xref: /netbsd-src/sbin/routed/main.c (revision b1c86f5f087524e68db12794ee9c3e3da1ab17a0)
1 /*	$NetBSD: main.c,v 1.41 2009/10/26 02:53:15 christos Exp $	*/
2 
3 /*
4  * Copyright (c) 1983, 1988, 1993
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. All advertising materials mentioning features or use of this software
16  *    must display the following acknowledgment:
17  *	This product includes software developed by the University of
18  *	California, Berkeley and its contributors.
19  * 4. Neither the name of the University nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include "defs.h"
37 #include "pathnames.h"
38 #ifdef sgi
39 #include "math.h"
40 #endif
41 #if defined(__NetBSD__)
42 #include <util.h>
43 #endif
44 #include <signal.h>
45 #include <fcntl.h>
46 #include <sys/file.h>
47 
48 __COPYRIGHT("@(#) Copyright (c) 1983, 1988, 1993\
49  The Regents of the University of California.  All rights reserved.");
50 #ifdef __NetBSD__
51 __RCSID("$NetBSD: main.c,v 1.41 2009/10/26 02:53:15 christos Exp $");
52 #elif defined(__FreeBSD__)
53 __RCSID("$FreeBSD$");
54 #else
55 __RCSID("Revision: 2.27 ");
56 #ident "Revision: 2.27 "
57 #endif
58 
59 pid_t	mypid;
60 
61 naddr	myaddr;				/* system address */
62 char	myname[MAXHOSTNAMELEN+1];
63 
64 int	verbose;
65 
66 int	supplier;			/* supply or broadcast updates */
67 int	supplier_set;
68 int	ipforwarding = 1;		/* kernel forwarding on */
69 
70 int	default_gateway;		/* 1=advertise default */
71 int	background = 1;
72 int	ridhosts;			/* 1=reduce host routes */
73 int	mhome;				/* 1=want multi-homed host route */
74 int	advertise_mhome;		/* 1=must continue advertising it */
75 int	auth_ok = 1;			/* 1=ignore auth if we do not care */
76 
77 struct timeval epoch;			/* when started */
78 struct timeval clk, prev_clk;
79 static int usec_fudge;
80 struct timeval now;			/* current idea of time */
81 time_t	now_stale;
82 time_t	now_expire;
83 time_t	now_garbage;
84 
85 struct timeval next_bcast;		/* next general broadcast */
86 struct timeval no_flash = {		/* inhibit flash update */
87 	EPOCH+SUPPLY_INTERVAL, 0
88 };
89 
90 struct timeval flush_kern_timer;
91 
92 fd_set	*fdbitsp;
93 int	sock_max;
94 int	rip_sock = -1;			/* RIP socket */
95 struct interface *rip_sock_mcast;	/* current multicast interface */
96 int	rt_sock;			/* routing socket */
97 int	rt_sock_seqno;
98 
99 
100 static  int get_rip_sock(naddr, int);
101 static void timevalsub(struct timeval *, struct timeval *, struct timeval *);
102 
103 int
104 main(int argc,
105      char *argv[])
106 {
107 	int n, mib[4], off;
108 	size_t len;
109 	char *p, *q;
110 	const char *cp;
111 	struct timeval wtime, t2;
112 	time_t dt;
113 	fd_set *ibitsp = NULL;
114 	naddr p_net, p_mask;
115 	struct interface *ifp;
116 	struct parm parm;
117 	char *tracename = 0;
118 
119 
120 	/* Some shells are badly broken and send SIGHUP to backgrounded
121 	 * processes.
