xref: /freebsd/usr.sbin/rtadvd/config.c (revision e9ac41698b2f322d55ccf9da50a3596edb2c1800)
1 /*	$KAME: config.c,v 1.84 2003/08/05 12:34:23 itojun Exp $	*/
2 
3 /*-
4  * SPDX-License-Identifier: BSD-3-Clause
5  *
6  * Copyright (C) 1998 WIDE Project.
7  * Copyright (C) 2011 Hiroki Sato <hrs@FreeBSD.org>
8  * All rights reserved.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  * 3. Neither the name of the project nor the names of its contributors
19  *    may be used to endorse or promote products derived from this software
20  *    without specific prior written permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
23  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
26  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32  * SUCH DAMAGE.
33  */
34 
35 #include <sys/param.h>
36 #include <sys/ioctl.h>
37 #include <sys/socket.h>
38 
39 #include <net/if.h>
40 #include <net/route.h>
41 #include <net/if_dl.h>
42 
43 #include <netinet/in.h>
44 #include <netinet/in_var.h>
45 #include <netinet/ip6.h>
46 #include <netinet6/ip6_var.h>
47 #include <netinet/icmp6.h>
48 #include <netinet6/nd6.h>
49 
50 #include <arpa/inet.h>
51 
52 #include <stdio.h>
53 #include <syslog.h>
54 #include <errno.h>
55 #include <inttypes.h>
56 #include <netdb.h>
57 #include <string.h>
58 #include <search.h>
59 #include <stdlib.h>
60 #include <time.h>
61 #include <unistd.h>
62 #include <ifaddrs.h>
63 
64 #include "rtadvd.h"
65 #include "advcap.h"
66 #include "timer.h"
67 #include "if.h"
68 #include "config.h"
69 
70 /* label of tcapcode + number + domain name + zero octet */
71 static char entbuf[10 + 3 + NI_MAXHOST + 1];
72 static char oentbuf[10 + 3 + NI_MAXHOST + 1];
73 static char abuf[DNAME_LABELENC_MAXLEN];
74 
75 static time_t prefix_timo = (60 * 120);	/* 2 hours.
76 					 * XXX: should be configurable. */
77 
78 static struct rtadvd_timer *prefix_timeout(void *);
79 static void makeentry(char *, size_t, int, const char *);
80 static ssize_t dname_labelenc(char *, const char *);
81 
82 /* Encode domain name label encoding in RFC 1035 Section 3.1 */
83 static ssize_t
84 dname_labelenc(char *dst, const char *src)
85 {
86 	char *dst_origin;
87 	char *p;
88 	size_t len;
89 
90 	dst_origin = dst;
91 	len = strlen(src);
92 
93 	if (len + len / 64 + 1 + 1 > DNAME_LABELENC_MAXLEN)
94 		return (-1);
95 	/* Length fields per 63 octets + '\0' (<= DNAME_LABELENC_MAXLEN) */
96 	memset(dst, 0, len + len / 64 + 1 + 1);
97 
98 	syslog(LOG_DEBUG, "<%s> labelenc = %s", __func__, src);
99 	while (src && (len = strlen(src)) != 0) {
100 		/* Put a length field with 63 octet limitation first. */
101 		p = strchr(src, '.');
102 		if (p == NULL)
103 			*dst = len = MIN(63, len);
104 		else
105 			*dst = len = MIN(63, p - src);
106 		if (dst + 1 + len < dst_origin + DNAME_LABELENC_MAXLEN)
107 			dst++;
108 		else
109 			return (-1);
110 		/* Copy 63 octets at most. */
111 		memcpy(dst, src, len);
112 		dst += len;
113 		if (p == NULL) /* the last label */
114 			break;
115 		src = p + 1;
116 	}
117 	/* Always need a 0-length label at the tail. */
118 	*dst++ = '\0';
119 
120 	syslog(LOG_DEBUG, "<%s> labellen = %td", __func__, dst - dst_origin);
121 	return (dst - dst_origin);
122 }
123 
124 #define	MUSTHAVE(var, cap)						\
125     do {								\
126 	int64_t t;							\
127 	if ((t = agetnum(cap)) < 0) {					\
128 		fprintf(stderr, "rtadvd: need %s for interface %s\n",	\
129 			cap, intface);					\
130 		exit(1);						\
131 	}								\
132 	var = t;							\
133      } while (0)
134 
135 #define	MAYHAVE(var, cap, def)						\
136      do {								\
137 	if ((var = agetnum(cap)) < 0)					\
138 		var = def;						\
139      } while (0)
140 
141 int
142 loadconfig_index(int idx)
143 {
144 	char ifname[IFNAMSIZ];
145 
146 	syslog(LOG_DEBUG, "<%s> enter", __func__);
147 
148 	if (if_indextoname(idx, ifname) != NULL)
149 		return (loadconfig_ifname(ifname));
150 	else
151 		return (1);
152 }
153 
154 int
155 loadconfig_ifname(char *ifname)
156 {
157 	struct ifinfo *ifi;
158 
159 	syslog(LOG_DEBUG, "<%s> enter", __func__);
160 
161 	update_ifinfo(&ifilist, UPDATE_IFINFO_ALL);
162 	TAILQ_FOREACH(ifi, &ifilist, ifi_next) {
163 		/* NULL means all IFs will be processed. */
164 		if (ifname != NULL &&
165 		    strcmp(ifi->ifi_ifname, ifname) != 0)
166 			continue;
167 
168 		if (!ifi->ifi_persist) {
169 			syslog(LOG_INFO,
170 			    "<%s> %s is not a target interface.  "
171 			    "Ignored at this moment.", __func__,
172 			    ifi->ifi_ifname);
173 			continue;
174 
175 		}
176 		if (ifi->ifi_ifindex == 0) {
177 			syslog(LOG_ERR,
178 			    "<%s> %s not found.  "
179 			    "Ignored at this moment.", __func__,
180 			    ifi->ifi_ifname);
181 			continue;
182 		}
183 		if (getconfig(ifi) == NULL) {
184 			syslog(LOG_ERR,
185 			    "<%s> invalid configuration for %s.  "
186 			    "Ignored at this moment.", __func__,
187 			    ifi->ifi_ifname);
188 			continue;
189 		}
190 	}
191 	return (0);
192 }
193 
194 int
195 rm_ifinfo_index(int idx)
196 {
197 	struct ifinfo *ifi;
198 
199 	ifi = if_indextoifinfo(idx);
200 	if (ifi == NULL) {
201 		syslog(LOG_ERR, "<%s>: ifinfo not found (idx=%d)",
202 		    __func__, idx);
203 		return (-1);
204 	}
205 
206 	return (rm_ifinfo(ifi));
207 }
208 
209 int
210 rm_ifinfo(struct ifinfo *ifi)
211 {
212 	int error;
213 
214 	syslog(LOG_DEBUG, "<%s> enter (%s).", __func__, ifi->ifi_ifname);
215 	switch (ifi->ifi_state) {
216 	case IFI_STATE_UNCONFIGURED:
217 		return (0);
218 		break;
219 	default:
220 		ifi->ifi_state = IFI_STATE_UNCONFIGURED;
221 		syslog(LOG_DEBUG,
222 		    "<%s> ifname=%s marked as UNCONFIGURED.",
223 		    __func__, ifi->ifi_ifname);
224 
225 		/* XXX: No MC leaving here because index is disappeared */
226 
227 		/* Inactivate timer */
228 		rtadvd_remove_timer(ifi->ifi_ra_timer);
229 		ifi->ifi_ra_timer = NULL;
230 		break;
231 	}
232 
233 	/* clean up ifi */
234 	if (!ifi->ifi_persist) {
235 		TAILQ_REMOVE(&ifilist, ifi, ifi_next);
236 		syslog(LOG_DEBUG, "<%s>: ifinfo (idx=%d) removed.",
237 		    __func__, ifi->ifi_ifindex);
238 	} else {
239 		/* recreate an empty entry */
240 		update_persist_ifinfo(&ifilist, ifi->ifi_ifname);
241 		syslog(LOG_DEBUG, "<%s>: ifname=%s is persistent.",
242 		    __func__, ifi->ifi_ifname);
243 	}
244 
245 	/* clean up rai if any */
246 	switch (ifi->ifi_state) {
247 	case IFI_STATE_CONFIGURED:
248 		if (ifi->ifi_rainfo != NULL) {
249 			error = rm_rainfo(ifi->ifi_rainfo);
250 			if (error)
251 				return (error);
252 			ifi->ifi_rainfo = NULL;
253 		}
254 		break;
255 	case IFI_STATE_TRANSITIVE:
256 		if (ifi->ifi_rainfo == ifi->ifi_rainfo_trans) {
257 			if (ifi->ifi_rainfo != NULL) {
258 				error = rm_rainfo(ifi->ifi_rainfo);
259 				if (error)
260 					return (error);
261 				ifi->ifi_rainfo = NULL;
262 				ifi->ifi_rainfo_trans = NULL;
263 			}
264 		} else {
265 			if (ifi->ifi_rainfo != NULL) {
266 				error = rm_rainfo(ifi->ifi_rainfo);
267 				if (error)
268 					return (error);
269 				ifi->ifi_rainfo = NULL;
270 			}
271 			if (ifi->ifi_rainfo_trans != NULL) {
272 				error = rm_rainfo(ifi->ifi_rainfo_trans);
273 				if (error)
274 					return (error);
275 				ifi->ifi_rainfo_trans = NULL;
276 			}
277 		}
