xref: /openbsd-src/usr.bin/netstat/inet6.c (revision 897fc685943471cf985a0fe38ba076ea6fe74fa5)
1 /*	$OpenBSD: inet6.c,v 1.52 2017/01/21 11:32:04 guenther Exp $	*/
2 /*	BSDI inet.c,v 2.3 1995/10/24 02:19:29 prb Exp	*/
3 /*
4  * Copyright (c) 1983, 1988, 1993
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. Neither the name of the University nor the names of its contributors
16  *    may be used to endorse or promote products derived from this software
17  *    without specific prior written permission.
18  *
19  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29  * SUCH DAMAGE.
30  */
31 
32 #include <sys/types.h>
33 #include <sys/socket.h>
34 #include <sys/socketvar.h>
35 #include <sys/ioctl.h>
36 #include <sys/protosw.h>
37 #include <sys/sysctl.h>
38 
39 #include <net/route.h>
40 #include <net/if.h>
41 #include <netinet/in.h>
42 #include <netinet/ip6.h>
43 #include <netinet/icmp6.h>
44 #include <netinet/ip.h>
45 #include <netinet/ip_var.h>
46 #include <netinet6/ip6_var.h>
47 #include <netinet6/in6_var.h>
48 #include <netinet6/raw_ip6.h>
49 #include <netinet6/ip6_divert.h>
50 
51 #include <arpa/inet.h>
52 #include <netdb.h>
53 
54 #include <err.h>
55 #include <errno.h>
56 #include <stdio.h>
57 #include <string.h>
58 #include <unistd.h>
59 #include <limits.h>
60 #include "netstat.h"
61 
62 struct	socket sockb;
63 
64 char	*inet6name(struct in6_addr *);
65 
66 static	char *ip6nh[] = {
67 	"hop by hop",
68 	"ICMP",
69 	"IGMP",
70 	"#3",
71 	"IP",
72 	"#5",
73 	"TCP",
74 	"#7",
75 	"#8",
76 	"#9",
77 	"#10",
78 	"#11",
79 	"#12",
80 	"#13",
81 	"#14",
82 	"#15",
83 	"#16",
84 	"UDP",
85 	"#18",
86 	"#19",
87 	"#20",
88 	"#21",
89 	"IDP",
90 	"#23",
91 	"#24",
92 	"#25",
93 	"#26",
94 	"#27",
95 	"#28",
96 	"TP",
97 	"#30",
98 	"#31",
99 	"#32",
100 	"#33",
101 	"#34",
102 	"#35",
103 	"#36",
104 	"#37",
105 	"#38",
106 	"#39",
107 	"#40",
108 	"IP6",
109 	"#42",
110 	"routing",
111 	"fragment",
112 	"#45",
113 	"#46",
114 	"#47",
115 	"#48",
116 	"#49",
117 	"ESP",
118 	"AH",
119 	"#52",
120 	"#53",
121 	"#54",
122 	"#55",
123 	"#56",
124 	"#57",
125 	"ICMP6",
126 	"no next header",
127 	"destination option",
128 	"#61",
129 	"#62",
130 	"#63",
131 	"#64",
132 	"#65",
133 	"#66",
134 	"#67",
135 	"#68",
136 	"#69",
137 	"#70",
138 	"#71",
139 	"#72",
140 	"#73",
141 	"#74",
142 	"#75",
143 	"#76",
144 	"#77",
