xref: /dragonfly/usr.bin/netstat/route.c (revision 7d84b73d)
1 /*
2  * Copyright (c) 1983, 1988, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. Neither the name of the University nor the names of its contributors
14  *    may be used to endorse or promote products derived from this software
15  *    without specific prior written permission.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  *
29  * @(#)route.c	8.6 (Berkeley) 4/28/95
30  * $FreeBSD: src/usr.bin/netstat/route.c,v 1.41.2.14 2002/07/17 02:22:22 kbyanc Exp $
31  */
32 
33 #define _KERNEL_STRUCTURES
34 #include <sys/kinfo.h>
35 #include <sys/param.h>
36 #include <sys/socket.h>
37 #include <sys/time.h>
38 
39 #include <net/ethernet.h>
40 #include <net/if.h>
41 #include <net/if_var.h>		/* for struct ifnet */
42 #include <net/if_dl.h>
43 #include <net/if_types.h>
44 #include <net/route.h>
45 
46 #include <netinet/in.h>
47 #include <netgraph/socket/ng_socket.h>
48 
49 #include <netproto/mpls/mpls.h>
50 
51 #include <sys/sysctl.h>
52 
53 #include <arpa/inet.h>
54 #include <libutil.h>
55 #include <netdb.h>
56 #include <stdio.h>
57 #include <stdlib.h>
58 #include <string.h>
59 #include <unistd.h>
60 #include <err.h>
61 #include <time.h>
62 #include <kinfo.h>
63 #include "netstat.h"
64 
65 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
66 #define constSA(x) ((const struct sockaddr *)(x))
67 
68 /*
69  * Definitions for showing gateway flags.
70  */
71 struct bits {
72 	u_long	b_mask;
73 	char	b_val;
74 } bits[] = {
75 	{ RTF_UP,	'U' },
76 	{ RTF_GATEWAY,	'G' },
77 	{ RTF_HOST,	'H' },
78 	{ RTF_REJECT,	'R' },
79 	{ RTF_DYNAMIC,	'D' },
80 	{ RTF_MODIFIED,	'M' },
81 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
82 	{ RTF_CLONING,	'C' },
83 	{ RTF_XRESOLVE,	'X' },
84 	{ RTF_LLINFO,	'L' },
85 	{ RTF_STATIC,	'S' },
86 	{ RTF_PROTO1,	'1' },
87 	{ RTF_PROTO2,	'2' },
88 	{ RTF_WASCLONED,'W' },
89 	{ RTF_PRCLONING,'c' },
90 	{ RTF_PROTO3,	'3' },
91 	{ RTF_BLACKHOLE,'B' },
92 	{ RTF_BROADCAST,'b' },
93 	{ RTF_MPLSOPS,	'm' },
94 	{ 0, 0 }
95 };
96 
97 typedef union {
98 	long	dummy;		/* Helps align structure. */
99 	struct	sockaddr u_sa;
100 	u_short	u_data[128];
101 } sa_u;
102 
103 static sa_u pt_u;
104 
105 int	do_rtent = 0;
106 struct	rtentry rtentry;
107 struct	radix_node rnode;
108 struct	radix_mask rmask;
109 struct	radix_node_head *rt_tables[AF_MAX+1];
110 
111 int	NewTree = 0;
112 
113 static struct sockaddr *kgetsa (const struct sockaddr *);
114 static void size_cols (int ef, struct radix_node *rn);
115 static void size_cols_tree (struct radix_node *rn);
116 static void size_cols_rtentry (struct rtentry *rt);
117 static void p_tree (struct radix_node *);
118 static void p_rtnode (void);
119 static void ntreestuff (void);
120 static void np_rtentry (struct rt_msghdr *);
121 static void p_sockaddr (struct sockaddr *, struct sockaddr *, int, int);
122 static const char *fmt_sockaddr (struct sockaddr *sa, struct sockaddr *mask,
123 				 int flags);
124 static void p_flags (int, const char *);
125 static const char *fmt_flags(int f);
126 static void p_rtentry (struct rtentry *);
127 static u_long forgemask (u_long);
128 static void domask (char *, u_long, u_long);
129 static const char *labelops(struct rtentry *);
130 
131 /*
132  * Print routing tables.
133  */
134 void
135 routepr(u_long rtree)
136 {
137 	struct radix_node_head *rnh, head;
138 	int i;
139 
140 	printf("Routing tables\n");
141 
142 	if (Aflag == 0 && NewTree) {
143 		ntreestuff();
144 	} else {
145 		if (rtree == 0) {
146 			printf("rt_tables: symbol not in namelist\n");
147 			return;
148 		}
149 		if (cpuflag >= 0) {
150 			/*
151 			 * Severe hack.
