1 /*- 2 * SPDX-License-Identifier: BSD-3-Clause 3 * 4 * Copyright (c) 1983, 1988, 1993 5 * Regents of the University of California. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. Neither the name of the University nor the names of its contributors 16 * may be used to endorse or promote products derived from this software 17 * without specific prior written permission. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29 * SUCH DAMAGE. 30 */ 31 32 #include <sys/param.h> 33 #include <sys/file.h> 34 #ifdef JAIL 35 #include <sys/jail.h> 36 #endif 37 #include <sys/protosw.h> 38 #include <sys/socket.h> 39 #include <sys/socketvar.h> 40 #include <sys/sysctl.h> 41 42 #include <netinet/in.h> 43 44 #ifdef NETGRAPH 45 #include <netgraph/ng_socket.h> 46 #endif 47 48 #include <ctype.h> 49 #include <err.h> 50 #include <errno.h> 51 #ifdef JAIL 52 #include <jail.h> 53 #endif 54 #include <kvm.h> 55 #include <limits.h> 56 #include <netdb.h> 57 #include <nlist.h> 58 #include <paths.h> 59 #include <stdint.h> 60 #include <stdio.h> 61 #include <stdlib.h> 62 #include <stdbool.h> 63 #include <string.h> 64 #include <unistd.h> 65 #include "netstat.h" 66 #include "nl_defs.h" 67 #include <libxo/xo.h> 68 69 static struct protox { 70 int pr_index; /* index into nlist of cb head */ 71 int pr_sindex; /* index into nlist of stat block */ 72 u_char pr_wanted; /* 1 if wanted, 0 otherwise */ 73 void (*pr_cblocks)(u_long, const char *, int, int); 74 /* control blocks printing routine */ 75 void (*pr_stats)(u_long, const char *, int, int); 76 /* statistics printing routine */ 77 void (*pr_istats)(char *); /* per/if statistics printing routine */ 78 const char *pr_name; /* well-known name */ 79 int pr_usesysctl; /* non-zero if we use sysctl, not kvm */ 80 int pr_protocol; 81 } protox[] = { 82 { -1 , N_TCPSTAT, 1, protopr, 83 tcp_stats, NULL, "tcp", 1, IPPROTO_TCP }, 84 { -1 , N_UDPSTAT, 1, protopr, 85 udp_stats, NULL, "udp", 1, IPPROTO_UDP }, 86 #ifdef SCTP 87 { -1, N_SCTPSTAT, 1, sctp_protopr, 88 sctp_stats, NULL, "sctp", 1, IPPROTO_SCTP }, 89 #endif 90 #ifdef SDP 91 { -1, -1, 1, protopr, 92 NULL, NULL, "sdp", 1, IPPROTO_TCP }, 93 #endif 94 { -1 , -1, 1, protopr, 95 divert_stats, NULL, "divert", 1, 0 }, 96 { -1 , N_IPSTAT, 1, protopr, 97 ip_stats, NULL, "ip", 1, IPPROTO_RAW }, 98 { -1 , N_ICMPSTAT, 1, protopr, 99 icmp_stats, NULL, "icmp", 1, IPPROTO_ICMP }, 100 { -1 , N_IGMPSTAT, 1, protopr, 101 igmp_stats, NULL, "igmp", 1, IPPROTO_IGMP }, 102 #ifdef IPSEC 103 { -1, N_IPSEC4STAT, 1, NULL, /* keep as compat */ 104 ipsec_stats, NULL, "ipsec", 1, 0}, 105 { -1, N_AHSTAT, 1, NULL, 106 ah_stats, NULL, "ah", 1, 0}, 107 { -1, N_ESPSTAT, 1, NULL, 108 esp_stats, NULL, "esp", 1, 0}, 109 { -1, N_IPCOMPSTAT, 1, NULL, 110 ipcomp_stats, NULL, "ipcomp", 1, 0}, 111 #endif 112 { -1 , N_PIMSTAT, 1, protopr, 113 pim_stats, NULL, "pim", 1, IPPROTO_PIM }, 114 { -1, N_CARPSTATS, 1, NULL, 115 carp_stats, NULL, "carp", 1, 0 }, 116 #ifdef PF 117 { -1, N_PFSYNCSTATS, 1, NULL, 118 pfsync_stats, NULL, "pfsync", 1, 0 }, 119 #endif 120 { -1, N_ARPSTAT, 1, NULL, 121 arp_stats, NULL, "arp", 1, 0 }, 122 { -1, -1, 0, NULL, 123 