xref: /freebsd/usr.bin/netstat/route.c (revision 8e3b1ab2b5b430efed08c4132ee583f436c2ebe3)
1 /*-
2  * Copyright (c) 1983, 1988, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 4. Neither the name of the University nor the names of its contributors
14  *    may be used to endorse or promote products derived from this software
15  *    without specific prior written permission.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  */
29 
30 #if 0
31 #ifndef lint
32 static char sccsid[] = "From: @(#)route.c	8.6 (Berkeley) 4/28/95";
33 #endif /* not lint */
34 #endif
35 
36 #include <sys/cdefs.h>
37 __FBSDID("$FreeBSD$");
38 
39 #include <sys/param.h>
40 #include <sys/protosw.h>
41 #include <sys/socket.h>
42 #include <sys/socketvar.h>
43 #include <sys/time.h>
44 
45 #include <net/ethernet.h>
46 #include <net/if.h>
47 #include <net/if_var.h>
48 #include <net/if_dl.h>
49 #include <net/if_types.h>
50 #include <net/radix.h>
51 #define	_WANT_RTENTRY
52 #include <net/route.h>
53 
54 #include <netinet/in.h>
55 #include <netgraph/ng_socket.h>
56 
57 #include <sys/sysctl.h>
58 
59 #include <arpa/inet.h>
60 #include <ifaddrs.h>
61 #include <libutil.h>
62 #include <netdb.h>
63 #include <nlist.h>
64 #include <stdint.h>
65 #include <stdio.h>
66 #include <stdlib.h>
67 #include <stdbool.h>
68 #include <string.h>
69 #include <sysexits.h>
70 #include <unistd.h>
71 #include <err.h>
72 #include <libxo/xo.h>
73 #include "netstat.h"
74 
75 #define	kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
76 
77 /*
78  * Definitions for showing gateway flags.
79  */
80 struct bits {
81 	u_long	b_mask;
82 	char	b_val;
83 	const char *b_name;
84 } bits[] = {
85 	{ RTF_UP,	'U', "up" },
86 	{ RTF_GATEWAY,	'G', "gateway" },
87 	{ RTF_HOST,	'H', "host" },
88 	{ RTF_REJECT,	'R', "reject" },
89 	{ RTF_DYNAMIC,	'D', "dynamic" },
90 	{ RTF_MODIFIED,	'M', "modified" },
91 	{ RTF_DONE,	'd', "done" }, /* Completed -- for routing msgs only */
92 	{ RTF_XRESOLVE,	'X', "xresolve" },
93 	{ RTF_STATIC,	'S', "static" },
94 	{ RTF_PROTO1,	'1', "proto1" },
95 	{ RTF_PROTO2,	'2', "proto2" },
96 	{ RTF_PROTO3,	'3', "proto3" },
97 	{ RTF_BLACKHOLE,'B', "blackhole" },
98 	{ RTF_BROADCAST,'b', "broadcast" },
99 #ifdef RTF_LLINFO
100 	{ RTF_LLINFO,	'L', "llinfo" },
101 #endif
102 	{ 0 , 0, NULL }
103 };
104 
105 /*
106  * kvm(3) bindings for every needed symbol
107  */
108 static struct nlist rl[] = {
109 #define	N_RTSTAT	0
110 	{ .n_name = "_rtstat" },
111 #define	N_RTREE		1
112 	{ .n_name = "_rt_tables"},
113 #define	N_RTTRASH	2
114 	{ .n_name = "_rttrash" },
115 	{ .n_name = NULL },
116 };
117 
118 typedef union {
119 	long	dummy;		/* Helps align structure. */
120 	struct	sockaddr u_sa;
121 	u_short	u_data[128];
122 } sa_u;
123 
124 static sa_u pt_u;
125 
126 struct ifmap_entry {
127 	char ifname[IFNAMSIZ];
128 };
129 
130 static struct ifmap_entry *ifmap;
131 static int ifmap_size;
132 
133 int	do_rtent = 0;
134 struct	rtentry rtentry;
135 struct	radix_node rnode;
136 struct	radix_mask rmask;
137 
138 int	NewTree = 1;
139 
140 struct	timespec uptime;
141 
142 static struct sockaddr *kgetsa(struct sockaddr *);
143 static void size_cols(int ef, struct radix_node *rn);
144 static void size_cols_tree(struct radix_node *rn);
145 static void size_cols_rtentry(struct rtentry *rt);
146 static void p_rtnode_kvm(void);
147 static void p_rtable_sysctl(int, int);
148 static void p_rtable_kvm(int, int );
149 static void p_rtree_kvm(const char *name, struct radix_node *);
150 static void p_rtentry_kvm(const char *name, struct rtentry *);
151 static void p_rtentry_sysctl(const char *name, struct rt_msghdr *);
152 static void p_sockaddr(const char *name, struct sockaddr *, struct sockaddr *,
153     int, int);
154 static const char *fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask,
155     int flags);
156 static void p_flags(int, const char *);
157 static const char *fmt_flags(int f);
158 static void domask(char *, in_addr_t, u_long);
159 
160 /*
161  * Print routing tables.
