1 /* 2 * Copyright (c) 1983, 1988, 1993, 1995 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34 #ifndef lint 35 /* 36 static char sccsid[] = "@(#)inet.c 8.5 (Berkeley) 5/24/95"; 37 */ 38 static const char rcsid[] = 39 "$FreeBSD$"; 40 #endif /* not lint */ 41 42 #include <sys/param.h> 43 #include <sys/queue.h> 44 #include <sys/socket.h> 45 #include <sys/socketvar.h> 46 #include <sys/sysctl.h> 47 #include <sys/protosw.h> 48 49 #include <net/route.h> 50 #include <netinet/in.h> 51 #include <netinet/in_systm.h> 52 #include <netinet/ip.h> 53 #ifdef INET6 54 #include <netinet/ip6.h> 55 #endif /* INET6 */ 56 #include <netinet/in_pcb.h> 57 #include <netinet/ip_icmp.h> 58 #include <netinet/icmp_var.h> 59 #include <netinet/igmp_var.h> 60 #include <netinet/ip_var.h> 61 #include <netinet/tcp.h> 62 #include <netinet/tcpip.h> 63 #include <netinet/tcp_seq.h> 64 #define TCPSTATES 65 #include <netinet/tcp_fsm.h> 66 #include <netinet/tcp_timer.h> 67 #include <netinet/tcp_var.h> 68 #include <netinet/tcp_debug.h> 69 #include <netinet/udp.h> 70 #include <netinet/udp_var.h> 71 72 #include <arpa/inet.h> 73 #include <err.h> 74 #include <errno.h> 75 #include <libutil.h> 76 #include <netdb.h> 77 #include <stdio.h> 78 #include <stdlib.h> 79 #include <string.h> 80 #include <unistd.h> 81 #include "netstat.h" 82 83 char *inetname (struct in_addr *); 84 void inetprint (struct in_addr *, int, char *, int); 85 #ifdef INET6 86 extern void inet6print (struct in6_addr *, int, char *, int); 87 static int udp_done, tcp_done; 88 #endif /* INET6 */ 89 90 /* 91 * Print a summary of connections related to an Internet 92 * protocol. For TCP, also give state of connection. 93 * Listening processes (aflag) are suppressed unless the 94 * -a (all) flag is specified. 95 */ 96 void 97 protopr(u_long proto, /* for sysctl version we pass proto # */ 98 char *name, int af) 99 { 100 int istcp; 101 static int first = 1; 102 char *buf; 103 const char *mibvar; 104 struct tcpcb *tp = NULL; 105 struct inpcb *inp; 106 struct xinpgen *xig, *oxig; 107 struct xsocket *so; 108 size_t len; 109 110 istcp = 0; 111 switch (proto) { 112 case IPPROTO_TCP: 113 #ifdef INET6 114 if (tcp_done != 0) 115 return; 116 else 117 tcp_done = 1; 118 #endif 119 istcp = 1; 120 mibvar = "net.inet.tcp.pcblist"; 121 break; 122 case IPPROTO_UDP: 123 #ifdef INET6 124 if (udp_done != 0) 125 return; 126 else 127 udp_done = 1; 128 #endif 129 mibvar = "net.inet.udp.pcblist"; 130 break; 131 case IPPROTO_DIVERT: 132 mibvar = "net.inet.divert.pcblist"; 133 break; 134 default: 135 mibvar = "net.inet.raw.pcblist"; 136 break; 137 } 138 len = 0; 139 if (sysctlbyname(mibvar, 0, &len, 0, 0) < 0) { 140 if (errno != ENOENT) 141 warn("sysctl: %s", mibvar); 142 return; 143 } 144 if ((buf = malloc(len)) == 0) { 145 warn("malloc %lu bytes", (u_long)len); 146 return; 147 } 