xref: /dragonfly/usr.bin/netstat/route.c (revision 783d47c4)
1 /*
2  * Copyright (c) 1983, 1988, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  *
33  * @(#)route.c	8.6 (Berkeley) 4/28/95
34  * $FreeBSD: src/usr.bin/netstat/route.c,v 1.41.2.14 2002/07/17 02:22:22 kbyanc Exp $
35  */
36 
37 #include <sys/kinfo.h>
38 #include <sys/param.h>
39 #include <sys/socket.h>
40 #include <sys/time.h>
41 
42 #include <net/ethernet.h>
43 #include <net/if.h>
44 #include <net/if_var.h>
45 #include <net/if_dl.h>
46 #include <net/if_types.h>
47 #include <net/route.h>
48 
49 #include <netinet/in.h>
50 #include <netipx/ipx.h>
51 #include <netgraph/socket/ng_socket.h>
52 
53 #include <netproto/mpls/mpls.h>
54 
55 #include <sys/sysctl.h>
56 
57 #include <arpa/inet.h>
58 #include <libutil.h>
59 #include <netdb.h>
60 #include <stdio.h>
61 #include <stdlib.h>
62 #include <string.h>
63 #include <unistd.h>
64 #include <err.h>
65 #include <time.h>
66 #include <kinfo.h>
67 #include "netstat.h"
68 
69 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
70 
71 
72 /* alignment constraint for routing socket */
73 #define ROUNDUP(a) \
74        ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
75 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
76 
77 /*
78  * Definitions for showing gateway flags.
79  */
80 struct bits {
81 	u_long	b_mask;
82 	char	b_val;
83 } bits[] = {
84 	{ RTF_UP,	'U' },
85 	{ RTF_GATEWAY,	'G' },
86 	{ RTF_HOST,	'H' },
87 	{ RTF_REJECT,	'R' },
88 	{ RTF_DYNAMIC,	'D' },
89 	{ RTF_MODIFIED,	'M' },
90 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
91 	{ RTF_CLONING,	'C' },
92 	{ RTF_XRESOLVE,	'X' },
93 	{ RTF_LLINFO,	'L' },
94 	{ RTF_STATIC,	'S' },
95 	{ RTF_PROTO1,	'1' },
96 	{ RTF_PROTO2,	'2' },
97 	{ RTF_WASCLONED,'W' },
98 	{ RTF_PRCLONING,'c' },
99 	{ RTF_PROTO3,	'3' },
100 	{ RTF_BLACKHOLE,'B' },
101 	{ RTF_BROADCAST,'b' },
102 	{ RTF_MPLSOPS,	'm' },
103 	{ 0, 0 }
104 };
105 
106 typedef union {
107 	long	dummy;		/* Helps align structure. */
108 	struct	sockaddr u_sa;
109 	u_short	u_data[128];
110 } sa_u;
111 
112 static sa_u pt_u;
113 
114 int	do_rtent = 0;
115 struct	rtentry rtentry;
116 struct	radix_node rnode;
117 struct	radix_mask rmask;
118 struct	radix_node_head *rt_tables[AF_MAX+1];
119 
120 int	NewTree = 0;
121 
122 static struct sockaddr *kgetsa (struct sockaddr *);
123 static void size_cols (int ef, struct radix_node *rn);
124 static void size_cols_tree (struct radix_node *rn);
125 static void size_cols_rtentry (struct rtentry *rt);
126 static void p_tree (struct radix_node *);
127 static void p_rtnode (void);
128 static void ntreestuff (void);
129 static void np_rtentry (struct rt_msghdr *);
130 static void p_sockaddr (struct sockaddr *, struct sockaddr *, int, int);
131 static const char *fmt_sockaddr (struct sockaddr *sa, struct sockaddr *mask,
132 				 int flags);
133 static void p_flags (int, const char *);
134 static const char *fmt_flags(int f);
135 static void p_rtentry (struct rtentry *);
136 static u_long forgemask (u_long);
137 static void domask (char *, u_long, u_long);
138 static const char *labelops(struct rtentry *);
139 
140 /*
141  * Print routing tables.
142  */
143 void
144 routepr(u_long rtree)
145 {
146 	struct radix_node_head *rnh, head;
147 	int i;
148 
149 	printf("Routing tables\n");
150 
151 	if (Aflag == 0 && NewTree) {
152 		ntreestuff();
153 	} else {
154 		if (rtree == 0) {
155 			printf("rt_tables: symbol not in namelist\n");
156 			return;
157 		}
158 		if (cpuflag >= 0) {
159 			/*
160 			 * Severe hack.
161 			 */
162 			rtree += cpuflag * (AF_MAX + 1) * sizeof(void *);
163 		}
164 		kget(rtree, rt_tables);
165 		for (i = 0; i <= AF_MAX; i++) {
166 			if ((rnh = rt_tables[i]) == NULL)
167 				continue;
168 			kget(rnh, head);
169 			if (i == AF_UNSPEC) {
170 				if (Aflag && af == 0) {
171 					printf("Netmasks:\n");
172 					p_tree(head.rnh_treetop);
173 				}
174 			} else if (af == AF_UNSPEC || af == i) {
175 				size_cols(i, head.rnh_treetop);
176 				pr_family(i);
177 				do_rtent = 1;
178 				pr_rthdr(i);
179 				p_tree(head.rnh_treetop);
180 			}
181 		}
182 	}
183 }
184 
185 /*
186  * Print address family header before a section of the routing table.
