]>
Commit | Line | Data |
---|---|---|
718e3744 | 1 | /* Kernel communication using routing socket. |
2 | * Copyright (C) 1999 Kunihiro Ishiguro | |
3 | * | |
4 | * This file is part of GNU Zebra. | |
5 | * | |
6 | * GNU Zebra is free software; you can redistribute it and/or modify it | |
7 | * under the terms of the GNU General Public License as published by the | |
8 | * Free Software Foundation; either version 2, or (at your option) any | |
9 | * later version. | |
10 | * | |
11 | * GNU Zebra is distributed in the hope that it will be useful, but | |
12 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
14 | * General Public License for more details. | |
15 | * | |
16 | * You should have received a copy of the GNU General Public License | |
17 | * along with GNU Zebra; see the file COPYING. If not, write to the Free | |
18 | * Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA | |
19 | * 02111-1307, USA. | |
20 | */ | |
21 | ||
22 | #include <zebra.h> | |
23 | ||
24 | #include "if.h" | |
25 | #include "prefix.h" | |
26 | #include "sockunion.h" | |
27 | #include "connected.h" | |
28 | #include "memory.h" | |
29 | #include "ioctl.h" | |
30 | #include "log.h" | |
31 | #include "str.h" | |
32 | #include "table.h" | |
33 | #include "rib.h" | |
edd7c245 | 34 | #include "privs.h" |
718e3744 | 35 | |
36 | #include "zebra/interface.h" | |
37 | #include "zebra/zserv.h" | |
38 | #include "zebra/debug.h" | |
ec1a4283 | 39 | #include "zebra/kernel_socket.h" |
718e3744 | 40 | |
edd7c245 | 41 | extern struct zebra_privs_t zserv_privs; |
9bcdb638 | 42 | extern struct zebra_t zebrad; |
edd7c245 | 43 | |
4bfbea8c | 44 | /* |
45 | * Given a sockaddr length, round it up to include pad bytes following | |
46 | * it. Assumes the kernel pads to sizeof(long). | |
47 | * | |
48 | * XXX: why is ROUNDUP(0) sizeof(long)? 0 is an illegal sockaddr | |
49 | * length anyway (< sizeof (struct sockaddr)), so this shouldn't | |
50 | * matter. | |
51 | */ | |
718e3744 | 52 | #define ROUNDUP(a) \ |
53 | ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) | |
54 | ||
4bfbea8c | 55 | /* |
56 | * Given a pointer (sockaddr or void *), return the number of bytes | |
57 | * taken up by the sockaddr and any padding needed for alignment. | |
58 | */ | |
6f0e3f6e | 59 | #if defined(HAVE_STRUCT_SOCKADDR_SA_LEN) |
4bfbea8c | 60 | #define SAROUNDUP(X) ROUNDUP(((struct sockaddr *)(X))->sa_len) |
30be8028 | 61 | #elif defined(HAVE_IPV6) |
4bfbea8c | 62 | /* |
63 | * One would hope all fixed-size structure definitions are aligned, | |
64 | * but round them up nonetheless. | |
65 | */ | |
66 | #define SAROUNDUP(X) \ | |
3e95a074 | 67 | (((struct sockaddr *)(X))->sa_family == AF_INET ? \ |
68 | ROUNDUP(sizeof(struct sockaddr_in)):\ | |
69 | (((struct sockaddr *)(X))->sa_family == AF_INET6 ? \ | |
70 | ROUNDUP(sizeof(struct sockaddr_in6)) : \ | |
71 | (((struct sockaddr *)(X))->sa_family == AF_LINK ? \ | |
c50ae8ba | 72 | ROUNDUP(sizeof(struct sockaddr_dl)) : sizeof(struct sockaddr)))) |
30be8028 | 73 | #else /* HAVE_IPV6 */ |
4bfbea8c | 74 | #define SAROUNDUP(X) \ |
30be8028 | 75 | (((struct sockaddr *)(X))->sa_family == AF_INET ? \ |
76 | ROUNDUP(sizeof(struct sockaddr_in)):\ | |
77 | (((struct sockaddr *)(X))->sa_family == AF_LINK ? \ | |
78 | ROUNDUP(sizeof(struct sockaddr_dl)) : sizeof(struct sockaddr))) | |
6f0e3f6e | 79 | #endif /* HAVE_STRUCT_SOCKADDR_SA_LEN */ |
718e3744 | 80 | |
ec1a4283 | 81 | /* We use an additional pointer in following, pdest, rather than (DEST) |
82 | * directly, because gcc will warn if the macro is expanded and DEST is NULL, | |
83 | * complaining that memcpy is being passed a NULL value, despite the fact | |
84 | * the if (NULL) makes it impossible. | |
85 | */ | |
62debbbe | 86 | #define RTA_ADDR_GET(DEST, RTA, RTMADDRS, PNT) \ |
87 | if ((RTMADDRS) & (RTA)) \ | |
88 | { \ | |
ec1a4283 | 89 | void *pdest = (DEST); \ |
62debbbe | 90 | int len = SAROUNDUP ((PNT)); \ |
ea6f82b9 | 91 | if ( ((DEST) != NULL) && \ |
62debbbe | 92 | af_check (((struct sockaddr *)(PNT))->sa_family)) \ |
ec1a4283 | 93 | memcpy (pdest, (PNT), len); \ |
62debbbe | 94 | (PNT) += len; \ |
95 | } | |
96 | #define RTA_ATTR_GET(DEST, RTA, RTMADDRS, PNT) \ | |
97 | if ((RTMADDRS) & (RTA)) \ | |
98 | { \ | |
ec1a4283 | 99 | void *pdest = (DEST); \ |
62debbbe | 100 | int len = SAROUNDUP ((PNT)); \ |
ec1a4283 | 101 | if ((DEST) != NULL) \ |
102 | memcpy (pdest, (PNT), len); \ | |
62debbbe | 103 | (PNT) += len; \ |
104 | } | |
105 | ||
6fe70d1b | 106 | #define RTA_NAME_GET(DEST, RTA, RTMADDRS, PNT, LEN) \ |
107 | if ((RTMADDRS) & (RTA)) \ | |
108 | { \ | |
ec1a4283 | 109 | u_char *pdest = (u_char *) (DEST); \ |
6fe70d1b | 110 | int len = SAROUNDUP ((PNT)); \ |
111 | struct sockaddr_dl *sdl = (struct sockaddr_dl *)(PNT); \ | |
112 | if (IS_ZEBRA_DEBUG_KERNEL) \ | |
113 | zlog_debug ("%s: RTA_SDL_GET nlen %d, alen %d", \ | |
114 | __func__, sdl->sdl_nlen, sdl->sdl_alen); \ | |
115 | if ( ((DEST) != NULL) && (sdl->sdl_family == AF_LINK) \ | |
116 | && (sdl->sdl_nlen < IFNAMSIZ) && (sdl->sdl_nlen <= len) ) \ | |
117 | { \ | |
ec1a4283 | 118 | memcpy (pdest, sdl->sdl_data, sdl->sdl_nlen); \ |
119 | pdest[sdl->sdl_nlen] = '\0'; \ | |
6fe70d1b | 120 | (LEN) = sdl->sdl_nlen; \ |
121 | } \ | |
122 | (PNT) += len; \ | |
123 | } \ | |
124 | else \ | |
125 | { \ | |
126 | (LEN) = 0; \ | |
127 | } | |
718e3744 | 128 | /* Routing socket message types. */ |
1423c809 | 129 | const struct message rtm_type_str[] = |
718e3744 | 130 | { |
131 | {RTM_ADD, "RTM_ADD"}, | |
132 | {RTM_DELETE, "RTM_DELETE"}, | |
133 | {RTM_CHANGE, "RTM_CHANGE"}, | |
134 | {RTM_GET, "RTM_GET"}, | |
135 | {RTM_LOSING, "RTM_LOSING"}, | |
136 | {RTM_REDIRECT, "RTM_REDIRECT"}, | |
137 | {RTM_MISS, "RTM_MISS"}, | |
138 | {RTM_LOCK, "RTM_LOCK"}, | |
9458b819 | 139 | #ifdef OLDADD |
718e3744 | 140 | {RTM_OLDADD, "RTM_OLDADD"}, |
9458b819 GT |
141 | #endif /* RTM_OLDADD */ |
142 | #ifdef RTM_OLDDEL | |
718e3744 | 143 | {RTM_OLDDEL, "RTM_OLDDEL"}, |
9458b819 | 144 | #endif /* RTM_OLDDEL */ |