278 	}
279 
280 	syslog(LOG_DEBUG, "<%s> leave (%s).", __func__, ifi->ifi_ifname);
281 	if (!ifi->ifi_persist)
282 		free(ifi);
283 	return (0);
284 }
285 
286 int
287 rm_rainfo(struct rainfo *rai)
288 {
289 	struct prefix *pfx;
290 	struct soliciter *sol;
291 	struct rdnss *rdn;
292 	struct rdnss_addr *rdna;
293 	struct dnssl *dns;
294 	struct rtinfo *rti;
295 
296 	syslog(LOG_DEBUG, "<%s>: enter",  __func__);
297 
298 	TAILQ_REMOVE(&railist, rai, rai_next);
299 	if (rai->rai_ifinfo != NULL)
300 		syslog(LOG_DEBUG, "<%s>: rainfo (idx=%d) removed.",
301 		    __func__, rai->rai_ifinfo->ifi_ifindex);
302 
303 	if (rai->rai_ra_data != NULL)
304 		free(rai->rai_ra_data);
305 
306 	while ((pfx = TAILQ_FIRST(&rai->rai_prefix)) != NULL)
307 		delete_prefix(pfx);
308 	while ((sol = TAILQ_FIRST(&rai->rai_soliciter)) != NULL) {
309 		TAILQ_REMOVE(&rai->rai_soliciter, sol, sol_next);
310 		free(sol);
311 	}
312 	while ((rdn = TAILQ_FIRST(&rai->rai_rdnss)) != NULL) {
313 		TAILQ_REMOVE(&rai->rai_rdnss, rdn, rd_next);
314 		while ((rdna = TAILQ_FIRST(&rdn->rd_list)) != NULL) {
315 			TAILQ_REMOVE(&rdn->rd_list, rdna, ra_next);
316 			free(rdna);
317 		}
318 		free(rdn);
319 	}
320 	while ((dns = TAILQ_FIRST(&rai->rai_dnssl)) != NULL) {
321 		TAILQ_REMOVE(&rai->rai_dnssl, dns, dn_next);
322 		free(dns);
323 	}
324 	while ((rti = TAILQ_FIRST(&rai->rai_route)) != NULL) {
325 		TAILQ_REMOVE(&rai->rai_route, rti, rti_next);
326 		free(rti);
327 	}
328 	free(rai);
329 	syslog(LOG_DEBUG, "<%s>: leave",  __func__);
330 
331 	return (0);
332 }
333 
334 struct ifinfo *
335 getconfig(struct ifinfo *ifi)
336 {
337 	int stat, i;
338 	int error;
339 	char tbuf[BUFSIZ];
340 	struct rainfo *rai;
341 	struct rainfo *rai_old;
342 	int32_t val;
343 	int64_t val64;
344 	char buf[BUFSIZ];
345 	char *bp = buf;
346 	char *addr, *flagstr;
347 
348 	if (ifi == NULL)	/* if does not exist */
349 		return (NULL);
350 
351 	if (ifi->ifi_state == IFI_STATE_TRANSITIVE &&
352 	    ifi->ifi_rainfo == NULL) {
353 		syslog(LOG_INFO, "<%s> %s is shutting down.  Skipped.",
354 		    __func__, ifi->ifi_ifname);
355 		return (NULL);
356 	}
357 
358 	if ((stat = agetent(tbuf, ifi->ifi_ifname)) <= 0) {
359 		memset(tbuf, 0, sizeof(tbuf));
360 		syslog(LOG_INFO,
361 		    "<%s> %s isn't defined in the configuration file"
362 		    " or the configuration file doesn't exist."
363 		    " Treat it as default",
364 		     __func__, ifi->ifi_ifname);
365 	}
366 
367 	ELM_MALLOC(rai, exit(1));
368 	TAILQ_INIT(&rai->rai_prefix);
369 	TAILQ_INIT(&rai->rai_route);
370 	TAILQ_INIT(&rai->rai_rdnss);
371 	TAILQ_INIT(&rai->rai_dnssl);
372 	TAILQ_INIT(&rai->rai_soliciter);
373 	rai->rai_ifinfo = ifi;
374 
375 	/* gather on-link prefixes from the network interfaces. */
376 	if (agetflag("noifprefix"))
377 		rai->rai_advifprefix = 0;
378 	else
379 		rai->rai_advifprefix = 1;
380 
381 	/* get interface information */
382 	if (agetflag("nolladdr"))
383 		rai->rai_advlinkopt = 0;
384 	else
385 		rai->rai_advlinkopt = 1;
386 	if (rai->rai_advlinkopt) {
387 		if (ifi->ifi_sdl.sdl_type == 0) {
388 			syslog(LOG_ERR,
389 			    "<%s> can't get information of %s",
390 			    __func__, ifi->ifi_ifname);
391 			goto getconfig_free_rai;
392 		}
393 	}
394 
395 	/*
396 	 * set router configuration variables.
397 	 */
398 	MAYHAVE(val, "maxinterval", DEF_MAXRTRADVINTERVAL);
399 	if (val < MIN_MAXINTERVAL || val > MAX_MAXINTERVAL) {
400 		syslog(LOG_ERR,
401 		    "<%s> maxinterval (%" PRIu32 ") on %s is invalid "
402 		    "(must be between %u and %u)", __func__, val,
403 		    ifi->ifi_ifname, MIN_MAXINTERVAL, MAX_MAXINTERVAL);
404 		goto getconfig_free_rai;
405 	}
406 	rai->rai_maxinterval = (uint16_t)val;
407 
408 	MAYHAVE(val, "mininterval", rai->rai_maxinterval/3);
409 	if ((uint16_t)val < MIN_MININTERVAL ||
410 	    (uint16_t)val > (rai->rai_maxinterval * 3) / 4) {
411 		syslog(LOG_ERR,
412 		    "<%s> mininterval (%" PRIu32 ") on %s is invalid "
413 		    "(must be between %d and %d)",
414 		    __func__, val, ifi->ifi_ifname, MIN_MININTERVAL,
415 		    (rai->rai_maxinterval * 3) / 4);
416 		goto getconfig_free_rai;
417 	}
418 	rai->rai_mininterval = (uint16_t)val;
419 
420 	MAYHAVE(val, "chlim", DEF_ADVCURHOPLIMIT);
421 	rai->rai_hoplimit = val & 0xff;
422 
423 	if ((flagstr = (char *)agetstr("raflags", &bp))) {
424 		val = 0;
425 		if (strchr(flagstr, 'm'))
426 			val |= ND_RA_FLAG_MANAGED;
427 		if (strchr(flagstr, 'o'))
428 			val |= ND_RA_FLAG_OTHER;
429 		if (strchr(flagstr, 'h'))
430 			val |= ND_RA_FLAG_RTPREF_HIGH;
431 		if (strchr(flagstr, 'l')) {
432 			if ((val & ND_RA_FLAG_RTPREF_HIGH)) {
433 				syslog(LOG_ERR, "<%s> the \'h\' and \'l\'"
434 				    " router flags are exclusive", __func__);
435 				goto getconfig_free_rai;
436 			}
437 			val |= ND_RA_FLAG_RTPREF_LOW;
438 		}
439 #ifdef DRAFT_IETF_6MAN_IPV6ONLY_FLAG
440 		if (strchr(flagstr, 'S'))
441 			val |= ND_RA_FLAG_IPV6_ONLY;
442 #endif
443 	} else
444 		MAYHAVE(val, "raflags", 0);
445 
446 	rai->rai_managedflg = val & ND_RA_FLAG_MANAGED;
447 	rai->rai_otherflg = val & ND_RA_FLAG_OTHER;
448 #ifndef ND_RA_FLAG_RTPREF_MASK
449 #define ND_RA_FLAG_RTPREF_MASK	0x18 /* 00011000 */
450 #define ND_RA_FLAG_RTPREF_RSV	0x10 /* 00010000 */
451 #endif
452 	rai->rai_rtpref = val & ND_RA_FLAG_RTPREF_MASK;
453 	if (rai->rai_rtpref == ND_RA_FLAG_RTPREF_RSV) {
454 		syslog(LOG_ERR, "<%s> invalid router preference (%02x) on %s",
455 		    __func__, rai->rai_rtpref, ifi->ifi_ifname);
456 		goto getconfig_free_rai;
457 	}
458 #ifdef DRAFT_IETF_6MAN_IPV6ONLY_FLAG
459 	rai->rai_ipv6onlyflg = val & ND_RA_FLAG_IPV6_ONLY;
460 #endif
461 
462 	MAYHAVE(val, "rltime", rai->rai_maxinterval * 3);
463 	if ((uint16_t)val && ((uint16_t)val < rai->rai_maxinterval ||
464 	    (uint16_t)val > MAXROUTERLIFETIME)) {
465 		syslog(LOG_ERR,
466 		    "<%s> router lifetime (%" PRIu32 ") on %s is invalid "
467 		    "(must be 0 or between %d and %d)",
468 		    __func__, val, ifi->ifi_ifname, rai->rai_maxinterval,
469 		    MAXROUTERLIFETIME);
470 		goto getconfig_free_rai;
471 	}
472 	rai->rai_lifetime = val & 0xffff;
473 
474 	MAYHAVE(val, "rtime", DEF_ADVREACHABLETIME);
475 	if (val < 0 || val > MAXREACHABLETIME) {
476 		syslog(LOG_ERR,
477 		    "<%s> reachable time (%" PRIu32 ") on %s is invalid "
478 		    "(must be no greater than %d)",
479 		    __func__, val, ifi->ifi_ifname, MAXREACHABLETIME);
480 		goto getconfig_free_rai;
481 	}
482 	rai->rai_reachabletime = (uint32_t)val;
483 
484 	MAYHAVE(val64, "retrans", DEF_ADVRETRANSTIMER);
485 	if (val64 < 0 || val64 > 0xffffffff) {
486 		syslog(LOG_ERR, "<%s> retrans time (%" PRIu64 ") on %s out of range",
487 		    __func__, val64, ifi->ifi_ifname);
488 		goto getconfig_free_rai;
489 	}
490 	rai->rai_retranstimer = (uint32_t)val64;
491 
492 	if (agetnum("hapref") != -1 || agetnum("hatime") != -1) {
493 		syslog(LOG_ERR,
494 		    "<%s> mobile-ip6 configuration not supported",
495 		    __func__);
496 		goto getconfig_free_rai;
497 	}
498 	/* prefix information */
499 
500 	/*
501 	 * This is an implementation specific parameter to consider
502 	 * link propagation delays and poorly synchronized clocks when
503 	 * checking consistency of advertised lifetimes.
