1
0
mirror of https://git.FreeBSD.org/src.git synced 2024-12-30 12:04:07 +00:00
freebsd/usr.bin/netstat/sctp.c
Dimitry Andric 93f8854c00 Remove superfluous cast in usr.bin/netstat/sctp.c.
Found by:	clang
Submitted by:	Norberto Lopes, nlopes dot ml at gmail dot com
Approved by:	rpaulo (mentor)
2010-10-08 20:40:05 +00:00

691 lines
20 KiB
C

/*-
* Copyright (c) 2001-2007, by Weongyo Jeong. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are met:
*
* a) Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
*
* b) Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the distribution.
*
* c) Neither the name of Cisco Systems, Inc. nor the names of its
* contributors may be used to endorse or promote products derived
* from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
* THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
* THE POSSIBILITY OF SUCH DAMAGE.
*/
#if 0
#ifndef lint
static char sccsid[] = "@(#)sctp.c 0.1 (Berkeley) 4/18/2007";
#endif /* not lint */
#endif
#include <sys/cdefs.h>
__FBSDID("$FreeBSD$");
#include <sys/param.h>
#include <sys/queue.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/socketvar.h>
#include <sys/sysctl.h>
#include <sys/protosw.h>
#include <netinet/in.h>
#include <netinet/sctp.h>
#include <netinet/sctp_constants.h>
#include <arpa/inet.h>
#include <err.h>
#include <errno.h>
#include <libutil.h>
#include <netdb.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include "netstat.h"
#ifdef SCTP
void inetprint(struct in_addr *, int, const char *, int);
static void sctp_statesprint(uint32_t state);
#define NETSTAT_SCTP_STATES_CLOSED 0x0
#define NETSTAT_SCTP_STATES_BOUND 0x1
#define NETSTAT_SCTP_STATES_LISTEN 0x2
#define NETSTAT_SCTP_STATES_COOKIE_WAIT 0x3
#define NETSTAT_SCTP_STATES_COOKIE_ECHOED 0x4
#define NETSTAT_SCTP_STATES_ESTABLISHED 0x5
#define NETSTAT_SCTP_STATES_SHUTDOWN_SENT 0x6
#define NETSTAT_SCTP_STATES_SHUTDOWN_RECEIVED 0x7
#define NETSTAT_SCTP_STATES_SHUTDOWN_ACK_SENT 0x8
#define NETSTAT_SCTP_STATES_SHUTDOWN_PENDING 0x9
char *sctpstates[] = {
"CLOSED",
"BOUND",
"LISTEN",
"COOKIE_WAIT",
"COOKIE_ECHOED",
"ESTABLISHED",
"SHUTDOWN_SENT",
"SHUTDOWN_RECEIVED",
"SHUTDOWN_ACK_SENT",
"SHUTDOWN_PENDING"
};
LIST_HEAD(xladdr_list, xladdr_entry) xladdr_head;
struct xladdr_entry {
struct xsctp_laddr *xladdr;
LIST_ENTRY(xladdr_entry) xladdr_entries;
};
LIST_HEAD(xraddr_list, xraddr_entry) xraddr_head;
struct xraddr_entry {
struct xsctp_raddr *xraddr;
LIST_ENTRY(xraddr_entry) xraddr_entries;
};
static int
sctp_skip_xinpcb_ifneed(char *buf, const size_t buflen, size_t *offset)
{
int exist_tcb = 0;
struct xsctp_tcb *xstcb;
struct xsctp_raddr *xraddr;
struct xsctp_laddr *xladdr;
while (*offset < buflen) {
xladdr = (struct xsctp_laddr *)(buf + *offset);
*offset += sizeof(struct xsctp_laddr);
if (xladdr->last == 1)
break;
}
while (*offset < buflen) {
xstcb = (struct xsctp_tcb *)(buf + *offset);
*offset += sizeof(struct xsctp_tcb);
if (xstcb->last == 1)
break;
exist_tcb = 1;
while (*offset < buflen) {
xladdr = (struct xsctp_laddr *)(buf + *offset);
*offset += sizeof(struct xsctp_laddr);
if (xladdr->last == 1)
break;
}
while (*offset < buflen) {
xraddr = (struct xsctp_raddr *)(buf + *offset);
*offset += sizeof(struct xsctp_raddr);
if (xraddr->last == 1)
break;
}
}
/*
* If Lflag is set, we don't care about the return value.
