1 /* 2 * Copyright (c) 1983, 1988, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * @(#)route.c 8.6 (Berkeley) 4/28/95 34 * $FreeBSD: src/usr.bin/netstat/route.c,v 1.41.2.14 2002/07/17 02:22:22 kbyanc Exp $ 35 * $DragonFly: src/usr.bin/netstat/route.c,v 1.11 2006/01/19 22:19:25 dillon Exp $ 36 */ 37 38 #include <sys/param.h> 39 #include <sys/protosw.h> 40 #include <sys/socket.h> 41 #include <sys/time.h> 42 43 #include <net/ethernet.h> 44 #include <net/if.h> 45 #include <net/if_var.h> 46 #include <net/if_dl.h> 47 #include <net/if_types.h> 48 #include <net/route.h> 49 50 #include <netinet/in.h> 51 #include <netipx/ipx.h> 52 #include <netatalk/at.h> 53 #include <netgraph/socket/ng_socket.h> 54 55 #ifdef NS 56 #include <netns/ns.h> 57 #endif 58 59 #include <sys/sysctl.h> 60 61 #include <arpa/inet.h> 62 #include <libutil.h> 63 #include <netdb.h> 64 #include <stdio.h> 65 #include <stdlib.h> 66 #include <string.h> 67 #include <unistd.h> 68 #include <err.h> 69 #include <time.h> 70 #include <kinfo.h> 71 #include "netstat.h" 72 73 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d))) 74 75 76 /* alignment constraint for routing socket */ 77 #define ROUNDUP(a) \ 78 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) 79 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) 80 81 /* 82 * Definitions for showing gateway flags. 83 */ 84 struct bits { 85 u_long b_mask; 86 char b_val; 87 } bits[] = { 88 { RTF_UP, 'U' }, 89 { RTF_GATEWAY, 'G' }, 90 { RTF_HOST, 'H' }, 91 { RTF_REJECT, 'R' }, 92 { RTF_DYNAMIC, 'D' }, 93 { RTF_MODIFIED, 'M' }, 94 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */ 95 { RTF_CLONING, 'C' }, 96 { RTF_XRESOLVE, 'X' }, 97 { RTF_LLINFO, 'L' }, 98 { RTF_STATIC, 'S' }, 99 { RTF_PROTO1, '1' }, 100 { RTF_PROTO2, '2' }, 101 { RTF_WASCLONED,'W' }, 102 { RTF_PRCLONING,'c' }, 103 { RTF_PROTO3, '3' }, 104 { RTF_BLACKHOLE,'B' }, 105 { RTF_BROADCAST,'b' }, 106 { 0 } 107 }; 108 109 typedef union { 110 long dummy; /* Helps align structure. */ 111 struct sockaddr u_sa; 112 u_short u_data[128]; 113 } sa_u; 114 115 static sa_u pt_u; 116 117 int do_rtent = 0; 118 struct rtentry rtentry; 119 struct radix_node rnode; 120 struct radix_mask rmask; 121 struct radix_node_head *rt_tables[AF_MAX+1]; 122 123 int NewTree = 0; 124 125 static struct sockaddr *kgetsa (struct sockaddr *); 126 static void size_cols (int ef, struct radix_node *rn); 127 static void size_cols_tree (struct radix_node *rn); 128 static void size_cols_rtentry (struct rtentry *rt); 129 static void p_tree (struct radix_node *); 130 static void p_rtnode (void); 131 static void ntreestuff (void); 132 static void np_rtentry (struct rt_msghdr *); 133 static void p_sockaddr (struct sockaddr *, struct sockaddr *, int, int); 134 static const char *fmt_sockaddr (struct sockaddr *sa, struct sockaddr *mask, 135 int flags); 136 static void p_flags (int, char *); 137 static const char *fmt_flags(int f); 138 static void p_rtentry (struct rtentry *); 139 static u_long forgemask (u_long); 140 static void domask (char *, u_long, u_long); 141 142 /* 143 * Print routing tables. 