1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 * 21 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 22 * Use is subject to license terms. 23 */ 24 25 #include <alloca.h> 26 #include <arpa/inet.h> 27 #include <assert.h> 28 #include <errno.h> 29 #include <ipmp_admin.h> 30 #include <ipmp_query.h> 31 #include <libintl.h> 32 #include <libnvpair.h> 33 #include <libsysevent.h> 34 #include <locale.h> 35 #include <netdb.h> 36 #include <signal.h> 37 #include <stdarg.h> 38 #include <stdio.h> 39 #include <stdlib.h> 40 #include <string.h> 41 #include <unistd.h> 42 #include <sys/sysevent/eventdefs.h> 43 #include <sys/sysevent/ipmp.h> 44 #include <sys/sysmacros.h> 45 #include <sys/termios.h> 46 #include <sys/types.h> 47 48 /* 49 * ipmpstat -- display IPMP subsystem status. 50 * 51 * This utility makes extensive use of libipmp and IPMP sysevents to gather 52 * and pretty-print the status of the IPMP subsystem. All output formats 53 * except for -p (probe) use libipmp to create a point-in-time snapshot of the 54 * IPMP subsystem (unless the test-special -L flag is used), and then output 55 * the contents of that snapshot in a user-specified manner. Because the 56 * output format and requested fields aren't known until run-time, three sets 57 * of function pointers and two core data structures are used. Specifically: 58 * 59 * * The ipmpstat_walker_t function pointers (walk_*) iterate through 60 * all instances of a given IPMP object (group, interface, or address). 61 * At most one ipmpstat_walker_t is used per ipmpstat invocation. 62 * Since target information is included with the interface information, 63 * both -i and -t use the interface walker (walk_if()). 64 * 65 * * The ipmpstat_sfunc_t function pointers (sfunc_*) obtain a given 66 * value for a given IPMP object. Each ipmpstat_sunc_t is passed a 67 * buffer to write its result into, the buffer's size, and an 68 * ipmpstat_sfunc_arg_t state structure. The state structure consists 69 * of a pointer to the IPMP object to obtain information from 70 * (sa_data), and an open libipmp handle (sa_ih) which can be used to 71 * do additional libipmp queries, if necessary (e.g., because the 72 * object does not have all of the needed information). 73 * 74 * * The ipmpstat_field_t structure provides the list of supported fields 75 * for a given output format, along with output formatting information 76 * (e.g., field width), and a pointer to an ipmpstat_sfunc_t function 77 * that can obtain the value for a IPMP given object. For a given 78 * ipmpstat output format, there's a corresponding array of 79 * ipmpstat_field_t structures. Thus, one ipmpstat_field_t array is 80 * used per ipmpstat invocation. 81 * 82 * * The ipmpstat_ofmt_t provides an ordered list of the requested 83 * ipmpstat_field_t's (e.g., via -o) for a given ipmpstat invocation. 84 * It is built at runtime from the command-line arguments. This 85 * structure (and a given IPMP object) is used by ofmt_output() to 86 * output a single line of information about that IPMP object. 87 * 88 * * The ipmpstat_cbfunc_t function pointers (*_cbfunc) are called back 89 * by the walkers. They are used both internally to implement nested 90 * walks, and by the ipmpstat output logic to provide the glue between 91 * the IPMP object walkers and the ofmt_output() logic. Usually, a 92 * single line is output for each IPMP object, and thus ofmt_output() 93 * can be directly invoked (see info_output_cbfunc()). However, if 94 * multiple lines need to be output, then a more complex cbfunc is 95 * needed (see targinfo_output_cbfunc()). At most one cbfunc is used 96 * per ipmpstat invocation. 97 */ 98 99 /* 100 * Data type used by the sfunc callbacks to obtain the requested information 101 * from the agreed-upon object. 102 */ 103 typedef struct ipmpstat_sfunc_arg { 104 ipmp_handle_t sa_ih; 105 void *sa_data; 106 } ipmpstat_sfunc_arg_t; 107 108 typedef void ipmpstat_sfunc_t(ipmpstat_sfunc_arg_t *, char *, uint_t); 109 110 /* 111 * Data type that describes how to output a field; used by ofmt_output*(). 112 */ 113 typedef struct ipmpstat_field { 114 const char *f_name; /* field name */ 115 uint_t f_width; /* output width */ 116 ipmpstat_sfunc_t *f_sfunc; /* value->string function */ 117 } ipmpstat_field_t; 118 119 /* 120 * Data type that specifies the output field order; used by ofmt_output*() 121 */ 122 typedef struct ipmpstat_ofmt { 123 const ipmpstat_field_t *o_field; /* current field info */ 124 struct ipmpstat_ofmt *o_next; /* next field */ 125 } ipmpstat_ofmt_t; 126 127 /* 128 * Function pointers used to iterate through IPMP objects. 129 */ 130 typedef void ipmpstat_cbfunc_t(ipmp_handle_t, void *, void *); 131 typedef void ipmpstat_walker_t(ipmp_handle_t, ipmpstat_cbfunc_t *, void *); 132 133 /* 134 * Data type used to implement nested walks. 135 */ 136 typedef struct ipmpstat_walkdata { 137 ipmpstat_cbfunc_t *iw_func; /* caller-specified callback */ 138 void *iw_funcarg; /* caller-specified arg */ 139 } ipmpstat_walkdata_t; 140 141 /* 142 * Data type used by enum2str() to map an enumerated value to a string. 143 */ 144 typedef struct ipmpstat_enum { 145 const char *e_name; /* string */ 146 int e_val; /* value */ 147 } ipmpstat_enum_t; 148 149 /* 150 * Data type used to pass state between probe_output() and probe_event(). 