718e3744 | 145 | {RTM_RESOLVE, "RTM_RESOLVE"}, |
146 | {RTM_NEWADDR, "RTM_NEWADDR"}, | |
147 | {RTM_DELADDR, "RTM_DELADDR"}, | |
148 | {RTM_IFINFO, "RTM_IFINFO"}, | |
149 | #ifdef RTM_OIFINFO | |
150 | {RTM_OIFINFO, "RTM_OIFINFO"}, | |
151 | #endif /* RTM_OIFINFO */ | |
152 | #ifdef RTM_NEWMADDR | |
153 | {RTM_NEWMADDR, "RTM_NEWMADDR"}, | |
154 | #endif /* RTM_NEWMADDR */ | |
155 | #ifdef RTM_DELMADDR | |
156 | {RTM_DELMADDR, "RTM_DELMADDR"}, | |
157 | #endif /* RTM_DELMADDR */ | |
158 | #ifdef RTM_IFANNOUNCE | |
159 | {RTM_IFANNOUNCE, "RTM_IFANNOUNCE"}, | |
160 | #endif /* RTM_IFANNOUNCE */ | |
161 | {0, NULL} | |
162 | }; | |
163 | ||
164 | struct message rtm_flag_str[] = | |
165 | { | |
166 | {RTF_UP, "UP"}, | |
167 | {RTF_GATEWAY, "GATEWAY"}, | |
168 | {RTF_HOST, "HOST"}, | |
169 | {RTF_REJECT, "REJECT"}, | |
170 | {RTF_DYNAMIC, "DYNAMIC"}, | |
171 | {RTF_MODIFIED, "MODIFIED"}, | |
172 | {RTF_DONE, "DONE"}, | |
173 | #ifdef RTF_MASK | |
174 | {RTF_MASK, "MASK"}, | |
175 | #endif /* RTF_MASK */ | |
176 | {RTF_CLONING, "CLONING"}, | |
177 | {RTF_XRESOLVE, "XRESOLVE"}, | |
178 | {RTF_LLINFO, "LLINFO"}, | |
179 | {RTF_STATIC, "STATIC"}, | |
180 | {RTF_BLACKHOLE, "BLACKHOLE"}, | |
6fe70d1b | 181 | #ifdef RTF_PRIVATE |
182 | {RTF_PRIVATE, "PRIVATE"}, | |
183 | #endif /* RTF_PRIVATE */ | |
718e3744 | 184 | {RTF_PROTO1, "PROTO1"}, |
185 | {RTF_PROTO2, "PROTO2"}, | |
186 | #ifdef RTF_PRCLONING | |
187 | {RTF_PRCLONING, "PRCLONING"}, | |
188 | #endif /* RTF_PRCLONING */ | |
189 | #ifdef RTF_WASCLONED | |
190 | {RTF_WASCLONED, "WASCLONED"}, | |
191 | #endif /* RTF_WASCLONED */ | |
192 | #ifdef RTF_PROTO3 | |
193 | {RTF_PROTO3, "PROTO3"}, | |
194 | #endif /* RTF_PROTO3 */ | |
195 | #ifdef RTF_PINNED | |
196 | {RTF_PINNED, "PINNED"}, | |
197 | #endif /* RTF_PINNED */ | |
198 | #ifdef RTF_LOCAL | |
199 | {RTF_LOCAL, "LOCAL"}, | |
200 | #endif /* RTF_LOCAL */ | |
201 | #ifdef RTF_BROADCAST | |
202 | {RTF_BROADCAST, "BROADCAST"}, | |
203 | #endif /* RTF_BROADCAST */ | |
204 | #ifdef RTF_MULTICAST | |
205 | {RTF_MULTICAST, "MULTICAST"}, | |
206 | #endif /* RTF_MULTICAST */ | |
6fe70d1b | 207 | #ifdef RTF_MULTIRT |
208 | {RTF_MULTIRT, "MULTIRT"}, | |
209 | #endif /* RTF_MULTIRT */ | |
210 | #ifdef RTF_SETSRC | |
211 | {RTF_SETSRC, "SETSRC"}, | |
212 | #endif /* RTF_SETSRC */ | |
718e3744 | 213 | {0, NULL} |
214 | }; | |
215 | ||
216 | /* Kernel routing update socket. */ | |
217 | int routing_sock = -1; | |
218 | ||
219 | /* Yes I'm checking ugly routing socket behavior. */ | |
220 | /* #define DEBUG */ | |
221 | ||
222 | /* Supported address family check. */ | |
62debbbe | 223 | static int inline |
718e3744 | 224 | af_check (int family) |
225 | { | |
226 | if (family == AF_INET) | |
227 | return 1; | |
228 | #ifdef HAVE_IPV6 | |
229 | if (family == AF_INET6) | |
230 | return 1; | |
231 | #endif /* HAVE_IPV6 */ | |
232 | return 0; | |
233 | } | |
234 | \f | |
235 | /* Dump routing table flag for debug purpose. */ | |
b6178002 | 236 | static void |
718e3744 | 237 | rtm_flag_dump (int flag) |
238 | { | |
239 | struct message *mes; | |
240 | static char buf[BUFSIZ]; | |
241 | ||
cced60dd | 242 | buf[0] = '\0'; |
718e3744 | 243 | for (mes = rtm_flag_str; mes->key != 0; mes++) |
244 | { | |
245 | if (mes->key & flag) | |
246 | { | |
247 | strlcat (buf, mes->str, BUFSIZ); | |
248 | strlcat (buf, " ", BUFSIZ); | |
249 | } | |
250 | } | |
b6178002 | 251 | zlog_debug ("Kernel: %s", buf); |
718e3744 | 252 | } |
253 | ||
254 | #ifdef RTM_IFANNOUNCE | |
255 | /* Interface adding function */ | |
6621ca86 | 256 | static int |
718e3744 | 257 | ifan_read (struct if_announcemsghdr *ifan) |
258 | { | |
259 | struct interface *ifp; | |
6fe70d1b | 260 | |
718e3744 | 261 | ifp = if_lookup_by_index (ifan->ifan_index); |
6fe70d1b | 262 | |
263 | if (ifp) | |
264 | assert ( (ifp->ifindex == ifan->ifan_index) | |
265 | || (ifp->ifindex == IFINDEX_INTERNAL) ); | |
266 | ||
ec1a4283 | 267 | if ( (ifp == NULL) |
268 | || ((ifp->ifindex == IFINDEX_INTERNAL) | |
269 | && (ifan->ifan_what == IFAN_ARRIVAL)) ) | |
718e3744 | 270 | { |
6fe70d1b | 271 | if (IS_ZEBRA_DEBUG_KERNEL) |
272 | zlog_debug ("%s: creating interface for ifindex %d, name %s", | |
273 | __func__, ifan->ifan_index, ifan->ifan_name); | |
274 | ||
718e3744 | 275 | /* Create Interface */ |
08dbfb69 | 276 | ifp = if_get_by_name_len(ifan->ifan_name, |
277 | strnlen(ifan->ifan_name, | |
278 | sizeof(ifan->ifan_name))); | |
718e3744 | 279 | ifp->ifindex = ifan->ifan_index; |
280 | ||
281 | if_add_update (ifp); | |
282 | } | |
283 | else if (ifp != NULL && ifan->ifan_what == IFAN_DEPARTURE) | |
6eb8827d | 284 | if_delete_update (ifp); |
718e3744 | 285 | |
286 | if_get_flags (ifp); | |
287 | if_get_mtu (ifp); | |
288 | if_get_metric (ifp); | |
289 | ||
290 | if (IS_ZEBRA_DEBUG_KERNEL) | |
6fe70d1b | 291 | zlog_debug ("%s: interface %s index %d", |
292 | __func__, ifan->ifan_name, ifan->ifan_index); | |
718e3744 | 293 | |
294 | return 0; | |
295 | } | |
296 | #endif /* RTM_IFANNOUNCE */ | |
297 | ||
c543a173 AS |
298 | #ifdef HAVE_BSD_LINK_DETECT |
299 | /* BSD link detect translation */ | |
300 | static void | |
301 | bsd_linkdetect_translate (struct if_msghdr *ifm) | |
302 | { | |
55edb0d4 AS |
303 | if ((ifm->ifm_data.ifi_link_state >= LINK_STATE_UP) || |
304 | (ifm->ifm_data.ifi_link_state == LINK_STATE_UNKNOWN)) | |
c543a173 AS |
305 | SET_FLAG(ifm->ifm_flags, IFF_RUNNING); |
306 | else | |
307 | UNSET_FLAG(ifm->ifm_flags, IFF_RUNNING); | |
308 | } | |
309 | #endif /* HAVE_BSD_LINK_DETECT */ | |
310 | ||
da26e3b6 | 311 | /* |
312 | * Handle struct if_msghdr obtained from reading routing socket or | |
313 | * sysctl (from interface_list). There may or may not be sockaddrs | |
314 | * present after the header. | |
315 | */ | |
ec1a4283 | 316 | int |
718e3744 | 317 | ifm_read (struct if_msghdr *ifm) |
318 | { | |
3e95a074 | 319 | struct interface *ifp = NULL; |
6fe70d1b | 320 | char ifname[IFNAMSIZ]; |
321 | short ifnlen = 0; | |
0994c3a5 | 322 | caddr_t *cp; |
6fe70d1b | 323 | |
