1 /* 2 * Copyright (c) 1983, 1988, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the University nor the names of its contributors 14 * may be used to endorse or promote products derived from this software 15 * without specific prior written permission. 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27 * SUCH DAMAGE. 28 * 29 * @(#)route.c 8.6 (Berkeley) 4/28/95 30 * $FreeBSD: src/usr.bin/netstat/route.c,v 1.41.2.14 2002/07/17 02:22:22 kbyanc Exp $ 31 */ 32 33 #define _KERNEL_STRUCTURES 34 #include <sys/kinfo.h> 35 #include <sys/param.h> 36 #include <sys/socket.h> 37 #include <sys/time.h> 38 39 #include <net/ethernet.h> 40 #include <net/if.h> 41 #include <net/if_var.h> /* for struct ifnet */ 42 #include <net/if_dl.h> 43 #include <net/if_types.h> 44 #include <net/route.h> 45 46 #include <netinet/in.h> 47 #include <netgraph/socket/ng_socket.h> 48 49 #include <netproto/mpls/mpls.h> 50 51 #include <sys/sysctl.h> 52 53 #include <arpa/inet.h> 54 #include <libutil.h> 55 #include <netdb.h> 56 #include <stdio.h> 57 #include <stdlib.h> 58 #include <string.h> 59 #include <unistd.h> 60 #include <err.h> 61 #include <time.h> 62 #include <kinfo.h> 63 #include "netstat.h" 64 65 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d))) 66 #define constSA(x) ((const struct sockaddr *)(x)) 67 68 /* 69 * Definitions for showing gateway flags. 70 */ 71 struct bits { 72 u_long b_mask; 73 char b_val; 74 } bits[] = { 75 { RTF_UP, 'U' }, 76 { RTF_GATEWAY, 'G' }, 77 { RTF_HOST, 'H' }, 78 { RTF_REJECT, 'R' }, 79 { RTF_DYNAMIC, 'D' }, 80 { RTF_MODIFIED, 'M' }, 81 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */ 82 { RTF_CLONING, 'C' }, 83 { RTF_XRESOLVE, 'X' }, 84 { RTF_LLINFO, 'L' }, 85 { RTF_STATIC, 'S' }, 86 { RTF_PROTO1, '1' }, 87 { RTF_PROTO2, '2' }, 88 { RTF_WASCLONED,'W' }, 89 { RTF_PRCLONING,'c' }, 90 { RTF_PROTO3, '3' }, 91 { RTF_BLACKHOLE,'B' }, 92 { RTF_BROADCAST,'b' }, 93 { RTF_MPLSOPS, 'm' }, 94 { 0, 0 } 95 }; 96 97 typedef union { 98 long dummy; /* Helps align structure. */ 99 struct sockaddr u_sa; 100 u_short u_data[128]; 101 } sa_u; 102 103 static sa_u pt_u; 104 105 int do_rtent = 0; 106 struct rtentry rtentry; 107 struct radix_node rnode; 108 struct radix_mask rmask; 109 struct radix_node_head *rt_tables[AF_MAX+1]; 110 111 int NewTree = 0; 112 113 static struct sockaddr *kgetsa (const struct sockaddr *); 114 static void size_cols (int ef, struct radix_node *rn); 115 static void size_cols_tree (struct radix_node *rn); 116 static void size_cols_rtentry (struct rtentry *rt); 117 static void p_tree (struct radix_node *); 118 static void p_rtnode (void); 119 static void ntreestuff (void); 120 static void np_rtentry (struct rt_msghdr *); 121 static void p_sockaddr (struct sockaddr *, struct sockaddr *, int, int); 122 static const char *fmt_sockaddr (struct sockaddr *sa, struct sockaddr *mask, 123 int flags); 124 static void p_flags (int, const char *); 125 static const char *fmt_flags(int f); 126 static void p_rtentry (struct rtentry *); 127 static u_long forgemask (u_long); 128 static void domask (char *, u_long, u_long); 129 static const char *labelops(struct rtentry *); 130 131 /* 132 * Print routing tables. 