xref: /dragonfly/usr.bin/netstat/route.c (revision 0db87cb7)
1 /*
2  * Copyright (c) 1983, 1988, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. Neither the name of the University nor the names of its contributors
14  *    may be used to endorse or promote products derived from this software
15  *    without specific prior written permission.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  *
29  * @(#)route.c	8.6 (Berkeley) 4/28/95
30  * $FreeBSD: src/usr.bin/netstat/route.c,v 1.41.2.14 2002/07/17 02:22:22 kbyanc Exp $
31  */
32 
33 #include <sys/kinfo.h>
34 #include <sys/param.h>
35 #include <sys/socket.h>
36 #include <sys/time.h>
37 
38 #include <net/ethernet.h>
39 #include <net/if.h>
40 #include <net/if_var.h>
41 #include <net/if_dl.h>
42 #include <net/if_types.h>
43 #include <net/route.h>
44 
45 #include <netinet/in.h>
46 #include <netgraph/socket/ng_socket.h>
47 
48 #include <netproto/mpls/mpls.h>
49 
50 #include <sys/sysctl.h>
51 
52 #include <arpa/inet.h>
53 #include <libutil.h>
54 #include <netdb.h>
55 #include <stdio.h>
56 #include <stdlib.h>
57 #include <string.h>
58 #include <unistd.h>
59 #include <err.h>
60 #include <time.h>
61 #include <kinfo.h>
62 #include "netstat.h"
63 
64 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
65 
66 /*
67  * Definitions for showing gateway flags.
68  */
69 struct bits {
70 	u_long	b_mask;
71 	char	b_val;
72 } bits[] = {
73 	{ RTF_UP,	'U' },
74 	{ RTF_GATEWAY,	'G' },
75 	{ RTF_HOST,	'H' },
76 	{ RTF_REJECT,	'R' },
77 	{ RTF_DYNAMIC,	'D' },
78 	{ RTF_MODIFIED,	'M' },
79 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
80 	{ RTF_CLONING,	'C' },
81 	{ RTF_XRESOLVE,	'X' },
82 	{ RTF_LLINFO,	'L' },
83 	{ RTF_STATIC,	'S' },
84 	{ RTF_PROTO1,	'1' },
85 	{ RTF_PROTO2,	'2' },
86 	{ RTF_WASCLONED,'W' },
87 	{ RTF_PRCLONING,'c' },
88 	{ RTF_PROTO3,	'3' },
89 	{ RTF_BLACKHOLE,'B' },
90 	{ RTF_BROADCAST,'b' },
91 	{ RTF_MPLSOPS,	'm' },
92 	{ 0, 0 }
93 };
94 
95 typedef union {
96 	long	dummy;		/* Helps align structure. */
97 	struct	sockaddr u_sa;
98 	u_short	u_data[128];
99 } sa_u;
100 
101 static sa_u pt_u;
102 
103 int	do_rtent = 0;
104 struct	rtentry rtentry;
105 struct	radix_node rnode;
106 struct	radix_mask rmask;
107 struct	radix_node_head *rt_tables[AF_MAX+1];
108 
109 int	NewTree = 0;
110 
111 static struct sockaddr *kgetsa (struct sockaddr *);
112 static void size_cols (int ef, struct radix_node *rn);
113 static void size_cols_tree (struct radix_node *rn);
114 static void size_cols_rtentry (struct rtentry *rt);
115 static void p_tree (struct radix_node *);
116 static void p_rtnode (void);
117 static void ntreestuff (void);
118 static void np_rtentry (struct rt_msghdr *);
119 static void p_sockaddr (struct sockaddr *, struct sockaddr *, int, int);
120 static const char *fmt_sockaddr (struct sockaddr *sa, struct sockaddr *mask,
121 				 int flags);
122 static void p_flags (int, const char *);
123 static const char *fmt_flags(int f);
124 static void p_rtentry (struct rtentry *);
125 static u_long forgemask (u_long);
126 static void domask (char *, u_long, u_long);
127 static const char *labelops(struct rtentry *);
128 
129 /*
130  * Print routing tables.
131  */
132 void
133 routepr(u_long rtree)
134 {
135 	struct radix_node_head *rnh, head;
136 	int i;
137 
138 	printf("Routing tables\n");
139 
140 	if (Aflag == 0 && NewTree) {
141 		ntreestuff();
142 	} else {
143 		if (rtree == 0) {
144 			printf("rt_tables: symbol not in namelist\n");
145 			return;
146 		}
147 		if (cpuflag >= 0) {
148 			/*
149 			 * Severe hack.
