inet.c revision 1.94 1 1.94 dyoung /* $NetBSD: inet.c,v 1.94 2011/03/01 19:01:59 dyoung Exp $ */
2 1.14 thorpej
3 1.1 cgd /*
4 1.9 mycroft * Copyright (c) 1983, 1988, 1993
5 1.9 mycroft * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * Redistribution and use in source and binary forms, with or without
8 1.1 cgd * modification, are permitted provided that the following conditions
9 1.1 cgd * are met:
10 1.1 cgd * 1. Redistributions of source code must retain the above copyright
11 1.1 cgd * notice, this list of conditions and the following disclaimer.
12 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 cgd * notice, this list of conditions and the following disclaimer in the
14 1.1 cgd * documentation and/or other materials provided with the distribution.
15 1.58 agc * 3. Neither the name of the University nor the names of its contributors
16 1.1 cgd * may be used to endorse or promote products derived from this software
17 1.1 cgd * without specific prior written permission.
18 1.1 cgd *
19 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 1.1 cgd * SUCH DAMAGE.
30 1.1 cgd */
31 1.1 cgd
32 1.23 lukem #include <sys/cdefs.h>
33 1.1 cgd #ifndef lint
34 1.14 thorpej #if 0
35 1.14 thorpej static char sccsid[] = "from: @(#)inet.c 8.4 (Berkeley) 4/20/94";
36 1.14 thorpej #else
37 1.94 dyoung __RCSID("$NetBSD: inet.c,v 1.94 2011/03/01 19:01:59 dyoung Exp $");
38 1.14 thorpej #endif
39 1.1 cgd #endif /* not lint */
40 1.1 cgd
41 1.78 ad #define _CALLOUT_PRIVATE /* for defs in sys/callout.h */
42 1.78 ad
43 1.1 cgd #include <sys/param.h>
44 1.10 cgd #include <sys/queue.h>
45 1.1 cgd #include <sys/socket.h>
46 1.1 cgd #include <sys/socketvar.h>
47 1.1 cgd #include <sys/mbuf.h>
48 1.1 cgd #include <sys/protosw.h>
49 1.65 elad #include <sys/sysctl.h>
50 1.1 cgd
51 1.41 jhawk #include <net/if_arp.h>
52 1.1 cgd #include <net/route.h>
53 1.1 cgd #include <netinet/in.h>
54 1.1 cgd #include <netinet/in_systm.h>
55 1.1 cgd #include <netinet/ip.h>
56 1.1 cgd #include <netinet/in_pcb.h>
57 1.1 cgd #include <netinet/ip_icmp.h>
58 1.37 itojun
59 1.37 itojun #ifdef INET6
60 1.37 itojun #include <netinet/ip6.h>
61 1.37 itojun #endif
62 1.37 itojun
63 1.1 cgd #include <netinet/icmp_var.h>
64 1.6 brezak #include <netinet/igmp_var.h>
65 1.1 cgd #include <netinet/ip_var.h>
66 1.62 manu #include <netinet/pim_var.h>
67 1.1 cgd #include <netinet/tcp.h>
68 1.1 cgd #include <netinet/tcpip.h>
69 1.1 cgd #include <netinet/tcp_seq.h>
70 1.1 cgd #define TCPSTATES
71 1.1 cgd #include <netinet/tcp_fsm.h>
72 1.30 thorpej #define TCPTIMERS
73 1.1 cgd #include <netinet/tcp_timer.h>
74 1.1 cgd #include <netinet/tcp_var.h>
75 1.1 cgd #include <netinet/tcp_debug.h>
76 1.1 cgd #include <netinet/udp.h>
77 1.69 liamjfoy #include <netinet/ip_carp.h>
78 1.1 cgd #include <netinet/udp_var.h>
79 1.1 cgd
80 1.9 mycroft #include <arpa/inet.h>
81 1.64 rpaulo #include <kvm.h>
82 1.1 cgd #include <netdb.h>
83 1.1 cgd #include <stdio.h>
84 1.1 cgd #include <string.h>
85 1.9 mycroft #include <unistd.h>
86 1.66 elad #include <stdlib.h>
87 1.65 elad #include <err.h>
88 1.9 mycroft #include "netstat.h"
89 1.93 pooka #include "prog_ops.h"
90 1.1 cgd
91 1.84 thorpej char *inetname(struct in_addr *);
92 1.84 thorpej void inetprint(struct in_addr *, u_int16_t, const char *, int);
93 1.1 cgd
94 1.1 cgd /*
95 1.1 cgd * Print a summary of connections related to an Internet
96 1.1 cgd * protocol. For TCP, also give state of connection.
97 1.1 cgd * Listening processes (aflag) are suppressed unless the
98 1.1 cgd * -a (all) flag is specified.
99 1.1 cgd */
100 1.35 lukem static int width;
101 1.66 elad static int compact;
102 1.66 elad
103 1.66 elad static void
104 1.66 elad protoprhdr(void)
105 1.66 elad {
106 1.66 elad printf("Active Internet connections");
107 1.66 elad if (aflag)
108 1.66 elad printf(" (including servers)");
109 1.66 elad putchar('\n');
110 1.66 elad if (Aflag)
111 1.66 elad printf("%-8.8s ", "PCB");
112 1.66 elad printf("%-5.5s %-6.6s %-6.6s %s%-*.*s %-*.*s %s\n",
113 1.66 elad "Proto", "Recv-Q", "Send-Q", compact ? "" : " ",
114 1.66 elad width, width, "Local Address",
115 1.66 elad width, width, "Foreign Address",
116 1.66 elad "State");
117 1.66 elad }
118 1.66 elad
119 1.66 elad static void
120 1.67 he protopr0(intptr_t ppcb, u_long rcv_sb_cc, u_long snd_sb_cc,
121 1.66 elad struct in_addr *laddr, u_int16_t lport,
122 1.66 elad struct in_addr *faddr, u_int16_t fport,
123 1.90 lukem short t_state, const char *name, int inp_flags)
124 1.66 elad {
125 1.83 thorpej static const char *shorttcpstates[] = {
126 1.66 elad "CLOSED", "LISTEN", "SYNSEN", "SYSRCV",
127 1.66 elad "ESTABL", "CLWAIT", "FWAIT1", "CLOSNG",
128 1.66 elad "LASTAK", "FWAIT2", "TMWAIT",
129 1.66 elad };
130 1.66 elad int istcp;
131 1.66 elad
132 1.66 elad istcp = strcmp(name, "tcp") == 0;
133 1.66 elad
134 1.66 elad if (Aflag) {
135 1.68 elad printf("%8" PRIxPTR " ", ppcb);
136 1.66 elad }
137 1.66 elad printf("%-5.5s %6ld %6ld%s", name, rcv_sb_cc, snd_sb_cc,