162  */
163 void
164 routepr(int fibnum, int af)
165 {
166 	size_t intsize;
167 	int numfibs;
168 
169 	intsize = sizeof(int);
170 	if (fibnum == -1 &&
171 	    sysctlbyname("net.my_fibnum", &fibnum, &intsize, NULL, 0) == -1)
172 		fibnum = 0;
173 	if (sysctlbyname("net.fibs", &numfibs, &intsize, NULL, 0) == -1)
174 		numfibs = 1;
175 	if (fibnum < 0 || fibnum > numfibs - 1)
176 		errx(EX_USAGE, "%d: invalid fib", fibnum);
177 	/*
178 	 * Since kernel & userland use different timebase
179 	 * (time_uptime vs time_second) and we are reading kernel memory
180 	 * directly we should do rt_expire --> expire_time conversion.
181 	 */
182 	if (clock_gettime(CLOCK_UPTIME, &uptime) < 0)
183 		err(EX_OSERR, "clock_gettime() failed");
184 
185 	xo_open_container("route-information");
186 	xo_emit("{T:Routing tables}");
187 	if (fibnum)
188 		xo_emit(" ({L:fib}: {:fib/%d})", fibnum);
189 	xo_emit("\n");
190 
191 	if (Aflag == 0 && live != 0 && NewTree)
192 		p_rtable_sysctl(fibnum, af);
193 	else
194 		p_rtable_kvm(fibnum, af);
195 	xo_close_container("route-information");
196 }
197 
198 
199 /*
200  * Print address family header before a section of the routing table.
201  */
202 void
203 pr_family(int af1)
204 {
205 	const char *afname;
206 
207 	switch (af1) {
208 	case AF_INET:
209 		afname = "Internet";
210 		break;
211 #ifdef INET6
212 	case AF_INET6:
213 		afname = "Internet6";
214 		break;
215 #endif /*INET6*/
216 	case AF_ISO:
217 		afname = "ISO";
218 		break;
219 	case AF_CCITT:
220 		afname = "X.25";
221 		break;
222 	case AF_NETGRAPH:
223 		afname = "Netgraph";
224 		break;
225 	default:
226 		afname = NULL;
227 		break;
228 	}
229 	if (afname)
230 		xo_emit("\n{k:address-family/%s}:\n", afname);
231 	else
232 		xo_emit("\n{L:Protocol Family} {k:address-family/%d}:\n", af1);
233 }
234 
235 /* column widths; each followed by one space */
236 #ifndef INET6
237 #define	WID_DST_DEFAULT(af) 	18	/* width of destination column */
238 #define	WID_GW_DEFAULT(af)	18	/* width of gateway column */
239 #define	WID_IF_DEFAULT(af)	(Wflag ? 10 : 8) /* width of netif column */
240 #else
241 #define	WID_DST_DEFAULT(af) \
242 	((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18)
243 #define	WID_GW_DEFAULT(af) \
244 	((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18)
245 #define	WID_IF_DEFAULT(af)	((af) == AF_INET6 ? 8 : (Wflag ? 10 : 8))
246 #endif /*INET6*/
247 
248 static int wid_dst;
249 static int wid_gw;
250 static int wid_flags;
251 static int wid_pksent;
252 static int wid_mtu;
253 static int wid_if;
254 static int wid_expire;
255 
256 static void
257 size_cols(int ef, struct radix_node *rn)
258 {
259 	wid_dst = WID_DST_DEFAULT(ef);
260 	wid_gw = WID_GW_DEFAULT(ef);
261 	wid_flags = 6;
262 	wid_pksent = 8;
263 	wid_mtu = 6;
264 	wid_if = WID_IF_DEFAULT(ef);
265 	wid_expire = 6;
266 
267 	if (Wflag && rn != NULL)
268 		size_cols_tree(rn);
269 }
270 
271 static void
272 size_cols_tree(struct radix_node *rn)
273 {
274 again:
275 	if (kget(rn, rnode) != 0)
276 		return;
277 	if (!(rnode.rn_flags & RNF_ACTIVE))
278 		return;
279 	if (rnode.rn_bit < 0) {
280 		if ((rnode.rn_flags & RNF_ROOT) == 0) {
281 			if (kget(rn, rtentry) != 0)
282 				return;
283 			size_cols_rtentry(&rtentry);
284 		}
285 		if ((rn = rnode.rn_dupedkey))
286 			goto again;
287 	} else {
288 		rn = rnode.rn_right;
289 		size_cols_tree(rnode.rn_left);
290 		size_cols_tree(rn);
291 	}
292 }
293 
294 static void
295 size_cols_rtentry(struct rtentry *rt)
296 {
297 	static struct ifnet ifnet, *lastif;
298 	static char buffer[100];
299 	const char *bp;
300 	struct sockaddr *sa;
301 	sa_u addr, mask;
302 	int len;
303 
304 	bzero(&addr, sizeof(addr));
305 	if ((sa = kgetsa(rt_key(rt))))
306 		bcopy(sa, &addr, sa->sa_len);
307 	bzero(&mask, sizeof(mask));
308 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
309 		bcopy(sa, &mask, sa->sa_len);
310 	bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags);
311 	len = strlen(bp);
312 	wid_dst = MAX(len, wid_dst);
313 
314 	bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST);
315 	len = strlen(bp);
316 	wid_gw = MAX(len, wid_gw);
317 
318 	bp = fmt_flags(rt->rt_flags);
319 	len = strlen(bp);
320 	wid_flags = MAX(len, wid_flags);
321 
322 	if (Wflag) {
323 		len = snprintf(buffer, sizeof(buffer), "%ju",
324 		    (uintmax_t )kread_counter((u_long )rt->rt_pksent));
325 		wid_pksent = MAX(len, wid_pksent);
326 	}
327 	if (rt->rt_ifp) {
328 		if (rt->rt_ifp != lastif) {
329 			if (kget(rt->rt_ifp, ifnet) == 0)
330 				len = strlen(ifnet.if_xname);
331 			else
332 				len = strlen("---");
333 			lastif = rt->rt_ifp;
334 			wid_if = MAX(len, wid_if);
335 		}
336 		if (rt->rt_expire) {
337 			time_t expire_time;
338 
339 			if ((expire_time =
340 			    rt->rt_expire - uptime.tv_sec) > 0) {
341 				len = snprintf(buffer, sizeof(buffer), "%d",
342 				    (int)expire_time);
343 				wid_expire = MAX(len, wid_expire);
344 			}
345 		}
346 	}
347 }
348 
349 
350 /*
351  * Print header for routing table columns.
