xref: /freebsd/usr.bin/netstat/route.c (revision 6ff6d951ade3f3379932df7f878ef3ea272cfc59)
1 /*-
2  * Copyright (c) 1983, 1988, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 #if 0
35 #ifndef lint
36 static char sccsid[] = "From: @(#)route.c	8.6 (Berkeley) 4/28/95";
37 #endif /* not lint */
38 #endif
39 
40 #include <sys/cdefs.h>
41 __FBSDID("$FreeBSD$");
42 
43 #include <sys/param.h>
44 #include <sys/protosw.h>
45 #include <sys/socket.h>
46 #include <sys/socketvar.h>
47 #include <sys/time.h>
48 
49 #include <net/ethernet.h>
50 #include <net/if.h>
51 #include <net/if_var.h>
52 #include <net/if_dl.h>
53 #include <net/if_types.h>
54 #include <net/radix.h>
55 #include <net/route.h>
56 
57 #include <netinet/in.h>
58 #include <netipx/ipx.h>
59 #include <netatalk/at.h>
60 #include <netgraph/ng_socket.h>
61 
62 #include <sys/sysctl.h>
63 
64 #include <arpa/inet.h>
65 #include <libutil.h>
66 #include <netdb.h>
67 #include <stdint.h>
68 #include <stdio.h>
69 #include <stdlib.h>
70 #include <string.h>
71 #include <sysexits.h>
72 #include <unistd.h>
73 #include <err.h>
74 #include "netstat.h"
75 
76 #define	kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
77 
78 /*
79  * Definitions for showing gateway flags.
80  */
81 struct bits {
82 	u_long	b_mask;
83 	char	b_val;
84 } bits[] = {
85 	{ RTF_UP,	'U' },
86 	{ RTF_GATEWAY,	'G' },
87 	{ RTF_HOST,	'H' },
88 	{ RTF_REJECT,	'R' },
89 	{ RTF_DYNAMIC,	'D' },
90 	{ RTF_MODIFIED,	'M' },
91 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
92 	{ RTF_CLONING,	'C' },
93 	{ RTF_XRESOLVE,	'X' },
94 	{ RTF_LLINFO,	'L' },
95 	{ RTF_STATIC,	'S' },
96 	{ RTF_PROTO1,	'1' },
97 	{ RTF_PROTO2,	'2' },
98 	{ RTF_WASCLONED,'W' },
99 	{ RTF_PRCLONING,'c' },
100 	{ RTF_PROTO3,	'3' },
101 	{ RTF_BLACKHOLE,'B' },
102 	{ RTF_BROADCAST,'b' },
103 	{ 0 , 0 }
104 };
105 
106 typedef union {
107 	long	dummy;		/* Helps align structure. */
108 	struct	sockaddr u_sa;
109 	u_short	u_data[128];
110 } sa_u;
111 
112 static sa_u pt_u;
113 
114 int	do_rtent = 0;
115 struct	rtentry rtentry;
116 struct	radix_node rnode;
117 struct	radix_mask rmask;
118 struct	radix_node_head *rt_tables[AF_MAX+1];
119 
120 int	NewTree = 0;
121 
122 struct	timespec uptime;
123 
124 static struct sockaddr *kgetsa(struct sockaddr *);
125 static void size_cols(int ef, struct radix_node *rn);
126 static void size_cols_tree(struct radix_node *rn);
127 static void size_cols_rtentry(struct rtentry *rt);
128 static void p_tree(struct radix_node *);
129 static void p_rtnode(void);
130 static void ntreestuff(void);
131 static void np_rtentry(struct rt_msghdr *);
132 static void p_sockaddr(struct sockaddr *, struct sockaddr *, int, int);
133 static const char *fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask,
134 				 int flags);
135 static void p_flags(int, const char *);
136 static const char *fmt_flags(int f);
137 static void p_rtentry(struct rtentry *);
138 static void domask(char *, in_addr_t, u_long);
139 
140 /*
141  * Print routing tables.
142  */
143 void
144 routepr(u_long rtree)
145 {
146 	struct radix_node_head *rnh, head;
147 	int i;
148 
149 	/*
150 	 * Since kernel & userland use different timebase
151 	 * (time_uptime vs time_second) and we are reading kernel memory
152 	 * directly we should do rt_rmx.rmx_expire --> expire_time conversion.
