Author: ae
Date: Tue Apr  9 07:11:22 2013
New Revision: 249294
URL: http://svnweb.freebsd.org/changeset/base/249294

Log:
  Use IP6STAT_INC/IP6STAT_DEC macros to update ip6 stats.
  
  MFC after:    1 week

Modified:
  head/sys/net/if_bridge.c
  head/sys/netinet/ip6.h
  head/sys/netinet6/dest6.c
  head/sys/netinet6/frag6.c
  head/sys/netinet6/in6_gif.c
  head/sys/netinet6/in6_src.c
  head/sys/netinet6/ip6_forward.c
  head/sys/netinet6/ip6_input.c
  head/sys/netinet6/ip6_ipsec.c
  head/sys/netinet6/ip6_mroute.c
  head/sys/netinet6/ip6_output.c
  head/sys/netinet6/raw_ip6.c
  head/sys/netinet6/route6.c
  head/sys/netipsec/ipsec_input.c
  head/sys/netipsec/ipsec_output.c

Modified: head/sys/net/if_bridge.c
==============================================================================
--- head/sys/net/if_bridge.c    Tue Apr  9 06:50:11 2013        (r249293)
+++ head/sys/net/if_bridge.c    Tue Apr  9 07:11:22 2013        (r249294)
@@ -3336,14 +3336,14 @@ bridge_ip6_checkbasic(struct mbuf **mp)
                if ((m = m_copyup(m, sizeof(struct ip6_hdr),
                            (max_linkhdr + 3) & ~3)) == NULL) {
                        /* XXXJRT new stat, please */
-                       V_ip6stat.ip6s_toosmall++;
+                       IP6STAT_INC(ip6s_toosmall);
                        in6_ifstat_inc(inifp, ifs6_in_hdrerr);
                        goto bad;
                }
        } else if (__predict_false(m->m_len < sizeof(struct ip6_hdr))) {
                struct ifnet *inifp = m->m_pkthdr.rcvif;
                if ((m = m_pullup(m, sizeof(struct ip6_hdr))) == NULL) {
-                       V_ip6stat.ip6s_toosmall++;
+                       IP6STAT_INC(ip6s_toosmall);
                        in6_ifstat_inc(inifp, ifs6_in_hdrerr);
                        goto bad;
                }
@@ -3352,7 +3352,7 @@ bridge_ip6_checkbasic(struct mbuf **mp)
        ip6 = mtod(m, struct ip6_hdr *);
 
        if ((ip6->ip6_vfc & IPV6_VERSION_MASK) != IPV6_VERSION) {
-               V_ip6stat.ip6s_badvers++;
+               IP6STAT_INC(ip6s_badvers);
                in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_hdrerr);
                goto bad;
        }

Modified: head/sys/netinet/ip6.h
==============================================================================
--- head/sys/netinet/ip6.h      Tue Apr  9 06:50:11 2013        (r249293)
+++ head/sys/netinet/ip6.h      Tue Apr  9 07:11:22 2013        (r249294)
@@ -275,24 +275,24 @@ do {                                                      
                \
        if (((m)->m_flags & M_LOOP) &&                                  \
            ((m)->m_len < (off) + (hlen)) &&                            \
            (((m) = m_pullup((m), (off) + (hlen))) == NULL)) {          \
-               V_ip6stat.ip6s_exthdrtoolong++;                         \
+               IP6STAT_INC(ip6s_exthdrtoolong);                                
\
                return ret;                                             \
        } else if ((m)->m_flags & M_EXT) {                              \
                if ((m)->m_len < (off) + (hlen)) {                      \
-                       V_ip6stat.ip6s_exthdrtoolong++;                 \
+                       IP6STAT_INC(ip6s_exthdrtoolong);                        
\
                        m_freem(m);                                     \
                        return ret;                                     \
                }                                                       \
        } else {                                                        \
                if ((m)->m_len < (off) + (hlen)) {                      \
-                       V_ip6stat.ip6s_exthdrtoolong++;                 \
+                       IP6STAT_INC(ip6s_exthdrtoolong);                        
\
                        m_freem(m);                                     \
                        return ret;                                     \
                }                                                       \
        }                                                               \
     } else {                                                           \
        if ((m)->m_len < (off) + (hlen)) {                              \
-               V_ip6stat.ip6s_tooshort++;                              \
+               IP6STAT_INC(ip6s_tooshort);                             \
                in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_truncated);   \
                m_freem(m);                                             \
                return ret;                                             \

Modified: head/sys/netinet6/dest6.c
==============================================================================
--- head/sys/netinet6/dest6.c   Tue Apr  9 06:50:11 2013        (r249293)
+++ head/sys/netinet6/dest6.c   Tue Apr  9 07:11:22 2013        (r249294)
@@ -93,7 +93,7 @@ dest6_input(struct mbuf **mp, int *offp,
        for (optlen = 0; dstoptlen > 0; dstoptlen -= optlen, opt += optlen) {
                if (*opt != IP6OPT_PAD1 &&
                    (dstoptlen < IP6OPT_MINLEN || *(opt + 1) + 2 > dstoptlen)) {
-                       V_ip6stat.ip6s_toosmall++;
+                       IP6STAT_INC(ip6s_toosmall);
                        goto bad;
                }
 

Modified: head/sys/netinet6/frag6.c
==============================================================================
--- head/sys/netinet6/frag6.c   Tue Apr  9 06:50:11 2013        (r249293)
+++ head/sys/netinet6/frag6.c   Tue Apr  9 07:11:22 2013        (r249294)
@@ -215,7 +215,7 @@ frag6_input(struct mbuf **mp, int *offp,
                return IPPROTO_DONE;
        }
 
