| @@ -1,1325 +1,1325 @@ | | | @@ -1,1325 +1,1325 @@ |
1 | /* $NetBSD: config.c,v 1.31 2012/12/14 09:48:31 roy Exp $ */ | | 1 | /* $NetBSD: config.c,v 1.32 2013/01/24 17:44:59 christos Exp $ */ |
2 | /* $KAME: config.c,v 1.93 2005/10/17 14:40:02 suz Exp $ */ | | 2 | /* $KAME: config.c,v 1.93 2005/10/17 14:40:02 suz Exp $ */ |
3 | | | 3 | |
4 | /* | | 4 | /* |
5 | * Copyright (C) 1998 WIDE Project. | | 5 | * Copyright (C) 1998 WIDE Project. |
6 | * All rights reserved. | | 6 | * All rights reserved. |
7 | * | | 7 | * |
8 | * Redistribution and use in source and binary forms, with or without | | 8 | * Redistribution and use in source and binary forms, with or without |
9 | * modification, are permitted provided that the following conditions | | 9 | * modification, are permitted provided that the following conditions |
10 | * are met: | | 10 | * are met: |
11 | * 1. Redistributions of source code must retain the above copyright | | 11 | * 1. Redistributions of source code must retain the above copyright |
12 | * notice, this list of conditions and the following disclaimer. | | 12 | * notice, this list of conditions and the following disclaimer. |
13 | * 2. Redistributions in binary form must reproduce the above copyright | | 13 | * 2. Redistributions in binary form must reproduce the above copyright |
14 | * notice, this list of conditions and the following disclaimer in the | | 14 | * notice, this list of conditions and the following disclaimer in the |
15 | * documentation and/or other materials provided with the distribution. | | 15 | * documentation and/or other materials provided with the distribution. |
16 | * 3. Neither the name of the project nor the names of its contributors | | 16 | * 3. Neither the name of the project nor the names of its contributors |
17 | * may be used to endorse or promote products derived from this software | | 17 | * may be used to endorse or promote products derived from this software |
18 | * without specific prior written permission. | | 18 | * without specific prior written permission. |
19 | * | | 19 | * |
20 | * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND | | 20 | * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND |
21 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | | 21 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
22 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | | 22 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
23 | * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE | | 23 | * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE |
24 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | | 24 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
25 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | | 25 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
26 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | | 26 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
27 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | | 27 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
28 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | | 28 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
29 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | | 29 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
30 | * SUCH DAMAGE. | | 30 | * SUCH DAMAGE. |
31 | */ | | 31 | */ |
32 | | | 32 | |
33 | #include <sys/param.h> | | 33 | #include <sys/param.h> |
34 | #include <sys/ioctl.h> | | 34 | #include <sys/ioctl.h> |
35 | #include <sys/socket.h> | | 35 | #include <sys/socket.h> |
36 | #include <sys/time.h> | | 36 | #include <sys/time.h> |
37 | #include <sys/sysctl.h> | | 37 | #include <sys/sysctl.h> |
38 | | | 38 | |
39 | #include <net/if.h> | | 39 | #include <net/if.h> |
40 | #include <net/route.h> | | 40 | #include <net/route.h> |
41 | #include <net/if_dl.h> | | 41 | #include <net/if_dl.h> |
42 | #ifdef __FreeBSD__ | | 42 | #ifdef __FreeBSD__ |
43 | #include <net/if_var.h> | | 43 | #include <net/if_var.h> |
44 | #endif | | 44 | #endif |
45 | | | 45 | |
46 | #include <netinet/in.h> | | 46 | #include <netinet/in.h> |
47 | #include <netinet/in_var.h> | | 47 | #include <netinet/in_var.h> |
48 | #include <netinet/ip6.h> | | 48 | #include <netinet/ip6.h> |
49 | #include <netinet6/ip6_var.h> | | 49 | #include <netinet6/ip6_var.h> |
50 | #include <netinet/icmp6.h> | | 50 | #include <netinet/icmp6.h> |
51 | #include <netinet6/nd6.h> | | 51 | #include <netinet6/nd6.h> |
52 | | | 52 | |
53 | #include <arpa/inet.h> | | 53 | #include <arpa/inet.h> |
54 | | | 54 | |
55 | #include <stdio.h> | | 55 | #include <stdio.h> |
56 | #include <syslog.h> | | 56 | #include <syslog.h> |
57 | #include <errno.h> | | 57 | #include <errno.h> |
58 | #include <string.h> | | 58 | #include <string.h> |
59 | #include <stdlib.h> | | 59 | #include <stdlib.h> |
60 | #include <search.h> | | 60 | #include <search.h> |
61 | #include <unistd.h> | | 61 | #include <unistd.h> |
62 | #include <ifaddrs.h> | | 62 | #include <ifaddrs.h> |
63 | #include <inttypes.h> | | 63 | #include <inttypes.h> |
64 | | | 64 | |
65 | #include "rtadvd.h" | | 65 | #include "rtadvd.h" |
66 | #include "advcap.h" | | 66 | #include "advcap.h" |
67 | #include "timer.h" | | 67 | #include "timer.h" |
68 | #include "if.h" | | 68 | #include "if.h" |
69 | #include "config.h" | | 69 | #include "config.h" |
70 | | | 70 | |
71 | #ifndef __arraycount | | 71 | #ifndef __arraycount |
72 | #define __arraycount(__x) (sizeof(__x) / sizeof(__x[0])) | | 72 | #define __arraycount(__x) (sizeof(__x) / sizeof(__x[0])) |
73 | #endif | | 73 | #endif |
74 | | | 74 | |
75 | static time_t prefix_timo = (60 * 120); /* 2 hours. | | 75 | static time_t prefix_timo = (60 * 120); /* 2 hours. |
76 | * XXX: should be configurable. */ | | 76 | * XXX: should be configurable. */ |
77 | static struct rtadvd_timer *prefix_timeout(void *); | | 77 | static struct rtadvd_timer *prefix_timeout(void *); |
78 | static void makeentry(char *, size_t, int, const char *); | | 78 | static void makeentry(char *, size_t, int, const char *); |
79 | static int getinet6sysctl(int); | | 79 | static int getinet6sysctl(int); |
80 | | | 80 | |
81 | static size_t | | 81 | static size_t |
82 | encode_domain(char *dst, const char *src) | | 82 | encode_domain(char *dst, const char *src) |
83 | { | | 83 | { |
84 | ssize_t len; | | 84 | ssize_t len; |
85 | char *odst, *p; | | 85 | char *odst, *p; |
86 | | | 86 | |
87 | odst = dst; | | 87 | odst = dst; |
88 | while (src && (len = strlen(src)) != 0) { | | 88 | while (src && (len = strlen(src)) != 0) { |
89 | p = strchr(src, '.'); | | 89 | p = strchr(src, '.'); |
90 | *dst++ = len = MIN(63, p == NULL ? len : p - src); | | 90 | *dst++ = len = MIN(63, p == NULL ? len : p - src); |
91 | memcpy(dst, src, len); | | 91 | memcpy(dst, src, len); |
92 | dst += len; | | 92 | dst += len; |
93 | if (p == NULL) | | 93 | if (p == NULL) |
94 | break; | | 94 | break; |
95 | src = p + 1; | | 95 | src = p + 1; |
96 | } | | 96 | } |
97 | *dst++ = '\0'; | | 97 | *dst++ = '\0'; |
98 | | | 98 | |
99 | return dst - odst; | | 99 | return dst - odst; |
100 | } | | 100 | } |
101 | | | 101 | |
102 | void | | 102 | void |
103 | free_rainfo(struct rainfo *rai) | | 103 | free_rainfo(struct rainfo *rai) |
104 | { | | 104 | { |
105 | struct prefix *pfx; | | 105 | struct prefix *pfx; |
106 | struct rtinfo *rti; | | 106 | struct rtinfo *rti; |
107 | struct rdnss *rdnss; | | 107 | struct rdnss *rdnss; |
108 | struct rdnss_addr *rdnsa; | | 108 | struct rdnss_addr *rdnsa; |
109 | struct dnssl *dnssl; | | 109 | struct dnssl *dnssl; |
110 | struct dnssl_domain *dnsd; | | 110 | struct dnssl_domain *dnsd; |
111 | | | 111 | |
112 | rtadvd_remove_timer(&rai->timer); | | 112 | rtadvd_remove_timer(&rai->timer); |
113 | | | 113 | |
114 | while ((pfx = TAILQ_FIRST(&rai->prefix))) { | | 114 | while ((pfx = TAILQ_FIRST(&rai->prefix))) { |
115 | TAILQ_REMOVE(&rai->prefix, pfx, next); | | 115 | TAILQ_REMOVE(&rai->prefix, pfx, next); |
116 | free(pfx); | | 116 | free(pfx); |
117 | } | | 117 | } |
118 | | | 118 | |
119 | while ((rti = TAILQ_FIRST(&rai->route))) { | | 119 | while ((rti = TAILQ_FIRST(&rai->route))) { |
120 | TAILQ_REMOVE(&rai->route, rti, next); | | 120 | TAILQ_REMOVE(&rai->route, rti, next); |
121 | free(rti); | | 121 | free(rti); |
122 | } | | 122 | } |
123 | | | 123 | |
124 | while ((rdnss = TAILQ_FIRST(&rai->rdnss))) { | | 124 | while ((rdnss = TAILQ_FIRST(&rai->rdnss))) { |
125 | TAILQ_REMOVE(&rai->rdnss, rdnss, next); | | 125 | TAILQ_REMOVE(&rai->rdnss, rdnss, next); |
126 | while ((rdnsa = TAILQ_FIRST(&rdnss->list))) { | | 126 | while ((rdnsa = TAILQ_FIRST(&rdnss->list))) { |
127 | TAILQ_REMOVE(&rdnss->list, rdnsa, next); | | 127 | TAILQ_REMOVE(&rdnss->list, rdnsa, next); |
128 | free(rdnsa); | | 128 | free(rdnsa); |
129 | } | | 129 | } |
130 | free(rdnss); | | 130 | free(rdnss); |
131 | } | | 131 | } |
132 | | | 132 | |
133 | while ((dnssl = TAILQ_FIRST(&rai->dnssl))) { | | 133 | while ((dnssl = TAILQ_FIRST(&rai->dnssl))) { |
134 | TAILQ_REMOVE(&rai->dnssl, dnssl, next); | | 134 | TAILQ_REMOVE(&rai->dnssl, dnssl, next); |
135 | while ((dnsd = TAILQ_FIRST(&dnssl->list))) { | | 135 | while ((dnsd = TAILQ_FIRST(&dnssl->list))) { |
136 | TAILQ_REMOVE(&dnssl->list, dnsd, next); | | 136 | TAILQ_REMOVE(&dnssl->list, dnsd, next); |
137 | free(dnsd); | | 137 | free(dnsd); |
138 | } | | 138 | } |
139 | free(dnssl); | | 139 | free(dnssl); |
140 | } | | 140 | } |
141 | | | 141 | |
142 | free(rai->sdl); | | 142 | free(rai->sdl); |
143 | free(rai->ra_data); | | 143 | free(rai->ra_data); |
144 | free(rai); | | 144 | free(rai); |
145 | } | | 145 | } |
146 | | | 146 | |
147 | void | | 147 | void |
148 | getconfig(const char *intface, int exithard) | | 148 | getconfig(const char *intface, int exithard) |
149 | { | | 149 | { |
150 | int stat, c, i; | | 150 | int stat, c, i; |
151 | char tbuf[BUFSIZ]; | | 151 | char tbuf[BUFSIZ]; |
152 | struct rainfo *tmp, *rai; | | 152 | struct rainfo *tmp, *rai; |
153 | int32_t val; | | 153 | int32_t val; |
154 | int64_t val64; | | 154 | int64_t val64; |
155 | char buf[BUFSIZ]; | | 155 | char buf[BUFSIZ]; |
156 | char *bp = buf; | | 156 | char *bp = buf; |
157 | char *addr, *flagstr, *ap; | | 157 | char *addr, *flagstr, *ap; |
158 | static int forwarding = -1; | | 158 | static int forwarding = -1; |
159 | char entbuf[256], abuf[256]; | | 159 | char entbuf[256], abuf[256]; |
160 | struct rdnss *rdnss; | | 160 | struct rdnss *rdnss; |
161 | struct dnssl *dnssl; | | 161 | struct dnssl *dnssl; |
162 | | | 162 | |
163 | #define MUSTHAVE(var, cap) \ | | 163 | #define MUSTHAVE(var, cap) \ |
164 | do { \ | | 164 | do { \ |
165 | int64_t t; \ | | 165 | int64_t t; \ |
166 | if ((t = agetnum(cap)) < 0) { \ | | 166 | if ((t = agetnum(cap)) < 0) { \ |
167 | fprintf(stderr, "rtadvd: need %s for interface %s\n", \ | | 167 | fprintf(stderr, "rtadvd: need %s for interface %s\n", \ |
168 | cap, intface); \ | | 168 | cap, intface); \ |
169 | goto errexit; \ | | 169 | goto errexit; \ |
170 | } \ | | 170 | } \ |
171 | var = t; \ | | 171 | var = t; \ |
172 | } while (0) | | 172 | } while (0) |
173 | #define MAYHAVE(var, cap, def) \ | | 173 | #define MAYHAVE(var, cap, def) \ |
174 | do { \ | | 174 | do { \ |
175 | if ((var = agetnum(cap)) < 0) \ | | 175 | if ((var = agetnum(cap)) < 0) \ |