152 			 */
153 			rtree += cpuflag * (AF_MAX + 1) * sizeof(void *);
154 		}
155 		if (kget(rtree, rt_tables) != 0)
156 			return;
157 		for (i = 0; i <= AF_MAX; i++) {
158 			if ((rnh = rt_tables[i]) == NULL)
159 				continue;
160 			if (kget(rnh, head) != 0)
161 				continue;
162 			if (i == AF_UNSPEC) {
163 				if (Aflag && af == 0) {
164 					printf("Netmasks:\n");
165 					p_tree(head.rnh_treetop);
166 				}
167 			} else if (af == AF_UNSPEC || af == i) {
168 				size_cols(i, head.rnh_treetop);
169 				pr_family(i);
170 				do_rtent = 1;
171 				pr_rthdr(i);
172 				p_tree(head.rnh_treetop);
173 			}
174 		}
175 	}
176 }
177 
178 /*
179  * Print address family header before a section of the routing table.
180  */
181 void
182 pr_family(int af1)
183 {
184 	const char *afname;
185 
186 	switch (af1) {
187 	case AF_INET:
188 		afname = "Internet";
189 		break;
190 #ifdef INET6
191 	case AF_INET6:
192 		afname = "Internet6";
193 		break;
194 #endif /*INET6*/
195 	case AF_CCITT:
196 		afname = "X.25";
197 		break;
198 	case AF_NETGRAPH:
199 		afname = "Netgraph";
200 		break;
201 	case AF_MPLS:
202 		afname = "MPLS";
203 		break;
204 	default:
205 		afname = NULL;
206 		break;
207 	}
208 	if (afname)
209 		printf("\n%s:\n", afname);
210 	else
211 		printf("\nProtocol Family %d:\n", af1);
212 }
213 
214 /* column widths; each followed by one space */
215 #ifndef INET6
216 #define	WID_DST_DEFAULT(af) 	18	/* width of destination column */
217 #define	WID_GW_DEFAULT(af)	18	/* width of gateway column */
218 #define	WID_IF_DEFAULT(af)	(Wflag ? 8 : 6)	/* width of netif column */
219 #else
220 #define	WID_DST_DEFAULT(af) \
221 	((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18)
222 #define	WID_GW_DEFAULT(af) \
223 	((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18)
224 #define	WID_IF_DEFAULT(af)	((af) == AF_INET6 ? 8 : (Wflag ? 8 :6))
225 #endif /*INET6*/
226 
227 static int wid_dst;
228 static int wid_gw;
229 static int wid_flags;
230 static int wid_refs;
231 static int wid_use;
232 static int wid_mtu;
233 static int wid_if;
234 static int wid_expire;
235 static int wid_mplslops;
236 static int wid_msl;
237 static int wid_iwmax;
238 static int wid_iw;
239 
240 static void
241 size_cols(int ef, struct radix_node *rn)
242 {
243 	wid_dst = WID_DST_DEFAULT(ef);
244 	wid_gw = WID_GW_DEFAULT(ef);
245 	wid_flags = 6;
246 	wid_refs = 6;
247 	wid_use = 8;
248 	wid_mtu = 6;
249 	wid_if = WID_IF_DEFAULT(ef);
250 	wid_expire = 6;
251 	wid_mplslops = 7;
252 	wid_msl = 7;
253 	wid_iwmax = 5;
254 	wid_iw = 2;
255 
256 	if (Wflag)
257 		size_cols_tree(rn);
258 }
259 
260 static void
261 size_cols_tree(struct radix_node *rn)
262 {
263 again:
264 	if (kget(rn, rnode) != 0)
265 		return;
266 	if (!(rnode.rn_flags & RNF_ACTIVE))
267 		return;
268 	if (rnode.rn_bit < 0) {
269 		if ((rnode.rn_flags & RNF_ROOT) == 0) {
270 			if (kget(rn, rtentry) != 0)
271 				return;
272 			size_cols_rtentry(&rtentry);
273 		}
274 		if ((rn = rnode.rn_dupedkey))
275 			goto again;
276 	} else {
277 		rn = rnode.rn_right;
278 		size_cols_tree(rnode.rn_left);
279 		size_cols_tree(rn);
280 	}
281 }
282 
283 static void
284 size_cols_rtentry(struct rtentry *rt)
285 {
286 	static struct ifnet ifnet, *lastif;
287 	struct rtentry parent;
288 	static char buffer[100];
289 	const char *bp;
290 	struct sockaddr *sa;
291 	sa_u addr, mask;
292 	int len;
293 
294 	/*
295 	 * Don't print protocol-cloned routes unless -a.
