xref: /netbsd-src/usr.bin/netstat/route.c (revision 5e4c038a45edbc7d63b7c2daa76e29f88b64a4e3)
1 /*	$NetBSD: route.c,v 1.59 2002/05/13 05:13:23 matt Exp $	*/
2 
3 /*
4  * Copyright (c) 1983, 1988, 1993
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. All advertising materials mentioning features or use of this software
16  *    must display the following acknowledgement:
17  *	This product includes software developed by the University of
18  *	California, Berkeley and its contributors.
19  * 4. Neither the name of the University nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include <sys/cdefs.h>
37 #ifndef lint
38 #if 0
39 static char sccsid[] = "from: @(#)route.c	8.3 (Berkeley) 3/9/94";
40 #else
41 __RCSID("$NetBSD: route.c,v 1.59 2002/05/13 05:13:23 matt Exp $");
42 #endif
43 #endif /* not lint */
44 
45 #include <sys/param.h>
46 #include <sys/protosw.h>
47 #include <sys/socket.h>
48 #include <sys/mbuf.h>
49 #include <sys/un.h>
50 
51 #include <net/if.h>
52 #include <net/if_dl.h>
53 #include <net/if_types.h>
54 #define _KERNEL
55 #include <net/route.h>
56 #undef _KERNEL
57 #include <netinet/in.h>
58 #include <netatalk/at.h>
59 #include <netiso/iso.h>
60 
61 #include <netns/ns.h>
62 
63 #include <sys/sysctl.h>
64 
65 #include <arpa/inet.h>
66 
67 #include <err.h>
68 #include <netdb.h>
69 #include <stdio.h>
70 #include <stdlib.h>
71 #include <string.h>
72 #include <unistd.h>
73 
74 #include "netstat.h"
75 
76 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
77 
78 /* alignment constraint for routing socket */
79 #define ROUNDUP(a) \
80 	((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
81 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
82 
83 /*
84  * Definitions for showing gateway flags.
85  */
86 struct bits {
87 	short	b_mask;
88 	char	b_val;
89 } bits[] = {
90 	{ RTF_UP,	'U' },
91 	{ RTF_GATEWAY,	'G' },
92 	{ RTF_HOST,	'H' },
93 	{ RTF_REJECT,	'R' },
94 	{ RTF_DYNAMIC,	'D' },
95 	{ RTF_MODIFIED,	'M' },
96 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
97 	{ RTF_MASK,	'm' }, /* Mask Present -- for routing messages only */
98 	{ RTF_CLONING,	'C' },
99 	{ RTF_XRESOLVE,	'X' },
100 	{ RTF_LLINFO,	'L' },
101 	{ RTF_STATIC,	'S' },
102 	{ RTF_BLACKHOLE,'B' },
103 	{ RTF_CLONED,	'c' },
104 	{ RTF_PROTO1,	'1' },
105 	{ RTF_PROTO2,	'2' },
106 	{ 0 }
107 };
108 
109 /*
110  * XXX we put all of the sockaddr types in here to force the alignment
111  * to be correct.
112  */
113 static union sockaddr_union {
114 	struct	sockaddr u_sa;
115 	struct	sockaddr_in u_in;
116 	struct	sockaddr_un u_un;
117 	struct	sockaddr_iso u_iso;
118 	struct	sockaddr_at u_at;
119 	struct	sockaddr_dl u_dl;
120 	struct	sockaddr_ns u_ns;
121 	u_short	u_data[128];
122 	int u_dummy;		/* force word-alignment */
123 } pt_u;
124 
125 int	do_rtent = 0;
126 struct	rtentry rtentry;
127 struct	radix_node rnode;
128 struct	radix_mask rmask;
129 
130 int	NewTree = 0;
131 
132 static struct sockaddr *kgetsa __P((struct sockaddr *));
133 static void p_tree __P((struct radix_node *));
134 static void p_rtnode __P((void));
135 static void ntreestuff __P((void));
136 static void np_rtentry __P((struct rt_msghdr *));
137 static void p_sockaddr __P((const struct sockaddr *,
138 			    const struct sockaddr *, int, int));
139 static void p_flags __P((int));
140 static void p_rtentry __P((struct rtentry *));
141 static void ntreestuff __P((void));
142 static u_long forgemask __P((u_long));
143 static void domask __P((char *, size_t, u_long, u_long));
144 
145 /*
146  * Print routing tables.
