1 /*-
2 * SPDX-License-Identifier: BSD-3-Clause
3 *
4 * Copyright (c) 1980, 1992, 1993
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the University nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32
33
34 /* From:
35 "Id: mbufs.c,v 1.5 1997/02/24 20:59:03 wollman Exp"
36 */
37
38 #include <sys/param.h>
39 #include <sys/types.h>
40 #include <sys/socket.h>
41 #include <sys/sysctl.h>
42
43 #include <netinet/in.h>
44 #include <netinet/in_systm.h>
45 #include <netinet/ip.h>
46 #include <netinet/ip_var.h>
47 #include <netinet/udp.h>
48 #include <netinet/udp_var.h>
49
50 #include <inttypes.h>
51 #include <stdlib.h>
52 #include <string.h>
53 #include <paths.h>
54
55 #include "systat.h"
56 #include "extern.h"
57 #include "mode.h"
58
59 struct stat {
60 struct ipstat i;
61 struct udpstat u;
62 };
63
64 static struct stat curstat, initstat, oldstat;
65
66 /*-
67 --0 1 2 3 4 5 6 7
68 --0123456789012345678901234567890123456789012345678901234567890123456789012345
69 00 IP Input IP Output
70 01999999999 total packets received 999999999 total packets sent
71 02999999999 - with bad checksums 999999999 - generated locally
72 03999999999 - too short for header 999999999 - output drops
73 04999999999 - too short for data 999999999 output fragments generated
74 05999999999 - with invalid hlen 999999999 - fragmentation failed
75 06999999999 - with invalid length 999999999 destinations unreachable
76 07999999999 - with invalid version 999999999 packets output via raw IP
77 08999999999 - jumbograms
78 09999999999 total fragments received UDP Statistics
79 10999999999 - fragments dropped 999999999 total input packets
80 11999999999 - fragments timed out 999999999 - too short for header
81 12999999999 - packets reassembled ok 999999999 - invalid checksum
82 13999999999 packets forwarded 999999999 - no checksum
83 14999999999 - unreachable dests 999999999 - invalid length
84 15999999999 - redirects generated 999999999 - no socket for dest port
85 16999999999 option errors 999999999 - no socket for broadcast
86 17999999999 unwanted multicasts 999999999 - socket buffer full
87 18999999999 delivered to upper layer 999999999 total output packets
88 --0123456789012345678901234567890123456789012345678901234567890123456789012345
89 --0 1 2 3 4 5 6 7
90 */
91
92 WINDOW *
openip(void)93 openip(void)
94 {
95 return (subwin(stdscr, LINES-3-1, 0, MAINWIN_ROW, 0));
96 }
97
98 void
closeip(WINDOW * w)99 closeip(WINDOW *w)
100 {
101 if (w == NULL)
102 return;
103 wclear(w);
104 wrefresh(w);
105 delwin(w);
106 }
107
108 void
labelip(void)109 labelip(void)
110 {
111 wmove(wnd, 0, 0); wclrtoeol(wnd);
112 #define L(row, str) mvwprintw(wnd, row, 10, str)
113 #define R(row, str) mvwprintw(wnd, row, 45, str);
114 L(0, "IP Input"); R(0, "IP Output");
115 L(1, "total packets received"); R(1, "total packets sent");
116 L(2, "- with bad checksums"); R(2, "- generated locally");
