1 /* $KAME: rtsold.c,v 1.67 2003/05/17 18:16:15 itojun Exp $ */ 2 3 /*- 4 * SPDX-License-Identifier: BSD-3-Clause 5 * 6 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 7 * All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 3. Neither the name of the project nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34 #include <sys/param.h> 35 #include <sys/capsicum.h> 36 #include <sys/event.h> 37 #include <sys/ioctl.h> 38 #include <sys/socket.h> 39 40 #include <net/if.h> 41 #include <net/if_dl.h> 42 43 #include <netinet/in.h> 44 #include <netinet/icmp6.h> 45 #include <netinet/in_var.h> 46 #include <arpa/inet.h> 47 48 #include <netinet6/nd6.h> 49 50 #include <capsicum_helpers.h> 51 #include <err.h> 52 #include <errno.h> 53 #include <ifaddrs.h> 54 #include <libgen.h> 55 #include <signal.h> 56 #include <stdarg.h> 57 #include <stdio.h> 58 #include <stdlib.h> 59 #include <string.h> 60 #include <syslog.h> 61 #include <time.h> 62 #include <unistd.h> 63 64 #include <libcasper.h> 65 #include <casper/cap_syslog.h> 66 #include <libutil.h> 67 68 #include "rtsold.h" 69 70 #define RTSOL_DUMPFILE "/var/run/rtsold.dump" 71 72 struct timespec tm_max; 73 static int log_upto = 999; 74 static int fflag = 0; 75 76 int Fflag = 0; /* force setting sysctl parameters */ 77 int aflag = 0; 78 int dflag = 0; 79 int uflag = 0; 80 81 const char *managedconf_script; 82 const char *otherconf_script; 83 const char *alwaysconf_script; 84 const char *resolvconf_script = "/sbin/resolvconf"; 85 86 cap_channel_t *capllflags, *capscript, *capsendmsg, *capsyslog; 87 88 /* protocol constants */ 89 #define MAX_RTR_SOLICITATION_DELAY 1 /* second */ 90 #define RTR_SOLICITATION_INTERVAL 4 /* seconds */ 91 #define MAX_RTR_SOLICITATIONS 3 /* times */ 92 93 /* 94 * implementation dependent constants in seconds 95 * XXX: should be configurable 96 */ 97 #define PROBE_INTERVAL 60 98 99 /* static variables and functions */ 100 static int mobile_node = 0; 101 static int no_solicitation_delay = 0; 102 103 static sig_atomic_t do_dump, do_exit; 104 static struct pidfh *pfh; 105 106 static char **autoifprobe(void); 107 static int ifconfig(char *ifname); 108 static int init_capabilities(void); 109 static int make_packet(struct ifinfo *); 110 static struct timespec *rtsol_check_timer(void); 111 112 static void set_dumpfile(int); 113 static void set_exit(int); 114 static void usage(const char *progname); 115 116 int 117 main(int argc, char **argv) 118 { 119 struct kevent events[2]; 120 FILE *dumpfp; 121 struct ifinfo *ifi; 122 struct timespec *timeout; 123 const char *opts, *pidfilepath, *progname; 124 int ch, error, kq, once, rcvsock, rtsock; 125 126 progname = basename(argv[0]); 127 if (strcmp(progname, "rtsold") == 0) { 128 opts = "adDfFim1M:O:A:p:R:u"; 129 once = 0; 130 pidfilepath = NULL; 131 } else { 132 opts = "adDFiM:O:A:R:u"; 133 