ip6_mroute.c revision 1.111 1 /* $NetBSD: ip6_mroute.c,v 1.111 2016/06/21 03:28:27 ozaki-r Exp $ */
2 /* $KAME: ip6_mroute.c,v 1.49 2001/07/25 09:21:18 jinmei Exp $ */
3
4 /*
5 * Copyright (C) 1998 WIDE Project.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of the project nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 */
32
33 /* BSDI ip_mroute.c,v 2.10 1996/11/14 00:29:52 jch Exp */
34
35 /*
36 * Copyright (c) 1992, 1993
37 * The Regents of the University of California. All rights reserved.
38 *
39 * This code is derived from software contributed to Berkeley by
40 * Stephen Deering of Stanford University.
41 *
42 * Redistribution and use in source and binary forms, with or without
43 * modification, are permitted provided that the following conditions
44 * are met:
45 * 1. Redistributions of source code must retain the above copyright
46 * notice, this list of conditions and the following disclaimer.
47 * 2. Redistributions in binary form must reproduce the above copyright
48 * notice, this list of conditions and the following disclaimer in the
49 * documentation and/or other materials provided with the distribution.
50 * 3. Neither the name of the University nor the names of its contributors
51 * may be used to endorse or promote products derived from this software
52 * without specific prior written permission.
53 *
54 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
55 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
56 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
57 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
58 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
59 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
60 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
61 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
62 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
63 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
64 * SUCH DAMAGE.
65 *
66 * @(#)ip_mroute.c 8.2 (Berkeley) 11/15/93
67 */
68
69 /*
70 * Copyright (c) 1989 Stephen Deering
71 *
72 * This code is derived from software contributed to Berkeley by
73 * Stephen Deering of Stanford University.
74 *
75 * Redistribution and use in source and binary forms, with or without
76 * modification, are permitted provided that the following conditions
77 * are met:
78 * 1. Redistributions of source code must retain the above copyright
79 * notice, this list of conditions and the following disclaimer.
80 * 2. Redistributions in binary form must reproduce the above copyright
81 * notice, this list of conditions and the following disclaimer in the
82 * documentation and/or other materials provided with the distribution.
83 * 3. All advertising materials mentioning features or use of this software
84 * must display the following acknowledgement:
85 * This product includes software developed by the University of
86 * California, Berkeley and its contributors.
87 * 4. Neither the name of the University nor the names of its contributors
88 * may be used to endorse or promote products derived from this software
89 * without specific prior written permission.
90 *
91 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
92 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
93 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
94 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
95 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
96 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
97 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
98 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
99 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
100 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
101 * SUCH DAMAGE.
102 *
103 * @(#)ip_mroute.c 8.2 (Berkeley) 11/15/93
104 */
105
106 /*
107 * IP multicast forwarding procedures
108 *
109 * Written by David Waitzman, BBN Labs, August 1988.
110 * Modified by Steve Deering, Stanford, February 1989.
111 * Modified by Mark J. Steiglitz, Stanford, May, 1991
112 * Modified by Van Jacobson, LBL, January 1993
113 * Modified by Ajit Thyagarajan, PARC, August 1993
114 * Modified by Bill Fenner, PARC, April 1994
115 *
116 * MROUTING Revision: 3.5.1.2 + PIM-SMv2 (pimd) Support
117 */
118
119 #include <sys/cdefs.h>
120 __KERNEL_RCSID(0, "$NetBSD: ip6_mroute.c,v 1.111 2016/06/21 03:28:27 ozaki-r Exp $");
121
122 #ifdef _KERNEL_OPT
123 #include "opt_inet.h"
124 #include "opt_mrouting.h"
125 #endif
126
127 #include <sys/param.h>
128 #include <sys/systm.h>
129 #include <sys/callout.h>
130 #include <sys/mbuf.h>
131 #include <sys/socket.h>
132 #include <sys/socketvar.h>
133 #include <sys/sockio.h>
134 #include <sys/protosw.h>
135 #include <sys/errno.h>
136 #include <sys/time.h>
137 #include <sys/kernel.h>
138 #include <sys/ioctl.h>
139 #include <sys/sysctl.h>
140 #include <sys/syslog.h>
141
142 #include <net/if.h>
143 #include <net/route.h>
144 #include <net/raw_cb.h>
145 #include <net/net_stats.h>
146
147 #include <netinet/in.h>
148 #include <netinet/in_var.h>
149 #include <netinet/icmp6.h>
150
151 #include <netinet/ip6.h>
152 #include <netinet6/ip6_var.h>
153 #include <netinet6/ip6_private.h>
154 #include <netinet6/ip6_mroute.h>
155 #include <netinet6/scope6_var.h>
156 #include <netinet6/pim6.h>
157 #include <netinet6/pim6_var.h>
158 #include <netinet6/nd6.h>
159
160 #include <net/net_osdep.h>
161
162 static int ip6_mdq(struct mbuf *, struct ifnet *, struct mf6c *);
163 static void phyint_send(struct ip6_hdr *, struct mif6 *, struct mbuf *);
164
165 static int set_pim6(int *);
166 static int socket_send(struct socket *, struct mbuf *,
167 struct sockaddr_in6 *);
168 static int register_send(struct ip6_hdr *, struct mif6 *, struct mbuf *);
169
170 /*
171 * Globals. All but ip6_mrouter, ip6_mrtproto and mrt6stat could be static,
172 * except for netstat or debugging purposes.
173 */
174 struct socket *ip6_mrouter = NULL;
175 int ip6_mrouter_ver = 0;
176 int ip6_mrtproto = IPPROTO_PIM; /* for netstat only */
177 struct mrt6stat mrt6stat;
178
179 #define NO_RTE_FOUND 0x1
180 #define RTE_FOUND 0x2
181
182 struct mf6c *mf6ctable[MF6CTBLSIZ];
183 u_char n6expire[MF6CTBLSIZ];
184 struct mif6 mif6table[MAXMIFS];
185 #ifdef MRT6DEBUG
186 u_int mrt6debug = 0; /* debug level */
187 #define DEBUG_MFC 0x02
188 #define DEBUG_FORWARD 0x04
189 #define DEBUG_EXPIRE 0x08
190 #define DEBUG_XMIT 0x10
191 #define DEBUG_REG 0x20
192 #define DEBUG_PIM 0x40
193 #define __mrt6debugused /* empty */
194 #else
195 #define __mrt6debugused __unused
196 #endif
197
198 static void expire_upcalls(void *);
199 #define EXPIRE_TIMEOUT (hz / 4) /* 4x / second */
200 #define UPCALL_EXPIRE 6 /* number of timeouts */
201
202 #ifdef INET
203 #ifdef MROUTING
204 extern struct socket *ip_mrouter;
205 #endif
206 #endif
207
208 /*
209 * 'Interfaces' associated with decapsulator (so we can tell
210 * packets that went through it from ones that get reflected
211 * by a broken gateway). These interfaces are never linked into
212 * the system ifnet list & no routes point to them. I.e., packets
213 * can't be sent this way. They only exist as a placeholder for
214 * multicast source verification.
215 */
216 struct ifnet multicast_register_if6;
217
218 #define ENCAP_HOPS 64
219
220 /*
221 * Private variables.
222 */
223 static mifi_t nummifs = 0;
224 static mifi_t reg_mif_num = (mifi_t)-1;
225
226 static percpu_t *pim6stat_percpu;
227
228 #define PIM6_STATINC(x) _NET_STATINC(pim6stat_percpu, x)
229
230 static int pim6;
231
232 /*
233 * Hash function for a source, group entry
234 */
235 #define MF6CHASH(a, g) MF6CHASHMOD((a).s6_addr32[0] ^ (a).s6_addr32[1] ^ \
236 (a).s6_addr32[2] ^ (a).s6_addr32[3] ^ \
237 (g).s6_addr32[0] ^ (g).s6_addr32[1] ^ \
238 (g).s6_addr32[2] ^ (g).s6_addr32[3])
239
240 /*
241 * Find a route for a given origin IPv6 address and Multicast group address.
242 * Quality of service parameter to be added in the future!!!