145 	"#78",
146 	"#79",
147 	"ISOIP",
148 	"#81",
149 	"#82",
150 	"#83",
151 	"#84",
152 	"#85",
153 	"#86",
154 	"#87",
155 	"#88",
156 	"OSPF",
157 	"#80",
158 	"#91",
159 	"#92",
160 	"#93",
161 	"#94",
162 	"#95",
163 	"#96",
164 	"Ethernet",
165 	"#98",
166 	"#99",
167 	"#100",
168 	"#101",
169 	"#102",
170 	"#103",
171 	"#104",
172 	"#105",
173 	"#106",
174 	"#107",
175 	"#108",
176 	"#109",
177 	"#110",
178 	"#111",
179 	"#112",
180 	"#113",
181 	"#114",
182 	"#115",
183 	"#116",
184 	"#117",
185 	"#118",
186 	"#119",
187 	"#120",
188 	"#121",
189 	"#122",
190 	"#123",
191 	"#124",
192 	"#125",
193 	"#126",
194 	"#127",
195 	"#128",
196 	"#129",
197 	"#130",
198 	"#131",
199 	"#132",
200 	"#133",
201 	"#134",
202 	"#135",
203 	"#136",
204 	"#137",
205 	"#138",
206 	"#139",
207 	"#140",
208 	"#141",
209 	"#142",
210 	"#143",
211 	"#144",
212 	"#145",
213 	"#146",
214 	"#147",
215 	"#148",
216 	"#149",
217 	"#150",
218 	"#151",
219 	"#152",
220 	"#153",
221 	"#154",
222 	"#155",
223 	"#156",
224 	"#157",
225 	"#158",
226 	"#159",
227 	"#160",
228 	"#161",
229 	"#162",
230 	"#163",
231 	"#164",
232 	"#165",
233 	"#166",
234 	"#167",
235 	"#168",
236 	"#169",
237 	"#170",
238 	"#171",
239 	"#172",
240 	"#173",
241 	"#174",
242 	"#175",
243 	"#176",
244 	"#177",
245 	"#178",
246 	"#179",
247 	"#180",
248 	"#181",
249 	"#182",
250 	"#183",
251 	"#184",
252 	"#185",
253 	"#186",
254 	"#187",
255 	"#188",
256 	"#189",
257 	"#180",
258 	"#191",
259 	"#192",
260 	"#193",
261 	"#194",
262 	"#195",
263 	"#196",
264 	"#197",
265 	"#198",
266 	"#199",
267 	"#200",
268 	"#201",
269 	"#202",
270 	"#203",
271 	"#204",
272 	"#205",
273 	"#206",
274 	"#207",
275 	"#208",
276 	"#209",
277 	"#210",
278 	"#211",
279 	"#212",
280 	"#213",
281 	"#214",
282 	"#215",
283 	"#216",
284 	"#217",
285 	"#218",
286 	"#219",
287 	"#220",
288 	"#221",
289 	"#222",
290 	"#223",
291 	"#224",
292 	"#225",
293 	"#226",
294 	"#227",
295 	"#228",
296 	"#229",
297 	"#230",
298 	"#231",
299 	"#232",
300 	"#233",
301 	"#234",
302 	"#235",
303 	"#236",
304 	"#237",
305 	"#238",
306 	"#239",
307 	"#240",
308 	"#241",
309 	"#242",
310 	"#243",
311 	"#244",
312 	"#245",
313 	"#246",
314 	"#247",
315 	"#248",
316 	"#249",
317 	"#250",
318 	"#251",
319 	"#252",
320 	"#253",
321 	"#254",
322 	"#255",
323 };
324 
325 /*
326  * Dump IP6 statistics structure.
