nd6_rtr.c revision 1.134 1 1.134 msaitoh /* $NetBSD: nd6_rtr.c,v 1.134 2017/03/03 06:27:20 msaitoh Exp $ */
2 1.20 itojun /* $KAME: nd6_rtr.c,v 1.95 2001/02/07 08:09:47 itojun Exp $ */
3 1.3 thorpej
4 1.2 itojun /*
5 1.2 itojun * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
6 1.2 itojun * All rights reserved.
7 1.16 itojun *
8 1.2 itojun * Redistribution and use in source and binary forms, with or without
9 1.2 itojun * modification, are permitted provided that the following conditions
10 1.2 itojun * are met:
11 1.2 itojun * 1. Redistributions of source code must retain the above copyright
12 1.2 itojun * notice, this list of conditions and the following disclaimer.
13 1.2 itojun * 2. Redistributions in binary form must reproduce the above copyright
14 1.2 itojun * notice, this list of conditions and the following disclaimer in the
15 1.2 itojun * documentation and/or other materials provided with the distribution.
16 1.2 itojun * 3. Neither the name of the project nor the names of its contributors
17 1.2 itojun * may be used to endorse or promote products derived from this software
18 1.2 itojun * without specific prior written permission.
19 1.16 itojun *
20 1.2 itojun * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21 1.2 itojun * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 1.2 itojun * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 1.2 itojun * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 1.2 itojun * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 1.2 itojun * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 1.2 itojun * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 1.2 itojun * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 1.2 itojun * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 1.2 itojun * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 1.2 itojun * SUCH DAMAGE.
31 1.2 itojun */
32 1.27 lukem
33 1.27 lukem #include <sys/cdefs.h>
34 1.134 msaitoh __KERNEL_RCSID(0, "$NetBSD: nd6_rtr.c,v 1.134 2017/03/03 06:27:20 msaitoh Exp $");
35 1.134 msaitoh
36 1.134 msaitoh #ifdef _KERNEL_OPT
37 1.134 msaitoh #include "opt_net_mpsafe.h"
38 1.134 msaitoh #endif
39 1.2 itojun
40 1.2 itojun #include <sys/param.h>
41 1.2 itojun #include <sys/systm.h>
42 1.2 itojun #include <sys/malloc.h>
43 1.2 itojun #include <sys/mbuf.h>
44 1.2 itojun #include <sys/socket.h>
45 1.2 itojun #include <sys/sockio.h>
46 1.2 itojun #include <sys/time.h>
47 1.2 itojun #include <sys/kernel.h>
48 1.2 itojun #include <sys/errno.h>
49 1.2 itojun #include <sys/ioctl.h>
50 1.2 itojun #include <sys/syslog.h>
51 1.82 tls #include <sys/cprng.h>
52 1.2 itojun
53 1.2 itojun #include <net/if.h>
54 1.2 itojun #include <net/if_types.h>
55 1.2 itojun #include <net/if_dl.h>
56 1.2 itojun
57 1.2 itojun #include <netinet/in.h>
58 1.2 itojun #include <netinet6/in6_var.h>
59 1.56 rpaulo #include <netinet6/in6_ifattach.h>
60 1.11 itojun #include <netinet/ip6.h>
61 1.2 itojun #include <netinet6/ip6_var.h>
62 1.2 itojun #include <netinet6/nd6.h>
63 1.11 itojun #include <netinet/icmp6.h>
64 1.75 thorpej #include <netinet6/icmp6_private.h>
65 1.54 rpaulo #include <netinet6/scope6_var.h>
66 1.2 itojun
67 1.7 itojun #include <net/net_osdep.h>
68 1.2 itojun
69 1.68 dyoung static int rtpref(struct nd_defrouter *);
70 1.68 dyoung static struct nd_defrouter *defrtrlist_update(struct nd_defrouter *);
71 1.68 dyoung static int prelist_update(struct nd_prefixctl *, struct nd_defrouter *,
72 1.68 dyoung struct mbuf *, int);
73 1.118 ozaki static struct in6_ifaddr *in6_ifadd(struct nd_prefixctl *, int, struct psref *);
74 1.68 dyoung static struct nd_pfxrouter *pfxrtr_lookup(struct nd_prefix *,
75 1.68 dyoung struct nd_defrouter *);
76 1.68 dyoung static void pfxrtr_add(struct nd_prefix *, struct nd_defrouter *);
77 1.68 dyoung static void pfxrtr_del(struct nd_pfxrouter *);
78 1.32 itojun static struct nd_pfxrouter *find_pfxlist_reachable_router
79 1.68 dyoung (struct nd_prefix *);
80 1.121 ozaki
81 1.121 ozaki static void defrouter_addreq(struct nd_defrouter *);
82 1.68 dyoung static void defrouter_delreq(struct nd_defrouter *);
83 1.68 dyoung
84 1.68 dyoung static int in6_init_prefix_ltimes(struct nd_prefix *);
85 1.83 christos static void in6_init_address_ltimes(struct nd_prefix *,
86 1.83 christos struct in6_addrlifetime *);
87 1.83 christos static void purge_detached(struct ifnet *);
88 1.2 itojun
89 1.120 ozaki static int rt6_deleteroute_matcher(struct rtentry *, void *);
90 1.2 itojun
91 1.121 ozaki static int nd6_prelist_add(struct nd_prefixctl *, struct nd_defrouter *,
92 1.121 ozaki struct nd_prefix **);
93 1.121 ozaki static int nd6_prefix_onlink(struct nd_prefix *);
94 1.121 ozaki static int nd6_prefix_offlink(struct nd_prefix *);
95 1.121 ozaki static struct nd_prefix *nd6_prefix_lookup(struct nd_prefixctl *);
96 1.121 ozaki
97 1.2 itojun extern int nd6_recalc_reachtm_interval;
98 1.2 itojun
99 1.56 rpaulo int ip6_use_tempaddr = 0;
100 1.56 rpaulo
101 1.56 rpaulo int ip6_desync_factor;
102 1.56 rpaulo u_int32_t ip6_temp_preferred_lifetime = DEF_TEMP_PREFERRED_LIFETIME;
103 1.56 rpaulo u_int32_t ip6_temp_valid_lifetime = DEF_TEMP_VALID_LIFETIME;
104 1.56 rpaulo int ip6_temp_regen_advance = TEMPADDR_REGEN_ADVANCE;
105 1.56 rpaulo
106 1.81 spz int nd6_numroutes = 0;
107 1.81 spz
108 1.56 rpaulo /* RTPREF_MEDIUM has to be 0! */
109 1.56 rpaulo #define RTPREF_HIGH 1
110 1.56 rpaulo #define RTPREF_MEDIUM 0
111 1.56 rpaulo #define RTPREF_LOW (-1)
112 1.56 rpaulo #define RTPREF_RESERVED (-2)
113 1.56 rpaulo #define RTPREF_INVALID (-3) /* internal */
114 1.56 rpaulo
115 1.101 ozaki static inline bool
116 1.101 ozaki nd6_is_llinfo_probreach(struct nd_defrouter *dr)
117 1.101 ozaki {
118 1.105 ozaki struct llentry *ln = NULL;
119 1.101 ozaki
120 1.108 ozaki ln = nd6_lookup(&dr->rtaddr, dr->ifp, false);
121 1.108 ozaki if (ln == NULL)
122 1.101 ozaki return false;
123 1.108 ozaki
124 1.108 ozaki if (!ND6_IS_LLINFO_PROBREACH(ln)) {
125 1.108 ozaki LLE_RUNLOCK(ln);
126 1.101 ozaki return false;
127 1.108 ozaki }
128 1.101 ozaki
129 1.108 ozaki LLE_RUNLOCK(ln);
130 1.101 ozaki return true;
131 1.101 ozaki }
132 1.101 ozaki
133 1.2 itojun /*
134 1.2 itojun * Receive Router Solicitation Message - just for routers.
135 1.81 spz * Router solicitation/advertisement is mostly managed by a userland program
136 1.2 itojun * (rtadvd) so here we have no function like nd6_ra_output().
137 1.2 itojun *
138 1.2 itojun * Based on RFC 2461
139 1.2 itojun */
140 1.2 itojun void
141 1.64 christos nd6_rs_input(struct mbuf *m, int off, int icmp6len)
142 1.2 itojun {
143 1.111 ozaki struct ifnet *ifp;
144 1.111 ozaki struct nd_ifinfo *ndi;
145 1.2 itojun struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
146 1.12 itojun struct nd_router_solicit *nd_rs;
147 1.2 itojun struct in6_addr saddr6 = ip6->ip6_src;
148 1.2 itojun char *lladdr = NULL;
149 1.2 itojun int lladdrlen = 0;
150 1.2 itojun union nd_opts ndopts;
151 1.111 ozaki struct psref psref;
152 1.130 ryo char ip6bufs[INET6_ADDRSTRLEN], ip6bufd[INET6_ADDRSTRLEN];
153 1.111 ozaki
154 1.111 ozaki ifp = m_get_rcvif_psref(m, &psref);
155 1.111 ozaki if (ifp == NULL)
156 1.111 ozaki goto freeit;
157 1.111 ozaki
158 1.111 ozaki ndi = ND_IFINFO(ifp);
159 1.2 itojun
160 1.2 itojun /* If I'm not a router, ignore it. */
161 1.80 dyoung if (nd6_accepts_rtadv(ndi) || !ip6_forwarding)
162 1.12 itojun goto freeit;
163 1.2 itojun
164 1.2 itojun /* Sanity checks */
165 1.2 itojun if (ip6->ip6_hlim != 255) {
166 1.107 ozaki nd6log(LOG_ERR, "invalid hlim (%d) from %s to %s on %s\n",
167 1.131 christos ip6->ip6_hlim, IN6_PRINT(ip6bufs, &ip6->ip6_src),
168 1.131 christos IN6_PRINT(ip6bufd, &ip6->ip6_dst), if_name(ifp));
169 1.20 itojun goto bad;
170 1.2 itojun }
171 1.2 itojun
172 1.2 itojun /*
173 1.2 itojun * Don't update the neighbor cache, if src = ::.
174 1.2 itojun * This indicates that the src has no IP address assigned yet.
175 1.2 itojun */
176 1.2 itojun if (IN6_IS_ADDR_UNSPECIFIED(&saddr6))
177 1.12 itojun goto freeit;
178 1.12 itojun
179 1.12 itojun IP6_EXTHDR_GET(nd_rs, struct nd_router_solicit *, m, off, icmp6len);
180 1.12 itojun if (nd_rs == NULL) {
181 1.75 thorpej ICMP6_STATINC(ICMP6_STAT_TOOSHORT);
182 1.2 itojun return;
183 1.12 itojun }
184 1.2 itojun
185 1.2 itojun icmp6len -= sizeof(*nd_rs);
186 1.2 itojun nd6_option_init(nd_rs + 1, icmp6len, &ndopts);
187 1.2 itojun if (nd6_options(&ndopts) < 0) {
188 1.107 ozaki nd6log(LOG_INFO, "invalid ND option, ignored\n");
189 1.20 itojun /* nd6_options have incremented stats */
190 1.12 itojun goto freeit;
191 1.2 itojun }
192 1.2 itojun
193 1.2 itojun if (ndopts.nd_opts_src_lladdr) {
194 1.2 itojun lladdr = (char *)(ndopts.nd_opts_src_lladdr + 1);
195 1.2 itojun lladdrlen = ndopts.nd_opts_src_lladdr->nd_opt_len << 3;
196 1.2 itojun }
197 1.2 itojun
198 1.2 itojun if (lladdr && ((ifp->if_addrlen + 2 + 7) & ~7) != lladdrlen) {
199 1.107 ozaki nd6log(LOG_INFO, "lladdrlen mismatch for %s "
200 1.2 itojun "(if %d, RS packet %d)\n",
201 1.131 christos IN6_PRINT(ip6bufs, &saddr6),
202 1.130 ryo ifp->if_addrlen, lladdrlen - 2);
203 1.20 itojun goto bad;
204 1.2 itojun }
205 1.2 itojun
206 1.6 itojun nd6_cache_lladdr(ifp, &saddr6, lladdr, lladdrlen, ND_ROUTER_SOLICIT, 0);
207 1.12 itojun
208 1.12 itojun freeit:
209 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
210 1.12 itojun m_freem(m);
211 1.20 itojun return;
212 1.20 itojun
213 1.20 itojun bad:
214 1.75 thorpej ICMP6_STATINC(ICMP6_STAT_BADRS);
215 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
216 1.20 itojun m_freem(m);
217 1.2 itojun }
218 1.2 itojun
219 1.2 itojun /*
220 1.2 itojun * Receive Router Advertisement Message.
221 1.2 itojun *
222 1.2 itojun * Based on RFC 2461
223 1.2 itojun * TODO: on-link bit on prefix information
224 1.2 itojun * TODO: ND_RA_FLAG_{OTHER,MANAGED} processing
225 1.2 itojun */
226 1.2 itojun void
227 1.64 christos nd6_ra_input(struct mbuf *m, int off, int icmp6len)
228 1.2 itojun {
229 1.111 ozaki struct ifnet *ifp;
230 1.111 ozaki struct nd_ifinfo *ndi;
231 1.2 itojun struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
232 1.12 itojun struct nd_router_advert *nd_ra;
233 1.2 itojun struct in6_addr saddr6 = ip6->ip6_src;
234 1.2 itojun #if 0
235 1.2 itojun struct in6_addr daddr6 = ip6->ip6_dst;
236 1.12 itojun int flags; /* = nd_ra->nd_ra_flags_reserved; */
237 1.2 itojun int is_managed = ((flags & ND_RA_FLAG_MANAGED) != 0);
238 1.2 itojun int is_other = ((flags & ND_RA_FLAG_OTHER) != 0);
239 1.2 itojun #endif
240 1.56 rpaulo int mcast = 0;
241 1.2 itojun union nd_opts ndopts;
242 1.2 itojun struct nd_defrouter *dr;
243 1.111 ozaki struct psref psref;
244 1.130 ryo char ip6buf[INET6_ADDRSTRLEN], ip6buf2[INET6_ADDRSTRLEN];
245 1.111 ozaki
246 1.111 ozaki ifp = m_get_rcvif_psref(m, &psref);
247 1.111 ozaki if (ifp == NULL)
248 1.111 ozaki goto freeit;
249 1.2 itojun
250 1.111 ozaki ndi = ND_IFINFO(ifp);
251 1.32 itojun /*
252 1.81 spz * We only accept RAs when
253 1.81 spz * the system-wide variable allows the acceptance, and the
254 1.33 itojun * per-interface variable allows RAs on the receiving interface.
