File: | src/usr.sbin/bgpd/rtr_proto.c |
Warning: | line 788, column 2 Potential leak of memory pointed to by 'aspa' |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* $OpenBSD: rtr_proto.c,v 1.28 2024/01/10 16:08:36 claudio Exp $ */ | |||
2 | ||||
3 | /* | |||
4 | * Copyright (c) 2020 Claudio Jeker <claudio@openbsd.org> | |||
5 | * | |||
6 | * Permission to use, copy, modify, and distribute this software for any | |||
7 | * purpose with or without fee is hereby granted, provided that the above | |||
8 | * copyright notice and this permission notice appear in all copies. | |||
9 | * | |||
10 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | |||
11 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | |||
12 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | |||
13 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | |||
14 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | |||
15 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | |||
16 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | |||
17 | */ | |||
18 | #include <sys/tree.h> | |||
19 | #include <errno(*__errno()).h> | |||
20 | #include <stdint.h> | |||
21 | #include <poll.h> | |||
22 | #include <stdio.h> | |||
23 | #include <stdlib.h> | |||
24 | #include <string.h> | |||
25 | #include <unistd.h> | |||
26 | ||||
27 | #include "bgpd.h" | |||
28 | #include "session.h" | |||
29 | #include "log.h" | |||
30 | ||||
31 | struct rtr_header { | |||
32 | uint8_t version; | |||
33 | uint8_t type; | |||
34 | uint16_t session_id; /* or error code */ | |||
35 | uint32_t length; | |||
36 | } __packed__attribute__((__packed__)); | |||
37 | ||||
38 | #define RTR_MAX_VERSION2 2 | |||
39 | #define RTR_MAX_LEN2048 2048 | |||
40 | #define RTR_DEFAULT_REFRESH3600 3600 | |||
41 | #define RTR_DEFAULT_RETRY600 600 | |||
42 | #define RTR_DEFAULT_EXPIRE7200 7200 | |||
43 | #define RTR_DEFAULT_ACTIVE60 60 | |||
44 | ||||
45 | enum rtr_pdu_type { | |||
46 | SERIAL_NOTIFY = 0, | |||
47 | SERIAL_QUERY, | |||
48 | RESET_QUERY, | |||
49 | CACHE_RESPONSE, | |||
50 | IPV4_PREFIX, | |||
51 | IPV6_PREFIX = 6, | |||
52 | END_OF_DATA = 7, | |||
53 | CACHE_RESET = 8, | |||
54 | ROUTER_KEY = 9, | |||
55 | ERROR_REPORT = 10, | |||
56 | ASPA = 11, | |||
57 | }; | |||
58 | ||||
59 | struct rtr_notify { | |||
60 | struct rtr_header hdr; | |||
61 | uint32_t serial; | |||
62 | } __packed__attribute__((__packed__)); | |||
63 | ||||
64 | struct rtr_query { | |||
65 | struct rtr_header hdr; | |||
66 | uint32_t serial; | |||
67 | } __packed__attribute__((__packed__)); | |||
68 | ||||
69 | struct rtr_reset { | |||
70 | struct rtr_header hdr; | |||
71 | } __packed__attribute__((__packed__)); | |||
72 | ||||
73 | struct rtr_response { | |||
74 | struct rtr_header hdr; | |||
75 | } __packed__attribute__((__packed__)); | |||
76 | ||||
77 | #define FLAG_ANNOUNCE0x1 0x1 | |||
78 | #define FLAG_MASK0x1 FLAG_ANNOUNCE0x1 | |||
79 | struct rtr_ipv4 { | |||
80 | struct rtr_header hdr; | |||
81 | uint8_t flags; | |||
82 | uint8_t prefixlen; | |||
83 | uint8_t maxlen; | |||
84 | uint8_t zero; | |||
85 | uint32_t prefix; | |||
86 | uint32_t asnum; | |||
87 | } __packed__attribute__((__packed__)); | |||
88 | ||||
89 | struct rtr_ipv6 { | |||
90 | struct rtr_header hdr; | |||
91 | uint8_t flags; | |||
92 | uint8_t prefixlen; | |||
93 | uint8_t maxlen; | |||
94 | uint8_t zero; | |||
95 | uint32_t prefix[4]; | |||
96 | uint32_t asnum; | |||
97 | } __packed__attribute__((__packed__)); | |||
98 | ||||
99 | struct rtr_routerkey { | |||
100 | struct rtr_header hdr; | |||
101 | uint8_t ski[20]; | |||
102 | uint32_t asnum; | |||
103 | /* followed by Subject Public Key Info */ | |||
104 | } __packed__attribute__((__packed__)); | |||
105 | ||||
106 | #define FLAG_AFI_V60x1 0x1 | |||
107 | #define FLAG_AFI_MASK0x1 FLAG_AFI_V60x1 | |||
108 | struct rtr_aspa { | |||
109 | struct rtr_header hdr; | |||
110 | uint8_t flags; | |||
111 | uint8_t afi_flags; | |||
112 | uint16_t cnt; | |||
113 | uint32_t cas; | |||
114 | /* array of spas with cnt elements follows */ | |||
115 | } __packed__attribute__((__packed__)); | |||
116 | ||||
117 | struct rtr_endofdata { | |||
118 | struct rtr_header hdr; | |||
119 | uint32_t serial; | |||
120 | uint32_t refresh; | |||
121 | uint32_t retry; | |||
122 | uint32_t expire; | |||
123 | } __packed__attribute__((__packed__)); | |||
124 | ||||
125 | struct rtr_endofdata_v0 { | |||
126 | struct rtr_header hdr; | |||
127 | uint32_t serial; | |||
128 | } __packed__attribute__((__packed__)); | |||
129 | ||||
130 | enum rtr_event { | |||
131 | RTR_EVNT_START, | |||
132 | RTR_EVNT_CON_OPEN, | |||
133 | RTR_EVNT_CON_CLOSE, | |||
134 | RTR_EVNT_TIMER_REFRESH, | |||
135 | RTR_EVNT_TIMER_RETRY, | |||
136 | RTR_EVNT_TIMER_EXPIRE, | |||
137 | RTR_EVNT_TIMER_ACTIVE, | |||
138 | RTR_EVNT_SEND_ERROR, | |||
139 | RTR_EVNT_SERIAL_NOTIFY, | |||
140 | RTR_EVNT_CACHE_RESPONSE, | |||
141 | RTR_EVNT_END_OF_DATA, | |||
142 | RTR_EVNT_CACHE_RESET, | |||
143 | RTR_EVNT_NO_DATA, | |||
144 | RTR_EVNT_RESET_AND_CLOSE, | |||
145 | RTR_EVNT_UNSUPP_PROTO_VERSION, | |||
146 | RTR_EVNT_NEGOTIATION_DONE, | |||
147 | }; | |||
148 | ||||
149 | static const char *rtr_eventnames[] = { | |||
150 | "start", | |||
151 | "connection open", | |||
152 | "connection closed", | |||
153 | "refresh timer expired", | |||
154 | "retry timer expired", | |||
155 | "expire timer expired", | |||
156 | "activity timer expired", | |||
157 | "sent error", | |||
158 | "serial notify received", | |||
159 | "cache response received", | |||
160 | "end of data received", | |||
161 | "cache reset received", | |||
162 | "no data", | |||
163 | "connection closed with reset", | |||
164 | "unsupported protocol version", | |||
165 | "negotiation done", | |||
166 | }; | |||
167 | ||||
168 | enum rtr_state { | |||
169 | RTR_STATE_CLOSED, | |||
170 | RTR_STATE_ERROR, | |||
171 | /* sessions with a state below this line will poll for incoming data */ | |||
172 | RTR_STATE_ESTABLISHED, | |||
173 | RTR_STATE_EXCHANGE, | |||
174 | RTR_STATE_NEGOTIATION, | |||
175 | }; | |||
176 | ||||
177 | static const char *rtr_statenames[] = { | |||
178 | "closed", | |||
179 | "error", | |||
180 | "established", | |||
181 | "exchange", | |||
182 | "negotiation", | |||
183 | }; | |||
184 | ||||
185 | struct rtr_session { | |||
186 | TAILQ_ENTRY(rtr_session)struct { struct rtr_session *tqe_next; struct rtr_session **tqe_prev ; } entry; | |||
187 | char descr[PEER_DESCR_LEN32]; | |||
188 | struct roa_tree roa_set; | |||
189 | struct aspa_tree aspa; | |||
190 | struct aspa_tree aspa_oldv6; | |||
191 | struct ibuf_read r; | |||
192 | struct msgbuf w; | |||
193 | struct timer_head timers; | |||
194 | uint32_t id; /* rtr_config id */ | |||
195 | uint32_t serial; | |||
196 | uint32_t refresh; | |||
197 | uint32_t retry; | |||
198 | uint32_t expire; | |||
199 | uint32_t active; | |||
200 | int session_id; | |||
201 | int fd; | |||
202 | int active_lock; | |||
203 | enum rtr_state state; | |||
204 | enum reconf_action reconf_action; | |||
205 | enum rtr_error last_sent_error; | |||
206 | enum rtr_error last_recv_error; | |||
207 | char last_sent_msg[REASON_LEN256]; | |||
208 | char last_recv_msg[REASON_LEN256]; | |||
