nd6_rtr.c revision 1.130 1 1.130 ryo /* $NetBSD: nd6_rtr.c,v 1.130 2017/01/16 07:33:36 ryo Exp $ */
2 1.20 itojun /* $KAME: nd6_rtr.c,v 1.95 2001/02/07 08:09:47 itojun Exp $ */
3 1.3 thorpej
4 1.2 itojun /*
5 1.2 itojun * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6 1.2 itojun * All rights reserved.
7 1.16 itojun *
8 1.2 itojun * Redistribution and use in source and binary forms, with or without
9 1.2 itojun * modification, are permitted provided that the following conditions
10 1.2 itojun * are met:
11 1.2 itojun * 1. Redistributions of source code must retain the above copyright
12 1.2 itojun * notice, this list of conditions and the following disclaimer.
13 1.2 itojun * 2. Redistributions in binary form must reproduce the above copyright
14 1.2 itojun * notice, this list of conditions and the following disclaimer in the
15 1.2 itojun * documentation and/or other materials provided with the distribution.
16 1.2 itojun * 3. Neither the name of the project nor the names of its contributors
17 1.2 itojun * may be used to endorse or promote products derived from this software
18 1.2 itojun * without specific prior written permission.
19 1.16 itojun *
20 1.2 itojun * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21 1.2 itojun * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 1.2 itojun * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 1.2 itojun * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 1.2 itojun * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 1.2 itojun * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 1.2 itojun * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 1.2 itojun * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 1.2 itojun * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 1.2 itojun * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 1.2 itojun * SUCH DAMAGE.
31 1.2 itojun */
32 1.27 lukem
33 1.27 lukem #include <sys/cdefs.h>
34 1.130 ryo __KERNEL_RCSID(0, "$NetBSD: nd6_rtr.c,v 1.130 2017/01/16 07:33:36 ryo Exp $");
35 1.2 itojun
36 1.2 itojun #include <sys/param.h>
37 1.2 itojun #include <sys/systm.h>
38 1.2 itojun #include <sys/malloc.h>
39 1.2 itojun #include <sys/mbuf.h>
40 1.2 itojun #include <sys/socket.h>
41 1.2 itojun #include <sys/sockio.h>
42 1.2 itojun #include <sys/time.h>
43 1.2 itojun #include <sys/kernel.h>
44 1.2 itojun #include <sys/errno.h>
45 1.2 itojun #include <sys/ioctl.h>
46 1.2 itojun #include <sys/syslog.h>
47 1.82 tls #include <sys/cprng.h>
48 1.2 itojun
49 1.2 itojun #include <net/if.h>
50 1.2 itojun #include <net/if_types.h>
51 1.2 itojun #include <net/if_dl.h>
52 1.2 itojun
53 1.2 itojun #include <netinet/in.h>
54 1.2 itojun #include <netinet6/in6_var.h>
55 1.56 rpaulo #include <netinet6/in6_ifattach.h>
56 1.11 itojun #include <netinet/ip6.h>
57 1.2 itojun #include <netinet6/ip6_var.h>
58 1.2 itojun #include <netinet6/nd6.h>
59 1.11 itojun #include <netinet/icmp6.h>
60 1.75 thorpej #include <netinet6/icmp6_private.h>
61 1.54 rpaulo #include <netinet6/scope6_var.h>
62 1.2 itojun
63 1.7 itojun #include <net/net_osdep.h>
64 1.2 itojun
65 1.68 dyoung static int rtpref(struct nd_defrouter *);
66 1.68 dyoung static struct nd_defrouter *defrtrlist_update(struct nd_defrouter *);
67 1.68 dyoung static int prelist_update(struct nd_prefixctl *, struct nd_defrouter *,
68 1.68 dyoung struct mbuf *, int);
69 1.118 ozaki static struct in6_ifaddr *in6_ifadd(struct nd_prefixctl *, int, struct psref *);
70 1.68 dyoung static struct nd_pfxrouter *pfxrtr_lookup(struct nd_prefix *,
71 1.68 dyoung struct nd_defrouter *);
72 1.68 dyoung static void pfxrtr_add(struct nd_prefix *, struct nd_defrouter *);
73 1.68 dyoung static void pfxrtr_del(struct nd_pfxrouter *);
74 1.32 itojun static struct nd_pfxrouter *find_pfxlist_reachable_router
75 1.68 dyoung (struct nd_prefix *);
76 1.121 ozaki
77 1.121 ozaki static void defrouter_addreq(struct nd_defrouter *);
78 1.68 dyoung static void defrouter_delreq(struct nd_defrouter *);
79 1.68 dyoung
80 1.68 dyoung static int in6_init_prefix_ltimes(struct nd_prefix *);
81 1.83 christos static void in6_init_address_ltimes(struct nd_prefix *,
82 1.83 christos struct in6_addrlifetime *);
83 1.83 christos static void purge_detached(struct ifnet *);
84 1.2 itojun
85 1.120 ozaki static int rt6_deleteroute_matcher(struct rtentry *, void *);
86 1.2 itojun
87 1.121 ozaki static int nd6_prelist_add(struct nd_prefixctl *, struct nd_defrouter *,
88 1.121 ozaki struct nd_prefix **);
89 1.121 ozaki static int nd6_prefix_onlink(struct nd_prefix *);
90 1.121 ozaki static int nd6_prefix_offlink(struct nd_prefix *);
91 1.121 ozaki static struct nd_prefix *nd6_prefix_lookup(struct nd_prefixctl *);
92 1.121 ozaki
93 1.2 itojun extern int nd6_recalc_reachtm_interval;
94 1.2 itojun
95 1.56 rpaulo int ip6_use_tempaddr = 0;
96 1.56 rpaulo
97 1.56 rpaulo int ip6_desync_factor;
98 1.56 rpaulo u_int32_t ip6_temp_preferred_lifetime = DEF_TEMP_PREFERRED_LIFETIME;
99 1.56 rpaulo u_int32_t ip6_temp_valid_lifetime = DEF_TEMP_VALID_LIFETIME;
100 1.56 rpaulo int ip6_temp_regen_advance = TEMPADDR_REGEN_ADVANCE;
101 1.56 rpaulo
102 1.81 spz int nd6_numroutes = 0;
103 1.81 spz
104 1.56 rpaulo /* RTPREF_MEDIUM has to be 0! */
105 1.56 rpaulo #define RTPREF_HIGH 1
106 1.56 rpaulo #define RTPREF_MEDIUM 0
107 1.56 rpaulo #define RTPREF_LOW (-1)
108 1.56 rpaulo #define RTPREF_RESERVED (-2)
109 1.56 rpaulo #define RTPREF_INVALID (-3) /* internal */
110 1.56 rpaulo
111 1.101 ozaki static inline bool
112 1.101 ozaki nd6_is_llinfo_probreach(struct nd_defrouter *dr)
113 1.101 ozaki {
114 1.105 ozaki struct llentry *ln = NULL;
115 1.101 ozaki
116 1.108 ozaki ln = nd6_lookup(&dr->rtaddr, dr->ifp, false);
117 1.108 ozaki if (ln == NULL)
118 1.101 ozaki return false;
119 1.108 ozaki
120 1.108 ozaki if (!ND6_IS_LLINFO_PROBREACH(ln)) {
121 1.108 ozaki LLE_RUNLOCK(ln);
122 1.101 ozaki return false;
123 1.108 ozaki }
124 1.101 ozaki
125 1.108 ozaki LLE_RUNLOCK(ln);
126 1.101 ozaki return true;
127 1.101 ozaki }
128 1.101 ozaki
129 1.2 itojun /*
130 1.2 itojun * Receive Router Solicitation Message - just for routers.
131 1.81 spz * Router solicitation/advertisement is mostly managed by a userland program
132 1.2 itojun * (rtadvd) so here we have no function like nd6_ra_output().
133 1.2 itojun *
134 1.2 itojun * Based on RFC 2461
135 1.2 itojun */
136 1.2 itojun void
137 1.64 christos nd6_rs_input(struct mbuf *m, int off, int icmp6len)
138 1.2 itojun {
139 1.111 ozaki struct ifnet *ifp;
140 1.111 ozaki struct nd_ifinfo *ndi;
141 1.2 itojun struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
142 1.12 itojun struct nd_router_solicit *nd_rs;
143 1.2 itojun struct in6_addr saddr6 = ip6->ip6_src;
144 1.2 itojun char *lladdr = NULL;
145 1.2 itojun int lladdrlen = 0;
146 1.2 itojun union nd_opts ndopts;
147 1.111 ozaki struct psref psref;
148 1.130 ryo char ip6bufs[INET6_ADDRSTRLEN], ip6bufd[INET6_ADDRSTRLEN];
149 1.111 ozaki
150 1.111 ozaki ifp = m_get_rcvif_psref(m, &psref);
151 1.111 ozaki if (ifp == NULL)
152 1.111 ozaki goto freeit;
153 1.111 ozaki
154 1.111 ozaki ndi = ND_IFINFO(ifp);
155 1.2 itojun
156 1.2 itojun /* If I'm not a router, ignore it. */
157 1.80 dyoung if (nd6_accepts_rtadv(ndi) || !ip6_forwarding)
158 1.12 itojun goto freeit;
159 1.2 itojun
160 1.2 itojun /* Sanity checks */
161 1.2 itojun if (ip6->ip6_hlim != 255) {
162 1.107 ozaki nd6log(LOG_ERR, "invalid hlim (%d) from %s to %s on %s\n",
163 1.130 ryo ip6->ip6_hlim, ip6_sprintf(ip6bufs, &ip6->ip6_src),
164 1.130 ryo ip6_sprintf(ip6bufd, &ip6->ip6_dst), if_name(ifp));
165 1.20 itojun goto bad;
166 1.2 itojun }
167 1.2 itojun
168 1.2 itojun /*
169 1.2 itojun * Don't update the neighbor cache, if src = ::.
170 1.2 itojun * This indicates that the src has no IP address assigned yet.
171 1.2 itojun */
172 1.2 itojun if (IN6_IS_ADDR_UNSPECIFIED(&saddr6))
173 1.12 itojun goto freeit;
174 1.12 itojun
175 1.12 itojun IP6_EXTHDR_GET(nd_rs, struct nd_router_solicit *, m, off, icmp6len);
176 1.12 itojun if (nd_rs == NULL) {
177 1.75 thorpej ICMP6_STATINC(ICMP6_STAT_TOOSHORT);
178 1.2 itojun return;
179 1.12 itojun }
180 1.2 itojun
181 1.2 itojun icmp6len -= sizeof(*nd_rs);
182 1.2 itojun nd6_option_init(nd_rs + 1, icmp6len, &ndopts);
183 1.2 itojun if (nd6_options(&ndopts) < 0) {
184 1.107 ozaki nd6log(LOG_INFO, "invalid ND option, ignored\n");
185 1.20 itojun /* nd6_options have incremented stats */
186 1.12 itojun goto freeit;
187 1.2 itojun }
188 1.2 itojun
189 1.2 itojun if (ndopts.nd_opts_src_lladdr) {
190 1.2 itojun lladdr = (char *)(ndopts.nd_opts_src_lladdr + 1);
191 1.2 itojun lladdrlen = ndopts.nd_opts_src_lladdr->nd_opt_len << 3;
192 1.2 itojun }
193 1.2 itojun
194 1.2 itojun if (lladdr && ((ifp->if_addrlen + 2 + 7) & ~7) != lladdrlen) {
195 1.107 ozaki nd6log(LOG_INFO, "lladdrlen mismatch for %s "
196 1.2 itojun "(if %d, RS packet %d)\n",
197 1.130 ryo ip6_sprintf(ip6bufs, &saddr6),
198 1.130 ryo ifp->if_addrlen, lladdrlen - 2);
199 1.20 itojun goto bad;
200 1.2 itojun }
201 1.2 itojun
202 1.6 itojun nd6_cache_lladdr(ifp, &saddr6, lladdr, lladdrlen, ND_ROUTER_SOLICIT, 0);
203 1.12 itojun
204 1.12 itojun freeit:
205 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
206 1.12 itojun m_freem(m);
207 1.20 itojun return;
208 1.20 itojun
209 1.20 itojun bad:
210 1.75 thorpej ICMP6_STATINC(ICMP6_STAT_BADRS);
211 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
212 1.20 itojun m_freem(m);
213 1.2 itojun }
214 1.2 itojun
215 1.2 itojun /*
216 1.2 itojun * Receive Router Advertisement Message.
217 1.2 itojun *
218 1.2 itojun * Based on RFC 2461
219 1.2 itojun * TODO: on-link bit on prefix information
220 1.2 itojun * TODO: ND_RA_FLAG_{OTHER,MANAGED} processing
221 1.2 itojun */
222 1.2 itojun void
223 1.64 christos nd6_ra_input(struct mbuf *m, int off, int icmp6len)
224 1.2 itojun {
225 1.111 ozaki struct ifnet *ifp;
226 1.111 ozaki struct nd_ifinfo *ndi;
227 1.2 itojun struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
228 1.12 itojun struct nd_router_advert *nd_ra;
229 1.2 itojun struct in6_addr saddr6 = ip6->ip6_src;
230 1.2 itojun #if 0
231 1.2 itojun struct in6_addr daddr6 = ip6->ip6_dst;
232 1.12 itojun int flags; /* = nd_ra->nd_ra_flags_reserved; */
233 1.2 itojun int is_managed = ((flags & ND_RA_FLAG_MANAGED) != 0);
234 1.2 itojun int is_other = ((flags & ND_RA_FLAG_OTHER) != 0);
235 1.2 itojun #endif
236 1.56 rpaulo int mcast = 0;
237 1.2 itojun union nd_opts ndopts;
238 1.2 itojun struct nd_defrouter *dr;
239 1.111 ozaki struct psref psref;
240 1.130 ryo char ip6buf[INET6_ADDRSTRLEN], ip6buf2[INET6_ADDRSTRLEN];
241 1.111 ozaki
242 1.111 ozaki ifp = m_get_rcvif_psref(m, &psref);
243 1.111 ozaki if (ifp == NULL)
244 1.111 ozaki goto freeit;
245 1.2 itojun
246 1.111 ozaki ndi = ND_IFINFO(ifp);
247 1.32 itojun /*
248 1.81 spz * We only accept RAs when
249 1.81 spz * the system-wide variable allows the acceptance, and the
250 1.33 itojun * per-interface variable allows RAs on the receiving interface.