327  */
328 void
329 ip6_stats(char *name)
330 {
331 	struct ip6stat ip6stat;
332 	int first, i;
333 	struct protoent *ep;
334 	const char *n;
335 	int mib[] = { CTL_NET, PF_INET6, IPPROTO_IPV6, IPV6CTL_STATS };
336 	size_t len = sizeof(ip6stat);
337 
338 	if (sysctl(mib, sizeof(mib) / sizeof(mib[0]),
339 	    &ip6stat, &len, NULL, 0) == -1) {
340 		if (errno != ENOPROTOOPT)
341 			warn("%s", name);
342 		return;
343 	}
344 
345 	printf("%s:\n", name);
346 #define	p(f, m) if (ip6stat.f || sflag <= 1) \
347 	printf(m, (unsigned long long)ip6stat.f, plural(ip6stat.f))
348 #define	p1(f, m) if (ip6stat.f || sflag <= 1) \
349 	printf(m, (unsigned long long)ip6stat.f)
350 
351 	p(ip6s_total, "\t%llu total packet%s received\n");
352 	p1(ip6s_toosmall, "\t%llu with size smaller than minimum\n");
353 	p1(ip6s_tooshort, "\t%llu with data size < data length\n");
354 	p1(ip6s_badoptions, "\t%llu with bad options\n");
355 	p1(ip6s_badvers, "\t%llu with incorrect version number\n");
356 	p(ip6s_fragments, "\t%llu fragment%s received\n");
357 	p(ip6s_fragdropped,
358 	    "\t%llu fragment%s dropped (duplicates or out of space)\n");
359 	p(ip6s_fragtimeout, "\t%llu fragment%s dropped after timeout\n");
360 	p(ip6s_fragoverflow, "\t%llu fragment%s that exceeded limit\n");
361 	p(ip6s_reassembled, "\t%llu packet%s reassembled ok\n");
362 	p(ip6s_delivered, "\t%llu packet%s for this host\n");
363 	p(ip6s_forward, "\t%llu packet%s forwarded\n");
364 	p(ip6s_cantforward, "\t%llu packet%s not forwardable\n");
365 	p(ip6s_redirectsent, "\t%llu redirect%s sent\n");
366 	p(ip6s_localout, "\t%llu packet%s sent from this host\n");
367 	p(ip6s_rawout, "\t%llu packet%s sent with fabricated ip header\n");
368 	p(ip6s_odropped,
369 	    "\t%llu output packet%s dropped due to no bufs, etc.\n");
370 	p(ip6s_noroute, "\t%llu output packet%s discarded due to no route\n");
371 	p(ip6s_fragmented, "\t%llu output datagram%s fragmented\n");
372 	p(ip6s_ofragments, "\t%llu fragment%s created\n");
373 	p(ip6s_cantfrag, "\t%llu datagram%s that can't be fragmented\n");
374 	p(ip6s_badscope, "\t%llu packet%s that violated scope rules\n");
375 	p(ip6s_notmember, "\t%llu multicast packet%s which we don't join\n");
376 	for (first = 1, i = 0; i < 256; i++)
377 		if (ip6stat.ip6s_nxthist[i] != 0) {
378 			if (first) {
379 				printf("\tInput packet histogram:\n");
380 				first = 0;
381 			}
382 			n = NULL;
383 			if (ip6nh[i])
384 				n = ip6nh[i];
385 			else if ((ep = getprotobynumber(i)) != NULL)
386 				n = ep->p_name;
387 			if (n)
388 				printf("\t\t%s: %llu\n", n,
389 				    (unsigned long long)ip6stat.ip6s_nxthist[i]);
390 			else
391 				printf("\t\t#%d: %llu\n", i,
392 				    (unsigned long long)ip6stat.ip6s_nxthist[i]);
393 		}
394 	printf("\tMbuf statistics:\n");
395 	p(ip6s_m1, "\t\t%llu one mbuf%s\n");
396 	for (first = 1, i = 0; i < 32; i++) {
397 		char ifbuf[IFNAMSIZ];
398 		if (ip6stat.ip6s_m2m[i] != 0) {
399 			if (first) {
400 				printf("\t\ttwo or more mbuf:\n");
401 				first = 0;
402 			}
