Annotation of src/usr.bin/netstat/route.c, Revision 1.72
1.72 ! claudio 1: /* $OpenBSD: route.c,v 1.71 2006/04/12 09:24:44 hshoexer Exp $ */
1.2 deraadt 2: /* $NetBSD: route.c,v 1.15 1996/05/07 02:55:06 thorpej Exp $ */
1.1 deraadt 3:
4: /*
5: * Copyright (c) 1983, 1988, 1993
6: * The Regents of the University of California. All rights reserved.
7: *
8: * Redistribution and use in source and binary forms, with or without
9: * modification, are permitted provided that the following conditions
10: * are met:
11: * 1. Redistributions of source code must retain the above copyright
12: * notice, this list of conditions and the following disclaimer.
13: * 2. Redistributions in binary form must reproduce the above copyright
14: * notice, this list of conditions and the following disclaimer in the
15: * documentation and/or other materials provided with the distribution.
1.53 millert 16: * 3. Neither the name of the University nor the names of its contributors
1.1 deraadt 17: * may be used to endorse or promote products derived from this software
18: * without specific prior written permission.
19: *
20: * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23: * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30: * SUCH DAMAGE.
31: */
32:
33: #ifndef lint
34: #if 0
35: static char sccsid[] = "from: @(#)route.c 8.3 (Berkeley) 3/9/94";
36: #else
1.72 ! claudio 37: static char *rcsid = "$OpenBSD: route.c,v 1.71 2006/04/12 09:24:44 hshoexer Exp $";
1.1 deraadt 38: #endif
39: #endif /* not lint */
40:
41: #include <sys/param.h>
42: #include <sys/protosw.h>
43: #include <sys/socket.h>
44: #include <sys/mbuf.h>
45:
46: #include <net/if.h>
47: #include <net/if_dl.h>
48: #include <net/if_types.h>
49: #define _KERNEL
50: #include <net/route.h>
51: #undef _KERNEL
52: #include <netinet/in.h>
1.13 millert 53: #include <arpa/inet.h>
1.1 deraadt 54:
55: #include <sys/sysctl.h>
56:
1.61 otto 57: #include <err.h>
1.15 millert 58: #include <limits.h>
1.1 deraadt 59: #include <netdb.h>
60: #include <stdio.h>
61: #include <stdlib.h>
62: #include <string.h>
63: #include <unistd.h>
1.9 angelos 64:
65: #ifndef INET
66: #define INET
67: #endif
68:
1.26 angelos 69: #include <netinet/ip_ipsp.h>
1.1 deraadt 70: #include "netstat.h"
71:
1.67 jaredy 72: #define kget(p, d) (kread((u_long)(p), &(d), sizeof (d)))
1.1 deraadt 73:
1.29 deraadt 74: /* alignment constraint for routing socket */
75: #define ROUNDUP(a) \
76: ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
77: #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
1.51 jason 78:
79: struct radix_node_head *rt_tables[AF_MAX+1];
1.29 deraadt 80:
1.1 deraadt 81: static union {
1.6 deraadt 82: struct sockaddr u_sa;
83: u_int32_t u_data[64];
1.29 deraadt 84: int u_dummy; /* force word-alignment */
1.1 deraadt 85: } pt_u;
86:
87: int do_rtent = 0;
88: struct rtentry rtentry;
89: struct radix_node rnode;
90: struct radix_mask rmask;
91:
1.45 millert 92: static struct sockaddr *kgetsa(struct sockaddr *);
93: static void p_tree(struct radix_node *);
1.54 deraadt 94: static void p_rtnode(void);
1.49 deraadt 95: static void p_rtflags(u_char);
1.72 ! claudio 96: static void p_krtentry(struct rtentry *);
1.45 millert 97: static void encap_print(struct rtentry *);
1.1 deraadt 98:
99: /*
100: * Print routing tables.