138 1.66 elad compact ? "" : " ");
139 1.66 elad if (numeric_port) {
140 1.66 elad inetprint(laddr, lport, name, 1);
141 1.66 elad inetprint(faddr, fport, name, 1);
142 1.90 lukem } else if (inp_flags & INP_ANONPORT) {
143 1.66 elad inetprint(laddr, lport, name, 1);
144 1.66 elad inetprint(faddr, fport, name, 0);
145 1.66 elad } else {
146 1.66 elad inetprint(laddr, lport, name, 0);
147 1.66 elad inetprint(faddr, fport, name, 0);
148 1.66 elad }
149 1.66 elad if (istcp) {
150 1.66 elad if (t_state < 0 || t_state >= TCP_NSTATES)
151 1.66 elad printf(" %d", t_state);
152 1.66 elad else
153 1.66 elad printf(" %s", compact ? shorttcpstates[t_state] :
154 1.66 elad tcpstates[t_state]);
155 1.66 elad }
156 1.66 elad putchar('\n');
157 1.66 elad }
158 1.35 lukem
159 1.9 mycroft void
160 1.90 lukem protopr(u_long off, const char *name)
161 1.1 cgd {
162 1.12 mycroft struct inpcbtable table;
163 1.23 lukem struct inpcb *head, *next, *prev;
164 1.13 cgd struct inpcb inpcb;
165 1.90 lukem struct tcpcb tcpcb;
166 1.90 lukem struct socket sockb;
167 1.66 elad int istcp;
168 1.1 cgd static int first = 1;
169 1.1 cgd
170 1.35 lukem compact = 0;
171 1.35 lukem if (Aflag) {
172 1.46 assar if (!numeric_addr)
173 1.35 lukem width = 18;
174 1.35 lukem else {
175 1.35 lukem width = 21;
176 1.35 lukem compact = 1;
177 1.35 lukem }
178 1.35 lukem } else
179 1.35 lukem width = 22;
180 1.66 elad
181 1.66 elad if (use_sysctl) {
182 1.66 elad struct kinfo_pcb *pcblist;
183 1.66 elad int mib[8];
184 1.66 elad size_t namelen = 0, size = 0, i;
185 1.66 elad char *mibname = NULL;
186 1.66 elad
187 1.66 elad memset(mib, 0, sizeof(mib));
188 1.66 elad
189 1.66 elad if (asprintf(&mibname, "net.inet.%s.pcblist", name) == -1)
190 1.66 elad err(1, "asprintf");
191 1.66 elad
192 1.66 elad /* get dynamic pcblist node */
193 1.66 elad if (sysctlnametomib(mibname, mib, &namelen) == -1)
194 1.77 elad err(1, "sysctlnametomib: %s", mibname);
195 1.66 elad
196 1.93 pooka if (prog_sysctl(mib, sizeof(mib) / sizeof(*mib),
197 1.93 pooka NULL, &size, NULL, 0) == -1)
198 1.66 elad err(1, "sysctl (query)");
199 1.66 elad
200 1.71 liamjfoy if ((pcblist = malloc(size)) == NULL)
201 1.71 liamjfoy err(1, "malloc");
202 1.66 elad memset(pcblist, 0, size);
203 1.66 elad
204 1.66 elad mib[6] = sizeof(*pcblist);
205 1.66 elad mib[7] = size / sizeof(*pcblist);
206 1.66 elad
207 1.93 pooka if (prog_sysctl(mib, sizeof(mib) / sizeof(*mib),
208 1.93 pooka pcblist, &size, NULL, 0) == -1)
209 1.66 elad err(1, "sysctl (copy)");
210 1.66 elad
211 1.66 elad for (i = 0; i < size / sizeof(*pcblist); i++) {
212 1.66 elad struct sockaddr_in src, dst;
213 1.66 elad
214 1.66 elad memcpy(&src, &pcblist[i].ki_s, sizeof(src));
215 1.66 elad memcpy(&dst, &pcblist[i].ki_d, sizeof(dst));
216 1.66 elad
217 1.89 dholland if (!aflag &&
218 1.89 dholland inet_lnaof(dst.sin_addr) == INADDR_ANY)
219 1.89 dholland continue;
220 1.89 dholland
221 1.66 elad if (first) {
222 1.66 elad protoprhdr();
223 1.66 elad first = 0;
224 1.66 elad }
225 1.66 elad
226 1.67 he protopr0((intptr_t) pcblist[i].ki_ppcbaddr,
227 1.66 elad pcblist[i].ki_rcvq, pcblist[i].ki_sndq,
228 1.66 elad &src.sin_addr, src.sin_port,
229 1.66 elad &dst.sin_addr, dst.sin_port,
230 1.90 lukem pcblist[i].ki_tstate, name,
231 1.90 lukem pcblist[i].ki_pflags);
232 1.66 elad }
233 1.66 elad
234 1.66 elad free(pcblist);
235 1.66 elad return;
236 1.66 elad }
237 1.66 elad
238 1.72 elad if (off == 0)
239 1.72 elad return;
240 1.72 elad istcp = strcmp(name, "tcp") == 0;
241 1.72 elad kread(off, (char *)&table, sizeof table);
242 1.72 elad prev = head =
243 1.72 elad (struct inpcb *)&((struct inpcbtable *)off)->inpt_queue.cqh_first;
244 1.72 elad next = (struct inpcb *)table.inpt_queue.cqh_first;
245 1.72 elad
246 1.13 cgd while (next != head) {
247 1.12 mycroft kread((u_long)next, (char *)&inpcb, sizeof inpcb);
248 1.59 itojun if ((struct inpcb *)inpcb.inp_queue.cqe_prev != prev) {
249 1.1 cgd printf("???\n");
250 1.1 cgd break;
251 1.1 cgd }
252 1.13 cgd prev = next;
253 1.59 itojun next = (struct inpcb *)inpcb.inp_queue.cqe_next;
254 1.59 itojun
255 1.59 itojun if (inpcb.inp_af != AF_INET)
256 1.59 itojun continue;
257 1.13 cgd
258 1.1 cgd if (!aflag &&
259 1.89 dholland inet_lnaof(inpcb.inp_faddr) == INADDR_ANY)
260 1.1 cgd continue;
261 1.9 mycroft kread((u_long)inpcb.inp_socket, (char *)&sockb, sizeof (sockb));
262 1.1 cgd if (istcp) {
263 1.9 mycroft kread((u_long)inpcb.inp_ppcb,
264 1.9 mycroft (char *)&tcpcb, sizeof (tcpcb));
265 1.1 cgd }
266 1.66 elad
267 1.1 cgd if (first) {
268 1.66 elad protoprhdr();
269 1.1 cgd first = 0;
270 1.1 cgd }
271 1.66 elad
272 1.67 he protopr0(istcp ? (intptr_t) inpcb.inp_ppcb : (intptr_t) prev,
273 1.66 elad sockb.so_rcv.sb_cc, sockb.so_snd.sb_cc,
274 1.66 elad &inpcb.inp_laddr, inpcb.inp_lport,
275 1.66 elad &inpcb.inp_faddr, inpcb.inp_fport,
276 1.90 lukem tcpcb.t_state, name, inpcb.inp_flags);
277 1.1 cgd }
278 1.1 cgd }
279 1.1 cgd
280 1.1 cgd /*
281 1.1 cgd * Dump TCP statistics structure.