504 	 */
505 	MAYHAVE(val, "clockskew", 0);
506 	rai->rai_clockskew = val;
507 
508 	rai->rai_pfxs = 0;
509 	for (i = -1; i < MAXPREFIX; i++) {
510 		struct prefix *pfx;
511 
512 		makeentry(entbuf, sizeof(entbuf), i, "addr");
513 		addr = (char *)agetstr(entbuf, &bp);
514 		if (addr == NULL)
515 			continue;
516 
517 		/* allocate memory to store prefix information */
518 		ELM_MALLOC(pfx, exit(1));
519 		pfx->pfx_rainfo = rai;
520 		pfx->pfx_origin = PREFIX_FROM_CONFIG;
521 
522 		if (inet_pton(AF_INET6, addr, &pfx->pfx_prefix) != 1) {
523 			syslog(LOG_ERR,
524 			    "<%s> inet_pton failed for %s",
525 			    __func__, addr);
526 			goto getconfig_free_pfx;
527 		}
528 		if (IN6_IS_ADDR_MULTICAST(&pfx->pfx_prefix)) {
529 			syslog(LOG_ERR,
530 			    "<%s> multicast prefix (%s) must "
531 			    "not be advertised on %s",
532 			    __func__, addr, ifi->ifi_ifname);
533 			goto getconfig_free_pfx;
534 		}
535 		if (IN6_IS_ADDR_LINKLOCAL(&pfx->pfx_prefix))
536 			syslog(LOG_NOTICE,
537 			    "<%s> link-local prefix (%s) will be"
538 			    " advertised on %s",
539 			    __func__, addr, ifi->ifi_ifname);
540 
541 		makeentry(entbuf, sizeof(entbuf), i, "prefixlen");
542 		MAYHAVE(val, entbuf, 64);
543 		if (val < 0 || val > 128) {
544 			syslog(LOG_ERR, "<%s> prefixlen (%" PRIu32 ") for %s "
545 			    "on %s out of range",
546 			    __func__, val, addr, ifi->ifi_ifname);
547 			goto getconfig_free_pfx;
548 		}
549 		pfx->pfx_prefixlen = (int)val;
550 
551 		makeentry(entbuf, sizeof(entbuf), i, "pinfoflags");
552 		if ((flagstr = (char *)agetstr(entbuf, &bp))) {
553 			val = 0;
554 			if (strchr(flagstr, 'l'))
555 				val |= ND_OPT_PI_FLAG_ONLINK;
556 			if (strchr(flagstr, 'a'))
557 				val |= ND_OPT_PI_FLAG_AUTO;
558 		} else {
559 			MAYHAVE(val, entbuf,
560 			    (ND_OPT_PI_FLAG_ONLINK|ND_OPT_PI_FLAG_AUTO));
561 		}
562 		pfx->pfx_onlinkflg = val & ND_OPT_PI_FLAG_ONLINK;
563 		pfx->pfx_autoconfflg = val & ND_OPT_PI_FLAG_AUTO;
564 
565 		makeentry(entbuf, sizeof(entbuf), i, "vltime");
566 		MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME);
567 		if (val64 < 0 || val64 > 0xffffffff) {
568 			syslog(LOG_ERR, "<%s> vltime (%" PRIu64 ") for "
569 			    "%s/%d on %s is out of range",
570 			    __func__, val64,
571 			    addr, pfx->pfx_prefixlen, ifi->ifi_ifname);
572 			goto getconfig_free_pfx;
573 		}
574 		pfx->pfx_validlifetime = (uint32_t)val64;
575 
576 		makeentry(entbuf, sizeof(entbuf), i, "vltimedecr");
577 		if (agetflag(entbuf)) {
578 			struct timespec now;
579 
580 			clock_gettime(CLOCK_MONOTONIC_FAST, &now);
581 			pfx->pfx_vltimeexpire =
582 				now.tv_sec + pfx->pfx_validlifetime;
583 		}
584 
585 		makeentry(entbuf, sizeof(entbuf), i, "pltime");
586 		MAYHAVE(val64, entbuf, DEF_ADVPREFERREDLIFETIME);
587 		if (val64 < 0 || val64 > 0xffffffff) {
588 			syslog(LOG_ERR,
589 			    "<%s> pltime (%" PRIu64 ") for %s/%d on %s "
590 			    "is out of range",
591 			    __func__, val64,
592 			    addr, pfx->pfx_prefixlen, ifi->ifi_ifname);
593 			goto getconfig_free_pfx;
594 		}
595 		pfx->pfx_preflifetime = (uint32_t)val64;
596 
597 		makeentry(entbuf, sizeof(entbuf), i, "pltimedecr");
598 		if (agetflag(entbuf)) {
599 			struct timespec now;
600 
601 			clock_gettime(CLOCK_MONOTONIC_FAST, &now);
602 			pfx->pfx_pltimeexpire =
603 			    now.tv_sec + pfx->pfx_preflifetime;
604 		}
605 		/* link into chain */
606 		TAILQ_INSERT_TAIL(&rai->rai_prefix, pfx, pfx_next);
607 		rai->rai_pfxs++;
608 		continue;
609 getconfig_free_pfx:
610 		free(pfx);
611 	}
612 	if (rai->rai_advifprefix && rai->rai_pfxs == 0)
613 		get_prefix(rai);
614 
615 	MAYHAVE(val64, "mtu", 0);
616 	if (val < 0 || val64 > 0xffffffff) {
617 		syslog(LOG_ERR,
618 		    "<%s> mtu (%" PRIu64 ") on %s out of range",
619 		    __func__, val64, ifi->ifi_ifname);
620 		goto getconfig_free_rai;
621 	}
622 	rai->rai_linkmtu = (uint32_t)val64;
623 	if (rai->rai_linkmtu == 0) {
624 		char *mtustr;
625 
626 		if ((mtustr = (char *)agetstr("mtu", &bp)) &&
627 		    strcmp(mtustr, "auto") == 0)
628 			rai->rai_linkmtu = ifi->ifi_phymtu;
629 	}
630 	else if (rai->rai_linkmtu < IPV6_MMTU ||
631 	    rai->rai_linkmtu > ifi->ifi_phymtu) {
632 		syslog(LOG_ERR,
633 		    "<%s> advertised link mtu (%" PRIu32 ") on %s is invalid (must "
634 		    "be between least MTU (%d) and physical link MTU (%d)",
635 		    __func__, rai->rai_linkmtu, ifi->ifi_ifname,
636 		    IPV6_MMTU, ifi->ifi_phymtu);
637 		goto getconfig_free_rai;
638 	}
639 
640 #ifdef SIOCSIFINFO_IN6
641 	{
642 		struct in6_ndireq ndi;
643 		int s;
644 
645 		if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
646 			syslog(LOG_ERR, "<%s> socket: %s", __func__,
647 			    strerror(errno));
648 			exit(1);
649 		}
650 		memset(&ndi, 0, sizeof(ndi));
651 		strlcpy(ndi.ifname, ifi->ifi_ifname, sizeof(ndi.ifname));
652 		if (ioctl(s, SIOCGIFINFO_IN6, (caddr_t)&ndi) < 0)
653 			syslog(LOG_INFO, "<%s> ioctl:SIOCGIFINFO_IN6 at %s: %s",
654 			    __func__, ifi->ifi_ifname, strerror(errno));
655 
656 		/* reflect the RA info to the host variables in kernel */
657 		ndi.ndi.chlim = rai->rai_hoplimit;
658 		ndi.ndi.retrans = rai->rai_retranstimer;
659 		ndi.ndi.basereachable = rai->rai_reachabletime;
660 		if (ioctl(s, SIOCSIFINFO_IN6, (caddr_t)&ndi) < 0)
661 			syslog(LOG_INFO, "<%s> ioctl:SIOCSIFINFO_IN6 at %s: %s",
662 			    __func__, ifi->ifi_ifname, strerror(errno));
663 
664 		close(s);
665 	}
666 #endif
667 
668 	/* route information */
669 	rai->rai_routes = 0;
670 	for (i = -1; i < MAXROUTE; i++) {
671 		struct rtinfo *rti;
672 
673 		makeentry(entbuf, sizeof(entbuf), i, "rtprefix");
674 		addr = (char *)agetstr(entbuf, &bp);
675 		if (addr == NULL) {
676 			makeentry(oentbuf, sizeof(oentbuf), i, "rtrprefix");
677 			addr = (char *)agetstr(oentbuf, &bp);
678 			if (addr)
679 				fprintf(stderr, "%s was obsoleted.  Use %s.\n",
680 				    oentbuf, entbuf);
681 		}
682 		if (addr == NULL)
683 			continue;
684 
685 		/* allocate memory to store prefix information */
686 		ELM_MALLOC(rti, exit(1));
687 
688 		if (inet_pton(AF_INET6, addr, &rti->rti_prefix) != 1) {
689 			syslog(LOG_ERR, "<%s> inet_pton failed for %s",
690 			    __func__, addr);
691 			goto getconfig_free_rti;
692 		}
693 #if 0
694 		/*
695 		 * XXX: currently there's no restriction in route information
696 		 * prefix according to
697 		 * draft-ietf-ipngwg-router-selection-00.txt.