101: */
102: void
1.50 deraadt 103: routepr(u_long rtree)
1.1 deraadt 104: {
105: struct radix_node_head *rnh, head;
106: int i;
107:
108: printf("Routing tables\n");
109:
1.72 ! claudio 110: if (rtree == 0) {
! 111: printf("rt_tables: symbol not in namelist\n");
! 112: return;
! 113: }
1.1 deraadt 114:
1.72 ! claudio 115: kget(rtree, rt_tables);
! 116: for (i = 0; i <= AF_MAX; i++) {
! 117: if ((rnh = rt_tables[i]) == 0)
! 118: continue;
! 119: kget(rnh, head);
! 120: if (i == AF_UNSPEC) {
! 121: if (Aflag && (af == 0 || af == 0xff)) {
! 122: printf("Netmasks:\n");
1.1 deraadt 123: p_tree(head.rnh_treetop);
124: }
1.72 ! claudio 125: } else if (af == AF_UNSPEC || af == i) {
! 126: pr_family(i);
! 127: do_rtent = 1;
! 128: pr_rthdr(i, Aflag);
! 129: p_tree(head.rnh_treetop);
1.1 deraadt 130: }
131: }
132: }
133:
134: static struct sockaddr *
1.50 deraadt 135: kgetsa(struct sockaddr *dst)
1.1 deraadt 136: {
137:
138: kget(dst, pt_u.u_sa);
139: if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
1.67 jaredy 140: kread((u_long)dst, pt_u.u_data, pt_u.u_sa.sa_len);
1.1 deraadt 141: return (&pt_u.u_sa);
142: }
143:
144: static void
1.50 deraadt 145: p_tree(struct radix_node *rn)
1.1 deraadt 146: {
147:
148: again:
149: kget(rn, rnode);
150: if (rnode.rn_b < 0) {
151: if (Aflag)
1.14 millert 152: printf("%-16p ", rn);
1.1 deraadt 153: if (rnode.rn_flags & RNF_ROOT) {
154: if (Aflag)
155: printf("(root node)%s",
156: rnode.rn_dupedkey ? " =>\n" : "\n");
157: } else if (do_rtent) {
158: kget(rn, rtentry);
1.72 ! claudio 159: p_krtentry(&rtentry);
1.1 deraadt 160: if (Aflag)
161: p_rtnode();
162: } else {
163: p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
1.21 peter 164: 0, 0, 44);
1.1 deraadt 165: putchar('\n');
166: }
1.13 millert 167: if ((rn = rnode.rn_dupedkey))
1.1 deraadt 168: goto again;
169: } else {
170: if (Aflag && do_rtent) {
1.14 millert 171: printf("%-16p ", rn);
1.1 deraadt 172: p_rtnode();
173: }
174: rn = rnode.rn_r;
175: p_tree(rnode.rn_l);
176: p_tree(rn);
177: }
178: }
179:
1.49 deraadt 180: static void
181: p_rtflags(u_char flags)
182: {
183: putchar('<');
184: if (flags & RNF_NORMAL)
185: putchar('N');
186: if (flags & RNF_ROOT)
187: putchar('R');
188: if (flags & RNF_ACTIVE)
189: putchar('A');
1.56 henric 190: if (flags & ~(RNF_NORMAL | RNF_ROOT | RNF_ACTIVE))
1.49 deraadt 191: printf("/0x%02x", flags);
192: putchar('>');
193: }
194:
1.23 deraadt 195: char nbuf[25];
1.1 deraadt 196:
197: static void
1.50 deraadt 198: p_rtnode(void)
1.1 deraadt 199: {
200: struct radix_mask *rm = rnode.rn_mklist;
201:
202: if (rnode.rn_b < 0) {
203: if (rnode.rn_mask) {
204: printf("\t mask ");
205: p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
1.21 peter 206: 0, 0, -1);
1.1 deraadt 207: } else if (rm == 0)
208: return;
209: } else {
1.23 deraadt 210: snprintf(nbuf, sizeof nbuf, "(%d)", rnode.rn_b);
1.14 millert 211: printf("%6.6s %16p : %16p", nbuf, rnode.rn_l,
212: rnode.rn_r);
1.1 deraadt 213: }
1.49 deraadt 214:
215: putchar(' ');
216: p_rtflags(rnode.rn_flags);
217:
1.1 deraadt 218: while (rm) {
219: kget(rm, rmask);
1.23 deraadt 220: snprintf(nbuf, sizeof nbuf, " %d refs, ", rmask.rm_refs);
1.14 millert 221: printf(" mk = %16p {(%d),%s",
1.46 deraadt 222: rm, -1 - rmask.rm_b, rmask.rm_refs ? nbuf : " ");
1.49 deraadt 223: p_rtflags(rmask.rm_flags);
224: printf(", ");
225: if (rmask.rm_flags & RNF_NORMAL) {
226: struct radix_node rnode_aux;
227:
228: printf("leaf = %p ", rmask.rm_leaf);
229: kget(rmask.rm_leaf, rnode_aux);
230: p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
231: 0, 0, -1);
232: } else
233: p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
234: 0, 0, -1);
1.1 deraadt 235: putchar('}');
1.13 millert 236: if ((rm = rmask.rm_mklist))
1.1 deraadt 237: printf(" ->");
238: }
239: putchar('\n');
240: }
241:
242: static void
1.72 ! claudio 243: p_krtentry(struct rtentry *rt)
1.1 deraadt 244: {
245: static struct ifnet ifnet, *lastif;
1.30 itojun 246: struct sockaddr_storage sock1, sock2;
247: struct sockaddr *sa = (struct sockaddr *)&sock1;
248: struct sockaddr *mask = (struct sockaddr *)&sock2;
1.46 deraadt 249:
1.21 peter 250: bcopy(kgetsa(rt_key(rt)), sa, sizeof(struct sockaddr));
1.30 itojun 251: if (sa->sa_len > sizeof(struct sockaddr))
252: bcopy(kgetsa(rt_key(rt)), sa, sa->sa_len);
1.21 peter 253:
1.26 angelos 254: if (sa->sa_family == PF_KEY) {
1.10 deraadt 255: encap_print(rt);
256: return;
1.9 angelos 257: }
1.21 peter 258:
1.30 itojun 259: if (rt_mask(rt)) {
1.21 peter 260: bcopy(kgetsa(rt_mask(rt)), mask, sizeof(struct sockaddr));
1.30 itojun 261: if (sa->sa_len > sizeof(struct sockaddr))
262: bcopy(kgetsa(rt_mask(rt)), mask, sa->sa_len);
263: } else
1.21 peter 264: mask = 0;
1.46 deraadt 265:
1.72 ! claudio 266: p_addr(sa, mask, rt->rt_flags);
! 267: p_gwaddr(kgetsa(rt->rt_gateway), sa->sa_family);
1.1 deraadt 268: p_flags(rt->rt_flags, "%-6.6s ");
1.13 millert 269: printf("%6d %8ld ", rt->rt_refcnt, rt->rt_use);
1.1 deraadt 270: if (rt->rt_rmx.rmx_mtu)
1.13 millert 271: printf("%6ld ", rt->rt_rmx.rmx_mtu);
1.1 deraadt 272: else
273: printf("%6s ", "-");
1.39 provos 274: putchar((rt->rt_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
1.72 ! claudio 275:
1.1 deraadt 276: if (rt->rt_ifp) {
277: if (rt->rt_ifp != lastif) {
278: kget(rt->rt_ifp, ifnet);
279: lastif = rt->rt_ifp;
280: }
1.2 deraadt 281: printf(" %.16s%s", ifnet.if_xname,
1.50 deraadt 282: rt->rt_nodes[0].rn_dupedkey ? " =>" : "");
1.1 deraadt 283: }
284: putchar('\n');
1.63 claudio 285: if (vflag)
286: printf("\texpire %10lu%c\n",
1.46 deraadt 287: rt->rt_rmx.rmx_expire,
1.63 claudio 288: (rt->rt_rmx.rmx_locks & RTV_EXPIRE) ? 'L' : ' ');
1.1 deraadt 289: }
290:
291: /*
292: * Print routing statistics
293: */
294: void
1.72 ! claudio 295: rt_stats(int usesysctl, u_long off)
1.1 deraadt 296: {
297: struct rtstat rtstat;
1.72 ! claudio 298: int mib[6];
! 299: size_t size;
! 300:
! 301: if (usesysctl) {
! 302: mib[0] = CTL_NET;
! 303: mib[1] = PF_ROUTE;