352  */
353 void
354 pr_rthdr(int af1)
355 {
356 
357 	if (Aflag)
358 		xo_emit("{T:/%-8.8s} ","Address");
359 	if (Wflag) {
360 		xo_emit("{T:/%-*.*s} {T:/%-*.*s} {T:/%-*.*s} {T:/%*.*s} "
361 		    "{T:/%*.*s} {T:/%*.*s} {T:/%*.*s} {T:/%*s}\n",
362 			wid_dst,	wid_dst,	"Destination",
363 			wid_gw,		wid_gw,		"Gateway",
364 			wid_flags,	wid_flags,	"Flags",
365 			wid_pksent,	wid_pksent,	"Use",
366 			wid_mtu,	wid_mtu,	"Mtu",
367 			wid_if,		wid_if,		"Netif",
368 			wid_expire,			"Expire");
369 	} else {
370 		xo_emit("{T:/%-*.*s} {T:/%-*.*s} {T:/%-*.*s}  {T:/%*.*s} "
371 		    "{T:/%*s}\n",
372 			wid_dst,	wid_dst,	"Destination",
373 			wid_gw,		wid_gw,		"Gateway",
374 			wid_flags,	wid_flags,	"Flags",
375 			wid_if,		wid_if,		"Netif",
376 			wid_expire,			"Expire");
377 	}
378 }
379 
380 static struct sockaddr *
381 kgetsa(struct sockaddr *dst)
382 {
383 
384 	if (kget(dst, pt_u.u_sa) != 0)
385 		return (NULL);
386 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
387 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
388 	return (&pt_u.u_sa);
389 }
390 
391 /*
392  * Print kernel routing tables for given fib
393  * using debugging kvm(3) interface.
394  */
395 static void
396 p_rtable_kvm(int fibnum, int af)
397 {
398 	struct radix_node_head **rnhp, *rnh, head;
399 	struct radix_node_head **rt_tables;
400 	u_long rtree;
401 	int fam, af_size;
402 	bool did_rt_family = false;
403 
404 	kresolve_list(rl);
405 	if ((rtree = rl[N_RTREE].n_value) == 0) {
406 		xo_emit("rt_tables: symbol not in namelist\n");
407 		return;
408 	}
409 
410 	af_size = (AF_MAX + 1) * sizeof(struct radix_node_head *);
411 	rt_tables = calloc(1, af_size);
412 	if (rt_tables == NULL)
413 		err(EX_OSERR, "memory allocation failed");
414 
415 	if (kread((u_long)(rtree), (char *)(rt_tables) + fibnum * af_size,
416 	    af_size) != 0)
417 		err(EX_OSERR, "error retrieving radix pointers");
418 	xo_open_container("route-table");
419 	for (fam = 0; fam <= AF_MAX; fam++) {
420 		int tmpfib;
421 
422 		switch (fam) {
423 		case AF_INET6:
424 		case AF_INET:
425 			tmpfib = fibnum;
426 			break;
427 		default:
428 			tmpfib = 0;
429 		}
430 		rnhp = (struct radix_node_head **)*rt_tables;
431 		/* Calculate the in-kernel address. */
432 		rnhp += tmpfib * (AF_MAX + 1) + fam;
433 		/* Read the in kernel rhn pointer. */
434 		if (kget(rnhp, rnh) != 0)
435 			continue;
436 		if (rnh == NULL)
437 			continue;
438 		/* Read the rnh data. */
439 		if (kget(rnh, head) != 0)
440 			continue;
441 		if (fam == AF_UNSPEC) {
442 			if (Aflag && af == 0) {
443 				xo_emit("{T:Netmasks}:\n");
444 				xo_open_list("netmasks");
445 				p_rtree_kvm("netmasks", head.rnh_treetop);
446 				xo_close_list("netmasks");
447 			}
448 		} else if (af == AF_UNSPEC || af == fam) {
449 			if (!did_rt_family) {
450 				xo_open_list("rt-family");
451 				did_rt_family = true;
452 			}
453 			size_cols(fam, head.rnh_treetop);
454 			xo_open_instance("rt-family");
455 			pr_family(fam);
456 			do_rtent = 1;
457 			xo_open_list("rt-entry");
458 			pr_rthdr(fam);
459 			p_rtree_kvm("rt-entry", head.rnh_treetop);
460 			xo_close_list("rt-entry");
461 			xo_close_instance("rt-family");
462 		}
463 	}
464 	if (did_rt_family)
465 		xo_close_list("rt-family");
466 	xo_close_container("route-table");
467 
468 	free(rt_tables);
469 }
470 
471 /*
472  * Print given kernel radix tree using
473  * debugging kvm(3) interface.