144 */ 145 void 146 routepr(u_long rtree) 147 { 148 struct radix_node_head *rnh, head; 149 int i; 150 151 printf("Routing tables\n"); 152 153 if (Aflag == 0 && NewTree) { 154 ntreestuff(); 155 } else { 156 if (rtree == 0) { 157 printf("rt_tables: symbol not in namelist\n"); 158 return; 159 } 160 if (cpuflag >= 0) { 161 /* 162 * Severe hack. 163 */ 164 rtree += cpuflag * (AF_MAX + 1) * sizeof(void *); 165 } 166 kget(rtree, rt_tables); 167 for (i = 0; i <= AF_MAX; i++) { 168 if ((rnh = rt_tables[i]) == 0) 169 continue; 170 kget(rnh, head); 171 if (i == AF_UNSPEC) { 172 if (Aflag && af == 0) { 173 printf("Netmasks:\n"); 174 p_tree(head.rnh_treetop); 175 } 176 } else if (af == AF_UNSPEC || af == i) { 177 size_cols(i, head.rnh_treetop); 178 pr_family(i); 179 do_rtent = 1; 180 pr_rthdr(i); 181 p_tree(head.rnh_treetop); 182 } 183 } 184 } 185 } 186 187 /* 188 * Print address family header before a section of the routing table. 189 */ 190 void 191 pr_family(int af) 192 { 193 char *afname; 194 195 switch (af) { 196 case AF_INET: 197 afname = "Internet"; 198 break; 199 #ifdef INET6 200 case AF_INET6: 201 afname = "Internet6"; 202 break; 203 #endif /*INET6*/ 204 case AF_IPX: 205 afname = "IPX"; 206 break; 207 #ifdef NS 208 case AF_NS: 209 afname = "XNS"; 210 break; 211 #endif 212 case AF_ISO: 213 afname = "ISO"; 214 break; 215 case AF_APPLETALK: 216 afname = "AppleTalk"; 217 break; 218 case AF_CCITT: 219 afname = "X.25"; 220 break; 221 case AF_NETGRAPH: 222 afname = "Netgraph"; 223 break; 224 default: 225 afname = NULL; 226 break; 227 } 228 if (afname) 229 printf("\n%s:\n", afname); 230 else 231 printf("\nProtocol Family %d:\n", af); 232 } 233 234 /* column widths; each followed by one space */ 235 #ifndef INET6 236 #define WID_DST_DEFAULT(af) 18 /* width of destination column */ 237 #define WID_GW_DEFAULT(af) 18 /* width of gateway column */ 238 #define WID_IF_DEFAULT(af) (Wflag ? 8 : 6) /* width of netif column */ 239 #else 240 #define WID_DST_DEFAULT(af) \ 241 ((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18) 242 #define WID_GW_DEFAULT(af) \ 243 ((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18) 244 #define WID_IF_DEFAULT(af) ((af) == AF_INET6 ? 8 : (Wflag ? 8 :6)) 245 #endif /*INET6*/ 246 247 static int wid_dst; 248 static int wid_gw; 249 static int wid_flags; 250 static int wid_refs; 251 static int wid_use; 252 static int wid_mtu; 253 static int wid_if; 254 static int wid_expire; 255 256 static void 257 size_cols(int ef, struct radix_node *rn) 258 { 259 wid_dst = WID_DST_DEFAULT(ef); 260 wid_gw = WID_GW_DEFAULT(ef); 261 wid_flags = 6; 262 wid_refs = 6; 263 wid_use = 8; 264 wid_mtu = 6; 265 wid_if = WID_IF_DEFAULT(ef); 266 wid_expire = 6; 267 268 if (Wflag) 269 size_cols_tree(rn); 270 } 271 272 static void 273 size_cols_tree(struct radix_node *rn) 274 { 275 again: 276 kget(rn, rnode); 277 if (rnode.rn_bit < 0) { 278 if ((rnode.rn_flags & RNF_ROOT) == 0) { 279 kget(rn, rtentry); 280 size_cols_rtentry(&rtentry); 281 } 282 if ((rn = rnode.rn_dupedkey)) 283 goto again; 284 } else { 285 rn = rnode.rn_right; 286 size_cols_tree(rnode.rn_left); 287 size_cols_tree(rn); 288 } 289 } 290 291 static void 292 size_cols_rtentry(struct rtentry *rt) 293 { 294 static struct ifnet ifnet, *lastif; 295 struct rtentry parent; 296 static char buffer[100]; 297 const char *bp; 298 struct sockaddr *sa; 299 sa_u addr, mask; 300 int len; 301 302 /* 303 * Don't print protocol-cloned routes unless -a. 304 */ 305 if (rt->rt_flags & RTF_WASCLONED && !aflag) { 306 kget(rt->rt_parent, parent); 307 if (parent.rt_flags & RTF_PRCLONING) 308 return; 309 } 310 311 bzero(&addr, sizeof(addr)); 312 if ((sa = kgetsa(rt_key(rt)))) 313 bcopy(sa, &addr, sa->sa_len); 314 bzero(&mask, sizeof(mask)); 315 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt)))) 316 bcopy(sa, &mask, sa->sa_len); 317 bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags); 