1996-05-30 16:19:16 +00:00
|
|
|
/*
|
|
|
|
* Copyright (c) 1983, 1988, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
1999-05-02 13:14:16 +00:00
|
|
|
*
|
1999-08-28 00:22:10 +00:00
|
|
|
* $FreeBSD$
|
1996-05-30 16:19:16 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "defs.h"
|
|
|
|
#include "pathnames.h"
|
|
|
|
#ifdef sgi
|
|
|
|
#include "math.h"
|
|
|
|
#endif
|
|
|
|
#include <signal.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <sys/file.h>
|
|
|
|
|
2009-04-05 13:48:06 +00:00
|
|
|
__COPYRIGHT("@(#) Copyright (c) 1983, 1988, 1993 "
|
2004-02-25 23:20:22 +00:00
|
|
|
"The Regents of the University of California."
|
2009-04-05 13:48:06 +00:00
|
|
|
" All rights reserved.");
|
2004-02-25 23:20:22 +00:00
|
|
|
#ifdef __NetBSD__
|
1999-05-02 10:51:54 +00:00
|
|
|
__RCSID("$NetBSD$");
|
2004-02-25 23:20:22 +00:00
|
|
|
#include <util.h>
|
|
|
|
#elif defined(__FreeBSD__)
|
|
|
|
__RCSID("$FreeBSD$");
|
|
|
|
#else
|
2006-11-05 14:49:47 +00:00
|
|
|
__RCSID("$Revision: 2.31 $");
|
|
|
|
#ident "$Revision: 2.31 $"
|
1999-05-02 10:51:54 +00:00
|
|
|
#endif
|
|
|
|
|
1996-05-30 16:19:16 +00:00
|
|
|
pid_t mypid;
|
|
|
|
|
|
|
|
naddr myaddr; /* system address */
|
2009-04-05 15:55:09 +00:00
|
|
|
static char myname[MAXHOSTNAMELEN+1];
|
1996-05-30 16:19:16 +00:00
|
|
|
|
2009-04-05 15:55:09 +00:00
|
|
|
static int verbose;
|
1999-05-02 10:51:54 +00:00
|
|
|
|
1996-05-30 16:19:16 +00:00
|
|
|
int supplier; /* supply or broadcast updates */
|
|
|
|
int supplier_set;
|
2009-04-05 15:55:09 +00:00
|
|
|
static int ipforwarding = 1; /* kernel forwarding on */
|
1996-05-30 16:19:16 +00:00
|
|
|
|
2009-04-05 15:55:09 +00:00
|
|
|
static int default_gateway; /* 1=advertise default */
|
|
|
|
static int background = 1;
|
1996-05-30 16:19:16 +00:00
|
|
|
int ridhosts; /* 1=reduce host routes */
|
|
|
|
int mhome; /* 1=want multi-homed host route */
|
1998-07-28 06:36:31 +00:00
|
|
|
int advertise_mhome; /* 1=must continue advertising it */
|
1996-05-30 16:19:16 +00:00
|
|
|
int auth_ok = 1; /* 1=ignore auth if we do not care */
|
2014-09-21 04:00:28 +00:00
|
|
|
int insecure; /* Reply to special queries or not */
|
1996-05-30 16:19:16 +00:00
|
|
|
|
|
|
|
struct timeval epoch; /* when started */
|
2009-04-05 15:55:09 +00:00
|
|
|
struct timeval clk;
|
|
|
|
static struct timeval prev_clk;
|
1999-05-02 10:51:54 +00:00
|
|
|
static int usec_fudge;
|
1996-05-30 16:19:16 +00:00
|
|
|
struct timeval now; /* current idea of time */
|
|
|
|
time_t now_stale;
|
1996-09-16 16:51:32 +00:00
|
|
|
time_t now_expire;
|
1996-05-30 16:19:16 +00:00
|
|
|
time_t now_garbage;
|
|
|
|
|
2009-04-05 15:55:09 +00:00
|
|
|
static struct timeval next_bcast; /* next general broadcast */
|
2000-08-02 11:12:54 +00:00
|
|
|
struct timeval no_flash = { /* inhibit flash update */
|
|
|
|
EPOCH+SUPPLY_INTERVAL, 0
|
|
|
|
};
|
1996-05-30 16:19:16 +00:00
|
|
|
|
2009-04-05 15:55:09 +00:00
|
|
|
static struct timeval flush_kern_timer;
|
1999-05-02 10:51:54 +00:00
|
|
|
|
2009-04-05 15:55:09 +00:00
|
|
|
static fd_set fdbits;
|
|
|
|
static int sock_max;
|
1996-05-30 16:19:16 +00:00
|
|
|
int rip_sock = -1; /* RIP socket */
|
2009-04-05 16:01:56 +00:00
|
|
|
const struct interface *rip_sock_mcast; /* current multicast interface */
|
1996-05-30 16:19:16 +00:00
|
|
|
int rt_sock; /* routing socket */
|
|
|
|
int rt_sock_seqno;
|
|
|
|
|
|
|
|
|
|
|
|
static int get_rip_sock(naddr, int);
|
|
|
|
static void timevalsub(struct timeval *, struct timeval *, struct timeval *);
|
2009-04-05 15:55:09 +00:00
|
|
|
static void sigalrm(int s UNUSED);
|
|
|
|
static void sigterm(int sig);
|
1996-05-30 16:19:16 +00:00
|
|
|
|
|
|
|
int
|
|
|
|
main(int argc,
|
|
|
|
char *argv[])
|
|
|
|
{
|
|
|
|
int n, mib[4], off;
|
|
|
|
size_t len;
|
|
|
|
char *p, *q;
|
1999-05-02 10:51:54 +00:00
|
|
|
const char *cp;
|
1996-07-22 20:56:54 +00:00
|
|
|
struct timeval wtime, t2;
|
1996-05-30 16:19:16 +00:00
|
|
|
time_t dt;
|
|
|
|
fd_set ibits;
|
1996-11-20 15:23:40 +00:00
|
|
|
naddr p_net, p_mask;
|
1996-05-30 16:19:16 +00:00
|
|
|
struct interface *ifp;
|
1996-07-22 20:56:54 +00:00
|
|
|
struct parm parm;
|
1996-05-30 16:19:16 +00:00
|
|
|
char *tracename = 0;
|
|
|
|
|
|
|
|
|
1996-11-20 15:23:40 +00:00
|
|
|
/* Some shells are badly broken and send SIGHUP to backgrounded
|
|
|
|
* processes.