! 304: mib[2] = 0;
! 305: mib[3] = 0;
! 306: mib[4] = NET_RT_STATS;
! 307: mib[5] = 0;
! 308: size = sizeof (rtstat);
! 309:
! 310: if (sysctl(mib, 6, &rtstat, &size, NULL, 0) < 0) {
! 311: perror("sysctl of routing table statistics");
! 312: exit(1);
! 313: }
! 314: } else if (off == 0) {
1.1 deraadt 315: printf("rtstat: symbol not in namelist\n");
316: return;
1.72 ! claudio 317: } else
! 318: kread(off, &rtstat, sizeof (rtstat));
! 319:
1.1 deraadt 320: printf("routing:\n");
321: printf("\t%u bad routing redirect%s\n",
1.46 deraadt 322: rtstat.rts_badredirect, plural(rtstat.rts_badredirect));
1.1 deraadt 323: printf("\t%u dynamically created route%s\n",
1.46 deraadt 324: rtstat.rts_dynamic, plural(rtstat.rts_dynamic));
1.1 deraadt 325: printf("\t%u new gateway%s due to redirects\n",
1.46 deraadt 326: rtstat.rts_newgateway, plural(rtstat.rts_newgateway));
1.1 deraadt 327: printf("\t%u destination%s found unreachable\n",
1.46 deraadt 328: rtstat.rts_unreach, plural(rtstat.rts_unreach));
1.1 deraadt 329: printf("\t%u use%s of a wildcard route\n",
1.46 deraadt 330: rtstat.rts_wildcard, plural(rtstat.rts_wildcard));
1.5 mickey 331: }
332:
1.9 angelos 333: static void
1.50 deraadt 334: encap_print(struct rtentry *rt)
1.9 angelos 335: {
1.10 deraadt 336: struct sockaddr_encap sen1, sen2, sen3;
1.44 mickey 337: struct ipsec_policy ipo;
1.38 angelos 338:
1.31 angelos 339: #ifdef INET6
340: struct sockaddr_in6 s61, s62;
341: #endif /* INET6 */
1.9 angelos 342:
343: bcopy(kgetsa(rt_key(rt)), &sen1, sizeof(sen1));
344: bcopy(kgetsa(rt_mask(rt)), &sen2, sizeof(sen2));
345: bcopy(kgetsa(rt->rt_gateway), &sen3, sizeof(sen3));
346:
1.46 deraadt 347: if (sen1.sen_type == SENT_IP4) {
1.72 ! claudio 348: printf("%-18s %-5u ", netname4(sen1.sen_ip_src.s_addr,
1.46 deraadt 349: sen2.sen_ip_src.s_addr), ntohs(sen1.sen_sport));
1.72 ! claudio 350: printf("%-18s %-5u %-5u ", netname4(sen1.sen_ip_dst.s_addr,
1.46 deraadt 351: sen2.sen_ip_dst.s_addr),
352: ntohs(sen1.sen_dport), sen1.sen_proto);
1.31 angelos 353: }
354:
355: #ifdef INET6
1.46 deraadt 356: if (sen1.sen_type == SENT_IP6) {
357: bzero(&s61, sizeof(s61));
358: bzero(&s62, sizeof(s62));
359: s61.sin6_family = s62.sin6_family = AF_INET6;
360: s61.sin6_len = s62.sin6_len = sizeof(s61);
361: bcopy(&sen1.sen_ip6_src, &s61.sin6_addr, sizeof(struct in6_addr));
1.57 itojun 362: #ifdef __KAME__
363: if (IN6_IS_ADDR_LINKLOCAL(&s61.sin6_addr) ||
364: IN6_IS_ADDR_MC_LINKLOCAL(&s61.sin6_addr)) {
365: s61.sin6_scope_id =
366: ((u_int16_t)s61.sin6_addr.s6_addr[2] << 8) |
367: s61.sin6_addr.s6_addr[3];
368: s61.sin6_addr.s6_addr[2] = s61.sin6_addr.s6_addr[3] = 0;
369: }
370: #endif
1.46 deraadt 371: bcopy(&sen2.sen_ip6_src, &s62.sin6_addr, sizeof(struct in6_addr));
1.57 itojun 372: #ifdef __KAME__
373: if (IN6_IS_ADDR_LINKLOCAL(&s62.sin6_addr) ||
374: IN6_IS_ADDR_MC_LINKLOCAL(&s62.sin6_addr)) {
375: s62.sin6_scope_id =
376: ((u_int16_t)s62.sin6_addr.s6_addr[2] << 8) |
377: s62.sin6_addr.s6_addr[3];
