* Mini netstat implementation(s) for busybox
* based in part on the netstat implementation from net-tools.
*
- * Copyright (C) 2001 by Bart Visscher <magick@linux-fan.com>
+ * Copyright (C) 2002 by Bart Visscher <magick@linux-fan.com>
*
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
+ * 2002-04-20
+ * IPV6 support added by Bart Visscher <magick@linux-fan.com>
*
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
+ * 2008-07-10
+ * optional '-p' flag support ported from net-tools by G. Somlo <somlo@cmu.edu>
*
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+ * Licensed under GPLv2 or later, see file LICENSE in this source tree.
*/
-#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-#include <stdarg.h>
-#include <signal.h>
-#include <errno.h>
-#include <sys/stat.h>
-#include <dirent.h>
-#include <unistd.h>
-#include <pwd.h>
-#include <sys/socket.h>
-#include <netinet/in.h>
-#include <arpa/inet.h>
-
-#include "busybox.h"
-
-#define NETSTAT_CONNECTED 0x01
-#define NETSTAT_LISTENING 0x02
-#define NETSTAT_NUMERIC 0x04
-#define NETSTAT_TCP 0x10
-#define NETSTAT_UDP 0x20
-#define NETSTAT_RAW 0x40
-#define NETSTAT_UNIX 0x80
-
-int flags = NETSTAT_CONNECTED |
- NETSTAT_TCP | NETSTAT_UDP | NETSTAT_RAW | NETSTAT_UNIX;
-
-#define PROGNAME_WIDTHs PROGNAME_WIDTH1(PROGNAME_WIDTH)
-#define PROGNAME_WIDTH1(s) PROGNAME_WIDTH2(s)
-#define PROGNAME_WIDTH2(s) #s
+#include "libbb.h"
+#include "inet_common.h"
+
+//usage:#define netstat_trivial_usage
+//usage: "[-"IF_ROUTE("r")"al] [-tuwx] [-en"IF_FEATURE_NETSTAT_WIDE("W")IF_FEATURE_NETSTAT_PRG("p")"]"
+//usage:#define netstat_full_usage "\n\n"
+//usage: "Display networking information\n"
+//usage: IF_ROUTE(
+//usage: "\n -r Routing table"
+//usage: )
+//usage: "\n -a All sockets"
+//usage: "\n -l Listening sockets"
+//usage: "\n Else: connected sockets"
+//usage: "\n -t TCP sockets"
+//usage: "\n -u UDP sockets"
+//usage: "\n -w Raw sockets"
+//usage: "\n -x Unix sockets"
+//usage: "\n Else: all socket types"
+//usage: "\n -e Other/more information"
+//usage: "\n -n Don't resolve names"
+//usage: IF_FEATURE_NETSTAT_WIDE(
+//usage: "\n -W Wide display"
+//usage: )
+//usage: IF_FEATURE_NETSTAT_PRG(
+//usage: "\n -p Show PID/program name for sockets"
+//usage: )
+
+#define NETSTAT_OPTS "laentuwx" \
+ IF_ROUTE( "r") \
+ IF_FEATURE_NETSTAT_WIDE("W") \
+ IF_FEATURE_NETSTAT_PRG( "p")
+
+enum {
+ OPT_sock_listen = 1 << 0, // l
+ OPT_sock_all = 1 << 1, // a
+ OPT_extended = 1 << 2, // e
+ OPT_noresolve = 1 << 3, // n
+ OPT_sock_tcp = 1 << 4, // t
+ OPT_sock_udp = 1 << 5, // u
+ OPT_sock_raw = 1 << 6, // w
+ OPT_sock_unix = 1 << 7, // x
+ OPTBIT_x = 7,
+ IF_ROUTE( OPTBIT_ROUTE,)
+ IF_FEATURE_NETSTAT_WIDE(OPTBIT_WIDE ,)
+ IF_FEATURE_NETSTAT_PRG( OPTBIT_PRG ,)
+ OPT_route = IF_ROUTE( (1 << OPTBIT_ROUTE)) + 0, // r
+ OPT_wide = IF_FEATURE_NETSTAT_WIDE((1 << OPTBIT_WIDE )) + 0, // W
+ OPT_prg = IF_FEATURE_NETSTAT_PRG( (1 << OPTBIT_PRG )) + 0, // p
+};
+
+#define NETSTAT_CONNECTED 0x01
+#define NETSTAT_LISTENING 0x02
+#define NETSTAT_NUMERIC 0x04
+/* Must match getopt32 option string */
+#define NETSTAT_TCP 0x10
+#define NETSTAT_UDP 0x20
+#define NETSTAT_RAW 0x40
+#define NETSTAT_UNIX 0x80
+#define NETSTAT_ALLPROTO (NETSTAT_TCP|NETSTAT_UDP|NETSTAT_RAW|NETSTAT_UNIX)
-#define PRG_HASH_SIZE 211
enum {
- TCP_ESTABLISHED = 1,
- TCP_SYN_SENT,
- TCP_SYN_RECV,
- TCP_FIN_WAIT1,
- TCP_FIN_WAIT2,
- TCP_TIME_WAIT,
- TCP_CLOSE,
- TCP_CLOSE_WAIT,
- TCP_LAST_ACK,
- TCP_LISTEN,
- TCP_CLOSING /* now a valid state */
+ TCP_ESTABLISHED = 1,
+ TCP_SYN_SENT,
+ TCP_SYN_RECV,
+ TCP_FIN_WAIT1,
+ TCP_FIN_WAIT2,
+ TCP_TIME_WAIT,
+ TCP_CLOSE,
