config.c revision 254684
1/* $FreeBSD: head/usr.sbin/rtadvd/config.c 254684 2013-08-23 10:57:05Z des $ */ 2/* $KAME: config.c,v 1.84 2003/08/05 12:34:23 itojun Exp $ */ 3 4/* 5 * Copyright (C) 1998 WIDE Project. 6 * Copyright (C) 2011 Hiroki Sato <hrs@FreeBSD.org> 7 * All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 3. Neither the name of the project nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34#include <sys/param.h> 35#include <sys/ioctl.h> 36#include <sys/socket.h> 37 38#include <net/if.h> 39#include <net/if_var.h> 40#include <net/route.h> 41#include <net/if_dl.h> 42 43#include <netinet/in.h> 44#include <netinet/in_var.h> 45#include <netinet/ip6.h> 46#include <netinet6/ip6_var.h> 47#include <netinet/icmp6.h> 48#include <netinet6/nd6.h> 49 50#include <arpa/inet.h> 51 52#include <stdio.h> 53#include <syslog.h> 54#include <errno.h> 55#include <inttypes.h> 56#include <netdb.h> 57#include <string.h> 58#include <search.h> 59#include <stdlib.h> 60#include <time.h> 61#include <unistd.h> 62#include <ifaddrs.h> 63 64#include "rtadvd.h" 65#include "advcap.h" 66#include "timer.h" 67#include "if.h" 68#include "config.h" 69 70/* label of tcapcode + number + domain name + zero octet */ 71static char entbuf[10 + 3 + NI_MAXHOST + 1]; 72static char oentbuf[10 + 3 + NI_MAXHOST + 1]; 73static char abuf[DNAME_LABELENC_MAXLEN]; 74 75static time_t prefix_timo = (60 * 120); /* 2 hours. 76 * XXX: should be configurable. */ 77 78static struct rtadvd_timer *prefix_timeout(void *); 79static void makeentry(char *, size_t, int, const char *); 80static size_t dname_labelenc(char *, const char *); 81 82/* Encode domain name label encoding in RFC 1035 Section 3.1 */ 83static size_t 84dname_labelenc(char *dst, const char *src) 85{ 86 char *dst_origin; 87 char *p; 88 size_t len; 89 90 dst_origin = dst; 91 len = strlen(src); 92 93 /* Length fields per 63 octets + '\0' (<= DNAME_LABELENC_MAXLEN) */ 94 memset(dst, 0, len + len / 64 + 1 + 1); 95 96 syslog(LOG_DEBUG, "<%s> labelenc = %s", __func__, src); 97 while (src && (len = strlen(src)) != 0) { 98 /* Put a length field with 63 octet limitation first. */ 99 p = strchr(src, '.'); 100 if (p == NULL) 101 *dst++ = len = MIN(63, len); 102 else 103 *dst++ = len = MIN(63, p - src); 104 /* Copy 63 octets at most. */ 105 memcpy(dst, src, len); 106 dst += len; 107 if (p == NULL) /* the last label */ 108 break; 109 src = p + 1; 110 } 111 /* Always need a 0-length label at the tail. */ 112 *dst++ = '\0'; 113 114 syslog(LOG_DEBUG, "<%s> labellen = %td", __func__, dst - dst_origin); 115 return (dst - dst_origin); 116} 117 118#define MUSTHAVE(var, cap) \ 119 do { \ 120 int64_t t; \ 121 if ((t = agetnum(cap)) < 0) { \ 122 fprintf(stderr, "rtadvd: need %s for interface %s\n", \ 123 cap, intface); \ 124 exit(1); \ 125 } \ 126 var = t; \ 127 } while (0) 128 129#define MAYHAVE(var, cap, def) \ 130 do { \ 131 if ((var = agetnum(cap)) < 0) \ 132 var = def; \ 133 } while (0) 134 135int 136loadconfig_index(int idx) 137{ 138 char ifname[IFNAMSIZ]; 139 140 syslog(LOG_DEBUG, "<%s> enter", __func__); 141 142 if (if_indextoname(idx, ifname) != NULL) 143 return (loadconfig_ifname(ifname)); 144 else 145 return (1); 146} 147 148int 149loadconfig_ifname(char *ifname) 150{ 151 struct ifinfo *ifi; 152 153 syslog(LOG_DEBUG, "<%s> enter", __func__); 154 155 update_ifinfo(&ifilist, UPDATE_IFINFO_ALL); 156 TAILQ_FOREACH(ifi, &ifilist, ifi_next) { 157 /* NULL means all IFs will be processed. */ 158 if (ifname != NULL && 159 strcmp(ifi->ifi_ifname, ifname) != 0) 160 continue; 161 162 if (!ifi->ifi_persist) { 163 syslog(LOG_INFO, 164 "<%s> %s is not a target interface. " 165 "Ignored at this moment.", __func__, 166 ifi->ifi_ifname); 167 continue; 168 169 } 170 if (ifi->ifi_ifindex == 0) { 171 syslog(LOG_ERR, 172 "<%s> %s not found. " 173 "Ignored at this moment.", __func__, 174 ifi->ifi_ifname); 175 continue; 176 } 177 if (getconfig(ifi) == NULL) { 178 syslog(LOG_ERR, 179 "<%s> invalid configuration for %s. " 180 "Ignored at this moment.", __func__, 181 ifi->ifi_ifname); 182 continue; 183 } 184 } 185 return (0); 186} 187 188int 189rm_ifinfo_index(int idx) 190{ 191 struct ifinfo *ifi; 192 193 ifi = if_indextoifinfo(idx); 194 if (ifi == NULL) { 195 syslog(LOG_ERR, "<%s>: ifinfo not found (idx=%d)", 196 __func__, idx); 197 return (-1); 198 } 199 200 return (rm_ifinfo(ifi)); 201} 202 203int 204rm_ifinfo(struct ifinfo *ifi) 205{ 206 int error; 207 208 syslog(LOG_DEBUG, "<%s> enter (%s).", __func__, ifi->ifi_ifname); 209 switch (ifi->ifi_state) { 210 case IFI_STATE_UNCONFIGURED: 211 return (0); 212 break; 213 default: 214 ifi->ifi_state = IFI_STATE_UNCONFIGURED; 215 syslog(LOG_DEBUG, 216 "<%s> ifname=%s marked as UNCONFIGURED.", 217 __func__, ifi->ifi_ifname); 218 219 /* XXX: No MC leaving here because index is disappeared */ 220 221 /* Inactivate timer */ 222 rtadvd_remove_timer(ifi->ifi_ra_timer); 223 ifi->ifi_ra_timer = NULL; 224 break; 225 } 226 227 /* clean up ifi */ 228 if (!ifi->ifi_persist) { 229 TAILQ_REMOVE(&ifilist, ifi, ifi_next); 230 syslog(LOG_DEBUG, "<%s>: ifinfo (idx=%d) removed.", 231 __func__, ifi->ifi_ifindex); 232 free(ifi); 233 } else { 234 /* recreate an empty entry */ 235 update_persist_ifinfo(&ifilist, ifi->ifi_ifname); 236 syslog(LOG_DEBUG, "<%s>: ifname=%s is persistent.", 237 __func__, ifi->ifi_ifname); 238 } 239 240 /* clean up rai if any */ 241 switch (ifi->ifi_state) { 242 case IFI_STATE_CONFIGURED: 243 if (ifi->ifi_rainfo != NULL) { 244 error = rm_rainfo(ifi->ifi_rainfo); 