route.c revision 1.8 1 /*
2 * Copyright (c) 1983, 1989, 1991, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34 #ifndef lint
35 static char copyright[] =
36 "@(#) Copyright (c) 1983, 1989, 1991, 1993\n\
37 The Regents of the University of California. All rights reserved.\n";
38 #endif /* not lint */
39
40 #ifndef lint
41 /*static char sccsid[] = "from: @(#)route.c 8.3 (Berkeley) 3/19/94";*/
42 static char *rcsid = "$Id: route.c,v 1.8 1994/09/23 14:28:02 mycroft Exp $";
43 #endif /* not lint */
44
45 #include <sys/param.h>
46 #include <sys/file.h>
47 #include <sys/socket.h>
48 #include <sys/ioctl.h>
49 #include <sys/mbuf.h>
50 #include <sys/sysctl.h>
51
52 #include <net/if.h>
53 #include <net/route.h>
54 #include <net/if_dl.h>
55 #include <netinet/in.h>
56 #include <netns/ns.h>
57 #include <netiso/iso.h>
58 #include <netccitt/x25.h>
59 #include <arpa/inet.h>
60 #include <netdb.h>
61
62 #include <errno.h>
63 #include <unistd.h>
64 #include <stdio.h>
65 #include <ctype.h>
66 #include <stdlib.h>
67 #include <string.h>
68 #include <paths.h>
69
70 struct keytab {
71 char *kt_cp;
72 int kt_i;
73 } keywords[] = {
74 #include "keywords.h"
75 {0, 0}
76 };
77
78 struct ortentry route;
79 union sockunion {
80 struct sockaddr sa;
81 struct sockaddr_in sin;
82 struct sockaddr_ns sns;
83 struct sockaddr_iso siso;
84 struct sockaddr_dl sdl;
85 struct sockaddr_x25 sx25;
86 } so_dst, so_gate, so_mask, so_genmask, so_ifa, so_ifp;
87
88 typedef union sockunion *sup;
89 int pid, rtm_addrs, uid;
90 int s;
91 int forcehost, forcenet, doflush, nflag, af, qflag, tflag, keyword();
92 int iflag, verbose, aflen = sizeof (struct sockaddr_in);
93 int locking, lockrest, debugonly;
94 struct rt_metrics rt_metrics;
95 u_long rtm_inits;
96 struct in_addr inet_makeaddr();
97 char *routename(), *netname();
98 void flushroutes(), newroute(), monitor(), sockaddr(), sodump(), bprintf();
99 void print_getmsg(), print_rtmsg(), pmsg_common(), pmsg_addrs(), mask_addr();
100 int getaddr(), rtmsg(), x25_makemask();
101 extern char *inet_ntoa(), *iso_ntoa(), *link_ntoa();
102
103 __dead void
104 usage(cp)
105 char *cp;
106 {
107 if (cp)
108 (void) fprintf(stderr, "route: botched keyword: %s\n", cp);
109 (void) fprintf(stderr,
110 "usage: route [ -nqv ] cmd [[ -<qualifers> ] args ]\n");
111 exit(1);
112 /* NOTREACHED */
113 }
114
115 void
116 quit(s)
117 char *s;
118 {
119 int sverrno = errno;
120
121 (void) fprintf(stderr, "route: ");
122 if (s)
123 (void) fprintf(stderr, "%s: ", s);
124 (void) fprintf(stderr, "%s\n", strerror(sverrno));
125 exit(1);
126 /* NOTREACHED */
127 }
128
129 #define ROUNDUP(a) \
130 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
131 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
132
133 int
134 main(argc, argv)
135 int argc;
136 char **argv;
137 {
138 extern int optind;
139 int ch;
140
141 if (argc < 2)
142 usage((char *)NULL);
143
144 while ((ch = getopt(argc, argv, "nqdtv")) != EOF)
145 switch(ch) {
146 case 'n':
147 nflag = 1;
148 break;
149 case 'q':
150 qflag = 1;
151 break;
152 case 'v':
153 verbose = 1;
154 break;
155 case 't':
156 tflag = 1;
157 break;
158 case 'd':
159 debugonly = 1;
160 break;
161 case '?':
162 default:
163 usage((char *)NULL);
164 }
165 argc -= optind;
166 argv += optind;
167
168 pid = getpid();
169 uid = getuid();
170 if (tflag)
171 s = open("/dev/null", O_WRONLY, 0);
172 else
173 s = socket(PF_ROUTE, SOCK_RAW, 0);
174 if (s < 0)
175 quit("socket");
176 if (*argv)
177 switch (keyword(*argv)) {
178 case K_GET:
179 uid = 0;
180 /* FALLTHROUGH */
181
182 case K_CHANGE:
183 case K_ADD:
184 case K_DELETE:
185 newroute(argc, argv);
186 exit(0);
187 /* NOTREACHED */
188
189 case K_MONITOR:
190 monitor();
191 /* NOTREACHED */
192
193 case K_FLUSH:
194 flushroutes(argc, argv);
195 exit(0);
196 /* NOTREACHED */
197 }
198 usage(*argv);
199 /* NOTREACHED */
200 }
201
202 /*
203 * Purge all entries in the routing tables not
204 * associated with network interfaces.