187  */
188 void
189 pr_family(int af1)
190 {
191 	const char *afname;
192 
193 	switch (af1) {
194 	case AF_INET:
195 		afname = "Internet";
196 		break;
197 #ifdef INET6
198 	case AF_INET6:
199 		afname = "Internet6";
200 		break;
201 #endif /*INET6*/
202 	case AF_IPX:
203 		afname = "IPX";
204 		break;
205 	case AF_ISO:
206 		afname = "ISO";
207 		break;
208 	case AF_CCITT:
209 		afname = "X.25";
210 		break;
211 	case AF_NETGRAPH:
212 		afname = "Netgraph";
213 		break;
214 	case AF_MPLS:
215 		afname = "MPLS";
216 		break;
217 	default:
218 		afname = NULL;
219 		break;
220 	}
221 	if (afname)
222 		printf("\n%s:\n", afname);
223 	else
224 		printf("\nProtocol Family %d:\n", af1);
225 }
226 
227 /* column widths; each followed by one space */
228 #ifndef INET6
229 #define	WID_DST_DEFAULT(af) 	18	/* width of destination column */
230 #define	WID_GW_DEFAULT(af)	18	/* width of gateway column */
231 #define	WID_IF_DEFAULT(af)	(Wflag ? 8 : 6)	/* width of netif column */
232 #else
233 #define	WID_DST_DEFAULT(af) \
234 	((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18)
235 #define	WID_GW_DEFAULT(af) \
236 	((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18)
237 #define	WID_IF_DEFAULT(af)	((af) == AF_INET6 ? 8 : (Wflag ? 8 :6))
238 #endif /*INET6*/
239 
240 static int wid_dst;
241 static int wid_gw;
242 static int wid_flags;
243 static int wid_refs;
244 static int wid_use;
245 static int wid_mtu;
246 static int wid_if;
247 static int wid_expire;
248 static int wid_mplslops;
249 static int wid_msl;
250 static int wid_iwmax;
251 static int wid_iw;
252 
253 static void
254 size_cols(int ef, struct radix_node *rn)
255 {
256 	wid_dst = WID_DST_DEFAULT(ef);
257 	wid_gw = WID_GW_DEFAULT(ef);
258 	wid_flags = 6;
259 	wid_refs = 6;
260 	wid_use = 8;
261 	wid_mtu = 6;
262 	wid_if = WID_IF_DEFAULT(ef);
263 	wid_expire = 6;
264 	wid_mplslops = 7;
265 	wid_msl = 7;
266 	wid_iwmax = 5;
267 	wid_iw = 2;
268 
269 	if (Wflag)
270 		size_cols_tree(rn);
271 }
272 
273 static void
274 size_cols_tree(struct radix_node *rn)
275 {
276 again:
277 	kget(rn, rnode);
278 	if (rnode.rn_bit < 0) {
279 		if ((rnode.rn_flags & RNF_ROOT) == 0) {
280 			kget(rn, rtentry);
281 			size_cols_rtentry(&rtentry);
282 		}
283 		if ((rn = rnode.rn_dupedkey))
284 			goto again;
285 	} else {
286 		rn = rnode.rn_right;
287 		size_cols_tree(rnode.rn_left);
288 		size_cols_tree(rn);
289 	}
290 }
291 
292 static void
293 size_cols_rtentry(struct rtentry *rt)
294 {
295 	static struct ifnet ifnet, *lastif;
296 	struct rtentry parent;
297 	static char buffer[100];
298 	const char *bp;
299 	struct sockaddr *sa;
300 	sa_u addr, mask;
301 	int len;
302 
303 	/*
304 	 * Don't print protocol-cloned routes unless -a.