122 	 */
123 	signal(SIGHUP, SIG_IGN);
124 
125 	openlog("routed", LOG_PID, LOG_DAEMON);
126 	ftrace = stdout;
127 
128 	gettimeofday(&clk, 0);
129 	prev_clk = clk;
130 	epoch = clk;
131 	epoch.tv_sec -= EPOCH;
132 	now.tv_sec = EPOCH;
133 	now_stale = EPOCH - STALE_TIME;
134 	now_expire = EPOCH - EXPIRE_TIME;
135 	now_garbage = EPOCH - GARBAGE_TIME;
136 	wtime.tv_sec = 0;
137 
138 	(void)gethostname(myname, sizeof(myname) - 1);
139 	(void)gethost(myname, &myaddr);
140 
141 	while ((n = getopt(argc, argv, "sqdghmAtvT:F:P:")) != -1) {
142 		switch (n) {
143 		case 's':
144 			supplier = 1;
145 			supplier_set = 1;
146 			break;
147 
148 		case 'q':
149 			supplier = 0;
150 			supplier_set = 1;
151 			break;
152 
153 		case 'd':
154 			background = 0;
155 			break;
156 
157 		case 'g':
158 			memset(&parm, 0, sizeof(parm));
159 			parm.parm_d_metric = 1;
160 			cp = check_parms(&parm);
161 			if (cp != 0)
162 				msglog("bad -g: %s", cp);
163 			else
164 				default_gateway = 1;
165 			break;
166 
167 		case 'h':		/* suppress extra host routes */
168 			ridhosts = 1;
169 			break;
170 
171 		case 'm':		/* advertise host route */
172 			mhome = 1;	/* on multi-homed hosts */
173 			break;
174 
175 		case 'A':
176 			/* Ignore authentication if we do not care.
177 			 * Crazy as it is, that is what RFC 1723 requires.
178 			 */
179 			auth_ok = 0;
180 			break;
181 
182 		case 't':
183 			new_tracelevel++;
184 			break;
185 
186 		case 'T':
187 			tracename = optarg;
188 			break;
189 
190 		case 'F':		/* minimal routes for SLIP */
191 			n = FAKE_METRIC;
192 			p = strchr(optarg,',');
193 			if (p && *p != '\0') {
194 				n = (int)strtoul(p+1, &q, 0);
195 				if (*q == '\0'
196 				    && n <= HOPCNT_INFINITY-1
197 				    && n >= 1)
198 					*p = '\0';
199 			}
200 			if (!getnet(optarg, &p_net, &p_mask)) {
201 				msglog("bad network; \"-F %s\"",
202 				       optarg);
203 				break;
204 			}
205 			memset(&parm, 0, sizeof(parm));
206 			parm.parm_net = p_net;
207 			parm.parm_mask = p_mask;
208 			parm.parm_d_metric = n;
209 			cp = check_parms(&parm);
210 			if (cp != 0)
211 				msglog("bad -F: %s", cp);
212 			break;
213 
214 		case 'P':
215 			/* handle arbitrary parameters.
216 			 */
217 			q = strdup(optarg);
218 			cp = parse_parms(q, 0);
219 			if (cp != 0)
220 				msglog("%s in \"-P %s\"", cp, optarg);
221 			free(q);
222 			break;
223 
224 		case 'v':
225 			/* display version */
226 			verbose++;
227 			msglog("version 2.32");
228 			break;
229 
230 		default:
231 			goto usage;
232 		}
233 	}
234 	argc -= optind;
235 	argv += optind;
236 
237 	if (tracename == 0 && argc >= 1) {
238 		tracename = *argv++;
239 		argc--;
240 	}
241 	if (tracename != 0 && tracename[0] == '\0')
242 		goto usage;
243 	if (argc != 0) {
244 usage:
245 		logbad(0, "usage: routed [-sqdghmAtv] [-T tracefile]"
246 		       " [-F net[/mask[,metric]]] [-P parms]");
247 	}
248 	if (geteuid() != 0) {
249 		if (verbose)
250 			exit(0);
251 		logbad(0, "requires UID 0");
252 	}
253 
254 	mib[0] = CTL_NET;
255 	mib[1] = PF_INET;
256 	mib[2] = IPPROTO_IP;
257 	mib[3] = IPCTL_FORWARDING;
258 	len = sizeof(ipforwarding);
259 	if (sysctl(mib, 4, &ipforwarding, &len, 0, 0) < 0)
260 		LOGERR("sysctl(IPCTL_FORWARDING)");
261 
262 	if (!ipforwarding) {
263 		if (supplier)
264 			msglog("-s incompatible with ipforwarding=0");
265 		if (default_gateway) {
266 			msglog("-g incompatible with ipforwarding=0");
267 			default_gateway = 0;
268 		}
269 		supplier = 0;
270 		supplier_set = 1;
271 	}
272 	if (default_gateway) {
273 		if (supplier_set && !supplier) {
274 			msglog("-g and -q incompatible");
275 		} else {
276 			supplier = 1;
277 			supplier_set = 1;
278 		}
279 	}
280 
281 
282 	signal(SIGALRM, sigalrm);
283 	if (!background)
284 		signal(SIGHUP, sigterm);    /* SIGHUP fatal during debugging */
285 	signal(SIGTERM, sigterm);
286 	signal(SIGINT, sigterm);
287 	signal(SIGUSR1, sigtrace_on);
288 	signal(SIGUSR2, sigtrace_off);
289 
290 	/* get into the background */
291 #ifdef sgi
292 	if (0 > _daemonize(background ? 0 : (_DF_NOCHDIR|_DF_NOFORK),
293 			   STDIN_FILENO, STDOUT_FILENO, STDERR_FILENO))
294 		BADERR(0, "_daemonize()");
295 #else
296 	if (background && daemon(0, 1) < 0)
297 		BADERR(0,"daemon()");
298 #endif
299 
300 #if defined(__NetBSD__)
301 	pidfile(NULL);
302 #endif
303 	mypid = getpid();
304 
305 	/* prepare socket connected to the kernel.
