]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - usr.sbin/rtsold/rtsold.c
Optionally bind ktls threads to NUMA domains
[FreeBSD/FreeBSD.git] / usr.sbin / rtsold / rtsold.c
1 /*      $KAME: rtsold.c,v 1.67 2003/05/17 18:16:15 itojun Exp $ */
2
3 /*-
4  * SPDX-License-Identifier: BSD-3-Clause
5  *
6  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
7  * All rights reserved.
8  * 
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted provided that the following conditions
11  * are met:
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  * 2. Redistributions in binary form must reproduce the above copyright
15  *    notice, this list of conditions and the following disclaimer in the
16  *    documentation and/or other materials provided with the distribution.
17  * 3. Neither the name of the project nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  * 
21  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  *
33  * $FreeBSD$
34  */
35
36 #include <sys/param.h>
37 #include <sys/capsicum.h>
38 #include <sys/event.h>
39 #include <sys/ioctl.h>
40 #include <sys/socket.h>
41
42 #include <net/if.h>
43 #include <net/if_dl.h>
44
45 #include <netinet/in.h>
46 #include <netinet/icmp6.h>
47 #include <netinet/in_var.h>
48 #include <arpa/inet.h>
49
50 #include <netinet6/nd6.h>
51
52 #include <capsicum_helpers.h>
53 #include <err.h>
54 #include <errno.h>
55 #include <ifaddrs.h>
56 #include <libgen.h>
57 #include <signal.h>
58 #include <stdarg.h>
59 #include <stdio.h>
60 #include <stdlib.h>
61 #include <string.h>
62 #include <syslog.h>
63 #include <time.h>
64 #include <unistd.h>
65
66 #include <libcasper.h>
67 #include <casper/cap_syslog.h>
68 #include <libutil.h>
69
70 #include "rtsold.h"
71
72 #define RTSOL_DUMPFILE  "/var/run/rtsold.dump"
73
74 struct timespec tm_max;
75 static int log_upto = 999;
76 static int fflag = 0;
77
78 int Fflag = 0;  /* force setting sysctl parameters */
79 int aflag = 0;
80 int dflag = 0;
81 int uflag = 0;
82
83 const char *managedconf_script;
84 const char *otherconf_script;
85 const char *resolvconf_script = "/sbin/resolvconf";
86
87 cap_channel_t *capllflags, *capscript, *capsendmsg, *capsyslog;
88
89 /* protocol constants */
90 #define MAX_RTR_SOLICITATION_DELAY      1 /* second */
91 #define RTR_SOLICITATION_INTERVAL       4 /* seconds */
92 #define MAX_RTR_SOLICITATIONS           3 /* times */
93
94 /*
95  * implementation dependent constants in seconds
96  * XXX: should be configurable
97  */
98 #define PROBE_INTERVAL 60
99
100 /* static variables and functions */
101 static int mobile_node = 0;
102
103 static sig_atomic_t do_dump, do_exit;
104 static struct pidfh *pfh;
105
106 static char **autoifprobe(void);
107 static int ifconfig(char *ifname);
108 static int init_capabilities(void);
109 static int make_packet(struct ifinfo *);
110 static struct timespec *rtsol_check_timer(void);
111
112 static void set_dumpfile(int);
113 static void set_exit(int);
114 static void usage(const char *progname);
115
116 int
117 main(int argc, char **argv)
118 {
119         struct kevent events[2];
120         FILE *dumpfp;
121         struct ifinfo *ifi;
122         struct timespec *timeout;
123         const char *opts, *pidfilepath, *progname;
124         int ch, error, kq, once, rcvsock, rtsock;
125
126         progname = basename(argv[0]);
127         if (strcmp(progname, "rtsold") == 0) {
128                 opts = "adDfFm1M:O:p:R:u";
129                 once = 0;
130                 pidfilepath = NULL;
131         } else {
132                 opts = "adDFM:O:R:u";
133                 fflag = 1;
134                 once = 1;
135         }
136
137         while ((ch = getopt(argc, argv, opts)) != -1) {
138                 switch (ch) {
139                 case 'a':
140                         aflag = 1;
141                         break;
142                 case 'd':
143                         dflag += 1;
144                         break;
145                 case 'D':
