xref: /netbsd-src/usr.bin/netstat/route.c (revision e55cffd8e520e9b03f18a1bd98bb04223e79f69f)
1 /*	$NetBSD: route.c,v 1.55 2001/04/06 05:10:28 itojun Exp $	*/
2 
3 /*
4  * Copyright (c) 1983, 1988, 1993
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. All advertising materials mentioning features or use of this software
16  *    must display the following acknowledgement:
17  *	This product includes software developed by the University of
18  *	California, Berkeley and its contributors.
19  * 4. Neither the name of the University nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include <sys/cdefs.h>
37 #ifndef lint
38 #if 0
39 static char sccsid[] = "from: @(#)route.c	8.3 (Berkeley) 3/9/94";
40 #else
41 __RCSID("$NetBSD: route.c,v 1.55 2001/04/06 05:10:28 itojun Exp $");
42 #endif
43 #endif /* not lint */
44 
45 #include <sys/param.h>
46 #include <sys/protosw.h>
47 #include <sys/socket.h>
48 #include <sys/mbuf.h>
49 #include <sys/un.h>
50 
51 #include <net/if.h>
52 #include <net/if_dl.h>
53 #include <net/if_types.h>
54 #define _KERNEL
55 #include <net/route.h>
56 #undef _KERNEL
57 #include <netinet/in.h>
58 #include <netatalk/at.h>
59 #include <netiso/iso.h>
60 
61 #include <netns/ns.h>
62 
63 #include <sys/sysctl.h>
64 
65 #include <arpa/inet.h>
66 
67 #include <err.h>
68 #include <netdb.h>
69 #include <stdio.h>
70 #include <stdlib.h>
71 #include <string.h>
72 #include <unistd.h>
73 
74 #include "netstat.h"
75 
76 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
77 
78 /* alignment constraint for routing socket */
79 #define ROUNDUP(a) \
80 	((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
81 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
82 
83 /*
84  * Definitions for showing gateway flags.
85  */
86 struct bits {
87 	short	b_mask;
88 	char	b_val;
89 } bits[] = {
90 	{ RTF_UP,	'U' },
91 	{ RTF_GATEWAY,	'G' },
92 	{ RTF_HOST,	'H' },
93 	{ RTF_REJECT,	'R' },
94 	{ RTF_DYNAMIC,	'D' },
95 	{ RTF_MODIFIED,	'M' },
96 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
97 	{ RTF_MASK,	'm' }, /* Mask Present -- for routing messages only */
98 	{ RTF_CLONING,	'C' },
99 	{ RTF_XRESOLVE,	'X' },
100 	{ RTF_LLINFO,	'L' },
101 	{ RTF_STATIC,	'S' },
102 	{ RTF_BLACKHOLE,'B' },
103 	{ RTF_CLONED,	'c' },
104 	{ RTF_PROTO1,	'1' },
105 	{ RTF_PROTO2,	'2' },
106 	{ 0 }
107 };
108 
109 /*
110  * XXX we put all of the sockaddr types in here to force the alignment
111  * to be correct.
112  */
113 static union sockaddr_union {
114 	struct	sockaddr u_sa;
115 	struct	sockaddr_in u_in;
116 	struct	sockaddr_un u_un;
117 	struct	sockaddr_iso u_iso;
118 	struct	sockaddr_at u_at;
119 	struct	sockaddr_dl u_dl;
120 	struct	sockaddr_ns u_ns;
121 	u_short	u_data[128];
122 	int u_dummy;		/* force word-alignment */
123 } pt_u;
124 
125 int	do_rtent = 0;
126 struct	rtentry rtentry;
127 struct	radix_node rnode;
128 struct	radix_mask rmask;
129 
130 int	NewTree = 0;
131 
132 static struct sockaddr *kgetsa __P((struct sockaddr *));
133 static void p_tree __P((struct radix_node *));
134 static void p_rtnode __P((void));
135 static void ntreestuff __P((void));
136 static void np_rtentry __P((struct rt_msghdr *));
137 static void p_sockaddr __P((const struct sockaddr *,
138 			    const struct sockaddr *, int, int));
139 static void p_flags __P((int));
140 static void p_rtentry __P((struct rtentry *));
141 static void ntreestuff __P((void));
142 static u_long forgemask __P((u_long));
143 static void domask __P((char *, size_t, u_long, u_long));
144 
145 /*
146  * Print routing tables.
