124303Ssklower /* 224303Ssklower * Copyright (c) 1983 Regents of the University of California. 324303Ssklower * All rights reserved. The Berkeley software License Agreement 424303Ssklower * specifies the terms and conditions for redistribution. 524303Ssklower */ 624303Ssklower 724303Ssklower 824303Ssklower #ifndef lint 9*24710Skarels static char sccsid[] = "@(#)ns.c 5.3 (Berkeley) 09/12/85"; 1024303Ssklower #endif not lint 1124303Ssklower 1224303Ssklower #include <stdio.h> 1324303Ssklower #include <errno.h> 1424303Ssklower #include <nlist.h> 1524303Ssklower 1624303Ssklower #include <sys/types.h> 1724303Ssklower #include <sys/socket.h> 1824303Ssklower #include <sys/socketvar.h> 1924303Ssklower #include <sys/mbuf.h> 2024303Ssklower #include <sys/protosw.h> 2124303Ssklower 2224303Ssklower #include <net/route.h> 2324303Ssklower #include <net/if.h> 2424303Ssklower 2524303Ssklower #include <netinet/tcp_fsm.h> 2624303Ssklower #include <netinet/tcp_timer.h> 2724303Ssklower 2824303Ssklower #include <netns/ns.h> 2924303Ssklower #include <netns/ns_pcb.h> 3024303Ssklower #include <netns/idp.h> 3124303Ssklower #include <netns/idp_var.h> 3224303Ssklower #include <netns/ns_error.h> 3324303Ssklower #include <netns/sp.h> 3424303Ssklower #include <netns/spidp.h> 3524303Ssklower #include <netns/spp_var.h> 3624303Ssklower #define SANAMES 3724303Ssklower #include <netns/spp_debug.h> 3824303Ssklower 3924303Ssklower 4024303Ssklower struct nspcb nspcb; 4124303Ssklower struct sppcb sppcb; 4224303Ssklower struct socket sockb; 4324303Ssklower struct protosw proto; 4424303Ssklower extern int kmem; 4524303Ssklower extern int Aflag; 4624303Ssklower extern int aflag; 4724303Ssklower extern int nflag; 4824303Ssklower char *ns_prpr(); 4924303Ssklower 5024303Ssklower static int first = 1; 5124303Ssklower 5224303Ssklower /* 5324303Ssklower * Print a summary of connections related to a Network Systems 5424303Ssklower * protocol. For SPP, also give state of connection. 5524303Ssklower * Listening processes (aflag) are suppressed unless the 5624303Ssklower * -a (all) flag is specified. 5724303Ssklower */ 5824303Ssklower 5924303Ssklower nsprotopr(off, name) 6024303Ssklower off_t off; 6124303Ssklower char *name; 6224303Ssklower { 6324303Ssklower struct nspcb cb; 6424303Ssklower register struct nspcb *prev, *next; 6524303Ssklower int isspp; 6624303Ssklower 6724667Skarels if (off == 0) 6824303Ssklower return; 6924303Ssklower isspp = strcmp(name, "spp") == 0; 7024303Ssklower klseek(kmem, off, 0); 7124303Ssklower read(kmem, &cb, sizeof (struct nspcb)); 7224303Ssklower nspcb = cb; 7324303Ssklower prev = (struct nspcb *)off; 7424667Skarels if (nspcb.nsp_next == (struct nspcb *)off) 7524667Skarels return; 7624303Ssklower for (;nspcb.nsp_next != (struct nspcb *)off; prev = next) { 7724303Ssklower char *cp; 7824303Ssklower off_t ppcb; 7924303Ssklower 8024303Ssklower next = nspcb.nsp_next; 8124303Ssklower klseek(kmem, (off_t)next, 0); 8224303Ssklower read(kmem, &nspcb, sizeof (nspcb)); 8324303Ssklower if (nspcb.nsp_prev != prev) { 8424303Ssklower printf("???