| 1 |  |  | /*	$OpenBSD: control.c,v 1.82 2015/12/05 18:28:04 benno Exp $ */ | 
    
    | 2 |  |  |  | 
    
    | 3 |  |  | /* | 
    
    | 4 |  |  |  * Copyright (c) 2003, 2004 Henning Brauer <henning@openbsd.org> | 
    
    | 5 |  |  |  * | 
    
    | 6 |  |  |  * Permission to use, copy, modify, and distribute this software for any | 
    
    | 7 |  |  |  * purpose with or without fee is hereby granted, provided that the above | 
    
    | 8 |  |  |  * copyright notice and this permission notice appear in all copies. | 
    
    | 9 |  |  |  * | 
    
    | 10 |  |  |  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | 
    
    | 11 |  |  |  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | 
    
    | 12 |  |  |  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | 
    
    | 13 |  |  |  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | 
    
    | 14 |  |  |  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | 
    
    | 15 |  |  |  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 
    
    | 16 |  |  |  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 
    
    | 17 |  |  |  */ | 
    
    | 18 |  |  |  | 
    
    | 19 |  |  | #include <sys/types.h> | 
    
    | 20 |  |  | #include <sys/stat.h> | 
    
    | 21 |  |  | #include <sys/socket.h> | 
    
    | 22 |  |  | #include <sys/un.h> | 
    
    | 23 |  |  | #include <errno.h> | 
    
    | 24 |  |  | #include <stdlib.h> | 
    
    | 25 |  |  | #include <string.h> | 
    
    | 26 |  |  | #include <unistd.h> | 
    
    | 27 |  |  |  | 
    
    | 28 |  |  | #include "bgpd.h" | 
    
    | 29 |  |  | #include "session.h" | 
    
    | 30 |  |  |  | 
    
    | 31 |  |  | #define	CONTROL_BACKLOG	5 | 
    
    | 32 |  |  |  | 
    
    | 33 |  |  | struct ctl_conn	*control_connbyfd(int); | 
    
    | 34 |  |  | struct ctl_conn	*control_connbypid(pid_t); | 
    
    | 35 |  |  | int		 control_close(int); | 
    
    | 36 |  |  | void		 control_result(struct ctl_conn *, u_int); | 
    
    | 37 |  |  | ssize_t		 imsg_read_nofd(struct imsgbuf *); | 
    
    | 38 |  |  |  | 
    
    | 39 |  |  | int | 
    
    | 40 |  |  | control_init(int restricted, char *path) | 
    
    | 41 |  |  | { | 
    
    | 42 |  |  | 	struct sockaddr_un	 sun; | 
    
    | 43 |  |  | 	int			 fd; | 
    
    | 44 |  |  | 	mode_t			 old_umask, mode; | 
    
    | 45 |  |  |  | 
    
    | 46 |  |  | 	if ((fd = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC | SOCK_NONBLOCK, | 
    
    | 47 |  |  | 	     0)) == -1) { | 
    
    | 48 |  |  | 		log_warn("control_init: socket"); | 
    
    | 49 |  |  | 		return (-1); | 
    
    | 50 |  |  | 	} | 
    
    | 51 |  |  |  | 
    
    | 52 |  |  | 	bzero(&sun, sizeof(sun)); | 
    
    | 53 |  |  | 	sun.sun_family = AF_UNIX; | 
    
    | 54 |  |  | 	if (strlcpy(sun.sun_path, path, sizeof(sun.sun_path)) >= | 
    
    | 55 |  |  | 	    sizeof(sun.sun_path)) { | 
    
    | 56 |  |  | 		log_warn("control_init: socket name too long"); | 
    
    | 57 |  |  | 		close(fd); | 
    
    | 58 |  |  | 		return (-1); | 
    
    | 59 |  |  | 	} | 
    
    | 60 |  |  |  | 
    
    | 61 |  |  | 	if (unlink(path) == -1) | 
    
    | 62 |  |  | 		if (errno != ENOENT) { | 
    
    | 63 |  |  | 			log_warn("control_init: unlink %s", path); | 
    
    | 64 |  |  | 			close(fd); | 
    
    | 65 |  |  | 			return (-1); | 
    
    | 66 |  |  | 		} | 
    
    | 67 |  |  |  | 
    
    | 68 |  |  | 	if (restricted) { | 
    
    | 69 |  |  | 		old_umask = umask(S_IXUSR|S_IXGRP|S_IXOTH); | 
    
    | 70 |  |  | 		mode = S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP|S_IROTH|S_IWOTH; | 
    
