1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2010, Oracle and/or its affiliates. All rights reserved.
23  * Copyright (c) 1990  Mentat Inc.
24  * netstat.c 2.2, last change 9/9/91
25  * MROUTING Revision 3.5
26  */
27 
28 /*
29  * simple netstat based on snmp/mib-2 interface to the TCP/IP stack
30  *
31  * NOTES:
32  * 1. A comment "LINTED: (note 1)" appears before certain lines where
33  *    lint would have complained, "pointer cast may result in improper
34  *    alignment". These are lines where lint had suspected potential
35  *    improper alignment of a data structure; in each such situation
36  *    we have relied on the kernel guaranteeing proper alignment.
37  * 2. Some 'for' loops have been commented as "'for' loop 1", etc
38  *    because they have 'continue' or 'break' statements in their
39  *    bodies. 'continue' statements have been used inside some loops
40  *    where avoiding them would have led to deep levels of indentation.
41  *
42  * TODO:
43  *	Add ability to request subsets from kernel (with level = MIB2_IP;
44  *	name = 0 meaning everything for compatibility)
45  */
46 
47 #include <stdio.h>
48 #include <stdlib.h>
49 #include <stdarg.h>
50 #include <unistd.h>
51 #include <strings.h>
52 #include <string.h>
53 #include <errno.h>
54 #include <ctype.h>
55 #include <kstat.h>
56 #include <assert.h>
57 #include <locale.h>
58 
59 #include <sys/types.h>
60 #include <sys/stream.h>
61 #include <stropts.h>
62 #include <sys/strstat.h>
63 #include <sys/tihdr.h>
64 
65 #include <sys/socket.h>
66 #include <sys/sockio.h>
67 #include <netinet/in.h>
68 #include <net/if.h>
69 #include <net/route.h>
70 
71 #include <inet/mib2.h>
72 #include <inet/ip.h>
73 #include <inet/arp.h>
74 #include <inet/tcp.h>
75 #include <netinet/igmp_var.h>
76 #include <netinet/ip_mroute.h>
77 
78 #include <arpa/inet.h>
79 #include <netdb.h>
80 #include <fcntl.h>
81 #include <sys/systeminfo.h>
82 #include <arpa/inet.h>
83 
84 #include <netinet/dhcp.h>
85 #include <dhcpagent_ipc.h>
86 #include <dhcpagent_util.h>
87 #include <compat.h>
88 
89 #include <libtsnet.h>
90 #include <tsol/label.h>
91 
92 #include "statcommon.h"
93 
94 extern void	unixpr(kstat_ctl_t *kc);
95 
96 #define	STR_EXPAND	4
97 
98 #define	V4MASK_TO_V6(v4, v6)	((v6)._S6_un._S6_u32[0] = 0xfffffffful, \
99 				(v6)._S6_un._S6_u32[1] = 0xfffffffful, \
100 				(v6)._S6_un._S6_u32[2] = 0xfffffffful, \
101 				(v6)._S6_un._S6_u32[3] = (v4))
102 
103 #define	IN6_IS_V4MASK(v6)	((v6)._S6_un._S6_u32[0] == 0xfffffffful && \
104 				(v6)._S6_un._S6_u32[1] == 0xfffffffful && \
105 				(v6)._S6_un._S6_u32[2] == 0xfffffffful)
106 
107 /*
108  * This is used as a cushion in the buffer allocation directed by SIOCGLIFNUM.
109  * Because there's no locking between SIOCGLIFNUM and SIOCGLIFCONF, it's
110  * possible for an administrator to plumb new interfaces between those two
111  * calls, resulting in the failure of the latter.  This addition makes that
112  * less likely.
113  */
114 #define	LIFN_GUARD_VALUE	10
115 
116 typedef struct mib_item_s {
117 	struct mib_item_s	*next_item;
118 	int			group;
119 	int			mib_id;
120 	int			length;
121 	void			*valp;
122 } mib_item_t;
123 
124 struct	ifstat {
125 	uint64_t	ipackets;
126 	uint64_t	ierrors;
127 	uint64_t	opackets;
128 	uint64_t	oerrors;
129 	uint64_t	collisions;
130 };
131 
132 struct iflist {
133 	struct iflist	*next_if;
134 	char		ifname[LIFNAMSIZ];
135 	struct ifstat	tot;
136 };
137 
138 static	mib_item_t	*mibget(int sd);
139 static	void		mibfree(mib_item_t *firstitem);
140 static	int		mibopen(void);
141 static void		mib_get_constants(mib_item_t *item);
142 static mib_item_t	*mib_item_dup(mib_item_t *item);
143 static mib_item_t	*mib_item_diff(mib_item_t *item1,
144     mib_item_t *item2);
145 static void		mib_item_destroy(mib_item_t **item);
146 
147 static boolean_t	octetstrmatch(const Octet_t *a, const Octet_t *b);
148 static char		*octetstr(const Octet_t *op, int code,
149 			    char *dst, uint_t dstlen);
150 static char		*pr_addr(uint_t addr,
151 			    char *dst, uint_t dstlen);
152 static char		*pr_addrnz(ipaddr_t addr, char *dst, uint_t dstlen);
153 static char		*pr_addr6(const in6_addr_t *addr,
154 			    char *dst, uint_t dstlen);
155 static char		*pr_mask(uint_t addr,
156 			    char *dst, uint_t dstlen);
157 static char		*pr_prefix6(const struct in6_addr *addr,
158 			    uint_t prefixlen, char *dst, uint_t dstlen);
159 static char		*pr_ap(uint_t addr, uint_t port,
160 			    char *proto, char *dst, uint_t dstlen);
161 static char		*pr_ap6(const in6_addr_t *addr, uint_t port,
162 			    char *proto, char *dst, uint_t dstlen);
163 static char		*pr_net(uint_t addr, uint_t mask,
164 			    char *dst, uint_t dstlen);
165 static char		*pr_netaddr(uint_t addr, uint_t mask,
166 			    char *dst, uint_t dstlen);
167 static char		*fmodestr(uint_t fmode);
168 static char		*portname(uint_t port, char *proto,
169 			    char *dst, uint_t dstlen);
170 
171 static const char	*mitcp_state(int code,
172 			    const mib2_transportMLPEntry_t *attr);
173 static const char	*miudp_state(int code,
174 			    const mib2_transportMLPEntry_t *attr);
175 
176 static void		stat_report(mib_item_t *item);
177 static void		mrt_stat_report(mib_item_t *item);
178 static void		arp_report(mib_item_t *item);
179 static void		ndp_report(mib_item_t *item);
180 static void		mrt_report(mib_item_t *item);
181 static void		if_stat_total(struct ifstat *oldstats,
182 			    struct ifstat *newstats, struct ifstat *sumstats);
183 static void		if_report(mib_item_t *item, char *ifname,
184 			    int Iflag_only, boolean_t once_only);
185 static void		if_report_ip4(mib2_ipAddrEntry_t *ap,
186 			    char ifname[], char logintname[],
187 			    struct ifstat *statptr, boolean_t ksp_not_null);
188 static void		if_report_ip6(mib2_ipv6AddrEntry_t *ap6,
189 			    char ifname[], char logintname[],
190 			    struct ifstat *statptr, boolean_t ksp_not_null);
191 static void		ire_report(const mib_item_t *item);
192 static void		tcp_report(const mib_item_t *item);
193 static void		udp_report(const mib_item_t *item);
194 static void		group_report(mib_item_t *item);
195 static void		dce_report(mib_item_t *item);
196 static void		print_ip_stats(mib2_ip_t *ip);
197 static void		print_icmp_stats(mib2_icmp_t *icmp);
198 static void		print_ip6_stats(mib2_ipv6IfStatsEntry_t *ip6);
199 static void		print_icmp6_stats(mib2_ipv6IfIcmpEntry_t *icmp6);
200 static void		print_sctp_stats(mib2_sctp_t *tcp);
201 static void		print_tcp_stats(mib2_tcp_t *tcp);
202 static void		print_udp_stats(mib2_udp_t *udp);
203 static void		print_rawip_stats(mib2_rawip_t *rawip);
204 static void		print_igmp_stats(struct igmpstat *igps);
205 static void		print_mrt_stats(struct mrtstat *mrts);
206 static void		sctp_report(const mib_item_t *item);
207 static void		sum_ip6_stats(mib2_ipv6IfStatsEntry_t *ip6,
208 			    mib2_ipv6IfStatsEntry_t *sum6);
209 static void		sum_icmp6_stats(mib2_ipv6IfIcmpEntry_t *icmp6,
210 			    mib2_ipv6IfIcmpEntry_t *sum6);
211 static void		m_report(void);
212 static void		dhcp_report(char *);
213 
214 static	uint64_t	kstat_named_value(kstat_t *, char *);
215 static	kid_t		safe_kstat_read(kstat_ctl_t *, kstat_t *, void *);
216 static int		isnum(char *);
217 static char		*plural(int n);
218 static char		*pluraly(int n);
219 static char		*plurales(int n);
220 static void		process_filter(char *arg);
221 static char		*ifindex2str(uint_t, char *);
222 static boolean_t	family_selected(int family);
223 
224 static void		usage(char *);
225 static void 		fatal(int errcode, char *str1, ...);
226 
227 #define	PLURAL(n) plural((int)n)
228 #define	PLURALY(n) pluraly((int)n)
229 #define	PLURALES(n) plurales((int)n)
230 #define	IFLAGMOD(flg, val1, val2)	if (flg == val1) flg = val2
231 #define	MDIFF(diff, elem2, elem1, member)	(diff)->member = \
232 	(elem2)->member - (elem1)->member
233 
234 
235 static	boolean_t	Aflag = B_FALSE;	/* All sockets/ifs/rtng-tbls */
236 static	boolean_t	Dflag = B_FALSE;	/* DCE info */
237 static	boolean_t	Iflag = B_FALSE;	/* IP Traffic Interfaces */
238 static	boolean_t	Mflag = B_FALSE;	/* STREAMS Memory Statistics */
239 static	boolean_t	Nflag = B_FALSE;	/* Numeric Network Addresses */
240 static	boolean_t	Rflag = B_FALSE;	/* Routing Tables */
241 static	boolean_t	RSECflag = B_FALSE;	/* Security attributes */
242 static	boolean_t	Sflag = B_FALSE;	/* Per-protocol Statistics */
243 static	boolean_t	Vflag = B_FALSE;	/* Verbose */
244 static	boolean_t	Pflag = B_FALSE;	/* Net to Media Tables */
245 static	boolean_t	Gflag = B_FALSE;	/* Multicast group membership */
246 static	boolean_t	MMflag = B_FALSE;	/* Multicast routing table */
247 static	boolean_t	DHCPflag = B_FALSE;	/* DHCP statistics */
248 static	boolean_t	Xflag = B_FALSE;	/* Debug Info */
249 
250 static	int	v4compat = 0;	/* Compatible printing format for status */
251 
252 static int	proto = IPPROTO_MAX;	/* all protocols */
253 kstat_ctl_t	*kc = NULL;
254 
255 /*
256  * Sizes of data structures extracted from the base mib.
257  * This allows the size of the tables entries to grow while preserving
258  * binary compatibility.
259  */
260 static int ipAddrEntrySize;
261 static int ipRouteEntrySize;
262 static int ipNetToMediaEntrySize;
263 static int ipMemberEntrySize;
264 static int ipGroupSourceEntrySize;
265 static int ipRouteAttributeSize;
266 static int vifctlSize;
267 static int mfcctlSize;
268 
269 static int ipv6IfStatsEntrySize;
270 static int ipv6IfIcmpEntrySize;
271 static int ipv6AddrEntrySize;
272 static int ipv6RouteEntrySize;
273 static int ipv6NetToMediaEntrySize;
274 static int ipv6MemberEntrySize;
275 static int ipv6GroupSourceEntrySize;
276 
277 static int ipDestEntrySize;
278 
279 static int transportMLPSize;
280 static int tcpConnEntrySize;
281 static int tcp6ConnEntrySize;
282 static int udpEntrySize;
283 static int udp6EntrySize;
284 static int sctpEntrySize;
285 static int sctpLocalEntrySize;
286 static int sctpRemoteEntrySize;
287 
288 #define	protocol_selected(p)	(proto == IPPROTO_MAX || proto == (p))
289 
290 /* Machinery used for -f (filter) option */
291 enum { FK_AF = 0, FK_OUTIF, FK_DST, FK_FLAGS, NFILTERKEYS };
292 
293 static const char *filter_keys[NFILTERKEYS] = {
294 	"af", "outif", "dst", "flags"
295 };
296 
297 static m_label_t *zone_security_label = NULL;
298 
299 /* Flags on routes */
300 #define	FLF_A		0x00000001
301 #define	FLF_b		0x00000002
302 #define	FLF_D		0x00000004
303 #define	FLF_G		0x00000008
304 #define	FLF_H		0x00000010
305 #define	FLF_L		0x00000020
306 #define	FLF_U		0x00000040
307 #define	FLF_M		0x00000080
308 #define	FLF_S		0x00000100
309 #define	FLF_C		0x00000200	/* IRE_IF_CLONE */
310 #define	FLF_I		0x00000400	/* RTF_INDIRECT */
311 #define	FLF_R		0x00000800	/* RTF_REJECT */
312 #define	FLF_B		0x00001000	/* RTF_BLACKHOLE */
313 #define	FLF_Z		0x00100000	/* RTF_ZONE */
314 
315 static const char flag_list[] = "AbDGHLUMSCIRBZ";
316 
317 typedef struct filter_rule filter_t;
318 
319 struct filter_rule {
320 	filter_t *f_next;
321 	union {
322 		int f_family;
323 		const char *f_ifname;
324 		struct {
325 			struct hostent *f_address;
326 			in6_addr_t f_mask;
327 		} a;
328 		struct {
329 			uint_t f_flagset;
330 			uint_t f_flagclear;
331 		} f;
332 	} u;
333 };
334 
335 /*
336  * The user-specified filters are linked into lists separated by
337  * keyword (type of filter).  Thus, the matching algorithm is:
338  *	For each non-empty filter list
339  *		If no filters in the list match
340  *			then stop here; route doesn't match
341  *	If loop above completes, then route does match and will be
342  *	displayed.
343  */
344 static filter_t *filters[NFILTERKEYS];
345 
346 static uint_t timestamp_fmt = NODATE;
347 
348 #if !defined(TEXT_DOMAIN)		/* Should be defined by cc -D */
349 #define	TEXT_DOMAIN "SYS_TEST"		/* Use this only if it isn't */
350 #endif
351 
352 int
353 main(int argc, char **argv)
354 {
355 	char		*name;
356 	mib_item_t	*item = NULL;
357 	mib_item_t	*previtem = NULL;
358 	int		sd = -1;
359 	char	*ifname = NULL;
360 	int	interval = 0;	/* Single time by default */
361 	int	count = -1;	/* Forever */
362 	int	c;
363 	int	d;
364 	/*
365 	 * Possible values of 'Iflag_only':
366 	 * -1, no feature-flags;
367 	 *  0, IFlag and other feature-flags enabled
368 	 *  1, IFlag is the only feature-flag enabled
369 	 * : trinary variable, modified using IFLAGMOD()
370 	 */
371 	int Iflag_only = -1;
372 	boolean_t once_only = B_FALSE; /* '-i' with count > 1 */
373 	extern char	*optarg;
374 	extern int	optind;
375 	char *default_ip_str = NULL;
376 
377 	name = argv[0];
378 
379 	v4compat = get_compat_flag(&default_ip_str);
380 	if (v4compat == DEFAULT_PROT_BAD_VALUE)
381 		fatal(2, "%s: %s: Bad value for %s in %s\n", name,
382 		    default_ip_str, DEFAULT_IP, INET_DEFAULT_FILE);
383 	free(default_ip_str);
384 
385 	(void) setlocale(LC_ALL, "");
386 	(void) textdomain(TEXT_DOMAIN);
387 
388 	while ((c = getopt(argc, argv, "adimnrspMgvxf:P:I:DRT:")) != -1) {
389 		switch ((char)c) {
390 		case 'a':		/* all connections */
391 			Aflag = B_TRUE;
392 			break;
393 
394 		case 'd':		/* DCE info */
395 			Dflag = B_TRUE;
396 			IFLAGMOD(Iflag_only, 1, 0); /* see macro def'n */
397 			break;
398 
399 		case 'i':		/* interface (ill/ipif report) */
400 			Iflag = B_TRUE;
401 			IFLAGMOD(Iflag_only, -1, 1); /* '-i' exists */
402 			break;
403 
404 		case 'm':		/* streams msg report */
405 			Mflag = B_TRUE;
406 			IFLAGMOD(Iflag_only, 1, 0); /* see macro def'n */
407 			break;
408 
409 		case 'n':		/* numeric format */
410 			Nflag = B_TRUE;
411 			break;
412 
413 		case 'r':		/* route tables */
414 			Rflag = B_TRUE;
415 			IFLAGMOD(Iflag_only, 1, 0); /* see macro def'n */
416 			break;
417 
418 		case 'R':		/* security attributes */
419 			RSECflag = B_TRUE;
420 			IFLAGMOD(Iflag_only, 1, 0); /* see macro def'n */
421 			break;
422 
423 		case 's':		/* per-protocol statistics */
424 			Sflag = B_TRUE;
425 			IFLAGMOD(Iflag_only, 1, 0); /* see macro def'n */
426 			break;
427 
428 		case 'p':		/* arp/ndp table */
429 			Pflag = B_TRUE;
430 			IFLAGMOD(Iflag_only, 1, 0); /* see macro def'n */
431 			break;
432 
433 		case 'M':		/* multicast routing tables */
434 			MMflag = B_TRUE;
435 			IFLAGMOD(Iflag_only, 1, 0); /* see macro def'n */
436 			break;
437 
438 		case 'g':		/* multicast group membership */
439 			Gflag = B_TRUE;
440 			IFLAGMOD(Iflag_only, 1, 0); /* see macro def'n */
441 			break;
442 
443 		case 'v':		/* verbose output format */
444 			Vflag = B_TRUE;
445 			IFLAGMOD(Iflag_only, 1, 0); /* see macro def'n */
446 			break;
447 
448 		case 'x':		/* turn on debugging */
449 			Xflag = B_TRUE;
450 			break;
451 
452 		case 'f':
453 			process_filter(optarg);
454 			break;
455 
456 		case 'P':
457 			if (strcmp(optarg, "ip") == 0) {
458 				proto = IPPROTO_IP;
459 			} else if (strcmp(optarg, "ipv6") == 0 ||
460 			    strcmp(optarg, "ip6") == 0) {
461 				v4compat = 0;	/* Overridden */
462 				proto = IPPROTO_IPV6;
463 			} else if (strcmp(optarg, "icmp") == 0) {
464 				proto = IPPROTO_ICMP;
465 			} else if (strcmp(optarg, "icmpv6") == 0 ||
466 			    strcmp(optarg, "icmp6") == 0) {
467 				v4compat = 0;	/* Overridden */
468 				proto = IPPROTO_ICMPV6;
469 			} else if (strcmp(optarg, "igmp") == 0) {
470 				proto = IPPROTO_IGMP;
471 			} else if (strcmp(optarg, "udp") == 0) {
472 				proto = IPPROTO_UDP;
473 			} else if (strcmp(optarg, "tcp") == 0) {
474 				proto = IPPROTO_TCP;
475 			} else if (strcmp(optarg, "sctp") == 0) {
476 				proto = IPPROTO_SCTP;
477 			} else if (strcmp(optarg, "raw") == 0 ||
478 			    strcmp(optarg, "rawip") == 0) {
479 				proto = IPPROTO_RAW;
480 			} else {
481 				fatal(1, "%s: unknown protocol.\n", optarg);
482 			}
483 			break;
484 
485 		case 'I':
486 			ifname = optarg;
487 			Iflag = B_TRUE;
488 			IFLAGMOD(Iflag_only, -1, 1); /* see macro def'n */
489 			break;
490 
491 		case 'D':
492 			DHCPflag = B_TRUE;
493 			Iflag_only = 0;
494 			break;
495 
496 		case 'T':
497 			if (optarg) {
498 				if (*optarg == 'u')
499 					timestamp_fmt = UDATE;
500 				else if (*optarg == 'd')
501 					timestamp_fmt = DDATE;
502 				else
503 					usage(name);
504 			} else {
505 				usage(name);
506 			}
507 			break;
508 
509 		case '?':
510 		default:
511 			usage(name);
512 		}
513 	}
514 
515 	/*
516 	 * Make sure -R option is set only on a labeled system.
517 	 */
518 	if (RSECflag && !is_system_labeled()) {
519 		(void) fprintf(stderr, "-R set but labeling is not enabled\n");
520 		usage(name);
521 	}
522 
523 	/*
524 	 * Handle other arguments: find interval, count; the
525 	 * flags that accept 'interval' and 'count' are OR'd
526 	 * in the outermost 'if'; more flags may be added as
527 	 * required
528 	 */
529 	if (Iflag || Sflag || Mflag) {
530 		for (d = optind; d < argc; d++) {
531 			if (isnum(argv[d])) {
532 				interval = atoi(argv[d]);
533 				if (d + 1 < argc &&
534 				    isnum(argv[d + 1])) {
535 					count = atoi(argv[d + 1]);
536 					optind++;
537 				}
538 				optind++;
539 				if (interval == 0 || count == 0)
540 					usage(name);
541 				break;
542 			}
543 		}
544 	}
545 	if (optind < argc) {
546 		if (Iflag && isnum(argv[optind])) {
547 			count = atoi(argv[optind]);
548 			if (count == 0)
549 				usage(name);
550 			optind++;
551 		}
552 	}
553 	if (optind < argc) {
554 		(void) fprintf(stderr,
555 		    "%s: extra arguments\n", name);
556 		usage(name);
557 	}
558 	if (interval)
559 		setbuf(stdout, NULL);
560 
561 	if (DHCPflag) {
562 		dhcp_report(Iflag ? ifname : NULL);
563 		exit(0);
564 	}
565 
566 	/*
567 	 * Get this process's security label if the -R switch is set.
568 	 * We use this label as the current zone's security label.
569 	 */
570 	if (RSECflag) {
571 		zone_security_label = m_label_alloc(MAC_LABEL);
572 		if (zone_security_label == NULL)
573 			fatal(errno, "m_label_alloc() failed");
574 		if (getplabel(zone_security_label) < 0)
575 			fatal(errno, "getplabel() failed");
576 	}
577 
578 	/* Get data structures: priming before iteration */
579 	if (family_selected(AF_INET) || family_selected(AF_INET6)) {
580 		sd = mibopen();
581 		if (sd == -1)
582 			fatal(1, "can't open mib stream\n");
583 		if ((item = mibget(sd)) == NULL) {
584 			(void) close(sd);
585 			fatal(1, "mibget() failed\n");
586 		}
587 		/* Extract constant sizes - need do once only */
588 		mib_get_constants(item);
589 	}
590 	if ((kc = kstat_open()) == NULL) {
591 		mibfree(item);
592 		(void) close(sd);
593 		fail(1, "kstat_open(): can't open /dev/kstat");
594 	}
595 
596 	if (interval <= 0) {
597 		count = 1;
598 		once_only = B_TRUE;
599 	}
600 	/* 'for' loop 1: */
601 	for (;;) {
602 		mib_item_t *curritem = NULL; /* only for -[M]s */
603 
604 		if (timestamp_fmt != NODATE)
605 			print_timestamp(timestamp_fmt);
606 
607 		/* netstat: AF_INET[6] behaviour */
608 		if (family_selected(AF_INET) || family_selected(AF_INET6)) {
609 			if (Sflag) {
610 				curritem = mib_item_diff(previtem, item);
611 				if (curritem == NULL)
612 					fatal(1, "can't process mib data, "
613 					    "out of memory\n");
614 				mib_item_destroy(&previtem);
615 			}
616 
617 			if (!(Dflag || Iflag || Rflag || Sflag || Mflag ||
618 			    MMflag || Pflag || Gflag || DHCPflag)) {
619 				if (protocol_selected(IPPROTO_UDP))
620 					udp_report(item);
621 				if (protocol_selected(IPPROTO_TCP))
622 					tcp_report(item);
623 				if (protocol_selected(IPPROTO_SCTP))
624 					sctp_report(item);
625 			}
626 			if (Iflag)
627 				if_report(item, ifname, Iflag_only, once_only);
628 			if (Mflag)
629 				m_report();
630 			if (Rflag)
631 				ire_report(item);
632 			if (Sflag && MMflag) {
633 				mrt_stat_report(curritem);
634 			} else {
635 				if (Sflag)
636 					stat_report(curritem);
637 				if (MMflag)
638 					mrt_report(item);
639 			}
640 			if (Gflag)
641 				group_report(item);
642 			if (Pflag) {
643 				if (family_selected(AF_INET))
644 					arp_report(item);
645 				if (family_selected(AF_INET6))
646 					ndp_report(item);
647 			}
648 			if (Dflag)
649 				dce_report(item);
650 			mib_item_destroy(&curritem);
651 		}
652 
653 		/* netstat: AF_UNIX behaviour */
654 		if (family_selected(AF_UNIX) &&
655 		    (!(Dflag || Iflag || Rflag || Sflag || Mflag ||
656 		    MMflag || Pflag || Gflag)))
657 			unixpr(kc);
658 		(void) kstat_close(kc);
659 
660 		/* iteration handling code */
661 		if (count > 0 && --count == 0)
662 			break;
663 		(void) sleep(interval);
664 
665 		/* re-populating of data structures */
666 		if (family_selected(AF_INET) || family_selected(AF_INET6)) {
667 			if (Sflag) {
668 				/* previtem is a cut-down list */
669 				previtem = mib_item_dup(item);
670 				if (previtem == NULL)
671 					fatal(1, "can't process mib data, "
672 					    "out of memory\n");
673 			}
674 			mibfree(item);
675 			(void) close(sd);
676 			if ((sd = mibopen()) == -1)
677 				fatal(1, "can't open mib stream anymore\n");
678 			if ((item = mibget(sd)) == NULL) {
679 				(void) close(sd);
680 				fatal(1, "mibget() failed\n");
681 			}
682 		}
683 		if ((kc = kstat_open()) == NULL)
684 			fail(1, "kstat_open(): can't open /dev/kstat");
685 
686 	} /* 'for' loop 1 ends */
687 	mibfree(item);
688 	(void) close(sd);
689 	if (zone_security_label != NULL)
690 		m_label_free(zone_security_label);
691 
692 	return (0);
693 }
694 
695 
696 static int
697 isnum(char *p)
698 {
699 	int	len;
700 	int	i;
701 
702 	len = strlen(p);
703 	for (i = 0; i < len; i++)
704 		if (!isdigit(p[i]))
705 			return (0);
706 	return (1);
707 }
708 
709 
710 /* --------------------------------- MIBGET -------------------------------- */
711 
712 static mib_item_t *
713 mibget(int sd)
714 {
715 	/*
716 	 * buf is an automatic for this function, so the
717 	 * compiler has complete control over its alignment;
718 	 * it is assumed this alignment is satisfactory for
719 	 * it to be casted to certain other struct pointers
720 	 * here, such as struct T_optmgmt_ack * .
721 	 */
722 	uintptr_t		buf[512 / sizeof (uintptr_t)];
723 	int			flags;
724 	int			i, j, getcode;
725 	struct strbuf		ctlbuf, databuf;
726 	struct T_optmgmt_req	*tor = (struct T_optmgmt_req *)buf;
727 	struct T_optmgmt_ack	*toa = (struct T_optmgmt_ack *)buf;
728 	struct T_error_ack	*tea = (struct T_error_ack *)buf;
729 	struct opthdr		*req;
730 	mib_item_t		*first_item = NULL;
731 	mib_item_t		*last_item  = NULL;
732 	mib_item_t		*temp;
733 
734 	tor->PRIM_type = T_SVR4_OPTMGMT_REQ;
735 	tor->OPT_offset = sizeof (struct T_optmgmt_req);
736 	tor->OPT_length = sizeof (struct opthdr);
737 	tor->MGMT_flags = T_CURRENT;
738 
739 
740 	/*
741 	 * Note: we use the special level value below so that IP will return
742 	 * us information concerning IRE_MARK_TESTHIDDEN routes.
743 	 */
744 	req = (struct opthdr *)&tor[1];
745 	req->level = EXPER_IP_AND_ALL_IRES;
746 	req->name  = 0;
747 	req->len   = 1;
748 
749 	ctlbuf.buf = (char *)buf;
750 	ctlbuf.len = tor->OPT_length + tor->OPT_offset;
751 	flags = 0;
752 	if (putmsg(sd, &ctlbuf, (struct strbuf *)0, flags) == -1) {
753 		perror("mibget: putmsg(ctl) failed");
754 		goto error_exit;
755 	}
756 
757 	/*
758 	 * Each reply consists of a ctl part for one fixed structure
759 	 * or table, as defined in mib2.h.  The format is a T_OPTMGMT_ACK,
760 	 * containing an opthdr structure.  level/name identify the entry,
761 	 * len is the size of the data part of the message.
762 	 */
763 	req = (struct opthdr *)&toa[1];
764 	ctlbuf.maxlen = sizeof (buf);
765 	j = 1;
766 	for (;;) {
767 		flags = 0;
768 		getcode = getmsg(sd, &ctlbuf, (struct strbuf *)0, &flags);
769 		if (getcode == -1) {
770 			perror("mibget getmsg(ctl) failed");
771 			if (Xflag) {
772 				(void) fputs("#   level   name    len\n",
773 				    stderr);
774 				i = 0;
775 				for (last_item = first_item; last_item;
776 				    last_item = last_item->next_item)
777 					(void) printf("%d  %4d   %5d   %d\n",
778 					    ++i,
779 					    last_item->group,
780 					    last_item->mib_id,
781 					    last_item->length);
782 			}
783 			goto error_exit;
784 		}
785 		if (getcode == 0 &&
786 		    ctlbuf.len >= sizeof (struct T_optmgmt_ack) &&
787 		    toa->PRIM_type == T_OPTMGMT_ACK &&
788 		    toa->MGMT_flags == T_SUCCESS &&
789 		    req->len == 0) {
790 			if (Xflag)
791 				(void) printf("mibget getmsg() %d returned "
792 				    "EOD (level %ld, name %ld)\n",
793 				    j, req->level, req->name);
794 			return (first_item);		/* this is EOD msg */
795 		}
796 
797 		if (ctlbuf.len >= sizeof (struct T_error_ack) &&
798 		    tea->PRIM_type == T_ERROR_ACK) {
799 			(void) fprintf(stderr,
800 			    "mibget %d gives T_ERROR_ACK: TLI_error = 0x%lx, "
801 			    "UNIX_error = 0x%lx\n",
802 			    j, tea->TLI_error, tea->UNIX_error);
803 
804 			errno = (tea->TLI_error == TSYSERR) ?
