xref: /netbsd-src/usr.bin/netstat/route.c (revision dc306354b0b29af51801a7632f1e95265a68cd81)
1 /*	$NetBSD: route.c,v 1.33 1999/01/11 12:31:53 mrg Exp $	*/
2 
3 /*
4  * Copyright (c) 1983, 1988, 1993
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. All advertising materials mentioning features or use of this software
16  *    must display the following acknowledgement:
17  *	This product includes software developed by the University of
18  *	California, Berkeley and its contributors.
19  * 4. Neither the name of the University nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include <sys/cdefs.h>
37 #ifndef lint
38 #if 0
39 static char sccsid[] = "from: @(#)route.c	8.3 (Berkeley) 3/9/94";
40 #else
41 __RCSID("$NetBSD: route.c,v 1.33 1999/01/11 12:31:53 mrg Exp $");
42 #endif
43 #endif /* not lint */
44 
45 #include <sys/param.h>
46 #include <sys/protosw.h>
47 #include <sys/socket.h>
48 #include <sys/mbuf.h>
49 #include <sys/un.h>
50 
51 #include <net/if.h>
52 #include <net/if_dl.h>
53 #include <net/if_types.h>
54 #define _KERNEL
55 #include <net/route.h>
56 #undef _KERNEL
57 #include <netinet/in.h>
58 #include <netatalk/at.h>
59 #include <netiso/iso.h>
60 
61 #include <netns/ns.h>
62 
63 #include <sys/sysctl.h>
64 
65 #include <err.h>
66 #include <netdb.h>
67 #include <stdio.h>
68 #include <stdlib.h>
69 #include <string.h>
70 #include <unistd.h>
71 
72 #include "netstat.h"
73 
74 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
75 
76 /*
77  * Definitions for showing gateway flags.
78  */
79 struct bits {
80 	short	b_mask;
81 	char	b_val;
82 } bits[] = {
83 	{ RTF_UP,	'U' },
84 	{ RTF_GATEWAY,	'G' },
85 	{ RTF_HOST,	'H' },
86 	{ RTF_REJECT,	'R' },
87 	{ RTF_DYNAMIC,	'D' },
88 	{ RTF_MODIFIED,	'M' },
89 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
90 	{ RTF_MASK,	'm' }, /* Mask Present -- for routing messages only */
91 	{ RTF_CLONING,	'C' },
92 	{ RTF_XRESOLVE,	'X' },
93 	{ RTF_LLINFO,	'L' },
94 	{ RTF_STATIC,	'S' },
95 	{ RTF_PROTO1,	'1' },
96 	{ RTF_PROTO2,	'2' },
97 	{ 0 }
98 };
99 
100 /*
101  * XXX we put all of the sockaddr types in here to force the alignment
102  * to be correct.
103  */
104 static union {
105 	struct	sockaddr u_sa;
106 	struct	sockaddr_in u_in;
107 	struct	sockaddr_un u_un;
108 	struct	sockaddr_iso u_iso;
109 	struct	sockaddr_at u_at;
110 	struct	sockaddr_dl u_dl;
111 	struct	sockaddr_ns u_ns;
112 	u_short	u_data[128];
113 } pt_u;
114 
115 int	do_rtent = 0;
116 struct	rtentry rtentry;
117 struct	radix_node rnode;
118 struct	radix_mask rmask;
119 
120 int	NewTree = 0;
121 
122 static struct sockaddr *kgetsa __P((struct sockaddr *));
123 static void p_tree __P((struct radix_node *));
124 static void p_rtnode __P((void));
125 static void ntreestuff __P((void));
126 static void np_rtentry __P((struct rt_msghdr *));
127 static void p_sockaddr __P((const struct sockaddr *,
128 			    const struct sockaddr *, int, int));
129 static void p_flags __P((int, char *));
130 static void p_rtentry __P((struct rtentry *));
131 static void ntreestuff __P((void));
132 static u_long forgemask __P((u_long));
133 static void domask __P((char *, size_t, u_long, u_long));
134 
135 /*
136  * Print routing tables.