403 			printf("\t\t\t%s = %llu\n",
404 			    if_indextoname(i, ifbuf),
405 			    (unsigned long long)ip6stat.ip6s_m2m[i]);
406 		}
407 	}
408 	p(ip6s_mext1, "\t\t%llu one ext mbuf%s\n");
409 	p(ip6s_mext2m, "\t\t%llu two or more ext mbuf%s\n");
410 	p(ip6s_nogif, "\t%llu tunneling packet%s that can't find gif\n");
411 	p(ip6s_toomanyhdr,
412 	    "\t%llu packet%s discarded due to too many headers\n");
413 
414 	/* for debugging source address selection */
415 #define PRINT_SCOPESTAT(s,i) do {\
416 		switch(i) { /* XXX hardcoding in each case */\
417 		case 1:\
418 			p(s, "\t\t%llu node-local%s\n");\
419 			break;\
420 		case 2:\
421 			p(s, "\t\t%llu link-local%s\n");\
422 			break;\
423 		case 5:\
424 			p(s, "\t\t%llu site-local%s\n");\
425 			break;\
426 		case 14:\
427 			p(s, "\t\t%llu global%s\n");\
428 			break;\
429 		default:\
430 			printf("\t\t%llu addresses scope=%x\n",\
431 			    (unsigned long long)ip6stat.s, i);\
432 		}\
433 	} while(0);
434 
435 	p(ip6s_sources_none,
436 	    "\t%llu failure%s of source address selection\n");
437 	for (first = 1, i = 0; i < 16; i++) {
438 		if (ip6stat.ip6s_sources_sameif[i]) {
439 			if (first) {
440 				printf("\tsource addresses on an outgoing I/F\n");
441 				first = 0;
442 			}
443 			PRINT_SCOPESTAT(ip6s_sources_sameif[i], i);
444 		}
445 	}
446 	for (first = 1, i = 0; i < 16; i++) {
447 		if (ip6stat.ip6s_sources_otherif[i]) {
448 			if (first) {
449 				printf("\tsource addresses on a non-outgoing I/F\n");
450 				first = 0;
451 			}
452 			PRINT_SCOPESTAT(ip6s_sources_otherif[i], i);
453 		}
454 	}
455 	for (first = 1, i = 0; i < 16; i++) {
456 		if (ip6stat.ip6s_sources_samescope[i]) {
457 			if (first) {
458 				printf("\tsource addresses of same scope\n");
459 				first = 0;
460 			}
461 			PRINT_SCOPESTAT(ip6s_sources_samescope[i], i);
462 		}
463 	}
464 	for (first = 1, i = 0; i < 16; i++) {
465 		if (ip6stat.ip6s_sources_otherscope[i]) {
466 			if (first) {
467 				printf("\tsource addresses of a different scope\n");
468 				first = 0;
469 			}
470 			PRINT_SCOPESTAT(ip6s_sources_otherscope[i], i);
471 		}
472 	}
473 	for (first = 1, i = 0; i < 16; i++) {
474 		if (ip6stat.ip6s_sources_deprecated[i]) {
475 			if (first) {
476 				printf("\tdeprecated source addresses\n");
477 				first = 0;
478 			}
479 			PRINT_SCOPESTAT(ip6s_sources_deprecated[i], i);
480 		}
481 	}
482 
483 	p1(ip6s_forward_cachehit, "\t%llu forward cache hit\n");
484 	p1(ip6s_forward_cachemiss, "\t%llu forward cache miss\n");
485 #undef p
486 #undef p1
487 }
488 
489 static	char *icmp6names[] = {
490 	"#0",
491 	"unreach",
492 	"packet too big",
493 	"time exceed",
494 	"parameter problem",
495 	"#5",
496 	"#6",
497 	"#7",
498 	"#8",
499 	"#9",
500 	"#10",
501 	"#11",
502 	"#12",
503 	"#13",
504 	"#14",
505 	"#15",
506 	"#16",
507 	"#17",
508 	"#18",
509 	"#19",
510 	"#20",
511 	"#21",
512 	"#22",
513 	"#23",
514 	"#24",
515 	"#25",
516 	"#26",
517 	"#27",
518 	"#28",
519 	"#29",
520 	"#30",
521 	"#31",
522 	"#32",
523 	"#33",
524 	"#34",
525 	"#35",
