1 /*-
2 * SPDX-License-Identifier: BSD-3-Clause
3 *
4 * Copyright (c) 1983, 1988, 1993
5 * Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the University nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #include <sys/param.h>
33 #include <sys/file.h>
34 #ifdef JAIL
35 #include <sys/jail.h>
36 #endif
37 #include <sys/protosw.h>
38 #include <sys/socket.h>
39 #include <sys/socketvar.h>
40 #include <sys/sysctl.h>
41
42 #include <netinet/in.h>
43
44 #ifdef NETGRAPH
45 #include <netgraph/ng_socket.h>
46 #endif
47
48 #include <ctype.h>
49 #include <errno.h>
50 #ifdef JAIL
51 #include <jail.h>
52 #endif
53 #include <kvm.h>
54 #include <limits.h>
55 #include <netdb.h>
56 #include <nlist.h>
57 #include <paths.h>
58 #include <stdint.h>
59 #include <stdio.h>
60 #include <stdlib.h>
61 #include <stdbool.h>
62 #include <string.h>
63 #include <sysexits.h>
64 #include <unistd.h>
65 #include "netstat.h"
66 #include "nl_defs.h"
67 #include <libxo/xo.h>
68
69 static struct protox {
70 int pr_index; /* index into nlist of cb head */
71 int pr_sindex; /* index into nlist of stat block */
72 u_char pr_wanted; /* 1 if wanted, 0 otherwise */
73 void (*pr_cblocks)(u_long, const char *, int, int);
74 /* control blocks printing routine */
75 void (*pr_stats)(u_long, const char *, int, int);
76 /* statistics printing routine */
77 void (*pr_istats)(char *); /* per/if statistics printing routine */
78 const char *pr_name; /* well-known name */
79 int pr_usesysctl; /* non-zero if we use sysctl, not kvm */
80 int pr_protocol;
81 } protox[] = {
82 { -1 , N_TCPSTAT, 1, protopr,
83 tcp_stats, NULL, "tcp", 1, IPPROTO_TCP },
84 { -1 , N_UDPSTAT, 1, protopr,
85 udp_stats, NULL, "udp", 1, IPPROTO_UDP },
86 #ifdef SCTP
87 { -1, N_SCTPSTAT, 1, sctp_protopr,
88 sctp_stats, NULL, "sctp", 1, IPPROTO_SCTP },
89 #endif
90 #ifdef SDP
91 { -1, -1, 1, protopr,
92 NULL, NULL, "sdp", 1, IPPROTO_TCP },
93 #endif
94 { -1 , -1, 1, protopr,
95 divert_stats, NULL, "divert", 1, 0 },
96 { -1 , N_IPSTAT, 1, protopr,
97 ip_stats, NULL, "ip", 1, IPPROTO_RAW },
98 { -1 , N_ICMPSTAT, 1, protopr,
99 icmp_stats, NULL, "icmp", 1, IPPROTO_ICMP },
100 { -1 , N_IGMPSTAT, 1, protopr,
101 igmp_stats, NULL, "igmp", 1, IPPROTO_IGMP },
102 #ifdef IPSEC
103 { -1, N_IPSEC4STAT, 1, NULL, /* keep as compat */
104 ipsec_stats, NULL, "ipsec", 1, 0},
105 { -1, N_AHSTAT, 1, NULL,
106 ah_stats, NULL, "ah", 1, 0},
107 { -1, N_ESPSTAT, 1, NULL,
108 esp_stats, NULL, "esp", 1, 0},
109 { -1, N_IPCOMPSTAT, 1, NULL,
110 ipcomp_stats, NULL, "ipcomp", 1, 0},
111 #endif
112 { -1 , N_PIMSTAT, 1, protopr,
113 pim_stats, NULL, "pim", 1, IPPROTO_PIM },
114 { -1, N_CARPSTATS, 1, NULL,
115 carp_stats, NULL, "carp", 1, 0 },
116 #ifdef PF
117 { -1, N_PFSYNCSTATS, 1, NULL,
118 pfsync_stats, NULL, "pfsync", 1, 0 },
119 { -1, N_PFLOWSTATS, 1, NULL,
120 pflow_stats, NULL, "pflow", 1, 0 },
121 #endif
122 { -1, N_ARPSTAT, 1, NULL,
123 arp_stats, NULL, "arp", 1, 0 },
124 { -1, -1, 0, NULL,
125 NULL, NULL, NULL, 0, 0 }