324 | /* terminate ifname at head (for strnlen) and tail (for safety) */ | |
325 | ifname[IFNAMSIZ - 1] = '\0'; | |
326 | ||
da26e3b6 | 327 | /* paranoia: sanity check structure */ |
328 | if (ifm->ifm_msglen < sizeof(struct if_msghdr)) | |
329 | { | |
330 | zlog_err ("ifm_read: ifm->ifm_msglen %d too short\n", | |
331 | ifm->ifm_msglen); | |
332 | return -1; | |
333 | } | |
334 | ||
335 | /* | |
4bfbea8c | 336 | * Check for a sockaddr_dl following the message. First, point to |
337 | * where a socakddr might be if one follows the message. | |
da26e3b6 | 338 | */ |
4bfbea8c | 339 | cp = (void *)(ifm + 1); |
718e3744 | 340 | |
4bfbea8c | 341 | #ifdef SUNOS_5 |
3e95a074 | 342 | /* |
4bfbea8c | 343 | * XXX This behavior should be narrowed to only the kernel versions |
344 | * for which the structures returned do not match the headers. | |
345 | * | |
3e95a074 | 346 | * if_msghdr_t on 64 bit kernels in Solaris 9 and earlier versions |
4bfbea8c | 347 | * is 12 bytes larger than the 32 bit version. |
3e95a074 | 348 | */ |
4bfbea8c | 349 | if (((struct sockaddr *) cp)->sa_family == AF_UNSPEC) |
3e95a074 | 350 | cp = cp + 12; |
4bfbea8c | 351 | #endif |
3e95a074 | 352 | |
6fe70d1b | 353 | RTA_ADDR_GET (NULL, RTA_DST, ifm->ifm_addrs, cp); |
354 | RTA_ADDR_GET (NULL, RTA_GATEWAY, ifm->ifm_addrs, cp); | |
355 | RTA_ATTR_GET (NULL, RTA_NETMASK, ifm->ifm_addrs, cp); | |
356 | RTA_ADDR_GET (NULL, RTA_GENMASK, ifm->ifm_addrs, cp); | |
357 | RTA_NAME_GET (ifname, RTA_IFP, ifm->ifm_addrs, cp, ifnlen); | |
358 | RTA_ADDR_GET (NULL, RTA_IFA, ifm->ifm_addrs, cp); | |
359 | RTA_ADDR_GET (NULL, RTA_AUTHOR, ifm->ifm_addrs, cp); | |
360 | RTA_ADDR_GET (NULL, RTA_BRD, ifm->ifm_addrs, cp); | |
361 | ||
362 | if (IS_ZEBRA_DEBUG_KERNEL) | |
363 | zlog_debug ("%s: sdl ifname %s", __func__, (ifnlen ? ifname : "(nil)")); | |
364 | ||
4bfbea8c | 365 | /* |
6fe70d1b | 366 | * Look up on ifindex first, because ifindices are the primary handle for |
367 | * interfaces across the user/kernel boundary, for most systems. (Some | |
368 | * messages, such as up/down status changes on NetBSD, do not include a | |
369 | * sockaddr_dl). | |
4bfbea8c | 370 | */ |
6fe70d1b | 371 | if ( (ifp = if_lookup_by_index (ifm->ifm_index)) != NULL ) |
3e95a074 | 372 | { |
6fe70d1b | 373 | /* we have an ifp, verify that the name matches as some systems, |
374 | * eg Solaris, have a 1:many association of ifindex:ifname | |
375 | * if they dont match, we dont have the correct ifp and should | |
376 | * set it back to NULL to let next check do lookup by name | |
377 | */ | |
378 | if (ifnlen && (strncmp (ifp->name, ifname, IFNAMSIZ) != 0) ) | |
3e95a074 | 379 | { |
6fe70d1b | 380 | if (IS_ZEBRA_DEBUG_KERNEL) |
381 | zlog_debug ("%s: ifp name %s doesnt match sdl name %s", | |
382 | __func__, ifp->name, ifname); | |
383 | ifp = NULL; | |
3e95a074 | 384 | } |
385 | } | |
6fe70d1b | 386 | |
3e95a074 | 387 | /* |
6fe70d1b | 388 | * If we dont have an ifp, try looking up by name. Particularly as some |
389 | * systems (Solaris) have a 1:many mapping of ifindex:ifname - the ifname | |
390 | * is therefore our unique handle to that interface. | |
391 | * | |
392 | * Interfaces specified in the configuration file for which the ifindex | |
393 | * has not been determined will have ifindex == IFINDEX_INTERNAL, and such | |
394 | * interfaces are found by this search, and then their ifindex values can | |
395 | * be filled in. | |
3e95a074 | 396 | */ |
6fe70d1b | 397 | if ( (ifp == NULL) && ifnlen) |
398 | ifp = if_lookup_by_name (ifname); | |
718e3744 | 399 | |
da26e3b6 | 400 | /* |
6fe70d1b | 401 | * If ifp still does not exist or has an invalid index (IFINDEX_INTERNAL), |
402 | * create or fill in an interface. | |
da26e3b6 | 403 | */ |
d2fc8896 | 404 | if ((ifp == NULL) || (ifp->ifindex == IFINDEX_INTERNAL)) |
718e3744 | 405 | { |
da26e3b6 | 406 | /* |
4bfbea8c | 407 | * To create or fill in an interface, a sockaddr_dl (via |
408 | * RTA_IFP) is required. | |
da26e3b6 | 409 | */ |
6fe70d1b | 410 | if (!ifnlen) |
da26e3b6 | 411 | { |
6fe70d1b | 412 | zlog_warn ("Interface index %d (new) missing ifname\n", |
4bfbea8c | 413 | ifm->ifm_index); |
da26e3b6 | 414 | return -1; |
415 | } | |
5c78b3d0 | 416 | |
417 | #ifndef RTM_IFANNOUNCE | |
418 | /* Down->Down interface should be ignored here. | |
419 | * See further comment below. | |
420 | */ | |
421 | if (!CHECK_FLAG (ifm->ifm_flags, IFF_UP)) | |
422 | return 0; | |
423 | #endif /* !RTM_IFANNOUNCE */ | |
6fe70d1b | 424 | |
3e95a074 | 425 | if (ifp == NULL) |
6fe70d1b | 426 | { |
427 | /* Interface that zebra was not previously aware of, so create. */ | |
428 | ifp = if_create (ifname, ifnlen); | |
429 | if (IS_ZEBRA_DEBUG_KERNEL) | |
430 | zlog_debug ("%s: creating ifp for ifindex %d", | |
431 | __func__, ifm->ifm_index); | |
432 | } | |
718e3744 | 433 | |
6fe70d1b | 434 | if (IS_ZEBRA_DEBUG_KERNEL) |
435 | zlog_debug ("%s: updated/created ifp, ifname %s, ifindex %d", | |
436 | __func__, ifp->name, ifp->ifindex); | |
4bfbea8c | 437 | /* |
438 | * Fill in newly created interface structure, or larval | |
d2fc8896 | 439 | * structure with ifindex IFINDEX_INTERNAL. |
4bfbea8c | 440 | */ |
718e3744 | 441 | ifp->ifindex = ifm->ifm_index; |
c543a173 AS |
442 | |
443 | #ifdef HAVE_BSD_LINK_DETECT /* translate BSD kernel msg for link-state */ | |
444 | bsd_linkdetect_translate(ifm); | |
445 | #endif /* HAVE_BSD_LINK_DETECT */ | |
446 | ||
5c78b3d0 | 447 | if_flags_update (ifp, ifm->ifm_flags); |
718e3744 | 448 | #if defined(__bsdi__) |
449 | if_kvm_get_mtu (ifp); | |
450 | #else | |
451 | if_get_mtu (ifp); | |
452 | #endif /* __bsdi__ */ | |
453 | if_get_metric (ifp); | |
454 | ||
718e3744 | 455 | if_add_update (ifp); |
456 | } | |
457 | else | |
da26e3b6 | 458 | /* |
459 | * Interface structure exists. Adjust stored flags from | |
460 | * notification. If interface has up->down or down->up | |
461 | * transition, call state change routines (to adjust routes, | |
462 | * notify routing daemons, etc.). (Other flag changes are stored | |
