inet.c revision 1.88.8.1 1 1.88.8.1 jym /* $NetBSD: inet.c,v 1.88.8.1 2009/05/13 19:19:59 jym Exp $ */
2 1.14 thorpej
3 1.1 cgd /*
4 1.9 mycroft * Copyright (c) 1983, 1988, 1993
5 1.9 mycroft * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * Redistribution and use in source and binary forms, with or without
8 1.1 cgd * modification, are permitted provided that the following conditions
9 1.1 cgd * are met:
10 1.1 cgd * 1. Redistributions of source code must retain the above copyright
11 1.1 cgd * notice, this list of conditions and the following disclaimer.
12 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 cgd * notice, this list of conditions and the following disclaimer in the
14 1.1 cgd * documentation and/or other materials provided with the distribution.
15 1.58 agc * 3. Neither the name of the University nor the names of its contributors
16 1.1 cgd * may be used to endorse or promote products derived from this software
17 1.1 cgd * without specific prior written permission.
18 1.1 cgd *
19 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 1.1 cgd * SUCH DAMAGE.
30 1.1 cgd */
31 1.1 cgd
32 1.23 lukem #include <sys/cdefs.h>
33 1.1 cgd #ifndef lint
34 1.14 thorpej #if 0
35 1.14 thorpej static char sccsid[] = "from: @(#)inet.c 8.4 (Berkeley) 4/20/94";
36 1.14 thorpej #else
37 1.88.8.1 jym __RCSID("$NetBSD: inet.c,v 1.88.8.1 2009/05/13 19:19:59 jym Exp $");
38 1.14 thorpej #endif
39 1.1 cgd #endif /* not lint */
40 1.1 cgd
41 1.78 ad #define _CALLOUT_PRIVATE /* for defs in sys/callout.h */
42 1.78 ad
43 1.1 cgd #include <sys/param.h>
44 1.10 cgd #include <sys/queue.h>
45 1.1 cgd #include <sys/socket.h>
46 1.1 cgd #include <sys/socketvar.h>
47 1.1 cgd #include <sys/mbuf.h>
48 1.1 cgd #include <sys/protosw.h>
49 1.65 elad #include <sys/sysctl.h>
50 1.1 cgd
51 1.41 jhawk #include <net/if_arp.h>
52 1.1 cgd #include <net/route.h>
53 1.1 cgd #include <netinet/in.h>
54 1.1 cgd #include <netinet/in_systm.h>
55 1.1 cgd #include <netinet/ip.h>
56 1.1 cgd #include <netinet/in_pcb.h>
57 1.1 cgd #include <netinet/ip_icmp.h>
58 1.37 itojun
59 1.37 itojun #ifdef INET6
60 1.37 itojun #include <netinet/ip6.h>
61 1.37 itojun #endif
62 1.37 itojun
63 1.1 cgd #include <netinet/icmp_var.h>
64 1.6 brezak #include <netinet/igmp_var.h>
65 1.1 cgd #include <netinet/ip_var.h>
66 1.62 manu #include <netinet/pim_var.h>
67 1.1 cgd #include <netinet/tcp.h>
68 1.1 cgd #include <netinet/tcpip.h>
69 1.1 cgd #include <netinet/tcp_seq.h>
70 1.1 cgd #define TCPSTATES
71 1.1 cgd #include <netinet/tcp_fsm.h>
72 1.30 thorpej #define TCPTIMERS
73 1.1 cgd #include <netinet/tcp_timer.h>
74 1.1 cgd #include <netinet/tcp_var.h>
75 1.1 cgd #include <netinet/tcp_debug.h>
76 1.1 cgd #include <netinet/udp.h>
77 1.69 liamjfoy #include <netinet/ip_carp.h>
78 1.1 cgd #include <netinet/udp_var.h>
79 1.1 cgd
80 1.9 mycroft #include <arpa/inet.h>
81 1.64 rpaulo #include <kvm.h>
82 1.1 cgd #include <netdb.h>
83 1.1 cgd #include <stdio.h>
84 1.1 cgd #include <string.h>
85 1.9 mycroft #include <unistd.h>
86 1.66 elad #include <stdlib.h>
87 1.65 elad #include <err.h>
88 1.9 mycroft #include "netstat.h"
89 1.1 cgd
90 1.84 thorpej char *inetname(struct in_addr *);
91 1.84 thorpej void inetprint(struct in_addr *, u_int16_t, const char *, int);
92 1.1 cgd
93 1.1 cgd /*
94 1.1 cgd * Print a summary of connections related to an Internet
95 1.1 cgd * protocol. For TCP, also give state of connection.
96 1.1 cgd * Listening processes (aflag) are suppressed unless the
97 1.1 cgd * -a (all) flag is specified.
98 1.1 cgd */
99 1.35 lukem static int width;
100 1.66 elad static int compact;
101 1.66 elad
102 1.66 elad static void
103 1.66 elad protoprhdr(void)
104 1.66 elad {
105 1.66 elad printf("Active Internet connections");
106 1.66 elad if (aflag)
107 1.66 elad printf(" (including servers)");
108 1.66 elad putchar('\n');
109 1.66 elad if (Aflag)
110 1.66 elad printf("%-8.8s ", "PCB");
111 1.66 elad printf("%-5.5s %-6.6s %-6.6s %s%-*.*s %-*.*s %s\n",
112 1.66 elad "Proto", "Recv-Q", "Send-Q", compact ? "" : " ",
113 1.66 elad width, width, "Local Address",
114 1.66 elad width, width, "Foreign Address",
115 1.66 elad "State");
116 1.66 elad }
117 1.66 elad
118 1.66 elad static void
119 1.67 he protopr0(intptr_t ppcb, u_long rcv_sb_cc, u_long snd_sb_cc,
120 1.66 elad struct in_addr *laddr, u_int16_t lport,
121 1.66 elad struct in_addr *faddr, u_int16_t fport,
122 1.88.8.1 jym short t_state, const char *name, int inp_flags)
123 1.66 elad {
124 1.83 thorpej static const char *shorttcpstates[] = {
125 1.66 elad "CLOSED", "LISTEN", "SYNSEN", "SYSRCV",
126 1.66 elad "ESTABL", "CLWAIT", "FWAIT1", "CLOSNG",
127 1.66 elad "LASTAK", "FWAIT2", "TMWAIT",
128 1.66 elad };
129 1.66 elad int istcp;
130 1.66 elad
131 1.66 elad istcp = strcmp(name, "tcp") == 0;
132 1.66 elad
133 1.66 elad if (Aflag) {
134 1.68 elad printf("%8" PRIxPTR " ", ppcb);
135 1.66 elad }
136 1.66 elad printf("%-5.5s %6ld %6ld%s", name, rcv_sb_cc, snd_sb_cc,
137 1.66 elad compact ? "" : " ");