151 */ 152 typedef struct ipmpstat_probe_state { 153 ipmp_handle_t ps_ih; /* open IPMP handle */ 154 ipmpstat_ofmt_t *ps_ofmt; /* requested ofmt string */ 155 } ipmpstat_probe_state_t; 156 157 /* 158 * Options that modify the output mode; more than one may be lit. 159 */ 160 typedef enum { 161 IPMPSTAT_OPT_NUMERIC = 0x1, 162 IPMPSTAT_OPT_PARSABLE = 0x2 163 } ipmpstat_opt_t; 164 165 /* 166 * Indices for the FLAGS field of the `-i' output format. 167 */ 168 enum { 169 IPMPSTAT_IFLAG_INDEX, IPMPSTAT_SFLAG_INDEX, IPMPSTAT_M4FLAG_INDEX, 170 IPMPSTAT_BFLAG_INDEX, IPMPSTAT_M6FLAG_INDEX, IPMPSTAT_DFLAG_INDEX, 171 IPMPSTAT_HFLAG_INDEX, IPMPSTAT_NUM_FLAGS 172 }; 173 174 #define IPMPSTAT_NCOL 80 175 #define NS2FLOATMS(ns) ((float)(ns) / (NANOSEC / MILLISEC)) 176 #define MS2FLOATSEC(ms) ((float)(ms) / 1000) 177 178 static const char *progname; 179 static hrtime_t probe_output_start; 180 static struct winsize winsize; 181 static ipmpstat_opt_t opt; 182 static ipmpstat_enum_t addr_state[], group_state[], if_state[], if_link[]; 183 static ipmpstat_enum_t if_probe[], targ_mode[]; 184 static ipmpstat_field_t addr_fields[], group_fields[], if_fields[]; 185 static ipmpstat_field_t probe_fields[], targ_fields[]; 186 static ipmpstat_cbfunc_t walk_addr_cbfunc, walk_if_cbfunc; 187 static ipmpstat_cbfunc_t info_output_cbfunc, targinfo_output_cbfunc; 188 static ipmpstat_walker_t walk_addr, walk_if, walk_group; 189 190 static int probe_event(sysevent_t *, void *); 191 static void probe_output(ipmp_handle_t, ipmpstat_ofmt_t *); 192 static ipmpstat_field_t *field_find(ipmpstat_field_t *, const char *); 193 static ipmpstat_ofmt_t *ofmt_create(const char *, ipmpstat_field_t []); 194 static void ofmt_output(const ipmpstat_ofmt_t *, ipmp_handle_t, void *); 195 static void ofmt_destroy(ipmpstat_ofmt_t *); 196 static void enum2str(const ipmpstat_enum_t *, int, char *, uint_t); 197 static void sockaddr2str(const struct sockaddr_storage *, char *, uint_t); 198 static void sighandler(int); 199 static void usage(void); 200 static void die(const char *, ...); 201 static void die_ipmperr(int, const char *, ...); 202 static void warn(const char *, ...); 203 static void warn_ipmperr(int, const char *, ...); 204 205 int 206 main(int argc, char **argv) 207 { 208 int c; 209 int err; 210 const char *ofields = NULL; 211 ipmp_handle_t ih; 212 ipmp_qcontext_t qcontext = IPMP_QCONTEXT_SNAP; 213 ipmpstat_ofmt_t *ofmt; 214 ipmpstat_field_t *fields = NULL; 215 ipmpstat_cbfunc_t *cbfunc; 216 ipmpstat_walker_t *walker; 217 218 if ((progname = strrchr(argv[0], '/')) == NULL) 219 progname = argv[0]; 220 else 221 progname++; 222 223 (void) setlocale(LC_ALL, ""); 224 (void) textdomain(TEXT_DOMAIN); 225 226 while ((c = getopt(argc, argv, "nLPo:agipt")) != EOF) { 227 if (fields != NULL && strchr("agipt", c) != NULL) 228 die("only one output format may be specified\n"); 229 230 switch (c) { 231 case 'n': 232 opt |= IPMPSTAT_OPT_NUMERIC; 233 break; 234 case 'L': 235 /* Undocumented option: for testing use ONLY */ 236 qcontext = IPMP_QCONTEXT_LIVE; 237 break; 238 case 'P': 239 opt |= IPMPSTAT_OPT_PARSABLE; 240 break; 241 case 'o': 242 ofields = optarg; 243 break; 244 case 'a': 245 walker = walk_addr; 246 cbfunc = info_output_cbfunc; 247 fields = addr_fields; 248 break; 249 case 'g': 250 walker = walk_group; 251 cbfunc = info_output_cbfunc; 252 fields = group_fields; 253 break; 254 case 'i': 255 walker = walk_if; 256 cbfunc = info_output_cbfunc; 257 fields = if_fields; 258 break; 259 case 'p': 260 fields = probe_fields; 261 break; 262 case 't': 263 walker = walk_if; 264 cbfunc = targinfo_output_cbfunc; 265 fields = targ_fields; 266 break; 267 default: 268 usage(); 269 break; 270 } 271 } 272 273 if (argc > optind || fields == NULL) 274 usage(); 275 276 if (opt & IPMPSTAT_OPT_PARSABLE) { 277 if (ofields == NULL) { 278 die("output field list (-o) required in parsable " 279 "output mode\n"); 280 } else if (strcasecmp(ofields, "all") == 0) { 281 die("\"all\" not allowed in parsable output mode\n"); 282 } 283 } 284 285 /* 286 * Obtain the window size and monitor changes to the size. This data 287 * is used to redisplay the output headers when necessary. 288 */ 289 (void) sigset(SIGWINCH, sighandler); 290 sighandler(SIGWINCH); 291 292 if ((err = ipmp_open(&ih)) != IPMP_SUCCESS) 293 die_ipmperr(err, "cannot create IPMP handle"); 294 295 if (ipmp_ping_daemon(ih) != IPMP_SUCCESS) 296 die("cannot contact in.mpathd(1M) -- is IPMP in use?\n"); 297 298 /* 299 * Create the ofmt linked list that will eventually be passed to 300 * to ofmt_output() to output the fields. 301 */ 302 ofmt = ofmt_create(ofields, fields); 303 304 /* 305 * If we've been asked to display probes, then call the probe output 306 * function. Otherwise, snapshot IPMP state (or use live state) and 307 * invoke the specified walker with the specified callback function. 308 */ 309 if (fields == probe_fields) { 310 probe_output(ih, ofmt); 311 } else { 312 if ((err = ipmp_setqcontext(ih, qcontext)) != IPMP_SUCCESS) { 313 if (qcontext == IPMP_QCONTEXT_SNAP) 314 die_ipmperr(err, "cannot snapshot IPMP state"); 315 else 316 die_ipmperr(err, "cannot use live IPMP state"); 317 } 318 (*walker)(ih, cbfunc, ofmt); 319 } 320 321 ofmt_destroy(ofmt); 322 ipmp_close(ih); 323 324 return (EXIT_SUCCESS); 325 } 326 327 /* 328 * Walks all IPMP groups on the system and invokes `cbfunc' on each, passing 329 * it `ih', the ipmp_groupinfo_t pointer, and `arg'. 