124303Ssklower /* 234902Sbostic * Copyright (c) 1985, 1988 Regents of the University of California. 333451Skarels * All rights reserved. 433451Skarels * 533451Skarels * Redistribution and use in source and binary forms are permitted 634902Sbostic * provided that the above copyright notice and this paragraph are 734902Sbostic * duplicated in all such forms and that any documentation, 834902Sbostic * advertising materials, and other materials related to such 934902Sbostic * distribution and use acknowledge that the software was developed 1034902Sbostic * by the University of California, Berkeley. The name of the 1134902Sbostic * University may not be used to endorse or promote products derived 1234902Sbostic * from this software without specific prior written permission. 1334902Sbostic * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR 1434902Sbostic * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED 1534902Sbostic * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. 1624303Ssklower */ 1724303Ssklower 1824303Ssklower #ifndef lint 19*39211Ssklower static char sccsid[] = "@(#)ns.c 5.10 (Berkeley) 09/25/89"; 2034902Sbostic #endif /* not lint */ 2124303Ssklower 2224303Ssklower #include <stdio.h> 2324303Ssklower #include <errno.h> 2424303Ssklower #include <nlist.h> 2524303Ssklower 26*39211Ssklower #include <sys/param.h> 2724303Ssklower #include <sys/socket.h> 2824303Ssklower #include <sys/socketvar.h> 2924303Ssklower #include <sys/mbuf.h> 3024303Ssklower #include <sys/protosw.h> 3124303Ssklower 3224303Ssklower #include <net/route.h> 3324303Ssklower #include <net/if.h> 3424303Ssklower 3524303Ssklower #include <netinet/tcp_fsm.h> 3624303Ssklower 3724303Ssklower #include <netns/ns.h> 3824303Ssklower #include <netns/ns_pcb.h> 3924303Ssklower #include <netns/idp.h> 4024303Ssklower #include <netns/idp_var.h> 4124303Ssklower #include <netns/ns_error.h> 4224303Ssklower #include <netns/sp.h> 4324303Ssklower #include <netns/spidp.h> 4433823Skarels #include <netns/spp_timer.h> 4524303Ssklower #include <netns/spp_var.h> 4624303Ssklower #define SANAMES 4724303Ssklower #include <netns/spp_debug.h> 4824303Ssklower 4924303Ssklower 5024303Ssklower struct nspcb nspcb; 5124303Ssklower struct sppcb sppcb; 5224303Ssklower struct socket sockb; 5324303Ssklower extern int kmem; 5424303Ssklower extern int Aflag; 5524303Ssklower extern int aflag; 5624303Ssklower extern int nflag; 5729748Skupfer extern char *plural(); 5824303Ssklower char *ns_prpr(); 5924303Ssklower 6024303Ssklower static int first = 1; 6124303Ssklower 6224303Ssklower /* 6324303Ssklower * Print a summary of connections related to a Network Systems 6424303Ssklower * protocol. For SPP, also give state of connection. 6524303Ssklower * Listening processes (aflag) are suppressed unless the 6624303Ssklower * -a (all) flag is specified. 