xref: /freebsd/usr.bin/netstat/route.c (revision f856af0466c076beef4ea9b15d088e1119a945b8)
1 /*
2  * Copyright (c) 1983, 1988, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 #if 0
35 #ifndef lint
36 static char sccsid[] = "From: @(#)route.c	8.6 (Berkeley) 4/28/95";
37 #endif /* not lint */
38 #endif
39 
40 #include <sys/cdefs.h>
41 __FBSDID("$FreeBSD$");
42 
43 #include <sys/param.h>
44 #include <sys/protosw.h>
45 #include <sys/socket.h>
46 #include <sys/time.h>
47 
48 #include <net/ethernet.h>
49 #include <net/if.h>
50 #include <net/if_var.h>
51 #include <net/if_dl.h>
52 #include <net/if_types.h>
53 #include <net/radix.h>
54 #include <net/route.h>
55 
56 #include <netinet/in.h>
57 #include <netipx/ipx.h>
58 #include <netatalk/at.h>
59 #include <netgraph/ng_socket.h>
60 
61 #include <sys/sysctl.h>
62 
63 #include <arpa/inet.h>
64 #include <libutil.h>
65 #include <netdb.h>
66 #include <stdint.h>
67 #include <stdio.h>
68 #include <stdlib.h>
69 #include <string.h>
70 #include <sysexits.h>
71 #include <unistd.h>
72 #include <err.h>
73 #include "netstat.h"
74 
75 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
76 
77 /*
78  * Definitions for showing gateway flags.
79  */
80 struct bits {
81 	u_long	b_mask;
82 	char	b_val;
83 } bits[] = {
84 	{ RTF_UP,	'U' },
85 	{ RTF_GATEWAY,	'G' },
86 	{ RTF_HOST,	'H' },
87 	{ RTF_REJECT,	'R' },
88 	{ RTF_DYNAMIC,	'D' },
89 	{ RTF_MODIFIED,	'M' },
90 	{ RTF_DONE,	'd' }, /* Completed -- for routing messages only */
91 	{ RTF_CLONING,	'C' },
92 	{ RTF_XRESOLVE,	'X' },
93 	{ RTF_LLINFO,	'L' },
94 	{ RTF_STATIC,	'S' },
95 	{ RTF_PROTO1,	'1' },
96 	{ RTF_PROTO2,	'2' },
97 	{ RTF_WASCLONED,'W' },
98 	{ RTF_PRCLONING,'c' },
99 	{ RTF_PROTO3,	'3' },
100 	{ RTF_BLACKHOLE,'B' },
101 	{ RTF_BROADCAST,'b' },
102 	{ 0 , 0 }
103 };
104 
105 typedef union {
106 	long	dummy;		/* Helps align structure. */
107 	struct	sockaddr u_sa;
108 	u_short	u_data[128];
109 } sa_u;
110 
111 static sa_u pt_u;
112 
113 int	do_rtent = 0;
114 struct	rtentry rtentry;
115 struct	radix_node rnode;
116 struct	radix_mask rmask;
117 struct	radix_node_head *rt_tables[AF_MAX+1];
118 
119 int	NewTree = 0;
120 
121 struct	timespec uptime;
122 
123 static struct sockaddr *kgetsa (struct sockaddr *);
124 static void size_cols (int ef, struct radix_node *rn);
125 static void size_cols_tree (struct radix_node *rn);
126 static void size_cols_rtentry (struct rtentry *rt);
127 static void p_tree (struct radix_node *);
128 static void p_rtnode (void);
129 static void ntreestuff (void);
130 static void np_rtentry (struct rt_msghdr *);
131 static void p_sockaddr (struct sockaddr *, struct sockaddr *, int, int);
132 static const char *fmt_sockaddr (struct sockaddr *sa, struct sockaddr *mask,
133 				 int flags);
134 static void p_flags (int, const char *);
135 static const char *fmt_flags(int f);
136 static void p_rtentry (struct rtentry *);
137 static u_long forgemask (u_long);
138 static void domask (char *, u_long, u_long);
139 
140 /*
141  * Print routing tables.
142  */
143 void
144 routepr(u_long rtree)
145 {
146 	struct radix_node_head *rnh, head;
147 	int i;
148 
149 	/*
150 	 * Since kernel & userland use different timebase
151 	 * (time_uptime vs time_second) and we are reading kernel memory
152 	 * directly we should do rt_rmx.rmx_expire --> expire_time conversion.