306 	 */
307 	rt_sock = socket(AF_ROUTE, SOCK_RAW, 0);
308 	if (rt_sock < 0)
309 		BADERR(1,"rt_sock = socket()");
310 	if (fcntl(rt_sock, F_SETFL, O_NONBLOCK) == -1)
311 		logbad(1, "fcntl(rt_sock) O_NONBLOCK: %s", strerror(errno));
312 	off = 0;
313 	if (setsockopt(rt_sock, SOL_SOCKET,SO_USELOOPBACK,
314 		       &off,sizeof(off)) < 0)
315 		LOGERR("setsockopt(SO_USELOOPBACK,0)");
316 
317 	fix_select();
318 
319 
320 	if (tracename != 0) {
321 		strlcpy(inittracename, tracename, sizeof(inittracename));
322 		set_tracefile(inittracename, "%s", -1);
323 	} else {
324 		tracelevel_msg("%s", -1);   /* turn on tracing to stdio */
325 	}
326 
327 	bufinit();
328 
329 	/* initialize radix tree */
330 	rtinit();
331 
332 	/* Pick a random part of the second for our output to minimize
333 	 * collisions.
334 	 *
335 	 * Start broadcasting after hearing from other routers, and
336 	 * at a random time so a bunch of systems do not get synchronized
337 	 * after a power failure.
338 	 */
339 	intvl_random(&next_bcast, EPOCH+MIN_WAITTIME, EPOCH+SUPPLY_INTERVAL);
340 	age_timer.tv_usec = next_bcast.tv_usec;
341 	age_timer.tv_sec = EPOCH+MIN_WAITTIME;
342 	rdisc_timer = next_bcast;
343 	ifinit_timer.tv_usec = next_bcast.tv_usec;
344 
345 	/* Collect an initial view of the world by checking the interface
346 	 * configuration and the kludge file.
347 	 */
348 	gwkludge();
349 	ifinit();
350 
351 	/* Ask for routes */
352 	rip_query();
353 	rdisc_sol();
354 
355 	/* Now turn off stdio if not tracing */
356 	if (new_tracelevel == 0)
357 		trace_close(background);
358 
359 	/* Loop forever, listening and broadcasting.
360 	 */
361 	for (;;) {
362 		prev_clk = clk;
363 		gettimeofday(&clk, 0);
364 		if (prev_clk.tv_sec == clk.tv_sec
365 		    && prev_clk.tv_usec == clk.tv_usec+usec_fudge) {
366 			/* Much of `routed` depends on time always advancing.
367 			 * On systems that do not guarantee that gettimeofday()
368 			 * produces unique timestamps even if called within
369 			 * a single tick, use trickery like that in classic
370 			 * BSD kernels.
371 			 */
372 			clk.tv_usec += ++usec_fudge;
373 
374 		} else {
375 			usec_fudge = 0;
376 
377 			timevalsub(&t2, &clk, &prev_clk);
378 			if (t2.tv_sec < 0
379 			    || t2.tv_sec > wtime.tv_sec + 5) {
380 				/* Deal with time changes before other
381 				 * housekeeping to keep everything straight.
