Current Path : /compat/linux/proc/self/root/usr/src/release/picobsd/tinyware/ns/ |
FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64 |
Current File : //compat/linux/proc/self/root/usr/src/release/picobsd/tinyware/ns/ns.c |
/*- * Copyright (c) 1998 Andrzej Bialecki * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * $FreeBSD: release/9.1.0/release/picobsd/tinyware/ns/ns.c 191565 2009-04-27 16:57:19Z luigi $ */ /* * Small replacement for netstat. Uses only sysctl(3) to get the info. */ #include <sys/types.h> #include <sys/time.h> #include <sys/sysctl.h> #include <sys/socket.h> #include <sys/un.h> #include <net/if.h> #include <net/route.h> #include <net/if_dl.h> #include <netinet/in_systm.h> #include <netinet/in.h> #include <netinet/ip.h> #include <netinet/ip_icmp.h> #include <netinet/icmp_var.h> #include <netinet/ip_var.h> #include <netinet/tcp.h> #include <netinet/tcp_timer.h> #include <netinet/tcp_var.h> #include <netinet/udp.h> #include <netinet/udp_var.h> #include <arpa/inet.h> #include <err.h> #include <errno.h> #include <osreldate.h> #include <stdio.h> #include <stdlib.h> #include <string.h> #include <unistd.h> char *progname; int iflag = 0; int lflag = 0; /* print cpu load info */ int rflag = 0; int sflag = 0; int pflag = 0; int wflag = 0; /* repeat every wait seconds */ int delta = 0 ; extern char *optarg; extern int optind; void print_load_stats(void); void usage() { fprintf(stderr, "\n%s [-nrsil] [-p proto] [-w wait]\n", progname); fprintf(stderr, " proto: {ip|tcp|udp|icmp}\n\n"); } /* * The following parts related to retrieving the routing table and * interface information, were borrowed from R. Stevens' code examples * accompanying his excellent book. Thanks! */ char * sock_ntop(const struct sockaddr *sa, size_t salen) { char portstr[7]; static char str[128]; /* Unix domain is largest */ switch (sa->sa_family) { case 255: { int i = 0; u_long mask; u_int index = 1 << 31; u_short new_mask = 0; mask = ntohl(((struct sockaddr_in *)sa)->sin_addr.s_addr); while (mask & index) { new_mask++; index >>= 1; } sprintf(str, "/%hu", new_mask); return (str); } case AF_UNSPEC: case AF_INET: { struct sockaddr_in *sin = (struct sockaddr_in *)sa; if (inet_ntop(AF_INET, &sin->sin_addr, str, sizeof(str)) == NULL) return (NULL); if (ntohs(sin->sin_port) != 0) { snprintf(portstr, sizeof(portstr), ".%d", ntohs(sin->sin_port)); strcat(str, portstr); } if (strcmp(str, "0.0.0.0") == 0) sprintf(str, "default"); return (str); } case AF_UNIX: { struct sockaddr_un *unp = (struct sockaddr_un *)sa; /* * OK to have no pathname bound to the socket: * happens on every connect() unless client calls * bind() first. */ if (unp->sun_path[0] == 0) strcpy(str, "(no pathname bound)"); else snprintf(str, sizeof(str), "%s", unp->sun_path); return (str); } case AF_LINK: { struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; if (sdl->sdl_nlen > 0) { bcopy(&sdl->sdl_data[0], str, sdl->sdl_nlen); str[sdl->sdl_nlen] = '\0'; } else snprintf(str, sizeof(str), "link#%d", sdl->sdl_index); return (str); } default: snprintf(str, sizeof(str), "sock_ntop: unknown AF_xxx: %d, len %d", sa->sa_family, salen); return (str); } return (NULL); } char * Sock_ntop(const struct sockaddr *sa, size_t salen) { char *ptr; if ((ptr = sock_ntop(sa, salen)) == NULL) err(1, "sock_ntop error"); /* inet_ntop() sets errno */ return (ptr); } #define ROUNDUP(a,size) (((a) & ((size)-1))?