    | 71 |  |  | 	} else { | 
    
    | 72 |  |  | 		old_umask = umask(S_IXUSR|S_IXGRP|S_IWOTH|S_IROTH|S_IXOTH); | 
    
    | 73 |  |  | 		mode = S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP; | 
    
    | 74 |  |  | 	} | 
    
    | 75 |  |  |  | 
    
    | 76 |  |  | 	if (bind(fd, (struct sockaddr *)&sun, sizeof(sun)) == -1) { | 
    
    | 77 |  |  | 		log_warn("control_init: bind: %s", path); | 
    
    | 78 |  |  | 		close(fd); | 
    
    | 79 |  |  | 		umask(old_umask); | 
    
    | 80 |  |  | 		return (-1); | 
    
    | 81 |  |  | 	} | 
    
    | 82 |  |  |  | 
    
    | 83 |  |  | 	umask(old_umask); | 
    
    | 84 |  |  |  | 
    
    | 85 |  |  | 	if (chmod(path, mode) == -1) { | 
    
    | 86 |  |  | 		log_warn("control_init: chmod: %s", path); | 
    
    | 87 |  |  | 		close(fd); | 
    
    | 88 |  |  | 		unlink(path); | 
    
    | 89 |  |  | 		return (-1); | 
    
    | 90 |  |  | 	} | 
    
    | 91 |  |  |  | 
    
    | 92 |  |  | 	return (fd); | 
    
    | 93 |  |  | } | 
    
    | 94 |  |  |  | 
    
    | 95 |  |  | int | 
    
    | 96 |  |  | control_listen(int fd) | 
    
    | 97 |  |  | { | 
    
    | 98 |  |  | 	if (fd != -1 && listen(fd, CONTROL_BACKLOG) == -1) { | 
    
    | 99 |  |  | 		log_warn("control_listen: listen"); | 
    
    | 100 |  |  | 		return (-1); | 
    
    | 101 |  |  | 	} | 
    
    | 102 |  |  |  | 
    
    | 103 |  |  | 	return (0); | 
    
    | 104 |  |  | } | 
    
    | 105 |  |  |  | 
    
    | 106 |  |  | void | 
    
    | 107 |  |  | control_shutdown(int fd) | 
    
    | 108 |  |  | { | 
    
    | 109 |  |  | 	close(fd); | 
    
    | 110 |  |  | } | 
    
    | 111 |  |  |  | 
    
    | 112 |  |  | void | 
    
    | 113 |  |  | control_cleanup(const char *path) | 
    
    | 114 |  |  | { | 
    
    | 115 |  |  | 	if (path) | 
    
    | 116 |  |  | 		unlink(path); | 
    
    | 117 |  |  | } | 
    
    | 118 |  |  |  | 
    
    | 119 |  |  | unsigned int | 
    
    | 120 |  |  | control_accept(int listenfd, int restricted) | 
    
    | 121 |  |  | { | 
    
    | 122 |  |  | 	int			 connfd; | 
    
    | 123 |  |  | 	socklen_t		 len; | 
    
    | 124 |  |  | 	struct sockaddr_un	 sun; | 
    
    | 125 |  |  | 	struct ctl_conn		*ctl_conn; | 
    
    | 126 |  |  |  | 
    
    | 127 |  |  | 	len = sizeof(sun); | 
    
    | 128 |  |  | 	if ((connfd = accept4(listenfd, | 
    
    | 129 |  |  | 	    (struct sockaddr *)&sun, &len, | 
    
    | 130 |  |  | 	    SOCK_NONBLOCK | SOCK_CLOEXEC)) == -1) { | 
    
    | 131 |  |  | 		if (errno == ENFILE || errno == EMFILE) { | 
    
    | 132 |  |  | 			pauseaccept = getmonotime(); | 
    
    | 133 |  |  | 			return (0); | 
    
    | 134 |  |  | 		} else if (errno != EWOULDBLOCK && errno != EINTR && | 
    
    | 135 |  |  | 		    errno != ECONNABORTED) | 
    
    | 136 |  |  | 			log_warn("control_accept: accept"); | 
    
    | 137 |  |  | 		return (0); | 
    
    | 138 |  |  | 	} | 
    
    | 139 |  |  |  | 
    
    | 140 |  |  | 	if ((ctl_conn = calloc(1, sizeof(struct ctl_conn))) == NULL) { | 
    
    | 141 |  |  | 		log_warn("control_accept"); | 
    
    | 142 |  |  | 		close(connfd); | 
    
    | 143 |  |  | 		return (0); | 
    
    | 144 |  |  | 	} | 
    
    | 145 |  |  |  | 
    
    | 146 |  |  | 	imsg_init(&ctl_conn->ibuf, connfd); | 
    
    | 147 |  |  | 	ctl_conn->restricted = restricted; | 
    
    | 148 |  |  |  | 
    
    | 149 |  |  | 	TAILQ_INSERT_TAIL(&ctl_conns, ctl_conn, entry); | 
    
    | 150 |  |  |  | 
    
    | 151 |  |  | 	return (1); | 
    
    | 152 |  |  | } | 
    
    | 153 |  |  |  | 
    
    | 154 |  |  | struct ctl_conn * | 
    
    | 155 |  |  | control_connbyfd(int fd) | 
    
    | 156 |  |  | { | 
    
    | 157 |  |  | 	struct ctl_conn	*c; | 
    
    | 158 |  |  |  | 
    
    | 159 |  |  | 	for (c = TAILQ_FIRST(&ctl_conns); c != NULL && c->ibuf.fd != fd; | 
    
