1 /* vi: set sw=4 ts=4: */
3 * Mini netstat implementation(s) for busybox
4 * based in part on the netstat implementation from net-tools.
6 * Copyright (C) 2002 by Bart Visscher <magick@linux-fan.com>
9 * IPV6 support added by Bart Visscher <magick@linux-fan.com>
12 * optional '-p' flag support ported from net-tools by G. Somlo <somlo@cmu.edu>
14 * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
18 #include "inet_common.h"
20 #define NETSTAT_OPTS "laentuwx" \
22 USE_FEATURE_NETSTAT_WIDE("W") \
23 USE_FEATURE_NETSTAT_PRG( "p")
27 USE_ROUTE( OPTBIT_ROUTE,)
28 USE_FEATURE_NETSTAT_WIDE(OPTBIT_WIDE ,)
29 USE_FEATURE_NETSTAT_PRG( OPTBIT_PRG ,)
30 OPT_sock_listen = 1 << 0, // l
31 OPT_sock_all = 1 << 1, // a
32 OPT_extended = 1 << 2, // e
33 OPT_noresolve = 1 << 3, // n
34 OPT_sock_tcp = 1 << 4, // t
35 OPT_sock_udp = 1 << 5, // u
36 OPT_sock_raw = 1 << 6, // w
37 OPT_sock_unix = 1 << 7, // x
38 OPT_route = USE_ROUTE( (1 << OPTBIT_ROUTE)) + 0, // r
39 OPT_wide = USE_FEATURE_NETSTAT_WIDE((1 << OPTBIT_WIDE )) + 0, // W
40 OPT_prg = USE_FEATURE_NETSTAT_PRG( (1 << OPTBIT_PRG )) + 0, // p
43 #define NETSTAT_CONNECTED 0x01
44 #define NETSTAT_LISTENING 0x02
45 #define NETSTAT_NUMERIC 0x04
46 /* Must match getopt32 option string */
47 #define NETSTAT_TCP 0x10
48 #define NETSTAT_UDP 0x20
49 #define NETSTAT_RAW 0x40
50 #define NETSTAT_UNIX 0x80
51 #define NETSTAT_ALLPROTO (NETSTAT_TCP|NETSTAT_UDP|NETSTAT_RAW|NETSTAT_UNIX)
65 TCP_CLOSING, /* now a valid state */
68 static const char *const tcp_state[] = {
84 SS_FREE = 0, /* not allocated */
85 SS_UNCONNECTED, /* unconnected to any socket */
86 SS_CONNECTING, /* in process of connecting */
87 SS_CONNECTED, /* connected to socket */
88 SS_DISCONNECTING /* in process of disconnecting */
91 #define SO_ACCEPTCON (1<<16) /* performed a listen */
92 #define SO_WAITDATA (1<<17) /* wait data to read */
93 #define SO_NOSPACE (1<<18) /* no space to write */
95 /* Standard printout size */
96 #define PRINT_IP_MAX_SIZE 23
97 #define PRINT_NET_CONN "%s %6ld %6ld %-23s %-23s %-12s"
98 #define PRINT_NET_CONN_HEADER "\nProto Recv-Q Send-Q %-23s %-23s State "
100 /* When there are IPv6 connections the IPv6 addresses will be
101 * truncated to none-recognition. The '-W' option makes the
102 * address columns wide enough to accomodate for longest possible
103 * IPv6 addresses, i.e. addresses of the form
104 * xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:ddd.ddd.ddd.ddd
106 #define PRINT_IP_MAX_SIZE_WIDE 51 /* INET6_ADDRSTRLEN + 5 for the port number */
107 #define PRINT_NET_CONN_WIDE "%s %6ld %6ld %-51s %-51s %-12s"
108 #define PRINT_NET_CONN_HEADER_WIDE "\nProto Recv-Q Send-Q %-51s %-51s State "
111 #define PROGNAME_WIDTH 20
112 #define PROGNAME_WIDTH_STR "20"
113 /* PROGNAME_WIDTH chars: 12345678901234567890 */
114 #define PROGNAME_BANNER "PID/Program name "
117 struct prg_node *next;
119 char name[PROGNAME_WIDTH];
122 #define PRG_HASH_SIZE 211
126 const char *net_conn_line;
128 #if ENABLE_FEATURE_NETSTAT_PRG
129 smallint prg_cache_loaded;
130 struct prg_node *prg_hash[PRG_HASH_SIZE];
133 #define G (*ptr_to_globals)
134 #define flags (G.flags )
135 #define net_conn_line (G.net_conn_line )
136 #define prg_hash (G.prg_hash )
137 #define prg_cache_loaded (G.prg_cache_loaded)
138 #define INIT_G() do { \
