1 /*- 2 * SPDX-License-Identifier: BSD-3-Clause 3 * 4 * Copyright (c) 1980, 1992, 1993 5 * The Regents of the University of California. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. Neither the name of the University nor the names of its contributors 16 * may be used to endorse or promote products derived from this software 17 * without specific prior written permission. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29 * SUCH DAMAGE. 30 */ 31 32 33 #ifdef lint 34 static const char sccsid[] = "@(#)mbufs.c 8.1 (Berkeley) 6/6/93"; 35 #endif 36 37 /* From: 38 "Id: mbufs.c,v 1.5 1997/02/24 20:59:03 wollman Exp" 39 */ 40 41 #ifdef INET6 42 #include <sys/param.h> 43 #include <sys/types.h> 44 #include <sys/socket.h> 45 #include <sys/sysctl.h> 46 47 #include <netinet/in.h> 48 #include <netinet/in_systm.h> 49 #include <netinet/ip.h> 50 #include <netinet6/ip6_var.h> 51 52 #include <inttypes.h> 53 #include <stdlib.h> 54 #include <string.h> 55 #include <paths.h> 56 57 #include "systat.h" 58 #include "extern.h" 59 #include "mode.h" 60 61 static struct ip6stat curstat, initstat, oldstat; 62 63 /*- 64 --0 1 2 3 4 5 6 7 65 --0123456789012345678901234567890123456789012345678901234567890123456789012345 66 00 IPv6 Input IPv6 Output 67 019999999 total packets received 999999999 total packets sent 68 029999999 - too short for header 999999999 - generated locally 69 039999999 - too short for data 999999999 - output drops 70 049999999 - with invalid version 999999999 output fragments generated 71 059999999 total fragments received 999999999 - fragmentation failed 72 069999999 - fragments dropped 999999999 destinations unreachable 73 079999999 - fragments timed out 999999999 packets output via raw IP 74 089999999 - fragments overflown 75 099999999 - packets reassembled ok Input next-header histogram 76 109999999 packets forwarded 999999999 - destination options 77 119999999 - unreachable dests 999999999 - hop-by-hop options 78 129999999 - redirects generated 999999999 - IPv4 79 139999999 option errors 999999999 - TCP 80 149999999 unwanted multicasts 999999999 - UDP 81 159999999 delivered to upper layer 999999999 - IPv6 82 169999999 bad scope packets 999999999 - routing header 83 179999999 address selection failed 999999999 - fragmentation header 84 18 999999999 - ICMP6 85 19 999999999 - none 86 --0123456789012345678901234567890123456789012345678901234567890123456789012345 87 --0 1 2 3 4 5 6 7 88 */ 89 90 WINDOW * 91 openip6(void) 92 { 93 return (subwin(stdscr, LINES-3-1, 0, MAINWIN_ROW, 0)); 94 } 95 96 void 97 closeip6(WINDOW *w) 98 { 99 if (w == NULL) 100 return; 101 wclear(w); 102 wrefresh(w); 103 delwin(w); 104 } 105 106 void 107 labelip6(void) 108 { 109 wmove(wnd, 0, 0); wclrtoeol(wnd); 110 #define L(row, str) mvwprintw(wnd, row, 10, str) 111 #define R(row, str) mvwprintw(wnd, row, 45, str); 112 L(0, "IPv6 Input"); R(0, "IPv6 Output"); 113 L(1, "total packets received"); R(1, "total packets sent"); 114 L(2, "- too short for header"); R(2, "- generated locally"); 115 L(3, "- too short for data"); R(3, "- output drops"); 116 L(4, "- with invalid version"); R(4, "output fragments generated"); 117 L(5, "total fragments received"); R(5, "- fragmentation failed"); 118 L(6, "- fragments dropped"); R(6, "destinations unreachable"); 119 L(7, "- fragments timed out"); R(7, "packets output via raw IP"); 120 L(8, "- fragments overflown"); 121 L(9, "- atomic fragments"); R(9, "Input next-header histogram"); 122 L(10, "- packets reassembled ok"); R(10, " - destination options"); 123 L(11, "packets forwarded"); R(11, " - hop-by-hop options"); 124 L(12, "- unreachable dests"); R(12, " - IPv4"); 125 L(13, "- redirects generated"); R(13, " - TCP"); 126 L(14, "option errors"); R(14, " - UDP"); 127 L(15, "unwanted multicasts"); R(15, " - IPv6"); 128 L(16, "delivered to upper layer"); R(16, " - routing header"); 129 L(17, "bad scope packets"); R(17, " - fragmentation header"); 130 L(18, "address selection failed");R(18, " - ICMP6"); 131 