1 /* 2 * Copyright (c) 1983, 1988, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * @(#)route.c 8.6 (Berkeley) 4/28/95 34 * $FreeBSD: src/usr.bin/netstat/route.c,v 1.41.2.14 2002/07/17 02:22:22 kbyanc Exp $ 35 * $DragonFly: src/usr.bin/netstat/route.c,v 1.13 2008/07/07 22:02:10 nant Exp $ 36 */ 37 38 #include <sys/kinfo.h> 39 #include <sys/param.h> 40 #include <sys/socket.h> 41 #include <sys/time.h> 42 43 #include <net/ethernet.h> 44 #include <net/if.h> 45 #include <net/if_var.h> 46 #include <net/if_dl.h> 47 #include <net/if_types.h> 48 #include <net/route.h> 49 50 #include <netinet/in.h> 51 #include <netipx/ipx.h> 52 #include <netatalk/at.h> 53 #include <netgraph/socket/ng_socket.h> 54 55 #include <netproto/mpls/mpls.h> 56 57 #include <sys/sysctl.h> 58 59 #include <arpa/inet.h> 60 #include <libutil.h> 61 #include <netdb.h> 62 #include <stdio.h> 63 #include <stdlib.h> 64 #include <string.h> 65 #include <unistd.h> 66 #include <err.h> 67 #include <time.h> 68 #include <kinfo.h> 69 #include "netstat.h" 70 71 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d))) 72 73 74 /* alignment constraint for routing socket */ 75 #define ROUNDUP(a) \ 76 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) 77 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) 78 79 /* 80 * Definitions for showing gateway flags. 81 */ 82 struct bits { 83 u_long b_mask; 84 char b_val; 85 } bits[] = { 86 { RTF_UP, 'U' }, 87 { RTF_GATEWAY, 'G' }, 88 { RTF_HOST, 'H' }, 89 { RTF_REJECT, 'R' }, 90 { RTF_DYNAMIC, 'D' }, 91 { RTF_MODIFIED, 'M' }, 92 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */ 93 { RTF_CLONING, 'C' }, 94 { RTF_XRESOLVE, 'X' }, 95 { RTF_LLINFO, 'L' }, 96 { RTF_STATIC, 'S' }, 97 { RTF_PROTO1, '1' }, 98 { RTF_PROTO2, '2' }, 99 { RTF_WASCLONED,'W' }, 100 { RTF_PRCLONING,'c' }, 101 { RTF_PROTO3, '3' }, 102 { RTF_BLACKHOLE,'B' }, 103 { RTF_BROADCAST,'b' }, 104 { RTF_MPLSOPS, 'm' }, 105 { 0, 0 } 106 }; 107 108 typedef union { 109 long dummy; /* Helps align structure. */ 110 struct sockaddr u_sa; 111 u_short u_data[128]; 112 } sa_u; 113 114 static sa_u pt_u; 115 116 int do_rtent = 0; 117 struct rtentry rtentry; 118 struct radix_node rnode; 119 struct radix_mask rmask; 120 struct radix_node_head *rt_tables[AF_MAX+1]; 121 122 int NewTree = 0; 123 124 static struct sockaddr *kgetsa (struct sockaddr *); 125 static void size_cols (int ef, struct radix_node *rn); 126 static void size_cols_tree (struct radix_node *rn); 127 static void size_cols_rtentry (struct rtentry *rt); 128 static void p_tree (struct radix_node *); 129 static void p_rtnode (void); 130 static void ntreestuff (void); 131 static void np_rtentry (struct rt_msghdr *); 132 static void p_sockaddr (struct sockaddr *, struct sockaddr *, int, int); 133 static const char *fmt_sockaddr (struct sockaddr *sa, struct sockaddr *mask, 134 int flags); 135 static void p_flags (int, const char *); 136 static const char *fmt_flags(int f); 137 static void p_rtentry (struct rtentry *); 138 static u_long forgemask (u_long); 139 static void domask (char *, u_long, u_long); 140 static const char *labelops(struct rtentry *); 141 142 /* 143 * Print routing tables. 