133 */ 134 void 135 routepr(u_long rtree) 136 { 137 struct radix_node_head *rnh, head; 138 int i; 139 140 printf("Routing tables\n"); 141 142 if (Aflag == 0 && NewTree) { 143 ntreestuff(); 144 } else { 145 if (rtree == 0) { 146 printf("rt_tables: symbol not in namelist\n"); 147 return; 148 } 149 if (cpuflag >= 0) { 150 /* 151 * Severe hack. 152 */ 153 rtree += cpuflag * (AF_MAX + 1) * sizeof(void *); 154 } 155 if (kget(rtree, rt_tables) != 0) 156 return; 157 for (i = 0; i <= AF_MAX; i++) { 158 if ((rnh = rt_tables[i]) == NULL) 159 continue; 160 if (kget(rnh, head) != 0) 161 continue; 162 if (i == AF_UNSPEC) { 163 if (Aflag && af == 0) { 164 printf("Netmasks:\n"); 165 p_tree(head.rnh_treetop); 166 } 167 } else if (af == AF_UNSPEC || af == i) { 168 size_cols(i, head.rnh_treetop); 169 pr_family(i); 170 do_rtent = 1; 171 pr_rthdr(i); 172 p_tree(head.rnh_treetop); 173 } 174 } 175 } 176 } 177 178 /* 179 * Print address family header before a section of the routing table. 180 */ 181 void 182 pr_family(int af1) 183 { 184 const char *afname; 185 186 switch (af1) { 187 case AF_INET: 188 afname = "Internet"; 189 break; 190 #ifdef INET6 191 case AF_INET6: 192 afname = "Internet6"; 193 break; 194 #endif /*INET6*/ 195 case AF_CCITT: 196 afname = "X.25"; 197 break; 198 case AF_NETGRAPH: 199 afname = "Netgraph"; 200 break; 201 case AF_MPLS: 202 afname = "MPLS"; 203 break; 204 default: 205 afname = NULL; 206 break; 207 } 208 if (afname) 209 printf("\n%s:\n", afname); 210 else 211 printf("\nProtocol Family %d:\n", af1); 212 } 213 214 /* column widths; each followed by one space */ 215 #ifndef INET6 216 #define WID_DST_DEFAULT(af) 18 /* width of destination column */ 217 #define WID_GW_DEFAULT(af) 18 /* width of gateway column */ 218 #define WID_IF_DEFAULT(af) (Wflag ? 8 : 6) /* width of netif column */ 219 #else 220 #define WID_DST_DEFAULT(af) \ 221 ((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18) 222 #define WID_GW_DEFAULT(af) \ 223 ((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18) 224 #define WID_IF_DEFAULT(af) ((af) == AF_INET6 ? 8 : (Wflag ? 8 :6)) 225 #endif /*INET6*/ 226 227 static int wid_dst; 228 static int wid_gw; 229 static int wid_flags; 230 static int wid_refs; 231 static int wid_use; 232 static int wid_mtu; 233 static int wid_if; 234 static int wid_expire; 235 static int wid_mplslops; 236 static int wid_msl; 237 static int wid_iwmax; 238 static int wid_iw; 239 240 static void 241 size_cols(int ef, struct radix_node *rn) 242 { 243 wid_dst = WID_DST_DEFAULT(ef); 244 wid_gw = WID_GW_DEFAULT(ef); 245 wid_flags = 6; 246 wid_refs = 6; 247 wid_use = 8; 248 wid_mtu = 6; 249 wid_if = WID_IF_DEFAULT(ef); 250 wid_expire = 6; 251 wid_mplslops = 7; 252 wid_msl = 7; 253 wid_iwmax = 5; 254 wid_iw = 2; 255 256 if (Wflag) 257 size_cols_tree(rn); 258 } 259 260 static void 261 size_cols_tree(struct radix_node *rn) 262 { 263 again: 264 if (kget(rn, rnode) != 0) 265 return; 266 if (!(rnode.rn_flags & RNF_ACTIVE)) 267 return; 268 if (rnode.rn_bit < 0) { 269 if ((rnode.rn_flags & RNF_ROOT) == 0) { 270 if (kget(rn, rtentry) != 0) 271 return; 272 size_cols_rtentry(&rtentry); 273 } 274 if ((rn = rnode.rn_dupedkey)) 275 goto again; 276 } else { 277 rn = rnode.rn_right; 278 size_cols_tree(rnode.rn_left); 279 size_cols_tree(rn); 280 } 281 } 282 283 static void 284 size_cols_rtentry(struct rtentry *rt) 285 { 286 static struct ifnet ifnet, *lastif; 287 struct rtentry parent; 288 static char buffer[100]; 289 const char *bp; 290 struct