126 };
127
128 #ifdef INET6
129 static struct protox ip6protox[] = {
130 { -1 , N_TCPSTAT, 1, protopr,
131 tcp_stats, NULL, "tcp", 1, IPPROTO_TCP },
132 { -1 , N_UDPSTAT, 1, protopr,
133 udp_stats, NULL, "udp", 1, IPPROTO_UDP },
134 { -1 , N_IP6STAT, 1, protopr,
135 ip6_stats, ip6_ifstats, "ip6", 1, IPPROTO_RAW },
136 { -1 , N_ICMP6STAT, 1, protopr,
137 icmp6_stats, icmp6_ifstats, "icmp6", 1, IPPROTO_ICMPV6 },
138 #ifdef SDP
139 { -1, -1, 1, protopr,
140 NULL, NULL, "sdp", 1, IPPROTO_TCP },
141 #endif
142 #ifdef IPSEC
143 { -1, N_IPSEC6STAT, 1, NULL,
144 ipsec_stats, NULL, "ipsec6", 1, 0 },
145 #endif
146 #ifdef notyet
147 { -1, N_PIM6STAT, 1, NULL,
148 pim6_stats, NULL, "pim6", 1, 0 },
149 #endif
150 { -1, N_RIP6STAT, 1, NULL,
151 rip6_stats, NULL, "rip6", 1, 0 },
152 { -1, -1, 0, NULL,
153 NULL, NULL, NULL, 0, 0 }
154 };
155 #endif /*INET6*/
156
157 #ifdef IPSEC
158 static struct protox pfkeyprotox[] = {
159 { -1, N_PFKEYSTAT, 1, NULL,
160 pfkey_stats, NULL, "pfkey", 0, 0 },
161 { -1, -1, 0, NULL,
162 NULL, NULL, NULL, 0, 0 }
163 };
164 #endif
165
166 #ifdef NETGRAPH
167 static struct protox netgraphprotox[] = {
168 { N_NGSOCKLIST, -1, 1, netgraphprotopr,
169 NULL, NULL, "ctrl", 0, 0 },
170 { N_NGSOCKLIST, -1, 1, netgraphprotopr,
171 NULL, NULL, "data", 0, 0 },
172 { -1, -1, 0, NULL,
173 NULL, NULL, NULL, 0, 0 }
174 };
175 #endif
176
177 static struct protox *protoprotox[] = {
178 protox,
179 #ifdef INET6
180 ip6protox,
181 #endif
182 #ifdef IPSEC
183 pfkeyprotox,
184 #endif
185 NULL };
186
187 static void printproto(struct protox *, const char *, bool *);
188 static void usage(void) __dead2;
189 static struct protox *name2protox(const char *);
190 static struct protox *knownname(const char *);
191
192 static int kresolve_list(struct nlist *_nl);
193
194 static kvm_t *kvmd;
195 static char *nlistf = NULL, *memf = NULL;
196
197 bool Aflag; /* show addresses of protocol control block */
198 bool aflag; /* show all sockets (including servers) */
199 static bool Bflag; /* show information about bpf consumers */
200 bool bflag; /* show i/f total bytes in/out */
201 bool cflag; /* show TCP congestion control stack */
202 bool Cflag; /* show congestion control algo and vars */
203 bool dflag; /* show i/f dropped packets */
204 bool gflag; /* show group (multicast) routing or stats */
205 bool hflag; /* show counters in human readable format */
206 bool iflag; /* show interfaces */
207 bool Lflag; /* show size of listen queues */
208 bool mflag; /* show memory stats */
209 int noutputs = 0; /* how much outputs before we exit */
210 u_int numeric_addr = 0; /* show addresses numerically */
211 bool numeric_port; /* show ports numerically */
212 bool Oflag; /* show nhgrp objects*/
213 bool oflag; /* show nexthop objects*/
214 bool Pflag; /* show TCP log ID */
215 static bool pflag; /* show given protocol */
216 static bool Qflag; /* show netisr information */
217 bool rflag; /* show routing tables (or routing stats) */