150 			 */
151 			rtree += cpuflag * (AF_MAX + 1) * sizeof(void *);
152 		}
153 		if (kget(rtree, rt_tables) != 0)
154 			return;
155 		for (i = 0; i <= AF_MAX; i++) {
156 			if ((rnh = rt_tables[i]) == NULL)
157 				continue;
158 			if (kget(rnh, head) != 0)
159 				continue;
160 			if (i == AF_UNSPEC) {
161 				if (Aflag && af == 0) {
162 					printf("Netmasks:\n");
163 					p_tree(head.rnh_treetop);
164 				}
165 			} else if (af == AF_UNSPEC || af == i) {
166 				size_cols(i, head.rnh_treetop);
167 				pr_family(i);
168 				do_rtent = 1;
169 				pr_rthdr(i);
170 				p_tree(head.rnh_treetop);
171 			}
172 		}
173 	}
174 }
175 
176 /*
177  * Print address family header before a section of the routing table.
178  */
179 void
180 pr_family(int af1)
181 {
182 	const char *afname;
183 
184 	switch (af1) {
185 	case AF_INET:
186 		afname = "Internet";
187 		break;
188 #ifdef INET6
189 	case AF_INET6:
190 		afname = "Internet6";
191 		break;
192 #endif /*INET6*/
193 	case AF_CCITT:
194 		afname = "X.25";
195 		break;
196 	case AF_NETGRAPH:
197 		afname = "Netgraph";
198 		break;
199 	case AF_MPLS:
200 		afname = "MPLS";
201 		break;
202 	default:
203 		afname = NULL;
204 		break;
205 	}
206 	if (afname)
207 		printf("\n%s:\n", afname);
208 	else
209 		printf("\nProtocol Family %d:\n", af1);
210 }
211 
212 /* column widths; each followed by one space */
213 #ifndef INET6
214 #define	WID_DST_DEFAULT(af) 	18	/* width of destination column */
215 #define	WID_GW_DEFAULT(af)	18	/* width of gateway column */
216 #define	WID_IF_DEFAULT(af)	(Wflag ? 8 : 6)	/* width of netif column */
217 #else
218 #define	WID_DST_DEFAULT(af) \
219 	((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18)
220 #define	WID_GW_DEFAULT(af) \
221 	((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18)
222 #define	WID_IF_DEFAULT(af)	((af) == AF_INET6 ? 8 : (Wflag ? 8 :6))
223 #endif /*INET6*/
224 
225 static int wid_dst;
226 static int wid_gw;
227 static int wid_flags;
228 static int wid_refs;
229 static int wid_use;
230 static int wid_mtu;
231 static int wid_if;
232 static int wid_expire;
233 static int wid_mplslops;
234 static int wid_msl;
235 static int wid_iwmax;
236 static int wid_iw;
237 
238 static void
239 size_cols(int ef, struct radix_node *rn)
240 {
241 	wid_dst = WID_DST_DEFAULT(ef);
242 	wid_gw = WID_GW_DEFAULT(ef);
243 	wid_flags = 6;
244 	wid_refs = 6;
245 	wid_use = 8;
246 	wid_mtu = 6;
247 	wid_if = WID_IF_DEFAULT(ef);
248 	wid_expire = 6;
249 	wid_mplslops = 7;
250 	wid_msl = 7;
251 	wid_iwmax = 5;
252 	wid_iw = 2;
253 
254 	if (Wflag)
255 		size_cols_tree(rn);
256 }
257 
258 static void
259 size_cols_tree(struct radix_node *rn)
260 {
261 again:
262 	if (kget(rn, rnode) != 0)
263 		return;
264 	if (!(rnode.rn_flags & RNF_ACTIVE))
265 		return;
266 	if (rnode.rn_bit < 0) {
267 		if ((rnode.rn_flags & RNF_ROOT) == 0) {
268 			if (kget(rn, rtentry) != 0)
269 				return;
270 			size_cols_rtentry(&rtentry);
271 		}
272 		if ((rn = rnode.rn_dupedkey))
273 			goto again;
274 	} else {
275 		rn = rnode.rn_right;
276 		size_cols_tree(rnode.rn_left);
277 		size_cols_tree(rn);
278 	}
279 }
280 
281 static void
282 size_cols_rtentry(struct rtentry *rt)
283 {
284 	static struct ifnet ifnet, *lastif;
285 	struct rtentry parent;
286 	static char buffer[100];
287 	const char *bp;
288 	struct sockaddr *sa;
289 	sa_u addr, mask;
290 	int len;
291 
292 	/*
293 	 * Don't print protocol-cloned routes unless -a.
