config.c revision 1.40 1 /* $NetBSD: config.c,v 1.40 2018/04/20 15:57:23 roy Exp $ */
2 /* $KAME: config.c,v 1.93 2005/10/17 14:40:02 suz Exp $ */
3
4 /*
5 * Copyright (C) 1998 WIDE Project.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of the project nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 */
32
33 #include <sys/param.h>
34 #include <sys/ioctl.h>
35 #include <sys/socket.h>
36 #include <sys/time.h>
37 #include <sys/sysctl.h>
38
39 #include <net/if.h>
40 #include <net/route.h>
41 #include <net/if_dl.h>
42 #ifdef __FreeBSD__
43 #include <net/if_var.h>
44 #endif
45
46 #include <netinet/in.h>
47 #include <netinet/in_var.h>
48 #include <netinet/ip6.h>
49 #include <netinet6/ip6_var.h>
50 #include <netinet/icmp6.h>
51 #include <netinet6/nd6.h>
52
53 #include <arpa/inet.h>
54
55 #include <stdio.h>
56 #include <syslog.h>
57 #include <errno.h>
58 #include <string.h>
59 #include <stdlib.h>
60 #include <search.h>
61 #include <unistd.h>
62 #include <ifaddrs.h>
63 #include <inttypes.h>
64
65 #include "rtadvd.h"
66 #include "advcap.h"
67 #include "timer.h"
68 #include "if.h"
69 #include "config.h"
70 #include "logit.h"
71 #include "prog_ops.h"
72
73 #ifndef __arraycount
74 #define __arraycount(__x) (sizeof(__x) / sizeof(__x[0]))
75 #endif
76
77 static time_t prefix_timo = (60 * 120); /* 2 hours.
78 * XXX: should be configurable. */
79 static struct rtadvd_timer *prefix_timeout(void *);
80 static void makeentry(char *, size_t, int, const char *);
81 static int getinet6sysctl(int);
82
83 static size_t
84 encode_domain(char *dst, const char *src)
85 {
86 ssize_t len;
87 char *odst, *p;
88
89 odst = dst;
90 while (src && (len = strlen(src)) != 0) {
91 p = strchr(src, '.');
92 *dst++ = len = MIN(63, p == NULL ? len : p - src);
93 memcpy(dst, src, len);
94 dst += len;
95 if (p == NULL)
96 break;
97 src = p + 1;
98 }
99 *dst++ = '\0';
100
101 return dst - odst;
102 }
103
104 void
105 free_rainfo(struct rainfo *rai)
106 {
107 struct soliciter *sol;
108 struct prefix *pfx;
109 struct rtinfo *rti;
110 struct rdnss *rdnss;
111 struct rdnss_addr *rdnsa;
112 struct dnssl *dnssl;
113 struct dnssl_domain *dnsd;
114
115 rtadvd_remove_timer(&rai->timer);
116 rtadvd_remove_timer(&rai->timer_sol);
117
118 while ((sol = TAILQ_FIRST(&rai->soliciter))) {
119 TAILQ_REMOVE(&rai->soliciter, sol, next);
120 free(sol);
121 }
122
123 while ((pfx = TAILQ_FIRST(&rai->prefix))) {
124 TAILQ_REMOVE(&rai->prefix, pfx, next);
125 free(pfx);
126 }
127
128 while ((rti = TAILQ_FIRST(&rai->route))) {
129 TAILQ_REMOVE(&rai->route, rti, next);
130 free(rti);
131 }
132
133 while ((rdnss = TAILQ_FIRST(&rai->rdnss))) {
134 TAILQ_REMOVE(&rai->rdnss, rdnss, next);
135 while ((rdnsa = TAILQ_FIRST(&rdnss->list))) {
136 TAILQ_REMOVE(&rdnss->list, rdnsa, next);
137 free(rdnsa);
138 }
139 free(rdnss);
140 }
141
142 while ((dnssl = TAILQ_FIRST(&rai->dnssl))) {
143 TAILQ_REMOVE(&rai->dnssl, dnssl, next);
144 while ((dnsd = TAILQ_FIRST(&dnssl->list))) {
145 TAILQ_REMOVE(&dnssl->list, dnsd, next);
146 free(dnsd);
147 }
148 free(dnssl);
149 }
150
151 free(rai->sdl);
152 free(rai->ra_data);
153 free(rai);
154 }
155
156 void
157 getconfig(const char *intface, int exithard)
158 {
159 int stat, c, i;
160 char tbuf[BUFSIZ];
161 struct rainfo *tmp, *rai;
162 int32_t val;
163 int64_t val64;
164 char buf[BUFSIZ];
165 char *bp = buf;
166 char *addr, *flagstr, *ap;
167 static int forwarding = -1;
168 char entbuf[256], abuf[256];
169 struct rdnss *rdnss;
170 struct dnssl *dnssl;
171
172 #define MUSTHAVE(var, cap) \
173 do { \
174 int64_t t; \
175 if ((t = agetnum(cap)) < 0) { \
176 fprintf(stderr, "rtadvd: need %s for interface %s\n", \
177 cap, intface); \
178 goto errexit; \
179 } \
180 var = t; \
181 } while (0)
182 #define MAYHAVE(var, cap, def) \
183 do { \
184 if ((var = agetnum(cap)) < 0) \
185 var = def; \
186 } while (0)
187 #define ELM_MALLOC(p) \
188 do { \
189 p = calloc(1, sizeof(*p)); \
190 if (p == NULL) { \
191 logit(LOG_ERR, "<%s> calloc failed: %m", \
192 __func__); \
193 goto errexit; \
194 } \
195 } while(/*CONSTCOND*/0)
196
197 if (if_nametoindex(intface) == 0) {
198 logit(LOG_INFO, "<%s> interface %s not found, ignoring",
199 __func__, intface);
200 return;
201 }
202
203 logit(LOG_DEBUG, "<%s> loading configuration for interface %s",
204 __func__, intface);
205
206 if ((stat = agetent(tbuf, intface)) <= 0) {
207 memset(tbuf, 0, sizeof(tbuf));
208 logit(LOG_INFO,
209 "<%s> %s isn't defined in the configuration file"
210 " or the configuration file doesn't exist."