|
|
|
|
*/
|
|
|
|
signal(SIGHUP, SIG_IGN);
|
|
|
|
|
2004-02-25 23:20:22 +00:00
|
|
|
openlog("routed", LOG_PID, LOG_DAEMON);
|
1996-05-30 16:19:16 +00:00
|
|
|
ftrace = stdout;
|
|
|
|
|
|
|
|
gettimeofday(&clk, 0);
|
|
|
|
prev_clk = clk;
|
|
|
|
epoch = clk;
|
|
|
|
epoch.tv_sec -= EPOCH;
|
|
|
|
now.tv_sec = EPOCH;
|
|
|
|
now_stale = EPOCH - STALE_TIME;
|
1996-09-16 16:51:32 +00:00
|
|
|
now_expire = EPOCH - EXPIRE_TIME;
|
1996-05-30 16:19:16 +00:00
|
|
|
now_garbage = EPOCH - GARBAGE_TIME;
|
|
|
|
wtime.tv_sec = 0;
|
|
|
|
|
|
|
|
(void)gethostname(myname, sizeof(myname)-1);
|
|
|
|
(void)gethost(myname, &myaddr);
|
|
|
|
|
2014-09-21 04:00:28 +00:00
|
|
|
while ((n = getopt(argc, argv, "isqdghmAtvT:F:P:")) != -1) {
|
1996-05-30 16:19:16 +00:00
|
|
|
switch (n) {
|
2014-09-21 04:00:28 +00:00
|
|
|
case 'i':
|
|
|
|
insecure++;
|
|
|
|
break;
|
1996-05-30 16:19:16 +00:00
|
|
|
case 's':
|
|
|
|
supplier = 1;
|
|
|
|
supplier_set = 1;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'q':
|
|
|
|
supplier = 0;
|
|
|
|
supplier_set = 1;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'd':
|
|
|
|
background = 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'g':
|
1999-05-02 10:51:54 +00:00
|
|
|
memset(&parm, 0, sizeof(parm));
|
1996-07-22 20:56:54 +00:00
|
|
|
parm.parm_d_metric = 1;
|
1999-05-02 10:51:54 +00:00
|
|
|
cp = check_parms(&parm);
|
|
|
|
if (cp != 0)
|
|
|
|
msglog("bad -g: %s", cp);
|
1996-07-22 20:56:54 +00:00
|
|
|
else
|
|
|
|
default_gateway = 1;
|
1996-05-30 16:19:16 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 'h': /* suppress extra host routes */
|
|
|
|
ridhosts = 1;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'm': /* advertise host route */
|
|
|
|
mhome = 1; /* on multi-homed hosts */
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'A':
|
|
|
|
/* Ignore authentication if we do not care.
|
|
|
|
* Crazy as it is, that is what RFC 1723 requires.
|
|
|
|
*/
|
|
|
|
auth_ok = 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 't':
|
|
|
|
new_tracelevel++;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'T':
|
|
|
|
tracename = optarg;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'F': /* minimal routes for SLIP */
|
1996-11-20 15:23:40 +00:00
|
|
|
n = FAKE_METRIC;
|
1996-05-30 16:19:16 +00:00
|
|
|
p = strchr(optarg,',');
|
|
|
|
if (p && *p != '\0') {
|
|
|
|
n = (int)strtoul(p+1, &q, 0);
|
|
|
|
if (*q == '\0'
|
1996-07-22 20:56:54 +00:00
|
|
|
&& n <= HOPCNT_INFINITY-1
|
1996-05-30 16:19:16 +00:00
|
|
|
&& n >= 1)
|
|
|
|
*p = '\0';
|
|
|
|
}
|
1996-11-20 15:23:40 +00:00
|
|
|
if (!getnet(optarg, &p_net, &p_mask)) {
|
1996-07-22 20:56:54 +00:00
|
|
|
msglog("bad network; \"-F %s\"",
|
1996-05-30 16:19:16 +00:00
|
|
|
optarg);
|
|
|
|
break;
|
|
|
|
}
|
1999-05-02 10:51:54 +00:00
|
|
|
memset(&parm, 0, sizeof(parm));
|
1996-11-20 15:23:40 +00:00
|
|
|
parm.parm_net = p_net;
|
1996-07-22 20:56:54 +00:00
|
|
|
parm.parm_mask = p_mask;
|
|
|
|
parm.parm_d_metric = n;
|
1999-05-02 10:51:54 +00:00
|
|
|
cp = check_parms(&parm);
|
|
|
|
if (cp != 0)
|
|
|
|
msglog("bad -F: %s", cp);
|
1996-05-30 16:19:16 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 'P':
|
1999-05-02 10:51:54 +00:00
|
|
|
/* handle arbitrary parameters.
