xref: /freebsd/usr.bin/netstat/inet.c (revision 5521ff5a4d1929056e7ffc982fac3341ca54df7c)
1 /*
2  * Copyright (c) 1983, 1988, 1993, 1995
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 #ifndef lint
35 /*
36 static char sccsid[] = "@(#)inet.c	8.5 (Berkeley) 5/24/95";
37 */
38 static const char rcsid[] =
39   "$FreeBSD$";
40 #endif /* not lint */
41 
42 #include <sys/param.h>
43 #include <sys/queue.h>
44 #include <sys/socket.h>
45 #include <sys/socketvar.h>
46 #include <sys/sysctl.h>
47 #include <sys/protosw.h>
48 
49 #include <net/route.h>
50 #include <netinet/in.h>
51 #include <netinet/in_systm.h>
52 #include <netinet/ip.h>
53 #ifdef INET6
54 #include <netinet/ip6.h>
55 #endif /* INET6 */
56 #include <netinet/in_pcb.h>
57 #include <netinet/ip_icmp.h>
58 #include <netinet/icmp_var.h>
59 #include <netinet/igmp_var.h>
60 #include <netinet/ip_var.h>
61 #include <netinet/tcp.h>
62 #include <netinet/tcpip.h>
63 #include <netinet/tcp_seq.h>
64 #define TCPSTATES
65 #include <netinet/tcp_fsm.h>
66 #include <netinet/tcp_timer.h>
67 #include <netinet/tcp_var.h>
68 #include <netinet/tcp_debug.h>
69 #include <netinet/udp.h>
70 #include <netinet/udp_var.h>
71 
72 #include <arpa/inet.h>
73 #include <err.h>
74 #include <errno.h>
75 #include <libutil.h>
76 #include <netdb.h>
77 #include <stdio.h>
78 #include <stdlib.h>
79 #include <string.h>
80 #include <unistd.h>
81 #include "netstat.h"
82 
83 char	*inetname (struct in_addr *);
84 void	inetprint (struct in_addr *, int, char *, int);
85 #ifdef INET6
86 extern void	inet6print (struct in6_addr *, int, char *, int);
87 static int udp_done, tcp_done;
88 #endif /* INET6 */
89 
90 /*
91  * Print a summary of connections related to an Internet
92  * protocol.  For TCP, also give state of connection.
93  * Listening processes (aflag) are suppressed unless the
94  * -a (all) flag is specified.
95  */
96 void
97 protopr(u_long proto,		/* for sysctl version we pass proto # */
98 	char *name, int af)
99 {
100 	int istcp;
101 	static int first = 1;
102 	char *buf;
103 	const char *mibvar;
104 	struct tcpcb *tp = NULL;
105 	struct inpcb *inp;
106 	struct xinpgen *xig, *oxig;
107 	struct xsocket *so;
108 	size_t len;
109 
110 	istcp = 0;
111 	switch (proto) {
112 	case IPPROTO_TCP:
113 #ifdef INET6
114 		if (tcp_done != 0)
115 			return;
116 		else
117 			tcp_done = 1;
118 #endif
119 		istcp = 1;
120 		mibvar = "net.inet.tcp.pcblist";
121 		break;
122 	case IPPROTO_UDP:
123 #ifdef INET6
124 		if (udp_done != 0)
125 			return;
126 		else
127 			udp_done = 1;
128 #endif
129 		mibvar = "net.inet.udp.pcblist";
130 		break;
131 	case IPPROTO_DIVERT:
132 		mibvar = "net.inet.divert.pcblist";
