summaryrefslogtreecommitdiffstats
path: root/src/VBox/Devices/Network/slirp/debug.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/VBox/Devices/Network/slirp/debug.c')
-rw-r--r--src/VBox/Devices/Network/slirp/debug.c679
1 files changed, 679 insertions, 0 deletions
diff --git a/src/VBox/Devices/Network/slirp/debug.c b/src/VBox/Devices/Network/slirp/debug.c
new file mode 100644
index 00000000..81426436
--- /dev/null
+++ b/src/VBox/Devices/Network/slirp/debug.c
@@ -0,0 +1,679 @@
+/* $Id: debug.c $ */
+/** @file
+ * NAT - debug helpers.
+ */
+
+/*
+ * Copyright (C) 2006-2023 Oracle and/or its affiliates.
+ *
+ * This file is part of VirtualBox base platform packages, as
+ * available from https://www.virtualbox.org.
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation, in version 3 of the
+ * License.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, see <https://www.gnu.org/licenses>.
+ *
+ * SPDX-License-Identifier: GPL-3.0-only
+ */
+
+
+/*
+ * This code is based on:
+ *
+ * Copyright (c) 1995 Danny Gasparovski.
+ * Portions copyright (c) 2000 Kelly Price.
+ *
+ * Please read the file COPYRIGHT for the
+ * terms and conditions of the copyright.
+ */
+
+#include <slirp.h>
+#include <iprt/string.h>
+#include <iprt/stream.h>
+#include <iprt/critsect.h>
+#include "zone.h"
+
+#ifdef DEBUG
+void dump_packet(void *, int);
+#endif
+
+#ifndef STRINGIFY
+# define STRINGIFY(x) #x
+#endif
+
+static char *g_apszTcpStates[TCP_NSTATES] =
+{
+ STRINGIFY(TCPS_CLOSED),
+ STRINGIFY(TCPS_LISTEN),
+ STRINGIFY(TCPS_SYN_SENT),
+ STRINGIFY(TCPS_SYN_RECEIVED),
+ STRINGIFY(TCPS_ESTABLISHED),
+ STRINGIFY(TCPS_CLOSE_WAIT),
+ STRINGIFY(TCPS_FIN_WAIT_1),
+ STRINGIFY(TCPS_CLOSING),
+ STRINGIFY(TCPS_LAST_ACK),
+ STRINGIFY(TCPS_FIN_WAIT_2),
+ STRINGIFY(TCPS_TIME_WAIT)
+};
+
+typedef struct DEBUGSTRSOCKETSTATE
+{
+ uint32_t u32SocketState;
+ const char *pcszSocketStateName;
+} DEBUGSTRSOCKETSTATE;
+
+#define DEBUGSTRSOCKETSTATE_HELPER(x) {(x), #x}
+
+static DEBUGSTRSOCKETSTATE g_apszSocketStates[8] =
+{
+ DEBUGSTRSOCKETSTATE_HELPER(SS_NOFDREF),
+ DEBUGSTRSOCKETSTATE_HELPER(SS_ISFCONNECTING),
+ DEBUGSTRSOCKETSTATE_HELPER(SS_ISFCONNECTED),
+ DEBUGSTRSOCKETSTATE_HELPER(SS_FCANTRCVMORE),
+ DEBUGSTRSOCKETSTATE_HELPER(SS_FCANTSENDMORE),
+ DEBUGSTRSOCKETSTATE_HELPER(SS_FWDRAIN),
+ DEBUGSTRSOCKETSTATE_HELPER(SS_FACCEPTCONN),
+ DEBUGSTRSOCKETSTATE_HELPER(SS_FACCEPTONCE),
+};
+
+static DEBUGSTRSOCKETSTATE g_aTcpFlags[] =
+{
+ DEBUGSTRSOCKETSTATE_HELPER(TH_FIN),
+ DEBUGSTRSOCKETSTATE_HELPER(TH_SYN),
+ DEBUGSTRSOCKETSTATE_HELPER(TH_RST),
+ DEBUGSTRSOCKETSTATE_HELPER(TH_PUSH),
+ DEBUGSTRSOCKETSTATE_HELPER(TH_ACK),
+ DEBUGSTRSOCKETSTATE_HELPER(TH_URG),
+};
+
+/*
+ * Dump a packet in the same format as tcpdump -x
+ */
+#ifdef DEBUG
+void
+dump_packet(void *dat, int n)
+{
+ Log(("nat: PACKET DUMPED:\n%.*Rhxd\n", n, dat));
+}
+#endif
+
+#ifdef LOG_ENABLED
+static void
+lprint(const char *pszFormat, ...)