+ TCP_CLOSE_WAIT,
+ TCP_LAST_ACK,
+ TCP_LISTEN,
+ TCP_CLOSING, /* now a valid state */
};
-static const char *tcp_state[] =
-{
- "",
- "ESTABLISHED",
- "SYN_SENT",
- "SYN_RECV",
- "FIN_WAIT1",
- "FIN_WAIT2",
- "TIME_WAIT",
- "CLOSE",
- "CLOSE_WAIT",
- "LAST_ACK",
- "LISTEN",
- "CLOSING"
+static const char *const tcp_state[] = {
+ "",
+ "ESTABLISHED",
+ "SYN_SENT",
+ "SYN_RECV",
+ "FIN_WAIT1",
+ "FIN_WAIT2",
+ "TIME_WAIT",
+ "CLOSE",
+ "CLOSE_WAIT",
+ "LAST_ACK",
+ "LISTEN",
+ "CLOSING"
};
typedef enum {
- SS_FREE = 0, /* not allocated */
- SS_UNCONNECTED, /* unconnected to any socket */
- SS_CONNECTING, /* in process of connecting */
- SS_CONNECTED, /* connected to socket */
- SS_DISCONNECTING /* in process of disconnecting */
+ SS_FREE = 0, /* not allocated */
+ SS_UNCONNECTED, /* unconnected to any socket */
+ SS_CONNECTING, /* in process of connecting */
+ SS_CONNECTED, /* connected to socket */
+ SS_DISCONNECTING /* in process of disconnecting */
} socket_state;
-#define SO_ACCEPTCON (1<<16) /* performed a listen */
-#define SO_WAITDATA (1<<17) /* wait data to read */
-#define SO_NOSPACE (1<<18) /* no space to write */
+#define SO_ACCEPTCON (1<<16) /* performed a listen */
+#define SO_WAITDATA (1<<17) /* wait data to read */
+#define SO_NOSPACE (1<<18) /* no space to write */
+
+#define ADDR_NORMAL_WIDTH 23
+/* When there are IPv6 connections the IPv6 addresses will be
+ * truncated to none-recognition. The '-W' option makes the
+ * address columns wide enough to accomodate for longest possible
+ * IPv6 addresses, i.e. addresses of the form
+ * xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:ddd.ddd.ddd.ddd
+ */
+#define ADDR_WIDE 51 /* INET6_ADDRSTRLEN + 5 for the port number */
+#if ENABLE_FEATURE_NETSTAT_WIDE
+# define FMT_NET_CONN_DATA "%s %6ld %6ld %-*s %-*s %-12s"
+# define FMT_NET_CONN_HEADER "\nProto Recv-Q Send-Q %-*s %-*s State %s\n"
+#else
+# define FMT_NET_CONN_DATA "%s %6ld %6ld %-23s %-23s %-12s"
+# define FMT_NET_CONN_HEADER "\nProto Recv-Q Send-Q %-23s %-23s State %s\n"
+#endif
+
+#define PROGNAME_WIDTH 20
+#define PROGNAME_WIDTH_STR "20"
+/* PROGNAME_WIDTH chars: 12345678901234567890 */
+#define PROGNAME_BANNER "PID/Program name "
+
+struct prg_node {
+ struct prg_node *next;
+ long inode;
+ char name[PROGNAME_WIDTH];
+};
-char *itoa(unsigned int i)
+#define PRG_HASH_SIZE 211
+
+struct globals {
+ smallint flags;
+#if ENABLE_FEATURE_NETSTAT_PRG
+ smallint prg_cache_loaded;
+ struct prg_node *prg_hash[PRG_HASH_SIZE];
+#endif
+#if ENABLE_FEATURE_NETSTAT_PRG
+ const char *progname_banner;
+#endif
+#if ENABLE_FEATURE_NETSTAT_WIDE
+ unsigned addr_width;
+#endif
+};
+#define G (*ptr_to_globals)
+#define flags (G.flags )
+#define prg_cache_loaded (G.prg_cache_loaded)
+#define prg_hash (G.prg_hash )
+#if ENABLE_FEATURE_NETSTAT_PRG
+# define progname_banner (G.progname_banner )
+#else
+# define progname_banner ""
+#endif
+#define INIT_G() do { \
+ SET_PTR_TO_GLOBALS(xzalloc(sizeof(G))); \
+ flags = NETSTAT_CONNECTED | NETSTAT_ALLPROTO; \
+} while (0)
+
+
+#if ENABLE_FEATURE_NETSTAT_PRG
+
+/* Deliberately truncating long to unsigned *int* */
+#define PRG_HASHIT(x) ((unsigned)(x) % PRG_HASH_SIZE)
+
+static void prg_cache_add(long inode, char *name)
{
- /* 21 digits plus null terminator, good for 64-bit or smaller ints */
- static char local[22];
- char *p = &local[21];
- *p-- = '\0';
- do {
- *p-- = '0' + i % 10;
- i /= 10;
- } while (i > 0);
- return p + 1;
+ unsigned hi = PRG_HASHIT(inode);
+ struct prg_node **pnp, *pn;
+
+ prg_cache_loaded = 2;
+ for (pnp = prg_hash + hi; (pn = *pnp) != NULL; pnp = &pn->next) {