133 		break;
134 	default:
135 		mibvar = "net.inet.raw.pcblist";
136 		break;
137 	}
138 	len = 0;
139 	if (sysctlbyname(mibvar, 0, &len, 0, 0) < 0) {
140 		if (errno != ENOENT)
141 			warn("sysctl: %s", mibvar);
142 		return;
143 	}
144 	if ((buf = malloc(len)) == 0) {
145 		warn("malloc %lu bytes", (u_long)len);
146 		return;
147 	}
148 	if (sysctlbyname(mibvar, buf, &len, 0, 0) < 0) {
149 		warn("sysctl: %s", mibvar);
150 		free(buf);
151 		return;
152 	}
153 
154 	oxig = xig = (struct xinpgen *)buf;
155 	for (xig = (struct xinpgen *)((char *)xig + xig->xig_len);
156 	     xig->xig_len > sizeof(struct xinpgen);
157 	     xig = (struct xinpgen *)((char *)xig + xig->xig_len)) {
158 		if (istcp) {
159 			tp = &((struct xtcpcb *)xig)->xt_tp;
160 			inp = &((struct xtcpcb *)xig)->xt_inp;
161 			so = &((struct xtcpcb *)xig)->xt_socket;
162 		} else {
163 			inp = &((struct xinpcb *)xig)->xi_inp;
164 			so = &((struct xinpcb *)xig)->xi_socket;
165 		}
166 
167 		/* Ignore sockets for protocols other than the desired one. */
168 		if (so->xso_protocol != (int)proto)
169 			continue;
170 
171 		/* Ignore PCBs which were freed during copyout. */
172 		if (inp->inp_gencnt > oxig->xig_gen)
173 			continue;
174 
175 		if ((af == AF_INET && (inp->inp_vflag & INP_IPV4) == 0)
176 #ifdef INET6
177 		    || (af == AF_INET6 && (inp->inp_vflag & INP_IPV6) == 0)
178 #endif /* INET6 */
179 		    || (af == AF_UNSPEC && ((inp->inp_vflag & INP_IPV4) == 0
180 #ifdef INET6
181 					    && (inp->inp_vflag &
182 						INP_IPV6) == 0
183 #endif /* INET6 */
184 			))
185 		    )
186 			continue;
187 		if (!aflag &&
188 		    (
189 		     (af == AF_INET &&
190 		      inet_lnaof(inp->inp_laddr) == INADDR_ANY)
191 #ifdef INET6
192 		     || (af == AF_INET6 &&
193 			 IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr))
194 #endif /* INET6 */
195 		     || (af == AF_UNSPEC &&
196 			 (((inp->inp_vflag & INP_IPV4) != 0 &&
197 			   inet_lnaof(inp->inp_laddr) == INADDR_ANY)
198 #ifdef INET6
199 			  || ((inp->inp_vflag & INP_IPV6) != 0 &&
200 			      IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr))
201 #endif
202 			  ))
203 		     ))
204 			continue;
205 
206 		if (first) {
207 			if (!Lflag) {
208 				printf("Active Internet connections");
209 				if (aflag)
210 					printf(" (including servers)");
211 			} else
212 				printf(
213 	"Current listen queue sizes (qlen/incqlen/maxqlen)");
214 			putchar('\n');
215 			if (Aflag)
216 				printf("%-8.8s ", "Socket");
217 			if (Lflag)
218 				printf("%-14.14s %-22.22s\n",
219 					"Listen", "Local Address");
220 			else
221 				printf((Aflag && !Wflag) ?