    | 160 |  |  | 	    c = TAILQ_NEXT(c, entry)) | 
    
    | 161 |  |  | 		;	/* nothing */ | 
    
    | 162 |  |  |  | 
    
    | 163 |  |  | 	return (c); | 
    
    | 164 |  |  | } | 
    
    | 165 |  |  |  | 
    
    | 166 |  |  | struct ctl_conn * | 
    
    | 167 |  |  | control_connbypid(pid_t pid) | 
    
    | 168 |  |  | { | 
    
    | 169 |  |  | 	struct ctl_conn	*c; | 
    
    | 170 |  |  |  | 
    
    | 171 |  |  | 	for (c = TAILQ_FIRST(&ctl_conns); c != NULL && c->ibuf.pid != pid; | 
    
    | 172 |  |  | 	    c = TAILQ_NEXT(c, entry)) | 
    
    | 173 |  |  | 		;	/* nothing */ | 
    
    | 174 |  |  |  | 
    
    | 175 |  |  | 	return (c); | 
    
    | 176 |  |  | } | 
    
    | 177 |  |  |  | 
    
    | 178 |  |  | int | 
    
    | 179 |  |  | control_close(int fd) | 
    
    | 180 |  |  | { | 
    
    | 181 |  |  | 	struct ctl_conn	*c; | 
    
    | 182 |  |  |  | 
    
    | 183 |  |  | 	if ((c = control_connbyfd(fd)) == NULL) { | 
    
    | 184 |  |  | 		log_warn("control_close: fd %d: not found", fd); | 
    
    | 185 |  |  | 		return (0); | 
    
    | 186 |  |  | 	} | 
    
    | 187 |  |  |  | 
    
    | 188 |  |  | 	msgbuf_clear(&c->ibuf.w); | 
    
    | 189 |  |  | 	TAILQ_REMOVE(&ctl_conns, c, entry); | 
    
    | 190 |  |  |  | 
    
    | 191 |  |  | 	close(c->ibuf.fd); | 
    
    | 192 |  |  | 	free(c); | 
    
    | 193 |  |  | 	pauseaccept = 0; | 
    
    | 194 |  |  | 	return (1); | 
    
    | 195 |  |  | } | 
    
    | 196 |  |  |  | 
    
    | 197 |  |  | int | 
    
    | 198 |  |  | control_dispatch_msg(struct pollfd *pfd, u_int *ctl_cnt) | 
    
    | 199 |  |  | { | 
    
    | 200 |  |  | 	struct imsg		 imsg; | 
    
    | 201 |  |  | 	struct ctl_conn		*c; | 
    
    | 202 |  |  | 	ssize_t			 n; | 
    
    | 203 |  |  | 	int			 verbose; | 
    
    | 204 |  |  | 	struct peer		*p; | 
    
    | 205 |  |  | 	struct ctl_neighbor	*neighbor; | 
    
    | 206 |  |  | 	struct ctl_show_rib_request	*ribreq; | 
    
    | 207 |  |  |  | 
    
    | 208 |  |  | 	if ((c = control_connbyfd(pfd->fd)) == NULL) { | 
    
    | 209 |  |  | 		log_warn("control_dispatch_msg: fd %d: not found", pfd->fd); | 
    
    | 210 |  |  | 		return (0); | 
    
    | 211 |  |  | 	} | 
    
    | 212 |  |  |  | 
    
    | 213 |  |  | 	if (pfd->revents & POLLOUT) | 
    
    | 214 |  |  | 		if (msgbuf_write(&c->ibuf.w) <= 0 && errno != EAGAIN) { | 
    
    | 215 |  |  | 			*ctl_cnt -= control_close(pfd->fd); | 
    
    | 216 |  |  | 			return (1); | 
    
    | 217 |  |  | 		} | 
    
    | 218 |  |  |  | 
    
    | 219 |  |  | 	if (!(pfd->revents & POLLIN)) | 
    
    | 220 |  |  | 		return (0); | 
    
    | 221 |  |  |  | 
    
    | 222 |  |  | 	if (((n = imsg_read_nofd(&c->ibuf)) == -1 && errno != EAGAIN) || | 
    
