124303Ssklower /* 224303Ssklower * Copyright (c) 1983 Regents of the University of California. 324303Ssklower * All rights reserved. The Berkeley software License Agreement 424303Ssklower * specifies the terms and conditions for redistribution. 524303Ssklower */ 624303Ssklower 724303Ssklower 824303Ssklower #ifndef lint 9*29748Skupfer static char sccsid[] = "@(#)ns.c 5.4 (Berkeley) 08/11/86"; 1024303Ssklower #endif not lint 1124303Ssklower 1224303Ssklower #include <stdio.h> 1324303Ssklower #include <errno.h> 1424303Ssklower #include <nlist.h> 1524303Ssklower 1624303Ssklower #include <sys/types.h> 1724303Ssklower #include <sys/socket.h> 1824303Ssklower #include <sys/socketvar.h> 1924303Ssklower #include <sys/mbuf.h> 2024303Ssklower #include <sys/protosw.h> 2124303Ssklower 2224303Ssklower #include <net/route.h> 2324303Ssklower #include <net/if.h> 2424303Ssklower 2524303Ssklower #include <netinet/tcp_fsm.h> 2624303Ssklower #include <netinet/tcp_timer.h> 2724303Ssklower 2824303Ssklower #include <netns/ns.h> 2924303Ssklower #include <netns/ns_pcb.h> 3024303Ssklower #include <netns/idp.h> 3124303Ssklower #include <netns/idp_var.h> 3224303Ssklower #include <netns/ns_error.h> 3324303Ssklower #include <netns/sp.h> 3424303Ssklower #include <netns/spidp.h> 3524303Ssklower #include <netns/spp_var.h> 3624303Ssklower #define SANAMES 3724303Ssklower #include <netns/spp_debug.h> 3824303Ssklower 3924303Ssklower 4024303Ssklower struct nspcb nspcb; 4124303Ssklower struct sppcb sppcb; 4224303Ssklower struct socket sockb; 4324303Ssklower extern int kmem; 4424303Ssklower extern int Aflag; 4524303Ssklower extern int aflag; 4624303Ssklower extern int nflag; 47*29748Skupfer extern char *plural(); 4824303Ssklower char *ns_prpr(); 4924303Ssklower 5024303Ssklower static int first = 1; 5124303Ssklower 5224303Ssklower /* 5324303Ssklower * Print a summary of connections related to a Network Systems 5424303Ssklower * protocol. For SPP, also give state of connection. 5524303Ssklower * Listening processes (aflag) are suppressed unless the 5624303Ssklower * -a (all) flag is specified. 5724303Ssklower */ 5824303Ssklower 5924303Ssklower nsprotopr(off, name) 6024303Ssklower off_t off; 6124303Ssklower char *name; 6224303Ssklower { 6324303Ssklower struct nspcb cb; 6424303Ssklower register struct nspcb *prev, *next; 6524303Ssklower int isspp; 6624303Ssklower 6724667Skarels if (off == 0) 6824303Ssklower return; 6924303Ssklower isspp = strcmp(name, "spp") == 0; 7024303Ssklower klseek(kmem, off, 0); 71*29748Skupfer read(kmem, (char *)&cb, sizeof (struct nspcb)); 7224303Ssklower nspcb = cb; 7324303Ssklower prev = (struct nspcb *)off; 7424667Skarels if (nspcb.nsp_next == (struct nspcb *)off) 7524667Skarels return; 7624303Ssklower for (;nspcb.nsp_next != (struct nspcb *)off; prev = next) { 7724303Ssklower off_t ppcb; 7824303Ssklower 7924303Ssklower next = nspcb.nsp_next; 8024303Ssklower klseek(kmem, (off_t)next, 0); 81*29748Skupfer read(kmem, (char *)&nspcb, sizeof (nspcb)); 8224303Ssklower if (nspcb.nsp_prev != prev) { 8324303Ssklower printf("???