378: s62.sin6_addr.s6_addr[2] = s62.sin6_addr.s6_addr[3] = 0;
379: }
380: #endif
1.46 deraadt 381:
1.72 ! claudio 382: printf("%-42s %-5u ", netname6(&s61, &s62),
1.46 deraadt 383: ntohs(sen1.sen_ip6_sport));
384:
385: bzero(&s61, sizeof(s61));
386: bzero(&s62, sizeof(s62));
387: s61.sin6_family = s62.sin6_family = AF_INET6;
388: s61.sin6_len = s62.sin6_len = sizeof(s61);
389: bcopy(&sen1.sen_ip6_dst, &s61.sin6_addr, sizeof(struct in6_addr));
1.57 itojun 390: #ifdef __KAME__
391: if (IN6_IS_ADDR_LINKLOCAL(&s61.sin6_addr) ||
392: IN6_IS_ADDR_MC_LINKLOCAL(&s61.sin6_addr)) {
393: s61.sin6_scope_id =
394: ((u_int16_t)s61.sin6_addr.s6_addr[2] << 8) |
395: s61.sin6_addr.s6_addr[3];
396: s61.sin6_addr.s6_addr[2] = s61.sin6_addr.s6_addr[3] = 0;
397: }
398: #endif
1.46 deraadt 399: bcopy(&sen2.sen_ip6_dst, &s62.sin6_addr, sizeof(struct in6_addr));
1.57 itojun 400: #ifdef __KAME__
401: if (IN6_IS_ADDR_LINKLOCAL(&s62.sin6_addr) ||
402: IN6_IS_ADDR_MC_LINKLOCAL(&s62.sin6_addr)) {
403: s62.sin6_scope_id =
404: ((u_int16_t)s62.sin6_addr.s6_addr[2] << 8) |
405: s62.sin6_addr.s6_addr[3];
406: s62.sin6_addr.s6_addr[2] = s62.sin6_addr.s6_addr[3] = 0;
407: }
408: #endif
1.31 angelos 409:
1.72 ! claudio 410: printf("%-42s %-5u %-5u ", netname6(&s61, &s62),
1.46 deraadt 411: ntohs(sen1.sen_ip6_dport), sen1.sen_ip6_proto);
1.31 angelos 412: }
413: #endif /* INET6 */
414:
1.46 deraadt 415: if (sen3.sen_type == SENT_IPSP) {
416: char hostn[NI_MAXHOST];
1.31 angelos 417:
1.46 deraadt 418: kget(sen3.sen_ipsp, ipo);
1.38 angelos 419:
1.48 ho 420: if (getnameinfo(&ipo.ipo_dst.sa, ipo.ipo_dst.sa.sa_len,
421: hostn, NI_MAXHOST, NULL, 0, NI_NUMERICHOST) != 0)
422: strlcpy (hostn, "none", NI_MAXHOST);
423:
1.46 deraadt 424: printf("%s", hostn);
425: printf("/%-u", ipo.ipo_sproto);
1.44 mickey 426:
1.46 deraadt 427: switch (ipo.ipo_type) {
1.44 mickey 428: case IPSP_IPSEC_REQUIRE:
1.46 deraadt 429: printf("/require");
430: break;
1.44 mickey 431: case IPSP_IPSEC_ACQUIRE:
1.46 deraadt 432: printf("/acquire");
433: break;
1.44 mickey 434: case IPSP_IPSEC_USE:
1.46 deraadt 435: printf("/use");
436: break;
1.44 mickey 437: case IPSP_IPSEC_DONTACQ:
1.46 deraadt 438: printf("/dontacq");
439: break;
1.44 mickey 440: case IPSP_PERMIT:
1.71 hshoexer 441: printf("/bypass");
1.46 deraadt 442: break;
1.44 mickey 443: case IPSP_DENY:
1.46 deraadt 444: printf("/deny");
445: break;
1.44 mickey 446: default:
1.46 deraadt 447: printf("/<unknown type!>");
448: break;
449: }
1.44 mickey 450:
1.46 deraadt 451: if ((ipo.ipo_addr.sen_type == SENT_IP4 &&
452: ipo.ipo_addr.sen_direction == IPSP_DIRECTION_IN) ||
453: (ipo.ipo_addr.sen_type == SENT_IP6 &&
454: ipo.ipo_addr.sen_ip6_direction == IPSP_DIRECTION_IN))
455: printf("/in\n");
456: else if ((ipo.ipo_addr.sen_type == SENT_IP4 &&
457: ipo.ipo_addr.sen_direction == IPSP_DIRECTION_OUT) ||
458: (ipo.ipo_addr.sen_type == SENT_IP6 &&
459: ipo.ipo_addr.sen_ip6_direction == IPSP_DIRECTION_OUT))
460: printf("/out\n");
461: else
462: printf("/<unknown>\n");
1.1 deraadt 463: }
464: }