153 	 */
154 	if (clock_gettime(CLOCK_UPTIME, &uptime) < 0)
155 		err(EX_OSERR, "clock_gettime() failed");
156 
157 	printf("Routing tables\n");
158 
159 	if (Aflag == 0 && NewTree)
160 		ntreestuff();
161 	else {
162 		if (rtree == 0) {
163 			printf("rt_tables: symbol not in namelist\n");
164 			return;
165 		}
166 
167 		if (kget(rtree, rt_tables) != 0)
168 			return;
169 		for (i = 0; i <= AF_MAX; i++) {
170 			if ((rnh = rt_tables[i]) == 0)
171 				continue;
172 			if (kget(rnh, head) != 0)
173 				continue;
174 			if (i == AF_UNSPEC) {
175 				if (Aflag && af == 0) {
176 					printf("Netmasks:\n");
177 					p_tree(head.rnh_treetop);
178 				}
179 			} else if (af == AF_UNSPEC || af == i) {
180 				size_cols(i, head.rnh_treetop);
181 				pr_family(i);
182 				do_rtent = 1;
183 				pr_rthdr(i);
184 				p_tree(head.rnh_treetop);
185 			}
186 		}
187 	}
188 }
189 
190 /*
191  * Print address family header before a section of the routing table.
192  */
193 void
194 pr_family(int af1)
195 {
196 	const char *afname;
197 
198 	switch (af1) {
199 	case AF_INET:
200 		afname = "Internet";
201 		break;
202 #ifdef INET6
203 	case AF_INET6:
204 		afname = "Internet6";
205 		break;
206 #endif /*INET6*/
207 	case AF_IPX:
208 		afname = "IPX";
209 		break;
210 	case AF_ISO:
211 		afname = "ISO";
212 		break;
213 	case AF_APPLETALK:
214 		afname = "AppleTalk";
215 		break;
216 	case AF_CCITT:
217 		afname = "X.25";
218 		break;
219 	case AF_NETGRAPH:
220 		afname = "Netgraph";
221 		break;
222 	default:
223 		afname = NULL;
224 		break;
225 	}
226 	if (afname)
227 		printf("\n%s:\n", afname);
228 	else
229 		printf("\nProtocol Family %d:\n", af1);
230 }
231 
232 /* column widths; each followed by one space */
233 #ifndef INET6
234 #define	WID_DST_DEFAULT(af) 	18	/* width of destination column */
235 #define	WID_GW_DEFAULT(af)	18	/* width of gateway column */
236 #define	WID_IF_DEFAULT(af)	(Wflag ? 8 : 6)	/* width of netif column */
237 #else
238 #define	WID_DST_DEFAULT(af) \
239 	((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18)
240 #define	WID_GW_DEFAULT(af) \
241 	((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18)
242 #define	WID_IF_DEFAULT(af)	((af) == AF_INET6 ? 8 : (Wflag ? 8 : 6))
243 #endif /*INET6*/
244 
245 static int wid_dst;
246 static int wid_gw;
247 static int wid_flags;
248 static int wid_refs;
249 static int wid_use;
250 static int wid_mtu;
251 static int wid_if;
252 static int wid_expire;
253 
254 static void
255 size_cols(int ef __unused, struct radix_node *rn)
256 {
257 	wid_dst = WID_DST_DEFAULT(ef);
258 	wid_gw = WID_GW_DEFAULT(ef);
259 	wid_flags = 6;
260 	wid_refs = 6;
261 	wid_use = 8;
262 	wid_mtu = 6;
263 	wid_if = WID_IF_DEFAULT(ef);
264 	wid_expire = 6;
265 
266 	if (Wflag)
267 		size_cols_tree(rn);
268 }
269 
270 static void
271 size_cols_tree(struct radix_node *rn)
272 {
273 again:
274 	if (kget(rn, rnode) != 0)
275 		return;
276 	if (!(rnode.rn_flags & RNF_ACTIVE))
277 		return;
278 	if (rnode.rn_bit < 0) {
279 		if ((rnode.rn_flags & RNF_ROOT) == 0) {
280 			if (kget(rn, rtentry) != 0)
281 				return;
282 			size_cols_rtentry(&rtentry);
283 		}
284 		if ((rn = rnode.rn_dupedkey))
285 			goto again;
286 	} else {
287 		rn = rnode.rn_right;
288 		size_cols_tree(rnode.rn_left);
289 		size_cols_tree(rn);
290 	}
291 }
292 
293 static void
294 size_cols_rtentry(struct rtentry *rt)
295 {
296 	static struct ifnet ifnet, *lastif;
297 	struct rtentry parent;
298 	static char buffer[100];
299 	const char *bp;
300 	struct sockaddr *sa;
301 	sa_u addr, mask;
302 	int len;
303 
304 	/*
305 	 * Don't print protocol-cloned routes unless -a.
