2 * Copyright (c) 2001-2007, by Weongyo Jeong. All rights reserved.
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
7 * a) Redistributions of source code must retain the above copyright notice,
8 * this list of conditions and the following disclaimer.
10 * b) Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in
12 * the documentation and/or other materials provided with the distribution.
14 * c) Neither the name of Cisco Systems, Inc. nor the names of its
15 * contributors may be used to endorse or promote products derived
16 * from this software without specific prior written permission.
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
20 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
28 * THE POSSIBILITY OF SUCH DAMAGE.
33 static char sccsid[] = "@(#)sctp.c 0.1 (Berkeley) 4/18/2007";
37 #include <sys/cdefs.h>
38 __FBSDID("$FreeBSD$");
40 #include <sys/param.h>
41 #include <sys/queue.h>
42 #include <sys/types.h>
43 #include <sys/socket.h>
44 #include <sys/socketvar.h>
45 #include <sys/sysctl.h>
46 #include <sys/protosw.h>
48 #include <netinet/in.h>
49 #include <netinet/sctp.h>
50 #include <netinet/sctp_constants.h>
51 #include <arpa/inet.h>
66 void inetprint(struct in_addr *, int, const char *, int);
67 static void sctp_statesprint(uint32_t state);
69 #define NETSTAT_SCTP_STATES_CLOSED 0x0
70 #define NETSTAT_SCTP_STATES_BOUND 0x1
71 #define NETSTAT_SCTP_STATES_LISTEN 0x2
72 #define NETSTAT_SCTP_STATES_COOKIE_WAIT 0x3
73 #define NETSTAT_SCTP_STATES_COOKIE_ECHOED 0x4
74 #define NETSTAT_SCTP_STATES_ESTABLISHED 0x5
75 #define NETSTAT_SCTP_STATES_SHUTDOWN_SENT 0x6
76 #define NETSTAT_SCTP_STATES_SHUTDOWN_RECEIVED 0x7
77 #define NETSTAT_SCTP_STATES_SHUTDOWN_ACK_SENT 0x8
78 #define NETSTAT_SCTP_STATES_SHUTDOWN_PENDING 0x9
80 char *sctpstates[] = {
93 LIST_HEAD(xladdr_list, xladdr_entry) xladdr_head;
95 struct xsctp_laddr *xladdr;
96 LIST_ENTRY(xladdr_entry) xladdr_entries;
99 LIST_HEAD(xraddr_list, xraddr_entry) xraddr_head;
100 struct xraddr_entry {
101 struct xsctp_raddr *xraddr;
102 LIST_ENTRY(xraddr_entry) xraddr_entries;
106 sctp_skip_xinpcb_ifneed(char *buf, const size_t buflen, size_t *offset)
109 struct xsctp_tcb *xstcb;
110 struct xsctp_raddr *xraddr;
111 struct xsctp_laddr *xladdr;
113 while (*offset < buflen) {
114 xladdr = (struct xsctp_laddr *)(buf + *offset);
115 *offset += sizeof(struct xsctp_laddr);
116 if (xladdr->last == 1)
120 while (*offset < buflen) {
121 xstcb = (struct xsctp_tcb *)(buf + *offset);
122 *offset += sizeof(struct xsctp_tcb);
123 if (xstcb->last == 1)
128 while (*offset < buflen) {
129 xladdr = (struct xsctp_laddr *)(buf + *offset);
130 *offset += sizeof(struct xsctp_laddr);
131 if (xladdr->last == 1)
135 while (*offset < buflen) {
136 xraddr = (struct xsctp_raddr *)(buf + *offset);
137 *offset += sizeof(struct xsctp_raddr);
138 if (xraddr->last == 1)
144 * If Lflag is set, we don't care about the return value.