330 */ 331 static void 332 walk_group(ipmp_handle_t ih, ipmpstat_cbfunc_t *cbfunc, void *arg) 333 { 334 int err; 335 uint_t i; 336 ipmp_groupinfo_t *grinfop; 337 ipmp_grouplist_t *grlistp; 338 339 if ((err = ipmp_getgrouplist(ih, &grlistp)) != IPMP_SUCCESS) 340 die_ipmperr(err, "cannot get IPMP group list"); 341 342 for (i = 0; i < grlistp->gl_ngroup; i++) { 343 err = ipmp_getgroupinfo(ih, grlistp->gl_groups[i], &grinfop); 344 if (err != IPMP_SUCCESS) { 345 warn_ipmperr(err, "cannot get info for group `%s'", 346 grlistp->gl_groups[i]); 347 continue; 348 } 349 (*cbfunc)(ih, grinfop, arg); 350 ipmp_freegroupinfo(grinfop); 351 } 352 353 ipmp_freegrouplist(grlistp); 354 } 355 356 /* 357 * Walks all IPMP interfaces on the system and invokes `cbfunc' on each, 358 * passing it `ih', the ipmp_ifinfo_t pointer, and `arg'. 359 */ 360 static void 361 walk_if(ipmp_handle_t ih, ipmpstat_cbfunc_t *cbfunc, void *arg) 362 { 363 ipmpstat_walkdata_t iw = { cbfunc, arg }; 364 365 walk_group(ih, walk_if_cbfunc, &iw); 366 } 367 368 /* 369 * Walks all IPMP data addresses on the system and invokes `cbfunc' on each. 370 * passing it `ih', the ipmp_addrinfo_t pointer, and `arg'. 371 */ 372 static void 373 walk_addr(ipmp_handle_t ih, ipmpstat_cbfunc_t *cbfunc, void *arg) 374 { 375 ipmpstat_walkdata_t iw = { cbfunc, arg }; 376 377 walk_group(ih, walk_addr_cbfunc, &iw); 378 } 379 380 /* 381 * Nested walker callback function for walk_if(). 382 */ 383 static void 384 walk_if_cbfunc(ipmp_handle_t ih, void *infop, void *arg) 385 { 386 int err; 387 uint_t i; 388 ipmp_groupinfo_t *grinfop = infop; 389 ipmp_ifinfo_t *ifinfop; 390 ipmp_iflist_t *iflistp = grinfop->gr_iflistp; 391 ipmpstat_walkdata_t *iwp = arg; 392 393 for (i = 0; i < iflistp->il_nif; i++) { 394 err = ipmp_getifinfo(ih, iflistp->il_ifs[i], &ifinfop); 395 if (err != IPMP_SUCCESS) { 396 warn_ipmperr(err, "cannot get info for interface `%s'", 397 iflistp->il_ifs[i]); 398 continue; 399 } 400 (*iwp->iw_func)(ih, ifinfop, iwp->iw_funcarg); 401 ipmp_freeifinfo(ifinfop); 402 } 403 } 404 405 /* 406 * Nested walker callback function for walk_addr(). 407 */ 408 static void 409 walk_addr_cbfunc(ipmp_handle_t ih, void *infop, void *arg) 410 { 411 int err; 412 uint_t i; 413 ipmp_groupinfo_t *grinfop = infop; 414 ipmp_addrinfo_t *adinfop; 415 ipmp_addrlist_t *adlistp = grinfop->gr_adlistp; 416 ipmpstat_walkdata_t *iwp = arg; 417 char addr[INET6_ADDRSTRLEN]; 418 struct sockaddr_storage *addrp; 419 420 for (i = 0; i < adlistp->al_naddr; i++) { 421 addrp = &adlistp->al_addrs[i]; 422 err = ipmp_getaddrinfo(ih, grinfop->gr_name, addrp, &adinfop); 423 if (err != IPMP_SUCCESS) { 424 sockaddr2str(addrp, addr, sizeof (addr)); 425 warn_ipmperr(err, "cannot get info for `%s'", addr); 426 continue; 427 } 428 (*iwp->iw_func)(ih, adinfop, iwp->iw_funcarg); 429 ipmp_freeaddrinfo(adinfop); 430 } 431 } 432 433 static void 434 sfunc_nvwarn(const char *nvname, char *buf, uint_t bufsize) 435 { 436 warn("cannot retrieve %s\n", nvname); 437 (void) strlcpy(buf, "?", bufsize); 438 } 439 440 static void 441 sfunc_addr_address(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 442 { 443 ipmp_addrinfo_t *adinfop = arg->sa_data; 444 445 sockaddr2str(&adinfop->ad_addr, buf, bufsize); 446 } 447 448 static void 449 sfunc_addr_group(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 450 { 451 int err; 452 ipmp_addrinfo_t *adinfop = arg->sa_data; 453 ipmp_groupinfo_t *grinfop; 454 455 err = ipmp_getgroupinfo(arg->sa_ih, adinfop->ad_group, &grinfop); 456 if (err != IPMP_SUCCESS) { 457 warn_ipmperr(err, "cannot get info for group `%s'", 458 adinfop->ad_group); 459 (void) strlcpy(buf, "?", bufsize); 460 return; 461 } 462 (void) strlcpy(buf, grinfop->gr_ifname, bufsize); 463 ipmp_freegroupinfo(grinfop); 464 } 465 466 static void 467 sfunc_addr_state(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 468 { 469 ipmp_addrinfo_t *adinfop = arg->sa_data; 470 471 enum2str(addr_state, adinfop->ad_state, buf, bufsize); 472 } 473 474 static void 475 sfunc_addr_inbound(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 476 { 477 ipmp_addrinfo_t *adinfop = arg->sa_data; 478 479 (void) strlcpy(buf, adinfop->ad_binding, bufsize); 480 } 481 482 static void 483 sfunc_addr_outbound(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 484 { 485 int err; 486 uint_t i, nactive = 0; 487 ipmp_ifinfo_t *ifinfop; 488 ipmp_iflist_t *iflistp; 489 ipmp_addrinfo_t *adinfop = arg->sa_data; 490 ipmp_groupinfo_t *grinfop; 491 492 if (adinfop->ad_state == IPMP_ADDR_DOWN) 493 return; 494 495 /* 496 * If there's no inbound interface for this address, there can't 497 * be any outbound traffic. 498 */ 499 if (adinfop->ad_binding[0] == '\0') 500 return; 501 502 /* 503 * The address can use any active interface in the group, so 504 * obtain all of those. 