138 1.66 elad if (numeric_port) {
139 1.66 elad inetprint(laddr, lport, name, 1);
140 1.66 elad inetprint(faddr, fport, name, 1);
141 1.88.8.1 jym } else if (inp_flags & INP_ANONPORT) {
142 1.66 elad inetprint(laddr, lport, name, 1);
143 1.66 elad inetprint(faddr, fport, name, 0);
144 1.66 elad } else {
145 1.66 elad inetprint(laddr, lport, name, 0);
146 1.66 elad inetprint(faddr, fport, name, 0);
147 1.66 elad }
148 1.66 elad if (istcp) {
149 1.66 elad if (t_state < 0 || t_state >= TCP_NSTATES)
150 1.66 elad printf(" %d", t_state);
151 1.66 elad else
152 1.66 elad printf(" %s", compact ? shorttcpstates[t_state] :
153 1.66 elad tcpstates[t_state]);
154 1.66 elad }
155 1.66 elad putchar('\n');
156 1.66 elad }
157 1.35 lukem
158 1.9 mycroft void
159 1.88.8.1 jym protopr(u_long off, const char *name)
160 1.1 cgd {
161 1.12 mycroft struct inpcbtable table;
162 1.23 lukem struct inpcb *head, *next, *prev;
163 1.13 cgd struct inpcb inpcb;
164 1.88.8.1 jym struct tcpcb tcpcb;
165 1.88.8.1 jym struct socket sockb;
166 1.66 elad int istcp;
167 1.1 cgd static int first = 1;
168 1.1 cgd
169 1.35 lukem compact = 0;
170 1.35 lukem if (Aflag) {
171 1.46 assar if (!numeric_addr)
172 1.35 lukem width = 18;
173 1.35 lukem else {
174 1.35 lukem width = 21;
175 1.35 lukem compact = 1;
176 1.35 lukem }
177 1.35 lukem } else
178 1.35 lukem width = 22;
179 1.66 elad
180 1.66 elad if (use_sysctl) {
181 1.66 elad struct kinfo_pcb *pcblist;
182 1.66 elad int mib[8];
183 1.66 elad size_t namelen = 0, size = 0, i;
184 1.66 elad char *mibname = NULL;
185 1.66 elad
186 1.66 elad memset(mib, 0, sizeof(mib));
187 1.66 elad
188 1.66 elad if (asprintf(&mibname, "net.inet.%s.pcblist", name) == -1)
189 1.66 elad err(1, "asprintf");
190 1.66 elad
191 1.66 elad /* get dynamic pcblist node */
192 1.66 elad if (sysctlnametomib(mibname, mib, &namelen) == -1)
193 1.77 elad err(1, "sysctlnametomib: %s", mibname);
194 1.66 elad
195 1.66 elad if (sysctl(mib, sizeof(mib) / sizeof(*mib), NULL, &size,
196 1.66 elad NULL, 0) == -1)
197 1.66 elad err(1, "sysctl (query)");
198 1.66 elad
199 1.71 liamjfoy if ((pcblist = malloc(size)) == NULL)
200 1.71 liamjfoy err(1, "malloc");
201 1.66 elad memset(pcblist, 0, size);
202 1.66 elad
203 1.66 elad mib[6] = sizeof(*pcblist);
204 1.66 elad mib[7] = size / sizeof(*pcblist);
205 1.66 elad
206 1.66 elad if (sysctl(mib, sizeof(mib) / sizeof(*mib), pcblist,
207 1.66 elad &size, NULL, 0) == -1)
208 1.66 elad err(1, "sysctl (copy)");
209 1.66 elad
210 1.66 elad for (i = 0; i < size / sizeof(*pcblist); i++) {
211 1.66 elad struct sockaddr_in src, dst;
212 1.66 elad
213 1.66 elad memcpy(&src, &pcblist[i].ki_s, sizeof(src));
214 1.66 elad memcpy(&dst, &pcblist[i].ki_d, sizeof(dst));
215 1.66 elad
216 1.88.8.1 jym if (!aflag &&
217 1.88.8.1 jym inet_lnaof(dst.sin_addr) == INADDR_ANY)
218 1.88.8.1 jym continue;
219 1.88.8.1 jym
220 1.66 elad if (first) {
221 1.66 elad protoprhdr();
222 1.66 elad first = 0;
223 1.66 elad }
224 1.66 elad
225 1.67 he protopr0((intptr_t) pcblist[i].ki_ppcbaddr,
226 1.66 elad pcblist[i].ki_rcvq, pcblist[i].ki_sndq,
227 1.66 elad &src.sin_addr, src.sin_port,
228 1.66 elad &dst.sin_addr, dst.sin_port,
229 1.88.8.1 jym pcblist[i].ki_tstate, name,
230 1.88.8.1 jym pcblist[i].ki_pflags);
231 1.66 elad }
232 1.66 elad
233 1.66 elad free(pcblist);
234 1.66 elad return;
235 1.66 elad }
236 1.66 elad
237 1.72 elad if (off == 0)
238 1.72 elad return;
239 1.72 elad istcp = strcmp(name, "tcp") == 0;
240 1.72 elad kread(off, (char *)&table, sizeof table);
241 1.72 elad prev = head =
242 1.72 elad (struct inpcb *)&((struct inpcbtable *)off)->inpt_queue.cqh_first;
243 1.72 elad next = (struct inpcb *)table.inpt_queue.cqh_first;
244 1.72 elad
245 1.13 cgd while (next != head) {
246 1.12 mycroft kread((u_long)next, (char *)&inpcb, sizeof inpcb);
247 1.59 itojun if ((struct inpcb *)inpcb.inp_queue.cqe_prev != prev) {
248 1.1 cgd printf("???\n");
249 1.1 cgd break;
250 1.1 cgd }
251 1.13 cgd prev = next;
252 1.59 itojun next = (struct inpcb *)inpcb.inp_queue.cqe_next;
253 1.59 itojun
254 1.59 itojun if (inpcb.inp_af != AF_INET)
255 1.59 itojun continue;
256 1.13 cgd
257 1.1 cgd if (!aflag &&
258 1.88.8.1 jym inet_lnaof(inpcb.inp_faddr) == INADDR_ANY)
259 1.1 cgd continue;
260 1.9 mycroft kread((u_long)inpcb.inp_socket, (char *)&sockb, sizeof (sockb));
261 1.1 cgd if (istcp) {
262 1.9 mycroft kread((u_long)inpcb.inp_ppcb,
263 1.9 mycroft (char *)&tcpcb, sizeof (tcpcb));
264 1.1 cgd }
265 1.66 elad
266 1.1 cgd if (first) {
267 1.66 elad protoprhdr();
268 1.1 cgd first = 0;
269 1.1 cgd }
270 1.66 elad
271 1.67 he protopr0(istcp ? (intptr_t) inpcb.inp_ppcb : (intptr_t) prev,
272 1.66 elad sockb.so_rcv.sb_cc, sockb.so_snd.sb_cc,
273 1.66 elad &inpcb.inp_laddr, inpcb.inp_lport,
274 1.66 elad &inpcb.inp_faddr, inpcb.inp_fport,
275 1.88.8.1 jym tcpcb.t_state, name, inpcb.inp_flags);
276 1.1 cgd }
277 1.1 cgd }
278 1.1 cgd
279 1.1 cgd /*
280 1.1 cgd * Dump TCP statistics structure.