    | 223 |  |  | 	    n == 0) { | 
    
    | 224 |  |  | 		*ctl_cnt -= control_close(pfd->fd); | 
    
    | 225 |  |  | 		return (1); | 
    
    | 226 |  |  | 	} | 
    
    | 227 |  |  |  | 
    
    | 228 |  |  | 	for (;;) { | 
    
    | 229 |  |  | 		if ((n = imsg_get(&c->ibuf, &imsg)) == -1) { | 
    
    | 230 |  |  | 			*ctl_cnt -= control_close(pfd->fd); | 
    
    | 231 |  |  | 			return (1); | 
    
    | 232 |  |  | 		} | 
    
    | 233 |  |  |  | 
    
    | 234 |  |  | 		if (n == 0) | 
    
    | 235 |  |  | 			break; | 
    
    | 236 |  |  |  | 
    
    | 237 |  |  | 		if (c->restricted) { | 
    
    | 238 |  |  | 			switch (imsg.hdr.type) { | 
    
    | 239 |  |  | 			case IMSG_CTL_SHOW_NEIGHBOR: | 
    
    | 240 |  |  | 			case IMSG_CTL_SHOW_NEXTHOP: | 
    
    | 241 |  |  | 			case IMSG_CTL_SHOW_INTERFACE: | 
    
    | 242 |  |  | 			case IMSG_CTL_SHOW_RIB: | 
    
    | 243 |  |  | 			case IMSG_CTL_SHOW_RIB_AS: | 
    
    | 244 |  |  | 			case IMSG_CTL_SHOW_RIB_PREFIX: | 
    
    | 245 |  |  | 			case IMSG_CTL_SHOW_RIB_MEM: | 
    
    | 246 |  |  | 			case IMSG_CTL_SHOW_RIB_COMMUNITY: | 
    
    | 247 |  |  | 			case IMSG_CTL_SHOW_NETWORK: | 
    
    | 248 |  |  | 			case IMSG_CTL_SHOW_TERSE: | 
    
    | 249 |  |  | 			case IMSG_CTL_SHOW_TIMER: | 
    
    | 250 |  |  | 				break; | 
    
    | 251 |  |  | 			default: | 
    
    | 252 |  |  | 				/* clear imsg type to prevent processing */ | 
    
    | 253 |  |  | 				imsg.hdr.type = IMSG_NONE; | 
    
    | 254 |  |  | 				control_result(c, CTL_RES_DENIED); | 
    
    | 255 |  |  | 				break; | 
    
    | 256 |  |  | 			} | 
    
    | 257 |  |  | 		} | 
    
    | 258 |  |  |  | 
    
    | 259 |  |  | 		switch (imsg.hdr.type) { | 
    
    | 260 |  |  | 		case IMSG_NONE: | 
    
    | 261 |  |  | 			/* message was filtered out, nothing to do */ | 
    
    | 262 |  |  | 			break; | 
    
    | 263 |  |  | 		case IMSG_CTL_SHOW_NEIGHBOR: | 
    
    | 264 |  |  | 			c->ibuf.pid = imsg.hdr.pid; | 
    
    | 265 |  |  | 			if (imsg.hdr.len == IMSG_HEADER_SIZE + | 
    
    | 266 |  |  | 			    sizeof(struct ctl_neighbor)) { | 
    
    | 267 |  |  | 				neighbor = imsg.data; | 
    
    | 268 |  |  | 				p = getpeerbyaddr(&neighbor->addr); | 
    
    | 269 |  |  | 				if (p == NULL) | 
    
    | 270 |  |  | 					p = getpeerbydesc(neighbor->descr); | 
    
    | 271 |  |  | 				if (p == NULL) { | 
    
    | 272 |  |  | 					control_result(c, CTL_RES_NOSUCHPEER); | 
    
    | 273 |  |  | 					break; | 
    
    | 274 |  |  | 				} | 
    
    | 275 |  |  | 				if (!neighbor->show_timers) { | 
    
    | 276 |  |  | 					imsg_ctl_rde(imsg.hdr.type, | 
    
    | 277 |  |  | 					    imsg.hdr.pid, | 
    
    | 278 |  |  | 					    p, sizeof(struct peer)); | 
    
    | 279 |  |  | 					imsg_ctl_rde(IMSG_CTL_END, | 
    
    | 280 |  |  | 					    imsg.hdr.pid, NULL, 0); | 
    
    | 281 |  |  | 				} else { | 
    
    | 282 |  |  | 					u_int			 i; | 
    
    | 283 |  |  | 					time_t			 d; | 
    
    | 284 |  |  | 					struct ctl_timer	 ct; | 
    
    | 285 |  |  |  | 
    
    | 286 |  |  | 					imsg_compose(&c->ibuf, | 
    
    | 287 |  |  | 					    IMSG_CTL_SHOW_NEIGHBOR, | 
    
    | 288 |  |  | 					    0, 0, -1, p, sizeof(*p)); | 
    
