1/*- 2 * SPDX-License-Identifier: BSD-3-Clause 3 * 4 * Copyright (c) 1983, 1988, 1993 5 * Regents of the University of California. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. Neither the name of the University nor the names of its contributors 16 * may be used to endorse or promote products derived from this software 17 * without specific prior written permission. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29 * SUCH DAMAGE. 30 */ 31 32#include <sys/param.h> 33#include <sys/file.h> 34#ifdef JAIL 35#include <sys/jail.h> 36#endif 37#include <sys/protosw.h> 38#include <sys/socket.h> 39#include <sys/socketvar.h> 40#include <sys/sysctl.h> 41 42#include <netinet/in.h> 43 44#ifdef NETGRAPH 45#include <netgraph/ng_socket.h> 46#endif 47 48#include <ctype.h> 49#include <err.h> 50#include <errno.h> 51#ifdef JAIL 52#include <jail.h> 53#endif 54#include <kvm.h> 55#include <limits.h> 56#include <netdb.h> 57#include <nlist.h> 58#include <paths.h> 59#include <stdint.h> 60#include <stdio.h> 61#include <stdlib.h> 62#include <stdbool.h> 63#include <string.h> 64#include <unistd.h> 65#include "netstat.h" 66#include "nl_defs.h" 67#include <libxo/xo.h> 68 69static struct protox { 70 int pr_index; /* index into nlist of cb head */ 71 int pr_sindex; /* index into nlist of stat block */ 72 u_char pr_wanted; /* 1 if wanted, 0 otherwise */ 73 void (*pr_cblocks)(u_long, const char *, int, int); 74 /* control blocks printing routine */ 75 void (*pr_stats)(u_long, const char *, int, int); 76 /* statistics printing routine */ 77 void (*pr_istats)(char *); /* per/if statistics printing routine */ 78 const char *pr_name; /* well-known name */ 79 int pr_usesysctl; /* non-zero if we use sysctl, not kvm */ 80 int pr_protocol; 81} protox[] = { 82 { -1 , N_TCPSTAT, 1, protopr, 83 tcp_stats, NULL, "tcp", 1, IPPROTO_TCP }, 84 { -1 , N_UDPSTAT, 1, protopr, 85 udp_stats, NULL, "udp", 1, IPPROTO_UDP }, 86#ifdef SCTP 87 { -1, N_SCTPSTAT, 1, sctp_protopr, 88 sctp_stats, NULL, "sctp", 1, IPPROTO_SCTP }, 89#endif 90#ifdef SDP 91 { -1, -1, 1, protopr, 92 NULL, NULL, "sdp", 1, IPPROTO_TCP }, 93#endif 94 { -1 , -1, 1, protopr, 95 divert_stats, NULL, "divert", 1, 0 }, 96 { -1 , N_IPSTAT, 1, protopr, 97 ip_stats, NULL, "ip", 1, IPPROTO_RAW }, 98 { -1 , N_ICMPSTAT, 1, protopr, 99 icmp_stats, NULL, "icmp", 1, IPPROTO_ICMP }, 100 { -1 , N_IGMPSTAT, 1, protopr, 101 igmp_stats, NULL, "igmp", 1, IPPROTO_IGMP }, 102#ifdef IPSEC 103 { -1, N_IPSEC4STAT, 1, NULL, /* keep as compat */ 104 ipsec_stats, NULL, "ipsec", 1, 0}, 105 { -1, N_AHSTAT, 1, NULL, 106 ah_stats, NULL, "ah", 1, 0}, 107 { -1, N_ESPSTAT, 1, NULL, 108 esp_stats, NULL, "esp", 1, 0}, 109 { -1, N_IPCOMPSTAT, 1, NULL, 110 ipcomp_stats, NULL, "ipcomp", 1, 0}, 111#endif 112 { -1 , N_PIMSTAT, 1, protopr, 113 pim_stats, NULL, "pim", 1, IPPROTO_PIM }, 114 { -1, N_CARPSTATS, 1, NULL, 115 carp_stats, NULL, "carp", 1, 0 }, 116#ifdef PF 117 { -1, N_PFSYNCSTATS, 1, NULL, 118 pfsync_stats, NULL, "pfsync", 1, 0 }, 119 { -1, N_PFLOWSTATS, 1, NULL, 120 pflow_stats, NULL, "pflow", 1, 0 }, 121#endif 122 { -1, N_ARPSTAT, 1, NULL, 123 arp_stats, NULL, "arp", 