xref: /netbsd-src/usr.bin/netstat/route.c (revision 1ca5c1b28139779176bd5c13ad7c5f25c0bcd5f8)
1 /*	$NetBSD: route.c,v 1.58 2001/10/06 18:56:49 bjh21 Exp $	*/
2 
3 /*
4  * Copyright (c) 1983, 1988, 1993
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. All advertising materials mentioning features or use of this software
16  *    must display the following acknowledgement:
17  *	This product includes software developed by the University of
18  *	California, Berkeley and its contributors.
19  * 4. Neither the name of the University nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include <sys/cdefs.h>
37 #ifndef lint
38 #if 0
39 static char sccsid[] = "from: @(#)route.c	8.3 (Berkeley) 3/9/94";
40 #else
41 __RCSID("$NetBSD: route.c,v 1.58 2001/10/06 18:56:49 bjh21 Exp $");
42 #endif
43 #endif /* not lint */
44 
45 #include <sys/param.h>
46 #include <sys/protosw.h>
47 #include <sys/socket.h>
48 #include <sys/mbuf.h>
49 #include <sys/un.h>
50 
51 #include <net/if.h>
52 #include <net/if_dl.h>
53 #include <net/if_types.h>
54 #define _KERNEL
55 #include <net/route.h>
56 #undef _KERNEL
57 #include <netinet/in.h>
58 #include <netatalk/at.h>
59 #include <netiso/iso.h>
60 
61 #include <netns/ns.h>
62 
63 #include <sys/sysctl.h>
64 
65 #include <arpa/inet.h>
66 
67 #include <err.h>
68 #include <netdb.h>
69 #include <stdio.h>
70 #include <stdlib.h>
71 #include <string.h>
72 #include <unistd.h>
73 
74 #include "netstat.h"
75 
76 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
77 
78 /* alignment constraint for routing socket */
79 #define ROUNDUP(a) \
80 	((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
81 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
82 
83 /*
84  * Definitions for showing gateway flags.
85  */
86 struct bits {
87 	short	b_mask;
88 	char	b_val;
89 } bits[] = {
90 	{ RTF_UP,	'U' },
91 	{ RTF_GATEWAY,	'G' },
92 	{ RTF_HOST,	'H' },
93 	{ RTF_REJECT,	'R' },
94 	{ RTF_DYNAMIC,	'D' },
95 	{ RTF_MODIFIED,	'M' },
96 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
97 	{ RTF_MASK,	'm' }, /* Mask Present -- for routing messages only */
98 	{ RTF_CLONING,	'C' },
99 	{ RTF_XRESOLVE,	'X' },
100 	{ RTF_LLINFO,	'L' },
101 	{ RTF_STATIC,	'S' },
102 	{ RTF_BLACKHOLE,'B' },
103 	{ RTF_CLONED,	'c' },
104 	{ RTF_PROTO1,	'1' },
105 	{ RTF_PROTO2,	'2' },
106 	{ 0 }
107 };
108 
109 /*
110  * XXX we put all of the sockaddr types in here to force the alignment
111  * to be correct.
112  */
113 static union sockaddr_union {
114 	struct	sockaddr u_sa;
115 	struct	sockaddr_in u_in;
116 	struct	sockaddr_un u_un;
117 	struct	sockaddr_iso u_iso;
118 	struct	sockaddr_at u_at;
119 	struct	sockaddr_dl u_dl;
120 	struct	sockaddr_ns u_ns;
121 	u_short	u_data[128];
122 	int u_dummy;		/* force word-alignment */
123 } pt_u;
124 
125 int	do_rtent = 0;
126 struct	rtentry rtentry;
127 struct	radix_node rnode;
128 struct	radix_mask rmask;
129 
130 int	NewTree = 0;
131 
132 static struct sockaddr *kgetsa __P((struct sockaddr *));
133 static void p_tree __P((struct radix_node *));
134 static void p_rtnode __P((void));
135 static void ntreestuff __P((void));
136 static void np_rtentry __P((struct rt_msghdr *));
137 static void p_sockaddr __P((const struct sockaddr *,
138 			    const struct sockaddr *, int, int));
139 static void p_flags __P((int));
140 static void p_rtentry __P((struct rtentry *));
141 static void ntreestuff __P((void));
142 static u_long forgemask __P((u_long));
143 static void domask __P((char *, size_t, u_long, u_long));
144 
145 /*
146  * Print routing tables.