255 1.32 itojun */
256 1.80 dyoung if (!nd6_accepts_rtadv(ndi))
257 1.32 itojun goto freeit;
258 1.2 itojun
259 1.2 itojun if (ip6->ip6_hlim != 255) {
260 1.107 ozaki nd6log(LOG_ERR, "invalid hlim (%d) from %s to %s on %s\n",
261 1.131 christos ip6->ip6_hlim, IN6_PRINT(ip6buf, &ip6->ip6_src),
262 1.131 christos IN6_PRINT(ip6buf2, &ip6->ip6_dst), if_name(ifp));
263 1.20 itojun goto bad;
264 1.2 itojun }
265 1.2 itojun
266 1.2 itojun if (!IN6_IS_ADDR_LINKLOCAL(&saddr6)) {
267 1.107 ozaki nd6log(LOG_ERR, "src %s is not link-local\n",
268 1.131 christos IN6_PRINT(ip6buf, &saddr6));
269 1.20 itojun goto bad;
270 1.12 itojun }
271 1.12 itojun
272 1.12 itojun IP6_EXTHDR_GET(nd_ra, struct nd_router_advert *, m, off, icmp6len);
273 1.12 itojun if (nd_ra == NULL) {
274 1.75 thorpej ICMP6_STATINC(ICMP6_STAT_TOOSHORT);
275 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
276 1.2 itojun return;
277 1.2 itojun }
278 1.2 itojun
279 1.2 itojun icmp6len -= sizeof(*nd_ra);
280 1.2 itojun nd6_option_init(nd_ra + 1, icmp6len, &ndopts);
281 1.2 itojun if (nd6_options(&ndopts) < 0) {
282 1.107 ozaki nd6log(LOG_INFO, "invalid ND option, ignored\n");
283 1.20 itojun /* nd6_options have incremented stats */
284 1.12 itojun goto freeit;
285 1.2 itojun }
286 1.2 itojun
287 1.2 itojun {
288 1.52 christos struct nd_defrouter drtr;
289 1.2 itojun u_int32_t advreachable = nd_ra->nd_ra_reachable;
290 1.2 itojun
291 1.56 rpaulo /* remember if this is a multicasted advertisement */
292 1.56 rpaulo if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst))
293 1.56 rpaulo mcast = 1;
294 1.56 rpaulo
295 1.56 rpaulo memset(&drtr, 0, sizeof(drtr));
296 1.52 christos drtr.rtaddr = saddr6;
297 1.52 christos drtr.flags = nd_ra->nd_ra_flags_reserved;
298 1.58 rpaulo drtr.rtlifetime = ntohs(nd_ra->nd_ra_router_lifetime);
299 1.102 ozaki drtr.expire = time_uptime + drtr.rtlifetime;
300 1.52 christos drtr.ifp = ifp;
301 1.2 itojun /* unspecified or not? (RFC 2461 6.3.4) */
302 1.2 itojun if (advreachable) {
303 1.2 itojun NTOHL(advreachable);
304 1.2 itojun if (advreachable <= MAX_REACHABLE_TIME &&
305 1.2 itojun ndi->basereachable != advreachable) {
306 1.2 itojun ndi->basereachable = advreachable;
307 1.2 itojun ndi->reachable = ND_COMPUTE_RTIME(ndi->basereachable);
308 1.2 itojun ndi->recalctm = nd6_recalc_reachtm_interval; /* reset */
309 1.2 itojun }
310 1.2 itojun }
311 1.2 itojun if (nd_ra->nd_ra_retransmit)
312 1.2 itojun ndi->retrans = ntohl(nd_ra->nd_ra_retransmit);
313 1.99 roy if (nd_ra->nd_ra_curhoplimit) {
314 1.99 roy if (ndi->chlim < nd_ra->nd_ra_curhoplimit)
315 1.99 roy ndi->chlim = nd_ra->nd_ra_curhoplimit;
316 1.99 roy else if (ndi->chlim != nd_ra->nd_ra_curhoplimit)
317 1.99 roy log(LOG_ERR, "nd_ra_input: lower CurHopLimit sent from "
318 1.99 roy "%s on %s (current=%d, received=%d), ignored\n",
319 1.131 christos IN6_PRINT(ip6buf, &ip6->ip6_src),
320 1.99 roy if_name(ifp), ndi->chlim, nd_ra->nd_ra_curhoplimit);
321 1.99 roy }
322 1.128 ozaki ND6_WLOCK();
323 1.52 christos dr = defrtrlist_update(&drtr);
324 1.2 itojun }
325 1.2 itojun
326 1.2 itojun /*
327 1.2 itojun * prefix
328 1.2 itojun */
329 1.2 itojun if (ndopts.nd_opts_pi) {
330 1.2 itojun struct nd_opt_hdr *pt;
331 1.32 itojun struct nd_opt_prefix_info *pi = NULL;
332 1.94 matt struct nd_prefixctl prc;
333 1.2 itojun
334 1.2 itojun for (pt = (struct nd_opt_hdr *)ndopts.nd_opts_pi;
335 1.2 itojun pt <= (struct nd_opt_hdr *)ndopts.nd_opts_pi_end;
336 1.63 christos pt = (struct nd_opt_hdr *)((char *)pt +
337 1.2 itojun (pt->nd_opt_len << 3))) {
338 1.2 itojun if (pt->nd_opt_type != ND_OPT_PREFIX_INFORMATION)
339 1.2 itojun continue;
340 1.2 itojun pi = (struct nd_opt_prefix_info *)pt;
341 1.2 itojun
342 1.2 itojun if (pi->nd_opt_pi_len != 4) {
343 1.107 ozaki nd6log(LOG_INFO, "invalid option "
344 1.22 itojun "len %d for prefix information option, "
345 1.107 ozaki "ignored\n", pi->nd_opt_pi_len);
346 1.2 itojun continue;
347 1.2 itojun }
348 1.2 itojun
349 1.2 itojun if (128 < pi->nd_opt_pi_prefix_len) {
350 1.107 ozaki nd6log(LOG_INFO, "invalid prefix "
351 1.22 itojun "len %d for prefix information option, "
352 1.107 ozaki "ignored\n", pi->nd_opt_pi_prefix_len);
353 1.2 itojun continue;
354 1.2 itojun }
355 1.2 itojun
356 1.2 itojun if (IN6_IS_ADDR_MULTICAST(&pi->nd_opt_pi_prefix)
357 1.2 itojun || IN6_IS_ADDR_LINKLOCAL(&pi->nd_opt_pi_prefix)) {
358 1.107 ozaki nd6log(LOG_INFO,
359 1.107 ozaki "invalid prefix %s, ignored\n",
360 1.131 christos IN6_PRINT(ip6buf, &pi->nd_opt_pi_prefix));
361 1.2 itojun continue;
362 1.2 itojun }
363 1.2 itojun
364 1.94 matt memset(&prc, 0, sizeof(prc));
365 1.94 matt sockaddr_in6_init(&prc.ndprc_prefix,
366 1.69 dyoung &pi->nd_opt_pi_prefix, 0, 0, 0);
367 1.111 ozaki prc.ndprc_ifp = ifp;
368 1.2 itojun
369 1.94 matt prc.ndprc_raf_onlink = (pi->nd_opt_pi_flags_reserved &
370 1.56 rpaulo ND_OPT_PI_FLAG_ONLINK) ? 1 : 0;
371 1.94 matt prc.ndprc_raf_auto = (pi->nd_opt_pi_flags_reserved &
372 1.56 rpaulo ND_OPT_PI_FLAG_AUTO) ? 1 : 0;
373 1.94 matt prc.ndprc_plen = pi->nd_opt_pi_prefix_len;
374 1.94 matt prc.ndprc_vltime = ntohl(pi->nd_opt_pi_valid_time);
375 1.94 matt prc.ndprc_pltime = ntohl(pi->nd_opt_pi_preferred_time);
376 1.2 itojun
377 1.94 matt (void)prelist_update(&prc, dr, m, mcast);
378 1.2 itojun }
379 1.2 itojun }
380 1.128 ozaki ND6_UNLOCK();
381 1.2 itojun
382 1.2 itojun /*
383 1.2 itojun * MTU
384 1.2 itojun */
385 1.2 itojun if (ndopts.nd_opts_mtu && ndopts.nd_opts_mtu->nd_opt_mtu_len == 1) {
386 1.32 itojun u_long mtu;
387 1.30 itojun u_long maxmtu;
388 1.2 itojun
389 1.32 itojun mtu = ntohl(ndopts.nd_opts_mtu->nd_opt_mtu_mtu);
390 1.32 itojun
391 1.2 itojun /* lower bound */
392 1.2 itojun if (mtu < IPV6_MMTU) {
393 1.107 ozaki nd6log(LOG_INFO, "bogus mtu option "
394 1.32 itojun "mtu=%lu sent from %s, ignoring\n",
395 1.131 christos mtu, IN6_PRINT(ip6buf, &ip6->ip6_src));
396 1.2 itojun goto skip;
397 1.2 itojun }
398 1.2 itojun
399 1.2 itojun /* upper bound */
400 1.30 itojun maxmtu = (ndi->maxmtu && ndi->maxmtu < ifp->if_mtu)
401 1.30 itojun ? ndi->maxmtu : ifp->if_mtu;
402 1.30 itojun if (mtu <= maxmtu) {
403 1.30 itojun int change = (ndi->linkmtu != mtu);
404 1.30 itojun
405 1.30 itojun ndi->linkmtu = mtu;
406 1.30 itojun if (change) /* in6_maxmtu may change */
407 1.30 itojun in6_setmaxmtu();
408 1.2 itojun } else {
409 1.107 ozaki nd6log(LOG_INFO,
410 1.107 ozaki "bogus mtu mtu=%lu sent from %s; "
411 1.30 itojun "exceeds maxmtu %lu, ignoring\n",
412 1.131 christos mtu, IN6_PRINT(ip6buf, &ip6->ip6_src), maxmtu);
413 1.2 itojun }
414 1.2 itojun }
415 1.2 itojun
416 1.2 itojun skip:
417 1.33 itojun
418 1.2 itojun /*
419 1.26 itojun * Source link layer address
420 1.2 itojun */
421 1.2 itojun {
422 1.2 itojun char *lladdr = NULL;
423 1.2 itojun int lladdrlen = 0;
424 1.33 itojun
425 1.2 itojun if (ndopts.nd_opts_src_lladdr) {
426 1.2 itojun lladdr = (char *)(ndopts.nd_opts_src_lladdr + 1);
427 1.2 itojun lladdrlen = ndopts.nd_opts_src_lladdr->nd_opt_len << 3;
428 1.2 itojun }
429 1.2 itojun
430 1.2 itojun if (lladdr && ((ifp->if_addrlen + 2 + 7) & ~7) != lladdrlen) {
431 1.107 ozaki nd6log(LOG_INFO, "lladdrlen mismatch for %s "
432 1.131 christos "(if %d, RA packet %d)\n", IN6_PRINT(ip6buf, &saddr6),
433 1.107 ozaki ifp->if_addrlen, lladdrlen - 2);
434 1.20 itojun goto bad;
435 1.2 itojun }
436 1.2 itojun
437 1.6 itojun nd6_cache_lladdr(ifp, &saddr6, lladdr, lladdrlen, ND_ROUTER_ADVERT, 0);
438 1.7 itojun
439 1.7 itojun /*
440 1.7 itojun * Installing a link-layer address might change the state of the
441 1.7 itojun * router's neighbor cache, which might also affect our on-link
442 1.7 itojun * detection of adveritsed prefixes.
443 1.7 itojun */
444 1.128 ozaki ND6_WLOCK();
445 1.123 ozaki nd6_pfxlist_onlink_check();
446 1.128 ozaki ND6_UNLOCK();
447 1.2 itojun }
448 1.12 itojun
449 1.20 itojun freeit:
450 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
451 1.20 itojun m_freem(m);
452 1.20 itojun return;
453 1.20 itojun
454 1.20 itojun bad:
455 1.75 thorpej ICMP6_STATINC(ICMP6_STAT_BADRA);
456 1.111 ozaki m_put_rcvif_psref(ifp, &psref);
457 1.12 itojun m_freem(m);
458 1.2 itojun }
459 1.2 itojun
460 1.2 itojun /*
461 1.45 wiz * default router list processing sub routines
462 1.2 itojun */
463 1.121 ozaki static void
464 1.94 matt defrouter_addreq(struct nd_defrouter *newdr)
465 1.2 itojun {
466 1.76 dyoung union {
467 1.76 dyoung struct sockaddr_in6 sin6;
468 1.76 dyoung struct sockaddr sa;
469 1.76 dyoung } def, mask, gate;
470 1.32 itojun int error;
471 1.2 itojun
472 1.56 rpaulo memset(&def, 0, sizeof(def));
473 1.56 rpaulo memset(&mask, 0, sizeof(mask));
474 1.56 rpaulo memset(&gate, 0,sizeof(gate)); /* for safety */
475 1.2 itojun
476 1.76 dyoung def.sin6.sin6_len = mask.sin6.sin6_len = gate.sin6.sin6_len =
477 1.32 itojun sizeof(struct sockaddr_in6);
478 1.76 dyoung def.sin6.sin6_family = mask.sin6.sin6_family = gate.sin6.sin6_family = AF_INET6;
479 1.94 matt gate.sin6.sin6_addr = newdr->rtaddr;
480 1.32 itojun #ifndef SCOPEDROUTING
481 1.76 dyoung gate.sin6.sin6_scope_id = 0; /* XXX */
482 1.32 itojun #endif
483 1.2 itojun
484 1.133 ozaki #ifndef NET_MPSAFE
485 1.133 ozaki KASSERT(mutex_owned(softnet_lock));
486 1.133 ozaki #endif
487 1.101 ozaki error = rtrequest_newmsg(RTM_ADD, &def.sa, &gate.sa, &mask.sa,
488 1.101 ozaki RTF_GATEWAY);
489 1.101 ozaki if (error == 0) {
490 1.81 spz nd6_numroutes++;
491 1.101 ozaki newdr->installed = 1;
492 1.32 itojun }
493 1.2 itojun return;
494 1.2 itojun }
495 1.2 itojun
496 1.2 itojun struct nd_defrouter *
497 1.123 ozaki nd6_defrouter_lookup(const struct in6_addr *addr, struct ifnet *ifp)
498 1.2 itojun {
499 1.2 itojun struct nd_defrouter *dr;
500 1.2 itojun
501 1.128 ozaki ND6_ASSERT_LOCK();
502 1.128 ozaki
503 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr) {
504 1.66 dyoung if (dr->ifp == ifp && IN6_ARE_ADDR_EQUAL(addr, &dr->rtaddr))
505 1.66 dyoung break;
506 1.7 itojun }
507 1.2 itojun
508 1.66 dyoung return dr; /* search failed */
509 1.2 itojun }
510 1.2 itojun
511 1.2 itojun void
512 1.123 ozaki nd6_defrtrlist_del(struct nd_defrouter *dr, struct in6_ifextra *ext)
513 1.2 itojun {
514 1.2 itojun struct nd_defrouter *deldr = NULL;
515 1.2 itojun struct nd_prefix *pr;
516 1.96 martin struct nd_ifinfo *ndi;
517 1.96 martin
518 1.128 ozaki ND6_ASSERT_WLOCK();
519 1.128 ozaki
520 1.96 martin if (ext == NULL)
521 1.96 martin ext = dr->ifp->if_afdata[AF_INET6];
522 1.96 martin
523 1.96 martin /* detach already in progress, can not do anything */
524 1.96 martin if (ext == NULL)
525 1.96 martin return;
526 1.96 martin
527 1.96 martin ndi = ext->nd_ifinfo;
528 1.2 itojun
529 1.2 itojun /*
530 1.2 itojun * Flush all the routing table entries that use the router
531 1.2 itojun * as a next hop.
532 1.2 itojun */
533 1.79 tonnerre /* XXX: better condition? */
534 1.80 dyoung if (!ip6_forwarding && nd6_accepts_rtadv(ndi))
535 1.123 ozaki nd6_rt_flush(&dr->rtaddr, dr->ifp);
536 1.32 itojun
537 1.32 itojun if (dr->installed) {
538 1.32 itojun deldr = dr;
539 1.32 itojun defrouter_delreq(dr);
540 1.2 itojun }
541 1.124 ozaki ND_DEFROUTER_LIST_REMOVE(dr);
542 1.2 itojun
543 1.2 itojun /*
544 1.2 itojun * Also delete all the pointers to the router in each prefix lists.
545 1.2 itojun */
546 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
547 1.2 itojun struct nd_pfxrouter *pfxrtr;
548 1.2 itojun if ((pfxrtr = pfxrtr_lookup(pr, dr)) != NULL)
549 1.2 itojun pfxrtr_del(pfxrtr);
550 1.2 itojun }
551 1.123 ozaki nd6_pfxlist_onlink_check();
552 1.2 itojun
553 1.2 itojun /*
554 1.7 itojun * If the router is the primary one, choose a new one.
555 1.123 ozaki * Note that nd6_defrouter_select() will remove the current gateway
556 1.7 itojun * from the routing table.
557 1.2 itojun */
558 1.2 itojun if (deldr)
559 1.123 ozaki nd6_defrouter_select();
560 1.7 itojun
561 1.83 christos ext->ndefrouters--;
562 1.83 christos if (ext->ndefrouters < 0) {
563 1.123 ozaki log(LOG_WARNING, "nd6_defrtrlist_del: negative count on %s\n",
564 1.83 christos dr->ifp->if_xname);
565 1.83 christos }
566 1.83 christos
567 1.2 itojun free(dr, M_IP6NDP);
568 1.2 itojun }
569 1.2 itojun
570 1.7 itojun /*
571 1.32 itojun * Remove the default route for a given router.
572 1.123 ozaki * This is just a subroutine function for nd6_defrouter_select(), and should
573 1.32 itojun * not be called from anywhere else.