306 	 */
307 	if (rt->rt_flags & RTF_WASCLONED && !aflag) {
308 		if (kget(rt->rt_parent, parent) != 0)
309 			return;
310 		if (parent.rt_flags & RTF_PRCLONING)
311 			return;
312 	}
313 
314 	bzero(&addr, sizeof(addr));
315 	if ((sa = kgetsa(rt_key(rt))))
316 		bcopy(sa, &addr, sa->sa_len);
317 	bzero(&mask, sizeof(mask));
318 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
319 		bcopy(sa, &mask, sa->sa_len);
320 	bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags);
321 	len = strlen(bp);
322 	wid_dst = MAX(len, wid_dst);
323 
324 	bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST);
325 	len = strlen(bp);
326 	wid_gw = MAX(len, wid_gw);
327 
328 	bp = fmt_flags(rt->rt_flags);
329 	len = strlen(bp);
330 	wid_flags = MAX(len, wid_flags);
331 
332 	if (addr.u_sa.sa_family == AF_INET || Wflag) {
333 		len = snprintf(buffer, sizeof(buffer), "%ld", rt->rt_refcnt);
334 		wid_refs = MAX(len, wid_refs);
335 		len = snprintf(buffer, sizeof(buffer), "%lu", rt->rt_use);
336 		wid_use = MAX(len, wid_use);
337 		if (Wflag && rt->rt_rmx.rmx_mtu != 0) {
338 			len = snprintf(buffer, sizeof(buffer),
339 				       "%lu", rt->rt_rmx.rmx_mtu);
340 			wid_mtu = MAX(len, wid_mtu);
341 		}
342 	}
343 	if (rt->rt_ifp) {
344 		if (rt->rt_ifp != lastif) {
345 			if (kget(rt->rt_ifp, ifnet) == 0)
346 				len = strlen(ifnet.if_xname);
347 			else
348 				len = strlen("---");
349 			lastif = rt->rt_ifp;
350 			wid_if = MAX(len, wid_if);
351 		}
352 		if (rt->rt_rmx.rmx_expire) {
353 			time_t expire_time;
354 
355 			if ((expire_time =
356 			    rt->rt_rmx.rmx_expire - uptime.tv_sec) > 0) {
357 				len = snprintf(buffer, sizeof(buffer), "%d",
358 					       (int)expire_time);
359 				wid_expire = MAX(len, wid_expire);
360 			}
361 		}
362 	}
363 }
364 
365 
366 /*
367  * Print header for routing table columns.
368  */
369 void
370 pr_rthdr(int af1)
371 {
372 
373 	if (Aflag)
374 		printf("%-8.8s ","Address");
375 	if (af1 == AF_INET || Wflag) {
376 		if (Wflag) {
377 			printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*.*s %*s\n",
378 				wid_dst,	wid_dst,	"Destination",
379 				wid_gw,		wid_gw,		"Gateway",
380 				wid_flags,	wid_flags,	"Flags",
381 				wid_refs,	wid_refs,	"Refs",
382 				wid_use,	wid_use,	"Use",
383 				wid_mtu,	wid_mtu,	"Mtu",
384 				wid_if,		wid_if,		"Netif",
385 				wid_expire,			"Expire");
386 		} else {
387 			printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*s\n",
388 				wid_dst,	wid_dst,	"Destination",
389 				wid_gw,		wid_gw,		"Gateway",
390 				wid_flags,	wid_flags,	"Flags",
391 				wid_refs,	wid_refs,	"Refs",
392 				wid_use,	wid_use,	"Use",
393 				wid_if,		wid_if,		"Netif",
394 				wid_expire,			"Expire");
395 		}
396 	} else {
397 		printf("%-*.*s %-*.*s %-*.*s  %*.*s %*s\n",
398 			wid_dst,	wid_dst,	"Destination",
399 			wid_gw,		wid_gw,		"Gateway",
400 			wid_flags,	wid_flags,	"Flags",
401 			wid_if,		wid_if,		"Netif",
402 			wid_expire,			"Expire");
403 	}
404 }
405 
406 static struct sockaddr *
407 kgetsa(struct sockaddr *dst)
408 {
409 
410 	if (kget(dst, pt_u.u_sa) != 0)
411 		return (NULL);
412 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
413 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
414 	return (&pt_u.u_sa);
415 }
416 
417 static void
418 p_tree(struct radix_node *rn)
419 {
420 
421 again:
422 	if (kget(rn, rnode) != 0)
423 		return;
424 	if (!(rnode.rn_flags & RNF_ACTIVE))
425 		return;
426 	if (rnode.rn_bit < 0) {
427 		if (Aflag)
428 			printf("%-8.8lx ", (u_long)rn);
429 		if (rnode.rn_flags & RNF_ROOT) {
430 			if (Aflag)
431 				printf("(root node)%s",
432 				    rnode.rn_dupedkey ? " =>\n" : "\n");
433 		} else if (do_rtent) {
434 			if (kget(rn, rtentry) == 0) {
435 				p_rtentry(&rtentry);
436 				if (Aflag)
437 					p_rtnode();
438 			}
439 		} else {
440 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
441 				   NULL, 0, 44);