474  */
475 static void
476 p_rtree_kvm(const char *name, struct radix_node *rn)
477 {
478 	bool opened;
479 
480 	opened = false;
481 
482 #define DOOPEN()    do { \
483 	if (!opened) { xo_open_instance(name); opened = true; } \
484     } while (0)
485 #define DOCLOSE()   do { \
486 	if (opened) { opened = false; xo_close_instance(name); } \
487     } while(0)
488 
489 again:
490 	if (kget(rn, rnode) != 0)
491 		return;
492 	if (!(rnode.rn_flags & RNF_ACTIVE))
493 		return;
494 	if (rnode.rn_bit < 0) {
495 		if (Aflag) {
496 			DOOPEN();
497 			xo_emit("{q:radix-node/%-8.8lx} ", (u_long)rn);
498 		}
499 		if (rnode.rn_flags & RNF_ROOT) {
500 			if (Aflag) {
501 				DOOPEN();
502 				xo_emit("({:root/root} node){L:/%s}",
503 				    rnode.rn_dupedkey ? " =>\n" : "\n");
504 			}
505 		} else if (do_rtent) {
506 			if (kget(rn, rtentry) == 0) {
507 				DOOPEN();
508 				p_rtentry_kvm(name, &rtentry);
509 				if (Aflag) {
510 					DOOPEN();
511 					p_rtnode_kvm();
512 					DOCLOSE();
513 				}
514 			}
515 		} else {
516 			DOOPEN();
517 			p_sockaddr("address",
518 			    kgetsa((struct sockaddr *)rnode.rn_key),
519 			    NULL, 0, 44);
520 			xo_emit("\n");
521 		}
522 		DOCLOSE();
523 		if ((rn = rnode.rn_dupedkey))
524 			goto again;
525 	} else {
526 		if (Aflag && do_rtent) {
527 			DOOPEN();
528 			xo_emit("{q:radix-node/%-8.8lx} ", (u_long)rn);
529 			p_rtnode_kvm();
530 			DOCLOSE();
531 		}
532 		rn = rnode.rn_right;
533 		p_rtree_kvm(name, rnode.rn_left);
534 		p_rtree_kvm(name, rn);
535 	}
536 }
537 
538 char	nbuf[20];
539 
540 static void
541 p_rtnode_kvm(void)
542 {
543 	struct radix_mask *rm = rnode.rn_mklist;
544 
545 	if (rnode.rn_bit < 0) {
546 		if (rnode.rn_mask) {
547 			xo_emit("\t  {L:mask} ");
548 			p_sockaddr("netmask",
549 			    kgetsa((struct sockaddr *)rnode.rn_mask),
550 			    NULL, 0, -1);
551 		} else if (rm == 0)
552 			return;
553 	} else {
554 		xo_emit("{[:6}{:bit/(%d)}{]:} {q:left-node/%8.8lx} "
555 		    ": {q:right-node/%8.8lx}", rnode.rn_bit,
556 		    (u_long)rnode.rn_left, (u_long)rnode.rn_right);
557 	}
558 	while (rm) {
559 		if (kget(rm, rmask) != 0)
560 			break;
561 		sprintf(nbuf, " %d refs, ", rmask.rm_refs);
562 		xo_emit(" mk = {q:node/%8.8lx} \\{({:bit/%d}),{nbufs/%s}",
563 		    (u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " ");
564 		if (rmask.rm_flags & RNF_NORMAL) {
565 			struct radix_node rnode_aux;
566 			xo_emit(" <{:mode/normal}>, ");
567 			if (kget(rmask.rm_leaf, rnode_aux) == 0)
568 				p_sockaddr("netmask",
569 				    kgetsa(/*XXX*/(void *)rnode_aux.rn_mask),
570 				    NULL, 0, -1);
571 			else
572 				p_sockaddr(NULL, NULL, NULL, 0, -1);
573 		} else
574 			p_sockaddr("netmask",
575 			    kgetsa((struct sockaddr *)rmask.rm_mask),
576 			    NULL, 0, -1);
577 		xo_emit("\\}");
578 		if ((rm = rmask.rm_mklist))
579 			xo_emit(" {D:->}");
580 	}
581 	xo_emit("\n");
582 }
583 
584 static void
585 p_rtable_sysctl(int fibnum, int af)
586 {
587 	size_t needed;
588 	int mib[7];
589 	char *buf, *next, *lim;
590 	struct rt_msghdr *rtm;
591 	struct sockaddr *sa;
592 	int fam = AF_UNSPEC, ifindex = 0, size;
593 	int need_table_close = false;
594 
595 	struct ifaddrs *ifap, *ifa;
596 	struct sockaddr_dl *sdl;
597 
598 	/*
599 	 * Retrieve interface list at first
600 	 * since we need #ifindex -> if_xname match
601 	 */
602 	if (getifaddrs(&ifap) != 0)
603 		err(EX_OSERR, "getifaddrs");
604 
605 	for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
606 
607 		if (ifa->ifa_addr->sa_family != AF_LINK)
608 			continue;
609 
610 		sdl = (struct sockaddr_dl *)ifa->ifa_addr;
611 		ifindex = sdl->sdl_index;
612 
613 		if (ifindex >= ifmap_size) {
614 			size = roundup(ifindex + 1, 32) *
615 			    sizeof(struct ifmap_entry);
616 			if ((ifmap = realloc(ifmap, size)) == NULL)
617 				errx(2, "realloc(%d) failed", size);
618 			memset(&ifmap[ifmap_size], 0,
619 			    size - ifmap_size *