698 		 * However, I think the similar restriction be necessary.
699 		 */
700 		MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME);
701 		if (IN6_IS_ADDR_MULTICAST(&rti->prefix)) {
702 			syslog(LOG_ERR,
703 			    "<%s> multicast route (%s) must "
704 			    "not be advertised on %s",
705 			    __func__, addr, ifi->ifi_ifname);
706 			goto getconfig_free_rti;
707 		}
708 		if (IN6_IS_ADDR_LINKLOCAL(&rti->prefix)) {
709 			syslog(LOG_NOTICE,
710 			    "<%s> link-local route (%s) will "
711 			    "be advertised on %s",
712 			    __func__, addr, ifi->ifi_ifname);
713 			goto getconfig_free_rti;
714 		}
715 #endif
716 
717 		makeentry(entbuf, sizeof(entbuf), i, "rtplen");
718 		/* XXX: 256 is a magic number for compatibility check. */
719 		MAYHAVE(val, entbuf, 256);
720 		if (val == 256) {
721 			makeentry(oentbuf, sizeof(oentbuf), i, "rtrplen");
722 			MAYHAVE(val, oentbuf, 256);
723 			if (val != 256)
724 				fprintf(stderr, "%s was obsoleted.  Use %s.\n",
725 				    oentbuf, entbuf);
726 			else
727 				val = 64;
728 		}
729 		if (val < 0 || val > 128) {
730 			syslog(LOG_ERR, "<%s> prefixlen (%" PRIu32 ") for %s on %s "
731 			    "out of range",
732 			    __func__, val, addr, ifi->ifi_ifname);
733 			goto getconfig_free_rti;
734 		}
735 		rti->rti_prefixlen = (int)val;
736 
737 		makeentry(entbuf, sizeof(entbuf), i, "rtflags");
738 		if ((flagstr = (char *)agetstr(entbuf, &bp))) {
739 			val = 0;
740 			if (strchr(flagstr, 'h'))
741 				val |= ND_RA_FLAG_RTPREF_HIGH;
742 			if (strchr(flagstr, 'l')) {
743 				if ((val & ND_RA_FLAG_RTPREF_HIGH)) {
744 					syslog(LOG_ERR,
745 					    "<%s> the \'h\' and \'l\' route"
746 					    " preferences are exclusive",
747 					    __func__);
748 					goto getconfig_free_rti;
749 				}
750 				val |= ND_RA_FLAG_RTPREF_LOW;
751 			}
752 		} else
753 			MAYHAVE(val, entbuf, 256); /* XXX */
754 		if (val == 256) {
755 			makeentry(oentbuf, sizeof(oentbuf), i, "rtrflags");
756 			MAYHAVE(val, oentbuf, 256);
757 			if (val != 256) {
758 				fprintf(stderr, "%s was obsoleted.  Use %s.\n",
759 				    oentbuf, entbuf);
760 			} else
761 				val = 0;
762 		}
763 		rti->rti_rtpref = val & ND_RA_FLAG_RTPREF_MASK;
764 		if (rti->rti_rtpref == ND_RA_FLAG_RTPREF_RSV) {
765 			syslog(LOG_ERR, "<%s> invalid route preference (%02x) "
766 			    "for %s/%d on %s",
767 			    __func__, rti->rti_rtpref, addr,
768 			    rti->rti_prefixlen, ifi->ifi_ifname);
769 			goto getconfig_free_rti;
770 		}
771 
772 		/*
773 		 * Since the spec does not a default value, we should make
774 		 * this entry mandatory.  However, FreeBSD 4.4 has shipped
775 		 * with this field being optional, we use the router lifetime
776 		 * as an ad-hoc default value with a warning message.
777 		 */
778 		makeentry(entbuf, sizeof(entbuf), i, "rtltime");
779 		MAYHAVE(val64, entbuf, -1);
780 		if (val64 == -1) {
781 			makeentry(oentbuf, sizeof(oentbuf), i, "rtrltime");
782 			MAYHAVE(val64, oentbuf, -1);
783 			if (val64 != -1)
784 				fprintf(stderr, "%s was obsoleted.  Use %s.\n",
785 				    oentbuf, entbuf);
786 			else {
787 				fprintf(stderr, "%s should be specified "
788 				    "for interface %s.\n", entbuf,
789 				    ifi->ifi_ifname);
790 				val64 = rai->rai_lifetime;
791 			}
792 		}
793 		if (val64 < 0 || val64 > 0xffffffff) {
794 			syslog(LOG_ERR, "<%s> route lifetime (%" PRIu64 ") for "
795 			    "%s/%d on %s out of range", __func__,
796 			    val64, addr, rti->rti_prefixlen,
797 			    ifi->ifi_ifname);
798 			goto getconfig_free_rti;
799 		}
800 		rti->rti_ltime = (uint32_t)val64;
801 
802 		/* link into chain */
803 		TAILQ_INSERT_TAIL(&rai->rai_route, rti, rti_next);
804 		rai->rai_routes++;
805 		continue;
806 getconfig_free_rti:
807 		free(rti);
808 	}
809 
810 	/* DNS server and DNS search list information */
811 	for (i = -1; i < MAXRDNSSENT ; i++) {
812 		struct rdnss *rdn;
813 		struct rdnss_addr *rdna;
814 		char *ap;
815 		int c;
816 
817 		makeentry(entbuf, sizeof(entbuf), i, "rdnss");
818 		addr = (char *)agetstr(entbuf, &bp);
819 		if (addr == NULL)
820 			continue;
821 		ELM_MALLOC(rdn, exit(1));
822 
823 		TAILQ_INIT(&rdn->rd_list);
824 
825 		for (ap = addr; ap - addr < (ssize_t)strlen(addr); ap += c+1) {
826 			c = strcspn(ap, ",");
827 			strncpy(abuf, ap, c);
828 			abuf[c] = '\0';
829 			ELM_MALLOC(rdna, goto getconfig_free_rdn);
830 			if (inet_pton(AF_INET6, abuf, &rdna->ra_dns) != 1) {
831 				syslog(LOG_ERR, "<%s> inet_pton failed for %s",
832 				    __func__, abuf);
833 				free(rdna);
834 				goto getconfig_free_rdn;
835 			}
836 			TAILQ_INSERT_TAIL(&rdn->rd_list, rdna, ra_next);
837 		}
838 
839 		makeentry(entbuf, sizeof(entbuf), i, "rdnssltime");
840 		MAYHAVE(val, entbuf, (rai->rai_maxinterval * 3 / 2));
841 		if ((uint16_t)val < rai->rai_maxinterval ||
842 		    (uint16_t)val > rai->rai_maxinterval * 2) {
843 			syslog(LOG_ERR, "%s (%" PRIu16 ") on %s is invalid "
844 			    "(must be between %d and %d)",
845 			    entbuf, val, ifi->ifi_ifname, rai->rai_maxinterval,
846 			    rai->rai_maxinterval * 2);
847 			goto getconfig_free_rdn;
848 		}
849 		rdn->rd_ltime = val;
850 
851 		/* link into chain */
852 		TAILQ_INSERT_TAIL(&rai->rai_rdnss, rdn, rd_next);
853 		continue;
854 getconfig_free_rdn:
855 		while ((rdna = TAILQ_FIRST(&rdn->rd_list)) != NULL) {
856 			TAILQ_REMOVE(&rdn->rd_list, rdna, ra_next);
857 			free(rdna);
858 		}
859 		free(rdn);
860 	}
861 
862 	for (i = -1; i < MAXDNSSLENT ; i++) {
863 		struct dnssl *dns;
864 		struct dnssl_addr *dnsa;
865 		char *ap;
866 		int c;
867 
868 		makeentry(entbuf, sizeof(entbuf), i, "dnssl");
869 		addr = (char *)agetstr(entbuf, &bp);
870 		if (addr == NULL)
871 			continue;
872 
873 		ELM_MALLOC(dns, exit(1));
874 
875 		TAILQ_INIT(&dns->dn_list);
876 
877 		for (ap = addr; ap - addr < (ssize_t)strlen(addr); ap += c+1) {
878 			c = strcspn(ap, ",");
879 			strncpy(abuf, ap, c);
880 			abuf[c] = '\0';
881 			ELM_MALLOC(dnsa, goto getconfig_free_dns);
882 			dnsa->da_len = dname_labelenc(dnsa->da_dom, abuf);
883 			if (dnsa->da_len < 0) {
884 				syslog(LOG_ERR, "Invalid dnssl entry: %s",
885 				    abuf);
886 				goto getconfig_free_dns;
887 			}
888 			syslog(LOG_DEBUG, "<%s>: dnsa->da_len = %d", __func__,
889 			    dnsa->da_len);
890 			TAILQ_INSERT_TAIL(&dns->dn_list, dnsa, da_next);
891 		}
892 
