ip6.c revision 175387
1/*-
2 * Copyright (c) 1980, 1992, 1993
3 *	The Regents of the University of California.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 *    must display the following acknowledgement:
15 *	This product includes software developed by the University of
16 *	California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 *    may be used to endorse or promote products derived from this software
19 *    without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34#include <sys/cdefs.h>
35
36__FBSDID("$FreeBSD: head/usr.bin/systat/ip6.c 175387 2008-01-16 19:27:43Z delphij $");
37
38#ifdef lint
39static const char sccsid[] = "@(#)mbufs.c	8.1 (Berkeley) 6/6/93";
40#endif
41
42/* From:
43	"Id: mbufs.c,v 1.5 1997/02/24 20:59:03 wollman Exp"
44*/
45
46#ifdef INET6
47#include <sys/param.h>
48#include <sys/types.h>
49#include <sys/socket.h>
50#include <sys/sysctl.h>
51
52#include <netinet/in.h>
53#include <netinet/in_systm.h>
54#include <netinet/ip.h>
55#include <netinet6/ip6_var.h>
56
57#include <stdlib.h>
58#include <string.h>
59#include <paths.h>
60
61#include "systat.h"
62#include "extern.h"
63#include "mode.h"
64
65static struct ip6stat curstat, initstat, oldstat;
66
67/*-
68--0         1         2         3         4         5         6         7
69--0123456789012345678901234567890123456789012345678901234567890123456789012345
7000        IPv6 Input                         IPv6 Output
71019999999 total packets received   999999999 total packets sent
72029999999 - too short for header   999999999 - generated locally
73039999999 - too short for data     999999999 - output drops
74049999999 - with invalid version   999999999 output fragments generated
75059999999 total fragments received 999999999 - fragmentation failed
76069999999 - fragments dropped      999999999 destinations unreachable
77079999999 - fragments timed out    999999999 packets output via raw IP
78089999999 - fragments overflown
79099999999 - packets reassembled ok           Input next-header histogram
80109999999 packets forwarded        999999999  - destination options
81119999999 - unreachable dests      999999999  - hop-by-hop options
82129999999 - redirects generated    999999999  - IPv4
83139999999 option errors            999999999  - TCP
84149999999 unwanted multicasts      999999999  - UDP
85159999999 delivered to upper layer 999999999  - IPv6
86169999999 bad scope packets        999999999  - routing header
87179999999 address selection failed 999999999  - fragmentation header
8818                                 999999999  - ICMP6
8919                                 999999999  - none
90--0123456789012345678901234567890123456789012345678901234567890123456789012345
91--0         1         2         3         4         5         6         7
92*/
93
94WINDOW *
95openip6(void)
96{
97	return (subwin(stdscr, LINES-3-1, 0, MAINWIN_ROW, 0));
98}
99
100void
101closeip6(WINDOW *w)
102{
103	if (w == NULL)
104		return;
105	wclear(w);
106	wrefresh(w);
107	delwin(w);
108}
109
110void
111labelip6(void)
112{
113	wmove(wnd, 0, 0); wclrtoeol(wnd);
114#define L(row, str) mvwprintw(wnd, row, 10, str)
115#define R(row, str) mvwprintw(wnd, row, 45, str);
116	L(0, "IPv6 Input");		R(0, "IPv6 Output");
117	L(1, "total packets received");	R(1, "total packets sent");
118	L(2, "- too short for header");	R(2, "- generated locally");
119	L(3, "- too short for data");	R(3, "- output drops");
120	L(4, "- with invalid version");	R(4, "output fragments generated");
121	L(5, "total fragments received"); R(5, "- fragmentation failed");
122	L(6, "- fragments dropped");	R(6, "destinations unreachable");
123	L(7, "- fragments timed out");	R(7, "packets output via raw IP");
124	L(8, "- fragments overflown");
125	L(9, "- packets reassembled ok"); R(9, "Input next-header histogram");
126	L(10, "packets forwarded");	R(10, " - destination options");
127	L(11, "- unreachable dests");	R(11, " - hop-by-hop options");
128	L(12, "- redirects generated");	R(12, " - IPv4");
129	L(13, "option errors");		R(13, " - TCP");
130	L(14, "unwanted multicasts");	R(14, " - UDP");
