Home | History | Annotate | Line # | Download | only in netstat
      1  1.18   martin /*	$NetBSD: bpf.c,v 1.18 2023/08/18 13:18:17 martin Exp $	*/
      2   1.1   rpaulo 
      3   1.1   rpaulo /*
      4   1.1   rpaulo  * Copyright (c) 2005 The NetBSD Foundation, Inc.
      5   1.1   rpaulo  * All rights reserved.
      6   1.1   rpaulo  *
      7   1.1   rpaulo  * This code is derived from software contributed to The NetBSD Foundation
      8   1.1   rpaulo  * by Rui Paulo.
      9   1.1   rpaulo  *
     10   1.1   rpaulo  * Redistribution and use in source and binary forms, with or without
     11   1.1   rpaulo  * modification, are permitted provided that the following conditions
     12   1.1   rpaulo  * are met:
     13   1.1   rpaulo  * 1. Redistributions of source code must retain the above copyright
     14   1.1   rpaulo  *    notice, this list of conditions and the following disclaimer.
     15   1.1   rpaulo  * 2. Redistributions in binary form must reproduce the above copyright
     16   1.1   rpaulo  *    notice, this list of conditions and the following disclaimer in the
     17   1.1   rpaulo  *    documentation and/or other materials provided with the distribution.
     18   1.1   rpaulo  *
     19   1.1   rpaulo  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20   1.1   rpaulo  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21   1.1   rpaulo  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22   1.1   rpaulo  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23   1.1   rpaulo  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24   1.1   rpaulo  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25   1.1   rpaulo  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26   1.1   rpaulo  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27   1.1   rpaulo  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28   1.1   rpaulo  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29   1.1   rpaulo  * POSSIBILITY OF SUCH DAMAGE.
     30   1.1   rpaulo  */
     31   1.1   rpaulo 
     32   1.1   rpaulo #include <err.h>
     33   1.1   rpaulo #include <errno.h>
     34   1.1   rpaulo #include <fcntl.h>
     35   1.1   rpaulo #include <kvm.h>
     36   1.1   rpaulo #include <stdio.h>
     37   1.1   rpaulo #include <stdlib.h>
     38   1.1   rpaulo #include <string.h>
     39   1.1   rpaulo #include <unistd.h>
     40   1.1   rpaulo #include <net/if.h>
     41   1.1   rpaulo #include <sys/types.h>
     42   1.1   rpaulo #include <sys/param.h>
     43   1.1   rpaulo #include <sys/sysctl.h>
     44   1.1   rpaulo #include <net/bpfdesc.h>
     45   1.1   rpaulo #include <net/bpf.h>
     46   1.1   rpaulo #include "netstat.h"
     47  1.10    pooka #include "prog_ops.h"
     48   1.1   rpaulo 
     49   1.1   rpaulo void
     50  1.18   martin nsbpf_stats(void)
     51   1.1   rpaulo {
     52   1.1   rpaulo 	struct bpf_stat bpf_s;
     53   1.1   rpaulo 	size_t len = sizeof(bpf_s);
     54   1.1   rpaulo 
     55   1.4   rpaulo 	if (use_sysctl) {
     56  1.16  msaitoh 		if (prog_sysctlbyname("net.bpf.stats", &bpf_s, &len, NULL, 0)
     57  1.16  msaitoh 		    == -1 && errno != ENOMEM)
     58   1.4   rpaulo 			err(1, "net.bpf.stats");
     59  1.16  msaitoh 
     60   1.4   rpaulo 		printf("bpf:\n");
     61  1.16  msaitoh 		printf("\t%" PRIu64 " total packets received\n",
     62   1.4   rpaulo 		    bpf_s.bs_recv);
     63  1.16  msaitoh 		printf("\t%" PRIu64 " total packets captured\n",
     64   1.4   rpaulo 		    bpf_s.bs_capt);
     65  1.16  msaitoh 		printf("\t%" PRIu64 " total packets dropped\n",
     66   1.4   rpaulo 		    bpf_s.bs_drop);
     67  1.16  msaitoh 	} else
     68   1.7  thorpej 		warnx("BPF stats not available via KVM.");
     69   1.1   rpaulo }
     70   1.1   rpaulo 
     71   1.1   rpaulo void
     72  1.18   martin nsbpf_dump(const char *bpfif)
     73   1.1   rpaulo {
     74   1.1   rpaulo 	struct bpf_d_ext *dpe;
     75   1.1   rpaulo 
     76   1.4   rpaulo 	if (use_sysctl) {
     77   1.9    lukem 		int	name[CTL_MAXNAME], rc;
     78   1.9    lukem 		size_t	i, sz, szproc;
     79   1.4   rpaulo 		u_int	namelen;
     80   1.4   rpaulo 		void	*v;
     81   1.4   rpaulo 		struct kinfo_proc2 p;
     82  1.16  msaitoh 
     83   1.4   rpaulo 		/* adapted from sockstat.c by Andrew Brown */
     84   1.1   rpaulo 
     85   1.4   rpaulo 		sz = CTL_MAXNAME;
     86  1.14    kamil 		if (prog_sysctlnametomib("net.bpf.peers", &name[0], &sz) == -1)