6724303Ssklower */ 6824303Ssklower 6924303Ssklower nsprotopr(off, name) 7024303Ssklower off_t off; 7124303Ssklower char *name; 7224303Ssklower { 7324303Ssklower struct nspcb cb; 7424303Ssklower register struct nspcb *prev, *next; 7524303Ssklower int isspp; 7624303Ssklower 7724667Skarels if (off == 0) 7824303Ssklower return; 7924303Ssklower isspp = strcmp(name, "spp") == 0; 8024303Ssklower klseek(kmem, off, 0); 8129748Skupfer read(kmem, (char *)&cb, sizeof (struct nspcb)); 8224303Ssklower nspcb = cb; 8324303Ssklower prev = (struct nspcb *)off; 8424667Skarels if (nspcb.nsp_next == (struct nspcb *)off) 8524667Skarels return; 8624303Ssklower for (;nspcb.nsp_next != (struct nspcb *)off; prev = next) { 8724303Ssklower off_t ppcb; 8824303Ssklower 8924303Ssklower next = nspcb.nsp_next; 9024303Ssklower klseek(kmem, (off_t)next, 0); 9129748Skupfer read(kmem, (char *)&nspcb, sizeof (nspcb)); 9224303Ssklower if (nspcb.nsp_prev != prev) { 9324303Ssklower printf("???\n"); 9424303Ssklower break; 9524303Ssklower } 9624303Ssklower if (!aflag && ns_nullhost(nspcb.nsp_faddr) ) { 9724303Ssklower continue; 9824303Ssklower } 9924303Ssklower klseek(kmem, (off_t)nspcb.nsp_socket, 0); 10029748Skupfer read(kmem, (char *)&sockb, sizeof (sockb)); 10124303Ssklower ppcb = (off_t) nspcb.nsp_pcb; 10224303Ssklower if (ppcb) { 10324303Ssklower if (isspp) { 10424303Ssklower klseek(kmem, ppcb, 0); 10529748Skupfer read(kmem, (char *)&sppcb, sizeof (sppcb)); 10624303Ssklower } else continue; 10724303Ssklower } else 10824303Ssklower if (isspp) continue; 10924710Skarels if (first) { 11024710Skarels printf("Active NS connections"); 11124710Skarels if (aflag) 11224710Skarels printf(" (including servers)"); 11324710Skarels putchar('\n'); 11424710Skarels if (Aflag) 11524710Skarels printf("%-8.8s ", "PCB"); 11624710Skarels printf(Aflag ? 11724710Skarels "%-5.5s %-6.6s %-6.6s %-18.18s %-18.18s %s\n" : 11824710Skarels "%-5.5s %-6.6s %-6.6s %-22.22s %-22.22s %s\n", 11924710Skarels "Proto", "Recv-Q", "Send-Q", 12024710Skarels "Local Address", "Foreign Address", "(state)"); 12124710Skarels first = 0; 12224710Skarels } 12324303Ssklower if (Aflag) 12424303Ssklower printf("%8x ", ppcb); 12524303Ssklower printf("%-5.5s %6d %6d ", name, sockb.so_rcv.sb_cc, 12624303Ssklower sockb.so_snd.sb_cc); 12724303Ssklower printf(" %-22.22s", ns_prpr(&nspcb.nsp_laddr)); 12824303Ssklower printf(" %-22.22s", ns_prpr(&nspcb.nsp_faddr)); 12924303Ssklower if (isspp) { 13024303Ssklower extern char *tcpstates[]; 13129748Skupfer if (sppcb.s_state >= TCP_NSTATES) 13224303Ssklower printf(" %d", sppcb.s_state); 13324303Ssklower else 13424303Ssklower printf(" %s", tcpstates[sppcb.s_state]); 13524303Ssklower } 13624303Ssklower putchar('\n'); 13724303Ssklower prev = next; 13824303Ssklower } 13924303Ssklower } 14033640Ssklower #define ANY(x,y,z) ((x) ? printf("\t%d %s%s%s -- %s\n",x,y,plural(x),z,"x") : 0) 14124303Ssklower 14224303Ssklower /* 14324303Ssklower * Dump SPP statistics structure. 