1 /* $OpenBSD: route.c,v 1.43 2001/07/07 18:26:20 deraadt Exp $ */ 2 /* $NetBSD: route.c,v 1.16 1996/04/15 18:27:05 cgd Exp $ */ 3 4 /* 5 * Copyright (c) 1983, 1989, 1991, 1993 6 * The Regents of the University of California. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. All advertising materials mentioning features or use of this software 17 * must display the following acknowledgement: 18 * This product includes software developed by the University of 19 * California, Berkeley and its contributors. 20 * 4. Neither the name of the University nor the names of its contributors 21 * may be used to endorse or promote products derived from this software 22 * without specific prior written permission. 23 * 24 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 25 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 27 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 28 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 29 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 30 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 31 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 32 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 33 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 34 * SUCH DAMAGE. 35 */ 36 37 #ifndef lint 38 static char copyright[] = 39 "@(#) Copyright (c) 1983, 1989, 1991, 1993\n\ 40 The Regents of the University of California. All rights reserved.\n"; 41 #endif /* not lint */ 42 43 #ifndef lint 44 #if 0 45 static char sccsid[] = "@(#)route.c 8.3 (Berkeley) 3/19/94"; 46 #else 47 static char rcsid[] = "$OpenBSD: route.c,v 1.43 2001/07/07 18:26:20 deraadt Exp $"; 48 #endif 49 #endif /* not lint */ 50 51 #include <sys/param.h> 52 #include <sys/socket.h> 53 #include <sys/ioctl.h> 54 #include <sys/mbuf.h> 55 #include <sys/sysctl.h> 56 57 #include <net/if.h> 58 #include <net/route.h> 59 #include <net/if_dl.h> 60 #include <netinet/in.h> 61 #include <netns/ns.h> 62 #include <netipx/ipx.h> 63 #include <netiso/iso.h> 64 #include <netccitt/x25.h> 65 #include <arpa/inet.h> 66 #include <netdb.h> 67 68 #include <errno.h> 69 #include <fcntl.h> 70 #include <unistd.h> 71 #include <stdio.h> 72 #include <ctype.h> 73 #include <stdlib.h> 74 #include <string.h> 75 #include <paths.h> 76 77 #include "keywords.h" 78 79 union sockunion { 80 struct sockaddr sa; 81 struct sockaddr_in sin; 82 #ifdef INET6 83 struct sockaddr_in6 sin6; 84 #endif 85 struct sockaddr_ns sns; 86 struct sockaddr_ipx sipx; 87 struct sockaddr_iso siso; 88 struct sockaddr_dl sdl; 89 struct sockaddr_x25 sx25; 90 } so_dst, so_gate, so_mask, so_genmask, so_ifa, so_ifp; 91 92 typedef union sockunion *sup; 93 pid_t pid; 94 int rtm_addrs, s; 95 int forcehost, forcenet, doflush, nflag, af, qflag, tflag, keyword(); 96 int iflag, verbose, aflen = sizeof (struct sockaddr_in); 97 int locking, lockrest, debugonly; 98 struct rt_metrics rt_metrics; 99 u_long rtm_inits; 100 uid_t uid; 101 102 char *routename __P((struct sockaddr *)); 103 char *netname __P((struct sockaddr *)); 104 void flushroutes __P((int, char **)); 105 int newroute __P((int, char **)); 106 void monitor __P((void)); 107 #ifdef INET6 108 static int prefixlen __P((char *)); 109 #endif 110 void sockaddr __P((char *, struct sockaddr *)); 111 void sodump __P((sup, char *)); 112 void print_getmsg __P((struct rt_msghdr *, int)); 113 void print_rtmsg __P((struct rt_msghdr *, int)); 114 void pmsg_common __P((struct rt_msghdr *)); 115 void pmsg_addrs __P((char *, int)); 116 void bprintf __P((FILE *, int, u_char *)); 117 void mask_addr __P((void)); 118 int getaddr __P((int, char *, struct hostent **)); 119 int rtmsg __P((int, int)); 120 int x25_makemask __P((void)); 121 122 extern void show __P((int, char **)); /* XXX - from show.c */ 123 124 __dead void 125 usage(cp) 126 char *cp; 127 { 128 if (cp) 129 (void) fprintf(stderr, "route: botched keyword: %s\n", cp); 130 (void) fprintf(stderr, 131 "usage: route [ -nqv ] cmd [[ -<modifiers> ] args ]\n"); 132 (void) fprintf(stderr, 133 "keywords: get, add, change, delete, show, flush, monitor.\n"); 134 exit(1); 135 /* NOTREACHED */ 136 } 137 138 void 139 quit(s) 140 char *s; 141 { 142 int sverrno = errno; 143 144 (void) fprintf(stderr, "route: "); 145 if (s) 146 (void) fprintf(stderr, "%s: ", s); 147 (void) fprintf(stderr, "%s\n", strerror(sverrno)); 148 exit(1); 149 /* NOTREACHED */ 150 } 151 152 #define ROUNDUP(a) \ 153 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) 154 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) 155 156 int 157 main(argc, argv) 158 int argc; 159 char **argv; 160 { 161 int ch; 162 int rval = 0; 163 164 if (argc < 2) 165 usage(NULL); 166 167 while ((ch = getopt(argc, argv, "nqdtv")) != -1) 168 switch(ch) { 169 case 'n': 170 nflag = 1; 171 break; 172 case 'q': 173 qflag = 1; 174 break; 175 case 'v': 176 verbose = 1; 177 break; 178 case 't': 179 tflag = 1; 180 break; 181 case 'd': 182 debugonly = 1; 183 break; 184 default: 185 usage(NULL); 186 } 187 argc -= optind; 188 argv += optind; 189 190 pid = getpid(); 191 uid = getuid(); 192 if (tflag) 193 s = open("/dev/null", O_WRONLY); 194 else 195 s = socket(PF_ROUTE, SOCK_RAW, 0); 196 if (s < 0) 197 quit("socket"); 198 if (*argv == NULL) 199 goto no_cmd; 200 switch (keyword(*argv)) { 201 case K_GET: 202 uid = 0; 203 /* FALLTHROUGH */ 204 case K_CHANGE: 205 case K_ADD: 206 case K_DELETE: 207 rval = newroute(argc, argv); 208 break; 209 case K_SHOW: 210 uid = 0; 211 show(argc, argv); 212 break; 213 case K_MONITOR: 214 monitor(); 215 break; 216 case K_FLUSH: 217 flushroutes(argc, argv); 218 break; 219 no_cmd: 220 default: 221 usage(*argv); 222 } 223 exit(rval); 224 } 225 226 /* 227 * Purge all entries in the routing tables not 228 * associated with network interfaces. 