526 	"#36",
527 	"#37",
528 	"#38",
529 	"#39",
530 	"#40",
531 	"#41",
532 	"#42",
533 	"#43",
534 	"#44",
535 	"#45",
536 	"#46",
537 	"#47",
538 	"#48",
539 	"#49",
540 	"#50",
541 	"#51",
542 	"#52",
543 	"#53",
544 	"#54",
545 	"#55",
546 	"#56",
547 	"#57",
548 	"#58",
549 	"#59",
550 	"#60",
551 	"#61",
552 	"#62",
553 	"#63",
554 	"#64",
555 	"#65",
556 	"#66",
557 	"#67",
558 	"#68",
559 	"#69",
560 	"#70",
561 	"#71",
562 	"#72",
563 	"#73",
564 	"#74",
565 	"#75",
566 	"#76",
567 	"#77",
568 	"#78",
569 	"#79",
570 	"#80",
571 	"#81",
572 	"#82",
573 	"#83",
574 	"#84",
575 	"#85",
576 	"#86",
577 	"#87",
578 	"#88",
579 	"#89",
580 	"#80",
581 	"#91",
582 	"#92",
583 	"#93",
584 	"#94",
585 	"#95",
586 	"#96",
587 	"#97",
588 	"#98",
589 	"#99",
590 	"#100",
591 	"#101",
592 	"#102",
593 	"#103",
594 	"#104",
595 	"#105",
596 	"#106",
597 	"#107",
598 	"#108",
599 	"#109",
600 	"#110",
601 	"#111",
602 	"#112",
603 	"#113",
604 	"#114",
605 	"#115",
606 	"#116",
607 	"#117",
608 	"#118",
609 	"#119",
610 	"#120",
611 	"#121",
612 	"#122",
613 	"#123",
614 	"#124",
615 	"#125",
616 	"#126",
617 	"#127",
618 	"echo",
619 	"echo reply",
620 	"multicast listener query",
621 	"multicast listener report",
622 	"multicast listener done",
623 	"router solicitation",
624 	"router advertisement",
625 	"neighbor solicitation",
626 	"neighbor advertisement",
627 	"redirect",
628 	"router renumbering",
629 	"node information request",
630 	"node information reply",
631 	"#141",
632 	"#142",
633 	"#143",
634 	"#144",
635 	"#145",
636 	"#146",
637 	"#147",
638 	"#148",
639 	"#149",
640 	"#150",
641 	"#151",
642 	"#152",
643 	"#153",
644 	"#154",
645 	"#155",
646 	"#156",
647 	"#157",
648 	"#158",
649 	"#159",
650 	"#160",
651 	"#161",
652 	"#162",
653 	"#163",
654 	"#164",
655 	"#165",
656 	"#166",
657 	"#167",
658 	"#168",
659 	"#169",
660 	"#170",
661 	"#171",
662 	"#172",
663 	"#173",
664 	"#174",
665 	"#175",
666 	"#176",
667 	"#177",
668 	"#178",
669 	"#179",
670 	"#180",
671 	"#181",
672 	"#182",
673 	"#183",
674 	"#184",
675 	"#185",
676 	"#186",
677 	"#187",
678 	"#188",
679 	"#189",
680 	"#180",
681 	"#191",
682 	"#192",
683 	"#193",
684 	"#194",
685 	"#195",
686 	"#196",
687 	"#197",
688 	"#198",
689 	"#199",
690 	"#200",
691 	"#201",
692 	"#202",
693 	"#203",
694 	"#204",
695 	"#205",
696 	"#206",
697 	"#207",
698 	"#208",
699 	"#209",
700 	"#210",
701 	"#211",
702 	"#212",
703 	"#213",
704 	"#214",
705 	"#215",
706 	"#216",
707 	"#217",
708 	"#218",
709 	"#219",
710 	"#220",
711 	"#221",
712 	"#222",
713 	"#223",
714 	"#224",
715 	"#225",
716 	"#226",
717 	"#227",
718 	"#228",
719 	"#229",
720 	"#230",
721 	"#231",
722 	"#232",
723 	"#233",
724 	"#234",
725 	"#235",
726 	"#236",
727 	"#237",
728 	"#238",
729 	"#239",
730 	"#240",
731 	"#241",
732 	"#242",
733 	"#243",
734 	"#244",
735 	"#245",
736 	"#246",
737 	"#247",
738 	"#248",
739 	"#249",
740 	"#250",
741 	"#251",
742 	"#252",
743 	"#253",
744 	"#254",
745 	"#255",
746 };
747 
748 /*
749  * Dump ICMPv6 statistics.