146                         dflag += 2;
147                         break;
148                 case 'f':
149                         fflag = 1;
150                         break;
151                 case 'F':
152                         Fflag = 1;
153                         break;
154                 case 'm':
155                         mobile_node = 1;
156                         break;
157                 case '1':
158                         once = 1;
159                         break;
160                 case 'M':
161                         managedconf_script = optarg;
162                         break;
163                 case 'O':
164                         otherconf_script = optarg;
165                         break;
166                 case 'p':
167                         pidfilepath = optarg;
168                         break;
169                 case 'R':
170                         resolvconf_script = optarg;
171                         break;
172                 case 'u':
173                         uflag = 1;
174                         break;
175                 default:
176                         usage(progname);
177                 }
178         }
179         argc -= optind;
180         argv += optind;
181
182         if ((!aflag && argc == 0) || (aflag && argc != 0))
183                 usage(progname);
184
185         /* Generate maximum time in timespec. */
186         tm_max.tv_sec = (-1) & ~((time_t)1 << ((sizeof(tm_max.tv_sec) * 8) - 1));
187         tm_max.tv_nsec = (-1) & ~((long)1 << ((sizeof(tm_max.tv_nsec) * 8) - 1));
188
189         /* set log level */
190         if (dflag > 1)
191                 log_upto = LOG_DEBUG;
192         else if (dflag > 0)
193                 log_upto = LOG_INFO;
194         else
195                 log_upto = LOG_NOTICE;
196
197         if (managedconf_script != NULL && *managedconf_script != '/')
198                 errx(1, "configuration script (%s) must be an absolute path",
199                     managedconf_script);
200         if (otherconf_script != NULL && *otherconf_script != '/')
201                 errx(1, "configuration script (%s) must be an absolute path",
202                     otherconf_script);
203         if (*resolvconf_script != '/')
204                 errx(1, "configuration script (%s) must be an absolute path",
205                     resolvconf_script);
206
207         if (!fflag) {
208                 pfh = pidfile_open(pidfilepath, 0644, NULL);
209                 if (pfh == NULL)
210                         errx(1, "failed to open pidfile: %s", strerror(errno));
211                 if (daemon(0, 0) != 0)
212                         errx(1, "failed to daemonize");
213         }
214
215         if ((error = init_capabilities()) != 0)
216                 err(1, "failed to initialize capabilities");
217
218         if (!fflag) {
219                 cap_openlog(capsyslog, progname, LOG_NDELAY | LOG_PID,
220                     LOG_DAEMON);
221                 if (log_upto >= 0)
222                         (void)cap_setlogmask(capsyslog, LOG_UPTO(log_upto));
223                 (void)signal(SIGTERM, set_exit);
224                 (void)signal(SIGINT, set_exit);
225                 (void)signal(SIGUSR1, set_dumpfile);
226                 dumpfp = rtsold_init_dumpfile(RTSOL_DUMPFILE);
227         } else
228                 dumpfp = NULL;
229
230         kq = kqueue();
231         if (kq < 0) {
232                 warnmsg(LOG_ERR, __func__, "failed to create a kqueue: %s",
233                     strerror(errno));
234                 exit(1);
235         }
236
237         /* Open global sockets and register for read events. */
238         if ((rtsock = rtsock_open()) < 0) {
239                 warnmsg(LOG_ERR, __func__, "failed to open routing socket");
240                 exit(1);
241         }
242         if ((rcvsock = recvsockopen()) < 0) {
243                 warnmsg(LOG_ERR, __func__, "failed to open receive socket");
