2 * SPDX-License-Identifier: BSD-3-Clause
4 * Copyright (c) 1983, 1989, 1991, 1993
5 * The Regents of the University of California. All rights reserved.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the University nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 static const char copyright[] =
34 "@(#) Copyright (c) 1983, 1989, 1991, 1993\n\
35 The Regents of the University of California. All rights reserved.\n";
40 static char sccsid[] = "@(#)route.c 8.6 (Berkeley) 4/28/95";
44 #include <sys/cdefs.h>
45 #include <sys/param.h>
47 #include <sys/socket.h>
48 #include <sys/ioctl.h>
52 #include <sys/sysctl.h>
53 #include <sys/types.h>
54 #include <sys/queue.h>
57 #include <net/route.h>
58 #include <net/if_dl.h>
59 #include <netinet/in.h>
60 #include <netinet/if_ether.h>
61 #include <arpa/inet.h>
82 TAILQ_ENTRY(fibl) fl_next;
89 static struct keytab {
92 } const keywords[] = {
97 int verbose, debugonly;
101 static struct sockaddr_storage so[RTAX_MAX];
102 static int pid, rtm_addrs;
103 static int nflag, af, aflen, qflag, tflag;
104 static int locking, lockrest;
105 static struct rt_metrics rt_metrics;
106 static u_long rtm_inits;
108 static int defaultfib;
110 static char domain[MAXHOSTNAMELEN + 1];
111 static bool domain_initialized;
112 static char rt_line[NI_MAXHOST];
113 static char net_line[MAXHOSTNAMELEN + 1];
115 #ifdef WITHOUT_NETLINK
120 struct rt_msghdr m_rtm;
124 static int rtmsg_rtsock(int, int, int);
125 static int flushroutes_fib_rtsock(int);
126 static void monitor_rtsock(void);
128 int rtmsg_nl(int, int, int, int, struct sockaddr_storage *, struct rt_metrics *);
129 int flushroutes_fib_nl(int, int);
130 void monitor_nl(int);
133 static TAILQ_HEAD(fibl_head_t, fibl) fibl_head;
135 void printb(int, const char *);
136 static void flushroutes(int argc, char *argv[]);
137 static int flushroutes_fib(int);
138 static int getaddr(int, char *, int);
139 static int keyword(const char *);
141 static void inet_makemask(struct sockaddr_in *, u_long);
144 static int inet6_makenetandmask(struct sockaddr_in6 *, const char *);
146 static void interfaces(void);
147 static void monitor(int, char*[]);
148 const char *netname(struct sockaddr *);
149 static void newroute(int, char **);
150 static int newroute_fib(int, char *, int);
151 static void pmsg_addrs(char *, int, size_t);
152 static void pmsg_common(struct rt_msghdr *, size_t);
153 static int prefixlen(const char *);
154 static void print_getmsg(struct rt_msghdr *, int, int);
155 static void print_rtmsg(struct rt_msghdr *, size_t);
156 const char *routename(struct sockaddr *);
157 static int rtmsg(int, int, int);
158 static void set_metric(char *, int);
159 static int set_sofib(int);
160 static void sockaddr(char *, struct sockaddr *, size_t);
161 static void sodump(struct sockaddr *, const char *);
162 static int fiboptlist_csv(const char *, struct fibl_head_t *);
163 static int fiboptlist_range(const char *, struct fibl_head_t *);
165 static void usage(const char *) __dead2;
167 #define READ_TIMEOUT 10
168 static volatile sig_atomic_t stop_read;
171 stopit(int sig __unused)
178 usage(const char *cp)
181 warnx("bad keyword: %s", cp);
182 errx(EX_USAGE, "usage: route [-j jail] [-46dnqtv] command [[modifiers] args]");
187 main(int argc, char **argv)
198 while ((ch = getopt(argc, argv, "46nqdtvj:")) != -1)
203 aflen = sizeof(struct sockaddr_in);
205 errx(1, "IPv4 support is not compiled in");
211 aflen = sizeof(struct sockaddr_in6);
213 errx(1, "IPv6 support is not compiled in");
237 errx(1, "Jail support is not compiled in");
251 if (jail_name != NULL) {
252 jid = jail_getid(jail_name);
254 errx(1, "Jail not found");
255 if (jail_attach(jid) != 0)
256 errx(1, "Cannot attach to jail");
260 #ifdef WITHOUT_NETLINK
262 s = open(_PATH_DEVNULL, O_WRONLY, 0);
264 s = socket(PF_ROUTE, SOCK_RAW, 0);
266 err(EX_OSERR, "socket");
269 len = sizeof(numfibs);
270 if (sysctlbyname("net.fibs", (void *)&numfibs, &len, NULL, 0) == -1)
273 len = sizeof(defaultfib);
275 sysctlbyname("net.my_fibnum", (void *)&defaultfib, &len, NULL,
280 switch (keyword(*argv)) {
290 newroute(argc, argv);
298 flushroutes(argc, argv);
310 #ifdef WITHOUT_NETLINK
313 return (setsockopt(s, SOL_SOCKET, SO_SETFIB, (void *)&fib,
321 fiboptlist_range(const char *arg, struct fibl_head_t *flh)
324 char *str0, *str, *token, *endptr;
325 int fib[2], i, error;
327 str0 = str = strdup(arg);
330 while ((token = strsep(&str, "-")) != NULL) {
335 fib[i] = strtol(token, &endptr, 0);
337 if (*endptr != '\0' ||
339 (numfibs != -1 && fib[i] > numfibs - 1))
349 goto fiboptlist_range_ret;
352 if (fib[0] >= fib[1]) {
354 goto fiboptlist_range_ret;
356 for (i = fib[0]; i <= fib[1]; i++) {
357 fl = calloc(1, sizeof(*fl));
360 goto fiboptlist_range_ret;
363 TAILQ_INSERT_TAIL(flh, fl, fl_next);
365 fiboptlist_range_ret:
372 fiboptlist_csv(const char *arg, struct fibl_head_t *flh)
375 char *str0, *str, *token, *endptr;
379 if (strcmp("all", arg) == 0) {
380 str = calloc(1, ALLSTRLEN);
383 goto fiboptlist_csv_ret;
386 snprintf(str, ALLSTRLEN - 1, "%d-%d", 0, numfibs - 1);
388 snprintf(str, ALLSTRLEN - 1, "%d", 0);
389 } else if (strcmp("default", arg) == 0) {
390 str0 = str = calloc(1, ALLSTRLEN);
393 goto fiboptlist_csv_ret;
395 snprintf(str, ALLSTRLEN - 1, "%d", defaultfib);
397 str0 = str = strdup(arg);
400 while ((token = strsep(&str, ",")) != NULL) {
401 if (*token != '-' && strchr(token, '-') != NULL) {
402 error = fiboptlist_range(token, flh);
404 goto fiboptlist_csv_ret;
407 fib = strtol(token, &endptr, 0);
409 if (*endptr != '\0' ||
411 (numfibs != -1 && fib > numfibs - 1))
416 goto fiboptlist_csv_ret;
418 fl = calloc(1, sizeof(*fl));
421 goto fiboptlist_csv_ret;
424 TAILQ_INSERT_TAIL(flh, fl, fl_next);
434 * Purge all entries in the routing tables not
435 * associated with network interfaces.