243 */
244
245 #define MF6CFIND(o, g, rt) do { \
246 struct mf6c *_rt = mf6ctable[MF6CHASH(o,g)]; \
247 rt = NULL; \
248 mrt6stat.mrt6s_mfc_lookups++; \
249 while (_rt) { \
250 if (IN6_ARE_ADDR_EQUAL(&_rt->mf6c_origin.sin6_addr, &(o)) && \
251 IN6_ARE_ADDR_EQUAL(&_rt->mf6c_mcastgrp.sin6_addr, &(g)) && \
252 (_rt->mf6c_stall == NULL)) { \
253 rt = _rt; \
254 break; \
255 } \
256 _rt = _rt->mf6c_next; \
257 } \
258 if (rt == NULL) { \
259 mrt6stat.mrt6s_mfc_misses++; \
260 } \
261 } while (/*CONSTCOND*/ 0)
262
263 /*
264 * Macros to compute elapsed time efficiently
265 * Borrowed from Van Jacobson's scheduling code
266 */
267 #define TV_DELTA(a, b, delta) do { \
268 int xxs; \
269 \
270 delta = (a).tv_usec - (b).tv_usec; \
271 if ((xxs = (a).tv_sec - (b).tv_sec)) { \
272 switch (xxs) { \
273 case 2: \
274 delta += 1000000; \
275 /* FALLTHROUGH */ \
276 case 1: \
277 delta += 1000000; \
278 break; \
279 default: \
280 delta += (1000000 * xxs); \
281 } \
282 } \
283 } while (/*CONSTCOND*/ 0)
284
285 #define TV_LT(a, b) (((a).tv_usec < (b).tv_usec && \
286 (a).tv_sec <= (b).tv_sec) || (a).tv_sec < (b).tv_sec)
287
288 #ifdef UPCALL_TIMING
289 #define UPCALL_MAX 50
290 u_long upcall_data[UPCALL_MAX + 1];
291 static void collate();
292 #endif /* UPCALL_TIMING */
293
294 static int get_sg_cnt(struct sioc_sg_req6 *);
295 static int get_mif6_cnt(struct sioc_mif_req6 *);
296 static int ip6_mrouter_init(struct socket *, int, int);
297 static int add_m6if(struct mif6ctl *);
298 static int del_m6if(mifi_t *);
299 static int add_m6fc(struct mf6cctl *);
300 static int del_m6fc(struct mf6cctl *);
301 static void sysctl_net_inet6_pim6_setup(struct sysctllog **);
302
303 static callout_t expire_upcalls_ch;
304
305 void
306 pim6_init(void)
307 {
308
309 sysctl_net_inet6_pim6_setup(NULL);
310 pim6stat_percpu = percpu_alloc(sizeof(uint64_t) * PIM6_NSTATS);
311 }
312
313 /*
314 * Handle MRT setsockopt commands to modify the multicast routing tables.
315 */
316 int
317 ip6_mrouter_set(struct socket *so, struct sockopt *sopt)
318 {
319 int error, optval;
320 struct mif6ctl mifc;
321 struct mf6cctl mfcc;
322 mifi_t mifi;
323
324 if (sopt->sopt_name != MRT6_INIT && so != ip6_mrouter)
325 return (EACCES);
326
327 error = 0;
328
329 switch (sopt->sopt_name) {
330 #ifdef MRT6_OINIT
331 case MRT6_OINIT:
332 #endif
333 case MRT6_INIT:
334 error = sockopt_getint(sopt, &optval);
335 if (error)
336 break;
337 return (ip6_mrouter_init(so, optval, sopt->sopt_name));
338 case MRT6_DONE:
339 return (ip6_mrouter_done());
340 case MRT6_ADD_MIF:
341 error = sockopt_get(sopt, &mifc, sizeof(mifc));
342 if (error)
343 break;
344 return (add_m6if(&mifc));
345 case MRT6_DEL_MIF:
346 error = sockopt_get(sopt, &mifi, sizeof(mifi));
347 if (error)
348 break;
349 return (del_m6if(&mifi));
350 case MRT6_ADD_MFC:
351 error = sockopt_get(sopt, &mfcc, sizeof(mfcc));
352 if (error)
353 break;
354 return (add_m6fc(&mfcc));
355 case MRT6_DEL_MFC:
356 error = sockopt_get(sopt, &mfcc, sizeof(mfcc));
357 if (error)
358 break;
359 return (del_m6fc(&mfcc));
360 case MRT6_PIM:
361 error = sockopt_getint(sopt, &optval);
362 if (error)
363 break;
364 return (set_pim6(&optval));
365 default:
366 error = EOPNOTSUPP;
367 }
368
369 return (error);
370 }
371
372 /*
373 * Handle MRT getsockopt commands
374 */
375 int
376 ip6_mrouter_get(struct socket *so, struct sockopt *sopt)
377 {
378 int error;
379
380 if (so != ip6_mrouter) return EACCES;
381
382 error = 0;
383
384 switch (sopt->sopt_name) {
385 case MRT6_PIM:
386 error = sockopt_set(sopt, &pim6, sizeof(pim6));
387 break;
388 default:
389 error = EOPNOTSUPP;
390 break;
391 }
392
393 return (error);
394 }
395
396 /*
397 * Handle ioctl commands to obtain information from the cache
398 */
399 int
400 mrt6_ioctl(u_long cmd, void *data)
401 {
402
403 switch (cmd) {
404 case SIOCGETSGCNT_IN6:
405 return (get_sg_cnt((struct sioc_sg_req6 *)data));
406 case SIOCGETMIFCNT_IN6:
407 return (get_mif6_cnt((struct sioc_mif_req6 *)data));
408 default:
409 return (EINVAL);
410 }
411 }
412
413 /*
414 * returns the packet, byte, rpf-failure count for the source group provided
415 */
416 static int
417 get_sg_cnt(struct sioc_sg_req6 *req)
418 {
419 struct mf6c *rt;
420 int s;
421
422 s = splsoftnet();
423 MF6CFIND(req->src.sin6_addr, req->grp.sin6_addr, rt);
424 splx(s);
425 if (rt != NULL) {
426 req->pktcnt = rt->mf6c_pkt_cnt;
427 req->bytecnt = rt->mf6c_byte_cnt;
428 req->wrong_if = rt->mf6c_wrong_if;
429 } else
430 return (ESRCH);
431 #if 0
432 req->pktcnt = req->bytecnt = req->wrong_if = 0xffffffff;
433 #endif
434
435 return 0;
436 }
437
438 /*
439 * returns the input and output packet and byte counts on the mif provided
440 */
441 static int
442 get_mif6_cnt(struct sioc_mif_req6 *req)
443 {
444 mifi_t mifi = req->mifi;
445
446 if (mifi >= nummifs)
447 return EINVAL;
448
449 req->icount = mif6table[mifi].m6_pkt_in;
450 req->ocount = mif6table[mifi].m6_pkt_out;
451 req->ibytes = mif6table[mifi].m6_bytes_in;
452 req->obytes = mif6table[mifi].m6_bytes_out;
453
454 return 0;
455 }
456
457 static int
458 set_pim6(int *i)
459 {
460 if ((*i != 1) && (*i != 0))
461 return EINVAL;
462
463 pim6 = *i;
464
465 return 0;
466 }
467
468 /*
469 * Enable multicast routing
470 */
471 static int
472 ip6_mrouter_init(struct socket *so, int v, int cmd)
473 {
474 #ifdef MRT6DEBUG
475 if (mrt6debug)
476 log(LOG_DEBUG,
477 "ip6_mrouter_init: so_type = %d, pr_protocol = %d\n",
478 so->so_type, so->so_proto->pr_protocol);
479 #endif
480
481 if (so->so_type != SOCK_RAW ||
482 so->so_proto->pr_protocol != IPPROTO_ICMPV6)
483 return (EOPNOTSUPP);
484
485 if (v != 1)
486 return (ENOPROTOOPT);
487
488 if (ip6_mrouter != NULL)
489 return (EADDRINUSE);
490
491 ip6_mrouter = so;
492 ip6_mrouter_ver = cmd;
493
494 memset((void *)mf6ctable, 0, sizeof(mf6ctable));
495 memset((void *)n6expire, 0, sizeof(n6expire));
496
497 pim6 = 0;/* used for stubbing out/in pim stuff */
498
499 callout_init(&expire_upcalls_ch, CALLOUT_MPSAFE);
500 callout_reset(&expire_upcalls_ch, EXPIRE_TIMEOUT,
501 expire_upcalls, NULL);
502
503 #ifdef MRT6DEBUG
504 if (mrt6debug)
505 log(LOG_DEBUG, "ip6_mrouter_init\n");
506 #endif
507
508 return 0;
509 }
510
511 /*
512 * Disable multicast routing
513 */
514 int
515 ip6_mrouter_done(void)
516 {
517 mifi_t mifi;
518 int i;
519 struct ifnet *ifp;
520 struct sockaddr_in6 sin6;
521 struct mf6c *rt;
522 struct rtdetq *rte;
523 int s;
524
525 s = splsoftnet();
526
527 /*
528 * For each phyint in use, disable promiscuous reception of all IPv6
529 * multicasts.
530 */
531 #ifdef INET
532 #ifdef MROUTING
533 /*
534 * If there is still IPv4 multicast routing daemon,
535 * we remain interfaces to receive all muliticasted packets.
536 * XXX: there may be an interface in which the IPv4 multicast
537 * daemon is not interested...
538 */
539 if (!ip_mrouter)
540 #endif
541 #endif
542 {
543 for (mifi = 0; mifi < nummifs; mifi++) {
544 if (mif6table[mifi].m6_ifp &&
545 !(mif6table[mifi].m6_flags & MIFF_REGISTER)) {
546 sin6.sin6_family = AF_INET6;
547 sin6.sin6_addr = in6addr_any;
548 ifp = mif6table[mifi].m6_ifp;
549 if_mcast_op(ifp, SIOCDELMULTI,
550 sin6tocsa(&sin6));
551 }
552 }
553 }
554 #ifdef notyet
555 memset((void *)qtable, 0, sizeof(qtable));
556 memset((void *)tbftable, 0, sizeof(tbftable));
557 #endif
558 memset((void *)mif6table, 0, sizeof(mif6table));
559 nummifs = 0;
560
561 pim6 = 0; /* used to stub out/in pim specific code */
562
563 callout_stop(&expire_upcalls_ch);
564
565 /*
566 * Free all multicast forwarding cache entries.