244                 exit(1);
245         }
246         EV_SET(&events[0], rtsock, EVFILT_READ, EV_ADD, 0, 0, NULL);
247         EV_SET(&events[1], rcvsock, EVFILT_READ, EV_ADD, 0, 0, NULL);
248         if (kevent(kq, events, 2, NULL, 0, NULL) < 0) {
249                 warnmsg(LOG_ERR, __func__, "kevent(): %s", strerror(errno));
250                 exit(1);
251         }
252
253         /* Probe network interfaces and set up tracking info. */
254         if (ifinit() != 0) {
255                 warnmsg(LOG_ERR, __func__, "failed to initialize interfaces");
256                 exit(1);
257         }
258         if (aflag)
259                 argv = autoifprobe();
260         while (argv && *argv) {
261                 if (ifconfig(*argv)) {
262                         warnmsg(LOG_ERR, __func__,
263                             "failed to initialize %s", *argv);
264                         exit(1);
265                 }
266                 argv++;
267         }
268
269         /* Write to our pidfile. */
270         if (pfh != NULL && pidfile_write(pfh) != 0) {
271                 warnmsg(LOG_ERR, __func__,
272                     "failed to open pidfile: %s", strerror(errno));
273                 exit(1);
274         }
275
276         /* Enter capability mode. */
277         caph_cache_catpages();
278         if (caph_enter_casper() != 0) {
279                 warnmsg(LOG_ERR, __func__, "caph_enter(): %s", strerror(errno));
280                 exit(1);
281         }
282
283         for (;;) {
284                 if (do_exit) {
285                         /* Handle SIGTERM, SIGINT. */
286                         if (pfh != NULL)
287                                 pidfile_remove(pfh);
288                         break;
289                 }
290                 if (do_dump) {
291                         /* Handle SIGUSR1. */
292                         do_dump = 0;
293                         if (dumpfp != NULL)
294                                 rtsold_dump(dumpfp);
295                 }
296
297                 timeout = rtsol_check_timer();
298
299                 if (once) {
300                         /* if we have no timeout, we are done (or failed) */
301                         if (timeout == NULL)
302                                 break;
303
304                         /* if all interfaces have got RA packet, we are done */
305                         TAILQ_FOREACH(ifi, &ifinfo_head, ifi_next) {
306                                 if (ifi->state != IFS_DOWN && ifi->racnt == 0)
307                                         break;
308                         }
309                         if (ifi == NULL)
310                                 break;
311                 }
312
313                 error = kevent(kq, NULL, 0, &events[0], 1, timeout);
314                 if (error < 1) {
315                         if (error < 0 && errno != EINTR)
316                                 warnmsg(LOG_ERR, __func__, "kevent(): %s",
317                                     strerror(errno));
318                         continue;
319                 }
320
321                 if (events[0].ident == (uintptr_t)rtsock)
322                         rtsock_input(rtsock);
323                 else
324                         rtsol_input(rcvsock);
325         }
326
327         return (0);
328 }
329
330 static int
331 init_capabilities(void)
332 {
333 #ifdef WITH_CASPER
334         const char *const scripts[] =
335             { resolvconf_script, managedconf_script, otherconf_script };
336         const char *scripts_set[nitems(scripts)];
337         cap_channel_t *capcasper;
338         nvlist_t *limits;
339         int count;
340
341         capcasper = cap_init();
342         if (capcasper == NULL)
343                 return (-1);
344
345         capllflags = cap_service_open(capcasper, "rtsold.llflags");
346         if (capllflags == NULL)
347                 return (-1);
348
349         capscript = cap_service_open(capcasper, "rtsold.script");
