1 /* 2 * Copyright (c) 1983, 1988, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * @(#)route.c 8.6 (Berkeley) 4/28/95 34 * $FreeBSD: src/usr.bin/netstat/route.c,v 1.41.2.14 2002/07/17 02:22:22 kbyanc Exp $ 35 */ 36 37 #include <sys/kinfo.h> 38 #include <sys/param.h> 39 #include <sys/socket.h> 40 #include <sys/time.h> 41 42 #include <net/ethernet.h> 43 #include <net/if.h> 44 #include <net/if_var.h> 45 #include <net/if_dl.h> 46 #include <net/if_types.h> 47 #include <net/route.h> 48 49 #include <netinet/in.h> 50 #include <netipx/ipx.h> 51 #include <netgraph/socket/ng_socket.h> 52 53 #include <netproto/mpls/mpls.h> 54 55 #include <sys/sysctl.h> 56 57 #include <arpa/inet.h> 58 #include <libutil.h> 59 #include <netdb.h> 60 #include <stdio.h> 61 #include <stdlib.h> 62 #include <string.h> 63 #include <unistd.h> 64 #include <err.h> 65 #include <time.h> 66 #include <kinfo.h> 67 #include "netstat.h" 68 69 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d))) 70 71 72 /* alignment constraint for routing socket */ 73 #define ROUNDUP(a) \ 74 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) 75 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) 76 77 /* 78 * Definitions for showing gateway flags. 79 */ 80 struct bits { 81 u_long b_mask; 82 char b_val; 83 } bits[] = { 84 { RTF_UP, 'U' }, 85 { RTF_GATEWAY, 'G' }, 86 { RTF_HOST, 'H' }, 87 { RTF_REJECT, 'R' }, 88 { RTF_DYNAMIC, 'D' }, 89 { RTF_MODIFIED, 'M' }, 90 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */ 91 { RTF_CLONING, 'C' }, 92 { RTF_XRESOLVE, 'X' }, 93 { RTF_LLINFO, 'L' }, 94 { RTF_STATIC, 'S' }, 95 { RTF_PROTO1, '1' }, 96 { RTF_PROTO2, '2' }, 97 { RTF_WASCLONED,'W' }, 98 { RTF_PRCLONING,'c' }, 99 { RTF_PROTO3, '3' }, 100 { RTF_BLACKHOLE,'B' }, 101 { RTF_BROADCAST,'b' }, 102 { RTF_MPLSOPS, 'm' }, 103 { 0, 0 } 104 }; 105 106 typedef union { 107 long dummy; /* Helps align structure. */ 108 struct sockaddr u_sa; 109 u_short u_data[128]; 110 } sa_u; 111 112 static sa_u pt_u; 113 114 int do_rtent = 0; 115 struct rtentry rtentry; 116 struct radix_node rnode; 117 struct radix_mask rmask; 118 struct radix_node_head *rt_tables[AF_MAX+1]; 119 120 int NewTree = 0; 121 122 static struct sockaddr *kgetsa (struct sockaddr *); 123 static void size_cols (int ef, struct radix_node *rn); 124 static void size_cols_tree (struct radix_node *rn); 125 static void size_cols_rtentry (struct rtentry *rt); 126 static void p_tree (struct radix_node *); 127 static void p_rtnode (void); 128 static void ntreestuff (void); 129 static void np_rtentry (struct rt_msghdr *); 130 static void p_sockaddr (struct sockaddr *, struct sockaddr *, int, int); 131 static const char *fmt_sockaddr (struct sockaddr *sa, struct sockaddr *mask, 132 int flags); 133 static void p_flags (int, const char *); 134 static const char *fmt_flags(int f); 135 static void p_rtentry (struct rtentry *); 136 static u_long forgemask (u_long); 137 static void domask (char *, u_long, u_long); 138 static const char *labelops(struct rtentry *); 139 140 /* 141 * Print routing tables. 142 */ 143 void 144 routepr(u_long rtree) 145 { 146 struct radix_node_head *rnh, head; 147 int i; 148 149 printf("Routing tables\n"); 150 151 if (Aflag == 0 && NewTree) { 152 ntreestuff(); 153 } else { 154 if (rtree == 0) { 155 printf("rt_tables: symbol not in namelist\n"); 156 return; 157 } 158 if (cpuflag >= 0) { 159 /* 160 * Severe hack. 161 */ 162 rtree += cpuflag * (AF_MAX + 1) * sizeof(void *); 163 } 164 if (kget(rtree, rt_tables) != 0) 165 return; 166 for (i = 0; i <= AF_MAX; i++) { 167 if ((rnh = rt_tables[i]) == NULL) 168 continue; 169 if (kget(rnh, head) != 0) 170 continue; 171 if (i == AF_UNSPEC) { 172 if (Aflag && af == 0) { 173 printf("Netmasks:\n"); 174 p_tree(head.rnh_treetop); 175 } 176 } else if (af == AF_UNSPEC || af == i) { 177 size_cols(i, head.rnh_treetop); 178 pr_family(i); 179 do_rtent = 1; 180 pr_rthdr(i); 181 p_tree(head.rnh_treetop); 182 } 183 } 184 } 185 } 186 187 /* 188 * Print address family header before a section of the routing table. 