229 */ 230 void 231 flushroutes(argc, argv) 232 int argc; 233 char *argv[]; 234 { 235 size_t needed; 236 int mib[6], rlen, seqno; 237 char *buf = NULL, *next, *lim = NULL; 238 struct rt_msghdr *rtm; 239 struct sockaddr *sa; 240 241 if (uid) { 242 errno = EACCES; 243 quit("must be root to alter routing table"); 244 } 245 shutdown(s, 0); /* Don't want to read back our messages */ 246 if (argc > 1) { 247 argv++; 248 if (argc == 2 && **argv == '-') 249 switch (keyword(*argv + 1)) { 250 case K_INET: 251 af = AF_INET; 252 break; 253 #ifdef INET6 254 case K_INET6: 255 af = AF_INET6; 256 break; 257 #endif 258 case K_XNS: 259 af = AF_NS; 260 break; 261 case K_IPX: 262 af = AF_IPX; 263 break; 264 case K_LINK: 265 af = AF_LINK; 266 break; 267 case K_ISO: 268 case K_OSI: 269 af = AF_ISO; 270 break; 271 case K_X25: 272 af = AF_CCITT; 273 break; 274 default: 275 goto bad; 276 } else 277 bad: usage(*argv); 278 } 279 mib[0] = CTL_NET; 280 mib[1] = PF_ROUTE; 281 mib[2] = 0; /* protocol */ 282 mib[3] = 0; /* wildcard address family */ 283 mib[4] = NET_RT_DUMP; 284 mib[5] = 0; /* no flags */ 285 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0) 286 quit("route-sysctl-estimate"); 287 if (needed) { 288 if ((buf = malloc(needed)) == NULL) 289 quit("malloc"); 290 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0) 291 quit("actual retrieval of routing table"); 292 lim = buf + needed; 293 } 294 if (verbose) { 295 (void) printf("Examining routing table from sysctl\n"); 296 if (af) 297 printf("(address family %s)\n", (*argv + 1)); 298 } 299 if (buf == NULL) 300 return; 301 302 seqno = 0; /* ??? */ 303 for (next = buf; next < lim; next += rtm->rtm_msglen) { 304 rtm = (struct rt_msghdr *)next; 305 if (verbose) 306 print_rtmsg(rtm, rtm->rtm_msglen); 307 if ((rtm->rtm_flags & (RTF_GATEWAY|RTF_STATIC|RTF_LLINFO)) == 0) 308 continue; 309 sa = (struct sockaddr *)(rtm + 1); 310 if (af) { 311 if (sa->sa_family != af) 312 continue; 313 } 314 if (sa->sa_family == AF_KEY) 315 continue; /* Don't flush SPD */ 316 if (debugonly) 317 continue; 318 rtm->rtm_type = RTM_DELETE; 319 rtm->rtm_seq = seqno; 320 rlen = write(s, next, rtm->rtm_msglen); 321 if (rlen < (int)rtm->rtm_msglen) { 322 (void) fprintf(stderr, 323 "route: write to routing socket: %s\n", 324 strerror(errno)); 325 (void) printf("got only %d for rlen\n", rlen); 326 break; 327 } 328 seqno++; 329 if (qflag) 330 continue; 331 if (verbose) 332 print_rtmsg(rtm, rlen); 333 else { 334 struct sockaddr *sa = (struct sockaddr *)(rtm + 1); 335 (void) printf("%-20.20s ", rtm->rtm_flags & RTF_HOST ? 336 routename(sa) : netname(sa)); 337 sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa); 338 (void) printf("%-20.20s ", routename(sa)); 339 (void) printf("done\n"); 340 } 341 } 342 free(buf); 343 } 344 345 static char hexlist[] = "0123456789abcdef"; 346 347 char * 348 any_ntoa(sa) 349 const struct sockaddr *sa; 350 { 351 static char obuf[240]; 352 const char *in = sa->sa_data; 353 char *out = obuf; 354 int len = sa->sa_len; 355 356 *out++ = 'Q'; 357 do { 358 *out++ = hexlist[(*in >> 4) & 15]; 359 *out++ = hexlist[(*in++) & 15]; 360 *out++ = '.'; 361 } while (--len > 0 && (out + 3) < &obuf[sizeof obuf-1]); 362 out[-1] = '\0'; 363 return (obuf); 364 } 365 366 char * 367 routename(sa) 368 struct sockaddr *sa; 369 { 370 char *cp = NULL; 371 static char line[MAXHOSTNAMELEN]; 372 struct hostent *hp; 373 static char domain[MAXHOSTNAMELEN]; 374 static int first = 1; 375 char *ns_print(); 376 char *ipx_print(); 377 378 if (first) { 379 first = 0; 380 if (gethostname(domain, sizeof domain) == 0 && 381 (cp = strchr(domain, '.'))) 382 (void) strcpy(domain, cp + 1); 383 else 384 domain[0] = 0; 385 cp = NULL; 386 } 387 388 if (sa->sa_len == 0) 389 strcpy(line, "default"); 390 else switch (sa->sa_family) { 391 392 case AF_INET: 393 { struct in_addr in; 394 in = ((struct sockaddr_in *)sa)->sin_addr; 395 396 if (in.s_addr == INADDR_ANY || sa->sa_len < 4) 397 cp = "default"; 398 if (!cp && !nflag) { 399 if ((hp = gethostbyaddr((char *)&in.s_addr, 400 sizeof (in.s_addr), AF_INET)) != NULL) { 401 if ((cp = strchr(hp->h_name, '.')) && 402 !strcmp(cp + 1, domain)) 403 *cp = 0; 404 cp = hp->h_name; 405 } 406 } 407 strlcpy(line, cp ? cp : inet_ntoa(in), sizeof line); 408 break; 409 } 410 411 #ifdef INET6 412 case AF_INET6: 413 { 414 struct sockaddr_in6 sin6; 415 int niflags; 416 417 #ifdef NI_WITHSCOPEID 418 niflags = NI_WITHSCOPEID; 419 #else 420 niflags = 0; 421 #endif 422 if (nflag) 423 niflags |= NI_NUMERICHOST; 424 memset(&sin6, 0, sizeof(sin6)); 425 memcpy(&sin6, sa, sa->sa_len); 426 sin6.sin6_len = sizeof(struct sockaddr_in6); 427 sin6.sin6_family = AF_INET6; 428 #ifdef __KAME__ 429 if (sa->sa_len == sizeof(struct sockaddr_in6) && 430 (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) || 431 IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr)) && 432 sin6.sin6_scope_id == 0) { 433 sin6.sin6_scope_id = 434 ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]); 435 sin6.sin6_addr.s6_addr[2] = 0; 436 sin6.sin6_addr.s6_addr[3] = 0; 437 } 438 #endif 439 if (getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len, 440 line, sizeof(line), NULL, 0, niflags) != 0) 441 strncpy(line, "invalid", sizeof(line)); 442 break; 443 } 444 #endif 445 446 case AF_NS: 447 return (ns_print((struct sockaddr_ns *)sa)); 448 449 case AF_IPX: 450 return (ipx_print((struct sockaddr_ipx *)sa)); 451 452 case AF_LINK: 453 return (link_ntoa((struct sockaddr_dl *)sa)); 454 455 case AF_ISO: 456 (void) snprintf(line, sizeof line, "iso %s", 457 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr)); 458 break; 459 460 default: 461 (void) snprintf(line, sizeof line, "(%d) %s", 462 sa->sa_family, any_ntoa(sa)); 463 break; 464 } 465 return (line); 466 } 467 468 /* 469 * Return the name of the network whose address is given. 