xref: /dragonfly/usr.bin/netstat/route.c (revision 5f39c7e7)
1 /*
2  * Copyright (c) 1983, 1988, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. Neither the name of the University nor the names of its contributors
14  *    may be used to endorse or promote products derived from this software
15  *    without specific prior written permission.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  *
29  * @(#)route.c	8.6 (Berkeley) 4/28/95
30  * $FreeBSD: src/usr.bin/netstat/route.c,v 1.41.2.14 2002/07/17 02:22:22 kbyanc Exp $
31  */
32 
33 #include <sys/kinfo.h>
34 #include <sys/param.h>
35 #include <sys/socket.h>
36 #include <sys/time.h>
37 
38 #include <net/ethernet.h>
39 #include <net/if.h>
40 #include <net/if_var.h>
41 #include <net/if_dl.h>
42 #include <net/if_types.h>
43 #include <net/route.h>
44 
45 #include <netinet/in.h>
46 #include <netgraph/socket/ng_socket.h>
47 
48 #include <netproto/mpls/mpls.h>
49 
50 #include <sys/sysctl.h>
51 
52 #include <arpa/inet.h>
53 #include <libutil.h>
54 #include <netdb.h>
55 #include <stdio.h>
56 #include <stdlib.h>
57 #include <string.h>
58 #include <unistd.h>
59 #include <err.h>
60 #include <time.h>
61 #include <kinfo.h>
62 #include "netstat.h"
63 
64 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
65 
66 
67 /* alignment constraint for routing socket */
68 #define ROUNDUP(a) \
69        ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
70 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
71 
72 /*
73  * Definitions for showing gateway flags.
74  */
75 struct bits {
76 	u_long	b_mask;
77 	char	b_val;
78 } bits[] = {
79 	{ RTF_UP,	'U' },
80 	{ RTF_GATEWAY,	'G' },
81 	{ RTF_HOST,	'H' },
82 	{ RTF_REJECT,	'R' },
83 	{ RTF_DYNAMIC,	'D' },
84 	{ RTF_MODIFIED,	'M' },
85 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
86 	{ RTF_CLONING,	'C' },
87 	{ RTF_XRESOLVE,	'X' },
88 	{ RTF_LLINFO,	'L' },
89 	{ RTF_STATIC,	'S' },
90 	{ RTF_PROTO1,	'1' },
91 	{ RTF_PROTO2,	'2' },
92 	{ RTF_WASCLONED,'W' },
93 	{ RTF_PRCLONING,'c' },
94 	{ RTF_PROTO3,	'3' },
95 	{ RTF_BLACKHOLE,'B' },
96 	{ RTF_BROADCAST,'b' },
97 	{ RTF_MPLSOPS,	'm' },
98 	{ 0, 0 }
99 };
100 
101 typedef union {
102 	long	dummy;		/* Helps align structure. */
103 	struct	sockaddr u_sa;
104 	u_short	u_data[128];
105 } sa_u;
106 
107 static sa_u pt_u;
108 
109 int	do_rtent = 0;
110 struct	rtentry rtentry;
111 struct	radix_node rnode;
112 struct	radix_mask rmask;
113 struct	radix_node_head *rt_tables[AF_MAX+1];
114 
115 int	NewTree = 0;
116 
117 static struct sockaddr *kgetsa (struct sockaddr *);
118 static void size_cols (int ef, struct radix_node *rn);
119 static void size_cols_tree (struct radix_node *rn);
120 static void size_cols_rtentry (struct rtentry *rt);
121 static void p_tree (struct radix_node *);
122 static void p_rtnode (void);
123 static void ntreestuff (void);
124 static void np_rtentry (struct rt_msghdr *);
125 static void p_sockaddr (struct sockaddr *, struct sockaddr *, int, int);
126 static const char *fmt_sockaddr (struct sockaddr *sa, struct sockaddr *mask,
127 				 int flags);
128 static void p_flags (int, const char *);
129 static const char *fmt_flags(int f);
130 static void p_rtentry (struct rtentry *);
131 static u_long forgemask (u_long);
132 static void domask (char *, u_long, u_long);
133 static const char *labelops(struct rtentry *);
134 
135 /*
136  * Print routing tables.
137  */
138 void
139 routepr(u_long rtree)
140 {
141 	struct radix_node_head *rnh, head;
142 	int i;
143 
144 	printf("Routing tables\n");
145 
146 	if (Aflag == 0 && NewTree) {
147 		ntreestuff();
148 	} else {
149 		if (rtree == 0) {
150 			printf("rt_tables: symbol not in namelist\n");
151 			return;
152 		}
153 		if (cpuflag >= 0) {
154 			/*
155 			 * Severe hack.