1, 0 }, 124 { -1, -1, 0, NULL, 125 NULL, NULL, NULL, 0, 0 } 126}; 127 128#ifdef INET6 129static struct protox ip6protox[] = { 130 { -1 , N_TCPSTAT, 1, protopr, 131 tcp_stats, NULL, "tcp", 1, IPPROTO_TCP }, 132 { -1 , N_UDPSTAT, 1, protopr, 133 udp_stats, NULL, "udp", 1, IPPROTO_UDP }, 134 { -1 , N_IP6STAT, 1, protopr, 135 ip6_stats, ip6_ifstats, "ip6", 1, IPPROTO_RAW }, 136 { -1 , N_ICMP6STAT, 1, protopr, 137 icmp6_stats, icmp6_ifstats, "icmp6", 1, IPPROTO_ICMPV6 }, 138#ifdef SDP 139 { -1, -1, 1, protopr, 140 NULL, NULL, "sdp", 1, IPPROTO_TCP }, 141#endif 142#ifdef IPSEC 143 { -1, N_IPSEC6STAT, 1, NULL, 144 ipsec_stats, NULL, "ipsec6", 1, 0 }, 145#endif 146#ifdef notyet 147 { -1, N_PIM6STAT, 1, NULL, 148 pim6_stats, NULL, "pim6", 1, 0 }, 149#endif 150 { -1, N_RIP6STAT, 1, NULL, 151 rip6_stats, NULL, "rip6", 1, 0 }, 152 { -1, -1, 0, NULL, 153 NULL, NULL, NULL, 0, 0 } 154}; 155#endif /*INET6*/ 156 157#ifdef IPSEC 158static struct protox pfkeyprotox[] = { 159 { -1, N_PFKEYSTAT, 1, NULL, 160 pfkey_stats, NULL, "pfkey", 0, 0 }, 161 { -1, -1, 0, NULL, 162 NULL, NULL, NULL, 0, 0 } 163}; 164#endif 165 166#ifdef NETGRAPH 167static struct protox netgraphprotox[] = { 168 { N_NGSOCKLIST, -1, 1, netgraphprotopr, 169 NULL, NULL, "ctrl", 0, 0 }, 170 { N_NGSOCKLIST, -1, 1, netgraphprotopr, 171 NULL, NULL, "data", 0, 0 }, 172 { -1, -1, 0, NULL, 173 NULL, NULL, NULL, 0, 0 } 174}; 175#endif 176 177static struct protox *protoprotox[] = { 178 protox, 179#ifdef INET6 180 ip6protox, 181#endif 182#ifdef IPSEC 183 pfkeyprotox, 184#endif 185 NULL }; 186 187static void printproto(struct protox *, const char *, bool *); 188static void usage(void) __dead2; 189static struct protox *name2protox(const char *); 190static struct protox *knownname(const char *); 191 192static int kresolve_list(struct nlist *_nl); 193 194static kvm_t *kvmd; 195static char *nlistf = NULL, *memf = NULL; 196 197int Aflag; /* show addresses of protocol control block */ 198int aflag; /* show all sockets (including servers) */ 199static int Bflag; /* show information about bpf consumers */ 200int bflag; /* show i/f total bytes in/out */ 201int cflag; /* show TCP congestion control stack */ 202int Cflag; /* show congestion control algo and vars */ 203int dflag; /* show i/f dropped packets */ 204int gflag; /* show group (multicast) routing or stats */ 205int hflag; /* show counters in human readable format */ 206int iflag; /* show interfaces */ 207int Lflag; /* show size of listen queues */ 208int mflag; /* show memory stats */ 209int noutputs = 0; /* how much outputs before we exit */ 210int numeric_addr; /* show addresses numerically */ 211int numeric_port; /* show ports numerically */ 212int Oflag; /* show nhgrp objects*/ 213int oflag; /* show nexthop objects*/ 214int Pflag; /* show TCP log ID */ 215static int pflag; /* show given protocol */ 216static int Qflag; /* show netisr information */ 217int rflag; /* show routing tables (or routing stats) */ 218int Rflag; /* show flow / RSS statistics */ 219int sflag; /* show protocol statistics */ 220int Wflag; /* wide display */ 221int Tflag; /* TCP