*/
if (Lflag)
return 0;
return exist_tcb;
}
static void
sctp_process_tcb(struct xsctp_tcb *xstcb, const char *name,
char *buf, const size_t buflen, size_t *offset, int *indent)
{
int i, xl_total = 0, xr_total = 0, x_max;
struct sockaddr *sa;
struct xsctp_raddr *xraddr;
struct xsctp_laddr *xladdr;
struct xladdr_entry *prev_xl = NULL, *xl = NULL, *xl_tmp;
struct xraddr_entry *prev_xr = NULL, *xr = NULL, *xr_tmp;
#ifdef INET6
struct sockaddr_in6 *in6;
#endif
LIST_INIT(&xladdr_head);
LIST_INIT(&xraddr_head);
/*
* Make `struct xladdr_list' list and `struct xraddr_list' list
* to handle the address flexibly.
*/
while (*offset < buflen) {
xladdr = (struct xsctp_laddr *)(buf + *offset);
*offset += sizeof(struct xsctp_laddr);
if (xladdr->last == 1)
break;
prev_xl = xl;
xl = malloc(sizeof(struct xladdr_entry));
if (xl == NULL) {
warnx("malloc %lu bytes",
(u_long)sizeof(struct xladdr_entry));
goto out;
}
xl->xladdr = xladdr;
if (prev_xl == NULL)
LIST_INSERT_HEAD(&xladdr_head, xl, xladdr_entries);
else
LIST_INSERT_AFTER(prev_xl, xl, xladdr_entries);
xl_total++;
}
while (*offset < buflen) {
xraddr = (struct xsctp_raddr *)(buf + *offset);
*offset += sizeof(struct xsctp_raddr);
if (xraddr->last == 1)
break;
prev_xr = xr;
xr = malloc(sizeof(struct xraddr_entry));
if (xr == NULL) {
warnx("malloc %lu bytes",
(u_long)sizeof(struct xraddr_entry));
goto out;
}
xr->xraddr = xraddr;
if (prev_xr == NULL)
LIST_INSERT_HEAD(&xraddr_head, xr, xraddr_entries);
else
LIST_INSERT_AFTER(prev_xr, xr, xraddr_entries);
xr_total++;
}
/*
* Let's print the address infos.
*/
xl = LIST_FIRST(&xladdr_head);
xr = LIST_FIRST(&xraddr_head);
x_max = (xl_total > xr_total) ? xl_total : xr_total;
for (i = 0; i < x_max; i++) {
if (((*indent == 0) && i > 0) || *indent > 0)
printf("%-11s ", " ");
if (xl != NULL) {
sa = &(xl->xladdr->address.sa);
if ((sa->sa_family) == AF_INET)
inetprint(&((struct sockaddr_in *)sa)->sin_addr,
htons(xstcb->local_port),
name, numeric_port);
#ifdef INET6
else {
in6 = (struct sockaddr_in6 *)sa;
inet6print(&in6->sin6_addr,
htons(xstcb->local_port),
name, numeric_port);
}
#endif
}
if (xr != NULL && !Lflag) {
sa = &(xr->xraddr->address.sa);
if ((sa->sa_family) == AF_INET)
inetprint(&((struct sockaddr_in *)sa)->sin_addr,
htons(xstcb->remote_port),
name, numeric_port);
#ifdef INET6
else {
in6 = (struct sockaddr_in6 *)sa;
inet6print(&in6->sin6_addr,
htons(xstcb->remote_port),
name, numeric_port);
}
#endif
}
if (xl != NULL)
xl = LIST_NEXT(xl, xladdr_entries);
if (xr != NULL)
xr = LIST_NEXT(xr, xraddr_entries);
if (i == 0 && !Lflag)
sctp_statesprint(xstcb->state);
if (i < x_max)
putchar('\n');
}
out:
/*
* Free the list which be used to handle the address.