137  */
138 void
139 routepr(rtree)
140 	u_long rtree;
141 {
142 	struct radix_node_head *rnh, head;
143 	int i;
144 
145 	printf("Routing tables\n");
146 
147 	if (Aflag == 0 && NewTree)
148 		ntreestuff();
149 	else {
150 		if (rtree == 0) {
151 			printf("rt_tables: symbol not in namelist\n");
152 			return;
153 		}
154 
155 		kget(rtree, rt_tables);
156 		for (i = 0; i <= AF_MAX; i++) {
157 			if ((rnh = rt_tables[i]) == 0)
158 				continue;
159 			kget(rnh, head);
160 			if (i == AF_UNSPEC) {
161 				if (Aflag && af == 0) {
162 					printf("Netmasks:\n");
163 					p_tree(head.rnh_treetop);
164 				}
165 			} else if (af == AF_UNSPEC || af == i) {
166 				pr_family(i);
167 				do_rtent = 1;
168 				pr_rthdr();
169 				p_tree(head.rnh_treetop);
170 			}
171 		}
172 	}
173 }
174 
175 /*
176  * Print address family header before a section of the routing table.
177  */
178 void
179 pr_family(af)
180 	int af;
181 {
182 	char *afname;
183 
184 	switch (af) {
185 	case AF_INET:
186 		afname = "Internet";
187 		break;
188 	case AF_NS:
189 		afname = "XNS";
190 		break;
191 	case AF_ISO:
192 		afname = "ISO";
193 		break;
194 	case AF_APPLETALK:
195 		afname = "AppleTalk";
196 		break;
197 	case AF_CCITT:
198 		afname = "X.25";
199 		break;
200 	default:
201 		afname = NULL;
202 		break;
203 	}
204 	if (afname)
205 		printf("\n%s:\n", afname);
206 	else
207 		printf("\nProtocol Family %d:\n", af);
208 }
209 
210 /* column widths; each followed by one space */
211 #define	WID_DST		18	/* width of destination column */
212 #define	WID_GW		18	/* width of gateway column */
213 
214 /*
215  * Print header for routing table columns.
216  */
217 void
218 pr_rthdr()
219 {
220 
221 	if (Aflag)
222 		printf("%-8.8s ","Address");
223 	printf("%-*.*s %-*.*s %-6.6s  %6.6s%8.8s %6.6s  %s\n",
224 		WID_DST, WID_DST, "Destination",
225 		WID_GW, WID_GW, "Gateway",
226 		"Flags", "Refs", "Use", "Mtu", "Interface");
227 }
228 
229 static struct sockaddr *
230 kgetsa(dst)
231 	struct sockaddr *dst;
232 {
233 
234 	kget(dst, pt_u.u_sa);
235 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
236 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
237 	return (&pt_u.u_sa);
238 }
239 
240 static void
241 p_tree(rn)
242 	struct radix_node *rn;
243 {
244 
245 again:
246 	kget(rn, rnode);
247 	if (rnode.rn_b < 0) {
248 		if (Aflag)
249 			printf("%-8.8lx ", (u_long) rn);
250 		if (rnode.rn_flags & RNF_ROOT) {
251 			if (Aflag)
252 				printf("(root node)%s",
253 				    rnode.rn_dupedkey ? " =>\n" : "\n");
254 		} else if (do_rtent) {
255 			kget(rn, rtentry);
256 			p_rtentry(&rtentry);
257 			if (Aflag)
258 				p_rtnode();
259 		} else {
260 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
261 			    NULL, 0, 44);
262 			putchar('\n');
263 		}
264 		if ((rn = rnode.rn_dupedkey) != NULL)
265 			goto again;
266 	} else {
267 		if (Aflag && do_rtent) {
268 			printf("%-8.8lx ", (u_long) rn);
269 			p_rtnode();
270 		}
271 		rn = rnode.rn_r;
272 		p_tree(rnode.rn_l);
273 		p_tree(rn);
274 	}
275 }
276 
277 static void
278 p_rtnode()
279 {
280 	struct radix_mask *rm = rnode.rn_mklist;
281 	char	nbuf[20];
282 
283 	if (rnode.rn_b < 0) {
284 		if (rnode.rn_mask) {
285 			printf("\t  mask ");
286 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
287 				    NULL, 0, -1);
288 		} else if (rm == 0)
289 			return;