442 			putchar('\n');
443 		}
444 		if ((rn = rnode.rn_dupedkey))
445 			goto again;
446 	} else {
447 		if (Aflag && do_rtent) {
448 			printf("%-8.8lx ", (u_long)rn);
449 			p_rtnode();
450 		}
451 		rn = rnode.rn_right;
452 		p_tree(rnode.rn_left);
453 		p_tree(rn);
454 	}
455 }
456 
457 char	nbuf[20];
458 
459 static void
460 p_rtnode(void)
461 {
462 	struct radix_mask *rm = rnode.rn_mklist;
463 
464 	if (rnode.rn_bit < 0) {
465 		if (rnode.rn_mask) {
466 			printf("\t  mask ");
467 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
468 				   NULL, 0, -1);
469 		} else if (rm == 0)
470 			return;
471 	} else {
472 		sprintf(nbuf, "(%d)", rnode.rn_bit);
473 		printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long)rnode.rn_left, (u_long)rnode.rn_right);
474 	}
475 	while (rm) {
476 		if (kget(rm, rmask) != 0)
477 			break;
478 		sprintf(nbuf, " %d refs, ", rmask.rm_refs);
479 		printf(" mk = %8.8lx {(%d),%s",
480 			(u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " ");
481 		if (rmask.rm_flags & RNF_NORMAL) {
482 			struct radix_node rnode_aux;
483 			printf(" <normal>, ");
484 			if (kget(rmask.rm_leaf, rnode_aux) == 0)
485 				p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
486 				    NULL, 0, -1);
487 			else
488 				p_sockaddr(NULL, NULL, 0, -1);
489 		} else
490 		    p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
491 				NULL, 0, -1);
492 		putchar('}');
493 		if ((rm = rmask.rm_mklist))
494 			printf(" ->");
495 	}
496 	putchar('\n');
497 }
498 
499 static void
500 ntreestuff(void)
501 {
502 	size_t needed;
503 	int mib[6];
504 	char *buf, *next, *lim;
505 	struct rt_msghdr *rtm;
506 
507 	mib[0] = CTL_NET;
508 	mib[1] = PF_ROUTE;
509 	mib[2] = 0;
510 	mib[3] = 0;
511 	mib[4] = NET_RT_DUMP;
512 	mib[5] = 0;
513 	if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0) {
514 		err(1, "sysctl: net.route.0.0.dump estimate");
515 	}
516 
517 	if ((buf = malloc(needed)) == 0) {
518 		errx(2, "malloc(%lu)", (unsigned long)needed);
519 	}
520 	if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0) {
521 		err(1, "sysctl: net.route.0.0.dump");
522 	}
523 	lim  = buf + needed;
524 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
525 		rtm = (struct rt_msghdr *)next;
526 		np_rtentry(rtm);
527 	}
528 }
529 
530 static void
531 np_rtentry(struct rt_msghdr *rtm)
532 {
533 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
534 #ifdef notdef
535 	static int masks_done, banner_printed;
536 #endif
537 	static int old_af;
538 	int af1 = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
539 
540 #ifdef notdef
541 	/* for the moment, netmasks are skipped over */
542 	if (!banner_printed) {
543 		printf("Netmasks:\n");
544 		banner_printed = 1;
545 	}
546 	if (masks_done == 0) {
547 		if (rtm->rtm_addrs != RTA_DST ) {
548 			masks_done = 1;
549 			af1 = sa->sa_family;
550 		}
551 	} else
552 #endif
553 		af1 = sa->sa_family;
554 	if (af1 != old_af) {
555 		pr_family(af1);
556 		old_af = af1;
557 	}
558 	if (rtm->rtm_addrs == RTA_DST)
559 		p_sockaddr(sa, NULL, 0, 36);
560 	else {
561 		p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
562 		sa = (struct sockaddr *)(SA_SIZE(sa) + (char *)sa);
563 		p_sockaddr(sa, NULL, 0, 18);
564 	}
565 	p_flags(rtm->rtm_flags & interesting, "%-6.6s ");
566 	putchar('\n');
567 }
568 
569 static void
570 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
571 {
572 	const char *cp;
573 
574 	cp = fmt_sockaddr(sa, mask, flags);
575 
576 	if (width < 0 )
577 		printf("%s ", cp);
578 	else {
579 		if (numeric_addr)
580 			printf("%-*s ", width, cp);
581 		else
582 			printf("%-*.*s ", width, width, cp);
583 	}
584 }
585 
586 static const char *
587 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags)
588 {
589 	static char workbuf[128];
590 	const char *cp;
591 
592 	if (sa == NULL)
593 		return ("null");
594 