350         if (capscript == NULL)
351                 return (-1);
352         count = 0;
353         for (size_t i = 0; i < nitems(scripts); i++)
354                 if (scripts[i] != NULL)
355                         scripts_set[count++] = scripts[i];
356         limits = nvlist_create(0);
357         nvlist_add_string_array(limits, "scripts", scripts_set, count);
358         if (cap_limit_set(capscript, limits) != 0)
359                 return (-1);
360
361         capsendmsg = cap_service_open(capcasper, "rtsold.sendmsg");
362         if (capsendmsg == NULL)
363                 return (-1);
364
365         if (!fflag) {
366                 capsyslog = cap_service_open(capcasper, "system.syslog");
367                 if (capsyslog == NULL)
368                         return (-1);
369         }
370
371         cap_close(capcasper);
372 #endif /* WITH_CASPER */
373         return (0);
374 }
375
376 static int
377 ifconfig(char *ifname)
378 {
379         struct ifinfo *ifi;
380         struct sockaddr_dl *sdl;
381         int flags;
382
383         ifi = NULL;
384         if ((sdl = if_nametosdl(ifname)) == NULL) {
385                 warnmsg(LOG_ERR, __func__,
386                     "failed to get link layer information for %s", ifname);
387                 goto bad;
388         }
389         if (find_ifinfo(sdl->sdl_index)) {
390                 warnmsg(LOG_ERR, __func__,
391                     "interface %s was already configured", ifname);
392                 goto bad;
393         }
394
395         if (Fflag) {
396                 struct in6_ndireq nd;
397                 int s;
398
399                 if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
400                         warnmsg(LOG_ERR, __func__, "socket() failed.");
401                         goto bad;
402                 }
403                 memset(&nd, 0, sizeof(nd));
404                 strlcpy(nd.ifname, ifname, sizeof(nd.ifname));
405                 if (ioctl(s, SIOCGIFINFO_IN6, (caddr_t)&nd) < 0) {
406                         warnmsg(LOG_ERR, __func__,
407                             "cannot get accept_rtadv flag");
408                         (void)close(s);
409                         goto bad;
410                 }
411                 nd.ndi.flags |= ND6_IFF_ACCEPT_RTADV;
412                 if (ioctl(s, SIOCSIFINFO_IN6, (caddr_t)&nd) < 0) {
413                         warnmsg(LOG_ERR, __func__,
414                             "cannot set accept_rtadv flag");
415                         (void)close(s);
416                         goto bad;
417                 }
418                 (void)close(s);
419         }
420
421         if ((ifi = malloc(sizeof(*ifi))) == NULL) {
422                 warnmsg(LOG_ERR, __func__, "memory allocation failed");
423                 goto bad;
424         }
425         memset(ifi, 0, sizeof(*ifi));
426         ifi->sdl = sdl;
427         ifi->ifi_rdnss = IFI_DNSOPT_STATE_NOINFO;
428         ifi->ifi_dnssl = IFI_DNSOPT_STATE_NOINFO;
429         TAILQ_INIT(&ifi->ifi_rainfo);
430         strlcpy(ifi->ifname, ifname, sizeof(ifi->ifname));
431
432         /* construct a router solicitation message */
433         if (make_packet(ifi))
434                 goto bad;
435
436         /* set link ID of this interface. */
437 #ifdef HAVE_SCOPELIB
438         if (inet_zoneid(AF_INET6, 2, ifname, &ifi->linkid))
439                 goto bad;
440 #else
441         /* XXX: assume interface IDs as link IDs */
442         ifi->linkid = ifi->sdl->sdl_index;
443 #endif
444
445         /*
446          * check if the interface is available.
447          * also check if SIOCGIFMEDIA ioctl is OK on the interface.
448          */
449         ifi->mediareqok = 1;
450         ifi->active = interface_status(ifi);
451         if (!ifi->mediareqok) {
452                 /*
453                  * probe routers periodically even if the link status
454                  * does not change.