463 | * but apparently do not trigger action.) | |
464 | */ | |
718e3744 | 465 | { |
6fe70d1b | 466 | if (ifp->ifindex != ifm->ifm_index) |
467 | { | |
468 | zlog_warn ("%s: index mismatch, ifname %s, ifp index %d, " | |
469 | "ifm index %d", | |
470 | __func__, ifp->name, ifp->ifindex, ifm->ifm_index); | |
471 | return -1; | |
472 | } | |
473 | ||
c543a173 AS |
474 | #ifdef HAVE_BSD_LINK_DETECT /* translate BSD kernel msg for link-state */ |
475 | bsd_linkdetect_translate(ifm); | |
476 | #endif /* HAVE_BSD_LINK_DETECT */ | |
477 | ||
5c78b3d0 | 478 | /* update flags and handle operative->inoperative transition, if any */ |
479 | if_flags_update (ifp, ifm->ifm_flags); | |
480 | ||
6eb8827d | 481 | #ifndef RTM_IFANNOUNCE |
5c78b3d0 | 482 | if (!if_is_up (ifp)) |
483 | { | |
484 | /* No RTM_IFANNOUNCE on this platform, so we can never | |
485 | * distinguish between ~IFF_UP and delete. We must presume | |
486 | * it has been deleted. | |
487 | * Eg, Solaris will not notify us of unplumb. | |
488 | * | |
489 | * XXX: Fixme - this should be runtime detected | |
490 | * So that a binary compiled on a system with IFANNOUNCE | |
491 | * will still behave correctly if run on a platform without | |
492 | */ | |
493 | if_delete_update (ifp); | |
494 | } | |
6eb8827d | 495 | #endif /* RTM_IFANNOUNCE */ |
1ba27564 DO |
496 | if (if_is_up (ifp)) |
497 | { | |
498 | #if defined(__bsdi__) | |
499 | if_kvm_get_mtu (ifp); | |
500 | #else | |
501 | if_get_mtu (ifp); | |
502 | #endif /* __bsdi__ */ | |
503 | if_get_metric (ifp); | |
504 | } | |
718e3744 | 505 | } |
5c78b3d0 | 506 | |
718e3744 | 507 | #ifdef HAVE_NET_RT_IFLIST |
508 | ifp->stats = ifm->ifm_data; | |
509 | #endif /* HAVE_NET_RT_IFLIST */ | |
510 | ||
511 | if (IS_ZEBRA_DEBUG_KERNEL) | |
6fe70d1b | 512 | zlog_debug ("%s: interface %s index %d", |
513 | __func__, ifp->name, ifp->ifindex); | |
718e3744 | 514 | |
515 | return 0; | |
516 | } | |
517 | \f | |
518 | /* Address read from struct ifa_msghdr. */ | |
6621ca86 | 519 | static void |
718e3744 | 520 | ifam_read_mesg (struct ifa_msghdr *ifm, |
521 | union sockunion *addr, | |
522 | union sockunion *mask, | |
6fe70d1b | 523 | union sockunion *brd, |
524 | char *ifname, | |
525 | short *ifnlen) | |
718e3744 | 526 | { |
527 | caddr_t pnt, end; | |
7ab62c53 AS |
528 | union sockunion dst; |
529 | union sockunion gateway; | |
718e3744 | 530 | |
531 | pnt = (caddr_t)(ifm + 1); | |
532 | end = ((caddr_t)ifm) + ifm->ifam_msglen; | |
533 | ||
718e3744 | 534 | /* Be sure structure is cleared */ |
535 | memset (mask, 0, sizeof (union sockunion)); | |
536 | memset (addr, 0, sizeof (union sockunion)); | |
6621ca86 | 537 | memset (brd, 0, sizeof (union sockunion)); |
7ab62c53 AS |
538 | memset (&dst, 0, sizeof (union sockunion)); |
539 | memset (&gateway, 0, sizeof (union sockunion)); | |
718e3744 | 540 | |
541 | /* We fetch each socket variable into sockunion. */ | |
7ab62c53 AS |
542 | RTA_ADDR_GET (&dst, RTA_DST, ifm->ifam_addrs, pnt); |
543 | RTA_ADDR_GET (&gateway, RTA_GATEWAY, ifm->ifam_addrs, pnt); | |
62debbbe | 544 | RTA_ATTR_GET (mask, RTA_NETMASK, ifm->ifam_addrs, pnt); |
545 | RTA_ADDR_GET (NULL, RTA_GENMASK, ifm->ifam_addrs, pnt); | |
6fe70d1b | 546 | RTA_NAME_GET (ifname, RTA_IFP, ifm->ifam_addrs, pnt, *ifnlen); |
62debbbe | 547 | RTA_ADDR_GET (addr, RTA_IFA, ifm->ifam_addrs, pnt); |
548 | RTA_ADDR_GET (NULL, RTA_AUTHOR, ifm->ifam_addrs, pnt); | |
6fe70d1b | 549 | RTA_ADDR_GET (brd, RTA_BRD, ifm->ifam_addrs, pnt); |
718e3744 | 550 | |
6fe70d1b | 551 | if (IS_ZEBRA_DEBUG_KERNEL) |
55196042 AS |
552 | { |
553 | switch (sockunion_family(addr)) | |
554 | { | |
555 | case AF_INET: | |
556 | { | |
7ab62c53 | 557 | char buf[4][INET_ADDRSTRLEN]; |
55196042 | 558 | zlog_debug ("%s: ifindex %d, ifname %s, ifam_addrs 0x%x, " |
7ab62c53 AS |
559 | "ifam_flags 0x%x, addr %s/%d broad %s dst %s " |
560 | "gateway %s", | |
561 | __func__, ifm->ifam_index, | |
55196042 | 562 | (ifnlen ? ifname : "(nil)"), ifm->ifam_addrs, |
7ab62c53 | 563 | ifm->ifam_flags, |
55196042 AS |
564 | inet_ntop(AF_INET,&addr->sin.sin_addr, |
565 | buf[0],sizeof(buf[0])), | |
566 | ip_masklen(mask->sin.sin_addr), | |
567 | inet_ntop(AF_INET,&brd->sin.sin_addr, | |
7ab62c53 AS |
568 | buf[1],sizeof(buf[1])), |
569 | inet_ntop(AF_INET,&dst.sin.sin_addr, | |
570 | buf[2],sizeof(buf[2])), | |
571 | inet_ntop(AF_INET,&gateway.sin.sin_addr, | |
572 | buf[3],sizeof(buf[3]))); | |
55196042 AS |
573 | } |
574 | break; | |
575 | #ifdef HAVE_IPV6 | |
576 | case AF_INET6: | |
577 | { | |
7ab62c53 | 578 | char buf[4][INET6_ADDRSTRLEN]; |
55196042 | 579 | zlog_debug ("%s: ifindex %d, ifname %s, ifam_addrs 0x%x, " |
7ab62c53 AS |
580 | "ifam_flags 0x%x, addr %s/%d broad %s dst %s " |
581 | "gateway %s", | |
55196042 AS |
582 | __func__, ifm->ifam_index, |
583 | (ifnlen ? ifname : "(nil)"), ifm->ifam_addrs, | |
7ab62c53 | 584 | ifm->ifam_flags, |
55196042 AS |
585 | inet_ntop(AF_INET6,&addr->sin6.sin6_addr, |
586 | buf[0],sizeof(buf[0])), | |
587 | ip6_masklen(mask->sin6.sin6_addr), | |
588 | inet_ntop(AF_INET6,&brd->sin6.sin6_addr, | |
7ab62c53 AS |
589 | buf[1],sizeof(buf[1])), |
590 | inet_ntop(AF_INET6,&dst.sin6.sin6_addr, | |
591 | buf[2],sizeof(buf[2])), | |
592 | inet_ntop(AF_INET6,&gateway.sin6.sin6_addr, | |
593 | buf[3],sizeof(buf[3]))); | |
55196042 AS |
594 | } |
595 | break; | |
596 | #endif /* HAVE_IPV6 */ | |
597 | default: | |
598 | zlog_debug ("%s: ifindex %d, ifname %s, ifam_addrs 0x%x", | |
599 | __func__, ifm->ifam_index, | |
600 | (ifnlen ? ifname : "(nil)"), ifm->ifam_addrs); | |
601 | break; | |
602 | } | |
603 | } | |
7ab62c53 | 604 | |
718e3744 | 605 | /* Assert read up end point matches to end point */ |
606 | if (pnt != end) | |
607 | zlog_warn ("ifam_read() does't read all socket data"); | |
608 | } | |
609 | ||
610 | /* Interface's address information get. */ | |
ec1a4283 | 611 | int |
718e3744 | 612 | ifam_read (struct ifa_msghdr *ifam) |
613 | { | |
6fe70d1b | 614 | struct interface *ifp = NULL; |
0752ef0b | 615 | union sockunion addr, mask, brd; |
