xref: /dragonfly/usr.bin/netstat/route.c (revision 51871435)
1 /*
2  * Copyright (c) 1983, 1988, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  *
33  * @(#)route.c	8.6 (Berkeley) 4/28/95
34  * $FreeBSD: src/usr.bin/netstat/route.c,v 1.41.2.14 2002/07/17 02:22:22 kbyanc Exp $
35  */
36 
37 #include <sys/kinfo.h>
38 #include <sys/param.h>
39 #include <sys/socket.h>
40 #include <sys/time.h>
41 
42 #include <net/ethernet.h>
43 #include <net/if.h>
44 #include <net/if_var.h>
45 #include <net/if_dl.h>
46 #include <net/if_types.h>
47 #include <net/route.h>
48 
49 #include <netinet/in.h>
50 #include <netipx/ipx.h>
51 #include <netgraph/socket/ng_socket.h>
52 
53 #include <netproto/mpls/mpls.h>
54 
55 #include <sys/sysctl.h>
56 
57 #include <arpa/inet.h>
58 #include <libutil.h>
59 #include <netdb.h>
60 #include <stdio.h>
61 #include <stdlib.h>
62 #include <string.h>
63 #include <unistd.h>
64 #include <err.h>
65 #include <time.h>
66 #include <kinfo.h>
67 #include "netstat.h"
68 
69 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
70 
71 
72 /* alignment constraint for routing socket */
73 #define ROUNDUP(a) \
74        ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
75 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
76 
77 /*
78  * Definitions for showing gateway flags.
79  */
80 struct bits {
81 	u_long	b_mask;
82 	char	b_val;
83 } bits[] = {
84 	{ RTF_UP,	'U' },
85 	{ RTF_GATEWAY,	'G' },
86 	{ RTF_HOST,	'H' },
87 	{ RTF_REJECT,	'R' },
88 	{ RTF_DYNAMIC,	'D' },
89 	{ RTF_MODIFIED,	'M' },
90 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
91 	{ RTF_CLONING,	'C' },
92 	{ RTF_XRESOLVE,	'X' },
93 	{ RTF_LLINFO,	'L' },
94 	{ RTF_STATIC,	'S' },
95 	{ RTF_PROTO1,	'1' },
96 	{ RTF_PROTO2,	'2' },
97 	{ RTF_WASCLONED,'W' },
98 	{ RTF_PRCLONING,'c' },
99 	{ RTF_PROTO3,	'3' },
100 	{ RTF_BLACKHOLE,'B' },
101 	{ RTF_BROADCAST,'b' },
102 	{ RTF_MPLSOPS,	'm' },
103 	{ 0, 0 }
104 };
105 
106 typedef union {
107 	long	dummy;		/* Helps align structure. */
108 	struct	sockaddr u_sa;
109 	u_short	u_data[128];
110 } sa_u;
111 
112 static sa_u pt_u;
113 
114 int	do_rtent = 0;
115 struct	rtentry rtentry;
116 struct	radix_node rnode;
117 struct	radix_mask rmask;
118 struct	radix_node_head *rt_tables[AF_MAX+1];
119 
120 int	NewTree = 0;
121 
122 static struct sockaddr *kgetsa (struct sockaddr *);
123 static void size_cols (int ef, struct radix_node *rn);
124 static void size_cols_tree (struct radix_node *rn);
125 static void size_cols_rtentry (struct rtentry *rt);
126 static void p_tree (struct radix_node *);
127 static void p_rtnode (void);
128 static void ntreestuff (void);
129 static void np_rtentry (struct rt_msghdr *);
130 static void p_sockaddr (struct sockaddr *, struct sockaddr *, int, int);
131 static const char *fmt_sockaddr (struct sockaddr *sa, struct sockaddr *mask,
132 				 int flags);
133 static void p_flags (int, const char *);
134 static const char *fmt_flags(int f);
135 static void p_rtentry (struct rtentry *);
136 static u_long forgemask (u_long);
137 static void domask (char *, u_long, u_long);
138 static const char *labelops(struct rtentry *);
139 
140 /*
141  * Print routing tables.
142  */
143 void
144 routepr(u_long rtree)
145 {
146 	struct radix_node_head *rnh, head;
147 	int i;
148 
149 	printf("Routing tables\n");
150 
151 	if (Aflag == 0 && NewTree) {
152 		ntreestuff();
153 	} else {
154 		if (rtree == 0) {
155 			printf("rt_tables: symbol not in namelist\n");
156 			return;
157 		}
158 		if (cpuflag >= 0) {
159 			/*
160 			 * Severe hack.
161 			 */
162 			rtree += cpuflag * (AF_MAX + 1) * sizeof(void *);
163 		}
164 		if (kget(rtree, rt_tables) != 0)
165 			return;
166 		for (i = 0; i <= AF_MAX; i++) {
167 			if ((rnh = rt_tables[i]) == NULL)
168 				continue;
169 			if (kget(rnh, head) != 0)
170 				continue;
171 			if (i == AF_UNSPEC) {
172 				if (Aflag && af == 0) {
173 					printf("Netmasks:\n");
174 					p_tree(head.rnh_treetop);
175 				}
176 			} else if (af == AF_UNSPEC || af == i) {
177 				size_cols(i, head.rnh_treetop);
178 				pr_family(i);
179 				do_rtent = 1;
180 				pr_rthdr(i);
181 				p_tree(head.rnh_treetop);
182 			}
183 		}
184 	}
185 }
186 
187 /*
188  * Print address family header before a section of the routing table.
