1 /*- 2 * Copyright (c) 1983, 1988, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 4. Neither the name of the University nor the names of its contributors 14 * may be used to endorse or promote products derived from this software 15 * without specific prior written permission. 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27 * SUCH DAMAGE. 28 */ 29 30 #if 0 31 #ifndef lint 32 static char sccsid[] = "From: @(#)route.c 8.6 (Berkeley) 4/28/95"; 33 #endif /* not lint */ 34 #endif 35 36 #include <sys/cdefs.h> 37 __FBSDID("$FreeBSD$"); 38 39 #include <sys/param.h> 40 #include <sys/protosw.h> 41 #include <sys/socket.h> 42 #include <sys/socketvar.h> 43 #include <sys/time.h> 44 45 #include <net/ethernet.h> 46 #include <net/if.h> 47 #include <net/if_var.h> 48 #include <net/if_dl.h> 49 #include <net/if_types.h> 50 #include <net/radix.h> 51 #define _WANT_RTENTRY 52 #include <net/route.h> 53 54 #include <netinet/in.h> 55 #include <netgraph/ng_socket.h> 56 57 #include <sys/sysctl.h> 58 59 #include <arpa/inet.h> 60 #include <ifaddrs.h> 61 #include <libutil.h> 62 #include <netdb.h> 63 #include <nlist.h> 64 #include <stdint.h> 65 #include <stdio.h> 66 #include <stdlib.h> 67 #include <stdbool.h> 68 #include <string.h> 69 #include <sysexits.h> 70 #include <unistd.h> 71 #include <err.h> 72 #include <libxo/xo.h> 73 #include "netstat.h" 74 75 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d))) 76 77 /* 78 * Definitions for showing gateway flags. 79 */ 80 struct bits { 81 u_long b_mask; 82 char b_val; 83 const char *b_name; 84 } bits[] = { 85 { RTF_UP, 'U', "up" }, 86 { RTF_GATEWAY, 'G', "gateway" }, 87 { RTF_HOST, 'H', "host" }, 88 { RTF_REJECT, 'R', "reject" }, 89 { RTF_DYNAMIC, 'D', "dynamic" }, 90 { RTF_MODIFIED, 'M', "modified" }, 91 { RTF_DONE, 'd', "done" }, /* Completed -- for routing msgs only */ 92 { RTF_XRESOLVE, 'X', "xresolve" }, 93 { RTF_STATIC, 'S', "static" }, 94 { RTF_PROTO1, '1', "proto1" }, 95 { RTF_PROTO2, '2', "proto2" }, 96 { RTF_PROTO3, '3', "proto3" }, 97 { RTF_BLACKHOLE,'B', "blackhole" }, 98 { RTF_BROADCAST,'b', "broadcast" }, 99 #ifdef RTF_LLINFO 100 { RTF_LLINFO, 'L', "llinfo" }, 101 #endif 102 { 0 , 0, NULL } 103 }; 104 105 /* 106 * kvm(3) bindings for every needed symbol 107 */ 108 static struct nlist rl[] = { 109 #define N_RTSTAT 0 110 { .n_name = "_rtstat" }, 111 #define N_RTREE 1 112 { .n_name = "_rt_tables"}, 113 #define N_RTTRASH 2 114 { .n_name = "_rttrash" }, 115 { .n_name = NULL }, 116 }; 117 118 typedef union { 119 long dummy; /* Helps align structure. */ 120 struct sockaddr u_sa; 121 u_short u_data[128]; 122 } sa_u; 123 124 static sa_u pt_u; 125 126 struct ifmap_entry { 127 char ifname[IFNAMSIZ]; 128 }; 129 130 static struct ifmap_entry *ifmap; 131 static int ifmap_size; 132 133 int do_rtent = 0; 134 struct rtentry rtentry; 135 struct radix_node rnode; 136 struct radix_mask rmask; 137 138 int NewTree = 1; 139 140 struct timespec uptime; 141 142 static struct sockaddr *kgetsa(struct sockaddr *); 143 static void size_cols(int ef, struct radix_node *rn); 144 static void size_cols_tree(struct radix_node *rn); 145 static void size_cols_rtentry(struct rtentry *rt); 146 static void p_rtnode_kvm(void); 147 static void p_rtable_sysctl(int, int); 148 static void p_rtable_kvm(int, int ); 149 static void p_rtree_kvm(const char *name, struct radix_node *); 150 static void p_rtentry_kvm(const char *name, struct rtentry *); 151 static void p_rtentry_sysctl(const char *name, struct rt_msghdr *); 152 static void p_sockaddr(const char *name, struct sockaddr *, struct sockaddr *, 153 int, int); 154 static const char *fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, 155 int flags); 156 static void p_flags(int, const char *); 157 static const char *fmt_flags(int f); 158 static void domask(char *, in_addr_t, u_long); 159 160 /* 161 * Print routing tables. 