147  */
148 void
149 routepr(rtree)
150 	u_long rtree;
151 {
152 	struct radix_node_head *rnh, head;
153 	int i;
154 
155 	printf("Routing tables\n");
156 
157 	if (Aflag == 0 && NewTree)
158 		ntreestuff();
159 	else {
160 		if (rtree == 0) {
161 			printf("rt_tables: symbol not in namelist\n");
162 			return;
163 		}
164 
165 		kget(rtree, rt_tables);
166 		for (i = 0; i <= AF_MAX; i++) {
167 			if ((rnh = rt_tables[i]) == 0)
168 				continue;
169 			kget(rnh, head);
170 			if (i == AF_UNSPEC) {
171 				if (Aflag && af == 0) {
172 					printf("Netmasks:\n");
173 					p_tree(head.rnh_treetop);
174 				}
175 			} else if (af == AF_UNSPEC || af == i) {
176 				pr_family(i);
177 				do_rtent = 1;
178 				pr_rthdr(i);
179 				p_tree(head.rnh_treetop);
180 			}
181 		}
182 	}
183 }
184 
185 /*
186  * Print address family header before a section of the routing table.
187  */
188 void
189 pr_family(af)
190 	int af;
191 {
192 	char *afname;
193 
194 	switch (af) {
195 	case AF_INET:
196 		afname = "Internet";
197 		break;
198 #ifdef INET6
199 	case AF_INET6:
200 		afname = "Internet6";
201 		break;
202 #endif
203 	case AF_NS:
204 		afname = "XNS";
205 		break;
206 	case AF_ISO:
207 		afname = "ISO";
208 		break;
209 	case AF_APPLETALK:
210 		afname = "AppleTalk";
211 		break;
212 	case AF_CCITT:
213 		afname = "X.25";
214 		break;
215 	default:
216 		afname = NULL;
217 		break;
218 	}
219 	if (afname)
220 		printf("\n%s:\n", afname);
221 	else
222 		printf("\nProtocol Family %d:\n", af);
223 }
224 
225 /* column widths; each followed by one space */
226 #ifndef INET6
227 #define	WID_DST(af)	18	/* width of destination column */
228 #define	WID_GW(af)	18	/* width of gateway column */
229 #else
230 /* width of destination/gateway column */
231 #ifdef KAME_SCOPEID
232 /* strlen("fe80::aaaa:bbbb:cccc:dddd@gif0") == 30, strlen("/128") == 4 */
233 #define	WID_DST(af)	((af) == AF_INET6 ? (nflag ? 34 : 18) : 18)
234 #define	WID_GW(af)	((af) == AF_INET6 ? (nflag ? 30 : 18) : 18)
235 #else
236 /* strlen("fe80::aaaa:bbbb:cccc:dddd") == 25, strlen("/128") == 4 */
237 #define	WID_DST(af)	((af) == AF_INET6 ? (nflag ? 29 : 18) : 18)
238 #define	WID_GW(af)	((af) == AF_INET6 ? (nflag ? 25 : 18) : 18)
239 #endif
240 #endif /* INET6 */
241 
242 /*
243  * Print header for routing table columns.
244  */
245 void
246 pr_rthdr(af)
247 	int af;
248 {
249 
250 	if (Aflag)
251 		printf("%-8.8s ","Address");
252 	printf("%-*.*s %-*.*s %-6.6s  %6.6s%8.8s %6.6s  %s\n",
253 		WID_DST(af), WID_DST(af), "Destination",
254 		WID_GW(af), WID_GW(af), "Gateway",
255 		"Flags", "Refs", "Use", "Mtu", "Interface");
256 }
257 
258 static struct sockaddr *
259 kgetsa(dst)
260 	struct sockaddr *dst;
261 {
262 
263 	kget(dst, pt_u.u_sa);
264 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
265 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
266 	return (&pt_u.u_sa);
267 }
268 
269 static void
270 p_tree(rn)
271 	struct radix_node *rn;
272 {
273 
274 again:
275 	kget(rn, rnode);
276 	if (rnode.rn_b < 0) {
277 		if (Aflag)
278 			printf("%-8.8lx ", (u_long) rn);
279 		if (rnode.rn_flags & RNF_ROOT) {
280 			if (Aflag)
281 				printf("(root node)%s",
282 				    rnode.rn_dupedkey ? " =>\n" : "\n");
283 		} else if (do_rtent) {
284 			kget(rn, rtentry);
285 			p_rtentry(&rtentry);
286 			if (Aflag)
287 				p_rtnode();
288 		} else {
289 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
290 			    NULL, 0, 44);
291 			putchar('\n');
292 		}
293 		if ((rn = rnode.rn_dupedkey) != NULL)
294 			goto again;
295 	} else {
296 		if (Aflag && do_rtent) {
297 			printf("%-8.8lx ", (u_long) rn);
298 			p_rtnode();
299 		}
300 		rn = rnode.rn_r;
301 		p_tree(rnode.rn_l);
302 		p_tree(rn);
303 	}
304 }
305 
306 static void
307 p_rtnode()
308 {
309 	struct radix_mask *rm = rnode.rn_mklist;
310 	char	nbuf[20];
311 
312 	if (rnode.rn_b < 0) {
313 		if (rnode.rn_mask) {
314 			printf("\t  mask ");