382 				 */
383 				dt = t2.tv_sec;
384 				if (dt > 0)
385 					dt -= wtime.tv_sec;
386 				trace_act("time changed by %d sec", (int)dt);
387 				epoch.tv_sec += dt;
388 			}
389 		}
390 		timevalsub(&now, &clk, &epoch);
391 		now_stale = now.tv_sec - STALE_TIME;
392 		now_expire = now.tv_sec - EXPIRE_TIME;
393 		now_garbage = now.tv_sec - GARBAGE_TIME;
394 
395 		/* deal with signals that should affect tracing */
396 		set_tracelevel();
397 
398 		if (stopint != 0) {
399 			rip_bcast(0);
400 			rdisc_adv();
401 			trace_off("exiting with signal %d", stopint);
402 			exit(stopint | 128);
403 		}
404 
405 		/* look for new or dead interfaces */
406 		timevalsub(&wtime, &ifinit_timer, &now);
407 		if (wtime.tv_sec <= 0) {
408 			wtime.tv_sec = 0;
409 			ifinit();
410 			rip_query();
411 			continue;
412 		}
413 
414 		/* Check the kernel table occassionally for mysteriously
415 		 * evaporated routes
416 		 */
417 		timevalsub(&t2, &flush_kern_timer, &now);
418 		if (t2.tv_sec <= 0) {
419 			flush_kern();
420 			flush_kern_timer.tv_sec = (now.tv_sec
421 						   + CHECK_QUIET_INTERVAL);
422 			continue;
423 		}
424 		if (timercmp(&t2, &wtime, <))
425 			wtime = t2;
426 
427 		/* If it is time, then broadcast our routes.
428 		 */
429 		if (supplier || advertise_mhome) {
430 			timevalsub(&t2, &next_bcast, &now);
431 			if (t2.tv_sec <= 0) {
432 				/* Synchronize the aging and broadcast
433 				 * timers to minimize awakenings
434 				 */
435 				age(0);
436 
437 				rip_bcast(0);
438 
439 				/* It is desirable to send routing updates
440 				 * regularly.  So schedule the next update
441 				 * 30 seconds after the previous one was
442 				 * scheduled, instead of 30 seconds after
443 				 * the previous update was finished.
444 				 * Even if we just started after discovering
445 				 * a 2nd interface or were otherwise delayed,
446 				 * pick a 30-second aniversary of the
447 				 * original broadcast time.
448 				 */
449 				n = 1 + (0-t2.tv_sec)/SUPPLY_INTERVAL;
450 				next_bcast.tv_sec += n*SUPPLY_INTERVAL;
451 
452 				continue;
453 			}
454 
455 			if (timercmp(&t2, &wtime, <))
456 				wtime = t2;
457 		}
458 
459 		/* If we need a flash update, either do it now or
460 		 * set the delay to end when it is time.
461 		 *
462 		 * If we are within MIN_WAITTIME seconds of a full update,
463 		 * do not bother.
464 		 */
465 		if (need_flash
466 		    && supplier
467 		    && no_flash.tv_sec+MIN_WAITTIME < next_bcast.tv_sec) {
468 			/* accurate to the millisecond */
469 			if (!timercmp(&no_flash, &now, >))
470 				rip_bcast(1);
471 			timevalsub(&t2, &no_flash, &now);
472 			if (timercmp(&t2, &wtime, <))
473 				wtime = t2;
474 		}
475 
476 		/* trigger the main aging timer.
477 		 */
478 		timevalsub(&t2, &age_timer, &now);
479 		if (t2.tv_sec <= 0) {
480 			age(0);
481 			continue;
482 		}
483 		if (timercmp(&t2, &wtime, <))
484 			wtime = t2;
485 
486 		/* update the kernel routing table
487 		 */
488 		timevalsub(&t2, &need_kern, &now);
489 		if (t2.tv_sec <= 0) {
490 			age(0);
491 			continue;
492 		}
493 		if (timercmp(&t2, &wtime, <))
494 			wtime = t2;
495 
496 		/* take care of router discovery,
497 		 * but do it in the correct the millisecond
498 		 */
499 		if (!timercmp(&rdisc_timer, &now, >)) {
500 			rdisc_age(0);
501 			continue;
502 		}
503 		timevalsub(&t2, &rdisc_timer, &now);
504 		if (timercmp(&t2, &wtime, <))
505 			wtime = t2;
506 
507 
508 		/* wait for input or a timer to expire.