251 1.32 itojun */
252 1.80 dyoung if (!nd6_accepts_rtadv(ndi))
253 1.32 itojun goto freeit;
254 1.2 itojun
255 1.2 itojun if (ip6->ip6_hlim != 255) {
256 1.107 ozaki nd6log(LOG_ERR, "invalid hlim (%d) from %s to %s on %s\n",
257 1.130 ryo ip6->ip6_hlim, ip6_sprintf(ip6buf, &ip6->ip6_src),
258 1.130 ryo ip6_sprintf(ip6buf2, &ip6->ip6_dst), if_name(ifp));
259 1.20 itojun goto bad;
260 1.2 itojun }
261 1.2 itojun
262 1.2 itojun if (!IN6_IS_ADDR_LINKLOCAL(&saddr6)) {
263 1.107 ozaki nd6log(LOG_ERR, "src %s is not link-local\n",
264 1.130 ryo ip6_sprintf(ip6buf, &saddr6));
265 1.20 itojun goto bad;
266 1.12 itojun }
267 1.12 itojun
268 1.12 itojun IP6_EXTHDR_GET(nd_ra, struct nd_router_advert *, m, off, icmp6len);
269 1.12 itojun if (nd_ra == NULL) {
270 1.75 thorpej ICMP6_STATINC(ICMP6_STAT_TOOSHORT);
271 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
272 1.2 itojun return;
273 1.2 itojun }
274 1.2 itojun
275 1.2 itojun icmp6len -= sizeof(*nd_ra);
276 1.2 itojun nd6_option_init(nd_ra + 1, icmp6len, &ndopts);
277 1.2 itojun if (nd6_options(&ndopts) < 0) {
278 1.107 ozaki nd6log(LOG_INFO, "invalid ND option, ignored\n");
279 1.20 itojun /* nd6_options have incremented stats */
280 1.12 itojun goto freeit;
281 1.2 itojun }
282 1.2 itojun
283 1.2 itojun {
284 1.52 christos struct nd_defrouter drtr;
285 1.2 itojun u_int32_t advreachable = nd_ra->nd_ra_reachable;
286 1.2 itojun
287 1.56 rpaulo /* remember if this is a multicasted advertisement */
288 1.56 rpaulo if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst))
289 1.56 rpaulo mcast = 1;
290 1.56 rpaulo
291 1.56 rpaulo memset(&drtr, 0, sizeof(drtr));
292 1.52 christos drtr.rtaddr = saddr6;
293 1.52 christos drtr.flags = nd_ra->nd_ra_flags_reserved;
294 1.58 rpaulo drtr.rtlifetime = ntohs(nd_ra->nd_ra_router_lifetime);
295 1.102 ozaki drtr.expire = time_uptime + drtr.rtlifetime;
296 1.52 christos drtr.ifp = ifp;
297 1.2 itojun /* unspecified or not? (RFC 2461 6.3.4) */
298 1.2 itojun if (advreachable) {
299 1.2 itojun NTOHL(advreachable);
300 1.2 itojun if (advreachable <= MAX_REACHABLE_TIME &&
301 1.2 itojun ndi->basereachable != advreachable) {
302 1.2 itojun ndi->basereachable = advreachable;
303 1.2 itojun ndi->reachable = ND_COMPUTE_RTIME(ndi->basereachable);
304 1.2 itojun ndi->recalctm = nd6_recalc_reachtm_interval; /* reset */
305 1.2 itojun }
306 1.2 itojun }
307 1.2 itojun if (nd_ra->nd_ra_retransmit)
308 1.2 itojun ndi->retrans = ntohl(nd_ra->nd_ra_retransmit);
309 1.99 roy if (nd_ra->nd_ra_curhoplimit) {
310 1.99 roy if (ndi->chlim < nd_ra->nd_ra_curhoplimit)
311 1.99 roy ndi->chlim = nd_ra->nd_ra_curhoplimit;
312 1.99 roy else if (ndi->chlim != nd_ra->nd_ra_curhoplimit)
313 1.99 roy log(LOG_ERR, "nd_ra_input: lower CurHopLimit sent from "
314 1.99 roy "%s on %s (current=%d, received=%d), ignored\n",
315 1.130 ryo ip6_sprintf(ip6buf, &ip6->ip6_src),
316 1.99 roy if_name(ifp), ndi->chlim, nd_ra->nd_ra_curhoplimit);
317 1.99 roy }
318 1.128 ozaki ND6_WLOCK();
319 1.52 christos dr = defrtrlist_update(&drtr);
320 1.2 itojun }
321 1.2 itojun
322 1.2 itojun /*
323 1.2 itojun * prefix
324 1.2 itojun */
325 1.2 itojun if (ndopts.nd_opts_pi) {
326 1.2 itojun struct nd_opt_hdr *pt;
327 1.32 itojun struct nd_opt_prefix_info *pi = NULL;
328 1.94 matt struct nd_prefixctl prc;
329 1.2 itojun
330 1.2 itojun for (pt = (struct nd_opt_hdr *)ndopts.nd_opts_pi;
331 1.2 itojun pt <= (struct nd_opt_hdr *)ndopts.nd_opts_pi_end;
332 1.63 christos pt = (struct nd_opt_hdr *)((char *)pt +
333 1.2 itojun (pt->nd_opt_len << 3))) {
334 1.2 itojun if (pt->nd_opt_type != ND_OPT_PREFIX_INFORMATION)
335 1.2 itojun continue;
336 1.2 itojun pi = (struct nd_opt_prefix_info *)pt;
337 1.2 itojun
338 1.2 itojun if (pi->nd_opt_pi_len != 4) {
339 1.107 ozaki nd6log(LOG_INFO, "invalid option "
340 1.22 itojun "len %d for prefix information option, "
341 1.107 ozaki "ignored\n", pi->nd_opt_pi_len);
342 1.2 itojun continue;
343 1.2 itojun }
344 1.2 itojun
345 1.2 itojun if (128 < pi->nd_opt_pi_prefix_len) {
346 1.107 ozaki nd6log(LOG_INFO, "invalid prefix "
347 1.22 itojun "len %d for prefix information option, "
348 1.107 ozaki "ignored\n", pi->nd_opt_pi_prefix_len);
349 1.2 itojun continue;
350 1.2 itojun }
351 1.2 itojun
352 1.2 itojun if (IN6_IS_ADDR_MULTICAST(&pi->nd_opt_pi_prefix)
353 1.2 itojun || IN6_IS_ADDR_LINKLOCAL(&pi->nd_opt_pi_prefix)) {
354 1.107 ozaki nd6log(LOG_INFO,
355 1.107 ozaki "invalid prefix %s, ignored\n",
356 1.130 ryo ip6_sprintf(ip6buf, &pi->nd_opt_pi_prefix));
357 1.2 itojun continue;
358 1.2 itojun }
359 1.2 itojun
360 1.94 matt memset(&prc, 0, sizeof(prc));
361 1.94 matt sockaddr_in6_init(&prc.ndprc_prefix,
362 1.69 dyoung &pi->nd_opt_pi_prefix, 0, 0, 0);
363 1.111 ozaki prc.ndprc_ifp = ifp;
364 1.2 itojun
365 1.94 matt prc.ndprc_raf_onlink = (pi->nd_opt_pi_flags_reserved &
366 1.56 rpaulo ND_OPT_PI_FLAG_ONLINK) ? 1 : 0;
367 1.94 matt prc.ndprc_raf_auto = (pi->nd_opt_pi_flags_reserved &
368 1.56 rpaulo ND_OPT_PI_FLAG_AUTO) ? 1 : 0;
369 1.94 matt prc.ndprc_plen = pi->nd_opt_pi_prefix_len;
370 1.94 matt prc.ndprc_vltime = ntohl(pi->nd_opt_pi_valid_time);
371 1.94 matt prc.ndprc_pltime = ntohl(pi->nd_opt_pi_preferred_time);
372 1.2 itojun
373 1.94 matt (void)prelist_update(&prc, dr, m, mcast);
374 1.2 itojun }
375 1.2 itojun }
376 1.128 ozaki ND6_UNLOCK();
377 1.2 itojun
378 1.2 itojun /*
379 1.2 itojun * MTU
380 1.2 itojun */
381 1.2 itojun if (ndopts.nd_opts_mtu && ndopts.nd_opts_mtu->nd_opt_mtu_len == 1) {
382 1.32 itojun u_long mtu;
383 1.30 itojun u_long maxmtu;
384 1.2 itojun
385 1.32 itojun mtu = ntohl(ndopts.nd_opts_mtu->nd_opt_mtu_mtu);
386 1.32 itojun
387 1.2 itojun /* lower bound */
388 1.2 itojun if (mtu < IPV6_MMTU) {
389 1.107 ozaki nd6log(LOG_INFO, "bogus mtu option "
390 1.32 itojun "mtu=%lu sent from %s, ignoring\n",
391 1.130 ryo mtu, ip6_sprintf(ip6buf, &ip6->ip6_src));
392 1.2 itojun goto skip;
393 1.2 itojun }
394 1.2 itojun
395 1.2 itojun /* upper bound */
396 1.30 itojun maxmtu = (ndi->maxmtu && ndi->maxmtu < ifp->if_mtu)
397 1.30 itojun ? ndi->maxmtu : ifp->if_mtu;
398 1.30 itojun if (mtu <= maxmtu) {
399 1.30 itojun int change = (ndi->linkmtu != mtu);
400 1.30 itojun
401 1.30 itojun ndi->linkmtu = mtu;
402 1.30 itojun if (change) /* in6_maxmtu may change */
403 1.30 itojun in6_setmaxmtu();
404 1.2 itojun } else {
405 1.107 ozaki nd6log(LOG_INFO,
406 1.107 ozaki "bogus mtu mtu=%lu sent from %s; "
407 1.30 itojun "exceeds maxmtu %lu, ignoring\n",
408 1.130 ryo mtu, ip6_sprintf(ip6buf, &ip6->ip6_src), maxmtu);
409 1.2 itojun }
410 1.2 itojun }
411 1.2 itojun
412 1.2 itojun skip:
413 1.33 itojun
414 1.2 itojun /*
415 1.26 itojun * Source link layer address
416 1.2 itojun */
417 1.2 itojun {
418 1.2 itojun char *lladdr = NULL;
419 1.2 itojun int lladdrlen = 0;
420 1.33 itojun
421 1.2 itojun if (ndopts.nd_opts_src_lladdr) {
422 1.2 itojun lladdr = (char *)(ndopts.nd_opts_src_lladdr + 1);
423 1.2 itojun lladdrlen = ndopts.nd_opts_src_lladdr->nd_opt_len << 3;
424 1.2 itojun }
425 1.2 itojun
426 1.2 itojun if (lladdr && ((ifp->if_addrlen + 2 + 7) & ~7) != lladdrlen) {
427 1.107 ozaki nd6log(LOG_INFO, "lladdrlen mismatch for %s "
428 1.130 ryo "(if %d, RA packet %d)\n", ip6_sprintf(ip6buf, &saddr6),
429 1.107 ozaki ifp->if_addrlen, lladdrlen - 2);
430 1.20 itojun goto bad;
431 1.2 itojun }
432 1.2 itojun
433 1.6 itojun nd6_cache_lladdr(ifp, &saddr6, lladdr, lladdrlen, ND_ROUTER_ADVERT, 0);
434 1.7 itojun
435 1.7 itojun /*
436 1.7 itojun * Installing a link-layer address might change the state of the
437 1.7 itojun * router's neighbor cache, which might also affect our on-link
438 1.7 itojun * detection of adveritsed prefixes.
439 1.7 itojun */
440 1.128 ozaki ND6_WLOCK();
441 1.123 ozaki nd6_pfxlist_onlink_check();
442 1.128 ozaki ND6_UNLOCK();
443 1.2 itojun }
444 1.12 itojun
445 1.20 itojun freeit:
446 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
447 1.20 itojun m_freem(m);
448 1.20 itojun return;
449 1.20 itojun
450 1.20 itojun bad:
451 1.75 thorpej ICMP6_STATINC(ICMP6_STAT_BADRA);
452 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
453 1.12 itojun m_freem(m);
454 1.2 itojun }
455 1.2 itojun
456 1.2 itojun /*
457 1.45 wiz * default router list processing sub routines
458 1.2 itojun */
459 1.121 ozaki static void
460 1.94 matt defrouter_addreq(struct nd_defrouter *newdr)
461 1.2 itojun {
462 1.76 dyoung union {
463 1.76 dyoung struct sockaddr_in6 sin6;
464 1.76 dyoung struct sockaddr sa;
465 1.76 dyoung } def, mask, gate;
466 1.2 itojun int s;
467 1.32 itojun int error;
468 1.2 itojun
469 1.56 rpaulo memset(&def, 0, sizeof(def));
470 1.56 rpaulo memset(&mask, 0, sizeof(mask));
471 1.56 rpaulo memset(&gate, 0,sizeof(gate)); /* for safety */
472 1.2 itojun
473 1.76 dyoung def.sin6.sin6_len = mask.sin6.sin6_len = gate.sin6.sin6_len =
474 1.32 itojun sizeof(struct sockaddr_in6);
475 1.76 dyoung def.sin6.sin6_family = mask.sin6.sin6_family = gate.sin6.sin6_family = AF_INET6;
476 1.94 matt gate.sin6.sin6_addr = newdr->rtaddr;
477 1.32 itojun #ifndef SCOPEDROUTING
478 1.76 dyoung gate.sin6.sin6_scope_id = 0; /* XXX */
479 1.32 itojun #endif
480 1.2 itojun
481 1.4 itojun s = splsoftnet();
482 1.101 ozaki error = rtrequest_newmsg(RTM_ADD, &def.sa, &gate.sa, &mask.sa,
483 1.101 ozaki RTF_GATEWAY);
484 1.101 ozaki if (error == 0) {
485 1.81 spz nd6_numroutes++;
486 1.101 ozaki newdr->installed = 1;
487 1.32 itojun }
488 1.2 itojun splx(s);
489 1.2 itojun return;
490 1.2 itojun }
491 1.2 itojun
492 1.2 itojun struct nd_defrouter *
493 1.123 ozaki nd6_defrouter_lookup(const struct in6_addr *addr, struct ifnet *ifp)
494 1.2 itojun {
495 1.2 itojun struct nd_defrouter *dr;
496 1.2 itojun
497 1.128 ozaki ND6_ASSERT_LOCK();
498 1.128 ozaki
499 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr) {
500 1.66 dyoung if (dr->ifp == ifp && IN6_ARE_ADDR_EQUAL(addr, &dr->rtaddr))
501 1.66 dyoung break;
502 1.7 itojun }
503 1.2 itojun
504 1.66 dyoung return dr; /* search failed */
505 1.2 itojun }
506 1.2 itojun
507 1.2 itojun void
508 1.123 ozaki nd6_defrtrlist_del(struct nd_defrouter *dr, struct in6_ifextra *ext)
509 1.2 itojun {
510 1.2 itojun struct nd_defrouter *deldr = NULL;
511 1.2 itojun struct nd_prefix *pr;
512 1.96 martin struct nd_ifinfo *ndi;
513 1.96 martin
514 1.128 ozaki ND6_ASSERT_WLOCK();
515 1.128 ozaki
516 1.96 martin if (ext == NULL)
517 1.96 martin ext = dr->ifp->if_afdata[AF_INET6];
518 1.96 martin
519 1.96 martin /* detach already in progress, can not do anything */
520 1.96 martin if (ext == NULL)
521 1.96 martin return;
522 1.96 martin
523 1.96 martin ndi = ext->nd_ifinfo;
524 1.2 itojun
525 1.2 itojun /*
526 1.2 itojun * Flush all the routing table entries that use the router
527 1.2 itojun * as a next hop.
528 1.2 itojun */
529 1.79 tonnerre /* XXX: better condition? */
530 1.80 dyoung if (!ip6_forwarding && nd6_accepts_rtadv(ndi))
531 1.123 ozaki nd6_rt_flush(&dr->rtaddr, dr->ifp);
532 1.32 itojun
533 1.32 itojun if (dr->installed) {
534 1.32 itojun deldr = dr;
535 1.32 itojun defrouter_delreq(dr);
536 1.2 itojun }
537 1.124 ozaki ND_DEFROUTER_LIST_REMOVE(dr);
538 1.2 itojun
539 1.2 itojun /*
540 1.2 itojun * Also delete all the pointers to the router in each prefix lists.
541 1.2 itojun */
542 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
543 1.2 itojun struct nd_pfxrouter *pfxrtr;
544 1.2 itojun if ((pfxrtr = pfxrtr_lookup(pr, dr)) != NULL)
545 1.2 itojun pfxrtr_del(pfxrtr);
546 1.2 itojun }
547 1.123 ozaki nd6_pfxlist_onlink_check();
548 1.2 itojun
549 1.2 itojun /*
550 1.7 itojun * If the router is the primary one, choose a new one.
551 1.123 ozaki * Note that nd6_defrouter_select() will remove the current gateway
552 1.7 itojun * from the routing table.
553 1.2 itojun */
554 1.2 itojun if (deldr)
555 1.123 ozaki nd6_defrouter_select();
556 1.7 itojun
557 1.83 christos ext->ndefrouters--;
558 1.83 christos if (ext->ndefrouters < 0) {
559 1.123 ozaki log(LOG_WARNING, "nd6_defrtrlist_del: negative count on %s\n",
560 1.83 christos dr->ifp->if_xname);
561 1.83 christos }
562 1.83 christos
563 1.2 itojun free(dr, M_IP6NDP);
564 1.2 itojun }
565 1.2 itojun
566 1.7 itojun /*
567 1.32 itojun * Remove the default route for a given router.
568 1.123 ozaki * This is just a subroutine function for nd6_defrouter_select(), and should
569 1.32 itojun * not be called from anywhere else.