fflag = 1; 134 once = 1; 135 } 136 137 while ((ch = getopt(argc, argv, opts)) != -1) { 138 switch (ch) { 139 case 'a': 140 aflag = 1; 141 break; 142 case 'd': 143 dflag += 1; 144 break; 145 case 'D': 146 dflag += 2; 147 break; 148 case 'f': 149 fflag = 1; 150 break; 151 case 'F': 152 Fflag = 1; 153 break; 154 case 'i': 155 no_solicitation_delay = 1; 156 break; 157 case 'm': 158 mobile_node = 1; 159 break; 160 case '1': 161 once = 1; 162 break; 163 case 'M': 164 managedconf_script = optarg; 165 break; 166 case 'O': 167 otherconf_script = optarg; 168 break; 169 case 'A': 170 alwaysconf_script = optarg; 171 break; 172 case 'p': 173 pidfilepath = optarg; 174 break; 175 case 'R': 176 resolvconf_script = optarg; 177 break; 178 case 'u': 179 uflag = 1; 180 break; 181 default: 182 usage(progname); 183 } 184 } 185 argc -= optind; 186 argv += optind; 187 188 if ((!aflag && argc == 0) || (aflag && argc != 0)) 189 usage(progname); 190 191 /* Generate maximum time in timespec. */ 192 tm_max.tv_sec = (-1) & ~((time_t)1 << ((sizeof(tm_max.tv_sec) * 8) - 1)); 193 tm_max.tv_nsec = (-1) & ~((long)1 << ((sizeof(tm_max.tv_nsec) * 8) - 1)); 194 195 /* set log level */ 196 if (dflag > 1) 197 log_upto = LOG_DEBUG; 198 else if (dflag > 0) 199 log_upto = LOG_INFO; 200 else 201 log_upto = LOG_NOTICE; 202 203 if (managedconf_script != NULL && *managedconf_script != '/') 204 errx(1, "configuration script (%s) must be an absolute path", 205 managedconf_script); 206 if (otherconf_script != NULL && *otherconf_script != '/') 207 errx(1, "configuration script (%s) must be an absolute path", 208 otherconf_script); 209 if (alwaysconf_script != NULL && *alwaysconf_script != '/') 210 errx(1, "configuration script (%s) must be an absolute path", 211 alwaysconf_script); 212 if (*resolvconf_script != '/') 213 errx(1, "configuration script (%s) must be an absolute path", 214 resolvconf_script); 215 216 if (!fflag) { 217 pfh = pidfile_open(pidfilepath, 0644, NULL); 218 if (pfh == NULL) 219 errx(1, "failed to open pidfile: %s", strerror(errno)); 220 if (daemon(0, 0) != 0) 221 errx(1, "failed to daemonize"); 222 } 223 224 if ((error = init_capabilities()) != 0) 225 err(1, "failed to initialize capabilities"); 226 227 if (!fflag) { 228 cap_openlog(capsyslog, progname, LOG_NDELAY | LOG_PID, 229 LOG_DAEMON); 230 if (log_upto >= 0) 231 (void)cap_setlogmask(capsyslog, LOG_UPTO(log_upto)); 232 (void)signal(SIGTERM, set_exit); 233 (void)signal(SIGINT, set_exit); 234 (void)signal(SIGUSR1, set_dumpfile); 235 dumpfp = rtsold_init_dumpfile(RTSOL_DUMPFILE); 236 } else 237 dumpfp = NULL; 238 239 kq = kqueue(); 240 if (kq < 0) { 241 warnmsg(LOG_ERR, __func__, "failed to create a kqueue: %s", 242 strerror(errno)); 243 exit(1); 244 } 245 246 /* Open global sockets and register for read events. */ 247 if ((rtsock = rtsock_open()) < 0) { 248 