294 	 */
295 	if (rt->rt_flags & RTF_WASCLONED && !aflag) {
296 		if (kget(rt->rt_parent, parent) != 0)
297 			return;
298 		if (parent.rt_flags & RTF_PRCLONING)
299 			return;
300 	}
301 
302 	bzero(&addr, sizeof(addr));
303 	if ((sa = kgetsa(rt_key(rt))))
304 		bcopy(sa, &addr, sa->sa_len);
305 	bzero(&mask, sizeof(mask));
306 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
307 		bcopy(sa, &mask, sa->sa_len);
308 	bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags);
309 	len = strlen(bp);
310 	wid_dst = MAX(len, wid_dst);
311 
312 	bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST);
313 	len = strlen(bp);
314 	wid_gw = MAX(len, wid_gw);
315 
316 	bp = fmt_flags(rt->rt_flags);
317 	len = strlen(bp);
318 	wid_flags = MAX(len, wid_flags);
319 
320 	if (addr.u_sa.sa_family == AF_INET || Wflag) {
321 		len = snprintf(buffer, sizeof(buffer), "%ld", rt->rt_refcnt);
322 		wid_refs = MAX(len, wid_refs);
323 		len = snprintf(buffer, sizeof(buffer), "%lu", rt->rt_use);
324 		wid_use = MAX(len, wid_use);
325 		if (Wflag && rt->rt_rmx.rmx_mtu != 0) {
326 			len = snprintf(buffer, sizeof(buffer),
327 				       "%lu", rt->rt_rmx.rmx_mtu);
328 			wid_mtu = MAX(len, wid_mtu);
329 		}
330 	}
331 	if (rt->rt_ifp) {
332 		if (rt->rt_ifp != lastif) {
333 			if (kget(rt->rt_ifp, ifnet) == 0)
334 				len = strlen(ifnet.if_xname);
335 			else
336 				len = strlen("---");
337 			lastif = rt->rt_ifp;
338 			wid_if = MAX(len, wid_if);
339 		}
340 		if (rt->rt_rmx.rmx_expire) {
341 			struct timespec sp;
342 			int expire_time;
343 
344 			clock_gettime(CLOCK_MONOTONIC, &sp);
345 
346 			expire_time = (int)(rt->rt_rmx.rmx_expire - sp.tv_sec);
347 
348 			if (expire_time > 0) {
349 				snprintf(buffer, sizeof(buffer), "%d",
350 					 (int)expire_time);
351 				wid_expire = MAX(len, wid_expire);
352 			}
353 		}
354 	}
355 	if (Wflag) {
356 		if (rt->rt_shim[0] != NULL) {
357 			len = strlen(labelops(rt));
358 			wid_mplslops = MAX(len, wid_mplslops);
359 		}
360 
361 		if (rt->rt_rmx.rmx_msl) {
362 			len = snprintf(buffer, sizeof(buffer),
363 				       "%lu", rt->rt_rmx.rmx_msl);
364 			wid_msl = MAX(len, wid_msl);
365 		}
366 		if (rt->rt_rmx.rmx_iwmaxsegs) {
367 			len = snprintf(buffer, sizeof(buffer),
368 				       "%lu", rt->rt_rmx.rmx_iwmaxsegs);
369 			wid_iwmax = MAX(len, wid_iwmax);
370 		}
371 		if (rt->rt_rmx.rmx_iwcapsegs) {
372 			len = snprintf(buffer, sizeof(buffer),
373 				       "%lu", rt->rt_rmx.rmx_iwcapsegs);
374 			wid_iw = MAX(len, wid_iw);
375 		}
376 	}
377 }
378 
379 
380 /*
381  * Print header for routing table columns.
