1 /* $FreeBSD$ */ 2 /* $KAME: config.c,v 1.84 2003/08/05 12:34:23 itojun Exp $ */ 3 4 /* 5 * Copyright (C) 1998 WIDE Project. 6 * Copyright (C) 2011 Hiroki Sato <hrs@FreeBSD.org> 7 * All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 3. Neither the name of the project nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34 #include <sys/param.h> 35 #include <sys/ioctl.h> 36 #include <sys/socket.h> 37 38 #include <net/if.h> 39 #include <net/if_var.h> 40 #include <net/route.h> 41 #include <net/if_dl.h> 42 43 #include <netinet/in.h> 44 #include <netinet/in_var.h> 45 #include <netinet/ip6.h> 46 #include <netinet6/ip6_var.h> 47 #include <netinet/icmp6.h> 48 #include <netinet6/nd6.h> 49 50 #include <arpa/inet.h> 51 52 #include <stdio.h> 53 #include <syslog.h> 54 #include <errno.h> 55 #include <inttypes.h> 56 #include <netdb.h> 57 #include <string.h> 58 #include <search.h> 59 #include <stdlib.h> 60 #include <time.h> 61 #include <unistd.h> 62 #include <ifaddrs.h> 63 64 #include "rtadvd.h" 65 #include "advcap.h" 66 #include "timer.h" 67 #include "if.h" 68 #include "config.h" 69 70 /* label of tcapcode + number + domain name + zero octet */ 71 static char entbuf[10 + 3 + NI_MAXHOST + 1]; 72 static char oentbuf[10 + 3 + NI_MAXHOST + 1]; 73 static char abuf[DNAME_LABELENC_MAXLEN]; 74 75 static time_t prefix_timo = (60 * 120); /* 2 hours. 76 * XXX: should be configurable. */ 77 78 static struct rtadvd_timer *prefix_timeout(void *); 79 static void makeentry(char *, size_t, int, const char *); 80 static size_t dname_labelenc(char *, const char *); 81 82 /* Encode domain name label encoding in RFC 1035 Section 3.1 */ 83 static size_t 84 dname_labelenc(char *dst, const char *src) 85 { 86 char *dst_origin; 87 char *p; 88 size_t len; 89 90 dst_origin = dst; 91 len = strlen(src); 92 93 /* Length fields per 63 octets + '\0' (<= DNAME_LABELENC_MAXLEN) */ 94 memset(dst, 0, len + len / 64 + 1 + 1); 95 96 syslog(LOG_DEBUG, "<%s> labelenc = %s", __func__, src); 97 while (src && (len = strlen(src)) != 0) { 98 /* Put a length field with 63 octet limitation first. */ 99 p = strchr(src, '.'); 100 if (p == NULL) 101 *dst++ = len = MIN(63, len); 102 else 103 *dst++ = len = MIN(63, p - src); 104 /* Copy 63 octets at most. */ 105 memcpy(dst, src, len); 106 dst += len; 107 if (p == NULL) /* the last label */ 108 break; 109 src = p + 1; 110 } 111 /* Always need a 0-length label at the tail. */ 112 *dst++ = '\0'; 113 114 syslog(LOG_DEBUG, "<%s> labellen = %td", __func__, dst - dst_origin); 115 return (dst - dst_origin); 116 } 117 118 #define MUSTHAVE(var, cap) \ 119 do { \ 120 int64_t t; \ 121 if ((t = agetnum(cap)) < 0) { \ 122 fprintf(stderr, "rtadvd: need %s for interface %s\n", \ 123 cap, intface); \ 124 exit(1); \ 125 } \ 126 var = t; \ 127 } while (0) 128 129 #define MAYHAVE(var, cap, def) \ 130 do { \ 131 if ((var = agetnum(cap)) < 0) \ 132 var = def; \ 133 } while (0) 134 135 int 136 loadconfig_index(int idx) 137 { 138 char ifname[IFNAMSIZ]; 139 140 syslog(LOG_DEBUG, "<%s> enter", __func__); 141 142 if (if_indextoname(idx, ifname) != NULL) 143 return (loadconfig_ifname(ifname)); 144 else 145 return (1); 146 } 147 148 int 149 loadconfig_ifname(char *ifname) 150 { 151 struct ifinfo *ifi; 152 153 syslog(LOG_DEBUG, "<%s> enter", __func__); 154 155 update_ifinfo(&ifilist, UPDATE_IFINFO_ALL); 156 TAILQ_FOREACH(ifi, &ifilist, ifi_next) { 157 /* NULL means all IFs will be processed. */ 158 if (ifname != NULL && 159 strcmp(ifi->ifi_ifname, ifname) != 0) 160 continue; 161 162 if (!ifi->ifi_persist) { 163 syslog(LOG_INFO, 164 "<%s> %s is not a target interface. " 165 "Ignored at this moment.", __func__, 166 ifi->ifi_ifname); 167 continue; 168 169 } 170 if (ifi->ifi_ifindex == 0) { 171 syslog(LOG_ERR, 172 "<%s> %s not found. " 173 "Ignored at this moment.", __func__, 174 ifi->ifi_ifname); 175 continue; 176 } 177 if (getconfig(ifi) == NULL) { 178 syslog(LOG_ERR, 179 "<%s> invalid configuration for %s. " 180 "Ignored at this moment.", __func__, 181 ifi->ifi_ifname); 182 continue; 183 } 184 } 185 return (0); 186 } 187 188 int 189 rm_ifinfo_index(int idx) 190 { 191 struct ifinfo *ifi; 192 193 ifi = if_indextoifinfo(idx); 194 if (ifi == NULL) { 195 syslog(LOG_ERR, "<%s>: ifinfo not found (idx=%d)", 196 __func__, idx); 197 return (-1); 198 } 199 200 return (rm_ifinfo(ifi)); 201 } 202 203 int 204 rm_ifinfo(struct ifinfo *ifi) 205 { 206 int error; 207 208 syslog(LOG_DEBUG, "<%s> enter (%s).", __func__, ifi->ifi_ifname); 209 switch (ifi->ifi_state) { 210 case IFI_STATE_UNCONFIGURED: 211 return (0); 212 break; 213 default: 214 ifi->ifi_state = IFI_STATE_UNCONFIGURED; 215 syslog(LOG_DEBUG, 216 "<%s> ifname=%s marked as UNCONFIGURED.", 217 __func__, ifi->ifi_ifname); 218 219 /* XXX: No MC leaving here because index is disappeared */ 220 221 /* Inactivate timer */ 222 rtadvd_remove_timer(ifi->ifi_ra_timer); 223 ifi->ifi_ra_timer = NULL; 224 break; 225 } 226 227 /* clean up ifi */ 228 if (!ifi->ifi_persist) { 229 TAILQ_REMOVE(&ifilist, ifi, ifi_next); 230 syslog(LOG_DEBUG, "<%s>: ifinfo (idx=%d) removed.", 231 __func__, ifi->ifi_ifindex); 232 free(ifi); 233 } else { 234 /* recreate an empty entry */ 235 update_persist_ifinfo(&ifilist, ifi->ifi_ifname); 236 syslog(LOG_DEBUG, "<%s>: ifname=%s is persistent.", 237 __func__, ifi->ifi_ifname); 238 } 239 240 /* clean up rai if any */ 241 switch (ifi->ifi_state) { 242 case IFI_STATE_CONFIGURED: 243 if (ifi->ifi_rainfo != NULL) { 244 error = rm_rainfo(ifi->ifi_rainfo); 245 if (error) 246 