189  */
190 void
191 pr_family(int af1)
192 {
193 	const char *afname;
194 
195 	switch (af1) {
196 	case AF_INET:
197 		afname = "Internet";
198 		break;
199 #ifdef INET6
200 	case AF_INET6:
201 		afname = "Internet6";
202 		break;
203 #endif /*INET6*/
204 	case AF_IPX:
205 		afname = "IPX";
206 		break;
207 	case AF_ISO:
208 		afname = "ISO";
209 		break;
210 	case AF_CCITT:
211 		afname = "X.25";
212 		break;
213 	case AF_NETGRAPH:
214 		afname = "Netgraph";
215 		break;
216 	case AF_MPLS:
217 		afname = "MPLS";
218 		break;
219 	default:
220 		afname = NULL;
221 		break;
222 	}
223 	if (afname)
224 		printf("\n%s:\n", afname);
225 	else
226 		printf("\nProtocol Family %d:\n", af1);
227 }
228 
229 /* column widths; each followed by one space */
230 #ifndef INET6
231 #define	WID_DST_DEFAULT(af) 	18	/* width of destination column */
232 #define	WID_GW_DEFAULT(af)	18	/* width of gateway column */
233 #define	WID_IF_DEFAULT(af)	(Wflag ? 8 : 6)	/* width of netif column */
234 #else
235 #define	WID_DST_DEFAULT(af) \
236 	((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18)
237 #define	WID_GW_DEFAULT(af) \
238 	((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18)
239 #define	WID_IF_DEFAULT(af)	((af) == AF_INET6 ? 8 : (Wflag ? 8 :6))
240 #endif /*INET6*/
241 
242 static int wid_dst;
243 static int wid_gw;
244 static int wid_flags;
245 static int wid_refs;
246 static int wid_use;
247 static int wid_mtu;
248 static int wid_if;
249 static int wid_expire;
250 static int wid_mplslops;
251 static int wid_msl;
252 static int wid_iwmax;
253 static int wid_iw;
254 
255 static void
256 size_cols(int ef, struct radix_node *rn)
257 {
258 	wid_dst = WID_DST_DEFAULT(ef);
259 	wid_gw = WID_GW_DEFAULT(ef);
260 	wid_flags = 6;
261 	wid_refs = 6;
262 	wid_use = 8;
263 	wid_mtu = 6;
264 	wid_if = WID_IF_DEFAULT(ef);
265 	wid_expire = 6;
266 	wid_mplslops = 7;
267 	wid_msl = 7;
268 	wid_iwmax = 5;
269 	wid_iw = 2;
270 
271 	if (Wflag)
272 		size_cols_tree(rn);
273 }
274 
275 static void
276 size_cols_tree(struct radix_node *rn)
277 {
278 again:
279 	if (kget(rn, rnode) != 0)
280 		return;
281 	if (!(rnode.rn_flags & RNF_ACTIVE))
282 		return;
283 	if (rnode.rn_bit < 0) {
284 		if ((rnode.rn_flags & RNF_ROOT) == 0) {
285 			if (kget(rn, rtentry) != 0)
286 				return;
287 			size_cols_rtentry(&rtentry);
288 		}
289 		if ((rn = rnode.rn_dupedkey))
290 			goto again;
291 	} else {
292 		rn = rnode.rn_right;
293 		size_cols_tree(rnode.rn_left);
294 		size_cols_tree(rn);
295 	}
296 }
297 
298 static void
299 size_cols_rtentry(struct rtentry *rt)
300 {
301 	static struct ifnet ifnet, *lastif;
302 	struct rtentry parent;
303 	static char buffer[100];
304 	const char *bp;
305 	struct sockaddr *sa;
306 	sa_u addr, mask;
307 	int len;
308 
309 	/*
310 	 * Don't print protocol-cloned routes unless -a.