+ if (pn->inode == inode) {
+ /* Some warning should be appropriate here
+ * as we got multiple processes for one i-node */
+ return;
+ }
+ }
+ *pnp = xzalloc(sizeof(struct prg_node));
+ pn = *pnp;
+ pn->inode = inode;
+ safe_strncpy(pn->name, name, PROGNAME_WIDTH);
}
-char *inet_sprint(struct sockaddr* addr, int num)
+static const char *prg_cache_get(long inode)
{
- char *str;
- str=inet_ntoa(((struct sockaddr_in*)addr)->sin_addr);
- if (!strcmp(str,"0.0.0.0")) {
- str="*";
- }
- if (num)
- {
- } else {
- struct hostent *he=gethostbyaddr(&((struct sockaddr_in*)addr)->sin_addr,4,AF_INET);
- if (he)
- str=he->h_name;
+ unsigned hi = PRG_HASHIT(inode);
+ struct prg_node *pn;
+
+ for (pn = prg_hash[hi]; pn; pn = pn->next)
+ if (pn->inode == inode)
+ return pn->name;
+ return "-";
+}
+
+#if ENABLE_FEATURE_CLEAN_UP
+static void prg_cache_clear(void)
+{
+ struct prg_node **pnp, *pn;
+
+ for (pnp = prg_hash; pnp < prg_hash + PRG_HASH_SIZE; pnp++) {
+ while ((pn = *pnp) != NULL) {
+ *pnp = pn->next;
+ free(pn);
+ }
}
- return str;
}
+#else
+#define prg_cache_clear() ((void)0)
+#endif
-char *get_sname(int port, const char *proto, int num)
+static long extract_socket_inode(const char *lname)
{
- char *str=itoa(ntohs(port));
- if (num) {
- } else {
- struct servent *se=getservbyport(port,proto);
- if (se)
- str=se->s_name;
+ long inode = -1;
+
+ if (strncmp(lname, "socket:[", sizeof("socket:[")-1) == 0) {
+ /* "socket:[12345]", extract the "12345" as inode */
+ inode = bb_strtoul(lname + sizeof("socket:[")-1, (char**)&lname, 0);
+ if (*lname != ']')
+ inode = -1;
+ } else if (strncmp(lname, "[0000]:", sizeof("[0000]:")-1) == 0) {
+ /* "[0000]:12345", extract the "12345" as inode */
+ inode = bb_strtoul(lname + sizeof("[0000]:")-1, NULL, 0);
+ if (errno) /* not NUL terminated? */
+ inode = -1;
}
- if (!port) {
- str="*";
+
+#if 0 /* bb_strtol returns all-ones bit pattern on ERANGE anyway */
+ if (errno == ERANGE)
+ inode = -1;
+#endif
+ return inode;
+}
+
+static int FAST_FUNC add_to_prg_cache_if_socket(const char *fileName,
+ struct stat *statbuf UNUSED_PARAM,
+ void *pid_slash_progname,
+ int depth UNUSED_PARAM)
+{
+ char *linkname;
+ long inode;
+
+ linkname = xmalloc_readlink(fileName);
+ if (linkname != NULL) {
+ inode = extract_socket_inode(linkname);
+ free(linkname);
+ if (inode >= 0)
+ prg_cache_add(inode, (char *)pid_slash_progname);
}
- return str;
+ return TRUE;
}
-void snprint_ip_port(char *ip_port, int size, struct sockaddr *addr, int port, char *proto, int numeric)
+static int FAST_FUNC dir_act(const char *fileName,
+ struct stat *statbuf UNUSED_PARAM,
+ void *userData UNUSED_PARAM,
+ int depth)
{
- char *port_name;
- safe_strncpy(ip_port, inet_sprint(addr, numeric), size);
- port_name=get_sname(htons(port), proto, numeric);
- if ((strlen(ip_port) + strlen(port_name)) > 22)
- ip_port[22 - strlen(port_name)] = '\0';
- ip_port+=strlen(ip_port);
- strcat(ip_port, ":");
- strcat(ip_port, port_name);
+ const char *pid;
+ char *pid_slash_progname;
+ char proc_pid_fname[sizeof("/proc/%u/cmdline") + sizeof(long)*3];
+ char cmdline_buf[512];
+ int n, len;
+
+ if (depth == 0) /* "/proc" itself */
+ return TRUE; /* continue looking one level below /proc */
+
+ pid = fileName + sizeof("/proc/")-1; /* point after "/proc/" */
+ if (!isdigit(pid[0])) /* skip /proc entries which aren't processes */
+ return SKIP;
+
+ len = snprintf(proc_pid_fname, sizeof(proc_pid_fname), "%s/cmdline", fileName);
+ n = open_read_close(proc_pid_fname, cmdline_buf, sizeof(cmdline_buf) - 1);
+ if (n < 0)
+ return FALSE;
+ cmdline_buf[n] = '\0';
+