505 */ 506 err = ipmp_getgroupinfo(arg->sa_ih, adinfop->ad_group, &grinfop); 507 if (err != IPMP_SUCCESS) { 508 warn_ipmperr(err, "cannot get info for group `%s'", 509 adinfop->ad_group); 510 (void) strlcpy(buf, "?", bufsize); 511 return; 512 } 513 514 iflistp = grinfop->gr_iflistp; 515 for (i = 0; i < iflistp->il_nif; i++) { 516 err = ipmp_getifinfo(arg->sa_ih, iflistp->il_ifs[i], &ifinfop); 517 if (err != IPMP_SUCCESS) { 518 warn_ipmperr(err, "cannot get info for interface `%s'", 519 iflistp->il_ifs[i]); 520 continue; 521 } 522 523 if (ifinfop->if_flags & IPMP_IFFLAG_ACTIVE) { 524 if (nactive++ != 0) 525 (void) strlcat(buf, " ", bufsize); 526 (void) strlcat(buf, ifinfop->if_name, bufsize); 527 } 528 ipmp_freeifinfo(ifinfop); 529 } 530 ipmp_freegroupinfo(grinfop); 531 } 532 533 static void 534 sfunc_group_name(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 535 { 536 ipmp_groupinfo_t *grinfop = arg->sa_data; 537 538 (void) strlcpy(buf, grinfop->gr_name, bufsize); 539 } 540 541 static void 542 sfunc_group_ifname(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 543 { 544 ipmp_groupinfo_t *grinfop = arg->sa_data; 545 546 (void) strlcpy(buf, grinfop->gr_ifname, bufsize); 547 } 548 549 static void 550 sfunc_group_state(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 551 { 552 ipmp_groupinfo_t *grinfop = arg->sa_data; 553 554 enum2str(group_state, grinfop->gr_state, buf, bufsize); 555 } 556 557 static void 558 sfunc_group_fdt(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 559 { 560 ipmp_groupinfo_t *grinfop = arg->sa_data; 561 562 if (grinfop->gr_fdt == 0) 563 return; 564 565 (void) snprintf(buf, bufsize, "%.2fs", MS2FLOATSEC(grinfop->gr_fdt)); 566 } 567 568 static void 569 sfunc_group_interfaces(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 570 { 571 int err; 572 uint_t i; 573 char *active, *inactive, *unusable; 574 uint_t nactive = 0, ninactive = 0, nunusable = 0; 575 ipmp_groupinfo_t *grinfop = arg->sa_data; 576 ipmp_iflist_t *iflistp = grinfop->gr_iflistp; 577 ipmp_ifinfo_t *ifinfop; 578 579 active = alloca(bufsize); 580 active[0] = '\0'; 581 inactive = alloca(bufsize); 582 inactive[0] = '\0'; 583 unusable = alloca(bufsize); 584 unusable[0] = '\0'; 585 586 for (i = 0; i < iflistp->il_nif; i++) { 587 err = ipmp_getifinfo(arg->sa_ih, iflistp->il_ifs[i], &ifinfop); 588 if (err != IPMP_SUCCESS) { 589 warn_ipmperr(err, "cannot get info for interface `%s'", 590 iflistp->il_ifs[i]); 591 continue; 592 } 593 594 if (ifinfop->if_flags & IPMP_IFFLAG_ACTIVE) { 595 if (nactive++ != 0) 596 (void) strlcat(active, " ", bufsize); 597 (void) strlcat(active, ifinfop->if_name, bufsize); 598 } else if (ifinfop->if_flags & IPMP_IFFLAG_INACTIVE) { 599 if (ninactive++ != 0) 600 (void) strlcat(inactive, " ", bufsize); 601 (void) strlcat(inactive, ifinfop->if_name, bufsize); 602 } else { 603 if (nunusable++ != 0) 604 (void) strlcat(unusable, " ", bufsize); 605 (void) strlcat(unusable, ifinfop->if_name, bufsize); 606 } 607 608 ipmp_freeifinfo(ifinfop); 609 } 610 611 (void) strlcpy(buf, active, bufsize); 612 613 if (ninactive > 0) { 614 if (nactive != 0) 615 (void) strlcat(buf, " ", bufsize); 616 617 (void) strlcat(buf, "(", bufsize); 618 (void) strlcat(buf, inactive, bufsize); 619 (void) strlcat(buf, ")", bufsize); 620 } 621 622 if (nunusable > 0) { 623 if (nactive + ninactive != 0) 624 (void) strlcat(buf, " ", bufsize); 625 626 (void) strlcat(buf, "[", bufsize); 627 (void) strlcat(buf, unusable, bufsize); 628 (void) strlcat(buf, "]", bufsize); 629 } 630 } 631 632 static void 633 sfunc_if_name(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 634 { 635 ipmp_ifinfo_t *ifinfop = arg->sa_data; 636 637 (void) strlcpy(buf, ifinfop->if_name, bufsize); 638 } 639 640 static void 641 sfunc_if_active(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 642 { 643 ipmp_ifinfo_t *ifinfop = arg->sa_data; 644 645 if (ifinfop->if_flags & IPMP_IFFLAG_ACTIVE) 646 (void) strlcpy(buf, "yes", bufsize); 647 else 648 (void) strlcpy(buf, "no", bufsize); 649 } 650 651 static void 652 sfunc_if_group(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 653 { 654 int err; 655 ipmp_ifinfo_t *ifinfop = arg->sa_data; 656 ipmp_groupinfo_t *grinfop; 657 658 err = ipmp_getgroupinfo(arg->sa_ih, ifinfop->if_group, &grinfop); 659 if (err != IPMP_SUCCESS) { 660 warn_ipmperr(err, "cannot get info for group `%s'", 661 ifinfop->if_group); 662 (void) strlcpy(buf, "?", bufsize); 663 return; 664 } 665 666 (void) strlcpy(buf, grinfop->gr_ifname, bufsize); 667 ipmp_freegroupinfo(grinfop); 668 } 669 670 static void 671 sfunc_if_flags(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 672 { 673 int err; 674 ipmp_ifinfo_t *ifinfop = arg->sa_data; 675 ipmp_groupinfo_t *grinfop; 676 677 assert(bufsize > IPMPSTAT_NUM_FLAGS); 678 679 (void) memset(buf, '-', IPMPSTAT_NUM_FLAGS); 680 buf[IPMPSTAT_NUM_FLAGS] = '\0'; 681 682 if (ifinfop->if_type == IPMP_IF_STANDBY) 683 buf[IPMPSTAT_SFLAG_INDEX] = 's'; 684 685 if (ifinfop->if_flags & IPMP_IFFLAG_INACTIVE) 686 buf[IPMPSTAT_IFLAG_INDEX] = 'i'; 687 688 if (ifinfop->if_flags & IPMP_IFFLAG_DOWN) 689 buf[IPMPSTAT_DFLAG_INDEX] = 'd'; 690 691 if (ifinfop->if_flags & IPMP_IFFLAG_HWADDRDUP) 692 buf[IPMPSTAT_HFLAG_INDEX] = 'h'; 693 694 err = ipmp_getgroupinfo(arg->sa_ih, ifinfop->if_group, &grinfop); 695 if (err != IPMP_SUCCESS) { 696 warn_ipmperr(err, "cannot get broadcast/multicast info for " 697 "group `%s'", ifinfop->if_group); 698 return; 699 } 700 701 if (strcmp(grinfop->gr_m4ifname, ifinfop->if_name) == 0) 702 buf[IPMPSTAT_M4FLAG_INDEX] = 'm'; 703 704 if (strcmp(grinfop->gr_m6ifname, ifinfop->if_name) == 0) 705 buf[IPMPSTAT_M6FLAG_INDEX] = 'M'; 706 707 if (strcmp(grinfop->gr_bcifname, ifinfop->if_name) == 0) 708 buf[IPMPSTAT_BFLAG_INDEX] = 'b'; 709 710 ipmp_freegroupinfo(grinfop); 711 } 712 713 static void 714 sfunc_if_link(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 715 { 716 ipmp_ifinfo_t *ifinfop = arg->sa_data; 717 718 enum2str(if_link, ifinfop->if_linkstate, buf, bufsize); 719 } 720 721 static void 722 sfunc_if_probe(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 