kern_recvmsg() may not return a valid(non-NULL) pointer to `sa'
[dragonfly.git] / usr.bin / netstat / route.c
blobfd87bcc5607ff438f4e8c5eeceb33ee1873fec0d
1 /*
2 * Copyright (c) 1983, 1988, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
33 * @(#)route.c 8.6 (Berkeley) 4/28/95
34 * $FreeBSD: src/usr.bin/netstat/route.c,v 1.41.2.14 2002/07/17 02:22:22 kbyanc Exp $
35 * $DragonFly: src/usr.bin/netstat/route.c,v 1.11 2006/01/19 22:19:25 dillon Exp $
38 #include <sys/param.h>
39 #include <sys/protosw.h>
40 #include <sys/socket.h>
41 #include <sys/time.h>
43 #include <net/ethernet.h>
44 #include <net/if.h>
45 #include <net/if_var.h>
46 #include <net/if_dl.h>
47 #include <net/if_types.h>
48 #include <net/route.h>
50 #include <netinet/in.h>
51 #include <netipx/ipx.h>
52 #include <netatalk/at.h>
53 #include <netgraph/socket/ng_socket.h>
55 #ifdef NS
56 #include <netns/ns.h>
57 #endif
59 #include <sys/sysctl.h>
61 #include <arpa/inet.h>
62 #include <libutil.h>
63 #include <netdb.h>
64 #include <stdio.h>
65 #include <stdlib.h>
66 #include <string.h>
67 #include <unistd.h>
68 #include <err.h>
69 #include <time.h>
70 #include <kinfo.h>
71 #include "netstat.h"
73 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
76 /* alignment constraint for routing socket */
77 #define ROUNDUP(a) \
78 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long))
79 #define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len))
82 * Definitions for showing gateway flags.
84 struct bits {
85 u_long b_mask;
86 char b_val;
87 } bits[] = {
88 { RTF_UP, 'U' },
89 { RTF_GATEWAY, 'G' },
90 { RTF_HOST, 'H' },
91 { RTF_REJECT, 'R' },
92 { RTF_DYNAMIC, 'D' },
93 { RTF_MODIFIED, 'M' },
94 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */
95 { RTF_CLONING, 'C' },
96 { RTF_XRESOLVE, 'X' },
97 { RTF_LLINFO, 'L' },
98 { RTF_STATIC, 'S' },
99 { RTF_PROTO1, '1' },
100 { RTF_PROTO2, '2' },
101 { RTF_WASCLONED,'W' },
102 { RTF_PRCLONING,'c' },
103 { RTF_PROTO3, '3' },
104 { RTF_BLACKHOLE,'B' },
105 { RTF_BROADCAST,'b' },
106 { 0 }
109 typedef union {
110 long dummy; /* Helps align structure. */
111 struct sockaddr u_sa;
112 u_short u_data[128];
113 } sa_u;
115 static sa_u pt_u;
117 int do_rtent = 0;
118 struct rtentry rtentry;
119 struct radix_node rnode;
120 struct radix_mask rmask;
121 struct radix_node_head *rt_tables[AF_MAX+1];
123 int NewTree = 0;
125 static struct sockaddr *kgetsa (struct sockaddr *);
126 static void size_cols (int ef, struct radix_node *rn);
127 static void size_cols_tree (struct radix_node *rn);
128 static void size_cols_rtentry (struct rtentry *rt);
129 static void p_tree (struct radix_node *);
130 static void p_rtnode (void);
131 static void ntreestuff (void);
132 static void np_rtentry (struct rt_msghdr *);
133 static void p_sockaddr (struct sockaddr *, struct sockaddr *, int, int);
134 static const char *fmt_sockaddr (struct sockaddr *sa, struct sockaddr *mask,
135 int flags);
136 static void p_flags (int, char *);
137 static const char *fmt_flags(int f);
138 static void p_rtentry (struct rtentry *);
139 static u_long forgemask (u_long);
140 static void domask (char *, u_long, u_long);
143 * Print routing tables.
145 void
146 routepr(u_long rtree)
148 struct radix_node_head *rnh, head;
149 int i;
151 printf("Routing tables\n");
153 if (Aflag == 0 && NewTree) {
154 ntreestuff();
155 } else {
156 if (rtree == 0) {
157 printf("rt_tables: symbol not in namelist\n");
158 return;
160 if (cpuflag >= 0) {
162 * Severe hack.