Information */ 222int xflag; /* extra information, includes all socket buffer info */ 223int zflag; /* zero stats */ 224 225int interval; /* repeat interval for i/f stats */ 226 227char *interface; /* desired i/f for stats, or NULL for all i/fs */ 228int unit; /* unit number for above */ 229#ifdef JAIL 230char *jail_name; /* desired jail to operate in */ 231#endif 232 233static int af; /* address family */ 234int live; /* true if we are examining a live system */ 235 236int 237main(int argc, char *argv[]) 238{ 239 struct protox *tp = NULL; /* for printing cblocks & stats */ 240 int ch; 241 int fib = -1; 242 char *endptr; 243 bool first = true; 244#ifdef JAIL 245 int jid; 246#endif 247 248 af = AF_UNSPEC; 249 250 argc = xo_parse_args(argc, argv); 251 if (argc < 0) 252 exit(EXIT_FAILURE); 253 254 while ((ch = getopt(argc, argv, "46AaBbCcdF:f:ghI:ij:LlM:mN:nOoPp:Qq:RrSTsuWw:xz")) 255 != -1) 256 switch(ch) { 257 case '4': 258#ifdef INET 259 af = AF_INET; 260#else 261 errx(1, "IPv4 support is not compiled in"); 262#endif 263 break; 264 case '6': 265#ifdef INET6 266 af = AF_INET6; 267#else 268 errx(1, "IPv6 support is not compiled in"); 269#endif 270 break; 271 case 'A': 272 Aflag = 1; 273 break; 274 case 'a': 275 aflag = 1; 276 break; 277 case 'B': 278 Bflag = 1; 279 break; 280 case 'b': 281 bflag = 1; 282 break; 283 case 'c': 284 cflag = 1; 285 break; 286 case 'C': 287 Cflag = 1; 288 break; 289 case 'd': 290 dflag = 1; 291 break; 292 case 'F': 293 fib = strtol(optarg, &endptr, 0); 294 if (*endptr != '\0' || 295 (fib == 0 && (errno == EINVAL || errno == ERANGE))) 296 xo_errx(1, "%s: invalid fib", optarg); 297 break; 298 case 'f': 299 if (strcmp(optarg, "inet") == 0) 300 af = AF_INET; 301#ifdef INET6 302 else if (strcmp(optarg, "inet6") == 0) 303 af = AF_INET6; 304#endif 305#ifdef IPSEC 306 else if (strcmp(optarg, "pfkey") == 0) 307 af = PF_KEY; 308#endif 309 else if (strcmp(optarg, "unix") == 0 || 310 strcmp(optarg, "local") == 0) 311 af = AF_UNIX; 312#ifdef NETGRAPH 313 else if (strcmp(optarg, "ng") == 0 314 || strcmp(optarg, "netgraph") == 0) 315 af = AF_NETGRAPH; 316#endif 317 else if (strcmp(optarg, "link") == 0) 318 af = AF_LINK; 319 else { 320 xo_errx(1, "%s: unknown address family", 321 optarg); 322 } 323 break; 324 case 'g': 325 gflag = 1; 326 break; 327 case 'h': 328 hflag = 1; 329 break; 330 case 'I': { 331 char *cp; 332 333 iflag = 1; 334 for (cp = interface = optarg; isalpha(*cp); cp++) 335 continue; 336 unit = atoi(cp); 337 break; 338 } 339 case 'i': 340 iflag = 1; 341 break; 342 case 'j': 343#ifdef JAIL 344 if (optarg == NULL) 345 usage(); 346 jail_name = optarg; 347#else 348 errx(1, "Jail support is not compiled in"); 349#endif 350 break; 351 case 'L': 352 Lflag = 1; 353 break; 354 case 'M': 355 memf = optarg; 356 break; 357 case 'm': 358 mflag = 1; 359 break; 360 case 'N': 361 nlistf = optarg; 362 break; 363 case 'n': 364 numeric_addr = numeric_port = 1; 365 break; 366 case 'o': 367 oflag = 1; 368 break; 369 case 'O': 370 Oflag = 1; 371 break; 372 case 'P': 373 Pflag = 1; 374 break; 375 case 'p': 376 if ((tp = name2protox(optarg)) == NULL) { 