209 | uint8_t version; | |||
210 | }; | |||
211 | ||||
212 | TAILQ_HEAD(, rtr_session)struct { struct rtr_session *tqh_first; struct rtr_session ** tqh_last; } rtrs = TAILQ_HEAD_INITIALIZER(rtrs){ ((void *)0), &(rtrs).tqh_first }; | |||
213 | ||||
214 | static void rtr_fsm(struct rtr_session *, enum rtr_event); | |||
215 | ||||
216 | static const char * | |||
217 | log_rtr(struct rtr_session *rs) | |||
218 | { | |||
219 | return rs->descr; | |||
220 | } | |||
221 | ||||
222 | static const char * | |||
223 | log_rtr_type(enum rtr_pdu_type type) | |||
224 | { | |||
225 | static char buf[20]; | |||
226 | ||||
227 | switch (type) { | |||
228 | case SERIAL_NOTIFY: | |||
229 | return "serial notify"; | |||
230 | case SERIAL_QUERY: | |||
231 | return "serial query"; | |||
232 | case RESET_QUERY: | |||
233 | return "reset query"; | |||
234 | case CACHE_RESPONSE: | |||
235 | return "cache response"; | |||
236 | case IPV4_PREFIX: | |||
237 | return "IPv4 prefix"; | |||
238 | case IPV6_PREFIX: | |||
239 | return "IPv6 prefix"; | |||
240 | case END_OF_DATA: | |||
241 | return "end of data"; | |||
242 | case CACHE_RESET: | |||
243 | return "cache reset"; | |||
244 | case ROUTER_KEY: | |||
245 | return "router key"; | |||
246 | case ERROR_REPORT: | |||
247 | return "error report"; | |||
248 | case ASPA: | |||
249 | return "aspa"; | |||
250 | default: | |||
251 | snprintf(buf, sizeof(buf), "unknown %u", type); | |||
252 | return buf; | |||
253 | } | |||
254 | }; | |||
255 | ||||
256 | static void | |||
257 | rtr_reset_cache(struct rtr_session *rs) | |||
258 | { | |||
259 | /* reset session */ | |||
260 | rs->session_id = -1; | |||
261 | timer_stop(&rs->timers, Timer_Rtr_Expire); | |||
262 | free_roatree(&rs->roa_set); | |||
263 | free_aspatree(&rs->aspa); | |||
264 | free_aspatree(&rs->aspa_oldv6); | |||
265 | } | |||
266 | ||||
267 | static struct ibuf * | |||
268 | rtr_newmsg(struct rtr_session *rs, enum rtr_pdu_type type, uint32_t len, | |||
269 | uint16_t session_id) | |||
270 | { | |||
271 | struct ibuf *buf; | |||
272 | int saved_errno; | |||
273 | ||||
274 | if (len > RTR_MAX_LEN2048) { | |||
275 | errno(*__errno()) = ERANGE34; | |||
276 | return NULL((void *)0); | |||
277 | } | |||
278 | len += sizeof(struct rtr_header); | |||
279 | if ((buf = ibuf_open(len)) == NULL((void *)0)) | |||
280 | goto fail; | |||
281 | if (ibuf_add_n8(buf, rs->version) == -1) | |||
282 | goto fail; | |||
283 | if (ibuf_add_n8(buf, type) == -1) | |||
284 | goto fail; | |||
285 | if (ibuf_add_n16(buf, session_id) == -1) | |||
286 | goto fail; | |||
287 | if (ibuf_add_n32(buf, len) == -1) | |||
288 | goto fail; | |||
289 | ||||
290 | return buf; | |||
291 | ||||
292 | fail: | |||
293 | saved_errno = errno(*__errno()); | |||
294 | ibuf_free(buf); | |||
295 | errno(*__errno()) = saved_errno; | |||
296 | return NULL((void *)0); | |||
297 | } | |||
298 | ||||
299 | static void rtr_send_error(struct rtr_session *, struct ibuf *, enum rtr_error, | |||
300 | const char *, ...) __attribute__((__format__ (printf, 4, 5))); | |||
301 | ||||
302 | /* | |||
303 | * Try to send an error PDU to cache, put connection into error | |||
304 | * state. | |||
305 | */ | |||
306 | static void | |||
307 | rtr_send_error(struct rtr_session *rs, struct ibuf *pdu, enum rtr_error err, | |||
308 | const char *fmt, ...) | |||
309 | { | |||
310 | struct ibuf *buf; | |||
311 | va_list ap; | |||
312 | size_t len = 0, mlen = 0; | |||
313 | ||||
314 | rs->last_sent_error = err; | |||
315 | memset(rs->last_sent_msg, 0, sizeof(rs->last_sent_msg)); | |||
316 | if (fmt != NULL((void *)0)) { | |||
317 | va_start(ap, fmt)__builtin_va_start((ap), fmt); | |||
318 | vsnprintf(rs->last_sent_msg, sizeof(rs->last_sent_msg), | |||
319 | fmt, ap); | |||
320 | mlen = strlen(rs->last_sent_msg); | |||
321 | va_end(ap)__builtin_va_end((ap)); | |||
322 | } | |||
323 | ||||
324 | log_warnx("rtr %s: sending error: %s%s%s", log_rtr(rs), | |||
325 | log_rtr_error(err), mlen > 0 ? ": " : "", rs->last_sent_msg); | |||
326 | ||||
327 | if (pdu != NULL((void *)0)) { | |||
328 | ibuf_rewind(pdu); | |||
329 | len = ibuf_size(pdu); | |||
330 | } | |||
331 | ||||
332 | buf = rtr_newmsg(rs, ERROR_REPORT, 2 * sizeof(uint32_t) + len + mlen, | |||
333 | err); | |||
334 | if (buf == NULL((void *)0)) | |||
335 | goto fail; | |||
336 | if (ibuf_add_n32(buf, len) == -1) | |||
337 | goto fail; | |||
338 | if (pdu != NULL((void *)0)) { | |||
339 | if (ibuf_add_ibuf(buf, pdu) == -1) | |||
340 | goto fail; | |||
341 | } | |||
342 | if (ibuf_add_n32(buf, mlen) == -1) | |||
343 | goto fail; | |||
344 | if (ibuf_add(buf, rs->last_sent_msg, mlen) == -1) | |||
345 | goto fail; | |||
346 | ibuf_close(&rs->w, buf); | |||
347 | ||||
348 | rtr_fsm(rs, RTR_EVNT_SEND_ERROR); | |||
349 | return; | |||
350 | ||||
351 | fail: | |||
352 | log_warn("rtr %s: send error report", log_rtr(rs)); | |||
353 | ibuf_free(buf); | |||
354 | } | |||
355 | ||||
356 | static void | |||
357 | rtr_send_reset_query(struct rtr_session *rs) | |||
358 | { | |||
359 | struct ibuf *buf; | |||
360 | ||||
361 | buf = rtr_newmsg(rs, RESET_QUERY, 0, 0); | |||
362 | if (buf == NULL((void *)0)) | |||
363 | goto fail; | |||
364 | ibuf_close(&rs->w, buf); | |||
365 | return; | |||
366 | ||||
367 | fail: | |||
368 | rtr_send_error(rs, NULL((void *)0), INTERNAL_ERROR, | |||
369 | "send %s: %s", log_rtr_type(RESET_QUERY), strerror(errno(*__errno()))); | |||
370 | ibuf_free(buf); | |||
371 | } | |||
372 | ||||
373 | static void | |||
374 | rtr_send_serial_query(struct rtr_session *rs) | |||
375 | { | |||
376 | struct ibuf *buf; | |||
377 | ||||
378 | buf = rtr_newmsg(rs, SERIAL_QUERY, sizeof(uint32_t), rs->session_id); | |||
379 | if (buf == NULL((void *)0)) | |||
380 | goto fail; | |||
381 | if (ibuf_add_n32(buf, rs->serial) == -1) | |||
382 | goto fail; | |||
383 | ibuf_close(&rs->w, buf); | |||
384 | return; | |||
385 | ||||
386 | fail: | |||
387 | rtr_send_error(rs, NULL((void *)0), INTERNAL_ERROR, | |||
388 | "send %s: %s", log_rtr_type(SERIAL_QUERY), strerror(errno(*__errno()))); | |||
389 | ibuf_free(buf); | |||
390 | } | |||
391 | ||||
392 | /* | |||
393 | * Check the session_id of the rtr_header to match the expected value. | |||
394 | * Returns -1 on failure and 0 on success. | |||
395 | */ | |||
396 | static int | |||
397 | rtr_check_session_id(struct rtr_session *rs, uint16_t session_id, | |||
398 | struct rtr_header *rh, struct ibuf *pdu) | |||
399 | { | |||
400 | if (session_id != ntohs(rh->session_id)(__uint16_t)(__builtin_constant_p(rh->session_id) ? (__uint16_t )(((__uint16_t)(rh->session_id) & 0xffU) << 8 | ( (__uint16_t)(rh->session_id) & 0xff00U) >> 8) : __swap16md (rh->session_id))) { | |||
401 | rtr_send_error(rs, pdu, CORRUPT_DATA, | |||
402 | "%s: bad session_id %d (expected %d)", | |||
403 | log_rtr_type(rh->type), ntohs(rh->session_id)(__uint16_t)(__builtin_constant_p(rh->session_id) ? (__uint16_t )(((__uint16_t)(rh->session_id) & 0xffU) << 8 | ( (__uint16_t)(rh->session_id) & 0xff00U) >> 8) : __swap16md (rh->session_id)), session_id); | |||
404 | return -1; | |||
405 | } | |||
406 | return 0; | |||
407 | } | |||
408 | ||||
409 | /* | |||