156 			 */
157 			rtree += cpuflag * (AF_MAX + 1) * sizeof(void *);
158 		}
159 		if (kget(rtree, rt_tables) != 0)
160 			return;
161 		for (i = 0; i <= AF_MAX; i++) {
162 			if ((rnh = rt_tables[i]) == NULL)
163 				continue;
164 			if (kget(rnh, head) != 0)
165 				continue;
166 			if (i == AF_UNSPEC) {
167 				if (Aflag && af == 0) {
168 					printf("Netmasks:\n");
169 					p_tree(head.rnh_treetop);
170 				}
171 			} else if (af == AF_UNSPEC || af == i) {
172 				size_cols(i, head.rnh_treetop);
173 				pr_family(i);
174 				do_rtent = 1;
175 				pr_rthdr(i);
176 				p_tree(head.rnh_treetop);
177 			}
178 		}
179 	}
180 }
181 
182 /*
183  * Print address family header before a section of the routing table.
184  */
185 void
186 pr_family(int af1)
187 {
188 	const char *afname;
189 
190 	switch (af1) {
191 	case AF_INET:
192 		afname = "Internet";
193 		break;
194 #ifdef INET6
195 	case AF_INET6:
196 		afname = "Internet6";
197 		break;
198 #endif /*INET6*/
199 	case AF_ISO:
200 		afname = "ISO";
201 		break;
202 	case AF_CCITT:
203 		afname = "X.25";
204 		break;
205 	case AF_NETGRAPH:
206 		afname = "Netgraph";
207 		break;
208 	case AF_MPLS:
209 		afname = "MPLS";
210 		break;
211 	default:
212 		afname = NULL;
213 		break;
214 	}
215 	if (afname)
216 		printf("\n%s:\n", afname);
217 	else
218 		printf("\nProtocol Family %d:\n", af1);
219 }
220 
221 /* column widths; each followed by one space */
222 #ifndef INET6
223 #define	WID_DST_DEFAULT(af) 	18	/* width of destination column */
224 #define	WID_GW_DEFAULT(af)	18	/* width of gateway column */
225 #define	WID_IF_DEFAULT(af)	(Wflag ? 8 : 6)	/* width of netif column */
226 #else
227 #define	WID_DST_DEFAULT(af) \
228 	((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18)
229 #define	WID_GW_DEFAULT(af) \
230 	((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18)
231 #define	WID_IF_DEFAULT(af)	((af) == AF_INET6 ? 8 : (Wflag ? 8 :6))
232 #endif /*INET6*/
233 
234 static int wid_dst;
235 static int wid_gw;
236 static int wid_flags;
237 static int wid_refs;
238 static int wid_use;
239 static int wid_mtu;
240 static int wid_if;
241 static int wid_expire;
242 static int wid_mplslops;
243 static int wid_msl;
244 static int wid_iwmax;
245 static int wid_iw;
246 
247 static void
248 size_cols(int ef, struct radix_node *rn)
249 {
250 	wid_dst = WID_DST_DEFAULT(ef);
251 	wid_gw = WID_GW_DEFAULT(ef);
252 	wid_flags = 6;
253 	wid_refs = 6;
254 	wid_use = 8;
255 	wid_mtu = 6;
256 	wid_if = WID_IF_DEFAULT(ef);
257 	wid_expire = 6;
258 	wid_mplslops = 7;
259 	wid_msl = 7;
260 	wid_iwmax = 5;
261 	wid_iw = 2;
262 
263 	if (Wflag)
264 		size_cols_tree(rn);
265 }
266 
267 static void
268 size_cols_tree(struct radix_node *rn)
269 {
270 again:
271 	if (kget(rn, rnode) != 0)
272 		return;
273 	if (!(rnode.rn_flags & RNF_ACTIVE))
274 		return;
275 	if (rnode.rn_bit < 0) {
276 		if ((rnode.rn_flags & RNF_ROOT) == 0) {
277 			if (kget(rn, rtentry) != 0)
278 				return;
279 			size_cols_rtentry(&rtentry);
280 		}
281 		if ((rn = rnode.rn_dupedkey))
282 			goto again;
283 	} else {
284 		rn = rnode.rn_right;
285 		size_cols_tree(rnode.rn_left);
286 		size_cols_tree(rn);
287 	}
288 }
289 
290 static void
291 size_cols_rtentry(struct rtentry *rt)
292 {
293 	static struct ifnet ifnet, *lastif;
294 	struct rtentry parent;
295 	static char buffer[100];
296 	const char *bp;
297 	struct sockaddr *sa;
298 	sa_u addr, mask;
299 	int len;
300 
301 	/*
302 	 * Don't print protocol-cloned routes unless -a.