281 1.1 cgd */
282 1.9 mycroft void
283 1.88.8.1 jym tcp_stats(u_long off, const char *name)
284 1.1 cgd {
285 1.83 thorpej uint64_t tcpstat[TCP_NSTATS];
286 1.1 cgd
287 1.65 elad if (use_sysctl) {
288 1.65 elad size_t size = sizeof(tcpstat);
289 1.65 elad
290 1.83 thorpej if (sysctlbyname("net.inet.tcp.stats", tcpstat, &size,
291 1.65 elad NULL, 0) == -1)
292 1.88 thorpej return;
293 1.65 elad } else {
294 1.88 thorpej warnx("%s stats not available via KVM.", name);
295 1.88 thorpej return;
296 1.65 elad }
297 1.65 elad
298 1.1 cgd printf ("%s:\n", name);
299 1.9 mycroft
300 1.83 thorpej #define ps(f, m) if (tcpstat[f] || sflag <= 1) \
301 1.83 thorpej printf(m, (unsigned long long)tcpstat[f])
302 1.83 thorpej #define p(f, m) if (tcpstat[f] || sflag <= 1) \
303 1.83 thorpej printf(m, (unsigned long long)tcpstat[f], plural(tcpstat[f]))
304 1.83 thorpej #define p2(f1, f2, m) if (tcpstat[f1] || tcpstat[f2] || sflag <= 1) \
305 1.83 thorpej printf(m, (unsigned long long)tcpstat[f1], plural(tcpstat[f1]), \
306 1.83 thorpej (unsigned long long)tcpstat[f2], plural(tcpstat[f2]))
307 1.83 thorpej #define p2s(f1, f2, m) if (tcpstat[f1] || tcpstat[f2] || sflag <= 1) \
308 1.83 thorpej printf(m, (unsigned long long)tcpstat[f1], plural(tcpstat[f1]), \
309 1.83 thorpej (unsigned long long)tcpstat[f2])
310 1.83 thorpej #define p3(f, m) if (tcpstat[f] || sflag <= 1) \
311 1.83 thorpej printf(m, (unsigned long long)tcpstat[f], plurales(tcpstat[f]))
312 1.1 cgd
313 1.83 thorpej p(TCP_STAT_SNDTOTAL, "\t%llu packet%s sent\n");
314 1.83 thorpej p2(TCP_STAT_SNDPACK,TCP_STAT_SNDBYTE,
315 1.38 bouyer "\t\t%llu data packet%s (%llu byte%s)\n");
316 1.83 thorpej p2(TCP_STAT_SNDREXMITPACK, TCP_STAT_SNDREXMITBYTE,
317 1.38 bouyer "\t\t%llu data packet%s (%llu byte%s) retransmitted\n");
318 1.83 thorpej p2s(TCP_STAT_SNDACKS, TCP_STAT_DELACK,
319 1.38 bouyer "\t\t%llu ack-only packet%s (%llu delayed)\n");
320 1.83 thorpej p(TCP_STAT_SNDURG, "\t\t%llu URG only packet%s\n");
321 1.83 thorpej p(TCP_STAT_SNDPROBE, "\t\t%llu window probe packet%s\n");
322 1.83 thorpej p(TCP_STAT_SNDWINUP, "\t\t%llu window update packet%s\n");
323 1.83 thorpej p(TCP_STAT_SNDCTRL, "\t\t%llu control packet%s\n");
324 1.83 thorpej p(TCP_STAT_SELFQUENCH,
325 1.47 thorpej "\t\t%llu send attempt%s resulted in self-quench\n");
326 1.83 thorpej p(TCP_STAT_RCVTOTAL, "\t%llu packet%s received\n");
327 1.83 thorpej p2(TCP_STAT_RCVACKPACK, TCP_STAT_RCVACKBYTE,
328 1.38 bouyer "\t\t%llu ack%s (for %llu byte%s)\n");
329 1.83 thorpej p(TCP_STAT_RCVDUPACK, "\t\t%llu duplicate ack%s\n");
330 1.83 thorpej p(TCP_STAT_RCVACKTOOMUCH, "\t\t%llu ack%s for unsent data\n");
331 1.83 thorpej p2(TCP_STAT_RCVPACK, TCP_STAT_RCVBYTE,
332 1.38 bouyer "\t\t%llu packet%s (%llu byte%s) received in-sequence\n");
333 1.83 thorpej p2(TCP_STAT_RCVDUPPACK, TCP_STAT_RCVDUPBYTE,
334 1.38 bouyer "\t\t%llu completely duplicate packet%s (%llu byte%s)\n");
335 1.83 thorpej p(TCP_STAT_PAWSDROP, "\t\t%llu old duplicate packet%s\n");
336 1.83 thorpej p2(TCP_STAT_RCVPARTDUPPACK, TCP_STAT_RCVPARTDUPBYTE,
337 1.38 bouyer "\t\t%llu packet%s with some dup. data (%llu byte%s duped)\n");
338 1.83 thorpej p2(TCP_STAT_RCVOOPACK, TCP_STAT_RCVOOBYTE,
339 1.38 bouyer "\t\t%llu out-of-order packet%s (%llu byte%s)\n");
340 1.83 thorpej p2(TCP_STAT_RCVPACKAFTERWIN, TCP_STAT_RCVBYTEAFTERWIN,
341 1.38 bouyer "\t\t%llu packet%s (%llu byte%s) of data after window\n");
342 1.83 thorpej p(TCP_STAT_RCVWINPROBE, "\t\t%llu window probe%s\n");
343 1.83 thorpej p(TCP_STAT_RCVWINUPD, "\t\t%llu window update packet%s\n");
344 1.83 thorpej p(TCP_STAT_RCVAFTERCLOSE, "\t\t%llu packet%s received after close\n");
345 1.83 thorpej p(TCP_STAT_RCVBADSUM, "\t\t%llu discarded for bad checksum%s\n");
346 1.83 thorpej p(TCP_STAT_RCVBADOFF, "\t\t%llu discarded for bad header offset field%s\n");
347 1.83 thorpej ps(TCP_STAT_RCVSHORT, "\t\t%llu discarded because packet too short\n");
348 1.83 thorpej p(TCP_STAT_CONNATTEMPT, "\t%llu connection request%s\n");
349 1.83 thorpej p(TCP_STAT_ACCEPTS, "\t%llu connection accept%s\n");
350 1.83 thorpej p(TCP_STAT_CONNECTS,
351 1.38 bouyer "\t%llu connection%s established (including accepts)\n");
352 1.83 thorpej p2(TCP_STAT_CLOSED, TCP_STAT_DROPS,
353 1.38 bouyer "\t%llu connection%s closed (including %llu drop%s)\n");
354 1.83 thorpej p(TCP_STAT_CONNDROPS, "\t%llu embryonic connection%s dropped\n");
355 1.83 thorpej p(TCP_STAT_DELAYED_FREE, "\t%llu delayed free%s of tcpcb\n");
356 1.83 thorpej p2(TCP_STAT_RTTUPDATED, TCP_STAT_SEGSTIMED,
357 1.38 bouyer "\t%llu segment%s updated rtt (of %llu attempt%s)\n");
358 1.83 thorpej p(TCP_STAT_REXMTTIMEO, "\t%llu retransmit timeout%s\n");
359 1.83 thorpej p(TCP_STAT_TIMEOUTDROP,
360 1.38 bouyer "\t\t%llu connection%s dropped by rexmit timeout\n");
361 1.83 thorpej p2(TCP_STAT_PERSISTTIMEO, TCP_STAT_PERSISTDROPS,
362 1.38 bouyer "\t%llu persist timeout%s (resulting in %llu dropped "
363 1.38 bouyer "connection%s)\n");