509 		 */
510 		trace_flush();
511 		if (ibitsp)
512 			free(ibitsp);
513 		ibitsp = (fd_set *)calloc(howmany(sock_max, NFDBITS),
514 		    sizeof(fd_mask));
515 		if (ibitsp == NULL)
516 			BADERR(1, "calloc");
517 		memcpy(ibitsp, fdbitsp, howmany(sock_max, NFDBITS) *
518 		    sizeof(fd_mask));
519 		n = select(sock_max, ibitsp, 0, 0, &wtime);
520 		if (n <= 0) {
521 			if (n < 0 && errno != EINTR && errno != EAGAIN)
522 				BADERR(1,"select");
523 			continue;
524 		}
525 
526 		if (FD_ISSET(rt_sock, ibitsp)) {
527 			read_rt();
528 			n--;
529 		}
530 		if (rdisc_sock >= 0 && FD_ISSET(rdisc_sock, ibitsp)) {
531 			read_d();
532 			n--;
533 		}
534 		if (rip_sock >= 0 && FD_ISSET(rip_sock, ibitsp)) {
535 			read_rip(rip_sock, 0);
536 			n--;
537 		}
538 
539 		for (ifp = ifnet; n > 0 && 0 != ifp; ifp = ifp->int_next) {
540 			if (ifp->int_rip_sock >= 0
541 			    && FD_ISSET(ifp->int_rip_sock, ibitsp)) {
542 				read_rip(ifp->int_rip_sock, ifp);
543 				n--;
544 			}
545 		}
546 	}
547 }
548 
549 
550 /* ARGSUSED */
551 void
552 sigalrm(int s UNUSED)
553 {
554 	/* Historically, SIGALRM would cause the daemon to check for
555 	 * new and broken interfaces.
556 	 */
557 	ifinit_timer.tv_sec = now.tv_sec;
558 	trace_act("SIGALRM");
559 }
560 
561 
562 /* watch for fatal signals */
563 void
564 sigterm(int sig)
565 {
566 	stopint = sig;
567 	(void)signal(sig, SIG_DFL);	/* catch it only once */
568 }
569 
570 
571 void
572 fix_select(void)
573 {
574 	struct interface *ifp;
575 
576 	sock_max = 0;
577 
578 	if (sock_max <= rt_sock)
579 		sock_max = rt_sock + 1;
580 	if (rip_sock >= 0)
581 		if (sock_max <= rip_sock)
582 			sock_max = rip_sock + 1;
583 	for (ifp = ifnet; 0 != ifp; ifp = ifp->int_next) {
584 		if (ifp->int_rip_sock >= 0)
585 			if (sock_max <= ifp->int_rip_sock)
586 				sock_max = ifp->int_rip_sock + 1;
587 	}
588 	if (rdisc_sock >= 0)
589 		if (sock_max <= rdisc_sock)
590 			sock_max = rdisc_sock + 1;
591 
592 	if (fdbitsp)
593 		free(fdbitsp);
594 	fdbitsp = (fd_set *)calloc(howmany(sock_max, NFDBITS),
595 	    sizeof(fd_mask));
596 	if (fdbitsp == NULL)
597 		BADERR(1, "calloc");
598 
599 	FD_SET(rt_sock, fdbitsp);
600 	if (rip_sock >= 0)
601 		FD_SET(rip_sock, fdbitsp);
602 	for (ifp = ifnet; 0 != ifp; ifp = ifp->int_next) {
603 		if (ifp->int_rip_sock >= 0)
604 			FD_SET(ifp->int_rip_sock, fdbitsp);
605 	}
606 	if (rdisc_sock >= 0)
607 		FD_SET(rdisc_sock, fdbitsp);
608 }
609 
610 
611 void
612 fix_sock(int sock,
613 	 const char *name)