303 	 */
304 	if (rt->rt_flags & RTF_WASCLONED && !aflag) {
305 		if (kget(rt->rt_parent, parent) != 0)
306 			return;
307 		if (parent.rt_flags & RTF_PRCLONING)
308 			return;
309 	}
310 
311 	bzero(&addr, sizeof(addr));
312 	if ((sa = kgetsa(rt_key(rt))))
313 		bcopy(sa, &addr, sa->sa_len);
314 	bzero(&mask, sizeof(mask));
315 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
316 		bcopy(sa, &mask, sa->sa_len);
317 	bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags);
318 	len = strlen(bp);
319 	wid_dst = MAX(len, wid_dst);
320 
321 	bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST);
322 	len = strlen(bp);
323 	wid_gw = MAX(len, wid_gw);
324 
325 	bp = fmt_flags(rt->rt_flags);
326 	len = strlen(bp);
327 	wid_flags = MAX(len, wid_flags);
328 
329 	if (addr.u_sa.sa_family == AF_INET || Wflag) {
330 		len = snprintf(buffer, sizeof(buffer), "%ld", rt->rt_refcnt);
331 		wid_refs = MAX(len, wid_refs);
332 		len = snprintf(buffer, sizeof(buffer), "%lu", rt->rt_use);
333 		wid_use = MAX(len, wid_use);
334 		if (Wflag && rt->rt_rmx.rmx_mtu != 0) {
335 			len = snprintf(buffer, sizeof(buffer),
336 				       "%lu", rt->rt_rmx.rmx_mtu);
337 			wid_mtu = MAX(len, wid_mtu);
338 		}
339 	}
340 	if (rt->rt_ifp) {
341 		if (rt->rt_ifp != lastif) {
342 			if (kget(rt->rt_ifp, ifnet) == 0)
343 				len = strlen(ifnet.if_xname);
344 			else
345 				len = strlen("---");
346 			lastif = rt->rt_ifp;
347 			wid_if = MAX(len, wid_if);
348 		}
349 		if (rt->rt_rmx.rmx_expire) {
350 			struct timespec sp;
351 			int expire_time;
352 
353 			clock_gettime(CLOCK_MONOTONIC, &sp);
354 
355 			expire_time = (int)(rt->rt_rmx.rmx_expire - sp.tv_sec);
356 
357 			if (expire_time > 0) {
358 				snprintf(buffer, sizeof(buffer), "%d",
359 					 (int)expire_time);
360 				wid_expire = MAX(len, wid_expire);
361 			}
362 		}
363 	}
364 	if (Wflag) {
365 		if (rt->rt_shim[0] != NULL) {
366 			len = strlen(labelops(rt));
367 			wid_mplslops = MAX(len, wid_mplslops);
368 		}
369 
370 		if (rt->rt_rmx.rmx_msl) {
371 			len = snprintf(buffer, sizeof(buffer),
372 				       "%lu", rt->rt_rmx.rmx_msl);
373 			wid_msl = MAX(len, wid_msl);
374 		}
375 		if (rt->rt_rmx.rmx_iwmaxsegs) {
376 			len = snprintf(buffer, sizeof(buffer),
377 				       "%lu", rt->rt_rmx.rmx_iwmaxsegs);
378 			wid_iwmax = MAX(len, wid_iwmax);
379 		}
380 		if (rt->rt_rmx.rmx_iwcapsegs) {
381 			len = snprintf(buffer, sizeof(buffer),
382 				       "%lu", rt->rt_rmx.rmx_iwcapsegs);
383 			wid_iw = MAX(len, wid_iw);
384 		}
385 	}
386 }
387 
388 
389 /*
390  * Print header for routing table columns.
