtalertp, mp, o |
|
KASSERT(IP6_HDR_ALIGNED_P(hbh)); |
KASSERT(IP6_HDR_ALIGNED_P(hbh)); |
off += hbhlen; |
off += hbhlen; |
hbhlen -= sizeof(struct ip6_hbh); |
hbhlen -= sizeof(struct ip6_hbh); |
opt = (u_int8_t *)hbh + sizeof(struct ip6_hbh); |
|
|
|
if (ip6_process_hopopts(m, (u_int8_t *)hbh + sizeof(struct ip6_hbh), |
if (ip6_process_hopopts(m, (u_int8_t *)hbh + sizeof(struct ip6_hbh), |
hbhlen, rtalertp, plenp) < 0) |
hbhlen, rtalertp, plenp) < 0) |
Line 1018 ip6_savecontrol(in6p, mp, ip6, m) |
|
Line 1015 ip6_savecontrol(in6p, mp, ip6, m) |
|
mp = &(*mp)->m_next; |
mp = &(*mp)->m_next; |
} |
} |
#endif |
#endif |
|
|
|
/* some OSes call this logic with IPv4 packet, for SO_TIMESTAMP */ |
|
if ((ip6->ip6_vfc & IPV6_VERSION_MASK) !=3D IPV6_VERSION) |
|
return; |
|
|
if (in6p->in6p_flags & IN6P_RECVDSTADDR) { |
if (in6p->in6p_flags & IN6P_RECVDSTADDR) { |
*mp = sbcreatecontrol((caddr_t) &ip6->ip6_dst, |
*mp = sbcreatecontrol((caddr_t) &ip6->ip6_dst, |
sizeof(struct in6_addr), IPV6_RECVDSTADDR, IPPROTO_IPV6); |
sizeof(struct in6_addr), IPV6_RECVDSTADDR, IPPROTO_IPV6); |
Line 1352 ip6_nexthdr(m, off, proto, nxtp) |
|
Line 1354 ip6_nexthdr(m, off, proto, nxtp) |
|
if (m->m_pkthdr.len < off + sizeof(fh)) |
if (m->m_pkthdr.len < off + sizeof(fh)) |
return -1; |
return -1; |
m_copydata(m, off, sizeof(fh), (caddr_t)&fh); |
m_copydata(m, off, sizeof(fh), (caddr_t)&fh); |
if ((ntohs(fh.ip6f_offlg) & IP6F_OFF_MASK) != 0) |
if ((fh.ip6f_offlg & IP6F_OFF_MASK) != 0) |
return -1; |
return -1; |
if (nxtp) |
if (nxtp) |
*nxtp = fh.ip6f_nxt; |
*nxtp = fh.ip6f_nxt; |
Line 1438 u_char inet6ctlerrmap[PRC_NCMDS] = { |
|
Line 1440 u_char inet6ctlerrmap[PRC_NCMDS] = { |
|
ENOPROTOOPT |
ENOPROTOOPT |
}; |
}; |
|
|
int |
SYSCTL_SETUP(sysctl_net_inet6_ip6_setup, "sysctl net.inet6.ip6 subtree setup") |
ip6_sysctl(name, namelen, oldp, oldlenp, newp, newlen) |
|
int *name; |
|
u_int namelen; |
|
void *oldp; |
|
size_t *oldlenp; |
|
void *newp; |
|
size_t newlen; |
|
{ |
{ |
int old, error; |
|
|
|
/* All sysctl names at this level are terminal. */ |
sysctl_createv(clog, 0, NULL, NULL, |
if (namelen != 1) |
CTLFLAG_PERMANENT, |
return ENOTDIR; |
CTLTYPE_NODE, "net", NULL, |
|
NULL, 0, NULL, 0, |
switch (name[0]) { |
CTL_NET, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
case IPV6CTL_FORWARDING: |
CTLFLAG_PERMANENT, |
return sysctl_int(oldp, oldlenp, newp, newlen, |
CTLTYPE_NODE, "inet6", |
&ip6_forwarding); |
SYSCTL_DESCR("PF_INET6 related settings"), |
case IPV6CTL_SENDREDIRECTS: |
NULL, 0, NULL, 0, |
return sysctl_int(oldp, oldlenp, newp, newlen, |
CTL_NET, PF_INET6, CTL_EOL); |
&ip6_sendredirects); |
sysctl_createv(clog, 0, NULL, NULL, |
case IPV6CTL_DEFHLIM: |
CTLFLAG_PERMANENT, |
return sysctl_int(oldp, oldlenp, newp, newlen, &ip6_defhlim); |
CTLTYPE_NODE, "ip6", |
case IPV6CTL_MAXFRAGPACKETS: |
SYSCTL_DESCR("IPv6 related settings"), |
return sysctl_int(oldp, oldlenp, newp, newlen, |
NULL, 0, NULL, 0, |
&ip6_maxfragpackets); |
CTL_NET, PF_INET6, IPPROTO_IPV6, CTL_EOL); |
case IPV6CTL_ACCEPT_RTADV: |
|
return sysctl_int(oldp, oldlenp, newp, newlen, |
sysctl_createv(clog, 0, NULL, NULL, |
&ip6_accept_rtadv); |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
