1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 * 21 * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved. 22 */ 23 24 #include "defs.h" 25 #include "tables.h" 26 #include <fcntl.h> 27 #include <sys/un.h> 28 29 static void initlog(void); 30 static void run_timeouts(void); 31 32 static void advertise(struct sockaddr_in6 *sin6, struct phyint *pi, 33 boolean_t no_prefixes); 34 static void solicit(struct sockaddr_in6 *sin6, struct phyint *pi); 35 static void initifs(boolean_t first); 36 static void check_if_removed(struct phyint *pi); 37 static void loopback_ra_enqueue(struct phyint *pi, 38 struct nd_router_advert *ra, int len); 39 static void loopback_ra_dequeue(void); 40 static void check_daemonize(void); 41 42 struct in6_addr all_nodes_mcast = { { 0xff, 0x2, 0x0, 0x0, 43 0x0, 0x0, 0x0, 0x0, 44 0x0, 0x0, 0x0, 0x0, 45 0x0, 0x0, 0x0, 0x1 } }; 46 47 struct in6_addr all_routers_mcast = { { 0xff, 0x2, 0x0, 0x0, 48 0x0, 0x0, 0x0, 0x0, 49 0x0, 0x0, 0x0, 0x0, 50 0x0, 0x0, 0x0, 0x2 } }; 51 52 static struct sockaddr_in6 v6allnodes = { AF_INET6, 0, 0, 53 { 0xff, 0x2, 0x0, 0x0, 54 0x0, 0x0, 0x0, 0x0, 55 0x0, 0x0, 0x0, 0x0, 56 0x0, 0x0, 0x0, 0x1 } }; 57 58 static struct sockaddr_in6 v6allrouters = { AF_INET6, 0, 0, 59 { 0xff, 0x2, 0x0, 0x0, 60 0x0, 0x0, 0x0, 0x0, 61 0x0, 0x0, 0x0, 0x0, 62 0x0, 0x0, 0x0, 0x2 } }; 63 64 static char **argv0; /* Saved for re-exec on SIGHUP */ 65 66 static uint64_t packet[(IP_MAXPACKET + 1)/8]; 67 68 static int show_ifs = 0; 69 static boolean_t already_daemonized = _B_FALSE; 70 int debug = 0; 71 int no_loopback = 0; /* Do not send RA packets to ourselves */ 72 73 /* 74 * Size of routing socket message used by in.ndpd which includes the header, 75 * space for the RTA_DST, RTA_GATEWAY and RTA_NETMASK (each a sockaddr_in6) 76 * plus space for the RTA_IFP (a sockaddr_dl). 77 */ 78 #define NDP_RTM_MSGLEN sizeof (struct rt_msghdr) + \ 79 sizeof (struct sockaddr_in6) + \ 80 sizeof (struct sockaddr_in6) + \ 81 sizeof (struct sockaddr_in6) + \ 82 sizeof (struct sockaddr_dl) 83 84 /* 85 * These are referenced externally in tables.c in order to fill in the 86 * dynamic portions of the routing socket message and then to send the message 87 * itself. 88 */ 89 int rtsock = -1; /* Routing socket */ 90 struct rt_msghdr *rt_msg; /* Routing socket message */ 91 struct sockaddr_in6 *rta_gateway; /* RTA_GATEWAY sockaddr */ 92 struct sockaddr_dl *rta_ifp; /* RTA_IFP sockaddr */ 93 94 /* 95 * These sockets are used internally in this file. 96 */ 97 static int mibsock = -1; /* mib request socket */ 98 static int cmdsock = -1; /* command socket */ 99 100 static int ndpd_setup_cmd_listener(void); 101 static void ndpd_cmd_handler(int); 102 static int ndpd_process_cmd(int, ipadm_ndpd_msg_t *); 103 static int ndpd_send_error(int, int); 104 static int ndpd_set_autoconf(const char *, boolean_t); 105 static int ndpd_create_addrs(const char *, struct sockaddr_in6, int, 106 boolean_t, boolean_t, char *); 107 static int ndpd_delete_addrs(const char *); 108 static int phyint_check_ipadm_intfid(struct phyint *); 109 110 /* 111 * Return the current time in milliseconds truncated to 112 * fit in an integer. 113 */ 114 uint_t 115 getcurrenttime(void) 116 { 117 struct timeval tp; 118 119 if (gettimeofday(&tp, NULL) < 0) { 120 logperror("getcurrenttime: gettimeofday failed"); 121 exit(1); 122 } 123 return (tp.tv_sec * 1000 + tp.tv_usec / 1000); 124 } 125 126 /* 127 * Output a preformated packet from the packet[] buffer. 128 */ 129 static void 130 sendpacket(struct sockaddr_in6 *sin6, int sock, int size, int flags) 131 { 132 int cc; 133 char abuf[INET6_ADDRSTRLEN]; 134 135 cc = sendto(sock, (char *)packet, size, flags, 136 (struct sockaddr *)sin6, sizeof (*sin6)); 137 if (cc < 0 || cc != size) { 138 if (cc < 0) { 139 logperror("sendpacket: sendto"); 140 } 141 logmsg(LOG_ERR, "sendpacket: wrote %s %d chars, ret=%d\n", 142 inet_ntop(sin6->sin6_family, 143 (void *)&sin6->sin6_addr, 144 abuf, sizeof (abuf)), 145 size, cc); 146 } 147 } 148 149 /* 150 * If possible, place an ND_OPT_SOURCE_LINKADDR option at `optp'. 151 * Return the number of bytes placed in the option. 152 */ 153 static uint_t 154 add_opt_lla(struct phyint *pi, struct nd_opt_lla *optp) 155 { 156 uint_t optlen; 157 uint_t hwaddrlen; 158 struct lifreq lifr; 159 160 /* If this phyint doesn't have a link-layer address, bail */ 161 if (phyint_get_lla(pi, &lifr) == -1) 162 return (0); 163 164 hwaddrlen = lifr.lifr_nd.lnr_hdw_len; 165 /* roundup to multiple of 8 and make padding zero */ 166 optlen = ((sizeof (struct nd_opt_hdr) + hwaddrlen + 7) / 8) * 8; 167 bzero(optp, optlen); 168 optp->nd_opt_lla_type = ND_OPT_SOURCE_LINKADDR; 169 optp->nd_opt_lla_len = optlen / 8; 170 bcopy(lifr.lifr_nd.lnr_hdw_addr, optp->nd_opt_lla_hdw_addr, hwaddrlen); 171 172 return (optlen); 173 } 174 175 /* Send a Router Solicitation */ 176 static void 177 solicit(struct sockaddr_in6 *sin6, struct phyint *pi) 178 { 179 int packetlen = 0; 180 struct nd_router_solicit *rs = (struct nd_router_solicit *)packet; 181 char *pptr = (char *)packet; 182 183 rs->nd_rs_type = ND_ROUTER_SOLICIT; 184 rs->nd_rs_code = 0; 185 rs->nd_rs_cksum = htons(0); 186 rs->nd_rs_reserved = htonl(0); 187 188 packetlen += sizeof (*rs); 189 pptr += sizeof (*rs); 190 191 /* add options */ 192 packetlen += add_opt_lla(pi, (struct nd_opt_lla *)pptr); 193 194 if (debug & D_PKTOUT) { 195 print_route_sol("Sending solicitation to ", pi, rs, packetlen, 196 sin6); 197 } 198 sendpacket(sin6, pi->pi_sock, packetlen, 0); 199 } 200 201 /* 202 * Send a (set of) Router Advertisements and feed them back to ourselves 203 * for processing. Unless no_prefixes is set all prefixes are included. 204 * If there are too many prefix options to fit in one packet multiple 205 * packets will be sent - each containing a subset of the prefix options. 206 */ 207 static void 208 advertise(struct sockaddr_in6 *sin6, struct phyint *pi, boolean_t no_prefixes) 209 { 210 struct nd_opt_prefix_info *po; 211 char *pptr = (char *)packet; 212 struct nd_router_advert *ra; 213 struct adv_prefix *adv_pr; 214 int packetlen = 0; 215 216 ra = (struct nd_router_advert *)pptr; 217 ra->nd_ra_type = ND_ROUTER_ADVERT; 218 ra->nd_ra_code = 0; 219 ra->nd_ra_cksum = htons(0); 220 ra->nd_ra_curhoplimit = pi->pi_AdvCurHopLimit; 221 ra->nd_ra_flags_reserved = 0; 222 if (pi->pi_AdvManagedFlag) 223 ra->nd_ra_flags_reserved |= ND_RA_FLAG_MANAGED; 224 if (pi->pi_AdvOtherConfigFlag) 225 ra->nd_ra_flags_reserved |= ND_RA_FLAG_OTHER; 226 227 if (pi->pi_adv_state == FINAL_ADV) 228 ra->nd_ra_router_lifetime = htons(0); 229 else 230 ra->nd_ra_router_lifetime = htons(pi->pi_AdvDefaultLifetime); 231 ra->nd_ra_reachable = htonl(pi->pi_AdvReachableTime); 232 ra->nd_ra_retransmit = htonl(pi->pi_AdvRetransTimer); 233 234 packetlen = sizeof (*ra); 235 pptr += sizeof (*ra); 236 237 if (pi->pi_adv_state == FINAL_ADV) { 238 if (debug & D_PKTOUT) { 239 print_route_adv("Sending advert (FINAL) to ", pi, 240 ra, packetlen, sin6); 241 } 242 sendpacket(sin6, pi->pi_sock, packetlen, 0); 243 /* Feed packet back in for router operation */ 244 loopback_ra_enqueue(pi, ra, packetlen); 245 return; 246 } 247 248 /* add options */ 249 packetlen += add_opt_lla(pi, (struct nd_opt_lla *)pptr); 250 pptr = (char *)packet + packetlen; 251 252 if (pi->pi_AdvLinkMTU != 0) { 253 struct nd_opt_mtu *mo = (struct nd_opt_mtu *)pptr; 254 255 mo->nd_opt_mtu_type = ND_OPT_MTU; 256 mo->nd_opt_mtu_len = sizeof (struct nd_opt_mtu) / 8; 257 mo->nd_opt_mtu_reserved = 0; 258 mo->nd_opt_mtu_mtu = htonl(pi->pi_AdvLinkMTU); 259 260 packetlen += sizeof (struct nd_opt_mtu); 261 pptr += sizeof (struct nd_opt_mtu); 262 } 263 264 if (no_prefixes) { 265 if (debug & D_PKTOUT) { 266 print_route_adv("Sending advert to ", pi, 267 ra, packetlen, sin6); 268 } 269 sendpacket(sin6, pi->pi_sock, packetlen, 0); 270 /* Feed packet back in for router operation */ 271 loopback_ra_enqueue(pi, ra, packetlen); 272 return; 273 } 274 275 po = (struct nd_opt_prefix_info *)pptr; 276 for (adv_pr = pi->pi_adv_prefix_list; adv_pr != NULL; 277 adv_pr = adv_pr->adv_pr_next) { 278 if (!adv_pr->adv_pr_AdvOnLinkFlag && 279 !adv_pr->adv_pr_AdvAutonomousFlag) { 280 continue; 281 } 282 283 /* 284 * If the prefix doesn't fit in packet send 285 * what we have so far and start with new packet. 