\n"); 8524303Ssklower break; 8624303Ssklower } 8724303Ssklower if (!aflag && ns_nullhost(nspcb.nsp_faddr) ) { 8824303Ssklower continue; 8924303Ssklower } 9024303Ssklower klseek(kmem, (off_t)nspcb.nsp_socket, 0); 9124303Ssklower read(kmem, &sockb, sizeof (sockb)); 9224303Ssklower ppcb = (off_t) nspcb.nsp_pcb; 9324303Ssklower if (ppcb) { 9424303Ssklower if (isspp) { 9524303Ssklower klseek(kmem, ppcb, 0); 9624303Ssklower read(kmem, &sppcb, sizeof (sppcb)); 9724303Ssklower } else continue; 9824303Ssklower } else 9924303Ssklower if (isspp) continue; 100*24710Skarels if (first) { 101*24710Skarels printf("Active NS connections"); 102*24710Skarels if (aflag) 103*24710Skarels printf(" (including servers)"); 104*24710Skarels putchar('\n'); 105*24710Skarels if (Aflag) 106*24710Skarels printf("%-8.8s ", "PCB"); 107*24710Skarels printf(Aflag ? 108*24710Skarels "%-5.5s %-6.6s %-6.6s %-18.18s %-18.18s %s\n" : 109*24710Skarels "%-5.5s %-6.6s %-6.6s %-22.22s %-22.22s %s\n", 110*24710Skarels "Proto", "Recv-Q", "Send-Q", 111*24710Skarels "Local Address", "Foreign Address", "(state)"); 112*24710Skarels first = 0; 113*24710Skarels } 11424303Ssklower if (Aflag) 11524303Ssklower printf("%8x ", ppcb); 11624303Ssklower printf("%-5.5s %6d %6d ", name, sockb.so_rcv.sb_cc, 11724303Ssklower sockb.so_snd.sb_cc); 11824303Ssklower printf(" %-22.22s", ns_prpr(&nspcb.nsp_laddr)); 11924303Ssklower printf(" %-22.22s", ns_prpr(&nspcb.nsp_faddr)); 12024303Ssklower if (isspp) { 12124303Ssklower extern char *tcpstates[]; 12224303Ssklower if (sppcb.s_state < 0 || sppcb.s_state >= TCP_NSTATES) 12324303Ssklower printf(" %d", sppcb.s_state); 12424303Ssklower else 12524303Ssklower printf(" %s", tcpstates[sppcb.s_state]); 12624303Ssklower } 12724303Ssklower putchar('\n'); 12824303Ssklower prev = next; 12924303Ssklower } 13024303Ssklower } 13124303Ssklower #define ANY(x,y,z) ((x) ? printf("\t%d %s%s%s\n",x,y,plural(x),z) : 0) 13224303Ssklower 13324303Ssklower /* 13424303Ssklower * Dump SPP statistics structure. 13524303Ssklower */ 13624303Ssklower spp_stats(off, name) 13724303Ssklower off_t off; 13824303Ssklower char *name; 13924303Ssklower { 14024303Ssklower struct spp_istat spp_istat; 14124303Ssklower 14224667Skarels if (off == 0) 14324303Ssklower return; 14424303Ssklower klseek(kmem, off, 0); 14524303Ssklower read(kmem, (char *)&spp_istat, sizeof (spp_istat)); 14624303Ssklower printf("%s:\n", name); 14724303Ssklower ANY(spp_istat.nonucn, "connection", " dropped due to no new sockets "); 14824303Ssklower ANY(spp_istat.gonawy, "connection", " terminated due to our end dying"); 14924303Ssklower ANY(spp_istat.nonucn, "connection", " dropped due to inability to connect"); 15024303Ssklower ANY(spp_istat.noconn, "connection", " dropped due to inability to connect"); 15124303Ssklower ANY(spp_istat.notme, "connection", " incompleted due to mismatched id's"); 15224303Ssklower ANY(spp_istat.wrncon, "connection", " dropped due to mismatched id's"); 15324303Ssklower ANY(spp_istat.bdreas, "packet", " dropped out of sequence"); 15424303Ssklower ANY(spp_istat.lstdup, "packet", " duplicating the highest packet"); 15524303Ssklower ANY(spp_istat.notyet, "packet", " refused as exceeding allocation"); 15624303Ssklower } 15724303Ssklower 15824303Ssklower /* 15924303Ssklower * Dump IDP statistics structure. 