222 		"%-5.5s %-6.6s %-6.6s  %-18.18s %-18.18s %s\n" :
223 		"%-5.5s %-6.6s %-6.6s  %-22.22s %-22.22s %s\n",
224 					"Proto", "Recv-Q", "Send-Q",
225 					"Local Address", "Foreign Address",
226 					"(state)");
227 			first = 0;
228 		}
229 		if (Aflag) {
230 			if (istcp)
231 				printf("%8lx ", (u_long)inp->inp_ppcb);
232 			else
233 				printf("%8lx ", (u_long)so->so_pcb);
234 		}
235 		if (Lflag)
236 			if (so->so_qlimit) {
237 				char buf[15];
238 
239 				snprintf(buf, 15, "%d/%d/%d", so->so_qlen,
240 					 so->so_incqlen, so->so_qlimit);
241 				printf("%-14.14s ", buf);
242 			} else
243 				continue;
244 		else {
245 			const char *vchar;
246 
247 #ifdef INET6
248 			if ((inp->inp_vflag & INP_IPV6) != 0)
249 				vchar = ((inp->inp_vflag & INP_IPV4) != 0)
250 					? "46" : "6 ";
251 			else
252 #endif
253 			vchar = ((inp->inp_vflag & INP_IPV4) != 0)
254 					? "4 " : "  ";
255 
256 			printf("%-3.3s%-2.2s %6ld %6ld  ", name, vchar,
257 			       so->so_rcv.sb_cc,
258 			       so->so_snd.sb_cc);
259 		}
260 		if (numeric_port) {
261 			if (inp->inp_vflag & INP_IPV4) {
262 				inetprint(&inp->inp_laddr, (int)inp->inp_lport,
263 					  name, 1);
264 				if (!Lflag)
265 					inetprint(&inp->inp_faddr,
266 						  (int)inp->inp_fport, name, 1);
267 			}
268 #ifdef INET6
269 			else if (inp->inp_vflag & INP_IPV6) {
270 				inet6print(&inp->in6p_laddr,
271 					   (int)inp->inp_lport, name, 1);
272 				if (!Lflag)
273 					inet6print(&inp->in6p_faddr,
274 						   (int)inp->inp_fport, name, 1);
275 			} /* else nothing printed now */
276 #endif /* INET6 */
277 		} else if (inp->inp_flags & INP_ANONPORT) {
278 			if (inp->inp_vflag & INP_IPV4) {
279 				inetprint(&inp->inp_laddr, (int)inp->inp_lport,
280 					  name, 1);
281 				if (!Lflag)
282 					inetprint(&inp->inp_faddr,
283 						  (int)inp->inp_fport, name, 0);
284 			}
285 #ifdef INET6
286 			else if (inp->inp_vflag & INP_IPV6) {
287 				inet6print(&inp->in6p_laddr,
288 					   (int)inp->inp_lport, name, 1);
289 				if (!Lflag)
290 					inet6print(&inp->in6p_faddr,
291 						   (int)inp->inp_fport, name, 0);
292 			} /* else nothing printed now */
293 #endif /* INET6 */
294 		} else {
295 			if (inp->inp_vflag & INP_IPV4) {
296 				inetprint(&inp->inp_laddr, (int)inp->inp_lport,
297 					  name, 0);
298 				if (!Lflag)
299 					inetprint(&inp->inp_faddr,
300 						  (int)inp->inp_fport, name,
301 						  inp->inp_lport !=
302 							inp->inp_fport);
303 			}
304 #ifdef INET6
305 			else if (inp->inp_vflag & INP_IPV6) {
306 				inet6print(&inp->in6p_laddr,
307 					   (int)inp->inp_lport, name, 0);
308 				if (!Lflag)
309 					inet6print(&inp->in6p_faddr,
310 						   (int)inp->inp_fport, name,
311 						   inp->inp_lport !=
312 							inp->inp_fport);
313 			} /* else nothing printed now */
314 #endif /* INET6 */
315 		}
316 		if (istcp && !Lflag) {
317 			if (tp->t_state < 0 || tp->t_state >= TCP_NSTATES)
318 				printf("%d", tp->t_state);
319                       else {
320 				printf("%s", tcpstates[tp->t_state]);
321 #if defined(TF_NEEDSYN) && defined(TF_NEEDFIN)
322                               /* Show T/TCP `hidden state' */
323                               if (tp->t_flags & (TF_NEEDSYN|TF_NEEDFIN))
324                                       putchar('*');
325 #endif /* defined(TF_NEEDSYN) && defined(TF_NEEDFIN) */
326                       }
327 		}
328 		putchar('\n');
329 	}
330 	if (xig != oxig && xig->xig_gen != oxig->xig_gen) {
331 		if (oxig->xig_count > xig->xig_count) {
332 			printf("Some %s sockets may have been deleted.\n",
333 			       name);
334 		} else if (oxig->xig_count < xig->xig_count) {
335 			printf("Some %s sockets may have been created.\n",
336 			       name);
337 		} else {
338 			printf("Some %s sockets may have been created or deleted",
339 			       name);
340 		}
341 	}
342 	free(buf);
343 }
344 
345 /*
346  * Dump TCP statistics structure.