205 */
206 void
207 flushroutes(argc, argv)
208 int argc;
209 char *argv[];
210 {
211 size_t needed;
212 int mib[6], rlen, seqno;
213 char *buf, *next, *lim;
214 register struct rt_msghdr *rtm;
215
216 if (uid) {
217 errno = EACCES;
218 quit("must be root to alter routing table");
219 }
220 shutdown(s, 0); /* Don't want to read back our messages */
221 if (argc > 1) {
222 argv++;
223 if (argc == 2 && **argv == '-')
224 switch (keyword(*argv + 1)) {
225 case K_INET:
226 af = AF_INET;
227 break;
228 case K_XNS:
229 af = AF_NS;
230 break;
231 case K_LINK:
232 af = AF_LINK;
233 break;
234 case K_ISO:
235 case K_OSI:
236 af = AF_ISO;
237 break;
238 case K_X25:
239 af = AF_CCITT;
240 default:
241 goto bad;
242 } else
243 bad: usage(*argv);
244 }
245 mib[0] = CTL_NET;
246 mib[1] = PF_ROUTE;
247 mib[2] = 0; /* protocol */
248 mib[3] = 0; /* wildcard address family */
249 mib[4] = NET_RT_DUMP;
250 mib[5] = 0; /* no flags */
251 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
252 quit("route-sysctl-estimate");
253 if ((buf = malloc(needed)) == NULL)
254 quit("malloc");
255 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
256 quit("actual retrieval of routing table");
257 lim = buf + needed;
258 if (verbose)
259 (void) printf("Examining routing table from sysctl\n");
260 seqno = 0; /* ??? */
261 for (next = buf; next < lim; next += rtm->rtm_msglen) {
262 rtm = (struct rt_msghdr *)next;
263 if (verbose)
264 print_rtmsg(rtm, rtm->rtm_msglen);
265 if ((rtm->rtm_flags & RTF_GATEWAY) == 0)
266 continue;
267 if (af) {
268 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
269
270 if (sa->sa_family != af)
271 continue;
272 }
273 if (debugonly)
274 continue;
275 rtm->rtm_type = RTM_DELETE;
276 rtm->rtm_seq = seqno;
277 rlen = write(s, next, rtm->rtm_msglen);
278 if (rlen < (int)rtm->rtm_msglen) {
279 (void) fprintf(stderr,
280 "route: write to routing socket: %s\n",
281 strerror(errno));
282 (void) printf("got only %d for rlen\n", rlen);
283 break;
284 }
285 seqno++;
286 if (qflag)
287 continue;
288 if (verbose)
289 print_rtmsg(rtm, rlen);
290 else {
291 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
292 (void) printf("%-20.20s ", rtm->rtm_flags & RTF_HOST ?
293 routename(sa) : netname(sa));
294 sa = (struct sockaddr *)(sa->sa_len + (char *)sa);
295 (void) printf("%-20.20s ", routename(sa));
296 (void) printf("done\n");
297 }
298 }
299 }
300
301 char *
302 routename(sa)
303 struct sockaddr *sa;
304 {
305 register char *cp;
306 static char line[50];
307 struct hostent *hp;
308 static char domain[MAXHOSTNAMELEN + 1];
309 static int first = 1;
310 char *ns_print();
311
312 if (first) {
313 first = 0;
314 if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
315 (cp = strchr(domain, '.')))
316 (void) strcpy(domain, cp + 1);
317 else
318 domain[0] = 0;
319 }
320
321 if (sa->sa_len == 0)
322 strcpy(line, "default");
323 else switch (sa->sa_family) {
324
325 case AF_INET:
326 { struct in_addr in;
327 in = ((struct sockaddr_in *)sa)->sin_addr;
328
329 cp = 0;
330 if (in.s_addr == INADDR_ANY || sa->sa_len < 4)
331 cp = "default";
332 if (cp == 0 && !nflag) {
333 hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
334 AF_INET);
335 if (hp) {
336 if ((cp = strchr(hp->h_name, '.')) &&
337 !strcmp(cp + 1, domain))
338 *cp = 0;
339 cp = hp->h_name;
340 }
341 }
342 if (cp)
343 strcpy(line, cp);
344 else {
345 #define C(x) ((x) & 0xff)
346 in.s_addr = ntohl(in.s_addr);
347 (void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
348 C(in.s_addr >> 16), C(in.s_addr >> 8), C(in.s_addr));
349 }
350 break;
351 }
352
353 case AF_NS:
354 return (ns_print((struct sockaddr_ns *)sa));
355
356 case AF_LINK:
357 return (link_ntoa((struct sockaddr_dl *)sa));
358
359 case AF_ISO:
360 (void) sprintf(line, "iso %s",
361 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
362 break;
363
364 default:
365 { u_short *s = (u_short *)sa;
366 u_short *slim = s + ((sa->sa_len + 1) >> 1);
367 char *cp = line + sprintf(line, "(%d)", sa->sa_family);
368
369 while (++s < slim) /* start with sa->sa_data */
370 cp += sprintf(cp, " %x", *s);
371 break;
372 }
373 }
374 return (line);
375 }
376
377 /*
378 * Return the name of the network whose address is given.
379 * The address is assumed to be that of a net or subnet, not a host.
380 */
381 char *
382 netname(sa)
383 struct sockaddr *sa;
384 {
385 char *cp = 0;
386 static char line[50];
387 struct netent *np = 0;
388 u_long net, mask;
389 register u_long i;
390 int subnetshift;
391 char *ns_print();
392
393 switch (sa->sa_family) {
394
395 case AF_INET:
396 { struct in_addr in;
397 in = ((struct sockaddr_in *)sa)->sin_addr;
398
399 i = in.s_addr = ntohl(in.s_addr);
400 if (in.s_addr == 0)
401 cp = "default";
402 else if (!nflag) {
403 if (IN_CLASSA(i)) {
404 mask = IN_CLASSA_NET;
405 subnetshift = 8;
406 } else if (IN_CLASSB(i)) {
407 mask = IN_CLASSB_NET;
408 subnetshift = 8;
409 } else {
410 mask = IN_CLASSC_NET;
411 subnetshift = 4;
412 }
413 /*
414 * If there are more bits than the standard mask
415 * would suggest, subnets must be in use.
416 * Guess at the subnet mask, assuming reasonable
417 * width subnet fields.