620 			    sizeof(struct ifmap_entry));
621 
622 			ifmap_size = roundup(ifindex + 1, 32);
623 		}
624 
625 		if (*ifmap[ifindex].ifname != '\0')
626 			continue;
627 
628 		strlcpy(ifmap[ifindex].ifname, ifa->ifa_name, IFNAMSIZ);
629 	}
630 
631 	freeifaddrs(ifap);
632 
633 	mib[0] = CTL_NET;
634 	mib[1] = PF_ROUTE;
635 	mib[2] = 0;
636 	mib[3] = af;
637 	mib[4] = NET_RT_DUMP;
638 	mib[5] = 0;
639 	mib[6] = fibnum;
640 	if (sysctl(mib, nitems(mib), NULL, &needed, NULL, 0) < 0)
641 		err(EX_OSERR, "sysctl: net.route.0.%d.dump.%d estimate", af,
642 		    fibnum);
643 	if ((buf = malloc(needed)) == NULL)
644 		errx(2, "malloc(%lu)", (unsigned long)needed);
645 	if (sysctl(mib, nitems(mib), buf, &needed, NULL, 0) < 0)
646 		err(1, "sysctl: net.route.0.%d.dump.%d", af, fibnum);
647 	lim  = buf + needed;
648 	xo_open_container("route-table");
649 	xo_open_list("rt-family");
650 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
651 		rtm = (struct rt_msghdr *)next;
652 		if (rtm->rtm_version != RTM_VERSION)
653 			continue;
654 		/*
655 		 * Peek inside header to determine AF
656 		 */
657 		sa = (struct sockaddr *)(rtm + 1);
658 		/* Only print family first time. */
659 		if (fam != sa->sa_family) {
660 			if (need_table_close) {
661 				xo_close_list("rt-entry");
662 				xo_close_instance("rt-family");
663 			}
664 			need_table_close = true;
665 
666 			fam = sa->sa_family;
667 			size_cols(fam, NULL);
668 			xo_open_instance("rt-family");
669 			pr_family(fam);
670 			xo_open_list("rt-entry");
671 
672 			pr_rthdr(fam);
673 		}
674 		p_rtentry_sysctl("rt-entry", rtm);
675 	}
676 	if (need_table_close) {
677 		xo_close_list("rt-entry");
678 		xo_close_instance("rt-family");
679 	}
680 	xo_close_list("rt-family");
681 	xo_close_container("route-table");
682 	free(buf);
683 }
684 
685 static void
686 p_rtentry_sysctl(const char *name, struct rt_msghdr *rtm)
687 {
688 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
689 	char buffer[128];
690 	char prettyname[128];
691 	sa_u addr, mask, gw;
692 	unsigned int l;
693 
694 	xo_open_instance(name);
695 
696 #define	GETSA(_s, _f)	{ \
697 	bzero(&(_s), sizeof(_s)); \
698 	if (rtm->rtm_addrs & _f) { \
699 		l = roundup(sa->sa_len, sizeof(long)); \
700 		memcpy(&(_s), sa, (l > sizeof(_s)) ? sizeof(_s) : l); \
701 		sa = (struct sockaddr *)((char *)sa + l); \
702 	} \
703 }
704 
705 	GETSA(addr, RTA_DST);
706 	GETSA(gw, RTA_GATEWAY);
707 	GETSA(mask, RTA_NETMASK);
708 
709 	p_sockaddr("destination", &addr.u_sa, &mask.u_sa, rtm->rtm_flags,
710 	    wid_dst);
711 	p_sockaddr("gateway", &gw.u_sa, NULL, RTF_HOST, wid_gw);
712 	snprintf(buffer, sizeof(buffer), "{[:-%d}{:flags/%%s}{]:}",
713 	    wid_flags);
714 	p_flags(rtm->rtm_flags, buffer);
715 	if (Wflag) {
716 		xo_emit("{t:use/%*lu} ", wid_pksent, rtm->rtm_rmx.rmx_pksent);
717 
718 		if (rtm->rtm_rmx.rmx_mtu != 0)
719 			xo_emit("{t:mtu/%*lu} ", wid_mtu, rtm->rtm_rmx.rmx_mtu);
720 		else
721 			xo_emit("{P:/%*s} ", wid_mtu, "");
722 	}
723 
724 	memset(prettyname, 0, sizeof(prettyname));
725 	if (rtm->rtm_index < ifmap_size) {
726 		strlcpy(prettyname, ifmap[rtm->rtm_index].ifname,
727 		    sizeof(prettyname));
728 		if (*prettyname == '\0')
729 			strlcpy(prettyname, "---", sizeof(prettyname));
730 	}
731 
732 	xo_emit("{t:interface-name/%*.*s}", wid_if, wid_if, prettyname);
733 	if (rtm->rtm_rmx.rmx_expire) {
734 		time_t expire_time;
735 
736 		if ((expire_time = rtm->rtm_rmx.rmx_expire - uptime.tv_sec) > 0)
737 			xo_emit(" {:expire-time/%*d}", wid_expire,
738 			    (int)expire_time);
739 	}
740 
741 	xo_emit("\n");
742 	xo_close_instance(name);
743 }
744 
745 static void
746 p_sockaddr(const char *name, struct sockaddr *sa, struct sockaddr *mask,
747     int flags, int width)
748 {
749 	const char *cp;
750 	char buf[128];
751 
752 	cp = fmt_sockaddr(sa, mask, flags);
753 
754 	if (width < 0) {
755 		snprintf(buf, sizeof(buf), "{:%s/%%s} ", name);
756 		xo_emit(buf, cp);
