Current Path : /compat/linux/proc/self/root/usr/src/usr.bin/netstat/ |
FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64 |
Current File : //compat/linux/proc/self/root/usr/src/usr.bin/netstat/sctp.c |
/*- * Copyright (c) 2001-2007, by Weongyo Jeong. All rights reserved. * Copyright (c) 2011, by Michael Tuexen. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * * a) Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * * b) Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the distribution. * * c) Neither the name of Cisco Systems, Inc. nor the names of its * contributors may be used to endorse or promote products derived * from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF * THE POSSIBILITY OF SUCH DAMAGE. */ #if 0 #ifndef lint static char sccsid[] = "@(#)sctp.c 0.1 (Berkeley) 4/18/2007"; #endif /* not lint */ #endif #include <sys/cdefs.h> __FBSDID("$FreeBSD: release/9.1.0/usr.bin/netstat/sctp.c 238613 2012-07-19 09:32:59Z tuexen $"); #include <sys/param.h> #include <sys/queue.h> #include <sys/types.h> #include <sys/socket.h> #include <sys/socketvar.h> #include <sys/sysctl.h> #include <sys/protosw.h> #include <netinet/in.h> #include <netinet/sctp.h> #include <netinet/sctp_constants.h> #include <arpa/inet.h> #include <err.h> #include <errno.h> #include <libutil.h> #include <netdb.h> #include <stdint.h> #include <stdio.h> #include <stdlib.h> #include <string.h> #include <unistd.h> #include "netstat.h" #ifdef SCTP static void sctp_statesprint(uint32_t state); #define NETSTAT_SCTP_STATES_CLOSED 0x0 #define NETSTAT_SCTP_STATES_BOUND 0x1 #define NETSTAT_SCTP_STATES_LISTEN 0x2 #define NETSTAT_SCTP_STATES_COOKIE_WAIT 0x3 #define NETSTAT_SCTP_STATES_COOKIE_ECHOED 0x4 #define NETSTAT_SCTP_STATES_ESTABLISHED 0x5 #define NETSTAT_SCTP_STATES_SHUTDOWN_SENT 0x6 #define NETSTAT_SCTP_STATES_SHUTDOWN_RECEIVED 0x7 #define NETSTAT_SCTP_STATES_SHUTDOWN_ACK_SENT 0x8 #define NETSTAT_SCTP_STATES_SHUTDOWN_PENDING 0x9 char *sctpstates[] = { "CLOSED", "BOUND", "LISTEN", "COOKIE_WAIT", "COOKIE_ECHOED", "ESTABLISHED", "SHUTDOWN_SENT", "SHUTDOWN_RECEIVED", "SHUTDOWN_ACK_SENT", "SHUTDOWN_PENDING" }; LIST_HEAD(xladdr_list, xladdr_entry) xladdr_head; struct xladdr_entry { struct xsctp_laddr *xladdr; LIST_ENTRY(xladdr_entry) xladdr_entries; }; LIST_HEAD(xraddr_list, xraddr_entry) xraddr_head; struct xraddr_entry { struct xsctp_raddr *xraddr; LIST_ENTRY(xraddr_entry) xraddr_entries; }; /* * Construct an Internet address representation. * If numeric_addr has been supplied, give * numeric value, otherwise try for symbolic name. */ #ifdef INET static char * inetname(struct in_addr *inp) { char *cp; static char line[MAXHOSTNAMELEN]; struct hostent *hp; struct netent *np; cp = 0; if (!numeric_addr && inp->s_addr != INADDR_ANY) { int net = inet_netof(*inp); int lna = inet_lnaof(*inp); if (lna == INADDR_ANY) { np = getnetbyaddr(net, AF_INET); if (np) cp = np->n_name; } if (cp == 0) { hp = gethostbyaddr((char *)inp, sizeof (*inp), AF_INET); if (hp) { cp = hp->h_name; trimdomain(cp, strlen(cp)); } } } if (inp->s_addr == INADDR_ANY) strcpy(line, "*"); else if (cp) { strlcpy(line, cp, sizeof(line)); } else { inp->s_addr = ntohl(inp->s_addr); #define C(x) ((u_int)((x) & 0xff)) sprintf(line, "%u.