+ /* go through all files in /proc/PID/fd and check whether they are sockets */
+ strcpy(proc_pid_fname + len - (sizeof("cmdline")-1), "fd");
+ pid_slash_progname = concat_path_file(pid, bb_basename(cmdline_buf)); /* "PID/argv0" */
+ n = recursive_action(proc_pid_fname,
+ ACTION_RECURSE | ACTION_QUIET,
+ add_to_prg_cache_if_socket,
+ NULL,
+ (void *)pid_slash_progname,
+ 0);
+ free(pid_slash_progname);
+
+ if (!n)
+ return FALSE; /* signal permissions error to caller */
+
+ return SKIP; /* caller should not recurse further into this dir */
}
-static void tcp_do_one(int lnr, const char *line)
+static void prg_cache_load(void)
{
- char local_addr[64], rem_addr[64];
- char *state_str, more[512];
- int num, local_port, rem_port, d, state, timer_run, uid, timeout;
- struct sockaddr_in localaddr, remaddr;
- unsigned long rxq, txq, time_len, retr, inode;
+ int load_ok;
- if (lnr == 0)
+ prg_cache_loaded = 1;
+ load_ok = recursive_action("/proc", ACTION_RECURSE | ACTION_QUIET,
+ NULL, dir_act, NULL, 0);
+ if (load_ok)
return;
- more[0] = '\0';
- num = sscanf(line,
- "%d: %64[0-9A-Fa-f]:%X %64[0-9A-Fa-f]:%X %X %lX:%lX %X:%lX %lX %d %d %ld %512s\n",
- &d, local_addr, &local_port,
- rem_addr, &rem_port, &state,
- &txq, &rxq, &timer_run, &time_len, &retr, &uid, &timeout, &inode, more);
+ if (prg_cache_loaded == 1)
+ bb_error_msg("can't scan /proc - are you root?");
+ else
+ bb_error_msg("showing only processes with your user ID");
+}
- if (strlen(local_addr) > 8) {
- } else {
- sscanf(local_addr, "%X",
- &((struct sockaddr_in *) &localaddr)->sin_addr.s_addr);
- sscanf(rem_addr, "%X",
- &((struct sockaddr_in *) &remaddr)->sin_addr.s_addr);
- ((struct sockaddr *) &localaddr)->sa_family = AF_INET;
- ((struct sockaddr *) &remaddr)->sa_family = AF_INET;
- }
+#else
- if (num < 10) {
- error_msg("warning, got bogus tcp line.\n");
- return;
- }
- state_str=(char*)tcp_state[state];
- if ((rem_port && (flags&NETSTAT_CONNECTED)) ||
- (!rem_port && (flags&NETSTAT_LISTENING)))
- {
- snprint_ip_port(local_addr, sizeof(local_addr),
- (struct sockaddr *) &localaddr, local_port,
- "tcp", flags&NETSTAT_NUMERIC);
-
- snprint_ip_port(rem_addr, sizeof(rem_addr),
- (struct sockaddr *) &remaddr, rem_port,
- "tcp", flags&NETSTAT_NUMERIC);
-
- printf("tcp %6ld %6ld %-23s %-23s %-12s\n",
- rxq, txq, local_addr, rem_addr, state_str);
+#define prg_cache_clear() ((void)0)
- }
-}
+#endif //ENABLE_FEATURE_NETSTAT_PRG
-static void udp_do_one(int lnr, const char *line)
+
+#if ENABLE_FEATURE_IPV6
+static void build_ipv6_addr(char* local_addr, struct sockaddr_in6* localaddr)
{
- char local_addr[64], rem_addr[64];
- char *state_str, more[512];
- int num, local_port, rem_port, d, state, timer_run, uid, timeout;
- struct sockaddr_in localaddr, remaddr;
- unsigned long rxq, txq, time_len, retr, inode;
+ char addr6[INET6_ADDRSTRLEN];
+ struct in6_addr in6;
- if (lnr == 0)
- return;
+ sscanf(local_addr, "%08X%08X%08X%08X",
+ &in6.s6_addr32[0], &in6.s6_addr32[1],
+ &in6.s6_addr32[2], &in6.s6_addr32[3]);
+ inet_ntop(AF_INET6, &in6, addr6, sizeof(addr6));
+ inet_pton(AF_INET6, addr6, &localaddr->sin6_addr);
- more[0] = '\0';
- num = sscanf(line,
- "%d: %64[0-9A-Fa-f]:%X %64[0-9A-Fa-f]:%X %X %lX:%lX %X:%lX %lX %d %d %ld %512s\n",
- &d, local_addr, &local_port,
- rem_addr, &rem_port, &state,
- &txq, &rxq, &timer_run, &time_len, &retr, &uid, &timeout, &inode, more);
+ localaddr->sin6_family = AF_INET6;
+}
+#endif
- if (strlen(local_addr) > 8) {
- } else {
- sscanf(local_addr, "%X",
- &((struct sockaddr_in *) &localaddr)->sin_addr.s_addr);
- sscanf(rem_addr, "%X",
- &((struct sockaddr_in *) &remaddr)->sin_addr.s_addr);