750  */
751 void
752 icmp6_stats(char *name)
753 {
754 	struct icmp6stat icmp6stat;
755 	int i, first;
756 	int mib[] = { CTL_NET, PF_INET6, IPPROTO_ICMPV6, ICMPV6CTL_STATS };
757 	size_t len = sizeof(icmp6stat);
758 
759 	if (sysctl(mib, sizeof(mib) / sizeof(mib[0]),
760 	    &icmp6stat, &len, NULL, 0) == -1) {
761 		if (errno != ENOPROTOOPT)
762 			warn("%s", name);
763 		return;
764 	}
765 
766 	printf("%s:\n", name);
767 #define	p(f, m) if (icmp6stat.f || sflag <= 1) \
768 	printf(m, (unsigned long long)icmp6stat.f, plural(icmp6stat.f))
769 #define p_5(f, m) if (icmp6stat.f || sflag <= 1) \
770 	printf(m, (unsigned long long)icmp6stat.f)
771 
772 	p(icp6s_error, "\t%llu call%s to icmp6_error\n");
773 	p(icp6s_canterror,
774 	    "\t%llu error%s not generated because old message was icmp6 or so\n");
775 	p(icp6s_toofreq,
776 	    "\t%llu error%s not generated because of rate limitation\n");
777 	for (first = 1, i = 0; i < 256; i++)
778 		if (icmp6stat.icp6s_outhist[i] != 0) {
779 			if (first) {
780 				printf("\tOutput packet histogram:\n");
781 				first = 0;
782 			}
783 			printf("\t\t%s: %llu\n", icmp6names[i],
784 			    (unsigned long long)icmp6stat.icp6s_outhist[i]);
785 		}
786 	p(icp6s_badcode, "\t%llu message%s with bad code fields\n");
787 	p(icp6s_tooshort, "\t%llu message%s < minimum length\n");
788 	p(icp6s_checksum, "\t%llu bad checksum%s\n");
789 	p(icp6s_badlen, "\t%llu message%s with bad length\n");
790 	for (first = 1, i = 0; i < ICMP6_MAXTYPE; i++)
791 		if (icmp6stat.icp6s_inhist[i] != 0) {
792 			if (first) {
793 				printf("\tInput packet histogram:\n");
794 				first = 0;
795 			}
796 			printf("\t\t%s: %llu\n", icmp6names[i],
797 			    (unsigned long long)icmp6stat.icp6s_inhist[i]);
798 		}
799 	printf("\tHistogram of error messages to be generated:\n");
800 	p_5(icp6s_odst_unreach_noroute, "\t\t%llu no route\n");
801 	p_5(icp6s_odst_unreach_admin, "\t\t%llu administratively prohibited\n");
802 	p_5(icp6s_odst_unreach_beyondscope, "\t\t%llu beyond scope\n");
803 	p_5(icp6s_odst_unreach_addr, "\t\t%llu address unreachable\n");
804 	p_5(icp6s_odst_unreach_noport, "\t\t%llu port unreachable\n");
805 	p_5(icp6s_opacket_too_big, "\t\t%llu packet too big\n");
806 	p_5(icp6s_otime_exceed_transit, "\t\t%llu time exceed transit\n");
807 	p_5(icp6s_otime_exceed_reassembly, "\t\t%llu time exceed reassembly\n");
808 	p_5(icp6s_oparamprob_header, "\t\t%llu erroneous header field\n");
809 	p_5(icp6s_oparamprob_nextheader, "\t\t%llu unrecognized next header\n");
810 	p_5(icp6s_oparamprob_option, "\t\t%llu unrecognized option\n");
811 	p_5(icp6s_oredirect, "\t\t%llu redirect\n");
812 	p_5(icp6s_ounknown, "\t\t%llu unknown\n");
813 
814 	p(icp6s_reflect, "\t%llu message response%s generated\n");
815 	p(icp6s_nd_toomanyopt, "\t%llu message%s with too many ND options\n");
816 	p(icp6s_nd_badopt, "\t%llu message%s with bad ND options\n");
817 	p(icp6s_badns, "\t%llu bad neighbor solicitation message%s\n");
818 	p(icp6s_badna, "\t%llu bad neighbor advertisement message%s\n");
819 	p(icp6s_badrs, "\t%llu bad router solicitation message%s\n");
820 	p(icp6s_badra, "\t%llu bad router advertisement message%s\n");
821 	p(icp6s_badredirect, "\t%llu bad redirect message%s\n");
822 	p(icp6s_pmtuchg, "\t%llu path MTU change%s\n");
823 #undef p
824 #undef p_5
825 }
826 
827 /*
828  * Dump raw ip6 statistics structure.