282 1.1 cgd */
283 1.9 mycroft void
284 1.90 lukem tcp_stats(u_long off, const char *name)
285 1.1 cgd {
286 1.83 thorpej uint64_t tcpstat[TCP_NSTATS];
287 1.1 cgd
288 1.65 elad if (use_sysctl) {
289 1.65 elad size_t size = sizeof(tcpstat);
290 1.65 elad
291 1.83 thorpej if (sysctlbyname("net.inet.tcp.stats", tcpstat, &size,
292 1.65 elad NULL, 0) == -1)
293 1.88 thorpej return;
294 1.65 elad } else {
295 1.88 thorpej warnx("%s stats not available via KVM.", name);
296 1.88 thorpej return;
297 1.65 elad }
298 1.65 elad
299 1.1 cgd printf ("%s:\n", name);
300 1.9 mycroft
301 1.83 thorpej #define ps(f, m) if (tcpstat[f] || sflag <= 1) \
302 1.83 thorpej printf(m, (unsigned long long)tcpstat[f])
303 1.83 thorpej #define p(f, m) if (tcpstat[f] || sflag <= 1) \
304 1.83 thorpej printf(m, (unsigned long long)tcpstat[f], plural(tcpstat[f]))
305 1.83 thorpej #define p2(f1, f2, m) if (tcpstat[f1] || tcpstat[f2] || sflag <= 1) \
306 1.83 thorpej printf(m, (unsigned long long)tcpstat[f1], plural(tcpstat[f1]), \
307 1.83 thorpej (unsigned long long)tcpstat[f2], plural(tcpstat[f2]))
308 1.83 thorpej #define p2s(f1, f2, m) if (tcpstat[f1] || tcpstat[f2] || sflag <= 1) \
309 1.83 thorpej printf(m, (unsigned long long)tcpstat[f1], plural(tcpstat[f1]), \
310 1.83 thorpej (unsigned long long)tcpstat[f2])
311 1.83 thorpej #define p3(f, m) if (tcpstat[f] || sflag <= 1) \
312 1.83 thorpej printf(m, (unsigned long long)tcpstat[f], plurales(tcpstat[f]))
313 1.1 cgd
314 1.83 thorpej p(TCP_STAT_SNDTOTAL, "\t%llu packet%s sent\n");
315 1.83 thorpej p2(TCP_STAT_SNDPACK,TCP_STAT_SNDBYTE,
316 1.38 bouyer "\t\t%llu data packet%s (%llu byte%s)\n");
317 1.83 thorpej p2(TCP_STAT_SNDREXMITPACK, TCP_STAT_SNDREXMITBYTE,
318 1.38 bouyer "\t\t%llu data packet%s (%llu byte%s) retransmitted\n");
319 1.83 thorpej p2s(TCP_STAT_SNDACKS, TCP_STAT_DELACK,
320 1.38 bouyer "\t\t%llu ack-only packet%s (%llu delayed)\n");
321 1.83 thorpej p(TCP_STAT_SNDURG, "\t\t%llu URG only packet%s\n");
322 1.83 thorpej p(TCP_STAT_SNDPROBE, "\t\t%llu window probe packet%s\n");
323 1.83 thorpej p(TCP_STAT_SNDWINUP, "\t\t%llu window update packet%s\n");
324 1.83 thorpej p(TCP_STAT_SNDCTRL, "\t\t%llu control packet%s\n");
325 1.83 thorpej p(TCP_STAT_SELFQUENCH,
326 1.47 thorpej "\t\t%llu send attempt%s resulted in self-quench\n");
327 1.83 thorpej p(TCP_STAT_RCVTOTAL, "\t%llu packet%s received\n");
328 1.83 thorpej p2(TCP_STAT_RCVACKPACK, TCP_STAT_RCVACKBYTE,
329 1.38 bouyer "\t\t%llu ack%s (for %llu byte%s)\n");
330 1.83 thorpej p(TCP_STAT_RCVDUPACK, "\t\t%llu duplicate ack%s\n");
331 1.83 thorpej p(TCP_STAT_RCVACKTOOMUCH, "\t\t%llu ack%s for unsent data\n");
332 1.83 thorpej p2(TCP_STAT_RCVPACK, TCP_STAT_RCVBYTE,
333 1.38 bouyer "\t\t%llu packet%s (%llu byte%s) received in-sequence\n");
334 1.83 thorpej p2(TCP_STAT_RCVDUPPACK, TCP_STAT_RCVDUPBYTE,
335 1.38 bouyer "\t\t%llu completely duplicate packet%s (%llu byte%s)\n");
336 1.83 thorpej p(TCP_STAT_PAWSDROP, "\t\t%llu old duplicate packet%s\n");
337 1.83 thorpej p2(TCP_STAT_RCVPARTDUPPACK, TCP_STAT_RCVPARTDUPBYTE,
338 1.38 bouyer "\t\t%llu packet%s with some dup. data (%llu byte%s duped)\n");
339 1.83 thorpej p2(TCP_STAT_RCVOOPACK, TCP_STAT_RCVOOBYTE,
340 1.38 bouyer "\t\t%llu out-of-order packet%s (%llu byte%s)\n");
341 1.83 thorpej p2(TCP_STAT_RCVPACKAFTERWIN, TCP_STAT_RCVBYTEAFTERWIN,
342 1.38 bouyer "\t\t%llu packet%s (%llu byte%s) of data after window\n");
343 1.83 thorpej p(TCP_STAT_RCVWINPROBE, "\t\t%llu window probe%s\n");
344 1.83 thorpej p(TCP_STAT_RCVWINUPD, "\t\t%llu window update packet%s\n");
345 1.83 thorpej p(TCP_STAT_RCVAFTERCLOSE, "\t\t%llu packet%s received after close\n");
346 1.83 thorpej p(TCP_STAT_RCVBADSUM, "\t\t%llu discarded for bad checksum%s\n");
347 1.83 thorpej p(TCP_STAT_RCVBADOFF, "\t\t%llu discarded for bad header offset field%s\n");
348 1.83 thorpej ps(TCP_STAT_RCVSHORT, "\t\t%llu discarded because packet too short\n");
349 1.83 thorpej p(TCP_STAT_CONNATTEMPT, "\t%llu connection request%s\n");
350 1.83 thorpej p(TCP_STAT_ACCEPTS, "\t%llu connection accept%s\n");
351 1.83 thorpej p(TCP_STAT_CONNECTS,
352 1.38 bouyer "\t%llu connection%s established (including accepts)\n");
353 1.83 thorpej p2(TCP_STAT_CLOSED, TCP_STAT_DROPS,
354 1.38 bouyer "\t%llu connection%s closed (including %llu drop%s)\n");
355 1.83 thorpej p(TCP_STAT_CONNDROPS, "\t%llu embryonic connection%s dropped\n");
356 1.83 thorpej p(TCP_STAT_DELAYED_FREE, "\t%llu delayed free%s of tcpcb\n");
357 1.83 thorpej p2(TCP_STAT_RTTUPDATED, TCP_STAT_SEGSTIMED,
358 1.38 bouyer "\t%llu segment%s updated rtt (of %llu attempt%s)\n");
359 1.83 thorpej p(TCP_STAT_REXMTTIMEO, "\t%llu retransmit timeout%s\n");
360 1.83 thorpej p(TCP_STAT_TIMEOUTDROP,
361 1.38 bouyer "\t\t%llu connection%s dropped by rexmit timeout\n");
362 1.83 thorpej p2(TCP_STAT_PERSISTTIMEO, TCP_STAT_PERSISTDROPS,
363 1.38 bouyer "\t%llu persist timeout%s (resulting in %llu dropped "
364 1.38 bouyer "connection%s)\n");