return (error); 247 ifi->ifi_rainfo = NULL; 248 } 249 break; 250 case IFI_STATE_TRANSITIVE: 251 if (ifi->ifi_rainfo == ifi->ifi_rainfo_trans) { 252 if (ifi->ifi_rainfo != NULL) { 253 error = rm_rainfo(ifi->ifi_rainfo); 254 if (error) 255 return (error); 256 ifi->ifi_rainfo = NULL; 257 ifi->ifi_rainfo_trans = NULL; 258 } 259 } else { 260 if (ifi->ifi_rainfo != NULL) { 261 error = rm_rainfo(ifi->ifi_rainfo); 262 if (error) 263 return (error); 264 ifi->ifi_rainfo = NULL; 265 } 266 if (ifi->ifi_rainfo_trans != NULL) { 267 error = rm_rainfo(ifi->ifi_rainfo_trans); 268 if (error) 269 return (error); 270 ifi->ifi_rainfo_trans = NULL; 271 } 272 } 273 } 274 275 syslog(LOG_DEBUG, "<%s> leave (%s).", __func__, ifi->ifi_ifname); 276 return (0); 277 } 278 279 int 280 rm_rainfo(struct rainfo *rai) 281 { 282 struct prefix *pfx; 283 struct soliciter *sol; 284 struct rdnss *rdn; 285 struct rdnss_addr *rdna; 286 struct dnssl *dns; 287 struct rtinfo *rti; 288 289 syslog(LOG_DEBUG, "<%s>: enter", __func__); 290 291 TAILQ_REMOVE(&railist, rai, rai_next); 292 if (rai->rai_ifinfo != NULL) 293 syslog(LOG_DEBUG, "<%s>: rainfo (idx=%d) removed.", 294 __func__, rai->rai_ifinfo->ifi_ifindex); 295 296 if (rai->rai_ra_data != NULL) 297 free(rai->rai_ra_data); 298 299 while ((pfx = TAILQ_FIRST(&rai->rai_prefix)) != NULL) 300 delete_prefix(pfx); 301 while ((sol = TAILQ_FIRST(&rai->rai_soliciter)) != NULL) { 302 TAILQ_REMOVE(&rai->rai_soliciter, sol, sol_next); 303 free(sol); 304 } 305 while ((rdn = TAILQ_FIRST(&rai->rai_rdnss)) != NULL) { 306 TAILQ_REMOVE(&rai->rai_rdnss, rdn, rd_next); 307 while ((rdna = TAILQ_FIRST(&rdn->rd_list)) != NULL) { 308 TAILQ_REMOVE(&rdn->rd_list, rdna, ra_next); 309 free(rdna); 310 } 311 free(rdn); 312 } 313 while ((dns = TAILQ_FIRST(&rai->rai_dnssl)) != NULL) { 314 TAILQ_REMOVE(&rai->rai_dnssl, dns, dn_next); 315 free(dns); 316 } 317 while ((rti = TAILQ_FIRST(&rai->rai_route)) != NULL) { 318 TAILQ_REMOVE(&rai->rai_route, rti, rti_next); 319 free(rti); 320 } 321 free(rai); 322 syslog(LOG_DEBUG, "<%s>: leave", __func__); 323 324 return (0); 325 } 326 327 struct ifinfo * 328 getconfig(struct ifinfo *ifi) 329 { 330 int stat, i; 331 int error; 332 char tbuf[BUFSIZ]; 333 struct rainfo *rai; 334 struct rainfo *rai_old; 335 int32_t val; 336 int64_t val64; 337 char buf[BUFSIZ]; 338 char *bp = buf; 339 char *addr, *flagstr; 340 341 if (ifi == NULL) /* if does not exist */ 342 return (NULL); 343 344 if (ifi->ifi_state == IFI_STATE_TRANSITIVE && 345 ifi->ifi_rainfo == NULL) { 346 syslog(LOG_INFO, "<%s> %s is shutting down. Skipped.", 347 __func__, ifi->ifi_ifname); 348 return (NULL); 349 } 350 351 if ((stat = agetent(tbuf, ifi->ifi_ifname)) <= 0) { 352 memset(tbuf, 0, sizeof(tbuf)); 353 syslog(LOG_INFO, 354 "<%s> %s isn't defined in the configuration file" 355 " or the configuration file doesn't exist." 356 " Treat it as default", 357 __func__, ifi->ifi_ifname); 358 } 359 360 ELM_MALLOC(rai, exit(1)); 361 TAILQ_INIT(&rai->rai_prefix); 362 TAILQ_INIT(&rai->rai_route); 363 TAILQ_INIT(&rai->rai_rdnss); 364 TAILQ_INIT(&rai->rai_dnssl); 365 TAILQ_INIT(&rai->rai_soliciter); 366 rai->rai_ifinfo = ifi; 367 368 /* gather on-link prefixes from the network interfaces. */ 369 if (agetflag("noifprefix")) 370 rai->rai_advifprefix = 0; 371 else 372 rai->rai_advifprefix = 1; 373 374 /* get interface information */ 375 if (agetflag("nolladdr")) 376 rai->rai_advlinkopt = 0; 377 else 378 rai->rai_advlinkopt = 1; 379 if (rai->rai_advlinkopt) { 380 if (ifi->ifi_sdl.sdl_type == 0) { 381 syslog(LOG_ERR, 382 "<%s> can't get information of %s", 383 __func__, ifi->ifi_ifname); 384 goto getconfig_free_rai; 385 } 386 } 387 388 /* 389 * set router configuration variables. 390 */ 391 MAYHAVE(val, "maxinterval", DEF_MAXRTRADVINTERVAL); 392 if (val < MIN_MAXINTERVAL || val > MAX_MAXINTERVAL) { 393 syslog(LOG_ERR, 394 "<%s> maxinterval (%" PRIu32 ") on %s is invalid " 395 "(must be between %u and %u)", __func__, val, 396 ifi->ifi_ifname, MIN_MAXINTERVAL, MAX_MAXINTERVAL); 397 goto getconfig_free_rai; 398 } 399 rai->rai_maxinterval = (uint16_t)val; 400 401 MAYHAVE(val, "mininterval", rai->rai_maxinterval/3); 402 if ((uint16_t)val < MIN_MININTERVAL || 403 (uint16_t)val > (rai->rai_maxinterval * 3) / 4) { 404 syslog(LOG_ERR, 405 "<%s> mininterval (%" PRIu32 ") on %s is invalid " 406 "(must be between %d and %d)", 407 __func__, val, ifi->ifi_ifname, MIN_MININTERVAL, 408 (rai->rai_maxinterval * 3) / 4); 409 goto getconfig_free_rai; 410 } 411 rai->rai_mininterval = (uint16_t)val; 412 413 MAYHAVE(val, "chlim", DEF_ADVCURHOPLIMIT); 414 rai->rai_hoplimit = val & 0xff; 415 416 if ((flagstr = (char *)agetstr("raflags", &bp))) { 417 val = 0; 418 if (strchr(flagstr, 'm')) 419 val |= ND_RA_FLAG_MANAGED; 420 if (strchr(flagstr, 'o')) 421 val |= ND_RA_FLAG_OTHER; 422 if (strchr(flagstr, 'h')) 423 val |= ND_RA_FLAG_RTPREF_HIGH; 424 if (strchr(flagstr, 'l')) { 425 if ((val & ND_RA_FLAG_RTPREF_HIGH)) { 426 syslog(LOG_ERR, "<%s> the \'h\' and \'l\'" 427 " router flags are exclusive", __func__); 428 goto getconfig_free_rai; 429 } 430 val |= ND_RA_FLAG_RTPREF_LOW; 431 } 432 } else 433 MAYHAVE(val, "raflags", 0); 434 435 rai->rai_managedflg = val & ND_RA_FLAG_MANAGED; 436 rai->rai_otherflg = val & ND_RA_FLAG_OTHER; 437 #ifndef ND_RA_FLAG_RTPREF_MASK 438 #define ND_RA_FLAG_RTPREF_MASK 0x18 /* 00011000 */ 439 #define ND_RA_FLAG_RTPREF_RSV 0x10 /* 00010000 */ 440 #endif 441 rai->rai_rtpref = val & ND_RA_FLAG_RTPREF_MASK; 442 if (rai->rai_rtpref == ND_RA_FLAG_RTPREF_RSV) { 