829  */
830 void
831 rip6_stats(char *name)
832 {
833 	struct rip6stat rip6stat;
834 	u_int64_t delivered;
835 	int mib[] = { CTL_NET, PF_INET6, IPPROTO_RAW, RIPV6CTL_STATS };
836 	size_t len = sizeof(rip6stat);
837 
838 	if (sysctl(mib, sizeof(mib) / sizeof(mib[0]),
839 	    &rip6stat, &len, NULL, 0) == -1) {
840 		if (errno != ENOPROTOOPT)
841 			warn("%s", name);
842 		return;
843 	}
844 
845 	printf("%s:\n", name);
846 
847 #define	p(f, m) if (rip6stat.f || sflag <= 1) \
848     printf(m, (unsigned long long)rip6stat.f, plural(rip6stat.f))
849 	p(rip6s_ipackets, "\t%llu message%s received\n");
850 	p(rip6s_isum, "\t%llu checksum calculation%s on inbound\n");
851 	p(rip6s_badsum, "\t%llu message%s with bad checksum\n");
852 	p(rip6s_nosock, "\t%llu message%s dropped due to no socket\n");
853 	p(rip6s_nosockmcast,
854 	    "\t%llu multicast message%s dropped due to no socket\n");
855 	p(rip6s_fullsock,
856 	    "\t%llu message%s dropped due to full socket buffers\n");
857 	delivered = rip6stat.rip6s_ipackets -
858 		    rip6stat.rip6s_badsum -
859 		    rip6stat.rip6s_nosock -
860 		    rip6stat.rip6s_nosockmcast -
861 		    rip6stat.rip6s_fullsock;
862 	if (delivered || sflag <= 1)
863 		printf("\t%llu delivered\n", (unsigned long long)delivered);
864 	p(rip6s_opackets, "\t%llu datagram%s output\n");
865 #undef p
866 }
867 
868 /*
869  * Dump divert6 statistics structure.
870  */
871 void
872 div6_stats(char *name)
873 {
874 	struct div6stat div6stat;
875 	int mib[] = { CTL_NET, PF_INET6, IPPROTO_DIVERT, DIVERT6CTL_STATS };
876 	size_t len = sizeof(div6stat);
877 
878 	if (sysctl(mib, sizeof(mib) / sizeof(mib[0]),
879 	    &div6stat, &len, NULL, 0) == -1) {
880 		if (errno != ENOPROTOOPT)
881 			warn("%s", name);
882 		return;
883 	}
884 
885 	printf("%s:\n", name);
886 #define p(f, m) if (div6stat.f || sflag <= 1) \
887     printf(m, div6stat.f, plural(div6stat.f))
888 #define p1(f, m) if (div6stat.f || sflag <= 1) \
889     printf(m, div6stat.f)
890 	p(divs_ipackets, "\t%lu total packet%s received\n");
891 	p1(divs_noport, "\t%lu dropped due to no socket\n");
892 	p1(divs_fullsock, "\t%lu dropped due to full socket buffers\n");
893 	p(divs_opackets, "\t%lu packet%s output\n");
894 	p1(divs_errors, "\t%lu errors\n");
895 #undef p
896 #undef p1
897 }
898 
899 /*
900  * Pretty print an Internet address (net address + port).
901  * If the nflag was specified, use numbers instead of names.