sockaddr *sa; 291 sa_u addr, mask; 292 int len; 293 294 /* 295 * Don't print protocol-cloned routes unless -a. 296 */ 297 if (rt->rt_flags & RTF_WASCLONED && !aflag) { 298 if (kget(rt->rt_parent, parent) != 0) 299 return; 300 if (parent.rt_flags & RTF_PRCLONING) 301 return; 302 } 303 304 bzero(&addr, sizeof(addr)); 305 if ((sa = kgetsa(rt_key(rt)))) 306 bcopy(sa, &addr, sa->sa_len); 307 bzero(&mask, sizeof(mask)); 308 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt)))) 309 bcopy(sa, &mask, sa->sa_len); 310 bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags); 311 len = strlen(bp); 312 wid_dst = MAX(len, wid_dst); 313 314 bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST); 315 len = strlen(bp); 316 wid_gw = MAX(len, wid_gw); 317 318 bp = fmt_flags(rt->rt_flags); 319 len = strlen(bp); 320 wid_flags = MAX(len, wid_flags); 321 322 if (addr.u_sa.sa_family == AF_INET || Wflag) { 323 len = snprintf(buffer, sizeof(buffer), "%ld", rt->rt_refcnt); 324 wid_refs = MAX(len, wid_refs); 325 len = snprintf(buffer, sizeof(buffer), "%lu", rt->rt_use); 326 wid_use = MAX(len, wid_use); 327 if (Wflag && rt->rt_rmx.rmx_mtu != 0) { 328 len = snprintf(buffer, sizeof(buffer), 329 "%lu", rt->rt_rmx.rmx_mtu); 330 wid_mtu = MAX(len, wid_mtu); 331 } 332 } 333 if (rt->rt_ifp) { 334 if (rt->rt_ifp != lastif) { 335 if (kget(rt->rt_ifp, ifnet) == 0) 336 len = strlen(ifnet.if_xname); 337 else 338 len = strlen("---"); 339 lastif = rt->rt_ifp; 340 wid_if = MAX(len, wid_if); 341 } 342 if (rt->rt_rmx.rmx_expire) { 343 struct timespec sp; 344 int expire_time; 345 346 clock_gettime(CLOCK_MONOTONIC, &sp); 347 348 expire_time = (int)(rt->rt_rmx.rmx_expire - sp.tv_sec); 349 350 if (expire_time > 0) { 351 snprintf(buffer, sizeof(buffer), "%d", 352 (int)expire_time); 353 wid_expire = MAX(len, wid_expire); 354 } 355 } 356 } 357 if (Wflag) { 358 if (rt->rt_shim[0] != NULL) { 359 len = strlen(labelops(rt)); 360 wid_mplslops = MAX(len, wid_mplslops); 361 } 362 363 if (rt->rt_rmx.rmx_msl) { 364 len = snprintf(buffer, sizeof(buffer), 365 "%lu", rt->rt_rmx.rmx_msl); 366 wid_msl = MAX(len, wid_msl); 367 } 368 if (rt->rt_rmx.rmx_iwmaxsegs) { 369 len = snprintf(buffer, sizeof(buffer), 370 "%lu", rt->rt_rmx.rmx_iwmaxsegs); 371 wid_iwmax = MAX(len, wid_iwmax); 372 } 373 if (rt->rt_rmx.rmx_iwcapsegs) { 374 len = snprintf(buffer, sizeof(buffer), 375 "%lu", rt->rt_rmx.rmx_iwcapsegs); 376 wid_iw = MAX(len, wid_iw); 377 } 378 } 379 } 380 381 382 /* 383 * Print header for routing table columns. 384 */ 385 void 386 pr_rthdr(int af1) 387 { 388 389 if (Aflag) 390 printf("%-8.8s ","Address"); 391 if (af1 == AF_INET || Wflag) { 392 if (Wflag) { 393 printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*.*s " 394 "%*s %-*s%*s %*s %*s\n", 395 wid_dst, wid_dst, "Destination", 396 wid_gw, wid_gw, "Gateway", 397 wid_flags, wid_flags, "Flags", 398 wid_refs, wid_refs, "Refs", 399 wid_use, wid_use, "Use", 400 wid_mtu, wid_mtu, "Mtu", 401 wid_if, wid_if, "Netif", 402 wid_expire, "Expire", 403 wid_mplslops, "Labelops", 404 wid_msl, "Msl", 405 wid_iwmax, "IWmax", 406 wid_iw, "IW"); 407 } else { 408 printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*s\n", 409 wid_dst, wid_dst, "Destination", 410 wid_gw, wid_gw, "Gateway", 411 wid_flags, wid_flags, "Flags", 412 wid_refs, wid_refs, "Refs", 413 wid_use, wid_use, "Use", 414 wid_if, wid_if, "Netif", 415 wid_expire, "Expire"); 416 } 417 } else { 418 printf("%-*.