418 */
419 while (in.s_addr &~ mask)
420 mask = (long)mask >> subnetshift;
421 net = in.s_addr & mask;
422 while ((mask & 1) == 0)
423 mask >>= 1, net >>= 1;
424 np = getnetbyaddr(net, AF_INET);
425 if (np)
426 cp = np->n_name;
427 }
428 if (cp)
429 strcpy(line, cp);
430 else if ((in.s_addr & 0xffffff) == 0)
431 (void) sprintf(line, "%u", C(in.s_addr >> 24));
432 else if ((in.s_addr & 0xffff) == 0)
433 (void) sprintf(line, "%u.%u", C(in.s_addr >> 24),
434 C(in.s_addr >> 16));
435 else if ((in.s_addr & 0xff) == 0)
436 (void) sprintf(line, "%u.%u.%u", C(in.s_addr >> 24),
437 C(in.s_addr >> 16), C(in.s_addr >> 8));
438 else
439 (void) sprintf(line, "%u.%u.%u.%u", C(in.s_addr >> 24),
440 C(in.s_addr >> 16), C(in.s_addr >> 8),
441 C(in.s_addr));
442 break;
443 }
444
445 case AF_NS:
446 return (ns_print((struct sockaddr_ns *)sa));
447 break;
448
449 case AF_LINK:
450 return (link_ntoa((struct sockaddr_dl *)sa));
451
452 case AF_ISO:
453 (void) sprintf(line, "iso %s",
454 iso_ntoa(&((struct sockaddr_iso *)sa)->siso_addr));
455 break;
456
457 default:
458 { u_short *s = (u_short *)sa->sa_data;
459 u_short *slim = s + ((sa->sa_len + 1)>>1);
460 char *cp = line + sprintf(line, "af %d:", sa->sa_family);
461
462 while (s < slim)
463 cp += sprintf(cp, " %x", *s++);
464 break;
465 }
466 }
467 return (line);
468 }
469
470 void
471 set_metric(value, key)
472 char *value;
473 int key;
474 {
475 int flag = 0;
476 u_long noval, *valp = &noval;
477
478 switch (key) {
479 #define caseof(x, y, z) case x: valp = &rt_metrics.z; flag = y; break
480 caseof(K_MTU, RTV_MTU, rmx_mtu);
481 caseof(K_HOPCOUNT, RTV_HOPCOUNT, rmx_hopcount);
482 caseof(K_EXPIRE, RTV_EXPIRE, rmx_expire);
483 caseof(K_RECVPIPE, RTV_RPIPE, rmx_recvpipe);
484 caseof(K_SENDPIPE, RTV_SPIPE, rmx_sendpipe);
485 caseof(K_SSTHRESH, RTV_SSTHRESH, rmx_ssthresh);
486 caseof(K_RTT, RTV_RTT, rmx_rtt);
487 caseof(K_RTTVAR, RTV_RTTVAR, rmx_rttvar);
488 }
489 rtm_inits |= flag;
490 if (lockrest || locking)
491 rt_metrics.rmx_locks |= flag;
492 if (locking)
493 locking = 0;
494 *valp = atoi(value);
495 }
496
497 void
498 newroute(argc, argv)
499 int argc;
500 register char **argv;
501 {
502 char *cmd, *dest = "", *gateway = "", *err;
503 int ishost = 0, ret, attempts, oerrno, flags = RTF_STATIC;
504 int key;
505 struct hostent *hp = 0;
506
507 if (uid) {
508 errno = EACCES;
509 quit("must be root to alter routing table");
510 }
511 cmd = argv[0];
512 if (*cmd != 'g')
513 shutdown(s, 0); /* Don't want to read back our messages */
514 while (--argc > 0) {
515 if (**(++argv)== '-') {
516 switch (key = keyword(1 + *argv)) {
517 case K_LINK:
518 af = AF_LINK;
519 aflen = sizeof(struct sockaddr_dl);
520 break;
521 case K_OSI:
522 case K_ISO:
523 af = AF_ISO;
524 aflen = sizeof(struct sockaddr_iso);
525 break;
526 case K_INET:
527 af = AF_INET;
528 aflen = sizeof(struct sockaddr_in);
529 break;
530 case K_X25:
531 af = AF_CCITT;
532 aflen = sizeof(struct sockaddr_x25);
533 break;
534 case K_SA:
535 af = PF_ROUTE;
536 aflen = sizeof(union sockunion);
537 break;
538 case K_XNS:
539 af = AF_NS;
540 aflen = sizeof(struct sockaddr_ns);
541 break;
542 case K_IFACE:
543 case K_INTERFACE:
544 iflag++;
545 case K_NOSTATIC:
546 flags &= ~RTF_STATIC;
547 break;
548 case K_LOCK:
549 locking = 1;
550 break;
551 case K_LOCKREST:
552 lockrest = 1;
553 break;
554 case K_HOST:
555 forcehost++;
556 break;
557 case K_REJECT:
558 flags |= RTF_REJECT;
559 break;
560 case K_BLACKHOLE:
561 flags |= RTF_BLACKHOLE;
562 break;
563 case K_PROTO1:
564 flags |= RTF_PROTO1;
565 break;
566 case K_PROTO2:
567 flags |= RTF_PROTO2;
568 break;
569 case K_CLONING:
570 flags |= RTF_CLONING;
571 break;
572 case K_XRESOLVE:
573 flags |= RTF_XRESOLVE;
574 break;
575 case K_STATIC:
576 flags |= RTF_STATIC;
577 break;
578 case K_IFA:
579 argc--;
580 (void) getaddr(RTA_IFA, *++argv, 0);
581 break;