614 {
615 	int on;
616 #define MIN_SOCKBUF (4*1024)
617 	static int rbuf;
618 
619 	if (fcntl(sock, F_SETFL, O_NONBLOCK) == -1)
620 		logbad(1, "fcntl(%s) O_NONBLOCK: %s",
621 		       name, strerror(errno));
622 	on = 1;
623 	if (setsockopt(sock, SOL_SOCKET,SO_BROADCAST, &on,sizeof(on)) < 0)
624 		msglog("setsockopt(%s,SO_BROADCAST): %s",
625 		       name, strerror(errno));
626 #ifdef USE_PASSIFNAME
627 	on = 1;
628 	if (setsockopt(sock, SOL_SOCKET, SO_PASSIFNAME, &on,sizeof(on)) < 0)
629 		msglog("setsockopt(%s,SO_PASSIFNAME): %s",
630 		       name, strerror(errno));
631 #endif
632 
633 	if (rbuf >= MIN_SOCKBUF) {
634 		if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
635 			       &rbuf, sizeof(rbuf)) < 0)
636 			msglog("setsockopt(%s,SO_RCVBUF=%d): %s",
637 			       name, rbuf, strerror(errno));
638 	} else {
639 		for (rbuf = 60*1024; ; rbuf -= 4096) {
640 			if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
641 				       &rbuf, sizeof(rbuf)) == 0) {
642 				trace_act("RCVBUF=%d", rbuf);
643 				break;
644 			}
645 			if (rbuf < MIN_SOCKBUF) {
646 				msglog("setsockopt(%s,SO_RCVBUF = %d): %s",
647 				       name, rbuf, strerror(errno));
648 				break;
649 			}
650 		}
651 	}
652 }
653 
654 
655 /* get a rip socket
656  */
657 static int				/* <0 or file descriptor */
658 get_rip_sock(naddr addr,
659 	     int serious)		/* 1=failure to bind is serious */
660 {
661 	struct sockaddr_in rsin;
662 	unsigned char ttl;
663 	int s;
664 
665 
666 	if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
667 		BADERR(1,"rip_sock = socket()");
668 
669 	memset(&rsin, 0, sizeof(rsin));
670 #ifdef _HAVE_SIN_LEN
671 	rsin.sin_len = sizeof(rsin);
672 #endif
673 	rsin.sin_family = AF_INET;
674 	rsin.sin_port = htons(RIP_PORT);
675 	rsin.sin_addr.s_addr = addr;
676 	if (bind(s, (struct sockaddr *)&rsin, sizeof(rsin)) < 0) {
677 		if (serious)
678 			BADERR(errno != EADDRINUSE, "bind(rip_sock)");
679 		return -1;
680 	}
681 	fix_sock(s,"rip_sock");
682 
683 	ttl = 1;
684 	if (setsockopt(s, IPPROTO_IP, IP_MULTICAST_TTL,
685 		       &ttl, sizeof(ttl)) < 0)
686 		DBGERR(1,"rip_sock setsockopt(IP_MULTICAST_TTL)");
687 
688 	return s;
689 }
690 
691 
692 /* turn off main RIP socket */
693 void
694 rip_off(void)
695 {
696 	struct interface *ifp;
697 	naddr addr;
698 
699 
700 	if (rip_sock >= 0 && !mhome) {
701 		trace_act("turn off RIP");
702 
703 		(void)close(rip_sock);
704 		rip_sock = -1;
705 
706 		/* get non-broadcast sockets to listen to queries.