570 1.32 itojun */
571 1.32 itojun static void
572 1.64 christos defrouter_delreq(struct nd_defrouter *dr)
573 1.32 itojun {
574 1.76 dyoung union {
575 1.76 dyoung struct sockaddr_in6 sin6;
576 1.76 dyoung struct sockaddr sa;
577 1.76 dyoung } def, mask, gw;
578 1.101 ozaki int error;
579 1.32 itojun
580 1.35 itojun #ifdef DIAGNOSTIC
581 1.56 rpaulo if (dr == NULL)
582 1.35 itojun panic("dr == NULL in defrouter_delreq");
583 1.35 itojun #endif
584 1.35 itojun
585 1.76 dyoung memset(&def, 0, sizeof(def));
586 1.76 dyoung memset(&mask, 0, sizeof(mask));
587 1.76 dyoung memset(&gw, 0, sizeof(gw)); /* for safety */
588 1.32 itojun
589 1.76 dyoung def.sin6.sin6_len = mask.sin6.sin6_len = gw.sin6.sin6_len =
590 1.32 itojun sizeof(struct sockaddr_in6);
591 1.76 dyoung def.sin6.sin6_family = mask.sin6.sin6_family = gw.sin6.sin6_family = AF_INET6;
592 1.76 dyoung gw.sin6.sin6_addr = dr->rtaddr;
593 1.32 itojun #ifndef SCOPEDROUTING
594 1.76 dyoung gw.sin6.sin6_scope_id = 0; /* XXX */
595 1.32 itojun #endif
596 1.32 itojun
597 1.101 ozaki error = rtrequest_newmsg(RTM_DELETE, &def.sa, &gw.sa, &mask.sa,
598 1.101 ozaki RTF_GATEWAY);
599 1.101 ozaki if (error == 0)
600 1.100 ozaki nd6_numroutes--;
601 1.32 itojun
602 1.35 itojun dr->installed = 0;
603 1.32 itojun }
604 1.32 itojun
605 1.32 itojun /*
606 1.32 itojun * remove all default routes from default router list
607 1.32 itojun */
608 1.32 itojun void
609 1.123 ozaki nd6_defrouter_reset(void)
610 1.32 itojun {
611 1.32 itojun struct nd_defrouter *dr;
612 1.32 itojun
613 1.128 ozaki ND6_ASSERT_WLOCK();
614 1.128 ozaki
615 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr)
616 1.32 itojun defrouter_delreq(dr);
617 1.32 itojun
618 1.32 itojun /*
619 1.32 itojun * XXX should we also nuke any default routers in the kernel, by
620 1.32 itojun * going through them by rtalloc1()?
621 1.32 itojun */
622 1.32 itojun }
623 1.32 itojun
624 1.32 itojun /*
625 1.32 itojun * Default Router Selection according to Section 6.3.6 of RFC 2461 and
626 1.32 itojun * draft-ietf-ipngwg-router-selection:
627 1.32 itojun * 1) Routers that are reachable or probably reachable should be preferred.
628 1.32 itojun * If we have more than one (probably) reachable router, prefer ones
629 1.32 itojun * with the highest router preference.
630 1.7 itojun * 2) When no routers on the list are known to be reachable or
631 1.7 itojun * probably reachable, routers SHOULD be selected in a round-robin
632 1.32 itojun * fashion, regardless of router preference values.
633 1.7 itojun * 3) If the Default Router List is empty, assume that all
634 1.7 itojun * destinations are on-link.
635 1.32 itojun *
636 1.32 itojun * We assume nd_defrouter is sorted by router preference value.
637 1.32 itojun * Since the code below covers both with and without router preference cases,
638 1.32 itojun * we do not need to classify the cases by ifdef.
639 1.32 itojun *
640 1.32 itojun * At this moment, we do not try to install more than one default router,
641 1.32 itojun * even when the multipath routing is available, because we're not sure about
642 1.32 itojun * the benefits for stub hosts comparing to the risk of making the code
643 1.32 itojun * complicated and the possibility of introducing bugs.
644 1.7 itojun */
645 1.7 itojun void
646 1.123 ozaki nd6_defrouter_select(void)
647 1.7 itojun {
648 1.79 tonnerre struct nd_ifinfo *ndi;
649 1.32 itojun struct nd_defrouter *dr, *selected_dr = NULL, *installed_dr = NULL;
650 1.7 itojun
651 1.128 ozaki ND6_ASSERT_WLOCK();
652 1.128 ozaki
653 1.7 itojun /*
654 1.32 itojun * This function should be called only when acting as an autoconfigured
655 1.32 itojun * host. Although the remaining part of this function is not effective
656 1.32 itojun * if the node is not an autoconfigured host, we explicitly exclude
657 1.32 itojun * such cases here for safety.
658 1.7 itojun */
659 1.79 tonnerre if (ip6_forwarding) {
660 1.107 ozaki nd6log(LOG_WARNING, "called unexpectedly (forwarding=%d, "
661 1.107 ozaki "accept_rtadv=%d)\n", ip6_forwarding, ip6_accept_rtadv);
662 1.32 itojun return;
663 1.7 itojun }
664 1.7 itojun
665 1.32 itojun /*
666 1.32 itojun * Let's handle easy case (3) first:
667 1.49 itojun * If default router list is empty, there's nothing to be done.
668 1.32 itojun */
669 1.128 ozaki if (ND_DEFROUTER_LIST_EMPTY())
670 1.32 itojun return;
671 1.32 itojun
672 1.32 itojun /*
673 1.32 itojun * Search for a (probably) reachable router from the list.
674 1.32 itojun * We just pick up the first reachable one (if any), assuming that
675 1.32 itojun * the ordering rule of the list described in defrtrlist_update().
676 1.32 itojun */
677 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr) {
678 1.79 tonnerre ndi = ND_IFINFO(dr->ifp);
679 1.80 dyoung if (nd6_accepts_rtadv(ndi))
680 1.79 tonnerre continue;
681 1.79 tonnerre
682 1.56 rpaulo if (selected_dr == NULL &&
683 1.101 ozaki nd6_is_llinfo_probreach(dr))
684 1.32 itojun selected_dr = dr;
685 1.32 itojun
686 1.32 itojun if (dr->installed && !installed_dr)
687 1.32 itojun installed_dr = dr;
688 1.32 itojun else if (dr->installed && installed_dr) {
689 1.32 itojun /* this should not happen. warn for diagnosis. */
690 1.123 ozaki log(LOG_ERR, "nd6_defrouter_select: more than one router"
691 1.32 itojun " is installed\n");
692 1.32 itojun }
693 1.32 itojun }
694 1.32 itojun /*
695 1.32 itojun * If none of the default routers was found to be reachable,
696 1.32 itojun * round-robin the list regardless of preference.
697 1.32 itojun * Otherwise, if we have an installed router, check if the selected
698 1.32 itojun * (reachable) router should really be preferred to the installed one.
699 1.32 itojun * We only prefer the new router when the old one is not reachable
700 1.32 itojun * or when the new one has a really higher preference value.
701 1.32 itojun */
702 1.56 rpaulo if (selected_dr == NULL) {
703 1.124 ozaki if (installed_dr == NULL ||
704 1.124 ozaki ND_DEFROUTER_LIST_NEXT(installed_dr) == NULL)
705 1.124 ozaki selected_dr = ND_DEFROUTER_LIST_FIRST();
706 1.32 itojun else
707 1.124 ozaki selected_dr = ND_DEFROUTER_LIST_NEXT(installed_dr);
708 1.32 itojun } else if (installed_dr &&
709 1.101 ozaki nd6_is_llinfo_probreach(installed_dr) &&
710 1.32 itojun rtpref(selected_dr) <= rtpref(installed_dr)) {
711 1.32 itojun selected_dr = installed_dr;
712 1.32 itojun }
713 1.32 itojun
714 1.32 itojun /*
715 1.32 itojun * If the selected router is different than the installed one,
716 1.32 itojun * remove the installed router and install the selected one.
717 1.32 itojun * Note that the selected router is never NULL here.
718 1.32 itojun */
719 1.32 itojun if (installed_dr != selected_dr) {
720 1.32 itojun if (installed_dr)
721 1.32 itojun defrouter_delreq(installed_dr);
722 1.32 itojun defrouter_addreq(selected_dr);
723 1.7 itojun }
724 1.7 itojun
725 1.7 itojun return;
726 1.7 itojun }
727 1.7 itojun
728 1.32 itojun /*
729 1.32 itojun * for default router selection
730 1.32 itojun * regards router-preference field as a 2-bit signed integer
731 1.32 itojun */
732 1.32 itojun static int
733 1.32 itojun rtpref(struct nd_defrouter *dr)
734 1.32 itojun {
735 1.32 itojun switch (dr->flags & ND_RA_FLAG_RTPREF_MASK) {
736 1.32 itojun case ND_RA_FLAG_RTPREF_HIGH:
737 1.56 rpaulo return (RTPREF_HIGH);
738 1.32 itojun case ND_RA_FLAG_RTPREF_MEDIUM:
739 1.58 rpaulo case ND_RA_FLAG_RTPREF_RSV:
740 1.56 rpaulo return (RTPREF_MEDIUM);
741 1.32 itojun case ND_RA_FLAG_RTPREF_LOW:
742 1.56 rpaulo return (RTPREF_LOW);
743 1.32 itojun default:
744 1.32 itojun /*
745 1.32 itojun * This case should never happen. If it did, it would mean a
746 1.32 itojun * serious bug of kernel internal. We thus always bark here.
747 1.32 itojun * Or, can we even panic?
748 1.32 itojun */
749 1.56 rpaulo log(LOG_ERR, "rtpref: impossible RA flag %x\n", dr->flags);
750 1.56 rpaulo return (RTPREF_INVALID);
751 1.32 itojun }
752 1.32 itojun /* NOTREACHED */
753 1.32 itojun }
754 1.32 itojun
755 1.2 itojun static struct nd_defrouter *
756 1.94 matt defrtrlist_update(struct nd_defrouter *newdr)
757 1.2 itojun {
758 1.127 ozaki struct nd_defrouter *dr, *n, *ret = NULL;
759 1.94 matt struct in6_ifextra *ext = newdr->ifp->if_afdata[AF_INET6];
760 1.128 ozaki
761 1.128 ozaki ND6_ASSERT_WLOCK();
762 1.2 itojun
763 1.123 ozaki if ((dr = nd6_defrouter_lookup(&newdr->rtaddr, newdr->ifp)) != NULL) {
764 1.2 itojun /* entry exists */
765 1.94 matt if (newdr->rtlifetime == 0) {
766 1.123 ozaki nd6_defrtrlist_del(dr, ext);
767 1.2 itojun dr = NULL;
768 1.2 itojun } else {
769 1.32 itojun int oldpref = rtpref(dr);
770 1.32 itojun
771 1.2 itojun /* override */
772 1.94 matt dr->flags = newdr->flags; /* xxx flag check */
773 1.94 matt dr->rtlifetime = newdr->rtlifetime;
774 1.94 matt dr->expire = newdr->expire;
775 1.32 itojun
776 1.32 itojun /*
777 1.32 itojun * If the preference does not change, there's no need
778 1.32 itojun * to sort the entries.
779 1.32 itojun */
780 1.94 matt if (rtpref(newdr) == oldpref) {
781 1.127 ozaki ret = dr;
782 1.127 ozaki goto out;
783 1.32 itojun }
784 1.32 itojun
785 1.32 itojun /*
786 1.32 itojun * preferred router may be changed, so relocate
787 1.32 itojun * this router.
788 1.32 itojun * XXX: calling TAILQ_REMOVE directly is a bad manner.
789 1.123 ozaki * However, since nd6_defrtrlist_del() has many side
790 1.32 itojun * effects, we intentionally do so here.
791 1.123 ozaki * nd6_defrouter_select() below will handle routing
792 1.32 itojun * changes later.
793 1.32 itojun */
794 1.124 ozaki ND_DEFROUTER_LIST_REMOVE(dr);
795 1.32 itojun n = dr;
796 1.32 itojun goto insert;
797 1.2 itojun }
798 1.127 ozaki ret = dr;
799 1.127 ozaki goto out;
800 1.2 itojun }
801 1.2 itojun
802 1.127 ozaki if (ip6_maxifdefrouters >= 0 && ext->ndefrouters >= ip6_maxifdefrouters)
803 1.127 ozaki goto out;
804 1.83 christos
805 1.2 itojun /* entry does not exist */
806 1.127 ozaki if (newdr->rtlifetime == 0)
807 1.127 ozaki goto out;
808 1.2 itojun
809 1.81 spz if (ip6_rtadv_maxroutes <= nd6_numroutes) {
810 1.81 spz ICMP6_STATINC(ICMP6_STAT_DROPPED_RAROUTE);
811 1.127 ozaki goto out;
812 1.81 spz }
813 1.81 spz
814 1.2 itojun n = (struct nd_defrouter *)malloc(sizeof(*n), M_IP6NDP, M_NOWAIT);
815 1.127 ozaki if (n == NULL)
816 1.127 ozaki goto out;
817 1.78 cegger memset(n, 0, sizeof(*n));
818 1.94 matt *n = *newdr;
819 1.7 itojun
820 1.32 itojun insert:
821 1.7 itojun /*
822 1.32 itojun * Insert the new router in the Default Router List;
823 1.32 itojun * The Default Router List should be in the descending order
824 1.32 itojun * of router-preferece. Routers with the same preference are
825 1.32 itojun * sorted in the arriving time order.
826 1.7 itojun */
827 1.32 itojun
828 1.32 itojun /* insert at the end of the group */
829 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr) {
830 1.32 itojun if (rtpref(n) > rtpref(dr))
831 1.32 itojun break;
832 1.32 itojun }
833 1.32 itojun if (dr)
834 1.124 ozaki ND_DEFROUTER_LIST_INSERT_BEFORE(dr, n);
835 1.32 itojun else
836 1.124 ozaki ND_DEFROUTER_LIST_INSERT_TAIL(n);
837 1.32 itojun
838 1.123 ozaki nd6_defrouter_select();
839 1.32 itojun
840 1.83 christos ext->ndefrouters++;
841 1.83 christos
842 1.127 ozaki ret = n;
843 1.127 ozaki out:
844 1.127 ozaki return ret;
845 1.2 itojun }
846 1.2 itojun
847 1.2 itojun static struct nd_pfxrouter *
848 1.64 christos pfxrtr_lookup(struct nd_prefix *pr, struct nd_defrouter *dr)
849 1.2 itojun {
850 1.2 itojun struct nd_pfxrouter *search;
851 1.33 itojun
852 1.128 ozaki ND6_ASSERT_LOCK();
853 1.128 ozaki
854 1.62 dyoung LIST_FOREACH(search, &pr->ndpr_advrtrs, pfr_entry) {
855 1.2 itojun if (search->router == dr)
856 1.2 itojun break;
857 1.2 itojun }
858 1.2 itojun
859 1.36 itojun return (search);
860 1.2 itojun }
861 1.2 itojun
862 1.2 itojun static void
863 1.64 christos pfxrtr_add(struct nd_prefix *pr, struct nd_defrouter *dr)
864 1.2 itojun {
865 1.94 matt struct nd_pfxrouter *newpfr;
866 1.2 itojun
867 1.128 ozaki ND6_ASSERT_WLOCK();
868 1.128 ozaki
869 1.94 matt newpfr = malloc(sizeof(*newpfr), M_IP6NDP, M_NOWAIT|M_ZERO);
870 1.94 matt if (newpfr == NULL)
871 1.2 itojun return;
872 1.94 matt newpfr->router = dr;
873 1.2 itojun
874 1.94 matt LIST_INSERT_HEAD(&pr->ndpr_advrtrs, newpfr, pfr_entry);
875 1.2 itojun
876 1.123 ozaki nd6_pfxlist_onlink_check();
877 1.2 itojun }
878 1.2 itojun
879 1.2 itojun static void
880 1.64 christos pfxrtr_del(struct nd_pfxrouter *pfr)
881 1.2 itojun {
882 1.2 itojun LIST_REMOVE(pfr, pfr_entry);
883 1.2 itojun free(pfr, M_IP6NDP);
884 1.2 itojun }
885 1.2 itojun
886 1.121 ozaki static struct nd_prefix *
887 1.64 christos nd6_prefix_lookup(struct nd_prefixctl *key)
888 1.2 itojun {
889 1.2 itojun struct nd_prefix *search;
890 1.2 itojun
891 1.125 ozaki ND_PREFIX_LIST_FOREACH(search) {
892 1.94 matt if (key->ndprc_ifp == search->ndpr_ifp &&
893 1.94 matt key->ndprc_plen == search->ndpr_plen &&
894 1.94 matt in6_are_prefix_equal(&key->ndprc_prefix.sin6_addr,
895 1.94 matt &search->ndpr_prefix.sin6_addr, key->ndprc_plen)) {
896 1.2 itojun break;
897 1.2 itojun }
898 1.2 itojun }
899 1.2 itojun
900 1.36 itojun return (search);
901 1.2 itojun }
902 1.2 itojun
903 1.83 christos static void
904 1.83 christos purge_detached(struct ifnet *ifp)
905 1.83 christos {
906 1.83 christos struct nd_prefix *pr, *pr_next;
907 1.83 christos struct in6_ifaddr *ia;
908 1.93 ozaki struct ifaddr *ifa, *ifa_next;
909 1.83 christos
910 1.128 ozaki restart:
911 1.128 ozaki ND6_ASSERT_WLOCK();
912 1.128 ozaki
913 1.126 ozaki ND_PREFIX_LIST_FOREACH_SAFE(pr, pr_next) {
914 1.118 ozaki int s;
915 1.83 christos
916 1.83 christos /*
917 1.83 christos * This function is called when we need to make more room for
918 1.83 christos * new prefixes rather than keeping old, possibly stale ones.