warnmsg(LOG_ERR, __func__, "failed to open routing socket"); 249 exit(1); 250 } 251 if ((rcvsock = recvsockopen()) < 0) { 252 warnmsg(LOG_ERR, __func__, "failed to open receive socket"); 253 exit(1); 254 } 255 EV_SET(&events[0], rtsock, EVFILT_READ, EV_ADD, 0, 0, NULL); 256 EV_SET(&events[1], rcvsock, EVFILT_READ, EV_ADD, 0, 0, NULL); 257 if (kevent(kq, events, 2, NULL, 0, NULL) < 0) { 258 warnmsg(LOG_ERR, __func__, "kevent(): %s", strerror(errno)); 259 exit(1); 260 } 261 262 /* Probe network interfaces and set up tracking info. */ 263 if (ifinit() != 0) { 264 warnmsg(LOG_ERR, __func__, "failed to initialize interfaces"); 265 exit(1); 266 } 267 if (aflag) 268 argv = autoifprobe(); 269 while (argv && *argv) { 270 if (ifconfig(*argv)) { 271 warnmsg(LOG_ERR, __func__, 272 "failed to initialize %s", *argv); 273 exit(1); 274 } 275 argv++; 276 } 277 278 /* Write to our pidfile. */ 279 if (pfh != NULL && pidfile_write(pfh) != 0) { 280 warnmsg(LOG_ERR, __func__, 281 "failed to open pidfile: %s", strerror(errno)); 282 exit(1); 283 } 284 285 /* Enter capability mode. */ 286 caph_cache_catpages(); 287 if (caph_enter_casper() != 0) { 288 warnmsg(LOG_ERR, __func__, "caph_enter(): %s", strerror(errno)); 289 exit(1); 290 } 291 292 for (;;) { 293 if (do_exit) { 294 /* Handle SIGTERM, SIGINT. */ 295 if (pfh != NULL) 296 pidfile_remove(pfh); 297 break; 298 } 299 if (do_dump) { 300 /* Handle SIGUSR1. */ 301 do_dump = 0; 302 if (dumpfp != NULL) 303 rtsold_dump(dumpfp); 304 } 305 306 timeout = rtsol_check_timer(); 307 308 if (once) { 309 /* if we have no timeout, we are done (or failed) */ 310 if (timeout == NULL) 311 break; 312 313 /* if all interfaces have got RA packet, we are done */ 314 TAILQ_FOREACH(ifi, &ifinfo_head, ifi_next) { 315 if (ifi->state != IFS_DOWN && ifi->racnt == 0) 316 break; 317 } 318 if (ifi == NULL) 319 break; 320 } 321 322 error = kevent(kq, NULL, 0, &events[0], 1, timeout); 323 if (error < 1) { 324 if (error < 0 && errno != EINTR) 325 warnmsg(LOG_ERR, __func__, "kevent(): %s", 326 strerror(errno)); 327 continue; 328 } 329 330 if (events[0].ident == (uintptr_t)rtsock) 331 rtsock_input(rtsock); 332 else 333 rtsol_input(rcvsock); 334 } 335 336 return (0); 337 } 338 339 static int 340 init_capabilities(void) 341 { 342 #ifdef WITH_CASPER 343 const char *const scripts[] = 344 { resolvconf_script, managedconf_script, otherconf_script, 345 alwaysconf_script }; 346 cap_channel_t *capcasper; 347 nvlist_t *limits; 348 349 capcasper = cap_init(); 350 if (capcasper == NULL) 351 return (-1); 352 353 capllflags = cap_service_open(capcasper, "rtsold.llflags"); 354 if (capllflags == NULL) 355 return (-1); 356 357 capscript = cap_service_open(capcasper, "rtsold.script"); 358 if (capscript == NULL) 359 return (-1); 360 limits = nvlist_create(0); 361 for (size_t i = 0; i < nitems(scripts); i++) 362 if (scripts[i] != NULL) 363 nvlist_append_string_array(limits, "scripts", 364 scripts[i]); 365 if (cap_limit_set(capscript, limits) != 0) 366 return (-1); 367 368 capsendmsg = cap_service_open(capcasper, "rtsold.sendmsg"); 369 if (capsendmsg == NULL) 370 return (-1); 371 372 if (!fflag) { 373 capsyslog = cap_service_open(capcasper, "system.syslog"); 374 if (capsyslog == NULL) 375 return (-1); 376 } 377 378 cap_close(capcasper); 379 #endif /* WITH_CASPER */ 380 return (0); 381 } 382 383 static int 384 ifconfig(char *ifname) 385 { 386 struct ifinfo *ifi; 387 struct sockaddr_dl *sdl; 388 int flags; 389 390 ifi = NULL; 391 if ((sdl = if_nametosdl(ifname)) == NULL) { 392 warnmsg(LOG_ERR, __func__, 393 "failed to get link layer information for %s", ifname); 394 goto bad; 395 } 396 if (find_ifinfo(sdl->sdl_index)) { 397 warnmsg(LOG_ERR, __func__, 398 "interface %s was already configured", ifname); 399 goto bad; 400 } 401 402 if (Fflag) { 403 struct in6_ndireq nd; 404 int s; 405 406 if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) { 407 warnmsg(LOG_ERR, __func__, "socket() failed."); 408 goto bad; 409 } 410 memset(&nd, 0, sizeof(nd)); 411 strlcpy(nd.ifname, ifname, sizeof(nd.ifname)); 412 if (ioctl(s, SIOCGIFINFO_IN6, (caddr_t)&nd) < 0) { 413 warnmsg(LOG_ERR, __func__, 414 "cannot get accept_rtadv flag"); 415 (void)close(s); 416 goto bad; 417 } 418 nd.ndi.flags |= ND6_IFF_ACCEPT_RTADV; 419 if (ioctl(s, SIOCSIFINFO_IN6, (caddr_t)&nd) < 0) { 420 warnmsg(LOG_ERR, __func__, 421 "cannot set accept_rtadv flag"); 422 (void)close(s); 423 goto bad; 424 } 425 (void)close(s); 426 } 427 428 if ((ifi = malloc(sizeof(*ifi))) == NULL) { 429 warnmsg(LOG_ERR, __func__, "memory allocation failed"); 430 goto bad; 431 } 432 memset(ifi, 0, sizeof(*ifi)); 433 ifi->sdl = sdl; 434 ifi->ifi_rdnss = IFI_DNSOPT_STATE_NOINFO; 435 ifi->ifi_dnssl = IFI_DNSOPT_STATE_NOINFO; 436 TAILQ_INIT(&ifi->ifi_rainfo); 437 strlcpy(ifi->ifname, ifname, sizeof(ifi->ifname)); 438 439 /* construct a router solicitation message */ 440 if (make_packet(ifi)) 441 goto bad; 442 443 /* set link ID of this interface. */ 444 #ifdef HAVE_SCOPELIB 445 if (inet_zoneid(AF_INET6, 2, ifname, &ifi->linkid)) 446 goto bad; 447 #else 448 /* XXX: assume interface IDs as link IDs */ 449 ifi->linkid = ifi->sdl->sdl_index; 450 #endif 451 452 /* 453 * check if the interface is available. 454 * also check if SIOCGIFMEDIA ioctl is OK on the interface. 455 */ 456 ifi->mediareqok = 1; 457 ifi->active = interface_status(ifi); 458 if (!ifi->mediareqok) { 459 /* 460 * probe routers periodically even if the link status 461 * does not change. 