]> git.saurik.com Git - apple/network_cmds.git/blame_incremental - netstat.tproj/inet6.c
network_cmds-606.100.3.tar.gz
[apple/network_cmds.git] / netstat.tproj / inet6.c
... / ...
CommitLineData
1/*
2 * Copyright (c) 2008-2018 Apple Inc. All rights reserved.
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28
29/* BSDI inet.c,v 2.3 1995/10/24 02:19:29 prb Exp */
30/*
31 * Copyright (c) 1983, 1988, 1993
32 * The Regents of the University of California. All rights reserved.
33 *
34 * Redistribution and use in source and binary forms, with or without
35 * modification, are permitted provided that the following conditions
36 * are met:
37 * 1. Redistributions of source code must retain the above copyright
38 * notice, this list of conditions and the following disclaimer.
39 * 2. Redistributions in binary form must reproduce the above copyright
40 * notice, this list of conditions and the following disclaimer in the
41 * documentation and/or other materials provided with the distribution.
42 * 3. All advertising materials mentioning features or use of this software
43 * must display the following acknowledgement:
44 * This product includes software developed by the University of
45 * California, Berkeley and its contributors.
46 * 4. Neither the name of the University nor the names of its contributors
47 * may be used to endorse or promote products derived from this software
48 * without specific prior written permission.
49 *
50 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
51 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
52 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
53 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
54 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
55 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
56 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
57 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
58 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
59 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
60 * SUCH DAMAGE.
61 *
62 * $FreeBSD: src/usr.bin/netstat/inet6.c,v 1.3.2.9 2001/08/10 09:07:09 ru Exp $
63 */
64
65#ifdef INET6
66#include <sys/param.h>
67#include <sys/socket.h>
68#include <sys/socketvar.h>
69#include <sys/ioctl.h>
70#include <sys/sysctl.h>
71
72#include <net/route.h>
73#include <net/if.h>
74#include <net/if_var.h>
75#include <net/net_perf.h>
76#include <netinet/in.h>
77#include <netinet/ip6.h>
78#include <netinet/icmp6.h>
79#include <netinet/in_systm.h>
80#include <netinet6/in6_pcb.h>
81#include <netinet6/in6_var.h>
82#include <netinet6/ip6_var.h>
83#include <netinet6/raw_ip6.h>
84
85#include <arpa/inet.h>
86#include <netdb.h>
87
88#include <stdio.h>
89#include <string.h>
90#include <unistd.h>
91#include "netstat.h"
92
93#if defined(__APPLE__) && !defined(__unused)
94#define __unused
95#endif
96
97char *inet6name (struct in6_addr *);
98void inet6print (struct in6_addr *, int, char *, int);
99
100static char *ip6nh[] = {
101 "hop by hop",
102 "ICMP",
103 "IGMP",
104 "#3",
105 "IP",
106 "#5",
107 "TCP",
108 "#7",
109 "#8",
110 "#9",
111 "#10",
112 "#11",
113 "#12",
114 "#13",
115 "#14",
116 "#15",
117 "#16",
118 "UDP",
119 "#18",
120 "#19",
121 "#20",
122 "#21",
123 "IDP",
124 "#23",
125 "#24",
126 "#25",
127 "#26",
128 "#27",
129 "#28",
130 "TP",
131 "#30",
132 "#31",
133 "#32",
134 "#33",
135 "#34",
136 "#35",
137 "#36",
138 "#37",
139 "#38",
140 "#39",
141 "#40",
142 "IP6",
143 "#42",
144 "routing",
145 "fragment",
146 "#45",
147 "#46",
148 "#47",
149 "#48",
150 "#49",
151 "ESP",
152 "AH",
153 "#52",
154 "#53",
155 "#54",
156 "#55",
157 "#56",
158 "#57",
159 "ICMP6",
160 "no next header",
161 "destination option",
162 "#61",
163 "mobility",
164 "#63",
165 "#64",
166 "#65",
167 "#66",
168 "#67",
169 "#68",
170 "#69",
171 "#70",
172 "#71",
173 "#72",
174 "#73",
175 "#74",
176 "#75",
177 "#76",
178 "#77",
179 "#78",
180 "#79",
181 "ISOIP",
182 "#81",
183 "#82",
184 "#83",
185 "#84",
186 "#85",
187 "#86",
188 "#87",
189 "#88",
190 "OSPF",
191 "#80",
192 "#91",
193 "#92",
194 "#93",
195 "#94",
196 "#95",
197 "#96",
198 "Ethernet",
199 "#98",
200 "#99",
201 "#100",
202 "#101",
203 "#102",
204 "PIM",
205 "#104",
206 "#105",
207 "#106",
208 "#107",
209 "#108",
210 "#109",
211 "#110",
212 "#111",
213 "#112",
214 "#113",
215 "#114",
216 "#115",
217 "#116",
218 "#117",
219 "#118",
220 "#119",
221 "#120",
222 "#121",
223 "#122",
224 "#123",
225 "#124",
226 "#125",
227 "#126",
228 "#127",
229 "#128",
230 "#129",
231 "#130",
232 "#131",
233 "#132",
234 "#133",
235 "#134",
236 "#135",
237 "#136",
238 "#137",
239 "#138",
240 "#139",
241 "#140",
242 "#141",
243 "#142",
244 "#143",
245 "#144",
246 "#145",
247 "#146",
