xref: /freebsd/usr.sbin/rtsold/rtsold.c (revision c66ec88fed842fbaad62c30d510644ceb7bd2d71)
1 /*	$KAME: rtsold.c,v 1.67 2003/05/17 18:16:15 itojun Exp $	*/
2 
3 /*-
4  * SPDX-License-Identifier: BSD-3-Clause
5  *
6  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
7  * All rights reserved.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted provided that the following conditions
11  * are met:
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  * 2. Redistributions in binary form must reproduce the above copyright
15  *    notice, this list of conditions and the following disclaimer in the
16  *    documentation and/or other materials provided with the distribution.
17  * 3. Neither the name of the project nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  *
33  * $FreeBSD$
34  */
35 
36 #include <sys/param.h>
37 #include <sys/capsicum.h>
38 #include <sys/event.h>
39 #include <sys/ioctl.h>
40 #include <sys/socket.h>
41 
42 #include <net/if.h>
43 #include <net/if_dl.h>
44 
45 #include <netinet/in.h>
46 #include <netinet/icmp6.h>
47 #include <netinet/in_var.h>
48 #include <arpa/inet.h>
49 
50 #include <netinet6/nd6.h>
51 
52 #include <capsicum_helpers.h>
53 #include <err.h>
54 #include <errno.h>
55 #include <ifaddrs.h>
56 #include <libgen.h>
57 #include <signal.h>
58 #include <stdarg.h>
59 #include <stdio.h>
60 #include <stdlib.h>
61 #include <string.h>
62 #include <syslog.h>
63 #include <time.h>
64 #include <unistd.h>
65 
66 #include <libcasper.h>
67 #include <casper/cap_syslog.h>
68 #include <libutil.h>
69 
70 #include "rtsold.h"
71 
72 #define RTSOL_DUMPFILE	"/var/run/rtsold.dump"
73 
74 struct timespec tm_max;
75 static int log_upto = 999;
76 static int fflag = 0;
77 
78 int Fflag = 0;	/* force setting sysctl parameters */
79 int aflag = 0;
80 int dflag = 0;
81 int uflag = 0;
82 
83 const char *managedconf_script;
84 const char *otherconf_script;
85 const char *resolvconf_script = "/sbin/resolvconf";
86 
87 cap_channel_t *capllflags, *capscript, *capsendmsg, *capsyslog;
88 
89 /* protocol constants */
90 #define MAX_RTR_SOLICITATION_DELAY	1 /* second */
91 #define RTR_SOLICITATION_INTERVAL	4 /* seconds */
92 #define MAX_RTR_SOLICITATIONS		3 /* times */
93 
94 /*
95  * implementation dependent constants in seconds
96  * XXX: should be configurable
97  */
98 #define PROBE_INTERVAL 60
99 
100 /* static variables and functions */
101 static int mobile_node = 0;
102 
103 static sig_atomic_t do_dump, do_exit;
104 static struct pidfh *pfh;
105 
106 static char **autoifprobe(void);
107 static int ifconfig(char *ifname);
108 static int init_capabilities(void);
109 static int make_packet(struct ifinfo *);
110 static struct timespec *rtsol_check_timer(void);
111 
112 static void set_dumpfile(int);
113 static void set_exit(int);
114 static void usage(const char *progname);
115 
116 int
117 main(int argc, char **argv)
118 {
119 	struct kevent events[2];
120 	FILE *dumpfp;
121 	struct ifinfo *ifi;
122 	struct timespec *timeout;