147  */
148 void
149 routepr(rtree)
150 	u_long rtree;
151 {
152 	struct radix_node_head *rnh, head;
153 	struct radix_node_head *rt_tables[AF_MAX+1];
154 	int i;
155 
156 	printf("Routing tables\n");
157 
158 	if (Aflag == 0 && NewTree)
159 		ntreestuff();
160 	else {
161 		if (rtree == 0) {
162 			printf("rt_tables: symbol not in namelist\n");
163 			return;
164 		}
165 
166 		kget(rtree, rt_tables);
167 		for (i = 0; i <= AF_MAX; i++) {
168 			if ((rnh = rt_tables[i]) == 0)
169 				continue;
170 			kget(rnh, head);
171 			if (i == AF_UNSPEC) {
172 				if (Aflag && af == 0) {
173 					printf("Netmasks:\n");
174 					p_tree(head.rnh_treetop);
175 				}
176 			} else if (af == AF_UNSPEC || af == i) {
177 				pr_family(i);
178 				do_rtent = 1;
179 				pr_rthdr(i);
180 				p_tree(head.rnh_treetop);
181 			}
182 		}
183 	}
184 }
185 
186 /*
187  * Print address family header before a section of the routing table.
188  */
189 void
190 pr_family(af)
191 	int af;
192 {
193 	char *afname;
194 
195 	switch (af) {
196 	case AF_INET:
197 		afname = "Internet";
198 		break;
199 #ifdef INET6
200 	case AF_INET6:
201 		afname = "Internet6";
202 		break;
203 #endif
204 	case AF_NS:
205 		afname = "XNS";
206 		break;
207 	case AF_ISO:
208 		afname = "ISO";
209 		break;
210 	case AF_APPLETALK:
211 		afname = "AppleTalk";
212 		break;
213 	case AF_CCITT:
214 		afname = "X.25";
215 		break;
216 	default:
217 		afname = NULL;
218 		break;
219 	}
220 	if (afname)
221 		printf("\n%s:\n", afname);
222 	else
223 		printf("\nProtocol Family %d:\n", af);
224 }
225 
226 /* column widths; each followed by one space */
227 #ifndef INET6
228 #define	WID_DST(af)	18	/* width of destination column */
229 #define	WID_GW(af)	18	/* width of gateway column */
230 #else
231 /* width of destination/gateway column */
232 #ifdef KAME_SCOPEID
233 /* strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 */
234 #define	WID_DST(af)	((af) == AF_INET6 ? (numeric_addr ? 34 : 18) : 18)
235 #define	WID_GW(af)	((af) == AF_INET6 ? (numeric_addr ? 30 : 18) : 18)
236 #else
237 /* strlen("fe80::aaaa:bbbb:cccc:dddd") == 25, strlen("/128") == 4 */
238 #define	WID_DST(af)	((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18)
239 #define	WID_GW(af)	((af) == AF_INET6 ? (numeric_addr ? 25 : 18) : 18)
240 #endif
241 #endif /* INET6 */
242 
243 /*
244  * Print header for routing table columns.