|
1996-05-30 16:19:16 +00:00
|
|
|
*/
|
1999-05-02 10:51:54 +00:00
|
|
|
q = strdup(optarg);
|
|
|
|
cp = parse_parms(q, 0);
|
|
|
|
if (cp != 0)
|
|
|
|
msglog("%s in \"-P %s\"", cp, optarg);
|
|
|
|
free(q);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'v':
|
|
|
|
/* display version */
|
|
|
|
verbose++;
|
2006-11-05 14:49:47 +00:00
|
|
|
msglog("version 2.31");
|
1996-05-30 16:19:16 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
goto usage;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
argc -= optind;
|
|
|
|
argv += optind;
|
|
|
|
|
|
|
|
if (tracename == 0 && argc >= 1) {
|
|
|
|
tracename = *argv++;
|
|
|
|
argc--;
|
|
|
|
}
|
1996-12-11 21:04:17 +00:00
|
|
|
if (tracename != 0 && tracename[0] == '\0')
|
|
|
|
goto usage;
|
1996-05-30 16:19:16 +00:00
|
|
|
if (argc != 0) {
|
|
|
|
usage:
|
2006-11-05 14:49:47 +00:00
|
|
|
logbad(0, "usage: routed [-sqdghmAtv] [-T tracefile]"
|
1996-05-30 16:19:16 +00:00
|
|
|
" [-F net[,metric]] [-P parms]");
|
|
|
|
}
|
1999-05-02 10:51:54 +00:00
|
|
|
if (geteuid() != 0) {
|
|
|
|
if (verbose)
|
|
|
|
exit(0);
|
1996-07-22 20:56:54 +00:00
|
|
|
logbad(0, "requires UID 0");
|
1999-05-02 10:51:54 +00:00
|
|
|
}
|
1996-05-30 16:19:16 +00:00
|
|
|
|
|
|
|
mib[0] = CTL_NET;
|
|
|
|
mib[1] = PF_INET;
|
|
|
|
mib[2] = IPPROTO_IP;
|
|
|
|
mib[3] = IPCTL_FORWARDING;
|
|
|
|
len = sizeof(ipforwarding);
|
|
|
|
if (sysctl(mib, 4, &ipforwarding, &len, 0, 0) < 0)
|
|
|
|
LOGERR("sysctl(IPCTL_FORWARDING)");
|
|
|
|
|
|
|
|
if (!ipforwarding) {
|
|
|
|
if (supplier)
|
|
|
|
msglog("-s incompatible with ipforwarding=0");
|
|
|
|
if (default_gateway) {
|
|
|
|
msglog("-g incompatible with ipforwarding=0");
|
|
|
|
default_gateway = 0;
|
|
|
|
}
|
|
|
|
supplier = 0;
|
|
|
|
supplier_set = 1;
|
|
|
|
}
|
|
|
|
if (default_gateway) {
|
|
|
|
if (supplier_set && !supplier) {
|
|
|
|
msglog("-g and -q incompatible");
|
|
|
|
} else {
|
|
|
|
supplier = 1;
|
|
|
|
supplier_set = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1996-09-16 16:51:32 +00:00
|
|
|
signal(SIGALRM, sigalrm);
|
|
|
|
if (!background)
|
|
|
|
signal(SIGHUP, sigterm); /* SIGHUP fatal during debugging */
|
|
|
|
signal(SIGTERM, sigterm);
|
|
|
|
signal(SIGINT, sigterm);
|
|
|
|
signal(SIGUSR1, sigtrace_on);
|
|
|
|
signal(SIGUSR2, sigtrace_off);
|
|
|
|
|
1996-05-30 16:19:16 +00:00
|
|
|
/* get into the background */
|
|
|
|
#ifdef sgi
|
1996-12-11 21:04:17 +00:00
|
|
|
if (0 > _daemonize(background ? 0 : (_DF_NOCHDIR|_DF_NOFORK),
|
1999-05-02 10:51:54 +00:00
|
|
|
STDIN_FILENO, STDOUT_FILENO, STDERR_FILENO))
|
1996-12-11 21:04:17 +00:00
|
|
|
BADERR(0, "_daemonize()");
|
1996-05-30 16:19:16 +00:00
|
|
|
#else
|
1999-05-02 10:51:54 +00:00
|
|
|
if (background && daemon(0, 1) < 0)
|
1996-12-11 21:04:17 +00:00
|
|
|
BADERR(0,"daemon()");
|
1996-05-30 16:19:16 +00:00
|
|
|
#endif
|
|
|
|
|
2004-02-25 23:20:22 +00:00
|
|
|
#if defined(__NetBSD__)
|
|
|
|
pidfile(0);
|
|
|
|
#endif
|
1996-05-30 16:19:16 +00:00
|
|
|
mypid = getpid();
|
2003-02-11 02:31:53 +00:00
|
|
|
#ifdef __FreeBSD__
|
|
|
|
srandomdev();
|
|
|
|
#else
|
1996-05-30 16:19:16 +00:00
|
|
|
srandom((int)(clk.tv_sec ^ clk.tv_usec ^ mypid));
|
2003-02-11 02:31:53 +00:00
|
|
|
#endif
|
1996-05-30 16:19:16 +00:00
|
|
|
|
|
|
|
/* prepare socket connected to the kernel.
|
|
|
|
*/
|
|
|
|
rt_sock = socket(AF_ROUTE, SOCK_RAW, 0);
|
|
|
|
if (rt_sock < 0)
|
|
|
|
BADERR(1,"rt_sock = socket()");
|
|
|
|
if (fcntl(rt_sock, F_SETFL, O_NONBLOCK) == -1)
|
|
|
|
logbad(1, "fcntl(rt_sock) O_NONBLOCK: %s", strerror(errno));
|
|
|
|
off = 0;
|
|
|
|
if (setsockopt(rt_sock, SOL_SOCKET,SO_USELOOPBACK,
|
|
|
|
&off,sizeof(off)) < 0)
|
|
|
|
LOGERR("setsockopt(SO_USELOOPBACK,0)");
|
1996-09-16 16:51:32 +00:00
|
|
|
|
1996-05-30 16:19:16 +00:00
|
|
|
fix_select();
|
|
|
|
|
|
|
|
|
|
|
|
if (tracename != 0) {
|
1996-12-11 21:04:17 +00:00
|
|
|
strncpy(inittracename, tracename, sizeof(inittracename)-1);
|
1999-05-02 10:51:54 +00:00
|
|
|
set_tracefile(inittracename, "%s", -1);
|
1996-12-11 21:04:17 +00:00
|
|
|
} else {
|
1999-05-02 10:51:54 +00:00
|
|
|
tracelevel_msg("%s", -1); /* turn on tracing to stdio */
|
1996-05-30 16:19:16 +00:00
|
|
|
}
|
1996-11-20 15:23:40 +00:00
|
|
|
|
|
|
|
bufinit();
|
1996-05-30 16:19:16 +00:00
|
|
|
|
|
|
|
/* initialize radix tree */
|
|
|
|
rtinit();
|
|
|
|
|
|
|
|
/* Pick a random part of the second for our output to minimize
|
|
|
|
* collisions.
|
|
|
|
*
|
|
|
|
* Start broadcasting after hearing from other routers, and
|
|
|
|
* at a random time so a bunch of systems do not get synchronized
|
|
|
|
* after a power failure.
|
|
|
|
*/
|
|
|
|
intvl_random(&next_bcast, EPOCH+MIN_WAITTIME, EPOCH+SUPPLY_INTERVAL);
|
|
|
|
age_timer.tv_usec = next_bcast.tv_usec;
|
|
|
|
age_timer.tv_sec = EPOCH+MIN_WAITTIME;
|
|
|
|
rdisc_timer = next_bcast;
|
|
|
|
ifinit_timer.tv_usec = next_bcast.tv_usec;
|
|
|
|
|
|
|
|
/* Collect an initial view of the world by checking the interface
|
|
|
|
* configuration and the kludge file.
|
|
|
|
*/
|
|
|
|
gwkludge();
|
|
|
|
ifinit();
|
|
|
|
|
|
|
|
/* Ask for routes */
|
|
|
|
rip_query();
|
1996-11-20 15:23:40 +00:00
|
|
|
rdisc_sol();
|
1996-05-30 16:19:16 +00:00
|
|
|
|
1999-05-02 10:51:54 +00:00
|
|
|
/* Now turn off stdio if not tracing */
|
|
|
|
if (new_tracelevel == 0)
|
|
|
|
trace_close(background);
|
|
|
|
|
1996-05-30 16:19:16 +00:00
|
|
|
/* Loop forever, listening and broadcasting.