377 xo_errx(1, "%s: unknown or uninstrumented " 378 "protocol", optarg); 379 } 380 pflag = 1; 381 break; 382 case 'Q': 383 Qflag = 1; 384 break; 385 case 'q': 386 noutputs = atoi(optarg); 387 if (noutputs != 0) 388 noutputs++; 389 break; 390 case 'r': 391 rflag = 1; 392 break; 393 case 'R': 394 Rflag = 1; 395 break; 396 case 's': 397 ++sflag; 398 break; 399 case 'S': 400 numeric_addr = 1; 401 break; 402 case 'u': 403 af = AF_UNIX; 404 break; 405 case 'W': 406 case 'l': 407 Wflag = 1; 408 break; 409 case 'w': 410 interval = atoi(optarg); 411 iflag = 1; 412 break; 413 case 'T': 414 Tflag = 1; 415 break; 416 case 'x': 417 xflag = 1; 418 break; 419 case 'z': 420 zflag = 1; 421 break; 422 case '?': 423 default: 424 usage(); 425 } 426 argv += optind; 427 argc -= optind; 428 429#define BACKWARD_COMPATIBILITY 430#ifdef BACKWARD_COMPATIBILITY 431 if (*argv) { 432 if (isdigit(**argv)) { 433 interval = atoi(*argv); 434 if (interval <= 0) 435 usage(); 436 ++argv; 437 iflag = 1; 438 } 439 if (*argv) { 440 nlistf = *argv; 441 if (*++argv) 442 memf = *argv; 443 } 444 } 445#endif 446 447#ifdef JAIL 448 if (jail_name != NULL) { 449 jid = jail_getid(jail_name); 450 if (jid == -1) 451 errx(1, "Jail not found"); 452 if (jail_attach(jid) != 0) 453 errx(1, "Cannot attach to jail"); 454 } 455#endif 456 457 /* 458 * Discard setgid privileges if not the running kernel so that bad 459 * guys can't print interesting stuff from kernel memory. 460 */ 461 live = (nlistf == NULL && memf == NULL); 462 if (!live) { 463 if (setgid(getgid()) != 0) 464 xo_err(-1, "setgid"); 465 /* Load all necessary kvm symbols */ 466 kresolve_list(nl); 467 } 468 469 if (xflag && Tflag) 470 xo_errx(1, "-x and -T are incompatible, pick one."); 471 472 if (Bflag) { 473 if (!live) 474 usage(); 475 bpf_stats(interface); 476 xo_finish(); 477 exit(0); 478 } 479 if (mflag) { 480 if (!live) { 481 if (kread(0, NULL, 0) == 0) 482 mbpr(kvmd, nl[N_SFSTAT].n_value); 483 } else 484 mbpr(NULL, 0); 485 xo_finish(); 486 exit(0); 487 } 488 if (Qflag) { 489 if (!live) { 490 if (kread(0, NULL, 0) == 0) 491 netisr_stats(); 492 } else 493 netisr_stats(); 494 xo_finish(); 495 exit(0); 496 } 497#if 0 498 /* 499 * Keep file descriptors open to avoid overhead 500 * of open/close on each call to get* routines. 501 */ 502 sethostent(1); 503 setnetent(1); 504#else 505 /* 506 * This does not make sense any more with DNS being default over 507 * the files. Doing a setXXXXent(1) causes a tcp connection to be 508 * used for the queries, which is slower. 509 */ 510#endif 511 if (iflag && !sflag) { 512 xo_open_container("statistics"); 513 intpr(NULL, af); 514 xo_close_container("statistics"); 515 xo_finish(); 516 exit(0); 517 } 518 if (rflag) { 519 xo_open_container("statistics"); 520 if (sflag) { 521 if (live) { 522 kresolve_list(nl); 523 } 524 rt_stats(); 525 } else 526 routepr(fib, af); 527 xo_close_container("statistics"); 528 xo_finish(); 529 exit(0); 530 } 531 if (oflag) { 532 xo_open_container("statistics"); 533 nhops_print(fib, af); 534 xo_close_container("statistics"); 535 xo_finish(); 536 exit(0); 537 } 538 if (Oflag) { 539 