1 1.18 martin /* $NetBSD: bpf.c,v 1.18 2023/08/18 13:18:17 martin Exp $ */ 2 1.1 rpaulo 3 1.1 rpaulo /* 4 1.1 rpaulo * Copyright (c) 2005 The NetBSD Foundation, Inc. 5 1.1 rpaulo * All rights reserved. 6 1.1 rpaulo * 7 1.1 rpaulo * This code is derived from software contributed to The NetBSD Foundation 8 1.1 rpaulo * by Rui Paulo. 9 1.1 rpaulo * 10 1.1 rpaulo * Redistribution and use in source and binary forms, with or without 11 1.1 rpaulo * modification, are permitted provided that the following conditions 12 1.1 rpaulo * are met: 13 1.1 rpaulo * 1. Redistributions of source code must retain the above copyright 14 1.1 rpaulo * notice, this list of conditions and the following disclaimer. 15 1.1 rpaulo * 2. Redistributions in binary form must reproduce the above copyright 16 1.1 rpaulo * notice, this list of conditions and the following disclaimer in the 17 1.1 rpaulo * documentation and/or other materials provided with the distribution. 18 1.1 rpaulo * 19 1.1 rpaulo * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 20 1.1 rpaulo * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 21 1.1 rpaulo * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 22 1.1 rpaulo * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 23 1.1 rpaulo * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 24 1.1 rpaulo * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 25 1.1 rpaulo * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 26 1.1 rpaulo * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 27 1.1 rpaulo * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 28 1.1 rpaulo * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29 1.1 rpaulo * POSSIBILITY OF SUCH DAMAGE. 30 1.1 rpaulo */ 31 1.1 rpaulo 32 1.1 rpaulo #include <err.h> 33 1.1 rpaulo #include <errno.h> 34 1.1 rpaulo #include <fcntl.h> 35 1.1 rpaulo #include <kvm.h> 36 1.1 rpaulo #include <stdio.h> 37 1.1 rpaulo #include <stdlib.h> 38 1.1 rpaulo #include <string.h> 39 1.1 rpaulo #include <unistd.h> 40 1.1 rpaulo #include <net/if.h> 41 1.1 rpaulo #include <sys/types.h> 42 1.1 rpaulo #include <sys/param.h> 43 1.1 rpaulo #include <sys/sysctl.h> 44 1.1 rpaulo #include <net/bpfdesc.h> 45 1.1 rpaulo #include <net/bpf.h> 46 1.1 rpaulo #include "netstat.h" 47 1.10 pooka #include "prog_ops.h" 48 1.1 rpaulo 49 1.1 rpaulo void 50 1.18 martin nsbpf_stats(void) 51 1.1 rpaulo { 52 1.1 rpaulo struct bpf_stat bpf_s; 53 1.1 rpaulo size_t len = sizeof(bpf_s); 54 1.1 rpaulo 55 1.4 rpaulo if (use_sysctl) { 56 1.16 msaitoh if (prog_sysctlbyname("net.bpf.stats", &bpf_s, &len, NULL, 0) 57 1.16 msaitoh == -1 && errno != ENOMEM) 58 1.4 rpaulo err(1, "net.bpf.stats"); 59 1.16 msaitoh 60 1.4 rpaulo printf("bpf:\n"); 61 1.16 msaitoh printf("\t%" PRIu64 " total packets received\n", 62 1.4 rpaulo bpf_s.bs_recv); 63 1.16 msaitoh printf("\t%" PRIu64 " total packets captured\n", 64 1.4 rpaulo bpf_s.bs_capt); 65 1.16 msaitoh printf("\t%" PRIu64 " total packets dropped\n", 66 1.4 rpaulo bpf_s.bs_drop); 67 1.16 msaitoh } else 68 1.7 thorpej warnx("BPF stats not available via KVM."); 69 1.1 rpaulo } 70 1.1 rpaulo 71 1.1 rpaulo void 72 1.18 martin nsbpf_dump(const char *bpfif) 73 1.1 rpaulo { 74 1.1 rpaulo struct bpf_d_ext *dpe; 75 1.1 rpaulo 76 1.4 rpaulo if (use_sysctl) { 77 1.9 lukem int name[CTL_MAXNAME], rc; 78 1.9 lukem size_t i, sz, szproc; 79 1.4 rpaulo u_int namelen; 80 1.4 rpaulo void *v; 81 1.4 rpaulo struct kinfo_proc2 p; 82 1.16 msaitoh 83 1.4 rpaulo /* adapted from sockstat.c by Andrew