|
|
|
|
*/
|
|
|
|
for (;;) {
|
|
|
|
prev_clk = clk;
|
|
|
|
gettimeofday(&clk, 0);
|
1999-05-02 10:51:54 +00:00
|
|
|
if (prev_clk.tv_sec == clk.tv_sec
|
|
|
|
&& prev_clk.tv_usec == clk.tv_usec+usec_fudge) {
|
|
|
|
/* Much of `routed` depends on time always advancing.
|
|
|
|
* On systems that do not guarantee that gettimeofday()
|
|
|
|
* produces unique timestamps even if called within
|
|
|
|
* a single tick, use trickery like that in classic
|
|
|
|
* BSD kernels.
|
1996-05-30 16:19:16 +00:00
|
|
|
*/
|
1999-05-02 10:51:54 +00:00
|
|
|
clk.tv_usec += ++usec_fudge;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
usec_fudge = 0;
|
|
|
|
|
|
|
|
timevalsub(&t2, &clk, &prev_clk);
|
|
|
|
if (t2.tv_sec < 0
|
|
|
|
|| t2.tv_sec > wtime.tv_sec + 5) {
|
|
|
|
/* Deal with time changes before other
|
|
|
|
* housekeeping to keep everything straight.
|
|
|
|
*/
|
|
|
|
dt = t2.tv_sec;
|
|
|
|
if (dt > 0)
|
|
|
|
dt -= wtime.tv_sec;
|
|
|
|
trace_act("time changed by %d sec", (int)dt);
|
|
|
|
epoch.tv_sec += dt;
|
|
|
|
}
|
1996-05-30 16:19:16 +00:00
|
|
|
}
|
|
|
|
timevalsub(&now, &clk, &epoch);
|
|
|
|
now_stale = now.tv_sec - STALE_TIME;
|
1996-09-16 16:51:32 +00:00
|
|
|
now_expire = now.tv_sec - EXPIRE_TIME;
|
1996-05-30 16:19:16 +00:00
|
|
|
now_garbage = now.tv_sec - GARBAGE_TIME;
|
|
|
|
|
1996-12-11 21:04:17 +00:00
|
|
|
/* deal with signals that should affect tracing */
|
|
|
|
set_tracelevel();
|
1996-05-30 16:19:16 +00:00
|
|
|
|
|
|
|
if (stopint != 0) {
|
1996-11-20 15:23:40 +00:00
|
|
|
rip_bcast(0);
|
|
|
|
rdisc_adv();
|
1999-05-02 10:51:54 +00:00
|
|
|
trace_off("exiting with signal %d", stopint);
|
1996-05-30 16:19:16 +00:00
|
|
|
exit(stopint | 128);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* look for new or dead interfaces */
|
|
|
|
timevalsub(&wtime, &ifinit_timer, &now);
|
|
|
|
if (wtime.tv_sec <= 0) {
|
1996-07-22 20:56:54 +00:00
|
|
|
wtime.tv_sec = 0;
|
1996-05-30 16:19:16 +00:00
|
|
|
ifinit();
|
|
|
|
rip_query();
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2012-01-07 16:09:33 +00:00
|
|
|
/* Check the kernel table occasionally for mysteriously
|
1999-05-02 10:51:54 +00:00
|
|
|
* evaporated routes
|
|
|
|
*/
|
|
|
|
timevalsub(&t2, &flush_kern_timer, &now);
|
|
|
|
if (t2.tv_sec <= 0) {
|
|
|
|
flush_kern();
|
|
|
|
flush_kern_timer.tv_sec = (now.tv_sec
|
|
|
|
+ CHECK_QUIET_INTERVAL);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (timercmp(&t2, &wtime, <))
|
|
|
|
wtime = t2;
|
|
|
|
|
1996-05-30 16:19:16 +00:00
|
|
|
/* If it is time, then broadcast our routes.
|
|
|
|
*/
|
|
|
|
if (supplier || advertise_mhome) {
|
1996-07-22 20:56:54 +00:00
|
|
|
timevalsub(&t2, &next_bcast, &now);
|
|
|
|
if (t2.tv_sec <= 0) {
|
1996-05-30 16:19:16 +00:00
|
|
|
/* Synchronize the aging and broadcast
|
|
|
|
* timers to minimize awakenings
|
|
|
|
*/
|
|
|
|
age(0);
|
|
|
|
|
|
|
|
rip_bcast(0);
|
|
|
|
|
|
|
|
/* It is desirable to send routing updates
|
|
|
|
* regularly. So schedule the next update
|
|
|
|
* 30 seconds after the previous one was
|
1997-09-12 10:52:49 +00:00
|
|
|
* scheduled, instead of 30 seconds after
|
1996-05-30 16:19:16 +00:00
|
|
|
* the previous update was finished.
|
|
|
|
* Even if we just started after discovering
|
|
|
|
* a 2nd interface or were otherwise delayed,
|
2012-01-07 16:09:33 +00:00
|
|
|
* pick a 30-second anniversary of the
|
1996-05-30 16:19:16 +00:00
|
|
|
* original broadcast time.
|
|
|
|
*/
|
1996-07-22 20:56:54 +00:00
|
|
|
n = 1 + (0-t2.tv_sec)/SUPPLY_INTERVAL;
|
1996-05-30 16:19:16 +00:00
|
|
|
next_bcast.tv_sec += n*SUPPLY_INTERVAL;
|
|
|
|
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
1996-07-22 20:56:54 +00:00
|
|
|
if (timercmp(&t2, &wtime, <))
|
|
|
|
wtime = t2;
|
1996-05-30 16:19:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* If we need a flash update, either do it now or
|
|
|
|
* set the delay to end when it is time.
|
|
|
|
*
|
|
|
|
* If we are within MIN_WAITTIME seconds of a full update,
|
|
|
|
* do not bother.
|
|
|
|
*/
|
|
|
|
if (need_flash
|
|
|
|
&& supplier
|
|
|
|
&& no_flash.tv_sec+MIN_WAITTIME < next_bcast.tv_sec) {
|
|
|
|
/* accurate to the millisecond */
|
|
|
|
if (!timercmp(&no_flash, &now, >))
|
|
|
|
rip_bcast(1);
|
1996-07-22 20:56:54 +00:00
|
|
|
timevalsub(&t2, &no_flash, &now);
|
|
|
|
if (timercmp(&t2, &wtime, <))
|
|
|
|
wtime = t2;
|
1996-05-30 16:19:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* trigger the main aging timer.