595 	switch(sa->sa_family) {
596 	case AF_INET:
597 	    {
598 		struct sockaddr_in *sockin = (struct sockaddr_in *)sa;
599 
600 		if ((sockin->sin_addr.s_addr == INADDR_ANY) &&
601 			mask &&
602 			ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr)
603 				==0L)
604 				cp = "default" ;
605 		else if (flags & RTF_HOST)
606 			cp = routename(sockin->sin_addr.s_addr);
607 		else if (mask)
608 			cp = netname(sockin->sin_addr.s_addr,
609 				     ntohl(((struct sockaddr_in *)mask)
610 					   ->sin_addr.s_addr));
611 		else
612 			cp = netname(sockin->sin_addr.s_addr, 0L);
613 		break;
614 	    }
615 
616 #ifdef INET6
617 	case AF_INET6:
618 	    {
619 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
620 		struct in6_addr *in6 = &sa6->sin6_addr;
621 
622 		/*
623 		 * XXX: This is a special workaround for KAME kernels.
624 		 * sin6_scope_id field of SA should be set in the future.
625 		 */
626 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
627 		    IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
628 		    /* XXX: override is ok? */
629 		    sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
630 		    *(u_short *)&in6->s6_addr[2] = 0;
631 		}
632 
633 		if (flags & RTF_HOST)
634 		    cp = routename6(sa6);
635 		else if (mask)
636 		    cp = netname6(sa6,
637 				  &((struct sockaddr_in6 *)mask)->sin6_addr);
638 		else {
639 		    cp = netname6(sa6, NULL);
640 		}
641 		break;
642 	    }
643 #endif /*INET6*/
644 
645 	case AF_IPX:
646 	    {
647 		struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr;
648 		if (ipx_nullnet(satoipx_addr(work)))
649 			cp = "default";
650 		else
651 			cp = ipx_print(sa);
652 		break;
653 	    }
654 	case AF_APPLETALK:
655 	    {
656 		if (!(flags & RTF_HOST) && mask)
657 			cp = atalk_print2(sa,mask,9);
658 		else
659 			cp = atalk_print(sa,11);
660 		break;
661 	    }
662 	case AF_NETGRAPH:
663 	    {
664 		strlcpy(workbuf, ((struct sockaddr_ng *)sa)->sg_data,
665 		        sizeof(workbuf));
666 		cp = workbuf;
667 		break;
668 	    }
669 
670 	case AF_LINK:
671 	    {
672 		struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
673 
674 		if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
675 		    sdl->sdl_slen == 0) {
676 			(void) sprintf(workbuf, "link#%d", sdl->sdl_index);
677 			cp = workbuf;
678 		} else
679 			switch (sdl->sdl_type) {
680 
681 			case IFT_ETHER:
682 			case IFT_L2VLAN:
683 			case IFT_BRIDGE:
684 				if (sdl->sdl_alen == ETHER_ADDR_LEN) {
685 					cp = ether_ntoa((struct ether_addr *)
686 					    (sdl->sdl_data + sdl->sdl_nlen));
687 					break;
688 				}
689 				/* FALLTHROUGH */
690 			default:
691 				cp = link_ntoa(sdl);
692 				break;
693 			}
694 		break;
695 	    }
696 
697 	default:
698 	    {
699 		u_char *s = (u_char *)sa->sa_data, *slim;
700 		char *cq, *cqlim;
701 
702 		cq = workbuf;
703 		slim =  sa->sa_len + (u_char *) sa;
704 		cqlim = cq + sizeof(workbuf) - 6;
705 		cq += sprintf(cq, "(%d)", sa->sa_family);
706 		while (s < slim && cq < cqlim) {
707 			cq += sprintf(cq, " %02x", *s++);
708 			if (s < slim)
709 			    cq += sprintf(cq, "%02x", *s++);
710 		}
711 		cp = workbuf;
712 	    }
713 	}
714 
715 	return (cp);
716 }
717 
718 static void
719 p_flags(int f, const char *format)
720 {
721 	printf(format, fmt_flags(f));
722 }
723 
724 static const char *
725 fmt_flags(int f)
726 {
727 	static char name[33];
728 	char *flags;
729 	struct bits *p = bits;
730 
731 	for (flags = name; p->b_mask; p++)
732 		if (p->b_mask & f)
733 			*flags++ = p->b_val;
734 	*flags = '\0';
735 	return (name);
736 }
737 
738 static void
739 p_rtentry(struct rtentry *rt)
740 {
741 	static struct ifnet ifnet, *lastif;
742 	struct rtentry parent;
743 	static char buffer[128];
744 	static char prettyname[128];
745 	struct sockaddr *sa;
746 	sa_u addr, mask;
747 
748 	/*
749 	 * Don't print protocol-cloned routes unless -a.