438 flushroutes(int argc, char *argv[])
443 if (uid != 0 && !debugonly && !tflag)
444 errx(EX_NOPERM, "must be root to alter routing table");
445 #ifdef WITHOUT_NETLINK
446 shutdown(s, SHUT_RD); /* Don't want to read back our messages */
449 TAILQ_INIT(&fibl_head);
455 switch (keyword(*argv + 1)) {
474 error = fiboptlist_csv(*++argv, &fibl_head);
476 errx(EX_USAGE, "invalid fib number: %s", *argv);
482 if (TAILQ_EMPTY(&fibl_head)) {
483 error = fiboptlist_csv("default", &fibl_head);
485 errx(EX_OSERR, "fiboptlist_csv failed.");
487 TAILQ_FOREACH(fl, &fibl_head, fl_next)
488 flushroutes_fib(fl->fl_num);
492 flushroutes_fib(int fib)
494 #ifdef WITHOUT_NETLINK
495 return (flushroutes_fib_rtsock(fib));
497 return (flushroutes_fib_nl(fib, af));
501 #ifdef WITHOUT_NETLINK
503 flushroutes_fib_rtsock(int fib)
505 struct rt_msghdr *rtm;
507 char *buf, *next, *lim;
508 int mib[7], rlen, seqno, count = 0;
511 error = set_sofib(fib);
513 warn("fib number %d is ignored", fib);
520 mib[2] = 0; /* protocol */
522 mib[4] = NET_RT_DUMP;
523 mib[5] = 0; /* no flags */
525 if (sysctl(mib, nitems(mib), NULL, &needed, NULL, 0) < 0)
526 err(EX_OSERR, "route-sysctl-estimate");
527 if ((buf = malloc(needed)) == NULL)
528 errx(EX_OSERR, "malloc failed");
529 if (sysctl(mib, nitems(mib), buf, &needed, NULL, 0) < 0) {
530 if (errno == ENOMEM && count++ < 10) {
531 warnx("Routing table grew, retrying");
536 err(EX_OSERR, "route-sysctl-get");
540 (void)printf("Examining routing table from sysctl\n");
542 for (next = buf; next < lim; next += rtm->rtm_msglen) {
543 rtm = (struct rt_msghdr *)(void *)next;
545 print_rtmsg(rtm, rtm->rtm_msglen);
546 if ((rtm->rtm_flags & RTF_GATEWAY) == 0)
549 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
551 if (sa->sa_family != af)
556 rtm->rtm_type = RTM_DELETE;
557 rtm->rtm_seq = seqno;
558 rlen = write(s, next, rtm->rtm_msglen);
559 if (rlen < 0 && errno == EPERM)
560 err(1, "write to routing socket");
561 if (rlen < (int)rtm->rtm_msglen) {
562 warn("write to routing socket");
563 (void)printf("got only %d for rlen\n", rlen);
572 print_rtmsg(rtm, rlen);
574 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
576 printf("%-20.20s ", rtm->rtm_flags & RTF_HOST ?