248 "#147",
249 "#148",
250 "#149",
251 "#150",
252 "#151",
253 "#152",
254 "#153",
255 "#154",
256 "#155",
257 "#156",
258 "#157",
259 "#158",
260 "#159",
261 "#160",
262 "#161",
263 "#162",
264 "#163",
265 "#164",
266 "#165",
267 "#166",
268 "#167",
269 "#168",
270 "#169",
271 "#170",
272 "#171",
273 "#172",
274 "#173",
275 "#174",
276 "#175",
277 "#176",
278 "#177",
279 "#178",
280 "#179",
281 "#180",
282 "#181",
283 "#182",
284 "#183",
285 "#184",
286 "#185",
287 "#186",
288 "#187",
289 "#188",
290 "#189",
291 "#180",
292 "#191",
293 "#192",
294 "#193",
295 "#194",
296 "#195",
297 "#196",
298 "#197",
299 "#198",
300 "#199",
301 "#200",
302 "#201",
303 "#202",
304 "#203",
305 "#204",
306 "#205",
307 "#206",
308 "#207",
309 "#208",
310 "#209",
311 "#210",
312 "#211",
313 "#212",
314 "#213",
315 "#214",
316 "#215",
317 "#216",
318 "#217",
319 "#218",
320 "#219",
321 "#220",
322 "#221",
323 "#222",
324 "#223",
325 "#224",
326 "#225",
327 "#226",
328 "#227",
329 "#228",
330 "#229",
331 "#230",
332 "#231",
333 "#232",
334 "#233",
335 "#234",
336 "#235",
337 "#236",
338 "#237",
339 "#238",
340 "#239",
341 "#240",
342 "#241",
343 "#242",
344 "#243",
345 "#244",
346 "#245",
347 "#246",
348 "#247",
349 "#248",
350 "#249",
351 "#250",
352 "#251",
353 "#252",
354 "#253",
355 "#254",
356 "#255",
357};
358
359
360static const char *srcrulenames[IP6S_SRCRULE_COUNT] = {
361 "default", // IP6S_SRCRULE_0
362 "prefer same address", // IP6S_SRCRULE_1
363 "prefer appropriate scope", // IP6S_SRCRULE_2
364 "avoid deprecated addresses", // IP6S_SRCRULE_3
365 "prefer home addresses", // IP6S_SRCRULE_4
366 "prefer outgoing interface", // IP6S_SRCRULE_5
367 "prefer matching label", // IP6S_SRCRULE_6
368 "prefer temporary addresses", // IP6S_SRCRULE_7
369 "prefer addresses on alive interfaces", // IP6S_SRCRULE_7x
370 "use longest matching prefix", // IP6S_SRCRULE_8
371 NULL,
372 NULL,
373 NULL,
374 NULL,
375 NULL,
376 NULL
377};
378
379/*
380 * Dump IP6 statistics structure.
381 */
382void
383ip6_stats(uint32_t off __unused, char *name, int af __unused)
384{
385 static struct ip6stat pip6stat;
386 struct ip6stat ip6stat;
387 int first, i;
388 int mib[4];
389 size_t len;
390 static net_perf_t pout_net_perf, pin_net_perf;
391 net_perf_t out_net_perf, in_net_perf;
392 size_t out_net_perf_len = sizeof (out_net_perf);
393 size_t in_net_perf_len = sizeof (in_net_perf);
394
395 if (sysctlbyname("net.inet6.ip6.output_perf_data", &out_net_perf, &out_net_perf_len, 0, 0) < 0) {
396 perror("sysctl: net.inet6.ip6.output_perf_data");
397 return;
398 }
399
400 if (sysctlbyname("net.inet6.ip6.input_perf_data", &in_net_perf, &in_net_perf_len, 0, 0) < 0) {
401 perror("sysctl: net.inet6.ip6.input_perf_data");
402 return;
403 }
404
405 mib[0] = CTL_NET;
406 mib[1] = PF_INET6;
407 mib[2] = IPPROTO_IPV6;
408 mib[3] = IPV6CTL_STATS;
409
410 len = sizeof ip6stat;
411 memset(&ip6stat, 0, len);
412 if (sysctl(mib, 4, &ip6stat, &len, (void *)0, 0) < 0)
413 return;
414 if (interval && vflag > 0)
415 print_time();
416 printf("%s:\n", name);
417
418#define IP6DIFF(f) (ip6stat.f - pip6stat.f)
419#define p(f, m) if (IP6DIFF(f) || sflag <= 1) \
420 printf(m, (unsigned long long)IP6DIFF(f), plural(IP6DIFF(f)))
421#define p1a(f, m) if (IP6DIFF(f) || sflag <= 1) \
422 printf(m, (unsigned long long)IP6DIFF(f))
423
424 p(ip6s_total, "\t%llu total packet%s received\n");
425 p1a(ip6s_toosmall, "\t\t%llu with size smaller than minimum\n");
426 p1a(ip6s_tooshort, "\t\t%llu with data size < data length\n");
427 p1a(ip6s_adj, "\t\t%llu with data size > data length\n");
428 p(ip6s_adj_hwcsum_clr,
429 "\t\t\t%llu packet%s forced to software checksum\n");
430 p1a(ip6s_badoptions, "\t\t%llu with bad options\n");
431 p1a(ip6s_badvers, "\t\t%llu with incorrect version number\n");
432 p(ip6s_fragments, "\t\t%llu fragment%s received\n");
433 p1a(ip6s_fragdropped,
434 "\t\t\t%llu dropped (dup or out of space)\n");
435 p1a(ip6s_fragtimeout, "\t\t\t%llu dropped after timeout\n");
436 p1a(ip6s_fragoverflow, "\t\t\t%llu exceeded limit\n");
437 p1a(ip6s_reassembled, "\t\t\t%llu reassembled ok\n");
438 p1a(ip6s_atmfrag_rcvd, "\t\t\t%llu atomic fragments received\n");
439 p(ip6s_delivered, "\t\t%llu packet%s for this host\n");
440 p(ip6s_forward, "\t\t%llu packet%s forwarded\n");
441 p(ip6s_cantforward, "\t\t%llu packet%s not forwardable\n");
442 p(ip6s_redirectsent, "\t\t%llu redirect%s sent\n");
443 p(ip6s_notmember, "\t\t%llu multicast packet%s which we don't join\n");
444 p(ip6s_exthdrtoolong,
445 "\t\t%llu packet%s whose headers are not continuous\n");
446 p(ip6s_nogif, "\t\t%llu tunneling packet%s that can't find gif\n");
447 p(ip6s_toomanyhdr,
