Obtained from:	KAME
This commit is contained in:
Hajimu UMEMOTO 2002-06-01 17:28:12 +00:00
parent 511dab6218
commit 99a92b2c8a
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=97712

View File

@ -168,36 +168,36 @@ main(argc, argv)
#endif
while ((ch = getopt(argc, argv, OPTIONS)) != -1) {
#undef OPTIONS
switch(ch) {
case 'c':
conffile = optarg;
break;
case 'd':
dflag = 1;
break;
case 'D':
dflag = 2;
break;
case 'f':
fflag = 1;
break;
switch (ch) {
case 'c':
conffile = optarg;
break;
case 'd':
dflag = 1;
break;
case 'D':
dflag = 2;
break;
case 'f':
fflag = 1;
break;
case 'M':
mcastif = optarg;
break;
#ifdef MIP6
case 'm':
mobileip6 = 1;
break;
case 'm':
mobileip6 = 1;
break;
#endif
case 'R':
fprintf(stderr, "rtadvd: "
"the -R option is currently ignored.\n");
/* accept_rr = 1; */
/* run anyway... */
break;
case 's':
sflag = 1;
break;
case 'R':
fprintf(stderr, "rtadvd: "
"the -R option is currently ignored.\n");
/* accept_rr = 1; */
/* run anyway... */
break;
case 's':
sflag = 1;
break;
}
}
argc -= optind;
@ -242,11 +242,11 @@ main(argc, argv)
/* record the current PID */
pid = getpid();
if ((pidfp = fopen(pidfilename, "w")) == NULL)
if ((pidfp = fopen(pidfilename, "w")) == NULL) {
syslog(LOG_ERR,
"<%s> failed to open a log file(%s), run anyway.",
__FUNCTION__, pidfilename);
else {
"<%s> failed to open a log file(%s), run anyway.",
__FUNCTION__, pidfilename);
} else {
fprintf(pidfp, "%d\n", pid);
fclose(pidfp);
}
@ -283,15 +283,14 @@ main(argc, argv)
if (timeout != NULL) {
syslog(LOG_DEBUG,
"<%s> set timer to %ld:%ld. waiting for "
"inputs or timeout",
__FUNCTION__,
(long int)timeout->tv_sec,
(long int)timeout->tv_usec);
"<%s> set timer to %ld:%ld. waiting for "
"inputs or timeout", __FUNCTION__,
(long int)timeout->tv_sec,
(long int)timeout->tv_usec);
} else {
syslog(LOG_DEBUG,
"<%s> there's no timer. waiting for inputs",
__FUNCTION__);
"<%s> there's no timer. waiting for inputs",
__FUNCTION__);
}
if ((i = select(maxfd + 1, &select_fd,
@ -299,7 +298,7 @@ main(argc, argv)
/* EINTR would occur upon SIGUSR1 for status dump */
if (errno != EINTR)
syslog(LOG_ERR, "<%s> select: %s",
__FUNCTION__, strerror(errno));
__FUNCTION__, strerror(errno));
continue;
}
if (i == 0) /* timeout */
@ -364,11 +363,8 @@ rtmsg_input()
n = read(rtsock, msg, sizeof(msg));
if (dflag > 1) {
syslog(LOG_DEBUG,
"<%s> received a routing message "
"(type = %d, len = %d)",
__FUNCTION__,
rtmsg_type(msg), n);
syslog(LOG_DEBUG, "<%s> received a routing message "
"(type = %d, len = %d)", __FUNCTION__, rtmsg_type(msg), n);
}
if (n > rtmsg_len(msg)) {
/*
@ -377,10 +373,10 @@ rtmsg_input()
*/
if (dflag > 1)
syslog(LOG_DEBUG,
"<%s> received data length is larger than"
"1st routing message len. multiple messages?"