750 	 */
751 	if (rt->rt_flags & RTF_WASCLONED && !aflag) {
752 		if (kget(rt->rt_parent, parent) != 0)
753 			return;
754 		if (parent.rt_flags & RTF_PRCLONING)
755 			return;
756 	}
757 
758 	bzero(&addr, sizeof(addr));
759 	if ((sa = kgetsa(rt_key(rt))))
760 		bcopy(sa, &addr, sa->sa_len);
761 	bzero(&mask, sizeof(mask));
762 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
763 		bcopy(sa, &mask, sa->sa_len);
764 	p_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags, wid_dst);
765 	p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw);
766 	snprintf(buffer, sizeof(buffer), "%%-%d.%ds ", wid_flags, wid_flags);
767 	p_flags(rt->rt_flags, buffer);
768 	if (addr.u_sa.sa_family == AF_INET || Wflag) {
769 		printf("%*ld %*lu ", wid_refs, rt->rt_refcnt,
770 				     wid_use, rt->rt_use);
771 		if (Wflag) {
772 			if (rt->rt_rmx.rmx_mtu != 0)
773 				printf("%*lu ", wid_mtu, rt->rt_rmx.rmx_mtu);
774 			else
775 				printf("%*s ", wid_mtu, "");
776 		}
777 	}
778 	if (rt->rt_ifp) {
779 		if (rt->rt_ifp != lastif) {
780 			if (kget(rt->rt_ifp, ifnet) == 0)
781 				strlcpy(prettyname, ifnet.if_xname,
782 				    sizeof(prettyname));
783 			else
784 				strlcpy(prettyname, "---", sizeof(prettyname));
785 			lastif = rt->rt_ifp;
786 		}
787 		printf("%*.*s", wid_if, wid_if, prettyname);
788 		if (rt->rt_rmx.rmx_expire) {
789 			time_t expire_time;
790 
791 			if ((expire_time =
792 			    rt->rt_rmx.rmx_expire - uptime.tv_sec) > 0)
793 				printf(" %*d", wid_expire, (int)expire_time);
794 		}
795 		if (rt->rt_nodes[0].rn_dupedkey)
796 			printf(" =>");
797 	}
798 	putchar('\n');
799 }
800 
801 char *
802 routename(in_addr_t in)
803 {
804 	char *cp;
805 	static char line[MAXHOSTNAMELEN];
806 	struct hostent *hp;
807 
808 	cp = 0;
809 	if (!numeric_addr) {
810 		hp = gethostbyaddr(&in, sizeof (struct in_addr), AF_INET);
811 		if (hp) {
812 			cp = hp->h_name;
813 			trimdomain(cp, strlen(cp));
814 		}
815 	}
816 	if (cp) {
817 		strncpy(line, cp, sizeof(line) - 1);
818 		line[sizeof(line) - 1] = '\0';
819 	} else {
820 #define	C(x)	((x) & 0xff)
821 		in = ntohl(in);
822 		sprintf(line, "%u.%u.%u.%u",
823 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
824 	}
825 	return (line);
826 }
827 
828 #define	NSHIFT(m) (							\
829 	(m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT :			\
830 	(m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT :			\
831 	(m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT :			\
832 	0)
833 
834 static void
835 domask(char *dst, in_addr_t addr __unused, u_long mask)
836 {
837 	int b, i;
838 
839 	if (mask == 0 || (!numeric_addr && NSHIFT(mask) != 0)) {
840 		*dst = '\0';
841 		return;
842 	}
843 	i = 0;
844 	for (b = 0; b < 32; b++)
845 		if (mask & (1 << b)) {
846 			int bb;
847 
848 			i = b;
849 			for (bb = b+1; bb < 32; bb++)
850 				if (!(mask & (1 << bb))) {
851 					i = -1;	/* noncontig */
852 					break;
853 				}
854 			break;
855 		}
856 	if (i == -1)
857 		sprintf(dst, "&0x%lx", mask);
858 	else
859 		sprintf(dst, "/%d", 32-i);
860 }
861 
862 /*
863  * Return the name of the network whose address is given.