123 	const char *opts, *pidfilepath, *progname;
124 	int ch, error, kq, once, rcvsock, rtsock;
125 
126 	progname = basename(argv[0]);
127 	if (strcmp(progname, "rtsold") == 0) {
128 		opts = "adDfFm1M:O:p:R:u";
129 		once = 0;
130 		pidfilepath = NULL;
131 	} else {
132 		opts = "adDFM:O:R:u";
133 		fflag = 1;
134 		once = 1;
135 	}
136 
137 	while ((ch = getopt(argc, argv, opts)) != -1) {
138 		switch (ch) {
139 		case 'a':
140 			aflag = 1;
141 			break;
142 		case 'd':
143 			dflag += 1;
144 			break;
145 		case 'D':
146 			dflag += 2;
147 			break;
148 		case 'f':
149 			fflag = 1;
150 			break;
151 		case 'F':
152 			Fflag = 1;
153 			break;
154 		case 'm':
155 			mobile_node = 1;
156 			break;
157 		case '1':
158 			once = 1;
159 			break;
160 		case 'M':
161 			managedconf_script = optarg;
162 			break;
163 		case 'O':
164 			otherconf_script = optarg;
165 			break;
166 		case 'p':
167 			pidfilepath = optarg;
168 			break;
169 		case 'R':
170 			resolvconf_script = optarg;
171 			break;
172 		case 'u':
173 			uflag = 1;
174 			break;
175 		default:
176 			usage(progname);
177 		}
178 	}
179 	argc -= optind;
180 	argv += optind;
181 
182 	if ((!aflag && argc == 0) || (aflag && argc != 0))
183 		usage(progname);
184 
185 	/* Generate maximum time in timespec. */
186 	tm_max.tv_sec = (-1) & ~((time_t)1 << ((sizeof(tm_max.tv_sec) * 8) - 1));
187 	tm_max.tv_nsec = (-1) & ~((long)1 << ((sizeof(tm_max.tv_nsec) * 8) - 1));
188 
189 	/* set log level */
190 	if (dflag > 1)
191 		log_upto = LOG_DEBUG;
192 	else if (dflag > 0)
193 		log_upto = LOG_INFO;
194 	else
195 		log_upto = LOG_NOTICE;
196 
197 	if (managedconf_script != NULL && *managedconf_script != '/')
198 		errx(1, "configuration script (%s) must be an absolute path",
199 		    managedconf_script);
200 	if (otherconf_script != NULL && *otherconf_script != '/')
201 		errx(1, "configuration script (%s) must be an absolute path",
202 		    otherconf_script);
203 	if (*resolvconf_script != '/')
204 		errx(1, "configuration script (%s) must be an absolute path",
205 		    resolvconf_script);
206 
207 	if (!fflag) {
208 		pfh = pidfile_open(pidfilepath, 0644, NULL);
209 		if (pfh == NULL)
210 			errx(1, "failed to open pidfile: %s", strerror(errno));
211 		if (daemon(0, 0) != 0)
212 			errx(1, "failed to daemonize");
213 	}
214 
215 	if ((error = init_capabilities()) != 0)
216 		err(1, "failed to initialize capabilities");
217 
218 	if (!fflag) {
219 		cap_openlog(capsyslog, progname, LOG_NDELAY | LOG_PID,
220 		    LOG_DAEMON);
221 		if (log_upto >= 0)
222 			(void)cap_setlogmask(capsyslog, LOG_UPTO(log_upto));
223 		(void)signal(SIGTERM, set_exit);
224 		(void)signal(SIGINT, set_exit);
225 		(void)signal(SIGUSR1, set_dumpfile);
226 		dumpfp = rtsold_init_dumpfile(RTSOL_DUMPFILE);
227 	} else
228 		dumpfp = NULL;
229 
230 	kq = kqueue();
231 	if (kq < 0) {
232 		warnmsg(LOG_ERR, __func__, "failed to create a kqueue: %s",
233 		    strerror(errno));
234 		exit(1);
235 	}
236 
237 	/* Open global sockets and register for read events. */