NULL, NULL, NULL, 0, 0 } 124 }; 125 126 #ifdef INET6 127 static struct protox ip6protox[] = { 128 { -1 , N_TCPSTAT, 1, protopr, 129 tcp_stats, NULL, "tcp", 1, IPPROTO_TCP }, 130 { -1 , N_UDPSTAT, 1, protopr, 131 udp_stats, NULL, "udp", 1, IPPROTO_UDP }, 132 { -1 , N_IP6STAT, 1, protopr, 133 ip6_stats, ip6_ifstats, "ip6", 1, IPPROTO_RAW }, 134 { -1 , N_ICMP6STAT, 1, protopr, 135 icmp6_stats, icmp6_ifstats, "icmp6", 1, IPPROTO_ICMPV6 }, 136 #ifdef SDP 137 { -1, -1, 1, protopr, 138 NULL, NULL, "sdp", 1, IPPROTO_TCP }, 139 #endif 140 #ifdef IPSEC 141 { -1, N_IPSEC6STAT, 1, NULL, 142 ipsec_stats, NULL, "ipsec6", 1, 0 }, 143 #endif 144 #ifdef notyet 145 { -1, N_PIM6STAT, 1, NULL, 146 pim6_stats, NULL, "pim6", 1, 0 }, 147 #endif 148 { -1, N_RIP6STAT, 1, NULL, 149 rip6_stats, NULL, "rip6", 1, 0 }, 150 { -1, -1, 0, NULL, 151 NULL, NULL, NULL, 0, 0 } 152 }; 153 #endif /*INET6*/ 154 155 #ifdef IPSEC 156 static struct protox pfkeyprotox[] = { 157 { -1, N_PFKEYSTAT, 1, NULL, 158 pfkey_stats, NULL, "pfkey", 0, 0 }, 159 { -1, -1, 0, NULL, 160 NULL, NULL, NULL, 0, 0 } 161 }; 162 #endif 163 164 #ifdef NETGRAPH 165 static struct protox netgraphprotox[] = { 166 { N_NGSOCKLIST, -1, 1, netgraphprotopr, 167 NULL, NULL, "ctrl", 0, 0 }, 168 { N_NGSOCKLIST, -1, 1, netgraphprotopr, 169 NULL, NULL, "data", 0, 0 }, 170 { -1, -1, 0, NULL, 171 NULL, NULL, NULL, 0, 0 } 172 }; 173 #endif 174 175 static struct protox *protoprotox[] = { 176 protox, 177 #ifdef INET6 178 ip6protox, 179 #endif 180 #ifdef IPSEC 181 pfkeyprotox, 182 #endif 183 NULL }; 184 185 static void printproto(struct protox *, const char *, bool *); 186 static void usage(void) __dead2; 187 static struct protox *name2protox(const char *); 188 static struct protox *knownname(const char *); 189 190 static int kresolve_list(struct nlist *_nl); 191 192 static kvm_t *kvmd; 193 static char *nlistf = NULL, *memf = NULL; 194 195 int Aflag; /* show addresses of protocol control block */ 196 int aflag; /* show all sockets (including servers) */ 197 static int Bflag; /* show information about bpf consumers */ 198 int bflag; /* show i/f total bytes in/out */ 199 int cflag; /* show TCP congestion control stack */ 200 int Cflag; /* show congestion control algo and vars */ 201 int dflag; /* show i/f dropped packets */ 202 int gflag; /* show group (multicast) routing or stats */ 203 int hflag; /* show counters in human readable format */ 204 int iflag; /* show interfaces */ 205 int Lflag; /* show size of listen queues */ 206 int mflag; /* show memory stats */ 207 int noutputs = 0; /* how much outputs before we exit */ 208 int numeric_addr; /* show addresses numerically */ 209 int numeric_port; /* show ports numerically */ 210 int Oflag; /* show nhgrp objects*/ 211 int oflag; /* show nexthop objects*/ 212 int Pflag; /* show TCP log ID */ 213 static int pflag; /* show given protocol */ 214 static int Qflag; /* show netisr information */ 215 int rflag; /* show routing tables (or routing stats) */ 216 int Rflag; /* show flow / RSS statistics */ 217 int sflag; /* show protocol statistics */ 218 int Wflag; /* wide display */ 219 int Tflag; /* TCP Information */ 220 int