1/*	$KAME: rtsold.c,v 1.67 2003/05/17 18:16:15 itojun Exp $	*/
2
3/*
4 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 *    notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in the
14 *    documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the project nor the names of its contributors
16 *    may be used to endorse or promote products derived from this software
17 *    without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 *
31 * $FreeBSD$
32 */
33
34#include <sys/types.h>
35#include <sys/ioctl.h>
36#include <sys/socket.h>
37#include <sys/param.h>
38
39#include <net/if.h>
40#include <net/if_dl.h>
41#include <net/if_var.h>
42
43#include <netinet/in.h>
44#include <netinet/icmp6.h>
45#include <netinet/in_var.h>
46#include <arpa/inet.h>
47
48#include <netinet6/nd6.h>
49
50#include <signal.h>
51#include <unistd.h>
52#include <syslog.h>
53#include <string.h>
54#include <stdlib.h>
55#include <stdio.h>
56#include <time.h>
57#include <errno.h>
58#include <err.h>
59#include <stdarg.h>
60#include <ifaddrs.h>
61#ifdef HAVE_POLL_H
62#include <poll.h>
63#endif
64
65#include "rtsold.h"
66
67#define RTSOL_DUMPFILE	"/var/run/rtsold.dump";
68#define RTSOL_PIDFILE	"/var/run/rtsold.pid";
69
70struct timespec tm_max;
71static int log_upto = 999;
72static int fflag = 0;
73
74int Fflag = 0;	/* force setting sysctl parameters */
75int aflag = 0;
76int dflag = 0;
77int uflag = 0;
78
79const char *otherconf_script;
80const char *resolvconf_script = "/sbin/resolvconf";
81
82/* protocol constants */
83#define MAX_RTR_SOLICITATION_DELAY	1 /* second */
84#define RTR_SOLICITATION_INTERVAL	4 /* seconds */
85#define MAX_RTR_SOLICITATIONS		3 /* times */
86
87/*
88 * implementation dependent constants in seconds
89 * XXX: should be configurable
90 */
91#define PROBE_INTERVAL 60
92
93/* static variables and functions */
94static int mobile_node = 0;
95static const char *pidfilename = RTSOL_PIDFILE;
96
97#ifndef SMALL
98static int do_dump;
99static const char *dumpfilename = RTSOL_DUMPFILE;
100#endif
101
102#if 0
103static int ifreconfig(char *);
104#endif
105
106static int make_packet(struct ifinfo *);
107static struct timespec *rtsol_check_timer(void);
108
109#ifndef SMALL
110static void rtsold_set_dump_file(int);
111#endif
112static void usage(void);
113
114int
115main(int argc, char **argv)
116{
117	int s, ch, once = 0;
118	struct timespec *timeout;
119	const char *opts;
120#ifdef HAVE_POLL_H
121	struct pollfd set[2];
122#else
123	fd_set *fdsetp, *selectfdp;
124	int fdmasks;
125	int maxfd;
126#endif
127	int rtsock;
128	char *argv0;
129
130#ifndef SMALL
131	/* rtsold */
132	opts = "adDfFm1O:p:R:u";
133#else
134	/* rtsol */
135	opts = "adDFO:R:u";
136	fflag = 1;
137	once = 1;
138#endif
139	argv0 = argv[0];
140
141	while ((ch = getopt(argc, argv, opts)) != -1) {
142		switch (ch) {
143		case 'a':
144			aflag = 1;
145			break;
146		case 'd':
147			dflag += 1;
148			break;
149		case 'D':
150			dflag += 2;
151			break;