(1+((a)|((size)-1))):(a)) #define NEXT_SA(ap) \ ap=(struct sockaddr *) \ ((caddr_t)ap+(ap->sa_len?ROUNDUP(ap->sa_len,sizeof(u_long)):\ sizeof(u_long))) void get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info) { int i; for (i = 0; i < RTAX_MAX; i++) { if (addrs & (1 << i)) { rti_info[i] = sa; NEXT_SA(sa); } else rti_info[i] = NULL; } } void get_flags(char *buf, int flags) { if (flags & 0x1) strcat(buf, "U"); if (flags & 0x2) strcat(buf, "G"); if (flags & 0x4) strcat(buf, "H"); if (flags & 0x8) strcat(buf, "r"); if (flags & 0x10) strcat(buf, "d"); #ifdef NEVER if (flags & 0x20) strcat(buf, "mod,"); #endif /*NEVER*/ if (flags & 0x100) strcat(buf, "C"); if (flags & 0x400) strcat(buf, "L"); if (flags & 0x800) strcat(buf, "S"); if (flags & 0x10000) strcat(buf, "c"); if (flags & 0x20000) strcat(buf, "W"); #ifdef NEVER if (flags & 0x200000) strcat(buf, ",LOC"); #endif /*NEVER*/ if (flags & 0x400000) strcat(buf, "b"); #ifdef NEVER if (flags & 0x800000) strcat(buf, ",MCA"); #endif /*NEVER*/ } void print_routing(char *proto) { int mib[6]; int i = 0; int rt_len; int if_len; int if_num; char *rt_buf; char *if_buf; char *next; char *lim; struct rt_msghdr *rtm; struct if_msghdr *ifm; struct if_msghdr **ifm_table; struct ifa_msghdr *ifam; struct sockaddr *sa; struct sockaddr *sa1; struct sockaddr *rti_info[RTAX_MAX]; struct sockaddr **if_table; struct rt_metrics rm; char fbuf[50]; /* keep a copy of statistics here for future use */ static unsigned *base_stats = NULL ; static unsigned base_len = 0 ; /* Get the routing table */ mib[0] = CTL_NET; mib[1] = PF_ROUTE; mib[2] = 0; mib[3] = 0; mib[4] = NET_RT_DUMP; mib[5] = 0; /*Estimate the size of table */ if (sysctl(mib, 6, NULL, &rt_len, NULL, 0) == -1) { perror("sysctl size"); exit(-1); } if ((rt_buf = (char *)malloc(rt_len)) == NULL) { perror("malloc"); exit(-1); } /* Now get it. */ if (sysctl(mib, 6, rt_buf, &rt_len, NULL, 0) == -1) { perror("sysctl get"); exit(-1); } /* Get the interfaces table */ mib[0] = CTL_NET; mib[1] = PF_ROUTE; mib[2] = 0; mib[3] = 0; mib[4] = NET_RT_IFLIST; mib[5] = 0; /* Estimate the size of table */ if (sysctl(mib, 6, NULL, &if_len, NULL, 0) == -1) { perror("sysctl size"); exit(-1); } if ((if_buf = (char *)malloc(if_len)) == NULL) { perror("malloc"); exit(-1); } /* Now get it. */ if (sysctl(mib, 6, if_buf, &if_len, NULL, 0) == -1) { perror("sysctl get"); exit(-1); } lim = if_buf + if_len; i = 0; for (next = if_buf, i = 0; next < lim; next += ifm->ifm_msglen) { ifm = (struct if_msghdr *)next; i++; } if_num = i; if_table = (struct sockaddr **)calloc(i, sizeof(struct sockaddr)); ifm_table = (struct if_msghdr **)calloc(i, sizeof(struct if_msghdr)); if (iflag) { printf("\nInterface table:\n"); printf("----------------\n"); printf("Name Mtu Network Address " "Ipkts Ierrs Opkts Oerrs Coll\n"); } /* scan the list and store base values */ i = 0 ; for (next = if_buf; next < lim; next += ifm->ifm_msglen) { ifm = (struct if_msghdr *)next; i++ ; } if (base_stats == NULL || i != base_len) { base_stats = calloc(i*5, sizeof(unsigned)); base_len = i ; } i = 0; for (next = if_buf; next < lim; next += ifm->ifm_msglen) { ifm = (struct if_msghdr *)next; if_table[i] = (struct sockaddr *)(ifm + 1); ifm_table[i] = ifm; sa = if_table[i]; if (iflag && sa->sa_family == AF_LINK) { struct sockaddr_dl *sdl = (struct sockaddr_dl *)sa; unsigned *bp = &base_stats[i*5]; printf("%-4s %-5d <Link> ", sock_ntop(if_table[i], if_table[i]->sa_len), ifm->ifm_data.ifi_mtu); if (sdl->sdl_alen == 6) { unsigned char *p = sdl->sdl_data + sdl->sdl_nlen; printf("%02x:%02x:%02x:%02x:%02x:%02x ", p[0], p[1], p[2], p[3], p[4], p[5]); } else printf(" "); printf("%9d%6d%9d%6d%6d\n", ifm->ifm_data.ifi_ipackets - bp[0], ifm->ifm_data.ifi_ierrors - bp[1], ifm->ifm_data.ifi_opackets - bp[2], ifm->ifm_data.ifi_oerrors - bp[3], ifm->ifm_data.ifi_collisions -bp[4]); if (delta > 0) { bp[0] = ifm->ifm_data.ifi_ipackets ; bp[1] = ifm->ifm_data.ifi_ierrors ; bp[2] = ifm->ifm_data.ifi_opackets ; bp[3] = ifm->ifm_data.ifi_oerrors ; bp[4] = ifm->ifm_data.ifi_collisions ; } } i++; } if (!rflag) { free(rt_buf); free(if_buf); free(if_table); free(ifm_table); return; } /* Now dump the routing table */ printf("\nRouting table:\n"); printf("--------------\n"); printf ("Destination Gateway Flags Netif Use\n"); lim = rt_buf + rt_len; for (next = rt_buf; next < lim; next += rtm->rtm_msglen) { rtm = (struct rt_msghdr *)next; sa = (struct sockaddr *)(rtm + 1); get_rtaddrs(rtm->rtm_addrs, sa, rti_info); if ((sa = rti_info[RTAX_DST]) != NULL) { sprintf(fbuf, "%s", sock_ntop(sa, sa->sa_len)); if (((sa1 = rti_info[RTAX_NETMASK]) != NULL) && sa1->sa_family == 255) { strcat(fbuf, sock_ntop(sa1, sa1->sa_len)); } printf("%-19s", fbuf); } if ((sa = rti_info[RTAX_GATEWAY]) != NULL) { printf("%-19s", sock_ntop(sa, sa->sa_len)); } memset(fbuf, 0, sizeof(fbuf)); get_flags(fbuf, rtm->rtm_flags); printf("%-10s", fbuf); for (i = 0; i < if_num; i++) { ifm = ifm_table[i]; if ((ifm->ifm_index == rtm->rtm_index) && (ifm->ifm_data.ifi_type > 0)) { sa = if_table[i]; break; } } if (ifm->ifm_type == RTM_IFINFO) { get_rtaddrs(ifm->ifm_addrs, sa, rti_info); printf(" %s", Sock_ntop(sa, sa->sa_len)); } else if (ifm->ifm_type == RTM_NEWADDR) { ifam = (struct ifa_msghdr *)ifm_table[rtm->rtm_index - 1]; sa = (struct sockaddr *)(ifam + 1); get_rtaddrs(ifam->ifam_addrs, sa, rti_info); printf(" %s", Sock_ntop(sa, sa->sa_len)); } /* printf(" %u", rtm->rtm_use); */ printf("\n"); } free(rt_buf); free(if_buf); free(if_table); free(ifm_table); } void print_ip_stats(void) { int mib[4]; int len; struct ipstat s; mib[0] = CTL_NET; mib[1] = PF_INET; mib[2] = IPPROTO_IP; #ifndef IPCTL_STATS printf("sorry, ip stats not available\n"); return -1; #else mib[3] = IPCTL_STATS; len = sizeof(struct ipstat); if (sysctl(mib, 4, &s, &len, NULL, 0) < 0) { perror("sysctl"); return; } printf("\nIP statistics:\n"); printf("--------------\n"); printf(" %10lu total packets received\n", s.ips_total); printf("* Packets ok:\n"); printf(" %10lu fragments received\n", s.ips_fragments); printf(" %10lu forwarded\n", s.ips_forward); #if __FreeBSD_version > 300001 printf(" %10lu fast forwarded\n", s.ips_fastforward); #endif printf(" %10lu forwarded on same net (redirect)\n", s.ips_redirectsent); printf(" %10lu delivered to upper level\n", s.ips_delivered); printf(" %10lu total ip packets generated here\n", s.ips_localout); printf(" %10lu total packets reassembled ok\n", s.ips_reassembled); printf(" %10lu total datagrams successfully fragmented\n", s.ips_fragmented); printf(" %10lu output fragments created\n", s.ips_ofragments); printf(" %10lu total raw IP packets generated\n", s.ips_rawout); printf("\n* Bad packets:\n"); printf(" %10lu bad checksum\n", s.ips_badsum); printf(" %10lu too short\n", s.ips_tooshort); printf(" %10lu not enough data (too small)\n", s.ips_toosmall); printf(" %10lu more data than declared in header\n", s.ips_badhlen); printf(" %10lu less data than declared in header\n", s.ips_badlen); printf(" %10lu fragments dropped (dups, no mbuf)\n", s.ips_fragdropped); printf(" %10lu fragments timed out in reassembly\n", s.ips_fragtimeout); printf(" %10lu received for unreachable dest.