nd6_rtr.c revision 1.125 1 1.125 ozaki /* $NetBSD: nd6_rtr.c,v 1.125 2016/12/12 03:14:01 ozaki-r Exp $ */
2 1.20 itojun /* $KAME: nd6_rtr.c,v 1.95 2001/02/07 08:09:47 itojun Exp $ */
3 1.3 thorpej
4 1.2 itojun /*
5 1.2 itojun * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6 1.2 itojun * All rights reserved.
7 1.16 itojun *
8 1.2 itojun * Redistribution and use in source and binary forms, with or without
9 1.2 itojun * modification, are permitted provided that the following conditions
10 1.2 itojun * are met:
11 1.2 itojun * 1. Redistributions of source code must retain the above copyright
12 1.2 itojun * notice, this list of conditions and the following disclaimer.
13 1.2 itojun * 2. Redistributions in binary form must reproduce the above copyright
14 1.2 itojun * notice, this list of conditions and the following disclaimer in the
15 1.2 itojun * documentation and/or other materials provided with the distribution.
16 1.2 itojun * 3. Neither the name of the project nor the names of its contributors
17 1.2 itojun * may be used to endorse or promote products derived from this software
18 1.2 itojun * without specific prior written permission.
19 1.16 itojun *
20 1.2 itojun * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21 1.2 itojun * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 1.2 itojun * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 1.2 itojun * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 1.2 itojun * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 1.2 itojun * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 1.2 itojun * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 1.2 itojun * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 1.2 itojun * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 1.2 itojun * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 1.2 itojun * SUCH DAMAGE.
31 1.2 itojun */
32 1.27 lukem
33 1.27 lukem #include <sys/cdefs.h>
34 1.125 ozaki __KERNEL_RCSID(0, "$NetBSD: nd6_rtr.c,v 1.125 2016/12/12 03:14:01 ozaki-r Exp $");
35 1.2 itojun
36 1.2 itojun #include <sys/param.h>
37 1.2 itojun #include <sys/systm.h>
38 1.2 itojun #include <sys/malloc.h>
39 1.2 itojun #include <sys/mbuf.h>
40 1.2 itojun #include <sys/socket.h>
41 1.2 itojun #include <sys/sockio.h>
42 1.2 itojun #include <sys/time.h>
43 1.2 itojun #include <sys/kernel.h>
44 1.2 itojun #include <sys/errno.h>
45 1.2 itojun #include <sys/ioctl.h>
46 1.2 itojun #include <sys/syslog.h>
47 1.82 tls #include <sys/cprng.h>
48 1.2 itojun
49 1.2 itojun #include <net/if.h>
50 1.2 itojun #include <net/if_types.h>
51 1.2 itojun #include <net/if_dl.h>
52 1.2 itojun
53 1.2 itojun #include <netinet/in.h>
54 1.2 itojun #include <netinet6/in6_var.h>
55 1.56 rpaulo #include <netinet6/in6_ifattach.h>
56 1.11 itojun #include <netinet/ip6.h>
57 1.2 itojun #include <netinet6/ip6_var.h>
58 1.2 itojun #include <netinet6/nd6.h>
59 1.11 itojun #include <netinet/icmp6.h>
60 1.75 thorpej #include <netinet6/icmp6_private.h>
61 1.54 rpaulo #include <netinet6/scope6_var.h>
62 1.2 itojun
63 1.7 itojun #include <net/net_osdep.h>
64 1.2 itojun
65 1.68 dyoung static int rtpref(struct nd_defrouter *);
66 1.68 dyoung static struct nd_defrouter *defrtrlist_update(struct nd_defrouter *);
67 1.68 dyoung static int prelist_update(struct nd_prefixctl *, struct nd_defrouter *,
68 1.68 dyoung struct mbuf *, int);
69 1.118 ozaki static struct in6_ifaddr *in6_ifadd(struct nd_prefixctl *, int, struct psref *);
70 1.68 dyoung static struct nd_pfxrouter *pfxrtr_lookup(struct nd_prefix *,
71 1.68 dyoung struct nd_defrouter *);
72 1.68 dyoung static void pfxrtr_add(struct nd_prefix *, struct nd_defrouter *);
73 1.68 dyoung static void pfxrtr_del(struct nd_pfxrouter *);
74 1.32 itojun static struct nd_pfxrouter *find_pfxlist_reachable_router
75 1.68 dyoung (struct nd_prefix *);
76 1.121 ozaki
77 1.121 ozaki static void defrouter_addreq(struct nd_defrouter *);
78 1.68 dyoung static void defrouter_delreq(struct nd_defrouter *);
79 1.68 dyoung
80 1.68 dyoung static int in6_init_prefix_ltimes(struct nd_prefix *);
81 1.83 christos static void in6_init_address_ltimes(struct nd_prefix *,
82 1.83 christos struct in6_addrlifetime *);
83 1.83 christos static void purge_detached(struct ifnet *);
84 1.2 itojun
85 1.120 ozaki static int rt6_deleteroute_matcher(struct rtentry *, void *);
86 1.2 itojun
87 1.121 ozaki static int nd6_prelist_add(struct nd_prefixctl *, struct nd_defrouter *,
88 1.121 ozaki struct nd_prefix **);
89 1.121 ozaki static int nd6_prefix_onlink(struct nd_prefix *);
90 1.121 ozaki static int nd6_prefix_offlink(struct nd_prefix *);
91 1.121 ozaki static struct nd_prefix *nd6_prefix_lookup(struct nd_prefixctl *);
92 1.121 ozaki
93 1.2 itojun extern int nd6_recalc_reachtm_interval;
94 1.2 itojun
95 1.56 rpaulo int ip6_use_tempaddr = 0;
96 1.56 rpaulo
97 1.56 rpaulo int ip6_desync_factor;
98 1.56 rpaulo u_int32_t ip6_temp_preferred_lifetime = DEF_TEMP_PREFERRED_LIFETIME;
99 1.56 rpaulo u_int32_t ip6_temp_valid_lifetime = DEF_TEMP_VALID_LIFETIME;
100 1.56 rpaulo int ip6_temp_regen_advance = TEMPADDR_REGEN_ADVANCE;
101 1.56 rpaulo
102 1.81 spz int nd6_numroutes = 0;
103 1.81 spz
104 1.56 rpaulo /* RTPREF_MEDIUM has to be 0! */
105 1.56 rpaulo #define RTPREF_HIGH 1
106 1.56 rpaulo #define RTPREF_MEDIUM 0
107 1.56 rpaulo #define RTPREF_LOW (-1)
108 1.56 rpaulo #define RTPREF_RESERVED (-2)
109 1.56 rpaulo #define RTPREF_INVALID (-3) /* internal */
110 1.56 rpaulo
111 1.101 ozaki static inline bool
112 1.101 ozaki nd6_is_llinfo_probreach(struct nd_defrouter *dr)
113 1.101 ozaki {
114 1.105 ozaki struct llentry *ln = NULL;
115 1.101 ozaki
116 1.108 ozaki ln = nd6_lookup(&dr->rtaddr, dr->ifp, false);
117 1.108 ozaki if (ln == NULL)
118 1.101 ozaki return false;
119 1.108 ozaki
120 1.108 ozaki if (!ND6_IS_LLINFO_PROBREACH(ln)) {
121 1.108 ozaki LLE_RUNLOCK(ln);
122 1.101 ozaki return false;
123 1.108 ozaki }
124 1.101 ozaki
125 1.108 ozaki LLE_RUNLOCK(ln);
126 1.101 ozaki return true;
127 1.101 ozaki }
128 1.101 ozaki
129 1.2 itojun /*
130 1.2 itojun * Receive Router Solicitation Message - just for routers.
131 1.81 spz * Router solicitation/advertisement is mostly managed by a userland program
132 1.2 itojun * (rtadvd) so here we have no function like nd6_ra_output().
133 1.2 itojun *
134 1.2 itojun * Based on RFC 2461
135 1.2 itojun */
136 1.2 itojun void
137 1.64 christos nd6_rs_input(struct mbuf *m, int off, int icmp6len)
138 1.2 itojun {
139 1.111 ozaki struct ifnet *ifp;
140 1.111 ozaki struct nd_ifinfo *ndi;
141 1.2 itojun struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
142 1.12 itojun struct nd_router_solicit *nd_rs;
143 1.2 itojun struct in6_addr saddr6 = ip6->ip6_src;
144 1.2 itojun char *lladdr = NULL;
145 1.2 itojun int lladdrlen = 0;
146 1.2 itojun union nd_opts ndopts;
147 1.111 ozaki struct psref psref;
148 1.111 ozaki
149 1.111 ozaki ifp = m_get_rcvif_psref(m, &psref);
150 1.111 ozaki if (ifp == NULL)
151 1.111 ozaki goto freeit;
152 1.111 ozaki
153 1.111 ozaki ndi = ND_IFINFO(ifp);
154 1.2 itojun
155 1.2 itojun /* If I'm not a router, ignore it. */
156 1.80 dyoung if (nd6_accepts_rtadv(ndi) || !ip6_forwarding)
157 1.12 itojun goto freeit;
158 1.2 itojun
159 1.2 itojun /* Sanity checks */
160 1.2 itojun if (ip6->ip6_hlim != 255) {
161 1.107 ozaki nd6log(LOG_ERR, "invalid hlim (%d) from %s to %s on %s\n",
162 1.20 itojun ip6->ip6_hlim, ip6_sprintf(&ip6->ip6_src),
163 1.107 ozaki ip6_sprintf(&ip6->ip6_dst), if_name(ifp));
164 1.20 itojun goto bad;
165 1.2 itojun }
166 1.2 itojun
167 1.2 itojun /*
168 1.2 itojun * Don't update the neighbor cache, if src = ::.
169 1.2 itojun * This indicates that the src has no IP address assigned yet.
170 1.2 itojun */
171 1.2 itojun if (IN6_IS_ADDR_UNSPECIFIED(&saddr6))
172 1.12 itojun goto freeit;
173 1.12 itojun
174 1.12 itojun IP6_EXTHDR_GET(nd_rs, struct nd_router_solicit *, m, off, icmp6len);
175 1.12 itojun if (nd_rs == NULL) {
176 1.75 thorpej ICMP6_STATINC(ICMP6_STAT_TOOSHORT);
177 1.2 itojun return;
178 1.12 itojun }
179 1.2 itojun
180 1.2 itojun icmp6len -= sizeof(*nd_rs);
181 1.2 itojun nd6_option_init(nd_rs + 1, icmp6len, &ndopts);
182 1.2 itojun if (nd6_options(&ndopts) < 0) {
183 1.107 ozaki nd6log(LOG_INFO, "invalid ND option, ignored\n");
184 1.20 itojun /* nd6_options have incremented stats */
185 1.12 itojun goto freeit;
186 1.2 itojun }
187 1.2 itojun
188 1.2 itojun if (ndopts.nd_opts_src_lladdr) {
189 1.2 itojun lladdr = (char *)(ndopts.nd_opts_src_lladdr + 1);
190 1.2 itojun lladdrlen = ndopts.nd_opts_src_lladdr->nd_opt_len << 3;
191 1.2 itojun }
192 1.2 itojun
193 1.2 itojun if (lladdr && ((ifp->if_addrlen + 2 + 7) & ~7) != lladdrlen) {
194 1.107 ozaki nd6log(LOG_INFO, "lladdrlen mismatch for %s "
195 1.2 itojun "(if %d, RS packet %d)\n",
196 1.107 ozaki ip6_sprintf(&saddr6), ifp->if_addrlen, lladdrlen - 2);
197 1.20 itojun goto bad;
198 1.2 itojun }
199 1.2 itojun
200 1.6 itojun nd6_cache_lladdr(ifp, &saddr6, lladdr, lladdrlen, ND_ROUTER_SOLICIT, 0);
201 1.12 itojun
202 1.12 itojun freeit:
203 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
204 1.12 itojun m_freem(m);
205 1.20 itojun return;
206 1.20 itojun
207 1.20 itojun bad:
208 1.75 thorpej ICMP6_STATINC(ICMP6_STAT_BADRS);
209 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
210 1.20 itojun m_freem(m);
211 1.2 itojun }
212 1.2 itojun
213 1.2 itojun /*
214 1.2 itojun * Receive Router Advertisement Message.
215 1.2 itojun *
216 1.2 itojun * Based on RFC 2461
217 1.2 itojun * TODO: on-link bit on prefix information
218 1.2 itojun * TODO: ND_RA_FLAG_{OTHER,MANAGED} processing
219 1.2 itojun */
220 1.2 itojun void
221 1.64 christos nd6_ra_input(struct mbuf *m, int off, int icmp6len)
222 1.2 itojun {
223 1.111 ozaki struct ifnet *ifp;
224 1.111 ozaki struct nd_ifinfo *ndi;
225 1.2 itojun struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
226 1.12 itojun struct nd_router_advert *nd_ra;
227 1.2 itojun struct in6_addr saddr6 = ip6->ip6_src;
228 1.2 itojun #if 0
229 1.2 itojun struct in6_addr daddr6 = ip6->ip6_dst;
230 1.12 itojun int flags; /* = nd_ra->nd_ra_flags_reserved; */
231 1.2 itojun int is_managed = ((flags & ND_RA_FLAG_MANAGED) != 0);
232 1.2 itojun int is_other = ((flags & ND_RA_FLAG_OTHER) != 0);
233 1.2 itojun #endif
234 1.56 rpaulo int mcast = 0;
235 1.2 itojun union nd_opts ndopts;
236 1.2 itojun struct nd_defrouter *dr;
237 1.111 ozaki struct psref psref;
238 1.111 ozaki
239 1.111 ozaki ifp = m_get_rcvif_psref(m, &psref);
240 1.111 ozaki if (ifp == NULL)
241 1.111 ozaki goto freeit;
242 1.2 itojun
243 1.111 ozaki ndi = ND_IFINFO(ifp);
244 1.32 itojun /*
245 1.81 spz * We only accept RAs when
246 1.81 spz * the system-wide variable allows the acceptance, and the
247 1.33 itojun * per-interface variable allows RAs on the receiving interface.