290 	} else {
291 		(void)snprintf(nbuf, sizeof nbuf, "(%d)", rnode.rn_b);
292 		printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long) rnode.rn_l,
293 		    (u_long) rnode.rn_r);
294 	}
295 	while (rm) {
296 		kget(rm, rmask);
297 		(void)snprintf(nbuf, sizeof nbuf, " %d refs, ", rmask.rm_refs);
298 		printf(" mk = %8.8lx {(%d),%s", (u_long) rm,
299 		    -1 - rmask.rm_b, rmask.rm_refs ? nbuf : " ");
300 		if (rmask.rm_flags & RNF_NORMAL) {
301 			struct radix_node rnode_aux;
302 			printf(" <normal>, ");
303 			kget(rmask.rm_leaf, rnode_aux);
304 			p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
305 				    NULL, 0, -1);
306 		} else
307 			p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
308 			    NULL, 0, -1);
309 		putchar('}');
310 		if ((rm = rmask.rm_mklist) != NULL)
311 			printf(" ->");
312 	}
313 	putchar('\n');
314 }
315 
316 static void
317 ntreestuff()
318 {
319 	size_t needed;
320 	int mib[6];
321 	char *buf, *next, *lim;
322 	struct rt_msghdr *rtm;
323 
324 	mib[0] = CTL_NET;
325 	mib[1] = PF_ROUTE;
326 	mib[2] = 0;
327 	mib[3] = 0;
328 	mib[4] = NET_RT_DUMP;
329 	mib[5] = 0;
330 	if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
331 		err(1, "route sysctl estimate");
332 	if ((buf = malloc(needed)) == 0)
333 		errx(1, "out of space");
334 	if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
335 		err(1, "sysctl of routing table");
336 	lim  = buf + needed;
337 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
338 		rtm = (struct rt_msghdr *)next;
339 		np_rtentry(rtm);
340 	}
341 }
342 
343 static void
344 np_rtentry(rtm)
345 	struct rt_msghdr *rtm;
346 {
347 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
348 #ifdef notdef
349 	static int masks_done, banner_printed;
350 #endif
351 	static int old_af;
352 	int af = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
353 
354 #ifdef notdef
355 	/* for the moment, netmasks are skipped over */
356 	if (!banner_printed) {
357 		printf("Netmasks:\n");
358 		banner_printed = 1;
359 	}
360 	if (masks_done == 0) {
361 		if (rtm->rtm_addrs != RTA_DST ) {
362 			masks_done = 1;
363 			af = sa->sa_family;
364 		}
365 	} else
366 #endif
367 		af = sa->sa_family;
368 	if (af != old_af) {
369 		pr_family(af);
370 		old_af = af;
371 	}
372 	if (rtm->rtm_addrs == RTA_DST)
373 		p_sockaddr(sa, NULL, 0, 36);
374 	else {
375 		p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
376 		if (sa->sa_len == 0)
377 			sa->sa_len = sizeof(long);
378 		sa = (struct sockaddr *)(sa->sa_len + (char *)sa);
379 		p_sockaddr(sa, NULL, 0, 18);
380 	}
381 	p_flags(rtm->rtm_flags & interesting, "%-6.6s ");
382 	putchar('\n');
383 }
384 
385 static void
386 p_sockaddr(sa, mask, flags, width)
387 	const struct sockaddr *sa, *mask;
388 	int flags, width;
389 {
390 	char workbuf[128], *cplim;
391 	char *cp = workbuf;
392 
393 	switch(sa->sa_family) {
394 	case AF_INET:
395 	    {
396 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
397 
398 		if (sin->sin_addr.s_addr == INADDR_ANY)
399 			cp = "default";
400 		else if (flags & RTF_HOST)
401 			cp = routename(sin->sin_addr.s_addr);
402 		else if (mask)
403 			cp = netname(sin->sin_addr.s_addr,
404 			    ((struct sockaddr_in *)mask)->sin_addr.s_addr);
405 		else
406 			cp = netname(sin->sin_addr.s_addr, INADDR_ANY);
407 		break;
408 	    }
409 
410 #ifndef SMALL