443 syslog(LOG_ERR, "<%s> invalid router preference (%02x) on %s", 444 __func__, rai->rai_rtpref, ifi->ifi_ifname); 445 goto getconfig_free_rai; 446 } 447 448 MAYHAVE(val, "rltime", rai->rai_maxinterval * 3); 449 if ((uint16_t)val && ((uint16_t)val < rai->rai_maxinterval || 450 (uint16_t)val > MAXROUTERLIFETIME)) { 451 syslog(LOG_ERR, 452 "<%s> router lifetime (%" PRIu32 ") on %s is invalid " 453 "(must be 0 or between %d and %d)", 454 __func__, val, ifi->ifi_ifname, rai->rai_maxinterval, 455 MAXROUTERLIFETIME); 456 goto getconfig_free_rai; 457 } 458 rai->rai_lifetime = val & 0xffff; 459 460 MAYHAVE(val, "rtime", DEF_ADVREACHABLETIME); 461 if (val < 0 || val > MAXREACHABLETIME) { 462 syslog(LOG_ERR, 463 "<%s> reachable time (%" PRIu32 ") on %s is invalid " 464 "(must be no greater than %d)", 465 __func__, val, ifi->ifi_ifname, MAXREACHABLETIME); 466 goto getconfig_free_rai; 467 } 468 rai->rai_reachabletime = (uint32_t)val; 469 470 MAYHAVE(val64, "retrans", DEF_ADVRETRANSTIMER); 471 if (val64 < 0 || val64 > 0xffffffff) { 472 syslog(LOG_ERR, "<%s> retrans time (%" PRIu64 ") on %s out of range", 473 __func__, val64, ifi->ifi_ifname); 474 goto getconfig_free_rai; 475 } 476 rai->rai_retranstimer = (uint32_t)val64; 477 478 if (agetnum("hapref") != -1 || agetnum("hatime") != -1) { 479 syslog(LOG_ERR, 480 "<%s> mobile-ip6 configuration not supported", 481 __func__); 482 goto getconfig_free_rai; 483 } 484 /* prefix information */ 485 486 /* 487 * This is an implementation specific parameter to consider 488 * link propagation delays and poorly synchronized clocks when 489 * checking consistency of advertised lifetimes. 490 */ 491 MAYHAVE(val, "clockskew", 0); 492 rai->rai_clockskew = val; 493 494 rai->rai_pfxs = 0; 495 for (i = -1; i < MAXPREFIX; i++) { 496 struct prefix *pfx; 497 498 makeentry(entbuf, sizeof(entbuf), i, "addr"); 499 addr = (char *)agetstr(entbuf, &bp); 500 if (addr == NULL) 501 continue; 502 503 /* allocate memory to store prefix information */ 504 ELM_MALLOC(pfx, exit(1)); 505 pfx->pfx_rainfo = rai; 506 pfx->pfx_origin = PREFIX_FROM_CONFIG; 507 508 if (inet_pton(AF_INET6, addr, &pfx->pfx_prefix) != 1) { 509 syslog(LOG_ERR, 510 "<%s> inet_pton failed for %s", 511 __func__, addr); 512 goto getconfig_free_pfx; 513 } 514 if (IN6_IS_ADDR_MULTICAST(&pfx->pfx_prefix)) { 515 syslog(LOG_ERR, 516 "<%s> multicast prefix (%s) must " 517 "not be advertised on %s", 518 __func__, addr, ifi->ifi_ifname); 519 goto getconfig_free_pfx; 520 } 521 if (IN6_IS_ADDR_LINKLOCAL(&pfx->pfx_prefix)) 522 syslog(LOG_NOTICE, 523 "<%s> link-local prefix (%s) will be" 524 " advertised on %s", 525 __func__, addr, ifi->ifi_ifname); 526 527 makeentry(entbuf, sizeof(entbuf), i, "prefixlen"); 528 MAYHAVE(val, entbuf, 64); 529 if (val < 0 || val > 128) { 530 syslog(LOG_ERR, "<%s> prefixlen (%" PRIu32 ") for %s " 531 "on %s out of range", 532 __func__, val, addr, ifi->ifi_ifname); 533 goto getconfig_free_pfx; 534 } 535 pfx->pfx_prefixlen = (int)val; 536 537 makeentry(entbuf, sizeof(entbuf), i, "pinfoflags"); 538 if ((flagstr = (char *)agetstr(entbuf, &bp))) { 539 val = 0; 540 if (strchr(flagstr, 'l')) 541 val |= ND_OPT_PI_FLAG_ONLINK; 542 if (strchr(flagstr, 'a')) 543 val |= ND_OPT_PI_FLAG_AUTO; 544 } else { 545 MAYHAVE(val, entbuf, 546 (ND_OPT_PI_FLAG_ONLINK|ND_OPT_PI_FLAG_AUTO)); 547 } 548 pfx->pfx_onlinkflg = val & ND_OPT_PI_FLAG_ONLINK; 549 pfx->pfx_autoconfflg = val & ND_OPT_PI_FLAG_AUTO; 550 551 makeentry(entbuf, sizeof(entbuf), i, "vltime"); 552 MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME); 553 if (val64 < 0 || val64 > 0xffffffff) { 554 syslog(LOG_ERR, "<%s> vltime (%" PRIu64 ") for " 555 "%s/%d on %s is out of range", 556 __func__, val64, 557 addr, pfx->pfx_prefixlen, ifi->ifi_ifname); 558 goto getconfig_free_pfx; 559 } 560 pfx->pfx_validlifetime = (uint32_t)val64; 561 562 makeentry(entbuf, sizeof(entbuf), i, "vltimedecr"); 563 if (agetflag(entbuf)) { 564 struct timespec now; 565 566 clock_gettime(CLOCK_MONOTONIC_FAST, &now); 567 pfx->pfx_vltimeexpire = 568 now.tv_sec + pfx->pfx_validlifetime; 569 } 570 571 makeentry(entbuf, sizeof(entbuf), i, "pltime"); 572 MAYHAVE(val64, entbuf, DEF_ADVPREFERREDLIFETIME); 573 if (val64 < 0 || val64 > 0xffffffff) { 574 syslog(LOG_ERR, 575 "<%s> pltime (%" PRIu64 ") for %s/%d on %s " 576 "is out of range", 577 __func__, val64, 578 addr, pfx->pfx_prefixlen, ifi->ifi_ifname); 579 goto getconfig_free_pfx; 580 } 581 pfx->pfx_preflifetime = (uint32_t)val64; 582 583 makeentry(entbuf, sizeof(entbuf), i, "pltimedecr"); 584 if (agetflag(entbuf)) { 585 struct timespec now; 586 587 clock_gettime(CLOCK_MONOTONIC_FAST, &now); 588 pfx->pfx_pltimeexpire = 589 now.tv_sec + pfx->pfx_preflifetime; 590 } 591 /* link into chain */ 592 TAILQ_INSERT_TAIL(&rai->rai_prefix, pfx, pfx_next); 593 rai->rai_pfxs++; 594 continue; 595 getconfig_free_pfx: 596 free(pfx); 597 } 598 if (rai->rai_advifprefix && rai->rai_pfxs == 0) 599 get_prefix(rai); 600 601 MAYHAVE(val64, "mtu", 0); 602 if (val < 0 || val64 > 0xffffffff) { 603 syslog(LOG_ERR, 604 "<%s> mtu (%" PRIu64 ") on %s out of range", 605 __func__, val64, ifi->ifi_ifname); 606 goto getconfig_free_rai; 607 } 608 rai->rai_linkmtu = (uint32_t)val64; 609 if (rai->rai_linkmtu == 0) { 610 char *mtustr; 611 612 if ((mtustr = (char *)agetstr("mtu", &bp)) && 613 strcmp(mtustr, "auto") == 0) 614 rai->rai_linkmtu = ifi->ifi_phymtu; 615 } 616 else if (rai->rai_linkmtu < IPV6_MMTU || 617 rai->rai_linkmtu > ifi->ifi_phymtu) { 618 syslog(LOG_ERR, 