-       V_ip6stat.ip6s_fragments++;
+       IP6STAT_INC(ip6s_fragments);
        in6_ifstat_inc(dstifp, ifs6_reass_reqd);
 
        /* offset now points to data portion */
@@ -228,7 +228,7 @@ frag6_input(struct mbuf **mp, int *offp,
         */
        if ((ip6f->ip6f_offlg & ~IP6F_RESERVED_MASK) == 0) {
                /* XXX-BZ we want dedicated counters for this. */
-               V_ip6stat.ip6s_reassembled++;
+               IP6STAT_INC(ip6s_reassembled);
                in6_ifstat_inc(dstifp, ifs6_reass_ok);
                *offp = offset;
                return (ip6f->ip6f_nxt);
@@ -603,7 +603,7 @@ insert:
                m->m_pkthdr.len = plen;
        }
 
-       V_ip6stat.ip6s_reassembled++;
+       IP6STAT_INC(ip6s_reassembled);
        in6_ifstat_inc(dstifp, ifs6_reass_ok);
 
        /*
@@ -619,7 +619,7 @@ insert:
  dropfrag:
        IP6Q_UNLOCK();
        in6_ifstat_inc(dstifp, ifs6_reass_fail);
-       V_ip6stat.ip6s_fragdropped++;
+       IP6STAT_INC(ip6s_fragdropped);
        m_freem(m);
        return IPPROTO_DONE;
 }
@@ -743,7 +743,7 @@ frag6_slowtimo(void)
                                --q6->ip6q_ttl;
                                q6 = q6->ip6q_next;
                                if (q6->ip6q_prev->ip6q_ttl == 0) {
-                                       V_ip6stat.ip6s_fragtimeout++;
+                                       IP6STAT_INC(ip6s_fragtimeout);
                                        /* XXX in6_ifstat_inc(ifp, 
ifs6_reass_fail) */
                                        frag6_freef(q6->ip6q_prev);
                                }
@@ -755,7 +755,7 @@ frag6_slowtimo(void)
                 */
                while (V_frag6_nfragpackets > (u_int)V_ip6_maxfragpackets &&
                    V_ip6q.ip6q_prev) {
-                       V_ip6stat.ip6s_fragoverflow++;
+                       IP6STAT_INC(ip6s_fragoverflow);
                        /* XXX in6_ifstat_inc(ifp, ifs6_reass_fail) */
                        frag6_freef(V_ip6q.ip6q_prev);
                }
@@ -781,7 +781,7 @@ frag6_drain(void)
        VNET_FOREACH(vnet_iter) {
                CURVNET_SET(vnet_iter);
                while (V_ip6q.ip6q_next != &V_ip6q) {
-                       V_ip6stat.ip6s_fragdropped++;
+                       IP6STAT_INC(ip6s_fragdropped);
                        /* XXX in6_ifstat_inc(ifp, ifs6_reass_fail) */
                        frag6_freef(V_ip6q.ip6q_next);
                }

Modified: head/sys/netinet6/in6_gif.c
==============================================================================
--- head/sys/netinet6/in6_gif.c Tue Apr  9 06:50:11 2013        (r249293)
+++ head/sys/netinet6/in6_gif.c Tue Apr  9 07:11:22 2013        (r249294)
@@ -299,14 +299,14 @@ in6_gif_input(struct mbuf **mp, int *off
        sc = (struct gif_softc *)encap_getarg(m);
        if (sc == NULL) {
                m_freem(m);
-               V_ip6stat.ip6s_nogif++;
+               IP6STAT_INC(ip6s_nogif);
                return IPPROTO_DONE;
        }
 
        gifp = GIF2IFP(sc);
        if (gifp == NULL || (gifp->if_flags & IFF_UP) == 0) {
                m_freem(m);
-               V_ip6stat.ip6s_nogif++;
+               IP6STAT_INC(ip6s_nogif);
                return IPPROTO_DONE;
        }
 
@@ -361,7 +361,7 @@ in6_gif_input(struct mbuf **mp, int *off
                break;
 
        default:
-               V_ip6stat.ip6s_nogif++;
+               IP6STAT_INC(ip6s_nogif);
                m_freem(m);
                return IPPROTO_DONE;
        }

