Home | History | Annotate | Line # | Download | only in routed
main.c revision 1.33
      1 /*	$NetBSD: main.c,v 1.33 2003/08/13 08:51:05 itojun Exp $	*/
      2 
      3 /*
      4  * Copyright (c) 1983, 1988, 1993
      5  *	The Regents of the University of California.  All rights reserved.
      6  *
      7  * Redistribution and use in source and binary forms, with or without
      8  * modification, are permitted provided that the following conditions
      9  * are met:
     10  * 1. Redistributions of source code must retain the above copyright
     11  *    notice, this list of conditions and the following disclaimer.
     12  * 2. Redistributions in binary form must reproduce the above copyright
     13  *    notice, this list of conditions and the following disclaimer in the
     14  *    documentation and/or other materials provided with the distribution.
     15  * 3. All advertising materials mentioning features or use of this software
     16  *    must display the following acknowledgment:
     17  *	This product includes software developed by the University of
     18  *	California, Berkeley and its contributors.
     19  * 4. Neither the name of the University nor the names of its contributors
     20  *    may be used to endorse or promote products derived from this software
     21  *    without specific prior written permission.
     22  *
     23  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     33  * SUCH DAMAGE.
     34  */
     35 
     36 #include "defs.h"
     37 #include "pathnames.h"
     38 #ifdef sgi
     39 #include "math.h"
     40 #endif
     41 #include <signal.h>
     42 #include <fcntl.h>
     43 #include <sys/file.h>
     44 
     45 __COPYRIGHT("@(#) Copyright (c) 1983, 1988, 1993\n"
     46 	    "The Regents of the University of California."
     47 	    "  All rights reserved.\n");
     48 #ifdef __NetBSD__
     49 __RCSID("$NetBSD: main.c,v 1.33 2003/08/13 08:51:05 itojun Exp $");
     50 #elif defined(__FreeBSD__)
     51 __RCSID("$FreeBSD$");
     52 #else
     53 __RCSID("Revision: 2.27 ");
     54 #ident "Revision: 2.27 "
     55 #endif
     56 
     57 #if defined(__NetBSD__)
     58 #include <util.h>
     59 #endif
     60 
     61 pid_t	mypid;
     62 
     63 naddr	myaddr;				/* system address */
     64 char	myname[MAXHOSTNAMELEN+1];
     65 
     66 int	verbose;
     67 
     68 int	supplier;			/* supply or broadcast updates */
     69 int	supplier_set;
     70 int	ipforwarding = 1;		/* kernel forwarding on */
     71 
     72 int	default_gateway;		/* 1=advertise default */
     73 int	background = 1;
     74 int	ridhosts;			/* 1=reduce host routes */
     75 int	mhome;				/* 1=want multi-homed host route */
     76 int	advertise_mhome;		/* 1=must continue advertising it */
     77 int	auth_ok = 1;			/* 1=ignore auth if we do not care */
     78 
     79 struct timeval epoch;			/* when started */
     80 struct timeval clk, prev_clk;
     81 static int usec_fudge;
     82 struct timeval now;			/* current idea of time */
     83 time_t	now_stale;
     84 time_t	now_expire;
     85 time_t	now_garbage;
     86 
     87 struct timeval next_bcast;		/* next general broadcast */
     88 struct timeval no_flash = {		/* inhibit flash update */
     89 	EPOCH+SUPPLY_INTERVAL, 0
     90 };
     91 
     92 struct timeval flush_kern_timer;
     93 
     94 fd_set	*fdbitsp;
     95 int	sock_max;
     96 int	rip_sock = -1;			/* RIP socket */
     97 struct interface *rip_sock_mcast;	/* current multicast interface */
     98 int	rt_sock;			/* routing socket */
     99 int	rt_sock_seqno;
    100 
    101 
    102 static  int get_rip_sock(naddr, int);
    103 static void timevalsub(struct timeval *, struct timeval *, struct timeval *);
    104 
    105 int
    106 main(int argc,
    107      char *argv[])
    108 {
    109 	int n, mib[4], off;
    110 	size_t len;
    111 	char *p, *q;
    112 	const char *cp;
    113 	struct timeval wtime, t2;
    114 	time_t dt;
    115 	fd_set *ibitsp;
    116 	naddr p_net, p_mask;
    117 	struct interface *ifp;
    118 	struct parm parm;
    119 	char *tracename = 0;
    120 
    121 
    122 	/* Some shells are badly broken and send SIGHUP to backgrounded
    123 	 * processes.
