xref: /csrg-svn/usr.bin/netstat/ns.c (revision 33640)
124303Ssklower /*
233451Skarels  * Copyright (c) 1985,1988 Regents of the University of California.
333451Skarels  * All rights reserved.
433451Skarels  *
533451Skarels  * Redistribution and use in source and binary forms are permitted
633451Skarels  * provided that this notice is preserved and that due credit is given
733451Skarels  * to the University of California at Berkeley. The name of the University
833451Skarels  * may not be used to endorse or promote products derived from this
933451Skarels  * software without specific prior written permission. This software
1033451Skarels  * is provided ``as is'' without express or implied warranty.
1124303Ssklower  */
1224303Ssklower 
1324303Ssklower #ifndef lint
14*33640Ssklower static char sccsid[] = "@(#)ns.c	5.7 (Berkeley) 03/03/88";
1524303Ssklower #endif not lint
1624303Ssklower 
1724303Ssklower #include <stdio.h>
1824303Ssklower #include <errno.h>
1924303Ssklower #include <nlist.h>
2024303Ssklower 
2124303Ssklower #include <sys/types.h>
2224303Ssklower #include <sys/socket.h>
2324303Ssklower #include <sys/socketvar.h>
2424303Ssklower #include <sys/mbuf.h>
2524303Ssklower #include <sys/protosw.h>
2624303Ssklower 
2724303Ssklower #include <net/route.h>
2824303Ssklower #include <net/if.h>
2924303Ssklower 
3024303Ssklower #include <netinet/tcp_fsm.h>
3124303Ssklower #include <netinet/tcp_timer.h>
3224303Ssklower 
3324303Ssklower #include <netns/ns.h>
3424303Ssklower #include <netns/ns_pcb.h>
3524303Ssklower #include <netns/idp.h>
3624303Ssklower #include <netns/idp_var.h>
3724303Ssklower #include <netns/ns_error.h>
3824303Ssklower #include <netns/sp.h>
3924303Ssklower #include <netns/spidp.h>
4024303Ssklower #include <netns/spp_var.h>
4124303Ssklower #define SANAMES
4224303Ssklower #include <netns/spp_debug.h>
4324303Ssklower 
4424303Ssklower 
4524303Ssklower struct	nspcb nspcb;
4624303Ssklower struct	sppcb sppcb;
4724303Ssklower struct	socket sockb;
4824303Ssklower extern	int kmem;
4924303Ssklower extern	int Aflag;
5024303Ssklower extern	int aflag;
5124303Ssklower extern	int nflag;
5229748Skupfer extern	char *plural();
5324303Ssklower char *ns_prpr();
5424303Ssklower 
5524303Ssklower static	int first = 1;
5624303Ssklower 
5724303Ssklower /*
5824303Ssklower  * Print a summary of connections related to a Network Systems
5924303Ssklower  * protocol.  For SPP, also give state of connection.
6024303Ssklower  * Listening processes (aflag) are suppressed unless the
6124303Ssklower  * -a (all) flag is specified.