176 | var = def; \ | | 176 | var = def; \ |
177 | } while (0) | | 177 | } while (0) |
178 | #define ELM_MALLOC(p) \ | | 178 | #define ELM_MALLOC(p) \ |
179 | do { \ | | 179 | do { \ |
180 | p = calloc(1, sizeof(*p)); \ | | 180 | p = calloc(1, sizeof(*p)); \ |
181 | if (p == NULL) { \ | | 181 | if (p == NULL) { \ |
182 | syslog(LOG_ERR, "<%s> calloc failed: %m", \ | | 182 | syslog(LOG_ERR, "<%s> calloc failed: %m", \ |
183 | __func__); \ | | 183 | __func__); \ |
184 | goto errexit; \ | | 184 | goto errexit; \ |
185 | } \ | | 185 | } \ |
186 | } while(/*CONSTCOND*/0) | | 186 | } while(/*CONSTCOND*/0) |
187 | | | 187 | |
188 | if (if_nametoindex(intface) == 0) { | | 188 | if (if_nametoindex(intface) == 0) { |
189 | syslog(LOG_INFO, "<%s> interface %s not found, ignoring", | | 189 | syslog(LOG_INFO, "<%s> interface %s not found, ignoring", |
190 | __func__, intface); | | 190 | __func__, intface); |
191 | return; | | 191 | return; |
192 | } | | 192 | } |
193 | | | 193 | |
194 | syslog(LOG_DEBUG, "<%s> loading configuration for interface %s", | | 194 | syslog(LOG_DEBUG, "<%s> loading configuration for interface %s", |
195 | __func__, intface); | | 195 | __func__, intface); |
196 | | | 196 | |
197 | if ((stat = agetent(tbuf, intface)) <= 0) { | | 197 | if ((stat = agetent(tbuf, intface)) <= 0) { |
198 | memset(tbuf, 0, sizeof(tbuf)); | | 198 | memset(tbuf, 0, sizeof(tbuf)); |
199 | syslog(LOG_INFO, | | 199 | syslog(LOG_INFO, |
200 | "<%s> %s isn't defined in the configuration file" | | 200 | "<%s> %s isn't defined in the configuration file" |
201 | " or the configuration file doesn't exist." | | 201 | " or the configuration file doesn't exist." |
202 | " Treat it as default", | | 202 | " Treat it as default", |
203 | __func__, intface); | | 203 | __func__, intface); |
204 | } | | 204 | } |
205 | | | 205 | |
206 | ELM_MALLOC(tmp); | | 206 | ELM_MALLOC(tmp); |
207 | TAILQ_INIT(&tmp->prefix); | | 207 | TAILQ_INIT(&tmp->prefix); |
208 | TAILQ_INIT(&tmp->route); | | 208 | TAILQ_INIT(&tmp->route); |
209 | TAILQ_INIT(&tmp->rdnss); | | 209 | TAILQ_INIT(&tmp->rdnss); |
210 | TAILQ_INIT(&tmp->dnssl); | | 210 | TAILQ_INIT(&tmp->dnssl); |
211 | | | 211 | |
212 | /* check if we are allowed to forward packets (if not determined) */ | | 212 | /* check if we are allowed to forward packets (if not determined) */ |
213 | if (forwarding < 0) { | | 213 | if (forwarding < 0) { |
214 | if ((forwarding = getinet6sysctl(IPV6CTL_FORWARDING)) < 0) | | 214 | if ((forwarding = getinet6sysctl(IPV6CTL_FORWARDING)) < 0) |
215 | exit(1); | | 215 | exit(1); |
216 | } | | 216 | } |
217 | | | 217 | |
218 | /* get interface information */ | | 218 | /* get interface information */ |
219 | if (agetflag("nolladdr")) | | 219 | if (agetflag("nolladdr")) |
220 | tmp->advlinkopt = 0; | | 220 | tmp->advlinkopt = 0; |
221 | else | | 221 | else |
222 | tmp->advlinkopt = 1; | | 222 | tmp->advlinkopt = 1; |
223 | if (tmp->advlinkopt) { | | 223 | if (tmp->advlinkopt) { |
224 | if ((tmp->sdl = if_nametosdl(intface)) == NULL) { | | 224 | if ((tmp->sdl = if_nametosdl(intface)) == NULL) { |
225 | syslog(LOG_ERR, | | 225 | syslog(LOG_ERR, |
226 | "<%s> can't get information of %s", | | 226 | "<%s> can't get information of %s", |
227 | __func__, intface); | | 227 | __func__, intface); |
228 | goto errexit; | | 228 | goto errexit; |
229 | } | | 229 | } |
230 | tmp->ifindex = tmp->sdl->sdl_index; | | 230 | tmp->ifindex = tmp->sdl->sdl_index; |
231 | } else { | | 231 | } else { |
232 | tmp->ifindex = if_nametoindex(intface); | | 232 | tmp->ifindex = if_nametoindex(intface); |
233 | if (tmp->ifindex == 0) { | | 233 | if (tmp->ifindex == 0) { |
234 | syslog(LOG_ERR, | | 234 | syslog(LOG_ERR, |
235 | "<%s> can't get information of %s", | | 235 | "<%s> can't get information of %s", |
236 | __func__, intface); | | 236 | __func__, intface); |
237 | goto errexit; | | 237 | goto errexit; |
238 | } | | 238 | } |
239 | } | | 239 | } |
240 | tmp->ifflags = if_getflags(tmp->ifindex, 0); | | 240 | tmp->ifflags = if_getflags(tmp->ifindex, 0); |
241 | strlcpy(tmp->ifname, intface, sizeof(tmp->ifname)); | | 241 | strlcpy(tmp->ifname, intface, sizeof(tmp->ifname)); |
242 | if ((tmp->phymtu = if_getmtu(intface)) == 0) { | | 242 | if ((tmp->phymtu = if_getmtu(intface)) == 0) { |
243 | tmp->phymtu = IPV6_MMTU; | | 243 | tmp->phymtu = IPV6_MMTU; |
244 | syslog(LOG_WARNING, | | 244 | syslog(LOG_WARNING, |
245 | "<%s> can't get interface mtu of %s. Treat as %d", | | 245 | "<%s> can't get interface mtu of %s. Treat as %d", |
246 | __func__, intface, IPV6_MMTU); | | 246 | __func__, intface, IPV6_MMTU); |
247 | } | | 247 | } |
248 | | | 248 | |
249 | /* | | 249 | /* |
250 | * set router configuration variables. | | 250 | * set router configuration variables. |
251 | */ | | 251 | */ |
252 | MAYHAVE(val, "maxinterval", DEF_MAXRTRADVINTERVAL); | | 252 | MAYHAVE(val, "maxinterval", DEF_MAXRTRADVINTERVAL); |
253 | if (val < MIN_MAXINTERVAL || val > MAX_MAXINTERVAL) { | | 253 | if (val < MIN_MAXINTERVAL || val > MAX_MAXINTERVAL) { |
254 | syslog(LOG_ERR, | | 254 | syslog(LOG_ERR, |
255 | "<%s> maxinterval (%d) on %s is invalid " | | 255 | "<%s> maxinterval (%d) on %s is invalid " |
256 | "(must be between %u and %u)", __func__, val, | | 256 | "(must be between %u and %u)", __func__, val, |
257 | intface, MIN_MAXINTERVAL, MAX_MAXINTERVAL); | | 257 | intface, MIN_MAXINTERVAL, MAX_MAXINTERVAL); |
258 | goto errexit; | | 258 | goto errexit; |
259 | } | | 259 | } |
260 | tmp->maxinterval = val; | | 260 | tmp->maxinterval = val; |
261 | MAYHAVE(val, "mininterval", tmp->maxinterval/3); | | 261 | MAYHAVE(val, "mininterval", tmp->maxinterval/3); |
262 | if (val < MIN_MININTERVAL || val > (tmp->maxinterval * 3) / 4) { | | 262 | if (val < MIN_MININTERVAL || val > (tmp->maxinterval * 3) / 4) { |
263 | syslog(LOG_ERR, | | 263 | syslog(LOG_ERR, |
264 | "<%s> mininterval (%d) on %s is invalid " | | 264 | "<%s> mininterval (%d) on %s is invalid " |
265 | "(must be between %u and %d)", | | 265 | "(must be between %u and %d)", |
266 | __func__, val, intface, MIN_MININTERVAL, | | 266 | __func__, val, intface, MIN_MININTERVAL, |
267 | (tmp->maxinterval * 3) / 4); | | 267 | (tmp->maxinterval * 3) / 4); |
268 | goto errexit; | | 268 | goto errexit; |
269 | } | | 269 | } |
270 | tmp->mininterval = val; | | 270 | tmp->mininterval = val; |
271 | | | 271 | |
272 | MAYHAVE(val, "chlim", DEF_ADVCURHOPLIMIT); | | 272 | MAYHAVE(val, "chlim", DEF_ADVCURHOPLIMIT); |
273 | tmp->hoplimit = val & 0xff; | | 273 | tmp->hoplimit = val & 0xff; |
274 | | | 274 | |
275 | if ((flagstr = (char *)agetstr("raflags", &bp))) { | | 275 | if ((flagstr = (char *)agetstr("raflags", &bp))) { |
276 | val = 0; | | 276 | val = 0; |
277 | if (strchr(flagstr, 'm')) | | 277 | if (strchr(flagstr, 'm')) |
278 | val |= ND_RA_FLAG_MANAGED; | | 278 | val |= ND_RA_FLAG_MANAGED; |
279 | if (strchr(flagstr, 'o')) | | 279 | if (strchr(flagstr, 'o')) |
280 | val |= ND_RA_FLAG_OTHER; | | 280 | val |= ND_RA_FLAG_OTHER; |
281 | if (strchr(flagstr, 'h')) | | 281 | if (strchr(flagstr, 'h')) |
282 | val |= ND_RA_FLAG_RTPREF_HIGH; | | 282 | val |= ND_RA_FLAG_RTPREF_HIGH; |
283 | if (strchr(flagstr, 'l')) { | | 283 | if (strchr(flagstr, 'l')) { |
284 | if ((val & ND_RA_FLAG_RTPREF_HIGH)) { | | 284 | if ((val & ND_RA_FLAG_RTPREF_HIGH)) { |
285 | syslog(LOG_ERR, "<%s> the \'h\' and \'l\'" | | 285 | syslog(LOG_ERR, "<%s> the \'h\' and \'l\'" |
286 | " router flags are exclusive", __func__); | | 286 | " router flags are exclusive", __func__); |
287 | goto errexit; | | 287 | goto errexit; |
288 | } | | 288 | } |
289 | val |= ND_RA_FLAG_RTPREF_LOW; | | 289 | val |= ND_RA_FLAG_RTPREF_LOW; |
290 | } | | 290 | } |
291 | } else { | | 291 | } else { |
292 | MAYHAVE(val, "raflags", 0); | | 292 | MAYHAVE(val, "raflags", 0); |
293 | } | | 293 | } |
294 | tmp->managedflg = val & ND_RA_FLAG_MANAGED; | | 294 | tmp->managedflg = val & ND_RA_FLAG_MANAGED; |
295 | tmp->otherflg = val & ND_RA_FLAG_OTHER; | | 295 | tmp->otherflg = val & ND_RA_FLAG_OTHER; |
296 | #ifndef ND_RA_FLAG_RTPREF_MASK | | 296 | #ifndef ND_RA_FLAG_RTPREF_MASK |
297 | #define ND_RA_FLAG_RTPREF_MASK 0x18 /* 00011000 */ | | 297 | #define ND_RA_FLAG_RTPREF_MASK 0x18 /* 00011000 */ |
298 | #define ND_RA_FLAG_RTPREF_RSV 0x10 /* 00010000 */ | | 298 | #define ND_RA_FLAG_RTPREF_RSV 0x10 /* 00010000 */ |
299 | #endif | | 299 | #endif |
300 | tmp->rtpref = val & ND_RA_FLAG_RTPREF_MASK; | | 300 | tmp->rtpref = val & ND_RA_FLAG_RTPREF_MASK; |
301 | if (tmp->rtpref == ND_RA_FLAG_RTPREF_RSV) { | | 301 | if (tmp->rtpref == ND_RA_FLAG_RTPREF_RSV) { |
302 | syslog(LOG_ERR, "<%s> invalid router preference (%02x) on %s", | | 302 | syslog(LOG_ERR, "<%s> invalid router preference (%02x) on %s", |
303 | __func__, tmp->rtpref, intface); | | 303 | __func__, tmp->rtpref, intface); |
304 | goto errexit; | | 304 | goto errexit; |
305 | } | | 305 | } |
306 | | | 306 | |
307 | MAYHAVE(val, "rltime", tmp->maxinterval * 3); | | 307 | MAYHAVE(val, "rltime", tmp->maxinterval * 3); |
308 | if (val && (val < tmp->maxinterval || val > MAXROUTERLIFETIME)) { | | 308 | if (val && (val < tmp->maxinterval || val > MAXROUTERLIFETIME)) { |
309 | syslog(LOG_ERR, | | 309 | syslog(LOG_ERR, |
310 | "<%s> router lifetime (%d) on %s is invalid " | | 310 | "<%s> router lifetime (%d) on %s is invalid " |
311 | "(must be 0 or between %d and %d)", | | 311 | "(must be 0 or between %d and %d)", |
312 | __func__, val, intface, | | 312 | __func__, val, intface, |
313 | tmp->maxinterval, MAXROUTERLIFETIME); | | 313 | tmp->maxinterval, MAXROUTERLIFETIME); |
314 | goto errexit; | | 314 | goto errexit; |
315 | } | | 315 | } |
316 | /* | | 316 | /* |
317 | * Basically, hosts MUST NOT send Router Advertisement messages at any | | 317 | * Basically, hosts MUST NOT send Router Advertisement messages at any |
318 | * time (RFC 2461, Section 6.2.3). However, it would sometimes be | | 318 | * time (RFC 2461, Section 6.2.3). However, it would sometimes be |
319 | * useful to allow hosts to advertise some parameters such as prefix | | 319 | * useful to allow hosts to advertise some parameters such as prefix |
320 | * information and link MTU. Thus, we allow hosts to invoke rtadvd | | 320 | * information and link MTU. Thus, we allow hosts to invoke rtadvd |
321 | * only when router lifetime (on every advertising interface) is | | 321 | * only when router lifetime (on every advertising interface) is |
322 | * explicitly set zero. (see also the above section) | | 322 | * explicitly set zero. (see also the above section) |
323 | */ | | 323 | */ |
324 | if (val && forwarding == 0) { | | 324 | if (val && forwarding == 0) { |
325 | syslog(LOG_ERR, | | 325 | syslog(LOG_ERR, |
326 | "<%s> non zero router lifetime is specified for %s, " | | 326 | "<%s> non zero router lifetime is specified for %s, " |
327 | "which must not be allowed for hosts. you must " | | 327 | "which must not be allowed for hosts. you must " |
328 | "change router lifetime or enable IPv6 forwarding.", | | 328 | "change router lifetime or enable IPv6 forwarding.", |
329 | __func__, intface); | | 329 | __func__, intface); |
330 | goto errexit; | | 330 | goto errexit; |
331 | } | | 331 | } |
332 | tmp->lifetime = val & 0xffff; | | 332 | tmp->lifetime = val & 0xffff; |
333 | | | 333 | |