*s %-*.*s %-*.*s %*.*s %*s\n", 419 wid_dst, wid_dst, "Destination", 420 wid_gw, wid_gw, "Gateway", 421 wid_flags, wid_flags, "Flags", 422 wid_if, wid_if, "Netif", 423 wid_expire, "Expire"); 424 } 425 } 426 427 static struct sockaddr * 428 kgetsa(const struct sockaddr *dst) 429 { 430 431 if (kget(dst, pt_u.u_sa) != 0) 432 return (NULL); 433 if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa)) 434 kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len); 435 return (&pt_u.u_sa); 436 } 437 438 static void 439 p_tree(struct radix_node *rn) 440 { 441 442 again: 443 if (kget(rn, rnode) != 0) 444 return; 445 if (!(rnode.rn_flags & RNF_ACTIVE)) 446 return; 447 if (rnode.rn_bit < 0) { 448 if (Aflag) 449 printf("%-8.8lx ", (u_long)rn); 450 if (rnode.rn_flags & RNF_ROOT) { 451 if (Aflag) 452 printf("(root node)%s", 453 rnode.rn_dupedkey ? " =>\n" : "\n"); 454 } else if (do_rtent) { 455 if (kget(rn, rtentry) == 0) { 456 p_rtentry(&rtentry); 457 if (Aflag) 458 p_rtnode(); 459 } 460 } else { 461 p_sockaddr(kgetsa(constSA(rnode.rn_key)), NULL, 0, 44); 462 putchar('\n'); 463 } 464 if ((rn = rnode.rn_dupedkey)) 465 goto again; 466 } else { 467 if (Aflag && do_rtent) { 468 printf("%-8.8lx ", (u_long)rn); 469 p_rtnode(); 470 } 471 rn = rnode.rn_right; 472 p_tree(rnode.rn_left); 473 p_tree(rn); 474 } 475 } 476 477 char nbuf[20]; 478 479 static void 480 p_rtnode(void) 481 { 482 struct radix_mask *rm = rnode.rn_mklist; 483 484 if (rnode.rn_bit < 0) { 485 if (rnode.rn_mask) { 486 printf("\t mask "); 487 p_sockaddr(kgetsa(constSA(rnode.rn_mask)), 488 NULL, 0, -1); 489 } else if (rm == NULL) 490 return; 491 } else { 492 sprintf(nbuf, "(%d)", rnode.rn_bit); 493 printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long)rnode.rn_left, (u_long)rnode.rn_right); 494 } 495 while (rm) { 496 if (kget(rm, rmask) != 0) 497 break; 498 sprintf(nbuf, " %d refs, ", rmask.rm_refs); 499 printf(" mk = %8.8lx {(%d),%s", 500 (u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " "); 501 if (rmask.rm_flags & RNF_NORMAL) { 502 struct radix_node rnode_aux; 503 printf(" <normal>, "); 504 if (kget(rmask.rm_leaf, rnode_aux) == 0) 505 p_sockaddr(kgetsa(constSA(rnode_aux.rn_mask)), 506 NULL, 0, -1); 507 else 508 p_sockaddr(NULL, NULL, 0, -1); 509 } else { 510 p_sockaddr(kgetsa(constSA(rmask.rm_mask)), 511 NULL, 0, -1); 512 } 513 putchar('}'); 514 if ((rm = rmask.rm_next)) 515 printf(" ->"); 516 } 517 putchar('\n'); 518 } 519 520 static void 521 ntreestuff(void) 522 { 523 size_t needed; 524 int mib[7]; 525 int miblen; 526 char *buf, *next, *lim; 527 struct rt_msghdr *rtm; 528 529 mib[0] = CTL_NET; 530 mib[1] = PF_ROUTE; 531 mib[2] = 0; 532 mib[3] = 0; 533 mib[4] = NET_RT_DUMP; 534 mib[5] = 0; 535 if (cpuflag >= 0) { 536 mib[6] = cpuflag; 537 miblen = 7; 538 } else { 539 miblen = 6; 540 } 541 if (sysctl(mib, miblen, NULL, &needed, NULL, 0) < 0) { 542 err(1, "sysctl: net.route.0.0.dump estimate"); 543 } 544 545 if ((buf = malloc(needed)) == NULL) { 546 err(2, "malloc(%lu)", (unsigned long)needed); 547 } 548 if (sysctl(mib, miblen, buf, &needed, NULL, 0) < 0) { 549 err(1, "sysctl: net.route.0.0.dump"); 550 } 551 lim = buf + needed; 552 for (next = buf; next < lim; next += rtm->rtm_msglen) { 553 rtm = (struct