    124 	 */
    125 	signal(SIGHUP, SIG_IGN);
    126 
    127 	openlog("routed", LOG_PID, LOG_DAEMON);
    128 	ftrace = stdout;
    129 
    130 	gettimeofday(&clk, 0);
    131 	prev_clk = clk;
    132 	epoch = clk;
    133 	epoch.tv_sec -= EPOCH;
    134 	now.tv_sec = EPOCH;
    135 	now_stale = EPOCH - STALE_TIME;
    136 	now_expire = EPOCH - EXPIRE_TIME;
    137 	now_garbage = EPOCH - GARBAGE_TIME;
    138 	wtime.tv_sec = 0;
    139 
    140 	(void)gethostname(myname, sizeof(myname) - 1);
    141 	(void)gethost(myname, &myaddr);
    142 
    143 	while ((n = getopt(argc, argv, "sqdghmpAtvT:F:P:")) != -1) {
    144 		switch (n) {
    145 		case 's':
    146 			supplier = 1;
    147 			supplier_set = 1;
    148 			break;
    149 
    150 		case 'q':
    151 			supplier = 0;
    152 			supplier_set = 1;
    153 			break;
    154 
    155 		case 'd':
    156 			background = 0;
    157 			break;
    158 
    159 		case 'g':
    160 			memset(&parm, 0, sizeof(parm));
    161 			parm.parm_d_metric = 1;
    162 			cp = check_parms(&parm);
    163 			if (cp != 0)
    164 				msglog("bad -g: %s", cp);
    165 			else
    166 				default_gateway = 1;
    167 			break;
    168 
    169 		case 'h':		/* suppress extra host routes */
    170 			ridhosts = 1;
    171 			break;
    172 
    173 		case 'm':		/* advertise host route */
    174 			mhome = 1;	/* on multi-homed hosts */
    175 			break;
    176 
    177 		case 'A':
    178 			/* Ignore authentication if we do not care.
    179 			 * Crazy as it is, that is what RFC 1723 requires.
    180 			 */
    181 			auth_ok = 0;
    182 			break;
    183 
    184 		case 't':
    185 			new_tracelevel++;
    186 			break;
    187 
    188 		case 'T':
    189 			tracename = optarg;
    190 			break;
    191 
    192 		case 'F':		/* minimal routes for SLIP */
    193 			n = FAKE_METRIC;
    194 			p = strchr(optarg,',');
    195 			if (p && *p != '\0') {
    196 				n = (int)strtoul(p+1, &q, 0);
    197 				if (*q == '\0'
    198 				    && n <= HOPCNT_INFINITY-1
    199 				    && n >= 1)
    200 					*p = '\0';
    201 			}
    202 			if (!getnet(optarg, &p_net, &p_mask)) {
    203 				msglog("bad network; \"-F %s\"",
    204 				       optarg);
    205 				break;
    206 			}
    207 			memset(&parm, 0, sizeof(parm));
    208 			parm.parm_net = p_net;
    209 			parm.parm_mask = p_mask;
    210 			parm.parm_d_metric = n;
    211 			cp = check_parms(&parm);
    212 			if (cp != 0)
    213 				msglog("bad -F: %s", cp);
    214 			break;
    215 
    216 		case 'P':
    217 			/* handle arbitrary parameters.
    218 			 */
    219 			q = strdup(optarg);
    220 			cp = parse_parms(q, 0);
    221 			if (cp != 0)
    222 				msglog("%s in \"-P %s\"", cp, optarg);
    223 			free(q);
    224 			break;
    225 
    226 		case 'v':
    227 			/* display version */
    228 			verbose++;
    229 			msglog("version 2.25");
    230 			break;
    231 
    232 		default:
    233 			goto usage;
    234 		}
    235 	}
    236 	argc -= optind;
    237 	argv += optind;
    238 
    239 	if (tracename == 0 && argc >= 1) {
    240 		tracename = *argv++;
    241 		argc--;
    242 	}
    243 	if (tracename != 0 && tracename[0] == '\0')
    244 		goto usage;
    245 	if (argc != 0) {
    246 usage:
    247 		logbad(0, "usage: routed [-sqdghmpAtv] [-T tracefile]"
    248 		       " [-F net[,metric]] [-P parms]");
    249 	}
    250 	if (geteuid() != 0) {
    251 		if (verbose)
    252 			exit(0);
    253 		logbad(0, "requires UID 0");
    254 	}
    255 
    256 	mib[0] = CTL_NET;
    257 	mib[1] = PF_INET;
    258 	mib[2] = IPPROTO_IP;
    259 	mib[3] = IPCTL_FORWARDING;