296 	 */
297 	if (rt->rt_flags & RTF_WASCLONED && !aflag) {
298 		if (kget(rt->rt_parent, parent) != 0)
299 			return;
300 		if (parent.rt_flags & RTF_PRCLONING)
301 			return;
302 	}
303 
304 	bzero(&addr, sizeof(addr));
305 	if ((sa = kgetsa(rt_key(rt))))
306 		bcopy(sa, &addr, sa->sa_len);
307 	bzero(&mask, sizeof(mask));
308 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
309 		bcopy(sa, &mask, sa->sa_len);
310 	bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags);
311 	len = strlen(bp);
312 	wid_dst = MAX(len, wid_dst);
313 
314 	bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST);
315 	len = strlen(bp);
316 	wid_gw = MAX(len, wid_gw);
317 
318 	bp = fmt_flags(rt->rt_flags);
319 	len = strlen(bp);
320 	wid_flags = MAX(len, wid_flags);
321 
322 	if (addr.u_sa.sa_family == AF_INET || Wflag) {
323 		len = snprintf(buffer, sizeof(buffer), "%ld", rt->rt_refcnt);
324 		wid_refs = MAX(len, wid_refs);
325 		len = snprintf(buffer, sizeof(buffer), "%lu", rt->rt_use);
326 		wid_use = MAX(len, wid_use);
327 		if (Wflag && rt->rt_rmx.rmx_mtu != 0) {
328 			len = snprintf(buffer, sizeof(buffer),
329 				       "%lu", rt->rt_rmx.rmx_mtu);
330 			wid_mtu = MAX(len, wid_mtu);
331 		}
332 	}
333 	if (rt->rt_ifp) {
334 		if (rt->rt_ifp != lastif) {
335 			if (kget(rt->rt_ifp, ifnet) == 0)
336 				len = strlen(ifnet.if_xname);
337 			else
338 				len = strlen("---");
339 			lastif = rt->rt_ifp;
340 			wid_if = MAX(len, wid_if);
341 		}
342 		if (rt->rt_rmx.rmx_expire) {
343 			struct timespec sp;
344 			int expire_time;
345 
346 			clock_gettime(CLOCK_MONOTONIC, &sp);
347 
348 			expire_time = (int)(rt->rt_rmx.rmx_expire - sp.tv_sec);
349 
350 			if (expire_time > 0) {
351 				snprintf(buffer, sizeof(buffer), "%d",
352 					 (int)expire_time);
353 				wid_expire = MAX(len, wid_expire);
354 			}
355 		}
356 	}
357 	if (Wflag) {
358 		if (rt->rt_shim[0] != NULL) {
359 			len = strlen(labelops(rt));
360 			wid_mplslops = MAX(len, wid_mplslops);
361 		}
362 
363 		if (rt->rt_rmx.rmx_msl) {
364 			len = snprintf(buffer, sizeof(buffer),
365 				       "%lu", rt->rt_rmx.rmx_msl);
366 			wid_msl = MAX(len, wid_msl);
367 		}
368 		if (rt->rt_rmx.rmx_iwmaxsegs) {
369 			len = snprintf(buffer, sizeof(buffer),
370 				       "%lu", rt->rt_rmx.rmx_iwmaxsegs);
371 			wid_iwmax = MAX(len, wid_iwmax);
372 		}
373 		if (rt->rt_rmx.rmx_iwcapsegs) {
374 			len = snprintf(buffer, sizeof(buffer),
375 				       "%lu", rt->rt_rmx.rmx_iwcapsegs);
376 			wid_iw = MAX(len, wid_iw);
377 		}
378 	}
379 }
380 
381 
382 /*
383  * Print header for routing table columns.
