xref: /dflybsd-src/usr.bin/systat/ip.c (revision ac2e3f5effc58aa364c7e5c199f35ebbae7cda81)
1 /*-
2  * Copyright (c) 1980, 1992, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  *
33  * @(#)mbufs.c	8.1 (Berkeley) 6/6/93
34  * $FreeBSD: src/usr.bin/systat/ip.c,v 1.3.2.1 2001/04/25 12:42:18 ru Exp $
35  * $DragonFly: src/usr.bin/systat/ip.c,v 1.3 2003/07/12 03:09:50 dillon Exp $
36  */
37 
38 #include <sys/param.h>
39 #include <sys/types.h>
40 #include <sys/socket.h>
41 #include <sys/sysctl.h>
42 
43 #include <netinet/in.h>
44 #include <netinet/in_systm.h>
45 #include <netinet/ip.h>
46 #include <netinet/ip_var.h>
47 #include <netinet/udp.h>
48 #include <netinet/udp_var.h>
49 
50 #include <stdlib.h>
51 #include <string.h>
52 #include <paths.h>
53 #include "systat.h"
54 #include "extern.h"
55 #include "mode.h"
56 
57 struct stat {
58 	struct ipstat i;
59 	struct udpstat u;
60 };
61 
62 static struct stat curstat, initstat, oldstat;
63 
64 /*-
65 --0         1         2         3         4         5         6         7
66 --0123456789012345678901234567890123456789012345678901234567890123456789012345
67 01          IP Input                           IP Output
68 02999999999 total packets received   999999999 total packets sent
69 03999999999 - with bad checksums     999999999 - generated locally
70 04999999999 - too short for header   999999999 - output drops
71 05999999999 - too short for data     999999999 output fragments generated
72 06999999999 - with invalid hlen      999999999 - fragmentation failed
73 07999999999 - with invalid length    999999999 destinations unreachable
74 08999999999 - with invalid version   999999999 packets output via raw IP
75 09999999999 - jumbograms
76 10999999999 total fragments received           UDP Statistics
77 11999999999 - fragments dropped      999999999 total input packets
78 12999999999 - fragments timed out    999999999 - too short for header
79 13999999999 - packets reassembled ok 999999999 - invalid checksum
80 14999999999 packets forwarded        999999999 - no checksum
81 15999999999 - unreachable dests      999999999 - invalid length
82 16999999999 - redirects generated    999999999 - no socket for dest port
83 17999999999 option errors            999999999 - no socket for broadcast
84 18999999999 unwanted multicasts      999999999 - socket buffer full
85 19999999999 delivered to upper layer 999999999 total output packets
86 --0123456789012345678901234567890123456789012345678901234567890123456789012345
87 --0         1         2         3         4         5         6         7
88 */
89 
90 WINDOW *
91 openip(void)
92 {
93 	return (subwin(stdscr, LINES-4-1, 0, 4, 0));
94 }
95 
96 void
97 closeip(w)
98 	WINDOW *w;
99 {
100 	if (w == NULL)
101 		return;
102 	wclear(w);
103 	wrefresh(w);
104 	delwin(w);
105 }
106 
107 void
108 labelip(void)
109 {
110 	wmove(wnd, 0, 0); wclrtoeol(wnd);
111 #define L(row, str) mvwprintw(wnd, row, 10, str)
112 #define R(row, str) mvwprintw(wnd, row, 45, str);
113 	L(1, "IP Input");			R(1, "IP Output");