152		case 'f':
153			fflag = 1;
154			break;
155		case 'F':
156			Fflag = 1;
157			break;
158		case 'm':
159			mobile_node = 1;
160			break;
161		case '1':
162			once = 1;
163			break;
164		case 'O':
165			otherconf_script = optarg;
166			break;
167		case 'p':
168			pidfilename = optarg;
169			break;
170		case 'R':
171			resolvconf_script = optarg;
172			break;
173		case 'u':
174			uflag = 1;
175			break;
176		default:
177			usage();
178			exit(1);
179		}
180	}
181	argc -= optind;
182	argv += optind;
183
184	if ((!aflag && argc == 0) || (aflag && argc != 0)) {
185		usage();
186		exit(1);
187	}
188
189	/* Generate maximum time in timespec. */
190	tm_max.tv_sec = (-1) & ~((time_t)1 << ((sizeof(tm_max.tv_sec) * 8) - 1));
191	tm_max.tv_nsec = (-1) & ~((long)1 << ((sizeof(tm_max.tv_nsec) * 8) - 1));
192
193	/* set log level */
194	if (dflag > 1)
195		log_upto = LOG_DEBUG;
196	else if (dflag > 0)
197		log_upto = LOG_INFO;
198	else
199		log_upto = LOG_NOTICE;
200
201	if (!fflag) {
202		char *ident;
203
204		ident = strrchr(argv0, '/');
205		if (!ident)
206			ident = argv0;
207		else
208			ident++;
209		openlog(ident, LOG_NDELAY|LOG_PID, LOG_DAEMON);
210		if (log_upto >= 0)
211			setlogmask(LOG_UPTO(log_upto));
212	}
213
214	if (otherconf_script && *otherconf_script != '/') {
215		errx(1, "configuration script (%s) must be an absolute path",
216		    otherconf_script);
217	}
218	if (resolvconf_script && *resolvconf_script != '/') {
219		errx(1, "configuration script (%s) must be an absolute path",
220		    resolvconf_script);
221	}
222	if (pidfilename && *pidfilename != '/') {
223		errx(1, "pid filename (%s) must be an absolute path",
224		    pidfilename);
225	}
226#ifndef HAVE_ARC4RANDOM
227	/* random value initialization */
228	srandom((u_long)time(NULL));
229#endif
230
231#if (__FreeBSD_version < 900000)
232	if (Fflag) {
233		setinet6sysctl(IPV6CTL_FORWARDING, 0);
234	} else {
235		/* warn if forwarding is up */
236		if (getinet6sysctl(IPV6CTL_FORWARDING))
237			warnx("kernel is configured as a router, not a host");
238	}
239#endif
240
241#ifndef SMALL
242	/* initialization to dump internal status to a file */
243	signal(SIGUSR1, rtsold_set_dump_file);
244#endif
245
246	if (!fflag)
247		daemon(0, 0);		/* act as a daemon */
248
249	/*
250	 * Open a socket for sending RS and receiving RA.
251	 * This should be done before calling ifinit(), since the function
252	 * uses the socket.
253	 */
254	if ((s = sockopen()) < 0) {
255		warnmsg(LOG_ERR, __func__, "failed to open a socket");
256		exit(1);
257	}
258#ifdef HAVE_POLL_H
259	set[0].fd = s;
260	set[0].events = POLLIN;
261#else
262	maxfd = s;
263#endif
264
265#ifdef HAVE_POLL_H
266	set[1].fd = -1;
267#endif
268
269	if ((rtsock = rtsock_open()) < 0) {
270		warnmsg(LOG_ERR, __func__, "failed to open a socket");
271		exit(1);
272	}
273#ifdef HAVE_POLL_H
274	set[1].fd = rtsock;
275	set[1].events = POLLIN;
276#else
277	if (rtsock > maxfd)
278		maxfd = rtsock;
279#endif
280