384  */
385 void
386 pr_rthdr(int af1)
387 {
388 
389 	if (Aflag)
390 		printf("%-8.8s ","Address");
391 	if (af1 == AF_INET || Wflag) {
392 		if (Wflag) {
393 			printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*.*s "
394 			       "%*s %-*s%*s %*s %*s\n",
395 				wid_dst,	wid_dst,	"Destination",
396 				wid_gw,		wid_gw,		"Gateway",
397 				wid_flags,	wid_flags,	"Flags",
398 				wid_refs,	wid_refs,	"Refs",
399 				wid_use,	wid_use,	"Use",
400 				wid_mtu,	wid_mtu,	"Mtu",
401 				wid_if,		wid_if,		"Netif",
402 				wid_expire,			"Expire",
403 				wid_mplslops,			"Labelops",
404 				wid_msl,			"Msl",
405 				wid_iwmax,			"IWmax",
406 				wid_iw,				"IW");
407 		} else {
408 			printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*s\n",
409 				wid_dst,	wid_dst,	"Destination",
410 				wid_gw,		wid_gw,		"Gateway",
411 				wid_flags,	wid_flags,	"Flags",
412 				wid_refs,	wid_refs,	"Refs",
413 				wid_use,	wid_use,	"Use",
414 				wid_if,		wid_if,		"Netif",
415 				wid_expire,			"Expire");
416 		}
417 	} else {
418 		printf("%-*.*s %-*.*s %-*.*s  %*.*s %*s\n",
419 			wid_dst,	wid_dst,	"Destination",
420 			wid_gw,		wid_gw,		"Gateway",
421 			wid_flags,	wid_flags,	"Flags",
422 			wid_if,		wid_if,		"Netif",
423 			wid_expire,			"Expire");
424 	}
425 }
426 
427 static struct sockaddr *
428 kgetsa(const struct sockaddr *dst)
429 {
430 
431 	if (kget(dst, pt_u.u_sa) != 0)
432 		return (NULL);
433 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
434 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
435 	return (&pt_u.u_sa);
436 }
437 
438 static void
439 p_tree(struct radix_node *rn)
440 {
441 
442 again:
443 	if (kget(rn, rnode) != 0)
444 		return;
445 	if (!(rnode.rn_flags & RNF_ACTIVE))
446 		return;
447 	if (rnode.rn_bit < 0) {
448 		if (Aflag)
449 			printf("%-8.8lx ", (u_long)rn);
450 		if (rnode.rn_flags & RNF_ROOT) {
451 			if (Aflag)
452 				printf("(root node)%s",
453 				    rnode.rn_dupedkey ? " =>\n" : "\n");
454 		} else if (do_rtent) {
455 			if (kget(rn, rtentry) == 0) {
456 				p_rtentry(&rtentry);
457 				if (Aflag)
458 					p_rtnode();
459 			}
460 		} else {
461 			p_sockaddr(kgetsa(constSA(rnode.rn_key)), NULL, 0, 44);
462 			putchar('\n');
463 		}
464 		if ((rn = rnode.rn_dupedkey))
465 			goto again;
466 	} else {
467 		if (Aflag && do_rtent) {
468 			printf("%-8.8lx ", (u_long)rn);
469 			p_rtnode();
470 		}
471 		rn = rnode.rn_right;
472 		p_tree(rnode.rn_left);
473 		p_tree(rn);
474 	}
475 }
476 
477 char	nbuf[20];
478 
479 static void
480 p_rtnode(void)
481 {
482 	struct radix_mask *rm = rnode.rn_mklist;
483 
484 	if (rnode.rn_bit < 0) {
485 		if (rnode.rn_mask) {
486 			printf("\t  mask ");
487 			p_sockaddr(kgetsa(constSA(rnode.rn_mask)),
488 				   NULL, 0, -1);
489 		} else if (rm == NULL)
490 			return;
491 	} else {
492 		sprintf(nbuf, "(%d)", rnode.rn_bit);
493 		printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long)rnode.rn_left, (u_long)rnode.rn_right);
494 	}
495 	while (rm) {
496 		if (kget(rm, rmask) != 0)
497 			break;
498 		sprintf(nbuf, " %d refs, ", rmask.rm_refs);
499 		printf(" mk = %8.8lx {(%d),%s",
500 			(u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " ");
501 		if (rmask.rm_flags & RNF_NORMAL) {
502 			struct radix_node rnode_aux;
503 			printf(" <normal>, ");
504 			if (kget(rmask.rm_leaf, rnode_aux) == 0)
505 				p_sockaddr(kgetsa(constSA(rnode_aux.rn_mask)),
506 					   NULL, 0, -1);
507 			else
508 				p_sockaddr(NULL, NULL, 0, -1);
509 		} else {
510 			p_sockaddr(kgetsa(constSA(rmask.rm_mask)),
511 				   NULL, 0, -1);
512 		}
513 		putchar('}');
514 		if ((rm = rmask.rm_next))
515 			printf(" ->");
516 	}
517 	putchar('\n');
518 }
519 
520 static void
521 ntreestuff(void)
522 {
523 	size_t needed;
524 	int mib[7];
525 	int miblen;
526 	char *buf, *next, *lim;