864  * The address is assumed to be that of a net or subnet, not a host.
865  */
866 char *
867 netname(in_addr_t in, u_long mask)
868 {
869 	char *cp = 0;
870 	static char line[MAXHOSTNAMELEN];
871 	struct netent *np = 0;
872 	in_addr_t i;
873 
874 	i = ntohl(in);
875 	if (!numeric_addr && i) {
876 		np = getnetbyaddr(i >> NSHIFT(mask), AF_INET);
877 		if (np != NULL) {
878 			cp = np->n_name;
879 			trimdomain(cp, strlen(cp));
880 		}
881 	}
882 	if (cp != NULL) {
883 		strncpy(line, cp, sizeof(line) - 1);
884 		line[sizeof(line) - 1] = '\0';
885 	} else {
886 		inet_ntop(AF_INET, &in, line, sizeof(line) - 1);
887 	}
888 	domask(line + strlen(line), i, mask);
889 	return (line);
890 }
891 
892 #undef NSHIFT
893 
894 #ifdef INET6
895 const char *
896 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask)
897 {
898 	static char line[MAXHOSTNAMELEN];
899 	u_char *p = (u_char *)mask;
900 	u_char *lim;
901 	int masklen, illegal = 0, flag = 0;
902 
903 	if (mask) {
904 		for (masklen = 0, lim = p + 16; p < lim; p++) {
905 			switch (*p) {
906 			 case 0xff:
907 				 masklen += 8;
908 				 break;
909 			 case 0xfe:
910 				 masklen += 7;
911 				 break;
912 			 case 0xfc:
913 				 masklen += 6;
914 				 break;
915 			 case 0xf8:
916 				 masklen += 5;
917 				 break;
918 			 case 0xf0:
919 				 masklen += 4;
920 				 break;
921 			 case 0xe0:
922 				 masklen += 3;
923 				 break;
924 			 case 0xc0:
925 				 masklen += 2;
926 				 break;
927 			 case 0x80:
928 				 masklen += 1;
929 				 break;
930 			 case 0x00:
931 				 break;
932 			 default:
933 				 illegal ++;
934 				 break;
935 			}
936 		}
937 		if (illegal)
938 			fprintf(stderr, "illegal prefixlen\n");
939 	}
940 	else
941 		masklen = 128;
942 
943 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
944 		return("default");
945 
946 	if (numeric_addr)
947 		flag |= NI_NUMERICHOST;
948 	getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line),
949 		    NULL, 0, flag);
950 
951 	if (numeric_addr)
952 		sprintf(&line[strlen(line)], "/%d", masklen);
953 
954 	return line;
955 }
956 
957 char *
958 routename6(struct sockaddr_in6 *sa6)
959 {
960 	static char line[MAXHOSTNAMELEN];
961 	int flag = 0;
962 	/* use local variable for safety */
963 	struct sockaddr_in6 sa6_local;
964 
965 	sa6_local.sin6_family = AF_INET6;
966 	sa6_local.sin6_len = sizeof(sa6_local);
967 	sa6_local.sin6_addr = sa6->sin6_addr;
968 	sa6_local.sin6_scope_id = sa6->sin6_scope_id;
969 
970 	if (numeric_addr)
971 		flag |= NI_NUMERICHOST;
972 
973 	getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
974 		    line, sizeof(line), NULL, 0, flag);
975 
976 	return line;
977 }
978 #endif /*INET6*/
979 
980 /*
981  * Print routing statistics
982  */
983 void
984 rt_stats(u_long rtsaddr, u_long rttaddr)
985 {
986 	struct rtstat rtstat;
987 	int rttrash;
988 
989 	if (rtsaddr == 0) {
990 		printf("rtstat: symbol not in namelist\n");
991 		return;
992 	}
993 	if (rttaddr == 0) {
994 		printf("rttrash: symbol not in namelist\n");
995 		return;
996 	}
997 	kread(rtsaddr, (char *)&rtstat, sizeof (rtstat));