211 " Treat it as default",
212 __func__, intface);
213 }
214
215 ELM_MALLOC(tmp);
216 TAILQ_INIT(&tmp->soliciter);
217 TAILQ_INIT(&tmp->prefix);
218 TAILQ_INIT(&tmp->route);
219 TAILQ_INIT(&tmp->rdnss);
220 TAILQ_INIT(&tmp->dnssl);
221
222 /* check if we are allowed to forward packets (if not determined) */
223 if (forwarding < 0) {
224 if ((forwarding = getinet6sysctl(IPV6CTL_FORWARDING)) < 0)
225 exit(1);
226 }
227
228 /* get interface information */
229 if (agetflag("nolladdr"))
230 tmp->advlinkopt = 0;
231 else
232 tmp->advlinkopt = 1;
233 if (tmp->advlinkopt) {
234 if ((tmp->sdl = if_nametosdl(intface)) == NULL) {
235 logit(LOG_ERR,
236 "<%s> can't get information of %s",
237 __func__, intface);
238 goto errexit;
239 }
240 tmp->ifindex = tmp->sdl->sdl_index;
241 } else {
242 tmp->ifindex = if_nametoindex(intface);
243 if (tmp->ifindex == 0) {
244 logit(LOG_ERR,
245 "<%s> can't get information of %s",
246 __func__, intface);
247 goto errexit;
248 }
249 }
250 tmp->ifflags = if_getflags(tmp->ifindex, 0);
251 strlcpy(tmp->ifname, intface, sizeof(tmp->ifname));
252 if ((tmp->phymtu = if_getmtu(intface)) == 0) {
253 tmp->phymtu = IPV6_MMTU;
254 logit(LOG_WARNING,
255 "<%s> can't get interface mtu of %s. Treat as %d",
256 __func__, intface, IPV6_MMTU);
257 }
258
259 /*
260 * set router configuration variables.
261 */
262 MAYHAVE(val, "maxinterval", DEF_MAXRTRADVINTERVAL);
263 if (val < MIN_MAXINTERVAL || val > MAX_MAXINTERVAL) {
264 logit(LOG_ERR,
265 "<%s> maxinterval (%d) on %s is invalid "
266 "(must be between %u and %u)", __func__, val,
267 intface, MIN_MAXINTERVAL, MAX_MAXINTERVAL);
268 goto errexit;
269 }
270 tmp->maxinterval = val;
271 MAYHAVE(val, "mininterval", tmp->maxinterval/3);
272 if (val < MIN_MININTERVAL || val > (tmp->maxinterval * 3) / 4) {
273 logit(LOG_ERR,
274 "<%s> mininterval (%d) on %s is invalid "
275 "(must be between %u and %d)",
276 __func__, val, intface, MIN_MININTERVAL,
277 (tmp->maxinterval * 3) / 4);
278 goto errexit;
279 }
280 tmp->mininterval = val;
281
282 MAYHAVE(val, "chlim", DEF_ADVCURHOPLIMIT);
283 tmp->hoplimit = val & 0xff;
284
285 if ((flagstr = (char *)agetstr("raflags", &bp))) {
286 val = 0;
287 if (strchr(flagstr, 'm'))
288 val |= ND_RA_FLAG_MANAGED;
289 if (strchr(flagstr, 'o'))
290 val |= ND_RA_FLAG_OTHER;
291 if (strchr(flagstr, 'h'))
292 val |= ND_RA_FLAG_RTPREF_HIGH;
293 if (strchr(flagstr, 'l')) {
294 if ((val & ND_RA_FLAG_RTPREF_HIGH)) {
295 logit(LOG_ERR, "<%s> the \'h\' and \'l\'"
296 " router flags are exclusive", __func__);
297 goto errexit;
298 }
299 val |= ND_RA_FLAG_RTPREF_LOW;
300 }
301 } else {
302 MAYHAVE(val, "raflags", 0);
303 }
304 tmp->managedflg = val & ND_RA_FLAG_MANAGED;
305 tmp->otherflg = val & ND_RA_FLAG_OTHER;
306 #ifndef ND_RA_FLAG_RTPREF_MASK
307 #define ND_RA_FLAG_RTPREF_MASK 0x18 /* 00011000 */
308 #define ND_RA_FLAG_RTPREF_RSV 0x10 /* 00010000 */
309 #endif
310 tmp->rtpref = val & ND_RA_FLAG_RTPREF_MASK;
311 if (tmp->rtpref == ND_RA_FLAG_RTPREF_RSV) {
312 logit(LOG_ERR, "<%s> invalid router preference (%02x) on %s",
313 __func__, tmp->rtpref, intface);
314 goto errexit;
315 }
316
317 MAYHAVE(val, "rltime", DEF_ADVROUTERLIFETIME);
318 if (val && (val < tmp->maxinterval || val > MAXROUTERLIFETIME)) {
319 logit(LOG_ERR,
320 "<%s> router lifetime (%d) on %s is invalid "
321 "(must be 0 or between %d and %d)",
322 __func__, val, intface,
323 tmp->maxinterval, MAXROUTERLIFETIME);
324 goto errexit;
325 }
326 /*
327 * Basically, hosts MUST NOT send Router Advertisement messages at any
328 * time (RFC 2461, Section 6.2.3). However, it would sometimes be
329 * useful to allow hosts to advertise some parameters such as prefix
330 * information and link MTU. Thus, we allow hosts to invoke rtadvd
331 * only when router lifetime (on every advertising interface) is
332 * explicitly set zero. (see also the above section)
333 */
334 if (val && forwarding == 0) {
335 logit(LOG_ERR,
336 "<%s> non zero router lifetime is specified for %s, "
337 "which must not be allowed for hosts. you must "
338 "change router lifetime or enable IPv6 forwarding.",
339 __func__, intface);
340 goto errexit;
341 }
342 tmp->lifetime = val & 0xffff;
343
344 MAYHAVE(val, "rtime", DEF_ADVREACHABLETIME);
345 if (val < 0 || val > MAXREACHABLETIME) {
346 logit(LOG_ERR,
347 "<%s> reachable time (%d) on %s is invalid "
348 "(must be no greater than %d)",
349 __func__, val, intface, MAXREACHABLETIME);
350 goto errexit;
351 }
352 tmp->reachabletime = (uint32_t)val;
353
354 MAYHAVE(val64, "retrans", DEF_ADVRETRANSTIMER);
355 if (val64 < 0 || val64 > 0xffffffff) {
356 logit(LOG_ERR, "<%s> retrans time (%lld) on %s out of range",
357 __func__, (long long)val64, intface);
358 goto errexit;
359 }
360 tmp->retranstimer = (uint32_t)val64;
361
362 if (agetnum("hapref") != -1 || agetnum("hatime") != -1) {
363 logit(LOG_ERR,
364 "<%s> mobile-ip6 configuration not supported",
365 __func__);
366 goto errexit;
367 }
368 /* prefix information */
369
370 /*
371 * This is an implementation specific parameter to consider
372 * link propagation delays and poorly synchronized clocks when
373 * checking consistency of advertised lifetimes.