139 SET_PTR_TO_GLOBALS(xzalloc(sizeof(G))); \
140 flags = NETSTAT_CONNECTED | NETSTAT_ALLPROTO; \
141 net_conn_line = PRINT_NET_CONN; \
145 #if ENABLE_FEATURE_NETSTAT_PRG
147 /* Deliberately truncating long to unsigned *int* */
148 #define PRG_HASHIT(x) ((unsigned)(x) % PRG_HASH_SIZE)
150 #define print_progname_banner() do { \
151 if (option_mask32 & OPT_prg) printf(PROGNAME_BANNER); \
154 static void prg_cache_add(long inode, char *name)
156 unsigned hi = PRG_HASHIT(inode);
157 struct prg_node **pnp, *pn;
159 prg_cache_loaded = 2;
160 for (pnp = prg_hash + hi; (pn = *pnp) != NULL; pnp = &pn->next) {
161 if (pn->inode == inode) {
162 /* Some warning should be appropriate here
163 as we got multiple processes for one i-node */
167 *pnp = xzalloc(sizeof(struct prg_node));
170 safe_strncpy(pn->name, name, PROGNAME_WIDTH);
173 static const char *prg_cache_get(long inode)
175 unsigned hi = PRG_HASHIT(inode);
178 for (pn = prg_hash[hi]; pn; pn = pn->next)
179 if (pn->inode == inode)
184 #if ENABLE_FEATURE_CLEAN_UP
185 static void prg_cache_clear(void)
187 struct prg_node **pnp, *pn;
189 for (pnp = prg_hash; pnp < prg_hash + PRG_HASH_SIZE; pnp++) {
190 while ((pn = *pnp) != NULL) {
197 #define prg_cache_clear() ((void)0)
200 static long extract_socket_inode(const char *lname)
204 if (strncmp(lname, "socket:[", sizeof("socket:[")-1) == 0) {
205 /* "socket:[12345]", extract the "12345" as inode */
206 inode = bb_strtol(lname + sizeof("socket:[")-1, (char**)&lname, 0);
209 } else if (strncmp(lname, "[0000]:", sizeof("[0000]:")-1) == 0) {
210 /* "[0000]:12345", extract the "12345" as inode */
211 inode = bb_strtol(lname + sizeof("[0000]:")-1, NULL, 0);
212 if (errno) /* not NUL terminated? */
216 #if 0 /* bb_strtol returns all-ones bit pattern on ERANGE anyway */
223 static int FAST_FUNC file_act(const char *fileName,
224 struct stat *statbuf UNUSED_PARAM,
226 int depth UNUSED_PARAM)
231 linkname = xmalloc_readlink(fileName);
232 if (linkname != NULL) {
233 inode = extract_socket_inode(linkname);
236 prg_cache_add(inode, (char *)userData);
241 static int FAST_FUNC dir_act(const char *fileName,
242 struct stat *statbuf UNUSED_PARAM,
243 void *userData UNUSED_PARAM,
246 const char *shortName;
248 char cmdline_buf[512];
251 if (depth == 0) /* "/proc" itself */
252 return TRUE; /* continue looking one level below /proc */
254 shortName = fileName + sizeof("/proc/")-1; /* point after "/proc/" */
255 if (!isdigit(shortName[0])) /* skip /proc entries whic aren't processes */
258 p = concat_path_file(fileName, "cmdline"); /* "/proc/PID/cmdline" */
259 i = open_read_close(p, cmdline_buf, sizeof(cmdline_buf) - 1);
263 cmdline_buf[i] = '\0';
264 q = concat_path_file(shortName, bb_basename(cmdline_buf)); /* "PID/argv0" */
266 /* go through all files in /proc/PID/fd */
267 p = concat_path_file(fileName, "fd");
268 i = recursive_action(p, ACTION_RECURSE | ACTION_QUIET,
269 file_act, NULL, (void *)q, 0);
275 return FALSE; /* signal permissions error to caller */
277 return SKIP; /* caller should not recurse further into this dir. */
280 static void prg_cache_load(void)
284 prg_cache_loaded = 1;
285 load_ok = recursive_action("/proc", ACTION_RECURSE | ACTION_QUIET,
286 NULL, dir_act, NULL, 0);
290 if (prg_cache_loaded == 1)