455                  */
456                 ifi->probeinterval = PROBE_INTERVAL;
457         }
458
459         /* activate interface: interface_up returns 0 on success */
460         flags = interface_up(ifi->ifname);
461         if (flags == 0)
462                 ifi->state = IFS_DELAY;
463         else if (flags == IFS_TENTATIVE)
464                 ifi->state = IFS_TENTATIVE;
465         else
466                 ifi->state = IFS_DOWN;
467
468         rtsol_timer_update(ifi);
469
470         TAILQ_INSERT_TAIL(&ifinfo_head, ifi, ifi_next);
471         return (0);
472
473 bad:
474         free(sdl);
475         free(ifi);
476         return (-1);
477 }
478
479 struct rainfo *
480 find_rainfo(struct ifinfo *ifi, struct sockaddr_in6 *sin6)
481 {
482         struct rainfo *rai;
483
484         TAILQ_FOREACH(rai, &ifi->ifi_rainfo, rai_next)
485                 if (memcmp(&rai->rai_saddr.sin6_addr, &sin6->sin6_addr,
486                     sizeof(rai->rai_saddr.sin6_addr)) == 0)
487                         return (rai);
488
489         return (NULL);
490 }
491
492 struct ifinfo *
493 find_ifinfo(int ifindex)
494 {
495         struct ifinfo *ifi;
496
497         TAILQ_FOREACH(ifi, &ifinfo_head, ifi_next) {
498                 if (ifi->sdl->sdl_index == ifindex)
499                         return (ifi);
500         }
501         return (NULL);
502 }
503
504 static int
505 make_packet(struct ifinfo *ifi)
506 {
507         size_t packlen = sizeof(struct nd_router_solicit), lladdroptlen = 0;
508         struct nd_router_solicit *rs;
509         char *buf;
510
511         if ((lladdroptlen = lladdropt_length(ifi->sdl)) == 0) {
512                 warnmsg(LOG_INFO, __func__,
513                     "link-layer address option has null length"
514                     " on %s. Treat as not included.", ifi->ifname);
515         }
516         packlen += lladdroptlen;
517         ifi->rs_datalen = packlen;
518
519         /* allocate buffer */
520         if ((buf = malloc(packlen)) == NULL) {
521                 warnmsg(LOG_ERR, __func__,
522                     "memory allocation failed for %s", ifi->ifname);
523                 return (-1);
524         }
525         ifi->rs_data = buf;
526
527         /* fill in the message */
528         rs = (struct nd_router_solicit *)buf;
529         rs->nd_rs_type = ND_ROUTER_SOLICIT;
530         rs->nd_rs_code = 0;
531         rs->nd_rs_cksum = 0;
532         rs->nd_rs_reserved = 0;
533         buf += sizeof(*rs);
534
535         /* fill in source link-layer address option */
536         if (lladdroptlen)
537                 lladdropt_fill(ifi->sdl, (struct nd_opt_hdr *)buf);
538
539         return (0);
540 }
541
542 static struct timespec *
543 rtsol_check_timer(void)
544 {
545         static struct timespec returnval;
546         struct timespec now, rtsol_timer;
547         struct ifinfo *ifi;
548         struct rainfo *rai;
549         struct ra_opt *rao, *raotmp;
550         int error, flags;
551
552         clock_gettime(CLOCK_MONOTONIC_FAST, &now);
553
554         rtsol_timer = tm_max;
555
556         TAILQ_FOREACH(ifi, &ifinfo_head, ifi_next) {
557                 if (TS_CMP(&ifi->expire, &now, <=)) {
558                         warnmsg(LOG_DEBUG, __func__, "timer expiration on %s, "
559                             "state = %d", ifi->ifname, ifi->state);
560
561                         while((rai = TAILQ_FIRST(&ifi->ifi_rainfo)) != NULL) {
562                                 /* Remove all RA options. */
563                                 TAILQ_REMOVE(&ifi->ifi_rainfo, rai, rai_next);
564                                 while ((rao = TAILQ_FIRST(&rai->rai_ra_opt)) !=
565                                     NULL) {
566                                         TAILQ_REMOVE(&rai->rai_ra_opt, rao,
567                                             rao_next);
568                                         if (rao->rao_msg != NULL)
569                                                 free(rao->rao_msg);
570                                         free(rao);
571                                 }
572                                 free(rai);
573                         }
574                         switch (ifi->state) {
575                         case IFS_DOWN:
576                         case IFS_TENTATIVE:
577                                 /* interface_up returns 0 on success */
578                                 flags = interface_up(ifi->ifname);
579                                 if (flags == 0)
580                                         ifi->state = IFS_DELAY;
581                                 else if (flags == IFS_TENTATIVE)
582                                         ifi->state = IFS_TENTATIVE;
583                                 else
584                                         ifi->state = IFS_DOWN;
585                                 break;
586                         case IFS_IDLE:
587                         {
588                                 int oldstatus = ifi->active;
589                                 int probe = 0;
590
591                                 ifi->active = interface_status(ifi);
592
593                                 if (oldstatus != ifi->active) {
594                                         warnmsg(LOG_DEBUG, __func__,
595                                             "%s status is changed"
596                                             " from %d to %d",
597                                             ifi->ifname,
598                                             oldstatus, ifi->active);
599                                         probe = 1;
600                                         ifi->state = IFS_DELAY;
601                                 } else if (ifi->probeinterval &&
602                                     (ifi->probetimer -=
603                                     ifi->timer.tv_sec) <= 0) {
604                                         /* probe timer expired */
605                                         ifi->probetimer =
606                                             ifi->probeinterval;
607                                         probe = 1;
608                                         ifi->state = IFS_PROBE;
609                                 }
610
611                                 /*
612                                  * If we need a probe, clear the previous
613                                  * status wrt the "managed/other" configuration.