334 | MAYHAVE(val, "rtime", DEF_ADVREACHABLETIME); | | 334 | MAYHAVE(val, "rtime", DEF_ADVREACHABLETIME); |
335 | if (val < 0 || val > MAXREACHABLETIME) { | | 335 | if (val < 0 || val > MAXREACHABLETIME) { |
336 | syslog(LOG_ERR, | | 336 | syslog(LOG_ERR, |
337 | "<%s> reachable time (%d) on %s is invalid " | | 337 | "<%s> reachable time (%d) on %s is invalid " |
338 | "(must be no greater than %d)", | | 338 | "(must be no greater than %d)", |
339 | __func__, val, intface, MAXREACHABLETIME); | | 339 | __func__, val, intface, MAXREACHABLETIME); |
340 | goto errexit; | | 340 | goto errexit; |
341 | } | | 341 | } |
342 | tmp->reachabletime = (uint32_t)val; | | 342 | tmp->reachabletime = (uint32_t)val; |
343 | | | 343 | |
344 | MAYHAVE(val64, "retrans", DEF_ADVRETRANSTIMER); | | 344 | MAYHAVE(val64, "retrans", DEF_ADVRETRANSTIMER); |
345 | if (val64 < 0 || val64 > 0xffffffff) { | | 345 | if (val64 < 0 || val64 > 0xffffffff) { |
346 | syslog(LOG_ERR, "<%s> retrans time (%lld) on %s out of range", | | 346 | syslog(LOG_ERR, "<%s> retrans time (%lld) on %s out of range", |
347 | __func__, (long long)val64, intface); | | 347 | __func__, (long long)val64, intface); |
348 | goto errexit; | | 348 | goto errexit; |
349 | } | | 349 | } |
350 | tmp->retranstimer = (uint32_t)val64; | | 350 | tmp->retranstimer = (uint32_t)val64; |
351 | | | 351 | |
352 | if (agetnum("hapref") != -1 || agetnum("hatime") != -1) { | | 352 | if (agetnum("hapref") != -1 || agetnum("hatime") != -1) { |
353 | syslog(LOG_ERR, | | 353 | syslog(LOG_ERR, |
354 | "<%s> mobile-ip6 configuration not supported", | | 354 | "<%s> mobile-ip6 configuration not supported", |
355 | __func__); | | 355 | __func__); |
356 | goto errexit; | | 356 | goto errexit; |
357 | } | | 357 | } |
358 | /* prefix information */ | | 358 | /* prefix information */ |
359 | | | 359 | |
360 | /* | | 360 | /* |
361 | * This is an implementation specific parameter to consider | | 361 | * This is an implementation specific parameter to consider |
362 | * link propagation delays and poorly synchronized clocks when | | 362 | * link propagation delays and poorly synchronized clocks when |
363 | * checking consistency of advertised lifetimes. | | 363 | * checking consistency of advertised lifetimes. |
364 | */ | | 364 | */ |
365 | MAYHAVE(val, "clockskew", 0); | | 365 | MAYHAVE(val, "clockskew", 0); |
366 | tmp->clockskew = val; | | 366 | tmp->clockskew = val; |
367 | | | 367 | |
368 | tmp->pfxs = 0; | | 368 | tmp->pfxs = 0; |
369 | for (i = -1; i < MAXPREFIX; i++) { | | 369 | for (i = -1; i < MAXPREFIX; i++) { |
370 | struct prefix *pfx; | | 370 | struct prefix *pfx; |
371 | | | 371 | |
372 | makeentry(entbuf, sizeof(entbuf), i, "addr"); | | 372 | makeentry(entbuf, sizeof(entbuf), i, "addr"); |
373 | addr = (char *)agetstr(entbuf, &bp); | | 373 | addr = (char *)agetstr(entbuf, &bp); |
374 | if (addr == NULL) | | 374 | if (addr == NULL) |
375 | continue; | | 375 | continue; |
376 | | | 376 | |
377 | /* allocate memory to store prefix information */ | | 377 | /* allocate memory to store prefix information */ |
378 | if ((pfx = calloc(1, sizeof(*pfx))) == NULL) { | | 378 | if ((pfx = calloc(1, sizeof(*pfx))) == NULL) { |
379 | syslog(LOG_ERR, | | 379 | syslog(LOG_ERR, |
380 | "<%s> can't allocate memory: %m", | | 380 | "<%s> can't allocate memory: %m", |
381 | __func__); | | 381 | __func__); |
382 | goto errexit; | | 382 | goto errexit; |
383 | } | | 383 | } |
384 | | | 384 | |
385 | TAILQ_INSERT_TAIL(&tmp->prefix, pfx, next); | | 385 | TAILQ_INSERT_TAIL(&tmp->prefix, pfx, next); |
386 | tmp->pfxs++; | | 386 | tmp->pfxs++; |
387 | pfx->rainfo = tmp; | | 387 | pfx->rainfo = tmp; |
388 | | | 388 | |
389 | pfx->origin = PREFIX_FROM_CONFIG; | | 389 | pfx->origin = PREFIX_FROM_CONFIG; |
390 | | | 390 | |
391 | if (inet_pton(AF_INET6, addr, &pfx->prefix) != 1) { | | 391 | if (inet_pton(AF_INET6, addr, &pfx->prefix) != 1) { |
392 | syslog(LOG_ERR, | | 392 | syslog(LOG_ERR, |
393 | "<%s> inet_pton failed for %s", | | 393 | "<%s> inet_pton failed for %s", |
394 | __func__, addr); | | 394 | __func__, addr); |
395 | goto errexit; | | 395 | goto errexit; |
396 | } | | 396 | } |
397 | if (IN6_IS_ADDR_MULTICAST(&pfx->prefix)) { | | 397 | if (IN6_IS_ADDR_MULTICAST(&pfx->prefix)) { |
398 | syslog(LOG_ERR, | | 398 | syslog(LOG_ERR, |
399 | "<%s> multicast prefix (%s) must " | | 399 | "<%s> multicast prefix (%s) must " |
400 | "not be advertised on %s", | | 400 | "not be advertised on %s", |
401 | __func__, addr, intface); | | 401 | __func__, addr, intface); |
402 | goto errexit; | | 402 | goto errexit; |
403 | } | | 403 | } |
404 | if (IN6_IS_ADDR_LINKLOCAL(&pfx->prefix)) | | 404 | if (IN6_IS_ADDR_LINKLOCAL(&pfx->prefix)) |
405 | syslog(LOG_NOTICE, | | 405 | syslog(LOG_NOTICE, |
406 | "<%s> link-local prefix (%s) will be" | | 406 | "<%s> link-local prefix (%s) will be" |
407 | " advertised on %s", | | 407 | " advertised on %s", |
408 | __func__, addr, intface); | | 408 | __func__, addr, intface); |
409 | | | 409 | |
410 | makeentry(entbuf, sizeof(entbuf), i, "prefixlen"); | | 410 | makeentry(entbuf, sizeof(entbuf), i, "prefixlen"); |
411 | MAYHAVE(val, entbuf, 64); | | 411 | MAYHAVE(val, entbuf, 64); |
412 | if (val < 0 || val > 128) { | | 412 | if (val < 0 || val > 128) { |
413 | syslog(LOG_ERR, "<%s> prefixlen (%d) for %s " | | 413 | syslog(LOG_ERR, "<%s> prefixlen (%d) for %s " |
414 | "on %s out of range", | | 414 | "on %s out of range", |
415 | __func__, val, addr, intface); | | 415 | __func__, val, addr, intface); |
416 | goto errexit; | | 416 | goto errexit; |
417 | } | | 417 | } |
418 | pfx->prefixlen = (int)val; | | 418 | pfx->prefixlen = (int)val; |
419 | | | 419 | |
420 | makeentry(entbuf, sizeof(entbuf), i, "pinfoflags"); | | 420 | makeentry(entbuf, sizeof(entbuf), i, "pinfoflags"); |
421 | if ((flagstr = (char *)agetstr(entbuf, &bp))) { | | 421 | if ((flagstr = (char *)agetstr(entbuf, &bp))) { |
422 | val = 0; | | 422 | val = 0; |
423 | if (strchr(flagstr, 'l')) | | 423 | if (strchr(flagstr, 'l')) |
424 | val |= ND_OPT_PI_FLAG_ONLINK; | | 424 | val |= ND_OPT_PI_FLAG_ONLINK; |
425 | if (strchr(flagstr, 'a')) | | 425 | if (strchr(flagstr, 'a')) |
426 | val |= ND_OPT_PI_FLAG_AUTO; | | 426 | val |= ND_OPT_PI_FLAG_AUTO; |
427 | } else { | | 427 | } else { |
428 | MAYHAVE(val, entbuf, | | 428 | MAYHAVE(val, entbuf, |
429 | (ND_OPT_PI_FLAG_ONLINK|ND_OPT_PI_FLAG_AUTO)); | | 429 | (ND_OPT_PI_FLAG_ONLINK|ND_OPT_PI_FLAG_AUTO)); |
430 | } | | 430 | } |
431 | pfx->onlinkflg = val & ND_OPT_PI_FLAG_ONLINK; | | 431 | pfx->onlinkflg = val & ND_OPT_PI_FLAG_ONLINK; |
432 | pfx->autoconfflg = val & ND_OPT_PI_FLAG_AUTO; | | 432 | pfx->autoconfflg = val & ND_OPT_PI_FLAG_AUTO; |
433 | | | 433 | |
434 | makeentry(entbuf, sizeof(entbuf), i, "vltime"); | | 434 | makeentry(entbuf, sizeof(entbuf), i, "vltime"); |
435 | MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME); | | 435 | MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME); |
436 | if (val64 < 0 || val64 > 0xffffffff) { | | 436 | if (val64 < 0 || val64 > 0xffffffff) { |
437 | syslog(LOG_ERR, "<%s> vltime (%lld) for " | | 437 | syslog(LOG_ERR, "<%s> vltime (%lld) for " |
438 | "%s/%d on %s is out of range", | | 438 | "%s/%d on %s is out of range", |
439 | __func__, (long long)val64, | | 439 | __func__, (long long)val64, |
440 | addr, pfx->prefixlen, intface); | | 440 | addr, pfx->prefixlen, intface); |
441 | goto errexit; | | 441 | goto errexit; |
442 | } | | 442 | } |
443 | pfx->validlifetime = (uint32_t)val64; | | 443 | pfx->validlifetime = (uint32_t)val64; |
444 | | | 444 | |
445 | makeentry(entbuf, sizeof(entbuf), i, "vltimedecr"); | | 445 | makeentry(entbuf, sizeof(entbuf), i, "vltimedecr"); |
446 | if (agetflag(entbuf)) { | | 446 | if (agetflag(entbuf)) { |
447 | struct timeval now; | | 447 | struct timeval now; |
448 | gettimeofday(&now, 0); | | 448 | gettimeofday(&now, 0); |
449 | pfx->vltimeexpire = | | 449 | pfx->vltimeexpire = |
450 | now.tv_sec + pfx->validlifetime; | | 450 | now.tv_sec + pfx->validlifetime; |
451 | } | | 451 | } |
452 | | | 452 | |
453 | makeentry(entbuf, sizeof(entbuf), i, "pltime"); | | 453 | makeentry(entbuf, sizeof(entbuf), i, "pltime"); |
454 | MAYHAVE(val64, entbuf, DEF_ADVPREFERREDLIFETIME); | | 454 | MAYHAVE(val64, entbuf, DEF_ADVPREFERREDLIFETIME); |
455 | if (val64 < 0 || val64 > 0xffffffff) { | | 455 | if (val64 < 0 || val64 > 0xffffffff) { |
456 | syslog(LOG_ERR, | | 456 | syslog(LOG_ERR, |
457 | "<%s> pltime (%lld) for %s/%d on %s " | | 457 | "<%s> pltime (%lld) for %s/%d on %s " |
458 | "is out of range", | | 458 | "is out of range", |
459 | __func__, (long long)val64, | | 459 | __func__, (long long)val64, |
460 | addr, pfx->prefixlen, intface); | | 460 | addr, pfx->prefixlen, intface); |
461 | goto errexit; | | 461 | goto errexit; |
462 | } | | 462 | } |
463 | pfx->preflifetime = (uint32_t)val64; | | 463 | pfx->preflifetime = (uint32_t)val64; |
464 | | | 464 | |
465 | makeentry(entbuf, sizeof(entbuf), i, "pltimedecr"); | | 465 | makeentry(entbuf, sizeof(entbuf), i, "pltimedecr"); |
466 | if (agetflag(entbuf)) { | | 466 | if (agetflag(entbuf)) { |
467 | struct timeval now; | | 467 | struct timeval now; |
468 | gettimeofday(&now, 0); | | 468 | gettimeofday(&now, 0); |
469 | pfx->pltimeexpire = | | 469 | pfx->pltimeexpire = |
470 | now.tv_sec + pfx->preflifetime; | | 470 | now.tv_sec + pfx->preflifetime; |
471 | } | | 471 | } |
472 | } | | 472 | } |
473 | if (TAILQ_FIRST(&tmp->prefix) == NULL && !agetflag("noifprefix")) | | 473 | if (TAILQ_FIRST(&tmp->prefix) == NULL && !agetflag("noifprefix")) |
474 | get_prefix(tmp); | | 474 | get_prefix(tmp); |
475 | | | 475 | |
476 | MAYHAVE(val64, "mtu", 0); | | 476 | MAYHAVE(val64, "mtu", 0); |
477 | if (val64 < 0 || val64 > 0xffffffff) { | | 477 | if (val64 < 0 || val64 > 0xffffffff) { |
478 | syslog(LOG_ERR, | | 478 | syslog(LOG_ERR, |
479 | "<%s> mtu (%" PRIi64 ") on %s out of range", | | 479 | "<%s> mtu (%" PRIi64 ") on %s out of range", |
480 | __func__, val64, intface); | | 480 | __func__, val64, intface); |
481 | goto errexit; | | 481 | goto errexit; |
482 | } | | 482 | } |
483 | tmp->linkmtu = (uint32_t)val64; | | 483 | tmp->linkmtu = (uint32_t)val64; |
484 | if (tmp->linkmtu == 0) { | | 484 | if (tmp->linkmtu == 0) { |
485 | char *mtustr; | | 485 | char *mtustr; |
486 | | | 486 | |
487 | if ((mtustr = (char *)agetstr("mtu", &bp)) && | | 487 | if ((mtustr = (char *)agetstr("mtu", &bp)) && |
488 | strcmp(mtustr, "auto") == 0) | | 488 | strcmp(mtustr, "auto") == 0) |
489 | tmp->linkmtu = tmp->phymtu; | | 489 | tmp->linkmtu = tmp->phymtu; |
490 | } | | 490 | } |
491 | else if (tmp->linkmtu < IPV6_MMTU || tmp->linkmtu > tmp->phymtu) { | | 491 | else if (tmp->linkmtu < IPV6_MMTU || tmp->linkmtu > tmp->phymtu) { |
492 | syslog(LOG_ERR, | | 492 | syslog(LOG_ERR, |
493 | "<%s> advertised link mtu (%d) on %s is invalid (must " | | 493 | "<%s> advertised link mtu (%d) on %s is invalid (must " |
494 | "be between least MTU (%d) and physical link MTU (%d)", | | 494 | "be between least MTU (%d) and physical link MTU (%d)", |
495 | __func__, tmp->linkmtu, intface, | | 495 | __func__, tmp->linkmtu, intface, |
496 | IPV6_MMTU, tmp->phymtu); | | 496 | IPV6_MMTU, tmp->phymtu); |
497 | goto errexit; | | 497 | goto errexit; |
498 | } | | 498 | } |
499 | | | 499 | |