410 | * Parse the common rtr header (first 8 bytes) including the | |||
411 | * included length field. | |||
412 | * Returns -1 on failure. On success msgtype and msglen are set | |||
413 | * and the function return 0. | |||
414 | */ | |||
415 | static int | |||
416 | rtr_parse_header(struct rtr_session *rs, struct ibuf *hdr, | |||
417 | size_t *msglen, enum rtr_pdu_type *msgtype) | |||
418 | { | |||
419 | struct rtr_header rh; | |||
420 | size_t len; | |||
421 | ||||
422 | if (ibuf_get(hdr, &rh, sizeof(rh)) == -1) | |||
423 | fatal("%s: ibuf_get", __func__); | |||
424 | ||||
425 | len = ntohl(rh.length)(__uint32_t)(__builtin_constant_p(rh.length) ? (__uint32_t)(( (__uint32_t)(rh.length) & 0xff) << 24 | ((__uint32_t )(rh.length) & 0xff00) << 8 | ((__uint32_t)(rh.length ) & 0xff0000) >> 8 | ((__uint32_t)(rh.length) & 0xff000000) >> 24) : __swap32md(rh.length)); | |||
426 | ||||
427 | if (len > RTR_MAX_LEN2048) { | |||
428 | rtr_send_error(rs, hdr, CORRUPT_DATA, "%s: too big: %zu bytes", | |||
429 | log_rtr_type(rh.type), len); | |||
430 | return -1; | |||
431 | } | |||
432 | ||||
433 | if (rs->state == RTR_STATE_NEGOTIATION) { | |||
434 | switch (rh.type) { | |||
435 | case CACHE_RESPONSE: | |||
436 | case CACHE_RESET: | |||
437 | case ERROR_REPORT: | |||
438 | if (rh.version < rs->version) | |||
439 | rs->version = rh.version; | |||
440 | rtr_fsm(rs, RTR_EVNT_NEGOTIATION_DONE); | |||
441 | break; | |||
442 | case SERIAL_NOTIFY: | |||
443 | /* ignore SERIAL_NOTIFY */ | |||
444 | break; | |||
445 | default: | |||
446 | rtr_send_error(rs, hdr, CORRUPT_DATA, | |||
447 | "%s: out of context", log_rtr_type(rh.type)); | |||
448 | return -1; | |||
449 | } | |||
450 | } else if (rh.version != rs->version && rh.type != ERROR_REPORT) { | |||
451 | goto badversion; | |||
452 | } | |||
453 | ||||
454 | switch (rh.type) { | |||
455 | case SERIAL_NOTIFY: | |||
456 | if (len != sizeof(struct rtr_notify)) | |||
457 | goto badlen; | |||
458 | break; | |||
459 | case CACHE_RESPONSE: | |||
460 | if (len != sizeof(struct rtr_response)) | |||
461 | goto badlen; | |||
462 | break; | |||
463 | case IPV4_PREFIX: | |||
464 | if (len != sizeof(struct rtr_ipv4)) | |||
465 | goto badlen; | |||
466 | break; | |||
467 | case IPV6_PREFIX: | |||
468 | if (len != sizeof(struct rtr_ipv6)) | |||
469 | goto badlen; | |||
470 | break; | |||
471 | case END_OF_DATA: | |||
472 | if (rs->version == 0) { | |||
473 | if (len != sizeof(struct rtr_endofdata_v0)) | |||
474 | goto badlen; | |||
475 | } else { | |||
476 | if (len != sizeof(struct rtr_endofdata)) | |||
477 | goto badlen; | |||
478 | } | |||
479 | break; | |||
480 | case CACHE_RESET: | |||
481 | if (len != sizeof(struct rtr_reset)) | |||
482 | goto badlen; | |||
483 | break; | |||
484 | case ROUTER_KEY: | |||
485 | if (rs->version < 1) | |||
486 | goto badversion; | |||
487 | if (len < sizeof(struct rtr_routerkey)) | |||
488 | goto badlen; | |||
489 | break; | |||
490 | case ERROR_REPORT: | |||
491 | if (len < 16) | |||
492 | goto badlen; | |||
493 | break; | |||
494 | case ASPA: | |||
495 | if (rs->version < 2) | |||
496 | goto badversion; | |||
497 | if (len < sizeof(struct rtr_aspa) || (len % 4) != 0) | |||
498 | goto badlen; | |||
499 | break; | |||
500 | default: | |||
501 | rtr_send_error(rs, hdr, UNSUPP_PDU_TYPE, "type %s", | |||
502 | log_rtr_type(rh.type)); | |||
503 | return -1; | |||
504 | } | |||
505 | ||||
506 | *msglen = len; | |||
507 | *msgtype = rh.type; | |||
508 | ||||
509 | return 0; | |||
510 | ||||
511 | badlen: | |||
512 | rtr_send_error(rs, hdr, CORRUPT_DATA, "%s: bad length: %zu bytes", | |||
513 | log_rtr_type(rh.type), len); | |||
514 | return -1; | |||
515 | ||||
516 | badversion: | |||
517 | rtr_send_error(rs, hdr, UNEXP_PROTOCOL_VERS, "%s: version %d", | |||
518 | log_rtr_type(rh.type), rh.version); | |||
519 | return -1; | |||
520 | } | |||
521 | ||||
522 | static int | |||
523 | rtr_parse_notify(struct rtr_session *rs, struct ibuf *pdu) | |||
524 | { | |||
525 | struct rtr_notify notify; | |||
526 | ||||
527 | /* ignore SERIAL_NOTIFY during startup */ | |||
528 | if (rs->state == RTR_STATE_NEGOTIATION) | |||
529 | return 0; | |||
530 | ||||
531 | if (ibuf_get(pdu, ¬ify, sizeof(notify)) == -1) | |||
532 | goto badlen; | |||
533 | ||||
534 | if (rtr_check_session_id(rs, rs->session_id, ¬ify.hdr, pdu) == -1) | |||
535 | return -1; | |||
536 | ||||
537 | if (rs->state != RTR_STATE_ESTABLISHED) { | |||
538 | log_warnx("rtr %s: received %s: while in state %s (ignored)", | |||
539 | log_rtr(rs), log_rtr_type(SERIAL_NOTIFY), | |||
540 | rtr_statenames[rs->state]); | |||
541 | return 0; | |||
542 | } | |||
543 | ||||
544 | rtr_fsm(rs, RTR_EVNT_SERIAL_NOTIFY); | |||
545 | return 0; | |||
546 | ||||
547 | badlen: | |||
548 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: bad length", | |||
549 | log_rtr_type(SERIAL_NOTIFY)); | |||
550 | return -1; | |||
551 | } | |||
552 | ||||
553 | static int | |||
554 | rtr_parse_cache_response(struct rtr_session *rs, struct ibuf *pdu) | |||
555 | { | |||
556 | struct rtr_response resp; | |||
557 | ||||
558 | if (ibuf_get(pdu, &resp, sizeof(resp)) == -1) | |||
559 | goto badlen; | |||
560 | ||||
561 | /* set session_id if not yet happened */ | |||
562 | if (rs->session_id == -1) | |||
563 | rs->session_id = ntohs(resp.hdr.session_id)(__uint16_t)(__builtin_constant_p(resp.hdr.session_id) ? (__uint16_t )(((__uint16_t)(resp.hdr.session_id) & 0xffU) << 8 | ((__uint16_t)(resp.hdr.session_id) & 0xff00U) >> 8 ) : __swap16md(resp.hdr.session_id)); | |||
564 | ||||
565 | if (rtr_check_session_id(rs, rs->session_id, &resp.hdr, pdu) == -1) | |||
566 | return -1; | |||
567 | ||||
568 | if (rs->state != RTR_STATE_ESTABLISHED) { | |||
569 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: out of context", | |||
570 | log_rtr_type(CACHE_RESPONSE)); | |||
571 | return -1; | |||
572 | } | |||
573 | ||||
574 | rtr_fsm(rs, RTR_EVNT_CACHE_RESPONSE); | |||
575 | return 0; | |||
576 | ||||
577 | badlen: | |||
578 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: bad length", | |||
579 | log_rtr_type(CACHE_RESPONSE)); | |||
580 | return -1; | |||
581 | } | |||
582 | ||||
583 | static int | |||
584 | rtr_parse_ipv4_prefix(struct rtr_session *rs, struct ibuf *pdu) | |||
585 | { | |||
586 | struct rtr_ipv4 ip4; | |||
587 | struct roa *roa; | |||
588 | ||||
589 | if (ibuf_get(pdu, &ip4, sizeof(ip4)) == -1) | |||
590 | goto badlen; | |||
591 | ||||
592 | if (rtr_check_session_id(rs, 0, &ip4.hdr, pdu) == -1) | |||
593 | return -1; | |||
594 | ||||
595 | if (rs->state != RTR_STATE_EXCHANGE) { | |||
596 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: out of context", | |||
597 | log_rtr_type(IPV4_PREFIX)); | |||
598 | return -1; | |||
599 | } | |||
600 | ||||
601 | if (ip4.prefixlen > 32 || ip4.maxlen > 32 || | |||
602 | ip4.prefixlen > ip4.maxlen) { | |||
603 | rtr_send_error(rs, pdu, CORRUPT_DATA, | |||
604 | "%s: bad prefixlen / maxlen", log_rtr_type(IPV4_PREFIX)); | |||
605 | return -1; | |||
606 | } | |||
607 | ||||
608 | if ((roa = calloc(1, sizeof(*roa))) == NULL((void *)0)) { | |||
609 | rtr_send_error(rs, NULL((void *)0), INTERNAL_ERROR, "out of memory"); | |||
610 | return -1; | |||
611 | } | |||