315 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
316 				    NULL, 0, -1);
317 		} else if (rm == 0)
318 			return;
319 	} else {
320 		(void)snprintf(nbuf, sizeof nbuf, "(%d)", rnode.rn_b);
321 		printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long) rnode.rn_l,
322 		    (u_long) rnode.rn_r);
323 	}
324 	while (rm) {
325 		kget(rm, rmask);
326 		(void)snprintf(nbuf, sizeof nbuf, " %d refs, ", rmask.rm_refs);
327 		printf(" mk = %8.8lx {(%d),%s", (u_long) rm,
328 		    -1 - rmask.rm_b, rmask.rm_refs ? nbuf : " ");
329 		if (rmask.rm_flags & RNF_NORMAL) {
330 			struct radix_node rnode_aux;
331 			printf(" <normal>, ");
332 			kget(rmask.rm_leaf, rnode_aux);
333 			p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
334 				    NULL, 0, -1);
335 		} else
336 			p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
337 			    NULL, 0, -1);
338 		putchar('}');
339 		if ((rm = rmask.rm_mklist) != NULL)
340 			printf(" ->");
341 	}
342 	putchar('\n');
343 }
344 
345 static void
346 ntreestuff()
347 {
348 	size_t needed;
349 	int mib[6];
350 	char *buf, *next, *lim;
351 	struct rt_msghdr *rtm;
352 
353 	mib[0] = CTL_NET;
354 	mib[1] = PF_ROUTE;
355 	mib[2] = 0;
356 	mib[3] = 0;
357 	mib[4] = NET_RT_DUMP;
358 	mib[5] = 0;
359 	if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0)
360 		err(1, "route sysctl estimate");
361 	if ((buf = malloc(needed)) == 0)
362 		errx(1, "out of space");
363 	if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0)
364 		err(1, "sysctl of routing table");
365 	lim  = buf + needed;
366 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
367 		rtm = (struct rt_msghdr *)next;
368 		np_rtentry(rtm);
369 	}
370 }
371 
372 static void
373 np_rtentry(rtm)
374 	struct rt_msghdr *rtm;
375 {
376 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
377 #ifdef notdef
378 	static int masks_done, banner_printed;
379 #endif
380 	static int old_af;
381 	int af = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
382 
383 	if (Lflag && (rtm->rtm_flags & RTF_LLINFO))
384 		return;
385 #ifdef notdef
386 	/* for the moment, netmasks are skipped over */
387 	if (!banner_printed) {
388 		printf("Netmasks:\n");
389 		banner_printed = 1;
390 	}
391 	if (masks_done == 0) {
392 		if (rtm->rtm_addrs != RTA_DST ) {
393 			masks_done = 1;
394 			af = sa->sa_family;
395 		}
396 	} else
397 #endif
398 		af = sa->sa_family;
399 	if (af != old_af) {
400 		pr_family(af);
401 		old_af = af;
402 	}
403 	if (rtm->rtm_addrs == RTA_DST)
404 		p_sockaddr(sa, NULL, 0, 36);
405 	else {
406 		p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
407 #if 0
408 		if (sa->sa_len == 0)
409 			sa->sa_len = sizeof(long);
410 #endif
411 		sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa);
412 		p_sockaddr(sa, NULL, 0, 18);
413 	}
414 	p_flags(rtm->rtm_flags & interesting);
415 	putchar('\n');
416 }
417 
418 static void
419 p_sockaddr(sa, mask, flags, width)
420 	const struct sockaddr *sa, *mask;
421 	int flags, width;
422 {
423 	char workbuf[128], *cplim;
424 	char *cp = workbuf;
425 	char *ep = workbuf + sizeof(workbuf);
426 
427 	switch(sa->sa_family) {
428 	case AF_INET:
429 	    {
430 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
431 
432 		if ((sin->sin_addr.s_addr == INADDR_ANY) &&
433 		    (mask != NULL) &&
434 		    (((struct sockaddr_in *)mask)->sin_addr.s_addr == 0))
435 			cp = "default";
436 		else if (flags & RTF_HOST)
437 			cp = routename(sin->sin_addr.s_addr);
438 		else if (mask)
439 			cp = netname(sin->sin_addr.s_addr,
440 			    ((struct sockaddr_in *)mask)->sin_addr.s_addr);
441 		else
442 			cp = netname(sin->sin_addr.s_addr, INADDR_ANY);
443 		break;
444 	    }
445 
446 #ifdef INET6
447 	case AF_INET6:
448 	    {
449 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
450 #ifdef KAME_SCOPEID
451 		struct in6_addr *in6 = &sa6->sin6_addr;
452 
453 		/*
454 		 * XXX: This is a special workaround for KAME kernels.