rt_msghdr *)next; 554 np_rtentry(rtm); 555 } 556 } 557 558 static void 559 np_rtentry(struct rt_msghdr *rtm) 560 { 561 struct sockaddr *sa = (struct sockaddr *)(rtm + 1); 562 #ifdef notdef 563 static int masks_done, banner_printed; 564 #endif 565 static int old_af; 566 int af1 = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST; 567 568 #ifdef notdef 569 /* for the moment, netmasks are skipped over */ 570 if (!banner_printed) { 571 printf("Netmasks:\n"); 572 banner_printed = 1; 573 } 574 if (masks_done == 0) { 575 if (rtm->rtm_addrs != RTA_DST ) { 576 masks_done = 1; 577 af1 = sa->sa_family; 578 } 579 } else 580 #endif 581 af1 = sa->sa_family; 582 if (af1 != old_af) { 583 pr_family(af1); 584 old_af = af1; 585 } 586 if (rtm->rtm_addrs == RTA_DST) 587 p_sockaddr(sa, NULL, 0, 36); 588 else { 589 p_sockaddr(sa, NULL, rtm->rtm_flags, 16); 590 sa = (struct sockaddr *)(RT_ROUNDUP(sa->sa_len) + (char *)sa); 591 p_sockaddr(sa, NULL, 0, 18); 592 } 593 p_flags(rtm->rtm_flags & interesting, "%-6.6s "); 594 putchar('\n'); 595 } 596 597 static void 598 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width) 599 { 600 const char *cp; 601 602 cp = fmt_sockaddr(sa, mask, flags); 603 604 if (width < 0 ) 605 printf("%s ", cp); 606 else { 607 if (numeric_addr) 608 printf("%-*s ", width, cp); 609 else 610 printf("%-*.*s ", width, width, cp); 611 } 612 } 613 614 static const char * 615 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags) 616 { 617 static char workbuf[128]; 618 const char *cp = workbuf; 619 620 if (sa == NULL) 621 return ("null"); 622 623 switch(sa->sa_family) { 624 case AF_INET: 625 { 626 struct sockaddr_in *sin = (struct sockaddr_in *)sa; 627 628 if ((sin->sin_addr.s_addr == INADDR_ANY) && 629 mask && 630 ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr) 631 ==0L) 632 cp = "default" ; 633 else if (flags & RTF_HOST) 634 cp = routename(sin->sin_addr.s_addr); 635 else if (mask) 636 cp = netname(sin->sin_addr.s_addr, 637 ntohl(((struct sockaddr_in *)mask) 638 ->sin_addr.s_addr)); 639 else 640 cp = netname(sin->sin_addr.s_addr, 0L); 641 break; 642 } 643 644 #ifdef INET6 645 case AF_INET6: 646 { 647 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa; 648 struct in6_addr *in6 = &sa6->sin6_addr; 649 650 /* 651 * XXX: This is a special workaround for KAME kernels. 652 * sin6_scope_id field of SA should be set in the future. 653 */ 654 if (IN6_IS_ADDR_LINKLOCAL(in6) || 655 IN6_IS_ADDR_MC_LINKLOCAL(in6)) { 656 /* XXX: override is ok? */ 657 sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]); 658 *(u_short *)&in6->s6_addr[2] = 0; 659 } 660 661 if (flags & RTF_HOST) 662 cp = routename6(sa6); 663 else if (mask) 664 cp = netname6(sa6, 665 &((struct sockaddr_in6 *)mask)->sin6_addr); 666 else { 667 cp = netname6(sa6, NULL); 668 } 669 break; 670 } 671 #endif /*INET6*/ 672 673 case AF_NETGRAPH: 674 { 675 printf("%s", ((struct sockaddr_ng *)sa)->sg_data); 676 break; 677 } 678 case AF_LINK: 679 { 680 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; 681 682 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && 683 sdl->sdl_slen == 0) 684 (void) sprintf(workbuf, "link#%d", sdl->sdl_index); 685 else 686 switch (sdl->sdl_type) { 687 688 case IFT_ETHER: 689 case IFT_L2VLAN: 690 case IFT_CARP: 691 if (sdl->sdl_alen == ETHER_ADDR_LEN) { 692 cp = ether_ntoa((struct