364 1.83 thorpej p(TCP_STAT_KEEPTIMEO, "\t%llu keepalive timeout%s\n");
365 1.83 thorpej p(TCP_STAT_KEEPPROBE, "\t\t%llu keepalive probe%s sent\n");
366 1.83 thorpej p(TCP_STAT_KEEPDROPS, "\t\t%llu connection%s dropped by keepalive\n");
367 1.83 thorpej p(TCP_STAT_PREDACK, "\t%llu correct ACK header prediction%s\n");
368 1.83 thorpej p(TCP_STAT_PREDDAT, "\t%llu correct data packet header prediction%s\n");
369 1.83 thorpej p3(TCP_STAT_PCBHASHMISS, "\t%llu PCB hash miss%s\n");
370 1.83 thorpej ps(TCP_STAT_NOPORT, "\t%llu dropped due to no socket\n");
371 1.83 thorpej p(TCP_STAT_CONNSDRAINED, "\t%llu connection%s drained due to memory "
372 1.38 bouyer "shortage\n");
373 1.83 thorpej p(TCP_STAT_PMTUBLACKHOLE, "\t%llu PMTUD blackhole%s detected\n");
374 1.38 bouyer
375 1.83 thorpej p(TCP_STAT_BADSYN, "\t%llu bad connection attempt%s\n");
376 1.83 thorpej ps(TCP_STAT_SC_ADDED, "\t%llu SYN cache entries added\n");
377 1.83 thorpej p(TCP_STAT_SC_COLLISIONS, "\t\t%llu hash collision%s\n");
378 1.83 thorpej ps(TCP_STAT_SC_COMPLETED, "\t\t%llu completed\n");
379 1.83 thorpej ps(TCP_STAT_SC_ABORTED, "\t\t%llu aborted (no space to build PCB)\n");
380 1.83 thorpej ps(TCP_STAT_SC_TIMED_OUT, "\t\t%llu timed out\n");
381 1.83 thorpej ps(TCP_STAT_SC_OVERFLOWED, "\t\t%llu dropped due to overflow\n");
382 1.83 thorpej ps(TCP_STAT_SC_BUCKETOVERFLOW, "\t\t%llu dropped due to bucket overflow\n");
383 1.83 thorpej ps(TCP_STAT_SC_RESET, "\t\t%llu dropped due to RST\n");
384 1.83 thorpej ps(TCP_STAT_SC_UNREACH, "\t\t%llu dropped due to ICMP unreachable\n");
385 1.83 thorpej ps(TCP_STAT_SC_DELAYED_FREE, "\t\t%llu delayed free of SYN cache "
386 1.57 he "entries\n");
387 1.83 thorpej p(TCP_STAT_SC_RETRANSMITTED, "\t%llu SYN,ACK%s retransmitted\n");
388 1.83 thorpej p(TCP_STAT_SC_DUPESYN, "\t%llu duplicate SYN%s received for entries "
389 1.38 bouyer "already in the cache\n");
390 1.83 thorpej p(TCP_STAT_SC_DROPPED, "\t%llu SYN%s dropped (no route or no space)\n");
391 1.83 thorpej p(TCP_STAT_BADSIG, "\t%llu packet%s with bad signature\n");
392 1.83 thorpej p(TCP_STAT_GOODSIG, "\t%llu packet%s with good signature\n");
393 1.83 thorpej
394 1.83 thorpej p(TCP_STAT_ECN_SHS, "\t%llu sucessful ECN handshake%s\n");
395 1.83 thorpej p(TCP_STAT_ECN_CE, "\t%llu packet%s with ECN CE bit\n");
396 1.83 thorpej p(TCP_STAT_ECN_ECT, "\t%llu packet%s ECN ECT(0) bit\n");
397 1.1 cgd #undef p
398 1.20 christos #undef ps
399 1.1 cgd #undef p2
400 1.20 christos #undef p2s
401 1.9 mycroft #undef p3
402 1.1 cgd }
403 1.1 cgd
404 1.1 cgd /*
405 1.1 cgd * Dump UDP statistics structure.
406 1.1 cgd */
407 1.9 mycroft void
408 1.88.8.1 jym udp_stats(u_long off, const char *name)
409 1.1 cgd {
410 1.80 thorpej uint64_t udpstat[UDP_NSTATS];
411 1.38 bouyer u_quad_t delivered;
412 1.1 cgd
413 1.65 elad if (use_sysctl) {
414 1.65 elad size_t size = sizeof(udpstat);
415 1.65 elad
416 1.80 thorpej if (sysctlbyname("net.inet.udp.stats", udpstat, &size,
417 1.65 elad NULL, 0) == -1)
418 1.88 thorpej return;
419 1.65 elad } else {
420 1.88 thorpej warnx("%s stats not available via KVM.", name);
421 1.88 thorpej return;
422 1.65 elad }
423 1.65 elad
424 1.65 elad printf ("%s:\n", name);
425 1.15 mycroft
426 1.80 thorpej #define ps(f, m) if (udpstat[f] || sflag <= 1) \
427 1.80 thorpej printf(m, (unsigned long long)udpstat[f])
428 1.80 thorpej #define p(f, m) if (udpstat[f] || sflag <= 1) \
429 1.80 thorpej printf(m, (unsigned long long)udpstat[f], plural(udpstat[f]))
430 1.80 thorpej #define p3(f, m) if (udpstat[f] || sflag <= 1) \
431 1.80 thorpej printf(m, (unsigned long long)udpstat[f], plurales(udpstat[f]))
432 1.80 thorpej
433 1.80 thorpej p(UDP_STAT_IPACKETS, "\t%llu datagram%s received\n");
434 1.80 thorpej ps(UDP_STAT_HDROPS, "\t%llu with incomplete header\n");
435 1.80 thorpej ps(UDP_STAT_BADLEN, "\t%llu with bad data length field\n");
436 1.80 thorpej ps(UDP_STAT_BADSUM, "\t%llu with bad checksum\n");
437 1.80 thorpej ps(UDP_STAT_NOPORT, "\t%llu dropped due to no socket\n");
438 1.80 thorpej p(UDP_STAT_NOPORTBCAST,
439 1.80 thorpej "\t%llu broadcast/multicast datagram%s dropped due to no socket\n");
440 1.80 thorpej ps(UDP_STAT_FULLSOCK, "\t%llu dropped due to full socket buffers\n");
441 1.80 thorpej delivered = udpstat[UDP_STAT_IPACKETS] -
442 1.80 thorpej udpstat[UDP_STAT_HDROPS] -
443 1.80 thorpej udpstat[UDP_STAT_BADLEN] -
444 1.80 thorpej udpstat[UDP_STAT_BADSUM] -
445 1.80 thorpej udpstat[UDP_STAT_NOPORT] -
446 1.80 thorpej udpstat[UDP_STAT_NOPORTBCAST] -
447 1.80 thorpej udpstat[UDP_STAT_FULLSOCK];
448 1.9 mycroft if (delivered || sflag <= 1)
449 1.38 bouyer printf("\t%llu delivered\n", (unsigned long long)delivered);
450 1.80 thorpej p3(UDP_STAT_PCBHASHMISS, "\t%llu PCB hash miss%s\n");
451 1.80 thorpej p(UDP_STAT_OPACKETS, "\t%llu datagram%s output\n");
452 1.15 mycroft
453 1.20 christos #undef ps
454 1.9 mycroft #undef p
455 1.15 mycroft #undef p3
456 1.1 cgd }
457 1.1 cgd
458 1.1 cgd /*
459 1.1 cgd * Dump IP statistics structure.