case IPV6CTL_KEEPFAITH: |
CTLTYPE_INT, "forwarding", |
return sysctl_int(oldp, oldlenp, newp, newlen, &ip6_keepfaith); |
SYSCTL_DESCR("Enable forwarding of INET6 datagrams"), |
case IPV6CTL_LOG_INTERVAL: |
NULL, 0, &ip6_forwarding, 0, |
return sysctl_int(oldp, oldlenp, newp, newlen, |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
&ip6_log_interval); |
IPV6CTL_FORWARDING, CTL_EOL); |
case IPV6CTL_HDRNESTLIMIT: |
sysctl_createv(clog, 0, NULL, NULL, |
return sysctl_int(oldp, oldlenp, newp, newlen, |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
&ip6_hdrnestlimit); |
CTLTYPE_INT, "redirect", |
case IPV6CTL_DAD_COUNT: |
SYSCTL_DESCR("Enable sending of ICMPv6 redirect messages"), |
return sysctl_int(oldp, oldlenp, newp, newlen, &ip6_dad_count); |
NULL, 0, &ip6_sendredirects, 0, |
case IPV6CTL_AUTO_FLOWLABEL: |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
return sysctl_int(oldp, oldlenp, newp, newlen, |
IPV6CTL_SENDREDIRECTS, CTL_EOL); |
&ip6_auto_flowlabel); |
sysctl_createv(clog, 0, NULL, NULL, |
case IPV6CTL_DEFMCASTHLIM: |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
return sysctl_int(oldp, oldlenp, newp, newlen, |
CTLTYPE_INT, "hlim", |
&ip6_defmcasthlim); |
SYSCTL_DESCR("Hop limit for an INET6 datagram"), |
#if NGIF > 0 |
NULL, 0, &ip6_defhlim, 0, |
case IPV6CTL_GIF_HLIM: |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
return sysctl_int(oldp, oldlenp, newp, newlen, |
IPV6CTL_DEFHLIM, CTL_EOL); |
&ip6_gif_hlim); |
#ifdef notyet |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "mtu", NULL, |
|
NULL, 0, &, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_DEFMTU, CTL_EOL); |
#endif |
#endif |
case IPV6CTL_KAME_VERSION: |
#ifdef __no_idea__ |
return sysctl_rdstring(oldp, oldlenp, newp, __KAME_VERSION); |
sysctl_createv(clog, 0, NULL, NULL, |
case IPV6CTL_USE_DEPRECATED: |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
return sysctl_int(oldp, oldlenp, newp, newlen, |
CTLTYPE_INT, "forwsrcrt", NULL, |
&ip6_use_deprecated); |
NULL, 0, &?, 0, |
case IPV6CTL_RR_PRUNE: |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
return sysctl_int(oldp, oldlenp, newp, newlen, &ip6_rr_prune); |
IPV6CTL_FORWSRCRT, CTL_EOL); |
case IPV6CTL_V6ONLY: |
sysctl_createv(clog, 0, NULL, NULL, |
#ifdef INET6_BINDV6ONLY |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
return sysctl_rdint(oldp, oldlenp, newp, ip6_v6only); |
CTLTYPE_STRUCT, "stats", NULL, |
#else |
NULL, 0, &?, sizeof(?), |
return sysctl_int(oldp, oldlenp, newp, newlen, &ip6_v6only); |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_STATS, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_STRUCT, "mrtstats", NULL, |
|
NULL, 0, &?, sizeof(?), |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_MRTSTATS, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_?, "mrtproto", NULL, |
|
NULL, 0, &?, sizeof(?), |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_MRTPROTO, CTL_EOL); |
#endif |
#endif |
case IPV6CTL_ANONPORTMIN: |
sysctl_createv(clog, 0, NULL, NULL, |
old = ip6_anonportmin; |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
error = sysctl_int(oldp, oldlenp, newp, newlen, |
CTLTYPE_INT, "maxfragpackets", |
&ip6_anonportmin); |