374 */
375 MAYHAVE(val, "clockskew", 0);
376 tmp->clockskew = val;
377
378 tmp->pfxs = 0;
379 for (i = -1; i < MAXPREFIX; i++) {
380 struct prefix *pfx;
381
382 makeentry(entbuf, sizeof(entbuf), i, "addr");
383 addr = (char *)agetstr(entbuf, &bp);
384 if (addr == NULL)
385 continue;
386
387 /* allocate memory to store prefix information */
388 if ((pfx = calloc(1, sizeof(*pfx))) == NULL) {
389 logit(LOG_ERR,
390 "<%s> can't allocate memory: %m",
391 __func__);
392 goto errexit;
393 }
394
395 TAILQ_INSERT_TAIL(&tmp->prefix, pfx, next);
396 tmp->pfxs++;
397 pfx->rainfo = tmp;
398
399 pfx->origin = PREFIX_FROM_CONFIG;
400
401 if (inet_pton(AF_INET6, addr, &pfx->prefix) != 1) {
402 logit(LOG_ERR,
403 "<%s> inet_pton failed for %s",
404 __func__, addr);
405 goto errexit;
406 }
407 if (IN6_IS_ADDR_MULTICAST(&pfx->prefix)) {
408 logit(LOG_ERR,
409 "<%s> multicast prefix (%s) must "
410 "not be advertised on %s",
411 __func__, addr, intface);
412 goto errexit;
413 }
414 if (IN6_IS_ADDR_LINKLOCAL(&pfx->prefix))
415 logit(LOG_NOTICE,
416 "<%s> link-local prefix (%s) will be"
417 " advertised on %s",
418 __func__, addr, intface);
419
420 makeentry(entbuf, sizeof(entbuf), i, "prefixlen");
421 MAYHAVE(val, entbuf, 64);
422 if (val < 0 || val > 128) {
423 logit(LOG_ERR, "<%s> prefixlen (%d) for %s "
424 "on %s out of range",
425 __func__, val, addr, intface);
426 goto errexit;
427 }
428 pfx->prefixlen = (int)val;
429
430 makeentry(entbuf, sizeof(entbuf), i, "pinfoflags");
431 if ((flagstr = (char *)agetstr(entbuf, &bp))) {
432 val = 0;
433 if (strchr(flagstr, 'l'))
434 val |= ND_OPT_PI_FLAG_ONLINK;
435 if (strchr(flagstr, 'a'))
436 val |= ND_OPT_PI_FLAG_AUTO;
437 } else {
438 MAYHAVE(val, entbuf,
439 (ND_OPT_PI_FLAG_ONLINK|ND_OPT_PI_FLAG_AUTO));
440 }
441 pfx->onlinkflg = val & ND_OPT_PI_FLAG_ONLINK;
442 pfx->autoconfflg = val & ND_OPT_PI_FLAG_AUTO;
443
444 makeentry(entbuf, sizeof(entbuf), i, "vltime");
445 MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME);
446 if (val64 < 0 || val64 > 0xffffffff) {
447 logit(LOG_ERR, "<%s> vltime (%lld) for "
448 "%s/%d on %s is out of range",
449 __func__, (long long)val64,
450 addr, pfx->prefixlen, intface);
451 goto errexit;
452 }
453 pfx->validlifetime = (uint32_t)val64;
454
455 makeentry(entbuf, sizeof(entbuf), i, "vltimedecr");
456 if (agetflag(entbuf)) {
457 struct timespec now;
458 prog_clock_gettime(CLOCK_MONOTONIC, &now);
459 pfx->vltimeexpire =
460 now.tv_sec + pfx->validlifetime;
461 }
462
463 makeentry(entbuf, sizeof(entbuf), i, "pltime");
464 MAYHAVE(val64, entbuf, DEF_ADVPREFERREDLIFETIME);
465 if (val64 < 0 || val64 > 0xffffffff) {
466 logit(LOG_ERR,
467 "<%s> pltime (%lld) for %s/%d on %s "
468 "is out of range",
469 __func__, (long long)val64,
470 addr, pfx->prefixlen, intface);
471 goto errexit;
472 }
473 pfx->preflifetime = (uint32_t)val64;
474
475 makeentry(entbuf, sizeof(entbuf), i, "pltimedecr");
476 if (agetflag(entbuf)) {
477 struct timespec now;
478 prog_clock_gettime(CLOCK_MONOTONIC, &now);
479 pfx->pltimeexpire =
480 now.tv_sec + pfx->preflifetime;
481 }
482 }
483 if (TAILQ_FIRST(&tmp->prefix) == NULL && !agetflag("noifprefix"))
484 get_prefix(tmp);
485
486 MAYHAVE(val64, "mtu", 0);
487 if (val64 < 0 || val64 > 0xffffffff) {
488 logit(LOG_ERR,
489 "<%s> mtu (%" PRIi64 ") on %s out of range",
490 __func__, val64, intface);
491 goto errexit;
492 }
493 tmp->linkmtu = (uint32_t)val64;
494 if (tmp->linkmtu == 0) {
495 char *mtustr;
496
497 if ((mtustr = (char *)agetstr("mtu", &bp)) &&
498 strcmp(mtustr, "auto") == 0)
499 tmp->linkmtu = tmp->phymtu;
500 }
501 else if (tmp->linkmtu < IPV6_MMTU || tmp->linkmtu > tmp->phymtu) {
502 logit(LOG_ERR,
503 "<%s> advertised link mtu (%d) on %s is invalid (must "
504 "be between least MTU (%d) and physical link MTU (%d)",
505 __func__, tmp->linkmtu, intface,
506 IPV6_MMTU, tmp->phymtu);
507 goto errexit;
508 }
509
510 #ifdef SIOCSIFINFO_IN6
511 {
512 struct in6_ndireq ndi;
513 int s;
514
515 if ((s = prog_socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
516 logit(LOG_ERR, "<%s> socket: %m", __func__);
517 goto errexit;
518 }
519 memset(&ndi, 0, sizeof(ndi));
520 strncpy(ndi.ifname, intface, IFNAMSIZ);
521 if (prog_ioctl(s, SIOCGIFINFO_IN6, &ndi) < 0) {
522 logit(LOG_INFO, "<%s> ioctl:SIOCGIFINFO_IN6 at %s: %m",
523 __func__, intface);
524 }
525
526 /* reflect the RA info to the host variables in kernel */
527 ndi.ndi.chlim = tmp->hoplimit;
528 ndi.ndi.retrans = tmp->retranstimer;
529 ndi.ndi.basereachable = tmp->reachabletime;
530 if (prog_ioctl(s, SIOCSIFINFO_IN6, &ndi) < 0) {
531 logit(LOG_INFO, "<%s> ioctl:SIOCSIFINFO_IN6 at %s: %m",
532 __func__, intface);
533 }
534 prog_close(s);
535 }
536 #endif
537
538 /* route information */
539 for (i = -1; i < MAXROUTE; i++) {
540 struct rtinfo *rti;
541 char oentbuf[256];
542
543 makeentry(entbuf, sizeof(entbuf), i, "rtprefix");
544 addr = (char *)agetstr(entbuf, &bp);
545 if (addr == NULL) {
546 makeentry(oentbuf, sizeof(oentbuf), i, "rtrprefix");
547 addr = (char *)agetstr(oentbuf, &bp);
548 if (addr) {
549 fprintf(stderr, "%s was obsoleted. Use %s.\n",
550 oentbuf, entbuf);
551 }
552 }
553 if (addr == NULL)
554 continue;
555
556 ELM_MALLOC(rti);
557 memset(rti, 0, sizeof(*rti));
558
559 /* link into chain */
560 TAILQ_INSERT_TAIL(&tmp->route, rti, next);
561
562 if (inet_pton(AF_INET6, addr, &rti->prefix) != 1) {
563 logit(LOG_ERR, "<%s> inet_pton failed for %s",
564 __func__, addr);
565 goto errexit;
566 }
567 #if 0
568 /*
569 * XXX: currently there's no restriction in route information
570 * prefix according to
571 * draft-ietf-ipngwg-router-selection-00.txt.
