freebsd-nq/usr.bin/netstat/sctp.c

783 lines
22 KiB
C
Raw Normal View History

2007-06-09 13:44:09 +00:00
/*-
* Copyright (c) 2001-2007, by Weongyo Jeong. All rights reserved.
* Copyright (c) 2011, by Michael Tuexen. All rights reserved.
2007-06-09 13:44:09 +00:00
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are met:
*
* a) Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
*
* b) Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the distribution.
*
* c) Neither the name of Cisco Systems, Inc. nor the names of its
* contributors may be used to endorse or promote products derived
* from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
* THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
* THE POSSIBILITY OF SUCH DAMAGE.
*/
#if 0
#ifndef lint
static char sccsid[] = "@(#)sctp.c 0.1 (Berkeley) 4/18/2007";
#endif /* not lint */
#endif
#include <sys/cdefs.h>
__FBSDID("$FreeBSD$");
#include <sys/param.h>
#include <sys/queue.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/socketvar.h>
#include <sys/sysctl.h>
#include <sys/protosw.h>
#include <netinet/in.h>
#include <netinet/sctp.h>
#include <netinet/sctp_constants.h>
#include <arpa/inet.h>
#include <err.h>
#include <errno.h>
#include <libutil.h>
#include <netdb.h>
2007-06-09 13:44:09 +00:00
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
2007-06-09 13:44:09 +00:00
#include "netstat.h"
#ifdef SCTP
static void sctp_statesprint(uint32_t state);
#define NETSTAT_SCTP_STATES_CLOSED 0x0
#define NETSTAT_SCTP_STATES_BOUND 0x1
#define NETSTAT_SCTP_STATES_LISTEN 0x2
#define NETSTAT_SCTP_STATES_COOKIE_WAIT 0x3
#define NETSTAT_SCTP_STATES_COOKIE_ECHOED 0x4
#define NETSTAT_SCTP_STATES_ESTABLISHED 0x5
#define NETSTAT_SCTP_STATES_SHUTDOWN_SENT 0x6
#define NETSTAT_SCTP_STATES_SHUTDOWN_RECEIVED 0x7
#define NETSTAT_SCTP_STATES_SHUTDOWN_ACK_SENT 0x8
#define NETSTAT_SCTP_STATES_SHUTDOWN_PENDING 0x9
2007-06-09 13:44:09 +00:00
char *sctpstates[] = {
"CLOSED",
"BOUND",
"LISTEN",
"COOKIE_WAIT",
"COOKIE_ECHOED",
"ESTABLISHED",
2007-06-09 13:44:09 +00:00
"SHUTDOWN_SENT",
"SHUTDOWN_RECEIVED",
"SHUTDOWN_ACK_SENT",
"SHUTDOWN_PENDING"
};
LIST_HEAD(xladdr_list, xladdr_entry) xladdr_head;
struct xladdr_entry {
struct xsctp_laddr *xladdr;
LIST_ENTRY(xladdr_entry) xladdr_entries;
};
LIST_HEAD(xraddr_list, xraddr_entry) xraddr_head;
struct xraddr_entry {
struct xsctp_raddr *xraddr;
LIST_ENTRY(xraddr_entry) xraddr_entries;
};
/*
* Construct an Internet address representation.
* If numeric_addr has been supplied, give
* numeric value, otherwise try for symbolic name.
*/
static char *
inetname(struct in_addr *inp)
{
char *cp;
static char line[MAXHOSTNAMELEN];
struct hostent *hp;
struct netent *np;
cp = 0;
if (!numeric_addr && inp->s_addr != INADDR_ANY) {
int net = inet_netof(*inp);
int lna = inet_lnaof(*inp);
if (lna == INADDR_ANY) {
np = getnetbyaddr(net, AF_INET);
if (np)
cp = np->n_name;
}
if (cp == 0) {
hp = gethostbyaddr((char *)inp, sizeof (*inp), AF_INET);
if (hp) {
cp = hp->h_name;
trimdomain(cp, strlen(cp));
}
}
}
if (inp->s_addr == INADDR_ANY)
strcpy(line, "*");
else if (cp) {
strlcpy(line, cp, sizeof(line));
} else {
inp->s_addr = ntohl(inp->s_addr);
#define C(x) ((u_int)((x) & 0xff))
sprintf(line, "%u.%u.%u.%u", C(inp->s_addr >> 24),
C(inp->s_addr >> 16), C(inp->s_addr >> 8), C(inp->s_addr));
inp->s_addr = htonl(inp->s_addr);
}
return (line);
}
#ifdef INET6
static char ntop_buf[INET6_ADDRSTRLEN];
static char *
inet6name(struct in6_addr *in6p)
{
char *cp;
static char line[50];
struct hostent *hp;
static char domain[MAXHOSTNAMELEN];
static int first = 1;
if (first && !numeric_addr) {
first = 0;
if (gethostname(domain, MAXHOSTNAMELEN) == 0 &&
(cp = strchr(domain, '.')))