- ((struct sockaddr *) &localaddr)->sa_family = AF_INET;
- ((struct sockaddr *) &remaddr)->sa_family = AF_INET;
- }
+static void build_ipv4_addr(char* local_addr, struct sockaddr_in* localaddr)
+{
+ sscanf(local_addr, "%X", &localaddr->sin_addr.s_addr);
+ localaddr->sin_family = AF_INET;
+}
- if (num < 10) {
- error_msg("warning, got bogus udp line.\n");
- return;
+static const char *get_sname(int port, const char *proto, int numeric)
+{
+ if (!port)
+ return "*";
+ if (!numeric) {
+ struct servent *se = getservbyport(port, proto);
+ if (se)
+ return se->s_name;
}
- switch (state) {
- case TCP_ESTABLISHED:
- state_str = "ESTABLISHED";
- break;
+ /* hummm, we may return static buffer here!! */
+ return itoa(ntohs(port));
+}
- case TCP_CLOSE:
- state_str = "";
- break;
+static char *ip_port_str(struct sockaddr *addr, int port, const char *proto, int numeric)
+{
+ char *host, *host_port;
- default:
- state_str = "UNKNOWN";
- break;
- }
+ /* Code which used "*" for INADDR_ANY is removed: it's ambiguous
+ * in IPv6, while "0.0.0.0" is not. */
-#define notnull(A) (A.sin_addr.s_addr)
- if ((notnull(remaddr) && (flags&NETSTAT_CONNECTED)) ||
- (!notnull(remaddr) && (flags&NETSTAT_LISTENING)))
- {
- snprint_ip_port(local_addr, sizeof(local_addr),
- (struct sockaddr *) &localaddr, local_port,
- "udp", flags&NETSTAT_NUMERIC);
-
- snprint_ip_port(rem_addr, sizeof(rem_addr),
- (struct sockaddr *) &remaddr, rem_port,
- "udp", flags&NETSTAT_NUMERIC);
-
- printf("udp %6ld %6ld %-23s %-23s %-12s\n",
- rxq, txq, local_addr, rem_addr, state_str);
+ host = numeric ? xmalloc_sockaddr2dotted_noport(addr)
+ : xmalloc_sockaddr2host_noport(addr);
- }
+ host_port = xasprintf("%s:%s", host, get_sname(htons(port), proto, numeric));
+ free(host);
+ return host_port;
}
-static void raw_do_one(int lnr, const char *line)
-{
- char local_addr[64], rem_addr[64];
- char *state_str, more[512];
- int num, local_port, rem_port, d, state, timer_run, uid, timeout;
- struct sockaddr_in localaddr, remaddr;
- unsigned long rxq, txq, time_len, retr, inode;
+struct inet_params {
+ int local_port, rem_port, state, uid;
+ union {
+ struct sockaddr sa;
+ struct sockaddr_in sin;
+#if ENABLE_FEATURE_IPV6
+ struct sockaddr_in6 sin6;
+#endif
+ } localaddr, remaddr;
+ unsigned long rxq, txq, inode;
+};
- if (lnr == 0)
- return;
+static int scan_inet_proc_line(struct inet_params *param, char *line)
+{
+ int num;
+ /* IPv6 /proc files use 32-char hex representation
+ * of IPv6 address, followed by :PORT_IN_HEX
+ */
+ char local_addr[33], rem_addr[33]; /* 32 + 1 for NUL */
- more[0] = '\0';
num = sscanf(line,
- "%d: %64[0-9A-Fa-f]:%X %64[0-9A-Fa-f]:%X %X %lX:%lX %X:%lX %lX %d %d %ld %512s\n",
- &d, local_addr, &local_port,
- rem_addr, &rem_port, &state,
- &txq, &rxq, &timer_run, &time_len, &retr, &uid, &timeout, &inode, more);
+ "%*d: %32[0-9A-Fa-f]:%X "
+ "%32[0-9A-Fa-f]:%X %X "
+ "%lX:%lX %*X:%*X "
+ "%*X %d %*d %ld ",
+ local_addr, ¶m->local_port,
+ rem_addr, ¶m->rem_port, ¶m->state,
+ ¶m->txq, ¶m->rxq,
+ ¶m->uid, ¶m->inode);
+ if (num < 9) {
+ return 1; /* error */
+ }
if (strlen(local_addr) > 8) {
+#if ENABLE_FEATURE_IPV6
+ build_ipv6_addr(local_addr, ¶m->localaddr.sin6);
+ build_ipv6_addr(rem_addr, ¶m->remaddr.sin6);
+#endif
} else {
- sscanf(local_addr, "%X",
- &((struct sockaddr_in *) &localaddr)->sin_addr.s_addr);
- sscanf(rem_addr, "%X",
- &((struct sockaddr_in *) &remaddr)->sin_addr.s_addr);
- ((struct sockaddr *) &localaddr)->sa_family = AF_INET;
- ((struct sockaddr *) &remaddr)->sa_family = AF_INET;
+ build_ipv4_addr(local_addr, ¶m->localaddr.sin);
+ build_ipv4_addr(rem_addr, ¶m->remaddr.sin);