153 sctp_process_tcb(struct xsctp_tcb *xstcb, const char *name,
154 char *buf, const size_t buflen, size_t *offset, int *indent)
156 int i, xl_total = 0, xr_total = 0, x_max;
158 struct xsctp_raddr *xraddr;
159 struct xsctp_laddr *xladdr;
160 struct xladdr_entry *prev_xl = NULL, *xl = NULL, *xl_tmp;
161 struct xraddr_entry *prev_xr = NULL, *xr = NULL, *xr_tmp;
163 struct sockaddr_in6 *in6;
166 LIST_INIT(&xladdr_head);
167 LIST_INIT(&xraddr_head);
170 * Make `struct xladdr_list' list and `struct xraddr_list' list
171 * to handle the address flexibly.
173 while (*offset < buflen) {
174 xladdr = (struct xsctp_laddr *)(buf + *offset);
175 *offset += sizeof(struct xsctp_laddr);
176 if (xladdr->last == 1)
180 xl = malloc(sizeof(struct xladdr_entry));
182 warnx("malloc %lu bytes",
183 (u_long)sizeof(struct xladdr_entry));
188 LIST_INSERT_HEAD(&xladdr_head, xl, xladdr_entries);
190 LIST_INSERT_AFTER(prev_xl, xl, xladdr_entries);
194 while (*offset < buflen) {
195 xraddr = (struct xsctp_raddr *)(buf + *offset);
196 *offset += sizeof(struct xsctp_raddr);
197 if (xraddr->last == 1)
201 xr = malloc(sizeof(struct xraddr_entry));
203 warnx("malloc %lu bytes",
204 (u_long)sizeof(struct xraddr_entry));
209 LIST_INSERT_HEAD(&xraddr_head, xr, xraddr_entries);
211 LIST_INSERT_AFTER(prev_xr, xr, xraddr_entries);
216 * Let's print the address infos.
218 xl = LIST_FIRST(&xladdr_head);
219 xr = LIST_FIRST(&xraddr_head);
220 x_max = (xl_total > xr_total) ? xl_total : xr_total;
221 for (i = 0; i < x_max; i++) {
222 if (((*indent == 0) && i > 0) || *indent > 0)
223 printf("%-11s ", " ");
226 sa = &(xl->xladdr->address.sa);
227 if ((sa->sa_family) == AF_INET)
228 inetprint(&((struct sockaddr_in *)sa)->sin_addr,
229 htons(xstcb->local_port),
233 in6 = (struct sockaddr_in6 *)sa;
234 inet6print(&in6->sin6_addr,
235 htons(xstcb->local_port),
241 if (xr != NULL && !Lflag) {
242 sa = &(xr->xraddr->address.sa);
243 if ((sa->sa_family) == AF_INET)
244 inetprint(&((struct sockaddr_in *)sa)->sin_addr,
245 htons(xstcb->remote_port),
249 in6 = (struct sockaddr_in6 *)sa;
250 inet6print(&in6->sin6_addr,
251 htons(xstcb->remote_port),
258 xl = LIST_NEXT(xl, xladdr_entries);
260 xr = LIST_NEXT(xr, xraddr_entries);
262 if (i == 0 && !Lflag)
263 sctp_statesprint(xstcb->state);
271 * Free the list which be used to handle the address.
273 xl = LIST_FIRST(&xladdr_head);
275 xl_tmp = LIST_NEXT(xl, xladdr_entries);
280 xr = LIST_FIRST(&xraddr_head);
282 xr_tmp = LIST_NEXT(xr, xraddr_entries);
289 uint32_t sctp_pdup[64];
294 sctp_process_inpcb(struct xsctp_inpcb *xinpcb, const char *name,
295 char *buf, const size_t buflen, size_t *offset)
297 int offset_backup, indent = 0, xladdr_total = 0, is_listening = 0;
298 static int first = 1;
300 struct xsctp_tcb *xstcb;
301 struct xsctp_laddr *xladdr;
304 struct sockaddr_in6 *in6;
307 if ((xinpcb->flags & SCTP_PCB_FLAGS_TCPTYPE) ==
308 SCTP_PCB_FLAGS_TCPTYPE && xinpcb->maxqlen > 0)
311 if (!Lflag && !is_listening &&
312 !(xinpcb->flags & SCTP_PCB_FLAGS_CONNECTED)) {
316 for (i = 0; i < sctp_pcnt; i++) {
317 if (sctp_pdup[i] == xinpcb->flags) {
323 sctp_pdup[sctp_pcnt++] = xinpcb->flags;
326 printf("[0x%08x]", xinpcb->flags);
329 offset_backup = *offset;
330 if (!sctp_skip_xinpcb_ifneed(buf, buflen, offset))
332 *offset = offset_backup;
337 printf("Active SCTP associations");
339 printf(" (including servers)");
341 printf("Current listen queue sizes (qlen/maxqlen)");
344 printf("%-8.8s ", "Socket");
346 printf("%-5.5s %-5.5s %-8.8s %-22.22s\n",
347 "Proto", "Type", "Listen", "Local Address");
349 printf((Aflag && !Wflag) ?
