2 * Copyright (c) 1983, 1988, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. Neither the name of the University nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * @(#)route.c 8.6 (Berkeley) 4/28/95
30 * $FreeBSD: src/usr.bin/netstat/route.c,v 1.41.2.14 2002/07/17 02:22:22 kbyanc Exp $
33 #define _KERNEL_STRUCTURES
34 #include <sys/kinfo.h>
35 #include <sys/param.h>
36 #include <sys/socket.h>
37 #include <sys/sysctl.h>
40 #include <net/ethernet.h>
42 #include <net/if_var.h> /* for struct ifnet */
43 #include <net/if_dl.h>
44 #include <net/if_types.h>
45 #include <net/route.h>
47 #include <netinet/in.h>
48 #include <netgraph/socket/ng_socket.h>
50 #include <netproto/mpls/mpls.h>
52 #include <arpa/inet.h>
65 #define kget(p, d) (kread((u_long)(p), (char *)&(d), sizeof (d)))
66 #define constSA(x) ((const struct sockaddr *)(x))
69 * Definitions for showing gateway flags.
80 { RTF_MODIFIED, 'M' },
81 { RTF_DONE, 'd' }, /* Completed -- for routing messages only */
83 { RTF_XRESOLVE, 'X' },
88 { RTF_WASCLONED,'W' },
89 { RTF_PRCLONING,'c' },
91 { RTF_BLACKHOLE,'B' },
92 { RTF_BROADCAST,'b' },
98 long dummy; /* Helps align structure. */
104 static int NewTree = 0;
105 static struct radix_node_head *rt_tables[AF_MAX+1];
107 static struct sockaddr *kgetsa (const struct sockaddr *);
108 static void size_cols (int ef, struct radix_node *rn);
109 static void size_cols_tree (struct radix_node *rn);
110 static void size_cols_rtentry (struct rtentry *rt);
111 static void p_tree (struct radix_node *, int);
112 static void p_rtnode (struct radix_node *);
113 static void ntreestuff (void);
114 static void np_rtentry (struct rt_msghdr *);
115 static void p_sockaddr (struct sockaddr *, struct sockaddr *, int, int);
116 static const char *fmt_sockaddr (struct sockaddr *sa, struct sockaddr *mask,
118 static void p_flags (int, const char *);
119 static const char *fmt_flags(int f);
120 static void p_rtentry (struct rtentry *);
121 static u_long forgemask (u_long);
122 static void domask (char *, u_long, u_long);
123 static const char *labelops(struct rtentry *);
126 * Print routing tables.
129 routepr(u_long rtree)
131 struct radix_node_head *rnh, head;
134 printf("Routing tables\n");
136 if (Aflag == 0 && NewTree) {
140 printf("rt_tables: symbol not in namelist\n");
147 rtree += cpuflag * (AF_MAX + 1) * sizeof(void *);
149 if (kget(rtree, rt_tables) != 0)
151 for (i = 0; i <= AF_MAX; i++) {
152 if ((rnh = rt_tables[i]) == NULL)
154 if (kget(rnh, head) != 0)
156 if (i == AF_UNSPEC) {
157 if (Aflag && af == 0) {
158 printf("Netmasks:\n");
159 p_tree(head.rnh_treetop, 0);
161 } else if (af == AF_UNSPEC || af == i) {
162 size_cols(i, head.rnh_treetop);
165 p_tree(head.rnh_treetop, 1);
172 * Print address family header before a section of the routing table.