\n"); 8424303Ssklower break; 8524303Ssklower } 8624303Ssklower if (!aflag && ns_nullhost(nspcb.nsp_faddr) ) { 8724303Ssklower continue; 8824303Ssklower } 8924303Ssklower klseek(kmem, (off_t)nspcb.nsp_socket, 0); 90*29748Skupfer read(kmem, (char *)&sockb, sizeof (sockb)); 9124303Ssklower ppcb = (off_t) nspcb.nsp_pcb; 9224303Ssklower if (ppcb) { 9324303Ssklower if (isspp) { 9424303Ssklower klseek(kmem, ppcb, 0); 95*29748Skupfer read(kmem, (char *)&sppcb, sizeof (sppcb)); 9624303Ssklower } else continue; 9724303Ssklower } else 9824303Ssklower if (isspp) continue; 9924710Skarels if (first) { 10024710Skarels printf("Active NS connections"); 10124710Skarels if (aflag) 10224710Skarels printf(" (including servers)"); 10324710Skarels putchar('\n'); 10424710Skarels if (Aflag) 10524710Skarels printf("%-8.8s ", "PCB"); 10624710Skarels printf(Aflag ? 10724710Skarels "%-5.5s %-6.6s %-6.6s %-18.18s %-18.18s %s\n" : 10824710Skarels "%-5.5s %-6.6s %-6.6s %-22.22s %-22.22s %s\n", 10924710Skarels "Proto", "Recv-Q", "Send-Q", 11024710Skarels "Local Address", "Foreign Address", "(state)"); 11124710Skarels first = 0; 11224710Skarels } 11324303Ssklower if (Aflag) 11424303Ssklower printf("%8x ", ppcb); 11524303Ssklower printf("%-5.5s %6d %6d ", name, sockb.so_rcv.sb_cc, 11624303Ssklower sockb.so_snd.sb_cc); 11724303Ssklower printf(" %-22.22s", ns_prpr(&nspcb.nsp_laddr)); 11824303Ssklower printf(" %-22.22s", ns_prpr(&nspcb.nsp_faddr)); 11924303Ssklower if (isspp) { 12024303Ssklower extern char *tcpstates[]; 121*29748Skupfer if (sppcb.s_state >= TCP_NSTATES) 12224303Ssklower printf(" %d", sppcb.s_state); 12324303Ssklower else 12424303Ssklower printf(" %s", tcpstates[sppcb.s_state]); 12524303Ssklower } 12624303Ssklower putchar('\n'); 12724303Ssklower prev = next; 12824303Ssklower } 12924303Ssklower } 13024303Ssklower #define ANY(x,y,z) ((x) ? printf("\t%d %s%s%s\n",x,y,plural(x),z) : 0) 13124303Ssklower 13224303Ssklower /* 13324303Ssklower * Dump SPP statistics structure. 13424303Ssklower */ 13524303Ssklower spp_stats(off, name) 13624303Ssklower off_t off; 13724303Ssklower char *name; 13824303Ssklower { 13924303Ssklower struct spp_istat spp_istat; 14024303Ssklower 14124667Skarels if (off == 0) 14224303Ssklower return; 14324303Ssklower klseek(kmem, off, 0); 14424303Ssklower read(kmem, (char *)&spp_istat, sizeof (spp_istat)); 14524303Ssklower printf("%s:\n", name); 14624303Ssklower ANY(spp_istat.nonucn, "connection", " dropped due to no new sockets "); 14724303Ssklower ANY(spp_istat.gonawy, "connection", " terminated due to our end dying"); 14824303Ssklower ANY(spp_istat.nonucn, "connection", " dropped due to inability to connect"); 14924303Ssklower ANY(spp_istat.noconn, "connection", " dropped due to inability to connect"); 15024303Ssklower ANY(spp_istat.notme, "connection", " incompleted due to mismatched id's"); 15124303Ssklower ANY(spp_istat.wrncon, "connection", " dropped due to mismatched id's"); 15224303Ssklower ANY(spp_istat.bdreas, "packet", " dropped out of sequence"); 15324303Ssklower ANY(spp_istat.lstdup, "packet", " duplicating the highest packet"); 15424303Ssklower ANY(spp_istat.notyet, "packet", " refused as exceeding allocation"); 15524303Ssklower } 15624303Ssklower 15724303Ssklower /* 15824303Ssklower * Dump IDP statistics structure. 