144 */ 145 void 146 routepr(u_long rtree) 147 { 148 struct radix_node_head *rnh, head; 149 int i; 150 151 printf("Routing tables\n"); 152 153 if (Aflag == 0 && NewTree) { 154 ntreestuff(); 155 } else { 156 if (rtree == 0) { 157 printf("rt_tables: symbol not in namelist\n"); 158 return; 159 } 160 if (cpuflag >= 0) { 161 /* 162 * Severe hack. 163 */ 164 rtree += cpuflag * (AF_MAX + 1) * sizeof(void *); 165 } 166 kget(rtree, rt_tables); 167 for (i = 0; i <= AF_MAX; i++) { 168 if ((rnh = rt_tables[i]) == 0) 169 continue; 170 kget(rnh, head); 171 if (i == AF_UNSPEC) { 172 if (Aflag && af == 0) { 173 printf("Netmasks:\n"); 174 p_tree(head.rnh_treetop); 175 } 176 } else if (af == AF_UNSPEC || af == i) { 177 size_cols(i, head.rnh_treetop); 178 pr_family(i); 179 do_rtent = 1; 180 pr_rthdr(i); 181 p_tree(head.rnh_treetop); 182 } 183 } 184 } 185 } 186 187 /* 188 * Print address family header before a section of the routing table. 189 */ 190 void 191 pr_family(int af1) 192 { 193 const char *afname; 194 195 switch (af1) { 196 case AF_INET: 197 afname = "Internet"; 198 break; 199 #ifdef INET6 200 case AF_INET6: 201 afname = "Internet6"; 202 break; 203 #endif /*INET6*/ 204 case AF_IPX: 205 afname = "IPX"; 206 break; 207 case AF_ISO: 208 afname = "ISO"; 209 break; 210 case AF_APPLETALK: 211 afname = "AppleTalk"; 212 break; 213 case AF_CCITT: 214 afname = "X.25"; 215 break; 216 case AF_NETGRAPH: 217 afname = "Netgraph"; 218 break; 219 case AF_MPLS: 220 afname = "MPLS"; 221 break; 222 default: 223 afname = NULL; 224 break; 225 } 226 if (afname) 227 printf("\n%s:\n", afname); 228 else 229 printf("\nProtocol Family %d:\n", af1); 230 } 231 232 /* column widths; each followed by one space */ 233 #ifndef INET6 234 #define WID_DST_DEFAULT(af) 18 /* width of destination column */ 235 #define WID_GW_DEFAULT(af) 18 /* width of gateway column */ 236 #define WID_IF_DEFAULT(af) (Wflag ? 8 : 6) /* width of netif column */ 237 #else 238 #define WID_DST_DEFAULT(af) \ 239 ((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18) 240 #define WID_GW_DEFAULT(af) \ 241 ((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18) 242 #define WID_IF_DEFAULT(af) ((af) == AF_INET6 ? 8 : (Wflag ? 8 :6)) 243 #endif /*INET6*/ 244 245 static int wid_dst; 246 static int wid_gw; 247 static int wid_flags; 248 static int wid_refs; 249 static int wid_use; 250 static int wid_mtu; 251 static int wid_if; 252 static int wid_expire; 253 static int wid_mplslops; 254 255 static void 256 size_cols(int ef, struct radix_node *rn) 257 { 258 wid_dst = WID_DST_DEFAULT(ef); 259 wid_gw = WID_GW_DEFAULT(ef); 260 wid_flags = 6; 261 wid_refs = 6; 262 wid_use = 8; 263 wid_mtu = 6; 264 wid_if = WID_IF_DEFAULT(ef); 265 wid_expire = 6; 266 wid_mplslops = 7; 267 268 if (Wflag) 269 size_cols_tree(rn); 270 } 271 272 static void 273 size_cols_tree(struct radix_node *rn) 274 { 275 again: 276 kget(rn, rnode); 277 if (rnode.rn_bit < 0) { 278 if ((rnode.rn_flags & RNF_ROOT) == 0) { 279 kget(rn, rtentry); 280 size_cols_rtentry(&rtentry); 281 } 282 if ((rn = rnode.rn_dupedkey)) 283 goto again; 284 } else { 285 rn = rnode.rn_right; 286 size_cols_tree(rnode.rn_left); 287 size_cols_tree(rn); 288 } 289 } 290 291 static void 292 size_cols_rtentry(struct rtentry *rt) 293 { 294 static struct ifnet ifnet, *lastif; 295 struct rtentry parent; 296 static char buffer[100]; 297 const char *bp; 298 struct sockaddr *sa; 299 sa_u addr, mask; 300 int len; 301 302 /* 303 * Don't print protocol-cloned routes unless -a. 304 */ 305 if (rt->rt_flags & RTF_WASCLONED && !aflag) { 306 kget(rt->rt_parent, parent); 307 if (parent.rt_flags & RTF_PRCLONING) 308 return; 309 } 310 311 bzero(&addr, sizeof(addr)); 312 if ((sa = kgetsa(rt_key(rt)))) 313 