286 */ 287 if (packetlen + sizeof (*po) > 288 pi->pi_LinkMTU - sizeof (struct ip6_hdr)) { 289 if (debug & D_PKTOUT) { 290 print_route_adv("Sending advert " 291 "(FRAG) to ", 292 pi, ra, packetlen, sin6); 293 } 294 sendpacket(sin6, pi->pi_sock, packetlen, 0); 295 /* Feed packet back in for router operation */ 296 loopback_ra_enqueue(pi, ra, packetlen); 297 packetlen = sizeof (*ra); 298 pptr = (char *)packet + sizeof (*ra); 299 po = (struct nd_opt_prefix_info *)pptr; 300 } 301 po->nd_opt_pi_type = ND_OPT_PREFIX_INFORMATION; 302 po->nd_opt_pi_len = sizeof (*po)/8; 303 po->nd_opt_pi_flags_reserved = 0; 304 if (adv_pr->adv_pr_AdvOnLinkFlag) { 305 po->nd_opt_pi_flags_reserved |= 306 ND_OPT_PI_FLAG_ONLINK; 307 } 308 if (adv_pr->adv_pr_AdvAutonomousFlag) { 309 po->nd_opt_pi_flags_reserved |= 310 ND_OPT_PI_FLAG_AUTO; 311 } 312 po->nd_opt_pi_prefix_len = adv_pr->adv_pr_prefix_len; 313 /* 314 * If both Adv*Expiration and Adv*Lifetime are 315 * set we prefer the former and make the lifetime 316 * decrement in real time. 317 */ 318 if (adv_pr->adv_pr_AdvValidRealTime) { 319 po->nd_opt_pi_valid_time = 320 htonl(adv_pr->adv_pr_AdvValidExpiration); 321 } else { 322 po->nd_opt_pi_valid_time = 323 htonl(adv_pr->adv_pr_AdvValidLifetime); 324 } 325 if (adv_pr->adv_pr_AdvPreferredRealTime) { 326 po->nd_opt_pi_preferred_time = 327 htonl(adv_pr->adv_pr_AdvPreferredExpiration); 328 } else { 329 po->nd_opt_pi_preferred_time = 330 htonl(adv_pr->adv_pr_AdvPreferredLifetime); 331 } 332 po->nd_opt_pi_reserved2 = htonl(0); 333 po->nd_opt_pi_prefix = adv_pr->adv_pr_prefix; 334 335 po++; 336 packetlen += sizeof (*po); 337 } 338 if (debug & D_PKTOUT) { 339 print_route_adv("Sending advert to ", pi, 340 ra, packetlen, sin6); 341 } 342 sendpacket(sin6, pi->pi_sock, packetlen, 0); 343 /* Feed packet back in for router operation */ 344 loopback_ra_enqueue(pi, ra, packetlen); 345 } 346 347 /* Poll support */ 348 static int pollfd_num = 0; /* Allocated and initialized */ 349 static struct pollfd *pollfds = NULL; 350 351 /* 352 * Add fd to the set being polled. Returns 0 if ok; -1 if failed. 353 */ 354 int 355 poll_add(int fd) 356 { 357 int i; 358 int new_num; 359 struct pollfd *newfds; 360 361 /* Check if already present */ 362 for (i = 0; i < pollfd_num; i++) { 363 if (pollfds[i].fd == fd) 364 return (0); 365 } 366 /* Check for empty spot already present */ 367 for (i = 0; i < pollfd_num; i++) { 368 if (pollfds[i].fd == -1) { 369 pollfds[i].fd = fd; 370 return (0); 371 } 372 } 373 374 /* Allocate space for 32 more fds and initialize to -1 */ 375 new_num = pollfd_num + 32; 376 newfds = realloc(pollfds, new_num * sizeof (struct pollfd)); 377 if (newfds == NULL) { 378 logperror("realloc"); 379 return (-1); 380 } 381 382 newfds[pollfd_num].fd = fd; 383 newfds[pollfd_num++].events = POLLIN; 384 385 for (i = pollfd_num; i < new_num; i++) { 386 newfds[i].fd = -1; 387 newfds[i].events = POLLIN; 388 } 389 pollfd_num = new_num; 390 pollfds = newfds; 391 return (0); 392 } 393 394 /* 395 * Remove fd from the set being polled. Returns 0 if ok; -1 if failed. 396 */ 397 int 398 poll_remove(int fd) 399 { 400 int i; 401 402 /* Check if already present */ 403 for (i = 0; i < pollfd_num; i++) { 404 if (pollfds[i].fd == fd) { 405 pollfds[i].fd = -1; 406 return (0); 407 } 408 } 409 return (-1); 410 } 411 412 /* 413 * Extract information about the ifname (either a physical interface and 414 * the ":0" logical interface or just a logical interface). 415 * If the interface (still) exists in kernel set pr_in_use 416 * for caller to be able to detect interfaces that are removed. 417 * Starts sending advertisements/solicitations when new physical interfaces 418 * are detected. 419 */ 420 static void 421 if_process(int s, char *ifname, boolean_t first) 422 { 423 struct lifreq lifr; 424 struct phyint *pi; 425 struct prefix *pr; 426 char *cp; 427 char phyintname[LIFNAMSIZ + 1]; 428 429 if (debug & D_IFSCAN) 430 logmsg(LOG_DEBUG, "if_process(%s)\n", ifname); 431 432 (void) strncpy(lifr.lifr_name, ifname, sizeof (lifr.lifr_name)); 433 lifr.lifr_name[sizeof (lifr.lifr_name) - 1] = '\0'; 434 if (ioctl(s, SIOCGLIFFLAGS, (char *)&lifr) < 0) { 435 if (errno == ENXIO) { 436 /* 437 * Interface has disappeared 438 */ 439 return; 440 } 441 logperror("if_process: ioctl (get interface flags)"); 442 return; 443 } 444 445 /* 446 * Ignore loopback, point-to-multipoint and VRRP interfaces. 447 * The IP addresses over VRRP interfaces cannot be auto-configured. 448 * Point-to-point interfaces always have IFF_MULTICAST set. 449 */ 450 if (!(lifr.lifr_flags & IFF_MULTICAST) || 451 (lifr.lifr_flags & (IFF_LOOPBACK|IFF_VRRP))) { 452 return; 453 } 454 455 if (!(lifr.lifr_flags & IFF_IPV6)) 456 return; 457 458 (void) strncpy(phyintname, ifname, sizeof (phyintname)); 459 phyintname[sizeof (phyintname) - 1] = '\0'; 460 if ((cp = strchr(phyintname, IF_SEPARATOR)) != NULL) { 461 *cp = '\0'; 462 } 463 464 pi = phyint_lookup(phyintname); 465 if (pi == NULL) { 466 pi = phyint_create(phyintname); 467 if (pi == NULL) { 468 logmsg(LOG_ERR, "if_process: out of memory\n"); 469 return; 470 } 471 /* 472 * if in.ndpd is restarted, check with ipmgmtd if there is any 473 * interface id to be configured for this interface. 474 */ 475 if (first) { 476 if (phyint_check_ipadm_intfid(pi) == -1) 477 logmsg(LOG_ERR, "Could not get ipadm info\n"); 478 } 479 } else { 480 /* 481 * if the phyint already exists, synchronize it with 482 * the kernel state. For a newly created phyint, phyint_create 483 * calls phyint_init_from_k(). 484 */ 485 (void) phyint_init_from_k(pi); 486 } 487 if (pi->pi_sock == -1 && !(pi->pi_kernel_state & PI_PRESENT)) { 488 /* Interface is not yet present */ 489 if (debug & D_PHYINT) { 490 logmsg(LOG_DEBUG, "if_process: interface not yet " 491 "present %s\n", pi->pi_name); 492 } 493 return; 494 } 495 496 if (pi->pi_sock != -1) { 497 if (poll_add(pi->pi_sock) == -1) { 498 /* 499 * reset state. 500 */ 501 phyint_cleanup(pi); 502 } 503 } 504 505 /* 506 * Check if IFF_ROUTER has been turned off in kernel in which 507 * case we have to turn off AdvSendAdvertisements. 508 * The kernel will automatically turn off IFF_ROUTER if 509 * ip6_forwarding is turned off. 510 * Note that we do not switch back should IFF_ROUTER be turned on. 511 */ 512 if (!first && 513 pi->pi_AdvSendAdvertisements && !(pi->pi_flags & IFF_ROUTER)) { 514 logmsg(LOG_INFO, "No longer a router on %s\n", pi->pi_name); 515 check_to_advertise(pi, START_FINAL_ADV); 516 517 pi->pi_AdvSendAdvertisements = 0; 518 pi->pi_sol_state = NO_SOLICIT; 519 } 520 521 /* 522 * Send advertisments and solicitation only if the interface is 523 * present in the kernel. 524 */ 525 if (pi->pi_kernel_state & PI_PRESENT) { 526 527 if (pi->pi_AdvSendAdvertisements) { 528 if (pi->pi_adv_state == NO_ADV) 529 check_to_advertise(pi, START_INIT_ADV); 530 } else { 531 if (pi->pi_sol_state == NO_SOLICIT) 532 check_to_solicit(pi, START_INIT_SOLICIT); 533 } 534 } 535 536 /* 537 * Track static kernel prefixes to prevent in.ndpd from clobbering 538 * them by creating a struct prefix for each prefix detected in the 539 * kernel. 540 */ 541 pr = prefix_lookup_name(pi, ifname); 542 if (pr == NULL) { 543 pr = prefix_create_name(pi, ifname); 544 if (pr == NULL) { 545 logmsg(LOG_ERR, "if_process: out of memory\n"); 546 return; 547 } 548 if (prefix_init_from_k(pr) == -1) { 549 prefix_delete(pr); 550 return; 551 } 552 } 553 /* Detect prefixes which are removed */ 554 if (pr->pr_kernel_state != 0) 555 pr->pr_in_use = _B_TRUE; 556 557 if ((lifr.lifr_flags & IFF_DUPLICATE) && 558 !(lifr.lifr_flags & IFF_DHCPRUNNING) && 559 (pr->pr_flags & IFF_TEMPORARY)) { 560 in6_addr_t *token; 561 int i; 562 char abuf[INET6_ADDRSTRLEN]; 563 564 if (++pr->pr_attempts >= MAX_DAD_FAILURES) { 565 logmsg(LOG_ERR, "%s: token %s is duplicate after %d " 566 "attempts; disabling temporary addresses on %s", 567 pr->pr_name, inet_ntop(AF_INET6, 568 (void *)&pi->pi_tmp_token, abuf, sizeof (abuf)), 569 pr->pr_attempts, pi->pi_name); 570 pi->pi_TmpAddrsEnabled = 0; 571 tmptoken_delete(pi); 572 prefix_delete(pr); 573 return; 574 } 575 logmsg(LOG_WARNING, "%s: token %s is duplicate; trying again", 576 pr->pr_name, inet_ntop(AF_INET6, (void *)&pi->pi_tmp_token, 577 abuf, sizeof (abuf))); 578 if (!tmptoken_create(pi)) { 579 prefix_delete(pr); 580 return; 581 } 582 token = &pi->pi_tmp_token; 583 for (i = 0; i < 16; i++) { 584 /* 585 * prefix_create ensures that pr_prefix has all-zero 586 * bits after prefixlen. 587 */ 588 pr->pr_address.s6_addr[i] = pr->pr_prefix.s6_addr[i] | 589 token->s6_addr[i]; 590 } 591 if (prefix_lookup_addr_match(pr) != NULL) { 592 prefix_delete(pr); 593 return; 594 } 595 pr->pr_CreateTime = getcurrenttime() / MILLISEC; 596 /* 597 * We've got a new token. Clearing PR_AUTO causes 598 * prefix_update_k to bring the interface up and set the 599 * address. 600 */ 601 pr->pr_kernel_state &= ~PR_AUTO; 602 prefix_update_k(pr); 603 } 604 } 605 606 static int ifsock = -1; 607 608 /* 609 * Scan all interfaces to detect changes as well as new and deleted intefaces 610 * 'first' is set for the initial call only. Do not effect anything. 611 */ 612 static void 613 initifs(boolean_t first) 614 { 615 char *buf; 616 int bufsize; 617 int numifs; 618 int n; 619 struct lifnum lifn; 620 struct lifconf lifc; 621 struct lifreq *lifr; 622 struct phyint *pi; 623 struct phyint *next_pi; 624 struct prefix *pr; 625 626 if (debug & D_IFSCAN) 627 logmsg(LOG_DEBUG, "Reading interface configuration\n"); 628 if (ifsock < 0) { 629 ifsock = socket(AF_INET6, SOCK_DGRAM, 0); 630 if (ifsock < 0) { 631 logperror("initifs: socket"); 632 return; 633 } 634 } 635 lifn.lifn_family = AF_INET6; 636 lifn.lifn_flags = LIFC_NOXMIT | LIFC_TEMPORARY; 637 if (ioctl(ifsock, SIOCGLIFNUM, (char *)&lifn) < 0) { 638 logperror("initifs: ioctl (get interface numbers)"); 639 return; 640 } 641 numifs = lifn.lifn_count; 642 bufsize = numifs * sizeof (struct lifreq); 643 644 buf = (char *)malloc(bufsize); 645 if (buf == NULL) { 646 logmsg(LOG_ERR, "initifs: out of memory\n"); 647 return; 648 } 649 650 /* 651 * Mark the interfaces so that we can find phyints and prefixes 652 * which have disappeared from the kernel. 