153 	 */
154 	if (clock_gettime(CLOCK_UPTIME, &uptime) < 0)
155 		err(EX_OSERR, "clock_gettime() failed");
156 
157 	printf("Routing tables\n");
158 
159 	if (Aflag == 0 && NewTree)
160 		ntreestuff();
161 	else {
162 		if (rtree == 0) {
163 			printf("rt_tables: symbol not in namelist\n");
164 			return;
165 		}
166 
167 		kget(rtree, rt_tables);
168 		for (i = 0; i <= AF_MAX; i++) {
169 			if ((rnh = rt_tables[i]) == 0)
170 				continue;
171 			kget(rnh, head);
172 			if (i == AF_UNSPEC) {
173 				if (Aflag && af == 0) {
174 					printf("Netmasks:\n");
175 					p_tree(head.rnh_treetop);
176 				}
177 			} else if (af == AF_UNSPEC || af == i) {
178 				size_cols(i, head.rnh_treetop);
179 				pr_family(i);
180 				do_rtent = 1;
181 				pr_rthdr(i);
182 				p_tree(head.rnh_treetop);
183 			}
184 		}
185 	}
186 }
187 
188 /*
189  * Print address family header before a section of the routing table.
190  */
191 void
192 pr_family(int af1)
193 {
194 	const char *afname;
195 
196 	switch (af1) {
197 	case AF_INET:
198 		afname = "Internet";
199 		break;
200 #ifdef INET6
201 	case AF_INET6:
202 		afname = "Internet6";
203 		break;
204 #endif /*INET6*/
205 	case AF_IPX:
206 		afname = "IPX";
207 		break;
208 	case AF_ISO:
209 		afname = "ISO";
210 		break;
211 	case AF_APPLETALK:
212 		afname = "AppleTalk";
213 		break;
214 	case AF_CCITT:
215 		afname = "X.25";
216 		break;
217 	case AF_NETGRAPH:
218 		afname = "Netgraph";
219 		break;
220 	default:
221 		afname = NULL;
222 		break;
223 	}
224 	if (afname)
225 		printf("\n%s:\n", afname);
226 	else
227 		printf("\nProtocol Family %d:\n", af1);
228 }
229 
230 /* column widths; each followed by one space */
231 #ifndef INET6
232 #define	WID_DST_DEFAULT(af) 	18	/* width of destination column */
233 #define	WID_GW_DEFAULT(af)	18	/* width of gateway column */
234 #define	WID_IF_DEFAULT(af)	(Wflag ? 8 : 6)	/* width of netif column */
235 #else
236 #define	WID_DST_DEFAULT(af) \
237 	((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18)
238 #define	WID_GW_DEFAULT(af) \
239 	((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18)
240 #define	WID_IF_DEFAULT(af)	((af) == AF_INET6 ? 8 : (Wflag ? 8 : 6))
241 #endif /*INET6*/
242 
243 static int wid_dst;
244 static int wid_gw;
245 static int wid_flags;
246 static int wid_refs;
247 static int wid_use;
248 static int wid_mtu;
249 static int wid_if;
250 static int wid_expire;
251 
252 static void
253 size_cols(int ef, struct radix_node *rn)
254 {
255 	wid_dst = WID_DST_DEFAULT(ef);
256 	wid_gw = WID_GW_DEFAULT(ef);
257 	wid_flags = 6;
258 	wid_refs = 6;
259 	wid_use = 8;
260 	wid_mtu = 6;
261 	wid_if = WID_IF_DEFAULT(ef);
262 	wid_expire = 6;
263 
264 	if (Wflag)
265 		size_cols_tree(rn);
266 }
267 
268 static void
269 size_cols_tree(struct radix_node *rn)
270 {
271 again:
272 	kget(rn, rnode);
273 	if (rnode.rn_bit < 0) {
274 		if ((rnode.rn_flags & RNF_ROOT) == 0) {
275 			kget(rn, rtentry);
276 			size_cols_rtentry(&rtentry);
277 		}
278 		if ((rn = rnode.rn_dupedkey))
279 			goto again;
280 	} else {
281 		rn = rnode.rn_right;
282 		size_cols_tree(rnode.rn_left);
283 		size_cols_tree(rn);
284 	}
285 }
286 
287 static void
288 size_cols_rtentry(struct rtentry *rt)
289 {
290 	static struct ifnet ifnet, *lastif;
291 	struct rtentry parent;
292 	static char buffer[100];
293 	const char *bp;
294 	struct sockaddr *sa;
295 	sa_u addr, mask;
296 	int len;
297 
298 	/*
299 	 * Don't print protocol-cloned routes unless -a.