SYSCTL_DESCR("Maximum number of fragments to buffer " |
if (ip6_anonportmin >= ip6_anonportmax || ip6_anonportmin < 0 || |
"for reassembly"), |
ip6_anonportmin > 65535 |
NULL, 0, &ip6_maxfragpackets, 0, |
#ifndef IPNOPRIVPORTS |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|| ip6_anonportmin < IPV6PORT_RESERVED |
IPV6CTL_MAXFRAGPACKETS, CTL_EOL); |
|
#ifdef __no_idea__ |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "sourcecheck", NULL, |
|
NULL, 0, &?, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_SOURCECHECK, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "sourcecheck_logint", NULL, |
|
NULL, 0, &?, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_SOURCECHECK_LOGINT, CTL_EOL); |
#endif |
#endif |
) { |
sysctl_createv(clog, 0, NULL, NULL, |
ip6_anonportmin = old; |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
return (EINVAL); |
CTLTYPE_INT, "accept_rtadv", |
} |
SYSCTL_DESCR("Accept router advertisements"), |
return (error); |
NULL, 0, &ip6_accept_rtadv, 0, |
case IPV6CTL_ANONPORTMAX: |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
old = ip6_anonportmax; |
IPV6CTL_ACCEPT_RTADV, CTL_EOL); |
error = sysctl_int(oldp, oldlenp, newp, newlen, |
sysctl_createv(clog, 0, NULL, NULL, |
&ip6_anonportmax); |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
if (ip6_anonportmin >= ip6_anonportmax || ip6_anonportmax < 0 || |
CTLTYPE_INT, "keepfaith", |
ip6_anonportmax > 65535 |
SYSCTL_DESCR("Activate faith interface"), |
#ifndef IPNOPRIVPORTS |
NULL, 0, &ip6_keepfaith, 0, |
|| ip6_anonportmax < IPV6PORT_RESERVED |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_KEEPFAITH, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "log_interval", |
|
SYSCTL_DESCR("Minumum interval between logging " |
|
"unroutable packets"), |
|
NULL, 0, &ip6_log_interval, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_LOG_INTERVAL, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "hdrnestlimit", |
|
SYSCTL_DESCR("Maximum number of nested IPv6 headers"), |
|
NULL, 0, &ip6_hdrnestlimit, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_HDRNESTLIMIT, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "dad_count", |
|
SYSCTL_DESCR("Number of Duplicate Address Detection " |
|
"probes to send"), |
|
NULL, 0, &ip6_dad_count, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_DAD_COUNT, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "auto_flowlabel", |
|
SYSCTL_DESCR("Assign random IPv6 flow labels"), |
|
NULL, 0, &ip6_auto_flowlabel, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_AUTO_FLOWLABEL, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "defmcasthlim", |
|
SYSCTL_DESCR("Default multicast hop limit"), |
|
NULL, 0, &ip6_defmcasthlim, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_DEFMCASTHLIM, CTL_EOL); |
|
#if NGIF > 0 |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "gifhlim", |
|
SYSCTL_DESCR("Default hop limit for a gif tunnel datagram"), |
|
NULL, 0, &ip6_gif_hlim, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_GIF_HLIM, CTL_EOL); |
|
#endif /* NGIF */ |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT, |
|
CTLTYPE_STRING, "kame_version", |
|
SYSCTL_DESCR("KAME Version"), |
|