572 * However, I think the similar restriction be necessary.
573 */
574 MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME);
575 if (IN6_IS_ADDR_MULTICAST(&rti->prefix)) {
576 logit(LOG_ERR,
577 "<%s> multicast route (%s) must "
578 "not be advertised on %s",
579 __func__, addr, intface);
580 goto errexit;
581 }
582 if (IN6_IS_ADDR_LINKLOCAL(&rti->prefix)) {
583 logit(LOG_NOTICE,
584 "<%s> link-local route (%s) will "
585 "be advertised on %s",
586 __func__, addr, intface);
587 goto errexit;
588 }
589 #endif
590
591 makeentry(entbuf, sizeof(entbuf), i, "rtplen");
592 /* XXX: 256 is a magic number for compatibility check. */
593 MAYHAVE(val, entbuf, 256);
594 if (val == 256) {
595 makeentry(oentbuf, sizeof(oentbuf), i, "rtrplen");
596 MAYHAVE(val, oentbuf, 256);
597 if (val != 256) {
598 fprintf(stderr, "%s was obsoleted. Use %s.\n",
599 oentbuf, entbuf);
600 } else
601 val = 64;
602 }
603 if (val < 0 || val > 128) {
604 logit(LOG_ERR, "<%s> prefixlen (%d) for %s on %s "
605 "out of range",
606 __func__, val, addr, intface);
607 goto errexit;
608 }
609 rti->prefixlen = (int)val;
610
611 makeentry(entbuf, sizeof(entbuf), i, "rtflags");
612 if ((flagstr = (char *)agetstr(entbuf, &bp))) {
613 val = 0;
614 if (strchr(flagstr, 'h'))
615 val |= ND_RA_FLAG_RTPREF_HIGH;
616 if (strchr(flagstr, 'l')) {
617 if ((val & ND_RA_FLAG_RTPREF_HIGH)) {
618 logit(LOG_ERR,
619 "<%s> the \'h\' and \'l\' route"
620 " preferences are exclusive",
621 __func__);
622 goto errexit;
623 }
624 val |= ND_RA_FLAG_RTPREF_LOW;
625 }
626 } else
627 MAYHAVE(val, entbuf, 256); /* XXX */
628 if (val == 256) {
629 makeentry(oentbuf, sizeof(oentbuf), i, "rtrflags");
630 MAYHAVE(val, oentbuf, 256);
631 if (val != 256) {
632 fprintf(stderr, "%s was obsoleted. Use %s.\n",
633 oentbuf, entbuf);
634 } else
635 val = 0;
636 }
637 rti->rtpref = val & ND_RA_FLAG_RTPREF_MASK;
638 if (rti->rtpref == ND_RA_FLAG_RTPREF_RSV) {
639 logit(LOG_ERR, "<%s> invalid route preference (%02x) "
640 "for %s/%d on %s",
641 __func__, rti->rtpref, addr,
642 rti->prefixlen, intface);
643 goto errexit;
644 }
645
646 /*
647 * Since the spec does not a default value, we should make
648 * this entry mandatory. However, FreeBSD 4.4 has shipped
649 * with this field being optional, we use the router lifetime
650 * as an ad-hoc default value with a warning message.
651 */
652 makeentry(entbuf, sizeof(entbuf), i, "rtltime");
653 MAYHAVE(val64, entbuf, -1);
654 if (val64 == -1) {
655 makeentry(oentbuf, sizeof(oentbuf), i, "rtrltime");
656 MAYHAVE(val64, oentbuf, -1);
657 if (val64 != -1) {
658 fprintf(stderr, "%s was obsoleted. Use %s.\n",
659 oentbuf, entbuf);
660 } else {
661 fprintf(stderr, "%s should be specified "
662 "for interface %s.\n",
663 entbuf, intface);
664 val64 = tmp->lifetime;
665 }
666 }
667 if (val64 < 0 || val64 > 0xffffffff) {
668 logit(LOG_ERR, "<%s> route lifetime (%lld) for "
669 "%s/%d on %s out of range", __func__,
670 (long long)val64, addr, rti->prefixlen, intface);
671 goto errexit;
672 }
673 rti->ltime = (uint32_t)val64;
674 }
675
676 /* RDNSS */
677 for (i = -1; i < MAXRDNSS; i++) {
678 struct rdnss_addr *rdnsa;
679
680 makeentry(entbuf, sizeof(entbuf), i, "rdnss");
681 addr = (char *)agetstr(entbuf, &bp);
682 if (addr == NULL)
683 continue;
684
685 ELM_MALLOC(rdnss);
686 TAILQ_INSERT_TAIL(&tmp->rdnss, rdnss, next);
687 TAILQ_INIT(&rdnss->list);
688
689 for (ap = addr; ap - addr < (ssize_t)strlen(addr); ap += c+1) {
690 c = strcspn(ap, ",");
691 strncpy(abuf, ap, c);
692 abuf[c] = '\0';
693 ELM_MALLOC(rdnsa);
694 TAILQ_INSERT_TAIL(&rdnss->list, rdnsa, next);
695 if (inet_pton(AF_INET6, abuf, &rdnsa->addr) != 1) {
696 logit(LOG_ERR, "<%s> inet_pton failed for %s",
697 __func__, addr);
698 goto errexit;
699 }
700 }
701
702 makeentry(entbuf, sizeof(entbuf), i, "rdnssltime");
703 MAYHAVE(val64, entbuf, tmp->maxinterval * 3 / 2);
704 if (val64 < tmp->maxinterval ||
705 val64 > tmp->maxinterval * 2)
706 {
707 logit(LOG_ERR, "<%s> %s (%lld) on %s is invalid",
708 __func__, entbuf, (long long)val64, intface);
709 goto errexit;
710 }
711 rdnss->lifetime = (uint32_t)val64;
712
713 }
714
715 /* DNSSL */
716 TAILQ_INIT(&tmp->dnssl);
717 for (i = -1; i < MAXDNSSL; i++) {
718 struct dnssl_domain *dnsd;
719
720 makeentry(entbuf, sizeof(entbuf), i, "dnssl");
721 addr = (char *)agetstr(entbuf, &bp);
722 if (addr == NULL)
723 continue;
724
725 ELM_MALLOC(dnssl);
726 TAILQ_INSERT_TAIL(&tmp->dnssl, dnssl, next);
727 TAILQ_INIT(&dnssl->list);
728
729 for (ap = addr; ap - addr < (ssize_t)strlen(addr); ap += c+1) {
730 c = strcspn(ap, ",");
731 strncpy(abuf, ap, c);
732 abuf[c] = '\0';