\n", s.ips_cantforward); printf(" %10lu unknown or unsupported protocol\n", s.ips_noproto); printf(" %10lu lost due to no bufs etc.\n", s.ips_odropped); printf(" %10lu couldn't fragment (DF set, etc.)\n", s.ips_cantfrag); printf(" %10lu error in IP options processing\n", s.ips_badoptions); printf(" %10lu dropped due to no route\n", s.ips_noroute); printf(" %10lu bad IP version\n", s.ips_badvers); printf(" %10lu too long (more than max IP size)\n", s.ips_toolong); #if __FreeBSD_version > 300001 printf(" %10lu multicast for unregistered groups\n", s.ips_notmember); #endif #endif } void print_tcp_stats(void) { int mib[4]; int len; struct tcpstat s; mib[0] = CTL_NET; mib[1] = PF_INET; mib[2] = IPPROTO_TCP; #ifndef TCPCTL_STATS printf("sorry, tcp stats not available\n"); return; #else mib[3] = TCPCTL_STATS; len = sizeof(struct tcpstat); if (sysctl(mib, 4, &s, &len, NULL, 0) < 0) { perror("sysctl"); return; } printf("\nTCP statistics:\n"); printf("---------------\n"); printf("* Connections:\n"); printf(" %10lu initiated\n", s.tcps_connattempt); printf(" %10lu accepted\n", s.tcps_accepts); printf(" %10lu established\n", s.tcps_connects); printf(" %10lu dropped\n", s.tcps_drops); printf(" %10lu embryonic connections dropped\n", s.tcps_conndrops); printf(" %10lu closed (includes dropped)\n", s.tcps_closed); printf(" %10lu segments where we tried to get RTT\n", s.tcps_segstimed); printf(" %10lu times RTT successfully updated\n", s.tcps_rttupdated); printf(" %10lu delayed ACKs sent\n", s.tcps_delack); printf(" %10lu dropped in rxmt timeout\n", s.tcps_timeoutdrop); printf(" %10lu retrasmit timeouts\n", s.tcps_rexmttimeo); printf(" %10lu persist timeouts\n", s.tcps_persisttimeo); printf(" %10lu keepalive timeouts\n", s.tcps_keeptimeo); printf(" %10lu keepalive probes sent\n", s.tcps_keepprobe); printf(" %10lu dropped in keepalive\n", s.tcps_keepdrops); printf("* Packets sent:\n"); printf(" %10lu total packets sent\n", s.tcps_sndtotal); printf(" %10lu data packets sent\n", s.tcps_sndpack); printf(" %10lu data bytes sent\n", s.tcps_sndbyte); printf(" %10lu data packets retransmitted\n", s.tcps_sndrexmitpack); printf(" %10lu data bytes retransmitted\n", s.tcps_sndrexmitbyte); printf(" %10lu ACK-only packets sent\n", s.tcps_sndacks); printf(" %10lu window probes sent\n", s.tcps_sndprobe); printf(" %10lu URG-only packets sent\n", s.tcps_sndurg); printf(" %10lu window update-only packets sent\n", s.tcps_sndwinup); printf(" %10lu control (SYN,FIN,RST) packets sent\n", s.tcps_sndctrl); printf("* Packets received:\n"); printf(" %10lu total packets received\n", s.tcps_rcvtotal); printf(" %10lu packets in sequence\n", s.tcps_rcvpack); printf(" %10lu bytes in sequence\n", s.tcps_rcvbyte); printf(" %10lu packets with bad checksum\n", s.tcps_rcvbadsum); printf(" %10lu packets with bad offset\n", s.tcps_rcvbadoff); printf(" %10lu packets too short\n", s.tcps_rcvshort); printf(" %10lu duplicate-only packets\n", s.tcps_rcvduppack); printf(" %10lu duplicate-only bytes\n", s.tcps_rcvdupbyte); printf(" %10lu packets with