347  */
348 void
349 tcp_stats(u_long off __unused, char *name, int af __unused)
350 {
351 	struct tcpstat tcpstat, zerostat;
352 	size_t len = sizeof tcpstat;
353 
354 	if (zflag)
355 		memset(&zerostat, 0, len);
356 	if (sysctlbyname("net.inet.tcp.stats", &tcpstat, &len,
357 	    zflag ? &zerostat : NULL, zflag ? len : 0) < 0) {
358 		warn("sysctl: net.inet.tcp.stats");
359 		return;
360 	}
361 
362 #ifdef INET6
363 	if (tcp_done != 0)
364 		return;
365 	else
366 		tcp_done = 1;
367 #endif
368 
369 	printf ("%s:\n", name);
370 
371 #define	p(f, m) if (tcpstat.f || sflag <= 1) \
372     printf(m, tcpstat.f, plural(tcpstat.f))
373 #define	p1a(f, m) if (tcpstat.f || sflag <= 1) \
374     printf(m, tcpstat.f)
375 #define	p2(f1, f2, m) if (tcpstat.f1 || tcpstat.f2 || sflag <= 1) \
376     printf(m, tcpstat.f1, plural(tcpstat.f1), tcpstat.f2, plural(tcpstat.f2))
377 #define	p2a(f1, f2, m) if (tcpstat.f1 || tcpstat.f2 || sflag <= 1) \
378     printf(m, tcpstat.f1, plural(tcpstat.f1), tcpstat.f2)
379 #define	p3(f, m) if (tcpstat.f || sflag <= 1) \
380     printf(m, tcpstat.f, plurales(tcpstat.f))
381 
382 	p(tcps_sndtotal, "\t%lu packet%s sent\n");
383 	p2(tcps_sndpack,tcps_sndbyte,
384 		"\t\t%lu data packet%s (%lu byte%s)\n");
385 	p2(tcps_sndrexmitpack, tcps_sndrexmitbyte,
386 		"\t\t%lu data packet%s (%lu byte%s) retransmitted\n");
387 	p(tcps_mturesent, "\t\t%lu resend%s initiated by MTU discovery\n");
388 	p2a(tcps_sndacks, tcps_delack,
389 		"\t\t%lu ack-only packet%s (%lu delayed)\n");
390 	p(tcps_sndurg, "\t\t%lu URG only packet%s\n");
391 	p(tcps_sndprobe, "\t\t%lu window probe packet%s\n");
392 	p(tcps_sndwinup, "\t\t%lu window update packet%s\n");
393 	p(tcps_sndctrl, "\t\t%lu control packet%s\n");
394 	p(tcps_rcvtotal, "\t%lu packet%s received\n");
395 	p2(tcps_rcvackpack, tcps_rcvackbyte, "\t\t%lu ack%s (for %lu byte%s)\n");
396 	p(tcps_rcvdupack, "\t\t%lu duplicate ack%s\n");
397 	p(tcps_rcvacktoomuch, "\t\t%lu ack%s for unsent data\n");
398 	p2(tcps_rcvpack, tcps_rcvbyte,
399 		"\t\t%lu packet%s (%lu byte%s) received in-sequence\n");
400 	p2(tcps_rcvduppack, tcps_rcvdupbyte,
401 		"\t\t%lu completely duplicate packet%s (%lu byte%s)\n");
402 	p(tcps_pawsdrop, "\t\t%lu old duplicate packet%s\n");
403 	p2(tcps_rcvpartduppack, tcps_rcvpartdupbyte,
404 		"\t\t%lu packet%s with some dup. data (%lu byte%s duped)\n");
405 	p2(tcps_rcvoopack, tcps_rcvoobyte,
406 		"\t\t%lu out-of-order packet%s (%lu byte%s)\n");
407 	p2(tcps_rcvpackafterwin, tcps_rcvbyteafterwin,
408 		"\t\t%lu packet%s (%lu byte%s) of data after window\n");
409 	p(tcps_rcvwinprobe, "\t\t%lu window probe%s\n");
410 	p(tcps_rcvwinupd, "\t\t%lu window update packet%s\n");
411 	p(tcps_rcvafterclose, "\t\t%lu packet%s received after close\n");
412 	p(tcps_rcvbadsum, "\t\t%lu discarded for bad checksum%s\n");
413 	p(tcps_rcvbadoff, "\t\t%lu discarded for bad header offset field%s\n");
414 	p1a(tcps_rcvshort, "\t\t%lu discarded because packet too short\n");
415 	p(tcps_connattempt, "\t%lu connection request%s\n");
416 	p(tcps_accepts, "\t%lu connection accept%s\n");
417 	p(tcps_badsyn, "\t%lu bad connection attempt%s\n");