xflag; /* extra information, includes all socket buffer info */ 221 int zflag; /* zero stats */ 222 223 int interval; /* repeat interval for i/f stats */ 224 225 char *interface; /* desired i/f for stats, or NULL for all i/fs */ 226 int unit; /* unit number for above */ 227 #ifdef JAIL 228 char *jail_name; /* desired jail to operate in */ 229 #endif 230 231 static int af; /* address family */ 232 int live; /* true if we are examining a live system */ 233 234 int 235 main(int argc, char *argv[]) 236 { 237 struct protox *tp = NULL; /* for printing cblocks & stats */ 238 int ch; 239 int fib = -1; 240 char *endptr; 241 bool first = true; 242 #ifdef JAIL 243 int jid; 244 #endif 245 246 af = AF_UNSPEC; 247 248 argc = xo_parse_args(argc, argv); 249 if (argc < 0) 250 exit(EXIT_FAILURE); 251 252 while ((ch = getopt(argc, argv, "46AaBbCcdF:f:ghI:ij:LlM:mN:nOoPp:Qq:RrSTsuWw:xz")) 253 != -1) 254 switch(ch) { 255 case '4': 256 #ifdef INET 257 af = AF_INET; 258 #else 259 errx(1, "IPv4 support is not compiled in"); 260 #endif 261 break; 262 case '6': 263 #ifdef INET6 264 af = AF_INET6; 265 #else 266 errx(1, "IPv6 support is not compiled in"); 267 #endif 268 break; 269 case 'A': 270 Aflag = 1; 271 break; 272 case 'a': 273 aflag = 1; 274 break; 275 case 'B': 276 Bflag = 1; 277 break; 278 case 'b': 279 bflag = 1; 280 break; 281 case 'c': 282 cflag = 1; 283 break; 284 case 'C': 285 Cflag = 1; 286 break; 287 case 'd': 288 dflag = 1; 289 break; 290 case 'F': 291 fib = strtol(optarg, &endptr, 0); 292 if (*endptr != '\0' || 293 (fib == 0 && (errno == EINVAL || errno == ERANGE))) 294 xo_errx(1, "%s: invalid fib", optarg); 295 break; 296 case 'f': 297 if (strcmp(optarg, "inet") == 0) 298 af = AF_INET; 299 #ifdef INET6 300 else if (strcmp(optarg, "inet6") == 0) 301 af = AF_INET6; 302 #endif 303 #ifdef IPSEC 304 else if (strcmp(optarg, "pfkey") == 0) 305 af = PF_KEY; 306 #endif 307 else if (strcmp(optarg, "unix") == 0 || 308 strcmp(optarg, "local") == 0) 309 af = AF_UNIX; 310 #ifdef NETGRAPH 311 else if (strcmp(optarg, "ng") == 0 312 || strcmp(optarg, "netgraph") == 0) 313 af = AF_NETGRAPH; 314 #endif 315 else if (strcmp(optarg, "link") == 0) 316 af = AF_LINK; 317 else { 318 xo_errx(1, "%s: unknown address family", 319 optarg); 320 } 321 break; 322 case 'g': 323 gflag = 1; 324 break; 325 case 'h': 326 hflag = 1; 327 break; 328 case 'I': { 329 char *cp; 330 331 iflag = 1; 332 for (cp = interface = optarg; isalpha(*cp); cp++) 333 continue; 334 unit = atoi(cp); 335 break; 336 } 337 case 'i': 338 iflag = 1; 339 break; 340 case 'j': 341 #ifdef JAIL 342 if (optarg == NULL) 343 usage(); 344 jail_name = optarg; 345 #else 346 errx(1, "Jail support is not compiled in"); 347 #endif 348 break; 349 case 'L': 350 Lflag = 1; 351 break; 352 case 'M': 353 memf = optarg; 354 break; 355 case 'm': 356 mflag = 1; 357 break; 358 case 'N': 359 nlistf = optarg; 360 break; 361 case 'n': 362 numeric_addr = numeric_port = 1; 363 break; 364 case 'o': 365 oflag = 1; 366 break; 367 case 'O': 368 Oflag = 1; 369 break; 370 case 'P': 371 Pflag = 1; 372 break; 373 case 'p': 374 if ((tp = name2protox(optarg)) == NULL) { 375 