238 	if ((rtsock = rtsock_open()) < 0) {
239 		warnmsg(LOG_ERR, __func__, "failed to open routing socket");
240 		exit(1);
241 	}
242 	if ((rcvsock = recvsockopen()) < 0) {
243 		warnmsg(LOG_ERR, __func__, "failed to open receive socket");
244 		exit(1);
245 	}
246 	EV_SET(&events[0], rtsock, EVFILT_READ, EV_ADD, 0, 0, NULL);
247 	EV_SET(&events[1], rcvsock, EVFILT_READ, EV_ADD, 0, 0, NULL);
248 	if (kevent(kq, events, 2, NULL, 0, NULL) < 0) {
249 		warnmsg(LOG_ERR, __func__, "kevent(): %s", strerror(errno));
250 		exit(1);
251 	}
252 
253 	/* Probe network interfaces and set up tracking info. */
254 	if (ifinit() != 0) {
255 		warnmsg(LOG_ERR, __func__, "failed to initialize interfaces");
256 		exit(1);
257 	}
258 	if (aflag)
259 		argv = autoifprobe();
260 	while (argv && *argv) {
261 		if (ifconfig(*argv)) {
262 			warnmsg(LOG_ERR, __func__,
263 			    "failed to initialize %s", *argv);
264 			exit(1);
265 		}
266 		argv++;
267 	}
268 
269 	/* Write to our pidfile. */
270 	if (pfh != NULL && pidfile_write(pfh) != 0) {
271 		warnmsg(LOG_ERR, __func__,
272 		    "failed to open pidfile: %s", strerror(errno));
273 		exit(1);
274 	}
275 
276 	/* Enter capability mode. */
277 	caph_cache_catpages();
278 	if (caph_enter_casper() != 0) {
279 		warnmsg(LOG_ERR, __func__, "caph_enter(): %s", strerror(errno));
280 		exit(1);
281 	}
282 
283 	for (;;) {
284 		if (do_exit) {
285 			/* Handle SIGTERM, SIGINT. */
286 			if (pfh != NULL)
287 				pidfile_remove(pfh);
288 			break;
289 		}
290 		if (do_dump) {
291 			/* Handle SIGUSR1. */
292 			do_dump = 0;
293 			if (dumpfp != NULL)
294 				rtsold_dump(dumpfp);
295 		}
296 
297 		timeout = rtsol_check_timer();
298 
299 		if (once) {
300 			/* if we have no timeout, we are done (or failed) */
301 			if (timeout == NULL)
302 				break;
303 
304 			/* if all interfaces have got RA packet, we are done */
305 			TAILQ_FOREACH(ifi, &ifinfo_head, ifi_next) {
306 				if (ifi->state != IFS_DOWN && ifi->racnt == 0)
307 					break;
308 			}
309 			if (ifi == NULL)
310 				break;
311 		}
312 
313 		error = kevent(kq, NULL, 0, &events[0], 1, timeout);
314 		if (error < 1) {
315 			if (error < 0 && errno != EINTR)
316 				warnmsg(LOG_ERR, __func__, "kevent(): %s",
317 				    strerror(errno));
318 			continue;
319 		}
320 
321 		if (events[0].ident == (uintptr_t)rtsock)
322 			rtsock_input(rtsock);
323 		else
324 			rtsol_input(rcvsock);
325 	}
326 
327 	return (0);
328 }
329 
330 static int
331 init_capabilities(void)
332 {
333 #ifdef WITH_CASPER
334 	const char *const scripts[] =
335 	    { resolvconf_script, managedconf_script, otherconf_script };
336 	const char *scripts_set[nitems(scripts)];
337 	cap_channel_t *capcasper;
338 	nvlist_t *limits;
339 	int count;
340 
341 	capcasper = cap_init();
342 	if (capcasper == NULL)
343 		return (-1);
344 
345 	capllflags = cap_service_open(capcasper, "rtsold.llflags");
346 	if (capllflags == NULL)
347 		return (-1);
348 