147  */
148 void
149 routepr(rtree)
150 	u_long rtree;
151 {
152 	struct radix_node_head *rnh, head;
153 	int i;
154 
155 	printf("Routing tables\n");
156 
157 	if (Aflag == 0 && NewTree)
158 		ntreestuff();
159 	else {
160 		if (rtree == 0) {
161 			printf("rt_tables: symbol not in namelist\n");
162 			return;
163 		}
164 
165 		kget(rtree, rt_tables);
166 		for (i = 0; i <= AF_MAX; i++) {
167 			if ((rnh = rt_tables[i]) == 0)
168 				continue;
169 			kget(rnh, head);
170 			if (i == AF_UNSPEC) {
171 				if (Aflag && af == 0) {
172 					printf("Netmasks:\n");
173 					p_tree(head.rnh_treetop);
174 				}
175 			} else if (af == AF_UNSPEC || af == i) {
176 				pr_family(i);
177 				do_rtent = 1;
178 				pr_rthdr(i);
179 				p_tree(head.rnh_treetop);
180 			}
181 		}
182 	}
183 }
184 
185 /*
186  * Print address family header before a section of the routing table.
187  */
188 void
189 pr_family(af)
190 	int af;
191 {
192 	char *afname;
193 
194 	switch (af) {
195 	case AF_INET:
196 		afname = "Internet";
197 		break;
198 #ifdef INET6
199 	case AF_INET6:
200 		afname = "Internet6";
201 		break;
202 #endif
203 	case AF_NS:
204 		afname = "XNS";
205 		break;
206 	case AF_ISO:
207 		afname = "ISO";
208 		break;
209 	case AF_APPLETALK:
210 		afname = "AppleTalk";
211 		break;
212 	case AF_CCITT:
213 		afname = "X.25";
214 		break;
215 	default:
216 		afname = NULL;
217 		break;
218 	}
219 	if (afname)
220 		printf("\n%s:\n", afname);
221 	else
222 		printf("\nProtocol Family %d:\n", af);
223 }
224 
225 /* column widths; each followed by one space */
226 #ifndef INET6
227 #define	WID_DST(af)	18	/* width of destination column */
228 #define	WID_GW(af)	18	/* width of gateway column */
229 #else
230 /* width of destination/gateway column */
231 #ifdef KAME_SCOPEID
232 /* strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 */
233 #define	WID_DST(af)	((af) == AF_INET6 ? (numeric_addr ? 34 : 18) : 18)
234 #define	WID_GW(af)	((af) == AF_INET6 ? (numeric_addr ? 30 : 18) : 18)
235 #else
236 /* strlen("fe80::aaaa:bbbb:cccc:dddd") == 25, strlen("/128") == 4 */
237 #define	WID_DST(af)	((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18)
238 #define	WID_GW(af)	((af) == AF_INET6 ? (numeric_addr ? 25 : 18) : 18)
239 #endif
240 #endif /* INET6 */
241 
242 /*
243  * Print header for routing table columns.
244  */
245 void
246 pr_rthdr(af)
247 	int af;
248 {
249 
250 	if (Aflag)
251 		printf("%-8.8s ","Address");
252 	printf("%-*.*s %-*.*s %-6.6s  %6.6s%8.8s %6.6s  %s\n",
253 		WID_DST(af), WID_DST(af), "Destination",
254 		WID_GW(af), WID_GW(af), "Gateway",
255 		"Flags", "Refs", "Use", "Mtu", "Interface");
256 }
257 
258 static struct sockaddr *
259 kgetsa(dst)
260 	struct sockaddr *dst;
261 {
262 
263 	kget(dst, pt_u.u_sa);
264 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
265 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
266 	return (&pt_u.u_sa);
267 }
268 
269 static void
270 p_tree(rn)
271 	struct radix_node *rn;
272 {
273 
274 again:
275 	kget(rn, rnode);
276 	if (rnode.rn_b < 0) {
277 		if (Aflag)
278 			printf("%-8.8lx ", (u_long) rn);
279 		if (rnode.rn_flags & RNF_ROOT) {
280 			if (Aflag)
281 				printf("(root node)%s",
282 				    rnode.rn_dupedkey ? " =>\n" : "\n");
283 		} else if (do_rtent) {
284 			kget(rn, rtentry);
285 			p_rtentry(&rtentry);
286 			if (Aflag)
287 				p_rtnode();
288 		} else {
289 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
290 			    NULL, 0, 44);
291 			putchar('\n');
292 		}
293 		if ((rn = rnode.rn_dupedkey) != NULL)
294 			goto again;
295 	} else {
296 		if (Aflag && do_rtent) {
297 			printf("%-8.8lx ", (u_long) rn);
298 			p_rtnode();
299 		}
300 		rn = rnode.rn_r;
301 		p_tree(rnode.rn_l);
302 		p_tree(rn);
303 	}
304 }
305 
306 static void
307 p_rtnode()
308 {
309 	struct radix_mask *rm = rnode.rn_mklist;
310 	char	nbuf[20];
311 
312 	if (rnode.rn_b < 0) {
313 		if (rnode.rn_mask) {
314 			printf("\t  mask ");