733 ELM_MALLOC(dnsd);
734 TAILQ_INSERT_TAIL(&dnssl->list, dnsd, next);
735 dnsd->len = encode_domain(dnsd->domain, abuf);
736 }
737
738 makeentry(entbuf, sizeof(entbuf), i, "dnsslltime");
739 MAYHAVE(val64, entbuf, tmp->maxinterval * 3 / 2);
740 if (val64 < tmp->maxinterval ||
741 val64 > tmp->maxinterval * 2)
742 {
743 logit(LOG_ERR, "<%s> %s (%lld) on %s is invalid",
744 __func__, entbuf, (long long)val64, intface);
745 goto errexit;
746 }
747 dnssl->lifetime = (uint32_t)val64;
748
749 }
750
751 TAILQ_FOREACH(rai, &ralist, next) {
752 if (rai->ifindex == tmp->ifindex) {
753 TAILQ_REMOVE(&ralist, rai, next);
754 /* If we already have a leaving RA use that
755 * as this config hasn't been advertised */
756 if (rai->leaving) {
757 tmp->leaving = rai->leaving;
758 free_rainfo(rai);
759 rai = tmp->leaving;
760 rai->leaving_for = tmp;
761 break;
762 }
763 rai->lifetime = 0;
764 TAILQ_FOREACH(rdnss, &rai->rdnss, next)
765 rdnss->lifetime = 0;
766 TAILQ_FOREACH(dnssl, &rai->dnssl, next)
767 dnssl->lifetime = 0;
768 rai->leaving_for = tmp;
769 tmp->leaving = rai;
770 rai->initcounter = MAX_INITIAL_RTR_ADVERTISEMENTS;
771 rai->mininterval = MIN_DELAY_BETWEEN_RAS;
772 rai->maxinterval = MIN_DELAY_BETWEEN_RAS;
773 rai->leaving_adv = MAX_FINAL_RTR_ADVERTISEMENTS;
774 if (rai->timer == NULL)
775 rai->timer = rtadvd_add_timer(ra_timeout,
776 ra_timer_update,
777 rai, rai);
778 ra_timer_update((void *)rai, &rai->timer->tm);
779 rtadvd_set_timer(&rai->timer->tm, rai->timer);
780 break;
781 }
782 }
783
784 /* okey */
785 TAILQ_INSERT_TAIL(&ralist, tmp, next);
786
787 /* construct the sending packet */
788 make_packet(tmp);
789
790 /* set timer */
791 if (rai)
792 return;
793 tmp->timer = rtadvd_add_timer(ra_timeout, ra_timer_update,
794 tmp, tmp);
795 ra_timer_set_short_delay(tmp, tmp->timer);
796 tmp->timer_sol = rtadvd_add_timer(ra_timeout_sol, NULL, tmp, NULL);
797
798 return;
799
800 errexit:
801 if (exithard)
802 exit(1);
803 free_rainfo(tmp);
804 }
805
806 void
807 get_prefix(struct rainfo *rai)
808 {
809 struct ifaddrs *ifap, *ifa;
810 struct prefix *pp;
811 struct in6_addr *a;
812 unsigned char *p, *ep, *m, *lim;
813 char ntopbuf[INET6_ADDRSTRLEN];
814
815 if (getifaddrs(&ifap) < 0) {
816 logit(LOG_ERR,
817 "<%s> can't get interface addresses",
818 __func__);
819 exit(1);
820 }
821
822 for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
823 int plen;
824
825 if (strcmp(ifa->ifa_name, rai->ifname) != 0)
826 continue;
827 if (ifa->ifa_addr->sa_family != AF_INET6)
828 continue;
829 a = &((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_addr;
830 if (IN6_IS_ADDR_LINKLOCAL(a))
831 continue;
832 /* get prefix length */
833 m = (unsigned char *)&((struct sockaddr_in6 *)ifa->ifa_netmask)->sin6_addr;
834 lim = (unsigned char *)(ifa->ifa_netmask) + ifa->ifa_netmask->sa_len;
835 plen = prefixlen(m, lim);
836 if (plen <= 0 || plen > 128) {
837 logit(LOG_ERR, "<%s> failed to get prefixlen "
838 "or prefix is invalid",
839 __func__);
840 exit(1);
841 }
842 if (plen == 128) /* XXX */
843 continue;
844 if (find_prefix(rai, a, plen)) {
845 /* ignore a duplicated prefix. */
846 continue;
847 }
848
849 /* allocate memory to store prefix info. */
850 if ((pp = calloc(1, sizeof(*pp))) == NULL) {
851 logit(LOG_ERR,
852 "<%s> can't get allocate buffer for prefix",
853 __func__);
854 exit(1);
855 }
856
857 /* set prefix, sweep bits outside of prefixlen */
858 pp->prefixlen = plen;
859 memcpy(&pp->prefix, a, sizeof(*a));
860 if (1)
861 {
862 p = (unsigned char *)&pp->prefix;
863 ep = (unsigned char *)(&pp->prefix + 1);
864 while (m < lim && p < ep)
865 *p++ &= *m++;
866 while (p < ep)
867 *p++ = 0x00;
868 }
869 if (!inet_ntop(AF_INET6, &pp->prefix, ntopbuf,
870 sizeof(ntopbuf))) {
871 logit(LOG_ERR, "<%s> inet_ntop failed", __func__);
872 exit(1);
873 }
874 logit(LOG_DEBUG,
875 "<%s> add %s/%d to prefix list on %s",
876 __func__, ntopbuf, pp->prefixlen, rai->ifname);
877
878 /* set other fields with protocol defaults */
879 pp->validlifetime = DEF_ADVVALIDLIFETIME;
880 pp->preflifetime = DEF_ADVPREFERREDLIFETIME;
881 pp->onlinkflg = 1;
882 pp->autoconfflg = 1;
883 pp->origin = PREFIX_FROM_KERNEL;
884 pp->rainfo = rai;
885
886 /* link into chain */
887 TAILQ_INSERT_TAIL(&rai->prefix, pp, next);
888 rai->pfxs++;
889 }
890
891 freeifaddrs(ifap);
892 }
893
894 static void
895 makeentry(char *buf, size_t len, int id, const char *string)
896 {
897
898 if (id < 0)
899 strlcpy(buf, string, len);
900 else
901 snprintf(buf, len, "%s%d", string, id);
902 }
903
904 /*
905 * Add a prefix to the list of specified interface and reconstruct
906 * the outgoing packet.