245 if (error) 246 return (error); 247 ifi->ifi_rainfo = NULL; 248 } 249 break; 250 case IFI_STATE_TRANSITIVE: 251 if (ifi->ifi_rainfo == ifi->ifi_rainfo_trans) { 252 if (ifi->ifi_rainfo != NULL) { 253 error = rm_rainfo(ifi->ifi_rainfo); 254 if (error) 255 return (error); 256 ifi->ifi_rainfo = NULL; 257 ifi->ifi_rainfo_trans = NULL; 258 } 259 } else { 260 if (ifi->ifi_rainfo != NULL) { 261 error = rm_rainfo(ifi->ifi_rainfo); 262 if (error) 263 return (error); 264 ifi->ifi_rainfo = NULL; 265 } 266 if (ifi->ifi_rainfo_trans != NULL) { 267 error = rm_rainfo(ifi->ifi_rainfo_trans); 268 if (error) 269 return (error); 270 ifi->ifi_rainfo_trans = NULL; 271 } 272 } 273 } 274 275 syslog(LOG_DEBUG, "<%s> leave (%s).", __func__, ifi->ifi_ifname); 276 return (0); 277} 278 279int 280rm_rainfo(struct rainfo *rai) 281{ 282 struct prefix *pfx; 283 struct soliciter *sol; 284 struct rdnss *rdn; 285 struct rdnss_addr *rdna; 286 struct dnssl *dns; 287 struct rtinfo *rti; 288 289 syslog(LOG_DEBUG, "<%s>: enter", __func__); 290 291 TAILQ_REMOVE(&railist, rai, rai_next); 292 if (rai->rai_ifinfo != NULL) 293 syslog(LOG_DEBUG, "<%s>: rainfo (idx=%d) removed.", 294 __func__, rai->rai_ifinfo->ifi_ifindex); 295 296 if (rai->rai_ra_data != NULL) 297 free(rai->rai_ra_data); 298 299 while ((pfx = TAILQ_FIRST(&rai->rai_prefix)) != NULL) { 300 TAILQ_REMOVE(&rai->rai_prefix, pfx, pfx_next); 301 free(pfx); 302 } 303 while ((sol = TAILQ_FIRST(&rai->rai_soliciter)) != NULL) { 304 TAILQ_REMOVE(&rai->rai_soliciter, sol, sol_next); 305 free(sol); 306 } 307 while ((rdn = TAILQ_FIRST(&rai->rai_rdnss)) != NULL) { 308 TAILQ_REMOVE(&rai->rai_rdnss, rdn, rd_next); 309 while ((rdna = TAILQ_FIRST(&rdn->rd_list)) != NULL) { 310 TAILQ_REMOVE(&rdn->rd_list, rdna, ra_next); 311 free(rdna); 312 } 313 free(rdn); 314 } 315 while ((dns = TAILQ_FIRST(&rai->rai_dnssl)) != NULL) { 316 TAILQ_REMOVE(&rai->rai_dnssl, dns, dn_next); 317 free(dns); 318 } 319 while ((rti = TAILQ_FIRST(&rai->rai_route)) != NULL) { 320 TAILQ_REMOVE(&rai->rai_route, rti, rti_next); 321 free(rti); 322 } 323 free(rai); 324 syslog(LOG_DEBUG, "<%s>: leave", __func__); 325 326 return (0); 327} 328 329struct ifinfo * 330getconfig(struct ifinfo *ifi) 331{ 332 int stat, i; 333 int error; 334 char tbuf[BUFSIZ]; 335 struct rainfo *rai; 336 struct rainfo *rai_old; 337 int32_t val; 338 int64_t val64; 339 char buf[BUFSIZ]; 340 char *bp = buf; 341 char *addr, *flagstr; 342 343 if (ifi == NULL) /* if does not exist */ 344 return (NULL); 345 346 if (ifi->ifi_state == IFI_STATE_TRANSITIVE && 347 ifi->ifi_rainfo == NULL) { 348 syslog(LOG_INFO, "<%s> %s is shutting down. Skipped.", 349 __func__, ifi->ifi_ifname); 350 return (NULL); 351 } 352 353 if ((stat = agetent(tbuf, ifi->ifi_ifname)) <= 0) { 354 memset(tbuf, 0, sizeof(tbuf)); 355 syslog(LOG_INFO, 356 "<%s> %s isn't defined in the configuration file" 357 " or the configuration file doesn't exist." 358 " Treat it as default", 359 __func__, ifi->ifi_ifname); 360 } 361 362 ELM_MALLOC(rai, exit(1)); 363 TAILQ_INIT(&rai->rai_prefix); 364 TAILQ_INIT(&rai->rai_route); 365 TAILQ_INIT(&rai->rai_rdnss); 366 TAILQ_INIT(&rai->rai_dnssl); 367 TAILQ_INIT(&rai->rai_soliciter); 368 rai->rai_ifinfo = ifi; 369 370 /* gather on-link prefixes from the network interfaces. */ 371 if (agetflag("noifprefix")) 372 rai->rai_advifprefix = 0; 373 else 374 rai->rai_advifprefix = 1; 375 376 /* get interface information */ 377 if (agetflag("nolladdr")) 378 rai->rai_advlinkopt = 0; 379 else 380 rai->rai_advlinkopt = 1; 381 if (rai->rai_advlinkopt) { 382 if (ifi->ifi_sdl.sdl_type == 0) { 383 syslog(LOG_ERR, 384 "<%s> can't get information of %s", 385 __func__, ifi->ifi_ifname); 386 goto getconfig_free_rai; 387 } 388 } 389 390 /* 391 * set router configuration variables. 392 */ 393 MAYHAVE(val, "maxinterval", DEF_MAXRTRADVINTERVAL); 394 if (val < MIN_MAXINTERVAL || val > MAX_MAXINTERVAL) { 395 syslog(LOG_ERR, 396 "<%s> maxinterval (%" PRIu32 ") on %s is invalid " 397 "(must be between %u and %u)", __func__, val, 398 ifi->ifi_ifname, MIN_MAXINTERVAL, MAX_MAXINTERVAL); 399 goto getconfig_free_rai; 400 } 401 rai->rai_maxinterval = (uint16_t)val; 402 403 MAYHAVE(val, "mininterval", rai->rai_maxinterval/3); 404 if ((uint16_t)val < MIN_MININTERVAL || 405 (uint16_t)val > (rai->rai_maxinterval * 3) / 4) { 406 syslog(LOG_ERR, 407 "<%s> mininterval (%" PRIu32 ") on %s is invalid " 408 "(must be between %d and %d)", 409 __func__, val, ifi->ifi_ifname, MIN_MININTERVAL, 410 (rai->rai_maxinterval * 3) / 4); 411 goto getconfig_free_rai; 412 } 413 rai->rai_mininterval = (uint16_t)val; 414 415 MAYHAVE(val, "chlim", DEF_ADVCURHOPLIMIT); 416 rai->rai_hoplimit = val & 0xff; 417 418 if ((flagstr = (char *)agetstr("raflags", &bp))) { 419 val = 0; 420 if (strchr(flagstr, 'm')) 421 val |= ND_RA_FLAG_MANAGED; 422 if (strchr(flagstr, 'o')) 423 val |= ND_RA_FLAG_OTHER; 424 if (strchr(flagstr, 'h')) 425 val |= ND_RA_FLAG_RTPREF_HIGH; 426 if (strchr(flagstr, 'l')) { 427 if ((val & ND_RA_FLAG_RTPREF_HIGH)) { 428 syslog(LOG_ERR, "<%s> the \'h\' and \'l\'" 429 " router flags are exclusive", __func__); 430 goto getconfig_free_rai; 431 } 432 val |= ND_RA_FLAG_RTPREF_LOW; 433 } 434 } else 435 MAYHAVE(val, "raflags", 0); 436 437 rai->rai_managedflg = val & ND_RA_FLAG_MANAGED; 438 rai->rai_otherflg = val & ND_RA_FLAG_OTHER; 439#ifndef ND_RA_FLAG_RTPREF_MASK 440#define ND_RA_FLAG_RTPREF_MASK 0x18 /* 00011000 */ 441#define ND_RA_FLAG_RTPREF_RSV 0x10 /* 00010000 */ 442#endif 443 rai->rai_rtpref = val & ND_RA_FLAG_RTPREF_MASK; 444 if (rai->rai_rtpref == ND_RA_FLAG_RTPREF_RSV) { 445 syslog(LOG_ERR, "<%s> invalid router preference (%02x) on %s", 446 __func__, rai->rai_rtpref, ifi->ifi_ifname); 447 goto getconfig_free_rai; 448 } 449 450 MAYHAVE(val, "rltime", rai->rai_maxinterval * 3); 451 if ((uint16_t)val && ((uint16_t)val < rai->rai_maxinterval || 452 (uint16_t)val > MAXROUTERLIFETIME)) { 453 syslog(LOG_ERR, 454 "<%s> router lifetime (%" PRIu32 ") on %s is invalid " 455 "(must be 0 or between %d and %d)", 456 __func__, val, ifi->ifi_ifname, rai->rai_maxinterval, 457 MAXROUTERLIFETIME); 458 goto getconfig_free_rai; 459 } 460 rai->rai_lifetime = val & 0xffff; 461 462 MAYHAVE(val, "rtime", DEF_ADVREACHABLETIME); 463 if (val < 0 || val > MAXREACHABLETIME) { 464 syslog(LOG_ERR, 465 "<%s> reachable time (%" PRIu32 ") on %s is invalid " 466 "(must be no greater than %d)", 467 __func__, val, ifi->ifi_ifname, MAXREACHABLETIME); 468 goto getconfig_free_rai; 469 } 470 rai->rai_reachabletime = (uint32_t)val; 471 472 MAYHAVE(val64, "retrans", DEF_ADVRETRANSTIMER); 473 if (val64 < 0 || val64 > 0xffffffff) { 474 syslog(LOG_ERR, "<%s> retrans time (%" PRIu64 ") on %s out of range", 475 __func__, val64, ifi->ifi_ifname); 476 goto getconfig_free_rai; 477 } 478 rai->rai_retranstimer = (uint32_t)val64; 479 480 if (agetnum("hapref") != -1 || agetnum("hatime") != -1) { 481 syslog(LOG_ERR, 482 "<%s> mobile-ip6 configuration not supported", 483 __func__); 484 goto getconfig_free_rai; 485 } 486 /* prefix information */ 487 488 /* 489 * This is an implementation specific parameter to consider 490 * link propagation delays and poorly synchronized clocks when 491 * checking consistency of advertised lifetimes. 492 */ 493 MAYHAVE(val, "clockskew", 0); 494 rai->rai_clockskew = val; 495 496 rai->rai_pfxs = 0; 497 for (i = -1; i < MAXPREFIX; i++) { 498 struct prefix *pfx; 499 500 makeentry(entbuf, sizeof(entbuf), i, "addr"); 501 addr = (char *)agetstr(entbuf, &bp); 502 if (addr == NULL) 503 continue; 504 505 /* allocate memory to store prefix information */ 506 ELM_MALLOC(pfx, exit(1)); 507 pfx->pfx_rainfo = rai; 508 pfx->pfx_origin = PREFIX_FROM_CONFIG; 509 510 if (inet_pton(AF_INET6, addr, &pfx->pfx_prefix) != 1) { 511 syslog(LOG_ERR, 512 "<%s> inet_pton failed for %s", 513 __func__, addr); 514 goto getconfig_free_pfx; 515 } 516 if (IN6_IS_ADDR_MULTICAST(&pfx->pfx_prefix)) { 517 syslog(LOG_ERR, 518 "<%s> multicast prefix (%s) must " 519 "not be advertised on %s", 520 __func__, addr, ifi->ifi_ifname); 521 goto getconfig_free_pfx; 522 } 523 if (IN6_IS_ADDR_LINKLOCAL(&pfx->pfx_prefix)) 524 syslog(LOG_NOTICE, 525 "<%s> link-local prefix (%s) will be" 526 " advertised on %s", 527 __func__, addr, ifi->ifi_ifname); 528 529 makeentry(entbuf, sizeof(entbuf), i, "prefixlen"); 530 MAYHAVE(val, entbuf, 64); 531 if (val < 0 || val > 128) { 532 syslog(LOG_ERR, "<%s> prefixlen (%" PRIu32 ") for %s " 533 "on %s out of range", 534 __func__, val, addr, ifi->ifi_ifname); 535 goto getconfig_free_pfx; 536 } 537 pfx->pfx_prefixlen = (int)val; 538 539 makeentry(entbuf, sizeof(entbuf), i, "pinfoflags"); 540 if ((flagstr = (char *)agetstr(entbuf, &bp))) { 541 val = 0; 542 if (strchr(flagstr, 'l')) 543 val |= ND_OPT_PI_FLAG_ONLINK; 544 if (strchr(flagstr, 'a')) 545 val |= ND_OPT_PI_FLAG_AUTO; 546 } else { 547 MAYHAVE(val, entbuf, 548 (ND_OPT_PI_FLAG_ONLINK|ND_OPT_PI_FLAG_AUTO)); 549 } 550 pfx->pfx_onlinkflg = val & ND_OPT_PI_FLAG_ONLINK; 551 pfx->pfx_autoconfflg = val & ND_OPT_PI_FLAG_AUTO; 552 553 makeentry(entbuf, sizeof(entbuf), i, "vltime"); 554 MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME); 555 if (val64 < 0 || val64 > 0xffffffff) { 556 syslog(LOG_ERR, "<%s> vltime (%" PRIu64 ") for " 557 "%s/%d on %s is out of range", 558 __func__, val64, 559 addr, pfx->pfx_prefixlen, ifi->ifi_ifname); 560 goto getconfig_free_pfx; 561 } 562 pfx->pfx_validlifetime = (uint32_t)val64; 563 564 makeentry(entbuf, sizeof(entbuf), i, "vltimedecr"); 565 if (agetflag(entbuf)) { 566 struct timespec now; 567 568 clock_gettime(CLOCK_MONOTONIC_FAST, &now); 569 pfx->pfx_vltimeexpire = 570 now.tv_sec + pfx->pfx_validlifetime; 571 } 572 573 makeentry(entbuf, sizeof(entbuf), i, "pltime"); 574 MAYHAVE(val64, entbuf, DEF_ADVPREFERREDLIFETIME); 575 if (val64 < 0 || val64 > 0xffffffff) { 576 syslog(LOG_ERR, 577 "<%s> pltime (%" PRIu64 ") for %s/%d on %s " 578 "is out of range", 579 __func__, val64, 580 addr, pfx->pfx_prefixlen, ifi->ifi_ifname); 581 goto getconfig_free_pfx; 582 } 583 pfx->pfx_preflifetime = (uint32_t)val64; 584 585 makeentry(entbuf, sizeof(entbuf), i, "pltimedecr"); 586 if (agetflag(entbuf)) { 587 struct timespec now; 588 589 clock_gettime(CLOCK_MONOTONIC_FAST, &now); 590 pfx->pfx_pltimeexpire = 591 now.tv_sec + pfx->pfx_preflifetime; 592 } 593 /* link into chain */ 594 TAILQ_INSERT_TAIL(&rai->rai_prefix, pfx, pfx_next); 595 rai->rai_pfxs++; 596 continue; 597getconfig_free_pfx: 598 free(pfx); 599 } 600 if (rai->rai_advifprefix && rai->rai_pfxs == 0) 601 get_prefix(rai); 602 603 MAYHAVE(val64, "mtu", 0); 604 if (val < 0 || val64 > 0xffffffff) { 605 syslog(LOG_ERR, 606 "<%s> mtu (%" PRIu64 ") on %s out of range", 607 __func__, val64, ifi->ifi_ifname); 608 goto getconfig_free_rai; 609 } 610 rai->rai_linkmtu = (uint32_t)val64; 611 if (rai->rai_linkmtu == 0) { 612 char *mtustr; 613 614 if ((mtustr = (char *)agetstr("mtu", &bp)) && 615 strcmp(mtustr, "auto") == 0) 616 rai->rai_linkmtu = ifi->ifi_phymtu; 617 } 618 else if (rai->rai_linkmtu < IPV6_MMTU || 619 rai->rai_linkmtu > ifi->ifi_phymtu) { 620 syslog(LOG_ERR, 621 "<%s> advertised link mtu (%" PRIu32 ") on %s is invalid (must " 622 "be between least MTU (%d) and physical link MTU (%d)", 623 __func__, rai->rai_linkmtu, ifi->ifi_ifname, 624 IPV6_MMTU, ifi->ifi_phymtu); 625 goto getconfig_free_rai; 626 } 627 628#ifdef SIOCSIFINFO_IN6 629 { 630 struct in6_ndireq ndi; 631 int s; 632 633 if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) { 634 syslog(LOG_ERR, "<%s> socket: %s", __func__, 635 strerror(errno)); 636 exit(1); 637 } 638 memset(&ndi, 0, sizeof(ndi)); 639 strncpy(ndi.ifname, ifi->ifi_ifname, sizeof(ndi.ifname)); 640 if (ioctl(s, SIOCGIFINFO_IN6, (caddr_t)&ndi) < 0) 641 syslog(LOG_INFO, "<%s> ioctl:SIOCGIFINFO_IN6 at %s: %s", 642 __func__, ifi->ifi_ifname, strerror(errno)); 643 644 /* reflect the RA info to the host variables in kernel */ 645 ndi.ndi.chlim = rai->rai_hoplimit; 646 ndi.ndi.retrans = rai->rai_retranstimer; 647 ndi.ndi.basereachable = rai->rai_reachabletime; 648 if (ioctl(s, SIOCSIFINFO_IN6, (caddr_t)&ndi) < 0) 649 syslog(LOG_INFO, "<%s> ioctl:SIOCSIFINFO_IN6 at %s: %s", 650 __func__, ifi->ifi_ifname, strerror(errno)); 651 652 close(s); 653 } 654#endif 655 656 /* route information */ 657 rai->rai_routes = 0; 658 for (i = -1; i < MAXROUTE; i++) { 659 struct rtinfo *rti; 660 661 makeentry(entbuf, sizeof(entbuf), i, "rtprefix"); 662 addr = (char *)agetstr(entbuf, &bp); 663 if (addr == NULL) { 664 makeentry(oentbuf, sizeof(oentbuf), i, "rtrprefix"); 665 addr = (char *)agetstr(oentbuf, &bp); 666 if (addr) 667 fprintf(stderr, "%s was obsoleted. Use %s.\n", 668 oentbuf, entbuf); 669 } 670 if (addr == NULL) 671 continue; 672 673 /* allocate memory to store prefix information */ 674 ELM_MALLOC(rti, exit(1)); 675 676 if (inet_pton(AF_INET6, addr, &rti->rti_prefix) != 1) { 677 syslog(LOG_ERR, "<%s> inet_pton failed for %s", 678 __func__, addr); 679 goto getconfig_free_rti; 680 } 681#if 0 682 /* 683 * XXX: currently there's no restriction in route information 684 * prefix according to 685 * draft-ietf-ipngwg-router-selection-00.txt. 686 * However, I think the similar restriction be necessary. 687 */ 688 MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME); 689 if (IN6_IS_ADDR_MULTICAST(&rti->prefix)) { 690 syslog(LOG_ERR, 691 "<%s> multicast route (%s) must " 692 "not be advertised on %s", 693 __func__, addr, ifi->ifi_ifname); 694 goto getconfig_free_rti; 695 } 696 if (IN6_IS_ADDR_LINKLOCAL(&rti->prefix)) { 697 syslog(LOG_NOTICE, 698 "<%s> link-local route (%s) will " 699 "be advertised on %s", 700 __func__, addr, ifi->ifi_ifname); 701 goto getconfig_free_rti; 702 } 703#endif 704 705 makeentry(entbuf, sizeof(entbuf), i, "rtplen"); 706 /* XXX: 256 is a magic number for compatibility check. */ 707 MAYHAVE(val, entbuf, 256); 708 if (val == 256) { 709 makeentry(oentbuf, sizeof(oentbuf), i, "rtrplen"); 710 MAYHAVE(val, oentbuf, 256); 711 if (val != 256) 712 fprintf(stderr, "%s was obsoleted. Use %s.\n", 713 oentbuf, entbuf); 714 else 715 val = 64; 716 } 717 if (val < 0 || val > 128) { 718 syslog(LOG_ERR, "<%s> prefixlen (%" PRIu32 ") for %s on %s " 719 "out of range", 720 __func__, val, addr, ifi->ifi_ifname); 721 goto getconfig_free_rti; 722 } 723 rti->rti_prefixlen = (int)val; 724 725 makeentry(entbuf, sizeof(entbuf), i, "rtflags"); 726 if ((flagstr = (char *)agetstr(entbuf, &bp))) { 727 val = 0; 728 if (strchr(flagstr, 'h')) 729 val |= ND_RA_FLAG_RTPREF_HIGH; 730 if (strchr(flagstr, 'l')) { 731 if ((val & ND_RA_FLAG_RTPREF_HIGH)) { 732 syslog(LOG_ERR, 733 "<%s> the \'h\' and \'l\' route" 734 " preferences are exclusive", 735 __func__); 736 goto getconfig_free_rti; 737 } 738 val |= ND_RA_FLAG_RTPREF_LOW; 739 } 740 } else 741 MAYHAVE(val, entbuf, 256); /* XXX */ 742 if (val == 256) { 743 makeentry(oentbuf, sizeof(oentbuf), i, "rtrflags"); 744 MAYHAVE(val, oentbuf, 256); 745 if (val != 256) { 746 fprintf(stderr, "%s was obsoleted. Use %s.\n", 747 oentbuf, entbuf); 748 } else 749 val = 0; 750 } 751 rti->rti_rtpref = val & ND_RA_FLAG_RTPREF_MASK; 752 if (rti->rti_rtpref == ND_RA_FLAG_RTPREF_RSV) { 753 syslog(LOG_ERR, "<%s> invalid route preference (%02x) " 754 "for %s/%d on %s", 755 __func__, rti->rti_rtpref, addr, 756 rti->rti_prefixlen, ifi->ifi_ifname); 757 goto getconfig_free_rti; 758 } 759 760 /* 761 * Since the spec does not a default value, we should make 762 * this entry mandatory. However, FreeBSD 4.4 has shipped 763 * with this field being optional, we use the router lifetime 764 * as an ad-hoc default value with a warning message. 765 */ 766 makeentry(entbuf, sizeof(entbuf), i, "rtltime"); 767 MAYHAVE(val64, entbuf, -1); 768 if (val64 == -1) { 769 makeentry(oentbuf, sizeof(oentbuf), i, "rtrltime"); 770 MAYHAVE(val64, oentbuf, -1); 771 if (val64 != -1) 772 fprintf(stderr, "%s was obsoleted. Use %s.\n", 773 oentbuf, entbuf); 774 else { 775 fprintf(stderr, "%s should be specified " 776 "for interface %s.