919 1.83 christos * Detached prefixes would be a good candidate; if all routers
920 1.83 christos * that advertised the prefix expired, the prefix is also
921 1.83 christos * probably stale.
922 1.83 christos */
923 1.83 christos if (pr->ndpr_ifp != ifp ||
924 1.83 christos IN6_IS_ADDR_LINKLOCAL(&pr->ndpr_prefix.sin6_addr) ||
925 1.83 christos ((pr->ndpr_stateflags & NDPRF_DETACHED) == 0 &&
926 1.83 christos !LIST_EMPTY(&pr->ndpr_advrtrs)))
927 1.83 christos continue;
928 1.83 christos
929 1.118 ozaki s = pserialize_read_enter();
930 1.115 ozaki for (ifa = IFADDR_READER_FIRST(ifp); ifa; ifa = ifa_next) {
931 1.115 ozaki ifa_next = IFADDR_READER_NEXT(ifa);
932 1.83 christos if (ifa->ifa_addr->sa_family != AF_INET6)
933 1.83 christos continue;
934 1.83 christos ia = (struct in6_ifaddr *)ifa;
935 1.83 christos if ((ia->ia6_flags & IN6_IFF_AUTOCONF) ==
936 1.83 christos IN6_IFF_AUTOCONF && ia->ia6_ndpr == pr) {
937 1.118 ozaki pserialize_read_exit(s);
938 1.128 ozaki ND6_UNLOCK();
939 1.128 ozaki
940 1.128 ozaki /* in6_purgeaddr may destroy pr. */
941 1.83 christos in6_purgeaddr(ifa);
942 1.128 ozaki
943 1.128 ozaki ND6_WLOCK();
944 1.118 ozaki goto restart;
945 1.83 christos }
946 1.83 christos }
947 1.118 ozaki pserialize_read_exit(s);
948 1.118 ozaki
949 1.128 ozaki KASSERT(pr->ndpr_refcnt == 0);
950 1.128 ozaki nd6_prelist_remove(pr);
951 1.83 christos }
952 1.83 christos }
953 1.121 ozaki
954 1.121 ozaki static int
955 1.94 matt nd6_prelist_add(struct nd_prefixctl *prc, struct nd_defrouter *dr,
956 1.64 christos struct nd_prefix **newp)
957 1.2 itojun {
958 1.94 matt struct nd_prefix *newpr = NULL;
959 1.2 itojun int i, s;
960 1.56 rpaulo int error;
961 1.94 matt struct in6_ifextra *ext = prc->ndprc_ifp->if_afdata[AF_INET6];
962 1.83 christos
963 1.128 ozaki ND6_ASSERT_WLOCK();
964 1.128 ozaki
965 1.83 christos if (ip6_maxifprefixes >= 0) {
966 1.83 christos if (ext->nprefixes >= ip6_maxifprefixes / 2)
967 1.94 matt purge_detached(prc->ndprc_ifp);
968 1.83 christos if (ext->nprefixes >= ip6_maxifprefixes)
969 1.83 christos return ENOMEM;
970 1.83 christos }
971 1.2 itojun
972 1.56 rpaulo error = 0;
973 1.94 matt newpr = malloc(sizeof(*newpr), M_IP6NDP, M_NOWAIT|M_ZERO);
974 1.94 matt if (newpr == NULL)
975 1.2 itojun return ENOMEM;
976 1.94 matt newpr->ndpr_ifp = prc->ndprc_ifp;
977 1.94 matt newpr->ndpr_prefix = prc->ndprc_prefix;
978 1.94 matt newpr->ndpr_plen = prc->ndprc_plen;
979 1.94 matt newpr->ndpr_vltime = prc->ndprc_vltime;
980 1.94 matt newpr->ndpr_pltime = prc->ndprc_pltime;
981 1.94 matt newpr->ndpr_flags = prc->ndprc_flags;
982 1.94 matt if ((error = in6_init_prefix_ltimes(newpr)) != 0) {
983 1.94 matt free(newpr, M_IP6NDP);
984 1.56 rpaulo return(error);
985 1.56 rpaulo }
986 1.102 ozaki newpr->ndpr_lastupdate = time_uptime;
987 1.32 itojun if (newp != NULL)
988 1.94 matt *newp = newpr;
989 1.2 itojun
990 1.55 rpaulo /* initialization */
991 1.94 matt LIST_INIT(&newpr->ndpr_advrtrs);
992 1.94 matt in6_prefixlen2mask(&newpr->ndpr_mask, newpr->ndpr_plen);
993 1.2 itojun /* make prefix in the canonical form */
994 1.94 matt for (i = 0; i < 4; i++) {
995 1.94 matt newpr->ndpr_prefix.sin6_addr.s6_addr32[i] &=
996 1.94 matt newpr->ndpr_mask.s6_addr32[i];
997 1.94 matt }
998 1.2 itojun
999 1.4 itojun s = splsoftnet();
1000 1.2 itojun /* link ndpr_entry to nd_prefix list */
1001 1.125 ozaki ND_PREFIX_LIST_INSERT_HEAD(newpr);
1002 1.2 itojun splx(s);
1003 1.2 itojun
1004 1.32 itojun /* ND_OPT_PI_FLAG_ONLINK processing */
1005 1.94 matt if (newpr->ndpr_raf_onlink) {
1006 1.32 itojun int e;
1007 1.32 itojun
1008 1.94 matt if ((e = nd6_prefix_onlink(newpr)) != 0) {
1009 1.130 ryo char ip6buf[INET6_ADDRSTRLEN];
1010 1.107 ozaki nd6log(LOG_ERR, "failed to make "
1011 1.32 itojun "the prefix %s/%d on-link on %s (errno=%d)\n",
1012 1.130 ryo ip6_sprintf(ip6buf, &prc->ndprc_prefix.sin6_addr),
1013 1.107 ozaki prc->ndprc_plen, if_name(prc->ndprc_ifp), e);
1014 1.32 itojun /* proceed anyway. XXX: is it correct? */
1015 1.32 itojun }
1016 1.32 itojun }
1017 1.32 itojun
1018 1.2 itojun if (dr)
1019 1.94 matt pfxrtr_add(newpr, dr);
1020 1.2 itojun
1021 1.83 christos ext->nprefixes++;
1022 1.83 christos
1023 1.2 itojun return 0;
1024 1.2 itojun }
1025 1.2 itojun
1026 1.2 itojun void
1027 1.128 ozaki nd6_prefix_unref(struct nd_prefix *pr)
1028 1.128 ozaki {
1029 1.128 ozaki
1030 1.128 ozaki ND6_WLOCK();
1031 1.128 ozaki pr->ndpr_refcnt--;
1032 1.128 ozaki if (pr->ndpr_refcnt == 0)
1033 1.128 ozaki nd6_prelist_remove(pr);
1034 1.128 ozaki ND6_UNLOCK();
1035 1.128 ozaki }
1036 1.128 ozaki
1037 1.128 ozaki void
1038 1.123 ozaki nd6_prelist_remove(struct nd_prefix *pr)
1039 1.2 itojun {
1040 1.2 itojun struct nd_pfxrouter *pfr, *next;
1041 1.32 itojun int e, s;
1042 1.83 christos struct in6_ifextra *ext = pr->ndpr_ifp->if_afdata[AF_INET6];
1043 1.32 itojun
1044 1.128 ozaki ND6_ASSERT_WLOCK();
1045 1.128 ozaki KASSERT(pr->ndpr_refcnt == 0);
1046 1.128 ozaki
1047 1.32 itojun /* make sure to invalidate the prefix until it is really freed. */
1048 1.32 itojun pr->ndpr_vltime = 0;
1049 1.32 itojun pr->ndpr_pltime = 0;
1050 1.32 itojun #if 0
1051 1.32 itojun /*
1052 1.32 itojun * Though these flags are now meaningless, we'd rather keep the value
1053 1.32 itojun * not to confuse users when executing "ndp -p".
1054 1.32 itojun */
1055 1.32 itojun pr->ndpr_raf_onlink = 0;
1056 1.32 itojun pr->ndpr_raf_auto = 0;
1057 1.32 itojun #endif
1058 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_ONLINK) != 0 &&
1059 1.32 itojun (e = nd6_prefix_offlink(pr)) != 0) {
1060 1.130 ryo char ip6buf[INET6_ADDRSTRLEN];
1061 1.107 ozaki nd6log(LOG_ERR,
1062 1.107 ozaki "failed to make %s/%d offlink on %s, errno=%d\n",
1063 1.130 ryo ip6_sprintf(ip6buf, &pr->ndpr_prefix.sin6_addr),
1064 1.107 ozaki pr->ndpr_plen, if_name(pr->ndpr_ifp), e);
1065 1.32 itojun /* what should we do? */
1066 1.32 itojun }
1067 1.32 itojun
1068 1.4 itojun s = splsoftnet();
1069 1.2 itojun /* unlink ndpr_entry from nd_prefix list */
1070 1.125 ozaki ND_PREFIX_LIST_REMOVE(pr);
1071 1.2 itojun
1072 1.2 itojun /* free list of routers that adversed the prefix */
1073 1.62 dyoung for (pfr = LIST_FIRST(&pr->ndpr_advrtrs); pfr != NULL; pfr = next) {
1074 1.62 dyoung next = LIST_NEXT(pfr, pfr_entry);
1075 1.2 itojun
1076 1.2 itojun free(pfr, M_IP6NDP);
1077 1.2 itojun }
1078 1.83 christos
1079 1.86 christos if (ext) {
1080 1.86 christos ext->nprefixes--;
1081 1.86 christos if (ext->nprefixes < 0) {
1082 1.123 ozaki log(LOG_WARNING, "nd6_prelist_remove: negative count on "
1083 1.86 christos "%s\n", pr->ndpr_ifp->if_xname);
1084 1.86 christos }
1085 1.83 christos }
1086 1.21 itojun splx(s);
1087 1.21 itojun
1088 1.2 itojun free(pr, M_IP6NDP);
1089 1.2 itojun
1090 1.123 ozaki nd6_pfxlist_onlink_check();
1091 1.2 itojun }
1092 1.2 itojun
1093 1.56 rpaulo static int
1094 1.94 matt prelist_update(struct nd_prefixctl *newprc,
1095 1.64 christos struct nd_defrouter *dr, /* may be NULL */
1096 1.64 christos struct mbuf *m,
1097 1.64 christos int mcast)
1098 1.2 itojun {
1099 1.114 ozaki struct in6_ifaddr *ia6_match = NULL;
1100 1.32 itojun struct ifaddr *ifa;
1101 1.94 matt struct ifnet *ifp = newprc->ndprc_ifp;
1102 1.2 itojun struct nd_prefix *pr;
1103 1.2 itojun int error = 0;
1104 1.2 itojun int auth;
1105 1.32 itojun struct in6_addrlifetime lt6_tmp;
1106 1.118 ozaki int ss;
1107 1.130 ryo char ip6buf[INET6_ADDRSTRLEN];
1108 1.2 itojun
1109 1.128 ozaki ND6_ASSERT_WLOCK();
1110 1.128 ozaki
1111 1.7 itojun auth = 0;
1112 1.2 itojun if (m) {
1113 1.2 itojun /*
1114 1.2 itojun * Authenticity for NA consists authentication for
1115 1.2 itojun * both IP header and IP datagrams, doesn't it ?
1116 1.2 itojun */
1117 1.7 itojun #if defined(M_AUTHIPHDR) && defined(M_AUTHIPDGM)
1118 1.2 itojun auth = (m->m_flags & M_AUTHIPHDR
1119 1.2 itojun && m->m_flags & M_AUTHIPDGM) ? 1 : 0;
1120 1.7 itojun #endif
1121 1.7 itojun }
1122 1.2 itojun
1123 1.94 matt if ((pr = nd6_prefix_lookup(newprc)) != NULL) {
1124 1.32 itojun /*
1125 1.94 matt * nd6_prefix_lookup() ensures that pr and newprc have the same
1126 1.32 itojun * prefix on a same interface.
1127 1.32 itojun */
1128 1.32 itojun
1129 1.32 itojun /*
1130 1.32 itojun * Update prefix information. Note that the on-link (L) bit
1131 1.32 itojun * and the autonomous (A) bit should NOT be changed from 1
1132 1.32 itojun * to 0.
1133 1.32 itojun */
1134 1.94 matt if (newprc->ndprc_raf_onlink == 1)
1135 1.32 itojun pr->ndpr_raf_onlink = 1;
1136 1.94 matt if (newprc->ndprc_raf_auto == 1)
1137 1.32 itojun pr->ndpr_raf_auto = 1;
1138 1.94 matt if (newprc->ndprc_raf_onlink) {
1139 1.94 matt pr->ndpr_vltime = newprc->ndprc_vltime;
1140 1.94 matt pr->ndpr_pltime = newprc->ndprc_pltime;
1141 1.56 rpaulo (void)in6_init_prefix_ltimes(pr); /* XXX error case? */
1142 1.102 ozaki pr->ndpr_lastupdate = time_uptime;
1143 1.32 itojun }
1144 1.32 itojun
1145 1.94 matt if (newprc->ndprc_raf_onlink &&
1146 1.32 itojun (pr->ndpr_stateflags & NDPRF_ONLINK) == 0) {
1147 1.32 itojun int e;
1148 1.32 itojun
1149 1.32 itojun if ((e = nd6_prefix_onlink(pr)) != 0) {
1150 1.107 ozaki nd6log(LOG_ERR,
1151 1.107 ozaki "failed to make "
1152 1.32 itojun "the prefix %s/%d on-link on %s "
1153 1.107 ozaki "(errno=%d)\n",
1154 1.130 ryo ip6_sprintf(ip6buf,
1155 1.130 ryo &pr->ndpr_prefix.sin6_addr),
1156 1.107 ozaki pr->ndpr_plen, if_name(pr->ndpr_ifp), e);
1157 1.32 itojun /* proceed anyway. XXX: is it correct? */
1158 1.32 itojun }
1159 1.32 itojun }
1160 1.32 itojun
1161 1.32 itojun if (dr && pfxrtr_lookup(pr, dr) == NULL)
1162 1.32 itojun pfxrtr_add(pr, dr);
1163 1.32 itojun } else {
1164 1.32 itojun struct nd_prefix *newpr = NULL;
1165 1.32 itojun
1166 1.94 matt if (newprc->ndprc_vltime == 0)
1167 1.2 itojun goto end;
1168 1.94 matt if (newprc->ndprc_raf_onlink == 0 && newprc->ndprc_raf_auto == 0)
1169 1.32 itojun goto end;
1170 1.32 itojun
1171 1.81 spz if (ip6_rtadv_maxroutes <= nd6_numroutes) {
1172 1.81 spz ICMP6_STATINC(ICMP6_STAT_DROPPED_RAROUTE);
1173 1.81 spz goto end;
1174 1.81 spz }
1175 1.81 spz
1176 1.94 matt error = nd6_prelist_add(newprc, dr, &newpr);
1177 1.32 itojun if (error != 0 || newpr == NULL) {
1178 1.107 ozaki nd6log(LOG_NOTICE,
1179 1.107 ozaki "nd6_prelist_add failed for %s/%d on %s "
1180 1.107 ozaki "errno=%d, returnpr=%p\n",
1181 1.130 ryo ip6_sprintf(ip6buf, &newprc->ndprc_prefix.sin6_addr),
1182 1.94 matt newprc->ndprc_plen, if_name(newprc->ndprc_ifp),
1183 1.107 ozaki error, newpr);
1184 1.32 itojun goto end; /* we should just give up in this case. */
1185 1.2 itojun }
1186 1.2 itojun
1187 1.2 itojun /*
1188 1.32 itojun * XXX: from the ND point of view, we can ignore a prefix
1189 1.32 itojun * with the on-link bit being zero. However, we need a
1190 1.32 itojun * prefix structure for references from autoconfigured
1191 1.32 itojun * addresses. Thus, we explicitly make sure that the prefix
1192 1.32 itojun * itself expires now.