|
|
|
|
*/
|
1996-07-22 20:56:54 +00:00
|
|
|
timevalsub(&t2, &age_timer, &now);
|
|
|
|
if (t2.tv_sec <= 0) {
|
1996-05-30 16:19:16 +00:00
|
|
|
age(0);
|
|
|
|
continue;
|
|
|
|
}
|
1996-07-22 20:56:54 +00:00
|
|
|
if (timercmp(&t2, &wtime, <))
|
|
|
|
wtime = t2;
|
1996-05-30 16:19:16 +00:00
|
|
|
|
|
|
|
/* update the kernel routing table
|
|
|
|
*/
|
1996-07-22 20:56:54 +00:00
|
|
|
timevalsub(&t2, &need_kern, &now);
|
|
|
|
if (t2.tv_sec <= 0) {
|
1996-05-30 16:19:16 +00:00
|
|
|
age(0);
|
|
|
|
continue;
|
|
|
|
}
|
1996-07-22 20:56:54 +00:00
|
|
|
if (timercmp(&t2, &wtime, <))
|
|
|
|
wtime = t2;
|
1996-05-30 16:19:16 +00:00
|
|
|
|
|
|
|
/* take care of router discovery,
|
1999-05-02 10:51:54 +00:00
|
|
|
* but do it in the correct the millisecond
|
1996-05-30 16:19:16 +00:00
|
|
|
*/
|
|
|
|
if (!timercmp(&rdisc_timer, &now, >)) {
|
|
|
|
rdisc_age(0);
|
|
|
|
continue;
|
|
|
|
}
|
1996-07-22 20:56:54 +00:00
|
|
|
timevalsub(&t2, &rdisc_timer, &now);
|
|
|
|
if (timercmp(&t2, &wtime, <))
|
|
|
|
wtime = t2;
|
1996-05-30 16:19:16 +00:00
|
|
|
|
|
|
|
|
|
|
|
/* wait for input or a timer to expire.
|
|
|
|
*/
|
|
|
|
trace_flush();
|
1996-07-22 20:56:54 +00:00
|
|
|
ibits = fdbits;
|
1996-05-30 16:19:16 +00:00
|
|
|
n = select(sock_max, &ibits, 0, 0, &wtime);
|
|
|
|
if (n <= 0) {
|
|
|
|
if (n < 0 && errno != EINTR && errno != EAGAIN)
|
|
|
|
BADERR(1,"select");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (FD_ISSET(rt_sock, &ibits)) {
|
|
|
|
read_rt();
|
|
|
|
n--;
|
|
|
|
}
|
|
|
|
if (rdisc_sock >= 0 && FD_ISSET(rdisc_sock, &ibits)) {
|
|
|
|
read_d();
|
|
|
|
n--;
|
|
|
|
}
|
|
|
|
if (rip_sock >= 0 && FD_ISSET(rip_sock, &ibits)) {
|
|
|
|
read_rip(rip_sock, 0);
|
|
|
|
n--;
|
|
|
|
}
|
|
|
|
|
2009-04-05 14:01:39 +00:00
|
|
|
LIST_FOREACH(ifp, &ifnet, int_list) {
|
|
|
|
if (n <= 0)
|
|
|
|
break;
|
1996-05-30 16:19:16 +00:00
|
|
|
if (ifp->int_rip_sock >= 0
|
|
|
|
&& FD_ISSET(ifp->int_rip_sock, &ibits)) {
|
|
|
|
read_rip(ifp->int_rip_sock, ifp);
|
|
|
|
n--;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* ARGSUSED */
|
2009-04-05 15:55:09 +00:00
|
|
|
static void
|
1999-05-02 10:51:54 +00:00
|
|
|
sigalrm(int s UNUSED)
|
1996-05-30 16:19:16 +00:00
|
|
|
{
|
|
|
|
/* Historically, SIGALRM would cause the daemon to check for
|
|
|
|
* new and broken interfaces.
|
|
|
|
*/
|
|
|
|
ifinit_timer.tv_sec = now.tv_sec;
|
1996-11-20 15:23:40 +00:00
|
|
|
trace_act("SIGALRM");
|
1996-05-30 16:19:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* watch for fatal signals */
|
2009-04-05 15:55:09 +00:00
|
|
|
static void
|
1996-05-30 16:19:16 +00:00
|
|
|
sigterm(int sig)
|
|
|
|
{
|
|
|
|
stopint = sig;
|
|
|
|
(void)signal(sig, SIG_DFL); /* catch it only once */
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
fix_select(void)
|
|
|
|
{
|
|
|
|
struct interface *ifp;
|
|
|
|
|
|
|
|
|
|
|
|
FD_ZERO(&fdbits);
|
|
|
|
sock_max = 0;
|
|
|
|
|
|
|
|
FD_SET(rt_sock, &fdbits);
|
|
|
|
if (sock_max <= rt_sock)
|
|
|
|
sock_max = rt_sock+1;
|
|
|
|
if (rip_sock >= 0) {
|
|
|
|
FD_SET(rip_sock, &fdbits);
|
|
|
|
if (sock_max <= rip_sock)
|
|
|
|
sock_max = rip_sock+1;
|
|
|
|
}
|
2009-04-05 14:01:39 +00:00
|
|
|
LIST_FOREACH(ifp, &ifnet, int_list) {
|
1996-05-30 16:19:16 +00:00
|
|
|
if (ifp->int_rip_sock >= 0) {
|
|
|
|
FD_SET(ifp->int_rip_sock, &fdbits);
|
|
|
|
if (sock_max <= ifp->int_rip_sock)
|
|
|
|
sock_max = ifp->int_rip_sock+1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (rdisc_sock >= 0) {
|
|
|
|
FD_SET(rdisc_sock, &fdbits);
|
|
|
|
if (sock_max <= rdisc_sock)
|
|
|
|
sock_max = rdisc_sock+1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
fix_sock(int sock,
|
1999-05-02 10:51:54 +00:00
|
|
|
const char *name)
|
1996-05-30 16:19:16 +00:00
|
|
|
{
|
|
|
|
int on;
|
|
|
|
#define MIN_SOCKBUF (4*1024)
|
|
|
|
static int rbuf;
|
|
|
|
|
|
|
|
if (fcntl(sock, F_SETFL, O_NONBLOCK) == -1)
|
|
|
|
logbad(1, "fcntl(%s) O_NONBLOCK: %s",
|
|
|
|
name, strerror(errno));
|
|
|
|
on = 1;
|
1996-11-20 15:23:40 +00:00
|
|
|
if (setsockopt(sock, SOL_SOCKET,SO_BROADCAST, &on,sizeof(on)) < 0)
|
1996-05-30 16:19:16 +00:00
|
|
|
msglog("setsockopt(%s,SO_BROADCAST): %s",
|
|
|
|
name, strerror(errno));
|
1996-11-20 15:23:40 +00:00
|
|
|
#ifdef USE_PASSIFNAME
|
|
|
|
on = 1;
|
|
|
|
if (setsockopt(sock, SOL_SOCKET, SO_PASSIFNAME, &on,sizeof(on)) < 0)
|
|
|
|
msglog("setsockopt(%s,SO_PASSIFNAME): %s",
|
|
|
|
name, strerror(errno));