382  */
383 void
384 pr_rthdr(int af1)
385 {
386 
387 	if (Aflag)
388 		printf("%-8.8s ","Address");
389 	if (af1 == AF_INET || Wflag) {
390 		if (Wflag) {
391 			printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*.*s "
392 			       "%*s %-*s%*s %*s %*s\n",
393 				wid_dst,	wid_dst,	"Destination",
394 				wid_gw,		wid_gw,		"Gateway",
395 				wid_flags,	wid_flags,	"Flags",
396 				wid_refs,	wid_refs,	"Refs",
397 				wid_use,	wid_use,	"Use",
398 				wid_mtu,	wid_mtu,	"Mtu",
399 				wid_if,		wid_if,		"Netif",
400 				wid_expire,			"Expire",
401 				wid_mplslops,			"Labelops",
402 				wid_msl,			"Msl",
403 				wid_iwmax,			"IWmax",
404 				wid_iw,				"IW");
405 		} else {
406 			printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*s\n",
407 				wid_dst,	wid_dst,	"Destination",
408 				wid_gw,		wid_gw,		"Gateway",
409 				wid_flags,	wid_flags,	"Flags",
410 				wid_refs,	wid_refs,	"Refs",
411 				wid_use,	wid_use,	"Use",
412 				wid_if,		wid_if,		"Netif",
413 				wid_expire,			"Expire");
414 		}
415 	} else {
416 		printf("%-*.*s %-*.*s %-*.*s  %*.*s %*s\n",
417 			wid_dst,	wid_dst,	"Destination",
418 			wid_gw,		wid_gw,		"Gateway",
419 			wid_flags,	wid_flags,	"Flags",
420 			wid_if,		wid_if,		"Netif",
421 			wid_expire,			"Expire");
422 	}
423 }
424 
425 static struct sockaddr *
426 kgetsa(struct sockaddr *dst)
427 {
428 
429 	if (kget(dst, pt_u.u_sa) != 0)
430 		return (NULL);
431 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
432 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
433 	return (&pt_u.u_sa);
434 }
435 
436 static void
437 p_tree(struct radix_node *rn)
438 {
439 
440 again:
441 	if (kget(rn, rnode) != 0)
442 		return;
443 	if (!(rnode.rn_flags & RNF_ACTIVE))
444 		return;
445 	if (rnode.rn_bit < 0) {
446 		if (Aflag)
447 			printf("%-8.8lx ", (u_long)rn);
448 		if (rnode.rn_flags & RNF_ROOT) {
449 			if (Aflag)
450 				printf("(root node)%s",
451 				    rnode.rn_dupedkey ? " =>\n" : "\n");
452 		} else if (do_rtent) {
453 			if (kget(rn, rtentry) == 0) {
454 				p_rtentry(&rtentry);
455 				if (Aflag)
456 					p_rtnode();
457 			}
458 		} else {
459 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
460 				   NULL, 0, 44);
461 			putchar('\n');
462 		}
463 		if ((rn = rnode.rn_dupedkey))
464 			goto again;
465 	} else {
466 		if (Aflag && do_rtent) {
467 			printf("%-8.8lx ", (u_long)rn);
468 			p_rtnode();
469 		}
470 		rn = rnode.rn_right;
471 		p_tree(rnode.rn_left);
472 		p_tree(rn);
473 	}
474 }
475 
476 char	nbuf[20];
477 
478 static void
479 p_rtnode(void)
480 {
481 	struct radix_mask *rm = rnode.rn_mklist;
482 
483 	if (rnode.rn_bit < 0) {
484 		if (rnode.rn_mask) {
485 			printf("\t  mask ");
486 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
487 				   NULL, 0, -1);
488 		} else if (rm == NULL)
489 			return;
490 	} else {
491 		sprintf(nbuf, "(%d)", rnode.rn_bit);
492 		printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long)rnode.rn_left, (u_long)rnode.rn_right);
493 	}
494 	while (rm) {
495 		if (kget(rm, rmask) != 0)
496 			break;
497 		sprintf(nbuf, " %d refs, ", rmask.rm_refs);
498 		printf(" mk = %8.8lx {(%d),%s",
499 			(u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " ");
500 		if (rmask.rm_flags & RNF_NORMAL) {
501 			struct radix_node rnode_aux;
502 			printf(" <normal>, ");
503 			if (kget(rmask.rm_leaf, rnode_aux) == 0)
504 				p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
505 				    NULL, 0, -1);
506 			else
507 				p_sockaddr(NULL, NULL, 0, -1);
508 		} else
509 		    p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
510 				NULL, 0, -1);
511 		putchar('}');
512 		if ((rm = rmask.rm_next))
513 			printf(" ->");
514 	}
515 	putchar('\n');
516 }
517 
518 static void
519 ntreestuff(void)
520 {
521 	size_t needed;
522 	int mib[7];
523 	int miblen;