418 	p(tcps_listendrop, "\t%lu listen queue overflow%s\n");
419 	p(tcps_connects, "\t%lu connection%s established (including accepts)\n");
420 	p2(tcps_closed, tcps_drops,
421 		"\t%lu connection%s closed (including %lu drop%s)\n");
422 	p(tcps_cachedrtt, "\t\t%lu connection%s updated cached RTT on close\n");
423 	p(tcps_cachedrttvar,
424 	  "\t\t%lu connection%s updated cached RTT variance on close\n");
425 	p(tcps_cachedssthresh,
426 	  "\t\t%lu connection%s updated cached ssthresh on close\n");
427 	p(tcps_conndrops, "\t%lu embryonic connection%s dropped\n");
428 	p2(tcps_rttupdated, tcps_segstimed,
429 		"\t%lu segment%s updated rtt (of %lu attempt%s)\n");
430 	p(tcps_rexmttimeo, "\t%lu retransmit timeout%s\n");
431 	p(tcps_timeoutdrop, "\t\t%lu connection%s dropped by rexmit timeout\n");
432 	p(tcps_persisttimeo, "\t%lu persist timeout%s\n");
433 	p(tcps_persistdrop, "\t\t%lu connection%s dropped by persist timeout\n");
434 	p(tcps_keeptimeo, "\t%lu keepalive timeout%s\n");
435 	p(tcps_keepprobe, "\t\t%lu keepalive probe%s sent\n");
436 	p(tcps_keepdrops, "\t\t%lu connection%s dropped by keepalive\n");
437 	p(tcps_predack, "\t%lu correct ACK header prediction%s\n");
438 	p(tcps_preddat, "\t%lu correct data packet header prediction%s\n");
439 #undef p
440 #undef p1a
441 #undef p2
442 #undef p2a
443 #undef p3
444 }
445 
446 /*
447  * Dump UDP statistics structure.
448  */
449 void
450 udp_stats(u_long off __unused, char *name, int af __unused)
451 {
452 	struct udpstat udpstat, zerostat;
453 	size_t len = sizeof udpstat;
454 	u_long delivered;
455 
456 	if (zflag)
457 		memset(&zerostat, 0, len);
458 	if (sysctlbyname("net.inet.udp.stats", &udpstat, &len,
459 	    zflag ? &zerostat : NULL, zflag ? len : 0) < 0) {
460 		warn("sysctl: net.inet.udp.stats");
461 		return;
462 	}
463 
464 #ifdef INET6
465 	if (udp_done != 0)
466 		return;
467 	else
468 		udp_done = 1;
469 #endif
470 
471 	printf("%s:\n", name);
472 #define	p(f, m) if (udpstat.f || sflag <= 1) \
473     printf(m, udpstat.f, plural(udpstat.f))
474 #define	p1a(f, m) if (udpstat.f || sflag <= 1) \
475     printf(m, udpstat.f)
476 	p(udps_ipackets, "\t%lu datagram%s received\n");
477 	p1a(udps_hdrops, "\t%lu with incomplete header\n");
478 	p1a(udps_badlen, "\t%lu with bad data length field\n");
479 	p1a(udps_badsum, "\t%lu with bad checksum\n");
480 	p1a(udps_nosum, "\t%lu with no checksum\n");
481 	p1a(udps_noport, "\t%lu dropped due to no socket\n");
482 	p(udps_noportbcast,
483 	    "\t%lu broadcast/multicast datagram%s dropped due to no socket\n");
484 	p1a(udps_fullsock, "\t%lu dropped due to full socket buffers\n");
485 	p1a(udpps_pcbhashmiss, "\t%lu not for hashed pcb\n");
486 	delivered = udpstat.udps_ipackets -
487 		    udpstat.udps_hdrops -
488 		    udpstat.udps_badlen -
489 		    udpstat.udps_badsum -
490 		    udpstat.udps_noport -
491 		    udpstat.udps_noportbcast -
492 		    udpstat.udps_fullsock;
493 	if (delivered || sflag <= 1)
494 		printf("\t%lu delivered\n", delivered);
495 	p(udps_opackets, "\t%lu datagram%s output\n");
496 #undef p
497 #undef p1a
498 }
499 
500 /*
501  * Dump IP statistics structure.