281#ifndef HAVE_POLL_H
282	fdmasks = howmany(maxfd + 1, NFDBITS) * sizeof(fd_mask);
283	if ((fdsetp = malloc(fdmasks)) == NULL) {
284		warnmsg(LOG_ERR, __func__, "malloc");
285		exit(1);
286	}
287	if ((selectfdp = malloc(fdmasks)) == NULL) {
288		warnmsg(LOG_ERR, __func__, "malloc");
289		exit(1);
290	}
291#endif
292
293	/* configuration per interface */
294	if (ifinit()) {
295		warnmsg(LOG_ERR, __func__,
296		    "failed to initialize interfaces");
297		exit(1);
298	}
299	if (aflag)
300		argv = autoifprobe();
301	while (argv && *argv) {
302		if (ifconfig(*argv)) {
303			warnmsg(LOG_ERR, __func__,
304			    "failed to initialize %s", *argv);
305			exit(1);
306		}
307		argv++;
308	}
309
310	/* setup for probing default routers */
311	if (probe_init()) {
312		warnmsg(LOG_ERR, __func__,
313		    "failed to setup for probing routers");
314		exit(1);
315		/*NOTREACHED*/
316	}
317
318	/* dump the current pid */
319	if (!once) {
320		pid_t pid = getpid();
321		FILE *fp;
322
323		if ((fp = fopen(pidfilename, "w")) == NULL)
324			warnmsg(LOG_ERR, __func__,
325			    "failed to open a pid log file(%s): %s",
326			    pidfilename, strerror(errno));
327		else {
328			fprintf(fp, "%d\n", pid);
329			fclose(fp);
330		}
331	}
332#ifndef HAVE_POLL_H
333	memset(fdsetp, 0, fdmasks);
334	FD_SET(s, fdsetp);
335	FD_SET(rtsock, fdsetp);
336#endif
337	while (1) {		/* main loop */
338		int e;
339
340#ifndef HAVE_POLL_H
341		memcpy(selectfdp, fdsetp, fdmasks);
342#endif
343
344#ifndef SMALL
345		if (do_dump) {	/* SIGUSR1 */
346			do_dump = 0;
347			rtsold_dump_file(dumpfilename);
348		}
349#endif
350
351		timeout = rtsol_check_timer();
352
353		if (once) {
354			struct ifinfo *ifi;
355
356			/* if we have no timeout, we are done (or failed) */
357			if (timeout == NULL)
358				break;
359
360			/* if all interfaces have got RA packet, we are done */
361			TAILQ_FOREACH(ifi, &ifinfo_head, ifi_next) {
362				if (ifi->state != IFS_DOWN && ifi->racnt == 0)
363					break;
364			}
365			if (ifi == NULL)
366				break;
367		}
368#ifdef HAVE_POLL_H
369		e = poll(set, 2, timeout ? (timeout->tv_sec * 1000 + timeout->tv_nsec / 1000 / 1000) : INFTIM);
370#else
371		e = select(maxfd + 1, selectfdp, NULL, NULL, timeout);
372#endif
373		if (e < 1) {
374			if (e < 0 && errno != EINTR) {
375				warnmsg(LOG_ERR, __func__, "select: %s",
376				    strerror(errno));
377			}
378			continue;
379		}
380
381		/* packet reception */
382#ifdef HAVE_POLL_H
383		if (set[1].revents & POLLIN)
384#else
385		if (FD_ISSET(rtsock, selectfdp))
386#endif
387			rtsock_input(rtsock);
388#ifdef HAVE_POLL_H
389		if (set[0].revents & POLLIN)
390#else
391		if (FD_ISSET(s, selectfdp))
392#endif
393			rtsol_input(s);
394	}
395	/* NOTREACHED */
396
397	return (0);
398}
399
400int
401ifconfig(char *ifname)
402{
403	struct ifinfo *ifi;
404	struct sockaddr_dl *sdl;
405	int flags;
406
407	if ((sdl = if_nametosdl(ifname)) == NULL) {
408		warnmsg(LOG_ERR, __func__,