|
|
|
|
#endif
|
|
|
|
|
1996-05-30 16:19:16 +00:00
|
|
|
if (rbuf >= MIN_SOCKBUF) {
|
|
|
|
if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
|
|
|
|
&rbuf, sizeof(rbuf)) < 0)
|
|
|
|
msglog("setsockopt(%s,SO_RCVBUF=%d): %s",
|
|
|
|
name, rbuf, strerror(errno));
|
|
|
|
} else {
|
|
|
|
for (rbuf = 60*1024; ; rbuf -= 4096) {
|
|
|
|
if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
|
|
|
|
&rbuf, sizeof(rbuf)) == 0) {
|
1996-11-20 15:23:40 +00:00
|
|
|
trace_act("RCVBUF=%d", rbuf);
|
1996-05-30 16:19:16 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (rbuf < MIN_SOCKBUF) {
|
|
|
|
msglog("setsockopt(%s,SO_RCVBUF = %d): %s",
|
|
|
|
name, rbuf, strerror(errno));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* get a rip socket
|
|
|
|
*/
|
|
|
|
static int /* <0 or file descriptor */
|
|
|
|
get_rip_sock(naddr addr,
|
|
|
|
int serious) /* 1=failure to bind is serious */
|
|
|
|
{
|
2004-02-25 23:20:22 +00:00
|
|
|
struct sockaddr_in rsin;
|
1996-05-30 16:19:16 +00:00
|
|
|
unsigned char ttl;
|
|
|
|
int s;
|
|
|
|
|
|
|
|
|
|
|
|
if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
|
|
|
|
BADERR(1,"rip_sock = socket()");
|
|
|
|
|
2004-02-25 23:20:22 +00:00
|
|
|
memset(&rsin, 0, sizeof(rsin));
|
1996-05-30 16:19:16 +00:00
|
|
|
#ifdef _HAVE_SIN_LEN
|
2004-02-25 23:20:22 +00:00
|
|
|
rsin.sin_len = sizeof(rsin);
|
1996-05-30 16:19:16 +00:00
|
|
|
#endif
|
2004-02-25 23:20:22 +00:00
|
|
|
rsin.sin_family = AF_INET;
|
|
|
|
rsin.sin_port = htons(RIP_PORT);
|
|
|
|
rsin.sin_addr.s_addr = addr;
|
|
|
|
if (bind(s, (struct sockaddr *)&rsin, sizeof(rsin)) < 0) {
|
1996-05-30 16:19:16 +00:00
|
|
|
if (serious)
|
|
|
|
BADERR(errno != EADDRINUSE, "bind(rip_sock)");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
fix_sock(s,"rip_sock");
|
|
|
|
|
|
|
|
ttl = 1;
|
|
|
|
if (setsockopt(s, IPPROTO_IP, IP_MULTICAST_TTL,
|
|
|
|
&ttl, sizeof(ttl)) < 0)
|
|
|
|
DBGERR(1,"rip_sock setsockopt(IP_MULTICAST_TTL)");
|
|
|
|
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* turn off main RIP socket */
|
|
|
|
void
|
|
|
|
rip_off(void)
|
|
|
|
{
|
|
|
|
struct interface *ifp;
|
1999-05-02 10:51:54 +00:00
|
|
|
naddr addr;
|
1996-05-30 16:19:16 +00:00
|
|
|
|
|
|
|
|
1996-07-22 20:56:54 +00:00
|
|
|
if (rip_sock >= 0 && !mhome) {
|
1996-11-20 15:23:40 +00:00
|
|
|
trace_act("turn off RIP");
|
1996-05-30 16:19:16 +00:00
|
|
|
|
|
|
|
(void)close(rip_sock);
|
|
|
|
rip_sock = -1;
|
|
|
|
|
|
|
|
/* get non-broadcast sockets to listen to queries.
|
|
|
|
*/
|
2009-04-05 14:01:39 +00:00
|
|
|
LIST_FOREACH(ifp, &ifnet, int_list) {
|
1996-11-20 15:23:40 +00:00
|
|
|
if (ifp->int_state & IS_REMOTE)
|
|
|
|
continue;
|
|
|
|
if (ifp->int_rip_sock < 0) {
|
1996-05-30 16:19:16 +00:00
|
|
|
addr = ((ifp->int_if_flags & IFF_POINTOPOINT)
|
|
|
|
? ifp->int_dstaddr
|
|
|
|
: ifp->int_addr);
|
|
|
|
ifp->int_rip_sock = get_rip_sock(addr, 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fix_select();
|
|
|
|
|
|
|
|
age(0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1996-07-22 20:56:54 +00:00
|
|
|
/* turn on RIP multicast input via an interface
|
1996-05-30 16:19:16 +00:00
|
|
|
*/
|
1996-07-22 20:56:54 +00:00
|
|
|
static void
|
|
|
|
rip_mcast_on(struct interface *ifp)
|
1996-05-30 16:19:16 +00:00
|
|
|
{
|
2008-07-30 11:56:15 +00:00
|
|
|
struct group_req gr;
|
|
|
|
struct sockaddr_in *sin;
|
1996-05-30 16:19:16 +00:00
|
|
|
|
1996-07-22 20:56:54 +00:00
|
|
|
if (!IS_RIP_IN_OFF(ifp->int_state)
|
|
|
|
&& (ifp->int_if_flags & IFF_MULTICAST)
|
|
|
|
&& !(ifp->int_state & IS_ALIAS)) {
|
2008-07-30 11:56:15 +00:00
|
|
|
memset(&gr, 0, sizeof(gr));
|
|
|
|
gr.gr_interface = ifp->int_index;
|
|
|
|
sin = (struct sockaddr_in *)&gr.gr_group;
|
|
|
|
sin->sin_family = AF_INET;
|
|
|
|
#ifdef _HAVE_SIN_LEN
|
|
|
|
sin->sin_len = sizeof(struct sockaddr_in);
|
2004-02-25 23:20:22 +00:00
|
|
|
#endif
|
2008-07-30 11:56:15 +00:00
|
|
|
sin->sin_addr.s_addr = htonl(INADDR_RIP_GROUP);
|
|
|
|
if (setsockopt(rip_sock, IPPROTO_IP, MCAST_JOIN_GROUP,
|
|
|
|
&gr, sizeof(gr)) < 0)
|
|
|
|
LOGERR("setsockopt(MCAST_JOIN_GROUP RIP)");
|
1996-07-22 20:56:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Prepare socket used for RIP.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
rip_on(struct interface *ifp)
|
|
|
|
{
|
|
|
|
/* If the main RIP socket is already alive, only start receiving
|
|
|
|
* multicasts for this interface.