318 len = strlen(bp); 319 wid_dst = MAX(len, wid_dst); 320 321 bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST); 322 len = strlen(bp); 323 wid_gw = MAX(len, wid_gw); 324 325 bp = fmt_flags(rt->rt_flags); 326 len = strlen(bp); 327 wid_flags = MAX(len, wid_flags); 328 329 if (addr.u_sa.sa_family == AF_INET || Wflag) { 330 len = snprintf(buffer, sizeof(buffer), "%ld", rt->rt_refcnt); 331 wid_refs = MAX(len, wid_refs); 332 len = snprintf(buffer, sizeof(buffer), "%lu", rt->rt_use); 333 wid_use = MAX(len, wid_use); 334 if (Wflag && rt->rt_rmx.rmx_mtu != 0) { 335 len = snprintf(buffer, sizeof(buffer), 336 "%lu", rt->rt_rmx.rmx_mtu); 337 wid_mtu = MAX(len, wid_mtu); 338 } 339 } 340 if (rt->rt_ifp) { 341 if (rt->rt_ifp != lastif) { 342 kget(rt->rt_ifp, ifnet); 343 lastif = rt->rt_ifp; 344 len = strlen(ifnet.if_xname); 345 wid_if = MAX(len, wid_if); 346 } 347 if (rt->rt_rmx.rmx_expire) { 348 time_t expire_time; 349 350 if ((expire_time = 351 rt->rt_rmx.rmx_expire - time(NULL)) > 0) { 352 snprintf(buffer, sizeof(buffer), "%d", 353 (int)expire_time); 354 wid_expire = MAX(len, wid_expire); 355 } 356 } 357 } 358 } 359 360 361 /* 362 * Print header for routing table columns. 363 */ 364 void 365 pr_rthdr(int af) 366 { 367 368 if (Aflag) 369 printf("%-8.8s ","Address"); 370 if (af == AF_INET || Wflag) { 371 if (Wflag) { 372 printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*.*s %*s\n", 373 wid_dst, wid_dst, "Destination", 374 wid_gw, wid_gw, "Gateway", 375 wid_flags, wid_flags, "Flags", 376 wid_refs, wid_refs, "Refs", 377 wid_use, wid_use, "Use", 378 wid_mtu, wid_mtu, "Mtu", 379 wid_if, wid_if, "Netif", 380 wid_expire, "Expire"); 381 } else { 382 printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*s\n", 383 wid_dst, wid_dst, "Destination", 384 wid_gw, wid_gw, "Gateway", 385 wid_flags, wid_flags, "Flags", 386 wid_refs, wid_refs, "Refs", 387 wid_use, wid_use, "Use", 388 wid_if, wid_if, "Netif", 389 wid_expire, "Expire"); 390 } 391 } else { 392 printf("%-*.*s %-*.*s %-*.*s %*.*s %*s\n", 393 wid_dst, wid_dst, "Destination", 394 wid_gw, wid_gw, "Gateway", 395 wid_flags, wid_flags, "Flags", 396 wid_if, wid_if, "Netif", 397 wid_expire, "Expire"); 398 } 399 } 400 401 static struct sockaddr * 402 kgetsa(struct sockaddr *dst) 403 { 404 405 kget(dst, pt_u.u_sa); 406 if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa)) 407 kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len); 408 return (&pt_u.u_sa); 409 } 410 411 static void 412 p_tree(struct radix_node *rn) 413 { 414 415 again: 416 kget(rn, rnode); 417 if (rnode.rn_bit < 0) { 418 if (Aflag) 419 printf("%-8.8lx ", (u_long)rn); 420 if (rnode.rn_flags & RNF_ROOT) { 421 if (Aflag) 422 printf("(root node)%s", 423 rnode.rn_dupedkey ? " =>\n" : "\n"); 424 } else if (do_rtent) { 425 kget(rn, rtentry); 426 p_rtentry(&rtentry); 427 if (Aflag) 428 p_rtnode(); 429 } else { 430 p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key), 431 NULL, 0, 44); 432 putchar('\n'); 433 } 434 if ((rn = rnode.rn_dupedkey)) 435 goto again; 436 } else { 437 if (Aflag && do_rtent) { 438 printf("%-8.8lx ", (u_long)rn); 439 p_rtnode(); 440 } 441 rn = rnode.rn_right; 442 p_tree(rnode.rn_left); 443 p_tree(rn); 444 } 445 } 446 447 char nbuf[20]; 448 449 static void 450 p_rtnode(void) 451 { 452 struct radix_mask *rm = rnode.rn_mklist; 453 454 if (rnode.rn_bit < 0) { 455 if (rnode.rn_mask) { 456 printf("\t mask "); 457 p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask), 