(void) strcpy(domain, cp + 1);
else
domain[0] = 0;
}
cp = 0;
if (!numeric_addr && !IN6_IS_ADDR_UNSPECIFIED(in6p)) {
hp = gethostbyaddr((char *)in6p, sizeof(*in6p), AF_INET6);
if (hp) {
if ((cp = strchr(hp->h_name, '.')) &&
!strcmp(cp + 1, domain))
*cp = 0;
cp = hp->h_name;
}
}
if (IN6_IS_ADDR_UNSPECIFIED(in6p))
strcpy(line, "*");
else if (cp)
strcpy(line, cp);
else
sprintf(line, "%s",
inet_ntop(AF_INET6, (void *)in6p, ntop_buf,
sizeof(ntop_buf)));
return (line);
}
#endif
static void
sctp_print_address(union sctp_sockstore *address, int port, int num_port)
{
struct servent *sp = 0;
char line[80], *cp;
int width;
switch (address->sa.sa_family) {
case AF_INET:
sprintf(line, "%.*s.", Wflag ? 39 : 16, inetname(&address->sin.sin_addr));
break;
#ifdef INET6
case AF_INET6:
sprintf(line, "%.*s.", Wflag ? 39 : 16, inet6name(&address->sin6.sin6_addr));
break;
#endif
default:
sprintf(line, "%.*s.", Wflag ? 39 : 16, "");
break;
}
cp = strchr(line, '\0');
if (!num_port && port)
sp = getservbyport((int)port, "sctp");
if (sp || port == 0)
sprintf(cp, "%.15s ", sp ? sp->s_name : "*");
else
sprintf(cp, "%d ", ntohs((u_short)port));
width = Wflag ? 45 : 22;
printf("%-*.*s ", width, width, line);
}
2007-06-09 13:44:09 +00:00
static int
sctp_skip_xinpcb_ifneed(char *buf, const size_t buflen, size_t *offset)
{
int exist_tcb = 0;
struct xsctp_tcb *xstcb;
struct xsctp_raddr *xraddr;
struct xsctp_laddr *xladdr;
while (*offset < buflen) {
xladdr = (struct xsctp_laddr *)(buf + *offset);
*offset += sizeof(struct xsctp_laddr);
if (xladdr->last == 1)
break;
}
2007-06-09 13:44:09 +00:00
while (*offset < buflen) {
xstcb = (struct xsctp_tcb *)(buf + *offset);
*offset += sizeof(struct xsctp_tcb);
if (xstcb->last == 1)
break;
exist_tcb = 1;
while (*offset < buflen) {
xladdr = (struct xsctp_laddr *)(buf + *offset);
*offset += sizeof(struct xsctp_laddr);
if (xladdr->last == 1)
break;
}
while (*offset < buflen) {
xraddr = (struct xsctp_raddr *)(buf + *offset);
*offset += sizeof(struct xsctp_raddr);
if (xraddr->last == 1)
break;
}
}
/*
* If Lflag is set, we don't care about the return value.
*/
if (Lflag)
return 0;
return exist_tcb;
}
static void
sctp_process_tcb(struct xsctp_tcb *xstcb,
2007-06-09 13:44:09 +00:00
char *buf, const size_t buflen, size_t *offset, int *indent)
{
int i, xl_total = 0, xr_total = 0, x_max;
struct xsctp_raddr *xraddr;
struct xsctp_laddr *xladdr;
struct xladdr_entry *prev_xl = NULL, *xl = NULL, *xl_tmp;
struct xraddr_entry *prev_xr = NULL, *xr = NULL, *xr_tmp;
LIST_INIT(&xladdr_head);
LIST_INIT(&xraddr_head);
/*
* Make `struct xladdr_list' list and `struct xraddr_list' list
* to handle the address flexibly.
*/
while (*offset < buflen) {
xladdr = (struct xsctp_laddr *)(buf + *offset);
*offset += sizeof(struct xsctp_laddr);
if (xladdr->last == 1)
break;
2007-06-09 13:44:09 +00:00
prev_xl = xl;
xl = malloc(sizeof(struct xladdr_entry));
if (xl == NULL) {
warnx("malloc %lu bytes",
2007-06-09 13:44:09 +00:00
(u_long)sizeof(struct xladdr_entry));
goto out;
}
xl->xladdr = xladdr;
if (prev_xl == NULL)
LIST_INSERT_HEAD(&xladdr_head, xl, xladdr_entries);
else
LIST_INSERT_AFTER(prev_xl, xl, xladdr_entries);
xl_total++;
}
2007-06-09 13:44:09 +00:00
while (*offset < buflen) {
xraddr = (struct xsctp_raddr *)(buf + *offset);
*offset += sizeof(struct xsctp_raddr);
if (xraddr->last == 1)
break;
2007-06-09 13:44:09 +00:00
prev_xr = xr;
xr = malloc(sizeof(struct xraddr_entry));
if (xr == NULL) {
warnx("malloc %lu bytes",
2007-06-09 13:44:09 +00:00
(u_long)sizeof(struct xraddr_entry));
goto out;
}
xr->xraddr = xraddr;
if (prev_xr == NULL)
LIST_INSERT_HEAD(&xraddr_head, xr, xraddr_entries);
else
LIST_INSERT_AFTER(prev_xr, xr, xraddr_entries);
xr_total++;
}
2007-06-09 13:44:09 +00:00
/*
* Let's print the address infos.