300 	 */
301 	if (rt->rt_flags & RTF_WASCLONED && !aflag) {
302 		kget(rt->rt_parent, parent);
303 		if (parent.rt_flags & RTF_PRCLONING)
304 			return;
305 	}
306 
307 	bzero(&addr, sizeof(addr));
308 	if ((sa = kgetsa(rt_key(rt))))
309 		bcopy(sa, &addr, sa->sa_len);
310 	bzero(&mask, sizeof(mask));
311 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
312 		bcopy(sa, &mask, sa->sa_len);
313 	bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags);
314 	len = strlen(bp);
315 	wid_dst = MAX(len, wid_dst);
316 
317 	bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST);
318 	len = strlen(bp);
319 	wid_gw = MAX(len, wid_gw);
320 
321 	bp = fmt_flags(rt->rt_flags);
322 	len = strlen(bp);
323 	wid_flags = MAX(len, wid_flags);
324 
325 	if (addr.u_sa.sa_family == AF_INET || Wflag) {
326 		len = snprintf(buffer, sizeof(buffer), "%ld", rt->rt_refcnt);
327 		wid_refs = MAX(len, wid_refs);
328 		len = snprintf(buffer, sizeof(buffer), "%lu", rt->rt_use);
329 		wid_use = MAX(len, wid_use);
330 		if (Wflag && rt->rt_rmx.rmx_mtu != 0) {
331 			len = snprintf(buffer, sizeof(buffer),
332 				       "%lu", rt->rt_rmx.rmx_mtu);
333 			wid_mtu = MAX(len, wid_mtu);
334 		}
335 	}
336 	if (rt->rt_ifp) {
337 		if (rt->rt_ifp != lastif) {
338 			kget(rt->rt_ifp, ifnet);
339 			lastif = rt->rt_ifp;
340 			len = strlen(ifnet.if_xname);
341 			wid_if = MAX(len, wid_if);
342 		}
343 		if (rt->rt_rmx.rmx_expire) {
344 			time_t expire_time;
345 
346 			if ((expire_time =
347 			    rt->rt_rmx.rmx_expire - uptime.tv_sec) > 0) {
348 				len = snprintf(buffer, sizeof(buffer), "%d",
349 					       (int)expire_time);
350 				wid_expire = MAX(len, wid_expire);
351 			}
352 		}
353 	}
354 }
355 
356 
357 /*
358  * Print header for routing table columns.
359  */
360 void
361 pr_rthdr(int af1)
362 {
363 
364 	if (Aflag)
365 		printf("%-8.8s ","Address");
366 	if (af1 == AF_INET || Wflag) {
367 		if (Wflag) {
368 			printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*.*s %*s\n",
369 				wid_dst,	wid_dst,	"Destination",
370 				wid_gw,		wid_gw,		"Gateway",
371 				wid_flags,	wid_flags,	"Flags",
372 				wid_refs,	wid_refs,	"Refs",
373 				wid_use,	wid_use,	"Use",
374 				wid_mtu,	wid_mtu,	"Mtu",
375 				wid_if,		wid_if,		"Netif",
376 				wid_expire,			"Expire");
377 		} else {
378 			printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*s\n",
379 				wid_dst,	wid_dst,	"Destination",
380 				wid_gw,		wid_gw,		"Gateway",
381 				wid_flags,	wid_flags,	"Flags",
382 				wid_refs,	wid_refs,	"Refs",
383 				wid_use,	wid_use,	"Use",
384 				wid_if,		wid_if,		"Netif",
385 				wid_expire,			"Expire");
386 		}
387 	} else {
388 		printf("%-*.*s %-*.*s %-*.*s  %*.*s %*s\n",
389 			wid_dst,	wid_dst,	"Destination",
390 			wid_gw,		wid_gw,		"Gateway",
391 			wid_flags,	wid_flags,	"Flags",
392 			wid_if,		wid_if,		"Netif",
393 			wid_expire,			"Expire");
394 	}
395 }
396 
397 static struct sockaddr *
398 kgetsa(struct sockaddr *dst)
399 {
400 
401 	kget(dst, pt_u.u_sa);
402 	if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
403 		kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
404 	return (&pt_u.u_sa);
405 }
406 
407 static void
408 p_tree(struct radix_node *rn)
409 {
410 
411 again:
412 	kget(rn, rnode);
413 	if (rnode.rn_bit < 0) {
414 		if (Aflag)
415 			printf("%-8.8lx ", (u_long)rn);
416 		if (rnode.rn_flags & RNF_ROOT) {
417 			if (Aflag)
418 				printf("(root node)%s",
419 				    rnode.rn_dupedkey ? " =>\n" : "\n");
420 		} else if (do_rtent) {
421 			kget(rn, rtentry);
422 			p_rtentry(&rtentry);
423 			if (Aflag)
424 				p_rtnode();
425 		} else {
426 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
427 				   NULL, 0, 44);
428 			putchar('\n');
429 		}
430 		if ((rn = rnode.rn_dupedkey))
431 			goto again;
432 	} else {
433 		if (Aflag && do_rtent) {
434 			printf("%-8.8lx ", (u_long)rn);
435 			p_rtnode();
436 		}
437 		rn = rnode.rn_right;
438 		p_tree(rnode.rn_left);
439 		p_tree(rn);
440 	}
441 }
442 
443 char	nbuf[20];
444 
445 static void
446 p_rtnode(void)
447 {
448 	struct radix_mask *rm = rnode.rn_mklist;
449 
450 	if (rnode.rn_bit < 0) {
451 		if (rnode.rn_mask) {