bcopy(sa, &addr, sa->sa_len); 314 bzero(&mask, sizeof(mask)); 315 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt)))) 316 bcopy(sa, &mask, sa->sa_len); 317 bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags); 318 len = strlen(bp); 319 wid_dst = MAX(len, wid_dst); 320 321 bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST); 322 len = strlen(bp); 323 wid_gw = MAX(len, wid_gw); 324 325 bp = fmt_flags(rt->rt_flags); 326 len = strlen(bp); 327 wid_flags = MAX(len, wid_flags); 328 329 if (addr.u_sa.sa_family == AF_INET || Wflag) { 330 len = snprintf(buffer, sizeof(buffer), "%ld", rt->rt_refcnt); 331 wid_refs = MAX(len, wid_refs); 332 len = snprintf(buffer, sizeof(buffer), "%lu", rt->rt_use); 333 wid_use = MAX(len, wid_use); 334 if (Wflag && rt->rt_rmx.rmx_mtu != 0) { 335 len = snprintf(buffer, sizeof(buffer), 336 "%lu", rt->rt_rmx.rmx_mtu); 337 wid_mtu = MAX(len, wid_mtu); 338 } 339 } 340 if (rt->rt_ifp) { 341 if (rt->rt_ifp != lastif) { 342 kget(rt->rt_ifp, ifnet); 343 lastif = rt->rt_ifp; 344 len = strlen(ifnet.if_xname); 345 wid_if = MAX(len, wid_if); 346 } 347 if (rt->rt_rmx.rmx_expire) { 348 time_t expire_time; 349 350 if ((expire_time = 351 rt->rt_rmx.rmx_expire - time(NULL)) > 0) { 352 snprintf(buffer, sizeof(buffer), "%d", 353 (int)expire_time); 354 wid_expire = MAX(len, wid_expire); 355 } 356 } 357 } 358 if (rt->rt_shim[0] != NULL) 359 len = strlen(labelops(rt)); 360 wid_mplslops = MAX(len, wid_mplslops); 361 } 362 363 364 /* 365 * Print header for routing table columns. 366 */ 367 void 368 pr_rthdr(int af1) 369 { 370 371 if (Aflag) 372 printf("%-8.8s ","Address"); 373 if (af1 == AF_INET || Wflag) { 374 if (Wflag) { 375 printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*.*s %*s %-*s\n", 376 wid_dst, wid_dst, "Destination", 377 wid_gw, wid_gw, "Gateway", 378 wid_flags, wid_flags, "Flags", 379 wid_refs, wid_refs, "Refs", 380 wid_use, wid_use, "Use", 381 wid_mtu, wid_mtu, "Mtu", 382 wid_if, wid_if, "Netif", 383 wid_expire, "Expire", 384 wid_mplslops, "Labelops"); 385 } else { 386 printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*s\n", 387 wid_dst, wid_dst, "Destination", 388 wid_gw, wid_gw, "Gateway", 389 wid_flags, wid_flags, "Flags", 390 wid_refs, wid_refs, "Refs", 391 wid_use, wid_use, "Use", 392 wid_if, wid_if, "Netif", 393 wid_expire, "Expire"); 394 } 395 } else { 396 printf("%-*.*s %-*.*s %-*.*s %*.*s %*s\n", 397 wid_dst, wid_dst, "Destination", 398 wid_gw, wid_gw, "Gateway", 399 wid_flags, wid_flags, "Flags", 400 wid_if, wid_if, "Netif", 401 wid_expire, "Expire"); 402 } 403 } 404 405 static struct sockaddr * 406 kgetsa(struct sockaddr *dst) 407 { 408 409 kget(dst, pt_u.u_sa); 410 if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa)) 411 kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len); 412 return (&pt_u.u_sa); 413 } 414 415 static void 416 p_tree(struct radix_node *rn) 417 { 418 419 again: 420 kget(rn, rnode); 421 if (rnode.rn_bit < 0) { 422 if (Aflag) 423 printf("%-8.8lx ", (u_long)rn); 424 if (rnode.rn_flags & RNF_ROOT) { 425 if (Aflag) 426 printf("(root node)%s", 427 rnode.rn_dupedkey ? " =>\n" : "\n"); 428 } else if (do_rtent) { 429 kget(rn, rtentry); 430 p_rtentry(&rtentry); 431 if (Aflag) 432 p_rtnode(); 433 } else { 434 p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key), 435 NULL, 0, 44); 436 putchar('\n'); 437 } 438 if ((rn = rnode.rn_dupedkey)) 439 goto again; 440 } else { 441 if (Aflag && do_rtent) { 442 