*/
xl = LIST_FIRST(&xladdr_head);
xr = LIST_FIRST(&xraddr_head);
x_max = (xl_total > xr_total) ? xl_total : xr_total;
for (i = 0; i < x_max; i++) {
if (((*indent == 0) && i > 0) || *indent > 0)
printf("%-12s ", " ");
2007-06-09 13:44:09 +00:00
if (xl != NULL) {
sctp_print_address(&(xl->xladdr->address),
htons(xstcb->local_port), numeric_port);
} else {
if (Wflag) {
printf("%-45s ", " ");
} else {
printf("%-22s ", " ");
2007-06-09 13:44:09 +00:00
}
}
2007-06-09 13:44:09 +00:00
if (xr != NULL && !Lflag) {
sctp_print_address(&(xr->xraddr->address),
htons(xstcb->remote_port), numeric_port);
2007-06-09 13:44:09 +00:00
}
2007-06-09 13:44:09 +00:00
if (xl != NULL)
xl = LIST_NEXT(xl, xladdr_entries);
if (xr != NULL)
xr = LIST_NEXT(xr, xraddr_entries);
2007-06-09 13:44:09 +00:00
if (i == 0 && !Lflag)
sctp_statesprint(xstcb->state);
2007-06-09 13:44:09 +00:00
if (i < x_max)
putchar('\n');
}
2007-06-09 13:44:09 +00:00
out:
/*
* Free the list which be used to handle the address.
*/
xl = LIST_FIRST(&xladdr_head);
while (xl != NULL) {
xl_tmp = LIST_NEXT(xl, xladdr_entries);
free(xl);
xl = xl_tmp;
}
2007-06-09 13:44:09 +00:00
xr = LIST_FIRST(&xraddr_head);
while (xr != NULL) {
xr_tmp = LIST_NEXT(xr, xraddr_entries);
free(xr);
xr = xr_tmp;
}
}
static void
sctp_process_inpcb(struct xsctp_inpcb *xinpcb,
2007-06-09 13:44:09 +00:00
char *buf, const size_t buflen, size_t *offset)
{
int indent = 0, xladdr_total = 0, is_listening = 0;
2007-06-09 13:44:09 +00:00
static int first = 1;
char *tname, *pname;
2007-06-09 13:44:09 +00:00
struct xsctp_tcb *xstcb;
struct xsctp_laddr *xladdr;
size_t offset_laddr;
int process_closed;
2007-06-09 13:44:09 +00:00
if (xinpcb->maxqlen > 0)
2007-06-09 13:44:09 +00:00
is_listening = 1;
if (first) {
if (!Lflag) {
printf("Active SCTP associations");
if (aflag)
printf(" (including servers)");
} else
printf("Current listen queue sizes (qlen/maxqlen)");
putchar('\n');
if (Lflag)
printf("%-6.6s %-5.5s %-8.8s %-22.22s\n",
2007-06-09 13:44:09 +00:00
"Proto", "Type", "Listen", "Local Address");
else
if (Wflag)
printf("%-6.6s %-5.5s %-45.45s %-45.45s %s\n",
"Proto", "Type",
"Local Address", "Foreign Address",
"(state)");
else
printf("%-6.6s %-5.5s %-22.22s %-22.22s %s\n",
"Proto", "Type",
"Local Address", "Foreign Address",
"(state)");
2007-06-09 13:44:09 +00:00
first = 0;
}
xladdr = (struct xsctp_laddr *)(buf + *offset);
if (Lflag && !is_listening) {
sctp_skip_xinpcb_ifneed(buf, buflen, offset);
2007-06-09 13:44:09 +00:00
return;
}
if (xinpcb->flags & SCTP_PCB_FLAGS_BOUND_V6) {
/* Can't distinguish between sctp46 and sctp6 */
pname = "sctp46";
} else {
pname = "sctp4";
}
2007-06-09 13:44:09 +00:00
if (xinpcb->flags & SCTP_PCB_FLAGS_TCPTYPE)
tname = "1to1";
else if (xinpcb->flags & SCTP_PCB_FLAGS_UDPTYPE)
tname = "1toN";
else
tname = "????";
2007-06-09 13:44:09 +00:00
if (Lflag) {
char buf1[9];
2007-06-09 13:44:09 +00:00
snprintf(buf1, 9, "%hu/%hu", xinpcb->qlen, xinpcb->maxqlen);
printf("%-6.6s %-5.5s ", pname, tname);
2007-06-09 13:44:09 +00:00
printf("%-8.8s ", buf1);
}
offset_laddr = *offset;
process_closed = 0;
retry:
2007-06-09 13:44:09 +00:00
while (*offset < buflen) {
xladdr = (struct xsctp_laddr *)(buf + *offset);
*offset += sizeof(struct xsctp_laddr);
if (xladdr->last) {
if (aflag && !Lflag && (xladdr_total == 0) && process_closed) {
printf("%-6.6s %-5.5s ", pname, tname);
if (Wflag) {
printf("%-91.91s CLOSED", " ");
} else {
printf("%-45.45s CLOSED", " ");
}
}
if (process_closed || is_listening) {
putchar('\n');
}
2007-06-09 13:44:09 +00:00
break;
}
2007-06-09 13:44:09 +00:00
if (!Lflag && !is_listening && !process_closed)
2007-06-09 13:44:09 +00:00
continue;
if (xladdr_total == 0) {
printf("%-6.6s %-5.5s ", pname, tname);
} else {
2007-06-09 13:44:09 +00:00
putchar('\n');
printf((Lflag) ?