527 	struct rt_msghdr *rtm;
528 
529 	mib[0] = CTL_NET;
530 	mib[1] = PF_ROUTE;
531 	mib[2] = 0;
532 	mib[3] = 0;
533 	mib[4] = NET_RT_DUMP;
534 	mib[5] = 0;
535 	if (cpuflag >= 0) {
536 		mib[6] = cpuflag;
537 		miblen = 7;
538 	} else {
539 		miblen = 6;
540 	}
541 	if (sysctl(mib, miblen, NULL, &needed, NULL, 0) < 0) {
542 		err(1, "sysctl: net.route.0.0.dump estimate");
543 	}
544 
545 	if ((buf = malloc(needed)) == NULL) {
546 		err(2, "malloc(%lu)", (unsigned long)needed);
547 	}
548 	if (sysctl(mib, miblen, buf, &needed, NULL, 0) < 0) {
549 		err(1, "sysctl: net.route.0.0.dump");
550 	}
551 	lim  = buf + needed;
552 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
553 		rtm = (struct rt_msghdr *)next;
554 		np_rtentry(rtm);
555 	}
556 }
557 
558 static void
559 np_rtentry(struct rt_msghdr *rtm)
560 {
561 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
562 #ifdef notdef
563 	static int masks_done, banner_printed;
564 #endif
565 	static int old_af;
566 	int af1 = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
567 
568 #ifdef notdef
569 	/* for the moment, netmasks are skipped over */
570 	if (!banner_printed) {
571 		printf("Netmasks:\n");
572 		banner_printed = 1;
573 	}
574 	if (masks_done == 0) {
575 		if (rtm->rtm_addrs != RTA_DST ) {
576 			masks_done = 1;
577 			af1 = sa->sa_family;
578 		}
579 	} else
580 #endif
581 		af1 = sa->sa_family;
582 	if (af1 != old_af) {
583 		pr_family(af1);
584 		old_af = af1;
585 	}
586 	if (rtm->rtm_addrs == RTA_DST)
587 		p_sockaddr(sa, NULL, 0, 36);
588 	else {
589 		p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
590 		sa = (struct sockaddr *)(RT_ROUNDUP(sa->sa_len) + (char *)sa);
591 		p_sockaddr(sa, NULL, 0, 18);
592 	}
593 	p_flags(rtm->rtm_flags & interesting, "%-6.6s ");
594 	putchar('\n');
595 }
596 
597 static void
598 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
599 {
600 	const char *cp;
601 
602 	cp = fmt_sockaddr(sa, mask, flags);
603 
604 	if (width < 0 )
605 		printf("%s ", cp);
606 	else {
607 		if (numeric_addr)
608 			printf("%-*s ", width, cp);
609 		else
610 			printf("%-*.*s ", width, width, cp);
611 	}
612 }
613 
614 static const char *
615 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags)
616 {
617 	static char workbuf[128];
618 	const char *cp = workbuf;
619 
620 	if (sa == NULL)
621 		return ("null");
622 
623 	switch(sa->sa_family) {
624 	case AF_INET:
625 	    {
626 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
627 
628 		if ((sin->sin_addr.s_addr == INADDR_ANY) &&
629 			mask &&
630 			ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr)
631 				==0L)
632 				cp = "default" ;
633 		else if (flags & RTF_HOST)
634 			cp = routename(sin->sin_addr.s_addr);
635 		else if (mask)
636 			cp = netname(sin->sin_addr.s_addr,
637 				     ntohl(((struct sockaddr_in *)mask)
638 					   ->sin_addr.s_addr));
639 		else
640 			cp = netname(sin->sin_addr.s_addr, 0L);
641 		break;
642 	    }
643 
644 #ifdef INET6
645 	case AF_INET6:
646 	    {
647 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
648 		struct in6_addr *in6 = &sa6->sin6_addr;
649 
650 		/*
651 		 * XXX: This is a special workaround for KAME kernels.
652 		 * sin6_scope_id field of SA should be set in the future.
653 		 */
654 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
655 		    IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
656 		    /* XXX: override is ok? */
657 		    sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
658 		    *(u_short *)&in6->s6_addr[2] = 0;
659 		}
660 
661 		if (flags & RTF_HOST)
662 		    cp = routename6(sa6);
663 		else if (mask)
664 		    cp = netname6(sa6,
665 				  &((struct sockaddr_in6 *)mask)->sin6_addr);
666 		else {
667 		    cp = netname6(sa6, NULL);
668 		}
669 		break;
670 	    }
671 #endif /*INET6*/