248 1.32 itojun */
249 1.80 dyoung if (!nd6_accepts_rtadv(ndi))
250 1.32 itojun goto freeit;
251 1.2 itojun
252 1.2 itojun if (ip6->ip6_hlim != 255) {
253 1.107 ozaki nd6log(LOG_ERR, "invalid hlim (%d) from %s to %s on %s\n",
254 1.20 itojun ip6->ip6_hlim, ip6_sprintf(&ip6->ip6_src),
255 1.107 ozaki ip6_sprintf(&ip6->ip6_dst), if_name(ifp));
256 1.20 itojun goto bad;
257 1.2 itojun }
258 1.2 itojun
259 1.2 itojun if (!IN6_IS_ADDR_LINKLOCAL(&saddr6)) {
260 1.107 ozaki nd6log(LOG_ERR, "src %s is not link-local\n",
261 1.107 ozaki ip6_sprintf(&saddr6));
262 1.20 itojun goto bad;
263 1.12 itojun }
264 1.12 itojun
265 1.12 itojun IP6_EXTHDR_GET(nd_ra, struct nd_router_advert *, m, off, icmp6len);
266 1.12 itojun if (nd_ra == NULL) {
267 1.75 thorpej ICMP6_STATINC(ICMP6_STAT_TOOSHORT);
268 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
269 1.2 itojun return;
270 1.2 itojun }
271 1.2 itojun
272 1.2 itojun icmp6len -= sizeof(*nd_ra);
273 1.2 itojun nd6_option_init(nd_ra + 1, icmp6len, &ndopts);
274 1.2 itojun if (nd6_options(&ndopts) < 0) {
275 1.107 ozaki nd6log(LOG_INFO, "invalid ND option, ignored\n");
276 1.20 itojun /* nd6_options have incremented stats */
277 1.12 itojun goto freeit;
278 1.2 itojun }
279 1.2 itojun
280 1.2 itojun {
281 1.52 christos struct nd_defrouter drtr;
282 1.2 itojun u_int32_t advreachable = nd_ra->nd_ra_reachable;
283 1.2 itojun
284 1.56 rpaulo /* remember if this is a multicasted advertisement */
285 1.56 rpaulo if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst))
286 1.56 rpaulo mcast = 1;
287 1.56 rpaulo
288 1.56 rpaulo memset(&drtr, 0, sizeof(drtr));
289 1.52 christos drtr.rtaddr = saddr6;
290 1.52 christos drtr.flags = nd_ra->nd_ra_flags_reserved;
291 1.58 rpaulo drtr.rtlifetime = ntohs(nd_ra->nd_ra_router_lifetime);
292 1.102 ozaki drtr.expire = time_uptime + drtr.rtlifetime;
293 1.52 christos drtr.ifp = ifp;
294 1.2 itojun /* unspecified or not? (RFC 2461 6.3.4) */
295 1.2 itojun if (advreachable) {
296 1.2 itojun NTOHL(advreachable);
297 1.2 itojun if (advreachable <= MAX_REACHABLE_TIME &&
298 1.2 itojun ndi->basereachable != advreachable) {
299 1.2 itojun ndi->basereachable = advreachable;
300 1.2 itojun ndi->reachable = ND_COMPUTE_RTIME(ndi->basereachable);
301 1.2 itojun ndi->recalctm = nd6_recalc_reachtm_interval; /* reset */
302 1.2 itojun }
303 1.2 itojun }
304 1.2 itojun if (nd_ra->nd_ra_retransmit)
305 1.2 itojun ndi->retrans = ntohl(nd_ra->nd_ra_retransmit);
306 1.99 roy if (nd_ra->nd_ra_curhoplimit) {
307 1.99 roy if (ndi->chlim < nd_ra->nd_ra_curhoplimit)
308 1.99 roy ndi->chlim = nd_ra->nd_ra_curhoplimit;
309 1.99 roy else if (ndi->chlim != nd_ra->nd_ra_curhoplimit)
310 1.99 roy log(LOG_ERR, "nd_ra_input: lower CurHopLimit sent from "
311 1.99 roy "%s on %s (current=%d, received=%d), ignored\n",
312 1.99 roy ip6_sprintf(&ip6->ip6_src),
313 1.99 roy if_name(ifp), ndi->chlim, nd_ra->nd_ra_curhoplimit);
314 1.99 roy }
315 1.52 christos dr = defrtrlist_update(&drtr);
316 1.2 itojun }
317 1.2 itojun
318 1.2 itojun /*
319 1.2 itojun * prefix
320 1.2 itojun */
321 1.2 itojun if (ndopts.nd_opts_pi) {
322 1.2 itojun struct nd_opt_hdr *pt;
323 1.32 itojun struct nd_opt_prefix_info *pi = NULL;
324 1.94 matt struct nd_prefixctl prc;
325 1.2 itojun
326 1.2 itojun for (pt = (struct nd_opt_hdr *)ndopts.nd_opts_pi;
327 1.2 itojun pt <= (struct nd_opt_hdr *)ndopts.nd_opts_pi_end;
328 1.63 christos pt = (struct nd_opt_hdr *)((char *)pt +
329 1.2 itojun (pt->nd_opt_len << 3))) {
330 1.2 itojun if (pt->nd_opt_type != ND_OPT_PREFIX_INFORMATION)
331 1.2 itojun continue;
332 1.2 itojun pi = (struct nd_opt_prefix_info *)pt;
333 1.2 itojun
334 1.2 itojun if (pi->nd_opt_pi_len != 4) {
335 1.107 ozaki nd6log(LOG_INFO, "invalid option "
336 1.22 itojun "len %d for prefix information option, "
337 1.107 ozaki "ignored\n", pi->nd_opt_pi_len);
338 1.2 itojun continue;
339 1.2 itojun }
340 1.2 itojun
341 1.2 itojun if (128 < pi->nd_opt_pi_prefix_len) {
342 1.107 ozaki nd6log(LOG_INFO, "invalid prefix "
343 1.22 itojun "len %d for prefix information option, "
344 1.107 ozaki "ignored\n", pi->nd_opt_pi_prefix_len);
345 1.2 itojun continue;
346 1.2 itojun }
347 1.2 itojun
348 1.2 itojun if (IN6_IS_ADDR_MULTICAST(&pi->nd_opt_pi_prefix)
349 1.2 itojun || IN6_IS_ADDR_LINKLOCAL(&pi->nd_opt_pi_prefix)) {
350 1.107 ozaki nd6log(LOG_INFO,
351 1.107 ozaki "invalid prefix %s, ignored\n",
352 1.107 ozaki ip6_sprintf(&pi->nd_opt_pi_prefix));
353 1.2 itojun continue;
354 1.2 itojun }
355 1.2 itojun
356 1.94 matt memset(&prc, 0, sizeof(prc));
357 1.94 matt sockaddr_in6_init(&prc.ndprc_prefix,
358 1.69 dyoung &pi->nd_opt_pi_prefix, 0, 0, 0);
359 1.111 ozaki prc.ndprc_ifp = ifp;
360 1.2 itojun
361 1.94 matt prc.ndprc_raf_onlink = (pi->nd_opt_pi_flags_reserved &
362 1.56 rpaulo ND_OPT_PI_FLAG_ONLINK) ? 1 : 0;
363 1.94 matt prc.ndprc_raf_auto = (pi->nd_opt_pi_flags_reserved &
364 1.56 rpaulo ND_OPT_PI_FLAG_AUTO) ? 1 : 0;
365 1.94 matt prc.ndprc_plen = pi->nd_opt_pi_prefix_len;
366 1.94 matt prc.ndprc_vltime = ntohl(pi->nd_opt_pi_valid_time);
367 1.94 matt prc.ndprc_pltime = ntohl(pi->nd_opt_pi_preferred_time);
368 1.2 itojun
369 1.94 matt (void)prelist_update(&prc, dr, m, mcast);
370 1.2 itojun }
371 1.2 itojun }
372 1.2 itojun
373 1.2 itojun /*
374 1.2 itojun * MTU
375 1.2 itojun */
376 1.2 itojun if (ndopts.nd_opts_mtu && ndopts.nd_opts_mtu->nd_opt_mtu_len == 1) {
377 1.32 itojun u_long mtu;
378 1.30 itojun u_long maxmtu;
379 1.2 itojun
380 1.32 itojun mtu = ntohl(ndopts.nd_opts_mtu->nd_opt_mtu_mtu);
381 1.32 itojun
382 1.2 itojun /* lower bound */
383 1.2 itojun if (mtu < IPV6_MMTU) {
384 1.107 ozaki nd6log(LOG_INFO, "bogus mtu option "
385 1.32 itojun "mtu=%lu sent from %s, ignoring\n",
386 1.107 ozaki mtu, ip6_sprintf(&ip6->ip6_src));
387 1.2 itojun goto skip;
388 1.2 itojun }
389 1.2 itojun
390 1.2 itojun /* upper bound */
391 1.30 itojun maxmtu = (ndi->maxmtu && ndi->maxmtu < ifp->if_mtu)
392 1.30 itojun ? ndi->maxmtu : ifp->if_mtu;
393 1.30 itojun if (mtu <= maxmtu) {
394 1.30 itojun int change = (ndi->linkmtu != mtu);
395 1.30 itojun
396 1.30 itojun ndi->linkmtu = mtu;
397 1.30 itojun if (change) /* in6_maxmtu may change */
398 1.30 itojun in6_setmaxmtu();
399 1.2 itojun } else {
400 1.107 ozaki nd6log(LOG_INFO,
401 1.107 ozaki "bogus mtu mtu=%lu sent from %s; "
402 1.30 itojun "exceeds maxmtu %lu, ignoring\n",
403 1.107 ozaki mtu, ip6_sprintf(&ip6->ip6_src), maxmtu);
404 1.2 itojun }
405 1.2 itojun }
406 1.2 itojun
407 1.2 itojun skip:
408 1.33 itojun
409 1.2 itojun /*
410 1.26 itojun * Source link layer address
411 1.2 itojun */
412 1.2 itojun {
413 1.2 itojun char *lladdr = NULL;
414 1.2 itojun int lladdrlen = 0;
415 1.33 itojun
416 1.2 itojun if (ndopts.nd_opts_src_lladdr) {
417 1.2 itojun lladdr = (char *)(ndopts.nd_opts_src_lladdr + 1);
418 1.2 itojun lladdrlen = ndopts.nd_opts_src_lladdr->nd_opt_len << 3;
419 1.2 itojun }
420 1.2 itojun
421 1.2 itojun if (lladdr && ((ifp->if_addrlen + 2 + 7) & ~7) != lladdrlen) {
422 1.107 ozaki nd6log(LOG_INFO, "lladdrlen mismatch for %s "
423 1.30 itojun "(if %d, RA packet %d)\n", ip6_sprintf(&saddr6),
424 1.107 ozaki ifp->if_addrlen, lladdrlen - 2);
425 1.20 itojun goto bad;
426 1.2 itojun }
427 1.2 itojun
428 1.6 itojun nd6_cache_lladdr(ifp, &saddr6, lladdr, lladdrlen, ND_ROUTER_ADVERT, 0);
429 1.7 itojun
430 1.7 itojun /*
431 1.7 itojun * Installing a link-layer address might change the state of the
432 1.7 itojun * router's neighbor cache, which might also affect our on-link
433 1.7 itojun * detection of adveritsed prefixes.
434 1.7 itojun */
435 1.123 ozaki nd6_pfxlist_onlink_check();
436 1.2 itojun }
437 1.12 itojun
438 1.20 itojun freeit:
439 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
440 1.20 itojun m_freem(m);
441 1.20 itojun return;
442 1.20 itojun
443 1.20 itojun bad:
444 1.75 thorpej ICMP6_STATINC(ICMP6_STAT_BADRA);
445 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
446 1.12 itojun m_freem(m);
447 1.2 itojun }
448 1.2 itojun
449 1.2 itojun /*
450 1.45 wiz * default router list processing sub routines
451 1.2 itojun */
452 1.121 ozaki static void
453 1.94 matt defrouter_addreq(struct nd_defrouter *newdr)
454 1.2 itojun {
455 1.76 dyoung union {
456 1.76 dyoung struct sockaddr_in6 sin6;
457 1.76 dyoung struct sockaddr sa;
458 1.76 dyoung } def, mask, gate;
459 1.2 itojun int s;
460 1.32 itojun int error;
461 1.2 itojun
462 1.56 rpaulo memset(&def, 0, sizeof(def));
463 1.56 rpaulo memset(&mask, 0, sizeof(mask));
464 1.56 rpaulo memset(&gate, 0,sizeof(gate)); /* for safety */
465 1.2 itojun
466 1.76 dyoung def.sin6.sin6_len = mask.sin6.sin6_len = gate.sin6.sin6_len =
467 1.32 itojun sizeof(struct sockaddr_in6);
468 1.76 dyoung def.sin6.sin6_family = mask.sin6.sin6_family = gate.sin6.sin6_family = AF_INET6;
469 1.94 matt gate.sin6.sin6_addr = newdr->rtaddr;
470 1.32 itojun #ifndef SCOPEDROUTING
471 1.76 dyoung gate.sin6.sin6_scope_id = 0; /* XXX */
472 1.32 itojun #endif
473 1.2 itojun
474 1.4 itojun s = splsoftnet();
475 1.101 ozaki error = rtrequest_newmsg(RTM_ADD, &def.sa, &gate.sa, &mask.sa,
476 1.101 ozaki RTF_GATEWAY);
477 1.101 ozaki if (error == 0) {
478 1.81 spz nd6_numroutes++;
479 1.101 ozaki newdr->installed = 1;
480 1.32 itojun }
481 1.2 itojun splx(s);
482 1.2 itojun return;
483 1.2 itojun }
484 1.2 itojun
485 1.2 itojun struct nd_defrouter *
486 1.123 ozaki nd6_defrouter_lookup(const struct in6_addr *addr, struct ifnet *ifp)
487 1.2 itojun {
488 1.2 itojun struct nd_defrouter *dr;
489 1.2 itojun
490 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr) {
491 1.66 dyoung if (dr->ifp == ifp && IN6_ARE_ADDR_EQUAL(addr, &dr->rtaddr))
492 1.66 dyoung break;
493 1.7 itojun }
494 1.2 itojun
495 1.66 dyoung return dr; /* search failed */
496 1.2 itojun }
497 1.2 itojun
498 1.2 itojun void
499 1.123 ozaki nd6_defrtrlist_del(struct nd_defrouter *dr, struct in6_ifextra *ext)
500 1.2 itojun {
501 1.2 itojun struct nd_defrouter *deldr = NULL;
502 1.2 itojun struct nd_prefix *pr;
503 1.96 martin struct nd_ifinfo *ndi;
504 1.96 martin
505 1.96 martin if (ext == NULL)
506 1.96 martin ext = dr->ifp->if_afdata[AF_INET6];
507 1.96 martin
508 1.96 martin /* detach already in progress, can not do anything */
509 1.96 martin if (ext == NULL)
510 1.96 martin return;
511 1.96 martin
512 1.96 martin ndi = ext->nd_ifinfo;
513 1.2 itojun
514 1.2 itojun /*
515 1.2 itojun * Flush all the routing table entries that use the router
516 1.2 itojun * as a next hop.
517 1.2 itojun */
518 1.79 tonnerre /* XXX: better condition? */
519 1.80 dyoung if (!ip6_forwarding && nd6_accepts_rtadv(ndi))
520 1.123 ozaki nd6_rt_flush(&dr->rtaddr, dr->ifp);
521 1.32 itojun
522 1.32 itojun if (dr->installed) {
523 1.32 itojun deldr = dr;
524 1.32 itojun defrouter_delreq(dr);
525 1.2 itojun }
526 1.124 ozaki ND_DEFROUTER_LIST_REMOVE(dr);
527 1.2 itojun
528 1.2 itojun /*
529 1.2 itojun * Also delete all the pointers to the router in each prefix lists.
530 1.2 itojun */
531 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
532 1.2 itojun struct nd_pfxrouter *pfxrtr;
533 1.2 itojun if ((pfxrtr = pfxrtr_lookup(pr, dr)) != NULL)
534 1.2 itojun pfxrtr_del(pfxrtr);
535 1.2 itojun }
536 1.123 ozaki nd6_pfxlist_onlink_check();
537 1.2 itojun
538 1.2 itojun /*
539 1.7 itojun * If the router is the primary one, choose a new one.
540 1.123 ozaki * Note that nd6_defrouter_select() will remove the current gateway
541 1.7 itojun * from the routing table.
542 1.2 itojun */
543 1.2 itojun if (deldr)
544 1.123 ozaki nd6_defrouter_select();
545 1.7 itojun
546 1.83 christos ext->ndefrouters--;
547 1.83 christos if (ext->ndefrouters < 0) {
548 1.123 ozaki log(LOG_WARNING, "nd6_defrtrlist_del: negative count on %s\n",
549 1.83 christos dr->ifp->if_xname);
550 1.83 christos }
551 1.83 christos
552 1.2 itojun free(dr, M_IP6NDP);
553 1.2 itojun }
554 1.2 itojun
555 1.7 itojun /*
556 1.32 itojun * Remove the default route for a given router.
557 1.123 ozaki * This is just a subroutine function for nd6_defrouter_select(), and should
558 1.32 itojun * not be called from anywhere else.