350 "%-5.5s %-5.5s %-18.18s %-18.18s %s\n" :
351 "%-5.5s %-5.5s %-22.22s %-22.22s %s\n",
353 "Local Address", "Foreign Address",
357 if (Lflag && xinpcb->maxqlen == 0) {
358 sctp_skip_xinpcb_ifneed(buf, buflen, offset);
362 printf("%8lx ", (u_long)xinpcb);
364 printf("%-5.5s ", name);
366 if (xinpcb->flags & SCTP_PCB_FLAGS_TCPTYPE)
368 else if (xinpcb->flags & SCTP_PCB_FLAGS_UDPTYPE)
373 printf("%-5.5s ", tname);
378 snprintf(buf1, 9, "%hu/%hu", xinpcb->qlen, xinpcb->maxqlen);
379 printf("%-8.8s ", buf1);
382 * process the local address. This routine are used for Lflag.
384 while (*offset < buflen) {
385 xladdr = (struct xsctp_laddr *)(buf + *offset);
386 *offset += sizeof(struct xsctp_laddr);
387 if (xladdr->last == 1)
390 if (!Lflag && !is_listening)
393 if (xladdr_total != 0)
395 if (xladdr_total > 0)
397 "%-20.20s " : "%-11.11s ", " ");
399 sa = &(xladdr->address.sa);
400 if ((sa->sa_family) == AF_INET)
401 inetprint(&((struct sockaddr_in *)sa)->sin_addr,
402 htons(xinpcb->local_port), name, numeric_port);
405 in6 = (struct sockaddr_in6 *)sa;
406 inet6print(&in6->sin6_addr,
407 htons(xinpcb->local_port), name, numeric_port);
411 if (!Lflag && xladdr_total == 0 && is_listening == 1)
412 printf("%-22.22s LISTEN", " ");
417 xstcb = (struct xsctp_tcb *)(buf + *offset);
418 *offset += sizeof(struct xsctp_tcb);
419 while (xstcb->last == 0 && *offset < buflen) {
420 sctp_process_tcb(xstcb, name, buf, buflen, offset, &indent);
422 xstcb = (struct xsctp_tcb *)(buf + *offset);
423 *offset += sizeof(struct xsctp_tcb);
430 * Print a summary of SCTP connections related to an Internet
434 sctp_protopr(u_long off __unused,
435 const char *name, int af1, int proto)
438 const char *mibvar = "net.inet.sctp.assoclist";
441 struct xsctp_inpcb *xinpcb;
443 if (proto != IPPROTO_SCTP)
446 if (sysctlbyname(mibvar, 0, &len, 0, 0) < 0) {
448 warn("sysctl: %s", mibvar);
451 if ((buf = malloc(len)) == 0) {
452 warnx("malloc %lu bytes", (u_long)len);
455 if (sysctlbyname(mibvar, buf, &len, 0, 0) < 0) {
456 warn("sysctl: %s", mibvar);
461 xinpcb = (struct xsctp_inpcb *)(buf + offset);
462 offset += sizeof(struct xsctp_inpcb);
463 while (xinpcb->last == 0 && offset < len) {
464 sctp_process_inpcb(xinpcb, name, buf, (const size_t)len,
467 xinpcb = (struct xsctp_inpcb *)(buf + offset);
468 offset += sizeof(struct xsctp_inpcb);
475 sctp_statesprint(uint32_t state)
480 case SCTP_STATE_COOKIE_WAIT:
481 idx = NETSTAT_SCTP_STATES_COOKIE_WAIT;
483 case SCTP_STATE_COOKIE_ECHOED:
484 idx = NETSTAT_SCTP_STATES_COOKIE_ECHOED;
486 case SCTP_STATE_OPEN:
487 idx = NETSTAT_SCTP_STATES_ESTABLISHED;
489 case SCTP_STATE_SHUTDOWN_SENT:
490 idx = NETSTAT_SCTP_STATES_SHUTDOWN_SENT;
492 case SCTP_STATE_SHUTDOWN_RECEIVED:
493 idx = NETSTAT_SCTP_STATES_SHUTDOWN_RECEIVED;
495 case SCTP_STATE_SHUTDOWN_ACK_SENT:
496 idx = NETSTAT_SCTP_STATES_SHUTDOWN_ACK_SENT;
498 case SCTP_STATE_SHUTDOWN_PENDING:
499 idx = NETSTAT_SCTP_STATES_SHUTDOWN_PENDING;
502 printf("UNKNOWN 0x%08x", state);
506 printf("%s", sctpstates[idx]);
510 * Dump SCTP statistics structure.