315 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
316 				    NULL, 0, -1);
317 		} else if (rm == 0)
318 			return;
319 	} else {
320 		(void)snprintf(nbuf, sizeof nbuf, "(%d)", rnode.rn_b);
321 		printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long) rnode.rn_l,
322 		    (u_long) rnode.rn_r);
323 	}
324 	while (rm) {
325 		kget(rm, rmask);
326 		(void)snprintf(nbuf, sizeof nbuf, " %d refs, ", rmask.rm_refs);
327 		printf(" mk = %8.8lx {(%d),%s", (u_long) rm,
328 		    -1 - rmask.rm_b, rmask.rm_refs ? nbuf : " ");
329 		if (rmask.rm_flags & RNF_NORMAL) {
330 			struct radix_node rnode_aux;
331 			printf(" <normal>, ");
332 			kget(rmask.rm_leaf, rnode_aux);
333 			p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
334 				    NULL, 0, -1);
335 		} else
336 			p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
337 			    NULL, 0, -1);
338 		putchar('}');
339 		if ((rm = rmask.rm_mklist) != NULL)
340 			printf(" ->");
341 	}
342 	putchar('\n');
343 }
344 
345 static void
346 ntreestuff()
347 {
348 	size_t needed;
349 	int mib[6];
350 	char *buf, *next, *lim;
351 	struct rt_msghdr *rtm;
352 
353 	mib[0] = CTL_NET;
354 	mib[1] = PF_ROUTE;
355 	mib[2] = 0;
356 	mib[3] = 0;
357 	mib[4] = NET_RT_DUMP;
358 	mib[5] = 0;
359 	if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
360 		err(1, "route sysctl estimate");
361 	if ((buf = malloc(needed)) == 0)
362 		errx(1, "out of space");
363 	if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
364 		err(1, "sysctl of routing table");
365 	lim  = buf + needed;
366 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
367 		rtm = (struct rt_msghdr *)next;
368 		np_rtentry(rtm);
369 	}
370 }
371 
372 static void
373 np_rtentry(rtm)
374 	struct rt_msghdr *rtm;
375 {
376 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
377 #ifdef notdef
378 	static int masks_done, banner_printed;
379 #endif
380 	static int old_af;
381 	int af = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
382 
383 	if (Lflag && (rtm->rtm_flags & RTF_LLINFO))
384 		return;
385 #ifdef notdef
386 	/* for the moment, netmasks are skipped over */
387 	if (!banner_printed) {
388 		printf("Netmasks:\n");
389 		banner_printed = 1;
390 	}
391 	if (masks_done == 0) {
392 		if (rtm->rtm_addrs != RTA_DST ) {
393 			masks_done = 1;
394 			af = sa->sa_family;
395 		}
396 	} else
397 #endif
398 		af = sa->sa_family;
399 	if (af != old_af) {
400 		pr_family(af);
401 		old_af = af;
402 	}
403 	if (rtm->rtm_addrs == RTA_DST)
404 		p_sockaddr(sa, NULL, 0, 36);
405 	else {
406 		p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
407 #if 0
408 		if (sa->sa_len == 0)
409 			sa->sa_len = sizeof(long);
410 #endif
411 		sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa);
412 		p_sockaddr(sa, NULL, 0, 18);
413 	}
414 	p_flags(rtm->rtm_flags & interesting);
415 	putchar('\n');
416 }
417 
418 static void
419 p_sockaddr(sa, mask, flags, width)
420 	const struct sockaddr *sa, *mask;
421 	int flags, width;
422 {
423 	char workbuf[128], *cplim;
424 	char *cp = workbuf;
425 	char *ep = workbuf + sizeof(workbuf);
426 	int n;
427 
428 	switch(sa->sa_family) {
429 	case AF_INET:
430 	    {
431 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
432 
433 		if ((sin->sin_addr.s_addr == INADDR_ANY) &&
434 		    (mask != NULL) &&
435 		    (((struct sockaddr_in *)mask)->sin_addr.s_addr == 0))
436 			cp = "default";
437 		else if (flags & RTF_HOST)
438 			cp = routename(sin->sin_addr.s_addr);
439 		else if (mask)
440 			cp = netname(sin->sin_addr.s_addr,
441 			    ((struct sockaddr_in *)mask)->sin_addr.s_addr);
442 		else
443 			cp = netname(sin->sin_addr.s_addr, INADDR_ANY);
444 		break;
445 	    }
446 
447 #ifdef INET6
448 	case AF_INET6:
449 	    {
450 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
451 #ifdef KAME_SCOPEID
452 		struct in6_addr *in6 = &sa6->sin6_addr;
453 
454 		/*
455 		 * XXX: This is a special workaround for KAME kernels.