*/
xl = LIST_FIRST(&xladdr_head);
while (xl != NULL) {
xl_tmp = LIST_NEXT(xl, xladdr_entries);
free(xl);
xl = xl_tmp;
}
xr = LIST_FIRST(&xraddr_head);
while (xr != NULL) {
xr_tmp = LIST_NEXT(xr, xraddr_entries);
free(xr);
xr = xr_tmp;
}
}
#ifdef SCTP_DEBUG
uint32_t sctp_pdup[64];
int sctp_pcnt = 0;
#endif
static void
sctp_process_inpcb(struct xsctp_inpcb *xinpcb, const char *name,
char *buf, const size_t buflen, size_t *offset)
{
int offset_backup, indent = 0, xladdr_total = 0, is_listening = 0;
static int first = 1;
char *tname;
struct xsctp_tcb *xstcb;
struct xsctp_laddr *xladdr;
struct sockaddr *sa;
#ifdef INET6
struct sockaddr_in6 *in6;
#endif
if ((xinpcb->flags & SCTP_PCB_FLAGS_TCPTYPE) ==
SCTP_PCB_FLAGS_TCPTYPE && xinpcb->maxqlen > 0)
is_listening = 1;
if (!Lflag && !is_listening &&
!(xinpcb->flags & SCTP_PCB_FLAGS_CONNECTED)) {
#ifdef SCTP_DEBUG
int i, found = 0;
for (i = 0; i < sctp_pcnt; i++) {
if (sctp_pdup[i] == xinpcb->flags) {
found = 1;
break;
}
}
if (!found) {
sctp_pdup[sctp_pcnt++] = xinpcb->flags;
if (sctp_pcnt >= 64)
sctp_pcnt = 0;
printf("[0x%08x]", xinpcb->flags);
}
#endif
offset_backup = *offset;
if (!sctp_skip_xinpcb_ifneed(buf, buflen, offset))
return;
*offset = offset_backup;
}
if (first) {
if (!Lflag) {
printf("Active SCTP associations");
if (aflag)
printf(" (including servers)");
} else
printf("Current listen queue sizes (qlen/maxqlen)");
putchar('\n');
if (Aflag)
printf("%-8.8s ", "Socket");
if (Lflag)
printf("%-5.5s %-5.5s %-8.8s %-22.22s\n",
"Proto", "Type", "Listen", "Local Address");
else
printf((Aflag && !Wflag) ?
"%-5.5s %-5.5s %-18.18s %-18.18s %s\n" :
"%-5.5s %-5.5s %-22.22s %-22.22s %s\n",
"Proto", "Type",
"Local Address", "Foreign Address",
"(state)");
first = 0;
}
if (Lflag && xinpcb->maxqlen == 0) {
sctp_skip_xinpcb_ifneed(buf, buflen, offset);
return;
}
if (Aflag)
printf("%8lx ", (u_long)xinpcb);
printf("%-5.5s ", name);
if (xinpcb->flags & SCTP_PCB_FLAGS_TCPTYPE)
tname = "1to1";
else if (xinpcb->flags & SCTP_PCB_FLAGS_UDPTYPE)
tname = "1toN";
else
return;
printf("%-5.5s ", tname);
if (Lflag) {
char buf1[9];
snprintf(buf1, 9, "%hu/%hu", xinpcb->qlen, xinpcb->maxqlen);
printf("%-8.8s ", buf1);
}
/*
* process the local address. This routine are used for Lflag.
*/
while (*offset < buflen) {
xladdr = (struct xsctp_laddr *)(buf + *offset);
*offset += sizeof(struct xsctp_laddr);
if (xladdr->last == 1)
break;
if (!Lflag && !is_listening)
continue;
if (xladdr_total != 0)
putchar('\n');
if (xladdr_total > 0)
printf((Lflag) ?
"%-20.20s " : "%-11.11s ", " ");
sa = &(xladdr->address.sa);
if ((sa->sa_family) == AF_INET)
inetprint(&((struct sockaddr_in *)sa)->sin_addr,
htons(xinpcb->local_port), name, numeric_port);
#ifdef INET6
else {
in6 = (struct sockaddr_in6 *)sa;
inet6print(&in6->sin6_addr,
htons(xinpcb->local_port), name, numeric_port);
}
#endif
if (!Lflag && xladdr_total == 0 && is_listening == 1)
printf("%-22.22s LISTEN", " ");
xladdr_total++;
}
xstcb = (struct xsctp_tcb *)(buf + *offset);
*offset += sizeof(struct xsctp_tcb);
while (xstcb->last == 0 && *offset < buflen) {
sctp_process_tcb(xstcb, name, buf, buflen, offset, &indent);
indent++;
xstcb = (struct xsctp_tcb *)(buf + *offset);
*offset += sizeof(struct xsctp_tcb);
}
putchar('\n');
}
/*
* Print a summary of SCTP connections related to an Internet
* protocol.