612 | roa->aid = AID_INET1; | |||
613 | roa->prefixlen = ip4.prefixlen; | |||
614 | roa->maxlen = ip4.maxlen; | |||
615 | roa->asnum = ntohl(ip4.asnum)(__uint32_t)(__builtin_constant_p(ip4.asnum) ? (__uint32_t)(( (__uint32_t)(ip4.asnum) & 0xff) << 24 | ((__uint32_t )(ip4.asnum) & 0xff00) << 8 | ((__uint32_t)(ip4.asnum ) & 0xff0000) >> 8 | ((__uint32_t)(ip4.asnum) & 0xff000000) >> 24) : __swap32md(ip4.asnum)); | |||
616 | roa->prefix.inet.s_addr = ip4.prefix; | |||
617 | ||||
618 | if (ip4.flags & FLAG_ANNOUNCE0x1) { | |||
619 | if (RB_INSERT(roa_tree, &rs->roa_set, roa)roa_tree_RB_INSERT(&rs->roa_set, roa) != NULL((void *)0)) { | |||
620 | rtr_send_error(rs, pdu, DUP_REC_RECV, "%s %s", | |||
621 | log_rtr_type(IPV4_PREFIX), log_roa(roa)); | |||
622 | free(roa); | |||
623 | return -1; | |||
624 | } | |||
625 | } else { | |||
626 | struct roa *r; | |||
627 | ||||
628 | r = RB_FIND(roa_tree, &rs->roa_set, roa)roa_tree_RB_FIND(&rs->roa_set, roa); | |||
629 | if (r == NULL((void *)0)) { | |||
630 | rtr_send_error(rs, pdu, UNK_REC_WDRAWL, "%s %s", | |||
631 | log_rtr_type(IPV4_PREFIX), log_roa(roa)); | |||
632 | free(roa); | |||
633 | return -1; | |||
634 | } | |||
635 | RB_REMOVE(roa_tree, &rs->roa_set, r)roa_tree_RB_REMOVE(&rs->roa_set, r); | |||
636 | free(r); | |||
637 | free(roa); | |||
638 | } | |||
639 | ||||
640 | return 0; | |||
641 | ||||
642 | badlen: | |||
643 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: bad length", | |||
644 | log_rtr_type(IPV4_PREFIX)); | |||
645 | return -1; | |||
646 | } | |||
647 | ||||
648 | static int | |||
649 | rtr_parse_ipv6_prefix(struct rtr_session *rs, struct ibuf *pdu) | |||
650 | { | |||
651 | struct rtr_ipv6 ip6; | |||
652 | struct roa *roa; | |||
653 | ||||
654 | if (ibuf_get(pdu, &ip6, sizeof(ip6)) == -1) | |||
655 | goto badlen; | |||
656 | ||||
657 | if (rtr_check_session_id(rs, 0, &ip6.hdr, pdu) == -1) | |||
658 | return -1; | |||
659 | ||||
660 | if (rs->state != RTR_STATE_EXCHANGE) { | |||
661 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: out of context", | |||
662 | log_rtr_type(IPV6_PREFIX)); | |||
663 | return -1; | |||
664 | } | |||
665 | ||||
666 | if (ip6.prefixlen > 128 || ip6.maxlen > 128 || | |||
667 | ip6.prefixlen > ip6.maxlen) { | |||
668 | rtr_send_error(rs, pdu, CORRUPT_DATA, | |||
669 | "%s: bad prefixlen / maxlen", log_rtr_type(IPV6_PREFIX)); | |||
670 | return -1; | |||
671 | } | |||
672 | ||||
673 | if ((roa = calloc(1, sizeof(*roa))) == NULL((void *)0)) { | |||
674 | rtr_send_error(rs, NULL((void *)0), INTERNAL_ERROR, "out of memory"); | |||
675 | return -1; | |||
676 | } | |||
677 | roa->aid = AID_INET62; | |||
678 | roa->prefixlen = ip6.prefixlen; | |||
679 | roa->maxlen = ip6.maxlen; | |||
680 | roa->asnum = ntohl(ip6.asnum)(__uint32_t)(__builtin_constant_p(ip6.asnum) ? (__uint32_t)(( (__uint32_t)(ip6.asnum) & 0xff) << 24 | ((__uint32_t )(ip6.asnum) & 0xff00) << 8 | ((__uint32_t)(ip6.asnum ) & 0xff0000) >> 8 | ((__uint32_t)(ip6.asnum) & 0xff000000) >> 24) : __swap32md(ip6.asnum)); | |||
681 | memcpy(&roa->prefix.inet6, ip6.prefix, sizeof(roa->prefix.inet6)); | |||
682 | ||||
683 | if (ip6.flags & FLAG_ANNOUNCE0x1) { | |||
684 | if (RB_INSERT(roa_tree, &rs->roa_set, roa)roa_tree_RB_INSERT(&rs->roa_set, roa) != NULL((void *)0)) { | |||
685 | rtr_send_error(rs, pdu, DUP_REC_RECV, "%s %s", | |||
686 | log_rtr_type(IPV6_PREFIX), log_roa(roa)); | |||
687 | free(roa); | |||
688 | return -1; | |||
689 | } | |||
690 | } else { | |||
691 | struct roa *r; | |||
692 | ||||
693 | r = RB_FIND(roa_tree, &rs->roa_set, roa)roa_tree_RB_FIND(&rs->roa_set, roa); | |||
694 | if (r == NULL((void *)0)) { | |||
695 | rtr_send_error(rs, pdu, UNK_REC_WDRAWL, "%s %s", | |||
696 | log_rtr_type(IPV6_PREFIX), log_roa(roa)); | |||
697 | free(roa); | |||
698 | return -1; | |||
699 | } | |||
700 | RB_REMOVE(roa_tree, &rs->roa_set, r)roa_tree_RB_REMOVE(&rs->roa_set, r); | |||
701 | free(r); | |||
702 | free(roa); | |||
703 | } | |||
704 | return 0; | |||
705 | ||||
706 | badlen: | |||
707 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: bad length", | |||
708 | log_rtr_type(IPV6_PREFIX)); | |||
709 | return -1; | |||
710 | } | |||
711 | ||||
712 | static int | |||
713 | rtr_parse_aspa(struct rtr_session *rs, struct ibuf *pdu) | |||
714 | { | |||
715 | struct rtr_aspa rtr_aspa; | |||
716 | struct aspa_tree *aspatree; | |||
717 | struct aspa_set *aspa, *a; | |||
718 | uint16_t cnt, i; | |||
719 | ||||
720 | if (ibuf_get(pdu, &rtr_aspa, sizeof(rtr_aspa)) == -1) | |||
721 | goto badlen; | |||
722 | ||||
723 | cnt = ntohs(rtr_aspa.cnt)(__uint16_t)(__builtin_constant_p(rtr_aspa.cnt) ? (__uint16_t )(((__uint16_t)(rtr_aspa.cnt) & 0xffU) << 8 | ((__uint16_t )(rtr_aspa.cnt) & 0xff00U) >> 8) : __swap16md(rtr_aspa .cnt)); | |||
724 | if (ibuf_size(pdu) != cnt * sizeof(uint32_t)) | |||
725 | goto badlen; | |||
726 | ||||
727 | if (rs->state != RTR_STATE_EXCHANGE) { | |||
728 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: out of context", | |||
729 | log_rtr_type(ASPA)); | |||
730 | return -1; | |||
731 | } | |||
732 | ||||
733 | if (rtr_aspa.afi_flags & FLAG_AFI_V60x1) { | |||
734 | aspatree = &rs->aspa_oldv6; | |||
735 | } else { | |||
736 | aspatree = &rs->aspa; | |||
737 | } | |||
738 | ||||
739 | /* create aspa_set entry from the rtr aspa pdu */ | |||
740 | if ((aspa = calloc(1, sizeof(*aspa))) == NULL((void *)0)) { | |||
741 | rtr_send_error(rs, NULL((void *)0), INTERNAL_ERROR, "out of memory"); | |||
742 | return -1; | |||
743 | } | |||
744 | aspa->as = ntohl(rtr_aspa.cas)(__uint32_t)(__builtin_constant_p(rtr_aspa.cas) ? (__uint32_t )(((__uint32_t)(rtr_aspa.cas) & 0xff) << 24 | ((__uint32_t )(rtr_aspa.cas) & 0xff00) << 8 | ((__uint32_t)(rtr_aspa .cas) & 0xff0000) >> 8 | ((__uint32_t)(rtr_aspa.cas ) & 0xff000000) >> 24) : __swap32md(rtr_aspa.cas)); | |||
745 | aspa->num = cnt; | |||
746 | if (cnt > 0) { | |||
747 | if ((aspa->tas = calloc(cnt, sizeof(uint32_t))) == NULL((void *)0)) { | |||
748 | free_aspa(aspa); | |||
749 | rtr_send_error(rs, NULL((void *)0), INTERNAL_ERROR, | |||
750 | "out of memory"); | |||
751 | return -1; | |||
752 | } | |||
753 | for (i = 0; i
| |||
754 | if (ibuf_get_n32(pdu, &aspa->tas[i]) == -1) | |||
755 | goto badlen; | |||
756 | } | |||
757 | } | |||
758 | ||||
759 | if (rtr_aspa.flags & FLAG_ANNOUNCE0x1) { | |||
760 | a = RB_INSERT(aspa_tree, aspatree, aspa)aspa_tree_RB_INSERT(aspatree, aspa); | |||
761 | if (a != NULL((void *)0)) { | |||
762 | RB_REMOVE(aspa_tree, aspatree, a)aspa_tree_RB_REMOVE(aspatree, a); | |||
763 | free_aspa(a); | |||
764 | ||||
765 | if (RB_INSERT(aspa_tree, aspatree, aspa)aspa_tree_RB_INSERT(aspatree, aspa) != NULL((void *)0)) { | |||
766 | rtr_send_error(rs, NULL((void *)0), INTERNAL_ERROR, | |||
767 | "corrupt aspa tree"); | |||
768 | free_aspa(aspa); | |||
769 | return -1; | |||
770 | } | |||
771 | } | |||
772 | } else { | |||
773 | a = RB_FIND(aspa_tree, aspatree, aspa)aspa_tree_RB_FIND(aspatree, aspa); | |||
774 | if (a == NULL((void *)0)) { | |||
775 | rtr_send_error(rs, pdu, UNK_REC_WDRAWL, "%s %s", | |||
776 | log_rtr_type(ASPA), log_aspa(aspa)); | |||
777 | free_aspa(aspa); | |||
778 | return -1; | |||
779 | } | |||