462 */ 463 ifi->probeinterval = PROBE_INTERVAL; 464 } 465 466 /* activate interface: interface_up returns 0 on success */ 467 flags = interface_up(ifi->ifname); 468 if (flags == 0) 469 ifi->state = IFS_DELAY; 470 else if (flags == IFS_TENTATIVE) 471 ifi->state = IFS_TENTATIVE; 472 else 473 ifi->state = IFS_DOWN; 474 475 rtsol_timer_update(ifi); 476 477 TAILQ_INSERT_TAIL(&ifinfo_head, ifi, ifi_next); 478 return (0); 479 480 bad: 481 free(sdl); 482 free(ifi); 483 return (-1); 484 } 485 486 struct rainfo * 487 find_rainfo(struct ifinfo *ifi, struct sockaddr_in6 *sin6) 488 { 489 struct rainfo *rai; 490 491 TAILQ_FOREACH(rai, &ifi->ifi_rainfo, rai_next) 492 if (memcmp(&rai->rai_saddr.sin6_addr, &sin6->sin6_addr, 493 sizeof(rai->rai_saddr.sin6_addr)) == 0) 494 return (rai); 495 496 return (NULL); 497 } 498 499 struct ifinfo * 500 find_ifinfo(int ifindex) 501 { 502 struct ifinfo *ifi; 503 504 TAILQ_FOREACH(ifi, &ifinfo_head, ifi_next) { 505 if (ifi->sdl->sdl_index == ifindex) 506 return (ifi); 507 } 508 return (NULL); 509 } 510 511 static int 512 make_packet(struct ifinfo *ifi) 513 { 514 size_t packlen = sizeof(struct nd_router_solicit), lladdroptlen = 0; 515 struct nd_router_solicit *rs; 516 char *buf; 517 518 if ((lladdroptlen = lladdropt_length(ifi->sdl)) == 0) { 519 warnmsg(LOG_INFO, __func__, 520 "link-layer address option has null length" 521 " on %s. Treat as not included.", ifi->ifname); 522 } 523 packlen += lladdroptlen; 524 ifi->rs_datalen = packlen; 525 526 /* allocate buffer */ 527 if ((buf = malloc(packlen)) == NULL) { 528 warnmsg(LOG_ERR, __func__, 529 "memory allocation failed for %s", ifi->ifname); 530 return (-1); 531 } 532 ifi->rs_data = buf; 533 534 /* fill in the message */ 535 rs = (struct nd_router_solicit *)buf; 536 rs->nd_rs_type = ND_ROUTER_SOLICIT; 537 rs->nd_rs_code = 0; 538 rs->nd_rs_cksum = 0; 539 rs->nd_rs_reserved = 0; 540 buf += sizeof(*rs); 541 542 /* fill in source link-layer address option */ 543 if (lladdroptlen) 544 lladdropt_fill(ifi->sdl, (struct nd_opt_hdr *)buf); 545 546 return (0); 547 } 548 549 static struct timespec * 550 rtsol_check_timer(void) 551 { 552 static struct timespec returnval; 553 struct timespec now, rtsol_timer; 554 struct ifinfo *ifi; 555 struct rainfo *rai; 556 struct ra_opt *rao, *raotmp; 557 int error, flags; 558 559 clock_gettime(CLOCK_MONOTONIC_FAST, &now); 560 561 rtsol_timer = tm_max; 562 563 TAILQ_FOREACH(ifi, &ifinfo_head, ifi_next) { 564 if (TS_CMP(&ifi->expire, &now, <=)) { 565 warnmsg(LOG_DEBUG, __func__, "timer expiration on %s, " 566 "state = %d", ifi->ifname, ifi->state); 567 568 while((rai = TAILQ_FIRST(&ifi->ifi_rainfo)) != NULL) { 569 /* Remove all RA options. */ 570 TAILQ_REMOVE(&ifi->ifi_rainfo, rai, rai_next); 571 while ((rao = TAILQ_FIRST(&rai->rai_ra_opt)) != 572 NULL) { 573 TAILQ_REMOVE(&rai->rai_ra_opt, rao, 574 rao_next); 575 if (rao->rao_msg != NULL) 576 free(rao->rao_msg); 577 free(rao); 578 } 579 free(rai); 580 } 581 switch (ifi->state) { 582 case IFS_DOWN: 583 case IFS_TENTATIVE: 584 /* interface_up returns 0 on success */ 585 flags = interface_up(ifi->ifname); 586 if (flags == 0) 587 ifi->state = IFS_DELAY; 588 else if (flags == IFS_TENTATIVE) 589 ifi->state = IFS_TENTATIVE; 590 else 591 ifi->state = IFS_DOWN; 592 break; 593 case IFS_IDLE: 594 { 595 int oldstatus = ifi->active; 596 int probe = 0; 597 598 ifi->active = interface_status(ifi); 599 600 if (oldstatus != ifi->active) { 601 warnmsg(LOG_DEBUG, __func__, 602 "%s status is changed" 603 " from %d to %d", 604 ifi->ifname, 605 oldstatus, ifi->active); 606 probe = 1; 607 ifi->state = IFS_DELAY; 608 } else if (ifi->probeinterval && 609 (ifi->probetimer -= 610 ifi->timer.tv_sec) <= 0) { 611 /* probe timer expired */ 612 ifi->probetimer = 613 ifi->probeinterval; 614 probe = 1; 615 ifi->state = IFS_PROBE; 616 } 617 618 /* 619 * If we need a probe, clear the previous 620 * status wrt the "managed/other" configuration. 621 */ 622 if (probe) { 623 ifi->managedconfig = 0; 624 ifi->otherconfig = 0; 625 ifi->alwaysconfig = 0; 626 } 627 if (probe && mobile_node) { 628 error = cap_probe_defrouters(capsendmsg, 629 ifi); 630 if (error != 0) 631 warnmsg(LOG_DEBUG, __func__, 632 "failed to probe routers: %d", 633 error); 634 } 635 break; 636 } 637 case IFS_DELAY: 638 ifi->state = IFS_PROBE; 639 (void)cap_rssend(capsendmsg, ifi); 640 break; 641 case IFS_PROBE: 642 if (ifi->probes < MAX_RTR_SOLICITATIONS) 643 (void)cap_rssend(capsendmsg, ifi); 644 else { 645 warnmsg(LOG_INFO, __func__, 646 "No answer after sending %d RSs", 647 ifi->probes); 648 ifi->probes = 0; 649 ifi->state = IFS_IDLE; 650 } 651 break; 652 } 653 rtsol_timer_update(ifi); 654 } else { 655 /* Expiration check for RA options. */ 656 int expire = 0; 657 658 TAILQ_FOREACH(rai, &ifi->ifi_rainfo, rai_next) { 659 TAILQ_FOREACH_SAFE(rao, &rai->rai_ra_opt, 660 rao_next, raotmp) { 661 warnmsg(LOG_DEBUG, __func__, 662 "RA expiration timer: " 663 "type=%d, msg=%s, expire=%s", 664 rao->rao_type, (char *)rao->rao_msg, 665 sec2str(&rao->rao_expire)); 666 if (TS_CMP(&now, &rao->rao_expire, 667 >=)) { 668 warnmsg(LOG_DEBUG, __func__, 669 "RA expiration timer: " 670 "expired."); 671 TAILQ_REMOVE(&rai->rai_ra_opt, 672 rao, rao_next); 673 if (rao->rao_msg != NULL) 674 free(rao->rao_msg); 675 free(rao); 676 expire = 1; 677 } 678 } 679 } 680 if (expire) 681 ra_opt_handler(ifi); 682 } 683 if (TS_CMP(&ifi->expire, &rtsol_timer, <)) 684 rtsol_timer = ifi->expire; 685 } 686 687 if (TS_CMP(&rtsol_timer, &tm_max, ==)) { 688 warnmsg(LOG_DEBUG, __func__, "there is no timer"); 689 return (NULL); 690 } else if (TS_CMP(&rtsol_timer, &now, <)) 691 /* this may occur when the interval is too small */ 692 returnval.tv_sec = returnval.tv_nsec = 0; 693 else 694 TS_SUB(&rtsol_timer, &now, &returnval); 695 696 now.tv_sec += returnval.tv_sec; 697 now.tv_nsec += returnval.tv_nsec; 698 warnmsg(LOG_DEBUG, __func__, "New timer is %s", 699 sec2str(&now)); 