456 		 * sin6_scope_id field of SA should be set in the future.
457 		 */
458 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
459 		    IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
460 		    /* XXX: override is ok? */
461 		    sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
462 		    *(u_short *)&in6->s6_addr[2] = 0;
463 		}
464 #endif
465 
466 		if (flags & RTF_HOST)
467 			cp = routename6(sa6);
468 		else if (mask) {
469 			cp = netname6(sa6,
470 				      &((struct sockaddr_in6 *)mask)->sin6_addr);
471 		} else
472 			cp = netname6(sa6, NULL);
473 		break;
474 	    }
475 #endif
476 
477 #ifndef SMALL
478 	case AF_APPLETALK:
479 	case 0:
480 	    {
481 		if (!(flags & RTF_HOST) && mask)
482 			cp = atalk_print2(sa,mask,11);
483 		else
484 			cp = atalk_print(sa,11);
485 		break;
486 	    }
487 	case AF_NS:
488 		cp = ns_print((struct sockaddr *)sa);
489 		break;
490 #endif
491 
492 	case AF_LINK:
493 		if (getnameinfo(sa, sa->sa_len, workbuf, sizeof(workbuf),
494 		    NULL, 0, NI_NUMERICHOST) != 0)
495 			strncpy(workbuf, "invalid", sizeof(workbuf));
496 		cp = workbuf;
497 		break;
498 
499 	default:
500 	    {
501 		u_char *s = (u_char *)sa->sa_data, *slim;
502 
503 		slim =  sa->sa_len + (u_char *) sa;
504 		cplim = cp + sizeof(workbuf) - 6;
505 		n = snprintf(cp, ep - cp, "(%d)", sa->sa_family);
506 		if (n >= ep - cp)
507 			n = ep - cp - 1;
508 		if (n > 0)
509 			cp += n;
510 		while (s < slim && cp < cplim) {
511 			n = snprintf(cp, ep - cp, " %02x", *s++);
512 			if (n >= ep - cp)
513 				n = ep - cp - 1;
514 			if (n > 0)
515 				cp += n;
516 			if (s < slim) {
517 				n = snprintf(cp, ep - cp, "%02x", *s++);
518 				if (n >= ep - cp)
519 					n = ep - cp - 1;
520 				if (n > 0)
521 					cp += n;
522 			}
523 		}
524 		cp = workbuf;
525 	    }
526 	}
527 	if (width < 0 )
528 		printf("%s ", cp);
529 	else {
530 		if (numeric_addr)
531 			printf("%-*s ", width, cp);
532 		else
533 			printf("%-*.*s ", width, width, cp);
534 	}
535 }
536 
537 static void
538 p_flags(f)
539 	int f;
540 {
541 	char name[33], *flags;
542 	struct bits *p = bits;
543 
544 	for (flags = name; p->b_mask && flags - name < sizeof(name); p++)
545 		if (p->b_mask & f)
546 			*flags++ = p->b_val;
547 	*flags = '\0';
548 	printf("%-6.6s ", name);
549 }
550 
551 static struct sockaddr *sockcopy __P((struct sockaddr *,
552     union sockaddr_union *));
553 
554 /*
555  * copy a sockaddr into an allocated region, allocate at least sockaddr
556  * bytes and zero unused
557  */
558 static struct sockaddr *
559 sockcopy(sp, dp)
560 	struct sockaddr *sp;
561 	union sockaddr_union *dp;
562 {
563 	int len;
564 
565 	if (sp == 0 || sp->sa_len == 0)