    260 	len = sizeof(ipforwarding);
    261 	if (sysctl(mib, 4, &ipforwarding, &len, 0, 0) < 0)
    262 		LOGERR("sysctl(IPCTL_FORWARDING)");
    263 
    264 	if (!ipforwarding) {
    265 		if (supplier)
    266 			msglog("-s incompatible with ipforwarding=0");
    267 		if (default_gateway) {
    268 			msglog("-g incompatible with ipforwarding=0");
    269 			default_gateway = 0;
    270 		}
    271 		supplier = 0;
    272 		supplier_set = 1;
    273 	}
    274 	if (default_gateway) {
    275 		if (supplier_set && !supplier) {
    276 			msglog("-g and -q incompatible");
    277 		} else {
    278 			supplier = 1;
    279 			supplier_set = 1;
    280 		}
    281 	}
    282 
    283 
    284 	signal(SIGALRM, sigalrm);
    285 	if (!background)
    286 		signal(SIGHUP, sigterm);    /* SIGHUP fatal during debugging */
    287 	signal(SIGTERM, sigterm);
    288 	signal(SIGINT, sigterm);
    289 	signal(SIGUSR1, sigtrace_on);
    290 	signal(SIGUSR2, sigtrace_off);
    291 
    292 	/* get into the background */
    293 #ifdef sgi
    294 	if (0 > _daemonize(background ? 0 : (_DF_NOCHDIR|_DF_NOFORK),
    295 			   STDIN_FILENO, STDOUT_FILENO, STDERR_FILENO))
    296 		BADERR(0, "_daemonize()");
    297 #else
    298 	if (background && daemon(0, 1) < 0)
    299 		BADERR(0,"daemon()");
    300 #endif
    301 
    302 #if defined(__NetBSD__)
    303 	pidfile(NULL);
    304 #endif
    305 	mypid = getpid();
    306 	srandom((int)(clk.tv_sec ^ clk.tv_usec ^ mypid));
    307 
    308 	/* prepare socket connected to the kernel.
    309 	 */
    310 	rt_sock = socket(AF_ROUTE, SOCK_RAW, 0);
    311 	if (rt_sock < 0)
    312 		BADERR(1,"rt_sock = socket()");
    313 	if (fcntl(rt_sock, F_SETFL, O_NONBLOCK) == -1)
    314 		logbad(1, "fcntl(rt_sock) O_NONBLOCK: %s", strerror(errno));
    315 	off = 0;
    316 	if (setsockopt(rt_sock, SOL_SOCKET,SO_USELOOPBACK,
    317 		       &off,sizeof(off)) < 0)
    318 		LOGERR("setsockopt(SO_USELOOPBACK,0)");
    319 
    320 	fix_select();
    321 
    322 
    323 	if (tracename != 0) {
    324 		strlcpy(inittracename, tracename, sizeof(inittracename));
    325 		set_tracefile(inittracename, "%s", -1);
    326 	} else {
    327 		tracelevel_msg("%s", -1);   /* turn on tracing to stdio */
    328 	}
    329 
    330 	bufinit();
    331 
    332 	/* initialize radix tree */
    333 	rtinit();
    334 
    335 	/* Pick a random part of the second for our output to minimize
    336 	 * collisions.
    337 	 *
    338 	 * Start broadcasting after hearing from other routers, and
    339 	 * at a random time so a bunch of systems do not get synchronized
    340 	 * after a power failure.
    341 	 */
    342 	intvl_random(&next_bcast, EPOCH+MIN_WAITTIME, EPOCH+SUPPLY_INTERVAL);
    343 	age_timer.tv_usec = next_bcast.tv_usec;
    344 	age_timer.tv_sec = EPOCH+MIN_WAITTIME;
    345 	rdisc_timer = next_bcast;
    346 	ifinit_timer.tv_usec = next_bcast.tv_usec;
    347 
    348 	/* Collect an initial view of the world by checking the interface
    349 	 * configuration and the kludge file.
    350 	 */
    351 	gwkludge();
    352 	ifinit();
    353 
    354 	/* Ask for routes */
    355 	rip_query();
    356 	rdisc_sol();
    357 
    358 	/* Now turn off stdio if not tracing */
    359 	if (new_tracelevel == 0)
    360 		trace_close(background);
    361 
    362 	/* Loop forever, listening and broadcasting.
    363 	 */
    364 	for (;;) {
    365 		prev_clk = clk;
    366 		gettimeofday(&clk, 0);
    367 		if (prev_clk.tv_sec == clk.tv_sec
    368 		    && prev_clk.tv_usec == clk.tv_usec+usec_fudge) {
    369 			/* Much of `routed` depends on time always advancing.