"%-21.21s " : "%-12.12s ", " ");
}
sctp_print_address(&(xladdr->address),
htons(xinpcb->local_port), numeric_port);
if (aflag && !Lflag && xladdr_total == 0) {
if (Wflag) {
if (process_closed) {
printf("%-45.45s CLOSED", " ");
} else {
printf("%-45.45s LISTEN", " ");
}
} else {
if (process_closed) {
printf("%-22.22s CLOSED", " ");
} else {
printf("%-22.22s LISTEN", " ");
}
}
2007-06-09 13:44:09 +00:00
}
xladdr_total++;
}
xstcb = (struct xsctp_tcb *)(buf + *offset);
*offset += sizeof(struct xsctp_tcb);
if (aflag && (xladdr_total == 0) && xstcb->last && !process_closed) {
process_closed = 1;
*offset = offset_laddr;
goto retry;
}
2007-06-09 13:44:09 +00:00
while (xstcb->last == 0 && *offset < buflen) {
printf("%-6.6s %-5.5s ", pname, tname);
sctp_process_tcb(xstcb, buf, buflen, offset, &indent);
2007-06-09 13:44:09 +00:00
indent++;
xstcb = (struct xsctp_tcb *)(buf + *offset);
*offset += sizeof(struct xsctp_tcb);
}
}
/*
* Print a summary of SCTP connections related to an Internet
* protocol.
*/
void
Restore netstat -M functionality for most statistics on core dumps. In general, when support was added to netstat for fetching data using sysctl, no provision was left for fetching equivalent data from a core dump, and in fact, netstat would _always_ fetch data from the live kernel using sysctl even when -M was specified resulting in the user believing they were getting data from coredumps when they actually weren't. Some specific changes: - Add a global 'live' variable that is true if netstat is running against the live kernel and false if -M has been specified. - Stop abusing the sysctl flag in the protocol tables to hold the protocol number. Instead, the protocol is now its own field in the tables, and it is passed as a separate parameter to the PCB and stat routines rather than overloading the KVM offset parameter. - Don't run PCB or stats functions who don't have a namelist offset if we are being run against a crash dump (!live). - For the inet and unix PCB routines, we generate the same buffer from KVM that the sysctl usually generates complete with the header and trailer. - Don't run bpf stats for !live (before it would just silently always run live). - kread() no longer trashes memory when opening the buffer if there is an error on open and the passed in buffer is smaller than _POSIX2_LINE_MAX. - The multicast routing code doesn't fallback to kvm on live kernels if the sysctl fails. Keeping this made the code rather hairy, and netstat is already tied to the kernel ABI anyway (even when using sysctl's since things like xinpcb contain an inpcb) so any kernels this is run against that have the multicast routing stuff should have the sysctls. - Don't try to dig around in the kernel linker in the netgraph PCB routine for core dumps. Other notes: - sctp's PCB routine only works on live kernels, it looked rather complicated to generate all the same stuff via KVM. Someone can always add it later if desired though. - Fix the ipsec removal bug where N_xxx for IPSEC stats weren't renumbered. - Use sysctlbyname() everywhere rather than hardcoded mib values. MFC after: 1 week Approved by: re (rwatson)
2007-07-16 17:15:55 +00:00
sctp_protopr(u_long off __unused,
const char *name, int af1, int proto)
2007-06-09 13:44:09 +00:00
{
char *buf;
const char *mibvar = "net.inet.sctp.assoclist";
size_t offset = 0;
2007-06-09 13:44:09 +00:00
size_t len = 0;
struct xsctp_inpcb *xinpcb;
2007-06-09 13:44:09 +00:00
if (proto != IPPROTO_SCTP)
return;
if (sysctlbyname(mibvar, 0, &len, 0, 0) < 0) {
if (errno != ENOENT)
warn("sysctl: %s", mibvar);
return;
}
if ((buf = malloc(len)) == 0) {
warnx("malloc %lu bytes", (u_long)len);
return;
}
if (sysctlbyname(mibvar, buf, &len, 0, 0) < 0) {
warn("sysctl: %s", mibvar);
free(buf);
return;
}
xinpcb = (struct xsctp_inpcb *)(buf + offset);
offset += sizeof(struct xsctp_inpcb);
while (xinpcb->last == 0 && offset < len) {