672 
673 	case AF_NETGRAPH:
674 	    {
675 		printf("%s", ((struct sockaddr_ng *)sa)->sg_data);
676 		break;
677 	    }
678 	case AF_LINK:
679 	    {
680 		struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
681 
682 		if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
683 		    sdl->sdl_slen == 0)
684 			(void) sprintf(workbuf, "link#%d", sdl->sdl_index);
685 		else
686 			switch (sdl->sdl_type) {
687 
688 			case IFT_ETHER:
689 			case IFT_L2VLAN:
690 			case IFT_CARP:
691 				if (sdl->sdl_alen == ETHER_ADDR_LEN) {
692 					cp = ether_ntoa((struct ether_addr *)
693 					    (sdl->sdl_data + sdl->sdl_nlen));
694 					break;
695 				}
696 				/* FALLTHROUGH */
697 			default:
698 				cp = link_ntoa(sdl);
699 				break;
700 			}
701 		break;
702 	    }
703 
704 	case AF_MPLS:
705 	    {
706 		struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa;
707 
708 		(void) sprintf(workbuf, "%d", ntohl(smpls->smpls_label));
709 		break;
710 	    }
711 
712 	default:
713 	    {
714 		u_char *s = (u_char *)sa->sa_data, *slim;
715 		char *cq, *cqlim;
716 
717 		cq = workbuf;
718 		slim =  sa->sa_len + (u_char *) sa;
719 		cqlim = cq + sizeof(workbuf) - 6;
720 		cq += sprintf(cq, "(%d)", sa->sa_family);
721 		while (s < slim && cq < cqlim) {
722 			cq += sprintf(cq, " %02x", *s++);
723 			if (s < slim)
724 			    cq += sprintf(cq, "%02x", *s++);
725 		}
726 		cp = workbuf;
727 	    }
728 	}
729 
730 	return (cp);
731 }
732 
733 static void
734 p_flags(int f, const char *format)
735 {
736 	printf(format, fmt_flags(f));
737 }
738 
739 static const char *
740 fmt_flags(int f)
741 {
742 	static char name[33];
743 	char *flags;
744 	struct bits *p = bits;
745 
746 	for (flags = name; p->b_mask; p++)
747 		if (p->b_mask & f)
748 			*flags++ = p->b_val;
749 	*flags = '\0';
750 	return (name);
751 }
752 
753 static void
754 p_rtentry(struct rtentry *rt)
755 {
756 	static struct ifnet ifnet, *lastif;
757 	struct rtentry parent;
758 	static char buffer[128];
759 	static char prettyname[128];
760 	struct sockaddr *sa;
761 	sa_u addr, mask;
762 
763 	/*
764 	 * Don't print protocol-cloned routes unless -a or -A.
765 	 */
766 	if (rt->rt_flags & RTF_WASCLONED && !(aflag || Aflag)) {
767 		if (kget(rt->rt_parent, parent) != 0)
768 			return;
769 		if (parent.rt_flags & RTF_PRCLONING)
770 			return;
771 	}
772 
773 	bzero(&addr, sizeof(addr));
774 	if ((sa = kgetsa(rt_key(rt))))
775 		bcopy(sa, &addr, sa->sa_len);
776 	bzero(&mask, sizeof(mask));
777 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
778 		bcopy(sa, &mask, sa->sa_len);
779 	p_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags, wid_dst);
780 	p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw);
781 	snprintf(buffer, sizeof(buffer), "%%-%d.%ds ", wid_flags, wid_flags);
782 	p_flags(rt->rt_flags, buffer);
783 	if (addr.u_sa.sa_family == AF_INET || Wflag) {
784 		printf("%*ld %*lu ", wid_refs, rt->rt_refcnt,
785 				     wid_use, rt->rt_use);
786 		if (Wflag) {
787 			if (rt->rt_rmx.rmx_mtu != 0)
788 				printf("%*lu ", wid_mtu, rt->rt_rmx.rmx_mtu);
789 			else
790 				printf("%*s ", wid_mtu, "");
791 		}
792 	}
793 	if (rt->rt_ifp) {
794 		if (rt->rt_ifp != lastif) {
795 			if (kget(rt->rt_ifp, ifnet) == 0)
796 				strlcpy(prettyname, ifnet.if_xname,
797 				    sizeof(prettyname));
798 			else
799 				strlcpy(prettyname, "---", sizeof(prettyname));
800 			lastif = rt->rt_ifp;
801 		}
802 		printf("%*.*s", wid_if, wid_if, prettyname);
803 		if (rt->rt_rmx.rmx_expire) {
804 			struct timespec sp;
805 			int expire_time;
806 
807 			clock_gettime(CLOCK_MONOTONIC, &sp);
808 
809 			expire_time = (int)(rt->rt_rmx.rmx_expire - sp.tv_sec);
810 			if (expire_time > 0)
811 				printf(" %*d", wid_expire, (int)expire_time);
812 			else
813 				printf("%*s ", wid_expire, "");