6fe70d1b | 616 | char ifname[INTERFACE_NAMSIZ]; |
617 | short ifnlen = 0; | |
618 | char isalias = 0; | |
7ab62c53 | 619 | int flags = 0; |
6fe70d1b | 620 | |
621 | ifname[0] = ifname[INTERFACE_NAMSIZ - 1] = '\0'; | |
622 | ||
623 | /* Allocate and read address information. */ | |
624 | ifam_read_mesg (ifam, &addr, &mask, &brd, ifname, &ifnlen); | |
625 | ||
626 | if ((ifp = if_lookup_by_index(ifam->ifam_index)) == NULL) | |
718e3744 | 627 | { |
6fe70d1b | 628 | zlog_warn ("%s: no interface for ifname %s, index %d", |
629 | __func__, ifname, ifam->ifam_index); | |
718e3744 | 630 | return -1; |
631 | } | |
6fe70d1b | 632 | |
633 | if (ifnlen && strncmp (ifp->name, ifname, INTERFACE_NAMSIZ)) | |
634 | isalias = 1; | |
635 | ||
7ab62c53 AS |
636 | /* N.B. The info in ifa_msghdr does not tell us whether the RTA_BRD |
637 | field contains a broadcast address or a peer address, so we are forced to | |
638 | rely upon the interface type. */ | |
639 | if (if_is_pointopoint(ifp)) | |
640 | SET_FLAG(flags, ZEBRA_IFA_PEER); | |
641 | ||
6502208c PJ |
642 | #if 0 |
643 | /* it might seem cute to grab the interface metric here, however | |
644 | * we're processing an address update message, and so some systems | |
645 | * (e.g. FBSD) dont bother to fill in ifam_metric. Disabled, but left | |
646 | * in deliberately, as comment. | |
647 | */ | |
d34b8991 | 648 | ifp->metric = ifam->ifam_metric; |
6502208c PJ |
649 | #endif |
650 | ||
718e3744 | 651 | /* Add connected address. */ |
652 | switch (sockunion_family (&addr)) | |
653 | { | |
654 | case AF_INET: | |
655 | if (ifam->ifam_type == RTM_NEWADDR) | |
7ab62c53 | 656 | connected_add_ipv4 (ifp, flags, &addr.sin.sin_addr, |
718e3744 | 657 | ip_masklen (mask.sin.sin_addr), |
d34b8991 | 658 | &brd.sin.sin_addr, |
659 | (isalias ? ifname : NULL)); | |
718e3744 | 660 | else |
7ab62c53 | 661 | connected_delete_ipv4 (ifp, flags, &addr.sin.sin_addr, |
718e3744 | 662 | ip_masklen (mask.sin.sin_addr), |
0752ef0b | 663 | &brd.sin.sin_addr); |
718e3744 | 664 | break; |
665 | #ifdef HAVE_IPV6 | |
666 | case AF_INET6: | |
667 | /* Unset interface index from link-local address when IPv6 stack | |
668 | is KAME. */ | |
669 | if (IN6_IS_ADDR_LINKLOCAL (&addr.sin6.sin6_addr)) | |
670 | SET_IN6_LINKLOCAL_IFINDEX (addr.sin6.sin6_addr, 0); | |
671 | ||
672 | if (ifam->ifam_type == RTM_NEWADDR) | |
7ab62c53 | 673 | connected_add_ipv6 (ifp, flags, &addr.sin6.sin6_addr, |
718e3744 | 674 | ip6_masklen (mask.sin6.sin6_addr), |
d34b8991 | 675 | &brd.sin6.sin6_addr, |
676 | (isalias ? ifname : NULL)); | |
718e3744 | 677 | else |
678 | connected_delete_ipv6 (ifp, | |
679 | &addr.sin6.sin6_addr, | |
680 | ip6_masklen (mask.sin6.sin6_addr), | |
0752ef0b | 681 | &brd.sin6.sin6_addr); |
718e3744 | 682 | break; |
683 | #endif /* HAVE_IPV6 */ | |
684 | default: | |
685 | /* Unsupported family silently ignore... */ | |
686 | break; | |
687 | } | |
5c78b3d0 | 688 | |
689 | /* Check interface flag for implicit up of the interface. */ | |
690 | if_refresh (ifp); | |
691 | ||
692 | #ifdef SUNOS_5 | |
693 | /* In addition to lacking IFANNOUNCE, on SUNOS IFF_UP is strange. | |
694 | * See comments for SUNOS_5 in interface.c::if_flags_mangle. | |
695 | * | |
696 | * Here we take care of case where the real IFF_UP was previously | |
697 | * unset (as kept in struct zebra_if.primary_state) and the mangled | |
698 | * IFF_UP (ie IFF_UP set || listcount(connected) has now transitioned | |
699 | * to unset due to the lost non-primary address having DELADDR'd. | |
700 | * | |
701 | * we must delete the interface, because in between here and next | |
702 | * event for this interface-name the administrator could unplumb | |
703 | * and replumb the interface. | |
704 | */ | |
705 | if (!if_is_up (ifp)) | |
706 | if_delete_update (ifp); | |
707 | #endif /* SUNOS_5 */ | |
708 | ||
718e3744 | 709 | return 0; |
710 | } | |
711 | \f | |
712 | /* Interface function for reading kernel routing table information. */ | |
6621ca86 | 713 | static int |
718e3744 | 714 | rtm_read_mesg (struct rt_msghdr *rtm, |
715 | union sockunion *dest, | |
716 | union sockunion *mask, | |
6fe70d1b | 717 | union sockunion *gate, |
718 | char *ifname, | |
719 | short *ifnlen) | |
718e3744 | 720 | { |
721 | caddr_t pnt, end; | |
722 | ||
723 | /* Pnt points out socket data start point. */ | |
724 | pnt = (caddr_t)(rtm + 1); | |
725 | end = ((caddr_t)rtm) + rtm->rtm_msglen; | |
726 | ||
727 | /* rt_msghdr version check. */ | |
728 | if (rtm->rtm_version != RTM_VERSION) | |
729 | zlog (NULL, LOG_WARNING, | |
730 | "Routing message version different %d should be %d." | |
731 | "This may cause problem\n", rtm->rtm_version, RTM_VERSION); | |
62debbbe | 732 | |
718e3744 | 733 | /* Be sure structure is cleared */ |
734 | memset (dest, 0, sizeof (union sockunion)); | |
735 | memset (gate, 0, sizeof (union sockunion)); | |
736 | memset (mask, 0, sizeof (union sockunion)); | |
737 | ||
738 | /* We fetch each socket variable into sockunion. */ | |
62debbbe | 739 | RTA_ADDR_GET (dest, RTA_DST, rtm->rtm_addrs, pnt); |
740 | RTA_ADDR_GET (gate, RTA_GATEWAY, rtm->rtm_addrs, pnt); | |
741 | RTA_ATTR_GET (mask, RTA_NETMASK, rtm->rtm_addrs, pnt); | |
742 | RTA_ADDR_GET (NULL, RTA_GENMASK, rtm->rtm_addrs, pnt); | |
6fe70d1b | 743 | RTA_NAME_GET (ifname, RTA_IFP, rtm->rtm_addrs, pnt, *ifnlen); |
62debbbe | 744 | RTA_ADDR_GET (NULL, RTA_IFA, rtm->rtm_addrs, pnt); |
745 | RTA_ADDR_GET (NULL, RTA_AUTHOR, rtm->rtm_addrs, pnt); | |
746 | RTA_ADDR_GET (NULL, RTA_BRD, rtm->rtm_addrs, pnt); | |
718e3744 | 747 | |
748 | /* If there is netmask information set it's family same as | |
749 | destination family*/ | |
750 | if (rtm->rtm_addrs & RTA_NETMASK) | |
751 | mask->sa.sa_family = dest->sa.sa_family; | |
752 | ||
753 | /* Assert read up to the end of pointer. */ | |
754 | if (pnt != end) | |
755 | zlog (NULL, LOG_WARNING, "rtm_read() does't read all socket data."); | |
756 | ||
757 | return rtm->rtm_flags; | |
758 | } | |
759 | ||
ec1a4283 | 760 | void |
718e3744 | 761 | rtm_read (struct rt_msghdr *rtm) |