365 1.83 thorpej p(TCP_STAT_KEEPTIMEO, "\t%llu keepalive timeout%s\n");
366 1.83 thorpej p(TCP_STAT_KEEPPROBE, "\t\t%llu keepalive probe%s sent\n");
367 1.83 thorpej p(TCP_STAT_KEEPDROPS, "\t\t%llu connection%s dropped by keepalive\n");
368 1.83 thorpej p(TCP_STAT_PREDACK, "\t%llu correct ACK header prediction%s\n");
369 1.83 thorpej p(TCP_STAT_PREDDAT, "\t%llu correct data packet header prediction%s\n");
370 1.83 thorpej p3(TCP_STAT_PCBHASHMISS, "\t%llu PCB hash miss%s\n");
371 1.83 thorpej ps(TCP_STAT_NOPORT, "\t%llu dropped due to no socket\n");
372 1.83 thorpej p(TCP_STAT_CONNSDRAINED, "\t%llu connection%s drained due to memory "
373 1.38 bouyer "shortage\n");
374 1.83 thorpej p(TCP_STAT_PMTUBLACKHOLE, "\t%llu PMTUD blackhole%s detected\n");
375 1.38 bouyer
376 1.83 thorpej p(TCP_STAT_BADSYN, "\t%llu bad connection attempt%s\n");
377 1.83 thorpej ps(TCP_STAT_SC_ADDED, "\t%llu SYN cache entries added\n");
378 1.83 thorpej p(TCP_STAT_SC_COLLISIONS, "\t\t%llu hash collision%s\n");
379 1.83 thorpej ps(TCP_STAT_SC_COMPLETED, "\t\t%llu completed\n");
380 1.83 thorpej ps(TCP_STAT_SC_ABORTED, "\t\t%llu aborted (no space to build PCB)\n");
381 1.83 thorpej ps(TCP_STAT_SC_TIMED_OUT, "\t\t%llu timed out\n");
382 1.83 thorpej ps(TCP_STAT_SC_OVERFLOWED, "\t\t%llu dropped due to overflow\n");
383 1.83 thorpej ps(TCP_STAT_SC_BUCKETOVERFLOW, "\t\t%llu dropped due to bucket overflow\n");
384 1.83 thorpej ps(TCP_STAT_SC_RESET, "\t\t%llu dropped due to RST\n");
385 1.83 thorpej ps(TCP_STAT_SC_UNREACH, "\t\t%llu dropped due to ICMP unreachable\n");
386 1.83 thorpej ps(TCP_STAT_SC_DELAYED_FREE, "\t\t%llu delayed free of SYN cache "
387 1.57 he "entries\n");
388 1.83 thorpej p(TCP_STAT_SC_RETRANSMITTED, "\t%llu SYN,ACK%s retransmitted\n");
389 1.83 thorpej p(TCP_STAT_SC_DUPESYN, "\t%llu duplicate SYN%s received for entries "
390 1.38 bouyer "already in the cache\n");
391 1.83 thorpej p(TCP_STAT_SC_DROPPED, "\t%llu SYN%s dropped (no route or no space)\n");
392 1.83 thorpej p(TCP_STAT_BADSIG, "\t%llu packet%s with bad signature\n");
393 1.83 thorpej p(TCP_STAT_GOODSIG, "\t%llu packet%s with good signature\n");
394 1.83 thorpej
395 1.83 thorpej p(TCP_STAT_ECN_SHS, "\t%llu sucessful ECN handshake%s\n");
396 1.83 thorpej p(TCP_STAT_ECN_CE, "\t%llu packet%s with ECN CE bit\n");
397 1.83 thorpej p(TCP_STAT_ECN_ECT, "\t%llu packet%s ECN ECT(0) bit\n");
398 1.1 cgd #undef p
399 1.20 christos #undef ps
400 1.1 cgd #undef p2
401 1.20 christos #undef p2s
402 1.9 mycroft #undef p3
403 1.1 cgd }
404 1.1 cgd
405 1.1 cgd /*
406 1.1 cgd * Dump UDP statistics structure.
407 1.1 cgd */
408 1.9 mycroft void
409 1.90 lukem udp_stats(u_long off, const char *name)
410 1.1 cgd {
411 1.80 thorpej uint64_t udpstat[UDP_NSTATS];
412 1.38 bouyer u_quad_t delivered;
413 1.1 cgd
414 1.65 elad if (use_sysctl) {
415 1.65 elad size_t size = sizeof(udpstat);
416 1.65 elad
417 1.80 thorpej if (sysctlbyname("net.inet.udp.stats", udpstat, &size,
418 1.65 elad NULL, 0) == -1)
419 1.88 thorpej return;
420 1.65 elad } else {
421 1.88 thorpej warnx("%s stats not available via KVM.", name);
422 1.88 thorpej return;
423 1.65 elad }
424 1.65 elad
425 1.65 elad printf ("%s:\n", name);
426 1.15 mycroft
427 1.80 thorpej #define ps(f, m) if (udpstat[f] || sflag <= 1) \
428 1.80 thorpej printf(m, (unsigned long long)udpstat[f])
429 1.80 thorpej #define p(f, m) if (udpstat[f] || sflag <= 1) \
430 1.80 thorpej printf(m, (unsigned long long)udpstat[f], plural(udpstat[f]))
431 1.80 thorpej #define p3(f, m) if (udpstat[f] || sflag <= 1) \
432 1.80 thorpej printf(m, (unsigned long long)udpstat[f], plurales(udpstat[f]))
433 1.80 thorpej
434 1.80 thorpej p(UDP_STAT_IPACKETS, "\t%llu datagram%s received\n");
435 1.80 thorpej ps(UDP_STAT_HDROPS, "\t%llu with incomplete header\n");
436 1.80 thorpej ps(UDP_STAT_BADLEN, "\t%llu with bad data length field\n");
437 1.80 thorpej ps(UDP_STAT_BADSUM, "\t%llu with bad checksum\n");
438 1.80 thorpej ps(UDP_STAT_NOPORT, "\t%llu dropped due to no socket\n");
439 1.80 thorpej p(UDP_STAT_NOPORTBCAST,
440 1.80 thorpej "\t%llu broadcast/multicast datagram%s dropped due to no socket\n");
441 1.80 thorpej ps(UDP_STAT_FULLSOCK, "\t%llu dropped due to full socket buffers\n");
442 1.80 thorpej delivered = udpstat[UDP_STAT_IPACKETS] -
443 1.80 thorpej udpstat[UDP_STAT_HDROPS] -
444 1.80 thorpej udpstat[UDP_STAT_BADLEN] -
445 1.80 thorpej udpstat[UDP_STAT_BADSUM] -
446 1.80 thorpej udpstat[UDP_STAT_NOPORT] -
447 1.80 thorpej udpstat[UDP_STAT_NOPORTBCAST] -
448 1.80 thorpej udpstat[UDP_STAT_FULLSOCK];
449 1.9 mycroft if (delivered || sflag <= 1)
450 1.38 bouyer printf("\t%llu delivered\n", (unsigned long long)delivered);
451 1.80 thorpej p3(UDP_STAT_PCBHASHMISS, "\t%llu PCB hash miss%s\n");
452 1.80 thorpej p(UDP_STAT_OPACKETS, "\t%llu datagram%s output\n");
453 1.15 mycroft
454 1.20 christos #undef ps
455 1.9 mycroft #undef p
456 1.15 mycroft #undef p3
457 1.1 cgd }
458 1.1 cgd
459 1.1 cgd /*
460 1.1 cgd * Dump IP statistics structure.