245  */
246 void
247 pr_rthdr(af)
248 	int af;
249 {
250 
251 	if (Aflag)
252 		printf("%-8.8s ","Address");
253 	printf("%-*.*s %-*.*s %-6.6s  %6.6s%8.8s %6.6s  %s\n",
254 		WID_DST(af), WID_DST(af), "Destination",
255 		WID_GW(af), WID_GW(af), "Gateway",
256 		"Flags", "Refs", "Use", "Mtu", "Interface");
257 }
258 
259 static struct sockaddr *
260 kgetsa(dst)
261 	struct sockaddr *dst;
262 {
263 
264 	kget(dst, pt_u.u_sa);
265 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
266 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
267 	return (&pt_u.u_sa);
268 }
269 
270 static void
271 p_tree(rn)
272 	struct radix_node *rn;
273 {
274 
275 again:
276 	kget(rn, rnode);
277 	if (rnode.rn_b < 0) {
278 		if (Aflag)
279 			printf("%-8.8lx ", (u_long) rn);
280 		if (rnode.rn_flags & RNF_ROOT) {
281 			if (Aflag)
282 				printf("(root node)%s",
283 				    rnode.rn_dupedkey ? " =>\n" : "\n");
284 		} else if (do_rtent) {
285 			kget(rn, rtentry);
286 			p_rtentry(&rtentry);
287 			if (Aflag)
288 				p_rtnode();
289 		} else {
290 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
291 			    NULL, 0, 44);
292 			putchar('\n');
293 		}
294 		if ((rn = rnode.rn_dupedkey) != NULL)
295 			goto again;
296 	} else {
297 		if (Aflag && do_rtent) {
298 			printf("%-8.8lx ", (u_long) rn);
299 			p_rtnode();
300 		}
301 		rn = rnode.rn_r;
302 		p_tree(rnode.rn_l);
303 		p_tree(rn);
304 	}
305 }
306 
307 static void
308 p_rtnode()
309 {
310 	struct radix_mask *rm = rnode.rn_mklist;
311 	char	nbuf[20];
312 
313 	if (rnode.rn_b < 0) {
314 		if (rnode.rn_mask) {
315 			printf("\t  mask ");
316 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
317 				    NULL, 0, -1);
318 		} else if (rm == 0)
319 			return;
320 	} else {
321 		(void)snprintf(nbuf, sizeof nbuf, "(%d)", rnode.rn_b);
322 		printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long) rnode.rn_l,
323 		    (u_long) rnode.rn_r);
324 	}
325 	while (rm) {
326 		kget(rm, rmask);
327 		(void)snprintf(nbuf, sizeof nbuf, " %d refs, ", rmask.rm_refs);
328 		printf(" mk = %8.8lx {(%d),%s", (u_long) rm,
329 		    -1 - rmask.rm_b, rmask.rm_refs ? nbuf : " ");
330 		if (rmask.rm_flags & RNF_NORMAL) {
331 			struct radix_node rnode_aux;
332 			printf(" <normal>, ");
333 			kget(rmask.rm_leaf, rnode_aux);
334 			p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
335 				    NULL, 0, -1);
336 		} else
337 			p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
338 			    NULL, 0, -1);
339 		putchar('}');
340 		if ((rm = rmask.rm_mklist) != NULL)
341 			printf(" ->");
342 	}
343 	putchar('\n');
344 }
345 
346 static void
347 ntreestuff()
348 {
349 	size_t needed;
350 	int mib[6];
351 	char *buf, *next, *lim;
352 	struct rt_msghdr *rtm;
353 
354 	mib[0] = CTL_NET;
355 	mib[1] = PF_ROUTE;
356 	mib[2] = 0;
357 	mib[3] = 0;
358 	mib[4] = NET_RT_DUMP;
359 	mib[5] = 0;
360 	if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
361 		err(1, "route sysctl estimate");
362 	if ((buf = malloc(needed)) == 0)
363 		errx(1, "out of space");
364 	if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
365 		err(1, "sysctl of routing table");
366 	lim  = buf + needed;
367 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
368 		rtm = (struct rt_msghdr *)next;
369 		np_rtentry(rtm);
370 	}
371 }
372 
373 static void
374 np_rtentry(rtm)
375 	struct rt_msghdr *rtm;
376 {
377 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
378 #ifdef notdef
379 	static int masks_done, banner_printed;
380 #endif
381 	static int old_af;
382 	int af = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
383 
384 	if (Lflag && (rtm->rtm_flags & RTF_LLINFO))
385 		return;
386 #ifdef notdef
387 	/* for the moment, netmasks are skipped over */
388 	if (!banner_printed) {
389 		printf("Netmasks:\n");
390 		banner_printed = 1;
391 	}
392 	if (masks_done == 0) {
393 		if (rtm->rtm_addrs != RTA_DST ) {
394 			masks_done = 1;
395 			af = sa->sa_family;
396 		}
397 	} else
398 #endif
399 		af = sa->sa_family;
400 	if (af != old_af) {
401 		pr_family(af);
402 		old_af = af;
403 	}
404 	if (rtm->rtm_addrs == RTA_DST)
405 		p_sockaddr(sa, NULL, 0, 36);
406 	else {
407 		p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
408 #if 0
409 		if (sa->sa_len == 0)
410 			sa->sa_len = sizeof(long);
411 #endif
412 		sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa);
413 		p_sockaddr(sa, NULL, 0, 18);
414 	}
415 	p_flags(rtm->rtm_flags & interesting);
416 	putchar('\n');
417 }
418 
419 static void
420 p_sockaddr(sa, mask, flags, width)
421 	const struct sockaddr *sa, *mask;
422 	int flags, width;
423 {
424 	char workbuf[128], *cplim;
425 	char *cp = workbuf;
426 	char *ep = workbuf + sizeof(workbuf);
427 	int n;
428 
429 	switch(sa->sa_family) {
430 	case AF_INET:
431 	    {
432 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
433 
434 		if ((sin->sin_addr.s_addr == INADDR_ANY) &&
435 		    (mask != NULL) &&
436 		    (((struct sockaddr_in *)mask)->sin_addr.s_addr == 0))
437 			cp = "default";
438 		else if (flags & RTF_HOST)
439 			cp = routename(sin->sin_addr.s_addr);
440 		else if (mask)
441 			cp = netname(sin->sin_addr.s_addr,
442 			    ((struct sockaddr_in *)mask)->sin_addr.s_addr);
443 		else
444 			cp = netname(sin->sin_addr.s_addr, INADDR_ANY);
445 		break;
446 	    }
447 
448 #ifdef INET6
449 	case AF_INET6:
450 	    {
451 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
452 #ifdef KAME_SCOPEID
453 		struct in6_addr *in6 = &sa6->sin6_addr;
454 
455 		/*
456 		 * XXX: This is a special workaround for KAME kernels.