653 * if_process will set pr_in_use when it finds the interface 654 * in the kernel. 655 */ 656 for (pi = phyints; pi != NULL; pi = pi->pi_next) { 657 /* 658 * Before re-examining the state of the interfaces, 659 * PI_PRESENT should be cleared from pi_kernel_state. 660 */ 661 pi->pi_kernel_state &= ~PI_PRESENT; 662 for (pr = pi->pi_prefix_list; pr != NULL; pr = pr->pr_next) { 663 pr->pr_in_use = _B_FALSE; 664 } 665 } 666 667 lifc.lifc_family = AF_INET6; 668 lifc.lifc_flags = LIFC_NOXMIT | LIFC_TEMPORARY; 669 lifc.lifc_len = bufsize; 670 lifc.lifc_buf = buf; 671 672 if (ioctl(ifsock, SIOCGLIFCONF, (char *)&lifc) < 0) { 673 logperror("initifs: ioctl (get interface configuration)"); 674 free(buf); 675 return; 676 } 677 678 lifr = (struct lifreq *)lifc.lifc_req; 679 for (n = lifc.lifc_len / sizeof (struct lifreq); n > 0; n--, lifr++) 680 if_process(ifsock, lifr->lifr_name, first); 681 free(buf); 682 683 /* 684 * Detect phyints that have been removed from the kernel. 685 * Since we can't recreate it here (would require ifconfig plumb 686 * logic) we just terminate use of that phyint. 687 */ 688 for (pi = phyints; pi != NULL; pi = next_pi) { 689 next_pi = pi->pi_next; 690 /* 691 * If interface (still) exists in kernel, set 692 * pi_state to indicate that. 693 */ 694 if (pi->pi_kernel_state & PI_PRESENT) { 695 pi->pi_state |= PI_PRESENT; 696 } 697 698 check_if_removed(pi); 699 } 700 if (show_ifs) 701 phyint_print_all(); 702 } 703 704 705 /* 706 * Router advertisement state machine. Used for everything but timer 707 * events which use advertise_event directly. 708 */ 709 void 710 check_to_advertise(struct phyint *pi, enum adv_events event) 711 { 712 uint_t delay; 713 enum adv_states old_state = pi->pi_adv_state; 714 715 if (debug & D_STATE) { 716 logmsg(LOG_DEBUG, "check_to_advertise(%s, %d) state %d\n", 717 pi->pi_name, (int)event, (int)old_state); 718 } 719 delay = advertise_event(pi, event, 0); 720 if (delay != TIMER_INFINITY) { 721 /* Make sure the global next event is updated */ 722 timer_schedule(delay); 723 } 724 725 if (debug & D_STATE) { 726 logmsg(LOG_DEBUG, "check_to_advertise(%s, %d) state %d -> %d\n", 727 pi->pi_name, (int)event, (int)old_state, 728 (int)pi->pi_adv_state); 729 } 730 } 731 732 /* 733 * Router advertisement state machine. 734 * Return the number of milliseconds until next timeout (TIMER_INFINITY 735 * if never). 736 * For the ADV_TIMER event the caller passes in the number of milliseconds 737 * since the last timer event in the 'elapsed' parameter. 738 */ 739 uint_t 740 advertise_event(struct phyint *pi, enum adv_events event, uint_t elapsed) 741 { 742 uint_t delay; 743 744 if (debug & D_STATE) { 745 logmsg(LOG_DEBUG, "advertise_event(%s, %d, %d) state %d\n", 746 pi->pi_name, (int)event, elapsed, (int)pi->pi_adv_state); 747 } 748 check_daemonize(); 749 if (!pi->pi_AdvSendAdvertisements) 750 return (TIMER_INFINITY); 751 if (pi->pi_flags & IFF_NORTEXCH) { 752 if (debug & D_PKTOUT) { 753 logmsg(LOG_DEBUG, "Suppress sending RA packet on %s " 754 "(no route exchange on interface)\n", 755 pi->pi_name); 756 } 757 return (TIMER_INFINITY); 758 } 759 760 switch (event) { 761 case ADV_OFF: 762 pi->pi_adv_state = NO_ADV; 763 return (TIMER_INFINITY); 764 765 case START_INIT_ADV: 766 if (pi->pi_adv_state == INIT_ADV) 767 return (pi->pi_adv_time_left); 768 pi->pi_adv_count = ND_MAX_INITIAL_RTR_ADVERTISEMENTS; 769 pi->pi_adv_time_left = 0; 770 pi->pi_adv_state = INIT_ADV; 771 break; /* send advertisement */ 772 773 case START_FINAL_ADV: 774 if (pi->pi_adv_state == NO_ADV) 775 return (TIMER_INFINITY); 776 if (pi->pi_adv_state == FINAL_ADV) 777 return (pi->pi_adv_time_left); 778 pi->pi_adv_count = ND_MAX_FINAL_RTR_ADVERTISEMENTS; 779 pi->pi_adv_time_left = 0; 780 pi->pi_adv_state = FINAL_ADV; 781 break; /* send advertisement */ 782 783 case RECEIVED_SOLICIT: 784 if (pi->pi_adv_state == NO_ADV) 785 return (TIMER_INFINITY); 786 if (pi->pi_adv_state == SOLICIT_ADV) { 787 if (pi->pi_adv_time_left != 0) 788 return (pi->pi_adv_time_left); 789 break; 790 } 791 delay = GET_RANDOM(0, ND_MAX_RA_DELAY_TIME); 792 if (delay < pi->pi_adv_time_left) 793 pi->pi_adv_time_left = delay; 794 if (pi->pi_adv_time_since_sent < ND_MIN_DELAY_BETWEEN_RAS) { 795 /* 796 * Send an advertisement (ND_MIN_DELAY_BETWEEN_RAS 797 * plus random delay) after the previous 798 * advertisement was sent. 799 */ 800 pi->pi_adv_time_left = delay + 801 ND_MIN_DELAY_BETWEEN_RAS - 802 pi->pi_adv_time_since_sent; 803 } 804 pi->pi_adv_state = SOLICIT_ADV; 805 break; 806 807 case ADV_TIMER: 808 if (pi->pi_adv_state == NO_ADV) 809 return (TIMER_INFINITY); 810 /* Decrease time left */ 811 if (pi->pi_adv_time_left >= elapsed) 812 pi->pi_adv_time_left -= elapsed; 813 else 814 pi->pi_adv_time_left = 0; 815 816 /* Increase time since last advertisement was sent */ 817 pi->pi_adv_time_since_sent += elapsed; 818 break; 819 default: 820 logmsg(LOG_ERR, "advertise_event: Unknown event %d\n", 821 (int)event); 822 return (TIMER_INFINITY); 823 } 824 825 if (pi->pi_adv_time_left != 0) 826 return (pi->pi_adv_time_left); 827 828 /* Send advertisement and calculate next time to send */ 829 if (pi->pi_adv_state == FINAL_ADV) { 830 /* Omit the prefixes */ 831 advertise(&v6allnodes, pi, _B_TRUE); 832 } else { 833 advertise(&v6allnodes, pi, _B_FALSE); 834 } 835 pi->pi_adv_time_since_sent = 0; 836 837 switch (pi->pi_adv_state) { 838 case SOLICIT_ADV: 839 /* 840 * The solicited advertisement has been sent. 841 * Revert to periodic advertisements. 842 */ 843 pi->pi_adv_state = REG_ADV; 844 /* FALLTHRU */ 845 case REG_ADV: 846 pi->pi_adv_time_left = 847 GET_RANDOM(1000 * pi->pi_MinRtrAdvInterval, 848 1000 * pi->pi_MaxRtrAdvInterval); 849 break; 850 851 case INIT_ADV: 852 if (--pi->pi_adv_count > 0) { 853 delay = GET_RANDOM(1000 * pi->pi_MinRtrAdvInterval, 854 1000 * pi->pi_MaxRtrAdvInterval); 855 if (delay > ND_MAX_INITIAL_RTR_ADVERT_INTERVAL) 856 delay = ND_MAX_INITIAL_RTR_ADVERT_INTERVAL; 857 pi->pi_adv_time_left = delay; 858 } else { 859 pi->pi_adv_time_left = 860 GET_RANDOM(1000 * pi->pi_MinRtrAdvInterval, 861 1000 * pi->pi_MaxRtrAdvInterval); 862 pi->pi_adv_state = REG_ADV; 863 } 864 break; 865 866 case FINAL_ADV: 867 if (--pi->pi_adv_count > 0) { 868 pi->pi_adv_time_left = 869 ND_MAX_INITIAL_RTR_ADVERT_INTERVAL; 870 } else { 871 pi->pi_adv_state = NO_ADV; 872 } 873 break; 874 } 875 if (pi->pi_adv_state != NO_ADV) 876 return (pi->pi_adv_time_left); 877 else 878 return (TIMER_INFINITY); 879 } 880 881 /* 882 * Router solicitation state machine. Used for everything but timer 883 * events which use solicit_event directly. 884 */ 885 void 886 check_to_solicit(struct phyint *pi, enum solicit_events event) 887 { 888 uint_t delay; 889 enum solicit_states old_state = pi->pi_sol_state; 890 891 if (debug & D_STATE) { 892 logmsg(LOG_DEBUG, "check_to_solicit(%s, %d) state %d\n", 893 pi->pi_name, (int)event, (int)old_state); 894 } 895 delay = solicit_event(pi, event, 0); 896 if (delay != TIMER_INFINITY) { 897 /* Make sure the global next event is updated */ 898 timer_schedule(delay); 899 } 900 901 if (debug & D_STATE) { 902 logmsg(LOG_DEBUG, "check_to_solicit(%s, %d) state %d -> %d\n", 903 pi->pi_name, (int)event, (int)old_state, 904 (int)pi->pi_sol_state); 905 } 906 } 907 908 static void 909 daemonize_ndpd(void) 910 { 911 FILE *pidfp; 912 mode_t pidmode = (S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH); /* 0644 */ 913 struct itimerval it; 914 boolean_t timerval = _B_TRUE; 915 916 /* 917 * Need to get current timer settings so they can be restored 918 * after the fork(), as the it_value and it_interval values for 919 * the ITIMER_REAL timer are reset to 0 in the child process. 920 */ 921 if (getitimer(ITIMER_REAL, &it) < 0) { 922 if (debug & D_TIMER) 923 logmsg(LOG_DEBUG, 924 "daemonize_ndpd: failed to get itimerval\n"); 925 timerval = _B_FALSE; 926 } 927 928 /* Daemonize. */ 929 switch (fork()) { 930 case 0: 931 /* Child */ 932 break; 933 case -1: 934 logperror("fork"); 935 exit(1); 936 default: 937 /* Parent */ 938 _exit(0); 939 } 940 941 /* Store our process id, blow away any existing file if it exists. */ 942 if ((pidfp = fopen(PATH_PID, "w")) == NULL) { 943 (void) fprintf(stderr, "%s: unable to open " PATH_PID ": %s\n", 944 argv0[0], strerror(errno)); 945 } else { 946 (void) fprintf(pidfp, "%ld\n", getpid()); 947 (void) fclose(pidfp); 948 (void) chmod(PATH_PID, pidmode); 949 } 950 951 (void) close(0); 952 (void) close(1); 953 (void) close(2); 954 955 (void) chdir("/"); 956 (void) open("/dev/null", O_RDWR); 957 (void) dup2(0, 1); 958 (void) dup2(0, 2); 959 (void) setsid(); 960 961 already_daemonized = _B_TRUE; 962 963 /* 964 * Restore timer values, if we were able to save them; if not, 965 * check and set the right value by calling run_timeouts(). 966 */ 967 if (timerval) { 968 if (setitimer(ITIMER_REAL, &it, NULL) < 0) { 969 logperror("daemonize_ndpd: setitimer"); 970 exit(2); 971 } 972 } else { 973 run_timeouts(); 974 } 975 } 976 977 /* 978 * Check to see if the time is right to daemonize. The right time is when: 979 * 980 * 1. We haven't already daemonized. 