460 1.1 cgd */
461 1.9 mycroft void
462 1.88.8.1 jym ip_stats(u_long off, const char *name)
463 1.1 cgd {
464 1.82 thorpej uint64_t ipstat[IP_NSTATS];
465 1.1 cgd
466 1.65 elad if (use_sysctl) {
467 1.65 elad size_t size = sizeof(ipstat);
468 1.65 elad
469 1.82 thorpej if (sysctlbyname("net.inet.ip.stats", ipstat, &size,
470 1.65 elad NULL, 0) == -1)
471 1.88 thorpej return;
472 1.65 elad } else {
473 1.88 thorpej warnx("%s stats not available via KVM.", name);
474 1.88 thorpej return;
475 1.65 elad }
476 1.65 elad
477 1.9 mycroft printf("%s:\n", name);
478 1.9 mycroft
479 1.82 thorpej #define ps(f, m) if (ipstat[f] || sflag <= 1) \
480 1.82 thorpej printf(m, (unsigned long long)ipstat[f])
481 1.82 thorpej #define p(f, m) if (ipstat[f] || sflag <= 1) \
482 1.82 thorpej printf(m, (unsigned long long)ipstat[f], plural(ipstat[f]))
483 1.82 thorpej
484 1.82 thorpej p(IP_STAT_TOTAL, "\t%llu total packet%s received\n");
485 1.82 thorpej p(IP_STAT_BADSUM, "\t%llu bad header checksum%s\n");
486 1.82 thorpej ps(IP_STAT_TOOSMALL, "\t%llu with size smaller than minimum\n");
487 1.82 thorpej ps(IP_STAT_TOOSHORT, "\t%llu with data size < data length\n");
488 1.82 thorpej ps(IP_STAT_TOOLONG, "\t%llu with length > max ip packet size\n");
489 1.82 thorpej ps(IP_STAT_BADHLEN, "\t%llu with header length < data size\n");
490 1.82 thorpej ps(IP_STAT_BADLEN, "\t%llu with data length < header length\n");
491 1.82 thorpej ps(IP_STAT_BADOPTIONS, "\t%llu with bad options\n");
492 1.82 thorpej ps(IP_STAT_BADVERS, "\t%llu with incorrect version number\n");
493 1.82 thorpej p(IP_STAT_FRAGMENTS, "\t%llu fragment%s received\n");
494 1.82 thorpej p(IP_STAT_FRAGDROPPED, "\t%llu fragment%s dropped (dup or out of space)\n");
495 1.82 thorpej p(IP_STAT_RCVMEMDROP, "\t%llu fragment%s dropped (out of ipqent)\n");
496 1.82 thorpej p(IP_STAT_BADFRAGS, "\t%llu malformed fragment%s dropped\n");
497 1.82 thorpej p(IP_STAT_FRAGTIMEOUT, "\t%llu fragment%s dropped after timeout\n");
498 1.82 thorpej p(IP_STAT_REASSEMBLED, "\t%llu packet%s reassembled ok\n");
499 1.82 thorpej p(IP_STAT_DELIVERED, "\t%llu packet%s for this host\n");
500 1.82 thorpej p(IP_STAT_NOPROTO, "\t%llu packet%s for unknown/unsupported protocol\n");
501 1.82 thorpej p(IP_STAT_FORWARD, "\t%llu packet%s forwarded");
502 1.82 thorpej p(IP_STAT_FASTFORWARD, " (%llu packet%s fast forwarded)");
503 1.82 thorpej if (ipstat[IP_STAT_FORWARD] || sflag <= 1)
504 1.29 matt putchar('\n');
505 1.82 thorpej p(IP_STAT_CANTFORWARD, "\t%llu packet%s not forwardable\n");
506 1.82 thorpej p(IP_STAT_REDIRECTSENT, "\t%llu redirect%s sent\n");
507 1.82 thorpej p(IP_STAT_NOGIF, "\t%llu packet%s no matching gif found\n");
508 1.82 thorpej p(IP_STAT_LOCALOUT, "\t%llu packet%s sent from this host\n");
509 1.82 thorpej p(IP_STAT_RAWOUT, "\t%llu packet%s sent with fabricated ip header\n");
510 1.82 thorpej p(IP_STAT_ODROPPED, "\t%llu output packet%s dropped due to no bufs, etc.\n");
511 1.82 thorpej p(IP_STAT_NOROUTE, "\t%llu output packet%s discarded due to no route\n");
512 1.82 thorpej p(IP_STAT_FRAGMENTED, "\t%llu output datagram%s fragmented\n");
513 1.82 thorpej p(IP_STAT_OFRAGMENTS, "\t%llu fragment%s created\n");
514 1.82 thorpej p(IP_STAT_CANTFRAG, "\t%llu datagram%s that can't be fragmented\n");
515 1.82 thorpej p(IP_STAT_BADADDR, "\t%llu datagram%s with bad address in header\n");
516 1.20 christos #undef ps
517 1.9 mycroft #undef p
518 1.1 cgd }
519 1.1 cgd
520 1.79 thorpej static const char *icmpnames[] = {
521 1.1 cgd "echo reply",
522 1.1 cgd "#1",
523 1.1 cgd "#2",
524 1.1 cgd "destination unreachable",
525 1.1 cgd "source quench",
526 1.1 cgd "routing redirect",
527 1.44 itojun "alternate host address",
528 1.1 cgd "#7",
529 1.1 cgd "echo",
530 1.44 itojun "router advertisement",
531 1.44 itojun "router solicitation",
532 1.1 cgd "time exceeded",
533 1.1 cgd "parameter problem",
534 1.1 cgd "time stamp",
535 1.1 cgd "time stamp reply",
536 1.1 cgd "information request",
537 1.1 cgd "information request reply",
538 1.1 cgd "address mask request",
539 1.1 cgd "address mask reply",
540 1.1 cgd };
541 1.1 cgd
542 1.1 cgd /*
543 1.1 cgd * Dump ICMP statistics.
544 1.1 cgd */
545 1.9 mycroft void
546 1.88.8.1 jym icmp_stats(u_long off, const char *name)
547 1.1 cgd {
548 1.79 thorpej uint64_t icmpstat[ICMP_NSTATS];
549 1.23 lukem int i, first;
550 1.1 cgd
551 1.65 elad if (use_sysctl) {
552 1.65 elad size_t size = sizeof(icmpstat);
553 1.65 elad
554 1.79 thorpej if (sysctlbyname("net.inet.icmp.stats", icmpstat, &size,
555 1.65 elad NULL, 0) == -1)
556 1.88 thorpej return;
557 1.65 elad } else {
558 1.88 thorpej warnx("%s stats not available via KVM.", name);
559 1.88 thorpej return;
560 1.65 elad }
561 1.65 elad
562 1.9 mycroft printf("%s:\n", name);
563 1.9 mycroft
564 1.79 thorpej #define p(f, m) if (icmpstat[f] || sflag <= 1) \
565 1.81 jnemeth printf(m, (unsigned long long)icmpstat[f], plural(icmpstat[f]))
566 1.9 mycroft
567 1.79 thorpej p(ICMP_STAT_ERROR, "\t%llu call%s to icmp_error\n");
568 1.79 thorpej p(ICMP_STAT_OLDICMP,
569 1.38 bouyer "\t%llu error%s not generated because old message was icmp\n");
570 1.1 cgd for (first = 1, i = 0; i < ICMP_MAXTYPE + 1; i++)
571 1.79 thorpej if (icmpstat[ICMP_STAT_OUTHIST + i] != 0) {
572 1.1 cgd if (first) {
573 1.1 cgd printf("\tOutput histogram:\n");
574 1.1 cgd first = 0;
575 1.1 cgd }
576 1.38 bouyer printf("\t\t%s: %llu\n", icmpnames[i],
577 1.79 thorpej (unsigned long long)icmpstat[ICMP_STAT_OUTHIST + i]);
578 1.1 cgd }
579 1.79 thorpej p(ICMP_STAT_BADCODE, "\t%llu message%s with bad code fields\n");
580 1.79 thorpej p(ICMP_STAT_TOOSHORT, "\t%llu message%s < minimum length\n");
581 1.79 thorpej p(ICMP_STAT_CHECKSUM, "\t%llu bad checksum%s\n");
582 1.79 thorpej p(ICMP_STAT_BADLEN, "\t%llu message%s with bad length\n");
583 1.1 cgd for (first = 1, i = 0; i < ICMP_MAXTYPE + 1; i++)
584 1.79 thorpej if (icmpstat[ICMP_STAT_INHIST + i] != 0) {
585 1.1 cgd if (first) {
586 1.1 cgd printf("\tInput histogram:\n");
587 1.1 cgd first = 0;
588 1.1 cgd }
589 1.38 bouyer printf("\t\t%s: %llu\n", icmpnames[i],
590 1.79 thorpej (unsigned long long)icmpstat[ICMP_STAT_INHIST + i]);
591 1.1 cgd }
592 1.79 thorpej p(ICMP_STAT_REFLECT, "\t%llu message response%s generated\n");
593 1.79 thorpej p(ICMP_STAT_PMTUCHG, "\t%llu path MTU change%s\n");
594 1.9 mycroft #undef p
595 1.6 brezak }
596 1.6 brezak
597 1.6 brezak /*
598 1.9 mycroft * Dump IGMP statistics structure.