NULL, 0, __KAME_VERSION, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_KAME_VERSION, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "use_deprecated", |
|
SYSCTL_DESCR("Allow use of deprecated addresses as " |
|
"source addresses"), |
|
NULL, 0, &ip6_use_deprecated, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_USE_DEPRECATED, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "rr_prune", NULL, |
|
NULL, 0, &ip6_rr_prune, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_RR_PRUNE, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT |
|
#ifndef INET6_BINDV6ONLY |
|
|CTLFLAG_READWRITE, |
#endif |
#endif |
) { |
CTLTYPE_INT, "v6only", |
ip6_anonportmax = old; |
SYSCTL_DESCR("Disallow PF_INET6 sockets from connecting " |
return (EINVAL); |
"to PF_INET sockets"), |
} |
NULL, 0, &ip6_v6only, 0, |
return (error); |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_V6ONLY, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "anonportmin", |
|
SYSCTL_DESCR("Lowest ephemeral port number to assign"), |
|
sysctl_net_inet_ip_ports, 0, &ip6_anonportmin, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_ANONPORTMIN, CTL_EOL); |
|
sysctl_createv(clog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "anonportmax", |
|
SYSCTL_DESCR("Highest ephemeral port number to assign"), |
|
sysctl_net_inet_ip_ports, 0, &ip6_anonportmax, 0, |
|
CTL_NET, PF_INET6, IPPROTO_IPV6, |
|
IPV6CTL_ANONPORTMAX, CTL_EOL); |
#ifndef IPNOPRIVPORTS |
#ifndef IPNOPRIVPORTS |
case IPV6CTL_LOWPORTMIN: |
sysctl_createv(clog, 0, NULL, NULL, |
old = ip6_lowportmin; |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
error = sysctl_int(oldp, oldlenp, newp, newlen, |
CTLTYPE_INT, "lowportmin", |
&ip6_lowportmin); |
SYSCTL_DESCR("Lowest privileged ephemeral port number " |
if (ip6_lowportmin >= ip6_lowportmax || |
"to assign"), |
ip6_lowportmin > IPV6PORT_RESERVEDMAX || |
sysctl_net_inet_ip_ports, 0, &ip6_lowportmin, 0, |
ip6_lowportmin < IPV6PORT_RESERVEDMIN) { |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
ip6_lowportmin = old; |
IPV6CTL_LOWPORTMIN, CTL_EOL); |
return (EINVAL); |
sysctl_createv(clog, 0, NULL, NULL, |
} |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
return (error); |
CTLTYPE_INT, "lowportmax", |
case IPV6CTL_LOWPORTMAX: |
SYSCTL_DESCR("Highest privileged ephemeral port number " |
old = ip6_lowportmax; |
"to assign"), |
error = sysctl_int(oldp, oldlenp, newp, newlen, |
sysctl_net_inet_ip_ports, 0, &ip6_lowportmax, 0, |
&ip6_lowportmax); |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
if (ip6_lowportmin >= ip6_lowportmax || |
IPV6CTL_LOWPORTMAX, CTL_EOL); |
ip6_lowportmax > IPV6PORT_RESERVEDMAX || |
#endif /* IPNOPRIVPORTS */ |
ip6_lowportmax < IPV6PORT_RESERVEDMIN) { |
sysctl_createv(clog, 0, NULL, NULL, |
ip6_lowportmax = old; |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
return (EINVAL); |
CTLTYPE_INT, "maxfrags", |
} |
SYSCTL_DESCR("Maximum fragments in reassembly queue"), |
return (error); |
NULL, 0, &ip6_maxfrags, 0, |
#endif |
CTL_NET, PF_INET6, IPPROTO_IPV6, |
case IPV6CTL_MAXFRAGS: |
IPV6CTL_MAXFRAGS, CTL_EOL); |
return sysctl_int(oldp, oldlenp, newp, newlen, &ip6_maxfrags); |
|
default: |
|
return EOPNOTSUPP; |
|
} |
|
/* NOTREACHED */ |
|
} |
} |