164 rtree += cpuflag * (AF_MAX + 1) * sizeof(void *);
166 kget(rtree, rt_tables);
167 for (i = 0; i <= AF_MAX; i++) {
168 if ((rnh = rt_tables[i]) == 0)
169 continue;
170 kget(rnh, head);
171 if (i == AF_UNSPEC) {
172 if (Aflag && af == 0) {
173 printf("Netmasks:\n");
174 p_tree(head.rnh_treetop);
176 } else if (af == AF_UNSPEC || af == i) {
177 size_cols(i, head.rnh_treetop);
178 pr_family(i);
179 do_rtent = 1;
180 pr_rthdr(i);
181 p_tree(head.rnh_treetop);
188 * Print address family header before a section of the routing table.
190 void
191 pr_family(int af)
193 char *afname;
195 switch (af) {
196 case AF_INET:
197 afname = "Internet";
198 break;
199 #ifdef INET6
200 case AF_INET6:
201 afname = "Internet6";
202 break;
203 #endif /*INET6*/
204 case AF_IPX:
205 afname = "IPX";
206 break;
207 #ifdef NS
208 case AF_NS:
209 afname = "XNS";
210 break;
211 #endif
212 case AF_ISO:
213 afname = "ISO";
214 break;
215 case AF_APPLETALK:
216 afname = "AppleTalk";
217 break;
218 case AF_CCITT:
219 afname = "X.25";
220 break;
221 case AF_NETGRAPH:
222 afname = "Netgraph";
223 break;
224 default:
225 afname = NULL;
226 break;
228 if (afname)
229 printf("\n%s:\n", afname);
230 else
231 printf("\nProtocol Family %d:\n", af);
234 /* column widths; each followed by one space */
235 #ifndef INET6
236 #define WID_DST_DEFAULT(af) 18 /* width of destination column */
237 #define WID_GW_DEFAULT(af) 18 /* width of gateway column */
238 #define WID_IF_DEFAULT(af) (Wflag ? 8 : 6) /* width of netif column */
239 #else
240 #define WID_DST_DEFAULT(af) \
241 ((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18)
242 #define WID_GW_DEFAULT(af) \
243 ((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18)
244 #define WID_IF_DEFAULT(af) ((af) == AF_INET6 ? 8 : (Wflag ? 8 :6))
245 #endif /*INET6*/
247 static int wid_dst;
248 static int wid_gw;
249 static int wid_flags;
250 static int wid_refs;
251 static int wid_use;
252 static int wid_mtu;
253 static int wid_if;
254 static int wid_expire;
256 static void
257 size_cols(int ef, struct radix_node *rn)
259 wid_dst = WID_DST_DEFAULT(ef);
260 wid_gw = WID_GW_DEFAULT(ef);
261 wid_flags = 6;
262 wid_refs = 6;
263 wid_use = 8;
264 wid_mtu = 6;
265 wid_if = WID_IF_DEFAULT(ef);
266 wid_expire = 6;
268 if (Wflag)
269 size_cols_tree(rn);
272 static void
273 size_cols_tree(struct radix_node *rn)
275 again:
276 kget(rn, rnode);
277 if (rnode.rn_bit < 0) {
278 if ((rnode.rn_flags & RNF_ROOT) == 0) {
279 kget(rn, rtentry);
280 size_cols_rtentry(&rtentry);
282 if ((rn = rnode.rn_dupedkey))
283 goto again;
284 } else {
285 rn = rnode.rn_right;
286 size_cols_tree(rnode.rn_left);
287 size_cols_tree(rn);
291 static void
292 size_cols_rtentry(struct rtentry *rt)
294 static struct ifnet ifnet, *lastif;
295 struct rtentry parent;
296 static char buffer[100];
297 const char *bp;
298 struct sockaddr *sa;
299 sa_u addr, mask;
300 int len;
303 * Don't print protocol-cloned routes unless -a.