409		    "failed to get link layer information for %s", ifname);
410		return (-1);
411	}
412	if (find_ifinfo(sdl->sdl_index)) {
413		warnmsg(LOG_ERR, __func__,
414		    "interface %s was already configured", ifname);
415		free(sdl);
416		return (-1);
417	}
418
419	if (Fflag) {
420		struct in6_ndireq nd;
421		int s;
422
423		if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
424			warnmsg(LOG_ERR, __func__, "socket() failed.");
425			return (-1);
426		}
427		memset(&nd, 0, sizeof(nd));
428		strlcpy(nd.ifname, ifname, sizeof(nd.ifname));
429		if (ioctl(s, SIOCGIFINFO_IN6, (caddr_t)&nd) < 0) {
430			warnmsg(LOG_ERR, __func__,
431			    "cannot get accept_rtadv flag");
432			close(s);
433			return (-1);
434		}
435		nd.ndi.flags |= ND6_IFF_ACCEPT_RTADV;
436		if (ioctl(s, SIOCSIFINFO_IN6, (caddr_t)&nd) < 0) {
437			warnmsg(LOG_ERR, __func__,
438			    "cannot set accept_rtadv flag");
439			close(s);
440			return (-1);
441		}
442		close(s);
443	}
444
445	if ((ifi = malloc(sizeof(*ifi))) == NULL) {
446		warnmsg(LOG_ERR, __func__, "memory allocation failed");
447		free(sdl);
448		return (-1);
449	}
450	memset(ifi, 0, sizeof(*ifi));
451	ifi->sdl = sdl;
452	ifi->ifi_rdnss = IFI_DNSOPT_STATE_NOINFO;
453	ifi->ifi_dnssl = IFI_DNSOPT_STATE_NOINFO;
454	TAILQ_INIT(&ifi->ifi_rainfo);
455	strlcpy(ifi->ifname, ifname, sizeof(ifi->ifname));
456
457	/* construct a router solicitation message */
458	if (make_packet(ifi))
459		goto bad;
460
461	/* set link ID of this interface. */
462#ifdef HAVE_SCOPELIB
463	if (inet_zoneid(AF_INET6, 2, ifname, &ifi->linkid))
464		goto bad;
465#else
466	/* XXX: assume interface IDs as link IDs */
467	ifi->linkid = ifi->sdl->sdl_index;
468#endif
469
470	/*
471	 * check if the interface is available.
472	 * also check if SIOCGIFMEDIA ioctl is OK on the interface.
473	 */
474	ifi->mediareqok = 1;
475	ifi->active = interface_status(ifi);
476	if (!ifi->mediareqok) {
477		/*
478		 * probe routers periodically even if the link status
479		 * does not change.
480		 */
481		ifi->probeinterval = PROBE_INTERVAL;
482	}
483
484	/* activate interface: interface_up returns 0 on success */
485	flags = interface_up(ifi->ifname);
486	if (flags == 0)
487		ifi->state = IFS_DELAY;
488	else if (flags == IFS_TENTATIVE)
489		ifi->state = IFS_TENTATIVE;
490	else
491		ifi->state = IFS_DOWN;
492
493	rtsol_timer_update(ifi);
494
495	TAILQ_INSERT_TAIL(&ifinfo_head, ifi, ifi_next);
496	return (0);
497
498bad:
499	free(ifi->sdl);
500	free(ifi);
501	return (-1);
502}
503
504void
505iflist_init(void)
506{
507	struct ifinfo *ifi;
508
509	while ((ifi = TAILQ_FIRST(&ifinfo_head)) != NULL) {
510		TAILQ_REMOVE(&ifinfo_head, ifi, ifi_next);
511		if (ifi->sdl != NULL)
512			free(ifi->sdl);
513		if (ifi->rs_data != NULL)
514			free(ifi->rs_data);
515		free(ifi);
516	}
517}
518
519#if 0
520static int
521ifreconfig(char *ifname)
522{
523	struct ifinfo *ifi, *prev;
524	int rv;
525
526	prev = NULL;
527	TAILQ_FOREACH(ifi, &ifinfo_head, ifi_next) {