448 "\t\t%llu packet%s discarded due to too may headers\n");
449 p1a(ip6s_forward_cachehit, "\t\t%llu forward cache hit\n");
450 p1a(ip6s_forward_cachemiss, "\t\t%llu forward cache miss\n");
451 p(ip6s_pktdropcntrl,
452 "\t\t%llu packet%s dropped due to no bufs for control data\n");
453 /* CLAT46 input stats */
454 p(ip6s_clat464_in_tooshort_drop,
455 "\t\t%llu input packet%s dropped due to too short length \n");
456 p(ip6s_clat464_in_nov6addr_drop,
457 "\t\t%llu input packet%s dropped due to missing CLAT46 IPv6 address\n");
458 p(ip6s_clat464_in_nov4addr_drop,
459 "\t\t%llu input packet%s dropped due to missing CLAT46 IPv4 address\n");
460 p(ip6s_clat464_in_v4synthfail_drop,
461 "\t\t%llu input packet%s dropped due to CLAT46 IPv4 address derivation failure\n");
462 p(ip6s_clat464_in_64transfail_drop,
463 "\t\t%llu input packet%s dropped due to CLAT46 IP header translation failure\n");
464 p(ip6s_clat464_in_64proto_transfail_drop,
465 "\t\t%llu input packet%s dropped due to CLAT46 protocol translation failure\n");
466 p(ip6s_clat464_in_64frag_transfail_drop,
467 "\t\t%llu input packet%s dropped due to CLAT46 fragment translation failure\n");
468 p(ip6s_clat464_in_invalpbuf_drop,
469 "\t\t%llu input packet%s dropped due to invalid pbuf\n");
470 p(ip6s_clat464_in_v4_drop,
471 "\t\t%llu input IPv4 packet%s dropped on CLAT46 enabled interface\n");
472 p(ip6s_clat464_in_drop,
473 "\t\t%llu input packet%s dropped due to CLAT46 failures\n");
474 p(ip6s_clat464_in_success,
475 "\t\t%llu input packet%s successfully translated from IPv6 to IPv4\n");
476
477#define INPERFDIFF(f) (in_net_perf.f - pin_net_perf.f)
478 if (INPERFDIFF(np_total_pkts) > 0 && in_net_perf.np_total_usecs > 0) {
479 printf("\tInput Performance Stats:\n");
480 printf("\t\t%llu total packets measured\n", INPERFDIFF(np_total_pkts));
481 printf("\t\t%llu total usec elapsed\n", INPERFDIFF(np_total_usecs));
482 printf("\t\t%f usec per packet\n",
483 (double)in_net_perf.np_total_usecs/(double)in_net_perf.np_total_pkts);
484 printf("\t\tPerformance Histogram:\n");
485 printf("\t\t\t x <= %u: %llu\n", in_net_perf.np_hist_bars[0],
486 INPERFDIFF(np_hist1));
487 printf("\t\t\t %u < x <= %u: %llu\n",
488 in_net_perf.np_hist_bars[0], in_net_perf.np_hist_bars[1],
489 INPERFDIFF(np_hist2));
490 printf("\t\t\t %u < x <= %u: %llu\n",
491 in_net_perf.np_hist_bars[1], in_net_perf.np_hist_bars[2],
492 INPERFDIFF(np_hist3));
493 printf("\t\t\t %u < x <= %u: %llu\n",
494 in_net_perf.np_hist_bars[2], in_net_perf.np_hist_bars[3],
495 INPERFDIFF(np_hist4));
496 printf("\t\t\t %u < x: %llu\n",
497 in_net_perf.np_hist_bars[3], INPERFDIFF(np_hist5));
498 }
499#undef INPERFDIFF
500
501 p(ip6s_localout, "\t%llu packet%s sent from this host\n");
502 p(ip6s_rawout, "\t\t%llu packet%s sent with fabricated ip header\n");
503 p(ip6s_odropped,
504 "\t\t%llu output packet%s dropped due to no bufs, etc.\n");
505 p(ip6s_noroute, "\t\t%llu output packet%s discarded due to no route\n");
506 p(ip6s_fragmented, "\t\t%llu output datagram%s fragmented\n");
507 p(ip6s_ofragments, "\t\t%llu fragment%s created\n");
508 p(ip6s_cantfrag, "\t\t%llu datagram%s that can't be fragmented\n");
509 p(ip6s_badscope, "\t\t%llu packet%s that violated scope rules\n");
510 p(ip6s_necp_policy_drop, "\t\t%llu packet%s dropped due to NECP policy\n");
511 /* CLAT46 output stats */
512 p(ip6s_clat464_out_nov6addr_drop,
513 "\t\t%llu output packet%s dropped due to missing CLAT46 IPv6 address\n");
514 p(ip6s_clat464_out_v6synthfail_drop,
515 "\t\t%llu output packet%s dropped due to CLAT46 IPv6 address synthesis failure\n");
516 p(ip6s_clat464_out_46transfail_drop,
517 "\t\t%llu output packet%s dropped due to CLAT46 IP header translation failure\n");
518 p(ip6s_clat464_out_46proto_transfail_drop,
519 "\t\t%llu output packet%s dropped due to CLAT46 protocol translation failure\n");
520 p(ip6s_clat464_out_46frag_transfail_drop,
521 "\t\t%llu output packet%s dropped due to CLAT46 fragment translation failure\n");
522 p(ip6s_clat464_out_invalpbuf_drop,
523 "\t\t%llu output packet%s dropped due to invalid pbuf\n");
524 p(ip6s_clat464_out_drop,
525 "\t\t%llu output packet%s dropped due to CLAT46 failures\n");
526 p(ip6s_clat464_out_success,
527 "\t\t%llu output packet%s successfully translated from IPv4 to IPv6\n");
528 p(ip6s_rcv_if_weak_match,
529 "\t\t%llu input packet%s that passed the weak ES interface address match\n");
530 p(ip6s_rcv_if_no_match,
531 "\t\t%llu input packet%s with no interface address match\n");
532
533#define OUTPERFDIFF(f) (out_net_perf.f - pout_net_perf.f)
534 if (OUTPERFDIFF(np_total_pkts) > 0 && out_net_perf.np_total_usecs > 0) {
535 printf("\tOutput Performance Stats:\n");
536 printf("\t\t%llu total packets measured\n", OUTPERFDIFF(np_total_pkts));