185 afname = "Internet6";
202 printf("\n%s:\n", afname);
204 printf("\nProtocol Family %d:\n", af1);
207 /* column widths; each followed by one space */
209 #define WID_DST_DEFAULT(af) 18 /* width of destination column */
210 #define WID_GW_DEFAULT(af) 18 /* width of gateway column */
211 #define WID_IF_DEFAULT(af) (Wflag ? 8 : 6) /* width of netif column */
213 #define WID_DST_DEFAULT(af) \
214 ((af) == AF_INET6 ? (numeric_addr ? 33: 18) : 18)
215 #define WID_GW_DEFAULT(af) \
216 ((af) == AF_INET6 ? (numeric_addr ? 29 : 18) : 18)
217 #define WID_IF_DEFAULT(af) ((af) == AF_INET6 ? 8 : (Wflag ? 8 :6))
222 static int wid_flags;
227 static int wid_expire;
228 static int wid_mplslops;
230 static int wid_iwmax;
234 size_cols(int ef, struct radix_node *rn)
236 wid_dst = WID_DST_DEFAULT(ef);
237 wid_gw = WID_GW_DEFAULT(ef);
242 wid_if = WID_IF_DEFAULT(ef);
254 size_cols_tree(struct radix_node *rn)
256 struct radix_node rnode;
257 struct rtentry rtentry;
260 if (kget(rn, rnode) != 0)
262 if (!(rnode.rn_flags & RNF_ACTIVE))
264 if (rnode.rn_bit < 0) {
265 if ((rnode.rn_flags & RNF_ROOT) == 0) {
266 if (kget(rn, rtentry) != 0)
268 size_cols_rtentry(&rtentry);
270 if ((rn = rnode.rn_dupedkey) != NULL)
274 size_cols_tree(rnode.rn_left);
280 size_cols_rtentry(struct rtentry *rt)
282 static struct ifnet ifnet, *lastif;
283 struct rtentry parent;
284 static char buffer[100];
291 * Don't print protocol-cloned routes unless -a.
293 if (rt->rt_flags & RTF_WASCLONED && !aflag) {
294 if (kget(rt->rt_parent, parent) != 0)
296 if (parent.rt_flags & RTF_PRCLONING)
300 bzero(&addr, sizeof(addr));
301 if ((sa = kgetsa(rt_key(rt))))
302 bcopy(sa, &addr, sa->sa_len);
303 bzero(&mask, sizeof(mask));
304 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
305 bcopy(sa, &mask, sa->sa_len);
306 bp = fmt_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags);
308 wid_dst = MAX(len, wid_dst);
310 bp = fmt_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST);
312 wid_gw = MAX(len, wid_gw);
314 bp = fmt_flags(rt->rt_flags);
316 wid_flags = MAX(len, wid_flags);
318 if (addr.u_sa.sa_family == AF_INET || Wflag) {
319 len = snprintf(buffer, sizeof(buffer), "%ld", rt->rt_refcnt);
320 wid_refs = MAX(len, wid_refs);
321 len = snprintf(buffer, sizeof(buffer), "%lu", rt->rt_use);
322 wid_use = MAX(len, wid_use);
323 if (Wflag && rt->rt_rmx.rmx_mtu != 0) {
324 len = snprintf(buffer, sizeof(buffer),
325 "%lu", rt->rt_rmx.rmx_mtu);
326 wid_mtu = MAX(len, wid_mtu);
330 if (rt->rt_ifp != lastif) {
331 if (kget(rt->rt_ifp, ifnet) == 0)
332 len = strlen(ifnet.if_xname);
336 wid_if = MAX(len, wid_if);
338 if (rt->rt_rmx.rmx_expire) {
342 clock_gettime(CLOCK_MONOTONIC, &sp);
343 expire_time = (int)(rt->rt_rmx.rmx_expire - sp.tv_sec);
344 if (expire_time > 0) {
345 snprintf(buffer, sizeof(buffer), "%d",
347 wid_expire = MAX(len, wid_expire);
352 if (rt->rt_shim[0] != NULL) {
353 len = strlen(labelops(rt));
354 wid_mplslops = MAX(len, wid_mplslops);
357 if (rt->rt_rmx.rmx_msl) {
358 len = snprintf(buffer, sizeof(buffer),
359 "%lu", rt->rt_rmx.rmx_msl);
360 wid_msl = MAX(len, wid_msl);
362 if (rt->rt_rmx.rmx_iwmaxsegs) {
363 len = snprintf(buffer, sizeof(buffer),
364 "%lu", rt->rt_rmx.rmx_iwmaxsegs);
365 wid_iwmax = MAX(len, wid_iwmax);
367 if (rt->rt_rmx.rmx_iwcapsegs) {
368 len = snprintf(buffer, sizeof(buffer),
369 "%lu", rt->rt_rmx.rmx_iwcapsegs);
370 wid_iw = MAX(len, wid_iw);
377 * Print header for routing table columns.