305 	 */
306 	if (rt->rt_flags & RTF_WASCLONED && !aflag) {
307 		kget(rt->rt_parent, parent);
308 		if (parent.rt_flags & RTF_PRCLONING)
309 			return;
310 	}
311 
312 	bzero(&addr, sizeof(addr));
313 	if ((sa = kgetsa(rt_key(rt))))
314 		bcopy(sa, &addr, sa->sa_len);
315 	bzero(&mask, sizeof(mask));
316 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
317 		bcopy(sa, &mask, sa->sa_len);
318 	bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags);
319 	len = strlen(bp);
320 	wid_dst = MAX(len, wid_dst);
321 
322 	bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST);
323 	len = strlen(bp);
324 	wid_gw = MAX(len, wid_gw);
325 
326 	bp = fmt_flags(rt->rt_flags);
327 	len = strlen(bp);
328 	wid_flags = MAX(len, wid_flags);
329 
330 	if (addr.u_sa.sa_family == AF_INET || Wflag) {
331 		len = snprintf(buffer, sizeof(buffer), "%ld", rt->rt_refcnt);
332 		wid_refs = MAX(len, wid_refs);
333 		len = snprintf(buffer, sizeof(buffer), "%lu", rt->rt_use);
334 		wid_use = MAX(len, wid_use);
335 		if (Wflag && rt->rt_rmx.rmx_mtu != 0) {
336 			len = snprintf(buffer, sizeof(buffer),
337 				       "%lu", rt->rt_rmx.rmx_mtu);
338 			wid_mtu = MAX(len, wid_mtu);
339 		}
340 	}
341 	if (rt->rt_ifp) {
342 		if (rt->rt_ifp != lastif) {
343 			kget(rt->rt_ifp, ifnet);
344 			lastif = rt->rt_ifp;
345 			len = strlen(ifnet.if_xname);
346 			wid_if = MAX(len, wid_if);
347 		}
348 		if (rt->rt_rmx.rmx_expire) {
349 			time_t expire_time;
350 
351 			if ((expire_time =
352 			    rt->rt_rmx.rmx_expire - time(NULL)) > 0) {
353 				snprintf(buffer, sizeof(buffer), "%d",
354 					 (int)expire_time);
355 				wid_expire = MAX(len, wid_expire);
356 			}
357 		}
358 	}
359 	if (Wflag) {
360 		if (rt->rt_shim[0] != NULL) {
361 			len = strlen(labelops(rt));
362 			wid_mplslops = MAX(len, wid_mplslops);
363 		}
364 
365 		if (rt->rt_rmx.rmx_msl) {
366 			len = snprintf(buffer, sizeof(buffer),
367 				       "%lu", rt->rt_rmx.rmx_msl);
368 			wid_msl = MAX(len, wid_msl);
369 		}
370 		if (rt->rt_rmx.rmx_iwmaxsegs) {
371 			len = snprintf(buffer, sizeof(buffer),
372 				       "%lu", rt->rt_rmx.rmx_iwmaxsegs);
373 			wid_iwmax = MAX(len, wid_iwmax);
374 		}
375 		if (rt->rt_rmx.rmx_iwcapsegs) {
376 			len = snprintf(buffer, sizeof(buffer),
377 				       "%lu", rt->rt_rmx.rmx_iwcapsegs);
378 			wid_iw = MAX(len, wid_iw);
379 		}
380 	}
381 }
382 
383 
384 /*
385  * Print header for routing table columns.
386  */
387 void
388 pr_rthdr(int af1)
389 {
390 
391 	if (Aflag)
392 		printf("%-8.8s ","Address");
393 	if (af1 == AF_INET || Wflag) {
394 		if (Wflag) {
395 			printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*.*s "
396 			       "%*s %-*s%*s %*s %*s\n",
397 				wid_dst,	wid_dst,	"Destination",
398 				wid_gw,		wid_gw,		"Gateway",
399 				wid_flags,	wid_flags,	"Flags",
400 				wid_refs,	wid_refs,	"Refs",
401 				wid_use,	wid_use,	"Use",
402 				wid_mtu,	wid_mtu,	"Mtu",
403 				wid_if,		wid_if,		"Netif",
404 				wid_expire,			"Expire",
405 				wid_mplslops,			"Labelops",
406 				wid_msl,			"Msl",
407 				wid_iwmax,			"IWmax",
408 				wid_iw,				"IW");
409 		} else {
410 			printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*s\n",
411 				wid_dst,	wid_dst,	"Destination",
412 				wid_gw,		wid_gw,		"Gateway",
413 				wid_flags,	wid_flags,	"Flags",
414 				wid_refs,	wid_refs,	"Refs",
415 				wid_use,	wid_use,	"Use",
416 				wid_if,		wid_if,		"Netif",
417 				wid_expire,			"Expire");
418 		}
419 	} else {
420 		printf("%-*.*s %-*.*s %-*.*s  %*.*s %*s\n",
421 			wid_dst,	wid_dst,	"Destination",
422 			wid_gw,		wid_gw,		"Gateway",
423 			wid_flags,	wid_flags,	"Flags",
424 			wid_if,		wid_if,		"Netif",
425 			wid_expire,			"Expire");
426 	}
427 }
428 
429 static struct sockaddr *
430 kgetsa(struct sockaddr *dst)
431 {
432 
433 	kget(dst, pt_u.u_sa);
434 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
435 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
436 	return (&pt_u.u_sa);
437 }
438 
439 static void
440 p_tree(struct radix_node *rn)
441 {
442 
443 again:
444 	kget(rn, rnode);
445 	if (rnode.rn_bit < 0) {
446 		if (Aflag)
447 			printf("%-8.8lx ", (u_long)rn);
448 		if (rnode.rn_flags & RNF_ROOT) {
449 			if (Aflag)
450 				printf("(root node)%s",
451 				    rnode.rn_dupedkey ? " =>\n" : "\n");
452 		} else if (do_rtent) {
453 			kget(rn, rtentry);
454 			p_rtentry(&rtentry);
455 			if (Aflag)
456 				p_rtnode();
457 		} else {
458 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
459 				   NULL, 0, 44);
460 			putchar('\n');
461 		}
462 		if ((rn = rnode.rn_dupedkey))
463 			goto again;
464 	} else {
