a redo of the netstat sctp patch

Randall Stewart rrs at cisco.com
Wed Jun 6 00:38:54 UTC 2007


All:

I foobar'd the patch (as been pointed out to me)..
Here is a better version integrated to have
the sctp.c file into my local cvs so it
shows up :-D

R
-- 
Randall Stewart
NSSTG - Cisco Systems Inc.
803-345-0369 <or> 803-317-4952 (cell)
-------------- next part --------------
Index: Makefile
===================================================================
RCS file: /usr/FreeBSD/src/usr.bin/netstat/Makefile,v
retrieving revision 1.35
diff -u -r1.35 Makefile
--- Makefile	28 Jul 2006 16:16:40 -0000	1.35
+++ Makefile	4 Jun 2007 10:08:33 -0000
@@ -5,12 +5,13 @@
 
 PROG=	netstat
 SRCS=	if.c inet.c main.c mbuf.c mcast.c mroute.c route.c \
-	unix.c atalk.c netgraph.c mroute6.c ipsec.c bpf.c pfkey.c
+	unix.c atalk.c netgraph.c mroute6.c ipsec.c bpf.c pfkey.c sctp.c
 
 WARNS?=	3
 
 CFLAGS+=-DIPSEC
 CFLAGS+=-DFAST_IPSEC
+CFLAGS+=-DSCTP
 
 .if ${MK_INET6_SUPPORT} != "no"
 SRCS+=	inet6.c
Index: main.c
===================================================================
RCS file: /usr/FreeBSD/src/usr.bin/netstat/main.c,v
retrieving revision 1.83
diff -u -r1.83 main.c
--- main.c	28 Jul 2006 16:16:40 -0000	1.83
+++ main.c	4 Jun 2007 10:08:33 -0000
@@ -168,6 +168,10 @@
 	  tcp_stats,	NULL,		"tcp",	IPPROTO_TCP },
 	{ -1,		-1,		1,	protopr,
 	  udp_stats,	NULL,		"udp",	IPPROTO_UDP },
+#ifdef SCTP
+	{ -1,		-1,		1,	sctp_protopr,
+	  sctp_stats,	NULL,		"sctp",	IPPROTO_SCTP },
+#endif
 	{ -1,		-1,		1,	protopr,
 	  NULL,		NULL,		"divert",IPPROTO_DIVERT },
 	{ -1,		-1,		1,	protopr,
Index: netstat.h
===================================================================
RCS file: /usr/FreeBSD/src/usr.bin/netstat/netstat.h,v
retrieving revision 1.48
diff -u -r1.48 netstat.h
--- netstat.h	28 Jul 2006 16:09:18 -0000	1.48
+++ netstat.h	4 Jun 2007 10:08:33 -0000
@@ -68,6 +68,10 @@
 void	protopr(u_long, const char *, int);
 void	tcp_stats(u_long, const char *, int);
 void	udp_stats(u_long, const char *, int);
+#ifdef SCTP
+void	sctp_protopr(u_long, const char *, int);
+void	sctp_stats(u_long, const char *, int);
+#endif
 void	ip_stats(u_long, const char *, int);
 void	icmp_stats(u_long, const char *, int);
 void	igmp_stats(u_long, const char *, int);
Index: sctp.c
===================================================================
RCS file: sctp.c
diff -N sctp.c
--- /dev/null	1 Jan 1970 00:00:00 -0000
+++ sctp.c	4 Jun 2007 10:08:12 -0000
@@ -0,0 +1,712 @@
+/*
+ * Copyright (c) 1983, 1988, 1993, 1995
+ *	The Regents of the University of California.  All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ * 3. All advertising materials mentioning features or use of this software
+ *    must display the following acknowledgement:
+ *	This product includes software developed by the University of
+ *	California, Berkeley and its contributors.