470 * The address is assumed to be that of a net or subnet, not a host. 471 */ 472 char * 473 netname(sa) 474 struct sockaddr *sa; 475 { 476 char *cp = NULL; 477 static char line[MAXHOSTNAMELEN]; 478 struct netent *np = 0; 479 in_addr_t net, mask, subnetshift; 480 char *ns_print(); 481 char *ipx_print(); 482 483 switch (sa->sa_family) { 484 485 case AF_INET: 486 { 487 struct in_addr in = ((struct sockaddr_in *)sa)->sin_addr; 488 489 in.s_addr = ntohl(in.s_addr); 490 if (in.s_addr == 0) 491 cp = "default"; 492 else if (!nflag) { 493 if (IN_CLASSA(in.s_addr)) { 494 mask = IN_CLASSA_NET; 495 subnetshift = 8; 496 } else if (IN_CLASSB(in.s_addr)) { 497 mask = IN_CLASSB_NET; 498 subnetshift = 8; 499 } else { 500 mask = IN_CLASSC_NET; 501 subnetshift = 4; 502 } 503 /* 504 * If there are more bits than the standard mask 505 * would suggest, subnets must be in use. 506 * Guess at the subnet mask, assuming reasonable 507 * width subnet fields. 508 */ 509 while (in.s_addr &~ mask) 510 mask = (int)mask >> subnetshift; 511 net = in.s_addr & mask; 512 while ((mask & 1) == 0) 513 mask >>= 1, net >>= 1; 514 np = getnetbyaddr(net, AF_INET); 515 if (np) 516 cp = np->n_name; 517 } 518 in = ((struct sockaddr_in *)sa)->sin_addr; 519 strlcpy(line, cp ? cp : inet_ntoa(in), sizeof line); 520 break; 521 } 522 523 #ifdef INET6 524 case AF_INET6: 525 { 526 struct sockaddr_in6 sin6; 527 int niflags; 528 529 #ifdef NI_WITHSCOPEID 530 niflags = NI_WITHSCOPEID; 531 #else 532 niflags = 0; 533 #endif 534 if (nflag) 535 niflags |= NI_NUMERICHOST; 536 memset(&sin6, 0, sizeof(sin6)); 537 memcpy(&sin6, sa, sa->sa_len); 538 sin6.sin6_len = sizeof(struct sockaddr_in6); 539 sin6.sin6_family = AF_INET6; 540 #ifdef __KAME__ 541 if (sa->sa_len == sizeof(struct sockaddr_in6) && 542 (IN6_IS_ADDR_LINKLOCAL(&sin6.sin6_addr) || 543 IN6_IS_ADDR_MC_LINKLOCAL(&sin6.sin6_addr)) && 544 sin6.sin6_scope_id == 0) { 545 sin6.sin6_scope_id = 546 ntohs(*(u_int16_t *)&sin6.sin6_addr.s6_addr[2]); 547 sin6.sin6_addr.s6_addr[2] = 0; 548 sin6.sin6_addr.s6_addr[3] = 0; 549 } 550 #endif 551 if (getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len, 552 line, sizeof(line), NULL, 0, niflags) != 0) 553 strncpy(line, "invalid", sizeof(line)); 554 break; 555 } 556 #endif 557 558 case AF_NS: 559 return (ns_print((struct sockaddr_ns *)sa)); 560 561 case AF_IPX: 562 return (ipx_print((struct sockaddr_ipx *)sa)); 563 564 case AF_LINK: 565 return (link_ntoa((struct sockaddr_dl *)sa)); 566 567 case AF_ISO: 568 (void) snprintf(line, sizeof line, "iso %s", 569 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr)); 570 break; 571 572 default: 573 snprintf(line, sizeof line, "af %d: %s", 574 sa->sa_family, any_ntoa(sa)); 575 break; 576 } 577 return (line); 578 } 579 580 void 581 set_metric(value, key) 582 char *value; 583 int key; 584 { 585 int flag = 0; 586 u_long noval, *valp = &noval; 587 588 switch (key) { 589 #define caseof(x, y, z) case x: valp = &rt_metrics.z; flag = y; break 590 caseof(K_MTU, RTV_MTU, rmx_mtu); 591 caseof(K_HOPCOUNT, RTV_HOPCOUNT, rmx_hopcount); 592 caseof(K_EXPIRE, RTV_EXPIRE, rmx_expire); 593 caseof(K_RECVPIPE, RTV_RPIPE, rmx_recvpipe); 594 caseof(K_SENDPIPE, RTV_SPIPE, rmx_sendpipe); 595 caseof(K_SSTHRESH, RTV_SSTHRESH, rmx_ssthresh); 596 caseof(K_RTT, RTV_RTT, rmx_rtt); 597 caseof(K_RTTVAR, RTV_RTTVAR, rmx_rttvar); 598 } 599 rtm_inits |= flag; 600 if (lockrest || locking) 601 rt_metrics.rmx_locks |= flag; 602 if (locking) 603 locking = 0; 604 *valp = atoi(value); 605 } 606 607 int 608 newroute(argc, argv) 609 int argc; 610 char **argv; 611 { 612 char *cmd, *dest = "", *gateway = "", *err; 613 int ishost = 0, ret = 0, attempts, oerrno, flags = RTF_STATIC; 614 int key; 615 struct hostent *hp = 0; 616 617 if (uid) { 618 errno = EACCES; 619 quit("must be root to alter routing table"); 620 } 621 cmd = argv[0]; 622 if (*cmd != 'g') 623 shutdown(s, 0); /* Don't want to read back our messages */ 624 while (--argc > 0) { 625 if (**(++argv)== '-') { 626 switch (key = keyword(1 + *argv)) { 627 case K_LINK: 628 af = AF_LINK; 629 aflen = sizeof(struct sockaddr_dl); 630 break; 631 case K_OSI: 632 case K_ISO: 633 af = AF_ISO; 634 aflen = sizeof(struct sockaddr_iso); 635 break; 636 case K_INET: 637 af = AF_INET; 638 aflen = sizeof(struct sockaddr_in); 639 break; 640 #ifdef INET6 641 case K_INET6: 642 af = AF_INET6; 643 aflen = sizeof(struct sockaddr_in6); 644 break; 645 #endif 646 case K_X25: 647 af = AF_CCITT; 648 aflen = sizeof(struct sockaddr_x25); 649 break; 650 case K_SA: 651 af = PF_ROUTE; 652 aflen = sizeof(union sockunion); 653 break; 654 case K_XNS: 655 af = AF_NS; 656 aflen = sizeof(struct sockaddr_ns); 657 break; 658 case K_IPX: 659 af = AF_IPX; 660 aflen = sizeof(struct sockaddr_ipx); 661 break; 662 case K_IFACE: 663 case K_INTERFACE: 664 iflag++; 665 break; 666 case K_NOSTATIC: 667 flags &= ~RTF_STATIC; 668 break; 669 case K_LLINFO: 670 flags |= RTF_LLINFO; 671 break; 672 case K_LOCK: 673 locking = 1; 674 break; 675 case K_LOCKREST: 676 lockrest = 1; 677 break; 678 case K_HOST: 679 forcehost++; 680 break; 681 case K_REJECT: 682 flags |= RTF_REJECT; 683 break; 684 case K_BLACKHOLE: 685 flags |= RTF_BLACKHOLE; 686 break; 687 case K_PROTO1: 688 flags |= RTF_PROTO1; 689 break; 690 case K_PROTO2: 691 flags |= RTF_PROTO2; 692 break; 693 case K_CLONING: 694 flags |= RTF_CLONING; 695 break; 696 case K_XRESOLVE: 697 flags |= RTF_XRESOLVE; 698 break; 699 case K_STATIC: 700 flags |= RTF_STATIC; 701 break; 702 case K_IFA: 703 if (!