723 { 724 ipmp_ifinfo_t *ifinfop = arg->sa_data; 725 726 enum2str(if_probe, ifinfop->if_probestate, buf, bufsize); 727 } 728 729 static void 730 sfunc_if_state(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 731 { 732 ipmp_ifinfo_t *ifinfop = arg->sa_data; 733 734 enum2str(if_state, ifinfop->if_state, buf, bufsize); 735 } 736 737 static void 738 sfunc_probe_id(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 739 { 740 uint32_t probe_id; 741 nvlist_t *nvl = arg->sa_data; 742 743 if (nvlist_lookup_uint32(nvl, IPMP_PROBE_ID, &probe_id) != 0) { 744 sfunc_nvwarn("IPMP_PROBE_ID", buf, bufsize); 745 return; 746 } 747 748 (void) snprintf(buf, bufsize, "%u", probe_id); 749 } 750 751 static void 752 sfunc_probe_ifname(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 753 { 754 char *ifname; 755 nvlist_t *nvl = arg->sa_data; 756 757 if (nvlist_lookup_string(nvl, IPMP_IF_NAME, &ifname) != 0) { 758 sfunc_nvwarn("IPMP_IF_NAME", buf, bufsize); 759 return; 760 } 761 762 (void) strlcpy(buf, ifname, bufsize); 763 } 764 765 static void 766 sfunc_probe_time(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 767 { 768 hrtime_t start; 769 nvlist_t *nvl = arg->sa_data; 770 771 if (nvlist_lookup_hrtime(nvl, IPMP_PROBE_START_TIME, &start) != 0) { 772 sfunc_nvwarn("IPMP_PROBE_START_TIME", buf, bufsize); 773 return; 774 } 775 776 (void) snprintf(buf, bufsize, "%.2fs", 777 (float)(start - probe_output_start) / NANOSEC); 778 } 779 780 static void 781 sfunc_probe_target(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 782 { 783 uint_t nelem; 784 struct sockaddr_storage *target; 785 nvlist_t *nvl = arg->sa_data; 786 787 if (nvlist_lookup_byte_array(nvl, IPMP_PROBE_TARGET, 788 (uchar_t **)&target, &nelem) != 0) { 789 sfunc_nvwarn("IPMP_PROBE_TARGET", buf, bufsize); 790 return; 791 } 792 793 sockaddr2str(target, buf, bufsize); 794 } 795 796 static void 797 sfunc_probe_rtt(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 798 { 799 hrtime_t start, ackproc; 800 nvlist_t *nvl = arg->sa_data; 801 uint32_t state; 802 803 if (nvlist_lookup_uint32(nvl, IPMP_PROBE_STATE, &state) != 0) { 804 sfunc_nvwarn("IPMP_PROBE_STATE", buf, bufsize); 805 return; 806 } 807 808 if (state != IPMP_PROBE_ACKED) 809 return; 810 811 if (nvlist_lookup_hrtime(nvl, IPMP_PROBE_START_TIME, &start) != 0) { 812 sfunc_nvwarn("IPMP_PROBE_START_TIME", buf, bufsize); 813 return; 814 } 815 816 if (nvlist_lookup_hrtime(nvl, IPMP_PROBE_ACKPROC_TIME, &ackproc) != 0) { 817 sfunc_nvwarn("IPMP_PROBE_ACKPROC_TIME", buf, bufsize); 818 return; 819 } 820 821 (void) snprintf(buf, bufsize, "%.2fms", NS2FLOATMS(ackproc - start)); 822 } 823 824 static void 825 sfunc_probe_netrtt(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 826 { 827 hrtime_t sent, ackrecv; 828 nvlist_t *nvl = arg->sa_data; 829 uint32_t state; 830 831 if (nvlist_lookup_uint32(nvl, IPMP_PROBE_STATE, &state) != 0) { 832 sfunc_nvwarn("IPMP_PROBE_STATE", buf, bufsize); 833 return; 834 } 835 836 if (state != IPMP_PROBE_ACKED) 837 return; 838 839 if (nvlist_lookup_hrtime(nvl, IPMP_PROBE_SENT_TIME, &sent) != 0) { 840 sfunc_nvwarn("IPMP_PROBE_SENT_TIME", buf, bufsize); 841 return; 842 } 843 844 if (nvlist_lookup_hrtime(nvl, IPMP_PROBE_ACKRECV_TIME, &ackrecv) != 0) { 845 sfunc_nvwarn("IPMP_PROBE_ACKRECV_TIME", buf, bufsize); 846 return; 847 } 848 849 (void) snprintf(buf, bufsize, "%.2fms", NS2FLOATMS(ackrecv - sent)); 850 } 851 852 static void 853 sfunc_probe_rttavg(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 854 { 855 int64_t rttavg; 856 nvlist_t *nvl = arg->sa_data; 857 858 if (nvlist_lookup_int64(nvl, IPMP_PROBE_TARGET_RTTAVG, &rttavg) != 0) { 859 sfunc_nvwarn("IPMP_PROBE_TARGET_RTTAVG", buf, bufsize); 860 return; 861 } 862 863 if (rttavg != 0) 864 (void) snprintf(buf, bufsize, "%.2fms", NS2FLOATMS(rttavg)); 865 } 866 867 static void 868 sfunc_probe_rttdev(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 869 { 870 int64_t rttdev; 871 nvlist_t *nvl = arg->sa_data; 872 873 if (nvlist_lookup_int64(nvl, IPMP_PROBE_TARGET_RTTDEV, &rttdev) != 0) { 874 sfunc_nvwarn("IPMP_PROBE_TARGET_RTTDEV", buf, bufsize); 875 return; 876 } 877 878 if (rttdev != 0) 879 (void) snprintf(buf, bufsize, "%.2fms", NS2FLOATMS(rttdev)); 880 } 881 882 /* ARGSUSED */ 883 static void 884 probe_enabled_cbfunc(ipmp_handle_t ih, void *infop, void *arg) 885 { 886 uint_t *nenabledp = arg; 887 ipmp_ifinfo_t *ifinfop = infop; 888 889 if (ifinfop->if_probestate != IPMP_PROBE_DISABLED) 890 (*nenabledp)++; 891 } 892 893 static void 894 probe_output(ipmp_handle_t ih, ipmpstat_ofmt_t *ofmt) 895 { 896 char sub[MAX_SUBID_LEN]; 897 evchan_t *evch; 898 ipmpstat_probe_state_t ps = { ih, ofmt }; 899 uint_t nenabled = 0; 900 901 /* 902 * Check if any interfaces are enabled for probe-based failure 903 * detection. If not, immediately fail. 904 */ 905 walk_if(ih, probe_enabled_cbfunc, &nenabled); 906 if (nenabled == 0) 907 die("probe-based failure detection is disabled\n"); 908 909 probe_output_start = gethrtime(); 910 911 /* 912 * Unfortunately, until 4791900 is fixed, only privileged processes 913 * can bind and thus receive sysevents. 