384 printf("%-8.8s ","Address");
385 if (af1 == AF_INET || Wflag) {
387 printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*.*s "
388 "%*s %-*s%*s %*s %*s\n",
389 wid_dst, wid_dst, "Destination",
390 wid_gw, wid_gw, "Gateway",
391 wid_flags, wid_flags, "Flags",
392 wid_refs, wid_refs, "Refs",
393 wid_use, wid_use, "Use",
394 wid_mtu, wid_mtu, "Mtu",
395 wid_if, wid_if, "Netif",
396 wid_expire, "Expire",
397 wid_mplslops, "Labelops",
402 printf("%-*.*s %-*.*s %-*.*s %*.*s %*.*s %*.*s %*s\n",
403 wid_dst, wid_dst, "Destination",
404 wid_gw, wid_gw, "Gateway",
405 wid_flags, wid_flags, "Flags",
406 wid_refs, wid_refs, "Refs",
407 wid_use, wid_use, "Use",
408 wid_if, wid_if, "Netif",
409 wid_expire, "Expire");
412 printf("%-*.*s %-*.*s %-*.*s %*.*s %*s\n",
413 wid_dst, wid_dst, "Destination",
414 wid_gw, wid_gw, "Gateway",
415 wid_flags, wid_flags, "Flags",
416 wid_if, wid_if, "Netif",
417 wid_expire, "Expire");
421 static struct sockaddr *
422 kgetsa(const struct sockaddr *dst)
425 if (kget(dst, pt_u.u_sa) != 0)
427 if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa))
428 kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len);
433 p_tree(struct radix_node *rn, int is_rtentry)
435 struct radix_node rnode;
436 struct rtentry rtentry;
439 if (kget(rn, rnode) != 0)
441 if (!(rnode.rn_flags & RNF_ACTIVE))
443 if (rnode.rn_bit < 0) {
445 printf("%-8.8lx ", (u_long)rn);
446 if (rnode.rn_flags & RNF_ROOT) {
448 printf("(root node)%s",
449 rnode.rn_dupedkey ? " =>\n" : "\n");
450 } else if (is_rtentry) {
451 if (kget(rn, rtentry) == 0) {
457 p_sockaddr(kgetsa(constSA(rnode.rn_key)), NULL, 0, 44);
460 if ((rn = rnode.rn_dupedkey) != NULL)
463 if (Aflag && is_rtentry) {
464 printf("%-8.8lx ", (u_long)rn);
468 p_tree(rnode.rn_left, is_rtentry);
469 p_tree(rn, is_rtentry);
474 p_rtnode(struct radix_node *rnode)
476 struct radix_node rnode_aux;
477 struct radix_mask rmask, *rm = rnode->rn_mklist;
480 if (rnode->rn_bit < 0) {
481 if (rnode->rn_mask) {
483 p_sockaddr(kgetsa(constSA(rnode->rn_mask)),
485 } else if (rm == NULL)
488 sprintf(nbuf, "(%d)", rnode->rn_bit);
489 printf("%6.6s %8.8lx : %8.8lx", nbuf,
490 (u_long)rnode->rn_left, (u_long)rnode->rn_right);
493 if (kget(rm, rmask) != 0)
495 sprintf(nbuf, " %d refs, ", rmask.rm_refs);
496 printf(" mk = %8.8lx {(%d),%s", (u_long)rm,
497 -1 - rmask.rm_bit, rmask.rm_refs ? nbuf : " ");
498 if (rmask.rm_flags & RNF_NORMAL) {
499 printf(" <normal>, ");
500 if (kget(rmask.rm_leaf, rnode_aux) == 0)
501 p_sockaddr(kgetsa(constSA(rnode_aux.rn_mask)),
504 p_sockaddr(NULL, NULL, 0, -1);
506 p_sockaddr(kgetsa(constSA(rmask.rm_mask)),
510 if ((rm = rmask.rm_next) != NULL)
522 char *buf, *next, *lim;
523 struct rt_msghdr *rtm;
529 mib[4] = NET_RT_DUMP;
537 if (sysctl(mib, miblen, NULL, &needed, NULL, 0) < 0) {
538 err(1, "sysctl: net.route.0.0.dump estimate");
541 if ((buf = malloc(needed)) == NULL) {
542 err(2, "malloc(%lu)", (unsigned long)needed);
544 if (sysctl(mib, miblen, buf, &needed, NULL, 0) < 0) {
545 err(1, "sysctl: net.route.0.0.dump");
548 for (next = buf; next < lim; next += rtm->rtm_msglen) {