762 | { | |
763 | int flags; | |
764 | u_char zebra_flags; | |
765 | union sockunion dest, mask, gate; | |
6fe70d1b | 766 | char ifname[INTERFACE_NAMSIZ + 1]; |
767 | short ifnlen = 0; | |
718e3744 | 768 | |
769 | zebra_flags = 0; | |
770 | ||
718e3744 | 771 | /* Read destination and netmask and gateway from rtm message |
772 | structure. */ | |
6fe70d1b | 773 | flags = rtm_read_mesg (rtm, &dest, &mask, &gate, ifname, &ifnlen); |
6da59801 DO |
774 | if (!(flags & RTF_DONE)) |
775 | return; | |
dc95824a DO |
776 | if (IS_ZEBRA_DEBUG_KERNEL) |
777 | zlog_debug ("%s: got rtm of type %d (%s)", __func__, rtm->rtm_type, | |
2d844524 | 778 | lookup (rtm_type_str, rtm->rtm_type)); |
718e3744 | 779 | |
780 | #ifdef RTF_CLONED /*bsdi, netbsd 1.6*/ | |
781 | if (flags & RTF_CLONED) | |
782 | return; | |
783 | #endif | |
784 | #ifdef RTF_WASCLONED /*freebsd*/ | |
785 | if (flags & RTF_WASCLONED) | |
786 | return; | |
787 | #endif | |
788 | ||
789 | if ((rtm->rtm_type == RTM_ADD) && ! (flags & RTF_UP)) | |
790 | return; | |
791 | ||
792 | /* This is connected route. */ | |
793 | if (! (flags & RTF_GATEWAY)) | |
794 | return; | |
795 | ||
796 | if (flags & RTF_PROTO1) | |
797 | SET_FLAG (zebra_flags, ZEBRA_FLAG_SELFROUTE); | |
798 | ||
799 | /* This is persistent route. */ | |
800 | if (flags & RTF_STATIC) | |
801 | SET_FLAG (zebra_flags, ZEBRA_FLAG_STATIC); | |
802 | ||
81dfcaa2 | 803 | /* This is a reject or blackhole route */ |
804 | if (flags & RTF_REJECT) | |
805 | SET_FLAG (zebra_flags, ZEBRA_FLAG_REJECT); | |
806 | if (flags & RTF_BLACKHOLE) | |
807 | SET_FLAG (zebra_flags, ZEBRA_FLAG_BLACKHOLE); | |
808 | ||
718e3744 | 809 | if (dest.sa.sa_family == AF_INET) |
810 | { | |
811 | struct prefix_ipv4 p; | |
812 | ||
813 | p.family = AF_INET; | |
814 | p.prefix = dest.sin.sin_addr; | |
815 | if (flags & RTF_HOST) | |
816 | p.prefixlen = IPV4_MAX_PREFIXLEN; | |
817 | else | |
818 | p.prefixlen = ip_masklen (mask.sin.sin_addr); | |
ca16218d | 819 | |
dc95824a DO |
820 | /* Catch self originated messages and match them against our current RIB. |
821 | * At the same time, ignore unconfirmed messages, they should be tracked | |
822 | * by rtm_write() and kernel_rtm_ipv4(). | |
823 | */ | |
96934e6a | 824 | if (rtm->rtm_type != RTM_GET && rtm->rtm_pid == pid) |
dc95824a DO |
825 | { |
826 | char buf[INET_ADDRSTRLEN], gate_buf[INET_ADDRSTRLEN]; | |
827 | int ret; | |
dc95824a DO |
828 | if (! IS_ZEBRA_DEBUG_RIB) |
829 | return; | |
830 | ret = rib_lookup_ipv4_route (&p, &gate); | |
831 | inet_ntop (AF_INET, &p.prefix, buf, INET_ADDRSTRLEN); | |
832 | switch (rtm->rtm_type) | |
833 | { | |
834 | case RTM_ADD: | |
835 | case RTM_GET: | |
836 | case RTM_CHANGE: | |
837 | /* The kernel notifies us about a new route in FIB created by us. | |
838 | Do we have a correspondent entry in our RIB? */ | |
839 | switch (ret) | |
840 | { | |
841 | case ZEBRA_RIB_NOTFOUND: | |
842 | zlog_debug ("%s: %s %s/%d: desync: RR isn't yet in RIB, while already in FIB", | |
2d844524 | 843 | __func__, lookup (rtm_type_str, rtm->rtm_type), buf, p.prefixlen); |
dc95824a DO |
844 | break; |
845 | case ZEBRA_RIB_FOUND_CONNECTED: | |
846 | case ZEBRA_RIB_FOUND_NOGATE: | |
847 | inet_ntop (AF_INET, &gate.sin.sin_addr, gate_buf, INET_ADDRSTRLEN); | |
848 | zlog_debug ("%s: %s %s/%d: desync: RR is in RIB, but gate differs (ours is %s)", | |
2d844524 | 849 | __func__, lookup (rtm_type_str, rtm->rtm_type), buf, p.prefixlen, gate_buf); |
dc95824a DO |
850 | break; |
851 | case ZEBRA_RIB_FOUND_EXACT: /* RIB RR == FIB RR */ | |
852 | zlog_debug ("%s: %s %s/%d: done Ok", | |
2d844524 | 853 | __func__, lookup (rtm_type_str, rtm->rtm_type), buf, p.prefixlen); |
dc95824a DO |
854 | rib_lookup_and_dump (&p); |
855 | return; | |
856 | break; | |
857 | } | |
858 | break; | |
859 | case RTM_DELETE: | |
860 | /* The kernel notifies us about a route deleted by us. Do we still | |
861 | have it in the RIB? Do we have anything instead? */ | |
862 | switch (ret) | |
863 | { | |
864 | case ZEBRA_RIB_FOUND_EXACT: | |
865 | zlog_debug ("%s: %s %s/%d: desync: RR is still in RIB, while already not in FIB", | |
2d844524 | 866 | __func__, lookup (rtm_type_str, rtm->rtm_type), buf, p.prefixlen); |
dc95824a DO |
867 | rib_lookup_and_dump (&p); |
868 | break; | |
869 | case ZEBRA_RIB_FOUND_CONNECTED: | |
870 | case ZEBRA_RIB_FOUND_NOGATE: | |
871 | zlog_debug ("%s: %s %s/%d: desync: RR is still in RIB, plus gate differs", | |
2d844524 | 872 | __func__, lookup (rtm_type_str, rtm->rtm_type), buf, p.prefixlen); |
dc95824a DO |
873 | rib_lookup_and_dump (&p); |
874 | break; | |
875 | case ZEBRA_RIB_NOTFOUND: /* RIB RR == FIB RR */ | |
876 | zlog_debug ("%s: %s %s/%d: done Ok", | |
2d844524 | 877 | __func__, lookup (rtm_type_str, rtm->rtm_type), buf, p.prefixlen); |
dc95824a DO |
878 | rib_lookup_and_dump (&p); |
879 | return; | |
880 | break; | |
881 | } | |
882 | break; | |
883 | default: | |
884 | zlog_debug ("%s: %s/%d: warning: loopback RTM of type %s received", | |
2d844524 | 885 | __func__, buf, p.prefixlen, lookup (rtm_type_str, rtm->rtm_type)); |
dc95824a DO |
886 | } |
887 | return; | |
888 | } | |
889 | ||
ca16218d | 890 | /* Change, delete the old prefix, we have no further information |
891 | * to specify the route really | |
892 | */ | |
893 | if (rtm->rtm_type == RTM_CHANGE) | |
894 | rib_delete_ipv4 (ZEBRA_ROUTE_KERNEL, zebra_flags, &p, | |
895 | NULL, 0, 0); | |
896 | ||
897 | if (rtm->rtm_type == RTM_GET | |
898 | || rtm->rtm_type == RTM_ADD | |
899 | || rtm->rtm_type == RTM_CHANGE) | |
718e3744 | 900 | rib_add_ipv4 (ZEBRA_ROUTE_KERNEL, zebra_flags, |
7514fb77 | 901 | &p, &gate.sin.sin_addr, NULL, 0, 0, 0, 0); |
718e3744 | 902 | else |
903 | rib_delete_ipv4 (ZEBRA_ROUTE_KERNEL, zebra_flags, | |
904 | &p, &gate.sin.sin_addr, 0, 0); | |
905 | } | |
906 | #ifdef HAVE_IPV6 | |
907 | if (dest.sa.sa_family == AF_INET6) | |
908 | { | |
5619f56b DO |
909 | /* One day we might have a debug section here like one in the |
910 | * IPv4 case above. Just ignore own messages at the moment. | |