707 		 */
708 		for (ifp = ifnet; ifp != 0; ifp = ifp->int_next) {
709 			if (ifp->int_state & IS_REMOTE)
710 				continue;
711 			if (ifp->int_rip_sock < 0) {
712 				addr = ((ifp->int_if_flags & IFF_POINTOPOINT)
713 					? ifp->int_dstaddr
714 					: ifp->int_addr);
715 				ifp->int_rip_sock = get_rip_sock(addr, 0);
716 			}
717 		}
718 
719 		fix_select();
720 
721 		age(0);
722 	}
723 }
724 
725 
726 /* turn on RIP multicast input via an interface
727  */
728 static void
729 rip_mcast_on(struct interface *ifp)
730 {
731 	struct ip_mreq m;
732 
733 	if (!IS_RIP_IN_OFF(ifp->int_state)
734 	    && (ifp->int_if_flags & IFF_MULTICAST)
735 #ifdef MCAST_PPP_BUG
736 	    && !(ifp->int_if_flags & IFF_POINTOPOINT)
737 #endif
738 	    && !(ifp->int_state & IS_ALIAS)) {
739 		m.imr_multiaddr.s_addr = htonl(INADDR_RIP_GROUP);
740 #ifdef MCAST_IFINDEX
741 		m.imr_interface.s_addr = htonl(ifp->int_index);
742 #else
743 		m.imr_interface.s_addr = ((ifp->int_if_flags & IFF_POINTOPOINT)
744 					  ? ifp->int_dstaddr
745 					  : ifp->int_addr);
746 #endif
747 		if (setsockopt(rip_sock,IPPROTO_IP, IP_ADD_MEMBERSHIP,
748 			       &m, sizeof(m)) < 0)
749 			LOGERR("setsockopt(IP_ADD_MEMBERSHIP RIP)");
750 	}
751 }
752 
753 
754 /* Prepare socket used for RIP.
755  */
756 void
757 rip_on(struct interface *ifp)
758 {
759 	/* If the main RIP socket is already alive, only start receiving
760 	 * multicasts for this interface.
761 	 */
762 	if (rip_sock >= 0) {
763 		if (ifp != 0)
764 			rip_mcast_on(ifp);
765 		return;
766 	}
767 
768 	/* If the main RIP socket is off and it makes sense to turn it on,
769 	 * then turn it on for all of the interfaces.
770 	 * It makes sense if either router discovery is off, or if
771 	 * router discover is on and at most one interface is doing RIP.
772 	 */
773 	if (rip_interfaces > 0 && (!rdisc_ok || rip_interfaces > 1)) {
774 		trace_act("turn on RIP");
775 
776 		/* Close all of the query sockets so that we can open
777 		 * the main socket.  SO_REUSEPORT is not a solution,
778 		 * since that would let two daemons bind to the broadcast
779 		 * socket.
780 		 */
781 		for (ifp = ifnet; ifp != 0; ifp = ifp->int_next) {
782 			if (ifp->int_rip_sock >= 0) {
783 				(void)close(ifp->int_rip_sock);
784 				ifp->int_rip_sock = -1;
785 			}
786 		}
787 
788 		rip_sock = get_rip_sock(INADDR_ANY, 1);
789 		rip_sock_mcast = 0;
790 
791 		/* Do not advertise anything until we have heard something
792 		 */
793 		if (next_bcast.tv_sec < now.tv_sec+MIN_WAITTIME)
794 			next_bcast.tv_sec = now.tv_sec+MIN_WAITTIME;
795 
796 		for (ifp = ifnet; ifp != 0; ifp = ifp->int_next) {
797 			ifp->int_query_time = NEVER;
798 			rip_mcast_on(ifp);
799 		}
800 		ifinit_timer.tv_sec = now.tv_sec;
801 
802 	} else if (ifp != 0
803 		   && !(ifp->int_state & IS_REMOTE)
804 		   && ifp->int_rip_sock < 0) {
805 		/* RIP is off, so ensure there are sockets on which
806 		 * to listen for queries.