700 701 return (&returnval); 702 } 703 704 void 705 rtsol_timer_update(struct ifinfo *ifi) 706 { 707 #define MILLION 1000000 708 #define DADRETRY 10 /* XXX: adhoc */ 709 long interval; 710 struct timespec now; 711 712 bzero(&ifi->timer, sizeof(ifi->timer)); 713 714 switch (ifi->state) { 715 case IFS_DOWN: 716 case IFS_TENTATIVE: 717 if (++ifi->dadcount > DADRETRY) { 718 ifi->dadcount = 0; 719 ifi->timer.tv_sec = PROBE_INTERVAL; 720 } else 721 ifi->timer.tv_sec = 1; 722 break; 723 case IFS_IDLE: 724 if (mobile_node) 725 /* XXX should be configurable */ 726 ifi->timer.tv_sec = 3; 727 else 728 ifi->timer = tm_max; /* stop timer(valid?) */ 729 break; 730 case IFS_DELAY: 731 if (no_solicitation_delay) 732 interval = 0; 733 else 734 interval = arc4random_uniform(MAX_RTR_SOLICITATION_DELAY * MILLION); 735 ifi->timer.tv_sec = interval / MILLION; 736 ifi->timer.tv_nsec = (interval % MILLION) * 1000; 737 break; 738 case IFS_PROBE: 739 if (ifi->probes < MAX_RTR_SOLICITATIONS) 740 ifi->timer.tv_sec = RTR_SOLICITATION_INTERVAL; 741 else 742 /* 743 * After sending MAX_RTR_SOLICITATIONS solicitations, 744 * we're just waiting for possible replies; there 745 * will be no more solicitation. Thus, we change 746 * the timer value to MAX_RTR_SOLICITATION_DELAY based 747 * on RFC 2461, Section 6.3.7. 748 */ 749 ifi->timer.tv_sec = MAX_RTR_SOLICITATION_DELAY; 750 break; 751 default: 752 warnmsg(LOG_ERR, __func__, 753 "illegal interface state(%d) on %s", 754 ifi->state, ifi->ifname); 755 return; 756 } 757 758 /* reset the timer */ 759 if (TS_CMP(&ifi->timer, &tm_max, ==)) { 760 ifi->expire = tm_max; 761 warnmsg(LOG_DEBUG, __func__, 762 "stop timer for %s", ifi->ifname); 763 } else { 764 clock_gettime(CLOCK_MONOTONIC_FAST, &now); 765 TS_ADD(&now, &ifi->timer, &ifi->expire); 766 767 now.tv_sec += ifi->timer.tv_sec; 768 now.tv_nsec += ifi->timer.tv_nsec; 769 warnmsg(LOG_DEBUG, __func__, "set timer for %s to %s", 770 ifi->ifname, sec2str(&now)); 771 } 772 773 #undef MILLION 774 } 775 776 static void 777 set_dumpfile(int sig __unused) 778 { 779 780 do_dump = 1; 781 } 782 783 static void 784 set_exit(int sig __unused) 785 { 786 787 do_exit = 1; 788 } 789 790 static void 791 usage(const char *progname) 792 { 793 794 if (strcmp(progname, "rtsold") == 0) { 795 fprintf(stderr, "usage: rtsold [-dDfFm1] [-O script-name] " 796 "[-M script-name ] [-A script-name ] " 797 "[-p pidfile] [-R script-name] interface ...\n"); 798 fprintf(stderr, "usage: rtsold [-dDfFm1] [-O script-name] " 799 "[-M script-name ] [-A script-name ] " 800 "[-p pidfile] [-R script-name] -a\n"); 801 } else { 802 fprintf(stderr, "usage: rtsol [-dDF] [-O script-name] " 803 "[-M script-name ] [-A script-name ] " 804 "[-p pidfile] [-R script-name] interface ...