%u.%u.%u", C(inp->s_addr >> 24), C(inp->s_addr >> 16), C(inp->s_addr >> 8), C(inp->s_addr)); inp->s_addr = htonl(inp->s_addr); } return (line); } #endif #ifdef INET6 static char ntop_buf[INET6_ADDRSTRLEN]; static char * inet6name(struct in6_addr *in6p) { char *cp; static char line[50]; struct hostent *hp; static char domain[MAXHOSTNAMELEN]; static int first = 1; if (first && !numeric_addr) { first = 0; if (gethostname(domain, MAXHOSTNAMELEN) == 0 && (cp = index(domain, '.'))) (void) strcpy(domain, cp + 1); else domain[0] = 0; } cp = 0; if (!numeric_addr && !IN6_IS_ADDR_UNSPECIFIED(in6p)) { hp = gethostbyaddr((char *)in6p, sizeof(*in6p), AF_INET6); if (hp) { if ((cp = index(hp->h_name, '.')) && !strcmp(cp + 1, domain)) *cp = 0; cp = hp->h_name; } } if (IN6_IS_ADDR_UNSPECIFIED(in6p)) strcpy(line, "*"); else if (cp) strcpy(line, cp); else sprintf(line, "%s", inet_ntop(AF_INET6, (void *)in6p, ntop_buf, sizeof(ntop_buf))); return (line); } #endif static void sctp_print_address(union sctp_sockstore *address, int port, int num_port) { struct servent *sp = 0; char line[80], *cp; int width; switch (address->sa.sa_family) { #ifdef INET case AF_INET: sprintf(line, "%.*s.", Wflag ? 39 : 16, inetname(&address->sin.sin_addr)); break; #endif #ifdef INET6 case AF_INET6: sprintf(line, "%.*s.", Wflag ? 39 : 16, inet6name(&address->sin6.sin6_addr)); break; #endif default: sprintf(line, "%.*s.", Wflag ? 39 : 16, ""); break; } cp = index(line, '\0'); if (!num_port && port) sp = getservbyport((int)port, "sctp"); if (sp || port == 0) sprintf(cp, "%.15s ", sp ? sp->s_name : "*"); else sprintf(cp, "%d ", ntohs((u_short)port)); width = Wflag ? 45 : 22; printf("%-*.*s ", width, width, line); } static int sctp_skip_xinpcb_ifneed(char *buf, const size_t buflen, size_t *offset) { int exist_tcb = 0; struct xsctp_tcb *xstcb; struct xsctp_raddr *xraddr; struct xsctp_laddr *xladdr; while (*offset < buflen) { xladdr = (struct xsctp_laddr *)(buf + *offset); *offset += sizeof(struct xsctp_laddr); if (xladdr->last == 1) break; } while (*offset < buflen) { xstcb = (struct xsctp_tcb *)(buf + *offset); *offset += sizeof(struct xsctp_tcb); if (xstcb->last == 1) break; exist_tcb = 1; while (*offset < buflen) { xladdr = (struct xsctp_laddr *)(buf + *offset); *offset += sizeof(struct xsctp_laddr); if (xladdr->last == 1) break; } while (*offset < buflen) { xraddr = (struct xsctp_raddr *)(buf + *offset); *offset += sizeof(struct xsctp_raddr); if (xraddr->last == 1) break; } } /* * If Lflag is set, we don't care about the return value. */ if (Lflag) return 0; return