411 	case AF_APPLETALK:
412 	case 0:
413 	    {
414 		if (!(flags & RTF_HOST) && mask)
415 			cp = atalk_print2(sa,mask,11);
416 		else
417 			cp = atalk_print(sa,11);
418 		break;
419 	    }
420 	case AF_NS:
421 		cp = ns_print((struct sockaddr *)sa);
422 		break;
423 #endif
424 
425 	case AF_LINK:
426 	    {
427 		struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
428 
429 		if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
430 		    sdl->sdl_slen == 0)
431 			(void)snprintf(workbuf, sizeof workbuf, "link#%d",
432 			    sdl->sdl_index);
433 		else switch (sdl->sdl_type) {
434 		case IFT_FDDI:
435 		case IFT_ETHER:
436 		    {
437 			int i;
438 			u_char *lla = (u_char *)sdl->sdl_data +
439 			    sdl->sdl_nlen;
440 
441 			cplim = "";
442 			for (i = 0; i < sdl->sdl_alen; i++, lla++) {
443 				/* XXX */
444 				cp += sprintf(cp, "%s%02x", cplim, *lla);
445 				cplim = ":";
446 			}
447 			cp = workbuf;
448 			break;
449 		    }
450 		default:
451 			cp = link_ntoa(sdl);
452 			break;
453 		}
454 		break;
455 	    }
456 
457 	default:
458 	    {
459 		u_char *s = (u_char *)sa->sa_data, *slim;
460 
461 		slim =  sa->sa_len + (u_char *) sa;
462 		cplim = cp + sizeof(workbuf) - 6;
463 		cp += sprintf(cp, "(%d)", sa->sa_family);
464 		while (s < slim && cp < cplim) {
465 			cp += sprintf(cp, " %02x", *s++);
466 			if (s < slim)
467 			    cp += sprintf(cp, "%02x", *s++);
468 		}
469 		cp = workbuf;
470 	    }
471 	}
472 	if (width < 0 )
473 		printf("%s ", cp);
474 	else {
475 		if (nflag)
476 			printf("%-*s ", width, cp);
477 		else
478 			printf("%-*.*s ", width, width, cp);
479 	}
480 }
481 
482 static void
483 p_flags(f, format)
484 	int f;
485 	char *format;
486 {
487 	char name[33], *flags;
488 	struct bits *p = bits;
489 
490 	for (flags = name; p->b_mask && flags - name < sizeof(name); p++)
491 		if (p->b_mask & f)
492 			*flags++ = p->b_val;
493 	*flags = '\0';
494 	printf(format, name);
495 }
496 
497 static void
498 p_rtentry(rt)
499 	struct rtentry *rt;
500 {
501 	static struct ifnet ifnet, *lastif;
502 	struct sockaddr *sa, addr, mask;
503 
504 	if (!(sa = kgetsa(rt_key(rt))))
505 		memset(&addr, 0, sizeof addr);
506 	else
507 		addr = *sa;
508 	if (!rt_mask(rt) || !(sa = kgetsa(rt_mask(rt))))
509 		memset(&mask, 0, sizeof mask);
510 	else
511 		mask = *sa;
512 	p_sockaddr(&addr, &mask, rt->rt_flags, WID_DST);
513 	p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, WID_GW);
514 	p_flags(rt->rt_flags, "%-6.6s ");
515 	printf("%6d %8lu ", rt->rt_refcnt, rt->rt_use);
516 	if (rt->rt_rmx.rmx_mtu)
517 		printf("%6lu", rt->rt_rmx.rmx_mtu);
518 	else
519 		printf("%6s", "-");
520 	putchar((rt->rt_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
521 	if (rt->rt_ifp) {
522 		if (rt->rt_ifp != lastif) {
523 			kget(rt->rt_ifp, ifnet);
524 			lastif = rt->rt_ifp;
525 		}
526 		printf(" %.16s%s", ifnet.if_xname,
527 			rt->rt_nodes[0].rn_dupedkey ? " =>" : "");
528 	}
529 	putchar('\n');
530 }
531 
532 char *
533 routename(in)
534 	u_int32_t in;
535 {
536 	char *cp;
537 	static char line[MAXHOSTNAMELEN + 1];
538 	struct hostent *hp;
539 	static char domain[MAXHOSTNAMELEN + 1];
540 	static int first = 1;
541 
542 	if (first) {
543 		first = 0;
544 		if (gethostname(domain, MAXHOSTNAMELEN) == 0) {
545 			domain[sizeof(domain) - 1] = '\0';
546 			if ((cp = strchr(domain, '.')))