349 	capscript = cap_service_open(capcasper, "rtsold.script");
350 	if (capscript == NULL)
351 		return (-1);
352 	count = 0;
353 	for (size_t i = 0; i < nitems(scripts); i++)
354 		if (scripts[i] != NULL)
355 			scripts_set[count++] = scripts[i];
356 	limits = nvlist_create(0);
357 	nvlist_add_string_array(limits, "scripts", scripts_set, count);
358 	if (cap_limit_set(capscript, limits) != 0)
359 		return (-1);
360 
361 	capsendmsg = cap_service_open(capcasper, "rtsold.sendmsg");
362 	if (capsendmsg == NULL)
363 		return (-1);
364 
365 	if (!fflag) {
366 		capsyslog = cap_service_open(capcasper, "system.syslog");
367 		if (capsyslog == NULL)
368 			return (-1);
369 	}
370 
371 	cap_close(capcasper);
372 #endif /* WITH_CASPER */
373 	return (0);
374 }
375 
376 static int
377 ifconfig(char *ifname)
378 {
379 	struct ifinfo *ifi;
380 	struct sockaddr_dl *sdl;
381 	int flags;
382 
383 	ifi = NULL;
384 	if ((sdl = if_nametosdl(ifname)) == NULL) {
385 		warnmsg(LOG_ERR, __func__,
386 		    "failed to get link layer information for %s", ifname);
387 		goto bad;
388 	}
389 	if (find_ifinfo(sdl->sdl_index)) {
390 		warnmsg(LOG_ERR, __func__,
391 		    "interface %s was already configured", ifname);
392 		goto bad;
393 	}
394 
395 	if (Fflag) {
396 		struct in6_ndireq nd;
397 		int s;
398 
399 		if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
400 			warnmsg(LOG_ERR, __func__, "socket() failed.");
401 			goto bad;
402 		}
403 		memset(&nd, 0, sizeof(nd));
404 		strlcpy(nd.ifname, ifname, sizeof(nd.ifname));
405 		if (ioctl(s, SIOCGIFINFO_IN6, (caddr_t)&nd) < 0) {
406 			warnmsg(LOG_ERR, __func__,
407 			    "cannot get accept_rtadv flag");
408 			(void)close(s);
409 			goto bad;
410 		}
411 		nd.ndi.flags |= ND6_IFF_ACCEPT_RTADV;
412 		if (ioctl(s, SIOCSIFINFO_IN6, (caddr_t)&nd) < 0) {
413 			warnmsg(LOG_ERR, __func__,
414 			    "cannot set accept_rtadv flag");
415 			(void)close(s);
416 			goto bad;
417 		}
418 		(void)close(s);
419 	}
420 
421 	if ((ifi = malloc(sizeof(*ifi))) == NULL) {
422 		warnmsg(LOG_ERR, __func__, "memory allocation failed");
423 		goto bad;
424 	}
425 	memset(ifi, 0, sizeof(*ifi));
426 	ifi->sdl = sdl;
427 	ifi->ifi_rdnss = IFI_DNSOPT_STATE_NOINFO;
428 	ifi->ifi_dnssl = IFI_DNSOPT_STATE_NOINFO;
429 	TAILQ_INIT(&ifi->ifi_rainfo);
430 	strlcpy(ifi->ifname, ifname, sizeof(ifi->ifname));
431 
432 	/* construct a router solicitation message */
433 	if (make_packet(ifi))
434 		goto bad;
435 
436 	/* set link ID of this interface. */
437 #ifdef HAVE_SCOPELIB
438 	if (inet_zoneid(AF_INET6, 2, ifname, &ifi->linkid))
439 		goto bad;
440 #else
441 	/* XXX: assume interface IDs as link IDs */
442 	ifi->linkid = ifi->sdl->sdl_index;
443 #endif
444 
445 	/*
446 	 * check if the interface is available.
447 	 * also check if SIOCGIFMEDIA ioctl is OK on the interface.
448 	 */
449 	ifi->mediareqok = 1;
450 	ifi->active = interface_status(ifi);
451 	if (!ifi->mediareqok) {
452 		/*
453 		 * probe routers periodically even if the link status
454 		 * does not change.