    370 			 * On systems that do not guarantee that gettimeofday()
    371 			 * produces unique timestamps even if called within
    372 			 * a single tick, use trickery like that in classic
    373 			 * BSD kernels.
    374 			 */
    375 			clk.tv_usec += ++usec_fudge;
    376 
    377 		} else {
    378 			usec_fudge = 0;
    379 
    380 			timevalsub(&t2, &clk, &prev_clk);
    381 			if (t2.tv_sec < 0
    382 			    || t2.tv_sec > wtime.tv_sec + 5) {
    383 				/* Deal with time changes before other
    384 				 * housekeeping to keep everything straight.
    385 				 */
    386 				dt = t2.tv_sec;
    387 				if (dt > 0)
    388 					dt -= wtime.tv_sec;
    389 				trace_act("time changed by %d sec", (int)dt);
    390 				epoch.tv_sec += dt;
    391 			}
    392 		}
    393 		timevalsub(&now, &clk, &epoch);
    394 		now_stale = now.tv_sec - STALE_TIME;
    395 		now_expire = now.tv_sec - EXPIRE_TIME;
    396 		now_garbage = now.tv_sec - GARBAGE_TIME;
    397 
    398 		/* deal with signals that should affect tracing */
    399 		set_tracelevel();
    400 
    401 		if (stopint != 0) {
    402 			rip_bcast(0);
    403 			rdisc_adv();
    404 			trace_off("exiting with signal %d", stopint);
    405 			exit(stopint | 128);
    406 		}
    407 
    408 		/* look for new or dead interfaces */
    409 		timevalsub(&wtime, &ifinit_timer, &now);
    410 		if (wtime.tv_sec <= 0) {
    411 			wtime.tv_sec = 0;
    412 			ifinit();
    413 			rip_query();
    414 			continue;
    415 		}
    416 
    417 		/* Check the kernel table occassionally for mysteriously
    418 		 * evaporated routes
    419 		 */
    420 		timevalsub(&t2, &flush_kern_timer, &now);
    421 		if (t2.tv_sec <= 0) {
    422 			flush_kern();
    423 			flush_kern_timer.tv_sec = (now.tv_sec
    424 						   + CHECK_QUIET_INTERVAL);
    425 			continue;
    426 		}
    427 		if (timercmp(&t2, &wtime, <))
    428 			wtime = t2;
    429 
    430 		/* If it is time, then broadcast our routes.
    431 		 */
    432 		if (supplier || advertise_mhome) {
    433 			timevalsub(&t2, &next_bcast, &now);
    434 			if (t2.tv_sec <= 0) {
    435 				/* Synchronize the aging and broadcast
    436 				 * timers to minimize awakenings
    437 				 */
    438 				age(0);
    439 
    440 				rip_bcast(0);
    441 
    442 				/* It is desirable to send routing updates
    443 				 * regularly.  So schedule the next update
    444 				 * 30 seconds after the previous one was
    445 				 * scheduled, instead of 30 seconds after
    446 				 * the previous update was finished.
    447 				 * Even if we just started after discovering
    448 				 * a 2nd interface or were otherwise delayed,
    449 				 * pick a 30-second aniversary of the
    450 				 * original broadcast time.
    451 				 */
    452 				n = 1 + (0-t2.tv_sec)/SUPPLY_INTERVAL;
    453 				next_bcast.tv_sec += n*SUPPLY_INTERVAL;
    454 
    455 				continue;
    456 			}
    457 
    458 			if (timercmp(&t2, &wtime, <))
    459 				wtime = t2;
    460 		}
    461 
    462 		/* If we need a flash update, either do it now or
    463 		 * set the delay to end when it is time.
    464 		 *
    465 		 * If we are within MIN_WAITTIME seconds of a full update,
    466 		 * do not bother.
    467 		 */
    468 		if (need_flash
    469 		    && supplier
    470 		    && no_flash.tv_sec+MIN_WAITTIME < next_bcast.tv_sec) {
    471 			/* accurate to the millisecond */
    472 			if (!timercmp(&no_flash, &now, >))
    473 				rip_bcast(1);
    474 			timevalsub(&t2, &no_flash, &now);
    475 			if (timercmp(&t2, &wtime, <))
    476 				wtime = t2;
    477 		}
    478 
    479 		/* trigger the main aging timer.