148 if (sysctlbyname(mibvar, buf, &len, 0, 0) < 0) { 149 warn("sysctl: %s", mibvar); 150 free(buf); 151 return; 152 } 153 154 oxig = xig = (struct xinpgen *)buf; 155 for (xig = (struct xinpgen *)((char *)xig + xig->xig_len); 156 xig->xig_len > sizeof(struct xinpgen); 157 xig = (struct xinpgen *)((char *)xig + xig->xig_len)) { 158 if (istcp) { 159 tp = &((struct xtcpcb *)xig)->xt_tp; 160 inp = &((struct xtcpcb *)xig)->xt_inp; 161 so = &((struct xtcpcb *)xig)->xt_socket; 162 } else { 163 inp = &((struct xinpcb *)xig)->xi_inp; 164 so = &((struct xinpcb *)xig)->xi_socket; 165 } 166 167 /* Ignore sockets for protocols other than the desired one. */ 168 if (so->xso_protocol != (int)proto) 169 continue; 170 171 /* Ignore PCBs which were freed during copyout. */ 172 if (inp->inp_gencnt > oxig->xig_gen) 173 continue; 174 175 if ((af == AF_INET && (inp->inp_vflag & INP_IPV4) == 0) 176 #ifdef INET6 177 || (af == AF_INET6 && (inp->inp_vflag & INP_IPV6) == 0) 178 #endif /* INET6 */ 179 || (af == AF_UNSPEC && ((inp->inp_vflag & INP_IPV4) == 0 180 #ifdef INET6 181 && (inp->inp_vflag & 182 INP_IPV6) == 0 183 #endif /* INET6 */ 184 )) 185 ) 186 continue; 187 if (!aflag && 188 ( 189 (af == AF_INET && 190 inet_lnaof(inp->inp_laddr) == INADDR_ANY) 191 #ifdef INET6 192 || (af == AF_INET6 && 193 IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr)) 194 #endif /* INET6 */ 195 || (af == AF_UNSPEC && 196 (((inp->inp_vflag & INP_IPV4) != 0 && 197 inet_lnaof(inp->inp_laddr) == INADDR_ANY) 198 #ifdef INET6 199 || ((inp->inp_vflag & INP_IPV6) != 0 && 200 IN6_IS_ADDR_UNSPECIFIED(&inp->in6p_laddr)) 201 #endif 202 )) 203 )) 204 continue; 205 206 if (first) { 207 if (!Lflag) { 208 printf("Active Internet connections"); 209 if (aflag) 210 printf(" (including servers)"); 211 } else 212 printf( 213 "Current listen queue sizes (qlen/incqlen/maxqlen)"); 214 putchar('\n'); 215 if (Aflag) 216 printf("%-8.8s ", "Socket"); 217 if (Lflag) 218 printf("%-14.14s %-22.22s\n", 219 "Listen", "Local Address"); 220 else 221 printf((Aflag && !Wflag) ? 222 "%-5.5s %-6.6s %-6.6s %-18.18s %-18.18s %s\n" : 223 "%-5.5s %-6.6s %-6.6s %-22.22s %-22.22s %s\n", 224 "Proto", "Recv-Q", "Send-Q", 225 "Local Address", "Foreign Address", 226 "(state)"); 227 first = 0; 228 } 229 if (Aflag) { 230 if (istcp) 231 printf("%8lx ", (u_long)inp->inp_ppcb); 232 else 233 printf("%8lx ", (u_long)so->so_pcb); 234 } 235 if (Lflag) 236 if (so->so_qlimit) { 237 char buf[15]; 238 239 snprintf(buf, 15, "%d/%d/%d", so->so_qlen, 240 so->so_incqlen, so->so_qlimit); 241 printf("%-14.14s ", buf); 242 } else 243 continue; 244 else { 245 const char *vchar; 246 247 #ifdef INET6 248 if ((inp->inp_vflag & INP_IPV6) != 0) 249 vchar = ((inp->inp_vflag & INP_IPV4) != 0) 250 ? "46" : "6 "; 251 else 252 #endif 253 vchar = ((inp->inp_vflag & INP_IPV4) != 0) 254 ? "4 " : " "; 255 256 printf("%-3.3s%-2.2s %6ld %6ld ", name, vchar, 257 so->so_rcv.sb_cc, 258 so->so_snd.sb_cc); 259 } 260 if (numeric_port) { 261 if (inp->inp_vflag & INP_IPV4) { 262 inetprint(&inp->inp_laddr, (int)inp->inp_lport, 263 name, 1); 264 if (!Lflag) 265 inetprint(&inp->inp_faddr, 266 (int)inp->inp_fport, name, 1); 267 } 268 #ifdef INET6 269 else if (inp->inp_vflag & INP_IPV6) { 270 inet6print(&inp->in6p_laddr, 271 (int)inp->inp_lport, name, 1); 272 if (!Lflag) 273 inet6print(&inp->in6p_faddr, 274 (int)inp->inp_fport, name, 1); 275 } /* else nothing printed now */ 276 #endif /* INET6 */ 277 } else if (inp->inp_flags & INP_ANONPORT) { 278 if (inp->inp_vflag & INP_IPV4) { 279 inetprint(&inp->inp_laddr, (int)inp->inp_lport, 280 name, 1); 281 if (!Lflag) 282 inetprint(&inp->inp_faddr, 283 (int)inp->inp_fport, name, 0); 284 } 285 #ifdef INET6 286 else if (inp->inp_vflag & INP_IPV6) { 287 inet6print(&inp->in6p_laddr, 288 (int)inp->inp_lport, name, 1); 289 if (!Lflag) 290 inet6print(&inp->in6p_faddr, 291 (int)inp->inp_fport, name, 0); 292 } /* else nothing printed now */ 293 #endif /* INET6 */ 294 } else { 295 if (inp->inp_vflag & INP_IPV4) { 296 inetprint(&inp->inp_laddr, (int)inp->inp_lport, 297 name, 0); 298 if (!Lflag) 299 inetprint(&inp->inp_faddr, 300 (int)inp->inp_fport, name, 301 inp->inp_lport != 302 inp->inp_fport); 303 } 304 #ifdef INET6 305 else if (inp->inp_vflag & INP_IPV6) { 306 inet6print(&inp->in6p_laddr, 307 (int)inp->inp_lport, name, 0); 308 if (!Lflag) 309 inet6print(&inp->in6p_faddr, 310 (int)inp->inp_fport, name, 311 inp->inp_lport != 312 inp->inp_fport); 313 } /* else nothing printed now */ 314 #endif /* INET6 */ 315 } 316 if (istcp && !Lflag) { 317 if (tp->t_state < 0 || tp->t_state >= TCP_NSTATES) 318 printf("%d", tp->t_state); 319 else { 320 printf("%s", tcpstates[tp->t_state]); 321 #if defined(TF_NEEDSYN) && defined(TF_NEEDFIN) 322 /* Show T/TCP `hidden state' */ 323 if (tp->t_flags & (TF_NEEDSYN|TF_NEEDFIN)) 324 putchar('*'); 325 #endif /* defined(TF_NEEDSYN) && defined(TF_NEEDFIN) */ 326 } 327 } 328 putchar('\n'); 329 } 330 if (xig != oxig && xig->xig_gen != oxig->xig_gen) { 331 if (oxig->xig_count > xig->xig_count) { 332 printf("Some %s sockets may have been deleted.\n", 333 name); 334 } else if (oxig->xig_count < xig->xig_count) { 335 printf("Some %s sockets may have been created.\n", 336 name); 337 } else { 338 printf("Some %s sockets may have been created or deleted", 339 name); 340 } 341 } 342 free(buf); 343 } 344 345 /* 346 * Dump TCP statistics structure. 