exist_tcb; } static void sctp_process_tcb(struct xsctp_tcb *xstcb, char *buf, const size_t buflen, size_t *offset, int *indent) { int i, xl_total = 0, xr_total = 0, x_max; struct xsctp_raddr *xraddr; struct xsctp_laddr *xladdr; struct xladdr_entry *prev_xl = NULL, *xl = NULL, *xl_tmp; struct xraddr_entry *prev_xr = NULL, *xr = NULL, *xr_tmp; LIST_INIT(&xladdr_head); LIST_INIT(&xraddr_head); /* * Make `struct xladdr_list' list and `struct xraddr_list' list * to handle the address flexibly. */ while (*offset < buflen) { xladdr = (struct xsctp_laddr *)(buf + *offset); *offset += sizeof(struct xsctp_laddr); if (xladdr->last == 1) break; prev_xl = xl; xl = malloc(sizeof(struct xladdr_entry)); if (xl == NULL) { warnx("malloc %lu bytes", (u_long)sizeof(struct xladdr_entry)); goto out; } xl->xladdr = xladdr; if (prev_xl == NULL) LIST_INSERT_HEAD(&xladdr_head, xl, xladdr_entries); else LIST_INSERT_AFTER(prev_xl, xl, xladdr_entries); xl_total++; } while (*offset < buflen) { xraddr = (struct xsctp_raddr *)(buf + *offset); *offset += sizeof(struct xsctp_raddr); if (xraddr->last == 1) break; prev_xr = xr; xr = malloc(sizeof(struct xraddr_entry)); if (xr == NULL) { warnx("malloc %lu bytes", (u_long)sizeof(struct xraddr_entry)); goto out; } xr->xraddr = xraddr; if (prev_xr == NULL) LIST_INSERT_HEAD(&xraddr_head, xr, xraddr_entries); else LIST_INSERT_AFTER(prev_xr, xr, xraddr_entries); xr_total++; } /* * Let's print the address infos. */ xl = LIST_FIRST(&xladdr_head); xr = LIST_FIRST(&xraddr_head); x_max = (xl_total > xr_total) ? xl_total : xr_total; for (i = 0; i < x_max; i++) { if (((*indent == 0) && i > 0) || *indent > 0) printf("%-12s ", " "); if (xl != NULL) { sctp_print_address(&(xl->xladdr->address), htons(xstcb->local_port), numeric_port); } else { if (Wflag) { printf("%-45s ", " "); } else { printf("%-22s ", " "); } } if (xr != NULL && !Lflag) { sctp_print_address(&(xr->xraddr->address), htons(xstcb->remote_port), numeric_port); } if (xl != NULL) xl = LIST_NEXT(xl, xladdr_entries); if (xr != NULL) xr = LIST_NEXT(xr, xraddr_entries); if (i == 0 && !Lflag) sctp_statesprint(xstcb->state); if (i < x_max) putchar('\n'); } out: /* * Free the list which be used to handle the address. */ xl = LIST_FIRST(&xladdr_head); while (xl != NULL) { xl_tmp = LIST_NEXT(xl, xladdr_entries); free(xl); xl = xl_tmp; } xr = LIST_FIRST(&xraddr_head); while (xr != NULL) { xr_tmp = LIST_NEXT(xr, xraddr_entries); free(xr); xr = xr_tmp; } } static void sctp_process_inpcb(struct xsctp_inpcb *xinpcb, char *buf, const size_t buflen, size_t *offset) { int indent = 0, xladdr_total = 0, is_listening = 0; static int first = 1; char *tname, *pname; struct xsctp_tcb *xstcb; struct xsctp_laddr *xladdr; size_t offset_laddr; int process_closed; if (xinpcb->maxqlen > 0) is_listening = 1; if (first) { if (!Lflag) { printf("Active SCTP associations"); if (aflag) printf(" (including servers)"); } else