    | 289 |  |  | 					for (i = 1; i < Timer_Max; i++) { | 
    
    | 290 |  |  | 						if (!timer_running(p, i, &d)) | 
    
    | 291 |  |  | 							continue; | 
    
    | 292 |  |  | 						ct.type = i; | 
    
    | 293 |  |  | 						ct.val = d; | 
    
    | 294 |  |  | 						imsg_compose(&c->ibuf, | 
    
    | 295 |  |  | 						    IMSG_CTL_SHOW_TIMER, | 
    
    | 296 |  |  | 						    0, 0, -1, &ct, sizeof(ct)); | 
    
    | 297 |  |  | 					} | 
    
    | 298 |  |  | 					imsg_compose(&c->ibuf, IMSG_CTL_END, | 
    
    | 299 |  |  | 					    0, 0, -1, NULL, 0); | 
    
    | 300 |  |  | 				} | 
    
    | 301 |  |  | 			} else { | 
    
    | 302 |  |  | 				for (p = peers; p != NULL; p = p->next) | 
    
    | 303 |  |  | 					imsg_ctl_rde(imsg.hdr.type, | 
    
    | 304 |  |  | 					    imsg.hdr.pid, | 
    
    | 305 |  |  | 					    p, sizeof(struct peer)); | 
    
    | 306 |  |  | 				imsg_ctl_rde(IMSG_CTL_END, imsg.hdr.pid, | 
    
    | 307 |  |  | 					NULL, 0); | 
    
    | 308 |  |  | 			} | 
    
    | 309 |  |  | 			break; | 
    
    | 310 |  |  | 		case IMSG_CTL_SHOW_TERSE: | 
    
    | 311 |  |  | 			for (p = peers; p != NULL; p = p->next) | 
    
    | 312 |  |  | 				imsg_compose(&c->ibuf, IMSG_CTL_SHOW_NEIGHBOR, | 
    
    | 313 |  |  | 				    0, 0, -1, p, sizeof(struct peer)); | 
    
    | 314 |  |  | 			imsg_compose(&c->ibuf, IMSG_CTL_END, 0, 0, -1, NULL, 0); | 
    
    | 315 |  |  | 			break; | 
    
    | 316 |  |  | 		case IMSG_CTL_FIB_COUPLE: | 
    
    | 317 |  |  | 		case IMSG_CTL_FIB_DECOUPLE: | 
    
    | 318 |  |  | 			imsg_ctl_parent(imsg.hdr.type, imsg.hdr.peerid, | 
    
    | 319 |  |  | 			    0, NULL, 0); | 
    
    | 320 |  |  | 			break; | 
    
    | 321 |  |  | 		case IMSG_CTL_NEIGHBOR_UP: | 
    
    | 322 |  |  | 		case IMSG_CTL_NEIGHBOR_DOWN: | 
    
    | 323 |  |  | 		case IMSG_CTL_NEIGHBOR_CLEAR: | 
    
    | 324 |  |  | 		case IMSG_CTL_NEIGHBOR_RREFRESH: | 
    
    | 325 |  |  | 		case IMSG_CTL_NEIGHBOR_DESTROY: | 
    
    | 326 |  |  | 			if (imsg.hdr.len == IMSG_HEADER_SIZE + | 
    
    | 327 |  |  | 			    sizeof(struct ctl_neighbor)) { | 
    
    | 328 |  |  | 				neighbor = imsg.data; | 
    
    | 329 |  |  | 				neighbor->descr[PEER_DESCR_LEN - 1] = 0; | 
    
    | 330 |  |  | 				p = getpeerbyaddr(&neighbor->addr); | 
    
    | 331 |  |  | 				if (p == NULL) | 
    
    | 332 |  |  | 					p = getpeerbydesc(neighbor->descr); | 
    
    | 333 |  |  | 				if (p == NULL) { | 
    
    | 334 |  |  | 					control_result(c, CTL_RES_NOSUCHPEER); | 
    
    | 335 |  |  | 					break; | 
    
    | 336 |  |  | 				} | 
    
    | 337 |  |  | 				switch (imsg.hdr.type) { | 
    
    | 338 |  |  | 				case IMSG_CTL_NEIGHBOR_UP: | 
    
    | 339 |  |  | 					bgp_fsm(p, EVNT_START); | 
    
    | 340 |  |  | 					control_result(c, CTL_RES_OK); | 
    
    | 341 |  |  | 					break; | 
    
    | 342 |  |  | 				case IMSG_CTL_NEIGHBOR_DOWN: | 
    
    | 343 |  |  | 					session_stop(p, ERR_CEASE_ADMIN_DOWN); | 
    
    | 344 |  |  | 					control_result(c, CTL_RES_OK); | 
    
    | 345 |  |  | 					break; | 
    
    | 346 |  |  | 				case IMSG_CTL_NEIGHBOR_CLEAR: | 
    
    | 347 |  |  | 					if (!p->conf.down) { | 
    