458 NULL, 0, -1); 459 } else if (rm == 0) 460 return; 461 } else { 462 sprintf(nbuf, "(%d)", rnode.rn_bit); 463 printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long)rnode.rn_left, (u_long)rnode.rn_right); 464 } 465 while (rm) { 466 kget(rm, rmask); 467 sprintf(nbuf, " %d refs, ", rmask.rm_refs); 468 printf(" mk = %8.8lx {(%d),%s", 469 (u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " "); 470 if (rmask.rm_flags & RNF_NORMAL) { 471 struct radix_node rnode_aux; 472 printf(" <normal>, "); 473 kget(rmask.rm_leaf, rnode_aux); 474 p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask), 475 NULL, 0, -1); 476 } else 477 p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask), 478 NULL, 0, -1); 479 putchar('}'); 480 if ((rm = rmask.rm_next)) 481 printf(" ->"); 482 } 483 putchar('\n'); 484 } 485 486 static void 487 ntreestuff(void) 488 { 489 size_t needed; 490 int mib[7]; 491 int miblen; 492 char *buf, *next, *lim; 493 struct rt_msghdr *rtm; 494 495 mib[0] = CTL_NET; 496 mib[1] = PF_ROUTE; 497 mib[2] = 0; 498 mib[3] = 0; 499 mib[4] = NET_RT_DUMP; 500 mib[5] = 0; 501 if (cpuflag >= 0) { 502 mib[6] = cpuflag; 503 miblen = 7; 504 } else { 505 miblen = 6; 506 } 507 if (sysctl(mib, miblen, NULL, &needed, NULL, 0) < 0) { 508 err(1, "sysctl: net.route.0.0.dump estimate"); 509 } 510 511 if ((buf = malloc(needed)) == 0) { 512 err(2, "malloc(%lu)", (unsigned long)needed); 513 } 514 if (sysctl(mib, miblen, buf, &needed, NULL, 0) < 0) { 515 err(1, "sysctl: net.route.0.0.dump"); 516 } 517 lim = buf + needed; 518 for (next = buf; next < lim; next += rtm->rtm_msglen) { 519 rtm = (struct rt_msghdr *)next; 520 np_rtentry(rtm); 521 } 522 } 523 524 static void 525 np_rtentry(struct rt_msghdr *rtm) 526 { 527 struct sockaddr *sa = (struct sockaddr *)(rtm + 1); 528 #ifdef notdef 529 static int masks_done, banner_printed; 530 #endif 531 static int old_af; 532 int af = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST; 533 534 #ifdef notdef 535 /* for the moment, netmasks are skipped over */ 536 if (!banner_printed) { 537 printf("Netmasks:\n"); 538 banner_printed = 1; 539 } 540 if (masks_done == 0) { 541 if (rtm->rtm_addrs != RTA_DST ) { 542 masks_done = 1; 543 af = sa->sa_family; 544 } 545 } else 546 #endif 547 af = sa->sa_family; 548 if (af != old_af) { 549 pr_family(af); 550 old_af = af; 551 } 552 if (rtm->rtm_addrs == RTA_DST) 553 p_sockaddr(sa, NULL, 0, 36); 554 else { 555 p_sockaddr(sa, NULL, rtm->rtm_flags, 16); 556 sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa); 557 p_sockaddr(sa, NULL, 0, 18); 558 } 559 p_flags(rtm->rtm_flags & interesting, "%-6.6s "); 560 putchar('\n'); 561 } 562 563 static void 564 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width) 565 { 566 const char *cp; 567 568 cp = fmt_sockaddr(sa, mask, flags); 569 570 if (width < 0 ) 571 printf("%s ", cp); 572 else { 573 if (numeric_addr) 574 printf("%-*s ", width, cp); 575 else 576 printf("%-*.*s ", width, width, cp); 577 } 578 } 579 580 static const char * 581 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags) 582 { 583 static char workbuf[128]; 584 char *cplim; 585 char *cp = workbuf; 586 587 switch(sa->sa_family) { 588 case AF_INET: 589 { 590 struct sockaddr_in *sin = (struct sockaddr_in *)sa; 591 592 if ((sin->sin_addr.s_addr == INADDR_ANY) && 593 mask && 594 ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr) 595 ==0L) 596 cp = "default" ; 597 else if (flags & RTF_HOST) 598 cp = routename(sin->sin_addr.s_addr); 599 else if (mask) 600 cp = netname(sin->sin_addr.s_addr, 601 ntohl(((struct sockaddr_in *)mask) 602 ->sin_addr.s_addr)); 603 else 604 cp = netname(sin->sin_addr.s_addr, 0L); 605 break; 606 } 607 608 #ifdef INET6 609 case AF_INET6: 610 { 611 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa; 612 struct in6_addr *in6 = &sa6->sin6_addr; 613 614 /* 615 * XXX: This is a special workaround for KAME kernels. 