559 1.32 itojun */
560 1.32 itojun static void
561 1.64 christos defrouter_delreq(struct nd_defrouter *dr)
562 1.32 itojun {
563 1.76 dyoung union {
564 1.76 dyoung struct sockaddr_in6 sin6;
565 1.76 dyoung struct sockaddr sa;
566 1.76 dyoung } def, mask, gw;
567 1.101 ozaki int error;
568 1.32 itojun
569 1.35 itojun #ifdef DIAGNOSTIC
570 1.56 rpaulo if (dr == NULL)
571 1.35 itojun panic("dr == NULL in defrouter_delreq");
572 1.35 itojun #endif
573 1.35 itojun
574 1.76 dyoung memset(&def, 0, sizeof(def));
575 1.76 dyoung memset(&mask, 0, sizeof(mask));
576 1.76 dyoung memset(&gw, 0, sizeof(gw)); /* for safety */
577 1.32 itojun
578 1.76 dyoung def.sin6.sin6_len = mask.sin6.sin6_len = gw.sin6.sin6_len =
579 1.32 itojun sizeof(struct sockaddr_in6);
580 1.76 dyoung def.sin6.sin6_family = mask.sin6.sin6_family = gw.sin6.sin6_family = AF_INET6;
581 1.76 dyoung gw.sin6.sin6_addr = dr->rtaddr;
582 1.32 itojun #ifndef SCOPEDROUTING
583 1.76 dyoung gw.sin6.sin6_scope_id = 0; /* XXX */
584 1.32 itojun #endif
585 1.32 itojun
586 1.101 ozaki error = rtrequest_newmsg(RTM_DELETE, &def.sa, &gw.sa, &mask.sa,
587 1.101 ozaki RTF_GATEWAY);
588 1.101 ozaki if (error == 0)
589 1.100 ozaki nd6_numroutes--;
590 1.32 itojun
591 1.35 itojun dr->installed = 0;
592 1.32 itojun }
593 1.32 itojun
594 1.32 itojun /*
595 1.32 itojun * remove all default routes from default router list
596 1.32 itojun */
597 1.32 itojun void
598 1.123 ozaki nd6_defrouter_reset(void)
599 1.32 itojun {
600 1.32 itojun struct nd_defrouter *dr;
601 1.32 itojun
602 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr)
603 1.32 itojun defrouter_delreq(dr);
604 1.32 itojun
605 1.32 itojun /*
606 1.32 itojun * XXX should we also nuke any default routers in the kernel, by
607 1.32 itojun * going through them by rtalloc1()?
608 1.32 itojun */
609 1.32 itojun }
610 1.32 itojun
611 1.32 itojun /*
612 1.32 itojun * Default Router Selection according to Section 6.3.6 of RFC 2461 and
613 1.32 itojun * draft-ietf-ipngwg-router-selection:
614 1.32 itojun * 1) Routers that are reachable or probably reachable should be preferred.
615 1.32 itojun * If we have more than one (probably) reachable router, prefer ones
616 1.32 itojun * with the highest router preference.
617 1.7 itojun * 2) When no routers on the list are known to be reachable or
618 1.7 itojun * probably reachable, routers SHOULD be selected in a round-robin
619 1.32 itojun * fashion, regardless of router preference values.
620 1.7 itojun * 3) If the Default Router List is empty, assume that all
621 1.7 itojun * destinations are on-link.
622 1.32 itojun *
623 1.32 itojun * We assume nd_defrouter is sorted by router preference value.
624 1.32 itojun * Since the code below covers both with and without router preference cases,
625 1.32 itojun * we do not need to classify the cases by ifdef.
626 1.32 itojun *
627 1.32 itojun * At this moment, we do not try to install more than one default router,
628 1.32 itojun * even when the multipath routing is available, because we're not sure about
629 1.32 itojun * the benefits for stub hosts comparing to the risk of making the code
630 1.32 itojun * complicated and the possibility of introducing bugs.
631 1.7 itojun */
632 1.7 itojun void
633 1.123 ozaki nd6_defrouter_select(void)
634 1.7 itojun {
635 1.79 tonnerre struct nd_ifinfo *ndi;
636 1.7 itojun int s = splsoftnet();
637 1.32 itojun struct nd_defrouter *dr, *selected_dr = NULL, *installed_dr = NULL;
638 1.7 itojun
639 1.7 itojun /*
640 1.32 itojun * This function should be called only when acting as an autoconfigured
641 1.32 itojun * host. Although the remaining part of this function is not effective
642 1.32 itojun * if the node is not an autoconfigured host, we explicitly exclude
643 1.32 itojun * such cases here for safety.
644 1.7 itojun */
645 1.79 tonnerre if (ip6_forwarding) {
646 1.107 ozaki nd6log(LOG_WARNING, "called unexpectedly (forwarding=%d, "
647 1.107 ozaki "accept_rtadv=%d)\n", ip6_forwarding, ip6_accept_rtadv);
648 1.32 itojun splx(s);
649 1.32 itojun return;
650 1.7 itojun }
651 1.7 itojun
652 1.32 itojun /*
653 1.32 itojun * Let's handle easy case (3) first:
654 1.49 itojun * If default router list is empty, there's nothing to be done.
655 1.32 itojun */
656 1.124 ozaki if (ND_DEFROUTER_LIST_EMPTY()) {
657 1.32 itojun splx(s);
658 1.32 itojun return;
659 1.32 itojun }
660 1.32 itojun
661 1.32 itojun /*
662 1.32 itojun * Search for a (probably) reachable router from the list.
663 1.32 itojun * We just pick up the first reachable one (if any), assuming that
664 1.32 itojun * the ordering rule of the list described in defrtrlist_update().
665 1.32 itojun */
666 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr) {
667 1.79 tonnerre ndi = ND_IFINFO(dr->ifp);
668 1.80 dyoung if (nd6_accepts_rtadv(ndi))
669 1.79 tonnerre continue;
670 1.79 tonnerre
671 1.56 rpaulo if (selected_dr == NULL &&
672 1.101 ozaki nd6_is_llinfo_probreach(dr))
673 1.32 itojun selected_dr = dr;
674 1.32 itojun
675 1.32 itojun if (dr->installed && !installed_dr)
676 1.32 itojun installed_dr = dr;
677 1.32 itojun else if (dr->installed && installed_dr) {
678 1.32 itojun /* this should not happen. warn for diagnosis. */
679 1.123 ozaki log(LOG_ERR, "nd6_defrouter_select: more than one router"
680 1.32 itojun " is installed\n");
681 1.32 itojun }
682 1.32 itojun }
683 1.32 itojun /*
684 1.32 itojun * If none of the default routers was found to be reachable,
685 1.32 itojun * round-robin the list regardless of preference.
686 1.32 itojun * Otherwise, if we have an installed router, check if the selected
687 1.32 itojun * (reachable) router should really be preferred to the installed one.
688 1.32 itojun * We only prefer the new router when the old one is not reachable
689 1.32 itojun * or when the new one has a really higher preference value.
690 1.32 itojun */
691 1.56 rpaulo if (selected_dr == NULL) {
692 1.124 ozaki if (installed_dr == NULL ||
693 1.124 ozaki ND_DEFROUTER_LIST_NEXT(installed_dr) == NULL)
694 1.124 ozaki selected_dr = ND_DEFROUTER_LIST_FIRST();
695 1.32 itojun else
696 1.124 ozaki selected_dr = ND_DEFROUTER_LIST_NEXT(installed_dr);
697 1.32 itojun } else if (installed_dr &&
698 1.101 ozaki nd6_is_llinfo_probreach(installed_dr) &&
699 1.32 itojun rtpref(selected_dr) <= rtpref(installed_dr)) {
700 1.32 itojun selected_dr = installed_dr;
701 1.32 itojun }
702 1.32 itojun
703 1.32 itojun /*
704 1.32 itojun * If the selected router is different than the installed one,
705 1.32 itojun * remove the installed router and install the selected one.
706 1.32 itojun * Note that the selected router is never NULL here.
707 1.32 itojun */
708 1.32 itojun if (installed_dr != selected_dr) {
709 1.32 itojun if (installed_dr)
710 1.32 itojun defrouter_delreq(installed_dr);
711 1.32 itojun defrouter_addreq(selected_dr);
712 1.7 itojun }
713 1.7 itojun
714 1.7 itojun splx(s);
715 1.7 itojun return;
716 1.7 itojun }
717 1.7 itojun
718 1.32 itojun /*
719 1.32 itojun * for default router selection
720 1.32 itojun * regards router-preference field as a 2-bit signed integer
721 1.32 itojun */
722 1.32 itojun static int
723 1.32 itojun rtpref(struct nd_defrouter *dr)
724 1.32 itojun {
725 1.32 itojun switch (dr->flags & ND_RA_FLAG_RTPREF_MASK) {
726 1.32 itojun case ND_RA_FLAG_RTPREF_HIGH:
727 1.56 rpaulo return (RTPREF_HIGH);
728 1.32 itojun case ND_RA_FLAG_RTPREF_MEDIUM:
729 1.58 rpaulo case ND_RA_FLAG_RTPREF_RSV:
730 1.56 rpaulo return (RTPREF_MEDIUM);
731 1.32 itojun case ND_RA_FLAG_RTPREF_LOW:
732 1.56 rpaulo return (RTPREF_LOW);
733 1.32 itojun default:
734 1.32 itojun /*
735 1.32 itojun * This case should never happen. If it did, it would mean a
736 1.32 itojun * serious bug of kernel internal. We thus always bark here.
737 1.32 itojun * Or, can we even panic?
738 1.32 itojun */
739 1.56 rpaulo log(LOG_ERR, "rtpref: impossible RA flag %x\n", dr->flags);
740 1.56 rpaulo return (RTPREF_INVALID);
741 1.32 itojun }
742 1.32 itojun /* NOTREACHED */
743 1.32 itojun }
744 1.32 itojun
745 1.2 itojun static struct nd_defrouter *
746 1.94 matt defrtrlist_update(struct nd_defrouter *newdr)
747 1.2 itojun {
748 1.2 itojun struct nd_defrouter *dr, *n;
749 1.94 matt struct in6_ifextra *ext = newdr->ifp->if_afdata[AF_INET6];
750 1.4 itojun int s = splsoftnet();
751 1.2 itojun
752 1.123 ozaki if ((dr = nd6_defrouter_lookup(&newdr->rtaddr, newdr->ifp)) != NULL) {
753 1.2 itojun /* entry exists */
754 1.94 matt if (newdr->rtlifetime == 0) {
755 1.123 ozaki nd6_defrtrlist_del(dr, ext);
756 1.2 itojun dr = NULL;
757 1.2 itojun } else {
758 1.32 itojun int oldpref = rtpref(dr);
759 1.32 itojun
760 1.2 itojun /* override */
761 1.94 matt dr->flags = newdr->flags; /* xxx flag check */
762 1.94 matt dr->rtlifetime = newdr->rtlifetime;
763 1.94 matt dr->expire = newdr->expire;
764 1.32 itojun
765 1.32 itojun /*
766 1.32 itojun * If the preference does not change, there's no need
767 1.32 itojun * to sort the entries.
768 1.32 itojun */
769 1.94 matt if (rtpref(newdr) == oldpref) {
770 1.32 itojun splx(s);
771 1.36 itojun return (dr);
772 1.32 itojun }
773 1.32 itojun
774 1.32 itojun /*
775 1.32 itojun * preferred router may be changed, so relocate
776 1.32 itojun * this router.
777 1.32 itojun * XXX: calling TAILQ_REMOVE directly is a bad manner.
778 1.123 ozaki * However, since nd6_defrtrlist_del() has many side
779 1.32 itojun * effects, we intentionally do so here.
780 1.123 ozaki * nd6_defrouter_select() below will handle routing
781 1.32 itojun * changes later.
782 1.32 itojun */
783 1.124 ozaki ND_DEFROUTER_LIST_REMOVE(dr);
784 1.32 itojun n = dr;
785 1.32 itojun goto insert;
786 1.2 itojun }
787 1.2 itojun splx(s);
788 1.36 itojun return (dr);
789 1.2 itojun }
790 1.2 itojun
791 1.83 christos if (ip6_maxifdefrouters >= 0 &&
792 1.83 christos ext->ndefrouters >= ip6_maxifdefrouters) {
793 1.83 christos splx(s);
794 1.83 christos return (NULL);
795 1.83 christos }
796 1.83 christos
797 1.2 itojun /* entry does not exist */
798 1.94 matt if (newdr->rtlifetime == 0) {
799 1.2 itojun splx(s);
800 1.36 itojun return (NULL);
801 1.2 itojun }
802 1.2 itojun
803 1.81 spz if (ip6_rtadv_maxroutes <= nd6_numroutes) {
804 1.81 spz ICMP6_STATINC(ICMP6_STAT_DROPPED_RAROUTE);
805 1.81 spz splx(s);
806 1.81 spz return (NULL);
807 1.81 spz }
808 1.81 spz
809 1.2 itojun n = (struct nd_defrouter *)malloc(sizeof(*n), M_IP6NDP, M_NOWAIT);
810 1.2 itojun if (n == NULL) {
811 1.2 itojun splx(s);
812 1.36 itojun return (NULL);
813 1.2 itojun }
814 1.78 cegger memset(n, 0, sizeof(*n));
815 1.94 matt *n = *newdr;
816 1.7 itojun
817 1.32 itojun insert:
818 1.7 itojun /*
819 1.32 itojun * Insert the new router in the Default Router List;
820 1.32 itojun * The Default Router List should be in the descending order
821 1.32 itojun * of router-preferece. Routers with the same preference are
822 1.32 itojun * sorted in the arriving time order.
823 1.7 itojun */
824 1.32 itojun
825 1.32 itojun /* insert at the end of the group */
826 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr) {
827 1.32 itojun if (rtpref(n) > rtpref(dr))
828 1.32 itojun break;
829 1.32 itojun }
830 1.32 itojun if (dr)
831 1.124 ozaki ND_DEFROUTER_LIST_INSERT_BEFORE(dr, n);
832 1.32 itojun else
833 1.124 ozaki ND_DEFROUTER_LIST_INSERT_TAIL(n);
834 1.32 itojun
835 1.123 ozaki nd6_defrouter_select();
836 1.32 itojun
837 1.83 christos ext->ndefrouters++;
838 1.83 christos
839 1.2 itojun splx(s);
840 1.33 itojun
841 1.36 itojun return (n);
842 1.2 itojun }
843 1.2 itojun
844 1.2 itojun static struct nd_pfxrouter *
845 1.64 christos pfxrtr_lookup(struct nd_prefix *pr, struct nd_defrouter *dr)
846 1.2 itojun {
847 1.2 itojun struct nd_pfxrouter *search;
848 1.33 itojun
849 1.62 dyoung LIST_FOREACH(search, &pr->ndpr_advrtrs, pfr_entry) {
850 1.2 itojun if (search->router == dr)
851 1.2 itojun break;
852 1.2 itojun }
853 1.2 itojun
854 1.36 itojun return (search);
855 1.2 itojun }
856 1.2 itojun
857 1.2 itojun static void
858 1.64 christos pfxrtr_add(struct nd_prefix *pr, struct nd_defrouter *dr)
859 1.2 itojun {
860 1.94 matt struct nd_pfxrouter *newpfr;
861 1.2 itojun
862 1.94 matt newpfr = malloc(sizeof(*newpfr), M_IP6NDP, M_NOWAIT|M_ZERO);
863 1.94 matt if (newpfr == NULL)
864 1.2 itojun return;
865 1.94 matt newpfr->router = dr;
866 1.2 itojun
867 1.94 matt LIST_INSERT_HEAD(&pr->ndpr_advrtrs, newpfr, pfr_entry);
868 1.2 itojun
869 1.123 ozaki nd6_pfxlist_onlink_check();
870 1.2 itojun }
871 1.2 itojun
872 1.2 itojun static void
873 1.64 christos pfxrtr_del(struct nd_pfxrouter *pfr)
874 1.2 itojun {
875 1.2 itojun LIST_REMOVE(pfr, pfr_entry);
876 1.2 itojun free(pfr, M_IP6NDP);
877 1.2 itojun }
878 1.2 itojun
879 1.121 ozaki static struct nd_prefix *
880 1.64 christos nd6_prefix_lookup(struct nd_prefixctl *key)
881 1.2 itojun {
882 1.2 itojun struct nd_prefix *search;
883 1.2 itojun
884 1.125 ozaki ND_PREFIX_LIST_FOREACH(search) {
885 1.94 matt if (key->ndprc_ifp == search->ndpr_ifp &&
886 1.94 matt key->ndprc_plen == search->ndpr_plen &&
887 1.94 matt in6_are_prefix_equal(&key->ndprc_prefix.sin6_addr,
888 1.94 matt &search->ndpr_prefix.sin6_addr, key->ndprc_plen)) {
889 1.2 itojun break;
890 1.2 itojun }
891 1.2 itojun }
892 1.2 itojun
893 1.36 itojun return (search);
894 1.2 itojun }
895 1.2 itojun
896 1.83 christos static void
897 1.83 christos purge_detached(struct ifnet *ifp)
898 1.83 christos {
899 1.83 christos struct nd_prefix *pr, *pr_next;
900 1.83 christos struct in6_ifaddr *ia;
901 1.93 ozaki struct ifaddr *ifa, *ifa_next;
902 1.83 christos
903 1.83 christos for (pr = nd_prefix.lh_first; pr; pr = pr_next) {
904 1.118 ozaki int s;
905 1.83 christos pr_next = pr->ndpr_next;
906 1.83 christos
907 1.83 christos /*
908 1.83 christos * This function is called when we need to make more room for
909 1.83 christos * new prefixes rather than keeping old, possibly stale ones.