577 routename(sa) : netname(sa));
578 sa = (struct sockaddr *)(SA_SIZE(sa) + (char *)sa);
579 printf("%-20.20s ", routename(sa));
581 printf("-fib %-3d ", fib);
591 routename(struct sockaddr *sa)
593 struct sockaddr_dl *sdl;
597 if (!domain_initialized) {
598 domain_initialized = true;
599 if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
600 (cp = strchr(domain, '.'))) {
601 domain[MAXHOSTNAMELEN] = '\0';
602 (void)strcpy(domain, cp + 1);
607 /* If the address is zero-filled, use "default". */
608 if (sa->sa_len == 0 && nflag == 0)
610 #if defined(INET) || defined(INET6)
611 switch (sa->sa_family) {
614 /* If the address is zero-filled, use "default". */
616 ((struct sockaddr_in *)(void *)sa)->sin_addr.s_addr ==
623 /* If the address is zero-filled, use "default". */
625 IN6_IS_ADDR_UNSPECIFIED(&((struct sockaddr_in6 *)(void *)sa)->sin6_addr))
632 switch (sa->sa_family) {
633 #if defined(INET) || defined(INET6)
641 struct sockaddr_storage ss;
645 memset(&ss, 0, sizeof(ss));
647 ss.ss_family = sa->sa_family;
649 memcpy(&ss, sa, sa->sa_len);
650 /* Expand sa->sa_len because it could be shortened. */
651 if (sa->sa_family == AF_INET)
652 ss.ss_len = sizeof(struct sockaddr_in);
653 else if (sa->sa_family == AF_INET6)
654 ss.ss_len = sizeof(struct sockaddr_in6);
655 error = getnameinfo((struct sockaddr *)&ss, ss.ss_len,
656 rt_line, sizeof(rt_line), NULL, 0,
657 (nflag == 0) ? 0 : NI_NUMERICHOST);
659 warnx("getnameinfo(): %s", gai_strerror(error));
660 strncpy(rt_line, "invalid", sizeof(rt_line));
663 /* Remove the domain part if any. */
664 p = strchr(rt_line, '.');
665 if (p != NULL && strcmp(p + 1, domain) == 0)
673 sdl = (struct sockaddr_dl *)(void *)sa;
675 if (sdl->sdl_nlen == 0 &&
676 sdl->sdl_alen == 0 &&
677 sdl->sdl_slen == 0) {
678 n = snprintf(rt_line, sizeof(rt_line), "link#%d",
680 if (n > (int)sizeof(rt_line))
684 return (link_ntoa(sdl));
689 u_short *sp = (u_short *)(void *)sa;
690 u_short *splim = sp + ((sa->sa_len + 1) >> 1);
691 char *cps = rt_line + sprintf(rt_line, "(%d)", sa->sa_family);
692 char *cpe = rt_line + sizeof(rt_line);
694 while (++sp < splim && cps < cpe) /* start with sa->sa_data */
695 if ((n = snprintf(cps, cpe - cps, " %x", *sp)) > 0)
706 * Return the name of the network whose address is given.
707 * The address is assumed to be that of a net, not a host.
710 netname(struct sockaddr *sa)
712 struct sockaddr_dl *sdl;
715 struct netent *np = NULL;
716 const char *cp = NULL;
720 switch (sa->sa_family) {
726 in = ((struct sockaddr_in *)(void *)sa)->sin_addr;
727 i = in.s_addr = ntohl(in.s_addr);
731 np = getnetbyaddr(i, AF_INET);
735 #define C(x) (unsigned)((x) & 0xff)
737 strncpy(net_line, cp, sizeof(net_line));
738 else if ((in.s_addr & 0xffffff) == 0)
739 (void)sprintf(net_line, "%u", C(in.s_addr >> 24));
740 else if ((in.s_addr & 0xffff) == 0)
741 (void)sprintf(net_line, "%u.%u", C(in.s_addr >> 24),
743 else if ((in.s_addr & 0xff) == 0)
744 (void)sprintf(net_line, "%u.%u.%u", C(in.s_addr >> 24),
745 C(in.s_addr >> 16), C(in.s_addr >> 8));
747 (void)sprintf(net_line, "%u.%u.%u.%u", C(in.s_addr >> 24),
748 C(in.s_addr >> 16), C(in.s_addr >> 8),
757 struct sockaddr_in6 sin6;
760 memset(&sin6, 0, sizeof(sin6));
761 memcpy(&sin6, sa, sa->sa_len);
762 sin6.sin6_len = sizeof(sin6);
763 sin6.sin6_family = AF_INET6;
765 niflags |= NI_NUMERICHOST;
766 if (getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
767 net_line, sizeof(net_line), NULL, 0, niflags) != 0)
768 strncpy(net_line, "invalid", sizeof(net_line));
774 sdl = (struct sockaddr_dl *)(void *)sa;
776 if (sdl->sdl_nlen == 0 &&
777 sdl->sdl_alen == 0 &&
778 sdl->sdl_slen == 0) {
779 n = snprintf(net_line, sizeof(net_line), "link#%d",
781 if (n > (int)sizeof(net_line))
785 return (link_ntoa(sdl));
790 u_short *sp = (u_short *)(void *)sa->sa_data;
791 u_short *splim = sp + ((sa->sa_len + 1)>>1);
792 char *cps = net_line + sprintf(net_line, "af %d:", sa->sa_family);
793 char *cpe = net_line + sizeof(net_line);
795 while (sp < splim && cps < cpe)
796 if ((n = snprintf(cps, cpe - cps, " %x", *sp++)) > 0)
807 set_metric(char *value, int key)
811 u_long noval, *valp = &noval;
814 #define caseof(x, y, z) case x: valp = &rt_metrics.z; flag = y; break
815 caseof(K_MTU, RTV_MTU, rmx_mtu);
816 caseof(K_HOPCOUNT, RTV_HOPCOUNT, rmx_hopcount);
817 caseof(K_EXPIRE, RTV_EXPIRE, rmx_expire);
818 caseof(K_RECVPIPE, RTV_RPIPE, rmx_recvpipe);
819 caseof(K_SENDPIPE, RTV_SPIPE, rmx_sendpipe);
820 caseof(K_SSTHRESH, RTV_SSTHRESH, rmx_ssthresh);
821 caseof(K_RTT, RTV_RTT, rmx_rtt);
822 caseof(K_RTTVAR, RTV_RTTVAR, rmx_rttvar);