914 */ 915 errno = sysevent_evc_bind(IPMP_EVENT_CHAN, &evch, EVCH_CREAT); 916 if (errno != 0) { 917 if (errno == EPERM) 918 die("insufficient privileges for -p\n"); 919 die("sysevent_evc_bind to channel %s failed", IPMP_EVENT_CHAN); 920 } 921 922 /* 923 * The subscriber must be unique in order for sysevent_evc_subscribe() 924 * to succeed, so combine our name and pid. 925 */ 926 (void) snprintf(sub, sizeof (sub), "%d-%s", getpid(), progname); 927 928 errno = sysevent_evc_subscribe(evch, sub, EC_IPMP, probe_event, &ps, 0); 929 if (errno != 0) 930 die("sysevent_evc_subscribe for class %s failed", EC_IPMP); 931 932 for (;;) 933 (void) pause(); 934 } 935 936 static int 937 probe_event(sysevent_t *ev, void *arg) 938 { 939 nvlist_t *nvl; 940 uint32_t state; 941 uint32_t version; 942 ipmpstat_probe_state_t *psp = arg; 943 944 if (strcmp(sysevent_get_subclass_name(ev), ESC_IPMP_PROBE_STATE) != 0) 945 return (0); 946 947 if (sysevent_get_attr_list(ev, &nvl) != 0) { 948 warn("sysevent_get_attr_list failed; dropping event"); 949 return (0); 950 } 951 952 if (nvlist_lookup_uint32(nvl, IPMP_EVENT_VERSION, &version) != 0) { 953 warn("dropped event with no IPMP_EVENT_VERSION\n"); 954 goto out; 955 } 956 957 if (version != IPMP_EVENT_CUR_VERSION) { 958 warn("dropped event with unsupported IPMP_EVENT_VERSION %d\n", 959 version); 960 goto out; 961 } 962 963 if (nvlist_lookup_uint32(nvl, IPMP_PROBE_STATE, &state) != 0) { 964 warn("dropped event with no IPMP_PROBE_STATE\n"); 965 goto out; 966 } 967 968 if (state == IPMP_PROBE_ACKED || state == IPMP_PROBE_LOST) 969 ofmt_output(psp->ps_ofmt, psp->ps_ih, nvl); 970 out: 971 nvlist_free(nvl); 972 return (0); 973 } 974 975 static void 976 sfunc_targ_ifname(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 977 { 978 ipmp_targinfo_t *targinfop = arg->sa_data; 979 980 (void) strlcpy(buf, targinfop->it_name, bufsize); 981 } 982 983 static void 984 sfunc_targ_mode(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 985 { 986 ipmp_targinfo_t *targinfop = arg->sa_data; 987 988 enum2str(targ_mode, targinfop->it_targmode, buf, bufsize); 989 } 990 991 static void 992 sfunc_targ_testaddr(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 993 { 994 ipmp_targinfo_t *targinfop = arg->sa_data; 995 996 if (targinfop->it_targmode != IPMP_TARG_DISABLED) 997 sockaddr2str(&targinfop->it_testaddr, buf, bufsize); 998 } 999 1000 static void 1001 sfunc_targ_targets(ipmpstat_sfunc_arg_t *arg, char *buf, uint_t bufsize) 1002 { 1003 uint_t i; 1004 char *targname = alloca(bufsize); 1005 ipmp_targinfo_t *targinfop = arg->sa_data; 1006 ipmp_addrlist_t *targlistp = targinfop->it_targlistp; 1007 1008 for (i = 0; i < targlistp->al_naddr; i++) { 1009 sockaddr2str(&targlistp->al_addrs[i], targname, bufsize); 1010 (void) strlcat(buf, targname, bufsize); 1011 if ((i + 1) < targlistp->al_naddr) 1012 (void) strlcat(buf, " ", bufsize); 1013 } 1014 } 1015 1016 static void 1017 info_output_cbfunc(ipmp_handle_t ih, void *infop, void *arg) 1018 { 1019 ofmt_output(arg, ih, infop); 1020 } 1021 1022 static void 1023 targinfo_output_cbfunc(ipmp_handle_t ih, void *infop, void *arg) 1024 { 1025 ipmp_ifinfo_t *ifinfop = infop; 1026 ipmp_if_targmode_t targmode4 = ifinfop->if_targinfo4.it_targmode; 1027 ipmp_if_targmode_t targmode6 = ifinfop->if_targinfo6.it_targmode; 1028 1029 /* 1030 * Usually, either IPv4 or IPv6 probing will be enabled, but the admin 1031 * may enable both. If only one is enabled, omit the other one so as 1032 * to not encourage the admin to enable both. If neither is enabled, 1033 * we still print one just so the admin can see a MODE of "disabled". 1034 */ 1035 if (targmode4 != IPMP_TARG_DISABLED || targmode6 == IPMP_TARG_DISABLED) 1036 ofmt_output(arg, ih, &ifinfop->if_targinfo4); 1037 if (targmode6 != IPMP_TARG_DISABLED) 1038 ofmt_output(arg, ih, &ifinfop->if_targinfo6); 1039 } 1040 1041 /* 1042 * Creates an ipmpstat_ofmt_t field list from the comma-separated list of 1043 * user-specified fields passed via `ofields'. The table of known fields 1044 * (and their attributes) is passed via `fields'. 1045 */ 1046 static ipmpstat_ofmt_t * 1047 ofmt_create(const char *ofields, ipmpstat_field_t fields[]) 1048 { 1049 char *token, *lasts, *ofields_dup; 1050 const char *fieldname; 1051 ipmpstat_ofmt_t *ofmt, *ofmt_head = NULL, *ofmt_tail; 1052 ipmpstat_field_t *fieldp; 1053 uint_t cols = 0; 1054 1055 /* 1056 * If "-o" was omitted or "-o all" was specified, build a list of 1057 * field names. If "-o" was omitted, stop building the list when 1058 * we run out of columns. 1059 */ 1060 if (ofields == NULL || strcasecmp(ofields, "all") == 0) { 1061 for (fieldp = fields; fieldp->f_name != NULL; fieldp++) { 1062 cols += fieldp->f_width; 1063 if (ofields == NULL && cols > IPMPSTAT_NCOL) 1064 break; 1065 1066 if ((ofmt = calloc(sizeof (*ofmt), 1)) == NULL) 1067 die("cannot allocate output format list"); 1068 1069 ofmt->o_field = fieldp; 1070 if (ofmt_head == NULL) { 1071 ofmt_head = ofmt; 1072 ofmt_tail = ofmt; 1073 } else { 1074 ofmt_tail->o_next = ofmt; 1075 ofmt_tail = ofmt; 1076 } 1077 } 1078 return (ofmt_head); 1079 } 1080 1081 if ((ofields_dup = strdup(ofields)) == NULL) 1082 die("cannot allocate output format list"); 1083 1084 token = ofields_dup; 1085 while ((fieldname = strtok_r(token, ",", &lasts)) != NULL) { 1086 token = NULL; 1087 1088 if ((fieldp = field_find(fields, fieldname)) == NULL) { 1089 /* 1090 * Since machine parsers are unlikely to be able to 1091 * gracefully handle missing fields, die if we're in 1092 * parsable mode. Otherwise, just print a warning. 