391  */
392 void
393 pr_rthdr(int af1)
394 {
395 
396 	if (Aflag)
397 		printf("%-8.8s ","Address");
398 	if (af1 == AF_INET || Wflag) {
399 		if (Wflag) {
400 			printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*.*s "
401 			       "%*s %-*s%*s %*s %*s\n",
402 				wid_dst,	wid_dst,	"Destination",
403 				wid_gw,		wid_gw,		"Gateway",
404 				wid_flags,	wid_flags,	"Flags",
405 				wid_refs,	wid_refs,	"Refs",
406 				wid_use,	wid_use,	"Use",
407 				wid_mtu,	wid_mtu,	"Mtu",
408 				wid_if,		wid_if,		"Netif",
409 				wid_expire,			"Expire",
410 				wid_mplslops,			"Labelops",
411 				wid_msl,			"Msl",
412 				wid_iwmax,			"IWmax",
413 				wid_iw,				"IW");
414 		} else {
415 			printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*s\n",
416 				wid_dst,	wid_dst,	"Destination",
417 				wid_gw,		wid_gw,		"Gateway",
418 				wid_flags,	wid_flags,	"Flags",
419 				wid_refs,	wid_refs,	"Refs",
420 				wid_use,	wid_use,	"Use",
421 				wid_if,		wid_if,		"Netif",
422 				wid_expire,			"Expire");
423 		}
424 	} else {
425 		printf("%-*.*s %-*.*s %-*.*s  %*.*s %*s\n",
426 			wid_dst,	wid_dst,	"Destination",
427 			wid_gw,		wid_gw,		"Gateway",
428 			wid_flags,	wid_flags,	"Flags",
429 			wid_if,		wid_if,		"Netif",
430 			wid_expire,			"Expire");
431 	}
432 }
433 
434 static struct sockaddr *
435 kgetsa(struct sockaddr *dst)
436 {
437 
438 	if (kget(dst, pt_u.u_sa) != 0)
439 		return (NULL);
440 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
441 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
442 	return (&pt_u.u_sa);
443 }
444 
445 static void
446 p_tree(struct radix_node *rn)
447 {
448 
449 again:
450 	if (kget(rn, rnode) != 0)
451 		return;
452 	if (!(rnode.rn_flags & RNF_ACTIVE))
453 		return;
454 	if (rnode.rn_bit < 0) {
455 		if (Aflag)
456 			printf("%-8.8lx ", (u_long)rn);
457 		if (rnode.rn_flags & RNF_ROOT) {
458 			if (Aflag)
459 				printf("(root node)%s",
460 				    rnode.rn_dupedkey ? " =>\n" : "\n");
461 		} else if (do_rtent) {
462 			if (kget(rn, rtentry) == 0) {
463 				p_rtentry(&rtentry);
464 				if (Aflag)
465 					p_rtnode();
466 			}
467 		} else {
468 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
469 				   NULL, 0, 44);
470 			putchar('\n');
471 		}
472 		if ((rn = rnode.rn_dupedkey))
473 			goto again;
474 	} else {
475 		if (Aflag && do_rtent) {
476 			printf("%-8.8lx ", (u_long)rn);
477 			p_rtnode();
478 		}
479 		rn = rnode.rn_right;
480 		p_tree(rnode.rn_left);
481 		p_tree(rn);
482 	}
483 }
484 
485 char	nbuf[20];
486 
487 static void
488 p_rtnode(void)
489 {
490 	struct radix_mask *rm = rnode.rn_mklist;
491 
492 	if (rnode.rn_bit < 0) {
493 		if (rnode.rn_mask) {
494 			printf("\t  mask ");
495 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
496 				   NULL, 0, -1);
497 		} else if (rm == NULL)
498 			return;
499 	} else {
500 		sprintf(nbuf, "(%d)", rnode.rn_bit);
501 		printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long)rnode.rn_left, (u_long)rnode.rn_right);
502 	}
503 	while (rm) {
504 		if (kget(rm, rmask) != 0)
505 			break;
506 		sprintf(nbuf, " %d refs, ", rmask.rm_refs);
507 		printf(" mk = %8.8lx {(%d),%s",
508 			(u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " ");
509 		if (rmask.rm_flags & RNF_NORMAL) {
510 			struct radix_node rnode_aux;
511 			printf(" <normal>, ");
512 			if (kget(rmask.rm_leaf, rnode_aux) == 0)
513 				p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
514 				    NULL, 0, -1);
515 			else
516 				p_sockaddr(NULL, NULL, 0, -1);
517 		} else
518 		    p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
519 				NULL, 0, -1);
520 		putchar('}');
521 		if ((rm = rmask.rm_next))
522 			printf(" ->");
523 	}
524 	putchar('\n');
525 }
526 
527 static void
528 ntreestuff(void)
529 {
530 	size_t needed;
531 	int mib[7];
532 	int miblen;