524 	char *buf, *next, *lim;
525 	struct rt_msghdr *rtm;
526 
527 	mib[0] = CTL_NET;
528 	mib[1] = PF_ROUTE;
529 	mib[2] = 0;
530 	mib[3] = 0;
531 	mib[4] = NET_RT_DUMP;
532 	mib[5] = 0;
533 	if (cpuflag >= 0) {
534 		mib[6] = cpuflag;
535 		miblen = 7;
536 	} else {
537 		miblen = 6;
538 	}
539 	if (sysctl(mib, miblen, NULL, &needed, NULL, 0) < 0) {
540 		err(1, "sysctl: net.route.0.0.dump estimate");
541 	}
542 
543 	if ((buf = malloc(needed)) == NULL) {
544 		err(2, "malloc(%lu)", (unsigned long)needed);
545 	}
546 	if (sysctl(mib, miblen, buf, &needed, NULL, 0) < 0) {
547 		err(1, "sysctl: net.route.0.0.dump");
548 	}
549 	lim  = buf + needed;
550 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
551 		rtm = (struct rt_msghdr *)next;
552 		np_rtentry(rtm);
553 	}
554 }
555 
556 static void
557 np_rtentry(struct rt_msghdr *rtm)
558 {
559 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
560 #ifdef notdef
561 	static int masks_done, banner_printed;
562 #endif
563 	static int old_af;
564 	int af1 = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
565 
566 #ifdef notdef
567 	/* for the moment, netmasks are skipped over */
568 	if (!banner_printed) {
569 		printf("Netmasks:\n");
570 		banner_printed = 1;
571 	}
572 	if (masks_done == 0) {
573 		if (rtm->rtm_addrs != RTA_DST ) {
574 			masks_done = 1;
575 			af1 = sa->sa_family;
576 		}
577 	} else
578 #endif
579 		af1 = sa->sa_family;
580 	if (af1 != old_af) {
581 		pr_family(af1);
582 		old_af = af1;
583 	}
584 	if (rtm->rtm_addrs == RTA_DST)
585 		p_sockaddr(sa, NULL, 0, 36);
586 	else {
587 		p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
588 		sa = (struct sockaddr *)(RT_ROUNDUP(sa->sa_len) + (char *)sa);
589 		p_sockaddr(sa, NULL, 0, 18);
590 	}
591 	p_flags(rtm->rtm_flags & interesting, "%-6.6s ");
592 	putchar('\n');
593 }
594 
595 static void
596 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
597 {
598 	const char *cp;
599 
600 	cp = fmt_sockaddr(sa, mask, flags);
601 
602 	if (width < 0 )
603 		printf("%s ", cp);
604 	else {
605 		if (numeric_addr)
606 			printf("%-*s ", width, cp);
607 		else
608 			printf("%-*.*s ", width, width, cp);
609 	}
610 }
611 
612 static const char *
613 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags)
614 {
615 	static char workbuf[128];
616 	const char *cp = workbuf;
617 
618 	if (sa == NULL)
619 		return ("null");
620 
621 	switch(sa->sa_family) {
622 	case AF_INET:
623 	    {
624 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
625 
626 		if ((sin->sin_addr.s_addr == INADDR_ANY) &&
627 			mask &&
628 			ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr)
629 				==0L)
630 				cp = "default" ;
631 		else if (flags & RTF_HOST)
632 			cp = routename(sin->sin_addr.s_addr);
633 		else if (mask)
634 			cp = netname(sin->sin_addr.s_addr,
635 				     ntohl(((struct sockaddr_in *)mask)
636 					   ->sin_addr.s_addr));
637 		else
638 			cp = netname(sin->sin_addr.s_addr, 0L);
639 		break;
640 	    }
641 
642 #ifdef INET6
643 	case AF_INET6:
644 	    {
645 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
646 		struct in6_addr *in6 = &sa6->sin6_addr;
647 
648 		/*
649 		 * XXX: This is a special workaround for KAME kernels.
650 		 * sin6_scope_id field of SA should be set in the future.
651 		 */
652 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
653 		    IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
654 		    /* XXX: override is ok? */
655 		    sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
656 		    *(u_short *)&in6->s6_addr[2] = 0;
657 		}
658 
659 		if (flags & RTF_HOST)
660 		    cp = routename6(sa6);
661 		else if (mask)
662 		    cp = netname6(sa6,
663 				  &((struct sockaddr_in6 *)mask)->sin6_addr);
664 		else {
665 		    cp = netname6(sa6, NULL);
666 		}
667 		break;
668 	    }