1093 */ 1094 if (opt & IPMPSTAT_OPT_PARSABLE) 1095 die("unknown output field `%s'\n", fieldname); 1096 1097 warn("ignoring unknown output field `%s'\n", fieldname); 1098 continue; 1099 } 1100 1101 if ((ofmt = calloc(sizeof (*ofmt), 1)) == NULL) 1102 die("cannot allocate output format list"); 1103 1104 ofmt->o_field = fieldp; 1105 if (ofmt_head == NULL) { 1106 ofmt_head = ofmt; 1107 ofmt_tail = ofmt; 1108 } else { 1109 ofmt_tail->o_next = ofmt; 1110 ofmt_tail = ofmt; 1111 } 1112 } 1113 1114 free(ofields_dup); 1115 if (ofmt_head == NULL) 1116 die("no valid output fields specified\n"); 1117 1118 return (ofmt_head); 1119 } 1120 1121 /* 1122 * Destroys the provided `ofmt' field list. 1123 */ 1124 static void 1125 ofmt_destroy(ipmpstat_ofmt_t *ofmt) 1126 { 1127 ipmpstat_ofmt_t *ofmt_next; 1128 1129 for (; ofmt != NULL; ofmt = ofmt_next) { 1130 ofmt_next = ofmt->o_next; 1131 free(ofmt); 1132 } 1133 } 1134 1135 /* 1136 * Outputs a header for the fields named by `ofmt'. 1137 */ 1138 static void 1139 ofmt_output_header(const ipmpstat_ofmt_t *ofmt) 1140 { 1141 const ipmpstat_field_t *fieldp; 1142 1143 for (; ofmt != NULL; ofmt = ofmt->o_next) { 1144 fieldp = ofmt->o_field; 1145 1146 if (ofmt->o_next == NULL) 1147 (void) printf("%s", fieldp->f_name); 1148 else 1149 (void) printf("%-*s", fieldp->f_width, fieldp->f_name); 1150 } 1151 (void) printf("\n"); 1152 } 1153 1154 /* 1155 * Outputs one row of values for the fields named by `ofmt'. The values to 1156 * output are obtained through the `ofmt' function pointers, which are 1157 * indirectly passed the `ih' and `arg' structures for state; see the block 1158 * comment at the start of this file for details. 1159 */ 1160 static void 1161 ofmt_output(const ipmpstat_ofmt_t *ofmt, ipmp_handle_t ih, void *arg) 1162 { 1163 int i; 1164 char buf[1024]; 1165 boolean_t escsep; 1166 static int nrow; 1167 const char *value; 1168 uint_t width, valwidth; 1169 uint_t compress, overflow = 0; 1170 const ipmpstat_field_t *fieldp; 1171 ipmpstat_sfunc_arg_t sfunc_arg; 1172 1173 /* 1174 * For each screenful of data, display the header. 1175 */ 1176 if ((nrow++ % winsize.ws_row) == 0 && !(opt & IPMPSTAT_OPT_PARSABLE)) { 1177 ofmt_output_header(ofmt); 1178 nrow++; 1179 } 1180 1181 /* 1182 * Check if we'll be displaying multiple fields per line, and thus 1183 * need to escape the field separator. 1184 */ 1185 escsep = (ofmt != NULL && ofmt->o_next != NULL); 1186 1187 for (; ofmt != NULL; ofmt = ofmt->o_next) { 1188 fieldp = ofmt->o_field; 1189 1190 sfunc_arg.sa_ih = ih; 1191 sfunc_arg.sa_data = arg; 1192 1193 buf[0] = '\0'; 1194 (*fieldp->f_sfunc)(&sfunc_arg, buf, sizeof (buf)); 1195 1196 if (opt & IPMPSTAT_OPT_PARSABLE) { 1197 for (i = 0; buf[i] != '\0'; i++) { 1198 if (escsep && (buf[i] == ':' || buf[i] == '\\')) 1199 (void) putchar('\\'); 1200 (void) putchar(buf[i]); 1201 } 1202 if (ofmt->o_next != NULL) 1203 (void) putchar(':'); 1204 } else { 1205 value = (buf[0] == '\0') ? "--" : buf; 1206 1207 /* 1208 * To avoid needless line-wraps, for the last field, 1209 * don't include any trailing whitespace. 1210 */ 1211 if (ofmt->o_next == NULL) { 1212 (void) printf("%s", value); 1213 continue; 1214 } 1215 1216 /* 1217 * For other fields, grow the width as necessary to 1218 * ensure the value completely fits. However, if 1219 * there's unused whitespace in subsequent fields, 1220 * then "compress" that whitespace to attempt to get 1221 * the columns to line up again. 1222 */ 1223 width = fieldp->f_width; 1224 valwidth = strlen(value); 1225 1226 if (valwidth + overflow >= width) { 1227 overflow += valwidth - width + 1; 1228 (void) printf("%s ", value); 1229 continue; 1230 } 1231 1232 if (overflow > 0) { 1233 compress = MIN(overflow, width - valwidth); 1234 overflow -= compress; 1235 width -= compress; 1236 } 1237 (void) printf("%-*s", width, value); 1238 } 1239 } 1240 (void) printf("\n"); 1241 1242 /* 1243 * In case stdout has been redirected to e.g. a pipe, flush stdout so 1244 * that commands can act on our output immediately. 1245 */ 1246 (void) fflush(stdout); 1247 } 1248 1249 /* 1250 * Searches the `fields' array for a field matching `fieldname'. Returns 1251 * a pointer to that field on success, or NULL on failure. 1252 */ 1253 static ipmpstat_field_t * 1254 field_find(ipmpstat_field_t *fields, const char *fieldname) 1255 { 1256 ipmpstat_field_t *fieldp; 1257 1258 for (fieldp = fields; fieldp->f_name != NULL; fieldp++) { 1259 if (strcasecmp(fieldp->f_name, fieldname) == 0) 1260 return (fieldp); 1261 } 1262 return (NULL); 1263 } 1264 1265 /* 1266 * Uses `enums' to map `enumval' to a string, and stores at most `bufsize' 1267 * bytes of that string into `buf'. 1268 */ 1269 static void 1270 enum2str(const ipmpstat_enum_t *enums, int enumval, char *buf, uint_t bufsize) 1271 { 1272 const ipmpstat_enum_t *enump; 1273 1274 for (enump = enums; enump->e_name != NULL; enump++) { 1275 if (enump->e_val == enumval) { 1276 (void) strlcpy(buf, enump->e_name, bufsize); 1277 return; 1278 } 1279 } 1280 (void) snprintf(buf, bufsize, "<%d>", enumval); 1281 } 1282 1283 /* 1284 * Stores the stringified value of the sockaddr_storage pointed to by `ssp' 1285 * into at most `bufsize' bytes of `buf'. 