mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-25 11:37:56 +00:00
85d2c81156
In rt_change() remember to update the interface pointer otherwise we will send the RIP packets to the wrong interface(s) in future. Update the hash generator and increase the size of the hash tables. Only use the network and host parts when comparing IPX interface addresses. Immediately broadscast RIP and SAP changes. Change the alarm code to use the setitimer() call and only set a flag in the alarm signal handler. This gets rid of possible race conditions. Remove the host routing table. IPX RIP cannot do host routes, only net routes. Make the delay between broadcast packets 50ms. It seems that some Netware 4.x servers is very slow and don't have much input buffering. Handle received messages about networks and services that go down, better. Add tracing of RIP and SAP changes. It gets sysloged with a level of LOG_DEBUG.
396 lines
9.7 KiB
C
396 lines
9.7 KiB
C
/*
|
|
* Copyright (c) 1985, 1993
|
|
* The Regents of the University of California. All rights reserved.
|
|
*
|
|
* Copyright (c) 1995 John Hay. All rights reserved.
|
|
*
|
|
* This file includes significant work done at Cornell University by
|
|
* Bill Nesheim. That work included by permission.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by the University of
|
|
* California, Berkeley and its contributors.
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* $Id: main.c,v 1.6 1997/02/22 16:00:57 peter Exp $
|
|
*/
|
|
|
|
#ifndef lint
|
|
static char copyright[] =
|
|
"@(#) Copyright (c) 1985, 1993\n\
|
|
The Regents of the University of California. All rights reserved.\n";
|
|
#endif /* not lint */
|
|
|
|
#ifndef lint
|
|
static char sccsid[] = "@(#)main.c 8.1 (Berkeley) 6/5/93";
|
|
#endif /* not lint */
|
|
|
|
/*
|
|
* IPX Routing Information Protocol Daemon
|
|
*/
|
|
#include "defs.h"
|
|
#include <sys/time.h>
|
|
|
|
#include <net/if.h>
|
|
|
|
#include <errno.h>
|
|
#include <nlist.h>
|
|
#include <signal.h>
|
|
#include <paths.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
|
|
#define SAP_PKT 0
|
|
#define RIP_PKT 1
|
|
|
|
struct sockaddr_ipx addr; /* Daemon's Address */
|
|
int ripsock; /* RIP Socket to listen on */
|
|
int sapsock; /* SAP Socket to listen on */
|
|
int kmem;
|
|
int install; /* if 1 call kernel */
|
|
int lookforinterfaces; /* if 1 probe kernel for new up interfaces */
|
|
int performnlist; /* if 1 check if /kernel has changed */
|
|
int externalinterfaces; /* # of remote and local interfaces */
|
|
int timeval; /* local idea of time */
|
|
int noteremoterequests; /* squawk on requests from non-local nets */
|
|
int r; /* Routing socket to install updates with */
|
|
struct sockaddr_ipx ipx_netmask; /* Used in installing routes */
|
|
|
|
char packet[MAXRXPACKETSIZE+1];
|
|
|
|
char **argv0;
|
|
|
|
int supplier = -1; /* process should supply updates */
|
|
int dosap = 1; /* By default do SAP services. */
|
|
int dobcast = 1; /* A RIP/SAP broadcast is needed. */
|
|
time_t lastbcast; /* Time of last RIP/SAP broadcast */
|
|
|
|
struct rip *msg = (struct rip *) &packet[sizeof (struct ipx)];
|
|
struct sap_packet *sap_msg =
|
|
(struct sap_packet *) &packet[sizeof (struct ipx)];
|
|
void hup(), fkexit(), timer();
|
|
void process(int fd, int pkt_type);
|
|
int getsocket(int type, int proto, struct sockaddr_ipx *sipx);
|
|
void getinfo();
|
|
void catchtimer();