1193 1.2 itojun */
1194 1.32 itojun if (newpr->ndpr_raf_onlink == 0) {
1195 1.32 itojun newpr->ndpr_vltime = 0;
1196 1.32 itojun newpr->ndpr_pltime = 0;
1197 1.32 itojun in6_init_prefix_ltimes(newpr);
1198 1.32 itojun }
1199 1.2 itojun
1200 1.32 itojun pr = newpr;
1201 1.32 itojun }
1202 1.32 itojun
1203 1.32 itojun /*
1204 1.32 itojun * Address autoconfiguration based on Section 5.5.3 of RFC 2462.
1205 1.32 itojun * Note that pr must be non NULL at this point.
1206 1.32 itojun */
1207 1.32 itojun
1208 1.32 itojun /* 5.5.3 (a). Ignore the prefix without the A bit set. */
1209 1.94 matt if (!newprc->ndprc_raf_auto)
1210 1.32 itojun goto end;
1211 1.2 itojun
1212 1.32 itojun /*
1213 1.32 itojun * 5.5.3 (b). the link-local prefix should have been ignored in
1214 1.32 itojun * nd6_ra_input.
1215 1.32 itojun */
1216 1.2 itojun
1217 1.56 rpaulo /* 5.5.3 (c). Consistency check on lifetimes: pltime <= vltime. */
1218 1.94 matt if (newprc->ndprc_pltime > newprc->ndprc_vltime) {
1219 1.56 rpaulo error = EINVAL; /* XXX: won't be used */
1220 1.56 rpaulo goto end;
1221 1.56 rpaulo }
1222 1.2 itojun
1223 1.32 itojun /*
1224 1.56 rpaulo * 5.5.3 (d). If the prefix advertised is not equal to the prefix of
1225 1.56 rpaulo * an address configured by stateless autoconfiguration already in the
1226 1.56 rpaulo * list of addresses associated with the interface, and the Valid
1227 1.56 rpaulo * Lifetime is not 0, form an address. We first check if we have
1228 1.56 rpaulo * a matching prefix.
1229 1.56 rpaulo * Note: we apply a clarification in rfc2462bis-02 here. We only
1230 1.56 rpaulo * consider autoconfigured addresses while RFC2462 simply said
1231 1.56 rpaulo * "address".
1232 1.32 itojun */
1233 1.118 ozaki ss = pserialize_read_enter();
1234 1.115 ozaki IFADDR_READER_FOREACH(ifa, ifp) {
1235 1.114 ozaki struct in6_ifaddr *ia6;
1236 1.56 rpaulo u_int32_t remaininglifetime;
1237 1.2 itojun
1238 1.32 itojun if (ifa->ifa_addr->sa_family != AF_INET6)
1239 1.32 itojun continue;
1240 1.2 itojun
1241 1.114 ozaki ia6 = (struct in6_ifaddr *)ifa;
1242 1.2 itojun
1243 1.32 itojun /*
1244 1.56 rpaulo * We only consider autoconfigured addresses as per rfc2462bis.
1245 1.56 rpaulo */
1246 1.114 ozaki if (!(ia6->ia6_flags & IN6_IFF_AUTOCONF))
1247 1.56 rpaulo continue;
1248 1.56 rpaulo
1249 1.56 rpaulo /*
1250 1.32 itojun * Spec is not clear here, but I believe we should concentrate
1251 1.32 itojun * on unicast (i.e. not anycast) addresses.
1252 1.32 itojun * XXX: other ia6_flags? detached or duplicated?
1253 1.32 itojun */
1254 1.114 ozaki if ((ia6->ia6_flags & IN6_IFF_ANYCAST) != 0)
1255 1.32 itojun continue;
1256 1.33 itojun
1257 1.56 rpaulo /*
1258 1.56 rpaulo * Ignore the address if it is not associated with a prefix
1259 1.56 rpaulo * or is associated with a prefix that is different from this
1260 1.56 rpaulo * one. (pr is never NULL here)
1261 1.56 rpaulo */
1262 1.114 ozaki if (ia6->ia6_ndpr != pr)
1263 1.32 itojun continue;
1264 1.7 itojun
1265 1.32 itojun if (ia6_match == NULL) /* remember the first one */
1266 1.114 ozaki ia6_match = ia6;
1267 1.2 itojun
1268 1.32 itojun /*
1269 1.32 itojun * An already autoconfigured address matched. Now that we
1270 1.32 itojun * are sure there is at least one matched address, we can
1271 1.32 itojun * proceed to 5.5.3. (e): update the lifetimes according to the
1272 1.32 itojun * "two hours" rule and the privacy extension.
1273 1.56 rpaulo * We apply some clarifications in rfc2462bis:
1274 1.56 rpaulo * - use remaininglifetime instead of storedlifetime as a
1275 1.56 rpaulo * variable name
1276 1.56 rpaulo * - remove the dead code in the "two-hour" rule
1277 1.32 itojun */
1278 1.32 itojun #define TWOHOUR (120*60)
1279 1.114 ozaki lt6_tmp = ia6->ia6_lifetime;
1280 1.32 itojun if (lt6_tmp.ia6t_vltime == ND6_INFINITE_LIFETIME)
1281 1.56 rpaulo remaininglifetime = ND6_INFINITE_LIFETIME;
1282 1.114 ozaki else if (time_uptime - ia6->ia6_updatetime >
1283 1.32 itojun lt6_tmp.ia6t_vltime) {
1284 1.32 itojun /*
1285 1.32 itojun * The case of "invalid" address. We should usually
1286 1.32 itojun * not see this case.
1287 1.32 itojun */
1288 1.56 rpaulo remaininglifetime = 0;
1289 1.32 itojun } else
1290 1.56 rpaulo remaininglifetime = lt6_tmp.ia6t_vltime -
1291 1.114 ozaki (time_uptime - ia6->ia6_updatetime);
1292 1.56 rpaulo
1293 1.56 rpaulo /* when not updating, keep the current stored lifetime. */
1294 1.56 rpaulo lt6_tmp.ia6t_vltime = remaininglifetime;
1295 1.56 rpaulo
1296 1.94 matt if (TWOHOUR < newprc->ndprc_vltime ||
1297 1.94 matt remaininglifetime < newprc->ndprc_vltime) {
1298 1.94 matt lt6_tmp.ia6t_vltime = newprc->ndprc_vltime;
1299 1.56 rpaulo } else if (remaininglifetime <= TWOHOUR) {
1300 1.56 rpaulo if (auth)
1301 1.94 matt lt6_tmp.ia6t_vltime = newprc->ndprc_vltime;
1302 1.32 itojun } else {
1303 1.32 itojun /*
1304 1.94 matt * newprc->ndprc_vltime <= TWOHOUR &&
1305 1.56 rpaulo * TWOHOUR < remaininglifetime
1306 1.32 itojun */
1307 1.32 itojun lt6_tmp.ia6t_vltime = TWOHOUR;
1308 1.2 itojun }
1309 1.2 itojun
1310 1.32 itojun /* The 2 hour rule is not imposed for preferred lifetime. */
1311 1.94 matt lt6_tmp.ia6t_pltime = newprc->ndprc_pltime;
1312 1.2 itojun
1313 1.32 itojun in6_init_address_ltimes(pr, <6_tmp);
1314 1.2 itojun
1315 1.56 rpaulo /*
1316 1.56 rpaulo * We need to treat lifetimes for temporary addresses
1317 1.56 rpaulo * differently, according to
1318 1.56 rpaulo * draft-ietf-ipv6-privacy-addrs-v2-01.txt 3.3 (1);
1319 1.56 rpaulo * we only update the lifetimes when they are in the maximum
1320 1.56 rpaulo * intervals.
1321 1.56 rpaulo */
1322 1.114 ozaki if ((ia6->ia6_flags & IN6_IFF_TEMPORARY) != 0) {
1323 1.56 rpaulo u_int32_t maxvltime, maxpltime;
1324 1.56 rpaulo
1325 1.56 rpaulo if (ip6_temp_valid_lifetime >
1326 1.114 ozaki (u_int32_t)((time_uptime - ia6->ia6_createtime) +
1327 1.56 rpaulo ip6_desync_factor)) {
1328 1.56 rpaulo maxvltime = ip6_temp_valid_lifetime -
1329 1.114 ozaki (time_uptime - ia6->ia6_createtime) -
1330 1.56 rpaulo ip6_desync_factor;
1331 1.56 rpaulo } else
1332 1.56 rpaulo maxvltime = 0;
1333 1.56 rpaulo if (ip6_temp_preferred_lifetime >
1334 1.114 ozaki (u_int32_t)((time_uptime - ia6->ia6_createtime) +
1335 1.56 rpaulo ip6_desync_factor)) {
1336 1.56 rpaulo maxpltime = ip6_temp_preferred_lifetime -
1337 1.114 ozaki (time_uptime - ia6->ia6_createtime) -
1338 1.56 rpaulo ip6_desync_factor;
1339 1.56 rpaulo } else
1340 1.56 rpaulo maxpltime = 0;
1341 1.56 rpaulo
1342 1.56 rpaulo if (lt6_tmp.ia6t_vltime == ND6_INFINITE_LIFETIME ||
1343 1.56 rpaulo lt6_tmp.ia6t_vltime > maxvltime) {
1344 1.56 rpaulo lt6_tmp.ia6t_vltime = maxvltime;
1345 1.56 rpaulo }
1346 1.56 rpaulo if (lt6_tmp.ia6t_pltime == ND6_INFINITE_LIFETIME ||
1347 1.56 rpaulo lt6_tmp.ia6t_pltime > maxpltime) {
1348 1.56 rpaulo lt6_tmp.ia6t_pltime = maxpltime;
1349 1.56 rpaulo }
1350 1.56 rpaulo }
1351 1.56 rpaulo
1352 1.114 ozaki ia6->ia6_lifetime = lt6_tmp;
1353 1.114 ozaki ia6->ia6_updatetime = time_uptime;
1354 1.32 itojun }
1355 1.118 ozaki pserialize_read_exit(ss);
1356 1.118 ozaki
1357 1.94 matt if (ia6_match == NULL && newprc->ndprc_vltime) {
1358 1.56 rpaulo int ifidlen;
1359 1.114 ozaki struct in6_ifaddr *ia6;
1360 1.118 ozaki struct psref psref;
1361 1.56 rpaulo
1362 1.2 itojun /*
1363 1.56 rpaulo * 5.5.3 (d) (continued)
1364 1.32 itojun * No address matched and the valid lifetime is non-zero.
1365 1.32 itojun * Create a new address.
1366 1.2 itojun */
1367 1.56 rpaulo
1368 1.56 rpaulo /*
1369 1.56 rpaulo * Prefix Length check:
1370 1.56 rpaulo * If the sum of the prefix length and interface identifier
1371 1.56 rpaulo * length does not equal 128 bits, the Prefix Information
1372 1.56 rpaulo * option MUST be ignored. The length of the interface
1373 1.56 rpaulo * identifier is defined in a separate link-type specific
1374 1.56 rpaulo * document.
1375 1.56 rpaulo */
1376 1.56 rpaulo ifidlen = in6_if2idlen(ifp);
1377 1.56 rpaulo if (ifidlen < 0) {
1378 1.56 rpaulo /* this should not happen, so we always log it. */
1379 1.106 ozaki log(LOG_ERR, "%s: IFID undefined (%s)\n",
1380 1.106 ozaki __func__, if_name(ifp));
1381 1.56 rpaulo goto end;
1382 1.56 rpaulo }
1383 1.56 rpaulo if (ifidlen + pr->ndpr_plen != 128) {
1384 1.107 ozaki nd6log(LOG_INFO,
1385 1.107 ozaki "invalid prefixlen %d for %s, ignored\n",
1386 1.107 ozaki pr->ndpr_plen, if_name(ifp));
1387 1.56 rpaulo goto end;
1388 1.56 rpaulo }
1389 1.56 rpaulo
1390 1.118 ozaki if ((ia6 = in6_ifadd(newprc, mcast, &psref)) != NULL) {
1391 1.32 itojun /*
1392 1.94 matt * note that we should use pr (not newprc) for reference.
1393 1.32 itojun */
1394 1.32 itojun pr->ndpr_refcnt++;
1395 1.32 itojun ia6->ia6_ndpr = pr;
1396 1.2 itojun
1397 1.119 roy /* toggle onlink state if the address was assigned
1398 1.119 roy * a prefix route. */
1399 1.119 roy if (ia6->ia_flags & IFA_ROUTE)
1400 1.119 roy pr->ndpr_stateflags |= NDPRF_ONLINK;
1401 1.119 roy
1402 1.32 itojun /*
1403 1.56 rpaulo * draft-ietf-ipngwg-temp-addresses-v2-00 3.3 (2).
1404 1.56 rpaulo * When a new public address is created as described
1405 1.56 rpaulo * in RFC2462, also create a new temporary address.
1406 1.56 rpaulo *
1407 1.56 rpaulo * draft-ietf-ipngwg-temp-addresses-v2-00 3.5.
1408 1.56 rpaulo * When an interface connects to a new link, a new
1409 1.56 rpaulo * randomized interface identifier should be generated
1410 1.56 rpaulo * immediately together with a new set of temporary
1411 1.56 rpaulo * addresses. Thus, we specifiy 1 as the 2nd arg of
1412 1.56 rpaulo * in6_tmpifadd().
1413 1.56 rpaulo */
1414 1.56 rpaulo if (ip6_use_tempaddr) {
1415 1.56 rpaulo int e;
1416 1.56 rpaulo if ((e = in6_tmpifadd(ia6, 1, 1)) != 0) {
1417 1.107 ozaki nd6log(LOG_NOTICE,
1418 1.107 ozaki "failed to create a temporary "
1419 1.107 ozaki "address, errno=%d\n", e);
1420 1.56 rpaulo }
1421 1.56 rpaulo }
1422 1.118 ozaki ia6_release(ia6, &psref);
1423 1.56 rpaulo
1424 1.56 rpaulo /*
1425 1.32 itojun * A newly added address might affect the status
1426 1.32 itojun * of other addresses, so we check and update it.
1427 1.32 itojun * XXX: what if address duplication happens?
1428 1.32 itojun */
1429 1.123 ozaki nd6_pfxlist_onlink_check();
1430 1.32 itojun } else {
1431 1.32 itojun /* just set an error. do not bark here. */
1432 1.32 itojun error = EADDRNOTAVAIL; /* XXX: might be unused. */
1433 1.32 itojun }
1434 1.2 itojun }
1435 1.2 itojun
1436 1.2 itojun end:
1437 1.2 itojun return error;
1438 1.2 itojun }
1439 1.2 itojun
1440 1.2 itojun /*
1441 1.7 itojun * A supplement function used in the on-link detection below;
1442 1.7 itojun * detect if a given prefix has a (probably) reachable advertising router.
1443 1.7 itojun * XXX: lengthy function name...