805 			    tea->UNIX_error : EPROTO;
806 			goto error_exit;
807 		}
808 
809 		if (getcode != MOREDATA ||
810 		    ctlbuf.len < sizeof (struct T_optmgmt_ack) ||
811 		    toa->PRIM_type != T_OPTMGMT_ACK ||
812 		    toa->MGMT_flags != T_SUCCESS) {
813 			(void) printf("mibget getmsg(ctl) %d returned %d, "
814 			    "ctlbuf.len = %d, PRIM_type = %ld\n",
815 			    j, getcode, ctlbuf.len, toa->PRIM_type);
816 
817 			if (toa->PRIM_type == T_OPTMGMT_ACK)
818 				(void) printf("T_OPTMGMT_ACK: "
819 				    "MGMT_flags = 0x%lx, req->len = %ld\n",
820 				    toa->MGMT_flags, req->len);
821 			errno = ENOMSG;
822 			goto error_exit;
823 		}
824 
825 		temp = (mib_item_t *)malloc(sizeof (mib_item_t));
826 		if (temp == NULL) {
827 			perror("mibget malloc failed");
828 			goto error_exit;
829 		}
830 		if (last_item != NULL)
831 			last_item->next_item = temp;
832 		else
833 			first_item = temp;
834 		last_item = temp;
835 		last_item->next_item = NULL;
836 		last_item->group = req->level;
837 		last_item->mib_id = req->name;
838 		last_item->length = req->len;
839 		last_item->valp = malloc((int)req->len);
840 		if (last_item->valp == NULL)
841 			goto error_exit;
842 		if (Xflag)
843 			(void) printf("msg %d: group = %4d   mib_id = %5d"
844 			    "length = %d\n",
845 			    j, last_item->group, last_item->mib_id,
846 			    last_item->length);
847 
848 		databuf.maxlen = last_item->length;
849 		databuf.buf    = (char *)last_item->valp;
850 		databuf.len    = 0;
851 		flags = 0;
852 		getcode = getmsg(sd, (struct strbuf *)0, &databuf, &flags);
853 		if (getcode == -1) {
854 			perror("mibget getmsg(data) failed");
855 			goto error_exit;
856 		} else if (getcode != 0) {
857 			(void) printf("mibget getmsg(data) returned %d, "
858 			    "databuf.maxlen = %d, databuf.len = %d\n",
859 			    getcode, databuf.maxlen, databuf.len);
860 			goto error_exit;
861 		}
862 		j++;
863 	}
864 	/* NOTREACHED */
865 
866 error_exit:;
867 	mibfree(first_item);
868 	return (NULL);
869 }
870 
871 /*
872  * mibfree: frees a linked list of type (mib_item_t *)
873  * returned by mibget(); this is NOT THE SAME AS
874  * mib_item_destroy(), so should be used for objects
875  * returned by mibget() only
876  */
877 static void
878 mibfree(mib_item_t *firstitem)
879 {
880 	mib_item_t *lastitem;
881 
882 	while (firstitem != NULL) {
883 		lastitem = firstitem;
884 		firstitem = firstitem->next_item;
885 		if (lastitem->valp != NULL)
886 			free(lastitem->valp);
887 		free(lastitem);
888 	}
889 }
890 
891 static int
892 mibopen(void)
893 {
894 	int	sd;
895 
896 	sd = open("/dev/arp", O_RDWR);
897 	if (sd == -1) {
898 		perror("arp open");
899 		return (-1);
900 	}
901 	if (ioctl(sd, I_PUSH, "tcp") == -1) {
902 		perror("tcp I_PUSH");
903 		(void) close(sd);
904 		return (-1);
905 	}
906 	if (ioctl(sd, I_PUSH, "udp") == -1) {
907 		perror("udp I_PUSH");
908 		(void) close(sd);
909 		return (-1);
910 	}
911 	if (ioctl(sd, I_PUSH, "icmp") == -1) {
912 		perror("icmp I_PUSH");
913 		(void) close(sd);
914 		return (-1);
915 	}
916 	return (sd);
917 }
918 
919 /*
920  * mib_item_dup: returns a clean mib_item_t * linked
921  * list, so that for every element item->mib_id is 0;
922  * to deallocate this linked list, use mib_item_destroy
923  */
924 static mib_item_t *
925 mib_item_dup(mib_item_t *item)
926 {
927 	int	c = 0;
928 	mib_item_t *localp;
929 	mib_item_t *tempp;
930 
931 	for (tempp = item; tempp; tempp = tempp->next_item)
932 		if (tempp->mib_id == 0)
933 			c++;
934 	tempp = NULL;
935 
936 	localp = (mib_item_t *)malloc(c * sizeof (mib_item_t));
937 	if (localp == NULL)
938 		return (NULL);
939 	c = 0;
940 	for (; item; item = item->next_item) {
941 		if (item->mib_id == 0) {
942 			/* Replicate item in localp */
943 			(localp[c]).next_item = NULL;
944 			(localp[c]).group = item->group;
945 			(localp[c]).mib_id = item->mib_id;
946 			(localp[c]).length = item->length;
947 			(localp[c]).valp = (uintptr_t *)malloc(
948 			    item->length);
949 			if ((localp[c]).valp == NULL) {
950 				mib_item_destroy(&localp);
951 				return (NULL);
952 			}
953 			(void *) memcpy((localp[c]).valp,
954 			    item->valp,
955 			    item->length);
956 			tempp = &(localp[c]);
957 			if (c > 0)
958 				(localp[c - 1]).next_item = tempp;
959 			c++;
960 		}
961 	}
962 	return (localp);
963 }
964 
965 /*
966  * mib_item_diff: takes two (mib_item_t *) linked lists
967  * item1 and item2 and computes the difference between
968  * differentiable values in item2 against item1 for every
969  * given member of item2; returns an mib_item_t * linked
970  * list of diff's, or a copy of item2 if item1 is NULL;
971  * will return NULL if system out of memory; works only
972  * for item->mib_id == 0
973  */
974 static mib_item_t *
975 mib_item_diff(mib_item_t *item1, mib_item_t *item2) {
976 	int	nitems	= 0; /* no. of items in item2 */
977 	mib_item_t *tempp2;  /* walking copy of item2 */
978 	mib_item_t *tempp1;  /* walking copy of item1 */
979 	mib_item_t *diffp;
980 	mib_item_t *diffptr; /* walking copy of diffp */
981 	mib_item_t *prevp = NULL;
982 
983 	if (item1 == NULL) {
984 		diffp = mib_item_dup(item2);
985 		return (diffp);
986 	}
987 
988 	for (tempp2 = item2;
989 	    tempp2;
990 	    tempp2 = tempp2->next_item) {
991 		if (tempp2->mib_id == 0)
992 			switch (tempp2->group) {
993 			/*
994 			 * upon adding a case here, the same
995 			 * must also be added in the next
996 			 * switch statement, alongwith
997 			 * appropriate code
998 			 */
999 			case MIB2_IP:
1000 			case MIB2_IP6:
1001 			case EXPER_DVMRP:
1002 			case EXPER_IGMP:
1003 			case MIB2_ICMP:
1004 			case MIB2_ICMP6:
1005 			case MIB2_TCP:
1006 			case MIB2_UDP:
1007 			case MIB2_SCTP:
1008 			case EXPER_RAWIP:
1009 				nitems++;
1010 			}
1011 	}
1012 	tempp2 = NULL;
1013 	if (nitems == 0) {
1014 		diffp = mib_item_dup(item2);
1015 		return (diffp);
1016 	}
1017 
1018 	diffp = (mib_item_t *)calloc(nitems, sizeof (mib_item_t));
1019 	if (diffp == NULL)
1020 		return (NULL);
1021 	diffptr = diffp;
1022 	/* 'for' loop 1: */
1023 	for (tempp2 = item2; tempp2 != NULL; tempp2 = tempp2->next_item) {
1024 		if (tempp2->mib_id != 0)
1025 			continue; /* 'for' loop 1 */
1026 		/* 'for' loop 2: */
1027 		for (tempp1 = item1; tempp1 != NULL;
1028 		    tempp1 = tempp1->next_item) {
1029 			if (!(tempp1->mib_id == 0 &&
1030 			    tempp1->group == tempp2->group &&
1031 			    tempp1->mib_id == tempp2->mib_id))
1032 				continue; /* 'for' loop 2 */
1033 			/* found comparable data sets */
1034 			if (prevp != NULL)
1035 				prevp->next_item = diffptr;
1036 			switch (tempp2->group) {
1037 			/*
1038 			 * Indenting note: Because of long variable names
1039 			 * in cases MIB2_IP6 and MIB2_ICMP6, their contents
1040 			 * have been indented by one tab space only
1041 			 */
1042 			case MIB2_IP: {
1043 				mib2_ip_t *i2 = (mib2_ip_t *)tempp2->valp;
1044 				mib2_ip_t *i1 = (mib2_ip_t *)tempp1->valp;
1045 				mib2_ip_t *d;
1046 
1047 				diffptr->group = tempp2->group;
1048 				diffptr->mib_id = tempp2->mib_id;
1049 				diffptr->length = tempp2->length;
1050 				d = (mib2_ip_t *)calloc(tempp2->length, 1);
1051 				if (d == NULL)
1052 					goto mibdiff_out_of_memory;
1053 				diffptr->valp = d;
1054 				d->ipForwarding = i2->ipForwarding;
1055 				d->ipDefaultTTL = i2->ipDefaultTTL;
1056 				MDIFF(d, i2, i1, ipInReceives);
1057 				MDIFF(d, i2, i1, ipInHdrErrors);
1058 				MDIFF(d, i2, i1, ipInAddrErrors);
1059 				MDIFF(d, i2, i1, ipInCksumErrs);
1060 				MDIFF(d, i2, i1, ipForwDatagrams);
1061 				MDIFF(d, i2, i1, ipForwProhibits);
1062 				MDIFF(d, i2, i1, ipInUnknownProtos);
1063 				MDIFF(d, i2, i1, ipInDiscards);
1064 				MDIFF(d, i2, i1, ipInDelivers);
1065 				MDIFF(d, i2, i1, ipOutRequests);
1066 				MDIFF(d, i2, i1, ipOutDiscards);
1067 				MDIFF(d, i2, i1, ipOutNoRoutes);
1068 				MDIFF(d, i2, i1, ipReasmTimeout);
1069 				MDIFF(d, i2, i1, ipReasmReqds);
1070 				MDIFF(d, i2, i1, ipReasmOKs);
1071 				MDIFF(d, i2, i1, ipReasmFails);
1072 				MDIFF(d, i2, i1, ipReasmDuplicates);
1073 				MDIFF(d, i2, i1, ipReasmPartDups);
1074 				MDIFF(d, i2, i1, ipFragOKs);
1075 				MDIFF(d, i2, i1, ipFragFails);
1076 				MDIFF(d, i2, i1, ipFragCreates);
1077 				MDIFF(d, i2, i1, ipRoutingDiscards);
1078 				MDIFF(d, i2, i1, tcpInErrs);
1079 				MDIFF(d, i2, i1, udpNoPorts);
1080 				MDIFF(d, i2, i1, udpInCksumErrs);
1081 				MDIFF(d, i2, i1, udpInOverflows);
1082 				MDIFF(d, i2, i1, rawipInOverflows);
1083 				MDIFF(d, i2, i1, ipsecInSucceeded);
1084 				MDIFF(d, i2, i1, ipsecInFailed);
1085 				MDIFF(d, i2, i1, ipInIPv6);
1086 				MDIFF(d, i2, i1, ipOutIPv6);
1087 				MDIFF(d, i2, i1, ipOutSwitchIPv6);
1088 				prevp = diffptr++;
1089 				break;
1090 			}
1091 			case MIB2_IP6: {
1092 			mib2_ipv6IfStatsEntry_t *i2;
1093 			mib2_ipv6IfStatsEntry_t *i1;
1094 			mib2_ipv6IfStatsEntry_t *d;
1095 
1096 			i2 = (mib2_ipv6IfStatsEntry_t *)tempp2->valp;
1097 			i1 = (mib2_ipv6IfStatsEntry_t *)tempp1->valp;
1098 			diffptr->group = tempp2->group;
1099 			diffptr->mib_id = tempp2->mib_id;
1100 			diffptr->length = tempp2->length;
1101 			d = (mib2_ipv6IfStatsEntry_t *)calloc(
1102 			    tempp2->length, 1);
1103 			if (d == NULL)
1104 				goto mibdiff_out_of_memory;
1105 			diffptr->valp = d;
1106 			d->ipv6Forwarding = i2->ipv6Forwarding;
1107 			d->ipv6DefaultHopLimit =
1108 			    i2->ipv6DefaultHopLimit;
1109 
1110 			MDIFF(d, i2, i1, ipv6InReceives);
1111 			MDIFF(d, i2, i1, ipv6InHdrErrors);
1112 			MDIFF(d, i2, i1, ipv6InTooBigErrors);
1113 			MDIFF(d, i2, i1, ipv6InNoRoutes);
1114 			MDIFF(d, i2, i1, ipv6InAddrErrors);
1115 			MDIFF(d, i2, i1, ipv6InUnknownProtos);
1116 			MDIFF(d, i2, i1, ipv6InTruncatedPkts);
1117 			MDIFF(d, i2, i1, ipv6InDiscards);
1118 			MDIFF(d, i2, i1, ipv6InDelivers);
1119 			MDIFF(d, i2, i1, ipv6OutForwDatagrams);
1120 			MDIFF(d, i2, i1, ipv6OutRequests);
1121 			MDIFF(d, i2, i1, ipv6OutDiscards);
1122 			MDIFF(d, i2, i1, ipv6OutNoRoutes);
1123 			MDIFF(d, i2, i1, ipv6OutFragOKs);
1124 			MDIFF(d, i2, i1, ipv6OutFragFails);
1125 			MDIFF(d, i2, i1, ipv6OutFragCreates);
1126 			MDIFF(d, i2, i1, ipv6ReasmReqds);
1127 			MDIFF(d, i2, i1, ipv6ReasmOKs);
1128 			MDIFF(d, i2, i1, ipv6ReasmFails);
1129 			MDIFF(d, i2, i1, ipv6InMcastPkts);
1130 			MDIFF(d, i2, i1, ipv6OutMcastPkts);
1131 			MDIFF(d, i2, i1, ipv6ReasmDuplicates);
1132 			MDIFF(d, i2, i1, ipv6ReasmPartDups);
1133 			MDIFF(d, i2, i1, ipv6ForwProhibits);
1134 			MDIFF(d, i2, i1, udpInCksumErrs);
1135 			MDIFF(d, i2, i1, udpInOverflows);
1136 			MDIFF(d, i2, i1, rawipInOverflows);
1137 			MDIFF(d, i2, i1, ipv6InIPv4);
1138 			MDIFF(d, i2, i1, ipv6OutIPv4);
1139 			MDIFF(d, i2, i1, ipv6OutSwitchIPv4);
1140 			prevp = diffptr++;
1141 			break;
1142 			}
1143 			case EXPER_DVMRP: {
1144 				struct mrtstat *m2;
1145 				struct mrtstat *m1;
1146 				struct mrtstat *d;
1147 
1148 				m2 = (struct mrtstat *)tempp2->valp;
1149 				m1 = (struct mrtstat *)tempp1->valp;
1150 				diffptr->group = tempp2->group;
1151 				diffptr->mib_id = tempp2->mib_id;
1152 				diffptr->length = tempp2->length;
1153 				d = (struct mrtstat *)calloc(tempp2->length, 1);
1154 				if (d == NULL)
1155 					goto mibdiff_out_of_memory;
1156 				diffptr->valp = d;
1157 				MDIFF(d, m2, m1, mrts_mfc_hits);
1158 				MDIFF(d, m2, m1, mrts_mfc_misses);
1159 				MDIFF(d, m2, m1, mrts_fwd_in);
1160 				MDIFF(d, m2, m1, mrts_fwd_out);
1161 				d->mrts_upcalls = m2->mrts_upcalls;
1162 				MDIFF(d, m2, m1, mrts_fwd_drop);
1163 				MDIFF(d, m2, m1, mrts_bad_tunnel);
1164 				MDIFF(d, m2, m1, mrts_cant_tunnel);
1165 				MDIFF(d, m2, m1, mrts_wrong_if);
1166 				MDIFF(d, m2, m1, mrts_upq_ovflw);
1167 				MDIFF(d, m2, m1, mrts_cache_cleanups);
1168 				MDIFF(d, m2, m1, mrts_drop_sel);
1169 				MDIFF(d, m2, m1, mrts_q_overflow);
1170 				MDIFF(d, m2, m1, mrts_pkt2large);
1171 				MDIFF(d, m2, m1, mrts_pim_badversion);
1172 				MDIFF(d, m2, m1, mrts_pim_rcv_badcsum);
1173 				MDIFF(d, m2, m1, mrts_pim_badregisters);
1174 				MDIFF(d, m2, m1, mrts_pim_regforwards);
1175 				MDIFF(d, m2, m1, mrts_pim_regsend_drops);
1176 				MDIFF(d, m2, m1, mrts_pim_malformed);
1177 				MDIFF(d, m2, m1, mrts_pim_nomemory);
1178 				prevp = diffptr++;
1179 				break;
1180 			}
1181 			case EXPER_IGMP: {
1182 				struct igmpstat *i2;
1183 				struct igmpstat *i1;
1184 				struct igmpstat *d;
1185 
1186 				i2 = (struct igmpstat *)tempp2->valp;
1187 				i1 = (struct igmpstat *)tempp1->valp;
1188 				diffptr->group = tempp2->group;
1189 				diffptr->mib_id = tempp2->mib_id;
1190 				diffptr->length = tempp2->length;
1191 				d = (struct igmpstat *)calloc(
1192 				    tempp2->length, 1);
1193 				if (d == NULL)
1194 					goto mibdiff_out_of_memory;
1195 				diffptr->valp = d;
1196 				MDIFF(d, i2, i1, igps_rcv_total);
1197 				MDIFF(d, i2, i1, igps_rcv_tooshort);
1198 				MDIFF(d, i2, i1, igps_rcv_badsum);
1199 				MDIFF(d, i2, i1, igps_rcv_queries);
1200 				MDIFF(d, i2, i1, igps_rcv_badqueries);
1201 				MDIFF(d, i2, i1, igps_rcv_reports);
1202 				MDIFF(d, i2, i1, igps_rcv_badreports);
1203 				MDIFF(d, i2, i1, igps_rcv_ourreports);
1204 				MDIFF(d, i2, i1, igps_snd_reports);
1205 				prevp = diffptr++;
1206 				break;
1207 			}
1208 			case MIB2_ICMP: {
1209 				mib2_icmp_t *i2;
1210 				mib2_icmp_t *i1;
1211 				mib2_icmp_t *d;
1212 
1213 				i2 = (mib2_icmp_t *)tempp2->valp;
1214 				i1 = (mib2_icmp_t *)tempp1->valp;
1215 				diffptr->group = tempp2->group;
1216 				diffptr->mib_id = tempp2->mib_id;
1217 				diffptr->length = tempp2->length;
1218 				d = (mib2_icmp_t *)calloc(tempp2->length, 1);
1219 				if (d == NULL)
1220 					goto mibdiff_out_of_memory;
1221 				diffptr->valp = d;
1222 				MDIFF(d, i2, i1, icmpInMsgs);
1223 				MDIFF(d, i2, i1, icmpInErrors);
1224 				MDIFF(d, i2, i1, icmpInCksumErrs);
1225 				MDIFF(d, i2, i1, icmpInUnknowns);
1226 				MDIFF(d, i2, i1, icmpInDestUnreachs);
1227 				MDIFF(d, i2, i1, icmpInTimeExcds);
1228 				MDIFF(d, i2, i1, icmpInParmProbs);
1229 				MDIFF(d, i2, i1, icmpInSrcQuenchs);
1230 				MDIFF(d, i2, i1, icmpInRedirects);
1231 				MDIFF(d, i2, i1, icmpInBadRedirects);
1232 				MDIFF(d, i2, i1, icmpInEchos);
1233 				MDIFF(d, i2, i1, icmpInEchoReps);
1234 				MDIFF(d, i2, i1, icmpInTimestamps);
1235 				MDIFF(d, i2, i1, icmpInAddrMasks);
1236 				MDIFF(d, i2, i1, icmpInAddrMaskReps);
1237 				MDIFF(d, i2, i1, icmpInFragNeeded);
1238 				MDIFF(d, i2, i1, icmpOutMsgs);
1239 				MDIFF(d, i2, i1, icmpOutDrops);
1240 				MDIFF(d, i2, i1, icmpOutErrors);
1241 				MDIFF(d, i2, i1, icmpOutDestUnreachs);
1242 				MDIFF(d, i2, i1, icmpOutTimeExcds);
1243 				MDIFF(d, i2, i1, icmpOutParmProbs);
1244 				MDIFF(d, i2, i1, icmpOutSrcQuenchs);
1245 				MDIFF(d, i2, i1, icmpOutRedirects);
1246 				MDIFF(d, i2, i1, icmpOutEchos);
1247 				MDIFF(d, i2, i1, icmpOutEchoReps);
1248 				MDIFF(d, i2, i1, icmpOutTimestamps);
1249 				MDIFF(d, i2, i1, icmpOutTimestampReps);
1250 				MDIFF(d, i2, i1, icmpOutAddrMasks);
1251 				MDIFF(d, i2, i1, icmpOutAddrMaskReps);
1252 				MDIFF(d, i2, i1, icmpOutFragNeeded);
1253 				MDIFF(d, i2, i1, icmpInOverflows);
1254 				prevp = diffptr++;
1255 				break;
1256 			}
1257 			case MIB2_ICMP6: {
1258 	mib2_ipv6IfIcmpEntry_t *i2;
1259 	mib2_ipv6IfIcmpEntry_t *i1;
1260 	mib2_ipv6IfIcmpEntry_t *d;
1261 
1262 	i2 = (mib2_ipv6IfIcmpEntry_t *)tempp2->valp;
1263 	i1 = (mib2_ipv6IfIcmpEntry_t *)tempp1->valp;
1264 	diffptr->group = tempp2->group;
1265 	diffptr->mib_id = tempp2->mib_id;
1266 	diffptr->length = tempp2->length;
1267 	d = (mib2_ipv6IfIcmpEntry_t *)calloc(tempp2->length, 1);
1268 	if (d == NULL)
1269 		goto mibdiff_out_of_memory;
1270 	diffptr->valp = d;
1271 	MDIFF(d, i2, i1, ipv6IfIcmpInMsgs);
1272 	MDIFF(d, i2, i1, ipv6IfIcmpInErrors);
1273 	MDIFF(d, i2, i1, ipv6IfIcmpInDestUnreachs);
1274 	MDIFF(d, i2, i1, ipv6IfIcmpInAdminProhibs);
1275 	MDIFF(d, i2, i1, ipv6IfIcmpInTimeExcds);
1276 	MDIFF(d, i2, i1, ipv6IfIcmpInParmProblems);
1277 	MDIFF(d, i2, i1, ipv6IfIcmpInPktTooBigs);
1278 	MDIFF(d, i2, i1, ipv6IfIcmpInEchos);
1279 	MDIFF(d, i2, i1, ipv6IfIcmpInEchoReplies);
1280 	MDIFF(d, i2, i1, ipv6IfIcmpInRouterSolicits);
1281 	MDIFF(d, i2, i1, ipv6IfIcmpInRouterAdvertisements);
1282 	MDIFF(d, i2, i1, ipv6IfIcmpInNeighborSolicits);
1283 	MDIFF(d, i2, i1, ipv6IfIcmpInNeighborAdvertisements);
1284 	MDIFF(d, i2, i1, ipv6IfIcmpInRedirects);
1285 	MDIFF(d, i2, i1, ipv6IfIcmpInBadRedirects);
1286 	MDIFF(d, i2, i1, ipv6IfIcmpInGroupMembQueries);
1287 	MDIFF(d, i2, i1, ipv6IfIcmpInGroupMembResponses);
1288 	MDIFF(d, i2, i1, ipv6IfIcmpInGroupMembReductions);
1289 	MDIFF(d, i2, i1, ipv6IfIcmpInOverflows);
1290 	MDIFF(d, i2, i1, ipv6IfIcmpOutMsgs);
1291 	MDIFF(d, i2, i1, ipv6IfIcmpOutErrors);
1292 	MDIFF(d, i2, i1, ipv6IfIcmpOutDestUnreachs);
1293 	MDIFF(d, i2, i1, ipv6IfIcmpOutAdminProhibs);
1294 	MDIFF(d, i2, i1, ipv6IfIcmpOutTimeExcds);
1295 	MDIFF(d, i2, i1, ipv6IfIcmpOutParmProblems);
1296 	MDIFF(d, i2, i1, ipv6IfIcmpOutPktTooBigs);
1297 	MDIFF(d, i2, i1, ipv6IfIcmpOutEchos);
1298 	MDIFF(d, i2, i1, ipv6IfIcmpOutEchoReplies);
1299 	MDIFF(d, i2, i1, ipv6IfIcmpOutRouterSolicits);
1300 	MDIFF(d, i2, i1, ipv6IfIcmpOutRouterAdvertisements);
1301 	MDIFF(d, i2, i1, ipv6IfIcmpOutNeighborSolicits);
1302 	MDIFF(d, i2, i1, ipv6IfIcmpOutNeighborAdvertisements);
1303 	MDIFF(d, i2, i1, ipv6IfIcmpOutRedirects);
1304 	MDIFF(d, i2, i1, ipv6IfIcmpOutGroupMembQueries);
1305 	MDIFF(d, i2, i1, ipv6IfIcmpOutGroupMembResponses);
1306 	MDIFF(d, i2, i1, ipv6IfIcmpOutGroupMembReductions);
1307 	prevp = diffptr++;
1308 	break;
1309 			}
1310 			case MIB2_TCP: {
1311 				mib2_tcp_t *t2;
1312 				mib2_tcp_t *t1;
1313 				mib2_tcp_t *d;
1314 
1315 				t2 = (mib2_tcp_t *)tempp2->valp;
1316 				t1 = (mib2_tcp_t *)tempp1->valp;
1317 				diffptr->group = tempp2->group;
1318 				diffptr->mib_id = tempp2->mib_id;
1319 				diffptr->length = tempp2->length;
1320 				d = (mib2_tcp_t *)calloc(tempp2->length, 1);
1321 				if (d == NULL)
1322 					goto mibdiff_out_of_memory;
1323 				diffptr->valp = d;
1324 				d->tcpRtoMin = t2->tcpRtoMin;
1325 				d->tcpRtoMax = t2->tcpRtoMax;
1326 				d->tcpMaxConn = t2->tcpMaxConn;
1327 				MDIFF(d, t2, t1, tcpActiveOpens);
1328 				MDIFF(d, t2, t1, tcpPassiveOpens);
1329 				MDIFF(d, t2, t1, tcpAttemptFails);
1330 				MDIFF(d, t2, t1, tcpEstabResets);
1331 				d->tcpCurrEstab = t2->tcpCurrEstab;
1332 				MDIFF(d, t2, t1, tcpHCOutSegs);
1333 				MDIFF(d, t2, t1, tcpOutDataSegs);
1334 				MDIFF(d, t2, t1, tcpOutDataBytes);
1335 				MDIFF(d, t2, t1, tcpRetransSegs);
1336 				MDIFF(d, t2, t1, tcpRetransBytes);
1337 				MDIFF(d, t2, t1, tcpOutAck);
1338 				MDIFF(d, t2, t1, tcpOutAckDelayed);
1339 				MDIFF(d, t2, t1, tcpOutUrg);
1340 				MDIFF(d, t2, t1, tcpOutWinUpdate);
1341 				MDIFF(d, t2, t1, tcpOutWinProbe);
1342 				MDIFF(d, t2, t1, tcpOutControl);
1343 				MDIFF(d, t2, t1, tcpOutRsts);
1344 				MDIFF(d, t2, t1, tcpOutFastRetrans);
1345 				MDIFF(d, t2, t1, tcpHCInSegs);
1346 				MDIFF(d, t2, t1, tcpInAckSegs);
1347 				MDIFF(d, t2, t1, tcpInAckBytes);
1348 				MDIFF(d, t2, t1, tcpInDupAck);
1349 				MDIFF(d, t2, t1, tcpInAckUnsent);
1350 				MDIFF(d, t2, t1, tcpInDataInorderSegs);
1351 				MDIFF(d, t2, t1, tcpInDataInorderBytes);
1352 				MDIFF(d, t2, t1, tcpInDataUnorderSegs);
1353 				MDIFF(d, t2, t1, tcpInDataUnorderBytes);
1354 				MDIFF(d, t2, t1, tcpInDataDupSegs);
1355 				MDIFF(d, t2, t1, tcpInDataDupBytes);
1356 				MDIFF(d, t2, t1, tcpInDataPartDupSegs);
1357 				MDIFF(d, t2, t1, tcpInDataPartDupBytes);
1358 				MDIFF(d, t2, t1, tcpInDataPastWinSegs);
1359 				MDIFF(d, t2, t1, tcpInDataPastWinBytes);
1360 				MDIFF(d, t2, t1, tcpInWinProbe);
1361 				MDIFF(d, t2, t1, tcpInWinUpdate);
1362 				MDIFF(d, t2, t1, tcpInClosed);
1363 				MDIFF(d, t2, t1, tcpRttNoUpdate);
1364 				MDIFF(d, t2, t1, tcpRttUpdate);
1365 				MDIFF(d, t2, t1, tcpTimRetrans);
1366 				MDIFF(d, t2, t1, tcpTimRetransDrop);
1367 				MDIFF(d, t2, t1, tcpTimKeepalive);
1368 				MDIFF(d, t2, t1, tcpTimKeepaliveProbe);
1369 				MDIFF(d, t2, t1, tcpTimKeepaliveDrop);
1370 				MDIFF(d, t2, t1, tcpListenDrop);
1371 				MDIFF(d, t2, t1, tcpListenDropQ0);
1372 				MDIFF(d, t2, t1, tcpHalfOpenDrop);
1373 				MDIFF(d, t2, t1, tcpOutSackRetransSegs);
1374 				prevp = diffptr++;
1375 				break;
1376 			}
1377 			case MIB2_UDP: {
1378 				mib2_udp_t *u2;
1379 				mib2_udp_t *u1;
1380 				mib2_udp_t *d;
1381 
1382 				u2 = (mib2_udp_t *)tempp2->valp;
1383 				u1 = (mib2_udp_t *)tempp1->valp;
1384 				diffptr->group = tempp2->group;
1385 				diffptr->mib_id = tempp2->mib_id;
1386 				diffptr->length = tempp2->length;
1387 				d = (mib2_udp_t *)calloc(tempp2->length, 1);
1388 				if (d == NULL)
1389 					goto mibdiff_out_of_memory;
1390 				diffptr->valp = d;
1391 				MDIFF(d, u2, u1, udpHCInDatagrams);
1392 				MDIFF(d, u2, u1, udpInErrors);
1393 				MDIFF(d, u2, u1, udpHCOutDatagrams);
1394 				MDIFF(d, u2, u1, udpOutErrors);
1395 				prevp = diffptr++;
1396 				break;
1397 			}
1398 			case MIB2_SCTP: {
1399 				mib2_sctp_t *s2;
1400 				mib2_sctp_t *s1;
1401 				mib2_sctp_t *d;
1402 
1403 				s2 = (mib2_sctp_t *)tempp2->valp;
1404 				s1 = (mib2_sctp_t *)tempp1->valp;
1405 				diffptr->group = tempp2->group;
1406 				diffptr->mib_id = tempp2->mib_id;
1407 				diffptr->length = tempp2->length;
1408 				d = (mib2_sctp_t *)calloc(tempp2->length, 1);
1409 				if (d == NULL)
1410 					goto mibdiff_out_of_memory;
1411 				diffptr->valp = d;
1412 				d->sctpRtoAlgorithm = s2->sctpRtoAlgorithm;
1413 				d->sctpRtoMin = s2->sctpRtoMin;
1414 				d->sctpRtoMax = s2->sctpRtoMax;
1415 				d->sctpRtoInitial = s2->sctpRtoInitial;
1416 				d->sctpMaxAssocs = s2->sctpMaxAssocs;
1417 				d->sctpValCookieLife = s2->sctpValCookieLife;
1418 				d->sctpMaxInitRetr = s2->sctpMaxInitRetr;
1419 				d->sctpCurrEstab = s2->sctpCurrEstab;
1420 				MDIFF(d, s2, s1, sctpActiveEstab);
1421 				MDIFF(d, s2, s1, sctpPassiveEstab);
1422 				MDIFF(d, s2, s1, sctpAborted);
1423 				MDIFF(d, s2, s1, sctpShutdowns);
1424 				MDIFF(d, s2, s1, sctpOutOfBlue);
1425 				MDIFF(d, s2, s1, sctpChecksumError);
1426 				MDIFF(d, s2, s1, sctpOutCtrlChunks);
1427 				MDIFF(d, s2, s1, sctpOutOrderChunks);
1428 				MDIFF(d, s2, s1, sctpOutUnorderChunks);
1429 				MDIFF(d, s2, s1, sctpRetransChunks);
1430 				MDIFF(d, s2, s1, sctpOutAck);
1431 				MDIFF(d, s2, s1, sctpOutAckDelayed);
1432 				MDIFF(d, s2, s1, sctpOutWinUpdate);
1433 				MDIFF(d, s2, s1, sctpOutFastRetrans);
1434 				MDIFF(d, s2, s1, sctpOutWinProbe);
1435 				MDIFF(d, s2, s1, sctpInCtrlChunks);
1436 				MDIFF(d, s2, s1, sctpInOrderChunks);
1437 				MDIFF(d, s2, s1, sctpInUnorderChunks);
1438 				MDIFF(d, s2, s1, sctpInAck);
1439 				MDIFF(d, s2, s1, sctpInDupAck);
1440 				MDIFF(d, s2, s1, sctpInAckUnsent);
1441 				MDIFF(d, s2, s1, sctpFragUsrMsgs);
1442 				MDIFF(d, s2, s1, sctpReasmUsrMsgs);
1443 				MDIFF(d, s2, s1, sctpOutSCTPPkts);
1444 				MDIFF(d, s2, s1, sctpInSCTPPkts);
1445 				MDIFF(d, s2, s1, sctpInInvalidCookie);
1446 				MDIFF(d, s2, s1, sctpTimRetrans);
1447 				MDIFF(d, s2, s1, sctpTimRetransDrop);
1448 				MDIFF(d, s2, s1, sctpTimHeartBeatProbe);
1449 				MDIFF(d, s2, s1, sctpTimHeartBeatDrop);
1450 				MDIFF(d, s2, s1, sctpListenDrop);
1451 				MDIFF(d, s2, s1, sctpInClosed);
1452 				prevp = diffptr++;
1453 				break;
1454 			}
1455 			case EXPER_RAWIP: {
1456 				mib2_rawip_t *r2;
1457 				mib2_rawip_t *r1;
1458 				mib2_rawip_t *d;
1459 
1460 				r2 = (mib2_rawip_t *)tempp2->valp;
1461 				r1 = (mib2_rawip_t *)tempp1->valp;
1462 				diffptr->group = tempp2->group;
1463 				diffptr->mib_id = tempp2->mib_id;
1464 				diffptr->length = tempp2->length;
1465 				d = (mib2_rawip_t *)calloc(tempp2->length, 1);
1466 				if (d == NULL)
1467 					goto mibdiff_out_of_memory;
1468 				diffptr->valp = d;
1469 				MDIFF(d, r2, r1, rawipInDatagrams);
1470 				MDIFF(d, r2, r1, rawipInErrors);
1471 				MDIFF(d, r2, r1, rawipInCksumErrs);
1472 				MDIFF(d, r2, r1, rawipOutDatagrams);
1473 				MDIFF(d, r2, r1, rawipOutErrors);
1474 				prevp = diffptr++;
1475 				break;
1476 			}
1477 			/*
1478 			 * there are more "group" types but they aren't
1479 			 * required for the -s and -Ms options
1480 			 */
1481 			}
1482 		} /* 'for' loop 2 ends */
1483 		tempp1 = NULL;
1484 	} /* 'for' loop 1 ends */
1485 	tempp2 = NULL;
1486 	diffptr--;
1487 	diffptr->next_item = NULL;
1488 	return (diffp);
1489 
1490 mibdiff_out_of_memory:;
1491 	mib_item_destroy(&diffp);
1492 	return (NULL);
1493 }
1494 
1495 /*
1496  * mib_item_destroy: cleans up a mib_item_t *
1497  * that was created by calling mib_item_dup or
1498  * mib_item_diff
1499  */
1500 static void
1501 mib_item_destroy(mib_item_t **itemp) {
1502 	int	nitems = 0;
1503 	int	c = 0;
1504 	mib_item_t *tempp;
1505 
1506 	if (itemp == NULL || *itemp == NULL)
1507 		return;
1508 
1509 	for (tempp = *itemp; tempp != NULL; tempp = tempp->next_item)
1510 		if (tempp->mib_id == 0)
1511 			nitems++;
1512 		else
1513 			return;	/* cannot destroy! */
1514 
1515 	if (nitems == 0)
1516 		return;		/* cannot destroy! */
1517 
1518 	for (c = nitems - 1; c >= 0; c--) {
1519 		if ((itemp[0][c]).valp != NULL)
1520 			free((itemp[0][c]).valp);
1521 	}
1522 	free(*itemp);
1523 
1524 	*itemp = NULL;
1525 }
1526 
1527 /* Compare two Octet_ts.  Return B_TRUE if they match, B_FALSE if not. */
1528 static boolean_t
1529 octetstrmatch(const Octet_t *a, const Octet_t *b)
1530 {
1531 	if (a == NULL || b == NULL)
1532 		return (B_FALSE);
1533 
1534 	if (a->o_length != b->o_length)
1535 		return (B_FALSE);
1536 
1537 	return (memcmp(a->o_bytes, b->o_bytes, a->o_length) == 0);
1538 }
1539 
1540 /* If octetstr() changes make an appropriate change to STR_EXPAND */
1541 static char *
1542 octetstr(const Octet_t *op, int code, char *dst, uint_t dstlen)
1543 {
1544 	int	i;
1545 	char	*cp;
1546 
1547 	cp = dst;
1548 	if (op) {
1549 		for (i = 0; i < op->o_length; i++) {
1550 			switch (code) {
1551 			case 'd':
1552 				if (cp - dst + 4 > dstlen) {
1553 					*cp = '\0';
1554 					return (dst);
1555 				}
1556 				(void) snprintf(cp, 5, "%d.",
1557 				    0xff & op->o_bytes[i]);
1558 				cp = strchr(cp, '\0');
1559 				break;
1560 			case 'a':
1561 				if (cp - dst + 1 > dstlen) {
1562 					*cp = '\0';
1563 					return (dst);
1564 				}
1565 				*cp++ = op->o_bytes[i];
1566 				break;
1567 			case 'h':
1568 			default:
1569 				if (cp - dst + 3 > dstlen) {
1570 					*cp = '\0';
1571 					return (dst);
1572 				}
1573 				(void) snprintf(cp, 4, "%02x:",
1574 				    0xff & op->o_bytes[i]);
1575 				cp += 3;
1576 				break;
1577 			}
1578 		}
1579 	}
1580 	if (code != 'a' && cp != dst)
1581 		cp--;
1582 	*cp = '\0';
1583 	return (dst);
1584 }
1585 
1586 static const char *
1587 mitcp_state(int state, const mib2_transportMLPEntry_t *attr)
1588 {
1589 	static char tcpsbuf[50];
1590 	const char *cp;
1591 
1592 	switch (state) {
1593 	case TCPS_CLOSED:
1594 		cp = "CLOSED";
1595 		break;
1596 	case TCPS_IDLE:
1597 		cp = "IDLE";
1598 		break;
1599 	case TCPS_BOUND:
1600 		cp = "BOUND";
1601 		break;
1602 	case TCPS_LISTEN:
1603 		cp = "LISTEN";
1604 		break;
1605 	case TCPS_SYN_SENT:
1606 		cp = "SYN_SENT";
1607 		break;
1608 	case TCPS_SYN_RCVD:
1609 		cp = "SYN_RCVD";
1610 		break;
1611 	case TCPS_ESTABLISHED:
1612 		cp = "ESTABLISHED";
1613 		break;
1614 	case TCPS_CLOSE_WAIT:
1615 		cp = "CLOSE_WAIT";
1616 		break;
1617 	case TCPS_FIN_WAIT_1:
1618 		cp = "FIN_WAIT_1";
1619 		break;
1620 	case TCPS_CLOSING:
1621 		cp = "CLOSING";
1622 		break;
1623 	case TCPS_LAST_ACK:
1624 		cp = "LAST_ACK";
1625 		break;
1626 	case TCPS_FIN_WAIT_2:
1627 		cp = "FIN_WAIT_2";
1628 		break;
1629 	case TCPS_TIME_WAIT:
1630 		cp = "TIME_WAIT";
1631 		break;
1632 	default:
1633 		(void) snprintf(tcpsbuf, sizeof (tcpsbuf),
1634 		    "UnknownState(%d)", state);
1635 		cp = tcpsbuf;
1636 		break;
1637 	}
1638 
1639 	if (RSECflag && attr != NULL && attr->tme_flags != 0) {
1640 		if (cp != tcpsbuf) {
1641 			(void) strlcpy(tcpsbuf, cp, sizeof (tcpsbuf));
1642 			cp = tcpsbuf;
1643 		}
1644 		if (attr->tme_flags & MIB2_TMEF_PRIVATE)
1645 			(void) strlcat(tcpsbuf, " P", sizeof (tcpsbuf));
1646 		if (attr->tme_flags & MIB2_TMEF_SHARED)
1647 			(void) strlcat(tcpsbuf, " S", sizeof (tcpsbuf));
1648 	}
1649 
1650 	return (cp);
1651 }
1652 
1653 static const char *
1654 miudp_state(int state, const mib2_transportMLPEntry_t *attr)
1655 {
1656 	static char udpsbuf[50];
1657 	const char *cp;
1658 
1659 	switch (state) {
1660 	case MIB2_UDP_unbound:
1661 		cp = "Unbound";
1662 		break;
1663 	case MIB2_UDP_idle:
1664 		cp = "Idle";
1665 		break;
1666 	case MIB2_UDP_connected:
1667 		cp = "Connected";
1668 		break;
1669 	default:
1670 		(void) snprintf(udpsbuf, sizeof (udpsbuf),
1671 		    "Unknown State(%d)", state);
1672 		cp = udpsbuf;
1673 		break;
1674 	}
1675 
1676 	if (RSECflag && attr != NULL && attr->tme_flags != 0) {
1677 		if (cp != udpsbuf) {
1678 			(void) strlcpy(udpsbuf, cp, sizeof (udpsbuf));
1679 			cp = udpsbuf;
1680 		}
1681 		if (attr->tme_flags & MIB2_TMEF_PRIVATE)
1682 			(void) strlcat(udpsbuf, " P", sizeof (udpsbuf));
1683 		if (attr->tme_flags & MIB2_TMEF_SHARED)
1684 			(void) strlcat(udpsbuf, " S", sizeof (udpsbuf));
1685 	}
1686 
1687 	return (cp);
1688 }
1689 
1690 static int odd;
1691 
1692 static void
1693 prval_init(void)
1694 {
1695 	odd = 0;
1696 }
1697 
1698 static void
1699 prval(char *str, Counter val)
1700 {
1701 	(void) printf("\t%-20s=%6u", str, val);
1702 	if (odd++ & 1)
1703 		(void) putchar('\n');
1704 }
1705 
1706 static void
1707 prval64(char *str, Counter64 val)
1708 {
1709 	(void) printf("\t%-20s=%6llu", str, val);
1710 	if (odd++ & 1)
1711 		(void) putchar('\n');
1712 }
1713 
1714 static void
1715 pr_int_val(char *str, int val)
1716 {
1717 	(void) printf("\t%-20s=%6d", str, val);
1718 	if (odd++ & 1)
1719 		(void) putchar('\n');
1720 }
1721 
1722 static void
1723 pr_sctp_rtoalgo(char *str, int val)
1724 {
1725 	(void) printf("\t%-20s=", str);
1726 	switch (val) {
1727 		case MIB2_SCTP_RTOALGO_OTHER:
1728 			(void) printf("%6.6s", "other");
1729 			break;
1730 
1731 		case MIB2_SCTP_RTOALGO_VANJ:
1732 			(void) printf("%6.6s", "vanj");
1733 			break;
1734 
1735 		default:
1736 			(void) printf("%6d", val);
1737 			break;
1738 	}
1739 	if (odd++ & 1)
1740 		(void) putchar('\n');
1741 }
1742 
1743 static void
1744 prval_end(void)
1745 {
1746 	if (odd++ & 1)
1747 		(void) putchar('\n');
1748 }
1749 
1750 /* Extract constant sizes */
1751 static void
1752 mib_get_constants(mib_item_t *item)
1753 {
1754 	/* 'for' loop 1: */
1755 	for (; item; item = item->next_item) {
1756 		if (item->mib_id != 0)
1757 			continue; /* 'for' loop 1 */
1758 
1759 		switch (item->group) {
1760 		case MIB2_IP: {
1761 			mib2_ip_t	*ip = (mib2_ip_t *)item->valp;
1762 
1763 			ipAddrEntrySize = ip->ipAddrEntrySize;
1764 			ipRouteEntrySize = ip->ipRouteEntrySize;
1765 			ipNetToMediaEntrySize = ip->ipNetToMediaEntrySize;
1766 			ipMemberEntrySize = ip->ipMemberEntrySize;
1767 			ipGroupSourceEntrySize = ip->ipGroupSourceEntrySize;
1768 			ipRouteAttributeSize = ip->ipRouteAttributeSize;
1769 			transportMLPSize = ip->transportMLPSize;
1770 			ipDestEntrySize = ip->ipDestEntrySize;
1771 			assert(IS_P2ALIGNED(ipAddrEntrySize,
1772 			    sizeof (mib2_ipAddrEntry_t *)));
1773 			assert(IS_P2ALIGNED(ipRouteEntrySize,
1774 			    sizeof (mib2_ipRouteEntry_t *)));
1775 			assert(IS_P2ALIGNED(ipNetToMediaEntrySize,
1776 			    sizeof (mib2_ipNetToMediaEntry_t *)));
1777 			assert(IS_P2ALIGNED(ipMemberEntrySize,
1778 			    sizeof (ip_member_t *)));
1779 			assert(IS_P2ALIGNED(ipGroupSourceEntrySize,
1780 			    sizeof (ip_grpsrc_t *)));
1781 			assert(IS_P2ALIGNED(ipRouteAttributeSize,
1782 			    sizeof (mib2_ipAttributeEntry_t *)));
1783 			assert(IS_P2ALIGNED(transportMLPSize,
1784 			    sizeof (mib2_transportMLPEntry_t *)));
1785 			break;
1786 		}
1787 		case EXPER_DVMRP: {
1788 			struct mrtstat	*mrts = (struct mrtstat *)item->valp;
1789 
1790 			vifctlSize = mrts->mrts_vifctlSize;
1791 			mfcctlSize = mrts->mrts_mfcctlSize;
1792 			assert(IS_P2ALIGNED(vifctlSize,
1793 			    sizeof (struct vifclt *)));
1794 			assert(IS_P2ALIGNED(mfcctlSize,
1795 			    sizeof (struct mfcctl *)));
1796 			break;
1797 		}
1798 		case MIB2_IP6: {
1799 			mib2_ipv6IfStatsEntry_t *ip6;
1800 			/* Just use the first entry */
1801 
1802 			ip6 = (mib2_ipv6IfStatsEntry_t *)item->valp;
1803 			ipv6IfStatsEntrySize = ip6->ipv6IfStatsEntrySize;
1804 			ipv6AddrEntrySize = ip6->ipv6AddrEntrySize;
1805 			ipv6RouteEntrySize = ip6->ipv6RouteEntrySize;
1806 			ipv6NetToMediaEntrySize = ip6->ipv6NetToMediaEntrySize;
1807 			ipv6MemberEntrySize = ip6->ipv6MemberEntrySize;
1808 			ipv6GroupSourceEntrySize =
1809 			    ip6->ipv6GroupSourceEntrySize;
1810 			assert(IS_P2ALIGNED(ipv6IfStatsEntrySize,
1811 			    sizeof (mib2_ipv6IfStatsEntry_t *)));
1812 			assert(IS_P2ALIGNED(ipv6AddrEntrySize,
1813 			    sizeof (mib2_ipv6AddrEntry_t *)));
1814 			assert(IS_P2ALIGNED(ipv6RouteEntrySize,
1815 			    sizeof (mib2_ipv6RouteEntry_t *)));
1816 			assert(IS_P2ALIGNED(ipv6NetToMediaEntrySize,
1817 			    sizeof (mib2_ipv6NetToMediaEntry_t *)));
1818 			assert(IS_P2ALIGNED(ipv6MemberEntrySize,
1819 			    sizeof (ipv6_member_t *)));
1820 			assert(IS_P2ALIGNED(ipv6GroupSourceEntrySize,
1821 			    sizeof (ipv6_grpsrc_t *)));
1822 			break;
1823 		}
1824 		case MIB2_ICMP6: {
1825 			mib2_ipv6IfIcmpEntry_t *icmp6;
1826 			/* Just use the first entry */
1827 
1828 			icmp6 = (mib2_ipv6IfIcmpEntry_t *)item->valp;
1829 			ipv6IfIcmpEntrySize = icmp6->ipv6IfIcmpEntrySize;
1830 			assert(IS_P2ALIGNED(ipv6IfIcmpEntrySize,
1831 			    sizeof (mib2_ipv6IfIcmpEntry_t *)));
1832 			break;
1833 		}
1834 		case MIB2_TCP: {
1835 			mib2_tcp_t	*tcp = (mib2_tcp_t *)item->valp;
1836 
1837 			tcpConnEntrySize = tcp->tcpConnTableSize;
1838 			tcp6ConnEntrySize = tcp->tcp6ConnTableSize;
1839 			assert(IS_P2ALIGNED(tcpConnEntrySize,
1840 			    sizeof (mib2_tcpConnEntry_t *)));
1841 			assert(IS_P2ALIGNED(tcp6ConnEntrySize,
1842 			    sizeof (mib2_tcp6ConnEntry_t *)));
1843 			break;
1844 		}
1845 		case MIB2_UDP: {
1846 			mib2_udp_t	*udp = (mib2_udp_t *)item->valp;
1847 
1848 			udpEntrySize = udp->udpEntrySize;
1849 			udp6EntrySize = udp->udp6EntrySize;
1850 			assert(IS_P2ALIGNED(udpEntrySize,
1851 			    sizeof (mib2_udpEntry_t *)));
1852 			assert(IS_P2ALIGNED(udp6EntrySize,
1853 			    sizeof (mib2_udp6Entry_t *)));
1854 			break;
1855 		}
1856 		case MIB2_SCTP: {
1857 			mib2_sctp_t	*sctp = (mib2_sctp_t *)item->valp;
1858 
1859 			sctpEntrySize = sctp->sctpEntrySize;
1860 			sctpLocalEntrySize = sctp->sctpLocalEntrySize;
1861 			sctpRemoteEntrySize = sctp->sctpRemoteEntrySize;
1862 			break;
1863 		}
1864 		}
1865 	} /* 'for' loop 1 ends */
1866 
1867 	if (Xflag) {
1868 		(void) puts("mib_get_constants:");
1869 		(void) printf("\tipv6IfStatsEntrySize %d\n",
1870 		    ipv6IfStatsEntrySize);
1871 		(void) printf("\tipAddrEntrySize %d\n", ipAddrEntrySize);
1872 		(void) printf("\tipRouteEntrySize %d\n", ipRouteEntrySize);
1873 		(void) printf("\tipNetToMediaEntrySize %d\n",
1874 		    ipNetToMediaEntrySize);
1875 		(void) printf("\tipMemberEntrySize %d\n", ipMemberEntrySize);
1876 		(void) printf("\tipRouteAttributeSize %d\n",
1877 		    ipRouteAttributeSize);
1878 		(void) printf("\tvifctlSize %d\n", vifctlSize);
1879 		(void) printf("\tmfcctlSize %d\n", mfcctlSize);
1880 
1881 		(void) printf("\tipv6AddrEntrySize %d\n", ipv6AddrEntrySize);
1882 		(void) printf("\tipv6RouteEntrySize %d\n", ipv6RouteEntrySize);
1883 		(void) printf("\tipv6NetToMediaEntrySize %d\n",
1884 		    ipv6NetToMediaEntrySize);
1885 		(void) printf("\tipv6MemberEntrySize %d\n",
1886 		    ipv6MemberEntrySize);
1887 		(void) printf("\tipv6IfIcmpEntrySize %d\n",
1888 		    ipv6IfIcmpEntrySize);
1889 		(void) printf("\tipDestEntrySize %d\n", ipDestEntrySize);
1890 		(void) printf("\ttransportMLPSize %d\n", transportMLPSize);
1891 		(void) printf("\ttcpConnEntrySize %d\n", tcpConnEntrySize);
1892 		(void) printf("\ttcp6ConnEntrySize %d\n", tcp6ConnEntrySize);
1893 		(void) printf("\tudpEntrySize %d\n", udpEntrySize);
1894 		(void) printf("\tudp6EntrySize %d\n", udp6EntrySize);
1895 		(void) printf("\tsctpEntrySize %d\n", sctpEntrySize);
1896 		(void) printf("\tsctpLocalEntrySize %d\n", sctpLocalEntrySize);
1897 		(void) printf("\tsctpRemoteEntrySize %d\n",
1898 		    sctpRemoteEntrySize);
1899 	}
1900 }
1901 
1902 
1903 /* ----------------------------- STAT_REPORT ------------------------------- */
1904 
1905 static void
1906 stat_report(mib_item_t *item)
1907 {
1908 	int	jtemp = 0;
1909 	char	ifname[LIFNAMSIZ + 1];
1910 
1911 	/* 'for' loop 1: */
1912 	for (; item; item = item->next_item) {
1913 		if (Xflag) {
1914 			(void) printf("\n--- Entry %d ---\n", ++jtemp);
1915 			(void) printf("Group = %d, mib_id = %d, "
1916 			    "length = %d, valp = 0x%p\n",
1917 			    item->group, item->mib_id,
1918 			    item->length, item->valp);
1919 		}
1920 		if (item->mib_id != 0)
1921 			continue; /* 'for' loop 1 */
1922 
1923 		switch (item->group) {
1924 		case MIB2_IP: {
1925 			mib2_ip_t	*ip = (mib2_ip_t *)item->valp;
1926 
1927 			if (protocol_selected(IPPROTO_IP) &&
1928 			    family_selected(AF_INET)) {
1929 				(void) fputs(v4compat ? "\nIP" : "\nIPv4",
1930 				    stdout);
1931 				print_ip_stats(ip);
1932 			}
1933 			break;
1934 		}
1935 		case MIB2_ICMP: {
1936 			mib2_icmp_t	*icmp =
1937 			    (mib2_icmp_t *)item->valp;
1938 
1939 			if (protocol_selected(IPPROTO_ICMP) &&
1940 			    family_selected(AF_INET)) {
1941 				(void) fputs(v4compat ? "\nICMP" : "\nICMPv4",
1942 				    stdout);
1943 				print_icmp_stats(icmp);
1944 			}
1945 			break;
1946 		}
1947 		case MIB2_IP6: {
1948 			mib2_ipv6IfStatsEntry_t *ip6;
1949 			mib2_ipv6IfStatsEntry_t sum6;
1950 
1951 			if (!(protocol_selected(IPPROTO_IPV6)) ||
1952 			    !(family_selected(AF_INET6)))
1953 				break;
1954 			bzero(&sum6, sizeof (sum6));
1955 			/* 'for' loop 2a: */
1956 			for (ip6 = (mib2_ipv6IfStatsEntry_t *)item->valp;
1957 			    (char *)ip6 < (char *)item->valp + item->length;
1958 			    /* LINTED: (note 1) */
1959 			    ip6 = (mib2_ipv6IfStatsEntry_t *)((char *)ip6 +
1960 			    ipv6IfStatsEntrySize)) {
1961 				if (ip6->ipv6IfIndex == 0) {
1962 					/*
1963 					 * The "unknown interface" ip6
1964 					 * mib. Just add to the sum.
1965 					 */
1966 					sum_ip6_stats(ip6, &sum6);
1967 					continue; /* 'for' loop 2a */
1968 				}
1969 				if (Aflag) {
1970 					(void) printf("\nIPv6 for %s\n",
1971 					    ifindex2str(ip6->ipv6IfIndex,
1972 					    ifname));
1973 					print_ip6_stats(ip6);
1974 				}
1975 				sum_ip6_stats(ip6, &sum6);
1976 			} /* 'for' loop 2a ends */
1977 			(void) fputs("\nIPv6", stdout);
1978 			print_ip6_stats(&sum6);
1979 			break;
1980 		}
1981 		case MIB2_ICMP6: {
1982 			mib2_ipv6IfIcmpEntry_t *icmp6;
1983 			mib2_ipv6IfIcmpEntry_t sum6;
1984 
1985 			if (!(protocol_selected(IPPROTO_ICMPV6)) ||
1986 			    !(family_selected(AF_INET6)))
1987 				break;
1988 			bzero(&sum6, sizeof (sum6));
1989 			/* 'for' loop 2b: */
1990 			for (icmp6 = (mib2_ipv6IfIcmpEntry_t *)item->valp;
1991 			    (char *)icmp6 < (char *)item->valp + item->length;
1992 			    icmp6 = (void *)((char *)icmp6 +
1993 			    ipv6IfIcmpEntrySize)) {
1994 				if (icmp6->ipv6IfIcmpIfIndex == 0) {
1995 					/*
1996 					 * The "unknown interface" icmp6
1997 					 * mib. Just add to the sum.
1998 					 */
1999 					sum_icmp6_stats(icmp6, &sum6);
2000 					continue; /* 'for' loop 2b: */
2001 				}
2002 				if (Aflag) {
2003 					(void) printf("\nICMPv6 for %s\n",
2004 					    ifindex2str(
2005 					    icmp6->ipv6IfIcmpIfIndex, ifname));
2006 					print_icmp6_stats(icmp6);
2007 				}
2008 				sum_icmp6_stats(icmp6, &sum6);
2009 			} /* 'for' loop 2b ends */
2010 			(void) fputs("\nICMPv6", stdout);
2011 			print_icmp6_stats(&sum6);
2012 			break;
2013 		}
2014 		case MIB2_TCP: {
2015 			mib2_tcp_t	*tcp = (mib2_tcp_t *)item->valp;
2016 
2017 			if (protocol_selected(IPPROTO_TCP) &&
2018 			    (family_selected(AF_INET) ||
2019 			    family_selected(AF_INET6))) {
2020 				(void) fputs("\nTCP", stdout);
2021 				print_tcp_stats(tcp);
2022 			}
2023 			break;
2024 		}
2025 		case MIB2_UDP: {
2026 			mib2_udp_t	*udp = (mib2_udp_t *)item->valp;
2027 
2028 			if (protocol_selected(IPPROTO_UDP) &&
2029 			    (family_selected(AF_INET) ||
2030 			    family_selected(AF_INET6))) {
2031 				(void) fputs("\nUDP", stdout);
2032 				print_udp_stats(udp);
2033 			}
2034 			break;
2035 		}
2036 		case MIB2_SCTP: {
2037 			mib2_sctp_t	*sctp = (mib2_sctp_t *)item->valp;
2038 
2039 			if (protocol_selected(IPPROTO_SCTP) &&
2040 			    (family_selected(AF_INET) ||
2041 			    family_selected(AF_INET6))) {
2042 				(void) fputs("\nSCTP", stdout);
2043 				print_sctp_stats(sctp);
2044 			}
2045 			break;
2046 		}
2047 		case EXPER_RAWIP: {
2048 			mib2_rawip_t	*rawip =
2049 			    (mib2_rawip_t *)item->valp;
2050 
2051 			if (protocol_selected(IPPROTO_RAW) &&
2052 			    (family_selected(AF_INET) ||
2053 			    family_selected(AF_INET6))) {
2054 				(void) fputs("\nRAWIP", stdout);
2055 				print_rawip_stats(rawip);
2056 			}
2057 			break;
2058 		}
2059 		case EXPER_IGMP: {
2060 			struct igmpstat	*igps =
2061 			    (struct igmpstat *)item->valp;
2062 
2063 			if (protocol_selected(IPPROTO_IGMP) &&
2064 			    (family_selected(AF_INET))) {
2065 				(void) fputs("\nIGMP:\n", stdout);
2066 				print_igmp_stats(igps);
2067 			}
2068 			break;
2069 		}
2070 		}
2071 	} /* 'for' loop 1 ends */
2072 	(void) putchar('\n');
2073 	(void) fflush(stdout);
2074 }
2075 
2076 static void
2077 print_ip_stats(mib2_ip_t *ip)
2078 {
2079 	prval_init();
2080 	pr_int_val("ipForwarding",	ip->ipForwarding);
2081 	pr_int_val("ipDefaultTTL",	ip->ipDefaultTTL);
2082 	prval("ipInReceives",		ip->ipInReceives);
2083 	prval("ipInHdrErrors",		ip->ipInHdrErrors);
2084 	prval("ipInAddrErrors",		ip->ipInAddrErrors);
2085 	prval("ipInCksumErrs",		ip->ipInCksumErrs);
2086 	prval("ipForwDatagrams",	ip->ipForwDatagrams);
2087 	prval("ipForwProhibits",	ip->ipForwProhibits);
2088 	prval("ipInUnknownProtos",	ip->ipInUnknownProtos);
2089 	prval("ipInDiscards",		ip->ipInDiscards);
2090 	prval("ipInDelivers",		ip->ipInDelivers);
2091 	prval("ipOutRequests",		ip->ipOutRequests);
2092 	prval("ipOutDiscards",		ip->ipOutDiscards);
2093 	prval("ipOutNoRoutes",		ip->ipOutNoRoutes);
2094 	pr_int_val("ipReasmTimeout",	ip->ipReasmTimeout);
2095 	prval("ipReasmReqds",		ip->ipReasmReqds);
2096 	prval("ipReasmOKs",		ip->ipReasmOKs);
2097 	prval("ipReasmFails",		ip->ipReasmFails);
2098 	prval("ipReasmDuplicates",	ip->ipReasmDuplicates);
2099 	prval("ipReasmPartDups",	ip->ipReasmPartDups);
2100 	prval("ipFragOKs",		ip->ipFragOKs);
2101 	prval("ipFragFails",		ip->ipFragFails);
2102 	prval("ipFragCreates",		ip->ipFragCreates);
2103 	prval("ipRoutingDiscards",	ip->ipRoutingDiscards);
2104 
2105 	prval("tcpInErrs",		ip->tcpInErrs);
2106 	prval("udpNoPorts",		ip->udpNoPorts);
2107 	prval("udpInCksumErrs",		ip->udpInCksumErrs);
2108 	prval("udpInOverflows",		ip->udpInOverflows);
2109 	prval("rawipInOverflows",	ip->rawipInOverflows);
2110 	prval("ipsecInSucceeded",	ip->ipsecInSucceeded);
2111 	prval("ipsecInFailed",		ip->ipsecInFailed);
2112 	prval("ipInIPv6",		ip->ipInIPv6);
2113 	prval("ipOutIPv6",		ip->ipOutIPv6);
2114 	prval("ipOutSwitchIPv6",	ip->ipOutSwitchIPv6);
2115 	prval_end();
2116 }
2117 
2118 static void
2119 print_icmp_stats(mib2_icmp_t *icmp)
2120 {
2121 	prval_init();
2122 	prval("icmpInMsgs",		icmp->icmpInMsgs);
2123 	prval("icmpInErrors",		icmp->icmpInErrors);
2124 	prval("icmpInCksumErrs",	icmp->icmpInCksumErrs);
2125 	prval("icmpInUnknowns",		icmp->icmpInUnknowns);
2126 	prval("icmpInDestUnreachs",	icmp->icmpInDestUnreachs);
2127 	prval("icmpInTimeExcds",	icmp->icmpInTimeExcds);
2128 	prval("icmpInParmProbs",	icmp->icmpInParmProbs);
2129 	prval("icmpInSrcQuenchs",	icmp->icmpInSrcQuenchs);
2130 	prval("icmpInRedirects",	icmp->icmpInRedirects);
2131 	prval("icmpInBadRedirects",	icmp->icmpInBadRedirects);
2132 	prval("icmpInEchos",		icmp->icmpInEchos);
2133 	prval("icmpInEchoReps",		icmp->icmpInEchoReps);
2134 	prval("icmpInTimestamps",	icmp->icmpInTimestamps);
2135 	prval("icmpInTimestampReps",	icmp->icmpInTimestampReps);
2136 	prval("icmpInAddrMasks",	icmp->icmpInAddrMasks);
2137 	prval("icmpInAddrMaskReps",	icmp->icmpInAddrMaskReps);
2138 	prval("icmpInFragNeeded",	icmp->icmpInFragNeeded);
2139 	prval("icmpOutMsgs",		icmp->icmpOutMsgs);
2140 	prval("icmpOutDrops",		icmp->icmpOutDrops);
2141 	prval("icmpOutErrors",		icmp->icmpOutErrors);
2142 	prval("icmpOutDestUnreachs",	icmp->icmpOutDestUnreachs);
2143 	prval("icmpOutTimeExcds",	icmp->icmpOutTimeExcds);
2144 	prval("icmpOutParmProbs",	icmp->icmpOutParmProbs);
2145 	prval("icmpOutSrcQuenchs",	icmp->icmpOutSrcQuenchs);
2146 	prval("icmpOutRedirects",	icmp->icmpOutRedirects);
2147 	prval("icmpOutEchos",		icmp->icmpOutEchos);
2148 	prval("icmpOutEchoReps",	icmp->icmpOutEchoReps);
2149 	prval("icmpOutTimestamps",	icmp->icmpOutTimestamps);
2150 	prval("icmpOutTimestampReps",	icmp->icmpOutTimestampReps);
2151 	prval("icmpOutAddrMasks",	icmp->icmpOutAddrMasks);
2152 	prval("icmpOutAddrMaskReps",	icmp->icmpOutAddrMaskReps);
2153 	prval("icmpOutFragNeeded",	icmp->icmpOutFragNeeded);
2154 	prval("icmpInOverflows",	icmp->icmpInOverflows);
2155 	prval_end();
2156 }
2157 
2158 static void
2159 print_ip6_stats(mib2_ipv6IfStatsEntry_t *ip6)
2160 {
2161 	prval_init();
2162 	prval("ipv6Forwarding",		ip6->ipv6Forwarding);
2163 	prval("ipv6DefaultHopLimit",	ip6->ipv6DefaultHopLimit);
2164 
2165 	prval("ipv6InReceives",		ip6->ipv6InReceives);
2166 	prval("ipv6InHdrErrors",	ip6->ipv6InHdrErrors);
2167 	prval("ipv6InTooBigErrors",	ip6->ipv6InTooBigErrors);
2168 	prval("ipv6InNoRoutes",		ip6->ipv6InNoRoutes);
2169 	prval("ipv6InAddrErrors",	ip6->ipv6InAddrErrors);
2170 	prval("ipv6InUnknownProtos",	ip6->ipv6InUnknownProtos);
2171 	prval("ipv6InTruncatedPkts",	ip6->ipv6InTruncatedPkts);
2172 	prval("ipv6InDiscards",		ip6->ipv6InDiscards);
2173 	prval("ipv6InDelivers",		ip6->ipv6InDelivers);
2174 	prval("ipv6OutForwDatagrams",	ip6->ipv6OutForwDatagrams);
2175 	prval("ipv6OutRequests",	ip6->ipv6OutRequests);
2176 	prval("ipv6OutDiscards",	ip6->ipv6OutDiscards);
2177 	prval("ipv6OutNoRoutes",	ip6->ipv6OutNoRoutes);
2178 	prval("ipv6OutFragOKs",		ip6->ipv6OutFragOKs);
2179 	prval("ipv6OutFragFails",	ip6->ipv6OutFragFails);
2180 	prval("ipv6OutFragCreates",	ip6->ipv6OutFragCreates);
2181 	prval("ipv6ReasmReqds",		ip6->ipv6ReasmReqds);
2182 	prval("ipv6ReasmOKs",		ip6->ipv6ReasmOKs);
2183 	prval("ipv6ReasmFails",		ip6->ipv6ReasmFails);
2184 	prval("ipv6InMcastPkts",	ip6->ipv6InMcastPkts);
2185 	prval("ipv6OutMcastPkts",	ip6->ipv6OutMcastPkts);
2186 	prval("ipv6ReasmDuplicates",	ip6->ipv6ReasmDuplicates);
2187 	prval("ipv6ReasmPartDups",	ip6->ipv6ReasmPartDups);
2188 	prval("ipv6ForwProhibits",	ip6->ipv6ForwProhibits);
2189 	prval("udpInCksumErrs",		ip6->udpInCksumErrs);
2190 	prval("udpInOverflows",		ip6->udpInOverflows);
2191 	prval("rawipInOverflows",	ip6->rawipInOverflows);
2192 	prval("ipv6InIPv4",		ip6->ipv6InIPv4);
2193 	prval("ipv6OutIPv4",		ip6->ipv6OutIPv4);
2194 	prval("ipv6OutSwitchIPv4",	ip6->ipv6OutSwitchIPv4);
2195 	prval_end();
2196 }
2197 
2198 static void
2199 print_icmp6_stats(mib2_ipv6IfIcmpEntry_t *icmp6)
2200 {
2201 	prval_init();
2202 	prval("icmp6InMsgs",		icmp6->ipv6IfIcmpInMsgs);
2203 	prval("icmp6InErrors",		icmp6->ipv6IfIcmpInErrors);
2204 	prval("icmp6InDestUnreachs",	icmp6->ipv6IfIcmpInDestUnreachs);
2205 	prval("icmp6InAdminProhibs",	icmp6->ipv6IfIcmpInAdminProhibs);
2206 	prval("icmp6InTimeExcds",	icmp6->ipv6IfIcmpInTimeExcds);
2207 	prval("icmp6InParmProblems",	icmp6->ipv6IfIcmpInParmProblems);
2208 	prval("icmp6InPktTooBigs",	icmp6->ipv6IfIcmpInPktTooBigs);
2209 	prval("icmp6InEchos",		icmp6->ipv6IfIcmpInEchos);
2210 	prval("icmp6InEchoReplies",	icmp6->ipv6IfIcmpInEchoReplies);
2211 	prval("icmp6InRouterSols",	icmp6->ipv6IfIcmpInRouterSolicits);
2212 	prval("icmp6InRouterAds",
2213 	    icmp6->ipv6IfIcmpInRouterAdvertisements);
2214 	prval("icmp6InNeighborSols",	icmp6->ipv6IfIcmpInNeighborSolicits);
2215 	prval("icmp6InNeighborAds",
2216 	    icmp6->ipv6IfIcmpInNeighborAdvertisements);
2217 	prval("icmp6InRedirects",	icmp6->ipv6IfIcmpInRedirects);
2218 	prval("icmp6InBadRedirects",	icmp6->ipv6IfIcmpInBadRedirects);
2219 	prval("icmp6InGroupQueries",	icmp6->ipv6IfIcmpInGroupMembQueries);
2220 	prval("icmp6InGroupResps",	icmp6->ipv6IfIcmpInGroupMembResponses);
2221 	prval("icmp6InGroupReds",	icmp6->ipv6IfIcmpInGroupMembReductions);
2222 	prval("icmp6InOverflows",	icmp6->ipv6IfIcmpInOverflows);
2223 	prval_end();
2224 	prval_init();
2225 	prval("icmp6OutMsgs",		icmp6->ipv6IfIcmpOutMsgs);
2226 	prval("icmp6OutErrors",		icmp6->ipv6IfIcmpOutErrors);
2227 	prval("icmp6OutDestUnreachs",	icmp6->ipv6IfIcmpOutDestUnreachs);
2228 	prval("icmp6OutAdminProhibs",	icmp6->ipv6IfIcmpOutAdminProhibs);
2229 	prval("icmp6OutTimeExcds",	icmp6->ipv6IfIcmpOutTimeExcds);
2230 	prval("icmp6OutParmProblems",	icmp6->ipv6IfIcmpOutParmProblems);
2231 	prval("icmp6OutPktTooBigs",	icmp6->ipv6IfIcmpOutPktTooBigs);
2232 	prval("icmp6OutEchos",		icmp6->ipv6IfIcmpOutEchos);
2233 	prval("icmp6OutEchoReplies",	icmp6->ipv6IfIcmpOutEchoReplies);
2234 	prval("icmp6OutRouterSols",	icmp6->ipv6IfIcmpOutRouterSolicits);
2235 	prval("icmp6OutRouterAds",
2236 	    icmp6->ipv6IfIcmpOutRouterAdvertisements);
2237 	prval("icmp6OutNeighborSols",	icmp6->ipv6IfIcmpOutNeighborSolicits);
2238 	prval("icmp6OutNeighborAds",
2239 	    icmp6->ipv6IfIcmpOutNeighborAdvertisements);
2240 	prval("icmp6OutRedirects",	icmp6->ipv6IfIcmpOutRedirects);
2241 	prval("icmp6OutGroupQueries",	icmp6->ipv6IfIcmpOutGroupMembQueries);
2242 	prval("icmp6OutGroupResps",
2243 	    icmp6->ipv6IfIcmpOutGroupMembResponses);
2244 	prval("icmp6OutGroupReds",
2245 	    icmp6->ipv6IfIcmpOutGroupMembReductions);
2246 	prval_end();
2247 }
2248 
2249 static void
2250 print_sctp_stats(mib2_sctp_t *sctp)
2251 {
2252 	prval_init();
2253 	pr_sctp_rtoalgo("sctpRtoAlgorithm", sctp->sctpRtoAlgorithm);
2254 	prval("sctpRtoMin",		sctp->sctpRtoMin);
2255 	prval("sctpRtoMax",		sctp->sctpRtoMax);
2256 	prval("sctpRtoInitial",		sctp->sctpRtoInitial);
2257 	pr_int_val("sctpMaxAssocs",	sctp->sctpMaxAssocs);
2258 	prval("sctpValCookieLife",	sctp->sctpValCookieLife);
2259 	prval("sctpMaxInitRetr",	sctp->sctpMaxInitRetr);
2260 	prval("sctpCurrEstab",		sctp->sctpCurrEstab);
2261 	prval("sctpActiveEstab",	sctp->sctpActiveEstab);
2262 	prval("sctpPassiveEstab",	sctp->sctpPassiveEstab);
2263 	prval("sctpAborted",		sctp->sctpAborted);
2264 	prval("sctpShutdowns",		sctp->sctpShutdowns);
2265 	prval("sctpOutOfBlue",		sctp->sctpOutOfBlue);
2266 	prval("sctpChecksumError",	sctp->sctpChecksumError);
2267 	prval64("sctpOutCtrlChunks",	sctp->sctpOutCtrlChunks);
2268 	prval64("sctpOutOrderChunks",	sctp->sctpOutOrderChunks);
2269 	prval64("sctpOutUnorderChunks",	sctp->sctpOutUnorderChunks);
2270 	prval64("sctpRetransChunks",	sctp->sctpRetransChunks);
2271 	prval("sctpOutAck",		sctp->sctpOutAck);
2272 	prval("sctpOutAckDelayed",	sctp->sctpOutAckDelayed);
2273 	prval("sctpOutWinUpdate",	sctp->sctpOutWinUpdate);
2274 	prval("sctpOutFastRetrans",	sctp->sctpOutFastRetrans);
2275 	prval("sctpOutWinProbe",	sctp->sctpOutWinProbe);
2276 	prval64("sctpInCtrlChunks",	sctp->sctpInCtrlChunks);
2277 	prval64("sctpInOrderChunks",	sctp->sctpInOrderChunks);
2278 	prval64("sctpInUnorderChunks",	sctp->sctpInUnorderChunks);
2279 	prval("sctpInAck",		sctp->sctpInAck);
2280 	prval("sctpInDupAck",		sctp->sctpInDupAck);
2281 	prval("sctpInAckUnsent",	sctp->sctpInAckUnsent);
2282 	prval64("sctpFragUsrMsgs",	sctp->sctpFragUsrMsgs);
2283 	prval64("sctpReasmUsrMsgs",	sctp->sctpReasmUsrMsgs);
2284 	prval64("sctpOutSCTPPkts",	sctp->sctpOutSCTPPkts);
2285 	prval64("sctpInSCTPPkts",	sctp->sctpInSCTPPkts);
2286 	prval("sctpInInvalidCookie",	sctp->sctpInInvalidCookie);
2287 	prval("sctpTimRetrans",		sctp->sctpTimRetrans);
2288 	prval("sctpTimRetransDrop",	sctp->sctpTimRetransDrop);
2289 	prval("sctpTimHearBeatProbe",	sctp->sctpTimHeartBeatProbe);
2290 	prval("sctpTimHearBeatDrop",	sctp->sctpTimHeartBeatDrop);
2291 	prval("sctpListenDrop",		sctp->sctpListenDrop);
2292 	prval("sctpInClosed",		sctp->sctpInClosed);
2293 	prval_end();
2294 }
2295 
2296 static void
2297 print_tcp_stats(mib2_tcp_t *tcp)
2298 {
2299 	prval_init();
2300 	pr_int_val("tcpRtoAlgorithm",	tcp->tcpRtoAlgorithm);
2301 	pr_int_val("tcpRtoMin",		tcp->tcpRtoMin);
2302 	pr_int_val("tcpRtoMax",		tcp->tcpRtoMax);
2303 	pr_int_val("tcpMaxConn",	tcp->tcpMaxConn);
2304 	prval("tcpActiveOpens",		tcp->tcpActiveOpens);
2305 	prval("tcpPassiveOpens",	tcp->tcpPassiveOpens);
2306 	prval("tcpAttemptFails",	tcp->tcpAttemptFails);
2307 	prval("tcpEstabResets",		tcp->tcpEstabResets);
2308 	prval("tcpCurrEstab",		tcp->tcpCurrEstab);
2309 	prval64("tcpOutSegs",		tcp->tcpHCOutSegs);
2310 	prval("tcpOutDataSegs",		tcp->tcpOutDataSegs);
2311 	prval("tcpOutDataBytes",	tcp->tcpOutDataBytes);
2312 	prval("tcpRetransSegs",		tcp->tcpRetransSegs);
2313 	prval("tcpRetransBytes",	tcp->tcpRetransBytes);
2314 	prval("tcpOutAck",		tcp->tcpOutAck);
2315 	prval("tcpOutAckDelayed",	tcp->tcpOutAckDelayed);
2316 	prval("tcpOutUrg",		tcp->tcpOutUrg);
2317 	prval("tcpOutWinUpdate",	tcp->tcpOutWinUpdate);
2318 	prval("tcpOutWinProbe",		tcp->tcpOutWinProbe);
2319 	prval("tcpOutControl",		tcp->tcpOutControl);
2320 	prval("tcpOutRsts",		tcp->tcpOutRsts);
2321 	prval("tcpOutFastRetrans",	tcp->tcpOutFastRetrans);
2322 	prval64("tcpInSegs",		tcp->tcpHCInSegs);
2323 	prval_end();
2324 	prval("tcpInAckSegs",		tcp->tcpInAckSegs);
2325 	prval("tcpInAckBytes",		tcp->tcpInAckBytes);
2326 	prval("tcpInDupAck",		tcp->tcpInDupAck);
2327 	prval("tcpInAckUnsent",		tcp->tcpInAckUnsent);
2328 	prval("tcpInInorderSegs",	tcp->tcpInDataInorderSegs);
2329 	prval("tcpInInorderBytes",	tcp->tcpInDataInorderBytes);
2330 	prval("tcpInUnorderSegs",	tcp->tcpInDataUnorderSegs);
2331 	prval("tcpInUnorderBytes",	tcp->tcpInDataUnorderBytes);
2332 	prval("tcpInDupSegs",		tcp->tcpInDataDupSegs);
2333 	prval("tcpInDupBytes",		tcp->tcpInDataDupBytes);
2334 	prval("tcpInPartDupSegs",	tcp->tcpInDataPartDupSegs);
2335 	prval("tcpInPartDupBytes",	tcp->tcpInDataPartDupBytes);