614                                  */
615                                 if (probe) {
616                                         ifi->managedconfig = 0;
617                                         ifi->otherconfig = 0;
618                                 }
619                                 if (probe && mobile_node) {
620                                         error = cap_probe_defrouters(capsendmsg,
621                                             ifi);
622                                         if (error != 0)
623                                                 warnmsg(LOG_DEBUG, __func__,
624                                             "failed to probe routers: %d",
625                                                     error);
626                                 }
627                                 break;
628                         }
629                         case IFS_DELAY:
630                                 ifi->state = IFS_PROBE;
631                                 (void)cap_rssend(capsendmsg, ifi);
632                                 break;
633                         case IFS_PROBE:
634                                 if (ifi->probes < MAX_RTR_SOLICITATIONS)
635                                         (void)cap_rssend(capsendmsg, ifi);
636                                 else {
637                                         warnmsg(LOG_INFO, __func__,
638                                             "No answer after sending %d RSs",
639                                             ifi->probes);
640                                         ifi->probes = 0;
641                                         ifi->state = IFS_IDLE;
642                                 }
643                                 break;
644                         }
645                         rtsol_timer_update(ifi);
646                 } else {
647                         /* Expiration check for RA options. */
648                         int expire = 0;
649
650                         TAILQ_FOREACH(rai, &ifi->ifi_rainfo, rai_next) {
651                                 TAILQ_FOREACH_SAFE(rao, &rai->rai_ra_opt,
652                                     rao_next, raotmp) {
653                                         warnmsg(LOG_DEBUG, __func__,
654                                             "RA expiration timer: "
655                                             "type=%d, msg=%s, expire=%s",
656                                             rao->rao_type, (char *)rao->rao_msg,
657                                                 sec2str(&rao->rao_expire));
658                                         if (TS_CMP(&now, &rao->rao_expire,
659                                             >=)) {
660                                                 warnmsg(LOG_DEBUG, __func__,
661                                                     "RA expiration timer: "
662                                                     "expired.");
663                                                 TAILQ_REMOVE(&rai->rai_ra_opt,
664                                                     rao, rao_next);
665                                                 if (rao->rao_msg != NULL)
666                                                         free(rao->rao_msg);
667                                                 free(rao);
668                                                 expire = 1;
669                                         }
670                                 }
671                         }
672                         if (expire)
673                                 ra_opt_handler(ifi);
674                 }
675                 if (TS_CMP(&ifi->expire, &rtsol_timer, <))
676                         rtsol_timer = ifi->expire;
677         }
678
679         if (TS_CMP(&rtsol_timer, &tm_max, ==)) {
680                 warnmsg(LOG_DEBUG, __func__, "there is no timer");
681                 return (NULL);
682         } else if (TS_CMP(&rtsol_timer, &now, <))
683                 /* this may occur when the interval is too small */
684                 returnval.tv_sec = returnval.tv_nsec = 0;
685         else