500 | #ifdef SIOCSIFINFO_IN6 | | 500 | #ifdef SIOCSIFINFO_IN6 |
501 | { | | 501 | { |
502 | struct in6_ndireq ndi; | | 502 | struct in6_ndireq ndi; |
503 | int s; | | 503 | int s; |
504 | | | 504 | |
505 | if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) { | | 505 | if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) { |
506 | syslog(LOG_ERR, "<%s> socket: %m", __func__); | | 506 | syslog(LOG_ERR, "<%s> socket: %m", __func__); |
507 | goto errexit; | | 507 | goto errexit; |
508 | } | | 508 | } |
509 | memset(&ndi, 0, sizeof(ndi)); | | 509 | memset(&ndi, 0, sizeof(ndi)); |
510 | strncpy(ndi.ifname, intface, IFNAMSIZ); | | 510 | strncpy(ndi.ifname, intface, IFNAMSIZ); |
511 | if (ioctl(s, SIOCGIFINFO_IN6, &ndi) < 0) { | | 511 | if (ioctl(s, SIOCGIFINFO_IN6, &ndi) < 0) { |
512 | syslog(LOG_INFO, "<%s> ioctl:SIOCGIFINFO_IN6 at %s: %m", | | 512 | syslog(LOG_INFO, "<%s> ioctl:SIOCGIFINFO_IN6 at %s: %m", |
513 | __func__, intface); | | 513 | __func__, intface); |
514 | } | | 514 | } |
515 | | | 515 | |
516 | /* reflect the RA info to the host variables in kernel */ | | 516 | /* reflect the RA info to the host variables in kernel */ |
517 | ndi.ndi.chlim = tmp->hoplimit; | | 517 | ndi.ndi.chlim = tmp->hoplimit; |
518 | ndi.ndi.retrans = tmp->retranstimer; | | 518 | ndi.ndi.retrans = tmp->retranstimer; |
519 | ndi.ndi.basereachable = tmp->reachabletime; | | 519 | ndi.ndi.basereachable = tmp->reachabletime; |
520 | if (ioctl(s, SIOCSIFINFO_IN6, &ndi) < 0) { | | 520 | if (ioctl(s, SIOCSIFINFO_IN6, &ndi) < 0) { |
521 | syslog(LOG_INFO, "<%s> ioctl:SIOCSIFINFO_IN6 at %s: %m", | | 521 | syslog(LOG_INFO, "<%s> ioctl:SIOCSIFINFO_IN6 at %s: %m", |
522 | __func__, intface); | | 522 | __func__, intface); |
523 | } | | 523 | } |
524 | close(s); | | 524 | close(s); |
525 | } | | 525 | } |
526 | #endif | | 526 | #endif |
527 | | | 527 | |
528 | /* route information */ | | 528 | /* route information */ |
529 | for (i = -1; i < MAXROUTE; i++) { | | 529 | for (i = -1; i < MAXROUTE; i++) { |
530 | struct rtinfo *rti; | | 530 | struct rtinfo *rti; |
531 | char oentbuf[256]; | | 531 | char oentbuf[256]; |
532 | | | 532 | |
533 | makeentry(entbuf, sizeof(entbuf), i, "rtprefix"); | | 533 | makeentry(entbuf, sizeof(entbuf), i, "rtprefix"); |
534 | addr = (char *)agetstr(entbuf, &bp); | | 534 | addr = (char *)agetstr(entbuf, &bp); |
535 | if (addr == NULL) { | | 535 | if (addr == NULL) { |
536 | makeentry(oentbuf, sizeof(oentbuf), i, "rtrprefix"); | | 536 | makeentry(oentbuf, sizeof(oentbuf), i, "rtrprefix"); |
537 | addr = (char *)agetstr(oentbuf, &bp); | | 537 | addr = (char *)agetstr(oentbuf, &bp); |
538 | if (addr) { | | 538 | if (addr) { |
539 | fprintf(stderr, "%s was obsoleted. Use %s.\n", | | 539 | fprintf(stderr, "%s was obsoleted. Use %s.\n", |
540 | oentbuf, entbuf); | | 540 | oentbuf, entbuf); |
541 | } | | 541 | } |
542 | } | | 542 | } |
543 | if (addr == NULL) | | 543 | if (addr == NULL) |
544 | continue; | | 544 | continue; |
545 | | | 545 | |
546 | ELM_MALLOC(rti); | | 546 | ELM_MALLOC(rti); |
547 | memset(rti, 0, sizeof(*rti)); | | 547 | memset(rti, 0, sizeof(*rti)); |
548 | | | 548 | |
549 | /* link into chain */ | | 549 | /* link into chain */ |
550 | TAILQ_INSERT_TAIL(&tmp->route, rti, next); | | 550 | TAILQ_INSERT_TAIL(&tmp->route, rti, next); |
551 | | | 551 | |
552 | if (inet_pton(AF_INET6, addr, &rti->prefix) != 1) { | | 552 | if (inet_pton(AF_INET6, addr, &rti->prefix) != 1) { |
553 | syslog(LOG_ERR, "<%s> inet_pton failed for %s", | | 553 | syslog(LOG_ERR, "<%s> inet_pton failed for %s", |
554 | __func__, addr); | | 554 | __func__, addr); |
555 | goto errexit; | | 555 | goto errexit; |
556 | } | | 556 | } |
557 | #if 0 | | 557 | #if 0 |
558 | /* | | 558 | /* |
559 | * XXX: currently there's no restriction in route information | | 559 | * XXX: currently there's no restriction in route information |
560 | * prefix according to | | 560 | * prefix according to |
561 | * draft-ietf-ipngwg-router-selection-00.txt. | | 561 | * draft-ietf-ipngwg-router-selection-00.txt. |
562 | * However, I think the similar restriction be necessary. | | 562 | * However, I think the similar restriction be necessary. |
563 | */ | | 563 | */ |
564 | MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME); | | 564 | MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME); |
565 | if (IN6_IS_ADDR_MULTICAST(&rti->prefix)) { | | 565 | if (IN6_IS_ADDR_MULTICAST(&rti->prefix)) { |
566 | syslog(LOG_ERR, | | 566 | syslog(LOG_ERR, |
567 | "<%s> multicast route (%s) must " | | 567 | "<%s> multicast route (%s) must " |
568 | "not be advertised on %s", | | 568 | "not be advertised on %s", |
569 | __func__, addr, intface); | | 569 | __func__, addr, intface); |
570 | goto errexit; | | 570 | goto errexit; |
571 | } | | 571 | } |
572 | if (IN6_IS_ADDR_LINKLOCAL(&rti->prefix)) { | | 572 | if (IN6_IS_ADDR_LINKLOCAL(&rti->prefix)) { |
573 | syslog(LOG_NOTICE, | | 573 | syslog(LOG_NOTICE, |
574 | "<%s> link-local route (%s) will " | | 574 | "<%s> link-local route (%s) will " |
575 | "be advertised on %s", | | 575 | "be advertised on %s", |
576 | __func__, addr, intface); | | 576 | __func__, addr, intface); |
577 | goto errexit; | | 577 | goto errexit; |
578 | } | | 578 | } |
579 | #endif | | 579 | #endif |
580 | | | 580 | |
581 | makeentry(entbuf, sizeof(entbuf), i, "rtplen"); | | 581 | makeentry(entbuf, sizeof(entbuf), i, "rtplen"); |
582 | /* XXX: 256 is a magic number for compatibility check. */ | | 582 | /* XXX: 256 is a magic number for compatibility check. */ |
583 | MAYHAVE(val, entbuf, 256); | | 583 | MAYHAVE(val, entbuf, 256); |
584 | if (val == 256) { | | 584 | if (val == 256) { |
585 | makeentry(oentbuf, sizeof(oentbuf), i, "rtrplen"); | | 585 | makeentry(oentbuf, sizeof(oentbuf), i, "rtrplen"); |
586 | MAYHAVE(val, oentbuf, 256); | | 586 | MAYHAVE(val, oentbuf, 256); |
587 | if (val != 256) { | | 587 | if (val != 256) { |
588 | fprintf(stderr, "%s was obsoleted. Use %s.\n", | | 588 | fprintf(stderr, "%s was obsoleted. Use %s.\n", |
589 | oentbuf, entbuf); | | 589 | oentbuf, entbuf); |
590 | } else | | 590 | } else |
591 | val = 64; | | 591 | val = 64; |
592 | } | | 592 | } |
593 | if (val < 0 || val > 128) { | | 593 | if (val < 0 || val > 128) { |
594 | syslog(LOG_ERR, "<%s> prefixlen (%d) for %s on %s " | | 594 | syslog(LOG_ERR, "<%s> prefixlen (%d) for %s on %s " |
595 | "out of range", | | 595 | "out of range", |
596 | __func__, val, addr, intface); | | 596 | __func__, val, addr, intface); |
597 | goto errexit; | | 597 | goto errexit; |
598 | } | | 598 | } |
599 | rti->prefixlen = (int)val; | | 599 | rti->prefixlen = (int)val; |
600 | | | 600 | |
601 | makeentry(entbuf, sizeof(entbuf), i, "rtflags"); | | 601 | makeentry(entbuf, sizeof(entbuf), i, "rtflags"); |
602 | if ((flagstr = (char *)agetstr(entbuf, &bp))) { | | 602 | if ((flagstr = (char *)agetstr(entbuf, &bp))) { |
603 | val = 0; | | 603 | val = 0; |
604 | if (strchr(flagstr, 'h')) | | 604 | if (strchr(flagstr, 'h')) |
605 | val |= ND_RA_FLAG_RTPREF_HIGH; | | 605 | val |= ND_RA_FLAG_RTPREF_HIGH; |
606 | if (strchr(flagstr, 'l')) { | | 606 | if (strchr(flagstr, 'l')) { |
607 | if ((val & ND_RA_FLAG_RTPREF_HIGH)) { | | 607 | if ((val & ND_RA_FLAG_RTPREF_HIGH)) { |
608 | syslog(LOG_ERR, | | 608 | syslog(LOG_ERR, |
609 | "<%s> the \'h\' and \'l\' route" | | 609 | "<%s> the \'h\' and \'l\' route" |
610 | " preferences are exclusive", | | 610 | " preferences are exclusive", |
611 | __func__); | | 611 | __func__); |
612 | goto errexit; | | 612 | goto errexit; |
613 | } | | 613 | } |
614 | val |= ND_RA_FLAG_RTPREF_LOW; | | 614 | val |= ND_RA_FLAG_RTPREF_LOW; |
615 | } | | 615 | } |
616 | } else | | 616 | } else |
617 | MAYHAVE(val, entbuf, 256); /* XXX */ | | 617 | MAYHAVE(val, entbuf, 256); /* XXX */ |
618 | if (val == 256) { | | 618 | if (val == 256) { |
619 | makeentry(oentbuf, sizeof(oentbuf), i, "rtrflags"); | | 619 | makeentry(oentbuf, sizeof(oentbuf), i, "rtrflags"); |
620 | MAYHAVE(val, oentbuf, 256); | | 620 | MAYHAVE(val, oentbuf, 256); |
621 | if (val != 256) { | | 621 | if (val != 256) { |
622 | fprintf(stderr, "%s was obsoleted. Use %s.\n", | | 622 | fprintf(stderr, "%s was obsoleted. Use %s.\n", |
623 | oentbuf, entbuf); | | 623 | oentbuf, entbuf); |
624 | } else | | 624 | } else |
625 | val = 0; | | 625 | val = 0; |
626 | } | | 626 | } |
627 | rti->rtpref = val & ND_RA_FLAG_RTPREF_MASK; | | 627 | rti->rtpref = val & ND_RA_FLAG_RTPREF_MASK; |
628 | if (rti->rtpref == ND_RA_FLAG_RTPREF_RSV) { | | 628 | if (rti->rtpref == ND_RA_FLAG_RTPREF_RSV) { |
629 | syslog(LOG_ERR, "<%s> invalid route preference (%02x) " | | 629 | syslog(LOG_ERR, "<%s> invalid route preference (%02x) " |
630 | "for %s/%d on %s", | | 630 | "for %s/%d on %s", |
631 | __func__, rti->rtpref, addr, | | 631 | __func__, rti->rtpref, addr, |
632 | rti->prefixlen, intface); | | 632 | rti->prefixlen, intface); |
633 | goto errexit; | | 633 | goto errexit; |
634 | } | | 634 | } |
635 | | | 635 | |
636 | /* | | 636 | /* |
637 | * Since the spec does not a default value, we should make | | 637 | * Since the spec does not a default value, we should make |
638 | * this entry mandatory. However, FreeBSD 4.4 has shipped | | 638 | * this entry mandatory. However, FreeBSD 4.4 has shipped |
639 | * with this field being optional, we use the router lifetime | | 639 | * with this field being optional, we use the router lifetime |
640 | * as an ad-hoc default value with a warning message. | | 640 | * as an ad-hoc default value with a warning message. |
641 | */ | | 641 | */ |
642 | makeentry(entbuf, sizeof(entbuf), i, "rtltime"); | | 642 | makeentry(entbuf, sizeof(entbuf), i, "rtltime"); |
643 | MAYHAVE(val64, entbuf, -1); | | 643 | MAYHAVE(val64, entbuf, -1); |
644 | if (val64 == -1) { | | 644 | if (val64 == -1) { |
645 | makeentry(oentbuf, sizeof(oentbuf), i, "rtrltime"); | | 645 | makeentry(oentbuf, sizeof(oentbuf), i, "rtrltime"); |
646 | MAYHAVE(val64, oentbuf, -1); | | 646 | MAYHAVE(val64, oentbuf, -1); |
647 | if (val64 != -1) { | | 647 | if (val64 != -1) { |
648 | fprintf(stderr, "%s was obsoleted. Use %s.\n", | | 648 | fprintf(stderr, "%s was obsoleted. Use %s.\n", |
649 | oentbuf, entbuf); | | 649 | oentbuf, entbuf); |
650 | } else { | | 650 | } else { |
651 | fprintf(stderr, "%s should be specified " | | 651 | fprintf(stderr, "%s should be specified " |
652 | "for interface %s.\n", | | 652 | "for interface %s.\n", |
653 | entbuf, intface); | | 653 | entbuf, intface); |
654 | val64 = tmp->lifetime; | | 654 | val64 = tmp->lifetime; |
655 | } | | 655 | } |
656 | } | | 656 | } |
657 | if (val64 < 0 || val64 > 0xffffffff) { | | 657 | if (val64 < 0 || val64 > 0xffffffff) { |
658 | syslog(LOG_ERR, "<%s> route lifetime (%lld) for " | | 658 | syslog(LOG_ERR, "<%s> route lifetime (%lld) for " |
659 | "%s/%d on %s out of range", __func__, | | 659 | "%s/%d on %s out of range", __func__, |
660 | (long long)val64, addr, rti->prefixlen, intface); | | 660 | (long long)val64, addr, rti->prefixlen, intface); |
661 | goto errexit; | | 661 | goto errexit; |
662 | } | | 662 | } |
663 | rti->ltime = (uint32_t)val64; | | 663 | rti->ltime = (uint32_t)val64; |
664 | } | | 664 | } |
665 | | | 665 | |
666 | /* RDNSS */ | | 666 | /* RDNSS */ |
667 | for (i = -1; i < MAXRDNSS; i++) { | | 667 | for (i = -1; i < MAXRDNSS; i++) { |