311 	 */
312 	if (rt->rt_flags & RTF_WASCLONED && !aflag) {
313 		if (kget(rt->rt_parent, parent) != 0)
314 			return;
315 		if (parent.rt_flags & RTF_PRCLONING)
316 			return;
317 	}
318 
319 	bzero(&addr, sizeof(addr));
320 	if ((sa = kgetsa(rt_key(rt))))
321 		bcopy(sa, &addr, sa->sa_len);
322 	bzero(&mask, sizeof(mask));
323 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
324 		bcopy(sa, &mask, sa->sa_len);
325 	bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags);
326 	len = strlen(bp);
327 	wid_dst = MAX(len, wid_dst);
328 
329 	bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST);
330 	len = strlen(bp);
331 	wid_gw = MAX(len, wid_gw);
332 
333 	bp = fmt_flags(rt->rt_flags);
334 	len = strlen(bp);
335 	wid_flags = MAX(len, wid_flags);
336 
337 	if (addr.u_sa.sa_family == AF_INET || Wflag) {
338 		len = snprintf(buffer, sizeof(buffer), "%ld", rt->rt_refcnt);
339 		wid_refs = MAX(len, wid_refs);
340 		len = snprintf(buffer, sizeof(buffer), "%lu", rt->rt_use);
341 		wid_use = MAX(len, wid_use);
342 		if (Wflag && rt->rt_rmx.rmx_mtu != 0) {
343 			len = snprintf(buffer, sizeof(buffer),
344 				       "%lu", rt->rt_rmx.rmx_mtu);
345 			wid_mtu = MAX(len, wid_mtu);
346 		}
347 	}
348 	if (rt->rt_ifp) {
349 		if (rt->rt_ifp != lastif) {
350 			if (kget(rt->rt_ifp, ifnet) == 0)
351 				len = strlen(ifnet.if_xname);
352 			else
353 				len = strlen("---");
354 			lastif = rt->rt_ifp;
355 			wid_if = MAX(len, wid_if);
356 		}
357 		if (rt->rt_rmx.rmx_expire) {
358 			time_t expire_time;
359 
360 			if ((expire_time =
361 			    rt->rt_rmx.rmx_expire - time(NULL)) > 0) {
362 				snprintf(buffer, sizeof(buffer), "%d",
363 					 (int)expire_time);
364 				wid_expire = MAX(len, wid_expire);
365 			}
366 		}
367 	}
368 	if (Wflag) {
369 		if (rt->rt_shim[0] != NULL) {
370 			len = strlen(labelops(rt));
371 			wid_mplslops = MAX(len, wid_mplslops);
372 		}
373 
374 		if (rt->rt_rmx.rmx_msl) {
375 			len = snprintf(buffer, sizeof(buffer),
376 				       "%lu", rt->rt_rmx.rmx_msl);
377 			wid_msl = MAX(len, wid_msl);
378 		}
379 		if (rt->rt_rmx.rmx_iwmaxsegs) {
380 			len = snprintf(buffer, sizeof(buffer),
381 				       "%lu", rt->rt_rmx.rmx_iwmaxsegs);
382 			wid_iwmax = MAX(len, wid_iwmax);
383 		}
384 		if (rt->rt_rmx.rmx_iwcapsegs) {
385 			len = snprintf(buffer, sizeof(buffer),
386 				       "%lu", rt->rt_rmx.rmx_iwcapsegs);
387 			wid_iw = MAX(len, wid_iw);
388 		}
389 	}
390 }
391 
392 
393 /*
394  * Print header for routing table columns.
395  */
396 void
397 pr_rthdr(int af1)
398 {
399 
400 	if (Aflag)
401 		printf("%-8.8s ","Address");
402 	if (af1 == AF_INET || Wflag) {
403 		if (Wflag) {
404 			printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*.*s "
405 			       "%*s %-*s%*s %*s %*s\n",
406 				wid_dst,	wid_dst,	"Destination",
407 				wid_gw,		wid_gw,		"Gateway",
408 				wid_flags,	wid_flags,	"Flags",
409 				wid_refs,	wid_refs,	"Refs",
410 				wid_use,	wid_use,	"Use",
411 				wid_mtu,	wid_mtu,	"Mtu",
412 				wid_if,		wid_if,		"Netif",
413 				wid_expire,			"Expire",
414 				wid_mplslops,			"Labelops",
415 				wid_msl,			"Msl",
416 				wid_iwmax,			"IWmax",
417 				wid_iw,				"IW");
418 		} else {
419 			printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*s\n",
420 				wid_dst,	wid_dst,	"Destination",
421 				wid_gw,		wid_gw,		"Gateway",
422 				wid_flags,	wid_flags,	"Flags",
423 				wid_refs,	wid_refs,	"Refs",
424 				wid_use,	wid_use,	"Use",
425 				wid_if,		wid_if,		"Netif",
426 				wid_expire,			"Expire");
427 		}
428 	} else {
429 		printf("%-*.*s %-*.*s %-*.*s  %*.*s %*s\n",
430 			wid_dst,	wid_dst,	"Destination",
431 			wid_gw,		wid_gw,		"Gateway",
432 			wid_flags,	wid_flags,	"Flags",
433 			wid_if,		wid_if,		"Netif",
434 			wid_expire,			"Expire");
435 	}
436 }
437 
438 static struct sockaddr *
439 kgetsa(struct sockaddr *dst)
440 {
441 
442 	if (kget(dst, pt_u.u_sa) != 0)
443 		return (NULL);
444 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
445 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
446 	return (&pt_u.u_sa);
447 }
448 
449 static void
450 p_tree(struct radix_node *rn)
451 {
452 
453 again:
454 	if (kget(rn, rnode) != 0)
455 		return;
456 	if (!(rnode.rn_flags & RNF_ACTIVE))
457 		return;
458 	if (rnode.rn_bit < 0) {
459 		if (Aflag)
460 			printf("%-8.8lx ", (u_long)rn);
461 		if (rnode.rn_flags & RNF_ROOT) {
462 			if (Aflag)
463 				printf("(root node)%s",
464 				    rnode.rn_dupedkey ? " =>\n" : "\n");
465 		} else if (do_rtent) {
466 			if (kget(rn, rtentry) == 0) {
467 				p_rtentry(&rtentry);
468 				if (Aflag)
469 					p_rtnode();
470 			}
471 		} else {
472 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
473 				   NULL, 0, 44);
474 			putchar('\n');
475 		}
476 		if ((rn = rnode.rn_dupedkey))