911 | */ | |
912 | if (rtm->rtm_type != RTM_GET && rtm->rtm_pid == pid) | |
913 | return; | |
718e3744 | 914 | struct prefix_ipv6 p; |
915 | unsigned int ifindex = 0; | |
916 | ||
917 | p.family = AF_INET6; | |
918 | p.prefix = dest.sin6.sin6_addr; | |
919 | if (flags & RTF_HOST) | |
920 | p.prefixlen = IPV6_MAX_PREFIXLEN; | |
921 | else | |
922 | p.prefixlen = ip6_masklen (mask.sin6.sin6_addr); | |
923 | ||
924 | #ifdef KAME | |
925 | if (IN6_IS_ADDR_LINKLOCAL (&gate.sin6.sin6_addr)) | |
926 | { | |
927 | ifindex = IN6_LINKLOCAL_IFINDEX (gate.sin6.sin6_addr); | |
928 | SET_IN6_LINKLOCAL_IFINDEX (gate.sin6.sin6_addr, 0); | |
929 | } | |
930 | #endif /* KAME */ | |
931 | ||
ca16218d | 932 | /* CHANGE: delete the old prefix, we have no further information |
933 | * to specify the route really | |
934 | */ | |
935 | if (rtm->rtm_type == RTM_CHANGE) | |
6621ca86 | 936 | rib_delete_ipv6 (ZEBRA_ROUTE_KERNEL, zebra_flags, &p, |
ca16218d | 937 | NULL, 0, 0); |
938 | ||
939 | if (rtm->rtm_type == RTM_GET | |
940 | || rtm->rtm_type == RTM_ADD | |
941 | || rtm->rtm_type == RTM_CHANGE) | |
718e3744 | 942 | rib_add_ipv6 (ZEBRA_ROUTE_KERNEL, zebra_flags, |
be61c4eb | 943 | &p, &gate.sin6.sin6_addr, ifindex, 0, 0, 0); |
718e3744 | 944 | else |
945 | rib_delete_ipv6 (ZEBRA_ROUTE_KERNEL, zebra_flags, | |
946 | &p, &gate.sin6.sin6_addr, ifindex, 0); | |
947 | } | |
948 | #endif /* HAVE_IPV6 */ | |
949 | } | |
950 | ||
951 | /* Interface function for the kernel routing table updates. Support | |
6621ca86 | 952 | * for RTM_CHANGE will be needed. |
953 | * Exported only for rt_socket.c | |
954 | */ | |
718e3744 | 955 | int |
956 | rtm_write (int message, | |
957 | union sockunion *dest, | |
958 | union sockunion *mask, | |
959 | union sockunion *gate, | |
960 | unsigned int index, | |
961 | int zebra_flags, | |
962 | int metric) | |
963 | { | |
964 | int ret; | |
965 | caddr_t pnt; | |
966 | struct interface *ifp; | |
718e3744 | 967 | |
968 | /* Sequencial number of routing message. */ | |
969 | static int msg_seq = 0; | |
970 | ||
971 | /* Struct of rt_msghdr and buffer for storing socket's data. */ | |
972 | struct | |
973 | { | |
974 | struct rt_msghdr rtm; | |
975 | char buf[512]; | |
976 | } msg; | |
977 | ||
718e3744 | 978 | if (routing_sock < 0) |
979 | return ZEBRA_ERR_EPERM; | |
980 | ||
981 | /* Clear and set rt_msghdr values */ | |
982 | memset (&msg, 0, sizeof (struct rt_msghdr)); | |
983 | msg.rtm.rtm_version = RTM_VERSION; | |
984 | msg.rtm.rtm_type = message; | |
985 | msg.rtm.rtm_seq = msg_seq++; | |
986 | msg.rtm.rtm_addrs = RTA_DST; | |
987 | msg.rtm.rtm_addrs |= RTA_GATEWAY; | |
988 | msg.rtm.rtm_flags = RTF_UP; | |
989 | msg.rtm.rtm_index = index; | |
990 | ||
991 | if (metric != 0) | |
992 | { | |
993 | msg.rtm.rtm_rmx.rmx_hopcount = metric; | |
994 | msg.rtm.rtm_inits |= RTV_HOPCOUNT; | |
995 | } | |
996 | ||
997 | ifp = if_lookup_by_index (index); | |
998 | ||
999 | if (gate && message == RTM_ADD) | |
1000 | msg.rtm.rtm_flags |= RTF_GATEWAY; | |
1001 | ||
1002 | if (! gate && message == RTM_ADD && ifp && | |
1003 | (ifp->flags & IFF_POINTOPOINT) == 0) | |
1004 | msg.rtm.rtm_flags |= RTF_CLONING; | |
1005 | ||
1006 | /* If no protocol specific gateway is specified, use link | |
1007 | address for gateway. */ | |
1008 | if (! gate) | |
1009 | { | |
1010 | if (!ifp) | |
1011 | { | |
dc95824a DO |
1012 | char dest_buf[INET_ADDRSTRLEN] = "NULL", mask_buf[INET_ADDRSTRLEN] = "255.255.255.255"; |
1013 | if (dest) | |
1014 | inet_ntop (AF_INET, &dest->sin.sin_addr, dest_buf, INET_ADDRSTRLEN); | |
1015 | if (mask) | |
1016 | inet_ntop (AF_INET, &mask->sin.sin_addr, mask_buf, INET_ADDRSTRLEN); | |
1017 | zlog_warn ("%s: %s/%s: gate == NULL and no gateway found for ifindex %d", | |
1018 | __func__, dest_buf, mask_buf, index); | |
718e3744 | 1019 | return -1; |
1020 | } | |
1021 | gate = (union sockunion *) & ifp->sdl; | |
1022 | } | |
1023 | ||
1024 | if (mask) | |
1025 | msg.rtm.rtm_addrs |= RTA_NETMASK; | |
1026 | else if (message == RTM_ADD) | |
1027 | msg.rtm.rtm_flags |= RTF_HOST; | |
1028 | ||
1029 | /* Tagging route with flags */ | |
1030 | msg.rtm.rtm_flags |= (RTF_PROTO1); | |
1031 | ||
1032 | /* Additional flags. */ | |
1033 | if (zebra_flags & ZEBRA_FLAG_BLACKHOLE) | |
1034 | msg.rtm.rtm_flags |= RTF_BLACKHOLE; | |
81dfcaa2 | 1035 | if (zebra_flags & ZEBRA_FLAG_REJECT) |
1036 | msg.rtm.rtm_flags |= RTF_REJECT; | |
1037 | ||
718e3744 | 1038 | |
6f0e3f6e | 1039 | #ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN |
718e3744 | 1040 | #define SOCKADDRSET(X,R) \ |
1041 | if (msg.rtm.rtm_addrs & (R)) \ | |
1042 | { \ | |
1043 | int len = ROUNDUP ((X)->sa.sa_len); \ | |
1044 | memcpy (pnt, (caddr_t)(X), len); \ | |
1045 | pnt += len; \ | |
1046 | } | |
1047 | #else | |
1048 | #define SOCKADDRSET(X,R) \ | |
1049 | if (msg.rtm.rtm_addrs & (R)) \ | |
1050 | { \ | |
6fe70d1b | 1051 | int len = SAROUNDUP (X); \ |
718e3744 | 1052 | memcpy (pnt, (caddr_t)(X), len); \ |
1053 | pnt += len; \ | |
1054 | } | |
6f0e3f6e | 1055 | #endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */ |
718e3744 | 1056 | |
1057 | pnt = (caddr_t) msg.buf; | |
1058 | ||
1059 | /* Write each socket data into rtm message buffer */ | |
1060 | SOCKADDRSET (dest, RTA_DST); | |
1061 | SOCKADDRSET (gate, RTA_GATEWAY); | |
1062 | SOCKADDRSET (mask, RTA_NETMASK); | |
1063 | ||
1064 | msg.rtm.rtm_msglen = pnt - (caddr_t) &msg; | |
1065 | ||
1066 | ret = write (routing_sock, &msg, msg.rtm.rtm_msglen); | |
1067 | ||
1068 | if (ret != msg.rtm.rtm_msglen) | |
1069 | { | |
1070 | if (errno == EEXIST) | |
1071 | return ZEBRA_ERR_RTEXIST; | |
1072 | if (errno == ENETUNREACH) | |
1073 | return ZEBRA_ERR_RTUNREACH; | |
dc95824a DO |
1074 | if (errno == ESRCH) |
1075 | return ZEBRA_ERR_RTNOEXIST; | |
718e3744 | 1076 | |
dc95824a DO |
1077 | zlog_warn ("%s: write : %s (%d)", __func__, safe_strerror (errno), errno); |
1078 | return ZEBRA_ERR_KERNEL; | |
718e3744 | 1079 | } |
dc95824a | 1080 | return ZEBRA_ERR_NOERROR; |
718e3744 | 1081 | } |
