2 * Copyright (c) 1980, 1992, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * @(#)mbufs.c 8.1 (Berkeley) 6/6/93
34 * $FreeBSD: src/usr.bin/systat/ip.c,v 1.3.2.1 2001/04/25 12:42:18 ru Exp $
35 * $DragonFly: src/usr.bin/systat/ip.c,v 1.2 2003/06/17 04:29:32 dillon Exp $
38 #include <sys/param.h>
39 #include <sys/types.h>
40 #include <sys/socket.h>
41 #include <sys/sysctl.h>
43 #include <netinet/in.h>
44 #include <netinet/in_systm.h>
45 #include <netinet/ip.h>
46 #include <netinet/ip_var.h>
47 #include <netinet/udp.h>
48 #include <netinet/udp_var.h>
62 static struct stat curstat, initstat, oldstat;
66 --0123456789012345678901234567890123456789012345678901234567890123456789012345
68 02999999999 total packets received 999999999 total packets sent
69 03999999999 - with bad checksums 999999999 - generated locally
70 04999999999 - too short for header 999999999 - output drops
71 05999999999 - too short for data 999999999 output fragments generated
72 06999999999 - with invalid hlen 999999999 - fragmentation failed
73 07999999999 - with invalid length 999999999 destinations unreachable
74 08999999999 - with invalid version 999999999 packets output via raw IP
75 09999999999 - jumbograms
76 10999999999 total fragments received UDP Statistics
77 11999999999 - fragments dropped 999999999 total input packets
78 12999999999 - fragments timed out 999999999 - too short for header
79 13999999999 - packets reassembled ok 999999999 - invalid checksum
80 14999999999 packets forwarded 999999999 - no checksum
81 15999999999 - unreachable dests 999999999 - invalid length
82 16999999999 - redirects generated 999999999 - no socket for dest port
83 17999999999 option errors 999999999 - no socket for broadcast
84 18999999999 unwanted multicasts 999999999 - socket buffer full
85 19999999999 delivered to upper layer 999999999 total output packets
86 --0123456789012345678901234567890123456789012345678901234567890123456789012345
93 return (subwin(stdscr, LINES-4-1, 0, 4, 0));
110 wmove(wnd, 0, 0); wclrtoeol(wnd);
111 #define L(row, str) mvwprintw(wnd, row, 10, str)
112 #define R(row, str) mvwprintw(wnd, row, 45, str);
113 L(1, "IP Input"); R(1, "IP Output");
114 L(2, "total packets received"); R(2, "total packets sent");
115 L(3, "- with bad checksums"); R(3, "- generated locally");
116 L(4, "- too short for header"); R(4, "- output drops");
117 L(5, "- too short for data"); R(5, "output fragments generated");
118 L(6, "- with invalid hlen"); R(6, "- fragmentation failed");
119 L(7, "- with invalid length"); R(7, "destinations unreachable");
120 L(8, "- with invalid version"); R(8, "packets output via raw IP");
121 L(9, "- jumbograms");
122 L(10, "total fragments received"); R(10, "UDP Statistics");
123 L(11, "- fragments dropped"); R(11, "total input packets");
124 L(12, "- fragments timed out"); R(12, "- too short for header");
125 L(13, "- packets reassembled ok"); R(13, "- invalid checksum");
126 L(14, "packets forwarded"); R(14, "- no checksum");
127 L(15, "- unreachable dests"); R(15, "- invalid length");
128 L(16, "- redirects generated"); R(16, "- no socket for dest port");