465 		if (Aflag && do_rtent) {
466 			printf("%-8.8lx ", (u_long)rn);
467 			p_rtnode();
468 		}
469 		rn = rnode.rn_right;
470 		p_tree(rnode.rn_left);
471 		p_tree(rn);
472 	}
473 }
474 
475 char	nbuf[20];
476 
477 static void
478 p_rtnode(void)
479 {
480 	struct radix_mask *rm = rnode.rn_mklist;
481 
482 	if (rnode.rn_bit < 0) {
483 		if (rnode.rn_mask) {
484 			printf("\t  mask ");
485 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
486 				   NULL, 0, -1);
487 		} else if (rm == NULL)
488 			return;
489 	} else {
490 		sprintf(nbuf, "(%d)", rnode.rn_bit);
491 		printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long)rnode.rn_left, (u_long)rnode.rn_right);
492 	}
493 	while (rm) {
494 		kget(rm, rmask);
495 		sprintf(nbuf, " %d refs, ", rmask.rm_refs);
496 		printf(" mk = %8.8lx {(%d),%s",
497 			(u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " ");
498 		if (rmask.rm_flags & RNF_NORMAL) {
499 			struct radix_node rnode_aux;
500 			printf(" <normal>, ");
501 			kget(rmask.rm_leaf, rnode_aux);
502 			p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
503 				    NULL, 0, -1);
504 		} else
505 		    p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
506 				NULL, 0, -1);
507 		putchar('}');
508 		if ((rm = rmask.rm_next))
509 			printf(" ->");
510 	}
511 	putchar('\n');
512 }
513 
514 static void
515 ntreestuff(void)
516 {
517 	size_t needed;
518 	int mib[7];
519 	int miblen;
520 	char *buf, *next, *lim;
521 	struct rt_msghdr *rtm;
522 
523 	mib[0] = CTL_NET;
524 	mib[1] = PF_ROUTE;
525 	mib[2] = 0;
526 	mib[3] = 0;
527 	mib[4] = NET_RT_DUMP;
528 	mib[5] = 0;
529 	if (cpuflag >= 0) {
530 		mib[6] = cpuflag;
531 		miblen = 7;
532 	} else {
533 		miblen = 6;
534 	}
535 	if (sysctl(mib, miblen, NULL, &needed, NULL, 0) < 0) {
536 		err(1, "sysctl: net.route.0.0.dump estimate");
537 	}
538 
539 	if ((buf = malloc(needed)) == NULL) {
540 		err(2, "malloc(%lu)", (unsigned long)needed);
541 	}
542 	if (sysctl(mib, miblen, buf, &needed, NULL, 0) < 0) {
543 		err(1, "sysctl: net.route.0.0.dump");
544 	}
545 	lim  = buf + needed;
546 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
547 		rtm = (struct rt_msghdr *)next;
548 		np_rtentry(rtm);
549 	}
550 }
551 
552 static void
553 np_rtentry(struct rt_msghdr *rtm)
554 {
555 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
556 #ifdef notdef
557 	static int masks_done, banner_printed;
558 #endif
559 	static int old_af;
560 	int af1 = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
561 
562 #ifdef notdef
563 	/* for the moment, netmasks are skipped over */
564 	if (!banner_printed) {
565 		printf("Netmasks:\n");
566 		banner_printed = 1;
567 	}
568 	if (masks_done == 0) {
569 		if (rtm->rtm_addrs != RTA_DST ) {
570 			masks_done = 1;
571 			af1 = sa->sa_family;
572 		}
573 	} else
574 #endif
575 		af1 = sa->sa_family;
576 	if (af1 != old_af) {
577 		pr_family(af1);
578 		old_af = af1;
579 	}
580 	if (rtm->rtm_addrs == RTA_DST)
581 		p_sockaddr(sa, NULL, 0, 36);
582 	else {
583 		p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
584 		sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa);
585 		p_sockaddr(sa, NULL, 0, 18);
586 	}
587 	p_flags(rtm->rtm_flags & interesting, "%-6.6s ");
588 	putchar('\n');
589 }
590 
591 static void
592 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
593 {
594 	const char *cp;
595 
596 	cp = fmt_sockaddr(sa, mask, flags);
597 
598 	if (width < 0 )
599 		printf("%s ", cp);
600 	else {
601 		if (numeric_addr)
602 			printf("%-*s ", width, cp);
603 		else
604 			printf("%-*.*s ", width, width, cp);
605 	}
606 }
607 
608 static const char *
609 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags)
610 {
611 	static char workbuf[128];
612 	const char *cp = workbuf;
613 
614 	switch(sa->sa_family) {
615 	case AF_INET:
616 	    {
617 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
618 
619 		if ((sin->sin_addr.s_addr == INADDR_ANY) &&
620 			mask &&
621 			ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr)
622 				==0L)
623 				cp = "default" ;
624 		else if (flags & RTF_HOST)
625 			cp = routename(sin->sin_addr.s_addr);
626 		else if (mask)
627 			cp = netname(sin->sin_addr.s_addr,
628 				     ntohl(((struct sockaddr_in *)mask)
629 					   ->sin_addr.s_addr));
630 		else
631 			cp = netname(sin->sin_addr.s_addr, 0L);
632 		break;
633 	    }
634 
635 #ifdef INET6
636 	case AF_INET6:
637 	    {
638 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
639 		struct in6_addr *in6 = &sa6->sin6_addr;
640 
641 		/*
642 		 * XXX: This is a special workaround for KAME kernels.