757 	} else {
758 		if (numeric_addr) {
759 			snprintf(buf, sizeof(buf), "{[:%d}{:%s/%%s}{]:} ",
760 			    -width, name);
761 			xo_emit(buf, cp);
762 		} else {
763 			snprintf(buf, sizeof(buf), "{[:%d}{:%s/%%-.*s}{]:} ",
764 			    -width, name);
765 			xo_emit(buf, width, cp);
766 		}
767 	}
768 }
769 
770 static const char *
771 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags)
772 {
773 	static char workbuf[128];
774 	const char *cp;
775 
776 	if (sa == NULL)
777 		return ("null");
778 
779 	switch(sa->sa_family) {
780 	case AF_INET:
781 	    {
782 		struct sockaddr_in *sockin = (struct sockaddr_in *)sa;
783 
784 		if ((sockin->sin_addr.s_addr == INADDR_ANY) &&
785 			mask &&
786 			ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr)
787 				==0L)
788 				cp = "default" ;
789 		else if (flags & RTF_HOST)
790 			cp = routename(sockin->sin_addr.s_addr);
791 		else if (mask)
792 			cp = netname(sockin->sin_addr.s_addr,
793 			    ((struct sockaddr_in *)mask)->sin_addr.s_addr);
794 		else
795 			cp = netname(sockin->sin_addr.s_addr, INADDR_ANY);
796 		break;
797 	    }
798 
799 #ifdef INET6
800 	case AF_INET6:
801 	    {
802 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
803 
804 		/*
805 		 * The sa6->sin6_scope_id must be filled here because
806 		 * this sockaddr is extracted from kmem(4) directly
807 		 * and has KAME-specific embedded scope id in
808 		 * sa6->sin6_addr.s6_addr[2].
809 		 */
810 		in6_fillscopeid(sa6);
811 
812 		if (flags & RTF_HOST)
813 		    cp = routename6(sa6);
814 		else if (mask)
815 		    cp = netname6(sa6,
816 				  &((struct sockaddr_in6 *)mask)->sin6_addr);
817 		else {
818 		    cp = netname6(sa6, NULL);
819 		}
820 		break;
821 	    }
822 #endif /*INET6*/
823 
824 	case AF_NETGRAPH:
825 	    {
826 		strlcpy(workbuf, ((struct sockaddr_ng *)sa)->sg_data,
827 		    sizeof(workbuf));
828 		cp = workbuf;
829 		break;
830 	    }
831 
832 	case AF_LINK:
833 	    {
834 		struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
835 
836 		if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
837 		    sdl->sdl_slen == 0) {
838 			(void) sprintf(workbuf, "link#%d", sdl->sdl_index);
839 			cp = workbuf;
840 		} else
841 			switch (sdl->sdl_type) {
842 
843 			case IFT_ETHER:
844 			case IFT_L2VLAN:
845 			case IFT_BRIDGE:
846 				if (sdl->sdl_alen == ETHER_ADDR_LEN) {
847 					cp = ether_ntoa((struct ether_addr *)
848 					    (sdl->sdl_data + sdl->sdl_nlen));
849 					break;
850 				}
851 				/* FALLTHROUGH */
852 			default:
853 				cp = link_ntoa(sdl);
854 				break;
855 			}
856 		break;
857 	    }
858 
859 	default:
860 	    {
861 		u_char *s = (u_char *)sa->sa_data, *slim;
862 		char *cq, *cqlim;
863 
864 		cq = workbuf;
865 		slim =  sa->sa_len + (u_char *) sa;
866 		cqlim = cq + sizeof(workbuf) - 6;
867 		cq += sprintf(cq, "(%d)", sa->sa_family);
868 		while (s < slim && cq < cqlim) {
869 			cq += sprintf(cq, " %02x", *s++);
870 			if (s < slim)
871 			    cq += sprintf(cq, "%02x", *s++);
872 		}
873 		cp = workbuf;
874 	    }
875 	}
876 
877 	return (cp);
878 }
879 
880 static void
881 p_flags(int f, const char *format)
882 {
883 	struct bits *p;
884 
885 	xo_emit(format, fmt_flags(f));
886 
887 	xo_open_list("flags_pretty");
888 	for (p = bits; p->b_mask; p++)
889 		if (p->b_mask & f)
890 			xo_emit("{le:flags_pretty/%s}", p->b_name);
891 	xo_close_list("flags_pretty");
892 }
893 
894 static const char *
895 fmt_flags(int f)
896 {
897 	static char name[33];
898 	char *flags;
899 	struct bits *p = bits;
900 
901 	for (flags = name; p->b_mask; p++)
902 		if (p->b_mask & f)
903 			*flags++ = p->b_val;
904 	*flags = '\0';
905 	return (name);
906 }
907 
908 static void
909 p_rtentry_kvm(const char *name, struct rtentry *rt)
910 {
911 	static struct ifnet ifnet, *lastif;
912 	static char buffer[128];
913 	static char prettyname[128];
914 	struct sockaddr *sa;
915 	sa_u addr, mask;
916 