893 		makeentry(entbuf, sizeof(entbuf), i, "dnsslltime");
894 		MAYHAVE(val, entbuf, (rai->rai_maxinterval * 3 / 2));
895 		if ((uint16_t)val < rai->rai_maxinterval ||
896 		    (uint16_t)val > rai->rai_maxinterval * 2) {
897 			syslog(LOG_ERR, "%s (%" PRIu16 ") on %s is invalid "
898 			    "(must be between %d and %d)",
899 			    entbuf, val, ifi->ifi_ifname, rai->rai_maxinterval,
900 			    rai->rai_maxinterval * 2);
901 			goto getconfig_free_dns;
902 		}
903 		dns->dn_ltime = val;
904 
905 		/* link into chain */
906 		TAILQ_INSERT_TAIL(&rai->rai_dnssl, dns, dn_next);
907 		continue;
908 getconfig_free_dns:
909 		while ((dnsa = TAILQ_FIRST(&dns->dn_list)) != NULL) {
910 			TAILQ_REMOVE(&dns->dn_list, dnsa, da_next);
911 			free(dnsa);
912 		}
913 		free(dns);
914 	}
915 
916 	/*
917 	 * handle pref64
918 	 */
919 	rai->rai_pref64.p64_enabled = false;
920 
921 	if ((addr = (char *)agetstr("pref64", &bp))) {
922 		if (inet_pton(AF_INET6, addr, &rai->rai_pref64.p64_prefix) != 1) {
923 			syslog(LOG_ERR, "<%s> inet_pton failed for %s",
924 			    __func__, addr);
925 		} else {
926 			rai->rai_pref64.p64_enabled = true;
927 
928 			switch (val64 = agetnum("pref64len")) {
929 			case -1:
930 			case 96:
931 				rai->rai_pref64.p64_plc = 0;
932 				break;
933 			case 64:
934 				rai->rai_pref64.p64_plc = 1;
935 				break;
936 			case 56:
937 				rai->rai_pref64.p64_plc = 2;
938 				break;
939 			case 48:
940 				rai->rai_pref64.p64_plc = 3;
941 				break;
942 			case 40:
943 				rai->rai_pref64.p64_plc = 4;
944 				break;
945 			case 32:
946 				rai->rai_pref64.p64_plc = 5;
947 				break;
948 			default:
949 				syslog(LOG_ERR, "prefix length %" PRIi64
950 				       "on %s is invalid; disabling PREF64",
951 				       val64, ifi->ifi_ifname);
952 				rai->rai_pref64.p64_enabled = 0;
953 				break;
954 			}
955 
956 			/* This logic is from RFC 8781 section 4.1. */
957 			val64 = agetnum("pref64lifetime");
958 			if (val64 == -1)
959 				val64 = rai->rai_lifetime * 3;
960 			if (val64 > 65528)
961 				val64 = 65528;
962 			val64 = (val64 + 7) / 8;
963 			rai->rai_pref64.p64_sl = (uint16_t) (uint64_t) val64;
964 		}
965 	}
966 
967 	/* construct the sending packet */
968 	make_packet(rai);
969 
970 	/*
971 	 * If an entry with the same ifindex exists, remove it first.
972 	 * Before the removal, RDNSS and DNSSL options with
973 	 * zero-lifetime will be sent.
974 	 */
975 	switch (ifi->ifi_state) {
976 	case IFI_STATE_UNCONFIGURED:
977 		/* UNCONFIGURED -> TRANSITIVE */
978 
979 		error = sock_mc_join(&sock, ifi->ifi_ifindex);
980 		if (error)
981 			exit(1);
982 
983 		ifi->ifi_state = IFI_STATE_TRANSITIVE;
984 		ifi->ifi_burstcount = MAX_INITIAL_RTR_ADVERTISEMENTS;
985 		ifi->ifi_burstinterval = MAX_INITIAL_RTR_ADVERT_INTERVAL;
986 
987 		/* The same two rai mean initial burst */
988 		ifi->ifi_rainfo = rai;
989 		ifi->ifi_rainfo_trans = rai;
990 		TAILQ_INSERT_TAIL(&railist, rai, rai_next);
991 
992 		if (ifi->ifi_ra_timer == NULL)
993 			ifi->ifi_ra_timer = rtadvd_add_timer(ra_timeout,
994 			    ra_timer_update, ifi, ifi);
995 		ra_timer_update(ifi, &ifi->ifi_ra_timer->rat_tm);
996 		rtadvd_set_timer(&ifi->ifi_ra_timer->rat_tm,
997 		    ifi->ifi_ra_timer);
998 
999 		syslog(LOG_DEBUG,
1000 		    "<%s> ifname=%s marked as TRANSITIVE (initial burst).",
1001 		    __func__, ifi->ifi_ifname);
1002 		break;
1003 	case IFI_STATE_CONFIGURED:
1004 		/* CONFIGURED -> TRANSITIVE */
1005 		rai_old = ifi->ifi_rainfo;
1006 		if (rai_old == NULL) {
1007 			syslog(LOG_ERR,
1008 			    "<%s> ifi_rainfo is NULL"
1009 			    " in IFI_STATE_CONFIGURED.", __func__);
1010 			ifi = NULL;
1011 			break;
1012 		} else {
1013 			struct rdnss *rdn;
1014 			struct dnssl *dns;
1015 
1016 			rai_old->rai_lifetime = 0;
1017 			TAILQ_FOREACH(rdn, &rai_old->rai_rdnss, rd_next)
1018 			    rdn->rd_ltime = 0;
1019 			TAILQ_FOREACH(dns, &rai_old->rai_dnssl, dn_next)
1020 			    dns->dn_ltime = 0;
1021 
1022 			ifi->ifi_rainfo_trans = rai_old;
1023 			ifi->ifi_state = IFI_STATE_TRANSITIVE;
1024 			ifi->ifi_burstcount = MAX_FINAL_RTR_ADVERTISEMENTS;
1025 			ifi->ifi_burstinterval = MIN_DELAY_BETWEEN_RAS;
1026 
1027 			ra_timer_update(ifi, &ifi->ifi_ra_timer->rat_tm);
1028 			rtadvd_set_timer(&ifi->ifi_ra_timer->rat_tm,
1029 			    ifi->ifi_ra_timer);
1030 
1031 			syslog(LOG_DEBUG,
1032 			    "<%s> ifname=%s marked as TRANSITIVE"
1033 			    " (transitional burst)",
1034 			    __func__, ifi->ifi_ifname);
1035 		}
1036 		ifi->ifi_rainfo = rai;
1037 		TAILQ_INSERT_TAIL(&railist, rai, rai_next);
1038 		break;
1039 	case IFI_STATE_TRANSITIVE:
1040 		if (ifi->ifi_rainfo != NULL) {
1041 			if (ifi->ifi_rainfo == ifi->ifi_rainfo_trans) {
1042 				/* Reinitialize initial burst */
1043 				rm_rainfo(ifi->ifi_rainfo);
1044 				ifi->ifi_rainfo = rai;
1045 				ifi->ifi_rainfo_trans = rai;
1046 				ifi->ifi_burstcount =
1047 				    MAX_INITIAL_RTR_ADVERTISEMENTS;
1048 				ifi->ifi_burstinterval =
1049 				    MAX_INITIAL_RTR_ADVERT_INTERVAL;
1050 			} else {
1051 				/* Replace ifi_rainfo with the new one */
1052 				rm_rainfo(ifi->ifi_rainfo);
1053 				ifi->ifi_rainfo = rai;
1054 			}
1055 			TAILQ_INSERT_TAIL(&railist, rai, rai_next);
1056 
1057 			ra_timer_update(ifi, &ifi->ifi_ra_timer->rat_tm);
1058 			rtadvd_set_timer(&ifi->ifi_ra_timer->rat_tm,
1059 			    ifi->ifi_ra_timer);
1060 		} else {
1061 			/* XXX: NOTREACHED.  Being shut down. */
1062 			syslog(LOG_ERR,
1063 			    "<%s> %s is shutting down.  Skipped.",
1064 			    __func__, ifi->ifi_ifname);
1065 			rm_rainfo(rai);
1066 
1067 			return (NULL);
1068 		}
1069 		break;
1070 	}
1071 
1072 	return (ifi);
1073 
1074 getconfig_free_rai:
1075 	free(rai);
1076 	return (NULL);
1077 }
1078 
1079 void
1080 get_prefix(struct rainfo *rai)
1081 {
1082 	struct ifaddrs *ifap, *ifa;
1083 	struct prefix *pfx;
1084 	struct in6_addr *a;
1085 	struct ifinfo *ifi;
1086 	char *p, *ep, *m, *lim;
1087 	char ntopbuf[INET6_ADDRSTRLEN];
1088 
1089 	if (getifaddrs(&ifap) < 0) {
1090 		syslog(LOG_ERR,
1091 		    "<%s> can't get interface addresses",
1092 		    __func__);
1093 		exit(1);
1094 	}
1095 	ifi = rai->rai_ifinfo;
1096 
1097 	for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
1098 		int plen;
1099 
1100 		if (strcmp(ifa->ifa_name, ifi->ifi_ifname) != 0)
1101 			continue;
1102 		if (ifa->ifa_addr->sa_family != AF_INET6)