printf("Current listen queue sizes (qlen/maxqlen)"); putchar('\n'); if (Lflag) printf("%-6.6s %-5.5s %-8.8s %-22.22s\n", "Proto", "Type", "Listen", "Local Address"); else if (Wflag) printf("%-6.6s %-5.5s %-45.45s %-45.45s %s\n", "Proto", "Type", "Local Address", "Foreign Address", "(state)"); else printf("%-6.6s %-5.5s %-22.22s %-22.22s %s\n", "Proto", "Type", "Local Address", "Foreign Address", "(state)"); first = 0; } xladdr = (struct xsctp_laddr *)(buf + *offset); if (Lflag && !is_listening) { sctp_skip_xinpcb_ifneed(buf, buflen, offset); return; } if (xinpcb->flags & SCTP_PCB_FLAGS_BOUND_V6) { /* Can't distinguish between sctp46 and sctp6 */ pname = "sctp46"; } else { pname = "sctp4"; } if (xinpcb->flags & SCTP_PCB_FLAGS_TCPTYPE) tname = "1to1"; else if (xinpcb->flags & SCTP_PCB_FLAGS_UDPTYPE) tname = "1toN"; else tname = "????"; if (Lflag) { char buf1[9]; snprintf(buf1, 9, "%hu/%hu", xinpcb->qlen, xinpcb->maxqlen); printf("%-6.6s %-5.5s ", pname, tname); printf("%-8.8s ", buf1); } offset_laddr = *offset; process_closed = 0; retry: while (*offset < buflen) { xladdr = (struct xsctp_laddr *)(buf + *offset); *offset += sizeof(struct xsctp_laddr); if (xladdr->last) { if (aflag && !Lflag && (xladdr_total == 0) && process_closed) { printf("%-6.6s %-5.5s ", pname, tname); if (Wflag) { printf("%-91.91s CLOSED", " "); } else { printf("%-45.45s CLOSED", " "); } } if (process_closed || is_listening) { putchar('\n'); } break; } if (!Lflag && !is_listening && !process_closed) continue; if (xladdr_total == 0) { printf("%-6.6s %-5.5s ", pname, tname); } else { putchar('\n'); printf((Lflag) ? "%-21.21s " : "%-12.12s ", " "); } sctp_print_address(&(xladdr->address), htons(xinpcb->local_port), numeric_port); if (aflag && !Lflag && xladdr_total == 0) { if (Wflag) { if (process_closed) { printf("%-45.45s CLOSED", " "); } else { printf("%-45.45s LISTEN", " "); } } else { if (process_closed) { printf("%-22.22s CLOSED", " "); } else { printf("%-22.22s LISTEN", " "); } } } xladdr_total++; } xstcb = (struct xsctp_tcb *)(buf + *offset); *offset += sizeof(struct xsctp_tcb); if (aflag && (xladdr_total == 0) && xstcb->last && !process_closed) { process_closed = 1; *offset = offset_laddr; goto retry; } while (xstcb->last == 0 && *offset < buflen) { printf("%-6.6s %-5.5s ", pname, tname); sctp_process_tcb(xstcb, buf, buflen, offset, &indent); indent++; xstcb = (struct xsctp_tcb *)(buf + *offset); *offset += sizeof(struct xsctp_tcb); } } /* * Print a summary of SCTP connections related to an Internet * protocol. */ void sctp_protopr(u_long off __unused, const char *name, int af1, int proto) { char *buf; const char *mibvar = "net.inet.sctp.assoclist"; size_t offset = 0; size_t len = 0; struct xsctp_inpcb *xinpcb; if (proto != IPPROTO_SCTP) return; if (sysctlbyname(mibvar, 0, &len, 0, 0) < 0) { if (errno != ENOENT) warn("sysctl: %s", mibvar); return; } if ((buf = malloc(len)) == 