668 | struct rdnss_addr *rdnsa; | | 668 | struct rdnss_addr *rdnsa; |
669 | | | 669 | |
670 | makeentry(entbuf, sizeof(entbuf), i, "rdnss"); | | 670 | makeentry(entbuf, sizeof(entbuf), i, "rdnss"); |
671 | addr = (char *)agetstr(entbuf, &bp); | | 671 | addr = (char *)agetstr(entbuf, &bp); |
672 | if (addr == NULL) | | 672 | if (addr == NULL) |
673 | continue; | | 673 | continue; |
674 | | | 674 | |
675 | ELM_MALLOC(rdnss); | | 675 | ELM_MALLOC(rdnss); |
676 | TAILQ_INSERT_TAIL(&tmp->rdnss, rdnss, next); | | 676 | TAILQ_INSERT_TAIL(&tmp->rdnss, rdnss, next); |
677 | TAILQ_INIT(&rdnss->list); | | 677 | TAILQ_INIT(&rdnss->list); |
678 | | | 678 | |
679 | for (ap = addr; ap - addr < (ssize_t)strlen(addr); ap += c+1) { | | 679 | for (ap = addr; ap - addr < (ssize_t)strlen(addr); ap += c+1) { |
680 | c = strcspn(ap, ","); | | 680 | c = strcspn(ap, ","); |
681 | strncpy(abuf, ap, c); | | 681 | strncpy(abuf, ap, c); |
682 | abuf[c] = '\0'; | | 682 | abuf[c] = '\0'; |
683 | ELM_MALLOC(rdnsa); | | 683 | ELM_MALLOC(rdnsa); |
684 | TAILQ_INSERT_TAIL(&rdnss->list, rdnsa, next); | | 684 | TAILQ_INSERT_TAIL(&rdnss->list, rdnsa, next); |
685 | if (inet_pton(AF_INET6, abuf, &rdnsa->addr) != 1) { | | 685 | if (inet_pton(AF_INET6, abuf, &rdnsa->addr) != 1) { |
686 | syslog(LOG_ERR, "<%s> inet_pton failed for %s", | | 686 | syslog(LOG_ERR, "<%s> inet_pton failed for %s", |
687 | __func__, addr); | | 687 | __func__, addr); |
688 | goto errexit; | | 688 | goto errexit; |
689 | } | | 689 | } |
690 | } | | 690 | } |
691 | | | 691 | |
692 | makeentry(entbuf, sizeof(entbuf), i, "rdnssltime"); | | 692 | makeentry(entbuf, sizeof(entbuf), i, "rdnssltime"); |
693 | MAYHAVE(val64, entbuf, tmp->maxinterval * 3 / 2); | | 693 | MAYHAVE(val64, entbuf, tmp->maxinterval * 3 / 2); |
694 | if (val64 < tmp->maxinterval || | | 694 | if (val64 < tmp->maxinterval || |
695 | val64 > tmp->maxinterval * 2) | | 695 | val64 > tmp->maxinterval * 2) |
696 | { | | 696 | { |
697 | syslog(LOG_ERR, "<%s> %s (%lld) on %s is invalid", | | 697 | syslog(LOG_ERR, "<%s> %s (%lld) on %s is invalid", |
698 | __func__, entbuf, (long long)val64, intface); | | 698 | __func__, entbuf, (long long)val64, intface); |
699 | goto errexit; | | 699 | goto errexit; |
700 | } | | 700 | } |
701 | rdnss->lifetime = (uint32_t)val64; | | 701 | rdnss->lifetime = (uint32_t)val64; |
702 | | | 702 | |
703 | } | | 703 | } |
704 | | | 704 | |
705 | /* DNSSL */ | | 705 | /* DNSSL */ |
706 | TAILQ_INIT(&tmp->dnssl); | | 706 | TAILQ_INIT(&tmp->dnssl); |
707 | for (i = -1; i < MAXDNSSL; i++) { | | 707 | for (i = -1; i < MAXDNSSL; i++) { |
708 | struct dnssl_domain *dnsd; | | 708 | struct dnssl_domain *dnsd; |
709 | | | 709 | |
710 | makeentry(entbuf, sizeof(entbuf), i, "dnssl"); | | 710 | makeentry(entbuf, sizeof(entbuf), i, "dnssl"); |
711 | addr = (char *)agetstr(entbuf, &bp); | | 711 | addr = (char *)agetstr(entbuf, &bp); |
712 | if (addr == NULL) | | 712 | if (addr == NULL) |
713 | continue; | | 713 | continue; |
714 | | | 714 | |
715 | ELM_MALLOC(dnssl); | | 715 | ELM_MALLOC(dnssl); |
716 | TAILQ_INSERT_TAIL(&tmp->dnssl, dnssl, next); | | 716 | TAILQ_INSERT_TAIL(&tmp->dnssl, dnssl, next); |
717 | TAILQ_INIT(&dnssl->list); | | 717 | TAILQ_INIT(&dnssl->list); |
718 | | | 718 | |
719 | for (ap = addr; ap - addr < (ssize_t)strlen(addr); ap += c+1) { | | 719 | for (ap = addr; ap - addr < (ssize_t)strlen(addr); ap += c+1) { |
720 | c = strcspn(ap, ","); | | 720 | c = strcspn(ap, ","); |
721 | strncpy(abuf, ap, c); | | 721 | strncpy(abuf, ap, c); |
722 | abuf[c] = '\0'; | | 722 | abuf[c] = '\0'; |
723 | ELM_MALLOC(dnsd); | | 723 | ELM_MALLOC(dnsd); |
724 | TAILQ_INSERT_TAIL(&dnssl->list, dnsd, next); | | 724 | TAILQ_INSERT_TAIL(&dnssl->list, dnsd, next); |
725 | dnsd->len = encode_domain(dnsd->domain, abuf); | | 725 | dnsd->len = encode_domain(dnsd->domain, abuf); |
726 | } | | 726 | } |
727 | | | 727 | |
728 | makeentry(entbuf, sizeof(entbuf), i, "dnsslltime"); | | 728 | makeentry(entbuf, sizeof(entbuf), i, "dnsslltime"); |
729 | MAYHAVE(val64, entbuf, tmp->maxinterval * 3 / 2); | | 729 | MAYHAVE(val64, entbuf, tmp->maxinterval * 3 / 2); |
730 | if (val64 < tmp->maxinterval || | | 730 | if (val64 < tmp->maxinterval || |
731 | val64 > tmp->maxinterval * 2) | | 731 | val64 > tmp->maxinterval * 2) |
732 | { | | 732 | { |
733 | syslog(LOG_ERR, "<%s> %s (%lld) on %s is invalid", | | 733 | syslog(LOG_ERR, "<%s> %s (%lld) on %s is invalid", |
734 | __func__, entbuf, (long long)val64, intface); | | 734 | __func__, entbuf, (long long)val64, intface); |
735 | goto errexit; | | 735 | goto errexit; |
736 | } | | 736 | } |
737 | dnssl->lifetime = (uint32_t)val64; | | 737 | dnssl->lifetime = (uint32_t)val64; |
738 | | | 738 | |
739 | } | | 739 | } |
740 | | | 740 | |
741 | TAILQ_FOREACH(rai, &ralist, next) { | | 741 | TAILQ_FOREACH(rai, &ralist, next) { |
742 | if (rai->ifindex == tmp->ifindex) { | | 742 | if (rai->ifindex == tmp->ifindex) { |
743 | TAILQ_REMOVE(&ralist, rai, next); | | 743 | TAILQ_REMOVE(&ralist, rai, next); |
744 | /* If we already have a leaving RA use that | | 744 | /* If we already have a leaving RA use that |
745 | * as this config hasn't been advertised */ | | 745 | * as this config hasn't been advertised */ |
746 | if (rai->leaving) { | | 746 | if (rai->leaving) { |
747 | tmp->leaving = rai->leaving; | | 747 | tmp->leaving = rai->leaving; |
748 | free_rainfo(rai); | | 748 | free_rainfo(rai); |
749 | rai = tmp->leaving; | | 749 | rai = tmp->leaving; |
750 | rai->leaving_for = tmp; | | 750 | rai->leaving_for = tmp; |
751 | break; | | 751 | break; |
752 | } | | 752 | } |
753 | rai->lifetime = 0; | | 753 | rai->lifetime = 0; |
754 | TAILQ_FOREACH(rdnss, &rai->rdnss, next) | | 754 | TAILQ_FOREACH(rdnss, &rai->rdnss, next) |
755 | rdnss->lifetime = 0; | | 755 | rdnss->lifetime = 0; |
756 | TAILQ_FOREACH(dnssl, &rai->dnssl, next) | | 756 | TAILQ_FOREACH(dnssl, &rai->dnssl, next) |
757 | dnssl->lifetime = 0; | | 757 | dnssl->lifetime = 0; |
758 | rai->leaving_for = tmp; | | 758 | rai->leaving_for = tmp; |
759 | tmp->leaving = rai; | | 759 | tmp->leaving = rai; |
760 | rai->initcounter = MAX_INITIAL_RTR_ADVERTISEMENTS; | | 760 | rai->initcounter = MAX_INITIAL_RTR_ADVERTISEMENTS; |
761 | rai->mininterval = MIN_DELAY_BETWEEN_RAS; | | 761 | rai->mininterval = MIN_DELAY_BETWEEN_RAS; |
762 | rai->maxinterval = MIN_DELAY_BETWEEN_RAS; | | 762 | rai->maxinterval = MIN_DELAY_BETWEEN_RAS; |
763 | rai->leaving_adv = MAX_FINAL_RTR_ADVERTISEMENTS; | | 763 | rai->leaving_adv = MAX_FINAL_RTR_ADVERTISEMENTS; |
764 | if (rai->timer == NULL) | | 764 | if (rai->timer == NULL) |
765 | rai->timer = rtadvd_add_timer(ra_timeout, | | 765 | rai->timer = rtadvd_add_timer(ra_timeout, |
766 | ra_timer_update, | | 766 | ra_timer_update, |
767 | rai, rai); | | 767 | rai, rai); |
768 | ra_timer_update((void *)rai, &rai->timer->tm); | | 768 | ra_timer_update((void *)rai, &rai->timer->tm); |
769 | rtadvd_set_timer(&rai->timer->tm, rai->timer); | | 769 | rtadvd_set_timer(&rai->timer->tm, rai->timer); |
770 | break; | | 770 | break; |
771 | } | | 771 | } |
772 | } | | 772 | } |
773 | | | 773 | |
774 | /* okey */ | | 774 | /* okey */ |
775 | TAILQ_INSERT_TAIL(&ralist, tmp, next); | | 775 | TAILQ_INSERT_TAIL(&ralist, tmp, next); |
776 | | | 776 | |
777 | /* construct the sending packet */ | | 777 | /* construct the sending packet */ |
778 | make_packet(tmp); | | 778 | make_packet(tmp); |
779 | | | 779 | |
780 | /* set timer */ | | 780 | /* set timer */ |
781 | if (rai) | | 781 | if (rai) |
782 | return; | | 782 | return; |
783 | tmp->timer = rtadvd_add_timer(ra_timeout, ra_timer_update, | | 783 | tmp->timer = rtadvd_add_timer(ra_timeout, ra_timer_update, |
784 | tmp, tmp); | | 784 | tmp, tmp); |
785 | ra_timer_set_short_delay(tmp); | | 785 | ra_timer_set_short_delay(tmp); |
786 | | | 786 | |
787 | return; | | 787 | return; |
788 | | | 788 | |
789 | errexit: | | 789 | errexit: |
790 | if (exithard) | | 790 | if (exithard) |
791 | exit(1); | | 791 | exit(1); |
792 | free_rainfo(tmp); | | 792 | free_rainfo(tmp); |
793 | } | | 793 | } |
794 | | | 794 | |
795 | void | | 795 | void |
796 | get_prefix(struct rainfo *rai) | | 796 | get_prefix(struct rainfo *rai) |
797 | { | | 797 | { |
798 | struct ifaddrs *ifap, *ifa; | | 798 | struct ifaddrs *ifap, *ifa; |
799 | struct prefix *pp; | | 799 | struct prefix *pp; |
800 | struct in6_addr *a; | | 800 | struct in6_addr *a; |
801 | unsigned char *p, *ep, *m, *lim; | | 801 | unsigned char *p, *ep, *m, *lim; |
802 | char ntopbuf[INET6_ADDRSTRLEN]; | | 802 | char ntopbuf[INET6_ADDRSTRLEN]; |
803 | | | 803 | |
804 | if (getifaddrs(&ifap) < 0) { | | 804 | if (getifaddrs(&ifap) < 0) { |
805 | syslog(LOG_ERR, | | 805 | syslog(LOG_ERR, |
806 | "<%s> can't get interface addresses", | | 806 | "<%s> can't get interface addresses", |
807 | __func__); | | 807 | __func__); |
808 | exit(1); | | 808 | exit(1); |
809 | } | | 809 | } |
810 | | | 810 | |
811 | for (ifa = ifap; ifa; ifa = ifa->ifa_next) { | | 811 | for (ifa = ifap; ifa; ifa = ifa->ifa_next) { |
812 | int plen; | | 812 | int plen; |
813 | | | 813 | |
814 | if (strcmp(ifa->ifa_name, rai->ifname) != 0) | | 814 | if (strcmp(ifa->ifa_name, rai->ifname) != 0) |
815 | continue; | | 815 | continue; |
816 | if (ifa->ifa_addr->sa_family != AF_INET6) | | 816 | if (ifa->ifa_addr->sa_family != AF_INET6) |
817 | continue; | | 817 | continue; |
818 | a = &((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_addr; | | 818 | a = &((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_addr; |
819 | if (IN6_IS_ADDR_LINKLOCAL(a)) | | 819 | if (IN6_IS_ADDR_LINKLOCAL(a)) |
820 | continue; | | 820 | continue; |
821 | /* get prefix length */ | | 821 | /* get prefix length */ |
822 | m = (unsigned char *)&((struct sockaddr_in6 *)ifa->ifa_netmask)->sin6_addr; | | 822 | m = (unsigned char *)&((struct sockaddr_in6 *)ifa->ifa_netmask)->sin6_addr; |
823 | lim = (unsigned char *)(ifa->ifa_netmask) + ifa->ifa_netmask->sa_len; | | 823 | lim = (unsigned char *)(ifa->ifa_netmask) + ifa->ifa_netmask->sa_len; |
824 | plen = prefixlen(m, lim); | | 824 | plen = prefixlen(m, lim); |
825 | if (plen <= 0 || plen > 128) { | | 825 | if (plen <= 0 || plen > 128) { |
826 | syslog(LOG_ERR, "<%s> failed to get prefixlen " | | 826 | syslog(LOG_ERR, "<%s> failed to get prefixlen " |
827 | "or prefix is invalid", | | 827 | "or prefix is invalid", |
828 | __func__); | | 828 | __func__); |
829 | exit(1); | | 829 | exit(1); |
830 | } | | 830 | } |
831 | if (plen == 128) /* XXX */ | | 831 | if (plen == 128) /* XXX */ |
832 | continue; | | 832 | continue; |
833 | if (find_prefix(rai, a, plen)) { | | 833 | if (find_prefix(rai, a, plen)) { |
834 | /* ignore a duplicated prefix. */ | | 834 | /* ignore a duplicated prefix. */ |
835 | continue; | | 835 | continue; |
836 | } | | 836 | } |
837 | | | 837 | |
838 | /* allocate memory to store prefix info. */ | | 838 | /* allocate memory to store prefix info. */ |
839 | if ((pp = calloc(1, sizeof(*pp))) == NULL) { | | 839 | if ((pp = calloc(1, sizeof(*pp))) == NULL) { |
840 | syslog(LOG_ERR, | | 840 | syslog(LOG_ERR, |
841 | "<%s> can't get allocate buffer for prefix", | | 841 | "<%s> can't get allocate buffer for prefix", |
842 | __func__); | | 842 | __func__); |
843 | exit(1); | | 843 | exit(1); |