477 			goto again;
478 	} else {
479 		if (Aflag && do_rtent) {
480 			printf("%-8.8lx ", (u_long)rn);
481 			p_rtnode();
482 		}
483 		rn = rnode.rn_right;
484 		p_tree(rnode.rn_left);
485 		p_tree(rn);
486 	}
487 }
488 
489 char	nbuf[20];
490 
491 static void
492 p_rtnode(void)
493 {
494 	struct radix_mask *rm = rnode.rn_mklist;
495 
496 	if (rnode.rn_bit < 0) {
497 		if (rnode.rn_mask) {
498 			printf("\t  mask ");
499 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
500 				   NULL, 0, -1);
501 		} else if (rm == NULL)
502 			return;
503 	} else {
504 		sprintf(nbuf, "(%d)", rnode.rn_bit);
505 		printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long)rnode.rn_left, (u_long)rnode.rn_right);
506 	}
507 	while (rm) {
508 		if (kget(rm, rmask) != 0)
509 			break;
510 		sprintf(nbuf, " %d refs, ", rmask.rm_refs);
511 		printf(" mk = %8.8lx {(%d),%s",
512 			(u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " ");
513 		if (rmask.rm_flags & RNF_NORMAL) {
514 			struct radix_node rnode_aux;
515 			printf(" <normal>, ");
516 			if (kget(rmask.rm_leaf, rnode_aux) == 0)
517 				p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
518 				    NULL, 0, -1);
519 			else
520 				p_sockaddr(NULL, NULL, 0, -1);
521 		} else
522 		    p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
523 				NULL, 0, -1);
524 		putchar('}');
525 		if ((rm = rmask.rm_next))
526 			printf(" ->");
527 	}
528 	putchar('\n');
529 }
530 
531 static void
532 ntreestuff(void)
533 {
534 	size_t needed;
535 	int mib[7];
536 	int miblen;
537 	char *buf, *next, *lim;
538 	struct rt_msghdr *rtm;
539 
540 	mib[0] = CTL_NET;
541 	mib[1] = PF_ROUTE;
542 	mib[2] = 0;
543 	mib[3] = 0;
544 	mib[4] = NET_RT_DUMP;
545 	mib[5] = 0;
546 	if (cpuflag >= 0) {
547 		mib[6] = cpuflag;
548 		miblen = 7;
549 	} else {
550 		miblen = 6;
551 	}
552 	if (sysctl(mib, miblen, NULL, &needed, NULL, 0) < 0) {
553 		err(1, "sysctl: net.route.0.0.dump estimate");
554 	}
555 
556 	if ((buf = malloc(needed)) == NULL) {
557 		err(2, "malloc(%lu)", (unsigned long)needed);
558 	}
559 	if (sysctl(mib, miblen, buf, &needed, NULL, 0) < 0) {
560 		err(1, "sysctl: net.route.0.0.dump");
561 	}
562 	lim  = buf + needed;
563 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
564 		rtm = (struct rt_msghdr *)next;
565 		np_rtentry(rtm);
566 	}
567 }
568 
569 static void
570 np_rtentry(struct rt_msghdr *rtm)
571 {
572 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
573 #ifdef notdef
574 	static int masks_done, banner_printed;
575 #endif
576 	static int old_af;
577 	int af1 = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
578 
579 #ifdef notdef
580 	/* for the moment, netmasks are skipped over */
581 	if (!banner_printed) {
582 		printf("Netmasks:\n");
583 		banner_printed = 1;
584 	}
585 	if (masks_done == 0) {
586 		if (rtm->rtm_addrs != RTA_DST ) {
587 			masks_done = 1;
588 			af1 = sa->sa_family;
589 		}
590 	} else
591 #endif
592 		af1 = sa->sa_family;
593 	if (af1 != old_af) {
594 		pr_family(af1);
595 		old_af = af1;
596 	}
597 	if (rtm->rtm_addrs == RTA_DST)
598 		p_sockaddr(sa, NULL, 0, 36);
599 	else {
600 		p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
601 		sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa);
602 		p_sockaddr(sa, NULL, 0, 18);
603 	}
604 	p_flags(rtm->rtm_flags & interesting, "%-6.6s ");
605 	putchar('\n');
606 }
607 
608 static void
609 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
610 {
611 	const char *cp;
612 
613 	cp = fmt_sockaddr(sa, mask, flags);
614 
615 	if (width < 0 )
616 		printf("%s ", cp);
617 	else {
618 		if (numeric_addr)
619 			printf("%-*s ", width, cp);
620 		else
621 			printf("%-*.*s ", width, width, cp);
622 	}
623 }
624 
625 static const char *
626 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags)
627 {
628 	static char workbuf[128];
629 	const char *cp = workbuf;
630 
631 	if (sa == NULL)
632 		return ("null");
633 
634 	switch(sa->sa_family) {
635 	case AF_INET:
636 	    {
637 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
638 
639 		if ((sin->sin_addr.s_addr == INADDR_ANY) &&
640 			mask &&
641 			ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr)
642 				==0L)
643 				cp = "default" ;
644 		else if (flags & RTF_HOST)
645 			cp = routename(sin->sin_addr.s_addr);
646 		else if (mask)
647 			cp = netname(sin->sin_addr.s_addr,
648 				     ntohl(((struct sockaddr_in *)mask)
649 					   ->sin_addr.s_addr));
650 		else
651 			cp = netname(sin->sin_addr.s_addr, 0L);
652 		break;
653 	    }
654 
655 #ifdef INET6
656 	case AF_INET6:
657 	    {
658 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
659 		struct in6_addr *in6 = &sa6->sin6_addr;
660 
661 		/*
662 		 * XXX: This is a special workaround for KAME kernels.