0) { warnx("malloc %lu bytes", (u_long)len); return; } if (sysctlbyname(mibvar, buf, &len, 0, 0) < 0) { warn("sysctl: %s", mibvar); free(buf); return; } xinpcb = (struct xsctp_inpcb *)(buf + offset); offset += sizeof(struct xsctp_inpcb); while (xinpcb->last == 0 && offset < len) { sctp_process_inpcb(xinpcb, buf, (const size_t)len, &offset); xinpcb = (struct xsctp_inpcb *)(buf + offset); offset += sizeof(struct xsctp_inpcb); } free(buf); } static void sctp_statesprint(uint32_t state) { int idx; switch (state) { case SCTP_STATE_COOKIE_WAIT: idx = NETSTAT_SCTP_STATES_COOKIE_WAIT; break; case SCTP_STATE_COOKIE_ECHOED: idx = NETSTAT_SCTP_STATES_COOKIE_ECHOED; break; case SCTP_STATE_OPEN: idx = NETSTAT_SCTP_STATES_ESTABLISHED; break; case SCTP_STATE_SHUTDOWN_SENT: idx = NETSTAT_SCTP_STATES_SHUTDOWN_SENT; break; case SCTP_STATE_SHUTDOWN_RECEIVED: idx = NETSTAT_SCTP_STATES_SHUTDOWN_RECEIVED; break; case SCTP_STATE_SHUTDOWN_ACK_SENT: idx = NETSTAT_SCTP_STATES_SHUTDOWN_ACK_SENT; break; case SCTP_STATE_SHUTDOWN_PENDING: idx = NETSTAT_SCTP_STATES_SHUTDOWN_PENDING; break; default: printf("UNKNOWN 0x%08x", state); return; } printf("%s", sctpstates[idx]); } /* * Dump SCTP statistics structure. */ void sctp_stats(u_long off, const char *name, int af1 __unused, int proto __unused) { struct sctpstat sctpstat, zerostat; size_t len = sizeof(sctpstat); if (live) { if (zflag) memset(&zerostat, 0, len); if (sysctlbyname("net.inet.sctp.stats", &sctpstat, &len, zflag ? &zerostat : NULL, zflag ? len : 0) < 0) { if (errno != ENOENT) warn("sysctl: net.inet.sctp.stats"); return; } } else kread(off, &sctpstat, len); printf ("%s:\n", name); #define p(f, m) if (sctpstat.f || sflag <= 1) \ printf(m, (uintmax_t)sctpstat.f, plural(sctpstat.f)) #define p1a(f, m) if (sctpstat.f || sflag <= 1) \ printf(m, (uintmax_t)sctpstat.f) /* * input statistics */ p(sctps_recvpackets, "\t%ju input packet%s\n"); p(sctps_recvdatagrams, "\t\t%ju datagram%s\n"); p(sctps_recvpktwithdata, "\t\t%ju packet%s that had data\n"); p(sctps_recvsacks, "\t\t%ju input SACK chunk%s\n"); p(sctps_recvdata, "\t\t%ju input DATA chunk%s\n"); p(sctps_recvdupdata, "\t\t%ju duplicate DATA chunk%s\n"); p(sctps_recvheartbeat, "\t\t%ju input HB chunk%s\n"); p(sctps_recvheartbeatack, "\t\t%ju HB-ACK chunk%s\n"); p(sctps_recvecne, "\t\t%ju input ECNE chunk%s\n"); p(sctps_recvauth, "\t\t%ju input AUTH chunk%s\n"); p(sctps_recvauthmissing, "\t\t%ju chunk%s missing AUTH\n"); p(sctps_recvivalhmacid, "\t\t%ju invalid HMAC id%s received\n"); p(sctps_recvivalkeyid, "\t\t%ju invalid secret id%s received\n"); p1a(sctps_recvauthfailed, "\t\t%ju auth failed\n"); p1a(sctps_recvexpress, "\t\t%ju fast path receives all one chunk\n"); p1a(sctps_recvexpressm, "\t\t%ju fast path multi-part data\n"); /* * output statistics */ p(sctps_sendpackets, "\t%ju output packet%s\n"); p(sctps_sendsacks, "\t\t%ju output SACK%s\n"); p(sctps_senddata, "\t\t%ju