" read %d bytes, but 1st msg len = %d",
__FUNCTION__, n, rtmsg_len(msg));
"<%s> received data length is larger than "
"1st routing message len. multiple messages? "
"read %d bytes, but 1st msg len = %d",
__FUNCTION__, n, rtmsg_len(msg));
#if 0
/* adjust length */
n = rtmsg_len(msg);
@ -435,99 +431,92 @@ rtmsg_input()
}
oldifflags = iflist[ifindex]->ifm_flags;
switch(type) {
case RTM_ADD:
/* init ifflags because it may have changed */
iflist[ifindex]->ifm_flags =
if_getflags(ifindex,
iflist[ifindex]->ifm_flags);
switch (type) {
case RTM_ADD:
/* init ifflags because it may have changed */
iflist[ifindex]->ifm_flags =
if_getflags(ifindex, iflist[ifindex]->ifm_flags);
if (sflag)
break; /* we aren't interested in prefixes */
if (sflag)
break; /* we aren't interested in prefixes */
addr = get_addr(msg);
plen = get_prefixlen(msg);
/* sanity check for plen */
if (plen < 4 /* as RFC2373, prefixlen is at least 4 */
|| plen > 127) {
addr = get_addr(msg);
plen = get_prefixlen(msg);
/* sanity check for plen */
/* as RFC2373, prefixlen is at least 4 */
if (plen < 4 || plen > 127) {
syslog(LOG_INFO, "<%s> new interface route's"
"plen %d is invalid for a prefix",
__FUNCTION__, plen);
"plen %d is invalid for a prefix",
__FUNCTION__, plen);
break;
}
prefix = find_prefix(rai, addr, plen);
if (prefix) {
if (dflag > 1) {
syslog(LOG_DEBUG,
"<%s> new prefix(%s/%d) "
"added on %s, "
"but it was already in list",
__FUNCTION__,
inet_ntop(AF_INET6,
addr, (char *)addrbuf,
INET6_ADDRSTRLEN),
plen,
rai->ifname);
}
break;
}
make_prefix(rai, ifindex, addr, plen);
break;
case RTM_DELETE:
/* init ifflags because it may have changed */
iflist[ifindex]->ifm_flags =
if_getflags(ifindex,
iflist[ifindex]->ifm_flags);
if (sflag)
break;
addr = get_addr(msg);
plen = get_prefixlen(msg);
/* sanity check for plen */
if (plen < 4 /* as RFC2373, prefixlen is at least 4 */
|| plen > 127) {
syslog(LOG_INFO, "<%s> deleted interface"
"route's"
"plen %d is invalid for a prefix",
__FUNCTION__, plen);
}
prefix = find_prefix(rai, addr, plen);
if (prefix) {
if (dflag > 1) {
syslog(LOG_DEBUG,
"<%s> new prefix(%s/%d) "
"added on %s, "
"but it was already in list",
__FUNCTION__,
inet_ntop(AF_INET6, addr,
(char *)addrbuf, INET6_ADDRSTRLEN),
plen, rai->ifname);
}
break;
}
prefix = find_prefix(rai, addr, plen);
if (prefix == NULL) {
if (dflag > 1) {
syslog(LOG_DEBUG,
"<%s> prefix(%s/%d) was "
"deleted on %s, "
"but it was not in list",
__FUNCTION__,
inet_ntop(AF_INET6,
addr, (char *)addrbuf,
INET6_ADDRSTRLEN),
plen,
rai->ifname);
}
break;
}
delete_prefix(rai, prefix);
break;
}
make_prefix(rai, ifindex, addr, plen);
break;
case RTM_DELETE:
/* init ifflags because it may have changed */
iflist[ifindex]->ifm_flags =
if_getflags(ifindex, iflist[ifindex]->ifm_flags);
if (sflag)
break;
addr = get_addr(msg);
plen = get_prefixlen(msg);
/* sanity check for plen */
/* as RFC2373, prefixlen is at least 4 */
if (plen < 4 || plen > 127) {
syslog(LOG_INFO,
"<%s> deleted interface route's "
"plen %d is invalid for a prefix",
__FUNCTION__, plen);
break;
}
prefix = find_prefix(rai, addr, plen);
if (prefix == NULL) {
if (dflag > 1) {
syslog(LOG_DEBUG,
"<%s> prefix(%s/%d) was "
"deleted on %s, "
"but it was not in list",
__FUNCTION__,
inet_ntop(AF_INET6, addr,
(char *)addrbuf, INET6_ADDRSTRLEN),
plen, rai->ifname);
}
break;
}
delete_prefix(rai, prefix);
break;
case RTM_NEWADDR:
case RTM_DELADDR:
/* init ifflags because it may have changed */
iflist[ifindex]->ifm_flags =
if_getflags(ifindex,
iflist[ifindex]->ifm_flags);
break;
/* init ifflags because it may have changed */
iflist[ifindex]->ifm_flags =
if_getflags(ifindex, iflist[ifindex]->ifm_flags);
break;
case RTM_IFINFO:
iflist[ifindex]->ifm_flags = get_ifm_flags(next);
break;
iflist[ifindex]->ifm_flags = get_ifm_flags(next);
break;
default:
/* should not reach here */