117 L(3, "- too short for header"); R(3, "- output drops");
118 L(4, "- too short for data"); R(4, "output fragments generated");
119 L(5, "- with invalid hlen"); R(5, "- fragmentation failed");
120 L(6, "- with invalid length"); R(6, "destinations unreachable");
121 L(7, "- with invalid version"); R(7, "packets output via raw IP");
122 L(8, "- jumbograms");
123 L(9, "total fragments received"); R(9, "UDP Statistics");
124 L(10, "- fragments dropped"); R(10, "total input packets");
125 L(11, "- fragments timed out"); R(11, "- too short for header");
126 L(12, "- packets reassembled ok"); R(12, "- invalid checksum");
127 L(13, "packets forwarded"); R(13, "- no checksum");
128 L(14, "- unreachable dests"); R(14, "- invalid length");
129 L(15, "- redirects generated"); R(15, "- no socket for dest port");
130 L(16, "option errors"); R(16, "- no socket for broadcast");
131 L(17, "unwanted multicasts"); R(17, "- socket buffer full");
132 L(18, "delivered to upper layer"); R(18, "total output packets");
133 #undef L
134 #undef R
135 }
136
137 static void
domode(struct stat * ret)138 domode(struct stat *ret)
139 {
140 const struct stat *sub;
141 int divisor = 1;
142
143 switch(currentmode) {
144 case display_RATE:
145 sub = &oldstat;
146 divisor = (delay > 1000000) ? delay / 1000000 : 1;
147 break;
148 case display_DELTA:
149 sub = &oldstat;
150 break;
151 case display_SINCE:
152 sub = &initstat;
153 break;
154 default:
155 *ret = curstat;
156 return;
157 }
158 #define DO(stat) ret->stat = (curstat.stat - sub->stat) / divisor
159 DO(i.ips_total);
160 DO(i.ips_badsum);
161 DO(i.ips_tooshort);
162 DO(i.ips_toosmall);
163 DO(i.ips_badhlen);
164 DO(i.ips_badlen);
165 DO(i.ips_fragments);
166 DO(i.ips_fragdropped);
167 DO(i.ips_fragtimeout);
168 DO(i.ips_forward);
169 DO(i.ips_cantforward);
170 DO(i.ips_redirectsent);
171 DO(i.ips_noproto);
172 DO(i.ips_delivered);
173 DO(i.ips_localout);
174 DO(i.ips_odropped);
175 DO(i.ips_reassembled);
176 DO(i.ips_fragmented);
177 DO(i.ips_ofragments);
178 DO(i.ips_cantfrag);
179 DO(i.ips_badoptions);
180 DO(i.ips_noroute);
181 DO(i.ips_badvers);
182 DO(i.ips_rawout);
183 DO(i.ips_toolong);
184 DO(i.ips_notmember);
185 DO(u.udps_ipackets);
186 DO(u.udps_hdrops);
187 DO(u.udps_badsum);
188 DO(u.udps_nosum);
189 DO(u.udps_badlen);
190 DO(u.udps_noport);
191 DO(u.udps_noportbcast);
192 DO(u.udps_fullsock);
193 DO(u.udps_opackets);
194 #undef DO
195 }
196
197 void
showip(void)198 showip(void)
199 {
200 struct stat stats;
201 uint64_t totalout;
202
203 domode(&stats);
204 totalout = stats.i.ips_forward + stats.i.ips_localout;
205
206 #define DO(stat, row, col) \
207 mvwprintw(wnd, row, col, "%9"PRIu64, stats.stat)
208
209 DO(i.ips_total, 1, 0);
210 mvwprintw(wnd, 1, 35, "%9"PRIu64, totalout);
211 DO(i.ips_badsum, 2, 0);
212 DO(i.ips_localout, 2, 35);
213 DO(i.ips_tooshort, 3, 0);
214 DO(i.ips_odropped, 3, 35);
215 DO(i.ips_toosmall, 4, 0);