189 */ 190 void 191 pr_family(int af1) 192 { 193 const char *afname; 194 195 switch (af1) { 196 case AF_INET: 197 afname = "Internet"; 198 break; 199 #ifdef INET6 200 case AF_INET6: 201 afname = "Internet6"; 202 break; 203 #endif /*INET6*/ 204 case AF_IPX: 205 afname = "IPX"; 206 break; 207 case AF_ISO: 208 afname = "ISO"; 209 break; 210 case AF_CCITT: 211 afname = "X.25"; 212 break; 213 case AF_NETGRAPH: 214 afname = "Netgraph"; 215 break; 216 case AF_MPLS: 217 afname = "MPLS"; 218 break; 219 default: 220 afname = NULL; 221 break; 222 } 223 if (afname) 224 printf("\n%s:\n", afname); 225 else 226 printf("\nProtocol Family %d:\n", af1); 227 } 228 229 /* column widths; each followed by one space */ 230 #ifndef INET6 231 #define WID_DST_DEFAULT(af) 18 /* width of destination column */ 232 #define WID_GW_DEFAULT(af) 18 /* width of gateway column */ 233 #define WID_IF_DEFAULT(af) (Wflag ? 8 : 6) /* width of netif column */ 234 #else 235 #define WID_DST_DEFAULT(af) \ 236 ((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18) 237 #define WID_GW_DEFAULT(af) \ 238 ((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18) 239 #define WID_IF_DEFAULT(af) ((af) == AF_INET6 ? 8 : (Wflag ? 8 :6)) 240 #endif /*INET6*/ 241 242 static int wid_dst; 243 static int wid_gw; 244 static int wid_flags; 245 static int wid_refs; 246 static int wid_use; 247 static int wid_mtu; 248 static int wid_if; 249 static int wid_expire; 250 static int wid_mplslops; 251 static int wid_msl; 252 static int wid_iwmax; 253 static int wid_iw; 254 255 static void 256 size_cols(int ef, struct radix_node *rn) 257 { 258 wid_dst = WID_DST_DEFAULT(ef); 259 wid_gw = WID_GW_DEFAULT(ef); 260 wid_flags = 6; 261 wid_refs = 6; 262 wid_use = 8; 263 wid_mtu = 6; 264 wid_if = WID_IF_DEFAULT(ef); 265 wid_expire = 6; 266 wid_mplslops = 7; 267 wid_msl = 7; 268 wid_iwmax = 5; 269 wid_iw = 2; 270 271 if (Wflag) 272 size_cols_tree(rn); 273 } 274 275 static void 276 size_cols_tree(struct radix_node *rn) 277 { 278 again: 279 if (kget(rn, rnode) != 0) 280 return; 281 if (!(rnode.rn_flags & RNF_ACTIVE)) 282 return; 283 if (rnode.rn_bit < 0) { 284 if ((rnode.rn_flags & RNF_ROOT) == 0) { 285 if (kget(rn, rtentry) != 0) 286 return; 287 size_cols_rtentry(&rtentry); 288 } 289 if ((rn = rnode.rn_dupedkey)) 290 goto again; 291 } else { 292 rn = rnode.rn_right; 293 size_cols_tree(rnode.rn_left); 294 size_cols_tree(rn); 295 } 296 } 297 298 static void 299 size_cols_rtentry(struct rtentry *rt) 300 { 301 static struct ifnet ifnet, *lastif; 302 struct rtentry parent; 303 static char buffer[100]; 304 const char *bp; 305 struct sockaddr *sa; 306 sa_u addr, mask; 307 int len; 308 309 /* 310 * Don't print protocol-cloned routes unless -a. 311 */ 312 if (rt->rt_flags & RTF_WASCLONED && !aflag) { 313 if (kget(rt->rt_parent, parent) != 0) 314 return; 315 if (parent.rt_flags & RTF_PRCLONING) 316 return; 317 } 318 319 bzero(&addr, sizeof(addr)); 320 if ((sa = kgetsa(rt_key(rt)))) 321 bcopy(sa, &addr, sa->sa_len); 322 bzero(&mask, sizeof(mask)); 323 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt)))) 324 bcopy(sa, &mask, sa->sa_len); 325 bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags); 326 len = strlen(bp); 327 wid_dst = MAX(len, wid_dst); 328 329 bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST); 330 len = strlen(bp); 331 wid_gw = MAX(len, wid_gw); 332 333 bp = fmt_flags(rt->rt_flags); 334 len = strlen(bp); 335 wid_flags = MAX(len, wid_flags); 336 337 if (addr.u_sa.sa_family == AF_INET || Wflag) { 338 len = snprintf(buffer, sizeof(buffer), "%ld", rt->rt_refcnt); 339 wid_refs = MAX(len, wid_refs); 340 len = snprintf(buffer, sizeof(buffer), "%lu", rt->rt_use); 341 wid_use = MAX(len, wid_use); 342 if (Wflag && rt->rt_rmx.rmx_mtu != 0) { 343 len = snprintf(buffer, sizeof(buffer), 344 "%lu", rt->rt_rmx.rmx_mtu); 345 wid_mtu = MAX(len, wid_mtu); 346 } 347 } 348 if (rt->rt_ifp) { 349 if (rt->rt_ifp != lastif) { 350 if (kget(rt->rt_ifp, ifnet) == 0) 351 len = strlen(ifnet.if_xname); 352 else 353 len = strlen("---"); 354 lastif = rt->rt_ifp; 355 wid_if = MAX(len, wid_if); 356 } 357 if (rt->rt_rmx.rmx_expire) { 358 time_t expire_time; 359 360 if ((expire_time = 361 rt->rt_rmx.rmx_expire - time(NULL)) > 0) { 362 snprintf(buffer, sizeof(buffer), "%d", 363 (int)expire_time); 364 wid_expire = MAX(len, wid_expire); 365 } 366 } 367 } 368 if (Wflag) { 369 if (rt->rt_shim[0] != NULL) { 370 len = strlen(labelops(rt)); 371 wid_mplslops = MAX(len, wid_mplslops); 372 } 373 374 if (rt->rt_rmx.rmx_msl) { 375 len = snprintf(buffer, sizeof(buffer), 376 "%lu", rt->rt_rmx.rmx_msl); 377 wid_msl = MAX(len, wid_msl); 378 } 379 if (rt->rt_rmx.rmx_iwmaxsegs) { 380 len = snprintf(buffer, sizeof(buffer), 381 "%lu", rt->rt_rmx.rmx_iwmaxsegs); 382 wid_iwmax = MAX(len, wid_iwmax); 383 } 384 if (rt->rt_rmx.rmx_iwcapsegs) { 385 len = snprintf(buffer, sizeof(buffer), 386 "%lu", rt->rt_rmx.rmx_iwcapsegs); 387 wid_iw = MAX(len, wid_iw); 388 } 389 } 390 } 391 392 393 /* 394 * Print header for routing table columns. 395 */ 396 void 397 pr_rthdr(int af1) 398 { 399 400 if (Aflag) 401 printf("%-8.8s ","Address"); 402 if (af1 == AF_INET || Wflag) { 403 if (Wflag) { 404 printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*.*s " 405 "%*s %-*s%*s %*s %*s\n", 406 wid_dst, wid_dst, "Destination", 407 wid_gw, wid_gw, "Gateway", 408 wid_flags, wid_flags, "Flags", 409 wid_refs, wid_refs, "Refs", 410 wid_use, wid_use, "Use", 411 wid_mtu, wid_mtu, "Mtu", 412 wid_if, wid_if, "Netif", 413 wid_expire, "Expire", 414 wid_mplslops, "Labelops", 415 wid_msl, "Msl", 416 wid_iwmax, "IWmax", 417 wid_iw, "IW"); 418 } else { 419 printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*s\n", 420 wid_dst, wid_dst, "Destination", 421 wid_gw, wid_gw, "Gateway", 422 wid_flags, wid_flags, "Flags", 423 wid_refs, wid_refs, "Refs", 424 wid_use, wid_use, "Use", 425 wid_if, wid_if, "Netif", 426 wid_expire, "Expire"); 427 } 428 } else { 429 printf("%-*.*s %-*.*s %-*.*s %*.*s %*s\n", 430 wid_dst, wid_dst, "Destination", 431 wid_gw, wid_gw, "Gateway", 432 wid_flags, wid_flags, "Flags", 433 wid_if, wid_if, "Netif", 434 wid_expire, "Expire"); 435 } 436 } 437 438 static struct sockaddr * 439 kgetsa(struct sockaddr *dst) 440 { 441 442 if (kget(dst, pt_u.u_sa) != 0) 443 return (NULL); 444 if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa)) 445 kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len); 446 return (&pt_u.u_sa); 447 } 448 449 static void 450 p_tree(struct radix_node *rn) 451 { 452 453 again: 454 if (kget(rn, rnode) != 0) 455 return; 456 if (!