1103 			continue;
1104 		a = &((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_addr;
1105 		if (IN6_IS_ADDR_LINKLOCAL(a))
1106 			continue;
1107 
1108 		/* get prefix length */
1109 		m = (char *)&((struct sockaddr_in6 *)ifa->ifa_netmask)->sin6_addr;
1110 		lim = (char *)(ifa->ifa_netmask) + ifa->ifa_netmask->sa_len;
1111 		plen = prefixlen(m, lim);
1112 		if (plen <= 0 || plen > 128) {
1113 			syslog(LOG_ERR, "<%s> failed to get prefixlen "
1114 			    "or prefix is invalid",
1115 			    __func__);
1116 			exit(1);
1117 		}
1118 		if (plen == 128)	/* XXX */
1119 			continue;
1120 		if (find_prefix(rai, a, plen)) {
1121 			/* ignore a duplicated prefix. */
1122 			continue;
1123 		}
1124 
1125 		/* allocate memory to store prefix info. */
1126 		ELM_MALLOC(pfx, exit(1));
1127 
1128 		/* set prefix, sweep bits outside of prefixlen */
1129 		pfx->pfx_prefixlen = plen;
1130 		memcpy(&pfx->pfx_prefix, a, sizeof(*a));
1131 		p = (char *)&pfx->pfx_prefix;
1132 		ep = (char *)(&pfx->pfx_prefix + 1);
1133 		while (m < lim && p < ep)
1134 			*p++ &= *m++;
1135 		while (p < ep)
1136 			*p++ = 0x00;
1137 	        if (!inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf,
1138 	            sizeof(ntopbuf))) {
1139 			syslog(LOG_ERR, "<%s> inet_ntop failed", __func__);
1140 			exit(1);
1141 		}
1142 		syslog(LOG_DEBUG,
1143 		    "<%s> add %s/%d to prefix list on %s",
1144 		    __func__, ntopbuf, pfx->pfx_prefixlen, ifi->ifi_ifname);
1145 
1146 		/* set other fields with protocol defaults */
1147 		pfx->pfx_validlifetime = DEF_ADVVALIDLIFETIME;
1148 		pfx->pfx_preflifetime = DEF_ADVPREFERREDLIFETIME;
1149 		pfx->pfx_onlinkflg = 1;
1150 		pfx->pfx_autoconfflg = 1;
1151 		pfx->pfx_origin = PREFIX_FROM_KERNEL;
1152 		pfx->pfx_rainfo = rai;
1153 
1154 		/* link into chain */
1155 		TAILQ_INSERT_TAIL(&rai->rai_prefix, pfx, pfx_next);
1156 
1157 		/* counter increment */
1158 		rai->rai_pfxs++;
1159 	}
1160 
1161 	freeifaddrs(ifap);
1162 }
1163 
1164 static void
1165 makeentry(char *buf, size_t len, int id, const char *string)
1166 {
1167 
1168 	if (id < 0)
1169 		strlcpy(buf, string, len);
1170 	else
1171 		snprintf(buf, len, "%s%d", string, id);
1172 }
1173 
1174 /*
1175  * Add a prefix to the list of specified interface and reconstruct
1176  * the outgoing packet.
1177  * The prefix must not be in the list.
1178  * XXX: other parameters of the prefix (e.g. lifetime) should be
1179  * able to be specified.
1180  */
1181 static void
1182 add_prefix(struct rainfo *rai, struct in6_prefixreq *ipr)
1183 {
1184 	struct prefix *pfx;
1185 	struct ifinfo *ifi;
1186 	char ntopbuf[INET6_ADDRSTRLEN];
1187 
1188 	ifi = rai->rai_ifinfo;
1189 	ELM_MALLOC(pfx, return);
1190 	pfx->pfx_prefix = ipr->ipr_prefix.sin6_addr;
1191 	pfx->pfx_prefixlen = ipr->ipr_plen;
1192 	pfx->pfx_validlifetime = ipr->ipr_vltime;
1193 	pfx->pfx_preflifetime = ipr->ipr_pltime;
1194 	pfx->pfx_onlinkflg = ipr->ipr_raf_onlink;
1195 	pfx->pfx_autoconfflg = ipr->ipr_raf_auto;
1196 	pfx->pfx_origin = PREFIX_FROM_DYNAMIC;
1197 	pfx->pfx_rainfo = rai;
1198 
1199 	TAILQ_INSERT_TAIL(&rai->rai_prefix, pfx, pfx_next);
1200 
1201 	syslog(LOG_DEBUG, "<%s> new prefix %s/%d was added on %s",
1202 	    __func__,
1203 	    inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr, ntopbuf,
1204 		sizeof(ntopbuf)), ipr->ipr_plen, ifi->ifi_ifname);
1205 
1206 	rai->rai_pfxs++;
1207 }
1208 
1209 /*
1210  * Delete a prefix to the list of specified interface and reconstruct
1211  * the outgoing packet.
1212  * The prefix must be in the list.
1213  */
1214 void
1215 delete_prefix(struct prefix *pfx)
1216 {
1217 	struct rainfo *rai;
1218 	struct ifinfo *ifi;
1219 	char ntopbuf[INET6_ADDRSTRLEN];
1220 
1221 	rai = pfx->pfx_rainfo;
1222 	ifi = rai->rai_ifinfo;
1223 	TAILQ_REMOVE(&rai->rai_prefix, pfx, pfx_next);
1224 	syslog(LOG_DEBUG, "<%s> prefix %s/%d was deleted on %s",
1225 	    __func__,
1226 	    inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf,
1227 		sizeof(ntopbuf)), pfx->pfx_prefixlen, ifi->ifi_ifname);
1228 	if (pfx->pfx_timer)
1229 		rtadvd_remove_timer(pfx->pfx_timer);
1230 	free(pfx);
1231 
1232 	rai->rai_pfxs--;
1233 }
1234 
1235 void
1236 invalidate_prefix(struct prefix *pfx)
1237 {
1238 	struct timespec timo;
1239 	struct rainfo *rai;
1240 	struct ifinfo *ifi;
1241 	char ntopbuf[INET6_ADDRSTRLEN];
1242 
1243 	rai = pfx->pfx_rainfo;
1244 	ifi = rai->rai_ifinfo;
1245 	if (pfx->pfx_timer) {	/* sanity check */
1246 		syslog(LOG_ERR,
1247 		    "<%s> assumption failure: timer already exists",
1248 		    __func__);
1249 		exit(1);
1250 	}
1251 
1252 	syslog(LOG_DEBUG, "<%s> prefix %s/%d was invalidated on %s, "
1253 	    "will expire in %ld seconds", __func__,
1254 	    inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf, sizeof(ntopbuf)),
1255 	    pfx->pfx_prefixlen, ifi->ifi_ifname, (long)prefix_timo);
1256 
1257 	/* set the expiration timer */
1258 	pfx->pfx_timer = rtadvd_add_timer(prefix_timeout, NULL, pfx, NULL);
1259 	if (pfx->pfx_timer == NULL) {
1260 		syslog(LOG_ERR, "<%s> failed to add a timer for a prefix. "
1261 		    "remove the prefix", __func__);
1262 		delete_prefix(pfx);
1263 	}
1264 	timo.tv_sec = prefix_timo;
1265 	timo.tv_nsec = 0;
1266 	rtadvd_set_timer(&timo, pfx->pfx_timer);
1267 }
1268 
1269 static struct rtadvd_timer *
1270 prefix_timeout(void *arg)
1271 {
1272 
1273 	delete_prefix((struct prefix *)arg);
1274 
1275 	return (NULL);
1276 }
1277 
1278 void
1279 update_prefix(struct prefix *pfx)
1280 {
1281 	struct rainfo *rai;
1282 	struct ifinfo *ifi;
1283 	char ntopbuf[INET6_ADDRSTRLEN];
1284 
1285 	rai = pfx->pfx_rainfo;
1286 	ifi = rai->rai_ifinfo;
1287 	if (pfx->pfx_timer == NULL) { /* sanity check */
1288 		syslog(LOG_ERR,
1289 		    "<%s> assumption failure: timer does not exist",
1290 		    __func__);
1291 		exit(1);
1292 	}
1293 
1294 	syslog(LOG_DEBUG, "<%s> prefix %s/%d was re-enabled on %s",
1295 	    __func__, inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf,
1296 		sizeof(ntopbuf)), pfx->pfx_prefixlen, ifi->ifi_ifname);
1297 
1298 	/* stop the expiration timer */
1299 	rtadvd_remove_timer(pfx->pfx_timer);
1300 	pfx->pfx_timer = NULL;
1301 }
1302 
1303 /*
1304  * Try to get an in6_prefixreq contents for a prefix which matches
1305  * ipr->ipr_prefix and ipr->ipr_plen and belongs to
1306  * the interface whose name is ipr->ipr_name[].