if (dflag > 1) {
syslog(LOG_DEBUG,
"<%s:%d> unknown rtmsg %d on %s",
__FUNCTION__, __LINE__, type,
if_indextoname(ifindex, ifname));
"<%s:%d> unknown rtmsg %d on %s",
__FUNCTION__, __LINE__, type,
if_indextoname(ifindex, ifname));
}
return;
}
@ -536,21 +525,19 @@ rtmsg_input()
if ((oldifflags & IFF_UP) != 0 && /* UP to DOWN */
(iflist[ifindex]->ifm_flags & IFF_UP) == 0) {
syslog(LOG_INFO,
"<%s> interface %s becomes down. stop timer.",
__FUNCTION__, rai->ifname);
"<%s> interface %s becomes down. stop timer.",
__FUNCTION__, rai->ifname);
rtadvd_remove_timer(&rai->timer);
}
else if ((oldifflags & IFF_UP) == 0 && /* DOWN to UP */
} else if ((oldifflags & IFF_UP) == 0 && /* DOWN to UP */
(iflist[ifindex]->ifm_flags & IFF_UP) != 0) {
syslog(LOG_INFO,
"<%s> interface %s becomes up. restart timer.",
__FUNCTION__, rai->ifname);
"<%s> interface %s becomes up. restart timer.",
__FUNCTION__, rai->ifname);
rai->initcounter = 0; /* reset the counter */
rai->waiting = 0; /* XXX */
rai->timer = rtadvd_add_timer(ra_timeout,
ra_timer_update,
rai, rai);
ra_timer_update, rai, rai);
ra_timer_update((void *)rai, &rai->timer->tm);
rtadvd_set_timer(&rai->timer->tm, rai->timer);
}
@ -645,104 +632,102 @@ rtadvd_input()
icp = (struct icmp6_hdr *)rcvmhdr.msg_iov[0].iov_base;
#endif
switch(icp->icmp6_type) {
case ND_ROUTER_SOLICIT:
/*
* Message verification - RFC-2461 6.1.1
* XXX: these checks must be done in the kernel as well,
* but we can't completely rely on them.
*/
if (*hlimp != 255) {
syslog(LOG_NOTICE,
"<%s> RS with invalid hop limit(%d) "
"received from %s on %s",
__FUNCTION__, *hlimp,
inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf,
INET6_ADDRSTRLEN),
if_indextoname(pi->ipi6_ifindex, ifnamebuf));
return;
}
if (icp->icmp6_code) {
syslog(LOG_NOTICE,
"<%s> RS with invalid ICMP6 code(%d) "
"received from %s on %s",
__FUNCTION__, icp->icmp6_code,
inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf,
INET6_ADDRSTRLEN),
if_indextoname(pi->ipi6_ifindex, ifnamebuf));
return;
}
if (i < sizeof(struct nd_router_solicit)) {
syslog(LOG_NOTICE,
"<%s> RS from %s on %s does not have enough "
"length (len = %d)",
__FUNCTION__,
inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf,
INET6_ADDRSTRLEN),
if_indextoname(pi->ipi6_ifindex, ifnamebuf), i);
return;
}
rs_input(i, (struct nd_router_solicit *)icp, pi, &from);
break;
case ND_ROUTER_ADVERT:
/*
* Message verification - RFC-2461 6.1.2
* XXX: there's a same dilemma as above...
*/
if (*hlimp != 255) {
syslog(LOG_NOTICE,
"<%s> RA with invalid hop limit(%d) "
"received from %s on %s",
__FUNCTION__, *hlimp,
inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf,
INET6_ADDRSTRLEN),
if_indextoname(pi->ipi6_ifindex, ifnamebuf));
return;
}
if (icp->icmp6_code) {
syslog(LOG_NOTICE,
"<%s> RA with invalid ICMP6 code(%d) "
"received from %s on %s",
__FUNCTION__, icp->icmp6_code,
inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf,
INET6_ADDRSTRLEN),
if_indextoname(pi->ipi6_ifindex, ifnamebuf));
return;
}
if (i < sizeof(struct nd_router_advert)) {
syslog(LOG_NOTICE,
"<%s> RA from %s on %s does not have enough "
"length (len = %d)",
__FUNCTION__,
inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf,
INET6_ADDRSTRLEN),
if_indextoname(pi->ipi6_ifindex, ifnamebuf), i);
return;
}
ra_input(i, (struct nd_router_advert *)icp, pi, &from);
break;
case ICMP6_ROUTER_RENUMBERING:
if (accept_rr == 0) {
syslog(LOG_ERR,
"<%s> received a router renumbering "
"message, but not allowed to be accepted",
__FUNCTION__);
break;
}
rr_input(i, (struct icmp6_router_renum *)icp, pi, &from,
&dst);
break;
default:
/*
* Note that this case is POSSIBLE, especially just
* after invocation of the daemon. This is because we
* could receive message after opening the socket and
* before setting ICMP6 type filter(see sock_open()).