some duplicate data\n", s.tcps_rcvpartduppack); printf(" %10lu duplicate bytes in partially dup. packets\n", s.tcps_rcvpartdupbyte); printf(" %10lu out-of-order packets\n", s.tcps_rcvoopack); printf(" %10lu out-of-order bytes\n", s.tcps_rcvoobyte); printf(" %10lu packets with data after window\n", s.tcps_rcvpackafterwin); printf(" %10lu bytes received after window\n", s.tcps_rcvbyteafterwin); printf(" %10lu packets received after 'close'\n", s.tcps_rcvafterclose); printf(" %10lu window probe packets\n", s.tcps_rcvwinprobe); printf(" %10lu duplicate ACKs\n", s.tcps_rcvdupack); printf(" %10lu ACKs for unsent data\n", s.tcps_rcvacktoomuch); printf(" %10lu ACK packets\n", s.tcps_rcvackpack); printf(" %10lu bytes ACKed by received ACKs\n", s.tcps_rcvackbyte); printf(" %10lu window update packets\n", s.tcps_rcvwinupd); printf(" %10lu segments dropped due to PAWS\n", s.tcps_pawsdrop); printf(" %10lu times header predict ok for ACKs\n", s.tcps_predack); printf(" %10lu times header predict ok for data packets\n", s.tcps_preddat); printf(" %10lu PCB cache misses\n", s.tcps_pcbcachemiss); printf(" %10lu times cached RTT in route updated\n", s.tcps_cachedrtt); printf(" %10lu times cached RTTVAR updated\n", s.tcps_cachedrttvar); printf(" %10lu times ssthresh updated\n", s.tcps_cachedssthresh); printf(" %10lu times RTT initialized from route\n", s.tcps_usedrtt); printf(" %10lu times RTTVAR initialized from route\n", s.tcps_usedrttvar); printf(" %10lu times ssthresh initialized from route\n", s.tcps_usedssthresh); printf(" %10lu timeout in persist state\n", s.tcps_persistdrop); printf(" %10lu bogus SYN, e.g. premature ACK\n", s.tcps_badsyn); printf(" %10lu resends due to MTU discovery\n", s.tcps_mturesent); printf(" %10lu listen queue overflows\n", s.tcps_listendrop); #endif } void print_udp_stats(void) { int mib[4]; int len; struct udpstat s; mib[0] = CTL_NET; mib[1] = PF_INET; mib[2] = IPPROTO_UDP; mib[3] = UDPCTL_STATS; len = sizeof(struct udpstat); if (sysctl(mib, 4, &s, &len, NULL, 0) < 0) { perror("sysctl"); return; } printf("\nUDP statistics:\n"); printf("---------------\n"); printf("* Packets received:\n"); printf(" %10lu total input packets\n", s.udps_ipackets); printf(" %10lu packets shorter than header (dropped)\n", s.udps_hdrops); printf(" %10lu bad checksum\n", s.udps_badsum); printf(" %10lu data length larger than packet\n", s.udps_badlen); printf(" %10lu no socket on specified port\n", s.udps_noport); printf(" %10lu of above, arrived as broadcast\n", s.udps_noportbcast); printf(" %10lu not delivered, input socket full\n", s.udps_fullsock); printf(" %10lu packets missing PCB cache\n", s.udpps_pcbcachemiss); printf(" %10lu packets not for hashed PCBs\n", s.udpps_pcbhashmiss); printf("* Packets sent:\n"); printf(" %10lu total output packets\n", s.udps_opackets); #if __FreeBSD_version > 300001 printf(" %10lu output packets on fast path\n", s.udps_fastout); #endif } char *icmp_names[] = { "echo reply", "#1", "#2", "destination unreachable", "source quench", "routing redirect", "#6", "#7", "echo", "router advertisement", "router solicitation", "time exceeded", "parameter problem", "time stamp", "time stamp reply", "information request", "information request reply", "address mask request", "address mask reply", }; print_icmp_stats() { int mib[4]; int len; int i; struct icmpstat s; mib[0] = CTL_NET; mib[1] = PF_INET; mib[2] = IPPROTO_ICMP; mib[3] = ICMPCTL_STATS; len = sizeof(struct icmpstat); if (sysctl(mib, 4, &s, &len, NULL, 0) < 0) { perror("sysctl"); return (-1); } printf("\nICMP statistics:\n"); printf("----------------\n"); printf("* Output histogram:\n"); for (i = 0; i < (ICMP_MAXTYPE + 1); i++) { if (s.icps_outhist[i] > 0) printf("\t%10lu %s\n", s.icps_outhist[i], icmp_names[i]); } printf("* Input histogram:\n"); for (i = 0; i < (ICMP_MAXTYPE + 1); i++) { if (s.icps_inhist[i] > 0) printf("\t%10lu %s\n", s.icps_inhist[i], icmp_names[i]); } printf("* Other stats:\n"); printf(" %10lu calls to icmp_error\n", s.icps_error); printf(" %10lu no error 'cuz old ip too short\n", s.icps_oldshort); printf(" %10lu no error 'cuz old was icmp\n", s.icps_oldicmp); printf(" %10lu icmp code out of range\n", s.icps_badcode); printf(" %10lu packets shorter than min length\n", s.icps_tooshort); printf(" %10lu bad checksum\n", s.icps_checksum); printf(" %10lu calculated bound mismatch\n", s.icps_badlen); printf(" %10lu number of responses\n", s.icps_reflect); printf(" %10lu broad/multi-cast echo requests dropped\n", s.icps_bmcastecho); printf(" %10lu broad/multi-cast timestamp requests dropped\n", s.icps_bmcasttstamp); } int stats(char *proto) { if (!sflag) return 0; if (pflag) { if (proto == NULL) { fprintf(stderr, "Option '-p' requires paramter.\n"); usage(); exit(-1); } if (strcmp(proto, "ip") == 0) print_ip_stats(); if (strcmp(proto, "icmp") == 0) print_icmp_stats(); if (strcmp(proto, "udp") == 0) print_udp_stats(); if (strcmp(proto, "tcp") == 0) print_tcp_stats(); return (0); } print_ip_stats(); print_icmp_stats(); print_udp_stats(); print_tcp_stats(); return (0); } int main(int argc, char *argv[]) { char c; char *proto = NULL; progname = argv[0]; while ((c = getopt(argc, argv, "dilnrsp:w:")) != -1) { switch (c) { case 'd': /* print deltas in stats every w seconds */ delta++ ; break; case 'w': wflag = atoi(optarg); break; case 'n': /* ignored, just for compatibility with std netstat */ break; case 'r': rflag++; break; case 'i': iflag++; break; case 'l': lflag++; break; case 's': sflag++; rflag = 0; break; case 'p': pflag++; sflag++; proto = optarg; break; case '?': default: usage(); exit(0); break; } } if (rflag == 0 && sflag == 0 && iflag == 0) rflag = 1; argc -= optind; if (argc > 0) { usage(); exit(-1); } if (wflag) printf("\033[H\033[J"); again: if (wflag) { struct timeval t; gettimeofday(&t, NULL); printf("\033[H%s", ctime(&t.tv_sec)); } print_routing(proto); print_load_stats(); stats(proto); if (wflag) { sleep(wflag); goto again; } exit(0); } void print_load_stats(void) { static u_int32_t cp_time[5]; u_int32_t new_cp_time[5]; int l; int shz; static int stathz ; if (!lflag || !wflag) return; l = sizeof(new_cp_time) ; bzero(new_cp_time, l); if (sysctlbyname("kern.cp_time", new_cp_time, &l, NULL, 0) < 0) { warn("sysctl: retrieving cp_time length"); return; } if (stathz == 0) { struct clockinfo ci; bzero (&ci, sizeof(ci)); l = sizeof(ci) ; if (sysctlbyname("kern.clockrate", &ci, &l, NULL, 0) < 0) { warn("sysctl: retrieving clockinfo length"); return; } stathz = ci.stathz ; bcopy(new_cp_time, cp_time, sizeof(cp_time)); } shz = stathz * wflag ; if (shz == 0) shz = 1; #define X(i) ( (double)(new_cp_time[i] - cp_time[i])*100/shz ) printf("\nUSER %5.2f%% NICE %5.2f%% SYS %5.2f%% " "INTR %5.2f%% IDLE %5.2f%%\n", X(0), X(1), X(2), X(3), X(4) ); bcopy(new_cp_time, cp_time, sizeof(cp_time)); }