566 		(void)memset(dp, 0, sizeof (*sp));
567 	else {
568 		len = (sp->sa_len >= sizeof (*sp)) ? sp->sa_len : sizeof (*sp);
569 		(void)memcpy(dp, sp, len);
570 	}
571 	return ((struct sockaddr *)dp);
572 }
573 
574 static void
575 p_rtentry(rt)
576 	struct rtentry *rt;
577 {
578 	static struct ifnet ifnet, *lastif;
579 	union sockaddr_union addr_un, mask_un;
580 	struct sockaddr *addr, *mask;
581 	int af;
582 
583 	if (Lflag && (rt->rt_flags & RTF_LLINFO))
584 		return;
585 
586 	memset(&addr_un, 0, sizeof(addr_un));
587 	memset(&mask_un, 0, sizeof(mask_un));
588 	addr = sockcopy(kgetsa(rt_key(rt)), &addr_un);
589 	af = addr->sa_family;
590 	if (rt_mask(rt))
591 		mask = sockcopy(kgetsa(rt_mask(rt)), &mask_un);
592 	else
593 		mask = sockcopy(NULL, &mask_un);
594 	p_sockaddr(addr, mask, rt->rt_flags, WID_DST(af));
595 	p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, WID_GW(af));
596 	p_flags(rt->rt_flags);
597 	printf("%6d %8lu ", rt->rt_refcnt, rt->rt_use);
598 	if (rt->rt_rmx.rmx_mtu)
599 		printf("%6lu", rt->rt_rmx.rmx_mtu);
600 	else
601 		printf("%6s", "-");
602 	putchar((rt->rt_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
603 	if (rt->rt_ifp) {
604 		if (rt->rt_ifp != lastif) {
605 			kget(rt->rt_ifp, ifnet);
606 			lastif = rt->rt_ifp;
607 		}
608 		printf(" %.16s%s", ifnet.if_xname,
609 			rt->rt_nodes[0].rn_dupedkey ? " =>" : "");
610 	}
611 	putchar('\n');
612  	if (vflag) {
613  		printf("\texpire   %10lu%c  recvpipe %10ld%c  "
614 		       "sendpipe %10ld%c\n",
615  			rt->rt_rmx.rmx_expire,
616  			(rt->rt_rmx.rmx_locks & RTV_EXPIRE) ? 'L' : ' ',
617  			rt->rt_rmx.rmx_recvpipe,
618  			(rt->rt_rmx.rmx_locks & RTV_RPIPE) ? 'L' : ' ',
619  			rt->rt_rmx.rmx_sendpipe,
620  			(rt->rt_rmx.rmx_locks & RTV_SPIPE) ? 'L' : ' ');
621  		printf("\tssthresh %10lu%c  rtt      %10ld%c  "
622 		       "rttvar   %10ld%c\n",
623  			rt->rt_rmx.rmx_ssthresh,
624  			(rt->rt_rmx.rmx_locks & RTV_SSTHRESH) ? 'L' : ' ',
625  			rt->rt_rmx.rmx_rtt,
626  			(rt->rt_rmx.rmx_locks & RTV_RTT) ? 'L' : ' ',
627  			rt->rt_rmx.rmx_rttvar,
628 			(rt->rt_rmx.rmx_locks & RTV_RTTVAR) ? 'L' : ' ');
629  		printf("\thopcount %10lu%c\n",
630  			rt->rt_rmx.rmx_hopcount,
631 			(rt->rt_rmx.rmx_locks & RTV_HOPCOUNT) ? 'L' : ' ');
632  	}
633 }
634 
635 char *
636 routename(in)
637 	u_int32_t in;
638 {
639 	char *cp;
640 	static char line[MAXHOSTNAMELEN + 1];
641 	struct hostent *hp;
642 	static char domain[MAXHOSTNAMELEN + 1];
643 	static int first = 1;
644 
645 	if (first) {
646 		first = 0;
647 		if (gethostname(domain, MAXHOSTNAMELEN) == 0) {
648 			domain[sizeof(domain) - 1] = '\0';
649 			if ((cp = strchr(domain, '.')))