+{
+ va_list args;
+ va_start(args, pszFormat);
+ RTLogPrintfV(pszFormat, args);
+ va_end(args);
+}
+
+void
+ipstats(PNATState pData)
+{
+ lprint("\n");
+
+ lprint("IP stats:\n");
+ lprint(" %6d total packets received (%d were unaligned)\n",
+ ipstat.ips_total, ipstat.ips_unaligned);
+ lprint(" %6d with incorrect version\n", ipstat.ips_badvers);
+ lprint(" %6d with bad header checksum\n", ipstat.ips_badsum);
+ lprint(" %6d with length too short (len < sizeof(iphdr))\n", ipstat.ips_tooshort);
+ lprint(" %6d with length too small (len < ip->len)\n", ipstat.ips_toosmall);
+ lprint(" %6d with bad header length\n", ipstat.ips_badhlen);
+ lprint(" %6d with bad packet length\n", ipstat.ips_badlen);
+ lprint(" %6d fragments received\n", ipstat.ips_fragments);
+ lprint(" %6d fragments dropped\n", ipstat.ips_fragdropped);
+ lprint(" %6d fragments timed out\n", ipstat.ips_fragtimeout);
+ lprint(" %6d packets reassembled ok\n", ipstat.ips_reassembled);
+ lprint(" %6d outgoing packets fragmented\n", ipstat.ips_fragmented);
+ lprint(" %6d total outgoing fragments\n", ipstat.ips_ofragments);
+ lprint(" %6d with bad protocol field\n", ipstat.ips_noproto);
+ lprint(" %6d total packets delivered\n", ipstat.ips_delivered);
+}
+
+void
+tcpstats(PNATState pData)
+{
+ lprint("\n");
+
+ lprint("TCP stats:\n");
+
+ lprint(" %6d packets sent\n", tcpstat.tcps_sndtotal);
+ lprint(" %6d data packets (%d bytes)\n",
+ tcpstat.tcps_sndpack, tcpstat.tcps_sndbyte);
+ lprint(" %6d data packets retransmitted (%d bytes)\n",
+ tcpstat.tcps_sndrexmitpack, tcpstat.tcps_sndrexmitbyte);
+ lprint(" %6d ack-only packets (%d delayed)\n",
+ tcpstat.tcps_sndacks, tcpstat.tcps_delack);
+ lprint(" %6d URG only packets\n", tcpstat.tcps_sndurg);
+ lprint(" %6d window probe packets\n", tcpstat.tcps_sndprobe);
+ lprint(" %6d window update packets\n", tcpstat.tcps_sndwinup);
+ lprint(" %6d control (SYN/FIN/RST) packets\n", tcpstat.tcps_sndctrl);
+ lprint(" %6d times tcp_output did nothing\n", tcpstat.tcps_didnuttin);
+
+ lprint(" %6d packets received\n", tcpstat.tcps_rcvtotal);
+ lprint(" %6d acks (for %d bytes)\n",
+ tcpstat.tcps_rcvackpack, tcpstat.tcps_rcvackbyte);
+ lprint(" %6d duplicate acks\n", tcpstat.tcps_rcvdupack);
+ lprint(" %6d acks for unsent data\n", tcpstat.tcps_rcvacktoomuch);
+ lprint(" %6d packets received in sequence (%d bytes)\n",
+ tcpstat.tcps_rcvpack, tcpstat.tcps_rcvbyte);
+ lprint(" %6d completely duplicate packets (%d bytes)\n",
+ tcpstat.tcps_rcvduppack, tcpstat.tcps_rcvdupbyte);
+
+ lprint(" %6d packets with some duplicate data (%d bytes duped)\n",
+ tcpstat.tcps_rcvpartduppack, tcpstat.tcps_rcvpartdupbyte);
+ lprint(" %6d out-of-order packets (%d bytes)\n",
+ tcpstat.tcps_rcvoopack, tcpstat.tcps_rcvoobyte);
+ lprint(" %6d packets of data after window (%d bytes)\n",
+ tcpstat.tcps_rcvpackafterwin, tcpstat.tcps_rcvbyteafterwin);
+ lprint(" %6d window probes\n", tcpstat.tcps_rcvwinprobe);
+ lprint(" %6d window update packets\n", tcpstat.tcps_rcvwinupd);