Modified: head/sys/netinet6/in6_src.c
==============================================================================
--- head/sys/netinet6/in6_src.c Tue Apr  9 06:50:11 2013        (r249293)
+++ head/sys/netinet6/in6_src.c Tue Apr  9 07:11:22 2013        (r249294)
@@ -153,7 +153,7 @@ static struct in6_addrpolicy *match_addr
 #define REPLACE(r) do {\
        if ((r) < sizeof(V_ip6stat.ip6s_sources_rule) / \
                sizeof(V_ip6stat.ip6s_sources_rule[0])) /* check for safety */ \
-               V_ip6stat.ip6s_sources_rule[(r)]++; \
+               IP6STAT_INC(ip6s_sources_rule[(r)]); \
        /* { \
        char ip6buf[INET6_ADDRSTRLEN], ip6b[INET6_ADDRSTRLEN]; \
        printf("in6_selectsrc: replace %s with %s by %d\n", ia_best ? 
ip6_sprintf(ip6buf, &ia_best->ia_addr.sin6_addr) : "none", ip6_sprintf(ip6b, 
&ia->ia_addr.sin6_addr), (r)); \
@@ -163,7 +163,7 @@ static struct in6_addrpolicy *match_addr
 #define NEXT(r) do {\
        if ((r) < sizeof(V_ip6stat.ip6s_sources_rule) / \
                sizeof(V_ip6stat.ip6s_sources_rule[0])) /* check for safety */ \
-               V_ip6stat.ip6s_sources_rule[(r)]++; \
+               IP6STAT_INC(ip6s_sources_rule[(r)]); \
        /* { \
        char ip6buf[INET6_ADDRSTRLEN], ip6b[INET6_ADDRSTRLEN]; \
        printf("in6_selectsrc: keep %s against %s by %d\n", ia_best ? 
ip6_sprintf(ip6buf, &ia_best->ia_addr.sin6_addr) : "none", ip6_sprintf(ip6b, 
&ia->ia_addr.sin6_addr), (r)); \
@@ -173,7 +173,7 @@ static struct in6_addrpolicy *match_addr
 #define BREAK(r) do { \
        if ((r) < sizeof(V_ip6stat.ip6s_sources_rule) / \
                sizeof(V_ip6stat.ip6s_sources_rule[0])) /* check for safety */ \
-               V_ip6stat.ip6s_sources_rule[(r)]++; \
+               IP6STAT_INC(ip6s_sources_rule[(r)]); \
        goto out;               /* XXX: we can't use 'break' here */ \
 } while(0)
 
@@ -734,7 +734,7 @@ selectroute(struct sockaddr_in6 *dstsock
                error = EHOSTUNREACH;
        }
        if (error == EHOSTUNREACH)
-               V_ip6stat.ip6s_noroute++;
+               IP6STAT_INC(ip6s_noroute);
 
        if (retifp != NULL) {
                *retifp = ifp;

Modified: head/sys/netinet6/ip6_forward.c
==============================================================================
--- head/sys/netinet6/ip6_forward.c     Tue Apr  9 06:50:11 2013        
(r249293)
+++ head/sys/netinet6/ip6_forward.c     Tue Apr  9 07:11:22 2013        
(r249294)
@@ -135,7 +135,7 @@ ip6_forward(struct mbuf *m, int srcrt)
        if ((m->m_flags & (M_BCAST|M_MCAST)) != 0 ||
            IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) ||
            IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_src)) {
-               V_ip6stat.ip6s_cantforward++;
+               IP6STAT_INC(ip6s_cantforward);
                /* XXX in6_ifstat_inc(rt->rt_ifp, ifs6_in_discard) */
                if (V_ip6_log_time + V_ip6_log_interval < time_second) {
                        V_ip6_log_time = time_second;
@@ -183,7 +183,7 @@ ip6_forward(struct mbuf *m, int srcrt)
            IP_FORWARDING, &error);
        if (sp == NULL) {
                V_ipsec6stat.out_inval++;
-               V_ip6stat.ip6s_cantforward++;
+               IP6STAT_INC(ip6s_cantforward);
                if (mcopy) {
 #if 0
                        /* XXX: what icmp ? */
@@ -204,7 +204,7 @@ ip6_forward(struct mbuf *m, int srcrt)
                 * This packet is just discarded.
                 */
                V_ipsec6stat.out_polvio++;
-               V_ip6stat.ip6s_cantforward++;
+               IP6STAT_INC(ip6s_cantforward);
                KEY_FREESP(&sp);
                if (mcopy) {
 #if 0
@@ -226,7 +226,7 @@ ip6_forward(struct mbuf *m, int srcrt)
                if (sp->req == NULL) {
                        /* XXX should be panic ? */
                        printf("ip6_forward: No IPsec request specified.\n");
-                       V_ip6stat.ip6s_cantforward++;
+                       IP6STAT_INC(ip6s_cantforward);
                        KEY_FREESP(&sp);
                        if (mcopy) {
 #if 0
@@ -310,7 +310,7 @@ ip6_forward(struct mbuf *m, int srcrt)
                        /* don't show these error codes to the user */
                        break;
                }
-               V_ip6stat.ip6s_cantforward++;
+               IP6STAT_INC(ip6s_cantforward);
                if (mcopy) {
 #if 0
                        /* XXX: what icmp ? */
@@ -362,7 +362,7 @@ again2:
        if (rin6.ro_rt != NULL)
                RT_UNLOCK(rin6.ro_rt);
        else {
-               V_ip6stat.ip6s_noroute++;
+               IP6STAT_INC(ip6s_noroute);
                in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_noroute);
                if (mcopy) {
                        icmp6_error(mcopy, ICMP6_DST_UNREACH,
@@ -387,13 +387,13 @@ skip_routing:
        src_in6 = ip6->ip6_src;
        if (in6_setscope(&src_in6, rt->rt_ifp, &outzone)) {
                /* XXX: this should not happen */
-               V_ip6stat.ip6s_cantforward++;
-               V_ip6stat.ip6s_badscope++;
+               IP6STAT_INC(ip6s_cantforward);
+               IP6STAT_INC(ip6s_badscope);
                goto bad;
        }
        if (in6_setscope(&src_in6, m->m_pkthdr.rcvif, &inzone)) {
-               V_ip6stat.ip6s_cantforward++;
-               V_ip6stat.ip6s_badscope++;
+               IP6STAT_INC(ip6s_cantforward);
+               IP6STAT_INC(ip6s_badscope);
                goto bad;
        }
        if (inzone != outzone
@@ -401,8 +401,8 @@ skip_routing:
            && !ipsecrt
 #endif
            ) {
-               V_ip6stat.ip6s_cantforward++;
-               V_ip6stat.ip6s_badscope++;
+               IP6STAT_INC(ip6s_cantforward);
+               IP6STAT_INC(ip6s_badscope);
                in6_ifstat_inc(rt->rt_ifp, ifs6_in_discard);
 