162 */ 163 void 164 routepr(int fibnum, int af) 165 { 166 size_t intsize; 167 int numfibs; 168 169 intsize = sizeof(int); 170 if (fibnum == -1 && 171 sysctlbyname("net.my_fibnum", &fibnum, &intsize, NULL, 0) == -1) 172 fibnum = 0; 173 if (sysctlbyname("net.fibs", &numfibs, &intsize, NULL, 0) == -1) 174 numfibs = 1; 175 if (fibnum < 0 || fibnum > numfibs - 1) 176 errx(EX_USAGE, "%d: invalid fib", fibnum); 177 /* 178 * Since kernel & userland use different timebase 179 * (time_uptime vs time_second) and we are reading kernel memory 180 * directly we should do rt_expire --> expire_time conversion. 181 */ 182 if (clock_gettime(CLOCK_UPTIME, &uptime) < 0) 183 err(EX_OSERR, "clock_gettime() failed"); 184 185 xo_open_container("route-information"); 186 xo_emit("{T:Routing tables}"); 187 if (fibnum) 188 xo_emit(" ({L:fib}: {:fib/%d})", fibnum); 189 xo_emit("\n"); 190 191 if (Aflag == 0 && live != 0 && NewTree) 192 p_rtable_sysctl(fibnum, af); 193 else 194 p_rtable_kvm(fibnum, af); 195 xo_close_container("route-information"); 196 } 197 198 199 /* 200 * Print address family header before a section of the routing table. 201 */ 202 void 203 pr_family(int af1) 204 { 205 const char *afname; 206 207 switch (af1) { 208 case AF_INET: 209 afname = "Internet"; 210 break; 211 #ifdef INET6 212 case AF_INET6: 213 afname = "Internet6"; 214 break; 215 #endif /*INET6*/ 216 case AF_ISO: 217 afname = "ISO"; 218 break; 219 case AF_CCITT: 220 afname = "X.25"; 221 break; 222 case AF_NETGRAPH: 223 afname = "Netgraph"; 224 break; 225 default: 226 afname = NULL; 227 break; 228 } 229 if (afname) 230 xo_emit("\n{k:address-family/%s}:\n", afname); 231 else 232 xo_emit("\n{L:Protocol Family} {k:address-family/%d}:\n", af1); 233 } 234 235 /* column widths; each followed by one space */ 236 #ifndef INET6 237 #define WID_DST_DEFAULT(af) 18 /* width of destination column */ 238 #define WID_GW_DEFAULT(af) 18 /* width of gateway column */ 239 #define WID_IF_DEFAULT(af) (Wflag ? 10 : 8) /* width of netif column */ 240 #else 241 #define WID_DST_DEFAULT(af) \ 242 ((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18) 243 #define WID_GW_DEFAULT(af) \ 244 ((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18) 245 #define WID_IF_DEFAULT(af) ((af) == AF_INET6 ? 8 : (Wflag ? 10 : 8)) 246 #endif /*INET6*/ 247 248 static int wid_dst; 249 static int wid_gw; 250 static int wid_flags; 251 static int wid_pksent; 252 static int wid_mtu; 253 static int wid_if; 254 static int wid_expire; 255 256 static void 257 size_cols(int ef, struct radix_node *rn) 258 { 259 wid_dst = WID_DST_DEFAULT(ef); 260 wid_gw = WID_GW_DEFAULT(ef); 261 wid_flags = 6; 262 wid_pksent = 8; 263 wid_mtu = 6; 264 wid_if = WID_IF_DEFAULT(ef); 265 wid_expire = 6; 266 267 if (Wflag && rn != NULL) 268 size_cols_tree(rn); 269 } 270 271 static void 272 size_cols_tree(struct radix_node *rn) 273 { 274 again: 275 if (kget(rn, rnode) != 0) 276 return; 277 if (!(rnode.rn_flags & RNF_ACTIVE)) 278 return; 279 if (rnode.rn_bit < 0) { 280 if ((rnode.rn_flags & RNF_ROOT) == 0) { 281 if (kget(rn, rtentry) != 0) 282 return; 283 size_cols_rtentry(&rtentry); 284 } 285 if ((rn = rnode.rn_dupedkey)) 286 goto again; 287 } else { 288 rn = rnode.rn_right; 289 size_cols_tree(rnode.rn_left); 290 size_cols_tree(rn); 291 } 292 } 293 294 static void 295 size_cols_rtentry(struct rtentry *rt) 296 { 297 static struct ifnet ifnet, *lastif; 298 static char buffer[100]; 299 const char *bp; 300 struct sockaddr *sa; 301 sa_u addr, mask; 302 int len; 303 304 bzero(&addr, sizeof(addr)); 305 if ((sa = kgetsa(rt_key(rt)))) 306 bcopy(sa, &addr, sa->sa_len); 307 