2336 	prval("tcpInPastWinSegs",	tcp->tcpInDataPastWinSegs);
2337 	prval("tcpInPastWinBytes",	tcp->tcpInDataPastWinBytes);
2338 	prval("tcpInWinProbe",		tcp->tcpInWinProbe);
2339 	prval("tcpInWinUpdate",		tcp->tcpInWinUpdate);
2340 	prval("tcpInClosed",		tcp->tcpInClosed);
2341 	prval("tcpRttNoUpdate",		tcp->tcpRttNoUpdate);
2342 	prval("tcpRttUpdate",		tcp->tcpRttUpdate);
2343 	prval("tcpTimRetrans",		tcp->tcpTimRetrans);
2344 	prval("tcpTimRetransDrop",	tcp->tcpTimRetransDrop);
2345 	prval("tcpTimKeepalive",	tcp->tcpTimKeepalive);
2346 	prval("tcpTimKeepaliveProbe",	tcp->tcpTimKeepaliveProbe);
2347 	prval("tcpTimKeepaliveDrop",	tcp->tcpTimKeepaliveDrop);
2348 	prval("tcpListenDrop",		tcp->tcpListenDrop);
2349 	prval("tcpListenDropQ0",	tcp->tcpListenDropQ0);
2350 	prval("tcpHalfOpenDrop",	tcp->tcpHalfOpenDrop);
2351 	prval("tcpOutSackRetrans",	tcp->tcpOutSackRetransSegs);
2352 	prval_end();
2353 
2354 }
2355 
2356 static void
2357 print_udp_stats(mib2_udp_t *udp)
2358 {
2359 	prval_init();
2360 	prval64("udpInDatagrams",	udp->udpHCInDatagrams);
2361 	prval("udpInErrors",		udp->udpInErrors);
2362 	prval64("udpOutDatagrams",	udp->udpHCOutDatagrams);
2363 	prval("udpOutErrors",		udp->udpOutErrors);
2364 	prval_end();
2365 }
2366 
2367 static void
2368 print_rawip_stats(mib2_rawip_t *rawip)
2369 {
2370 	prval_init();
2371 	prval("rawipInDatagrams",	rawip->rawipInDatagrams);
2372 	prval("rawipInErrors",		rawip->rawipInErrors);
2373 	prval("rawipInCksumErrs",	rawip->rawipInCksumErrs);
2374 	prval("rawipOutDatagrams",	rawip->rawipOutDatagrams);
2375 	prval("rawipOutErrors",		rawip->rawipOutErrors);
2376 	prval_end();
2377 }
2378 
2379 void
2380 print_igmp_stats(struct igmpstat *igps)
2381 {
2382 	(void) printf(" %10u message%s received\n",
2383 	    igps->igps_rcv_total, PLURAL(igps->igps_rcv_total));
2384 	(void) printf(" %10u message%s received with too few bytes\n",
2385 	    igps->igps_rcv_tooshort, PLURAL(igps->igps_rcv_tooshort));
2386 	(void) printf(" %10u message%s received with bad checksum\n",
2387 	    igps->igps_rcv_badsum, PLURAL(igps->igps_rcv_badsum));
2388 	(void) printf(" %10u membership quer%s received\n",
2389 	    igps->igps_rcv_queries, PLURALY(igps->igps_rcv_queries));
2390 	(void) printf(" %10u membership quer%s received with invalid "
2391 	    "field(s)\n",
2392 	    igps->igps_rcv_badqueries, PLURALY(igps->igps_rcv_badqueries));
2393 	(void) printf(" %10u membership report%s received\n",
2394 	    igps->igps_rcv_reports, PLURAL(igps->igps_rcv_reports));
2395 	(void) printf(" %10u membership report%s received with invalid "
2396 	    "field(s)\n",
2397 	    igps->igps_rcv_badreports, PLURAL(igps->igps_rcv_badreports));
2398 	(void) printf(" %10u membership report%s received for groups to "
2399 	    "which we belong\n",
2400 	    igps->igps_rcv_ourreports, PLURAL(igps->igps_rcv_ourreports));
2401 	(void) printf(" %10u membership report%s sent\n",
2402 	    igps->igps_snd_reports, PLURAL(igps->igps_snd_reports));
2403 }
2404 
2405 static void
2406 print_mrt_stats(struct mrtstat *mrts)
2407 {
2408 	(void) puts("DVMRP multicast routing:");
2409 	(void) printf(" %10u hit%s - kernel forwarding cache hits\n",
2410 	    mrts->mrts_mfc_hits, PLURAL(mrts->mrts_mfc_hits));
2411 	(void) printf(" %10u miss%s - kernel forwarding cache misses\n",
2412 	    mrts->mrts_mfc_misses, PLURALES(mrts->mrts_mfc_misses));
2413 	(void) printf(" %10u packet%s potentially forwarded\n",
2414 	    mrts->mrts_fwd_in, PLURAL(mrts->mrts_fwd_in));
2415 	(void) printf(" %10u packet%s actually sent out\n",
2416 	    mrts->mrts_fwd_out, PLURAL(mrts->mrts_fwd_out));
2417 	(void) printf(" %10u upcall%s - upcalls made to mrouted\n",
2418 	    mrts->mrts_upcalls, PLURAL(mrts->mrts_upcalls));
2419 	(void) printf(" %10u packet%s not sent out due to lack of resources\n",
2420 	    mrts->mrts_fwd_drop, PLURAL(mrts->mrts_fwd_drop));
2421 	(void) printf(" %10u datagram%s with malformed tunnel options\n",
2422 	    mrts->mrts_bad_tunnel, PLURAL(mrts->mrts_bad_tunnel));
2423 	(void) printf(" %10u datagram%s with no room for tunnel options\n",
2424 	    mrts->mrts_cant_tunnel, PLURAL(mrts->mrts_cant_tunnel));
2425 	(void) printf(" %10u datagram%s arrived on wrong interface\n",
2426 	    mrts->mrts_wrong_if, PLURAL(mrts->mrts_wrong_if));
2427 	(void) printf(" %10u datagram%s dropped due to upcall Q overflow\n",
2428 	    mrts->mrts_upq_ovflw, PLURAL(mrts->mrts_upq_ovflw));
2429 	(void) printf(" %10u datagram%s cleaned up by the cache\n",
2430 	    mrts->mrts_cache_cleanups, PLURAL(mrts->mrts_cache_cleanups));
2431 	(void) printf(" %10u datagram%s dropped selectively by ratelimiter\n",
2432 	    mrts->mrts_drop_sel, PLURAL(mrts->mrts_drop_sel));
2433 	(void) printf(" %10u datagram%s dropped - bucket Q overflow\n",
2434 	    mrts->mrts_q_overflow, PLURAL(mrts->mrts_q_overflow));
2435 	(void) printf(" %10u datagram%s dropped - larger than bkt size\n",
2436 	    mrts->mrts_pkt2large, PLURAL(mrts->mrts_pkt2large));
2437 	(void) printf("\nPIM multicast routing:\n");
2438 	(void) printf(" %10u datagram%s dropped - bad version number\n",
2439 	    mrts->mrts_pim_badversion, PLURAL(mrts->mrts_pim_badversion));
2440 	(void) printf(" %10u datagram%s dropped - bad checksum\n",
2441 	    mrts->mrts_pim_rcv_badcsum, PLURAL(mrts->mrts_pim_rcv_badcsum));
2442 	(void) printf(" %10u datagram%s dropped - bad register packets\n",
2443 	    mrts->mrts_pim_badregisters, PLURAL(mrts->mrts_pim_badregisters));
2444 	(void) printf(
2445 	    " %10u datagram%s potentially forwarded - register packets\n",
2446 	    mrts->mrts_pim_regforwards, PLURAL(mrts->mrts_pim_regforwards));
2447 	(void) printf(" %10u datagram%s dropped - register send drops\n",
2448 	    mrts->mrts_pim_regsend_drops, PLURAL(mrts->mrts_pim_regsend_drops));
2449 	(void) printf(" %10u datagram%s dropped - packet malformed\n",
2450 	    mrts->mrts_pim_malformed, PLURAL(mrts->mrts_pim_malformed));
2451 	(void) printf(" %10u datagram%s dropped - no memory to forward\n",
2452 	    mrts->mrts_pim_nomemory, PLURAL(mrts->mrts_pim_nomemory));
2453 }
2454 
2455 static void
2456 sum_ip6_stats(mib2_ipv6IfStatsEntry_t *ip6, mib2_ipv6IfStatsEntry_t *sum6)
2457 {
2458 	/* First few are not additive */
2459 	sum6->ipv6Forwarding = ip6->ipv6Forwarding;
2460 	sum6->ipv6DefaultHopLimit = ip6->ipv6DefaultHopLimit;
2461 
2462 	sum6->ipv6InReceives += ip6->ipv6InReceives;
2463 	sum6->ipv6InHdrErrors += ip6->ipv6InHdrErrors;
2464 	sum6->ipv6InTooBigErrors += ip6->ipv6InTooBigErrors;
2465 	sum6->ipv6InNoRoutes += ip6->ipv6InNoRoutes;
2466 	sum6->ipv6InAddrErrors += ip6->ipv6InAddrErrors;
2467 	sum6->ipv6InUnknownProtos += ip6->ipv6InUnknownProtos;
2468 	sum6->ipv6InTruncatedPkts += ip6->ipv6InTruncatedPkts;
2469 	sum6->ipv6InDiscards += ip6->ipv6InDiscards;
2470 	sum6->ipv6InDelivers += ip6->ipv6InDelivers;
2471 	sum6->ipv6OutForwDatagrams += ip6->ipv6OutForwDatagrams;
2472 	sum6->ipv6OutRequests += ip6->ipv6OutRequests;
2473 	sum6->ipv6OutDiscards += ip6->ipv6OutDiscards;
2474 	sum6->ipv6OutFragOKs += ip6->ipv6OutFragOKs;
2475 	sum6->ipv6OutFragFails += ip6->ipv6OutFragFails;
2476 	sum6->ipv6OutFragCreates += ip6->ipv6OutFragCreates;
2477 	sum6->ipv6ReasmReqds += ip6->ipv6ReasmReqds;
2478 	sum6->ipv6ReasmOKs += ip6->ipv6ReasmOKs;
2479 	sum6->ipv6ReasmFails += ip6->ipv6ReasmFails;
2480 	sum6->ipv6InMcastPkts += ip6->ipv6InMcastPkts;
2481 	sum6->ipv6OutMcastPkts += ip6->ipv6OutMcastPkts;
2482 	sum6->ipv6OutNoRoutes += ip6->ipv6OutNoRoutes;
2483 	sum6->ipv6ReasmDuplicates += ip6->ipv6ReasmDuplicates;
2484 	sum6->ipv6ReasmPartDups += ip6->ipv6ReasmPartDups;
2485 	sum6->ipv6ForwProhibits += ip6->ipv6ForwProhibits;
2486 	sum6->udpInCksumErrs += ip6->udpInCksumErrs;
2487 	sum6->udpInOverflows += ip6->udpInOverflows;
2488 	sum6->rawipInOverflows += ip6->rawipInOverflows;
2489 }
2490 
2491 static void
2492 sum_icmp6_stats(mib2_ipv6IfIcmpEntry_t *icmp6, mib2_ipv6IfIcmpEntry_t *sum6)
2493 {
2494 	sum6->ipv6IfIcmpInMsgs += icmp6->ipv6IfIcmpInMsgs;
2495 	sum6->ipv6IfIcmpInErrors += icmp6->ipv6IfIcmpInErrors;
2496 	sum6->ipv6IfIcmpInDestUnreachs += icmp6->ipv6IfIcmpInDestUnreachs;
2497 	sum6->ipv6IfIcmpInAdminProhibs += icmp6->ipv6IfIcmpInAdminProhibs;
2498 	sum6->ipv6IfIcmpInTimeExcds += icmp6->ipv6IfIcmpInTimeExcds;
2499 	sum6->ipv6IfIcmpInParmProblems += icmp6->ipv6IfIcmpInParmProblems;
2500 	sum6->ipv6IfIcmpInPktTooBigs += icmp6->ipv6IfIcmpInPktTooBigs;
2501 	sum6->ipv6IfIcmpInEchos += icmp6->ipv6IfIcmpInEchos;
2502 	sum6->ipv6IfIcmpInEchoReplies += icmp6->ipv6IfIcmpInEchoReplies;
2503 	sum6->ipv6IfIcmpInRouterSolicits += icmp6->ipv6IfIcmpInRouterSolicits;
2504 	sum6->ipv6IfIcmpInRouterAdvertisements +=
2505 	    icmp6->ipv6IfIcmpInRouterAdvertisements;
2506 	sum6->ipv6IfIcmpInNeighborSolicits +=
2507 	    icmp6->ipv6IfIcmpInNeighborSolicits;
2508 	sum6->ipv6IfIcmpInNeighborAdvertisements +=
2509 	    icmp6->ipv6IfIcmpInNeighborAdvertisements;
2510 	sum6->ipv6IfIcmpInRedirects += icmp6->ipv6IfIcmpInRedirects;
2511 	sum6->ipv6IfIcmpInGroupMembQueries +=
2512 	    icmp6->ipv6IfIcmpInGroupMembQueries;
2513 	sum6->ipv6IfIcmpInGroupMembResponses +=
2514 	    icmp6->ipv6IfIcmpInGroupMembResponses;
2515 	sum6->ipv6IfIcmpInGroupMembReductions +=
2516 	    icmp6->ipv6IfIcmpInGroupMembReductions;
2517 	sum6->ipv6IfIcmpOutMsgs += icmp6->ipv6IfIcmpOutMsgs;
2518 	sum6->ipv6IfIcmpOutErrors += icmp6->ipv6IfIcmpOutErrors;
2519 	sum6->ipv6IfIcmpOutDestUnreachs += icmp6->ipv6IfIcmpOutDestUnreachs;
2520 	sum6->ipv6IfIcmpOutAdminProhibs += icmp6->ipv6IfIcmpOutAdminProhibs;
2521 	sum6->ipv6IfIcmpOutTimeExcds += icmp6->ipv6IfIcmpOutTimeExcds;
2522 	sum6->ipv6IfIcmpOutParmProblems += icmp6->ipv6IfIcmpOutParmProblems;
2523 	sum6->ipv6IfIcmpOutPktTooBigs += icmp6->ipv6IfIcmpOutPktTooBigs;
2524 	sum6->ipv6IfIcmpOutEchos += icmp6->ipv6IfIcmpOutEchos;
2525 	sum6->ipv6IfIcmpOutEchoReplies += icmp6->ipv6IfIcmpOutEchoReplies;
2526 	sum6->ipv6IfIcmpOutRouterSolicits +=
2527 	    icmp6->ipv6IfIcmpOutRouterSolicits;
2528 	sum6->ipv6IfIcmpOutRouterAdvertisements +=
2529 	    icmp6->ipv6IfIcmpOutRouterAdvertisements;
2530 	sum6->ipv6IfIcmpOutNeighborSolicits +=
2531 	    icmp6->ipv6IfIcmpOutNeighborSolicits;
2532 	sum6->ipv6IfIcmpOutNeighborAdvertisements +=
2533 	    icmp6->ipv6IfIcmpOutNeighborAdvertisements;
2534 	sum6->ipv6IfIcmpOutRedirects += icmp6->ipv6IfIcmpOutRedirects;
2535 	sum6->ipv6IfIcmpOutGroupMembQueries +=
2536 	    icmp6->ipv6IfIcmpOutGroupMembQueries;
2537 	sum6->ipv6IfIcmpOutGroupMembResponses +=
2538 	    icmp6->ipv6IfIcmpOutGroupMembResponses;
2539 	sum6->ipv6IfIcmpOutGroupMembReductions +=
2540 	    icmp6->ipv6IfIcmpOutGroupMembReductions;
2541 	sum6->ipv6IfIcmpInOverflows += icmp6->ipv6IfIcmpInOverflows;
2542 }
2543 
2544 /* ----------------------------- MRT_STAT_REPORT --------------------------- */
2545 
2546 static void
2547 mrt_stat_report(mib_item_t *curritem)
2548 {
2549 	int	jtemp = 0;
2550 	mib_item_t *tempitem;
2551 
2552 	if (!(family_selected(AF_INET)))
2553 		return;
2554 
2555 	(void) putchar('\n');
2556 	/* 'for' loop 1: */
2557 	for (tempitem = curritem;
2558 	    tempitem;
2559 	    tempitem = tempitem->next_item) {
2560 		if (Xflag) {
2561 			(void) printf("\n--- Entry %d ---\n", ++jtemp);
2562 			(void) printf("Group = %d, mib_id = %d, "
2563 			    "length = %d, valp = 0x%p\n",
2564 			    tempitem->group, tempitem->mib_id,
2565 			    tempitem->length, tempitem->valp);
2566 		}
2567 
2568 		if (tempitem->mib_id == 0) {
2569 			switch (tempitem->group) {
2570 			case EXPER_DVMRP: {
2571 				struct mrtstat	*mrts;
2572 				mrts = (struct mrtstat *)tempitem->valp;
2573 
2574 				if (!(family_selected(AF_INET)))
2575 					continue; /* 'for' loop 1 */
2576 
2577 				print_mrt_stats(mrts);
2578 				break;
2579 			}
2580 			}
2581 		}
2582 	} /* 'for' loop 1 ends */
2583 	(void) putchar('\n');
2584 	(void) fflush(stdout);
2585 }
2586 
2587 /*
2588  * if_stat_total() - Computes totals for interface statistics
2589  *                   and returns result by updating sumstats.
2590  */
2591 static void
2592 if_stat_total(struct ifstat *oldstats, struct ifstat *newstats,
2593     struct ifstat *sumstats)
2594 {
2595 	sumstats->ipackets += newstats->ipackets - oldstats->ipackets;
2596 	sumstats->opackets += newstats->opackets - oldstats->opackets;
2597 	sumstats->ierrors += newstats->ierrors - oldstats->ierrors;
2598 	sumstats->oerrors += newstats->oerrors - oldstats->oerrors;
2599 	sumstats->collisions += newstats->collisions - oldstats->collisions;
2600 }
2601 
2602 /* --------------------- IF_REPORT (netstat -i)  -------------------------- */
2603 
2604 static struct	ifstat	zerostat = {
2605 	0LL, 0LL, 0LL, 0LL, 0LL
2606 };
2607 
2608 static void
2609 if_report(mib_item_t *item, char *matchname,
2610     int Iflag_only, boolean_t once_only)
2611 {
2612 	static boolean_t	reentry = B_FALSE;
2613 	boolean_t		alreadydone = B_FALSE;
2614 	int			jtemp = 0;
2615 	uint32_t		ifindex_v4 = 0;
2616 	uint32_t		ifindex_v6 = 0;
2617 	boolean_t		first_header = B_TRUE;
2618 
2619 	/* 'for' loop 1: */
2620 	for (; item; item = item->next_item) {
2621 		if (Xflag) {
2622 			(void) printf("\n--- Entry %d ---\n", ++jtemp);
2623 			(void) printf("Group = %d, mib_id = %d, "
2624 			    "length = %d, valp = 0x%p\n",
2625 			    item->group, item->mib_id, item->length,
2626 			    item->valp);
2627 		}
2628 
2629 		switch (item->group) {
2630 		case MIB2_IP:
2631 		if (item->mib_id != MIB2_IP_ADDR ||
2632 		    !family_selected(AF_INET))
2633 			continue; /* 'for' loop 1 */
2634 		{
2635 			static struct ifstat	old = {0L, 0L, 0L, 0L, 0L};
2636 			static struct ifstat	new = {0L, 0L, 0L, 0L, 0L};
2637 			struct ifstat		sum;
2638 			struct iflist		*newlist = NULL;
2639 			static struct iflist	*oldlist = NULL;
2640 			kstat_t	 *ksp;
2641 
2642 			if (once_only) {
2643 				char    ifname[LIFNAMSIZ + 1];
2644 				char    logintname[LIFNAMSIZ + 1];
2645 				mib2_ipAddrEntry_t *ap;
2646 				struct ifstat	stat = {0L, 0L, 0L, 0L, 0L};
2647 				boolean_t	first = B_TRUE;
2648 				uint32_t	new_ifindex;
2649 
2650 				if (Xflag)
2651 					(void) printf("if_report: %d items\n",
2652 					    (item->length)
2653 					    / sizeof (mib2_ipAddrEntry_t));
2654 
2655 				/* 'for' loop 2a: */
2656 				for (ap = (mib2_ipAddrEntry_t *)item->valp;
2657 				    (char *)ap < (char *)item->valp
2658 				    + item->length;
2659 				    ap++) {
2660 					(void) octetstr(&ap->ipAdEntIfIndex,
2661 					    'a', logintname,
2662 					    sizeof (logintname));
2663 					(void) strcpy(ifname, logintname);
2664 					(void) strtok(ifname, ":");
2665 					if (matchname != NULL &&
2666 					    strcmp(matchname, ifname) != 0 &&
2667 					    strcmp(matchname, logintname) != 0)
2668 						continue; /* 'for' loop 2a */
2669 					new_ifindex =
2670 					    if_nametoindex(logintname);
2671 					/*
2672 					 * First lookup the "link" kstats in
2673 					 * case the link is renamed. Then
2674 					 * fallback to the legacy kstats for
2675 					 * those non-GLDv3 links.
2676 					 */
2677 					if (new_ifindex != ifindex_v4 &&
2678 					    (((ksp = kstat_lookup(kc, "link", 0,
2679 					    ifname)) != NULL) ||
2680 					    ((ksp = kstat_lookup(kc, NULL, -1,
2681 					    ifname)) != NULL))) {
2682 						(void) safe_kstat_read(kc, ksp,
2683 						    NULL);
2684 						stat.ipackets =
2685 						    kstat_named_value(ksp,
2686 						    "ipackets");
2687 						stat.ierrors =
2688 						    kstat_named_value(ksp,
2689 						    "ierrors");
2690 						stat.opackets =
2691 						    kstat_named_value(ksp,
2692 						    "opackets");
2693 						stat.oerrors =
2694 						    kstat_named_value(ksp,
2695 						    "oerrors");
2696 						stat.collisions =
2697 						    kstat_named_value(ksp,
2698 						    "collisions");
2699 						if (first) {
2700 							if (!first_header)
2701 							(void) putchar('\n');
2702 							first_header = B_FALSE;
2703 						(void) printf(
2704 						    "%-5.5s %-5.5s%-13.13s "
2705 						    "%-14.14s %-6.6s %-5.5s "
2706 						    "%-6.6s %-5.5s %-6.6s "
2707 						    "%-6.6s\n",
2708 						    "Name", "Mtu", "Net/Dest",
2709 						    "Address", "Ipkts",
2710 						    "Ierrs", "Opkts", "Oerrs",
2711 						    "Collis", "Queue");
2712 
2713 						first = B_FALSE;
2714 						}
2715 						if_report_ip4(ap, ifname,
2716 						    logintname, &stat, B_TRUE);
2717 						ifindex_v4 = new_ifindex;
2718 					} else {
2719 						if_report_ip4(ap, ifname,
2720 						    logintname, &stat, B_FALSE);
2721 					}
2722 				} /* 'for' loop 2a ends */
2723 			} else if (!alreadydone) {
2724 				char    ifname[LIFNAMSIZ + 1];
2725 				char    buf[LIFNAMSIZ + 1];
2726 				mib2_ipAddrEntry_t *ap;
2727 				struct ifstat   t;
2728 				struct iflist	*tlp = NULL;
2729 				struct iflist	**nextnew = &newlist;
2730 				struct iflist	*walkold;
2731 				struct iflist	*cleanlist;
2732 				boolean_t	found_if = B_FALSE;
2733 
2734 				alreadydone = B_TRUE; /* ignore other case */
2735 
2736 				/*
2737 				 * Check if there is anything to do.
2738 				 */
2739 				if (item->length <
2740 				    sizeof (mib2_ipAddrEntry_t)) {
2741 					fail(0, "No compatible interfaces");
2742 				}
2743 
2744 				/*
2745 				 * 'for' loop 2b: find the "right" entry:
2746 				 * If an interface name to match has been
2747 				 * supplied then try and find it, otherwise
2748 				 * match the first non-loopback interface found.
2749 				 * Use lo0 if all else fails.
2750 				 */
2751 				for (ap = (mib2_ipAddrEntry_t *)item->valp;
2752 				    (char *)ap < (char *)item->valp
2753 				    + item->length;
2754 				    ap++) {
2755 					(void) octetstr(&ap->ipAdEntIfIndex,
2756 					    'a', ifname, sizeof (ifname));
2757 					(void) strtok(ifname, ":");
2758 
2759 					if (matchname) {
2760 						if (strcmp(matchname,
2761 						    ifname) == 0) {
2762 							/* 'for' loop 2b */
2763 							found_if = B_TRUE;
2764 							break;
2765 						}
2766 					} else if (strcmp(ifname, "lo0") != 0)
2767 						break; /* 'for' loop 2b */
2768 				} /* 'for' loop 2b ends */
2769 
2770 				if (matchname == NULL) {
2771 					matchname = ifname;
2772 				} else {
2773 					if (!found_if)
2774 						fail(0, "-I: %s no such "
2775 						    "interface.", matchname);
2776 				}
2777 
2778 				if (Iflag_only == 0 || !reentry) {
2779 					(void) printf("    input   %-6.6s    "
2780 					    "output	",
2781 					    matchname);
2782 					(void) printf("   input  (Total)    "
2783 					"output\n");
2784 					(void) printf("%-7.7s %-5.5s %-7.7s "
2785 					    "%-5.5s %-6.6s ",
2786 					    "packets", "errs", "packets",
2787 					    "errs", "colls");
2788 					(void) printf("%-7.7s %-5.5s %-7.7s "
2789 					    "%-5.5s %-6.6s\n",
2790 					    "packets", "errs", "packets",
2791 					    "errs", "colls");
2792 				}
2793 
2794 				sum = zerostat;
2795 
2796 				/* 'for' loop 2c: */
2797 				for (ap = (mib2_ipAddrEntry_t *)item->valp;
2798 				    (char *)ap < (char *)item->valp
2799 				    + item->length;
2800 				    ap++) {
2801 					(void) octetstr(&ap->ipAdEntIfIndex,
2802 					    'a', buf, sizeof (buf));
2803 					(void) strtok(buf, ":");
2804 
2805 					/*
2806 					 * We have reduced the IP interface
2807 					 * name, which could have been a
2808 					 * logical, down to a name suitable
2809 					 * for use with kstats.
2810 					 * We treat this name as unique and
2811 					 * only collate statistics for it once
2812 					 * per pass. This is to avoid falsely
2813 					 * amplifying these statistics by the
2814 					 * the number of logical instances.
2815 					 */
2816 					if ((tlp != NULL) &&
2817 					    ((strcmp(buf, tlp->ifname) == 0))) {
2818 						continue;
2819 					}
2820 
2821 					/*
2822 					 * First lookup the "link" kstats in
2823 					 * case the link is renamed. Then
2824 					 * fallback to the legacy kstats for
2825 					 * those non-GLDv3 links.
2826 					 */
2827 					if (((ksp = kstat_lookup(kc, "link",
2828 					    0, buf)) != NULL ||
2829 					    (ksp = kstat_lookup(kc, NULL, -1,
2830 					    buf)) != NULL) && (ksp->ks_type ==
2831 					    KSTAT_TYPE_NAMED)) {
2832 						(void) safe_kstat_read(kc, ksp,
2833 						    NULL);
2834 					}
2835 
2836 					t.ipackets = kstat_named_value(ksp,
2837 					    "ipackets");
2838 					t.ierrors = kstat_named_value(ksp,
2839 					    "ierrors");
2840 					t.opackets = kstat_named_value(ksp,
2841 					    "opackets");
2842 					t.oerrors = kstat_named_value(ksp,
2843 					    "oerrors");
2844 					t.collisions = kstat_named_value(ksp,
2845 					    "collisions");
2846 
2847 					if (strcmp(buf, matchname) == 0)
2848 						new = t;
2849 
2850 					/* Build the interface list */
2851 
2852 					tlp = malloc(sizeof (struct iflist));
2853 					(void) strlcpy(tlp->ifname, buf,
2854 					    sizeof (tlp->ifname));
2855 					tlp->tot = t;
2856 					*nextnew = tlp;
2857 					nextnew = &tlp->next_if;
2858 
2859 					/*
2860 					 * First time through.
2861 					 * Just add up the interface stats.
2862 					 */
2863 
2864 					if (oldlist == NULL) {
2865 						if_stat_total(&zerostat,
2866 						    &t, &sum);
2867 						continue;
2868 					}
2869 
2870 					/*
2871 					 * Walk old list for the interface.
2872 					 *
2873 					 * If found, add difference to total.
2874 					 *
2875 					 * If not, an interface has been plumbed
2876 					 * up.  In this case, we will simply
2877 					 * ignore the new interface until the
2878 					 * next interval; as there's no easy way
2879 					 * to acquire statistics between time
2880 					 * of the plumb and the next interval
2881 					 * boundary.  This results in inaccurate
2882 					 * total values for current interval.
2883 					 *
2884 					 * Note the case when an interface is
2885 					 * unplumbed; as similar problems exist.
2886 					 * The unplumbed interface is not in the
2887 					 * current list, and there's no easy way
2888 					 * to account for the statistics between
2889 					 * the previous interval and time of the
2890 					 * unplumb.  Therefore, we (in a sense)
2891 					 * ignore the removed interface by only
2892 					 * involving "current" interfaces when
2893 					 * computing the total statistics.
2894 					 * Unfortunately, this also results in
2895 					 * inaccurate values for interval total.
2896 					 */
2897 
2898 					for (walkold = oldlist;
2899 					    walkold != NULL;
2900 					    walkold = walkold->next_if) {
2901 						if (strcmp(walkold->ifname,
2902 						    buf) == 0) {
2903 							if_stat_total(
2904 							    &walkold->tot,
2905 							    &t, &sum);
2906 							break;
2907 						}
2908 					}
2909 
2910 				} /* 'for' loop 2c ends */
2911 
2912 				*nextnew = NULL;
2913 
2914 				(void) printf("%-7llu %-5llu %-7llu "
2915 				    "%-5llu %-6llu ",
2916 				    new.ipackets - old.ipackets,
2917 				    new.ierrors - old.ierrors,
2918 				    new.opackets - old.opackets,
2919 				    new.oerrors - old.oerrors,
2920 				    new.collisions - old.collisions);
2921 
2922 				(void) printf("%-7llu %-5llu %-7llu "
2923 				    "%-5llu %-6llu\n", sum.ipackets,
2924 				    sum.ierrors, sum.opackets,
2925 				    sum.oerrors, sum.collisions);
2926 
2927 				/*
2928 				 * Tidy things up once finished.
2929 				 */
2930 
2931 				old = new;
2932 				cleanlist = oldlist;
2933 				oldlist = newlist;
2934 				while (cleanlist != NULL) {
2935 					tlp = cleanlist->next_if;
2936 					free(cleanlist);
2937 					cleanlist = tlp;
2938 				}
2939 			}
2940 			break;
2941 		}
2942 		case MIB2_IP6:
2943 		if (item->mib_id != MIB2_IP6_ADDR ||
2944 		    !family_selected(AF_INET6))
2945 			continue; /* 'for' loop 1 */
2946 		{
2947 			static struct ifstat	old6 = {0L, 0L, 0L, 0L, 0L};
2948 			static struct ifstat	new6 = {0L, 0L, 0L, 0L, 0L};
2949 			struct ifstat		sum6;
2950 			struct iflist		*newlist6 = NULL;
2951 			static struct iflist	*oldlist6 = NULL;
2952 			kstat_t	 *ksp;
2953 
2954 			if (once_only) {
2955 				char    ifname[LIFNAMSIZ + 1];
2956 				char    logintname[LIFNAMSIZ + 1];
2957 				mib2_ipv6AddrEntry_t *ap6;
2958 				struct ifstat	stat = {0L, 0L, 0L, 0L, 0L};
2959 				boolean_t	first = B_TRUE;
2960 				uint32_t	new_ifindex;
2961 
2962 				if (Xflag)
2963 					(void) printf("if_report: %d items\n",
2964 					    (item->length)
2965 					    / sizeof (mib2_ipv6AddrEntry_t));
2966 				/* 'for' loop 2d: */
2967 				for (ap6 = (mib2_ipv6AddrEntry_t *)item->valp;
2968 				    (char *)ap6 < (char *)item->valp
2969 				    + item->length;
2970 				    ap6++) {
2971 					(void) octetstr(&ap6->ipv6AddrIfIndex,
2972 					    'a', logintname,
2973 					    sizeof (logintname));
2974 					(void) strcpy(ifname, logintname);
2975 					(void) strtok(ifname, ":");
2976 					if (matchname != NULL &&
2977 					    strcmp(matchname, ifname) != 0 &&
2978 					    strcmp(matchname, logintname) != 0)
2979 						continue; /* 'for' loop 2d */
2980 					new_ifindex =
2981 					    if_nametoindex(logintname);
2982 
2983 					/*
2984 					 * First lookup the "link" kstats in
2985 					 * case the link is renamed. Then
2986 					 * fallback to the legacy kstats for
2987 					 * those non-GLDv3 links.
2988 					 */
2989 					if (new_ifindex != ifindex_v6 &&
2990 					    ((ksp = kstat_lookup(kc, "link", 0,
2991 					    ifname)) != NULL ||
2992 					    (ksp = kstat_lookup(kc, NULL, -1,
2993 					    ifname)) != NULL)) {
2994 						(void) safe_kstat_read(kc, ksp,
2995 						    NULL);
2996 						stat.ipackets =
2997 						    kstat_named_value(ksp,
2998 						    "ipackets");
2999 						stat.ierrors =
3000 						    kstat_named_value(ksp,
3001 						    "ierrors");
3002 						stat.opackets =
3003 						    kstat_named_value(ksp,
3004 						    "opackets");
3005 						stat.oerrors =
3006 						    kstat_named_value(ksp,
3007 						    "oerrors");
3008 						stat.collisions =
3009 						    kstat_named_value(ksp,
3010 						    "collisions");
3011 						if (first) {
3012 							if (!first_header)
3013 							(void) putchar('\n');
3014 							first_header = B_FALSE;
3015 							(void) printf(
3016 							    "%-5.5s %-5.5s%"
3017 							    "-27.27s %-27.27s "
3018 							    "%-6.6s %-5.5s "
3019 							    "%-6.6s %-5.5s "
3020 							    "%-6.6s\n",
3021 							    "Name", "Mtu",
3022 							    "Net/Dest",
3023 							    "Address", "Ipkts",
3024 							    "Ierrs", "Opkts",
3025 							    "Oerrs", "Collis");
3026 							first = B_FALSE;
3027 						}
3028 						if_report_ip6(ap6, ifname,
3029 						    logintname, &stat, B_TRUE);
3030 						ifindex_v6 = new_ifindex;
3031 					} else {
3032 						if_report_ip6(ap6, ifname,
3033 						    logintname, &stat, B_FALSE);
3034 					}
3035 				} /* 'for' loop 2d ends */
3036 			} else if (!alreadydone) {
3037 				char    ifname[LIFNAMSIZ + 1];
3038 				char    buf[IFNAMSIZ + 1];
3039 				mib2_ipv6AddrEntry_t *ap6;
3040 				struct ifstat   t;
3041 				struct iflist	*tlp = NULL;
3042 				struct iflist	**nextnew = &newlist6;
3043 				struct iflist	*walkold;
3044 				struct iflist	*cleanlist;
3045 				boolean_t	found_if = B_FALSE;
3046 
3047 				alreadydone = B_TRUE; /* ignore other case */
3048 
3049 				/*
3050 				 * Check if there is anything to do.