(rnode.rn_flags & RNF_ACTIVE)) 457 return; 458 if (rnode.rn_bit < 0) { 459 if (Aflag) 460 printf("%-8.8lx ", (u_long)rn); 461 if (rnode.rn_flags & RNF_ROOT) { 462 if (Aflag) 463 printf("(root node)%s", 464 rnode.rn_dupedkey ? " =>\n" : "\n"); 465 } else if (do_rtent) { 466 if (kget(rn, rtentry) == 0) { 467 p_rtentry(&rtentry); 468 if (Aflag) 469 p_rtnode(); 470 } 471 } else { 472 p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key), 473 NULL, 0, 44); 474 putchar('\n'); 475 } 476 if ((rn = rnode.rn_dupedkey)) 477 goto again; 478 } else { 479 if (Aflag && do_rtent) { 480 printf("%-8.8lx ", (u_long)rn); 481 p_rtnode(); 482 } 483 rn = rnode.rn_right; 484 p_tree(rnode.rn_left); 485 p_tree(rn); 486 } 487 } 488 489 char nbuf[20]; 490 491 static void 492 p_rtnode(void) 493 { 494 struct radix_mask *rm = rnode.rn_mklist; 495 496 if (rnode.rn_bit < 0) { 497 if (rnode.rn_mask) { 498 printf("\t mask "); 499 p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask), 500 NULL, 0, -1); 501 } else if (rm == NULL) 502 return; 503 } else { 504 sprintf(nbuf, "(%d)", rnode.rn_bit); 505 printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long)rnode.rn_left, (u_long)rnode.rn_right); 506 } 507 while (rm) { 508 if (kget(rm, rmask) != 0) 509 break; 510 sprintf(nbuf, " %d refs, ", rmask.rm_refs); 511 printf(" mk = %8.8lx {(%d),%s", 512 (u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " "); 513 if (rmask.rm_flags & RNF_NORMAL) { 514 struct radix_node rnode_aux; 515 printf(" <normal>, "); 516 if (kget(rmask.rm_leaf, rnode_aux) == 0) 517 p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask), 518 NULL, 0, -1); 519 else 520 p_sockaddr(NULL, NULL, 0, -1); 521 } else 522 p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask), 523 NULL, 0, -1); 524 putchar('}'); 525 if ((rm = rmask.rm_next)) 526 printf(" ->"); 527 } 528 putchar('\n'); 529 } 530 531 static void 532 ntreestuff(void) 533 { 534 size_t needed; 535 int mib[7]; 536 int miblen; 537 char *buf, *next, *lim; 538 struct rt_msghdr *rtm; 539 540 mib[0] = CTL_NET; 541 mib[1] = PF_ROUTE; 542 mib[2] = 0; 543 mib[3] = 0; 544 mib[4] = NET_RT_DUMP; 545 mib[5] = 0; 546 if (cpuflag >= 0) { 547 mib[6] = cpuflag; 548 miblen = 7; 549 } else { 550 miblen = 6; 551 } 552 if (sysctl(mib, miblen, NULL, &needed, NULL, 0) < 0) { 553 err(1, "sysctl: net.route.0.0.dump estimate"); 554 } 555 556 if ((buf = malloc(needed)) == NULL) { 557 err(2, "malloc(%lu)", (unsigned long)needed); 558 } 559 if (sysctl(mib, miblen, buf, &needed, NULL, 0) < 0) { 560 err(1, "sysctl: net.route.0.0.dump"); 561 } 562 lim = buf + needed; 563 for (next = buf; next < lim; next += rtm->rtm_msglen) { 564 rtm = (struct rt_msghdr *)next; 565 np_rtentry(rtm); 566 } 567 } 568 569 static void 570 np_rtentry(struct rt_msghdr *rtm) 571 { 572 struct sockaddr *sa = (struct sockaddr *)(rtm + 1); 573 #ifdef notdef 574 static int masks_done, banner_printed; 575 #endif 576 static int old_af; 577 int af1 = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST; 578 579 #ifdef notdef 580 /* for the moment, netmasks are skipped over */ 581 if (!banner_printed) { 582 printf("Netmasks:\n"); 583 banner_printed = 1; 584 } 585 if (masks_done == 0) { 586 if (rtm->rtm_addrs != RTA_DST ) { 587 masks_done = 1; 588 af1 = sa->sa_family; 589 } 590 } else 591 #endif 592 af1 = sa->sa_family; 593 if (af1 != old_af) { 594 pr_family(af1); 595 old_af = af1; 596 } 597 if (rtm->rtm_addrs == RTA_DST) 598 p_sockaddr(sa, NULL, 0, 36); 599 else { 600 p_sockaddr(sa, NULL, rtm->rtm_flags, 16); 601 sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa); 602 p_sockaddr(sa, NULL, 0, 18); 603 } 604 p_flags(rtm->rtm_flags & interesting, "%-6.6s "); 605 putchar('\n'); 606 } 607 608 static void 609 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width) 610 { 611 const char *cp; 612 613 cp = fmt_sockaddr(sa, mask, flags); 614 615 if (width < 0 ) 616 printf("%s ", cp); 617 else { 618 if (numeric_addr) 619 printf("%-*s ", width, cp); 620 else 621 printf("%-*.