455 		 * sin6_scope_id field of SA should be set in the future.
456 		 */
457 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
458 		    IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
459 		    /* XXX: override is ok? */
460 		    sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
461 		    *(u_short *)&in6->s6_addr[2] = 0;
462 		}
463 #endif
464 
465 		if (flags & RTF_HOST)
466 			cp = routename6(sa6);
467 		else if (mask) {
468 			cp = netname6(sa6,
469 				      &((struct sockaddr_in6 *)mask)->sin6_addr);
470 		} else
471 			cp = netname6(sa6, NULL);
472 		break;
473 	    }
474 #endif
475 
476 #ifndef SMALL
477 	case AF_APPLETALK:
478 	case 0:
479 	    {
480 		if (!(flags & RTF_HOST) && mask)
481 			cp = atalk_print2(sa,mask,11);
482 		else
483 			cp = atalk_print(sa,11);
484 		break;
485 	    }
486 	case AF_NS:
487 		cp = ns_print((struct sockaddr *)sa);
488 		break;
489 #endif
490 
491 	case AF_LINK:
492 	    {
493 		struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
494 
495 		if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
496 		    sdl->sdl_slen == 0)
497 			(void)snprintf(workbuf, sizeof workbuf, "link#%d",
498 			    sdl->sdl_index);
499 		else switch (sdl->sdl_type) {
500 		case IFT_FDDI:
501 		case IFT_ETHER:
502 		case IFT_IEEE1394:
503 		    {
504 			int i, alen = sdl->sdl_alen;
505 			u_char *lla = (u_char *)sdl->sdl_data +
506 			    sdl->sdl_nlen;
507 
508 			if (sdl->sdl_type == IFT_IEEE1394 && alen > 8)
509 				alen = 8;
510 
511 			cplim = "";
512 			for (i = 0; i < alen; i++, lla++) {
513 				/* XXX */
514 				cp += snprintf(cp, ep - cp,
515 				    "%s%02x", cplim, *lla);
516 				cplim = ":";
517 			}
518 			cp = workbuf;
519 			break;
520 		    }
521 		default:
522 			cp = link_ntoa(sdl);
523 			break;
524 		}
525 		break;
526 	    }
527 
528 	default:
529 	    {
530 		u_char *s = (u_char *)sa->sa_data, *slim;
531 
532 		slim =  sa->sa_len + (u_char *) sa;
533 		cplim = cp + sizeof(workbuf) - 6;
534 		cp += snprintf(cp, ep - cp, "(%d)", sa->sa_family);
535 		while (s < slim && cp < cplim) {
536 			cp += snprintf(cp, ep - cp, " %02x", *s++);
537 			if (s < slim)
538 			    cp += snprintf(cp, ep - cp, "%02x", *s++);
539 		}
540 		cp = workbuf;
541 	    }
542 	}
543 	if (width < 0 )
544 		printf("%s ", cp);
545 	else {
546 		if (nflag)
547 			printf("%-*s ", width, cp);
548 		else
549 			printf("%-*.*s ", width, width, cp);
550 	}
551 }
552 
553 static void
554 p_flags(f)
555 	int f;
556 {
557 	char name[33], *flags;
558 	struct bits *p = bits;
559 
560 	for (flags = name; p->b_mask && flags - name < sizeof(name); p++)
561 		if (p->b_mask & f)
562 			*flags++ = p->b_val;
563 	*flags = '\0';
564 	printf("%-6.6s ", name);
565 }
566 
567 static struct sockaddr *sockcopy __P((struct sockaddr *,
568     union sockaddr_union *));
569 
570 /*
571  * copy a sockaddr into an allocated region, allocate at least sockaddr