567 */
568 for (i = 0; i < MF6CTBLSIZ; i++) {
569 rt = mf6ctable[i];
570 while (rt) {
571 struct mf6c *frt;
572
573 for (rte = rt->mf6c_stall; rte != NULL; ) {
574 struct rtdetq *n = rte->next;
575
576 m_freem(rte->m);
577 free(rte, M_MRTABLE);
578 rte = n;
579 }
580 frt = rt;
581 rt = rt->mf6c_next;
582 free(frt, M_MRTABLE);
583 }
584 }
585
586 memset((void *)mf6ctable, 0, sizeof(mf6ctable));
587
588 /*
589 * Reset register interface
590 */
591 if (reg_mif_num != (mifi_t)-1) {
592 if_detach(&multicast_register_if6);
593 reg_mif_num = (mifi_t)-1;
594 }
595
596 ip6_mrouter = NULL;
597 ip6_mrouter_ver = 0;
598
599 splx(s);
600
601 #ifdef MRT6DEBUG
602 if (mrt6debug)
603 log(LOG_DEBUG, "ip6_mrouter_done\n");
604 #endif
605
606 return 0;
607 }
608
609 void
610 ip6_mrouter_detach(struct ifnet *ifp)
611 {
612 struct rtdetq *rte;
613 struct mf6c *mfc;
614 mifi_t mifi;
615 int i;
616
617 if (ip6_mrouter == NULL)
618 return;
619
620 /*
621 * Delete a mif which points to ifp.
622 */
623 for (mifi = 0; mifi < nummifs; mifi++)
624 if (mif6table[mifi].m6_ifp == ifp)
625 del_m6if(&mifi);
626
627 /*
628 * Clear rte->ifp of cache entries received on ifp.
629 */
630 for (i = 0; i < MF6CTBLSIZ; i++) {
631 if (n6expire[i] == 0)
632 continue;
633
634 for (mfc = mf6ctable[i]; mfc != NULL; mfc = mfc->mf6c_next) {
635 for (rte = mfc->mf6c_stall; rte != NULL; rte = rte->next) {
636 if (rte->ifp == ifp)
637 rte->ifp = NULL;
638 }
639 }
640 }
641 }
642
643
644 /*
645 * Add a mif to the mif table
646 */
647 static int
648 add_m6if(struct mif6ctl *mifcp)
649 {
650 struct mif6 *mifp;
651 struct ifnet *ifp;
652 struct sockaddr_in6 sin6;
653 int error, s;
654 #ifdef notyet
655 struct tbf *m_tbf = tbftable + mifcp->mif6c_mifi;
656 #endif
657
658 if (mifcp->mif6c_mifi >= MAXMIFS)
659 return EINVAL;
660 mifp = mif6table + mifcp->mif6c_mifi;
661 if (mifp->m6_ifp)
662 return EADDRINUSE; /* XXX: is it appropriate? */
663 if (!mifcp->mif6c_pifi || (ifp = if_byindex(mifcp->mif6c_pifi)) == NULL)
664 return ENXIO;
665
666 if (mifcp->mif6c_flags & MIFF_REGISTER) {
667 ifp = &multicast_register_if6;
668
669 if (reg_mif_num == (mifi_t)-1) {
670 strlcpy(ifp->if_xname, "register_mif",
671 sizeof(ifp->if_xname));
672 ifp->if_flags |= IFF_LOOPBACK;
673 ifp->if_index = mifcp->mif6c_mifi;
674 reg_mif_num = mifcp->mif6c_mifi;
675 if_attach(ifp);
676 }
677
678 } /* if REGISTER */
679 else {
680 /* Make sure the interface supports multicast */
681 if ((ifp->if_flags & IFF_MULTICAST) == 0)
682 return EOPNOTSUPP;
683
684 s = splsoftnet();
685 /*
686 * Enable promiscuous reception of all IPv6 multicasts
687 * from the interface.
688 */
689 sin6.sin6_family = AF_INET6;
690 sin6.sin6_addr = in6addr_any;
691 error = if_mcast_op(ifp, SIOCADDMULTI, sin6tosa(&sin6));
692 splx(s);
693 if (error)
694 return error;
695 }
696
697 s = splsoftnet();
698 mifp->m6_flags = mifcp->mif6c_flags;
699 mifp->m6_ifp = ifp;
700 #ifdef notyet
701 /* scaling up here allows division by 1024 in critical code */
702 mifp->m6_rate_limit = mifcp->mif6c_rate_limit * 1024 / 1000;
703 #endif
704 /* initialize per mif pkt counters */
705 mifp->m6_pkt_in = 0;
706 mifp->m6_pkt_out = 0;
707 mifp->m6_bytes_in = 0;
708 mifp->m6_bytes_out = 0;
709 splx(s);
710
711 /* Adjust nummifs up if the mifi is higher than nummifs */
712 if (nummifs <= mifcp->mif6c_mifi)
713 nummifs = mifcp->mif6c_mifi + 1;
714
715 #ifdef MRT6DEBUG
716 if (mrt6debug)
717 log(LOG_DEBUG,
718 "add_mif #%d, phyint %s\n",
719 mifcp->mif6c_mifi, ifp->if_xname);
720 #endif
721
722 return 0;
723 }
724
725 /*
726 * Delete a mif from the mif table
727 */
728 static int
729 del_m6if(mifi_t *mifip)
730 {
731 struct mif6 *mifp = mif6table + *mifip;
732 mifi_t mifi;
733 struct ifnet *ifp;
734 struct sockaddr_in6 sin6;
735 int s;
736
737 if (*mifip >= nummifs)
738 return EINVAL;
739 if (mifp->m6_ifp == NULL)
740 return EINVAL;
741
742 s = splsoftnet();
743
744 if (!(mifp->m6_flags & MIFF_REGISTER)) {
745 /*
746 * XXX: what if there is yet IPv4 multicast daemon
747 * using the interface?
748 */
749 ifp = mifp->m6_ifp;
750
751 sin6.sin6_family = AF_INET6;
752 sin6.sin6_addr = in6addr_any;
753 if_mcast_op(ifp, SIOCDELMULTI, sin6tosa(&sin6));
754 } else {
755 if (reg_mif_num != (mifi_t)-1) {
756 if_detach(&multicast_register_if6);
757 reg_mif_num = (mifi_t)-1;
758 }
759 }
760
761 #ifdef notyet
762 memset((void *)qtable[*mifip], 0, sizeof(qtable[*mifip]));
763 memset((void *)mifp->m6_tbf, 0, sizeof(*(mifp->m6_tbf)));
764 #endif
765 memset((void *)mifp, 0, sizeof (*mifp));
766
767 /* Adjust nummifs down */
768 for (mifi = nummifs; mifi > 0; mifi--)
769 if (mif6table[mifi - 1].m6_ifp)
770 break;
771 nummifs = mifi;
772
773 splx(s);
774
775 #ifdef MRT6DEBUG
776 if (mrt6debug)
777 log(LOG_DEBUG, "del_m6if %d, nummifs %d\n", *mifip, nummifs);
778 #endif
779
780 return 0;
781 }
782
783 /*
784 * Add an mfc entry
785 */
786 static int
787 add_m6fc(struct mf6cctl *mfccp)
788 {
789 struct mf6c *rt;
790 u_long hash;
791 struct rtdetq *rte;
792 u_short nstl;
793 int s;
794
795 MF6CFIND(mfccp->mf6cc_origin.sin6_addr,
796 mfccp->mf6cc_mcastgrp.sin6_addr, rt);
797
798 /* If an entry already exists, just update the fields */
799 if (rt) {
800 #ifdef MRT6DEBUG
801 if (mrt6debug & DEBUG_MFC)
802 log(LOG_DEBUG,"add_m6fc update o %s g %s p %x\n",
803 ip6_sprintf(&mfccp->mf6cc_origin.sin6_addr),
804 ip6_sprintf(&mfccp->mf6cc_mcastgrp.sin6_addr),
805 mfccp->mf6cc_parent);
806 #endif
807
808 s = splsoftnet();
809 rt->mf6c_parent = mfccp->mf6cc_parent;
810 rt->mf6c_ifset = mfccp->mf6cc_ifset;
811 splx(s);
812 return 0;
813 }
814
815 /*
816 * Find the entry for which the upcall was made and update
817 */
818 s = splsoftnet();
819 hash = MF6CHASH(mfccp->mf6cc_origin.sin6_addr,
820 mfccp->mf6cc_mcastgrp.sin6_addr);
821 for (rt = mf6ctable[hash], nstl = 0; rt; rt = rt->mf6c_next) {
822 if (IN6_ARE_ADDR_EQUAL(&rt->mf6c_origin.sin6_addr,
823 &mfccp->mf6cc_origin.sin6_addr) &&
824 IN6_ARE_ADDR_EQUAL(&rt->mf6c_mcastgrp.sin6_addr,