455 		 */
456 		ifi->probeinterval = PROBE_INTERVAL;
457 	}
458 
459 	/* activate interface: interface_up returns 0 on success */
460 	flags = interface_up(ifi->ifname);
461 	if (flags == 0)
462 		ifi->state = IFS_DELAY;
463 	else if (flags == IFS_TENTATIVE)
464 		ifi->state = IFS_TENTATIVE;
465 	else
466 		ifi->state = IFS_DOWN;
467 
468 	rtsol_timer_update(ifi);
469 
470 	TAILQ_INSERT_TAIL(&ifinfo_head, ifi, ifi_next);
471 	return (0);
472 
473 bad:
474 	free(sdl);
475 	free(ifi);
476 	return (-1);
477 }
478 
479 struct rainfo *
480 find_rainfo(struct ifinfo *ifi, struct sockaddr_in6 *sin6)
481 {
482 	struct rainfo *rai;
483 
484 	TAILQ_FOREACH(rai, &ifi->ifi_rainfo, rai_next)
485 		if (memcmp(&rai->rai_saddr.sin6_addr, &sin6->sin6_addr,
486 		    sizeof(rai->rai_saddr.sin6_addr)) == 0)
487 			return (rai);
488 
489 	return (NULL);
490 }
491 
492 struct ifinfo *
493 find_ifinfo(int ifindex)
494 {
495 	struct ifinfo *ifi;
496 
497 	TAILQ_FOREACH(ifi, &ifinfo_head, ifi_next) {
498 		if (ifi->sdl->sdl_index == ifindex)
499 			return (ifi);
500 	}
501 	return (NULL);
502 }
503 
504 static int
505 make_packet(struct ifinfo *ifi)
506 {
507 	size_t packlen = sizeof(struct nd_router_solicit), lladdroptlen = 0;
508 	struct nd_router_solicit *rs;
509 	char *buf;
510 
511 	if ((lladdroptlen = lladdropt_length(ifi->sdl)) == 0) {
512 		warnmsg(LOG_INFO, __func__,
513 		    "link-layer address option has null length"
514 		    " on %s. Treat as not included.", ifi->ifname);
515 	}
516 	packlen += lladdroptlen;
517 	ifi->rs_datalen = packlen;
518 
519 	/* allocate buffer */
520 	if ((buf = malloc(packlen)) == NULL) {
521 		warnmsg(LOG_ERR, __func__,
522 		    "memory allocation failed for %s", ifi->ifname);
523 		return (-1);
524 	}
525 	ifi->rs_data = buf;
526 
527 	/* fill in the message */
528 	rs = (struct nd_router_solicit *)buf;
529 	rs->nd_rs_type = ND_ROUTER_SOLICIT;
530 	rs->nd_rs_code = 0;
531 	rs->nd_rs_cksum = 0;
532 	rs->nd_rs_reserved = 0;
533 	buf += sizeof(*rs);
534 
535 	/* fill in source link-layer address option */
536 	if (lladdroptlen)
537 		lladdropt_fill(ifi->sdl, (struct nd_opt_hdr *)buf);
538 
539 	return (0);
540 }
541 
542 static struct timespec *
543 rtsol_check_timer(void)
544 {
545 	static struct timespec returnval;
546 	struct timespec now, rtsol_timer;
547 	struct ifinfo *ifi;
548 	struct rainfo *rai;
549 	struct ra_opt *rao, *raotmp;
550 	int error, flags;
551 
552 	clock_gettime(CLOCK_MONOTONIC_FAST, &now);
553 
554 	rtsol_timer = tm_max;
555 
556 	TAILQ_FOREACH(ifi, &ifinfo_head, ifi_next) {
557 		if (TS_CMP(&ifi->expire, &now, <=)) {
558 			warnmsg(LOG_DEBUG, __func__, "timer expiration on %s, "
559 			    "state = %d", ifi->ifname, ifi->state);
560 
561 			while((rai = TAILQ_FIRST(&ifi->ifi_rainfo)) != NULL) {
562 				/* Remove all RA options. */
563 				TAILQ_REMOVE(&ifi->ifi_rainfo, rai, rai_next);
564 				while ((rao = TAILQ_FIRST(&rai->rai_ra_opt)) !=
565 				    NULL) {
566 					TAILQ_REMOVE(&rai->rai_ra_opt, rao,
567 					    rao_next);
568 					if (rao->rao_msg != NULL)
569 						free(rao->rao_msg);
570 					free(rao);
571 				}
572 				free(rai);
573 			}
574 			switch (ifi->state) {
575 			case IFS_DOWN:
576 			case IFS_TENTATIVE:
577 				/* interface_up returns 0 on success */
578 				flags = interface_up(ifi->ifname);
579 				if (flags == 0)
580 					ifi->state = IFS_DELAY;
581 				else if (flags == IFS_TENTATIVE)
582 					ifi->state = IFS_TENTATIVE;
583 				else
584 					ifi->state = IFS_DOWN;
585 				break;
586 			case IFS_IDLE:
587 			{
588 				int oldstatus = ifi->active;
589 				int probe = 0;
590 
591 				ifi->active = interface_status(ifi);
592 
593 				if (oldstatus != ifi->active) {
594 					warnmsg(LOG_DEBUG, __func__,
595 					    "%s status is changed"
596 					    " from %d to %d",
597 					    ifi->ifname,
598 					    oldstatus, ifi->active);
599 					probe = 1;
600 					ifi->state = IFS_DELAY;
601 				} else if (ifi->probeinterval &&
602 				    (ifi->probetimer -=
603 				    ifi->timer.tv_sec) <= 0) {
604 					/* probe timer expired */
605 					ifi->probetimer =
606 					    ifi->probeinterval;
607 					probe = 1;
608 					ifi->state = IFS_PROBE;
609 				}
610 
611 				/*
612 				 * If we need a probe, clear the previous
613 				 * status wrt the "managed/other" configuration.