981 * 2. We are not in debug mode. 982 * 3. All interfaces are marked IFF_NOXMIT. 983 * 4. All non-router interfaces have their prefixes set up and we're 984 * done sending router solicitations on those interfaces without 985 * prefixes. 986 */ 987 static void 988 check_daemonize(void) 989 { 990 struct phyint *pi; 991 992 if (already_daemonized || debug != 0) 993 return; 994 995 for (pi = phyints; pi != NULL; pi = pi->pi_next) { 996 if (!(pi->pi_flags & IFF_NOXMIT)) 997 break; 998 } 999 1000 /* 1001 * If we can't transmit on any of the interfaces there is no reason 1002 * to hold up progress. 1003 */ 1004 if (pi == NULL) { 1005 daemonize_ndpd(); 1006 return; 1007 } 1008 1009 /* Check all interfaces. If any are still soliciting, just return. */ 1010 for (pi = phyints; pi != NULL; pi = pi->pi_next) { 1011 if (pi->pi_AdvSendAdvertisements || 1012 !(pi->pi_kernel_state & PI_PRESENT)) 1013 continue; 1014 1015 if (pi->pi_sol_state == INIT_SOLICIT) 1016 return; 1017 } 1018 1019 daemonize_ndpd(); 1020 } 1021 1022 /* 1023 * Router solicitation state machine. 1024 * Return the number of milliseconds until next timeout (TIMER_INFINITY 1025 * if never). 1026 * For the SOL_TIMER event the caller passes in the number of milliseconds 1027 * since the last timer event in the 'elapsed' parameter. 1028 */ 1029 uint_t 1030 solicit_event(struct phyint *pi, enum solicit_events event, uint_t elapsed) 1031 { 1032 if (debug & D_STATE) { 1033 logmsg(LOG_DEBUG, "solicit_event(%s, %d, %d) state %d\n", 1034 pi->pi_name, (int)event, elapsed, (int)pi->pi_sol_state); 1035 } 1036 1037 if (pi->pi_AdvSendAdvertisements) 1038 return (TIMER_INFINITY); 1039 if (pi->pi_flags & IFF_NORTEXCH) { 1040 if (debug & D_PKTOUT) { 1041 logmsg(LOG_DEBUG, "Suppress sending RS packet on %s " 1042 "(no route exchange on interface)\n", 1043 pi->pi_name); 1044 } 1045 return (TIMER_INFINITY); 1046 } 1047 1048 switch (event) { 1049 case SOLICIT_OFF: 1050 pi->pi_sol_state = NO_SOLICIT; 1051 check_daemonize(); 1052 return (TIMER_INFINITY); 1053 1054 case SOLICIT_DONE: 1055 pi->pi_sol_state = DONE_SOLICIT; 1056 check_daemonize(); 1057 return (TIMER_INFINITY); 1058 1059 case RESTART_INIT_SOLICIT: 1060 /* 1061 * This event allows us to start solicitation over again 1062 * without losing the RA flags. We start solicitation over 1063 * when we are missing an interface prefix for a newly- 1064 * encountered DHCP interface. 1065 */ 1066 if (pi->pi_sol_state == INIT_SOLICIT) 1067 return (pi->pi_sol_time_left); 1068 pi->pi_sol_count = ND_MAX_RTR_SOLICITATIONS; 1069 pi->pi_sol_time_left = 1070 GET_RANDOM(0, ND_MAX_RTR_SOLICITATION_DELAY); 1071 pi->pi_sol_state = INIT_SOLICIT; 1072 break; 1073 1074 case START_INIT_SOLICIT: 1075 if (pi->pi_sol_state == INIT_SOLICIT) 1076 return (pi->pi_sol_time_left); 1077 pi->pi_ra_flags = 0; 1078 pi->pi_sol_count = ND_MAX_RTR_SOLICITATIONS; 1079 pi->pi_sol_time_left = 1080 GET_RANDOM(0, ND_MAX_RTR_SOLICITATION_DELAY); 1081 pi->pi_sol_state = INIT_SOLICIT; 1082 break; 1083 1084 case SOL_TIMER: 1085 if (pi->pi_sol_state == NO_SOLICIT) 1086 return (TIMER_INFINITY); 1087 /* Decrease time left */ 1088 if (pi->pi_sol_time_left >= elapsed) 1089 pi->pi_sol_time_left -= elapsed; 1090 else 1091 pi->pi_sol_time_left = 0; 1092 break; 1093 default: 1094 logmsg(LOG_ERR, "solicit_event: Unknown event %d\n", 1095 (int)event); 1096 return (TIMER_INFINITY); 1097 } 1098 1099 if (pi->pi_sol_time_left != 0) 1100 return (pi->pi_sol_time_left); 1101 1102 /* Send solicitation and calculate next time */ 1103 switch (pi->pi_sol_state) { 1104 case INIT_SOLICIT: 1105 solicit(&v6allrouters, pi); 1106 if (--pi->pi_sol_count == 0) { 1107 if (debug & D_STATE) { 1108 logmsg(LOG_DEBUG, "solicit_event: no routers " 1109 "found on %s; assuming default flags\n", 1110 pi->pi_name); 1111 } 1112 if (pi->pi_autoconf && pi->pi_StatefulAddrConf) { 1113 pi->pi_ra_flags |= ND_RA_FLAG_MANAGED | 1114 ND_RA_FLAG_OTHER; 1115 start_dhcp(pi); 1116 } 1117 pi->pi_sol_state = DONE_SOLICIT; 1118 check_daemonize(); 1119 return (TIMER_INFINITY); 1120 } 1121 pi->pi_sol_time_left = ND_RTR_SOLICITATION_INTERVAL; 1122 return (pi->pi_sol_time_left); 1123 case NO_SOLICIT: 1124 case DONE_SOLICIT: 1125 return (TIMER_INFINITY); 1126 default: 1127 return (pi->pi_sol_time_left); 1128 } 1129 } 1130 1131 /* 1132 * Timer mechanism using relative time (in milliseconds) from the 1133 * previous timer event. Timers exceeding TIMER_INFINITY milliseconds 1134 * will fire after TIMER_INFINITY milliseconds. 1135 */ 1136 static uint_t timer_previous; /* When last SIGALRM occurred */ 1137 static uint_t timer_next; /* Currently scheduled timeout */ 1138 1139 static void 1140 timer_init(void) 1141 { 1142 timer_previous = getcurrenttime(); 1143 timer_next = TIMER_INFINITY; 1144 run_timeouts(); 1145 } 1146 1147 /* 1148 * Make sure the next SIGALRM occurs delay milliseconds from the current 1149 * time if not earlier. 1150 * Handles getcurrenttime (32 bit integer holding milliseconds) wraparound 1151 * by treating differences greater than 0x80000000 as negative. 1152 */ 1153 void 1154 timer_schedule(uint_t delay) 1155 { 1156 uint_t now; 1157 struct itimerval itimerval; 1158 1159 now = getcurrenttime(); 1160 if (debug & D_TIMER) { 1161 logmsg(LOG_DEBUG, "timer_schedule(%u): now %u next %u\n", 1162 delay, now, timer_next); 1163 } 1164 /* Will this timer occur before the currently scheduled SIGALRM? */ 1165 if (delay >= timer_next - now) { 1166 if (debug & D_TIMER) { 1167 logmsg(LOG_DEBUG, "timer_schedule(%u): no action - " 1168 "next in %u ms\n", 1169 delay, timer_next - now); 1170 } 1171 return; 1172 } 1173 if (delay == 0) { 1174 /* Minimum allowed delay */ 1175 delay = 1; 1176 } 1177 timer_next = now + delay; 1178 1179 itimerval.it_value.tv_sec = delay / 1000; 1180 itimerval.it_value.tv_usec = (delay % 1000) * 1000; 1181 itimerval.it_interval.tv_sec = 0; 1182 itimerval.it_interval.tv_usec = 0; 1183 if (debug & D_TIMER) { 1184 logmsg(LOG_DEBUG, "timer_schedule(%u): sec %lu usec %lu\n", 1185 delay, 1186 itimerval.it_value.tv_sec, itimerval.it_value.tv_usec); 1187 } 1188 if (setitimer(ITIMER_REAL, &itimerval, NULL) < 0) { 1189 logperror("timer_schedule: setitimer"); 1190 exit(2); 1191 } 1192 } 1193 1194 /* 1195 * Conditional running of timer. If more than 'minimal_time' millseconds 1196 * since the timer routines were last run we run them. 1197 * Used when packets arrive. 1198 */ 1199 static void 1200 conditional_run_timeouts(uint_t minimal_time) 1201 { 1202 uint_t now; 1203 uint_t elapsed; 1204 1205 now = getcurrenttime(); 1206 elapsed = now - timer_previous; 1207 if (elapsed > minimal_time) { 1208 if (debug & D_TIMER) { 1209 logmsg(LOG_DEBUG, "conditional_run_timeouts: " 1210 "elapsed %d\n", elapsed); 1211 } 1212 run_timeouts(); 1213 } 1214 } 1215 1216 /* 1217 * Timer has fired. 1218 * Determine when the next timer event will occur by asking all 1219 * the timer routines. 1220 * Should not be called from a timer routine but in some cases this is 1221 * done because the code doesn't know that e.g. it was called from 1222 * ifconfig_timer(). In this case the nested run_timeouts will just return but 1223 * the running run_timeouts will ensure to call all the timer functions by 1224 * looping once more. 1225 */ 1226 static void 1227 run_timeouts(void) 1228 { 1229 uint_t now; 1230 uint_t elapsed; 1231 uint_t next; 1232 uint_t nexti; 1233 struct phyint *pi; 1234 struct phyint *next_pi; 1235 struct prefix *pr; 1236 struct prefix *next_pr; 1237 struct adv_prefix *adv_pr; 1238 struct adv_prefix *next_adv_pr; 1239 struct router *dr; 1240 struct router *next_dr; 1241 static boolean_t timeout_running; 1242 static boolean_t do_retry; 1243 1244 if (timeout_running) { 1245 if (debug & D_TIMER) 1246 logmsg(LOG_DEBUG, "run_timeouts: nested call\n"); 1247 do_retry = _B_TRUE; 1248 return; 1249 } 1250 timeout_running = _B_TRUE; 1251 retry: 1252 /* How much time since the last time we were called? */ 1253 now = getcurrenttime(); 1254 elapsed = now - timer_previous; 1255 timer_previous = now; 1256 1257 if (debug & D_TIMER) 1258 logmsg(LOG_DEBUG, "run_timeouts: elapsed %d\n", elapsed); 1259 1260 next = TIMER_INFINITY; 1261 for (pi = phyints; pi != NULL; pi = next_pi) { 1262 next_pi = pi->pi_next; 1263 nexti = phyint_timer(pi, elapsed); 1264 if (nexti != TIMER_INFINITY && nexti < next) 1265 next = nexti; 1266 if (debug & D_TIMER) { 1267 logmsg(LOG_DEBUG, "run_timeouts (pi %s): %d -> %u ms\n", 1268 pi->pi_name, nexti, next); 1269 } 1270 for (pr = pi->pi_prefix_list; pr != NULL; pr = next_pr) { 1271 next_pr = pr->pr_next; 1272 nexti = prefix_timer(pr, elapsed); 1273 if (nexti != TIMER_INFINITY && nexti < next) 1274 next = nexti; 1275 if (debug & D_TIMER) { 1276 logmsg(LOG_DEBUG, "run_timeouts (pr %s): " 1277 "%d -> %u ms\n", pr->pr_name, nexti, next); 1278 } 1279 } 1280 for (adv_pr = pi->pi_adv_prefix_list; adv_pr != NULL; 1281 adv_pr = next_adv_pr) { 1282 next_adv_pr = adv_pr->adv_pr_next; 1283 nexti = adv_prefix_timer(adv_pr, elapsed); 1284 if (nexti != TIMER_INFINITY && nexti < next) 1285 next = nexti; 1286 if (debug & D_TIMER) { 1287 logmsg(LOG_DEBUG, "run_timeouts " 1288 "(adv pr on %s): %d -> %u ms\n", 1289 adv_pr->adv_pr_physical->pi_name, 1290 nexti, next); 