643 		 * sin6_scope_id field of SA should be set in the future.
644 		 */
645 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
646 		    IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
647 		    /* XXX: override is ok? */
648 		    sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
649 		    *(u_short *)&in6->s6_addr[2] = 0;
650 		}
651 
652 		if (flags & RTF_HOST)
653 		    cp = routename6(sa6);
654 		else if (mask)
655 		    cp = netname6(sa6,
656 				  &((struct sockaddr_in6 *)mask)->sin6_addr);
657 		else {
658 		    cp = netname6(sa6, NULL);
659 		}
660 		break;
661 	    }
662 #endif /*INET6*/
663 
664 	case AF_IPX:
665 	    {
666 		struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr;
667 		if (ipx_nullnet(satoipx_addr(work)))
668 			cp = "default";
669 		else
670 			cp = ipx_print(sa);
671 		break;
672 	    }
673 	case AF_NETGRAPH:
674 	    {
675 		printf("%s", ((struct sockaddr_ng *)sa)->sg_data);
676 		break;
677 	    }
678 	case AF_LINK:
679 	    {
680 		struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
681 
682 		if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
683 		    sdl->sdl_slen == 0)
684 			(void) sprintf(workbuf, "link#%d", sdl->sdl_index);
685 		else
686 			switch (sdl->sdl_type) {
687 
688 			case IFT_ETHER:
689 			case IFT_L2VLAN:
690 			case IFT_CARP:
691 				if (sdl->sdl_alen == ETHER_ADDR_LEN) {
692 					cp = ether_ntoa((struct ether_addr *)
693 					    (sdl->sdl_data + sdl->sdl_nlen));
694 					break;
695 				}
696 				/* FALLTHROUGH */
697 			default:
698 				cp = link_ntoa(sdl);
699 				break;
700 			}
701 		break;
702 	    }
703 
704 	case AF_MPLS:
705 	    {
706 		struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa;
707 
708 		(void) sprintf(workbuf, "%d", ntohl(smpls->smpls_label));
709 		break;
710 	    }
711 
712 	default:
713 	    {
714 		u_char *s = (u_char *)sa->sa_data, *slim;
715 		char *cq, *cqlim;
716 
717 		cq = workbuf;
718 		slim =  sa->sa_len + (u_char *) sa;
719 		cqlim = cq + sizeof(workbuf) - 6;
720 		cq += sprintf(cq, "(%d)", sa->sa_family);
721 		while (s < slim && cq < cqlim) {
722 			cq += sprintf(cq, " %02x", *s++);
723 			if (s < slim)
724 			    cq += sprintf(cq, "%02x", *s++);
725 		}
726 		cp = workbuf;
727 	    }
728 	}
729 
730 	return (cp);
731 }
732 
733 static void
734 p_flags(int f, const char *format)
735 {
736 	printf(format, fmt_flags(f));
737 }
738 
739 static const char *
740 fmt_flags(int f)
741 {
742 	static char name[33];
743 	char *flags;
744 	struct bits *p = bits;
745 
746 	for (flags = name; p->b_mask; p++)
747 		if (p->b_mask & f)
748 			*flags++ = p->b_val;
749 	*flags = '\0';
750 	return (name);
751 }
752 
753 static void
754 p_rtentry(struct rtentry *rt)
755 {
756 	static struct ifnet ifnet, *lastif;
757 	struct rtentry parent;
758 	static char buffer[128];
759 	static char prettyname[128];
760 	struct sockaddr *sa;
761 	sa_u addr, mask;
762 
763 	/*
764 	 * Don't print protocol-cloned routes unless -a.