--argc) 704 usage(1+*argv); 705 (void) getaddr(RTA_IFA, *++argv, 0); 706 break; 707 case K_IFP: 708 if (!--argc) 709 usage(1+*argv); 710 (void) getaddr(RTA_IFP, *++argv, 0); 711 break; 712 case K_GENMASK: 713 if (!--argc) 714 usage(1+*argv); 715 (void) getaddr(RTA_GENMASK, *++argv, 0); 716 break; 717 case K_GATEWAY: 718 if (!--argc) 719 usage(1+*argv); 720 (void) getaddr(RTA_GATEWAY, *++argv, 0); 721 break; 722 case K_DST: 723 if (!--argc) 724 usage(1+*argv); 725 ishost = getaddr(RTA_DST, *++argv, &hp); 726 dest = *argv; 727 break; 728 case K_NETMASK: 729 if (!--argc) 730 usage(1+*argv); 731 (void) getaddr(RTA_NETMASK, *++argv, 0); 732 /* FALLTHROUGH */ 733 case K_NET: 734 forcenet++; 735 break; 736 #ifdef INET6 737 case K_PREFIXLEN: 738 argc--; 739 if (prefixlen(*++argv) == 128) { 740 forcenet = 0; 741 ishost = 1; 742 } else { 743 forcenet = 1; 744 ishost = 0; 745 } 746 break; 747 #endif 748 case K_MTU: 749 case K_HOPCOUNT: 750 case K_EXPIRE: 751 case K_RECVPIPE: 752 case K_SENDPIPE: 753 case K_SSTHRESH: 754 case K_RTT: 755 case K_RTTVAR: 756 if (!--argc) 757 usage(1+*argv); 758 set_metric(*++argv, key); 759 break; 760 default: 761 usage(1+*argv); 762 } 763 } else { 764 if ((rtm_addrs & RTA_DST) == 0) { 765 dest = *argv; 766 ishost = getaddr(RTA_DST, *argv, &hp); 767 } else if ((rtm_addrs & RTA_GATEWAY) == 0) { 768 gateway = *argv; 769 (void) getaddr(RTA_GATEWAY, *argv, &hp); 770 } else { 771 int hops = atoi(*argv); 772 773 if (hops == 0) { 774 if (!qflag && strcmp(*argv, "0") == 0) 775 printf("%s,%s", 776 "old usage of trailing 0", 777 "assuming route to if\n"); 778 else 779 usage(NULL); 780 iflag = 1; 781 continue; 782 } else if (hops > 0 && hops < 10) { 783 if (!qflag) { 784 printf("old usage of trailing digit, "); 785 printf("assuming route via gateway\n"); 786 } 787 iflag = 0; 788 continue; 789 } 790 (void) getaddr(RTA_NETMASK, *argv, 0); 791 } 792 } 793 } 794 if (forcehost) 795 ishost = 1; 796 if (forcenet) 797 ishost = 0; 798 flags |= RTF_UP; 799 if (ishost) 800 flags |= RTF_HOST; 801 if (iflag == 0) 802 flags |= RTF_GATEWAY; 803 for (attempts = 1; ; attempts++) { 804 errno = 0; 805 if ((ret = rtmsg(*cmd, flags)) == 0) 806 break; 807 if (errno != ENETUNREACH && errno != ESRCH) 808 break; 809 if (af == AF_INET && *gateway && hp && hp->h_addr_list[1]) { 810 hp->h_addr_list++; 811 memcpy(&so_gate.sin.sin_addr, hp->h_addr_list[0], 812 hp->h_length); 813 } else 814 break; 815 } 816 if (*cmd == 'g') 817 exit(0); 818 oerrno = errno; 819 if (!qflag) { 820 (void) printf("%s %s %s", cmd, ishost? "host" : "net", dest); 821 if (*gateway) { 822 (void) printf(": gateway %s", gateway); 823 if (attempts > 1 && ret == 0 && af == AF_INET) 824 (void) printf(" (%s)", 825 inet_ntoa(so_gate.sin.sin_addr)); 826 } 827 if (ret == 0) 828 (void) printf("\n"); 829 } 830 if (ret != 0) { 831 switch (oerrno) { 832 case ESRCH: 833 err = "not in table"; 834 break; 835 case EBUSY: 836 err = "entry in use"; 837 break; 838 case ENOBUFS: 839 err = "routing table overflow"; 840 break; 841 default: 842 err = strerror(oerrno); 843 break; 844 } 845 (void) printf(": %s\n", err); 846 } 847 return (ret != 0); 848 } 849 850 void 851 inet_makenetandmask(net, sin, bits) 852 u_int32_t net; 853 struct sockaddr_in *sin; 854 int bits; 855 { 856 u_int32_t addr, mask = 0; 857 char *cp; 858 859 rtm_addrs |= RTA_NETMASK; 860 if (net == 0) 861 mask = addr = 0; 862 else if (bits) { 863 addr = net; 864 mask = 0xffffffff << (32 - bits); 865 } else if (net < 128) { 866 addr = net << IN_CLASSA_NSHIFT; 867 mask = IN_CLASSA_NET; 868 } else if (net < 65536) { 869 addr = net << IN_CLASSB_NSHIFT; 870 mask = IN_CLASSB_NET; 871 } else if (net < 16777216L) { 872 addr = net << IN_CLASSC_NSHIFT; 873 mask = IN_CLASSC_NET; 874 } else { 875 addr = net; 876 if ((addr & IN_CLASSA_HOST) == 0) 877 mask = IN_CLASSA_NET; 878 else if ((addr & IN_CLASSB_HOST) == 0) 879 mask = IN_CLASSB_NET; 880 else if ((addr & IN_CLASSC_HOST) == 0) 881 mask = IN_CLASSC_NET; 882 else 883 mask = -1; 884 } 885 sin->sin_addr.s_addr = htonl(addr); 886 sin = &so_mask.sin; 887 sin->sin_addr.s_addr = htonl(mask); 888 sin->sin_len = 0; 889 sin->sin_family = 0; 890 cp = (char *)(&sin->sin_addr + 1); 891 while (*--cp == 0 && cp > (char *)sin) 892 ; 893 sin->sin_len = 1 + cp - (char *)sin; 894 } 895 896 #ifdef INET6 897 /* 898 * XXX the function may need more improvement... 899 */ 900 static void 901 inet6_makenetandmask(sin6) 902 struct sockaddr_in6 *sin6; 903 { 904 char *plen = NULL; 905 struct in6_addr in6; 906 907 if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr) && 908 sin6->sin6_scope_id == 0) { 909 plen = "0"; 910 } else if ((sin6->sin6_addr.s6_addr[0] & 0xe0) == 0x20) { 911 /* aggregatable global unicast - RFC2374 */ 912 memset(&in6, 0, sizeof(in6)); 913 if (!memcmp(&sin6->sin6_addr.s6_addr[8], &in6.s6_addr[8], 8)) 914 plen = "64"; 915 else 916 plen = "128"; 917 } 918 919 if (plen) { 920 rtm_addrs |= RTA_NETMASK; 921 prefixlen(plen); 922 } 923 } 924 #endif 925 926 /* 927 * Interpret an argument as a network address of some kind, 928 * returning 1 if a host address, 0 if a network address. 