16024303Ssklower */ 16124303Ssklower idp_stats(off, name) 16224303Ssklower off_t off; 16324303Ssklower char *name; 16424303Ssklower { 16524303Ssklower struct idpstat idpstat; 16624303Ssklower 16724667Skarels if (off == 0) 16824303Ssklower return; 16924303Ssklower klseek(kmem, off, 0); 17024303Ssklower read(kmem, (char *)&idpstat, sizeof (idpstat)); 17124303Ssklower ANY(idpstat.idps_toosmall, "packet", " smaller than a header"); 17224303Ssklower ANY(idpstat.idps_tooshort, "packet", " smaller than advertised"); 17324303Ssklower ANY(idpstat.idps_badsum, "packet", " with bad checksums"); 17424303Ssklower } 17524303Ssklower 17624303Ssklower static char *((ns_errnames[])[2]) = { 17724303Ssklower {"Unspecified Error", " at Destination"}, 17824303Ssklower {"Bad Checksum", " at Destination"}, 17924303Ssklower {"No Listener", " at Socket"}, 18024303Ssklower {"Packet", " Refused due to lack of space at Destination"}, 18124303Ssklower {"Unspecified Error", " while gatewayed"}, 18224303Ssklower {"Bad Checksum", " while gatewayed"}, 18324303Ssklower {"Packet", " forwarded too many times"}, 18424303Ssklower {"Packet", " too large to be forwarded"}, 18524303Ssklower }; 18624303Ssklower 18724303Ssklower /* 18824303Ssklower * Dump NS Error statistics structure. 18924303Ssklower */ 19024303Ssklower nserr_stats(off, name) 19124303Ssklower off_t off; 19224303Ssklower char *name; 19324303Ssklower { 19424303Ssklower struct ns_errstat ns_errstat; 19524303Ssklower register int j; 19624303Ssklower register int histoprint = 1; 19724303Ssklower int z; 19824303Ssklower 19924667Skarels if (off == 0) 20024303Ssklower return; 20124303Ssklower klseek(kmem, off, 0); 20224303Ssklower read(kmem, (char *)&ns_errstat, sizeof (ns_errstat)); 20324303Ssklower printf("NS error statistics:\n"); 20424303Ssklower ANY(ns_errstat.ns_es_error, "call", " to ns_error"); 20524303Ssklower ANY(ns_errstat.ns_es_oldshort, "error", 20624303Ssklower " ignored due to insufficient addressing"); 20724303Ssklower ANY(ns_errstat.ns_es_oldns_err, "error request", 20824303Ssklower " in response to error packets"); 20924303Ssklower ANY(ns_errstat.ns_es_tooshort, "error packet", 21024303Ssklower " received incomplete"); 21124303Ssklower ANY(ns_errstat.ns_es_badcode, "error packet", 21224303Ssklower " received of unknown type"); 21324303Ssklower for(j = 0; j < NS_ERR_MAX; j ++) { 21424303Ssklower z = ns_errstat.ns_es_outhist[j]; 21524303Ssklower if (z && histoprint) { 21624303Ssklower printf("Output Error Histogram:\n"); 21724303Ssklower histoprint = 0; 21824303Ssklower } 21924303Ssklower ANY(z, ns_errnames[j][0], ns_errnames[j][1]); 22024303Ssklower } 22124303Ssklower histoprint = 1; 22224303Ssklower for(j = 0; j < NS_ERR_MAX; j ++) { 22324303Ssklower z = ns_errstat.ns_es_inhist[j]; 22424303Ssklower if (z && histoprint) { 22524303Ssklower printf("Input Error Histogram:\n"); 22624303Ssklower histoprint = 0; 22724303Ssklower } 22824303Ssklower ANY(z, ns_errnames[j][0], ns_errnames[j][1]); 22924303Ssklower } 23024303Ssklower } 23124303Ssklower static struct sockaddr_ns ssns = {AF_NS}; 23224303Ssklower 23324303Ssklower char *ns_prpr(x) 23424303Ssklower struct ns_addr *x; 23524303Ssklower { 23624303Ssklower extern char *ns_print(); 23724303Ssklower struct sockaddr_ns *sns = &ssns; 23824303Ssklower sns->sns_addr = *x; 23924303Ssklower return(ns_print(sns)); 24024303Ssklower } 241