461 1.1 cgd */
462 1.9 mycroft void
463 1.90 lukem ip_stats(u_long off, const char *name)
464 1.1 cgd {
465 1.82 thorpej uint64_t ipstat[IP_NSTATS];
466 1.1 cgd
467 1.65 elad if (use_sysctl) {
468 1.65 elad size_t size = sizeof(ipstat);
469 1.65 elad
470 1.82 thorpej if (sysctlbyname("net.inet.ip.stats", ipstat, &size,
471 1.65 elad NULL, 0) == -1)
472 1.88 thorpej return;
473 1.65 elad } else {
474 1.88 thorpej warnx("%s stats not available via KVM.", name);
475 1.88 thorpej return;
476 1.65 elad }
477 1.65 elad
478 1.9 mycroft printf("%s:\n", name);
479 1.9 mycroft
480 1.82 thorpej #define ps(f, m) if (ipstat[f] || sflag <= 1) \
481 1.82 thorpej printf(m, (unsigned long long)ipstat[f])
482 1.82 thorpej #define p(f, m) if (ipstat[f] || sflag <= 1) \
483 1.82 thorpej printf(m, (unsigned long long)ipstat[f], plural(ipstat[f]))
484 1.82 thorpej
485 1.82 thorpej p(IP_STAT_TOTAL, "\t%llu total packet%s received\n");
486 1.82 thorpej p(IP_STAT_BADSUM, "\t%llu bad header checksum%s\n");
487 1.82 thorpej ps(IP_STAT_TOOSMALL, "\t%llu with size smaller than minimum\n");
488 1.82 thorpej ps(IP_STAT_TOOSHORT, "\t%llu with data size < data length\n");
489 1.82 thorpej ps(IP_STAT_TOOLONG, "\t%llu with length > max ip packet size\n");
490 1.82 thorpej ps(IP_STAT_BADHLEN, "\t%llu with header length < data size\n");
491 1.82 thorpej ps(IP_STAT_BADLEN, "\t%llu with data length < header length\n");
492 1.82 thorpej ps(IP_STAT_BADOPTIONS, "\t%llu with bad options\n");
493 1.82 thorpej ps(IP_STAT_BADVERS, "\t%llu with incorrect version number\n");
494 1.82 thorpej p(IP_STAT_FRAGMENTS, "\t%llu fragment%s received\n");
495 1.82 thorpej p(IP_STAT_FRAGDROPPED, "\t%llu fragment%s dropped (dup or out of space)\n");
496 1.82 thorpej p(IP_STAT_RCVMEMDROP, "\t%llu fragment%s dropped (out of ipqent)\n");
497 1.82 thorpej p(IP_STAT_BADFRAGS, "\t%llu malformed fragment%s dropped\n");
498 1.82 thorpej p(IP_STAT_FRAGTIMEOUT, "\t%llu fragment%s dropped after timeout\n");
499 1.82 thorpej p(IP_STAT_REASSEMBLED, "\t%llu packet%s reassembled ok\n");
500 1.82 thorpej p(IP_STAT_DELIVERED, "\t%llu packet%s for this host\n");
501 1.82 thorpej p(IP_STAT_NOPROTO, "\t%llu packet%s for unknown/unsupported protocol\n");
502 1.82 thorpej p(IP_STAT_FORWARD, "\t%llu packet%s forwarded");
503 1.82 thorpej p(IP_STAT_FASTFORWARD, " (%llu packet%s fast forwarded)");
504 1.82 thorpej if (ipstat[IP_STAT_FORWARD] || sflag <= 1)
505 1.29 matt putchar('\n');
506 1.82 thorpej p(IP_STAT_CANTFORWARD, "\t%llu packet%s not forwardable\n");
507 1.82 thorpej p(IP_STAT_REDIRECTSENT, "\t%llu redirect%s sent\n");
508 1.82 thorpej p(IP_STAT_NOGIF, "\t%llu packet%s no matching gif found\n");
509 1.82 thorpej p(IP_STAT_LOCALOUT, "\t%llu packet%s sent from this host\n");
510 1.82 thorpej p(IP_STAT_RAWOUT, "\t%llu packet%s sent with fabricated ip header\n");
511 1.82 thorpej p(IP_STAT_ODROPPED, "\t%llu output packet%s dropped due to no bufs, etc.\n");
512 1.82 thorpej p(IP_STAT_NOROUTE, "\t%llu output packet%s discarded due to no route\n");
513 1.82 thorpej p(IP_STAT_FRAGMENTED, "\t%llu output datagram%s fragmented\n");
514 1.82 thorpej p(IP_STAT_OFRAGMENTS, "\t%llu fragment%s created\n");
515 1.82 thorpej p(IP_STAT_CANTFRAG, "\t%llu datagram%s that can't be fragmented\n");
516 1.82 thorpej p(IP_STAT_BADADDR, "\t%llu datagram%s with bad address in header\n");
517 1.20 christos #undef ps
518 1.9 mycroft #undef p
519 1.1 cgd }
520 1.1 cgd
521 1.79 thorpej static const char *icmpnames[] = {
522 1.1 cgd "echo reply",
523 1.1 cgd "#1",
524 1.1 cgd "#2",
525 1.1 cgd "destination unreachable",
526 1.1 cgd "source quench",
527 1.1 cgd "routing redirect",
528 1.44 itojun "alternate host address",
529 1.1 cgd "#7",
530 1.1 cgd "echo",
531 1.44 itojun "router advertisement",
532 1.44 itojun "router solicitation",
533 1.1 cgd "time exceeded",
534 1.1 cgd "parameter problem",
535 1.1 cgd "time stamp",
536 1.1 cgd "time stamp reply",
537 1.1 cgd "information request",
538 1.1 cgd "information request reply",
539 1.1 cgd "address mask request",
540 1.1 cgd "address mask reply",
541 1.1 cgd };
542 1.1 cgd
543 1.1 cgd /*
544 1.1 cgd * Dump ICMP statistics.
545 1.1 cgd */
546 1.9 mycroft void
547 1.90 lukem icmp_stats(u_long off, const char *name)
548 1.1 cgd {
549 1.79 thorpej uint64_t icmpstat[ICMP_NSTATS];
550 1.23 lukem int i, first;
551 1.1 cgd
552 1.65 elad if (use_sysctl) {
553 1.65 elad size_t size = sizeof(icmpstat);
554 1.65 elad
555 1.79 thorpej if (sysctlbyname("net.inet.icmp.stats", icmpstat, &size,
556 1.65 elad NULL, 0) == -1)
557 1.88 thorpej return;
558 1.65 elad } else {
559 1.88 thorpej warnx("%s stats not available via KVM.", name);
560 1.88 thorpej return;
561 1.65 elad }
562 1.65 elad
563 1.9 mycroft printf("%s:\n", name);
564 1.9 mycroft
565 1.79 thorpej #define p(f, m) if (icmpstat[f] || sflag <= 1) \
566 1.81 jnemeth printf(m, (unsigned long long)icmpstat[f], plural(icmpstat[f]))
567 1.9 mycroft
568 1.79 thorpej p(ICMP_STAT_ERROR, "\t%llu call%s to icmp_error\n");
569 1.79 thorpej p(ICMP_STAT_OLDICMP,
570 1.38 bouyer "\t%llu error%s not generated because old message was icmp\n");
571 1.1 cgd for (first = 1, i = 0; i < ICMP_MAXTYPE + 1; i++)
572 1.79 thorpej if (icmpstat[ICMP_STAT_OUTHIST + i] != 0) {
573 1.1 cgd if (first) {
574 1.1 cgd printf("\tOutput histogram:\n");
575 1.1 cgd first = 0;
576 1.1 cgd }
577 1.38 bouyer printf("\t\t%s: %llu\n", icmpnames[i],
578 1.79 thorpej (unsigned long long)icmpstat[ICMP_STAT_OUTHIST + i]);
579 1.1 cgd }
580 1.79 thorpej p(ICMP_STAT_BADCODE, "\t%llu message%s with bad code fields\n");
581 1.79 thorpej p(ICMP_STAT_TOOSHORT, "\t%llu message%s < minimum length\n");
582 1.79 thorpej p(ICMP_STAT_CHECKSUM, "\t%llu bad checksum%s\n");
583 1.79 thorpej p(ICMP_STAT_BADLEN, "\t%llu message%s with bad length\n");
584 1.92 christos p(ICMP_STAT_BMCASTECHO, "\t%llu multicast echo request%s ignored\n");
585 1.92 christos p(ICMP_STAT_BMCASTTSTAMP, "\t%llu multicast timestamp request%s ignored\n");
586 1.1 cgd for (first = 1, i = 0; i < ICMP_MAXTYPE + 1; i++)
587 1.79 thorpej if (icmpstat[ICMP_STAT_INHIST + i] != 0) {
588 1.1 cgd if (first) {
589 1.1 cgd printf("\tInput histogram:\n");
590 1.1 cgd first = 0;
591 1.1 cgd }
592 1.38 bouyer printf("\t\t%s: %llu\n", icmpnames[i],
593 1.79 thorpej (unsigned long long)icmpstat[ICMP_STAT_INHIST + i]);
594 1.1 cgd }
595 1.79 thorpej p(ICMP_STAT_REFLECT, "\t%llu message response%s generated\n");
596 1.79 thorpej p(ICMP_STAT_PMTUCHG, "\t%llu path MTU change%s\n");
597 1.9 mycroft #undef p
598 1.6 brezak }
599 1.6 brezak
600 1.6 brezak /*
601 1.9 mycroft * Dump IGMP statistics structure.