574 1.32 itojun */
575 1.32 itojun static void
576 1.64 christos defrouter_delreq(struct nd_defrouter *dr)
577 1.32 itojun {
578 1.76 dyoung union {
579 1.76 dyoung struct sockaddr_in6 sin6;
580 1.76 dyoung struct sockaddr sa;
581 1.76 dyoung } def, mask, gw;
582 1.101 ozaki int error;
583 1.32 itojun
584 1.35 itojun #ifdef DIAGNOSTIC
585 1.56 rpaulo if (dr == NULL)
586 1.35 itojun panic("dr == NULL in defrouter_delreq");
587 1.35 itojun #endif
588 1.35 itojun
589 1.76 dyoung memset(&def, 0, sizeof(def));
590 1.76 dyoung memset(&mask, 0, sizeof(mask));
591 1.76 dyoung memset(&gw, 0, sizeof(gw)); /* for safety */
592 1.32 itojun
593 1.76 dyoung def.sin6.sin6_len = mask.sin6.sin6_len = gw.sin6.sin6_len =
594 1.32 itojun sizeof(struct sockaddr_in6);
595 1.76 dyoung def.sin6.sin6_family = mask.sin6.sin6_family = gw.sin6.sin6_family = AF_INET6;
596 1.76 dyoung gw.sin6.sin6_addr = dr->rtaddr;
597 1.32 itojun #ifndef SCOPEDROUTING
598 1.76 dyoung gw.sin6.sin6_scope_id = 0; /* XXX */
599 1.32 itojun #endif
600 1.32 itojun
601 1.101 ozaki error = rtrequest_newmsg(RTM_DELETE, &def.sa, &gw.sa, &mask.sa,
602 1.101 ozaki RTF_GATEWAY);
603 1.101 ozaki if (error == 0)
604 1.100 ozaki nd6_numroutes--;
605 1.32 itojun
606 1.35 itojun dr->installed = 0;
607 1.32 itojun }
608 1.32 itojun
609 1.32 itojun /*
610 1.32 itojun * remove all default routes from default router list
611 1.32 itojun */
612 1.32 itojun void
613 1.123 ozaki nd6_defrouter_reset(void)
614 1.32 itojun {
615 1.32 itojun struct nd_defrouter *dr;
616 1.32 itojun
617 1.128 ozaki ND6_ASSERT_WLOCK();
618 1.128 ozaki
619 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr)
620 1.32 itojun defrouter_delreq(dr);
621 1.32 itojun
622 1.32 itojun /*
623 1.32 itojun * XXX should we also nuke any default routers in the kernel, by
624 1.32 itojun * going through them by rtalloc1()?
625 1.32 itojun */
626 1.32 itojun }
627 1.32 itojun
628 1.32 itojun /*
629 1.32 itojun * Default Router Selection according to Section 6.3.6 of RFC 2461 and
630 1.32 itojun * draft-ietf-ipngwg-router-selection:
631 1.32 itojun * 1) Routers that are reachable or probably reachable should be preferred.
632 1.32 itojun * If we have more than one (probably) reachable router, prefer ones
633 1.32 itojun * with the highest router preference.
634 1.7 itojun * 2) When no routers on the list are known to be reachable or
635 1.7 itojun * probably reachable, routers SHOULD be selected in a round-robin
636 1.32 itojun * fashion, regardless of router preference values.
637 1.7 itojun * 3) If the Default Router List is empty, assume that all
638 1.7 itojun * destinations are on-link.
639 1.32 itojun *
640 1.32 itojun * We assume nd_defrouter is sorted by router preference value.
641 1.32 itojun * Since the code below covers both with and without router preference cases,
642 1.32 itojun * we do not need to classify the cases by ifdef.
643 1.32 itojun *
644 1.32 itojun * At this moment, we do not try to install more than one default router,
645 1.32 itojun * even when the multipath routing is available, because we're not sure about
646 1.32 itojun * the benefits for stub hosts comparing to the risk of making the code
647 1.32 itojun * complicated and the possibility of introducing bugs.
648 1.7 itojun */
649 1.7 itojun void
650 1.123 ozaki nd6_defrouter_select(void)
651 1.7 itojun {
652 1.79 tonnerre struct nd_ifinfo *ndi;
653 1.32 itojun struct nd_defrouter *dr, *selected_dr = NULL, *installed_dr = NULL;
654 1.7 itojun
655 1.128 ozaki ND6_ASSERT_WLOCK();
656 1.128 ozaki
657 1.7 itojun /*
658 1.32 itojun * This function should be called only when acting as an autoconfigured
659 1.32 itojun * host. Although the remaining part of this function is not effective
660 1.32 itojun * if the node is not an autoconfigured host, we explicitly exclude
661 1.32 itojun * such cases here for safety.
662 1.7 itojun */
663 1.79 tonnerre if (ip6_forwarding) {
664 1.107 ozaki nd6log(LOG_WARNING, "called unexpectedly (forwarding=%d, "
665 1.107 ozaki "accept_rtadv=%d)\n", ip6_forwarding, ip6_accept_rtadv);
666 1.32 itojun return;
667 1.7 itojun }
668 1.7 itojun
669 1.32 itojun /*
670 1.32 itojun * Let's handle easy case (3) first:
671 1.49 itojun * If default router list is empty, there's nothing to be done.
672 1.32 itojun */
673 1.128 ozaki if (ND_DEFROUTER_LIST_EMPTY())
674 1.32 itojun return;
675 1.32 itojun
676 1.32 itojun /*
677 1.32 itojun * Search for a (probably) reachable router from the list.
678 1.32 itojun * We just pick up the first reachable one (if any), assuming that
679 1.32 itojun * the ordering rule of the list described in defrtrlist_update().
680 1.32 itojun */
681 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr) {
682 1.79 tonnerre ndi = ND_IFINFO(dr->ifp);
683 1.80 dyoung if (nd6_accepts_rtadv(ndi))
684 1.79 tonnerre continue;
685 1.79 tonnerre
686 1.56 rpaulo if (selected_dr == NULL &&
687 1.101 ozaki nd6_is_llinfo_probreach(dr))
688 1.32 itojun selected_dr = dr;
689 1.32 itojun
690 1.32 itojun if (dr->installed && !installed_dr)
691 1.32 itojun installed_dr = dr;
692 1.32 itojun else if (dr->installed && installed_dr) {
693 1.32 itojun /* this should not happen. warn for diagnosis. */
694 1.123 ozaki log(LOG_ERR, "nd6_defrouter_select: more than one router"
695 1.32 itojun " is installed\n");
696 1.32 itojun }
697 1.32 itojun }
698 1.32 itojun /*
699 1.32 itojun * If none of the default routers was found to be reachable,
700 1.32 itojun * round-robin the list regardless of preference.
701 1.32 itojun * Otherwise, if we have an installed router, check if the selected
702 1.32 itojun * (reachable) router should really be preferred to the installed one.
703 1.32 itojun * We only prefer the new router when the old one is not reachable
704 1.32 itojun * or when the new one has a really higher preference value.
705 1.32 itojun */
706 1.56 rpaulo if (selected_dr == NULL) {
707 1.124 ozaki if (installed_dr == NULL ||
708 1.124 ozaki ND_DEFROUTER_LIST_NEXT(installed_dr) == NULL)
709 1.124 ozaki selected_dr = ND_DEFROUTER_LIST_FIRST();
710 1.32 itojun else
711 1.124 ozaki selected_dr = ND_DEFROUTER_LIST_NEXT(installed_dr);
712 1.32 itojun } else if (installed_dr &&
713 1.101 ozaki nd6_is_llinfo_probreach(installed_dr) &&
714 1.32 itojun rtpref(selected_dr) <= rtpref(installed_dr)) {
715 1.32 itojun selected_dr = installed_dr;
716 1.32 itojun }
717 1.32 itojun
718 1.32 itojun /*
719 1.32 itojun * If the selected router is different than the installed one,
720 1.32 itojun * remove the installed router and install the selected one.
721 1.32 itojun * Note that the selected router is never NULL here.
722 1.32 itojun */
723 1.32 itojun if (installed_dr != selected_dr) {
724 1.32 itojun if (installed_dr)
725 1.32 itojun defrouter_delreq(installed_dr);
726 1.32 itojun defrouter_addreq(selected_dr);
727 1.7 itojun }
728 1.7 itojun
729 1.7 itojun return;
730 1.7 itojun }
731 1.7 itojun
732 1.32 itojun /*
733 1.32 itojun * for default router selection
734 1.32 itojun * regards router-preference field as a 2-bit signed integer
735 1.32 itojun */
736 1.32 itojun static int
737 1.32 itojun rtpref(struct nd_defrouter *dr)
738 1.32 itojun {
739 1.32 itojun switch (dr->flags & ND_RA_FLAG_RTPREF_MASK) {
740 1.32 itojun case ND_RA_FLAG_RTPREF_HIGH:
741 1.56 rpaulo return (RTPREF_HIGH);
742 1.32 itojun case ND_RA_FLAG_RTPREF_MEDIUM:
743 1.58 rpaulo case ND_RA_FLAG_RTPREF_RSV:
744 1.56 rpaulo return (RTPREF_MEDIUM);
745 1.32 itojun case ND_RA_FLAG_RTPREF_LOW:
746 1.56 rpaulo return (RTPREF_LOW);
747 1.32 itojun default:
748 1.32 itojun /*
749 1.32 itojun * This case should never happen. If it did, it would mean a
750 1.32 itojun * serious bug of kernel internal. We thus always bark here.
751 1.32 itojun * Or, can we even panic?
752 1.32 itojun */
753 1.56 rpaulo log(LOG_ERR, "rtpref: impossible RA flag %x\n", dr->flags);
754 1.56 rpaulo return (RTPREF_INVALID);
755 1.32 itojun }
756 1.32 itojun /* NOTREACHED */
757 1.32 itojun }
758 1.32 itojun
759 1.2 itojun static struct nd_defrouter *
760 1.94 matt defrtrlist_update(struct nd_defrouter *newdr)
761 1.2 itojun {
762 1.127 ozaki struct nd_defrouter *dr, *n, *ret = NULL;
763 1.94 matt struct in6_ifextra *ext = newdr->ifp->if_afdata[AF_INET6];
764 1.128 ozaki
765 1.128 ozaki ND6_ASSERT_WLOCK();
766 1.2 itojun
767 1.123 ozaki if ((dr = nd6_defrouter_lookup(&newdr->rtaddr, newdr->ifp)) != NULL) {
768 1.2 itojun /* entry exists */
769 1.94 matt if (newdr->rtlifetime == 0) {
770 1.123 ozaki nd6_defrtrlist_del(dr, ext);
771 1.2 itojun dr = NULL;
772 1.2 itojun } else {
773 1.32 itojun int oldpref = rtpref(dr);
774 1.32 itojun
775 1.2 itojun /* override */
776 1.94 matt dr->flags = newdr->flags; /* xxx flag check */
777 1.94 matt dr->rtlifetime = newdr->rtlifetime;
778 1.94 matt dr->expire = newdr->expire;
779 1.32 itojun
780 1.32 itojun /*
781 1.32 itojun * If the preference does not change, there's no need
782 1.32 itojun * to sort the entries.
783 1.32 itojun */
784 1.94 matt if (rtpref(newdr) == oldpref) {
785 1.127 ozaki ret = dr;
786 1.127 ozaki goto out;
787 1.32 itojun }
788 1.32 itojun
789 1.32 itojun /*
790 1.32 itojun * preferred router may be changed, so relocate
791 1.32 itojun * this router.
792 1.32 itojun * XXX: calling TAILQ_REMOVE directly is a bad manner.
793 1.123 ozaki * However, since nd6_defrtrlist_del() has many side
794 1.32 itojun * effects, we intentionally do so here.
795 1.123 ozaki * nd6_defrouter_select() below will handle routing
796 1.32 itojun * changes later.
797 1.32 itojun */
798 1.124 ozaki ND_DEFROUTER_LIST_REMOVE(dr);
799 1.32 itojun n = dr;
800 1.32 itojun goto insert;
801 1.2 itojun }
802 1.127 ozaki ret = dr;
803 1.127 ozaki goto out;
804 1.2 itojun }
805 1.2 itojun
806 1.127 ozaki if (ip6_maxifdefrouters >= 0 && ext->ndefrouters >= ip6_maxifdefrouters)
807 1.127 ozaki goto out;
808 1.83 christos
809 1.2 itojun /* entry does not exist */
810 1.127 ozaki if (newdr->rtlifetime == 0)
811 1.127 ozaki goto out;
812 1.2 itojun
813 1.81 spz if (ip6_rtadv_maxroutes <= nd6_numroutes) {
814 1.81 spz ICMP6_STATINC(ICMP6_STAT_DROPPED_RAROUTE);
815 1.127 ozaki goto out;
816 1.81 spz }
817 1.81 spz
818 1.2 itojun n = (struct nd_defrouter *)malloc(sizeof(*n), M_IP6NDP, M_NOWAIT);
819 1.127 ozaki if (n == NULL)
820 1.127 ozaki goto out;
821 1.78 cegger memset(n, 0, sizeof(*n));
822 1.94 matt *n = *newdr;
823 1.7 itojun
824 1.32 itojun insert:
825 1.7 itojun /*
826 1.32 itojun * Insert the new router in the Default Router List;
827 1.32 itojun * The Default Router List should be in the descending order
828 1.32 itojun * of router-preferece. Routers with the same preference are
829 1.32 itojun * sorted in the arriving time order.
830 1.7 itojun */
831 1.32 itojun
832 1.32 itojun /* insert at the end of the group */
833 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr) {
834 1.32 itojun if (rtpref(n) > rtpref(dr))
835 1.32 itojun break;
836 1.32 itojun }
837 1.32 itojun if (dr)
838 1.124 ozaki ND_DEFROUTER_LIST_INSERT_BEFORE(dr, n);
839 1.32 itojun else
840 1.124 ozaki ND_DEFROUTER_LIST_INSERT_TAIL(n);
841 1.32 itojun
842 1.123 ozaki nd6_defrouter_select();
843 1.32 itojun
844 1.83 christos ext->ndefrouters++;
845 1.83 christos
846 1.127 ozaki ret = n;
847 1.127 ozaki out:
848 1.127 ozaki return ret;
849 1.2 itojun }
850 1.2 itojun
851 1.2 itojun static struct nd_pfxrouter *
852 1.64 christos pfxrtr_lookup(struct nd_prefix *pr, struct nd_defrouter *dr)
853 1.2 itojun {
854 1.2 itojun struct nd_pfxrouter *search;
855 1.33 itojun
856 1.128 ozaki ND6_ASSERT_LOCK();
857 1.128 ozaki
858 1.62 dyoung LIST_FOREACH(search, &pr->ndpr_advrtrs, pfr_entry) {
859 1.2 itojun if (search->router == dr)
860 1.2 itojun break;
861 1.2 itojun }
862 1.2 itojun
863 1.36 itojun return (search);
864 1.2 itojun }
865 1.2 itojun
866 1.2 itojun static void
867 1.64 christos pfxrtr_add(struct nd_prefix *pr, struct nd_defrouter *dr)
868 1.2 itojun {
869 1.94 matt struct nd_pfxrouter *newpfr;
870 1.2 itojun
871 1.128 ozaki ND6_ASSERT_WLOCK();
872 1.128 ozaki
873 1.94 matt newpfr = malloc(sizeof(*newpfr), M_IP6NDP, M_NOWAIT|M_ZERO);
874 1.94 matt if (newpfr == NULL)
875 1.2 itojun return;
876 1.94 matt newpfr->router = dr;
877 1.2 itojun
878 1.94 matt LIST_INSERT_HEAD(&pr->ndpr_advrtrs, newpfr, pfr_entry);
879 1.2 itojun
880 1.123 ozaki nd6_pfxlist_onlink_check();
881 1.2 itojun }
882 1.2 itojun
883 1.2 itojun static void
884 1.64 christos pfxrtr_del(struct nd_pfxrouter *pfr)
885 1.2 itojun {
886 1.2 itojun LIST_REMOVE(pfr, pfr_entry);
887 1.2 itojun free(pfr, M_IP6NDP);
888 1.2 itojun }
889 1.2 itojun
890 1.121 ozaki static struct nd_prefix *
891 1.64 christos nd6_prefix_lookup(struct nd_prefixctl *key)
892 1.2 itojun {
893 1.2 itojun struct nd_prefix *search;
894 1.2 itojun
895 1.125 ozaki ND_PREFIX_LIST_FOREACH(search) {
896 1.94 matt if (key->ndprc_ifp == search->ndpr_ifp &&
897 1.94 matt key->ndprc_plen == search->ndpr_plen &&
898 1.94 matt in6_are_prefix_equal(&key->ndprc_prefix.sin6_addr,
899 1.94 matt &search->ndpr_prefix.sin6_addr, key->ndprc_plen)) {
900 1.2 itojun break;
901 1.2 itojun }
902 1.2 itojun }
903 1.2 itojun
904 1.36 itojun return (search);
905 1.2 itojun }
906 1.2 itojun
907 1.83 christos static void
908 1.83 christos purge_detached(struct ifnet *ifp)
909 1.83 christos {
910 1.83 christos struct nd_prefix *pr, *pr_next;
911 1.83 christos struct in6_ifaddr *ia;
912 1.93 ozaki struct ifaddr *ifa, *ifa_next;
913 1.83 christos
914 1.128 ozaki restart:
915 1.128 ozaki ND6_ASSERT_WLOCK();
916 1.128 ozaki
917 1.126 ozaki ND_PREFIX_LIST_FOREACH_SAFE(pr, pr_next) {
918 1.118 ozaki int s;
919 1.83 christos
920 1.83 christos /*
921 1.83 christos * This function is called when we need to make more room for
922 1.83 christos * new prefixes rather than keeping old, possibly stale ones.