    | 348 |  |  | 						session_stop(p, | 
    
    | 349 |  |  | 						    ERR_CEASE_ADMIN_RESET); | 
    
    | 350 |  |  | 						timer_set(p, Timer_IdleHold, | 
    
    | 351 |  |  | 						    SESSION_CLEAR_DELAY); | 
    
    | 352 |  |  | 					} else { | 
    
    | 353 |  |  | 						session_stop(p, | 
    
    | 354 |  |  | 						    ERR_CEASE_ADMIN_DOWN); | 
    
    | 355 |  |  | 					} | 
    
    | 356 |  |  | 					control_result(c, CTL_RES_OK); | 
    
    | 357 |  |  | 					break; | 
    
    | 358 |  |  | 				case IMSG_CTL_NEIGHBOR_RREFRESH: | 
    
    | 359 |  |  | 					if (session_neighbor_rrefresh(p)) | 
    
    | 360 |  |  | 						control_result(c, | 
    
    | 361 |  |  | 						    CTL_RES_NOCAP); | 
    
    | 362 |  |  | 					else | 
    
    | 363 |  |  | 						control_result(c, CTL_RES_OK); | 
    
    | 364 |  |  | 					break; | 
    
    | 365 |  |  | 				case IMSG_CTL_NEIGHBOR_DESTROY: | 
    
    | 366 |  |  | 					if (!p->template) | 
    
    | 367 |  |  | 						control_result(c, | 
    
    | 368 |  |  | 						    CTL_RES_BADPEER); | 
    
    | 369 |  |  | 					else if (p->state != STATE_IDLE) | 
    
    | 370 |  |  | 						control_result(c, | 
    
    | 371 |  |  | 						    CTL_RES_BADSTATE); | 
    
    | 372 |  |  | 					else { | 
    
    | 373 |  |  | 						/* | 
    
    | 374 |  |  | 						 * Mark as deleted, will be | 
    
    | 375 |  |  | 						 * collected on next poll loop. | 
    
    | 376 |  |  | 						 */ | 
    
    | 377 |  |  | 						p->conf.reconf_action = | 
    
    | 378 |  |  | 						    RECONF_DELETE; | 
    
    | 379 |  |  | 						control_result(c, CTL_RES_OK); | 
    
    | 380 |  |  | 					} | 
    
    | 381 |  |  | 					break; | 
    
    | 382 |  |  | 				default: | 
    
    | 383 |  |  | 					fatal("king bula wants more humppa"); | 
    
    | 384 |  |  | 				} | 
    
    | 385 |  |  | 			} else | 
    
    | 386 |  |  | 				log_warnx("got IMSG_CTL_NEIGHBOR_ with " | 
    
    | 387 |  |  | 				    "wrong length"); | 
    
    | 388 |  |  | 			break; | 
    
    | 389 |  |  | 		case IMSG_CTL_RELOAD: | 
    
    | 390 |  |  | 		case IMSG_CTL_SHOW_INTERFACE: | 
    
    | 391 |  |  | 		case IMSG_CTL_SHOW_FIB_TABLES: | 
    
    | 392 |  |  | 			c->ibuf.pid = imsg.hdr.pid; | 
    
    | 393 |  |  | 			imsg_ctl_parent(imsg.hdr.type, 0, imsg.hdr.pid, | 
    
    | 394 |  |  | 			    imsg.data, imsg.hdr.len - IMSG_HEADER_SIZE); | 
    
    | 395 |  |  | 			break; | 
    
    | 396 |  |  | 		case IMSG_CTL_KROUTE: | 
    
    | 397 |  |  | 		case IMSG_CTL_KROUTE_ADDR: | 
    
    | 398 |  |  | 		case IMSG_CTL_SHOW_NEXTHOP: | 
    
    | 399 |  |  | 			c->ibuf.pid = imsg.hdr.pid; | 
    
    | 400 |  |  | 			imsg_ctl_parent(imsg.hdr.type, imsg.hdr.peerid, | 
    
    | 401 |  |  | 			    imsg.hdr.pid, imsg.data, imsg.hdr.len - | 
    
    | 402 |  |  | 			    IMSG_HEADER_SIZE); | 
    
    | 403 |  |  | 			break; | 
    
    | 404 |  |  | 		case IMSG_CTL_SHOW_RIB: | 
    
    | 405 |  |  | 		case IMSG_CTL_SHOW_RIB_AS: | 
    
    | 406 |  |  | 		case IMSG_CTL_SHOW_RIB_PREFIX: | 
    
    | 407 |  |  | 			if (imsg.hdr.len == IMSG_HEADER_SIZE + | 
    
    | 408 |  |  | 			    sizeof(struct ctl_show_rib_request)) { | 
    
    | 409 |  |  | 				ribreq = imsg.data; | 
    