825 &mfccp->mf6cc_mcastgrp.sin6_addr) &&
826 (rt->mf6c_stall != NULL)) {
827
828 if (nstl++)
829 log(LOG_ERR,
830 "add_m6fc: %s o %s g %s p %x dbx %p\n",
831 "multiple kernel entries",
832 ip6_sprintf(&mfccp->mf6cc_origin.sin6_addr),
833 ip6_sprintf(&mfccp->mf6cc_mcastgrp.sin6_addr),
834 mfccp->mf6cc_parent, rt->mf6c_stall);
835
836 #ifdef MRT6DEBUG
837 if (mrt6debug & DEBUG_MFC)
838 log(LOG_DEBUG,
839 "add_m6fc o %s g %s p %x dbg %p\n",
840 ip6_sprintf(&mfccp->mf6cc_origin.sin6_addr),
841 ip6_sprintf(&mfccp->mf6cc_mcastgrp.sin6_addr),
842 mfccp->mf6cc_parent, rt->mf6c_stall);
843 #endif
844
845 rt->mf6c_origin = mfccp->mf6cc_origin;
846 rt->mf6c_mcastgrp = mfccp->mf6cc_mcastgrp;
847 rt->mf6c_parent = mfccp->mf6cc_parent;
848 rt->mf6c_ifset = mfccp->mf6cc_ifset;
849 /* initialize pkt counters per src-grp */
850 rt->mf6c_pkt_cnt = 0;
851 rt->mf6c_byte_cnt = 0;
852 rt->mf6c_wrong_if = 0;
853
854 rt->mf6c_expire = 0; /* Don't clean this guy up */
855 n6expire[hash]--;
856
857 /* free packets Qed at the end of this entry */
858 for (rte = rt->mf6c_stall; rte != NULL; ) {
859 struct rtdetq *n = rte->next;
860 if (rte->ifp) {
861 ip6_mdq(rte->m, rte->ifp, rt);
862 }
863 m_freem(rte->m);
864 #ifdef UPCALL_TIMING
865 collate(&(rte->t));
866 #endif /* UPCALL_TIMING */
867 free(rte, M_MRTABLE);
868 rte = n;
869 }
870 rt->mf6c_stall = NULL;
871 }
872 }
873
874 /*
875 * It is possible that an entry is being inserted without an upcall
876 */
877 if (nstl == 0) {
878 #ifdef MRT6DEBUG
879 if (mrt6debug & DEBUG_MFC)
880 log(LOG_DEBUG,
881 "add_mfc no upcall h %ld o %s g %s p %x\n",
882 hash,
883 ip6_sprintf(&mfccp->mf6cc_origin.sin6_addr),
884 ip6_sprintf(&mfccp->mf6cc_mcastgrp.sin6_addr),
885 mfccp->mf6cc_parent);
886 #endif
887
888 for (rt = mf6ctable[hash]; rt; rt = rt->mf6c_next) {
889
890 if (IN6_ARE_ADDR_EQUAL(&rt->mf6c_origin.sin6_addr,
891 &mfccp->mf6cc_origin.sin6_addr)&&
892 IN6_ARE_ADDR_EQUAL(&rt->mf6c_mcastgrp.sin6_addr,
893 &mfccp->mf6cc_mcastgrp.sin6_addr)) {
894
895 rt->mf6c_origin = mfccp->mf6cc_origin;
896 rt->mf6c_mcastgrp = mfccp->mf6cc_mcastgrp;
897 rt->mf6c_parent = mfccp->mf6cc_parent;
898 rt->mf6c_ifset = mfccp->mf6cc_ifset;
899 /* initialize pkt counters per src-grp */
900 rt->mf6c_pkt_cnt = 0;
901 rt->mf6c_byte_cnt = 0;
902 rt->mf6c_wrong_if = 0;
903
904 if (rt->mf6c_expire)
905 n6expire[hash]--;
906 rt->mf6c_expire = 0;
907 }
908 }
909 if (rt == NULL) {
910 /* no upcall, so make a new entry */
911 rt = (struct mf6c *)malloc(sizeof(*rt), M_MRTABLE,
912 M_NOWAIT);
913 if (rt == NULL) {
914 splx(s);
915 return ENOBUFS;
916 }
917
918 /* insert new entry at head of hash chain */
919 rt->mf6c_origin = mfccp->mf6cc_origin;
920 rt->mf6c_mcastgrp = mfccp->mf6cc_mcastgrp;
921 rt->mf6c_parent = mfccp->mf6cc_parent;
922 rt->mf6c_ifset = mfccp->mf6cc_ifset;
923 /* initialize pkt counters per src-grp */
924 rt->mf6c_pkt_cnt = 0;
925 rt->mf6c_byte_cnt = 0;
926 rt->mf6c_wrong_if = 0;
927 rt->mf6c_expire = 0;
928 rt->mf6c_stall = NULL;
929
930 /* link into table */
931 rt->mf6c_next = mf6ctable[hash];
932 mf6ctable[hash] = rt;
933 }
934 }
935 splx(s);
936 return 0;
937 }
938
939 #ifdef UPCALL_TIMING
940 /*
941 * collect delay statistics on the upcalls
942 */
943 static void
944 collate(struct timeval *t)
945 {
946 u_long d;
947 struct timeval tp;
948 u_long delta;
949
950 GET_TIME(tp);
951
952 if (TV_LT(*t, tp))
953 {
954 TV_DELTA(tp, *t, delta);
955
956 d = delta >> 10;
957 if (d > UPCALL_MAX)
958 d = UPCALL_MAX;
959
960 ++upcall_data[d];
961 }
962 }
963 #endif /* UPCALL_TIMING */
964
965 /*
966 * Delete an mfc entry
967 */
968 static int
969 del_m6fc(struct mf6cctl *mfccp)
970 {
971 struct sockaddr_in6 origin;
972 struct sockaddr_in6 mcastgrp;
973 struct mf6c *rt;
974 struct mf6c **nptr;
975 u_long hash;
976 int s;
977
978 origin = mfccp->mf6cc_origin;
979 mcastgrp = mfccp->mf6cc_mcastgrp;
980 hash = MF6CHASH(origin.sin6_addr, mcastgrp.sin6_addr);
981
982 #ifdef MRT6DEBUG
983 if (mrt6debug & DEBUG_MFC)
984 log(LOG_DEBUG,"del_m6fc orig %s mcastgrp %s\n",
985 ip6_sprintf(&origin.sin6_addr),
986 ip6_sprintf(&mcastgrp.sin6_addr));
987 #endif
988
989 s = splsoftnet();
990
991 nptr = &mf6ctable[hash];
992 while ((rt = *nptr) != NULL) {
993 if (IN6_ARE_ADDR_EQUAL(&origin.sin6_addr,
994 &rt->mf6c_origin.sin6_addr) &&
995 IN6_ARE_ADDR_EQUAL(&mcastgrp.sin6_addr,
996 &rt->mf6c_mcastgrp.sin6_addr) &&
997 rt->mf6c_stall == NULL)
998 break;
999
1000 nptr = &rt->mf6c_next;
1001 }
1002 if (rt == NULL) {
1003 splx(s);
1004 return EADDRNOTAVAIL;
1005 }
1006
1007 *nptr = rt->mf6c_next;
1008 free(rt, M_MRTABLE);
1009
1010 splx(s);
1011
1012 return 0;
1013 }
1014
1015 static int
1016 socket_send(struct socket *s, struct mbuf *mm, struct sockaddr_in6 *src)
1017 {
1018 if (s) {
1019 if (sbappendaddr(&s->so_rcv,
1020 (struct sockaddr *)src, mm, NULL) != 0) {
1021 sorwakeup(s);
1022 return 0;
1023 }
1024 }
1025 m_freem(mm);
1026 return -1;
1027 }
1028
1029 /*
1030 * IPv6 multicast forwarding function. This function assumes that the packet
1031 * pointed to by "ip6" has arrived on (or is about to be sent to) the interface
1032 * pointed to by "ifp", and the packet is to be relayed to other networks
1033 * that have members of the packet's destination IPv6 multicast group.
1034 *
1035 * The packet is returned unscathed to the caller, unless it is
1036 * erroneous, in which case a non-zero return value tells the caller to
1037 * discard it.
1038 */
1039
1040 int
1041 ip6_mforward(struct ip6_hdr *ip6, struct ifnet *ifp, struct mbuf *m)
1042 {
1043 struct mf6c *rt;
1044 struct mif6 *mifp;
1045 struct mbuf *mm;
1046 int s;
1047 mifi_t mifi;
1048 struct sockaddr_in6 sin6;
1049
1050 #ifdef MRT6DEBUG
1051 if (mrt6debug & DEBUG_FORWARD)
1052 log(LOG_DEBUG, "ip6_mforward: src %s, dst %s, ifindex %d\n",
1053 ip6_sprintf(&ip6->ip6_src), ip6_sprintf(&ip6->ip6_dst),
1054 ifp->if_index);
1055 #endif
1056
1057 /*
1058 * Don't forward a packet with Hop limit of zero or one,
1059 * or a packet destined to a local-only group.