R(19, " - none"); 132 #undef L 133 #undef R 134 } 135 136 static void 137 domode(struct ip6stat *ret) 138 { 139 const struct ip6stat *sub; 140 int divisor = 1, i; 141 142 switch(currentmode) { 143 case display_RATE: 144 sub = &oldstat; 145 divisor = (delay > 1000000) ? delay / 1000000 : 1; 146 break; 147 case display_DELTA: 148 sub = &oldstat; 149 break; 150 case display_SINCE: 151 sub = &initstat; 152 break; 153 default: 154 *ret = curstat; 155 return; 156 } 157 #define DO(stat) ret->stat = (curstat.stat - sub->stat) / divisor 158 DO(ip6s_total); 159 DO(ip6s_tooshort); 160 DO(ip6s_toosmall); 161 DO(ip6s_fragments); 162 DO(ip6s_fragdropped); 163 DO(ip6s_fragtimeout); 164 DO(ip6s_fragoverflow); 165 DO(ip6s_atomicfrags); 166 DO(ip6s_forward); 167 DO(ip6s_cantforward); 168 DO(ip6s_redirectsent); 169 DO(ip6s_delivered); 170 DO(ip6s_localout); 171 DO(ip6s_odropped); 172 DO(ip6s_reassembled); 173 DO(ip6s_fragmented); 174 DO(ip6s_ofragments); 175 DO(ip6s_cantfrag); 176 DO(ip6s_badoptions); 177 DO(ip6s_noroute); 178 DO(ip6s_badvers); 179 DO(ip6s_rawout); 180 DO(ip6s_notmember); 181 for (i = 0; i < 256; i++) 182 DO(ip6s_nxthist[i]); 183 DO(ip6s_badscope); 184 DO(ip6s_sources_none); 185 #undef DO 186 } 187 188 void 189 showip6(void) 190 { 191 struct ip6stat stats; 192 uint64_t totalout; 193 194 domode(&stats); 195 totalout = stats.ip6s_forward + stats.ip6s_localout; 196 197 #define DO(stat, row, col) \ 198 mvwprintw(wnd, row, col, "%9"PRIu64, stats.stat) 199 200 DO(ip6s_total, 1, 0); 201 mvwprintw(wnd, 1, 35, "%9"PRIu64, totalout); 202 DO(ip6s_tooshort, 2, 0); 203 DO(ip6s_localout, 2, 35); 204 DO(ip6s_toosmall, 3, 0); 205 DO(ip6s_odropped, 3, 35); 206 DO(ip6s_badvers, 4, 0); 207 DO(ip6s_ofragments, 4, 35); 208 DO(ip6s_fragments, 5, 0); 209 DO(ip6s_cantfrag, 5, 35); 210 DO(ip6s_fragdropped, 6, 0); 211 DO(ip6s_noroute, 6, 35); 212 DO(ip6s_fragtimeout, 7, 0); 213 DO(ip6s_rawout, 7, 35); 214 DO(ip6s_fragoverflow, 8, 0); 215 DO(ip6s_atomicfrags, 9, 0); 216 DO(ip6s_reassembled, 10, 0); 217 DO(ip6s_forward, 11, 0); 218 DO(ip6s_nxthist[IPPROTO_DSTOPTS], 10, 35); 219 DO(ip6s_cantforward, 12, 0); 220 DO(ip6s_nxthist[IPPROTO_HOPOPTS], 11, 35); 221 DO(ip6s_redirectsent, 13, 0); 222 DO(ip6s_nxthist[IPPROTO_IPV4], 12, 35); 223 DO(ip6s_badoptions, 14, 0); 224 DO(ip6s_nxthist[IPPROTO_TCP], 13, 35); 225 DO(ip6s_notmember, 15, 0); 226 DO(ip6s_nxthist[IPPROTO_UDP], 14, 35); 227 DO(ip6s_delivered, 16, 0); 228 DO(ip6s_nxthist[IPPROTO_IPV6], 15, 35); 229 DO(ip6s_badscope, 17, 0); 230 DO(ip6s_nxthist[IPPROTO_ROUTING], 16, 35); 231 DO(ip6s_sources_none, 18, 0); 232 DO(ip6s_nxthist[IPPROTO_FRAGMENT], 17, 35); 233 DO(ip6s_nxthist[IPPROTO_ICMPV6], 18, 35); 234 DO(ip6s_nxthist[IPPROTO_NONE], 19, 35); 235 #undef DO 236 } 237 238 int 239 initip6(void) 240 { 241 size_t len; 242 int name[4]; 243 244 name[0] = CTL_NET; 245 name[1] = PF_INET6; 246 name[2] = IPPROTO_IPV6; 247 name[3] = IPV6CTL_STATS; 248 249 len = 0; 250 if (sysctl(name, 4, 0, &len, 0, 0) < 0) { 251 error("sysctl getting ip6stat size failed"); 252 return 0; 253 } 254 if (len > sizeof curstat) { 255 error("ip6stat structure has grown--recompile systat!"); 256 return 0; 257 } 258 if (sysctl(name, 4, &initstat, &len, 0, 0) < 0) { 259 error("sysctl getting ip6stat failed"); 260 return 0; 261 } 262 oldstat = initstat; 263 return 1; 264 } 265 266 void 267 resetip6(void) 268 { 269 size_t len; 270 int name[4]; 271 272 name[0] = CTL_NET; 273 name[1] = PF_INET6; 274 name[2] = IPPROTO_IPV6; 275 name[3] = IPV6CTL_STATS; 276 277 len = sizeof initstat; 278 if (sysctl(name, 4, &initstat, &len, 0, 0) < 0) { 279 error("sysctl getting ipstat failed"); 280 } 281 282 oldstat = initstat; 283 } 284 285 void 286 fetchip6(void) 287 { 288 int name[4]; 289 size_t len; 290 291 oldstat = curstat; 292 name[0] = CTL_NET; 293 name[1] = PF_INET6; 294 name[2] = IPPROTO_IPV6; 295 name[3] = IPV6CTL_STATS; 296 len = sizeof curstat; 297 298 if (sysctl(name, 4, &curstat, &len, 0, 0) < 0) 299 return; 300 } 301 302 #endif 303