305 if (rt->rt_flags & RTF_WASCLONED && !aflag) {
306 kget(rt->rt_parent, parent);
307 if (parent.rt_flags & RTF_PRCLONING)
308 return;
311 bzero(&addr, sizeof(addr));
312 if ((sa = kgetsa(rt_key(rt))))
313 bcopy(sa, &addr, sa->sa_len);
314 bzero(&mask, sizeof(mask));
315 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
316 bcopy(sa, &mask, sa->sa_len);
317 bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags);
318 len = strlen(bp);
319 wid_dst = MAX(len, wid_dst);
321 bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST);
322 len = strlen(bp);
323 wid_gw = MAX(len, wid_gw);
325 bp = fmt_flags(rt->rt_flags);
326 len = strlen(bp);
327 wid_flags = MAX(len, wid_flags);
329 if (addr.u_sa.sa_family == AF_INET || Wflag) {
330 len = snprintf(buffer, sizeof(buffer), "%ld", rt->rt_refcnt);
331 wid_refs = MAX(len, wid_refs);
332 len = snprintf(buffer, sizeof(buffer), "%lu", rt->rt_use);
333 wid_use = MAX(len, wid_use);
334 if (Wflag && rt->rt_rmx.rmx_mtu != 0) {
335 len = snprintf(buffer, sizeof(buffer),
336 "%lu", rt->rt_rmx.rmx_mtu);
337 wid_mtu = MAX(len, wid_mtu);
340 if (rt->rt_ifp) {
341 if (rt->rt_ifp != lastif) {
342 kget(rt->rt_ifp, ifnet);
343 lastif = rt->rt_ifp;
344 len = strlen(ifnet.if_xname);
345 wid_if = MAX(len, wid_if);
347 if (rt->rt_rmx.rmx_expire) {
348 time_t expire_time;
350 if ((expire_time =
351 rt->rt_rmx.rmx_expire - time(NULL)) > 0) {
352 snprintf(buffer, sizeof(buffer), "%d",
353 (int)expire_time);
354 wid_expire = MAX(len, wid_expire);
362 * Print header for routing table columns.
364 void
365 pr_rthdr(int af)
368 if (Aflag)
369 printf("%-8.8s ","Address");
370 if (af == AF_INET || Wflag) {
371 if (Wflag) {
372 printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*.*s %*s\n",
373 wid_dst, wid_dst, "Destination",
374 wid_gw, wid_gw, "Gateway",
375 wid_flags, wid_flags, "Flags",
376 wid_refs, wid_refs, "Refs",
377 wid_use, wid_use, "Use",
378 wid_mtu, wid_mtu, "Mtu",
379 wid_if, wid_if, "Netif",
380 wid_expire, "Expire");
381 } else {
382 printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*s\n",
383 wid_dst, wid_dst, "Destination",
384 wid_gw, wid_gw, "Gateway",
385 wid_flags, wid_flags, "Flags",
386 wid_refs, wid_refs, "Refs",
387 wid_use, wid_use, "Use",
388 wid_if, wid_if, "Netif",
389 wid_expire, "Expire");
391 } else {
392 printf("%-*.*s %-*.*s %-*.*s %*.*s %*s\n",
393 wid_dst, wid_dst, "Destination",
394 wid_gw, wid_gw, "Gateway",
395 wid_flags, wid_flags, "Flags",
396 wid_if, wid_if, "Netif",
397 wid_expire, "Expire");
401 static struct sockaddr *
402 kgetsa(struct sockaddr *dst)
405 kget(dst, pt_u.u_sa);
406 if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
407 kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
408 return (&pt_u.u_sa);
411 static void
412 p_tree(struct radix_node *rn)
415 again:
416 kget(rn, rnode);
417 if (rnode.rn_bit < 0) {
418 if (Aflag)
419 printf("%-8.8lx ", (u_long)rn);
420 if (rnode.rn_flags & RNF_ROOT) {
421 if (Aflag)
422 printf("(root node)%s",
423 rnode.rn_dupedkey ? " =>\n" : "\n");
424 } else if (do_rtent) {
425 kget(rn, rtentry);
426 p_rtentry(&rtentry);
427 if (Aflag)
428 p_rtnode();
429 } else {
430 p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_key),
431 NULL, 0, 44);
432 putchar('\n');
434 if ((rn = rnode.rn_dupedkey))
435 goto again;
436 } else {
437 if (Aflag && do_rtent) {
438 printf("%-8.8lx ", (u_long)rn);
439 p_rtnode();
441 rn = rnode.rn_right;
442 p_tree(rnode.rn_left);
443 p_tree(rn);
447 char nbuf[20];
449 static void
450 p_rtnode(void)
452 struct radix_mask *rm = rnode.rn_mklist;
454 if (rnode.rn_bit < 0) {
455 if (rnode.rn_mask) {
456 printf("\t mask ");
457 p_sockaddr(kgetsa((struct sockaddr *)rnode.rn_mask),