14424303Ssklower */ 14524303Ssklower spp_stats(off, name) 14624303Ssklower off_t off; 14724303Ssklower char *name; 14824303Ssklower { 14924303Ssklower struct spp_istat spp_istat; 15033640Ssklower #define sppstat spp_istat.newstats 15124303Ssklower 15224667Skarels if (off == 0) 15324303Ssklower return; 15424303Ssklower klseek(kmem, off, 0); 15524303Ssklower read(kmem, (char *)&spp_istat, sizeof (spp_istat)); 15624303Ssklower printf("%s:\n", name); 15724303Ssklower ANY(spp_istat.nonucn, "connection", " dropped due to no new sockets "); 15824303Ssklower ANY(spp_istat.gonawy, "connection", " terminated due to our end dying"); 15924303Ssklower ANY(spp_istat.nonucn, "connection", " dropped due to inability to connect"); 16024303Ssklower ANY(spp_istat.noconn, "connection", " dropped due to inability to connect"); 16124303Ssklower ANY(spp_istat.notme, "connection", " incompleted due to mismatched id's"); 16224303Ssklower ANY(spp_istat.wrncon, "connection", " dropped due to mismatched id's"); 16324303Ssklower ANY(spp_istat.bdreas, "packet", " dropped out of sequence"); 16424303Ssklower ANY(spp_istat.lstdup, "packet", " duplicating the highest packet"); 16524303Ssklower ANY(spp_istat.notyet, "packet", " refused as exceeding allocation"); 16633640Ssklower ANY(sppstat.spps_connattempt, "connection", " initiated"); 16733640Ssklower ANY(sppstat.spps_accepts, "connection", " accepted"); 16833640Ssklower ANY(sppstat.spps_connects, "connection", " established"); 16933640Ssklower ANY(sppstat.spps_drops, "connection", " dropped"); 17033640Ssklower ANY(sppstat.spps_conndrops, "embryonic connection", " dropped"); 17133640Ssklower ANY(sppstat.spps_closed, "connection", " closed (includes drops)"); 17233640Ssklower ANY(sppstat.spps_segstimed, "packet", " where we tried to get rtt"); 17333640Ssklower ANY(sppstat.spps_rttupdated, "time", " we got rtt"); 17433640Ssklower ANY(sppstat.spps_delack, "delayed ack", " sent"); 17533640Ssklower ANY(sppstat.spps_timeoutdrop, "connection", " dropped in rxmt timeout"); 17633640Ssklower ANY(sppstat.spps_rexmttimeo, "retransmit timeout", ""); 17733640Ssklower ANY(sppstat.spps_persisttimeo, "persist timeout", ""); 17833640Ssklower ANY(sppstat.spps_keeptimeo, "keepalive timeout", ""); 17933640Ssklower ANY(sppstat.spps_keepprobe, "keepalive probe", " sent"); 18033640Ssklower ANY(sppstat.spps_keepdrops, "connection", " dropped in keepalive"); 18133640Ssklower ANY(sppstat.spps_sndtotal, "total packet", " sent"); 18233640Ssklower ANY(sppstat.spps_sndpack, "data packet", " sent"); 18333640Ssklower ANY(sppstat.spps_sndbyte, "data byte", " sent"); 18433640Ssklower ANY(sppstat.spps_sndrexmitpack, "data packet", " retransmitted"); 18533640Ssklower ANY(sppstat.spps_sndrexmitbyte, "data byte", " retransmitted"); 18633640Ssklower ANY(sppstat.spps_sndacks, "ack-only packet", " sent"); 18733640Ssklower ANY(sppstat.spps_sndprobe, "window probe", " sent"); 18833640Ssklower ANY(sppstat.spps_sndurg, "packet", " sent with URG only"); 18933640Ssklower ANY(sppstat.spps_sndwinup, "window update-only packet", " sent"); 19033640Ssklower ANY(sppstat.spps_sndctrl, "control (SYN|FIN|RST) packet", " sent"); 19133640Ssklower ANY(sppstat.spps_sndvoid, "request", " to send a non-existant packet"); 19233640Ssklower ANY(sppstat.spps_rcvtotal, "total packet", " received"); 19333640Ssklower ANY(sppstat.spps_rcvpack, "packet", " received in sequence"); 19433640Ssklower