|
|
|
|
*/
|
|
|
|
if (rip_sock >= 0) {
|
2016-05-14 22:40:08 +00:00
|
|
|
if (ifp != NULL)
|
1996-07-22 20:56:54 +00:00
|
|
|
rip_mcast_on(ifp);
|
1996-05-30 16:19:16 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
1996-11-20 15:23:40 +00:00
|
|
|
/* If the main RIP socket is off and it makes sense to turn it on,
|
|
|
|
* then turn it on for all of the interfaces.
|
1999-05-02 10:51:54 +00:00
|
|
|
* It makes sense if either router discovery is off, or if
|
|
|
|
* router discover is on and at most one interface is doing RIP.
|
1996-07-22 20:56:54 +00:00
|
|
|
*/
|
1999-05-02 10:51:54 +00:00
|
|
|
if (rip_interfaces > 0 && (!rdisc_ok || rip_interfaces > 1)) {
|
1996-11-20 15:23:40 +00:00
|
|
|
trace_act("turn on RIP");
|
1996-05-30 16:19:16 +00:00
|
|
|
|
|
|
|
/* Close all of the query sockets so that we can open
|
|
|
|
* the main socket. SO_REUSEPORT is not a solution,
|
|
|
|
* since that would let two daemons bind to the broadcast
|
|
|
|
* socket.
|
|
|
|
*/
|
2009-04-05 14:01:39 +00:00
|
|
|
LIST_FOREACH(ifp, &ifnet, int_list) {
|
1996-05-30 16:19:16 +00:00
|
|
|
if (ifp->int_rip_sock >= 0) {
|
|
|
|
(void)close(ifp->int_rip_sock);
|
|
|
|
ifp->int_rip_sock = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
rip_sock = get_rip_sock(INADDR_ANY, 1);
|
2016-05-14 22:40:08 +00:00
|
|
|
rip_sock_mcast = NULL;
|
1996-05-30 16:19:16 +00:00
|
|
|
|
|
|
|
/* Do not advertise anything until we have heard something
|
|
|
|
*/
|
|
|
|
if (next_bcast.tv_sec < now.tv_sec+MIN_WAITTIME)
|
|
|
|
next_bcast.tv_sec = now.tv_sec+MIN_WAITTIME;
|
|
|
|
|
2009-04-05 14:01:39 +00:00
|
|
|
LIST_FOREACH(ifp, &ifnet, int_list) {
|
1996-11-20 15:23:40 +00:00
|
|
|
ifp->int_query_time = NEVER;
|
1996-07-22 20:56:54 +00:00
|
|
|
rip_mcast_on(ifp);
|
1996-05-30 16:19:16 +00:00
|
|
|
}
|
|
|
|
ifinit_timer.tv_sec = now.tv_sec;
|
|
|
|
|
2016-05-14 22:40:08 +00:00
|
|
|
} else if (ifp != NULL
|
1996-11-20 15:23:40 +00:00
|
|
|
&& !(ifp->int_state & IS_REMOTE)
|
|
|
|
&& ifp->int_rip_sock < 0) {
|
1996-05-30 16:19:16 +00:00
|
|
|
/* RIP is off, so ensure there are sockets on which
|
|
|
|
* to listen for queries.
|
|
|
|
*/
|
|
|
|
ifp->int_rip_sock = get_rip_sock(ifp->int_addr, 0);
|
|
|
|
}
|
1996-11-20 15:23:40 +00:00
|
|
|
|
|
|
|
fix_select();
|
1996-05-30 16:19:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
1996-08-27 16:13:00 +00:00
|
|
|
/* die if malloc(3) fails
|
|
|
|
*/
|
|
|
|
void *
|
|
|
|
rtmalloc(size_t size,
|
1999-05-02 10:51:54 +00:00
|
|
|
const char *msg)
|
1996-08-27 16:13:00 +00:00
|
|
|
{
|
|
|
|
void *p = malloc(size);
|
2016-05-14 22:40:08 +00:00
|
|
|
if (p == NULL)
|
1999-05-02 10:51:54 +00:00
|
|
|
logbad(1,"malloc(%lu) failed in %s", (u_long)size, msg);
|
1996-08-27 16:13:00 +00:00
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1996-05-30 16:19:16 +00:00
|
|
|
/* get a random instant in an interval
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
intvl_random(struct timeval *tp, /* put value here */
|
|
|
|
u_long lo, /* value is after this second */
|
|
|
|
u_long hi) /* and before this */
|
|
|
|
{
|
|
|
|
tp->tv_sec = (time_t)(hi == lo
|
|
|
|
? lo
|
2016-05-14 23:22:19 +00:00
|
|
|
: (lo + arc4random() % ((hi - lo))));
|
|
|
|
tp->tv_usec = arc4random() % 1000000;
|
1996-05-30 16:19:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
timevaladd(struct timeval *t1,
|
|
|
|
struct timeval *t2)
|
|
|
|
{
|
|
|
|
|
|
|
|
t1->tv_sec += t2->tv_sec;
|
1998-07-28 06:36:31 +00:00
|
|
|
if ((t1->tv_usec += t2->tv_usec) >= 1000000) {
|
1996-05-30 16:19:16 +00:00
|
|
|
t1->tv_sec++;
|
|
|
|
t1->tv_usec -= 1000000;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* t1 = t2 - t3
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
timevalsub(struct timeval *t1,
|
|
|
|
struct timeval *t2,
|
|
|
|
struct timeval *t3)
|
|
|
|
{
|
|
|
|
t1->tv_sec = t2->tv_sec - t3->tv_sec;
|
|
|
|
if ((t1->tv_usec = t2->tv_usec - t3->tv_usec) < 0) {
|
|
|
|
t1->tv_sec--;
|
|
|
|
t1->tv_usec += 1000000;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1996-11-20 15:23:40 +00:00
|
|
|
/* put a message into the system log
|
|
|
|
*/
|
1996-05-30 16:19:16 +00:00
|
|
|
void
|
1999-05-02 10:51:54 +00:00
|
|
|
msglog(const char *p, ...)