+ * 4. Neither the name of the University nor the names of its contributors
+ *    may be used to endorse or promote products derived from this software
+ *    without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+#if 0
+#ifndef lint
+static char sccsid[] = "@(#)sctp.c	0.1 (Berkeley) 4/18/2007";
+#endif /* not lint */
+#endif
+
+#include <sys/cdefs.h>
+__FBSDID("$FreeBSD$");
+
+#include <sys/param.h>
+#include <sys/queue.h>
+#include <sys/types.h>
+#include <sys/socket.h>
+#include <sys/socketvar.h>
+#include <sys/sysctl.h>
+#include <sys/protosw.h>
+
+#include <netinet/in.h>
+#include <netinet/sctp.h>
+#include <netinet/sctp_constants.h>
+#include <arpa/inet.h>
+
+#include <err.h>
+#include <errno.h>
+#include <libutil.h>
+#include <netdb.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <unistd.h>
+#include "netstat.h"
+
+#ifdef SCTP
+
+void	inetprint (struct in_addr *, int, const char *, int);
+static void sctp_statesprint(uint32_t state);
+
+#define NETSTAT_SCTP_STATES_CLOSED		0x0
+#define NETSTAT_SCTP_STATES_BOUND		0x1
+#define NETSTAT_SCTP_STATES_LISTEN		0x2
+#define NETSTAT_SCTP_STATES_COOKIE_WAIT		0x3
+#define NETSTAT_SCTP_STATES_COOKIE_ECHOED	0x4
+#define NETSTAT_SCTP_STATES_ESTABLISHED		0x5
+#define NETSTAT_SCTP_STATES_SHUTDOWN_SENT	0x6
+#define NETSTAT_SCTP_STATES_SHUTDOWN_RECEIVED	0x7
+#define NETSTAT_SCTP_STATES_SHUTDOWN_ACK_SENT	0x8
+#define NETSTAT_SCTP_STATES_SHUTDOWN_PENDING	0x9
+
+char *sctpstates[] = {
+	"CLOSED",
+	"BOUND",
+	"LISTEN", 
+	"COOKIE_WAIT", 
+	"COOKIE_ECHOED", 
+	"ESTABLISHED", 
+	"SHUTDOWN_SENT",
+	"SHUTDOWN_RECEIVED",
+	"SHUTDOWN_ACK_SENT",
+	"SHUTDOWN_PENDING"
+};
+
+LIST_HEAD(xladdr_list, xladdr_entry) xladdr_head;
+struct xladdr_entry {
+	struct xsctp_laddr *xladdr;
+	LIST_ENTRY(xladdr_entry) xladdr_entries;
+};
+
+LIST_HEAD(xraddr_list, xraddr_entry) xraddr_head;
+struct xraddr_entry {
+        struct xsctp_raddr *xraddr;
+        LIST_ENTRY(xraddr_entry) xraddr_entries;
+};
+
+static int
+sctp_skip_xinpcb_ifneed(char *buf, const size_t buflen, size_t *offset)
+{
+	int exist_tcb = 0;
+	struct xsctp_tcb *xstcb;
+	struct xsctp_raddr *xraddr;
+	struct xsctp_laddr *xladdr;
+
+	while (*offset < buflen) {
+		xladdr = (struct xsctp_laddr *)(buf + *offset);
+		*offset += sizeof(struct xsctp_laddr);
+		if (xladdr->last == 1)
+			break;
+	}
+	
+	while (*offset < buflen) {
+		xstcb = (struct xsctp_tcb *)(buf + *offset);
+		*offset += sizeof(struct xsctp_tcb);
+		if (xstcb->last == 1)
+			break;
+
+		exist_tcb = 1;
+
+		while (*offset < buflen) {
+			xladdr = (struct xsctp_laddr *)(buf + *offset);
+			*offset += sizeof(struct xsctp_laddr);
+			if (xladdr->last == 1)
+				break;
+		}
+
+		while (*offset < buflen) {
+			xraddr = (struct xsctp_raddr *)(buf + *offset);
+			*offset += sizeof(struct xsctp_raddr);
+			if (xraddr->last == 1)
+				break;
+		}
+	}
+
+	/*
+	 * If Lflag is set, we don't care about the return value.