663 		 * sin6_scope_id field of SA should be set in the future.
664 		 */
665 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
666 		    IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
667 		    /* XXX: override is ok? */
668 		    sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
669 		    *(u_short *)&in6->s6_addr[2] = 0;
670 		}
671 
672 		if (flags & RTF_HOST)
673 		    cp = routename6(sa6);
674 		else if (mask)
675 		    cp = netname6(sa6,
676 				  &((struct sockaddr_in6 *)mask)->sin6_addr);
677 		else {
678 		    cp = netname6(sa6, NULL);
679 		}
680 		break;
681 	    }
682 #endif /*INET6*/
683 
684 	case AF_IPX:
685 	    {
686 		struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr;
687 		if (ipx_nullnet(satoipx_addr(work)))
688 			cp = "default";
689 		else
690 			cp = ipx_print(sa);
691 		break;
692 	    }
693 	case AF_NETGRAPH:
694 	    {
695 		printf("%s", ((struct sockaddr_ng *)sa)->sg_data);
696 		break;
697 	    }
698 	case AF_LINK:
699 	    {
700 		struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
701 
702 		if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
703 		    sdl->sdl_slen == 0)
704 			(void) sprintf(workbuf, "link#%d", sdl->sdl_index);
705 		else
706 			switch (sdl->sdl_type) {
707 
708 			case IFT_ETHER:
709 			case IFT_L2VLAN:
710 			case IFT_CARP:
711 				if (sdl->sdl_alen == ETHER_ADDR_LEN) {
712 					cp = ether_ntoa((struct ether_addr *)
713 					    (sdl->sdl_data + sdl->sdl_nlen));
714 					break;
715 				}
716 				/* FALLTHROUGH */
717 			default:
718 				cp = link_ntoa(sdl);
719 				break;
720 			}
721 		break;
722 	    }
723 
724 	case AF_MPLS:
725 	    {
726 		struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa;
727 
728 		(void) sprintf(workbuf, "%d", ntohl(smpls->smpls_label));
729 		break;
730 	    }
731 
732 	default:
733 	    {
734 		u_char *s = (u_char *)sa->sa_data, *slim;
735 		char *cq, *cqlim;
736 
737 		cq = workbuf;
738 		slim =  sa->sa_len + (u_char *) sa;
739 		cqlim = cq + sizeof(workbuf) - 6;
740 		cq += sprintf(cq, "(%d)", sa->sa_family);
741 		while (s < slim && cq < cqlim) {
742 			cq += sprintf(cq, " %02x", *s++);
743 			if (s < slim)
744 			    cq += sprintf(cq, "%02x", *s++);
745 		}
746 		cp = workbuf;
747 	    }
748 	}
749 
750 	return (cp);
751 }
752 
753 static void
754 p_flags(int f, const char *format)
755 {
756 	printf(format, fmt_flags(f));
757 }
758 
759 static const char *
760 fmt_flags(int f)
761 {
762 	static char name[33];
763 	char *flags;
764 	struct bits *p = bits;
765 
766 	for (flags = name; p->b_mask; p++)
767 		if (p->b_mask & f)
768 			*flags++ = p->b_val;
769 	*flags = '\0';
770 	return (name);
771 }
772 
773 static void
774 p_rtentry(struct rtentry *rt)
775 {
776 	static struct ifnet ifnet, *lastif;
777 	struct rtentry parent;
778 	static char buffer[128];
779 	static char prettyname[128];
780 	struct sockaddr *sa;
781 	sa_u addr, mask;
782 
783 	/*
784 	 * Don't print protocol-cloned routes unless -a.