131	L(15, "delivered to upper layer"); R(15, " - IPv6");
132	L(16, "bad scope packets");	R(16, " - routing header");
133	L(17, "address selection failed"); R(17, " - fragmentation header");
134					R(18, " - ICMP6");
135					R(19, " - none");
136#undef L
137#undef R
138}
139
140static void
141domode(struct ip6stat *ret)
142{
143	const struct ip6stat *sub;
144	int divisor = 1, i;
145
146	switch(currentmode) {
147	case display_RATE:
148		sub = &oldstat;
149		divisor = naptime;
150		break;
151	case display_DELTA:
152		sub = &oldstat;
153		break;
154	case display_SINCE:
155		sub = &initstat;
156		break;
157	default:
158		*ret = curstat;
159		return;
160	}
161#define DO(stat) ret->stat = (curstat.stat - sub->stat) / divisor
162	DO(ip6s_total);
163	DO(ip6s_tooshort);
164	DO(ip6s_toosmall);
165	DO(ip6s_fragments);
166	DO(ip6s_fragdropped);
167	DO(ip6s_fragtimeout);
168	DO(ip6s_fragoverflow);
169	DO(ip6s_forward);
170	DO(ip6s_cantforward);
171	DO(ip6s_redirectsent);
172	DO(ip6s_delivered);
173	DO(ip6s_localout);
174	DO(ip6s_odropped);
175	DO(ip6s_reassembled);
176	DO(ip6s_fragmented);
177	DO(ip6s_ofragments);
178	DO(ip6s_cantfrag);
179	DO(ip6s_badoptions);
180	DO(ip6s_noroute);
181	DO(ip6s_badvers);
182	DO(ip6s_rawout);
183	DO(ip6s_notmember);
184	for (i = 0; i < 256; i++)
185		DO(ip6s_nxthist[i]);
186	DO(ip6s_badscope);
187	DO(ip6s_sources_none);
188#undef DO
189}
190
191void
192showip6(void)
193{
194	struct ip6stat stats;
195	u_long totalout;
196
197	domode(&stats);
198	totalout = stats.ip6s_forward + stats.ip6s_localout;
199
200#define DO(stat, row, col) \
201	mvwprintw(wnd, row, col, "%9lu", stats.stat)
202
203	DO(ip6s_total, 1, 0);
204	mvwprintw(wnd, 1, 35, "%9lu", totalout);
205	DO(ip6s_tooshort, 2, 0);
206	DO(ip6s_localout, 2, 35);
207	DO(ip6s_toosmall, 3, 0);
208	DO(ip6s_odropped, 3, 35);
209	DO(ip6s_badvers, 4, 0);
210	DO(ip6s_ofragments, 4, 35);
211	DO(ip6s_fragments, 5, 0);
212	DO(ip6s_cantfrag, 5, 35);
213	DO(ip6s_fragdropped, 6, 0);
214	DO(ip6s_noroute, 6, 35);
215	DO(ip6s_fragtimeout, 7, 0);
216	DO(ip6s_rawout, 7, 35);
217	DO(ip6s_fragoverflow, 8, 0);
218	DO(ip6s_reassembled, 9, 0);
219	DO(ip6s_forward, 10, 0);
220	DO(ip6s_nxthist[IPPROTO_DSTOPTS], 10, 35);
221	DO(ip6s_cantforward, 11, 0);
222	DO(ip6s_nxthist[IPPROTO_HOPOPTS], 11, 35);
223	DO(ip6s_redirectsent, 12, 0);
224	DO(ip6s_nxthist[IPPROTO_IPV4], 12, 35);
225	DO(ip6s_badoptions, 13, 0);
226	DO(ip6s_nxthist[IPPROTO_TCP], 13, 35);
227	DO(ip6s_notmember, 14, 0);
228	DO(ip6s_nxthist[IPPROTO_UDP], 14, 35);
229	DO(ip6s_delivered, 15, 0);
230	DO(ip6s_nxthist[IPPROTO_IPV6], 15, 35);
231	DO(ip6s_badscope, 16, 0);
232	DO(ip6s_nxthist[IPPROTO_ROUTING], 16, 35);
233	DO(ip6s_sources_none, 17, 0);
234	DO(ip6s_nxthist[IPPROTO_FRAGMENT], 17, 35);
235	DO(ip6s_nxthist[IPPROTO_ICMPV6], 18, 35);
236	DO(ip6s_nxthist[IPPROTO_NONE], 19, 35);
237#undef DO
238}
239
240int
241initip6(void)
242{
243	size_t len;
244	int name[4];
245
246	name[0] = CTL_NET;
247	name[1] = PF_INET6;
248	name[2] = IPPROTO_IPV6;
249	name[3] = IPV6CTL_STATS;
250
251	len = 0;
252	if (sysctl(name, 4, 0, &len, 0, 0) < 0) {
253		error("sysctl getting ip6stat size failed");
254		return 0;
255	}
256	if (len > sizeof curstat) {
257		error("ip6stat structure has grown--recompile systat!");
258		return 0;
259	}
260	if (sysctl(name, 4, &initstat, &len, 0, 0) < 0) {
261		error("sysctl getting ip6stat failed");
262		return 0;
263	}
264	oldstat = initstat;
265	return 1;
266}
267
268void
269resetip6(void)
270{
271	size_t len;
272	int name[4];
273
274	name[0] = CTL_NET;
275	name[1] = PF_INET6;
276	name[2] = IPPROTO_IPV6;
277	name[3] = IPV6CTL_STATS;
278
279	len = sizeof initstat;
280	if (sysctl(name, 4, &initstat, &len, 0, 0) < 0) {
281		error("sysctl getting ipstat failed");
282	}
283
284	oldstat = initstat;
285}
286
287void
288fetchip6(void)
289{
290	int name[4];
291	size_t len;
292
293	oldstat = curstat;
294	name[0] = CTL_NET;
295	name[1] = PF_INET6;
296	name[2] = IPPROTO_IPV6;
297	name[3] = IPV6CTL_STATS;
298	len = sizeof curstat;
299
300	if (sysctl(name, 4, &curstat, &len, 0, 0) < 0)
301		return;
302}
303
304#endif
305