}
+ return 0;
+}
- if (num < 10) {
- error_msg("warning, got bogus raw line.\n");
- return;
+static void print_inet_line(struct inet_params *param,
+ const char *state_str, const char *proto, int is_connected)
+{
+ if ((is_connected && (flags & NETSTAT_CONNECTED))
+ || (!is_connected && (flags & NETSTAT_LISTENING))
+ ) {
+ char *l = ip_port_str(
+ ¶m->localaddr.sa, param->local_port,
+ proto, flags & NETSTAT_NUMERIC);
+ char *r = ip_port_str(
+ ¶m->remaddr.sa, param->rem_port,
+ proto, flags & NETSTAT_NUMERIC);
+ printf(FMT_NET_CONN_DATA,
+ proto, param->rxq, param->txq,
+ IF_FEATURE_NETSTAT_WIDE(G.addr_width,) l,
+ IF_FEATURE_NETSTAT_WIDE(G.addr_width,) r,
+ state_str);
+#if ENABLE_FEATURE_NETSTAT_PRG
+ if (option_mask32 & OPT_prg)
+ printf("%."PROGNAME_WIDTH_STR"s", prg_cache_get(param->inode));
+#endif
+ bb_putchar('\n');
+ free(l);
+ free(r);
}
- state_str=itoa(state);
-
-#define notnull(A) (A.sin_addr.s_addr)
- if ((notnull(remaddr) && (flags&NETSTAT_CONNECTED)) ||
- (!notnull(remaddr) && (flags&NETSTAT_LISTENING)))
- {
- snprint_ip_port(local_addr, sizeof(local_addr),
- (struct sockaddr *) &localaddr, local_port,
- "raw", flags&NETSTAT_NUMERIC);
-
- snprint_ip_port(rem_addr, sizeof(rem_addr),
- (struct sockaddr *) &remaddr, rem_port,
- "raw", flags&NETSTAT_NUMERIC);
-
- printf("raw %6ld %6ld %-23s %-23s %-12s\n",
- rxq, txq, local_addr, rem_addr, state_str);
+}
+
+static int FAST_FUNC tcp_do_one(char *line)
+{
+ struct inet_params param;
+
+ memset(¶m, 0, sizeof(param));
+ if (scan_inet_proc_line(¶m, line))
+ return 1;
+
+ print_inet_line(¶m, tcp_state[param.state], "tcp", param.rem_port);
+ return 0;
+}
+#if ENABLE_FEATURE_IPV6
+# define NOT_NULL_ADDR(A) ( \
+ ( (A.sa.sa_family == AF_INET6) \
+ && (A.sin6.sin6_addr.s6_addr32[0] | A.sin6.sin6_addr.s6_addr32[1] | \
+ A.sin6.sin6_addr.s6_addr32[2] | A.sin6.sin6_addr.s6_addr32[3]) \
+ ) || ( \
+ (A.sa.sa_family == AF_INET) \
+ && A.sin.sin_addr.s_addr != 0 \
+ ) \
+)
+#else
+# define NOT_NULL_ADDR(A) (A.sin.sin_addr.s_addr)
+#endif
+
+static int FAST_FUNC udp_do_one(char *line)
+{
+ int have_remaddr;
+ const char *state_str;
+ struct inet_params param;
+
+ memset(¶m, 0, sizeof(param)); /* otherwise we display garbage IPv6 scope_ids */
+ if (scan_inet_proc_line(¶m, line))
+ return 1;
+
+ state_str = "UNKNOWN";
+ switch (param.state) {
+ case TCP_ESTABLISHED:
+ state_str = "ESTABLISHED";
+ break;
+ case TCP_CLOSE:
+ state_str = "";
+ break;
}
+
+ have_remaddr = NOT_NULL_ADDR(param.remaddr);
+ print_inet_line(¶m, state_str, "udp", have_remaddr);
+ return 0;
}
-#define HAS_INODE 1
+static int FAST_FUNC raw_do_one(char *line)
+{
+ int have_remaddr;
+ struct inet_params param;
+
+ if (scan_inet_proc_line(¶m, line))
+ return 1;
+
+ have_remaddr = NOT_NULL_ADDR(param.remaddr);
+ print_inet_line(¶m, itoa(param.state), "raw", have_remaddr);
+ return 0;
+}
-static void unix_do_one(int nr, const char *line)
+static int FAST_FUNC unix_do_one(char *line)
{
- static int has = 0;
- char path[PATH_MAX], ss_flags[32];
- char *ss_proto, *ss_state, *ss_type;
- int num, state, type, inode;
- void *d;
unsigned long refcnt, proto, unix_flags;
-
- if (nr == 0) {
- if (strstr(line, "Inode"))
- has |= HAS_INODE;
- return;
- }
- path[0] = '\0';
- num = sscanf(line, "%p: %lX %lX %lX %X %X %d %s",
- &d, &refcnt, &proto, &unix_flags, &type, &state, &inode, path);
+ unsigned long inode;
+ int type, state;
+ int num, path_ofs;
+ const char *ss_proto, *ss_state, *ss_type;
+ char ss_flags[32];
+
+ /* 2.6.15 may report lines like "... @/tmp/fam-user-^@^@^@^@^@^@^@..."
+ * Other users report long lines filled by NUL bytes.