ether_addr *) 693 (sdl->sdl_data + sdl->sdl_nlen)); 694 break; 695 } 696 /* FALLTHROUGH */ 697 default: 698 cp = link_ntoa(sdl); 699 break; 700 } 701 break; 702 } 703 704 case AF_MPLS: 705 { 706 struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa; 707 708 (void) sprintf(workbuf, "%d", ntohl(smpls->smpls_label)); 709 break; 710 } 711 712 default: 713 { 714 u_char *s = (u_char *)sa->sa_data, *slim; 715 char *cq, *cqlim; 716 717 cq = workbuf; 718 slim = sa->sa_len + (u_char *) sa; 719 cqlim = cq + sizeof(workbuf) - 6; 720 cq += sprintf(cq, "(%d)", sa->sa_family); 721 while (s < slim && cq < cqlim) { 722 cq += sprintf(cq, " %02x", *s++); 723 if (s < slim) 724 cq += sprintf(cq, "%02x", *s++); 725 } 726 cp = workbuf; 727 } 728 } 729 730 return (cp); 731 } 732 733 static void 734 p_flags(int f, const char *format) 735 { 736 printf(format, fmt_flags(f)); 737 } 738 739 static const char * 740 fmt_flags(int f) 741 { 742 static char name[33]; 743 char *flags; 744 struct bits *p = bits; 745 746 for (flags = name; p->b_mask; p++) 747 if (p->b_mask & f) 748 *flags++ = p->b_val; 749 *flags = '\0'; 750 return (name); 751 } 752 753 static void 754 p_rtentry(struct rtentry *rt) 755 { 756 static struct ifnet ifnet, *lastif; 757 struct rtentry parent; 758 static char buffer[128]; 759 static char prettyname[128]; 760 struct sockaddr *sa; 761 sa_u addr, mask; 762 763 /* 764 * Don't print protocol-cloned routes unless -a or -A. 765 */ 766 if (rt->rt_flags & RTF_WASCLONED && !(aflag || Aflag)) { 767 if (kget(rt->rt_parent, parent) != 0) 768 return; 769 if (parent.rt_flags & RTF_PRCLONING) 770 return; 771 } 772 773 bzero(&addr, sizeof(addr)); 774 if ((sa = kgetsa(rt_key(rt)))) 775 bcopy(sa, &addr, sa->sa_len); 776 bzero(&mask, sizeof(mask)); 777 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt)))) 778 bcopy(sa, &mask, sa->sa_len); 779 p_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags, wid_dst); 780 p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw); 781 snprintf(buffer, sizeof(buffer), "%%-%d.%ds ", wid_flags, wid_flags); 782 p_flags(rt->rt_flags, buffer); 783 if (addr.u_sa.sa_family == AF_INET || Wflag) { 784 printf("%*ld %*lu ", wid_refs, rt->rt_refcnt, 785 wid_use, rt->rt_use); 786 if (Wflag) { 787 if (rt->rt_rmx.rmx_mtu != 0) 788 printf("%*lu ", wid_mtu, rt->rt_rmx.rmx_mtu); 789 else 790 printf("%*s ", wid_mtu, ""); 791 } 792 } 793 if (rt->rt_ifp) { 794 if (rt->rt_ifp != lastif) { 795 if (kget(rt->rt_ifp, ifnet) == 0) 796 strlcpy(prettyname, ifnet.if_xname, 797 sizeof(prettyname)); 798 else 799 strlcpy(prettyname, "---", sizeof(prettyname)); 800 lastif = rt->rt_ifp; 801 } 802 printf("%*.*s", wid_if, wid_if, prettyname); 803 if (rt->rt_rmx.rmx_expire) { 804 struct timespec sp; 805 int expire_time; 806 807 clock_gettime(CLOCK_MONOTONIC, &sp); 808 809 expire_time = (int)(rt->rt_rmx.rmx_expire - sp.tv_sec); 810 if (expire_time > 0) 811 printf(" %*d", wid_expire, (int)expire_time); 812 else 813 printf("%*s ", wid_expire, ""); 814 } else { 815 printf("%*s ", wid_expire, ""); 816 } 817 if (rt->rt_nodes[0].rn_dupedkey) 818 printf(" =>"); 819 } 820 if (Wflag) { 821 if (rt->rt_shim[0] != NULL) 822 printf(" %-*s", wid_mplslops, labelops(rt)); 823 else 824 printf(" %-*s", wid_mplslops, ""); 825 if (rt->rt_rmx.rmx_msl != 0) 826 printf(" %*lu", wid_msl, rt->rt_rmx.rmx_msl); 