*/
syslog(LOG_ERR,
"<%s> invalid icmp type(%d)",
__FUNCTION__, icp->icmp6_type);
return;
switch (icp->icmp6_type) {
case ND_ROUTER_SOLICIT:
/*
* Message verification - RFC-2461 6.1.1
* XXX: these checks must be done in the kernel as well,
* but we can't completely rely on them.
*/
if (*hlimp != 255) {
syslog(LOG_NOTICE,
"<%s> RS with invalid hop limit(%d) "
"received from %s on %s",
__FUNCTION__, *hlimp,
inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf,
INET6_ADDRSTRLEN),
if_indextoname(pi->ipi6_ifindex, ifnamebuf));
return;
}
if (icp->icmp6_code) {
syslog(LOG_NOTICE,
"<%s> RS with invalid ICMP6 code(%d) "
"received from %s on %s",
__FUNCTION__, icp->icmp6_code,
inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf,
INET6_ADDRSTRLEN),
if_indextoname(pi->ipi6_ifindex, ifnamebuf));
return;
}
if (i < sizeof(struct nd_router_solicit)) {
syslog(LOG_NOTICE,
"<%s> RS from %s on %s does not have enough "
"length (len = %d)",
__FUNCTION__,
inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf,
INET6_ADDRSTRLEN),
if_indextoname(pi->ipi6_ifindex, ifnamebuf), i);
return;
}
rs_input(i, (struct nd_router_solicit *)icp, pi, &from);
break;
case ND_ROUTER_ADVERT:
/*
* Message verification - RFC-2461 6.1.2
* XXX: there's a same dilemma as above...
*/
if (*hlimp != 255) {
syslog(LOG_NOTICE,
"<%s> RA with invalid hop limit(%d) "
"received from %s on %s",
__FUNCTION__, *hlimp,
inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf,
INET6_ADDRSTRLEN),
if_indextoname(pi->ipi6_ifindex, ifnamebuf));
return;
}
if (icp->icmp6_code) {
syslog(LOG_NOTICE,
"<%s> RA with invalid ICMP6 code(%d) "
"received from %s on %s",
__FUNCTION__, icp->icmp6_code,
inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf,
INET6_ADDRSTRLEN),
if_indextoname(pi->ipi6_ifindex, ifnamebuf));
return;
}
if (i < sizeof(struct nd_router_advert)) {
syslog(LOG_NOTICE,
"<%s> RA from %s on %s does not have enough "
"length (len = %d)",
__FUNCTION__,
inet_ntop(AF_INET6, &from.sin6_addr, ntopbuf,
INET6_ADDRSTRLEN),
if_indextoname(pi->ipi6_ifindex, ifnamebuf), i);
return;
}
ra_input(i, (struct nd_router_advert *)icp, pi, &from);
break;
case ICMP6_ROUTER_RENUMBERING:
if (accept_rr == 0) {
syslog(LOG_ERR, "<%s> received a router renumbering "
"message, but not allowed to be accepted",
__FUNCTION__);
break;
}
rr_input(i, (struct icmp6_router_renum *)icp, pi, &from,
&dst);
break;
default:
/*
* Note that this case is POSSIBLE, especially just
* after invocation of the daemon. This is because we
* could receive message after opening the socket and
* before setting ICMP6 type filter(see sock_open()).