549 rtm = (struct rt_msghdr *)next;
555 np_rtentry(struct rt_msghdr *rtm)
557 struct sockaddr *sa = (struct sockaddr *)(rtm + 1);
559 static int masks_done, banner_printed;
562 int af1 = 0, interesting = RTF_UP | RTF_GATEWAY | RTF_HOST;
565 /* for the moment, netmasks are skipped over */
566 if (!banner_printed) {
567 printf("Netmasks:\n");
570 if (masks_done == 0) {
571 if (rtm->rtm_addrs != RTA_DST ) {
582 if (rtm->rtm_addrs == RTA_DST)
583 p_sockaddr(sa, NULL, 0, 36);
585 p_sockaddr(sa, NULL, rtm->rtm_flags, 16);
586 sa = (struct sockaddr *)(RT_ROUNDUP(sa->sa_len) + (char *)sa);
587 p_sockaddr(sa, NULL, 0, 18);
589 p_flags(rtm->rtm_flags & interesting, "%-6.6s ");
594 p_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags, int width)
598 cp = fmt_sockaddr(sa, mask, flags);
604 printf("%-*s ", width, cp);
606 printf("%-*.*s ", width, width, cp);
611 fmt_sockaddr(struct sockaddr *sa, struct sockaddr *mask, int flags)
613 static char workbuf[128];
614 const char *cp = workbuf;
619 switch(sa->sa_family) {
622 struct sockaddr_in *sin = (struct sockaddr_in *)sa;
624 if ((sin->sin_addr.s_addr == INADDR_ANY) && mask &&
625 ntohl(((struct sockaddr_in *)mask)->sin_addr.s_addr) ==0L)
627 else if (flags & RTF_HOST)
628 cp = routename(sin->sin_addr.s_addr);
630 cp = netname(sin->sin_addr.s_addr,
631 ntohl(((struct sockaddr_in *)mask)
634 cp = netname(sin->sin_addr.s_addr, 0L);
641 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
642 struct in6_addr *in6 = &sa6->sin6_addr;
645 * XXX: This is a special workaround for KAME kernels.
646 * sin6_scope_id field of SA should be set in the future.
648 if (IN6_IS_ADDR_LINKLOCAL(in6) ||
649 IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
650 /* XXX: override is ok? */
652 (u_int32_t)ntohs(*(u_short *)&in6->s6_addr[2]);
653 *(u_short *)&in6->s6_addr[2] = 0;
656 if (flags & RTF_HOST)
657 cp = routename6(sa6);
660 &((struct sockaddr_in6 *)mask)->sin6_addr);
662 cp = netname6(sa6, NULL);
669 printf("%s", ((struct sockaddr_ng *)sa)->sg_data);
674 struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa;
676 if (sdl->sdl_nlen == 0 && sdl->sdl_alen == 0 &&
678 sprintf(workbuf, "link#%d", sdl->sdl_index);
680 switch (sdl->sdl_type) {
685 if (sdl->sdl_alen == ETHER_ADDR_LEN) {
686 cp = ether_ntoa((struct ether_addr *)
687 (sdl->sdl_data + sdl->sdl_nlen));
700 struct sockaddr_mpls *smpls = (struct sockaddr_mpls *)sa;
702 (void) sprintf(workbuf, "%d", ntohl(smpls->smpls_label));
708 u_char *s = (u_char *)sa->sa_data, *slim;
712 slim = sa->sa_len + (u_char *) sa;
713 cqlim = cq + sizeof(workbuf) - 6;
714 cq += sprintf(cq, "(%d)", sa->sa_family);
715 while (s < slim && cq < cqlim) {
716 cq += sprintf(cq, " %02x", *s++);
718 cq += sprintf(cq, "%02x", *s++);
728 p_flags(int f, const char *format)
730 printf(format, fmt_flags(f));
736 static char name[33];
738 struct bits *p = bits;
740 for (flags = name; p->b_mask; p++)
748 p_rtentry(struct rtentry *rt)
750 static struct ifnet ifnet, *lastif;
751 struct rtentry parent;
752 static char buffer[128];
753 static char prettyname[128];
758 * Don't print protocol-cloned routes unless -a or -A.