347 */ 348 void 349 tcp_stats(u_long off __unused, char *name, int af __unused) 350 { 351 struct tcpstat tcpstat, zerostat; 352 size_t len = sizeof tcpstat; 353 354 if (zflag) 355 memset(&zerostat, 0, len); 356 if (sysctlbyname("net.inet.tcp.stats", &tcpstat, &len, 357 zflag ? &zerostat : NULL, zflag ? len : 0) < 0) { 358 warn("sysctl: net.inet.tcp.stats"); 359 return; 360 } 361 362 #ifdef INET6 363 if (tcp_done != 0) 364 return; 365 else 366 tcp_done = 1; 367 #endif 368 369 printf ("%s:\n", name); 370 371 #define p(f, m) if (tcpstat.f || sflag <= 1) \ 372 printf(m, tcpstat.f, plural(tcpstat.f)) 373 #define p1a(f, m) if (tcpstat.f || sflag <= 1) \ 374 printf(m, tcpstat.f) 375 #define p2(f1, f2, m) if (tcpstat.f1 || tcpstat.f2 || sflag <= 1) \ 376 printf(m, tcpstat.f1, plural(tcpstat.f1), tcpstat.f2, plural(tcpstat.f2)) 377 #define p2a(f1, f2, m) if (tcpstat.f1 || tcpstat.f2 || sflag <= 1) \ 378 printf(m, tcpstat.f1, plural(tcpstat.f1), tcpstat.f2) 379 #define p3(f, m) if (tcpstat.f || sflag <= 1) \ 380 printf(m, tcpstat.f, plurales(tcpstat.f)) 381 382 p(tcps_sndtotal, "\t%lu packet%s sent\n"); 383 p2(tcps_sndpack,tcps_sndbyte, 384 "\t\t%lu data packet%s (%lu byte%s)\n"); 385 p2(tcps_sndrexmitpack, tcps_sndrexmitbyte, 386 "\t\t%lu data packet%s (%lu byte%s) retransmitted\n"); 387 p(tcps_mturesent, "\t\t%lu resend%s initiated by MTU discovery\n"); 388 p2a(tcps_sndacks, tcps_delack, 389 "\t\t%lu ack-only packet%s (%lu delayed)\n"); 390 p(tcps_sndurg, "\t\t%lu URG only packet%s\n"); 391 p(tcps_sndprobe, "\t\t%lu window probe packet%s\n"); 392 p(tcps_sndwinup, "\t\t%lu window update packet%s\n"); 393 p(tcps_sndctrl, "\t\t%lu control packet%s\n"); 394 p(tcps_rcvtotal, "\t%lu packet%s received\n"); 395 p2(tcps_rcvackpack, tcps_rcvackbyte, "\t\t%lu ack%s (for %lu byte%s)\n"); 396 p(tcps_rcvdupack, "\t\t%lu duplicate ack%s\n"); 397 p(tcps_rcvacktoomuch, "\t\t%lu ack%s for unsent data\n"); 398 p2(tcps_rcvpack, tcps_rcvbyte, 399 "\t\t%lu packet%s (%lu byte%s) received in-sequence\n"); 400 p2(tcps_rcvduppack, tcps_rcvdupbyte, 401 "\t\t%lu completely duplicate packet%s (%lu byte%s)\n"); 402 p(tcps_pawsdrop, "\t\t%lu old duplicate packet%s\n"); 403 p2(tcps_rcvpartduppack, tcps_rcvpartdupbyte, 404 "\t\t%lu packet%s with some dup. data (%lu byte%s duped)\n"); 405 p2(tcps_rcvoopack, tcps_rcvoobyte, 406 "\t\t%lu out-of-order packet%s (%lu byte%s)\n"); 407 p2(tcps_rcvpackafterwin, tcps_rcvbyteafterwin, 408 "\t\t%lu packet%s (%lu byte%s) of data after window\n"); 409 p(tcps_rcvwinprobe, "\t\t%lu window probe%s\n"); 410 p(tcps_rcvwinupd, "\t\t%lu window update packet%s\n"); 411 p(tcps_rcvafterclose, "\t\t%lu packet%s received after close\n"); 412 p(tcps_rcvbadsum, "\t\t%lu discarded for bad checksum%s\n"); 413 p(tcps_rcvbadoff, "\t\t%lu discarded for bad header offset field%s\n"); 414 p1a(tcps_rcvshort, "\t\t%lu discarded because packet too short\n"); 415 p(tcps_connattempt, "\t%lu connection request%s\n"); 416 p(tcps_accepts, "\t%lu connection accept%s\n"); 417 p(tcps_badsyn, "\t%lu bad connection attempt%s\n"); 418 p(tcps_listendrop, "\t%lu listen queue overflow%s\n"); 