1444 1.7 itojun */
1445 1.7 itojun static struct nd_pfxrouter *
1446 1.64 christos find_pfxlist_reachable_router(struct nd_prefix *pr)
1447 1.7 itojun {
1448 1.7 itojun struct nd_pfxrouter *pfxrtr;
1449 1.7 itojun
1450 1.7 itojun for (pfxrtr = LIST_FIRST(&pr->ndpr_advrtrs); pfxrtr;
1451 1.7 itojun pfxrtr = LIST_NEXT(pfxrtr, pfr_entry)) {
1452 1.89 roy if (pfxrtr->router->ifp->if_flags & IFF_UP &&
1453 1.89 roy pfxrtr->router->ifp->if_link_state != LINK_STATE_DOWN &&
1454 1.101 ozaki nd6_is_llinfo_probreach(pfxrtr->router))
1455 1.7 itojun break; /* found */
1456 1.7 itojun }
1457 1.7 itojun
1458 1.36 itojun return (pfxrtr);
1459 1.7 itojun }
1460 1.7 itojun
1461 1.7 itojun /*
1462 1.2 itojun * Check if each prefix in the prefix list has at least one available router
1463 1.25 itojun * that advertised the prefix (a router is "available" if its neighbor cache
1464 1.25 itojun * entry is reachable or probably reachable).
1465 1.7 itojun * If the check fails, the prefix may be off-link, because, for example,
1466 1.2 itojun * we have moved from the network but the lifetime of the prefix has not
1467 1.25 itojun * expired yet. So we should not use the prefix if there is another prefix
1468 1.25 itojun * that has an available router.
1469 1.25 itojun * But, if there is no prefix that has an available router, we still regards
1470 1.25 itojun * all the prefixes as on-link. This is because we can't tell if all the
1471 1.2 itojun * routers are simply dead or if we really moved from the network and there
1472 1.2 itojun * is no router around us.
1473 1.2 itojun */
1474 1.7 itojun void
1475 1.123 ozaki nd6_pfxlist_onlink_check(void)
1476 1.2 itojun {
1477 1.2 itojun struct nd_prefix *pr;
1478 1.114 ozaki struct in6_ifaddr *ia;
1479 1.56 rpaulo struct nd_defrouter *dr;
1480 1.56 rpaulo struct nd_pfxrouter *pfxrtr = NULL;
1481 1.118 ozaki int s;
1482 1.130 ryo char ip6buf[INET6_ADDRSTRLEN];
1483 1.2 itojun
1484 1.128 ozaki ND6_ASSERT_WLOCK();
1485 1.128 ozaki
1486 1.7 itojun /*
1487 1.7 itojun * Check if there is a prefix that has a reachable advertising
1488 1.7 itojun * router.
1489 1.7 itojun */
1490 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
1491 1.32 itojun if (pr->ndpr_raf_onlink && find_pfxlist_reachable_router(pr))
1492 1.2 itojun break;
1493 1.7 itojun }
1494 1.56 rpaulo /*
1495 1.56 rpaulo * If we have no such prefix, check whether we still have a router
1496 1.56 rpaulo * that does not advertise any prefixes.
1497 1.56 rpaulo */
1498 1.56 rpaulo if (pr == NULL) {
1499 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr) {
1500 1.56 rpaulo struct nd_prefix *pr0;
1501 1.56 rpaulo
1502 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr0) {
1503 1.56 rpaulo if ((pfxrtr = pfxrtr_lookup(pr0, dr)) != NULL)
1504 1.56 rpaulo break;
1505 1.56 rpaulo }
1506 1.56 rpaulo if (pfxrtr)
1507 1.56 rpaulo break;
1508 1.56 rpaulo }
1509 1.56 rpaulo }
1510 1.124 ozaki if (pr != NULL || (!ND_DEFROUTER_LIST_EMPTY() && !pfxrtr)) {
1511 1.2 itojun /*
1512 1.32 itojun * There is at least one prefix that has a reachable router,
1513 1.32 itojun * or at least a router which probably does not advertise
1514 1.32 itojun * any prefixes. The latter would be the case when we move
1515 1.32 itojun * to a new link where we have a router that does not provide
1516 1.32 itojun * prefixes and we configure an address by hand.
1517 1.32 itojun * Detach prefixes which have no reachable advertising
1518 1.32 itojun * router, and attach other prefixes.
1519 1.2 itojun */
1520 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
1521 1.32 itojun /* XXX: a link-local prefix should never be detached */
1522 1.32 itojun if (IN6_IS_ADDR_LINKLOCAL(&pr->ndpr_prefix.sin6_addr))
1523 1.32 itojun continue;
1524 1.32 itojun
1525 1.32 itojun /*
1526 1.32 itojun * we aren't interested in prefixes without the L bit
1527 1.32 itojun * set.
1528 1.32 itojun */
1529 1.32 itojun if (pr->ndpr_raf_onlink == 0)
1530 1.32 itojun continue;
1531 1.32 itojun
1532 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) == 0 &&
1533 1.32 itojun find_pfxlist_reachable_router(pr) == NULL)
1534 1.32 itojun pr->ndpr_stateflags |= NDPRF_DETACHED;
1535 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) != 0 &&
1536 1.32 itojun find_pfxlist_reachable_router(pr) != 0)
1537 1.32 itojun pr->ndpr_stateflags &= ~NDPRF_DETACHED;
1538 1.32 itojun }
1539 1.32 itojun } else {
1540 1.32 itojun /* there is no prefix that has a reachable router */
1541 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
1542 1.32 itojun if (IN6_IS_ADDR_LINKLOCAL(&pr->ndpr_prefix.sin6_addr))
1543 1.32 itojun continue;
1544 1.32 itojun
1545 1.32 itojun if (pr->ndpr_raf_onlink == 0)
1546 1.32 itojun continue;
1547 1.32 itojun
1548 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) != 0)
1549 1.32 itojun pr->ndpr_stateflags &= ~NDPRF_DETACHED;
1550 1.32 itojun }
1551 1.32 itojun }
1552 1.32 itojun
1553 1.32 itojun /*
1554 1.32 itojun * Remove each interface route associated with a (just) detached
1555 1.32 itojun * prefix, and reinstall the interface route for a (just) attached
1556 1.32 itojun * prefix. Note that all attempt of reinstallation does not
1557 1.32 itojun * necessarily success, when a same prefix is shared among multiple
1558 1.32 itojun * interfaces. Such cases will be handled in nd6_prefix_onlink,
1559 1.32 itojun * so we don't have to care about them.
1560 1.32 itojun */
1561 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
1562 1.32 itojun int e;
1563 1.32 itojun
1564 1.32 itojun if (IN6_IS_ADDR_LINKLOCAL(&pr->ndpr_prefix.sin6_addr))
1565 1.32 itojun continue;
1566 1.32 itojun
1567 1.32 itojun if (pr->ndpr_raf_onlink == 0)
1568 1.32 itojun continue;
1569 1.32 itojun
1570 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) != 0 &&
1571 1.32 itojun (pr->ndpr_stateflags & NDPRF_ONLINK) != 0) {
1572 1.32 itojun if ((e = nd6_prefix_offlink(pr)) != 0) {
1573 1.107 ozaki nd6log(LOG_ERR,
1574 1.107 ozaki "failed to make %s/%d offlink, errno=%d\n",
1575 1.130 ryo ip6_sprintf(ip6buf,
1576 1.130 ryo &pr->ndpr_prefix.sin6_addr),
1577 1.107 ozaki pr->ndpr_plen, e);
1578 1.2 itojun }
1579 1.2 itojun }
1580 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) == 0 &&
1581 1.32 itojun (pr->ndpr_stateflags & NDPRF_ONLINK) == 0 &&
1582 1.32 itojun pr->ndpr_raf_onlink) {
1583 1.32 itojun if ((e = nd6_prefix_onlink(pr)) != 0) {
1584 1.107 ozaki nd6log(LOG_ERR,
1585 1.107 ozaki "failed to make %s/%d onlink, errno=%d\n",
1586 1.130 ryo ip6_sprintf(ip6buf,
1587 1.130 ryo &pr->ndpr_prefix.sin6_addr),
1588 1.107 ozaki pr->ndpr_plen, e);
1589 1.32 itojun }
1590 1.32 itojun }
1591 1.32 itojun }
1592 1.32 itojun
1593 1.32 itojun /*
1594 1.32 itojun * Changes on the prefix status might affect address status as well.
1595 1.32 itojun * Make sure that all addresses derived from an attached prefix are
1596 1.32 itojun * attached, and that all addresses derived from a detached prefix are
1597 1.32 itojun * detached. Note, however, that a manually configured address should
1598 1.32 itojun * always be attached.
1599 1.32 itojun * The precise detection logic is same as the one for prefixes.
1600 1.32 itojun */
1601 1.118 ozaki s = pserialize_read_enter();
1602 1.114 ozaki IN6_ADDRLIST_READER_FOREACH(ia) {
1603 1.114 ozaki if (!(ia->ia6_flags & IN6_IFF_AUTOCONF))
1604 1.32 itojun continue;
1605 1.32 itojun
1606 1.114 ozaki if (ia->ia6_ndpr == NULL) {
1607 1.32 itojun /*
1608 1.32 itojun * This can happen when we first configure the address
1609 1.32 itojun * (i.e. the address exists, but the prefix does not).
1610 1.32 itojun * XXX: complicated relationships...
1611 1.32 itojun */
1612 1.32 itojun continue;
1613 1.32 itojun }
1614 1.32 itojun
1615 1.114 ozaki if (find_pfxlist_reachable_router(ia->ia6_ndpr))
1616 1.32 itojun break;
1617 1.32 itojun }
1618 1.118 ozaki pserialize_read_exit(s);
1619 1.114 ozaki
1620 1.114 ozaki if (ia) {
1621 1.118 ozaki int bound = curlwp_bind();
1622 1.118 ozaki
1623 1.118 ozaki s = pserialize_read_enter();
1624 1.114 ozaki IN6_ADDRLIST_READER_FOREACH(ia) {
1625 1.118 ozaki struct ifaddr *ifa = (struct ifaddr *)ia;
1626 1.118 ozaki struct psref psref;
1627 1.118 ozaki
1628 1.114 ozaki if ((ia->ia6_flags & IN6_IFF_AUTOCONF) == 0)
1629 1.32 itojun continue;
1630 1.32 itojun
1631 1.114 ozaki if (ia->ia6_ndpr == NULL) /* XXX: see above. */
1632 1.32 itojun continue;
1633 1.32 itojun
1634 1.118 ozaki ia6_acquire(ia, &psref);
1635 1.118 ozaki pserialize_read_exit(s);
1636 1.118 ozaki
1637 1.114 ozaki if (find_pfxlist_reachable_router(ia->ia6_ndpr)) {
1638 1.114 ozaki if (ia->ia6_flags & IN6_IFF_DETACHED) {
1639 1.114 ozaki ia->ia6_flags &= ~IN6_IFF_DETACHED;
1640 1.114 ozaki ia->ia6_flags |= IN6_IFF_TENTATIVE;
1641 1.118 ozaki nd6_dad_start(ifa,
1642 1.56 rpaulo 0);
1643 1.87 roy /* We will notify the routing socket
1644 1.87 roy * of the DAD result, so no need to
1645 1.87 roy * here */
1646 1.56 rpaulo }
1647 1.56 rpaulo } else {
1648 1.114 ozaki if ((ia->ia6_flags & IN6_IFF_DETACHED) == 0) {
1649 1.114 ozaki ia->ia6_flags |= IN6_IFF_DETACHED;
1650 1.97 roy rt_newaddrmsg(RTM_NEWADDR,
1651 1.118 ozaki ifa, 0, NULL);
1652 1.56 rpaulo }
1653 1.56 rpaulo }
1654 1.118 ozaki
1655 1.118 ozaki s = pserialize_read_enter();
1656 1.118 ozaki ia6_release(ia, &psref);
1657 1.2 itojun }
1658 1.118 ozaki pserialize_read_exit(s);
1659 1.118 ozaki curlwp_bindx(bound);
1660 1.2 itojun }
1661 1.2 itojun else {
1662 1.118 ozaki int bound = curlwp_bind();
1663 1.118 ozaki
1664 1.118 ozaki s = pserialize_read_enter();
1665 1.114 ozaki IN6_ADDRLIST_READER_FOREACH(ia) {
1666 1.114 ozaki if ((ia->ia6_flags & IN6_IFF_AUTOCONF) == 0)
1667 1.32 itojun continue;
1668 1.32 itojun
1669 1.114 ozaki if (ia->ia6_flags & IN6_IFF_DETACHED) {
1670 1.118 ozaki struct ifaddr *ifa = (struct ifaddr *)ia;
1671 1.118 ozaki struct psref psref;
1672 1.118 ozaki
1673 1.114 ozaki ia->ia6_flags &= ~IN6_IFF_DETACHED;
1674 1.114 ozaki ia->ia6_flags |= IN6_IFF_TENTATIVE;
1675 1.118 ozaki
1676 1.118 ozaki ia6_acquire(ia, &psref);
1677 1.118 ozaki pserialize_read_exit(s);
1678 1.118 ozaki
1679 1.56 rpaulo /* Do we need a delay in this case? */
1680 1.118 ozaki nd6_dad_start(ifa, 0);
1681 1.118 ozaki
1682 1.118 ozaki s = pserialize_read_enter();
1683 1.118 ozaki ia6_release(ia, &psref);
1684 1.56 rpaulo }
1685 1.32 itojun }
1686 1.118 ozaki pserialize_read_exit(s);
1687 1.118 ozaki curlwp_bindx(bound);
1688 1.2 itojun }
1689 1.2 itojun }
1690 1.2 itojun
1691 1.121 ozaki static int
1692 1.64 christos nd6_prefix_onlink(struct nd_prefix *pr)
1693 1.2 itojun {
1694 1.32 itojun struct ifaddr *ifa;
1695 1.32 itojun struct ifnet *ifp = pr->ndpr_ifp;
1696 1.32 itojun struct sockaddr_in6 mask6;
1697 1.32 itojun struct nd_prefix *opr;
1698 1.32 itojun u_long rtflags;
1699 1.32 itojun int error = 0;
1700 1.118 ozaki struct psref psref;
1701 1.118 ozaki int bound;
1702 1.130 ryo char ip6buf[INET6_ADDRSTRLEN];
1703 1.130 ryo char ip6bufp[INET6_ADDRSTRLEN], ip6bufm[INET6_ADDRSTRLEN];
1704 1.32 itojun
1705 1.128 ozaki ND6_ASSERT_WLOCK();
1706 1.128 ozaki
1707 1.32 itojun /* sanity check */
1708 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_ONLINK) != 0) {
1709 1.107 ozaki nd6log(LOG_ERR, "%s/%d is already on-link\n",
1710 1.130 ryo ip6_sprintf(ip6buf, &pr->ndpr_prefix.sin6_addr),
1711 1.130 ryo pr->ndpr_plen);
1712 1.51 itojun return (EEXIST);
1713 1.32 itojun }
1714 1.32 itojun
1715 1.32 itojun /*
1716 1.32 itojun * Add the interface route associated with the prefix. Before
1717 1.32 itojun * installing the route, check if there's the same prefix on another
1718 1.32 itojun * interface, and the prefix has already installed the interface route.
1719 1.32 itojun * Although such a configuration is expected to be rare, we explicitly
1720 1.32 itojun * allow it.
1721 1.32 itojun */
1722 1.125 ozaki ND_PREFIX_LIST_FOREACH(opr) {
1723 1.32 itojun if (opr == pr)
1724 1.32 itojun continue;
1725 1.32 itojun
1726 1.32 itojun if ((opr->ndpr_stateflags & NDPRF_ONLINK) == 0)
1727 1.32 itojun continue;
1728 1.32 itojun
1729 1.32 itojun if (opr->ndpr_plen == pr->ndpr_plen &&
1730 1.32 itojun in6_are_prefix_equal(&pr->ndpr_prefix.sin6_addr,
1731 1.32 itojun &opr->ndpr_prefix.sin6_addr, pr->ndpr_plen))
1732 1.36 itojun return (0);
1733 1.32 itojun }
1734 1.32 itojun
1735 1.32 itojun /*
1736 1.32 itojun * We prefer link-local addresses as the associated interface address.