*/
void
sctp_protopr(u_long off __unused,
const char *name, int af1, int proto)
{
char *buf;
const char *mibvar = "net.inet.sctp.assoclist";
size_t offset = 0;
size_t len = 0;
struct xsctp_inpcb *xinpcb;
if (proto != IPPROTO_SCTP)
return;
if (sysctlbyname(mibvar, 0, &len, 0, 0) < 0) {
if (errno != ENOENT)
warn("sysctl: %s", mibvar);
return;
}
if ((buf = malloc(len)) == 0) {
warnx("malloc %lu bytes", (u_long)len);
return;
}
if (sysctlbyname(mibvar, buf, &len, 0, 0) < 0) {
warn("sysctl: %s", mibvar);
free(buf);
return;
}
xinpcb = (struct xsctp_inpcb *)(buf + offset);
offset += sizeof(struct xsctp_inpcb);
while (xinpcb->last == 0 && offset < len) {
sctp_process_inpcb(xinpcb, name, buf, (const size_t)len,
&offset);
xinpcb = (struct xsctp_inpcb *)(buf + offset);
offset += sizeof(struct xsctp_inpcb);
}
free(buf);
}
static void
sctp_statesprint(uint32_t state)
{
int idx;
switch (state) {
case SCTP_STATE_COOKIE_WAIT:
idx = NETSTAT_SCTP_STATES_COOKIE_WAIT;
break;
case SCTP_STATE_COOKIE_ECHOED:
idx = NETSTAT_SCTP_STATES_COOKIE_ECHOED;
break;
case SCTP_STATE_OPEN:
idx = NETSTAT_SCTP_STATES_ESTABLISHED;
break;
case SCTP_STATE_SHUTDOWN_SENT:
idx = NETSTAT_SCTP_STATES_SHUTDOWN_SENT;
break;
case SCTP_STATE_SHUTDOWN_RECEIVED:
idx = NETSTAT_SCTP_STATES_SHUTDOWN_RECEIVED;
break;
case SCTP_STATE_SHUTDOWN_ACK_SENT:
idx = NETSTAT_SCTP_STATES_SHUTDOWN_ACK_SENT;
break;
case SCTP_STATE_SHUTDOWN_PENDING:
idx = NETSTAT_SCTP_STATES_SHUTDOWN_PENDING;
break;
default:
printf("UNKNOWN 0x%08x", state);
return;
}
printf("%s", sctpstates[idx]);
}
/*
* Dump SCTP statistics structure.
*/
void
sctp_stats(u_long off, const char *name, int af1 __unused, int proto __unused)
{
struct sctpstat sctpstat, zerostat;
size_t len = sizeof(sctpstat);
if (live) {
if (zflag)
memset(&zerostat, 0, len);
if (sysctlbyname("net.inet.sctp.stats", &sctpstat, &len,
zflag ? &zerostat : NULL, zflag ? len : 0) < 0) {
warn("sysctl: net.inet.sctp.stats");
return;
}
} else
kread(off, &sctpstat, len);
printf ("%s:\n", name);
#define p(f, m) if (sctpstat.f || sflag <= 1) \
printf(m, (uintmax_t)sctpstat.f, plural(sctpstat.f))
#define p1a(f, m) if (sctpstat.f || sflag <= 1) \
printf(m, (uintmax_t)sctpstat.f)
/*
* input statistics
*/
p(sctps_recvpackets, "\t%ju input packet%s\n");
p(sctps_recvdatagrams, "\t\t%ju datagram%s\n");
p(sctps_recvpktwithdata, "\t\t%ju packet%s that had data\n");
p(sctps_recvsacks, "\t\t%ju input SACK chunk%s\n");
p(sctps_recvdata, "\t\t%ju input DATA chunk%s\n");
p(sctps_recvdupdata, "\t\t%ju duplicate DATA chunk%s\n");
p(sctps_recvheartbeat, "\t\t%ju input HB chunk%s\n");
p(sctps_recvheartbeatack, "\t\t%ju HB-ACK chunk%s\n");
p(sctps_recvecne, "\t\t%ju input ECNE chunk%s\n");
p(sctps_recvauth, "\t\t%ju input AUTH chunk%s\n");
p(sctps_recvauthmissing, "\t\t%ju chunk%s missing AUTH\n");
p(sctps_recvivalhmacid, "\t\t%ju invalid HMAC id%s received\n");
p(sctps_recvivalkeyid, "\t\t%ju invalid secret id%s received\n");
p1a(sctps_recvauthfailed, "\t\t%ju auth failed\n");
p1a(sctps_recvexpress, "\t\t%ju fast path receives all one chunk\n");