823 caseof(K_WEIGHT, RTV_WEIGHT, rmx_weight);
826 if (lockrest || locking)
827 rt_metrics.rmx_locks |= flag;
831 *valp = strtol(value, &endptr, 0);
832 if (errno == 0 && *endptr != '\0')
835 err(EX_USAGE, "%s", value);
836 if (flag & RTV_EXPIRE && (value[0] == '+' || value[0] == '-')) {
839 clock_gettime(CLOCK_REALTIME_FAST, &ts);
844 #define F_ISHOST 0x01
845 #define F_FORCENET 0x02
846 #define F_FORCEHOST 0x04
848 #define F_INTERFACE 0x10
851 newroute(int argc, char **argv)
856 const char *dest, *gateway, *errmsg;
857 int key, error, flags, nrflags, fibnum;
859 if (uid != 0 && !debugonly && !tflag)
860 errx(EX_NOPERM, "must be root to alter routing table");
865 TAILQ_INIT(&fibl_head);
867 sigemptyset(&sa.sa_mask);
869 sa.sa_handler = stopit;
870 if (sigaction(SIGALRM, &sa, 0) == -1)
871 warn("sigaction SIGALRM");
874 #ifdef WITHOUT_NETLINK
875 if (*cmd != 'g' && *cmd != 's')
876 shutdown(s, SHUT_RD); /* Don't want to read back our messages */
879 if (**(++argv)== '-') {
880 switch (key = keyword(1 + *argv)) {
883 aflen = sizeof(struct sockaddr_dl);
889 aflen = sizeof(struct sockaddr_in);
896 aflen = sizeof(struct sockaddr_in6);
901 aflen = sizeof(struct sockaddr_storage);
905 nrflags |= F_INTERFACE;
908 flags &= ~RTF_STATIC;
917 nrflags |= F_FORCEHOST;
923 flags |= RTF_BLACKHOLE;
935 flags |= RTF_XRESOLVE;
944 flags &= ~RTF_STICKY;
949 error = fiboptlist_csv(*++argv, &fibl_head);
952 "invalid fib number: %s", *argv);
957 getaddr(RTAX_IFA, *++argv, nrflags);
962 getaddr(RTAX_IFP, *++argv, nrflags);
967 getaddr(RTAX_GENMASK, *++argv, nrflags);
972 getaddr(RTAX_GATEWAY, *++argv, nrflags);
978 if (getaddr(RTAX_DST, *++argv, nrflags))
985 getaddr(RTAX_NETMASK, *++argv, nrflags);
988 nrflags |= F_FORCENET;
993 if (prefixlen(*++argv) == -1) {
994 nrflags &= ~F_FORCENET;
997 nrflags |= F_FORCENET;
998 nrflags &= ~F_ISHOST;
1012 set_metric(*++argv, key);
1018 if ((rtm_addrs & RTA_DST) == 0) {
1020 if (getaddr(RTAX_DST, *argv, nrflags))
1021 nrflags |= F_ISHOST;
1022 } else if ((rtm_addrs & RTA_GATEWAY) == 0) {
1024 getaddr(RTAX_GATEWAY, *argv, nrflags);
1026 getaddr(RTAX_NETMASK, *argv, nrflags);
1027 nrflags |= F_FORCENET;
1032 /* Do some sanity checks on resulting request */
1033 if (so[RTAX_DST].ss_len == 0) {
1034 warnx("destination parameter required");
1038 if (so[RTAX_NETMASK].ss_len != 0 &&
1039 so[RTAX_DST].ss_family != so[RTAX_NETMASK].ss_family) {
1040 warnx("destination and netmask family need to be the same");
1044 if (nrflags & F_FORCEHOST) {
1045 nrflags |= F_ISHOST;
1047 if (af == AF_INET6) {
1048 rtm_addrs &= ~RTA_NETMASK;
1049 memset(&so[RTAX_NETMASK], 0, sizeof(so[RTAX_NETMASK]));
1053 if (nrflags & F_FORCENET)
1054 nrflags &= ~F_ISHOST;
1056 if (nrflags & F_ISHOST)
1058 if ((nrflags & F_INTERFACE) == 0)
1059 flags |= RTF_GATEWAY;
1060 if (nrflags & F_PROXY)
1061 flags |= RTF_ANNOUNCE;
1064 if (gateway == NULL)
1067 if (TAILQ_EMPTY(&fibl_head)) {
1068 error = fiboptlist_csv("default", &fibl_head);
1070 errx(EX_OSERR, "fiboptlist_csv failed.");
1073 TAILQ_FOREACH(fl, &fibl_head, fl_next) {
1074 fl->fl_error = newroute_fib(fl->fl_num, cmd, flags);
1076 fl->fl_errno = errno;
1077 error += fl->fl_error;
1079 if (*cmd == 'g' || *cmd == 's')
1085 TAILQ_FOREACH(fl, &fibl_head, fl_next) {
1086 if (fl->fl_error == 0)
1092 printf("%s %s %s", cmd,
1093 (nrflags & F_ISHOST) ? "host" : "net", dest);
1095 printf(": gateway %s", gateway);
1098 TAILQ_FOREACH(fl, &fibl_head, fl_next) {
1099 if (fl->fl_error == 0
1100 && fl->fl_num >= 0) {
1105 printf("%d", fl->fl_num);
1116 TAILQ_FOREACH(fl, &fibl_head, fl_next) {
1117 if (fl->fl_error != 0) {
1120 printf("%s %s %s", cmd, (nrflags & F_ISHOST)
1121 ? "host" : "net", dest);
1123 printf(": gateway %s", gateway);
1125 if (fl->fl_num >= 0)
1126 printf(" fib %d", fl->fl_num);
1128 switch (fl->fl_errno) {
1130 errmsg = "not in table";
1133 errmsg = "entry in use";
1136 errmsg = "not enough memory";
1140 * handle recursion avoidance
1143 errmsg = "gateway uses the same route";
1146 errmsg = "route already in table";
1149 errmsg = strerror(fl->fl_errno);
1152 printf(": %s\n", errmsg);
1160 newroute_fib(int fib, char *cmd, int flags)
1164 error = set_sofib(fib);
1166 warn("fib number %d is ignored", fib);
1170 error = rtmsg(*cmd, flags, fib);
1176 inet_makemask(struct sockaddr_in *sin_mask, u_long bits)
1180 rtm_addrs |= RTA_NETMASK;
1183 mask = 0xffffffff << (32 - bits);
1185 sin_mask->sin_addr.s_addr = htonl(mask);
1186 sin_mask->sin_len = sizeof(struct sockaddr_in);
1187 sin_mask->sin_family = AF_INET;
1193 * XXX the function may need more improvement...