1082 | ||
1083 | \f | |
1084 | #include "thread.h" | |
1085 | #include "zebra/zserv.h" | |
1086 | ||
718e3744 | 1087 | /* For debug purpose. */ |
b6178002 | 1088 | static void |
718e3744 | 1089 | rtmsg_debug (struct rt_msghdr *rtm) |
1090 | { | |
2d844524 | 1091 | zlog_debug ("Kernel: Len: %d Type: %s", rtm->rtm_msglen, lookup (rtm_type_str, rtm->rtm_type)); |
718e3744 | 1092 | rtm_flag_dump (rtm->rtm_flags); |
b6178002 | 1093 | zlog_debug ("Kernel: message seq %d", rtm->rtm_seq); |
6fe70d1b | 1094 | zlog_debug ("Kernel: pid %d, rtm_addrs 0x%x", rtm->rtm_pid, rtm->rtm_addrs); |
718e3744 | 1095 | } |
1096 | ||
1097 | /* This is pretty gross, better suggestions welcome -- mhandler */ | |
1098 | #ifndef RTAX_MAX | |
1099 | #ifdef RTA_NUMBITS | |
1100 | #define RTAX_MAX RTA_NUMBITS | |
1101 | #else | |
1102 | #define RTAX_MAX 8 | |
1103 | #endif /* RTA_NUMBITS */ | |
1104 | #endif /* RTAX_MAX */ | |
1105 | ||
1106 | /* Kernel routing table and interface updates via routing socket. */ | |
6621ca86 | 1107 | static int |
718e3744 | 1108 | kernel_read (struct thread *thread) |
1109 | { | |
1110 | int sock; | |
1111 | int nbytes; | |
1112 | struct rt_msghdr *rtm; | |
1113 | ||
dbee01fe | 1114 | /* |
1115 | * This must be big enough for any message the kernel might send. | |
b27900b7 | 1116 | * Rather than determining how many sockaddrs of what size might be |
1117 | * in each particular message, just use RTAX_MAX of sockaddr_storage | |
1118 | * for each. Note that the sockaddrs must be after each message | |
1119 | * definition, or rather after whichever happens to be the largest, | |
1120 | * since the buffer needs to be big enough for a message and the | |
1121 | * sockaddrs together. | |
dbee01fe | 1122 | */ |
718e3744 | 1123 | union |
1124 | { | |
1125 | /* Routing information. */ | |
1126 | struct | |
1127 | { | |
1128 | struct rt_msghdr rtm; | |
b27900b7 | 1129 | struct sockaddr_storage addr[RTAX_MAX]; |
718e3744 | 1130 | } r; |
1131 | ||
1132 | /* Interface information. */ | |
1133 | struct | |
1134 | { | |
1135 | struct if_msghdr ifm; | |
b27900b7 | 1136 | struct sockaddr_storage addr[RTAX_MAX]; |
718e3744 | 1137 | } im; |
1138 | ||
1139 | /* Interface address information. */ | |
1140 | struct | |
1141 | { | |
1142 | struct ifa_msghdr ifa; | |
b27900b7 | 1143 | struct sockaddr_storage addr[RTAX_MAX]; |
718e3744 | 1144 | } ia; |
1145 | ||
1146 | #ifdef RTM_IFANNOUNCE | |
1147 | /* Interface arrival/departure */ | |
1148 | struct | |
1149 | { | |
1150 | struct if_announcemsghdr ifan; | |
b27900b7 | 1151 | struct sockaddr_storage addr[RTAX_MAX]; |
718e3744 | 1152 | } ian; |
1153 | #endif /* RTM_IFANNOUNCE */ | |
1154 | ||
1155 | } buf; | |
1156 | ||
1157 | /* Fetch routing socket. */ | |
1158 | sock = THREAD_FD (thread); | |
1159 | ||
1160 | nbytes= read (sock, &buf, sizeof buf); | |
1161 | ||
1162 | if (nbytes <= 0) | |
1163 | { | |
1164 | if (nbytes < 0 && errno != EWOULDBLOCK && errno != EAGAIN) | |
6099b3b5 | 1165 | zlog_warn ("routing socket error: %s", safe_strerror (errno)); |
718e3744 | 1166 | return 0; |
1167 | } | |
1168 | ||
9bcdb638 | 1169 | thread_add_read (zebrad.master, kernel_read, NULL, sock); |
718e3744 | 1170 | |
726f9b2b | 1171 | if (IS_ZEBRA_DEBUG_KERNEL) |
1172 | rtmsg_debug (&buf.r.rtm); | |
718e3744 | 1173 | |
1174 | rtm = &buf.r.rtm; | |
1175 | ||
b27900b7 | 1176 | /* |
1177 | * Ensure that we didn't drop any data, so that processing routines | |
1178 | * can assume they have the whole message. | |
1179 | */ | |
da26e3b6 | 1180 | if (rtm->rtm_msglen != nbytes) |
1181 | { | |
1182 | zlog_warn ("kernel_read: rtm->rtm_msglen %d, nbytes %d, type %d\n", | |
1183 | rtm->rtm_msglen, nbytes, rtm->rtm_type); | |
1184 | return -1; | |
1185 | } | |
1186 | ||
718e3744 | 1187 | switch (rtm->rtm_type) |
1188 | { | |
1189 | case RTM_ADD: | |
1190 | case RTM_DELETE: | |
ca16218d | 1191 | case RTM_CHANGE: |
718e3744 | 1192 | rtm_read (rtm); |
1193 | break; | |
1194 | case RTM_IFINFO: | |
1195 | ifm_read (&buf.im.ifm); | |
1196 | break; | |
1197 | case RTM_NEWADDR: | |
1198 | case RTM_DELADDR: | |
1199 | ifam_read (&buf.ia.ifa); | |
1200 | break; | |
1201 | #ifdef RTM_IFANNOUNCE | |
1202 | case RTM_IFANNOUNCE: | |
1203 | ifan_read (&buf.ian.ifan); | |
1204 | break; | |
1205 | #endif /* RTM_IFANNOUNCE */ | |
1206 | default: | |
726f9b2b | 1207 | if (IS_ZEBRA_DEBUG_KERNEL) |
b6178002 | 1208 | zlog_debug("Unprocessed RTM_type: %d", rtm->rtm_type); |
718e3744 | 1209 | break; |
1210 | } | |
1211 | return 0; | |
1212 | } | |
1213 | ||
1214 | /* Make routing socket. */ | |
6621ca86 | 1215 | static void |
1216 | routing_socket (void) | |
718e3744 | 1217 | { |
edd7c245 | 1218 | if ( zserv_privs.change (ZPRIVS_RAISE) ) |
1219 | zlog_err ("routing_socket: Can't raise privileges"); | |
1220 | ||
718e3744 | 1221 | routing_sock = socket (AF_ROUTE, SOCK_RAW, 0); |
1222 | ||
1223 | if (routing_sock < 0) | |
1224 | { | |
edd7c245 | 1225 | if ( zserv_privs.change (ZPRIVS_LOWER) ) |
1226 | zlog_err ("routing_socket: Can't lower privileges"); | |
718e3744 | 1227 | zlog_warn ("Can't init kernel routing socket"); |
1228 | return; | |
1229 | } | |
1230 | ||
865b852c | 1231 | /* XXX: Socket should be NONBLOCK, however as we currently |
1232 | * discard failed writes, this will lead to inconsistencies. | |
1233 | * For now, socket must be blocking. | |
1234 | */ | |
1235 | /*if (fcntl (routing_sock, F_SETFL, O_NONBLOCK) < 0) | |
1236 | zlog_warn ("Can't set O_NONBLOCK to routing socket");*/ | |
1237 | ||
edd7c245 | 1238 | if ( zserv_privs.change (ZPRIVS_LOWER) ) |
1239 | zlog_err ("routing_socket: Can't lower privileges"); | |
718e3744 | 1240 | |
1241 | /* kernel_read needs rewrite. */ | |
9bcdb638 | 1242 | thread_add_read (zebrad.master, kernel_read, NULL, routing_sock); |
718e3744 | 1243 | } |
1244 | ||
1245 | /* Exported interface function. This function simply calls | |
1246 | routing_socket (). */ | |
1247 | void | |
6621ca86 | 1248 | kernel_init (void) |
718e3744 | 1249 | { |
1250 | routing_socket (); | |
1251 | } |