537 printf("\t\t%llu total usec elapsed\n", OUTPERFDIFF(np_total_usecs));
538 printf("\t\t%f usec per packet\n",
539 (double)out_net_perf.np_total_usecs/(double)out_net_perf.np_total_pkts);
540 printf("\t\tHistogram:\n");
541 printf("\t\t\t x <= %u: %llu\n", out_net_perf.np_hist_bars[0],
542 OUTPERFDIFF(np_hist1));
543 printf("\t\t\t %u < x <= %u: %llu\n",
544 out_net_perf.np_hist_bars[0], out_net_perf.np_hist_bars[1],
545 OUTPERFDIFF(np_hist2));
546 printf("\t\t\t %u < x <= %u: %llu\n",
547 out_net_perf.np_hist_bars[1], out_net_perf.np_hist_bars[2],
548 OUTPERFDIFF(np_hist3));
549 printf("\t\t\t %u < x <= %u: %llu\n",
550 out_net_perf.np_hist_bars[2], out_net_perf.np_hist_bars[3],
551 OUTPERFDIFF(np_hist4));
552 printf("\t\t\t %u < x: %llu\n",
553 out_net_perf.np_hist_bars[3], OUTPERFDIFF(np_hist5));
554 }
555#undef OUTPERFDIFF
556
557 for (first = 1, i = 0; i < 256; i++)
558 if (IP6DIFF(ip6s_nxthist[i]) != 0) {
559 if (first) {
560 printf("\tInput histogram:\n");
561 first = 0;
562 }
563 printf("\t\t%s: %llu\n", ip6nh[i],
564 (unsigned long long)IP6DIFF(ip6s_nxthist[i]));
565 }
566 printf("\tMbuf statistics:\n");
567 printf("\t\t%llu one mbuf\n", (unsigned long long)IP6DIFF(ip6s_m1));
568 for (first = 1, i = 0; i < 32; i++) {
569 char ifbuf[IFNAMSIZ];
570 if (IP6DIFF(ip6s_m2m[i]) != 0) {
571 if (first) {
572 printf("\t\ttwo or more mbuf:\n");
573 first = 0;
574 }
575 printf("\t\t\t%s= %llu\n",
576 if_indextoname(i, ifbuf),
577 (unsigned long long)IP6DIFF(ip6s_m2m[i]));
578 }
579 }
580 printf("\t\t%llu one ext mbuf\n",
581 (unsigned long long)IP6DIFF(ip6s_mext1));
582 printf("\t\t%llu two or more ext mbuf\n",
583 (unsigned long long)IP6DIFF(ip6s_mext2m));
584
585 /* for debugging source address selection */
586#define PRINT_SCOPESTAT(s,i) do {\
587 switch(i) { /* XXX hardcoding in each case */\
588 case 1:\
589 p(s, "\t\t\t%llu node-local%s\n");\
590 break;\
591 case 2:\
592 p(s,"\t\t\t%llu link-local%s\n");\
593 break;\
594 case 5:\
595 p(s,"\t\t\t%llu site-local%s\n");\
596 break;\
597 case 14:\
598 p(s,"\t\t\t%llu global%s\n");\
599 break;\
600 default:\
601 printf("\t\t\t%llu addresses scope=%x\n",\
602 (unsigned long long)IP6DIFF(s), i);\
603 }\
604 } while (0);
605
606 p(ip6s_sources_none,
607 "\t\t%llu failure%s of source address selection\n");
608 for (first = 1, i = 0; i < SCOPE6_ID_MAX; i++) {
609 if (IP6DIFF(ip6s_sources_sameif[i]) || 1) {
610 if (first) {
611 printf("\t\tsource addresses on an outgoing I/F\n");
612 first = 0;
613 }
614 PRINT_SCOPESTAT(ip6s_sources_sameif[i], i);
615 }
616 }
617 for (first = 1, i = 0; i < SCOPE6_ID_MAX; i++) {
618 if (IP6DIFF(ip6s_sources_otherif[i]) || 1) {
619 if (first) {
620 printf("\t\tsource addresses on a non-outgoing I/F\n");
621 first = 0;
622 }
623 PRINT_SCOPESTAT(ip6s_sources_otherif[i], i);
624 }
625 }
626 for (first = 1, i = 0; i < SCOPE6_ID_MAX; i++) {
627 if (IP6DIFF(ip6s_sources_samescope[i]) || 1) {
628 if (first) {
629 printf("\t\tsource addresses of same scope\n");
630 first = 0;
631 }
632 PRINT_SCOPESTAT(ip6s_sources_samescope[i], i);
633 }
634 }
635 for (first = 1, i = 0; i < SCOPE6_ID_MAX; i++) {
636 if (IP6DIFF(ip6s_sources_otherscope[i]) || 1) {
637 if (first) {
638 printf("\t\tsource addresses of a different scope\n");
639 first = 0;
640 }
641 PRINT_SCOPESTAT(ip6s_sources_otherscope[i], i);
642 }
643 }
644 for (first = 1, i = 0; i < SCOPE6_ID_MAX; i++) {
645 if (IP6DIFF(ip6s_sources_deprecated[i]) || 1) {
646 if (first) {
647 printf("\t\tdeprecated source addresses\n");
648 first = 0;
649 }
650 PRINT_SCOPESTAT(ip6s_sources_deprecated[i], i);
651 }
652 }
653#define PRINT_SRCRULESTAT(s,i) do {\
654 if (srcrulenames[i] != NULL) \
655 printf("\t\t\t%llu rule%s %s\n", \
656 (unsigned long long)IP6DIFF(s), \
657 plural(IP6DIFF(s)), \
658 srcrulenames[i]); \
659} while (0);
660
661 for (first = 1, i = 0; i < IP6S_SRCRULE_COUNT; i++) {
662 if (IP6DIFF(ip6s_sources_rule[i]) || 1) {
663 if (first) {
664 printf("\t\tsource address selection\n");
665 first = 0;
666 }
667 PRINT_SRCRULESTAT(ip6s_sources_rule[i], i);
668 }
669 }
670
671 p(ip6s_dad_collide, "\t\t%llu duplicate address detection collision%s\n");
672
673 p(ip6s_dad_loopcount, "\t\t%llu duplicate address detection NS loop%s\n");
674
675 p(ip6s_sources_skip_expensive_secondary_if, "\t\t%llu time%s ignored source on secondary expensive I/F\n");
676
677 if (interval > 0) {
678 bcopy(&ip6stat, &pip6stat, len);
679 bcopy(&in_net_perf, &pin_net_perf, in_net_perf_len);
680 bcopy(&out_net_perf, &pout_net_perf, out_net_perf_len);
681 }
682#undef IP6DIFF
683#undef p
684#undef p1a
685}
686
687/*
688 * Dump IPv6 per-interface statistics based on RFC 2465.