419 p(tcps_connects, "\t%lu connection%s established (including accepts)\n"); 420 p2(tcps_closed, tcps_drops, 421 "\t%lu connection%s closed (including %lu drop%s)\n"); 422 p(tcps_cachedrtt, "\t\t%lu connection%s updated cached RTT on close\n"); 423 p(tcps_cachedrttvar, 424 "\t\t%lu connection%s updated cached RTT variance on close\n"); 425 p(tcps_cachedssthresh, 426 "\t\t%lu connection%s updated cached ssthresh on close\n"); 427 p(tcps_conndrops, "\t%lu embryonic connection%s dropped\n"); 428 p2(tcps_rttupdated, tcps_segstimed, 429 "\t%lu segment%s updated rtt (of %lu attempt%s)\n"); 430 p(tcps_rexmttimeo, "\t%lu retransmit timeout%s\n"); 431 p(tcps_timeoutdrop, "\t\t%lu connection%s dropped by rexmit timeout\n"); 432 p(tcps_persisttimeo, "\t%lu persist timeout%s\n"); 433 p(tcps_persistdrop, "\t\t%lu connection%s dropped by persist timeout\n"); 434 p(tcps_keeptimeo, "\t%lu keepalive timeout%s\n"); 435 p(tcps_keepprobe, "\t\t%lu keepalive probe%s sent\n"); 436 p(tcps_keepdrops, "\t\t%lu connection%s dropped by keepalive\n"); 437 p(tcps_predack, "\t%lu correct ACK header prediction%s\n"); 438 p(tcps_preddat, "\t%lu correct data packet header prediction%s\n"); 439 #undef p 440 #undef p1a 441 #undef p2 442 #undef p2a 443 #undef p3 444 } 445 446 /* 447 * Dump UDP statistics structure. 448 */ 449 void 450 udp_stats(u_long off __unused, char *name, int af __unused) 451 { 452 struct udpstat udpstat, zerostat; 453 size_t len = sizeof udpstat; 454 u_long delivered; 455 456 if (zflag) 457 memset(&zerostat, 0, len); 458 if (sysctlbyname("net.inet.udp.stats", &udpstat, &len, 459 zflag ? &zerostat : NULL, zflag ? len : 0) < 0) { 460 warn("sysctl: net.inet.udp.stats"); 461 return; 462 } 463 464 #ifdef INET6 465 if (udp_done != 0) 466 return; 467 else 468 udp_done = 1; 469 #endif 470 471 printf("%s:\n", name); 472 #define p(f, m) if (udpstat.f || sflag <= 1) \ 473 printf(m, udpstat.f, plural(udpstat.f)) 474 #define p1a(f, m) if (udpstat.f || sflag <= 1) \ 475 printf(m, udpstat.f) 476 p(udps_ipackets, "\t%lu datagram%s received\n"); 477 p1a(udps_hdrops, "\t%lu with incomplete header\n"); 478 p1a(udps_badlen, "\t%lu with bad data length field\n"); 479 p1a(udps_badsum, "\t%lu with bad checksum\n"); 480 p1a(udps_nosum, "\t%lu with no checksum\n"); 481 p1a(udps_noport, "\t%lu dropped due to no socket\n"); 482 p(udps_noportbcast, 483 "\t%lu broadcast/multicast datagram%s dropped due to no socket\n"); 484 p1a(udps_fullsock, "\t%lu dropped due to full socket buffers\n"); 485 p1a(udpps_pcbhashmiss, "\t%lu not for hashed pcb\n"); 486 delivered = udpstat.udps_ipackets - 487 udpstat.udps_hdrops - 488 udpstat.udps_badlen - 489 udpstat.udps_badsum - 490 udpstat.udps_noport - 491 udpstat.udps_noportbcast - 492 udpstat.udps_fullsock; 493 if (delivered || sflag <= 1) 494 printf("\t%lu delivered\n", delivered); 495 p(udps_opackets, "\t%lu datagram%s output\n"); 496 #undef p 497 #undef p1a 498 } 499 500 /* 501 * Dump IP statistics structure. 