6224303Ssklower  */
6324303Ssklower 
6424303Ssklower nsprotopr(off, name)
6524303Ssklower 	off_t off;
6624303Ssklower 	char *name;
6724303Ssklower {
6824303Ssklower 	struct nspcb cb;
6924303Ssklower 	register struct nspcb *prev, *next;
7024303Ssklower 	int isspp;
7124303Ssklower 
7224667Skarels 	if (off == 0)
7324303Ssklower 		return;
7424303Ssklower 	isspp = strcmp(name, "spp") == 0;
7524303Ssklower 	klseek(kmem, off, 0);
7629748Skupfer 	read(kmem, (char *)&cb, sizeof (struct nspcb));
7724303Ssklower 	nspcb = cb;
7824303Ssklower 	prev = (struct nspcb *)off;
7924667Skarels 	if (nspcb.nsp_next == (struct nspcb *)off)
8024667Skarels 		return;
8124303Ssklower 	for (;nspcb.nsp_next != (struct nspcb *)off; prev = next) {
8224303Ssklower 		off_t ppcb;
8324303Ssklower 
8424303Ssklower 		next = nspcb.nsp_next;
8524303Ssklower 		klseek(kmem, (off_t)next, 0);
8629748Skupfer 		read(kmem, (char *)&nspcb, sizeof (nspcb));
8724303Ssklower 		if (nspcb.nsp_prev != prev) {
8824303Ssklower 			printf("???\n");
8924303Ssklower 			break;
9024303Ssklower 		}
9124303Ssklower 		if (!aflag && ns_nullhost(nspcb.nsp_faddr) ) {
9224303Ssklower 			continue;
9324303Ssklower 		}
9424303Ssklower 		klseek(kmem, (off_t)nspcb.nsp_socket, 0);
9529748Skupfer 		read(kmem, (char *)&sockb, sizeof (sockb));
9624303Ssklower 		ppcb = (off_t) nspcb.nsp_pcb;
9724303Ssklower 		if (ppcb) {
9824303Ssklower 			if (isspp) {
9924303Ssklower 				klseek(kmem, ppcb, 0);
10029748Skupfer 				read(kmem, (char *)&sppcb, sizeof (sppcb));
10124303Ssklower 			} else continue;
10224303Ssklower 		} else
10324303Ssklower 			if (isspp) continue;
10424710Skarels 		if (first) {
10524710Skarels 			printf("Active NS connections");
10624710Skarels 			if (aflag)
10724710Skarels 				printf(" (including servers)");
10824710Skarels 			putchar('\n');
10924710Skarels 			if (Aflag)
11024710Skarels 				printf("%-8.8s ", "PCB");
11124710Skarels 			printf(Aflag ?
11224710Skarels 				"%-5.5s %-6.6s %-6.6s  %-18.18s %-18.18s %s\n" :
11324710Skarels 				"%-5.5s %-6.6s %-6.6s  %-22.22s %-22.22s %s\n",
11424710Skarels 				"Proto", "Recv-Q", "Send-Q",
11524710Skarels 				"Local Address", "Foreign Address", "(state)");
11624710Skarels 			first = 0;
11724710Skarels 		}
11824303Ssklower 		if (Aflag)
11924303Ssklower 			printf("%8x ", ppcb);
12024303Ssklower 		printf("%-5.5s %6d %6d ", name, sockb.so_rcv.sb_cc,
12124303Ssklower 			sockb.so_snd.sb_cc);
12224303Ssklower 		printf("  %-22.22s", ns_prpr(&nspcb.nsp_laddr));
12324303Ssklower 		printf(" %-22.22s", ns_prpr(&nspcb.nsp_faddr));
12424303Ssklower 		if (isspp) {
12524303Ssklower 			extern char *tcpstates[];
12629748Skupfer 			if (sppcb.s_state >= TCP_NSTATES)
12724303Ssklower 				printf(" %d", sppcb.s_state);
12824303Ssklower 			else
12924303Ssklower 				printf(" %s", tcpstates[sppcb.s_state]);
13024303Ssklower 		}
13124303Ssklower 		putchar('\n');
13224303Ssklower 		prev = next;
13324303Ssklower 	}
13424303Ssklower }
135*33640Ssklower #define ANY(x,y,z)  ((x) ? printf("\t%d %s%s%s -- %s\n",x,y,plural(x),z,"x") : 0)
13624303Ssklower 
13724303Ssklower /*
13824303Ssklower  * Dump SPP statistics structure.