689 */
690void
691ip6_ifstats(char *ifname)
692{
693 struct in6_ifreq ifr;
694 int s;
695#define p(f, m) if (ifr.ifr_ifru.ifru_stat.f || sflag <= 1) \
696 printf(m, (unsigned long long)ifr.ifr_ifru.ifru_stat.f, plural(ifr.ifr_ifru.ifru_stat.f))
697#define p_5(f, m) if (ifr.ifr_ifru.ifru_stat.f || sflag <= 1) \
698 printf(m, (unsigned long long)ip6stat.f)
699
700 if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
701 perror("Warning: socket(AF_INET6)");
702 return;
703 }
704
705 if (interval && vflag > 0)
706 print_time();
707 strlcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
708 printf("ip6 on %s:\n", ifr.ifr_name);
709
710 if (ioctl(s, SIOCGIFSTAT_IN6, (char *)&ifr) < 0) {
711 perror("Warning: ioctl(SIOCGIFSTAT_IN6)");
712 goto end;
713 }
714
715 p(ifs6_in_receive, "\t%llu total input datagram%s\n");
716 p(ifs6_in_hdrerr, "\t%llu datagram%s with invalid header received\n");
717 p(ifs6_in_toobig, "\t%llu datagram%s exceeded MTU received\n");
718 p(ifs6_in_noroute, "\t%llu datagram%s with no route received\n");
719 p(ifs6_in_addrerr, "\t%llu datagram%s with invalid dst received\n");
720 p(ifs6_in_protounknown, "\t%llu datagram%s with unknown proto received\n");
721 p(ifs6_in_truncated, "\t%llu truncated datagram%s received\n");
722 p(ifs6_in_discard, "\t%llu input datagram%s discarded\n");
723 p(ifs6_in_deliver,
724 "\t%llu datagram%s delivered to an upper layer protocol\n");
725 p(ifs6_out_forward, "\t%llu datagram%s forwarded to this interface\n");
726 p(ifs6_out_request,
727 "\t%llu datagram%s sent from an upper layer protocol\n");
728 p(ifs6_out_discard, "\t%llu total discarded output datagram%s\n");
729 p(ifs6_out_fragok, "\t%llu output datagram%s fragmented\n");
730 p(ifs6_out_fragfail, "\t%llu output datagram%s failed on fragment\n");
731 p(ifs6_out_fragcreat, "\t%llu output datagram%s succeeded on fragment\n");
732 p(ifs6_reass_reqd, "\t%llu incoming datagram%s fragmented\n");
733 p(ifs6_reass_ok, "\t%llu datagram%s reassembled\n");
734 p(ifs6_atmfrag_rcvd, "\t%llu atomic fragments%s received\n");
735 p(ifs6_reass_fail, "\t%llu datagram%s failed on reassembling\n");
736 p(ifs6_in_mcast, "\t%llu multicast datagram%s received\n");
737 p(ifs6_out_mcast, "\t%llu multicast datagram%s sent\n");
738
739 p(ifs6_cantfoward_icmp6, "\t%llu ICMPv6 packet%s received for unreachable destination\n");
740 p(ifs6_addr_expiry_cnt, "\t%llu address expiry event%s reported\n");
741 p(ifs6_pfx_expiry_cnt, "\t%llu prefix expiry event%s reported\n");
742 p(ifs6_defrtr_expiry_cnt, "\t%llu default router expiry event%s reported\n");
743 end:
744 close(s);
745
746#undef p
747#undef p_5
748}
749
750static char *icmp6names[] = {
751 "#0",
752 "unreach",
753 "packet too big",
754 "time exceed",
755 "parameter problem",
756 "#5",
757 "#6",
758 "#7",
759 "#8",
760 "#9",
761 "#10",
762 "#11",
763 "#12",
764 "#13",
765 "#14",
766 "#15",
767 "#16",
768 "#17",
769 "#18",
770 "#19",
771 "#20",
772 "#21",
773 "#22",
774 "#23",
775 "#24",
776 "#25",
777 "#26",
778 "#27",
779 "#28",
780 "#29",
781 "#30",
782 "#31",
783 "#32",
784 "#33",
785 "#34",
786 "#35",
787 "#36",
788 "#37",
789 "#38",
790 "#39",
791 "#40",
792 "#41",
793 "#42",
794 "#43",
795 "#44",
796 "#45",
797 "#46",
798 "#47",
799 "#48",
800 "#49",
801 "#50",
802 "#51",
803 "#52",
804 "#53",
805 "#54",
806 "#55",
807 "#56",
808 "#57",
809 "#58",
810 "#59",
811 "#60",
812 "#61",
813 "#62",
814 "#63",
815 "#64",
816 "#65",
817 "#66",
818 "#67",
819 "#68",
820 "#69",
821 "#70",
822 "#71",
823 "#72",
824 "#73",
825 "#74",
826 "#75",
827 "#76",
828 "#77",
829 "#78",
830 "#79",
831 "#80",
832 "#81",
833 "#82",
834 "#83",
835 "#84",
836 "#85",
837 "#86",
838 "#87",
839 "#88",
840 "#89",
841 "#80",
842 "#91",
843 "#92",
844 "#93",
845 "#94",
846 "#95",
847 "#96",
848 "#97",
849 "#98",
850 "#99",
851 "#100",
852 "#101",
853 "#102",
854 "#103",
855 "#104",
856 "#105",
857 "#106",
858 "#107",
859 "#108",
860 "#109",
861 "#110",
862 "#111",
863 "#112",
864 "#113",
865 "#114",
866 "#115",
867 "#116",
868 "#117",
869 "#118",
870 "#119",
871 "#120",
872 "#121",
873 "#122",
874 "#123",
875 "#124",
876 "#125",
877 "#126",
878 "#127",
879 "echo",
880 "echo reply",
881 "multicast listener query",
882 "MLDv1 listener report",
883 "MLDv1 listener done",
884 "router solicitation",
885 "router advertisement",
886 "neighbor solicitation",
887 "neighbor advertisement",
888 "redirect",
889 "router renumbering",
890 "node information request",
891 "node information reply",
892 "inverse neighbor solicitation",
893 "inverse neighbor advertisement",
894 "MLDv2 listener report",
895 "#144",
896 "#145",
897 "#146",
898 "#147",
899 "#148",
900 "#149",
901 "#150",
902 "#151",
903 "#152",
904 "#153",
905 "#154",
906 "#155",
907 "#156",
908 "#157",
909 "#158",
910 "#159",
911 "#160",
912 "#161",
913 "#162",
914 "#163",
915 "#164",
916 "#165",
917 "#166",
918 "#167",
919 "#168",
920 "#169",
921 "#170",
922 "#171",
923 "#172",