458 NULL, 0, -1);
459 } else if (rm == 0)
460 return;
461 } else {
462 sprintf(nbuf, "(%d)", rnode.rn_bit);
463 printf("%6.6s %8.8lx : %8.8lx", nbuf, (u_long)rnode.rn_left, (u_long)rnode.rn_right);
465 while (rm) {
466 kget(rm, rmask);
467 sprintf(nbuf, " %d refs, ", rmask.rm_refs);
468 printf(" mk = %8.8lx {(%d),%s",
469 (u_long)rm, -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " ");
470 if (rmask.rm_flags & RNF_NORMAL) {
471 struct radix_node rnode_aux;
472 printf(" <normal>, ");
473 kget(rmask.rm_leaf, rnode_aux);
474 p_sockaddr(kgetsa((struct sockaddr *)rnode_aux.rn_mask),
475 NULL, 0, -1);
476 } else
477 p_sockaddr(kgetsa((struct sockaddr *)rmask.rm_mask),
478 NULL, 0, -1);
479 putchar('}');
480 if ((rm = rmask.rm_next))
481 printf(" ->");
483 putchar('\n');
486 static void
487 ntreestuff(void)
489 size_t needed;
490 int mib[7];
491 int miblen;
492 char *buf, *next, *lim;
493 struct rt_msghdr *rtm;
495 mib[0] = CTL_NET;
496 mib[1] = PF_ROUTE;
497 mib[2] = 0;
498 mib[3] = 0;
499 mib[4] = NET_RT_DUMP;
500 mib[5] = 0;
501 if (cpuflag >= 0) {
502 mib[6] = cpuflag;
503 miblen = 7;
504 } else {
505 miblen = 6;
507 if (sysctl(mib, miblen, NULL, &needed, NULL, 0) < 0) {
508 err(1, "sysctl: net.route.0.0.dump estimate");
511 if ((buf = malloc(needed)) == 0) {
512 err(2, "malloc(%lu)", (unsigned long)needed);
514 if (sysctl(mib, miblen, buf, &needed, NULL, 0) < 0) {
515 err(1, "sysctl: net.route.0.0.dump");
517 lim = buf + needed;
518 for (next = buf; next < lim; next += rtm->rtm_msglen) {
519 rtm = (struct rt_msghdr *)next;
520 np_rtentry(rtm);
524 static void
525 np_rtentry(struct rt_msghdr *rtm)
527 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
528 #ifdef notdef
529 static int masks_done, banner_printed;
530 #endif
531 static int old_af;
532 int af = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
534 #ifdef notdef
535 /* for the moment, netmasks are skipped over */
536 if (!banner_printed) {
537 printf("Netmasks:\n");
538 banner_printed = 1;
540 if (masks_done == 0) {
541 if (rtm->rtm_addrs != RTA_DST ) {
542 masks_done = 1;
543 af = sa->sa_family;
545 } else
546 #endif
547 af = sa->sa_family;
548 if (af != old_af) {
549 pr_family(af);
550 old_af = af;
552 if (rtm->rtm_addrs == RTA_DST)
553 p_sockaddr(sa, NULL, 0, 36);
554 else {
555 p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
556 sa = (struct sockaddr *)(ROUNDUP(sa->sa_len) + (char *)sa);
557 p_sockaddr(sa, NULL, 0, 18);
559 p_flags(rtm->rtm_flags & interesting, "%-6.6s ");
560 putchar('\n');
563 static void
564 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
566 const char *cp;
568 cp = fmt_sockaddr(sa, mask, flags);
570 if (width < 0 )
571 printf("%s ", cp);
572 else {
573 if (numeric_addr)
574 printf("%-*s ", width, cp);
575 else
576 printf("%-*.*s ", width, width, cp);
580 static const char *
581 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags)
583 static char workbuf[128];
584 char *cplim;
585 char *cp = workbuf;
587 switch(sa->sa_family) {
588 case AF_INET:
590 struct sockaddr_in *sin = (struct sockaddr_in *)sa;
592 if ((sin->sin_addr.s_addr == INADDR_ANY) &&
593 mask &&
594 ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr)
595 ==0L)
596 cp = "default" ;
597 else if (flags & RTF_HOST)
598 cp = routename(sin->sin_addr.s_addr);
599 else if (mask)
600 cp = netname(sin->sin_addr.s_addr,
601 ntohl(((struct sockaddr_in *)mask)
602 ->sin_addr.s_addr));
603 else
604 cp = netname(sin->sin_addr.s_addr, 0L);
605 break;
608 #ifdef INET6
609 case AF_INET6:
611 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
612 struct in6_addr *in6 = &sa6->sin6_addr;
615 * XXX: This is a special workaround for KAME kernels.