582 case K_IFP:
583 argc--;
584 (void) getaddr(RTA_IFP, *++argv, 0);
585 break;
586 case K_GENMASK:
587 argc--;
588 (void) getaddr(RTA_GENMASK, *++argv, 0);
589 break;
590 case K_GATEWAY:
591 argc--;
592 (void) getaddr(RTA_GATEWAY, *++argv, 0);
593 break;
594 case K_DST:
595 argc--;
596 ishost = getaddr(RTA_DST, *++argv, &hp);
597 dest = *argv;
598 break;
599 case K_NETMASK:
600 argc--;
601 (void) getaddr(RTA_NETMASK, *++argv, 0);
602 /* FALLTHROUGH */
603 case K_NET:
604 forcenet++;
605 break;
606 case K_MTU:
607 case K_HOPCOUNT:
608 case K_EXPIRE:
609 case K_RECVPIPE:
610 case K_SENDPIPE:
611 case K_SSTHRESH:
612 case K_RTT:
613 case K_RTTVAR:
614 argc--;
615 set_metric(*++argv, key);
616 break;
617 default:
618 usage(1+*argv);
619 }
620 } else {
621 if ((rtm_addrs & RTA_DST) == 0) {
622 dest = *argv;
623 ishost = getaddr(RTA_DST, *argv, &hp);
624 } else if ((rtm_addrs & RTA_GATEWAY) == 0) {
625 gateway = *argv;
626 (void) getaddr(RTA_GATEWAY, *argv, &hp);
627 } else {
628 int ret = atoi(*argv);
629
630 if (ret == 0) {
631 if (strcmp(*argv, "0") == 0)
632 printf("%s,%s",
633 "old usage of trailing 0",
634 "assuming route to if\n");
635 else
636 usage((char *)NULL);
637 iflag = 1;
638 continue;
639 } else if (ret > 0 && ret < 10) {
640 printf("old usage of trailing digit, ");
641 printf("assuming route via gateway\n");
642 iflag = 0;
643 continue;
644 }
645 (void) getaddr(RTA_NETMASK, *argv, 0);
646 }
647 }
648 }
649 if (forcehost)
650 ishost = 1;
651 if (forcenet)
652 ishost = 0;
653 flags |= RTF_UP;
654 if (ishost)
655 flags |= RTF_HOST;
656 if (iflag == 0)
657 flags |= RTF_GATEWAY;
658 for (attempts = 1; ; attempts++) {
659 errno = 0;
660 if ((ret = rtmsg(*cmd, flags)) == 0)
661 break;
662 if (errno != ENETUNREACH && errno != ESRCH)
663 break;
664 if (af == AF_INET && *gateway && hp && hp->h_addr_list[1]) {
665 hp->h_addr_list++;
666 memcpy(&so_gate.sin.sin_addr, hp->h_addr_list[0],
667 hp->h_length);
668 } else
669 break;
670 }
671 if (*cmd == 'g')
672 exit(0);
673 oerrno = errno;
674 (void) printf("%s %s %s", cmd, ishost? "host" : "net", dest);
675 if (*gateway) {
676 (void) printf(": gateway %s", gateway);
677 if (attempts > 1 && ret == 0 && af == AF_INET)
678 (void) printf(" (%s)",
679 inet_ntoa(((struct sockaddr_in *)&route.rt_gateway)->sin_addr));
680 }
681 if (ret == 0)
682 (void) printf("\n");
683 else {
684 switch (oerrno) {
685 case ESRCH:
686 err = "not in table";
687 break;
688 case EBUSY:
689 err = "entry in use";
690 break;
691 case ENOBUFS:
692 err = "routing table overflow";
693 break;
694 default:
695 err = strerror(oerrno);
696 break;
697 }
698 (void) printf(": %s\n", err);
699 }
700 }
701
702 void
703 inet_makenetandmask(net, sin)
704 u_long net;
705 register struct sockaddr_in *sin;
706 {
707 u_long addr, mask = 0;
708 register char *cp;
709
710 rtm_addrs |= RTA_NETMASK;
711 if (net == 0)
712 mask = addr = 0;
713 else if (net < 128) {
714 addr = net << IN_CLASSA_NSHIFT;
715 mask = IN_CLASSA_NET;
716 } else if (net < 65536) {
717 addr = net << IN_CLASSB_NSHIFT;
718 mask = IN_CLASSB_NET;
719 } else if (net < 16777216L) {
720 addr = net << IN_CLASSC_NSHIFT;
721 mask = IN_CLASSC_NET;
722 } else {
723 addr = net;
724 if ((addr & IN_CLASSA_HOST) == 0)
725 mask = IN_CLASSA_NET;
726 else if ((addr & IN_CLASSB_HOST) == 0)
727 mask = IN_CLASSB_NET;
728 else if ((addr & IN_CLASSC_HOST) == 0)
729 mask = IN_CLASSC_NET;
730 else
731 mask = -1;
732 }
733 sin->sin_addr.s_addr = htonl(addr);
734 sin = &so_mask.sin;
735 sin->sin_addr.s_addr = htonl(mask);
736 sin->sin_len = 0;
737 sin->sin_family = 0;
738 cp = (char *)(&sin->sin_addr + 1);
739 while (*--cp == 0 && cp > (char *)sin)
740 ;
741 sin->sin_len = 1 + cp - (char *)sin;
742 }
743
744 /*
745 * Interpret an argument as a network address of some kind,
746 * returning 1 if a host address, 0 if a network address.