547 				(void)strcpy(domain, cp + 1);
548 			else
549 				domain[0] = 0;
550 		} else
551 			domain[0] = 0;
552 	}
553 	cp = 0;
554 	if (!nflag) {
555 		hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
556 			AF_INET);
557 		if (hp) {
558 			if ((cp = strchr(hp->h_name, '.')) &&
559 			    !strcmp(cp + 1, domain))
560 				*cp = 0;
561 			cp = hp->h_name;
562 		}
563 	}
564 	if (cp) {
565 		strncpy(line, cp, sizeof(line) - 1);
566 		line[sizeof(line) - 1] = '\0';
567 	} else {
568 #define C(x)	((x) & 0xff)
569 		in = ntohl(in);
570 		snprintf(line, sizeof line, "%u.%u.%u.%u",
571 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
572 	}
573 	return (line);
574 }
575 
576 static u_long
577 forgemask(a)
578 	u_long a;
579 {
580 	u_long m;
581 
582 	if (IN_CLASSA(a))
583 		m = IN_CLASSA_NET;
584 	else if (IN_CLASSB(a))
585 		m = IN_CLASSB_NET;
586 	else
587 		m = IN_CLASSC_NET;
588 	return (m);
589 }
590 
591 static void
592 domask(dst, dlen, addr, mask)
593 	char *dst;
594 	size_t dlen;
595 	u_long addr, mask;
596 {
597 	int b, i;
598 
599 	if (!mask || (forgemask(addr) == mask)) {
600 		*dst = '\0';
601 		return;
602 	}
603 	i = 0;
604 	for (b = 0; b < 32; b++)
605 		if (mask & (1 << b)) {
606 			int bb;
607 
608 			i = b;
609 			for (bb = b+1; bb < 32; bb++)
610 				if (!(mask & (1 << bb))) {
611 					i = -1;	/* noncontig */
612 					break;
613 				}
614 			break;
615 		}
616 	if (i == -1)
617 		(void)snprintf(dst, dlen, "&0x%lx", mask);
618 	else
619 		(void)snprintf(dst, dlen, "/%d", 32-i);
620 }
621 
622 /*
623  * Return the name of the network whose address is given.
624  * The address is assumed to be that of a net or subnet, not a host.
625  */
626 char *
627 netname(in, mask)
628 	u_int32_t in, mask;
629 {
630 	char *cp = 0;
631 	static char line[MAXHOSTNAMELEN + 4];
632 	struct netent *np = 0;
633 	u_int32_t net, omask;
634 	u_int32_t i;
635 	int subnetshift;
636 
637 	i = ntohl(in);
638 	omask = mask = ntohl(mask);
639 	if (!nflag && i != INADDR_ANY) {
640 		if (mask == INADDR_ANY) {
641 			switch (mask = forgemask(i)) {
642 			case IN_CLASSA_NET:
643 				subnetshift = 8;
644 				break;
645 			case IN_CLASSB_NET:
646 				subnetshift = 8;
647 				break;
648 			case IN_CLASSC_NET:
649 				subnetshift = 4;
650 				break;
651 			default:
652 				abort();
653 			}
654 			/*
655 			 * If there are more bits than the standard mask
656 			 * would suggest, subnets must be in use.
657 			 * Guess at the subnet mask, assuming reasonable
658 			 * width subnet fields.
659 			 */
660 			while (i &~ mask)
661 				mask = (long)mask >> subnetshift;
662 		}
663 		net = i & mask;
664 		/*
665 		 * Note: shift the hosts bits out in octet units, since
666 		 * not all versions of getnetbyaddr() do this for us (e.g.
667 		 * the current `etc/networks' parser).