910 1.83 christos * Detached prefixes would be a good candidate; if all routers
911 1.83 christos * that advertised the prefix expired, the prefix is also
912 1.83 christos * probably stale.
913 1.83 christos */
914 1.83 christos if (pr->ndpr_ifp != ifp ||
915 1.83 christos IN6_IS_ADDR_LINKLOCAL(&pr->ndpr_prefix.sin6_addr) ||
916 1.83 christos ((pr->ndpr_stateflags & NDPRF_DETACHED) == 0 &&
917 1.83 christos !LIST_EMPTY(&pr->ndpr_advrtrs)))
918 1.83 christos continue;
919 1.83 christos
920 1.118 ozaki restart:
921 1.118 ozaki s = pserialize_read_enter();
922 1.115 ozaki for (ifa = IFADDR_READER_FIRST(ifp); ifa; ifa = ifa_next) {
923 1.115 ozaki ifa_next = IFADDR_READER_NEXT(ifa);
924 1.83 christos if (ifa->ifa_addr->sa_family != AF_INET6)
925 1.83 christos continue;
926 1.83 christos ia = (struct in6_ifaddr *)ifa;
927 1.83 christos if ((ia->ia6_flags & IN6_IFF_AUTOCONF) ==
928 1.83 christos IN6_IFF_AUTOCONF && ia->ia6_ndpr == pr) {
929 1.118 ozaki pserialize_read_exit(s);
930 1.83 christos in6_purgeaddr(ifa);
931 1.118 ozaki goto restart;
932 1.83 christos }
933 1.83 christos }
934 1.118 ozaki pserialize_read_exit(s);
935 1.118 ozaki
936 1.83 christos if (pr->ndpr_refcnt == 0)
937 1.123 ozaki nd6_prelist_remove(pr);
938 1.83 christos }
939 1.83 christos }
940 1.121 ozaki
941 1.121 ozaki static int
942 1.94 matt nd6_prelist_add(struct nd_prefixctl *prc, struct nd_defrouter *dr,
943 1.64 christos struct nd_prefix **newp)
944 1.2 itojun {
945 1.94 matt struct nd_prefix *newpr = NULL;
946 1.2 itojun int i, s;
947 1.56 rpaulo int error;
948 1.94 matt struct in6_ifextra *ext = prc->ndprc_ifp->if_afdata[AF_INET6];
949 1.83 christos
950 1.83 christos if (ip6_maxifprefixes >= 0) {
951 1.83 christos if (ext->nprefixes >= ip6_maxifprefixes / 2)
952 1.94 matt purge_detached(prc->ndprc_ifp);
953 1.83 christos if (ext->nprefixes >= ip6_maxifprefixes)
954 1.83 christos return ENOMEM;
955 1.83 christos }
956 1.2 itojun
957 1.56 rpaulo error = 0;
958 1.94 matt newpr = malloc(sizeof(*newpr), M_IP6NDP, M_NOWAIT|M_ZERO);
959 1.94 matt if (newpr == NULL)
960 1.2 itojun return ENOMEM;
961 1.94 matt newpr->ndpr_ifp = prc->ndprc_ifp;
962 1.94 matt newpr->ndpr_prefix = prc->ndprc_prefix;
963 1.94 matt newpr->ndpr_plen = prc->ndprc_plen;
964 1.94 matt newpr->ndpr_vltime = prc->ndprc_vltime;
965 1.94 matt newpr->ndpr_pltime = prc->ndprc_pltime;
966 1.94 matt newpr->ndpr_flags = prc->ndprc_flags;
967 1.94 matt if ((error = in6_init_prefix_ltimes(newpr)) != 0) {
968 1.94 matt free(newpr, M_IP6NDP);
969 1.56 rpaulo return(error);
970 1.56 rpaulo }
971 1.102 ozaki newpr->ndpr_lastupdate = time_uptime;
972 1.32 itojun if (newp != NULL)
973 1.94 matt *newp = newpr;
974 1.2 itojun
975 1.55 rpaulo /* initialization */
976 1.94 matt LIST_INIT(&newpr->ndpr_advrtrs);
977 1.94 matt in6_prefixlen2mask(&newpr->ndpr_mask, newpr->ndpr_plen);
978 1.2 itojun /* make prefix in the canonical form */
979 1.94 matt for (i = 0; i < 4; i++) {
980 1.94 matt newpr->ndpr_prefix.sin6_addr.s6_addr32[i] &=
981 1.94 matt newpr->ndpr_mask.s6_addr32[i];
982 1.94 matt }
983 1.2 itojun
984 1.4 itojun s = splsoftnet();
985 1.2 itojun /* link ndpr_entry to nd_prefix list */
986 1.125 ozaki ND_PREFIX_LIST_INSERT_HEAD(newpr);
987 1.2 itojun splx(s);
988 1.2 itojun
989 1.32 itojun /* ND_OPT_PI_FLAG_ONLINK processing */
990 1.94 matt if (newpr->ndpr_raf_onlink) {
991 1.32 itojun int e;
992 1.32 itojun
993 1.94 matt if ((e = nd6_prefix_onlink(newpr)) != 0) {
994 1.107 ozaki nd6log(LOG_ERR, "failed to make "
995 1.32 itojun "the prefix %s/%d on-link on %s (errno=%d)\n",
996 1.94 matt ip6_sprintf(&prc->ndprc_prefix.sin6_addr),
997 1.107 ozaki prc->ndprc_plen, if_name(prc->ndprc_ifp), e);
998 1.32 itojun /* proceed anyway. XXX: is it correct? */
999 1.32 itojun }
1000 1.32 itojun }
1001 1.32 itojun
1002 1.2 itojun if (dr)
1003 1.94 matt pfxrtr_add(newpr, dr);
1004 1.2 itojun
1005 1.83 christos ext->nprefixes++;
1006 1.83 christos
1007 1.2 itojun return 0;
1008 1.2 itojun }
1009 1.2 itojun
1010 1.2 itojun void
1011 1.123 ozaki nd6_prelist_remove(struct nd_prefix *pr)
1012 1.2 itojun {
1013 1.2 itojun struct nd_pfxrouter *pfr, *next;
1014 1.32 itojun int e, s;
1015 1.83 christos struct in6_ifextra *ext = pr->ndpr_ifp->if_afdata[AF_INET6];
1016 1.32 itojun
1017 1.32 itojun /* make sure to invalidate the prefix until it is really freed. */
1018 1.32 itojun pr->ndpr_vltime = 0;
1019 1.32 itojun pr->ndpr_pltime = 0;
1020 1.32 itojun #if 0
1021 1.32 itojun /*
1022 1.32 itojun * Though these flags are now meaningless, we'd rather keep the value
1023 1.32 itojun * not to confuse users when executing "ndp -p".
1024 1.32 itojun */
1025 1.32 itojun pr->ndpr_raf_onlink = 0;
1026 1.32 itojun pr->ndpr_raf_auto = 0;
1027 1.32 itojun #endif
1028 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_ONLINK) != 0 &&
1029 1.32 itojun (e = nd6_prefix_offlink(pr)) != 0) {
1030 1.107 ozaki nd6log(LOG_ERR,
1031 1.107 ozaki "failed to make %s/%d offlink on %s, errno=%d\n",
1032 1.32 itojun ip6_sprintf(&pr->ndpr_prefix.sin6_addr),
1033 1.107 ozaki pr->ndpr_plen, if_name(pr->ndpr_ifp), e);
1034 1.32 itojun /* what should we do? */
1035 1.32 itojun }
1036 1.32 itojun
1037 1.32 itojun if (pr->ndpr_refcnt > 0)
1038 1.32 itojun return; /* notice here? */
1039 1.2 itojun
1040 1.4 itojun s = splsoftnet();
1041 1.2 itojun /* unlink ndpr_entry from nd_prefix list */
1042 1.125 ozaki ND_PREFIX_LIST_REMOVE(pr);
1043 1.2 itojun
1044 1.2 itojun /* free list of routers that adversed the prefix */
1045 1.62 dyoung for (pfr = LIST_FIRST(&pr->ndpr_advrtrs); pfr != NULL; pfr = next) {
1046 1.62 dyoung next = LIST_NEXT(pfr, pfr_entry);
1047 1.2 itojun
1048 1.2 itojun free(pfr, M_IP6NDP);
1049 1.2 itojun }
1050 1.83 christos
1051 1.86 christos if (ext) {
1052 1.86 christos ext->nprefixes--;
1053 1.86 christos if (ext->nprefixes < 0) {
1054 1.123 ozaki log(LOG_WARNING, "nd6_prelist_remove: negative count on "
1055 1.86 christos "%s\n", pr->ndpr_ifp->if_xname);
1056 1.86 christos }
1057 1.83 christos }
1058 1.21 itojun splx(s);
1059 1.21 itojun
1060 1.2 itojun free(pr, M_IP6NDP);
1061 1.2 itojun
1062 1.123 ozaki nd6_pfxlist_onlink_check();
1063 1.2 itojun }
1064 1.2 itojun
1065 1.56 rpaulo static int
1066 1.94 matt prelist_update(struct nd_prefixctl *newprc,
1067 1.64 christos struct nd_defrouter *dr, /* may be NULL */
1068 1.64 christos struct mbuf *m,
1069 1.64 christos int mcast)
1070 1.2 itojun {
1071 1.114 ozaki struct in6_ifaddr *ia6_match = NULL;
1072 1.32 itojun struct ifaddr *ifa;
1073 1.94 matt struct ifnet *ifp = newprc->ndprc_ifp;
1074 1.2 itojun struct nd_prefix *pr;
1075 1.4 itojun int s = splsoftnet();
1076 1.2 itojun int error = 0;
1077 1.2 itojun int auth;
1078 1.32 itojun struct in6_addrlifetime lt6_tmp;
1079 1.118 ozaki int ss;
1080 1.2 itojun
1081 1.7 itojun auth = 0;
1082 1.2 itojun if (m) {
1083 1.2 itojun /*
1084 1.2 itojun * Authenticity for NA consists authentication for
1085 1.2 itojun * both IP header and IP datagrams, doesn't it ?
1086 1.2 itojun */
1087 1.7 itojun #if defined(M_AUTHIPHDR) && defined(M_AUTHIPDGM)
1088 1.2 itojun auth = (m->m_flags & M_AUTHIPHDR
1089 1.2 itojun && m->m_flags & M_AUTHIPDGM) ? 1 : 0;
1090 1.7 itojun #endif
1091 1.7 itojun }
1092 1.2 itojun
1093 1.94 matt if ((pr = nd6_prefix_lookup(newprc)) != NULL) {
1094 1.32 itojun /*
1095 1.94 matt * nd6_prefix_lookup() ensures that pr and newprc have the same
1096 1.32 itojun * prefix on a same interface.
1097 1.32 itojun */
1098 1.32 itojun
1099 1.32 itojun /*
1100 1.32 itojun * Update prefix information. Note that the on-link (L) bit
1101 1.32 itojun * and the autonomous (A) bit should NOT be changed from 1
1102 1.32 itojun * to 0.
1103 1.32 itojun */
1104 1.94 matt if (newprc->ndprc_raf_onlink == 1)
1105 1.32 itojun pr->ndpr_raf_onlink = 1;
1106 1.94 matt if (newprc->ndprc_raf_auto == 1)
1107 1.32 itojun pr->ndpr_raf_auto = 1;
1108 1.94 matt if (newprc->ndprc_raf_onlink) {
1109 1.94 matt pr->ndpr_vltime = newprc->ndprc_vltime;
1110 1.94 matt pr->ndpr_pltime = newprc->ndprc_pltime;
1111 1.56 rpaulo (void)in6_init_prefix_ltimes(pr); /* XXX error case? */
1112 1.102 ozaki pr->ndpr_lastupdate = time_uptime;
1113 1.32 itojun }
1114 1.32 itojun
1115 1.94 matt if (newprc->ndprc_raf_onlink &&
1116 1.32 itojun (pr->ndpr_stateflags & NDPRF_ONLINK) == 0) {
1117 1.32 itojun int e;
1118 1.32 itojun
1119 1.32 itojun if ((e = nd6_prefix_onlink(pr)) != 0) {
1120 1.107 ozaki nd6log(LOG_ERR,
1121 1.107 ozaki "failed to make "
1122 1.32 itojun "the prefix %s/%d on-link on %s "
1123 1.107 ozaki "(errno=%d)\n",
1124 1.32 itojun ip6_sprintf(&pr->ndpr_prefix.sin6_addr),
1125 1.107 ozaki pr->ndpr_plen, if_name(pr->ndpr_ifp), e);
1126 1.32 itojun /* proceed anyway. XXX: is it correct? */
1127 1.32 itojun }
1128 1.32 itojun }
1129 1.32 itojun
1130 1.32 itojun if (dr && pfxrtr_lookup(pr, dr) == NULL)
1131 1.32 itojun pfxrtr_add(pr, dr);
1132 1.32 itojun } else {
1133 1.32 itojun struct nd_prefix *newpr = NULL;
1134 1.32 itojun
1135 1.94 matt if (newprc->ndprc_vltime == 0)
1136 1.2 itojun goto end;
1137 1.94 matt if (newprc->ndprc_raf_onlink == 0 && newprc->ndprc_raf_auto == 0)
1138 1.32 itojun goto end;
1139 1.32 itojun
1140 1.81 spz if (ip6_rtadv_maxroutes <= nd6_numroutes) {
1141 1.81 spz ICMP6_STATINC(ICMP6_STAT_DROPPED_RAROUTE);
1142 1.81 spz goto end;
1143 1.81 spz }
1144 1.81 spz
1145 1.94 matt error = nd6_prelist_add(newprc, dr, &newpr);
1146 1.32 itojun if (error != 0 || newpr == NULL) {
1147 1.107 ozaki nd6log(LOG_NOTICE,
1148 1.107 ozaki "nd6_prelist_add failed for %s/%d on %s "
1149 1.107 ozaki "errno=%d, returnpr=%p\n",
1150 1.94 matt ip6_sprintf(&newprc->ndprc_prefix.sin6_addr),
1151 1.94 matt newprc->ndprc_plen, if_name(newprc->ndprc_ifp),
1152 1.107 ozaki error, newpr);
1153 1.32 itojun goto end; /* we should just give up in this case. */
1154 1.2 itojun }
1155 1.2 itojun
1156 1.2 itojun /*
1157 1.32 itojun * XXX: from the ND point of view, we can ignore a prefix
1158 1.32 itojun * with the on-link bit being zero. However, we need a
1159 1.32 itojun * prefix structure for references from autoconfigured
1160 1.32 itojun * addresses. Thus, we explicitly make sure that the prefix
1161 1.32 itojun * itself expires now.