|
1996-05-30 16:19:16 +00:00
|
|
|
{
|
|
|
|
va_list args;
|
|
|
|
|
|
|
|
trace_flush();
|
|
|
|
|
|
|
|
va_start(args, p);
|
|
|
|
vsyslog(LOG_ERR, p, args);
|
2006-11-05 14:49:47 +00:00
|
|
|
va_end(args);
|
2016-05-14 22:40:08 +00:00
|
|
|
if (ftrace != NULL) {
|
1996-05-30 16:19:16 +00:00
|
|
|
if (ftrace == stdout)
|
|
|
|
(void)fputs("routed: ", ftrace);
|
2006-11-05 14:49:47 +00:00
|
|
|
va_start(args, p);
|
1996-05-30 16:19:16 +00:00
|
|
|
(void)vfprintf(ftrace, p, args);
|
2006-11-05 14:49:47 +00:00
|
|
|
va_end(args);
|
1996-05-30 16:19:16 +00:00
|
|
|
(void)fputc('\n', ftrace);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1996-12-11 21:04:17 +00:00
|
|
|
/* Put a message about a bad system into the system log if
|
1996-11-20 15:23:40 +00:00
|
|
|
* we have not complained about it recently.
|
1996-12-11 21:04:17 +00:00
|
|
|
*
|
|
|
|
* It is desirable to complain about all bad systems, but not too often.
|
|
|
|
* In the worst case, it is not practical to keep track of all bad systems.
|
|
|
|
* For example, there can be many systems with the wrong password.
|
1996-11-20 15:23:40 +00:00
|
|
|
*/
|
|
|
|
void
|
1999-05-02 10:51:54 +00:00
|
|
|
msglim(struct msg_limit *lim, naddr addr, const char *p, ...)
|
1996-11-20 15:23:40 +00:00
|
|
|
{
|
|
|
|
va_list args;
|
1996-12-11 21:04:17 +00:00
|
|
|
int i;
|
|
|
|
struct msg_sub *ms1, *ms;
|
1999-05-02 10:51:54 +00:00
|
|
|
const char *p1;
|
1996-11-20 15:23:40 +00:00
|
|
|
|
1996-12-11 21:04:17 +00:00
|
|
|
/* look for the oldest slot in the table
|
|
|
|
* or the slot for the bad router.
|
|
|
|
*/
|
|
|
|
ms = ms1 = lim->subs;
|
|
|
|
for (i = MSG_SUBJECT_N; ; i--, ms1++) {
|
|
|
|
if (i == 0) {
|
|
|
|
/* Reuse a slot at most once every 10 minutes.
|
|
|
|
*/
|
|
|
|
if (lim->reuse > now.tv_sec) {
|
2016-05-14 22:40:08 +00:00
|
|
|
ms = NULL;
|
1996-12-11 21:04:17 +00:00
|
|
|
} else {
|
|
|
|
ms = ms1;
|
|
|
|
lim->reuse = now.tv_sec + 10*60;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (ms->addr == addr) {
|
|
|
|
/* Repeat a complaint about a given system at
|
|
|
|
* most once an hour.
|
|
|
|
*/
|
|
|
|
if (ms->until > now.tv_sec)
|
2016-05-14 22:40:08 +00:00
|
|
|
ms = NULL;
|
1996-12-11 21:04:17 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (ms->until < ms1->until)
|
|
|
|
ms = ms1;
|
|
|
|
}
|
2016-05-14 22:40:08 +00:00
|
|
|
if (ms != NULL) {
|
1996-12-11 21:04:17 +00:00
|
|
|
ms->addr = addr;
|
|
|
|
ms->until = now.tv_sec + 60*60; /* 60 minutes */
|
1996-11-20 15:23:40 +00:00
|
|
|
|
|
|
|
trace_flush();
|
|
|
|
for (p1 = p; *p1 == ' '; p1++)
|
|
|
|
continue;
|
2006-11-05 14:49:47 +00:00
|
|
|
va_start(args, p);
|
1996-11-20 15:23:40 +00:00
|
|
|
vsyslog(LOG_ERR, p1, args);
|
2006-11-05 14:49:47 +00:00
|
|
|
va_end(args);
|
1996-11-20 15:23:40 +00:00
|
|
|
}
|
|
|
|
|
1996-12-11 21:04:17 +00:00
|
|
|
/* always display the message if tracing */
|
2016-05-14 22:40:08 +00:00
|
|
|
if (ftrace != NULL) {
|
2006-11-05 14:49:47 +00:00
|
|
|
va_start(args, p);
|
1996-11-20 15:23:40 +00:00
|
|
|
(void)vfprintf(ftrace, p, args);
|
2006-11-05 14:49:47 +00:00
|
|
|
va_end(args);
|
1996-11-20 15:23:40 +00:00
|
|
|
(void)fputc('\n', ftrace);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1996-05-30 16:19:16 +00:00
|
|
|
void
|
1999-05-02 10:51:54 +00:00
|
|
|
logbad(int dump, const char *p, ...)
|
1996-05-30 16:19:16 +00:00
|
|
|
{
|
|
|
|
va_list args;
|
|
|
|
|
|
|
|
trace_flush();
|
|
|
|
|
|
|
|
va_start(args, p);
|
|
|
|
vsyslog(LOG_ERR, p, args);
|
2006-11-05 14:49:47 +00:00
|
|
|
va_end(args);
|
1996-05-30 16:19:16 +00:00
|
|
|
(void)fputs("routed: ", stderr);
|
2006-11-05 14:49:47 +00:00
|
|
|
va_start(args, p);
|
1996-05-30 16:19:16 +00:00
|
|
|
(void)vfprintf(stderr, p, args);
|
2006-11-05 14:49:47 +00:00
|
|
|
va_end(args);
|
1996-05-30 16:19:16 +00:00
|
|
|
(void)fputs("; giving up\n",stderr);
|
|
|
|
(void)fflush(stderr);
|
|
|
|
|
|
|
|
if (dump)
|
|
|
|
abort();
|
|
|
|
exit(1);
|
|
|
|
}
|