907 * The prefix must not be in the list.
908 * XXX: other parameters of the prefix(e.g. lifetime) should be
909 * able to be specified.
910 */
911 static void
912 add_prefix(struct rainfo *rai, struct in6_prefixreq *ipr)
913 {
914 struct prefix *prefix;
915 char ntopbuf[INET6_ADDRSTRLEN];
916
917 if ((prefix = calloc(1, sizeof(*prefix))) == NULL) {
918 logit(LOG_ERR, "<%s> memory allocation failed",
919 __func__);
920 return; /* XXX: error or exit? */
921 }
922 prefix->prefix = ipr->ipr_prefix.sin6_addr;
923 prefix->prefixlen = ipr->ipr_plen;
924 prefix->validlifetime = ipr->ipr_vltime;
925 prefix->preflifetime = ipr->ipr_pltime;
926 prefix->onlinkflg = ipr->ipr_raf_onlink;
927 prefix->autoconfflg = ipr->ipr_raf_auto;
928 prefix->origin = PREFIX_FROM_DYNAMIC;
929
930 prefix->rainfo = rai;
931 TAILQ_INSERT_TAIL(&rai->prefix, prefix, next);
932 rai->pfxs++;
933
934 logit(LOG_DEBUG, "<%s> new prefix %s/%d was added on %s",
935 __func__, inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr,
936 ntopbuf, INET6_ADDRSTRLEN),
937 ipr->ipr_plen, rai->ifname);
938
939 /* free the previous packet */
940 free(rai->ra_data);
941 rai->ra_data = NULL;
942
943 /* reconstruct the packet */
944 make_packet(rai);
945 }
946
947 /*
948 * Delete a prefix to the list of specified interface and reconstruct
949 * the outgoing packet.
950 * The prefix must be in the list.
951 */
952 void
953 delete_prefix(struct prefix *prefix)
954 {
955 char ntopbuf[INET6_ADDRSTRLEN];
956 struct rainfo *rai = prefix->rainfo;
957
958 TAILQ_REMOVE(&rai->prefix, prefix, next);
959 rai->pfxs--;
960 logit(LOG_DEBUG, "<%s> prefix %s/%d was deleted on %s",
961 __func__, inet_ntop(AF_INET6, &prefix->prefix,
962 ntopbuf, INET6_ADDRSTRLEN),
963 prefix->prefixlen, rai->ifname);
964 rtadvd_remove_timer(&prefix->timer);
965 free(prefix);
966 }
967
968 void
969 invalidate_prefix(struct prefix *prefix)
970 {
971 char ntopbuf[INET6_ADDRSTRLEN];
972 struct timespec timo;
973 struct rainfo *rai = prefix->rainfo;
974
975 if (prefix->timer) { /* sanity check */
976 logit(LOG_ERR,
977 "<%s> assumption failure: timer already exists",
978 __func__);
979 exit(1);
980 }
981
982 logit(LOG_DEBUG, "<%s> prefix %s/%d was invalidated on %s, "
983 "will expire in %ld seconds", __func__,
984 inet_ntop(AF_INET6, &prefix->prefix, ntopbuf, INET6_ADDRSTRLEN),
985 prefix->prefixlen, rai->ifname, (long)prefix_timo);
986
987 /* set the expiration timer */
988 prefix->timer = rtadvd_add_timer(prefix_timeout, NULL, prefix, NULL);
989 if (prefix->timer == NULL) {
990 logit(LOG_ERR, "<%s> failed to add a timer for a prefix. "
991 "remove the prefix", __func__);
992 delete_prefix(prefix);
993 }
994 timo.tv_sec = prefix_timo;
995 timo.tv_nsec = 0;
996 rtadvd_set_timer(&timo, prefix->timer);
997 }
998
999 static struct rtadvd_timer *
1000 prefix_timeout(void *arg)
1001 {
1002 struct prefix *prefix = (struct prefix *)arg;
1003
1004 delete_prefix(prefix);
1005
1006 return(NULL);
1007 }
1008
1009 void
1010 update_prefix(struct prefix * prefix)
1011 {
1012 char ntopbuf[INET6_ADDRSTRLEN];
1013 struct rainfo *rai = prefix->rainfo;
1014
1015 if (prefix->timer == NULL) { /* sanity check */
1016 logit(LOG_ERR,
1017 "<%s> assumption failure: timer does not exist",
1018 __func__);
1019 exit(1);
1020 }
1021
1022 logit(LOG_DEBUG, "<%s> prefix %s/%d was re-enabled on %s",
1023 __func__, inet_ntop(AF_INET6, &prefix->prefix, ntopbuf,
1024 INET6_ADDRSTRLEN), prefix->prefixlen, rai->ifname);
1025
1026 /* stop the expiration timer */
1027 rtadvd_remove_timer(&prefix->timer);
1028 }
1029
1030 /*
1031 * Try to get an in6_prefixreq contents for a prefix which matches
1032 * ipr->ipr_prefix and ipr->ipr_plen and belongs to
1033 * the interface whose name is ipr->ipr_name[].
1034 */
1035 static int
1036 init_prefix(struct in6_prefixreq *ipr)
1037 {
1038 #if 0
1039 int s;
1040
1041 if ((s = prog_socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
1042 logit(LOG_ERR, "<%s> socket: %m", __func__);
1043 exit(1);
1044 }
1045
1046 if (prog_ioctl(s, SIOCGIFPREFIX_IN6, ipr) < 0) {
1047 logit(LOG_INFO, "<%s> ioctl:SIOCGIFPREFIX: %m", __func__);
1048
1049 ipr->ipr_vltime = DEF_ADVVALIDLIFETIME;
1050 ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME;
1051 ipr->ipr_raf_onlink = 1;
1052 ipr->ipr_raf_auto = 1;
1053 /* omit other field initialization */
1054 }
1055 else if (ipr->ipr_origin < PR_ORIG_RR) {
1056 char ntopbuf[INET6_ADDRSTRLEN];
1057
1058 logit(LOG_WARNING, "<%s> Added prefix(%s)'s origin %d is"
1059 "lower than PR_ORIG_RR(router renumbering)."