572  * bytes and zero unused
573  */
574 static struct sockaddr *
575 sockcopy(sp, dp)
576 	struct sockaddr *sp;
577 	union sockaddr_union *dp;
578 {
579 	int len;
580 
581 	if (sp == 0 || sp->sa_len == 0)
582 		(void)memset(dp, 0, sizeof (*sp));
583 	else {
584 		len = (sp->sa_len >= sizeof (*sp)) ? sp->sa_len : sizeof (*sp);
585 		(void)memcpy(dp, sp, len);
586 	}
587 	return ((struct sockaddr *)dp);
588 }
589 
590 static void
591 p_rtentry(rt)
592 	struct rtentry *rt;
593 {
594 	static struct ifnet ifnet, *lastif;
595 	union sockaddr_union addr_un, mask_un;
596 	struct sockaddr *addr, *mask;
597 	int af;
598 
599 	if (Lflag && (rt->rt_flags & RTF_LLINFO))
600 		return;
601 
602 	memset(&addr_un, 0, sizeof(addr_un));
603 	memset(&mask_un, 0, sizeof(mask_un));
604 	addr = sockcopy(kgetsa(rt_key(rt)), &addr_un);
605 	af = addr->sa_family;
606 	if (rt_mask(rt))
607 		mask = sockcopy(kgetsa(rt_mask(rt)), &mask_un);
608 	else
609 		mask = sockcopy(NULL, &mask_un);
610 	p_sockaddr(addr, mask, rt->rt_flags, WID_DST(af));
611 	p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, WID_GW(af));
612 	p_flags(rt->rt_flags);
613 	printf("%6d %8lu ", rt->rt_refcnt, rt->rt_use);
614 	if (rt->rt_rmx.rmx_mtu)
615 		printf("%6lu", rt->rt_rmx.rmx_mtu);
616 	else
617 		printf("%6s", "-");
618 	putchar((rt->rt_rmx.rmx_locks & RTV_MTU) ? 'L' : ' ');
619 	if (rt->rt_ifp) {
620 		if (rt->rt_ifp != lastif) {
621 			kget(rt->rt_ifp, ifnet);
622 			lastif = rt->rt_ifp;
623 		}
624 		printf(" %.16s%s", ifnet.if_xname,
625 			rt->rt_nodes[0].rn_dupedkey ? " =>" : "");
626 	}
627 	putchar('\n');
628  	if (vflag) {
629  		printf("\texpire   %10lu%c  recvpipe %10ld%c  "
630 		       "sendpipe %10ld%c\n",
631  			rt->rt_rmx.rmx_expire,
632  			(rt->rt_rmx.rmx_locks & RTV_EXPIRE) ? 'L' : ' ',
633  			rt->rt_rmx.rmx_recvpipe,
634  			(rt->rt_rmx.rmx_locks & RTV_RPIPE) ? 'L' : ' ',
635  			rt->rt_rmx.rmx_sendpipe,
636  			(rt->rt_rmx.rmx_locks & RTV_SPIPE) ? 'L' : ' ');
637  		printf("\tssthresh %10lu%c  rtt      %10ld%c  "
638 		       "rttvar   %10ld%c\n",
639  			rt->rt_rmx.rmx_ssthresh,
640  			(rt->rt_rmx.rmx_locks & RTV_SSTHRESH) ? 'L' : ' ',
641  			rt->rt_rmx.rmx_rtt,
642  			(rt->rt_rmx.rmx_locks & RTV_RTT) ? 'L' : ' ',
643  			rt->rt_rmx.rmx_rttvar,
644 			(rt->rt_rmx.rmx_locks & RTV_RTTVAR) ? 'L' : ' ');
645  		printf("\thopcount %10lu%c\n",
646  			rt->rt_rmx.rmx_hopcount,
647 			(rt->rt_rmx.rmx_locks & RTV_HOPCOUNT) ? 'L' : ' ');
648  	}
649 }
650 
651 char *
652 routename(in)
653 	u_int32_t in;
654 {
655 	char *cp;
656 	static char line[MAXHOSTNAMELEN + 1];
657 	struct hostent *hp;
658 	static char domain[MAXHOSTNAMELEN + 1];
659 	static int first = 1;
660 
661 	if (first) {
662 		first = 0;
663 		if (gethostname(domain, MAXHOSTNAMELEN) == 0) {
664 			domain[sizeof(domain) - 1] = '\0';
665 			if ((cp = strchr(domain, '.')))