616 * sin6_scope_id field of SA should be set in the future. 617 */ 618 if (IN6_IS_ADDR_LINKLOCAL(in6) || 619 IN6_IS_ADDR_MC_LINKLOCAL(in6)) { 620 /* XXX: override is ok? */ 621 sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]); 622 *(u_short *)&in6->s6_addr[2] = 0; 623 } 624 625 if (flags & RTF_HOST) 626 cp = routename6(sa6); 627 else if (mask) 628 cp = netname6(sa6, 629 &((struct sockaddr_in6 *)mask)->sin6_addr); 630 else { 631 cp = netname6(sa6, NULL); 632 } 633 break; 634 } 635 #endif /*INET6*/ 636 637 case AF_IPX: 638 { 639 struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr; 640 if (ipx_nullnet(satoipx_addr(work))) 641 cp = "default"; 642 else 643 cp = ipx_print(sa); 644 break; 645 } 646 case AF_APPLETALK: 647 { 648 if (!(flags & RTF_HOST) && mask) 649 cp = atalk_print2(sa,mask,9); 650 else 651 cp = atalk_print(sa,11); 652 break; 653 } 654 case AF_NETGRAPH: 655 { 656 printf("%s", ((struct sockaddr_ng *)sa)->sg_data); 657 break; 658 } 659 #ifdef NS 660 case AF_NS: 661 cp = ns_print(sa); 662 break; 663 #endif 664 665 case AF_LINK: 666 { 667 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; 668 669 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && 670 sdl->sdl_slen == 0) 671 (void) sprintf(workbuf, "link#%d", sdl->sdl_index); 672 else 673 switch (sdl->sdl_type) { 674 675 case IFT_ETHER: 676 case IFT_L2VLAN: 677 if (sdl->sdl_alen == ETHER_ADDR_LEN) { 678 cp = ether_ntoa((struct ether_addr *) 679 (sdl->sdl_data + sdl->sdl_nlen)); 680 break; 681 } 682 /* FALLTHROUGH */ 683 default: 684 cp = link_ntoa(sdl); 685 break; 686 } 687 break; 688 } 689 690 default: 691 { 692 u_char *s = (u_char *)sa->sa_data, *slim; 693 694 slim = sa->sa_len + (u_char *) sa; 695 cplim = cp + sizeof(workbuf) - 6; 696 cp += sprintf(cp, "(%d)", sa->sa_family); 697 while (s < slim && cp < cplim) { 698 cp += sprintf(cp, " %02x", *s++); 699 if (s < slim) 700 cp += sprintf(cp, "%02x", *s++); 701 } 702 cp = workbuf; 703 } 704 } 705 706 return (cp); 707 } 708 709 static void 710 p_flags(int f, char *format) 711 { 712 printf(format, fmt_flags(f)); 713 } 714 715 static const char * 716 fmt_flags(int f) 717 { 718 static char name[33]; 719 char *flags; 720 struct bits *p = bits; 721 722 for (flags = name; p->b_mask; p++) 723 if (p->b_mask & f) 724 *flags++ = p->b_val; 725 *flags = '\0'; 726 return (name); 727 } 728 729 static void 730 p_rtentry(struct rtentry *rt) 731 { 732 static struct ifnet ifnet, *lastif; 733 struct rtentry parent; 734 static char buffer[128]; 735 static char prettyname[128]; 736 struct sockaddr *sa; 737 sa_u addr, mask; 738 739 /* 740 * Don't print protocol-cloned routes unless -a. 741 */ 742 if (rt->rt_flags & RTF_WASCLONED && !aflag) { 743 kget(rt->rt_parent, parent); 744 if (parent.rt_flags & RTF_PRCLONING) 745 return; 746 } 747 748 bzero(&addr, sizeof(addr)); 749 if ((sa = kgetsa(rt_key(rt)))) 750 bcopy(sa, &addr, sa->sa_len); 751 bzero(&mask, sizeof(mask)); 752 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt)))) 753 bcopy(sa, &mask, sa->sa_len); 754 p_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags, wid_dst); 755 p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw); 756 snprintf(buffer, sizeof(buffer), "%%-%d.