+ * (those ^@ are NUL bytes too). We see them as empty lines. */
+ if (!line[0])
+ return 0;
+
+ path_ofs = 0; /* paranoia */
+ num = sscanf(line, "%*p: %lX %lX %lX %X %X %lu %n",
+ &refcnt, &proto, &unix_flags, &type, &state, &inode, &path_ofs);
if (num < 6) {
- error_msg("warning, got bogus unix line.\n");
- return;
+ return 1; /* error */
}
- if (!(has & HAS_INODE))
- snprintf(path,sizeof(path),"%d",inode);
-
- if ((flags&(NETSTAT_LISTENING|NETSTAT_CONNECTED))!=(NETSTAT_LISTENING|NETSTAT_CONNECTED)) {
+ if ((flags & (NETSTAT_LISTENING|NETSTAT_CONNECTED)) != (NETSTAT_LISTENING|NETSTAT_CONNECTED)) {
if ((state == SS_UNCONNECTED) && (unix_flags & SO_ACCEPTCON)) {
- if (!(flags&NETSTAT_LISTENING))
- return;
+ if (!(flags & NETSTAT_LISTENING))
+ return 0;
} else {
- if (!(flags&NETSTAT_CONNECTED))
- return;
+ if (!(flags & NETSTAT_CONNECTED))
+ return 0;
}
}
case 0:
ss_proto = "unix";
break;
-
default:
ss_proto = "??";
}
case SOCK_STREAM:
ss_type = "STREAM";
break;
-
case SOCK_DGRAM:
ss_type = "DGRAM";
break;
-
case SOCK_RAW:
ss_type = "RAW";
break;
-
case SOCK_RDM:
ss_type = "RDM";
break;
-
case SOCK_SEQPACKET:
ss_type = "SEQPACKET";
break;
-
default:
ss_type = "UNKNOWN";
}
case SS_FREE:
ss_state = "FREE";
break;
-
case SS_UNCONNECTED:
/*
* Unconnected sockets may be listening
ss_state = "";
}
break;
-
case SS_CONNECTING:
ss_state = "CONNECTING";
break;
-
case SS_CONNECTED:
ss_state = "CONNECTED";
break;
-
case SS_DISCONNECTING:
ss_state = "DISCONNECTING";
break;
-
default:
ss_state = "UNKNOWN";
}
strcat(ss_flags, "W ");
if (unix_flags & SO_NOSPACE)
strcat(ss_flags, "N ");
-
strcat(ss_flags, "]");
- printf("%-5s %-6ld %-11s %-10s %-13s ",
- ss_proto, refcnt, ss_flags, ss_type, ss_state);
- if (has & HAS_INODE)
- printf("%-6d ",inode);
- else
- printf("- ");
- puts(path);
+ printf("%-5s %-6ld %-11s %-10s %-13s %6lu ",
+ ss_proto, refcnt, ss_flags, ss_type, ss_state, inode
+ );
+
+#if ENABLE_FEATURE_NETSTAT_PRG
+ if (option_mask32 & OPT_prg)
+ printf("%-"PROGNAME_WIDTH_STR"s", prg_cache_get(inode));
+#endif
+
+ /* TODO: currently we stop at first NUL byte. Is it a problem? */
+ line += path_ofs;
+ *strchrnul(line, '\n') = '\0';
+ while (*line)
+ fputc_printable(*line++, stdout);
+ bb_putchar('\n');
+ return 0;
}
-#define _PATH_PROCNET_UDP "/proc/net/udp"
-#define _PATH_PROCNET_TCP "/proc/net/tcp"
-#define _PATH_PROCNET_RAW "/proc/net/raw"
-#define _PATH_PROCNET_UNIX "/proc/net/unix"
-
-static int do_info(char *file, char *name, void (*proc)(int, const char *))
+static void do_info(const char *file, int FAST_FUNC (*proc)(char *))
{
- char buffer[8192];
- int rc = 0;
- int lnr = 0;
+ int lnr;
FILE *procinfo;
+ char *buffer;
- procinfo = fopen((file), "r");
+ /* _stdin is just to save "r" param */
+ procinfo = fopen_or_warn_stdin(file);
if (procinfo == NULL) {
- if (errno != ENOENT) {
- perror((file));
- return -1;
- }
- error_msg("%s: no support for `%s' on this system.\n",
- "netstat", (name));
- rc = 1;
- } else {
- do {
- if (fgets(buffer, sizeof(buffer), procinfo))
- (proc)(lnr++, buffer);
- } while (!feof(procinfo));
- fclose(procinfo);
+ return;
}
- return rc;
+ lnr = 0;
+ /* Why xmalloc_fgets_str? because it doesn't stop on NULs */
+ while ((buffer = xmalloc_fgets_str(procinfo, "\n")) != NULL) {
+ /* line 0 is skipped */
+ if (lnr && proc(buffer))
+ bb_error_msg("%s: bogus data on line %d", file, lnr + 1);
+ lnr++;
+ free(buffer);
+ }
+ fclose(procinfo);
}
-/*
- * Our main function.