+ lprint(" %6d packets received after close\n", tcpstat.tcps_rcvafterclose);
+ lprint(" %6d discarded for bad checksums\n", tcpstat.tcps_rcvbadsum);
+ lprint(" %6d discarded for bad header offset fields\n",
+ tcpstat.tcps_rcvbadoff);
+
+ lprint(" %6d connection requests\n", tcpstat.tcps_connattempt);
+ lprint(" %6d connection accepts\n", tcpstat.tcps_accepts);
+ lprint(" %6d connections established (including accepts)\n", tcpstat.tcps_connects);
+ lprint(" %6d connections closed (including %d drop)\n",
+ tcpstat.tcps_closed, tcpstat.tcps_drops);
+ lprint(" %6d embryonic connections dropped\n", tcpstat.tcps_conndrops);
+ lprint(" %6d segments we tried to get rtt (%d succeeded)\n",
+ tcpstat.tcps_segstimed, tcpstat.tcps_rttupdated);
+ lprint(" %6d retransmit timeouts\n", tcpstat.tcps_rexmttimeo);
+ lprint(" %6d connections dropped by rxmt timeout\n",
+ tcpstat.tcps_timeoutdrop);
+ lprint(" %6d persist timeouts\n", tcpstat.tcps_persisttimeo);
+ lprint(" %6d keepalive timeouts\n", tcpstat.tcps_keeptimeo);
+ lprint(" %6d keepalive probes sent\n", tcpstat.tcps_keepprobe);
+ lprint(" %6d connections dropped by keepalive\n", tcpstat.tcps_keepdrops);
+ lprint(" %6d correct ACK header predictions\n", tcpstat.tcps_predack);
+ lprint(" %6d correct data packet header predictions\n", tcpstat.tcps_preddat);
+ lprint(" %6d TCP cache misses\n", tcpstat.tcps_socachemiss);
+
+/* lprint(" Packets received too short: %d\n", tcpstat.tcps_rcvshort); */
+/* lprint(" Segments dropped due to PAWS: %d\n", tcpstat.tcps_pawsdrop); */
+
+}
+
+void
+udpstats(PNATState pData)
+{
+ lprint("\n");
+
+ lprint("UDP stats:\n");
+ lprint(" %6d datagrams received\n", udpstat.udps_ipackets);
+ lprint(" %6d with packets shorter than header\n", udpstat.udps_hdrops);
+ lprint(" %6d with bad checksums\n", udpstat.udps_badsum);
+ lprint(" %6d with data length larger than packet\n", udpstat.udps_badlen);
+ lprint(" %6d UDP socket cache misses\n", udpstat.udpps_pcbcachemiss);
+ lprint(" %6d datagrams sent\n", udpstat.udps_opackets);
+}
+
+void
+icmpstats(PNATState pData)
+{
+ lprint("\n");
+ lprint("ICMP stats:\n");
+ lprint(" %6d ICMP packets received\n", icmpstat.icps_received);
+ lprint(" %6d were too short\n", icmpstat.icps_tooshort);
+ lprint(" %6d with bad checksums\n", icmpstat.icps_checksum);
+ lprint(" %6d with type not supported\n", icmpstat.icps_notsupp);
+ lprint(" %6d with bad type feilds\n", icmpstat.icps_badtype);
+ lprint(" %6d ICMP packets sent in reply\n", icmpstat.icps_reflect);
+}
+
+void
+mbufstats(PNATState pData)
+{
+ /*
+ * (vvl) this static code can't work with mbuf zone anymore
+ * @todo: make statistic correct
+ */
+ NOREF(pData);
+}
+
+void
+sockstats(PNATState pData)
+{
+ char buff[256];
+ size_t n;
+ struct socket *so, *so_next;
+
+ lprint("\n");
+
+ lprint(
+ "Proto[state] Sock Local Address, Port Remote Address, Port RecvQ SendQ\n");
+
+ QSOCKET_FOREACH(so, so_next, tcp)
+ /* { */