13924303Ssklower  */
14024303Ssklower spp_stats(off, name)
14124303Ssklower 	off_t off;
14224303Ssklower 	char *name;
14324303Ssklower {
14424303Ssklower 	struct spp_istat spp_istat;
145*33640Ssklower #define sppstat spp_istat.newstats
14624303Ssklower 
14724667Skarels 	if (off == 0)
14824303Ssklower 		return;
14924303Ssklower 	klseek(kmem, off, 0);
15024303Ssklower 	read(kmem, (char *)&spp_istat, sizeof (spp_istat));
15124303Ssklower 	printf("%s:\n", name);
15224303Ssklower 	ANY(spp_istat.nonucn, "connection", " dropped due to no new sockets ");
15324303Ssklower 	ANY(spp_istat.gonawy, "connection", " terminated due to our end dying");
15424303Ssklower 	ANY(spp_istat.nonucn, "connection", " dropped due to inability to connect");
15524303Ssklower 	ANY(spp_istat.noconn, "connection", " dropped due to inability to connect");
15624303Ssklower 	ANY(spp_istat.notme, "connection", " incompleted due to mismatched id's");
15724303Ssklower 	ANY(spp_istat.wrncon, "connection", " dropped due to mismatched id's");
15824303Ssklower 	ANY(spp_istat.bdreas, "packet", " dropped out of sequence");
15924303Ssklower 	ANY(spp_istat.lstdup, "packet", " duplicating the highest packet");
16024303Ssklower 	ANY(spp_istat.notyet, "packet", " refused as exceeding allocation");
161*33640Ssklower 	ANY(sppstat.spps_connattempt, "connection", " initiated");
162*33640Ssklower 	ANY(sppstat.spps_accepts, "connection", " accepted");
163*33640Ssklower 	ANY(sppstat.spps_connects, "connection", " established");
164*33640Ssklower 	ANY(sppstat.spps_drops, "connection", " dropped");
165*33640Ssklower 	ANY(sppstat.spps_conndrops, "embryonic connection", " dropped");
166*33640Ssklower 	ANY(sppstat.spps_closed, "connection", " closed (includes drops)");
167*33640Ssklower 	ANY(sppstat.spps_segstimed, "packet", " where we tried to get rtt");
168*33640Ssklower 	ANY(sppstat.spps_rttupdated, "time", " we got rtt");
169*33640Ssklower 	ANY(sppstat.spps_delack, "delayed ack", " sent");
170*33640Ssklower 	ANY(sppstat.spps_timeoutdrop, "connection", " dropped in rxmt timeout");
171*33640Ssklower 	ANY(sppstat.spps_rexmttimeo, "retransmit timeout", "");
172*33640Ssklower 	ANY(sppstat.spps_persisttimeo, "persist timeout", "");
173*33640Ssklower 	ANY(sppstat.spps_keeptimeo, "keepalive timeout", "");
174*33640Ssklower 	ANY(sppstat.spps_keepprobe, "keepalive probe", " sent");
175*33640Ssklower 	ANY(sppstat.spps_keepdrops, "connection", " dropped in keepalive");
176*33640Ssklower 	ANY(sppstat.spps_sndtotal, "total packet", " sent");
177*33640Ssklower 	ANY(sppstat.spps_sndpack, "data packet", " sent");
178*33640Ssklower 	ANY(sppstat.spps_sndbyte, "data byte", " sent");
179*33640Ssklower 	ANY(sppstat.spps_sndrexmitpack, "data packet", " retransmitted");
180*33640Ssklower 	ANY(sppstat.spps_sndrexmitbyte, "data byte", " retransmitted");
181*33640Ssklower 	ANY(sppstat.spps_sndacks, "ack-only packet", " sent");
182*33640Ssklower 	ANY(sppstat.spps_sndprobe, "window probe", " sent");
183*33640Ssklower 	ANY(sppstat.spps_sndurg, "packet", " sent with URG only");
184*33640Ssklower 	ANY(sppstat.spps_sndwinup, "window update-only packet", " sent");
185*33640Ssklower 	ANY(sppstat.spps_sndctrl, "control (SYN|FIN|RST) packet", " sent");
186*33640Ssklower 	ANY(sppstat.spps_sndvoid, "request", " to send a non-existant packet");
187*33640Ssklower 	ANY(sppstat.spps_rcvtotal, "total packet", " received");