844 | } | | 844 | } |
845 | | | 845 | |
846 | /* set prefix, sweep bits outside of prefixlen */ | | 846 | /* set prefix, sweep bits outside of prefixlen */ |
847 | pp->prefixlen = plen; | | 847 | pp->prefixlen = plen; |
848 | memcpy(&pp->prefix, a, sizeof(*a)); | | 848 | memcpy(&pp->prefix, a, sizeof(*a)); |
849 | if (1) | | 849 | if (1) |
850 | { | | 850 | { |
851 | p = (unsigned char *)&pp->prefix; | | 851 | p = (unsigned char *)&pp->prefix; |
852 | ep = (unsigned char *)(&pp->prefix + 1); | | 852 | ep = (unsigned char *)(&pp->prefix + 1); |
853 | while (m < lim && p < ep) | | 853 | while (m < lim && p < ep) |
854 | *p++ &= *m++; | | 854 | *p++ &= *m++; |
855 | while (p < ep) | | 855 | while (p < ep) |
856 | *p++ = 0x00; | | 856 | *p++ = 0x00; |
857 | } | | 857 | } |
858 | if (!inet_ntop(AF_INET6, &pp->prefix, ntopbuf, | | 858 | if (!inet_ntop(AF_INET6, &pp->prefix, ntopbuf, |
859 | sizeof(ntopbuf))) { | | 859 | sizeof(ntopbuf))) { |
860 | syslog(LOG_ERR, "<%s> inet_ntop failed", __func__); | | 860 | syslog(LOG_ERR, "<%s> inet_ntop failed", __func__); |
861 | exit(1); | | 861 | exit(1); |
862 | } | | 862 | } |
863 | syslog(LOG_DEBUG, | | 863 | syslog(LOG_DEBUG, |
864 | "<%s> add %s/%d to prefix list on %s", | | 864 | "<%s> add %s/%d to prefix list on %s", |
865 | __func__, ntopbuf, pp->prefixlen, rai->ifname); | | 865 | __func__, ntopbuf, pp->prefixlen, rai->ifname); |
866 | | | 866 | |
867 | /* set other fields with protocol defaults */ | | 867 | /* set other fields with protocol defaults */ |
868 | pp->validlifetime = DEF_ADVVALIDLIFETIME; | | 868 | pp->validlifetime = DEF_ADVVALIDLIFETIME; |
869 | pp->preflifetime = DEF_ADVPREFERREDLIFETIME; | | 869 | pp->preflifetime = DEF_ADVPREFERREDLIFETIME; |
870 | pp->onlinkflg = 1; | | 870 | pp->onlinkflg = 1; |
871 | pp->autoconfflg = 1; | | 871 | pp->autoconfflg = 1; |
872 | pp->origin = PREFIX_FROM_KERNEL; | | 872 | pp->origin = PREFIX_FROM_KERNEL; |
873 | pp->rainfo = rai; | | 873 | pp->rainfo = rai; |
874 | | | 874 | |
875 | /* link into chain */ | | 875 | /* link into chain */ |
876 | TAILQ_INSERT_TAIL(&rai->prefix, pp, next); | | 876 | TAILQ_INSERT_TAIL(&rai->prefix, pp, next); |
877 | rai->pfxs++; | | 877 | rai->pfxs++; |
878 | } | | 878 | } |
879 | | | 879 | |
880 | freeifaddrs(ifap); | | 880 | freeifaddrs(ifap); |
881 | } | | 881 | } |
882 | | | 882 | |
883 | static void | | 883 | static void |
884 | makeentry(char *buf, size_t len, int id, const char *string) | | 884 | makeentry(char *buf, size_t len, int id, const char *string) |
885 | { | | 885 | { |
886 | | | 886 | |
887 | if (id < 0) | | 887 | if (id < 0) |
888 | strlcpy(buf, string, len); | | 888 | strlcpy(buf, string, len); |
889 | else | | 889 | else |
890 | snprintf(buf, len, "%s%d", string, id); | | 890 | snprintf(buf, len, "%s%d", string, id); |
891 | } | | 891 | } |
892 | | | 892 | |
893 | /* | | 893 | /* |
894 | * Add a prefix to the list of specified interface and reconstruct | | 894 | * Add a prefix to the list of specified interface and reconstruct |
895 | * the outgoing packet. | | 895 | * the outgoing packet. |
896 | * The prefix must not be in the list. | | 896 | * The prefix must not be in the list. |
897 | * XXX: other parameters of the prefix(e.g. lifetime) should be | | 897 | * XXX: other parameters of the prefix(e.g. lifetime) should be |
898 | * able to be specified. | | 898 | * able to be specified. |
899 | */ | | 899 | */ |
900 | static void | | 900 | static void |
901 | add_prefix(struct rainfo *rai, struct in6_prefixreq *ipr) | | 901 | add_prefix(struct rainfo *rai, struct in6_prefixreq *ipr) |
902 | { | | 902 | { |
903 | struct prefix *prefix; | | 903 | struct prefix *prefix; |
904 | char ntopbuf[INET6_ADDRSTRLEN]; | | 904 | char ntopbuf[INET6_ADDRSTRLEN]; |
905 | | | 905 | |
906 | if ((prefix = calloc(1, sizeof(*prefix))) == NULL) { | | 906 | if ((prefix = calloc(1, sizeof(*prefix))) == NULL) { |
907 | syslog(LOG_ERR, "<%s> memory allocation failed", | | 907 | syslog(LOG_ERR, "<%s> memory allocation failed", |
908 | __func__); | | 908 | __func__); |
909 | return; /* XXX: error or exit? */ | | 909 | return; /* XXX: error or exit? */ |
910 | } | | 910 | } |
911 | prefix->prefix = ipr->ipr_prefix.sin6_addr; | | 911 | prefix->prefix = ipr->ipr_prefix.sin6_addr; |
912 | prefix->prefixlen = ipr->ipr_plen; | | 912 | prefix->prefixlen = ipr->ipr_plen; |
913 | prefix->validlifetime = ipr->ipr_vltime; | | 913 | prefix->validlifetime = ipr->ipr_vltime; |
914 | prefix->preflifetime = ipr->ipr_pltime; | | 914 | prefix->preflifetime = ipr->ipr_pltime; |
915 | prefix->onlinkflg = ipr->ipr_raf_onlink; | | 915 | prefix->onlinkflg = ipr->ipr_raf_onlink; |
916 | prefix->autoconfflg = ipr->ipr_raf_auto; | | 916 | prefix->autoconfflg = ipr->ipr_raf_auto; |
917 | prefix->origin = PREFIX_FROM_DYNAMIC; | | 917 | prefix->origin = PREFIX_FROM_DYNAMIC; |
918 | | | 918 | |
919 | prefix->rainfo = rai; | | 919 | prefix->rainfo = rai; |
920 | TAILQ_INSERT_TAIL(&rai->prefix, prefix, next); | | 920 | TAILQ_INSERT_TAIL(&rai->prefix, prefix, next); |
921 | rai->pfxs++; | | 921 | rai->pfxs++; |
922 | | | 922 | |
923 | syslog(LOG_DEBUG, "<%s> new prefix %s/%d was added on %s", | | 923 | syslog(LOG_DEBUG, "<%s> new prefix %s/%d was added on %s", |
924 | __func__, inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr, | | 924 | __func__, inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr, |
925 | ntopbuf, INET6_ADDRSTRLEN), | | 925 | ntopbuf, INET6_ADDRSTRLEN), |
926 | ipr->ipr_plen, rai->ifname); | | 926 | ipr->ipr_plen, rai->ifname); |
927 | | | 927 | |
928 | /* free the previous packet */ | | 928 | /* free the previous packet */ |
929 | free(rai->ra_data); | | 929 | free(rai->ra_data); |
930 | rai->ra_data = NULL; | | 930 | rai->ra_data = NULL; |
931 | | | 931 | |
932 | /* reconstruct the packet */ | | 932 | /* reconstruct the packet */ |
933 | make_packet(rai); | | 933 | make_packet(rai); |
934 | } | | 934 | } |
935 | | | 935 | |
936 | /* | | 936 | /* |
937 | * Delete a prefix to the list of specified interface and reconstruct | | 937 | * Delete a prefix to the list of specified interface and reconstruct |
938 | * the outgoing packet. | | 938 | * the outgoing packet. |
939 | * The prefix must be in the list. | | 939 | * The prefix must be in the list. |
940 | */ | | 940 | */ |
941 | void | | 941 | void |
942 | delete_prefix(struct prefix *prefix) | | 942 | delete_prefix(struct prefix *prefix) |
943 | { | | 943 | { |
944 | char ntopbuf[INET6_ADDRSTRLEN]; | | 944 | char ntopbuf[INET6_ADDRSTRLEN]; |
945 | struct rainfo *rai = prefix->rainfo; | | 945 | struct rainfo *rai = prefix->rainfo; |
946 | | | 946 | |
947 | TAILQ_REMOVE(&rai->prefix, prefix, next); | | 947 | TAILQ_REMOVE(&rai->prefix, prefix, next); |
948 | rai->pfxs--; | | 948 | rai->pfxs--; |
949 | syslog(LOG_DEBUG, "<%s> prefix %s/%d was deleted on %s", | | 949 | syslog(LOG_DEBUG, "<%s> prefix %s/%d was deleted on %s", |
950 | __func__, inet_ntop(AF_INET6, &prefix->prefix, | | 950 | __func__, inet_ntop(AF_INET6, &prefix->prefix, |
951 | ntopbuf, INET6_ADDRSTRLEN), | | 951 | ntopbuf, INET6_ADDRSTRLEN), |
952 | prefix->prefixlen, rai->ifname); | | 952 | prefix->prefixlen, rai->ifname); |
953 | rtadvd_remove_timer(&prefix->timer); | | 953 | rtadvd_remove_timer(&prefix->timer); |
954 | free(prefix); | | 954 | free(prefix); |
955 | } | | 955 | } |
956 | | | 956 | |
957 | void | | 957 | void |
958 | invalidate_prefix(struct prefix *prefix) | | 958 | invalidate_prefix(struct prefix *prefix) |
959 | { | | 959 | { |
960 | char ntopbuf[INET6_ADDRSTRLEN]; | | 960 | char ntopbuf[INET6_ADDRSTRLEN]; |
961 | struct timeval timo; | | 961 | struct timeval timo; |
962 | struct rainfo *rai = prefix->rainfo; | | 962 | struct rainfo *rai = prefix->rainfo; |
963 | | | 963 | |
964 | if (prefix->timer) { /* sanity check */ | | 964 | if (prefix->timer) { /* sanity check */ |
965 | syslog(LOG_ERR, | | 965 | syslog(LOG_ERR, |
966 | "<%s> assumption failure: timer already exists", | | 966 | "<%s> assumption failure: timer already exists", |
967 | __func__); | | 967 | __func__); |
968 | exit(1); | | 968 | exit(1); |
969 | } | | 969 | } |
970 | | | 970 | |
971 | syslog(LOG_DEBUG, "<%s> prefix %s/%d was invalidated on %s, " | | 971 | syslog(LOG_DEBUG, "<%s> prefix %s/%d was invalidated on %s, " |
972 | "will expire in %ld seconds", __func__, | | 972 | "will expire in %ld seconds", __func__, |
973 | inet_ntop(AF_INET6, &prefix->prefix, ntopbuf, INET6_ADDRSTRLEN), | | 973 | inet_ntop(AF_INET6, &prefix->prefix, ntopbuf, INET6_ADDRSTRLEN), |
974 | prefix->prefixlen, rai->ifname, (long)prefix_timo); | | 974 | prefix->prefixlen, rai->ifname, (long)prefix_timo); |
975 | | | 975 | |
976 | /* set the expiration timer */ | | 976 | /* set the expiration timer */ |
977 | prefix->timer = rtadvd_add_timer(prefix_timeout, NULL, prefix, NULL); | | 977 | prefix->timer = rtadvd_add_timer(prefix_timeout, NULL, prefix, NULL); |
978 | if (prefix->timer == NULL) { | | 978 | if (prefix->timer == NULL) { |
979 | syslog(LOG_ERR, "<%s> failed to add a timer for a prefix. " | | 979 | syslog(LOG_ERR, "<%s> failed to add a timer for a prefix. " |
980 | "remove the prefix", __func__); | | 980 | "remove the prefix", __func__); |
981 | delete_prefix(prefix); | | 981 | delete_prefix(prefix); |
982 | } | | 982 | } |
983 | timo.tv_sec = prefix_timo; | | 983 | timo.tv_sec = prefix_timo; |
984 | timo.tv_usec = 0; | | 984 | timo.tv_usec = 0; |
985 | rtadvd_set_timer(&timo, prefix->timer); | | 985 | rtadvd_set_timer(&timo, prefix->timer); |
986 | } | | 986 | } |
987 | | | 987 | |
988 | static struct rtadvd_timer * | | 988 | static struct rtadvd_timer * |
989 | prefix_timeout(void *arg) | | 989 | prefix_timeout(void *arg) |
990 | { | | 990 | { |
991 | struct prefix *prefix = (struct prefix *)arg; | | 991 | struct prefix *prefix = (struct prefix *)arg; |
992 | | | 992 | |
993 | delete_prefix(prefix); | | 993 | delete_prefix(prefix); |
994 | | | 994 | |
995 | return(NULL); | | 995 | return(NULL); |
996 | } | | 996 | } |
997 | | | 997 | |
998 | void | | 998 | void |
999 | update_prefix(struct prefix * prefix) | | 999 | update_prefix(struct prefix * prefix) |
1000 | { | | 1000 | { |
1001 | char ntopbuf[INET6_ADDRSTRLEN]; | | 1001 | char ntopbuf[INET6_ADDRSTRLEN]; |
1002 | struct rainfo *rai = prefix->rainfo; | | 1002 | struct rainfo *rai = prefix->rainfo; |
1003 | | | 1003 | |
1004 | if (prefix->timer == NULL) { /* sanity check */ | | 1004 | if (prefix->timer == NULL) { /* sanity check */ |
1005 | syslog(LOG_ERR, | | 1005 | syslog(LOG_ERR, |
1006 | "<%s> assumption failure: timer does not exist", | | 1006 | "<%s> assumption failure: timer does not exist", |
1007 | __func__); | | 1007 | __func__); |
1008 | exit(1); | | 1008 | exit(1); |
1009 | } | | 1009 | } |
1010 | | | 1010 | |
1011 | syslog(LOG_DEBUG, "<%s> prefix %s/%d was re-enabled on %s", | | 1011 | syslog(LOG_DEBUG, "<%s> prefix %s/%d was re-enabled on %s", |
1012 | __func__, inet_ntop(AF_INET6, &prefix->prefix, ntopbuf, | | 1012 | __func__, inet_ntop(AF_INET6, &prefix->prefix, ntopbuf, |
1013 | INET6_ADDRSTRLEN), prefix->prefixlen, rai->ifname); | | 1013 | INET6_ADDRSTRLEN), prefix->prefixlen, rai->ifname); |
1014 | | | 1014 | |
1015 | /* stop the expiration timer */ | | 1015 | /* stop the expiration timer */ |