602 1.6 brezak */
603 1.6 brezak void
604 1.90 lukem igmp_stats(u_long off, const char *name)
605 1.6 brezak {
606 1.87 thorpej uint64_t igmpstat[IGMP_NSTATS];
607 1.87 thorpej
608 1.87 thorpej if (use_sysctl) {
609 1.87 thorpej size_t size = sizeof(igmpstat);
610 1.87 thorpej
611 1.87 thorpej if (sysctlbyname("net.inet.igmp.stats", igmpstat, &size,
612 1.87 thorpej NULL, 0) == -1)
613 1.88 thorpej return;
614 1.87 thorpej } else {
615 1.88 thorpej warnx("%s stats not available via KVM.", name);
616 1.88 thorpej return;
617 1.87 thorpej }
618 1.6 brezak
619 1.9 mycroft printf("%s:\n", name);
620 1.9 mycroft
621 1.87 thorpej #define p(f, m) if (igmpstat[f] || sflag <= 1) \
622 1.87 thorpej printf(m, (unsigned long long)igmpstat[f], plural(igmpstat[f]))
623 1.87 thorpej #define py(f, m) if (igmpstat[f] || sflag <= 1) \
624 1.87 thorpej printf(m, (unsigned long long)igmpstat[f], igmpstat[f] != 1 ? "ies" : "y")
625 1.87 thorpej p(IGMP_STAT_RCV_TOTAL, "\t%llu message%s received\n");
626 1.87 thorpej p(IGMP_STAT_RCV_TOOSHORT, "\t%llu message%s received with too few bytes\n");
627 1.87 thorpej p(IGMP_STAT_RCV_BADSUM, "\t%llu message%s received with bad checksum\n");
628 1.87 thorpej py(IGMP_STAT_RCV_QUERIES, "\t%llu membership quer%s received\n");
629 1.87 thorpej py(IGMP_STAT_RCV_BADQUERIES, "\t%llu membership quer%s received with invalid field(s)\n");
630 1.87 thorpej p(IGMP_STAT_RCV_REPORTS, "\t%llu membership report%s received\n");
631 1.87 thorpej p(IGMP_STAT_RCV_BADREPORTS, "\t%llu membership report%s received with invalid field(s)\n");
632 1.87 thorpej p(IGMP_STAT_RCV_OURREPORTS, "\t%llu membership report%s received for groups to which we belong\n");
633 1.87 thorpej p(IGMP_STAT_SND_REPORTS, "\t%llu membership report%s sent\n");
634 1.9 mycroft #undef p
635 1.9 mycroft #undef py
636 1.41 jhawk }
637 1.41 jhawk
638 1.41 jhawk /*
639 1.69 liamjfoy * Dump CARP statistics structure.
640 1.69 liamjfoy */
641 1.69 liamjfoy void
642 1.90 lukem carp_stats(u_long off, const char *name)
643 1.69 liamjfoy {
644 1.85 thorpej uint64_t carpstat[CARP_NSTATS];
645 1.69 liamjfoy
646 1.69 liamjfoy if (use_sysctl) {
647 1.69 liamjfoy size_t size = sizeof(carpstat);
648 1.69 liamjfoy
649 1.85 thorpej if (sysctlbyname("net.inet.carp.stats", carpstat, &size,
650 1.88 thorpej NULL, 0) == -1)
651 1.73 rpaulo return;
652 1.69 liamjfoy } else {
653 1.88 thorpej warnx("%s stats not available via KVM.", name);
654 1.88 thorpej return;
655 1.69 liamjfoy }
656 1.69 liamjfoy
657 1.69 liamjfoy printf("%s:\n", name);
658 1.69 liamjfoy
659 1.85 thorpej #define p(f, m) if (carpstat[f] || sflag <= 1) \
660 1.85 thorpej printf(m, carpstat[f], plural(carpstat[f]))
661 1.85 thorpej #define p2(f, m) if (carpstat[f] || sflag <= 1) \
662 1.85 thorpej printf(m, carpstat[f])
663 1.85 thorpej
664 1.85 thorpej p(CARP_STAT_IPACKETS, "\t%" PRIu64 " packet%s received (IPv4)\n");
665 1.85 thorpej p(CARP_STAT_IPACKETS6, "\t%" PRIu64 " packet%s received (IPv6)\n");
666 1.85 thorpej p(CARP_STAT_BADIF,
667 1.70 riz "\t\t%" PRIu64 " packet%s discarded for bad interface\n");
668 1.85 thorpej p(CARP_STAT_BADTTL,
669 1.70 riz "\t\t%" PRIu64 " packet%s discarded for wrong TTL\n");
670 1.85 thorpej p(CARP_STAT_HDROPS, "\t\t%" PRIu64 " packet%s shorter than header\n");
671 1.85 thorpej p(CARP_STAT_BADSUM, "\t\t%" PRIu64
672 1.70 riz " packet%s discarded for bad checksum\n");
673 1.85 thorpej p(CARP_STAT_BADVER,
674 1.70 riz "\t\t%" PRIu64 " packet%s discarded with a bad version\n");
675 1.85 thorpej p2(CARP_STAT_BADLEN,
676 1.70 riz "\t\t%" PRIu64 " discarded because packet was too short\n");
677 1.85 thorpej p(CARP_STAT_BADAUTH,
678 1.70 riz "\t\t%" PRIu64 " packet%s discarded for bad authentication\n");
679 1.85 thorpej p(CARP_STAT_BADVHID, "\t\t%" PRIu64 " packet%s discarded for bad vhid\n");
680 1.85 thorpej p(CARP_STAT_BADADDRS, "\t\t%" PRIu64
681 1.70 riz " packet%s discarded because of a bad address list\n");
682 1.85 thorpej p(CARP_STAT_OPACKETS, "\t%" PRIu64 " packet%s sent (IPv4)\n");
683 1.85 thorpej p(CARP_STAT_OPACKETS6, "\t%" PRIu64 " packet%s sent (IPv6)\n");
684 1.85 thorpej p2(CARP_STAT_ONOMEM,
685 1.70 riz "\t\t%" PRIu64 " send failed due to mbuf memory error\n");
686 1.69 liamjfoy #undef p
687 1.69 liamjfoy #undef p2
688 1.69 liamjfoy }
689 1.69 liamjfoy
690 1.69 liamjfoy /*
691 1.62 manu * Dump PIM statistics structure.