533 	char *buf, *next, *lim;
534 	struct rt_msghdr *rtm;
535 
536 	mib[0] = CTL_NET;
537 	mib[1] = PF_ROUTE;
538 	mib[2] = 0;
539 	mib[3] = 0;
540 	mib[4] = NET_RT_DUMP;
541 	mib[5] = 0;
542 	if (cpuflag >= 0) {
543 		mib[6] = cpuflag;
544 		miblen = 7;
545 	} else {
546 		miblen = 6;
547 	}
548 	if (sysctl(mib, miblen, NULL, &needed, NULL, 0) < 0) {
549 		err(1, "sysctl: net.route.0.0.dump estimate");
550 	}
551 
552 	if ((buf = malloc(needed)) == NULL) {
553 		err(2, "malloc(%lu)", (unsigned long)needed);
554 	}
555 	if (sysctl(mib, miblen, buf, &needed, NULL, 0) < 0) {
556 		err(1, "sysctl: net.route.0.0.dump");
557 	}
558 	lim  = buf + needed;
559 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
560 		rtm = (struct rt_msghdr *)next;
561 		np_rtentry(rtm);
562 	}
563 }
564 
565 static void
566 np_rtentry(struct rt_msghdr *rtm)
567 {
568 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
569 #ifdef notdef
570 	static int masks_done, banner_printed;
571 #endif
572 	static int old_af;
573 	int af1 = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
574 
575 #ifdef notdef
576 	/* for the moment, netmasks are skipped over */
577 	if (!banner_printed) {
578 		printf("Netmasks:\n");
579 		banner_printed = 1;
580 	}
581 	if (masks_done == 0) {
582 		if (rtm->rtm_addrs != RTA_DST ) {
583 			masks_done = 1;
584 			af1 = sa->sa_family;
585 		}
586 	} else
587 #endif
588 		af1 = sa->sa_family;
589 	if (af1 != old_af) {
590 		pr_family(af1);
591 		old_af = af1;
592 	}
593 	if (rtm->rtm_addrs == RTA_DST)
594 		p_sockaddr(sa, NULL, 0, 36);
595 	else {
596 		p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
597 		sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa);
598 		p_sockaddr(sa, NULL, 0, 18);
599 	}
600 	p_flags(rtm->rtm_flags & interesting, "%-6.6s ");
601 	putchar('\n');
602 }
603 
604 static void
605 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
606 {
607 	const char *cp;
608 
609 	cp = fmt_sockaddr(sa, mask, flags);
610 
611 	if (width < 0 )
612 		printf("%s ", cp);
613 	else {
614 		if (numeric_addr)
615 			printf("%-*s ", width, cp);
616 		else
617 			printf("%-*.*s ", width, width, cp);
618 	}
619 }
620 
621 static const char *
622 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags)
623 {
624 	static char workbuf[128];
625 	const char *cp = workbuf;
626 
627 	if (sa == NULL)
628 		return ("null");
629 
630 	switch(sa->sa_family) {
631 	case AF_INET:
632 	    {
633 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
634 
635 		if ((sin->sin_addr.s_addr == INADDR_ANY) &&
636 			mask &&
637 			ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr)
638 				==0L)
639 				cp = "default" ;
640 		else if (flags & RTF_HOST)
641 			cp = routename(sin->sin_addr.s_addr);
642 		else if (mask)
643 			cp = netname(sin->sin_addr.s_addr,
644 				     ntohl(((struct sockaddr_in *)mask)
645 					   ->sin_addr.s_addr));
646 		else
647 			cp = netname(sin->sin_addr.s_addr, 0L);
648 		break;
649 	    }
650 
651 #ifdef INET6
652 	case AF_INET6:
653 	    {
654 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
655 		struct in6_addr *in6 = &sa6->sin6_addr;
656 
657 		/*
658 		 * XXX: This is a special workaround for KAME kernels.
659 		 * sin6_scope_id field of SA should be set in the future.
660 		 */
661 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
662 		    IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
663 		    /* XXX: override is ok? */
664 		    sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
665 		    *(u_short *)&in6->s6_addr[2] = 0;
666 		}
667 
668 		if (flags & RTF_HOST)
669 		    cp = routename6(sa6);
670 		else if (mask)
671 		    cp = netname6(sa6,
672 				  &((struct sockaddr_in6 *)mask)->sin6_addr);
673 		else {
674 		    cp = netname6(sa6, NULL);
675 		}
676 		break;
677 	    }