457 		 * sin6_scope_id field of SA should be set in the future.
458 		 */
459 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
460 		    IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
461 		    /* XXX: override is ok? */
462 		    sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
463 		    *(u_short *)&in6->s6_addr[2] = 0;
464 		}
465 #endif
466 
467 		if (flags & RTF_HOST)
468 			cp = routename6(sa6);
469 		else if (mask) {
470 			cp = netname6(sa6,
471 				      &((struct sockaddr_in6 *)mask)->sin6_addr);
472 		} else
473 			cp = netname6(sa6, NULL);
474 		break;
475 	    }
476 #endif
477 
478 #ifndef SMALL
479 	case AF_APPLETALK:
480 	case 0:
481 	    {
482 		if (!(flags & RTF_HOST) && mask)
483 			cp = atalk_print2(sa,mask,11);
484 		else
485 			cp = atalk_print(sa,11);
486 		break;
487 	    }
488 	case AF_NS:
489 		cp = ns_print((struct sockaddr *)sa);
490 		break;
491 #endif
492 
493 	case AF_LINK:
494 		if (getnameinfo(sa, sa->sa_len, workbuf, sizeof(workbuf),
495 		    NULL, 0, NI_NUMERICHOST) != 0)
496 			strncpy(workbuf, "invalid", sizeof(workbuf));
497 		cp = workbuf;
498 		break;
499 
500 	default:
501 	    {
502 		u_char *s = (u_char *)sa->sa_data, *slim;
503 
504 		slim =  sa->sa_len + (u_char *) sa;
505 		cplim = cp + sizeof(workbuf) - 6;
506 		n = snprintf(cp, ep - cp, "(%d)", sa->sa_family);
507 		if (n >= ep - cp)
508 			n = ep - cp - 1;
509 		if (n > 0)
510 			cp += n;
511 		while (s < slim && cp < cplim) {
512 			n = snprintf(cp, ep - cp, " %02x", *s++);
513 			if (n >= ep - cp)
514 				n = ep - cp - 1;
515 			if (n > 0)
516 				cp += n;
517 			if (s < slim) {
518 				n = snprintf(cp, ep - cp, "%02x", *s++);
519 				if (n >= ep - cp)
520 					n = ep - cp - 1;
521 				if (n > 0)
522 					cp += n;
523 			}
524 		}
525 		cp = workbuf;
526 	    }
527 	}
528 	if (width < 0 )
529 		printf("%s ", cp);
530 	else {
531 		if (numeric_addr)
532 			printf("%-*s ", width, cp);
533 		else
534 			printf("%-*.*s ", width, width, cp);
535 	}
536 }
537 
538 static void
539 p_flags(f)
540 	int f;
541 {
542 	char name[33], *flags;
543 	struct bits *p = bits;
544 
545 	for (flags = name; p->b_mask && flags - name < sizeof(name); p++)
546 		if (p->b_mask & f)
547 			*flags++ = p->b_val;
548 	*flags = '\0';
549 	printf("%-6.6s ", name);
550 }
551 
552 static struct sockaddr *sockcopy __P((struct sockaddr *,
553     union sockaddr_union *));
554 
555 /*
556  * copy a sockaddr into an allocated region, allocate at least sockaddr
557  * bytes and zero unused
558  */
559 static struct sockaddr *
560 sockcopy(sp, dp)
561 	struct sockaddr *sp;
562 	union sockaddr_union *dp;
563 {
564 	int len;
565 
566 	if (sp == 0 || sp->sa_len == 0)