1060 */
1061 if (ip6->ip6_hlim <= 1 || IN6_IS_ADDR_MC_NODELOCAL(&ip6->ip6_dst) ||
1062 IN6_IS_ADDR_MC_LINKLOCAL(&ip6->ip6_dst))
1063 return 0;
1064 ip6->ip6_hlim--;
1065
1066 /*
1067 * Source address check: do not forward packets with unspecified
1068 * source. It was discussed in July 2000, on ipngwg mailing list.
1069 * This is rather more serious than unicast cases, because some
1070 * MLD packets can be sent with the unspecified source address
1071 * (although such packets must normally set the hop limit field to 1).
1072 */
1073 if (IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_src)) {
1074 IP6_STATINC(IP6_STAT_CANTFORWARD);
1075 if (ip6_log_time + ip6_log_interval < time_uptime) {
1076 ip6_log_time = time_uptime;
1077 log(LOG_DEBUG,
1078 "cannot forward "
1079 "from %s to %s nxt %d received on %s\n",
1080 ip6_sprintf(&ip6->ip6_src),
1081 ip6_sprintf(&ip6->ip6_dst),
1082 ip6->ip6_nxt,
1083 m->m_pkthdr.rcvif_index ?
1084 if_name(m_get_rcvif_NOMPSAFE(m)) : "?");
1085 }
1086 return 0;
1087 }
1088
1089 /*
1090 * Determine forwarding mifs from the forwarding cache table
1091 */
1092 s = splsoftnet();
1093 MF6CFIND(ip6->ip6_src, ip6->ip6_dst, rt);
1094
1095 /* Entry exists, so forward if necessary */
1096 if (rt) {
1097 splx(s);
1098 return (ip6_mdq(m, ifp, rt));
1099 } else {
1100 /*
1101 * If we don't have a route for packet's origin,
1102 * Make a copy of the packet &
1103 * send message to routing daemon
1104 */
1105
1106 struct mbuf *mb0;
1107 struct rtdetq *rte;
1108 u_long hash;
1109 /* int i, npkts;*/
1110 #ifdef UPCALL_TIMING
1111 struct timeval tp;
1112
1113 GET_TIME(tp);
1114 #endif /* UPCALL_TIMING */
1115
1116 mrt6stat.mrt6s_no_route++;
1117 #ifdef MRT6DEBUG
1118 if (mrt6debug & (DEBUG_FORWARD | DEBUG_MFC))
1119 log(LOG_DEBUG, "ip6_mforward: no rte s %s g %s\n",
1120 ip6_sprintf(&ip6->ip6_src),
1121 ip6_sprintf(&ip6->ip6_dst));
1122 #endif
1123
1124 /*
1125 * Allocate mbufs early so that we don't do extra work if we
1126 * are just going to fail anyway.
1127 */
1128 rte = (struct rtdetq *)malloc(sizeof(*rte), M_MRTABLE,
1129 M_NOWAIT);
1130 if (rte == NULL) {
1131 splx(s);
1132 return ENOBUFS;
1133 }
1134 mb0 = m_copy(m, 0, M_COPYALL);
1135 /*
1136 * Pullup packet header if needed before storing it,
1137 * as other references may modify it in the meantime.
1138 */
1139 if (mb0 &&
1140 (M_READONLY(mb0) || mb0->m_len < sizeof(struct ip6_hdr)))
1141 mb0 = m_pullup(mb0, sizeof(struct ip6_hdr));
1142 if (mb0 == NULL) {
1143 free(rte, M_MRTABLE);
1144 splx(s);
1145 return ENOBUFS;
1146 }
1147
1148 /* is there an upcall waiting for this packet? */
1149 hash = MF6CHASH(ip6->ip6_src, ip6->ip6_dst);
1150 for (rt = mf6ctable[hash]; rt; rt = rt->mf6c_next) {
1151 if (IN6_ARE_ADDR_EQUAL(&ip6->ip6_src,
1152 &rt->mf6c_origin.sin6_addr) &&
1153 IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst,
1154 &rt->mf6c_mcastgrp.sin6_addr) &&
1155 (rt->mf6c_stall != NULL))
1156 break;
1157 }
1158
1159 if (rt == NULL) {
1160 struct mrt6msg *im;
1161 struct omrt6msg *oim;
1162
1163 /* no upcall, so make a new entry */
1164 rt = (struct mf6c *)malloc(sizeof(*rt), M_MRTABLE,
1165 M_NOWAIT);
1166 if (rt == NULL) {
1167 free(rte, M_MRTABLE);
1168 m_freem(mb0);
1169 splx(s);
1170 return ENOBUFS;
1171 }
1172 /*
1173 * Make a copy of the header to send to the user
1174 * level process
1175 */
1176 mm = m_copy(mb0, 0, sizeof(struct ip6_hdr));
1177
1178 if (mm == NULL) {
1179 free(rte, M_MRTABLE);
1180 m_freem(mb0);
1181 free(rt, M_MRTABLE);
1182 splx(s);
1183 return ENOBUFS;
1184 }
1185
1186 /*
1187 * Send message to routing daemon
1188 */
1189 sockaddr_in6_init(&sin6, &ip6->ip6_src, 0, 0, 0);
1190
1191 im = NULL;
1192 oim = NULL;
1193 switch (ip6_mrouter_ver) {
1194 case MRT6_OINIT:
1195 oim = mtod(mm, struct omrt6msg *);
1196 oim->im6_msgtype = MRT6MSG_NOCACHE;
1197 oim->im6_mbz = 0;
1198 break;
1199 case MRT6_INIT:
1200 im = mtod(mm, struct mrt6msg *);
1201 im->im6_msgtype = MRT6MSG_NOCACHE;
1202 im->im6_mbz = 0;
1203 break;
1204 default:
1205 free(rte, M_MRTABLE);
1206 m_freem(mb0);
1207 free(rt, M_MRTABLE);
1208 splx(s);
1209 return EINVAL;
1210 }
1211
1212 #ifdef MRT6DEBUG
1213 if (mrt6debug & DEBUG_FORWARD)
1214 log(LOG_DEBUG,
1215 "getting the iif info in the kernel\n");
1216 #endif
1217
1218 for (mifp = mif6table, mifi = 0;
1219 mifi < nummifs && mifp->m6_ifp != ifp;
1220 mifp++, mifi++)
1221 ;
1222
1223 switch (ip6_mrouter_ver) {
1224 case MRT6_OINIT:
1225 oim->im6_mif = mifi;
1226 break;
1227 case MRT6_INIT:
1228 im->im6_mif = mifi;
1229 break;
1230 }
1231
1232 if (socket_send(ip6_mrouter, mm, &sin6) < 0) {
1233 log(LOG_WARNING, "ip6_mforward: ip6_mrouter "
1234 "socket queue full\n");
1235 mrt6stat.mrt6s_upq_sockfull++;
1236 free(rte, M_MRTABLE);
1237 m_freem(mb0);
1238 free(rt, M_MRTABLE);
1239 splx(s);
1240 return ENOBUFS;
1241 }
1242
1243 mrt6stat.mrt6s_upcalls++;
1244
1245 /* insert new entry at head of hash chain */
1246 memset(rt, 0, sizeof(*rt));
1247 sockaddr_in6_init(&rt->mf6c_origin, &ip6->ip6_src,
1248 0, 0, 0);
1249 sockaddr_in6_init(&rt->mf6c_mcastgrp, &ip6->ip6_dst,
1250 0, 0, 0);
1251 rt->mf6c_expire = UPCALL_EXPIRE;
1252 n6expire[hash]++;
1253 rt->mf6c_parent = MF6C_INCOMPLETE_PARENT;
1254
1255 /* link into table */
1256 rt->mf6c_next = mf6ctable[hash];
1257 mf6ctable[hash] = rt;
1258 /* Add this entry to the end of the queue */
1259 rt->mf6c_stall = rte;
1260 } else {
1261 /* determine if q has overflowed */
1262 struct rtdetq **p;
1263 int npkts = 0;
1264
1265 for (p = &rt->mf6c_stall; *p != NULL; p = &(*p)->next)
1266 if (++npkts > MAX_UPQ6) {
1267 mrt6stat.mrt6s_upq_ovflw++;
1268 free(rte, M_MRTABLE);
1269 m_freem(mb0);
1270 splx(s);
1271 return 0;
1272 }
1273
1274 /* Add this entry to the end of the queue */
1275 *p = rte;
1276 }
1277
1278 rte->next = NULL;
1279 rte->m = mb0;
1280 rte->ifp = ifp;
1281 #ifdef UPCALL_TIMING
1282 rte->t = tp;
1283 #endif /* UPCALL_TIMING */
1284
1285 splx(s);
1286
1287 return 0;
1288 }
1289 }
1290
1291 /*
1292 * Clean up cache entries if upcalls are not serviced
1293 * Call from the Slow Timeout mechanism, every 0.25 seconds.