+	 */
+	if (Lflag)
+		return 0;
+
+	return exist_tcb;
+}
+
+static void
+sctp_process_tcb(struct xsctp_tcb *xstcb, const char *name,
+    char *buf, const size_t buflen, size_t *offset, int *indent)
+{
+	int i, xl_total = 0, xr_total = 0, x_max;
+	struct sockaddr *sa;
+	struct xsctp_raddr *xraddr;
+	struct xsctp_laddr *xladdr;
+	struct xladdr_entry *prev_xl = NULL, *xl = NULL, *xl_tmp;
+	struct xraddr_entry *prev_xr = NULL, *xr = NULL, *xr_tmp;
+#ifdef INET6
+	struct sockaddr_in6 *in6;
+#endif
+
+	LIST_INIT(&xladdr_head);
+	LIST_INIT(&xraddr_head);
+
+	/*
+	 * Make `struct xladdr_list' list and `struct xraddr_list' list
+	 * to handle the address flexibly.
+	 */
+	while (*offset < buflen) {
+		xladdr = (struct xsctp_laddr *)(buf + *offset);
+		*offset += sizeof(struct xsctp_laddr);
+		if (xladdr->last == 1)
+			break;
+		
+		prev_xl = xl;
+		xl = malloc(sizeof(struct xladdr_entry));
+		if (xl == NULL) {
+			warnx("malloc %lu bytes", 
+			    (u_long)sizeof(struct xladdr_entry));
+			goto out;
+		}
+		xl->xladdr = xladdr;
+		if (prev_xl == NULL)
+			LIST_INSERT_HEAD(&xladdr_head, xl, xladdr_entries);
+		else
+			LIST_INSERT_AFTER(prev_xl, xl, xladdr_entries);
+		xl_total++;
+	}
+	
+	while (*offset < buflen) {
+		xraddr = (struct xsctp_raddr *)(buf + *offset);
+		*offset += sizeof(struct xsctp_raddr);
+		if (xraddr->last == 1)
+			break;
+		
+		prev_xr = xr;
+		xr = malloc(sizeof(struct xraddr_entry));
+		if (xr == NULL) {
+			warnx("malloc %lu bytes", 
+			    (u_long)sizeof(struct xraddr_entry));
+			goto out;
+		}
+		xr->xraddr = xraddr;
+		if (prev_xr == NULL)
+			LIST_INSERT_HEAD(&xraddr_head, xr, xraddr_entries);
+		else
+			LIST_INSERT_AFTER(prev_xr, xr, xraddr_entries);
+		xr_total++;
+	}
+	
+	/*
+	 * Let's print the address infos.
+	 */
+	xl = LIST_FIRST(&xladdr_head);
+	xr = LIST_FIRST(&xraddr_head);
+	x_max = (xl_total > xr_total) ? xl_total : xr_total;
+	for (i = 0; i < x_max; i++) {
+		if (((*indent == 0) && i > 0) || *indent > 0)
+			printf("%-11s ", " ");
+		
+		if (xl != NULL) {
+			sa = &(xl->xladdr->address.sa);
+			if ((sa->sa_family) == AF_INET)
+				inetprint(&((struct sockaddr_in *)sa)->sin_addr, 
+				    htons(xstcb->local_port), 
+				    name, numeric_port);
+#ifdef INET6
+			else {
+				in6 = (struct sockaddr_in6 *)sa;
+				inet6print(&in6->sin6_addr,
+				    htons(xstcb->local_port),
+				    name, numeric_port);
+			}
+#endif
+		}
+		
+		if (xr != NULL && !Lflag) {
+			sa = &(xr->xraddr->address.sa);
+			if ((sa->sa_family) == AF_INET)
+				inetprint(&((struct sockaddr_in *)sa)->sin_addr,
+				    htons(xstcb->remote_port),
+				    name, numeric_port);
+#ifdef INET6
+			else {
+				in6 = (struct sockaddr_in6 *)sa;
+				inet6print(&in6->sin6_addr,
+				    htons(xstcb->remote_port),
+				    name, numeric_port);
+			}
+#endif
+		}
+		
+		if (xl != NULL)
+			xl = LIST_NEXT(xl, xladdr_entries);
+		if (xr != NULL)
+			xr = LIST_NEXT(xr, xraddr_entries);
+		
+		if (i == 0 && !Lflag)
+			sctp_statesprint(xstcb->state);
+		
+		if (i < x_max)
+			putchar('\n');
+	}
+	
+out:
+	/*
+	 * Free the list which be used to handle the address.