923 1.83 christos * Detached prefixes would be a good candidate; if all routers
924 1.83 christos * that advertised the prefix expired, the prefix is also
925 1.83 christos * probably stale.
926 1.83 christos */
927 1.83 christos if (pr->ndpr_ifp != ifp ||
928 1.83 christos IN6_IS_ADDR_LINKLOCAL(&pr->ndpr_prefix.sin6_addr) ||
929 1.83 christos ((pr->ndpr_stateflags & NDPRF_DETACHED) == 0 &&
930 1.83 christos !LIST_EMPTY(&pr->ndpr_advrtrs)))
931 1.83 christos continue;
932 1.83 christos
933 1.118 ozaki s = pserialize_read_enter();
934 1.115 ozaki for (ifa = IFADDR_READER_FIRST(ifp); ifa; ifa = ifa_next) {
935 1.115 ozaki ifa_next = IFADDR_READER_NEXT(ifa);
936 1.83 christos if (ifa->ifa_addr->sa_family != AF_INET6)
937 1.83 christos continue;
938 1.83 christos ia = (struct in6_ifaddr *)ifa;
939 1.83 christos if ((ia->ia6_flags & IN6_IFF_AUTOCONF) ==
940 1.83 christos IN6_IFF_AUTOCONF && ia->ia6_ndpr == pr) {
941 1.118 ozaki pserialize_read_exit(s);
942 1.128 ozaki ND6_UNLOCK();
943 1.128 ozaki
944 1.128 ozaki /* in6_purgeaddr may destroy pr. */
945 1.83 christos in6_purgeaddr(ifa);
946 1.128 ozaki
947 1.128 ozaki ND6_WLOCK();
948 1.118 ozaki goto restart;
949 1.83 christos }
950 1.83 christos }
951 1.118 ozaki pserialize_read_exit(s);
952 1.118 ozaki
953 1.128 ozaki KASSERT(pr->ndpr_refcnt == 0);
954 1.128 ozaki nd6_prelist_remove(pr);
955 1.83 christos }
956 1.83 christos }
957 1.121 ozaki
958 1.121 ozaki static int
959 1.94 matt nd6_prelist_add(struct nd_prefixctl *prc, struct nd_defrouter *dr,
960 1.64 christos struct nd_prefix **newp)
961 1.2 itojun {
962 1.94 matt struct nd_prefix *newpr = NULL;
963 1.133 ozaki int i;
964 1.56 rpaulo int error;
965 1.94 matt struct in6_ifextra *ext = prc->ndprc_ifp->if_afdata[AF_INET6];
966 1.83 christos
967 1.128 ozaki ND6_ASSERT_WLOCK();
968 1.128 ozaki
969 1.83 christos if (ip6_maxifprefixes >= 0) {
970 1.83 christos if (ext->nprefixes >= ip6_maxifprefixes / 2)
971 1.94 matt purge_detached(prc->ndprc_ifp);
972 1.83 christos if (ext->nprefixes >= ip6_maxifprefixes)
973 1.83 christos return ENOMEM;
974 1.83 christos }
975 1.2 itojun
976 1.56 rpaulo error = 0;
977 1.94 matt newpr = malloc(sizeof(*newpr), M_IP6NDP, M_NOWAIT|M_ZERO);
978 1.94 matt if (newpr == NULL)
979 1.2 itojun return ENOMEM;
980 1.94 matt newpr->ndpr_ifp = prc->ndprc_ifp;
981 1.94 matt newpr->ndpr_prefix = prc->ndprc_prefix;
982 1.94 matt newpr->ndpr_plen = prc->ndprc_plen;
983 1.94 matt newpr->ndpr_vltime = prc->ndprc_vltime;
984 1.94 matt newpr->ndpr_pltime = prc->ndprc_pltime;
985 1.94 matt newpr->ndpr_flags = prc->ndprc_flags;
986 1.94 matt if ((error = in6_init_prefix_ltimes(newpr)) != 0) {
987 1.94 matt free(newpr, M_IP6NDP);
988 1.56 rpaulo return(error);
989 1.56 rpaulo }
990 1.102 ozaki newpr->ndpr_lastupdate = time_uptime;
991 1.32 itojun if (newp != NULL)
992 1.94 matt *newp = newpr;
993 1.2 itojun
994 1.55 rpaulo /* initialization */
995 1.94 matt LIST_INIT(&newpr->ndpr_advrtrs);
996 1.94 matt in6_prefixlen2mask(&newpr->ndpr_mask, newpr->ndpr_plen);
997 1.2 itojun /* make prefix in the canonical form */
998 1.94 matt for (i = 0; i < 4; i++) {
999 1.94 matt newpr->ndpr_prefix.sin6_addr.s6_addr32[i] &=
1000 1.94 matt newpr->ndpr_mask.s6_addr32[i];
1001 1.94 matt }
1002 1.2 itojun
1003 1.2 itojun /* link ndpr_entry to nd_prefix list */
1004 1.125 ozaki ND_PREFIX_LIST_INSERT_HEAD(newpr);
1005 1.2 itojun
1006 1.32 itojun /* ND_OPT_PI_FLAG_ONLINK processing */
1007 1.94 matt if (newpr->ndpr_raf_onlink) {
1008 1.32 itojun int e;
1009 1.32 itojun
1010 1.94 matt if ((e = nd6_prefix_onlink(newpr)) != 0) {
1011 1.130 ryo char ip6buf[INET6_ADDRSTRLEN];
1012 1.107 ozaki nd6log(LOG_ERR, "failed to make "
1013 1.32 itojun "the prefix %s/%d on-link on %s (errno=%d)\n",
1014 1.131 christos IN6_PRINT(ip6buf, &prc->ndprc_prefix.sin6_addr),
1015 1.107 ozaki prc->ndprc_plen, if_name(prc->ndprc_ifp), e);
1016 1.32 itojun /* proceed anyway. XXX: is it correct? */
1017 1.32 itojun }
1018 1.32 itojun }
1019 1.32 itojun
1020 1.2 itojun if (dr)
1021 1.94 matt pfxrtr_add(newpr, dr);
1022 1.2 itojun
1023 1.83 christos ext->nprefixes++;
1024 1.83 christos
1025 1.2 itojun return 0;
1026 1.2 itojun }
1027 1.2 itojun
1028 1.2 itojun void
1029 1.128 ozaki nd6_prefix_unref(struct nd_prefix *pr)
1030 1.128 ozaki {
1031 1.128 ozaki
1032 1.128 ozaki ND6_WLOCK();
1033 1.128 ozaki pr->ndpr_refcnt--;
1034 1.128 ozaki if (pr->ndpr_refcnt == 0)
1035 1.128 ozaki nd6_prelist_remove(pr);
1036 1.128 ozaki ND6_UNLOCK();
1037 1.128 ozaki }
1038 1.128 ozaki
1039 1.128 ozaki void
1040 1.132 ozaki nd6_invalidate_prefix(struct nd_prefix *pr)
1041 1.2 itojun {
1042 1.132 ozaki int e;
1043 1.32 itojun
1044 1.128 ozaki ND6_ASSERT_WLOCK();
1045 1.128 ozaki
1046 1.32 itojun /* make sure to invalidate the prefix until it is really freed. */
1047 1.32 itojun pr->ndpr_vltime = 0;
1048 1.32 itojun pr->ndpr_pltime = 0;
1049 1.32 itojun #if 0
1050 1.32 itojun /*
1051 1.32 itojun * Though these flags are now meaningless, we'd rather keep the value
1052 1.32 itojun * not to confuse users when executing "ndp -p".
1053 1.32 itojun */
1054 1.32 itojun pr->ndpr_raf_onlink = 0;
1055 1.32 itojun pr->ndpr_raf_auto = 0;
1056 1.32 itojun #endif
1057 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_ONLINK) != 0 &&
1058 1.32 itojun (e = nd6_prefix_offlink(pr)) != 0) {
1059 1.130 ryo char ip6buf[INET6_ADDRSTRLEN];
1060 1.107 ozaki nd6log(LOG_ERR,
1061 1.107 ozaki "failed to make %s/%d offlink on %s, errno=%d\n",
1062 1.131 christos IN6_PRINT(ip6buf, &pr->ndpr_prefix.sin6_addr),
1063 1.107 ozaki pr->ndpr_plen, if_name(pr->ndpr_ifp), e);
1064 1.32 itojun /* what should we do? */
1065 1.32 itojun }
1066 1.132 ozaki }
1067 1.132 ozaki
1068 1.132 ozaki void
1069 1.132 ozaki nd6_prelist_remove(struct nd_prefix *pr)
1070 1.132 ozaki {
1071 1.132 ozaki struct nd_pfxrouter *pfr, *next;
1072 1.132 ozaki struct in6_ifextra *ext = pr->ndpr_ifp->if_afdata[AF_INET6];
1073 1.132 ozaki
1074 1.132 ozaki ND6_ASSERT_WLOCK();
1075 1.132 ozaki KASSERT(pr->ndpr_refcnt == 0);
1076 1.132 ozaki
1077 1.132 ozaki nd6_invalidate_prefix(pr);
1078 1.32 itojun
1079 1.2 itojun /* unlink ndpr_entry from nd_prefix list */
1080 1.125 ozaki ND_PREFIX_LIST_REMOVE(pr);
1081 1.2 itojun
1082 1.2 itojun /* free list of routers that adversed the prefix */
1083 1.62 dyoung for (pfr = LIST_FIRST(&pr->ndpr_advrtrs); pfr != NULL; pfr = next) {
1084 1.62 dyoung next = LIST_NEXT(pfr, pfr_entry);
1085 1.2 itojun
1086 1.2 itojun free(pfr, M_IP6NDP);
1087 1.2 itojun }
1088 1.83 christos
1089 1.86 christos if (ext) {
1090 1.86 christos ext->nprefixes--;
1091 1.86 christos if (ext->nprefixes < 0) {
1092 1.123 ozaki log(LOG_WARNING, "nd6_prelist_remove: negative count on "
1093 1.86 christos "%s\n", pr->ndpr_ifp->if_xname);
1094 1.86 christos }
1095 1.83 christos }
1096 1.21 itojun
1097 1.2 itojun free(pr, M_IP6NDP);
1098 1.2 itojun
1099 1.123 ozaki nd6_pfxlist_onlink_check();
1100 1.2 itojun }
1101 1.2 itojun
1102 1.56 rpaulo static int
1103 1.94 matt prelist_update(struct nd_prefixctl *newprc,
1104 1.64 christos struct nd_defrouter *dr, /* may be NULL */
1105 1.64 christos struct mbuf *m,
1106 1.64 christos int mcast)
1107 1.2 itojun {
1108 1.114 ozaki struct in6_ifaddr *ia6_match = NULL;
1109 1.32 itojun struct ifaddr *ifa;
1110 1.94 matt struct ifnet *ifp = newprc->ndprc_ifp;
1111 1.2 itojun struct nd_prefix *pr;
1112 1.2 itojun int error = 0;
1113 1.2 itojun int auth;
1114 1.32 itojun struct in6_addrlifetime lt6_tmp;
1115 1.118 ozaki int ss;
1116 1.130 ryo char ip6buf[INET6_ADDRSTRLEN];
1117 1.2 itojun
1118 1.128 ozaki ND6_ASSERT_WLOCK();
1119 1.128 ozaki
1120 1.7 itojun auth = 0;
1121 1.2 itojun if (m) {
1122 1.2 itojun /*
1123 1.2 itojun * Authenticity for NA consists authentication for
1124 1.2 itojun * both IP header and IP datagrams, doesn't it ?
1125 1.2 itojun */
1126 1.7 itojun #if defined(M_AUTHIPHDR) && defined(M_AUTHIPDGM)
1127 1.2 itojun auth = (m->m_flags & M_AUTHIPHDR
1128 1.2 itojun && m->m_flags & M_AUTHIPDGM) ? 1 : 0;
1129 1.7 itojun #endif
1130 1.7 itojun }
1131 1.2 itojun
1132 1.94 matt if ((pr = nd6_prefix_lookup(newprc)) != NULL) {
1133 1.32 itojun /*
1134 1.94 matt * nd6_prefix_lookup() ensures that pr and newprc have the same
1135 1.32 itojun * prefix on a same interface.
1136 1.32 itojun */
1137 1.32 itojun
1138 1.32 itojun /*
1139 1.32 itojun * Update prefix information. Note that the on-link (L) bit
1140 1.32 itojun * and the autonomous (A) bit should NOT be changed from 1
1141 1.32 itojun * to 0.
1142 1.32 itojun */
1143 1.94 matt if (newprc->ndprc_raf_onlink == 1)
1144 1.32 itojun pr->ndpr_raf_onlink = 1;
1145 1.94 matt if (newprc->ndprc_raf_auto == 1)
1146 1.32 itojun pr->ndpr_raf_auto = 1;
1147 1.94 matt if (newprc->ndprc_raf_onlink) {
1148 1.94 matt pr->ndpr_vltime = newprc->ndprc_vltime;
1149 1.94 matt pr->ndpr_pltime = newprc->ndprc_pltime;
1150 1.56 rpaulo (void)in6_init_prefix_ltimes(pr); /* XXX error case? */
1151 1.102 ozaki pr->ndpr_lastupdate = time_uptime;
1152 1.32 itojun }
1153 1.32 itojun
1154 1.94 matt if (newprc->ndprc_raf_onlink &&
1155 1.32 itojun (pr->ndpr_stateflags & NDPRF_ONLINK) == 0) {
1156 1.32 itojun int e;
1157 1.32 itojun
1158 1.32 itojun if ((e = nd6_prefix_onlink(pr)) != 0) {
1159 1.107 ozaki nd6log(LOG_ERR,
1160 1.107 ozaki "failed to make "
1161 1.32 itojun "the prefix %s/%d on-link on %s "
1162 1.107 ozaki "(errno=%d)\n",
1163 1.131 christos IN6_PRINT(ip6buf,
1164 1.130 ryo &pr->ndpr_prefix.sin6_addr),
1165 1.107 ozaki pr->ndpr_plen, if_name(pr->ndpr_ifp), e);
1166 1.32 itojun /* proceed anyway. XXX: is it correct? */
1167 1.32 itojun }
1168 1.32 itojun }
1169 1.32 itojun
1170 1.32 itojun if (dr && pfxrtr_lookup(pr, dr) == NULL)
1171 1.32 itojun pfxrtr_add(pr, dr);
1172 1.32 itojun } else {
1173 1.32 itojun struct nd_prefix *newpr = NULL;
1174 1.32 itojun
1175 1.94 matt if (newprc->ndprc_vltime == 0)
1176 1.2 itojun goto end;
1177 1.94 matt if (newprc->ndprc_raf_onlink == 0 && newprc->ndprc_raf_auto == 0)
1178 1.32 itojun goto end;
1179 1.32 itojun
1180 1.81 spz if (ip6_rtadv_maxroutes <= nd6_numroutes) {
1181 1.81 spz ICMP6_STATINC(ICMP6_STAT_DROPPED_RAROUTE);
1182 1.81 spz goto end;
1183 1.81 spz }
1184 1.81 spz
1185 1.94 matt error = nd6_prelist_add(newprc, dr, &newpr);
1186 1.32 itojun if (error != 0 || newpr == NULL) {
1187 1.107 ozaki nd6log(LOG_NOTICE,
1188 1.107 ozaki "nd6_prelist_add failed for %s/%d on %s "
1189 1.107 ozaki "errno=%d, returnpr=%p\n",
1190 1.131 christos IN6_PRINT(ip6buf, &newprc->ndprc_prefix.sin6_addr),
1191 1.94 matt newprc->ndprc_plen, if_name(newprc->ndprc_ifp),
1192 1.107 ozaki error, newpr);
1193 1.32 itojun goto end; /* we should just give up in this case. */
1194 1.2 itojun }
1195 1.2 itojun
1196 1.2 itojun /*
1197 1.32 itojun * XXX: from the ND point of view, we can ignore a prefix
1198 1.32 itojun * with the on-link bit being zero. However, we need a
1199 1.32 itojun * prefix structure for references from autoconfigured
1200 1.32 itojun * addresses. Thus, we explicitly make sure that the prefix
1201 1.32 itojun * itself expires now.