814 		} else {
815 			printf("%*s ", wid_expire, "");
816 		}
817 		if (rt->rt_nodes[0].rn_dupedkey)
818 			printf(" =>");
819 	}
820 	if (Wflag) {
821 		if (rt->rt_shim[0] != NULL)
822 			printf(" %-*s", wid_mplslops, labelops(rt));
823 		else
824 			printf(" %-*s", wid_mplslops, "");
825 		if (rt->rt_rmx.rmx_msl != 0)
826 			printf(" %*lu", wid_msl, rt->rt_rmx.rmx_msl);
827 		else
828 			printf("%*s ", wid_msl, "");
829 		if (rt->rt_rmx.rmx_iwmaxsegs != 0)
830 			printf(" %*lu", wid_iwmax, rt->rt_rmx.rmx_iwmaxsegs);
831 		else
832 			printf("%*s ", wid_iwmax, "");
833 		if (rt->rt_rmx.rmx_iwcapsegs != 0)
834 			printf(" %*lu", wid_iw, rt->rt_rmx.rmx_iwcapsegs);
835 		else
836 			printf("%*s ", wid_iw, "");
837 	}
838 	putchar('\n');
839 }
840 
841 char *
842 routename(u_long in)
843 {
844 	char *cp;
845 	static char line[MAXHOSTNAMELEN];
846 	struct hostent *hp;
847 
848 	cp = NULL;
849 	if (!numeric_addr) {
850 		hp = gethostbyaddr(&in, sizeof (struct in_addr), AF_INET);
851 		if (hp) {
852 			cp = hp->h_name;
853 			trimdomain(cp, strlen(cp));
854 		}
855 	}
856 	if (cp) {
857 		strncpy(line, cp, sizeof(line) - 1);
858 		line[sizeof(line) - 1] = '\0';
859 	} else {
860 #define C(x)	((x) & 0xff)
861 		in = ntohl(in);
862 		sprintf(line, "%lu.%lu.%lu.%lu",
863 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
864 	}
865 	return (line);
866 }
867 
868 static u_long
869 forgemask(u_long a)
870 {
871 	u_long m;
872 
873 	if (IN_CLASSA(a))
874 		m = IN_CLASSA_NET;
875 	else if (IN_CLASSB(a))
876 		m = IN_CLASSB_NET;
877 	else
878 		m = IN_CLASSC_NET;
879 	return (m);
880 }
881 
882 static void
883 domask(char *dst, u_long addr, u_long mask)
884 {
885 	int b, i;
886 
887 	if (!mask || (forgemask(addr) == mask)) {
888 		*dst = '\0';
889 		return;
890 	}
891 	i = 0;
892 	for (b = 0; b < 32; b++)
893 		if (mask & (1 << b)) {
894 			int bb;
895 
896 			i = b;
897 			for (bb = b+1; bb < 32; bb++)
898 				if (!(mask & (1 << bb))) {
899 					i = -1;	/* noncontig */
900 					break;
901 				}
902 			break;
903 		}
904 	if (i == -1)
905 		sprintf(dst, "&0x%lx", mask);
906 	else
907 		sprintf(dst, "/%d", 32-i);
908 }
909 
910 /*
911  * Return the name of the network whose address is given.
912  * The address is assumed to be that of a net or subnet, not a host.
913  */
914 char *
915 netname(u_long in, u_long mask)
916 {
917 	char *cp = NULL;
918 	static char line[MAXHOSTNAMELEN];
919 	struct netent *np = NULL;
920 	u_long dmask;
921 	u_long i;
922 
923 #define	NSHIFT(m) (							\
924 	(m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT :			\
925 	(m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT :			\
926 	(m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT :			\
927 	0)
928 
929 	i = ntohl(in);
930 	dmask = forgemask(i);
931 	if (!numeric_addr && i) {
932 		np = getnetbyaddr(i >> NSHIFT(mask), AF_INET);
933 		if (np == NULL && mask == 0)
934 			np = getnetbyaddr(i >> NSHIFT(dmask), AF_INET);
935 		if (np != NULL) {
936 			cp = np->n_name;
937 			trimdomain(cp, strlen(cp));
938 		}
939 	}
940 #undef NSHIFT
941 	if (cp != NULL) {
942 		strncpy(line, cp, sizeof(line) - 1);
943 		line[sizeof(line) - 1] = '\0';
944 	} else {
945 		if (mask <= IN_CLASSA_NET &&
946 			(i & IN_CLASSA_HOST) == 0) {
947 				sprintf(line, "%lu", C(i >> 24));
948 		} else if (mask <= IN_CLASSB_NET &&
949 			(i & IN_CLASSB_HOST) == 0) {
950 				sprintf(line, "%lu.%lu",
951 					C(i >> 24), C(i >> 16));
952 		} else if (mask <= IN_CLASSC_NET &&
953 			(i & IN_CLASSC_HOST) == 0) {
954 				sprintf(line, "%lu.%lu.%lu",
955 					C(i >> 24), C(i >> 16), C(i >> 8));
956 		} else {
957 			sprintf(line, "%lu.%lu.%lu.%lu",
958 				C(i >> 24), C(i >> 16), C(i >> 8), C(i));
959 		}
960 	}
961 	domask(line + strlen(line), i, mask);
962 	return (line);
963 }
964 
965 #ifdef INET6