513 sctp_stats(u_long off, const char *name, int af1 __unused, int proto __unused)
515 struct sctpstat sctpstat, zerostat;
516 size_t len = sizeof(sctpstat);
520 memset(&zerostat, 0, len);
521 if (sysctlbyname("net.inet.sctp.stats", &sctpstat, &len,
522 zflag ? &zerostat : NULL, zflag ? len : 0) < 0) {
523 warn("sysctl: net.inet.sctp.stats");
527 kread(off, &sctpstat, len);
529 printf ("%s:\n", name);
531 #define p(f, m) if (sctpstat.f || sflag <= 1) \
532 printf(m, (uintmax_t)sctpstat.f, plural(sctpstat.f))
533 #define p1a(f, m) if (sctpstat.f || sflag <= 1) \
534 printf(m, (uintmax_t)sctpstat.f)
539 p(sctps_recvpackets, "\t%ju input packet%s\n");
540 p(sctps_recvdatagrams, "\t\t%ju datagram%s\n");
541 p(sctps_recvpktwithdata, "\t\t%ju packet%s that had data\n");
542 p(sctps_recvsacks, "\t\t%ju input SACK chunk%s\n");
543 p(sctps_recvdata, "\t\t%ju input DATA chunk%s\n");
544 p(sctps_recvdupdata, "\t\t%ju duplicate DATA chunk%s\n");
545 p(sctps_recvheartbeat, "\t\t%ju input HB chunk%s\n");
546 p(sctps_recvheartbeatack, "\t\t%ju HB-ACK chunk%s\n");
547 p(sctps_recvecne, "\t\t%ju input ECNE chunk%s\n");
548 p(sctps_recvauth, "\t\t%ju input AUTH chunk%s\n");
549 p(sctps_recvauthmissing, "\t\t%ju chunk%s missing AUTH\n");
550 p(sctps_recvivalhmacid, "\t\t%ju invalid HMAC id%s received\n");
551 p(sctps_recvivalkeyid, "\t\t%ju invalid secret id%s received\n");
552 p1a(sctps_recvauthfailed, "\t\t%ju auth failed\n");
553 p1a(sctps_recvexpress, "\t\t%ju fast path receives all one chunk\n");
554 p1a(sctps_recvexpressm, "\t\t%ju fast path multi-part data\n");
559 p(sctps_sendpackets, "\t%ju output packet%s\n");
560 p(sctps_sendsacks, "\t\t%ju output SACK%s\n");
561 p(sctps_senddata, "\t\t%ju output DATA chunk%s\n");
562 p(sctps_sendretransdata, "\t\t%ju retransmitted DATA chunk%s\n");
563 p(sctps_sendfastretrans, "\t\t%ju fast retransmitted DATA chunk%s\n");
564 p(sctps_sendmultfastretrans, "\t\t%ju FR'%s that happened more "
565 "than once to same chunk\n");
566 p(sctps_sendheartbeat, "\t\t%ju intput HB chunk%s\n");
567 p(sctps_sendecne, "\t\t%ju output ECNE chunk%s\n");
568 p(sctps_sendauth, "\t\t%ju output AUTH chunk%s\n");
569 p1a(sctps_senderrors, "\t\t%ju ip_output error counter\n");
572 * PCKDROPREP statistics
574 printf("\tPacket drop statistics:\n");
575 p1a(sctps_pdrpfmbox, "\t\t%ju from middle box\n");
576 p1a(sctps_pdrpfehos, "\t\t%ju from end host\n");
577 p1a(sctps_pdrpmbda, "\t\t%ju with data\n");
578 p1a(sctps_pdrpmbct, "\t\t%ju non-data, non-endhost\n");
579 p1a(sctps_pdrpbwrpt, "\t\t%ju non-endhost, bandwidth rep only\n");