1737 1.32 itojun */
1738 1.32 itojun /* search for a link-local addr */
1739 1.118 ozaki bound = curlwp_bind();
1740 1.118 ozaki ifa = (struct ifaddr *)in6ifa_ifpforlinklocal_psref(ifp,
1741 1.118 ozaki IN6_IFF_NOTREADY | IN6_IFF_ANYCAST, &psref);
1742 1.32 itojun if (ifa == NULL) {
1743 1.118 ozaki int s = pserialize_read_enter();
1744 1.115 ozaki IFADDR_READER_FOREACH(ifa, ifp) {
1745 1.32 itojun if (ifa->ifa_addr->sa_family == AF_INET6)
1746 1.32 itojun break;
1747 1.32 itojun }
1748 1.118 ozaki if (ifa != NULL)
1749 1.118 ozaki ifa_acquire(ifa, &psref);
1750 1.118 ozaki pserialize_read_exit(s);
1751 1.32 itojun /* should we care about ia6_flags? */
1752 1.32 itojun }
1753 1.32 itojun if (ifa == NULL) {
1754 1.32 itojun /*
1755 1.32 itojun * This can still happen, when, for example, we receive an RA
1756 1.32 itojun * containing a prefix with the L bit set and the A bit clear,
1757 1.32 itojun * after removing all IPv6 addresses on the receiving
1758 1.32 itojun * interface. This should, of course, be rare though.
1759 1.32 itojun */
1760 1.107 ozaki nd6log(LOG_NOTICE, "failed to find any ifaddr"
1761 1.32 itojun " to add route for a prefix(%s/%d) on %s\n",
1762 1.130 ryo ip6_sprintf(ip6buf, &pr->ndpr_prefix.sin6_addr),
1763 1.107 ozaki pr->ndpr_plen, if_name(ifp));
1764 1.118 ozaki curlwp_bindx(bound);
1765 1.36 itojun return (0);
1766 1.32 itojun }
1767 1.2 itojun
1768 1.2 itojun /*
1769 1.32 itojun * in6_ifinit() sets nd6_rtrequest to ifa_rtrequest for all ifaddrs.
1770 1.32 itojun * ifa->ifa_rtrequest = nd6_rtrequest;
1771 1.2 itojun */
1772 1.78 cegger memset(&mask6, 0, sizeof(mask6));
1773 1.85 joerg mask6.sin6_family = AF_INET6;
1774 1.32 itojun mask6.sin6_len = sizeof(mask6);
1775 1.32 itojun mask6.sin6_addr = pr->ndpr_mask;
1776 1.32 itojun /* rtrequest() will probably set RTF_UP, but we're not sure. */
1777 1.32 itojun rtflags = ifa->ifa_flags | RTF_UP;
1778 1.32 itojun if (nd6_need_cache(ifp)) {
1779 1.32 itojun /* explicitly set in case ifa_flags does not set the flag. */
1780 1.108 ozaki rtflags |= RTF_CONNECTED;
1781 1.32 itojun } else {
1782 1.32 itojun /*
1783 1.32 itojun * explicitly clear the cloning bit in case ifa_flags sets it.
1784 1.32 itojun */
1785 1.108 ozaki rtflags &= ~RTF_CONNECTED;
1786 1.32 itojun }
1787 1.116 ozaki error = rtrequest_newmsg(RTM_ADD, sin6tosa(&pr->ndpr_prefix),
1788 1.116 ozaki ifa->ifa_addr, sin6tosa(&mask6), rtflags);
1789 1.32 itojun if (error == 0) {
1790 1.101 ozaki nd6_numroutes++;
1791 1.32 itojun pr->ndpr_stateflags |= NDPRF_ONLINK;
1792 1.32 itojun } else {
1793 1.107 ozaki nd6log(LOG_ERR, "failed to add route for a"
1794 1.32 itojun " prefix (%s/%d) on %s, gw=%s, mask=%s, flags=%lx "
1795 1.32 itojun "errno = %d\n",
1796 1.130 ryo ip6_sprintf(ip6bufp, &pr->ndpr_prefix.sin6_addr),
1797 1.32 itojun pr->ndpr_plen, if_name(ifp),
1798 1.130 ryo ip6_sprintf(ip6buf,
1799 1.130 ryo &((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_addr),
1800 1.130 ryo ip6_sprintf(ip6bufm, &mask6.sin6_addr), rtflags, error);
1801 1.32 itojun }
1802 1.118 ozaki ifa_release(ifa, &psref);
1803 1.118 ozaki curlwp_bindx(bound);
1804 1.32 itojun
1805 1.36 itojun return (error);
1806 1.32 itojun }
1807 1.32 itojun
1808 1.121 ozaki static int
1809 1.64 christos nd6_prefix_offlink(struct nd_prefix *pr)
1810 1.32 itojun {
1811 1.32 itojun int error = 0;
1812 1.32 itojun struct ifnet *ifp = pr->ndpr_ifp;
1813 1.32 itojun struct nd_prefix *opr;
1814 1.32 itojun struct sockaddr_in6 sa6, mask6;
1815 1.130 ryo char ip6buf[INET6_ADDRSTRLEN];
1816 1.32 itojun
1817 1.128 ozaki ND6_ASSERT_WLOCK();
1818 1.128 ozaki
1819 1.32 itojun /* sanity check */
1820 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_ONLINK) == 0) {
1821 1.107 ozaki nd6log(LOG_ERR, "%s/%d is already off-link\n",
1822 1.130 ryo ip6_sprintf(ip6buf, &pr->ndpr_prefix.sin6_addr),
1823 1.130 ryo pr->ndpr_plen);
1824 1.36 itojun return (EEXIST);
1825 1.32 itojun }
1826 1.32 itojun
1827 1.69 dyoung sockaddr_in6_init(&sa6, &pr->ndpr_prefix.sin6_addr, 0, 0, 0);
1828 1.69 dyoung sockaddr_in6_init(&mask6, &pr->ndpr_mask, 0, 0, 0);
1829 1.116 ozaki error = rtrequest_newmsg(RTM_DELETE, sin6tosa(&sa6), NULL,
1830 1.116 ozaki sin6tosa(&mask6), 0);
1831 1.32 itojun if (error == 0) {
1832 1.32 itojun pr->ndpr_stateflags &= ~NDPRF_ONLINK;
1833 1.101 ozaki nd6_numroutes--;
1834 1.2 itojun
1835 1.32 itojun /*
1836 1.32 itojun * There might be the same prefix on another interface,
1837 1.32 itojun * the prefix which could not be on-link just because we have
1838 1.32 itojun * the interface route (see comments in nd6_prefix_onlink).
1839 1.32 itojun * If there's one, try to make the prefix on-link on the
1840 1.32 itojun * interface.
1841 1.32 itojun */
1842 1.125 ozaki ND_PREFIX_LIST_FOREACH(opr) {
1843 1.32 itojun if (opr == pr)
1844 1.32 itojun continue;
1845 1.2 itojun
1846 1.32 itojun if ((opr->ndpr_stateflags & NDPRF_ONLINK) != 0)
1847 1.32 itojun continue;
1848 1.2 itojun
1849 1.32 itojun /*
1850 1.32 itojun * KAME specific: detached prefixes should not be
1851 1.32 itojun * on-link.
1852 1.32 itojun */
1853 1.32 itojun if ((opr->ndpr_stateflags & NDPRF_DETACHED) != 0)
1854 1.32 itojun continue;
1855 1.2 itojun
1856 1.32 itojun if (opr->ndpr_plen == pr->ndpr_plen &&
1857 1.32 itojun in6_are_prefix_equal(&pr->ndpr_prefix.sin6_addr,
1858 1.32 itojun &opr->ndpr_prefix.sin6_addr, pr->ndpr_plen)) {
1859 1.32 itojun int e;
1860 1.32 itojun
1861 1.32 itojun if ((e = nd6_prefix_onlink(opr)) != 0) {
1862 1.107 ozaki nd6log(LOG_ERR, "failed to "
1863 1.32 itojun "recover a prefix %s/%d from %s "
1864 1.32 itojun "to %s (errno = %d)\n",
1865 1.130 ryo ip6_sprintf(ip6buf,
1866 1.130 ryo &opr->ndpr_prefix.sin6_addr),
1867 1.32 itojun opr->ndpr_plen, if_name(ifp),
1868 1.107 ozaki if_name(opr->ndpr_ifp), e);
1869 1.32 itojun }
1870 1.32 itojun }
1871 1.32 itojun }
1872 1.32 itojun } else {
1873 1.32 itojun /* XXX: can we still set the NDPRF_ONLINK flag? */
1874 1.107 ozaki nd6log(LOG_ERR, "failed to delete route: "
1875 1.32 itojun "%s/%d on %s (errno = %d)\n",
1876 1.130 ryo ip6_sprintf(ip6buf, &sa6.sin6_addr), pr->ndpr_plen,
1877 1.130 ryo if_name(ifp),
1878 1.107 ozaki error);
1879 1.2 itojun }
1880 1.2 itojun
1881 1.101 ozaki return error;
1882 1.2 itojun }
1883 1.2 itojun
1884 1.2 itojun static struct in6_ifaddr *
1885 1.118 ozaki in6_ifadd(struct nd_prefixctl *prc, int mcast, struct psref *psref)
1886 1.2 itojun {
1887 1.94 matt struct ifnet *ifp = prc->ndprc_ifp;
1888 1.2 itojun struct ifaddr *ifa;
1889 1.32 itojun struct in6_aliasreq ifra;
1890 1.32 itojun struct in6_ifaddr *ia, *ib;
1891 1.32 itojun int error, plen0;
1892 1.2 itojun struct in6_addr mask;
1893 1.94 matt int prefixlen = prc->ndprc_plen;
1894 1.56 rpaulo int updateflags;
1895 1.118 ozaki int s;
1896 1.130 ryo char ip6buf[INET6_ADDRSTRLEN];
1897 1.2 itojun
1898 1.128 ozaki ND6_ASSERT_WLOCK();
1899 1.128 ozaki
1900 1.31 itojun in6_prefixlen2mask(&mask, prefixlen);
1901 1.2 itojun
1902 1.32 itojun /*
1903 1.32 itojun * find a link-local address (will be interface ID).
1904 1.32 itojun * Is it really mandatory? Theoretically, a global or a site-local
1905 1.32 itojun * address can be configured without a link-local address, if we
1906 1.32 itojun * have a unique interface identifier...
1907 1.32 itojun *
1908 1.32 itojun * it is not mandatory to have a link-local address, we can generate
1909 1.32 itojun * interface identifier on the fly. we do this because:
1910 1.32 itojun * (1) it should be the easiest way to find interface identifier.
1911 1.32 itojun * (2) RFC2462 5.4 suggesting the use of the same interface identifier
1912 1.32 itojun * for multiple addresses on a single interface, and possible shortcut
1913 1.32 itojun * of DAD. we omitted DAD for this reason in the past.
1914 1.32 itojun * (3) a user can prevent autoconfiguration of global address
1915 1.32 itojun * by removing link-local address by hand (this is partly because we
1916 1.55 rpaulo * don't have other way to control the use of IPv6 on an interface.
1917 1.32 itojun * this has been our design choice - cf. NRL's "ifconfig auto").
1918 1.32 itojun * (4) it is easier to manage when an interface has addresses
1919 1.32 itojun * with the same interface identifier, than to have multiple addresses
1920 1.32 itojun * with different interface identifiers.
1921 1.32 itojun */
1922 1.118 ozaki s = pserialize_read_enter();
1923 1.32 itojun ifa = (struct ifaddr *)in6ifa_ifpforlinklocal(ifp, 0); /* 0 is OK? */
1924 1.2 itojun if (ifa)
1925 1.2 itojun ib = (struct in6_ifaddr *)ifa;
1926 1.118 ozaki else {
1927 1.118 ozaki pserialize_read_exit(s);
1928 1.2 itojun return NULL;
1929 1.118 ozaki }
1930 1.2 itojun
1931 1.2 itojun #if 0 /* don't care link local addr state, and always do DAD */
1932 1.2 itojun /* if link-local address is not eligible, do not autoconfigure. */
1933 1.2 itojun if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_NOTREADY) {
1934 1.2 itojun printf("in6_ifadd: link-local address not ready\n");
1935 1.2 itojun return NULL;
1936 1.2 itojun }
1937 1.2 itojun #endif
1938 1.2 itojun
1939 1.2 itojun /* prefixlen + ifidlen must be equal to 128 */
1940 1.32 itojun plen0 = in6_mask2len(&ib->ia_prefixmask.sin6_addr, NULL);
1941 1.32 itojun if (prefixlen != plen0) {
1942 1.107 ozaki nd6log(LOG_INFO, "wrong prefixlen for %s "
1943 1.32 itojun "(prefix=%d ifid=%d)\n",
1944 1.107 ozaki if_name(ifp), prefixlen, 128 - plen0);
1945 1.118 ozaki pserialize_read_exit(s);
1946 1.2 itojun return NULL;
1947 1.2 itojun }
1948 1.2 itojun
1949 1.2 itojun /* make ifaddr */
1950 1.2 itojun
1951 1.56 rpaulo memset(&ifra, 0, sizeof(ifra));
1952 1.32 itojun /*
1953 1.32 itojun * in6_update_ifa() does not use ifra_name, but we accurately set it
1954 1.32 itojun * for safety.
1955 1.32 itojun */
1956 1.32 itojun strncpy(ifra.ifra_name, if_name(ifp), sizeof(ifra.ifra_name));
1957 1.94 matt sockaddr_in6_init(&ifra.ifra_addr, &prc->ndprc_prefix.sin6_addr, 0, 0, 0);
1958 1.32 itojun /* prefix */
1959 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[0] &= mask.s6_addr32[0];
1960 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[1] &= mask.s6_addr32[1];
1961 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[2] &= mask.s6_addr32[2];
1962 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[3] &= mask.s6_addr32[3];
1963 1.2 itojun
1964 1.2 itojun /* interface ID */
1965 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[0] |=
1966 1.32 itojun (ib->ia_addr.sin6_addr.s6_addr32[0] & ~mask.s6_addr32[0]);
1967 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[1] |=
1968 1.32 itojun (ib->ia_addr.sin6_addr.s6_addr32[1] & ~mask.s6_addr32[1]);
1969 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[2] |=
1970 1.32 itojun (ib->ia_addr.sin6_addr.s6_addr32[2] & ~mask.s6_addr32[2]);
1971 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[3] |=
1972 1.32 itojun (ib->ia_addr.sin6_addr.s6_addr32[3] & ~mask.s6_addr32[3]);
1973 1.118 ozaki pserialize_read_exit(s);
1974 1.33 itojun
1975 1.32 itojun /* new prefix mask. */
1976 1.69 dyoung sockaddr_in6_init(&ifra.ifra_prefixmask, &mask, 0, 0, 0);
1977 1.2 itojun
1978 1.56 rpaulo /* lifetimes */
1979 1.94 matt ifra.ifra_lifetime.ia6t_vltime = prc->ndprc_vltime;
1980 1.94 matt ifra.ifra_lifetime.ia6t_pltime = prc->ndprc_pltime;
1981 1.2 itojun
1982 1.32 itojun /* XXX: scope zone ID? */
1983 1.2 itojun
1984 1.32 itojun ifra.ifra_flags |= IN6_IFF_AUTOCONF; /* obey autoconf */
1985 1.2 itojun
1986 1.56 rpaulo /*
1987 1.56 rpaulo * Make sure that we do not have this address already. This should
1988 1.56 rpaulo * usually not happen, but we can still see this case, e.g., if we
1989 1.56 rpaulo * have manually configured the exact address to be configured.
1990 1.56 rpaulo */
1991 1.118 ozaki s = pserialize_read_enter();
1992 1.56 rpaulo if (in6ifa_ifpwithaddr(ifp, &ifra.ifra_addr.sin6_addr) != NULL) {
1993 1.56 rpaulo /* this should be rare enough to make an explicit log */
1994 1.56 rpaulo log(LOG_INFO, "in6_ifadd: %s is already configured\n",
1995 1.130 ryo ip6_sprintf(ip6buf, &ifra.ifra_addr.sin6_addr));
1996 1.118 ozaki pserialize_read_exit(s);
1997 1.56 rpaulo return (NULL);
1998 1.56 rpaulo }
1999 1.118 ozaki pserialize_read_exit(s);
2000 1.56 rpaulo
2001 1.56 rpaulo /*
2002 1.56 rpaulo * Allocate ifaddr structure, link into chain, etc.