291 bb_error_msg("can't scan /proc - are you root?");
293 bb_error_msg("showing only processes with your user ID");
298 #define prg_cache_clear() ((void)0)
299 #define print_progname_banner() ((void)0)
301 #endif //ENABLE_FEATURE_NETSTAT_PRG
304 #if ENABLE_FEATURE_IPV6
305 static void build_ipv6_addr(char* local_addr, struct sockaddr_in6* localaddr)
307 char addr6[INET6_ADDRSTRLEN];
310 sscanf(local_addr, "%08X%08X%08X%08X",
311 &in6.s6_addr32[0], &in6.s6_addr32[1],
312 &in6.s6_addr32[2], &in6.s6_addr32[3]);
313 inet_ntop(AF_INET6, &in6, addr6, sizeof(addr6));
314 inet_pton(AF_INET6, addr6, (struct sockaddr *) &localaddr->sin6_addr);
316 localaddr->sin6_family = AF_INET6;
320 #if ENABLE_FEATURE_IPV6
321 static void build_ipv4_addr(char* local_addr, struct sockaddr_in6* localaddr)
323 static void build_ipv4_addr(char* local_addr, struct sockaddr_in* localaddr)
326 sscanf(local_addr, "%X",
327 &((struct sockaddr_in *) localaddr)->sin_addr.s_addr);
328 ((struct sockaddr *) localaddr)->sa_family = AF_INET;
331 static const char *get_sname(int port, const char *proto, int numeric)
336 struct servent *se = getservbyport(port, proto);
340 /* hummm, we may return static buffer here!! */
341 return itoa(ntohs(port));
344 static char *ip_port_str(struct sockaddr *addr, int port, const char *proto, int numeric)
346 enum { salen = USE_FEATURE_IPV6(sizeof(struct sockaddr_in6)) SKIP_FEATURE_IPV6(sizeof(struct sockaddr_in)) };
347 char *host, *host_port;
349 /* Code which used "*" for INADDR_ANY is removed: it's ambiguous in IPv6,
350 * while "0.0.0.0" is not. */
352 host = numeric ? xmalloc_sockaddr2dotted_noport(addr)
353 : xmalloc_sockaddr2host_noport(addr);
355 host_port = xasprintf("%s:%s", host, get_sname(htons(port), proto, numeric));
360 static int tcp_do_one(int lnr, char *line)
362 char local_addr[64], rem_addr[64];
364 int num, local_port, rem_port, d, state, timer_run, uid, timeout;
365 #if ENABLE_FEATURE_IPV6
366 struct sockaddr_in6 localaddr, remaddr;
368 struct sockaddr_in localaddr, remaddr;
370 unsigned long rxq, txq, time_len, retr, inode;
377 "%d: %64[0-9A-Fa-f]:%X %64[0-9A-Fa-f]:%X %X %lX:%lX %X:%lX %lX %d %d %ld %512s\n",
378 &d, local_addr, &local_port,
379 rem_addr, &rem_port, &state,
380 &txq, &rxq, &timer_run, &time_len, &retr, &uid, &timeout, &inode, more);
383 return 1; /* error */
386 if (strlen(local_addr) > 8) {
387 #if ENABLE_FEATURE_IPV6
388 build_ipv6_addr(local_addr, &localaddr);
389 build_ipv6_addr(rem_addr, &remaddr);
392 build_ipv4_addr(local_addr, &localaddr);
393 build_ipv4_addr(rem_addr, &remaddr);
396 if ((rem_port && (flags & NETSTAT_CONNECTED))
397 || (!rem_port && (flags & NETSTAT_LISTENING))
399 char *l = ip_port_str(
400 (struct sockaddr *) &localaddr, local_port,
401 "tcp", flags & NETSTAT_NUMERIC);
402 char *r = ip_port_str(
403 (struct sockaddr *) &remaddr, rem_port,
404 "tcp", flags & NETSTAT_NUMERIC);
405 printf(net_conn_line,
406 "tcp", rxq, txq, l, r, tcp_state[state]);
407 #if ENABLE_FEATURE_NETSTAT_PRG
408 if (option_mask32 & OPT_prg)
409 printf("%."PROGNAME_WIDTH_STR"s", prg_cache_get(inode));
418 static int udp_do_one(int lnr, char *line)
420 char local_addr[64], rem_addr[64];
421 const char *state_str;
423 int num, local_port, rem_port, d, state, timer_run, uid, timeout;
424 #if ENABLE_FEATURE_IPV6