1286 */ 1287 static void 1288 sockaddr2str(const struct sockaddr_storage *ssp, char *buf, uint_t bufsize) 1289 { 1290 int flags = NI_NOFQDN; 1291 socklen_t socklen; 1292 struct sockaddr *sp = (struct sockaddr *)ssp; 1293 1294 /* 1295 * Sadly, getnameinfo() does not allow the socklen to be oversized for 1296 * a given family -- so we must determine the exact size to pass to it. 1297 */ 1298 switch (ssp->ss_family) { 1299 case AF_INET: 1300 socklen = sizeof (struct sockaddr_in); 1301 break; 1302 case AF_INET6: 1303 socklen = sizeof (struct sockaddr_in6); 1304 break; 1305 default: 1306 (void) strlcpy(buf, "?", bufsize); 1307 return; 1308 } 1309 1310 if (opt & IPMPSTAT_OPT_NUMERIC) 1311 flags |= NI_NUMERICHOST; 1312 1313 (void) getnameinfo(sp, socklen, buf, bufsize, NULL, 0, flags); 1314 } 1315 1316 static void 1317 sighandler(int sig) 1318 { 1319 assert(sig == SIGWINCH); 1320 1321 if (ioctl(1, TIOCGWINSZ, &winsize) == -1 || 1322 winsize.ws_col == 0 || winsize.ws_row == 0) { 1323 winsize.ws_col = 80; 1324 winsize.ws_row = 24; 1325 } 1326 } 1327 1328 static void 1329 usage(void) 1330 { 1331 const char *argstr = gettext("[-n] [-o <field> [-P]] -a|-g|-i|-p|-t"); 1332 1333 (void) fprintf(stderr, gettext("usage: %s %s\n"), progname, argstr); 1334 exit(EXIT_FAILURE); 1335 } 1336 1337 /* PRINTFLIKE1 */ 1338 static void 1339 warn(const char *format, ...) 1340 { 1341 va_list alist; 1342 int error = errno; 1343 1344 format = gettext(format); 1345 (void) fprintf(stderr, gettext("%s: warning: "), progname); 1346 1347 va_start(alist, format); 1348 (void) vfprintf(stderr, format, alist); 1349 va_end(alist); 1350 1351 if (strchr(format, '\n') == NULL) 1352 (void) fprintf(stderr, ": %s\n", strerror(error)); 1353 } 1354 1355 /* PRINTFLIKE2 */ 1356 static void 1357 warn_ipmperr(int ipmperr, const char *format, ...) 1358 { 1359 va_list alist; 1360 1361 format = gettext(format); 1362 (void) fprintf(stderr, gettext("%s: warning: "), progname); 1363 1364 va_start(alist, format); 1365 (void) vfprintf(stderr, format, alist); 1366 va_end(alist); 1367 1368 (void) fprintf(stderr, ": %s\n", ipmp_errmsg(ipmperr)); 1369 } 1370 1371 /* PRINTFLIKE1 */ 1372 static void 1373 die(const char *format, ...) 1374 { 1375 va_list alist; 1376 int error = errno; 1377 1378 format = gettext(format); 1379 (void) fprintf(stderr, "%s: ", progname); 1380 1381 va_start(alist, format); 1382 (void) vfprintf(stderr, format, alist); 1383 va_end(alist); 1384 1385 if (strchr(format, '\n') == NULL) 1386 (void) fprintf(stderr, ": %s\n", strerror(error)); 1387 1388 exit(EXIT_FAILURE); 1389 } 1390 1391 /* PRINTFLIKE2 */ 1392 static void 1393 die_ipmperr(int ipmperr, const char *format, ...) 1394 { 1395 va_list alist; 1396 1397 format = gettext(format); 1398 (void) fprintf(stderr, "%s: ", progname); 1399 1400 va_start(alist, format); 1401 (void) vfprintf(stderr, format, alist); 1402 va_end(alist); 1403 (void) fprintf(stderr, ": %s\n", ipmp_errmsg(ipmperr)); 1404 1405 exit(EXIT_FAILURE); 1406 } 1407 1408 static ipmpstat_field_t addr_fields[] = { 1409 { "ADDRESS", 26, sfunc_addr_address }, 1410 { "STATE", 7, sfunc_addr_state }, 1411 { "GROUP", 12, sfunc_addr_group }, 1412 { "INBOUND", 12, sfunc_addr_inbound }, 1413 { "OUTBOUND", 23, sfunc_addr_outbound }, 1414 { NULL, 0, NULL } 1415 }; 1416 1417 static ipmpstat_field_t group_fields[] = { 1418 { "GROUP", 12, sfunc_group_ifname }, 1419 { "GROUPNAME", 12, sfunc_group_name }, 1420 { "STATE", 10, sfunc_group_state }, 1421 { "FDT", 10, sfunc_group_fdt }, 1422 { "INTERFACES", 30, sfunc_group_interfaces }, 1423 { NULL, 0, NULL } 1424 }; 1425 1426 static ipmpstat_field_t if_fields[] = { 1427 { "INTERFACE", 12, sfunc_if_name }, 1428 { "ACTIVE", 8, sfunc_if_active }, 1429 { "GROUP", 12, sfunc_if_group }, 1430 { "FLAGS", 10, sfunc_if_flags }, 1431 { "LINK", 10, sfunc_if_link }, 1432 { "PROBE", 10, sfunc_if_probe }, 1433 { "STATE", 10, sfunc_if_state }, 1434 { NULL, 0, NULL } 1435 }; 1436 1437 static ipmpstat_field_t probe_fields[] = { 1438 { "TIME", 10, sfunc_probe_time }, 1439 { "INTERFACE", 12, sfunc_probe_ifname }, 1440 { "PROBE", 7, sfunc_probe_id }, 1441 { "NETRTT", 10, sfunc_probe_netrtt }, 1442 { "RTT", 10, sfunc_probe_rtt }, 1443 { "RTTAVG", 10, sfunc_probe_rttavg }, 1444 { "TARGET", 20, sfunc_probe_target }, 1445 { "RTTDEV", 10, sfunc_probe_rttdev }, 1446 { NULL, 0, NULL } 1447 }; 1448 1449 static ipmpstat_field_t targ_fields[] = { 1450 { "INTERFACE", 12, sfunc_targ_ifname }, 1451 { "MODE", 10, sfunc_targ_mode }, 1452 { "TESTADDR", 20, sfunc_targ_testaddr }, 1453 { "TARGETS", 38, sfunc_targ_targets }, 1454 { NULL, 0, NULL } 1455 }; 1456 1457 static ipmpstat_enum_t addr_state[] = { 1458 { "up", IPMP_ADDR_UP }, 1459 { "down", IPMP_ADDR_DOWN }, 1460 { NULL, 0 } 1461 }; 1462 1463 static ipmpstat_enum_t group_state[] = { 1464 { "ok", IPMP_GROUP_OK }, 1465 { "failed", IPMP_GROUP_FAILED }, 1466 { "degraded", IPMP_GROUP_DEGRADED }, 1467 { NULL, 0 } 1468 }; 1469 1470 static ipmpstat_enum_t if_link[] = { 1471 { "up", IPMP_LINK_UP }, 1472 { "down", IPMP_LINK_DOWN }, 1473 { "unknown", IPMP_LINK_UNKNOWN }, 1474 { NULL, 0 } 1475 }; 1476 1477 static ipmpstat_enum_t if_probe[] = { 1478 { "ok", IPMP_PROBE_OK }, 1479 { "failed", IPMP_PROBE_FAILED }, 1480 { "unknown", IPMP_PROBE_UNKNOWN }, 1481 { "disabled", IPMP_PROBE_DISABLED }, 1482 { NULL, 0 } 1483 }; 1484 1485 static ipmpstat_enum_t if_state[] = { 1486 { "ok", IPMP_IF_OK }, 1487 { "failed", IPMP_IF_FAILED }, 1488 { "unknown", IPMP_IF_UNKNOWN }, 1489 { "offline", IPMP_IF_OFFLINE }, 1490 { NULL, 0 } 1491 }; 1492 1493 static ipmpstat_enum_t targ_mode[] = { 1494 { "disabled", IPMP_TARG_DISABLED }, 1495 { "routes", IPMP_TARG_ROUTES }, 1496 { "multicast", IPMP_TARG_MULTICAST }, 1497 { NULL, 0 } 1498 }; 1499