502  */
503 void
504 ip_stats(u_long off __unused, char *name, int af __unused)
505 {
506 	struct ipstat ipstat, zerostat;
507 	size_t len = sizeof ipstat;
508 
509 	if (zflag)
510 		memset(&zerostat, 0, len);
511 	if (sysctlbyname("net.inet.ip.stats", &ipstat, &len,
512 	    zflag ? &zerostat : NULL, zflag ? len : 0) < 0) {
513 		warn("sysctl: net.inet.ip.stats");
514 		return;
515 	}
516 
517 	printf("%s:\n", name);
518 
519 #define	p(f, m) if (ipstat.f || sflag <= 1) \
520     printf(m, ipstat.f, plural(ipstat.f))
521 #define	p1a(f, m) if (ipstat.f || sflag <= 1) \
522     printf(m, ipstat.f)
523 
524 	p(ips_total, "\t%lu total packet%s received\n");
525 	p(ips_badsum, "\t%lu bad header checksum%s\n");
526 	p1a(ips_toosmall, "\t%lu with size smaller than minimum\n");
527 	p1a(ips_tooshort, "\t%lu with data size < data length\n");
528 	p1a(ips_toolong, "\t%lu with ip length > max ip packet size\n");
529 	p1a(ips_badhlen, "\t%lu with header length < data size\n");
530 	p1a(ips_badlen, "\t%lu with data length < header length\n");
531 	p1a(ips_badoptions, "\t%lu with bad options\n");
532 	p1a(ips_badvers, "\t%lu with incorrect version number\n");
533 	p(ips_fragments, "\t%lu fragment%s received\n");
534 	p(ips_fragdropped, "\t%lu fragment%s dropped (dup or out of space)\n");
535 	p(ips_fragtimeout, "\t%lu fragment%s dropped after timeout\n");
536 	p(ips_reassembled, "\t%lu packet%s reassembled ok\n");
537 	p(ips_delivered, "\t%lu packet%s for this host\n");
538 	p(ips_noproto, "\t%lu packet%s for unknown/unsupported protocol\n");
539 	p(ips_forward, "\t%lu packet%s forwarded");
540 	p(ips_fastforward, " (%lu packet%s fast forwarded)");
541 	if (ipstat.ips_forward || sflag <= 1)
542 		putchar('\n');
543 	p(ips_cantforward, "\t%lu packet%s not forwardable\n");
544 	p(ips_notmember,
545 	  "\t%lu packet%s received for unknown multicast group\n");
546 	p(ips_redirectsent, "\t%lu redirect%s sent\n");
547 	p(ips_localout, "\t%lu packet%s sent from this host\n");
548 	p(ips_rawout, "\t%lu packet%s sent with fabricated ip header\n");
549 	p(ips_odropped,
550 	  "\t%lu output packet%s dropped due to no bufs, etc.\n");
551 	p(ips_noroute, "\t%lu output packet%s discarded due to no route\n");
552 	p(ips_fragmented, "\t%lu output datagram%s fragmented\n");
553 	p(ips_ofragments, "\t%lu fragment%s created\n");
554 	p(ips_cantfrag, "\t%lu datagram%s that can't be fragmented\n");
555 	p(ips_nogif, "\t%lu tunneling packet%s that can't find gif\n");
556 	p(ips_badaddr, "\t%lu datagram%s with bad address in header\n");
557 #undef p
558 #undef p1a
559 }
560 
561 static	char *icmpnames[] = {
562 	"echo reply",
563 	"#1",
564 	"#2",
565 	"destination unreachable",
566 	"source quench",
567 	"routing redirect",
568 	"#6",
569 	"#7",
570 	"echo",
571 	"router advertisement",
572 	"router solicitation",
573 	"time exceeded",
574 	"parameter problem",
575 	"time stamp",
576 	"time stamp reply",
577 	"information request",
578 	"information request reply",
579 	"address mask request",
580 	"address mask reply",
581 };
582 
583 /*
584  * Dump ICMP statistics.