xo_errx(1, "%s: unknown or uninstrumented " 376 "protocol", optarg); 377 } 378 pflag = 1; 379 break; 380 case 'Q': 381 Qflag = 1; 382 break; 383 case 'q': 384 noutputs = atoi(optarg); 385 if (noutputs != 0) 386 noutputs++; 387 break; 388 case 'r': 389 rflag = 1; 390 break; 391 case 'R': 392 Rflag = 1; 393 break; 394 case 's': 395 ++sflag; 396 break; 397 case 'S': 398 numeric_addr = 1; 399 break; 400 case 'u': 401 af = AF_UNIX; 402 break; 403 case 'W': 404 case 'l': 405 Wflag = 1; 406 break; 407 case 'w': 408 interval = atoi(optarg); 409 iflag = 1; 410 break; 411 case 'T': 412 Tflag = 1; 413 break; 414 case 'x': 415 xflag = 1; 416 break; 417 case 'z': 418 zflag = 1; 419 break; 420 case '?': 421 default: 422 usage(); 423 } 424 argv += optind; 425 argc -= optind; 426 427 #define BACKWARD_COMPATIBILITY 428 #ifdef BACKWARD_COMPATIBILITY 429 if (*argv) { 430 if (isdigit(**argv)) { 431 interval = atoi(*argv); 432 if (interval <= 0) 433 usage(); 434 ++argv; 435 iflag = 1; 436 } 437 if (*argv) { 438 nlistf = *argv; 439 if (*++argv) 440 memf = *argv; 441 } 442 } 443 #endif 444 445 #ifdef JAIL 446 if (jail_name != NULL) { 447 jid = jail_getid(jail_name); 448 if (jid == -1) 449 errx(1, "Jail not found"); 450 if (jail_attach(jid) != 0) 451 errx(1, "Cannot attach to jail"); 452 } 453 #endif 454 455 /* 456 * Discard setgid privileges if not the running kernel so that bad 457 * guys can't print interesting stuff from kernel memory. 458 */ 459 live = (nlistf == NULL && memf == NULL); 460 if (!live) { 461 if (setgid(getgid()) != 0) 462 xo_err(-1, "setgid"); 463 /* Load all necessary kvm symbols */ 464 kresolve_list(nl); 465 } 466 467 if (xflag && Tflag) 468 xo_errx(1, "-x and -T are incompatible, pick one."); 469 470 if (Bflag) { 471 if (!live) 472 usage(); 473 bpf_stats(interface); 474 xo_finish(); 475 exit(0); 476 } 477 if (mflag) { 478 if (!live) { 479 if (kread(0, NULL, 0) == 0) 480 mbpr(kvmd, nl[N_SFSTAT].n_value); 481 } else 482 mbpr(NULL, 0); 483 xo_finish(); 484 exit(0); 485 } 486 if (Qflag) { 487 if (!live) { 488 if (kread(0, NULL, 0) == 0) 489 netisr_stats(); 490 } else 491 netisr_stats(); 492 xo_finish(); 493 exit(0); 494 } 495 #if 0 496 /* 497 * Keep file descriptors open to avoid overhead 498 * of open/close on each call to get* routines. 499 */ 500 sethostent(1); 501 setnetent(1); 502 #else 503 /* 504 * This does not make sense any more with DNS being default over 505 * the files. Doing a setXXXXent(1) causes a tcp connection to be 506 * used for the queries, which is slower. 507 */ 508 #endif 509 if (iflag && !sflag) { 510 xo_open_container("statistics"); 511 intpr(NULL, af); 512 xo_close_container("statistics"); 513 xo_finish(); 514 exit(0); 515 } 516 if (rflag) { 517 xo_open_container("statistics"); 518 if (sflag) { 519 if (live) { 520 kresolve_list(nl); 521 } 522 rt_stats(); 523 } else 524 routepr(fib, af); 525 xo_close_container("statistics"); 526 xo_finish(); 527 exit(0); 528 } 529 if (oflag) { 530 xo_open_container("statistics"); 531 nhops_print(fib, af); 532 xo_close_container("statistics"); 533 xo_finish(); 534 exit(0); 535 } 536 if (Oflag) { 537 xo_open_container("statistics"); 