619 "<%s> advertised link mtu (%" PRIu32 ") on %s is invalid (must " 620 "be between least MTU (%d) and physical link MTU (%d)", 621 __func__, rai->rai_linkmtu, ifi->ifi_ifname, 622 IPV6_MMTU, ifi->ifi_phymtu); 623 goto getconfig_free_rai; 624 } 625 626 #ifdef SIOCSIFINFO_IN6 627 { 628 struct in6_ndireq ndi; 629 int s; 630 631 if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) { 632 syslog(LOG_ERR, "<%s> socket: %s", __func__, 633 strerror(errno)); 634 exit(1); 635 } 636 memset(&ndi, 0, sizeof(ndi)); 637 strncpy(ndi.ifname, ifi->ifi_ifname, sizeof(ndi.ifname)); 638 if (ioctl(s, SIOCGIFINFO_IN6, (caddr_t)&ndi) < 0) 639 syslog(LOG_INFO, "<%s> ioctl:SIOCGIFINFO_IN6 at %s: %s", 640 __func__, ifi->ifi_ifname, strerror(errno)); 641 642 /* reflect the RA info to the host variables in kernel */ 643 ndi.ndi.chlim = rai->rai_hoplimit; 644 ndi.ndi.retrans = rai->rai_retranstimer; 645 ndi.ndi.basereachable = rai->rai_reachabletime; 646 if (ioctl(s, SIOCSIFINFO_IN6, (caddr_t)&ndi) < 0) 647 syslog(LOG_INFO, "<%s> ioctl:SIOCSIFINFO_IN6 at %s: %s", 648 __func__, ifi->ifi_ifname, strerror(errno)); 649 650 close(s); 651 } 652 #endif 653 654 /* route information */ 655 rai->rai_routes = 0; 656 for (i = -1; i < MAXROUTE; i++) { 657 struct rtinfo *rti; 658 659 makeentry(entbuf, sizeof(entbuf), i, "rtprefix"); 660 addr = (char *)agetstr(entbuf, &bp); 661 if (addr == NULL) { 662 makeentry(oentbuf, sizeof(oentbuf), i, "rtrprefix"); 663 addr = (char *)agetstr(oentbuf, &bp); 664 if (addr) 665 fprintf(stderr, "%s was obsoleted. Use %s.\n", 666 oentbuf, entbuf); 667 } 668 if (addr == NULL) 669 continue; 670 671 /* allocate memory to store prefix information */ 672 ELM_MALLOC(rti, exit(1)); 673 674 if (inet_pton(AF_INET6, addr, &rti->rti_prefix) != 1) { 675 syslog(LOG_ERR, "<%s> inet_pton failed for %s", 676 __func__, addr); 677 goto getconfig_free_rti; 678 } 679 #if 0 680 /* 681 * XXX: currently there's no restriction in route information 682 * prefix according to 683 * draft-ietf-ipngwg-router-selection-00.txt. 684 * However, I think the similar restriction be necessary. 685 */ 686 MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME); 687 if (IN6_IS_ADDR_MULTICAST(&rti->prefix)) { 688 syslog(LOG_ERR, 689 "<%s> multicast route (%s) must " 690 "not be advertised on %s", 691 __func__, addr, ifi->ifi_ifname); 692 goto getconfig_free_rti; 693 } 694 if (IN6_IS_ADDR_LINKLOCAL(&rti->prefix)) { 695 syslog(LOG_NOTICE, 696 "<%s> link-local route (%s) will " 697 "be advertised on %s", 698 __func__, addr, ifi->ifi_ifname); 699 goto getconfig_free_rti; 700 } 701 #endif 702 703 makeentry(entbuf, sizeof(entbuf), i, "rtplen"); 704 /* XXX: 256 is a magic number for compatibility check. */ 705 MAYHAVE(val, entbuf, 256); 706 if (val == 256) { 707 makeentry(oentbuf, sizeof(oentbuf), i, "rtrplen"); 708 MAYHAVE(val, oentbuf, 256); 709 if (val != 256) 710 fprintf(stderr, "%s was obsoleted. Use %s.\n", 711 oentbuf, entbuf); 712 else 713 val = 64; 714 } 715 if (val < 0 || val > 128) { 716 syslog(LOG_ERR, "<%s> prefixlen (%" PRIu32 ") for %s on %s " 717 "out of range", 718 __func__, val, addr, ifi->ifi_ifname); 719 goto getconfig_free_rti; 720 } 721 rti->rti_prefixlen = (int)val; 722 723 makeentry(entbuf, sizeof(entbuf), i, "rtflags"); 724 if ((flagstr = (char *)agetstr(entbuf, &bp))) { 725 val = 0; 726 if (strchr(flagstr, 'h')) 727 val |= ND_RA_FLAG_RTPREF_HIGH; 728 if (strchr(flagstr, 'l')) { 729 if ((val & ND_RA_FLAG_RTPREF_HIGH)) { 730 syslog(LOG_ERR, 731 "<%s> the \'h\' and \'l\' route" 732 " preferences are exclusive", 733 __func__); 734 goto getconfig_free_rti; 735 } 736 val |= ND_RA_FLAG_RTPREF_LOW; 737 } 738 } else 739 MAYHAVE(val, entbuf, 256); /* XXX */ 740 if (val == 256) { 741 makeentry(oentbuf, sizeof(oentbuf), i, "rtrflags"); 742 MAYHAVE(val, oentbuf, 256); 743 if (val != 256) { 744 fprintf(stderr, "%s was obsoleted. Use %s.\n", 745 oentbuf, entbuf); 746 } else 747 val = 0; 748 } 749 rti->rti_rtpref = val & ND_RA_FLAG_RTPREF_MASK; 750 if (rti->rti_rtpref == ND_RA_FLAG_RTPREF_RSV) { 751 syslog(LOG_ERR, "<%s> invalid route preference (%02x) " 752 "for %s/%d on %s", 753 __func__, rti->rti_rtpref, addr, 754 rti->rti_prefixlen, ifi->ifi_ifname); 755 goto getconfig_free_rti; 756 } 757 758 /* 759 * Since the spec does not a default value, we should make 760 * this entry mandatory. However, FreeBSD 4.4 has shipped 761 * with this field being optional, we use the router lifetime 762 * as an ad-hoc default value with a warning message. 763 */ 764 makeentry(entbuf, sizeof(entbuf), i, "rtltime"); 765 MAYHAVE(val64, entbuf, -1); 766 if (val64 == -1) { 767 makeentry(oentbuf, sizeof(oentbuf), i, "rtrltime"); 768 MAYHAVE(val64, oentbuf, -1); 769 if (val64 != -1) 770 fprintf(stderr, "%s was obsoleted. Use %s.\n", 771 oentbuf, entbuf); 772 else { 773 fprintf(stderr, "%s should be specified " 774 "for interface %s.