93b9f50404
Resulting binary verified with strip(1)+md5(1).
345 lines
9.4 KiB
C
345 lines
9.4 KiB
C
/*-
|
|
* Copyright (c) 1980, 1992, 1993
|
|
* The Regents of the University of California. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by the University of
|
|
* California, Berkeley and its contributors.
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
#ifdef lint
|
|
static const char sccsid[] = "@(#)mbufs.c 8.1 (Berkeley) 6/6/93";
|
|
#endif
|
|
|
|
/* From:
|
|
"Id: mbufs.c,v 1.5 1997/02/24 20:59:03 wollman Exp"
|
|
*/
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/sysctl.h>
|
|
|
|
#include <netinet/in.h>
|
|
#include <netinet/in_systm.h>
|
|
#include <netinet/ip.h>
|
|
#include <netinet/ip_var.h>
|
|
#include <netinet/udp.h>
|
|
#include <netinet/udp_var.h>
|
|
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <paths.h>
|
|
|
|
#include "systat.h"
|
|
#include "extern.h"
|
|
#include "mode.h"
|
|
|
|
struct stat {
|
|
struct ipstat i;
|
|
struct udpstat u;
|
|
};
|
|
|
|
static struct stat curstat, initstat, oldstat;
|
|
|
|
/*-
|
|
--0 1 2 3 4 5 6 7
|
|
--0123456789012345678901234567890123456789012345678901234567890123456789012345
|
|
00 IP Input IP Output
|
|
01999999999 total packets received 999999999 total packets sent
|
|
02999999999 - with bad checksums 999999999 - generated locally
|
|
03999999999 - too short for header 999999999 - output drops
|
|
04999999999 - too short for data 999999999 output fragments generated
|
|
05999999999 - with invalid hlen 999999999 - fragmentation failed
|
|
06999999999 - with invalid length 999999999 destinations unreachable
|
|
07999999999 - with invalid version 999999999 packets output via raw IP
|
|
08999999999 - jumbograms
|
|
09999999999 total fragments received UDP Statistics
|
|
10999999999 - fragments dropped 999999999 total input packets
|
|
11999999999 - fragments timed out 999999999 - too short for header
|
|
12999999999 - packets reassembled ok 999999999 - invalid checksum
|
|
13999999999 packets forwarded 999999999 - no checksum
|
|
14999999999 - unreachable dests 999999999 - invalid length
|
|
15999999999 - redirects generated 999999999 - no socket for dest port
|
|
16999999999 option errors 999999999 - no socket for broadcast
|
|
17999999999 unwanted multicasts 999999999 - socket buffer full
|
|
18999999999 delivered to upper layer 999999999 total output packets
|
|
--0123456789012345678901234567890123456789012345678901234567890123456789012345
|
|
--0 1 2 3 4 5 6 7
|
|
*/
|
|
|
|
WINDOW *
|
|
openip(void)
|
|
{
|
|
return (subwin(stdscr, LINES-3-1, 0, MAINWIN_ROW, 0));
|
|
}
|
|
|
|
void
|
|
closeip(WINDOW *w)
|
|
{
|
|
if (w == NULL)
|
|
return;
|
|
wclear(w);
|
|
wrefresh(w);
|
|
delwin(w);
|
|
}
|
|
|
|
void
|
|
labelip(void)
|
|
{
|
|
wmove(wnd, 0, 0); wclrtoeol(wnd);
|
|
#define L(row, str) mvwprintw(wnd, row, 10, str)
|
|
#define R(row, str) mvwprintw(wnd, row, 45, str);
|
|