538 nhgrp_print(fib, af); 539 xo_close_container("statistics"); 540 xo_finish(); 541 exit(0); 542 } 543 544 545 546 if (gflag) { 547 xo_open_container("statistics"); 548 if (sflag) { 549 if (af == AF_INET || af == AF_UNSPEC) 550 mrt_stats(); 551 #ifdef INET6 552 if (af == AF_INET6 || af == AF_UNSPEC) 553 mrt6_stats(); 554 #endif 555 } else { 556 if (af == AF_INET || af == AF_UNSPEC) 557 mroutepr(); 558 #ifdef INET6 559 if (af == AF_INET6 || af == AF_UNSPEC) 560 mroute6pr(); 561 #endif 562 } 563 xo_close_container("statistics"); 564 xo_finish(); 565 exit(0); 566 } 567 568 if (tp) { 569 xo_open_container("statistics"); 570 printproto(tp, tp->pr_name, &first); 571 if (!first) 572 xo_close_list("socket"); 573 xo_close_container("statistics"); 574 xo_finish(); 575 exit(0); 576 } 577 578 xo_open_container("statistics"); 579 if (af == AF_INET || af == AF_UNSPEC) 580 for (tp = protox; tp->pr_name; tp++) 581 printproto(tp, tp->pr_name, &first); 582 #ifdef INET6 583 if (af == AF_INET6 || af == AF_UNSPEC) 584 for (tp = ip6protox; tp->pr_name; tp++) 585 printproto(tp, tp->pr_name, &first); 586 #endif /*INET6*/ 587 #ifdef IPSEC 588 if (af == PF_KEY || af == AF_UNSPEC) 589 for (tp = pfkeyprotox; tp->pr_name; tp++) 590 printproto(tp, tp->pr_name, &first); 591 #endif /*IPSEC*/ 592 #ifdef NETGRAPH 593 if (af == AF_NETGRAPH || af == AF_UNSPEC) 594 for (tp = netgraphprotox; tp->pr_name; tp++) 595 printproto(tp, tp->pr_name, &first); 596 #endif /* NETGRAPH */ 597 if ((af == AF_UNIX || af == AF_UNSPEC) && !sflag) 598 unixpr(nl[N_UNP_COUNT].n_value, nl[N_UNP_GENCNT].n_value, 599 nl[N_UNP_DHEAD].n_value, nl[N_UNP_SHEAD].n_value, 600 nl[N_UNP_SPHEAD].n_value, &first); 601 602 if (!first) 603 xo_close_list("socket"); 604 xo_close_container("statistics"); 605 xo_finish(); 606 exit(0); 607 } 608 609 static int 610 fetch_stats_internal(const char *sysctlname, u_long off, void *stats, 611 size_t len, kreadfn_t kreadfn, int zero) 612 { 613 int error; 614 615 if (live) { 616 memset(stats, 0, len); 617 if (zero) 618 error = sysctlbyname(sysctlname, NULL, NULL, stats, 619 len); 620 else 621 error = sysctlbyname(sysctlname, stats, &len, NULL, 0); 622 if (error == -1 && errno != ENOENT) 623 xo_warn("sysctl %s", sysctlname); 624 } else { 625 if (off == 0) 626 return (1); 627 error = kreadfn(off, stats, len); 628 } 629 return (error); 630 } 631 632 int 633 fetch_stats(const char *sysctlname, u_long off, void *stats, 634 size_t len, kreadfn_t kreadfn) 635 { 636 637 return (fetch_stats_internal(sysctlname, off, stats, len, kreadfn, 638 zflag)); 639 } 640 641 int 642 fetch_stats_ro(const char *sysctlname, u_long off, void *stats, 643 size_t len, kreadfn_t kreadfn) 644 { 645 646 return (fetch_stats_internal(sysctlname, off, stats, len, kreadfn, 0)); 647 } 648 649 /* 650 * Print out protocol statistics or control blocks (per sflag). 