998 	kread(rttaddr, (char *)&rttrash, sizeof (rttrash));
999 	printf("routing:\n");
1000 
1001 #define	p(f, m) if (rtstat.f || sflag <= 1) \
1002 	printf(m, rtstat.f, plural(rtstat.f))
1003 
1004 	p(rts_badredirect, "\t%u bad routing redirect%s\n");
1005 	p(rts_dynamic, "\t%u dynamically created route%s\n");
1006 	p(rts_newgateway, "\t%u new gateway%s due to redirects\n");
1007 	p(rts_unreach, "\t%u destination%s found unreachable\n");
1008 	p(rts_wildcard, "\t%u use%s of a wildcard route\n");
1009 #undef p
1010 
1011 	if (rttrash || sflag <= 1)
1012 		printf("\t%u route%s not in table but not freed\n",
1013 		    rttrash, plural(rttrash));
1014 }
1015 
1016 char *
1017 ipx_print(struct sockaddr *sa)
1018 {
1019 	u_short port;
1020 	struct servent *sp = 0;
1021 	const char *net = "", *host = "";
1022 	char *p;
1023 	u_char *q;
1024 	struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr;
1025 	static char mybuf[50];
1026 	char cport[10], chost[15], cnet[15];
1027 
1028 	port = ntohs(work.x_port);
1029 
1030 	if (ipx_nullnet(work) && ipx_nullhost(work)) {
1031 
1032 		if (port) {
1033 			if (sp)
1034 				sprintf(mybuf, "*.%s", sp->s_name);
1035 			else
1036 				sprintf(mybuf, "*.%x", port);
1037 		} else
1038 			sprintf(mybuf, "*.*");
1039 
1040 		return (mybuf);
1041 	}
1042 
1043 	if (ipx_wildnet(work))
1044 		net = "any";
1045 	else if (ipx_nullnet(work))
1046 		net = "*";
1047 	else {
1048 		q = work.x_net.c_net;
1049 		sprintf(cnet, "%02x%02x%02x%02x",
1050 			q[0], q[1], q[2], q[3]);
1051 		for (p = cnet; *p == '0' && p < cnet + 8; p++)
1052 			continue;
1053 		net = p;
1054 	}
1055 
1056 	if (ipx_wildhost(work))
1057 		host = "any";
1058 	else if (ipx_nullhost(work))
1059 		host = "*";
1060 	else {
1061 		q = work.x_host.c_host;
1062 		sprintf(chost, "%02x%02x%02x%02x%02x%02x",
1063 			q[0], q[1], q[2], q[3], q[4], q[5]);
1064 		for (p = chost; *p == '0' && p < chost + 12; p++)
1065 			continue;
1066 		host = p;
1067 	}
1068 
1069 	if (port) {
1070 		if (strcmp(host, "*") == 0)
1071 			host = "";
1072 		if (sp)
1073 			snprintf(cport, sizeof(cport),
1074 				"%s%s", *host ? "." : "", sp->s_name);
1075 		else
1076 			snprintf(cport, sizeof(cport),
1077 				"%s%x", *host ? "." : "", port);
1078 	} else
1079 		*cport = 0;
1080 
1081 	snprintf(mybuf, sizeof(mybuf), "%s.%s%s", net, host, cport);
1082 	return(mybuf);
1083 }
1084 
1085 char *
1086 ipx_phost(struct sockaddr *sa)
1087 {
1088 	struct sockaddr_ipx *sipx = (struct sockaddr_ipx *)sa;
1089 	struct sockaddr_ipx work;
1090 	static union ipx_net ipx_zeronet;
1091 	char *p;
1092 	struct ipx_addr in;
1093 
1094 	work = *sipx;
1095 	in = work.sipx_addr;
1096 
1097 	work.sipx_addr.x_port = 0;
1098 	work.sipx_addr.x_net = ipx_zeronet;
1099 	p = ipx_print((struct sockaddr *)&work);
1100 	if (strncmp("*.", p, 2) == 0) p += 2;
1101 
1102 	return(p);
1103 }
1104 
1105 void
1106 upHex(char *p0)
1107 {
1108 	char *p = p0;
1109 
1110 	for (; *p; p++)
1111 		switch (*p) {
1112 
1113 		case 'a':
1114 		case 'b':
1115 		case 'c':
1116 		case 'd':
1117 		case 'e':
1118 		case 'f':
1119 			*p += ('A' - 'a');
1120 			break;
1121 		}
1122 }
1123