%ds ", wid_flags, wid_flags); 757 p_flags(rt->rt_flags, buffer); 758 if (addr.u_sa.sa_family == AF_INET || Wflag) { 759 printf("%*ld %*lu ", wid_refs, rt->rt_refcnt, 760 wid_use, rt->rt_use); 761 if (Wflag) { 762 if (rt->rt_rmx.rmx_mtu != 0) 763 printf("%*lu ", wid_mtu, rt->rt_rmx.rmx_mtu); 764 else 765 printf("%*s ", wid_mtu, ""); 766 } 767 } 768 if (rt->rt_ifp) { 769 if (rt->rt_ifp != lastif) { 770 kget(rt->rt_ifp, ifnet); 771 lastif = rt->rt_ifp; 772 strlcpy(prettyname, ifnet.if_xname, sizeof(prettyname)); 773 } 774 printf("%*.*s", wid_if, wid_if, prettyname); 775 if (rt->rt_rmx.rmx_expire) { 776 time_t expire_time; 777 778 if ((expire_time = 779 rt->rt_rmx.rmx_expire - time((time_t *)0)) > 0) 780 printf(" %*d", wid_expire, (int)expire_time); 781 } 782 if (rt->rt_nodes[0].rn_dupedkey) 783 printf(" =>"); 784 } 785 putchar('\n'); 786 } 787 788 char * 789 routename(u_long in) 790 { 791 char *cp; 792 static char line[MAXHOSTNAMELEN]; 793 struct hostent *hp; 794 795 cp = 0; 796 if (!numeric_addr) { 797 hp = gethostbyaddr((char *)&in, sizeof (struct in_addr), 798 AF_INET); 799 if (hp) { 800 cp = hp->h_name; 801 trimdomain(cp, strlen(cp)); 802 } 803 } 804 if (cp) { 805 strncpy(line, cp, sizeof(line) - 1); 806 line[sizeof(line) - 1] = '\0'; 807 } else { 808 #define C(x) ((x) & 0xff) 809 in = ntohl(in); 810 sprintf(line, "%lu.%lu.%lu.%lu", 811 C(in >> 24), C(in >> 16), C(in >> 8), C(in)); 812 } 813 return (line); 814 } 815 816 static u_long 817 forgemask(u_long a) 818 { 819 u_long m; 820 821 if (IN_CLASSA(a)) 822 m = IN_CLASSA_NET; 823 else if (IN_CLASSB(a)) 824 m = IN_CLASSB_NET; 825 else 826 m = IN_CLASSC_NET; 827 return (m); 828 } 829 830 static void 831 domask(char *dst, u_long addr, u_long mask) 832 { 833 int b, i; 834 835 if (!mask || (forgemask(addr) == mask)) { 836 *dst = '\0'; 837 return; 838 } 839 i = 0; 840 for (b = 0; b < 32; b++) 841 if (mask & (1 << b)) { 842 int bb; 843 844 i = b; 845 for (bb = b+1; bb < 32; bb++) 846 if (!(mask & (1 << bb))) { 847 i = -1; /* noncontig */ 848 break; 849 } 850 break; 851 } 852 if (i == -1) 853 sprintf(dst, "&0x%lx", mask); 854 else 855 sprintf(dst, "/%d", 32-i); 856 } 857 858 /* 859 * Return the name of the network whose address is given. 860 * The address is assumed to be that of a net or subnet, not a host. 861 */ 862 char * 863 netname(u_long in, u_long mask) 864 { 865 char *cp = 0; 866 static char line[MAXHOSTNAMELEN]; 867 struct netent *np = 0; 868 u_long dmask; 869 u_long i; 870 871 #define NSHIFT(m) ( \ 872 (m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT : \ 873 (m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT : \ 874 (m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT : \ 875 0) 876 877 i = ntohl(in); 878 dmask = forgemask(i); 879 if (!numeric_addr && i) { 880 np = getnetbyaddr(i >> NSHIFT(mask), AF_INET); 881 if (np == NULL && mask == 0) 882 np = getnetbyaddr(i >> NSHIFT(dmask), AF_INET); 883 if (np != NULL) { 884 cp = np->n_name; 885 trimdomain(cp, strlen(cp)); 886 } 887 } 888 #undef NSHIFT 889 if (cp != NULL) { 890 strncpy(line, cp, sizeof(line) - 1); 891 line[sizeof(line) - 1] = '\0'; 892 } else { 893 switch (dmask) { 894 case IN_CLASSA_NET: 895 if ((i & IN_CLASSA_HOST) == 0) { 896 sprintf(line, "%lu", C(i >> 24)); 897 break; 898 } 899 /* FALLTHROUGH */ 900 case IN_CLASSB_NET: 901 if ((i & IN_CLASSB_HOST) == 0) { 902 sprintf(line, "%lu.