780 | RB_REMOVE(aspa_tree, aspatree, a)aspa_tree_RB_REMOVE(aspatree, a); | |||
781 | free_aspa(a); | |||
782 | free_aspa(aspa); | |||
783 | } | |||
784 | ||||
785 | return 0; | |||
786 | ||||
787 | badlen: | |||
788 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: bad length", | |||
| ||||
789 | log_rtr_type(ASPA)); | |||
790 | return -1; | |||
791 | } | |||
792 | ||||
793 | static int | |||
794 | rtr_parse_end_of_data_v0(struct rtr_session *rs, struct ibuf *pdu) | |||
795 | { | |||
796 | struct rtr_endofdata_v0 eod; | |||
797 | ||||
798 | if (ibuf_get(pdu, &eod, sizeof(eod)) == -1) | |||
799 | goto badlen; | |||
800 | ||||
801 | if (rtr_check_session_id(rs, rs->session_id, &eod.hdr, pdu) == -1) | |||
802 | return -1; | |||
803 | ||||
804 | if (rs->state != RTR_STATE_EXCHANGE) { | |||
805 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: out of context", | |||
806 | log_rtr_type(END_OF_DATA)); | |||
807 | return -1; | |||
808 | } | |||
809 | ||||
810 | rs->serial = ntohl(eod.serial)(__uint32_t)(__builtin_constant_p(eod.serial) ? (__uint32_t)( ((__uint32_t)(eod.serial) & 0xff) << 24 | ((__uint32_t )(eod.serial) & 0xff00) << 8 | ((__uint32_t)(eod.serial ) & 0xff0000) >> 8 | ((__uint32_t)(eod.serial) & 0xff000000) >> 24) : __swap32md(eod.serial)); | |||
811 | ||||
812 | rtr_fsm(rs, RTR_EVNT_END_OF_DATA); | |||
813 | return 0; | |||
814 | ||||
815 | badlen: | |||
816 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: bad length", | |||
817 | log_rtr_type(END_OF_DATA)); | |||
818 | return -1; | |||
819 | } | |||
820 | ||||
821 | static int | |||
822 | rtr_parse_end_of_data(struct rtr_session *rs, struct ibuf *pdu) | |||
823 | { | |||
824 | struct rtr_endofdata eod; | |||
825 | uint32_t t; | |||
826 | ||||
827 | /* version 0 does not have the timing values */ | |||
828 | if (rs->version == 0) | |||
829 | return rtr_parse_end_of_data_v0(rs, pdu); | |||
830 | ||||
831 | if (ibuf_get(pdu, &eod, sizeof(eod)) == -1) | |||
832 | goto badlen; | |||
833 | ||||
834 | if (rtr_check_session_id(rs, rs->session_id, &eod.hdr, pdu) == -1) | |||
835 | return -1; | |||
836 | ||||
837 | if (rs->state != RTR_STATE_EXCHANGE) { | |||
838 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: out of context", | |||
839 | log_rtr_type(END_OF_DATA)); | |||
840 | return -1; | |||
841 | } | |||
842 | ||||
843 | rs->serial = ntohl(eod.serial)(__uint32_t)(__builtin_constant_p(eod.serial) ? (__uint32_t)( ((__uint32_t)(eod.serial) & 0xff) << 24 | ((__uint32_t )(eod.serial) & 0xff00) << 8 | ((__uint32_t)(eod.serial ) & 0xff0000) >> 8 | ((__uint32_t)(eod.serial) & 0xff000000) >> 24) : __swap32md(eod.serial)); | |||
844 | /* validate timer values to be in the right range */ | |||
845 | t = ntohl(eod.refresh)(__uint32_t)(__builtin_constant_p(eod.refresh) ? (__uint32_t) (((__uint32_t)(eod.refresh) & 0xff) << 24 | ((__uint32_t )(eod.refresh) & 0xff00) << 8 | ((__uint32_t)(eod.refresh ) & 0xff0000) >> 8 | ((__uint32_t)(eod.refresh) & 0xff000000) >> 24) : __swap32md(eod.refresh)); | |||
846 | if (t < 1 || t > 86400) | |||
847 | goto bad; | |||
848 | rs->refresh = t; | |||
849 | t = ntohl(eod.retry)(__uint32_t)(__builtin_constant_p(eod.retry) ? (__uint32_t)(( (__uint32_t)(eod.retry) & 0xff) << 24 | ((__uint32_t )(eod.retry) & 0xff00) << 8 | ((__uint32_t)(eod.retry ) & 0xff0000) >> 8 | ((__uint32_t)(eod.retry) & 0xff000000) >> 24) : __swap32md(eod.retry)); | |||
850 | if (t < 1 || t > 7200) | |||
851 | goto bad; | |||
852 | rs->retry = t; | |||
853 | t = ntohl(eod.expire)(__uint32_t)(__builtin_constant_p(eod.expire) ? (__uint32_t)( ((__uint32_t)(eod.expire) & 0xff) << 24 | ((__uint32_t )(eod.expire) & 0xff00) << 8 | ((__uint32_t)(eod.expire ) & 0xff0000) >> 8 | ((__uint32_t)(eod.expire) & 0xff000000) >> 24) : __swap32md(eod.expire)); | |||
854 | if (t < 600 || t > 172800) | |||
855 | goto bad; | |||
856 | if (t <= rs->retry || t <= rs->refresh) | |||
857 | goto bad; | |||
858 | rs->expire = t; | |||
859 | ||||
860 | rtr_fsm(rs, RTR_EVNT_END_OF_DATA); | |||
861 | return 0; | |||
862 | ||||
863 | bad: | |||
864 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: bad timeout values", | |||
865 | log_rtr_type(END_OF_DATA)); | |||
866 | return -1; | |||
867 | ||||
868 | badlen: | |||
869 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: bad length", | |||
870 | log_rtr_type(END_OF_DATA)); | |||
871 | return -1; | |||
872 | } | |||
873 | ||||
874 | static int | |||
875 | rtr_parse_cache_reset(struct rtr_session *rs, struct ibuf *pdu) | |||
876 | { | |||
877 | struct rtr_reset reset; | |||
878 | ||||
879 | if (ibuf_get(pdu, &reset, sizeof(reset)) == -1) | |||
880 | goto badlen; | |||
881 | ||||
882 | if (rtr_check_session_id(rs, 0, &reset.hdr, pdu) == -1) | |||
883 | return -1; | |||
884 | ||||
885 | if (rs->state != RTR_STATE_ESTABLISHED) { | |||
886 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: out of context", | |||
887 | log_rtr_type(CACHE_RESET)); | |||
888 | return -1; | |||
889 | } | |||
890 | ||||
891 | rtr_fsm(rs, RTR_EVNT_CACHE_RESET); | |||
892 | return 0; | |||
893 | ||||
894 | badlen: | |||
895 | rtr_send_error(rs, pdu, CORRUPT_DATA, "%s: bad length", | |||
896 | log_rtr_type(CACHE_RESET)); | |||
897 | return -1; | |||
898 | } | |||
899 | ||||
900 | static char * | |||
901 | ibuf_get_string(struct ibuf *buf, size_t len) | |||
902 | { | |||
903 | char *str; | |||
904 | ||||
905 | if (ibuf_size(buf) < len) { | |||
906 | errno(*__errno()) = EBADMSG92; | |||
907 | return (NULL((void *)0)); | |||
908 | } | |||
909 | str = strndup(ibuf_data(buf), len); | |||
910 | if (str == NULL((void *)0)) | |||
911 | return (NULL((void *)0)); | |||
912 | ibuf_skip(buf, len); | |||
913 | return (str); | |||
914 | } | |||
915 | ||||
916 | /* | |||
917 | * Parse an Error Response message. This function behaves a bit different | |||
918 | * from other parse functions since on error the connection needs to be | |||
919 | * dropped without sending an error response back. | |||
920 | */ | |||
921 | static int | |||
922 | rtr_parse_error(struct rtr_session *rs, struct ibuf *pdu) | |||
923 | { | |||
924 | struct rtr_header rh; | |||
925 | struct ibuf err_pdu; | |||
926 | uint32_t pdu_len, msg_len; | |||
927 | char *str = NULL((void *)0); | |||
928 | uint16_t errcode; | |||
929 | int rv = -1; | |||
930 | ||||
931 | if (ibuf_get(pdu, &rh, sizeof(rh)) == -1) | |||
932 | goto fail; | |||
933 | errcode = ntohs(rh.session_id)(__uint16_t)(__builtin_constant_p(rh.session_id) ? (__uint16_t )(((__uint16_t)(rh.session_id) & 0xffU) << 8 | ((__uint16_t )(rh.session_id) & 0xff00U) >> 8) : __swap16md(rh.session_id )); | |||
934 | ||||
935 | if (ibuf_get_n32(pdu, &pdu_len) == -1) | |||
936 | goto fail; | |||
937 | ||||
938 | /* for now just ignore the embedded pdu */ | |||
939 | if (ibuf_get_ibuf(pdu, pdu_len, &err_pdu) == -1) | |||
940 | goto fail; | |||
941 | ||||
942 | if (ibuf_get_n32(pdu, &msg_len) == -1) | |||
943 | goto fail; | |||
944 | ||||
945 | /* optional error msg */ | |||
946 | if (msg_len != 0) | |||
947 | if ((str = ibuf_get_string(pdu, msg_len)) == NULL((void *)0)) | |||
948 | goto fail; | |||
949 | ||||
950 | log_warnx("rtr %s: received error: %s%s%s", log_rtr(rs), | |||