425 struct sockaddr_in6 localaddr, remaddr;
427 struct sockaddr_in localaddr, remaddr;
429 unsigned long rxq, txq, time_len, retr, inode;
436 "%d: %64[0-9A-Fa-f]:%X %64[0-9A-Fa-f]:%X %X %lX:%lX %X:%lX %lX %d %d %ld %512s\n",
437 &d, local_addr, &local_port,
438 rem_addr, &rem_port, &state,
439 &txq, &rxq, &timer_run, &time_len, &retr, &uid, &timeout, &inode, more);
441 if (strlen(local_addr) > 8) {
442 #if ENABLE_FEATURE_IPV6
443 /* Demangle what the kernel gives us */
444 build_ipv6_addr(local_addr, &localaddr);
445 build_ipv6_addr(rem_addr, &remaddr);
448 build_ipv4_addr(local_addr, &localaddr);
449 build_ipv4_addr(rem_addr, &remaddr);
453 return 1; /* error */
456 case TCP_ESTABLISHED:
457 state_str = "ESTABLISHED";
463 state_str = "UNKNOWN";
467 #if ENABLE_FEATURE_IPV6
468 # define notnull(A) ( \
469 ( (A.sin6_family == AF_INET6) \
470 && (A.sin6_addr.s6_addr32[0] | A.sin6_addr.s6_addr32[1] | \
471 A.sin6_addr.s6_addr32[2] | A.sin6_addr.s6_addr32[3]) \
473 (A.sin6_family == AF_INET) \
474 && ((struct sockaddr_in*)&A)->sin_addr.s_addr \
478 # define notnull(A) (A.sin_addr.s_addr)
481 int have_remaddr = notnull(remaddr);
482 if ((have_remaddr && (flags & NETSTAT_CONNECTED))
483 || (!have_remaddr && (flags & NETSTAT_LISTENING))
485 char *l = ip_port_str(
486 (struct sockaddr *) &localaddr, local_port,
487 "udp", flags & NETSTAT_NUMERIC);
488 char *r = ip_port_str(
489 (struct sockaddr *) &remaddr, rem_port,
490 "udp", flags & NETSTAT_NUMERIC);
491 printf(net_conn_line,
492 "udp", rxq, txq, l, r, state_str);
493 #if ENABLE_FEATURE_NETSTAT_PRG
494 if (option_mask32 & OPT_prg)
495 printf("%."PROGNAME_WIDTH_STR"s", prg_cache_get(inode));
505 static int raw_do_one(int lnr, char *line)
507 char local_addr[64], rem_addr[64];
509 int num, local_port, rem_port, d, state, timer_run, uid, timeout;
510 #if ENABLE_FEATURE_IPV6
511 struct sockaddr_in6 localaddr, remaddr;
513 struct sockaddr_in localaddr, remaddr;
515 unsigned long rxq, txq, time_len, retr, inode;
522 "%d: %64[0-9A-Fa-f]:%X %64[0-9A-Fa-f]:%X %X %lX:%lX %X:%lX %lX %d %d %ld %512s\n",
523 &d, local_addr, &local_port,
524 rem_addr, &rem_port, &state,
525 &txq, &rxq, &timer_run, &time_len, &retr, &uid, &timeout, &inode, more);
527 if (strlen(local_addr) > 8) {
528 #if ENABLE_FEATURE_IPV6
529 build_ipv6_addr(local_addr, &localaddr);
530 build_ipv6_addr(rem_addr, &remaddr);
533 build_ipv4_addr(local_addr, &localaddr);
534 build_ipv4_addr(rem_addr, &remaddr);
538 return 1; /* error */
542 int have_remaddr = notnull(remaddr);
543 if ((have_remaddr && (flags & NETSTAT_CONNECTED))
544 || (!have_remaddr && (flags & NETSTAT_LISTENING))
546 char *l = ip_port_str(
547 (struct sockaddr *) &localaddr, local_port,
548 "raw", flags & NETSTAT_NUMERIC);
549 char *r = ip_port_str(
550 (struct sockaddr *) &remaddr, rem_port,
551 "raw", flags & NETSTAT_NUMERIC);
552 printf(net_conn_line,
553 "raw", rxq, txq, l, r, itoa(state));
554 #if ENABLE_FEATURE_NETSTAT_PRG
555 if (option_mask32 & OPT_prg)
556 printf("%-"PROGNAME_WIDTH_STR"s", prg_cache_get(inode));
566 static int unix_do_one(int nr, char *line)
568 unsigned long refcnt, proto, unix_flags;
573 const char *ss_proto, *ss_state, *ss_type;
577 return 0; /* skip header */
579 /* 2.6.15 may report lines like "... @/tmp/fam-user-^@^@^@^@^@^@^@..."