1294 */
1295 static void
1296 expire_upcalls(void *unused)
1297 {
1298 struct rtdetq *rte;
1299 struct mf6c *mfc, **nptr;
1300 int i;
1301
1302 mutex_enter(softnet_lock);
1303 KERNEL_LOCK(1, NULL);
1304
1305 for (i = 0; i < MF6CTBLSIZ; i++) {
1306 if (n6expire[i] == 0)
1307 continue;
1308 nptr = &mf6ctable[i];
1309 while ((mfc = *nptr) != NULL) {
1310 rte = mfc->mf6c_stall;
1311 /*
1312 * Skip real cache entries
1313 * Make sure it wasn't marked to not expire (shouldn't happen)
1314 * If it expires now
1315 */
1316 if (rte != NULL &&
1317 mfc->mf6c_expire != 0 &&
1318 --mfc->mf6c_expire == 0) {
1319 #ifdef MRT6DEBUG
1320 if (mrt6debug & DEBUG_EXPIRE)
1321 log(LOG_DEBUG, "expire_upcalls: expiring (%s %s)\n",
1322 ip6_sprintf(&mfc->mf6c_origin.sin6_addr),
1323 ip6_sprintf(&mfc->mf6c_mcastgrp.sin6_addr));
1324 #endif
1325 /*
1326 * drop all the packets
1327 * free the mbuf with the pkt, if, timing info
1328 */
1329 do {
1330 struct rtdetq *n = rte->next;
1331 m_freem(rte->m);
1332 free(rte, M_MRTABLE);
1333 rte = n;
1334 } while (rte != NULL);
1335 mrt6stat.mrt6s_cache_cleanups++;
1336 n6expire[i]--;
1337
1338 *nptr = mfc->mf6c_next;
1339 free(mfc, M_MRTABLE);
1340 } else {
1341 nptr = &mfc->mf6c_next;
1342 }
1343 }
1344 }
1345 callout_reset(&expire_upcalls_ch, EXPIRE_TIMEOUT,
1346 expire_upcalls, NULL);
1347
1348 KERNEL_UNLOCK_ONE(NULL);
1349 mutex_exit(softnet_lock);
1350 }
1351
1352 /*
1353 * Packet forwarding routine once entry in the cache is made
1354 */
1355 static int
1356 ip6_mdq(struct mbuf *m, struct ifnet *ifp, struct mf6c *rt)
1357 {
1358 struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
1359 mifi_t mifi, iif;
1360 struct mif6 *mifp;
1361 int plen = m->m_pkthdr.len;
1362 struct in6_addr src0, dst0; /* copies for local work */
1363 u_int32_t iszone, idzone, oszone, odzone;
1364 int error = 0;
1365
1366 /*
1367 * Macro to send packet on mif. Since RSVP packets don't get counted on
1368 * input, they shouldn't get counted on output, so statistics keeping is
1369 * separate.
1370 */
1371
1372 #define MC6_SEND(ip6, mifp, m) do { \
1373 if ((mifp)->m6_flags & MIFF_REGISTER) \
1374 register_send((ip6), (mifp), (m)); \
1375 else \
1376 phyint_send((ip6), (mifp), (m)); \
1377 } while (/*CONSTCOND*/ 0)
1378
1379 /*
1380 * Don't forward if it didn't arrive from the parent mif
1381 * for its origin.
1382 */
1383 mifi = rt->mf6c_parent;
1384 if ((mifi >= nummifs) || (mif6table[mifi].m6_ifp != ifp)) {
1385 /* came in the wrong interface */
1386 #ifdef MRT6DEBUG
1387 if (mrt6debug & DEBUG_FORWARD)
1388 log(LOG_DEBUG,
1389 "wrong if: ifid %d mifi %d mififid %x\n",
1390 ifp->if_index, mifi,
1391 mif6table[mifi].m6_ifp ?
1392 mif6table[mifi].m6_ifp->if_index : -1);
1393 #endif
1394 mrt6stat.mrt6s_wrong_if++;
1395 rt->mf6c_wrong_if++;
1396 /*
1397 * If we are doing PIM processing, and we are forwarding
1398 * packets on this interface, send a message to the
1399 * routing daemon.
1400 */
1401 /* have to make sure this is a valid mif */
1402 if (mifi < nummifs && mif6table[mifi].m6_ifp)
1403 if (pim6 && (m->m_flags & M_LOOP) == 0) {
1404 /*
1405 * Check the M_LOOP flag to avoid an
1406 * unnecessary PIM assert.
1407 * XXX: M_LOOP is an ad-hoc hack...
1408 */
1409 struct sockaddr_in6 sin6;
1410
1411 struct mbuf *mm;
1412 struct mrt6msg *im;
1413 struct omrt6msg *oim;
1414
1415 mm = m_copy(m, 0, sizeof(struct ip6_hdr));
1416 if (mm &&
1417 (M_READONLY(mm) ||
1418 mm->m_len < sizeof(struct ip6_hdr)))
1419 mm = m_pullup(mm, sizeof(struct ip6_hdr));
1420 if (mm == NULL)
1421 return ENOBUFS;
1422
1423 oim = NULL;
1424 im = NULL;
1425 switch (ip6_mrouter_ver) {
1426 case MRT6_OINIT:
1427 oim = mtod(mm, struct omrt6msg *);
1428 oim->im6_msgtype = MRT6MSG_WRONGMIF;
1429 oim->im6_mbz = 0;
1430 break;
1431 case MRT6_INIT:
1432 im = mtod(mm, struct mrt6msg *);
1433 im->im6_msgtype = MRT6MSG_WRONGMIF;
1434 im->im6_mbz = 0;
1435 break;
1436 default:
1437 m_freem(mm);
1438 return EINVAL;
1439 }
1440
1441 for (mifp = mif6table, iif = 0;
1442 iif < nummifs && mifp &&
1443 mifp->m6_ifp != ifp;
1444 mifp++, iif++)
1445 ;
1446
1447 memset(&sin6, 0, sizeof(sin6));
1448 sin6.sin6_len = sizeof(sin6);
1449 sin6.sin6_family = AF_INET6;
1450 switch (ip6_mrouter_ver) {
1451 case MRT6_OINIT:
1452 oim->im6_mif = iif;
1453 sin6.sin6_addr = oim->im6_src;
1454 break;
1455 case MRT6_INIT:
1456 im->im6_mif = iif;
1457 sin6.sin6_addr = im->im6_src;
1458 break;
1459 }
1460
1461 mrt6stat.mrt6s_upcalls++;
1462
1463 if (socket_send(ip6_mrouter, mm, &sin6) < 0) {
1464 #ifdef MRT6DEBUG
1465 if (mrt6debug)
1466 log(LOG_WARNING, "mdq, ip6_mrouter socket queue full\n");
1467 #endif
1468 ++mrt6stat.mrt6s_upq_sockfull;
1469 return ENOBUFS;
1470 } /* if socket Q full */
1471 } /* if PIM */
1472 return 0;
1473 } /* if wrong iif */
1474
1475 /* If I sourced this packet, it counts as output, else it was input. */
1476 if (m->m_pkthdr.rcvif_index == 0) {
1477 /* XXX: is rcvif really NULL when output?? */
1478 mif6table[mifi].m6_pkt_out++;
1479 mif6table[mifi].m6_bytes_out += plen;
1480 } else {
1481 mif6table[mifi].m6_pkt_in++;
1482 mif6table[mifi].m6_bytes_in += plen;
1483 }
1484 rt->mf6c_pkt_cnt++;
1485 rt->mf6c_byte_cnt += plen;
1486
1487 /*
1488 * For each mif, forward a copy of the packet if there are group
1489 * members downstream on the interface.
1490 */
1491 src0 = ip6->ip6_src;
1492 dst0 = ip6->ip6_dst;
1493 if ((error = in6_setscope(&src0, ifp, &iszone)) != 0 ||
1494 (error = in6_setscope(&dst0, ifp, &idzone)) != 0) {
1495 IP6_STATINC(IP6_STAT_BADSCOPE);
1496 return (error);
1497 }
1498 for (mifp = mif6table, mifi = 0; mifi < nummifs; mifp++, mifi++)
1499 if (IF_ISSET(mifi, &rt->mf6c_ifset)) {
1500 if (mif6table[mifi].m6_ifp == NULL)
1501 continue;
1502 /*
1503 * check if the outgoing packet is going to break
1504 * a scope boundary.
1505 * XXX: For packets through PIM register tunnel
1506 * interface, we believe the routing daemon.