114 	L(2, "total packets received");		R(2, "total packets sent");
115 	L(3, "- with bad checksums");		R(3, "- generated locally");
116 	L(4, "- too short for header");		R(4, "- output drops");
117 	L(5, "- too short for data");	R(5, "output fragments generated");
118 	L(6, "- with invalid hlen");	R(6, "- fragmentation failed");
119 	L(7, "- with invalid length");	R(7, "destinations unreachable");
120 	L(8, "- with invalid version");	R(8, "packets output via raw IP");
121 	L(9, "- jumbograms");
122 	L(10, "total fragments received");	R(10, "UDP Statistics");
123 	L(11, "- fragments dropped");	R(11, "total input packets");
124 	L(12, "- fragments timed out");	R(12, "- too short for header");
125 	L(13, "- packets reassembled ok");	R(13, "- invalid checksum");
126 	L(14, "packets forwarded");	R(14, "- no checksum");
127 	L(15, "- unreachable dests");	R(15, "- invalid length");
128 	L(16, "- redirects generated");	R(16, "- no socket for dest port");
129 	L(17, "option errors");		R(17, "- no socket for broadcast");
130 	L(18, "unwanted multicasts");	R(18, "- socket buffer full");
131 	L(19, "delivered to upper layer");	R(19, "total output packets");
132 #undef L
133 #undef R
134 }
135 
136 static void
137 domode(struct stat *ret)
138 {
139 	const struct stat *sub;
140 	double divisor = 1.0;
141 
142 	switch(currentmode) {
143 	case display_RATE:
144 		sub = &oldstat;
145 		divisor = naptime;
146 		break;
147 	case display_DELTA:
148 		sub = &oldstat;
149 		break;
150 	case display_SINCE:
151 		sub = &initstat;
152 		break;
153 	default:
154 		*ret = curstat;
155 		return;
156 	}
157 #define DO(stat) ret->stat = (double)(curstat.stat - sub->stat) / divisor
158 	DO(i.ips_total);
159 	DO(i.ips_badsum);
160 	DO(i.ips_tooshort);
161 	DO(i.ips_toosmall);
162 	DO(i.ips_badhlen);
163 	DO(i.ips_badlen);
164 	DO(i.ips_fragments);
165 	DO(i.ips_fragdropped);
166 	DO(i.ips_fragtimeout);
167 	DO(i.ips_forward);
168 	DO(i.ips_cantforward);
169 	DO(i.ips_redirectsent);
170 	DO(i.ips_noproto);
171 	DO(i.ips_delivered);
172 	DO(i.ips_localout);
173 	DO(i.ips_odropped);
174 	DO(i.ips_reassembled);
175 	DO(i.ips_fragmented);
176 	DO(i.ips_ofragments);
177 	DO(i.ips_cantfrag);
178 	DO(i.ips_badoptions);
179 	DO(i.ips_noroute);
180 	DO(i.ips_badvers);
181 	DO(i.ips_rawout);
182 	DO(i.ips_toolong);
183 	DO(i.ips_notmember);
184 	DO(u.udps_ipackets);
185 	DO(u.udps_hdrops);
186 	DO(u.udps_badsum);
187 	DO(u.udps_nosum);
188 	DO(u.udps_badlen);
189 	DO(u.udps_noport);
190 	DO(u.udps_noportbcast);
191 	DO(u.udps_fullsock);
192 	DO(u.udps_opackets);
193 #undef DO
194 }
195 
196 void
197 showip(void)
198 {
199 	struct stat stats;
200 	u_long totalout;
201 
202 	domode(&stats);
203 	totalout = stats.i.ips_forward + stats.i.ips_localout;
204 
205 #define DO(stat, row, col) \
206 	mvwprintw(wnd, row, col, "%9lu", stats.stat)
207 
208 	DO(i.ips_total, 2, 0);
209 	mvwprintw(wnd, 2, 35, "%9lu", totalout);
210 	DO(i.ips_badsum, 3, 0);
211 	DO(i.ips_localout, 3, 35);
212 	DO(i.ips_tooshort, 4, 0);
213 	DO(i.ips_odropped, 4, 35);