1196 inet6_makenetandmask(struct sockaddr_in6 *sin6, const char *plen)
1200 if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr) &&
1201 sin6->sin6_scope_id == 0)
1205 if (plen == NULL || strcmp(plen, "128") == 0)
1207 rtm_addrs |= RTA_NETMASK;
1214 * Interpret an argument as a network address of some kind,
1215 * returning 1 if a host address, 0 if a network address.
1218 getaddr(int idx, char *str, int nrflags)
1220 struct sockaddr *sa;
1222 struct sockaddr_in *sin;
1225 #elif defined(INET6)
1229 if (idx < 0 || idx >= RTAX_MAX)
1230 usage("internal error");
1234 aflen = sizeof(struct sockaddr_in);
1235 #elif defined(INET6)
1237 aflen = sizeof(struct sockaddr_in6);
1240 aflen = sizeof(struct sockaddr_dl);
1243 rtm_addrs |= (1 << idx);
1244 sa = (struct sockaddr *)&so[idx];
1250 if (nrflags & F_INTERFACE) {
1251 struct ifaddrs *ifap, *ifa;
1252 struct sockaddr_dl *sdl0 = (struct sockaddr_dl *)(void *)sa;
1253 struct sockaddr_dl *sdl = NULL;
1255 if (getifaddrs(&ifap))
1256 err(EX_OSERR, "getifaddrs");
1258 for (ifa = ifap; ifa != NULL; ifa = ifa->ifa_next) {
1259 if (ifa->ifa_addr->sa_family != AF_LINK)
1262 if (strcmp(str, ifa->ifa_name) != 0)
1265 sdl = (struct sockaddr_dl *)(void *)ifa->ifa_addr;
1267 /* If we found it, then use it */
1270 * Note that we need to copy before calling
1273 memcpy(sdl0, sdl, sdl->sdl_len);
1280 "interface '%s' does not exist", str);
1284 sa->sa_family = AF_LINK;
1287 if (strcmp(str, "default") == 0) {
1289 * Default is net 0.0.0.0/0
1293 nrflags |= F_FORCENET;
1294 getaddr(RTAX_NETMASK, str, nrflags);
1299 switch (sa->sa_family) {
1303 struct addrinfo hints, *res;
1307 if (idx == RTAX_DST && (q = strchr(str, '/')) != NULL)
1309 memset(&hints, 0, sizeof(hints));
1310 hints.ai_family = sa->sa_family;
1311 hints.ai_socktype = SOCK_DGRAM;
1312 ecode = getaddrinfo(str, NULL, &hints, &res);
1313 if (ecode != 0 || res->ai_family != AF_INET6 ||
1314 res->ai_addrlen != sizeof(struct sockaddr_in6))
1315 errx(EX_OSERR, "%s: %s", str, gai_strerror(ecode));
1316 memcpy(sa, res->ai_addr, res->ai_addrlen);
1320 if (idx == RTAX_DST)
1321 return (inet6_makenetandmask((struct sockaddr_in6 *)(void *)sa, q));
1326 link_addr(str, (struct sockaddr_dl *)(void *)sa);
1330 sockaddr(str, sa, sizeof(struct sockaddr_storage));
1340 sin = (struct sockaddr_in *)(void *)sa;
1342 q = strchr(str,'/');
1343 if (q != NULL && idx == RTAX_DST) {
1346 if (inet_aton(str, &sin->sin_addr) == 0)
1347 errx(EX_NOHOST, "bad address: %s", str);
1349 int masklen = strtol(q + 1, NULL, 10);
1350 if (masklen < 0 || masklen > 32)
1351 errx(EX_NOHOST, "bad mask length: %s", q + 1);
1353 inet_makemask((struct sockaddr_in *)&so[RTAX_NETMASK],masklen);
1356 if (inet_aton(str, &sin->sin_addr) != 0)
1359 hp = gethostbyname(str);
1361 sin->sin_family = hp->h_addrtype;
1362 memmove((char *)&sin->sin_addr, hp->h_addr,
1363 MIN((size_t)hp->h_length, sizeof(sin->sin_addr)));
1367 errx(EX_NOHOST, "bad address: %s", str);
1371 prefixlen(const char *str)
1373 int len = atoi(str), q, r;
1377 rtm_addrs |= RTA_NETMASK;
1382 struct sockaddr_in6 *sin6 =
1383 (struct sockaddr_in6 *)&so[RTAX_NETMASK];
1386 p = (char *)&sin6->sin6_addr;
1387 sin6->sin6_family = AF_INET6;
1388 sin6->sin6_len = sizeof(*sin6);
1395 struct sockaddr_in *sin =
1396 (struct sockaddr_in *)&so[RTAX_NETMASK];
1399 p = (char *)&sin->sin_addr;
1400 sin->sin_family = AF_INET;
1401 sin->sin_len = sizeof(*sin);
1406 errx(EX_OSERR, "prefixlen not supported in this af");
1409 if (len < 0 || max < len)
1410 errx(EX_USAGE, "%s: invalid prefixlen", str);
1414 memset((void *)p, 0, max / 8);
1416 memset((void *)p, 0xff, q);
1418 *((u_char *)p + q) = (0xff00 >> r) & 0xff;
1430 char *buf, *lim, *next, count = 0;
1431 struct rt_msghdr *rtm;
1436 mib[2] = 0; /* protocol */
1438 mib[4] = NET_RT_IFLIST;
1439 mib[5] = 0; /* no flags */
1440 if (sysctl(mib, nitems(mib), NULL, &needed, NULL, 0) < 0)