951 | log_rtr_error(errcode), str ? ": " : "", str ? str : ""); | |||
952 | ||||
953 | if (errcode == NO_DATA_AVAILABLE) { | |||
954 | rtr_fsm(rs, RTR_EVNT_NO_DATA); | |||
955 | rv = 0; | |||
956 | } else if (errcode == UNSUPP_PROTOCOL_VERS) | |||
957 | rtr_fsm(rs, RTR_EVNT_UNSUPP_PROTO_VERSION); | |||
958 | else | |||
959 | rtr_fsm(rs, RTR_EVNT_RESET_AND_CLOSE); | |||
960 | ||||
961 | rs->last_recv_error = errcode; | |||
962 | if (str) | |||
963 | strlcpy(rs->last_recv_msg, str, sizeof(rs->last_recv_msg)); | |||
964 | else | |||
965 | memset(rs->last_recv_msg, 0, sizeof(rs->last_recv_msg)); | |||
966 | ||||
967 | free(str); | |||
968 | return rv; | |||
969 | ||||
970 | fail: | |||
971 | log_warnx("rtr %s: received %s: bad encoding", log_rtr(rs), | |||
972 | log_rtr_type(ERROR_REPORT)); | |||
973 | rtr_fsm(rs, RTR_EVNT_RESET_AND_CLOSE); | |||
974 | return -1; | |||
975 | } | |||
976 | ||||
977 | /* | |||
978 | * Try to process received rtr message, it is possible that not a full | |||
979 | * message is in the buffer. In that case stop, once new data is available | |||
980 | * a retry will be done. | |||
981 | */ | |||
982 | static void | |||
983 | rtr_process_msg(struct rtr_session *rs) | |||
984 | { | |||
985 | struct ibuf rbuf, hdr, msg; | |||
986 | size_t msglen; | |||
987 | enum rtr_pdu_type msgtype; | |||
988 | ||||
989 | ibuf_from_buffer(&rbuf, rs->r.buf, rs->r.wpos); | |||
990 | ||||
991 | for (;;) { | |||
992 | if (ibuf_size(&rbuf) < sizeof(struct rtr_header)) | |||
993 | break; | |||
994 | ||||
995 | /* parse header */ | |||
996 | ibuf_from_buffer(&hdr, ibuf_data(&rbuf), | |||
997 | sizeof(struct rtr_header)); | |||
998 | if (rtr_parse_header(rs, &hdr, &msglen, &msgtype) == -1) | |||
999 | return; | |||
1000 | ||||
1001 | /* extract message */ | |||
1002 | if (ibuf_get_ibuf(&rbuf, msglen, &msg) == -1) | |||
1003 | break; | |||
1004 | ||||
1005 | switch (msgtype) { | |||
1006 | case SERIAL_NOTIFY: | |||
1007 | if (rtr_parse_notify(rs, &msg) == -1) | |||
1008 | return; | |||
1009 | break; | |||
1010 | case CACHE_RESPONSE: | |||
1011 | if (rtr_parse_cache_response(rs, &msg) == -1) | |||
1012 | return; | |||
1013 | break; | |||
1014 | case IPV4_PREFIX: | |||
1015 | if (rtr_parse_ipv4_prefix(rs, &msg) == -1) | |||
1016 | return; | |||
1017 | break; | |||
1018 | case IPV6_PREFIX: | |||
1019 | if (rtr_parse_ipv6_prefix(rs, &msg) == -1) | |||
1020 | return; | |||
1021 | break; | |||
1022 | case END_OF_DATA: | |||
1023 | if (rtr_parse_end_of_data(rs, &msg) == -1) | |||
1024 | return; | |||
1025 | break; | |||
1026 | case CACHE_RESET: | |||
1027 | if (rtr_parse_cache_reset(rs, &msg) == -1) | |||
1028 | return; | |||
1029 | break; | |||
1030 | case ROUTER_KEY: | |||
1031 | /* silently ignore router key */ | |||
1032 | break; | |||
1033 | case ERROR_REPORT: | |||
1034 | if (rtr_parse_error(rs, &msg) == -1) { | |||
1035 | /* no need to send back an error */ | |||
1036 | return; | |||
1037 | } | |||
1038 | break; | |||
1039 | case ASPA: | |||
1040 | if (rtr_parse_aspa(rs, &msg) == -1) | |||
1041 | return; | |||
1042 | break; | |||
1043 | default: | |||
1044 | /* unreachable, checked in rtr_parse_header() */ | |||
1045 | rtr_send_error(rs, &msg, UNSUPP_PDU_TYPE, "type %s", | |||
1046 | log_rtr_type(msgtype)); | |||
1047 | return; | |||
1048 | } | |||
1049 | } | |||
1050 | ||||
1051 | memmove(&rs->r.buf, ibuf_data(&rbuf), ibuf_size(&rbuf)); | |||
1052 | rs->r.wpos = ibuf_size(&rbuf); | |||
1053 | } | |||
1054 | ||||
1055 | /* | |||
1056 | * Simple FSM for RTR sessions | |||
1057 | */ | |||
1058 | static void | |||
1059 | rtr_fsm(struct rtr_session *rs, enum rtr_event event) | |||
1060 | { | |||
1061 | enum rtr_state prev_state = rs->state; | |||
1062 | ||||
1063 | switch (event) { | |||
1064 | case RTR_EVNT_UNSUPP_PROTO_VERSION: | |||
1065 | if (rs->state == RTR_STATE_NEGOTIATION) { | |||
1066 | if (rs->version > 0) | |||
1067 | rs->version--; | |||
1068 | else { | |||
1069 | /* | |||
1070 | * can't downgrade anymore, fail connection | |||
1071 | * RFC requires to send the error with our | |||
1072 | * highest version number. | |||
1073 | */ | |||
1074 | rs->version = RTR_MAX_VERSION2; | |||
1075 | rtr_send_error(rs, NULL((void *)0), UNSUPP_PROTOCOL_VERS, | |||
1076 | "negotiation failed"); | |||
1077 | return; | |||
1078 | } | |||
1079 | ||||
1080 | if (rs->fd != -1) { | |||
1081 | /* flush buffers */ | |||
1082 | msgbuf_clear(&rs->w); | |||
1083 | rs->r.wpos = 0; | |||
1084 | close(rs->fd); | |||
1085 | rs->fd = -1; | |||
1086 | } | |||
1087 | ||||
1088 | /* retry connection with lower version */ | |||
1089 | timer_set(&rs->timers, Timer_Rtr_Retry, rs->retry); | |||
1090 | rtr_imsg_compose(IMSG_SOCKET_CONN, rs->id, 0, NULL((void *)0), 0); | |||
1091 | break; | |||
1092 | } | |||
1093 | /* FALLTHROUGH */ | |||
1094 | case RTR_EVNT_RESET_AND_CLOSE: | |||
1095 | rtr_reset_cache(rs); | |||
1096 | rtr_recalc(); | |||
1097 | /* FALLTHROUGH */ | |||
1098 | case RTR_EVNT_CON_CLOSE: | |||
1099 | if (rs->state == RTR_STATE_NEGOTIATION) { | |||
1100 | /* consider any close event as a version failure. */ | |||
1101 | rtr_fsm(rs, RTR_EVNT_UNSUPP_PROTO_VERSION); | |||
1102 | break; | |||
1103 | } | |||
1104 | if (rs->fd != -1) { | |||
1105 | /* flush buffers */ | |||
1106 | msgbuf_clear(&rs->w); | |||
1107 | rs->r.wpos = 0; | |||
1108 | close(rs->fd); | |||
1109 | rs->fd = -1; | |||
1110 | } | |||
1111 | rs->state = RTR_STATE_CLOSED; | |||
1112 | /* try to reopen session */ | |||
1113 | timer_set(&rs->timers, Timer_Rtr_Retry, | |||
1114 | arc4random_uniform(10)); | |||
1115 | break; | |||
1116 | case RTR_EVNT_START: | |||
1117 | case RTR_EVNT_TIMER_RETRY: | |||
1118 | switch (rs->state) { | |||
1119 | case RTR_STATE_ERROR: | |||
1120 | rtr_fsm(rs, RTR_EVNT_CON_CLOSE); | |||
1121 | return; | |||
1122 | case RTR_STATE_CLOSED: | |||
1123 | timer_set(&rs->timers, Timer_Rtr_Retry, rs->retry); | |||
1124 | rtr_imsg_compose(IMSG_SOCKET_CONN, rs->id, 0, NULL((void *)0), 0); | |||
1125 | return; | |||
1126 | default: | |||
1127 | break; | |||
1128 | } | |||
1129 | /* FALLTHROUGH */ | |||
1130 | case RTR_EVNT_CON_OPEN: | |||
1131 | timer_stop(&rs->timers, Timer_Rtr_Retry); | |||
1132 | if (rs->session_id == -1) | |||
1133 | rtr_send_reset_query(rs); | |||
1134 | else | |||
1135 | rtr_send_serial_query(rs); | |||
1136 | break; | |||
1137 | case RTR_EVNT_SERIAL_NOTIFY: | |||
1138 | /* schedule a refresh after a quick wait */ | |||
1139 | timer_set(&rs->timers, Timer_Rtr_Refresh, | |||
1140 | arc4random_uniform(10)); | |||
1141 | break; | |||
1142 | case RTR_EVNT_TIMER_REFRESH: | |||
1143 | /* send serial query */ | |||
1144 | rtr_send_serial_query(rs); | |||
1145 | break; | |||
1146 | case RTR_EVNT_TIMER_EXPIRE: | |||
1147 | rtr_reset_cache(rs); | |||
1148 | rtr_recalc(); | |||
1149 | break; | |||
1150 | case RTR_EVNT_TIMER_ACTIVE: | |||
1151 | log_warnx("rtr %s: activity timer fired", log_rtr(rs)); | |||
1152 | rtr_sem_release(rs->active_lock); | |||
1153 | rtr_recalc(); | |||
1154 | rs->active_lock = 0; | |||
1155 | break; | |||
1156 | case RTR_EVNT_CACHE_RESPONSE: | |||
1157 | rs->state = RTR_STATE_EXCHANGE; | |||
1158 | timer_stop(&rs->timers, Timer_Rtr_Refresh); | |||