616 * sin6_scope_id field of SA should be set in the future.
618 if (IN6_IS_ADDR_LINKLOCAL(in6) ||
619 IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
620 /* XXX: override is ok? */
621 sa6->sin6_scope_id = (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
622 *(u_short *)&in6->s6_addr[2] = 0;
625 if (flags & RTF_HOST)
626 cp = routename6(sa6);
627 else if (mask)
628 cp = netname6(sa6,
629 &((struct sockaddr_in6 *)mask)->sin6_addr);
630 else {
631 cp = netname6(sa6, NULL);
633 break;
635 #endif /*INET6*/
637 case AF_IPX:
639 struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr;
640 if (ipx_nullnet(satoipx_addr(work)))
641 cp = "default";
642 else
643 cp = ipx_print(sa);
644 break;
646 case AF_APPLETALK:
648 if (!(flags & RTF_HOST) && mask)
649 cp = atalk_print2(sa,mask,9);
650 else
651 cp = atalk_print(sa,11);
652 break;
654 case AF_NETGRAPH:
656 printf("%s", ((struct sockaddr_ng *)sa)->sg_data);
657 break;
659 #ifdef NS
660 case AF_NS:
661 cp = ns_print(sa);
662 break;
663 #endif
665 case AF_LINK:
667 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
669 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
670 sdl->sdl_slen == 0)
671 (void) sprintf(workbuf, "link#%d", sdl->sdl_index);
672 else
673 switch (sdl->sdl_type) {
675 case IFT_ETHER:
676 case IFT_L2VLAN:
677 if (sdl->sdl_alen == ETHER_ADDR_LEN) {
678 cp = ether_ntoa((struct ether_addr *)
679 (sdl->sdl_data + sdl->sdl_nlen));
680 break;
682 /* FALLTHROUGH */
683 default:
684 cp = link_ntoa(sdl);
685 break;
687 break;
690 default:
692 u_char *s = (u_char *)sa->sa_data, *slim;
694 slim = sa->sa_len + (u_char *) sa;
695 cplim = cp + sizeof(workbuf) - 6;
696 cp += sprintf(cp, "(%d)", sa->sa_family);
697 while (s < slim && cp < cplim) {
698 cp += sprintf(cp, " %02x", *s++);
699 if (s < slim)
700 cp += sprintf(cp, "%02x", *s++);
702 cp = workbuf;
706 return (cp);
709 static void
710 p_flags(int f, char *format)
712 printf(format, fmt_flags(f));
715 static const char *
716 fmt_flags(int f)
718 static char name[33];
719 char *flags;
720 struct bits *p = bits;
722 for (flags = name; p->b_mask; p++)
723 if (p->b_mask & f)
724 *flags++ = p->b_val;
725 *flags = '\0';
726 return (name);
729 static void
730 p_rtentry(struct rtentry *rt)
732 static struct ifnet ifnet, *lastif;
733 struct rtentry parent;
734 static char buffer[128];
735 static char prettyname[128];
736 struct sockaddr *sa;
737 sa_u addr, mask;
740 * Don't print protocol-cloned routes unless -a.