printf("%-8.8lx ", (u_long)rn); 443 p_rtnode(); 444 } 445 rn = rnode.rn_right; 446 p_tree(rnode.rn_left); 447 p_tree(rn); 448 } 449 } 450 451 char nbuf[20]; 452 453 static void 454 p_rtnode(void) 455 { 456 struct radix_mask *rm = rnode.rn_mklist; 457 458 if (rnode.rn_bit < 0) { 459 if (rnode.rn_mask) { 460 printf("\t mask "); 461 p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask), 462 NULL, 0, -1); 463 } else if (rm == 0) 464 return; 465 } else { 466 sprintf(nbuf, "(%d)", rnode.rn_bit); 467 printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long)rnode.rn_left, (u_long)rnode.rn_right); 468 } 469 while (rm) { 470 kget(rm, rmask); 471 sprintf(nbuf, " %d refs, ", rmask.rm_refs); 472 printf(" mk = %8.8lx {(%d),%s", 473 (u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " "); 474 if (rmask.rm_flags & RNF_NORMAL) { 475 struct radix_node rnode_aux; 476 printf(" <normal>, "); 477 kget(rmask.rm_leaf, rnode_aux); 478 p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask), 479 NULL, 0, -1); 480 } else 481 p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask), 482 NULL, 0, -1); 483 putchar('}'); 484 if ((rm = rmask.rm_next)) 485 printf(" ->"); 486 } 487 putchar('\n'); 488 } 489 490 static void 491 ntreestuff(void) 492 { 493 size_t needed; 494 int mib[7]; 495 int miblen; 496 char *buf, *next, *lim; 497 struct rt_msghdr *rtm; 498 499 mib[0] = CTL_NET; 500 mib[1] = PF_ROUTE; 501 mib[2] = 0; 502 mib[3] = 0; 503 mib[4] = NET_RT_DUMP; 504 mib[5] = 0; 505 if (cpuflag >= 0) { 506 mib[6] = cpuflag; 507 miblen = 7; 508 } else { 509 miblen = 6; 510 } 511 if (sysctl(mib, miblen, NULL, &needed, NULL, 0) < 0) { 512 err(1, "sysctl: net.route.0.0.dump estimate"); 513 } 514 515 if ((buf = malloc(needed)) == 0) { 516 err(2, "malloc(%lu)", (unsigned long)needed); 517 } 518 if (sysctl(mib, miblen, buf, &needed, NULL, 0) < 0) { 519 err(1, "sysctl: net.route.0.0.dump"); 520 } 521 lim = buf + needed; 522 for (next = buf; next < lim; next += rtm->rtm_msglen) { 523 rtm = (struct rt_msghdr *)next; 524 np_rtentry(rtm); 525 } 526 } 527 528 static void 529 np_rtentry(struct rt_msghdr *rtm) 530 { 531 struct sockaddr *sa = (struct sockaddr *)(rtm + 1); 532 #ifdef notdef 533 static int masks_done, banner_printed; 534 #endif 535 static int old_af; 536 int af1 = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST; 537 538 #ifdef notdef 539 /* for the moment, netmasks are skipped over */ 540 if (!banner_printed) { 541 printf("Netmasks:\n"); 542 banner_printed = 1; 543 } 544 if (masks_done == 0) { 545 if (rtm->rtm_addrs != RTA_DST ) { 546 masks_done = 1; 547 af1 = sa->sa_family; 548 } 549 } else 550 #endif 551 af1 = sa->sa_family; 552 if (af1 != old_af) { 553 pr_family(af1); 554 old_af = af1; 555 } 556 if (rtm->rtm_addrs == RTA_DST) 557 p_sockaddr(sa, NULL, 0, 36); 558 else { 559 p_sockaddr(sa, NULL, rtm->rtm_flags, 16); 560 sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa); 561 p_sockaddr(sa, NULL, 0, 18); 562 } 563 p_flags(rtm->rtm_flags & interesting, "%-6.6s "); 564 putchar('\n'); 565 } 566 567 static void 568 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width) 569 { 570 const char *cp; 571 572 cp = fmt_sockaddr(sa, mask, flags); 573 574 if (width < 0 ) 575 printf("%s ", cp); 576 else { 577 if (numeric_addr) 578 printf("%-*s ", width, cp); 579 else 580 printf("%-*.