output DATA chunk%s\n"); p(sctps_sendretransdata, "\t\t%ju retransmitted DATA chunk%s\n"); p(sctps_sendfastretrans, "\t\t%ju fast retransmitted DATA chunk%s\n"); p(sctps_sendmultfastretrans, "\t\t%ju FR'%s that happened more " "than once to same chunk\n"); p(sctps_sendheartbeat, "\t\t%ju output HB chunk%s\n"); p(sctps_sendecne, "\t\t%ju output ECNE chunk%s\n"); p(sctps_sendauth, "\t\t%ju output AUTH chunk%s\n"); p1a(sctps_senderrors, "\t\t%ju ip_output error counter\n"); /* * PCKDROPREP statistics */ printf("\tPacket drop statistics:\n"); p1a(sctps_pdrpfmbox, "\t\t%ju from middle box\n"); p1a(sctps_pdrpfehos, "\t\t%ju from end host\n"); p1a(sctps_pdrpmbda, "\t\t%ju with data\n"); p1a(sctps_pdrpmbct, "\t\t%ju non-data, non-endhost\n"); p1a(sctps_pdrpbwrpt, "\t\t%ju non-endhost, bandwidth rep only\n"); p1a(sctps_pdrpcrupt, "\t\t%ju not enough for chunk header\n"); p1a(sctps_pdrpnedat, "\t\t%ju not enough data to confirm\n"); p1a(sctps_pdrppdbrk, "\t\t%ju where process_chunk_drop said break\n"); p1a(sctps_pdrptsnnf, "\t\t%ju failed to find TSN\n"); p1a(sctps_pdrpdnfnd, "\t\t%ju attempt reverse TSN lookup\n"); p1a(sctps_pdrpdiwnp, "\t\t%ju e-host confirms zero-rwnd\n"); p1a(sctps_pdrpdizrw, "\t\t%ju midbox confirms no space\n"); p1a(sctps_pdrpbadd, "\t\t%ju data did not match TSN\n"); p(sctps_pdrpmark, "\t\t%ju TSN'%s marked for Fast Retran\n"); /* * Timeouts */ printf("\tTimeouts:\n"); p(sctps_timoiterator, "\t\t%ju iterator timer%s fired\n"); p(sctps_timodata, "\t\t%ju T3 data time out%s\n"); p(sctps_timowindowprobe, "\t\t%ju window probe (T3) timer%s fired\n"); p(sctps_timoinit, "\t\t%ju INIT timer%s fired\n"); p(sctps_timosack, "\t\t%ju sack timer%s fired\n"); p(sctps_timoshutdown, "\t\t%ju shutdown timer%s fired\n"); p(sctps_timoheartbeat, "\t\t%ju heartbeat timer%s fired\n"); p1a(sctps_timocookie, "\t\t%ju a cookie timeout fired\n"); p1a(sctps_timosecret, "\t\t%ju an endpoint changed its cookie" "secret\n"); p(sctps_timopathmtu, "\t\t%ju PMTU timer%s fired\n"); p(sctps_timoshutdownack, "\t\t%ju shutdown ack timer%s fired\n"); p(sctps_timoshutdownguard, "\t\t%ju shutdown guard timer%s fired\n"); p(sctps_timostrmrst, "\t\t%ju stream reset timer%s fired\n"); p(sctps_timoearlyfr, "\t\t%ju early FR timer%s fired\n"); p1a(sctps_timoasconf, "\t\t%ju an asconf timer fired\n"); p1a(sctps_timoautoclose, "\t\t%ju auto close timer fired\n"); p(sctps_timoassockill, "\t\t%ju asoc free timer%s expired\n"); p(sctps_timoinpkill, "\t\t%ju inp free timer%s expired\n"); #if 0 /* * Early fast retransmission counters */ p(sctps_earlyfrstart, "\t%ju TODO:sctps_earlyfrstart\n"); p(sctps_earlyfrstop, "\t%ju TODO:sctps_earlyfrstop\n"); p(sctps_earlyfrmrkretrans, "\t%ju TODO:sctps_earlyfrmrkretrans\n"); p(sctps_earlyfrstpout, "\t%ju TODO:sctps_earlyfrstpout\n"); p(sctps_earlyfrstpidsck1, "\t%ju TODO:sctps_earlyfrstpidsck1\n"); p(sctps_earlyfrstpidsck2, "\t%ju