651 * If the interface was not specifically requested, and the symbol 652 * is not in the namelist, ignore this one. 653 */ 654 static void 655 printproto(struct protox *tp, const char *name, bool *first) 656 { 657 void (*pr)(u_long, const char *, int, int); 658 u_long off; 659 bool doingdblocks = false; 660 661 if (sflag) { 662 if (iflag) { 663 if (tp->pr_istats) 664 intpr(tp->pr_istats, af); 665 else if (pflag) 666 xo_message("%s: no per-interface stats routine", 667 tp->pr_name); 668 return; 669 } else { 670 pr = tp->pr_stats; 671 if (!pr) { 672 if (pflag) 673 xo_message("%s: no stats routine", 674 tp->pr_name); 675 return; 676 } 677 if (tp->pr_usesysctl && live) 678 off = 0; 679 else if (tp->pr_sindex < 0) { 680 if (pflag) 681 xo_message("%s: stats routine doesn't " 682 "work on cores", tp->pr_name); 683 return; 684 } else 685 off = nl[tp->pr_sindex].n_value; 686 } 687 } else { 688 doingdblocks = true; 689 pr = tp->pr_cblocks; 690 if (!pr) { 691 if (pflag) 692 xo_message("%s: no PCB routine", tp->pr_name); 693 return; 694 } 695 if (tp->pr_usesysctl && live) 696 off = 0; 697 else if (tp->pr_index < 0) { 698 if (pflag) 699 xo_message("%s: PCB routine doesn't work on " 700 "cores", tp->pr_name); 701 return; 702 } else 703 off = nl[tp->pr_index].n_value; 704 } 705 if (pr != NULL && (off || (live && tp->pr_usesysctl) || 706 af != AF_UNSPEC)) { 707 if (doingdblocks && *first) { 708 xo_open_list("socket"); 709 *first = false; 710 } 711 712 (*pr)(off, name, af, tp->pr_protocol); 713 } 714 } 715 716 static int 717 kvmd_init(void) 718 { 719 char errbuf[_POSIX2_LINE_MAX]; 720 721 if (kvmd != NULL) 722 return (0); 723 724 kvmd = kvm_openfiles(nlistf, memf, NULL, O_RDONLY, errbuf); 725 if (setgid(getgid()) != 0) 726 xo_err(-1, "setgid"); 727 728 if (kvmd == NULL) { 729 xo_warnx("kvm not available: %s", errbuf); 730 return (-1); 731 } 732 733 return (0); 734 } 735 736 /* 737 * Resolve symbol list, return 0 on success. 738 */ 739 static int 740 kresolve_list(struct nlist *_nl) 741 { 742 743 if ((kvmd == NULL) && (kvmd_init() != 0)) 744 return (-1); 745 746 if (_nl[0].n_type != 0) 747 return (0); 748 749 if (kvm_nlist(kvmd, _nl) < 0) { 750 if (nlistf) 751 xo_errx(1, "%s: kvm_nlist: %s", nlistf, 752 kvm_geterr(kvmd)); 753 else 754 xo_errx(1, "kvm_nlist: %s", kvm_geterr(kvmd)); 755 } 756 757 return (0); 758 } 759 760 /* 761 * Wrapper of kvm_dpcpu_setcpu(). 762 */ 763 void 764 kset_dpcpu(u_int cpuid) 765 { 766 767 if ((kvmd == NULL) && (kvmd_init() != 0)) 768 xo_errx(-1, "%s: kvm is not available", __func__); 769 770 if (kvm_dpcpu_setcpu(kvmd, cpuid) < 0) 771 xo_errx(-1, "%s: kvm_dpcpu_setcpu(%u): %s", __func__, 772 cpuid, kvm_geterr(kvmd)); 773 return; 774 } 775 776 /* 777 * Read kernel memory, return 0 on success. 778 */ 779 int 780 kread(u_long addr, void *buf, size_t size) 781 { 782 783 if (kvmd_init() < 0) 784 return (-1); 785 786 if (!buf) 787 return (0); 788 if (kvm_read(kvmd, addr, buf, size) != (ssize_t)size) { 789 xo_warnx("%s", kvm_geterr(kvmd)); 790 return (-1); 791 } 792 return (0); 793 } 794 795 /* 796 * Read single counter(9). 