218 bool Rflag; /* show flow / RSS statistics */
219 int sflag; /* show protocol statistics */
220 bool Wflag; /* wide display */
221 bool Tflag; /* TCP Information */
222 bool xflag; /* extra information, includes all socket buffer info */
223 bool zflag; /* zero stats */
224
225 int interval; /* repeat interval for i/f stats */
226
227 char *interface; /* desired i/f for stats, or NULL for all i/fs */
228 int unit; /* unit number for above */
229 #ifdef JAIL
230 char *jail_name; /* desired jail to operate in */
231 #endif
232
233 static int af; /* address family */
234 int live; /* true if we are examining a live system */
235
236 int
main(int argc,char * argv[])237 main(int argc, char *argv[])
238 {
239 struct protox *tp = NULL; /* for printing cblocks & stats */
240 int ch;
241 int fib = -1;
242 char *endptr;
243 bool first = true;
244 #ifdef JAIL
245 int jid;
246 #endif
247
248 af = AF_UNSPEC;
249
250 argc = xo_parse_args(argc, argv);
251 if (argc < 0)
252 exit(EXIT_FAILURE);
253
254 while ((ch = getopt(argc, argv, "46AaBbCcdF:f:ghI:ij:LlM:mN:nOoPp:Qq:RrSTsuWw:xz"))
255 != -1)
256 switch(ch) {
257 case '4':
258 #ifdef INET
259 af = AF_INET;
260 #else
261 xo_errx(EX_UNAVAILABLE, "IPv4 support is not compiled in");
262 #endif
263 break;
264 case '6':
265 #ifdef INET6
266 af = AF_INET6;
267 #else
268 xo_errx(EX_UNAVAILABLE, "IPv6 support is not compiled in");
269 #endif
270 break;
271 case 'A':
272 Aflag = true;
273 break;
274 case 'a':
275 aflag = true;
276 break;
277 case 'B':
278 Bflag = true;
279 break;
280 case 'b':
281 bflag = true;
282 break;
283 case 'c':
284 cflag = true;
285 break;
286 case 'C':
287 Cflag = true;
288 break;
289 case 'd':
290 dflag = true;
291 break;
292 case 'F':
293 fib = strtol(optarg, &endptr, 0);
294 if (*endptr != '\0' ||
295 (fib == 0 && (errno == EINVAL || errno == ERANGE)))
296 xo_errx(EX_DATAERR, "%s: invalid fib", optarg);
297 break;
298 case 'f':
299 if (strcmp(optarg, "inet") == 0)
300 af = AF_INET;
301 #ifdef INET6
302 else if (strcmp(optarg, "inet6") == 0)
303 af = AF_INET6;
304 #endif
305 #ifdef IPSEC
306 else if (strcmp(optarg, "pfkey") == 0)
307 af = PF_KEY;
308 #endif
309 else if (strcmp(optarg, "unix") == 0 ||
310 strcmp(optarg, "local") == 0)
311 af = AF_UNIX;
312 #ifdef NETGRAPH
313 else if (strcmp(optarg, "ng") == 0
314 || strcmp(optarg, "netgraph") == 0)
315 af = AF_NETGRAPH;
316 #endif
317 else if (strcmp(optarg, "link") == 0)
318 af = AF_LINK;
319 else {
320 xo_errx(EX_DATAERR, "%s: unknown address family",
321 optarg);
322 }
323 break;
324 case 'g':
325 gflag = true;
326 break;
327 case 'h':
328 hflag = true;
329 break;
330 case 'I': {
331 char *cp;
332
333 iflag = true;
334 for (cp = interface = optarg; isalpha(*cp); cp++)
335 continue;
336 unit = atoi(cp);
337 break;
338 }
339 case 'i':
340 iflag = true;
341 break;
342 case 'j':
343 #ifdef JAIL
344 if (optarg == NULL)
345 usage();
346 jail_name = optarg;
347 #else
348 xo_errx(EX_UNAVAILABLE, "Jail support is not compiled in");