bzero(&mask, sizeof(mask)); 308 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt)))) 309 bcopy(sa, &mask, sa->sa_len); 310 bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags); 311 len = strlen(bp); 312 wid_dst = MAX(len, wid_dst); 313 314 bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST); 315 len = strlen(bp); 316 wid_gw = MAX(len, wid_gw); 317 318 bp = fmt_flags(rt->rt_flags); 319 len = strlen(bp); 320 wid_flags = MAX(len, wid_flags); 321 322 if (Wflag) { 323 len = snprintf(buffer, sizeof(buffer), "%ju", 324 (uintmax_t )kread_counter((u_long )rt->rt_pksent)); 325 wid_pksent = MAX(len, wid_pksent); 326 } 327 if (rt->rt_ifp) { 328 if (rt->rt_ifp != lastif) { 329 if (kget(rt->rt_ifp, ifnet) == 0) 330 len = strlen(ifnet.if_xname); 331 else 332 len = strlen("---"); 333 lastif = rt->rt_ifp; 334 wid_if = MAX(len, wid_if); 335 } 336 if (rt->rt_expire) { 337 time_t expire_time; 338 339 if ((expire_time = 340 rt->rt_expire - uptime.tv_sec) > 0) { 341 len = snprintf(buffer, sizeof(buffer), "%d", 342 (int)expire_time); 343 wid_expire = MAX(len, wid_expire); 344 } 345 } 346 } 347 } 348 349 350 /* 351 * Print header for routing table columns. 352 */ 353 void 354 pr_rthdr(int af1) 355 { 356 357 if (Aflag) 358 xo_emit("{T:/%-8.8s} ","Address"); 359 if (Wflag) { 360 xo_emit("{T:/%-*.*s} {T:/%-*.*s} {T:/%-*.*s} {T:/%*.*s} " 361 "{T:/%*.*s} {T:/%*.*s} {T:/%*.*s} {T:/%*s}\n", 362 wid_dst, wid_dst, "Destination", 363 wid_gw, wid_gw, "Gateway", 364 wid_flags, wid_flags, "Flags", 365 wid_pksent, wid_pksent, "Use", 366 wid_mtu, wid_mtu, "Mtu", 367 wid_if, wid_if, "Netif", 368 wid_expire, "Expire"); 369 } else { 370 xo_emit("{T:/%-*.*s} {T:/%-*.*s} {T:/%-*.*s} {T:/%*.*s} " 371 "{T:/%*s}\n", 372 wid_dst, wid_dst, "Destination", 373 wid_gw, wid_gw, "Gateway", 374 wid_flags, wid_flags, "Flags", 375 wid_if, wid_if, "Netif", 376 wid_expire, "Expire"); 377 } 378 } 379 380 static struct sockaddr * 381 kgetsa(struct sockaddr *dst) 382 { 383 384 if (kget(dst, pt_u.u_sa) != 0) 385 return (NULL); 386 if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa)) 387 kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len); 388 return (&pt_u.u_sa); 389 } 390 391 /* 392 * Print kernel routing tables for given fib 393 * using debugging kvm(3) interface. 394 */ 395 static void 396 p_rtable_kvm(int fibnum, int af) 397 { 398 struct radix_node_head **rnhp, *rnh, head; 399 struct radix_node_head **rt_tables; 400 u_long rtree; 401 int fam, af_size; 402 bool did_rt_family = false; 403 404 kresolve_list(rl); 405 if ((rtree = rl[N_RTREE].n_value) == 0) { 406 xo_emit("rt_tables: symbol not in namelist\n"); 407 return; 408 } 409 410 af_size = (AF_MAX + 1) * sizeof(struct radix_node_head *); 411 rt_tables = calloc(1, af_size); 412 if (rt_tables == NULL) 413 err(EX_OSERR, "memory allocation failed"); 414 415 if (kread((u_long)(rtree), (char *)(rt_tables) + fibnum * af_size, 416 af_size) != 0) 417 err(EX_OSERR, "error retrieving radix pointers"); 418 xo_open_container("route-table"); 419 for (fam = 0; fam <= AF_MAX; fam++) { 420 int tmpfib; 421 422 switch (fam) { 423 case AF_INET6: 424 case AF_INET: 425 tmpfib = fibnum; 426 break; 427 default: 428 tmpfib = 0; 429 } 430 rnhp = (struct radix_node_head **)*rt_tables; 431 /* Calculate the in-kernel address. */ 432 rnhp += tmpfib * (AF_MAX + 1) + fam; 433 /* Read the in kernel rhn pointer. */ 434 if (kget(rnhp, rnh) != 0) 435 continue; 436 if (rnh == NULL) 437 continue; 438 /* Read the rnh data. */ 439 if (kget(rnh, head) != 0) 440 continue; 441 if (fam == AF_UNSPEC) { 442 if (Aflag && af == 0) { 443 xo_emit("{T:Netmasks}:\n"); 444 xo_open_list("netmasks"); 445 p_rtree_kvm("netmasks", head.rnh_treetop); 446 xo_close_list("netmasks"); 447 } 448 } else if (af == AF_UNSPEC || af == fam) { 449 if (!did_rt_family) { 450 xo_open_list("rt-family"); 451 did_rt_family = true; 452 } 453 size_cols(fam, head.rnh_treetop); 454 xo_open_instance("rt-family"); 455 pr_family(fam); 456 do_rtent = 1; 457 xo_open_list("rt-entry"); 458 pr_rthdr(fam); 459 p_rtree_kvm("rt-entry", head.rnh_treetop); 460 xo_close_list("rt-entry"); 461 xo_close_instance("rt-family"); 462 } 463 } 464 if (did_rt_family) 465 xo_close_list("rt-family"); 466 xo_close_container("route-table"); 467 468 free(rt_tables); 469 } 470 471 /* 472 * Print given kernel radix tree using 473 * debugging kvm(3) interface. 474 */ 475 static void 476 p_rtree_kvm(const char *name, struct radix_node *rn) 477 { 478 bool opened; 479 480 opened = false; 481 482 #define DOOPEN() do { \ 483 if (!opened) { xo_open_instance(name); opened = true; } \ 484 } while (0) 485 #define DOCLOSE() do { \ 486 if (opened) { opened = false; xo_close_instance(name); } \ 487 } while(0) 488 489 again: 490 if (kget(rn, rnode) != 0) 491 return; 492 if (!(rnode.rn_flags & RNF_ACTIVE)) 493 return; 494 if (rnode.rn_bit < 0) { 495 if (Aflag) { 496 DOOPEN(); 497 xo_emit("{q:radix-node/%-8.8lx} ", (u_long)rn); 498 } 499 if (rnode.rn_flags & RNF_ROOT) { 500 if (Aflag) { 501 DOOPEN(); 502 xo_emit("({:root/root} node){L:/%s}", 503 rnode.rn_dupedkey ? " =>\n" : "\n"); 504 } 505 } else if (do_rtent) { 506 if (kget(rn, rtentry) == 0) { 507 DOOPEN(); 508 p_rtentry_kvm(name, &rtentry); 509 if (Aflag) { 510 DOOPEN(); 511 p_rtnode_kvm(); 512 DOCLOSE(); 513 } 514 } 515 } else { 516 DOOPEN(); 517 p_sockaddr("address", 518 kgetsa((struct sockaddr *)rnode.rn_key), 519 NULL, 0, 44); 520 xo_emit("\n"); 521 } 522 DOCLOSE(); 523 if ((rn = rnode.rn_dupedkey)) 524 goto again; 525 } else { 526 if (Aflag && do_rtent) { 527 DOOPEN(); 528 xo_emit("{q:radix-node/%-8.8lx} ", (u_long)rn); 529 p_rtnode_kvm(); 530 DOCLOSE(); 531 } 532 rn = rnode.rn_right; 533 p_rtree_kvm(name, rnode.rn_left); 534 p_rtree_kvm(name, rn); 535 } 536 } 537 538 char nbuf[20]; 539 540 static void 541 p_rtnode_kvm(void) 542 { 543 struct radix_mask *rm = rnode.rn_mklist; 544 545 if (rnode.rn_bit < 0) { 546 if (rnode.rn_mask) { 547 xo_emit("\t {L:mask} "); 548 p_sockaddr("netmask", 549 kgetsa((struct sockaddr *)rnode.rn_mask), 550 NULL, 0, -1); 551 } else if (rm == 0) 552 return; 553 } else { 554 xo_emit("{[:6}{:bit/(%d)}{]:} {q:left-node/%8.8lx} " 555 ": {q:right-node/%8.8lx}", rnode.rn_bit, 556 (u_long)rnode.rn_left, (u_long)rnode.rn_right); 557 } 558 while (rm) { 559 if (kget(rm, rmask) != 0) 560 break; 561 sprintf(nbuf, " %d refs, ", rmask.rm_refs); 562 xo_emit(" mk = {q:node/%8.8lx} \\{({:bit/%d}),{nbufs/%s}", 563 (u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " "); 564 if (rmask.rm_flags & RNF_NORMAL) { 565 struct radix_node rnode_aux; 566 xo_emit(" <{:mode/normal}>, "); 567 if (kget(rmask.rm_leaf, rnode_aux) == 0) 568 p_sockaddr("netmask", 569 kgetsa(/*XXX*/(void *)rnode_aux.rn_mask), 570 NULL, 0, -1); 571 else 572 p_sockaddr(NULL, NULL, NULL, 0, -1); 573 } else 574 p_sockaddr("netmask", 575 kgetsa((struct sockaddr *)rmask.rm_mask), 576 NULL, 0, -1); 577 xo_emit("\\}"); 578 if ((rm = rmask.rm_mklist)) 579 xo_emit(" {D:->}"); 580 } 581 xo_emit("\n"); 582 } 583 584 static void 585 p_rtable_sysctl(int fibnum, int af) 586 { 587 size_t needed; 588 int mib[7]; 589 char *buf, *next, *lim; 590 struct rt_msghdr *rtm; 591 struct sockaddr *sa; 592 int fam = AF_UNSPEC, ifindex = 0, size; 593 int need_table_close = false; 594 595 struct ifaddrs *ifap, *ifa; 596 struct sockaddr_dl *sdl; 597 598 /* 599 * Retrieve interface list at first 600 * since we need #ifindex -> if_xname match 601 */ 602 if (getifaddrs(&ifap) != 0) 603 err(EX_OSERR, "getifaddrs"); 604 605 for (ifa = ifap; ifa; ifa = ifa->ifa_next) { 606 607 if (ifa->ifa_addr->sa_family != AF_LINK) 608 continue; 609 610 sdl = (struct sockaddr_dl *)ifa->ifa_addr; 611 ifindex = sdl->sdl_index; 612 613 if (ifindex >= ifmap_size) { 614 size = roundup(ifindex + 1, 32) * 615 sizeof(struct ifmap_entry); 616 if ((ifmap = realloc(ifmap, size)) == NULL) 617 errx(2, "realloc(%d) failed", size); 618 memset(&ifmap[ifmap_size], 0, 619 size - ifmap_size * 620 sizeof(struct ifmap_entry)); 621 622 ifmap_size = roundup(ifindex + 1, 32); 623 } 624 625 if (*ifmap[ifindex].ifname != '\0') 626 continue; 627 628 strlcpy(ifmap[ifindex].ifname, ifa->ifa_name, IFNAMSIZ); 629 } 630 631 freeifaddrs(ifap); 632 633 mib[0] = CTL_NET; 634 mib[1] = PF_ROUTE; 635 mib[2] = 0; 636 mib[3] = af; 637 mib[4] = NET_RT_DUMP; 638 mib[5] = 0; 639 mib[6] = fibnum; 640 if (sysctl(mib, nitems(mib), NULL, &needed, NULL, 0) < 0) 641 err(EX_OSERR, "sysctl: net.route.0.%d.dump.%d estimate", af, 642 fibnum); 643 if ((buf = malloc(needed)) == NULL) 644 errx(2, "malloc(%lu)", (unsigned long)needed); 645 if (sysctl(mib, nitems(mib), buf, &needed, NULL, 0) < 0) 646 err(1, "sysctl: net.route.0.%d.dump.%d", af, fibnum); 647 lim = buf + needed; 648 xo_open_container("route-table"); 649 xo_open_list("rt-family"); 650 for (next = buf; next < lim; next += rtm->rtm_msglen) { 651 rtm = (struct rt_msghdr *)next; 652 if (rtm->rtm_version != RTM_VERSION) 653 continue; 654 /* 655 * Peek inside header to determine AF 656 */ 657 sa = (struct sockaddr *)(rtm + 1); 658 /* Only print family first time. */ 659 if (fam != sa->sa_family) { 660 if (need_table_close) { 661 xo_close_list("rt-entry"); 662 xo_close_instance("rt-family"); 663 } 664 need_table_close = true; 665 666 fam = sa->sa_family; 667 size_cols(fam, NULL); 668 xo_open_instance("rt-family"); 669 pr_family(fam); 670 xo_open_list("rt-entry"); 671 672 pr_rthdr(fam); 673 } 674 p_rtentry_sysctl("rt-entry", rtm); 675 } 676 if (need_table_close) { 677 xo_close_list("rt-entry"); 678 xo_close_instance("rt-family"); 679 } 680 xo_close_list("rt-family"); 681 xo_close_container("route-table"); 682 free(buf); 683 } 684 685 static void 686 p_rtentry_sysctl(const char *name, struct rt_msghdr *rtm) 687 { 688 struct sockaddr *sa = (struct sockaddr *)(rtm + 1); 689 char buffer[128]; 690 char prettyname[128]; 691 sa_u addr, mask, gw; 692 unsigned int l; 693 694 xo_open_instance(name); 695 696 #define GETSA(_s, _f) { \ 697 bzero(&(_s), sizeof(_s)); \ 698 if (rtm->rtm_addrs & _f) { \ 699 l = roundup(sa->sa_len, sizeof(long)); \ 700 memcpy(&(_s), sa, (l > sizeof(_s)) ? sizeof(_s) : l); \ 701 sa = (struct sockaddr *)((char *)sa + l); \ 702 } \ 703 } 704 705 GETSA(addr, RTA_DST); 706 GETSA(gw, RTA_GATEWAY); 707 GETSA(mask, RTA_NETMASK); 708 709 p_sockaddr("destination", &addr.u_sa, &mask.u_sa, rtm->rtm_flags, 710 wid_dst); 711 p_sockaddr("gateway", &gw.u_sa, NULL, RTF_HOST, wid_gw); 712 snprintf(buffer, sizeof(buffer), "{[:-%d}{:flags/%%s}{]:}", 713 wid_flags); 714 p_flags(rtm->rtm_flags, buffer); 715 if (Wflag) { 716 xo_emit("{t:use/%*lu} ", wid_pksent, rtm->rtm_rmx.rmx_pksent); 717 718 if (rtm->rtm_rmx.rmx_mtu != 0) 719 xo_emit("{t:mtu/%*lu} ", wid_mtu, rtm->rtm_rmx.rmx_mtu); 720 else 721 xo_emit("{P:/%*s} ", wid_mtu, ""); 722 } 723 724 memset(prettyname, 0, sizeof(prettyname)); 725 if (rtm->rtm_index < ifmap_size) { 726 strlcpy(prettyname, ifmap[rtm->rtm_index].ifname, 727 sizeof(prettyname)); 728 if (*prettyname == '\0') 729 strlcpy(prettyname, "---", sizeof(prettyname)); 730 } 731 732 xo_emit("{t:interface-name/%*.