678 #endif /*INET6*/
679 
680 	case AF_NETGRAPH:
681 	    {
682 		printf("%s", ((struct sockaddr_ng *)sa)->sg_data);
683 		break;
684 	    }
685 	case AF_LINK:
686 	    {
687 		struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
688 
689 		if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
690 		    sdl->sdl_slen == 0)
691 			(void) sprintf(workbuf, "link#%d", sdl->sdl_index);
692 		else
693 			switch (sdl->sdl_type) {
694 
695 			case IFT_ETHER:
696 			case IFT_L2VLAN:
697 			case IFT_CARP:
698 				if (sdl->sdl_alen == ETHER_ADDR_LEN) {
699 					cp = ether_ntoa((struct ether_addr *)
700 					    (sdl->sdl_data + sdl->sdl_nlen));
701 					break;
702 				}
703 				/* FALLTHROUGH */
704 			default:
705 				cp = link_ntoa(sdl);
706 				break;
707 			}
708 		break;
709 	    }
710 
711 	case AF_MPLS:
712 	    {
713 		struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa;
714 
715 		(void) sprintf(workbuf, "%d", ntohl(smpls->smpls_label));
716 		break;
717 	    }
718 
719 	default:
720 	    {
721 		u_char *s = (u_char *)sa->sa_data, *slim;
722 		char *cq, *cqlim;
723 
724 		cq = workbuf;
725 		slim =  sa->sa_len + (u_char *) sa;
726 		cqlim = cq + sizeof(workbuf) - 6;
727 		cq += sprintf(cq, "(%d)", sa->sa_family);
728 		while (s < slim && cq < cqlim) {
729 			cq += sprintf(cq, " %02x", *s++);
730 			if (s < slim)
731 			    cq += sprintf(cq, "%02x", *s++);
732 		}
733 		cp = workbuf;
734 	    }
735 	}
736 
737 	return (cp);
738 }
739 
740 static void
741 p_flags(int f, const char *format)
742 {
743 	printf(format, fmt_flags(f));
744 }
745 
746 static const char *
747 fmt_flags(int f)
748 {
749 	static char name[33];
750 	char *flags;
751 	struct bits *p = bits;
752 
753 	for (flags = name; p->b_mask; p++)
754 		if (p->b_mask & f)
755 			*flags++ = p->b_val;
756 	*flags = '\0';
757 	return (name);
758 }
759 
760 static void
761 p_rtentry(struct rtentry *rt)
762 {
763 	static struct ifnet ifnet, *lastif;
764 	struct rtentry parent;
765 	static char buffer[128];
766 	static char prettyname[128];
767 	struct sockaddr *sa;
768 	sa_u addr, mask;
769 
770 	/*
771 	 * Don't print protocol-cloned routes unless -a.
772 	 */
773 	if (rt->rt_flags & RTF_WASCLONED && !aflag) {
774 		if (kget(rt->rt_parent, parent) != 0)
775 			return;
776 		if (parent.rt_flags & RTF_PRCLONING)
777 			return;
778 	}
779 
780 	bzero(&addr, sizeof(addr));
781 	if ((sa = kgetsa(rt_key(rt))))
782 		bcopy(sa, &addr, sa->sa_len);
783 	bzero(&mask, sizeof(mask));
784 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
785 		bcopy(sa, &mask, sa->sa_len);
786 	p_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags, wid_dst);
787 	p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw);
788 	snprintf(buffer, sizeof(buffer), "%%-%d.%ds ", wid_flags, wid_flags);
789 	p_flags(rt->rt_flags, buffer);
790 	if (addr.u_sa.sa_family == AF_INET || Wflag) {
791 		printf("%*ld %*lu ", wid_refs, rt->rt_refcnt,
792 				     wid_use, rt->rt_use);
793 		if (Wflag) {
794 			if (rt->rt_rmx.rmx_mtu != 0)
795 				printf("%*lu ", wid_mtu, rt->rt_rmx.rmx_mtu);
796 			else
797 				printf("%*s ", wid_mtu, "");
798 		}
799 	}
800 	if (rt->rt_ifp) {
801 		if (rt->rt_ifp != lastif) {
802 			if (kget(rt->rt_ifp, ifnet) == 0)
803 				strlcpy(prettyname, ifnet.if_xname,
804 				    sizeof(prettyname));
805 			else
806 				strlcpy(prettyname, "---", sizeof(prettyname));
807 			lastif = rt->rt_ifp;
808 		}
809 		printf("%*.*s", wid_if, wid_if, prettyname);
810 		if (rt->rt_rmx.rmx_expire) {
811 			struct timespec sp;
812 			int expire_time;
813 
814 			clock_gettime(CLOCK_MONOTONIC, &sp);
815 
816 			expire_time = (int)(rt->rt_rmx.rmx_expire - sp.tv_sec);
817 			if (expire_time > 0)
818 				printf(" %*d", wid_expire, (int)expire_time);
819 			else
820 				printf("%*s ", wid_expire, "");