924 "#173",
925 "#174",
926 "#175",
927 "#176",
928 "#177",
929 "#178",
930 "#179",
931 "#180",
932 "#181",
933 "#182",
934 "#183",
935 "#184",
936 "#185",
937 "#186",
938 "#187",
939 "#188",
940 "#189",
941 "#180",
942 "#191",
943 "#192",
944 "#193",
945 "#194",
946 "#195",
947 "#196",
948 "#197",
949 "#198",
950 "#199",
951 "#200",
952 "#201",
953 "#202",
954 "#203",
955 "#204",
956 "#205",
957 "#206",
958 "#207",
959 "#208",
960 "#209",
961 "#210",
962 "#211",
963 "#212",
964 "#213",
965 "#214",
966 "#215",
967 "#216",
968 "#217",
969 "#218",
970 "#219",
971 "#220",
972 "#221",
973 "#222",
974 "#223",
975 "#224",
976 "#225",
977 "#226",
978 "#227",
979 "#228",
980 "#229",
981 "#230",
982 "#231",
983 "#232",
984 "#233",
985 "#234",
986 "#235",
987 "#236",
988 "#237",
989 "#238",
990 "#239",
991 "#240",
992 "#241",
993 "#242",
994 "#243",
995 "#244",
996 "#245",
997 "#246",
998 "#247",
999 "#248",
1000 "#249",
1001 "#250",
1002 "#251",
1003 "#252",
1004 "#253",
1005 "#254",
1006 "#255",
1007};
1008
1009/*
1010 * Dump ICMP6 statistics.
1011 */
1012void
1013icmp6_stats(uint32_t off __unused, char *name, int af __unused)
1014{
1015 static struct icmp6stat picmp6stat;
1016 struct icmp6stat icmp6stat;
1017 register int i, first;
1018 int mib[4];
1019 size_t len;
1020
1021 mib[0] = CTL_NET;
1022 mib[1] = PF_INET6;
1023 mib[2] = IPPROTO_ICMPV6;
1024 mib[3] = ICMPV6CTL_STATS;
1025
1026 len = sizeof icmp6stat;
1027 memset(&icmp6stat, 0, len);
1028 if (sysctl(mib, 4, &icmp6stat, &len, (void *)0, 0) < 0)
1029 return;
1030 if (interval && vflag > 0)
1031 print_time();
1032 printf("%s:\n", name);
1033
1034#define ICMP6DIFF(f) (icmp6stat.f - picmp6stat.f)
1035#define p(f, m) if (ICMP6DIFF(f) || sflag <= 1) \
1036 printf(m, (unsigned long long)ICMP6DIFF(f), plural(ICMP6DIFF(f)))
1037#define p_5(f, m) printf(m, (unsigned long long)ICMP6DIFF(f))
1038
1039 p(icp6s_error, "\t%llu call%s to icmp_error\n");
1040 p(icp6s_canterror,
1041 "\t%llu error%s not generated because old message was icmp error or so\n");
1042 p(icp6s_toofreq,
1043 "\t%llu error%s not generated because rate limitation\n");
1044#define NELEM (sizeof(icmp6stat.icp6s_outhist)/sizeof(icmp6stat.icp6s_outhist[0]))
1045 for (first = 1, i = 0; i < NELEM; i++)
1046 if (ICMP6DIFF(icp6s_outhist[i]) != 0) {
1047 if (first) {
1048 printf("\tOutput histogram:\n");
1049 first = 0;
1050 }
1051 printf("\t\t%s: %llu\n", icmp6names[i],
1052 (unsigned long long)ICMP6DIFF(icp6s_outhist[i]));
1053 }
1054#undef NELEM
1055 p(icp6s_badcode, "\t%llu message%s with bad code fields\n");
1056 p(icp6s_tooshort, "\t%llu message%s < minimum length\n");
1057 p(icp6s_checksum, "\t%llu bad checksum%s\n");
1058 p(icp6s_badlen, "\t%llu message%s with bad length\n");
1059#define NELEM (sizeof(icmp6stat.icp6s_inhist)/sizeof(icmp6stat.icp6s_inhist[0]))
1060 for (first = 1, i = 0; i < NELEM; i++)
1061 if (ICMP6DIFF(icp6s_inhist[i]) != 0) {
1062 if (first) {
1063 printf("\tInput histogram:\n");
1064 first = 0;
1065 }
1066 printf("\t\t%s: %llu\n", icmp6names[i],
1067 (unsigned long long)ICMP6DIFF(icp6s_inhist[i]));
1068 }
1069#undef NELEM
1070 printf("\tHistogram of error messages to be generated:\n");
1071 p_5(icp6s_odst_unreach_noroute, "\t\t%llu no route\n");
1072 p_5(icp6s_odst_unreach_admin, "\t\t%llu administratively prohibited\n");
1073 p_5(icp6s_odst_unreach_beyondscope, "\t\t%llu beyond scope\n");
1074 p_5(icp6s_odst_unreach_addr, "\t\t%llu address unreachable\n");
1075 p_5(icp6s_odst_unreach_noport, "\t\t%llu port unreachable\n");
1076 p_5(icp6s_opacket_too_big, "\t\t%llu packet too big\n");
1077 p_5(icp6s_otime_exceed_transit, "\t\t%llu time exceed transit\n");
1078 p_5(icp6s_otime_exceed_reassembly, "\t\t%llu time exceed reassembly\n");
1079 p_5(icp6s_oparamprob_header, "\t\t%llu erroneous header field\n");
1080 p_5(icp6s_oparamprob_nextheader, "\t\t%llu unrecognized next header\n");
1081 p_5(icp6s_oparamprob_option, "\t\t%llu unrecognized option\n");
1082 p_5(icp6s_oredirect, "\t\t%llu redirect\n");
1083 p_5(icp6s_ounknown, "\t\t%llu unknown\n");
1084
1085 p(icp6s_reflect, "\t%llu message response%s generated\n");
1086 p(icp6s_nd_toomanyopt, "\t%llu message%s with too many ND options\n");
1087 p(icp6s_nd_badopt, "\t%qu message%s with bad ND options\n");
1088 p(icp6s_badns, "\t%qu bad neighbor solicitation message%s\n");
1089 p(icp6s_badna, "\t%qu bad neighbor advertisement message%s\n");
1090 p(icp6s_badrs, "\t%qu bad router solicitation message%s\n");
1091 p(icp6s_badra, "\t%qu bad router advertisement message%s\n");
1092 p(icp6s_badredirect, "\t%qu bad redirect message%s\n");
1093 p(icp6s_pmtuchg, "\t%llu path MTU change%s\n");
1094 p(icp6s_rfc6980_drop, "\t%qu dropped fragmented NDP message%s\n");
1095
1096 if (interval > 0)
1097 bcopy(&icmp6stat, &picmp6stat, len);
1098
1099#undef ICMP6DIFF
1100#undef p
1101#undef p_5
1102}
1103
1104/*
1105 * Dump ICMPv6 per-interface statistics based on RFC 2466.