3051 				 */
3052 				if (item->length <
3053 				    sizeof (mib2_ipv6AddrEntry_t)) {
3054 					fail(0, "No compatible interfaces");
3055 				}
3056 
3057 				/*
3058 				 * 'for' loop 2e: find the "right" entry:
3059 				 * If an interface name to match has been
3060 				 * supplied then try and find it, otherwise
3061 				 * match the first non-loopback interface found.
3062 				 * Use lo0 if all else fails.
3063 				 */
3064 				for (ap6 = (mib2_ipv6AddrEntry_t *)item->valp;
3065 				    (char *)ap6 < (char *)item->valp
3066 				    + item->length;
3067 				    ap6++) {
3068 					(void) octetstr(&ap6->ipv6AddrIfIndex,
3069 					    'a', ifname, sizeof (ifname));
3070 					(void) strtok(ifname, ":");
3071 
3072 					if (matchname) {
3073 						if (strcmp(matchname,
3074 						    ifname) == 0) {
3075 							/* 'for' loop 2e */
3076 							found_if = B_TRUE;
3077 							break;
3078 						}
3079 					} else if (strcmp(ifname, "lo0") != 0)
3080 						break; /* 'for' loop 2e */
3081 				} /* 'for' loop 2e ends */
3082 
3083 				if (matchname == NULL) {
3084 					matchname = ifname;
3085 				} else {
3086 					if (!found_if)
3087 						fail(0, "-I: %s no such "
3088 						    "interface.", matchname);
3089 				}
3090 
3091 				if (Iflag_only == 0 || !reentry) {
3092 					(void) printf(
3093 					    "    input   %-6.6s"
3094 					    "    output	",
3095 					    matchname);
3096 					(void) printf("   input  (Total)"
3097 					    "    output\n");
3098 					(void) printf("%-7.7s %-5.5s %-7.7s "
3099 					    "%-5.5s %-6.6s ",
3100 					    "packets", "errs", "packets",
3101 					    "errs", "colls");
3102 					(void) printf("%-7.7s %-5.5s %-7.7s "
3103 					    "%-5.5s %-6.6s\n",
3104 					    "packets", "errs", "packets",
3105 					    "errs", "colls");
3106 				}
3107 
3108 				sum6 = zerostat;
3109 
3110 				/* 'for' loop 2f: */
3111 				for (ap6 = (mib2_ipv6AddrEntry_t *)item->valp;
3112 				    (char *)ap6 < (char *)item->valp
3113 				    + item->length;
3114 				    ap6++) {
3115 					(void) octetstr(&ap6->ipv6AddrIfIndex,
3116 					    'a', buf, sizeof (buf));
3117 					(void) strtok(buf, ":");
3118 
3119 					/*
3120 					 * We have reduced the IP interface
3121 					 * name, which could have been a
3122 					 * logical, down to a name suitable
3123 					 * for use with kstats.
3124 					 * We treat this name as unique and
3125 					 * only collate statistics for it once
3126 					 * per pass. This is to avoid falsely
3127 					 * amplifying these statistics by the
3128 					 * the number of logical instances.
3129 					 */
3130 
3131 					if ((tlp != NULL) &&
3132 					    ((strcmp(buf, tlp->ifname) == 0))) {
3133 						continue;
3134 					}
3135 
3136 					/*
3137 					 * First lookup the "link" kstats in
3138 					 * case the link is renamed. Then
3139 					 * fallback to the legacy kstats for
3140 					 * those non-GLDv3 links.
3141 					 */
3142 					if (((ksp = kstat_lookup(kc, "link",
3143 					    0, buf)) != NULL ||
3144 					    (ksp = kstat_lookup(kc, NULL, -1,
3145 					    buf)) != NULL) && (ksp->ks_type ==
3146 					    KSTAT_TYPE_NAMED)) {
3147 						(void) safe_kstat_read(kc,
3148 						    ksp, NULL);
3149 					}
3150 
3151 					t.ipackets = kstat_named_value(ksp,
3152 					    "ipackets");
3153 					t.ierrors = kstat_named_value(ksp,
3154 					    "ierrors");
3155 					t.opackets = kstat_named_value(ksp,
3156 					    "opackets");
3157 					t.oerrors = kstat_named_value(ksp,
3158 					    "oerrors");
3159 					t.collisions = kstat_named_value(ksp,
3160 					    "collisions");
3161 
3162 					if (strcmp(buf, matchname) == 0)
3163 						new6 = t;
3164 
3165 					/* Build the interface list */
3166 
3167 					tlp = malloc(sizeof (struct iflist));
3168 					(void) strlcpy(tlp->ifname, buf,
3169 					    sizeof (tlp->ifname));
3170 					tlp->tot = t;
3171 					*nextnew = tlp;
3172 					nextnew = &tlp->next_if;
3173 
3174 					/*
3175 					 * First time through.
3176 					 * Just add up the interface stats.
3177 					 */
3178 
3179 					if (oldlist6 == NULL) {
3180 						if_stat_total(&zerostat,
3181 						    &t, &sum6);
3182 						continue;
3183 					}
3184 
3185 					/*
3186 					 * Walk old list for the interface.
3187 					 *
3188 					 * If found, add difference to total.
3189 					 *
3190 					 * If not, an interface has been plumbed
3191 					 * up.  In this case, we will simply
3192 					 * ignore the new interface until the
3193 					 * next interval; as there's no easy way
3194 					 * to acquire statistics between time
3195 					 * of the plumb and the next interval
3196 					 * boundary.  This results in inaccurate
3197 					 * total values for current interval.
3198 					 *
3199 					 * Note the case when an interface is
3200 					 * unplumbed; as similar problems exist.
3201 					 * The unplumbed interface is not in the
3202 					 * current list, and there's no easy way
3203 					 * to account for the statistics between
3204 					 * the previous interval and time of the
3205 					 * unplumb.  Therefore, we (in a sense)
3206 					 * ignore the removed interface by only
3207 					 * involving "current" interfaces when
3208 					 * computing the total statistics.
3209 					 * Unfortunately, this also results in
3210 					 * inaccurate values for interval total.
3211 					 */
3212 
3213 					for (walkold = oldlist6;
3214 					    walkold != NULL;
3215 					    walkold = walkold->next_if) {
3216 						if (strcmp(walkold->ifname,
3217 						    buf) == 0) {
3218 							if_stat_total(
3219 							    &walkold->tot,
3220 							    &t, &sum6);
3221 							break;
3222 						}
3223 					}
3224 
3225 				} /* 'for' loop 2f ends */
3226 
3227 				*nextnew = NULL;
3228 
3229 				(void) printf("%-7llu %-5llu %-7llu "
3230 				    "%-5llu %-6llu ",
3231 				    new6.ipackets - old6.ipackets,
3232 				    new6.ierrors - old6.ierrors,
3233 				    new6.opackets - old6.opackets,
3234 				    new6.oerrors - old6.oerrors,
3235 				    new6.collisions - old6.collisions);
3236 
3237 				(void) printf("%-7llu %-5llu %-7llu "
3238 				    "%-5llu %-6llu\n", sum6.ipackets,
3239 				    sum6.ierrors, sum6.opackets,
3240 				    sum6.oerrors, sum6.collisions);
3241 
3242 				/*
3243 				 * Tidy things up once finished.
3244 				 */
3245 
3246 				old6 = new6;
3247 				cleanlist = oldlist6;
3248 				oldlist6 = newlist6;
3249 				while (cleanlist != NULL) {
3250 					tlp = cleanlist->next_if;
3251 					free(cleanlist);
3252 					cleanlist = tlp;
3253 				}
3254 			}
3255 			break;
3256 		}
3257 		}
3258 		(void) fflush(stdout);
3259 	} /* 'for' loop 1 ends */
3260 	if ((Iflag_only == 0) && (!once_only))
3261 		(void) putchar('\n');
3262 	reentry = B_TRUE;
3263 }
3264 
3265 static void
3266 if_report_ip4(mib2_ipAddrEntry_t *ap,
3267 	char ifname[], char logintname[], struct ifstat *statptr,
3268 	boolean_t ksp_not_null) {
3269 
3270 	char abuf[MAXHOSTNAMELEN + 1];
3271 	char dstbuf[MAXHOSTNAMELEN + 1];
3272 
3273 	if (ksp_not_null) {
3274 		(void) printf("%-5s %-4u ",
3275 		    ifname, ap->ipAdEntInfo.ae_mtu);
3276 		if (ap->ipAdEntInfo.ae_flags & IFF_POINTOPOINT)
3277 			(void) pr_addr(ap->ipAdEntInfo.ae_pp_dst_addr,
3278 			    abuf, sizeof (abuf));
3279 		else
3280 			(void) pr_netaddr(ap->ipAdEntAddr,
3281 			    ap->ipAdEntNetMask, abuf, sizeof (abuf));
3282 		(void) printf("%-13s %-14s %-6llu %-5llu %-6llu %-5llu "
3283 		    "%-6llu %-6llu\n",
3284 		    abuf, pr_addr(ap->ipAdEntAddr, dstbuf, sizeof (dstbuf)),
3285 		    statptr->ipackets, statptr->ierrors,
3286 		    statptr->opackets, statptr->oerrors,
3287 		    statptr->collisions, 0LL);
3288 	}
3289 	/*
3290 	 * Print logical interface info if Aflag set (including logical unit 0)
3291 	 */
3292 	if (Aflag) {
3293 		*statptr = zerostat;
3294 		statptr->ipackets = ap->ipAdEntInfo.ae_ibcnt;
3295 		statptr->opackets = ap->ipAdEntInfo.ae_obcnt;
3296 
3297 		(void) printf("%-5s %-4u ", logintname, ap->ipAdEntInfo.ae_mtu);
3298 		if (ap->ipAdEntInfo.ae_flags & IFF_POINTOPOINT)
3299 			(void) pr_addr(ap->ipAdEntInfo.ae_pp_dst_addr, abuf,
3300 			sizeof (abuf));
3301 		else
3302 			(void) pr_netaddr(ap->ipAdEntAddr, ap->ipAdEntNetMask,
3303 			    abuf, sizeof (abuf));
3304 
3305 		(void) printf("%-13s %-14s %-6llu %-5s %-6s "
3306 		    "%-5s %-6s %-6llu\n", abuf,
3307 		    pr_addr(ap->ipAdEntAddr, dstbuf, sizeof (dstbuf)),
3308 		    statptr->ipackets, "N/A", "N/A", "N/A", "N/A",
3309 		    0LL);
3310 	}
3311 }
3312 
3313 static void
3314 if_report_ip6(mib2_ipv6AddrEntry_t *ap6,
3315 	char ifname[], char logintname[], struct ifstat *statptr,
3316 	boolean_t ksp_not_null) {
3317 
3318 	char abuf[MAXHOSTNAMELEN + 1];
3319 	char dstbuf[MAXHOSTNAMELEN + 1];
3320 
3321 	if (ksp_not_null) {
3322 		(void) printf("%-5s %-4u ", ifname, ap6->ipv6AddrInfo.ae_mtu);
3323 		if (ap6->ipv6AddrInfo.ae_flags &
3324 		    IFF_POINTOPOINT) {
3325 			(void) pr_addr6(&ap6->ipv6AddrInfo.ae_pp_dst_addr,
3326 			    abuf, sizeof (abuf));
3327 		} else {
3328 			(void) pr_prefix6(&ap6->ipv6AddrAddress,
3329 			    ap6->ipv6AddrPfxLength, abuf,
3330 			    sizeof (abuf));
3331 		}
3332 		(void) printf("%-27s %-27s %-6llu %-5llu "
3333 		    "%-6llu %-5llu %-6llu\n",
3334 		    abuf, pr_addr6(&ap6->ipv6AddrAddress, dstbuf,
3335 		    sizeof (dstbuf)),
3336 		    statptr->ipackets, statptr->ierrors, statptr->opackets,
3337 		    statptr->oerrors, statptr->collisions);
3338 	}
3339 	/*
3340 	 * Print logical interface info if Aflag set (including logical unit 0)
3341 	 */
3342 	if (Aflag) {
3343 		*statptr = zerostat;
3344 		statptr->ipackets = ap6->ipv6AddrInfo.ae_ibcnt;
3345 		statptr->opackets = ap6->ipv6AddrInfo.ae_obcnt;
3346 
3347 		(void) printf("%-5s %-4u ", logintname,
3348 		    ap6->ipv6AddrInfo.ae_mtu);
3349 		if (ap6->ipv6AddrInfo.ae_flags & IFF_POINTOPOINT)
3350 			(void) pr_addr6(&ap6->ipv6AddrInfo.ae_pp_dst_addr,
3351 			    abuf, sizeof (abuf));
3352 		else
3353 			(void) pr_prefix6(&ap6->ipv6AddrAddress,
3354 			    ap6->ipv6AddrPfxLength, abuf, sizeof (abuf));
3355 		(void) printf("%-27s %-27s %-6llu %-5s %-6s %-5s %-6s\n",
3356 		    abuf, pr_addr6(&ap6->ipv6AddrAddress, dstbuf,
3357 		    sizeof (dstbuf)),
3358 		    statptr->ipackets, "N/A", "N/A", "N/A", "N/A");
3359 	}
3360 }
3361 
3362 /* --------------------- DHCP_REPORT  (netstat -D) ------------------------- */
3363 
3364 static boolean_t
3365 dhcp_do_ipc(dhcp_ipc_type_t type, const char *ifname, boolean_t printed_one)
3366 {
3367 	dhcp_ipc_request_t	*request;
3368 	dhcp_ipc_reply_t	*reply;
3369 	int			error;
3370 
3371 	request = dhcp_ipc_alloc_request(type, ifname, NULL, 0, DHCP_TYPE_NONE);
3372 	if (request == NULL)
3373 		fail(0, "dhcp_do_ipc: out of memory");
3374 
3375 	error = dhcp_ipc_make_request(request, &reply, DHCP_IPC_WAIT_DEFAULT);
3376 	if (error != 0) {
3377 		free(request);
3378 		fail(0, "dhcp_do_ipc: %s", dhcp_ipc_strerror(error));
3379 	}
3380 
3381 	free(request);
3382 	error = reply->return_code;
3383 	if (error == DHCP_IPC_E_UNKIF) {
3384 		free(reply);
3385 		return (printed_one);
3386 	}
3387 	if (error != 0) {
3388 		free(reply);
3389 		fail(0, "dhcp_do_ipc: %s", dhcp_ipc_strerror(error));
3390 	}
3391 
3392 	if (timestamp_fmt != NODATE)
3393 		print_timestamp(timestamp_fmt);
3394 
3395 	if (!printed_one)
3396 		(void) printf("%s", dhcp_status_hdr_string());
3397 
3398 	(void) printf("%s", dhcp_status_reply_to_string(reply));
3399 	free(reply);
3400 	return (B_TRUE);
3401 }
3402 
3403 /*
3404  * dhcp_walk_interfaces: walk the list of interfaces for a given address
3405  * family (af).  For each, print out the DHCP status using dhcp_do_ipc.
3406  */
3407 static boolean_t
3408 dhcp_walk_interfaces(int af, boolean_t printed_one)
3409 {
3410 	struct lifnum	lifn;
3411 	struct lifconf	lifc;
3412 	int		n_ifs, i, sock_fd;
3413 
3414 	sock_fd = socket(af, SOCK_DGRAM, 0);
3415 	if (sock_fd == -1)
3416 		return (printed_one);
3417 
3418 	/*
3419 	 * SIOCGLIFNUM is just an estimate.  If the ioctl fails, we don't care;
3420 	 * just drive on and use SIOCGLIFCONF with increasing buffer sizes, as
3421 	 * is traditional.
3422 	 */
3423 	(void) memset(&lifn, 0, sizeof (lifn));
3424 	lifn.lifn_family = af;
3425 	lifn.lifn_flags = LIFC_ALLZONES | LIFC_NOXMIT | LIFC_UNDER_IPMP;
3426 	if (ioctl(sock_fd, SIOCGLIFNUM, &lifn) == -1)
3427 		n_ifs = LIFN_GUARD_VALUE;
3428 	else
3429 		n_ifs = lifn.lifn_count + LIFN_GUARD_VALUE;
3430 
3431 	(void) memset(&lifc, 0, sizeof (lifc));
3432 	lifc.lifc_family = af;
3433 	lifc.lifc_flags = lifn.lifn_flags;
3434 	lifc.lifc_len = n_ifs * sizeof (struct lifreq);
3435 	lifc.lifc_buf = malloc(lifc.lifc_len);
3436 	if (lifc.lifc_buf != NULL) {
3437 
3438 		if (ioctl(sock_fd, SIOCGLIFCONF, &lifc) == -1) {
3439 			(void) close(sock_fd);
3440 			free(lifc.lifc_buf);
3441 			return (NULL);
3442 		}
3443 
3444 		n_ifs = lifc.lifc_len / sizeof (struct lifreq);
3445 
3446 		for (i = 0; i < n_ifs; i++) {
3447 			printed_one = dhcp_do_ipc(DHCP_STATUS |
3448 			    (af == AF_INET6 ? DHCP_V6 : 0),
3449 			    lifc.lifc_req[i].lifr_name, printed_one);
3450 		}
3451 	}
3452 	(void) close(sock_fd);
3453 	free(lifc.lifc_buf);
3454 	return (printed_one);
3455 }
3456 
3457 static void
3458 dhcp_report(char *ifname)
3459 {
3460 	boolean_t printed_one;
3461 
3462 	if (!family_selected(AF_INET) && !family_selected(AF_INET6))
3463 		return;
3464 
3465 	printed_one = B_FALSE;
3466 	if (ifname != NULL) {
3467 		if (family_selected(AF_INET)) {
3468 			printed_one = dhcp_do_ipc(DHCP_STATUS, ifname,
3469 			    printed_one);
3470 		}
3471 		if (family_selected(AF_INET6)) {
3472 			printed_one = dhcp_do_ipc(DHCP_STATUS | DHCP_V6,
3473 			    ifname, printed_one);
3474 		}
3475 		if (!printed_one) {
3476 			fail(0, "%s: %s", ifname,
3477 			    dhcp_ipc_strerror(DHCP_IPC_E_UNKIF));
3478 		}
3479 	} else {
3480 		if (family_selected(AF_INET)) {
3481 			printed_one = dhcp_walk_interfaces(AF_INET,
3482 			    printed_one);
3483 		}
3484 		if (family_selected(AF_INET6))
3485 			(void) dhcp_walk_interfaces(AF_INET6, printed_one);
3486 	}
3487 }
3488 
3489 /* --------------------- GROUP_REPORT (netstat -g) ------------------------- */
3490 
3491 static void
3492 group_report(mib_item_t *item)
3493 {
3494 	mib_item_t	*v4grp = NULL, *v4src = NULL;
3495 	mib_item_t	*v6grp = NULL, *v6src = NULL;
3496 	int		jtemp = 0;
3497 	char		ifname[LIFNAMSIZ + 1];
3498 	char		abuf[MAXHOSTNAMELEN + 1];
3499 	ip_member_t	*ipmp;
3500 	ip_grpsrc_t	*ips;
3501 	ipv6_member_t	*ipmp6;
3502 	ipv6_grpsrc_t	*ips6;
3503 	boolean_t	first, first_src;
3504 
3505 	/* 'for' loop 1: */
3506 	for (; item; item = item->next_item) {
3507 		if (Xflag) {
3508 			(void) printf("\n--- Entry %d ---\n", ++jtemp);
3509 			(void) printf("Group = %d, mib_id = %d, "
3510 			    "length = %d, valp = 0x%p\n",
3511 			    item->group, item->mib_id, item->length,
3512 			    item->valp);
3513 		}
3514 		if (item->group == MIB2_IP && family_selected(AF_INET)) {
3515 			switch (item->mib_id) {
3516 			case EXPER_IP_GROUP_MEMBERSHIP:
3517 				v4grp = item;
3518 				if (Xflag)
3519 					(void) printf("item is v4grp info\n");
3520 				break;
3521 			case EXPER_IP_GROUP_SOURCES:
3522 				v4src = item;
3523 				if (Xflag)
3524 					(void) printf("item is v4src info\n");
3525 				break;
3526 			default:
3527 				continue;
3528 			}
3529 			continue;
3530 		}
3531 		if (item->group == MIB2_IP6 && family_selected(AF_INET6)) {
3532 			switch (item->mib_id) {
3533 			case EXPER_IP6_GROUP_MEMBERSHIP:
3534 				v6grp = item;
3535 				if (Xflag)
3536 					(void) printf("item is v6grp info\n");
3537 				break;
3538 			case EXPER_IP6_GROUP_SOURCES:
3539 				v6src = item;
3540 				if (Xflag)
3541 					(void) printf("item is v6src info\n");
3542 				break;
3543 			default:
3544 				continue;
3545 			}
3546 		}
3547 	}
3548 
3549 	if (family_selected(AF_INET) && v4grp != NULL) {
3550 		if (Xflag)
3551 			(void) printf("%u records for ipGroupMember:\n",
3552 			    v4grp->length / sizeof (ip_member_t));
3553 
3554 		first = B_TRUE;
3555 		for (ipmp = (ip_member_t *)v4grp->valp;
3556 		    (char *)ipmp < (char *)v4grp->valp + v4grp->length;
3557 		    /* LINTED: (note 1) */
3558 		    ipmp = (ip_member_t *)((char *)ipmp + ipMemberEntrySize)) {
3559 			if (first) {
3560 				(void) puts(v4compat ?
3561 				    "Group Memberships" :
3562 				    "Group Memberships: IPv4");
3563 				(void) puts("Interface "
3564 				    "Group                RefCnt");
3565 				(void) puts("--------- "
3566 				    "-------------------- ------");
3567 				first = B_FALSE;
3568 			}
3569 
3570 			(void) printf("%-9s %-20s %6u\n",
3571 			    octetstr(&ipmp->ipGroupMemberIfIndex, 'a',
3572 			    ifname, sizeof (ifname)),
3573 			    pr_addr(ipmp->ipGroupMemberAddress,
3574 			    abuf, sizeof (abuf)),
3575 			    ipmp->ipGroupMemberRefCnt);
3576 
3577 
3578 			if (!Vflag || v4src == NULL)
3579 				continue;
3580 
3581 			if (Xflag)
3582 				(void) printf("scanning %u ipGroupSource "
3583 				    "records...\n",
3584 				    v4src->length/sizeof (ip_grpsrc_t));
3585 
3586 			first_src = B_TRUE;
3587 			for (ips = (ip_grpsrc_t *)v4src->valp;
3588 			    (char *)ips < (char *)v4src->valp + v4src->length;
3589 			    /* LINTED: (note 1) */
3590 			    ips = (ip_grpsrc_t *)((char *)ips +
3591 			    ipGroupSourceEntrySize)) {
3592 				/*
3593 				 * We assume that all source addrs for a given
3594 				 * interface/group pair are contiguous, so on
3595 				 * the first non-match after we've found at
3596 				 * least one, we bail.
3597 				 */
3598 				if ((ipmp->ipGroupMemberAddress !=
3599 				    ips->ipGroupSourceGroup) ||
3600 				    (!octetstrmatch(&ipmp->ipGroupMemberIfIndex,
3601 				    &ips->ipGroupSourceIfIndex))) {
3602 					if (first_src)
3603 						continue;
3604 					else
3605 						break;
3606 				}
3607 				if (first_src) {
3608 					(void) printf("\t%s:    %s\n",
3609 					    fmodestr(
3610 					    ipmp->ipGroupMemberFilterMode),
3611 					    pr_addr(ips->ipGroupSourceAddress,
3612 					    abuf, sizeof (abuf)));
3613 					first_src = B_FALSE;
3614 					continue;
3615 				}
3616 
3617 				(void) printf("\t            %s\n",
3618 				    pr_addr(ips->ipGroupSourceAddress, abuf,
3619 				    sizeof (abuf)));
3620 			}
3621 		}
3622 		(void) putchar('\n');
3623 	}
3624 
3625 	if (family_selected(AF_INET6) && v6grp != NULL) {
3626 		if (Xflag)
3627 			(void) printf("%u records for ipv6GroupMember:\n",
3628 			    v6grp->length / sizeof (ipv6_member_t));
3629 
3630 		first = B_TRUE;
3631 		for (ipmp6 = (ipv6_member_t *)v6grp->valp;
3632 		    (char *)ipmp6 < (char *)v6grp->valp + v6grp->length;
3633 		    /* LINTED: (note 1) */
3634 		    ipmp6 = (ipv6_member_t *)((char *)ipmp6 +
3635 		    ipv6MemberEntrySize)) {
3636 			if (first) {
3637 				(void) puts("Group Memberships: "
3638 				    "IPv6");
3639 				(void) puts(" If       "
3640 				    "Group                   RefCnt");
3641 				(void) puts("----- "
3642 				    "--------------------------- ------");
3643 				first = B_FALSE;
3644 			}
3645 
3646 			(void) printf("%-5s %-27s %5u\n",
3647 			    ifindex2str(ipmp6->ipv6GroupMemberIfIndex, ifname),
3648 			    pr_addr6(&ipmp6->ipv6GroupMemberAddress,
3649 			    abuf, sizeof (abuf)),
3650 			    ipmp6->ipv6GroupMemberRefCnt);
3651 
3652 			if (!Vflag || v6src == NULL)
3653 				continue;
3654 
3655 			if (Xflag)
3656 				(void) printf("scanning %u ipv6GroupSource "
3657 				    "records...\n",
3658 				    v6src->length/sizeof (ipv6_grpsrc_t));
3659 
3660 			first_src = B_TRUE;
3661 			for (ips6 = (ipv6_grpsrc_t *)v6src->valp;
3662 			    (char *)ips6 < (char *)v6src->valp + v6src->length;
3663 			    /* LINTED: (note 1) */
3664 			    ips6 = (ipv6_grpsrc_t *)((char *)ips6 +
3665 			    ipv6GroupSourceEntrySize)) {
3666 				/* same assumption as in the v4 case above */
3667 				if ((ipmp6->ipv6GroupMemberIfIndex !=
3668 				    ips6->ipv6GroupSourceIfIndex) ||
3669 				    (!IN6_ARE_ADDR_EQUAL(
3670 				    &ipmp6->ipv6GroupMemberAddress,
3671 				    &ips6->ipv6GroupSourceGroup))) {
3672 					if (first_src)
3673 						continue;
3674 					else
3675 						break;
3676 				}
3677 				if (first_src) {
3678 					(void) printf("\t%s:    %s\n",
3679 					    fmodestr(
3680 					    ipmp6->ipv6GroupMemberFilterMode),
3681 					    pr_addr6(
3682 					    &ips6->ipv6GroupSourceAddress,
3683 					    abuf, sizeof (abuf)));
3684 					first_src = B_FALSE;
3685 					continue;
3686 				}
3687 
3688 				(void) printf("\t            %s\n",
3689 				    pr_addr6(&ips6->ipv6GroupSourceAddress,
3690 				    abuf, sizeof (abuf)));
3691 			}
3692 		}
3693 		(void) putchar('\n');
3694 	}
3695 
3696 	(void) putchar('\n');
3697 	(void) fflush(stdout);
3698 }
3699 
3700 /* --------------------- DCE_REPORT (netstat -d) ------------------------- */
3701 
3702 #define	FLBUFSIZE	8
3703 
3704 /* Assumes flbuf is at least 5 characters; callers use FLBUFSIZE */
3705 static char *
3706 dceflags2str(uint32_t flags, char *flbuf)
3707 {
3708 	char *str = flbuf;
3709 
3710 	if (flags & DCEF_DEFAULT)
3711 		*str++ = 'D';
3712 	if (flags & DCEF_PMTU)
3713 		*str++ = 'P';
3714 	if (flags & DCEF_UINFO)
3715 		*str++ = 'U';
3716 	if (flags & DCEF_TOO_SMALL_PMTU)
3717 		*str++ = 'S';
3718 	*str++ = '\0';
3719 	return (flbuf);
3720 }
3721 
3722 static void
3723 dce_report(mib_item_t *item)
3724 {
3725 	mib_item_t	*v4dce = NULL;
3726 	mib_item_t	*v6dce = NULL;
3727 	int		jtemp = 0;
3728 	char		ifname[LIFNAMSIZ + 1];
3729 	char		abuf[MAXHOSTNAMELEN + 1];
3730 	char		flbuf[FLBUFSIZE];
3731 	boolean_t	first;
3732 	dest_cache_entry_t *dce;
3733 
3734 	/* 'for' loop 1: */
3735 	for (; item; item = item->next_item) {
3736 		if (Xflag) {
3737 			(void) printf("\n--- Entry %d ---\n", ++jtemp);
3738 			(void) printf("Group = %d, mib_id = %d, "
3739 			    "length = %d, valp = 0x%p\n",
3740 			    item->group, item->mib_id, item->length,
3741 			    item->valp);
3742 		}
3743 		if (item->group == MIB2_IP && family_selected(AF_INET) &&
3744 		    item->mib_id == EXPER_IP_DCE) {
3745 			v4dce = item;
3746 			if (Xflag)
3747 				(void) printf("item is v4dce info\n");
3748 		}
3749 		if (item->group == MIB2_IP6 && family_selected(AF_INET6) &&
3750 		    item->mib_id == EXPER_IP_DCE) {
3751 			v6dce = item;
3752 			if (Xflag)
3753 				(void) printf("item is v6dce info\n");
3754 		}
3755 	}
3756 
3757 	if (family_selected(AF_INET) && v4dce != NULL) {
3758 		if (Xflag)
3759 			(void) printf("%u records for DestCacheEntry:\n",
3760 			    v4dce->length / ipDestEntrySize);
3761 
3762 		first = B_TRUE;
3763 		for (dce = (dest_cache_entry_t *)v4dce->valp;
3764 		    (char *)dce < (char *)v4dce->valp + v4dce->length;
3765 		    /* LINTED: (note 1) */
3766 		    dce = (dest_cache_entry_t *)((char *)dce +
3767 		    ipDestEntrySize)) {
3768 			if (first) {
3769 				(void) putchar('\n');
3770 				(void) puts("Destination Cache Entries: IPv4");
3771 				(void) puts(
3772 				    "Address               PMTU   Age  Flags");
3773 				(void) puts(
3774 				    "-------------------- ------ ----- -----");
3775 				first = B_FALSE;
3776 			}
3777 
3778 			(void) printf("%-20s %6u %5u %-5s\n",
3779 			    pr_addr(dce->DestIpv4Address, abuf, sizeof (abuf)),
3780 			    dce->DestPmtu, dce->DestAge,
3781 			    dceflags2str(dce->DestFlags, flbuf));
3782 		}
3783 	}
3784 
3785 	if (family_selected(AF_INET6) && v6dce != NULL) {
3786 		if (Xflag)
3787 			(void) printf("%u records for DestCacheEntry:\n",
3788 			    v6dce->length / ipDestEntrySize);
3789 
3790 		first = B_TRUE;
3791 		for (dce = (dest_cache_entry_t *)v6dce->valp;
3792 		    (char *)dce < (char *)v6dce->valp + v6dce->length;
3793 		    /* LINTED: (note 1) */
3794 		    dce = (dest_cache_entry_t *)((char *)dce +
3795 		    ipDestEntrySize)) {
3796 			if (first) {
3797 				(void) putchar('\n');
3798 				(void) puts("Destination Cache Entries: IPv6");
3799 				(void) puts(
3800 				    "Address                      PMTU  "
3801 				    " Age Flags If ");
3802 				(void) puts(
3803 				    "--------------------------- ------ "
3804 				    "----- ----- ---");
3805 				first = B_FALSE;
3806 			}
3807 
3808 			(void) printf("%-27s %6u %5u %-5s %s\n",
3809 			    pr_addr6(&dce->DestIpv6Address, abuf,
3810 			    sizeof (abuf)),
3811 			    dce->DestPmtu, dce->DestAge,
3812 			    dceflags2str(dce->DestFlags, flbuf),
3813 			    dce->DestIfindex == 0 ? "" :
3814 			    ifindex2str(dce->DestIfindex, ifname));
3815 		}
3816 	}
3817 	(void) fflush(stdout);
3818 }
3819 
3820 /* --------------------- ARP_REPORT (netstat -p) -------------------------- */
3821 
3822 static void
3823 arp_report(mib_item_t *item)
3824 {
3825 	int		jtemp = 0;
3826 	char		ifname[LIFNAMSIZ + 1];
3827 	char		abuf[MAXHOSTNAMELEN + 1];
3828 	char		maskbuf[STR_EXPAND * OCTET_LENGTH + 1];
3829 	char		flbuf[32];	/* ACE_F_ flags */
3830 	char		xbuf[STR_EXPAND * OCTET_LENGTH + 1];
3831 	mib2_ipNetToMediaEntry_t	*np;
3832 	int		flags;
3833 	boolean_t	first;
3834 
3835 	if (!(family_selected(AF_INET)))
3836 		return;
3837 
3838 	/* 'for' loop 1: */
3839 	for (; item; item = item->next_item) {
3840 		if (Xflag) {
3841 			(void) printf("\n--- Entry %d ---\n", ++jtemp);
3842 			(void) printf("Group = %d, mib_id = %d, "
3843 			    "length = %d, valp = 0x%p\n",
3844 			    item->group, item->mib_id, item->length,
3845 			    item->valp);
3846 		}
3847 		if (!(item->group == MIB2_IP && item->mib_id == MIB2_IP_MEDIA))
3848 			continue; /* 'for' loop 1 */
3849 
3850 		if (Xflag)
3851 			(void) printf("%u records for "
3852 			    "ipNetToMediaEntryTable:\n",
3853 			    item->length/sizeof (mib2_ipNetToMediaEntry_t));
3854 
3855 		first = B_TRUE;
3856 		/* 'for' loop 2: */
3857 		for (np = (mib2_ipNetToMediaEntry_t *)item->valp;
3858 		    (char *)np < (char *)item->valp + item->length;
3859 		    /* LINTED: (note 1) */
3860 		    np = (mib2_ipNetToMediaEntry_t *)((char *)np +
3861 		    ipNetToMediaEntrySize)) {
3862 			if (first) {
3863 				(void) puts(v4compat ?