    | 410 |  |  | 				neighbor = &ribreq->neighbor; | 
    
    | 411 |  |  | 				neighbor->descr[PEER_DESCR_LEN - 1] = 0; | 
    
    | 412 |  |  | 				ribreq->peerid = 0; | 
    
    | 413 |  |  | 				p = NULL; | 
    
    | 414 |  |  | 				if (neighbor->addr.aid) { | 
    
    | 415 |  |  | 					p = getpeerbyaddr(&neighbor->addr); | 
    
    | 416 |  |  | 					if (p == NULL) { | 
    
    | 417 |  |  | 						control_result(c, | 
    
    | 418 |  |  | 						    CTL_RES_NOSUCHPEER); | 
    
    | 419 |  |  | 						break; | 
    
    | 420 |  |  | 					} | 
    
    | 421 |  |  | 					ribreq->peerid = p->conf.id; | 
    
    | 422 |  |  | 				} else if (neighbor->descr[0]) { | 
    
    | 423 |  |  | 					p = getpeerbydesc(neighbor->descr); | 
    
    | 424 |  |  | 					if (p == NULL) { | 
    
    | 425 |  |  | 						control_result(c, | 
    
    | 426 |  |  | 						    CTL_RES_NOSUCHPEER); | 
    
    | 427 |  |  | 						break; | 
    
    | 428 |  |  | 					} | 
    
    | 429 |  |  | 					ribreq->peerid = p->conf.id; | 
    
    | 430 |  |  | 				} | 
    
    | 431 |  |  | 				if ((ribreq->flags & | 
    
    | 432 |  |  | 				     (F_CTL_ADJ_OUT | F_CTL_ADJ_IN)) && !p) { | 
    
    | 433 |  |  | 					/* | 
    
    | 434 |  |  | 					 * both in and out tables are only | 
    
    | 435 |  |  | 					 * meaningful if used on a single | 
    
    | 436 |  |  | 					 * peer. | 
    
    | 437 |  |  | 					 */ | 
    
    | 438 |  |  | 					control_result(c, CTL_RES_NOSUCHPEER); | 
    
    | 439 |  |  | 					break; | 
    
    | 440 |  |  | 				} | 
    
    | 441 |  |  | 				if ((ribreq->flags & F_CTL_ADJ_IN) && p && | 
    
    | 442 |  |  | 				    !p->conf.softreconfig_in) { | 
    
    | 443 |  |  | 					/* | 
    
    | 444 |  |  | 					 * without softreconfig_in we do not | 
    
    | 445 |  |  | 					 * have an Adj-RIB-In table | 
    
    | 446 |  |  | 					 */ | 
    
    | 447 |  |  | 					control_result(c, CTL_RES_NOCAP); | 
    
    | 448 |  |  | 					break; | 
    
    | 449 |  |  | 				} | 
    
    | 450 |  |  | 				if ((imsg.hdr.type == IMSG_CTL_SHOW_RIB_PREFIX) | 
    
    | 451 |  |  | 				    && (ribreq->prefix.aid == AID_UNSPEC)) { | 
    
    | 452 |  |  | 					/* malformed request, must specify af */ | 
    
    | 453 |  |  | 					control_result(c, CTL_RES_PARSE_ERROR); | 
    
    | 454 |  |  | 					break; | 
    
    | 455 |  |  | 				} | 
    
    | 456 |  |  | 				c->ibuf.pid = imsg.hdr.pid; | 
    
    | 457 |  |  | 				imsg_ctl_rde(imsg.hdr.type, imsg.hdr.pid, | 
    
    | 458 |  |  | 				    imsg.data, imsg.hdr.len - IMSG_HEADER_SIZE); | 
    
    | 459 |  |  | 			} else | 
    
    | 460 |  |  | 				log_warnx("got IMSG_CTL_SHOW_RIB with " | 
    
    | 461 |  |  | 				    "wrong length"); | 
    
    | 462 |  |  | 			break; | 
    
    | 463 |  |  | 		case IMSG_CTL_SHOW_RIB_MEM: | 
    
    | 464 |  |  | 		case IMSG_CTL_SHOW_RIB_COMMUNITY: | 
    
    | 465 |  |  | 		case IMSG_CTL_SHOW_NETWORK: | 
    
    | 466 |  |  | 			c->ibuf.pid = imsg.hdr.pid; | 
    
    | 467 |  |  | 			imsg_ctl_rde(imsg.hdr.type, imsg.hdr.pid, | 
    
    | 468 |  |  | 			    imsg.data, imsg.hdr.len - IMSG_HEADER_SIZE); | 
    
    | 469 |  |  | 			break; | 
    
    | 470 |  |  | 		case IMSG_NETWORK_ADD: | 
    