|
|
|
|
int
|
|
main(argc, argv)
|
|
int argc;
|
|
char *argv[];
|
|
{
|
|
int nfds;
|
|
fd_set fdvar;
|
|
time_t ttime;
|
|
struct itimerval tval;
|
|
|
|
argv0 = argv;
|
|
argv++, argc--;
|
|
while (argc > 0 && **argv == '-') {
|
|
if (strcmp(*argv, "-s") == 0) {
|
|
supplier = 1;
|
|
argv++, argc--;
|
|
continue;
|
|
}
|
|
if (strcmp(*argv, "-q") == 0) {
|
|
supplier = 0;
|
|
argv++, argc--;
|
|
continue;
|
|
}
|
|
if (strcmp(*argv, "-R") == 0) {
|
|
noteremoterequests++;
|
|
argv++, argc--;
|
|
continue;
|
|
}
|
|
if (strcmp(*argv, "-S") == 0) {
|
|
dosap = 0;
|
|
argv++, argc--;
|
|
continue;
|
|
}
|
|
if (strcmp(*argv, "-t") == 0) {
|
|
tracepackets++;
|
|
argv++, argc--;
|
|
ftrace = stderr;
|
|
tracing = 1;
|
|
continue;
|
|
}
|
|
if (strcmp(*argv, "-g") == 0) {
|
|
gateway = 1;
|
|
argv++, argc--;
|
|
continue;
|
|
}
|
|
if (strcmp(*argv, "-l") == 0) {
|
|
gateway = -1;
|
|
argv++, argc--;
|
|
continue;
|
|
}
|
|
fprintf(stderr,
|
|
"usage: ipxrouted [ -s ] [ -q ] [ -t ] [ -g ] [ -l ]\n");
|
|
exit(1);
|
|
}
|
|
|
|
|
|
#ifndef DEBUG
|
|
if (!tracepackets)
|
|
daemon(0, 0);
|
|
#endif
|
|
openlog("IPXrouted", LOG_PID, LOG_DAEMON);
|
|
|
|
addr.sipx_family = AF_IPX;
|
|
addr.sipx_len = sizeof(addr);
|
|
addr.sipx_port = htons(IPXPORT_RIP);
|
|
ipx_anynet.s_net[0] = ipx_anynet.s_net[1] = -1;
|
|
ipx_netmask.sipx_addr.x_net = ipx_anynet;
|
|
ipx_netmask.sipx_len = 6;
|
|
ipx_netmask.sipx_family = AF_IPX;
|
|
r = socket(AF_ROUTE, SOCK_RAW, 0);
|
|
/* later, get smart about lookingforinterfaces */
|
|
if (r)
|
|
shutdown(r, 0); /* for now, don't want reponses */
|
|
else {
|
|
fprintf(stderr, "IPXrouted: no routing socket\n");
|
|
exit(1);
|
|
}
|
|
ripsock = getsocket(SOCK_DGRAM, 0, &addr);
|
|
if (ripsock < 0)
|
|
exit(1);
|
|
|
|
if (dosap) {
|
|
addr.sipx_port = htons(IPXPORT_SAP);
|
|
sapsock = getsocket(SOCK_DGRAM, 0, &addr);
|
|
if (sapsock < 0)
|
|
exit(1);
|
|
} else
|
|
sapsock = -1;
|
|
|
|
/*
|
|
* Any extra argument is considered
|
|
* a tracing log file.
|
|
*/
|
|
if (argc > 0)
|
|
traceon(*argv);
|
|
/*
|
|
* Collect an initial view of the world by
|
|
* snooping in the kernel. Then, send a request packet on all
|
|
* directly connected networks to find out what
|
|
* everyone else thinks.
|
|
*/
|
|
rtinit();
|
|
sapinit();
|
|
ifinit();
|
|
if (supplier < 0)
|
|
supplier = 0;
|
|
/* request the state of the world */
|
|
msg->rip_cmd = htons(RIPCMD_REQUEST);
|
|
msg->rip_nets[0].rip_dst = ipx_anynet;
|
|
msg->rip_nets[0].rip_metric = htons(HOPCNT_INFINITY);
|
|
msg->rip_nets[0].rip_ticks = htons(-1);
|
|
toall(sndmsg, NULL, 0);
|
|
|
|
if (dosap) {
|
|
sap_msg->sap_cmd = htons(SAP_REQ);
|
|
sap_msg->sap[0].ServType = htons(SAP_WILDCARD);
|
|
toall(sapsndmsg, NULL, 0);
|
|
}
|
|
|
|
signal(SIGALRM, catchtimer);
|
|
signal(SIGHUP, hup);
|
|
signal(SIGINT, hup);
|
|
signal(SIGEMT, fkexit);
|
|
signal(SIGINFO, getinfo);
|
|
|
|
tval.it_interval.tv_sec = TIMER_RATE;
|
|
tval.it_interval.tv_usec = 0;
|
|
tval.it_value.tv_sec = TIMER_RATE;
|
|
tval.it_value.tv_usec = 0;
|
|
setitimer(ITIMER_REAL, &tval, NULL);
|
|
|
|
nfds = 1 + max(sapsock, ripsock);
|
|
|
|
for (;;) {
|
|
if (dobcast) {
|
|
dobcast = 0;
|
|
lastbcast = time(NULL);
|
|
timer();
|
|
}
|
|
|
|
FD_ZERO(&fdvar);
|
|
if (dosap) {
|
|
FD_SET(sapsock, &fdvar);
|
|
}
|
|
FD_SET(ripsock, &fdvar);
|
|
|
|
if(select(nfds, &fdvar, (fd_set *)NULL, (fd_set *)NULL,
|
|