                if (V_ip6_log_time + V_ip6_log_interval < time_second) {
@@ -432,8 +432,8 @@ skip_routing:
        if (in6_setscope(&dst_in6, m->m_pkthdr.rcvif, &inzone) != 0 ||
            in6_setscope(&dst_in6, rt->rt_ifp, &outzone) != 0 ||
            inzone != outzone) {
-               V_ip6stat.ip6s_cantforward++;
-               V_ip6stat.ip6s_badscope++;
+               IP6STAT_INC(ip6s_cantforward);
+               IP6STAT_INC(ip6s_badscope);
                goto bad;
        }
 
@@ -623,12 +623,12 @@ pass:
        error = nd6_output(rt->rt_ifp, origifp, m, dst, rt);
        if (error) {
                in6_ifstat_inc(rt->rt_ifp, ifs6_out_discard);
-               V_ip6stat.ip6s_cantforward++;
+               IP6STAT_INC(ip6s_cantforward);
        } else {
-               V_ip6stat.ip6s_forward++;
+               IP6STAT_INC(ip6s_forward);
                in6_ifstat_inc(rt->rt_ifp, ifs6_out_forward);
                if (type)
-                       V_ip6stat.ip6s_redirectsent++;
+                       IP6STAT_INC(ip6s_redirectsent);
                else {
                        if (mcopy)
                                goto freecopy;

Modified: head/sys/netinet6/ip6_input.c
==============================================================================
--- head/sys/netinet6/ip6_input.c       Tue Apr  9 06:50:11 2013        
(r249293)
+++ head/sys/netinet6/ip6_input.c       Tue Apr  9 07:11:22 2013        
(r249294)
@@ -364,7 +364,7 @@ ip6_input_hbh(struct mbuf *m, uint32_t *
                 * contained, ip6_hopopts_input() must set a valid
                 * (non-zero) payload length to the variable plen.
                 */
-               V_ip6stat.ip6s_badoptions++;
+               IP6STAT_INC(ip6s_badoptions);
                in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_discard);
                in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_hdrerr);
                icmp6_error(m, ICMP6_PARAM_PROB,
@@ -379,7 +379,7 @@ ip6_input_hbh(struct mbuf *m, uint32_t *
        IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, sizeof(struct ip6_hdr),
                sizeof(struct ip6_hbh));
        if (hbh == NULL) {
-               V_ip6stat.ip6s_tooshort++;
+               IP6STAT_INC(ip6s_tooshort);
                goto out;
        }
 #endif
@@ -462,20 +462,21 @@ ip6_input(struct mbuf *m)
         */
        if (m->m_flags & M_EXT) {
                if (m->m_next)
-                       V_ip6stat.ip6s_mext2m++;
+                       IP6STAT_INC(ip6s_mext2m);
                else
-                       V_ip6stat.ip6s_mext1++;
+                       IP6STAT_INC(ip6s_mext1);
        } else {
 #define M2MMAX (sizeof(V_ip6stat.ip6s_m2m)/sizeof(V_ip6stat.ip6s_m2m[0]))
                if (m->m_next) {
                        if (m->m_flags & M_LOOP) {
-                               V_ip6stat.ip6s_m2m[V_loif->if_index]++;
+                               IP6STAT_INC(ip6s_m2m[V_loif->if_index]);
                        } else if (m->m_pkthdr.rcvif->if_index < M2MMAX)
-                               
V_ip6stat.ip6s_m2m[m->m_pkthdr.rcvif->if_index]++;
+                               IP6STAT_INC(
+                                   ip6s_m2m[m->m_pkthdr.rcvif->if_index]);
                        else
-                               V_ip6stat.ip6s_m2m[0]++;
+                               IP6STAT_INC(ip6s_m2m[0]);
                } else
-                       V_ip6stat.ip6s_m1++;
+                       IP6STAT_INC(ip6s_m1);
 #undef M2MMAX
        }
 
@@ -486,7 +487,7 @@ ip6_input(struct mbuf *m)
        }
 
        in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_receive);
-       V_ip6stat.ip6s_total++;
+       IP6STAT_INC(ip6s_total);
 
 #ifndef PULLDOWN_TEST
        /*
@@ -519,7 +520,7 @@ ip6_input(struct mbuf *m)
                struct ifnet *inifp;
                inifp = m->m_pkthdr.rcvif;
                if ((m = m_pullup(m, sizeof(struct ip6_hdr))) == NULL) {
-                       V_ip6stat.ip6s_toosmall++;
+                       IP6STAT_INC(ip6s_toosmall);
                        in6_ifstat_inc(inifp, ifs6_in_hdrerr);
                        return;
                }
@@ -528,12 +529,12 @@ ip6_input(struct mbuf *m)
        ip6 = mtod(m, struct ip6_hdr *);
 
        if ((ip6->ip6_vfc & IPV6_VERSION_MASK) != IPV6_VERSION) {
-               V_ip6stat.ip6s_badvers++;
+               IP6STAT_INC(ip6s_badvers);
                in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_hdrerr);
                goto bad;
        }
 
-       V_ip6stat.ip6s_nxthist[ip6->ip6_nxt]++;
+       IP6STAT_INC(ip6s_nxthist[ip6->ip6_nxt]);
 