1507 */
1508 if ((mif6table[rt->mf6c_parent].m6_flags &
1509 MIFF_REGISTER) == 0 &&
1510 (mif6table[mifi].m6_flags & MIFF_REGISTER) == 0) {
1511 if (in6_setscope(&src0, mif6table[mifi].m6_ifp,
1512 &oszone) ||
1513 in6_setscope(&dst0, mif6table[mifi].m6_ifp,
1514 &odzone) ||
1515 iszone != oszone || idzone != odzone) {
1516 IP6_STATINC(IP6_STAT_BADSCOPE);
1517 continue;
1518 }
1519 }
1520
1521 mifp->m6_pkt_out++;
1522 mifp->m6_bytes_out += plen;
1523 MC6_SEND(ip6, mifp, m);
1524 }
1525 return 0;
1526 }
1527
1528 static void
1529 phyint_send(struct ip6_hdr *ip6, struct mif6 *mifp, struct mbuf *m)
1530 {
1531 struct mbuf *mb_copy;
1532 struct ifnet *ifp = mifp->m6_ifp;
1533 int error __mrt6debugused = 0;
1534 int s;
1535 static struct route ro;
1536 struct in6_multi *in6m;
1537 struct sockaddr_in6 dst6;
1538 u_long linkmtu;
1539
1540 s = splsoftnet();
1541 /*
1542 * Make a new reference to the packet; make sure that
1543 * the IPv6 header is actually copied, not just referenced,
1544 * so that ip6_output() only scribbles on the copy.
1545 */
1546 mb_copy = m_copy(m, 0, M_COPYALL);
1547 if (mb_copy &&
1548 (M_READONLY(mb_copy) || mb_copy->m_len < sizeof(struct ip6_hdr)))
1549 mb_copy = m_pullup(mb_copy, sizeof(struct ip6_hdr));
1550 if (mb_copy == NULL) {
1551 splx(s);
1552 return;
1553 }
1554 /* set MCAST flag to the outgoing packet */
1555 mb_copy->m_flags |= M_MCAST;
1556
1557 /*
1558 * If we sourced the packet, call ip6_output since we may divide
1559 * the packet into fragments when the packet is too big for the
1560 * outgoing interface.
1561 * Otherwise, we can simply send the packet to the interface
1562 * sending queue.
1563 */
1564 if (m->m_pkthdr.rcvif_index == 0) {
1565 struct ip6_moptions im6o;
1566
1567 im6o.im6o_multicast_if_index = if_get_index(ifp);
1568 /* XXX: ip6_output will override ip6->ip6_hlim */
1569 im6o.im6o_multicast_hlim = ip6->ip6_hlim;
1570 im6o.im6o_multicast_loop = 1;
1571 error = ip6_output(mb_copy, NULL, &ro, IPV6_FORWARDING,
1572 &im6o, NULL, NULL);
1573
1574 #ifdef MRT6DEBUG
1575 if (mrt6debug & DEBUG_XMIT)
1576 log(LOG_DEBUG, "phyint_send on mif %td err %d\n",
1577 mifp - mif6table, error);
1578 #endif
1579 splx(s);
1580 return;
1581 }
1582
1583 /*
1584 * If we belong to the destination multicast group
1585 * on the outgoing interface, loop back a copy.
1586 */
1587 /*
1588 * Does not have to check source info, as it's alreay covered by
1589 * ip6_input
1590 */
1591 sockaddr_in6_init(&dst6, &ip6->ip6_dst, 0, 0, 0);
1592
1593 IN6_LOOKUP_MULTI(ip6->ip6_dst, ifp, in6m);
1594 if (in6m != NULL) {
1595 ip6_mloopback(ifp, m,
1596 satocsin6(rtcache_getdst(&ro)));
1597 }
1598
1599 /*
1600 * Put the packet into the sending queue of the outgoing interface
1601 * if it would fit in the MTU of the interface.
1602 */
1603 linkmtu = IN6_LINKMTU(ifp);
1604 if (mb_copy->m_pkthdr.len <= linkmtu || linkmtu < IPV6_MMTU) {
1605 /*
1606 * We could call if_output directly here, but we use
1607 * nd6_output on purpose to see if IPv6 operation is allowed
1608 * on the interface.
1609 */
1610 error = nd6_output(ifp, ifp, mb_copy, &dst6, NULL);
1611 #ifdef MRT6DEBUG
1612 if (mrt6debug & DEBUG_XMIT)
1613 log(LOG_DEBUG, "phyint_send on mif %td err %d\n",
1614 mifp - mif6table, error);
1615 #endif
1616 } else {
1617 /*
1618 * pMTU discovery is intentionally disabled by default, since
1619 * various router may notify pMTU in multicast, which can be
1620 * a DDoS to a router
1621 */
1622 if (ip6_mcast_pmtu)
1623 icmp6_error(mb_copy, ICMP6_PACKET_TOO_BIG, 0, linkmtu);
1624 else {
1625 #ifdef MRT6DEBUG
1626 if (mrt6debug & DEBUG_XMIT)
1627 log(LOG_DEBUG,
1628 "phyint_send: packet too big on %s o %s g %s"
1629 " size %d(discarded)\n",
1630 if_name(ifp),
1631 ip6_sprintf(&ip6->ip6_src),
1632 ip6_sprintf(&ip6->ip6_dst),
1633 mb_copy->m_pkthdr.len);
1634 #endif /* MRT6DEBUG */
1635 m_freem(mb_copy); /* simply discard the packet */
1636 }
1637 }
1638
1639 splx(s);
1640 }
1641
1642 static int
1643 register_send(struct ip6_hdr *ip6, struct mif6 *mif, struct mbuf *m)
1644 {
1645 struct mbuf *mm;
1646 int i, len = m->m_pkthdr.len;
1647 struct sockaddr_in6 sin6;
1648 struct mrt6msg *im6;
1649
1650 #ifdef MRT6DEBUG
1651 if (mrt6debug)
1652 log(LOG_DEBUG, "** IPv6 register_send **\n src %s dst %s\n",
1653 ip6_sprintf(&ip6->ip6_src), ip6_sprintf(&ip6->ip6_dst));
1654 #endif
1655 PIM6_STATINC(PIM6_STAT_SND_REGISTERS);
1656
1657 /* Make a copy of the packet to send to the user level process */
1658 MGETHDR(mm, M_DONTWAIT, MT_HEADER);
1659 if (mm == NULL)
1660 return ENOBUFS;
1661 mm->m_data += max_linkhdr;
1662 mm->m_len = sizeof(struct ip6_hdr);
1663
1664 if ((mm->m_next = m_copy(m, 0, M_COPYALL)) == NULL) {
1665 m_freem(mm);
1666 return ENOBUFS;
1667 }
1668 i = MHLEN - M_LEADINGSPACE(mm);
1669 if (i > len)
1670 i = len;
1671 mm = m_pullup(mm, i);
1672 if (mm == NULL)
1673 return ENOBUFS;
1674 /* TODO: check it! */
1675 mm->m_pkthdr.len = len + sizeof(struct ip6_hdr);
1676
1677 /*
1678 * Send message to routing daemon
1679 */
1680 sockaddr_in6_init(&sin6, &ip6->ip6_src, 0, 0, 0);
1681
1682 im6 = mtod(mm, struct mrt6msg *);
1683 im6->im6_msgtype = MRT6MSG_WHOLEPKT;
1684 im6->im6_mbz = 0;
1685
1686 im6->im6_mif = mif - mif6table;
1687
1688 /* iif info is not given for reg. encap.n */
1689 mrt6stat.mrt6s_upcalls++;
1690
1691 if (socket_send(ip6_mrouter, mm, &sin6) < 0) {
1692 #ifdef MRT6DEBUG
1693 if (mrt6debug)
1694 log(LOG_WARNING,
1695 "register_send: ip6_mrouter socket queue full\n");
1696 #endif
1697 ++mrt6stat.mrt6s_upq_sockfull;
1698 return ENOBUFS;
1699 }
1700 return 0;
1701 }
1702
1703 /*
1704 * PIM sparse mode hook
1705 * Receives the pim control messages, and passes them up to the listening
1706 * socket, using rip6_input.
1707 * The only message processed is the REGISTER pim message; the pim header
1708 * is stripped off, and the inner packet is passed to register_mforward.
1709 */
1710 int
1711 pim6_input(struct mbuf **mp, int *offp, int proto)
1712 {
1713 struct pim *pim; /* pointer to a pim struct */
1714 struct ip6_hdr *ip6 __mrt6debugused;
1715 int pimlen;
1716 struct mbuf *m = *mp;
1717 int minlen;
1718 int off = *offp;
1719
1720 PIM6_STATINC(PIM6_STAT_RCV_TOTAL);
1721
1722 ip6 = mtod(m, struct ip6_hdr *);
1723 pimlen = m->m_pkthdr.len - *offp;
1724
1725 /*
1726 * Validate lengths
1727 */
1728 if (pimlen < PIM_MINLEN) {
1729 PIM6_STATINC(PIM6_STAT_RCV_TOOSHORT);
1730 #ifdef MRT6DEBUG
1731 if (mrt6debug & DEBUG_PIM)
1732 log(LOG_DEBUG,"pim6_input: PIM packet too short\n");
1733 #endif
1734 m_freem(m);
1735 return (IPPROTO_DONE);
1736 }
1737
1738 /*
1739 * if the packet is at least as big as a REGISTER, go ahead
1740 * and grab the PIM REGISTER header size, to avoid another
1741 * possible m_pullup() later.