+ n = RTStrPrintf(buff, sizeof(buff), "tcp[%s]", so->so_tcpcb?tcpstates[so->so_tcpcb->t_state]:"NONE");
+ while (n < 17)
+ buff[n++] = ' ';
+ buff[17] = 0;
+ lprint("%s %3d %15s %5d ",
+ buff, so->s, inet_ntoa(so->so_laddr), RT_N2H_U16(so->so_lport));
+ lprint("%15s %5d %5d %5d\n",
+ inet_ntoa(so->so_faddr), RT_N2H_U16(so->so_fport),
+ SBUF_LEN(&so->so_rcv), SBUF_LEN(&so->so_snd));
+ LOOP_LABEL(tcp, so, so_next);
+ }
+
+ QSOCKET_FOREACH(so, so_next, udp)
+ /* { */
+ n = RTStrPrintf(buff, sizeof(buff), "udp[%d sec]", (so->so_expire - curtime) / 1000);
+ while (n < 17)
+ buff[n++] = ' ';
+ buff[17] = 0;
+ lprint("%s %3d %15s %5d ",
+ buff, so->s, inet_ntoa(so->so_laddr), RT_N2H_U16(so->so_lport));
+ lprint("%15s %5d %5d %5d\n",
+ inet_ntoa(so->so_faddr), RT_N2H_U16(so->so_fport),
+ SBUF_LEN(&so->so_rcv), SBUF_LEN(&so->so_snd));
+ LOOP_LABEL(udp, so, so_next);
+ }
+}
+#endif
+
+static DECLCALLBACK(size_t)
+printSocket(PFNRTSTROUTPUT pfnOutput, void *pvArgOutput,
+ const char *pszType, void const *pvValue,
+ int cchWidth, int cchPrecision, unsigned fFlags,
+ void *pvUser)
+{
+ struct socket *so = (struct socket*)pvValue;
+ PNATState pData = (PNATState)pvUser;
+ size_t cb = 0;
+
+ NOREF(cchWidth);
+ NOREF(cchPrecision);
+ NOREF(fFlags);
+ Assert(pData);
+
+ AssertReturn(strcmp(pszType, "natsock") == 0, 0);
+
+ if (so == NULL)
+ return RTStrFormat(pfnOutput, pvArgOutput, NULL, 0,
+ "socket is null");
+ if (so->s == -1)
+ return RTStrFormat(pfnOutput, pvArgOutput, NULL, 0,
+ "socket(%d)", so->s);
+
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0,
+ "socket %d", so->s);
+
+ if (so->so_type == IPPROTO_TCP)
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0,
+ " (tcp)");
+ else if (so->so_type == IPPROTO_UDP)
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0,
+ " (udp)");
+ else
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0,
+ " (proto %u)", so->so_type);
+
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0,
+ " exp. in %d"
+ " state=%R[natsockstate]"
+ "%s" /* fUnderPolling */
+ "%s" /* fShouldBeRemoved */
+ " f_(addr:port)=%RTnaipv4:%d"
+ " l_(addr:port)=%RTnaipv4:%d",
+ so->so_expire ? so->so_expire - curtime : 0,
+ so->so_state,
+ so->fUnderPolling ? " fUnderPolling" : "",
+ so->fShouldBeRemoved ? " fShouldBeRemoved" : "",
+ so->so_faddr.s_addr,
+ RT_N2H_U16(so->so_fport),
+ so->so_laddr.s_addr,
+ RT_N2H_U16(so->so_lport));
+
+ if (so->s != -1)
+ {
+ struct sockaddr addr;
+ socklen_t socklen;
+ int status;
+
+ socklen = sizeof(addr);
+ status = getsockname(so->s, &addr, &socklen);
+
+ if (status != 0)
+ {
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0,
+ " (getsockname failed)");
+ }
+ else if (addr.sa_family != AF_INET)
+ {
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0,
+ " (unexpected address family %d)",
+ addr.sa_family);
+ }
+ else
+ {
+ struct sockaddr_in *in_addr = (struct sockaddr_in *)&addr;
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0,
+ " name=%RTnaipv4:%d",
+ in_addr->sin_addr.s_addr,