%lu", 903 C(i >> 24), C(i >> 16)); 904 break; 905 } 906 /* FALLTHROUGH */ 907 case IN_CLASSC_NET: 908 if ((i & IN_CLASSC_HOST) == 0) { 909 sprintf(line, "%lu.%lu.%lu", 910 C(i >> 24), C(i >> 16), C(i >> 8)); 911 break; 912 } 913 /* FALLTHROUGH */ 914 default: 915 sprintf(line, "%lu.%lu.%lu.%lu", 916 C(i >> 24), C(i >> 16), C(i >> 8), C(i)); 917 break; 918 } 919 } 920 domask(line + strlen(line), i, mask); 921 return (line); 922 } 923 924 #ifdef INET6 925 char * 926 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask) 927 { 928 static char line[MAXHOSTNAMELEN]; 929 u_char *p = (u_char *)mask; 930 u_char *lim; 931 int masklen, illegal = 0, flag = NI_WITHSCOPEID; 932 933 if (mask) { 934 for (masklen = 0, lim = p + 16; p < lim; p++) { 935 switch (*p) { 936 case 0xff: 937 masklen += 8; 938 break; 939 case 0xfe: 940 masklen += 7; 941 break; 942 case 0xfc: 943 masklen += 6; 944 break; 945 case 0xf8: 946 masklen += 5; 947 break; 948 case 0xf0: 949 masklen += 4; 950 break; 951 case 0xe0: 952 masklen += 3; 953 break; 954 case 0xc0: 955 masklen += 2; 956 break; 957 case 0x80: 958 masklen += 1; 959 break; 960 case 0x00: 961 break; 962 default: 963 illegal ++; 964 break; 965 } 966 } 967 if (illegal) 968 fprintf(stderr, "illegal prefixlen\n"); 969 } 970 else 971 masklen = 128; 972 973 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr)) 974 return("default"); 975 976 if (numeric_addr) 977 flag |= NI_NUMERICHOST; 978 getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line), 979 NULL, 0, flag); 980 981 if (numeric_addr) 982 sprintf(&line[strlen(line)], "/%d", masklen); 983 984 return line; 985 } 986 987 char * 988 routename6(struct sockaddr_in6 *sa6) 989 { 990 static char line[MAXHOSTNAMELEN]; 991 int flag = NI_WITHSCOPEID; 992 /* use local variable for safety */ 993 struct sockaddr_in6 sa6_local = {AF_INET6, sizeof(sa6_local),}; 994 995 sa6_local.sin6_addr = sa6->sin6_addr; 996 sa6_local.sin6_scope_id = sa6->sin6_scope_id; 997 998 if (numeric_addr) 999 flag |= NI_NUMERICHOST; 1000 1001 getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len, 1002 line, sizeof(line), NULL, 0, flag); 1003 1004 return line; 1005 } 1006 #endif /*INET6*/ 1007 1008 /* 1009 * Print routing statistics 1010 */ 1011 void 1012 rt_stats(void) 1013 { 1014 struct rtstatistics rts; 1015 int error = 0; 1016 1017 error = kinfo_get_net_rtstatistics(&rts); 1018 if (error) { 1019 printf("routing: could not retrieve statistics\n"); 1020 return; 1021 } 1022 printf("routing:\n"); 1023 1024 #define p(f, m) if (rts.f || sflag <= 1) \ 1025 printf(m, rts.f, plural(rts.f)) 1026 1027 p(rts_badredirect, "\t%lu bad routing redirect%s\n"); 1028 p(rts_dynamic, "\t%lu dynamically created route%s\n"); 1029 p(rts_newgateway, "\t%lu new gateway%s due to redirects\n"); 1030 p(rts_unreach, "\t%lu destination%s found unreachable\n"); 1031 p(rts_wildcard, "\t%lu use%s of a wildcard route\n"); 1032 #undef p 1033 } 1034 1035 char * 1036 ipx_print(struct sockaddr *sa) 1037 { 1038 u_short port; 1039 struct servent *sp = 0; 1040 char *net = "", *host = ""; 1041 char *p; 1042 u_char *q; 1043 struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr; 1044 static char mybuf[50]; 1045 char cport[10], chost[15], cnet[15]; 1046 1047 port = ntohs(work.x_port); 1048 1049 if (ipx_nullnet(work) && ipx_nullhost(work)) { 1050 1051 if (port) { 1052 if (sp) 1053 sprintf(mybuf, "*.%s", sp->s_name); 1054 else 1055 sprintf(mybuf, "*.%x", port); 1056 } else 1057 sprintf(mybuf, "*.