668 		 */
669 		while ((mask & 0xff) == 0)
670 			mask >>= 8, net >>= 8;
671 		np = getnetbyaddr(net, AF_INET);
672 		if (np)
673 			cp = np->n_name;
674 	}
675 	if (cp)
676 		strncpy(line, cp, sizeof(line) - 1);
677 	else if ((i & 0xffffff) == 0)
678 		(void)snprintf(line, sizeof line, "%u", C(i >> 24));
679 	else if ((i & 0xffff) == 0)
680 		(void)snprintf(line, sizeof line, "%u.%u", C(i >> 24)
681 		    , C(i >> 16));
682 	else if ((i & 0xff) == 0)
683 		(void)snprintf(line, sizeof line, "%u.%u.%u", C(i >> 24),
684 		    C(i >> 16), C(i >> 8));
685 	else
686 		(void)snprintf(line, sizeof line, "%u.%u.%u.%u", C(i >> 24),
687 			C(i >> 16), C(i >> 8), C(i));
688 	domask(line + strlen(line), sizeof(line) - strlen(line), i, omask);
689 	return (line);
690 }
691 
692 /*
693  * Print routing statistics
694  */
695 void
696 rt_stats(off)
697 	u_long off;
698 {
699 	struct rtstat rtstat;
700 
701 	if (off == 0) {
702 		printf("rtstat: symbol not in namelist\n");
703 		return;
704 	}
705 	kread(off, (char *)&rtstat, sizeof (rtstat));
706 	printf("routing:\n");
707 	printf("\t%u bad routing redirect%s\n",
708 		rtstat.rts_badredirect, plural(rtstat.rts_badredirect));
709 	printf("\t%u dynamically created route%s\n",
710 		rtstat.rts_dynamic, plural(rtstat.rts_dynamic));
711 	printf("\t%u new gateway%s due to redirects\n",
712 		rtstat.rts_newgateway, plural(rtstat.rts_newgateway));
713 	printf("\t%u destination%s found unreachable\n",
714 		rtstat.rts_unreach, plural(rtstat.rts_unreach));
715 	printf("\t%u use%s of a wildcard route\n",
716 		rtstat.rts_wildcard, plural(rtstat.rts_wildcard));
717 }
718 short ns_nullh[] = {0,0,0};
719 short ns_bh[] = {-1,-1,-1};
720 
721 char *
722 ns_print(sa)
723 	struct sockaddr *sa;
724 {
725 	struct sockaddr_ns *sns = (struct sockaddr_ns*)sa;
726 	struct ns_addr work;
727 	union {
728 		union	ns_net net_e;
729 		u_long	long_e;
730 	} net;
731 	u_short port;
732 	static char mybuf[50], cport[10], chost[25];
733 	char *host = "";
734 	char *p;
735 	u_char *q;
736 
737 	work = sns->sns_addr;
738 	port = ntohs(work.x_port);
739 	work.x_port = 0;
740 	net.net_e  = work.x_net;
741 	if (ns_nullhost(work) && net.long_e == 0) {
742 		if (port ) {
743 			(void)snprintf(mybuf, sizeof mybuf, "*.%xH", port);
744 			upHex(mybuf);
745 		} else
746 			(void)snprintf(mybuf, sizeof mybuf, "*.*");
747 		return (mybuf);
748 	}
749 
750 	if (memcmp(ns_bh, work.x_host.c_host, 6) == 0) {
751 		host = "any";
752 	} else if (memcmp(ns_nullh, work.x_host.c_host, 6) == 0) {
753 		host = "*";
754 	} else {
755 		q = work.x_host.c_host;
756 		(void)snprintf(chost, sizeof chost, "%02x%02x%02x%02x%02x%02xH",
757 			q[0], q[1], q[2], q[3], q[4], q[5]);
758 		for (p = chost; *p == '0' && p < chost + 12; p++)
759 			continue;
760 		host = p;
761 	}
762 	if (port)
763 		(void)snprintf(cport, sizeof cport, ".%xH", htons(port));
764 	else
765 		*cport = 0;
766 
767 	(void)snprintf(mybuf, sizeof mybuf, "%xH.%s%s", (int)ntohl(net.long_e),
768 	    host, cport);
769 	upHex(mybuf);
770 	return (mybuf);
771 }
772 
773 char *
774 ns_phost(sa)
775 	struct sockaddr *sa;
776 {
777 	struct sockaddr_ns *sns = (struct sockaddr_ns *)sa;
778 	struct sockaddr_ns work;
779 	static union ns_net ns_zeronet;
780 	char *p;
781 
782 	work = *sns;
783 	work.sns_addr.x_port = 0;
784 	work.sns_addr.x_net = ns_zeronet;
785 
786 	p = ns_print((struct sockaddr *)&work);
787 	if (strncmp("0H.", p, 3) == 0)
788 		p += 3;
789 	return (p);
790 }
791 
792 void
793 upHex(p0)
794 	char *p0;
795 {
796 	char *p = p0;
797 
798 	for (; *p; p++)
799 		switch (*p) {
800 		case 'a':
801 		case 'b':
802 		case 'c':
803 		case 'd':
804 		case 'e':
805 		case 'f':
806 			*p += ('A' - 'a');
807 		}
808 }
809