669 #endif /*INET6*/
670 
671 	case AF_NETGRAPH:
672 	    {
673 		printf("%s", ((struct sockaddr_ng *)sa)->sg_data);
674 		break;
675 	    }
676 	case AF_LINK:
677 	    {
678 		struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
679 
680 		if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
681 		    sdl->sdl_slen == 0)
682 			(void) sprintf(workbuf, "link#%d", sdl->sdl_index);
683 		else
684 			switch (sdl->sdl_type) {
685 
686 			case IFT_ETHER:
687 			case IFT_L2VLAN:
688 			case IFT_CARP:
689 				if (sdl->sdl_alen == ETHER_ADDR_LEN) {
690 					cp = ether_ntoa((struct ether_addr *)
691 					    (sdl->sdl_data + sdl->sdl_nlen));
692 					break;
693 				}
694 				/* FALLTHROUGH */
695 			default:
696 				cp = link_ntoa(sdl);
697 				break;
698 			}
699 		break;
700 	    }
701 
702 	case AF_MPLS:
703 	    {
704 		struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa;
705 
706 		(void) sprintf(workbuf, "%d", ntohl(smpls->smpls_label));
707 		break;
708 	    }
709 
710 	default:
711 	    {
712 		u_char *s = (u_char *)sa->sa_data, *slim;
713 		char *cq, *cqlim;
714 
715 		cq = workbuf;
716 		slim =  sa->sa_len + (u_char *) sa;
717 		cqlim = cq + sizeof(workbuf) - 6;
718 		cq += sprintf(cq, "(%d)", sa->sa_family);
719 		while (s < slim && cq < cqlim) {
720 			cq += sprintf(cq, " %02x", *s++);
721 			if (s < slim)
722 			    cq += sprintf(cq, "%02x", *s++);
723 		}
724 		cp = workbuf;
725 	    }
726 	}
727 
728 	return (cp);
729 }
730 
731 static void
732 p_flags(int f, const char *format)
733 {
734 	printf(format, fmt_flags(f));
735 }
736 
737 static const char *
738 fmt_flags(int f)
739 {
740 	static char name[33];
741 	char *flags;
742 	struct bits *p = bits;
743 
744 	for (flags = name; p->b_mask; p++)
745 		if (p->b_mask & f)
746 			*flags++ = p->b_val;
747 	*flags = '\0';
748 	return (name);
749 }
750 
751 static void
752 p_rtentry(struct rtentry *rt)
753 {
754 	static struct ifnet ifnet, *lastif;
755 	struct rtentry parent;
756 	static char buffer[128];
757 	static char prettyname[128];
758 	struct sockaddr *sa;
759 	sa_u addr, mask;
760 
761 	/*
762 	 * Don't print protocol-cloned routes unless -a or -A.
763 	 */
764 	if (rt->rt_flags & RTF_WASCLONED && !(aflag || Aflag)) {
765 		if (kget(rt->rt_parent, parent) != 0)
766 			return;
767 		if (parent.rt_flags & RTF_PRCLONING)
768 			return;
769 	}
770 
771 	bzero(&addr, sizeof(addr));
772 	if ((sa = kgetsa(rt_key(rt))))
773 		bcopy(sa, &addr, sa->sa_len);
774 	bzero(&mask, sizeof(mask));
775 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
776 		bcopy(sa, &mask, sa->sa_len);
777 	p_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags, wid_dst);
778 	p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw);
779 	snprintf(buffer, sizeof(buffer), "%%-%d.%ds ", wid_flags, wid_flags);
780 	p_flags(rt->rt_flags, buffer);
781 	if (addr.u_sa.sa_family == AF_INET || Wflag) {
782 		printf("%*ld %*lu ", wid_refs, rt->rt_refcnt,
783 				     wid_use, rt->rt_use);
784 		if (Wflag) {
785 			if (rt->rt_rmx.rmx_mtu != 0)
786 				printf("%*lu ", wid_mtu, rt->rt_rmx.rmx_mtu);
787 			else
788 				printf("%*s ", wid_mtu, "");
789 		}
790 	}
791 	if (rt->rt_ifp) {
792 		if (rt->rt_ifp != lastif) {
793 			if (kget(rt->rt_ifp, ifnet) == 0)
794 				strlcpy(prettyname, ifnet.if_xname,
795 				    sizeof(prettyname));
796 			else
797 				strlcpy(prettyname, "---", sizeof(prettyname));
798 			lastif = rt->rt_ifp;
799 		}
800 		printf("%*.*s", wid_if, wid_if, prettyname);
801 		if (rt->rt_rmx.rmx_expire) {
802 			struct timespec sp;
803 			int expire_time;
804 
805 			clock_gettime(CLOCK_MONOTONIC, &sp);
806 
807 			expire_time = (int)(rt->rt_rmx.rmx_expire - sp.tv_sec);
808 			if (expire_time > 0)
809 				printf(" %*d", wid_expire, (int)expire_time);
810 			else
811 				printf("%*s ", wid_expire, "");