(struct timeval *)NULL) < 0) {
|
|
if(errno == EINTR)
|
|
continue;
|
|
perror("during select");
|
|
exit(1);
|
|
}
|
|
|
|
if(FD_ISSET(ripsock, &fdvar))
|
|
process(ripsock, RIP_PKT);
|
|
|
|
if(dosap && FD_ISSET(sapsock, &fdvar))
|
|
process(sapsock, SAP_PKT);
|
|
|
|
ttime = time(NULL);
|
|
if (ttime > (lastbcast + TIMER_RATE + (TIMER_RATE * 2 / 3))) {
|
|
dobcast = 1;
|
|
syslog(LOG_ERR, "Missed alarm");
|
|
}
|
|
}
|
|
}
|
|
|
|
void
|
|
process(fd, pkt_type)
|
|
int fd;
|
|
int pkt_type;
|
|
{
|
|
struct sockaddr from;
|
|
int fromlen = sizeof (from), cc, omask;
|
|
struct ipx *ipxdp = (struct ipx *)packet;
|
|
|
|
cc = recvfrom(fd, packet, sizeof (packet), 0, &from, &fromlen);
|
|
if (cc <= 0) {
|
|
if (cc < 0 && errno != EINTR)
|
|
syslog(LOG_ERR, "recvfrom: %m");
|
|
return;
|
|
}
|
|
if (tracepackets > 1 && ftrace) {
|
|
fprintf(ftrace,"rcv %d bytes on %s ",
|
|
cc, ipxdp_ntoa(&ipxdp->ipx_dna));
|
|
fprintf(ftrace," from %s\n", ipxdp_ntoa(&ipxdp->ipx_sna));
|
|
}
|
|
|
|
if (noteremoterequests &&
|
|
!ipx_neteqnn(ipxdp->ipx_sna.x_net, ipx_zeronet) &&
|
|
!ipx_neteq(ipxdp->ipx_sna, ipxdp->ipx_dna))
|
|
{
|
|
syslog(LOG_ERR,
|
|
"net of interface (%s) != net on ether (%s)!\n",
|
|
ipxdp_nettoa(ipxdp->ipx_dna.x_net),
|
|
ipxdp_nettoa(ipxdp->ipx_sna.x_net));
|
|
}
|
|
|
|
/* We get the IPX header in front of the RIF packet*/
|
|
cc -= sizeof (struct ipx);
|
|
#define mask(s) (1<<((s)-1))
|
|
omask = sigblock(mask(SIGALRM));
|
|
switch(pkt_type) {
|
|
case SAP_PKT: sap_input(&from, cc);
|
|
break;
|
|
case RIP_PKT: rip_input(&from, cc);
|
|
break;
|
|
}
|
|
sigsetmask(omask);
|
|
}
|
|
|
|
int
|
|
getsocket(type, proto, sipx)
|
|
int type, proto;
|
|
struct sockaddr_ipx *sipx;
|
|
{
|
|
int domain = sipx->sipx_family;
|
|
int retry, s, on = 1;
|
|
|
|
retry = 1;
|
|
while ((s = socket(domain, type, proto)) < 0 && retry) {
|
|
syslog(LOG_ERR, "socket: %m");
|
|
sleep(5 * retry);
|
|
retry <<= 1;
|
|
}
|
|
if (retry == 0)
|
|
return (-1);
|
|
while (bind(s, (struct sockaddr *)sipx, sizeof (*sipx)) < 0 && retry) {
|
|
syslog(LOG_ERR, "bind: %m");
|
|
sleep(5 * retry);
|
|
retry <<= 1;
|
|
}
|
|
if (retry == 0)
|
|
return (-1);
|
|
if (domain==AF_IPX) {
|
|
struct ipx ipxdp;
|
|
if (setsockopt(s, 0, SO_HEADERS_ON_INPUT, &on, sizeof(on))) {
|
|
syslog(LOG_ERR, "setsockopt SEE HEADERS: %m");
|
|
exit(1);
|
|
}
|
|
if (ntohs(sipx->sipx_addr.x_port) == IPXPORT_RIP)
|
|
ipxdp.ipx_pt = IPXPROTO_RI;
|
|
else if (ntohs(sipx->sipx_addr.x_port) == IPXPORT_SAP)
|
|
#ifdef IPXPROTO_SAP
|
|
ipxdp.ipx_pt = IPXPROTO_SAP;
|
|
#else
|
|
ipxdp.ipx_pt = IPXPROTO_PXP;
|
|
#endif
|
|
else {
|
|
syslog(LOG_ERR, "port should be either RIP or SAP");
|
|
exit(1);
|
|
}
|
|
if (setsockopt(s, 0, SO_DEFAULT_HEADERS, &ipxdp, sizeof(ipxdp))) {
|
|
syslog(LOG_ERR, "setsockopt SET HEADER: %m");
|
|
exit(1);
|
|
}
|
|
}
|
|
if (setsockopt(s, SOL_SOCKET, SO_BROADCAST, &on, sizeof (on)) < 0) {
|
|
syslog(LOG_ERR, "setsockopt SO_BROADCAST: %m");
|
|
exit(1);
|
|
}
|
|
return (s);
|
|
}
|
|
|
|
/*
|
|
* Fork and exit on EMT-- for profiling.
|
|
*/
|
|
void
|
|
fkexit()
|
|
{
|
|
if (fork() == 0)
|
|
exit(0);
|
|
}
|
|
|
|
void
|
|
catchtimer()
|
|
{
|
|
dobcast = 1;
|
|
}
|
|
|
|
void
|
|
getinfo()
|
|
{
|
|
FILE *fh;
|
|
|
|
fh = fopen("/tmp/ipxrouted.dmp", "a");
|
|
if(fh == NULL)
|
|
return;
|
|
|
|
dumpriptable(fh);
|
|
dumpsaptable(fh, sap_head);
|
|
|
|
fclose(fh);
|
|
}
|
|
|