1016 | rtadvd_remove_timer(&prefix->timer); | | 1016 | rtadvd_remove_timer(&prefix->timer); |
1017 | } | | 1017 | } |
1018 | | | 1018 | |
1019 | /* | | 1019 | /* |
1020 | * Try to get an in6_prefixreq contents for a prefix which matches | | 1020 | * Try to get an in6_prefixreq contents for a prefix which matches |
1021 | * ipr->ipr_prefix and ipr->ipr_plen and belongs to | | 1021 | * ipr->ipr_prefix and ipr->ipr_plen and belongs to |
1022 | * the interface whose name is ipr->ipr_name[]. | | 1022 | * the interface whose name is ipr->ipr_name[]. |
1023 | */ | | 1023 | */ |
1024 | static int | | 1024 | static int |
1025 | init_prefix(struct in6_prefixreq *ipr) | | 1025 | init_prefix(struct in6_prefixreq *ipr) |
1026 | { | | 1026 | { |
1027 | #if 0 | | 1027 | #if 0 |
1028 | int s; | | 1028 | int s; |
1029 | | | 1029 | |
1030 | if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) { | | 1030 | if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) { |
1031 | syslog(LOG_ERR, "<%s> socket: %m", __func__); | | 1031 | syslog(LOG_ERR, "<%s> socket: %m", __func__); |
1032 | exit(1); | | 1032 | exit(1); |
1033 | } | | 1033 | } |
1034 | | | 1034 | |
1035 | if (ioctl(s, SIOCGIFPREFIX_IN6, ipr) < 0) { | | 1035 | if (ioctl(s, SIOCGIFPREFIX_IN6, ipr) < 0) { |
1036 | syslog(LOG_INFO, "<%s> ioctl:SIOCGIFPREFIX: %m", __func__); | | 1036 | syslog(LOG_INFO, "<%s> ioctl:SIOCGIFPREFIX: %m", __func__); |
1037 | | | 1037 | |
1038 | ipr->ipr_vltime = DEF_ADVVALIDLIFETIME; | | 1038 | ipr->ipr_vltime = DEF_ADVVALIDLIFETIME; |
1039 | ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME; | | 1039 | ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME; |
1040 | ipr->ipr_raf_onlink = 1; | | 1040 | ipr->ipr_raf_onlink = 1; |
1041 | ipr->ipr_raf_auto = 1; | | 1041 | ipr->ipr_raf_auto = 1; |
1042 | /* omit other field initialization */ | | 1042 | /* omit other field initialization */ |
1043 | } | | 1043 | } |
1044 | else if (ipr->ipr_origin < PR_ORIG_RR) { | | 1044 | else if (ipr->ipr_origin < PR_ORIG_RR) { |
1045 | char ntopbuf[INET6_ADDRSTRLEN]; | | 1045 | char ntopbuf[INET6_ADDRSTRLEN]; |
1046 | | | 1046 | |
1047 | syslog(LOG_WARNING, "<%s> Added prefix(%s)'s origin %d is" | | 1047 | syslog(LOG_WARNING, "<%s> Added prefix(%s)'s origin %d is" |
1048 | "lower than PR_ORIG_RR(router renumbering)." | | 1048 | "lower than PR_ORIG_RR(router renumbering)." |
1049 | "This should not happen if I am router", __func__, | | 1049 | "This should not happen if I am router", __func__, |
1050 | inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr, ntopbuf, | | 1050 | inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr, ntopbuf, |
1051 | sizeof(ntopbuf)), ipr->ipr_origin); | | 1051 | sizeof(ntopbuf)), ipr->ipr_origin); |
1052 | close(s); | | 1052 | close(s); |
1053 | return 1; | | 1053 | return 1; |
1054 | } | | 1054 | } |
1055 | | | 1055 | |
1056 | close(s); | | 1056 | close(s); |
1057 | return 0; | | 1057 | return 0; |
1058 | #else | | 1058 | #else |
1059 | ipr->ipr_vltime = DEF_ADVVALIDLIFETIME; | | 1059 | ipr->ipr_vltime = DEF_ADVVALIDLIFETIME; |
1060 | ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME; | | 1060 | ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME; |
1061 | ipr->ipr_raf_onlink = 1; | | 1061 | ipr->ipr_raf_onlink = 1; |
1062 | ipr->ipr_raf_auto = 1; | | 1062 | ipr->ipr_raf_auto = 1; |
1063 | return 0; | | 1063 | return 0; |
1064 | #endif | | 1064 | #endif |
1065 | } | | 1065 | } |
1066 | | | 1066 | |
1067 | void | | 1067 | void |
1068 | make_prefix(struct rainfo *rai, int ifindex, struct in6_addr *addr, int plen) | | 1068 | make_prefix(struct rainfo *rai, int ifindex, struct in6_addr *addr, int plen) |
1069 | { | | 1069 | { |
1070 | struct in6_prefixreq ipr; | | 1070 | struct in6_prefixreq ipr; |
1071 | | | 1071 | |
1072 | memset(&ipr, 0, sizeof(ipr)); | | 1072 | memset(&ipr, 0, sizeof(ipr)); |
1073 | if (if_indextoname(ifindex, ipr.ipr_name) == NULL) { | | 1073 | if (if_indextoname(ifindex, ipr.ipr_name) == NULL) { |
1074 | syslog(LOG_ERR, "<%s> Prefix added interface No.%d doesn't" | | 1074 | syslog(LOG_ERR, "<%s> Prefix added interface No.%d doesn't" |
1075 | "exist. This should not happen: %m", __func__, | | 1075 | "exist. This should not happen: %m", __func__, |
1076 | ifindex); | | 1076 | ifindex); |
1077 | exit(1); | | 1077 | exit(1); |
1078 | } | | 1078 | } |
1079 | ipr.ipr_prefix.sin6_len = sizeof(ipr.ipr_prefix); | | 1079 | ipr.ipr_prefix.sin6_len = sizeof(ipr.ipr_prefix); |
1080 | ipr.ipr_prefix.sin6_family = AF_INET6; | | 1080 | ipr.ipr_prefix.sin6_family = AF_INET6; |
1081 | ipr.ipr_prefix.sin6_addr = *addr; | | 1081 | ipr.ipr_prefix.sin6_addr = *addr; |
1082 | ipr.ipr_plen = plen; | | 1082 | ipr.ipr_plen = plen; |
1083 | | | 1083 | |
1084 | if (init_prefix(&ipr)) | | 1084 | if (init_prefix(&ipr)) |
1085 | return; /* init failed by some error */ | | 1085 | return; /* init failed by some error */ |
1086 | add_prefix(rai, &ipr); | | 1086 | add_prefix(rai, &ipr); |
1087 | } | | 1087 | } |
1088 | | | 1088 | |
1089 | void | | 1089 | void |
1090 | make_packet(struct rainfo *rainfo) | | 1090 | make_packet(struct rainfo *rainfo) |
1091 | { | | 1091 | { |
1092 | size_t packlen, lladdroptlen = 0; | | 1092 | size_t packlen, lladdroptlen = 0; |
1093 | char *buf; | | 1093 | char *buf; |
1094 | struct nd_router_advert *ra; | | 1094 | struct nd_router_advert *ra; |
1095 | struct nd_opt_prefix_info *ndopt_pi; | | 1095 | struct nd_opt_prefix_info *ndopt_pi; |
1096 | struct nd_opt_mtu *ndopt_mtu; | | 1096 | struct nd_opt_mtu *ndopt_mtu; |
1097 | struct prefix *pfx; | | 1097 | struct prefix *pfx; |
1098 | struct nd_opt_route_info *ndopt_rti; | | 1098 | struct nd_opt_route_info *ndopt_rti; |
1099 | struct rtinfo *rti; | | 1099 | struct rtinfo *rti; |
1100 | struct nd_opt_rdnss *ndopt_rdnss; | | 1100 | struct nd_opt_rdnss *ndopt_rdnss; |
1101 | struct rdnss *rdns; | | 1101 | struct rdnss *rdns; |
1102 | struct rdnss_addr *rdnsa; | | 1102 | struct rdnss_addr *rdnsa; |
1103 | struct nd_opt_dnssl *ndopt_dnssl; | | 1103 | struct nd_opt_dnssl *ndopt_dnssl; |
1104 | struct dnssl *dnsl; | | 1104 | struct dnssl *dnsl; |
1105 | struct dnssl_domain *dnsd; | | 1105 | struct dnssl_domain *dnsd; |
1106 | size_t len, plen; | | 1106 | size_t len, plen; |
1107 | | | 1107 | |
1108 | /* calculate total length */ | | 1108 | /* calculate total length */ |
1109 | packlen = sizeof(struct nd_router_advert); | | 1109 | packlen = sizeof(struct nd_router_advert); |
1110 | if (rainfo->advlinkopt) { | | 1110 | if (rainfo->advlinkopt) { |
1111 | if ((lladdroptlen = lladdropt_length(rainfo->sdl)) == 0) { | | 1111 | if ((lladdroptlen = lladdropt_length(rainfo->sdl)) == 0) { |
1112 | syslog(LOG_INFO, | | 1112 | syslog(LOG_INFO, |
1113 | "<%s> link-layer address option has" | | 1113 | "<%s> link-layer address option has" |
1114 | " null length on %s. Treat as not included.", | | 1114 | " null length on %s. Treat as not included.", |
1115 | __func__, rainfo->ifname); | | 1115 | __func__, rainfo->ifname); |
1116 | rainfo->advlinkopt = 0; | | 1116 | rainfo->advlinkopt = 0; |
1117 | } | | 1117 | } |
1118 | packlen += lladdroptlen; | | 1118 | packlen += lladdroptlen; |
1119 | } | | 1119 | } |
1120 | if (TAILQ_FIRST(&rainfo->prefix) != NULL) | | 1120 | if (TAILQ_FIRST(&rainfo->prefix) != NULL) |
1121 | packlen += sizeof(struct nd_opt_prefix_info) * rainfo->pfxs; | | 1121 | packlen += sizeof(struct nd_opt_prefix_info) * rainfo->pfxs; |
1122 | if (rainfo->linkmtu) | | 1122 | if (rainfo->linkmtu) |
1123 | packlen += sizeof(struct nd_opt_mtu); | | 1123 | packlen += sizeof(struct nd_opt_mtu); |
1124 | TAILQ_FOREACH(rti, &rainfo->route, next) | | 1124 | TAILQ_FOREACH(rti, &rainfo->route, next) |
1125 | packlen += sizeof(struct nd_opt_route_info) + | | 1125 | packlen += sizeof(struct nd_opt_route_info) + |
1126 | ((rti->prefixlen + 0x3f) >> 6) * 8; | | 1126 | ((rti->prefixlen + 0x3f) >> 6) * 8; |
1127 | | | 1127 | |
1128 | TAILQ_FOREACH(rdns, &rainfo->rdnss, next) { | | 1128 | TAILQ_FOREACH(rdns, &rainfo->rdnss, next) { |
1129 | packlen += sizeof(struct nd_opt_rdnss); | | 1129 | packlen += sizeof(struct nd_opt_rdnss); |
1130 | TAILQ_FOREACH(rdnsa, &rdns->list, next) | | 1130 | TAILQ_FOREACH(rdnsa, &rdns->list, next) |
1131 | packlen += sizeof(rdnsa->addr); | | 1131 | packlen += sizeof(rdnsa->addr); |
1132 | } | | 1132 | } |
1133 | TAILQ_FOREACH(dnsl, &rainfo->dnssl, next) { | | 1133 | TAILQ_FOREACH(dnsl, &rainfo->dnssl, next) { |
1134 | packlen += sizeof(struct nd_opt_dnssl); | | 1134 | packlen += sizeof(struct nd_opt_dnssl); |
1135 | len = 0; | | 1135 | len = 0; |
1136 | TAILQ_FOREACH(dnsd, &dnsl->list, next) | | 1136 | TAILQ_FOREACH(dnsd, &dnsl->list, next) |
1137 | len += dnsd->len; | | 1137 | len += dnsd->len; |
1138 | len += len % 8 ? 8 - len % 8 : 0; | | 1138 | len += len % 8 ? 8 - len % 8 : 0; |
1139 | packlen += len; | | 1139 | packlen += len; |
1140 | } | | 1140 | } |
1141 | | | 1141 | |
1142 | /* allocate memory for the packet */ | | 1142 | /* allocate memory for the packet */ |
1143 | if ((buf = realloc(rainfo->ra_data, packlen)) == NULL) { | | 1143 | if ((buf = realloc(rainfo->ra_data, packlen)) == NULL) { |
1144 | syslog(LOG_ERR, | | 1144 | syslog(LOG_ERR, |
1145 | "<%s> can't get enough memory for an RA packet %m", | | 1145 | "<%s> can't get enough memory for an RA packet %m", |
1146 | __func__); | | 1146 | __func__); |
1147 | exit(1); | | 1147 | exit(1); |
1148 | } | | 1148 | } |
1149 | rainfo->ra_data = buf; | | 1149 | rainfo->ra_data = buf; |
1150 | /* XXX: what if packlen > 576? */ | | 1150 | /* XXX: what if packlen > 576? */ |
1151 | rainfo->ra_datalen = packlen; | | 1151 | rainfo->ra_datalen = packlen; |
1152 | #define CHECKLEN(size) \ | | 1152 | #define CHECKLEN(size) \ |
1153 | do { \ | | 1153 | do { \ |
1154 | if (buf + size > rainfo->ra_data + packlen) { \ | | 1154 | if (buf + size > rainfo->ra_data + packlen) { \ |
1155 | syslog(LOG_ERR, \ | | 1155 | syslog(LOG_ERR, \ |
1156 | "<%s, %d> RA packet does not fit in %zu",\ | | 1156 | "<%s, %d> RA packet does not fit in %zu",\ |
1157 | __func__, __LINE__, packlen); \ | | 1157 | __func__, __LINE__, packlen); \ |
1158 | exit(1); \ | | 1158 | exit(1); \ |
1159 | } \ | | 1159 | } \ |
1160 | } while (/*CONSTCOND*/0) | | 1160 | } while (/*CONSTCOND*/0) |
1161 | /* | | 1161 | /* |
1162 | * construct the packet | | 1162 | * construct the packet |
1163 | */ | | 1163 | */ |
1164 | CHECKLEN(sizeof(*ra)); | | 1164 | CHECKLEN(sizeof(*ra)); |
1165 | ra = (struct nd_router_advert *)buf; | | 1165 | ra = (struct nd_router_advert *)buf; |
1166 | ra->nd_ra_type = ND_ROUTER_ADVERT; | | 1166 | ra->nd_ra_type = ND_ROUTER_ADVERT; |
1167 | ra->nd_ra_code = 0; | | 1167 | ra->nd_ra_code = 0; |
1168 | ra->nd_ra_cksum = 0; | | 1168 | ra->nd_ra_cksum = 0; |
1169 | ra->nd_ra_curhoplimit = (uint8_t)(0xff & rainfo->hoplimit); | | 1169 | ra->nd_ra_curhoplimit = (uint8_t)(0xff & rainfo->hoplimit); |
1170 | ra->nd_ra_flags_reserved = 0; /* just in case */ | | 1170 | ra->nd_ra_flags_reserved = 0; /* just in case */ |
1171 | /* | | 1171 | /* |
1172 | * XXX: the router preference field, which is a 2-bit field, should be | | 1172 | * XXX: the router preference field, which is a 2-bit field, should be |
1173 | * initialized before other fields. | | 1173 | * initialized before other fields. |