+ RT_N2H_U16(in_addr->sin_port));
+ }
+ }
+ return cb;
+}
+
+static DECLCALLBACK(size_t)
+printNATSocketState(PFNRTSTROUTPUT pfnOutput, void *pvArgOutput,
+ const char *pszType, void const *pvValue,
+ int cchWidth, int cchPrecision, unsigned fFlags,
+ void *pvUser)
+{
+ uint32_t u32SocketState = (uint32_t)(uintptr_t)pvValue;
+ int idxNATState = 0;
+ bool fFirst = true;
+ size_t cbReturn = 0;
+ NOREF(cchWidth);
+ NOREF(cchPrecision);
+ NOREF(fFlags);
+ NOREF(pvUser);
+ AssertReturn(strcmp(pszType, "natsockstate") == 0, 0);
+
+ for (idxNATState = 0; idxNATState < RT_ELEMENTS(g_apszSocketStates); ++idxNATState)
+ {
+ if (u32SocketState & g_apszSocketStates[idxNATState].u32SocketState)
+ {
+ if (fFirst)
+ {
+ cbReturn += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, g_apszSocketStates[idxNATState].pcszSocketStateName);
+ fFirst = false;
+ }
+ else
+ cbReturn += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, "|%s", g_apszSocketStates[idxNATState].pcszSocketStateName);
+ }
+ }
+
+ if (!cbReturn)
+ return RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, "[unknown state %RX32]", u32SocketState);
+
+ return cbReturn;
+}
+
+/**
+ * Print callback dumping TCP Control Block in terms of RFC 793.
+ */
+static DECLCALLBACK(size_t)
+printTcpcbRfc793(PFNRTSTROUTPUT pfnOutput, void *pvArgOutput,
+ const char *pszType, void const *pvValue,
+ int cchWidth, int cchPrecision, unsigned fFlags,
+ void *pvUser)
+{
+ size_t cb = 0;
+ const struct tcpcb *tp = (const struct tcpcb *)pvValue;
+ NOREF(cchWidth);
+ NOREF(cchPrecision);
+ NOREF(fFlags);
+ NOREF(pvUser);
+ AssertReturn(RTStrCmp(pszType, "tcpcb793") == 0, 0);
+ if (tp)
+ {
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, "TCB793[ state:%R[tcpstate] SND(UNA: %x, NXT: %x, UP: %x, WND: %x, WL1:%x, WL2:%x, ISS:%x), ",
+ tp->t_state, tp->snd_una, tp->snd_nxt, tp->snd_up, tp->snd_wnd, tp->snd_wl1, tp->snd_wl2, tp->iss);
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, "RCV(WND: %x, NXT: %x, UP: %x, IRS:%x)]", tp->rcv_wnd, tp->rcv_nxt, tp->rcv_up, tp->irs);
+ }
+ else
+ {
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, "TCB793[ NULL ]");
+ }
+ return cb;
+}
+/*
+ * Prints TCP segment in terms of RFC 793.
+ */
+static DECLCALLBACK(size_t)
+printTcpSegmentRfc793(PFNRTSTROUTPUT pfnOutput, void *pvArgOutput,
+ const char *pszType, void const *pvValue,
+ int cchWidth, int cchPrecision, unsigned fFlags,
+ void *pvUser)
+{
+ size_t cb = 0;
+ const struct tcpiphdr *ti = (const struct tcpiphdr *)pvValue;
+ NOREF(cchWidth);
+ NOREF(cchPrecision);
+ NOREF(fFlags);
+ NOREF(pvUser);
+ AssertReturn(RTStrCmp(pszType, "tcpseg793") == 0 && ti, 0);
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, "SEG[ACK: %x, SEQ: %x, LEN: %x, WND: %x, UP: %x]",
+ ti->ti_ack, ti->ti_seq, ti->ti_len, ti->ti_win, ti->ti_urp);
+ return cb;
+}
+
+/*
+ * Prints TCP state
+ */
+static DECLCALLBACK(size_t)
+printTcpState(PFNRTSTROUTPUT pfnOutput, void *pvArgOutput,
+ const char *pszType, void const *pvValue,