760 if (rt->rt_flags & RTF_WASCLONED && !(aflag || Aflag)) {
761 if (kget(rt->rt_parent, parent) != 0)
763 if (parent.rt_flags & RTF_PRCLONING)
767 bzero(&addr, sizeof(addr));
768 if ((sa = kgetsa(rt_key(rt))))
769 bcopy(sa, &addr, sa->sa_len);
770 bzero(&mask, sizeof(mask));
771 if (rt_mask(rt) && (sa = kgetsa(rt_mask(rt))))
772 bcopy(sa, &mask, sa->sa_len);
773 p_sockaddr(&addr.u_sa, &mask.u_sa, rt->rt_flags, wid_dst);
774 p_sockaddr(kgetsa(rt->rt_gateway), NULL, RTF_HOST, wid_gw);
775 snprintf(buffer, sizeof(buffer), "%%-%d.%ds ", wid_flags, wid_flags);
776 p_flags(rt->rt_flags, buffer);
777 if (addr.u_sa.sa_family == AF_INET || Wflag) {
778 printf("%*ld %*lu ", wid_refs, rt->rt_refcnt,
779 wid_use, rt->rt_use);
781 if (rt->rt_rmx.rmx_mtu != 0)
782 printf("%*lu ", wid_mtu, rt->rt_rmx.rmx_mtu);
784 printf("%*s ", wid_mtu, "");
788 if (rt->rt_ifp != lastif) {
789 if (kget(rt->rt_ifp, ifnet) == 0)
790 strlcpy(prettyname, ifnet.if_xname,
793 strlcpy(prettyname, "---", sizeof(prettyname));
796 printf("%*.*s", wid_if, wid_if, prettyname);
797 if (rt->rt_rmx.rmx_expire) {
801 clock_gettime(CLOCK_MONOTONIC, &sp);
803 expire_time = (int)(rt->rt_rmx.rmx_expire - sp.tv_sec);
805 printf(" %*d", wid_expire, (int)expire_time);
807 printf("%*s ", wid_expire, "");
809 printf("%*s ", wid_expire, "");
811 if (rt->rt_nodes[0].rn_dupedkey)
815 if (rt->rt_shim[0] != NULL)
816 printf(" %-*s", wid_mplslops, labelops(rt));
818 printf(" %-*s", wid_mplslops, "");
819 if (rt->rt_rmx.rmx_msl != 0)
820 printf(" %*lu", wid_msl, rt->rt_rmx.rmx_msl);
822 printf("%*s ", wid_msl, "");
823 if (rt->rt_rmx.rmx_iwmaxsegs != 0)
824 printf(" %*lu", wid_iwmax, rt->rt_rmx.rmx_iwmaxsegs);
826 printf("%*s ", wid_iwmax, "");
827 if (rt->rt_rmx.rmx_iwcapsegs != 0)
828 printf(" %*lu", wid_iw, rt->rt_rmx.rmx_iwcapsegs);
830 printf("%*s ", wid_iw, "");
839 static char line[MAXHOSTNAMELEN];
844 hp = gethostbyaddr(&in, sizeof (struct in_addr), AF_INET);
847 trimdomain(cp, strlen(cp));
851 strncpy(line, cp, sizeof(line) - 1);
852 line[sizeof(line) - 1] = '\0';
854 #define C(x) ((x) & 0xff)
856 sprintf(line, "%lu.%lu.%lu.%lu",
857 C(in >> 24), C(in >> 16), C(in >> 8), C(in));
869 else if (IN_CLASSB(a))
877 domask(char *dst, u_long addr, u_long mask)
881 if (!mask || (forgemask(addr) == mask)) {
886 for (b = 0; b < 32; b++)
887 if (mask & (1 << b)) {
889 for (bb = b+1; bb < 32; bb++)
890 if (!(mask & (1 << bb))) {
891 i = -1; /* noncontig */
897 sprintf(dst, "&0x%lx", mask);
899 sprintf(dst, "/%d", 32-i);
903 * Return the name of the network whose address is given.
904 * The address is assumed to be that of a net or subnet, not a host.