1202 1.2 itojun */
1203 1.32 itojun if (newpr->ndpr_raf_onlink == 0) {
1204 1.32 itojun newpr->ndpr_vltime = 0;
1205 1.32 itojun newpr->ndpr_pltime = 0;
1206 1.32 itojun in6_init_prefix_ltimes(newpr);
1207 1.32 itojun }
1208 1.2 itojun
1209 1.32 itojun pr = newpr;
1210 1.32 itojun }
1211 1.32 itojun
1212 1.32 itojun /*
1213 1.32 itojun * Address autoconfiguration based on Section 5.5.3 of RFC 2462.
1214 1.32 itojun * Note that pr must be non NULL at this point.
1215 1.32 itojun */
1216 1.32 itojun
1217 1.32 itojun /* 5.5.3 (a). Ignore the prefix without the A bit set. */
1218 1.94 matt if (!newprc->ndprc_raf_auto)
1219 1.32 itojun goto end;
1220 1.2 itojun
1221 1.32 itojun /*
1222 1.32 itojun * 5.5.3 (b). the link-local prefix should have been ignored in
1223 1.32 itojun * nd6_ra_input.
1224 1.32 itojun */
1225 1.2 itojun
1226 1.56 rpaulo /* 5.5.3 (c). Consistency check on lifetimes: pltime <= vltime. */
1227 1.94 matt if (newprc->ndprc_pltime > newprc->ndprc_vltime) {
1228 1.56 rpaulo error = EINVAL; /* XXX: won't be used */
1229 1.56 rpaulo goto end;
1230 1.56 rpaulo }
1231 1.2 itojun
1232 1.32 itojun /*
1233 1.56 rpaulo * 5.5.3 (d). If the prefix advertised is not equal to the prefix of
1234 1.56 rpaulo * an address configured by stateless autoconfiguration already in the
1235 1.56 rpaulo * list of addresses associated with the interface, and the Valid
1236 1.56 rpaulo * Lifetime is not 0, form an address. We first check if we have
1237 1.56 rpaulo * a matching prefix.
1238 1.56 rpaulo * Note: we apply a clarification in rfc2462bis-02 here. We only
1239 1.56 rpaulo * consider autoconfigured addresses while RFC2462 simply said
1240 1.56 rpaulo * "address".
1241 1.32 itojun */
1242 1.118 ozaki ss = pserialize_read_enter();
1243 1.115 ozaki IFADDR_READER_FOREACH(ifa, ifp) {
1244 1.114 ozaki struct in6_ifaddr *ia6;
1245 1.56 rpaulo u_int32_t remaininglifetime;
1246 1.2 itojun
1247 1.32 itojun if (ifa->ifa_addr->sa_family != AF_INET6)
1248 1.32 itojun continue;
1249 1.2 itojun
1250 1.114 ozaki ia6 = (struct in6_ifaddr *)ifa;
1251 1.2 itojun
1252 1.32 itojun /*
1253 1.56 rpaulo * We only consider autoconfigured addresses as per rfc2462bis.
1254 1.56 rpaulo */
1255 1.114 ozaki if (!(ia6->ia6_flags & IN6_IFF_AUTOCONF))
1256 1.56 rpaulo continue;
1257 1.56 rpaulo
1258 1.56 rpaulo /*
1259 1.32 itojun * Spec is not clear here, but I believe we should concentrate
1260 1.32 itojun * on unicast (i.e. not anycast) addresses.
1261 1.32 itojun * XXX: other ia6_flags? detached or duplicated?
1262 1.32 itojun */
1263 1.114 ozaki if ((ia6->ia6_flags & IN6_IFF_ANYCAST) != 0)
1264 1.32 itojun continue;
1265 1.33 itojun
1266 1.56 rpaulo /*
1267 1.56 rpaulo * Ignore the address if it is not associated with a prefix
1268 1.56 rpaulo * or is associated with a prefix that is different from this
1269 1.56 rpaulo * one. (pr is never NULL here)
1270 1.56 rpaulo */
1271 1.114 ozaki if (ia6->ia6_ndpr != pr)
1272 1.32 itojun continue;
1273 1.7 itojun
1274 1.32 itojun if (ia6_match == NULL) /* remember the first one */
1275 1.114 ozaki ia6_match = ia6;
1276 1.2 itojun
1277 1.32 itojun /*
1278 1.32 itojun * An already autoconfigured address matched. Now that we
1279 1.32 itojun * are sure there is at least one matched address, we can
1280 1.32 itojun * proceed to 5.5.3. (e): update the lifetimes according to the
1281 1.32 itojun * "two hours" rule and the privacy extension.
1282 1.56 rpaulo * We apply some clarifications in rfc2462bis:
1283 1.56 rpaulo * - use remaininglifetime instead of storedlifetime as a
1284 1.56 rpaulo * variable name
1285 1.56 rpaulo * - remove the dead code in the "two-hour" rule
1286 1.32 itojun */
1287 1.32 itojun #define TWOHOUR (120*60)
1288 1.114 ozaki lt6_tmp = ia6->ia6_lifetime;
1289 1.32 itojun if (lt6_tmp.ia6t_vltime == ND6_INFINITE_LIFETIME)
1290 1.56 rpaulo remaininglifetime = ND6_INFINITE_LIFETIME;
1291 1.114 ozaki else if (time_uptime - ia6->ia6_updatetime >
1292 1.32 itojun lt6_tmp.ia6t_vltime) {
1293 1.32 itojun /*
1294 1.32 itojun * The case of "invalid" address. We should usually
1295 1.32 itojun * not see this case.
1296 1.32 itojun */
1297 1.56 rpaulo remaininglifetime = 0;
1298 1.32 itojun } else
1299 1.56 rpaulo remaininglifetime = lt6_tmp.ia6t_vltime -
1300 1.114 ozaki (time_uptime - ia6->ia6_updatetime);
1301 1.56 rpaulo
1302 1.56 rpaulo /* when not updating, keep the current stored lifetime. */
1303 1.56 rpaulo lt6_tmp.ia6t_vltime = remaininglifetime;
1304 1.56 rpaulo
1305 1.94 matt if (TWOHOUR < newprc->ndprc_vltime ||
1306 1.94 matt remaininglifetime < newprc->ndprc_vltime) {
1307 1.94 matt lt6_tmp.ia6t_vltime = newprc->ndprc_vltime;
1308 1.56 rpaulo } else if (remaininglifetime <= TWOHOUR) {
1309 1.56 rpaulo if (auth)
1310 1.94 matt lt6_tmp.ia6t_vltime = newprc->ndprc_vltime;
1311 1.32 itojun } else {
1312 1.32 itojun /*
1313 1.94 matt * newprc->ndprc_vltime <= TWOHOUR &&
1314 1.56 rpaulo * TWOHOUR < remaininglifetime
1315 1.32 itojun */
1316 1.32 itojun lt6_tmp.ia6t_vltime = TWOHOUR;
1317 1.2 itojun }
1318 1.2 itojun
1319 1.32 itojun /* The 2 hour rule is not imposed for preferred lifetime. */
1320 1.94 matt lt6_tmp.ia6t_pltime = newprc->ndprc_pltime;
1321 1.2 itojun
1322 1.32 itojun in6_init_address_ltimes(pr, <6_tmp);
1323 1.2 itojun
1324 1.56 rpaulo /*
1325 1.56 rpaulo * We need to treat lifetimes for temporary addresses
1326 1.56 rpaulo * differently, according to
1327 1.56 rpaulo * draft-ietf-ipv6-privacy-addrs-v2-01.txt 3.3 (1);
1328 1.56 rpaulo * we only update the lifetimes when they are in the maximum
1329 1.56 rpaulo * intervals.
1330 1.56 rpaulo */
1331 1.114 ozaki if ((ia6->ia6_flags & IN6_IFF_TEMPORARY) != 0) {
1332 1.56 rpaulo u_int32_t maxvltime, maxpltime;
1333 1.56 rpaulo
1334 1.56 rpaulo if (ip6_temp_valid_lifetime >
1335 1.114 ozaki (u_int32_t)((time_uptime - ia6->ia6_createtime) +
1336 1.56 rpaulo ip6_desync_factor)) {
1337 1.56 rpaulo maxvltime = ip6_temp_valid_lifetime -
1338 1.114 ozaki (time_uptime - ia6->ia6_createtime) -
1339 1.56 rpaulo ip6_desync_factor;
1340 1.56 rpaulo } else
1341 1.56 rpaulo maxvltime = 0;
1342 1.56 rpaulo if (ip6_temp_preferred_lifetime >
1343 1.114 ozaki (u_int32_t)((time_uptime - ia6->ia6_createtime) +
1344 1.56 rpaulo ip6_desync_factor)) {
1345 1.56 rpaulo maxpltime = ip6_temp_preferred_lifetime -
1346 1.114 ozaki (time_uptime - ia6->ia6_createtime) -
1347 1.56 rpaulo ip6_desync_factor;
1348 1.56 rpaulo } else
1349 1.56 rpaulo maxpltime = 0;
1350 1.56 rpaulo
1351 1.56 rpaulo if (lt6_tmp.ia6t_vltime == ND6_INFINITE_LIFETIME ||
1352 1.56 rpaulo lt6_tmp.ia6t_vltime > maxvltime) {
1353 1.56 rpaulo lt6_tmp.ia6t_vltime = maxvltime;
1354 1.56 rpaulo }
1355 1.56 rpaulo if (lt6_tmp.ia6t_pltime == ND6_INFINITE_LIFETIME ||
1356 1.56 rpaulo lt6_tmp.ia6t_pltime > maxpltime) {
1357 1.56 rpaulo lt6_tmp.ia6t_pltime = maxpltime;
1358 1.56 rpaulo }
1359 1.56 rpaulo }
1360 1.56 rpaulo
1361 1.114 ozaki ia6->ia6_lifetime = lt6_tmp;
1362 1.114 ozaki ia6->ia6_updatetime = time_uptime;
1363 1.32 itojun }
1364 1.118 ozaki pserialize_read_exit(ss);
1365 1.118 ozaki
1366 1.94 matt if (ia6_match == NULL && newprc->ndprc_vltime) {
1367 1.56 rpaulo int ifidlen;
1368 1.114 ozaki struct in6_ifaddr *ia6;
1369 1.118 ozaki struct psref psref;
1370 1.56 rpaulo
1371 1.2 itojun /*
1372 1.56 rpaulo * 5.5.3 (d) (continued)
1373 1.32 itojun * No address matched and the valid lifetime is non-zero.
1374 1.32 itojun * Create a new address.
1375 1.2 itojun */
1376 1.56 rpaulo
1377 1.56 rpaulo /*
1378 1.56 rpaulo * Prefix Length check:
1379 1.56 rpaulo * If the sum of the prefix length and interface identifier
1380 1.56 rpaulo * length does not equal 128 bits, the Prefix Information
1381 1.56 rpaulo * option MUST be ignored. The length of the interface
1382 1.56 rpaulo * identifier is defined in a separate link-type specific
1383 1.56 rpaulo * document.
1384 1.56 rpaulo */
1385 1.56 rpaulo ifidlen = in6_if2idlen(ifp);
1386 1.56 rpaulo if (ifidlen < 0) {
1387 1.56 rpaulo /* this should not happen, so we always log it. */
1388 1.106 ozaki log(LOG_ERR, "%s: IFID undefined (%s)\n",
1389 1.106 ozaki __func__, if_name(ifp));
1390 1.56 rpaulo goto end;
1391 1.56 rpaulo }
1392 1.56 rpaulo if (ifidlen + pr->ndpr_plen != 128) {
1393 1.107 ozaki nd6log(LOG_INFO,
1394 1.107 ozaki "invalid prefixlen %d for %s, ignored\n",
1395 1.107 ozaki pr->ndpr_plen, if_name(ifp));
1396 1.56 rpaulo goto end;
1397 1.56 rpaulo }
1398 1.56 rpaulo
1399 1.118 ozaki if ((ia6 = in6_ifadd(newprc, mcast, &psref)) != NULL) {
1400 1.32 itojun /*
1401 1.94 matt * note that we should use pr (not newprc) for reference.
1402 1.32 itojun */
1403 1.32 itojun pr->ndpr_refcnt++;
1404 1.32 itojun ia6->ia6_ndpr = pr;
1405 1.2 itojun
1406 1.119 roy /* toggle onlink state if the address was assigned
1407 1.119 roy * a prefix route. */
1408 1.119 roy if (ia6->ia_flags & IFA_ROUTE)
1409 1.119 roy pr->ndpr_stateflags |= NDPRF_ONLINK;
1410 1.119 roy
1411 1.32 itojun /*
1412 1.56 rpaulo * draft-ietf-ipngwg-temp-addresses-v2-00 3.3 (2).
1413 1.56 rpaulo * When a new public address is created as described
1414 1.56 rpaulo * in RFC2462, also create a new temporary address.
1415 1.56 rpaulo *
1416 1.56 rpaulo * draft-ietf-ipngwg-temp-addresses-v2-00 3.5.
1417 1.56 rpaulo * When an interface connects to a new link, a new
1418 1.56 rpaulo * randomized interface identifier should be generated
1419 1.56 rpaulo * immediately together with a new set of temporary
1420 1.56 rpaulo * addresses. Thus, we specifiy 1 as the 2nd arg of
1421 1.56 rpaulo * in6_tmpifadd().
1422 1.56 rpaulo */
1423 1.56 rpaulo if (ip6_use_tempaddr) {
1424 1.56 rpaulo int e;
1425 1.56 rpaulo if ((e = in6_tmpifadd(ia6, 1, 1)) != 0) {
1426 1.107 ozaki nd6log(LOG_NOTICE,
1427 1.107 ozaki "failed to create a temporary "
1428 1.107 ozaki "address, errno=%d\n", e);
1429 1.56 rpaulo }
1430 1.56 rpaulo }
1431 1.118 ozaki ia6_release(ia6, &psref);
1432 1.56 rpaulo
1433 1.56 rpaulo /*
1434 1.32 itojun * A newly added address might affect the status
1435 1.32 itojun * of other addresses, so we check and update it.
1436 1.32 itojun * XXX: what if address duplication happens?
1437 1.32 itojun */
1438 1.123 ozaki nd6_pfxlist_onlink_check();
1439 1.32 itojun } else {
1440 1.32 itojun /* just set an error. do not bark here. */
1441 1.32 itojun error = EADDRNOTAVAIL; /* XXX: might be unused. */
1442 1.32 itojun }
1443 1.2 itojun }
1444 1.2 itojun
1445 1.2 itojun end:
1446 1.2 itojun return error;
1447 1.2 itojun }
1448 1.2 itojun
1449 1.2 itojun /*
1450 1.7 itojun * A supplement function used in the on-link detection below;
1451 1.7 itojun * detect if a given prefix has a (probably) reachable advertising router.
1452 1.7 itojun * XXX: lengthy function name...