xo_open_container("statistics"); 540 nhgrp_print(fib, af); 541 xo_close_container("statistics"); 542 xo_finish(); 543 exit(0); 544 } 545 546 547 548 if (gflag) { 549 xo_open_container("statistics"); 550 if (sflag) { 551 if (af == AF_INET || af == AF_UNSPEC) 552 mrt_stats(); 553#ifdef INET6 554 if (af == AF_INET6 || af == AF_UNSPEC) 555 mrt6_stats(); 556#endif 557 } else { 558 if (af == AF_INET || af == AF_UNSPEC) 559 mroutepr(); 560#ifdef INET6 561 if (af == AF_INET6 || af == AF_UNSPEC) 562 mroute6pr(); 563#endif 564 } 565 xo_close_container("statistics"); 566 xo_finish(); 567 exit(0); 568 } 569 570 if (tp) { 571 xo_open_container("statistics"); 572 printproto(tp, tp->pr_name, &first); 573 if (!first) 574 xo_close_list("socket"); 575 xo_close_container("statistics"); 576 xo_finish(); 577 exit(0); 578 } 579 580 xo_open_container("statistics"); 581 if (af == AF_INET || af == AF_UNSPEC) 582 for (tp = protox; tp->pr_name; tp++) 583 printproto(tp, tp->pr_name, &first); 584#ifdef INET6 585 if (af == AF_INET6 || af == AF_UNSPEC) 586 for (tp = ip6protox; tp->pr_name; tp++) 587 printproto(tp, tp->pr_name, &first); 588#endif /*INET6*/ 589#ifdef IPSEC 590 if (af == PF_KEY || af == AF_UNSPEC) 591 for (tp = pfkeyprotox; tp->pr_name; tp++) 592 printproto(tp, tp->pr_name, &first); 593#endif /*IPSEC*/ 594#ifdef NETGRAPH 595 if (af == AF_NETGRAPH || af == AF_UNSPEC) 596 for (tp = netgraphprotox; tp->pr_name; tp++) 597 printproto(tp, tp->pr_name, &first); 598#endif /* NETGRAPH */ 599 if ((af == AF_UNIX || af == AF_UNSPEC) && !sflag) 600 unixpr(nl[N_UNP_COUNT].n_value, nl[N_UNP_GENCNT].n_value, 601 nl[N_UNP_DHEAD].n_value, nl[N_UNP_SHEAD].n_value, 602 nl[N_UNP_SPHEAD].n_value, &first); 603 604 if (!first) 605 xo_close_list("socket"); 606 xo_close_container("statistics"); 607 xo_finish(); 608 exit(0); 609} 610 611static int 612fetch_stats_internal(const char *sysctlname, u_long off, void *stats, 613 size_t len, kreadfn_t kreadfn, int zero) 614{ 615 int error; 616 617 if (live) { 618 memset(stats, 0, len); 619 if (zero) 620 error = sysctlbyname(sysctlname, NULL, NULL, stats, 621 len); 622 else 623 error = sysctlbyname(sysctlname, stats, &len, NULL, 0); 624 if (error == -1 && errno != ENOENT) 625 xo_warn("sysctl %s", sysctlname); 626 } else { 627 if (off == 0) 628 return (1); 629 error = kreadfn(off, stats, len); 630 } 631 return (error); 632} 633 634int 635fetch_stats(const char *sysctlname, u_long off, void *stats, 636 size_t len, kreadfn_t kreadfn) 637{ 638 639 return (fetch_stats_internal(sysctlname, off, stats, len, kreadfn, 640 zflag)); 641} 642 643int 644fetch_stats_ro(const char *sysctlname, u_long off, void *stats, 645 size_t len, kreadfn_t kreadfn) 646{ 647 648 return (fetch_stats_internal(sysctlname, off, stats, len, kreadfn, 0)); 649} 650 651/* 652 * Print out protocol statistics or control blocks (per sflag). 