1441 err(EX_OSERR, "route-sysctl-estimate");
1442 if ((buf = malloc(needed)) == NULL)
1443 errx(EX_OSERR, "malloc failed");
1444 if (sysctl(mib, nitems(mib), buf, &needed, NULL, 0) < 0) {
1445 if (errno == ENOMEM && count++ < 10) {
1446 warnx("Routing table grew, retrying");
1451 err(EX_OSERR, "actual retrieval of interface table");
1454 for (next = buf; next < lim; next += rtm->rtm_msglen) {
1455 rtm = (struct rt_msghdr *)(void *)next;
1456 print_rtmsg(rtm, rtm->rtm_msglen);
1462 monitor(int argc, char *argv[])
1473 switch (keyword(*argv + 1)) {
1478 fib = strtol(*++argv, &endptr, 0);
1480 if (*endptr != '\0' ||
1482 (numfibs != -1 && fib > numfibs - 1))
1486 errx(EX_USAGE, "invalid fib number: %s", *argv);
1492 error = set_sofib(fib);
1494 errx(EX_USAGE, "invalid fib number: %d", fib);
1501 #ifdef WITHOUT_NETLINK
1508 #ifdef WITHOUT_NETLINK
1510 monitor_rtsock(void)
1517 if (setsockopt(s, SOL_SOCKET, SO_RERROR, &n, sizeof(n)) == -1)
1523 n = read(s, msg, sizeof(msg));
1529 (void)printf("\ngot message of size %d on %s", n, ctime(&now));
1530 print_rtmsg((struct rt_msghdr *)(void *)msg, n);
1536 rtmsg(int cmd, int flags, int fib)
1541 else if (cmd == 'c')
1543 else if (cmd == 'g' || cmd == 's') {
1545 if (so[RTAX_IFP].ss_family == 0) {
1546 so[RTAX_IFP].ss_family = AF_LINK;
1547 so[RTAX_IFP].ss_len = sizeof(struct sockaddr_dl);
1548 rtm_addrs |= RTA_IFP;
1552 flags |= RTF_PINNED;
1554 #ifdef WITHOUT_NETLINK
1555 return (rtmsg_rtsock(cmd, flags, fib));
1557 errno = rtmsg_nl(cmd, flags, fib, rtm_addrs, so, &rt_metrics);
1558 return (errno == 0 ? 0 : -1);
1562 #ifdef WITHOUT_NETLINK
1564 rtmsg_rtsock(int cmd, int flags, int fib)
1567 char *cp = m_rtmsg.m_space;
1570 memset(&m_rtmsg, 0, sizeof(m_rtmsg));
1572 #define NEXTADDR(w, u) \
1573 if (rtm_addrs & (w)) { \
1574 l = SA_SIZE(&(u)); \
1575 memmove(cp, (char *)&(u), l); \
1578 sodump((struct sockaddr *)&(u), #w); \
1581 #define rtm m_rtmsg.m_rtm
1583 rtm.rtm_flags = flags;
1584 rtm.rtm_version = RTM_VERSION;
1585 rtm.rtm_seq = ++rtm_seq;
1586 rtm.rtm_addrs = rtm_addrs;
1587 rtm.rtm_rmx = rt_metrics;
1588 rtm.rtm_inits = rtm_inits;
1590 NEXTADDR(RTA_DST, so[RTAX_DST]);
1591 NEXTADDR(RTA_GATEWAY, so[RTAX_GATEWAY]);
1592 NEXTADDR(RTA_NETMASK, so[RTAX_NETMASK]);
1593 NEXTADDR(RTA_GENMASK, so[RTAX_GENMASK]);
1594 NEXTADDR(RTA_IFP, so[RTAX_IFP]);
1595 NEXTADDR(RTA_IFA, so[RTAX_IFA]);
1596 rtm.rtm_msglen = l = cp - (char *)&m_rtmsg;
1598 print_rtmsg(&rtm, l);
1601 if ((rlen = write(s, (char *)&m_rtmsg, l)) < 0) {
1604 err(1, "writing to routing socket");
1607 warnx("route has not been found");
1610 /* Handled by newroute() */
1613 warn("writing to routing socket");
1617 if (cmd == RTM_GET) {
1619 alarm(READ_TIMEOUT);
1621 l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
1622 } while (l > 0 && stop_read == 0 &&
1623 (rtm.rtm_type != RTM_GET || rtm.rtm_seq != rtm_seq ||
1624 rtm.rtm_pid != pid));
1625 if (stop_read != 0) {
1626 warnx("read from routing socket timed out");
1631 warn("read from routing socket");
1633 print_getmsg(&rtm, l, fib);
1640 static const char *const msgtypes[] = {
1642 "RTM_ADD: Add Route",
1643 "RTM_DELETE: Delete Route",
1644 "RTM_CHANGE: Change Metrics or flags",
1645 "RTM_GET: Report Metrics",
1646 "RTM_LOSING: Kernel Suspects Partitioning",
1647 "RTM_REDIRECT: Told to use different route",
1648 "RTM_MISS: Lookup failed on this address",
1649 "RTM_LOCK: fix specified metrics",
1650 "RTM_OLDADD: caused by SIOCADDRT",
1651 "RTM_OLDDEL: caused by SIOCDELRT",
1652 "RTM_RESOLVE: Route created by cloning",
1653 "RTM_NEWADDR: address being added to iface",
1654 "RTM_DELADDR: address being removed from iface",
1655 "RTM_IFINFO: iface status change",
1656 "RTM_NEWMADDR: new multicast group membership on iface",
1657 "RTM_DELMADDR: multicast group membership removed from iface",
1658 "RTM_IFANNOUNCE: interface arrival/departure",