929 */ 930 int 931 getaddr(which, s, hpp) 932 int which; 933 char *s; 934 struct hostent **hpp; 935 { 936 sup su = NULL; 937 struct ns_addr ns_addr(); 938 struct ipx_addr ipx_addr(); 939 struct iso_addr *iso_addr(); 940 struct ccitt_addr *ccitt_addr(); 941 struct hostent *hp; 942 struct netent *np; 943 u_long val; 944 char *q, qs; 945 int afamily; 946 947 if (af == 0) { 948 af = AF_INET; 949 aflen = sizeof(struct sockaddr_in); 950 } 951 afamily = af; /* local copy of af so we can change it */ 952 rtm_addrs |= which; 953 switch (which) { 954 case RTA_DST: 955 su = &so_dst; 956 break; 957 case RTA_GATEWAY: 958 su = &so_gate; 959 break; 960 case RTA_NETMASK: 961 su = &so_mask; 962 break; 963 case RTA_GENMASK: 964 su = &so_genmask; 965 break; 966 case RTA_IFP: 967 su = &so_ifp; 968 afamily = AF_LINK; 969 break; 970 case RTA_IFA: 971 su = &so_ifa; 972 su->sa.sa_family = af; 973 break; 974 default: 975 usage("Internal Error"); 976 /*NOTREACHED*/ 977 } 978 su->sa.sa_len = aflen; 979 su->sa.sa_family = afamily; /* cases that don't want it have left already */ 980 if (strcmp(s, "default") == 0) { 981 switch (which) { 982 case RTA_DST: 983 forcenet++; 984 (void) getaddr(RTA_NETMASK, s, 0); 985 break; 986 case RTA_NETMASK: 987 case RTA_GENMASK: 988 su->sa.sa_len = 0; 989 } 990 return (0); 991 } 992 switch (afamily) { 993 #ifdef INET6 994 case AF_INET6: 995 { 996 struct addrinfo hints, *res; 997 998 memset(&hints, 0, sizeof(hints)); 999 hints.ai_family = afamily; /*AF_INET6*/ 1000 hints.ai_flags = AI_NUMERICHOST; 1001 hints.ai_socktype = SOCK_DGRAM; /*dummy*/ 1002 if (getaddrinfo(s, "0", &hints, &res) != 0 || 1003 res->ai_family != AF_INET6 || 1004 res->ai_addrlen != sizeof(su->sin6)) { 1005 (void) fprintf(stderr, "%s: bad value\n", s); 1006 exit(1); 1007 } 1008 memcpy(&su->sin6, res->ai_addr, sizeof(su->sin6)); 1009 #ifdef __KAME__ 1010 if ((IN6_IS_ADDR_LINKLOCAL(&su->sin6.sin6_addr) || 1011 IN6_IS_ADDR_MC_LINKLOCAL(&su->sin6.sin6_addr)) && 1012 su->sin6.sin6_scope_id) { 1013 *(u_int16_t *)&su->sin6.sin6_addr.s6_addr[2] = 1014 htons(su->sin6.sin6_scope_id); 1015 su->sin6.sin6_scope_id = 0; 1016 } 1017 #endif 1018 if (which == RTA_DST) 1019 inet6_makenetandmask(&su->sin6); 1020 freeaddrinfo(res); 1021 return (0); 1022 } 1023 #endif 1024 1025 case AF_NS: 1026 if (which == RTA_DST) { 1027 extern short ns_bh[3]; 1028 struct sockaddr_ns *sms = &(so_mask.sns); 1029 memset(sms, 0, sizeof(*sms)); 1030 sms->sns_family = 0; 1031 sms->sns_len = 6; 1032 sms->sns_addr.x_net = *(union ns_net *)ns_bh; 1033 rtm_addrs |= RTA_NETMASK; 1034 } 1035 su->sns.sns_addr = ns_addr(s); 1036 return (!ns_nullhost(su->sns.sns_addr)); 1037 1038 case AF_IPX: 1039 if (which == RTA_DST) { 1040 extern short ipx_bh[3]; 1041 struct sockaddr_ipx *sms = &(so_mask.sipx); 1042 memset(sms, 0, sizeof(*sms)); 1043 sms->sipx_family = 0; 1044 sms->sipx_len = 6; 1045 sms->sipx_addr.ipx_net = *(union ipx_net *)ipx_bh; 1046 rtm_addrs |= RTA_NETMASK; 1047 } 1048 su->sipx.sipx_addr = ipx_addr(s); 1049 return (!ipx_nullhost(su->sipx.sipx_addr)); 1050 1051 case AF_OSI: 1052 su->siso.siso_addr = *iso_addr(s); 1053 if (which == RTA_NETMASK || which == RTA_GENMASK) { 1054 char *cp = (char *)TSEL(&su->siso); 1055 su->siso.siso_nlen = 0; 1056 do { 1057 --cp; 1058 } while ((cp > (char *)su) && (*cp == 0)); 1059 su->siso.siso_len = 1 + cp - (char *)su; 1060 } 1061 return (1); 1062 1063 case AF_LINK: 1064 link_addr(s, &su->sdl); 1065 return (1); 1066 1067 case AF_CCITT: 1068 ccitt_addr(s, &su->sx25); 1069 return (which == RTA_DST ? x25_makemask() : 1); 1070 1071 case PF_ROUTE: 1072 su->sa.sa_len = sizeof(*su); 1073 sockaddr(s, &su->sa); 1074 return (1); 1075 1076 case AF_INET: 1077 default: 1078 break; 1079 } 1080 1081 if (hpp == NULL) 1082 hpp = &hp; 1083 *hpp = NULL; 1084 1085 q = strchr(s,'/'); 1086 if (q && which == RTA_DST) { 1087 qs = *q; 1088 *q = '\0'; 1089 val = inet_addr(s); 1090 if (val != INADDR_NONE) { 1091 inet_makenetandmask(htonl(val), &su->sin, 1092 strtoul(q+1, 0, 0)); 1093 return (0); 1094 } 1095 *q =qs; 1096 } 1097 if (((val = inet_addr(s)) != INADDR_NONE) && 1098 (which != RTA_DST || forcenet == 0)) { 1099 su->sin.sin_addr.s_addr = val; 1100 if (inet_lnaof(su->sin.sin_addr) != INADDR_ANY) 1101 return (1); 1102 else { 1103 val = ntohl(val); 1104 goto netdone; 1105 } 1106 } 1107 if ((val = inet_network(s)) != INADDR_NONE || 1108 (forcehost == 0 && (np = getnetbyname(s)) != NULL && 1109 (val = np->n_net) != 0)) { 1110 netdone: 1111 if (which == RTA_DST) 1112 inet_makenetandmask(val, &su->sin, 0); 1113 return (0); 1114 } 1115 hp = gethostbyname(s); 1116 if (hp) { 1117 *hpp = hp; 1118 su->sin.sin_family = hp->h_addrtype; 1119 memcpy(&su->sin.sin_addr, hp->h_addr, hp->h_length); 1120 return (1); 1121 } 1122 (void) fprintf(stderr, "route: %s: bad value\n", s); 1123 exit(1); 1124 } 1125 1126 #ifdef INET6 1127 int 1128 prefixlen(s) 1129 char *s; 1130 { 1131 int len = atoi(s), q, r; 1132 1133 rtm_addrs |= RTA_NETMASK; 1134 if (len < -1 || len > 129) { 1135 (void) fprintf(stderr, "%s: bad value\n", s); 1136 exit(1); 1137 } 1138 1139 q = len >> 3; 1140 r = len & 7; 1141 so_mask.sin6.sin6_family = AF_INET6; 1142 so_mask.sin6.sin6_len = sizeof(struct sockaddr_in6); 1143 memset((void *)&so_mask.sin6.sin6_addr, 0, 1144 sizeof(so_mask.sin6.sin6_addr)); 1145 if (q > 0) 1146 memset((void *)&so_mask.sin6.sin6_addr, 0xff, q); 1147 if (r > 0) 1148 *((u_char *)&so_mask.sin6.sin6_addr + q) = (0xff00 >> r) & 0xff; 1149 return (len); 1150 } 1151 #endif 1152 1153 int 1154 x25_makemask() 1155 { 1156 char *cp; 1157 1158 if ((rtm_addrs & RTA_NETMASK) == 0) { 1159 rtm_addrs |= RTA_NETMASK; 1160 for (cp = (char *)&so_mask.sx25.x25_net; 1161 cp < &so_mask.sx25.x25_opts.op_flags; cp++) 1162 *cp = -1; 1163 so_mask.sx25.x25_len = (u_char)&(((sup)0)->sx25.x25_opts); 1164 } 1165 return (0); 1166 } 1167 1168 short ns_nullh[] = {0,0,0}; 1169 short ns_bh[] = {-1,-1,-1}; 1170 1171 char * 1172 ns_print(sns) 1173 struct sockaddr_ns *sns; 1174 { 1175 struct ns_addr work; 1176 union { union ns_net net_e; u_int32_t long_e; } net; 1177 u_short port; 1178 static char mybuf[50+MAXHOSTNAMELEN]; 1179 char cport[10], chost[25]; 1180 char *host = ""; 1181 u_char *q; 1182 1183 work = sns->sns_addr; 1184 port = ntohs(work.x_port); 1185 work.x_port = 0; 1186 net.net_e = work.x_net; 1187 if (ns_nullhost(work) && net.long_e == 0) { 1188 if (!port) 1189 return ("*.*"); 1190 (void) sprintf(mybuf, "*.0x%x", port); 1191 return (mybuf); 1192 } 1193 1194 if (memcmp(ns_bh, work.x_host.c_host, 6) == 0) 1195 host = "any"; 1196 else if (memcmp(ns_nullh, work.x_host.c_host, 6) == 0) 1197 host = "*"; 1198 else { 1199 q = work.x_host.c_host; 1200 (void) sprintf(chost, "0x%02x%02x%02x%02x%02x%02x", 1201 q[0], q[1], q[2], q[3], q[4], q[5]); 1202 host = chost; 1203 } 1204 if (port) 1205 (void) sprintf(cport, ".0x%x", htons(port)); 1206 else 1207 *cport = '\0'; 1208 1209 (void) snprintf(mybuf, sizeof mybuf, "0x%x.%s%s", 1210 ntohl(net.long_e), host, cport); 1211 return (mybuf); 1212 } 1213 1214 short ipx_nullh[] = {0,0,0}; 1215 short ipx_bh[] = {-1,-1,-1}; 1216 1217 char * 1218 ipx_print(sipx) 1219 struct sockaddr_ipx *sipx; 1220 { 1221 struct ipx_addr work; 1222 union { union ipx_net net_e; u_int32_t long_e; } net; 1223 u_short port; 1224 static char mybuf[50+MAXHOSTNAMELEN], cport[10], chost[25]; 1225 char *host = ""; 1226 char *p; 1227 u_char *q; 1228 1229 work = sipx->sipx_addr; 1230 port = ntohs(work.ipx_port); 1231 work.ipx_port = 0; 1232 net.net_e = work.ipx_net; 1233 if (ipx_nullhost(work) && net.long_e == 0) { 1234 if (!port) 1235 return ("*.*"); 1236 (void) sprintf(mybuf, "*.0x%XH", port); 1237 return (mybuf); 1238 } 1239 1240 if (memcmp(ipx_bh, work.ipx_host.c_host, 6) == 0) 1241 host = "any"; 1242 else if (memcmp(ipx_nullh, work.ipx_host.c_host, 6) == 0) 1243 host = "*"; 1244 else { 1245 q = work.ipx_host.c_host; 1246 (void) sprintf(chost, "%02X%02X%02X%02X%02X%02XH", 1247 q[0], q[1], q[2], q[3], q[4], q[5]); 1248 for (p = chost; *p == '0' && p < chost + 12; p++) 1249 /* void */; 1250 host = p; 1251 } 1252 if (port) 1253 (void) sprintf(cport, ".%XH", htons(port)); 1254 else 1255 *cport = 0; 1256 1257 (void) snprintf(mybuf, sizeof mybuf, "%XH.%s%s", 1258 ntohl(net.long_e), host, cport); 1259 return (mybuf); 1260 } 1261 1262 void 1263 interfaces() 1264 { 1265 size_t needed; 1266 int mib[6]; 1267 char *buf = NULL, *lim, *next; 1268 struct rt_msghdr *rtm; 1269 1270 mib[0] = CTL_NET; 1271 mib[1] = PF_ROUTE; 1272 mib[2] = 0; /* protocol */ 1273 mib[3] = 0; /* wildcard address family */ 1274 mib[4] = NET_RT_IFLIST; 1275 mib[5] = 0; /* no flags */ 1276 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0) 1277 quit("route-sysctl-estimate"); 1278 if (needed) { 1279 if ((buf = malloc(needed)) == NULL) 1280 quit("malloc"); 1281 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0) 1282 quit("actual retrieval of interface table"); 1283 lim = buf + needed; 1284 for (next = buf; next < lim; next += rtm->rtm_msglen) { 1285 rtm = (struct rt_msghdr *)next; 1286 print_rtmsg(rtm, rtm->rtm_msglen); 1287 } 1288 free(buf); 1289 } 1290 } 1291 1292 void 1293 monitor() 1294 { 1295 int n; 1296 char msg[2048]; 1297 1298 verbose = 1; 1299 if (debugonly) { 1300 interfaces(); 1301 exit(0); 1302 } 1303 for(;;) { 1304 time_t now; 1305 n = read(s, msg, 2048); 1306 now = time(NULL); 1307 (void) printf("got message of size %d on %s", n, ctime(&now)); 1308 print_rtmsg((struct rt_msghdr *)msg, n); 1309 } 1310 } 1311 1312 struct { 1313 struct rt_msghdr m_rtm; 1314 char m_space[512]; 1315 } m_rtmsg; 1316 1317 int 1318 rtmsg(cmd, flags) 1319 int cmd, flags; 1320 { 1321 static int seq; 1322 int rlen; 1323 char *cp = m_rtmsg.m_space; 1324 int l; 1325 1326 #define NEXTADDR(w, u) \ 1327 if (rtm_addrs & (w)) {\ 1328 l = ROUNDUP(u.sa.sa_len); memcpy(cp, &(u), l); cp += l;\ 1329 if (verbose) sodump(&(u),"u");\ 1330 } 1331 1332 errno = 0; 1333 memset(&m_rtmsg, 0, sizeof(m_rtmsg)); 1334 if (cmd == 'a') 1335 cmd = RTM_ADD; 1336 else if (cmd == 'c') 1337 cmd = RTM_CHANGE; 1338 else if (cmd == 'g') { 1339 cmd = RTM_GET; 1340 if (so_ifp.sa.sa_family == 0) { 1341 so_ifp.sa.sa_family = AF_LINK; 1342 so_ifp.sa.sa_len = sizeof(struct sockaddr_dl); 1343 rtm_addrs |= RTA_IFP; 1344 } 1345 } else 1346 cmd = RTM_DELETE; 1347 #define rtm m_rtmsg.m_rtm 1348 rtm.rtm_type = cmd; 1349 rtm.rtm_flags = flags; 1350 rtm.rtm_version = RTM_VERSION; 1351 rtm.rtm_seq = ++seq; 1352 rtm.rtm_addrs = rtm_addrs; 1353 rtm.rtm_rmx = rt_metrics; 1354 rtm.rtm_inits = rtm_inits; 1355 1356 if (rtm_addrs & RTA_NETMASK) 1357 mask_addr(); 1358 NEXTADDR(RTA_DST, so_dst); 1359 NEXTADDR(RTA_GATEWAY, so_gate); 1360 