653 * If the interface was not specifically requested, and the symbol 654 * is not in the namelist, ignore this one. 655 */ 656static void 657printproto(struct protox *tp, const char *name, bool *first) 658{ 659 void (*pr)(u_long, const char *, int, int); 660 u_long off; 661 bool doingdblocks = false; 662 663 if (sflag) { 664 if (iflag) { 665 if (tp->pr_istats) 666 intpr(tp->pr_istats, af); 667 else if (pflag) 668 xo_message("%s: no per-interface stats routine", 669 tp->pr_name); 670 return; 671 } else { 672 pr = tp->pr_stats; 673 if (!pr) { 674 if (pflag) 675 xo_message("%s: no stats routine", 676 tp->pr_name); 677 return; 678 } 679 if (tp->pr_usesysctl && live) 680 off = 0; 681 else if (tp->pr_sindex < 0) { 682 if (pflag) 683 xo_message("%s: stats routine doesn't " 684 "work on cores", tp->pr_name); 685 return; 686 } else 687 off = nl[tp->pr_sindex].n_value; 688 } 689 } else { 690 doingdblocks = true; 691 pr = tp->pr_cblocks; 692 if (!pr) { 693 if (pflag) 694 xo_message("%s: no PCB routine", tp->pr_name); 695 return; 696 } 697 if (tp->pr_usesysctl && live) 698 off = 0; 699 else if (tp->pr_index < 0) { 700 if (pflag) 701 xo_message("%s: PCB routine doesn't work on " 702 "cores", tp->pr_name); 703 return; 704 } else 705 off = nl[tp->pr_index].n_value; 706 } 707 if (pr != NULL && (off || (live && tp->pr_usesysctl) || 708 af != AF_UNSPEC)) { 709 if (doingdblocks && *first) { 710 xo_open_list("socket"); 711 *first = false; 712 } 713 714 (*pr)(off, name, af, tp->pr_protocol); 715 } 716} 717 718static int 719kvmd_init(void) 720{ 721 char errbuf[_POSIX2_LINE_MAX]; 722 723 if (kvmd != NULL) 724 return (0); 725 726 kvmd = kvm_openfiles(nlistf, memf, NULL, O_RDONLY, errbuf); 727 if (setgid(getgid()) != 0) 728 xo_err(-1, "setgid"); 729 730 if (kvmd == NULL) { 731 xo_warnx("kvm not available: %s", errbuf); 732 return (-1); 733 } 734 735 return (0); 736} 737 738/* 739 * Resolve symbol list, return 0 on success. 740 */ 741static int 742kresolve_list(struct nlist *_nl) 743{ 744 745 if ((kvmd == NULL) && (kvmd_init() != 0)) 746 return (-1); 747 748 if (_nl[0].n_type != 0) 749 return (0); 750 751 if (kvm_nlist(kvmd, _nl) < 0) { 752 if (nlistf) 753 xo_errx(1, "%s: kvm_nlist: %s", nlistf, 754 kvm_geterr(kvmd)); 755 else 756 xo_errx(1, "kvm_nlist: %s", kvm_geterr(kvmd)); 757 } 758 759 return (0); 760} 761 762/* 763 * Wrapper of kvm_dpcpu_setcpu(). 764 */ 765void 766kset_dpcpu(u_int cpuid) 767{ 768 769 if ((kvmd == NULL) && (kvmd_init() != 0)) 770 xo_errx(-1, "%s: kvm is not available", __func__); 771 772 if (kvm_dpcpu_setcpu(kvmd, cpuid) < 0) 773 xo_errx(-1, "%s: kvm_dpcpu_setcpu(%u): %s", __func__, 774 cpuid, kvm_geterr(kvmd)); 775 return; 776} 777 778/* 779 * Read kernel memory, return 0 on success. 780 */ 781int 782kread(u_long addr, void *buf, size_t size) 783{ 784 785 if (kvmd_init() < 0) 786 return (-1); 787 788 if (!buf) 789 return (0); 790 if (kvm_read(kvmd, addr, buf, size) != (ssize_t)size) { 791 xo_warnx("%s", kvm_geterr(kvmd)); 792 return (-1); 793 } 794 return (0); 795} 796 797/* 798 * Read single counter(9). 