580 p1a(sctps_pdrpcrupt, "\t\t%ju not enough for chunk header\n");
581 p1a(sctps_pdrpnedat, "\t\t%ju not enough data to confirm\n");
582 p1a(sctps_pdrppdbrk, "\t\t%ju where process_chunk_drop said break\n");
583 p1a(sctps_pdrptsnnf, "\t\t%ju failed to find TSN\n");
584 p1a(sctps_pdrpdnfnd, "\t\t%ju attempt reverse TSN lookup\n");
585 p1a(sctps_pdrpdiwnp, "\t\t%ju e-host confirms zero-rwnd\n");
586 p1a(sctps_pdrpdizrw, "\t\t%ju midbox confirms no space\n");
587 p1a(sctps_pdrpbadd, "\t\t%ju data did not match TSN\n");
588 p(sctps_pdrpmark, "\t\t%ju TSN'%s marked for Fast Retran\n");
593 printf("\tTimeouts:\n");
594 p(sctps_timoiterator, "\t\t%ju iterator timer%s fired\n");
595 p(sctps_timodata, "\t\t%ju T3 data time out%s\n");
596 p(sctps_timowindowprobe, "\t\t%ju window probe (T3) timer%s fired\n");
597 p(sctps_timoinit, "\t\t%ju INIT timer%s fired\n");
598 p(sctps_timosack, "\t\t%ju sack timer%s fired\n");
599 p(sctps_timoshutdown, "\t\t%ju shutdown timer%s fired\n");
600 p(sctps_timoheartbeat, "\t\t%ju heartbeat timer%s fired\n");
601 p1a(sctps_timocookie, "\t\t%ju a cookie timeout fired\n");
602 p1a(sctps_timosecret, "\t\t%ju an endpoint changed its cookie"
604 p(sctps_timopathmtu, "\t\t%ju PMTU timer%s fired\n");
605 p(sctps_timoshutdownack, "\t\t%ju shutdown ack timer%s fired\n");
606 p(sctps_timoshutdownguard, "\t\t%ju shutdown guard timer%s fired\n");
607 p(sctps_timostrmrst, "\t\t%ju stream reset timer%s fired\n");
608 p(sctps_timoearlyfr, "\t\t%ju early FR timer%s fired\n");
609 p1a(sctps_timoasconf, "\t\t%ju an asconf timer fired\n");
610 p1a(sctps_timoautoclose, "\t\t%ju auto close timer fired\n");
611 p(sctps_timoassockill, "\t\t%ju asoc free timer%s expired\n");
612 p(sctps_timoinpkill, "\t\t%ju inp free timer%s expired\n");
616 * Early fast retransmission counters
618 p(sctps_earlyfrstart, "\t%ju TODO:sctps_earlyfrstart\n");
619 p(sctps_earlyfrstop, "\t%ju TODO:sctps_earlyfrstop\n");
620 p(sctps_earlyfrmrkretrans, "\t%ju TODO:sctps_earlyfrmrkretrans\n");
621 p(sctps_earlyfrstpout, "\t%ju TODO:sctps_earlyfrstpout\n");
622 p(sctps_earlyfrstpidsck1, "\t%ju TODO:sctps_earlyfrstpidsck1\n");
623 p(sctps_earlyfrstpidsck2, "\t%ju TODO:sctps_earlyfrstpidsck2\n");
624 p(sctps_earlyfrstpidsck3, "\t%ju TODO:sctps_earlyfrstpidsck3\n");
625 p(sctps_earlyfrstpidsck4, "\t%ju TODO:sctps_earlyfrstpidsck4\n");
626 p(sctps_earlyfrstrid, "\t%ju TODO:sctps_earlyfrstrid\n");
627 p(sctps_earlyfrstrout, "\t%ju TODO:sctps_earlyfrstrout\n");
628 p(sctps_earlyfrstrtmr, "\t%ju TODO:sctps_earlyfrstrtmr\n");