ANY(sppstat.spps_rcvbyte, "byte", " received in sequence"); 19533640Ssklower ANY(sppstat.spps_rcvbadsum, "packet", " received with ccksum errs"); 19633640Ssklower ANY(sppstat.spps_rcvbadoff, "packet", " received with bad offset"); 19733640Ssklower ANY(sppstat.spps_rcvshort, "packet", " received too short"); 19833640Ssklower ANY(sppstat.spps_rcvduppack, "duplicate-only packet", " received"); 19933640Ssklower ANY(sppstat.spps_rcvdupbyte, "duplicate-only byte", " received"); 20033640Ssklower ANY(sppstat.spps_rcvpartduppack, "packet", " with some duplicate data"); 20133640Ssklower ANY(sppstat.spps_rcvpartdupbyte, "dup. byte", " in part-dup. packet"); 20233640Ssklower ANY(sppstat.spps_rcvoopack, "out-of-order packet", " received"); 20333640Ssklower ANY(sppstat.spps_rcvoobyte, "out-of-order byte", " received"); 20433640Ssklower ANY(sppstat.spps_rcvpackafterwin, "packet", " with data after window"); 20533640Ssklower ANY(sppstat.spps_rcvbyteafterwin, "byte", " rcvd after window"); 20633640Ssklower ANY(sppstat.spps_rcvafterclose, "packet", " rcvd after 'close'"); 20733640Ssklower ANY(sppstat.spps_rcvwinprobe, "rcvd window probe packet", ""); 20833640Ssklower ANY(sppstat.spps_rcvdupack, "rcvd duplicate ack", ""); 20933640Ssklower ANY(sppstat.spps_rcvacktoomuch, "rcvd ack", " for unsent data"); 21033640Ssklower ANY(sppstat.spps_rcvackpack, "rcvd ack packet", ""); 21133640Ssklower ANY(sppstat.spps_rcvackbyte, "byte", " acked by rcvd acks"); 21233640Ssklower ANY(sppstat.spps_rcvwinupd, "rcvd window update packet", ""); 21324303Ssklower } 21433640Ssklower #undef ANY 21533640Ssklower #define ANY(x,y,z) ((x) ? printf("\t%d %s%s%s\n",x,y,plural(x),z) : 0) 21624303Ssklower 21724303Ssklower /* 21824303Ssklower * Dump IDP statistics structure. 21924303Ssklower */ 22024303Ssklower idp_stats(off, name) 22124303Ssklower off_t off; 22224303Ssklower char *name; 22324303Ssklower { 22424303Ssklower struct idpstat idpstat; 22524303Ssklower 22624667Skarels if (off == 0) 22724303Ssklower return; 22824303Ssklower klseek(kmem, off, 0); 22924303Ssklower read(kmem, (char *)&idpstat, sizeof (idpstat)); 23029748Skupfer printf("%s:\n", name); 23124303Ssklower ANY(idpstat.idps_toosmall, "packet", " smaller than a header"); 23224303Ssklower ANY(idpstat.idps_tooshort, "packet", " smaller than advertised"); 23324303Ssklower ANY(idpstat.idps_badsum, "packet", " with bad checksums"); 23424303Ssklower } 23524303Ssklower 23633640Ssklower static struct { 23733640Ssklower u_short code; 23833640Ssklower char *name; 23933640Ssklower char *where; 24033640Ssklower } ns_errnames[] = { 24133640Ssklower {0, "Unspecified Error", " at Destination"}, 24233640Ssklower {1, "Bad Checksum", " at Destination"}, 24333640Ssklower {2, "No Listener", " at Socket"}, 24433640Ssklower {3, "Packet", " Refused due to lack of space at Destination"}, 24533640Ssklower {01000, "Unspecified Error", " while gatewayed"}, 24633640Ssklower {01001, "Bad Checksum", " while gatewayed"}, 24733640Ssklower {01002, "Packet", " forwarded too many times"}, 24833640Ssklower {01003, "Packet", " too large to be forwarded"}, 24933640Ssklower {-1, 0, 0}, 25024303Ssklower }; 25124303Ssklower 25224303Ssklower /* 25324303Ssklower * Dump NS Error statistics structure. 