502 */ 503 void 504 ip_stats(u_long off __unused, char *name, int af __unused) 505 { 506 struct ipstat ipstat, zerostat; 507 size_t len = sizeof ipstat; 508 509 if (zflag) 510 memset(&zerostat, 0, len); 511 if (sysctlbyname("net.inet.ip.stats", &ipstat, &len, 512 zflag ? &zerostat : NULL, zflag ? len : 0) < 0) { 513 warn("sysctl: net.inet.ip.stats"); 514 return; 515 } 516 517 printf("%s:\n", name); 518 519 #define p(f, m) if (ipstat.f || sflag <= 1) \ 520 printf(m, ipstat.f, plural(ipstat.f)) 521 #define p1a(f, m) if (ipstat.f || sflag <= 1) \ 522 printf(m, ipstat.f) 523 524 p(ips_total, "\t%lu total packet%s received\n"); 525 p(ips_badsum, "\t%lu bad header checksum%s\n"); 526 p1a(ips_toosmall, "\t%lu with size smaller than minimum\n"); 527 p1a(ips_tooshort, "\t%lu with data size < data length\n"); 528 p1a(ips_toolong, "\t%lu with ip length > max ip packet size\n"); 529 p1a(ips_badhlen, "\t%lu with header length < data size\n"); 530 p1a(ips_badlen, "\t%lu with data length < header length\n"); 531 p1a(ips_badoptions, "\t%lu with bad options\n"); 532 p1a(ips_badvers, "\t%lu with incorrect version number\n"); 533 p(ips_fragments, "\t%lu fragment%s received\n"); 534 p(ips_fragdropped, "\t%lu fragment%s dropped (dup or out of space)\n"); 535 p(ips_fragtimeout, "\t%lu fragment%s dropped after timeout\n"); 536 p(ips_reassembled, "\t%lu packet%s reassembled ok\n"); 537 p(ips_delivered, "\t%lu packet%s for this host\n"); 538 p(ips_noproto, "\t%lu packet%s for unknown/unsupported protocol\n"); 539 p(ips_forward, "\t%lu packet%s forwarded"); 540 p(ips_fastforward, " (%lu packet%s fast forwarded)"); 541 if (ipstat.ips_forward || sflag <= 1) 542 putchar('\n'); 543 p(ips_cantforward, "\t%lu packet%s not forwardable\n"); 544 p(ips_notmember, 545 "\t%lu packet%s received for unknown multicast group\n"); 546 p(ips_redirectsent, "\t%lu redirect%s sent\n"); 547 p(ips_localout, "\t%lu packet%s sent from this host\n"); 548 p(ips_rawout, "\t%lu packet%s sent with fabricated ip header\n"); 549 p(ips_odropped, 550 "\t%lu output packet%s dropped due to no bufs, etc.\n"); 551 p(ips_noroute, "\t%lu output packet%s discarded due to no route\n"); 552 p(ips_fragmented, "\t%lu output datagram%s fragmented\n"); 553 p(ips_ofragments, "\t%lu fragment%s created\n"); 554 p(ips_cantfrag, "\t%lu datagram%s that can't be fragmented\n"); 555 p(ips_nogif, "\t%lu tunneling packet%s that can't find gif\n"); 556 p(ips_badaddr, "\t%lu datagram%s with bad address in header\n"); 557 #undef p 558 #undef p1a 559 } 560 561 static char *icmpnames[] = { 562 "echo reply", 563 "#1", 564 "#2", 565 "destination unreachable", 566 "source quench", 567 "routing redirect", 568 "#6", 569 "#7", 570 "echo", 571 "router advertisement", 572 "router solicitation", 573 "time exceeded", 574 "parameter problem", 575 "time stamp", 576 "time stamp reply", 577 "information request", 578 "information request reply", 579 "address mask request", 580 "address mask reply", 581 }; 582 583 /* 584 * Dump ICMP statistics. 