*s ", width, width, cp); 581 } 582 } 583 584 static const char * 585 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags) 586 { 587 static char workbuf[128]; 588 const char *cp = workbuf; 589 590 switch(sa->sa_family) { 591 case AF_INET: 592 { 593 struct sockaddr_in *sin = (struct sockaddr_in *)sa; 594 595 if ((sin->sin_addr.s_addr == INADDR_ANY) && 596 mask && 597 ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr) 598 ==0L) 599 cp = "default" ; 600 else if (flags & RTF_HOST) 601 cp = routename(sin->sin_addr.s_addr); 602 else if (mask) 603 cp = netname(sin->sin_addr.s_addr, 604 ntohl(((struct sockaddr_in *)mask) 605 ->sin_addr.s_addr)); 606 else 607 cp = netname(sin->sin_addr.s_addr, 0L); 608 break; 609 } 610 611 #ifdef INET6 612 case AF_INET6: 613 { 614 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa; 615 struct in6_addr *in6 = &sa6->sin6_addr; 616 617 /* 618 * XXX: This is a special workaround for KAME kernels. 619 * sin6_scope_id field of SA should be set in the future. 620 */ 621 if (IN6_IS_ADDR_LINKLOCAL(in6) || 622 IN6_IS_ADDR_MC_LINKLOCAL(in6)) { 623 /* XXX: override is ok? */ 624 sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]); 625 *(u_short *)&in6->s6_addr[2] = 0; 626 } 627 628 if (flags & RTF_HOST) 629 cp = routename6(sa6); 630 else if (mask) 631 cp = netname6(sa6, 632 &((struct sockaddr_in6 *)mask)->sin6_addr); 633 else { 634 cp = netname6(sa6, NULL); 635 } 636 break; 637 } 638 #endif /*INET6*/ 639 640 case AF_IPX: 641 { 642 struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr; 643 if (ipx_nullnet(satoipx_addr(work))) 644 cp = "default"; 645 else 646 cp = ipx_print(sa); 647 break; 648 } 649 case AF_APPLETALK: 650 { 651 if (!(flags & RTF_HOST) && mask) 652 cp = atalk_print2(sa,mask,9); 653 else 654 cp = atalk_print(sa,11); 655 break; 656 } 657 case AF_NETGRAPH: 658 { 659 printf("%s", ((struct sockaddr_ng *)sa)->sg_data); 660 break; 661 } 662 case AF_LINK: 663 { 664 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; 665 666 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && 667 sdl->sdl_slen == 0) 668 (void) sprintf(workbuf, "link#%d", sdl->sdl_index); 669 else 670 switch (sdl->sdl_type) { 671 672 case IFT_ETHER: 673 case IFT_L2VLAN: 674 if (sdl->sdl_alen == ETHER_ADDR_LEN) { 675 cp = ether_ntoa((struct ether_addr *) 676 (sdl->sdl_data + sdl->sdl_nlen)); 677 break; 678 } 679 /* FALLTHROUGH */ 680 default: 681 cp = link_ntoa(sdl); 682 break; 683 } 684 break; 685 } 686 687 case AF_MPLS: 688 { 689 struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa; 690 691 (void) sprintf(workbuf, "%d", ntohl(smpls->smpls_label)); 692 break; 693 } 694 695 default: 696 { 697 u_char *s = (u_char *)sa->sa_data, *slim; 698 char *cq, *cqlim; 699 700 cq = workbuf; 701 slim = sa->sa_len + (u_char *) sa; 702 cqlim = cq + sizeof(workbuf) - 6; 703 cq += sprintf(cq, "(%d)", sa->sa_family); 704 while (s < slim && cq < cqlim) { 705 cq += sprintf(cq, " %02x", *s++); 706 if (s < slim) 707 cq += sprintf(cq, "%02x", *s++); 708 } 709 cp = workbuf; 710 } 711 } 712 713 return (cp); 714 } 715 716 static void 717 p_flags(int f, const char *format) 718 { 719 printf(format, fmt_flags(f)); 720 } 721 722 static const char * 723 fmt_flags(int f) 724 { 725 static char name[33]; 726 char *flags; 727 struct bits *p = bits; 728 729 for (flags = name; p->b_mask; p++) 730 if (p->b_mask & f) 731 *flags++ = p->b_val; 732 *flags = '\0'; 733 return (name); 734 } 735 736 static void 737 p_rtentry(struct rtentry *rt) 738 { 739 static struct ifnet ifnet, *lastif; 740 struct rtentry