1106 */
1107void
1108icmp6_ifstats(char *ifname)
1109{
1110 struct in6_ifreq ifr;
1111 int s;
1112#define p(f, m) if (ifr.ifr_ifru.ifru_icmp6stat.f || sflag <= 1) \
1113 printf(m, (unsigned long long)ifr.ifr_ifru.ifru_icmp6stat.f, plural(ifr.ifr_ifru.ifru_icmp6stat.f))
1114
1115 if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
1116 perror("Warning: socket(AF_INET6)");
1117 return;
1118 }
1119
1120 if (interval && vflag > 0)
1121 print_time();
1122 strlcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
1123 printf("icmp6 on %s:\n", ifr.ifr_name);
1124
1125 if (ioctl(s, SIOCGIFSTAT_ICMP6, (char *)&ifr) < 0) {
1126 perror("Warning: ioctl(SIOCGIFSTAT_ICMP6)");
1127 goto end;
1128 }
1129
1130 p(ifs6_in_msg, "\t%llu total input message%s\n");
1131 p(ifs6_in_error, "\t%llu total input error message%s\n");
1132 p(ifs6_in_dstunreach, "\t%llu input destination unreachable error%s\n");
1133 p(ifs6_in_adminprohib, "\t%llu input administratively prohibited error%s\n");
1134 p(ifs6_in_timeexceed, "\t%llu input time exceeded error%s\n");
1135 p(ifs6_in_paramprob, "\t%llu input parameter problem error%s\n");
1136 p(ifs6_in_pkttoobig, "\t%llu input packet too big error%s\n");
1137 p(ifs6_in_echo, "\t%llu input echo request%s\n");
1138 p(ifs6_in_echoreply, "\t%llu input echo reply%s\n");
1139 p(ifs6_in_routersolicit, "\t%llu input router solicitation%s\n");
1140 p(ifs6_in_routeradvert, "\t%llu input router advertisement%s\n");
1141 p(ifs6_in_neighborsolicit, "\t%llu input neighbor solicitation%s\n");
1142 p(ifs6_in_neighboradvert, "\t%llu input neighbor advertisement%s\n");
1143 p(ifs6_in_redirect, "\t%llu input redirect%s\n");
1144 p(ifs6_in_mldquery, "\t%llu input MLD query%s\n");
1145 p(ifs6_in_mldreport, "\t%llu input MLD report%s\n");
1146 p(ifs6_in_mlddone, "\t%llu input MLD done%s\n");
1147
1148 p(ifs6_out_msg, "\t%llu total output message%s\n");
1149 p(ifs6_out_error, "\t%llu total output error message%s\n");
1150 p(ifs6_out_dstunreach, "\t%llu output destination unreachable error%s\n");
1151 p(ifs6_out_adminprohib, "\t%llu output administratively prohibited error%s\n");
1152 p(ifs6_out_timeexceed, "\t%llu output time exceeded error%s\n");
1153 p(ifs6_out_paramprob, "\t%llu output parameter problem error%s\n");
1154 p(ifs6_out_pkttoobig, "\t%llu output packet too big error%s\n");
1155 p(ifs6_out_echo, "\t%llu output echo request%s\n");
1156 p(ifs6_out_echoreply, "\t%llu output echo reply%s\n");
1157 p(ifs6_out_routersolicit, "\t%llu output router solicitation%s\n");
1158 p(ifs6_out_routeradvert, "\t%llu output router advertisement%s\n");
1159 p(ifs6_out_neighborsolicit, "\t%llu output neighbor solicitation%s\n");
1160 p(ifs6_out_neighboradvert, "\t%llu output neighbor advertisement%s\n");
1161 p(ifs6_out_redirect, "\t%llu output redirect%s\n");
1162 p(ifs6_out_mldquery, "\t%llu output MLD query%s\n");
1163 p(ifs6_out_mldreport, "\t%llu output MLD report%s\n");
1164 p(ifs6_out_mlddone, "\t%llu output MLD done%s\n");
1165
1166 end:
1167 close(s);
1168#undef p
1169}
1170
1171/*
1172 * Dump raw ip6 statistics structure.