1659 "RTM_IEEE80211: IEEE 802.11 wireless event",
1662 static const char metricnames[] =
1663 "\011weight\010rttvar\7rtt\6ssthresh\5sendpipe\4recvpipe\3expire"
1665 const char routeflags[] =
1666 "\1UP\2GATEWAY\3HOST\4REJECT\5DYNAMIC\6MODIFIED\7DONE"
1667 "\012XRESOLVE\013LLINFO\014STATIC\015BLACKHOLE"
1668 "\017PROTO2\020PROTO1\021PRCLONING\022WASCLONED\023PROTO3"
1669 "\024FIXEDMTU\025PINNED\026LOCAL\027BROADCAST\030MULTICAST\035STICKY";
1670 static const char ifnetflags[] =
1671 "\1UP\2BROADCAST\3DEBUG\4LOOPBACK\5PTP\6b6\7RUNNING\010NOARP"
1672 "\011PPROMISC\012ALLMULTI\013OACTIVE\014SIMPLEX\015LINK0\016LINK1"
1673 "\017LINK2\020MULTICAST";
1674 static const char addrnames[] =
1675 "\1DST\2GATEWAY\3NETMASK\4GENMASK\5IFP\6IFA\7AUTHOR\010BRD";
1677 static const char errfmt[] =
1678 "\n%s: truncated route message, only %zu bytes left\n";
1681 print_rtmsg(struct rt_msghdr *rtm, size_t msglen)
1683 struct if_msghdr *ifm;
1684 struct ifa_msghdr *ifam;
1686 struct ifma_msghdr *ifmam;
1688 struct if_announcemsghdr *ifan;
1693 if (rtm->rtm_version != RTM_VERSION) {
1694 (void)printf("routing message version %d not understood\n",
1698 if (rtm->rtm_type < nitems(msgtypes))
1699 (void)printf("%s: ", msgtypes[rtm->rtm_type]);
1701 (void)printf("unknown type %d: ", rtm->rtm_type);
1702 (void)printf("len %d, ", rtm->rtm_msglen);
1704 #define REQUIRE(x) do { \
1705 if (msglen < sizeof(x)) \
1708 msglen -= sizeof(x); \
1711 switch (rtm->rtm_type) {
1713 REQUIRE(struct if_msghdr);
1714 ifm = (struct if_msghdr *)rtm;
1715 (void)printf("if# %d, ", ifm->ifm_index);
1716 switch (ifm->ifm_data.ifi_link_state) {
1717 case LINK_STATE_DOWN:
1727 (void)printf("link: %s, flags:", state);
1728 printb(ifm->ifm_flags, ifnetflags);
1729 pmsg_addrs((char *)(ifm + 1), ifm->ifm_addrs, msglen);
1733 REQUIRE(struct ifa_msghdr);
1734 ifam = (struct ifa_msghdr *)rtm;
1735 (void)printf("metric %d, flags:", ifam->ifam_metric);
1736 printb(ifam->ifam_flags, routeflags);
1737 pmsg_addrs((char *)(ifam + 1), ifam->ifam_addrs, msglen);
1742 REQUIRE(struct ifma_msghdr);
1743 ifmam = (struct ifma_msghdr *)rtm;
1744 pmsg_addrs((char *)(ifmam + 1), ifmam->ifmam_addrs, msglen);
1747 case RTM_IFANNOUNCE:
1748 REQUIRE(struct if_announcemsghdr);
1749 ifan = (struct if_announcemsghdr *)rtm;
1750 (void)printf("if# %d, what: ", ifan->ifan_index);
1751 switch (ifan->ifan_what) {
1753 (void)printf("arrival");
1755 case IFAN_DEPARTURE:
1756 printf("departure");
1759 printf("#%d", ifan->ifan_what);
1767 if (rtm->rtm_type <= RTM_RESOLVE) {
1768 printf("pid: %ld, seq %d, errno %d, flags:",
1769 (long)rtm->rtm_pid, rtm->rtm_seq, rtm->rtm_errno);
1770 printb(rtm->rtm_flags, routeflags);
1771 pmsg_common(rtm, msglen);
1773 printf("type: %u, len: %zu\n", rtm->rtm_type, msglen);
1779 (void)printf(errfmt, __func__, msglen);
1784 print_getmsg(struct rt_msghdr *rtm, int msglen, int fib)
1786 struct sockaddr *sp[RTAX_MAX];
1791 memset(sp, 0, sizeof(sp));
1792 (void)printf(" route to: %s\n",
1793 routename((struct sockaddr *)&so[RTAX_DST]));
1794 if (rtm->rtm_version != RTM_VERSION) {
1795 warnx("routing message version %d not understood",
1799 if (rtm->rtm_msglen > msglen) {
1800 warnx("message length mismatch, in packet %d, returned %d",
1801 rtm->rtm_msglen, msglen);
1804 if (rtm->rtm_errno) {
1805 errno = rtm->rtm_errno;
1806 warn("message indicates error %d", errno);
1809 cp = ((char *)(rtm + 1));
1810 for (i = 0; i < RTAX_MAX; i++)
1811 if (rtm->rtm_addrs & (1 << i)) {
1812 sp[i] = (struct sockaddr *)cp;
1813 cp += SA_SIZE((struct sockaddr *)cp);
1815 if ((rtm->rtm_addrs & RTA_IFP) &&
1816 (sp[RTAX_IFP]->sa_family != AF_LINK ||
1817 ((struct sockaddr_dl *)(void *)sp[RTAX_IFP])->sdl_nlen == 0))
1818 sp[RTAX_IFP] = NULL;
1820 (void)printf("destination: %s\n", routename(sp[RTAX_DST]));
1821 if (sp[RTAX_NETMASK])
1822 (void)printf(" mask: %s\n", routename(sp[RTAX_NETMASK]));