1742 *
1743 * PIM_MINLEN == pimhdr + u_int32 == 8
1744 * PIM6_REG_MINLEN == pimhdr + reghdr + eip6hdr == 4 + 4 + 40
1745 */
1746 minlen = (pimlen >= PIM6_REG_MINLEN) ? PIM6_REG_MINLEN : PIM_MINLEN;
1747
1748 /*
1749 * Make sure that the IP6 and PIM headers in contiguous memory, and
1750 * possibly the PIM REGISTER header
1751 */
1752 IP6_EXTHDR_GET(pim, struct pim *, m, off, minlen);
1753 if (pim == NULL) {
1754 PIM6_STATINC(PIM6_STAT_RCV_TOOSHORT);
1755 return IPPROTO_DONE;
1756 }
1757
1758 /* PIM version check */
1759 if (pim->pim_ver != PIM_VERSION) {
1760 PIM6_STATINC(PIM6_STAT_RCV_BADVERSION);
1761 #ifdef MRT6DEBUG
1762 log(LOG_ERR,
1763 "pim6_input: incorrect version %d, expecting %d\n",
1764 pim->pim_ver, PIM_VERSION);
1765 #endif
1766 m_freem(m);
1767 return (IPPROTO_DONE);
1768 }
1769
1770 #define PIM6_CHECKSUM
1771 #ifdef PIM6_CHECKSUM
1772 {
1773 int cksumlen;
1774
1775 /*
1776 * Validate checksum.
1777 * If PIM REGISTER, exclude the data packet
1778 */
1779 if (pim->pim_type == PIM_REGISTER)
1780 cksumlen = PIM_MINLEN;
1781 else
1782 cksumlen = pimlen;
1783
1784 if (in6_cksum(m, IPPROTO_PIM, off, cksumlen)) {
1785 PIM6_STATINC(PIM6_STAT_RCV_BADSUM);
1786 #ifdef MRT6DEBUG
1787 if (mrt6debug & DEBUG_PIM)
1788 log(LOG_DEBUG,
1789 "pim6_input: invalid checksum\n");
1790 #endif
1791 m_freem(m);
1792 return (IPPROTO_DONE);
1793 }
1794 }
1795 #endif /* PIM_CHECKSUM */
1796
1797 if (pim->pim_type == PIM_REGISTER) {
1798 /*
1799 * since this is a REGISTER, we'll make a copy of the register
1800 * headers ip6+pim+u_int32_t+encap_ip6, to be passed up to the
1801 * routing daemon.
1802 */
1803 static const struct sockaddr_in6 dst = {
1804 .sin6_len = sizeof(dst),
1805 .sin6_family = AF_INET6,
1806 };
1807
1808 struct mbuf *mcp;
1809 struct ip6_hdr *eip6;
1810 u_int32_t *reghdr;
1811
1812 PIM6_STATINC(PIM6_STAT_RCV_REGISTERS);
1813
1814 if ((reg_mif_num >= nummifs) || (reg_mif_num == (mifi_t) -1)) {
1815 #ifdef MRT6DEBUG
1816 if (mrt6debug & DEBUG_PIM)
1817 log(LOG_DEBUG,
1818 "pim6_input: register mif not set: %d\n",
1819 reg_mif_num);
1820 #endif
1821 m_freem(m);
1822 return (IPPROTO_DONE);
1823 }
1824
1825 reghdr = (u_int32_t *)(pim + 1);
1826
1827 if ((ntohl(*reghdr) & PIM_NULL_REGISTER))
1828 goto pim6_input_to_daemon;
1829
1830 /*
1831 * Validate length
1832 */
1833 if (pimlen < PIM6_REG_MINLEN) {
1834 PIM6_STATINC(PIM6_STAT_RCV_TOOSHORT);
1835 PIM6_STATINC(PIM6_STAT_RCV_BADREGISTERS);
1836 #ifdef MRT6DEBUG
1837 log(LOG_ERR,
1838 "pim6_input: register packet size too "
1839 "small %d from %s\n",
1840 pimlen, ip6_sprintf(&ip6->ip6_src));
1841 #endif
1842 m_freem(m);
1843 return (IPPROTO_DONE);
1844 }
1845
1846 eip6 = (struct ip6_hdr *) (reghdr + 1);
1847 #ifdef MRT6DEBUG
1848 if (mrt6debug & DEBUG_PIM)
1849 log(LOG_DEBUG,
1850 "pim6_input[register], eip6: %s -> %s, "
1851 "eip6 plen %d\n",
1852 ip6_sprintf(&eip6->ip6_src),
1853 ip6_sprintf(&eip6->ip6_dst),
1854 ntohs(eip6->ip6_plen));
1855 #endif
1856
1857 /* verify the version number of the inner packet */
1858 if ((eip6->ip6_vfc & IPV6_VERSION_MASK) != IPV6_VERSION) {
1859 PIM6_STATINC(PIM6_STAT_RCV_BADREGISTERS);
1860 #ifdef MRT6DEBUG
1861 log(LOG_DEBUG, "pim6_input: invalid IP version (%d) "
1862 "of the inner packet\n",
1863 (eip6->ip6_vfc & IPV6_VERSION));
1864 #endif
1865 m_freem(m);
1866 return (IPPROTO_NONE);
1867 }
1868
1869 /* verify the inner packet is destined to a mcast group */
1870 if (!IN6_IS_ADDR_MULTICAST(&eip6->ip6_dst)) {
1871 PIM6_STATINC(PIM6_STAT_RCV_BADREGISTERS);
1872 #ifdef MRT6DEBUG
1873 if (mrt6debug & DEBUG_PIM)
1874 log(LOG_DEBUG,
1875 "pim6_input: inner packet of register "
1876 "is not multicast %s\n",
1877 ip6_sprintf(&eip6->ip6_dst));
1878 #endif
1879 m_freem(m);
1880 return (IPPROTO_DONE);
1881 }
1882
1883 /*
1884 * make a copy of the whole header to pass to the daemon later.
1885 */
1886 mcp = m_copy(m, 0, off + PIM6_REG_MINLEN);
1887 if (mcp == NULL) {
1888 #ifdef MRT6DEBUG
1889 log(LOG_ERR,
1890 "pim6_input: pim register: "
1891 "could not copy register head\n");
1892 #endif
1893 m_freem(m);
1894 return (IPPROTO_DONE);
1895 }
1896
1897 /*
1898 * forward the inner ip6 packet; point m_data at the inner ip6.
1899 */
1900 m_adj(m, off + PIM_MINLEN);
1901 #ifdef MRT6DEBUG
1902 if (mrt6debug & DEBUG_PIM) {
1903 log(LOG_DEBUG,
1904 "pim6_input: forwarding decapsulated register: "
1905 "src %s, dst %s, mif %d\n",
1906 ip6_sprintf(&eip6->ip6_src),
1907 ip6_sprintf(&eip6->ip6_dst),
1908 reg_mif_num);
1909 }
1910 #endif
1911
1912 looutput(mif6table[reg_mif_num].m6_ifp, m,
1913 (struct sockaddr *)__UNCONST(&dst), NULL);
1914
1915 /* prepare the register head to send to the mrouting daemon */
1916 m = mcp;
1917 }
1918
1919 /*
1920 * Pass the PIM message up to the daemon; if it is a register message
1921 * pass the 'head' only up to the daemon. This includes the
1922 * encapsulator ip6 header, pim header, register header and the
1923 * encapsulated ip6 header.
1924 */
1925 pim6_input_to_daemon:
1926 rip6_input(&m, offp, proto);
1927 return (IPPROTO_DONE);
1928 }
1929
1930 static int
1931 sysctl_net_inet6_pim6_stats(SYSCTLFN_ARGS)
1932 {
1933
1934 return (NETSTAT_SYSCTL(pim6stat_percpu, PIM6_NSTATS));
1935 }
1936
1937 static void
1938 sysctl_net_inet6_pim6_setup(struct sysctllog **clog)
1939 {
1940
1941 sysctl_createv(clog, 0, NULL, NULL,
1942 CTLFLAG_PERMANENT,
1943 CTLTYPE_NODE, "inet6", NULL,
1944 NULL, 0, NULL, 0,
1945 CTL_NET, PF_INET6, CTL_EOL);
1946 sysctl_createv(clog, 0, NULL, NULL,
1947 CTLFLAG_PERMANENT,
1948 CTLTYPE_NODE, "pim6",
1949 SYSCTL_DESCR("PIMv6 settings"),
1950 NULL, 0, NULL, 0,
1951 CTL_NET, PF_INET6, IPPROTO_PIM, CTL_EOL);
1952
1953 sysctl_createv(clog, 0, NULL, NULL,
1954 CTLFLAG_PERMANENT,
1955 CTLTYPE_STRUCT, "stats",
1956 SYSCTL_DESCR("PIMv6 statistics"),
1957 sysctl_net_inet6_pim6_stats, 0, NULL, 0,
1958 CTL_NET, PF_INET6, IPPROTO_PIM, PIM6CTL_STATS,
1959 CTL_EOL);
1960 }
1961