650 				(void)strlcpy(domain, cp + 1, sizeof(domain));
651 			else
652 				domain[0] = 0;
653 		} else
654 			domain[0] = 0;
655 	}
656 	cp = 0;
657 	if (!numeric_addr) {
658 		hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
659 			AF_INET);
660 		if (hp) {
661 			if ((cp = strchr(hp->h_name, '.')) &&
662 			    !strcmp(cp + 1, domain))
663 				*cp = 0;
664 			cp = hp->h_name;
665 		}
666 	}
667 	if (cp) {
668 		strncpy(line, cp, sizeof(line) - 1);
669 		line[sizeof(line) - 1] = '\0';
670 	} else {
671 #define C(x)	((x) & 0xff)
672 		in = ntohl(in);
673 		snprintf(line, sizeof line, "%u.%u.%u.%u",
674 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
675 	}
676 	return (line);
677 }
678 
679 static u_long
680 forgemask(a)
681 	u_long a;
682 {
683 	u_long m;
684 
685 	if (IN_CLASSA(a))
686 		m = IN_CLASSA_NET;
687 	else if (IN_CLASSB(a))
688 		m = IN_CLASSB_NET;
689 	else
690 		m = IN_CLASSC_NET;
691 	return (m);
692 }
693 
694 static void
695 domask(dst, dlen, addr, mask)
696 	char *dst;
697 	size_t dlen;
698 	u_long addr, mask;
699 {
700 	int b, i;
701 
702 	if (!mask || (forgemask(addr) == mask)) {
703 		*dst = '\0';
704 		return;
705 	}
706 	i = 0;
707 	for (b = 0; b < 32; b++)
708 		if (mask & (1 << b)) {
709 			int bb;
710 
711 			i = b;
712 			for (bb = b+1; bb < 32; bb++)
713 				if (!(mask & (1 << bb))) {
714 					i = -1;	/* noncontig */
715 					break;
716 				}
717 			break;
718 		}
719 	if (i == -1)
720 		(void)snprintf(dst, dlen, "&0x%lx", mask);
721 	else
722 		(void)snprintf(dst, dlen, "/%d", 32-i);
723 }
724 
725 /*
726  * Return the name of the network whose address is given.
727  * The address is assumed to be that of a net or subnet, not a host.
728  */
729 char *
730 netname(in, mask)
731 	u_int32_t in, mask;
732 {
733 	char *cp = 0;
734 	static char line[MAXHOSTNAMELEN + 4];
735 	struct netent *np = 0;
736 	u_int32_t net, omask;
737 	u_int32_t i;
738 	int subnetshift;
739 
740 	i = ntohl(in);
741 	omask = mask = ntohl(mask);
742 	if (!numeric_addr && i != INADDR_ANY) {
743 		if (mask == INADDR_ANY) {
744 			switch (mask = forgemask(i)) {
745 			case IN_CLASSA_NET:
746 				subnetshift = 8;
747 				break;
748 			case IN_CLASSB_NET:
749 				subnetshift = 8;
750 				break;
751 			case IN_CLASSC_NET:
752 				subnetshift = 4;
753 				break;
754 			default:
755 				abort();
756 			}
757 			/*
758 			 * If there are more bits than the standard mask
759 			 * would suggest, subnets must be in use.
760 			 * Guess at the subnet mask, assuming reasonable
761 			 * width subnet fields.
762 			 */
763 			while (i &~ mask)
764 				mask = (long)mask >> subnetshift;
765 		}
766 		net = i & mask;
767 		/*
768 		 * Note: shift the hosts bits out in octet units, since
769 		 * not all versions of getnetbyaddr() do this for us (e.g.
770 		 * the current `etc/networks' parser).