L(0, "IP Input"); R(0, "IP Output");
|
|
L(1, "total packets received"); R(1, "total packets sent");
|
|
L(2, "- with bad checksums"); R(2, "- generated locally");
|
|
L(3, "- too short for header"); R(3, "- output drops");
|
|
L(4, "- too short for data"); R(4, "output fragments generated");
|
|
L(5, "- with invalid hlen"); R(5, "- fragmentation failed");
|
|
L(6, "- with invalid length"); R(6, "destinations unreachable");
|
|
L(7, "- with invalid version"); R(7, "packets output via raw IP");
|
|
L(8, "- jumbograms");
|
|
L(9, "total fragments received"); R(9, "UDP Statistics");
|
|
L(10, "- fragments dropped"); R(10, "total input packets");
|
|
L(11, "- fragments timed out"); R(11, "- too short for header");
|
|
L(12, "- packets reassembled ok"); R(12, "- invalid checksum");
|
|
L(13, "packets forwarded"); R(13, "- no checksum");
|
|
L(14, "- unreachable dests"); R(14, "- invalid length");
|
|
L(15, "- redirects generated"); R(15, "- no socket for dest port");
|
|
L(16, "option errors"); R(16, "- no socket for broadcast");
|
|
L(17, "unwanted multicasts"); R(17, "- socket buffer full");
|
|
L(18, "delivered to upper layer"); R(18, "total output packets");
|
|
#undef L
|
|
#undef R
|
|
}
|
|
|
|
static void
|
|
domode(struct stat *ret)
|
|
{
|
|
const struct stat *sub;
|
|
int divisor = 1;
|
|
|
|
switch(currentmode) {
|
|
case display_RATE:
|
|
sub = &oldstat;
|
|
divisor = naptime;
|
|
break;
|
|
case display_DELTA:
|
|
sub = &oldstat;
|
|
break;
|
|
case display_SINCE:
|
|
sub = &initstat;
|
|
break;
|
|
default:
|
|
*ret = curstat;
|
|
return;
|
|
}
|
|
#define DO(stat) ret->stat = (curstat.stat - sub->stat) / divisor
|
|
DO(i.ips_total);
|
|
DO(i.ips_badsum);
|
|
DO(i.ips_tooshort);
|
|
DO(i.ips_toosmall);
|
|
DO(i.ips_badhlen);
|
|
DO(i.ips_badlen);
|
|
DO(i.ips_fragments);
|
|
DO(i.ips_fragdropped);
|
|
DO(i.ips_fragtimeout);
|
|
DO(i.ips_forward);
|
|
DO(i.ips_cantforward);
|
|
DO(i.ips_redirectsent);
|
|
DO(i.ips_noproto);
|
|
DO(i.ips_delivered);
|
|
DO(i.ips_localout);
|
|
DO(i.ips_odropped);
|
|
DO(i.ips_reassembled);
|
|
DO(i.ips_fragmented);
|
|
DO(i.ips_ofragments);
|
|
DO(i.ips_cantfrag);
|
|
DO(i.ips_badoptions);
|
|
DO(i.ips_noroute);
|
|
DO(i.ips_badvers);
|
|
DO(i.ips_rawout);
|
|
DO(i.ips_toolong);
|
|
DO(i.ips_notmember);
|
|
DO(u.udps_ipackets);
|
|
DO(u.udps_hdrops);
|
|
DO(u.udps_badsum);
|
|
DO(u.udps_nosum);
|
|
DO(u.udps_badlen);
|
|
DO(u.udps_noport);
|
|
DO(u.udps_noportbcast);
|
|
DO(u.udps_fullsock);
|
|
DO(u.udps_opackets);
|
|
#undef DO
|
|
}
|
|
|
|
void
|
|
showip(void)
|
|
{
|
|
struct stat stats;
|
|
u_long totalout;
|
|
|
|
domode(&stats);
|
|
totalout = stats.i.ips_forward + stats.i.ips_localout;
|
|
|
|
#define DO(stat, row, col) \
|
|
mvwprintw(wnd, row, col, "%9lu", stats.stat)
|
|
|
|
DO(i.ips_total, 1, 0);
|
|
mvwprintw(wnd, 1, 35, "%9lu", totalout);
|
|
DO(i.ips_badsum, 2, 0);
|
|
DO(i.ips_localout, 2, 35);
|
|
DO(i.ips_tooshort, 3, 0);
|