614 				 */
615 				if (probe) {
616 					ifi->managedconfig = 0;
617 					ifi->otherconfig = 0;
618 				}
619 				if (probe && mobile_node) {
620 					error = cap_probe_defrouters(capsendmsg,
621 					    ifi);
622 					if (error != 0)
623 						warnmsg(LOG_DEBUG, __func__,
624 					    "failed to probe routers: %d",
625 						    error);
626 				}
627 				break;
628 			}
629 			case IFS_DELAY:
630 				ifi->state = IFS_PROBE;
631 				(void)cap_rssend(capsendmsg, ifi);
632 				break;
633 			case IFS_PROBE:
634 				if (ifi->probes < MAX_RTR_SOLICITATIONS)
635 					(void)cap_rssend(capsendmsg, ifi);
636 				else {
637 					warnmsg(LOG_INFO, __func__,
638 					    "No answer after sending %d RSs",
639 					    ifi->probes);
640 					ifi->probes = 0;
641 					ifi->state = IFS_IDLE;
642 				}
643 				break;
644 			}
645 			rtsol_timer_update(ifi);
646 		} else {
647 			/* Expiration check for RA options. */
648 			int expire = 0;
649 
650 			TAILQ_FOREACH(rai, &ifi->ifi_rainfo, rai_next) {
651 				TAILQ_FOREACH_SAFE(rao, &rai->rai_ra_opt,
652 				    rao_next, raotmp) {
653 					warnmsg(LOG_DEBUG, __func__,
654 					    "RA expiration timer: "
655 					    "type=%d, msg=%s, expire=%s",
656 					    rao->rao_type, (char *)rao->rao_msg,
657 						sec2str(&rao->rao_expire));
658 					if (TS_CMP(&now, &rao->rao_expire,
659 					    >=)) {
660 						warnmsg(LOG_DEBUG, __func__,
661 						    "RA expiration timer: "
662 						    "expired.");
663 						TAILQ_REMOVE(&rai->rai_ra_opt,
664 						    rao, rao_next);
665 						if (rao->rao_msg != NULL)
666 							free(rao->rao_msg);
667 						free(rao);
668 						expire = 1;
669 					}
670 				}
671 			}
672 			if (expire)
673 				ra_opt_handler(ifi);
674 		}
675 		if (TS_CMP(&ifi->expire, &rtsol_timer, <))
676 			rtsol_timer = ifi->expire;
677 	}
678 
679 	if (TS_CMP(&rtsol_timer, &tm_max, ==)) {
680 		warnmsg(LOG_DEBUG, __func__, "there is no timer");
681 		return (NULL);
682 	} else if (TS_CMP(&rtsol_timer, &now, <))
683 		/* this may occur when the interval is too small */
684 		returnval.tv_sec = returnval.tv_nsec = 0;
685 	else
686 		TS_SUB(&rtsol_timer, &now, &returnval);
687 
688 	now.tv_sec += returnval.tv_sec;
689 	now.tv_nsec += returnval.tv_nsec;
690 	warnmsg(LOG_DEBUG, __func__, "New timer is %s",
691 	    sec2str(&now));
692 
693 	return (&returnval);
694 }
695 
696 void
697 rtsol_timer_update(struct ifinfo *ifi)
698 {
699 #define MILLION 1000000
700 #define DADRETRY 10		/* XXX: adhoc */
701 	long interval;
702 	struct timespec now;
703 
704 	bzero(&ifi->timer, sizeof(ifi->timer));
705 
706 	switch (ifi->state) {
707 	case IFS_DOWN:
708 	case IFS_TENTATIVE:
709 		if (++ifi->dadcount > DADRETRY) {
710 			ifi->dadcount = 0;
711 			ifi->timer.tv_sec = PROBE_INTERVAL;
712 		} else
713 			ifi->timer.tv_sec = 1;
714 		break;
715 	case IFS_IDLE:
716 		if (mobile_node)
717 			/* XXX should be configurable */
718 			ifi->timer.tv_sec = 3;
719 		else
720 			ifi->timer = tm_max;	/* stop timer(valid?) */
721 		break;
722 	case IFS_DELAY:
723 		interval = arc4random_uniform(MAX_RTR_SOLICITATION_DELAY * MILLION);
724 		ifi->timer.tv_sec = interval / MILLION;
725 		ifi->timer.tv_nsec = (interval % MILLION) * 1000;
726 		break;
727 	case IFS_PROBE:
728 		if (ifi->probes < MAX_RTR_SOLICITATIONS)
729 			ifi->timer.tv_sec = RTR_SOLICITATION_INTERVAL;
730 		else
731 			/*
732 			 * After sending MAX_RTR_SOLICITATIONS solicitations,
733 			 * we're just waiting for possible replies; there
734 			 * will be no more solicitation.  Thus, we change
735 			 * the timer value to MAX_RTR_SOLICITATION_DELAY based
736 			 * on RFC 2461, Section 6.3.7.
737 			 */
738 			ifi->timer.tv_sec = MAX_RTR_SOLICITATION_DELAY;
739 		break;
740 	default:
741 		warnmsg(LOG_ERR, __func__,
742 		    "illegal interface state(%d) on %s",
743 		    ifi->state, ifi->ifname);
744 		return;
745 	}
746 
747 	/* reset the timer */
748 	if (TS_CMP(&ifi->timer, &tm_max, ==)) {
749 		ifi->expire = tm_max;
750 		warnmsg(LOG_DEBUG, __func__,
751 		    "stop timer for %s", ifi->ifname);
752 	} else {
753 		clock_gettime(CLOCK_MONOTONIC_FAST, &now);
754 		TS_ADD(&now, &ifi->timer, &ifi->expire);
755 
756 		now.tv_sec += ifi->timer.tv_sec;
757 		now.tv_nsec += ifi->timer.tv_nsec;
758 		warnmsg(LOG_DEBUG, __func__, "set timer for %s to %s",
759 		    ifi->ifname, sec2str(&now));
760 	}
761 
762 #undef MILLION
763 }
764 
765 static void
766 set_dumpfile(int sig __unused)
767 {
768 
769 	do_dump = 1;
770 }
771 
772 static void
773 set_exit(int sig __unused)
774 {
775 
776 	do_exit = 1;
777 }
778 
779 static void
780 usage(const char *progname)
781 {
782 
783 	if (strcmp(progname, "rtsold") == 0) {
784 		fprintf(stderr, "usage: rtsold [-dDfFm1] [-O script-name] "
785 		    "[-p pidfile] [-R script-name] interface ...\n");
786 		fprintf(stderr, "usage: rtsold [-dDfFm1] [-O script-name] "
787 		    "[-p pidfile] [-R script-name] -a\n");
788 	} else {
789 		fprintf(stderr, "usage: rtsol [-dDF] [-O script-name] "
790 		    "[-p pidfile] [-R script-name] interface ...\n");
791 		fprintf(stderr, "usage: rtsol [-dDF] [-O script-name] "
792 		    "[-p pidfile] [-R script-name] -a\n");
793 	}
794 	exit(1);
795 }
796 
797 void
798 warnmsg(int priority, const char *func, const char *msg, ...)