567 		(void)memset(dp, 0, sizeof (*sp));
568 	else {
569 		len = (sp->sa_len >= sizeof (*sp)) ? sp->sa_len : sizeof (*sp);
570 		(void)memcpy(dp, sp, len);
571 	}
572 	return ((struct sockaddr *)dp);
573 }
574 
575 static void
576 p_rtentry(rt)
577 	struct rtentry *rt;
578 {
579 	static struct ifnet ifnet, *lastif;
580 	union sockaddr_union addr_un, mask_un;
581 	struct sockaddr *addr, *mask;
582 	int af;
583 
584 	if (Lflag && (rt->rt_flags & RTF_LLINFO))
585 		return;
586 
587 	memset(&addr_un, 0, sizeof(addr_un));
588 	memset(&mask_un, 0, sizeof(mask_un));
589 	addr = sockcopy(kgetsa(rt_key(rt)), &addr_un);
590 	af = addr->sa_family;
591 	if (rt_mask(rt))
592 		mask = sockcopy(kgetsa(rt_mask(rt)), &mask_un);
593 	else
594 		mask = sockcopy(NULL, &mask_un);
595 	p_sockaddr(addr, mask, rt->rt_flags, WID_DST(af));
596 	p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, WID_GW(af));
597 	p_flags(rt->rt_flags);
598 	printf("%6d %8lu ", rt->rt_refcnt, rt->rt_use);
599 	if (rt->rt_rmx.rmx_mtu)
600 		printf("%6lu", rt->rt_rmx.rmx_mtu);
601 	else
602 		printf("%6s", "-");
603 	putchar((rt->rt_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
604 	if (rt->rt_ifp) {
605 		if (rt->rt_ifp != lastif) {
606 			kget(rt->rt_ifp, ifnet);
607 			lastif = rt->rt_ifp;
608 		}
609 		printf(" %.16s%s", ifnet.if_xname,
610 			rt->rt_nodes[0].rn_dupedkey ? " =>" : "");
611 	}
612 	putchar('\n');
613  	if (vflag) {
614  		printf("\texpire   %10lu%c  recvpipe %10ld%c  "
615 		       "sendpipe %10ld%c\n",
616  			rt->rt_rmx.rmx_expire,
617  			(rt->rt_rmx.rmx_locks & RTV_EXPIRE) ? 'L' : ' ',
618  			rt->rt_rmx.rmx_recvpipe,
619  			(rt->rt_rmx.rmx_locks & RTV_RPIPE) ? 'L' : ' ',
620  			rt->rt_rmx.rmx_sendpipe,
621  			(rt->rt_rmx.rmx_locks & RTV_SPIPE) ? 'L' : ' ');
622  		printf("\tssthresh %10lu%c  rtt      %10ld%c  "
623 		       "rttvar   %10ld%c\n",
624  			rt->rt_rmx.rmx_ssthresh,
625  			(rt->rt_rmx.rmx_locks & RTV_SSTHRESH) ? 'L' : ' ',
626  			rt->rt_rmx.rmx_rtt,
627  			(rt->rt_rmx.rmx_locks & RTV_RTT) ? 'L' : ' ',
628  			rt->rt_rmx.rmx_rttvar,
629 			(rt->rt_rmx.rmx_locks & RTV_RTTVAR) ? 'L' : ' ');
630  		printf("\thopcount %10lu%c\n",
631  			rt->rt_rmx.rmx_hopcount,
632 			(rt->rt_rmx.rmx_locks & RTV_HOPCOUNT) ? 'L' : ' ');
633  	}
634 }
635 
636 char *
637 routename(in)
638 	u_int32_t in;
639 {
640 	char *cp;
641 	static char line[MAXHOSTNAMELEN + 1];
642 	struct hostent *hp;
643 	static char domain[MAXHOSTNAMELEN + 1];
644 	static int first = 1;
645 
646 	if (first) {
647 		first = 0;
648 		if (gethostname(domain, MAXHOSTNAMELEN) == 0) {
649 			domain[sizeof(domain) - 1] = '\0';
650 			if ((cp = strchr(domain, '.')))