747 */
748 int
749 getaddr(which, s, hpp)
750 int which;
751 char *s;
752 struct hostent **hpp;
753 {
754 register sup su;
755 struct ns_addr ns_addr();
756 struct iso_addr *iso_addr();
757 struct hostent *hp;
758 struct netent *np;
759 u_long val;
760
761 if (af == 0) {
762 af = AF_INET;
763 aflen = sizeof(struct sockaddr_in);
764 }
765 rtm_addrs |= which;
766 switch (which) {
767 case RTA_DST:
768 su = &so_dst;
769 su->sa.sa_family = af;
770 break;
771 case RTA_GATEWAY:
772 su = &so_gate;
773 su->sa.sa_family = af;
774 break;
775 case RTA_NETMASK:
776 su = &so_mask;
777 break;
778 case RTA_GENMASK:
779 su = &so_genmask;
780 break;
781 case RTA_IFP:
782 su = &so_ifp;
783 su->sa.sa_family = af;
784 break;
785 case RTA_IFA:
786 su = &so_ifa;
787 su->sa.sa_family = af;
788 break;
789 default:
790 usage("Internal Error");
791 /*NOTREACHED*/
792 }
793 su->sa.sa_len = aflen;
794 if (strcmp(s, "default") == 0) {
795 switch (which) {
796 case RTA_DST:
797 forcenet++;
798 (void) getaddr(RTA_NETMASK, s, 0);
799 break;
800 case RTA_NETMASK:
801 case RTA_GENMASK:
802 su->sa.sa_len = 0;
803 }
804 return (0);
805 }
806 switch (af) {
807 case AF_NS:
808 if (which == RTA_DST) {
809 extern short ns_bh[3];
810 struct sockaddr_ns *sms = &(so_mask.sns);
811 memset(sms, 0, sizeof(*sms));
812 sms->sns_family = 0;
813 sms->sns_len = 6;
814 sms->sns_addr.x_net = *(union ns_net *)ns_bh;
815 rtm_addrs |= RTA_NETMASK;
816 }
817 su->sns.sns_addr = ns_addr(s);
818 return (!ns_nullhost(su->sns.sns_addr));
819
820 case AF_OSI:
821 su->siso.siso_addr = *iso_addr(s);
822 if (which == RTA_NETMASK || which == RTA_GENMASK) {
823 register char *cp = (char *)TSEL(&su->siso);
824 su->siso.siso_nlen = 0;
825 do {--cp ;} while ((cp > (char *)su) && (*cp == 0));
826 su->siso.siso_len = 1 + cp - (char *)su;
827 }
828 return (1);
829
830 case AF_LINK:
831 link_addr(s, &su->sdl);
832 return (1);
833
834 case AF_CCITT:
835 ccitt_addr(s, &su->sx25);
836 return (which == RTA_DST ? x25_makemask() : 1);
837
838 case PF_ROUTE:
839 su->sa.sa_len = sizeof(*su);
840 sockaddr(s, &su->sa);
841 return (1);
842
843 case AF_INET:
844 default:
845 break;
846 }
847
848 if (hpp == NULL)
849 hpp = &hp;
850 *hpp = NULL;
851 if (((val = inet_addr(s)) != -1) &&
852 (which != RTA_DST || forcenet == 0)) {
853 su->sin.sin_addr.s_addr = val;
854 if (inet_lnaof(su->sin.sin_addr) != INADDR_ANY)
855 return (1);
856 else {
857 val = ntohl(val);
858 goto netdone;
859 }
860 }
861 if ((val = inet_network(s)) != -1 ||
862 ((np = getnetbyname(s)) != NULL && (val = np->n_net) != 0)) {
863 netdone:
864 if (which == RTA_DST)
865 inet_makenetandmask(val, &su->sin);
866 return (0);
867 }
868 hp = gethostbyname(s);
869 if (hp) {
870 *hpp = hp;
871 su->sin.sin_family = hp->h_addrtype;
872 memcpy(&su->sin.sin_addr, hp->h_addr, hp->h_length);
873 return (1);
874 }
875 (void) fprintf(stderr, "%s: bad value\n", s);
876 exit(1);
877 }
878
879 int
880 x25_makemask()
881 {
882 register char *cp;
883
884 if ((rtm_addrs & RTA_NETMASK) == 0) {
885 rtm_addrs |= RTA_NETMASK;
886 for (cp = (char *)&so_mask.sx25.x25_net;
887 cp < &so_mask.sx25.x25_opts.op_flags; cp++)
888 *cp = -1;
889 so_mask.sx25.x25_len = (u_char)&(((sup)0)->sx25.x25_opts);
890 }
891 return 0;
892 }
893
894 short ns_nullh[] = {0,0,0};
895 short ns_bh[] = {-1,-1,-1};
896
897 char *
898 ns_print(sns)
899 struct sockaddr_ns *sns;
900 {
901 struct ns_addr work;
902 union { union ns_net net_e; u_long long_e; } net;
903 u_short port;
904 static char mybuf[50], cport[10], chost[25];
905 char *host = "";
906 register char *p;
907 register u_char *q;
908
909 work = sns->sns_addr;
910 port = ntohs(work.x_port);
911 work.x_port = 0;
912 net.net_e = work.x_net;
913 if (ns_nullhost(work) && net.long_e == 0) {
914 if (!port)
915 return ("*.*");
916 (void) sprintf(mybuf, "*.%XH", port);
917 return (mybuf);
918 }
919
920 if (bcmp((char *)ns_bh, (char *)work.x_host.c_host, 6) == 0)
921 host = "any";
922 else if (bcmp((char *)ns_nullh, (char *)work.x_host.c_host, 6) == 0)
923 host = "*";
924 else {
925 q = work.x_host.c_host;
926 (void) sprintf(chost, "%02X%02X%02X%02X%02X%02XH",
927 q[0], q[1], q[2], q[3], q[4], q[5]);
928 for (p = chost; *p == '0' && p < chost + 12; p++)
929 /* void */;
930 host = p;
931 }
932 if (port)
933 (void) sprintf(cport, ".%XH", htons(port));
934 else