\n", entbuf, 777 ifi->ifi_ifname); 778 val64 = rai->rai_lifetime; 779 } 780 } 781 if (val64 < 0 || val64 > 0xffffffff) { 782 syslog(LOG_ERR, "<%s> route lifetime (%" PRIu64 ") for " 783 "%s/%d on %s out of range", __func__, 784 val64, addr, rti->rti_prefixlen, 785 ifi->ifi_ifname); 786 goto getconfig_free_rti; 787 } 788 rti->rti_ltime = (uint32_t)val64; 789 790 /* link into chain */ 791 TAILQ_INSERT_TAIL(&rai->rai_route, rti, rti_next); 792 rai->rai_routes++; 793 continue; 794getconfig_free_rti: 795 free(rti); 796 } 797 798 /* DNS server and DNS search list information */ 799 for (i = -1; i < MAXRDNSSENT ; i++) { 800 struct rdnss *rdn; 801 struct rdnss_addr *rdna; 802 char *ap; 803 int c; 804 805 makeentry(entbuf, sizeof(entbuf), i, "rdnss"); 806 addr = (char *)agetstr(entbuf, &bp); 807 if (addr == NULL) 808 break; 809 ELM_MALLOC(rdn, exit(1)); 810 811 TAILQ_INIT(&rdn->rd_list); 812 813 for (ap = addr; ap - addr < (ssize_t)strlen(addr); ap += c+1) { 814 c = strcspn(ap, ","); 815 strncpy(abuf, ap, c); 816 abuf[c] = '\0'; 817 ELM_MALLOC(rdna, goto getconfig_free_rdn); 818 if (inet_pton(AF_INET6, abuf, &rdna->ra_dns) != 1) { 819 syslog(LOG_ERR, "<%s> inet_pton failed for %s", 820 __func__, abuf); 821 free(rdna); 822 goto getconfig_free_rdn; 823 } 824 TAILQ_INSERT_TAIL(&rdn->rd_list, rdna, ra_next); 825 } 826 827 makeentry(entbuf, sizeof(entbuf), i, "rdnssltime"); 828 MAYHAVE(val, entbuf, (rai->rai_maxinterval * 3 / 2)); 829 if ((uint16_t)val < rai->rai_maxinterval || 830 (uint16_t)val > rai->rai_maxinterval * 2) { 831 syslog(LOG_ERR, "%s (%" PRIu16 ") on %s is invalid " 832 "(must be between %d and %d)", 833 entbuf, val, ifi->ifi_ifname, rai->rai_maxinterval, 834 rai->rai_maxinterval * 2); 835 goto getconfig_free_rdn; 836 } 837 rdn->rd_ltime = val; 838 839 /* link into chain */ 840 TAILQ_INSERT_TAIL(&rai->rai_rdnss, rdn, rd_next); 841 continue; 842getconfig_free_rdn: 843 while ((rdna = TAILQ_FIRST(&rdn->rd_list)) != NULL) { 844 TAILQ_REMOVE(&rdn->rd_list, rdna, ra_next); 845 free(rdna); 846 } 847 free(rdn); 848 } 849 850 for (i = -1; i < MAXDNSSLENT ; i++) { 851 struct dnssl *dns; 852 struct dnssl_addr *dnsa; 853 char *ap; 854 int c; 855 856 makeentry(entbuf, sizeof(entbuf), i, "dnssl"); 857 addr = (char *)agetstr(entbuf, &bp); 858 if (addr == NULL) 859 break; 860 861 ELM_MALLOC(dns, exit(1)); 862 863 TAILQ_INIT(&dns->dn_list); 864 865 for (ap = addr; ap - addr < (ssize_t)strlen(addr); ap += c+1) { 866 c = strcspn(ap, ","); 867 strncpy(abuf, ap, c); 868 abuf[c] = '\0'; 869 ELM_MALLOC(dnsa, goto getconfig_free_dns); 870 dnsa->da_len = dname_labelenc(dnsa->da_dom, abuf); 871 syslog(LOG_DEBUG, "<%s>: dnsa->da_len = %d", __func__, 872 dnsa->da_len); 873 TAILQ_INSERT_TAIL(&dns->dn_list, dnsa, da_next); 874 } 875 876 makeentry(entbuf, sizeof(entbuf), i, "dnsslltime"); 877 MAYHAVE(val, entbuf, (rai->rai_maxinterval * 3 / 2)); 878 if ((uint16_t)val < rai->rai_maxinterval || 879 (uint16_t)val > rai->rai_maxinterval * 2) { 880 syslog(LOG_ERR, "%s (%" PRIu16 ") on %s is invalid " 881 "(must be between %d and %d)", 882 entbuf, val, ifi->ifi_ifname, rai->rai_maxinterval, 883 rai->rai_maxinterval * 2); 884 goto getconfig_free_dns; 885 } 886 dns->dn_ltime = val; 887 888 /* link into chain */ 889 TAILQ_INSERT_TAIL(&rai->rai_dnssl, dns, dn_next); 890 continue; 891getconfig_free_dns: 892 while ((dnsa = TAILQ_FIRST(&dns->dn_list)) != NULL) { 893 TAILQ_REMOVE(&dns->dn_list, dnsa, da_next); 894 free(dnsa); 895 } 896 free(dns); 897 } 898 /* construct the sending packet */ 899 make_packet(rai); 900 901 /* 902 * If an entry with the same ifindex exists, remove it first. 903 * Before the removal, RDNSS and DNSSL options with 904 * zero-lifetime will be sent. 905 */ 906 switch (ifi->ifi_state) { 907 case IFI_STATE_UNCONFIGURED: 908 /* UNCONFIGURED -> TRANSITIVE */ 909 910 error = sock_mc_join(&sock, ifi->ifi_ifindex); 911 if (error) 912 exit(1); 913 914 ifi->ifi_state = IFI_STATE_TRANSITIVE; 915 ifi->ifi_burstcount = MAX_INITIAL_RTR_ADVERTISEMENTS; 916 ifi->ifi_burstinterval = MAX_INITIAL_RTR_ADVERT_INTERVAL; 917 918 /* The same two rai mean initial burst */ 919 ifi->ifi_rainfo = rai; 920 ifi->ifi_rainfo_trans = rai; 921 TAILQ_INSERT_TAIL(&railist, rai, rai_next); 922 923 if (ifi->ifi_ra_timer == NULL) 924 ifi->ifi_ra_timer = rtadvd_add_timer(ra_timeout, 925 ra_timer_update, ifi, ifi); 926 ra_timer_update(ifi, &ifi->ifi_ra_timer->rat_tm); 927 rtadvd_set_timer(&ifi->ifi_ra_timer->rat_tm, 928 ifi->ifi_ra_timer); 929 930 syslog(LOG_DEBUG, 931 "<%s> ifname=%s marked as TRANSITIVE (initial burst).", 932 __func__, ifi->ifi_ifname); 933 break; 934 case IFI_STATE_CONFIGURED: 935 /* CONFIGURED -> TRANSITIVE */ 936 rai_old = ifi->ifi_rainfo; 937 if (rai_old == NULL) { 938 syslog(LOG_ERR, 939 "<%s> ifi_rainfo is NULL" 940 " in IFI_STATE_CONFIGURED.", __func__); 941 ifi = NULL; 942 break; 943 } else { 944 struct rdnss *rdn; 945 struct dnssl *dns; 946 947 rai_old->rai_lifetime = 0; 948 TAILQ_FOREACH(rdn, &rai_old->rai_rdnss, rd_next) 949 rdn->rd_ltime = 0; 950 TAILQ_FOREACH(dns, &rai_old->rai_dnssl, dn_next) 951 dns->dn_ltime = 0; 952 953 ifi->ifi_rainfo_trans = rai_old; 954 ifi->ifi_state = IFI_STATE_TRANSITIVE; 955 ifi->ifi_burstcount = MAX_FINAL_RTR_ADVERTISEMENTS; 956 ifi->ifi_burstinterval = MIN_DELAY_BETWEEN_RAS; 957 958 ra_timer_update(ifi, &ifi->ifi_ra_timer->rat_tm); 959 rtadvd_set_timer(&ifi->ifi_ra_timer->rat_tm, 960 ifi->ifi_ra_timer); 961 962 syslog(LOG_DEBUG, 963 "<%s> ifname=%s marked as TRANSITIVE" 964 " (transitional burst)", 965 __func__, ifi->ifi_ifname); 966 } 967 ifi->ifi_rainfo = rai; 968 TAILQ_INSERT_TAIL(&railist, rai, rai_next); 969 break; 970 case IFI_STATE_TRANSITIVE: 971 if (ifi->ifi_rainfo != NULL) { 972 if (ifi->ifi_rainfo == ifi->ifi_rainfo_trans) { 973 /* Reinitialize initial burst */ 974 rm_rainfo(ifi->ifi_rainfo); 975 ifi->ifi_rainfo = rai; 976 ifi->ifi_rainfo_trans = rai; 977 ifi->ifi_burstcount = 978 MAX_INITIAL_RTR_ADVERTISEMENTS; 979 ifi->ifi_burstinterval = 980 MAX_INITIAL_RTR_ADVERT_INTERVAL; 981 } else { 982 /* Replace ifi_rainfo with the new one */ 983 rm_rainfo(ifi->ifi_rainfo); 984 ifi->ifi_rainfo = rai; 985 } 986 TAILQ_INSERT_TAIL(&railist, rai, rai_next); 987 988 ra_timer_update(ifi, &ifi->ifi_ra_timer->rat_tm); 989 rtadvd_set_timer(&ifi->ifi_ra_timer->rat_tm, 990 ifi->ifi_ra_timer); 991 } else { 992 /* XXX: NOTREACHED. Being shut down. */ 993 syslog(LOG_ERR, 994 "<%s> %s is shutting down. Skipped.", 995 __func__, ifi->ifi_ifname); 996 rm_rainfo(rai); 997 998 return (NULL); 999 } 1000 break; 1001 } 1002 1003 return (ifi); 1004 1005getconfig_free_rai: 1006 free(rai); 1007 return (NULL); 1008} 1009 1010void 1011get_prefix(struct rainfo *rai) 1012{ 1013 struct ifaddrs *ifap, *ifa; 1014 struct prefix *pfx; 1015 struct in6_addr *a; 1016 struct ifinfo *ifi; 1017 char *p, *ep, *m, *lim; 1018 char ntopbuf[INET6_ADDRSTRLEN]; 1019 1020 if (getifaddrs(&ifap) < 0) { 1021 syslog(LOG_ERR, 1022 "<%s> can't get interface addresses", 1023 __func__); 1024 exit(1); 1025 } 1026 ifi = rai->rai_ifinfo; 1027 1028 for (ifa = ifap; ifa; ifa = ifa->ifa_next) { 1029 int plen; 1030 1031 if (strcmp(ifa->ifa_name, ifi->ifi_ifname) != 0) 1032 continue; 1033 if (ifa->ifa_addr->sa_family != AF_INET6) 1034 continue; 1035 a = &((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_addr; 1036 if (IN6_IS_ADDR_LINKLOCAL(a)) 1037 continue; 1038 1039 /* get prefix length */ 1040 m = (char *)&((struct sockaddr_in6 *)ifa->ifa_netmask)->sin6_addr; 1041 lim = (char *)(ifa->ifa_netmask) + ifa->ifa_netmask->sa_len; 1042 plen = prefixlen(m, lim); 1043 if (plen <= 0 || plen > 128) { 1044 syslog(LOG_ERR, "<%s> failed to get prefixlen " 1045 "or prefix is invalid", 1046 __func__); 1047 exit(1); 1048 } 1049 if (plen == 128) /* XXX */ 1050 continue; 1051 if (find_prefix(rai, a, plen)) { 1052 /* ignore a duplicated prefix. */ 1053 continue; 1054 } 1055 1056 /* allocate memory to store prefix info. */ 1057 ELM_MALLOC(pfx, exit(1)); 1058 1059 /* set prefix, sweep bits outside of prefixlen */ 1060 pfx->pfx_prefixlen = plen; 1061 memcpy(&pfx->pfx_prefix, a, sizeof(*a)); 1062 p = (char *)&pfx->pfx_prefix; 1063 ep = (char *)(&pfx->pfx_prefix + 1); 1064 while (m < lim && p < ep) 1065 *p++ &= *m++; 1066 while (p < ep) 1067 *p++ = 0x00; 1068 if (!inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf, 1069 sizeof(ntopbuf))) { 1070 syslog(LOG_ERR, "<%s> inet_ntop failed", __func__); 1071 exit(1); 1072 } 1073 syslog(LOG_DEBUG, 1074 "<%s> add %s/%d to prefix list on %s", 1075 __func__, ntopbuf, pfx->pfx_prefixlen, ifi->ifi_ifname); 1076 1077 /* set other fields with protocol defaults */ 1078 pfx->pfx_validlifetime = DEF_ADVVALIDLIFETIME; 1079 pfx->pfx_preflifetime = DEF_ADVPREFERREDLIFETIME; 1080 pfx->pfx_onlinkflg = 1; 1081 pfx->pfx_autoconfflg = 1; 1082 pfx->pfx_origin = PREFIX_FROM_KERNEL; 1083 pfx->pfx_rainfo = rai; 1084 1085 /* link into chain */ 1086 TAILQ_INSERT_TAIL(&rai->rai_prefix, pfx, pfx_next); 1087 1088 /* counter increment */ 1089 rai->rai_pfxs++; 1090 } 1091 1092 freeifaddrs(ifap); 1093} 1094 1095static void 1096makeentry(char *buf, size_t len, int id, const char *string) 1097{ 1098 1099 if (id < 0) 1100 strlcpy(buf, string, len); 1101 else 1102 snprintf(buf, len, "%s%d", string, id); 1103} 1104 1105/* 1106 * Add a prefix to the list of specified interface and reconstruct 1107 * the outgoing packet. 1108 * The prefix must not be in the list. 1109 * XXX: other parameters of the prefix (e.g. lifetime) should be 1110 * able to be specified. 1111 */ 1112static void 1113add_prefix(struct rainfo *rai, struct in6_prefixreq *ipr) 1114{ 1115 struct prefix *pfx; 1116 struct ifinfo *ifi; 1117 char ntopbuf[INET6_ADDRSTRLEN]; 1118 1119 ifi = rai->rai_ifinfo; 1120 ELM_MALLOC(pfx, return); 1121 pfx->pfx_prefix = ipr->ipr_prefix.sin6_addr; 1122 pfx->pfx_prefixlen = ipr->ipr_plen; 1123 pfx->pfx_validlifetime = ipr->ipr_vltime; 1124 pfx->pfx_preflifetime = ipr->ipr_pltime; 1125 pfx->pfx_onlinkflg = ipr->ipr_raf_onlink; 1126 pfx->pfx_autoconfflg = ipr->ipr_raf_auto; 1127 pfx->pfx_origin = PREFIX_FROM_DYNAMIC; 1128 pfx->pfx_rainfo = rai; 1129 1130 TAILQ_INSERT_TAIL(&rai->rai_prefix, pfx, pfx_next); 1131 1132 syslog(LOG_DEBUG, "<%s> new prefix %s/%d was added on %s", 1133 __func__, 1134 inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr, ntopbuf, 1135 sizeof(ntopbuf)), ipr->ipr_plen, ifi->ifi_ifname); 1136 1137 rai->rai_pfxs++; 1138} 1139 1140/* 1141 * Delete a prefix to the list of specified interface and reconstruct 1142 * the outgoing packet. 1143 * The prefix must be in the list. 1144 */ 1145void 1146delete_prefix(struct prefix *pfx) 1147{ 1148 struct rainfo *rai; 1149 struct ifinfo *ifi; 1150 char ntopbuf[INET6_ADDRSTRLEN]; 1151 1152 rai = pfx->pfx_rainfo; 1153 ifi = rai->rai_ifinfo; 1154 TAILQ_REMOVE(&rai->rai_prefix, pfx, pfx_next); 1155 syslog(LOG_DEBUG, "<%s> prefix %s/%d was deleted on %s", 1156 __func__, 1157 inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf, 1158 sizeof(ntopbuf)), pfx->pfx_prefixlen, ifi->ifi_ifname); 1159 if (pfx->pfx_timer) 1160 rtadvd_remove_timer(pfx->pfx_timer); 1161 free(pfx); 1162 1163 rai->rai_pfxs--; 1164} 1165 1166void 1167invalidate_prefix(struct prefix *pfx) 1168{ 1169 struct timespec timo; 1170 struct rainfo *rai; 1171 struct ifinfo *ifi; 1172 char ntopbuf[INET6_ADDRSTRLEN]; 1173 1174 rai = pfx->pfx_rainfo; 1175 ifi = rai->rai_ifinfo; 1176 if (pfx->pfx_timer) { /* sanity check */ 1177 syslog(LOG_ERR, 1178 "<%s> assumption failure: timer already exists", 1179 __func__); 1180 exit(1); 1181 } 1182 1183 syslog(LOG_DEBUG, "<%s> prefix %s/%d