parent; 741 static char buffer[128]; 742 static char prettyname[128]; 743 struct sockaddr *sa; 744 sa_u addr, mask; 745 746 /* 747 * Don't print protocol-cloned routes unless -a. 748 */ 749 if (rt->rt_flags & RTF_WASCLONED && !aflag) { 750 kget(rt->rt_parent, parent); 751 if (parent.rt_flags & RTF_PRCLONING) 752 return; 753 } 754 755 bzero(&addr, sizeof(addr)); 756 if ((sa = kgetsa(rt_key(rt)))) 757 bcopy(sa, &addr, sa->sa_len); 758 bzero(&mask, sizeof(mask)); 759 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt)))) 760 bcopy(sa, &mask, sa->sa_len); 761 p_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags, wid_dst); 762 p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw); 763 snprintf(buffer, sizeof(buffer), "%%-%d.%ds ", wid_flags, wid_flags); 764 p_flags(rt->rt_flags, buffer); 765 if (addr.u_sa.sa_family == AF_INET || Wflag) { 766 printf("%*ld %*lu ", wid_refs, rt->rt_refcnt, 767 wid_use, rt->rt_use); 768 if (Wflag) { 769 if (rt->rt_rmx.rmx_mtu != 0) 770 printf("%*lu ", wid_mtu, rt->rt_rmx.rmx_mtu); 771 else 772 printf("%*s ", wid_mtu, ""); 773 } 774 } 775 if (rt->rt_ifp) { 776 if (rt->rt_ifp != lastif) { 777 kget(rt->rt_ifp, ifnet); 778 lastif = rt->rt_ifp; 779 strlcpy(prettyname, ifnet.if_xname, sizeof(prettyname)); 780 } 781 printf("%*.*s", wid_if, wid_if, prettyname); 782 if (rt->rt_rmx.rmx_expire) { 783 time_t expire_time; 784 785 if ((expire_time = 786 rt->rt_rmx.rmx_expire - time(NULL)) > 0) 787 printf(" %*d", wid_expire, (int)expire_time); 788 } else { 789 printf("%*s ", wid_expire, ""); 790 } 791 if (rt->rt_nodes[0].rn_dupedkey) 792 printf(" =>"); 793 } 794 if (Wflag) { 795 if (rt->rt_shim[0] != NULL) 796 printf(" %-*s", wid_mplslops, labelops(rt)); 797 } 798 putchar('\n'); 799 } 800 801 char * 802 routename(u_long in) 803 { 804 char *cp; 805 static char line[MAXHOSTNAMELEN]; 806 struct hostent *hp; 807 808 cp = 0; 809 if (!numeric_addr) { 810 hp = gethostbyaddr(&in, sizeof (struct in_addr), AF_INET); 811 if (hp) { 812 cp = hp->h_name; 813 trimdomain(cp, strlen(cp)); 814 } 815 } 816 if (cp) { 817 strncpy(line, cp, sizeof(line) - 1); 818 line[sizeof(line) - 1] = '\0'; 819 } else { 820 #define C(x) ((x) & 0xff) 821 in = ntohl(in); 822 sprintf(line, "%lu.%lu.%lu.%lu", 823 C(in >> 24), C(in >> 16), C(in >> 8), C(in)); 824 } 825 return (line); 826 } 827 828 static u_long 829 forgemask(u_long a) 830 { 831 u_long m; 832 833 if (IN_CLASSA(a)) 834 m = IN_CLASSA_NET; 835 else if (IN_CLASSB(a)) 836 m = IN_CLASSB_NET; 837 else 838 m = IN_CLASSC_NET; 839 return (m); 840 } 841 842 static void 843 domask(char *dst, u_long addr, u_long mask) 844 { 845 int b, i; 846 847 if (!mask || (forgemask(addr) == mask)) { 848 *dst = '\0'; 849 return; 850 } 851 i = 0; 852 for (b = 0; b < 32; b++) 853 if (mask & (1 << b)) { 854 int bb; 855 856 i = b; 857 for (bb = b+1; bb < 32; bb++) 858 if (!(mask & (1 << bb))) { 859 i = -1; /* noncontig */ 860 break; 861 } 862 break; 863 } 864 if (i == -1) 865 sprintf(dst, "&0x%lx", mask); 866 else 867 sprintf(dst, "/%d", 32-i); 868 } 869 870 /* 871 * Return the name of the network whose address is given. 