528		if (strncmp(ifi->ifname, ifname, sizeof(ifi->ifname)) == 0)
529			break;
530		prev = ifi;
531	}
532	prev->next = ifi->next;
533
534	rv = ifconfig(ifname);
535
536	/* reclaim it after ifconfig() in case ifname is pointer inside ifi */
537	if (ifi->rs_data)
538		free(ifi->rs_data);
539	free(ifi->sdl);
540	free(ifi);
541
542	return (rv);
543}
544#endif
545
546struct rainfo *
547find_rainfo(struct ifinfo *ifi, struct sockaddr_in6 *sin6)
548{
549	struct rainfo *rai;
550
551	TAILQ_FOREACH(rai, &ifi->ifi_rainfo, rai_next)
552		if (memcmp(&rai->rai_saddr.sin6_addr, &sin6->sin6_addr,
553		    sizeof(rai->rai_saddr.sin6_addr)) == 0)
554			return (rai);
555
556	return (NULL);
557}
558
559struct ifinfo *
560find_ifinfo(int ifindex)
561{
562	struct ifinfo *ifi;
563
564	TAILQ_FOREACH(ifi, &ifinfo_head, ifi_next) {
565		if (ifi->sdl->sdl_index == ifindex)
566			return (ifi);
567	}
568	return (NULL);
569}
570
571static int
572make_packet(struct ifinfo *ifi)
573{
574	size_t packlen = sizeof(struct nd_router_solicit), lladdroptlen = 0;
575	struct nd_router_solicit *rs;
576	char *buf;
577
578	if ((lladdroptlen = lladdropt_length(ifi->sdl)) == 0) {
579		warnmsg(LOG_INFO, __func__,
580		    "link-layer address option has null length"
581		    " on %s. Treat as not included.", ifi->ifname);
582	}
583	packlen += lladdroptlen;
584	ifi->rs_datalen = packlen;
585
586	/* allocate buffer */
587	if ((buf = malloc(packlen)) == NULL) {
588		warnmsg(LOG_ERR, __func__,
589		    "memory allocation failed for %s", ifi->ifname);
590		return (-1);
591	}
592	ifi->rs_data = buf;
593
594	/* fill in the message */
595	rs = (struct nd_router_solicit *)buf;
596	rs->nd_rs_type = ND_ROUTER_SOLICIT;
597	rs->nd_rs_code = 0;
598	rs->nd_rs_cksum = 0;
599	rs->nd_rs_reserved = 0;
600	buf += sizeof(*rs);
601
602	/* fill in source link-layer address option */
603	if (lladdroptlen)
604		lladdropt_fill(ifi->sdl, (struct nd_opt_hdr *)buf);
605
606	return (0);
607}
608
609static struct timespec *
610rtsol_check_timer(void)
611{
612	static struct timespec returnval;
613	struct timespec now, rtsol_timer;
614	struct ifinfo *ifi;
615	struct rainfo *rai;
616	struct ra_opt *rao;
617	int flags;
618
619	clock_gettime(CLOCK_MONOTONIC_FAST, &now);
620
621	rtsol_timer = tm_max;
622
623	TAILQ_FOREACH(ifi, &ifinfo_head, ifi_next) {
624		if (TS_CMP(&ifi->expire, &now, <=)) {
625			warnmsg(LOG_DEBUG, __func__, "timer expiration on %s, "
626			    "state = %d", ifi->ifname, ifi->state);
627
628			while((rai = TAILQ_FIRST(&ifi->ifi_rainfo)) != NULL) {
629				/* Remove all RA options. */
630				TAILQ_REMOVE(&ifi->ifi_rainfo, rai, rai_next);
631				while ((rao = TAILQ_FIRST(&rai->rai_ra_opt)) !=
632				    NULL) {
633					TAILQ_REMOVE(&rai->rai_ra_opt, rao,
634					    rao_next);
635					if (rao->rao_msg != NULL)
636						free(rao->rao_msg);
637					free(rao);
638				}
639				free(rai);
640			}
641			switch (ifi->state) {
642			case IFS_DOWN:
643			case IFS_TENTATIVE:
644				/* interface_up returns 0 on success */
645				flags = interface_up(ifi->ifname);
646				if (flags == 0)
647					ifi->state = IFS_DELAY;
648				else if (flags == IFS_TENTATIVE)
649					ifi->state = IFS_TENTATIVE;
650				else
651					ifi->state = IFS_DOWN;
652				break;
653			case IFS_IDLE:
654			{
655				int oldstatus = ifi->active;
656				int probe = 0;
657
658				ifi->active = interface_status(ifi);
659
660				if (oldstatus != ifi->active) {
661					warnmsg(LOG_DEBUG, __func__,
662					    "%s status is changed"
663					    " from %d to %d",
664					    ifi->ifname,
665					    oldstatus, ifi->active);
666					probe = 1;
667					ifi->state = IFS_DELAY;
668				} else if (ifi->probeinterval &&
669				    (ifi->probetimer -=
670				    ifi->timer.tv_sec) <= 0) {
671					/* probe timer expired */
672					ifi->probetimer =
673					    ifi->probeinterval;
674					probe = 1;
675					ifi->state = IFS_PROBE;
676				}
677
678				/*
679				 * If we need a probe, clear the previous
680				 * status wrt the "other" configuration.
681				 */
682				if (probe)
683					ifi->otherconfig = 0;
684
685				if (probe && mobile_node)
686					defrouter_probe(ifi);
687				break;
688			}
689			case IFS_DELAY:
690				ifi->state = IFS_PROBE;
691				sendpacket(ifi);
692				break;
693			case IFS_PROBE:
694				if (ifi->probes < MAX_RTR_SOLICITATIONS)
695					sendpacket(ifi);
696				else {
697					warnmsg(LOG_INFO, __func__,
698					    "No answer after sending %d RSs",
699					    ifi->probes);
700					ifi->probes = 0;
701					ifi->state = IFS_IDLE;
702				}
703				break;
704			}
705			rtsol_timer_update(ifi);
706		} else {
707			/* Expiration check for RA options. */
708			int expire = 0;
709
710			TAILQ_FOREACH(rai, &ifi->ifi_rainfo, rai_next) {
711				TAILQ_FOREACH(rao, &rai->rai_ra_opt, rao_next) {
712					warnmsg(LOG_DEBUG, __func__,
713					    "RA expiration timer: "
714					    "type=%d, msg=%s, expire=%s",
715					    rao->rao_type, (char *)rao->rao_msg,
716						sec2str(&rao->rao_expire));
717					if (TS_CMP(&now, &rao->rao_expire,
718					    >=)) {
719						warnmsg(LOG_DEBUG, __func__,
720						    "RA expiration timer: "
721						    "expired.");
722						TAILQ_REMOVE(&rai->rai_ra_opt,
723						    rao, rao_next);
724						if (rao->rao_msg != NULL)
725							free(rao->rao_msg);
726						free(rao);
727						expire = 1;
728					}
729				}
730			}
731			if (expire)
732				ra_opt_handler(ifi);
733		}
734		if (TS_CMP(&ifi->expire, &rtsol_timer, <))
735			rtsol_timer = ifi->expire;
736	}
737
738	if (TS_CMP(&rtsol_timer, &tm_max, ==)) {
739		warnmsg(LOG_DEBUG, __func__, "there is no timer");
740		return (NULL);
741	} else if (TS_CMP(&rtsol_timer, &now, <))
742		/* this may occur when the interval is too small */
743		returnval.tv_sec = returnval.tv_nsec = 0;
744	else
745		TS_SUB(&rtsol_timer, &now, &returnval);
746
747	now.tv_sec += returnval.tv_sec;
748	now.tv_nsec += returnval.tv_nsec;
749	warnmsg(LOG_DEBUG, __func__, "New timer is %s",