1291 } 1292 } 1293 for (dr = pi->pi_router_list; dr != NULL; dr = next_dr) { 1294 next_dr = dr->dr_next; 1295 nexti = router_timer(dr, elapsed); 1296 if (nexti != TIMER_INFINITY && nexti < next) 1297 next = nexti; 1298 if (debug & D_TIMER) { 1299 logmsg(LOG_DEBUG, "run_timeouts (dr): " 1300 "%d -> %u ms\n", nexti, next); 1301 } 1302 } 1303 if (pi->pi_TmpAddrsEnabled) { 1304 nexti = tmptoken_timer(pi, elapsed); 1305 if (nexti != TIMER_INFINITY && nexti < next) 1306 next = nexti; 1307 if (debug & D_TIMER) { 1308 logmsg(LOG_DEBUG, "run_timeouts (tmp on %s): " 1309 "%d -> %u ms\n", pi->pi_name, nexti, next); 1310 } 1311 } 1312 } 1313 /* 1314 * Make sure the timer functions are run at least once 1315 * an hour. 1316 */ 1317 if (next == TIMER_INFINITY) 1318 next = 3600 * 1000; /* 1 hour */ 1319 1320 if (debug & D_TIMER) 1321 logmsg(LOG_DEBUG, "run_timeouts: %u ms\n", next); 1322 timer_schedule(next); 1323 if (do_retry) { 1324 if (debug & D_TIMER) 1325 logmsg(LOG_DEBUG, "run_timeouts: retry\n"); 1326 do_retry = _B_FALSE; 1327 goto retry; 1328 } 1329 timeout_running = _B_FALSE; 1330 } 1331 1332 static int eventpipe_read = -1; /* Used for synchronous signal delivery */ 1333 static int eventpipe_write = -1; 1334 1335 /* 1336 * Ensure that signals are processed synchronously with the rest of 1337 * the code by just writing a one character signal number on the pipe. 1338 * The poll loop will pick this up and process the signal event. 1339 */ 1340 static void 1341 sig_handler(int signo) 1342 { 1343 uchar_t buf = (uchar_t)signo; 1344 1345 if (eventpipe_write == -1) { 1346 logmsg(LOG_ERR, "sig_handler: no pipe\n"); 1347 return; 1348 } 1349 if (write(eventpipe_write, &buf, sizeof (buf)) < 0) 1350 logperror("sig_handler: write"); 1351 } 1352 1353 /* 1354 * Pick up a signal "byte" from the pipe and process it. 1355 */ 1356 static void 1357 in_signal(int fd) 1358 { 1359 uchar_t buf; 1360 struct phyint *pi; 1361 struct phyint *next_pi; 1362 1363 switch (read(fd, &buf, sizeof (buf))) { 1364 case -1: 1365 logperror("in_signal: read"); 1366 exit(1); 1367 /* NOTREACHED */ 1368 case 1: 1369 break; 1370 case 0: 1371 logmsg(LOG_ERR, "in_signal: read eof\n"); 1372 exit(1); 1373 /* NOTREACHED */ 1374 default: 1375 logmsg(LOG_ERR, "in_signal: read > 1\n"); 1376 exit(1); 1377 } 1378 1379 if (debug & D_TIMER) 1380 logmsg(LOG_DEBUG, "in_signal() got %d\n", buf); 1381 1382 switch (buf) { 1383 case SIGALRM: 1384 if (debug & D_TIMER) { 1385 uint_t now = getcurrenttime(); 1386 1387 logmsg(LOG_DEBUG, "in_signal(SIGALRM) delta %u\n", 1388 now - timer_next); 1389 } 1390 timer_next = TIMER_INFINITY; 1391 run_timeouts(); 1392 break; 1393 case SIGHUP: 1394 /* Re-read config file by exec'ing ourselves */ 1395 for (pi = phyints; pi != NULL; pi = next_pi) { 1396 next_pi = pi->pi_next; 1397 if (pi->pi_AdvSendAdvertisements) 1398 check_to_advertise(pi, START_FINAL_ADV); 1399 1400 /* 1401 * Remove all the configured addresses. 1402 * Remove the addrobj names created with ipmgmtd. 1403 * Release the dhcpv6 addresses if any. 1404 * Cleanup the phyints. 1405 */ 1406 phyint_delete(pi); 1407 } 1408 1409 /* 1410 * Prevent fd leaks. Everything gets re-opened at start-up 1411 * time. 0, 1, and 2 are closed and re-opened as 1412 * /dev/null, so we'll leave those open. 1413 */ 1414 closefrom(3); 1415 1416 logmsg(LOG_ERR, "SIGHUP: restart and reread config file\n"); 1417 (void) execv(argv0[0], argv0); 1418 (void) unlink(PATH_PID); 1419 _exit(0177); 1420 /* NOTREACHED */ 1421 case SIGUSR1: 1422 logmsg(LOG_DEBUG, "Printing configuration:\n"); 1423 phyint_print_all(); 1424 break; 1425 case SIGINT: 1426 case SIGTERM: 1427 case SIGQUIT: 1428 for (pi = phyints; pi != NULL; pi = next_pi) { 1429 next_pi = pi->pi_next; 1430 if (pi->pi_AdvSendAdvertisements) 1431 check_to_advertise(pi, START_FINAL_ADV); 1432 1433 phyint_delete(pi); 1434 } 1435 (void) unlink(NDPD_SNMP_SOCKET); 1436 (void) unlink(PATH_PID); 1437 exit(0); 1438 /* NOTREACHED */ 1439 case 255: 1440 /* 1441 * Special "signal" from loopback_ra_enqueue. 1442 * Handle any queued loopback router advertisements. 1443 */ 1444 loopback_ra_dequeue(); 1445 break; 1446 default: 1447 logmsg(LOG_ERR, "in_signal: unknown signal: %d\n", buf); 1448 } 1449 } 1450 1451 /* 1452 * Create pipe for signal delivery and set up signal handlers. 1453 */ 1454 static void 1455 setup_eventpipe(void) 1456 { 1457 int fds[2]; 1458 struct sigaction act; 1459 1460 if ((pipe(fds)) < 0) { 1461 logperror("setup_eventpipe: pipe"); 1462 exit(1); 1463 } 1464 eventpipe_read = fds[0]; 1465 eventpipe_write = fds[1]; 1466 if (poll_add(eventpipe_read) == -1) { 1467 exit(1); 1468 } 1469 act.sa_handler = sig_handler; 1470 act.sa_flags = SA_RESTART; 1471 (void) sigaction(SIGALRM, &act, NULL); 1472 1473 (void) sigset(SIGHUP, sig_handler); 1474 (void) sigset(SIGUSR1, sig_handler); 1475 (void) sigset(SIGTERM, sig_handler); 1476 (void) sigset(SIGINT, sig_handler); 1477 (void) sigset(SIGQUIT, sig_handler); 1478 } 1479 1480 /* 1481 * Create a routing socket for receiving RTM_IFINFO messages and initialize 1482 * the routing socket message header and as much of the sockaddrs as possible. 1483 */ 1484 static int 1485 setup_rtsock(void) 1486 { 1487 int s; 1488 int ret; 1489 char *cp; 1490 struct sockaddr_in6 *sin6; 1491 1492 s = socket(PF_ROUTE, SOCK_RAW, AF_INET6); 1493 if (s == -1) { 1494 logperror("socket(PF_ROUTE)"); 1495 exit(1); 1496 } 1497 ret = fcntl(s, F_SETFL, O_NDELAY|O_NONBLOCK); 1498 if (ret < 0) { 1499 logperror("fcntl(O_NDELAY)"); 1500 exit(1); 1501 } 1502 if (poll_add(s) == -1) { 1503 exit(1); 1504 } 1505 1506 /* 1507 * Allocate storage for the routing socket message. 1508 */ 1509 rt_msg = (struct rt_msghdr *)malloc(NDP_RTM_MSGLEN); 1510 if (rt_msg == NULL) { 1511 logperror("malloc"); 1512 exit(1); 1513 } 1514 1515 /* 1516 * Initialize the routing socket message by zero-filling it and then 1517 * setting the fields where are constant through the lifetime of the 1518 * process. 1519 */ 1520 bzero(rt_msg, NDP_RTM_MSGLEN); 1521 rt_msg->rtm_msglen = NDP_RTM_MSGLEN; 1522 rt_msg->rtm_version = RTM_VERSION; 1523 rt_msg->rtm_addrs = RTA_DST | RTA_GATEWAY | RTA_NETMASK | RTA_IFP; 1524 rt_msg->rtm_pid = getpid(); 1525 if (rt_msg->rtm_pid < 0) { 1526 logperror("getpid"); 1527 exit(1); 1528 } 1529 1530 /* 1531 * The RTA_DST sockaddr does not change during the lifetime of the 1532 * process so it can be completely initialized at this time. 1533 */ 1534 cp = (char *)rt_msg + sizeof (struct rt_msghdr); 1535 sin6 = (struct sockaddr_in6 *)cp; 1536 sin6->sin6_family = AF_INET6; 1537 sin6->sin6_addr = in6addr_any; 1538 1539 /* 1540 * Initialize the constant portion of the RTA_GATEWAY sockaddr. 1541 */ 1542 cp += sizeof (struct sockaddr_in6); 1543 rta_gateway = (struct sockaddr_in6 *)cp; 1544 rta_gateway->sin6_family = AF_INET6; 1545 1546 /* 1547 * The RTA_NETMASK sockaddr does not change during the lifetime of the 1548 * process so it can be completely initialized at this time. 1549 */ 1550 cp += sizeof (struct sockaddr_in6); 1551 sin6 = (struct sockaddr_in6 *)cp; 1552 sin6->sin6_family = AF_INET6; 1553 sin6->sin6_addr = in6addr_any; 1554 1555 /* 1556 * Initialize the constant portion of the RTA_IFP sockaddr. 1557 */ 1558 cp += sizeof (struct sockaddr_in6); 1559 rta_ifp = (struct sockaddr_dl *)cp; 1560 rta_ifp->sdl_family = AF_LINK; 1561 1562 return (s); 1563 } 1564 1565 static int 1566 setup_mibsock(void) 1567 { 1568 int sock; 1569 int ret; 1570 int len; 1571 struct sockaddr_un laddr; 1572 1573 sock = socket(AF_UNIX, SOCK_DGRAM, 0); 1574 if (sock == -1) { 1575 logperror("setup_mibsock: socket(AF_UNIX)"); 1576 exit(1); 1577 } 1578 1579 bzero(&laddr, sizeof (laddr)); 1580 laddr.sun_family = AF_UNIX; 1581 1582 (void) strncpy(laddr.sun_path, NDPD_SNMP_SOCKET, 1583 sizeof (laddr.sun_path)); 1584 len = sizeof (struct sockaddr_un); 1585 1586 (void) unlink(NDPD_SNMP_SOCKET); 1587 ret = bind(sock, (struct sockaddr *)&laddr, len); 1588 if (ret < 0) { 1589 logperror("setup_mibsock: bind\n"); 1590 exit(1); 1591 } 1592 1593 ret = fcntl(sock, F_SETFL, O_NONBLOCK); 1594 if (ret < 0) { 1595 logperror("fcntl(O_NONBLOCK)"); 1596 exit(1); 1597 } 1598 if (poll_add(sock) == -1) { 1599 exit(1); 1600 } 1601 return (sock); 1602 } 1603 1604 /* 1605 * Retrieve one routing socket message. If RTM_IFINFO indicates 1606 * new phyint do a full scan of the interfaces. If RTM_IFINFO 1607 * indicates an existing phyint, only scan that phyint and associated 1608 * prefixes. 1609 */ 1610 static void 1611 process_rtsock(int rtsock) 1612 { 1613 int n; 1614 #define MSG_SIZE 2048/8 1615 int64_t msg[MSG_SIZE]; 1616 struct rt_msghdr *rtm; 1617 struct if_msghdr *ifm; 1618 struct phyint *pi; 1619 struct prefix *pr; 1620 boolean_t need_initifs = _B_FALSE; 1621 boolean_t need_ifscan = _B_FALSE; 1622 int64_t ifscan_msg[10][MSG_SIZE]; 1623 int ifscan_index = 0; 1624 int i; 1625 1626 /* Empty the rtsock and coealesce all the work that we have */ 1627 while (ifscan_index < 10) { 1628 n = read(rtsock, msg, sizeof (msg)); 1629 if (n <= 0) { 1630 /* No more messages */ 1631 break; 1632 } 1633 rtm = (struct rt_msghdr *)msg; 1634 if (rtm->rtm_version != RTM_VERSION) { 1635 logmsg(LOG_ERR, 1636 "process_rtsock: version %d not understood\n", 1637 rtm->rtm_version); 1638 return; 1639 } 1640 switch (rtm->rtm_type) { 1641 case RTM_NEWADDR: 1642 case RTM_DELADDR: 1643 /* 1644 * Some logical interface has changed - have to scan 1645 * everything to determine what actually changed. 