686                 TS_SUB(&rtsol_timer, &now, &returnval);
687
688         now.tv_sec += returnval.tv_sec;
689         now.tv_nsec += returnval.tv_nsec;
690         warnmsg(LOG_DEBUG, __func__, "New timer is %s",
691             sec2str(&now));
692
693         return (&returnval);
694 }
695
696 void
697 rtsol_timer_update(struct ifinfo *ifi)
698 {
699 #define MILLION 1000000
700 #define DADRETRY 10             /* XXX: adhoc */
701         long interval;
702         struct timespec now;
703
704         bzero(&ifi->timer, sizeof(ifi->timer));
705
706         switch (ifi->state) {
707         case IFS_DOWN:
708         case IFS_TENTATIVE:
709                 if (++ifi->dadcount > DADRETRY) {
710                         ifi->dadcount = 0;
711                         ifi->timer.tv_sec = PROBE_INTERVAL;
712                 } else
713                         ifi->timer.tv_sec = 1;
714                 break;
715         case IFS_IDLE:
716                 if (mobile_node)
717                         /* XXX should be configurable */
718                         ifi->timer.tv_sec = 3;
719                 else
720                         ifi->timer = tm_max;    /* stop timer(valid?) */
721                 break;
722         case IFS_DELAY:
723                 interval = arc4random_uniform(MAX_RTR_SOLICITATION_DELAY * MILLION);
724                 ifi->timer.tv_sec = interval / MILLION;
725                 ifi->timer.tv_nsec = (interval % MILLION) * 1000;
726                 break;
727         case IFS_PROBE:
728                 if (ifi->probes < MAX_RTR_SOLICITATIONS)
729                         ifi->timer.tv_sec = RTR_SOLICITATION_INTERVAL;
730                 else
731                         /*
732                          * After sending MAX_RTR_SOLICITATIONS solicitations,
733                          * we're just waiting for possible replies; there
734                          * will be no more solicitation.  Thus, we change
735                          * the timer value to MAX_RTR_SOLICITATION_DELAY based
736                          * on RFC 2461, Section 6.3.7.
737                          */
738                         ifi->timer.tv_sec = MAX_RTR_SOLICITATION_DELAY;
739                 break;
740         default:
741                 warnmsg(LOG_ERR, __func__,
742                     "illegal interface state(%d) on %s",
743                     ifi->state, ifi->ifname);
744                 return;
745         }
746
747         /* reset the timer */
748         if (TS_CMP(&ifi->timer, &tm_max, ==)) {
749                 ifi->expire = tm_max;
750                 warnmsg(LOG_DEBUG, __func__,
751                     "stop timer for %s", ifi->ifname);
752         } else {
753                 clock_gettime(CLOCK_MONOTONIC_FAST, &now);
754                 TS_ADD(&now, &ifi->timer, &ifi->expire);
755
756                 now.tv_sec += ifi->timer.tv_sec;
757                 now.tv_nsec += ifi->timer.tv_nsec;
758                 warnmsg(LOG_DEBUG, __func__, "set timer for %s to %s",
759                     ifi->ifname, sec2str(&now));
760         }
761
762 #undef MILLION
763 }
764
765 static void
766 set_dumpfile(int sig __unused)
767 {
768
769         do_dump = 1;
770 }
771
772 static void
773 set_exit(int sig __unused)
774 {
775
776         do_exit = 1;
777 }
778
779 static void
780 usage(const char *progname)
781 {
782
783         if (strcmp(progname, "rtsold") == 0) {
784                 fprintf(stderr, "usage: rtsold [-dDfFm1] [-O script-name] "
785                     "[-p pidfile] [-R script-name] interface ...\n");
786                 fprintf(stderr, "usage: rtsold [-dDfFm1] [-O script-name] "
787                     "[-p pidfile] [-R script-name] -a\n");
788         } else {
789                 fprintf(stderr, "usage: rtsol [-dDF] [-O script-name] "
790                     "[-p pidfile] [-R script-name] interface ...\n");
791                 fprintf(stderr, "usage: rtsol [-dDF] [-O script-name] "
792                     "[-p pidfile] [-R script-name] -a\n");
793         }
794         exit(1);
795 }
796
797 void
798 warnmsg(int priority, const char *func, const char *msg, ...)