+ int cchWidth, int cchPrecision, unsigned fFlags,
+ void *pvUser)
+{
+ size_t cb = 0;
+ const int idxTcpState = (int)(uintptr_t)pvValue;
+ char *pszTcpStateName = (idxTcpState >= 0 && idxTcpState < TCP_NSTATES) ? g_apszTcpStates[idxTcpState] : "TCPS_INVALIDE_STATE";
+ NOREF(cchWidth);
+ NOREF(cchPrecision);
+ NOREF(fFlags);
+ NOREF(pvUser);
+ AssertReturn(RTStrCmp(pszType, "tcpstate") == 0, 0);
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, "%s", pszTcpStateName);
+ return cb;
+}
+
+/*
+ * Prints TCP flags
+ */
+static DECLCALLBACK(size_t)
+printTcpFlags(PFNRTSTROUTPUT pfnOutput, void *pvArgOutput,
+ const char *pszType, void const *pvValue,
+ int cchWidth, int cchPrecision, unsigned fFlags,
+ void *pvUser)
+{
+ size_t cbPrint = 0;
+ uint32_t u32TcpFlags = (uint32_t)(uintptr_t)pvValue;
+ bool fSingleValue = true;
+ int idxTcpFlags = 0;
+ NOREF(cchWidth);
+ NOREF(cchPrecision);
+ NOREF(fFlags);
+ NOREF(pvUser);
+ AssertReturn(RTStrCmp(pszType, "tcpflags") == 0, 0);
+ cbPrint += RTStrFormat(pfnOutput,
+ pvArgOutput,
+ NULL,
+ 0,
+ "tcpflags: %RX8 [", (uint8_t)u32TcpFlags);
+ for (idxTcpFlags = 0; idxTcpFlags < RT_ELEMENTS(g_aTcpFlags); ++idxTcpFlags)
+ {
+ if (u32TcpFlags & g_aTcpFlags[idxTcpFlags].u32SocketState)
+ {
+ cbPrint += RTStrFormat(pfnOutput,
+ pvArgOutput,
+ NULL,
+ 0,
+ fSingleValue ? "%s(%RX8)" : "|%s(%RX8)",
+ g_aTcpFlags[idxTcpFlags].pcszSocketStateName,
+ (uint8_t)g_aTcpFlags[idxTcpFlags].u32SocketState);
+ fSingleValue = false;
+ }
+ }
+ cbPrint += RTStrFormat(pfnOutput,
+ pvArgOutput,
+ NULL,
+ 0,
+ "]");
+ return cbPrint;
+}
+
+/*
+ * Prints sbuf state
+ */
+static DECLCALLBACK(size_t)
+printSbuf(PFNRTSTROUTPUT pfnOutput, void *pvArgOutput,
+ const char *pszType, void const *pvValue,
+ int cchWidth, int cchPrecision, unsigned fFlags,
+ void *pvUser)
+{
+ size_t cb = 0;
+ const struct sbuf *sb = (struct sbuf *)pvValue;
+ NOREF(cchWidth);
+ NOREF(cchPrecision);
+ NOREF(fFlags);
+ NOREF(pvUser);
+ AssertReturn(RTStrCmp(pszType, "sbuf") == 0, 0);
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, "[sbuf:%p cc:%d, datalen:%d, wprt:%p, rptr:%p data:%p]",
+ sb, sb->sb_cc, sb->sb_datalen, sb->sb_wptr, sb->sb_rptr, sb->sb_data);
+ return cb;
+}
+
+/*
+ * Prints zone state
+ */
+static DECLCALLBACK(size_t)
+printMbufZone(PFNRTSTROUTPUT pfnOutput, void *pvArgOutput,
+ const char *pszType, void const *pvValue,
+ int cchWidth, int cchPrecision, unsigned fFlags,
+ void *pvUser)
+{
+ size_t cb = 0;
+ const uma_zone_t zone = (const uma_zone_t)pvValue;
+ NOREF(cchWidth);
+ NOREF(cchPrecision);
+ NOREF(fFlags);
+ NOREF(pvUser);
+ AssertReturn(RTStrCmp(pszType, "mzone") == 0, 0);
+ if (!zone)
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, "[zone:NULL]");
+ else
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, "[zone:%p name:%s, master_zone:%R[mzone]]",
+ zone, zone->name, zone->master_zone);
+ return cb;
+}
+
+/*
+ * Prints zone's item state
+ */
+static DECLCALLBACK(size_t)