+	 */
+	xl = LIST_FIRST(&xladdr_head);
+	while (xl != NULL) {
+		xl_tmp = LIST_NEXT(xl, xladdr_entries);
+		free(xl);
+		xl = xl_tmp;
+	}
+	
+	xr = LIST_FIRST(&xraddr_head);
+	while (xr != NULL) {
+		xr_tmp = LIST_NEXT(xr, xraddr_entries);
+		free(xr);
+		xr = xr_tmp;
+	}
+}
+
+#ifdef SCTP_DEBUG
+uint32_t sctp_pdup[64];
+int sctp_pcnt = 0;
+#endif
+
+static void
+sctp_process_inpcb(struct xsctp_inpcb *xinpcb, const char *name,
+    char *buf, const size_t buflen, size_t *offset)
+{
+	int offset_backup, indent = 0, xladdr_total = 0, is_listening = 0;
+	static int first = 1;
+	char *tname;
+	struct xsctp_tcb *xstcb;
+	struct xsctp_laddr *xladdr;
+	struct sockaddr *sa;
+#ifdef INET6
+	struct sockaddr_in6 *in6;
+#endif
+
+	if ((xinpcb->flags & SCTP_PCB_FLAGS_TCPTYPE) ==
+	    SCTP_PCB_FLAGS_TCPTYPE && xinpcb->maxqlen > 0)
+		is_listening = 1;
+
+	if (!Lflag && !is_listening &&
+	    !(xinpcb->flags & SCTP_PCB_FLAGS_CONNECTED)) {
+#ifdef SCTP_DEBUG
+		int i, found = 0;
+
+		for (i = 0; i < sctp_pcnt; i++) {
+			if (sctp_pdup[i] == xinpcb->flags) {
+				found = 1;
+				break;
+			}
+		}
+		if (!found) {
+			sctp_pdup[sctp_pcnt++] = xinpcb->flags;
+			if (sctp_pcnt >= 64)
+				sctp_pcnt = 0;
+			printf("[0x%08x]", xinpcb->flags);
+		}
+#endif
+		offset_backup = *offset;
+		if (!sctp_skip_xinpcb_ifneed(buf, buflen, offset))
+			return;
+		*offset = offset_backup;
+	}
+
+	if (first) {
+		if (!Lflag) {
+			printf("Active SCTP associations");
+			if (aflag)
+				printf(" (including servers)");
+		} else
+			printf("Current listen queue sizes (qlen/maxqlen)");
+		putchar('\n');
+		if (Aflag)
+			printf("%-8.8s ", "Socket");
+		if (Lflag)
+			printf("%-5.5s %-5.5s %-8.8s %-22.22s\n",
+			    "Proto", "Type", "Listen", "Local Address");
+		else
+			printf((Aflag && !Wflag) ?
+			    "%-5.5s %-5.5s %-18.18s %-18.18s %s\n" :
+			    "%-5.5s %-5.5s %-22.22s %-22.22s %s\n",
+			    "Proto", "Type",
+			    "Local Address", "Foreign Address",
+			    "(state)");
+		first = 0;
+	}
+	if (Lflag && xinpcb->maxqlen == 0) {
+		(int)sctp_skip_xinpcb_ifneed(buf, buflen, offset);
+		return;
+	}
+	if (Aflag)
+		printf("%8lx ", (u_long)xinpcb);
+
+	printf("%-5.5s ", name);
+	
+	if (xinpcb->flags & SCTP_PCB_FLAGS_TCPTYPE)
+		tname = "1to1";
+	else if (xinpcb->flags & SCTP_PCB_FLAGS_UDPTYPE)
+		tname = "1toN";
+	else
+		return;
+	
+	printf("%-5.5s ", tname);
+
+	if (Lflag) {
+		char buf1[9];
+		
+		snprintf(buf1, 9, "%hu/%hu", xinpcb->qlen, xinpcb->maxqlen);
+		printf("%-8.8s ", buf1);
+	}
+	/*
+	 * process the local address.  This routine are used for Lflag.
+	 */
+	while (*offset < buflen) {
+		xladdr = (struct xsctp_laddr *)(buf + *offset);
+		*offset += sizeof(struct xsctp_laddr);
+		if (xladdr->last == 1)
+			break;
+
+		if (!Lflag && !is_listening)
+			continue;
+
+		if (xladdr_total != 0)
+			putchar('\n');
+		if (xladdr_total > 0)
+			printf((Lflag) ?