799 {
800         va_list ap;
801         char buf[BUFSIZ];
802
803         va_start(ap, msg);
804         if (fflag) {
805                 if (priority <= log_upto)
806                         vwarnx(msg, ap);
807         } else {
808                 snprintf(buf, sizeof(buf), "<%s> %s", func, msg);
809                 msg = buf;
810                 cap_vsyslog(capsyslog, priority, msg, ap);
811         }
812         va_end(ap);
813 }
814
815 /*
816  * return a list of interfaces which is suitable to sending an RS.
817  */
818 static char **
819 autoifprobe(void)
820 {
821         static char **argv = NULL;
822         static int n = 0;
823         char **a;
824         int s = 0, i, found;
825         struct ifaddrs *ifap, *ifa;
826         struct in6_ndireq nd;
827
828         /* initialize */
829         while (n--)
830                 free(argv[n]);
831         if (argv) {
832                 free(argv);
833                 argv = NULL;
834         }
835         n = 0;
836
837         if (getifaddrs(&ifap) != 0)
838                 return (NULL);
839
840         if (!Fflag && (s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
841                 warnmsg(LOG_ERR, __func__, "socket");
842                 exit(1);
843         }
844
845         /* find an ethernet */
846         for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
847                 if ((ifa->ifa_flags & IFF_UP) == 0)
848                         continue;
849                 if ((ifa->ifa_flags & IFF_POINTOPOINT) != 0)
850                         continue;
851                 if ((ifa->ifa_flags & IFF_LOOPBACK) != 0)
852                         continue;
853                 if ((ifa->ifa_flags & IFF_MULTICAST) == 0)
854                         continue;
855
856                 if (ifa->ifa_addr->sa_family != AF_INET6)
857                         continue;
858
859                 found = 0;
860                 for (i = 0; i < n; i++) {
861                         if (strcmp(argv[i], ifa->ifa_name) == 0) {
862                                 found++;
863                                 break;
864                         }
865                 }
866                 if (found)
867                         continue;
868
869                 /*
870                  * Skip the interfaces which IPv6 and/or accepting RA
871                  * is disabled.
872                  */
873                 if (!Fflag) {
874                         memset(&nd, 0, sizeof(nd));
875                         strlcpy(nd.ifname, ifa->ifa_name, sizeof(nd.ifname));
876                         if (ioctl(s, SIOCGIFINFO_IN6, (caddr_t)&nd) < 0) {
877                                 warnmsg(LOG_ERR, __func__,
878                                         "ioctl(SIOCGIFINFO_IN6)");
879                                 exit(1);
880                         }
881                         if ((nd.ndi.flags & ND6_IFF_IFDISABLED))
882                                 continue;
883                         if (!(nd.ndi.flags & ND6_IFF_ACCEPT_RTADV))
884                                 continue;
885                 }
886
887                 /* if we find multiple candidates, just warn. */
888                 if (n != 0 && dflag > 1)
889                         warnmsg(LOG_WARNING, __func__,
890                                 "multiple interfaces found");
891
892                 a = realloc(argv, (n + 1) * sizeof(char *));
893                 if (a == NULL) {
894                         warnmsg(LOG_ERR, __func__, "realloc");
895                         exit(1);
896                 }
897                 argv = a;
898                 argv[n] = strdup(ifa->ifa_name);
899                 if (!argv[n]) {
900                         warnmsg(LOG_ERR, __func__, "malloc");
901                         exit(1);
902                 }
903                 n++;
904         }
905
906         if (n) {
907                 a = realloc(argv, (n + 1) * sizeof(char *));
908                 if (a == NULL) {
909                         warnmsg(LOG_ERR, __func__, "realloc");
910                         exit(1);
911                 }
912                 argv = a;
913                 argv[n] = NULL;
914
915                 if (dflag > 0) {
916                         for (i = 0; i < n; i++)
917                                 warnmsg(LOG_WARNING, __func__, "probing %s",
918                                         argv[i]);
919                 }
920         }
921         if (!Fflag)
922                 close(s);
923         freeifaddrs(ifap);
924         return (argv);
925 }