+printMbufZoneItem(PFNRTSTROUTPUT pfnOutput, void *pvArgOutput,
+ const char *pszType, void const *pvValue,
+ int cchWidth, int cchPrecision, unsigned fFlags,
+ void *pvUser)
+{
+ size_t cb = 0;
+ const struct item *it = (const struct item *)pvValue;
+ NOREF(cchWidth);
+ NOREF(cchPrecision);
+ NOREF(fFlags);
+ NOREF(pvUser);
+ AssertReturn(RTStrCmp(pszType, "mzoneitem") == 0, 0);
+ if (!it)
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, "[item:NULL]");
+ else
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, "[iptem:%p ref_count:%d, zone:%R[mzone]]",
+ it, it->ref_count, it->zone);
+ return cb;
+}
+
+static DECLCALLBACK(size_t)
+print_networkevents(PFNRTSTROUTPUT pfnOutput, void *pvArgOutput,
+ const char *pszType, void const *pvValue,
+ int cchWidth, int cchPrecision, unsigned fFlags,
+ void *pvUser)
+{
+ size_t cb = 0;
+#ifdef RT_OS_WINDOWS
+ WSANETWORKEVENTS *pNetworkEvents = (WSANETWORKEVENTS*)pvValue;
+ bool fDelim = false;
+#endif
+
+ NOREF(cchWidth);
+ NOREF(cchPrecision);
+ NOREF(fFlags);
+ NOREF(pvUser);
+
+#ifdef RT_OS_WINDOWS
+ AssertReturn(strcmp(pszType, "natwinnetevents") == 0, 0);
+
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, "events=%02x (",
+ pNetworkEvents->lNetworkEvents);
+# define DO_BIT(bit) \
+ if (pNetworkEvents->lNetworkEvents & FD_ ## bit) \
+ { \
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, \
+ "%s" #bit "(%d)", fDelim ? "," : "", \
+ pNetworkEvents->iErrorCode[FD_ ## bit ## _BIT]); \
+ fDelim = true; \
+ }
+ DO_BIT(READ);
+ DO_BIT(WRITE);
+ DO_BIT(OOB);
+ DO_BIT(ACCEPT);
+ DO_BIT(CONNECT);
+ DO_BIT(CLOSE);
+ DO_BIT(QOS);
+# undef DO_BIT
+ cb += RTStrFormat(pfnOutput, pvArgOutput, NULL, 0, ")");
+#else
+ NOREF(pfnOutput);
+ NOREF(pvArgOutput);
+ NOREF(pszType);
+ NOREF(pvValue);
+#endif
+ return cb;
+}
+
+#if 0
+/*
+ * Debugging
+ */
+int errno_func(const char *file, int line)
+{
+ int err = WSAGetLastError();
+ LogRel(("errno=%d (%s:%d)\n", err, file, line));
+ return err;
+}
+#endif
+
+int
+debug_init(PNATState pData)
+{
+ int rc = VINF_SUCCESS;
+
+ static int g_fFormatRegistered;
+
+ if (!g_fFormatRegistered)
+ {
+
+ rc = RTStrFormatTypeRegister("natsock", printSocket, pData); AssertRC(rc);
+ rc = RTStrFormatTypeRegister("natsockstate", printNATSocketState, NULL); AssertRC(rc);
+ rc = RTStrFormatTypeRegister("natwinnetevents",
+ print_networkevents, NULL); AssertRC(rc);
+ rc = RTStrFormatTypeRegister("tcpcb793", printTcpcbRfc793, NULL); AssertRC(rc);
+ rc = RTStrFormatTypeRegister("tcpseg793", printTcpSegmentRfc793, NULL); AssertRC(rc);
+ rc = RTStrFormatTypeRegister("tcpstate", printTcpState, NULL); AssertRC(rc);
+ rc = RTStrFormatTypeRegister("tcpflags", printTcpFlags, NULL); AssertRC(rc);
+ rc = RTStrFormatTypeRegister("sbuf", printSbuf, NULL); AssertRC(rc);
+ rc = RTStrFormatTypeRegister("mzone", printMbufZone, NULL); AssertRC(rc);
+ rc = RTStrFormatTypeRegister("mzoneitem", printMbufZoneItem, NULL); AssertRC(rc);
+ g_fFormatRegistered = 1;
+ }
+
+ return rc;
+}