692 1.62 manu */
693 1.62 manu void
694 1.90 lukem pim_stats(u_long off, const char *name)
695 1.62 manu {
696 1.62 manu struct pimstat pimstat;
697 1.62 manu
698 1.62 manu if (off == 0)
699 1.62 manu return;
700 1.62 manu if (kread(off, (char *)&pimstat, sizeof (pimstat)) != 0) {
701 1.62 manu /* XXX: PIM is probably not enabled in the kernel */
702 1.62 manu return;
703 1.62 manu }
704 1.62 manu
705 1.62 manu printf("%s:\n", name);
706 1.62 manu
707 1.62 manu #define p(f, m) if (pimstat.f || sflag <= 1) \
708 1.63 martin printf(m, (unsigned long long)pimstat.f, plural(pimstat.f))
709 1.62 manu
710 1.62 manu p(pims_rcv_total_msgs, "\t%llu message%s received\n");
711 1.62 manu p(pims_rcv_total_bytes, "\t%llu byte%s received\n");
712 1.62 manu p(pims_rcv_tooshort, "\t%llu message%s received with too few bytes\n");
713 1.62 manu p(pims_rcv_badsum, "\t%llu message%s received with bad checksum\n");
714 1.62 manu p(pims_rcv_badversion, "\t%llu message%s received with bad version\n");
715 1.62 manu p(pims_rcv_registers_msgs, "\t%llu data register message%s received\n");
716 1.62 manu p(pims_rcv_registers_bytes, "\t%llu data register byte%s received\n");
717 1.62 manu p(pims_rcv_registers_wrongiif, "\t%llu data register message%s received on wrong iif\n");
718 1.62 manu p(pims_rcv_badregisters, "\t%llu bad register%s received\n");
719 1.62 manu p(pims_snd_registers_msgs, "\t%llu data register message%s sent\n");
720 1.62 manu p(pims_snd_registers_bytes, "\t%llu data register byte%s sent\n");
721 1.62 manu #undef p
722 1.62 manu }
723 1.62 manu
724 1.62 manu /*
725 1.41 jhawk * Dump the ARP statistics structure.
726 1.41 jhawk */
727 1.41 jhawk void
728 1.90 lukem arp_stats(u_long off, const char *name)
729 1.41 jhawk {
730 1.86 thorpej uint64_t arpstat[ARP_NSTATS];
731 1.86 thorpej
732 1.86 thorpej if (use_sysctl) {
733 1.86 thorpej size_t size = sizeof(arpstat);
734 1.86 thorpej
735 1.86 thorpej if (sysctlbyname("net.inet.arp.stats", arpstat, &size,
736 1.88 thorpej NULL, 0) == -1)
737 1.86 thorpej return;
738 1.86 thorpej } else {
739 1.88 thorpej warnx("%s stats not available via KVM.", name);
740 1.88 thorpej return;
741 1.86 thorpej }
742 1.41 jhawk
743 1.41 jhawk printf("%s:\n", name);
744 1.41 jhawk
745 1.86 thorpej #define ps(f, m) if (arpstat[f] || sflag <= 1) \
746 1.86 thorpej printf(m, (unsigned long long)arpstat[f])
747 1.86 thorpej #define p(f, m) if (arpstat[f] || sflag <= 1) \
748 1.86 thorpej printf(m, (unsigned long long)arpstat[f], plural(arpstat[f]))
749 1.86 thorpej
750 1.86 thorpej p(ARP_STAT_SNDTOTAL, "\t%llu packet%s sent\n");
751 1.86 thorpej p(ARP_STAT_SNDREPLY, "\t\t%llu reply packet%s\n");
752 1.86 thorpej p(ARP_STAT_SENDREQUEST, "\t\t%llu request packet%s\n");
753 1.86 thorpej
754 1.86 thorpej p(ARP_STAT_RCVTOTAL, "\t%llu packet%s received\n");
755 1.86 thorpej p(ARP_STAT_RCVREPLY, "\t\t%llu reply packet%s\n");
756 1.86 thorpej p(ARP_STAT_RCVREQUEST, "\t\t%llu valid request packet%s\n");
757 1.86 thorpej p(ARP_STAT_RCVMCAST, "\t\t%llu broadcast/multicast packet%s\n");
758 1.86 thorpej p(ARP_STAT_RCVBADPROTO, "\t\t%llu packet%s with unknown protocol type\n");
759 1.86 thorpej p(ARP_STAT_RCVBADLEN, "\t\t%llu packet%s with bad (short) length\n");
760 1.86 thorpej p(ARP_STAT_RCVZEROTPA, "\t\t%llu packet%s with null target IP address\n");
761 1.86 thorpej p(ARP_STAT_RCVZEROSPA, "\t\t%llu packet%s with null source IP address\n");
762 1.86 thorpej ps(ARP_STAT_RCVNOINT, "\t\t%llu could not be mapped to an interface\n");
763 1.86 thorpej p(ARP_STAT_RCVLOCALSHA, "\t\t%llu packet%s sourced from a local hardware "
764 1.41 jhawk "address\n");
765 1.86 thorpej p(ARP_STAT_RCVBCASTSHA, "\t\t%llu packet%s with a broadcast "
766 1.41 jhawk "source hardware address\n");
767 1.86 thorpej p(ARP_STAT_RCVLOCALSPA, "\t\t%llu duplicate%s for a local IP address\n");
768 1.86 thorpej p(ARP_STAT_RCVOVERPERM, "\t\t%llu attempt%s to overwrite a static entry\n");
769 1.86 thorpej p(ARP_STAT_RCVOVERINT, "\t\t%llu packet%s received on wrong interface\n");
770 1.86 thorpej p(ARP_STAT_RCVOVER, "\t\t%llu entry%s overwritten\n");
771 1.86 thorpej p(ARP_STAT_RCVLENCHG, "\t\t%llu change%s in hardware address length\n");
772 1.86 thorpej
773 1.86 thorpej p(ARP_STAT_DFRTOTAL, "\t%llu packet%s deferred pending ARP resolution\n");
774 1.86 thorpej ps(ARP_STAT_DFRSENT, "\t\t%llu sent\n");
775 1.86 thorpej ps(ARP_STAT_DFRDROPPED, "\t\t%llu dropped\n");
776 1.41 jhawk
777 1.86 thorpej p(ARP_STAT_ALLOCFAIL, "\t%llu failure%s to allocate llinfo\n");
778 1.41 jhawk
779 1.41 jhawk #undef ps
780 1.41 jhawk #undef p
781 1.1 cgd }
782 1.1 cgd
783 1.1 cgd /*
784 1.1 cgd * Pretty print an Internet address (net address + port).
785 1.46 assar * Take numeric_addr and numeric_port into consideration.
786 1.1 cgd */
787 1.9 mycroft void
788 1.84 thorpej inetprint(struct in_addr *in, uint16_t port, const char *proto,
789 1.90 lukem int port_numeric)
790 1.1 cgd {
791 1.1 cgd struct servent *sp = 0;
792 1.9 mycroft char line[80], *cp;
793 1.33 sommerfe size_t space;
794 1.1 cgd
795 1.32 mrg (void)snprintf(line, sizeof line, "%.*s.",
796 1.46 assar (Aflag && !numeric_addr) ? 12 : 16, inetname(in));
797 1.23 lukem cp = strchr(line, '\0');
798 1.90 lukem if (!port_numeric && port)
799 1.1 cgd sp = getservbyport((int)port, proto);
800 1.33 sommerfe space = sizeof line - (cp-line);
801 1.1 cgd if (sp || port == 0)
802 1.55 jdolecek (void)snprintf(cp, space, "%s", sp ? sp->s_name : "*");
803 1.1 cgd else
804 1.33 sommerfe (void)snprintf(cp, space, "%u", ntohs(port));
805 1.32 mrg (void)printf(" %-*.*s", width, width, line);
806 1.1 cgd }
807 1.1 cgd
808 1.1 cgd /*
809 1.1 cgd * Construct an Internet address representation.
810 1.46 assar * If numeric_addr has been supplied, give
811 1.1 cgd * numeric value, otherwise try for symbolic name.