765 	 */
766 	if (rt->rt_flags & RTF_WASCLONED && !aflag) {
767 		kget(rt->rt_parent, parent);
768 		if (parent.rt_flags & RTF_PRCLONING)
769 			return;
770 	}
771 
772 	bzero(&addr, sizeof(addr));
773 	if ((sa = kgetsa(rt_key(rt))))
774 		bcopy(sa, &addr, sa->sa_len);
775 	bzero(&mask, sizeof(mask));
776 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
777 		bcopy(sa, &mask, sa->sa_len);
778 	p_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags, wid_dst);
779 	p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw);
780 	snprintf(buffer, sizeof(buffer), "%%-%d.%ds ", wid_flags, wid_flags);
781 	p_flags(rt->rt_flags, buffer);
782 	if (addr.u_sa.sa_family == AF_INET || Wflag) {
783 		printf("%*ld %*lu ", wid_refs, rt->rt_refcnt,
784 				     wid_use, rt->rt_use);
785 		if (Wflag) {
786 			if (rt->rt_rmx.rmx_mtu != 0)
787 				printf("%*lu ", wid_mtu, rt->rt_rmx.rmx_mtu);
788 			else
789 				printf("%*s ", wid_mtu, "");
790 		}
791 	}
792 	if (rt->rt_ifp) {
793 		if (rt->rt_ifp != lastif) {
794 			kget(rt->rt_ifp, ifnet);
795 			lastif = rt->rt_ifp;
796 			strlcpy(prettyname, ifnet.if_xname, sizeof(prettyname));
797 		}
798 		printf("%*.*s", wid_if, wid_if, prettyname);
799 		if (rt->rt_rmx.rmx_expire) {
800 			time_t expire_time;
801 
802 			if ((expire_time =
803 			    rt->rt_rmx.rmx_expire - time(NULL)) > 0)
804 				printf(" %*d", wid_expire, (int)expire_time);
805 			else
806 				printf("%*s ", wid_expire, "");
807 		} else {
808 			printf("%*s ", wid_expire, "");
809 		}
810 		if (rt->rt_nodes[0].rn_dupedkey)
811 			printf(" =>");
812 	}
813 	if (Wflag) {
814 		if (rt->rt_shim[0] != NULL)
815 			printf(" %-*s", wid_mplslops, labelops(rt));
816 		else
817 			printf(" %-*s", wid_mplslops, "");
818 		if (rt->rt_rmx.rmx_msl != 0)
819 			printf(" %*lu", wid_msl, rt->rt_rmx.rmx_msl);
820 		else
821 			printf("%*s ", wid_msl, "");
822 		if (rt->rt_rmx.rmx_iwmaxsegs != 0)
823 			printf(" %*lu", wid_iwmax, rt->rt_rmx.rmx_iwmaxsegs);
824 		else
825 			printf("%*s ", wid_iwmax, "");
826 		if (rt->rt_rmx.rmx_iwcapsegs != 0)
827 			printf(" %*lu", wid_iw, rt->rt_rmx.rmx_iwcapsegs);
828 		else
829 			printf("%*s ", wid_iw, "");
830 	}
831 	putchar('\n');
832 }
833 
834 char *
835 routename(u_long in)
836 {
837 	char *cp;
838 	static char line[MAXHOSTNAMELEN];
839 	struct hostent *hp;
840 
841 	cp = NULL;
842 	if (!numeric_addr) {
843 		hp = gethostbyaddr(&in, sizeof (struct in_addr), AF_INET);
844 		if (hp) {
845 			cp = hp->h_name;
846 			trimdomain(cp, strlen(cp));
847 		}
848 	}
849 	if (cp) {
850 		strncpy(line, cp, sizeof(line) - 1);
851 		line[sizeof(line) - 1] = '\0';
852 	} else {
853 #define C(x)	((x) & 0xff)
854 		in = ntohl(in);
855 		sprintf(line, "%lu.%lu.%lu.%lu",
856 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
857 	}
858 	return (line);
859 }
860 
861 static u_long
862 forgemask(u_long a)
863 {
864 	u_long m;
865 
866 	if (IN_CLASSA(a))
867 		m = IN_CLASSA_NET;
868 	else if (IN_CLASSB(a))
869 		m = IN_CLASSB_NET;
870 	else
871 		m = IN_CLASSC_NET;
872 	return (m);
873 }
874 
875 static void
876 domask(char *dst, u_long addr, u_long mask)
877 {
878 	int b, i;
879 
880 	if (!mask || (forgemask(addr) == mask)) {
881 		*dst = '\0';
882 		return;
883 	}
884 	i = 0;
885 	for (b = 0; b < 32; b++)
886 		if (mask & (1 << b)) {
887 			int bb;
888 
889 			i = b;
890 			for (bb = b+1; bb < 32; bb++)
891 				if (!(mask & (1 << bb))) {
892 					i = -1;	/* noncontig */
893 					break;
894 				}
895 			break;
896 		}
897 	if (i == -1)
898 		sprintf(dst, "&0x%lx", mask);
899 	else
900 		sprintf(dst, "/%d", 32-i);
901 }
902 
903 /*
904  * Return the name of the network whose address is given.
905  * The address is assumed to be that of a net or subnet, not a host.