p1a(sctps_recvexpressm, "\t\t%ju fast path multi-part data\n");
/*
* output statistics
*/
p(sctps_sendpackets, "\t%ju output packet%s\n");
p(sctps_sendsacks, "\t\t%ju output SACK%s\n");
p(sctps_senddata, "\t\t%ju output DATA chunk%s\n");
p(sctps_sendretransdata, "\t\t%ju retransmitted DATA chunk%s\n");
p(sctps_sendfastretrans, "\t\t%ju fast retransmitted DATA chunk%s\n");
p(sctps_sendmultfastretrans, "\t\t%ju FR'%s that happened more "
"than once to same chunk\n");
p(sctps_sendheartbeat, "\t\t%ju intput HB chunk%s\n");
p(sctps_sendecne, "\t\t%ju output ECNE chunk%s\n");
p(sctps_sendauth, "\t\t%ju output AUTH chunk%s\n");
p1a(sctps_senderrors, "\t\t%ju ip_output error counter\n");
/*
* PCKDROPREP statistics
*/
printf("\tPacket drop statistics:\n");
p1a(sctps_pdrpfmbox, "\t\t%ju from middle box\n");
p1a(sctps_pdrpfehos, "\t\t%ju from end host\n");
p1a(sctps_pdrpmbda, "\t\t%ju with data\n");
p1a(sctps_pdrpmbct, "\t\t%ju non-data, non-endhost\n");
p1a(sctps_pdrpbwrpt, "\t\t%ju non-endhost, bandwidth rep only\n");
p1a(sctps_pdrpcrupt, "\t\t%ju not enough for chunk header\n");
p1a(sctps_pdrpnedat, "\t\t%ju not enough data to confirm\n");
p1a(sctps_pdrppdbrk, "\t\t%ju where process_chunk_drop said break\n");
p1a(sctps_pdrptsnnf, "\t\t%ju failed to find TSN\n");
p1a(sctps_pdrpdnfnd, "\t\t%ju attempt reverse TSN lookup\n");
p1a(sctps_pdrpdiwnp, "\t\t%ju e-host confirms zero-rwnd\n");
p1a(sctps_pdrpdizrw, "\t\t%ju midbox confirms no space\n");
p1a(sctps_pdrpbadd, "\t\t%ju data did not match TSN\n");
p(sctps_pdrpmark, "\t\t%ju TSN'%s marked for Fast Retran\n");
/*
* Timeouts
*/
printf("\tTimeouts:\n");
p(sctps_timoiterator, "\t\t%ju iterator timer%s fired\n");
p(sctps_timodata, "\t\t%ju T3 data time out%s\n");
p(sctps_timowindowprobe, "\t\t%ju window probe (T3) timer%s fired\n");
p(sctps_timoinit, "\t\t%ju INIT timer%s fired\n");
p(sctps_timosack, "\t\t%ju sack timer%s fired\n");
p(sctps_timoshutdown, "\t\t%ju shutdown timer%s fired\n");
p(sctps_timoheartbeat, "\t\t%ju heartbeat timer%s fired\n");
p1a(sctps_timocookie, "\t\t%ju a cookie timeout fired\n");
p1a(sctps_timosecret, "\t\t%ju an endpoint changed its cookie"
"secret\n");
p(sctps_timopathmtu, "\t\t%ju PMTU timer%s fired\n");
p(sctps_timoshutdownack, "\t\t%ju shutdown ack timer%s fired\n");
p(sctps_timoshutdownguard, "\t\t%ju shutdown guard timer%s fired\n");
p(sctps_timostrmrst, "\t\t%ju stream reset timer%s fired\n");
p(sctps_timoearlyfr, "\t\t%ju early FR timer%s fired\n");
p1a(sctps_timoasconf, "\t\t%ju an asconf timer fired\n");
p1a(sctps_timoautoclose, "\t\t%ju auto close timer fired\n");
p(sctps_timoassockill, "\t\t%ju asoc free timer%s expired\n");
p(sctps_timoinpkill, "\t\t%ju inp free timer%s expired\n");
#if 0
/*
* Early fast retransmission counters
*/
p(sctps_earlyfrstart, "\t%ju TODO:sctps_earlyfrstart\n");
p(sctps_earlyfrstop, "\t%ju TODO:sctps_earlyfrstop\n");
p(sctps_earlyfrmrkretrans, "\t%ju TODO:sctps_earlyfrmrkretrans\n");
p(sctps_earlyfrstpout, "\t%ju TODO:sctps_earlyfrstpout\n");