585  */
586 void
587 icmp_stats(u_long off __unused, char *name, int af __unused)
588 {
589 	struct icmpstat icmpstat, zerostat;
590 	int i, first;
591 	int mib[4];		/* CTL_NET + PF_INET + IPPROTO_ICMP + req */
592 	size_t len;
593 
594 	mib[0] = CTL_NET;
595 	mib[1] = PF_INET;
596 	mib[2] = IPPROTO_ICMP;
597 	mib[3] = ICMPCTL_STATS;
598 
599 	len = sizeof icmpstat;
600 	if (zflag)
601 		memset(&zerostat, 0, len);
602 	if (sysctl(mib, 4, &icmpstat, &len,
603 	    zflag ? &zerostat : NULL, zflag ? len : 0) < 0) {
604 		warn("sysctl: net.inet.icmp.stats");
605 		return;
606 	}
607 
608 	printf("%s:\n", name);
609 
610 #define	p(f, m) if (icmpstat.f || sflag <= 1) \
611     printf(m, icmpstat.f, plural(icmpstat.f))
612 #define	p1a(f, m) if (icmpstat.f || sflag <= 1) \
613     printf(m, icmpstat.f)
614 
615 	p(icps_error, "\t%lu call%s to icmp_error\n");
616 	p(icps_oldicmp,
617 	    "\t%lu error%s not generated 'cuz old message was icmp\n");
618 	for (first = 1, i = 0; i < ICMP_MAXTYPE + 1; i++)
619 		if (icmpstat.icps_outhist[i] != 0) {
620 			if (first) {
621 				printf("\tOutput histogram:\n");
622 				first = 0;
623 			}
624 			printf("\t\t%s: %lu\n", icmpnames[i],
625 				icmpstat.icps_outhist[i]);
626 		}
627 	p(icps_badcode, "\t%lu message%s with bad code fields\n");
628 	p(icps_tooshort, "\t%lu message%s < minimum length\n");
629 	p(icps_checksum, "\t%lu bad checksum%s\n");
630 	p(icps_badlen, "\t%lu message%s with bad length\n");
631 	p1a(icps_bmcastecho, "\t%lu multicast echo requests ignored\n");
632 	p1a(icps_bmcasttstamp, "\t%lu multicast timestamp requests ignored\n");
633 	for (first = 1, i = 0; i < ICMP_MAXTYPE + 1; i++)
634 		if (icmpstat.icps_inhist[i] != 0) {
635 			if (first) {
636 				printf("\tInput histogram:\n");
637 				first = 0;
638 			}
639 			printf("\t\t%s: %lu\n", icmpnames[i],
640 				icmpstat.icps_inhist[i]);
641 		}
642 	p(icps_reflect, "\t%lu message response%s generated\n");
643 #undef p
644 #undef p1a
645 	mib[3] = ICMPCTL_MASKREPL;
646 	len = sizeof i;
647 	if (sysctl(mib, 4, &i, &len, (void *)0, 0) < 0)
648 		return;
649 	printf("\tICMP address mask responses are %sabled\n",
650 	       i ? "en" : "dis");
651 }
652 
653 /*
654  * Dump IGMP statistics structure.