742 if (rt->rt_flags & RTF_WASCLONED && !aflag) {
743 kget(rt->rt_parent, parent);
744 if (parent.rt_flags & RTF_PRCLONING)
745 return;
748 bzero(&addr, sizeof(addr));
749 if ((sa = kgetsa(rt_key(rt))))
750 bcopy(sa, &addr, sa->sa_len);
751 bzero(&mask, sizeof(mask));
752 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
753 bcopy(sa, &mask, sa->sa_len);
754 p_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags, wid_dst);
755 p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw);
756 snprintf(buffer, sizeof(buffer), "%%-%d.%ds ", wid_flags, wid_flags);
757 p_flags(rt->rt_flags, buffer);
758 if (addr.u_sa.sa_family == AF_INET || Wflag) {
759 printf("%*ld %*lu ", wid_refs, rt->rt_refcnt,
760 wid_use, rt->rt_use);
761 if (Wflag) {
762 if (rt->rt_rmx.rmx_mtu != 0)
763 printf("%*lu ", wid_mtu, rt->rt_rmx.rmx_mtu);
764 else
765 printf("%*s ", wid_mtu, "");
768 if (rt->rt_ifp) {
769 if (rt->rt_ifp != lastif) {
770 kget(rt->rt_ifp, ifnet);
771 lastif = rt->rt_ifp;
772 strlcpy(prettyname, ifnet.if_xname, sizeof(prettyname));
774 printf("%*.*s", wid_if, wid_if, prettyname);
775 if (rt->rt_rmx.rmx_expire) {
776 time_t expire_time;
778 if ((expire_time =
779 rt->rt_rmx.rmx_expire - time((time_t *)0)) > 0)
780 printf(" %*d", wid_expire, (int)expire_time);
782 if (rt->rt_nodes[0].rn_dupedkey)
783 printf(" =>");
785 putchar('\n');
788 char *
789 routename(u_long in)
791 char *cp;
792 static char line[MAXHOSTNAMELEN];
793 struct hostent *hp;
795 cp = 0;
796 if (!numeric_addr) {
797 hp = gethostbyaddr((char *)&in, sizeof (struct in_addr),
798 AF_INET);
799 if (hp) {
800 cp = hp->h_name;
801 trimdomain(cp, strlen(cp));
804 if (cp) {
805 strncpy(line, cp, sizeof(line) - 1);
806 line[sizeof(line) - 1] = '\0';
807 } else {
808 #define C(x) ((x) & 0xff)
809 in = ntohl(in);
810 sprintf(line, "%lu.%lu.%lu.%lu",
811 C(in >> 24), C(in >> 16), C(in >> 8), C(in));
813 return (line);
816 static u_long
817 forgemask(u_long a)
819 u_long m;
821 if (IN_CLASSA(a))
822 m = IN_CLASSA_NET;
823 else if (IN_CLASSB(a))
824 m = IN_CLASSB_NET;
825 else
826 m = IN_CLASSC_NET;
827 return (m);
830 static void
831 domask(char *dst, u_long addr, u_long mask)
833 int b, i;
835 if (!mask || (forgemask(addr) == mask)) {
836 *dst = '\0';
837 return;
839 i = 0;
840 for (b = 0; b < 32; b++)
841 if (mask & (1 << b)) {
842 int bb;
844 i = b;
845 for (bb = b+1; bb < 32; bb++)
846 if (!(mask & (1 << bb))) {
847 i = -1; /* noncontig */
848 break;
850 break;
852 if (i == -1)
853 sprintf(dst, "&0x%lx", mask);
854 else
855 sprintf(dst, "/%d", 32-i);
859 * Return the name of the network whose address is given.
860 * The address is assumed to be that of a net or subnet, not a host.
862 char *
863 netname(u_long in, u_long mask)
865 char *cp = 0;
866 static char line[MAXHOSTNAMELEN];
867 struct netent *np = 0;
868 u_long dmask;
869 u_long i;
871 #define NSHIFT(m) ( \
872 (m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT : \
873 (m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT : \
874 (m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT : \
877 i = ntohl(in);
878 dmask = forgemask(i);
879 if (!numeric_addr && i) {
880 np = getnetbyaddr(i >> NSHIFT(mask), AF_INET);
881 if (np == NULL && mask == 0)
882 np = getnetbyaddr(i >> NSHIFT(dmask), AF_INET);
883 if (np != NULL) {
884 cp = np->n_name;
885 trimdomain(cp, strlen(cp));
888 #undef NSHIFT
889 if (cp != NULL) {
890 strncpy(line, cp, sizeof(line) - 1);