349 #endif
350 break;
351 case 'L':
352 Lflag = true;
353 break;
354 case 'M':
355 memf = optarg;
356 break;
357 case 'm':
358 mflag = true;
359 break;
360 case 'N':
361 nlistf = optarg;
362 break;
363 case 'n':
364 numeric_addr++;
365 numeric_port = true;
366 break;
367 case 'o':
368 oflag = true;
369 break;
370 case 'O':
371 Oflag = true;
372 break;
373 case 'P':
374 Pflag = true;
375 break;
376 case 'p':
377 if ((tp = name2protox(optarg)) == NULL) {
378 xo_errx(EX_DATAERR, "%s: unknown or uninstrumented "
379 "protocol", optarg);
380 }
381 pflag = true;
382 break;
383 case 'Q':
384 Qflag = true;
385 break;
386 case 'q':
387 noutputs = atoi(optarg);
388 if (noutputs != 0)
389 noutputs++;
390 break;
391 case 'r':
392 rflag = true;
393 break;
394 case 'R':
395 Rflag = true;
396 break;
397 case 's':
398 ++sflag;
399 break;
400 case 'S':
401 numeric_addr = 1;
402 break;
403 case 'u':
404 af = AF_UNIX;
405 break;
406 case 'W':
407 case 'l':
408 Wflag = true;
409 break;
410 case 'w':
411 interval = atoi(optarg);
412 iflag = true;
413 break;
414 case 'T':
415 Tflag = true;
416 break;
417 case 'x':
418 xflag = true;
419 break;
420 case 'z':
421 zflag = true;
422 break;
423 case '?':
424 default:
425 usage();
426 }
427 argv += optind;
428 argc -= optind;
429
430 #define BACKWARD_COMPATIBILITY
431 #ifdef BACKWARD_COMPATIBILITY
432 if (*argv) {
433 if (isdigit(**argv)) {
434 interval = atoi(*argv);
435 if (interval <= 0)
436 usage();
437 ++argv;
438 iflag = true;
439 }
440 if (*argv) {
441 nlistf = *argv;
442 if (*++argv)
443 memf = *argv;
444 }
445 }
446 #endif
447
448 #ifdef JAIL
449 if (jail_name != NULL) {
450 jid = jail_getid(jail_name);
451 if (jid == -1)
452 xo_errx(EX_UNAVAILABLE, "Jail not found");
453 if (jail_attach(jid) != 0)
454 xo_errx(EX_UNAVAILABLE, "Cannot attach to jail");
455 }
456 #endif
457
458 /*
459 * Discard setgid privileges if not the running kernel so that bad
460 * guys can't print interesting stuff from kernel memory.
461 */
462 live = (nlistf == NULL && memf == NULL);
463 if (!live) {
464 if (setgid(getgid()) != 0)
465 xo_err(EX_OSERR, "setgid");
466 /* Load all necessary kvm symbols */
467 kresolve_list(nl);
468 }
469
470 if (xflag && Tflag)
471 xo_errx(EX_USAGE, "-x and -T are incompatible, pick one.");
472
473 if (Bflag) {
474 if (!live)
475 usage();
476 bpf_stats(interface);
477 if (xo_finish() < 0)
478 xo_err(EX_IOERR, "stdout");
479 exit(EX_OK);
480 }
481 if (mflag) {
482 if (!live) {
483 if (kread(0, NULL, 0) == 0)
484 mbpr(kvmd, nl[N_SFSTAT].n_value);
485 } else
486 mbpr(NULL, 0);
487 if (xo_finish() < 0)
488 xo_err(EX_IOERR, "stdout");
489 exit(EX_OK);
490 }
491 if (Qflag) {
492 if (!live) {
493 if (kread(0, NULL, 0) == 0)
494 netisr_stats();
495 } else
496 netisr_stats();
497 if (xo_finish() < 0)
498 xo_err(EX_IOERR, "stdout");
499 exit(EX_OK);
500 }
501 #if 0
502 /*
503 * Keep file descriptors open to avoid overhead
504 * of open/close on each call to get* routines.