599 1.6 brezak */
600 1.6 brezak void
601 1.88.8.1 jym igmp_stats(u_long off, const char *name)
602 1.6 brezak {
603 1.87 thorpej uint64_t igmpstat[IGMP_NSTATS];
604 1.87 thorpej
605 1.87 thorpej if (use_sysctl) {
606 1.87 thorpej size_t size = sizeof(igmpstat);
607 1.87 thorpej
608 1.87 thorpej if (sysctlbyname("net.inet.igmp.stats", igmpstat, &size,
609 1.87 thorpej NULL, 0) == -1)
610 1.88 thorpej return;
611 1.87 thorpej } else {
612 1.88 thorpej warnx("%s stats not available via KVM.", name);
613 1.88 thorpej return;
614 1.87 thorpej }
615 1.6 brezak
616 1.9 mycroft printf("%s:\n", name);
617 1.9 mycroft
618 1.87 thorpej #define p(f, m) if (igmpstat[f] || sflag <= 1) \
619 1.87 thorpej printf(m, (unsigned long long)igmpstat[f], plural(igmpstat[f]))
620 1.87 thorpej #define py(f, m) if (igmpstat[f] || sflag <= 1) \
621 1.87 thorpej printf(m, (unsigned long long)igmpstat[f], igmpstat[f] != 1 ? "ies" : "y")
622 1.87 thorpej p(IGMP_STAT_RCV_TOTAL, "\t%llu message%s received\n");
623 1.87 thorpej p(IGMP_STAT_RCV_TOOSHORT, "\t%llu message%s received with too few bytes\n");
624 1.87 thorpej p(IGMP_STAT_RCV_BADSUM, "\t%llu message%s received with bad checksum\n");
625 1.87 thorpej py(IGMP_STAT_RCV_QUERIES, "\t%llu membership quer%s received\n");
626 1.87 thorpej py(IGMP_STAT_RCV_BADQUERIES, "\t%llu membership quer%s received with invalid field(s)\n");
627 1.87 thorpej p(IGMP_STAT_RCV_REPORTS, "\t%llu membership report%s received\n");
628 1.87 thorpej p(IGMP_STAT_RCV_BADREPORTS, "\t%llu membership report%s received with invalid field(s)\n");
629 1.87 thorpej p(IGMP_STAT_RCV_OURREPORTS, "\t%llu membership report%s received for groups to which we belong\n");
630 1.87 thorpej p(IGMP_STAT_SND_REPORTS, "\t%llu membership report%s sent\n");
631 1.9 mycroft #undef p
632 1.9 mycroft #undef py
633 1.41 jhawk }
634 1.41 jhawk
635 1.41 jhawk /*
636 1.69 liamjfoy * Dump CARP statistics structure.
637 1.69 liamjfoy */
638 1.69 liamjfoy void
639 1.88.8.1 jym carp_stats(u_long off, const char *name)
640 1.69 liamjfoy {
641 1.85 thorpej uint64_t carpstat[CARP_NSTATS];
642 1.69 liamjfoy
643 1.69 liamjfoy if (use_sysctl) {
644 1.69 liamjfoy size_t size = sizeof(carpstat);
645 1.69 liamjfoy
646 1.85 thorpej if (sysctlbyname("net.inet.carp.stats", carpstat, &size,
647 1.88 thorpej NULL, 0) == -1)
648 1.73 rpaulo return;
649 1.69 liamjfoy } else {
650 1.88 thorpej warnx("%s stats not available via KVM.", name);
651 1.88 thorpej return;
652 1.69 liamjfoy }
653 1.69 liamjfoy
654 1.69 liamjfoy printf("%s:\n", name);
655 1.69 liamjfoy
656 1.85 thorpej #define p(f, m) if (carpstat[f] || sflag <= 1) \
657 1.85 thorpej printf(m, carpstat[f], plural(carpstat[f]))
658 1.85 thorpej #define p2(f, m) if (carpstat[f] || sflag <= 1) \
659 1.85 thorpej printf(m, carpstat[f])
660 1.85 thorpej
661 1.85 thorpej p(CARP_STAT_IPACKETS, "\t%" PRIu64 " packet%s received (IPv4)\n");
662 1.85 thorpej p(CARP_STAT_IPACKETS6, "\t%" PRIu64 " packet%s received (IPv6)\n");
663 1.85 thorpej p(CARP_STAT_BADIF,
664 1.70 riz "\t\t%" PRIu64 " packet%s discarded for bad interface\n");
665 1.85 thorpej p(CARP_STAT_BADTTL,
666 1.70 riz "\t\t%" PRIu64 " packet%s discarded for wrong TTL\n");
667 1.85 thorpej p(CARP_STAT_HDROPS, "\t\t%" PRIu64 " packet%s shorter than header\n");
668 1.85 thorpej p(CARP_STAT_BADSUM, "\t\t%" PRIu64
669 1.70 riz " packet%s discarded for bad checksum\n");
670 1.85 thorpej p(CARP_STAT_BADVER,
671 1.70 riz "\t\t%" PRIu64 " packet%s discarded with a bad version\n");
672 1.85 thorpej p2(CARP_STAT_BADLEN,
673 1.70 riz "\t\t%" PRIu64 " discarded because packet was too short\n");
674 1.85 thorpej p(CARP_STAT_BADAUTH,
675 1.70 riz "\t\t%" PRIu64 " packet%s discarded for bad authentication\n");
676 1.85 thorpej p(CARP_STAT_BADVHID, "\t\t%" PRIu64 " packet%s discarded for bad vhid\n");
677 1.85 thorpej p(CARP_STAT_BADADDRS, "\t\t%" PRIu64
678 1.70 riz " packet%s discarded because of a bad address list\n");
679 1.85 thorpej p(CARP_STAT_OPACKETS, "\t%" PRIu64 " packet%s sent (IPv4)\n");
680 1.85 thorpej p(CARP_STAT_OPACKETS6, "\t%" PRIu64 " packet%s sent (IPv6)\n");
681 1.85 thorpej p2(CARP_STAT_ONOMEM,
682 1.70 riz "\t\t%" PRIu64 " send failed due to mbuf memory error\n");
683 1.69 liamjfoy #undef p
684 1.69 liamjfoy #undef p2
685 1.69 liamjfoy }
686 1.69 liamjfoy
687 1.69 liamjfoy /*
688 1.62 manu * Dump PIM statistics structure.