906  */
907 char *
908 netname(u_long in, u_long mask)
909 {
910 	char *cp = NULL;
911 	static char line[MAXHOSTNAMELEN];
912 	struct netent *np = NULL;
913 	u_long dmask;
914 	u_long i;
915 
916 #define	NSHIFT(m) (							\
917 	(m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT :			\
918 	(m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT :			\
919 	(m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT :			\
920 	0)
921 
922 	i = ntohl(in);
923 	dmask = forgemask(i);
924 	if (!numeric_addr && i) {
925 		np = getnetbyaddr(i >> NSHIFT(mask), AF_INET);
926 		if (np == NULL && mask == 0)
927 			np = getnetbyaddr(i >> NSHIFT(dmask), AF_INET);
928 		if (np != NULL) {
929 			cp = np->n_name;
930 			trimdomain(cp, strlen(cp));
931 		}
932 	}
933 #undef NSHIFT
934 	if (cp != NULL) {
935 		strncpy(line, cp, sizeof(line) - 1);
936 		line[sizeof(line) - 1] = '\0';
937 	} else {
938 		if (mask <= IN_CLASSA_NET &&
939 			(i & IN_CLASSA_HOST) == 0) {
940 				sprintf(line, "%lu", C(i >> 24));
941 		} else if (mask <= IN_CLASSB_NET &&
942 			(i & IN_CLASSB_HOST) == 0) {
943 				sprintf(line, "%lu.%lu",
944 					C(i >> 24), C(i >> 16));
945 		} else if (mask <= IN_CLASSC_NET &&
946 			(i & IN_CLASSC_HOST) == 0) {
947 				sprintf(line, "%lu.%lu.%lu",
948 					C(i >> 24), C(i >> 16), C(i >> 8));
949 		} else {
950 			sprintf(line, "%lu.%lu.%lu.%lu",
951 				C(i >> 24), C(i >> 16), C(i >> 8), C(i));
952 		}
953 	}
954 	domask(line + strlen(line), i, mask);
955 	return (line);
956 }
957 
958 #ifdef INET6
959 const char *
960 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask)
961 {
962 	static char line[MAXHOSTNAMELEN];
963 	u_char *p = (u_char *)mask;
964 	u_char *lim;
965 	int masklen, illegal = 0, flag = NI_WITHSCOPEID;
966 
967 	if (mask) {
968 		for (masklen = 0, lim = p + 16; p < lim; p++) {
969 			switch (*p) {
970 			 case 0xff:
971 				 masklen += 8;
972 				 break;
973 			 case 0xfe:
974 				 masklen += 7;
975 				 break;
976 			 case 0xfc:
977 				 masklen += 6;
978 				 break;
979 			 case 0xf8:
980 				 masklen += 5;
981 				 break;
982 			 case 0xf0:
983 				 masklen += 4;
984 				 break;
985 			 case 0xe0:
986 				 masklen += 3;
987 				 break;
988 			 case 0xc0:
989 				 masklen += 2;
990 				 break;
991 			 case 0x80:
992 				 masklen += 1;
993 				 break;
994 			 case 0x00:
995 				 break;
996 			 default:
997 				 illegal ++;
998 				 break;
999 			}
1000 		}
1001 		if (illegal)
1002 			fprintf(stderr, "illegal prefixlen\n");
1003 	}
1004 	else
1005 		masklen = 128;
1006 
1007 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
1008 		return("default");
1009 
1010 	if (numeric_addr)
1011 		flag |= NI_NUMERICHOST;
1012 	getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line),
1013 		    NULL, 0, flag);
1014 
1015 	if (numeric_addr)
1016 		sprintf(&line[strlen(line)], "/%d", masklen);
1017 
1018 	return line;
1019 }
1020 
1021 char *
1022 routename6(struct sockaddr_in6 *sa6)
1023 {
1024 	static char line[MAXHOSTNAMELEN];
1025 	int flag = NI_WITHSCOPEID;
1026 	/* use local variable for safety */
1027 	struct sockaddr_in6 sa6_local;
1028 
1029 	sa6_local.sin6_family = AF_INET6;
1030 	sa6_local.sin6_len = sizeof(sa6_local);
1031 	sa6_local.sin6_addr = sa6->sin6_addr;
1032 	sa6_local.sin6_scope_id = sa6->sin6_scope_id;
1033 
1034 	if (numeric_addr)
1035 		flag |= NI_NUMERICHOST;
1036 
1037 	getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
1038 		    line, sizeof(line), NULL, 0, flag);
1039 
1040 	return line;
1041 }
1042 #endif /*INET6*/
1043 
1044 /*
1045  * Print routing statistics
1046  */
1047 void
1048 rt_stats(void)
1049 {
1050 	struct rtstatistics rts;
1051 	int error = 0;
1052 
1053 	error = kinfo_get_net_rtstatistics(&rts);
1054 	if (error) {
1055 		printf("routing: could not retrieve statistics\n");
1056 		return;
1057 	}
1058 	printf("routing:\n");
1059 
1060 #define	p(f, m) if (rts.f || sflag <= 1) \