    480 		 */
    481 		timevalsub(&t2, &age_timer, &now);
    482 		if (t2.tv_sec <= 0) {
    483 			age(0);
    484 			continue;
    485 		}
    486 		if (timercmp(&t2, &wtime, <))
    487 			wtime = t2;
    488 
    489 		/* update the kernel routing table
    490 		 */
    491 		timevalsub(&t2, &need_kern, &now);
    492 		if (t2.tv_sec <= 0) {
    493 			age(0);
    494 			continue;
    495 		}
    496 		if (timercmp(&t2, &wtime, <))
    497 			wtime = t2;
    498 
    499 		/* take care of router discovery,
    500 		 * but do it in the correct the millisecond
    501 		 */
    502 		if (!timercmp(&rdisc_timer, &now, >)) {
    503 			rdisc_age(0);
    504 			continue;
    505 		}
    506 		timevalsub(&t2, &rdisc_timer, &now);
    507 		if (timercmp(&t2, &wtime, <))
    508 			wtime = t2;
    509 
    510 
    511 		/* wait for input or a timer to expire.
    512 		 */
    513 		trace_flush();
    514 		if (ibitsp)
    515 			free(ibitsp);
    516 		ibitsp = (fd_set *)calloc(howmany(sock_max, NFDBITS),
    517 		    sizeof(fd_mask));
    518 		if (ibitsp == NULL)
    519 			BADERR(1, "calloc");
    520 		memcpy(ibitsp, fdbitsp, howmany(sock_max, NFDBITS) *
    521 		    sizeof(fd_mask));
    522 		n = select(sock_max, ibitsp, 0, 0, &wtime);
    523 		if (n <= 0) {
    524 			if (n < 0 && errno != EINTR && errno != EAGAIN)
    525 				BADERR(1,"select");
    526 			continue;
    527 		}
    528 
    529 		if (FD_ISSET(rt_sock, ibitsp)) {
    530 			read_rt();
    531 			n--;
    532 		}
    533 		if (rdisc_sock >= 0 && FD_ISSET(rdisc_sock, ibitsp)) {
    534 			read_d();
    535 			n--;
    536 		}
    537 		if (rip_sock >= 0 && FD_ISSET(rip_sock, ibitsp)) {
    538 			read_rip(rip_sock, 0);
    539 			n--;
    540 		}
    541 
    542 		for (ifp = ifnet; n > 0 && 0 != ifp; ifp = ifp->int_next) {
    543 			if (ifp->int_rip_sock >= 0
    544 			    && FD_ISSET(ifp->int_rip_sock, ibitsp)) {
    545 				read_rip(ifp->int_rip_sock, ifp);
    546 				n--;
    547 			}
    548 		}
    549 	}
    550 }
    551 
    552 
    553 /* ARGSUSED */
    554 void
    555 sigalrm(int s UNUSED)
    556 {
    557 	/* Historically, SIGALRM would cause the daemon to check for
    558 	 * new and broken interfaces.
    559 	 */
    560 	ifinit_timer.tv_sec = now.tv_sec;
    561 	trace_act("SIGALRM");
    562 }
    563 
    564 
    565 /* watch for fatal signals */
    566 void
    567 sigterm(int sig)
    568 {
    569 	stopint = sig;
    570 	(void)signal(sig, SIG_DFL);	/* catch it only once */
    571 }
    572 
    573 
    574 void
    575 fix_select(void)
    576 {
    577 	struct interface *ifp;
    578 
    579 	sock_max = 0;
    580 
    581 	if (sock_max <= rt_sock)
    582 		sock_max = rt_sock + 1;
    583 	if (rip_sock >= 0)
    584 		if (sock_max <= rip_sock)
    585 			sock_max = rip_sock + 1;
    586 	for (ifp = ifnet; 0 != ifp; ifp = ifp->int_next) {
    587 		if (ifp->int_rip_sock >= 0)
    588 			if (sock_max <= ifp->int_rip_sock)
    589 				sock_max = ifp->int_rip_sock + 1;
    590 	}
    591 	if (rdisc_sock >= 0)
    592 		if (sock_max <= rdisc_sock)
    593 			sock_max = rdisc_sock + 1;
    594 
    595 	if (fdbitsp)
    596 		free(fdbitsp);
    597 	fdbitsp = (fd_set *)calloc(howmany(sock_max, NFDBITS),
    598 	    sizeof(fd_mask));
    599 	if (fdbitsp == NULL)