771 		 */
772 		while ((mask & 0xff) == 0)
773 			mask >>= 8, net >>= 8;
774 		np = getnetbyaddr(net, AF_INET);
775 		if (np)
776 			cp = np->n_name;
777 	}
778 	if (cp)
779 		strncpy(line, cp, sizeof(line) - 1);
780 	else if ((i & 0xffffff) == 0)
781 		(void)snprintf(line, sizeof line, "%u", C(i >> 24));
782 	else if ((i & 0xffff) == 0)
783 		(void)snprintf(line, sizeof line, "%u.%u", C(i >> 24)
784 		    , C(i >> 16));
785 	else if ((i & 0xff) == 0)
786 		(void)snprintf(line, sizeof line, "%u.%u.%u", C(i >> 24),
787 		    C(i >> 16), C(i >> 8));
788 	else
789 		(void)snprintf(line, sizeof line, "%u.%u.%u.%u", C(i >> 24),
790 			C(i >> 16), C(i >> 8), C(i));
791 	domask(line + strlen(line), sizeof(line) - strlen(line), i, omask);
792 	return (line);
793 }
794 
795 #ifdef INET6
796 char *
797 netname6(sa6, mask)
798 	struct sockaddr_in6 *sa6;
799 	struct in6_addr *mask;
800 {
801 	static char line[NI_MAXHOST];
802 	u_char *p, *q;
803 	u_char *lim;
804 	int masklen, final = 0, illegal = 0;
805 #ifdef KAME_SCOPEID
806 	int flag = NI_WITHSCOPEID;
807 #else
808 	int flag = 0;
809 #endif
810 	int error;
811 	struct sockaddr_in6 sin6;
812 
813 	sin6 = *sa6;
814 	if (mask) {
815 		masklen = 0;
816 		lim = (u_char *)(mask + 1);
817 		for (p = (u_char *)mask, q = (u_char *)&sin6.sin6_addr;
818 		     p < lim;
819 		     p++, q++) {
820 			if (final && *p) {
821 				illegal++;
822 				*q = 0;
823 				continue;
824 			}
825 
826 			switch (*p & 0xff) {
827 			 case 0xff:
828 				 masklen += 8;
829 				 break;
830 			 case 0xfe:
831 				 masklen += 7;
832 				 final++;
833 				 break;
834 			 case 0xfc:
835 				 masklen += 6;
836 				 final++;
837 				 break;
838 			 case 0xf8:
839 				 masklen += 5;
840 				 final++;
841 				 break;
842 			 case 0xf0:
843 				 masklen += 4;
844 				 final++;
845 				 break;
846 			 case 0xe0:
847 				 masklen += 3;
848 				 final++;
849 				 break;
850 			 case 0xc0:
851 				 masklen += 2;
852 				 final++;
853 				 break;
854 			 case 0x80:
855 				 masklen += 1;
856 				 final++;
857 				 break;
858 			 case 0x00:
859 				 final++;
860 				 break;
861 			 default:
862 				 final++;
863 				 illegal++;
864 				 break;
865 			}
866 
867 			if (!illegal)
868 				*q &= *p;
869 			else
870 				*q = 0;
871 		}
872 	} else
873 		masklen = 128;
874 
875 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
876 		return("default");
877 
878 	if (numeric_addr)
879 		flag |= NI_NUMERICHOST;
880 	error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
881 			line, sizeof(line), NULL, 0, flag);
882 	if (error)
883 		strlcpy(line, "invalid", sizeof(line));
884 
885 	if (numeric_addr)
886 		snprintf(&line[strlen(line)], sizeof(line) - strlen(line),
887 		    "/%d", masklen);
888 
889 	return line;
890 }
891 
892 char *
893 routename6(sa6)
894 	struct sockaddr_in6 *sa6;
895 {
896 	static char line[NI_MAXHOST];
897 #ifdef KAME_SCOPEID
898 	int flag = NI_WITHSCOPEID;
899 #else
900 	int flag = 0;
901 #endif
902 	/* use local variable for safety */
903 	struct sockaddr_in6 sa6_local;
904 	int error;
905 
906 	memset(&sa6_local, 0, sizeof(sa6_local));
907 	sa6_local.sin6_family = AF_INET6;
908 	sa6_local.sin6_len = sizeof(struct sockaddr_in6);
909 	sa6_local.sin6_addr = sa6->sin6_addr;
910 	sa6_local.sin6_scope_id = sa6->sin6_scope_id;
911 
912 	if (numeric_addr)
913 		flag |= NI_NUMERICHOST;
914 