585 */ 586 void 587 icmp_stats(u_long off __unused, char *name, int af __unused) 588 { 589 struct icmpstat icmpstat, zerostat; 590 int i, first; 591 int mib[4]; /* CTL_NET + PF_INET + IPPROTO_ICMP + req */ 592 size_t len; 593 594 mib[0] = CTL_NET; 595 mib[1] = PF_INET; 596 mib[2] = IPPROTO_ICMP; 597 mib[3] = ICMPCTL_STATS; 598 599 len = sizeof icmpstat; 600 if (zflag) 601 memset(&zerostat, 0, len); 602 if (sysctl(mib, 4, &icmpstat, &len, 603 zflag ? &zerostat : NULL, zflag ? len : 0) < 0) { 604 warn("sysctl: net.inet.icmp.stats"); 605 return; 606 } 607 608 printf("%s:\n", name); 609 610 #define p(f, m) if (icmpstat.f || sflag <= 1) \ 611 printf(m, icmpstat.f, plural(icmpstat.f)) 612 #define p1a(f, m) if (icmpstat.f || sflag <= 1) \ 613 printf(m, icmpstat.f) 614 615 p(icps_error, "\t%lu call%s to icmp_error\n"); 616 p(icps_oldicmp, 617 "\t%lu error%s not generated 'cuz old message was icmp\n"); 618 for (first = 1, i = 0; i < ICMP_MAXTYPE + 1; i++) 619 if (icmpstat.icps_outhist[i] != 0) { 620 if (first) { 621 printf("\tOutput histogram:\n"); 622 first = 0; 623 } 624 printf("\t\t%s: %lu\n", icmpnames[i], 625 icmpstat.icps_outhist[i]); 626 } 627 p(icps_badcode, "\t%lu message%s with bad code fields\n"); 628 p(icps_tooshort, "\t%lu message%s < minimum length\n"); 629 p(icps_checksum, "\t%lu bad checksum%s\n"); 630 p(icps_badlen, "\t%lu message%s with bad length\n"); 631 p1a(icps_bmcastecho, "\t%lu multicast echo requests ignored\n"); 632 p1a(icps_bmcasttstamp, "\t%lu multicast timestamp requests ignored\n"); 633 for (first = 1, i = 0; i < ICMP_MAXTYPE + 1; i++) 634 if (icmpstat.icps_inhist[i] != 0) { 635 if (first) { 636 printf("\tInput histogram:\n"); 637 first = 0; 638 } 639 printf("\t\t%s: %lu\n", icmpnames[i], 640 icmpstat.icps_inhist[i]); 641 } 642 p(icps_reflect, "\t%lu message response%s generated\n"); 643 #undef p 644 #undef p1a 645 mib[3] = ICMPCTL_MASKREPL; 646 len = sizeof i; 647 if (sysctl(mib, 4, &i, &len, (void *)0, 0) < 0) 648 return; 649 printf("\tICMP address mask responses are %sabled\n", 650 i ? "en" : "dis"); 651 } 652 653 /* 654 * Dump IGMP statistics structure. 