\n"); 805 fprintf(stderr, "usage: rtsol [-dDF] [-O script-name] " 806 "[-M script-name ] [-A script-name ] " 807 "[-p pidfile] [-R script-name] -a\n"); 808 } 809 exit(1); 810 } 811 812 void 813 warnmsg(int priority, const char *func, const char *msg, ...) 814 { 815 va_list ap; 816 char buf[BUFSIZ]; 817 818 va_start(ap, msg); 819 if (fflag) { 820 if (priority <= log_upto) 821 vwarnx(msg, ap); 822 } else { 823 snprintf(buf, sizeof(buf), "<%s> %s", func, msg); 824 msg = buf; 825 cap_vsyslog(capsyslog, priority, msg, ap); 826 } 827 va_end(ap); 828 } 829 830 /* 831 * return a list of interfaces which is suitable to sending an RS. 832 */ 833 static char ** 834 autoifprobe(void) 835 { 836 static char **argv = NULL; 837 static int n = 0; 838 char **a; 839 int s = 0, i, found; 840 struct ifaddrs *ifap, *ifa; 841 struct in6_ndireq nd; 842 843 /* initialize */ 844 while (n--) 845 free(argv[n]); 846 if (argv) { 847 free(argv); 848 argv = NULL; 849 } 850 n = 0; 851 852 if (getifaddrs(&ifap) != 0) 853 return (NULL); 854 855 if (!Fflag && (s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) { 856 warnmsg(LOG_ERR, __func__, "socket"); 857 exit(1); 858 } 859 860 /* find an ethernet */ 861 for (ifa = ifap; ifa; ifa = ifa->ifa_next) { 862 if ((ifa->ifa_flags & IFF_UP) == 0) 863 continue; 864 if ((ifa->ifa_flags & IFF_LOOPBACK) != 0) 865 continue; 866 if ((ifa->ifa_flags & IFF_MULTICAST) == 0) 867 continue; 868 869 if (ifa->ifa_addr->sa_family != AF_INET6) 870 continue; 871 872 found = 0; 873 for (i = 0; i < n; i++) { 874 if (strcmp(argv[i], ifa->ifa_name) == 0) { 875 found++; 876 break; 877 } 878 } 879 if (found) 880 continue; 881 882 /* 883 * Skip the interfaces which IPv6 and/or accepting RA 884 * is disabled. 885 */ 886 if (!Fflag) { 887 memset(&nd, 0, sizeof(nd)); 888 strlcpy(nd.ifname, ifa->ifa_name, sizeof(nd.ifname)); 889 if (ioctl(s, SIOCGIFINFO_IN6, (caddr_t)&nd) < 0) { 890 warnmsg(LOG_ERR, __func__, 891 "ioctl(SIOCGIFINFO_IN6)"); 892 exit(1); 893 } 894 if ((nd.ndi.flags & ND6_IFF_IFDISABLED)) 895 continue; 896 if (!(nd.ndi.flags & ND6_IFF_ACCEPT_RTADV)) 897 continue; 898 } 899 900 /* if we find multiple candidates, just warn. */ 901 if (n != 0 && dflag > 1) 902 warnmsg(LOG_WARNING, __func__, 903 "multiple interfaces found"); 904 905 a = realloc(argv, (n + 1) * sizeof(char *)); 906 if (a == NULL) { 907 warnmsg(LOG_ERR, __func__, "realloc"); 908 exit(1); 909 } 910 argv = a; 911 argv[n] = strdup(ifa->ifa_name); 912 if (!argv[n]) { 913 warnmsg(LOG_ERR, __func__, "malloc"); 914 exit(1); 915 } 916 n++; 917 } 918 919 if (n) { 920 a = realloc(argv, (n + 1) * sizeof(char *)); 921 if (a == NULL) { 922 warnmsg(LOG_ERR, __func__, "realloc"); 923 exit(1); 924 } 925 argv = a; 926 argv[n] = NULL; 927 928 if (dflag > 0) { 929 for (i = 0; i < n; i++) 930 warnmsg(LOG_WARNING, __func__, "probing %s", 931 argv[i]); 932 } 933 } 934 if (!Fflag) 935 close(s); 936 freeifaddrs(ifap); 937 return (argv); 938 } 939