666 				(void)strlcpy(domain, cp + 1, sizeof(domain));
667 			else
668 				domain[0] = 0;
669 		} else
670 			domain[0] = 0;
671 	}
672 	cp = 0;
673 	if (!nflag) {
674 		hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
675 			AF_INET);
676 		if (hp) {
677 			if ((cp = strchr(hp->h_name, '.')) &&
678 			    !strcmp(cp + 1, domain))
679 				*cp = 0;
680 			cp = hp->h_name;
681 		}
682 	}
683 	if (cp) {
684 		strncpy(line, cp, sizeof(line) - 1);
685 		line[sizeof(line) - 1] = '\0';
686 	} else {
687 #define C(x)	((x) & 0xff)
688 		in = ntohl(in);
689 		snprintf(line, sizeof line, "%u.%u.%u.%u",
690 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
691 	}
692 	return (line);
693 }
694 
695 static u_long
696 forgemask(a)
697 	u_long a;
698 {
699 	u_long m;
700 
701 	if (IN_CLASSA(a))
702 		m = IN_CLASSA_NET;
703 	else if (IN_CLASSB(a))
704 		m = IN_CLASSB_NET;
705 	else
706 		m = IN_CLASSC_NET;
707 	return (m);
708 }
709 
710 static void
711 domask(dst, dlen, addr, mask)
712 	char *dst;
713 	size_t dlen;
714 	u_long addr, mask;
715 {
716 	int b, i;
717 
718 	if (!mask || (forgemask(addr) == mask)) {
719 		*dst = '\0';
720 		return;
721 	}
722 	i = 0;
723 	for (b = 0; b < 32; b++)
724 		if (mask & (1 << b)) {
725 			int bb;
726 
727 			i = b;
728 			for (bb = b+1; bb < 32; bb++)
729 				if (!(mask & (1 << bb))) {
730 					i = -1;	/* noncontig */
731 					break;
732 				}
733 			break;
734 		}
735 	if (i == -1)
736 		(void)snprintf(dst, dlen, "&0x%lx", mask);
737 	else
738 		(void)snprintf(dst, dlen, "/%d", 32-i);
739 }
740 
741 /*
742  * Return the name of the network whose address is given.
743  * The address is assumed to be that of a net or subnet, not a host.
744  */
745 char *
746 netname(in, mask)
747 	u_int32_t in, mask;
748 {
749 	char *cp = 0;
750 	static char line[MAXHOSTNAMELEN + 4];
751 	struct netent *np = 0;
752 	u_int32_t net, omask;
753 	u_int32_t i;
754 	int subnetshift;
755 
756 	i = ntohl(in);
757 	omask = mask = ntohl(mask);
758 	if (!nflag && i != INADDR_ANY) {
759 		if (mask == INADDR_ANY) {
760 			switch (mask = forgemask(i)) {
761 			case IN_CLASSA_NET:
762 				subnetshift = 8;
763 				break;
764 			case IN_CLASSB_NET:
765 				subnetshift = 8;
766 				break;
767 			case IN_CLASSC_NET:
768 				subnetshift = 4;
769 				break;
770 			default:
771 				abort();
772 			}
773 			/*
774 			 * If there are more bits than the standard mask
775 			 * would suggest, subnets must be in use.
776 			 * Guess at the subnet mask, assuming reasonable
777 			 * width subnet fields.
778 			 */
779 			while (i &~ mask)
780 				mask = (long)mask >> subnetshift;
781 		}
782 		net = i & mask;
783 		/*
784 		 * Note: shift the hosts bits out in octet units, since
785 		 * not all versions of getnetbyaddr() do this for us (e.g.
786 		 * the current `etc/networks' parser).