655  */
656 void
657 igmp_stats(u_long off __unused, char *name, int af __unused)
658 {
659 	struct igmpstat igmpstat, zerostat;
660 	size_t len = sizeof igmpstat;
661 
662 	if (zflag)
663 		memset(&zerostat, 0, len);
664 	if (sysctlbyname("net.inet.igmp.stats", &igmpstat, &len,
665 	    zflag ? &zerostat : NULL, zflag ? len : 0) < 0) {
666 		warn("sysctl: net.inet.igmp.stats");
667 		return;
668 	}
669 
670 	printf("%s:\n", name);
671 
672 #define	p(f, m) if (igmpstat.f || sflag <= 1) \
673     printf(m, igmpstat.f, plural(igmpstat.f))
674 #define	py(f, m) if (igmpstat.f || sflag <= 1) \
675     printf(m, igmpstat.f, igmpstat.f != 1 ? "ies" : "y")
676 	p(igps_rcv_total, "\t%u message%s received\n");
677         p(igps_rcv_tooshort, "\t%u message%s received with too few bytes\n");
678         p(igps_rcv_badsum, "\t%u message%s received with bad checksum\n");
679         py(igps_rcv_queries, "\t%u membership quer%s received\n");
680         py(igps_rcv_badqueries, "\t%u membership quer%s received with invalid field(s)\n");
681         p(igps_rcv_reports, "\t%u membership report%s received\n");
682         p(igps_rcv_badreports, "\t%u membership report%s received with invalid field(s)\n");
683         p(igps_rcv_ourreports, "\t%u membership report%s received for groups to which we belong\n");
684         p(igps_snd_reports, "\t%u membership report%s sent\n");
685 #undef p
686 #undef py
687 }
688 
689 /*
690  * Pretty print an Internet address (net address + port).
691  */
692 void
693 inetprint(struct in_addr *in, int port, char *proto, int numeric_port)
694 {
695 	struct servent *sp = 0;
696 	char line[80], *cp;
697 	int width;
698 
699 	if (Wflag)
700 	    sprintf(line, "%s.", inetname(in));
701 	else
702 	    sprintf(line, "%.*s.", (Aflag && !numeric_port) ? 12 : 16, inetname(in));
703 	cp = index(line, '\0');
704 	if (!numeric_port && port)
705 		sp = getservbyport((int)port, proto);
706 	if (sp || port == 0)
707 		sprintf(cp, "%.15s ", sp ? sp->s_name : "*");
708 	else
709 		sprintf(cp, "%d ", ntohs((u_short)port));
710 	width = (Aflag && !Wflag) ? 18 : 22;
711 	if (Wflag)
712 	    printf("%-*s ", width, line);
713 	else
714 	    printf("%-*.*s ", width, width, line);
715 }
716 
717 /*
718  * Construct an Internet address representation.
719  * If numeric_addr has been supplied, give
720  * numeric value, otherwise try for symbolic name.
721  */
722 char *
723 inetname(struct in_addr *inp)
724 {
725 	register char *cp;
726 	static char line[MAXHOSTNAMELEN];
727 	struct hostent *hp;
728 	struct netent *np;
729 
730 	cp = 0;
731 	if (!numeric_addr && inp->s_addr != INADDR_ANY) {
732 		int net = inet_netof(*inp);
733 		int lna = inet_lnaof(*inp);
734 
735 		if (lna == INADDR_ANY) {
736 			np = getnetbyaddr(net, AF_INET);
737 			if (np)
738 				cp = np->n_name;
739 		}
740 		if (cp == 0) {
741 			hp = gethostbyaddr((char *)inp, sizeof (*inp), AF_INET);
742 			if (hp) {
743 				cp = hp->h_name;
744 				trimdomain(cp, strlen(cp));
745 			}
746 		}
747 	}
748 	if (inp->s_addr == INADDR_ANY)
749 		strcpy(line, "*");
750 	else if (cp) {
751 		strncpy(line, cp, sizeof(line) - 1);
752 		line[sizeof(line) - 1] = '\0';
753 	} else {
754 		inp->s_addr = ntohl(inp->s_addr);
755 #define C(x)	((u_int)((x) & 0xff))
756 		sprintf(line, "%u.%u.%u.%u", C(inp->s_addr >> 24),
757 		    C(inp->s_addr >> 16), C(inp->s_addr >> 8), C(inp->s_addr));
758 	}
759 	return (line);
760 }
761