25424303Ssklower */ 25529748Skupfer /*ARGSUSED*/ 25624303Ssklower nserr_stats(off, name) 25724303Ssklower off_t off; 25824303Ssklower char *name; 25924303Ssklower { 26024303Ssklower struct ns_errstat ns_errstat; 26124303Ssklower register int j; 26224303Ssklower register int histoprint = 1; 26324303Ssklower int z; 26424303Ssklower 26524667Skarels if (off == 0) 26624303Ssklower return; 26724303Ssklower klseek(kmem, off, 0); 26824303Ssklower read(kmem, (char *)&ns_errstat, sizeof (ns_errstat)); 26924303Ssklower printf("NS error statistics:\n"); 27024303Ssklower ANY(ns_errstat.ns_es_error, "call", " to ns_error"); 27124303Ssklower ANY(ns_errstat.ns_es_oldshort, "error", 27224303Ssklower " ignored due to insufficient addressing"); 27324303Ssklower ANY(ns_errstat.ns_es_oldns_err, "error request", 27424303Ssklower " in response to error packets"); 27524303Ssklower ANY(ns_errstat.ns_es_tooshort, "error packet", 27624303Ssklower " received incomplete"); 27724303Ssklower ANY(ns_errstat.ns_es_badcode, "error packet", 27824303Ssklower " received of unknown type"); 27924303Ssklower for(j = 0; j < NS_ERR_MAX; j ++) { 28024303Ssklower z = ns_errstat.ns_es_outhist[j]; 28124303Ssklower if (z && histoprint) { 28224303Ssklower printf("Output Error Histogram:\n"); 28324303Ssklower histoprint = 0; 28424303Ssklower } 28533640Ssklower ns_erputil(z, ns_errstat.ns_es_codes[j]); 28633640Ssklower 28724303Ssklower } 28824303Ssklower histoprint = 1; 28924303Ssklower for(j = 0; j < NS_ERR_MAX; j ++) { 29024303Ssklower z = ns_errstat.ns_es_inhist[j]; 29124303Ssklower if (z && histoprint) { 29224303Ssklower printf("Input Error Histogram:\n"); 29324303Ssklower histoprint = 0; 29424303Ssklower } 29533640Ssklower ns_erputil(z, ns_errstat.ns_es_codes[j]); 29624303Ssklower } 29724303Ssklower } 29833640Ssklower static 29933640Ssklower ns_erputil(z, c) 30033640Ssklower { 30133640Ssklower int j; 30233640Ssklower char codebuf[30]; 30333640Ssklower char *name, *where; 30433640Ssklower for(j = 0;; j ++) { 30533640Ssklower if ((name = ns_errnames[j].name) == 0) 30633640Ssklower break; 30733640Ssklower if (ns_errnames[j].code == c) 30833640Ssklower break; 30933640Ssklower } 31033640Ssklower if (name == 0) { 31133640Ssklower if (c > 01000) 31233640Ssklower where = "in transit"; 31333640Ssklower else 31433640Ssklower where = "at destination"; 31533640Ssklower sprintf(codebuf, "Unknown XNS error code 0%o", c); 31633640Ssklower name = codebuf; 31733640Ssklower } else 31833640Ssklower where = ns_errnames[j].where; 31933640Ssklower ANY(z, name, where); 32033640Ssklower } 32124303Ssklower static struct sockaddr_ns ssns = {AF_NS}; 32224303Ssklower 32324303Ssklower char *ns_prpr(x) 32424303Ssklower struct ns_addr *x; 32524303Ssklower { 32624303Ssklower extern char *ns_print(); 32724303Ssklower struct sockaddr_ns *sns = &ssns; 32824303Ssklower sns->sns_addr = *x; 32924303Ssklower return(ns_print(sns)); 33024303Ssklower } 331