sctp_process_inpcb(xinpcb, buf, (const size_t)len,
2007-06-09 13:44:09 +00:00
&offset);
xinpcb = (struct xsctp_inpcb *)(buf + offset);
offset += sizeof(struct xsctp_inpcb);
}
free(buf);
}
static void
sctp_statesprint(uint32_t state)
{
int idx;
switch (state) {
case SCTP_STATE_COOKIE_WAIT:
idx = NETSTAT_SCTP_STATES_COOKIE_WAIT;
break;
case SCTP_STATE_COOKIE_ECHOED:
idx = NETSTAT_SCTP_STATES_COOKIE_ECHOED;
break;
case SCTP_STATE_OPEN:
idx = NETSTAT_SCTP_STATES_ESTABLISHED;
break;
case SCTP_STATE_SHUTDOWN_SENT:
idx = NETSTAT_SCTP_STATES_SHUTDOWN_SENT;
break;
case SCTP_STATE_SHUTDOWN_RECEIVED:
idx = NETSTAT_SCTP_STATES_SHUTDOWN_RECEIVED;
break;
case SCTP_STATE_SHUTDOWN_ACK_SENT:
idx = NETSTAT_SCTP_STATES_SHUTDOWN_ACK_SENT;
break;
case SCTP_STATE_SHUTDOWN_PENDING:
idx = NETSTAT_SCTP_STATES_SHUTDOWN_PENDING;
break;
default:
printf("UNKNOWN 0x%08x", state);
return;
}
printf("%s", sctpstates[idx]);
}
/*
* Dump SCTP statistics structure.
*/
void
Restore netstat -M functionality for most statistics on core dumps. In general, when support was added to netstat for fetching data using sysctl, no provision was left for fetching equivalent data from a core dump, and in fact, netstat would _always_ fetch data from the live kernel using sysctl even when -M was specified resulting in the user believing they were getting data from coredumps when they actually weren't. Some specific changes: - Add a global 'live' variable that is true if netstat is running against the live kernel and false if -M has been specified. - Stop abusing the sysctl flag in the protocol tables to hold the protocol number. Instead, the protocol is now its own field in the tables, and it is passed as a separate parameter to the PCB and stat routines rather than overloading the KVM offset parameter. - Don't run PCB or stats functions who don't have a namelist offset if we are being run against a crash dump (!live). - For the inet and unix PCB routines, we generate the same buffer from KVM that the sysctl usually generates complete with the header and trailer. - Don't run bpf stats for !live (before it would just silently always run live). - kread() no longer trashes memory when opening the buffer if there is an error on open and the passed in buffer is smaller than _POSIX2_LINE_MAX. - The multicast routing code doesn't fallback to kvm on live kernels if the sysctl fails. Keeping this made the code rather hairy, and netstat is already tied to the kernel ABI anyway (even when using sysctl's since things like xinpcb contain an inpcb) so any kernels this is run against that have the multicast routing stuff should have the sysctls. - Don't try to dig around in the kernel linker in the netgraph PCB routine for core dumps. Other notes: - sctp's PCB routine only works on live kernels, it looked rather complicated to generate all the same stuff via KVM. Someone can always add it later if desired though. - Fix the ipsec removal bug where N_xxx for IPSEC stats weren't renumbered. - Use sysctlbyname() everywhere rather than hardcoded mib values. MFC after: 1 week Approved by: re (rwatson)
2007-07-16 17:15:55 +00:00
sctp_stats(u_long off, const char *name, int af1 __unused, int proto __unused)
2007-06-09 13:44:09 +00:00
{
struct sctpstat sctpstat, zerostat;
size_t len = sizeof(sctpstat);
Restore netstat -M functionality for most statistics on core dumps. In general, when support was added to netstat for fetching data using sysctl, no provision was left for fetching equivalent data from a core dump, and in fact, netstat would _always_ fetch data from the live kernel using sysctl even when -M was specified resulting in the user believing they were getting data from coredumps when they actually weren't. Some specific changes: - Add a global 'live' variable that is true if netstat is running against the live kernel and false if -M has been specified. - Stop abusing the sysctl