917 	bzero(&addr, sizeof(addr));
918 	if ((sa = kgetsa(rt_key(rt))))
919 		bcopy(sa, &addr, sa->sa_len);
920 	bzero(&mask, sizeof(mask));
921 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
922 		bcopy(sa, &mask, sa->sa_len);
923 
924 	p_sockaddr("destination", &addr.u_sa, &mask.u_sa, rt->rt_flags,
925 	    wid_dst);
926 	p_sockaddr("gateway", kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw);
927 	snprintf(buffer, sizeof(buffer), "{[:-%d}{:flags/%%s}{]:}",
928 	    wid_flags);
929 	p_flags(rt->rt_flags, buffer);
930 	if (Wflag) {
931 		xo_emit("{[:%d}{t:use/%ju}{]:} ", -wid_pksent,
932 		    (uintmax_t )kread_counter((u_long )rt->rt_pksent));
933 
934 		if (rt->rt_mtu != 0)
935 			xo_emit("{t:mtu/%*lu} ", wid_mtu, rt->rt_mtu);
936 		else
937 			xo_emit("{P:/%*s} ", wid_mtu, "");
938 	}
939 	if (rt->rt_ifp) {
940 		if (rt->rt_ifp != lastif) {
941 			if (kget(rt->rt_ifp, ifnet) == 0)
942 				strlcpy(prettyname, ifnet.if_xname,
943 				    sizeof(prettyname));
944 			else
945 				strlcpy(prettyname, "---", sizeof(prettyname));
946 			lastif = rt->rt_ifp;
947 		}
948 		xo_emit("{t:interface-name/%*.*s}", wid_if, wid_if, prettyname);
949 		if (rt->rt_expire) {
950 			time_t expire_time;
951 
952 			if ((expire_time =
953 			    rt->rt_expire - uptime.tv_sec) > 0)
954 				xo_emit(" {:expire-time/%*d}",
955 				    wid_expire, (int)expire_time);
956 		}
957 		if (rt->rt_nodes[0].rn_dupedkey)
958 			xo_emit(" =>");
959 	}
960 	xo_emit("\n");
961 }
962 
963 char *
964 routename(in_addr_t in)
965 {
966 	char *cp;
967 	static char line[MAXHOSTNAMELEN];
968 	struct hostent *hp;
969 
970 	cp = 0;
971 	if (!numeric_addr) {
972 		hp = gethostbyaddr(&in, sizeof (struct in_addr), AF_INET);
973 		if (hp) {
974 			cp = hp->h_name;
975 			trimdomain(cp, strlen(cp));
976 		}
977 	}
978 	if (cp) {
979 		strlcpy(line, cp, sizeof(line));
980 	} else {
981 #define	C(x)	((x) & 0xff)
982 		in = ntohl(in);
983 		sprintf(line, "%u.%u.%u.%u",
984 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
985 	}
986 	return (line);
987 }
988 
989 #define	NSHIFT(m) (							\
990 	(m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT :			\
991 	(m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT :			\
992 	(m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT :			\
993 	0)
994 
995 static void
996 domask(char *dst, in_addr_t addr __unused, u_long mask)
997 {
998 	int b, i;
999 
1000 	if (mask == 0 || (!numeric_addr && NSHIFT(mask) != 0)) {
1001 		*dst = '\0';
1002 		return;
1003 	}
1004 	i = 0;
1005 	for (b = 0; b < 32; b++)
1006 		if (mask & (1 << b)) {
1007 			int bb;
1008 
1009 			i = b;
1010 			for (bb = b+1; bb < 32; bb++)
1011 				if (!(mask & (1 << bb))) {
1012 					i = -1;	/* noncontig */
1013 					break;
1014 				}
1015 			break;
1016 		}
1017 	if (i == -1)
1018 		sprintf(dst, "&0x%lx", mask);
1019 	else
1020 		sprintf(dst, "/%d", 32-i);
1021 }
1022 
1023 /*
1024  * Return the name of the network whose address is given.
1025  */
1026 char *
1027 netname(in_addr_t in, in_addr_t mask)
1028 {
1029 	char *cp = 0;
1030 	static char line[MAXHOSTNAMELEN];
1031 	struct netent *np = 0;
1032 	in_addr_t i;
1033 
1034 	/* It is ok to supply host address. */
1035 	in &= mask;
1036 
1037 	i = ntohl(in);
1038 	if (!numeric_addr && i) {
1039 		np = getnetbyaddr(i >> NSHIFT(ntohl(mask)), AF_INET);
1040 		if (np != NULL) {
1041 			cp = np->n_name;
1042 			trimdomain(cp, strlen(cp));
1043 		}
1044 	}
1045 	if (cp != NULL) {
1046 		strlcpy(line, cp, sizeof(line));
1047 	} else {
1048 		inet_ntop(AF_INET, &in, line, sizeof(line) - 1);
1049 	}
1050 	domask(line + strlen(line), i, ntohl(mask));
1051 	return (line);
1052 }
1053 
1054 #undef NSHIFT
1055 
1056 #ifdef INET6
1057 void
1058 in6_fillscopeid(struct sockaddr_in6 *sa6)
1059 {
1060 #if defined(__KAME__)
1061 	/*
1062 	 * XXX: This is a special workaround for KAME kernels.
1063 	 * sin6_scope_id field of SA should be set in the future.