505 */
506 sethostent(1);
507 setnetent(1);
508 #else
509 /*
510 * This does not make sense any more with DNS being default over
511 * the files. Doing a setXXXXent(1) causes a tcp connection to be
512 * used for the queries, which is slower.
513 */
514 #endif
515 if (iflag && !sflag) {
516 xo_open_container("statistics");
517 xo_set_version(NETSTAT_XO_VERSION);
518 intpr(NULL, af);
519 xo_close_container("statistics");
520 if (xo_finish() < 0)
521 xo_err(EX_IOERR, "stdout");
522 exit(EX_OK);
523 }
524 if (rflag) {
525 xo_open_container("statistics");
526 xo_set_version(NETSTAT_XO_VERSION);
527 if (sflag)
528 rt_stats();
529 else
530 routepr(fib, af);
531 xo_close_container("statistics");
532 if (xo_finish() < 0)
533 xo_err(EX_IOERR, "stdout");
534 exit(EX_OK);
535 }
536 if (oflag) {
537 xo_open_container("statistics");
538 xo_set_version(NETSTAT_XO_VERSION);
539 nhops_print(fib, af);
540 xo_close_container("statistics");
541 if (xo_finish() < 0)
542 xo_err(EX_IOERR, "stdout");
543 exit(EX_OK);
544 }
545 if (Oflag) {
546 xo_open_container("statistics");
547 xo_set_version(NETSTAT_XO_VERSION);
548 nhgrp_print(fib, af);
549 xo_close_container("statistics");
550 if (xo_finish() < 0)
551 xo_err(EX_IOERR, "stdout");
552 exit(EX_OK);
553 }
554
555
556
557 if (gflag) {
558 xo_open_container("statistics");
559 xo_set_version(NETSTAT_XO_VERSION);
560 if (sflag) {
561 if (af == AF_INET || af == AF_UNSPEC)
562 mrt_stats();
563 #ifdef INET6
564 if (af == AF_INET6 || af == AF_UNSPEC)
565 mrt6_stats();
566 #endif
567 } else {
568 if (af == AF_INET || af == AF_UNSPEC)
569 mroutepr();
570 #ifdef INET6
571 if (af == AF_INET6 || af == AF_UNSPEC)
572 mroute6pr();
573 #endif
574 }
575 xo_close_container("statistics");
576 if (xo_finish() < 0)
577 xo_err(EX_IOERR, "stdout");
578 exit(EX_OK);
579 }
580
581 if (tp) {
582 xo_open_container("statistics");
583 xo_set_version(NETSTAT_XO_VERSION);
584 printproto(tp, tp->pr_name, &first);
585 if (!first)
586 xo_close_list("socket");
587 xo_close_container("statistics");
588 if (xo_finish() < 0)
589 xo_err(EX_IOERR, "stdout");
590 exit(EX_OK);
591 }
592
593 xo_open_container("statistics");
594 xo_set_version(NETSTAT_XO_VERSION);
595 if (af == AF_INET || af == AF_UNSPEC)
596 for (tp = protox; tp->pr_name; tp++)
597 printproto(tp, tp->pr_name, &first);
598 #ifdef INET6