1162 1.2 itojun */
1163 1.32 itojun if (newpr->ndpr_raf_onlink == 0) {
1164 1.32 itojun newpr->ndpr_vltime = 0;
1165 1.32 itojun newpr->ndpr_pltime = 0;
1166 1.32 itojun in6_init_prefix_ltimes(newpr);
1167 1.32 itojun }
1168 1.2 itojun
1169 1.32 itojun pr = newpr;
1170 1.32 itojun }
1171 1.32 itojun
1172 1.32 itojun /*
1173 1.32 itojun * Address autoconfiguration based on Section 5.5.3 of RFC 2462.
1174 1.32 itojun * Note that pr must be non NULL at this point.
1175 1.32 itojun */
1176 1.32 itojun
1177 1.32 itojun /* 5.5.3 (a). Ignore the prefix without the A bit set. */
1178 1.94 matt if (!newprc->ndprc_raf_auto)
1179 1.32 itojun goto end;
1180 1.2 itojun
1181 1.32 itojun /*
1182 1.32 itojun * 5.5.3 (b). the link-local prefix should have been ignored in
1183 1.32 itojun * nd6_ra_input.
1184 1.32 itojun */
1185 1.2 itojun
1186 1.56 rpaulo /* 5.5.3 (c). Consistency check on lifetimes: pltime <= vltime. */
1187 1.94 matt if (newprc->ndprc_pltime > newprc->ndprc_vltime) {
1188 1.56 rpaulo error = EINVAL; /* XXX: won't be used */
1189 1.56 rpaulo goto end;
1190 1.56 rpaulo }
1191 1.2 itojun
1192 1.32 itojun /*
1193 1.56 rpaulo * 5.5.3 (d). If the prefix advertised is not equal to the prefix of
1194 1.56 rpaulo * an address configured by stateless autoconfiguration already in the
1195 1.56 rpaulo * list of addresses associated with the interface, and the Valid
1196 1.56 rpaulo * Lifetime is not 0, form an address. We first check if we have
1197 1.56 rpaulo * a matching prefix.
1198 1.56 rpaulo * Note: we apply a clarification in rfc2462bis-02 here. We only
1199 1.56 rpaulo * consider autoconfigured addresses while RFC2462 simply said
1200 1.56 rpaulo * "address".
1201 1.32 itojun */
1202 1.118 ozaki ss = pserialize_read_enter();
1203 1.115 ozaki IFADDR_READER_FOREACH(ifa, ifp) {
1204 1.114 ozaki struct in6_ifaddr *ia6;
1205 1.56 rpaulo u_int32_t remaininglifetime;
1206 1.2 itojun
1207 1.32 itojun if (ifa->ifa_addr->sa_family != AF_INET6)
1208 1.32 itojun continue;
1209 1.2 itojun
1210 1.114 ozaki ia6 = (struct in6_ifaddr *)ifa;
1211 1.2 itojun
1212 1.32 itojun /*
1213 1.56 rpaulo * We only consider autoconfigured addresses as per rfc2462bis.
1214 1.56 rpaulo */
1215 1.114 ozaki if (!(ia6->ia6_flags & IN6_IFF_AUTOCONF))
1216 1.56 rpaulo continue;
1217 1.56 rpaulo
1218 1.56 rpaulo /*
1219 1.32 itojun * Spec is not clear here, but I believe we should concentrate
1220 1.32 itojun * on unicast (i.e. not anycast) addresses.
1221 1.32 itojun * XXX: other ia6_flags? detached or duplicated?
1222 1.32 itojun */
1223 1.114 ozaki if ((ia6->ia6_flags & IN6_IFF_ANYCAST) != 0)
1224 1.32 itojun continue;
1225 1.33 itojun
1226 1.56 rpaulo /*
1227 1.56 rpaulo * Ignore the address if it is not associated with a prefix
1228 1.56 rpaulo * or is associated with a prefix that is different from this
1229 1.56 rpaulo * one. (pr is never NULL here)
1230 1.56 rpaulo */
1231 1.114 ozaki if (ia6->ia6_ndpr != pr)
1232 1.32 itojun continue;
1233 1.7 itojun
1234 1.32 itojun if (ia6_match == NULL) /* remember the first one */
1235 1.114 ozaki ia6_match = ia6;
1236 1.2 itojun
1237 1.32 itojun /*
1238 1.32 itojun * An already autoconfigured address matched. Now that we
1239 1.32 itojun * are sure there is at least one matched address, we can
1240 1.32 itojun * proceed to 5.5.3. (e): update the lifetimes according to the
1241 1.32 itojun * "two hours" rule and the privacy extension.
1242 1.56 rpaulo * We apply some clarifications in rfc2462bis:
1243 1.56 rpaulo * - use remaininglifetime instead of storedlifetime as a
1244 1.56 rpaulo * variable name
1245 1.56 rpaulo * - remove the dead code in the "two-hour" rule
1246 1.32 itojun */
1247 1.32 itojun #define TWOHOUR (120*60)
1248 1.114 ozaki lt6_tmp = ia6->ia6_lifetime;
1249 1.32 itojun if (lt6_tmp.ia6t_vltime == ND6_INFINITE_LIFETIME)
1250 1.56 rpaulo remaininglifetime = ND6_INFINITE_LIFETIME;
1251 1.114 ozaki else if (time_uptime - ia6->ia6_updatetime >
1252 1.32 itojun lt6_tmp.ia6t_vltime) {
1253 1.32 itojun /*
1254 1.32 itojun * The case of "invalid" address. We should usually
1255 1.32 itojun * not see this case.
1256 1.32 itojun */
1257 1.56 rpaulo remaininglifetime = 0;
1258 1.32 itojun } else
1259 1.56 rpaulo remaininglifetime = lt6_tmp.ia6t_vltime -
1260 1.114 ozaki (time_uptime - ia6->ia6_updatetime);
1261 1.56 rpaulo
1262 1.56 rpaulo /* when not updating, keep the current stored lifetime. */
1263 1.56 rpaulo lt6_tmp.ia6t_vltime = remaininglifetime;
1264 1.56 rpaulo
1265 1.94 matt if (TWOHOUR < newprc->ndprc_vltime ||
1266 1.94 matt remaininglifetime < newprc->ndprc_vltime) {
1267 1.94 matt lt6_tmp.ia6t_vltime = newprc->ndprc_vltime;
1268 1.56 rpaulo } else if (remaininglifetime <= TWOHOUR) {
1269 1.56 rpaulo if (auth)
1270 1.94 matt lt6_tmp.ia6t_vltime = newprc->ndprc_vltime;
1271 1.32 itojun } else {
1272 1.32 itojun /*
1273 1.94 matt * newprc->ndprc_vltime <= TWOHOUR &&
1274 1.56 rpaulo * TWOHOUR < remaininglifetime
1275 1.32 itojun */
1276 1.32 itojun lt6_tmp.ia6t_vltime = TWOHOUR;
1277 1.2 itojun }
1278 1.2 itojun
1279 1.32 itojun /* The 2 hour rule is not imposed for preferred lifetime. */
1280 1.94 matt lt6_tmp.ia6t_pltime = newprc->ndprc_pltime;
1281 1.2 itojun
1282 1.32 itojun in6_init_address_ltimes(pr, <6_tmp);
1283 1.2 itojun
1284 1.56 rpaulo /*
1285 1.56 rpaulo * We need to treat lifetimes for temporary addresses
1286 1.56 rpaulo * differently, according to
1287 1.56 rpaulo * draft-ietf-ipv6-privacy-addrs-v2-01.txt 3.3 (1);
1288 1.56 rpaulo * we only update the lifetimes when they are in the maximum
1289 1.56 rpaulo * intervals.
1290 1.56 rpaulo */
1291 1.114 ozaki if ((ia6->ia6_flags & IN6_IFF_TEMPORARY) != 0) {
1292 1.56 rpaulo u_int32_t maxvltime, maxpltime;
1293 1.56 rpaulo
1294 1.56 rpaulo if (ip6_temp_valid_lifetime >
1295 1.114 ozaki (u_int32_t)((time_uptime - ia6->ia6_createtime) +
1296 1.56 rpaulo ip6_desync_factor)) {
1297 1.56 rpaulo maxvltime = ip6_temp_valid_lifetime -
1298 1.114 ozaki (time_uptime - ia6->ia6_createtime) -
1299 1.56 rpaulo ip6_desync_factor;
1300 1.56 rpaulo } else
1301 1.56 rpaulo maxvltime = 0;
1302 1.56 rpaulo if (ip6_temp_preferred_lifetime >
1303 1.114 ozaki (u_int32_t)((time_uptime - ia6->ia6_createtime) +
1304 1.56 rpaulo ip6_desync_factor)) {
1305 1.56 rpaulo maxpltime = ip6_temp_preferred_lifetime -
1306 1.114 ozaki (time_uptime - ia6->ia6_createtime) -
1307 1.56 rpaulo ip6_desync_factor;
1308 1.56 rpaulo } else
1309 1.56 rpaulo maxpltime = 0;
1310 1.56 rpaulo
1311 1.56 rpaulo if (lt6_tmp.ia6t_vltime == ND6_INFINITE_LIFETIME ||
1312 1.56 rpaulo lt6_tmp.ia6t_vltime > maxvltime) {
1313 1.56 rpaulo lt6_tmp.ia6t_vltime = maxvltime;
1314 1.56 rpaulo }
1315 1.56 rpaulo if (lt6_tmp.ia6t_pltime == ND6_INFINITE_LIFETIME ||
1316 1.56 rpaulo lt6_tmp.ia6t_pltime > maxpltime) {
1317 1.56 rpaulo lt6_tmp.ia6t_pltime = maxpltime;
1318 1.56 rpaulo }
1319 1.56 rpaulo }
1320 1.56 rpaulo
1321 1.114 ozaki ia6->ia6_lifetime = lt6_tmp;
1322 1.114 ozaki ia6->ia6_updatetime = time_uptime;
1323 1.32 itojun }
1324 1.118 ozaki pserialize_read_exit(ss);
1325 1.118 ozaki
1326 1.94 matt if (ia6_match == NULL && newprc->ndprc_vltime) {
1327 1.56 rpaulo int ifidlen;
1328 1.114 ozaki struct in6_ifaddr *ia6;
1329 1.118 ozaki struct psref psref;
1330 1.56 rpaulo
1331 1.2 itojun /*
1332 1.56 rpaulo * 5.5.3 (d) (continued)
1333 1.32 itojun * No address matched and the valid lifetime is non-zero.
1334 1.32 itojun * Create a new address.
1335 1.2 itojun */
1336 1.56 rpaulo
1337 1.56 rpaulo /*
1338 1.56 rpaulo * Prefix Length check:
1339 1.56 rpaulo * If the sum of the prefix length and interface identifier
1340 1.56 rpaulo * length does not equal 128 bits, the Prefix Information
1341 1.56 rpaulo * option MUST be ignored. The length of the interface
1342 1.56 rpaulo * identifier is defined in a separate link-type specific
1343 1.56 rpaulo * document.
1344 1.56 rpaulo */
1345 1.56 rpaulo ifidlen = in6_if2idlen(ifp);
1346 1.56 rpaulo if (ifidlen < 0) {
1347 1.56 rpaulo /* this should not happen, so we always log it. */
1348 1.106 ozaki log(LOG_ERR, "%s: IFID undefined (%s)\n",
1349 1.106 ozaki __func__, if_name(ifp));
1350 1.56 rpaulo goto end;
1351 1.56 rpaulo }
1352 1.56 rpaulo if (ifidlen + pr->ndpr_plen != 128) {
1353 1.107 ozaki nd6log(LOG_INFO,
1354 1.107 ozaki "invalid prefixlen %d for %s, ignored\n",
1355 1.107 ozaki pr->ndpr_plen, if_name(ifp));
1356 1.56 rpaulo goto end;
1357 1.56 rpaulo }
1358 1.56 rpaulo
1359 1.118 ozaki if ((ia6 = in6_ifadd(newprc, mcast, &psref)) != NULL) {
1360 1.32 itojun /*
1361 1.94 matt * note that we should use pr (not newprc) for reference.
1362 1.32 itojun */
1363 1.32 itojun pr->ndpr_refcnt++;
1364 1.32 itojun ia6->ia6_ndpr = pr;
1365 1.2 itojun
1366 1.119 roy /* toggle onlink state if the address was assigned
1367 1.119 roy * a prefix route. */
1368 1.119 roy if (ia6->ia_flags & IFA_ROUTE)
1369 1.119 roy pr->ndpr_stateflags |= NDPRF_ONLINK;
1370 1.119 roy
1371 1.32 itojun /*
1372 1.56 rpaulo * draft-ietf-ipngwg-temp-addresses-v2-00 3.3 (2).
1373 1.56 rpaulo * When a new public address is created as described
1374 1.56 rpaulo * in RFC2462, also create a new temporary address.
1375 1.56 rpaulo *
1376 1.56 rpaulo * draft-ietf-ipngwg-temp-addresses-v2-00 3.5.
1377 1.56 rpaulo * When an interface connects to a new link, a new
1378 1.56 rpaulo * randomized interface identifier should be generated
1379 1.56 rpaulo * immediately together with a new set of temporary
1380 1.56 rpaulo * addresses. Thus, we specifiy 1 as the 2nd arg of
1381 1.56 rpaulo * in6_tmpifadd().
1382 1.56 rpaulo */
1383 1.56 rpaulo if (ip6_use_tempaddr) {
1384 1.56 rpaulo int e;
1385 1.56 rpaulo if ((e = in6_tmpifadd(ia6, 1, 1)) != 0) {
1386 1.107 ozaki nd6log(LOG_NOTICE,
1387 1.107 ozaki "failed to create a temporary "
1388 1.107 ozaki "address, errno=%d\n", e);
1389 1.56 rpaulo }
1390 1.56 rpaulo }
1391 1.118 ozaki ia6_release(ia6, &psref);
1392 1.56 rpaulo
1393 1.56 rpaulo /*
1394 1.32 itojun * A newly added address might affect the status
1395 1.32 itojun * of other addresses, so we check and update it.
1396 1.32 itojun * XXX: what if address duplication happens?
1397 1.32 itojun */
1398 1.123 ozaki nd6_pfxlist_onlink_check();
1399 1.32 itojun } else {
1400 1.32 itojun /* just set an error. do not bark here. */
1401 1.32 itojun error = EADDRNOTAVAIL; /* XXX: might be unused. */
1402 1.32 itojun }
1403 1.2 itojun }
1404 1.2 itojun
1405 1.2 itojun end:
1406 1.2 itojun splx(s);
1407 1.2 itojun return error;
1408 1.2 itojun }
1409 1.2 itojun
1410 1.2 itojun /*
1411 1.7 itojun * A supplement function used in the on-link detection below;
1412 1.7 itojun * detect if a given prefix has a (probably) reachable advertising router.
1413 1.7 itojun * XXX: lengthy function name...