872 * The address is assumed to be that of a net or subnet, not a host. 873 */ 874 char * 875 netname(u_long in, u_long mask) 876 { 877 char *cp = 0; 878 static char line[MAXHOSTNAMELEN]; 879 struct netent *np = 0; 880 u_long dmask; 881 u_long i; 882 883 #define NSHIFT(m) ( \ 884 (m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT : \ 885 (m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT : \ 886 (m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT : \ 887 0) 888 889 i = ntohl(in); 890 dmask = forgemask(i); 891 if (!numeric_addr && i) { 892 np = getnetbyaddr(i >> NSHIFT(mask), AF_INET); 893 if (np == NULL && mask == 0) 894 np = getnetbyaddr(i >> NSHIFT(dmask), AF_INET); 895 if (np != NULL) { 896 cp = np->n_name; 897 trimdomain(cp, strlen(cp)); 898 } 899 } 900 #undef NSHIFT 901 if (cp != NULL) { 902 strncpy(line, cp, sizeof(line) - 1); 903 line[sizeof(line) - 1] = '\0'; 904 } else { 905 if (mask <= IN_CLASSA_NET && 906 (i & IN_CLASSA_HOST) == 0) { 907 sprintf(line, "%lu", C(i >> 24)); 908 } else if (mask <= IN_CLASSB_NET && 909 (i & IN_CLASSB_HOST) == 0) { 910 sprintf(line, "%lu.%lu", 911 C(i >> 24), C(i >> 16)); 912 } else if (mask <= IN_CLASSC_NET && 913 (i & IN_CLASSC_HOST) == 0) { 914 sprintf(line, "%lu.%lu.%lu", 915 C(i >> 24), C(i >> 16), C(i >> 8)); 916 } else { 917 sprintf(line, "%lu.%lu.%lu.%lu", 918 C(i >> 24), C(i >> 16), C(i >> 8), C(i)); 919 } 920 } 921 domask(line + strlen(line), i, mask); 922 return (line); 923 } 924 925 #ifdef INET6 926 const char * 927 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask) 928 { 929 static char line[MAXHOSTNAMELEN]; 930 u_char *p = (u_char *)mask; 931 u_char *lim; 932 int masklen, illegal = 0, flag = NI_WITHSCOPEID; 933 934 if (mask) { 935 for (masklen = 0, lim = p + 16; p < lim; p++) { 936 switch (*p) { 937 case 0xff: 938 masklen += 8; 939 break; 940 case 0xfe: 941 masklen += 7; 942 break; 943 case 0xfc: 944 masklen += 6; 945 break; 946 case 0xf8: 947 masklen += 5; 948 break; 949 case 0xf0: 950 masklen += 4; 951 break; 952 case 0xe0: 953 masklen += 3; 954 break; 955 case 0xc0: 956 masklen += 2; 957 break; 958 case 0x80: 959 masklen += 1; 960 break; 961 case 0x00: 962 break; 963 default: 964 illegal ++; 965 break; 966 } 967 } 968 if (illegal) 969 fprintf(stderr, "illegal prefixlen\n"); 970 } 971 else 972 masklen = 128; 973 974 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr)) 975 return("default"); 976 977 if (numeric_addr) 978 flag |= NI_NUMERICHOST; 979 getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line), 980 NULL, 0, flag); 981 982 if (numeric_addr) 983 sprintf(&line[strlen(line)], "/%d", masklen); 984 985 return line; 986 } 987 988 char * 989 routename6(struct sockaddr_in6 *sa6) 990 { 991 static char line[MAXHOSTNAMELEN]; 992 int flag = NI_WITHSCOPEID; 993 /* use local variable for safety */ 994 struct sockaddr_in6 sa6_local; 995 996 sa6_local.sin6_family = AF_INET6; 997 sa6_local.sin6_len = sizeof(sa6_local); 998 sa6_local.sin6_addr = sa6->sin6_addr; 999 sa6_local.sin6_scope_id = sa6->sin6_scope_id; 1000 1001 if (numeric_addr) 1002 flag |= NI_NUMERICHOST; 1003 1004 getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len, 1005 line, sizeof(line), NULL, 0, flag); 1006 1007 return line; 1008 } 1009 #endif /*INET6*/ 1010 1011 /* 1012 * Print routing statistics 1013 */ 1014 void 1015 rt_stats(void) 1016 { 1017 struct rtstatistics rts; 1018 int error = 0; 1019 1020 error = kinfo_get_net_rtstatistics(&rts); 1021 if (error) { 1022 printf("routing: could not retrieve statistics\n"); 1023 return; 1024 } 1025 printf("routing:\n"); 1026 1027 #define p(f, m) if (rts.f || sflag <= 1) \ 1028 printf(m, rts.f, plural(rts.f)) 1029 1030 p(rts_badredirect, "\t%lu bad routing redirect%s\n"); 1031 p(rts_dynamic, "\t%lu dynamically