785 	 */
786 	if (rt->rt_flags & RTF_WASCLONED && !aflag) {
787 		if (kget(rt->rt_parent, parent) != 0)
788 			return;
789 		if (parent.rt_flags & RTF_PRCLONING)
790 			return;
791 	}
792 
793 	bzero(&addr, sizeof(addr));
794 	if ((sa = kgetsa(rt_key(rt))))
795 		bcopy(sa, &addr, sa->sa_len);
796 	bzero(&mask, sizeof(mask));
797 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
798 		bcopy(sa, &mask, sa->sa_len);
799 	p_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags, wid_dst);
800 	p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw);
801 	snprintf(buffer, sizeof(buffer), "%%-%d.%ds ", wid_flags, wid_flags);
802 	p_flags(rt->rt_flags, buffer);
803 	if (addr.u_sa.sa_family == AF_INET || Wflag) {
804 		printf("%*ld %*lu ", wid_refs, rt->rt_refcnt,
805 				     wid_use, rt->rt_use);
806 		if (Wflag) {
807 			if (rt->rt_rmx.rmx_mtu != 0)
808 				printf("%*lu ", wid_mtu, rt->rt_rmx.rmx_mtu);
809 			else
810 				printf("%*s ", wid_mtu, "");
811 		}
812 	}
813 	if (rt->rt_ifp) {
814 		if (rt->rt_ifp != lastif) {
815 			if (kget(rt->rt_ifp, ifnet) == 0)
816 				strlcpy(prettyname, ifnet.if_xname,
817 				    sizeof(prettyname));
818 			else
819 				strlcpy(prettyname, "---", sizeof(prettyname));
820 			lastif = rt->rt_ifp;
821 		}
822 		printf("%*.*s", wid_if, wid_if, prettyname);
823 		if (rt->rt_rmx.rmx_expire) {
824 			time_t expire_time;
825 
826 			if ((expire_time =
827 			    rt->rt_rmx.rmx_expire - time(NULL)) > 0)
828 				printf(" %*d", wid_expire, (int)expire_time);
829 			else
830 				printf("%*s ", wid_expire, "");
831 		} else {
832 			printf("%*s ", wid_expire, "");
833 		}
834 		if (rt->rt_nodes[0].rn_dupedkey)
835 			printf(" =>");
836 	}
837 	if (Wflag) {
838 		if (rt->rt_shim[0] != NULL)
839 			printf(" %-*s", wid_mplslops, labelops(rt));
840 		else
841 			printf(" %-*s", wid_mplslops, "");
842 		if (rt->rt_rmx.rmx_msl != 0)
843 			printf(" %*lu", wid_msl, rt->rt_rmx.rmx_msl);
844 		else
845 			printf("%*s ", wid_msl, "");
846 		if (rt->rt_rmx.rmx_iwmaxsegs != 0)
847 			printf(" %*lu", wid_iwmax, rt->rt_rmx.rmx_iwmaxsegs);
848 		else
849 			printf("%*s ", wid_iwmax, "");
850 		if (rt->rt_rmx.rmx_iwcapsegs != 0)
851 			printf(" %*lu", wid_iw, rt->rt_rmx.rmx_iwcapsegs);
852 		else
853 			printf("%*s ", wid_iw, "");
854 	}
855 	putchar('\n');
856 }
857 
858 char *
859 routename(u_long in)
860 {
861 	char *cp;
862 	static char line[MAXHOSTNAMELEN];
863 	struct hostent *hp;
864 
865 	cp = NULL;
866 	if (!numeric_addr) {
867 		hp = gethostbyaddr(&in, sizeof (struct in_addr), AF_INET);
868 		if (hp) {
869 			cp = hp->h_name;
870 			trimdomain(cp, strlen(cp));
871 		}
872 	}
873 	if (cp) {
874 		strncpy(line, cp, sizeof(line) - 1);
875 		line[sizeof(line) - 1] = '\0';
876 	} else {
877 #define C(x)	((x) & 0xff)
878 		in = ntohl(in);
879 		sprintf(line, "%lu.%lu.%lu.%lu",
880 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
881 	}
882 	return (line);
883 }
884 
885 static u_long
886 forgemask(u_long a)
887 {
888 	u_long m;
889 
890 	if (IN_CLASSA(a))
891 		m = IN_CLASSA_NET;
892 	else if (IN_CLASSB(a))
893 		m = IN_CLASSB_NET;
894 	else
895 		m = IN_CLASSC_NET;
896 	return (m);
897 }
898 
899 static void
900 domask(char *dst, u_long addr, u_long mask)
901 {
902 	int b, i;
903 
904 	if (!mask || (forgemask(addr) == mask)) {
905 		*dst = '\0';
906 		return;
907 	}
908 	i = 0;
909 	for (b = 0; b < 32; b++)
910 		if (mask & (1 << b)) {
911 			int bb;
912 
913 			i = b;
914 			for (bb = b+1; bb < 32; bb++)
915 				if (!(mask & (1 << bb))) {
916 					i = -1;	/* noncontig */
917 					break;
918 				}
919 			break;
920 		}
921 	if (i == -1)
922 		sprintf(dst, "&0x%lx", mask);
923 	else
924 		sprintf(dst, "/%d", 32-i);
925 }
926 
927 /*
928  * Return the name of the network whose address is given.
929  * The address is assumed to be that of a net or subnet, not a host.