821 		} else {
822 			printf("%*s ", wid_expire, "");
823 		}
824 		if (rt->rt_nodes[0].rn_dupedkey)
825 			printf(" =>");
826 	}
827 	if (Wflag) {
828 		if (rt->rt_shim[0] != NULL)
829 			printf(" %-*s", wid_mplslops, labelops(rt));
830 		else
831 			printf(" %-*s", wid_mplslops, "");
832 		if (rt->rt_rmx.rmx_msl != 0)
833 			printf(" %*lu", wid_msl, rt->rt_rmx.rmx_msl);
834 		else
835 			printf("%*s ", wid_msl, "");
836 		if (rt->rt_rmx.rmx_iwmaxsegs != 0)
837 			printf(" %*lu", wid_iwmax, rt->rt_rmx.rmx_iwmaxsegs);
838 		else
839 			printf("%*s ", wid_iwmax, "");
840 		if (rt->rt_rmx.rmx_iwcapsegs != 0)
841 			printf(" %*lu", wid_iw, rt->rt_rmx.rmx_iwcapsegs);
842 		else
843 			printf("%*s ", wid_iw, "");
844 	}
845 	putchar('\n');
846 }
847 
848 char *
849 routename(u_long in)
850 {
851 	char *cp;
852 	static char line[MAXHOSTNAMELEN];
853 	struct hostent *hp;
854 
855 	cp = NULL;
856 	if (!numeric_addr) {
857 		hp = gethostbyaddr(&in, sizeof (struct in_addr), AF_INET);
858 		if (hp) {
859 			cp = hp->h_name;
860 			trimdomain(cp, strlen(cp));
861 		}
862 	}
863 	if (cp) {
864 		strncpy(line, cp, sizeof(line) - 1);
865 		line[sizeof(line) - 1] = '\0';
866 	} else {
867 #define C(x)	((x) & 0xff)
868 		in = ntohl(in);
869 		sprintf(line, "%lu.%lu.%lu.%lu",
870 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
871 	}
872 	return (line);
873 }
874 
875 static u_long
876 forgemask(u_long a)
877 {
878 	u_long m;
879 
880 	if (IN_CLASSA(a))
881 		m = IN_CLASSA_NET;
882 	else if (IN_CLASSB(a))
883 		m = IN_CLASSB_NET;
884 	else
885 		m = IN_CLASSC_NET;
886 	return (m);
887 }
888 
889 static void
890 domask(char *dst, u_long addr, u_long mask)
891 {
892 	int b, i;
893 
894 	if (!mask || (forgemask(addr) == mask)) {
895 		*dst = '\0';
896 		return;
897 	}
898 	i = 0;
899 	for (b = 0; b < 32; b++)
900 		if (mask & (1 << b)) {
901 			int bb;
902 
903 			i = b;
904 			for (bb = b+1; bb < 32; bb++)
905 				if (!(mask & (1 << bb))) {
906 					i = -1;	/* noncontig */
907 					break;
908 				}
909 			break;
910 		}
911 	if (i == -1)
912 		sprintf(dst, "&0x%lx", mask);
913 	else
914 		sprintf(dst, "/%d", 32-i);
915 }
916 
917 /*
918  * Return the name of the network whose address is given.
919  * The address is assumed to be that of a net or subnet, not a host.
920  */
921 char *
922 netname(u_long in, u_long mask)
923 {
924 	char *cp = NULL;
925 	static char line[MAXHOSTNAMELEN];
926 	struct netent *np = NULL;
927 	u_long dmask;
928 	u_long i;
929 
930 #define	NSHIFT(m) (							\
931 	(m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT :			\
932 	(m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT :			\
933 	(m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT :			\
934 	0)
935 
936 	i = ntohl(in);
937 	dmask = forgemask(i);
938 	if (!numeric_addr && i) {
939 		np = getnetbyaddr(i >> NSHIFT(mask), AF_INET);
940 		if (np == NULL && mask == 0)
941 			np = getnetbyaddr(i >> NSHIFT(dmask), AF_INET);
942 		if (np != NULL) {
943 			cp = np->n_name;
944 			trimdomain(cp, strlen(cp));
945 		}
946 	}
947 #undef NSHIFT
948 	if (cp != NULL) {
949 		strncpy(line, cp, sizeof(line) - 1);
950 		line[sizeof(line) - 1] = '\0';
951 	} else {
952 		if (mask <= IN_CLASSA_NET &&
953 			(i & IN_CLASSA_HOST) == 0) {
954 				sprintf(line, "%lu", C(i >> 24));
955 		} else if (mask <= IN_CLASSB_NET &&
956 			(i & IN_CLASSB_HOST) == 0) {
957 				sprintf(line, "%lu.%lu",
958 					C(i >> 24), C(i >> 16));
959 		} else if (mask <= IN_CLASSC_NET &&
960 			(i & IN_CLASSC_HOST) == 0) {
961 				sprintf(line, "%lu.%lu.%lu",
962 					C(i >> 24), C(i >> 16), C(i >> 8));
963 		} else {
964 			sprintf(line, "%lu.%lu.%lu.%lu",
965 				C(i >> 24), C(i >> 16), C(i >> 8), C(i));
966 		}
967 	}
968 	domask(line + strlen(line), i, mask);
969 	return (line);
970 }
971 
972 #ifdef INET6