1414 1.7 itojun */
1415 1.7 itojun static struct nd_pfxrouter *
1416 1.64 christos find_pfxlist_reachable_router(struct nd_prefix *pr)
1417 1.7 itojun {
1418 1.7 itojun struct nd_pfxrouter *pfxrtr;
1419 1.7 itojun
1420 1.7 itojun for (pfxrtr = LIST_FIRST(&pr->ndpr_advrtrs); pfxrtr;
1421 1.7 itojun pfxrtr = LIST_NEXT(pfxrtr, pfr_entry)) {
1422 1.89 roy if (pfxrtr->router->ifp->if_flags & IFF_UP &&
1423 1.89 roy pfxrtr->router->ifp->if_link_state != LINK_STATE_DOWN &&
1424 1.101 ozaki nd6_is_llinfo_probreach(pfxrtr->router))
1425 1.7 itojun break; /* found */
1426 1.7 itojun }
1427 1.7 itojun
1428 1.36 itojun return (pfxrtr);
1429 1.7 itojun }
1430 1.7 itojun
1431 1.7 itojun /*
1432 1.2 itojun * Check if each prefix in the prefix list has at least one available router
1433 1.25 itojun * that advertised the prefix (a router is "available" if its neighbor cache
1434 1.25 itojun * entry is reachable or probably reachable).
1435 1.7 itojun * If the check fails, the prefix may be off-link, because, for example,
1436 1.2 itojun * we have moved from the network but the lifetime of the prefix has not
1437 1.25 itojun * expired yet. So we should not use the prefix if there is another prefix
1438 1.25 itojun * that has an available router.
1439 1.25 itojun * But, if there is no prefix that has an available router, we still regards
1440 1.25 itojun * all the prefixes as on-link. This is because we can't tell if all the
1441 1.2 itojun * routers are simply dead or if we really moved from the network and there
1442 1.2 itojun * is no router around us.
1443 1.2 itojun */
1444 1.7 itojun void
1445 1.123 ozaki nd6_pfxlist_onlink_check(void)
1446 1.2 itojun {
1447 1.2 itojun struct nd_prefix *pr;
1448 1.114 ozaki struct in6_ifaddr *ia;
1449 1.56 rpaulo struct nd_defrouter *dr;
1450 1.56 rpaulo struct nd_pfxrouter *pfxrtr = NULL;
1451 1.118 ozaki int s;
1452 1.2 itojun
1453 1.7 itojun /*
1454 1.7 itojun * Check if there is a prefix that has a reachable advertising
1455 1.7 itojun * router.
1456 1.7 itojun */
1457 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
1458 1.32 itojun if (pr->ndpr_raf_onlink && find_pfxlist_reachable_router(pr))
1459 1.2 itojun break;
1460 1.7 itojun }
1461 1.56 rpaulo /*
1462 1.56 rpaulo * If we have no such prefix, check whether we still have a router
1463 1.56 rpaulo * that does not advertise any prefixes.
1464 1.56 rpaulo */
1465 1.56 rpaulo if (pr == NULL) {
1466 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr) {
1467 1.56 rpaulo struct nd_prefix *pr0;
1468 1.56 rpaulo
1469 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr0) {
1470 1.56 rpaulo if ((pfxrtr = pfxrtr_lookup(pr0, dr)) != NULL)
1471 1.56 rpaulo break;
1472 1.56 rpaulo }
1473 1.56 rpaulo if (pfxrtr)
1474 1.56 rpaulo break;
1475 1.56 rpaulo }
1476 1.56 rpaulo }
1477 1.124 ozaki if (pr != NULL || (!ND_DEFROUTER_LIST_EMPTY() && !pfxrtr)) {
1478 1.2 itojun /*
1479 1.32 itojun * There is at least one prefix that has a reachable router,
1480 1.32 itojun * or at least a router which probably does not advertise
1481 1.32 itojun * any prefixes. The latter would be the case when we move
1482 1.32 itojun * to a new link where we have a router that does not provide
1483 1.32 itojun * prefixes and we configure an address by hand.
1484 1.32 itojun * Detach prefixes which have no reachable advertising
1485 1.32 itojun * router, and attach other prefixes.
1486 1.2 itojun */
1487 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
1488 1.32 itojun /* XXX: a link-local prefix should never be detached */
1489 1.32 itojun if (IN6_IS_ADDR_LINKLOCAL(&pr->ndpr_prefix.sin6_addr))
1490 1.32 itojun continue;
1491 1.32 itojun
1492 1.32 itojun /*
1493 1.32 itojun * we aren't interested in prefixes without the L bit
1494 1.32 itojun * set.
1495 1.32 itojun */
1496 1.32 itojun if (pr->ndpr_raf_onlink == 0)
1497 1.32 itojun continue;
1498 1.32 itojun
1499 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) == 0 &&
1500 1.32 itojun find_pfxlist_reachable_router(pr) == NULL)
1501 1.32 itojun pr->ndpr_stateflags |= NDPRF_DETACHED;
1502 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) != 0 &&
1503 1.32 itojun find_pfxlist_reachable_router(pr) != 0)
1504 1.32 itojun pr->ndpr_stateflags &= ~NDPRF_DETACHED;
1505 1.32 itojun }
1506 1.32 itojun } else {
1507 1.32 itojun /* there is no prefix that has a reachable router */
1508 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
1509 1.32 itojun if (IN6_IS_ADDR_LINKLOCAL(&pr->ndpr_prefix.sin6_addr))
1510 1.32 itojun continue;
1511 1.32 itojun
1512 1.32 itojun if (pr->ndpr_raf_onlink == 0)
1513 1.32 itojun continue;
1514 1.32 itojun
1515 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) != 0)
1516 1.32 itojun pr->ndpr_stateflags &= ~NDPRF_DETACHED;
1517 1.32 itojun }
1518 1.32 itojun }
1519 1.32 itojun
1520 1.32 itojun /*
1521 1.32 itojun * Remove each interface route associated with a (just) detached
1522 1.32 itojun * prefix, and reinstall the interface route for a (just) attached
1523 1.32 itojun * prefix. Note that all attempt of reinstallation does not
1524 1.32 itojun * necessarily success, when a same prefix is shared among multiple
1525 1.32 itojun * interfaces. Such cases will be handled in nd6_prefix_onlink,
1526 1.32 itojun * so we don't have to care about them.
1527 1.32 itojun */
1528 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
1529 1.32 itojun int e;
1530 1.32 itojun
1531 1.32 itojun if (IN6_IS_ADDR_LINKLOCAL(&pr->ndpr_prefix.sin6_addr))
1532 1.32 itojun continue;
1533 1.32 itojun
1534 1.32 itojun if (pr->ndpr_raf_onlink == 0)
1535 1.32 itojun continue;
1536 1.32 itojun
1537 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) != 0 &&
1538 1.32 itojun (pr->ndpr_stateflags & NDPRF_ONLINK) != 0) {
1539 1.32 itojun if ((e = nd6_prefix_offlink(pr)) != 0) {
1540 1.107 ozaki nd6log(LOG_ERR,
1541 1.107 ozaki "failed to make %s/%d offlink, errno=%d\n",
1542 1.32 itojun ip6_sprintf(&pr->ndpr_prefix.sin6_addr),
1543 1.107 ozaki pr->ndpr_plen, e);
1544 1.2 itojun }
1545 1.2 itojun }
1546 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) == 0 &&
1547 1.32 itojun (pr->ndpr_stateflags & NDPRF_ONLINK) == 0 &&
1548 1.32 itojun pr->ndpr_raf_onlink) {
1549 1.32 itojun if ((e = nd6_prefix_onlink(pr)) != 0) {
1550 1.107 ozaki nd6log(LOG_ERR,
1551 1.107 ozaki "failed to make %s/%d onlink, errno=%d\n",
1552 1.32 itojun ip6_sprintf(&pr->ndpr_prefix.sin6_addr),
1553 1.107 ozaki pr->ndpr_plen, e);
1554 1.32 itojun }
1555 1.32 itojun }
1556 1.32 itojun }
1557 1.32 itojun
1558 1.32 itojun /*
1559 1.32 itojun * Changes on the prefix status might affect address status as well.
1560 1.32 itojun * Make sure that all addresses derived from an attached prefix are
1561 1.32 itojun * attached, and that all addresses derived from a detached prefix are
1562 1.32 itojun * detached. Note, however, that a manually configured address should
1563 1.32 itojun * always be attached.
1564 1.32 itojun * The precise detection logic is same as the one for prefixes.
1565 1.32 itojun */
1566 1.118 ozaki s = pserialize_read_enter();
1567 1.114 ozaki IN6_ADDRLIST_READER_FOREACH(ia) {
1568 1.114 ozaki if (!(ia->ia6_flags & IN6_IFF_AUTOCONF))
1569 1.32 itojun continue;
1570 1.32 itojun
1571 1.114 ozaki if (ia->ia6_ndpr == NULL) {
1572 1.32 itojun /*
1573 1.32 itojun * This can happen when we first configure the address
1574 1.32 itojun * (i.e. the address exists, but the prefix does not).
1575 1.32 itojun * XXX: complicated relationships...
1576 1.32 itojun */
1577 1.32 itojun continue;
1578 1.32 itojun }
1579 1.32 itojun
1580 1.114 ozaki if (find_pfxlist_reachable_router(ia->ia6_ndpr))
1581 1.32 itojun break;
1582 1.32 itojun }
1583 1.118 ozaki pserialize_read_exit(s);
1584 1.114 ozaki
1585 1.114 ozaki if (ia) {
1586 1.118 ozaki int bound = curlwp_bind();
1587 1.118 ozaki
1588 1.118 ozaki s = pserialize_read_enter();
1589 1.114 ozaki IN6_ADDRLIST_READER_FOREACH(ia) {
1590 1.118 ozaki struct ifaddr *ifa = (struct ifaddr *)ia;
1591 1.118 ozaki struct psref psref;
1592 1.118 ozaki
1593 1.114 ozaki if ((ia->ia6_flags & IN6_IFF_AUTOCONF) == 0)
1594 1.32 itojun continue;
1595 1.32 itojun
1596 1.114 ozaki if (ia->ia6_ndpr == NULL) /* XXX: see above. */
1597 1.32 itojun continue;
1598 1.32 itojun
1599 1.118 ozaki ia6_acquire(ia, &psref);
1600 1.118 ozaki pserialize_read_exit(s);
1601 1.118 ozaki
1602 1.114 ozaki if (find_pfxlist_reachable_router(ia->ia6_ndpr)) {
1603 1.114 ozaki if (ia->ia6_flags & IN6_IFF_DETACHED) {
1604 1.114 ozaki ia->ia6_flags &= ~IN6_IFF_DETACHED;
1605 1.114 ozaki ia->ia6_flags |= IN6_IFF_TENTATIVE;
1606 1.118 ozaki nd6_dad_start(ifa,
1607 1.56 rpaulo 0);
1608 1.87 roy /* We will notify the routing socket
1609 1.87 roy * of the DAD result, so no need to
1610 1.87 roy * here */
1611 1.56 rpaulo }
1612 1.56 rpaulo } else {
1613 1.114 ozaki if ((ia->ia6_flags & IN6_IFF_DETACHED) == 0) {
1614 1.114 ozaki ia->ia6_flags |= IN6_IFF_DETACHED;
1615 1.97 roy rt_newaddrmsg(RTM_NEWADDR,
1616 1.118 ozaki ifa, 0, NULL);
1617 1.56 rpaulo }
1618 1.56 rpaulo }
1619 1.118 ozaki
1620 1.118 ozaki s = pserialize_read_enter();
1621 1.118 ozaki ia6_release(ia, &psref);
1622 1.2 itojun }
1623 1.118 ozaki pserialize_read_exit(s);
1624 1.118 ozaki curlwp_bindx(bound);
1625 1.2 itojun }
1626 1.2 itojun else {
1627 1.118 ozaki int bound = curlwp_bind();
1628 1.118 ozaki
1629 1.118 ozaki s = pserialize_read_enter();
1630 1.114 ozaki IN6_ADDRLIST_READER_FOREACH(ia) {
1631 1.114 ozaki if ((ia->ia6_flags & IN6_IFF_AUTOCONF) == 0)
1632 1.32 itojun continue;
1633 1.32 itojun
1634 1.114 ozaki if (ia->ia6_flags & IN6_IFF_DETACHED) {
1635 1.118 ozaki struct ifaddr *ifa = (struct ifaddr *)ia;
1636 1.118 ozaki struct psref psref;
1637 1.118 ozaki
1638 1.114 ozaki ia->ia6_flags &= ~IN6_IFF_DETACHED;
1639 1.114 ozaki ia->ia6_flags |= IN6_IFF_TENTATIVE;
1640 1.118 ozaki
1641 1.118 ozaki ia6_acquire(ia, &psref);
1642 1.118 ozaki pserialize_read_exit(s);
1643 1.118 ozaki
1644 1.56 rpaulo /* Do we need a delay in this case? */
1645 1.118 ozaki nd6_dad_start(ifa, 0);
1646 1.118 ozaki
1647 1.118 ozaki s = pserialize_read_enter();
1648 1.118 ozaki ia6_release(ia, &psref);
1649 1.56 rpaulo }
1650 1.32 itojun }
1651 1.118 ozaki pserialize_read_exit(s);
1652 1.118 ozaki curlwp_bindx(bound);
1653 1.2 itojun }
1654 1.2 itojun }
1655 1.2 itojun
1656 1.121 ozaki static int
1657 1.64 christos nd6_prefix_onlink(struct nd_prefix *pr)
1658 1.2 itojun {
1659 1.32 itojun struct ifaddr *ifa;
1660 1.32 itojun struct ifnet *ifp = pr->ndpr_ifp;
1661 1.32 itojun struct sockaddr_in6 mask6;
1662 1.32 itojun struct nd_prefix *opr;
1663 1.32 itojun u_long rtflags;
1664 1.32 itojun int error = 0;
1665 1.118 ozaki struct psref psref;
1666 1.118 ozaki int bound;
1667 1.32 itojun
1668 1.32 itojun /* sanity check */
1669 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_ONLINK) != 0) {
1670 1.107 ozaki nd6log(LOG_ERR, "%s/%d is already on-link\n",
1671 1.107 ozaki ip6_sprintf(&pr->ndpr_prefix.sin6_addr), pr->ndpr_plen);
1672 1.51 itojun return (EEXIST);
1673 1.32 itojun }
1674 1.32 itojun
1675 1.32 itojun /*
1676 1.32 itojun * Add the interface route associated with the prefix. Before
1677 1.32 itojun * installing the route, check if there's the same prefix on another
1678 1.32 itojun * interface, and the prefix has already installed the interface route.
1679 1.32 itojun * Although such a configuration is expected to be rare, we explicitly
1680 1.32 itojun * allow it.
1681 1.32 itojun */
1682 1.125 ozaki ND_PREFIX_LIST_FOREACH(opr) {
1683 1.32 itojun if (opr == pr)
1684 1.32 itojun continue;
1685 1.32 itojun
1686 1.32 itojun if ((opr->ndpr_stateflags & NDPRF_ONLINK) == 0)
1687 1.32 itojun continue;
1688 1.32 itojun
1689 1.32 itojun if (opr->ndpr_plen == pr->ndpr_plen &&
1690 1.32 itojun in6_are_prefix_equal(&pr->ndpr_prefix.sin6_addr,
1691 1.32 itojun &opr->ndpr_prefix.sin6_addr, pr->ndpr_plen))
1692 1.36 itojun return (0);
1693 1.32 itojun }
1694 1.32 itojun
1695 1.32 itojun /*
1696 1.32 itojun * We prefer link-local addresses as the associated interface address.