787 		 */
788 		while ((mask & 0xff) == 0)
789 			mask >>= 8, net >>= 8;
790 		np = getnetbyaddr(net, AF_INET);
791 		if (np)
792 			cp = np->n_name;
793 	}
794 	if (cp)
795 		strncpy(line, cp, sizeof(line) - 1);
796 	else if ((i & 0xffffff) == 0)
797 		(void)snprintf(line, sizeof line, "%u", C(i >> 24));
798 	else if ((i & 0xffff) == 0)
799 		(void)snprintf(line, sizeof line, "%u.%u", C(i >> 24)
800 		    , C(i >> 16));
801 	else if ((i & 0xff) == 0)
802 		(void)snprintf(line, sizeof line, "%u.%u.%u", C(i >> 24),
803 		    C(i >> 16), C(i >> 8));
804 	else
805 		(void)snprintf(line, sizeof line, "%u.%u.%u.%u", C(i >> 24),
806 			C(i >> 16), C(i >> 8), C(i));
807 	domask(line + strlen(line), sizeof(line) - strlen(line), i, omask);
808 	return (line);
809 }
810 
811 #ifdef INET6
812 char *
813 netname6(sa6, mask)
814 	struct sockaddr_in6 *sa6;
815 	struct in6_addr *mask;
816 {
817 	static char line[NI_MAXHOST];
818 	u_char *p, *q;
819 	u_char *lim;
820 	int masklen, final = 0, illegal = 0;
821 #ifdef KAME_SCOPEID
822 	int flag = NI_WITHSCOPEID;
823 #else
824 	int flag = 0;
825 #endif
826 	int error;
827 	struct sockaddr_in6 sin6;
828 
829 	sin6 = *sa6;
830 	if (mask) {
831 		masklen = 0;
832 		lim = (u_char *)(mask + 1);
833 		for (p = (u_char *)mask, q = (u_char *)&sin6.sin6_addr;
834 		     p < lim;
835 		     p++, q++) {
836 			if (final && *p) {
837 				illegal++;
838 				*q = 0;
839 				continue;
840 			}
841 
842 			switch (*p & 0xff) {
843 			 case 0xff:
844 				 masklen += 8;
845 				 break;
846 			 case 0xfe:
847 				 masklen += 7;
848 				 final++;
849 				 break;
850 			 case 0xfc:
851 				 masklen += 6;
852 				 final++;
853 				 break;
854 			 case 0xf8:
855 				 masklen += 5;
856 				 final++;
857 				 break;
858 			 case 0xf0:
859 				 masklen += 4;
860 				 final++;
861 				 break;
862 			 case 0xe0:
863 				 masklen += 3;
864 				 final++;
865 				 break;
866 			 case 0xc0:
867 				 masklen += 2;
868 				 final++;
869 				 break;
870 			 case 0x80:
871 				 masklen += 1;
872 				 final++;
873 				 break;
874 			 case 0x00:
875 				 final++;
876 				 break;
877 			 default:
878 				 final++;
879 				 illegal++;
880 				 break;
881 			}
882 
883 			if (!illegal)
884 				*q &= *p;
885 			else
886 				*q = 0;
887 		}
888 	} else
889 		masklen = 128;
890 
891 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
892 		return("default");
893 
894 	if (nflag)
895 		flag |= NI_NUMERICHOST;
896 	error = getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
897 			line, sizeof(line), NULL, 0, flag);
898 	if (error)
899 		strlcpy(line, "invalid", sizeof(line));
900 
901 	if (nflag)
902 		snprintf(&line[strlen(line)], sizeof(line) - strlen(line),
903 		    "/%d", masklen);
904 
905 	return line;
906 }
907 
908 char *
909 routename6(sa6)
910 	struct sockaddr_in6 *sa6;
911 {
912 	static char line[NI_MAXHOST];
913 #ifdef KAME_SCOPEID
914 	int flag = NI_WITHSCOPEID;
915 #else
916 	int flag = 0;
917 #endif
918 	/* use local variable for safety */
919 	struct sockaddr_in6 sa6_local;
920 	int error;
921 
922 	memset(&sa6_local, 0, sizeof(sa6_local));
923 	sa6_local.sin6_family = AF_INET6;
924 	sa6_local.sin6_len = sizeof(struct sockaddr_in6);
925 	sa6_local.sin6_addr = sa6->sin6_addr;
926 	sa6_local.sin6_scope_id = sa6->sin6_scope_id;
927 
928 	if (nflag)
929 		flag |= NI_NUMERICHOST;
930 