     87   1.6     elad 			err(1, "sysctlnametomib: net.bpf.peers");
     88   1.4   rpaulo 		namelen = sz;
     89   1.1   rpaulo 
     90   1.4   rpaulo 		name[namelen++] = sizeof(*dpe);
     91   1.4   rpaulo 		name[namelen++] = INT_MAX;
     92  1.16  msaitoh 
     93   1.4   rpaulo 		v = NULL;
     94   1.4   rpaulo 		sz = 0;
     95   1.4   rpaulo 		do {
     96  1.10    pooka 			rc = prog_sysctl(&name[0], namelen,
     97  1.10    pooka 			    v, &sz, NULL, 0);
     98   1.4   rpaulo 			if (rc == -1 && errno != ENOMEM)
     99   1.4   rpaulo 				err(1, "sysctl: net.bpf.peers");
    100   1.4   rpaulo 			if (rc == -1 && v != NULL) {
    101   1.4   rpaulo 				free(v);
    102   1.4   rpaulo 				v = NULL;
    103   1.4   rpaulo 			}
    104   1.4   rpaulo 			if (v == NULL) {
    105   1.4   rpaulo 				v = malloc(sz);
    106   1.4   rpaulo 				rc = -1;
    107   1.4   rpaulo 			}
    108   1.4   rpaulo 			if (v == NULL)
    109   1.4   rpaulo 				err(1, "malloc");
    110   1.4   rpaulo 		} while (rc == -1);
    111   1.4   rpaulo 
    112   1.4   rpaulo 		dpe = v;
    113   1.4   rpaulo 
    114   1.5   rpaulo 		puts("Active BPF peers\nPID\tInt\tRecv     Drop     Capt" \
    115   1.5   rpaulo 		    "     Flags  Bufsize  Comm");
    116   1.1   rpaulo 
    117   1.1   rpaulo #define BPFEXT(entry) dpe->entry
    118   1.1   rpaulo 
    119   1.4   rpaulo 		for (i = 0; i < (sz / sizeof(*dpe)); i++, dpe++) {
    120  1.16  msaitoh 			if (bpfif &&
    121   1.9    lukem 			    strncmp(BPFEXT(bde_ifname), bpfif, IFNAMSIZ))
    122   1.4   rpaulo 				continue;
    123  1.16  msaitoh 
    124   1.4   rpaulo 			printf("%-7d ", BPFEXT(bde_pid));
    125   1.4   rpaulo 			printf("%-7s ",
    126  1.16  msaitoh 			       (BPFEXT(bde_ifname)[0] == '\0') ? "-" :
    127   1.4   rpaulo 			       BPFEXT(bde_ifname));
    128   1.4   rpaulo 
    129  1.16  msaitoh 			printf("%-8" PRIu64 " %-8" PRIu64 " %-8" PRIu64 " ",
    130  1.16  msaitoh 				BPFEXT(bde_rcount), BPFEXT(bde_dcount),
    131   1.4   rpaulo 				BPFEXT(bde_ccount));
    132  1.16  msaitoh 
    133   1.4   rpaulo 			switch (BPFEXT(bde_state)) {
    134   1.4   rpaulo 			case BPF_IDLE:
    135   1.4   rpaulo 				printf("I");
    136   1.4   rpaulo 				break;
    137   1.4   rpaulo 			case BPF_WAITING:
    138   1.4   rpaulo 				printf("W");
    139   1.4   rpaulo 				break;
    140   1.4   rpaulo 			case BPF_TIMED_OUT:
    141   1.4   rpaulo 				printf("T");
    142   1.4   rpaulo 				break;
    143   1.4   rpaulo 			default:
    144   1.4   rpaulo 				printf("-");
    145   1.4   rpaulo 				break;
    146   1.4   rpaulo 			}
    147  1.16  msaitoh 
    148   1.4   rpaulo 			printf("%c", BPFEXT(bde_promisc) ? 'P' : '-');
    149   1.4   rpaulo 			printf("%c", BPFEXT(bde_immediate) ? 'R' : '-');
    150  1.16  msaitoh 			printf("%c", (BPFEXT(bde_direction) == BPF_D_IN) ?
    151  1.16  msaitoh 			    '-' : (BPFEXT(bde_direction) == BPF_D_OUT) ?
    152  1.16  msaitoh 			    'O' : 'S');
    153   1.4   rpaulo 			printf("%c", BPFEXT(bde_hdrcmplt) ? 'H' : '-');
    154   1.4   rpaulo 			printf("  %-8d ", BPFEXT(bde_bufsize));
    155   1.4   rpaulo 
    156   1.4   rpaulo 			szproc = sizeof(p);
    157   1.4   rpaulo 			namelen = 0;
    158   1.4   rpaulo 			name[namelen++] = CTL_KERN;
    159   1.4   rpaulo 			name[namelen++] = KERN_PROC2;
    160   1.4   rpaulo 			name[namelen++] = KERN_PROC_PID;
    161   1.4   rpaulo 			name[namelen++] = BPFEXT(bde_pid);
    162   1.4   rpaulo 			name[namelen++] = szproc;
    163   1.4   rpaulo 			name[namelen++] = 1;
    164   1.4   rpaulo 
    165  1.17     yamt 			/*
    166  1.17     yamt 			 * Note: The sysctl succeeds (returns 0) even if it failed
    167  1.17     yamt 			 * to find the process. The szproc check below is to detect
    168  1.17     yamt 			 * that case.
    169  1.17     yamt 			 */
    170  1.16  msaitoh 			if (prog_sysctl(&name[0], namelen, &p, &szproc,
    171  1.17     yamt 			    NULL, 0) == -1 || szproc != sizeof(p))
    172   1.4   rpaulo 				printf("-\n");
    173   1.4   rpaulo 			else
    174   1.4   rpaulo 				printf("%s\n", p.p_comm);
    175   1.4   rpaulo #undef BPFEXT
    176   1.1   rpaulo 		}
    177  1.11  msaitoh 		free(v);
    178   1.4   rpaulo 	} else {
    179  1.16  msaitoh 		/* XXX */
    180  1.16  msaitoh 		errx(1, "bpf_dump not implemented using kvm");
    181  1.16  msaitoh 	}
    182   1.1   rpaulo }
    183