flag in the protocol tables to hold the protocol number. Instead, the protocol is now its own field in the tables, and it is passed as a separate parameter to the PCB and stat routines rather than overloading the KVM offset parameter. - Don't run PCB or stats functions who don't have a namelist offset if we are being run against a crash dump (!live). - For the inet and unix PCB routines, we generate the same buffer from KVM that the sysctl usually generates complete with the header and trailer. - Don't run bpf stats for !live (before it would just silently always run live). - kread() no longer trashes memory when opening the buffer if there is an error on open and the passed in buffer is smaller than _POSIX2_LINE_MAX. - The multicast routing code doesn't fallback to kvm on live kernels if the sysctl fails. Keeping this made the code rather hairy, and netstat is already tied to the kernel ABI anyway (even when using sysctl's since things like xinpcb contain an inpcb) so any kernels this is run against that have the multicast routing stuff should have the sysctls. - Don't try to dig around in the kernel linker in the netgraph PCB routine for core dumps. Other notes: - sctp's PCB routine only works on live kernels, it looked rather complicated to generate all the same stuff via KVM. Someone can always add it later if desired though. - Fix the ipsec removal bug where N_xxx for IPSEC stats weren't renumbered. - Use sysctlbyname() everywhere rather than hardcoded mib values. MFC after: 1 week Approved by: re (rwatson)
2007-07-16 17:15:55 +00:00
if (live) {
if (zflag)
memset(&zerostat, 0, len);
if (sysctlbyname("net.inet.sctp.stats", &sctpstat, &len,
zflag ? &zerostat : NULL, zflag ? len : 0) < 0) {
if (errno != ENOENT)
warn("sysctl: net.inet.sctp.stats");
Restore netstat -M functionality for most statistics on core dumps. In general, when support was added to netstat for fetching data using sysctl, no provision was left for fetching equivalent data from a core dump, and in fact, netstat would _always_ fetch data from the live kernel using sysctl even when -M was specified resulting in the user believing they were getting data from coredumps when they actually weren't. Some specific changes: - Add a global 'live' variable that is true if netstat is running against the live kernel and false if -M has been specified. - Stop abusing the sysctl flag in the protocol tables to hold the protocol number. Instead, the protocol is now its own field in the tables, and it is passed as a separate parameter to the PCB and stat routines rather than overloading the KVM offset parameter. - Don't run PCB or stats functions who don't have a namelist offset if we are being run against a crash dump (!live). - For the inet and unix PCB routines, we generate the same buffer from KVM that the sysctl usually generates complete with the header and trailer. - Don't run bpf stats for !live (before it would just silently always run live). - kread() no longer trashes memory when opening the buffer if there is an error on open and the passed in buffer is smaller than _POSIX2_LINE_MAX. - The multicast routing code doesn't fallback to kvm on live kernels if the sysctl fails. Keeping this made the code rather hairy, and netstat is already tied to the kernel ABI anyway (even when using sysctl's since things like xinpcb contain an inpcb) so any kernels this is run against that have the multicast routing stuff should have the sysctls. - Don't try to dig around in the kernel linker in the netgraph PCB routine for core dumps. Other notes: - sctp's PCB routine only works on live kernels, it looked rather complicated to generate all the same stuff via KVM. Someone can always add it later if desired though. - Fix the ipsec removal bug where N_xxx for IPSEC stats weren't renumbered. - Use sysctlbyname() everywhere rather than hardcoded mib values. MFC after: 1 week Approved by: re (rwatson)