580 * Other users report long lines filled by NUL bytes.
581 * (those ^@ are NUL bytes too). We see them as empty lines. */
585 path_ofs = 0; /* paranoia */
586 num = sscanf(line, "%p: %lX %lX %lX %X %X %lu %n",
587 &d, &refcnt, &proto, &unix_flags, &type, &state, &inode, &path_ofs);
589 return 1; /* error */
591 if ((flags & (NETSTAT_LISTENING|NETSTAT_CONNECTED)) != (NETSTAT_LISTENING|NETSTAT_CONNECTED)) {
592 if ((state == SS_UNCONNECTED) && (unix_flags & SO_ACCEPTCON)) {
593 if (!(flags & NETSTAT_LISTENING))
596 if (!(flags & NETSTAT_CONNECTED))
623 ss_type = "SEQPACKET";
635 * Unconnected sockets may be listening
638 if (unix_flags & SO_ACCEPTCON) {
639 ss_state = "LISTENING";
645 ss_state = "CONNECTING";
648 ss_state = "CONNECTED";
650 case SS_DISCONNECTING:
651 ss_state = "DISCONNECTING";
654 ss_state = "UNKNOWN";
657 strcpy(ss_flags, "[ ");
658 if (unix_flags & SO_ACCEPTCON)
659 strcat(ss_flags, "ACC ");
660 if (unix_flags & SO_WAITDATA)
661 strcat(ss_flags, "W ");
662 if (unix_flags & SO_NOSPACE)
663 strcat(ss_flags, "N ");
664 strcat(ss_flags, "]");
666 printf("%-5s %-6ld %-11s %-10s %-13s %6lu ",
667 ss_proto, refcnt, ss_flags, ss_type, ss_state, inode
670 #if ENABLE_FEATURE_NETSTAT_PRG
671 if (option_mask32 & OPT_prg)
672 printf("%-"PROGNAME_WIDTH_STR"s", prg_cache_get(inode));
675 /* TODO: currently we stop at first NUL byte. Is it a problem? */
677 *strchrnul(line, '\n') = '\0';
679 fputc_printable(*line++, stdout);
684 #define _PATH_PROCNET_UDP "/proc/net/udp"
685 #define _PATH_PROCNET_UDP6 "/proc/net/udp6"
686 #define _PATH_PROCNET_TCP "/proc/net/tcp"
687 #define _PATH_PROCNET_TCP6 "/proc/net/tcp6"
688 #define _PATH_PROCNET_RAW "/proc/net/raw"
689 #define _PATH_PROCNET_RAW6 "/proc/net/raw6"
690 #define _PATH_PROCNET_UNIX "/proc/net/unix"
692 static void do_info(const char *file, const char *name, int (*proc)(int, char *))
698 procinfo = fopen_for_read(file);
699 if (procinfo == NULL) {
700 if (errno != ENOENT) {
701 bb_simple_perror_msg(file);
703 bb_error_msg("no kernel support for %s", name);
708 /* Why? because xmalloc_fgets_str doesn't stop on NULs */
709 while ((buffer = xmalloc_fgets_str(procinfo, "\n")) != NULL) {
710 if (proc(lnr++, buffer))
711 bb_error_msg("%s: bogus data on line %d", file, lnr);
717 int netstat_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
718 int netstat_main(int argc UNUSED_PARAM, char **argv)
720 const char *net_conn_line_header = PRINT_NET_CONN_HEADER;
722 #if ENABLE_FEATURE_IPV6