599 if (af == AF_INET6 || af == AF_UNSPEC)
600 for (tp = ip6protox; tp->pr_name; tp++)
601 printproto(tp, tp->pr_name, &first);
602 #endif /*INET6*/
603 #ifdef IPSEC
604 if (af == PF_KEY || af == AF_UNSPEC)
605 for (tp = pfkeyprotox; tp->pr_name; tp++)
606 printproto(tp, tp->pr_name, &first);
607 #endif /*IPSEC*/
608 #ifdef NETGRAPH
609 if (af == AF_NETGRAPH || af == AF_UNSPEC)
610 for (tp = netgraphprotox; tp->pr_name; tp++)
611 printproto(tp, tp->pr_name, &first);
612 #endif /* NETGRAPH */
613 if ((af == AF_UNIX || af == AF_UNSPEC) && !sflag)
614 unixpr(nl[N_UNP_COUNT].n_value, nl[N_UNP_GENCNT].n_value,
615 nl[N_UNP_DHEAD].n_value, nl[N_UNP_SHEAD].n_value,
616 nl[N_UNP_SPHEAD].n_value, &first);
617
618 if (!first)
619 xo_close_list("socket");
620 xo_close_container("statistics");
621 if (xo_finish() < 0)
622 xo_err(EX_IOERR, "stdout");
623 exit(EX_OK);
624 }
625
626 static int
fetch_stats_internal(const char * sysctlname,u_long off,void * stats,size_t len,kreadfn_t kreadfn,int zero)627 fetch_stats_internal(const char *sysctlname, u_long off, void *stats,
628 size_t len, kreadfn_t kreadfn, int zero)
629 {
630 int error;
631
632 if (live) {
633 memset(stats, 0, len);
634 if (zero)
635 error = sysctlbyname(sysctlname, NULL, NULL, stats,
636 len);
637 else
638 error = sysctlbyname(sysctlname, stats, &len, NULL, 0);
639 if (error == -1 && errno != ENOENT)
640 xo_warn("sysctl %s", sysctlname);
641 } else {
642 if (off == 0)
643 return (1);
644 error = kreadfn(off, stats, len);
645 }
646 return (error);
647 }
648
649 int
fetch_stats(const char * sysctlname,u_long off,void * stats,size_t len,kreadfn_t kreadfn)650 fetch_stats(const char *sysctlname, u_long off, void *stats,
651 size_t len, kreadfn_t kreadfn)
652 {
653
654 return (fetch_stats_internal(sysctlname, off, stats, len, kreadfn,
655 zflag));
656 }
657
658 int
fetch_stats_ro(const char * sysctlname,u_long off,void * stats,size_t len,kreadfn_t kreadfn)659 fetch_stats_ro(const char *sysctlname, u_long off, void *stats,
660 size_t len, kreadfn_t kreadfn)
661 {
662
663 return (fetch_stats_internal(sysctlname, off, stats, len, kreadfn, 0));
664 }
665
666 /*
667 * Print out protocol statistics or control blocks (per sflag).
668 * If the interface was not specifically requested, and the symbol
669 * is not in the namelist, ignore this one.