- */
-
-int netstat_main(int argc, char **argv)
+int netstat_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
+int netstat_main(int argc UNUSED_PARAM, char **argv)
{
- int opt;
- int new_flags=0;
- while ((opt = getopt(argc, argv, "lantuwx")) != -1)
- switch (opt) {
- case 'l':
- flags &= ~NETSTAT_CONNECTED;
- flags |= NETSTAT_LISTENING;
- break;
- case 'a':
- flags |= NETSTAT_LISTENING | NETSTAT_CONNECTED;
- break;
- case 'n':
- flags |= NETSTAT_NUMERIC;
- break;
- case 't':
- new_flags |= NETSTAT_TCP;
- break;
- case 'u':
- new_flags |= NETSTAT_UDP;
- break;
- case 'w':
- new_flags |= NETSTAT_RAW;
- break;
- case 'x':
- new_flags |= NETSTAT_UNIX;
- break;
- default:
- show_usage();
- }
- if (new_flags) {
- flags &= ~(NETSTAT_TCP|NETSTAT_UDP|NETSTAT_RAW|NETSTAT_UNIX);
- flags |= new_flags;
+ unsigned opt;
+
+ INIT_G();
+
+ /* Option string must match NETSTAT_xxx constants */
+ opt = getopt32(argv, NETSTAT_OPTS);
+ if (opt & OPT_sock_listen) { // -l
+ flags &= ~NETSTAT_CONNECTED;
+ flags |= NETSTAT_LISTENING;
+ }
+ if (opt & OPT_sock_all) flags |= NETSTAT_LISTENING | NETSTAT_CONNECTED; // -a
+ //if (opt & OPT_extended) // -e
+ if (opt & OPT_noresolve) flags |= NETSTAT_NUMERIC; // -n
+ //if (opt & OPT_sock_tcp) // -t: NETSTAT_TCP
+ //if (opt & OPT_sock_udp) // -u: NETSTAT_UDP
+ //if (opt & OPT_sock_raw) // -w: NETSTAT_RAW
+ //if (opt & OPT_sock_unix) // -x: NETSTAT_UNIX
+#if ENABLE_ROUTE
+ if (opt & OPT_route) { // -r
+ bb_displayroutes(flags & NETSTAT_NUMERIC, !(opt & OPT_extended));
+ return 0;
+ }
+#endif
+#if ENABLE_FEATURE_NETSTAT_WIDE
+ G.addr_width = ADDR_NORMAL_WIDTH;
+ if (opt & OPT_wide) { // -W
+ G.addr_width = ADDR_WIDE;
+ }
+#endif
+#if ENABLE_FEATURE_NETSTAT_PRG
+ progname_banner = "";
+ if (opt & OPT_prg) { // -p
+ progname_banner = PROGNAME_BANNER;
+ prg_cache_load();
}
- if (flags&(NETSTAT_TCP|NETSTAT_UDP|NETSTAT_RAW)) {
- printf("Active Internet connections "); /* xxx */
+#endif
- if ((flags&(NETSTAT_LISTENING|NETSTAT_CONNECTED))==(NETSTAT_LISTENING|NETSTAT_CONNECTED))
+ opt &= NETSTAT_ALLPROTO;
+ if (opt) {
+ flags &= ~NETSTAT_ALLPROTO;
+ flags |= opt;
+ }
+ if (flags & (NETSTAT_TCP|NETSTAT_UDP|NETSTAT_RAW)) {
+ printf("Active Internet connections "); /* xxx */
+
+ if ((flags & (NETSTAT_LISTENING|NETSTAT_CONNECTED)) == (NETSTAT_LISTENING|NETSTAT_CONNECTED))
printf("(servers and established)");
- else {
- if (flags&NETSTAT_LISTENING)
- printf("(only servers)");
- else
- printf("(w/o servers)");
- }
- printf("\nProto Recv-Q Send-Q Local Address Foreign Address State \n");
+ else if (flags & NETSTAT_LISTENING)
+ printf("(only servers)");
+ else
+ printf("(w/o servers)");
+ printf(FMT_NET_CONN_HEADER,
+ IF_FEATURE_NETSTAT_WIDE(G.addr_width,) "Local Address",
+ IF_FEATURE_NETSTAT_WIDE(G.addr_width,) "Foreign Address",
+ progname_banner
+ );
+ }
+ if (flags & NETSTAT_TCP) {
+ do_info("/proc/net/tcp", tcp_do_one);
+#if ENABLE_FEATURE_IPV6
+ do_info("/proc/net/tcp6", tcp_do_one);
+#endif
}
- if (flags&NETSTAT_TCP)
- do_info(_PATH_PROCNET_TCP,"AF INET (tcp)",tcp_do_one);
- if (flags&NETSTAT_UDP)
- do_info(_PATH_PROCNET_UDP,"AF INET (udp)",udp_do_one);
- if (flags&NETSTAT_RAW)
- do_info(_PATH_PROCNET_RAW,"AF INET (raw)",raw_do_one);
- if (flags&NETSTAT_UNIX) {
+ if (flags & NETSTAT_UDP) {
+ do_info("/proc/net/udp", udp_do_one);
+#if ENABLE_FEATURE_IPV6
+ do_info("/proc/net/udp6", udp_do_one);
+#endif
+ }
+ if (flags & NETSTAT_RAW) {
+ do_info("/proc/net/raw", raw_do_one);
+#if ENABLE_FEATURE_IPV6
+ do_info("/proc/net/raw6", raw_do_one);
+#endif
+ }
+ if (flags & NETSTAT_UNIX) {
printf("Active UNIX domain sockets ");
- if ((flags&(NETSTAT_LISTENING|NETSTAT_CONNECTED))==(NETSTAT_LISTENING|NETSTAT_CONNECTED))
+ if ((flags & (NETSTAT_LISTENING|NETSTAT_CONNECTED)) == (NETSTAT_LISTENING|NETSTAT_CONNECTED))
printf("(servers and established)");
- else {
- if (flags&NETSTAT_LISTENING)
- printf("(only servers)");
- else
- printf("(w/o servers)");
- }
-
- printf("\nProto RefCnt Flags Type State I-Node Path\n");
- do_info(_PATH_PROCNET_UNIX,"AF UNIX",unix_do_one);
+ else if (flags & NETSTAT_LISTENING)
+ printf("(only servers)");
+ else
+ printf("(w/o servers)");
+ printf("\nProto RefCnt Flags Type State I-Node %sPath\n", progname_banner);
+ do_info("/proc/net/unix", unix_do_one);
}
+ prg_cache_clear();
return 0;
}