        /*
         * Check against address spoofing/corruption.
@@ -543,7 +544,7 @@ ip6_input(struct mbuf *m)
                /*
                 * XXX: "badscope" is not very suitable for a multicast source.
                 */
-               V_ip6stat.ip6s_badscope++;
+               IP6STAT_INC(ip6s_badscope);
                in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr);
                goto bad;
        }
@@ -555,7 +556,7 @@ ip6_input(struct mbuf *m)
                 * because ip6_mloopback() passes the "actual" interface
                 * as the outgoing/incoming interface.
                 */
-               V_ip6stat.ip6s_badscope++;
+               IP6STAT_INC(ip6s_badscope);
                in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr);
                goto bad;
        }
@@ -580,7 +581,7 @@ ip6_input(struct mbuf *m)
         */
        if (IN6_IS_ADDR_V4MAPPED(&ip6->ip6_src) ||
            IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst)) {
-               V_ip6stat.ip6s_badscope++;
+               IP6STAT_INC(ip6s_badscope);
                in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr);
                goto bad;
        }
@@ -594,7 +595,7 @@ ip6_input(struct mbuf *m)
         */
        if (IN6_IS_ADDR_V4COMPAT(&ip6->ip6_src) ||
            IN6_IS_ADDR_V4COMPAT(&ip6->ip6_dst)) {
-               V_ip6stat.ip6s_badscope++;
+               IP6STAT_INC(ip6s_badscope);
                in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr);
                goto bad;
        }
@@ -657,12 +658,12 @@ passin:
         * is not loopback.
         */
        if (in6_clearscope(&ip6->ip6_src) || in6_clearscope(&ip6->ip6_dst)) {
-               V_ip6stat.ip6s_badscope++; /* XXX */
+               IP6STAT_INC(ip6s_badscope); /* XXX */
                goto bad;
        }
        if (in6_setscope(&ip6->ip6_src, m->m_pkthdr.rcvif, NULL) ||
            in6_setscope(&ip6->ip6_dst, m->m_pkthdr.rcvif, NULL)) {
-               V_ip6stat.ip6s_badscope++;
+               IP6STAT_INC(ip6s_badscope);
                goto bad;
        }
 
@@ -866,7 +867,7 @@ passin:
         * and we're not a router.
         */
        if (!V_ip6_forwarding) {
-               V_ip6stat.ip6s_cantforward++;
+               IP6STAT_INC(ip6s_cantforward);
                in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_discard);
                goto bad;
        }
@@ -920,7 +921,7 @@ passin:
         * Drop packet if shorter than we expect.
         */
        if (m->m_pkthdr.len - sizeof(struct ip6_hdr) < plen) {
-               V_ip6stat.ip6s_tooshort++;
+               IP6STAT_INC(ip6s_tooshort);
                in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_truncated);
                goto bad;
        }
@@ -972,7 +973,7 @@ passin:
         */
        if (IN6_IS_ADDR_V4MAPPED(&ip6->ip6_src) ||
            IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst)) {
-               V_ip6stat.ip6s_badscope++;
+               IP6STAT_INC(ip6s_badscope);
                in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_addrerr);
                goto bad;
        }
@@ -980,13 +981,13 @@ passin:
        /*
         * Tell launch routine the next header
         */
-       V_ip6stat.ip6s_delivered++;
+       IP6STAT_INC(ip6s_delivered);
        in6_ifstat_inc(deliverifp, ifs6_in_deliver);
        nest = 0;
 
        while (nxt != IPPROTO_DONE) {
                if (V_ip6_hdrnestlimit && (++nest > V_ip6_hdrnestlimit)) {
-                       V_ip6stat.ip6s_toomanyhdr++;
+                       IP6STAT_INC(ip6s_toomanyhdr);
                        goto bad;
                }
 