1307  */
1308 static int
1309 init_prefix(struct in6_prefixreq *ipr)
1310 {
1311 #if 0
1312 	int s;
1313 
1314 	if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
1315 		syslog(LOG_ERR, "<%s> socket: %s", __func__,
1316 		    strerror(errno));
1317 		exit(1);
1318 	}
1319 
1320 	if (ioctl(s, SIOCGIFPREFIX_IN6, (caddr_t)ipr) < 0) {
1321 		syslog(LOG_INFO, "<%s> ioctl:SIOCGIFPREFIX %s", __func__,
1322 		    strerror(errno));
1323 
1324 		ipr->ipr_vltime = DEF_ADVVALIDLIFETIME;
1325 		ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME;
1326 		ipr->ipr_raf_onlink = 1;
1327 		ipr->ipr_raf_auto = 1;
1328 		/* omit other field initialization */
1329 	}
1330 	else if (ipr->ipr_origin < PR_ORIG_RR) {
1331 		char ntopbuf[INET6_ADDRSTRLEN];
1332 
1333 		syslog(LOG_WARNING, "<%s> Added prefix(%s)'s origin %d is"
1334 		    "lower than PR_ORIG_RR(router renumbering)."
1335 		    "This should not happen if I am router", __func__,
1336 		    inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr, ntopbuf,
1337 			sizeof(ntopbuf)), ipr->ipr_origin);
1338 		close(s);
1339 		return (1);
1340 	}
1341 
1342 	close(s);
1343 	return (0);
1344 #else
1345 	ipr->ipr_vltime = DEF_ADVVALIDLIFETIME;
1346 	ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME;
1347 	ipr->ipr_raf_onlink = 1;
1348 	ipr->ipr_raf_auto = 1;
1349 	return (0);
1350 #endif
1351 }
1352 
1353 void
1354 make_prefix(struct rainfo *rai, int ifindex, struct in6_addr *addr, int plen)
1355 {
1356 	struct in6_prefixreq ipr;
1357 
1358 	memset(&ipr, 0, sizeof(ipr));
1359 	if (if_indextoname(ifindex, ipr.ipr_name) == NULL) {
1360 		syslog(LOG_ERR, "<%s> Prefix added interface No.%d doesn't "
1361 		    "exist. This should not happen! %s", __func__,
1362 		    ifindex, strerror(errno));
1363 		exit(1);
1364 	}
1365 	ipr.ipr_prefix.sin6_len = sizeof(ipr.ipr_prefix);
1366 	ipr.ipr_prefix.sin6_family = AF_INET6;
1367 	ipr.ipr_prefix.sin6_addr = *addr;
1368 	ipr.ipr_plen = plen;
1369 
1370 	if (init_prefix(&ipr))
1371 		return; /* init failed by some error */
1372 	add_prefix(rai, &ipr);
1373 }
1374 
1375 void
1376 make_packet(struct rainfo *rai)
1377 {
1378 	size_t packlen, lladdroptlen = 0;
1379 	char *buf;
1380 	struct nd_router_advert *ra;
1381 	struct nd_opt_prefix_info *ndopt_pi;
1382 	struct nd_opt_mtu *ndopt_mtu;
1383 	struct nd_opt_route_info *ndopt_rti;
1384 	struct rtinfo *rti;
1385 	struct nd_opt_rdnss *ndopt_rdnss;
1386 	struct rdnss *rdn;
1387 	struct nd_opt_dnssl *ndopt_dnssl;
1388 	struct dnssl *dns;
1389 	struct nd_opt_pref64 *ndopt_pref64;
1390 	size_t len;
1391 	struct prefix *pfx;
1392 	struct ifinfo *ifi;
1393 
1394 	ifi = rai->rai_ifinfo;
1395 	/* calculate total length */
1396 	packlen = sizeof(struct nd_router_advert);
1397 	if (rai->rai_advlinkopt) {
1398 		if ((lladdroptlen = lladdropt_length(&ifi->ifi_sdl)) == 0) {
1399 			syslog(LOG_INFO,
1400 			    "<%s> link-layer address option has"
1401 			    " null length on %s.  Treat as not included.",
1402 			    __func__, ifi->ifi_ifname);
1403 			rai->rai_advlinkopt = 0;
1404 		}
1405 		packlen += lladdroptlen;
1406 	}
1407 	if (rai->rai_pfxs)
1408 		packlen += sizeof(struct nd_opt_prefix_info) * rai->rai_pfxs;
1409 	if (rai->rai_linkmtu)
1410 		packlen += sizeof(struct nd_opt_mtu);
1411 	if (rai->rai_pref64.p64_enabled)
1412 		packlen += sizeof(struct nd_opt_pref64);
1413 
1414 	TAILQ_FOREACH(rti, &rai->rai_route, rti_next)
1415 		packlen += sizeof(struct nd_opt_route_info) +
1416 			   ((rti->rti_prefixlen + 0x3f) >> 6) * 8;
1417 
1418 	TAILQ_FOREACH(rdn, &rai->rai_rdnss, rd_next) {
1419 		struct rdnss_addr *rdna;
1420 
1421 		packlen += sizeof(struct nd_opt_rdnss);
1422 		TAILQ_FOREACH(rdna, &rdn->rd_list, ra_next)
1423 			packlen += sizeof(rdna->ra_dns);
1424 	}
1425 	TAILQ_FOREACH(dns, &rai->rai_dnssl, dn_next) {
1426 		struct dnssl_addr *dnsa;
1427 
1428 		packlen += sizeof(struct nd_opt_dnssl);
1429 		len = 0;
1430 		TAILQ_FOREACH(dnsa, &dns->dn_list, da_next)
1431 			len += dnsa->da_len;
1432 
1433 		/* A zero octet and 8 octet boundary */
1434 		len++;
1435 		len += (len % 8) ? 8 - len % 8 : 0;
1436 
1437 		packlen += len;
1438 	}
1439 	/* allocate memory for the packet */
1440 	if ((buf = malloc(packlen)) == NULL) {
1441 		syslog(LOG_ERR,
1442 		    "<%s> can't get enough memory for an RA packet",
1443 		    __func__);
1444 		exit(1);
1445 	}
1446 	memset(buf, 0, packlen);
1447 	if (rai->rai_ra_data)	/* Free old data if any. */
1448 		free(rai->rai_ra_data);
1449 	rai->rai_ra_data = buf;
1450 	/* XXX: what if packlen > 576? */
1451 	rai->rai_ra_datalen = packlen;
1452 
1453 	/*
1454 	 * construct the packet
1455 	 */
1456 	ra = (struct nd_router_advert *)buf;
1457 	ra->nd_ra_type = ND_ROUTER_ADVERT;
1458 	ra->nd_ra_code = 0;
1459 	ra->nd_ra_cksum = 0;
1460 	ra->nd_ra_curhoplimit = (uint8_t)(0xff & rai->rai_hoplimit);
1461 	/*
1462 	 * XXX: the router preference field, which is a 2-bit field, should be
1463 	 * initialized before other fields.