799 */ 800uint64_t 801kread_counter(u_long addr) 802{ 803 804 if (kvmd_init() < 0) 805 return (-1); 806 807 return (kvm_counter_u64_fetch(kvmd, addr)); 808} 809 810/* 811 * Read an array of N counters in kernel memory into array of N uint64_t's. 812 */ 813int 814kread_counters(u_long addr, void *buf, size_t size) 815{ 816 uint64_t *c; 817 u_long *counters; 818 size_t i, n; 819 820 if (kvmd_init() < 0) 821 return (-1); 822 823 if (size % sizeof(uint64_t) != 0) { 824 xo_warnx("kread_counters: invalid counter set size"); 825 return (-1); 826 } 827 828 n = size / sizeof(uint64_t); 829 if ((counters = malloc(n * sizeof(u_long))) == NULL) 830 xo_err(-1, "malloc"); 831 if (kread(addr, counters, n * sizeof(u_long)) < 0) { 832 free(counters); 833 return (-1); 834 } 835 836 c = buf; 837 for (i = 0; i < n; i++) 838 c[i] = kvm_counter_u64_fetch(kvmd, counters[i]); 839 840 free(counters); 841 return (0); 842} 843 844const char * 845plural(uintmax_t n) 846{ 847 return (n != 1 ? "s" : ""); 848} 849 850const char * 851plurales(uintmax_t n) 852{ 853 return (n != 1 ? "es" : ""); 854} 855 856const char * 857pluralies(uintmax_t n) 858{ 859 return (n != 1 ? "ies" : "y"); 860} 861 862/* 863 * Find the protox for the given "well-known" name. 864 */ 865static struct protox * 866knownname(const char *name) 867{ 868 struct protox **tpp, *tp; 869 870 for (tpp = protoprotox; *tpp; tpp++) 871 for (tp = *tpp; tp->pr_name; tp++) 872 if (strcmp(tp->pr_name, name) == 0) 873 return (tp); 874 return (NULL); 875} 876 877/* 878 * Find the protox corresponding to name. 879 */ 880static struct protox * 881name2protox(const char *name) 882{ 883 struct protox *tp; 884 char **alias; /* alias from p->aliases */ 885 struct protoent *p; 886 887 /* 888 * Try to find the name in the list of "well-known" names. If that 889 * fails, check if name is an alias for an Internet protocol. 890 */ 891 if ((tp = knownname(name)) != NULL) 892 return (tp); 893 894 setprotoent(1); /* make protocol lookup cheaper */ 895 while ((p = getprotoent()) != NULL) { 896 /* assert: name not same as p->name */ 897 for (alias = p->p_aliases; *alias; alias++) 898 if (strcmp(name, *alias) == 0) { 899 endprotoent(); 900 return (knownname(p->p_name)); 901 } 902 } 903 endprotoent(); 904 return (NULL); 905} 906 907static void 908usage(void) 909{ 910 (void)xo_error("%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n%s\n", 911"usage: netstat [-j jail] [-46AaCcLnRSTWx] [-f protocol_family | -p protocol]\n" 912" [-M core] [-N system]", 913" netstat [-j jail] -i | -I interface [-46abdhnW] [-f address_family]\n" 914" [-M core] [-N system]", 915" netstat [-j jail] -w wait [-I interface] [-46d] [-M core] [-N system]\n" 916" [-q howmany]", 917" netstat [-j jail] -s [-46sz] [-f protocol_family | -p protocol]\n" 918" [-M core] [-N system]", 919" netstat [-j jail] -i | -I interface -s [-46s]\n" 920" [-f protocol_family | -p protocol] [-M core] [-N system]", 921" netstat [-j jail] -m [-M core] [-N system]", 922" netstat [-j jail] -B [-z] [-I interface]", 923" netstat [-j jail] -r [-46AnW] [-F fibnum] [-f address_family]\n" 924" [-M core] [-N system]", 925" netstat [-j jail] -rs [-s] [-M core] [-N system]", 926" netstat [-j jail] -g [-46W] [-f address_family] [-M core] [-N system]", 927" netstat [-j jail] -gs [-46s] [-f address_family] [-M core] [-N system]", 928" netstat [-j jail] -Q"); 929 xo_finish(); 930 exit(1); 931} 932