689 1.62 manu */
690 1.62 manu void
691 1.88.8.1 jym pim_stats(u_long off, const char *name)
692 1.62 manu {
693 1.62 manu struct pimstat pimstat;
694 1.62 manu
695 1.62 manu if (off == 0)
696 1.62 manu return;
697 1.62 manu if (kread(off, (char *)&pimstat, sizeof (pimstat)) != 0) {
698 1.62 manu /* XXX: PIM is probably not enabled in the kernel */
699 1.62 manu return;
700 1.62 manu }
701 1.62 manu
702 1.62 manu printf("%s:\n", name);
703 1.62 manu
704 1.62 manu #define p(f, m) if (pimstat.f || sflag <= 1) \
705 1.63 martin printf(m, (unsigned long long)pimstat.f, plural(pimstat.f))
706 1.62 manu
707 1.62 manu p(pims_rcv_total_msgs, "\t%llu message%s received\n");
708 1.62 manu p(pims_rcv_total_bytes, "\t%llu byte%s received\n");
709 1.62 manu p(pims_rcv_tooshort, "\t%llu message%s received with too few bytes\n");
710 1.62 manu p(pims_rcv_badsum, "\t%llu message%s received with bad checksum\n");
711 1.62 manu p(pims_rcv_badversion, "\t%llu message%s received with bad version\n");
712 1.62 manu p(pims_rcv_registers_msgs, "\t%llu data register message%s received\n");
713 1.62 manu p(pims_rcv_registers_bytes, "\t%llu data register byte%s received\n");
714 1.62 manu p(pims_rcv_registers_wrongiif, "\t%llu data register message%s received on wrong iif\n");
715 1.62 manu p(pims_rcv_badregisters, "\t%llu bad register%s received\n");
716 1.62 manu p(pims_snd_registers_msgs, "\t%llu data register message%s sent\n");
717 1.62 manu p(pims_snd_registers_bytes, "\t%llu data register byte%s sent\n");
718 1.62 manu #undef p
719 1.62 manu }
720 1.62 manu
721 1.62 manu /*
722 1.41 jhawk * Dump the ARP statistics structure.
723 1.41 jhawk */
724 1.41 jhawk void
725 1.88.8.1 jym arp_stats(u_long off, const char *name)
726 1.41 jhawk {
727 1.86 thorpej uint64_t arpstat[ARP_NSTATS];
728 1.86 thorpej
729 1.86 thorpej if (use_sysctl) {
730 1.86 thorpej size_t size = sizeof(arpstat);
731 1.86 thorpej
732 1.86 thorpej if (sysctlbyname("net.inet.arp.stats", arpstat, &size,
733 1.88 thorpej NULL, 0) == -1)
734 1.86 thorpej return;
735 1.86 thorpej } else {
736 1.88 thorpej warnx("%s stats not available via KVM.", name);
737 1.88 thorpej return;
738 1.86 thorpej }
739 1.41 jhawk
740 1.41 jhawk printf("%s:\n", name);
741 1.41 jhawk
742 1.86 thorpej #define ps(f, m) if (arpstat[f] || sflag <= 1) \
743 1.86 thorpej printf(m, (unsigned long long)arpstat[f])
744 1.86 thorpej #define p(f, m) if (arpstat[f] || sflag <= 1) \
745 1.86 thorpej printf(m, (unsigned long long)arpstat[f], plural(arpstat[f]))
746 1.86 thorpej
747 1.86 thorpej p(ARP_STAT_SNDTOTAL, "\t%llu packet%s sent\n");
748 1.86 thorpej p(ARP_STAT_SNDREPLY, "\t\t%llu reply packet%s\n");
749 1.86 thorpej p(ARP_STAT_SENDREQUEST, "\t\t%llu request packet%s\n");
750 1.86 thorpej
751 1.86 thorpej p(ARP_STAT_RCVTOTAL, "\t%llu packet%s received\n");
752 1.86 thorpej p(ARP_STAT_RCVREPLY, "\t\t%llu reply packet%s\n");
753 1.86 thorpej p(ARP_STAT_RCVREQUEST, "\t\t%llu valid request packet%s\n");
754 1.86 thorpej p(ARP_STAT_RCVMCAST, "\t\t%llu broadcast/multicast packet%s\n");
755 1.86 thorpej p(ARP_STAT_RCVBADPROTO, "\t\t%llu packet%s with unknown protocol type\n");
756 1.86 thorpej p(ARP_STAT_RCVBADLEN, "\t\t%llu packet%s with bad (short) length\n");
757 1.86 thorpej p(ARP_STAT_RCVZEROTPA, "\t\t%llu packet%s with null target IP address\n");
758 1.86 thorpej p(ARP_STAT_RCVZEROSPA, "\t\t%llu packet%s with null source IP address\n");
759 1.86 thorpej ps(ARP_STAT_RCVNOINT, "\t\t%llu could not be mapped to an interface\n");
760 1.86 thorpej p(ARP_STAT_RCVLOCALSHA, "\t\t%llu packet%s sourced from a local hardware "
761 1.41 jhawk "address\n");
762 1.86 thorpej p(ARP_STAT_RCVBCASTSHA, "\t\t%llu packet%s with a broadcast "
763 1.41 jhawk "source hardware address\n");
764 1.86 thorpej p(ARP_STAT_RCVLOCALSPA, "\t\t%llu duplicate%s for a local IP address\n");
765 1.86 thorpej p(ARP_STAT_RCVOVERPERM, "\t\t%llu attempt%s to overwrite a static entry\n");
766 1.86 thorpej p(ARP_STAT_RCVOVERINT, "\t\t%llu packet%s received on wrong interface\n");
767 1.86 thorpej p(ARP_STAT_RCVOVER, "\t\t%llu entry%s overwritten\n");
768 1.86 thorpej p(ARP_STAT_RCVLENCHG, "\t\t%llu change%s in hardware address length\n");
769 1.86 thorpej
770 1.86 thorpej p(ARP_STAT_DFRTOTAL, "\t%llu packet%s deferred pending ARP resolution\n");
771 1.86 thorpej ps(ARP_STAT_DFRSENT, "\t\t%llu sent\n");
772 1.86 thorpej ps(ARP_STAT_DFRDROPPED, "\t\t%llu dropped\n");
773 1.41 jhawk
774 1.86 thorpej p(ARP_STAT_ALLOCFAIL, "\t%llu failure%s to allocate llinfo\n");
775 1.41 jhawk
776 1.41 jhawk #undef ps
777 1.41 jhawk #undef p
778 1.1 cgd }
779 1.1 cgd
780 1.1 cgd /*
781 1.1 cgd * Pretty print an Internet address (net address + port).
782 1.46 assar * Take numeric_addr and numeric_port into consideration.
783 1.1 cgd */
784 1.9 mycroft void
785 1.84 thorpej inetprint(struct in_addr *in, uint16_t port, const char *proto,
786 1.88.8.1 jym int port_numeric)
787 1.1 cgd {
788 1.1 cgd struct servent *sp = 0;
789 1.9 mycroft char line[80], *cp;
790 1.33 sommerfe size_t space;
791 1.1 cgd
792 1.32 mrg (void)snprintf(line, sizeof line, "%.*s.",
793 1.46 assar (Aflag && !numeric_addr) ? 12 : 16, inetname(in));
794 1.23 lukem cp = strchr(line, '\0');
795 1.88.8.1 jym if (!port_numeric && port)
796 1.1 cgd sp = getservbyport((int)port, proto);
797 1.33 sommerfe space = sizeof line - (cp-line);
798 1.1 cgd if (sp || port == 0)
799 1.55 jdolecek (void)snprintf(cp, space, "%s", sp ? sp->s_name : "*");
800 1.1 cgd else
801 1.33 sommerfe (void)snprintf(cp, space, "%u", ntohs(port));
802 1.32 mrg (void)printf(" %-*.*s", width, width, line);
803 1.1 cgd }
804 1.1 cgd
805 1.1 cgd /*
806 1.1 cgd * Construct an Internet address representation.
807 1.46 assar * If numeric_addr has been supplied, give
808 1.1 cgd * numeric value, otherwise try for symbolic name.