750	    sec2str(&now));
751
752	return (&returnval);
753}
754
755void
756rtsol_timer_update(struct ifinfo *ifi)
757{
758#define MILLION 1000000
759#define DADRETRY 10		/* XXX: adhoc */
760	long interval;
761	struct timespec now;
762
763	bzero(&ifi->timer, sizeof(ifi->timer));
764
765	switch (ifi->state) {
766	case IFS_DOWN:
767	case IFS_TENTATIVE:
768		if (++ifi->dadcount > DADRETRY) {
769			ifi->dadcount = 0;
770			ifi->timer.tv_sec = PROBE_INTERVAL;
771		} else
772			ifi->timer.tv_sec = 1;
773		break;
774	case IFS_IDLE:
775		if (mobile_node) {
776			/* XXX should be configurable */
777			ifi->timer.tv_sec = 3;
778		}
779		else
780			ifi->timer = tm_max;	/* stop timer(valid?) */
781		break;
782	case IFS_DELAY:
783#ifndef HAVE_ARC4RANDOM
784		interval = random() % (MAX_RTR_SOLICITATION_DELAY * MILLION);
785#else
786		interval = arc4random_uniform(MAX_RTR_SOLICITATION_DELAY * MILLION);
787#endif
788		ifi->timer.tv_sec = interval / MILLION;
789		ifi->timer.tv_nsec = (interval % MILLION) * 1000;
790		break;
791	case IFS_PROBE:
792		if (ifi->probes < MAX_RTR_SOLICITATIONS)
793			ifi->timer.tv_sec = RTR_SOLICITATION_INTERVAL;
794		else {
795			/*
796			 * After sending MAX_RTR_SOLICITATIONS solicitations,
797			 * we're just waiting for possible replies; there
798			 * will be no more solicitation.  Thus, we change
799			 * the timer value to MAX_RTR_SOLICITATION_DELAY based
800			 * on RFC 2461, Section 6.3.7.
801			 */
802			ifi->timer.tv_sec = MAX_RTR_SOLICITATION_DELAY;
803		}
804		break;
805	default:
806		warnmsg(LOG_ERR, __func__,
807		    "illegal interface state(%d) on %s",
808		    ifi->state, ifi->ifname);
809		return;
810	}
811
812	/* reset the timer */
813	if (TS_CMP(&ifi->timer, &tm_max, ==)) {
814		ifi->expire = tm_max;
815		warnmsg(LOG_DEBUG, __func__,
816		    "stop timer for %s", ifi->ifname);
817	} else {
818		clock_gettime(CLOCK_MONOTONIC_FAST, &now);
819		TS_ADD(&now, &ifi->timer, &ifi->expire);
820
821		now.tv_sec += ifi->timer.tv_sec;
822		now.tv_nsec += ifi->timer.tv_nsec;
823		warnmsg(LOG_DEBUG, __func__, "set timer for %s to %s",
824		    ifi->ifname, sec2str(&now));
825	}
826
827#undef MILLION
828}
829
830/* timer related utility functions */
831#define MILLION 1000000
832
833#ifndef SMALL
834static void
835rtsold_set_dump_file(int sig __unused)
836{
837	do_dump = 1;
838}
839#endif
840
841static void
842usage(void)
843{
844#ifndef SMALL
845	fprintf(stderr, "usage: rtsold [-adDfFm1] [-O script-name] "
846	    "[-P pidfile] [-R script-name] interfaces...\n");
847	fprintf(stderr, "usage: rtsold [-dDfFm1] [-O script-name] "
848	    "[-P pidfile] [-R script-name] -a\n");
849#else
850	fprintf(stderr, "usage: rtsol [-dDF] [-O script-name] "
851	    "[-P pidfile] [-R script-name] interfaces...\n");
852	fprintf(stderr, "usage: rtsol [-dDF] [-O script-name] "
853	    "[-P pidfile] [-R script-name] -a\n");
854#endif
855}
856
857void
858warnmsg(int priority, const char *func, const char *msg, ...)