930  */
931 char *
932 netname(u_long in, u_long mask)
933 {
934 	char *cp = NULL;
935 	static char line[MAXHOSTNAMELEN];
936 	struct netent *np = NULL;
937 	u_long dmask;
938 	u_long i;
939 
940 #define	NSHIFT(m) (							\
941 	(m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT :			\
942 	(m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT :			\
943 	(m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT :			\
944 	0)
945 
946 	i = ntohl(in);
947 	dmask = forgemask(i);
948 	if (!numeric_addr && i) {
949 		np = getnetbyaddr(i >> NSHIFT(mask), AF_INET);
950 		if (np == NULL && mask == 0)
951 			np = getnetbyaddr(i >> NSHIFT(dmask), AF_INET);
952 		if (np != NULL) {
953 			cp = np->n_name;
954 			trimdomain(cp, strlen(cp));
955 		}
956 	}
957 #undef NSHIFT
958 	if (cp != NULL) {
959 		strncpy(line, cp, sizeof(line) - 1);
960 		line[sizeof(line) - 1] = '\0';
961 	} else {
962 		if (mask <= IN_CLASSA_NET &&
963 			(i & IN_CLASSA_HOST) == 0) {
964 				sprintf(line, "%lu", C(i >> 24));
965 		} else if (mask <= IN_CLASSB_NET &&
966 			(i & IN_CLASSB_HOST) == 0) {
967 				sprintf(line, "%lu.%lu",
968 					C(i >> 24), C(i >> 16));
969 		} else if (mask <= IN_CLASSC_NET &&
970 			(i & IN_CLASSC_HOST) == 0) {
971 				sprintf(line, "%lu.%lu.%lu",
972 					C(i >> 24), C(i >> 16), C(i >> 8));
973 		} else {
974 			sprintf(line, "%lu.%lu.%lu.%lu",
975 				C(i >> 24), C(i >> 16), C(i >> 8), C(i));
976 		}
977 	}
978 	domask(line + strlen(line), i, mask);
979 	return (line);
980 }
981 
982 #ifdef INET6
983 const char *
984 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask)
985 {
986 	static char line[MAXHOSTNAMELEN];
987 	u_char *p = (u_char *)mask;
988 	u_char *lim;
989 	int masklen, illegal = 0, flag = NI_WITHSCOPEID;
990 
991 	if (mask) {
992 		for (masklen = 0, lim = p + 16; p < lim; p++) {
993 			switch (*p) {
994 			 case 0xff:
995 				 masklen += 8;
996 				 break;
997 			 case 0xfe:
998 				 masklen += 7;
999 				 break;
1000 			 case 0xfc:
1001 				 masklen += 6;
1002 				 break;
1003 			 case 0xf8:
1004 				 masklen += 5;
1005 				 break;
1006 			 case 0xf0:
1007 				 masklen += 4;
1008 				 break;
1009 			 case 0xe0:
1010 				 masklen += 3;
1011 				 break;
1012 			 case 0xc0:
1013 				 masklen += 2;
1014 				 break;
1015 			 case 0x80:
1016 				 masklen += 1;
1017 				 break;
1018 			 case 0x00:
1019 				 break;
1020 			 default:
1021 				 illegal ++;
1022 				 break;
1023 			}
1024 		}
1025 		if (illegal)
1026 			fprintf(stderr, "illegal prefixlen\n");
1027 	}
1028 	else
1029 		masklen = 128;
1030 
1031 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
1032 		return("default");
1033 
1034 	if (numeric_addr)
1035 		flag |= NI_NUMERICHOST;
1036 	getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line),
1037 		    NULL, 0, flag);
1038 
1039 	if (numeric_addr)
1040 		sprintf(&line[strlen(line)], "/%d", masklen);
1041 
1042 	return line;
1043 }
1044 
1045 char *
1046 routename6(struct sockaddr_in6 *sa6)
1047 {
1048 	static char line[MAXHOSTNAMELEN];
1049 	int flag = NI_WITHSCOPEID;
1050 	/* use local variable for safety */
1051 	struct sockaddr_in6 sa6_local;
1052 
1053 	sa6_local.sin6_family = AF_INET6;
1054 	sa6_local.sin6_len = sizeof(sa6_local);
1055 	sa6_local.sin6_addr = sa6->sin6_addr;
1056 	sa6_local.sin6_scope_id = sa6->sin6_scope_id;
1057 
1058 	if (numeric_addr)
1059 		flag |= NI_NUMERICHOST;
1060 
1061 	getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
1062 		    line, sizeof(line), NULL, 0, flag);
1063 
1064 	return line;
1065 }
1066 #endif /*INET6*/
1067 
1068 /*
1069  * Print routing statistics
1070  */
1071 void
1072 rt_stats(void)
1073 {
1074 	struct rtstatistics rts;
1075 	int error = 0;
1076 
1077 	error = kinfo_get_net_rtstatistics(&rts);
1078 	if (error) {
1079 		printf("routing: could not retrieve statistics\n");
1080 		return;
1081 	}
1082 	printf("routing:\n");