651 				(void)strlcpy(domain, cp + 1, sizeof(domain));
652 			else
653 				domain[0] = 0;
654 		} else
655 			domain[0] = 0;
656 	}
657 	cp = 0;
658 	if (!numeric_addr) {
659 		hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
660 			AF_INET);
661 		if (hp) {
662 			if ((cp = strchr(hp->h_name, '.')) &&
663 			    !strcmp(cp + 1, domain))
664 				*cp = 0;
665 			cp = hp->h_name;
666 		}
667 	}
668 	if (cp) {
669 		strncpy(line, cp, sizeof(line) - 1);
670 		line[sizeof(line) - 1] = '\0';
671 	} else {
672 #define C(x)	((x) & 0xff)
673 		in = ntohl(in);
674 		snprintf(line, sizeof line, "%u.%u.%u.%u",
675 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
676 	}
677 	return (line);
678 }
679 
680 static u_long
681 forgemask(a)
682 	u_long a;
683 {
684 	u_long m;
685 
686 	if (IN_CLASSA(a))
687 		m = IN_CLASSA_NET;
688 	else if (IN_CLASSB(a))
689 		m = IN_CLASSB_NET;
690 	else
691 		m = IN_CLASSC_NET;
692 	return (m);
693 }
694 
695 static void
696 domask(dst, dlen, addr, mask)
697 	char *dst;
698 	size_t dlen;
699 	u_long addr, mask;
700 {
701 	int b, i;
702 
703 	if (!mask || (forgemask(addr) == mask)) {
704 		*dst = '\0';
705 		return;
706 	}
707 	i = 0;
708 	for (b = 0; b < 32; b++)
709 		if (mask & (1 << b)) {
710 			int bb;
711 
712 			i = b;
713 			for (bb = b+1; bb < 32; bb++)
714 				if (!(mask & (1 << bb))) {
715 					i = -1;	/* noncontig */
716 					break;
717 				}
718 			break;
719 		}
720 	if (i == -1)
721 		(void)snprintf(dst, dlen, "&0x%lx", mask);
722 	else
723 		(void)snprintf(dst, dlen, "/%d", 32-i);
724 }
725 
726 /*
727  * Return the name of the network whose address is given.
728  * The address is assumed to be that of a net or subnet, not a host.
729  */
730 char *
731 netname(in, mask)
732 	u_int32_t in, mask;
733 {
734 	char *cp = 0;
735 	static char line[MAXHOSTNAMELEN + 4];
736 	struct netent *np = 0;
737 	u_int32_t net, omask;
738 	u_int32_t i;
739 	int subnetshift;
740 
741 	i = ntohl(in);
742 	omask = mask = ntohl(mask);
743 	if (!numeric_addr && i != INADDR_ANY) {
744 		if (mask == INADDR_ANY) {
745 			switch (mask = forgemask(i)) {
746 			case IN_CLASSA_NET:
747 				subnetshift = 8;
748 				break;
749 			case IN_CLASSB_NET:
750 				subnetshift = 8;
751 				break;
752 			case IN_CLASSC_NET:
753 				subnetshift = 4;
754 				break;
755 			default:
756 				abort();
757 			}
758 			/*
759 			 * If there are more bits than the standard mask
760 			 * would suggest, subnets must be in use.
761 			 * Guess at the subnet mask, assuming reasonable
762 			 * width subnet fields.
763 			 */
764 			while (i &~ mask)
765 				mask = (long)mask >> subnetshift;
766 		}
767 		net = i & mask;
768 		/*
769 		 * Note: shift the hosts bits out in octet units, since
770 		 * not all versions of getnetbyaddr() do this for us (e.g.
771 		 * the current `etc/networks' parser).