907 netname(u_long in, u_long mask)
910 static char line[MAXHOSTNAMELEN];
911 struct netent *np = NULL;
915 #define NSHIFT(m) ( \
916 (m) == IN_CLASSA_NET ? IN_CLASSA_NSHIFT : \
917 (m) == IN_CLASSB_NET ? IN_CLASSB_NSHIFT : \
918 (m) == IN_CLASSC_NET ? IN_CLASSC_NSHIFT : \
922 dmask = forgemask(i);
923 if (!numeric_addr && i) {
924 np = getnetbyaddr(i >> NSHIFT(mask), AF_INET);
925 if (np == NULL && mask == 0)
926 np = getnetbyaddr(i >> NSHIFT(dmask), AF_INET);
929 trimdomain(cp, strlen(cp));
934 strncpy(line, cp, sizeof(line) - 1);
935 line[sizeof(line) - 1] = '\0';
937 if (mask <= IN_CLASSA_NET &&
938 (i & IN_CLASSA_HOST) == 0) {
939 sprintf(line, "%lu", C(i >> 24));
940 } else if (mask <= IN_CLASSB_NET &&
941 (i & IN_CLASSB_HOST) == 0) {
942 sprintf(line, "%lu.%lu",
943 C(i >> 24), C(i >> 16));
944 } else if (mask <= IN_CLASSC_NET &&
945 (i & IN_CLASSC_HOST) == 0) {
946 sprintf(line, "%lu.%lu.%lu",
947 C(i >> 24), C(i >> 16), C(i >> 8));
949 sprintf(line, "%lu.%lu.%lu.%lu",
950 C(i >> 24), C(i >> 16), C(i >> 8), C(i));
953 domask(line + strlen(line), i, mask);
959 netname6(struct sockaddr_in6 *sa6, struct in6_addr *mask)
961 static char line[MAXHOSTNAMELEN];
962 u_char *p = (u_char *)mask;
964 int masklen, illegal = 0, flag = NI_WITHSCOPEID;
967 for (masklen = 0, lim = p + 16; p < lim; p++) {
1001 fprintf(stderr, "illegal prefixlen\n");
1006 if (masklen == 0 && IN6_IS_ADDR_UNSPECIFIED(&sa6->sin6_addr))
1010 flag |= NI_NUMERICHOST;
1011 getnameinfo((struct sockaddr *)sa6, sa6->sin6_len, line, sizeof(line),
1015 sprintf(&line[strlen(line)], "/%d", masklen);
1021 routename6(struct sockaddr_in6 *sa6)
1023 static char line[MAXHOSTNAMELEN];
1024 int flag = NI_WITHSCOPEID;
1025 /* use local variable for safety */
1026 struct sockaddr_in6 sa6_local;
1028 sa6_local.sin6_family = AF_INET6;
1029 sa6_local.sin6_len = sizeof(sa6_local);
1030 sa6_local.sin6_addr = sa6->sin6_addr;
1031 sa6_local.sin6_scope_id = sa6->sin6_scope_id;
1034 flag |= NI_NUMERICHOST;
1036 getnameinfo((struct sockaddr *)&sa6_local, sa6_local.sin6_len,
1037 line, sizeof(line), NULL, 0, flag);
1044 * Print routing statistics
1049 struct rtstatistics rts;
1052 error = kinfo_get_net_rtstatistics(&rts);
1054 printf("routing: could not retrieve statistics\n");
1057 printf("routing:\n");
1059 #define p(f, m) if (rts.f || sflag <= 1) \
1060 printf(m, rts.f, plural(rts.f))
1062 p(rts_badredirect, "\t%lu bad routing redirect%s\n");
1063 p(rts_dynamic, "\t%lu dynamically created route%s\n");
1064 p(rts_newgateway, "\t%lu new gateway%s due to redirects\n");
1065 p(rts_unreach, "\t%lu destination%s found unreachable\n");
1066 p(rts_wildcard, "\t%lu use%s of a wildcard route\n");
1071 labelops(struct rtentry *rt)
1073 const char *lops[] = { "push", "pop", "swap", "pop all" };
1074 static char buffer[100];
1076 struct sockaddr_mpls *smpls;
1079 for (i=0; i<MPLS_MAXLOPS; ++i) {
1081 if (rt->rt_shim[i] == NULL)
1085 sizeof(buffer) - (cp - buffer),
1088 smpls = (struct sockaddr_mpls *)kgetsa(rt->rt_shim[i]);
1089 if (smpls->smpls_op != MPLSLOP_POP &&
1090 smpls->smpls_op != MPLSLOP_POPALL){
1092 sizeof(buffer) - (cp - buffer),
1094 lops[smpls->smpls_op - 1],
1095 ntohl(smpls->smpls_label));
1098 sizeof(buffer) - (cp - buffer),
1100 lops[smpls->smpls_op - 1]);