+			    "%-20.20s " : "%-11.11s ", " ");
+
+		sa = &(xladdr->address.sa);
+		if ((sa->sa_family) == AF_INET)
+			inetprint(&((struct sockaddr_in *)sa)->sin_addr, 
+			    htons(xinpcb->local_port), name, numeric_port);
+#ifdef INET6
+		else {
+			in6 = (struct sockaddr_in6 *)sa;
+			inet6print(&in6->sin6_addr,
+			    htons(xinpcb->local_port), name, numeric_port);
+		}
+#endif
+
+		if (!Lflag && xladdr_total == 0 && is_listening == 1)
+			printf("%-22.22s LISTEN", " ");
+
+		xladdr_total++;
+	}
+
+	xstcb = (struct xsctp_tcb *)(buf + *offset);
+	*offset += sizeof(struct xsctp_tcb);
+	while (xstcb->last == 0 && *offset < buflen) {
+		sctp_process_tcb(xstcb, name, buf, buflen, offset, &indent);
+		indent++;
+		xstcb = (struct xsctp_tcb *)(buf + *offset);
+		*offset += sizeof(struct xsctp_tcb);
+	}
+
+	putchar('\n');
+}
+
+/*
+ * Print a summary of SCTP connections related to an Internet
+ * protocol.
+ */
+void
+sctp_protopr(u_long proto,
+    const char *name, int af1)
+{
+	char *buf;
+	const char *mibvar = "net.inet.sctp.assoclist";
+	u_int offset = 0;
+	size_t len = 0;
+	struct xsctp_inpcb *xinpcb;
+	
+	if (proto != IPPROTO_SCTP)
+		return;
+
+	if (sysctlbyname(mibvar, 0, &len, 0, 0) < 0) {
+		if (errno != ENOENT)
+			warn("sysctl: %s", mibvar);
+		return;
+	}
+	if ((buf = malloc(len)) == 0) {
+		warnx("malloc %lu bytes", (u_long)len);
+		return;
+	}
+	if (sysctlbyname(mibvar, buf, &len, 0, 0) < 0) {
+		warn("sysctl: %s", mibvar);
+		free(buf);
+		return;
+	}
+
+	xinpcb = (struct xsctp_inpcb *)(buf + offset);
+	offset += sizeof(struct xsctp_inpcb);
+	while (xinpcb->last == 0 && offset < len) {
+		sctp_process_inpcb(xinpcb, name, buf, (const size_t)len,
+		    &offset);
+
+		xinpcb = (struct xsctp_inpcb *)(buf + offset);
+		offset += sizeof(struct xsctp_inpcb);
+	}
+
+	free(buf);
+}
+
+static void
+sctp_statesprint(uint32_t state)
+{
+	int idx;
+
+	switch (state) {
+	case SCTP_STATE_COOKIE_WAIT:
+		idx = NETSTAT_SCTP_STATES_COOKIE_WAIT;
+		break;
+	case SCTP_STATE_COOKIE_ECHOED:
+		idx = NETSTAT_SCTP_STATES_COOKIE_ECHOED;
+		break;
+	case SCTP_STATE_OPEN:
+		idx = NETSTAT_SCTP_STATES_ESTABLISHED;
+		break;
+	case SCTP_STATE_SHUTDOWN_SENT:
+		idx = NETSTAT_SCTP_STATES_SHUTDOWN_SENT;
+		break;
+	case SCTP_STATE_SHUTDOWN_RECEIVED:
+		idx = NETSTAT_SCTP_STATES_SHUTDOWN_RECEIVED;
+		break;
+	case SCTP_STATE_SHUTDOWN_ACK_SENT:
+		idx = NETSTAT_SCTP_STATES_SHUTDOWN_ACK_SENT;
+		break;
+	case SCTP_STATE_SHUTDOWN_PENDING:
+		idx = NETSTAT_SCTP_STATES_SHUTDOWN_PENDING;
+		break;
+	default:
+		printf("UNKNOWN 0x%08x", state);
+		return;
+	}
+
+	printf("%s", sctpstates[idx]);
+}
+
+/*
+ * Dump SCTP statistics structure.