*/
syslog(LOG_ERR, "<%s> invalid icmp type(%d)",
__FUNCTION__, icp->icmp6_type);
return;
}
return;
@ -1112,8 +1097,7 @@ prefix_check(struct nd_opt_prefix_info *pinfo,
pp->pltimeexpire);
inconsistent++;
}
}
else if (preferred_time != pp->preflifetime) {
} else if (preferred_time != pp->preflifetime) {
syslog(LOG_INFO,
"<%s> prefeerred lifetime for %s/%d"
" inconsistent on %s:"
@ -1149,8 +1133,7 @@ prefix_check(struct nd_opt_prefix_info *pinfo,
pp->vltimeexpire);
inconsistent++;
}
}
else if (valid_time != pp->validlifetime) {
} else if (valid_time != pp->validlifetime) {
syslog(LOG_INFO,
"<%s> valid lifetime for %s/%d"
" inconsistent on %s:"
@ -1221,64 +1204,59 @@ nd6_options(struct nd_opt_hdr *hdr, int limit,
optlen = hdr->nd_opt_len << 3;
if (hdr->nd_opt_len == 0) {
syslog(LOG_ERR,
"<%s> bad ND option length(0) (type = %d)",
__FUNCTION__, hdr->nd_opt_type);
"<%s> bad ND option length(0) (type = %d)",
__FUNCTION__, hdr->nd_opt_type);
goto bad;
}
if (hdr->nd_opt_type > ND_OPT_MTU) {
syslog(LOG_INFO,
"<%s> unknown ND option(type %d)",
__FUNCTION__,
hdr->nd_opt_type);
"<%s> unknown ND option(type %d)",
__FUNCTION__, hdr->nd_opt_type);
continue;
}
if ((ndopt_flags[hdr->nd_opt_type] & optflags) == 0) {
syslog(LOG_INFO,
"<%s> unexpected ND option(type %d)",
__FUNCTION__,
hdr->nd_opt_type);
"<%s> unexpected ND option(type %d)",
__FUNCTION__, hdr->nd_opt_type);
continue;
}
switch(hdr->nd_opt_type) {
case ND_OPT_SOURCE_LINKADDR:
case ND_OPT_TARGET_LINKADDR:
case ND_OPT_REDIRECTED_HEADER:
case ND_OPT_MTU:
if (ndopts->nd_opt_array[hdr->nd_opt_type]) {
syslog(LOG_INFO,
"<%s> duplicated ND option"
" (type = %d)",
__FUNCTION__,
hdr->nd_opt_type);
}
ndopts->nd_opt_array[hdr->nd_opt_type] = hdr;
break;
case ND_OPT_PREFIX_INFORMATION:
{
struct nd_optlist *pfxlist;
switch (hdr->nd_opt_type) {
case ND_OPT_SOURCE_LINKADDR:
case ND_OPT_TARGET_LINKADDR:
case ND_OPT_REDIRECTED_HEADER:
case ND_OPT_MTU:
if (ndopts->nd_opt_array[hdr->nd_opt_type]) {
syslog(LOG_INFO,
"<%s> duplicated ND option (type = %d)",
__FUNCTION__, hdr->nd_opt_type);
}
ndopts->nd_opt_array[hdr->nd_opt_type] = hdr;
break;
case ND_OPT_PREFIX_INFORMATION:
{
struct nd_optlist *pfxlist;
if (ndopts->nd_opts_pi == 0) {
ndopts->nd_opts_pi =
(struct nd_opt_prefix_info *)hdr;
continue;
}
if ((pfxlist = malloc(sizeof(*pfxlist))) == NULL) {
syslog(LOG_ERR,
"<%s> can't allocate memory",
__FUNCTION__);
goto bad;
}
pfxlist->next = ndopts->nd_opts_list;
pfxlist->opt = hdr;
ndopts->nd_opts_list = pfxlist;
if (ndopts->nd_opts_pi == 0) {
ndopts->nd_opts_pi =
(struct nd_opt_prefix_info *)hdr;
continue;
}
if ((pfxlist = malloc(sizeof(*pfxlist))) == NULL) {
syslog(LOG_ERR, "<%s> can't allocate memory",
__FUNCTION__);
goto bad;
}
pfxlist->next = ndopts->nd_opts_list;
pfxlist->opt = hdr;
ndopts->nd_opts_list = pfxlist;
break;
}
default: /* impossible */
break;
break;
}
default: /* impossible */
break;
}
}
@ -1295,7 +1273,7 @@ free_ndopts(union nd_opts *ndopts)
{
struct nd_optlist *opt = ndopts->nd_opts_list, *next;
while(opt) {
while (opt) {
next = opt->next;
free(opt);
opt = next;
@ -1392,7 +1370,7 @@ sock_open()
__FUNCTION__);
exit(1);
}
while(ra) {
while (ra) {
mreq.ipv6mr_interface = ra->ifindex;
if (setsockopt(sock, IPPROTO_IPV6, IPV6_JOIN_GROUP, &mreq,
sizeof(mreq)) < 0) {