1064 	 */
1065 	if (IN6_IS_ADDR_LINKLOCAL(&sa6->sin6_addr) ||
1066 	    IN6_IS_ADDR_MC_NODELOCAL(&sa6->sin6_addr) ||
1067 	    IN6_IS_ADDR_MC_LINKLOCAL(&sa6->sin6_addr)) {
1068 		if (sa6->sin6_scope_id == 0)
1069 			sa6->sin6_scope_id =
1070 			    ntohs(*(u_int16_t *)&sa6->sin6_addr.s6_addr[2]);
1071 		sa6->sin6_addr.s6_addr[2] = sa6->sin6_addr.s6_addr[3] = 0;
1072 	}
1073 #endif
1074 }
1075 
1076 const char *
1077 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask)
1078 {
1079 	static char line[MAXHOSTNAMELEN];
1080 	u_char *p = (u_char *)mask;
1081 	u_char *lim;
1082 	int masklen, illegal = 0, flag = 0;
1083 
1084 	if (mask) {
1085 		for (masklen = 0, lim = p + 16; p < lim; p++) {
1086 			switch (*p) {
1087 			 case 0xff:
1088 				 masklen += 8;
1089 				 break;
1090 			 case 0xfe:
1091 				 masklen += 7;
1092 				 break;
1093 			 case 0xfc:
1094 				 masklen += 6;
1095 				 break;
1096 			 case 0xf8:
1097 				 masklen += 5;
1098 				 break;
1099 			 case 0xf0:
1100 				 masklen += 4;
1101 				 break;
1102 			 case 0xe0:
1103 				 masklen += 3;
1104 				 break;
1105 			 case 0xc0:
1106 				 masklen += 2;
1107 				 break;
1108 			 case 0x80:
1109 				 masklen += 1;
1110 				 break;
1111 			 case 0x00:
1112 				 break;
1113 			 default:
1114 				 illegal ++;
1115 				 break;
1116 			}
1117 		}
1118 		if (illegal)
1119 			xo_error("illegal prefixlen\n");
1120 	}
1121 	else
1122 		masklen = 128;
1123 
1124 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
1125 		return("default");
1126 
1127 	if (numeric_addr)
1128 		flag |= NI_NUMERICHOST;
1129 	getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line),
1130 		    NULL, 0, flag);
1131 
1132 	if (numeric_addr)
1133 		sprintf(&line[strlen(line)], "/%d", masklen);
1134 
1135 	return line;
1136 }
1137 
1138 char *
1139 routename6(struct sockaddr_in6 *sa6)
1140 {
1141 	static char line[MAXHOSTNAMELEN];
1142 	int flag = 0;
1143 	/* use local variable for safety */
1144 	struct sockaddr_in6 sa6_local;
1145 
1146 	sa6_local.sin6_family = AF_INET6;
1147 	sa6_local.sin6_len = sizeof(sa6_local);
1148 	sa6_local.sin6_addr = sa6->sin6_addr;
1149 	sa6_local.sin6_scope_id = sa6->sin6_scope_id;
1150 
1151 	if (numeric_addr)
1152 		flag |= NI_NUMERICHOST;
1153 
1154 	getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
1155 		    line, sizeof(line), NULL, 0, flag);
1156 
1157 	return line;
1158 }
1159 #endif /*INET6*/
1160 
1161 /*
1162  * Print routing statistics
1163  */
1164 void
1165 rt_stats(void)
1166 {
1167 	struct rtstat rtstat;
1168 	u_long rtsaddr, rttaddr;
1169 	int rttrash;
1170 
1171 	kresolve_list(rl);
1172 
1173 	if ((rtsaddr = rl[N_RTSTAT].n_value) == 0) {
1174 		xo_emit("{W:rtstat: symbol not in namelist}\n");
1175 		return;
1176 	}
1177 	if ((rttaddr = rl[N_RTTRASH].n_value) == 0) {
1178 		xo_emit("{W:rttrash: symbol not in namelist}\n");
1179 		return;
1180 	}
1181 	kread(rtsaddr, (char *)&rtstat, sizeof (rtstat));
1182 	kread(rttaddr, (char *)&rttrash, sizeof (rttrash));
1183 	xo_emit("{T:routing}:\n");
1184 
1185 #define	p(f, m) if (rtstat.f || sflag <= 1) \
1186 	xo_emit(m, rtstat.f, plural(rtstat.f))
1187 
1188 	p(rts_badredirect, "\t{:bad-redirects/%hu} "
1189 	    "{N:/bad routing redirect%s}\n");
1190 	p(rts_dynamic, "\t{:dynamically-created/%hu} "
1191 	    "{N:/dynamically created route%s}\n");
1192 	p(rts_newgateway, "\t{:new-gateways/%hu} "
1193 	    "{N:/new gateway%s due to redirects}\n");
1194 	p(rts_unreach, "\t{:unreachable-destination/%hu} "
1195 	    "{N:/destination%s found unreachable}\n");
1196 	p(rts_wildcard, "\t{:wildcard-uses/%hu} "
1197 	    "{N:/use%s of a wildcard route}\n");
1198 #undef p
1199 
1200 	if (rttrash || sflag <= 1)
1201 		xo_emit("\t{:unused-but-not-freed/%u} "
1202 		    "{N:/route%s not in table but not freed}\n",
1203 		    rttrash, plural(rttrash));
1204 }
1205