+ */
+void
+sctp_stats(u_long off __unused, const char *name, int af1 __unused)
+{
+	struct sctpstat sctpstat, zerostat;
+	size_t len = sizeof(sctpstat);
+
+	if (zflag)
+		memset(&zerostat, 0, len);
+	if (sysctlbyname("net.inet.sctp.stats", &sctpstat, &len,
+	    zflag ? &zerostat : NULL, zflag ? len : 0) < 0) {
+		warn("sysctl: net.inet.sctp.stats");
+		return;
+	}
+
+	printf ("%s:\n", name);
+
+#define	p(f, m) if (sctpstat.f || sflag <= 1) \
+    printf(m, sctpstat.f, plural(sctpstat.f))
+#define	p1a(f, m) if (sctpstat.f || sflag <= 1) \
+    printf(m, sctpstat.f)
+#define	p2(f1, f2, m) if (sctpstat.f1 || sctpstat.f2 || sflag <= 1) \
+    printf(m, sctpstat.f1, plural(sctpstat.f1), sctpstat.f2, plural(sctpstat.f2))
+#define	p2a(f1, f2, m) if (sctpstat.f1 || sctpstat.f2 || sflag <= 1) \
+    printf(m, sctpstat.f1, plural(sctpstat.f1), sctpstat.f2)
+#define	p3(f, m) if (sctpstat.f || sflag <= 1) \
+    printf(m, sctpstat.f, plurales(sctpstat.f))
+
+	/*
+	 * input statistics
+	 */
+	p(sctps_recvpackets, "\t%lu total input packet%s\n");
+	p(sctps_recvdatagrams, "\t%lu total input datagram%s\n");
+	p(sctps_recvpktwithdata, "\t%lu total packet%s that had data\n");
+	p(sctps_recvsacks, "\t%lu total input SACK chunk%s\n");
+	p(sctps_recvdata, "\t%lu total input DATA chunk%s\n");
+	p(sctps_recvdupdata, "\t%lu total input duplicate DATA chunk%s\n");
+	p(sctps_recvheartbeat, "\t%lu total input HB chunk%s\n");
+	p(sctps_recvheartbeatack, "\t%lu total input HB-ACK chunk%s\n");
+	p(sctps_recvecne, "\t%lu total input ECNE chunk%s\n");
+	p(sctps_recvauth, "\t%lu total input AUTH chunk%s\n");
+	p(sctps_recvauthmissing, "\t%lu total input chunk%s missing AUTH\n");
+	p(sctps_recvivalhmacid, "\t%lu total number of invalid HMAC id%s "
+	    "received\n");
+	p(sctps_recvivalkeyid, "\t%lu total number of invalid %secret ids "
+	    "received\n");
+	p1a(sctps_recvauthfailed, "\t%lu total number of auth failed\n");
+	p(sctps_recvexpress, "\t%lu total fa%st path receives all one "
+	    "chunk\n");
+	p(sctps_recvexpressm, "\t%lu total fa%st path multi-part data\n");
+
+	/*
+	 * output statistics
+	 */
+	p(sctps_sendpackets, "\t%lu total output packet%s\n");
+	p(sctps_sendsacks, "\t%lu total output SACK%s\n");
+	p(sctps_senddata, "\t%lu total output DATA chunk%s\n");
+	p(sctps_sendretransdata, "\t%lu total output retran%smitted DATA "
+	    "chunks\n");
+	p(sctps_sendfastretrans, "\t%lu total output fa%st retransmitted "
+	    "DATA chunks\n");
+	p(sctps_sendmultfastretrans, "\t%lu total FR'%s that happened more "
+	    "than once to same chunk (u-del multi-fr algo).\n");
+	p(sctps_sendheartbeat, "\t%lu total output HB chunk%s\n");
+	p(sctps_sendecne, "\t%lu total output ECNE chunk%s\n");
+	p(sctps_sendauth, "\t%lu total output AUTH chunk%s\n");
+	p1a(sctps_senderrors, "\t%lu ip_output error counter\n");
+
+	/*
+	 * PCKDROPREP statistics
+	 */
+	p1a(sctps_pdrpfmbox, "\t%lu packet drop from middle box\n");
+	p(sctps_pdrpfehos, "\t%lu packet drop from end ho%st\n");
+	p(sctps_pdrpmbda, "\t%lu packet drop%s with data\n");