188*33640Ssklower 	ANY(sppstat.spps_rcvpack, "packet", " received in sequence");
189*33640Ssklower 	ANY(sppstat.spps_rcvbyte, "byte", " received in sequence");
190*33640Ssklower 	ANY(sppstat.spps_rcvbadsum, "packet", " received with ccksum errs");
191*33640Ssklower 	ANY(sppstat.spps_rcvbadoff, "packet", " received with bad offset");
192*33640Ssklower 	ANY(sppstat.spps_rcvshort, "packet", " received too short");
193*33640Ssklower 	ANY(sppstat.spps_rcvduppack, "duplicate-only packet", " received");
194*33640Ssklower 	ANY(sppstat.spps_rcvdupbyte, "duplicate-only byte", " received");
195*33640Ssklower 	ANY(sppstat.spps_rcvpartduppack, "packet", " with some duplicate data");
196*33640Ssklower 	ANY(sppstat.spps_rcvpartdupbyte, "dup. byte", " in part-dup. packet");
197*33640Ssklower 	ANY(sppstat.spps_rcvoopack, "out-of-order packet", " received");
198*33640Ssklower 	ANY(sppstat.spps_rcvoobyte, "out-of-order byte", " received");
199*33640Ssklower 	ANY(sppstat.spps_rcvpackafterwin, "packet", " with data after window");
200*33640Ssklower 	ANY(sppstat.spps_rcvbyteafterwin, "byte", " rcvd after window");
201*33640Ssklower 	ANY(sppstat.spps_rcvafterclose, "packet", " rcvd after 'close'");
202*33640Ssklower 	ANY(sppstat.spps_rcvwinprobe, "rcvd window probe packet", "");
203*33640Ssklower 	ANY(sppstat.spps_rcvdupack, "rcvd duplicate ack", "");
204*33640Ssklower 	ANY(sppstat.spps_rcvacktoomuch, "rcvd ack", " for unsent data");
205*33640Ssklower 	ANY(sppstat.spps_rcvackpack, "rcvd ack packet", "");
206*33640Ssklower 	ANY(sppstat.spps_rcvackbyte, "byte", " acked by rcvd acks");
207*33640Ssklower 	ANY(sppstat.spps_rcvwinupd, "rcvd window update packet", "");
20824303Ssklower }
209*33640Ssklower #undef ANY
210*33640Ssklower #define ANY(x,y,z)  ((x) ? printf("\t%d %s%s%s\n",x,y,plural(x),z) : 0)
21124303Ssklower 
21224303Ssklower /*
21324303Ssklower  * Dump IDP statistics structure.
21424303Ssklower  */
21524303Ssklower idp_stats(off, name)
21624303Ssklower 	off_t off;
21724303Ssklower 	char *name;
21824303Ssklower {
21924303Ssklower 	struct idpstat idpstat;
22024303Ssklower 
22124667Skarels 	if (off == 0)
22224303Ssklower 		return;
22324303Ssklower 	klseek(kmem, off, 0);
22424303Ssklower 	read(kmem, (char *)&idpstat, sizeof (idpstat));
22529748Skupfer 	printf("%s:\n", name);
22624303Ssklower 	ANY(idpstat.idps_toosmall, "packet", " smaller than a header");
22724303Ssklower 	ANY(idpstat.idps_tooshort, "packet", " smaller than advertised");
22824303Ssklower 	ANY(idpstat.idps_badsum, "packet", " with bad checksums");
22924303Ssklower }
23024303Ssklower 
231*33640Ssklower static	struct {
232*33640Ssklower 	u_short code;
233*33640Ssklower 	char *name;
234*33640Ssklower 	char *where;
235*33640Ssklower } ns_errnames[] = {
236*33640Ssklower 	{0, "Unspecified Error", " at Destination"},
237*33640Ssklower 	{1, "Bad Checksum", " at Destination"},
238*33640Ssklower 	{2, "No Listener", " at Socket"},
239*33640Ssklower 	{3, "Packet", " Refused due to lack of space at Destination"},
240*33640Ssklower 	{01000, "Unspecified Error", " while gatewayed"},
241*33640Ssklower 	{01001, "Bad Checksum", " while gatewayed"},
242*33640Ssklower 	{01002, "Packet", " forwarded too many times"},
243*33640Ssklower 	{01003, "Packet", " too large to be forwarded"},
244*33640Ssklower 	{-1, 0, 0},
24524303Ssklower };
24624303Ssklower 
24724303Ssklower /*
24824303Ssklower  * Dump NS Error statistics structure.