*s}", wid_if, wid_if, prettyname); 733 if (rtm->rtm_rmx.rmx_expire) { 734 time_t expire_time; 735 736 if ((expire_time = rtm->rtm_rmx.rmx_expire - uptime.tv_sec) > 0) 737 xo_emit(" {:expire-time/%*d}", wid_expire, 738 (int)expire_time); 739 } 740 741 xo_emit("\n"); 742 xo_close_instance(name); 743 } 744 745 static void 746 p_sockaddr(const char *name, struct sockaddr *sa, struct sockaddr *mask, 747 int flags, int width) 748 { 749 const char *cp; 750 char buf[128]; 751 752 cp = fmt_sockaddr(sa, mask, flags); 753 754 if (width < 0) { 755 snprintf(buf, sizeof(buf), "{:%s/%%s} ", name); 756 xo_emit(buf, cp); 757 } else { 758 if (numeric_addr) { 759 snprintf(buf, sizeof(buf), "{[:%d}{:%s/%%s}{]:} ", 760 -width, name); 761 xo_emit(buf, cp); 762 } else { 763 snprintf(buf, sizeof(buf), "{[:%d}{:%s/%%-.*s}{]:} ", 764 -width, name); 765 xo_emit(buf, width, cp); 766 } 767 } 768 } 769 770 static const char * 771 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags) 772 { 773 static char workbuf[128]; 774 const char *cp; 775 776 if (sa == NULL) 777 return ("null"); 778 779 switch(sa->sa_family) { 780 case AF_INET: 781 { 782 struct sockaddr_in *sockin = (struct sockaddr_in *)sa; 783 784 if ((sockin->sin_addr.s_addr == INADDR_ANY) && 785 mask && 786 ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr) 787 ==0L) 788 cp = "default" ; 789 else if (flags & RTF_HOST) 790 cp = routename(sockin->sin_addr.s_addr); 791 else if (mask) 792 cp = netname(sockin->sin_addr.s_addr, 793 ((struct sockaddr_in *)mask)->sin_addr.s_addr); 794 else 795 cp = netname(sockin->sin_addr.s_addr, INADDR_ANY); 796 break; 797 } 798 799 #ifdef INET6 800 case AF_INET6: 801 { 802 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa; 803 804 /* 805 * The sa6->sin6_scope_id must be filled here because 806 * this sockaddr is extracted from kmem(4) directly 807 * and has KAME-specific embedded scope id in 808 * sa6->sin6_addr.s6_addr[2]. 809 */ 810 in6_fillscopeid(sa6); 811 812 if (flags & RTF_HOST) 813 cp = routename6(sa6); 814 else if (mask) 815 cp = netname6(sa6, 816 &((struct sockaddr_in6 *)mask)->sin6_addr); 817 else { 818 cp = netname6(sa6, NULL); 819 } 820 break; 821 } 822 #endif /*INET6*/ 823 824 case AF_NETGRAPH: 825 { 826 strlcpy(workbuf, ((struct sockaddr_ng *)sa)->sg_data, 827 sizeof(workbuf)); 828 cp = workbuf; 829 break; 830 } 831 832 case AF_LINK: 833 { 834 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; 835 836 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 && 837 sdl->sdl_slen == 0) { 838 (void) sprintf(workbuf, "link#%d", sdl->sdl_index); 839 cp = workbuf; 840 } else 841 switch (sdl->sdl_type) { 842 843 case IFT_ETHER: 844 case IFT_L2VLAN: 845 case IFT_BRIDGE: 846 if (sdl->sdl_alen == ETHER_ADDR_LEN) { 847 cp = ether_ntoa((struct ether_addr *) 848 (sdl->sdl_data + sdl->sdl_nlen)); 849 break; 850 } 851 /* FALLTHROUGH */ 852 default: 853 cp = link_ntoa(sdl); 854 break; 855 } 856 break; 857 } 858 859 default: 860 { 861 u_char *s = (u_char *)sa->sa_data, *slim; 862 char *cq, *cqlim; 863 864 cq = workbuf; 865 slim = sa->sa_len + (u_char *) sa; 866 cqlim = cq + sizeof(workbuf) - 6; 867 cq += sprintf(cq, "(%d)", sa->sa_family); 868 while (s < slim && cq < cqlim) { 869 cq += sprintf(cq, " %02x", *s++); 870 if (s < slim) 871 cq += sprintf(cq, "%02x", *s++); 872 } 873 cp = workbuf; 874 } 875 } 876 877 return (cp); 878 } 879 880 static void 881 p_flags(int f, const char *format) 882 { 883 struct bits *p; 884 885 xo_emit(format, fmt_flags(f)); 886 887 xo_open_list("flags_pretty"); 888 for (p = bits; p->b_mask; p++) 889 if (p->b_mask & f) 890 xo_emit("{le:flags_pretty/%s}", p->b_name); 891 xo_close_list("flags_pretty"); 892 } 893 894 static const char * 895 fmt_flags(int f) 896 { 897 static char name[33]; 898 char *flags; 899 struct bits *p = bits; 900 901 for (flags = name; p->b_mask; p++) 902 if (p->b_mask & f) 903 *flags++ = p->b_val; 904 *flags = '\0'; 905 return (name); 906 } 907 908 static void 909 p_rtentry_kvm(const char *name, struct rtentry *rt) 910 { 911 static struct ifnet ifnet, *lastif; 912 static char buffer[128]; 913 static char prettyname[128]; 914 struct sockaddr *sa; 915 sa_u addr, mask; 916 917 bzero(&addr, sizeof(addr)); 918 if ((sa = kgetsa(rt_key(rt)))) 919 bcopy(sa, &addr, sa->sa_len); 920 bzero(&mask, sizeof(mask)); 921 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt)))) 922 bcopy(sa, &mask, sa->sa_len); 923 924 p_sockaddr("destination", &addr.u_sa, &mask.u_sa, rt->rt_flags, 925 wid_dst); 926 p_sockaddr("gateway", kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw); 927 snprintf(buffer, sizeof(buffer), "{[:-%d}{:flags/%%s}{]:}", 928 wid_flags); 929 p_flags(rt->rt_flags, buffer); 930 if (Wflag) { 931 xo_emit("{[:%d}{t:use/%ju}{]:} ", -wid_pksent, 932 (uintmax_t )kread_counter((u_long )rt->rt_pksent)); 933 934 if (rt->rt_mtu != 0) 935 xo_emit("{t:mtu/%*lu} ", wid_mtu, rt->rt_mtu); 936 else 937 xo_emit("{P:/%*s} ", wid_mtu, ""); 938 } 939 if (rt->rt_ifp) { 940 if (rt->rt_ifp != lastif) { 941 if (kget(rt->rt_ifp, ifnet) == 0) 942 strlcpy(prettyname, ifnet.if_xname, 943 sizeof(prettyname)); 944 else 945 strlcpy(prettyname, "---", sizeof(prettyname)); 946 lastif = rt->rt_ifp; 947 } 948 xo_emit("{t:interface-name/%*.*s}", wid_if, wid_if, prettyname); 949 if (rt->rt_expire) { 950 time_t expire_time; 951 952 if ((expire_time = 953 rt->rt_expire - uptime.tv_sec) > 0) 954 xo_emit(" {:expire-time/%*d}", 955 wid_expire, (int)expire_time); 956 } 957 if (rt->rt_nodes[0].rn_dupedkey) 958 xo_emit(" =>"); 959 } 960 xo_emit("\n"); 961 } 962 963 char * 964 routename(in_addr_t in) 965 { 966 char *cp; 967 static char line[MAXHOSTNAMELEN]; 968 struct hostent *hp; 969 970 cp = 0; 971 if (!numeric_addr) { 972 hp = gethostbyaddr(&in, sizeof (struct in_addr), AF_INET); 973 if (hp) { 974 cp = hp->h_name; 975 trimdomain(cp, strlen(cp)); 976 } 977 } 978 if (cp) { 979 strlcpy(line, cp, sizeof(line)); 980 } else { 981 #define C(x) ((x) & 0xff) 982 in = ntohl(in); 983 sprintf(line, "%u.%u.%u.%u", 984 C(in >> 24), C(in >> 16), C(in >> 8), C(in)); 985 } 986 return (line); 987 } 988 989 #define NSHIFT(m) ( \ 990 (m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT : \ 991 (m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT : \ 992 (m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT : \ 993 0) 994 995 static void 996 domask(char *dst, in_addr_t addr __unused, u_long mask) 997 { 998 int b, i; 999 1000 if (mask == 0 || (!numeric_addr && NSHIFT(mask) != 0)) { 1001 *dst = '\0'; 1002 return; 1003 } 1004 i = 0; 1005 for (b = 0; b < 32; b++) 1006 if (mask & (1 << b)) { 1007 int bb; 1008 1009 i = b; 1010 for (bb = b+1; bb < 32; bb++) 1011 if (!(mask & (1 << bb))) { 1012 i = -1; /* noncontig */ 1013 break; 1014 } 1015 break; 1016 } 1017 if (i == -1) 1018 sprintf(dst, "&0x%lx", mask); 1019 else 1020 sprintf(dst, "/%d", 32-i); 1021 } 1022 1023 /* 1024 * Return the name of the network whose address is given. 1025 */ 1026 char * 1027 netname(in_addr_t in, in_addr_t mask) 1028 { 1029 char *cp = 0; 1030 static char line[MAXHOSTNAMELEN]; 1031 struct netent *np = 0; 1032 in_addr_t i; 1033 1034 /* It is ok to supply host address. */ 1035 in &= mask; 1036 1037 i = ntohl(in); 1038 if (!numeric_addr && i) { 1039 np = getnetbyaddr(i >> NSHIFT(ntohl(mask)), AF_INET); 1040 if (np != NULL) { 1041 cp = np->n_name; 1042 trimdomain(cp, strlen(cp)); 1043 } 1044 } 1045 if (cp != NULL) { 1046 strlcpy(line, cp, sizeof(line)); 1047 } else { 1048 inet_ntop(AF_INET, &in, line, sizeof(line) - 1); 1049 } 1050 domask(line + strlen(line), i, ntohl(mask)); 1051 return (line); 1052 } 1053 1054 #undef NSHIFT 1055 1056 #ifdef INET6 1057 void 1058 in6_fillscopeid(struct sockaddr_in6 *sa6) 1059 { 1060 #if defined(__KAME__) 1061 /* 1062 * XXX: This is a special workaround for KAME kernels. 