1646 */ 1647 if (debug & D_IFSCAN) { 1648 logmsg(LOG_DEBUG, "process_rtsock: " 1649 "message %d\n", rtm->rtm_type); 1650 } 1651 need_initifs = _B_TRUE; 1652 break; 1653 case RTM_IFINFO: 1654 need_ifscan = _B_TRUE; 1655 (void) memcpy(ifscan_msg[ifscan_index], rtm, 1656 sizeof (msg)); 1657 ifscan_index++; 1658 /* Handled below */ 1659 break; 1660 default: 1661 /* Not interesting */ 1662 break; 1663 } 1664 } 1665 /* 1666 * If we do full scan i.e initifs, we don't need to 1667 * scan a particular interface as we should have 1668 * done that as part of initifs. 1669 */ 1670 if (need_initifs) { 1671 initifs(_B_FALSE); 1672 return; 1673 } 1674 1675 if (!need_ifscan) 1676 return; 1677 1678 for (i = 0; i < ifscan_index; i++) { 1679 ifm = (struct if_msghdr *)ifscan_msg[i]; 1680 if (debug & D_IFSCAN) 1681 logmsg(LOG_DEBUG, "process_rtsock: index %d\n", 1682 ifm->ifm_index); 1683 1684 pi = phyint_lookup_on_index(ifm->ifm_index); 1685 if (pi == NULL) { 1686 /* 1687 * A new physical interface. Do a full scan of the 1688 * to catch any new logical interfaces. 1689 */ 1690 initifs(_B_FALSE); 1691 return; 1692 } 1693 1694 if (ifm->ifm_flags != (uint_t)pi->pi_flags) { 1695 if (debug & D_IFSCAN) { 1696 logmsg(LOG_DEBUG, "process_rtsock: clr for " 1697 "%s old flags 0x%llx new flags 0x%x\n", 1698 pi->pi_name, pi->pi_flags, ifm->ifm_flags); 1699 } 1700 } 1701 1702 1703 /* 1704 * Mark the interfaces so that we can find phyints and prefixes 1705 * which have disappeared from the kernel. 1706 * if_process will set pr_in_use when it finds the 1707 * interface in the kernel. 1708 * Before re-examining the state of the interfaces, 1709 * PI_PRESENT should be cleared from pi_kernel_state. 1710 */ 1711 pi->pi_kernel_state &= ~PI_PRESENT; 1712 for (pr = pi->pi_prefix_list; pr != NULL; pr = pr->pr_next) { 1713 pr->pr_in_use = _B_FALSE; 1714 } 1715 1716 if (ifsock < 0) { 1717 ifsock = socket(AF_INET6, SOCK_DGRAM, 0); 1718 if (ifsock < 0) { 1719 logperror("process_rtsock: socket"); 1720 return; 1721 } 1722 } 1723 if_process(ifsock, pi->pi_name, _B_FALSE); 1724 for (pr = pi->pi_prefix_list; pr != NULL; pr = pr->pr_next) { 1725 if_process(ifsock, pr->pr_name, _B_FALSE); 1726 } 1727 /* 1728 * If interface (still) exists in kernel, set 1729 * pi_state to indicate that. 1730 */ 1731 if (pi->pi_kernel_state & PI_PRESENT) { 1732 pi->pi_state |= PI_PRESENT; 1733 } 1734 check_if_removed(pi); 1735 if (show_ifs) 1736 phyint_print_all(); 1737 } 1738 } 1739 1740 static void 1741 process_mibsock(int mibsock) 1742 { 1743 struct phyint *pi; 1744 socklen_t fromlen; 1745 struct sockaddr_un from; 1746 ndpd_info_t ndpd_info; 1747 ssize_t len; 1748 int command; 1749 1750 fromlen = (socklen_t)sizeof (from); 1751 len = recvfrom(mibsock, &command, sizeof (int), 0, 1752 (struct sockaddr *)&from, &fromlen); 1753 1754 if (len < sizeof (int) || command != NDPD_SNMP_INFO_REQ) { 1755 logperror("process_mibsock: bad command \n"); 1756 return; 1757 } 1758 1759 ndpd_info.info_type = NDPD_SNMP_INFO_RESPONSE; 1760 ndpd_info.info_version = NDPD_SNMP_INFO_VER; 1761 ndpd_info.info_num_of_phyints = num_of_phyints; 1762 1763 (void) sendto(mibsock, &ndpd_info, sizeof (ndpd_info_t), 0, 1764 (struct sockaddr *)&from, fromlen); 1765 1766 for (pi = phyints; pi != NULL; pi = pi->pi_next) { 1767 int prefixes; 1768 int routers; 1769 struct prefix *prefix_list; 1770 struct router *router_list; 1771 ndpd_phyint_info_t phyint; 1772 ndpd_prefix_info_t prefix; 1773 ndpd_router_info_t router; 1774 /* 1775 * get number of prefixes 1776 */ 1777 routers = 0; 1778 prefixes = 0; 1779 prefix_list = pi->pi_prefix_list; 1780 while (prefix_list != NULL) { 1781 prefixes++; 1782 prefix_list = prefix_list->pr_next; 1783 } 1784 1785 /* 1786 * get number of routers 1787 */ 1788 router_list = pi->pi_router_list; 1789 while (router_list != NULL) { 1790 routers++; 1791 router_list = router_list->dr_next; 1792 } 1793 1794 phyint.phyint_info_type = NDPD_PHYINT_INFO; 1795 phyint.phyint_info_version = NDPD_PHYINT_INFO_VER; 1796 phyint.phyint_index = pi->pi_index; 1797 bcopy(pi->pi_config, 1798 phyint.phyint_config, I_IFSIZE); 1799 phyint.phyint_num_of_prefixes = prefixes; 1800 phyint.phyint_num_of_routers = routers; 1801 (void) sendto(mibsock, &phyint, sizeof (phyint), 0, 1802 (struct sockaddr *)&from, fromlen); 1803 1804 /* 1805 * Copy prefix information 1806 */ 1807 1808 prefix_list = pi->pi_prefix_list; 1809 while (prefix_list != NULL) { 1810 prefix.prefix_info_type = NDPD_PREFIX_INFO; 1811 prefix.prefix_info_version = NDPD_PREFIX_INFO_VER; 1812 prefix.prefix_prefix = prefix_list->pr_prefix; 1813 prefix.prefix_len = prefix_list->pr_prefix_len; 1814 prefix.prefix_flags = prefix_list->pr_flags; 1815 prefix.prefix_phyint_index = pi->pi_index; 1816 prefix.prefix_ValidLifetime = 1817 prefix_list->pr_ValidLifetime; 1818 prefix.prefix_PreferredLifetime = 1819 prefix_list->pr_PreferredLifetime; 1820 prefix.prefix_OnLinkLifetime = 1821 prefix_list->pr_OnLinkLifetime; 1822 prefix.prefix_OnLinkFlag = 1823 prefix_list->pr_OnLinkFlag; 1824 prefix.prefix_AutonomousFlag = 1825 prefix_list->pr_AutonomousFlag; 1826 (void) sendto(mibsock, &prefix, sizeof (prefix), 0, 1827 (struct sockaddr *)&from, fromlen); 1828 prefix_list = prefix_list->pr_next; 1829 } 1830 /* 1831 * Copy router information 1832 */ 1833 router_list = pi->pi_router_list; 1834 while (router_list != NULL) { 1835 router.router_info_type = NDPD_ROUTER_INFO; 1836 router.router_info_version = NDPD_ROUTER_INFO_VER; 1837 router.router_address = router_list->dr_address; 1838 router.router_lifetime = router_list->dr_lifetime; 1839 router.router_phyint_index = pi->pi_index; 1840 (void) sendto(mibsock, &router, sizeof (router), 0, 1841 (struct sockaddr *)&from, fromlen); 1842 router_list = router_list->dr_next; 1843 } 1844 } 1845 } 1846 1847 /* 1848 * Look if the phyint or one of its prefixes have been removed from 1849 * the kernel and take appropriate action. 1850 * Uses pr_in_use and pi{,_kernel}_state. 1851 */ 1852 static void 1853 check_if_removed(struct phyint *pi) 1854 { 1855 struct prefix *pr, *next_pr; 1856 1857 /* 1858 * Detect prefixes which are removed. 1859 * Static prefixes are just removed from our tables. 1860 * Non-static prefixes are recreated i.e. in.ndpd takes precedence 1861 * over manually removing prefixes via ifconfig. 1862 */ 1863 for (pr = pi->pi_prefix_list; pr != NULL; pr = next_pr) { 1864 next_pr = pr->pr_next; 1865 if (!pr->pr_in_use) { 1866 /* Clear everything except PR_STATIC */ 1867 pr->pr_kernel_state &= PR_STATIC; 1868 if (pr->pr_state & PR_STATIC) 1869 prefix_update_ipadm_addrobj(pr, _B_FALSE); 1870 pr->pr_name[0] = '\0'; 1871 if (pr->pr_state & PR_STATIC) { 1872 prefix_delete(pr); 1873 } else if (!(pi->pi_kernel_state & PI_PRESENT)) { 1874 /* 1875 * Ensure that there are no future attempts to 1876 * run prefix_update_k since the phyint is gone. 1877 */ 1878 pr->pr_state = pr->pr_kernel_state; 1879 } else if (pr->pr_state != pr->pr_kernel_state) { 1880 logmsg(LOG_INFO, "Prefix manually removed " 1881 "on %s; recreating\n", pi->pi_name); 1882 prefix_update_k(pr); 1883 } 1884 } 1885 } 1886 1887 /* 1888 * Detect phyints that have been removed from the kernel, and tear 1889 * down any prefixes we created that are associated with that phyint. 1890 * (NOTE: IPMP depends on in.ndpd tearing down these prefixes so an 1891 * administrator can easily place an IP interface with ADDRCONF'd 1892 * addresses into an IPMP group.) 1893 */ 1894 if (!(pi->pi_kernel_state & PI_PRESENT) && 1895 (pi->pi_state & PI_PRESENT)) { 1896 logmsg(LOG_ERR, "Interface %s has been removed from kernel. " 1897 "in.ndpd will no longer use it\n", pi->pi_name); 1898 1899 for (pr = pi->pi_prefix_list; pr != NULL; pr = next_pr) { 1900 next_pr = pr->pr_next; 1901 if (pr->pr_state & PR_AUTO) 1902 prefix_update_ipadm_addrobj(pr, _B_FALSE); 1903 prefix_delete(pr); 1904 } 1905 1906 /* 1907 * Clear state so that should the phyint reappear we will 1908 * start with initial advertisements or solicitations. 1909 */ 1910 phyint_cleanup(pi); 1911 } 1912 } 1913 1914 1915 /* 1916 * Queuing mechanism for router advertisements that are sent by in.ndpd 1917 * and that also need to be processed by in.ndpd. 1918 * Uses "signal number" 255 to indicate to the main poll loop 1919 * that there is something to dequeue and send to incomining_ra(). 1920 */ 1921 struct raq { 1922 struct raq *raq_next; 1923 struct phyint *raq_pi; 1924 int raq_packetlen; 1925 uchar_t *raq_packet; 1926 }; 1927 static struct raq *raq_head = NULL; 1928 1929 /* 1930 * Allocate a struct raq and memory for the packet. 1931 * Send signal 255 to have poll dequeue. 