1174 | */ | | 1174 | */ |
1175 | ra->nd_ra_flags_reserved = 0xff & rainfo->rtpref; | | 1175 | ra->nd_ra_flags_reserved = 0xff & rainfo->rtpref; |
1176 | ra->nd_ra_flags_reserved |= | | 1176 | ra->nd_ra_flags_reserved |= |
1177 | rainfo->managedflg ? ND_RA_FLAG_MANAGED : 0; | | 1177 | rainfo->managedflg ? ND_RA_FLAG_MANAGED : 0; |
1178 | ra->nd_ra_flags_reserved |= | | 1178 | ra->nd_ra_flags_reserved |= |
1179 | rainfo->otherflg ? ND_RA_FLAG_OTHER : 0; | | 1179 | rainfo->otherflg ? ND_RA_FLAG_OTHER : 0; |
1180 | ra->nd_ra_router_lifetime = htons(rainfo->lifetime); | | 1180 | ra->nd_ra_router_lifetime = htons(rainfo->lifetime); |
1181 | ra->nd_ra_reachable = htonl(rainfo->reachabletime); | | 1181 | ra->nd_ra_reachable = htonl(rainfo->reachabletime); |
1182 | ra->nd_ra_retransmit = htonl(rainfo->retranstimer); | | 1182 | ra->nd_ra_retransmit = htonl(rainfo->retranstimer); |
1183 | buf += sizeof(*ra); | | 1183 | buf += sizeof(*ra); |
1184 | | | 1184 | |
1185 | if (rainfo->advlinkopt) { | | 1185 | if (rainfo->advlinkopt) { |
1186 | CHECKLEN(sizeof(struct nd_opt_hdr)); | | 1186 | CHECKLEN(sizeof(struct nd_opt_hdr)); |
1187 | lladdropt_fill(rainfo->sdl, (struct nd_opt_hdr *)buf); | | 1187 | lladdropt_fill(rainfo->sdl, (struct nd_opt_hdr *)buf); |
1188 | buf += lladdroptlen; | | 1188 | buf += lladdroptlen; |
1189 | } | | 1189 | } |
1190 | | | 1190 | |
1191 | if (rainfo->linkmtu) { | | 1191 | if (rainfo->linkmtu) { |
1192 | CHECKLEN(sizeof(*ndopt_mtu)); | | 1192 | CHECKLEN(sizeof(*ndopt_mtu)); |
1193 | ndopt_mtu = (struct nd_opt_mtu *)buf; | | 1193 | ndopt_mtu = (struct nd_opt_mtu *)buf; |
1194 | ndopt_mtu->nd_opt_mtu_type = ND_OPT_MTU; | | 1194 | ndopt_mtu->nd_opt_mtu_type = ND_OPT_MTU; |
1195 | ndopt_mtu->nd_opt_mtu_len = 1; | | 1195 | ndopt_mtu->nd_opt_mtu_len = 1; |
1196 | ndopt_mtu->nd_opt_mtu_reserved = 0; | | 1196 | ndopt_mtu->nd_opt_mtu_reserved = 0; |
1197 | ndopt_mtu->nd_opt_mtu_mtu = htonl(rainfo->linkmtu); | | 1197 | ndopt_mtu->nd_opt_mtu_mtu = htonl(rainfo->linkmtu); |
1198 | buf += sizeof(struct nd_opt_mtu); | | 1198 | buf += sizeof(struct nd_opt_mtu); |
1199 | } | | 1199 | } |
1200 | | | 1200 | |
1201 | TAILQ_FOREACH(pfx, &rainfo->prefix, next) { | | 1201 | TAILQ_FOREACH(pfx, &rainfo->prefix, next) { |
1202 | uint32_t vltime, pltime; | | 1202 | uint32_t vltime, pltime; |
1203 | struct timeval now; | | 1203 | struct timeval now; |
1204 | | | 1204 | |
1205 | CHECKLEN(sizeof(*ndopt_pi)); | | 1205 | CHECKLEN(sizeof(*ndopt_pi)); |
1206 | ndopt_pi = (struct nd_opt_prefix_info *)buf; | | 1206 | ndopt_pi = (struct nd_opt_prefix_info *)buf; |
1207 | ndopt_pi->nd_opt_pi_type = ND_OPT_PREFIX_INFORMATION; | | 1207 | ndopt_pi->nd_opt_pi_type = ND_OPT_PREFIX_INFORMATION; |
1208 | ndopt_pi->nd_opt_pi_len = 4; | | 1208 | ndopt_pi->nd_opt_pi_len = 4; |
1209 | ndopt_pi->nd_opt_pi_prefix_len = pfx->prefixlen; | | 1209 | ndopt_pi->nd_opt_pi_prefix_len = pfx->prefixlen; |
1210 | ndopt_pi->nd_opt_pi_flags_reserved = 0; | | 1210 | ndopt_pi->nd_opt_pi_flags_reserved = 0; |
1211 | if (pfx->onlinkflg) | | 1211 | if (pfx->onlinkflg) |
1212 | ndopt_pi->nd_opt_pi_flags_reserved |= | | 1212 | ndopt_pi->nd_opt_pi_flags_reserved |= |
1213 | ND_OPT_PI_FLAG_ONLINK; | | 1213 | ND_OPT_PI_FLAG_ONLINK; |
1214 | if (pfx->autoconfflg) | | 1214 | if (pfx->autoconfflg) |
1215 | ndopt_pi->nd_opt_pi_flags_reserved |= | | 1215 | ndopt_pi->nd_opt_pi_flags_reserved |= |
1216 | ND_OPT_PI_FLAG_AUTO; | | 1216 | ND_OPT_PI_FLAG_AUTO; |
1217 | if (pfx->timer) | | 1217 | if (pfx->timer) |
1218 | vltime = 0; | | 1218 | vltime = 0; |
1219 | else { | | 1219 | else { |
1220 | if (pfx->vltimeexpire || pfx->pltimeexpire) | | 1220 | if (pfx->vltimeexpire || pfx->pltimeexpire) |
1221 | gettimeofday(&now, NULL); | | 1221 | gettimeofday(&now, NULL); |
1222 | if (pfx->vltimeexpire == 0) | | 1222 | if (pfx->vltimeexpire == 0) |
1223 | vltime = pfx->validlifetime; | | 1223 | vltime = pfx->validlifetime; |
1224 | else | | 1224 | else |
1225 | vltime = (pfx->vltimeexpire > now.tv_sec) ? | | 1225 | vltime = (pfx->vltimeexpire > now.tv_sec) ? |
1226 | pfx->vltimeexpire - now.tv_sec : 0; | | 1226 | pfx->vltimeexpire - now.tv_sec : 0; |
1227 | } | | 1227 | } |
1228 | if (pfx->timer) | | 1228 | if (pfx->timer) |
1229 | pltime = 0; | | 1229 | pltime = 0; |
1230 | else { | | 1230 | else { |
1231 | if (pfx->pltimeexpire == 0) | | 1231 | if (pfx->pltimeexpire == 0) |
1232 | pltime = pfx->preflifetime; | | 1232 | pltime = pfx->preflifetime; |
1233 | else | | 1233 | else |
1234 | pltime = (pfx->pltimeexpire > now.tv_sec) ? | | 1234 | pltime = (pfx->pltimeexpire > now.tv_sec) ? |
1235 | pfx->pltimeexpire - now.tv_sec : 0; | | 1235 | pfx->pltimeexpire - now.tv_sec : 0; |
1236 | } | | 1236 | } |
1237 | if (vltime < pltime) { | | 1237 | if (vltime < pltime) { |
1238 | /* | | 1238 | /* |
1239 | * this can happen if vltime is decrement but pltime | | 1239 | * this can happen if vltime is decrement but pltime |
1240 | * is not. | | 1240 | * is not. |
1241 | */ | | 1241 | */ |
1242 | pltime = vltime; | | 1242 | pltime = vltime; |
1243 | } | | 1243 | } |
1244 | ndopt_pi->nd_opt_pi_valid_time = htonl(vltime); | | 1244 | ndopt_pi->nd_opt_pi_valid_time = htonl(vltime); |
1245 | ndopt_pi->nd_opt_pi_preferred_time = htonl(pltime); | | 1245 | ndopt_pi->nd_opt_pi_preferred_time = htonl(pltime); |
1246 | ndopt_pi->nd_opt_pi_reserved2 = 0; | | 1246 | ndopt_pi->nd_opt_pi_reserved2 = 0; |
1247 | ndopt_pi->nd_opt_pi_prefix = pfx->prefix; | | 1247 | ndopt_pi->nd_opt_pi_prefix = pfx->prefix; |
1248 | | | 1248 | |
1249 | buf += sizeof(struct nd_opt_prefix_info); | | 1249 | buf += sizeof(struct nd_opt_prefix_info); |
1250 | } | | 1250 | } |
1251 | | | 1251 | |
1252 | TAILQ_FOREACH(rti, &rainfo->route, next) { | | 1252 | TAILQ_FOREACH(rti, &rainfo->route, next) { |
1253 | uint8_t psize = (rti->prefixlen + 0x3f) >> 6; | | 1253 | uint8_t psize = (rti->prefixlen + 0x3f) >> 6; |
1254 | | | 1254 | |
1255 | CHECKLEN(sizeof(*ndopt_rti)); | | 1255 | CHECKLEN(sizeof(*ndopt_rti)); |
1256 | ndopt_rti = (struct nd_opt_route_info *)buf; | | 1256 | ndopt_rti = (struct nd_opt_route_info *)buf; |
1257 | ndopt_rti->nd_opt_rti_type = ND_OPT_ROUTE_INFO; | | 1257 | ndopt_rti->nd_opt_rti_type = ND_OPT_ROUTE_INFO; |
1258 | ndopt_rti->nd_opt_rti_len = 1 + psize; | | 1258 | ndopt_rti->nd_opt_rti_len = 1 + psize; |
1259 | ndopt_rti->nd_opt_rti_prefixlen = rti->prefixlen; | | 1259 | ndopt_rti->nd_opt_rti_prefixlen = rti->prefixlen; |
1260 | ndopt_rti->nd_opt_rti_flags = 0xff & rti->rtpref; | | 1260 | ndopt_rti->nd_opt_rti_flags = 0xff & rti->rtpref; |
1261 | ndopt_rti->nd_opt_rti_lifetime = htonl(rti->ltime); | | 1261 | ndopt_rti->nd_opt_rti_lifetime = htonl(rti->ltime); |
1262 | memcpy(ndopt_rti + 1, &rti->prefix, psize * 8); | | 1262 | memcpy(ndopt_rti + 1, &rti->prefix, psize * 8); |
1263 | buf += sizeof(struct nd_opt_route_info) + psize * 8; | | 1263 | buf += sizeof(struct nd_opt_route_info) + psize * 8; |
1264 | } | | 1264 | } |
1265 | | | 1265 | |
1266 | TAILQ_FOREACH(rdns, &rainfo->rdnss, next) { | | 1266 | TAILQ_FOREACH(rdns, &rainfo->rdnss, next) { |
1267 | CHECKLEN(sizeof(*ndopt_rdnss)); | | 1267 | CHECKLEN(sizeof(*ndopt_rdnss)); |
1268 | ndopt_rdnss = (struct nd_opt_rdnss *)buf; | | 1268 | ndopt_rdnss = (struct nd_opt_rdnss *)buf; |
1269 | ndopt_rdnss->nd_opt_rdnss_type = ND_OPT_RDNSS; | | 1269 | ndopt_rdnss->nd_opt_rdnss_type = ND_OPT_RDNSS; |
1270 | ndopt_rdnss->nd_opt_rdnss_len = 1; | | 1270 | ndopt_rdnss->nd_opt_rdnss_len = 1; |
1271 | ndopt_rdnss->nd_opt_rdnss_reserved = 0; | | 1271 | ndopt_rdnss->nd_opt_rdnss_reserved = 0; |
1272 | ndopt_rdnss->nd_opt_rdnss_lifetime = htonl(rdns->lifetime); | | 1272 | ndopt_rdnss->nd_opt_rdnss_lifetime = htonl(rdns->lifetime); |
1273 | buf += sizeof(*ndopt_rdnss); | | 1273 | buf += sizeof(*ndopt_rdnss); |
1274 | | | 1274 | |
1275 | TAILQ_FOREACH(rdnsa, &rdns->list, next) { | | 1275 | TAILQ_FOREACH(rdnsa, &rdns->list, next) { |
1276 | CHECKLEN(sizeof(rdnsa->addr)); | | 1276 | CHECKLEN(sizeof(rdnsa->addr)); |
1277 | memcpy(buf, &rdnsa->addr, sizeof(rdnsa->addr)); | | 1277 | memcpy(buf, &rdnsa->addr, sizeof(rdnsa->addr)); |
1278 | ndopt_rdnss->nd_opt_rdnss_len += 2; | | 1278 | ndopt_rdnss->nd_opt_rdnss_len += 2; |
1279 | buf += sizeof(rdnsa->addr); | | 1279 | buf += sizeof(rdnsa->addr); |
1280 | } | | 1280 | } |
1281 | } | | 1281 | } |
1282 | | | 1282 | |
1283 | TAILQ_FOREACH(dnsl, &rainfo->dnssl, next) { | | 1283 | TAILQ_FOREACH(dnsl, &rainfo->dnssl, next) { |
1284 | CHECKLEN(sizeof(*ndopt_dnssl)); | | 1284 | CHECKLEN(sizeof(*ndopt_dnssl)); |
1285 | ndopt_dnssl = (struct nd_opt_dnssl *)buf; | | 1285 | ndopt_dnssl = (struct nd_opt_dnssl *)buf; |
1286 | ndopt_dnssl->nd_opt_dnssl_type = ND_OPT_DNSSL; | | 1286 | ndopt_dnssl->nd_opt_dnssl_type = ND_OPT_DNSSL; |
1287 | ndopt_dnssl->nd_opt_dnssl_len = 0; | | 1287 | ndopt_dnssl->nd_opt_dnssl_len = 0; |
1288 | ndopt_dnssl->nd_opt_dnssl_reserved = 0; | | 1288 | ndopt_dnssl->nd_opt_dnssl_reserved = 0; |
1289 | ndopt_dnssl->nd_opt_dnssl_lifetime = htonl(dnsl->lifetime); | | 1289 | ndopt_dnssl->nd_opt_dnssl_lifetime = htonl(dnsl->lifetime); |
1290 | buf += sizeof(*ndopt_dnssl); | | 1290 | buf += sizeof(*ndopt_dnssl); |
1291 | | | 1291 | |
1292 | TAILQ_FOREACH(dnsd, &dnsl->list, next) { | | 1292 | TAILQ_FOREACH(dnsd, &dnsl->list, next) { |
1293 | CHECKLEN(dnsd->len); | | 1293 | CHECKLEN(dnsd->len); |
1294 | memcpy(buf, dnsd->domain, dnsd->len); | | 1294 | memcpy(buf, dnsd->domain, dnsd->len); |
1295 | buf += dnsd->len; | | 1295 | buf += dnsd->len; |
1296 | } | | 1296 | } |
1297 | /* Ensure our length is padded correctly */ | | 1297 | /* Ensure our length is padded correctly */ |
1298 | len = buf - (char *)ndopt_dnssl; | | 1298 | len = buf - (char *)ndopt_dnssl; |
1299 | plen = len % 8 ? 8 - len % 8 : 0; | | 1299 | plen = len % 8 ? 8 - len % 8 : 0; |
1300 | CHECKLEN(plen); | | 1300 | CHECKLEN(plen); |
1301 | memset(buf, 0, plen); | | 1301 | memset(buf, 0, plen); |
1302 | buf += plen; | | 1302 | buf += plen; |
1303 | ndopt_dnssl->nd_opt_dnssl_len = (len + plen) / 8; | | 1303 | ndopt_dnssl->nd_opt_dnssl_len = (len + plen) / 8; |
1304 | } | | 1304 | } |
1305 | memset(buf, 0, packlen - (buf - rainfo->ra_data)); | | 1305 | memset(buf, 0, packlen - (buf - rainfo->ra_data)); |
1306 | } | | 1306 | } |
1307 | | | 1307 | |
1308 | static int | | 1308 | static int |
1309 | getinet6sysctl(int code) | | 1309 | getinet6sysctl(int code) |
1310 | { | | 1310 | { |
1311 | int mib[] = { CTL_NET, PF_INET6, IPPROTO_IPV6, 0 }; | | 1311 | static const int mib[] = { CTL_NET, PF_INET6, IPPROTO_IPV6, 0 }; |
1312 | int value; | | 1312 | int value; |
1313 | size_t size; | | 1313 | size_t size; |
1314 | | | 1314 | |
1315 | mib[3] = code; | | 1315 | mib[3] = code; |
1316 | size = sizeof(value); | | 1316 | size = sizeof(value); |
1317 | if (sysctl(mib, __arraycount(mib), &value, &size, NULL, 0) | | 1317 | if (sysctl(mib, __arraycount(mib), &value, &size, NULL, 0) |
1318 | < 0) { | | 1318 | < 0) { |
1319 | syslog(LOG_ERR, "<%s>: failed to get ip6 sysctl(%d): %m", | | 1319 | syslog(LOG_ERR, "<%s>: failed to get ip6 sysctl(%d): %m", |
1320 | __func__, code); | | 1320 | __func__, code); |
1321 | return -1; | | 1321 | return -1; |
1322 | } | | 1322 | } |
1323 | else | | 1323 | else |
1324 | return value; | | 1324 | return value; |
1325 | } | | 1325 | } |