935 *cport = 0;
936
937 (void) sprintf(mybuf,"%XH.%s%s", ntohl(net.long_e), host, cport);
938 return (mybuf);
939 }
940
941 void
942 interfaces()
943 {
944 size_t needed;
945 int mib[6];
946 char *buf, *lim, *next;
947 register struct rt_msghdr *rtm;
948
949 mib[0] = CTL_NET;
950 mib[1] = PF_ROUTE;
951 mib[2] = 0; /* protocol */
952 mib[3] = 0; /* wildcard address family */
953 mib[4] = NET_RT_IFLIST;
954 mib[5] = 0; /* no flags */
955 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
956 quit("route-sysctl-estimate");
957 if ((buf = malloc(needed)) == NULL)
958 quit("malloc");
959 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
960 quit("actual retrieval of interface table");
961 lim = buf + needed;
962 for (next = buf; next < lim; next += rtm->rtm_msglen) {
963 rtm = (struct rt_msghdr *)next;
964 print_rtmsg(rtm, rtm->rtm_msglen);
965 }
966 }
967
968 void
969 monitor()
970 {
971 int n;
972 char msg[2048];
973
974 verbose = 1;
975 if (debugonly) {
976 interfaces();
977 exit(0);
978 }
979 for(;;) {
980 n = read(s, msg, 2048);
981 (void) printf("got message of size %d\n", n);
982 print_rtmsg((struct rt_msghdr *)msg, n);
983 }
984 }
985
986 struct {
987 struct rt_msghdr m_rtm;
988 char m_space[512];
989 } m_rtmsg;
990
991 int
992 rtmsg(cmd, flags)
993 int cmd, flags;
994 {
995 static int seq;
996 int rlen;
997 register char *cp = m_rtmsg.m_space;
998 register int l;
999
1000 #define NEXTADDR(w, u) \
1001 if (rtm_addrs & (w)) {\
1002 l = ROUNDUP(u.sa.sa_len); memcpy(cp, &(u), l); cp += l;\
1003 if (verbose) sodump(&(u),"u");\
1004 }
1005
1006 errno = 0;
1007 memset(&m_rtmsg, 0, sizeof(m_rtmsg));
1008 if (cmd == 'a')
1009 cmd = RTM_ADD;
1010 else if (cmd == 'c')
1011 cmd = RTM_CHANGE;
1012 else if (cmd == 'g') {
1013 cmd = RTM_GET;
1014 if (so_ifp.sa.sa_family == 0) {
1015 so_ifp.sa.sa_family == AF_LINK;
1016 so_ifp.sa.sa_len == sizeof(struct sockaddr_dl);
1017 rtm_addrs |= RTA_IFP;
1018 }
1019 } else
1020 cmd = RTM_DELETE;
1021 #define rtm m_rtmsg.m_rtm
1022 rtm.rtm_type = cmd;
1023 rtm.rtm_flags = flags;
1024 rtm.rtm_version = RTM_VERSION;
1025 rtm.rtm_seq = ++seq;
1026 rtm.rtm_addrs = rtm_addrs;
1027 rtm.rtm_rmx = rt_metrics;
1028 rtm.rtm_inits = rtm_inits;
1029
1030 if (rtm_addrs & RTA_NETMASK)
1031 mask_addr();
1032 NEXTADDR(RTA_DST, so_dst);
1033 NEXTADDR(RTA_GATEWAY, so_gate);
1034 NEXTADDR(RTA_NETMASK, so_mask);
1035 NEXTADDR(RTA_GENMASK, so_genmask);
1036 NEXTADDR(RTA_IFP, so_ifp);
1037 NEXTADDR(RTA_IFA, so_ifa);
1038 rtm.rtm_msglen = l = cp - (char *)&m_rtmsg;
1039 if (verbose)
1040 print_rtmsg(&rtm, l);
1041 if (debugonly)
1042 return (0);
1043 if ((rlen = write(s, (char *)&m_rtmsg, l)) < 0) {
1044 perror("writing to routing socket");
1045 return (-1);
1046 }
1047 if (cmd == RTM_GET) {
1048 do {
1049 l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
1050 } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid));
1051 if (l < 0)
1052 (void) fprintf(stderr,
1053 "route: read from routing socket: %s\n",
1054 strerror(errno));
1055 else
1056 print_getmsg(&rtm, l);
1057 }
1058 #undef rtm
1059 return (0);
1060 }
1061
1062 void
1063 mask_addr()
1064 {
1065 int olen = so_mask.sa.sa_len;
1066 register char *cp1 = olen + (char *)&so_mask, *cp2;
1067
1068 for (so_mask.sa.sa_len = 0; cp1 > (char *)&so_mask; )
1069 if (*--cp1 != 0) {
1070 so_mask.sa.sa_len = 1 + cp1 - (char *)&so_mask;
1071 break;
1072 }
1073 if ((rtm_addrs & RTA_DST) == 0)
1074 return;
1075 switch (so_dst.sa.sa_family) {
1076 case AF_NS:
1077 case AF_INET:
1078 case AF_CCITT:
1079 case 0:
1080 return;
1081 case AF_ISO:
1082 olen = MIN(so_dst.siso.siso_nlen,
1083 MAX(so_mask.sa.sa_len - 6, 0));
1084 break;
1085 }
1086 cp1 = so_mask.sa.sa_len + 1 + (char *)&so_dst;
1087 cp2 = so_dst.sa.sa_len + 1 + (char *)&so_dst;
1088 while (cp2 > cp1)
1089 *--cp2 = 0;
1090 cp2 = so_mask.sa.sa_len + 1 + (char *)&so_mask;
1091 while (cp1 > so_dst.sa.sa_data)
1092 *--cp1 &= *--cp2;
1093 switch (so_dst.sa.sa_family) {
1094 case AF_ISO:
1095 so_dst.siso.siso_nlen = olen;
1096 break;
1097 }
1098 }
1099
1100 char *msgtypes[] = {
1101 "",
1102 "RTM_ADD: Add Route",
1103 "RTM_DELETE: Delete Route",
1104 "RTM_CHANGE: Change Metrics or flags",
1105 "RTM_GET: Report Metrics",
1106 "RTM_LOSING: Kernel Suspects Partitioning",
1107 "RTM_REDIRECT: Told to use different route",