2003 1.56 rpaulo * If we are going to create a new address upon receiving a multicasted
2004 1.56 rpaulo * RA, we need to impose a random delay before starting DAD.
2005 1.56 rpaulo * [draft-ietf-ipv6-rfc2462bis-02.txt, Section 5.4.2]
2006 1.56 rpaulo */
2007 1.56 rpaulo updateflags = 0;
2008 1.56 rpaulo if (mcast)
2009 1.56 rpaulo updateflags |= IN6_IFAUPDATE_DADDELAY;
2010 1.129 christos if ((error = in6_update_ifa(ifp, &ifra, updateflags)) != 0) {
2011 1.107 ozaki nd6log(LOG_ERR, "failed to make ifaddr %s on %s (errno=%d)\n",
2012 1.130 ryo ip6_sprintf(ip6buf, &ifra.ifra_addr.sin6_addr), if_name(ifp),
2013 1.107 ozaki error);
2014 1.36 itojun return (NULL); /* ifaddr must not have been allocated. */
2015 1.32 itojun }
2016 1.2 itojun
2017 1.118 ozaki ia = in6ifa_ifpwithaddr_psref(ifp, &ifra.ifra_addr.sin6_addr, psref);
2018 1.2 itojun
2019 1.36 itojun return (ia); /* this is always non-NULL */
2020 1.2 itojun }
2021 1.2 itojun
2022 1.2 itojun int
2023 1.64 christos in6_tmpifadd(
2024 1.64 christos const struct in6_ifaddr *ia0, /* corresponding public address */
2025 1.64 christos int forcegen,
2026 1.64 christos int dad_delay)
2027 1.56 rpaulo {
2028 1.56 rpaulo struct ifnet *ifp = ia0->ia_ifa.ifa_ifp;
2029 1.56 rpaulo struct in6_ifaddr *newia, *ia;
2030 1.56 rpaulo struct in6_aliasreq ifra;
2031 1.56 rpaulo int i, error;
2032 1.56 rpaulo int trylimit = 3; /* XXX: adhoc value */
2033 1.56 rpaulo int updateflags;
2034 1.56 rpaulo u_int32_t randid[2];
2035 1.56 rpaulo u_int32_t vltime0, pltime0;
2036 1.117 ozaki int s;
2037 1.56 rpaulo
2038 1.128 ozaki ND6_ASSERT_WLOCK();
2039 1.128 ozaki
2040 1.56 rpaulo memset(&ifra, 0, sizeof(ifra));
2041 1.56 rpaulo strncpy(ifra.ifra_name, if_name(ifp), sizeof(ifra.ifra_name));
2042 1.56 rpaulo ifra.ifra_addr = ia0->ia_addr;
2043 1.56 rpaulo /* copy prefix mask */
2044 1.56 rpaulo ifra.ifra_prefixmask = ia0->ia_prefixmask;
2045 1.56 rpaulo /* clear the old IFID */
2046 1.56 rpaulo for (i = 0; i < 4; i++) {
2047 1.56 rpaulo ifra.ifra_addr.sin6_addr.s6_addr32[i] &=
2048 1.56 rpaulo ifra.ifra_prefixmask.sin6_addr.s6_addr32[i];
2049 1.56 rpaulo }
2050 1.56 rpaulo
2051 1.56 rpaulo again:
2052 1.56 rpaulo if (in6_get_tmpifid(ifp, (u_int8_t *)randid,
2053 1.56 rpaulo (const u_int8_t *)&ia0->ia_addr.sin6_addr.s6_addr[8], forcegen)) {
2054 1.107 ozaki nd6log(LOG_NOTICE, "failed to find a good random IFID\n");
2055 1.56 rpaulo return (EINVAL);
2056 1.56 rpaulo }
2057 1.56 rpaulo ifra.ifra_addr.sin6_addr.s6_addr32[2] |=
2058 1.56 rpaulo (randid[0] & ~(ifra.ifra_prefixmask.sin6_addr.s6_addr32[2]));
2059 1.56 rpaulo ifra.ifra_addr.sin6_addr.s6_addr32[3] |=
2060 1.56 rpaulo (randid[1] & ~(ifra.ifra_prefixmask.sin6_addr.s6_addr32[3]));
2061 1.56 rpaulo
2062 1.56 rpaulo /*
2063 1.56 rpaulo * in6_get_tmpifid() quite likely provided a unique interface ID.
2064 1.56 rpaulo * However, we may still have a chance to see collision, because
2065 1.56 rpaulo * there may be a time lag between generation of the ID and generation
2066 1.56 rpaulo * of the address. So, we'll do one more sanity check.
2067 1.56 rpaulo */
2068 1.117 ozaki s = pserialize_read_enter();
2069 1.113 ozaki IN6_ADDRLIST_READER_FOREACH(ia) {
2070 1.56 rpaulo if (IN6_ARE_ADDR_EQUAL(&ia->ia_addr.sin6_addr,
2071 1.56 rpaulo &ifra.ifra_addr.sin6_addr)) {
2072 1.117 ozaki pserialize_read_exit(s);
2073 1.56 rpaulo if (trylimit-- == 0) {
2074 1.56 rpaulo /*
2075 1.56 rpaulo * Give up. Something strange should have
2076 1.56 rpaulo * happened.
2077 1.56 rpaulo */
2078 1.107 ozaki nd6log(LOG_NOTICE,
2079 1.107 ozaki "failed to find a unique random IFID\n");
2080 1.56 rpaulo return (EEXIST);
2081 1.56 rpaulo }
2082 1.56 rpaulo forcegen = 1;
2083 1.56 rpaulo goto again;
2084 1.56 rpaulo }
2085 1.56 rpaulo }
2086 1.117 ozaki pserialize_read_exit(s);
2087 1.56 rpaulo
2088 1.56 rpaulo /*
2089 1.56 rpaulo * The Valid Lifetime is the lower of the Valid Lifetime of the
2090 1.56 rpaulo * public address or TEMP_VALID_LIFETIME.
2091 1.56 rpaulo * The Preferred Lifetime is the lower of the Preferred Lifetime
2092 1.56 rpaulo * of the public address or TEMP_PREFERRED_LIFETIME -
2093 1.56 rpaulo * DESYNC_FACTOR.
2094 1.56 rpaulo */
2095 1.56 rpaulo if (ia0->ia6_lifetime.ia6t_vltime != ND6_INFINITE_LIFETIME) {
2096 1.56 rpaulo vltime0 = IFA6_IS_INVALID(ia0) ? 0 :
2097 1.56 rpaulo (ia0->ia6_lifetime.ia6t_vltime -
2098 1.102 ozaki (time_uptime - ia0->ia6_updatetime));
2099 1.56 rpaulo if (vltime0 > ip6_temp_valid_lifetime)
2100 1.56 rpaulo vltime0 = ip6_temp_valid_lifetime;
2101 1.56 rpaulo } else
2102 1.56 rpaulo vltime0 = ip6_temp_valid_lifetime;
2103 1.56 rpaulo if (ia0->ia6_lifetime.ia6t_pltime != ND6_INFINITE_LIFETIME) {
2104 1.56 rpaulo pltime0 = IFA6_IS_DEPRECATED(ia0) ? 0 :
2105 1.56 rpaulo (ia0->ia6_lifetime.ia6t_pltime -
2106 1.102 ozaki (time_uptime - ia0->ia6_updatetime));
2107 1.56 rpaulo if (pltime0 > ip6_temp_preferred_lifetime - ip6_desync_factor){
2108 1.56 rpaulo pltime0 = ip6_temp_preferred_lifetime -
2109 1.56 rpaulo ip6_desync_factor;
2110 1.56 rpaulo }
2111 1.56 rpaulo } else
2112 1.56 rpaulo pltime0 = ip6_temp_preferred_lifetime - ip6_desync_factor;
2113 1.56 rpaulo ifra.ifra_lifetime.ia6t_vltime = vltime0;
2114 1.56 rpaulo ifra.ifra_lifetime.ia6t_pltime = pltime0;
2115 1.56 rpaulo
2116 1.56 rpaulo /*
2117 1.56 rpaulo * A temporary address is created only if this calculated Preferred
2118 1.56 rpaulo * Lifetime is greater than REGEN_ADVANCE time units.
2119 1.56 rpaulo */
2120 1.56 rpaulo if (ifra.ifra_lifetime.ia6t_pltime <= ip6_temp_regen_advance)
2121 1.56 rpaulo return (0);
2122 1.56 rpaulo
2123 1.56 rpaulo /* XXX: scope zone ID? */
2124 1.56 rpaulo
2125 1.56 rpaulo ifra.ifra_flags |= (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY);
2126 1.56 rpaulo
2127 1.56 rpaulo /* allocate ifaddr structure, link into chain, etc. */
2128 1.56 rpaulo updateflags = 0;
2129 1.57 rpaulo if (dad_delay)
2130 1.56 rpaulo updateflags |= IN6_IFAUPDATE_DADDELAY;
2131 1.129 christos if ((error = in6_update_ifa(ifp, &ifra, updateflags)) != 0)
2132 1.56 rpaulo return (error);
2133 1.56 rpaulo
2134 1.118 ozaki s = pserialize_read_enter();
2135 1.56 rpaulo newia = in6ifa_ifpwithaddr(ifp, &ifra.ifra_addr.sin6_addr);
2136 1.56 rpaulo if (newia == NULL) { /* XXX: can it happen? */
2137 1.118 ozaki pserialize_read_exit(s);
2138 1.107 ozaki nd6log(LOG_ERR,
2139 1.107 ozaki "ifa update succeeded, but we got no ifaddr\n");
2140 1.56 rpaulo return (EINVAL); /* XXX */
2141 1.56 rpaulo }
2142 1.56 rpaulo newia->ia6_ndpr = ia0->ia6_ndpr;
2143 1.56 rpaulo newia->ia6_ndpr->ndpr_refcnt++;
2144 1.118 ozaki pserialize_read_exit(s);
2145 1.56 rpaulo
2146 1.56 rpaulo /*
2147 1.56 rpaulo * A newly added address might affect the status of other addresses.
2148 1.56 rpaulo * XXX: when the temporary address is generated with a new public
2149 1.56 rpaulo * address, the onlink check is redundant. However, it would be safe
2150 1.56 rpaulo * to do the check explicitly everywhere a new address is generated,
2151 1.56 rpaulo * and, in fact, we surely need the check when we create a new
2152 1.56 rpaulo * temporary address due to deprecation of an old temporary address.
2153 1.56 rpaulo */
2154 1.123 ozaki nd6_pfxlist_onlink_check();
2155 1.56 rpaulo
2156 1.56 rpaulo return (0);
2157 1.56 rpaulo }
2158 1.56 rpaulo
2159 1.56 rpaulo static int
2160 1.2 itojun in6_init_prefix_ltimes(struct nd_prefix *ndpr)
2161 1.2 itojun {
2162 1.7 itojun
2163 1.128 ozaki ND6_ASSERT_WLOCK();
2164 1.128 ozaki
2165 1.26 itojun /* check if preferred lifetime > valid lifetime. RFC2462 5.5.3 (c) */
2166 1.2 itojun if (ndpr->ndpr_pltime > ndpr->ndpr_vltime) {
2167 1.107 ozaki nd6log(LOG_INFO, "preferred lifetime"
2168 1.2 itojun "(%d) is greater than valid lifetime(%d)\n",
2169 1.107 ozaki (u_int)ndpr->ndpr_pltime, (u_int)ndpr->ndpr_vltime);
2170 1.2 itojun return (EINVAL);
2171 1.2 itojun }
2172 1.7 itojun if (ndpr->ndpr_pltime == ND6_INFINITE_LIFETIME)
2173 1.2 itojun ndpr->ndpr_preferred = 0;
2174 1.2 itojun else
2175 1.102 ozaki ndpr->ndpr_preferred = time_uptime + ndpr->ndpr_pltime;
2176 1.7 itojun if (ndpr->ndpr_vltime == ND6_INFINITE_LIFETIME)
2177 1.2 itojun ndpr->ndpr_expire = 0;
2178 1.2 itojun else
2179 1.102 ozaki ndpr->ndpr_expire = time_uptime + ndpr->ndpr_vltime;
2180 1.2 itojun
2181 1.2 itojun return 0;
2182 1.2 itojun }
2183 1.2 itojun
2184 1.2 itojun static void
2185 1.94 matt in6_init_address_ltimes(struct nd_prefix *newpr,
2186 1.60 christos struct in6_addrlifetime *lt6)
2187 1.2 itojun {
2188 1.7 itojun
2189 1.7 itojun /* Valid lifetime must not be updated unless explicitly specified. */
2190 1.32 itojun /* init ia6t_expire */
2191 1.32 itojun if (lt6->ia6t_vltime == ND6_INFINITE_LIFETIME)
2192 1.32 itojun lt6->ia6t_expire = 0;
2193 1.32 itojun else {
2194 1.102 ozaki lt6->ia6t_expire = time_uptime;
2195 1.32 itojun lt6->ia6t_expire += lt6->ia6t_vltime;
2196 1.2 itojun }
2197 1.7 itojun
2198 1.2 itojun /* init ia6t_preferred */
2199 1.7 itojun if (lt6->ia6t_pltime == ND6_INFINITE_LIFETIME)
2200 1.2 itojun lt6->ia6t_preferred = 0;
2201 1.2 itojun else {
2202 1.102 ozaki lt6->ia6t_preferred = time_uptime;
2203 1.2 itojun lt6->ia6t_preferred += lt6->ia6t_pltime;
2204 1.2 itojun }
2205 1.2 itojun }
2206 1.2 itojun
2207 1.2 itojun /*
2208 1.2 itojun * Delete all the routing table entries that use the specified gateway.
2209 1.2 itojun * XXX: this function causes search through all entries of routing table, so
2210 1.16 itojun * it shouldn't be called when acting as a router.
2211 1.2 itojun */
2212 1.2 itojun void
2213 1.123 ozaki nd6_rt_flush(struct in6_addr *gateway, struct ifnet *ifp)
2214 1.2 itojun {
2215 1.4 itojun int s = splsoftnet();
2216 1.2 itojun
2217 1.2 itojun /* We'll care only link-local addresses */
2218 1.2 itojun if (!IN6_IS_ADDR_LINKLOCAL(gateway)) {
2219 1.2 itojun splx(s);
2220 1.2 itojun return;
2221 1.2 itojun }
2222 1.2 itojun
2223 1.120 ozaki rt_delete_matched_entries(AF_INET6, rt6_deleteroute_matcher, gateway);
2224 1.2 itojun splx(s);
2225 1.2 itojun }
2226 1.2 itojun
2227 1.2 itojun static int
2228 1.120 ozaki rt6_deleteroute_matcher(struct rtentry *rt, void *arg)
2229 1.2 itojun {
2230 1.2 itojun struct in6_addr *gate = (struct in6_addr *)arg;
2231 1.2 itojun
2232 1.2 itojun if (rt->rt_gateway == NULL || rt->rt_gateway->sa_family != AF_INET6)
2233 1.36 itojun return (0);
2234 1.2 itojun
2235 1.104 ozaki if (!IN6_ARE_ADDR_EQUAL(gate, &satosin6(rt->rt_gateway)->sin6_addr))
2236 1.36 itojun return (0);
2237 1.26 itojun
2238 1.26 itojun /*
2239 1.32 itojun * Do not delete a static route.
2240 1.32 itojun * XXX: this seems to be a bit ad-hoc. Should we consider the
2241 1.32 itojun * 'cloned' bit instead?
2242 1.32 itojun */
2243 1.32 itojun if ((rt->rt_flags & RTF_STATIC) != 0)
2244 1.36 itojun return (0);
2245 1.32 itojun
2246 1.32 itojun /*
2247 1.2 itojun * We delete only host route. This means, in particular, we don't
2248 1.2 itojun * delete default route.
2249 1.2 itojun */
2250 1.2 itojun if ((rt->rt_flags & RTF_HOST) == 0)
2251 1.36 itojun return (0);
2252 1.2 itojun
2253 1.120 ozaki return 1;
2254 1.2 itojun }
2255