p(sctps_earlyfrstpidsck1, "\t%ju TODO:sctps_earlyfrstpidsck1\n");
p(sctps_earlyfrstpidsck2, "\t%ju TODO:sctps_earlyfrstpidsck2\n");
p(sctps_earlyfrstpidsck3, "\t%ju TODO:sctps_earlyfrstpidsck3\n");
p(sctps_earlyfrstpidsck4, "\t%ju TODO:sctps_earlyfrstpidsck4\n");
p(sctps_earlyfrstrid, "\t%ju TODO:sctps_earlyfrstrid\n");
p(sctps_earlyfrstrout, "\t%ju TODO:sctps_earlyfrstrout\n");
p(sctps_earlyfrstrtmr, "\t%ju TODO:sctps_earlyfrstrtmr\n");
#endif
/*
* Others
*/
p1a(sctps_hdrops, "\t%ju packet shorter than header\n");
p1a(sctps_badsum, "\t%ju checksum error\n");
p1a(sctps_noport, "\t%ju no endpoint for port\n");
p1a(sctps_badvtag, "\t%ju bad v-tag\n");
p1a(sctps_badsid, "\t%ju bad SID\n");
p1a(sctps_nomem, "\t%ju no memory\n");
p1a(sctps_fastretransinrtt, "\t%ju number of multiple FR in a RTT "
"window\n");
#if 0
p(sctps_markedretrans, "\t%ju TODO:sctps_markedretrans\n");
#endif
p1a(sctps_naglesent, "\t%ju RFC813 allowed sending\n");
p1a(sctps_naglequeued, "\t%ju RFC813 does not allow sending\n");
p1a(sctps_maxburstqueued, "\t%ju times max burst prohibited sending\n");
p1a(sctps_ifnomemqueued, "\t%ju look ahead tells us no memory in "
"interface\n");
p(sctps_windowprobed, "\t%ju number%s of window probes sent\n");
p(sctps_lowlevelerr, "\t%ju time%s an output error to clamp "
"down on next user send\n");
p(sctps_lowlevelerrusr, "\t%ju time%s sctp_senderrors were "
"caused from a user\n");
p(sctps_datadropchklmt, "\t%ju number of in data drop%s due to "
"chunk limit reached\n");
p(sctps_datadroprwnd, "\t%ju number of in data drop%s due to rwnd "
"limit reached\n");
p(sctps_ecnereducedcwnd, "\t%ju time%s a ECN reduced "
"the cwnd\n");
p1a(sctps_vtagexpress, "\t%ju used express lookup via vtag\n");
p1a(sctps_vtagbogus, "\t%ju collision in express lookup\n");
p(sctps_primary_randry, "\t%ju time%s the sender ran dry "
"of user data on primary\n");
p1a(sctps_cmt_randry, "\t%ju same for above\n");
p(sctps_slowpath_sack, "\t%ju sack%s the slow way\n");
p(sctps_wu_sacks_sent, "\t%ju window update only sack%s sent\n");
p(sctps_sends_with_flags, "\t%ju send%s with sinfo_flags !=0\n");
p(sctps_sends_with_unord, "\t%ju unordered send%s\n");
p(sctps_sends_with_eof, "\t%ju send%s with EOF flag set\n");
p(sctps_sends_with_abort, "\t%ju send%s with ABORT flag set\n");
p(sctps_protocol_drain_calls, "\t%ju time%s protocol drain called\n");
p(sctps_protocol_drains_done, "\t%ju time%s we did a protocol "
"drain\n");
p(sctps_read_peeks, "\t%ju time%s recv was called with peek\n");
p(sctps_cached_chk, "\t%ju cached chunk%s used\n");
p1a(sctps_cached_strmoq, "\t%ju cached stream oq's used\n");
p(sctps_left_abandon, "\t%ju unread message%s abandonded by close\n");
p1a(sctps_send_burst_avoid, "\t%ju send burst avoidance, already "
"max burst inflight to net\n");
p1a(sctps_send_cwnd_avoid, "\t%ju send cwnd full avoidance, already "
"max burst inflight to net\n");
p(sctps_fwdtsn_map_over, "\t%ju number of map array over-run%s via "
"fwd-tsn's\n");
#undef p
#undef p1a
}
#endif /* SCTP */