670 */
671 static void
printproto(struct protox * tp,const char * name,bool * first)672 printproto(struct protox *tp, const char *name, bool *first)
673 {
674 void (*pr)(u_long, const char *, int, int);
675 u_long off;
676 bool doingdblocks = false;
677
678 if (sflag) {
679 if (iflag) {
680 if (tp->pr_istats)
681 intpr(tp->pr_istats, af);
682 else if (pflag)
683 xo_message("%s: no per-interface stats routine",
684 tp->pr_name);
685 return;
686 } else {
687 pr = tp->pr_stats;
688 if (!pr) {
689 if (pflag)
690 xo_message("%s: no stats routine",
691 tp->pr_name);
692 return;
693 }
694 if (tp->pr_usesysctl && live)
695 off = 0;
696 else if (tp->pr_sindex < 0) {
697 if (pflag)
698 xo_message("%s: stats routine doesn't "
699 "work on cores", tp->pr_name);
700 return;
701 } else
702 off = nl[tp->pr_sindex].n_value;
703 }
704 } else {
705 doingdblocks = true;
706 pr = tp->pr_cblocks;
707 if (!pr) {
708 if (pflag)
709 xo_message("%s: no PCB routine", tp->pr_name);
710 return;
711 }
712 if (tp->pr_usesysctl && live)
713 off = 0;
714 else if (tp->pr_index < 0) {
715 if (pflag)
716 xo_message("%s: PCB routine doesn't work on "
717 "cores", tp->pr_name);
718 return;
719 } else
720 off = nl[tp->pr_index].n_value;
721 }
722 if (pr != NULL && (off || (live && tp->pr_usesysctl) ||
723 af != AF_UNSPEC)) {
724 if (doingdblocks && *first) {
725 xo_open_list("socket");
726 *first = false;
727 }
728
729 (*pr)(off, name, af, tp->pr_protocol);
730 }
731 }
732
733 static int
kvmd_init(void)734 kvmd_init(void)
735 {
736 char errbuf[_POSIX2_LINE_MAX];
737
738 if (kvmd != NULL)
739 return (0);
740
741 kvmd = kvm_openfiles(nlistf, memf, NULL, O_RDONLY, errbuf);
742 if (setgid(getgid()) != 0)
743 xo_err(EX_OSERR, "setgid");
744
745 if (kvmd == NULL) {
746 xo_warnx("kvm not available: %s", errbuf);
747 return (-1);
748 }
749
750 return (0);
751 }
752
753 /*
754 * Resolve symbol list, return 0 on success.
755 */
756 static int
kresolve_list(struct nlist * _nl)757 kresolve_list(struct nlist *_nl)
758 {
759
760 if ((kvmd == NULL) && (kvmd_init() != 0))
761 return (-1);
762
763 if (_nl[0].n_type != 0)
764 return (0);
765
766 if (kvm_nlist(kvmd, _nl) < 0) {
767 if (nlistf)
768 xo_errx(EX_UNAVAILABLE, "%s: kvm_nlist: %s", nlistf,
769 kvm_geterr(kvmd));
770 else
771 xo_errx(EX_UNAVAILABLE, "kvm_nlist: %s", kvm_geterr(kvmd));
772 }
773
774 return (0);
775 }
776
777 /*
778 * Wrapper of kvm_dpcpu_setcpu().
779 */
780 void
kset_dpcpu(u_int cpuid)781 kset_dpcpu(u_int cpuid)
782 {
783
784 if ((kvmd == NULL) && (kvmd_init() != 0))
785 xo_errx(EX_UNAVAILABLE, "%s: kvm is not available", __func__);
786
787 if (kvm_dpcpu_setcpu(kvmd, cpuid) < 0)
788 xo_errx(EX_UNAVAILABLE, "%s: kvm_dpcpu_setcpu(%u): %s", __func__,
789 cpuid, kvm_geterr(kvmd));
790 return;
791 }
792
793 /*
794 * Read kernel memory, return 0 on success.
795 */
796 int
kread(u_long addr,void * buf,size_t size)797 kread(u_long addr, void *buf, size_t size)
798 {
799
800 if (kvmd_init() < 0)
801 return (-1);
802
803 if (!buf)
804 return (0);
805 if (kvm_read(kvmd, addr, buf, size) != (ssize_t)size) {
806 xo_warnx("%s", kvm_geterr(kvmd));
807 return (-1);
808 }
809 return (0);
810 }
811
812 /*
813 * Read single counter(9).
814 */
815 uint64_t
kread_counter(u_long addr)816 kread_counter(u_long addr)
817 {
818
819 if (kvmd_init() < 0)
820 return (-1);
821
822 return (kvm_counter_u64_fetch(kvmd, addr));
823 }
824
825 /*
826 * Read an array of N counters in kernel memory into array of N uint64_t's.