3864 				    "Net to Media Table" :
3865 				    "Net to Media Table: IPv4");
3866 				(void) puts("Device "
3867 				    "  IP Address               Mask      "
3868 				    "Flags      Phys Addr");
3869 				(void) puts("------ "
3870 				    "-------------------- --------------- "
3871 				    "-------- ---------------");
3872 				first = B_FALSE;
3873 			}
3874 
3875 			flbuf[0] = '\0';
3876 			flags = np->ipNetToMediaInfo.ntm_flags;
3877 			/*
3878 			 * Note that not all flags are possible at the same
3879 			 * time.  Patterns: SPLAy DUo
3880 			 */
3881 			if (flags & ACE_F_PERMANENT)
3882 				(void) strcat(flbuf, "S");
3883 			if (flags & ACE_F_PUBLISH)
3884 				(void) strcat(flbuf, "P");
3885 			if (flags & ACE_F_DYING)
3886 				(void) strcat(flbuf, "D");
3887 			if (!(flags & ACE_F_RESOLVED))
3888 				(void) strcat(flbuf, "U");
3889 			if (flags & ACE_F_MAPPING)
3890 				(void) strcat(flbuf, "M");
3891 			if (flags & ACE_F_MYADDR)
3892 				(void) strcat(flbuf, "L");
3893 			if (flags & ACE_F_UNVERIFIED)
3894 				(void) strcat(flbuf, "d");
3895 			if (flags & ACE_F_AUTHORITY)
3896 				(void) strcat(flbuf, "A");
3897 			if (flags & ACE_F_OLD)
3898 				(void) strcat(flbuf, "o");
3899 			if (flags & ACE_F_DELAYED)
3900 				(void) strcat(flbuf, "y");
3901 			(void) printf("%-6s %-20s %-15s %-8s %s\n",
3902 			    octetstr(&np->ipNetToMediaIfIndex, 'a',
3903 			    ifname, sizeof (ifname)),
3904 			    pr_addr(np->ipNetToMediaNetAddress,
3905 			    abuf, sizeof (abuf)),
3906 			    octetstr(&np->ipNetToMediaInfo.ntm_mask, 'd',
3907 			    maskbuf, sizeof (maskbuf)),
3908 			    flbuf,
3909 			    octetstr(&np->ipNetToMediaPhysAddress, 'h',
3910 			    xbuf, sizeof (xbuf)));
3911 		} /* 'for' loop 2 ends */
3912 	} /* 'for' loop 1 ends */
3913 	(void) fflush(stdout);
3914 }
3915 
3916 /* --------------------- NDP_REPORT (netstat -p) -------------------------- */
3917 
3918 static void
3919 ndp_report(mib_item_t *item)
3920 {
3921 	int		jtemp = 0;
3922 	char		abuf[MAXHOSTNAMELEN + 1];
3923 	char		*state;
3924 	char		*type;
3925 	char		xbuf[STR_EXPAND * OCTET_LENGTH + 1];
3926 	mib2_ipv6NetToMediaEntry_t	*np6;
3927 	char		ifname[LIFNAMSIZ + 1];
3928 	boolean_t	first;
3929 
3930 	if (!(family_selected(AF_INET6)))
3931 		return;
3932 
3933 	/* 'for' loop 1: */
3934 	for (; item; item = item->next_item) {
3935 		if (Xflag) {
3936 			(void) printf("\n--- Entry %d ---\n", ++jtemp);
3937 			(void) printf("Group = %d, mib_id = %d, "
3938 			    "length = %d, valp = 0x%p\n",
3939 			    item->group, item->mib_id, item->length,
3940 			    item->valp);
3941 		}
3942 		if (!(item->group == MIB2_IP6 &&
3943 		    item->mib_id == MIB2_IP6_MEDIA))
3944 			continue; /* 'for' loop 1 */
3945 
3946 		first = B_TRUE;
3947 		/* 'for' loop 2: */
3948 		for (np6 = (mib2_ipv6NetToMediaEntry_t *)item->valp;
3949 		    (char *)np6 < (char *)item->valp + item->length;
3950 		    /* LINTED: (note 1) */
3951 		    np6 = (mib2_ipv6NetToMediaEntry_t *)((char *)np6 +
3952 		    ipv6NetToMediaEntrySize)) {
3953 			if (first) {
3954 				(void) puts("\nNet to Media Table: IPv6");
3955 				(void) puts(" If   Physical Address   "
3956 				    " Type      State      Destination/Mask");
3957 				(void) puts("----- -----------------  "
3958 				    "------- ------------ "
3959 				    "---------------------------");
3960 				first = B_FALSE;
3961 			}
3962 
3963 			switch (np6->ipv6NetToMediaState) {
3964 			case ND_INCOMPLETE:
3965 				state = "INCOMPLETE";
3966 				break;
3967 			case ND_REACHABLE:
3968 				state = "REACHABLE";
3969 				break;
3970 			case ND_STALE:
3971 				state = "STALE";
3972 				break;
3973 			case ND_DELAY:
3974 				state = "DELAY";
3975 				break;
3976 			case ND_PROBE:
3977 				state = "PROBE";
3978 				break;
3979 			case ND_UNREACHABLE:
3980 				state = "UNREACHABLE";
3981 				break;
3982 			default:
3983 				state = "UNKNOWN";
3984 			}
3985 
3986 			switch (np6->ipv6NetToMediaType) {
3987 			case 1:
3988 				type = "other";
3989 				break;
3990 			case 2:
3991 				type = "dynamic";
3992 				break;
3993 			case 3:
3994 				type = "static";
3995 				break;
3996 			case 4:
3997 				type = "local";
3998 				break;
3999 			}
4000 			(void) printf("%-5s %-17s  %-7s %-12s %-27s\n",
4001 			    ifindex2str(np6->ipv6NetToMediaIfIndex, ifname),
4002 			    octetstr(&np6->ipv6NetToMediaPhysAddress, 'h',
4003 			    xbuf, sizeof (xbuf)),
4004 			    type,
4005 			    state,
4006 			    pr_addr6(&np6->ipv6NetToMediaNetAddress,
4007 			    abuf, sizeof (abuf)));
4008 		} /* 'for' loop 2 ends */
4009 	} /* 'for' loop 1 ends */
4010 	(void) putchar('\n');
4011 	(void) fflush(stdout);
4012 }
4013 
4014 /* ------------------------- ire_report (netstat -r) ------------------------ */
4015 
4016 typedef struct sec_attr_list_s {
4017 	struct sec_attr_list_s *sal_next;
4018 	const mib2_ipAttributeEntry_t *sal_attr;
4019 } sec_attr_list_t;
4020 
4021 static boolean_t ire_report_item_v4(const mib2_ipRouteEntry_t *, boolean_t,
4022     const sec_attr_list_t *);
4023 static boolean_t ire_report_item_v6(const mib2_ipv6RouteEntry_t *, boolean_t,
4024     const sec_attr_list_t *);
4025 static const char *pr_secattr(const sec_attr_list_t *);
4026 
4027 static void
4028 ire_report(const mib_item_t *item)
4029 {
4030 	int			jtemp = 0;
4031 	boolean_t		print_hdr_once_v4 = B_TRUE;
4032 	boolean_t		print_hdr_once_v6 = B_TRUE;
4033 	mib2_ipRouteEntry_t	*rp;
4034 	mib2_ipv6RouteEntry_t	*rp6;
4035 	sec_attr_list_t		**v4_attrs, **v4a;
4036 	sec_attr_list_t		**v6_attrs, **v6a;
4037 	sec_attr_list_t		*all_attrs, *aptr;
4038 	const mib_item_t	*iptr;
4039 	int			ipv4_route_count, ipv6_route_count;
4040 	int			route_attrs_count;
4041 
4042 	/*
4043 	 * Preparation pass: the kernel returns separate entries for IP routing
4044 	 * table entries and security attributes.  We loop through the
4045 	 * attributes first and link them into lists.
4046 	 */
4047 	ipv4_route_count = ipv6_route_count = route_attrs_count = 0;
4048 	for (iptr = item; iptr != NULL; iptr = iptr->next_item) {
4049 		if (iptr->group == MIB2_IP6 && iptr->mib_id == MIB2_IP6_ROUTE)
4050 			ipv6_route_count += iptr->length / ipv6RouteEntrySize;
4051 		if (iptr->group == MIB2_IP && iptr->mib_id == MIB2_IP_ROUTE)
4052 			ipv4_route_count += iptr->length / ipRouteEntrySize;
4053 		if ((iptr->group == MIB2_IP || iptr->group == MIB2_IP6) &&
4054 		    iptr->mib_id == EXPER_IP_RTATTR)
4055 			route_attrs_count += iptr->length /
4056 			    ipRouteAttributeSize;
4057 	}
4058 	v4_attrs = v6_attrs = NULL;
4059 	all_attrs = NULL;
4060 	if (family_selected(AF_INET) && ipv4_route_count > 0) {
4061 		v4_attrs = calloc(ipv4_route_count, sizeof (*v4_attrs));
4062 		if (v4_attrs == NULL) {
4063 			perror("ire_report calloc v4_attrs failed");
4064 			return;
4065 		}
4066 	}
4067 	if (family_selected(AF_INET6) && ipv6_route_count > 0) {
4068 		v6_attrs = calloc(ipv6_route_count, sizeof (*v6_attrs));
4069 		if (v6_attrs == NULL) {
4070 			perror("ire_report calloc v6_attrs failed");
4071 			goto ire_report_done;
4072 		}
4073 	}
4074 	if (route_attrs_count > 0) {
4075 		all_attrs = malloc(route_attrs_count * sizeof (*all_attrs));
4076 		if (all_attrs == NULL) {
4077 			perror("ire_report malloc all_attrs failed");
4078 			goto ire_report_done;
4079 		}
4080 	}
4081 	aptr = all_attrs;
4082 	for (iptr = item; iptr != NULL; iptr = iptr->next_item) {
4083 		mib2_ipAttributeEntry_t *iae;
4084 		sec_attr_list_t **alp;
4085 
4086 		if (v4_attrs != NULL && iptr->group == MIB2_IP &&
4087 		    iptr->mib_id == EXPER_IP_RTATTR) {
4088 			alp = v4_attrs;
4089 		} else if (v6_attrs != NULL && iptr->group == MIB2_IP6 &&
4090 		    iptr->mib_id == EXPER_IP_RTATTR) {
4091 			alp = v6_attrs;
4092 		} else {
4093 			continue;
4094 		}
4095 		for (iae = iptr->valp;
4096 		    (char *)iae < (char *)iptr->valp + iptr->length;
4097 		    /* LINTED: (note 1) */
4098 		    iae = (mib2_ipAttributeEntry_t *)((char *)iae +
4099 		    ipRouteAttributeSize)) {
4100 			aptr->sal_next = alp[iae->iae_routeidx];
4101 			aptr->sal_attr = iae;
4102 			alp[iae->iae_routeidx] = aptr++;
4103 		}
4104 	}
4105 
4106 	/* 'for' loop 1: */
4107 	v4a = v4_attrs;
4108 	v6a = v6_attrs;
4109 	for (; item != NULL; item = item->next_item) {
4110 		if (Xflag) {
4111 			(void) printf("\n--- Entry %d ---\n", ++jtemp);
4112 			(void) printf("Group = %d, mib_id = %d, "
4113 			    "length = %d, valp = 0x%p\n",
4114 			    item->group, item->mib_id,
4115 			    item->length, item->valp);
4116 		}
4117 		if (!((item->group == MIB2_IP &&
4118 		    item->mib_id == MIB2_IP_ROUTE) ||
4119 		    (item->group == MIB2_IP6 &&
4120 		    item->mib_id == MIB2_IP6_ROUTE)))
4121 			continue; /* 'for' loop 1 */
4122 
4123 		if (item->group == MIB2_IP && !family_selected(AF_INET))
4124 			continue; /* 'for' loop 1 */
4125 		else if (item->group == MIB2_IP6 && !family_selected(AF_INET6))
4126 			continue; /* 'for' loop 1 */
4127 
4128 		if (Xflag) {
4129 			if (item->group == MIB2_IP) {
4130 				(void) printf("%u records for "
4131 				    "ipRouteEntryTable:\n",
4132 				    item->length/sizeof (mib2_ipRouteEntry_t));
4133 			} else {
4134 				(void) printf("%u records for "
4135 				    "ipv6RouteEntryTable:\n",
4136 				    item->length/
4137 				    sizeof (mib2_ipv6RouteEntry_t));
4138 			}
4139 		}
4140 
4141 		if (item->group == MIB2_IP) {
4142 			for (rp = (mib2_ipRouteEntry_t *)item->valp;
4143 			    (char *)rp < (char *)item->valp + item->length;
4144 			    /* LINTED: (note 1) */
4145 			    rp = (mib2_ipRouteEntry_t *)((char *)rp +
4146 			    ipRouteEntrySize)) {
4147 				aptr = v4a == NULL ? NULL : *v4a++;
4148 				print_hdr_once_v4 = ire_report_item_v4(rp,
4149 				    print_hdr_once_v4, aptr);
4150 			}
4151 		} else {
4152 			for (rp6 = (mib2_ipv6RouteEntry_t *)item->valp;
4153 			    (char *)rp6 < (char *)item->valp + item->length;
4154 			    /* LINTED: (note 1) */
4155 			    rp6 = (mib2_ipv6RouteEntry_t *)((char *)rp6 +
4156 			    ipv6RouteEntrySize)) {
4157 				aptr = v6a == NULL ? NULL : *v6a++;
4158 				print_hdr_once_v6 = ire_report_item_v6(rp6,
4159 				    print_hdr_once_v6, aptr);
4160 			}
4161 		}
4162 	} /* 'for' loop 1 ends */
4163 	(void) fflush(stdout);
4164 ire_report_done:
4165 	if (v4_attrs != NULL)
4166 		free(v4_attrs);
4167 	if (v6_attrs != NULL)
4168 		free(v6_attrs);
4169 	if (all_attrs != NULL)
4170 		free(all_attrs);
4171 }
4172 
4173 /*
4174  * Match a user-supplied device name.  We do this by string because
4175  * the MIB2 interface gives us interface name strings rather than
4176  * ifIndex numbers.  The "none" rule matches only routes with no
4177  * interface.  The "any" rule matches routes with any non-blank
4178  * interface.  A base name ("hme0") matches all aliases as well
4179  * ("hme0:1").
4180  */
4181 static boolean_t
4182 dev_name_match(const DeviceName *devnam, const char *ifname)
4183 {
4184 	int iflen;
4185 
4186 	if (ifname == NULL)
4187 		return (devnam->o_length == 0);		/* "none" */
4188 	if (*ifname == '\0')
4189 		return (devnam->o_length != 0);		/* "any" */
4190 	iflen = strlen(ifname);
4191 	/* The check for ':' here supports interface aliases. */
4192 	if (iflen > devnam->o_length ||
4193 	    (iflen < devnam->o_length && devnam->o_bytes[iflen] != ':'))
4194 		return (B_FALSE);
4195 	return (strncmp(ifname, devnam->o_bytes, iflen) == 0);
4196 }
4197 
4198 /*
4199  * Match a user-supplied IP address list.  The "any" rule matches any
4200  * non-zero address.  The "none" rule matches only the zero address.
4201  * IPv6 addresses supplied by the user are ignored.  If the user
4202  * supplies a subnet mask, then match routes that are at least that
4203  * specific (use the user's mask).  If the user supplies only an
4204  * address, then select any routes that would match (use the route's
4205  * mask).
4206  */
4207 static boolean_t
4208 v4_addr_match(IpAddress addr, IpAddress mask, const filter_t *fp)
4209 {
4210 	char **app;
4211 	char *aptr;
4212 	in_addr_t faddr, fmask;
4213 
4214 	if (fp->u.a.f_address == NULL) {
4215 		if (IN6_IS_ADDR_UNSPECIFIED(&fp->u.a.f_mask))
4216 			return (addr != INADDR_ANY);	/* "any" */
4217 		else
4218 			return (addr == INADDR_ANY);	/* "none" */
4219 	}
4220 	if (!IN6_IS_V4MASK(fp->u.a.f_mask))
4221 		return (B_FALSE);
4222 	IN6_V4MAPPED_TO_IPADDR(&fp->u.a.f_mask, fmask);
4223 	if (fmask != IP_HOST_MASK) {
4224 		if (fmask > mask)
4225 			return (B_FALSE);
4226 		mask = fmask;
4227 	}
4228 	for (app = fp->u.a.f_address->h_addr_list; (aptr = *app) != NULL; app++)
4229 		/* LINTED: (note 1) */
4230 		if (IN6_IS_ADDR_V4MAPPED((in6_addr_t *)aptr)) {
4231 			/* LINTED: (note 1) */
4232 			IN6_V4MAPPED_TO_IPADDR((in6_addr_t *)aptr, faddr);
4233 			if (((faddr ^ addr) & mask) == 0)
4234 				return (B_TRUE);
4235 		}
4236 	return (B_FALSE);
4237 }
4238 
4239 /*
4240  * Run through the filter list for an IPv4 MIB2 route entry.  If all
4241  * filters of a given type fail to match, then the route is filtered
4242  * out (not displayed).  If no filter is given or at least one filter
4243  * of each type matches, then display the route.
4244  */
4245 static boolean_t
4246 ire_filter_match_v4(const mib2_ipRouteEntry_t *rp, uint_t flag_b)
4247 {
4248 	filter_t *fp;
4249 	int idx;
4250 
4251 	/* 'for' loop 1: */
4252 	for (idx = 0; idx < NFILTERKEYS; idx++)
4253 		if ((fp = filters[idx]) != NULL) {
4254 			/* 'for' loop 2: */
4255 			for (; fp != NULL; fp = fp->f_next) {
4256 				switch (idx) {
4257 				case FK_AF:
4258 					if (fp->u.f_family != AF_INET)
4259 						continue; /* 'for' loop 2 */
4260 					break;
4261 				case FK_OUTIF:
4262 					if (!dev_name_match(&rp->ipRouteIfIndex,
4263 					    fp->u.f_ifname))
4264 						continue; /* 'for' loop 2 */
4265 					break;
4266 				case FK_DST:
4267 					if (!v4_addr_match(rp->ipRouteDest,
4268 					    rp->ipRouteMask, fp))
4269 						continue; /* 'for' loop 2 */
4270 					break;
4271 				case FK_FLAGS:
4272 					if ((flag_b & fp->u.f.f_flagset) !=
4273 					    fp->u.f.f_flagset ||
4274 					    (flag_b & fp->u.f.f_flagclear))
4275 						continue; /* 'for' loop 2 */
4276 					break;
4277 				}
4278 				break;
4279 			} /* 'for' loop 2 ends */
4280 			if (fp == NULL)
4281 				return (B_FALSE);
4282 		}
4283 	/* 'for' loop 1 ends */
4284 	return (B_TRUE);
4285 }
4286 
4287 /*
4288  * Given an IPv4 MIB2 route entry, form the list of flags for the
4289  * route.
4290  */
4291 static uint_t
4292 form_v4_route_flags(const mib2_ipRouteEntry_t *rp, char *flags)
4293 {
4294 	uint_t flag_b;
4295 
4296 	flag_b = FLF_U;
4297 	(void) strcpy(flags, "U");
4298 	/* RTF_INDIRECT wins over RTF_GATEWAY - don't display both */
4299 	if (rp->ipRouteInfo.re_flags & RTF_INDIRECT) {
4300 		(void) strcat(flags, "I");
4301 		flag_b |= FLF_I;
4302 	} else if (rp->ipRouteInfo.re_ire_type & IRE_OFFLINK) {
4303 		(void) strcat(flags, "G");
4304 		flag_b |= FLF_G;
4305 	}
4306 	/* IRE_IF_CLONE wins over RTF_HOST - don't display both */
4307 	if (rp->ipRouteInfo.re_ire_type & IRE_IF_CLONE) {
4308 		(void) strcat(flags, "C");
4309 		flag_b |= FLF_C;
4310 	} else if (rp->ipRouteMask == IP_HOST_MASK) {
4311 		(void) strcat(flags, "H");
4312 		flag_b |= FLF_H;
4313 	}
4314 	if (rp->ipRouteInfo.re_flags & RTF_DYNAMIC) {
4315 		(void) strcat(flags, "D");
4316 		flag_b |= FLF_D;
4317 	}
4318 	if (rp->ipRouteInfo.re_ire_type == IRE_BROADCAST) {	/* Broadcast */
4319 		(void) strcat(flags, "b");
4320 		flag_b |= FLF_b;
4321 	}
4322 	if (rp->ipRouteInfo.re_ire_type == IRE_LOCAL) {		/* Local */
4323 		(void) strcat(flags, "L");
4324 		flag_b |= FLF_L;
4325 	}
4326 	if (rp->ipRouteInfo.re_flags & RTF_MULTIRT) {
4327 		(void) strcat(flags, "M");			/* Multiroute */
4328 		flag_b |= FLF_M;
4329 	}
4330 	if (rp->ipRouteInfo.re_flags & RTF_SETSRC) {
4331 		(void) strcat(flags, "S");			/* Setsrc */
4332 		flag_b |= FLF_S;
4333 	}
4334 	if (rp->ipRouteInfo.re_flags & RTF_REJECT) {
4335 		(void) strcat(flags, "R");
4336 		flag_b |= FLF_R;
4337 	}
4338 	if (rp->ipRouteInfo.re_flags & RTF_BLACKHOLE) {
4339 		(void) strcat(flags, "B");
4340 		flag_b |= FLF_B;
4341 	}
4342 	if (rp->ipRouteInfo.re_flags & RTF_ZONE) {
4343 		(void) strcat(flags, "Z");
4344 		flag_b |= FLF_Z;
4345 	}
4346 	return (flag_b);
4347 }
4348 
4349 static const char ire_hdr_v4[] =
4350 "\n%s Table: IPv4\n";
4351 static const char ire_hdr_v4_compat[] =
4352 "\n%s Table:\n";
4353 static const char ire_hdr_v4_verbose[] =
4354 "  Destination             Mask           Gateway          Device "
4355 " MTU  Ref Flg  Out  In/Fwd %s\n"
4356 "-------------------- --------------- -------------------- ------ "
4357 "----- --- --- ----- ------ %s\n";
4358 
4359 static const char ire_hdr_v4_normal[] =
4360 "  Destination           Gateway           Flags  Ref     Use     Interface"
4361 " %s\n-------------------- -------------------- ----- ----- ---------- "
4362 "--------- %s\n";
4363 
4364 static boolean_t
4365 ire_report_item_v4(const mib2_ipRouteEntry_t *rp, boolean_t first,
4366     const sec_attr_list_t *attrs)
4367 {
4368 	char			dstbuf[MAXHOSTNAMELEN + 1];
4369 	char			maskbuf[MAXHOSTNAMELEN + 1];
4370 	char			gwbuf[MAXHOSTNAMELEN + 1];
4371 	char			ifname[LIFNAMSIZ + 1];
4372 	char			flags[10];	/* RTF_ flags */
4373 	uint_t			flag_b;
4374 
4375 	if (!(Aflag || (rp->ipRouteInfo.re_ire_type != IRE_IF_CLONE &&
4376 	    rp->ipRouteInfo.re_ire_type != IRE_BROADCAST &&
4377 	    rp->ipRouteInfo.re_ire_type != IRE_MULTICAST &&
4378 	    rp->ipRouteInfo.re_ire_type != IRE_NOROUTE &&
4379 	    rp->ipRouteInfo.re_ire_type != IRE_LOCAL))) {
4380 		return (first);
4381 	}
4382 
4383 	flag_b = form_v4_route_flags(rp, flags);
4384 
4385 	if (!ire_filter_match_v4(rp, flag_b))
4386 		return (first);
4387 
4388 	if (first) {
4389 		(void) printf(v4compat ? ire_hdr_v4_compat : ire_hdr_v4,
4390 		    Vflag ? "IRE" : "Routing");
4391 		(void) printf(Vflag ? ire_hdr_v4_verbose : ire_hdr_v4_normal,
4392 		    RSECflag ? "  Gateway security attributes  " : "",
4393 		    RSECflag ? "-------------------------------" : "");
4394 		first = B_FALSE;
4395 	}
4396 
4397 	if (flag_b & FLF_H) {
4398 		(void) pr_addr(rp->ipRouteDest, dstbuf, sizeof (dstbuf));
4399 	} else {
4400 		(void) pr_net(rp->ipRouteDest, rp->ipRouteMask,
4401 		    dstbuf, sizeof (dstbuf));
4402 	}
4403 	if (Vflag) {
4404 		(void) printf("%-20s %-15s %-20s %-6s %5u %3u "
4405 		    "%-4s%6u %6u %s\n",
4406 		    dstbuf,
4407 		    pr_mask(rp->ipRouteMask, maskbuf, sizeof (maskbuf)),
4408 		    pr_addrnz(rp->ipRouteNextHop, gwbuf, sizeof (gwbuf)),
4409 		    octetstr(&rp->ipRouteIfIndex, 'a', ifname, sizeof (ifname)),
4410 		    rp->ipRouteInfo.re_max_frag,
4411 		    rp->ipRouteInfo.re_ref,
4412 		    flags,
4413 		    rp->ipRouteInfo.re_obpkt,
4414 		    rp->ipRouteInfo.re_ibpkt,
4415 		    pr_secattr(attrs));
4416 	} else {
4417 		(void) printf("%-20s %-20s %-5s  %4u %10u %-9s %s\n",
4418 		    dstbuf,
4419 		    pr_addrnz(rp->ipRouteNextHop, gwbuf, sizeof (gwbuf)),
4420 		    flags,
4421 		    rp->ipRouteInfo.re_ref,
4422 		    rp->ipRouteInfo.re_obpkt + rp->ipRouteInfo.re_ibpkt,
4423 		    octetstr(&rp->ipRouteIfIndex, 'a',
4424 		    ifname, sizeof (ifname)),
4425 		    pr_secattr(attrs));
4426 	}
4427 	return (first);
4428 }
4429 
4430 /*
4431  * Match a user-supplied IP address list against an IPv6 route entry.
4432  * If the user specified "any," then any non-zero address matches.  If
4433  * the user specified "none," then only the zero address matches.  If
4434  * the user specified a subnet mask length, then use that in matching
4435  * routes (select routes that are at least as specific).  If the user
4436  * specified only an address, then use the route's mask (select routes
4437  * that would match that address).  IPv4 addresses are ignored.
4438  */
4439 static boolean_t
4440 v6_addr_match(const Ip6Address *addr, int masklen, const filter_t *fp)
4441 {
4442 	const uint8_t *ucp;
4443 	int fmasklen;
4444 	int i;
4445 	char **app;
4446 	const uint8_t *aptr;
4447 
4448 	if (fp->u.a.f_address == NULL) {
4449 		if (IN6_IS_ADDR_UNSPECIFIED(&fp->u.a.f_mask))	/* any */
4450 			return (!IN6_IS_ADDR_UNSPECIFIED(addr));
4451 		return (IN6_IS_ADDR_UNSPECIFIED(addr));		/* "none" */
4452 	}
4453 	fmasklen = 0;
4454 	/* 'for' loop 1a: */
4455 	for (ucp = fp->u.a.f_mask.s6_addr;
4456 	    ucp < fp->u.a.f_mask.s6_addr + sizeof (fp->u.a.f_mask.s6_addr);
4457 	    ucp++) {
4458 		if (*ucp != 0xff) {
4459 			if (*ucp != 0)
4460 				fmasklen += 9 - ffs(*ucp);
4461 			break; /* 'for' loop 1a */
4462 		}
4463 		fmasklen += 8;
4464 	} /* 'for' loop 1a ends */
4465 	if (fmasklen != IPV6_ABITS) {
4466 		if (fmasklen > masklen)
4467 			return (B_FALSE);
4468 		masklen = fmasklen;
4469 	}
4470 	/* 'for' loop 1b: */
4471 	for (app = fp->u.a.f_address->h_addr_list;
4472 	    (aptr = (uint8_t *)*app) != NULL; app++) {
4473 		/* LINTED: (note 1) */
4474 		if (IN6_IS_ADDR_V4MAPPED((in6_addr_t *)aptr))
4475 			continue; /* 'for' loop 1b */
4476 		ucp = addr->s6_addr;
4477 		for (i = masklen; i >= 8; i -= 8)
4478 			if (*ucp++ != *aptr++)
4479 				break; /* 'for' loop 1b */
4480 		if (i == 0 ||
4481 		    (i < 8 && ((*ucp ^ *aptr) & ~(0xff >> i)) == 0))
4482 			return (B_TRUE);
4483 	} /* 'for' loop 1b ends */
4484 	return (B_FALSE);
4485 }
4486 
4487 /*
4488  * Run through the filter list for an IPv6 MIB2 IRE.  For a given
4489  * type, if there's at least one filter and all filters of that type
4490  * fail to match, then the route doesn't match and isn't displayed.
4491  * If at least one matches, or none are specified, for each of the
4492  * types, then the route is selected and displayed.
4493  */
4494 static boolean_t
4495 ire_filter_match_v6(const mib2_ipv6RouteEntry_t *rp6, uint_t flag_b)
4496 {
4497 	filter_t *fp;
4498 	int idx;
4499 
4500 	/* 'for' loop 1: */
4501 	for (idx = 0; idx < NFILTERKEYS; idx++)
4502 		if ((fp = filters[idx]) != NULL) {
4503 			/* 'for' loop 2: */
4504 			for (; fp != NULL; fp = fp->f_next) {
4505 				switch (idx) {
4506 				case FK_AF:
4507 					if (fp->u.f_family != AF_INET6)
4508 						/* 'for' loop 2 */
4509 						continue;
4510 					break;
4511 				case FK_OUTIF:
4512 					if (!dev_name_match(&rp6->
4513 					    ipv6RouteIfIndex, fp->u.f_ifname))
4514 						/* 'for' loop 2 */
4515 						continue;
4516 					break;
4517 				case FK_DST:
4518 					if (!v6_addr_match(&rp6->ipv6RouteDest,
4519 					    rp6->ipv6RoutePfxLength, fp))
4520 						/* 'for' loop 2 */
4521 						continue;
4522 					break;
4523 				case FK_FLAGS:
4524 					if ((flag_b & fp->u.f.f_flagset) !=
4525 					    fp->u.f.f_flagset ||
4526 					    (flag_b & fp->u.f.f_flagclear))
4527 						/* 'for' loop 2 */
4528 						continue;
4529 					break;
4530 				}
4531 				break;
4532 			} /* 'for' loop 2 ends */
4533 			if (fp == NULL)
4534 				return (B_FALSE);
4535 		}
4536 	/* 'for' loop 1 ends */
4537 	return (B_TRUE);
4538 }
4539 
4540 /*
4541  * Given an IPv6 MIB2 route entry, form the list of flags for the
4542  * route.
4543  */
4544 static uint_t
4545 form_v6_route_flags(const mib2_ipv6RouteEntry_t *rp6, char *flags)
4546 {
4547 	uint_t flag_b;
4548 
4549 	flag_b = FLF_U;
4550 	(void) strcpy(flags, "U");
4551 	/* RTF_INDIRECT wins over RTF_GATEWAY - don't display both */
4552 	if (rp6->ipv6RouteInfo.re_flags & RTF_INDIRECT) {
4553 		(void) strcat(flags, "I");
4554 		flag_b |= FLF_I;
4555 	} else if (rp6->ipv6RouteInfo.re_ire_type & IRE_OFFLINK) {
4556 		(void) strcat(flags, "G");
4557 		flag_b |= FLF_G;
4558 	}
4559 
4560 	/* IRE_IF_CLONE wins over RTF_HOST - don't display both */
4561 	if (rp6->ipv6RouteInfo.re_ire_type & IRE_IF_CLONE) {
4562 		(void) strcat(flags, "C");
4563 		flag_b |= FLF_C;
4564 	} else if (rp6->ipv6RoutePfxLength == IPV6_ABITS) {
4565 		(void) strcat(flags, "H");
4566 		flag_b |= FLF_H;
4567 	}
4568 
4569 	if (rp6->ipv6RouteInfo.re_flags & RTF_DYNAMIC) {
4570 		(void) strcat(flags, "D");
4571 		flag_b |= FLF_D;
4572 	}
4573 	if (rp6->ipv6RouteInfo.re_ire_type == IRE_LOCAL) {	/* Local */
4574 		(void) strcat(flags, "L");
4575 		flag_b |= FLF_L;
4576 	}
4577 	if (rp6->ipv6RouteInfo.re_flags & RTF_MULTIRT) {
4578 		(void) strcat(flags, "M");			/* Multiroute */
4579 		flag_b |= FLF_M;
4580 	}
4581 	if (rp6->ipv6RouteInfo.re_flags & RTF_SETSRC) {
4582 		(void) strcat(flags, "S");			/* Setsrc */
4583 		flag_b |= FLF_S;
4584 	}
4585 	if (rp6->ipv6RouteInfo.re_flags & RTF_REJECT) {
4586 		(void) strcat(flags, "R");
4587 		flag_b |= FLF_R;
4588 	}
4589 	if (rp6->ipv6RouteInfo.re_flags & RTF_BLACKHOLE) {
4590 		(void) strcat(flags, "B");
4591 		flag_b |= FLF_B;
4592 	}
4593 	if (rp6->ipv6RouteInfo.re_flags & RTF_ZONE) {
4594 		(void) strcat(flags, "Z");
4595 		flag_b |= FLF_Z;
4596 	}
4597 	return (flag_b);
4598 }
4599 
4600 static const char ire_hdr_v6[] =
4601 "\n%s Table: IPv6\n";
4602 static const char ire_hdr_v6_verbose[] =
4603 "  Destination/Mask            Gateway                    If    MTU  "
4604 "Ref Flags  Out   In/Fwd %s\n"
4605 "--------------------------- --------------------------- ----- ----- "
4606 "--- ----- ------ ------ %s\n";
4607 static const char ire_hdr_v6_normal[] =
4608 "  Destination/Mask            Gateway                   Flags Ref   Use  "
4609 "  If   %s\n"
4610 "--------------------------- --------------------------- ----- --- ------- "
4611 "----- %s\n";
4612 
4613 static boolean_t
4614 ire_report_item_v6(const mib2_ipv6RouteEntry_t *rp6, boolean_t first,
4615     const sec_attr_list_t *attrs)
4616 {
4617 	char			dstbuf[MAXHOSTNAMELEN + 1];
4618 	char			gwbuf[MAXHOSTNAMELEN + 1];
4619 	char			ifname[LIFNAMSIZ + 1];
4620 	char			flags[10];	/* RTF_ flags */
4621 	uint_t			flag_b;
4622 
4623 	if (!(Aflag || (rp6->ipv6RouteInfo.re_ire_type != IRE_IF_CLONE &&
4624 	    rp6->ipv6RouteInfo.re_ire_type != IRE_MULTICAST &&
4625 	    rp6->ipv6RouteInfo.re_ire_type != IRE_NOROUTE &&
4626 	    rp6->ipv6RouteInfo.re_ire_type != IRE_LOCAL))) {
4627 		return (first);
4628 	}
4629 
4630 	flag_b = form_v6_route_flags(rp6, flags);
4631 
4632 	if (!ire_filter_match_v6(rp6, flag_b))
4633 		return (first);
4634 
4635 	if (first) {
4636 		(void) printf(ire_hdr_v6, Vflag ? "IRE" : "Routing");
4637 		(void) printf(Vflag ? ire_hdr_v6_verbose : ire_hdr_v6_normal,
4638 		    RSECflag ? "  Gateway security attributes  " : "",
4639 		    RSECflag ? "-------------------------------" : "");
4640 		first = B_FALSE;
4641 	}
4642 
4643 	if (Vflag) {
4644 		(void) printf("%-27s %-27s %-5s %5u %3u "
4645 		    "%-5s %6u %6u %s\n",
4646 		    pr_prefix6(&rp6->ipv6RouteDest,
4647 		    rp6->ipv6RoutePfxLength, dstbuf, sizeof (dstbuf)),
4648 		    IN6_IS_ADDR_UNSPECIFIED(&rp6->ipv6RouteNextHop) ?
4649 		    "    --" :
4650 		    pr_addr6(&rp6->ipv6RouteNextHop, gwbuf, sizeof (gwbuf)),
4651 		    octetstr(&rp6->ipv6RouteIfIndex, 'a',
4652 		    ifname, sizeof (ifname)),
4653 		    rp6->ipv6RouteInfo.re_max_frag,
4654 		    rp6->ipv6RouteInfo.re_ref,
4655 		    flags,
4656 		    rp6->ipv6RouteInfo.re_obpkt,
4657 		    rp6->ipv6RouteInfo.re_ibpkt,
4658 		    pr_secattr(attrs));
4659 	} else {
4660 		(void) printf("%-27s %-27s %-5s %3u %7u %-5s %s\n",
4661 		    pr_prefix6(&rp6->ipv6RouteDest,
4662 		    rp6->ipv6RoutePfxLength, dstbuf, sizeof (dstbuf)),
4663 		    IN6_IS_ADDR_UNSPECIFIED(&rp6->ipv6RouteNextHop) ?
4664 		    "    --" :
4665 		    pr_addr6(&rp6->ipv6RouteNextHop, gwbuf, sizeof (gwbuf)),
4666 		    flags,
4667 		    rp6->ipv6RouteInfo.re_ref,
4668 		    rp6->ipv6RouteInfo.re_obpkt + rp6->ipv6RouteInfo.re_ibpkt,
4669 		    octetstr(&rp6->ipv6RouteIfIndex, 'a',
4670 		    ifname, sizeof (ifname)),
4671 		    pr_secattr(attrs));
4672 	}
4673 	return (first);
4674 }
4675 
4676 /*
4677  * Common attribute-gathering routine for all transports.