452 			printf("\t  mask ");
453 			p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
454 				   NULL, 0, -1);
455 		} else if (rm == 0)
456 			return;
457 	} else {
458 		sprintf(nbuf, "(%d)", rnode.rn_bit);
459 		printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long)rnode.rn_left, (u_long)rnode.rn_right);
460 	}
461 	while (rm) {
462 		kget(rm, rmask);
463 		sprintf(nbuf, " %d refs, ", rmask.rm_refs);
464 		printf(" mk = %8.8lx {(%d),%s",
465 			(u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " ");
466 		if (rmask.rm_flags & RNF_NORMAL) {
467 			struct radix_node rnode_aux;
468 			printf(" <normal>, ");
469 			kget(rmask.rm_leaf, rnode_aux);
470 			p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
471 				    NULL, 0, -1);
472 		} else
473 		    p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
474 				NULL, 0, -1);
475 		putchar('}');
476 		if ((rm = rmask.rm_mklist))
477 			printf(" ->");
478 	}
479 	putchar('\n');
480 }
481 
482 static void
483 ntreestuff(void)
484 {
485 	size_t needed;
486 	int mib[6];
487 	char *buf, *next, *lim;
488 	struct rt_msghdr *rtm;
489 
490 	mib[0] = CTL_NET;
491 	mib[1] = PF_ROUTE;
492 	mib[2] = 0;
493 	mib[3] = 0;
494 	mib[4] = NET_RT_DUMP;
495 	mib[5] = 0;
496 	if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0) {
497 		err(1, "sysctl: net.route.0.0.dump estimate");
498 	}
499 
500 	if ((buf = malloc(needed)) == 0) {
501 		errx(2, "malloc(%lu)", (unsigned long)needed);
502 	}
503 	if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0) {
504 		err(1, "sysctl: net.route.0.0.dump");
505 	}
506 	lim  = buf + needed;
507 	for (next = buf; next < lim; next += rtm->rtm_msglen) {
508 		rtm = (struct rt_msghdr *)next;
509 		np_rtentry(rtm);
510 	}
511 }
512 
513 static void
514 np_rtentry(struct rt_msghdr *rtm)
515 {
516 	struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
517 #ifdef notdef
518 	static int masks_done, banner_printed;
519 #endif
520 	static int old_af;
521 	int af1 = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
522 
523 #ifdef notdef
524 	/* for the moment, netmasks are skipped over */
525 	if (!banner_printed) {
526 		printf("Netmasks:\n");
527 		banner_printed = 1;
528 	}
529 	if (masks_done == 0) {
530 		if (rtm->rtm_addrs != RTA_DST ) {
531 			masks_done = 1;
532 			af1 = sa->sa_family;
533 		}
534 	} else
535 #endif
536 		af1 = sa->sa_family;
537 	if (af1 != old_af) {
538 		pr_family(af1);
539 		old_af = af1;
540 	}
541 	if (rtm->rtm_addrs == RTA_DST)
542 		p_sockaddr(sa, NULL, 0, 36);
543 	else {
544 		p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
545 		sa = (struct sockaddr *)(SA_SIZE(sa) + (char *)sa);
546 		p_sockaddr(sa, NULL, 0, 18);
547 	}
548 	p_flags(rtm->rtm_flags & interesting, "%-6.6s ");
549 	putchar('\n');
550 }
551 
552 static void
553 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
554 {
555 	const char *cp;
556 
557 	cp = fmt_sockaddr(sa, mask, flags);
558 
559 	if (width < 0 )
560 		printf("%s ", cp);
561 	else {
562 		if (numeric_addr)
563 			printf("%-*s ", width, cp);
564 		else
565 			printf("%-*.*s ", width, width, cp);
566 	}
567 }
568 
569 static const char *
570 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags)
571 {
572 	static char workbuf[128];
573 	const char *cp;
574 
575 	switch(sa->sa_family) {
576 	case AF_INET:
577 	    {
578 		struct sockaddr_in *sockin = (struct sockaddr_in *)sa;
579 
580 		if ((sockin->sin_addr.s_addr == INADDR_ANY) &&
581 			mask &&
582 			ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr)
583 				==0L)
584 				cp = "default" ;
585 		else if (flags & RTF_HOST)
586 			cp = routename(sockin->sin_addr.s_addr);
587 		else if (mask)
588 			cp = netname(sockin->sin_addr.s_addr,
589 				     ntohl(((struct sockaddr_in *)mask)
590 					   ->sin_addr.s_addr));
591 		else
592 			cp = netname(sockin->sin_addr.s_addr, 0L);
593 		break;
594 	    }
595 
596 #ifdef INET6
597 	case AF_INET6:
598 	    {
599 		struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
600 		struct in6_addr *in6 = &sa6->sin6_addr;
601 
602 		/*
603 		 * XXX: This is a special workaround for KAME kernels.