created route%s\n"); 1032 p(rts_newgateway, "\t%lu new gateway%s due to redirects\n"); 1033 p(rts_unreach, "\t%lu destination%s found unreachable\n"); 1034 p(rts_wildcard, "\t%lu use%s of a wildcard route\n"); 1035 #undef p 1036 } 1037 1038 char * 1039 ipx_print(struct sockaddr *sa) 1040 { 1041 u_short port; 1042 struct servent *sp = 0; 1043 const char *net = "", *host = ""; 1044 char *p; 1045 u_char *q; 1046 struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr; 1047 static char mybuf[50]; 1048 char cport[10], chost[15], cnet[15]; 1049 1050 port = ntohs(work.x_port); 1051 1052 if (ipx_nullnet(work) && ipx_nullhost(work)) { 1053 1054 if (port) { 1055 if (sp) 1056 sprintf(mybuf, "*.%s", sp->s_name); 1057 else 1058 sprintf(mybuf, "*.%x", port); 1059 } else 1060 sprintf(mybuf, "*.*"); 1061 1062 return (mybuf); 1063 } 1064 1065 if (ipx_wildnet(work)) 1066 net = "any"; 1067 else if (ipx_nullnet(work)) 1068 net = "*"; 1069 else { 1070 q = work.x_net.c_net; 1071 sprintf(cnet, "%02x%02x%02x%02x", 1072 q[0], q[1], q[2], q[3]); 1073 for (p = cnet; *p == '0' && p < cnet + 8; p++) 1074 continue; 1075 net = p; 1076 } 1077 1078 if (ipx_wildhost(work)) 1079 host = "any"; 1080 else if (ipx_nullhost(work)) 1081 host = "*"; 1082 else { 1083 q = work.x_host.c_host; 1084 sprintf(chost, "%02x%02x%02x%02x%02x%02x", 1085 q[0], q[1], q[2], q[3], q[4], q[5]); 1086 for (p = chost; *p == '0' && p < chost + 12; p++) 1087 continue; 1088 host = p; 1089 } 1090 1091 if (port) { 1092 if (strcmp(host, "*") == 0) 1093 host = ""; 1094 if (sp) 1095 snprintf(cport, sizeof(cport), 1096 "%s%s", *host ? "." : "", sp->s_name); 1097 else 1098 snprintf(cport, sizeof(cport), 1099 "%s%x", *host ? "." : "", port); 1100 } else 1101 *cport = 0; 1102 1103 snprintf(mybuf, sizeof(mybuf), "%s.%s%s", net, host, cport); 1104 return(mybuf); 1105 } 1106 1107 char * 1108 ipx_phost(struct sockaddr *sa) 1109 { 1110 struct sockaddr_ipx *sipx = (struct sockaddr_ipx *)sa; 1111 struct sockaddr_ipx work; 1112 static union ipx_net ipx_zeronet; 1113 char *p; 1114 struct ipx_addr in; 1115 1116 work = *sipx; 1117 in = work.sipx_addr; 1118 1119 work.sipx_addr.x_port = 0; 1120 work.sipx_addr.x_net = ipx_zeronet; 1121 p = ipx_print((struct sockaddr *)&work); 1122 if (strncmp("*.", p, 2) == 0) p += 2; 1123 1124 return(p); 1125 } 1126 1127 void 1128 upHex(char *p0) 1129 { 1130 char *p = p0; 1131 1132 for (; *p; p++) 1133 switch (*p) { 1134 1135 case 'a': 1136 case 'b': 1137 case 'c': 1138 case 'd': 1139 case 'e': 1140 case 'f': 1141 *p += ('A' - 'a'); 1142 break; 1143 } 1144 } 1145 1146 static const char * 1147 labelops(struct rtentry *rt) 1148 { 1149 const char *lops[] = { "push", "pop", "swap", "pop all" }; 1150 static char buffer[100]; 1151 char *cp = buffer; 1152 struct sockaddr_mpls *smpls; 1153 int i; 1154 1155 for (i=0; i<MPLS_MAXLOPS; ++i) { 1156 1157 if (rt->rt_shim[i] == NULL) 1158 break; 1159 if (i>0) { 1160 cp += snprintf(cp, 1161 sizeof(buffer) - (cp - buffer), 1162 ", "); 1163 } 1164 smpls = (struct sockaddr_mpls *)kgetsa(rt->rt_shim[i]); 1165 if (smpls->smpls_op != MPLSLOP_POP && 1166 smpls->smpls_op != MPLSLOP_POPALL){ 1167 cp += snprintf(cp, 1168 sizeof(buffer) - (cp - buffer), 1169 "%s %d", 1170 lops[smpls->smpls_op - 1], 1171 ntohl(smpls->smpls_label)); 1172 } else { 1173 cp += snprintf(cp, 1174 sizeof(buffer) - (cp - buffer), 1175 "%s", 1176 lops[smpls->smpls_op - 1]); 1177 } 1178 } 1179 1180 return (buffer); 1181 } 1182