\n", entbuf, 775 ifi->ifi_ifname); 776 val64 = rai->rai_lifetime; 777 } 778 } 779 if (val64 < 0 || val64 > 0xffffffff) { 780 syslog(LOG_ERR, "<%s> route lifetime (%" PRIu64 ") for " 781 "%s/%d on %s out of range", __func__, 782 val64, addr, rti->rti_prefixlen, 783 ifi->ifi_ifname); 784 goto getconfig_free_rti; 785 } 786 rti->rti_ltime = (uint32_t)val64; 787 788 /* link into chain */ 789 TAILQ_INSERT_TAIL(&rai->rai_route, rti, rti_next); 790 rai->rai_routes++; 791 continue; 792 getconfig_free_rti: 793 free(rti); 794 } 795 796 /* DNS server and DNS search list information */ 797 for (i = -1; i < MAXRDNSSENT ; i++) { 798 struct rdnss *rdn; 799 struct rdnss_addr *rdna; 800 char *ap; 801 int c; 802 803 makeentry(entbuf, sizeof(entbuf), i, "rdnss"); 804 addr = (char *)agetstr(entbuf, &bp); 805 if (addr == NULL) 806 break; 807 ELM_MALLOC(rdn, exit(1)); 808 809 TAILQ_INIT(&rdn->rd_list); 810 811 for (ap = addr; ap - addr < (ssize_t)strlen(addr); ap += c+1) { 812 c = strcspn(ap, ","); 813 strncpy(abuf, ap, c); 814 abuf[c] = '\0'; 815 ELM_MALLOC(rdna, goto getconfig_free_rdn); 816 if (inet_pton(AF_INET6, abuf, &rdna->ra_dns) != 1) { 817 syslog(LOG_ERR, "<%s> inet_pton failed for %s", 818 __func__, abuf); 819 free(rdna); 820 goto getconfig_free_rdn; 821 } 822 TAILQ_INSERT_TAIL(&rdn->rd_list, rdna, ra_next); 823 } 824 825 makeentry(entbuf, sizeof(entbuf), i, "rdnssltime"); 826 MAYHAVE(val, entbuf, (rai->rai_maxinterval * 3 / 2)); 827 if ((uint16_t)val < rai->rai_maxinterval || 828 (uint16_t)val > rai->rai_maxinterval * 2) { 829 syslog(LOG_ERR, "%s (%" PRIu16 ") on %s is invalid " 830 "(must be between %d and %d)", 831 entbuf, val, ifi->ifi_ifname, rai->rai_maxinterval, 832 rai->rai_maxinterval * 2); 833 goto getconfig_free_rdn; 834 } 835 rdn->rd_ltime = val; 836 837 /* link into chain */ 838 TAILQ_INSERT_TAIL(&rai->rai_rdnss, rdn, rd_next); 839 continue; 840 getconfig_free_rdn: 841 while ((rdna = TAILQ_FIRST(&rdn->rd_list)) != NULL) { 842 TAILQ_REMOVE(&rdn->rd_list, rdna, ra_next); 843 free(rdna); 844 } 845 free(rdn); 846 } 847 848 for (i = -1; i < MAXDNSSLENT ; i++) { 849 struct dnssl *dns; 850 struct dnssl_addr *dnsa; 851 char *ap; 852 int c; 853 854 makeentry(entbuf, sizeof(entbuf), i, "dnssl"); 855 addr = (char *)agetstr(entbuf, &bp); 856 if (addr == NULL) 857 break; 858 859 ELM_MALLOC(dns, exit(1)); 860 861 TAILQ_INIT(&dns->dn_list); 862 863 for (ap = addr; ap - addr < (ssize_t)strlen(addr); ap += c+1) { 864 c = strcspn(ap, ","); 865 strncpy(abuf, ap, c); 866 abuf[c] = '\0'; 867 ELM_MALLOC(dnsa, goto getconfig_free_dns); 868 dnsa->da_len = dname_labelenc(dnsa->da_dom, abuf); 869 syslog(LOG_DEBUG, "<%s>: dnsa->da_len = %d", __func__, 870 dnsa->da_len); 871 TAILQ_INSERT_TAIL(&dns->dn_list, dnsa, da_next); 872 } 873 874 makeentry(entbuf, sizeof(entbuf), i, "dnsslltime"); 875 MAYHAVE(val, entbuf, (rai->rai_maxinterval * 3 / 2)); 876 if ((uint16_t)val < rai->rai_maxinterval || 877 (uint16_t)val > rai->rai_maxinterval * 2) { 878 syslog(LOG_ERR, "%s (%" PRIu16 ") on %s is invalid " 879 "(must be between %d and %d)", 880 entbuf, val, ifi->ifi_ifname, rai->rai_maxinterval, 881 rai->rai_maxinterval * 2); 882 goto getconfig_free_dns; 883 } 884 dns->dn_ltime = val; 885 886 /* link into chain */ 887 TAILQ_INSERT_TAIL(&rai->rai_dnssl, dns, dn_next); 888 continue; 889 getconfig_free_dns: 890 while ((dnsa = TAILQ_FIRST(&dns->dn_list)) != NULL) { 891 TAILQ_REMOVE(&dns->dn_list, dnsa, da_next); 892 free(dnsa); 893 } 894 free(dns); 895 } 896 /* construct the sending packet */ 897 make_packet(rai); 898 899 /* 900 * If an entry with the same ifindex exists, remove it first. 901 * Before the removal, RDNSS and DNSSL options with 902 * zero-lifetime will be sent. 903 */ 904 switch (ifi->ifi_state) { 905 case IFI_STATE_UNCONFIGURED: 906 /* UNCONFIGURED -> TRANSITIVE */ 907 908 error = sock_mc_join(&sock, ifi->ifi_ifindex); 909 if (error) 910 exit(1); 911 912 ifi->ifi_state = IFI_STATE_TRANSITIVE; 913 ifi->ifi_burstcount = MAX_INITIAL_RTR_ADVERTISEMENTS; 914 ifi->ifi_burstinterval = MAX_INITIAL_RTR_ADVERT_INTERVAL; 915 916 /* The same two rai mean initial burst */ 917 ifi->ifi_rainfo = rai; 918 ifi->ifi_rainfo_trans = rai; 919 TAILQ_INSERT_TAIL(&railist, rai, rai_next); 920 921 if (ifi->ifi_ra_timer == NULL) 922 ifi->ifi_ra_timer = rtadvd_add_timer(ra_timeout, 923 ra_timer_update, ifi, ifi); 924 ra_timer_update(ifi, &ifi->ifi_ra_timer->rat_tm); 925 rtadvd_set_timer(&ifi->ifi_ra_timer->rat_tm, 926 ifi->ifi_ra_timer); 927 928 syslog(LOG_DEBUG, 929 "<%s> ifname=%s marked as TRANSITIVE (initial burst).", 930 __func__, ifi->ifi_ifname); 931 break; 932 case IFI_STATE_CONFIGURED: 933 /* CONFIGURED -> TRANSITIVE */ 934 rai_old = ifi->ifi_rainfo; 935 if (rai_old == NULL) { 936 syslog(LOG_ERR, 937 "<%s> ifi_rainfo is NULL" 938 " in IFI_STATE_CONFIGURED.", __func__); 939 ifi = NULL; 940 break; 941 } else { 942 struct rdnss *rdn; 943 struct dnssl *dns; 944 945 rai_old->rai_lifetime = 0; 946 TAILQ_FOREACH(rdn, &rai_old->rai_rdnss, rd_next) 947 rdn->rd_ltime = 0; 948 TAILQ_FOREACH(dns, &rai_old->rai_dnssl, dn_next) 949 dns->dn_ltime = 0; 950 951 ifi->ifi_rainfo_trans = rai_old; 952 ifi->ifi_state = IFI_STATE_TRANSITIVE; 953 ifi->ifi_burstcount = MAX_FINAL_RTR_ADVERTISEMENTS; 954 ifi->ifi_burstinterval = MIN_DELAY_BETWEEN_RAS; 955 956 ra_timer_update(ifi, &ifi->ifi_ra_timer->rat_tm); 957 rtadvd_set_timer(&ifi->ifi_ra_timer->rat_tm, 958 ifi->ifi_ra_timer); 959 960 syslog(LOG_DEBUG, 961 "<%s> ifname=%s marked as TRANSITIVE" 962 " (transitional burst)", 963 __func__, ifi->ifi_ifname); 964 } 965 ifi->ifi_rainfo = rai; 966 TAILQ_INSERT_TAIL(&railist, rai, rai_next); 967 break; 968 case IFI_STATE_TRANSITIVE: 969 if (ifi->ifi_rainfo != NULL) { 970 if (ifi->ifi_rainfo == ifi->ifi_rainfo_trans) { 971 /* Reinitialize initial burst */ 972 rm_rainfo(ifi->ifi_rainfo); 973 ifi->ifi_rainfo = rai; 974 ifi->ifi_rainfo_trans = rai; 975 ifi->ifi_burstcount = 976 MAX_INITIAL_RTR_ADVERTISEMENTS; 977 ifi->ifi_burstinterval = 978 MAX_INITIAL_RTR_ADVERT_INTERVAL; 979 } else { 980 /* Replace ifi_rainfo with the new one */ 981 rm_rainfo(ifi->ifi_rainfo); 982 ifi->ifi_rainfo = rai; 983 } 984 TAILQ_INSERT_TAIL(&railist, rai, rai_next); 985 986 ra_timer_update(ifi, &ifi->ifi_ra_timer->rat_tm); 987 rtadvd_set_timer(&ifi->ifi_ra_timer->rat_tm, 988 ifi->ifi_ra_timer); 989 } else { 990 /* XXX: NOTREACHED. Being shut down. */ 991 syslog(LOG_ERR, 992 "<%s> %s is shutting down. Skipped.", 993 __func__, ifi->ifi_ifname); 994 rm_rainfo(rai); 995 996 return (NULL); 997 } 998 break; 999 } 1000 1001 return (ifi); 1002 1003 getconfig_free_rai: 1004 free(rai); 1005 return (NULL); 1006 } 1007 1008 void 1009 get_prefix(struct rainfo *rai) 1010 { 1011 struct ifaddrs *ifap, *ifa; 1012 struct prefix *pfx; 1013 struct in6_addr *a; 1014 struct ifinfo *ifi; 1015 char *p, *ep, *m, *lim; 1016 char ntopbuf[INET6_ADDRSTRLEN]; 1017 1018 if (getifaddrs(&ifap) < 0) { 1019 syslog(LOG_ERR, 1020 "<%s> can't get interface addresses", 1021 __func__); 1022 exit(1); 1023 } 1024 ifi = rai->rai_ifinfo; 1025 1026 for (ifa = ifap; ifa; ifa = ifa->ifa_next) { 1027 int plen; 1028 1029 if (strcmp(ifa->ifa_name, ifi->ifi_ifname) != 0) 1030 continue; 1031 if (ifa->ifa_addr->sa_family != AF_INET6) 1032 continue; 1033 a = &((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_addr; 1034 if (IN6_IS_ADDR_LINKLOCAL(a)) 1035 continue; 1036 1037 /* get prefix length */ 1038 m = (char *)&((struct sockaddr_in6 *)ifa->ifa_netmask)->sin6_addr; 1039 lim = (char *)(ifa->ifa_netmask) + ifa->ifa_netmask->sa_len; 1040 plen = prefixlen(m, lim); 1041 if (plen <= 0 || plen > 128) { 1042 syslog(LOG_ERR, "<%s> failed to get prefixlen " 1043 "or prefix is invalid", 1044 __func__); 1045 exit(1); 1046 } 1047 if (plen == 128) /* XXX */ 1048 continue; 1049 if (find_prefix(rai, a, plen)) { 1050 /* ignore a duplicated prefix. */ 1051 continue; 1052 } 1053 1054 /* allocate memory to store prefix info. */ 1055 ELM_MALLOC(pfx, exit(1)); 1056 1057 /* set prefix, sweep bits outside of prefixlen */ 1058 pfx->pfx_prefixlen = plen; 1059 memcpy(&pfx->pfx_prefix, a, sizeof(*a)); 1060 p = (char *)&pfx->pfx_prefix; 1061 ep = (char *)(&pfx->pfx_prefix + 1); 1062 while (m < lim && p < ep) 1063 *p++ &= *m++; 1064 while (p < ep) 1065 *p++ = 0x00; 1066 if (!inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf, 1067 sizeof(ntopbuf))) { 1068 syslog(LOG_ERR, "<%s> inet_ntop failed", __func__); 1069 exit(1); 1070 } 1071 syslog(LOG_DEBUG, 1072 "<%s> add %s/%d to prefix list on %s", 1073 __func__, ntopbuf, pfx->pfx_prefixlen, ifi->ifi_ifname); 1074 1075 /* set other fields with protocol defaults */ 1076 pfx->pfx_validlifetime = DEF_ADVVALIDLIFETIME; 1077 pfx->pfx_preflifetime = DEF_ADVPREFERREDLIFETIME; 1078 pfx->pfx_onlinkflg = 1; 1079 pfx->pfx_autoconfflg = 1; 1080 pfx->pfx_origin = PREFIX_FROM_KERNEL; 1081 pfx->pfx_rainfo = rai; 1082 1083 /* link into chain */ 1084 TAILQ_INSERT_TAIL(&rai->rai_prefix, pfx, pfx_next); 1085 1086 /* counter increment */ 1087 rai->rai_pfxs++; 1088 } 1089 1090 freeifaddrs(ifap); 1091 } 1092 1093 static void 1094 makeentry(char *buf, size_t len, int id, const char *string) 1095 { 1096 1097 if (id < 0) 1098 strlcpy(buf, string, len); 1099 else 1100 snprintf(buf, len, "%s%d", string, id); 1101 } 1102 1103 /* 1104 * Add a prefix to the list of specified interface and reconstruct 1105 * the outgoing packet. 1106 * The prefix must not be in the list. 1107 * XXX: other parameters of the prefix (e.g. lifetime) should be 1108 * able to be specified. 1109 */ 1110 static void 1111 add_prefix(struct rainfo *rai, struct in6_prefixreq *ipr) 1112 { 1113 struct prefix *pfx; 1114 struct ifinfo *ifi; 1115 char ntopbuf[INET6_ADDRSTRLEN]; 1116 1117 ifi = rai->rai_ifinfo; 1118 ELM_MALLOC(pfx, return); 1119 pfx->pfx_prefix = ipr->ipr_prefix.sin6_addr; 1120 pfx->pfx_prefixlen = ipr->ipr_plen; 1121 pfx->pfx_validlifetime = ipr->ipr_vltime; 1122 pfx->pfx_preflifetime = ipr->ipr_pltime; 1123 pfx->pfx_onlinkflg = ipr->ipr_raf_onlink; 1124 pfx->pfx_autoconfflg = ipr->ipr_raf_auto; 1125 pfx->pfx_origin = PREFIX_FROM_DYNAMIC; 1126 pfx->pfx_rainfo = rai; 1127 1128 TAILQ_INSERT_TAIL(&rai->rai_prefix, pfx, pfx_next); 1129 1130 syslog(LOG_DEBUG, "<%s> new prefix %s/%d was added on %s", 1131 __func__, 1132 inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr, ntopbuf, 1133 sizeof(ntopbuf)), ipr->ipr_plen, ifi->ifi_ifname); 1134 1135 rai->rai_pfxs++; 1136 } 1137 1138 /* 1139 * Delete a prefix to the list of specified interface and reconstruct 1140 * the outgoing packet. 1141 * The prefix must be in the list. 1142 */ 1143 void 1144 delete_prefix(struct prefix *pfx) 1145 { 1146 struct rainfo *rai; 1147 struct ifinfo *ifi; 1148 char ntopbuf[INET6_ADDRSTRLEN]; 1149 1150 rai = pfx->pfx_rainfo; 1151 ifi = rai->rai_ifinfo; 1152 TAILQ_REMOVE(&rai->rai_prefix, pfx, pfx_next); 1153 syslog(LOG_DEBUG, "<%s> prefix %s/%d was deleted on %s", 1154 __func__, 1155 inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf, 1156 sizeof(ntopbuf)), pfx->pfx_prefixlen, ifi->ifi_ifname); 1157 if (pfx->pfx_timer) 1158 rtadvd_remove_timer(pfx->pfx_timer); 1159 free(pfx); 1160 1161 rai->rai_pfxs--; 1162 } 1163 1164 void 1165 invalidate_prefix(struct prefix *pfx) 1166 { 1167 struct timespec timo; 1168 struct rainfo *rai; 1169 struct ifinfo *ifi; 1170 char ntopbuf[INET6_ADDRSTRLEN]; 1171 1172 rai = pfx->pfx_rainfo; 1173 ifi = rai->rai_ifinfo; 1174 if (pfx->pfx_timer) { /* sanity check */ 1175 syslog(LOG_ERR, 1176 "<%s> assumption failure: timer already exists", 1177 __func__); 1178 exit(1); 1179 } 1180 1181 syslog(LOG_DEBUG, "<%s> prefix %s/%d was invalidated on %s, " 