827 */
828 int
kread_counters(u_long addr,void * buf,size_t size)829 kread_counters(u_long addr, void *buf, size_t size)
830 {
831 uint64_t *c;
832 u_long *counters;
833 size_t i, n;
834
835 if (kvmd_init() < 0)
836 return (-1);
837
838 if (size % sizeof(uint64_t) != 0) {
839 xo_warnx("kread_counters: invalid counter set size");
840 return (-1);
841 }
842
843 n = size / sizeof(uint64_t);
844 if ((counters = malloc(n * sizeof(u_long))) == NULL)
845 xo_err(EX_OSERR, "malloc");
846 if (kread(addr, counters, n * sizeof(u_long)) < 0) {
847 free(counters);
848 return (-1);
849 }
850
851 c = buf;
852 for (i = 0; i < n; i++)
853 c[i] = kvm_counter_u64_fetch(kvmd, counters[i]);
854
855 free(counters);
856 return (0);
857 }
858
859 const char *
plural(uintmax_t n)860 plural(uintmax_t n)
861 {
862 return (n != 1 ? "s" : "");
863 }
864
865 const char *
plurales(uintmax_t n)866 plurales(uintmax_t n)
867 {
868 return (n != 1 ? "es" : "");
869 }
870
871 const char *
pluralies(uintmax_t n)872 pluralies(uintmax_t n)
873 {
874 return (n != 1 ? "ies" : "y");
875 }
876
877 /*
878 * Find the protox for the given "well-known" name.
879 */
880 static struct protox *
knownname(const char * name)881 knownname(const char *name)
882 {
883 struct protox **tpp, *tp;
884
885 for (tpp = protoprotox; *tpp; tpp++)
886 for (tp = *tpp; tp->pr_name; tp++)
887 if (strcmp(tp->pr_name, name) == 0)
888 return (tp);
889 return (NULL);
890 }
891
892 /*
893 * Find the protox corresponding to name.
894 */
895 static struct protox *
name2protox(const char * name)896 name2protox(const char *name)
897 {
898 struct protox *tp;
899 char **alias; /* alias from p->aliases */
900 struct protoent *p;
901
902 /*
903 * Try to find the name in the list of "well-known" names. If that
904 * fails, check if name is an alias for an Internet protocol.
905 */
906 if ((tp = knownname(name)) != NULL)
907 return (tp);
908
909 setprotoent(1); /* make protocol lookup cheaper */
910 while ((p = getprotoent()) != NULL) {
911 /* assert: name not same as p->name */
912 for (alias = p->p_aliases; *alias; alias++)
913 if (strcmp(name, *alias) == 0) {
914 endprotoent();
915 return (knownname(p->p_name));
916 }
917 }
918 endprotoent();
919 return (NULL);
920 }
921
922 static void
usage(void)923 usage(void)
924 {
925 xo_error("%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n",
926 "usage: netstat [-j jail] [-46AaCcLnRSTWx] [-f protocol_family | -p protocol]\n"
927 " [-M core] [-N system]",
928 " netstat [-j jail] -i | -I interface [-46abdhnW] [-f address_family]\n"
929 " [-M core] [-N system]",
930 " netstat [-j jail] -w wait [-I interface] [-46d] [-M core] [-N system]\n"
931 " [-q howmany]",
932 " netstat [-j jail] -s [-46sz] [-f protocol_family | -p protocol]\n"
933 " [-M core] [-N system]",
934 " netstat [-j jail] -i | -I interface -s [-46s]\n"
935 " [-f protocol_family | -p protocol] [-M core] [-N system]",
936 " netstat [-j jail] -m [-M core] [-N system]",
937 " netstat [-j jail] -B [-z] [-I interface]",
938 " netstat [-j jail] -r [-46AnW] [-F fibnum] [-f address_family]\n"
939 " [-M core] [-N system]",
940 " netstat [-j jail] -rs [-s] [-M core] [-N system]",
941 " netstat [-j jail] -g [-46W] [-f address_family] [-M core] [-N system]",
942 " netstat [-j jail] -gs [-46s] [-f address_family] [-M core] [-N system]",
943 " netstat [-j jail] -Q");
944 exit(EX_USAGE);
945 }
946