931 	error = getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
932 			line, sizeof(line), NULL, 0, flag);
933 	if (error)
934 		strlcpy(line, "invalid", sizeof(line));
935 
936 	return line;
937 }
938 #endif /*INET6*/
939 
940 /*
941  * Print routing statistics
942  */
943 void
944 rt_stats(off)
945 	u_long off;
946 {
947 	struct rtstat rtstat;
948 
949 	if (off == 0) {
950 		printf("rtstat: symbol not in namelist\n");
951 		return;
952 	}
953 	kread(off, (char *)&rtstat, sizeof (rtstat));
954 	printf("routing:\n");
955 	printf("\t%llu bad routing redirect%s\n",
956 		(unsigned long long)rtstat.rts_badredirect,
957 		plural(rtstat.rts_badredirect));
958 	printf("\t%llu dynamically created route%s\n",
959 		(unsigned long long)rtstat.rts_dynamic,
960 		plural(rtstat.rts_dynamic));
961 	printf("\t%llu new gateway%s due to redirects\n",
962 		(unsigned long long)rtstat.rts_newgateway,
963 		plural(rtstat.rts_newgateway));
964 	printf("\t%llu destination%s found unreachable\n",
965 		(unsigned long long)rtstat.rts_unreach,
966 		plural(rtstat.rts_unreach));
967 	printf("\t%llu use%s of a wildcard route\n",
968 		(unsigned long long)rtstat.rts_wildcard,
969 		plural(rtstat.rts_wildcard));
970 }
971 short ns_nullh[] = {0,0,0};
972 short ns_bh[] = {-1,-1,-1};
973 
974 char *
975 ns_print(sa)
976 	struct sockaddr *sa;
977 {
978 	struct sockaddr_ns *sns = (struct sockaddr_ns*)sa;
979 	struct ns_addr work;
980 	union {
981 		union	ns_net net_e;
982 		u_long	long_e;
983 	} net;
984 	u_short port;
985 	static char mybuf[50], cport[10], chost[25];
986 	char *host = "";
987 	char *p;
988 	u_char *q;
989 
990 	work = sns->sns_addr;
991 	port = ntohs(work.x_port);
992 	work.x_port = 0;
993 	net.net_e  = work.x_net;
994 	if (ns_nullhost(work) && net.long_e == 0) {
995 		if (port ) {
996 			(void)snprintf(mybuf, sizeof mybuf, "*.%xH", port);
997 			upHex(mybuf);
998 		} else
999 			(void)snprintf(mybuf, sizeof mybuf, "*.*");
1000 		return (mybuf);
1001 	}
1002 
1003 	if (memcmp(ns_bh, work.x_host.c_host, 6) == 0) {
1004 		host = "any";
1005 	} else if (memcmp(ns_nullh, work.x_host.c_host, 6) == 0) {
1006 		host = "*";
1007 	} else {
1008 		q = work.x_host.c_host;
1009 		(void)snprintf(chost, sizeof chost, "%02x%02x%02x%02x%02x%02xH",
1010 			q[0], q[1], q[2], q[3], q[4], q[5]);
1011 		for (p = chost; *p == '0' && p < chost + 12; p++)
1012 			continue;
1013 		host = p;
1014 	}
1015 	if (port)
1016 		(void)snprintf(cport, sizeof cport, ".%xH", htons(port));
1017 	else
1018 		*cport = 0;
1019 
1020 	(void)snprintf(mybuf, sizeof mybuf, "%xH.%s%s", (int)ntohl(net.long_e),
1021 	    host, cport);
1022 	upHex(mybuf);
1023 	return (mybuf);
1024 }
1025 
1026 char *
1027 ns_phost(sa)
1028 	struct sockaddr *sa;
1029 {
1030 	struct sockaddr_ns *sns = (struct sockaddr_ns *)sa;
1031 	struct sockaddr_ns work;
1032 	static union ns_net ns_zeronet;
1033 	char *p;
1034 
1035 	work = *sns;
1036 	work.sns_addr.x_port = 0;
1037 	work.sns_addr.x_net = ns_zeronet;
1038 
1039 	p = ns_print((struct sockaddr *)&work);
1040 	if (strncmp("0H.", p, 3) == 0)
1041 		p += 3;
1042 	return (p);
1043 }
1044 
1045 void
1046 upHex(p0)
1047 	char *p0;
1048 {
1049 	char *p = p0;
1050 
1051 	for (; *p; p++)
1052 		switch (*p) {
1053 		case 'a':
1054 		case 'b':
1055 		case 'c':
1056 		case 'd':
1057 		case 'e':
1058 		case 'f':
1059 			*p += ('A' - 'a');
1060 		}
1061 }
1062