1173 */
1174void
1175rip6_stats(uint32_t off __unused, char *name, int af __unused)
1176{
1177 static struct rip6stat prip6stat;
1178 struct rip6stat rip6stat;
1179 u_quad_t delivered;
1180 int mib[4];
1181 size_t l;
1182
1183 mib[0] = CTL_NET;
1184 mib[1] = PF_INET6;
1185 mib[2] = IPPROTO_IPV6;
1186 mib[3] = IPV6CTL_RIP6STATS;
1187 l = sizeof(rip6stat);
1188 if (sysctl(mib, 4, &rip6stat, &l, NULL, 0) < 0) {
1189 perror("Warning: sysctl(net.inet6.ip6.rip6stats)");
1190 return;
1191 }
1192
1193 if (interval && vflag > 0)
1194 print_time();
1195 printf("%s:\n", name);
1196
1197#define RIP6DIFF(f) (rip6stat.f - prip6stat.f)
1198#define p(f, m) if (RIP6DIFF(f) || sflag <= 1) \
1199 printf(m, (unsigned long long)RIP6DIFF(f), plural(RIP6DIFF(f)))
1200 p(rip6s_ipackets, "\t%llu message%s received\n");
1201 p(rip6s_isum, "\t%llu checksum calculation%s on inbound\n");
1202 p(rip6s_badsum, "\t%llu message%s with bad checksum\n");
1203 p(rip6s_nosock, "\t%llu message%s dropped due to no socket\n");
1204 p(rip6s_nosockmcast,
1205 "\t%llu multicast message%s dropped due to no socket\n");
1206 p(rip6s_fullsock,
1207 "\t%llu message%s dropped due to full socket buffers\n");
1208 delivered = RIP6DIFF(rip6s_ipackets) -
1209 RIP6DIFF(rip6s_badsum) -
1210 RIP6DIFF(rip6s_nosock) -
1211 RIP6DIFF(rip6s_nosockmcast) -
1212 RIP6DIFF(rip6s_fullsock);
1213 if (delivered || sflag <= 1)
1214 printf("\t%llu delivered\n", (unsigned long long)delivered);
1215 p(rip6s_opackets, "\t%llu datagram%s output\n");
1216
1217 if (interval > 0)
1218 bcopy(&rip6stat, &prip6stat, l);
1219
1220#undef RIP6DIFF
1221#undef p
1222}
1223
1224/*
1225 * Pretty print an Internet address (net address + port).
1226 * If the nflag was specified, use numbers instead of names.
1227 */
1228#ifdef SRVCACHE
1229extern struct servent * _serv_cache_getservbyport(int port, char *proto);
1230
1231#define GETSERVBYPORT6(port, proto, ret)\
1232{\
1233 if (strcmp((proto), "tcp6") == 0)\
1234 (ret) = _serv_cache_getservbyport((int)(port), "tcp");\
1235 else if (strcmp((proto), "udp6") == 0)\
1236 (ret) = _serv_cache_getservbyport((int)(port), "udp");\
1237 else\
1238 (ret) = _serv_cache_getservbyport((int)(port), (proto));\
1239};
1240#else
1241#define GETSERVBYPORT6(port, proto, ret)\
1242{\
1243 if (strcmp((proto), "tcp6") == 0)\
1244 (ret) = getservbyport((int)(port), "tcp");\
1245 else if (strcmp((proto), "udp6") == 0)\
1246 (ret) = getservbyport((int)(port), "udp");\
1247 else\
1248 (ret) = getservbyport((int)(port), (proto));\
1249};
1250#endif
1251void
1252inet6print(struct in6_addr *in6, int port, char *proto, int numeric)
1253{
1254 struct servent *sp = 0;
1255 char line[80], *cp;
1256 int width;
1257
1258 snprintf(line, sizeof(line), "%.*s.", lflag ? 39 :
1259 (Aflag && !numeric) ? 12 : 16, inet6name(in6));
1260 cp = index(line, '\0');
1261 if (!numeric && port)
1262 GETSERVBYPORT6(port, proto, sp);
1263 if (sp || port == 0)
1264 snprintf(cp, sizeof(line) - (cp - line), "%.15s", sp ? sp->s_name : "*");
1265 else
1266 snprintf(cp, sizeof(line) - (cp - line), "%d", ntohs((u_short)port));
1267 width = lflag ? 45 : Aflag ? 18 : 22;
1268 printf("%-*.*s ", width, width, line);
1269}
1270
1271/*
1272 * Construct an Internet address representation.
1273 * If the nflag has been supplied, give
1274 * numeric value, otherwise try for symbolic name.
1275 */
1276
1277char *
1278inet6name(struct in6_addr *in6p)
1279{
1280 register char *cp;
1281 static char line[50];
1282 struct hostent *hp;
1283 static char domain[MAXHOSTNAMELEN];
1284 static int first = 1;
1285 char hbuf[NI_MAXHOST];
1286 struct sockaddr_in6 sin6;
1287 const int niflag = NI_NUMERICHOST;
1288
1289 if (first && !nflag) {
1290 first = 0;
1291 if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
1292 (cp = index(domain, '.')))
1293 (void) memmove(domain, cp + 1, strlen(cp + 1) + 1);
1294 else
1295 domain[0] = 0;
1296 }
1297 cp = 0;
1298 if (!nflag && !IN6_IS_ADDR_UNSPECIFIED(in6p)) {
1299 hp = gethostbyaddr((char *)in6p, sizeof(*in6p), AF_INET6);
1300 if (hp) {
1301 if ((cp = index(hp->h_name, '.')) &&
1302 !strcmp(cp + 1, domain))
1303 *cp = 0;
1304 cp = hp->h_name;
1305 }
1306 }
1307 if (IN6_IS_ADDR_UNSPECIFIED(in6p))
1308 strlcpy(line, "*", sizeof(line));
1309 else if (cp)
1310 strlcpy(line, cp, sizeof(line));
1311 else {
1312 memset(&sin6, 0, sizeof(sin6));
1313 sin6.sin6_len = sizeof(sin6);
1314 sin6.sin6_family = AF_INET6;
1315 sin6.sin6_addr = *in6p;
1316
1317 if (IN6_IS_ADDR_LINKLOCAL(in6p) ||
1318 IN6_IS_ADDR_MC_NODELOCAL(in6p) ||
1319 IN6_IS_ADDR_MC_LINKLOCAL(in6p)) {
1320 sin6.sin6_scope_id =
1321 ntohs(*(u_int16_t *)&in6p->s6_addr[2]);
1322 sin6.sin6_addr.s6_addr[2] = 0;
1323 sin6.sin6_addr.s6_addr[3] = 0;
1324 }
1325
1326 if (getnameinfo((struct sockaddr *)&sin6, sin6.sin6_len,
1327 hbuf, sizeof(hbuf), NULL, 0, niflag) != 0)
1328 strlcpy(hbuf, "?", sizeof(hbuf));
1329 strlcpy(line, hbuf, sizeof(line));
1330 }
1331 return (line);
1332}
1333#endif /*INET6*/