*s ", width, width, cp); 622 } 623 } 624 625 static const char * 626 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags) 627 { 628 static char workbuf[128]; 629 const char *cp = workbuf; 630 631 if (sa == NULL) 632 return ("null"); 633 634 switch(sa->sa_family) { 635 case AF_INET: 636 { 637 struct sockaddr_in *sin = (struct sockaddr_in *)sa; 638 639 if ((sin->sin_addr.s_addr == INADDR_ANY) && 640 mask && 641 ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr) 642 ==0L) 643 cp = "default" ; 644 else if (flags & RTF_HOST) 645 cp = routename(sin->sin_addr.s_addr); 646 else if (mask) 647 cp = netname(sin->sin_addr.s_addr, 648 ntohl(((struct sockaddr_in *)mask) 649 ->sin_addr.s_addr)); 650 else 651 cp = netname(sin->sin_addr.s_addr, 0L); 652 break; 653 } 654 655 #ifdef INET6 656 case AF_INET6: 657 { 658 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa; 659 struct in6_addr *in6 = &sa6->sin6_addr; 660 661 /* 662 * XXX: This is a special workaround for KAME kernels. 663 * sin6_scope_id field of SA should be set in the future. 664 */ 665 if (IN6_IS_ADDR_LINKLOCAL(in6) || 666 IN6_IS_ADDR_MC_LINKLOCAL(in6)) { 667 /* XXX: override is ok? */ 668 sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]); 669 *(u_short *)&in6->s6_addr[2] = 0; 670 } 671 672 if (flags & RTF_HOST) 673 cp = routename6(sa6); 674 else if (mask) 675 cp = netname6(sa6, 676 &((struct sockaddr_in6 *)mask)->sin6_addr); 677 else { 678 cp = netname6(sa6, NULL); 679 } 680 break; 681 } 682 #endif /*INET6*/ 683 684 case AF_IPX: 685 { 686 struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr; 687 if (ipx_nullnet(satoipx_addr(work))) 688 cp = "default"; 689 else 690 cp = ipx_print(sa); 691 break; 692 } 693 case AF_NETGRAPH: 694 { 695 printf("%s", ((struct sockaddr_ng *)sa)->sg_data); 696 break; 697 } 698 case AF_LINK: 699 { 700 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; 701 702 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && 703 sdl->sdl_slen == 0) 704 (void) sprintf(workbuf, "link#%d", sdl->sdl_index); 705 else 706 switch (sdl->sdl_type) { 707 708 case IFT_ETHER: 709 case IFT_L2VLAN: 710 case IFT_CARP: 711 if (sdl->sdl_alen == ETHER_ADDR_LEN) { 712 cp = ether_ntoa((struct ether_addr *) 713 (sdl->sdl_data + sdl->sdl_nlen)); 714 break; 715 } 716 /* FALLTHROUGH */ 717 default: 718 cp = link_ntoa(sdl); 719 break; 720 } 721 break; 722 } 723 724 case AF_MPLS: 725 { 726 struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa; 727 728 (void) sprintf(workbuf, "%d", ntohl(smpls->smpls_label)); 729 break; 730 } 731 732 default: 733 { 734 u_char *s = (u_char *)sa->sa_data, *slim; 735 char *cq, *cqlim; 736 737 cq = workbuf; 738 slim = sa->sa_len + (u_char *) sa; 739 cqlim = cq + sizeof(workbuf) - 6; 740 cq += sprintf(cq, "(%d)", sa->sa_family); 741 while (s < slim && cq < cqlim) { 742 cq += sprintf(cq, " %02x", *s++); 743 if (s < slim) 744 cq += sprintf(cq, "%02x", *s++); 745 } 746 cp = workbuf; 747 } 748 } 749 750 return (cp); 751 } 752 753 static void 754 p_flags(int f, const char *format) 755 { 756 printf(format, fmt_flags(f)); 757 } 758 759 static const char * 760 fmt_flags(int f) 761 { 762 static char name[33]; 763 char *flags; 764 struct bits *p = bits; 765 766 for (flags = name; p->b_mask; p++) 767 if (p->b_mask & f) 768 *flags++ = p->b_val; 769 *flags = '\0'; 770 return (name); 771 } 772 773 static void 774 p_rtentry(struct rtentry *rt) 775 { 776 static struct ifnet ifnet, *lastif; 777 struct rtentry parent; 778 static char buffer[128]; 779 static char prettyname[128]; 