NEXTADDR(RTA_NETMASK, so_mask); 1361 NEXTADDR(RTA_GENMASK, so_genmask); 1362 NEXTADDR(RTA_IFP, so_ifp); 1363 NEXTADDR(RTA_IFA, so_ifa); 1364 rtm.rtm_msglen = l = cp - (char *)&m_rtmsg; 1365 if (verbose) 1366 print_rtmsg(&rtm, l); 1367 if (debugonly) 1368 return (0); 1369 if ((rlen = write(s, (char *)&m_rtmsg, l)) < 0) { 1370 perror("writing to routing socket"); 1371 return (-1); 1372 } 1373 if (cmd == RTM_GET) { 1374 do { 1375 l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg)); 1376 } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid)); 1377 if (l < 0) 1378 (void) fprintf(stderr, 1379 "route: read from routing socket: %s\n", 1380 strerror(errno)); 1381 else 1382 print_getmsg(&rtm, l); 1383 } 1384 #undef rtm 1385 return (0); 1386 } 1387 1388 void 1389 mask_addr() 1390 { 1391 int olen = so_mask.sa.sa_len; 1392 char *cp1 = olen + (char *)&so_mask, *cp2; 1393 1394 for (so_mask.sa.sa_len = 0; cp1 > (char *)&so_mask; ) 1395 if (*--cp1 != 0) { 1396 so_mask.sa.sa_len = 1 + cp1 - (char *)&so_mask; 1397 break; 1398 } 1399 if ((rtm_addrs & RTA_DST) == 0) 1400 return; 1401 switch (so_dst.sa.sa_family) { 1402 case AF_NS: 1403 case AF_IPX: 1404 case AF_INET: 1405 #ifdef INET6 1406 case AF_INET6: 1407 #endif 1408 case AF_CCITT: 1409 case 0: 1410 return; 1411 case AF_ISO: 1412 olen = MIN(so_dst.siso.siso_nlen, 1413 MAX(so_mask.sa.sa_len - 6, 0)); 1414 break; 1415 } 1416 cp1 = so_mask.sa.sa_len + 1 + (char *)&so_dst; 1417 cp2 = so_dst.sa.sa_len + 1 + (char *)&so_dst; 1418 while (cp2 > cp1) 1419 *--cp2 = 0; 1420 cp2 = so_mask.sa.sa_len + 1 + (char *)&so_mask; 1421 while (cp1 > so_dst.sa.sa_data) 1422 *--cp1 &= *--cp2; 1423 switch (so_dst.sa.sa_family) { 1424 case AF_ISO: 1425 so_dst.siso.siso_nlen = olen; 1426 break; 1427 } 1428 } 1429 1430 char *msgtypes[] = { 1431 "", 1432 "RTM_ADD: Add Route", 1433 "RTM_DELETE: Delete Route", 1434 "RTM_CHANGE: Change Metrics or flags", 1435 "RTM_GET: Report Metrics", 1436 "RTM_LOSING: Kernel Suspects Partitioning", 1437 "RTM_REDIRECT: Told to use different route", 1438 "RTM_MISS: Lookup failed on this address", 1439 "RTM_LOCK: fix specified metrics", 1440 "RTM_OLDADD: caused by SIOCADDRT", 1441 "RTM_OLDDEL: caused by SIOCDELRT", 1442 "RTM_RESOLVE: Route created by cloning", 1443 "RTM_NEWADDR: address being added to iface", 1444 "RTM_DELADDR: address being removed from iface", 1445 "RTM_IFINFO: iface status change", 1446 0, 1447 }; 1448 1449 char metricnames[] = 1450 "\011pksent\010rttvar\7rtt\6ssthresh\5sendpipe\4recvpipe\3expire\2hopcount\1mtu"; 1451 char routeflags[] = 1452 "\1UP\2GATEWAY\3HOST\4REJECT\5DYNAMIC\6MODIFIED\7DONE\010MASK_PRESENT\011CLONING\012XRESOLVE\013LLINFO\014STATIC\017PROTO2\020PROTO1"; 1453 char ifnetflags[] = 1454 "\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5PTP\6NOTRAILERS\7RUNNING\010NOARP\011PPROMISC\012ALLMULTI\013OACTIVE\014SIMPLEX\015LINK0\016LINK1\017LINK2\020MULTICAST"; 1455 char addrnames[] = 1456 "\1DST\2GATEWAY\3NETMASK\4GENMASK\5IFP\6IFA\7AUTHOR\010BRD"; 1457 1458 void 1459 print_rtmsg(rtm, msglen) 1460 struct rt_msghdr *rtm; 1461 int msglen; 1462 { 1463 struct if_msghdr *ifm; 1464 struct ifa_msghdr *ifam; 1465 1466 if (verbose == 0) 1467 return; 1468 if (rtm->rtm_version != RTM_VERSION) { 1469 (void) printf("routing message version %d not understood\n", 1470 rtm->rtm_version); 1471 return; 1472 } 1473 (void)printf("%s: len %d, ", msgtypes[rtm->rtm_type], rtm->rtm_msglen); 1474 switch (rtm->rtm_type) { 1475 case RTM_IFINFO: 1476 ifm = (struct if_msghdr *)rtm; 1477 (void) printf("if# %d, flags:", ifm->ifm_index); 1478 bprintf(stdout, ifm->ifm_flags, ifnetflags); 1479 pmsg_addrs((char *)(ifm + 1), ifm->ifm_addrs); 1480 break; 1481 case RTM_NEWADDR: 1482 case RTM_DELADDR: 1483 ifam = (struct ifa_msghdr *)rtm; 1484 (void) printf("metric %d, flags:", ifam->ifam_metric); 1485 bprintf(stdout, ifam->ifam_flags, routeflags); 1486 pmsg_addrs((char *)(ifam + 1), ifam->ifam_addrs); 1487 break; 1488 default: 1489 (void) printf("pid: %d, seq %d, errno %d, flags:", 1490 rtm->rtm_pid, rtm->rtm_seq, rtm->rtm_errno); 1491 bprintf(stdout, rtm->rtm_flags, routeflags); 1492 pmsg_common(rtm); 1493 } 1494 } 1495 1496 void 1497 print_getmsg(rtm, msglen) 1498 struct rt_msghdr *rtm; 1499 int msglen; 1500 { 1501 struct sockaddr *dst = NULL, *gate = NULL, *mask = NULL; 1502 struct sockaddr_dl *ifp = NULL; 1503 struct sockaddr *sa; 1504 char *cp; 1505 int i; 1506 1507 (void) printf(" route to: %s\n", routename(&so_dst.sa)); 1508 if (rtm->rtm_version != RTM_VERSION) { 1509 (void)fprintf(stderr, 1510 "routing message version %d not understood\n", 1511 rtm->rtm_version); 1512 return; 1513 } 1514 if (rtm->rtm_msglen > msglen) { 1515 (void)fprintf(stderr, 1516 "message length mismatch, in packet %d, returned %d\n", 1517 rtm->rtm_msglen, msglen); 1518 } 1519 if (rtm->rtm_errno) { 1520 (void) fprintf(stderr, "RTM_GET: %s (errno %d)\n", 1521 strerror(rtm->rtm_errno), rtm->rtm_errno); 1522 return; 1523 } 1524 cp = ((char *)(rtm + 1)); 1525 if (rtm->rtm_addrs) 1526 for (i = 1; i; i <<= 1) 1527 if (i & rtm->rtm_addrs) { 1528 sa = (struct sockaddr *)cp; 1529 switch (i) { 1530 case RTA_DST: 1531 dst = sa; 1532 break; 1533 case RTA_GATEWAY: 1534 gate = sa; 1535 break; 1536 case RTA_NETMASK: 1537 mask = sa; 1538 break; 1539 case RTA_IFP: 1540 if (sa->sa_family == AF_LINK && 1541 ((struct sockaddr_dl *)sa)->sdl_nlen) 1542 ifp = (struct sockaddr_dl *)sa; 1543 break; 1544 } 1545 ADVANCE(cp, sa); 1546 } 1547 if (dst && mask) 1548 mask->sa_family = dst->sa_family; /* XXX */ 1549 if (dst) 1550 (void)printf("destination: %s\n", routename(dst)); 1551 if (mask) { 1552 int savenflag = nflag; 1553 1554 nflag = 1; 1555 (void)printf(" mask: %s\n", routename(mask)); 1556 nflag = savenflag; 1557 } 1558 if (gate && rtm->rtm_flags & RTF_GATEWAY) 1559 (void)printf(" gateway: %s\n", routename(gate)); 1560 if (ifp) 1561 (void)printf(" interface: %.