214 	DO(i.ips_toosmall, 5, 0);
215 	DO(i.ips_ofragments, 5, 35);
216 	DO(i.ips_badhlen, 6, 0);
217 	DO(i.ips_cantfrag, 6, 35);
218 	DO(i.ips_badlen, 7, 0);
219 	DO(i.ips_noroute, 7, 35);
220 	DO(i.ips_badvers, 8, 0);
221 	DO(i.ips_rawout, 8, 35);
222 	DO(i.ips_toolong, 9, 0);
223 	DO(i.ips_fragments, 10, 0);
224 	DO(i.ips_fragdropped, 11, 0);
225 	DO(u.udps_ipackets, 11, 35);
226 	DO(i.ips_fragtimeout, 12, 0);
227 	DO(u.udps_hdrops, 12, 35);
228 	DO(i.ips_reassembled, 13, 0);
229 	DO(u.udps_badsum, 13, 35);
230 	DO(i.ips_forward, 14, 0);
231 	DO(u.udps_nosum, 14, 35);
232 	DO(i.ips_cantforward, 15, 0);
233 	DO(u.udps_badlen, 15, 35);
234 	DO(i.ips_redirectsent, 16, 0);
235 	DO(u.udps_noport, 16, 35);
236 	DO(i.ips_badoptions, 17, 0);
237 	DO(u.udps_noportbcast, 17, 35);
238 	DO(i.ips_notmember, 18, 0);
239 	DO(u.udps_fullsock, 18, 35);
240 	DO(i.ips_delivered, 19, 0);
241 	DO(u.udps_opackets, 19, 35);
242 #undef DO
243 }
244 
245 int
246 initip(void)
247 {
248 	size_t len;
249 	int name[4];
250 
251 	name[0] = CTL_NET;
252 	name[1] = PF_INET;
253 	name[2] = IPPROTO_IP;
254 	name[3] = IPCTL_STATS;
255 
256 	len = 0;
257 	if (sysctl(name, 4, 0, &len, 0, 0) < 0) {
258 		error("sysctl getting ipstat size failed");
259 		return 0;
260 	}
261 	if (len > sizeof curstat.i) {
262 		error("ipstat structure has grown--recompile systat!");
263 		return 0;
264 	}
265 	if (sysctl(name, 4, &initstat.i, &len, 0, 0) < 0) {
266 		error("sysctl getting ipstat failed");
267 		return 0;
268 	}
269 	name[2] = IPPROTO_UDP;
270 	name[3] = UDPCTL_STATS;
271 
272 	len = 0;
273 	if (sysctl(name, 4, 0, &len, 0, 0) < 0) {
274 		error("sysctl getting udpstat size failed");
275 		return 0;
276 	}
277 	if (len > sizeof curstat.u) {
278 		error("ipstat structure has grown--recompile systat!");
279 		return 0;
280 	}
281 	if (sysctl(name, 4, &initstat.u, &len, 0, 0) < 0) {
282 		error("sysctl getting udpstat failed");
283 		return 0;
284 	}
285 	oldstat = initstat;
286 	return 1;
287 }
288 
289 void
290 resetip(void)
291 {
292 	size_t len;
293 	int name[4];
294 
295 	name[0] = CTL_NET;
296 	name[1] = PF_INET;
297 	name[2] = IPPROTO_IP;
298 	name[3] = IPCTL_STATS;
299 
300 	len = sizeof initstat.i;
301 	if (sysctl(name, 4, &initstat.i, &len, 0, 0) < 0) {
302 		error("sysctl getting ipstat failed");
303 	}
304 	name[2] = IPPROTO_UDP;
305 	name[3] = UDPCTL_STATS;
306 
307 	len = sizeof initstat.u;
308 	if (sysctl(name, 4, &initstat.u, &len, 0, 0) < 0) {
309 		error("sysctl getting udpstat failed");
310 	}
311 	oldstat = initstat;
312 }
313 
314 void
315 fetchip(void)
316 {
317 	int name[4];
318 	size_t len;
319 
320 	oldstat = curstat;
321 	name[0] = CTL_NET;
322 	name[1] = PF_INET;
323 	name[2] = IPPROTO_IP;
324 	name[3] = IPCTL_STATS;
325 	len = sizeof curstat.i;
326 
327 	if (sysctl(name, 4, &curstat.i, &len, 0, 0) < 0)
328 		return;
329 	name[2] = IPPROTO_UDP;
330 	name[3] = UDPCTL_STATS;
331 	len = sizeof curstat.u;
332 
333 	if (sysctl(name, 4, &curstat.u, &len, 0, 0) < 0)
334 		return;
335 }
336 
337