859{
860	va_list ap;
861	char buf[BUFSIZ];
862
863	va_start(ap, msg);
864	if (fflag) {
865		if (priority <= log_upto) {
866			(void)vfprintf(stderr, msg, ap);
867			(void)fprintf(stderr, "\n");
868		}
869	} else {
870		snprintf(buf, sizeof(buf), "<%s> %s", func, msg);
871		msg = buf;
872		vsyslog(priority, msg, ap);
873	}
874	va_end(ap);
875}
876
877/*
878 * return a list of interfaces which is suitable to sending an RS.
879 */
880char **
881autoifprobe(void)
882{
883	static char **argv = NULL;
884	static int n = 0;
885	char **a;
886	int s = 0, i, found;
887	struct ifaddrs *ifap, *ifa;
888	struct in6_ndireq nd;
889
890	/* initialize */
891	while (n--)
892		free(argv[n]);
893	if (argv) {
894		free(argv);
895		argv = NULL;
896	}
897	n = 0;
898
899	if (getifaddrs(&ifap) != 0)
900		return (NULL);
901
902	if (!Fflag && (s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
903		warnmsg(LOG_ERR, __func__, "socket");
904		exit(1);
905	}
906
907	/* find an ethernet */
908	for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
909		if ((ifa->ifa_flags & IFF_UP) == 0)
910			continue;
911		if ((ifa->ifa_flags & IFF_POINTOPOINT) != 0)
912			continue;
913		if ((ifa->ifa_flags & IFF_LOOPBACK) != 0)
914			continue;
915		if ((ifa->ifa_flags & IFF_MULTICAST) == 0)
916			continue;
917
918		if (ifa->ifa_addr->sa_family != AF_INET6)
919			continue;
920
921		found = 0;
922		for (i = 0; i < n; i++) {
923			if (strcmp(argv[i], ifa->ifa_name) == 0) {
924				found++;
925				break;
926			}
927		}
928		if (found)
929			continue;
930
931		/*
932		 * Skip the interfaces which IPv6 and/or accepting RA
933		 * is disabled.
934		 */
935		if (!Fflag) {
936			memset(&nd, 0, sizeof(nd));
937			strlcpy(nd.ifname, ifa->ifa_name, sizeof(nd.ifname));
938			if (ioctl(s, SIOCGIFINFO_IN6, (caddr_t)&nd) < 0) {
939				warnmsg(LOG_ERR, __func__,
940					"ioctl(SIOCGIFINFO_IN6)");
941				exit(1);
942			}
943			if ((nd.ndi.flags & ND6_IFF_IFDISABLED))
944				continue;
945			if (!(nd.ndi.flags & ND6_IFF_ACCEPT_RTADV))
946				continue;
947		}
948
949		/* if we find multiple candidates, just warn. */
950		if (n != 0 && dflag > 1)
951			warnmsg(LOG_WARNING, __func__,
952				"multiple interfaces found");
953
954		a = (char **)realloc(argv, (n + 1) * sizeof(char **));
955		if (a == NULL) {
956			warnmsg(LOG_ERR, __func__, "realloc");
957			exit(1);
958		}
959		argv = a;
960		argv[n] = strdup(ifa->ifa_name);
961		if (!argv[n]) {
962			warnmsg(LOG_ERR, __func__, "malloc");
963			exit(1);
964		}
965		n++;
966	}
967
968	if (n) {
969		a = (char **)realloc(argv, (n + 1) * sizeof(char **));
970		if (a == NULL) {
971			warnmsg(LOG_ERR, __func__, "realloc");
972			exit(1);
973		}
974		argv = a;
975		argv[n] = NULL;
976
977		if (dflag > 0) {
978			for (i = 0; i < n; i++)
979				warnmsg(LOG_WARNING, __func__, "probing %s",
980					argv[i]);
981		}
982	}
983	if (!Fflag)
984		close(s);
985	freeifaddrs(ifap);
986	return (argv);
987}
988