604 		 * sin6_scope_id field of SA should be set in the future.
605 		 */
606 		if (IN6_IS_ADDR_LINKLOCAL(in6) ||
607 		    IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
608 		    /* XXX: override is ok? */
609 		    sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
610 		    *(u_short *)&in6->s6_addr[2] = 0;
611 		}
612 
613 		if (flags & RTF_HOST)
614 		    cp = routename6(sa6);
615 		else if (mask)
616 		    cp = netname6(sa6,
617 				  &((struct sockaddr_in6 *)mask)->sin6_addr);
618 		else {
619 		    cp = netname6(sa6, NULL);
620 		}
621 		break;
622 	    }
623 #endif /*INET6*/
624 
625 	case AF_IPX:
626 	    {
627 		struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr;
628 		if (ipx_nullnet(satoipx_addr(work)))
629 			cp = "default";
630 		else
631 			cp = ipx_print(sa);
632 		break;
633 	    }
634 	case AF_APPLETALK:
635 	    {
636 		if (!(flags & RTF_HOST) && mask)
637 			cp = atalk_print2(sa,mask,9);
638 		else
639 			cp = atalk_print(sa,11);
640 		break;
641 	    }
642 	case AF_NETGRAPH:
643 	    {
644 		strlcpy(workbuf, ((struct sockaddr_ng *)sa)->sg_data,
645 		        sizeof(workbuf));
646 		cp = workbuf;
647 		break;
648 	    }
649 
650 	case AF_LINK:
651 	    {
652 		struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
653 
654 		if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
655 		    sdl->sdl_slen == 0) {
656 			(void) sprintf(workbuf, "link#%d", sdl->sdl_index);
657 			cp = workbuf;
658 		} else
659 			switch (sdl->sdl_type) {
660 
661 			case IFT_ETHER:
662 			case IFT_L2VLAN:
663 				if (sdl->sdl_alen == ETHER_ADDR_LEN) {
664 					cp = ether_ntoa((struct ether_addr *)
665 					    (sdl->sdl_data + sdl->sdl_nlen));
666 					break;
667 				}
668 				/* FALLTHROUGH */
669 			default:
670 				cp = link_ntoa(sdl);
671 				break;
672 			}
673 		break;
674 	    }
675 
676 	default:
677 	    {
678 		u_char *s = (u_char *)sa->sa_data, *slim;
679 		char *cq, *cqlim;
680 
681 		cq = workbuf;
682 		slim =  sa->sa_len + (u_char *) sa;
683 		cqlim = cq + sizeof(workbuf) - 6;
684 		cq += sprintf(cq, "(%d)", sa->sa_family);
685 		while (s < slim && cq < cqlim) {
686 			cq += sprintf(cq, " %02x", *s++);
687 			if (s < slim)
688 			    cq += sprintf(cq, "%02x", *s++);
689 		}
690 		cp = workbuf;
691 	    }
692 	}
693 
694 	return (cp);
695 }
696 
697 static void
698 p_flags(int f, const char *format)
699 {
700 	printf(format, fmt_flags(f));
701 }
702 
703 static const char *
704 fmt_flags(int f)
705 {
706 	static char name[33];
707 	char *flags;
708 	struct bits *p = bits;
709 
710 	for (flags = name; p->b_mask; p++)
711 		if (p->b_mask & f)
712 			*flags++ = p->b_val;
713 	*flags = '\0';
714 	return (name);
715 }
716 
717 static void
718 p_rtentry(struct rtentry *rt)
719 {
720 	static struct ifnet ifnet, *lastif;
721 	struct rtentry parent;
722 	static char buffer[128];
723 	static char prettyname[128];
724 	struct sockaddr *sa;
725 	sa_u addr, mask;
726 
727 	/*
728 	 * Don't print protocol-cloned routes unless -a.