812 		} else {
813 			printf("%*s ", wid_expire, "");
814 		}
815 		if (rt->rt_nodes[0].rn_dupedkey)
816 			printf(" =>");
817 	}
818 	if (Wflag) {
819 		if (rt->rt_shim[0] != NULL)
820 			printf(" %-*s", wid_mplslops, labelops(rt));
821 		else
822 			printf(" %-*s", wid_mplslops, "");
823 		if (rt->rt_rmx.rmx_msl != 0)
824 			printf(" %*lu", wid_msl, rt->rt_rmx.rmx_msl);
825 		else
826 			printf("%*s ", wid_msl, "");
827 		if (rt->rt_rmx.rmx_iwmaxsegs != 0)
828 			printf(" %*lu", wid_iwmax, rt->rt_rmx.rmx_iwmaxsegs);
829 		else
830 			printf("%*s ", wid_iwmax, "");
831 		if (rt->rt_rmx.rmx_iwcapsegs != 0)
832 			printf(" %*lu", wid_iw, rt->rt_rmx.rmx_iwcapsegs);
833 		else
834 			printf("%*s ", wid_iw, "");
835 	}
836 	putchar('\n');
837 }
838 
839 char *
840 routename(u_long in)
841 {
842 	char *cp;
843 	static char line[MAXHOSTNAMELEN];
844 	struct hostent *hp;
845 
846 	cp = NULL;
847 	if (!numeric_addr) {
848 		hp = gethostbyaddr(&in, sizeof (struct in_addr), AF_INET);
849 		if (hp) {
850 			cp = hp->h_name;
851 			trimdomain(cp, strlen(cp));
852 		}
853 	}
854 	if (cp) {
855 		strncpy(line, cp, sizeof(line) - 1);
856 		line[sizeof(line) - 1] = '\0';
857 	} else {
858 #define C(x)	((x) & 0xff)
859 		in = ntohl(in);
860 		sprintf(line, "%lu.%lu.%lu.%lu",
861 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
862 	}
863 	return (line);
864 }
865 
866 static u_long
867 forgemask(u_long a)
868 {
869 	u_long m;
870 
871 	if (IN_CLASSA(a))
872 		m = IN_CLASSA_NET;
873 	else if (IN_CLASSB(a))
874 		m = IN_CLASSB_NET;
875 	else
876 		m = IN_CLASSC_NET;
877 	return (m);
878 }
879 
880 static void
881 domask(char *dst, u_long addr, u_long mask)
882 {
883 	int b, i;
884 
885 	if (!mask || (forgemask(addr) == mask)) {
886 		*dst = '\0';
887 		return;
888 	}
889 	i = 0;
890 	for (b = 0; b < 32; b++)
891 		if (mask & (1 << b)) {
892 			int bb;
893 
894 			i = b;
895 			for (bb = b+1; bb < 32; bb++)
896 				if (!(mask & (1 << bb))) {
897 					i = -1;	/* noncontig */
898 					break;
899 				}
900 			break;
901 		}
902 	if (i == -1)
903 		sprintf(dst, "&0x%lx", mask);
904 	else
905 		sprintf(dst, "/%d", 32-i);
906 }
907 
908 /*
909  * Return the name of the network whose address is given.
910  * The address is assumed to be that of a net or subnet, not a host.
911  */
912 char *
913 netname(u_long in, u_long mask)
914 {
915 	char *cp = NULL;
916 	static char line[MAXHOSTNAMELEN];
917 	struct netent *np = NULL;
918 	u_long dmask;
919 	u_long i;
920 
921 #define	NSHIFT(m) (							\
922 	(m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT :			\
923 	(m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT :			\
924 	(m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT :			\
925 	0)
926 
927 	i = ntohl(in);
928 	dmask = forgemask(i);
929 	if (!numeric_addr && i) {
930 		np = getnetbyaddr(i >> NSHIFT(mask), AF_INET);
931 		if (np == NULL && mask == 0)
932 			np = getnetbyaddr(i >> NSHIFT(dmask), AF_INET);
933 		if (np != NULL) {
934 			cp = np->n_name;
935 			trimdomain(cp, strlen(cp));
936 		}
937 	}
938 #undef NSHIFT
939 	if (cp != NULL) {
940 		strncpy(line, cp, sizeof(line) - 1);
941 		line[sizeof(line) - 1] = '\0';
942 	} else {
943 		if (mask <= IN_CLASSA_NET &&
944 			(i & IN_CLASSA_HOST) == 0) {
945 				sprintf(line, "%lu", C(i >> 24));
946 		} else if (mask <= IN_CLASSB_NET &&
947 			(i & IN_CLASSB_HOST) == 0) {
948 				sprintf(line, "%lu.%lu",
949 					C(i >> 24), C(i >> 16));
950 		} else if (mask <= IN_CLASSC_NET &&
951 			(i & IN_CLASSC_HOST) == 0) {
952 				sprintf(line, "%lu.%lu.%lu",
953 					C(i >> 24), C(i >> 16), C(i >> 8));
954 		} else {
955 			sprintf(line, "%lu.%lu.%lu.%lu",
956 				C(i >> 24), C(i >> 16), C(i >> 8), C(i));
957 		}
958 	}
959 	domask(line + strlen(line), i, mask);
960 	return (line);
961 }
962 