+	p(sctps_pdrpmbct, "\t%lu packet drop%s, non-data, non-endhost\n");
+	p(sctps_pdrpbwrpt, "\t%lu packet drop, non-endho%st, bandwidth "
+	    "rep only\n");
+	p1a(sctps_pdrpcrupt, "\t%lu packet drop, not enough for chunk "
+	    "header\n");
+	p1a(sctps_pdrpnedat, "\t%lu packet drop, not enough data to confirm\n");
+	p(sctps_pdrppdbrk, "\t%lu packet drop, where proce%ss_chunk_drop "
+	    "said break\n");
+	p1a(sctps_pdrptsnnf, "\t%lu packet drop, could not find TSN\n");
+	p(sctps_pdrpdnfnd, "\t%lu packet drop, attempt rever%se TSN lookup\n");
+	p(sctps_pdrpdiwnp, "\t%lu packet drop, e-ho%st confirms zero-rwnd\n");
+	p(sctps_pdrpdizrw, "\t%lu packet drop, midbox confirm%s no space\n");
+	p1a(sctps_pdrpbadd, "\t%lu packet drop, data did not match TSN\n");
+	p(sctps_pdrpmark, "\t%lu packet drop, TSN'%s marked for Fast Retran\n");
+
+	/*
+	 * Timeouts
+	 */
+	p(sctps_timoiterator, "\t%lu number of iterator timer%s that fired\n");
+	p(sctps_timodata, "\t%lu number of T3 data time out%s\n");
+	p(sctps_timowindowprobe, "\t%lu number of window probe (T3) timer%s "
+	    "that fired\n");
+	p(sctps_timoinit, "\t%lu number of INIT timer%s that fired\n");
+	p(sctps_timosack, "\t%lu number of %sack timers that fired\n");
+	p(sctps_timoshutdown, "\t%lu number of %shutdown timers that fired\n");
+	p(sctps_timoheartbeat, "\t%lu number of heartbeat timer%s that "
+	    "fired\n");
+	p(sctps_timocookie, "\t%lu number of time%s a cookie timeout fired\n");
+	p(sctps_timosecret, "\t%lu number of time%s an endpoint changed its "
+	    "cookie secret\n");
+	p(sctps_timopathmtu, "\t%lu number of PMTU timer%s that fired\n");
+	p(sctps_timoshutdownack, "\t%lu number of %shutdown ack timers that "
+	    "fired\n");
+	p(sctps_timoshutdownguard, "\t%lu number of %shutdown guard timers "
+	    "that fired\n");
+	p(sctps_timostrmrst, "\t%lu number of %stream reset timers that "
+	    "fired\n");
+	p(sctps_timoearlyfr, "\t%lu number of early FR timer%s that fired\n");
+	p(sctps_timoasconf, "\t%lu number of time%s an asconf timer fired\n");
+	p(sctps_timoautoclose, "\t%lu number of time%s auto close timer "
+	    "fired\n");
+	p(sctps_timoassockill, "\t%lu number of a%soc free timers expired\n");
+	p(sctps_timoinpkill, "\t%lu number of inp free timer%s expired\n");
+
+#if 0
+	/*
+	 * Early fast retransmission counters
+	 */
+	p(sctps_earlyfrstart, "\t%lu TODO:%sctps_earlyfrstart\n");
+	p(sctps_earlyfrstop, "\t%lu TODO:sctp%s_earlyfrstop\n");
+	p(sctps_earlyfrmrkretrans, "\t%lu TODO:%sctps_earlyfrmrkretrans\n");
+	p(sctps_earlyfrstpout, "\t%lu TODO:%sctps_earlyfrstpout\n");
+	p(sctps_earlyfrstpidsck1, "\t%lu TODO:%sctps_earlyfrstpidsck1\n");
+	p(sctps_earlyfrstpidsck2, "\t%lu TODO:%sctps_earlyfrstpidsck2\n");
+	p(sctps_earlyfrstpidsck3, "\t%lu TODO:%sctps_earlyfrstpidsck3\n");
+	p(sctps_earlyfrstpidsck4, "\t%lu TODO:%sctps_earlyfrstpidsck4\n");
+	p(sctps_earlyfrstrid, "\t%lu TODO:%sctps_earlyfrstrid\n");
+	p(sctps_earlyfrstrout, "\t%lu TODO:%sctps_earlyfrstrout\n");
+	p(sctps_earlyfrstrtmr, "\t%lu TODO:%sctps_earlyfrstrtmr\n");
+#endif
+