902  */
903 
904 void
905 inet6print(struct in6_addr *in6, int port, const char *proto)
906 {
907 
908 #define GETSERVBYPORT6(port, proto, ret) do { \
909 	if (strcmp((proto), "tcp6") == 0) \
910 		(ret) = getservbyport((int)(port), "tcp"); \
911 	else if (strcmp((proto), "udp6") == 0) \
912 		(ret) = getservbyport((int)(port), "udp"); \
913 	else \
914 		(ret) = getservbyport((int)(port), (proto)); \
915 	} while (0)
916 
917 	struct servent *sp = 0;
918 	char line[80], *cp;
919 	int width;
920 	int len = sizeof line;
921 
922 	width = Aflag ? 12 : 16;
923 	if (vflag && width < strlen(inet6name(in6)))
924 		width = strlen(inet6name(in6));
925 	snprintf(line, len, "%.*s.", width, inet6name(in6));
926 	len -= strlen(line);
927 	if (len <= 0)
928 		goto bail;
929 
930 	cp = strchr(line, '\0');
931 	if (!nflag && port)
932 		GETSERVBYPORT6(port, proto, sp);
933 	if (sp || port == 0)
934 		snprintf(cp, len, "%.8s", sp ? sp->s_name : "*");
935 	else
936 		snprintf(cp, len, "%d", ntohs((u_short)port));
937 	width = Aflag ? 18 : 22;
938 	if (vflag && width < strlen(line))
939 		width = strlen(line);
940 bail:
941 	printf(" %-*.*s", width, width, line);
942 }
943 
944 /*
945  * Construct an Internet address representation.
946  * If the nflag has been supplied, give
947  * numeric value, otherwise try for symbolic name.
948  */
949 
950 char *
951 inet6name(struct in6_addr *in6p)
952 {
953 	char *cp;
954 	static char line[NI_MAXHOST];
955 	struct hostent *hp;
956 	static char domain[HOST_NAME_MAX+1];
957 	static int first = 1;
958 	char hbuf[NI_MAXHOST];
959 	struct sockaddr_in6 sin6;
960 	const int niflag = NI_NUMERICHOST;
961 
962 	if (first && !nflag) {
963 		first = 0;
964 		if (gethostname(domain, sizeof(domain)) == 0 &&
965 		    (cp = strchr(domain, '.')))
966 			(void) strlcpy(domain, cp + 1, sizeof domain);
967 		else
968 			domain[0] = '\0';
969 	}
970 	cp = 0;
971 	if (!nflag && !IN6_IS_ADDR_UNSPECIFIED(in6p)) {
972 		hp = gethostbyaddr((char *)in6p, sizeof(*in6p), AF_INET6);
973 		if (hp) {
974 			if ((cp = strchr(hp->h_name, '.')) &&
975 			    !strcmp(cp + 1, domain))
976 				*cp = 0;
977 			cp = hp->h_name;
978 		}
979 	}
980 	if (IN6_IS_ADDR_UNSPECIFIED(in6p))
981 		strlcpy(line, "*", sizeof(line));
982 	else if (cp)
983 		strlcpy(line, cp, sizeof(line));
984 	else {
985 		memset(&sin6, 0, sizeof(sin6));
986 		sin6.sin6_family = AF_INET6;
987 		sin6.sin6_addr = *in6p;
988 #ifdef __KAME__
989 		if (IN6_IS_ADDR_LINKLOCAL(in6p) ||
990 		    IN6_IS_ADDR_MC_LINKLOCAL(in6p) ||
991 		    IN6_IS_ADDR_MC_INTFACELOCAL(in6p)) {
992 			sin6.sin6_scope_id =
993 			    ntohs(*(u_int16_t *)&in6p->s6_addr[2]);
994 			sin6.sin6_addr.s6_addr[2] = 0;
995 			sin6.sin6_addr.s6_addr[3] = 0;
996 		}
997 #endif
998 		if (getnameinfo((struct sockaddr *)&sin6, sizeof(sin6),
999 		    hbuf, sizeof(hbuf), NULL, 0, niflag) != 0)
1000 			strlcpy(hbuf, "?", sizeof hbuf);
1001 		strlcpy(line, hbuf, sizeof(line));
1002 	}
1003 	return (line);
1004 }
1005