    600 		BADERR(1, "calloc");
    601 
    602 	FD_SET(rt_sock, fdbitsp);
    603 	if (rip_sock >= 0)
    604 		FD_SET(rip_sock, fdbitsp);
    605 	for (ifp = ifnet; 0 != ifp; ifp = ifp->int_next) {
    606 		if (ifp->int_rip_sock >= 0)
    607 			FD_SET(ifp->int_rip_sock, fdbitsp);
    608 	}
    609 	if (rdisc_sock >= 0)
    610 		FD_SET(rdisc_sock, fdbitsp);
    611 }
    612 
    613 
    614 void
    615 fix_sock(int sock,
    616 	 const char *name)
    617 {
    618 	int on;
    619 #define MIN_SOCKBUF (4*1024)
    620 	static int rbuf;
    621 
    622 	if (fcntl(sock, F_SETFL, O_NONBLOCK) == -1)
    623 		logbad(1, "fcntl(%s) O_NONBLOCK: %s",
    624 		       name, strerror(errno));
    625 	on = 1;
    626 	if (setsockopt(sock, SOL_SOCKET,SO_BROADCAST, &on,sizeof(on)) < 0)
    627 		msglog("setsockopt(%s,SO_BROADCAST): %s",
    628 		       name, strerror(errno));
    629 #ifdef USE_PASSIFNAME
    630 	on = 1;
    631 	if (setsockopt(sock, SOL_SOCKET, SO_PASSIFNAME, &on,sizeof(on)) < 0)
    632 		msglog("setsockopt(%s,SO_PASSIFNAME): %s",
    633 		       name, strerror(errno));
    634 #endif
    635 
    636 	if (rbuf >= MIN_SOCKBUF) {
    637 		if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
    638 			       &rbuf, sizeof(rbuf)) < 0)
    639 			msglog("setsockopt(%s,SO_RCVBUF=%d): %s",
    640 			       name, rbuf, strerror(errno));
    641 	} else {
    642 		for (rbuf = 60*1024; ; rbuf -= 4096) {
    643 			if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
    644 				       &rbuf, sizeof(rbuf)) == 0) {
    645 				trace_act("RCVBUF=%d", rbuf);
    646 				break;
    647 			}
    648 			if (rbuf < MIN_SOCKBUF) {
    649 				msglog("setsockopt(%s,SO_RCVBUF = %d): %s",
    650 				       name, rbuf, strerror(errno));
    651 				break;
    652 			}
    653 		}
    654 	}
    655 }
    656 
    657 
    658 /* get a rip socket
    659  */
    660 static int				/* <0 or file descriptor */
    661 get_rip_sock(naddr addr,
    662 	     int serious)		/* 1=failure to bind is serious */
    663 {
    664 	struct sockaddr_in rsin;
    665 	unsigned char ttl;
    666 	int s;
    667 
    668 
    669 	if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
    670 		BADERR(1,"rip_sock = socket()");
    671 
    672 	memset(&rsin, 0, sizeof(rsin));
    673 #ifdef _HAVE_SIN_LEN
    674 	rsin.sin_len = sizeof(rsin);
    675 #endif
    676 	rsin.sin_family = AF_INET;
    677 	rsin.sin_port = htons(RIP_PORT);
    678 	rsin.sin_addr.s_addr = addr;
    679 	if (bind(s, (struct sockaddr *)&rsin, sizeof(rsin)) < 0) {
    680 		if (serious)
    681 			BADERR(errno != EADDRINUSE, "bind(rip_sock)");
    682 		return -1;
    683 	}
    684 	fix_sock(s,"rip_sock");
    685 
    686 	ttl = 1;
    687 	if (setsockopt(s, IPPROTO_IP, IP_MULTICAST_TTL,
    688 		       &ttl, sizeof(ttl)) < 0)
    689 		DBGERR(1,"rip_sock setsockopt(IP_MULTICAST_TTL)");
    690 
    691 	return s;
    692 }
    693 
    694 
    695 /* turn off main RIP socket */
    696 void
    697 rip_off(void)
    698 {
    699 	struct interface *ifp;
    700 	naddr addr;
    701 
    702 
    703 	if (rip_sock >= 0 && !mhome) {
    704 		trace_act("turn off RIP");
    705 
    706 		(void)close(rip_sock);
    707 		rip_sock = -1;
    708 
    709 		/* get non-broadcast sockets to listen to queries.