1932 */ 1933 static void 1934 loopback_ra_enqueue(struct phyint *pi, struct nd_router_advert *ra, int len) 1935 { 1936 struct raq *raq; 1937 struct raq **raqp; 1938 1939 if (no_loopback) 1940 return; 1941 1942 if (debug & D_PKTOUT) 1943 logmsg(LOG_DEBUG, "loopback_ra_enqueue for %s\n", pi->pi_name); 1944 1945 raq = calloc(sizeof (struct raq), 1); 1946 if (raq == NULL) { 1947 logmsg(LOG_ERR, "loopback_ra_enqueue: out of memory\n"); 1948 return; 1949 } 1950 raq->raq_packet = malloc(len); 1951 if (raq->raq_packet == NULL) { 1952 free(raq); 1953 logmsg(LOG_ERR, "loopback_ra_enqueue: out of memory\n"); 1954 return; 1955 } 1956 bcopy(ra, raq->raq_packet, len); 1957 raq->raq_packetlen = len; 1958 raq->raq_pi = pi; 1959 1960 /* Tail insert */ 1961 raqp = &raq_head; 1962 while (*raqp != NULL) 1963 raqp = &((*raqp)->raq_next); 1964 *raqp = raq; 1965 1966 /* Signal for poll loop */ 1967 sig_handler(255); 1968 } 1969 1970 /* 1971 * Dequeue and process all queued advertisements. 1972 */ 1973 static void 1974 loopback_ra_dequeue(void) 1975 { 1976 struct sockaddr_in6 from = IN6ADDR_LOOPBACK_INIT; 1977 struct raq *raq; 1978 1979 if (debug & D_PKTIN) 1980 logmsg(LOG_DEBUG, "loopback_ra_dequeue()\n"); 1981 1982 while ((raq = raq_head) != NULL) { 1983 raq_head = raq->raq_next; 1984 raq->raq_next = NULL; 1985 1986 if (debug & D_PKTIN) { 1987 logmsg(LOG_DEBUG, "loopback_ra_dequeue for %s\n", 1988 raq->raq_pi->pi_name); 1989 } 1990 1991 incoming_ra(raq->raq_pi, 1992 (struct nd_router_advert *)raq->raq_packet, 1993 raq->raq_packetlen, &from, _B_TRUE); 1994 free(raq->raq_packet); 1995 free(raq); 1996 } 1997 } 1998 1999 2000 static void 2001 usage(char *cmd) 2002 { 2003 (void) fprintf(stderr, 2004 "usage: %s [ -adt ] [-f <config file>]\n", cmd); 2005 } 2006 2007 int 2008 main(int argc, char *argv[]) 2009 { 2010 int i; 2011 struct phyint *pi; 2012 int c; 2013 char *config_file = PATH_NDPD_CONF; 2014 boolean_t file_required = _B_FALSE; 2015 2016 argv0 = argv; 2017 srandom(gethostid()); 2018 (void) umask(0022); 2019 2020 while ((c = getopt(argc, argv, "adD:ntIf:")) != EOF) { 2021 switch (c) { 2022 case 'a': 2023 /* 2024 * The StatelessAddrConf variable in ndpd.conf, if 2025 * present, will override this setting. 2026 */ 2027 ifdefaults[I_StatelessAddrConf].cf_value = 0; 2028 break; 2029 case 'd': 2030 debug = D_ALL; 2031 break; 2032 case 'D': 2033 i = strtol((char *)optarg, NULL, 0); 2034 if (i == 0) { 2035 (void) fprintf(stderr, "Bad debug flags: %s\n", 2036 (char *)optarg); 2037 exit(1); 2038 } 2039 debug |= i; 2040 break; 2041 case 'n': 2042 no_loopback = 1; 2043 break; 2044 case 'I': 2045 show_ifs = 1; 2046 break; 2047 case 't': 2048 debug |= D_PKTIN | D_PKTOUT | D_PKTBAD; 2049 break; 2050 case 'f': 2051 config_file = (char *)optarg; 2052 file_required = _B_TRUE; 2053 break; 2054 case '?': 2055 usage(argv[0]); 2056 exit(1); 2057 } 2058 } 2059 2060 if (parse_config(config_file, file_required) == -1) 2061 exit(2); 2062 2063 if (show_ifs) 2064 phyint_print_all(); 2065 2066 if (debug == 0) 2067 initlog(); 2068 2069 cmdsock = ndpd_setup_cmd_listener(); 2070 setup_eventpipe(); 2071 rtsock = setup_rtsock(); 2072 mibsock = setup_mibsock(); 2073 timer_init(); 2074 initifs(_B_TRUE); 2075 2076 check_daemonize(); 2077 2078 for (;;) { 2079 if (poll(pollfds, pollfd_num, -1) < 0) { 2080 if (errno == EINTR) 2081 continue; 2082 logperror("main: poll"); 2083 exit(1); 2084 } 2085 for (i = 0; i < pollfd_num; i++) { 2086 if (!(pollfds[i].revents & POLLIN)) 2087 continue; 2088 if (pollfds[i].fd == eventpipe_read) { 2089 in_signal(eventpipe_read); 2090 break; 2091 } 2092 if (pollfds[i].fd == rtsock) { 2093 process_rtsock(rtsock); 2094 break; 2095 } 2096 if (pollfds[i].fd == mibsock) { 2097 process_mibsock(mibsock); 2098 break; 2099 } 2100 if (pollfds[i].fd == cmdsock) { 2101 ndpd_cmd_handler(cmdsock); 2102 break; 2103 } 2104 /* 2105 * Run timer routine to advance clock if more than 2106 * half a second since the clock was advanced. 2107 * This limits CPU usage under severe packet 2108 * arrival rates but it creates a slight inaccuracy 2109 * in the timer mechanism. 2110 */ 2111 conditional_run_timeouts(500U); 2112 for (pi = phyints; pi != NULL; pi = pi->pi_next) { 2113 if (pollfds[i].fd == pi->pi_sock) { 2114 in_data(pi); 2115 break; 2116 } 2117 } 2118 } 2119 } 2120 /* NOTREACHED */ 2121 return (0); 2122 } 2123 2124 /* 2125 * LOGGER 2126 */ 2127 2128 static boolean_t logging = _B_FALSE; 2129 2130 static void 2131 initlog(void) 2132 { 2133 logging = _B_TRUE; 2134 openlog("in.ndpd", LOG_PID | LOG_CONS, LOG_DAEMON); 2135 } 2136 2137 /* Print the date/time without a trailing carridge return */ 2138 static void 2139 fprintdate(FILE *file) 2140 { 2141 char buf[BUFSIZ]; 2142 struct tm tms; 2143 time_t now; 2144 2145 now = time(NULL); 2146 (void) localtime_r(&now, &tms); 2147 (void) strftime(buf, sizeof (buf), "%h %d %X", &tms); 2148 (void) fprintf(file, "%s ", buf); 2149 } 2150 2151 /* PRINTFLIKE2 */ 2152 void 2153 logmsg(int level, const char *fmt, ...) 2154 { 2155 va_list ap; 2156 va_start(ap, fmt); 2157 2158 if (logging) { 2159 vsyslog(level, fmt, ap); 2160 } else { 2161 fprintdate(stderr); 2162 (void) vfprintf(stderr, fmt, ap); 2163 } 2164 va_end(ap); 2165 } 2166 2167 void 2168 logperror(const char *str) 2169 { 2170 if (logging) { 2171 syslog(LOG_ERR, "%s: %m\n", str); 2172 } else { 2173 fprintdate(stderr); 2174 (void) fprintf(stderr, "%s: %s\n", str, strerror(errno)); 2175 } 2176 } 2177 2178 void 2179 logperror_pi(const struct phyint *pi, const char *str) 2180 { 2181 if (logging) { 2182 syslog(LOG_ERR, "%s (interface %s): %m\n", 2183 str, pi->pi_name); 2184 } else { 2185 fprintdate(stderr); 2186 (void) fprintf(stderr, "%s (interface %s): %s\n", 2187 str, pi->pi_name, strerror(errno)); 2188 } 2189 } 2190 2191 void 2192 logperror_pr(const struct prefix *pr, const char *str) 2193 { 2194 if (logging) { 2195 syslog(LOG_ERR, "%s (prefix %s if %s): %m\n", 2196 str, pr->pr_name, pr->pr_physical->pi_name); 2197 } else { 2198 fprintdate(stderr); 2199 (void) fprintf(stderr, "%s (prefix %s if %s): %s\n", 2200 str, pr->pr_name, pr->pr_physical->pi_name, 2201 strerror(errno)); 2202 } 2203 } 2204 2205 static int 2206 ndpd_setup_cmd_listener(void) 2207 { 2208 int sock; 2209 int ret; 2210 struct sockaddr_un servaddr; 2211 2212 sock = socket(AF_UNIX, SOCK_STREAM, 0); 2213 if (sock < 0) { 2214 logperror("socket"); 2215 exit(1); 2216 } 2217 2218 bzero(&servaddr, sizeof (servaddr)); 2219 servaddr.sun_family = AF_UNIX; 2220 (void) strlcpy(servaddr.sun_path, IPADM_UDS_PATH, 2221 sizeof (servaddr.sun_path)); 2222 (void) unlink(servaddr.sun_path); 2223 ret = bind(sock, (struct sockaddr *)&servaddr, sizeof (servaddr)); 2224 if (ret < 0) { 2225 logperror("bind"); 2226 exit(1); 2227 } 2228 if (listen(sock, 30) < 0) { 2229 logperror("listen"); 2230 exit(1); 2231 } 2232 if (poll_add(sock) == -1) { 2233 logmsg(LOG_ERR, "command socket could not be added to the " 2234 "polling set\n"); 2235 exit(1); 2236 } 2237 2238 return (sock); 2239 } 2240 2241 /* 2242 * Commands received over the command socket come here 2243 */ 2244 static void 2245 ndpd_cmd_handler(int sock) 2246 { 2247 int newfd; 2248 struct sockaddr_storage peer; 2249 socklen_t peerlen; 2250 ipadm_ndpd_msg_t ndpd_msg; 2251 int retval; 2252 2253 peerlen = sizeof (peer); 2254 newfd = accept(sock, (struct sockaddr *)&peer, &peerlen); 2255 if (newfd < 0) { 2256 logperror("accept"); 2257 return; 2258 } 2259 2260 retval = ipadm_ndpd_read(newfd, &ndpd_msg, sizeof (ndpd_msg)); 2261 if (retval != 0) 2262 logperror("Could not read ndpd command"); 2263 2264 retval = ndpd_process_cmd(newfd, &ndpd_msg); 2265 if (retval != 0) { 2266 logmsg(LOG_ERR, "ndpd command on interface %s failed with " 2267 "error %s\n", ndpd_msg.inm_ifname, strerror(retval)); 2268 } 2269 (void) close(newfd); 2270 } 2271 2272 /* 2273 * Process the commands received from the cmd listener socket. 2274 */ 2275 static int 2276 ndpd_process_cmd(int newfd, ipadm_ndpd_msg_t *msg) 2277 { 2278 int err; 2279 2280 if (!ipadm_check_auth()) { 2281 logmsg(LOG_ERR, "User not authorized to send the command\n"); 2282 (void) ndpd_send_error(newfd, EPERM); 2283 return (EPERM); 2284 } 2285 switch (msg->inm_cmd) { 2286 case IPADM_DISABLE_AUTOCONF: 2287 err = ndpd_set_autoconf(msg->inm_ifname, _B_FALSE); 2288 break; 2289 2290 case IPADM_ENABLE_AUTOCONF: 2291 err = ndpd_set_autoconf(msg->inm_ifname, _B_TRUE); 2292 break; 2293 2294 case IPADM_CREATE_ADDRS: 2295 err = ndpd_create_addrs(msg->inm_ifname, msg->inm_intfid, 2296 msg->inm_intfidlen, msg->inm_stateless, 2297 msg->inm_stateful, msg->inm_aobjname); 2298 break; 2299 2300 case IPADM_DELETE_ADDRS: 2301 err = ndpd_delete_addrs(msg->inm_ifname); 2302 break; 2303 2304 default: 2305 err = EINVAL; 2306 break; 2307 } 2308 2309 (void) ndpd_send_error(newfd, err); 2310 2311 return (err); 2312 } 2313 2314 static int 2315 ndpd_send_error(int fd, int error) 2316 { 2317 return (ipadm_ndpd_write(fd, &error, sizeof (error))); 2318 } 2319 2320 /* 2321 * Disables/Enables autoconfiguration of addresses on the 2322 * given physical interface. 2323 * This is provided to support the legacy method of configuring IPv6 2324 * addresses. i.e. `ifconfig bge0 inet6 plumb` will plumb the interface 2325 * and start stateless and stateful autoconfiguration. If this function is 2326 * not called with enable=_B_FALSE, no autoconfiguration will be done until 2327 * ndpd_create_addrs() is called with an Interface ID. 2328 */ 2329 static int 2330 ndpd_set_autoconf(const char *ifname, boolean_t enable) 2331 { 2332 struct phyint *pi; 2333 2334 pi = phyint_lookup((char *)ifname); 2335 if (pi == NULL) { 2336 /* 2337 * If the physical interface was plumbed but no 2338 * addresses were configured yet, phyint will not exist. 