1060 "This should not happen if I am router", __func__,
1061 inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr, ntopbuf,
1062 sizeof(ntopbuf)), ipr->ipr_origin);
1063 prog_close(s);
1064 return 1;
1065 }
1066
1067 prog_close(s);
1068 return 0;
1069 #else
1070 ipr->ipr_vltime = DEF_ADVVALIDLIFETIME;
1071 ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME;
1072 ipr->ipr_raf_onlink = 1;
1073 ipr->ipr_raf_auto = 1;
1074 return 0;
1075 #endif
1076 }
1077
1078 void
1079 make_prefix(struct rainfo *rai, int ifindex, struct in6_addr *addr, int plen)
1080 {
1081 struct in6_prefixreq ipr;
1082
1083 memset(&ipr, 0, sizeof(ipr));
1084 if (if_indextoname(ifindex, ipr.ipr_name) == NULL) {
1085 logit(LOG_ERR, "<%s> Prefix added interface No.%d doesn't"
1086 "exist. This should not happen: %m", __func__,
1087 ifindex);
1088 exit(1);
1089 }
1090 ipr.ipr_prefix.sin6_len = sizeof(ipr.ipr_prefix);
1091 ipr.ipr_prefix.sin6_family = AF_INET6;
1092 ipr.ipr_prefix.sin6_addr = *addr;
1093 ipr.ipr_plen = plen;
1094
1095 if (init_prefix(&ipr))
1096 return; /* init failed by some error */
1097 add_prefix(rai, &ipr);
1098 }
1099
1100 void
1101 make_packet(struct rainfo *rainfo)
1102 {
1103 size_t packlen, lladdroptlen = 0;
1104 char *buf;
1105 struct nd_router_advert *ra;
1106 struct nd_opt_prefix_info *ndopt_pi;
1107 struct nd_opt_mtu *ndopt_mtu;
1108 struct prefix *pfx;
1109 struct nd_opt_route_info *ndopt_rti;
1110 struct rtinfo *rti;
1111 struct nd_opt_rdnss *ndopt_rdnss;
1112 struct rdnss *rdns;
1113 struct rdnss_addr *rdnsa;
1114 struct nd_opt_dnssl *ndopt_dnssl;
1115 struct dnssl *dnsl;
1116 struct dnssl_domain *dnsd;
1117 size_t len, plen;
1118
1119 /* calculate total length */
1120 packlen = sizeof(struct nd_router_advert);
1121 if (rainfo->advlinkopt) {
1122 if ((lladdroptlen = lladdropt_length(rainfo->sdl)) == 0) {
1123 logit(LOG_INFO,
1124 "<%s> link-layer address option has"
1125 " null length on %s. Treat as not included.",
1126 __func__, rainfo->ifname);
1127 rainfo->advlinkopt = 0;
1128 }
1129 packlen += lladdroptlen;
1130 }
1131 if (TAILQ_FIRST(&rainfo->prefix) != NULL)
1132 packlen += sizeof(struct nd_opt_prefix_info) * rainfo->pfxs;
1133 if (rainfo->linkmtu)
1134 packlen += sizeof(struct nd_opt_mtu);
1135 TAILQ_FOREACH(rti, &rainfo->route, next)
1136 packlen += sizeof(struct nd_opt_route_info) +
1137 ((rti->prefixlen + 0x3f) >> 6) * 8;
1138
1139 TAILQ_FOREACH(rdns, &rainfo->rdnss, next) {
1140 packlen += sizeof(struct nd_opt_rdnss);
1141 TAILQ_FOREACH(rdnsa, &rdns->list, next)
1142 packlen += sizeof(rdnsa->addr);
1143 }
1144 TAILQ_FOREACH(dnsl, &rainfo->dnssl, next) {
1145 packlen += sizeof(struct nd_opt_dnssl);
1146 len = 0;
1147 TAILQ_FOREACH(dnsd, &dnsl->list, next)
1148 len += dnsd->len;
1149 len += len % 8 ? 8 - len % 8 : 0;
1150 packlen += len;
1151 }
1152
1153 /* allocate memory for the packet */
1154 if ((buf = realloc(rainfo->ra_data, packlen)) == NULL) {
1155 logit(LOG_ERR,
1156 "<%s> can't get enough memory for an RA packet %m",
1157 __func__);
1158 exit(1);
1159 }
1160 rainfo->ra_data = buf;
1161 /* XXX: what if packlen > 576? */
1162 rainfo->ra_datalen = packlen;
1163 #define CHECKLEN(size) \
1164 do { \
1165 if (buf + size > rainfo->ra_data + packlen) { \
1166 logit(LOG_ERR, \
1167 "<%s, %d> RA packet does not fit in %zu",\
1168 __func__, __LINE__, packlen); \
1169 exit(1); \
1170 } \
1171 } while (/*CONSTCOND*/0)
1172 /*
1173 * construct the packet
1174 */
1175 CHECKLEN(sizeof(*ra));
1176 ra = (struct nd_router_advert *)buf;
1177 ra->nd_ra_type = ND_ROUTER_ADVERT;
1178 ra->nd_ra_code = 0;
1179 ra->nd_ra_cksum = 0;
1180 ra->nd_ra_curhoplimit = (uint8_t)(0xff & rainfo->hoplimit);
1181 ra->nd_ra_flags_reserved = 0; /* just in case */
1182 /*
1183 * XXX: the router preference field, which is a 2-bit field, should be
1184 * initialized before other fields.