772 		 */
773 		while ((mask & 0xff) == 0)
774 			mask >>= 8, net >>= 8;
775 		np = getnetbyaddr(net, AF_INET);
776 		if (np)
777 			cp = np->n_name;
778 	}
779 	if (cp)
780 		strncpy(line, cp, sizeof(line) - 1);
781 	else if ((i & 0xffffff) == 0)
782 		(void)snprintf(line, sizeof line, "%u", C(i >> 24));
783 	else if ((i & 0xffff) == 0)
784 		(void)snprintf(line, sizeof line, "%u.%u", C(i >> 24)
785 		    , C(i >> 16));
786 	else if ((i & 0xff) == 0)
787 		(void)snprintf(line, sizeof line, "%u.%u.%u", C(i >> 24),
788 		    C(i >> 16), C(i >> 8));
789 	else
790 		(void)snprintf(line, sizeof line, "%u.%u.%u.%u", C(i >> 24),
791 			C(i >> 16), C(i >> 8), C(i));
792 	domask(line + strlen(line), sizeof(line) - strlen(line), i, omask);
793 	return (line);
794 }
795 
796 #ifdef INET6
797 char *
798 netname6(sa6, mask)
799 	struct sockaddr_in6 *sa6;
800 	struct in6_addr *mask;
801 {
802 	static char line[NI_MAXHOST];
803 	u_char *p, *q;
804 	u_char *lim;
805 	int masklen, final = 0, illegal = 0;
806 #ifdef KAME_SCOPEID
807 	int flag = NI_WITHSCOPEID;
808 #else
809 	int flag = 0;
810 #endif
811 	int error;
812 	struct sockaddr_in6 sin6;
813 
814 	sin6 = *sa6;
815 	if (mask) {
816 		masklen = 0;
817 		lim = (u_char *)(mask + 1);
818 		for (p = (u_char *)mask, q = (u_char *)&sin6.sin6_addr;
819 		     p < lim;
820 		     p++, q++) {
821 			if (final && *p) {
822 				illegal++;
823 				*q = 0;
824 				continue;
825 			}
826 
827 			switch (*p & 0xff) {
828 			 case 0xff:
829 				 masklen += 8;
830 				 break;
831 			 case 0xfe:
832 				 masklen += 7;
833 				 final++;
834 				 break;
835 			 case 0xfc:
836 				 masklen += 6;
837 				 final++;
838 				 break;
839 			 case 0xf8:
840 				 masklen += 5;
841 				 final++;
842 				 break;
843 			 case 0xf0:
844 				 masklen += 4;
845 				 final++;
846 				 break;
847 			 case 0xe0:
848 				 masklen += 3;
849 				 final++;
850 				 break;
851 			 case 0xc0:
852 				 masklen += 2;
853 				 final++;
854 				 break;
855 			 case 0x80:
856 				 masklen += 1;
857 				 final++;
858 				 break;
859 			 case 0x00:
860 				 final++;
861 				 break;
862 			 default:
863 				 final++;
864 				 illegal++;
865 				 break;
866 			}
867 
868 			if (!illegal)
869 				*q &= *p;
870 			else
871 				*q = 0;
872 		}
873 	} else
874 		masklen = 128;
875 
876 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
877 		return("default");
878 
879 	if (numeric_addr)
880 		flag |= NI_NUMERICHOST;
881 	error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
882 			line, sizeof(line), NULL, 0, flag);
883 	if (error)
884 		strlcpy(line, "invalid", sizeof(line));
885 
886 	if (numeric_addr)
887 		snprintf(&line[strlen(line)], sizeof(line) - strlen(line),
888 		    "/%d", masklen);
889 
890 	return line;
891 }
892 
893 char *
894 routename6(sa6)
895 	struct sockaddr_in6 *sa6;
896 {
897 	static char line[NI_MAXHOST];
898 #ifdef KAME_SCOPEID
899 	int flag = NI_WITHSCOPEID;
900 #else
901 	int flag = 0;
902 #endif
903 	/* use local variable for safety */
904 	struct sockaddr_in6 sa6_local;
905 	int error;
906 
907 	memset(&sa6_local, 0, sizeof(sa6_local));
908 	sa6_local.sin6_family = AF_INET6;
909 	sa6_local.sin6_len = sizeof(struct sockaddr_in6);
910 	sa6_local.sin6_addr = sa6->sin6_addr;
911 	sa6_local.sin6_scope_id = sa6->sin6_scope_id;
912 
913 	if (numeric_addr)
914 		flag |= NI_NUMERICHOST;
915 