4678  */
4679 static mib2_transportMLPEntry_t **
4680 gather_attrs(const mib_item_t *item, int group, int mib_id, int esize)
4681 {
4682 	int transport_count = 0;
4683 	const mib_item_t *iptr;
4684 	mib2_transportMLPEntry_t **attrs, *tme;
4685 
4686 	for (iptr = item; iptr != NULL; iptr = iptr->next_item) {
4687 		if (iptr->group == group && iptr->mib_id == mib_id)
4688 			transport_count += iptr->length / esize;
4689 	}
4690 	if (transport_count <= 0)
4691 		return (NULL);
4692 	attrs = calloc(transport_count, sizeof (*attrs));
4693 	if (attrs == NULL) {
4694 		perror("gather_attrs calloc failed");
4695 		return (NULL);
4696 	}
4697 	for (iptr = item; iptr != NULL; iptr = iptr->next_item) {
4698 		if (iptr->group == group && iptr->mib_id == EXPER_XPORT_MLP) {
4699 			for (tme = iptr->valp;
4700 			    (char *)tme < (char *)iptr->valp + iptr->length;
4701 			    /* LINTED: (note 1) */
4702 			    tme = (mib2_transportMLPEntry_t *)((char *)tme +
4703 			    transportMLPSize)) {
4704 				attrs[tme->tme_connidx] = tme;
4705 			}
4706 		}
4707 	}
4708 	return (attrs);
4709 }
4710 
4711 static void
4712 print_transport_label(const mib2_transportMLPEntry_t *attr)
4713 {
4714 	if (!RSECflag || attr == NULL ||
4715 	    !(attr->tme_flags & MIB2_TMEF_IS_LABELED))
4716 		return;
4717 
4718 	if (bisinvalid(&attr->tme_label)) {
4719 		(void) printf("   INVALID\n");
4720 	} else if (!blequal(&attr->tme_label, zone_security_label)) {
4721 		char *sl_str;
4722 
4723 		sl_str = sl_to_str(&attr->tme_label);
4724 		(void) printf("   %s\n", sl_str);
4725 		free(sl_str);
4726 	}
4727 }
4728 
4729 /* ------------------------------ TCP_REPORT------------------------------- */
4730 
4731 static const char tcp_hdr_v4[] =
4732 "\nTCP: IPv4\n";
4733 static const char tcp_hdr_v4_compat[] =
4734 "\nTCP\n";
4735 static const char tcp_hdr_v4_verbose[] =
4736 "Local/Remote Address Swind  Snext     Suna   Rwind  Rnext     Rack   "
4737 " Rto   Mss     State\n"
4738 "-------------------- ----- -------- -------- ----- -------- -------- "
4739 "----- ----- -----------\n";
4740 static const char tcp_hdr_v4_normal[] =
4741 "   Local Address        Remote Address    Swind Send-Q Rwind Recv-Q "
4742 "   State\n"
4743 "-------------------- -------------------- ----- ------ ----- ------ "
4744 "-----------\n";
4745 
4746 static const char tcp_hdr_v6[] =
4747 "\nTCP: IPv6\n";
4748 static const char tcp_hdr_v6_verbose[] =
4749 "Local/Remote Address              Swind  Snext     Suna   Rwind  Rnext   "
4750 "  Rack    Rto   Mss    State      If\n"
4751 "--------------------------------- ----- -------- -------- ----- -------- "
4752 "-------- ----- ----- ----------- -----\n";
4753 static const char tcp_hdr_v6_normal[] =
4754 "   Local Address                     Remote Address                 "
4755 "Swind Send-Q Rwind Recv-Q   State      If\n"
4756 "--------------------------------- --------------------------------- "
4757 "----- ------ ----- ------ ----------- -----\n";
4758 
4759 static boolean_t tcp_report_item_v4(const mib2_tcpConnEntry_t *,
4760     boolean_t first, const mib2_transportMLPEntry_t *);
4761 static boolean_t tcp_report_item_v6(const mib2_tcp6ConnEntry_t *,
4762     boolean_t first, const mib2_transportMLPEntry_t *);
4763 
4764 static void
4765 tcp_report(const mib_item_t *item)
4766 {
4767 	int			jtemp = 0;
4768 	boolean_t		print_hdr_once_v4 = B_TRUE;
4769 	boolean_t		print_hdr_once_v6 = B_TRUE;
4770 	mib2_tcpConnEntry_t	*tp;
4771 	mib2_tcp6ConnEntry_t	*tp6;
4772 	mib2_transportMLPEntry_t **v4_attrs, **v6_attrs;
4773 	mib2_transportMLPEntry_t **v4a, **v6a;
4774 	mib2_transportMLPEntry_t *aptr;
4775 
4776 	if (!protocol_selected(IPPROTO_TCP))
4777 		return;
4778 
4779 	/*
4780 	 * Preparation pass: the kernel returns separate entries for TCP
4781 	 * connection table entries and Multilevel Port attributes.  We loop
4782 	 * through the attributes first and set up an array for each address
4783 	 * family.
4784 	 */
4785 	v4_attrs = family_selected(AF_INET) && RSECflag ?
4786 	    gather_attrs(item, MIB2_TCP, MIB2_TCP_CONN, tcpConnEntrySize) :
4787 	    NULL;
4788 	v6_attrs = family_selected(AF_INET6) && RSECflag ?
4789 	    gather_attrs(item, MIB2_TCP6, MIB2_TCP6_CONN, tcp6ConnEntrySize) :
4790 	    NULL;
4791 
4792 	/* 'for' loop 1: */
4793 	v4a = v4_attrs;
4794 	v6a = v6_attrs;
4795 	for (; item != NULL; item = item->next_item) {
4796 		if (Xflag) {
4797 			(void) printf("\n--- Entry %d ---\n", ++jtemp);
4798 			(void) printf("Group = %d, mib_id = %d, "
4799 			    "length = %d, valp = 0x%p\n",
4800 			    item->group, item->mib_id,
4801 			    item->length, item->valp);
4802 		}
4803 
4804 		if (!((item->group == MIB2_TCP &&
4805 		    item->mib_id == MIB2_TCP_CONN) ||
4806 		    (item->group == MIB2_TCP6 &&
4807 		    item->mib_id == MIB2_TCP6_CONN)))
4808 			continue; /* 'for' loop 1 */
4809 
4810 		if (item->group == MIB2_TCP && !family_selected(AF_INET))
4811 			continue; /* 'for' loop 1 */
4812 		else if (item->group == MIB2_TCP6 && !family_selected(AF_INET6))
4813 			continue; /* 'for' loop 1 */
4814 
4815 		if (item->group == MIB2_TCP) {
4816 			for (tp = (mib2_tcpConnEntry_t *)item->valp;
4817 			    (char *)tp < (char *)item->valp + item->length;
4818 			    /* LINTED: (note 1) */
4819 			    tp = (mib2_tcpConnEntry_t *)((char *)tp +
4820 			    tcpConnEntrySize)) {
4821 				aptr = v4a == NULL ? NULL : *v4a++;
4822 				print_hdr_once_v4 = tcp_report_item_v4(tp,
4823 				    print_hdr_once_v4, aptr);
4824 			}
4825 		} else {
4826 			for (tp6 = (mib2_tcp6ConnEntry_t *)item->valp;
4827 			    (char *)tp6 < (char *)item->valp + item->length;
4828 			    /* LINTED: (note 1) */
4829 			    tp6 = (mib2_tcp6ConnEntry_t *)((char *)tp6 +
4830 			    tcp6ConnEntrySize)) {
4831 				aptr = v6a == NULL ? NULL : *v6a++;
4832 				print_hdr_once_v6 = tcp_report_item_v6(tp6,
4833 				    print_hdr_once_v6, aptr);
4834 			}
4835 		}
4836 	} /* 'for' loop 1 ends */
4837 	(void) fflush(stdout);
4838 
4839 	if (v4_attrs != NULL)
4840 		free(v4_attrs);
4841 	if (v6_attrs != NULL)
4842 		free(v6_attrs);
4843 }
4844 
4845 static boolean_t
4846 tcp_report_item_v4(const mib2_tcpConnEntry_t *tp, boolean_t first,
4847     const mib2_transportMLPEntry_t *attr)
4848 {
4849 	/*
4850 	 * lname and fname below are for the hostname as well as the portname
4851 	 * There is no limit on portname length so we assume MAXHOSTNAMELEN
4852 	 * as the limit
4853 	 */
4854 	char	lname[MAXHOSTNAMELEN + MAXHOSTNAMELEN + 1];
4855 	char	fname[MAXHOSTNAMELEN + MAXHOSTNAMELEN + 1];
4856 
4857 	if (!(Aflag || tp->tcpConnEntryInfo.ce_state >= TCPS_ESTABLISHED))
4858 		return (first); /* Nothing to print */
4859 
4860 	if (first) {
4861 		(void) printf(v4compat ? tcp_hdr_v4_compat : tcp_hdr_v4);
4862 		(void) printf(Vflag ? tcp_hdr_v4_verbose : tcp_hdr_v4_normal);
4863 	}
4864 
4865 	if (Vflag) {
4866 		(void) printf("%-20s\n%-20s %5u %08x %08x %5u %08x %08x "
4867 		    "%5u %5u %s\n",
4868 		    pr_ap(tp->tcpConnLocalAddress,
4869 		    tp->tcpConnLocalPort, "tcp", lname, sizeof (lname)),
4870 		    pr_ap(tp->tcpConnRemAddress,
4871 		    tp->tcpConnRemPort, "tcp", fname, sizeof (fname)),
4872 		    tp->tcpConnEntryInfo.ce_swnd,
4873 		    tp->tcpConnEntryInfo.ce_snxt,
4874 		    tp->tcpConnEntryInfo.ce_suna,
4875 		    tp->tcpConnEntryInfo.ce_rwnd,
4876 		    tp->tcpConnEntryInfo.ce_rnxt,
4877 		    tp->tcpConnEntryInfo.ce_rack,
4878 		    tp->tcpConnEntryInfo.ce_rto,
4879 		    tp->tcpConnEntryInfo.ce_mss,
4880 		    mitcp_state(tp->tcpConnEntryInfo.ce_state, attr));
4881 	} else {
4882 		int sq = (int)tp->tcpConnEntryInfo.ce_snxt -
4883 		    (int)tp->tcpConnEntryInfo.ce_suna - 1;
4884 		int rq = (int)tp->tcpConnEntryInfo.ce_rnxt -
4885 		    (int)tp->tcpConnEntryInfo.ce_rack;
4886 
4887 		(void) printf("%-20s %-20s %5u %6d %5u %6d %s\n",
4888 		    pr_ap(tp->tcpConnLocalAddress,
4889 		    tp->tcpConnLocalPort, "tcp", lname, sizeof (lname)),
4890 		    pr_ap(tp->tcpConnRemAddress,
4891 		    tp->tcpConnRemPort, "tcp", fname, sizeof (fname)),
4892 		    tp->tcpConnEntryInfo.ce_swnd,
4893 		    (sq >= 0) ? sq : 0,
4894 		    tp->tcpConnEntryInfo.ce_rwnd,
4895 		    (rq >= 0) ? rq : 0,
4896 		    mitcp_state(tp->tcpConnEntryInfo.ce_state, attr));
4897 	}
4898 
4899 	print_transport_label(attr);
4900 
4901 	return (B_FALSE);
4902 }
4903 
4904 static boolean_t
4905 tcp_report_item_v6(const mib2_tcp6ConnEntry_t *tp6, boolean_t first,
4906     const mib2_transportMLPEntry_t *attr)
4907 {
4908 	/*
4909 	 * lname and fname below are for the hostname as well as the portname
4910 	 * There is no limit on portname length so we assume MAXHOSTNAMELEN
4911 	 * as the limit
4912 	 */
4913 	char	lname[MAXHOSTNAMELEN + MAXHOSTNAMELEN + 1];
4914 	char	fname[MAXHOSTNAMELEN + MAXHOSTNAMELEN + 1];
4915 	char	ifname[LIFNAMSIZ + 1];
4916 	char	*ifnamep;
4917 
4918 	if (!(Aflag || tp6->tcp6ConnEntryInfo.ce_state >= TCPS_ESTABLISHED))
4919 		return (first); /* Nothing to print */
4920 
4921 	if (first) {
4922 		(void) printf(tcp_hdr_v6);
4923 		(void) printf(Vflag ? tcp_hdr_v6_verbose : tcp_hdr_v6_normal);
4924 	}
4925 
4926 	ifnamep = (tp6->tcp6ConnIfIndex != 0) ?
4927 	    if_indextoname(tp6->tcp6ConnIfIndex, ifname) : NULL;
4928 	if (ifnamep == NULL)
4929 		ifnamep = "";
4930 
4931 	if (Vflag) {
4932 		(void) printf("%-33s\n%-33s %5u %08x %08x %5u %08x %08x "
4933 		    "%5u %5u %-11s %s\n",
4934 		    pr_ap6(&tp6->tcp6ConnLocalAddress,
4935 		    tp6->tcp6ConnLocalPort, "tcp", lname, sizeof (lname)),
4936 		    pr_ap6(&tp6->tcp6ConnRemAddress,
4937 		    tp6->tcp6ConnRemPort, "tcp", fname, sizeof (fname)),
4938 		    tp6->tcp6ConnEntryInfo.ce_swnd,
4939 		    tp6->tcp6ConnEntryInfo.ce_snxt,
4940 		    tp6->tcp6ConnEntryInfo.ce_suna,
4941 		    tp6->tcp6ConnEntryInfo.ce_rwnd,
4942 		    tp6->tcp6ConnEntryInfo.ce_rnxt,
4943 		    tp6->tcp6ConnEntryInfo.ce_rack,
4944 		    tp6->tcp6ConnEntryInfo.ce_rto,
4945 		    tp6->tcp6ConnEntryInfo.ce_mss,
4946 		    mitcp_state(tp6->tcp6ConnEntryInfo.ce_state, attr),
4947 		    ifnamep);
4948 	} else {
4949 		int sq = (int)tp6->tcp6ConnEntryInfo.ce_snxt -
4950 		    (int)tp6->tcp6ConnEntryInfo.ce_suna - 1;
4951 		int rq = (int)tp6->tcp6ConnEntryInfo.ce_rnxt -
4952 		    (int)tp6->tcp6ConnEntryInfo.ce_rack;
4953 
4954 		(void) printf("%-33s %-33s %5u %6d %5u %6d %-11s %s\n",
4955 		    pr_ap6(&tp6->tcp6ConnLocalAddress,
4956 		    tp6->tcp6ConnLocalPort, "tcp", lname, sizeof (lname)),
4957 		    pr_ap6(&tp6->tcp6ConnRemAddress,
4958 		    tp6->tcp6ConnRemPort, "tcp", fname, sizeof (fname)),
4959 		    tp6->tcp6ConnEntryInfo.ce_swnd,
4960 		    (sq >= 0) ? sq : 0,
4961 		    tp6->tcp6ConnEntryInfo.ce_rwnd,
4962 		    (rq >= 0) ? rq : 0,
4963 		    mitcp_state(tp6->tcp6ConnEntryInfo.ce_state, attr),
4964 		    ifnamep);
4965 	}
4966 
4967 	print_transport_label(attr);
4968 
4969 	return (B_FALSE);
4970 }
4971 
4972 /* ------------------------------- UDP_REPORT------------------------------- */
4973 
4974 static boolean_t udp_report_item_v4(const mib2_udpEntry_t *ude,
4975     boolean_t first, const mib2_transportMLPEntry_t *attr);
4976 static boolean_t udp_report_item_v6(const mib2_udp6Entry_t *ude6,
4977     boolean_t first, const mib2_transportMLPEntry_t *attr);
4978 
4979 static const char udp_hdr_v4[] =
4980 "   Local Address        Remote Address      State\n"
4981 "-------------------- -------------------- ----------\n";
4982 
4983 static const char udp_hdr_v6[] =
4984 "   Local Address                     Remote Address                 "
4985 "  State      If\n"
4986 "--------------------------------- --------------------------------- "
4987 "---------- -----\n";
4988 
4989 static void
4990 udp_report(const mib_item_t *item)
4991 {
4992 	int			jtemp = 0;
4993 	boolean_t		print_hdr_once_v4 = B_TRUE;
4994 	boolean_t		print_hdr_once_v6 = B_TRUE;
4995 	mib2_udpEntry_t		*ude;
4996 	mib2_udp6Entry_t	*ude6;
4997 	mib2_transportMLPEntry_t **v4_attrs, **v6_attrs;
4998 	mib2_transportMLPEntry_t **v4a, **v6a;
4999 	mib2_transportMLPEntry_t *aptr;
5000 
5001 	if (!protocol_selected(IPPROTO_UDP))
5002 		return;
5003 
5004 	/*
5005 	 * Preparation pass: the kernel returns separate entries for UDP
5006 	 * connection table entries and Multilevel Port attributes.  We loop
5007 	 * through the attributes first and set up an array for each address
5008 	 * family.
5009 	 */
5010 	v4_attrs = family_selected(AF_INET) && RSECflag ?
5011 	    gather_attrs(item, MIB2_UDP, MIB2_UDP_ENTRY, udpEntrySize) : NULL;
5012 	v6_attrs = family_selected(AF_INET6) && RSECflag ?
5013 	    gather_attrs(item, MIB2_UDP6, MIB2_UDP6_ENTRY, udp6EntrySize) :
5014 	    NULL;
5015 
5016 	v4a = v4_attrs;
5017 	v6a = v6_attrs;
5018 	/* 'for' loop 1: */
5019 	for (; item; item = item->next_item) {
5020 		if (Xflag) {
5021 			(void) printf("\n--- Entry %d ---\n", ++jtemp);
5022 			(void) printf("Group = %d, mib_id = %d, "
5023 			    "length = %d, valp = 0x%p\n",
5024 			    item->group, item->mib_id,
5025 			    item->length, item->valp);
5026 		}
5027 		if (!((item->group == MIB2_UDP &&
5028 		    item->mib_id == MIB2_UDP_ENTRY) ||
5029 		    (item->group == MIB2_UDP6 &&
5030 		    item->mib_id == MIB2_UDP6_ENTRY)))
5031 			continue; /* 'for' loop 1 */
5032 
5033 		if (item->group == MIB2_UDP && !family_selected(AF_INET))
5034 			continue; /* 'for' loop 1 */
5035 		else if (item->group == MIB2_UDP6 && !family_selected(AF_INET6))
5036 			continue; /* 'for' loop 1 */
5037 
5038 		/*	xxx.xxx.xxx.xxx,pppp  sss... */
5039 		if (item->group == MIB2_UDP) {
5040 			for (ude = (mib2_udpEntry_t *)item->valp;
5041 			    (char *)ude < (char *)item->valp + item->length;
5042 			    /* LINTED: (note 1) */
5043 			    ude = (mib2_udpEntry_t *)((char *)ude +
5044 			    udpEntrySize)) {
5045 				aptr = v4a == NULL ? NULL : *v4a++;
5046 				print_hdr_once_v4 = udp_report_item_v4(ude,
5047 				    print_hdr_once_v4, aptr);
5048 			}
5049 		} else {
5050 			for (ude6 = (mib2_udp6Entry_t *)item->valp;
5051 			    (char *)ude6 < (char *)item->valp + item->length;
5052 			    /* LINTED: (note 1) */
5053 			    ude6 = (mib2_udp6Entry_t *)((char *)ude6 +
5054 			    udp6EntrySize)) {
5055 				aptr = v6a == NULL ? NULL : *v6a++;
5056 				print_hdr_once_v6 = udp_report_item_v6(ude6,
5057 				    print_hdr_once_v6, aptr);
5058 			}
5059 		}
5060 	} /* 'for' loop 1 ends */
5061 	(void) fflush(stdout);
5062 
5063 	if (v4_attrs != NULL)
5064 		free(v4_attrs);
5065 	if (v6_attrs != NULL)
5066 		free(v6_attrs);
5067 }
5068 
5069 static boolean_t
5070 udp_report_item_v4(const mib2_udpEntry_t *ude, boolean_t first,
5071     const mib2_transportMLPEntry_t *attr)
5072 {
5073 	char	lname[MAXHOSTNAMELEN + MAXHOSTNAMELEN + 1];
5074 			/* hostname + portname */
5075 
5076 	if (!(Aflag || ude->udpEntryInfo.ue_state >= MIB2_UDP_connected))
5077 		return (first); /* Nothing to print */
5078 
5079 	if (first) {
5080 		(void) printf(v4compat ? "\nUDP\n" : "\nUDP: IPv4\n");
5081 		(void) printf(udp_hdr_v4);
5082 		first = B_FALSE;
5083 	}
5084 
5085 	(void) printf("%-20s ",
5086 	    pr_ap(ude->udpLocalAddress, ude->udpLocalPort, "udp",
5087 	    lname, sizeof (lname)));
5088 	(void) printf("%-20s %s\n",
5089 	    ude->udpEntryInfo.ue_state == MIB2_UDP_connected ?
5090 	    pr_ap(ude->udpEntryInfo.ue_RemoteAddress,
5091 	    ude->udpEntryInfo.ue_RemotePort, "udp", lname, sizeof (lname)) :
5092 	    "",
5093 	    miudp_state(ude->udpEntryInfo.ue_state, attr));
5094 
5095 	print_transport_label(attr);
5096 
5097 	return (first);
5098 }
5099 
5100 static boolean_t
5101 udp_report_item_v6(const mib2_udp6Entry_t *ude6, boolean_t first,
5102     const mib2_transportMLPEntry_t *attr)
5103 {
5104 	char	lname[MAXHOSTNAMELEN + MAXHOSTNAMELEN + 1];
5105 			/* hostname + portname */
5106 	char	ifname[LIFNAMSIZ + 1];
5107 	const char *ifnamep;
5108 
5109 	if (!(Aflag || ude6->udp6EntryInfo.ue_state >= MIB2_UDP_connected))
5110 		return (first); /* Nothing to print */
5111 
5112 	if (first) {
5113 		(void) printf("\nUDP: IPv6\n");
5114 		(void) printf(udp_hdr_v6);
5115 		first = B_FALSE;
5116 	}
5117 
5118 	ifnamep = (ude6->udp6IfIndex != 0) ?
5119 	    if_indextoname(ude6->udp6IfIndex, ifname) : NULL;
5120 
5121 	(void) printf("%-33s ",
5122 	    pr_ap6(&ude6->udp6LocalAddress,
5123 	    ude6->udp6LocalPort, "udp", lname, sizeof (lname)));
5124 	(void) printf("%-33s %-10s %s\n",
5125 	    ude6->udp6EntryInfo.ue_state == MIB2_UDP_connected ?
5126 	    pr_ap6(&ude6->udp6EntryInfo.ue_RemoteAddress,
5127 	    ude6->udp6EntryInfo.ue_RemotePort, "udp", lname, sizeof (lname)) :
5128 	    "",
5129 	    miudp_state(ude6->udp6EntryInfo.ue_state, attr),
5130 	    ifnamep == NULL ? "" : ifnamep);
5131 
5132 	print_transport_label(attr);
5133 
5134 	return (first);
5135 }
5136 
5137 /* ------------------------------ SCTP_REPORT------------------------------- */
5138 
5139 static const char sctp_hdr[] =
5140 "\nSCTP:";
5141 static const char sctp_hdr_normal[] =
5142 "        Local Address                   Remote Address          "
5143 "Swind  Send-Q Rwind  Recv-Q StrsI/O  State\n"
5144 "------------------------------- ------------------------------- "
5145 "------ ------ ------ ------ ------- -----------";
5146 
5147 static const char *
5148 nssctp_state(int state, const mib2_transportMLPEntry_t *attr)
5149 {
5150 	static char sctpsbuf[50];
5151 	const char *cp;
5152 
5153 	switch (state) {
5154 	case MIB2_SCTP_closed:
5155 		cp = "CLOSED";
5156 		break;
5157 	case MIB2_SCTP_cookieWait:
5158 		cp = "COOKIE_WAIT";
5159 		break;
5160 	case MIB2_SCTP_cookieEchoed:
5161 		cp = "COOKIE_ECHOED";
5162 		break;
5163 	case MIB2_SCTP_established:
5164 		cp = "ESTABLISHED";
5165 		break;
5166 	case MIB2_SCTP_shutdownPending:
5167 		cp = "SHUTDOWN_PENDING";
5168 		break;
5169 	case MIB2_SCTP_shutdownSent:
5170 		cp = "SHUTDOWN_SENT";
5171 		break;
5172 	case MIB2_SCTP_shutdownReceived:
5173 		cp = "SHUTDOWN_RECEIVED";
5174 		break;
5175 	case MIB2_SCTP_shutdownAckSent:
5176 		cp = "SHUTDOWN_ACK_SENT";
5177 		break;
5178 	case MIB2_SCTP_listen:
5179 		cp = "LISTEN";
5180 		break;
5181 	default:
5182 		(void) snprintf(sctpsbuf, sizeof (sctpsbuf),
5183 		    "UNKNOWN STATE(%d)", state);
5184 		cp = sctpsbuf;
5185 		break;
5186 	}
5187 
5188 	if (RSECflag && attr != NULL && attr->tme_flags != 0) {
5189 		if (cp != sctpsbuf) {
5190 			(void) strlcpy(sctpsbuf, cp, sizeof (sctpsbuf));
5191 			cp = sctpsbuf;
5192 		}
5193 		if (attr->tme_flags & MIB2_TMEF_PRIVATE)
5194 			(void) strlcat(sctpsbuf, " P", sizeof (sctpsbuf));
5195 		if (attr->tme_flags & MIB2_TMEF_SHARED)
5196 			(void) strlcat(sctpsbuf, " S", sizeof (sctpsbuf));
5197 	}
5198 
5199 	return (cp);
5200 }
5201 
5202 static const mib2_sctpConnRemoteEntry_t *
5203 sctp_getnext_rem(const mib_item_t **itemp,
5204     const mib2_sctpConnRemoteEntry_t *current, uint32_t associd)
5205 {
5206 	const mib_item_t *item = *itemp;
5207 	const mib2_sctpConnRemoteEntry_t	*sre;
5208 
5209 	for (; item != NULL; item = item->next_item, current = NULL) {
5210 		if (!(item->group == MIB2_SCTP &&
5211 		    item->mib_id == MIB2_SCTP_CONN_REMOTE)) {
5212 			continue;
5213 		}
5214 
5215 		if (current != NULL) {
5216 			/* LINTED: (note 1) */
5217 			sre = (const mib2_sctpConnRemoteEntry_t *)
5218 			    ((const char *)current + sctpRemoteEntrySize);
5219 		} else {
5220 			sre = item->valp;
5221 		}
5222 		for (; (char *)sre < (char *)item->valp + item->length;
5223 		    /* LINTED: (note 1) */
5224 		    sre = (const mib2_sctpConnRemoteEntry_t *)
5225 		    ((const char *)sre + sctpRemoteEntrySize)) {
5226 			if (sre->sctpAssocId != associd) {
5227 				continue;
5228 			}
5229 			*itemp = item;
5230 			return (sre);
5231 		}
5232 	}
5233 	*itemp = NULL;
5234 	return (NULL);
5235 }
5236 
5237 static const mib2_sctpConnLocalEntry_t *
5238 sctp_getnext_local(const mib_item_t **itemp,
5239     const mib2_sctpConnLocalEntry_t *current, uint32_t associd)
5240 {
5241 	const mib_item_t *item = *itemp;
5242 	const mib2_sctpConnLocalEntry_t	*sle;
5243 
5244 	for (; item != NULL; item = item->next_item, current = NULL) {
5245 		if (!(item->group == MIB2_SCTP &&
5246 		    item->mib_id == MIB2_SCTP_CONN_LOCAL)) {
5247 			continue;
5248 		}
5249 
5250 		if (current != NULL) {
5251 			/* LINTED: (note 1) */
5252 			sle = (const mib2_sctpConnLocalEntry_t *)
5253 			    ((const char *)current + sctpLocalEntrySize);
5254 		} else {
5255 			sle = item->valp;
5256 		}
5257 		for (; (char *)sle < (char *)item->valp + item->length;
5258 		    /* LINTED: (note 1) */
5259 		    sle = (const mib2_sctpConnLocalEntry_t *)
5260 		    ((const char *)sle + sctpLocalEntrySize)) {
5261 			if (sle->sctpAssocId != associd) {
5262 				continue;
5263 			}
5264 			*itemp = item;
5265 			return (sle);
5266 		}
5267 	}
5268 	*itemp = NULL;
5269 	return (NULL);
5270 }
5271 
5272 static void
5273 sctp_pr_addr(int type, char *name, int namelen, const in6_addr_t *addr,
5274     int port)
5275 {
5276 	ipaddr_t	v4addr;
5277 	in6_addr_t	v6addr;
5278 
5279 	/*
5280 	 * Address is either a v4 mapped or v6 addr. If
5281 	 * it's a v4 mapped, convert to v4 before
5282 	 * displaying.
5283 	 */
5284 	switch (type) {
5285 	case MIB2_SCTP_ADDR_V4:
5286 		/* v4 */
5287 		v6addr = *addr;
5288 
5289 		IN6_V4MAPPED_TO_IPADDR(&v6addr, v4addr);
5290 		if (port > 0) {
5291 			(void) pr_ap(v4addr, port, "sctp", name, namelen);
5292 		} else {
5293 			(void) pr_addr(v4addr, name, namelen);
5294 		}
5295 		break;
5296 
5297 	case MIB2_SCTP_ADDR_V6:
5298 		/* v6 */
5299 		if (port > 0) {
5300 			(void) pr_ap6(addr, port, "sctp", name, namelen);
5301 		} else {
5302 			(void) pr_addr6(addr, name, namelen);
5303 		}
5304 		break;
5305 
5306 	default:
5307 		(void) snprintf(name, namelen, "<unknown addr type>");
5308 		break;
5309 	}
5310 }
5311 
5312 static void
5313 sctp_conn_report_item(const mib_item_t *head, const mib2_sctpConnEntry_t *sp,
5314     const mib2_transportMLPEntry_t *attr)
5315 {
5316 	char		lname[MAXHOSTNAMELEN + MAXHOSTNAMELEN + 1];
5317 	char		fname[MAXHOSTNAMELEN + MAXHOSTNAMELEN + 1];
5318 	const mib2_sctpConnRemoteEntry_t	*sre = NULL;
5319 	const mib2_sctpConnLocalEntry_t	*sle = NULL;
5320 	const mib_item_t *local = head;
5321 	const mib_item_t *remote = head;
5322 	uint32_t	id = sp->sctpAssocId;
5323 	boolean_t	printfirst = B_TRUE;
5324 
5325 	sctp_pr_addr(sp->sctpAssocRemPrimAddrType, fname, sizeof (fname),
5326 	    &sp->sctpAssocRemPrimAddr, sp->sctpAssocRemPort);
5327 	sctp_pr_addr(sp->sctpAssocRemPrimAddrType, lname, sizeof (lname),
5328 	    &sp->sctpAssocLocPrimAddr, sp->sctpAssocLocalPort);
5329 
5330 	(void) printf("%-31s %-31s %6u %6d %6u %6d %3d/%-3d %s\n",
5331 	    lname, fname,
5332 	    sp->sctpConnEntryInfo.ce_swnd,
5333 	    sp->sctpConnEntryInfo.ce_sendq,
5334 	    sp->sctpConnEntryInfo.ce_rwnd,
5335 	    sp->sctpConnEntryInfo.ce_recvq,
5336 	    sp->sctpAssocInStreams, sp->sctpAssocOutStreams,
5337 	    nssctp_state(sp->sctpAssocState, attr));
5338 
5339 	print_transport_label(attr);
5340 
5341 	if (!Vflag) {
5342 		return;
5343 	}
5344 
5345 	/* Print remote addresses/local addresses on following lines */
5346 	while ((sre = sctp_getnext_rem(&remote, sre, id)) != NULL) {
5347 		if (!IN6_ARE_ADDR_EQUAL(&sre->sctpAssocRemAddr,
5348 		    &sp->sctpAssocRemPrimAddr)) {
5349 			if (printfirst == B_TRUE) {
5350 				(void) fputs("\t<Remote: ", stdout);
5351 				printfirst = B_FALSE;
5352 			} else {
5353 				(void) fputs(", ", stdout);
5354 			}
5355 			sctp_pr_addr(sre->sctpAssocRemAddrType, fname,
5356 			    sizeof (fname), &sre->sctpAssocRemAddr, -1);
5357 			if (sre->sctpAssocRemAddrActive == MIB2_SCTP_ACTIVE) {
5358 				(void) fputs(fname, stdout);
5359 			} else {
5360 				(void) printf("(%s)", fname);
5361 			}
5362 		}
5363 	}
5364 	if (printfirst == B_FALSE) {
5365 		(void) puts(">");
5366 		printfirst = B_TRUE;
5367 	}
5368 	while ((sle = sctp_getnext_local(&local, sle, id)) != NULL) {
5369 		if (!IN6_ARE_ADDR_EQUAL(&sle->sctpAssocLocalAddr,
5370 		    &sp->sctpAssocLocPrimAddr)) {
5371 			if (printfirst == B_TRUE) {
5372 				(void) fputs("\t<Local: ", stdout);
5373 				printfirst = B_FALSE;
5374 			} else {
5375 				(void) fputs(", ", stdout);
5376 			}
5377 			sctp_pr_addr(sle->sctpAssocLocalAddrType, lname,
5378 			    sizeof (lname), &sle->sctpAssocLocalAddr, -1);
5379 			(void) fputs(lname, stdout);
5380 		}
5381 	}
5382 	if (printfirst == B_FALSE) {
5383 		(void) puts(">");
5384 	}
5385 }
5386 
5387 static void
5388 sctp_report(const mib_item_t *item)
5389 {
5390 	const mib_item_t		*head;
5391 	const mib2_sctpConnEntry_t	*sp;
5392 	boolean_t		first = B_TRUE;
5393 	mib2_transportMLPEntry_t **attrs, **aptr;
5394 	mib2_transportMLPEntry_t *attr;
5395 
5396 	/*
5397 	 * Preparation pass: the kernel returns separate entries for SCTP
5398 	 * connection table entries and Multilevel Port attributes.  We loop
5399 	 * through the attributes first and set up an array for each address
5400 	 * family.
5401 	 */
5402 	attrs = RSECflag ?
5403 	    gather_attrs(item, MIB2_SCTP, MIB2_SCTP_CONN, sctpEntrySize) :
5404 	    NULL;
5405 
5406 	aptr = attrs;
5407 	head = item;
5408 	for (; item != NULL; item = item->next_item) {
5409 
5410 		if (!(item->group == MIB2_SCTP &&
5411 		    item->mib_id == MIB2_SCTP_CONN))
5412 			continue;
5413 
5414 		for (sp = item->valp;
5415 		    (char *)sp < (char *)item->valp + item->length;
5416 		    /* LINTED: (note 1) */
5417 		    sp = (mib2_sctpConnEntry_t *)((char *)sp + sctpEntrySize)) {
5418 			attr = aptr == NULL ? NULL : *aptr++;
5419 			if (Aflag ||
5420 			    sp->sctpAssocState >= MIB2_SCTP_established) {
5421 				if (first == B_TRUE) {
5422 					(void) puts(sctp_hdr);
5423 					(void) puts(sctp_hdr_normal);
5424 					first = B_FALSE;
5425 				}
5426 				sctp_conn_report_item(head, sp, attr);
5427 			}
5428 		}
5429 	}
5430 	if (attrs != NULL)
5431 		free(attrs);
5432 }
5433 
5434 static char *
5435 plural(int n)
5436 {
5437 	return (n != 1 ? "s" : "");
5438 }
5439 
5440 static char *
5441 pluraly(int n)
5442 {
5443 	return (n != 1 ? "ies" : "y");
5444 }
5445 
5446 static char *
5447 plurales(int n)
5448 {
5449 	return (n != 1 ? "es" : "");
5450 }
5451 
5452 static char *
5453 pktscale(n)
5454 	int n;
5455 {
5456 	static char buf[6];
5457 	char t;
5458 
5459 	if (n < 1024) {
5460 		t = ' ';
5461 	} else if (n < 1024 * 1024) {
5462 		t = 'k';
5463 		n /= 1024;
5464 	} else if (n < 1024 * 1024 * 1024) {
5465 		t = 'm';
5466 		n /= 1024 * 1024;
5467 	} else {
5468 		t = 'g';
5469 		n /= 1024 * 1024 * 1024;
5470 	}
5471 
5472 	(void) snprintf(buf, sizeof (buf), "%4u%c", n, t);
5473 	return (buf);
5474 }
5475 
5476 /* --------------------- mrt_report (netstat -m) -------------------------- */
5477 
5478 static void
5479 mrt_report(mib_item_t *item)
5480 {
5481 	int		jtemp = 0;
5482 	struct vifctl	*vip;
5483 	vifi_t		vifi;
5484 	struct mfcctl	*mfccp;
5485 	int		numvifs = 0;
5486 	int		nmfc = 0;
5487 	char		abuf[MAXHOSTNAMELEN + 1];
5488 
5489 	if (!(family_selected(AF_INET)))
5490 		return;
5491 
5492 	/* 'for' loop 1: */
5493 	for (; item; item = item->next_item) {
5494 		if (Xflag) {
5495 			(void) printf("\n--- Entry %d ---\n", ++jtemp);
5496 			(void) printf("Group = %d, mib_id = %d, "
5497 			    "length = %d, valp = 0x%p\n",
5498 			    item->group, item->mib_id, item->length,
5499 			    item->valp);
5500 		}
5501 		if (item->group != EXPER_DVMRP)
5502 			continue; /* 'for' loop 1 */
5503 
5504 		switch (item->mib_id) {
5505 
5506 		case EXPER_DVMRP_VIF:
5507 			if (Xflag)
5508 				(void) printf("%u records for ipVifTable:\n",
5509 				    item->length/sizeof (struct vifctl));
5510 			if (item->length/sizeof (struct vifctl) == 0) {
5511 				(void) puts("\nVirtual Interface Table is "
5512 				    "empty");
5513 				break;
5514 			}
5515 
5516 			(void) puts("\nVirtual Interface Table\n"
5517 			    " Vif Threshold Rate_Limit Local-Address"
5518 			    "   Remote-Address     Pkt_in   Pkt_out");
5519 
5520 			/* 'for' loop 2: */
5521 			for (vip = (struct vifctl *)item->valp;
5522 			    (char *)vip < (char *)item->valp + item->length;
5523 			    /* LINTED: (note 1) */
5524 			    vip = (struct vifctl *)((char *)vip +
5525 			    vifctlSize)) {
5526 				if (vip->vifc_lcl_addr.s_addr == 0)
5527 					continue; /* 'for' loop 2 */
5528 				/* numvifs = vip->vifc_vifi; */
5529 
5530 				numvifs++;
5531 				(void) printf("  %2u       %3u       "
5532 				    "%4u %-15.15s",
5533 				    vip->vifc_vifi,
5534 				    vip->vifc_threshold,
5535 				    vip->vifc_rate_limit,
5536 				    pr_addr(vip->vifc_lcl_addr.s_addr,
5537 				    abuf, sizeof (abuf)));
5538 				(void) printf(" %-15.15s  %8u  %8u\n",
5539 				    (vip->vifc_flags & VIFF_TUNNEL) ?