915 	error = getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
916 			line, sizeof(line), NULL, 0, flag);
917 	if (error)
918 		strlcpy(line, "invalid", sizeof(line));
919 
920 	return line;
921 }
922 #endif /*INET6*/
923 
924 /*
925  * Print routing statistics
926  */
927 void
928 rt_stats(off)
929 	u_long off;
930 {
931 	struct rtstat rtstat;
932 
933 	if (off == 0) {
934 		printf("rtstat: symbol not in namelist\n");
935 		return;
936 	}
937 	kread(off, (char *)&rtstat, sizeof (rtstat));
938 	printf("routing:\n");
939 	printf("\t%llu bad routing redirect%s\n",
940 		(unsigned long long)rtstat.rts_badredirect,
941 		plural(rtstat.rts_badredirect));
942 	printf("\t%llu dynamically created route%s\n",
943 		(unsigned long long)rtstat.rts_dynamic,
944 		plural(rtstat.rts_dynamic));
945 	printf("\t%llu new gateway%s due to redirects\n",
946 		(unsigned long long)rtstat.rts_newgateway,
947 		plural(rtstat.rts_newgateway));
948 	printf("\t%llu destination%s found unreachable\n",
949 		(unsigned long long)rtstat.rts_unreach,
950 		plural(rtstat.rts_unreach));
951 	printf("\t%llu use%s of a wildcard route\n",
952 		(unsigned long long)rtstat.rts_wildcard,
953 		plural(rtstat.rts_wildcard));
954 }
955 short ns_nullh[] = {0,0,0};
956 short ns_bh[] = {-1,-1,-1};
957 
958 char *
959 ns_print(sa)
960 	struct sockaddr *sa;
961 {
962 	struct sockaddr_ns *sns = (struct sockaddr_ns*)sa;
963 	struct ns_addr work;
964 	union {
965 		union	ns_net net_e;
966 		u_long	long_e;
967 	} net;
968 	u_short port;
969 	static char mybuf[50], cport[10], chost[25];
970 	char *host = "";
971 	char *p;
972 	u_char *q;
973 
974 	work = sns->sns_addr;
975 	port = ntohs(work.x_port);
976 	work.x_port = 0;
977 	net.net_e  = work.x_net;
978 	if (ns_nullhost(work) && net.long_e == 0) {
979 		if (port ) {
980 			(void)snprintf(mybuf, sizeof mybuf, "*.%xH", port);
981 			upHex(mybuf);
982 		} else
983 			(void)snprintf(mybuf, sizeof mybuf, "*.*");
984 		return (mybuf);
985 	}
986 
987 	if (memcmp(ns_bh, work.x_host.c_host, 6) == 0) {
988 		host = "any";
989 	} else if (memcmp(ns_nullh, work.x_host.c_host, 6) == 0) {
990 		host = "*";
991 	} else {
992 		q = work.x_host.c_host;
993 		(void)snprintf(chost, sizeof chost, "%02x%02x%02x%02x%02x%02xH",
994 			q[0], q[1], q[2], q[3], q[4], q[5]);
995 		for (p = chost; *p == '0' && p < chost + 12; p++)
996 			continue;
997 		host = p;
998 	}
999 	if (port)
1000 		(void)snprintf(cport, sizeof cport, ".%xH", htons(port));
1001 	else
1002 		*cport = 0;
1003 
1004 	(void)snprintf(mybuf, sizeof mybuf, "%xH.%s%s", (int)ntohl(net.long_e),
1005 	    host, cport);
1006 	upHex(mybuf);
1007 	return (mybuf);
1008 }
1009 
1010 char *
1011 ns_phost(sa)
1012 	struct sockaddr *sa;
1013 {
1014 	struct sockaddr_ns *sns = (struct sockaddr_ns *)sa;
1015 	struct sockaddr_ns work;
1016 	static union ns_net ns_zeronet;
1017 	char *p;
1018 
1019 	work = *sns;
1020 	work.sns_addr.x_port = 0;
1021 	work.sns_addr.x_net = ns_zeronet;
1022 
1023 	p = ns_print((struct sockaddr *)&work);
1024 	if (strncmp("0H.", p, 3) == 0)
1025 		p += 3;
1026 	return (p);
1027 }
1028 
1029 void
1030 upHex(p0)
1031 	char *p0;
1032 {
1033 	char *p = p0;
1034 
1035 	for (; *p; p++)
1036 		switch (*p) {
1037 		case 'a':
1038 		case 'b':
1039 		case 'c':
1040 		case 'd':
1041 		case 'e':
1042 		case 'f':
1043 			*p += ('A' - 'a');
1044 		}
1045 }
1046