2007-07-16 17:15:55 +00:00
return;
}
} else
kread(off, &sctpstat, len);
2007-06-09 13:44:09 +00:00
printf ("%s:\n", name);
#define p(f, m) if (sctpstat.f || sflag <= 1) \
printf(m, (uintmax_t)sctpstat.f, plural(sctpstat.f))
2007-06-09 13:44:09 +00:00
#define p1a(f, m) if (sctpstat.f || sflag <= 1) \
printf(m, (uintmax_t)sctpstat.f)
2007-06-09 13:44:09 +00:00
/*
* input statistics
*/
p(sctps_recvpackets, "\t%ju input packet%s\n");
p(sctps_recvdatagrams, "\t\t%ju datagram%s\n");
p(sctps_recvpktwithdata, "\t\t%ju packet%s that had data\n");
p(sctps_recvsacks, "\t\t%ju input SACK chunk%s\n");
p(sctps_recvdata, "\t\t%ju input DATA chunk%s\n");
p(sctps_recvdupdata, "\t\t%ju duplicate DATA chunk%s\n");
p(sctps_recvheartbeat, "\t\t%ju input HB chunk%s\n");
p(sctps_recvheartbeatack, "\t\t%ju HB-ACK chunk%s\n");
p(sctps_recvecne, "\t\t%ju input ECNE chunk%s\n");
p(sctps_recvauth, "\t\t%ju input AUTH chunk%s\n");
p(sctps_recvauthmissing, "\t\t%ju chunk%s missing AUTH\n");
p(sctps_recvivalhmacid, "\t\t%ju invalid HMAC id%s received\n");
p(sctps_recvivalkeyid, "\t\t%ju invalid secret id%s received\n");
p1a(sctps_recvauthfailed, "\t\t%ju auth failed\n");
p1a(sctps_recvexpress, "\t\t%ju fast path receives all one chunk\n");
p1a(sctps_recvexpressm, "\t\t%ju fast path multi-part data\n");
2007-06-09 13:44:09 +00:00
/*
* output statistics
*/
p(sctps_sendpackets, "\t%ju output packet%s\n");
p(sctps_sendsacks, "\t\t%ju output SACK%s\n");
p(sctps_senddata, "\t\t%ju output DATA chunk%s\n");
p(sctps_sendretransdata, "\t\t%ju retransmitted DATA chunk%s\n");
p(sctps_sendfastretrans, "\t\t%ju fast retransmitted DATA chunk%s\n");
p(sctps_sendmultfastretrans, "\t\t%ju FR'%s that happened more "
2008-04-16 17:40:30 +00:00
"than once to same chunk\n");
2011-03-13 16:47:21 +00:00
p(sctps_sendheartbeat, "\t\t%ju output HB chunk%s\n");
p(sctps_sendecne, "\t\t%ju output ECNE chunk%s\n");
p(sctps_sendauth, "\t\t%ju output AUTH chunk%s\n");
p1a(sctps_senderrors, "\t\t%ju ip_output error counter\n");
2007-06-09 13:44:09 +00:00
/*
* PCKDROPREP statistics
*/
printf("\tPacket drop statistics:\n");
p1a(sctps_pdrpfmbox, "\t\t%ju from middle box\n");
p1a(sctps_pdrpfehos, "\t\t%ju from end host\n");
p1a(sctps_pdrpmbda, "\t\t%ju with data\n");
p1a(sctps_pdrpmbct, "\t\t%ju non-data, non-endhost\n");
p1a(sctps_pdrpbwrpt, "\t\t%ju non-endhost, bandwidth rep only\n");
p1a(sctps_pdrpcrupt, "\t\t%ju not enough for chunk header\n");
p1a(sctps_pdrpnedat, "\t\t%ju not enough data to confirm\n");
p1a(sctps_pdrppdbrk, "\t\t%ju where process_chunk_drop said break\n");
p1a(sctps_pdrptsnnf, "\t\t%ju failed to find TSN\n");
p1a(sctps_pdrpdnfnd, "\t\t%ju attempt reverse TSN lookup\n");
p1a(sctps_pdrpdiwnp, "\t\t%ju e-host confirms zero-rwnd\n");
p1a(sctps_pdrpdizrw, "\t\t%ju midbox confirms no space\n");
p1a(sctps_pdrpbadd, "\t\t%ju data did not match TSN\n");
p(sctps_pdrpmark, "\t\t%ju TSN'%s marked for Fast Retran\n");
2007-06-09 13:44:09 +00:00
/*
* Timeouts
*/
printf("\tTimeouts:\n");
p(sctps_timoiterator, "\t\t%ju iterator timer%s fired\n");
p(sctps_timodata, "\t\t%ju T3 data time out%s\n");
p(sctps_timowindowprobe, "\t\t%ju window probe (T3) timer%s fired\n");
p(sctps_timoinit, "\t\t%ju INIT timer%s fired\n");
p(sctps_timosack, "\t\t%ju sack timer%s fired\n");
p(sctps_timoshutdown, "\t\t%ju shutdown timer%s fired\n");
p(sctps_timoheartbeat, "\t\t%ju heartbeat timer%s fired\n");
p1a(sctps_timocookie, "\t\t%ju a cookie timeout fired\n");
p1a(sctps_timosecret, "\t\t%ju an endpoint changed its cookie"
"secret\n");
p(sctps_timopathmtu, "\t\t%ju PMTU timer%s fired\n");
p(sctps_timoshutdownack, "\t\t%ju shutdown ack timer%s fired\n");
p(sctps_timoshutdownguard, "\t\t%ju shutdown guard timer%s fired\n");
p(sctps_timostrmrst, "\t\t%ju stream reset timer%s fired\n");
p(sctps_timoearlyfr, "\t\t%ju early FR timer%s fired\n");
p1a(sctps_timoasconf, "\t\t%ju an asconf timer fired\n");