5540 				    pr_addr(vip->vifc_rmt_addr.s_addr,
5541 				    abuf, sizeof (abuf)) : "",
5542 				    vip->vifc_pkt_in,
5543 				    vip->vifc_pkt_out);
5544 			} /* 'for' loop 2 ends */
5545 
5546 			(void) printf("Numvifs: %d\n", numvifs);
5547 			break;
5548 
5549 		case EXPER_DVMRP_MRT:
5550 			if (Xflag)
5551 				(void) printf("%u records for ipMfcTable:\n",
5552 				    item->length/sizeof (struct vifctl));
5553 			if (item->length/sizeof (struct vifctl) == 0) {
5554 				(void) puts("\nMulticast Forwarding Cache is "
5555 				    "empty");
5556 				break;
5557 			}
5558 
5559 			(void) puts("\nMulticast Forwarding Cache\n"
5560 			    "  Origin-Subnet                 Mcastgroup      "
5561 			    "# Pkts  In-Vif  Out-vifs/Forw-ttl");
5562 
5563 			for (mfccp = (struct mfcctl *)item->valp;
5564 			    (char *)mfccp < (char *)item->valp + item->length;
5565 			    /* LINTED: (note 1) */
5566 			    mfccp = (struct mfcctl *)((char *)mfccp +
5567 			    mfcctlSize)) {
5568 
5569 				nmfc++;
5570 				(void) printf("  %-30.15s",
5571 				    pr_addr(mfccp->mfcc_origin.s_addr,
5572 				    abuf, sizeof (abuf)));
5573 				(void) printf("%-15.15s  %6s  %3u    ",
5574 				    pr_net(mfccp->mfcc_mcastgrp.s_addr,
5575 				    mfccp->mfcc_mcastgrp.s_addr,
5576 				    abuf, sizeof (abuf)),
5577 				    pktscale((int)mfccp->mfcc_pkt_cnt),
5578 				    mfccp->mfcc_parent);
5579 
5580 				for (vifi = 0; vifi < MAXVIFS; ++vifi) {
5581 					if (mfccp->mfcc_ttls[vifi]) {
5582 						(void) printf("      %u (%u)",
5583 						    vifi,
5584 						    mfccp->mfcc_ttls[vifi]);
5585 					}
5586 
5587 				}
5588 				(void) putchar('\n');
5589 			}
5590 			(void) printf("\nTotal no. of entries in cache: %d\n",
5591 			    nmfc);
5592 			break;
5593 		}
5594 	} /* 'for' loop 1 ends */
5595 	(void) putchar('\n');
5596 	(void) fflush(stdout);
5597 }
5598 
5599 /*
5600  * Get the stats for the cache named 'name'.  If prefix != 0, then
5601  * interpret the name as a prefix, and sum up stats for all caches
5602  * named 'name*'.
5603  */
5604 static void
5605 kmem_cache_stats(char *title, char *name, int prefix, int64_t *total_bytes)
5606 {
5607 	int len;
5608 	int alloc;
5609 	int64_t total_alloc = 0;
5610 	int alloc_fail, total_alloc_fail = 0;
5611 	int buf_size = 0;
5612 	int buf_avail;
5613 	int buf_total;
5614 	int buf_max, total_buf_max = 0;
5615 	int buf_inuse, total_buf_inuse = 0;
5616 	kstat_t *ksp;
5617 	char buf[256];
5618 
5619 	len = prefix ? strlen(name) : 256;
5620 
5621 	/* 'for' loop 1: */
5622 	for (ksp = kc->kc_chain; ksp != NULL; ksp = ksp->ks_next) {
5623 
5624 		if (strcmp(ksp->ks_class, "kmem_cache") != 0)
5625 			continue; /* 'for' loop 1 */
5626 
5627 		/*
5628 		 * Hack alert: because of the way streams messages are
5629 		 * allocated, every constructed free dblk has an associated
5630 		 * mblk.  From the allocator's viewpoint those mblks are
5631 		 * allocated (because they haven't been freed), but from
5632 		 * our viewpoint they're actually free (because they're
5633 		 * not currently in use).  To account for this caching
5634 		 * effect we subtract the total constructed free dblks
5635 		 * from the total allocated mblks to derive mblks in use.
5636 		 */
5637 		if (strcmp(name, "streams_mblk") == 0 &&
5638 		    strncmp(ksp->ks_name, "streams_dblk", 12) == 0) {
5639 			(void) safe_kstat_read(kc, ksp, NULL);
5640 			total_buf_inuse -=
5641 			    kstat_named_value(ksp, "buf_constructed");
5642 			continue; /* 'for' loop 1 */
5643 		}
5644 
5645 		if (strncmp(ksp->ks_name, name, len) != 0)
5646 			continue; /* 'for' loop 1 */
5647 
5648 		(void) safe_kstat_read(kc, ksp, NULL);
5649 
5650 		alloc		= kstat_named_value(ksp, "alloc");
5651 		alloc_fail	= kstat_named_value(ksp, "alloc_fail");
5652 		buf_size	= kstat_named_value(ksp, "buf_size");
5653 		buf_avail	= kstat_named_value(ksp, "buf_avail");
5654 		buf_total	= kstat_named_value(ksp, "buf_total");
5655 		buf_max		= kstat_named_value(ksp, "buf_max");
5656 		buf_inuse	= buf_total - buf_avail;
5657 
5658 		if (Vflag && prefix) {
5659 			(void) snprintf(buf, sizeof (buf), "%s%s", title,
5660 			    ksp->ks_name + len);
5661 			(void) printf("    %-18s %6u %9u %11u %11u\n",
5662 			    buf, buf_inuse, buf_max, alloc, alloc_fail);
5663 		}
5664 
5665 		total_alloc		+= alloc;
5666 		total_alloc_fail	+= alloc_fail;
5667 		total_buf_max		+= buf_max;
5668 		total_buf_inuse		+= buf_inuse;
5669 		*total_bytes		+= (int64_t)buf_inuse * buf_size;
5670 	} /* 'for' loop 1 ends */
5671 
5672 	if (buf_size == 0) {
5673 		(void) printf("%-22s [couldn't find statistics for %s]\n",
5674 		    title, name);
5675 		return;
5676 	}
5677 
5678 	if (Vflag && prefix)
5679 		(void) snprintf(buf, sizeof (buf), "%s_total", title);
5680 	else
5681 		(void) snprintf(buf, sizeof (buf), "%s", title);
5682 
5683 	(void) printf("%-22s %6d %9d %11lld %11d\n", buf,
5684 	    total_buf_inuse, total_buf_max, total_alloc, total_alloc_fail);
5685 }
5686 
5687 static void
5688 m_report(void)
5689 {
5690 	int64_t total_bytes = 0;
5691 
5692 	(void) puts("streams allocation:");
5693 	(void) printf("%63s\n", "cumulative  allocation");
5694 	(void) printf("%63s\n",
5695 	    "current   maximum       total    failures");
5696 
5697 	kmem_cache_stats("streams",
5698 	    "stream_head_cache", 0, &total_bytes);
5699 	kmem_cache_stats("queues", "queue_cache", 0, &total_bytes);
5700 	kmem_cache_stats("mblk", "streams_mblk", 0, &total_bytes);
5701 	kmem_cache_stats("dblk", "streams_dblk", 1, &total_bytes);
5702 	kmem_cache_stats("linkblk", "linkinfo_cache", 0, &total_bytes);
5703 	kmem_cache_stats("syncq", "syncq_cache", 0, &total_bytes);
5704 	kmem_cache_stats("qband", "qband_cache", 0, &total_bytes);
5705 
5706 	(void) printf("\n%lld Kbytes allocated for streams data\n",
5707 	    total_bytes / 1024);
5708 
5709 	(void) putchar('\n');
5710 	(void) fflush(stdout);
5711 }
5712 
5713 /* --------------------------------- */
5714 
5715 /*
5716  * Print an IPv4 address. Remove the matching part of the domain name
5717  * from the returned name.
5718  */
5719 static char *
5720 pr_addr(uint_t addr, char *dst, uint_t dstlen)
5721 {
5722 	char			*cp;
5723 	struct hostent		*hp = NULL;
5724 	static char		domain[MAXHOSTNAMELEN + 1];
5725 	static boolean_t	first = B_TRUE;
5726 	int			error_num;
5727 
5728 	if (first) {
5729 		first = B_FALSE;
5730 		if (sysinfo(SI_HOSTNAME, domain, MAXHOSTNAMELEN) != -1 &&
5731 		    (cp = strchr(domain, '.'))) {
5732 			(void) strncpy(domain, cp + 1, sizeof (domain));
5733 		} else
5734 			domain[0] = 0;
5735 	}
5736 	cp = NULL;
5737 	if (!Nflag) {
5738 		hp = getipnodebyaddr((char *)&addr, sizeof (uint_t), AF_INET,
5739 		    &error_num);
5740 		if (hp) {
5741 			if ((cp = strchr(hp->h_name, '.')) != NULL &&
5742 			    strcasecmp(cp + 1, domain) == 0)
5743 				*cp = 0;
5744 			cp = hp->h_name;
5745 		}
5746 	}
5747 	if (cp != NULL) {
5748 		(void) strncpy(dst, cp, dstlen);
5749 		dst[dstlen - 1] = 0;
5750 	} else {
5751 		(void) inet_ntop(AF_INET, (char *)&addr, dst, dstlen);
5752 	}
5753 	if (hp != NULL)
5754 		freehostent(hp);
5755 	return (dst);
5756 }
5757 
5758 /*
5759  * Print a non-zero IPv4 address.  Print "    --" if the address is zero.
5760  */
5761 static char *
5762 pr_addrnz(ipaddr_t addr, char *dst, uint_t dstlen)
5763 {
5764 	if (addr == INADDR_ANY) {
5765 		(void) strlcpy(dst, "    --", dstlen);
5766 		return (dst);
5767 	}
5768 	return (pr_addr(addr, dst, dstlen));
5769 }
5770 
5771 /*
5772  * Print an IPv6 address. Remove the matching part of the domain name
5773  * from the returned name.
5774  */
5775 static char *
5776 pr_addr6(const struct in6_addr *addr, char *dst, uint_t dstlen)
5777 {
5778 	char			*cp;
5779 	struct hostent		*hp = NULL;
5780 	static char		domain[MAXHOSTNAMELEN + 1];
5781 	static boolean_t	first = B_TRUE;
5782 	int			error_num;
5783 
5784 	if (first) {
5785 		first = B_FALSE;
5786 		if (sysinfo(SI_HOSTNAME, domain, MAXHOSTNAMELEN) != -1 &&
5787 		    (cp = strchr(domain, '.'))) {
5788 			(void) strncpy(domain, cp + 1, sizeof (domain));
5789 		} else
5790 			domain[0] = 0;
5791 	}
5792 	cp = NULL;
5793 	if (!Nflag) {
5794 		hp = getipnodebyaddr((char *)addr,
5795 		    sizeof (struct in6_addr), AF_INET6, &error_num);
5796 		if (hp) {
5797 			if ((cp = strchr(hp->h_name, '.')) != NULL &&
5798 			    strcasecmp(cp + 1, domain) == 0)
5799 				*cp = 0;
5800 			cp = hp->h_name;
5801 		}
5802 	}
5803 	if (cp != NULL) {
5804 		(void) strncpy(dst, cp, dstlen);
5805 		dst[dstlen - 1] = 0;
5806 	} else {
5807 		(void) inet_ntop(AF_INET6, (void *)addr, dst, dstlen);
5808 	}
5809 	if (hp != NULL)
5810 		freehostent(hp);
5811 	return (dst);
5812 }
5813 
5814 /* For IPv4 masks */
5815 static char *
5816 pr_mask(uint_t addr, char *dst, uint_t dstlen)
5817 {
5818 	uint8_t	*ip_addr = (uint8_t *)&addr;
5819 
5820 	(void) snprintf(dst, dstlen, "%d.%d.%d.%d",
5821 	    ip_addr[0], ip_addr[1], ip_addr[2], ip_addr[3]);
5822 	return (dst);
5823 }
5824 
5825 /*
5826  * For ipv6 masks format is : dest/mask
5827  * Does not print /128 to save space in printout. H flag carries this notion.
5828  */
5829 static char *
5830 pr_prefix6(const struct in6_addr *addr, uint_t prefixlen, char *dst,
5831     uint_t dstlen)
5832 {
5833 	char *cp;
5834 
5835 	if (IN6_IS_ADDR_UNSPECIFIED(addr) && prefixlen == 0) {
5836 		(void) strncpy(dst, "default", dstlen);
5837 		dst[dstlen - 1] = 0;
5838 		return (dst);
5839 	}
5840 
5841 	(void) pr_addr6(addr, dst, dstlen);
5842 	if (prefixlen != IPV6_ABITS) {
5843 		/* How much room is left? */
5844 		cp = strchr(dst, '\0');
5845 		if (dst + dstlen > cp) {
5846 			dstlen -= (cp - dst);
5847 			(void) snprintf(cp, dstlen, "/%d", prefixlen);
5848 		}
5849 	}
5850 	return (dst);
5851 }
5852 
5853 /* Print IPv4 address and port */
5854 static char *
5855 pr_ap(uint_t addr, uint_t port, char *proto,
5856     char *dst, uint_t dstlen)
5857 {
5858 	char *cp;
5859 
5860 	if (addr == INADDR_ANY) {
5861 		(void) strncpy(dst, "      *", dstlen);
5862 		dst[dstlen - 1] = 0;
5863 	} else {
5864 		(void) pr_addr(addr, dst, dstlen);
5865 	}
5866 	/* How much room is left? */
5867 	cp = strchr(dst, '\0');
5868 	if (dst + dstlen > cp + 1) {
5869 		*cp++ = '.';
5870 		dstlen -= (cp - dst);
5871 		dstlen--;
5872 		(void) portname(port, proto, cp, dstlen);
5873 	}
5874 	return (dst);
5875 }
5876 
5877 /* Print IPv6 address and port */
5878 static char *
5879 pr_ap6(const in6_addr_t *addr, uint_t port, char *proto,
5880     char *dst, uint_t dstlen)
5881 {
5882 	char *cp;
5883 
5884 	if (IN6_IS_ADDR_UNSPECIFIED(addr)) {
5885 		(void) strncpy(dst, "      *", dstlen);
5886 		dst[dstlen - 1] = 0;
5887 	} else {
5888 		(void) pr_addr6(addr, dst, dstlen);
5889 	}
5890 	/* How much room is left? */
5891 	cp = strchr(dst, '\0');
5892 	if (dst + dstlen + 1 > cp) {
5893 		*cp++ = '.';
5894 		dstlen -= (cp - dst);
5895 		dstlen--;
5896 		(void) portname(port, proto, cp, dstlen);
5897 	}
5898 	return (dst);
5899 }
5900 
5901 /*
5902  * Return the name of the network whose address is given. The address is
5903  * assumed to be that of a net or subnet, not a host.
5904  */
5905 static char *
5906 pr_net(uint_t addr, uint_t mask, char *dst, uint_t dstlen)
5907 {
5908 	char		*cp = NULL;
5909 	struct netent	*np = NULL;
5910 	struct hostent	*hp = NULL;
5911 	uint_t		net;
5912 	int		subnetshift;
5913 	int		error_num;
5914 
5915 	if (addr == INADDR_ANY && mask == INADDR_ANY) {
5916 		(void) strncpy(dst, "default", dstlen);
5917 		dst[dstlen - 1] = 0;
5918 		return (dst);
5919 	}
5920 
5921 	if (!Nflag && addr) {
5922 		if (mask == 0) {
5923 			if (IN_CLASSA(addr)) {
5924 				mask = (uint_t)IN_CLASSA_NET;
5925 				subnetshift = 8;
5926 			} else if (IN_CLASSB(addr)) {
5927 				mask = (uint_t)IN_CLASSB_NET;
5928 				subnetshift = 8;
5929 			} else {
5930 				mask = (uint_t)IN_CLASSC_NET;
5931 				subnetshift = 4;
5932 			}
5933 			/*
5934 			 * If there are more bits than the standard mask
5935 			 * would suggest, subnets must be in use. Guess at
5936 			 * the subnet mask, assuming reasonable width subnet
5937 			 * fields.
5938 			 */
5939 			while (addr & ~mask)
5940 				/* compiler doesn't sign extend! */
5941 				mask = (mask | ((int)mask >> subnetshift));
5942 		}
5943 		net = addr & mask;
5944 		while ((mask & 1) == 0)
5945 			mask >>= 1, net >>= 1;
5946 		np = getnetbyaddr(net, AF_INET);
5947 		if (np && np->n_net == net)
5948 			cp = np->n_name;
5949 		else {
5950 			/*
5951 			 * Look for subnets in hosts map.
5952 			 */
5953 			hp = getipnodebyaddr((char *)&addr, sizeof (uint_t),
5954 			    AF_INET, &error_num);
5955 			if (hp)
5956 				cp = hp->h_name;
5957 		}
5958 	}
5959 	if (cp != NULL) {
5960 		(void) strncpy(dst, cp, dstlen);
5961 		dst[dstlen - 1] = 0;
5962 	} else {
5963 		(void) inet_ntop(AF_INET, (char *)&addr, dst, dstlen);
5964 	}
5965 	if (hp != NULL)
5966 		freehostent(hp);
5967 	return (dst);
5968 }
5969 
5970 /*
5971  * Return the name of the network whose address is given.
5972  * The address is assumed to be a host address.
5973  */
5974 static char *
5975 pr_netaddr(uint_t addr, uint_t mask, char *dst, uint_t dstlen)
5976 {
5977 	char		*cp = NULL;
5978 	struct netent	*np = NULL;
5979 	struct hostent	*hp = NULL;
5980 	uint_t		net;
5981 	uint_t		netshifted;
5982 	int		subnetshift;
5983 	struct in_addr in;
5984 	int		error_num;
5985 	uint_t		nbo_addr = addr;	/* network byte order */
5986 
5987 	addr = ntohl(addr);
5988 	mask = ntohl(mask);
5989 	if (addr == INADDR_ANY && mask == INADDR_ANY) {
5990 		(void) strncpy(dst, "default", dstlen);
5991 		dst[dstlen - 1] = 0;
5992 		return (dst);
5993 	}
5994 
5995 	/* Figure out network portion of address (with host portion = 0) */
5996 	if (addr) {
5997 		/* Try figuring out mask if unknown (all 0s). */
5998 		if (mask == 0) {
5999 			if (IN_CLASSA(addr)) {
6000 				mask = (uint_t)IN_CLASSA_NET;
6001 				subnetshift = 8;
6002 			} else if (IN_CLASSB(addr)) {
6003 				mask = (uint_t)IN_CLASSB_NET;
6004 				subnetshift = 8;
6005 			} else {
6006 				mask = (uint_t)IN_CLASSC_NET;
6007 				subnetshift = 4;
6008 			}
6009 			/*
6010 			 * If there are more bits than the standard mask
6011 			 * would suggest, subnets must be in use. Guess at
6012 			 * the subnet mask, assuming reasonable width subnet
6013 			 * fields.
6014 			 */
6015 			while (addr & ~mask)
6016 				/* compiler doesn't sign extend! */
6017 				mask = (mask | ((int)mask >> subnetshift));
6018 		}
6019 		net = netshifted = addr & mask;
6020 		while ((mask & 1) == 0)
6021 			mask >>= 1, netshifted >>= 1;
6022 	}
6023 	else
6024 		net = netshifted = 0;
6025 
6026 	/* Try looking up name unless -n was specified. */
6027 	if (!Nflag) {
6028 		np = getnetbyaddr(netshifted, AF_INET);
6029 		if (np && np->n_net == netshifted)
6030 			cp = np->n_name;
6031 		else {
6032 			/*
6033 			 * Look for subnets in hosts map.
6034 			 */
6035 			hp = getipnodebyaddr((char *)&nbo_addr, sizeof (uint_t),
6036 			    AF_INET, &error_num);
6037 			if (hp)
6038 				cp = hp->h_name;
6039 		}
6040 
6041 		if (cp != NULL) {
6042 			(void) strncpy(dst, cp, dstlen);
6043 			dst[dstlen - 1] = 0;
6044 			if (hp != NULL)
6045 				freehostent(hp);
6046 			return (dst);
6047 		}
6048 		/*
6049 		 * No name found for net: fallthru and return in decimal
6050 		 * dot notation.
6051 		 */
6052 	}
6053 
6054 	in.s_addr = htonl(net);
6055 	(void) inet_ntop(AF_INET, (char *)&in, dst, dstlen);
6056 	if (hp != NULL)
6057 		freehostent(hp);
6058 	return (dst);
6059 }
6060 
6061 /*
6062  * Return the filter mode as a string:
6063  *	1 => "INCLUDE"
6064  *	2 => "EXCLUDE"
6065  *	otherwise "<unknown>"
6066  */
6067 static char *
6068 fmodestr(uint_t fmode)
6069 {
6070 	switch (fmode) {
6071 	case 1:
6072 		return ("INCLUDE");
6073 	case 2:
6074 		return ("EXCLUDE");
6075 	default:
6076 		return ("<unknown>");
6077 	}
6078 }
6079 
6080 #define	MAX_STRING_SIZE	256
6081 
6082 static const char *
6083 pr_secattr(const sec_attr_list_t *attrs)
6084 {
6085 	int i;
6086 	char buf[MAX_STRING_SIZE + 1], *cp;
6087 	static char *sbuf;
6088 	static size_t sbuf_len;
6089 	struct rtsa_s rtsa;
6090 	const sec_attr_list_t *aptr;
6091 
6092 	if (!RSECflag || attrs == NULL)
6093 		return ("");
6094 
6095 	for (aptr = attrs, i = 1; aptr != NULL; aptr = aptr->sal_next)
6096 		i += MAX_STRING_SIZE;
6097 	if (i > sbuf_len) {
6098 		cp = realloc(sbuf, i);
6099 		if (cp == NULL) {
6100 			perror("realloc security attribute buffer");
6101 			return ("");
6102 		}
6103 		sbuf_len = i;
6104 		sbuf = cp;
6105 	}
6106 
6107 	cp = sbuf;
6108 	while (attrs != NULL) {
6109 		const mib2_ipAttributeEntry_t *iae = attrs->sal_attr;
6110 
6111 		/* note: effectively hard-coded in rtsa_keyword */
6112 		rtsa.rtsa_mask = RTSA_CIPSO | RTSA_SLRANGE | RTSA_DOI;
6113 		rtsa.rtsa_slrange = iae->iae_slrange;
6114 		rtsa.rtsa_doi = iae->iae_doi;
6115 
6116 		(void) snprintf(cp, MAX_STRING_SIZE,
6117 		    "<%s>%s ", rtsa_to_str(&rtsa, buf, sizeof (buf)),
6118 		    attrs->sal_next == NULL ? "" : ",");
6119 		cp += strlen(cp);
6120 		attrs = attrs->sal_next;
6121 	}
6122 	*cp = '\0';
6123 
6124 	return (sbuf);
6125 }
6126 
6127 /*
6128  * Pretty print a port number. If the Nflag was
6129  * specified, use numbers instead of names.
6130  */
6131 static char *
6132 portname(uint_t port, char *proto, char *dst, uint_t dstlen)
6133 {
6134 	struct servent *sp = NULL;
6135 
6136 	if (!Nflag && port)
6137 		sp = getservbyport(htons(port), proto);
6138 	if (sp || port == 0)
6139 		(void) snprintf(dst, dstlen, "%.*s", MAXHOSTNAMELEN,
6140 		    sp ? sp->s_name : "*");
6141 	else
6142 		(void) snprintf(dst, dstlen, "%d", port);
6143 	dst[dstlen - 1] = 0;
6144 	return (dst);
6145 }
6146 
6147 /*PRINTFLIKE2*/
6148 void
6149 fail(int do_perror, char *message, ...)
6150 {
6151 	va_list args;
6152 
6153 	va_start(args, message);
6154 	(void) fputs("netstat: ", stderr);
6155 	(void) vfprintf(stderr, message, args);
6156 	va_end(args);
6157 	if (do_perror)
6158 		(void) fprintf(stderr, ": %s", strerror(errno));
6159 	(void) fputc('\n', stderr);
6160 	exit(2);
6161 }
6162 
6163 /*
6164  * Return value of named statistic for given kstat_named kstat;
6165  * return 0LL if named statistic is not in list (use "ll" as a
6166  * type qualifier when printing 64-bit int's with printf() )
6167  */
6168 static uint64_t
6169 kstat_named_value(kstat_t *ksp, char *name)
6170 {
6171 	kstat_named_t *knp;
6172 	uint64_t value;
6173 
6174 	if (ksp == NULL)
6175 		return (0LL);
6176 
6177 	knp = kstat_data_lookup(ksp, name);
6178 	if (knp == NULL)
6179 		return (0LL);
6180 
6181 	switch (knp->data_type) {
6182 	case KSTAT_DATA_INT32:
6183 	case KSTAT_DATA_UINT32:
6184 		value = (uint64_t)(knp->value.ui32);
6185 		break;
6186 	case KSTAT_DATA_INT64:
6187 	case KSTAT_DATA_UINT64:
6188 		value = knp->value.ui64;
6189 		break;
6190 	default:
6191 		value = 0LL;
6192 		break;
6193 	}
6194 
6195 	return (value);
6196 }
6197 
6198 kid_t
6199 safe_kstat_read(kstat_ctl_t *kc, kstat_t *ksp, void *data)
6200 {
6201 	kid_t kstat_chain_id = kstat_read(kc, ksp, data);
6202 
6203 	if (kstat_chain_id == -1)
6204 		fail(1, "kstat_read(%p, '%s') failed", (void *)kc,
6205 		    ksp->ks_name);
6206 	return (kstat_chain_id);
6207 }
6208 
6209 /*
6210  * Parse a list of IRE flag characters into a bit field.
6211  */
6212 static uint_t
6213 flag_bits(const char *arg)
6214 {
6215 	const char *cp;
6216 	uint_t val;
6217 
6218 	if (*arg == '\0')
6219 		fatal(1, "missing flag list\n");
6220 
6221 	val = 0;
6222 	while (*arg != '\0') {
6223 		if ((cp = strchr(flag_list, *arg)) == NULL)
6224 			fatal(1, "%c: illegal flag\n", *arg);
6225 		val |= 1 << (cp - flag_list);
6226 		arg++;
6227 	}
6228 	return (val);
6229 }
6230 
6231 /*
6232  * Handle -f argument.  Validate input format, sort by keyword, and
6233  * save off digested results.
6234  */
6235 static void
6236 process_filter(char *arg)
6237 {
6238 	int idx;
6239 	int klen = 0;
6240 	char *cp, *cp2;
6241 	int val;
6242 	filter_t *newf;
6243 	struct hostent *hp;
6244 	int error_num;
6245 	uint8_t *ucp;
6246 	int maxv;
6247 
6248 	/* Look up the keyword first */
6249 	if (strchr(arg, ':') == NULL) {
6250 		idx = FK_AF;
6251 	} else {
6252 		for (idx = 0; idx < NFILTERKEYS; idx++) {
6253 			klen = strlen(filter_keys[idx]);
6254 			if (strncmp(filter_keys[idx], arg, klen) == 0 &&
6255 			    arg[klen] == ':')
6256 				break;
6257 		}
6258 		if (idx >= NFILTERKEYS)
6259 			fatal(1, "%s: unknown filter keyword\n", arg);
6260 
6261 		/* Advance past keyword and separator. */
6262 		arg += klen + 1;
6263 	}
6264 
6265 	if ((newf = malloc(sizeof (*newf))) == NULL) {
6266 		perror("filter");
6267 		exit(1);
6268 	}
6269 	switch (idx) {
6270 	case FK_AF:
6271 		if (strcmp(arg, "inet") == 0) {
6272 			newf->u.f_family = AF_INET;
6273 		} else if (strcmp(arg, "inet6") == 0) {
6274 			newf->u.f_family = AF_INET6;
6275 		} else if (strcmp(arg, "unix") == 0) {
6276 			newf->u.f_family = AF_UNIX;
6277 		} else {
6278 			newf->u.f_family = strtol(arg, &cp, 0);
6279 			if (arg == cp || *cp != '\0')
6280 				fatal(1, "%s: unknown address family.\n", arg);
6281 		}
6282 		break;
6283 
6284 	case FK_OUTIF:
6285 		if (strcmp(arg, "none") == 0) {
6286 			newf->u.f_ifname = NULL;
6287 			break;
6288 		}
6289 		if (strcmp(arg, "any") == 0) {
6290 			newf->u.f_ifname = "";
6291 			break;
6292 		}
6293 		val = strtol(arg, &cp, 0);
6294 		if (val <= 0 || arg == cp || cp[0] != '\0') {
6295 			if ((val = if_nametoindex(arg)) == 0) {
6296 				perror(arg);
6297 				exit(1);
6298 			}
6299 		}
6300 		newf->u.f_ifname = arg;
6301 		break;
6302 
6303 	case FK_DST:
6304 		V4MASK_TO_V6(IP_HOST_MASK, newf->u.a.f_mask);
6305 		if (strcmp(arg, "any") == 0) {
6306 			/* Special semantics; any address *but* zero */
6307 			newf->u.a.f_address = NULL;
6308 			(void) memset(&newf->u.a.f_mask, 0,
6309 			    sizeof (newf->u.a.f_mask));
6310 			break;
6311 		}
6312 		if (strcmp(arg, "none") == 0) {
6313 			newf->u.a.f_address = NULL;
6314 			break;
6315 		}
6316 		if ((cp = strrchr(arg, '/')) != NULL)
6317 			*cp++ = '\0';
6318 		hp = getipnodebyname(arg, AF_INET6, AI_V4MAPPED|AI_ALL,
6319 		    &error_num);
6320 		if (hp == NULL)
6321 			fatal(1, "%s: invalid or unknown host address\n", arg);
6322 		newf->u.a.f_address = hp;
6323 		if (cp == NULL) {
6324 			V4MASK_TO_V6(IP_HOST_MASK, newf->u.a.f_mask);
6325 		} else {
6326 			val = strtol(cp, &cp2, 0);
6327 			if (cp != cp2 && cp2[0] == '\0') {
6328 				/*
6329 				 * If decode as "/n" works, then translate
6330 				 * into a mask.
6331 				 */
6332 				if (hp->h_addr_list[0] != NULL &&
6333 				    /* LINTED: (note 1) */
6334 				    IN6_IS_ADDR_V4MAPPED((in6_addr_t *)
6335 				    hp->h_addr_list[0])) {
6336 					maxv = IP_ABITS;
6337 				} else {
6338 					maxv = IPV6_ABITS;
6339 				}
6340 				if (val < 0 || val >= maxv)
6341 					fatal(1, "%d: not in range 0 to %d\n",
6342 					    val, maxv - 1);
6343 				if (maxv == IP_ABITS)
6344 					val += IPV6_ABITS - IP_ABITS;
6345 				ucp = newf->u.a.f_mask.s6_addr;
6346 				while (val >= 8)
6347 					*ucp++ = 0xff, val -= 8;
6348 				*ucp++ = (0xff << (8 - val)) & 0xff;
6349 				while (ucp < newf->u.a.f_mask.s6_addr +
6350 				    sizeof (newf->u.a.f_mask.s6_addr))
6351 					*ucp++ = 0;
6352 				/* Otherwise, try as numeric address */
6353 			} else if (inet_pton(AF_INET6,
6354 			    cp, &newf->u.a.f_mask) <= 0) {
6355 				fatal(1, "%s: illegal mask format\n", cp);
6356 			}
6357 		}
6358 		break;
6359 
6360 	case FK_FLAGS:
6361 		if (*arg == '+') {
6362 			newf->u.f.f_flagset = flag_bits(arg + 1);
6363 			newf->u.f.f_flagclear = 0;
6364 		} else if (*arg == '-') {
6365 			newf->u.f.f_flagset = 0;
6366 			newf->u.f.f_flagclear = flag_bits(arg + 1);
6367 		} else {
6368 			newf->u.f.f_flagset = flag_bits(arg);
6369 			newf->u.f.f_flagclear = ~newf->u.f.f_flagset;
6370 		}
6371 		break;
6372 
6373 	default:
6374 		assert(0);
6375 	}
6376 	newf->f_next = filters[idx];
6377 	filters[idx] = newf;
6378 }
6379 
6380 /* Determine if user wants this address family printed. */
6381 static boolean_t
6382 family_selected(int family)
6383 {
6384 	const filter_t *fp;
6385 
6386 	if (v4compat && family == AF_INET6)
6387 		return (B_FALSE);
6388 	if ((fp = filters[FK_AF]) == NULL)
6389 		return (B_TRUE);
6390 	while (fp != NULL) {
6391 		if (fp->u.f_family == family)
6392 			return (B_TRUE);
6393 		fp = fp->f_next;
6394 	}
6395 	return (B_FALSE);
6396 }
6397 
6398 /*
6399  * Convert the interface index to a string using the buffer `ifname', which
6400  * must be at least LIFNAMSIZ bytes.  We first try to map it to name.  If that
6401  * fails (e.g., because we're inside a zone and it does not have access to
6402  * interface for the index in question), just return "if#<num>".
6403  */
6404 static char *
6405 ifindex2str(uint_t ifindex, char *ifname)
6406 {
6407 	if (if_indextoname(ifindex, ifname) == NULL)
6408 		(void) snprintf(ifname, LIFNAMSIZ, "if#%d", ifindex);
6409 
6410 	return (ifname);
6411 }
6412 
6413 /*
6414  * print the usage line
6415  */
6416 static void
6417 usage(char *cmdname)
6418 {
6419 	(void) fprintf(stderr, "usage: %s [-anv] [-f address_family] "
6420 	    "[-T d|u]\n", cmdname);
6421 	(void) fprintf(stderr, "       %s [-n] [-f address_family] "
6422 	    "[-P protocol] [-T d|u] [-g | -p | -s [interval [count]]]\n",
6423 	    cmdname);
6424 	(void) fprintf(stderr, "       %s -m [-v] [-T d|u] "
6425 	    "[interval [count]]\n", cmdname);
6426 	(void) fprintf(stderr, "       %s -i [-I interface] [-an] "
6427 	    "[-f address_family] [-T d|u] [interval [count]]\n", cmdname);
6428 	(void) fprintf(stderr, "       %s -r [-anv] "
6429 	    "[-f address_family|filter] [-T d|u]\n", cmdname);
6430 	(void) fprintf(stderr, "       %s -M [-ns] [-f address_family] "
6431 	    "[-T d|u]\n", cmdname);
6432 	(void) fprintf(stderr, "       %s -D [-I interface] "
6433 	    "[-f address_family] [-T d|u]\n", cmdname);
6434 	exit(EXIT_FAILURE);
6435 }
6436 
6437 /*
6438  * fatal: print error message to stderr and
6439  * call exit(errcode)
6440  */
6441 /*PRINTFLIKE2*/
6442 static void
6443 fatal(int errcode, char *format, ...)
6444 {
6445 	va_list argp;
6446 
6447 	if (format == NULL)
6448 		return;
6449 
6450 	va_start(argp, format);
6451 	(void) vfprintf(stderr, format, argp);
6452 	va_end(argp);
6453 
6454 	exit(errcode);
6455 }
6456