1453 1.7 itojun */
1454 1.7 itojun static struct nd_pfxrouter *
1455 1.64 christos find_pfxlist_reachable_router(struct nd_prefix *pr)
1456 1.7 itojun {
1457 1.7 itojun struct nd_pfxrouter *pfxrtr;
1458 1.7 itojun
1459 1.7 itojun for (pfxrtr = LIST_FIRST(&pr->ndpr_advrtrs); pfxrtr;
1460 1.7 itojun pfxrtr = LIST_NEXT(pfxrtr, pfr_entry)) {
1461 1.89 roy if (pfxrtr->router->ifp->if_flags & IFF_UP &&
1462 1.89 roy pfxrtr->router->ifp->if_link_state != LINK_STATE_DOWN &&
1463 1.101 ozaki nd6_is_llinfo_probreach(pfxrtr->router))
1464 1.7 itojun break; /* found */
1465 1.7 itojun }
1466 1.7 itojun
1467 1.36 itojun return (pfxrtr);
1468 1.7 itojun }
1469 1.7 itojun
1470 1.7 itojun /*
1471 1.2 itojun * Check if each prefix in the prefix list has at least one available router
1472 1.25 itojun * that advertised the prefix (a router is "available" if its neighbor cache
1473 1.25 itojun * entry is reachable or probably reachable).
1474 1.7 itojun * If the check fails, the prefix may be off-link, because, for example,
1475 1.2 itojun * we have moved from the network but the lifetime of the prefix has not
1476 1.25 itojun * expired yet. So we should not use the prefix if there is another prefix
1477 1.25 itojun * that has an available router.
1478 1.25 itojun * But, if there is no prefix that has an available router, we still regards
1479 1.25 itojun * all the prefixes as on-link. This is because we can't tell if all the
1480 1.2 itojun * routers are simply dead or if we really moved from the network and there
1481 1.2 itojun * is no router around us.
1482 1.2 itojun */
1483 1.7 itojun void
1484 1.123 ozaki nd6_pfxlist_onlink_check(void)
1485 1.2 itojun {
1486 1.2 itojun struct nd_prefix *pr;
1487 1.114 ozaki struct in6_ifaddr *ia;
1488 1.56 rpaulo struct nd_defrouter *dr;
1489 1.56 rpaulo struct nd_pfxrouter *pfxrtr = NULL;
1490 1.118 ozaki int s;
1491 1.130 ryo char ip6buf[INET6_ADDRSTRLEN];
1492 1.2 itojun
1493 1.128 ozaki ND6_ASSERT_WLOCK();
1494 1.128 ozaki
1495 1.7 itojun /*
1496 1.7 itojun * Check if there is a prefix that has a reachable advertising
1497 1.7 itojun * router.
1498 1.7 itojun */
1499 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
1500 1.32 itojun if (pr->ndpr_raf_onlink && find_pfxlist_reachable_router(pr))
1501 1.2 itojun break;
1502 1.7 itojun }
1503 1.56 rpaulo /*
1504 1.56 rpaulo * If we have no such prefix, check whether we still have a router
1505 1.56 rpaulo * that does not advertise any prefixes.
1506 1.56 rpaulo */
1507 1.56 rpaulo if (pr == NULL) {
1508 1.124 ozaki ND_DEFROUTER_LIST_FOREACH(dr) {
1509 1.56 rpaulo struct nd_prefix *pr0;
1510 1.56 rpaulo
1511 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr0) {
1512 1.56 rpaulo if ((pfxrtr = pfxrtr_lookup(pr0, dr)) != NULL)
1513 1.56 rpaulo break;
1514 1.56 rpaulo }
1515 1.56 rpaulo if (pfxrtr)
1516 1.56 rpaulo break;
1517 1.56 rpaulo }
1518 1.56 rpaulo }
1519 1.124 ozaki if (pr != NULL || (!ND_DEFROUTER_LIST_EMPTY() && !pfxrtr)) {
1520 1.2 itojun /*
1521 1.32 itojun * There is at least one prefix that has a reachable router,
1522 1.32 itojun * or at least a router which probably does not advertise
1523 1.32 itojun * any prefixes. The latter would be the case when we move
1524 1.32 itojun * to a new link where we have a router that does not provide
1525 1.32 itojun * prefixes and we configure an address by hand.
1526 1.32 itojun * Detach prefixes which have no reachable advertising
1527 1.32 itojun * router, and attach other prefixes.
1528 1.2 itojun */
1529 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
1530 1.32 itojun /* XXX: a link-local prefix should never be detached */
1531 1.32 itojun if (IN6_IS_ADDR_LINKLOCAL(&pr->ndpr_prefix.sin6_addr))
1532 1.32 itojun continue;
1533 1.32 itojun
1534 1.32 itojun /*
1535 1.32 itojun * we aren't interested in prefixes without the L bit
1536 1.32 itojun * set.
1537 1.32 itojun */
1538 1.32 itojun if (pr->ndpr_raf_onlink == 0)
1539 1.32 itojun continue;
1540 1.32 itojun
1541 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) == 0 &&
1542 1.32 itojun find_pfxlist_reachable_router(pr) == NULL)
1543 1.32 itojun pr->ndpr_stateflags |= NDPRF_DETACHED;
1544 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) != 0 &&
1545 1.32 itojun find_pfxlist_reachable_router(pr) != 0)
1546 1.32 itojun pr->ndpr_stateflags &= ~NDPRF_DETACHED;
1547 1.32 itojun }
1548 1.32 itojun } else {
1549 1.32 itojun /* there is no prefix that has a reachable router */
1550 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
1551 1.32 itojun if (IN6_IS_ADDR_LINKLOCAL(&pr->ndpr_prefix.sin6_addr))
1552 1.32 itojun continue;
1553 1.32 itojun
1554 1.32 itojun if (pr->ndpr_raf_onlink == 0)
1555 1.32 itojun continue;
1556 1.32 itojun
1557 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) != 0)
1558 1.32 itojun pr->ndpr_stateflags &= ~NDPRF_DETACHED;
1559 1.32 itojun }
1560 1.32 itojun }
1561 1.32 itojun
1562 1.32 itojun /*
1563 1.32 itojun * Remove each interface route associated with a (just) detached
1564 1.32 itojun * prefix, and reinstall the interface route for a (just) attached
1565 1.32 itojun * prefix. Note that all attempt of reinstallation does not
1566 1.32 itojun * necessarily success, when a same prefix is shared among multiple
1567 1.32 itojun * interfaces. Such cases will be handled in nd6_prefix_onlink,
1568 1.32 itojun * so we don't have to care about them.
1569 1.32 itojun */
1570 1.125 ozaki ND_PREFIX_LIST_FOREACH(pr) {
1571 1.32 itojun int e;
1572 1.32 itojun
1573 1.32 itojun if (IN6_IS_ADDR_LINKLOCAL(&pr->ndpr_prefix.sin6_addr))
1574 1.32 itojun continue;
1575 1.32 itojun
1576 1.32 itojun if (pr->ndpr_raf_onlink == 0)
1577 1.32 itojun continue;
1578 1.32 itojun
1579 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) != 0 &&
1580 1.32 itojun (pr->ndpr_stateflags & NDPRF_ONLINK) != 0) {
1581 1.32 itojun if ((e = nd6_prefix_offlink(pr)) != 0) {
1582 1.107 ozaki nd6log(LOG_ERR,
1583 1.107 ozaki "failed to make %s/%d offlink, errno=%d\n",
1584 1.131 christos IN6_PRINT(ip6buf,
1585 1.130 ryo &pr->ndpr_prefix.sin6_addr),
1586 1.107 ozaki pr->ndpr_plen, e);
1587 1.2 itojun }
1588 1.2 itojun }
1589 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_DETACHED) == 0 &&
1590 1.32 itojun (pr->ndpr_stateflags & NDPRF_ONLINK) == 0 &&
1591 1.32 itojun pr->ndpr_raf_onlink) {
1592 1.32 itojun if ((e = nd6_prefix_onlink(pr)) != 0) {
1593 1.107 ozaki nd6log(LOG_ERR,
1594 1.107 ozaki "failed to make %s/%d onlink, errno=%d\n",
1595 1.131 christos IN6_PRINT(ip6buf,
1596 1.130 ryo &pr->ndpr_prefix.sin6_addr),
1597 1.107 ozaki pr->ndpr_plen, e);
1598 1.32 itojun }
1599 1.32 itojun }
1600 1.32 itojun }
1601 1.32 itojun
1602 1.32 itojun /*
1603 1.32 itojun * Changes on the prefix status might affect address status as well.
1604 1.32 itojun * Make sure that all addresses derived from an attached prefix are
1605 1.32 itojun * attached, and that all addresses derived from a detached prefix are
1606 1.32 itojun * detached. Note, however, that a manually configured address should
1607 1.32 itojun * always be attached.
1608 1.32 itojun * The precise detection logic is same as the one for prefixes.
1609 1.32 itojun */
1610 1.118 ozaki s = pserialize_read_enter();
1611 1.114 ozaki IN6_ADDRLIST_READER_FOREACH(ia) {
1612 1.114 ozaki if (!(ia->ia6_flags & IN6_IFF_AUTOCONF))
1613 1.32 itojun continue;
1614 1.32 itojun
1615 1.114 ozaki if (ia->ia6_ndpr == NULL) {
1616 1.32 itojun /*
1617 1.32 itojun * This can happen when we first configure the address
1618 1.32 itojun * (i.e. the address exists, but the prefix does not).
1619 1.32 itojun * XXX: complicated relationships...
1620 1.32 itojun */
1621 1.32 itojun continue;
1622 1.32 itojun }
1623 1.32 itojun
1624 1.114 ozaki if (find_pfxlist_reachable_router(ia->ia6_ndpr))
1625 1.32 itojun break;
1626 1.32 itojun }
1627 1.118 ozaki pserialize_read_exit(s);
1628 1.114 ozaki
1629 1.114 ozaki if (ia) {
1630 1.118 ozaki int bound = curlwp_bind();
1631 1.118 ozaki
1632 1.118 ozaki s = pserialize_read_enter();
1633 1.114 ozaki IN6_ADDRLIST_READER_FOREACH(ia) {
1634 1.118 ozaki struct ifaddr *ifa = (struct ifaddr *)ia;
1635 1.118 ozaki struct psref psref;
1636 1.118 ozaki
1637 1.114 ozaki if ((ia->ia6_flags & IN6_IFF_AUTOCONF) == 0)
1638 1.32 itojun continue;
1639 1.32 itojun
1640 1.114 ozaki if (ia->ia6_ndpr == NULL) /* XXX: see above. */
1641 1.32 itojun continue;
1642 1.32 itojun
1643 1.118 ozaki ia6_acquire(ia, &psref);
1644 1.118 ozaki pserialize_read_exit(s);
1645 1.118 ozaki
1646 1.114 ozaki if (find_pfxlist_reachable_router(ia->ia6_ndpr)) {
1647 1.114 ozaki if (ia->ia6_flags & IN6_IFF_DETACHED) {
1648 1.114 ozaki ia->ia6_flags &= ~IN6_IFF_DETACHED;
1649 1.114 ozaki ia->ia6_flags |= IN6_IFF_TENTATIVE;
1650 1.118 ozaki nd6_dad_start(ifa,
1651 1.56 rpaulo 0);
1652 1.87 roy /* We will notify the routing socket
1653 1.87 roy * of the DAD result, so no need to
1654 1.87 roy * here */
1655 1.56 rpaulo }
1656 1.56 rpaulo } else {
1657 1.114 ozaki if ((ia->ia6_flags & IN6_IFF_DETACHED) == 0) {
1658 1.114 ozaki ia->ia6_flags |= IN6_IFF_DETACHED;
1659 1.97 roy rt_newaddrmsg(RTM_NEWADDR,
1660 1.118 ozaki ifa, 0, NULL);
1661 1.56 rpaulo }
1662 1.56 rpaulo }
1663 1.118 ozaki
1664 1.118 ozaki s = pserialize_read_enter();
1665 1.118 ozaki ia6_release(ia, &psref);
1666 1.2 itojun }
1667 1.118 ozaki pserialize_read_exit(s);
1668 1.118 ozaki curlwp_bindx(bound);
1669 1.2 itojun }
1670 1.2 itojun else {
1671 1.118 ozaki int bound = curlwp_bind();
1672 1.118 ozaki
1673 1.118 ozaki s = pserialize_read_enter();
1674 1.114 ozaki IN6_ADDRLIST_READER_FOREACH(ia) {
1675 1.114 ozaki if ((ia->ia6_flags & IN6_IFF_AUTOCONF) == 0)
1676 1.32 itojun continue;
1677 1.32 itojun
1678 1.114 ozaki if (ia->ia6_flags & IN6_IFF_DETACHED) {
1679 1.118 ozaki struct ifaddr *ifa = (struct ifaddr *)ia;
1680 1.118 ozaki struct psref psref;
1681 1.118 ozaki
1682 1.114 ozaki ia->ia6_flags &= ~IN6_IFF_DETACHED;
1683 1.114 ozaki ia->ia6_flags |= IN6_IFF_TENTATIVE;
1684 1.118 ozaki
1685 1.118 ozaki ia6_acquire(ia, &psref);
1686 1.118 ozaki pserialize_read_exit(s);
1687 1.118 ozaki
1688 1.56 rpaulo /* Do we need a delay in this case? */
1689 1.118 ozaki nd6_dad_start(ifa, 0);
1690 1.118 ozaki
1691 1.118 ozaki s = pserialize_read_enter();
1692 1.118 ozaki ia6_release(ia, &psref);
1693 1.56 rpaulo }
1694 1.32 itojun }
1695 1.118 ozaki pserialize_read_exit(s);
1696 1.118 ozaki curlwp_bindx(bound);
1697 1.2 itojun }
1698 1.2 itojun }
1699 1.2 itojun
1700 1.121 ozaki static int
1701 1.64 christos nd6_prefix_onlink(struct nd_prefix *pr)
1702 1.2 itojun {
1703 1.32 itojun struct ifaddr *ifa;
1704 1.32 itojun struct ifnet *ifp = pr->ndpr_ifp;
1705 1.32 itojun struct sockaddr_in6 mask6;
1706 1.32 itojun struct nd_prefix *opr;
1707 1.32 itojun u_long rtflags;
1708 1.32 itojun int error = 0;
1709 1.118 ozaki struct psref psref;
1710 1.118 ozaki int bound;
1711 1.130 ryo char ip6buf[INET6_ADDRSTRLEN];
1712 1.130 ryo char ip6bufp[INET6_ADDRSTRLEN], ip6bufm[INET6_ADDRSTRLEN];
1713 1.32 itojun
1714 1.128 ozaki ND6_ASSERT_WLOCK();
1715 1.128 ozaki
1716 1.32 itojun /* sanity check */
1717 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_ONLINK) != 0) {
1718 1.107 ozaki nd6log(LOG_ERR, "%s/%d is already on-link\n",
1719 1.131 christos IN6_PRINT(ip6buf, &pr->ndpr_prefix.sin6_addr),
1720 1.130 ryo pr->ndpr_plen);
1721 1.51 itojun return (EEXIST);
1722 1.32 itojun }
1723 1.32 itojun
1724 1.32 itojun /*
1725 1.32 itojun * Add the interface route associated with the prefix. Before
1726 1.32 itojun * installing the route, check if there's the same prefix on another
1727 1.32 itojun * interface, and the prefix has already installed the interface route.
1728 1.32 itojun * Although such a configuration is expected to be rare, we explicitly
1729 1.32 itojun * allow it.
1730 1.32 itojun */
1731 1.125 ozaki ND_PREFIX_LIST_FOREACH(opr) {
1732 1.32 itojun if (opr == pr)
1733 1.32 itojun continue;
1734 1.32 itojun
1735 1.32 itojun if ((opr->ndpr_stateflags & NDPRF_ONLINK) == 0)
1736 1.32 itojun continue;
1737 1.32 itojun
1738 1.32 itojun if (opr->ndpr_plen == pr->ndpr_plen &&
1739 1.32 itojun in6_are_prefix_equal(&pr->ndpr_prefix.sin6_addr,
1740 1.32 itojun &opr->ndpr_prefix.sin6_addr, pr->ndpr_plen))
1741 1.36 itojun return (0);
1742 1.32 itojun }
1743 1.32 itojun
1744 1.32 itojun /*
1745 1.32 itojun * We prefer link-local addresses as the associated interface address.