1697 1.32 itojun */
1698 1.32 itojun /* search for a link-local addr */
1699 1.118 ozaki bound = curlwp_bind();
1700 1.118 ozaki ifa = (struct ifaddr *)in6ifa_ifpforlinklocal_psref(ifp,
1701 1.118 ozaki IN6_IFF_NOTREADY | IN6_IFF_ANYCAST, &psref);
1702 1.32 itojun if (ifa == NULL) {
1703 1.118 ozaki int s = pserialize_read_enter();
1704 1.115 ozaki IFADDR_READER_FOREACH(ifa, ifp) {
1705 1.32 itojun if (ifa->ifa_addr->sa_family == AF_INET6)
1706 1.32 itojun break;
1707 1.32 itojun }
1708 1.118 ozaki if (ifa != NULL)
1709 1.118 ozaki ifa_acquire(ifa, &psref);
1710 1.118 ozaki pserialize_read_exit(s);
1711 1.32 itojun /* should we care about ia6_flags? */
1712 1.32 itojun }
1713 1.32 itojun if (ifa == NULL) {
1714 1.32 itojun /*
1715 1.32 itojun * This can still happen, when, for example, we receive an RA
1716 1.32 itojun * containing a prefix with the L bit set and the A bit clear,
1717 1.32 itojun * after removing all IPv6 addresses on the receiving
1718 1.32 itojun * interface. This should, of course, be rare though.
1719 1.32 itojun */
1720 1.107 ozaki nd6log(LOG_NOTICE, "failed to find any ifaddr"
1721 1.32 itojun " to add route for a prefix(%s/%d) on %s\n",
1722 1.32 itojun ip6_sprintf(&pr->ndpr_prefix.sin6_addr),
1723 1.107 ozaki pr->ndpr_plen, if_name(ifp));
1724 1.118 ozaki curlwp_bindx(bound);
1725 1.36 itojun return (0);
1726 1.32 itojun }
1727 1.2 itojun
1728 1.2 itojun /*
1729 1.32 itojun * in6_ifinit() sets nd6_rtrequest to ifa_rtrequest for all ifaddrs.
1730 1.32 itojun * ifa->ifa_rtrequest = nd6_rtrequest;
1731 1.2 itojun */
1732 1.78 cegger memset(&mask6, 0, sizeof(mask6));
1733 1.85 joerg mask6.sin6_family = AF_INET6;
1734 1.32 itojun mask6.sin6_len = sizeof(mask6);
1735 1.32 itojun mask6.sin6_addr = pr->ndpr_mask;
1736 1.32 itojun /* rtrequest() will probably set RTF_UP, but we're not sure. */
1737 1.32 itojun rtflags = ifa->ifa_flags | RTF_UP;
1738 1.32 itojun if (nd6_need_cache(ifp)) {
1739 1.32 itojun /* explicitly set in case ifa_flags does not set the flag. */
1740 1.108 ozaki rtflags |= RTF_CONNECTED;
1741 1.32 itojun } else {
1742 1.32 itojun /*
1743 1.32 itojun * explicitly clear the cloning bit in case ifa_flags sets it.
1744 1.32 itojun */
1745 1.108 ozaki rtflags &= ~RTF_CONNECTED;
1746 1.32 itojun }
1747 1.116 ozaki error = rtrequest_newmsg(RTM_ADD, sin6tosa(&pr->ndpr_prefix),
1748 1.116 ozaki ifa->ifa_addr, sin6tosa(&mask6), rtflags);
1749 1.32 itojun if (error == 0) {
1750 1.101 ozaki nd6_numroutes++;
1751 1.32 itojun pr->ndpr_stateflags |= NDPRF_ONLINK;
1752 1.32 itojun } else {
1753 1.107 ozaki nd6log(LOG_ERR, "failed to add route for a"
1754 1.32 itojun " prefix (%s/%d) on %s, gw=%s, mask=%s, flags=%lx "
1755 1.32 itojun "errno = %d\n",
1756 1.32 itojun ip6_sprintf(&pr->ndpr_prefix.sin6_addr),
1757 1.32 itojun pr->ndpr_plen, if_name(ifp),
1758 1.32 itojun ip6_sprintf(&((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_addr),
1759 1.107 ozaki ip6_sprintf(&mask6.sin6_addr), rtflags, error);
1760 1.32 itojun }
1761 1.118 ozaki ifa_release(ifa, &psref);
1762 1.118 ozaki curlwp_bindx(bound);
1763 1.32 itojun
1764 1.36 itojun return (error);
1765 1.32 itojun }
1766 1.32 itojun
1767 1.121 ozaki static int
1768 1.64 christos nd6_prefix_offlink(struct nd_prefix *pr)
1769 1.32 itojun {
1770 1.32 itojun int error = 0;
1771 1.32 itojun struct ifnet *ifp = pr->ndpr_ifp;
1772 1.32 itojun struct nd_prefix *opr;
1773 1.32 itojun struct sockaddr_in6 sa6, mask6;
1774 1.32 itojun
1775 1.32 itojun /* sanity check */
1776 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_ONLINK) == 0) {
1777 1.107 ozaki nd6log(LOG_ERR, "%s/%d is already off-link\n",
1778 1.107 ozaki ip6_sprintf(&pr->ndpr_prefix.sin6_addr), pr->ndpr_plen);
1779 1.36 itojun return (EEXIST);
1780 1.32 itojun }
1781 1.32 itojun
1782 1.69 dyoung sockaddr_in6_init(&sa6, &pr->ndpr_prefix.sin6_addr, 0, 0, 0);
1783 1.69 dyoung sockaddr_in6_init(&mask6, &pr->ndpr_mask, 0, 0, 0);
1784 1.116 ozaki error = rtrequest_newmsg(RTM_DELETE, sin6tosa(&sa6), NULL,
1785 1.116 ozaki sin6tosa(&mask6), 0);
1786 1.32 itojun if (error == 0) {
1787 1.32 itojun pr->ndpr_stateflags &= ~NDPRF_ONLINK;
1788 1.101 ozaki nd6_numroutes--;
1789 1.2 itojun
1790 1.32 itojun /*
1791 1.32 itojun * There might be the same prefix on another interface,
1792 1.32 itojun * the prefix which could not be on-link just because we have
1793 1.32 itojun * the interface route (see comments in nd6_prefix_onlink).
1794 1.32 itojun * If there's one, try to make the prefix on-link on the
1795 1.32 itojun * interface.
1796 1.32 itojun */
1797 1.125 ozaki ND_PREFIX_LIST_FOREACH(opr) {
1798 1.32 itojun if (opr == pr)
1799 1.32 itojun continue;
1800 1.2 itojun
1801 1.32 itojun if ((opr->ndpr_stateflags & NDPRF_ONLINK) != 0)
1802 1.32 itojun continue;
1803 1.2 itojun
1804 1.32 itojun /*
1805 1.32 itojun * KAME specific: detached prefixes should not be
1806 1.32 itojun * on-link.
1807 1.32 itojun */
1808 1.32 itojun if ((opr->ndpr_stateflags & NDPRF_DETACHED) != 0)
1809 1.32 itojun continue;
1810 1.2 itojun
1811 1.32 itojun if (opr->ndpr_plen == pr->ndpr_plen &&
1812 1.32 itojun in6_are_prefix_equal(&pr->ndpr_prefix.sin6_addr,
1813 1.32 itojun &opr->ndpr_prefix.sin6_addr, pr->ndpr_plen)) {
1814 1.32 itojun int e;
1815 1.32 itojun
1816 1.32 itojun if ((e = nd6_prefix_onlink(opr)) != 0) {
1817 1.107 ozaki nd6log(LOG_ERR, "failed to "
1818 1.32 itojun "recover a prefix %s/%d from %s "
1819 1.32 itojun "to %s (errno = %d)\n",
1820 1.32 itojun ip6_sprintf(&opr->ndpr_prefix.sin6_addr),
1821 1.32 itojun opr->ndpr_plen, if_name(ifp),
1822 1.107 ozaki if_name(opr->ndpr_ifp), e);
1823 1.32 itojun }
1824 1.32 itojun }
1825 1.32 itojun }
1826 1.32 itojun } else {
1827 1.32 itojun /* XXX: can we still set the NDPRF_ONLINK flag? */
1828 1.107 ozaki nd6log(LOG_ERR, "failed to delete route: "
1829 1.32 itojun "%s/%d on %s (errno = %d)\n",
1830 1.32 itojun ip6_sprintf(&sa6.sin6_addr), pr->ndpr_plen, if_name(ifp),
1831 1.107 ozaki error);
1832 1.2 itojun }
1833 1.2 itojun
1834 1.101 ozaki return error;
1835 1.2 itojun }
1836 1.2 itojun
1837 1.2 itojun static struct in6_ifaddr *
1838 1.118 ozaki in6_ifadd(struct nd_prefixctl *prc, int mcast, struct psref *psref)
1839 1.2 itojun {
1840 1.94 matt struct ifnet *ifp = prc->ndprc_ifp;
1841 1.2 itojun struct ifaddr *ifa;
1842 1.32 itojun struct in6_aliasreq ifra;
1843 1.32 itojun struct in6_ifaddr *ia, *ib;
1844 1.32 itojun int error, plen0;
1845 1.2 itojun struct in6_addr mask;
1846 1.94 matt int prefixlen = prc->ndprc_plen;
1847 1.56 rpaulo int updateflags;
1848 1.118 ozaki int s;
1849 1.2 itojun
1850 1.31 itojun in6_prefixlen2mask(&mask, prefixlen);
1851 1.2 itojun
1852 1.32 itojun /*
1853 1.32 itojun * find a link-local address (will be interface ID).
1854 1.32 itojun * Is it really mandatory? Theoretically, a global or a site-local
1855 1.32 itojun * address can be configured without a link-local address, if we
1856 1.32 itojun * have a unique interface identifier...
1857 1.32 itojun *
1858 1.32 itojun * it is not mandatory to have a link-local address, we can generate
1859 1.32 itojun * interface identifier on the fly. we do this because:
1860 1.32 itojun * (1) it should be the easiest way to find interface identifier.
1861 1.32 itojun * (2) RFC2462 5.4 suggesting the use of the same interface identifier
1862 1.32 itojun * for multiple addresses on a single interface, and possible shortcut
1863 1.32 itojun * of DAD. we omitted DAD for this reason in the past.
1864 1.32 itojun * (3) a user can prevent autoconfiguration of global address
1865 1.32 itojun * by removing link-local address by hand (this is partly because we
1866 1.55 rpaulo * don't have other way to control the use of IPv6 on an interface.
1867 1.32 itojun * this has been our design choice - cf. NRL's "ifconfig auto").
1868 1.32 itojun * (4) it is easier to manage when an interface has addresses
1869 1.32 itojun * with the same interface identifier, than to have multiple addresses
1870 1.32 itojun * with different interface identifiers.
1871 1.32 itojun */
1872 1.118 ozaki s = pserialize_read_enter();
1873 1.32 itojun ifa = (struct ifaddr *)in6ifa_ifpforlinklocal(ifp, 0); /* 0 is OK? */
1874 1.2 itojun if (ifa)
1875 1.2 itojun ib = (struct in6_ifaddr *)ifa;
1876 1.118 ozaki else {
1877 1.118 ozaki pserialize_read_exit(s);
1878 1.2 itojun return NULL;
1879 1.118 ozaki }
1880 1.2 itojun
1881 1.2 itojun #if 0 /* don't care link local addr state, and always do DAD */
1882 1.2 itojun /* if link-local address is not eligible, do not autoconfigure. */
1883 1.2 itojun if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_NOTREADY) {
1884 1.2 itojun printf("in6_ifadd: link-local address not ready\n");
1885 1.2 itojun return NULL;
1886 1.2 itojun }
1887 1.2 itojun #endif
1888 1.2 itojun
1889 1.2 itojun /* prefixlen + ifidlen must be equal to 128 */
1890 1.32 itojun plen0 = in6_mask2len(&ib->ia_prefixmask.sin6_addr, NULL);
1891 1.32 itojun if (prefixlen != plen0) {
1892 1.107 ozaki nd6log(LOG_INFO, "wrong prefixlen for %s "
1893 1.32 itojun "(prefix=%d ifid=%d)\n",
1894 1.107 ozaki if_name(ifp), prefixlen, 128 - plen0);
1895 1.118 ozaki pserialize_read_exit(s);
1896 1.2 itojun return NULL;
1897 1.2 itojun }
1898 1.2 itojun
1899 1.2 itojun /* make ifaddr */
1900 1.2 itojun
1901 1.56 rpaulo memset(&ifra, 0, sizeof(ifra));
1902 1.32 itojun /*
1903 1.32 itojun * in6_update_ifa() does not use ifra_name, but we accurately set it
1904 1.32 itojun * for safety.
1905 1.32 itojun */
1906 1.32 itojun strncpy(ifra.ifra_name, if_name(ifp), sizeof(ifra.ifra_name));
1907 1.94 matt sockaddr_in6_init(&ifra.ifra_addr, &prc->ndprc_prefix.sin6_addr, 0, 0, 0);
1908 1.32 itojun /* prefix */
1909 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[0] &= mask.s6_addr32[0];
1910 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[1] &= mask.s6_addr32[1];
1911 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[2] &= mask.s6_addr32[2];
1912 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[3] &= mask.s6_addr32[3];
1913 1.2 itojun
1914 1.2 itojun /* interface ID */
1915 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[0] |=
1916 1.32 itojun (ib->ia_addr.sin6_addr.s6_addr32[0] & ~mask.s6_addr32[0]);
1917 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[1] |=
1918 1.32 itojun (ib->ia_addr.sin6_addr.s6_addr32[1] & ~mask.s6_addr32[1]);
1919 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[2] |=
1920 1.32 itojun (ib->ia_addr.sin6_addr.s6_addr32[2] & ~mask.s6_addr32[2]);
1921 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[3] |=
1922 1.32 itojun (ib->ia_addr.sin6_addr.s6_addr32[3] & ~mask.s6_addr32[3]);
1923 1.118 ozaki pserialize_read_exit(s);
1924 1.33 itojun
1925 1.32 itojun /* new prefix mask. */
1926 1.69 dyoung sockaddr_in6_init(&ifra.ifra_prefixmask, &mask, 0, 0, 0);
1927 1.2 itojun
1928 1.56 rpaulo /* lifetimes */
1929 1.94 matt ifra.ifra_lifetime.ia6t_vltime = prc->ndprc_vltime;
1930 1.94 matt ifra.ifra_lifetime.ia6t_pltime = prc->ndprc_pltime;
1931 1.2 itojun
1932 1.32 itojun /* XXX: scope zone ID? */
1933 1.2 itojun
1934 1.32 itojun ifra.ifra_flags |= IN6_IFF_AUTOCONF; /* obey autoconf */
1935 1.2 itojun
1936 1.56 rpaulo /*
1937 1.56 rpaulo * Make sure that we do not have this address already. This should
1938 1.56 rpaulo * usually not happen, but we can still see this case, e.g., if we
1939 1.56 rpaulo * have manually configured the exact address to be configured.
1940 1.56 rpaulo */
1941 1.118 ozaki s = pserialize_read_enter();
1942 1.56 rpaulo if (in6ifa_ifpwithaddr(ifp, &ifra.ifra_addr.sin6_addr) != NULL) {
1943 1.56 rpaulo /* this should be rare enough to make an explicit log */
1944 1.56 rpaulo log(LOG_INFO, "in6_ifadd: %s is already configured\n",
1945 1.56 rpaulo ip6_sprintf(&ifra.ifra_addr.sin6_addr));
1946 1.118 ozaki pserialize_read_exit(s);
1947 1.56 rpaulo return (NULL);
1948 1.56 rpaulo }
1949 1.118 ozaki pserialize_read_exit(s);
1950 1.56 rpaulo
1951 1.56 rpaulo /*
1952 1.56 rpaulo * Allocate ifaddr structure, link into chain, etc.
1953 1.56 rpaulo * If we are going to create a new address upon receiving a multicasted
1954 1.56 rpaulo * RA, we need to impose a random delay before starting DAD.