Brown */ 84 1.1 rpaulo 85 1.4 rpaulo sz = CTL_MAXNAME; 86 1.14 kamil if (prog_sysctlnametomib("net.bpf.peers", &name[0], &sz) == -1) 87 1.6 elad err(1, "sysctlnametomib: net.bpf.peers"); 88 1.4 rpaulo namelen = sz; 89 1.1 rpaulo 90 1.4 rpaulo name[namelen++] = sizeof(*dpe); 91 1.4 rpaulo name[namelen++] = INT_MAX; 92 1.16 msaitoh 93 1.4 rpaulo v = NULL; 94 1.4 rpaulo sz = 0; 95 1.4 rpaulo do { 96 1.10 pooka rc = prog_sysctl(&name[0], namelen, 97 1.10 pooka v, &sz, NULL, 0); 98 1.4 rpaulo if (rc == -1 && errno != ENOMEM) 99 1.4 rpaulo err(1, "sysctl: net.bpf.peers"); 100 1.4 rpaulo if (rc == -1 && v != NULL) { 101 1.4 rpaulo free(v); 102 1.4 rpaulo v = NULL; 103 1.4 rpaulo } 104 1.4 rpaulo if (v == NULL) { 105 1.4 rpaulo v = malloc(sz); 106 1.4 rpaulo rc = -1; 107 1.4 rpaulo } 108 1.4 rpaulo if (v == NULL) 109 1.4 rpaulo err(1, "malloc"); 110 1.4 rpaulo } while (rc == -1); 111 1.4 rpaulo 112 1.4 rpaulo dpe = v; 113 1.4 rpaulo 114 1.5 rpaulo puts("Active BPF peers\nPID\tInt\tRecv Drop Capt" \ 115 1.5 rpaulo " Flags Bufsize Comm"); 116 1.1 rpaulo 117 1.1 rpaulo #define BPFEXT(entry) dpe->entry 118 1.1 rpaulo 119 1.4 rpaulo for (i = 0; i < (sz / sizeof(*dpe)); i++, dpe++) { 120 1.16 msaitoh if (bpfif && 121 1.9 lukem strncmp(BPFEXT(bde_ifname), bpfif, IFNAMSIZ)) 122 1.4 rpaulo continue; 123 1.16 msaitoh 124 1.4 rpaulo printf("%-7d ", BPFEXT(bde_pid)); 125 1.4 rpaulo printf("%-7s ", 126 1.16 msaitoh (BPFEXT(bde_ifname)[0] == '\0') ? "-" : 127 1.4 rpaulo BPFEXT(bde_ifname)); 128 1.4 rpaulo 129 1.16 msaitoh printf("%-8" PRIu64 " %-8" PRIu64 " %-8" PRIu64 " ", 130 1.16 msaitoh BPFEXT(bde_rcount), BPFEXT(bde_dcount), 131 1.4 rpaulo BPFEXT(bde_ccount)); 132 1.16 msaitoh 133 1.4 rpaulo switch (BPFEXT(bde_state)) { 134 1.4 rpaulo case BPF_IDLE: 135 1.4 rpaulo printf("I"); 136 1.4 rpaulo break; 137 1.4 rpaulo case BPF_WAITING: 138 1.4 rpaulo printf("W"); 139 1.4 rpaulo break; 140 1.4 rpaulo case BPF_TIMED_OUT: 141 1.4 rpaulo printf("T"); 142 1.4 rpaulo break; 143 1.4 rpaulo default: 144 1.4 rpaulo printf("-"); 145 1.4 rpaulo break; 146 1.4 rpaulo } 147 1.16 msaitoh 148 1.4 rpaulo printf("%c", BPFEXT(bde_promisc) ? 'P' : '-'); 149 1.4 rpaulo printf("%c", BPFEXT(bde_immediate) ? 'R' : '-'); 150 1.16 msaitoh printf("%c", (BPFEXT(bde_direction) == BPF_D_IN) ? 151 1.16 msaitoh '-' : (BPFEXT(bde_direction) == BPF_D_OUT) ? 152 1.16 msaitoh 'O' : 'S'); 153 1.4 rpaulo printf("%c", BPFEXT(bde_hdrcmplt) ? 'H' : '-'); 154 1.4 rpaulo printf(" %-8d ", BPFEXT(bde_bufsize)); 155 1.4 rpaulo 156 1.4 rpaulo szproc = sizeof(p); 157 1.4 rpaulo namelen = 0; 158 1.4 rpaulo name[namelen++] = CTL_KERN; 159 1.4 rpaulo name[namelen++] = KERN_PROC2; 160 1.4 rpaulo name[namelen++] = KERN_PROC_PID; 161 1.4 rpaulo name[namelen++] = BPFEXT(bde_pid); 162 1.4 rpaulo name[namelen++] = szproc; 163 1.4 rpaulo name[namelen++] = 1; 164 1.4 rpaulo 165 1.17 yamt /* 166 1.17 yamt * Note: The sysctl succeeds (returns 0) even if it failed 167 1.17 yamt * to find the process. The szproc check below is to detect 168 1.17 yamt * that case. 169 1.17 yamt */ 170 1.16 msaitoh if (prog_sysctl(&name[0], namelen, &p, &szproc, 171 1.17 yamt NULL, 0) == -1 || szproc != sizeof(p)) 172 1.4 rpaulo printf("-\n"); 173 1.4 rpaulo else 174 1.4 rpaulo printf("%s\n", p.p_comm); 175 1.4 rpaulo #undef BPFEXT 176 1.1 rpaulo } 177 1.11 msaitoh free(v); 178 1.4 rpaulo } else { 179 1.16 msaitoh /* XXX */ 180 1.16 msaitoh errx(1, "bpf_dump not implemented using kvm"); 181 1.16 msaitoh } 182 1.1 rpaulo } 183