729 	 */
730 	if (rt->rt_flags & RTF_WASCLONED && !aflag) {
731 		kget(rt->rt_parent, parent);
732 		if (parent.rt_flags & RTF_PRCLONING)
733 			return;
734 	}
735 
736 	bzero(&addr, sizeof(addr));
737 	if ((sa = kgetsa(rt_key(rt))))
738 		bcopy(sa, &addr, sa->sa_len);
739 	bzero(&mask, sizeof(mask));
740 	if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
741 		bcopy(sa, &mask, sa->sa_len);
742 	p_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags, wid_dst);
743 	p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw);
744 	snprintf(buffer, sizeof(buffer), "%%-%d.%ds ", wid_flags, wid_flags);
745 	p_flags(rt->rt_flags, buffer);
746 	if (addr.u_sa.sa_family == AF_INET || Wflag) {
747 		printf("%*ld %*lu ", wid_refs, rt->rt_refcnt,
748 				     wid_use, rt->rt_use);
749 		if (Wflag) {
750 			if (rt->rt_rmx.rmx_mtu != 0)
751 				printf("%*lu ", wid_mtu, rt->rt_rmx.rmx_mtu);
752 			else
753 				printf("%*s ", wid_mtu, "");
754 		}
755 	}
756 	if (rt->rt_ifp) {
757 		if (rt->rt_ifp != lastif) {
758 			kget(rt->rt_ifp, ifnet);
759 			lastif = rt->rt_ifp;
760 			strlcpy(prettyname, ifnet.if_xname, sizeof(prettyname));
761 		}
762 		printf("%*.*s", wid_if, wid_if, prettyname);
763 		if (rt->rt_rmx.rmx_expire) {
764 			time_t expire_time;
765 
766 			if ((expire_time =
767 			    rt->rt_rmx.rmx_expire - uptime.tv_sec) > 0)
768 				printf(" %*d", wid_expire, (int)expire_time);
769 		}
770 		if (rt->rt_nodes[0].rn_dupedkey)
771 			printf(" =>");
772 	}
773 	putchar('\n');
774 }
775 
776 char *
777 routename(u_long in)
778 {
779 	char *cp;
780 	static char line[MAXHOSTNAMELEN];
781 	struct hostent *hp;
782 
783 	cp = 0;
784 	if (!numeric_addr) {
785 		hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
786 			AF_INET);
787 		if (hp) {
788 			cp = hp->h_name;
789 			trimdomain(cp, strlen(cp));
790 		}
791 	}
792 	if (cp) {
793 		strncpy(line, cp, sizeof(line) - 1);
794 		line[sizeof(line) - 1] = '\0';
795 	} else {
796 #define C(x)	((x) & 0xff)
797 		in = ntohl(in);
798 		sprintf(line, "%lu.%lu.%lu.%lu",
799 		    C(in >> 24), C(in >> 16), C(in >> 8), C(in));
800 	}
801 	return (line);
802 }
803 
804 static u_long
805 forgemask(u_long a)
806 {
807 	u_long m;
808 
809 	if (IN_CLASSA(a))
810 		m = IN_CLASSA_NET;
811 	else if (IN_CLASSB(a))
812 		m = IN_CLASSB_NET;
813 	else
814 		m = IN_CLASSC_NET;
815 	return (m);
816 }
817 
818 static void
819 domask(char *dst, u_long addr, u_long mask)
820 {
821 	int b, i;
822 
823 	if (!mask || (forgemask(addr) == mask)) {
824 		*dst = '\0';
825 		return;
826 	}
827 	i = 0;
828 	for (b = 0; b < 32; b++)
829 		if (mask & (1 << b)) {
830 			int bb;
831 
832 			i = b;
833 			for (bb = b+1; bb < 32; bb++)
834 				if (!(mask & (1 << bb))) {
835 					i = -1;	/* noncontig */
836 					break;
837 				}
838 			break;
839 		}
840 	if (i == -1)
841 		sprintf(dst, "&0x%lx", mask);
842 	else
843 		sprintf(dst, "/%d", 32-i);
844 }
845 
846 /*
847  * Return the name of the network whose address is given.
848  * The address is assumed to be that of a net or subnet, not a host.