was invalidated on %s, " 1184 "will expire in %ld seconds", __func__, 1185 inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf, sizeof(ntopbuf)), 1186 pfx->pfx_prefixlen, ifi->ifi_ifname, (long)prefix_timo); 1187 1188 /* set the expiration timer */ 1189 pfx->pfx_timer = rtadvd_add_timer(prefix_timeout, NULL, pfx, NULL); 1190 if (pfx->pfx_timer == NULL) { 1191 syslog(LOG_ERR, "<%s> failed to add a timer for a prefix. " 1192 "remove the prefix", __func__); 1193 delete_prefix(pfx); 1194 } 1195 timo.tv_sec = prefix_timo; 1196 timo.tv_nsec = 0; 1197 rtadvd_set_timer(&timo, pfx->pfx_timer); 1198} 1199 1200static struct rtadvd_timer * 1201prefix_timeout(void *arg) 1202{ 1203 1204 delete_prefix((struct prefix *)arg); 1205 1206 return (NULL); 1207} 1208 1209void 1210update_prefix(struct prefix *pfx) 1211{ 1212 struct rainfo *rai; 1213 struct ifinfo *ifi; 1214 char ntopbuf[INET6_ADDRSTRLEN]; 1215 1216 rai = pfx->pfx_rainfo; 1217 ifi = rai->rai_ifinfo; 1218 if (pfx->pfx_timer == NULL) { /* sanity check */ 1219 syslog(LOG_ERR, 1220 "<%s> assumption failure: timer does not exist", 1221 __func__); 1222 exit(1); 1223 } 1224 1225 syslog(LOG_DEBUG, "<%s> prefix %s/%d was re-enabled on %s", 1226 __func__, inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf, 1227 sizeof(ntopbuf)), pfx->pfx_prefixlen, ifi->ifi_ifname); 1228 1229 /* stop the expiration timer */ 1230 rtadvd_remove_timer(pfx->pfx_timer); 1231 pfx->pfx_timer = NULL; 1232} 1233 1234/* 1235 * Try to get an in6_prefixreq contents for a prefix which matches 1236 * ipr->ipr_prefix and ipr->ipr_plen and belongs to 1237 * the interface whose name is ipr->ipr_name[]. 1238 */ 1239static int 1240init_prefix(struct in6_prefixreq *ipr) 1241{ 1242#if 0 1243 int s; 1244 1245 if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) { 1246 syslog(LOG_ERR, "<%s> socket: %s", __func__, 1247 strerror(errno)); 1248 exit(1); 1249 } 1250 1251 if (ioctl(s, SIOCGIFPREFIX_IN6, (caddr_t)ipr) < 0) { 1252 syslog(LOG_INFO, "<%s> ioctl:SIOCGIFPREFIX %s", __func__, 1253 strerror(errno)); 1254 1255 ipr->ipr_vltime = DEF_ADVVALIDLIFETIME; 1256 ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME; 1257 ipr->ipr_raf_onlink = 1; 1258 ipr->ipr_raf_auto = 1; 1259 /* omit other field initialization */ 1260 } 1261 else if (ipr->ipr_origin < PR_ORIG_RR) { 1262 char ntopbuf[INET6_ADDRSTRLEN]; 1263 1264 syslog(LOG_WARNING, "<%s> Added prefix(%s)'s origin %d is" 1265 "lower than PR_ORIG_RR(router renumbering)." 1266 "This should not happen if I am router", __func__, 1267 inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr, ntopbuf, 1268 sizeof(ntopbuf)), ipr->ipr_origin); 1269 close(s); 1270 return (1); 1271 } 1272 1273 close(s); 1274 return (0); 1275#else 1276 ipr->ipr_vltime = DEF_ADVVALIDLIFETIME; 1277 ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME; 1278 ipr->ipr_raf_onlink = 1; 1279 ipr->ipr_raf_auto = 1; 1280 return (0); 1281#endif 1282} 1283 1284void 1285make_prefix(struct rainfo *rai, int ifindex, struct in6_addr *addr, int plen) 1286{ 1287 struct in6_prefixreq ipr; 1288 1289 memset(&ipr, 0, sizeof(ipr)); 1290 if (if_indextoname(ifindex, ipr.ipr_name) == NULL) { 1291 syslog(LOG_ERR, "<%s> Prefix added interface No.%d doesn't " 1292 "exist. This should not happen! %s", __func__, 1293 ifindex, strerror(errno)); 1294 exit(1); 1295 } 1296 ipr.ipr_prefix.sin6_len = sizeof(ipr.ipr_prefix); 1297 ipr.ipr_prefix.sin6_family = AF_INET6; 1298 ipr.ipr_prefix.sin6_addr = *addr; 1299 ipr.ipr_plen = plen; 1300 1301 if (init_prefix(&ipr)) 1302 return; /* init failed by some error */ 1303 add_prefix(rai, &ipr); 1304} 1305 1306void 1307make_packet(struct rainfo *rai) 1308{ 1309 size_t packlen, lladdroptlen = 0; 1310 char *buf; 1311 struct nd_router_advert *ra; 1312 struct nd_opt_prefix_info *ndopt_pi; 1313 struct nd_opt_mtu *ndopt_mtu; 1314 struct nd_opt_route_info *ndopt_rti; 1315 struct rtinfo *rti; 1316 struct nd_opt_rdnss *ndopt_rdnss; 1317 struct rdnss *rdn; 1318 struct nd_opt_dnssl *ndopt_dnssl; 1319 struct dnssl *dns; 1320 size_t len; 1321 struct prefix *pfx; 1322 struct ifinfo *ifi; 1323 1324 ifi = rai->rai_ifinfo; 1325 /* calculate total length */ 1326 packlen = sizeof(struct nd_router_advert); 1327 if (rai->rai_advlinkopt) { 1328 if ((lladdroptlen = lladdropt_length(&ifi->ifi_sdl)) == 0) { 1329 syslog(LOG_INFO, 1330 "<%s> link-layer address option has" 1331 " null length on %s. Treat as not included.", 1332 __func__, ifi->ifi_ifname); 1333 rai->rai_advlinkopt = 0; 1334 } 1335 packlen += lladdroptlen; 1336 } 1337 if (rai->rai_pfxs) 1338 packlen += sizeof(struct nd_opt_prefix_info) * rai->rai_pfxs; 1339 if (rai->rai_linkmtu) 1340 packlen += sizeof(struct nd_opt_mtu); 1341 1342 TAILQ_FOREACH(rti, &rai->rai_route, rti_next) 1343 packlen += sizeof(struct nd_opt_route_info) + 1344 ((rti->rti_prefixlen + 0x3f) >> 6) * 8; 1345 1346 TAILQ_FOREACH(rdn, &rai->rai_rdnss, rd_next) { 1347 struct rdnss_addr *rdna; 1348 1349 packlen += sizeof(struct nd_opt_rdnss); 1350 TAILQ_FOREACH(rdna, &rdn->rd_list, ra_next) 1351 packlen += sizeof(rdna->ra_dns); 1352 } 1353 TAILQ_FOREACH(dns, &rai->rai_dnssl, dn_next) { 1354 struct dnssl_addr *dnsa; 1355 1356 packlen += sizeof(struct nd_opt_dnssl); 1357 len = 0; 1358 TAILQ_FOREACH(dnsa, &dns->dn_list, da_next) 1359 len += dnsa->da_len; 1360 1361 /* A zero octet and 8 octet boundary */ 1362 len++; 1363 len += (len % 8) ? 