1746 1.32 itojun */
1747 1.32 itojun /* search for a link-local addr */
1748 1.118 ozaki bound = curlwp_bind();
1749 1.118 ozaki ifa = (struct ifaddr *)in6ifa_ifpforlinklocal_psref(ifp,
1750 1.118 ozaki IN6_IFF_NOTREADY | IN6_IFF_ANYCAST, &psref);
1751 1.32 itojun if (ifa == NULL) {
1752 1.118 ozaki int s = pserialize_read_enter();
1753 1.115 ozaki IFADDR_READER_FOREACH(ifa, ifp) {
1754 1.32 itojun if (ifa->ifa_addr->sa_family == AF_INET6)
1755 1.32 itojun break;
1756 1.32 itojun }
1757 1.118 ozaki if (ifa != NULL)
1758 1.118 ozaki ifa_acquire(ifa, &psref);
1759 1.118 ozaki pserialize_read_exit(s);
1760 1.32 itojun /* should we care about ia6_flags? */
1761 1.32 itojun }
1762 1.32 itojun if (ifa == NULL) {
1763 1.32 itojun /*
1764 1.32 itojun * This can still happen, when, for example, we receive an RA
1765 1.32 itojun * containing a prefix with the L bit set and the A bit clear,
1766 1.32 itojun * after removing all IPv6 addresses on the receiving
1767 1.32 itojun * interface. This should, of course, be rare though.
1768 1.32 itojun */
1769 1.107 ozaki nd6log(LOG_NOTICE, "failed to find any ifaddr"
1770 1.32 itojun " to add route for a prefix(%s/%d) on %s\n",
1771 1.131 christos IN6_PRINT(ip6buf, &pr->ndpr_prefix.sin6_addr),
1772 1.107 ozaki pr->ndpr_plen, if_name(ifp));
1773 1.118 ozaki curlwp_bindx(bound);
1774 1.36 itojun return (0);
1775 1.32 itojun }
1776 1.2 itojun
1777 1.2 itojun /*
1778 1.32 itojun * in6_ifinit() sets nd6_rtrequest to ifa_rtrequest for all ifaddrs.
1779 1.32 itojun * ifa->ifa_rtrequest = nd6_rtrequest;
1780 1.2 itojun */
1781 1.78 cegger memset(&mask6, 0, sizeof(mask6));
1782 1.85 joerg mask6.sin6_family = AF_INET6;
1783 1.32 itojun mask6.sin6_len = sizeof(mask6);
1784 1.32 itojun mask6.sin6_addr = pr->ndpr_mask;
1785 1.32 itojun /* rtrequest() will probably set RTF_UP, but we're not sure. */
1786 1.32 itojun rtflags = ifa->ifa_flags | RTF_UP;
1787 1.32 itojun if (nd6_need_cache(ifp)) {
1788 1.32 itojun /* explicitly set in case ifa_flags does not set the flag. */
1789 1.108 ozaki rtflags |= RTF_CONNECTED;
1790 1.32 itojun } else {
1791 1.32 itojun /*
1792 1.32 itojun * explicitly clear the cloning bit in case ifa_flags sets it.
1793 1.32 itojun */
1794 1.108 ozaki rtflags &= ~RTF_CONNECTED;
1795 1.32 itojun }
1796 1.116 ozaki error = rtrequest_newmsg(RTM_ADD, sin6tosa(&pr->ndpr_prefix),
1797 1.116 ozaki ifa->ifa_addr, sin6tosa(&mask6), rtflags);
1798 1.32 itojun if (error == 0) {
1799 1.101 ozaki nd6_numroutes++;
1800 1.32 itojun pr->ndpr_stateflags |= NDPRF_ONLINK;
1801 1.32 itojun } else {
1802 1.107 ozaki nd6log(LOG_ERR, "failed to add route for a"
1803 1.32 itojun " prefix (%s/%d) on %s, gw=%s, mask=%s, flags=%lx "
1804 1.32 itojun "errno = %d\n",
1805 1.131 christos IN6_PRINT(ip6bufp, &pr->ndpr_prefix.sin6_addr),
1806 1.32 itojun pr->ndpr_plen, if_name(ifp),
1807 1.131 christos IN6_PRINT(ip6buf,
1808 1.130 ryo &((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_addr),
1809 1.131 christos IN6_PRINT(ip6bufm, &mask6.sin6_addr), rtflags, error);
1810 1.32 itojun }
1811 1.118 ozaki ifa_release(ifa, &psref);
1812 1.118 ozaki curlwp_bindx(bound);
1813 1.32 itojun
1814 1.36 itojun return (error);
1815 1.32 itojun }
1816 1.32 itojun
1817 1.121 ozaki static int
1818 1.64 christos nd6_prefix_offlink(struct nd_prefix *pr)
1819 1.32 itojun {
1820 1.32 itojun int error = 0;
1821 1.32 itojun struct ifnet *ifp = pr->ndpr_ifp;
1822 1.32 itojun struct nd_prefix *opr;
1823 1.32 itojun struct sockaddr_in6 sa6, mask6;
1824 1.130 ryo char ip6buf[INET6_ADDRSTRLEN];
1825 1.32 itojun
1826 1.128 ozaki ND6_ASSERT_WLOCK();
1827 1.128 ozaki
1828 1.32 itojun /* sanity check */
1829 1.32 itojun if ((pr->ndpr_stateflags & NDPRF_ONLINK) == 0) {
1830 1.107 ozaki nd6log(LOG_ERR, "%s/%d is already off-link\n",
1831 1.131 christos IN6_PRINT(ip6buf, &pr->ndpr_prefix.sin6_addr),
1832 1.130 ryo pr->ndpr_plen);
1833 1.36 itojun return (EEXIST);
1834 1.32 itojun }
1835 1.32 itojun
1836 1.69 dyoung sockaddr_in6_init(&sa6, &pr->ndpr_prefix.sin6_addr, 0, 0, 0);
1837 1.69 dyoung sockaddr_in6_init(&mask6, &pr->ndpr_mask, 0, 0, 0);
1838 1.116 ozaki error = rtrequest_newmsg(RTM_DELETE, sin6tosa(&sa6), NULL,
1839 1.116 ozaki sin6tosa(&mask6), 0);
1840 1.32 itojun if (error == 0) {
1841 1.32 itojun pr->ndpr_stateflags &= ~NDPRF_ONLINK;
1842 1.101 ozaki nd6_numroutes--;
1843 1.2 itojun
1844 1.32 itojun /*
1845 1.32 itojun * There might be the same prefix on another interface,
1846 1.32 itojun * the prefix which could not be on-link just because we have
1847 1.32 itojun * the interface route (see comments in nd6_prefix_onlink).
1848 1.32 itojun * If there's one, try to make the prefix on-link on the
1849 1.32 itojun * interface.
1850 1.32 itojun */
1851 1.125 ozaki ND_PREFIX_LIST_FOREACH(opr) {
1852 1.32 itojun if (opr == pr)
1853 1.32 itojun continue;
1854 1.2 itojun
1855 1.32 itojun if ((opr->ndpr_stateflags & NDPRF_ONLINK) != 0)
1856 1.32 itojun continue;
1857 1.2 itojun
1858 1.32 itojun /*
1859 1.32 itojun * KAME specific: detached prefixes should not be
1860 1.32 itojun * on-link.
1861 1.32 itojun */
1862 1.32 itojun if ((opr->ndpr_stateflags & NDPRF_DETACHED) != 0)
1863 1.32 itojun continue;
1864 1.2 itojun
1865 1.32 itojun if (opr->ndpr_plen == pr->ndpr_plen &&
1866 1.32 itojun in6_are_prefix_equal(&pr->ndpr_prefix.sin6_addr,
1867 1.32 itojun &opr->ndpr_prefix.sin6_addr, pr->ndpr_plen)) {
1868 1.32 itojun int e;
1869 1.32 itojun
1870 1.32 itojun if ((e = nd6_prefix_onlink(opr)) != 0) {
1871 1.107 ozaki nd6log(LOG_ERR, "failed to "
1872 1.32 itojun "recover a prefix %s/%d from %s "
1873 1.32 itojun "to %s (errno = %d)\n",
1874 1.131 christos IN6_PRINT(ip6buf,
1875 1.130 ryo &opr->ndpr_prefix.sin6_addr),
1876 1.32 itojun opr->ndpr_plen, if_name(ifp),
1877 1.107 ozaki if_name(opr->ndpr_ifp), e);
1878 1.32 itojun }
1879 1.32 itojun }
1880 1.32 itojun }
1881 1.32 itojun } else {
1882 1.32 itojun /* XXX: can we still set the NDPRF_ONLINK flag? */
1883 1.107 ozaki nd6log(LOG_ERR, "failed to delete route: "
1884 1.32 itojun "%s/%d on %s (errno = %d)\n",
1885 1.131 christos IN6_PRINT(ip6buf, &sa6.sin6_addr), pr->ndpr_plen,
1886 1.130 ryo if_name(ifp),
1887 1.107 ozaki error);
1888 1.2 itojun }
1889 1.2 itojun
1890 1.101 ozaki return error;
1891 1.2 itojun }
1892 1.2 itojun
1893 1.2 itojun static struct in6_ifaddr *
1894 1.118 ozaki in6_ifadd(struct nd_prefixctl *prc, int mcast, struct psref *psref)
1895 1.2 itojun {
1896 1.94 matt struct ifnet *ifp = prc->ndprc_ifp;
1897 1.2 itojun struct ifaddr *ifa;
1898 1.32 itojun struct in6_aliasreq ifra;
1899 1.32 itojun struct in6_ifaddr *ia, *ib;
1900 1.32 itojun int error, plen0;
1901 1.2 itojun struct in6_addr mask;
1902 1.94 matt int prefixlen = prc->ndprc_plen;
1903 1.56 rpaulo int updateflags;
1904 1.118 ozaki int s;
1905 1.130 ryo char ip6buf[INET6_ADDRSTRLEN];
1906 1.2 itojun
1907 1.128 ozaki ND6_ASSERT_WLOCK();
1908 1.128 ozaki
1909 1.31 itojun in6_prefixlen2mask(&mask, prefixlen);
1910 1.2 itojun
1911 1.32 itojun /*
1912 1.32 itojun * find a link-local address (will be interface ID).
1913 1.32 itojun * Is it really mandatory? Theoretically, a global or a site-local
1914 1.32 itojun * address can be configured without a link-local address, if we
1915 1.32 itojun * have a unique interface identifier...
1916 1.32 itojun *
1917 1.32 itojun * it is not mandatory to have a link-local address, we can generate
1918 1.32 itojun * interface identifier on the fly. we do this because:
1919 1.32 itojun * (1) it should be the easiest way to find interface identifier.
1920 1.32 itojun * (2) RFC2462 5.4 suggesting the use of the same interface identifier
1921 1.32 itojun * for multiple addresses on a single interface, and possible shortcut
1922 1.32 itojun * of DAD. we omitted DAD for this reason in the past.
1923 1.32 itojun * (3) a user can prevent autoconfiguration of global address
1924 1.32 itojun * by removing link-local address by hand (this is partly because we
1925 1.55 rpaulo * don't have other way to control the use of IPv6 on an interface.
1926 1.32 itojun * this has been our design choice - cf. NRL's "ifconfig auto").
1927 1.32 itojun * (4) it is easier to manage when an interface has addresses
1928 1.32 itojun * with the same interface identifier, than to have multiple addresses
1929 1.32 itojun * with different interface identifiers.
1930 1.32 itojun */
1931 1.118 ozaki s = pserialize_read_enter();
1932 1.32 itojun ifa = (struct ifaddr *)in6ifa_ifpforlinklocal(ifp, 0); /* 0 is OK? */
1933 1.2 itojun if (ifa)
1934 1.2 itojun ib = (struct in6_ifaddr *)ifa;
1935 1.118 ozaki else {
1936 1.118 ozaki pserialize_read_exit(s);
1937 1.2 itojun return NULL;
1938 1.118 ozaki }
1939 1.2 itojun
1940 1.2 itojun #if 0 /* don't care link local addr state, and always do DAD */
1941 1.2 itojun /* if link-local address is not eligible, do not autoconfigure. */
1942 1.2 itojun if (((struct in6_ifaddr *)ifa)->ia6_flags & IN6_IFF_NOTREADY) {
1943 1.2 itojun printf("in6_ifadd: link-local address not ready\n");
1944 1.2 itojun return NULL;
1945 1.2 itojun }
1946 1.2 itojun #endif
1947 1.2 itojun
1948 1.2 itojun /* prefixlen + ifidlen must be equal to 128 */
1949 1.32 itojun plen0 = in6_mask2len(&ib->ia_prefixmask.sin6_addr, NULL);
1950 1.32 itojun if (prefixlen != plen0) {
1951 1.107 ozaki nd6log(LOG_INFO, "wrong prefixlen for %s "
1952 1.32 itojun "(prefix=%d ifid=%d)\n",
1953 1.107 ozaki if_name(ifp), prefixlen, 128 - plen0);
1954 1.118 ozaki pserialize_read_exit(s);
1955 1.2 itojun return NULL;
1956 1.2 itojun }
1957 1.2 itojun
1958 1.2 itojun /* make ifaddr */
1959 1.2 itojun
1960 1.56 rpaulo memset(&ifra, 0, sizeof(ifra));
1961 1.32 itojun /*
1962 1.32 itojun * in6_update_ifa() does not use ifra_name, but we accurately set it
1963 1.32 itojun * for safety.
1964 1.32 itojun */
1965 1.32 itojun strncpy(ifra.ifra_name, if_name(ifp), sizeof(ifra.ifra_name));
1966 1.94 matt sockaddr_in6_init(&ifra.ifra_addr, &prc->ndprc_prefix.sin6_addr, 0, 0, 0);
1967 1.32 itojun /* prefix */
1968 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[0] &= mask.s6_addr32[0];
1969 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[1] &= mask.s6_addr32[1];
1970 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[2] &= mask.s6_addr32[2];
1971 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[3] &= mask.s6_addr32[3];
1972 1.2 itojun
1973 1.2 itojun /* interface ID */
1974 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[0] |=
1975 1.32 itojun (ib->ia_addr.sin6_addr.s6_addr32[0] & ~mask.s6_addr32[0]);
1976 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[1] |=
1977 1.32 itojun (ib->ia_addr.sin6_addr.s6_addr32[1] & ~mask.s6_addr32[1]);
1978 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[2] |=
1979 1.32 itojun (ib->ia_addr.sin6_addr.s6_addr32[2] & ~mask.s6_addr32[2]);
1980 1.32 itojun ifra.ifra_addr.sin6_addr.s6_addr32[3] |=
1981 1.32 itojun (ib->ia_addr.sin6_addr.s6_addr32[3] & ~mask.s6_addr32[3]);
1982 1.118 ozaki pserialize_read_exit(s);
1983 1.33 itojun
1984 1.32 itojun /* new prefix mask. */
1985 1.69 dyoung sockaddr_in6_init(&ifra.ifra_prefixmask, &mask, 0, 0, 0);
1986 1.2 itojun
1987 1.56 rpaulo /* lifetimes */
1988 1.94 matt ifra.ifra_lifetime.ia6t_vltime = prc->ndprc_vltime;
1989 1.94 matt ifra.ifra_lifetime.ia6t_pltime = prc->ndprc_pltime;
1990 1.2 itojun
1991 1.32 itojun /* XXX: scope zone ID? */
1992 1.2 itojun
1993 1.32 itojun ifra.ifra_flags |= IN6_IFF_AUTOCONF; /* obey autoconf */
1994 1.2 itojun
1995 1.56 rpaulo /*
1996 1.56 rpaulo * Make sure that we do not have this address already. This should
1997 1.56 rpaulo * usually not happen, but we can still see this case, e.g., if we
1998 1.56 rpaulo * have manually configured the exact address to be configured.
1999 1.56 rpaulo */
2000 1.118 ozaki s = pserialize_read_enter();
2001 1.56 rpaulo if (in6ifa_ifpwithaddr(ifp, &ifra.ifra_addr.sin6_addr) != NULL) {
2002 1.56 rpaulo /* this should be rare enough to make an explicit log */
2003 1.56 rpaulo log(LOG_INFO, "in6_ifadd: %s is already configured\n",
2004 1.131 christos IN6_PRINT(ip6buf, &ifra.ifra_addr.sin6_addr));
2005 1.118 ozaki pserialize_read_exit(s);
2006 1.56 rpaulo return (NULL);
2007 1.56 rpaulo }
2008 1.118 ozaki pserialize_read_exit(s);
2009 1.56 rpaulo
2010 1.56 rpaulo /*
2011 1.56 rpaulo * Allocate ifaddr structure, link into chain, etc.