    710 		 */
    711 		for (ifp = ifnet; ifp != 0; ifp = ifp->int_next) {
    712 			if (ifp->int_state & IS_REMOTE)
    713 				continue;
    714 			if (ifp->int_rip_sock < 0) {
    715 				addr = ((ifp->int_if_flags & IFF_POINTOPOINT)
    716 					? ifp->int_dstaddr
    717 					: ifp->int_addr);
    718 				ifp->int_rip_sock = get_rip_sock(addr, 0);
    719 			}
    720 		}
    721 
    722 		fix_select();
    723 
    724 		age(0);
    725 	}
    726 }
    727 
    728 
    729 /* turn on RIP multicast input via an interface
    730  */
    731 static void
    732 rip_mcast_on(struct interface *ifp)
    733 {
    734 	struct ip_mreq m;
    735 
    736 	if (!IS_RIP_IN_OFF(ifp->int_state)
    737 	    && (ifp->int_if_flags & IFF_MULTICAST)
    738 #ifdef MCAST_PPP_BUG
    739 	    && !(ifp->int_if_flags & IFF_POINTOPOINT)
    740 #endif
    741 	    && !(ifp->int_state & IS_ALIAS)) {
    742 		m.imr_multiaddr.s_addr = htonl(INADDR_RIP_GROUP);
    743 #ifdef MCAST_IFINDEX
    744 		m.imr_interface.s_addr = htonl(ifp->int_index);
    745 #else
    746 		m.imr_interface.s_addr = ((ifp->int_if_flags & IFF_POINTOPOINT)
    747 					  ? ifp->int_dstaddr
    748 					  : ifp->int_addr);
    749 #endif
    750 		if (setsockopt(rip_sock,IPPROTO_IP, IP_ADD_MEMBERSHIP,
    751 			       &m, sizeof(m)) < 0)
    752 			LOGERR("setsockopt(IP_ADD_MEMBERSHIP RIP)");
    753 	}
    754 }
    755 
    756 
    757 /* Prepare socket used for RIP.
    758  */
    759 void
    760 rip_on(struct interface *ifp)
    761 {
    762 	/* If the main RIP socket is already alive, only start receiving
    763 	 * multicasts for this interface.
    764 	 */
    765 	if (rip_sock >= 0) {
    766 		if (ifp != 0)
    767 			rip_mcast_on(ifp);
    768 		return;
    769 	}
    770 
    771 	/* If the main RIP socket is off and it makes sense to turn it on,
    772 	 * then turn it on for all of the interfaces.
    773 	 * It makes sense if either router discovery is off, or if
    774 	 * router discover is on and at most one interface is doing RIP.
    775 	 */
    776 	if (rip_interfaces > 0 && (!rdisc_ok || rip_interfaces > 1)) {
    777 		trace_act("turn on RIP");
    778 
    779 		/* Close all of the query sockets so that we can open
    780 		 * the main socket.  SO_REUSEPORT is not a solution,
    781 		 * since that would let two daemons bind to the broadcast
    782 		 * socket.
    783 		 */
    784 		for (ifp = ifnet; ifp != 0; ifp = ifp->int_next) {
    785 			if (ifp->int_rip_sock >= 0) {
    786 				(void)close(ifp->int_rip_sock);
    787 				ifp->int_rip_sock = -1;
    788 			}
    789 		}
    790 
    791 		rip_sock = get_rip_sock(INADDR_ANY, 1);
    792 		rip_sock_mcast = 0;
    793 
    794 		/* Do not advertise anything until we have heard something
    795 		 */
    796 		if (next_bcast.tv_sec < now.tv_sec+MIN_WAITTIME)
    797 			next_bcast.tv_sec = now.tv_sec+MIN_WAITTIME;
    798 
    799 		for (ifp = ifnet; ifp != 0; ifp = ifp->int_next) {
    800 			ifp->int_query_time = NEVER;
    801 			rip_mcast_on(ifp);
    802 		}
    803 		ifinit_timer.tv_sec = now.tv_sec;
    804 
    805 	} else if (ifp != 0
    806 		   && !(ifp->int_state & IS_REMOTE)
    807 		   && ifp->int_rip_sock < 0) {
    808 		/* RIP is off, so ensure there are sockets on which
    809 		 * to listen for queries.