1159 | timer_stop(&rs->timers, Timer_Rtr_Retry); | |||
1160 | timer_set(&rs->timers, Timer_Rtr_Active, rs->active); | |||
1161 | /* prevent rtr_recalc from running while active */ | |||
1162 | rs->active_lock = 1; | |||
1163 | rtr_sem_acquire(rs->active_lock); | |||
1164 | break; | |||
1165 | case RTR_EVNT_END_OF_DATA: | |||
1166 | /* start refresh and expire timers */ | |||
1167 | timer_set(&rs->timers, Timer_Rtr_Refresh, rs->refresh); | |||
1168 | timer_set(&rs->timers, Timer_Rtr_Expire, rs->expire); | |||
1169 | timer_stop(&rs->timers, Timer_Rtr_Active); | |||
1170 | rs->state = RTR_STATE_ESTABLISHED; | |||
1171 | rtr_sem_release(rs->active_lock); | |||
1172 | rtr_recalc(); | |||
1173 | rs->active_lock = 0; | |||
1174 | break; | |||
1175 | case RTR_EVNT_CACHE_RESET: | |||
1176 | rtr_reset_cache(rs); | |||
1177 | rtr_recalc(); | |||
1178 | /* retry after a quick wait */ | |||
1179 | timer_set(&rs->timers, Timer_Rtr_Retry, | |||
1180 | arc4random_uniform(10)); | |||
1181 | break; | |||
1182 | case RTR_EVNT_NO_DATA: | |||
1183 | /* start retry timer */ | |||
1184 | timer_set(&rs->timers, Timer_Rtr_Retry, rs->retry); | |||
1185 | /* stop refresh timer just to be sure */ | |||
1186 | timer_stop(&rs->timers, Timer_Rtr_Refresh); | |||
1187 | rs->state = RTR_STATE_ESTABLISHED; | |||
1188 | break; | |||
1189 | case RTR_EVNT_SEND_ERROR: | |||
1190 | rtr_reset_cache(rs); | |||
1191 | rtr_recalc(); | |||
1192 | rs->state = RTR_STATE_ERROR; | |||
1193 | /* flush receive buffer */ | |||
1194 | rs->r.wpos = 0; | |||
1195 | break; | |||
1196 | case RTR_EVNT_NEGOTIATION_DONE: | |||
1197 | rs->state = RTR_STATE_ESTABLISHED; | |||
1198 | break; | |||
1199 | } | |||
1200 | ||||
1201 | log_debug("rtr %s: state change %s -> %s, reason: %s", | |||
1202 | log_rtr(rs), rtr_statenames[prev_state], rtr_statenames[rs->state], | |||
1203 | rtr_eventnames[event]); | |||
1204 | } | |||
1205 | ||||
1206 | /* | |||
1207 | * IO handler for RTR sessions | |||
1208 | */ | |||
1209 | static void | |||
1210 | rtr_dispatch_msg(struct pollfd *pfd, struct rtr_session *rs) | |||
1211 | { | |||
1212 | ssize_t n; | |||
1213 | int error; | |||
1214 | ||||
1215 | if (pfd->revents & POLLHUP0x0010) { | |||
1216 | log_warnx("rtr %s: Connection closed, hangup", log_rtr(rs)); | |||
1217 | rtr_fsm(rs, RTR_EVNT_CON_CLOSE); | |||
1218 | return; | |||
1219 | } | |||
1220 | if (pfd->revents & (POLLERR0x0008|POLLNVAL0x0020)) { | |||
1221 | log_warnx("rtr %s: Connection closed, error", log_rtr(rs)); | |||
1222 | rtr_fsm(rs, RTR_EVNT_CON_CLOSE); | |||
1223 | return; | |||
1224 | } | |||
1225 | if (pfd->revents & POLLOUT0x0004 && rs->w.queued) { | |||
1226 | if ((error = ibuf_write(&rs->w)) == -1) { | |||
1227 | if (errno(*__errno()) != EAGAIN35) { | |||
1228 | log_warn("rtr %s: write error", log_rtr(rs)); | |||
1229 | rtr_fsm(rs, RTR_EVNT_CON_CLOSE); | |||
1230 | } | |||
1231 | } | |||
1232 | if (error == 0) | |||
1233 | rtr_fsm(rs, RTR_EVNT_CON_CLOSE); | |||
1234 | if (rs->w.queued == 0 && rs->state == RTR_STATE_ERROR) | |||
1235 | rtr_fsm(rs, RTR_EVNT_CON_CLOSE); | |||
1236 | } | |||
1237 | if (pfd->revents & POLLIN0x0001) { | |||
1238 | if ((n = read(rs->fd, rs->r.buf + rs->r.wpos, | |||
1239 | sizeof(rs->r.buf) - rs->r.wpos)) == -1) { | |||
1240 | if (errno(*__errno()) != EINTR4 && errno(*__errno()) != EAGAIN35) { | |||
1241 | log_warn("rtr %s: read error", log_rtr(rs)); | |||
1242 | rtr_fsm(rs, RTR_EVNT_CON_CLOSE); | |||
1243 | } | |||
1244 | return; | |||
1245 | } | |||
1246 | if (n == 0) { | |||
1247 | rtr_fsm(rs, RTR_EVNT_CON_CLOSE); | |||
1248 | return; | |||
1249 | } | |||
1250 | rs->r.wpos += n; | |||
1251 | ||||
1252 | /* new data arrived, try to process it */ | |||
1253 | rtr_process_msg(rs); | |||
1254 | } | |||
1255 | ||||
1256 | } | |||
1257 | ||||
1258 | void | |||
1259 | rtr_check_events(struct pollfd *pfds, size_t npfds) | |||
1260 | { | |||
1261 | struct rtr_session *rs; | |||
1262 | struct timer *t; | |||
1263 | time_t now; | |||
1264 | size_t i = 0; | |||
1265 | ||||
1266 | for (i = 0; i < npfds; i++) { | |||
| ||||
1267 | if (pfds[i].revents == 0) | |||
1268 | continue; | |||
1269 | TAILQ_FOREACH(rs, &rtrs, entry)for((rs) = ((&rtrs)->tqh_first); (rs) != ((void *)0); ( rs) = ((rs)->entry.tqe_next)) | |||
1270 | if (rs->fd == pfds[i].fd) { | |||
1271 | rtr_dispatch_msg(&pfds[i], rs); | |||
1272 | break; | |||
1273 | } | |||
1274 | if (rs == NULL((void *)0)) | |||
1275 | log_warnx("%s: unknown fd in pollfds", __func__); | |||
1276 | } | |||
1277 | ||||
1278 | /* run all timers */ | |||
1279 | now = getmonotime(); | |||
1280 | TAILQ_FOREACH(rs, &rtrs, entry)for((rs) = ((&rtrs)->tqh_first); (rs) != ((void *)0); ( rs) = ((rs)->entry.tqe_next)) | |||
1281 | if ((t = timer_nextisdue(&rs->timers, now)) != NULL((void *)0)) { | |||
1282 | log_debug("rtr %s: %s triggered", log_rtr(rs), | |||
1283 | timernames[t->type]); | |||
1284 | /* stop timer so it does not trigger again */ | |||
1285 | timer_stop(&rs->timers, t->type); | |||
1286 | switch (t->type) { | |||
1287 | case Timer_Rtr_Refresh: | |||
1288 | rtr_fsm(rs, RTR_EVNT_TIMER_REFRESH); | |||
1289 | break; | |||
1290 | case Timer_Rtr_Retry: | |||
1291 | rtr_fsm(rs, RTR_EVNT_TIMER_RETRY); | |||
1292 | break; | |||
1293 | case Timer_Rtr_Expire: | |||
1294 | rtr_fsm(rs, RTR_EVNT_TIMER_EXPIRE); | |||
1295 | break; | |||
1296 | case Timer_Rtr_Active: | |||
1297 | rtr_fsm(rs, RTR_EVNT_TIMER_ACTIVE); | |||
1298 | break; | |||
1299 | default: | |||
1300 | fatalx("King Bula lost in time"); | |||
1301 | } | |||
1302 | } | |||
1303 | } | |||
1304 | ||||
1305 | size_t | |||
1306 | rtr_count(void) | |||
1307 | { | |||
1308 | struct rtr_session *rs; | |||
1309 | size_t count = 0; | |||
1310 | ||||
1311 | TAILQ_FOREACH(rs, &rtrs, entry)for((rs) = ((&rtrs)->tqh_first); (rs) != ((void *)0); ( rs) = ((rs)->entry.tqe_next)) | |||
1312 | count++; | |||
1313 | return count; | |||
1314 | } | |||
1315 | ||||
1316 | size_t | |||
1317 | rtr_poll_events(struct pollfd *pfds, size_t npfds, time_t *timeout) | |||
1318 | { | |||
1319 | struct rtr_session *rs; | |||
1320 | time_t now = getmonotime(); | |||
1321 | size_t i = 0; | |||
1322 | ||||
1323 | TAILQ_FOREACH(rs, &rtrs, entry)for((rs) = ((&rtrs)->tqh_first); (rs) != ((void *)0); ( rs) = ((rs)->entry.tqe_next)) { | |||
1324 | time_t nextaction; | |||
1325 | struct pollfd *pfd = pfds + i++; | |||
1326 | ||||
1327 | if (i > npfds) | |||
1328 | fatalx("%s: too many sessions for pollfd", __func__); | |||
1329 | ||||
1330 | if ((nextaction = timer_nextduein(&rs->timers, now)) != -1 && | |||
1331 | nextaction < *timeout) | |||
1332 | *timeout = nextaction; | |||
1333 | ||||
1334 | if (rs->state == RTR_STATE_CLOSED) { | |||
1335 | pfd->fd = -1; | |||
1336 | continue; | |||
1337 | } | |||
1338 | ||||
1339 | pfd->fd = rs->fd; | |||
1340 | pfd->events = 0; | |||
1341 | ||||
1342 | if (rs->w.queued) | |||
1343 | pfd->events |= POLLOUT0x0004; | |||
1344 | if (rs->state >= RTR_STATE_ESTABLISHED) | |||
1345 | pfd->events |= POLLIN0x0001; | |||
1346 | } | |||
1347 | ||||
1348 | return i; | |||
1349 | } | |||
1350 | ||||
1351 | struct rtr_session * | |||
1352 | rtr_new(uint32_t id, char *descr) | |||
1353 | { | |||