@@ -995,7 +996,7 @@ passin:
                 * more sanity checks in header chain processing.
                 */
                if (m->m_pkthdr.len < off) {
-                       V_ip6stat.ip6s_tooshort++;
+                       IP6STAT_INC(ip6s_tooshort);
                        in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_truncated);
                        goto bad;
                }
@@ -1089,14 +1090,14 @@ ip6_hopopts_input(u_int32_t *plenp, u_in
        IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m,
                sizeof(struct ip6_hdr), sizeof(struct ip6_hbh));
        if (hbh == NULL) {
-               V_ip6stat.ip6s_tooshort++;
+               IP6STAT_INC(ip6s_tooshort);
                return -1;
        }
        hbhlen = (hbh->ip6h_len + 1) << 3;
        IP6_EXTHDR_GET(hbh, struct ip6_hbh *, m, sizeof(struct ip6_hdr),
                hbhlen);
        if (hbh == NULL) {
-               V_ip6stat.ip6s_tooshort++;
+               IP6STAT_INC(ip6s_tooshort);
                return -1;
        }
 #endif
@@ -1141,7 +1142,7 @@ ip6_process_hopopts(struct mbuf *m, u_in
                        break;
                case IP6OPT_PADN:
                        if (hbhlen < IP6OPT_MINLEN) {
-                               V_ip6stat.ip6s_toosmall++;
+                               IP6STAT_INC(ip6s_toosmall);
                                goto bad;
                        }
                        optlen = *(opt + 1) + 2;
@@ -1149,7 +1150,7 @@ ip6_process_hopopts(struct mbuf *m, u_in
                case IP6OPT_ROUTER_ALERT:
                        /* XXX may need check for alignment */
                        if (hbhlen < IP6OPT_RTALERT_LEN) {
-                               V_ip6stat.ip6s_toosmall++;
+                               IP6STAT_INC(ip6s_toosmall);
                                goto bad;
                        }
                        if (*(opt + 1) != IP6OPT_RTALERT_LEN - 2) {
@@ -1166,7 +1167,7 @@ ip6_process_hopopts(struct mbuf *m, u_in
                case IP6OPT_JUMBO:
                        /* XXX may need check for alignment */
                        if (hbhlen < IP6OPT_JUMBO_LEN) {
-                               V_ip6stat.ip6s_toosmall++;
+                               IP6STAT_INC(ip6s_toosmall);
                                goto bad;
                        }
                        if (*(opt + 1) != IP6OPT_JUMBO_LEN - 2) {
@@ -1184,7 +1185,7 @@ ip6_process_hopopts(struct mbuf *m, u_in
                         */
                        ip6 = mtod(m, struct ip6_hdr *);
                        if (ip6->ip6_plen) {
-                               V_ip6stat.ip6s_badoptions++;
+                               IP6STAT_INC(ip6s_badoptions);
                                icmp6_error(m, ICMP6_PARAM_PROB,
                                    ICMP6_PARAMPROB_HEADER,
                                    erroff + opt - opthead);
@@ -1208,7 +1209,7 @@ ip6_process_hopopts(struct mbuf *m, u_in
                         * there's no explicit mention in specification.
                         */
                        if (*plenp != 0) {
-                               V_ip6stat.ip6s_badoptions++;
+                               IP6STAT_INC(ip6s_badoptions);
                                icmp6_error(m, ICMP6_PARAM_PROB,
                                    ICMP6_PARAMPROB_HEADER,
                                    erroff + opt + 2 - opthead);
@@ -1220,7 +1221,7 @@ ip6_process_hopopts(struct mbuf *m, u_in
                         * jumbo payload length must be larger than 65535.
                         */
                        if (jumboplen <= IPV6_MAXPACKET) {
-                               V_ip6stat.ip6s_badoptions++;
+                               IP6STAT_INC(ip6s_badoptions);
                                icmp6_error(m, ICMP6_PARAM_PROB,
                                    ICMP6_PARAMPROB_HEADER,
                                    erroff + opt + 2 - opthead);
@@ -1231,7 +1232,7 @@ ip6_process_hopopts(struct mbuf *m, u_in
                        break;
                default:                /* unknown option */
                        if (hbhlen < IP6OPT_MINLEN) {
-                               V_ip6stat.ip6s_toosmall++;
+                               IP6STAT_INC(ip6s_toosmall);
                                goto bad;
                        }
                        optlen = ip6_unknown_opt(opt, m,
@@ -1268,11 +1269,11 @@ ip6_unknown_opt(u_int8_t *optp, struct m
                m_freem(m);
                return (-1);
        case IP6OPT_TYPE_FORCEICMP: /* send ICMP even if multicasted */
-               V_ip6stat.ip6s_badoptions++;
+               IP6STAT_INC(ip6s_badoptions);
                icmp6_error(m, ICMP6_PARAM_PROB, ICMP6_PARAMPROB_OPTION, off);
                return (-1);
        case IP6OPT_TYPE_ICMP: /* send ICMP if not multicasted */
-               V_ip6stat.ip6s_badoptions++;
+               IP6STAT_INC(ip6s_badoptions);
                ip6 = mtod(m, struct ip6_hdr *);
                if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) ||
                    (m->m_flags & (M_BCAST|M_MCAST)))
@@ -1451,14 +1452,14 @@ ip6_savecontrol(struct inpcb *in6p, stru
                        ext = ip6_pullexthdr(m, sizeof(struct ip6_hdr),
                            ip6->ip6_nxt);
                        if (ext == NULL) {
-                               V_ip6stat.ip6s_tooshort++;
+                               IP6STAT_INC(ip6s_tooshort);
                                return;
                        }
                        hbh = mtod(ext, struct ip6_hbh *);
                        hbhlen = (hbh->ip6h_len + 1) << 3;
                        if (hbhlen != ext->m_len) {
                                m_freem(ext);
-                               V_ip6stat.ip6s_tooshort++;
+                               IP6STAT_INC(ip6s_tooshort);
                                return;
                        }
 #endif
@@ -1525,7 +1526,7 @@ ip6_savecontrol(struct inpcb *in6p, stru
 #else
                        ext = ip6_pullexthdr(m, off, nxt);
                        if (ext == NULL) {
-                               V_ip6stat.ip6s_tooshort++;
+                               IP6STAT_INC(ip6s_tooshort);
                                return;
                        }
                        ip6e = mtod(ext, struct ip6_ext *);
@@ -1535,7 +1536,7 @@ ip6_savecontrol(struct inpcb *in6p, stru
                                elen = (ip6e->ip6e_len + 1) << 3;
                        if (elen != ext->m_len) {
                                m_freem(ext);
-                               V_ip6stat.ip6s_tooshort++;
+                               IP6STAT_INC(ip6s_tooshort);
                                return;
                        }
 #endif

Modified: head/sys/netinet6/ip6_ipsec.c
==============================================================================
--- head/sys/netinet6/ip6_ipsec.c       Tue Apr  9 06:50:11 2013        
(r249293)
+++ head/sys/netinet6/ip6_ipsec.c       Tue Apr  9 07:11:22 2013        
(r249294)
@@ -149,7 +149,7 @@ ip6_ipsec_fwd(struct mbuf *m)
        error = ipsec_in_reject(sp, m);
        KEY_FREESP(&sp);
        if (error) {
-               V_ip6stat.ip6s_cantforward++;
+               IP6STAT_INC(ip6s_cantforward);
                return 1;
        }
 #endif /* IPSEC */

