version 1.88, 2006/05/25 21:32:47 |
version 1.88.6.2, 2007/01/12 01:04:15 |
|
|
} |
} |
|
|
static void |
static void |
ip6_init2(dummy) |
ip6_init2(void *dummy) |
void *dummy; |
|
{ |
{ |
|
|
/* nd6_timer_init */ |
/* nd6_timer_init */ |
|
|
/* |
/* |
* Unicast check |
* Unicast check |
*/ |
*/ |
if (ip6_forward_rt.ro_rt != NULL && |
if (!IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
(ip6_forward_rt.ro_rt->rt_flags & RTF_UP) != 0 && |
|
IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, |
|
&((struct sockaddr_in6 *)(&ip6_forward_rt.ro_dst))->sin6_addr)) |
&((struct sockaddr_in6 *)(&ip6_forward_rt.ro_dst))->sin6_addr)) |
|
rtcache_free((struct route *)&ip6_forward_rt); |
|
else |
|
rtcache_check((struct route *)&ip6_forward_rt); |
|
if (ip6_forward_rt.ro_rt != NULL) { |
|
/* XXX Revalidated route is accounted wrongly. */ |
ip6stat.ip6s_forward_cachehit++; |
ip6stat.ip6s_forward_cachehit++; |
else { |
} else { |
struct sockaddr_in6 *dst6; |
struct sockaddr_in6 *dst6; |
|
|
if (ip6_forward_rt.ro_rt) { |
ip6stat.ip6s_forward_cachemiss++; |
/* route is down or destination is different */ |
|
ip6stat.ip6s_forward_cachemiss++; |
|
RTFREE(ip6_forward_rt.ro_rt); |
|
ip6_forward_rt.ro_rt = 0; |
|
} |
|
|
|
bzero(&ip6_forward_rt.ro_dst, sizeof(struct sockaddr_in6)); |
bzero(&ip6_forward_rt.ro_dst, sizeof(struct sockaddr_in6)); |
dst6 = (struct sockaddr_in6 *)&ip6_forward_rt.ro_dst; |
dst6 = (struct sockaddr_in6 *)&ip6_forward_rt.ro_dst; |
|
|
dst6->sin6_family = AF_INET6; |
dst6->sin6_family = AF_INET6; |
dst6->sin6_addr = ip6->ip6_dst; |
dst6->sin6_addr = ip6->ip6_dst; |
|
|
rtalloc((struct route *)&ip6_forward_rt); |
rtcache_init((struct route *)&ip6_forward_rt); |
} |
} |
|
|
#define rt6_key(r) ((struct sockaddr_in6 *)((r)->rt_nodes->rn_key)) |
#define rt6_key(r) ((struct sockaddr_in6 *)((r)->rt_nodes->rn_key)) |
|
|
* But we think it's even useful in some situations, e.g. when using |
* But we think it's even useful in some situations, e.g. when using |
* a special daemon which wants to intercept the packet. |
* a special daemon which wants to intercept the packet. |
*/ |
*/ |
if (ip6_forward_rt.ro_rt && |
if (ip6_forward_rt.ro_rt != NULL && |
(ip6_forward_rt.ro_rt->rt_flags & |
(ip6_forward_rt.ro_rt->rt_flags & |
(RTF_HOST|RTF_GATEWAY)) == RTF_HOST && |
(RTF_HOST|RTF_GATEWAY)) == RTF_HOST && |
!(ip6_forward_rt.ro_rt->rt_flags & RTF_CLONED) && |
!(ip6_forward_rt.ro_rt->rt_flags & RTF_CLONED) && |
|
|
*/ |
*/ |
#if defined(NFAITH) && 0 < NFAITH |
#if defined(NFAITH) && 0 < NFAITH |
if (ip6_keepfaith) { |
if (ip6_keepfaith) { |
if (ip6_forward_rt.ro_rt && ip6_forward_rt.ro_rt->rt_ifp && |
if (ip6_forward_rt.ro_rt != NULL && |
|
ip6_forward_rt.ro_rt->rt_ifp != NULL && |
ip6_forward_rt.ro_rt->rt_ifp->if_type == IFT_FAITH) { |
ip6_forward_rt.ro_rt->rt_ifp->if_type == IFT_FAITH) { |
/* XXX do we need more sanity checks? */ |
/* XXX do we need more sanity checks? */ |
ours = 1; |
ours = 1; |
|
|
* working right. |
* working right. |
*/ |
*/ |
struct ifaddr *ifa; |
struct ifaddr *ifa; |
for (ifa = m->m_pkthdr.rcvif->if_addrlist.tqh_first; |
TAILQ_FOREACH(ifa, &m->m_pkthdr.rcvif->if_addrlist, ifa_list) { |
ifa; |
|
ifa = ifa->ifa_list.tqe_next) { |
|
if (ifa->ifa_addr == NULL) |
if (ifa->ifa_addr == NULL) |
continue; /* just for safety */ |
continue; /* just for safety */ |
if (ifa->ifa_addr->sa_family != AF_INET6) |
if (ifa->ifa_addr->sa_family != AF_INET6) |