*"); 1058 1059 return (mybuf); 1060 } 1061 1062 if (ipx_wildnet(work)) 1063 net = "any"; 1064 else if (ipx_nullnet(work)) 1065 net = "*"; 1066 else { 1067 q = work.x_net.c_net; 1068 sprintf(cnet, "%02x%02x%02x%02x", 1069 q[0], q[1], q[2], q[3]); 1070 for (p = cnet; *p == '0' && p < cnet + 8; p++) 1071 continue; 1072 net = p; 1073 } 1074 1075 if (ipx_wildhost(work)) 1076 host = "any"; 1077 else if (ipx_nullhost(work)) 1078 host = "*"; 1079 else { 1080 q = work.x_host.c_host; 1081 sprintf(chost, "%02x%02x%02x%02x%02x%02x", 1082 q[0], q[1], q[2], q[3], q[4], q[5]); 1083 for (p = chost; *p == '0' && p < chost + 12; p++) 1084 continue; 1085 host = p; 1086 } 1087 1088 if (port) { 1089 if (strcmp(host, "*") == 0) 1090 host = ""; 1091 if (sp) 1092 snprintf(cport, sizeof(cport), 1093 "%s%s", *host ? "." : "", sp->s_name); 1094 else 1095 snprintf(cport, sizeof(cport), 1096 "%s%x", *host ? "." : "", port); 1097 } else 1098 *cport = 0; 1099 1100 snprintf(mybuf, sizeof(mybuf), "%s.%s%s", net, host, cport); 1101 return(mybuf); 1102 } 1103 1104 char * 1105 ipx_phost(struct sockaddr *sa) 1106 { 1107 struct sockaddr_ipx *sipx = (struct sockaddr_ipx *)sa; 1108 struct sockaddr_ipx work; 1109 static union ipx_net ipx_zeronet; 1110 char *p; 1111 struct ipx_addr in; 1112 1113 work = *sipx; 1114 in = work.sipx_addr; 1115 1116 work.sipx_addr.x_port = 0; 1117 work.sipx_addr.x_net = ipx_zeronet; 1118 p = ipx_print((struct sockaddr *)&work); 1119 if (strncmp("*.", p, 2) == 0) p += 2; 1120 1121 return(p); 1122 } 1123 1124 #ifdef NS 1125 short ns_nullh[] = {0,0,0}; 1126 short ns_bh[] = {-1,-1,-1}; 1127 1128 char * 1129 ns_print(struct sockaddr *sa) 1130 { 1131 struct sockaddr_ns *sns = (struct sockaddr_ns*)sa; 1132 struct ns_addr work; 1133 union { union ns_net net_e; u_long long_e; } net; 1134 u_short port; 1135 static char mybuf[50], cport[10], chost[25]; 1136 char *host = ""; 1137 char *p; u_char *q; 1138 1139 work = sns->sns_addr; 1140 port = ntohs(work.x_port); 1141 work.x_port = 0; 1142 net.net_e = work.x_net; 1143 if (ns_nullhost(work) && net.long_e == 0) { 1144 if (port ) { 1145 sprintf(mybuf, "*.%xH", port); 1146 upHex(mybuf); 1147 } else 1148 sprintf(mybuf, "*.*"); 1149 return (mybuf); 1150 } 1151 1152 if (bcmp(ns_bh, work.x_host.c_host, 6) == 0) { 1153 host = "any"; 1154 } else if (bcmp(ns_nullh, work.x_host.c_host, 6) == 0) { 1155 host = "*"; 1156 } else { 1157 q = work.x_host.c_host; 1158 sprintf(chost, "%02x%02x%02x%02x%02x%02xH", 1159 q[0], q[1], q[2], q[3], q[4], q[5]); 1160 for (p = chost; *p == '0' && p < chost + 12; p++) 1161 continue; 1162 host = p; 1163 } 1164 if (port) 1165 sprintf(cport, ".%xH", htons(port)); 1166 else 1167 *cport = 0; 1168 1169 sprintf(mybuf,"%xH.%s%s", ntohl(net.long_e), host, cport); 1170 upHex(mybuf); 1171 return(mybuf); 1172 } 1173 1174 char * 1175 ns_phost(struct sockaddr *sa) 1176 { 1177 struct sockaddr_ns *sns = (struct sockaddr_ns *)sa; 1178 struct sockaddr_ns work; 1179 static union ns_net ns_zeronet; 1180 char *p; 1181 1182 work = *sns; 1183 work.sns_addr.x_port = 0; 1184 work.sns_addr.x_net = ns_zeronet; 1185 1186 p = ns_print((struct sockaddr *)&work); 1187 if (strncmp("0H.", p, 3) == 0) 1188 p += 3; 1189 return(p); 1190 } 1191 #endif 1192 1193 void 1194 upHex(char *p0) 1195 { 1196 char *p = p0; 1197 1198 for (; *p; p++) 1199 switch (*p) { 1200 1201 case 'a': 1202 case 'b': 1203 case 'c': 1204 case 'd': 1205 case 'e': 1206 case 'f': 1207 *p += ('A' - 'a'); 1208 break; 1209 } 1210 } 1211