*s\n", 1562 ifp->sdl_nlen, ifp->sdl_data); 1563 (void)printf(" flags: "); 1564 bprintf(stdout, rtm->rtm_flags, routeflags); 1565 1566 #define lock(f) ((rtm->rtm_rmx.rmx_locks & __CONCAT(RTV_,f)) ? 'L' : ' ') 1567 #define msec(u) (((u) + 500) / 1000) /* usec to msec */ 1568 1569 (void) printf("\n%s\n", "\ 1570 recvpipe sendpipe ssthresh rtt,msec rttvar hopcount mtu expire"); 1571 printf("%8d%c ", (int)rtm->rtm_rmx.rmx_recvpipe, lock(RPIPE)); 1572 printf("%8d%c ", (int)rtm->rtm_rmx.rmx_sendpipe, lock(SPIPE)); 1573 printf("%8d%c ", (int)rtm->rtm_rmx.rmx_ssthresh, lock(SSTHRESH)); 1574 printf("%8d%c ", (int)msec(rtm->rtm_rmx.rmx_rtt), lock(RTT)); 1575 printf("%8d%c ", (int)msec(rtm->rtm_rmx.rmx_rttvar), lock(RTTVAR)); 1576 printf("%8d%c ", (int)rtm->rtm_rmx.rmx_hopcount, lock(HOPCOUNT)); 1577 printf("%8d%c ", (int)rtm->rtm_rmx.rmx_mtu, lock(MTU)); 1578 if (rtm->rtm_rmx.rmx_expire) 1579 rtm->rtm_rmx.rmx_expire -= time(0); 1580 printf("%8d%c\n", (int)rtm->rtm_rmx.rmx_expire, lock(EXPIRE)); 1581 #undef lock 1582 #undef msec 1583 #define RTA_IGN (RTA_DST|RTA_GATEWAY|RTA_NETMASK|RTA_IFP|RTA_IFA|RTA_BRD) 1584 if (verbose) 1585 pmsg_common(rtm); 1586 else if (rtm->rtm_addrs &~ RTA_IGN) { 1587 (void) printf("sockaddrs: "); 1588 bprintf(stdout, rtm->rtm_addrs, addrnames); 1589 putchar('\n'); 1590 } 1591 #undef RTA_IGN 1592 } 1593 1594 void 1595 pmsg_common(rtm) 1596 struct rt_msghdr *rtm; 1597 { 1598 (void) printf("\nlocks: "); 1599 bprintf(stdout, rtm->rtm_rmx.rmx_locks, metricnames); 1600 (void) printf(" inits: "); 1601 bprintf(stdout, rtm->rtm_inits, metricnames); 1602 pmsg_addrs(((char *)(rtm + 1)), rtm->rtm_addrs); 1603 } 1604 1605 void 1606 pmsg_addrs(cp, addrs) 1607 char *cp; 1608 int addrs; 1609 { 1610 struct sockaddr *sa; 1611 int i; 1612 1613 if (addrs == 0) 1614 return; 1615 (void) printf("\nsockaddrs: "); 1616 bprintf(stdout, addrs, addrnames); 1617 (void) putchar('\n'); 1618 for (i = 1; i; i <<= 1) 1619 if (i & addrs) { 1620 sa = (struct sockaddr *)cp; 1621 (void) printf(" %s", routename(sa)); 1622 ADVANCE(cp, sa); 1623 } 1624 (void) putchar('\n'); 1625 (void) fflush(stdout); 1626 } 1627 1628 void 1629 bprintf(fp, b, s) 1630 FILE *fp; 1631 int b; 1632 u_char *s; 1633 { 1634 int i; 1635 int gotsome = 0; 1636 1637 if (b == 0) 1638 return; 1639 while ((i = *s++)) { 1640 if ((b & (1 << (i-1)))) { 1641 if (gotsome == 0) 1642 i = '<'; 1643 else 1644 i = ','; 1645 (void) putc(i, fp); 1646 gotsome = 1; 1647 for (; (i = *s) > 32; s++) 1648 (void) putc(i, fp); 1649 } else 1650 while (*s > 32) 1651 s++; 1652 } 1653 if (gotsome) 1654 (void) putc('>', fp); 1655 } 1656 1657 int 1658 keyword(cp) 1659 char *cp; 1660 { 1661 struct keytab *kt = keywords; 1662 1663 while (kt->kt_cp && strcmp(kt->kt_cp, cp)) 1664 kt++; 1665 return (kt->kt_i); 1666 } 1667 1668 void 1669 sodump(su, which) 1670 sup su; 1671 char *which; 1672 { 1673 #ifdef INET6 1674 char ntop_buf[NI_MAXHOST]; /*for inet_ntop()*/ 1675 #endif 1676 1677 switch (su->sa.sa_family) { 1678 case AF_LINK: 1679 (void) printf("%s: link %s; ", 1680 which, link_ntoa(&su->sdl)); 1681 break; 1682 case AF_ISO: 1683 (void) printf("%s: iso %s; ", 1684 which, iso_ntoa(&su->siso.siso_addr)); 1685 break; 1686 case AF_INET: 1687 (void) printf("%s: inet %s; ", 1688 which, inet_ntoa(su->sin.sin_addr)); 1689 break; 1690 #ifdef INET6 1691 case AF_INET6: 1692 (void) printf("%s: inet6 %s; ", 1693 which, inet_ntop(AF_INET6, &su->sin6.sin6_addr, 1694 ntop_buf, sizeof(ntop_buf))); 1695 break; 1696 #endif 1697 case AF_NS: 1698 (void) printf("%s: xns %s; ", 1699 which, ns_ntoa(su->sns.sns_addr)); 1700 break; 1701 case AF_IPX: 1702 (void) printf("%s: ipx %s; ", 1703 which, ipx_ntoa(su->sipx.sipx_addr)); 1704 break; 1705 } 1706 (void) fflush(stdout); 1707 } 1708 1709 /* States*/ 1710 #define VIRGIN 0 1711 #define GOTONE 1 1712 #define GOTTWO 2 1713 /* Inputs */ 1714 #define DIGIT (4*0) 1715 #define END (4*1) 1716 #define DELIM (4*2) 1717 1718 void 1719 sockaddr(addr, sa) 1720 char *addr; 1721 struct sockaddr *sa; 1722 { 1723 char *cp = (char *)sa; 1724 int size = sa->sa_len; 1725 char *cplim = cp + size; 1726 int byte = 0, state = VIRGIN, new = 0; 1727 1728 memset(cp, 0, size); 1729 cp++; 1730 do { 1731 if ((*addr >= '0') && (*addr <= '9')) { 1732 new = *addr - '0'; 1733 } else if ((*addr >= 'a') && (*addr <= 'f')) { 1734 new = *addr - 'a' + 10; 1735 } else if ((*addr >= 'A') && (*addr <= 'F')) { 1736 new = *addr - 'A' + 10; 1737 } else if (*addr == 0) 1738 state |= END; 1739 else 1740 state |= DELIM; 1741 addr++; 1742 switch (state /* | INPUT */) { 1743 case GOTTWO | DIGIT: 1744 *cp++ = byte; /*FALLTHROUGH*/ 1745 case VIRGIN | DIGIT: 1746 state = GOTONE; byte = new; continue; 1747 case GOTONE | DIGIT: 1748 state = GOTTWO; byte = new + (byte << 4); continue; 1749 default: /* | DELIM */ 1750 state = VIRGIN; *cp++ = byte; byte = 0; continue; 1751 case GOTONE | END: 1752 case GOTTWO | END: 1753 *cp++ = byte; /* FALLTHROUGH */ 1754 case VIRGIN | END: 1755 break; 1756 } 1757 break; 1758 } while (cp < cplim); 1759 sa->sa_len = cp - (char *)sa; 1760 } 1761