1955 1.56 rpaulo * [draft-ietf-ipv6-rfc2462bis-02.txt, Section 5.4.2]
1956 1.56 rpaulo */
1957 1.56 rpaulo updateflags = 0;
1958 1.56 rpaulo if (mcast)
1959 1.56 rpaulo updateflags |= IN6_IFAUPDATE_DADDELAY;
1960 1.56 rpaulo if ((error = in6_update_ifa(ifp, &ifra, NULL, updateflags)) != 0) {
1961 1.107 ozaki nd6log(LOG_ERR, "failed to make ifaddr %s on %s (errno=%d)\n",
1962 1.32 itojun ip6_sprintf(&ifra.ifra_addr.sin6_addr), if_name(ifp),
1963 1.107 ozaki error);
1964 1.36 itojun return (NULL); /* ifaddr must not have been allocated. */
1965 1.32 itojun }
1966 1.2 itojun
1967 1.118 ozaki ia = in6ifa_ifpwithaddr_psref(ifp, &ifra.ifra_addr.sin6_addr, psref);
1968 1.2 itojun
1969 1.36 itojun return (ia); /* this is always non-NULL */
1970 1.2 itojun }
1971 1.2 itojun
1972 1.2 itojun int
1973 1.64 christos in6_tmpifadd(
1974 1.64 christos const struct in6_ifaddr *ia0, /* corresponding public address */
1975 1.64 christos int forcegen,
1976 1.64 christos int dad_delay)
1977 1.56 rpaulo {
1978 1.56 rpaulo struct ifnet *ifp = ia0->ia_ifa.ifa_ifp;
1979 1.56 rpaulo struct in6_ifaddr *newia, *ia;
1980 1.56 rpaulo struct in6_aliasreq ifra;
1981 1.56 rpaulo int i, error;
1982 1.56 rpaulo int trylimit = 3; /* XXX: adhoc value */
1983 1.56 rpaulo int updateflags;
1984 1.56 rpaulo u_int32_t randid[2];
1985 1.56 rpaulo u_int32_t vltime0, pltime0;
1986 1.117 ozaki int s;
1987 1.56 rpaulo
1988 1.56 rpaulo memset(&ifra, 0, sizeof(ifra));
1989 1.56 rpaulo strncpy(ifra.ifra_name, if_name(ifp), sizeof(ifra.ifra_name));
1990 1.56 rpaulo ifra.ifra_addr = ia0->ia_addr;
1991 1.56 rpaulo /* copy prefix mask */
1992 1.56 rpaulo ifra.ifra_prefixmask = ia0->ia_prefixmask;
1993 1.56 rpaulo /* clear the old IFID */
1994 1.56 rpaulo for (i = 0; i < 4; i++) {
1995 1.56 rpaulo ifra.ifra_addr.sin6_addr.s6_addr32[i] &=
1996 1.56 rpaulo ifra.ifra_prefixmask.sin6_addr.s6_addr32[i];
1997 1.56 rpaulo }
1998 1.56 rpaulo
1999 1.56 rpaulo again:
2000 1.56 rpaulo if (in6_get_tmpifid(ifp, (u_int8_t *)randid,
2001 1.56 rpaulo (const u_int8_t *)&ia0->ia_addr.sin6_addr.s6_addr[8], forcegen)) {
2002 1.107 ozaki nd6log(LOG_NOTICE, "failed to find a good random IFID\n");
2003 1.56 rpaulo return (EINVAL);
2004 1.56 rpaulo }
2005 1.56 rpaulo ifra.ifra_addr.sin6_addr.s6_addr32[2] |=
2006 1.56 rpaulo (randid[0] & ~(ifra.ifra_prefixmask.sin6_addr.s6_addr32[2]));
2007 1.56 rpaulo ifra.ifra_addr.sin6_addr.s6_addr32[3] |=
2008 1.56 rpaulo (randid[1] & ~(ifra.ifra_prefixmask.sin6_addr.s6_addr32[3]));
2009 1.56 rpaulo
2010 1.56 rpaulo /*
2011 1.56 rpaulo * in6_get_tmpifid() quite likely provided a unique interface ID.
2012 1.56 rpaulo * However, we may still have a chance to see collision, because
2013 1.56 rpaulo * there may be a time lag between generation of the ID and generation
2014 1.56 rpaulo * of the address. So, we'll do one more sanity check.
2015 1.56 rpaulo */
2016 1.117 ozaki s = pserialize_read_enter();
2017 1.113 ozaki IN6_ADDRLIST_READER_FOREACH(ia) {
2018 1.56 rpaulo if (IN6_ARE_ADDR_EQUAL(&ia->ia_addr.sin6_addr,
2019 1.56 rpaulo &ifra.ifra_addr.sin6_addr)) {
2020 1.117 ozaki pserialize_read_exit(s);
2021 1.56 rpaulo if (trylimit-- == 0) {
2022 1.56 rpaulo /*
2023 1.56 rpaulo * Give up. Something strange should have
2024 1.56 rpaulo * happened.
2025 1.56 rpaulo */
2026 1.107 ozaki nd6log(LOG_NOTICE,
2027 1.107 ozaki "failed to find a unique random IFID\n");
2028 1.56 rpaulo return (EEXIST);
2029 1.56 rpaulo }
2030 1.56 rpaulo forcegen = 1;
2031 1.56 rpaulo goto again;
2032 1.56 rpaulo }
2033 1.56 rpaulo }
2034 1.117 ozaki pserialize_read_exit(s);
2035 1.56 rpaulo
2036 1.56 rpaulo /*
2037 1.56 rpaulo * The Valid Lifetime is the lower of the Valid Lifetime of the
2038 1.56 rpaulo * public address or TEMP_VALID_LIFETIME.
2039 1.56 rpaulo * The Preferred Lifetime is the lower of the Preferred Lifetime
2040 1.56 rpaulo * of the public address or TEMP_PREFERRED_LIFETIME -
2041 1.56 rpaulo * DESYNC_FACTOR.
2042 1.56 rpaulo */
2043 1.56 rpaulo if (ia0->ia6_lifetime.ia6t_vltime != ND6_INFINITE_LIFETIME) {
2044 1.56 rpaulo vltime0 = IFA6_IS_INVALID(ia0) ? 0 :
2045 1.56 rpaulo (ia0->ia6_lifetime.ia6t_vltime -
2046 1.102 ozaki (time_uptime - ia0->ia6_updatetime));
2047 1.56 rpaulo if (vltime0 > ip6_temp_valid_lifetime)
2048 1.56 rpaulo vltime0 = ip6_temp_valid_lifetime;
2049 1.56 rpaulo } else
2050 1.56 rpaulo vltime0 = ip6_temp_valid_lifetime;
2051 1.56 rpaulo if (ia0->ia6_lifetime.ia6t_pltime != ND6_INFINITE_LIFETIME) {
2052 1.56 rpaulo pltime0 = IFA6_IS_DEPRECATED(ia0) ? 0 :
2053 1.56 rpaulo (ia0->ia6_lifetime.ia6t_pltime -
2054 1.102 ozaki (time_uptime - ia0->ia6_updatetime));
2055 1.56 rpaulo if (pltime0 > ip6_temp_preferred_lifetime - ip6_desync_factor){
2056 1.56 rpaulo pltime0 = ip6_temp_preferred_lifetime -
2057 1.56 rpaulo ip6_desync_factor;
2058 1.56 rpaulo }
2059 1.56 rpaulo } else
2060 1.56 rpaulo pltime0 = ip6_temp_preferred_lifetime - ip6_desync_factor;
2061 1.56 rpaulo ifra.ifra_lifetime.ia6t_vltime = vltime0;
2062 1.56 rpaulo ifra.ifra_lifetime.ia6t_pltime = pltime0;
2063 1.56 rpaulo
2064 1.56 rpaulo /*
2065 1.56 rpaulo * A temporary address is created only if this calculated Preferred
2066 1.56 rpaulo * Lifetime is greater than REGEN_ADVANCE time units.
2067 1.56 rpaulo */
2068 1.56 rpaulo if (ifra.ifra_lifetime.ia6t_pltime <= ip6_temp_regen_advance)
2069 1.56 rpaulo return (0);
2070 1.56 rpaulo
2071 1.56 rpaulo /* XXX: scope zone ID? */
2072 1.56 rpaulo
2073 1.56 rpaulo ifra.ifra_flags |= (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY);
2074 1.56 rpaulo
2075 1.56 rpaulo /* allocate ifaddr structure, link into chain, etc. */
2076 1.56 rpaulo updateflags = 0;
2077 1.57 rpaulo if (dad_delay)
2078 1.56 rpaulo updateflags |= IN6_IFAUPDATE_DADDELAY;
2079 1.56 rpaulo if ((error = in6_update_ifa(ifp, &ifra, NULL, updateflags)) != 0)
2080 1.56 rpaulo return (error);
2081 1.56 rpaulo
2082 1.118 ozaki s = pserialize_read_enter();
2083 1.56 rpaulo newia = in6ifa_ifpwithaddr(ifp, &ifra.ifra_addr.sin6_addr);
2084 1.56 rpaulo if (newia == NULL) { /* XXX: can it happen? */
2085 1.118 ozaki pserialize_read_exit(s);
2086 1.107 ozaki nd6log(LOG_ERR,
2087 1.107 ozaki "ifa update succeeded, but we got no ifaddr\n");
2088 1.56 rpaulo return (EINVAL); /* XXX */
2089 1.56 rpaulo }
2090 1.56 rpaulo newia->ia6_ndpr = ia0->ia6_ndpr;
2091 1.56 rpaulo newia->ia6_ndpr->ndpr_refcnt++;
2092 1.118 ozaki pserialize_read_exit(s);
2093 1.56 rpaulo
2094 1.56 rpaulo /*
2095 1.56 rpaulo * A newly added address might affect the status of other addresses.
2096 1.56 rpaulo * XXX: when the temporary address is generated with a new public
2097 1.56 rpaulo * address, the onlink check is redundant. However, it would be safe
2098 1.56 rpaulo * to do the check explicitly everywhere a new address is generated,
2099 1.56 rpaulo * and, in fact, we surely need the check when we create a new
2100 1.56 rpaulo * temporary address due to deprecation of an old temporary address.
2101 1.56 rpaulo */
2102 1.123 ozaki nd6_pfxlist_onlink_check();
2103 1.56 rpaulo
2104 1.56 rpaulo return (0);
2105 1.56 rpaulo }
2106 1.56 rpaulo
2107 1.56 rpaulo static int
2108 1.2 itojun in6_init_prefix_ltimes(struct nd_prefix *ndpr)
2109 1.2 itojun {
2110 1.7 itojun
2111 1.26 itojun /* check if preferred lifetime > valid lifetime. RFC2462 5.5.3 (c) */
2112 1.2 itojun if (ndpr->ndpr_pltime > ndpr->ndpr_vltime) {
2113 1.107 ozaki nd6log(LOG_INFO, "preferred lifetime"
2114 1.2 itojun "(%d) is greater than valid lifetime(%d)\n",
2115 1.107 ozaki (u_int)ndpr->ndpr_pltime, (u_int)ndpr->ndpr_vltime);
2116 1.2 itojun return (EINVAL);
2117 1.2 itojun }
2118 1.7 itojun if (ndpr->ndpr_pltime == ND6_INFINITE_LIFETIME)
2119 1.2 itojun ndpr->ndpr_preferred = 0;
2120 1.2 itojun else
2121 1.102 ozaki ndpr->ndpr_preferred = time_uptime + ndpr->ndpr_pltime;
2122 1.7 itojun if (ndpr->ndpr_vltime == ND6_INFINITE_LIFETIME)
2123 1.2 itojun ndpr->ndpr_expire = 0;
2124 1.2 itojun else
2125 1.102 ozaki ndpr->ndpr_expire = time_uptime + ndpr->ndpr_vltime;
2126 1.2 itojun
2127 1.2 itojun return 0;
2128 1.2 itojun }
2129 1.2 itojun
2130 1.2 itojun static void
2131 1.94 matt in6_init_address_ltimes(struct nd_prefix *newpr,
2132 1.60 christos struct in6_addrlifetime *lt6)
2133 1.2 itojun {
2134 1.7 itojun
2135 1.7 itojun /* Valid lifetime must not be updated unless explicitly specified. */
2136 1.32 itojun /* init ia6t_expire */
2137 1.32 itojun if (lt6->ia6t_vltime == ND6_INFINITE_LIFETIME)
2138 1.32 itojun lt6->ia6t_expire = 0;
2139 1.32 itojun else {
2140 1.102 ozaki lt6->ia6t_expire = time_uptime;
2141 1.32 itojun lt6->ia6t_expire += lt6->ia6t_vltime;
2142 1.2 itojun }
2143 1.7 itojun
2144 1.2 itojun /* init ia6t_preferred */
2145 1.7 itojun if (lt6->ia6t_pltime == ND6_INFINITE_LIFETIME)
2146 1.2 itojun lt6->ia6t_preferred = 0;
2147 1.2 itojun else {
2148 1.102 ozaki lt6->ia6t_preferred = time_uptime;
2149 1.2 itojun lt6->ia6t_preferred += lt6->ia6t_pltime;
2150 1.2 itojun }
2151 1.2 itojun }
2152 1.2 itojun
2153 1.2 itojun /*
2154 1.2 itojun * Delete all the routing table entries that use the specified gateway.
2155 1.2 itojun * XXX: this function causes search through all entries of routing table, so
2156 1.16 itojun * it shouldn't be called when acting as a router.
2157 1.2 itojun */
2158 1.2 itojun void
2159 1.123 ozaki nd6_rt_flush(struct in6_addr *gateway, struct ifnet *ifp)
2160 1.2 itojun {
2161 1.4 itojun int s = splsoftnet();
2162 1.2 itojun
2163 1.2 itojun /* We'll care only link-local addresses */
2164 1.2 itojun if (!IN6_IS_ADDR_LINKLOCAL(gateway)) {
2165 1.2 itojun splx(s);
2166 1.2 itojun return;
2167 1.2 itojun }
2168 1.2 itojun
2169 1.120 ozaki rt_delete_matched_entries(AF_INET6, rt6_deleteroute_matcher, gateway);
2170 1.2 itojun splx(s);
2171 1.2 itojun }
2172 1.2 itojun
2173 1.2 itojun static int
2174 1.120 ozaki rt6_deleteroute_matcher(struct rtentry *rt, void *arg)
2175 1.2 itojun {
2176 1.2 itojun struct in6_addr *gate = (struct in6_addr *)arg;
2177 1.2 itojun
2178 1.2 itojun if (rt->rt_gateway == NULL || rt->rt_gateway->sa_family != AF_INET6)
2179 1.36 itojun return (0);
2180 1.2 itojun
2181 1.104 ozaki if (!IN6_ARE_ADDR_EQUAL(gate, &satosin6(rt->rt_gateway)->sin6_addr))
2182 1.36 itojun return (0);
2183 1.26 itojun
2184 1.26 itojun /*
2185 1.32 itojun * Do not delete a static route.
2186 1.32 itojun * XXX: this seems to be a bit ad-hoc. Should we consider the
2187 1.32 itojun * 'cloned' bit instead?
2188 1.32 itojun */
2189 1.32 itojun if ((rt->rt_flags & RTF_STATIC) != 0)
2190 1.36 itojun return (0);
2191 1.32 itojun
2192 1.32 itojun /*
2193 1.2 itojun * We delete only host route. This means, in particular, we don't
2194 1.2 itojun * delete default route.
2195 1.2 itojun */
2196 1.2 itojun if ((rt->rt_flags & RTF_HOST) == 0)
2197 1.36 itojun return (0);
2198 1.2 itojun
2199 1.120 ozaki return 1;
2200 1.2 itojun }
2201