    | 471 |  |  | 		case IMSG_NETWORK_ASPATH: | 
    
    | 472 |  |  | 		case IMSG_NETWORK_ATTR: | 
    
    | 473 |  |  | 		case IMSG_NETWORK_REMOVE: | 
    
    | 474 |  |  | 		case IMSG_NETWORK_FLUSH: | 
    
    | 475 |  |  | 		case IMSG_NETWORK_DONE: | 
    
    | 476 |  |  | 		case IMSG_FILTER_SET: | 
    
    | 477 |  |  | 			imsg_ctl_rde(imsg.hdr.type, 0, | 
    
    | 478 |  |  | 			    imsg.data, imsg.hdr.len - IMSG_HEADER_SIZE); | 
    
    | 479 |  |  | 			break; | 
    
    | 480 |  |  | 		case IMSG_CTL_LOG_VERBOSE: | 
    
    | 481 |  |  | 			if (imsg.hdr.len != IMSG_HEADER_SIZE + | 
    
    | 482 |  |  | 			    sizeof(verbose)) | 
    
    | 483 |  |  | 				break; | 
    
    | 484 |  |  |  | 
    
    | 485 |  |  | 			/* forward to other processes */ | 
    
    | 486 |  |  | 			imsg_ctl_parent(imsg.hdr.type, 0, imsg.hdr.pid, | 
    
    | 487 |  |  | 			    imsg.data, imsg.hdr.len - IMSG_HEADER_SIZE); | 
    
    | 488 |  |  | 			imsg_ctl_rde(imsg.hdr.type, 0, | 
    
    | 489 |  |  | 			    imsg.data, imsg.hdr.len - IMSG_HEADER_SIZE); | 
    
    | 490 |  |  |  | 
    
    | 491 |  |  | 			memcpy(&verbose, imsg.data, sizeof(verbose)); | 
    
    | 492 |  |  | 			log_verbose(verbose); | 
    
    | 493 |  |  | 			break; | 
    
    | 494 |  |  | 		default: | 
    
    | 495 |  |  | 			break; | 
    
    | 496 |  |  | 		} | 
    
    | 497 |  |  | 		imsg_free(&imsg); | 
    
    | 498 |  |  | 	} | 
    
    | 499 |  |  |  | 
    
    | 500 |  |  | 	return (0); | 
    
    | 501 |  |  | } | 
    
    | 502 |  |  |  | 
    
    | 503 |  |  | int | 
    
    | 504 |  |  | control_imsg_relay(struct imsg *imsg) | 
    
    | 505 |  |  | { | 
    
    | 506 |  |  | 	struct ctl_conn	*c; | 
    
    | 507 |  |  |  | 
    
    | 508 |  |  | 	if ((c = control_connbypid(imsg->hdr.pid)) == NULL) | 
    
    | 509 |  |  | 		return (0); | 
    
    | 510 |  |  |  | 
    
    | 511 |  |  | 	return (imsg_compose(&c->ibuf, imsg->hdr.type, 0, imsg->hdr.pid, -1, | 
    
    | 512 |  |  | 	    imsg->data, imsg->hdr.len - IMSG_HEADER_SIZE)); | 
    
    | 513 |  |  | } | 
    
    | 514 |  |  |  | 
    
    | 515 |  |  | void | 
    
    | 516 |  |  | control_result(struct ctl_conn *c, u_int code) | 
    
    | 517 |  |  | { | 
    
    | 518 |  |  | 	imsg_compose(&c->ibuf, IMSG_CTL_RESULT, 0, c->ibuf.pid, -1, | 
    
    | 519 |  |  | 	    &code, sizeof(code)); | 
    
    | 520 |  |  | } | 
    
    | 521 |  |  |  | 
    
    | 522 |  |  | /* This should go into libutil, from smtpd/mproc.c */ | 
    
    | 523 |  |  | ssize_t | 
    
    | 524 |  |  | imsg_read_nofd(struct imsgbuf *ibuf) | 
    
    | 525 |  |  | { | 
    
    | 526 |  |  | 	ssize_t	 n; | 
    
    | 527 |  |  | 	char	*buf; | 
    
    | 528 |  |  | 	size_t	 len; | 
    
    | 529 |  |  |  | 
    
    | 530 |  |  | 	buf = ibuf->r.buf + ibuf->r.wpos; | 
    
    | 531 |  |  | 	len = sizeof(ibuf->r.buf) - ibuf->r.wpos; | 
    
    | 532 |  |  |  | 
    
    | 533 |  |  | 	while ((n = recv(ibuf->fd, buf, len, 0)) == -1) { | 
    
    | 534 |  |  | 		if (errno != EINTR) | 
    
    | 535 |  |  | 			return (n); | 
    
    | 536 |  |  | 	} | 
    
    | 537 |  |  |  | 
    
    | 538 |  |  | 	ibuf->r.wpos += n; | 
    
    | 539 |  |  | 	return (n); | 
    
    | 540 |  |  | } |