Modified: head/sys/netinet6/ip6_mroute.c
==============================================================================
--- head/sys/netinet6/ip6_mroute.c      Tue Apr  9 06:50:11 2013        
(r249293)
+++ head/sys/netinet6/ip6_mroute.c      Tue Apr  9 07:11:22 2013        
(r249294)
@@ -1100,7 +1100,7 @@ X_ip6_mforward(struct ip6_hdr *ip6, stru
         * (although such packets must normally set 1 to the hop limit field).
         */
        if (IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_src)) {
-               V_ip6stat.ip6s_cantforward++;
+               IP6STAT_INC(ip6s_cantforward);
                if (V_ip6_log_time + V_ip6_log_interval < time_second) {
                        V_ip6_log_time = time_second;
                        log(LOG_DEBUG,
@@ -1535,7 +1535,7 @@ ip6_mdq(struct mbuf *m, struct ifnet *if
        dst0 = ip6->ip6_dst;
        if ((error = in6_setscope(&src0, ifp, &iszone)) != 0 ||
            (error = in6_setscope(&dst0, ifp, &idzone)) != 0) {
-               V_ip6stat.ip6s_badscope++;
+               IP6STAT_INC(ip6s_badscope);
                return (error);
        }
        for (mifp = mif6table, mifi = 0; mifi < nummifs; mifp++, mifi++) {
@@ -1555,7 +1555,7 @@ ip6_mdq(struct mbuf *m, struct ifnet *if
                                    &odzone) ||
                                    iszone != oszone ||
                                    idzone != odzone) {
-                                       V_ip6stat.ip6s_badscope++;
+                                       IP6STAT_INC(ip6s_badscope);
                                        continue;
                                }
                        }

Modified: head/sys/netinet6/ip6_output.c
==============================================================================
--- head/sys/netinet6/ip6_output.c      Tue Apr  9 06:50:11 2013        
(r249293)
+++ head/sys/netinet6/ip6_output.c      Tue Apr  9 07:11:22 2013        
(r249294)
@@ -498,16 +498,16 @@ skip_ipsec2:;
        if (IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_src) &&
            (flags & IPV6_UNSPECSRC) == 0) {
                error = EOPNOTSUPP;
-               V_ip6stat.ip6s_badscope++;
+               IP6STAT_INC(ip6s_badscope);
                goto bad;
        }
        if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_src)) {
                error = EOPNOTSUPP;
-               V_ip6stat.ip6s_badscope++;
+               IP6STAT_INC(ip6s_badscope);
                goto bad;
        }
 
-       V_ip6stat.ip6s_localout++;
+       IP6STAT_INC(ip6s_localout);
 
        /*
         * Route packet.
@@ -713,7 +713,7 @@ again:
        goto routefound;
 
   badscope:
-       V_ip6stat.ip6s_badscope++;
+       IP6STAT_INC(ip6s_badscope);
        in6_ifstat_inc(origifp, ifs6_out_discard);
        if (error == 0)
                error = EHOSTUNREACH; /* XXX */
@@ -742,7 +742,7 @@ again:
                 * Confirm that the outgoing interface supports multicast.
                 */
                if (!(ifp->if_flags & IFF_MULTICAST)) {
-                       V_ip6stat.ip6s_noroute++;
+                       IP6STAT_INC(ip6s_noroute);
                        in6_ifstat_inc(ifp, ifs6_out_discard);
                        error = ENETUNREACH;
                        goto bad;
@@ -1073,7 +1073,7 @@ passout:
                if (qslots <= 0 || ((u_int)qslots * (mtu - hlen)
                    < tlen  /* - hlen */)) {
                        error = ENOBUFS;
-                       V_ip6stat.ip6s_odropped++;
+                       IP6STAT_INC(ip6s_odropped);
                        goto bad;
                }
 
@@ -1123,7 +1123,7 @@ passout:
                        m = m_gethdr(M_NOWAIT, MT_DATA);
                        if (!m) {
                                error = ENOBUFS;
-                               V_ip6stat.ip6s_odropped++;
+                               IP6STAT_INC(ip6s_odropped);
                                goto sendorfree;
                        }
                        m->m_flags = m0->m_flags & M_COPYFLAGS; /* incl. FIB */
@@ -1135,7 +1135,7 @@ passout:
                        m->m_len = sizeof(*mhip6);
                        error = ip6_insertfraghdr(m0, m, hlen, &ip6f);
                        if (error) {
-                               V_ip6stat.ip6s_odropped++;
+                               IP6STAT_INC(ip6s_odropped);
                                goto sendorfree;
                        }
                        ip6f->ip6f_offlg = htons((u_short)((off - hlen) & ~7));
@@ -1147,7 +1147,7 @@ passout:
                            sizeof(*ip6f) - sizeof(struct ip6_hdr)));
                        if ((m_frgpart = m_copy(m0, off, len)) == 0) {
                                error = ENOBUFS;
-                               V_ip6stat.ip6s_odropped++;
+                               IP6STAT_INC(ip6s_odropped);
                                goto sendorfree;
                        }
                        m_cat(m, m_frgpart);
@@ -1156,7 +1156,7 @@ passout:
                        ip6f->ip6f_reserved = 0;
                        ip6f->ip6f_ident = id;
                        ip6f->ip6f_nxt = nextproto;
-                       V_ip6stat.ip6s_ofragments++;
+                       IP6STAT_INC(ip6s_ofragments);
                        in6_ifstat_inc(ifp, ifs6_out_fragcreat);
                }
 