TODO:sctps_earlyfrstpidsck2\n"); p(sctps_earlyfrstpidsck3, "\t%ju TODO:sctps_earlyfrstpidsck3\n"); p(sctps_earlyfrstpidsck4, "\t%ju TODO:sctps_earlyfrstpidsck4\n"); p(sctps_earlyfrstrid, "\t%ju TODO:sctps_earlyfrstrid\n"); p(sctps_earlyfrstrout, "\t%ju TODO:sctps_earlyfrstrout\n"); p(sctps_earlyfrstrtmr, "\t%ju TODO:sctps_earlyfrstrtmr\n"); #endif /* * Others */ p1a(sctps_hdrops, "\t%ju packet shorter than header\n"); p1a(sctps_badsum, "\t%ju checksum error\n"); p1a(sctps_noport, "\t%ju no endpoint for port\n"); p1a(sctps_badvtag, "\t%ju bad v-tag\n"); p1a(sctps_badsid, "\t%ju bad SID\n"); p1a(sctps_nomem, "\t%ju no memory\n"); p1a(sctps_fastretransinrtt, "\t%ju number of multiple FR in a RTT " "window\n"); #if 0 p(sctps_markedretrans, "\t%ju TODO:sctps_markedretrans\n"); #endif p1a(sctps_naglesent, "\t%ju RFC813 allowed sending\n"); p1a(sctps_naglequeued, "\t%ju RFC813 does not allow sending\n"); p1a(sctps_maxburstqueued, "\t%ju times max burst prohibited sending\n"); p1a(sctps_ifnomemqueued, "\t%ju look ahead tells us no memory in " "interface\n"); p(sctps_windowprobed, "\t%ju number%s of window probes sent\n"); p(sctps_lowlevelerr, "\t%ju time%s an output error to clamp " "down on next user send\n"); p(sctps_lowlevelerrusr, "\t%ju time%s sctp_senderrors were " "caused from a user\n"); p(sctps_datadropchklmt, "\t%ju number of in data drop%s due to " "chunk limit reached\n"); p(sctps_datadroprwnd, "\t%ju number of in data drop%s due to rwnd " "limit reached\n"); p(sctps_ecnereducedcwnd, "\t%ju time%s a ECN reduced " "the cwnd\n"); p1a(sctps_vtagexpress, "\t%ju used express lookup via vtag\n"); p1a(sctps_vtagbogus, "\t%ju collision in express lookup\n"); p(sctps_primary_randry, "\t%ju time%s the sender ran dry " "of user data on primary\n"); p1a(sctps_cmt_randry, "\t%ju same for above\n"); p(sctps_slowpath_sack, "\t%ju sack%s the slow way\n"); p(sctps_wu_sacks_sent, "\t%ju window update only sack%s sent\n"); p(sctps_sends_with_flags, "\t%ju send%s with sinfo_flags !=0\n"); p(sctps_sends_with_unord, "\t%ju unordered send%s\n"); p(sctps_sends_with_eof, "\t%ju send%s with EOF flag set\n"); p(sctps_sends_with_abort, "\t%ju send%s with ABORT flag set\n"); p(sctps_protocol_drain_calls, "\t%ju time%s protocol drain called\n"); p(sctps_protocol_drains_done, "\t%ju time%s we did a protocol " "drain\n"); p(sctps_read_peeks, "\t%ju time%s recv was called with peek\n"); p(sctps_cached_chk, "\t%ju cached chunk%s used\n"); p1a(sctps_cached_strmoq, "\t%ju cached stream oq's used\n"); p(sctps_left_abandon, "\t%ju unread message%s abandonded by close\n"); p1a(sctps_send_burst_avoid, "\t%ju send burst avoidance, already " "max burst inflight to net\n"); p1a(sctps_send_cwnd_avoid, "\t%ju send cwnd full avoidance, already " "max burst inflight to net\n"); p(sctps_fwdtsn_map_over, "\t%ju number of map array over-run%s via " "fwd-tsn's\n"); #undef p #undef p1a } #endif /* SCTP */