780 struct sockaddr *sa; 781 sa_u addr, mask; 782 783 /* 784 * Don't print protocol-cloned routes unless -a. 785 */ 786 if (rt->rt_flags & RTF_WASCLONED && !aflag) { 787 if (kget(rt->rt_parent, parent) != 0) 788 return; 789 if (parent.rt_flags & RTF_PRCLONING) 790 return; 791 } 792 793 bzero(&addr, sizeof(addr)); 794 if ((sa = kgetsa(rt_key(rt)))) 795 bcopy(sa, &addr, sa->sa_len); 796 bzero(&mask, sizeof(mask)); 797 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt)))) 798 bcopy(sa, &mask, sa->sa_len); 799 p_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags, wid_dst); 800 p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw); 801 snprintf(buffer, sizeof(buffer), "%%-%d.%ds ", wid_flags, wid_flags); 802 p_flags(rt->rt_flags, buffer); 803 if (addr.u_sa.sa_family == AF_INET || Wflag) { 804 printf("%*ld %*lu ", wid_refs, rt->rt_refcnt, 805 wid_use, rt->rt_use); 806 if (Wflag) { 807 if (rt->rt_rmx.rmx_mtu != 0) 808 printf("%*lu ", wid_mtu, rt->rt_rmx.rmx_mtu); 809 else 810 printf("%*s ", wid_mtu, ""); 811 } 812 } 813 if (rt->rt_ifp) { 814 if (rt->rt_ifp != lastif) { 815 if (kget(rt->rt_ifp, ifnet) == 0) 816 strlcpy(prettyname, ifnet.if_xname, 817 sizeof(prettyname)); 818 else 819 strlcpy(prettyname, "---", sizeof(prettyname)); 820 lastif = rt->rt_ifp; 821 } 822 printf("%*.*s", wid_if, wid_if, prettyname); 823 if (rt->rt_rmx.rmx_expire) { 824 time_t expire_time; 825 826 if ((expire_time = 827 rt->rt_rmx.rmx_expire - time(NULL)) > 0) 828 printf(" %*d", wid_expire, (int)expire_time); 829 else 830 printf("%*s ", wid_expire, ""); 831 } else { 832 printf("%*s ", wid_expire, ""); 833 } 834 if (rt->rt_nodes[0].rn_dupedkey) 835 printf(" =>"); 836 } 837 if (Wflag) { 838 if (rt->rt_shim[0] != NULL) 839 printf(" %-*s", wid_mplslops, labelops(rt)); 840 else 841 printf(" %-*s", wid_mplslops, ""); 842 if (rt->rt_rmx.rmx_msl != 0) 843 printf(" %*lu", wid_msl, rt->rt_rmx.rmx_msl); 844 else 845 printf("%*s ", wid_msl, ""); 846 if (rt->rt_rmx.rmx_iwmaxsegs != 0) 847 printf(" %*lu", wid_iwmax, rt->rt_rmx.rmx_iwmaxsegs); 848 else 849 printf("%*s ", wid_iwmax, ""); 850 if (rt->rt_rmx.rmx_iwcapsegs != 0) 851 printf(" %*lu", wid_iw, rt->rt_rmx.rmx_iwcapsegs); 852 else 853 printf("%*s ", wid_iw, ""); 854 } 855 putchar('\n'); 856 } 857 858 char * 859 routename(u_long in) 860 { 861 char *cp; 862 static char line[MAXHOSTNAMELEN]; 863 struct hostent *hp; 864 865 cp = NULL; 866 if (!numeric_addr) { 867 hp = gethostbyaddr(&in, sizeof (struct in_addr), AF_INET); 868 if (hp) { 869 cp = hp->h_name; 870 trimdomain(cp, strlen(cp)); 871 } 872 } 873 if (cp) { 874 strncpy(line, cp, sizeof(line) - 1); 875 line[sizeof(line) - 1] = '\0'; 876 } else { 877 #define C(x) ((x) & 0xff) 878 in = ntohl(in); 879 sprintf(line, "%lu.%lu.%lu.%lu", 880 C(in >> 24), C(in >> 16), C(in >> 8), C(in)); 881 } 882 return (line); 883 } 884 885 static u_long 886 forgemask(u_long a) 887 { 888 u_long m; 889 890 if (IN_CLASSA(a)) 891 m = IN_CLASSA_NET; 892 else if (IN_CLASSB(a)) 893 m = IN_CLASSB_NET; 894 else 895 m = IN_CLASSC_NET; 896 return (m); 897 } 898 899 static void 900 domask(char *dst, u_long addr, u_long mask) 901 { 902 int b, i; 903 904 if (!mask || (forgemask(addr) == mask)) { 905 *dst = '\0'; 906 return; 907 } 908 i = 0; 909 for (b = 0; b < 32; b++) 910 if (mask & (1 << b)) { 911 int bb; 912 913 i = b; 914 for (bb = b+1; bb < 32; bb++) 915 if (!(mask & (1 << bb))) { 916 i = -1; /* noncontig */ 917 break; 918 } 919 break; 920 } 921 if (i == -1) 922 sprintf(dst, "&0x%lx", mask); 923 else 924 sprintf(dst, "/%d", 32-i); 925 } 926 927 /* 928 * Return the name of the network whose address is given. 