1061 	printf(m, rts.f, plural(rts.f))
1062 
1063 	p(rts_badredirect, "\t%lu bad routing redirect%s\n");
1064 	p(rts_dynamic, "\t%lu dynamically created route%s\n");
1065 	p(rts_newgateway, "\t%lu new gateway%s due to redirects\n");
1066 	p(rts_unreach, "\t%lu destination%s found unreachable\n");
1067 	p(rts_wildcard, "\t%lu use%s of a wildcard route\n");
1068 #undef p
1069 }
1070 
1071 char *
1072 ipx_print(struct sockaddr *sa)
1073 {
1074 	u_short port;
1075 	struct servent *sp = NULL;
1076 	const char *net = "", *host = "";
1077 	char *p;
1078 	u_char *q;
1079 	struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr;
1080 	static char mybuf[50];
1081 	char cport[10], chost[15], cnet[15];
1082 
1083 	port = ntohs(work.x_port);
1084 
1085 	if (ipx_nullnet(work) && ipx_nullhost(work)) {
1086 
1087 		if (port) {
1088 			if (sp)
1089 				sprintf(mybuf, "*.%s", sp->s_name);
1090 			else
1091 				sprintf(mybuf, "*.%x", port);
1092 		} else
1093 			sprintf(mybuf, "*.*");
1094 
1095 		return (mybuf);
1096 	}
1097 
1098 	if (ipx_wildnet(work))
1099 		net = "any";
1100 	else if (ipx_nullnet(work))
1101 		net = "*";
1102 	else {
1103 		q = work.x_net.c_net;
1104 		sprintf(cnet, "%02x%02x%02x%02x",
1105 			q[0], q[1], q[2], q[3]);
1106 		for (p = cnet; *p == '0' && p < cnet + 8; p++)
1107 			continue;
1108 		net = p;
1109 	}
1110 
1111 	if (ipx_wildhost(work))
1112 		host = "any";
1113 	else if (ipx_nullhost(work))
1114 		host = "*";
1115 	else {
1116 		q = work.x_host.c_host;
1117 		sprintf(chost, "%02x%02x%02x%02x%02x%02x",
1118 			q[0], q[1], q[2], q[3], q[4], q[5]);
1119 		for (p = chost; *p == '0' && p < chost + 12; p++)
1120 			continue;
1121 		host = p;
1122 	}
1123 
1124 	if (port) {
1125 		if (strcmp(host, "*") == 0)
1126 			host = "";
1127 		if (sp)
1128 			snprintf(cport, sizeof(cport),
1129 				"%s%s", *host ? "." : "", sp->s_name);
1130 		else
1131 			snprintf(cport, sizeof(cport),
1132 				"%s%x", *host ? "." : "", port);
1133 	} else
1134 		*cport = 0;
1135 
1136 	snprintf(mybuf, sizeof(mybuf), "%s.%s%s", net, host, cport);
1137 	return(mybuf);
1138 }
1139 
1140 char *
1141 ipx_phost(struct sockaddr *sa)
1142 {
1143 	struct sockaddr_ipx *sipx = (struct sockaddr_ipx *)sa;
1144 	struct sockaddr_ipx work;
1145 	static union ipx_net ipx_zeronet;
1146 	char *p;
1147 	struct ipx_addr in;
1148 
1149 	work = *sipx;
1150 	in = work.sipx_addr;
1151 
1152 	work.sipx_addr.x_port = 0;
1153 	work.sipx_addr.x_net = ipx_zeronet;
1154 	p = ipx_print((struct sockaddr *)&work);
1155 	if (strncmp("*.", p, 2) == 0) p += 2;
1156 
1157 	return(p);
1158 }
1159 
1160 void
1161 upHex(char *p0)
1162 {
1163 	char *p = p0;
1164 
1165 	for (; *p; p++)
1166 		switch (*p) {
1167 
1168 		case 'a':
1169 		case 'b':
1170 		case 'c':
1171 		case 'd':
1172 		case 'e':
1173 		case 'f':
1174 			*p += ('A' - 'a');
1175 			break;
1176 		}
1177 }
1178 
1179 static const char *
1180 labelops(struct rtentry *rt)
1181 {
1182 	const char *lops[] = { "push", "pop", "swap", "pop all" };
1183 	static char buffer[100];
1184 	char *cp = buffer;
1185 	struct sockaddr_mpls *smpls;
1186 	int i;
1187 
1188 	for (i=0; i<MPLS_MAXLOPS; ++i) {
1189 
1190 		if (rt->rt_shim[i] == NULL)
1191 			break;
1192 		if (i>0) {
1193 			cp += snprintf(cp,
1194 				       sizeof(buffer) - (cp - buffer),
1195 				       ", ");
1196 		}
1197 		smpls = (struct sockaddr_mpls *)kgetsa(rt->rt_shim[i]);
1198 		if (smpls->smpls_op != MPLSLOP_POP &&
1199 		    smpls->smpls_op != MPLSLOP_POPALL){
1200 			cp += snprintf(cp,
1201 				       sizeof(buffer) - (cp - buffer),
1202 				       "%s %d",
1203 				       lops[smpls->smpls_op - 1],
1204 				       ntohl(smpls->smpls_label));
1205 		} else {
1206 			cp += snprintf(cp,
1207 				       sizeof(buffer) - (cp - buffer),
1208 				       "%s",
1209 				       lops[smpls->smpls_op - 1]);
1210 		}
1211 	}
1212 
1213 	return (buffer);
1214 }
1215