797 */ 798 uint64_t 799 kread_counter(u_long addr) 800 { 801 802 if (kvmd_init() < 0) 803 return (-1); 804 805 return (kvm_counter_u64_fetch(kvmd, addr)); 806 } 807 808 /* 809 * Read an array of N counters in kernel memory into array of N uint64_t's. 810 */ 811 int 812 kread_counters(u_long addr, void *buf, size_t size) 813 { 814 uint64_t *c; 815 u_long *counters; 816 size_t i, n; 817 818 if (kvmd_init() < 0) 819 return (-1); 820 821 if (size % sizeof(uint64_t) != 0) { 822 xo_warnx("kread_counters: invalid counter set size"); 823 return (-1); 824 } 825 826 n = size / sizeof(uint64_t); 827 if ((counters = malloc(n * sizeof(u_long))) == NULL) 828 xo_err(-1, "malloc"); 829 if (kread(addr, counters, n * sizeof(u_long)) < 0) { 830 free(counters); 831 return (-1); 832 } 833 834 c = buf; 835 for (i = 0; i < n; i++) 836 c[i] = kvm_counter_u64_fetch(kvmd, counters[i]); 837 838 free(counters); 839 return (0); 840 } 841 842 const char * 843 plural(uintmax_t n) 844 { 845 return (n != 1 ? "s" : ""); 846 } 847 848 const char * 849 plurales(uintmax_t n) 850 { 851 return (n != 1 ? "es" : ""); 852 } 853 854 const char * 855 pluralies(uintmax_t n) 856 { 857 return (n != 1 ? "ies" : "y"); 858 } 859 860 /* 861 * Find the protox for the given "well-known" name. 862 */ 863 static struct protox * 864 knownname(const char *name) 865 { 866 struct protox **tpp, *tp; 867 868 for (tpp = protoprotox; *tpp; tpp++) 869 for (tp = *tpp; tp->pr_name; tp++) 870 if (strcmp(tp->pr_name, name) == 0) 871 return (tp); 872 return (NULL); 873 } 874 875 /* 876 * Find the protox corresponding to name. 877 */ 878 static struct protox * 879 name2protox(const char *name) 880 { 881 struct protox *tp; 882 char **alias; /* alias from p->aliases */ 883 struct protoent *p; 884 885 /* 886 * Try to find the name in the list of "well-known" names. If that 887 * fails, check if name is an alias for an Internet protocol. 888 */ 889 if ((tp = knownname(name)) != NULL) 890 return (tp); 891 892 setprotoent(1); /* make protocol lookup cheaper */ 893 while ((p = getprotoent()) != NULL) { 894 /* assert: name not same as p->name */ 895 for (alias = p->p_aliases; *alias; alias++) 896 if (strcmp(name, *alias) == 0) { 897 endprotoent(); 898 return (knownname(p->p_name)); 899 } 900 } 901 endprotoent(); 902 return (NULL); 903 } 904 905 static void 906 usage(void) 907 { 908 (void)xo_error("%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n", 909 "usage: netstat [-j jail] [-46AaCcLnRSTWx] [-f protocol_family | -p protocol]\n" 910 " [-M core] [-N system]", 911 " netstat [-j jail] -i | -I interface [-46abdhnW] [-f address_family]\n" 912 " [-M core] [-N system]", 913 " netstat [-j jail] -w wait [-I interface] [-46d] [-M core] [-N system]\n" 914 " [-q howmany]", 915 " netstat [-j jail] -s [-46sz] [-f protocol_family | -p protocol]\n" 916 " [-M core] [-N system]", 917 " netstat [-j jail] -i | -I interface -s [-46s]\n" 918 " [-f protocol_family | -p protocol] [-M core] [-N system]", 919 " netstat [-j jail] -m [-M core] [-N system]", 920 " netstat [-j jail] -B [-z] [-I interface]", 921 " netstat [-j jail] -r [-46AnW] [-F fibnum] [-f address_family]\n" 922 " [-M core] [-N system]", 923 " netstat [-j jail] -rs [-s] [-M core] [-N system]", 924 " netstat [-j jail] -g [-46W] [-f address_family] [-M core] [-N system]", 925 " netstat [-j jail] -gs [-46s] [-f address_family] [-M core] [-N system]", 926 " netstat [-j jail] -Q"); 927 xo_finish(); 928 exit(1); 929 } 930