655 */ 656 void 657 igmp_stats(u_long off __unused, char *name, int af __unused) 658 { 659 struct igmpstat igmpstat, zerostat; 660 size_t len = sizeof igmpstat; 661 662 if (zflag) 663 memset(&zerostat, 0, len); 664 if (sysctlbyname("net.inet.igmp.stats", &igmpstat, &len, 665 zflag ? &zerostat : NULL, zflag ? len : 0) < 0) { 666 warn("sysctl: net.inet.igmp.stats"); 667 return; 668 } 669 670 printf("%s:\n", name); 671 672 #define p(f, m) if (igmpstat.f || sflag <= 1) \ 673 printf(m, igmpstat.f, plural(igmpstat.f)) 674 #define py(f, m) if (igmpstat.f || sflag <= 1) \ 675 printf(m, igmpstat.f, igmpstat.f != 1 ? "ies" : "y") 676 p(igps_rcv_total, "\t%u message%s received\n"); 677 p(igps_rcv_tooshort, "\t%u message%s received with too few bytes\n"); 678 p(igps_rcv_badsum, "\t%u message%s received with bad checksum\n"); 679 py(igps_rcv_queries, "\t%u membership quer%s received\n"); 680 py(igps_rcv_badqueries, "\t%u membership quer%s received with invalid field(s)\n"); 681 p(igps_rcv_reports, "\t%u membership report%s received\n"); 682 p(igps_rcv_badreports, "\t%u membership report%s received with invalid field(s)\n"); 683 p(igps_rcv_ourreports, "\t%u membership report%s received for groups to which we belong\n"); 684 p(igps_snd_reports, "\t%u membership report%s sent\n"); 685 #undef p 686 #undef py 687 } 688 689 /* 690 * Pretty print an Internet address (net address + port). 691 */ 692 void 693 inetprint(struct in_addr *in, int port, char *proto, int numeric_port) 694 { 695 struct servent *sp = 0; 696 char line[80], *cp; 697 int width; 698 699 if (Wflag) 700 sprintf(line, "%s.", inetname(in)); 701 else 702 sprintf(line, "%.*s.", (Aflag && !numeric_port) ? 12 : 16, inetname(in)); 703 cp = index(line, '\0'); 704 if (!numeric_port && port) 705 sp = getservbyport((int)port, proto); 706 if (sp || port == 0) 707 sprintf(cp, "%.15s ", sp ? sp->s_name : "*"); 708 else 709 sprintf(cp, "%d ", ntohs((u_short)port)); 710 width = (Aflag && !Wflag) ? 18 : 22; 711 if (Wflag) 712 printf("%-*s ", width, line); 713 else 714 printf("%-*.*s ", width, width, line); 715 } 716 717 /* 718 * Construct an Internet address representation. 719 * If numeric_addr has been supplied, give 720 * numeric value, otherwise try for symbolic name. 721 */ 722 char * 723 inetname(struct in_addr *inp) 724 { 725 register char *cp; 726 static char line[MAXHOSTNAMELEN]; 727 struct hostent *hp; 728 struct netent *np; 729 730 cp = 0; 731 if (!numeric_addr && inp->s_addr != INADDR_ANY) { 732 int net = inet_netof(*inp); 733 int lna = inet_lnaof(*inp); 734 735 if (lna == INADDR_ANY) { 736 np = getnetbyaddr(net, AF_INET); 737 if (np) 738 cp = np->n_name; 739 } 740 if (cp == 0) { 741 hp = gethostbyaddr((char *)inp, sizeof (*inp), AF_INET); 742 if (hp) { 743 cp = hp->h_name; 744 trimdomain(cp, strlen(cp)); 745 } 746 } 747 } 748 if (inp->s_addr == INADDR_ANY) 749 strcpy(line, "*"); 750 else if (cp) { 751 strncpy(line, cp, sizeof(line) - 1); 752 line[sizeof(line) - 1] = '\0'; 753 } else { 754 inp->s_addr = ntohl(inp->s_addr); 755 #define C(x) ((u_int)((x) & 0xff)) 756 sprintf(line, "%u.%u.%u.%u", C(inp->s_addr >> 24), 757 C(inp->s_addr >> 16), C(inp->s_addr >> 8), C(inp->s_addr)); 758 } 759 return (line); 760 } 761