891 line[sizeof(line) - 1] = '\0';
892 } else {
893 switch (dmask) {
894 case IN_CLASSA_NET:
895 if ((i & IN_CLASSA_HOST) == 0) {
896 sprintf(line, "%lu", C(i >> 24));
897 break;
899 /* FALLTHROUGH */
900 case IN_CLASSB_NET:
901 if ((i & IN_CLASSB_HOST) == 0) {
902 sprintf(line, "%lu.%lu",
903 C(i >> 24), C(i >> 16));
904 break;
906 /* FALLTHROUGH */
907 case IN_CLASSC_NET:
908 if ((i & IN_CLASSC_HOST) == 0) {
909 sprintf(line, "%lu.%lu.%lu",
910 C(i >> 24), C(i >> 16), C(i >> 8));
911 break;
913 /* FALLTHROUGH */
914 default:
915 sprintf(line, "%lu.%lu.%lu.%lu",
916 C(i >> 24), C(i >> 16), C(i >> 8), C(i));
917 break;
920 domask(line + strlen(line), i, mask);
921 return (line);
924 #ifdef INET6
925 char *
926 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask)
928 static char line[MAXHOSTNAMELEN];
929 u_char *p = (u_char *)mask;
930 u_char *lim;
931 int masklen, illegal = 0, flag = NI_WITHSCOPEID;
933 if (mask) {
934 for (masklen = 0, lim = p + 16; p < lim; p++) {
935 switch (*p) {
936 case 0xff:
937 masklen += 8;
938 break;
939 case 0xfe:
940 masklen += 7;
941 break;
942 case 0xfc:
943 masklen += 6;
944 break;
945 case 0xf8:
946 masklen += 5;
947 break;
948 case 0xf0:
949 masklen += 4;
950 break;
951 case 0xe0:
952 masklen += 3;
953 break;
954 case 0xc0:
955 masklen += 2;
956 break;
957 case 0x80:
958 masklen += 1;
959 break;
960 case 0x00:
961 break;
962 default:
963 illegal ++;
964 break;
967 if (illegal)
968 fprintf(stderr, "illegal prefixlen\n");
970 else
971 masklen = 128;
973 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
974 return("default");
976 if (numeric_addr)
977 flag |= NI_NUMERICHOST;
978 getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line),
979 NULL, 0, flag);
981 if (numeric_addr)
982 sprintf(&line[strlen(line)], "/%d", masklen);
984 return line;
987 char *
988 routename6(struct sockaddr_in6 *sa6)
990 static char line[MAXHOSTNAMELEN];
991 int flag = NI_WITHSCOPEID;
992 /* use local variable for safety */
993 struct sockaddr_in6 sa6_local = {AF_INET6, sizeof(sa6_local),};
995 sa6_local.sin6_addr = sa6->sin6_addr;
996 sa6_local.sin6_scope_id = sa6->sin6_scope_id;
998 if (numeric_addr)
999 flag |= NI_NUMERICHOST;
1001 getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
1002 line, sizeof(line), NULL, 0, flag);
1004 return line;
1006 #endif /*INET6*/
1009 * Print routing statistics
1011 void
1012 rt_stats(void)
1014 struct rtstatistics rts;
1015 int error = 0;
1017 error = kinfo_get_net_rtstatistics(&rts);
1018 if (error) {
1019 printf("routing: could not retrieve statistics\n");
1020 return;
1022 printf("routing:\n");
1024 #define p(f, m) if (rts.f || sflag <= 1) \
1025 printf(m, rts.f, plural(rts.f))
1027 p(rts_badredirect, "\t%lu bad routing redirect%s\n");
1028 p(rts_dynamic, "\t%lu dynamically created route%s\n");
1029 p(rts_newgateway, "\t%lu new gateway%s due to redirects\n");
1030 p(rts_unreach, "\t%lu destination%s found unreachable\n");
1031 p(rts_wildcard, "\t%lu use%s of a wildcard route\n");
1032 #undef p
1035 char *
1036 ipx_print(struct sockaddr *sa)
1038 u_short port;
1039 struct servent *sp = 0;
1040 char *net = "", *host = "";
1041 char *p;
1042 u_char *q;
1043 struct ipx_addr work = ((struct sockaddr_ipx *)sa)->sipx_addr;
1044 static char mybuf[50];
1045 char cport[10], chost[15], cnet[15];
1047 port = ntohs(work.x_port);
1049 if (ipx_nullnet(work) && ipx_nullhost(work)) {