726 enum { inet = 1, inet6 = 0 };
731 /* Option string must match NETSTAT_xxx constants */
732 opt = getopt32(argv, NETSTAT_OPTS);
733 if (opt & 0x1) { // -l
734 flags &= ~NETSTAT_CONNECTED;
735 flags |= NETSTAT_LISTENING;
737 if (opt & 0x2) flags |= NETSTAT_LISTENING | NETSTAT_CONNECTED; // -a
738 //if (opt & 0x4) // -e
739 if (opt & 0x8) flags |= NETSTAT_NUMERIC; // -n
740 //if (opt & 0x10) // -t: NETSTAT_TCP
741 //if (opt & 0x20) // -u: NETSTAT_UDP
742 //if (opt & 0x40) // -w: NETSTAT_RAW
743 //if (opt & 0x80) // -x: NETSTAT_UNIX
744 if (opt & OPT_route) { // -r
746 bb_displayroutes(flags & NETSTAT_NUMERIC, !(opt & OPT_extended));
752 if (opt & OPT_wide) { // -W
753 net_conn_line = PRINT_NET_CONN_WIDE;
754 net_conn_line_header = PRINT_NET_CONN_HEADER_WIDE;
756 #if ENABLE_FEATURE_NETSTAT_PRG
757 if (opt & OPT_prg) { // -p
762 opt &= NETSTAT_ALLPROTO;
764 flags &= ~NETSTAT_ALLPROTO;
767 if (flags & (NETSTAT_TCP|NETSTAT_UDP|NETSTAT_RAW)) {
768 printf("Active Internet connections "); /* xxx */
770 if ((flags & (NETSTAT_LISTENING|NETSTAT_CONNECTED)) == (NETSTAT_LISTENING|NETSTAT_CONNECTED))
771 printf("(servers and established)");
772 else if (flags & NETSTAT_LISTENING)
773 printf("(only servers)");
775 printf("(w/o servers)");
776 printf(net_conn_line_header, "Local Address", "Foreign Address");
777 print_progname_banner();
780 if (inet && (flags & NETSTAT_TCP))
781 do_info(_PATH_PROCNET_TCP, "AF INET (tcp)", tcp_do_one);
782 #if ENABLE_FEATURE_IPV6
783 if (inet6 && (flags & NETSTAT_TCP))
784 do_info(_PATH_PROCNET_TCP6, "AF INET6 (tcp)", tcp_do_one);
786 if (inet && (flags & NETSTAT_UDP))
787 do_info(_PATH_PROCNET_UDP, "AF INET (udp)", udp_do_one);
788 #if ENABLE_FEATURE_IPV6
789 if (inet6 && (flags & NETSTAT_UDP))
790 do_info(_PATH_PROCNET_UDP6, "AF INET6 (udp)", udp_do_one);
792 if (inet && (flags & NETSTAT_RAW))
793 do_info(_PATH_PROCNET_RAW, "AF INET (raw)", raw_do_one);
794 #if ENABLE_FEATURE_IPV6
795 if (inet6 && (flags & NETSTAT_RAW))
796 do_info(_PATH_PROCNET_RAW6, "AF INET6 (raw)", raw_do_one);
798 if (flags & NETSTAT_UNIX) {
799 printf("Active UNIX domain sockets ");
800 if ((flags & (NETSTAT_LISTENING|NETSTAT_CONNECTED)) == (NETSTAT_LISTENING|NETSTAT_CONNECTED))
801 printf("(servers and established)");
802 else if (flags & NETSTAT_LISTENING)
803 printf("(only servers)");
805 printf("(w/o servers)");
806 printf("\nProto RefCnt Flags Type State I-Node ");
807 print_progname_banner();
809 do_info(_PATH_PROCNET_UNIX, "AF UNIX", unix_do_one);