827 else 828 printf("%*s ", wid_msl, ""); 829 if (rt->rt_rmx.rmx_iwmaxsegs != 0) 830 printf(" %*lu", wid_iwmax, rt->rt_rmx.rmx_iwmaxsegs); 831 else 832 printf("%*s ", wid_iwmax, ""); 833 if (rt->rt_rmx.rmx_iwcapsegs != 0) 834 printf(" %*lu", wid_iw, rt->rt_rmx.rmx_iwcapsegs); 835 else 836 printf("%*s ", wid_iw, ""); 837 } 838 putchar('\n'); 839 } 840 841 char * 842 routename(u_long in) 843 { 844 char *cp; 845 static char line[MAXHOSTNAMELEN]; 846 struct hostent *hp; 847 848 cp = NULL; 849 if (!numeric_addr) { 850 hp = gethostbyaddr(&in, sizeof (struct in_addr), AF_INET); 851 if (hp) { 852 cp = hp->h_name; 853 trimdomain(cp, strlen(cp)); 854 } 855 } 856 if (cp) { 857 strncpy(line, cp, sizeof(line) - 1); 858 line[sizeof(line) - 1] = '\0'; 859 } else { 860 #define C(x) ((x) & 0xff) 861 in = ntohl(in); 862 sprintf(line, "%lu.%lu.%lu.%lu", 863 C(in >> 24), C(in >> 16), C(in >> 8), C(in)); 864 } 865 return (line); 866 } 867 868 static u_long 869 forgemask(u_long a) 870 { 871 u_long m; 872 873 if (IN_CLASSA(a)) 874 m = IN_CLASSA_NET; 875 else if (IN_CLASSB(a)) 876 m = IN_CLASSB_NET; 877 else 878 m = IN_CLASSC_NET; 879 return (m); 880 } 881 882 static void 883 domask(char *dst, u_long addr, u_long mask) 884 { 885 int b, i; 886 887 if (!mask || (forgemask(addr) == mask)) { 888 *dst = '\0'; 889 return; 890 } 891 i = 0; 892 for (b = 0; b < 32; b++) 893 if (mask & (1 << b)) { 894 int bb; 895 896 i = b; 897 for (bb = b+1; bb < 32; bb++) 898 if (!(mask & (1 << bb))) { 899 i = -1; /* noncontig */ 900 break; 901 } 902 break; 903 } 904 if (i == -1) 905 sprintf(dst, "&0x%lx", mask); 906 else 907 sprintf(dst, "/%d", 32-i); 908 } 909 910 /* 911 * Return the name of the network whose address is given. 912 * The address is assumed to be that of a net or subnet, not a host. 913 */ 914 char * 915 netname(u_long in, u_long mask) 916 { 917 char *cp = NULL; 918 static char line[MAXHOSTNAMELEN]; 919 struct netent *np = NULL; 920 u_long dmask; 921 u_long i; 922 923 #define NSHIFT(m) ( \ 924 (m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT : \ 925 (m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT : \ 926 (m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT : \ 927 0) 928 929 i = ntohl(in); 930 dmask = forgemask(i); 931 if (!numeric_addr && i) { 932 np = getnetbyaddr(i >> NSHIFT(mask), AF_INET); 933 if (np == NULL && mask == 0) 934 np = getnetbyaddr(i >> NSHIFT(dmask), AF_INET); 935 if (np != NULL) { 936 cp = np->n_name; 937 trimdomain(cp, strlen(cp)); 938 } 939 } 940 #undef NSHIFT 941 if (cp != NULL) { 942 strncpy(line, cp, sizeof(line) - 1); 943 line[sizeof(line) - 1] = '\0'; 944 } else { 945 if (mask <= IN_CLASSA_NET && 946 (i & IN_CLASSA_HOST) == 0) { 947 sprintf(line, "%lu", C(i >> 24)); 948 } else if (mask <= IN_CLASSB_NET && 949 (i & IN_CLASSB_HOST) == 0) { 950 sprintf(line, "%lu.%lu", 951 C(i >> 24), C(i >> 16)); 952 } else if (mask <= IN_CLASSC_NET && 953 (i & IN_CLASSC_HOST) == 0) { 954 sprintf(line, "%lu.%lu.%lu", 955 C(i >> 24), C(i >> 16), C(i >> 8)); 956 } else { 957 sprintf(line, "%lu.%lu.%lu.