p1a(sctps_timoautoclose, "\t\t%ju auto close timer fired\n");
p(sctps_timoassockill, "\t\t%ju asoc free timer%s expired\n");
p(sctps_timoinpkill, "\t\t%ju inp free timer%s expired\n");
2007-06-09 13:44:09 +00:00
#if 0
/*
* Early fast retransmission counters
*/
p(sctps_earlyfrstart, "\t%ju TODO:sctps_earlyfrstart\n");
p(sctps_earlyfrstop, "\t%ju TODO:sctps_earlyfrstop\n");
p(sctps_earlyfrmrkretrans, "\t%ju TODO:sctps_earlyfrmrkretrans\n");
p(sctps_earlyfrstpout, "\t%ju TODO:sctps_earlyfrstpout\n");
p(sctps_earlyfrstpidsck1, "\t%ju TODO:sctps_earlyfrstpidsck1\n");
p(sctps_earlyfrstpidsck2, "\t%ju TODO:sctps_earlyfrstpidsck2\n");
p(sctps_earlyfrstpidsck3, "\t%ju TODO:sctps_earlyfrstpidsck3\n");
p(sctps_earlyfrstpidsck4, "\t%ju TODO:sctps_earlyfrstpidsck4\n");
p(sctps_earlyfrstrid, "\t%ju TODO:sctps_earlyfrstrid\n");
p(sctps_earlyfrstrout, "\t%ju TODO:sctps_earlyfrstrout\n");
p(sctps_earlyfrstrtmr, "\t%ju TODO:sctps_earlyfrstrtmr\n");
2007-06-09 13:44:09 +00:00
#endif
/*
* Others
*/
p1a(sctps_hdrops, "\t%ju packet shorter than header\n");
p1a(sctps_badsum, "\t%ju checksum error\n");
p1a(sctps_noport, "\t%ju no endpoint for port\n");
p1a(sctps_badvtag, "\t%ju bad v-tag\n");
p1a(sctps_badsid, "\t%ju bad SID\n");
p1a(sctps_nomem, "\t%ju no memory\n");
p1a(sctps_fastretransinrtt, "\t%ju number of multiple FR in a RTT "
2007-06-09 13:44:09 +00:00
"window\n");
#if 0
p(sctps_markedretrans, "\t%ju TODO:sctps_markedretrans\n");
2007-06-09 13:44:09 +00:00
#endif
p1a(sctps_naglesent, "\t%ju RFC813 allowed sending\n");
p1a(sctps_naglequeued, "\t%ju RFC813 does not allow sending\n");
2008-04-16 17:40:30 +00:00
p1a(sctps_maxburstqueued, "\t%ju times max burst prohibited sending\n");
p1a(sctps_ifnomemqueued, "\t%ju look ahead tells us no memory in "
"interface\n");
p(sctps_windowprobed, "\t%ju number%s of window probes sent\n");
p(sctps_lowlevelerr, "\t%ju time%s an output error to clamp "
2008-04-16 17:40:30 +00:00
"down on next user send\n");
p(sctps_lowlevelerrusr, "\t%ju time%s sctp_senderrors were "
"caused from a user\n");
p(sctps_datadropchklmt, "\t%ju number of in data drop%s due to "
2007-06-09 13:44:09 +00:00
"chunk limit reached\n");
p(sctps_datadroprwnd, "\t%ju number of in data drop%s due to rwnd "
2007-06-09 13:44:09 +00:00
"limit reached\n");
p(sctps_ecnereducedcwnd, "\t%ju time%s a ECN reduced "
2007-06-09 13:44:09 +00:00
"the cwnd\n");
p1a(sctps_vtagexpress, "\t%ju used express lookup via vtag\n");
2008-04-16 17:40:30 +00:00
p1a(sctps_vtagbogus, "\t%ju collision in express lookup\n");
p(sctps_primary_randry, "\t%ju time%s the sender ran dry "
2007-06-09 13:44:09 +00:00
"of user data on primary\n");
p1a(sctps_cmt_randry, "\t%ju same for above\n");
p(sctps_slowpath_sack, "\t%ju sack%s the slow way\n");
p(sctps_wu_sacks_sent, "\t%ju window update only sack%s sent\n");
p(sctps_sends_with_flags, "\t%ju send%s with sinfo_flags !=0\n");
p(sctps_sends_with_unord, "\t%ju unordered send%s\n");
p(sctps_sends_with_eof, "\t%ju send%s with EOF flag set\n");
p(sctps_sends_with_abort, "\t%ju send%s with ABORT flag set\n");
p(sctps_protocol_drain_calls, "\t%ju time%s protocol drain called\n");
p(sctps_protocol_drains_done, "\t%ju time%s we did a protocol "
"drain\n");
p(sctps_read_peeks, "\t%ju time%s recv was called with peek\n");
p(sctps_cached_chk, "\t%ju cached chunk%s used\n");
p1a(sctps_cached_strmoq, "\t%ju cached stream oq's used\n");
p(sctps_left_abandon, "\t%ju unread message%s abandonded by close\n");
p1a(sctps_send_burst_avoid, "\t%ju send burst avoidance, already "
"max burst inflight to net\n");
p1a(sctps_send_cwnd_avoid, "\t%ju send cwnd full avoidance, already "
2007-06-09 13:44:09 +00:00
"max burst inflight to net\n");
p(sctps_fwdtsn_map_over, "\t%ju number of map array over-run%s via "
2007-06-09 13:44:09 +00:00
"fwd-tsn's\n");
#undef p
#undef p1a
2007-06-09 13:44:09 +00:00
}
#endif /* SCTP */