809 1.1 cgd */
810 1.1 cgd char *
811 1.84 thorpej inetname(struct in_addr *inp)
812 1.1 cgd {
813 1.23 lukem char *cp;
814 1.1 cgd static char line[50];
815 1.1 cgd struct hostent *hp;
816 1.1 cgd struct netent *np;
817 1.1 cgd static char domain[MAXHOSTNAMELEN + 1];
818 1.1 cgd static int first = 1;
819 1.1 cgd
820 1.46 assar if (first && !numeric_addr) {
821 1.1 cgd first = 0;
822 1.31 mrg if (gethostname(domain, sizeof domain) == 0) {
823 1.31 mrg domain[sizeof(domain) - 1] = '\0';
824 1.31 mrg if ((cp = strchr(domain, '.')))
825 1.45 itojun (void) strlcpy(domain, cp + 1, sizeof(domain));
826 1.31 mrg else
827 1.31 mrg domain[0] = 0;
828 1.31 mrg } else
829 1.1 cgd domain[0] = 0;
830 1.1 cgd }
831 1.1 cgd cp = 0;
832 1.46 assar if (!numeric_addr && inp->s_addr != INADDR_ANY) {
833 1.9 mycroft int net = inet_netof(*inp);
834 1.9 mycroft int lna = inet_lnaof(*inp);
835 1.1 cgd
836 1.1 cgd if (lna == INADDR_ANY) {
837 1.1 cgd np = getnetbyaddr(net, AF_INET);
838 1.1 cgd if (np)
839 1.1 cgd cp = np->n_name;
840 1.1 cgd }
841 1.1 cgd if (cp == 0) {
842 1.9 mycroft hp = gethostbyaddr((char *)inp, sizeof (*inp), AF_INET);
843 1.1 cgd if (hp) {
844 1.23 lukem if ((cp = strchr(hp->h_name, '.')) &&
845 1.1 cgd !strcmp(cp + 1, domain))
846 1.1 cgd *cp = 0;
847 1.1 cgd cp = hp->h_name;
848 1.1 cgd }
849 1.1 cgd }
850 1.1 cgd }
851 1.9 mycroft if (inp->s_addr == INADDR_ANY)
852 1.56 itojun strlcpy(line, "*", sizeof line);
853 1.1 cgd else if (cp)
854 1.56 itojun strlcpy(line, cp, sizeof line);
855 1.1 cgd else {
856 1.9 mycroft inp->s_addr = ntohl(inp->s_addr);
857 1.1 cgd #define C(x) ((x) & 0xff)
858 1.32 mrg (void)snprintf(line, sizeof line, "%u.%u.%u.%u",
859 1.32 mrg C(inp->s_addr >> 24), C(inp->s_addr >> 16),
860 1.32 mrg C(inp->s_addr >> 8), C(inp->s_addr));
861 1.32 mrg #undef C
862 1.1 cgd }
863 1.1 cgd return (line);
864 1.30 thorpej }
865 1.30 thorpej
866 1.30 thorpej /*
867 1.30 thorpej * Dump the contents of a TCP PCB.
868 1.30 thorpej */
869 1.30 thorpej void
870 1.84 thorpej tcp_dump(u_long pcbaddr)
871 1.30 thorpej {
872 1.78 ad callout_impl_t *ci;
873 1.30 thorpej struct tcpcb tcpcb;
874 1.54 thorpej int i, hardticks;
875 1.30 thorpej
876 1.30 thorpej kread(pcbaddr, (char *)&tcpcb, sizeof(tcpcb));
877 1.54 thorpej hardticks = get_hardticks();
878 1.30 thorpej
879 1.30 thorpej printf("TCP Protocol Control Block at 0x%08lx:\n\n", pcbaddr);
880 1.30 thorpej
881 1.30 thorpej printf("Timers:\n");
882 1.48 thorpej for (i = 0; i < TCPT_NTIMERS; i++) {
883 1.78 ad ci = (callout_impl_t *)&tcpcb.t_timer[i];
884 1.54 thorpej printf("\t%s: %d", tcptimers[i],
885 1.78 ad (ci->c_flags & CALLOUT_PENDING) ?
886 1.78 ad ci->c_time - hardticks : 0);
887 1.48 thorpej }
888 1.30 thorpej printf("\n\n");
889 1.30 thorpej
890 1.30 thorpej if (tcpcb.t_state < 0 || tcpcb.t_state >= TCP_NSTATES)
891 1.30 thorpej printf("State: %d", tcpcb.t_state);
892 1.30 thorpej else
893 1.30 thorpej printf("State: %s", tcpstates[tcpcb.t_state]);
894 1.49 thorpej printf(", flags 0x%x, inpcb 0x%lx, in6pcb 0x%lx\n\n", tcpcb.t_flags,
895 1.49 thorpej (u_long)tcpcb.t_inpcb, (u_long)tcpcb.t_in6pcb);
896 1.30 thorpej
897 1.30 thorpej printf("rxtshift %d, rxtcur %d, dupacks %d\n", tcpcb.t_rxtshift,
898 1.30 thorpej tcpcb.t_rxtcur, tcpcb.t_dupacks);
899 1.30 thorpej printf("peermss %u, ourmss %u, segsz %u\n\n", tcpcb.t_peermss,
900 1.30 thorpej tcpcb.t_ourmss, tcpcb.t_segsz);
901 1.30 thorpej
902 1.30 thorpej printf("snd_una %u, snd_nxt %u, snd_up %u\n",
903 1.30 thorpej tcpcb.snd_una, tcpcb.snd_nxt, tcpcb.snd_up);
904 1.30 thorpej printf("snd_wl1 %u, snd_wl2 %u, iss %u, snd_wnd %lu\n\n",
905 1.30 thorpej tcpcb.snd_wl1, tcpcb.snd_wl2, tcpcb.iss, tcpcb.snd_wnd);
906 1.30 thorpej
907 1.30 thorpej printf("rcv_wnd %lu, rcv_nxt %u, rcv_up %u, irs %u\n\n",
908 1.30 thorpej tcpcb.rcv_wnd, tcpcb.rcv_nxt, tcpcb.rcv_up, tcpcb.irs);
909 1.30 thorpej
910 1.30 thorpej printf("rcv_adv %u, snd_max %u, snd_cwnd %lu, snd_ssthresh %lu\n",
911 1.30 thorpej tcpcb.rcv_adv, tcpcb.snd_max, tcpcb.snd_cwnd, tcpcb.snd_ssthresh);
912 1.30 thorpej
913 1.47 thorpej printf("rcvtime %u, rtttime %u, rtseq %u, srtt %d, rttvar %d, "
914 1.47 thorpej "rttmin %d, max_sndwnd %lu\n\n", tcpcb.t_rcvtime, tcpcb.t_rtttime,
915 1.47 thorpej tcpcb.t_rtseq, tcpcb.t_srtt, tcpcb.t_rttvar, tcpcb.t_rttmin,
916 1.47 thorpej tcpcb.max_sndwnd);
917 1.30 thorpej
918 1.30 thorpej printf("oobflags %d, iobc %d, softerror %d\n\n", tcpcb.t_oobflags,
919 1.30 thorpej tcpcb.t_iobc, tcpcb.t_softerror);
920 1.30 thorpej
921 1.30 thorpej printf("snd_scale %d, rcv_scale %d, req_r_scale %d, req_s_scale %d\n",
922 1.30 thorpej tcpcb.snd_scale, tcpcb.rcv_scale, tcpcb.request_r_scale,
923 1.30 thorpej tcpcb.requested_s_scale);
924 1.30 thorpej printf("ts_recent %u, ts_regent_age %d, last_ack_sent %u\n",
925 1.30 thorpej tcpcb.ts_recent, tcpcb.ts_recent_age, tcpcb.last_ack_sent);
926 1.1 cgd }
927