216 DO(i.ips_ofragments, 4, 35);
217 DO(i.ips_badhlen, 5, 0);
218 DO(i.ips_cantfrag, 5, 35);
219 DO(i.ips_badlen, 6, 0);
220 DO(i.ips_noroute, 6, 35);
221 DO(i.ips_badvers, 7, 0);
222 DO(i.ips_rawout, 7, 35);
223 DO(i.ips_toolong, 8, 0);
224 DO(i.ips_fragments, 9, 0);
225 DO(i.ips_fragdropped, 10, 0);
226 DO(u.udps_ipackets, 10, 35);
227 DO(i.ips_fragtimeout, 11, 0);
228 DO(u.udps_hdrops, 11, 35);
229 DO(i.ips_reassembled, 12, 0);
230 DO(u.udps_badsum, 12, 35);
231 DO(i.ips_forward, 13, 0);
232 DO(u.udps_nosum, 13, 35);
233 DO(i.ips_cantforward, 14, 0);
234 DO(u.udps_badlen, 14, 35);
235 DO(i.ips_redirectsent, 15, 0);
236 DO(u.udps_noport, 15, 35);
237 DO(i.ips_badoptions, 16, 0);
238 DO(u.udps_noportbcast, 16, 35);
239 DO(i.ips_notmember, 17, 0);
240 DO(u.udps_fullsock, 17, 35);
241 DO(i.ips_delivered, 18, 0);
242 DO(u.udps_opackets, 18, 35);
243 #undef DO
244 }
245
246 int
initip(void)247 initip(void)
248 {
249 size_t len;
250 int name[4];
251
252 name[0] = CTL_NET;
253 name[1] = PF_INET;
254 name[2] = IPPROTO_IP;
255 name[3] = IPCTL_STATS;
256
257 len = 0;
258 if (sysctl(name, 4, 0, &len, 0, 0) < 0) {
259 error("sysctl getting ipstat size failed");
260 return 0;
261 }
262 if (len > sizeof curstat.i) {
263 error("ipstat structure has grown--recompile systat!");
264 return 0;
265 }
266 if (sysctl(name, 4, &initstat.i, &len, 0, 0) < 0) {
267 error("sysctl getting ipstat failed");
268 return 0;
269 }
270 name[2] = IPPROTO_UDP;
271 name[3] = UDPCTL_STATS;
272
273 len = 0;
274 if (sysctl(name, 4, 0, &len, 0, 0) < 0) {
275 error("sysctl getting udpstat size failed");
276 return 0;
277 }
278 if (len > sizeof curstat.u) {
279 error("ipstat structure has grown--recompile systat!");
280 return 0;
281 }
282 if (sysctl(name, 4, &initstat.u, &len, 0, 0) < 0) {
283 error("sysctl getting udpstat failed");
284 return 0;
285 }
286 oldstat = initstat;
287 return 1;
288 }
289
290 void
resetip(void)291 resetip(void)
292 {
293 size_t len;
294 int name[4];
295
296 name[0] = CTL_NET;
297 name[1] = PF_INET;
298 name[2] = IPPROTO_IP;
299 name[3] = IPCTL_STATS;
300
301 len = sizeof initstat.i;
302 if (sysctl(name, 4, &initstat.i, &len, 0, 0) < 0) {
303 error("sysctl getting ipstat failed");
304 }
305 name[2] = IPPROTO_UDP;
306 name[3] = UDPCTL_STATS;
307
308 len = sizeof initstat.u;
309 if (sysctl(name, 4, &initstat.u, &len, 0, 0) < 0) {
310 error("sysctl getting udpstat failed");
311 }
312 oldstat = initstat;
313 }
314
315 void
fetchip(void)316 fetchip(void)
317 {
318 int name[4];
319 size_t len;
320
321 oldstat = curstat;
322 name[0] = CTL_NET;
323 name[1] = PF_INET;
324 name[2] = IPPROTO_IP;
325 name[3] = IPCTL_STATS;
326 len = sizeof curstat.i;
327
328 if (sysctl(name, 4, &curstat.i, &len, 0, 0) < 0)
329 return;
330 name[2] = IPPROTO_UDP;
331 name[3] = UDPCTL_STATS;
332 len = sizeof curstat.u;
333
334 if (sysctl(name, 4, &curstat.u, &len, 0, 0) < 0)
335 return;
336 }
337