1063 * sin6_scope_id field of SA should be set in the future. 1064 */ 1065 if (IN6_IS_ADDR_LINKLOCAL(&sa6->sin6_addr) || 1066 IN6_IS_ADDR_MC_NODELOCAL(&sa6->sin6_addr) || 1067 IN6_IS_ADDR_MC_LINKLOCAL(&sa6->sin6_addr)) { 1068 if (sa6->sin6_scope_id == 0) 1069 sa6->sin6_scope_id = 1070 ntohs(*(u_int16_t *)&sa6->sin6_addr.s6_addr[2]); 1071 sa6->sin6_addr.s6_addr[2] = sa6->sin6_addr.s6_addr[3] = 0; 1072 } 1073 #endif 1074 } 1075 1076 const char * 1077 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask) 1078 { 1079 static char line[MAXHOSTNAMELEN]; 1080 u_char *p = (u_char *)mask; 1081 u_char *lim; 1082 int masklen, illegal = 0, flag = 0; 1083 1084 if (mask) { 1085 for (masklen = 0, lim = p + 16; p < lim; p++) { 1086 switch (*p) { 1087 case 0xff: 1088 masklen += 8; 1089 break; 1090 case 0xfe: 1091 masklen += 7; 1092 break; 1093 case 0xfc: 1094 masklen += 6; 1095 break; 1096 case 0xf8: 1097 masklen += 5; 1098 break; 1099 case 0xf0: 1100 masklen += 4; 1101 break; 1102 case 0xe0: 1103 masklen += 3; 1104 break; 1105 case 0xc0: 1106 masklen += 2; 1107 break; 1108 case 0x80: 1109 masklen += 1; 1110 break; 1111 case 0x00: 1112 break; 1113 default: 1114 illegal ++; 1115 break; 1116 } 1117 } 1118 if (illegal) 1119 xo_error("illegal prefixlen\n"); 1120 } 1121 else 1122 masklen = 128; 1123 1124 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr)) 1125 return("default"); 1126 1127 if (numeric_addr) 1128 flag |= NI_NUMERICHOST; 1129 getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line), 1130 NULL, 0, flag); 1131 1132 if (numeric_addr) 1133 sprintf(&line[strlen(line)], "/%d", masklen); 1134 1135 return line; 1136 } 1137 1138 char * 1139 routename6(struct sockaddr_in6 *sa6) 1140 { 1141 static char line[MAXHOSTNAMELEN]; 1142 int flag = 0; 1143 /* use local variable for safety */ 1144 struct sockaddr_in6 sa6_local; 1145 1146 sa6_local.sin6_family = AF_INET6; 1147 sa6_local.sin6_len = sizeof(sa6_local); 1148 sa6_local.sin6_addr = sa6->sin6_addr; 1149 sa6_local.sin6_scope_id = sa6->sin6_scope_id; 1150 1151 if (numeric_addr) 1152 flag |= NI_NUMERICHOST; 1153 1154 getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len, 1155 line, sizeof(line), NULL, 0, flag); 1156 1157 return line; 1158 } 1159 #endif /*INET6*/ 1160 1161 /* 1162 * Print routing statistics 1163 */ 1164 void 1165 rt_stats(void) 1166 { 1167 struct rtstat rtstat; 1168 u_long rtsaddr, rttaddr; 1169 int rttrash; 1170 1171 kresolve_list(rl); 1172 1173 if ((rtsaddr = rl[N_RTSTAT].n_value) == 0) { 1174 xo_emit("{W:rtstat: symbol not in namelist}\n"); 1175 return; 1176 } 1177 if ((rttaddr = rl[N_RTTRASH].n_value) == 0) { 1178 xo_emit("{W:rttrash: symbol not in namelist}\n"); 1179 return; 1180 } 1181 kread(rtsaddr, (char *)&rtstat, sizeof (rtstat)); 1182 kread(rttaddr, (char *)&rttrash, sizeof (rttrash)); 1183 xo_emit("{T:routing}:\n"); 1184 1185 #define p(f, m) if (rtstat.f || sflag <= 1) \ 1186 xo_emit(m, rtstat.f, plural(rtstat.f)) 1187 1188 p(rts_badredirect, "\t{:bad-redirects/%hu} " 1189 "{N:/bad routing redirect%s}\n"); 1190 p(rts_dynamic, "\t{:dynamically-created/%hu} " 1191 "{N:/dynamically created route%s}\n"); 1192 p(rts_newgateway, "\t{:new-gateways/%hu} " 1193 "{N:/new gateway%s due to redirects}\n"); 1194 p(rts_unreach, "\t{:unreachable-destination/%hu} " 1195 "{N:/destination%s found unreachable}\n"); 1196 p(rts_wildcard, "\t{:wildcard-uses/%hu} " 1197 "{N:/use%s of a wildcard route}\n"); 1198 #undef p 1199 1200 if (rttrash || sflag <= 1) 1201 xo_emit("\t{:unused-but-not-freed/%u} " 1202 "{N:/route%s not in table but not freed}\n", 1203 rttrash, plural(rttrash)); 1204 } 1205