634 p1a(sctps_hdrops, "\t%ju packet shorter than header\n");
635 p1a(sctps_badsum, "\t%ju checksum error\n");
636 p1a(sctps_noport, "\t%ju no endpoint for port\n");
637 p1a(sctps_badvtag, "\t%ju bad v-tag\n");
638 p1a(sctps_badsid, "\t%ju bad SID\n");
639 p1a(sctps_nomem, "\t%ju no memory\n");
640 p1a(sctps_fastretransinrtt, "\t%ju number of multiple FR in a RTT "
643 p(sctps_markedretrans, "\t%ju TODO:sctps_markedretrans\n");
645 p1a(sctps_naglesent, "\t%ju RFC813 allowed sending\n");
646 p1a(sctps_naglequeued, "\t%ju RFC813 does not allow sending\n");
647 p1a(sctps_maxburstqueued, "\t%ju times max burst prohibited sending\n");
648 p1a(sctps_ifnomemqueued, "\t%ju look ahead tells us no memory in "
650 p(sctps_windowprobed, "\t%ju number%s of window probes sent\n");
651 p(sctps_lowlevelerr, "\t%ju time%s an output error to clamp "
652 "down on next user send\n");
653 p(sctps_lowlevelerrusr, "\t%ju time%s sctp_senderrors were "
654 "caused from a user\n");
655 p(sctps_datadropchklmt, "\t%ju number of in data drop%s due to "
656 "chunk limit reached\n");
657 p(sctps_datadroprwnd, "\t%ju number of in data drop%s due to rwnd "
659 p(sctps_ecnereducedcwnd, "\t%ju time%s a ECN reduced "
661 p1a(sctps_vtagexpress, "\t%ju used express lookup via vtag\n");
662 p1a(sctps_vtagbogus, "\t%ju collision in express lookup\n");
663 p(sctps_primary_randry, "\t%ju time%s the sender ran dry "
664 "of user data on primary\n");
665 p1a(sctps_cmt_randry, "\t%ju same for above\n");
666 p(sctps_slowpath_sack, "\t%ju sack%s the slow way\n");
667 p(sctps_wu_sacks_sent, "\t%ju window update only sack%s sent\n");
668 p(sctps_sends_with_flags, "\t%ju send%s with sinfo_flags !=0\n");
669 p(sctps_sends_with_unord, "\t%ju unordered send%s\n");
670 p(sctps_sends_with_eof, "\t%ju send%s with EOF flag set\n");
671 p(sctps_sends_with_abort, "\t%ju send%s with ABORT flag set\n");
672 p(sctps_protocol_drain_calls, "\t%ju time%s protocol drain called\n");
673 p(sctps_protocol_drains_done, "\t%ju time%s we did a protocol "
675 p(sctps_read_peeks, "\t%ju time%s recv was called with peek\n");
676 p(sctps_cached_chk, "\t%ju cached chunk%s used\n");
677 p1a(sctps_cached_strmoq, "\t%ju cached stream oq's used\n");
678 p(sctps_left_abandon, "\t%ju unread message%s abandonded by close\n");
679 p1a(sctps_send_burst_avoid, "\t%ju send burst avoidance, already "
680 "max burst inflight to net\n");
681 p1a(sctps_send_cwnd_avoid, "\t%ju send cwnd full avoidance, already "
682 "max burst inflight to net\n");
683 p(sctps_fwdtsn_map_over, "\t%ju number of map array over-run%s via "