24924303Ssklower  */
25029748Skupfer /*ARGSUSED*/
25124303Ssklower nserr_stats(off, name)
25224303Ssklower 	off_t off;
25324303Ssklower 	char *name;
25424303Ssklower {
25524303Ssklower 	struct ns_errstat ns_errstat;
25624303Ssklower 	register int j;
25724303Ssklower 	register int histoprint = 1;
25824303Ssklower 	int z;
25924303Ssklower 
26024667Skarels 	if (off == 0)
26124303Ssklower 		return;
26224303Ssklower 	klseek(kmem, off, 0);
26324303Ssklower 	read(kmem, (char *)&ns_errstat, sizeof (ns_errstat));
26424303Ssklower 	printf("NS error statistics:\n");
26524303Ssklower 	ANY(ns_errstat.ns_es_error, "call", " to ns_error");
26624303Ssklower 	ANY(ns_errstat.ns_es_oldshort, "error",
26724303Ssklower 		" ignored due to insufficient addressing");
26824303Ssklower 	ANY(ns_errstat.ns_es_oldns_err, "error request",
26924303Ssklower 		" in response to error packets");
27024303Ssklower 	ANY(ns_errstat.ns_es_tooshort, "error packet",
27124303Ssklower 		" received incomplete");
27224303Ssklower 	ANY(ns_errstat.ns_es_badcode, "error packet",
27324303Ssklower 		" received of unknown type");
27424303Ssklower 	for(j = 0; j < NS_ERR_MAX; j ++) {
27524303Ssklower 		z = ns_errstat.ns_es_outhist[j];
27624303Ssklower 		if (z && histoprint) {
27724303Ssklower 			printf("Output Error Histogram:\n");
27824303Ssklower 			histoprint = 0;
27924303Ssklower 		}
280*33640Ssklower 		ns_erputil(z, ns_errstat.ns_es_codes[j]);
281*33640Ssklower 
28224303Ssklower 	}
28324303Ssklower 	histoprint = 1;
28424303Ssklower 	for(j = 0; j < NS_ERR_MAX; j ++) {
28524303Ssklower 		z = ns_errstat.ns_es_inhist[j];
28624303Ssklower 		if (z && histoprint) {
28724303Ssklower 			printf("Input Error Histogram:\n");
28824303Ssklower 			histoprint = 0;
28924303Ssklower 		}
290*33640Ssklower 		ns_erputil(z, ns_errstat.ns_es_codes[j]);
29124303Ssklower 	}
29224303Ssklower }
293*33640Ssklower static
294*33640Ssklower ns_erputil(z, c)
295*33640Ssklower {
296*33640Ssklower 	int j;
297*33640Ssklower 	char codebuf[30];
298*33640Ssklower 	char *name, *where;
299*33640Ssklower 	for(j = 0;; j ++) {
300*33640Ssklower 		if ((name = ns_errnames[j].name) == 0)
301*33640Ssklower 			break;
302*33640Ssklower 		if (ns_errnames[j].code == c)
303*33640Ssklower 			break;
304*33640Ssklower 	}
305*33640Ssklower 	if (name == 0)  {
306*33640Ssklower 		if (c > 01000)
307*33640Ssklower 			where = "in transit";
308*33640Ssklower 		else
309*33640Ssklower 			where = "at destination";
310*33640Ssklower 		sprintf(codebuf, "Unknown XNS error code 0%o", c);
311*33640Ssklower 		name = codebuf;
312*33640Ssklower 	} else
313*33640Ssklower 		where =  ns_errnames[j].where;
314*33640Ssklower 	ANY(z, name, where);
315*33640Ssklower }
31624303Ssklower static struct sockaddr_ns ssns = {AF_NS};
31724303Ssklower 
31824303Ssklower char *ns_prpr(x)
31924303Ssklower struct ns_addr *x;
32024303Ssklower {
32124303Ssklower 	extern char *ns_print();
32224303Ssklower 	struct sockaddr_ns *sns = &ssns;
32324303Ssklower 	sns->sns_addr = *x;
32424303Ssklower 	return(ns_print(sns));
32524303Ssklower }
326