2012 1.56 rpaulo * If we are going to create a new address upon receiving a multicasted
2013 1.56 rpaulo * RA, we need to impose a random delay before starting DAD.
2014 1.56 rpaulo * [draft-ietf-ipv6-rfc2462bis-02.txt, Section 5.4.2]
2015 1.56 rpaulo */
2016 1.56 rpaulo updateflags = 0;
2017 1.56 rpaulo if (mcast)
2018 1.56 rpaulo updateflags |= IN6_IFAUPDATE_DADDELAY;
2019 1.129 christos if ((error = in6_update_ifa(ifp, &ifra, updateflags)) != 0) {
2020 1.107 ozaki nd6log(LOG_ERR, "failed to make ifaddr %s on %s (errno=%d)\n",
2021 1.131 christos IN6_PRINT(ip6buf, &ifra.ifra_addr.sin6_addr), if_name(ifp),
2022 1.107 ozaki error);
2023 1.36 itojun return (NULL); /* ifaddr must not have been allocated. */
2024 1.32 itojun }
2025 1.2 itojun
2026 1.118 ozaki ia = in6ifa_ifpwithaddr_psref(ifp, &ifra.ifra_addr.sin6_addr, psref);
2027 1.2 itojun
2028 1.36 itojun return (ia); /* this is always non-NULL */
2029 1.2 itojun }
2030 1.2 itojun
2031 1.2 itojun int
2032 1.64 christos in6_tmpifadd(
2033 1.64 christos const struct in6_ifaddr *ia0, /* corresponding public address */
2034 1.64 christos int forcegen,
2035 1.64 christos int dad_delay)
2036 1.56 rpaulo {
2037 1.56 rpaulo struct ifnet *ifp = ia0->ia_ifa.ifa_ifp;
2038 1.56 rpaulo struct in6_ifaddr *newia, *ia;
2039 1.56 rpaulo struct in6_aliasreq ifra;
2040 1.56 rpaulo int i, error;
2041 1.56 rpaulo int trylimit = 3; /* XXX: adhoc value */
2042 1.56 rpaulo int updateflags;
2043 1.56 rpaulo u_int32_t randid[2];
2044 1.56 rpaulo u_int32_t vltime0, pltime0;
2045 1.117 ozaki int s;
2046 1.56 rpaulo
2047 1.128 ozaki ND6_ASSERT_WLOCK();
2048 1.128 ozaki
2049 1.56 rpaulo memset(&ifra, 0, sizeof(ifra));
2050 1.56 rpaulo strncpy(ifra.ifra_name, if_name(ifp), sizeof(ifra.ifra_name));
2051 1.56 rpaulo ifra.ifra_addr = ia0->ia_addr;
2052 1.56 rpaulo /* copy prefix mask */
2053 1.56 rpaulo ifra.ifra_prefixmask = ia0->ia_prefixmask;
2054 1.56 rpaulo /* clear the old IFID */
2055 1.56 rpaulo for (i = 0; i < 4; i++) {
2056 1.56 rpaulo ifra.ifra_addr.sin6_addr.s6_addr32[i] &=
2057 1.56 rpaulo ifra.ifra_prefixmask.sin6_addr.s6_addr32[i];
2058 1.56 rpaulo }
2059 1.56 rpaulo
2060 1.56 rpaulo again:
2061 1.56 rpaulo if (in6_get_tmpifid(ifp, (u_int8_t *)randid,
2062 1.56 rpaulo (const u_int8_t *)&ia0->ia_addr.sin6_addr.s6_addr[8], forcegen)) {
2063 1.107 ozaki nd6log(LOG_NOTICE, "failed to find a good random IFID\n");
2064 1.56 rpaulo return (EINVAL);
2065 1.56 rpaulo }
2066 1.56 rpaulo ifra.ifra_addr.sin6_addr.s6_addr32[2] |=
2067 1.56 rpaulo (randid[0] & ~(ifra.ifra_prefixmask.sin6_addr.s6_addr32[2]));
2068 1.56 rpaulo ifra.ifra_addr.sin6_addr.s6_addr32[3] |=
2069 1.56 rpaulo (randid[1] & ~(ifra.ifra_prefixmask.sin6_addr.s6_addr32[3]));
2070 1.56 rpaulo
2071 1.56 rpaulo /*
2072 1.56 rpaulo * in6_get_tmpifid() quite likely provided a unique interface ID.
2073 1.56 rpaulo * However, we may still have a chance to see collision, because
2074 1.56 rpaulo * there may be a time lag between generation of the ID and generation
2075 1.56 rpaulo * of the address. So, we'll do one more sanity check.
2076 1.56 rpaulo */
2077 1.117 ozaki s = pserialize_read_enter();
2078 1.113 ozaki IN6_ADDRLIST_READER_FOREACH(ia) {
2079 1.56 rpaulo if (IN6_ARE_ADDR_EQUAL(&ia->ia_addr.sin6_addr,
2080 1.56 rpaulo &ifra.ifra_addr.sin6_addr)) {
2081 1.117 ozaki pserialize_read_exit(s);
2082 1.56 rpaulo if (trylimit-- == 0) {
2083 1.56 rpaulo /*
2084 1.56 rpaulo * Give up. Something strange should have
2085 1.56 rpaulo * happened.
2086 1.56 rpaulo */
2087 1.107 ozaki nd6log(LOG_NOTICE,
2088 1.107 ozaki "failed to find a unique random IFID\n");
2089 1.56 rpaulo return (EEXIST);
2090 1.56 rpaulo }
2091 1.56 rpaulo forcegen = 1;
2092 1.56 rpaulo goto again;
2093 1.56 rpaulo }
2094 1.56 rpaulo }
2095 1.117 ozaki pserialize_read_exit(s);
2096 1.56 rpaulo
2097 1.56 rpaulo /*
2098 1.56 rpaulo * The Valid Lifetime is the lower of the Valid Lifetime of the
2099 1.56 rpaulo * public address or TEMP_VALID_LIFETIME.
2100 1.56 rpaulo * The Preferred Lifetime is the lower of the Preferred Lifetime
2101 1.56 rpaulo * of the public address or TEMP_PREFERRED_LIFETIME -
2102 1.56 rpaulo * DESYNC_FACTOR.
2103 1.56 rpaulo */
2104 1.56 rpaulo if (ia0->ia6_lifetime.ia6t_vltime != ND6_INFINITE_LIFETIME) {
2105 1.56 rpaulo vltime0 = IFA6_IS_INVALID(ia0) ? 0 :
2106 1.56 rpaulo (ia0->ia6_lifetime.ia6t_vltime -
2107 1.102 ozaki (time_uptime - ia0->ia6_updatetime));
2108 1.56 rpaulo if (vltime0 > ip6_temp_valid_lifetime)
2109 1.56 rpaulo vltime0 = ip6_temp_valid_lifetime;
2110 1.56 rpaulo } else
2111 1.56 rpaulo vltime0 = ip6_temp_valid_lifetime;
2112 1.56 rpaulo if (ia0->ia6_lifetime.ia6t_pltime != ND6_INFINITE_LIFETIME) {
2113 1.56 rpaulo pltime0 = IFA6_IS_DEPRECATED(ia0) ? 0 :
2114 1.56 rpaulo (ia0->ia6_lifetime.ia6t_pltime -
2115 1.102 ozaki (time_uptime - ia0->ia6_updatetime));
2116 1.56 rpaulo if (pltime0 > ip6_temp_preferred_lifetime - ip6_desync_factor){
2117 1.56 rpaulo pltime0 = ip6_temp_preferred_lifetime -
2118 1.56 rpaulo ip6_desync_factor;
2119 1.56 rpaulo }
2120 1.56 rpaulo } else
2121 1.56 rpaulo pltime0 = ip6_temp_preferred_lifetime - ip6_desync_factor;
2122 1.56 rpaulo ifra.ifra_lifetime.ia6t_vltime = vltime0;
2123 1.56 rpaulo ifra.ifra_lifetime.ia6t_pltime = pltime0;
2124 1.56 rpaulo
2125 1.56 rpaulo /*
2126 1.56 rpaulo * A temporary address is created only if this calculated Preferred
2127 1.56 rpaulo * Lifetime is greater than REGEN_ADVANCE time units.
2128 1.56 rpaulo */
2129 1.56 rpaulo if (ifra.ifra_lifetime.ia6t_pltime <= ip6_temp_regen_advance)
2130 1.56 rpaulo return (0);
2131 1.56 rpaulo
2132 1.56 rpaulo /* XXX: scope zone ID? */
2133 1.56 rpaulo
2134 1.56 rpaulo ifra.ifra_flags |= (IN6_IFF_AUTOCONF|IN6_IFF_TEMPORARY);
2135 1.56 rpaulo
2136 1.56 rpaulo /* allocate ifaddr structure, link into chain, etc. */
2137 1.56 rpaulo updateflags = 0;
2138 1.57 rpaulo if (dad_delay)
2139 1.56 rpaulo updateflags |= IN6_IFAUPDATE_DADDELAY;
2140 1.129 christos if ((error = in6_update_ifa(ifp, &ifra, updateflags)) != 0)
2141 1.56 rpaulo return (error);
2142 1.56 rpaulo
2143 1.118 ozaki s = pserialize_read_enter();
2144 1.56 rpaulo newia = in6ifa_ifpwithaddr(ifp, &ifra.ifra_addr.sin6_addr);
2145 1.56 rpaulo if (newia == NULL) { /* XXX: can it happen? */
2146 1.118 ozaki pserialize_read_exit(s);
2147 1.107 ozaki nd6log(LOG_ERR,
2148 1.107 ozaki "ifa update succeeded, but we got no ifaddr\n");
2149 1.56 rpaulo return (EINVAL); /* XXX */
2150 1.56 rpaulo }
2151 1.56 rpaulo newia->ia6_ndpr = ia0->ia6_ndpr;
2152 1.56 rpaulo newia->ia6_ndpr->ndpr_refcnt++;
2153 1.118 ozaki pserialize_read_exit(s);
2154 1.56 rpaulo
2155 1.56 rpaulo /*
2156 1.56 rpaulo * A newly added address might affect the status of other addresses.
2157 1.56 rpaulo * XXX: when the temporary address is generated with a new public
2158 1.56 rpaulo * address, the onlink check is redundant. However, it would be safe
2159 1.56 rpaulo * to do the check explicitly everywhere a new address is generated,
2160 1.56 rpaulo * and, in fact, we surely need the check when we create a new
2161 1.56 rpaulo * temporary address due to deprecation of an old temporary address.
2162 1.56 rpaulo */
2163 1.123 ozaki nd6_pfxlist_onlink_check();
2164 1.56 rpaulo
2165 1.56 rpaulo return (0);
2166 1.56 rpaulo }
2167 1.56 rpaulo
2168 1.56 rpaulo static int
2169 1.2 itojun in6_init_prefix_ltimes(struct nd_prefix *ndpr)
2170 1.2 itojun {
2171 1.7 itojun
2172 1.128 ozaki ND6_ASSERT_WLOCK();
2173 1.128 ozaki
2174 1.26 itojun /* check if preferred lifetime > valid lifetime. RFC2462 5.5.3 (c) */
2175 1.2 itojun if (ndpr->ndpr_pltime > ndpr->ndpr_vltime) {
2176 1.107 ozaki nd6log(LOG_INFO, "preferred lifetime"
2177 1.2 itojun "(%d) is greater than valid lifetime(%d)\n",
2178 1.107 ozaki (u_int)ndpr->ndpr_pltime, (u_int)ndpr->ndpr_vltime);
2179 1.2 itojun return (EINVAL);
2180 1.2 itojun }
2181 1.7 itojun if (ndpr->ndpr_pltime == ND6_INFINITE_LIFETIME)
2182 1.2 itojun ndpr->ndpr_preferred = 0;
2183 1.2 itojun else
2184 1.102 ozaki ndpr->ndpr_preferred = time_uptime + ndpr->ndpr_pltime;
2185 1.7 itojun if (ndpr->ndpr_vltime == ND6_INFINITE_LIFETIME)
2186 1.2 itojun ndpr->ndpr_expire = 0;
2187 1.2 itojun else
2188 1.102 ozaki ndpr->ndpr_expire = time_uptime + ndpr->ndpr_vltime;
2189 1.2 itojun
2190 1.2 itojun return 0;
2191 1.2 itojun }
2192 1.2 itojun
2193 1.2 itojun static void
2194 1.94 matt in6_init_address_ltimes(struct nd_prefix *newpr,
2195 1.60 christos struct in6_addrlifetime *lt6)
2196 1.2 itojun {
2197 1.7 itojun
2198 1.7 itojun /* Valid lifetime must not be updated unless explicitly specified. */
2199 1.32 itojun /* init ia6t_expire */
2200 1.32 itojun if (lt6->ia6t_vltime == ND6_INFINITE_LIFETIME)
2201 1.32 itojun lt6->ia6t_expire = 0;
2202 1.32 itojun else {
2203 1.102 ozaki lt6->ia6t_expire = time_uptime;
2204 1.32 itojun lt6->ia6t_expire += lt6->ia6t_vltime;
2205 1.2 itojun }
2206 1.7 itojun
2207 1.2 itojun /* init ia6t_preferred */
2208 1.7 itojun if (lt6->ia6t_pltime == ND6_INFINITE_LIFETIME)
2209 1.2 itojun lt6->ia6t_preferred = 0;
2210 1.2 itojun else {
2211 1.102 ozaki lt6->ia6t_preferred = time_uptime;
2212 1.2 itojun lt6->ia6t_preferred += lt6->ia6t_pltime;
2213 1.2 itojun }
2214 1.2 itojun }
2215 1.2 itojun
2216 1.2 itojun /*
2217 1.2 itojun * Delete all the routing table entries that use the specified gateway.
2218 1.2 itojun * XXX: this function causes search through all entries of routing table, so
2219 1.16 itojun * it shouldn't be called when acting as a router.
2220 1.2 itojun */
2221 1.2 itojun void
2222 1.123 ozaki nd6_rt_flush(struct in6_addr *gateway, struct ifnet *ifp)
2223 1.2 itojun {
2224 1.133 ozaki
2225 1.133 ozaki #ifndef NET_MPSAFE
2226 1.133 ozaki KASSERT(mutex_owned(softnet_lock));
2227 1.133 ozaki #endif
2228 1.2 itojun
2229 1.2 itojun /* We'll care only link-local addresses */
2230 1.133 ozaki if (!IN6_IS_ADDR_LINKLOCAL(gateway))
2231 1.2 itojun return;
2232 1.2 itojun
2233 1.120 ozaki rt_delete_matched_entries(AF_INET6, rt6_deleteroute_matcher, gateway);
2234 1.2 itojun }
2235 1.2 itojun
2236 1.2 itojun static int
2237 1.120 ozaki rt6_deleteroute_matcher(struct rtentry *rt, void *arg)
2238 1.2 itojun {
2239 1.2 itojun struct in6_addr *gate = (struct in6_addr *)arg;
2240 1.2 itojun
2241 1.2 itojun if (rt->rt_gateway == NULL || rt->rt_gateway->sa_family != AF_INET6)
2242 1.36 itojun return (0);
2243 1.2 itojun
2244 1.104 ozaki if (!IN6_ARE_ADDR_EQUAL(gate, &satosin6(rt->rt_gateway)->sin6_addr))
2245 1.36 itojun return (0);
2246 1.26 itojun
2247 1.26 itojun /*
2248 1.32 itojun * Do not delete a static route.
2249 1.32 itojun * XXX: this seems to be a bit ad-hoc. Should we consider the
2250 1.32 itojun * 'cloned' bit instead?
2251 1.32 itojun */
2252 1.32 itojun if ((rt->rt_flags & RTF_STATIC) != 0)
2253 1.36 itojun return (0);
2254 1.32 itojun
2255 1.32 itojun /*
2256 1.2 itojun * We delete only host route. This means, in particular, we don't
2257 1.2 itojun * delete default route.
2258 1.2 itojun */
2259 1.2 itojun if ((rt->rt_flags & RTF_HOST) == 0)
2260 1.36 itojun return (0);
2261 1.2 itojun
2262 1.120 ozaki return 1;
2263 1.2 itojun }
2264