1464 	 */
1465 	ra->nd_ra_flags_reserved = 0xff & rai->rai_rtpref;
1466 	ra->nd_ra_flags_reserved |=
1467 		rai->rai_managedflg ? ND_RA_FLAG_MANAGED : 0;
1468 	ra->nd_ra_flags_reserved |=
1469 		rai->rai_otherflg ? ND_RA_FLAG_OTHER : 0;
1470 #ifdef DRAFT_IETF_6MAN_IPV6ONLY_FLAG
1471 	ra->nd_ra_flags_reserved |=
1472 		rai->rai_ipv6onlyflg ? ND_RA_FLAG_IPV6_ONLY : 0;
1473 #endif
1474 	ra->nd_ra_router_lifetime = htons(rai->rai_lifetime);
1475 	ra->nd_ra_reachable = htonl(rai->rai_reachabletime);
1476 	ra->nd_ra_retransmit = htonl(rai->rai_retranstimer);
1477 	buf += sizeof(*ra);
1478 
1479 	if (rai->rai_advlinkopt) {
1480 		lladdropt_fill(&ifi->ifi_sdl, (struct nd_opt_hdr *)buf);
1481 		buf += lladdroptlen;
1482 	}
1483 
1484 	if (rai->rai_linkmtu) {
1485 		ndopt_mtu = (struct nd_opt_mtu *)buf;
1486 		ndopt_mtu->nd_opt_mtu_type = ND_OPT_MTU;
1487 		ndopt_mtu->nd_opt_mtu_len = 1;
1488 		ndopt_mtu->nd_opt_mtu_reserved = 0;
1489 		ndopt_mtu->nd_opt_mtu_mtu = htonl(rai->rai_linkmtu);
1490 		buf += sizeof(struct nd_opt_mtu);
1491 	}
1492 
1493 	if (rai->rai_pref64.p64_enabled) {
1494 		ndopt_pref64 = (struct nd_opt_pref64 *)buf;
1495 		ndopt_pref64->nd_opt_pref64_type = ND_OPT_PREF64;
1496 		ndopt_pref64->nd_opt_pref64_len = 2;
1497 		ndopt_pref64->nd_opt_pref64_sl_plc =
1498 			(htons(rai->rai_pref64.p64_sl << 3)) |
1499 			htons((rai->rai_pref64.p64_plc & 0x7));
1500 		memcpy(&ndopt_pref64->nd_opt_prefix[0],
1501 		       &rai->rai_pref64.p64_prefix,
1502 		       sizeof(ndopt_pref64->nd_opt_prefix));
1503 		buf += sizeof(struct nd_opt_pref64);
1504 	}
1505 
1506 	TAILQ_FOREACH(pfx, &rai->rai_prefix, pfx_next) {
1507 		uint32_t vltime, pltime;
1508 		struct timespec now;
1509 
1510 		ndopt_pi = (struct nd_opt_prefix_info *)buf;
1511 		ndopt_pi->nd_opt_pi_type = ND_OPT_PREFIX_INFORMATION;
1512 		ndopt_pi->nd_opt_pi_len = 4;
1513 		ndopt_pi->nd_opt_pi_prefix_len = pfx->pfx_prefixlen;
1514 		ndopt_pi->nd_opt_pi_flags_reserved = 0;
1515 		if (pfx->pfx_onlinkflg)
1516 			ndopt_pi->nd_opt_pi_flags_reserved |=
1517 				ND_OPT_PI_FLAG_ONLINK;
1518 		if (pfx->pfx_autoconfflg)
1519 			ndopt_pi->nd_opt_pi_flags_reserved |=
1520 				ND_OPT_PI_FLAG_AUTO;
1521 		if (pfx->pfx_timer)
1522 			vltime = 0;
1523 		else {
1524 			if (pfx->pfx_vltimeexpire || pfx->pfx_pltimeexpire)
1525 				clock_gettime(CLOCK_MONOTONIC_FAST, &now);
1526 			if (pfx->pfx_vltimeexpire == 0)
1527 				vltime = pfx->pfx_validlifetime;
1528 			else
1529 				vltime = ((time_t)pfx->pfx_vltimeexpire > now.tv_sec) ?
1530 				    pfx->pfx_vltimeexpire - now.tv_sec : 0;
1531 		}
1532 		if (pfx->pfx_timer)
1533 			pltime = 0;
1534 		else {
1535 			if (pfx->pfx_pltimeexpire == 0)
1536 				pltime = pfx->pfx_preflifetime;
1537 			else
1538 				pltime = ((time_t)pfx->pfx_pltimeexpire > now.tv_sec) ?
1539 				    pfx->pfx_pltimeexpire - now.tv_sec : 0;
1540 		}
1541 		if (vltime < pltime) {
1542 			/*
1543 			 * this can happen if vltime is decrement but pltime
1544 			 * is not.
1545 			 */
1546 			pltime = vltime;
1547 		}
1548 		ndopt_pi->nd_opt_pi_valid_time = htonl(vltime);
1549 		ndopt_pi->nd_opt_pi_preferred_time = htonl(pltime);
1550 		ndopt_pi->nd_opt_pi_reserved2 = 0;
1551 		ndopt_pi->nd_opt_pi_prefix = pfx->pfx_prefix;
1552 
1553 		buf += sizeof(struct nd_opt_prefix_info);
1554 	}
1555 
1556 	TAILQ_FOREACH(rti, &rai->rai_route, rti_next) {
1557 		uint8_t psize = (rti->rti_prefixlen + 0x3f) >> 6;
1558 
1559 		ndopt_rti = (struct nd_opt_route_info *)buf;
1560 		ndopt_rti->nd_opt_rti_type = ND_OPT_ROUTE_INFO;
1561 		ndopt_rti->nd_opt_rti_len = 1 + psize;
1562 		ndopt_rti->nd_opt_rti_prefixlen = rti->rti_prefixlen;
1563 		ndopt_rti->nd_opt_rti_flags = 0xff & rti->rti_rtpref;
1564 		ndopt_rti->nd_opt_rti_lifetime = htonl(rti->rti_ltime);
1565 		memcpy(ndopt_rti + 1, &rti->rti_prefix, psize * 8);
1566 		buf += sizeof(struct nd_opt_route_info) + psize * 8;
1567 	}
1568 
1569 	TAILQ_FOREACH(rdn, &rai->rai_rdnss, rd_next) {
1570 		struct rdnss_addr *rdna;
1571 
1572 		ndopt_rdnss = (struct nd_opt_rdnss *)buf;
1573 		ndopt_rdnss->nd_opt_rdnss_type = ND_OPT_RDNSS;
1574 		ndopt_rdnss->nd_opt_rdnss_len = 0;
1575 		ndopt_rdnss->nd_opt_rdnss_reserved = 0;
1576 		ndopt_rdnss->nd_opt_rdnss_lifetime = htonl(rdn->rd_ltime);
1577 		buf += sizeof(struct nd_opt_rdnss);
1578 
1579 		TAILQ_FOREACH(rdna, &rdn->rd_list, ra_next) {
1580 			memcpy(buf, &rdna->ra_dns, sizeof(rdna->ra_dns));
1581 			buf += sizeof(rdna->ra_dns);
1582 		}
1583 		/* Length field should be in 8 octets */
1584 		ndopt_rdnss->nd_opt_rdnss_len = (buf - (char *)ndopt_rdnss) / 8;
1585 
1586 		syslog(LOG_DEBUG, "<%s>: nd_opt_dnss_len = %d", __func__,
1587 		    ndopt_rdnss->nd_opt_rdnss_len);
1588 	}
1589 
1590 	TAILQ_FOREACH(dns, &rai->rai_dnssl, dn_next) {
1591 		struct dnssl_addr *dnsa;
1592 
1593 		ndopt_dnssl = (struct nd_opt_dnssl *)buf;
1594 		ndopt_dnssl->nd_opt_dnssl_type = ND_OPT_DNSSL;
1595 		ndopt_dnssl->nd_opt_dnssl_len = 0;
1596 		ndopt_dnssl->nd_opt_dnssl_reserved = 0;
1597 		ndopt_dnssl->nd_opt_dnssl_lifetime = htonl(dns->dn_ltime);
1598 		buf += sizeof(*ndopt_dnssl);
1599 
1600 		TAILQ_FOREACH(dnsa, &dns->dn_list, da_next) {
1601 			memcpy(buf, dnsa->da_dom, dnsa->da_len);
1602 			buf += dnsa->da_len;
1603 		}
1604 
1605 		/* A zero octet after encoded DNS server list. */
1606 		*buf++ = '\0';
1607 
1608 		/* Padding to next 8 octets boundary */
1609 		len = buf - (char *)ndopt_dnssl;
1610 		len += (len % 8) ? 8 - len % 8 : 0;
1611 		buf = (char *)ndopt_dnssl + len;
1612 
1613 		/* Length field must be in 8 octets */
1614 		ndopt_dnssl->nd_opt_dnssl_len = len / 8;
1615 
1616 		syslog(LOG_DEBUG, "<%s>: nd_opt_dnssl_len = %d", __func__,
1617 		    ndopt_dnssl->nd_opt_dnssl_len);
1618 	}
1619 }
1620