1182 "will expire in %ld seconds", __func__, 1183 inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf, sizeof(ntopbuf)), 1184 pfx->pfx_prefixlen, ifi->ifi_ifname, (long)prefix_timo); 1185 1186 /* set the expiration timer */ 1187 pfx->pfx_timer = rtadvd_add_timer(prefix_timeout, NULL, pfx, NULL); 1188 if (pfx->pfx_timer == NULL) { 1189 syslog(LOG_ERR, "<%s> failed to add a timer for a prefix. " 1190 "remove the prefix", __func__); 1191 delete_prefix(pfx); 1192 } 1193 timo.tv_sec = prefix_timo; 1194 timo.tv_nsec = 0; 1195 rtadvd_set_timer(&timo, pfx->pfx_timer); 1196 } 1197 1198 static struct rtadvd_timer * 1199 prefix_timeout(void *arg) 1200 { 1201 1202 delete_prefix((struct prefix *)arg); 1203 1204 return (NULL); 1205 } 1206 1207 void 1208 update_prefix(struct prefix *pfx) 1209 { 1210 struct rainfo *rai; 1211 struct ifinfo *ifi; 1212 char ntopbuf[INET6_ADDRSTRLEN]; 1213 1214 rai = pfx->pfx_rainfo; 1215 ifi = rai->rai_ifinfo; 1216 if (pfx->pfx_timer == NULL) { /* sanity check */ 1217 syslog(LOG_ERR, 1218 "<%s> assumption failure: timer does not exist", 1219 __func__); 1220 exit(1); 1221 } 1222 1223 syslog(LOG_DEBUG, "<%s> prefix %s/%d was re-enabled on %s", 1224 __func__, inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf, 1225 sizeof(ntopbuf)), pfx->pfx_prefixlen, ifi->ifi_ifname); 1226 1227 /* stop the expiration timer */ 1228 rtadvd_remove_timer(pfx->pfx_timer); 1229 pfx->pfx_timer = NULL; 1230 } 1231 1232 /* 1233 * Try to get an in6_prefixreq contents for a prefix which matches 1234 * ipr->ipr_prefix and ipr->ipr_plen and belongs to 1235 * the interface whose name is ipr->ipr_name[]. 1236 */ 1237 static int 1238 init_prefix(struct in6_prefixreq *ipr) 1239 { 1240 #if 0 1241 int s; 1242 1243 if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) { 1244 syslog(LOG_ERR, "<%s> socket: %s", __func__, 1245 strerror(errno)); 1246 exit(1); 1247 } 1248 1249 if (ioctl(s, SIOCGIFPREFIX_IN6, (caddr_t)ipr) < 0) { 1250 syslog(LOG_INFO, "<%s> ioctl:SIOCGIFPREFIX %s", __func__, 1251 strerror(errno)); 1252 1253 ipr->ipr_vltime = DEF_ADVVALIDLIFETIME; 1254 ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME; 1255 ipr->ipr_raf_onlink = 1; 1256 ipr->ipr_raf_auto = 1; 1257 /* omit other field initialization */ 1258 } 1259 else if (ipr->ipr_origin < PR_ORIG_RR) { 1260 char ntopbuf[INET6_ADDRSTRLEN]; 1261 1262 syslog(LOG_WARNING, "<%s> Added prefix(%s)'s origin %d is" 1263 "lower than PR_ORIG_RR(router renumbering)." 1264 "This should not happen if I am router", __func__, 1265 inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr, ntopbuf, 1266 sizeof(ntopbuf)), ipr->ipr_origin); 1267 close(s); 1268 return (1); 1269 } 1270 1271 close(s); 1272 return (0); 1273 #else 1274 ipr->ipr_vltime = DEF_ADVVALIDLIFETIME; 1275 ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME; 1276 ipr->ipr_raf_onlink = 1; 1277 ipr->ipr_raf_auto = 1; 1278 return (0); 1279 #endif 1280 } 1281 1282 void 1283 make_prefix(struct rainfo *rai, int ifindex, struct in6_addr *addr, int plen) 1284 { 1285 struct in6_prefixreq ipr; 1286 1287 memset(&ipr, 0, sizeof(ipr)); 1288 if (if_indextoname(ifindex, ipr.ipr_name) == NULL) { 1289 syslog(LOG_ERR, "<%s> Prefix added interface No.%d doesn't " 1290 "exist. This should not happen! %s", __func__, 1291 ifindex, strerror(errno)); 1292 exit(1); 1293 } 1294 ipr.ipr_prefix.sin6_len = sizeof(ipr.ipr_prefix); 1295 ipr.ipr_prefix.sin6_family = AF_INET6; 1296 ipr.ipr_prefix.sin6_addr = *addr; 1297 ipr.ipr_plen = plen; 1298 1299 if (init_prefix(&ipr)) 1300 return; /* init failed by some error */ 1301 add_prefix(rai, &ipr); 1302 } 1303 1304 void 1305 make_packet(struct rainfo *rai) 1306 { 1307 size_t packlen, lladdroptlen = 0; 1308 char *buf; 1309 struct nd_router_advert *ra; 1310 struct nd_opt_prefix_info *ndopt_pi; 1311 struct nd_opt_mtu *ndopt_mtu; 1312 struct nd_opt_route_info *ndopt_rti; 1313 struct rtinfo *rti; 1314 struct nd_opt_rdnss *ndopt_rdnss; 1315 struct rdnss *rdn; 1316 struct nd_opt_dnssl *ndopt_dnssl; 1317 struct dnssl *dns; 1318 size_t len; 1319 struct prefix *pfx; 1320 struct ifinfo *ifi; 1321 1322 ifi = rai->rai_ifinfo; 1323 /* calculate total length */ 1324 packlen = sizeof(struct nd_router_advert); 1325 if (rai->rai_advlinkopt) { 1326 if ((lladdroptlen = lladdropt_length(&ifi->ifi_sdl)) == 0) { 1327 syslog(LOG_INFO, 1328 "<%s> link-layer address option has" 1329 " null length on %s. Treat as not included.", 1330 __func__, ifi->ifi_ifname); 1331 rai->rai_advlinkopt = 0; 1332 } 1333 packlen += lladdroptlen; 1334 } 1335 if (rai->rai_pfxs) 1336 packlen += sizeof(struct nd_opt_prefix_info) * rai->rai_pfxs; 1337 if (rai->rai_linkmtu) 1338 packlen += sizeof(struct nd_opt_mtu); 1339 1340 TAILQ_FOREACH(rti, &rai->rai_route, rti_next) 1341 packlen += sizeof(struct nd_opt_route_info) + 1342 ((rti->rti_prefixlen + 0x3f) >> 6) * 8; 1343 1344 TAILQ_FOREACH(rdn, &rai->rai_rdnss, rd_next) { 1345 struct rdnss_addr *rdna; 1346 1347 packlen += sizeof(struct nd_opt_rdnss); 1348 TAILQ_FOREACH(rdna, &rdn->rd_list, ra_next) 1349 packlen += sizeof(rdna->ra_dns); 1350 } 1351 TAILQ_FOREACH(dns, &rai->rai_dnssl, dn_next) { 1352 struct dnssl_addr *dnsa; 1353 1354 packlen += sizeof(struct nd_opt_dnssl); 1355 len = 0; 1356 TAILQ_FOREACH(dnsa, &dns->dn_list, da_next) 1357 len += dnsa->da_len; 1358 1359 /* A zero octet and 8 octet boundary */ 1360 len++; 1361 len += (len % 8) ? 