963 #ifdef INET6
964 const char *
965 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask)
966 {
967 	static char line[MAXHOSTNAMELEN];
968 	u_char *p = (u_char *)mask;
969 	u_char *lim;
970 	int masklen, illegal = 0, flag = NI_WITHSCOPEID;
971 
972 	if (mask) {
973 		for (masklen = 0, lim = p + 16; p < lim; p++) {
974 			switch (*p) {
975 			 case 0xff:
976 				 masklen += 8;
977 				 break;
978 			 case 0xfe:
979 				 masklen += 7;
980 				 break;
981 			 case 0xfc:
982 				 masklen += 6;
983 				 break;
984 			 case 0xf8:
985 				 masklen += 5;
986 				 break;
987 			 case 0xf0:
988 				 masklen += 4;
989 				 break;
990 			 case 0xe0:
991 				 masklen += 3;
992 				 break;
993 			 case 0xc0:
994 				 masklen += 2;
995 				 break;
996 			 case 0x80:
997 				 masklen += 1;
998 				 break;
999 			 case 0x00:
1000 				 break;
1001 			 default:
1002 				 illegal ++;
1003 				 break;
1004 			}
1005 		}
1006 		if (illegal)
1007 			fprintf(stderr, "illegal prefixlen\n");
1008 	}
1009 	else
1010 		masklen = 128;
1011 
1012 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
1013 		return("default");
1014 
1015 	if (numeric_addr)
1016 		flag |= NI_NUMERICHOST;
1017 	getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line),
1018 		    NULL, 0, flag);
1019 
1020 	if (numeric_addr)
1021 		sprintf(&line[strlen(line)], "/%d", masklen);
1022 
1023 	return line;
1024 }
1025 
1026 char *
1027 routename6(struct sockaddr_in6 *sa6)
1028 {
1029 	static char line[MAXHOSTNAMELEN];
1030 	int flag = NI_WITHSCOPEID;
1031 	/* use local variable for safety */
1032 	struct sockaddr_in6 sa6_local;
1033 
1034 	sa6_local.sin6_family = AF_INET6;
1035 	sa6_local.sin6_len = sizeof(sa6_local);
1036 	sa6_local.sin6_addr = sa6->sin6_addr;
1037 	sa6_local.sin6_scope_id = sa6->sin6_scope_id;
1038 
1039 	if (numeric_addr)
1040 		flag |= NI_NUMERICHOST;
1041 
1042 	getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
1043 		    line, sizeof(line), NULL, 0, flag);
1044 
1045 	return line;
1046 }
1047 #endif /*INET6*/
1048 
1049 /*
1050  * Print routing statistics
1051  */
1052 void
1053 rt_stats(void)
1054 {
1055 	struct rtstatistics rts;
1056 	int error = 0;
1057 
1058 	error = kinfo_get_net_rtstatistics(&rts);
1059 	if (error) {
1060 		printf("routing: could not retrieve statistics\n");
1061 		return;
1062 	}
1063 	printf("routing:\n");
1064 
1065 #define	p(f, m) if (rts.f || sflag <= 1) \
1066 	printf(m, rts.f, plural(rts.f))
1067 
1068 	p(rts_badredirect, "\t%lu bad routing redirect%s\n");
1069 	p(rts_dynamic, "\t%lu dynamically created route%s\n");
1070 	p(rts_newgateway, "\t%lu new gateway%s due to redirects\n");
1071 	p(rts_unreach, "\t%lu destination%s found unreachable\n");
1072 	p(rts_wildcard, "\t%lu use%s of a wildcard route\n");
1073 #undef p
1074 }
1075 
1076 static const char *
1077 labelops(struct rtentry *rt)
1078 {
1079 	const char *lops[] = { "push", "pop", "swap", "pop all" };
1080 	static char buffer[100];
1081 	char *cp = buffer;
1082 	struct sockaddr_mpls *smpls;
1083 	int i;
1084 
1085 	for (i=0; i<MPLS_MAXLOPS; ++i) {
1086 
1087 		if (rt->rt_shim[i] == NULL)
1088 			break;
1089 		if (i>0) {
1090 			cp += snprintf(cp,
1091 				       sizeof(buffer) - (cp - buffer),
1092 				       ", ");
1093 		}
1094 		smpls = (struct sockaddr_mpls *)kgetsa(rt->rt_shim[i]);
1095 		if (smpls->smpls_op != MPLSLOP_POP &&
1096 		    smpls->smpls_op != MPLSLOP_POPALL){
1097 			cp += snprintf(cp,
1098 				       sizeof(buffer) - (cp - buffer),
1099 				       "%s %d",
1100 				       lops[smpls->smpls_op - 1],
1101 				       ntohl(smpls->smpls_label));
1102 		} else {
1103 			cp += snprintf(cp,
1104 				       sizeof(buffer) - (cp - buffer),
1105 				       "%s",
1106 				       lops[smpls->smpls_op - 1]);
1107 		}
1108 	}
1109 
1110 	return (buffer);
1111 }
1112