2339 */ 2340 pi = phyint_create((char *)ifname); 2341 if (pi == NULL) { 2342 logmsg(LOG_ERR, "could not create phyint for " 2343 "interface %s", ifname); 2344 return (ENOMEM); 2345 } 2346 } 2347 pi->pi_autoconf = enable; 2348 2349 if (debug & D_PHYINT) { 2350 logmsg(LOG_DEBUG, "ndpd_set_autoconf: %s autoconf for " 2351 "interface %s\n", (enable ? "enabled" : "disabled"), 2352 pi->pi_name); 2353 } 2354 return (0); 2355 } 2356 2357 /* 2358 * Create auto-configured addresses on the given interface using 2359 * the given token as the interface id during the next Router Advertisement. 2360 * Currently, only one token per interface is supported. 2361 */ 2362 static int 2363 ndpd_create_addrs(const char *ifname, struct sockaddr_in6 intfid, int intfidlen, 2364 boolean_t stateless, boolean_t stateful, char *addrobj) 2365 { 2366 struct phyint *pi; 2367 struct lifreq lifr; 2368 struct sockaddr_in6 *sin6; 2369 int err; 2370 2371 pi = phyint_lookup((char *)ifname); 2372 if (pi == NULL) { 2373 /* 2374 * If the physical interface was plumbed but no 2375 * addresses were configured yet, phyint will not exist. 2376 */ 2377 pi = phyint_create((char *)ifname); 2378 if (pi == NULL) { 2379 if (debug & D_PHYINT) 2380 logmsg(LOG_ERR, "could not create phyint " 2381 "for interface %s", ifname); 2382 return (ENOMEM); 2383 } 2384 } else if (pi->pi_autoconf) { 2385 logmsg(LOG_ERR, "autoconfiguration already in progress\n"); 2386 return (EEXIST); 2387 } 2388 check_autoconf_var_consistency(pi, stateless, stateful); 2389 2390 if (intfidlen == 0) { 2391 pi->pi_default_token = _B_TRUE; 2392 if (ifsock < 0) { 2393 ifsock = socket(AF_INET6, SOCK_DGRAM, 0); 2394 if (ifsock < 0) { 2395 err = errno; 2396 logperror("ndpd_create_addrs: socket"); 2397 return (err); 2398 } 2399 } 2400 (void) strncpy(lifr.lifr_name, ifname, sizeof (lifr.lifr_name)); 2401 sin6 = (struct sockaddr_in6 *)&lifr.lifr_addr; 2402 if (ioctl(ifsock, SIOCGLIFTOKEN, (char *)&lifr) < 0) { 2403 err = errno; 2404 logperror("SIOCGLIFTOKEN"); 2405 return (err); 2406 } 2407 pi->pi_token = sin6->sin6_addr; 2408 pi->pi_token_length = lifr.lifr_addrlen; 2409 } else { 2410 pi->pi_default_token = _B_FALSE; 2411 pi->pi_token = intfid.sin6_addr; 2412 pi->pi_token_length = intfidlen; 2413 } 2414 pi->pi_stateless = stateless; 2415 pi->pi_stateful = stateful; 2416 (void) strlcpy(pi->pi_ipadm_aobjname, addrobj, 2417 sizeof (pi->pi_ipadm_aobjname)); 2418 2419 /* We can allow autoconfiguration now. */ 2420 pi->pi_autoconf = _B_TRUE; 2421 2422 /* Restart the solicitations. */ 2423 if (pi->pi_sol_state == DONE_SOLICIT) 2424 pi->pi_sol_state = NO_SOLICIT; 2425 if (pi->pi_sol_state == NO_SOLICIT) 2426 check_to_solicit(pi, START_INIT_SOLICIT); 2427 if (debug & D_PHYINT) 2428 logmsg(LOG_DEBUG, "ndpd_create_addrs: " 2429 "added token to interface %s\n", pi->pi_name); 2430 return (0); 2431 } 2432 2433 /* 2434 * This function deletes all addresses on the given interface 2435 * with the given Interface ID. 2436 */ 2437 static int 2438 ndpd_delete_addrs(const char *ifname) 2439 { 2440 struct phyint *pi; 2441 struct prefix *pr, *next_pr; 2442 struct lifreq lifr; 2443 int err; 2444 2445 pi = phyint_lookup((char *)ifname); 2446 if (pi == NULL) { 2447 logmsg(LOG_ERR, "no phyint found for %s", ifname); 2448 return (ENXIO); 2449 } 2450 if (IN6_IS_ADDR_UNSPECIFIED(&pi->pi_token)) { 2451 logmsg(LOG_ERR, "token does not exist for %s", ifname); 2452 return (EINVAL); 2453 } 2454 2455 if (ifsock < 0) { 2456 ifsock = socket(AF_INET6, SOCK_DGRAM, 0); 2457 if (ifsock < 0) { 2458 err = errno; 2459 logperror("ndpd_create_addrs: socket"); 2460 return (err); 2461 } 2462 } 2463 /* Remove the prefixes for this phyint if they exist */ 2464 for (pr = pi->pi_prefix_list; pr != NULL; pr = next_pr) { 2465 next_pr = pr->pr_next; 2466 if (pr->pr_name[0] == '\0') { 2467 prefix_delete(pr); 2468 continue; 2469 } 2470 /* 2471 * Delete all the prefixes for the auto-configured 2472 * addresses as well as the DHCPv6 addresses. 2473 */ 2474 (void) strncpy(lifr.lifr_name, pr->pr_name, 2475 sizeof (lifr.lifr_name)); 2476 if (ioctl(ifsock, SIOCGLIFFLAGS, (char *)&lifr) < 0) { 2477 err = errno; 2478 logperror("SIOCGLIFFLAGS"); 2479 return (err); 2480 } 2481 if ((lifr.lifr_flags & IFF_ADDRCONF) || 2482 (lifr.lifr_flags & IFF_DHCPRUNNING)) { 2483 prefix_update_ipadm_addrobj(pr, _B_FALSE); 2484 } 2485 prefix_delete(pr); 2486 } 2487 2488 /* 2489 * If we had started dhcpagent, we need to release the leases 2490 * if any are required. 2491 */ 2492 if (pi->pi_stateful) { 2493 (void) strncpy(lifr.lifr_name, pi->pi_name, 2494 sizeof (lifr.lifr_name)); 2495 if (ioctl(ifsock, SIOCGLIFFLAGS, (char *)&lifr) < 0) { 2496 err = errno; 2497 logperror("SIOCGLIFFLAGS"); 2498 return (err); 2499 } 2500 if (lifr.lifr_flags & IFF_DHCPRUNNING) 2501 release_dhcp(pi); 2502 } 2503 2504 /* 2505 * Reset the Interface ID on this phyint and stop autoconfigurations 2506 * until a new interface ID is provided. 2507 */ 2508 pi->pi_token = in6addr_any; 2509 pi->pi_token_length = 0; 2510 pi->pi_autoconf = _B_FALSE; 2511 pi->pi_ipadm_aobjname[0] = '\0'; 2512 2513 /* Reset the stateless and stateful settings to default. */ 2514 pi->pi_stateless = pi->pi_StatelessAddrConf; 2515 pi->pi_stateful = pi->pi_StatefulAddrConf; 2516 2517 if (debug & D_PHYINT) { 2518 logmsg(LOG_DEBUG, "ndpd_delete_addrs: " 2519 "removed token from interface %s\n", pi->pi_name); 2520 } 2521 return (0); 2522 } 2523 2524 void 2525 check_autoconf_var_consistency(struct phyint *pi, boolean_t stateless, 2526 boolean_t stateful) 2527 { 2528 /* 2529 * If StatelessAddrConf and StatelessAddrConf are set in 2530 * /etc/inet/ndpd.conf, check if the new values override those 2531 * settings. If so, log a warning. 2532 */ 2533 if ((pi->pi_StatelessAddrConf != 2534 ifdefaults[I_StatelessAddrConf].cf_value && 2535 stateless != pi->pi_StatelessAddrConf) || 2536 (pi->pi_StatefulAddrConf != 2537 ifdefaults[I_StatefulAddrConf].cf_value && 2538 stateful != pi->pi_StatefulAddrConf)) { 2539 logmsg(LOG_ERR, "check_autoconf_var_consistency: " 2540 "Overriding the StatelessAddrConf or StatefulAddrConf " 2541 "settings in ndpd.conf with the new values for " 2542 "interface %s\n", pi->pi_name); 2543 } 2544 } 2545 2546 /* 2547 * If ipadm was used to start autoconfiguration and in.ndpd was restarted 2548 * for some reason, in.ndpd has to resume autoconfiguration when it comes up. 2549 * In this function, it scans the ipadm_addr_info() output to find a link-local 2550 * on this interface with address type "addrconf" and extracts the interface id. 2551 * It also stores the addrobj name to be used later when new addresses are 2552 * created for the prefixes advertised by the router. 2553 * If autoconfiguration was never started on this interface before in.ndpd 2554 * was killed, then in.ndpd should refrain from configuring prefixes, even if 2555 * there is a valid link-local on this interface, created by ipadm (identified 2556 * if there is a valid addrobj name). 2557 */ 2558 static int 2559 phyint_check_ipadm_intfid(struct phyint *pi) 2560 { 2561 ipadm_status_t status; 2562 ipadm_addr_info_t *addrinfo; 2563 struct ifaddrs *ifap; 2564 ipadm_addr_info_t *ainfop; 2565 struct sockaddr_in6 *sin6; 2566 ipadm_handle_t iph; 2567 2568 if (ipadm_open(&iph, 0) != IPADM_SUCCESS) { 2569 logmsg(LOG_ERR, "could not open handle to libipadm\n"); 2570 return (-1); 2571 } 2572 2573 status = ipadm_addr_info(iph, pi->pi_name, &addrinfo, 2574 IPADM_OPT_ZEROADDR, LIFC_NOXMIT|LIFC_TEMPORARY); 2575 if (status != IPADM_SUCCESS) { 2576 ipadm_close(iph); 2577 return (-1); 2578 } 2579 pi->pi_autoconf = _B_TRUE; 2580 for (ainfop = addrinfo; ainfop != NULL; ainfop = IA_NEXT(ainfop)) { 2581 ifap = &ainfop->ia_ifa; 2582 if (ifap->ifa_addr->sa_family != AF_INET6 || 2583 ainfop->ia_state == IFA_DISABLED) 2584 continue; 2585 sin6 = (struct sockaddr_in6 *)ifap->ifa_addr; 2586 if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)) { 2587 if (ainfop->ia_atype == IPADM_ADDR_IPV6_ADDRCONF) { 2588 pi->pi_token = sin6->sin6_addr; 2589 pi->pi_token._S6_un._S6_u32[0] = 0; 2590 pi->pi_token._S6_un._S6_u32[1] = 0; 2591 pi->pi_autoconf = _B_TRUE; 2592 (void) strlcpy(pi->pi_ipadm_aobjname, 2593 ainfop->ia_aobjname, 2594 sizeof (pi->pi_ipadm_aobjname)); 2595 break; 2596 } 2597 /* 2598 * If IFF_NOLINKLOCAL is set, then the link-local 2599 * was created using ipadm. Do not autoconfigure until 2600 * ipadm is explicitly used for autoconfiguration. 2601 */ 2602 if (ifap->ifa_flags & IFF_NOLINKLOCAL) 2603 pi->pi_autoconf = _B_FALSE; 2604 } else if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr) && 2605 strrchr(ifap->ifa_name, ':') == NULL) { 2606 /* The interface was created using ipadm. */ 2607 pi->pi_autoconf = _B_FALSE; 2608 } 2609 } 2610 ipadm_free_addr_info(addrinfo); 2611 if (!pi->pi_autoconf) { 2612 pi->pi_token = in6addr_any; 2613 pi->pi_token_length = 0; 2614 } 2615 ipadm_close(iph); 2616 return (0); 2617 } 2618