1108 "RTM_MISS: Lookup failed on this address",
1109 "RTM_LOCK: fix specified metrics",
1110 "RTM_OLDADD: caused by SIOCADDRT",
1111 "RTM_OLDDEL: caused by SIOCDELRT",
1112 "RTM_RESOLVE: Route created by cloning",
1113 "RTM_NEWADDR: address being added to iface",
1114 "RTM_DELADDR: address being removed from iface",
1115 "RTM_IFINFO: iface status change",
1116 0,
1117 };
1118
1119 char metricnames[] =
1120 "\011pksent\010rttvar\7rtt\6ssthresh\5sendpipe\4recvpipe\3expire\2hopcount\1mtu";
1121 char routeflags[] =
1122 "\1UP\2GATEWAY\3HOST\4REJECT\5DYNAMIC\6MODIFIED\7DONE\010MASK_PRESENT\011CLONING\012XRESOLVE\013LLINFO\014STATIC\017PROTO2\020PROTO1";
1123 char ifnetflags[] =
1124 "\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5PTP\6NOTRAILERS\7RUNNING\010NOARP\011PPROMISC\012ALLMULTI\013OACTIVE\014SIMPLEX\015LINK0\016LINK1\017LINK2\020MULTICAST";
1125 char addrnames[] =
1126 "\1DST\2GATEWAY\3NETMASK\4GENMASK\5IFP\6IFA\7AUTHOR\010BRD";
1127
1128 void
1129 print_rtmsg(rtm, msglen)
1130 register struct rt_msghdr *rtm;
1131 int msglen;
1132 {
1133 struct if_msghdr *ifm;
1134 struct ifa_msghdr *ifam;
1135
1136 if (verbose == 0)
1137 return;
1138 if (rtm->rtm_version != RTM_VERSION) {
1139 (void) printf("routing message version %d not understood\n",
1140 rtm->rtm_version);
1141 return;
1142 }
1143 (void)printf("%s: len %d, ", msgtypes[rtm->rtm_type], rtm->rtm_msglen);
1144 switch (rtm->rtm_type) {
1145 case RTM_IFINFO:
1146 ifm = (struct if_msghdr *)rtm;
1147 (void) printf("if# %d, flags:", ifm->ifm_index);
1148 bprintf(stdout, ifm->ifm_flags, ifnetflags);
1149 pmsg_addrs((char *)(ifm + 1), ifm->ifm_addrs);
1150 break;
1151 case RTM_NEWADDR:
1152 case RTM_DELADDR:
1153 ifam = (struct ifa_msghdr *)rtm;
1154 (void) printf("metric %d, flags:", ifam->ifam_metric);
1155 bprintf(stdout, ifam->ifam_flags, routeflags);
1156 pmsg_addrs((char *)(ifam + 1), ifam->ifam_addrs);
1157 break;
1158 default:
1159 (void) printf("pid: %d, seq %d, errno %d, flags:",
1160 rtm->rtm_pid, rtm->rtm_seq, rtm->rtm_errno);
1161 bprintf(stdout, rtm->rtm_flags, routeflags);
1162 pmsg_common(rtm);
1163 }
1164 }
1165
1166 void
1167 print_getmsg(rtm, msglen)
1168 register struct rt_msghdr *rtm;
1169 int msglen;
1170 {
1171 struct sockaddr *dst = NULL, *gate = NULL, *mask = NULL;
1172 struct sockaddr_dl *ifp = NULL;
1173 register struct sockaddr *sa;
1174 register char *cp;
1175 register int i;
1176
1177 (void) printf(" route to: %s\n", routename(&so_dst));
1178 if (rtm->rtm_version != RTM_VERSION) {
1179 (void)fprintf(stderr,
1180 "routing message version %d not understood\n",
1181 rtm->rtm_version);
1182 return;
1183 }
1184 if (rtm->rtm_msglen > msglen) {
1185 (void)fprintf(stderr,
1186 "message length mismatch, in packet %d, returned %d\n",
1187 rtm->rtm_msglen, msglen);
1188 }
1189 if (rtm->rtm_errno) {
1190 (void) fprintf(stderr, "RTM_GET: %s (errno %d)\n",
1191 strerror(rtm->rtm_errno), rtm->rtm_errno);
1192 return;
1193 }
1194 cp = ((char *)(rtm + 1));
1195 if (rtm->rtm_addrs)
1196 for (i = 1; i; i <<= 1)
1197 if (i & rtm->rtm_addrs) {
1198 sa = (struct sockaddr *)cp;
1199 switch (i) {
1200 case RTA_DST:
1201 dst = sa;
1202 break;
1203 case RTA_GATEWAY:
1204 gate = sa;
1205 break;
1206 case RTA_NETMASK:
1207 mask = sa;
1208 break;
1209 case RTA_IFP:
1210 if (sa->sa_family == AF_LINK &&
1211 ((struct sockaddr_dl *)sa)->sdl_nlen)
1212 ifp = (struct sockaddr_dl *)sa;
1213 break;
1214 }
1215 ADVANCE(cp, sa);
1216 }
1217 if (dst && mask)
1218 mask->sa_family = dst->sa_family; /* XXX */
1219 if (dst)
1220 (void)printf("destination: %s\n", routename(dst));
1221 if (mask) {
1222 int savenflag = nflag;
1223
1224 nflag = 1;
1225 (void)printf(" mask: %s\n", routename(mask));
1226 nflag = savenflag;
1227 }
1228 if (gate && rtm->rtm_flags & RTF_GATEWAY)
1229 (void)printf(" gateway: %s\n", routename(gate));
1230 if (ifp)
1231 (void)printf(" interface: %.*s\n",
1232 ifp->sdl_nlen, ifp->sdl_data);
1233 (void)printf(" flags: ");
1234 bprintf(stdout, rtm->rtm_flags, routeflags);
1235
1236 #define lock(f) ((rtm->rtm_rmx.rmx_locks & __CONCAT(RTV_,f)) ? 'L' : ' ')
1237 #define msec(u) (((u) + 500) / 1000) /* usec to msec */
1238
1239 (void) printf("\n%s\n", "\
1240 recvpipe sendpipe ssthresh rtt,msec rttvar hopcount mtu expire");
1241 printf("%8d%c ", rtm->rtm_rmx.rmx_recvpipe, lock(RPIPE));