8 - len % 8 : 0; 1364 1365 packlen += len; 1366 } 1367 /* allocate memory for the packet */ 1368 if ((buf = malloc(packlen)) == NULL) { 1369 syslog(LOG_ERR, 1370 "<%s> can't get enough memory for an RA packet", 1371 __func__); 1372 exit(1); 1373 } 1374 memset(buf, 0, packlen); 1375 if (rai->rai_ra_data) /* Free old data if any. */ 1376 free(rai->rai_ra_data); 1377 rai->rai_ra_data = buf; 1378 /* XXX: what if packlen > 576? */ 1379 rai->rai_ra_datalen = packlen; 1380 1381 /* 1382 * construct the packet 1383 */ 1384 ra = (struct nd_router_advert *)buf; 1385 ra->nd_ra_type = ND_ROUTER_ADVERT; 1386 ra->nd_ra_code = 0; 1387 ra->nd_ra_cksum = 0; 1388 ra->nd_ra_curhoplimit = (uint8_t)(0xff & rai->rai_hoplimit); 1389 ra->nd_ra_flags_reserved = 0; /* just in case */ 1390 /* 1391 * XXX: the router preference field, which is a 2-bit field, should be 1392 * initialized before other fields. 1393 */ 1394 ra->nd_ra_flags_reserved = 0xff & rai->rai_rtpref; 1395 ra->nd_ra_flags_reserved |= 1396 rai->rai_managedflg ? ND_RA_FLAG_MANAGED : 0; 1397 ra->nd_ra_flags_reserved |= 1398 rai->rai_otherflg ? ND_RA_FLAG_OTHER : 0; 1399 ra->nd_ra_router_lifetime = htons(rai->rai_lifetime); 1400 ra->nd_ra_reachable = htonl(rai->rai_reachabletime); 1401 ra->nd_ra_retransmit = htonl(rai->rai_retranstimer); 1402 buf += sizeof(*ra); 1403 1404 if (rai->rai_advlinkopt) { 1405 lladdropt_fill(&ifi->ifi_sdl, (struct nd_opt_hdr *)buf); 1406 buf += lladdroptlen; 1407 } 1408 1409 if (rai->rai_linkmtu) { 1410 ndopt_mtu = (struct nd_opt_mtu *)buf; 1411 ndopt_mtu->nd_opt_mtu_type = ND_OPT_MTU; 1412 ndopt_mtu->nd_opt_mtu_len = 1; 1413 ndopt_mtu->nd_opt_mtu_reserved = 0; 1414 ndopt_mtu->nd_opt_mtu_mtu = htonl(rai->rai_linkmtu); 1415 buf += sizeof(struct nd_opt_mtu); 1416 } 1417 1418 TAILQ_FOREACH(pfx, &rai->rai_prefix, pfx_next) { 1419 uint32_t vltime, pltime; 1420 struct timespec now; 1421 1422 ndopt_pi = (struct nd_opt_prefix_info *)buf; 1423 ndopt_pi->nd_opt_pi_type = ND_OPT_PREFIX_INFORMATION; 1424 ndopt_pi->nd_opt_pi_len = 4; 1425 ndopt_pi->nd_opt_pi_prefix_len = pfx->pfx_prefixlen; 1426 ndopt_pi->nd_opt_pi_flags_reserved = 0; 1427 if (pfx->pfx_onlinkflg) 1428 ndopt_pi->nd_opt_pi_flags_reserved |= 1429 ND_OPT_PI_FLAG_ONLINK; 1430 if (pfx->pfx_autoconfflg) 1431 ndopt_pi->nd_opt_pi_flags_reserved |= 1432 ND_OPT_PI_FLAG_AUTO; 1433 if (pfx->pfx_timer) 1434 vltime = 0; 1435 else { 1436 if (pfx->pfx_vltimeexpire || pfx->pfx_pltimeexpire) 1437 clock_gettime(CLOCK_MONOTONIC_FAST, &now); 1438 if (pfx->pfx_vltimeexpire == 0) 1439 vltime = pfx->pfx_validlifetime; 1440 else 1441 vltime = ((time_t)pfx->pfx_vltimeexpire > now.tv_sec) ? 1442 pfx->pfx_vltimeexpire - now.tv_sec : 0; 1443 } 1444 if (pfx->pfx_timer) 1445 pltime = 0; 1446 else { 1447 if (pfx->pfx_pltimeexpire == 0) 1448 pltime = pfx->pfx_preflifetime; 1449 else 1450 pltime = ((time_t)pfx->pfx_pltimeexpire > now.tv_sec) ? 1451 pfx->pfx_pltimeexpire - now.tv_sec : 0; 1452 } 1453 if (vltime < pltime) { 1454 /* 1455 * this can happen if vltime is decrement but pltime 1456 * is not. 1457 */ 1458 pltime = vltime; 1459 } 1460 ndopt_pi->nd_opt_pi_valid_time = htonl(vltime); 1461 ndopt_pi->nd_opt_pi_preferred_time = htonl(pltime); 1462 ndopt_pi->nd_opt_pi_reserved2 = 0; 1463 ndopt_pi->nd_opt_pi_prefix = pfx->pfx_prefix; 1464 1465 buf += sizeof(struct nd_opt_prefix_info); 1466 } 1467 1468 TAILQ_FOREACH(rti, &rai->rai_route, rti_next) { 1469 uint8_t psize = (rti->rti_prefixlen + 0x3f) >> 6; 1470 1471 ndopt_rti = (struct nd_opt_route_info *)buf; 1472 ndopt_rti->nd_opt_rti_type = ND_OPT_ROUTE_INFO; 1473 ndopt_rti->nd_opt_rti_len = 1 + psize; 1474 ndopt_rti->nd_opt_rti_prefixlen = rti->rti_prefixlen; 1475 ndopt_rti->nd_opt_rti_flags = 0xff & rti->rti_rtpref; 1476 ndopt_rti->nd_opt_rti_lifetime = htonl(rti->rti_ltime); 1477 memcpy(ndopt_rti + 1, &rti->rti_prefix, psize * 8); 1478 buf += sizeof(struct nd_opt_route_info) + psize * 8; 1479 } 1480 1481 TAILQ_FOREACH(rdn, &rai->rai_rdnss, rd_next) { 1482 struct rdnss_addr *rdna; 1483 1484 ndopt_rdnss = (struct nd_opt_rdnss *)buf; 1485 ndopt_rdnss->nd_opt_rdnss_type = ND_OPT_RDNSS; 1486 ndopt_rdnss->nd_opt_rdnss_len = 0; 1487 ndopt_rdnss->nd_opt_rdnss_reserved = 0; 1488 ndopt_rdnss->nd_opt_rdnss_lifetime = htonl(rdn->rd_ltime); 1489 buf += sizeof(struct nd_opt_rdnss); 1490 1491 TAILQ_FOREACH(rdna, &rdn->rd_list, ra_next) { 1492 memcpy(buf, &rdna->ra_dns, sizeof(rdna->ra_dns)); 1493 buf += sizeof(rdna->ra_dns); 1494 } 1495 /* Length field should be in 8 octets */ 1496 ndopt_rdnss->nd_opt_rdnss_len = (buf - (char *)ndopt_rdnss) / 8; 1497 1498 syslog(LOG_DEBUG, "<%s>: nd_opt_dnss_len = %d", __func__, 1499 ndopt_rdnss->nd_opt_rdnss_len); 1500 } 1501 1502 TAILQ_FOREACH(dns, &rai->rai_dnssl, dn_next) { 1503 struct dnssl_addr *dnsa; 1504 1505 ndopt_dnssl = (struct nd_opt_dnssl *)buf; 1506 ndopt_dnssl->nd_opt_dnssl_type = ND_OPT_DNSSL; 1507 ndopt_dnssl->nd_opt_dnssl_len = 0; 1508 ndopt_dnssl->nd_opt_dnssl_reserved = 0; 1509 ndopt_dnssl->nd_opt_dnssl_lifetime = htonl(dns->dn_ltime); 1510 buf += sizeof(*ndopt_dnssl); 1511 1512 TAILQ_FOREACH(dnsa, &dns->dn_list, da_next) { 1513 memcpy(buf, dnsa->da_dom, dnsa->da_len); 1514 buf += dnsa->da_len; 1515 } 1516 1517 /* A zero octet after encoded DNS server list. */ 1518 *buf++ = '\0'; 1519 1520 /* Padding to next 8 octets boundary */ 1521 len = buf - (char *)ndopt_dnssl; 1522 len += (len % 8) ? 8 - len % 8 : 0; 1523 1524 /* Length field must be in 8 octets */ 1525 ndopt_dnssl->nd_opt_dnssl_len = len / 8; 1526 1527 syslog(LOG_DEBUG, "<%s>: nd_opt_dnssl_len = %d", __func__, 1528 ndopt_dnssl->nd_opt_dnssl_len); 1529 } 1530 return; 1531} 1532