849  */
850 char *
851 netname(u_long in, u_long mask)
852 {
853 	char *cp = 0;
854 	static char line[MAXHOSTNAMELEN];
855 	struct netent *np = 0;
856 	u_long dmask;
857 	u_long i;
858 
859 #define	NSHIFT(m) (							\
860 	(m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT :			\
861 	(m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT :			\
862 	(m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT :			\
863 	0)
864 
865 	i = ntohl(in);
866 	dmask = forgemask(i);
867 	if (!numeric_addr && i) {
868 		np = getnetbyaddr(i >> NSHIFT(mask), AF_INET);
869 		if (np == NULL && mask == 0)
870 			np = getnetbyaddr(i >> NSHIFT(dmask), AF_INET);
871 		if (np != NULL) {
872 			cp = np->n_name;
873 			trimdomain(cp, strlen(cp));
874 		}
875 	}
876 #undef NSHIFT
877 	if (cp != NULL) {
878 		strncpy(line, cp, sizeof(line) - 1);
879 		line[sizeof(line) - 1] = '\0';
880 	} else {
881 		switch (dmask) {
882 		case IN_CLASSA_NET:
883 			if ((i & IN_CLASSA_HOST) == 0) {
884 				sprintf(line, "%lu", C(i >> 24));
885 				break;
886 			}
887 			/* FALLTHROUGH */
888 		case IN_CLASSB_NET:
889 			if ((i & IN_CLASSB_HOST) == 0) {
890 				sprintf(line, "%lu.%lu",
891 					C(i >> 24), C(i >> 16));
892 				break;
893 			}
894 			/* FALLTHROUGH */
895 		case IN_CLASSC_NET:
896 			if ((i & IN_CLASSC_HOST) == 0) {
897 				sprintf(line, "%lu.%lu.%lu",
898 					C(i >> 24), C(i >> 16), C(i >> 8));
899 				break;
900 			}
901 			/* FALLTHROUGH */
902 		default:
903 			sprintf(line, "%lu.%lu.%lu.%lu",
904 				C(i >> 24), C(i >> 16), C(i >> 8), C(i));
905 			break;
906 		}
907 	}
908 	domask(line + strlen(line), i, mask);
909 	return (line);
910 }
911 
912 #ifdef INET6
913 const char *
914 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask)
915 {
916 	static char line[MAXHOSTNAMELEN];
917 	u_char *p = (u_char *)mask;
918 	u_char *lim;
919 	int masklen, illegal = 0, flag = 0;
920 
921 	if (mask) {
922 		for (masklen = 0, lim = p + 16; p < lim; p++) {
923 			switch (*p) {
924 			 case 0xff:
925 				 masklen += 8;
926 				 break;
927 			 case 0xfe:
928 				 masklen += 7;
929 				 break;
930 			 case 0xfc:
931 				 masklen += 6;
932 				 break;
933 			 case 0xf8:
934 				 masklen += 5;
935 				 break;
936 			 case 0xf0:
937 				 masklen += 4;
938 				 break;
939 			 case 0xe0:
940 				 masklen += 3;
941 				 break;
942 			 case 0xc0:
943 				 masklen += 2;
944 				 break;
945 			 case 0x80:
946 				 masklen += 1;
947 				 break;
948 			 case 0x00:
949 				 break;
950 			 default:
951 				 illegal ++;
952 				 break;
953 			}
954 		}
955 		if (illegal)
956 			fprintf(stderr, "illegal prefixlen\n");
957 	}
958 	else
959 		masklen = 128;
960 
961 	if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
962 		return("default");
963 
964 	if (numeric_addr)
965 		flag |= NI_NUMERICHOST;
966 	getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line),
967 		    NULL, 0, flag);
968 
969 	if (numeric_addr)
970 		sprintf(&line[strlen(line)], "/%d", masklen);
971 
972 	return line;
973 }
974 
975 char *
976 routename6(struct sockaddr_in6 *sa6)
977 {
978 	static char line[MAXHOSTNAMELEN];
979 	int flag = 0;
980 	/* use local variable for safety */
981 	struct sockaddr_in6 sa6_local;
982 
983 	sa6_local.sin6_family = AF_INET6;
984 	sa6_local.sin6_len = sizeof(sa6_local);
985 	sa6_local.sin6_addr = sa6->sin6_addr;
986 	sa6_local.sin6_scope_id = sa6->sin6_scope_id;
987 
988 	if (numeric_addr)
989 		flag |= NI_NUMERICHOST;
990 
991 	getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
992 		    line, sizeof(line), NULL, 0, flag);
993 
994 	return line;
995 }