1083 
1084 #define	p(f, m) if (rts.f || sflag <= 1) \
1085 	printf(m, rts.f, plural(rts.f))
1086 
1087 	p(rts_badredirect, "\t%lu bad routing redirect%s\n");
1088 	p(rts_dynamic, "\t%lu dynamically created route%s\n");
1089 	p(rts_newgateway, "\t%lu new gateway%s due to redirects\n");
1090 	p(rts_unreach, "\t%lu destination%s found unreachable\n");
1091 	p(rts_wildcard, "\t%lu use%s of a wildcard route\n");
1092 #undef p
1093 }
1094 
1095 char *
1096 ipx_print(struct sockaddr *sa)
1097 {
1098 	u_short port;
1099 	struct servent *sp = NULL;
1100 	const char *net = "", *host = "";
1101 	char *p;
1102 	u_char *q;
1103 	struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr;
1104 	static char mybuf[50];
1105 	char cport[10], chost[15], cnet[15];
1106 
1107 	port = ntohs(work.x_port);
1108 
1109 	if (ipx_nullnet(work) && ipx_nullhost(work)) {
1110 
1111 		if (port) {
1112 			if (sp)
1113 				sprintf(mybuf, "*.%s", sp->s_name);
1114 			else
1115 				sprintf(mybuf, "*.%x", port);
1116 		} else
1117 			sprintf(mybuf, "*.*");
1118 
1119 		return (mybuf);
1120 	}
1121 
1122 	if (ipx_wildnet(work))
1123 		net = "any";
1124 	else if (ipx_nullnet(work))
1125 		net = "*";
1126 	else {
1127 		q = work.x_net.c_net;
1128 		sprintf(cnet, "%02x%02x%02x%02x",
1129 			q[0], q[1], q[2], q[3]);
1130 		for (p = cnet; *p == '0' && p < cnet + 8; p++)
1131 			continue;
1132 		net = p;
1133 	}
1134 
1135 	if (ipx_wildhost(work))
1136 		host = "any";
1137 	else if (ipx_nullhost(work))
1138 		host = "*";
1139 	else {
1140 		q = work.x_host.c_host;
1141 		sprintf(chost, "%02x%02x%02x%02x%02x%02x",
1142 			q[0], q[1], q[2], q[3], q[4], q[5]);
1143 		for (p = chost; *p == '0' && p < chost + 12; p++)
1144 			continue;
1145 		host = p;
1146 	}
1147 
1148 	if (port) {
1149 		if (strcmp(host, "*") == 0)
1150 			host = "";
1151 		if (sp)
1152 			snprintf(cport, sizeof(cport),
1153 				"%s%s", *host ? "." : "", sp->s_name);
1154 		else
1155 			snprintf(cport, sizeof(cport),
1156 				"%s%x", *host ? "." : "", port);
1157 	} else
1158 		*cport = 0;
1159 
1160 	snprintf(mybuf, sizeof(mybuf), "%s.%s%s", net, host, cport);
1161 	return(mybuf);
1162 }
1163 
1164 char *
1165 ipx_phost(struct sockaddr *sa)
1166 {
1167 	struct sockaddr_ipx *sipx = (struct sockaddr_ipx *)sa;
1168 	struct sockaddr_ipx work;
1169 	static union ipx_net ipx_zeronet;
1170 	char *p;
1171 
1172 	work = *sipx;
1173 	work.sipx_addr.x_port = 0;
1174 	work.sipx_addr.x_net = ipx_zeronet;
1175 	p = ipx_print((struct sockaddr *)&work);
1176 	if (strncmp("*.", p, 2) == 0) p += 2;
1177 
1178 	return(p);
1179 }
1180 
1181 void
1182 upHex(char *p0)
1183 {
1184 	char *p = p0;
1185 
1186 	for (; *p; p++)
1187 		switch (*p) {
1188 
1189 		case 'a':
1190 		case 'b':
1191 		case 'c':
1192 		case 'd':
1193 		case 'e':
1194 		case 'f':
1195 			*p += ('A' - 'a');
1196 			break;
1197 		}
1198 }
1199 
1200 static const char *
1201 labelops(struct rtentry *rt)
1202 {
1203 	const char *lops[] = { "push", "pop", "swap", "pop all" };
1204 	static char buffer[100];
1205 	char *cp = buffer;
1206 	struct sockaddr_mpls *smpls;
1207 	int i;
1208 
1209 	for (i=0; i<MPLS_MAXLOPS; ++i) {
1210 
1211 		if (rt->rt_shim[i] == NULL)
1212 			break;
1213 		if (i>0) {
1214 			cp += snprintf(cp,
1215 				       sizeof(buffer) - (cp - buffer),
1216 				       ", ");
1217 		}
1218 		smpls = (struct sockaddr_mpls *)kgetsa(rt->rt_shim[i]);
1219 		if (smpls->smpls_op != MPLSLOP_POP &&
1220 		    smpls->smpls_op != MPLSLOP_POPALL){
1221 			cp += snprintf(cp,
1222 				       sizeof(buffer) - (cp - buffer),
1223 				       "%s %d",
1224 				       lops[smpls->smpls_op - 1],
1225 				       ntohl(smpls->smpls_label));
1226 		} else {
1227 			cp += snprintf(cp,
1228 				       sizeof(buffer) - (cp - buffer),
1229 				       "%s",
1230 				       lops[smpls->smpls_op - 1]);
1231 		}
1232 	}
1233 
1234 	return (buffer);
1235 }
1236