1185 */
1186 ra->nd_ra_flags_reserved = 0xff & rainfo->rtpref;
1187 ra->nd_ra_flags_reserved |=
1188 rainfo->managedflg ? ND_RA_FLAG_MANAGED : 0;
1189 ra->nd_ra_flags_reserved |=
1190 rainfo->otherflg ? ND_RA_FLAG_OTHER : 0;
1191 ra->nd_ra_router_lifetime = htons(rainfo->lifetime);
1192 ra->nd_ra_reachable = htonl(rainfo->reachabletime);
1193 ra->nd_ra_retransmit = htonl(rainfo->retranstimer);
1194 buf += sizeof(*ra);
1195
1196 if (rainfo->advlinkopt) {
1197 CHECKLEN(sizeof(struct nd_opt_hdr));
1198 lladdropt_fill(rainfo->sdl, (struct nd_opt_hdr *)buf);
1199 buf += lladdroptlen;
1200 }
1201
1202 if (rainfo->linkmtu) {
1203 CHECKLEN(sizeof(*ndopt_mtu));
1204 ndopt_mtu = (struct nd_opt_mtu *)buf;
1205 ndopt_mtu->nd_opt_mtu_type = ND_OPT_MTU;
1206 ndopt_mtu->nd_opt_mtu_len = 1;
1207 ndopt_mtu->nd_opt_mtu_reserved = 0;
1208 ndopt_mtu->nd_opt_mtu_mtu = htonl(rainfo->linkmtu);
1209 buf += sizeof(struct nd_opt_mtu);
1210 }
1211
1212 TAILQ_FOREACH(pfx, &rainfo->prefix, next) {
1213 uint32_t vltime, pltime;
1214 struct timespec now;
1215
1216 CHECKLEN(sizeof(*ndopt_pi));
1217 ndopt_pi = (struct nd_opt_prefix_info *)buf;
1218 ndopt_pi->nd_opt_pi_type = ND_OPT_PREFIX_INFORMATION;
1219 ndopt_pi->nd_opt_pi_len = 4;
1220 ndopt_pi->nd_opt_pi_prefix_len = pfx->prefixlen;
1221 ndopt_pi->nd_opt_pi_flags_reserved = 0;
1222 if (pfx->onlinkflg)
1223 ndopt_pi->nd_opt_pi_flags_reserved |=
1224 ND_OPT_PI_FLAG_ONLINK;
1225 if (pfx->autoconfflg)
1226 ndopt_pi->nd_opt_pi_flags_reserved |=
1227 ND_OPT_PI_FLAG_AUTO;
1228 if (pfx->timer)
1229 vltime = 0;
1230 else {
1231 if (pfx->vltimeexpire || pfx->pltimeexpire)
1232 prog_clock_gettime(CLOCK_MONOTONIC, &now);
1233 if (pfx->vltimeexpire == 0)
1234 vltime = pfx->validlifetime;
1235 else
1236 vltime = (pfx->vltimeexpire > now.tv_sec) ?
1237 pfx->vltimeexpire - now.tv_sec : 0;
1238 }
1239 if (pfx->timer)
1240 pltime = 0;
1241 else {
1242 if (pfx->pltimeexpire == 0)
1243 pltime = pfx->preflifetime;
1244 else
1245 pltime = (pfx->pltimeexpire > now.tv_sec) ?
1246 pfx->pltimeexpire - now.tv_sec : 0;
1247 }
1248 if (vltime < pltime) {
1249 /*
1250 * this can happen if vltime is decrement but pltime
1251 * is not.
1252 */
1253 pltime = vltime;
1254 }
1255 ndopt_pi->nd_opt_pi_valid_time = htonl(vltime);
1256 ndopt_pi->nd_opt_pi_preferred_time = htonl(pltime);
1257 ndopt_pi->nd_opt_pi_reserved2 = 0;
1258 ndopt_pi->nd_opt_pi_prefix = pfx->prefix;
1259
1260 buf += sizeof(struct nd_opt_prefix_info);
1261 }
1262
1263 TAILQ_FOREACH(rti, &rainfo->route, next) {
1264 uint8_t psize = (rti->prefixlen + 0x3f) >> 6;
1265
1266 CHECKLEN(sizeof(*ndopt_rti));
1267 ndopt_rti = (struct nd_opt_route_info *)buf;
1268 ndopt_rti->nd_opt_rti_type = ND_OPT_ROUTE_INFO;
1269 ndopt_rti->nd_opt_rti_len = 1 + psize;
1270 ndopt_rti->nd_opt_rti_prefixlen = rti->prefixlen;
1271 ndopt_rti->nd_opt_rti_flags = 0xff & rti->rtpref;
1272 ndopt_rti->nd_opt_rti_lifetime = htonl(rti->ltime);
1273 memcpy(ndopt_rti + 1, &rti->prefix, psize * 8);
1274 buf += sizeof(struct nd_opt_route_info) + psize * 8;
1275 }
1276
1277 TAILQ_FOREACH(rdns, &rainfo->rdnss, next) {
1278 CHECKLEN(sizeof(*ndopt_rdnss));
1279 ndopt_rdnss = (struct nd_opt_rdnss *)buf;
1280 ndopt_rdnss->nd_opt_rdnss_type = ND_OPT_RDNSS;
1281 ndopt_rdnss->nd_opt_rdnss_len = 1;
1282 ndopt_rdnss->nd_opt_rdnss_reserved = 0;
1283 ndopt_rdnss->nd_opt_rdnss_lifetime = htonl(rdns->lifetime);
1284 buf += sizeof(*ndopt_rdnss);
1285
1286 TAILQ_FOREACH(rdnsa, &rdns->list, next) {
1287 CHECKLEN(sizeof(rdnsa->addr));
1288 memcpy(buf, &rdnsa->addr, sizeof(rdnsa->addr));
1289 ndopt_rdnss->nd_opt_rdnss_len += 2;
1290 buf += sizeof(rdnsa->addr);
1291 }
1292 }
1293
1294 TAILQ_FOREACH(dnsl, &rainfo->dnssl, next) {
1295 CHECKLEN(sizeof(*ndopt_dnssl));
1296 ndopt_dnssl = (struct nd_opt_dnssl *)buf;
1297 ndopt_dnssl->nd_opt_dnssl_type = ND_OPT_DNSSL;
1298 ndopt_dnssl->nd_opt_dnssl_len = 0;
1299 ndopt_dnssl->nd_opt_dnssl_reserved = 0;
1300 ndopt_dnssl->nd_opt_dnssl_lifetime = htonl(dnsl->lifetime);
1301 buf += sizeof(*ndopt_dnssl);
1302
1303 TAILQ_FOREACH(dnsd, &dnsl->list, next) {
1304 CHECKLEN(dnsd->len);
1305 memcpy(buf, dnsd->domain, dnsd->len);
1306 buf += dnsd->len;
1307 }
1308 /* Ensure our length is padded correctly */
1309 len = buf - (char *)ndopt_dnssl;
1310 plen = len % 8 ? 8 - len % 8 : 0;
1311 CHECKLEN(plen);
1312 memset(buf, 0, plen);
1313 buf += plen;
1314 ndopt_dnssl->nd_opt_dnssl_len = (len + plen) / 8;
1315 }
1316 memset(buf, 0, packlen - (buf - rainfo->ra_data));
1317 }
1318
1319 static int
1320 getinet6sysctl(int code)
1321 {
1322 const int mib[] = { CTL_NET, PF_INET6, IPPROTO_IPV6, code };
1323 int value;
1324 size_t size;
1325
1326 size = sizeof(value);
1327 if (prog_sysctl(mib, __arraycount(mib), &value, &size, NULL, 0)
1328 < 0) {
1329 logit(LOG_ERR, "<%s>: failed to get ip6 sysctl(%d): %m",
1330 __func__, code);
1331 return -1;
1332 }
1333 else
1334 return value;
1335 }
1336