916 	error = getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
917 			line, sizeof(line), NULL, 0, flag);
918 	if (error)
919 		strlcpy(line, "invalid", sizeof(line));
920 
921 	return line;
922 }
923 #endif /*INET6*/
924 
925 /*
926  * Print routing statistics
927  */
928 void
929 rt_stats(off)
930 	u_long off;
931 {
932 	struct rtstat rtstat;
933 
934 	if (off == 0) {
935 		printf("rtstat: symbol not in namelist\n");
936 		return;
937 	}
938 	kread(off, (char *)&rtstat, sizeof (rtstat));
939 	printf("routing:\n");
940 	printf("\t%llu bad routing redirect%s\n",
941 		(unsigned long long)rtstat.rts_badredirect,
942 		plural(rtstat.rts_badredirect));
943 	printf("\t%llu dynamically created route%s\n",
944 		(unsigned long long)rtstat.rts_dynamic,
945 		plural(rtstat.rts_dynamic));
946 	printf("\t%llu new gateway%s due to redirects\n",
947 		(unsigned long long)rtstat.rts_newgateway,
948 		plural(rtstat.rts_newgateway));
949 	printf("\t%llu destination%s found unreachable\n",
950 		(unsigned long long)rtstat.rts_unreach,
951 		plural(rtstat.rts_unreach));
952 	printf("\t%llu use%s of a wildcard route\n",
953 		(unsigned long long)rtstat.rts_wildcard,
954 		plural(rtstat.rts_wildcard));
955 }
956 short ns_nullh[] = {0,0,0};
957 short ns_bh[] = {-1,-1,-1};
958 
959 char *
960 ns_print(sa)
961 	struct sockaddr *sa;
962 {
963 	struct sockaddr_ns *sns = (struct sockaddr_ns*)sa;
964 	struct ns_addr work;
965 	union {
966 		union	ns_net net_e;
967 		u_long	long_e;
968 	} net;
969 	u_short port;
970 	static char mybuf[50], cport[10], chost[25];
971 	char *host = "";
972 	char *p;
973 	u_char *q;
974 
975 	work = sns->sns_addr;
976 	port = ntohs(work.x_port);
977 	work.x_port = 0;
978 	net.net_e  = work.x_net;
979 	if (ns_nullhost(work) && net.long_e == 0) {
980 		if (port ) {
981 			(void)snprintf(mybuf, sizeof mybuf, "*.%xH", port);
982 			upHex(mybuf);
983 		} else
984 			(void)snprintf(mybuf, sizeof mybuf, "*.*");
985 		return (mybuf);
986 	}
987 
988 	if (memcmp(ns_bh, work.x_host.c_host, 6) == 0) {
989 		host = "any";
990 	} else if (memcmp(ns_nullh, work.x_host.c_host, 6) == 0) {
991 		host = "*";
992 	} else {
993 		q = work.x_host.c_host;
994 		(void)snprintf(chost, sizeof chost, "%02x%02x%02x%02x%02x%02xH",
995 			q[0], q[1], q[2], q[3], q[4], q[5]);
996 		for (p = chost; *p == '0' && p < chost + 12; p++)
997 			continue;
998 		host = p;
999 	}
1000 	if (port)
1001 		(void)snprintf(cport, sizeof cport, ".%xH", htons(port));
1002 	else
1003 		*cport = 0;
1004 
1005 	(void)snprintf(mybuf, sizeof mybuf, "%xH.%s%s", (int)ntohl(net.long_e),
1006 	    host, cport);
1007 	upHex(mybuf);
1008 	return (mybuf);
1009 }
1010 
1011 char *
1012 ns_phost(sa)
1013 	struct sockaddr *sa;
1014 {
1015 	struct sockaddr_ns *sns = (struct sockaddr_ns *)sa;
1016 	struct sockaddr_ns work;
1017 	static union ns_net ns_zeronet;
1018 	char *p;
1019 
1020 	work = *sns;
1021 	work.sns_addr.x_port = 0;
1022 	work.sns_addr.x_net = ns_zeronet;
1023 
1024 	p = ns_print((struct sockaddr *)&work);
1025 	if (strncmp("0H.", p, 3) == 0)
1026 		p += 3;
1027 	return (p);
1028 }
1029 
1030 void
1031 upHex(p0)
1032 	char *p0;
1033 {
1034 	char *p = p0;
1035 
1036 	for (; *p; p++)
1037 		switch (*p) {
1038 		case 'a':
1039 		case 'b':
1040 		case 'c':
1041 		case 'd':
1042 		case 'e':
1043 		case 'f':
1044 			*p += ('A' - 'a');
1045 		}
1046 }
1047