8 - len % 8 : 0; 1362 1363 packlen += len; 1364 } 1365 /* allocate memory for the packet */ 1366 if ((buf = malloc(packlen)) == NULL) { 1367 syslog(LOG_ERR, 1368 "<%s> can't get enough memory for an RA packet", 1369 __func__); 1370 exit(1); 1371 } 1372 memset(buf, 0, packlen); 1373 if (rai->rai_ra_data) /* Free old data if any. */ 1374 free(rai->rai_ra_data); 1375 rai->rai_ra_data = buf; 1376 /* XXX: what if packlen > 576? */ 1377 rai->rai_ra_datalen = packlen; 1378 1379 /* 1380 * construct the packet 1381 */ 1382 ra = (struct nd_router_advert *)buf; 1383 ra->nd_ra_type = ND_ROUTER_ADVERT; 1384 ra->nd_ra_code = 0; 1385 ra->nd_ra_cksum = 0; 1386 ra->nd_ra_curhoplimit = (uint8_t)(0xff & rai->rai_hoplimit); 1387 ra->nd_ra_flags_reserved = 0; /* just in case */ 1388 /* 1389 * XXX: the router preference field, which is a 2-bit field, should be 1390 * initialized before other fields. 1391 */ 1392 ra->nd_ra_flags_reserved = 0xff & rai->rai_rtpref; 1393 ra->nd_ra_flags_reserved |= 1394 rai->rai_managedflg ? ND_RA_FLAG_MANAGED : 0; 1395 ra->nd_ra_flags_reserved |= 1396 rai->rai_otherflg ? ND_RA_FLAG_OTHER : 0; 1397 ra->nd_ra_router_lifetime = htons(rai->rai_lifetime); 1398 ra->nd_ra_reachable = htonl(rai->rai_reachabletime); 1399 ra->nd_ra_retransmit = htonl(rai->rai_retranstimer); 1400 buf += sizeof(*ra); 1401 1402 if (rai->rai_advlinkopt) { 1403 lladdropt_fill(&ifi->ifi_sdl, (struct nd_opt_hdr *)buf); 1404 buf += lladdroptlen; 1405 } 1406 1407 if (rai->rai_linkmtu) { 1408 ndopt_mtu = (struct nd_opt_mtu *)buf; 1409 ndopt_mtu->nd_opt_mtu_type = ND_OPT_MTU; 1410 ndopt_mtu->nd_opt_mtu_len = 1; 1411 ndopt_mtu->nd_opt_mtu_reserved = 0; 1412 ndopt_mtu->nd_opt_mtu_mtu = htonl(rai->rai_linkmtu); 1413 buf += sizeof(struct nd_opt_mtu); 1414 } 1415 1416 TAILQ_FOREACH(pfx, &rai->rai_prefix, pfx_next) { 1417 uint32_t vltime, pltime; 1418 struct timespec now; 1419 1420 ndopt_pi = (struct nd_opt_prefix_info *)buf; 1421 ndopt_pi->nd_opt_pi_type = ND_OPT_PREFIX_INFORMATION; 1422 ndopt_pi->nd_opt_pi_len = 4; 1423 ndopt_pi->nd_opt_pi_prefix_len = pfx->pfx_prefixlen; 1424 ndopt_pi->nd_opt_pi_flags_reserved = 0; 1425 if (pfx->pfx_onlinkflg) 1426 ndopt_pi->nd_opt_pi_flags_reserved |= 1427 ND_OPT_PI_FLAG_ONLINK; 1428 if (pfx->pfx_autoconfflg) 1429 ndopt_pi->nd_opt_pi_flags_reserved |= 1430 ND_OPT_PI_FLAG_AUTO; 1431 if (pfx->pfx_timer) 1432 vltime = 0; 1433 else { 1434 if (pfx->pfx_vltimeexpire || pfx->pfx_pltimeexpire) 1435 clock_gettime(CLOCK_MONOTONIC_FAST, &now); 1436 if (pfx->pfx_vltimeexpire == 0) 1437 vltime = pfx->pfx_validlifetime; 1438 else 1439 vltime = ((time_t)pfx->pfx_vltimeexpire > now.tv_sec) ? 1440 pfx->pfx_vltimeexpire - now.tv_sec : 0; 1441 } 1442 if (pfx->pfx_timer) 1443 pltime = 0; 1444 else { 1445 if (pfx->pfx_pltimeexpire == 0) 1446 pltime = pfx->pfx_preflifetime; 1447 else 1448 pltime = ((time_t)pfx->pfx_pltimeexpire > now.tv_sec) ? 1449 pfx->pfx_pltimeexpire - now.tv_sec : 0; 1450 } 1451 if (vltime < pltime) { 1452 /* 1453 * this can happen if vltime is decrement but pltime 1454 * is not. 1455 */ 1456 pltime = vltime; 1457 } 1458 ndopt_pi->nd_opt_pi_valid_time = htonl(vltime); 1459 ndopt_pi->nd_opt_pi_preferred_time = htonl(pltime); 1460 ndopt_pi->nd_opt_pi_reserved2 = 0; 1461 ndopt_pi->nd_opt_pi_prefix = pfx->pfx_prefix; 1462 1463 buf += sizeof(struct nd_opt_prefix_info); 1464 } 1465 1466 TAILQ_FOREACH(rti, &rai->rai_route, rti_next) { 1467 uint8_t psize = (rti->rti_prefixlen + 0x3f) >> 6; 1468 1469 ndopt_rti = (struct nd_opt_route_info *)buf; 1470 ndopt_rti->nd_opt_rti_type = ND_OPT_ROUTE_INFO; 1471 ndopt_rti->nd_opt_rti_len = 1 + psize; 1472 ndopt_rti->nd_opt_rti_prefixlen = rti->rti_prefixlen; 1473 ndopt_rti->nd_opt_rti_flags = 0xff & rti->rti_rtpref; 1474 ndopt_rti->nd_opt_rti_lifetime = htonl(rti->rti_ltime); 1475 memcpy(ndopt_rti + 1, &rti->rti_prefix, psize * 8); 1476 buf += sizeof(struct nd_opt_route_info) + psize * 8; 1477 } 1478 1479 TAILQ_FOREACH(rdn, &rai->rai_rdnss, rd_next) { 1480 struct rdnss_addr *rdna; 1481 1482 ndopt_rdnss = (struct nd_opt_rdnss *)buf; 1483 ndopt_rdnss->nd_opt_rdnss_type = ND_OPT_RDNSS; 1484 ndopt_rdnss->nd_opt_rdnss_len = 0; 1485 ndopt_rdnss->nd_opt_rdnss_reserved = 0; 1486 ndopt_rdnss->nd_opt_rdnss_lifetime = htonl(rdn->rd_ltime); 1487 buf += sizeof(struct nd_opt_rdnss); 1488 1489 TAILQ_FOREACH(rdna, &rdn->rd_list, ra_next) { 1490 memcpy(buf, &rdna->ra_dns, sizeof(rdna->ra_dns)); 1491 buf += sizeof(rdna->ra_dns); 1492 } 1493 /* Length field should be in 8 octets */ 1494 ndopt_rdnss->nd_opt_rdnss_len = (buf - (char *)ndopt_rdnss) / 8; 1495 1496 syslog(LOG_DEBUG, "<%s>: nd_opt_dnss_len = %d", __func__, 1497 ndopt_rdnss->nd_opt_rdnss_len); 1498 } 1499 1500 TAILQ_FOREACH(dns, &rai->rai_dnssl, dn_next) { 1501 struct dnssl_addr *dnsa; 1502 1503 ndopt_dnssl = (struct nd_opt_dnssl *)buf; 1504 ndopt_dnssl->nd_opt_dnssl_type = ND_OPT_DNSSL; 1505 ndopt_dnssl->nd_opt_dnssl_len = 0; 1506 ndopt_dnssl->nd_opt_dnssl_reserved = 0; 1507 ndopt_dnssl->nd_opt_dnssl_lifetime = htonl(dns->dn_ltime); 1508 buf += sizeof(*ndopt_dnssl); 1509 1510 TAILQ_FOREACH(dnsa, &dns->dn_list, da_next) { 1511 memcpy(buf, dnsa->da_dom, dnsa->da_len); 1512 buf += dnsa->da_len; 1513 } 1514 1515 /* A zero octet after encoded DNS server list. */ 1516 *buf++ = '\0'; 1517 1518 /* Padding to next 8 octets boundary */ 1519 len = buf - (char *)ndopt_dnssl; 1520 len += (len % 8) ? 8 - len % 8 : 0; 1521 1522 /* Length field must be in 8 octets */ 1523 ndopt_dnssl->nd_opt_dnssl_len = len / 8; 1524 1525 syslog(LOG_DEBUG, "<%s>: nd_opt_dnssl_len = %d", __func__, 1526 ndopt_dnssl->nd_opt_dnssl_len); 1527 } 1528 return; 1529 } 1530