929 * The address is assumed to be that of a net or subnet, not a host. 930 */ 931 char * 932 netname(u_long in, u_long mask) 933 { 934 char *cp = NULL; 935 static char line[MAXHOSTNAMELEN]; 936 struct netent *np = NULL; 937 u_long dmask; 938 u_long i; 939 940 #define NSHIFT(m) ( \ 941 (m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT : \ 942 (m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT : \ 943 (m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT : \ 944 0) 945 946 i = ntohl(in); 947 dmask = forgemask(i); 948 if (!numeric_addr && i) { 949 np = getnetbyaddr(i >> NSHIFT(mask), AF_INET); 950 if (np == NULL && mask == 0) 951 np = getnetbyaddr(i >> NSHIFT(dmask), AF_INET); 952 if (np != NULL) { 953 cp = np->n_name; 954 trimdomain(cp, strlen(cp)); 955 } 956 } 957 #undef NSHIFT 958 if (cp != NULL) { 959 strncpy(line, cp, sizeof(line) - 1); 960 line[sizeof(line) - 1] = '\0'; 961 } else { 962 if (mask <= IN_CLASSA_NET && 963 (i & IN_CLASSA_HOST) == 0) { 964 sprintf(line, "%lu", C(i >> 24)); 965 } else if (mask <= IN_CLASSB_NET && 966 (i & IN_CLASSB_HOST) == 0) { 967 sprintf(line, "%lu.%lu", 968 C(i >> 24), C(i >> 16)); 969 } else if (mask <= IN_CLASSC_NET && 970 (i & IN_CLASSC_HOST) == 0) { 971 sprintf(line, "%lu.%lu.%lu", 972 C(i >> 24), C(i >> 16), C(i >> 8)); 973 } else { 974 sprintf(line, "%lu.%lu.%lu.%lu", 975 C(i >> 24), C(i >> 16), C(i >> 8), C(i)); 976 } 977 } 978 domask(line + strlen(line), i, mask); 979 return (line); 980 } 981 982 #ifdef INET6 983 const char * 984 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask) 985 { 986 static char line[MAXHOSTNAMELEN]; 987 u_char *p = (u_char *)mask; 988 u_char *lim; 989 int masklen, illegal = 0, flag = NI_WITHSCOPEID; 990 991 if (mask) { 992 for (masklen = 0, lim = p + 16; p < lim; p++) { 993 switch (*p) { 994 case 0xff: 995 masklen += 8; 996 break; 997 case 0xfe: 998 masklen += 7; 999 break; 1000 case 0xfc: 1001 masklen += 6; 1002 break; 1003 case 0xf8: 1004 masklen += 5; 1005 break; 1006 case 0xf0: 1007 masklen += 4; 1008 break; 1009 case 0xe0: 1010 masklen += 3; 1011 break; 1012 case 0xc0: 1013 masklen += 2; 1014 break; 1015 case 0x80: 1016 masklen += 1; 1017 break; 1018 case 0x00: 1019 break; 1020 default: 1021 illegal ++; 1022 break; 1023 } 1024 } 1025 if (illegal) 1026 fprintf(stderr, "illegal prefixlen\n"); 1027 } 1028 else 1029 masklen = 128; 1030 1031 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr)) 1032 return("default"); 1033 1034 if (numeric_addr) 1035 flag |= NI_NUMERICHOST; 1036 getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line), 1037 NULL, 0, flag); 1038 1039 if (numeric_addr) 1040 sprintf(&line[strlen(line)], "/%d", masklen); 1041 1042 return line; 1043 } 1044 1045 char * 1046 routename6(struct sockaddr_in6 *sa6) 1047 { 1048 static char line[MAXHOSTNAMELEN]; 1049 int flag = NI_WITHSCOPEID; 1050 /* use local variable for safety */ 1051 struct sockaddr_in6 sa6_local; 1052 1053 sa6_local.sin6_family = AF_INET6; 1054 sa6_local.sin6_len = sizeof(sa6_local); 1055 sa6_local.sin6_addr = sa6->sin6_addr; 1056 sa6_local.sin6_scope_id = sa6->sin6_scope_id; 1057 1058 if (numeric_addr) 1059 flag |= NI_NUMERICHOST; 1060 1061 getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len, 1062 line, sizeof(line), NULL, 0, flag); 1063 1064 return line; 1065 } 1066 #endif /*INET6*/ 1067 1068 /* 1069 * Print routing statistics 1070 */ 1071 void 1072 rt_stats(void) 1073 { 1074 struct rtstatistics rts; 1075 int error = 0; 1076 1077 error = kinfo_get_net_rtstatistics(&rts); 1078 if (error) { 1079 printf("routing: could not retrieve statistics\n"); 1080 