    810 		 */
    811 		ifp->int_rip_sock = get_rip_sock(ifp->int_addr, 0);
    812 	}
    813 
    814 	fix_select();
    815 }
    816 
    817 
    818 /* die if malloc(3) fails
    819  */
    820 void *
    821 rtmalloc(size_t size,
    822 	 const char *msg)
    823 {
    824 	void *p = malloc(size);
    825 	if (p == 0)
    826 		logbad(1,"malloc(%lu) failed in %s", (u_long)size, msg);
    827 	return p;
    828 }
    829 
    830 
    831 /* get a random instant in an interval
    832  */
    833 void
    834 intvl_random(struct timeval *tp,	/* put value here */
    835 	     u_long lo,			/* value is after this second */
    836 	     u_long hi)			/* and before this */
    837 {
    838 	tp->tv_sec = (time_t)(hi == lo
    839 			      ? lo
    840 			      : (lo + random() % ((hi - lo))));
    841 	tp->tv_usec = random() % 1000000;
    842 }
    843 
    844 
    845 void
    846 timevaladd(struct timeval *t1,
    847 	   struct timeval *t2)
    848 {
    849 
    850 	t1->tv_sec += t2->tv_sec;
    851 	if ((t1->tv_usec += t2->tv_usec) >= 1000000) {
    852 		t1->tv_sec++;
    853 		t1->tv_usec -= 1000000;
    854 	}
    855 }
    856 
    857 
    858 /* t1 = t2 - t3
    859  */
    860 static void
    861 timevalsub(struct timeval *t1,
    862 	   struct timeval *t2,
    863 	   struct timeval *t3)
    864 {
    865 	t1->tv_sec = t2->tv_sec - t3->tv_sec;
    866 	if ((t1->tv_usec = t2->tv_usec - t3->tv_usec) < 0) {
    867 		t1->tv_sec--;
    868 		t1->tv_usec += 1000000;
    869 	}
    870 }
    871 
    872 
    873 /* put a message into the system log
    874  */
    875 void
    876 msglog(const char *p, ...)
    877 {
    878 	va_list args;
    879 
    880 	trace_flush();
    881 
    882 	va_start(args, p);
    883 	vsyslog(LOG_ERR, p, args);
    884 	va_end(args);
    885 
    886 	if (ftrace != 0) {
    887 		if (ftrace == stdout)
    888 			(void)fputs("routed: ", ftrace);
    889 		va_start(args, p);
    890 		(void)vfprintf(ftrace, p, args);
    891 		va_end(args);
    892 		(void)fputc('\n', ftrace);
    893 	}
    894 }
    895 
    896 
    897 /* Put a message about a bad system into the system log if
    898  * we have not complained about it recently.
    899  *
    900  * It is desirable to complain about all bad systems, but not too often.
    901  * In the worst case, it is not practical to keep track of all bad systems.
    902  * For example, there can be many systems with the wrong password.
    903  */
    904 void
    905 msglim(struct msg_limit *lim, naddr addr, const char *p, ...)
    906 {
    907 	va_list args;
    908 	int i;
    909 	struct msg_sub *ms1, *ms;
    910 	const char *p1;
    911 
    912 	/* look for the oldest slot in the table
    913 	 * or the slot for the bad router.
    914 	 */
    915 	ms = ms1 = lim->subs;
    916 	for (i = MSG_SUBJECT_N; ; i--, ms1++) {
    917 		if (i == 0) {
    918 			/* Reuse a slot at most once every 10 minutes.
    919 			 */
    920 			if (lim->reuse > now.tv_sec) {
    921 				ms = 0;
    922 			} else {
    923 				ms = ms1;
    924 				lim->reuse = now.tv_sec + 10*60;
    925 			}
    926 			break;
    927 		}
    928 		if (ms->addr == addr) {
    929 			/* Repeat a complaint about a given system at
    930 			 * most once an hour.
    931 			 */
    932 			if (ms->until > now.tv_sec)
    933 				ms = 0;
    934 			break;
    935 		}
    936 		if (ms->until < ms1->until)
    937 			ms = ms1;
    938 	}
    939 	if (ms != 0) {
    940 		ms->addr = addr;
    941 		ms->until = now.tv_sec + 60*60;	/* 60 minutes */
    942 
    943 		trace_flush();
    944 		for (p1 = p; *p1 == ' '; p1++)
    945 			continue;
    946 		va_start(args, p);
    947 		vsyslog(LOG_ERR, p1, args);
    948 		va_end(args);
    949 	}
    950 
    951 	/* always display the message if tracing */
    952 	if (ftrace != 0) {
    953 		va_start(args, p);
    954 		(void)vfprintf(ftrace, p, args);
    955 		(void)fputc('\n', ftrace);
    956 		va_end(args);
    957 	}
    958 }
    959 
    960 
    961 void
    962 logbad(int dump, const char *p, ...)
    963 {
    964 	va_list args;
    965 
    966 	trace_flush();
    967 
    968 	va_start(args, p);
    969 	vsyslog(LOG_ERR, p, args);
    970 	va_end(args);
    971 
    972 	(void)fputs("routed: ", stderr);
    973 	va_start(args, p);
    974 	(void)vfprintf(stderr, p, args);
    975 	va_end(args);
    976 	(void)fputs("; giving up\n",stderr);
    977 	(void)fflush(stderr);
    978 
    979 	if (dump)
    980 		abort();
    981 	exit(1);
    982 }
    983