15924303Ssklower */ 16024303Ssklower idp_stats(off, name) 16124303Ssklower off_t off; 16224303Ssklower char *name; 16324303Ssklower { 16424303Ssklower struct idpstat idpstat; 16524303Ssklower 16624667Skarels if (off == 0) 16724303Ssklower return; 16824303Ssklower klseek(kmem, off, 0); 16924303Ssklower read(kmem, (char *)&idpstat, sizeof (idpstat)); 170*29748Skupfer printf("%s:\n", name); 17124303Ssklower ANY(idpstat.idps_toosmall, "packet", " smaller than a header"); 17224303Ssklower ANY(idpstat.idps_tooshort, "packet", " smaller than advertised"); 17324303Ssklower ANY(idpstat.idps_badsum, "packet", " with bad checksums"); 17424303Ssklower } 17524303Ssklower 17624303Ssklower static char *((ns_errnames[])[2]) = { 17724303Ssklower {"Unspecified Error", " at Destination"}, 17824303Ssklower {"Bad Checksum", " at Destination"}, 17924303Ssklower {"No Listener", " at Socket"}, 18024303Ssklower {"Packet", " Refused due to lack of space at Destination"}, 18124303Ssklower {"Unspecified Error", " while gatewayed"}, 18224303Ssklower {"Bad Checksum", " while gatewayed"}, 18324303Ssklower {"Packet", " forwarded too many times"}, 18424303Ssklower {"Packet", " too large to be forwarded"}, 18524303Ssklower }; 18624303Ssklower 18724303Ssklower /* 18824303Ssklower * Dump NS Error statistics structure. 18924303Ssklower */ 190*29748Skupfer /*ARGSUSED*/ 19124303Ssklower nserr_stats(off, name) 19224303Ssklower off_t off; 19324303Ssklower char *name; 19424303Ssklower { 19524303Ssklower struct ns_errstat ns_errstat; 19624303Ssklower register int j; 19724303Ssklower register int histoprint = 1; 19824303Ssklower int z; 19924303Ssklower 20024667Skarels if (off == 0) 20124303Ssklower return; 20224303Ssklower klseek(kmem, off, 0); 20324303Ssklower read(kmem, (char *)&ns_errstat, sizeof (ns_errstat)); 20424303Ssklower printf("NS error statistics:\n"); 20524303Ssklower ANY(ns_errstat.ns_es_error, "call", " to ns_error"); 20624303Ssklower ANY(ns_errstat.ns_es_oldshort, "error", 20724303Ssklower " ignored due to insufficient addressing"); 20824303Ssklower ANY(ns_errstat.ns_es_oldns_err, "error request", 20924303Ssklower " in response to error packets"); 21024303Ssklower ANY(ns_errstat.ns_es_tooshort, "error packet", 21124303Ssklower " received incomplete"); 21224303Ssklower ANY(ns_errstat.ns_es_badcode, "error packet", 21324303Ssklower " received of unknown type"); 21424303Ssklower for(j = 0; j < NS_ERR_MAX; j ++) { 21524303Ssklower z = ns_errstat.ns_es_outhist[j]; 21624303Ssklower if (z && histoprint) { 21724303Ssklower printf("Output Error Histogram:\n"); 21824303Ssklower histoprint = 0; 21924303Ssklower } 22024303Ssklower ANY(z, ns_errnames[j][0], ns_errnames[j][1]); 22124303Ssklower } 22224303Ssklower histoprint = 1; 22324303Ssklower for(j = 0; j < NS_ERR_MAX; j ++) { 22424303Ssklower z = ns_errstat.ns_es_inhist[j]; 22524303Ssklower if (z && histoprint) { 22624303Ssklower printf("Input Error Histogram:\n"); 22724303Ssklower histoprint = 0; 22824303Ssklower } 22924303Ssklower ANY(z, ns_errnames[j][0], ns_errnames[j][1]); 23024303Ssklower } 23124303Ssklower } 23224303Ssklower static struct sockaddr_ns ssns = {AF_NS}; 23324303Ssklower 23424303Ssklower char *ns_prpr(x) 23524303Ssklower struct ns_addr *x; 23624303Ssklower { 23724303Ssklower extern char *ns_print(); 23824303Ssklower struct sockaddr_ns *sns = &ssns; 23924303Ssklower sns->sns_addr = *x; 24024303Ssklower return(ns_print(sns)); 24124303Ssklower } 242