966 const char *
967 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask)
968 {
969 	static char line[MAXHOSTNAMELEN];
970 	u_char *p = (u_char *)mask;
971 	u_char *lim;
972 	int masklen, illegal = 0, flag = NI_WITHSCOPEID;
973 
974 	if (mask) {
975 		for (masklen = 0, lim = p + 16; p < lim; p++) {
976 			switch (*p) {
977 			 case 0xff:
978 				 masklen += 8;
979 				 break;
980 			 case 0xfe:
981 				 masklen += 7;
982 				 break;
983 			 case 0xfc:
984 				 masklen += 6;
985 				 break;
986 			 case 0xf8:
987 				 masklen += 5;
988 				 break;
989 			 case 0xf0:
990 				 masklen += 4;
991 				 break;
992 			 case 0xe0:
993 				 masklen += 3;
994 				 break;
995 			 case 0xc0:
996 				 masklen += 2;
997 				 break;
998 			 case 0x80:
999 				 masklen += 1;
1000 				 break;
1001 			 case 0x00:
1002 				 break;
1003 			 default:
1004 				 illegal ++;
1005 				 break;
1006 			}
1007 		}
1008 		if (illegal)
1009 			fprintf(stderr, "illegal prefixlen\n");
1010 	}
1011 	else
1012 		masklen = 128;
1013 
1014 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
1015 		return("default");
1016 
1017 	if (numeric_addr)
1018 		flag |= NI_NUMERICHOST;
1019 	getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line),
1020 		    NULL, 0, flag);
1021 
1022 	if (numeric_addr)
1023 		sprintf(&line[strlen(line)], "/%d", masklen);
1024 
1025 	return line;
1026 }
1027 
1028 char *
1029 routename6(struct sockaddr_in6 *sa6)
1030 {
1031 	static char line[MAXHOSTNAMELEN];
1032 	int flag = NI_WITHSCOPEID;
1033 	/* use local variable for safety */
1034 	struct sockaddr_in6 sa6_local;
1035 
1036 	sa6_local.sin6_family = AF_INET6;
1037 	sa6_local.sin6_len = sizeof(sa6_local);
1038 	sa6_local.sin6_addr = sa6->sin6_addr;
1039 	sa6_local.sin6_scope_id = sa6->sin6_scope_id;
1040 
1041 	if (numeric_addr)
1042 		flag |= NI_NUMERICHOST;
1043 
1044 	getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
1045 		    line, sizeof(line), NULL, 0, flag);
1046 
1047 	return line;
1048 }
1049 #endif /*INET6*/
1050 
1051 /*
1052  * Print routing statistics
1053  */
1054 void
1055 rt_stats(void)
1056 {
1057 	struct rtstatistics rts;
1058 	int error = 0;
1059 
1060 	error = kinfo_get_net_rtstatistics(&rts);
1061 	if (error) {
1062 		printf("routing: could not retrieve statistics\n");
1063 		return;
1064 	}
1065 	printf("routing:\n");
1066 
1067 #define	p(f, m) if (rts.f || sflag <= 1) \
1068 	printf(m, rts.f, plural(rts.f))
1069 
1070 	p(rts_badredirect, "\t%lu bad routing redirect%s\n");
1071 	p(rts_dynamic, "\t%lu dynamically created route%s\n");
1072 	p(rts_newgateway, "\t%lu new gateway%s due to redirects\n");
1073 	p(rts_unreach, "\t%lu destination%s found unreachable\n");
1074 	p(rts_wildcard, "\t%lu use%s of a wildcard route\n");
1075 #undef p
1076 }
1077 
1078 static const char *
1079 labelops(struct rtentry *rt)
1080 {
1081 	const char *lops[] = { "push", "pop", "swap", "pop all" };
1082 	static char buffer[100];
1083 	char *cp = buffer;
1084 	struct sockaddr_mpls *smpls;
1085 	int i;
1086 
1087 	for (i=0; i<MPLS_MAXLOPS; ++i) {
1088 
1089 		if (rt->rt_shim[i] == NULL)
1090 			break;
1091 		if (i>0) {
1092 			cp += snprintf(cp,
1093 				       sizeof(buffer) - (cp - buffer),
1094 				       ", ");
1095 		}
1096 		smpls = (struct sockaddr_mpls *)kgetsa(rt->rt_shim[i]);
1097 		if (smpls->smpls_op != MPLSLOP_POP &&
1098 		    smpls->smpls_op != MPLSLOP_POPALL){
1099 			cp += snprintf(cp,
1100 				       sizeof(buffer) - (cp - buffer),
1101 				       "%s %d",
1102 				       lops[smpls->smpls_op - 1],
1103 				       ntohl(smpls->smpls_label));
1104 		} else {
1105 			cp += snprintf(cp,
1106 				       sizeof(buffer) - (cp - buffer),
1107 				       "%s",
1108 				       lops[smpls->smpls_op - 1]);
1109 		}
1110 	}
1111 
1112 	return (buffer);
1113 }
1114