|
DO(i.ips_odropped, 3, 35);
|
|
DO(i.ips_toosmall, 4, 0);
|
|
DO(i.ips_ofragments, 4, 35);
|
|
DO(i.ips_badhlen, 5, 0);
|
|
DO(i.ips_cantfrag, 5, 35);
|
|
DO(i.ips_badlen, 6, 0);
|
|
DO(i.ips_noroute, 6, 35);
|
|
DO(i.ips_badvers, 7, 0);
|
|
DO(i.ips_rawout, 7, 35);
|
|
DO(i.ips_toolong, 8, 0);
|
|
DO(i.ips_fragments, 9, 0);
|
|
DO(i.ips_fragdropped, 10, 0);
|
|
DO(u.udps_ipackets, 10, 35);
|
|
DO(i.ips_fragtimeout, 11, 0);
|
|
DO(u.udps_hdrops, 11, 35);
|
|
DO(i.ips_reassembled, 12, 0);
|
|
DO(u.udps_badsum, 12, 35);
|
|
DO(i.ips_forward, 13, 0);
|
|
DO(u.udps_nosum, 13, 35);
|
|
DO(i.ips_cantforward, 14, 0);
|
|
DO(u.udps_badlen, 14, 35);
|
|
DO(i.ips_redirectsent, 15, 0);
|
|
DO(u.udps_noport, 15, 35);
|
|
DO(i.ips_badoptions, 16, 0);
|
|
DO(u.udps_noportbcast, 16, 35);
|
|
DO(i.ips_notmember, 17, 0);
|
|
DO(u.udps_fullsock, 17, 35);
|
|
DO(i.ips_delivered, 18, 0);
|
|
DO(u.udps_opackets, 18, 35);
|
|
#undef DO
|
|
}
|
|
|
|
int
|
|
initip(void)
|
|
{
|
|
size_t len;
|
|
int name[4];
|
|
|
|
name[0] = CTL_NET;
|
|
name[1] = PF_INET;
|
|
name[2] = IPPROTO_IP;
|
|
name[3] = IPCTL_STATS;
|
|
|
|
len = 0;
|
|
if (sysctl(name, 4, 0, &len, 0, 0) < 0) {
|
|
error("sysctl getting ipstat size failed");
|
|
return 0;
|
|
}
|
|
if (len > sizeof curstat.i) {
|
|
error("ipstat structure has grown--recompile systat!");
|
|
return 0;
|
|
}
|
|
if (sysctl(name, 4, &initstat.i, &len, 0, 0) < 0) {
|
|
error("sysctl getting ipstat failed");
|
|
return 0;
|
|
}
|
|
name[2] = IPPROTO_UDP;
|
|
name[3] = UDPCTL_STATS;
|
|
|
|
len = 0;
|
|
if (sysctl(name, 4, 0, &len, 0, 0) < 0) {
|
|
error("sysctl getting udpstat size failed");
|
|
return 0;
|
|
}
|
|
if (len > sizeof curstat.u) {
|
|
error("ipstat structure has grown--recompile systat!");
|
|
return 0;
|
|
}
|
|
if (sysctl(name, 4, &initstat.u, &len, 0, 0) < 0) {
|
|
error("sysctl getting udpstat failed");
|
|
return 0;
|
|
}
|
|
oldstat = initstat;
|
|
return 1;
|
|
}
|
|
|
|
void
|
|
resetip(void)
|
|
{
|
|
size_t len;
|
|
int name[4];
|
|
|
|
name[0] = CTL_NET;
|
|
name[1] = PF_INET;
|
|
name[2] = IPPROTO_IP;
|
|
name[3] = IPCTL_STATS;
|
|
|
|
len = sizeof initstat.i;
|
|
if (sysctl(name, 4, &initstat.i, &len, 0, 0) < 0) {
|
|
error("sysctl getting ipstat failed");
|
|
}
|
|
name[2] = IPPROTO_UDP;
|
|
name[3] = UDPCTL_STATS;
|
|
|
|
len = sizeof initstat.u;
|
|
if (sysctl(name, 4, &initstat.u, &len, 0, 0) < 0) {
|
|
error("sysctl getting udpstat failed");
|
|
}
|
|
oldstat = initstat;
|
|
}
|
|
|
|
void
|
|
fetchip(void)
|
|
{
|
|
int name[4];
|
|
size_t len;
|
|
|
|
oldstat = curstat;
|
|
name[0] = CTL_NET;
|
|
name[1] = PF_INET;
|
|
name[2] = IPPROTO_IP;
|
|
name[3] = IPCTL_STATS;
|
|
len = sizeof curstat.i;
|
|
|
|
if (sysctl(name, 4, &curstat.i, &len, 0, 0) < 0)
|
|
return;
|
|
name[2] = IPPROTO_UDP;
|
|
name[3] = UDPCTL_STATS;
|
|
len = sizeof curstat.u;
|
|
|
|
if (sysctl(name, 4, &curstat.u, &len, 0, 0) < 0)
|
|
return;
|
|
}
|
|
|