973 const char *
974 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask)
975 {
976 	static char line[MAXHOSTNAMELEN];
977 	u_char *p = (u_char *)mask;
978 	u_char *lim;
979 	int masklen, illegal = 0, flag = NI_WITHSCOPEID;
980 
981 	if (mask) {
982 		for (masklen = 0, lim = p + 16; p < lim; p++) {
983 			switch (*p) {
984 			 case 0xff:
985 				 masklen += 8;
986 				 break;
987 			 case 0xfe:
988 				 masklen += 7;
989 				 break;
990 			 case 0xfc:
991 				 masklen += 6;
992 				 break;
993 			 case 0xf8:
994 				 masklen += 5;
995 				 break;
996 			 case 0xf0:
997 				 masklen += 4;
998 				 break;
999 			 case 0xe0:
1000 				 masklen += 3;
1001 				 break;
1002 			 case 0xc0:
1003 				 masklen += 2;
1004 				 break;
1005 			 case 0x80:
1006 				 masklen += 1;
1007 				 break;
1008 			 case 0x00:
1009 				 break;
1010 			 default:
1011 				 illegal ++;
1012 				 break;
1013 			}
1014 		}
1015 		if (illegal)
1016 			fprintf(stderr, "illegal prefixlen\n");
1017 	}
1018 	else
1019 		masklen = 128;
1020 
1021 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
1022 		return("default");
1023 
1024 	if (numeric_addr)
1025 		flag |= NI_NUMERICHOST;
1026 	getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line),
1027 		    NULL, 0, flag);
1028 
1029 	if (numeric_addr)
1030 		sprintf(&line[strlen(line)], "/%d", masklen);
1031 
1032 	return line;
1033 }
1034 
1035 char *
1036 routename6(struct sockaddr_in6 *sa6)
1037 {
1038 	static char line[MAXHOSTNAMELEN];
1039 	int flag = NI_WITHSCOPEID;
1040 	/* use local variable for safety */
1041 	struct sockaddr_in6 sa6_local;
1042 
1043 	sa6_local.sin6_family = AF_INET6;
1044 	sa6_local.sin6_len = sizeof(sa6_local);
1045 	sa6_local.sin6_addr = sa6->sin6_addr;
1046 	sa6_local.sin6_scope_id = sa6->sin6_scope_id;
1047 
1048 	if (numeric_addr)
1049 		flag |= NI_NUMERICHOST;
1050 
1051 	getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
1052 		    line, sizeof(line), NULL, 0, flag);
1053 
1054 	return line;
1055 }
1056 #endif /*INET6*/
1057 
1058 /*
1059  * Print routing statistics
1060  */
1061 void
1062 rt_stats(void)
1063 {
1064 	struct rtstatistics rts;
1065 	int error = 0;
1066 
1067 	error = kinfo_get_net_rtstatistics(&rts);
1068 	if (error) {
1069 		printf("routing: could not retrieve statistics\n");
1070 		return;
1071 	}
1072 	printf("routing:\n");
1073 
1074 #define	p(f, m) if (rts.f || sflag <= 1) \
1075 	printf(m, rts.f, plural(rts.f))
1076 
1077 	p(rts_badredirect, "\t%lu bad routing redirect%s\n");
1078 	p(rts_dynamic, "\t%lu dynamically created route%s\n");
1079 	p(rts_newgateway, "\t%lu new gateway%s due to redirects\n");
1080 	p(rts_unreach, "\t%lu destination%s found unreachable\n");
1081 	p(rts_wildcard, "\t%lu use%s of a wildcard route\n");
1082 #undef p
1083 }
1084 
1085 static const char *
1086 labelops(struct rtentry *rt)
1087 {
1088 	const char *lops[] = { "push", "pop", "swap", "pop all" };
1089 	static char buffer[100];
1090 	char *cp = buffer;
1091 	struct sockaddr_mpls *smpls;
1092 	int i;
1093 
1094 	for (i=0; i<MPLS_MAXLOPS; ++i) {
1095 
1096 		if (rt->rt_shim[i] == NULL)
1097 			break;
1098 		if (i>0) {
1099 			cp += snprintf(cp,
1100 				       sizeof(buffer) - (cp - buffer),
1101 				       ", ");
1102 		}
1103 		smpls = (struct sockaddr_mpls *)kgetsa(rt->rt_shim[i]);
1104 		if (smpls->smpls_op != MPLSLOP_POP &&
1105 		    smpls->smpls_op != MPLSLOP_POPALL){
1106 			cp += snprintf(cp,
1107 				       sizeof(buffer) - (cp - buffer),
1108 				       "%s %d",
1109 				       lops[smpls->smpls_op - 1],
1110 				       ntohl(smpls->smpls_label));
1111 		} else {
1112 			cp += snprintf(cp,
1113 				       sizeof(buffer) - (cp - buffer),
1114 				       "%s",
1115 				       lops[smpls->smpls_op - 1]);
1116 		}
1117 	}
1118 
1119 	return (buffer);
1120 }
1121