%lu", 958 C(i >> 24), C(i >> 16), C(i >> 8), C(i)); 959 } 960 } 961 domask(line + strlen(line), i, mask); 962 return (line); 963 } 964 965 #ifdef INET6 966 const char * 967 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask) 968 { 969 static char line[MAXHOSTNAMELEN]; 970 u_char *p = (u_char *)mask; 971 u_char *lim; 972 int masklen, illegal = 0, flag = NI_WITHSCOPEID; 973 974 if (mask) { 975 for (masklen = 0, lim = p + 16; p < lim; p++) { 976 switch (*p) { 977 case 0xff: 978 masklen += 8; 979 break; 980 case 0xfe: 981 masklen += 7; 982 break; 983 case 0xfc: 984 masklen += 6; 985 break; 986 case 0xf8: 987 masklen += 5; 988 break; 989 case 0xf0: 990 masklen += 4; 991 break; 992 case 0xe0: 993 masklen += 3; 994 break; 995 case 0xc0: 996 masklen += 2; 997 break; 998 case 0x80: 999 masklen += 1; 1000 break; 1001 case 0x00: 1002 break; 1003 default: 1004 illegal ++; 1005 break; 1006 } 1007 } 1008 if (illegal) 1009 fprintf(stderr, "illegal prefixlen\n"); 1010 } 1011 else 1012 masklen = 128; 1013 1014 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr)) 1015 return("default"); 1016 1017 if (numeric_addr) 1018 flag |= NI_NUMERICHOST; 1019 getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line), 1020 NULL, 0, flag); 1021 1022 if (numeric_addr) 1023 sprintf(&line[strlen(line)], "/%d", masklen); 1024 1025 return line; 1026 } 1027 1028 char * 1029 routename6(struct sockaddr_in6 *sa6) 1030 { 1031 static char line[MAXHOSTNAMELEN]; 1032 int flag = NI_WITHSCOPEID; 1033 /* use local variable for safety */ 1034 struct sockaddr_in6 sa6_local; 1035 1036 sa6_local.sin6_family = AF_INET6; 1037 sa6_local.sin6_len = sizeof(sa6_local); 1038 sa6_local.sin6_addr = sa6->sin6_addr; 1039 sa6_local.sin6_scope_id = sa6->sin6_scope_id; 1040 1041 if (numeric_addr) 1042 flag |= NI_NUMERICHOST; 1043 1044 getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len, 1045 line, sizeof(line), NULL, 0, flag); 1046 1047 return line; 1048 } 1049 #endif /*INET6*/ 1050 1051 /* 1052 * Print routing statistics 1053 */ 1054 void 1055 rt_stats(void) 1056 { 1057 struct rtstatistics rts; 1058 int error = 0; 1059 1060 error = kinfo_get_net_rtstatistics(&rts); 1061 if (error) { 1062 printf("routing: could not retrieve statistics\n"); 1063 return; 1064 } 1065 printf("routing:\n"); 1066 1067 #define p(f, m) if (rts.f || sflag <= 1) \ 1068 printf(m, rts.f, plural(rts.f)) 1069 1070 p(rts_badredirect, "\t%lu bad routing redirect%s\n"); 1071 p(rts_dynamic, "\t%lu dynamically created route%s\n"); 1072 p(rts_newgateway, "\t%lu new gateway%s due to redirects\n"); 1073 p(rts_unreach, "\t%lu destination%s found unreachable\n"); 1074 p(rts_wildcard, "\t%lu use%s of a wildcard route\n"); 1075 #undef p 1076 } 1077 1078 static const char * 1079 labelops(struct rtentry *rt) 1080 { 1081 const char *lops[] = { "push", "pop", "swap", "pop all" }; 1082 static char buffer[100]; 1083 char *cp = buffer; 1084 struct sockaddr_mpls *smpls; 1085 int i; 1086 1087 for (i=0; i<MPLS_MAXLOPS; ++i) { 1088 1089 if (rt->rt_shim[i] == NULL) 1090 break; 1091 if (i>0) { 1092 cp += snprintf(cp, 1093 sizeof(buffer) - (cp - buffer), 1094 ", "); 1095 } 1096 smpls = (struct sockaddr_mpls *)kgetsa(rt->rt_shim[i]); 1097 if (smpls->smpls_op != MPLSLOP_POP && 1098 smpls->smpls_op != MPLSLOP_POPALL){ 1099 cp += snprintf(cp, 1100 sizeof(buffer) - (cp - buffer), 1101 "%s %d", 1102 lops[smpls->smpls_op - 1], 1103 ntohl(smpls->smpls_label)); 1104 } else { 1105 cp += snprintf(cp, 1106 sizeof(buffer) - (cp - buffer), 1107 "%s", 1108 lops[smpls->smpls_op - 1]); 1109 } 1110 } 1111 1112 return (buffer); 1113 } 1114