@@ -1185,7 +1185,7 @@ sendorfree:
        }
 
        if (error == 0)
-               V_ip6stat.ip6s_fragmented++;
+               IP6STAT_INC(ip6s_fragmented);
 
 done:
        if (ro == &ip6route)

Modified: head/sys/netinet6/raw_ip6.c
==============================================================================
--- head/sys/netinet6/raw_ip6.c Tue Apr  9 06:50:11 2013        (r249293)
+++ head/sys/netinet6/raw_ip6.c Tue Apr  9 07:11:22 2013        (r249294)
@@ -296,7 +296,7 @@ rip6_input(struct mbuf **mp, int *offp, 
        if ((last != NULL) && ipsec6_in_reject(m, last)) {
                m_freem(m);
                V_ipsec6stat.in_polvio++;
-               V_ip6stat.ip6s_delivered--;
+               IP6STAT_DEC(ip6s_delivered);
                /* Do not inject data into pcb. */
                INP_RUNLOCK(last);
        } else
@@ -328,7 +328,7 @@ rip6_input(struct mbuf **mp, int *offp, 
                            ICMP6_PARAMPROB_NEXTHEADER,
                            prvnxtp - mtod(m, char *));
                }
-               V_ip6stat.ip6s_delivered--;
+               IP6STAT_DEC(ip6s_delivered);
        }
        return (IPPROTO_DONE);
 }

Modified: head/sys/netinet6/route6.c
==============================================================================
--- head/sys/netinet6/route6.c  Tue Apr  9 06:50:11 2013        (r249293)
+++ head/sys/netinet6/route6.c  Tue Apr  9 07:11:22 2013        (r249294)
@@ -69,7 +69,7 @@ route6_input(struct mbuf **mp, int *offp
        if (ip6a) {
                /* XXX reject home-address option before rthdr */
                if (ip6a->ip6a_flags & IP6A_SWAP) {
-                       V_ip6stat.ip6s_badoptions++;
+                       IP6STAT_INC(ip6s_badoptions);
                        m_freem(m);
                        return IPPROTO_DONE;
                }
@@ -84,7 +84,7 @@ route6_input(struct mbuf **mp, int *offp
        ip6 = mtod(m, struct ip6_hdr *);
        IP6_EXTHDR_GET(rh, struct ip6_rthdr *, m, off, sizeof(*rh));
        if (rh == NULL) {
-               V_ip6stat.ip6s_tooshort++;
+               IP6STAT_INC(ip6s_tooshort);
                return IPPROTO_DONE;
        }
 #endif
@@ -100,7 +100,7 @@ route6_input(struct mbuf **mp, int *offp
                        rhlen = (rh->ip6r_len + 1) << 3;
                        break;  /* Final dst. Just ignore the header. */
                }
-               V_ip6stat.ip6s_badoptions++;
+               IP6STAT_INC(ip6s_badoptions);
                icmp6_error(m, ICMP6_PARAM_PROB, ICMP6_PARAMPROB_HEADER,
                            (caddr_t)&rh->ip6r_type - (caddr_t)ip6);
                return (IPPROTO_DONE);

Modified: head/sys/netipsec/ipsec_input.c
==============================================================================
--- head/sys/netipsec/ipsec_input.c     Tue Apr  9 06:50:11 2013        
(r249293)
+++ head/sys/netipsec/ipsec_input.c     Tue Apr  9 07:11:22 2013        
(r249294)
@@ -768,7 +768,7 @@ ipsec6_common_input_cb(struct mbuf *m, s
        nxt = nxt8;
        while (nxt != IPPROTO_DONE) {
                if (V_ip6_hdrnestlimit && (++nest > V_ip6_hdrnestlimit)) {
-                       V_ip6stat.ip6s_toomanyhdr++;
+                       IP6STAT_INC(ip6s_toomanyhdr);
                        error = EINVAL;
                        goto bad;
                }
@@ -778,7 +778,7 @@ ipsec6_common_input_cb(struct mbuf *m, s
                 * more sanity checks in header chain processing.
                 */
                if (m->m_pkthdr.len < skip) {
-                       V_ip6stat.ip6s_tooshort++;
+                       IP6STAT_INC(ip6s_tooshort);
                        in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_truncated);
                        error = EINVAL;
                        goto bad;

Modified: head/sys/netipsec/ipsec_output.c
==============================================================================
--- head/sys/netipsec/ipsec_output.c    Tue Apr  9 06:50:11 2013        
(r249293)
+++ head/sys/netipsec/ipsec_output.c    Tue Apr  9 07:11:22 2013        
(r249294)
@@ -863,7 +863,7 @@ ipsec6_output_tunnel(struct ipsec_output
                        rtalloc_ign_fib(state->ro, 0UL, M_GETFIB(m));
                }
                if (state->ro->ro_rt == NULL) {
-                       V_ip6stat.ip6s_noroute++;
+                       IP6STAT_INC(ip6s_noroute);
                        V_ipsec6stat.ips_out_noroute++;
                        error = EHOSTUNREACH;
                        goto bad;
_______________________________________________
svn-src-all@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/svn-src-all
To unsubscribe, send any mail to "svn-src-all-unsubscr...@freebsd.org"

Reply via email to