996 #endif /*INET6*/
997 
998 /*
999  * Print routing statistics
1000  */
1001 void
1002 rt_stats(u_long rtsaddr, u_long rttaddr)
1003 {
1004 	struct rtstat rtstat;
1005 	int rttrash;
1006 
1007 	if (rtsaddr == 0) {
1008 		printf("rtstat: symbol not in namelist\n");
1009 		return;
1010 	}
1011 	if (rttaddr == 0) {
1012 		printf("rttrash: symbol not in namelist\n");
1013 		return;
1014 	}
1015 	kread(rtsaddr, (char *)&rtstat, sizeof (rtstat));
1016 	kread(rttaddr, (char *)&rttrash, sizeof (rttrash));
1017 	printf("routing:\n");
1018 
1019 #define	p(f, m) if (rtstat.f || sflag <= 1) \
1020 	printf(m, rtstat.f, plural(rtstat.f))
1021 
1022 	p(rts_badredirect, "\t%u bad routing redirect%s\n");
1023 	p(rts_dynamic, "\t%u dynamically created route%s\n");
1024 	p(rts_newgateway, "\t%u new gateway%s due to redirects\n");
1025 	p(rts_unreach, "\t%u destination%s found unreachable\n");
1026 	p(rts_wildcard, "\t%u use%s of a wildcard route\n");
1027 #undef p
1028 
1029 	if (rttrash || sflag <= 1)
1030 		printf("\t%u route%s not in table but not freed\n",
1031 		    rttrash, plural(rttrash));
1032 }
1033 
1034 char *
1035 ipx_print(struct sockaddr *sa)
1036 {
1037 	u_short port;
1038 	struct servent *sp = 0;
1039 	const char *net = "", *host = "";
1040 	char *p;
1041 	u_char *q;
1042 	struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr;
1043 	static char mybuf[50];
1044 	char cport[10], chost[15], cnet[15];
1045 
1046 	port = ntohs(work.x_port);
1047 
1048 	if (ipx_nullnet(work) && ipx_nullhost(work)) {
1049 
1050 		if (port) {
1051 			if (sp)
1052 				sprintf(mybuf, "*.%s", sp->s_name);
1053 			else
1054 				sprintf(mybuf, "*.%x", port);
1055 		} else
1056 			sprintf(mybuf, "*.*");
1057 
1058 		return (mybuf);
1059 	}
1060 
1061 	if (ipx_wildnet(work))
1062 		net = "any";
1063 	else if (ipx_nullnet(work))
1064 		net = "*";
1065 	else {
1066 		q = work.x_net.c_net;
1067 		sprintf(cnet, "%02x%02x%02x%02x",
1068 			q[0], q[1], q[2], q[3]);
1069 		for (p = cnet; *p == '0' && p < cnet + 8; p++)
1070 			continue;
1071 		net = p;
1072 	}
1073 
1074 	if (ipx_wildhost(work))
1075 		host = "any";
1076 	else if (ipx_nullhost(work))
1077 		host = "*";
1078 	else {
1079 		q = work.x_host.c_host;
1080 		sprintf(chost, "%02x%02x%02x%02x%02x%02x",
1081 			q[0], q[1], q[2], q[3], q[4], q[5]);
1082 		for (p = chost; *p == '0' && p < chost + 12; p++)
1083 			continue;
1084 		host = p;
1085 	}
1086 
1087 	if (port) {
1088 		if (strcmp(host, "*") == 0)
1089 			host = "";
1090 		if (sp)
1091 			snprintf(cport, sizeof(cport),
1092 				"%s%s", *host ? "." : "", sp->s_name);
1093 		else
1094 			snprintf(cport, sizeof(cport),
1095 				"%s%x", *host ? "." : "", port);
1096 	} else
1097 		*cport = 0;
1098 
1099 	snprintf(mybuf, sizeof(mybuf), "%s.%s%s", net, host, cport);
1100 	return(mybuf);
1101 }
1102 
1103 char *
1104 ipx_phost(struct sockaddr *sa)
1105 {
1106 	struct sockaddr_ipx *sipx = (struct sockaddr_ipx *)sa;
1107 	struct sockaddr_ipx work;
1108 	static union ipx_net ipx_zeronet;
1109 	char *p;
1110 	struct ipx_addr in;
1111 
1112 	work = *sipx;
1113 	in = work.sipx_addr;
1114 
1115 	work.sipx_addr.x_port = 0;
1116 	work.sipx_addr.x_net = ipx_zeronet;
1117 	p = ipx_print((struct sockaddr *)&work);
1118 	if (strncmp("*.", p, 2) == 0) p += 2;
1119 
1120 	return(p);
1121 }
1122 
1123 void
1124 upHex(char *p0)
1125 {
1126 	char *p = p0;
1127 
1128 	for (; *p; p++)
1129 		switch (*p) {
1130 
1131 		case 'a':
1132 		case 'b':
1133 		case 'c':
1134 		case 'd':
1135 		case 'e':
1136 		case 'f':
1137 			*p += ('A' - 'a');
1138 			break;
1139 		}
1140 }
1141