807 		 */
808 		ifp->int_rip_sock = get_rip_sock(ifp->int_addr, 0);
809 	}
810 
811 	fix_select();
812 }
813 
814 
815 /* die if malloc(3) fails
816  */
817 void *
818 rtmalloc(size_t size,
819 	 const char *msg)
820 {
821 	void *p = malloc(size);
822 	if (p == 0)
823 		logbad(1,"malloc(%lu) failed in %s", (u_long)size, msg);
824 	return p;
825 }
826 
827 
828 /* get a random instant in an interval
829  */
830 void
831 intvl_random(struct timeval *tp,	/* put value here */
832 	     u_long lo,			/* value is after this second */
833 	     u_long hi)			/* and before this */
834 {
835 	tp->tv_sec = (time_t)(hi == lo
836 			      ? lo
837 			      : (lo + arc4random() % ((hi - lo))));
838 	tp->tv_usec = arc4random() % 1000000;
839 }
840 
841 
842 void
843 timevaladd(struct timeval *t1,
844 	   struct timeval *t2)
845 {
846 
847 	t1->tv_sec += t2->tv_sec;
848 	if ((t1->tv_usec += t2->tv_usec) >= 1000000) {
849 		t1->tv_sec++;
850 		t1->tv_usec -= 1000000;
851 	}
852 }
853 
854 
855 /* t1 = t2 - t3
856  */
857 static void
858 timevalsub(struct timeval *t1,
859 	   struct timeval *t2,
860 	   struct timeval *t3)
861 {
862 	t1->tv_sec = t2->tv_sec - t3->tv_sec;
863 	if ((t1->tv_usec = t2->tv_usec - t3->tv_usec) < 0) {
864 		t1->tv_sec--;
865 		t1->tv_usec += 1000000;
866 	}
867 }
868 
869 
870 /* put a message into the system log
871  */
872 void
873 msglog(const char *p, ...)
874 {
875 	va_list args;
876 
877 	trace_flush();
878 
879 	va_start(args, p);
880 	vsyslog(LOG_ERR, p, args);
881 	va_end(args);
882 
883 	if (ftrace != 0) {
884 		if (ftrace == stdout)
885 			(void)fputs("routed: ", ftrace);
886 		va_start(args, p);
887 		(void)vfprintf(ftrace, p, args);
888 		va_end(args);
889 		(void)fputc('\n', ftrace);
890 	}
891 }
892 
893 
894 /* Put a message about a bad system into the system log if
895  * we have not complained about it recently.
896  *
897  * It is desirable to complain about all bad systems, but not too often.
898  * In the worst case, it is not practical to keep track of all bad systems.
899  * For example, there can be many systems with the wrong password.
900  */
901 void
902 msglim(struct msg_limit *lim, naddr addr, const char *p, ...)
903 {
904 	va_list args;
905 	int i;
906 	struct msg_sub *ms1, *ms;
907 	const char *p1;
908 
909 	/* look for the oldest slot in the table
910 	 * or the slot for the bad router.
911 	 */
912 	ms = ms1 = lim->subs;
913 	for (i = MSG_SUBJECT_N; ; i--, ms1++) {
914 		if (i == 0) {
915 			/* Reuse a slot at most once every 10 minutes.
916 			 */
917 			if (lim->reuse > now.tv_sec) {
918 				ms = 0;
919 			} else {
920 				ms = ms1;
921 				lim->reuse = now.tv_sec + 10*60;
922 			}
923 			break;
924 		}
925 		if (ms->addr == addr) {
926 			/* Repeat a complaint about a given system at
927 			 * most once an hour.
928 			 */
929 			if (ms->until > now.tv_sec)
930 				ms = 0;
931 			break;
932 		}
933 		if (ms->until < ms1->until)
934 			ms = ms1;
935 	}
936 	if (ms != 0) {
937 		ms->addr = addr;
938 		ms->until = now.tv_sec + 60*60;	/* 60 minutes */
939 
940 		trace_flush();
941 		for (p1 = p; *p1 == ' '; p1++)
942 			continue;
943 		va_start(args, p);
944 		vsyslog(LOG_ERR, p1, args);
945 		va_end(args);
946 	}
947 
948 	/* always display the message if tracing */
949 	if (ftrace != 0) {
950 		va_start(args, p);
951 		(void)vfprintf(ftrace, p, args);
952 		(void)fputc('\n', ftrace);
953 		va_end(args);
954 	}
955 }
956 
957 
958 void
959 logbad(int dump, const char *p, ...)
960 {
961 	va_list args;
962 
963 	trace_flush();
964 
965 	va_start(args, p);
966 	vsyslog(LOG_ERR, p, args);
967 	va_end(args);
968 
969 	(void)fputs("routed: ", stderr);
970 	va_start(args, p);
971 	(void)vfprintf(stderr, p, args);
972 	va_end(args);
973 	(void)fputs("; giving up\n",stderr);
974 	(void)fflush(stderr);
975 
976 	if (dump)
977 		abort();
978 	exit(1);
979 }
980