1242 printf("%8d%c ", rtm->rtm_rmx.rmx_sendpipe, lock(SPIPE));
1243 printf("%8d%c ", rtm->rtm_rmx.rmx_ssthresh, lock(SSTHRESH));
1244 printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rtt), lock(RTT));
1245 printf("%8d%c ", msec(rtm->rtm_rmx.rmx_rttvar), lock(RTTVAR));
1246 printf("%8d%c ", rtm->rtm_rmx.rmx_hopcount, lock(HOPCOUNT));
1247 printf("%8d%c ", rtm->rtm_rmx.rmx_mtu, lock(MTU));
1248 if (rtm->rtm_rmx.rmx_expire)
1249 rtm->rtm_rmx.rmx_expire -= time(0);
1250 printf("%8d%c\n", rtm->rtm_rmx.rmx_expire, lock(EXPIRE));
1251 #undef lock
1252 #undef msec
1253 #define RTA_IGN (RTA_DST|RTA_GATEWAY|RTA_NETMASK|RTA_IFP|RTA_IFA|RTA_BRD)
1254 if (verbose)
1255 pmsg_common(rtm);
1256 else if (rtm->rtm_addrs &~ RTA_IGN) {
1257 (void) printf("sockaddrs: ");
1258 bprintf(stdout, rtm->rtm_addrs, addrnames);
1259 putchar('\n');
1260 }
1261 #undef RTA_IGN
1262 }
1263
1264 void
1265 pmsg_common(rtm)
1266 register struct rt_msghdr *rtm;
1267 {
1268 (void) printf("\nlocks: ");
1269 bprintf(stdout, rtm->rtm_rmx.rmx_locks, metricnames);
1270 (void) printf(" inits: ");
1271 bprintf(stdout, rtm->rtm_inits, metricnames);
1272 pmsg_addrs(((char *)(rtm + 1)), rtm->rtm_addrs);
1273 }
1274
1275 void
1276 pmsg_addrs(cp, addrs)
1277 char *cp;
1278 int addrs;
1279 {
1280 register struct sockaddr *sa;
1281 int i;
1282
1283 if (addrs == 0)
1284 return;
1285 (void) printf("\nsockaddrs: ");
1286 bprintf(stdout, addrs, addrnames);
1287 (void) putchar('\n');
1288 for (i = 1; i; i <<= 1)
1289 if (i & addrs) {
1290 sa = (struct sockaddr *)cp;
1291 (void) printf(" %s", routename(sa));
1292 ADVANCE(cp, sa);
1293 }
1294 (void) putchar('\n');
1295 (void) fflush(stdout);
1296 }
1297
1298 void
1299 bprintf(fp, b, s)
1300 register FILE *fp;
1301 register int b;
1302 register u_char *s;
1303 {
1304 register int i;
1305 int gotsome = 0;
1306
1307 if (b == 0)
1308 return;
1309 while (i = *s++) {
1310 if (b & (1 << (i-1))) {
1311 if (gotsome == 0)
1312 i = '<';
1313 else
1314 i = ',';
1315 (void) putc(i, fp);
1316 gotsome = 1;
1317 for (; (i = *s) > 32; s++)
1318 (void) putc(i, fp);
1319 } else
1320 while (*s > 32)
1321 s++;
1322 }
1323 if (gotsome)
1324 (void) putc('>', fp);
1325 }
1326
1327 int
1328 keyword(cp)
1329 char *cp;
1330 {
1331 register struct keytab *kt = keywords;
1332
1333 while (kt->kt_cp && strcmp(kt->kt_cp, cp))
1334 kt++;
1335 return kt->kt_i;
1336 }
1337
1338 void
1339 sodump(su, which)
1340 register sup su;
1341 char *which;
1342 {
1343 switch (su->sa.sa_family) {
1344 case AF_LINK:
1345 (void) printf("%s: link %s; ",
1346 which, link_ntoa(&su->sdl));
1347 break;
1348 case AF_ISO:
1349 (void) printf("%s: iso %s; ",
1350 which, iso_ntoa(&su->siso.siso_addr));
1351 break;
1352 case AF_INET:
1353 (void) printf("%s: inet %s; ",
1354 which, inet_ntoa(su->sin.sin_addr));
1355 break;
1356 case AF_NS:
1357 (void) printf("%s: xns %s; ",
1358 which, ns_ntoa(su->sns.sns_addr));
1359 break;
1360 }
1361 (void) fflush(stdout);
1362 }
1363
1364 /* States*/
1365 #define VIRGIN 0
1366 #define GOTONE 1
1367 #define GOTTWO 2
1368 /* Inputs */
1369 #define DIGIT (4*0)
1370 #define END (4*1)
1371 #define DELIM (4*2)
1372
1373 void
1374 sockaddr(addr, sa)
1375 register char *addr;
1376 register struct sockaddr *sa;
1377 {
1378 register char *cp = (char *)sa;
1379 int size = sa->sa_len;
1380 char *cplim = cp + size;
1381 register int byte = 0, state = VIRGIN, new;
1382
1383 memset(cp, 0, size);
1384 cp++;
1385 do {
1386 if ((*addr >= '0') && (*addr <= '9')) {
1387 new = *addr - '0';
1388 } else if ((*addr >= 'a') && (*addr <= 'f')) {
1389 new = *addr - 'a' + 10;
1390 } else if ((*addr >= 'A') && (*addr <= 'F')) {
1391 new = *addr - 'A' + 10;
1392 } else if (*addr == 0)
1393 state |= END;
1394 else
1395 state |= DELIM;
1396 addr++;
1397 switch (state /* | INPUT */) {
1398 case GOTTWO | DIGIT:
1399 *cp++ = byte; /*FALLTHROUGH*/
1400 case VIRGIN | DIGIT:
1401 state = GOTONE; byte = new; continue;
1402 case GOTONE | DIGIT:
1403 state = GOTTWO; byte = new + (byte << 4); continue;
1404 default: /* | DELIM */
1405 state = VIRGIN; *cp++ = byte; byte = 0; continue;
1406 case GOTONE | END:
1407 case GOTTWO | END:
1408 *cp++ = byte; /* FALLTHROUGH */
1409 case VIRGIN | END:
1410 break;
1411 }
1412 break;
1413 } while (cp < cplim);
1414 sa->sa_len = cp - (char *)sa;
1415 }
1416