1354 | struct rtr_session *rs; | |||
1355 | ||||
1356 | if ((rs = calloc(1, sizeof(*rs))) == NULL((void *)0)) | |||
1357 | fatal("RTR session %s", descr); | |||
1358 | ||||
1359 | RB_INIT(&rs->roa_set)do { (&rs->roa_set)->rbh_root = ((void *)0); } while (0); | |||
1360 | RB_INIT(&rs->aspa)do { (&rs->aspa)->rbh_root = ((void *)0); } while ( 0); | |||
1361 | RB_INIT(&rs->aspa_oldv6)do { (&rs->aspa_oldv6)->rbh_root = ((void *)0); } while (0); | |||
1362 | TAILQ_INIT(&rs->timers)do { (&rs->timers)->tqh_first = ((void *)0); (& rs->timers)->tqh_last = &(&rs->timers)->tqh_first ; } while (0); | |||
1363 | msgbuf_init(&rs->w); | |||
1364 | ||||
1365 | strlcpy(rs->descr, descr, sizeof(rs->descr)); | |||
1366 | rs->id = id; | |||
1367 | rs->session_id = -1; | |||
1368 | rs->version = RTR_MAX_VERSION2; | |||
1369 | rs->refresh = RTR_DEFAULT_REFRESH3600; | |||
1370 | rs->retry = RTR_DEFAULT_RETRY600; | |||
1371 | rs->expire = RTR_DEFAULT_EXPIRE7200; | |||
1372 | rs->active = RTR_DEFAULT_ACTIVE60; | |||
1373 | rs->state = RTR_STATE_CLOSED; | |||
1374 | rs->reconf_action = RECONF_REINIT; | |||
1375 | rs->last_recv_error = NO_ERROR; | |||
1376 | rs->last_sent_error = NO_ERROR; | |||
1377 | ||||
1378 | /* make sure that some timer is running to abort bad sessions */ | |||
1379 | timer_set(&rs->timers, Timer_Rtr_Expire, rs->expire); | |||
1380 | ||||
1381 | log_debug("rtr %s: new session, start", log_rtr(rs)); | |||
1382 | TAILQ_INSERT_TAIL(&rtrs, rs, entry)do { (rs)->entry.tqe_next = ((void *)0); (rs)->entry.tqe_prev = (&rtrs)->tqh_last; *(&rtrs)->tqh_last = (rs) ; (&rtrs)->tqh_last = &(rs)->entry.tqe_next; } while (0); | |||
1383 | rtr_fsm(rs, RTR_EVNT_START); | |||
1384 | ||||
1385 | return rs; | |||
1386 | } | |||
1387 | ||||
1388 | struct rtr_session * | |||
1389 | rtr_get(uint32_t id) | |||
1390 | { | |||
1391 | struct rtr_session *rs; | |||
1392 | ||||
1393 | TAILQ_FOREACH(rs, &rtrs, entry)for((rs) = ((&rtrs)->tqh_first); (rs) != ((void *)0); ( rs) = ((rs)->entry.tqe_next)) | |||
1394 | if (rs->id == id) | |||
1395 | return rs; | |||
1396 | return NULL((void *)0); | |||
1397 | } | |||
1398 | ||||
1399 | void | |||
1400 | rtr_free(struct rtr_session *rs) | |||
1401 | { | |||
1402 | if (rs == NULL((void *)0)) | |||
1403 | return; | |||
1404 | ||||
1405 | rtr_reset_cache(rs); | |||
1406 | rtr_fsm(rs, RTR_EVNT_CON_CLOSE); | |||
1407 | timer_remove_all(&rs->timers); | |||
1408 | free(rs); | |||
1409 | } | |||
1410 | ||||
1411 | void | |||
1412 | rtr_open(struct rtr_session *rs, int fd) | |||
1413 | { | |||
1414 | if (rs->state != RTR_STATE_CLOSED && | |||
1415 | rs->state != RTR_STATE_NEGOTIATION) { | |||
1416 | log_warnx("rtr %s: bad session state", log_rtr(rs)); | |||
1417 | rtr_fsm(rs, RTR_EVNT_CON_CLOSE); | |||
1418 | } | |||
1419 | ||||
1420 | if (rs->state == RTR_STATE_CLOSED) | |||
1421 | rs->version = RTR_MAX_VERSION2; | |||
1422 | ||||
1423 | rs->fd = rs->w.fd = fd; | |||
1424 | rs->state = RTR_STATE_NEGOTIATION; | |||
1425 | rtr_fsm(rs, RTR_EVNT_CON_OPEN); | |||
1426 | } | |||
1427 | ||||
1428 | void | |||
1429 | rtr_config_prep(void) | |||
1430 | { | |||
1431 | struct rtr_session *rs; | |||
1432 | ||||
1433 | TAILQ_FOREACH(rs, &rtrs, entry)for((rs) = ((&rtrs)->tqh_first); (rs) != ((void *)0); ( rs) = ((rs)->entry.tqe_next)) | |||
1434 | rs->reconf_action = RECONF_DELETE; | |||
1435 | } | |||
1436 | ||||
1437 | void | |||
1438 | rtr_config_merge(void) | |||
1439 | { | |||
1440 | struct rtr_session *rs, *nrs; | |||
1441 | ||||
1442 | TAILQ_FOREACH_SAFE(rs, &rtrs, entry, nrs)for ((rs) = ((&rtrs)->tqh_first); (rs) != ((void *)0) && ((nrs) = ((rs)->entry.tqe_next), 1); (rs) = (nrs)) | |||
1443 | if (rs->reconf_action == RECONF_DELETE) { | |||
1444 | TAILQ_REMOVE(&rtrs, rs, entry)do { if (((rs)->entry.tqe_next) != ((void *)0)) (rs)->entry .tqe_next->entry.tqe_prev = (rs)->entry.tqe_prev; else ( &rtrs)->tqh_last = (rs)->entry.tqe_prev; *(rs)-> entry.tqe_prev = (rs)->entry.tqe_next; ; ; } while (0); | |||
1445 | rtr_free(rs); | |||
1446 | } | |||
1447 | } | |||
1448 | ||||
1449 | void | |||
1450 | rtr_config_keep(struct rtr_session *rs) | |||
1451 | { | |||
1452 | rs->reconf_action = RECONF_KEEP; | |||
1453 | } | |||
1454 | ||||
1455 | void | |||
1456 | rtr_roa_merge(struct roa_tree *rt) | |||
1457 | { | |||
1458 | struct rtr_session *rs; | |||
1459 | struct roa *roa; | |||
1460 | ||||
1461 | TAILQ_FOREACH(rs, &rtrs, entry)for((rs) = ((&rtrs)->tqh_first); (rs) != ((void *)0); ( rs) = ((rs)->entry.tqe_next)) { | |||
1462 | RB_FOREACH(roa, roa_tree, &rs->roa_set)for ((roa) = roa_tree_RB_MINMAX(&rs->roa_set, -1); (roa ) != ((void *)0); (roa) = roa_tree_RB_NEXT(roa)) | |||
1463 | rtr_roa_insert(rt, roa); | |||
1464 | } | |||
1465 | } | |||
1466 | ||||
1467 | void | |||
1468 | rtr_aspa_merge(struct aspa_tree *at) | |||
1469 | { | |||
1470 | struct rtr_session *rs; | |||
1471 | struct aspa_set *aspa; | |||
1472 | ||||
1473 | TAILQ_FOREACH(rs, &rtrs, entry)for((rs) = ((&rtrs)->tqh_first); (rs) != ((void *)0); ( rs) = ((rs)->entry.tqe_next)) { | |||
1474 | RB_FOREACH(aspa, aspa_tree, &rs->aspa)for ((aspa) = aspa_tree_RB_MINMAX(&rs->aspa, -1); (aspa ) != ((void *)0); (aspa) = aspa_tree_RB_NEXT(aspa)) | |||
1475 | rtr_aspa_insert(at, aspa); | |||
1476 | RB_FOREACH(aspa, aspa_tree, &rs->aspa_oldv6)for ((aspa) = aspa_tree_RB_MINMAX(&rs->aspa_oldv6, -1) ; (aspa) != ((void *)0); (aspa) = aspa_tree_RB_NEXT(aspa)) | |||
1477 | rtr_aspa_insert(at, aspa); | |||
1478 | } | |||
1479 | } | |||
1480 | ||||
1481 | void | |||
1482 | rtr_shutdown(void) | |||
1483 | { | |||
1484 | struct rtr_session *rs, *nrs; | |||
1485 | ||||
1486 | TAILQ_FOREACH_SAFE(rs, &rtrs, entry, nrs)for ((rs) = ((&rtrs)->tqh_first); (rs) != ((void *)0) && ((nrs) = ((rs)->entry.tqe_next), 1); (rs) = (nrs)) | |||
1487 | rtr_free(rs); | |||
1488 | } | |||
1489 | ||||
1490 | void | |||
1491 | rtr_show(struct rtr_session *rs, pid_t pid) | |||
1492 | { | |||
1493 | struct ctl_show_rtr msg; | |||
1494 | struct ctl_timer ct; | |||
1495 | u_int i; | |||
1496 | time_t d; | |||
1497 | ||||
1498 | memset(&msg, 0, sizeof(msg)); | |||
1499 | ||||
1500 | /* descr, remote_addr, local_addr and remote_port set by parent */ | |||
1501 | msg.version = rs->version; | |||
1502 | msg.serial = rs->serial; | |||
1503 | msg.refresh = rs->refresh; | |||
1504 | msg.retry = rs->retry; | |||
1505 | msg.expire = rs->expire; | |||
1506 | msg.session_id = rs->session_id; | |||
1507 | msg.last_sent_error = rs->last_sent_error; | |||
1508 | msg.last_recv_error = rs->last_recv_error; | |||
1509 | strlcpy(msg.last_sent_msg, rs->last_sent_msg, | |||
1510 | sizeof(msg.last_sent_msg)); | |||
1511 | strlcpy(msg.last_recv_msg, rs->last_recv_msg, | |||
1512 | sizeof(msg.last_recv_msg)); | |||
1513 | ||||
1514 | /* send back imsg */ | |||
1515 | rtr_imsg_compose(IMSG_CTL_SHOW_RTR, rs->id, pid, &msg, sizeof(msg)); | |||
1516 | ||||
1517 | /* send back timer imsgs */ | |||
1518 | for (i = 1; i < Timer_Max; i++) { | |||
1519 | if (!timer_running(&rs->timers, i, &d)) | |||
1520 | continue; | |||
1521 | ct.type = i; | |||
1522 | ct.val = d; | |||
1523 | rtr_imsg_compose(IMSG_CTL_SHOW_TIMER, rs->id, pid, | |||
1524 | &ct, sizeof(ct)); | |||
1525 | } | |||
1526 | } |