1051 if (port) {
1052 if (sp)
1053 sprintf(mybuf, "*.%s", sp->s_name);
1054 else
1055 sprintf(mybuf, "*.%x", port);
1056 } else
1057 sprintf(mybuf, "*.*");
1059 return (mybuf);
1062 if (ipx_wildnet(work))
1063 net = "any";
1064 else if (ipx_nullnet(work))
1065 net = "*";
1066 else {
1067 q = work.x_net.c_net;
1068 sprintf(cnet, "%02x%02x%02x%02x",
1069 q[0], q[1], q[2], q[3]);
1070 for (p = cnet; *p == '0' && p < cnet + 8; p++)
1071 continue;
1072 net = p;
1075 if (ipx_wildhost(work))
1076 host = "any";
1077 else if (ipx_nullhost(work))
1078 host = "*";
1079 else {
1080 q = work.x_host.c_host;
1081 sprintf(chost, "%02x%02x%02x%02x%02x%02x",
1082 q[0], q[1], q[2], q[3], q[4], q[5]);
1083 for (p = chost; *p == '0' && p < chost + 12; p++)
1084 continue;
1085 host = p;
1088 if (port) {
1089 if (strcmp(host, "*") == 0)
1090 host = "";
1091 if (sp)
1092 snprintf(cport, sizeof(cport),
1093 "%s%s", *host ? "." : "", sp->s_name);
1094 else
1095 snprintf(cport, sizeof(cport),
1096 "%s%x", *host ? "." : "", port);
1097 } else
1098 *cport = 0;
1100 snprintf(mybuf, sizeof(mybuf), "%s.%s%s", net, host, cport);
1101 return(mybuf);
1104 char *
1105 ipx_phost(struct sockaddr *sa)
1107 struct sockaddr_ipx *sipx = (struct sockaddr_ipx *)sa;
1108 struct sockaddr_ipx work;
1109 static union ipx_net ipx_zeronet;
1110 char *p;
1111 struct ipx_addr in;
1113 work = *sipx;
1114 in = work.sipx_addr;
1116 work.sipx_addr.x_port = 0;
1117 work.sipx_addr.x_net = ipx_zeronet;
1118 p = ipx_print((struct sockaddr *)&work);
1119 if (strncmp("*.", p, 2) == 0) p += 2;
1121 return(p);
1124 #ifdef NS
1125 short ns_nullh[] = {0,0,0};
1126 short ns_bh[] = {-1,-1,-1};
1128 char *
1129 ns_print(struct sockaddr *sa)
1131 struct sockaddr_ns *sns = (struct sockaddr_ns*)sa;
1132 struct ns_addr work;
1133 union { union ns_net net_e; u_long long_e; } net;
1134 u_short port;
1135 static char mybuf[50], cport[10], chost[25];
1136 char *host = "";
1137 char *p; u_char *q;
1139 work = sns->sns_addr;
1140 port = ntohs(work.x_port);
1141 work.x_port = 0;
1142 net.net_e = work.x_net;
1143 if (ns_nullhost(work) && net.long_e == 0) {
1144 if (port ) {
1145 sprintf(mybuf, "*.%xH", port);
1146 upHex(mybuf);
1147 } else
1148 sprintf(mybuf, "*.*");
1149 return (mybuf);
1152 if (bcmp(ns_bh, work.x_host.c_host, 6) == 0) {
1153 host = "any";
1154 } else if (bcmp(ns_nullh, work.x_host.c_host, 6) == 0) {
1155 host = "*";
1156 } else {
1157 q = work.x_host.c_host;
1158 sprintf(chost, "%02x%02x%02x%02x%02x%02xH",
1159 q[0], q[1], q[2], q[3], q[4], q[5]);
1160 for (p = chost; *p == '0' && p < chost + 12; p++)
1161 continue;
1162 host = p;
1164 if (port)
1165 sprintf(cport, ".%xH", htons(port));
1166 else
1167 *cport = 0;
1169 sprintf(mybuf,"%xH.%s%s", ntohl(net.long_e), host, cport);
1170 upHex(mybuf);
1171 return(mybuf);
1174 char *
1175 ns_phost(struct sockaddr *sa)
1177 struct sockaddr_ns *sns = (struct sockaddr_ns *)sa;
1178 struct sockaddr_ns work;
1179 static union ns_net ns_zeronet;
1180 char *p;
1182 work = *sns;
1183 work.sns_addr.x_port = 0;
1184 work.sns_addr.x_net = ns_zeronet;
1186 p = ns_print((struct sockaddr *)&work);
1187 if (strncmp("0H.", p, 3) == 0)
1188 p += 3;
1189 return(p);
1191 #endif
1193 void
1194 upHex(char *p0)
1196 char *p = p0;
1198 for (; *p; p++)
1199 switch (*p) {
1201 case 'a':
1202 case 'b':
1203 case 'c':
1204 case 'd':
1205 case 'e':
1206 case 'f':
1207 *p += ('A' - 'a');
1208 break;