129 L(17, "option errors"); R(17, "- no socket for broadcast");
130 L(18, "unwanted multicasts"); R(18, "- socket buffer full");
131 L(19, "delivered to upper layer"); R(19, "total output packets");
137 domode(struct stat *ret)
139 const struct stat *sub;
142 switch(currentmode) {
157 #define DO(stat) ret->stat = (curstat.stat - sub->stat) / divisor
165 DO(i.ips_fragdropped);
166 DO(i.ips_fragtimeout);
168 DO(i.ips_cantforward);
169 DO(i.ips_redirectsent);
174 DO(i.ips_reassembled);
175 DO(i.ips_fragmented);
176 DO(i.ips_ofragments);
178 DO(i.ips_badoptions);
190 DO(u.udps_noportbcast);
203 totalout = stats.i.ips_forward + stats.i.ips_localout;
205 #define DO(stat, row, col) \
206 mvwprintw(wnd, row, col, "%9lu", stats.stat)
208 DO(i.ips_total, 2, 0);
209 mvwprintw(wnd, 2, 35, "%9lu", totalout);
210 DO(i.ips_badsum, 3, 0);
211 DO(i.ips_localout, 3, 35);
212 DO(i.ips_tooshort, 4, 0);
213 DO(i.ips_odropped, 4, 35);
214 DO(i.ips_toosmall, 5, 0);
215 DO(i.ips_ofragments, 5, 35);
216 DO(i.ips_badhlen, 6, 0);
217 DO(i.ips_cantfrag, 6, 35);
218 DO(i.ips_badlen, 7, 0);
219 DO(i.ips_noroute, 7, 35);
220 DO(i.ips_badvers, 8, 0);
221 DO(i.ips_rawout, 8, 35);
222 DO(i.ips_toolong, 9, 0);
223 DO(i.ips_fragments, 10, 0);
224 DO(i.ips_fragdropped, 11, 0);
225 DO(u.udps_ipackets, 11, 35);
226 DO(i.ips_fragtimeout, 12, 0);
227 DO(u.udps_hdrops, 12, 35);
228 DO(i.ips_reassembled, 13, 0);
229 DO(u.udps_badsum, 13, 35);
230 DO(i.ips_forward, 14, 0);
231 DO(u.udps_nosum, 14, 35);
232 DO(i.ips_cantforward, 15, 0);
233 DO(u.udps_badlen, 15, 35);
234 DO(i.ips_redirectsent, 16, 0);
235 DO(u.udps_noport, 16, 35);
236 DO(i.ips_badoptions, 17, 0);
237 DO(u.udps_noportbcast, 17, 35);
238 DO(i.ips_notmember, 18, 0);
239 DO(u.udps_fullsock, 18, 35);
240 DO(i.ips_delivered, 19, 0);
241 DO(u.udps_opackets, 19, 35);
253 name[2] = IPPROTO_IP;
254 name[3] = IPCTL_STATS;
257 if (sysctl(name, 4, 0, &len, 0, 0) < 0) {
258 error("sysctl getting ipstat size failed");
261 if (len > sizeof curstat.i) {
262 error("ipstat structure has grown--recompile systat!");
265 if (sysctl(name, 4, &initstat.i, &len, 0, 0) < 0) {
266 error("sysctl getting ipstat failed");
269 name[2] = IPPROTO_UDP;
270 name[3] = UDPCTL_STATS;
273 if (sysctl(name, 4, 0, &len, 0, 0) < 0) {
274 error("sysctl getting udpstat size failed");
277 if (len > sizeof curstat.u) {
278 error("ipstat structure has grown--recompile systat!");
281 if (sysctl(name, 4, &initstat.u, &len, 0, 0) < 0) {
282 error("sysctl getting udpstat failed");
297 name[2] = IPPROTO_IP;
298 name[3] = IPCTL_STATS;
300 len = sizeof initstat.i;
301 if (sysctl(name, 4, &initstat.i, &len, 0, 0) < 0) {
302 error("sysctl getting ipstat failed");
304 name[2] = IPPROTO_UDP;
305 name[3] = UDPCTL_STATS;
307 len = sizeof initstat.u;
308 if (sysctl(name, 4, &initstat.u, &len, 0, 0) < 0) {
309 error("sysctl getting udpstat failed");
323 name[2] = IPPROTO_IP;
324 name[3] = IPCTL_STATS;
325 len = sizeof curstat.i;
327 if (sysctl(name, 4, &curstat.i, &len, 0, 0) < 0)
329 name[2] = IPPROTO_UDP;
330 name[3] = UDPCTL_STATS;
331 len = sizeof curstat.u;
333 if (sysctl(name, 4, &curstat.u, &len, 0, 0) < 0)