799 {
800 	va_list ap;
801 	char buf[BUFSIZ];
802 
803 	va_start(ap, msg);
804 	if (fflag) {
805 		if (priority <= log_upto)
806 			vwarnx(msg, ap);
807 	} else {
808 		snprintf(buf, sizeof(buf), "<%s> %s", func, msg);
809 		msg = buf;
810 		cap_vsyslog(capsyslog, priority, msg, ap);
811 	}
812 	va_end(ap);
813 }
814 
815 /*
816  * return a list of interfaces which is suitable to sending an RS.
817  */
818 static char **
819 autoifprobe(void)
820 {
821 	static char **argv = NULL;
822 	static int n = 0;
823 	char **a;
824 	int s = 0, i, found;
825 	struct ifaddrs *ifap, *ifa;
826 	struct in6_ndireq nd;
827 
828 	/* initialize */
829 	while (n--)
830 		free(argv[n]);
831 	if (argv) {
832 		free(argv);
833 		argv = NULL;
834 	}
835 	n = 0;
836 
837 	if (getifaddrs(&ifap) != 0)
838 		return (NULL);
839 
840 	if (!Fflag && (s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
841 		warnmsg(LOG_ERR, __func__, "socket");
842 		exit(1);
843 	}
844 
845 	/* find an ethernet */
846 	for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
847 		if ((ifa->ifa_flags & IFF_UP) == 0)
848 			continue;
849 		if ((ifa->ifa_flags & IFF_POINTOPOINT) != 0)
850 			continue;
851 		if ((ifa->ifa_flags & IFF_LOOPBACK) != 0)
852 			continue;
853 		if ((ifa->ifa_flags & IFF_MULTICAST) == 0)
854 			continue;
855 
856 		if (ifa->ifa_addr->sa_family != AF_INET6)
857 			continue;
858 
859 		found = 0;
860 		for (i = 0; i < n; i++) {
861 			if (strcmp(argv[i], ifa->ifa_name) == 0) {
862 				found++;
863 				break;
864 			}
865 		}
866 		if (found)
867 			continue;
868 
869 		/*
870 		 * Skip the interfaces which IPv6 and/or accepting RA
871 		 * is disabled.
872 		 */
873 		if (!Fflag) {
874 			memset(&nd, 0, sizeof(nd));
875 			strlcpy(nd.ifname, ifa->ifa_name, sizeof(nd.ifname));
876 			if (ioctl(s, SIOCGIFINFO_IN6, (caddr_t)&nd) < 0) {
877 				warnmsg(LOG_ERR, __func__,
878 					"ioctl(SIOCGIFINFO_IN6)");
879 				exit(1);
880 			}
881 			if ((nd.ndi.flags & ND6_IFF_IFDISABLED))
882 				continue;
883 			if (!(nd.ndi.flags & ND6_IFF_ACCEPT_RTADV))
884 				continue;
885 		}
886 
887 		/* if we find multiple candidates, just warn. */
888 		if (n != 0 && dflag > 1)
889 			warnmsg(LOG_WARNING, __func__,
890 				"multiple interfaces found");
891 
892 		a = realloc(argv, (n + 1) * sizeof(char *));
893 		if (a == NULL) {
894 			warnmsg(LOG_ERR, __func__, "realloc");
895 			exit(1);
896 		}
897 		argv = a;
898 		argv[n] = strdup(ifa->ifa_name);
899 		if (!argv[n]) {
900 			warnmsg(LOG_ERR, __func__, "malloc");
901 			exit(1);
902 		}
903 		n++;
904 	}
905 
906 	if (n) {
907 		a = realloc(argv, (n + 1) * sizeof(char *));
908 		if (a == NULL) {
909 			warnmsg(LOG_ERR, __func__, "realloc");
910 			exit(1);
911 		}
912 		argv = a;
913 		argv[n] = NULL;
914 
915 		if (dflag > 0) {
916 			for (i = 0; i < n; i++)
917 				warnmsg(LOG_WARNING, __func__, "probing %s",
918 					argv[i]);
919 		}
920 	}
921 	if (!Fflag)
922 		close(s);
923 	freeifaddrs(ifap);
924 	return (argv);
925 }
926