1823 if (sp[RTAX_GATEWAY] && (rtm->rtm_flags & RTF_GATEWAY))
1824 (void)printf(" gateway: %s\n", routename(sp[RTAX_GATEWAY]));
1826 (void)printf(" fib: %u\n", (unsigned int)fib);
1828 (void)printf(" interface: %.*s\n",
1829 ((struct sockaddr_dl *)(void *)sp[RTAX_IFP])->sdl_nlen,
1830 ((struct sockaddr_dl *)(void *)sp[RTAX_IFP])->sdl_data);
1831 (void)printf(" flags: ");
1832 printb(rtm->rtm_flags, routeflags);
1834 #define lock(f) ((rtm->rtm_rmx.rmx_locks & __CONCAT(RTV_,f)) ? 'L' : ' ')
1835 #define msec(u) (((u) + 500) / 1000) /* usec to msec */
1836 printf("\n%9s %9s %9s %9s %9s %10s %9s\n", "recvpipe",
1837 "sendpipe", "ssthresh", "rtt,msec", "mtu ", "weight", "expire");
1838 printf("%8lu%c ", rtm->rtm_rmx.rmx_recvpipe, lock(RPIPE));
1839 printf("%8lu%c ", rtm->rtm_rmx.rmx_sendpipe, lock(SPIPE));
1840 printf("%8lu%c ", rtm->rtm_rmx.rmx_ssthresh, lock(SSTHRESH));
1841 printf("%8lu%c ", msec(rtm->rtm_rmx.rmx_rtt), lock(RTT));
1842 printf("%8lu%c ", rtm->rtm_rmx.rmx_mtu, lock(MTU));
1843 printf("%8lu%c ", rtm->rtm_rmx.rmx_weight, lock(WEIGHT));
1844 if (rtm->rtm_rmx.rmx_expire > 0)
1845 clock_gettime(CLOCK_REALTIME_FAST, &ts);
1848 printf("%8ld%c\n", (long)(rtm->rtm_rmx.rmx_expire - ts.tv_sec),
1852 #define RTA_IGN (RTA_DST|RTA_GATEWAY|RTA_NETMASK|RTA_IFP|RTA_IFA|RTA_BRD)
1854 pmsg_common(rtm, msglen);
1855 else if (rtm->rtm_addrs &~ RTA_IGN) {
1856 (void)printf("sockaddrs: ");
1857 printb(rtm->rtm_addrs, addrnames);
1864 pmsg_common(struct rt_msghdr *rtm, size_t msglen)
1867 (void)printf("\nlocks: ");
1868 printb(rtm->rtm_rmx.rmx_locks, metricnames);
1869 (void)printf(" inits: ");
1870 printb(rtm->rtm_inits, metricnames);
1871 if (msglen > sizeof(struct rt_msghdr))
1872 pmsg_addrs(((char *)(rtm + 1)), rtm->rtm_addrs,
1873 msglen - sizeof(struct rt_msghdr));
1875 (void)fflush(stdout);
1879 pmsg_addrs(char *cp, int addrs, size_t len)
1881 struct sockaddr *sa;
1885 (void)putchar('\n');
1888 (void)printf("\nsockaddrs: ");
1889 printb(addrs, addrnames);
1891 for (i = 0; i < RTAX_MAX; i++)
1892 if (addrs & (1 << i)) {
1893 sa = (struct sockaddr *)cp;
1894 if (len == 0 || len < SA_SIZE(sa)) {
1895 (void)printf(errfmt, __func__, len);
1898 (void)printf(" %s", routename(sa));
1902 (void)putchar('\n');
1903 (void)fflush(stdout);
1907 printb(int b, const char *str)
1914 while ((i = *str++) != 0) {
1915 if (b & (1 << (i-1))) {
1922 for (; (i = *str) > 32; str++)
1933 keyword(const char *cp)
1935 const struct keytab *kt = keywords;
1937 while (kt->kt_cp != NULL && strcmp(kt->kt_cp, cp) != 0)
1943 sodump(struct sockaddr *sa, const char *which)
1946 char nbuf[INET6_ADDRSTRLEN];
1949 switch (sa->sa_family) {
1951 (void)printf("%s: link %s; ", which,
1952 link_ntoa((struct sockaddr_dl *)(void *)sa));
1956 (void)printf("%s: inet %s; ", which,
1957 inet_ntoa(((struct sockaddr_in *)(void *)sa)->sin_addr));
1962 (void)printf("%s: inet6 %s; ", which, inet_ntop(sa->sa_family,
1963 &((struct sockaddr_in6 *)(void *)sa)->sin6_addr, nbuf,
1968 (void)fflush(stdout);
1981 sockaddr(char *addr, struct sockaddr *sa, size_t size)
1983 char *cp = (char *)sa;
1984 char *cplim = cp + size;
1985 int byte = 0, state = VIRGIN, new = 0 /* foil gcc */;
1987 memset(cp, 0, size);
1990 if ((*addr >= '0') && (*addr <= '9')) {
1992 } else if ((*addr >= 'a') && (*addr <= 'f')) {
1993 new = *addr - 'a' + 10;
1994 } else if ((*addr >= 'A') && (*addr <= 'F')) {
1995 new = *addr - 'A' + 10;
1996 } else if (*addr == '\0')
2001 switch (state /* | INPUT */) {
2002 case GOTTWO | DIGIT:
2003 *cp++ = byte; /*FALLTHROUGH*/
2004 case VIRGIN | DIGIT:
2005 state = GOTONE; byte = new; continue;
2006 case GOTONE | DIGIT:
2007 state = GOTTWO; byte = new + (byte << 4); continue;
2008 default: /* | DELIM */
2009 state = VIRGIN; *cp++ = byte; byte = 0; continue;
2012 *cp++ = byte; /* FALLTHROUGH */
2017 } while (cp < cplim);
2018 sa->sa_len = cp - (char *)sa;