812 1.1 cgd */
813 1.1 cgd char *
814 1.84 thorpej inetname(struct in_addr *inp)
815 1.1 cgd {
816 1.23 lukem char *cp;
817 1.1 cgd static char line[50];
818 1.1 cgd struct hostent *hp;
819 1.1 cgd struct netent *np;
820 1.1 cgd static char domain[MAXHOSTNAMELEN + 1];
821 1.1 cgd static int first = 1;
822 1.1 cgd
823 1.46 assar if (first && !numeric_addr) {
824 1.1 cgd first = 0;
825 1.31 mrg if (gethostname(domain, sizeof domain) == 0) {
826 1.31 mrg domain[sizeof(domain) - 1] = '\0';
827 1.31 mrg if ((cp = strchr(domain, '.')))
828 1.45 itojun (void) strlcpy(domain, cp + 1, sizeof(domain));
829 1.31 mrg else
830 1.31 mrg domain[0] = 0;
831 1.31 mrg } else
832 1.1 cgd domain[0] = 0;
833 1.1 cgd }
834 1.1 cgd cp = 0;
835 1.46 assar if (!numeric_addr && inp->s_addr != INADDR_ANY) {
836 1.9 mycroft int net = inet_netof(*inp);
837 1.9 mycroft int lna = inet_lnaof(*inp);
838 1.1 cgd
839 1.1 cgd if (lna == INADDR_ANY) {
840 1.1 cgd np = getnetbyaddr(net, AF_INET);
841 1.1 cgd if (np)
842 1.1 cgd cp = np->n_name;
843 1.1 cgd }
844 1.1 cgd if (cp == 0) {
845 1.9 mycroft hp = gethostbyaddr((char *)inp, sizeof (*inp), AF_INET);
846 1.1 cgd if (hp) {
847 1.23 lukem if ((cp = strchr(hp->h_name, '.')) &&
848 1.1 cgd !strcmp(cp + 1, domain))
849 1.1 cgd *cp = 0;
850 1.1 cgd cp = hp->h_name;
851 1.1 cgd }
852 1.1 cgd }
853 1.1 cgd }
854 1.9 mycroft if (inp->s_addr == INADDR_ANY)
855 1.56 itojun strlcpy(line, "*", sizeof line);
856 1.1 cgd else if (cp)
857 1.56 itojun strlcpy(line, cp, sizeof line);
858 1.1 cgd else {
859 1.9 mycroft inp->s_addr = ntohl(inp->s_addr);
860 1.1 cgd #define C(x) ((x) & 0xff)
861 1.32 mrg (void)snprintf(line, sizeof line, "%u.%u.%u.%u",
862 1.32 mrg C(inp->s_addr >> 24), C(inp->s_addr >> 16),
863 1.32 mrg C(inp->s_addr >> 8), C(inp->s_addr));
864 1.32 mrg #undef C
865 1.1 cgd }
866 1.1 cgd return (line);
867 1.30 thorpej }
868 1.30 thorpej
869 1.30 thorpej /*
870 1.30 thorpej * Dump the contents of a TCP PCB.
871 1.30 thorpej */
872 1.30 thorpej void
873 1.84 thorpej tcp_dump(u_long pcbaddr)
874 1.30 thorpej {
875 1.78 ad callout_impl_t *ci;
876 1.30 thorpej struct tcpcb tcpcb;
877 1.54 thorpej int i, hardticks;
878 1.30 thorpej
879 1.30 thorpej kread(pcbaddr, (char *)&tcpcb, sizeof(tcpcb));
880 1.54 thorpej hardticks = get_hardticks();
881 1.30 thorpej
882 1.30 thorpej printf("TCP Protocol Control Block at 0x%08lx:\n\n", pcbaddr);
883 1.30 thorpej
884 1.30 thorpej printf("Timers:\n");
885 1.48 thorpej for (i = 0; i < TCPT_NTIMERS; i++) {
886 1.78 ad ci = (callout_impl_t *)&tcpcb.t_timer[i];
887 1.54 thorpej printf("\t%s: %d", tcptimers[i],
888 1.78 ad (ci->c_flags & CALLOUT_PENDING) ?
889 1.78 ad ci->c_time - hardticks : 0);
890 1.48 thorpej }
891 1.30 thorpej printf("\n\n");
892 1.30 thorpej
893 1.30 thorpej if (tcpcb.t_state < 0 || tcpcb.t_state >= TCP_NSTATES)
894 1.30 thorpej printf("State: %d", tcpcb.t_state);
895 1.30 thorpej else
896 1.30 thorpej printf("State: %s", tcpstates[tcpcb.t_state]);
897 1.49 thorpej printf(", flags 0x%x, inpcb 0x%lx, in6pcb 0x%lx\n\n", tcpcb.t_flags,
898 1.49 thorpej (u_long)tcpcb.t_inpcb, (u_long)tcpcb.t_in6pcb);
899 1.30 thorpej
900 1.30 thorpej printf("rxtshift %d, rxtcur %d, dupacks %d\n", tcpcb.t_rxtshift,
901 1.30 thorpej tcpcb.t_rxtcur, tcpcb.t_dupacks);
902 1.30 thorpej printf("peermss %u, ourmss %u, segsz %u\n\n", tcpcb.t_peermss,
903 1.30 thorpej tcpcb.t_ourmss, tcpcb.t_segsz);
904 1.30 thorpej
905 1.30 thorpej printf("snd_una %u, snd_nxt %u, snd_up %u\n",
906 1.30 thorpej tcpcb.snd_una, tcpcb.snd_nxt, tcpcb.snd_up);
907 1.30 thorpej printf("snd_wl1 %u, snd_wl2 %u, iss %u, snd_wnd %lu\n\n",
908 1.30 thorpej tcpcb.snd_wl1, tcpcb.snd_wl2, tcpcb.iss, tcpcb.snd_wnd);
909 1.30 thorpej
910 1.30 thorpej printf("rcv_wnd %lu, rcv_nxt %u, rcv_up %u, irs %u\n\n",
911 1.30 thorpej tcpcb.rcv_wnd, tcpcb.rcv_nxt, tcpcb.rcv_up, tcpcb.irs);
912 1.30 thorpej
913 1.30 thorpej printf("rcv_adv %u, snd_max %u, snd_cwnd %lu, snd_ssthresh %lu\n",
914 1.30 thorpej tcpcb.rcv_adv, tcpcb.snd_max, tcpcb.snd_cwnd, tcpcb.snd_ssthresh);
915 1.30 thorpej
916 1.47 thorpej printf("rcvtime %u, rtttime %u, rtseq %u, srtt %d, rttvar %d, "
917 1.47 thorpej "rttmin %d, max_sndwnd %lu\n\n", tcpcb.t_rcvtime, tcpcb.t_rtttime,
918 1.47 thorpej tcpcb.t_rtseq, tcpcb.t_srtt, tcpcb.t_rttvar, tcpcb.t_rttmin,
919 1.47 thorpej tcpcb.max_sndwnd);
920 1.30 thorpej
921 1.30 thorpej printf("oobflags %d, iobc %d, softerror %d\n\n", tcpcb.t_oobflags,
922 1.30 thorpej tcpcb.t_iobc, tcpcb.t_softerror);
923 1.30 thorpej
924 1.30 thorpej printf("snd_scale %d, rcv_scale %d, req_r_scale %d, req_s_scale %d\n",
925 1.30 thorpej tcpcb.snd_scale, tcpcb.rcv_scale, tcpcb.request_r_scale,
926 1.30 thorpej tcpcb.requested_s_scale);
927 1.30 thorpej printf("ts_recent %u, ts_regent_age %d, last_ack_sent %u\n",
928 1.30 thorpej tcpcb.ts_recent, tcpcb.ts_recent_age, tcpcb.last_ack_sent);
929 1.1 cgd }
930