return; 1081 } 1082 printf("routing:\n"); 1083 1084 #define p(f, m) if (rts.f || sflag <= 1) \ 1085 printf(m, rts.f, plural(rts.f)) 1086 1087 p(rts_badredirect, "\t%lu bad routing redirect%s\n"); 1088 p(rts_dynamic, "\t%lu dynamically created route%s\n"); 1089 p(rts_newgateway, "\t%lu new gateway%s due to redirects\n"); 1090 p(rts_unreach, "\t%lu destination%s found unreachable\n"); 1091 p(rts_wildcard, "\t%lu use%s of a wildcard route\n"); 1092 #undef p 1093 } 1094 1095 char * 1096 ipx_print(struct sockaddr *sa) 1097 { 1098 u_short port; 1099 struct servent *sp = NULL; 1100 const char *net = "", *host = ""; 1101 char *p; 1102 u_char *q; 1103 struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr; 1104 static char mybuf[50]; 1105 char cport[10], chost[15], cnet[15]; 1106 1107 port = ntohs(work.x_port); 1108 1109 if (ipx_nullnet(work) && ipx_nullhost(work)) { 1110 1111 if (port) { 1112 if (sp) 1113 sprintf(mybuf, "*.%s", sp->s_name); 1114 else 1115 sprintf(mybuf, "*.%x", port); 1116 } else 1117 sprintf(mybuf, "*.*"); 1118 1119 return (mybuf); 1120 } 1121 1122 if (ipx_wildnet(work)) 1123 net = "any"; 1124 else if (ipx_nullnet(work)) 1125 net = "*"; 1126 else { 1127 q = work.x_net.c_net; 1128 sprintf(cnet, "%02x%02x%02x%02x", 1129 q[0], q[1], q[2], q[3]); 1130 for (p = cnet; *p == '0' && p < cnet + 8; p++) 1131 continue; 1132 net = p; 1133 } 1134 1135 if (ipx_wildhost(work)) 1136 host = "any"; 1137 else if (ipx_nullhost(work)) 1138 host = "*"; 1139 else { 1140 q = work.x_host.c_host; 1141 sprintf(chost, "%02x%02x%02x%02x%02x%02x", 1142 q[0], q[1], q[2], q[3], q[4], q[5]); 1143 for (p = chost; *p == '0' && p < chost + 12; p++) 1144 continue; 1145 host = p; 1146 } 1147 1148 if (port) { 1149 if (strcmp(host, "*") == 0) 1150 host = ""; 1151 if (sp) 1152 snprintf(cport, sizeof(cport), 1153 "%s%s", *host ? "." : "", sp->s_name); 1154 else 1155 snprintf(cport, sizeof(cport), 1156 "%s%x", *host ? "." : "", port); 1157 } else 1158 *cport = 0; 1159 1160 snprintf(mybuf, sizeof(mybuf), "%s.%s%s", net, host, cport); 1161 return(mybuf); 1162 } 1163 1164 char * 1165 ipx_phost(struct sockaddr *sa) 1166 { 1167 struct sockaddr_ipx *sipx = (struct sockaddr_ipx *)sa; 1168 struct sockaddr_ipx work; 1169 static union ipx_net ipx_zeronet; 1170 char *p; 1171 1172 work = *sipx; 1173 work.sipx_addr.x_port = 0; 1174 work.sipx_addr.x_net = ipx_zeronet; 1175 p = ipx_print((struct sockaddr *)&work); 1176 if (strncmp("*.", p, 2) == 0) p += 2; 1177 1178 return(p); 1179 } 1180 1181 void 1182 upHex(char *p0) 1183 { 1184 char *p = p0; 1185 1186 for (; *p; p++) 1187 switch (*p) { 1188 1189 case 'a': 1190 case 'b': 1191 case 'c': 1192 case 'd': 1193 case 'e': 1194 case 'f': 1195 *p += ('A' - 'a'); 1196 break; 1197 } 1198 } 1199 1200 static const char * 1201 labelops(struct rtentry *rt) 1202 { 1203 const char *lops[] = { "push", "pop", "swap", "pop all" }; 1204 static char buffer[100]; 1205 char *cp = buffer; 1206 struct sockaddr_mpls *smpls; 1207 int i; 1208 1209 for (i=0; i<MPLS_MAXLOPS; ++i) { 1210 1211 if (rt->rt_shim[i] == NULL) 1212 break; 1213 if (i>0) { 1214 cp += snprintf(cp, 1215 sizeof(buffer) - (cp - buffer), 1216 ", "); 1217 } 1218 smpls = (struct sockaddr_mpls *)kgetsa(rt->rt_shim[i]); 1219 if (smpls->smpls_op != MPLSLOP_POP && 1220 smpls->smpls_op != MPLSLOP_POPALL){ 1221 cp += snprintf(cp, 1222 sizeof(buffer) - (cp - buffer), 1223 "%s %d", 1224 lops[smpls->smpls_op - 1], 1225 ntohl(smpls->smpls_label)); 1226 } else { 1227 cp += snprintf(cp, 1228 sizeof(buffer) - (cp - buffer), 1229 "%s", 1230 lops[smpls->smpls_op - 1]); 1231 } 1232 } 1233 1234 return (buffer); 1235 } 1236