+	/*
+	 * Others
+	 */
+	p(sctps_hdrops, "\t%lu packet %shorter than header\n");
+	p(sctps_badsum, "\t%lu check%sum error\n");
+	p1a(sctps_noport, "\t%lu no endpoint for port\n");
+	p1a(sctps_badvtag, "\t%lu bad v-tag\n");
+	p1a(sctps_badsid, "\t%lu bad SID\n");
+	p1a(sctps_nomem, "\t%lu no memory\n");
+	p1a(sctps_fastretransinrtt, "\t%lu number of multiple FR in a RTT "
+	    "window\n");
+#if 0
+	p(sctps_markedretrans, "\t%lu TODO:%sctps_markedretrans\n");
+#endif
+	p(sctps_naglesent, "\t%lu nagle allowed %sending\n");
+	p(sctps_naglequeued, "\t%lu nagle doe%s't allow sending\n");
+	p(sctps_maxburstqueued, "\t%lu max bur%st dosn't allow sending\n");
+	p(sctps_ifnomemqueued, "\t%lu look ahead tell%s us no memory in "
+	    "interface ring buffer or we had a send error and are queuing "
+	    "one send.\n");
+	p(sctps_windowprobed, "\t%lu total number of window probe%s sent\n");
+	p(sctps_lowlevelerr, "\t%lu total time%s an output error causes us "
+	    "to clamp down on next user send.\n");
+	p(sctps_lowlevelerrusr, "\t%lu total time%s sctp_senderrors were "
+	    "caused from a user send from a user invoked send not a sack "
+	    "response\n");
+	p(sctps_datadropchklmt, "\t%lu number of in data drop%s due to "
+	    "chunk limit reached\n");
+	p(sctps_datadroprwnd, "\t%lu number of in data drop%s due to rwnd "
+	    "limit reached\n");
+	p(sctps_ecnereducedcwnd, "\t%lu number of time%s a ECN reduced "
+	    "the cwnd\n");
+	p(sctps_vtagexpress, "\t%lu u%sed express lookup via vtag\n");
+	p(sctps_vtagbogus, "\t%lu colli%sion in express lookup.\n");
+	p(sctps_primary_randry, "\t%lu number of time%s the sender ran dry "
+	    "of user data on primary\n");
+	p1a(sctps_cmt_randry, "\t%lu same for above\n");
+	p(sctps_slowpath_sack, "\t%lu sack%s the slow way\n");
+	p(sctps_wu_sacks_sent, "\t%lu window update only %sacks sent\n");
+	p(sctps_sends_with_flags, "\t%lu number of %sends with "
+	    "sinfo_flags !=0\n");
+	p(sctps_sends_with_unord, "\t%lu number of undordered %sends\n");
+	p(sctps_sends_with_eof, "\t%lu number of %sends with EOF flag set\n");
+	p(sctps_sends_with_abort, "\t%lu number of %sends with ABORT "
+	    "flag set\n");
+	p(sctps_protocol_drain_calls, "\t%lu number of time%s protocol "
+	    "drain called\n");
+	p(sctps_protocol_drains_done, "\t%lu number of time%s we did a "
+	    "protocol drain\n");
+	p(sctps_read_peeks, "\t%lu number of time%s recv was called with "
+	    "peek\n");
+	p(sctps_cached_chk, "\t%lu number of cached chunk%s used\n");
+	p(sctps_cached_strmoq, "\t%lu number of cached %stream oq's used\n");
+	p(sctps_left_abandon, "\t%lu number of unread me%ssage abandonded "
+	    "by close\n");
+	p(sctps_send_burst_avoid, "\t%lu send bur%st avoidance, already "
+	    "max burst inflight to net\n");
+	p(sctps_send_cwnd_avoid, "\t%lu send cwnd full avoidance, already "
+	    "max bur%st inflight to net\n");
+	p(sctps_fwdtsn_map_over, "\t%lu number of map array over-run%s via "
+	    "fwd-tsn's\n");
+}
+
+#endif /* SCTP */


More information about the freebsd-net mailing list