]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - usr.bin/sockstat/sockstat.c
sqlite3: Vendor import of sqlite3 3.45.0
[FreeBSD/FreeBSD.git] / usr.bin / sockstat / sockstat.c
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause
3  *
4  * Copyright (c) 2002 Dag-Erling Smørgrav
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer
12  *    in this position and unchanged.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. The name of the author may not be used to endorse or promote products
17  *    derived from this software without specific prior written permission.
18  *
19  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
20  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
21  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
23  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
24  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29  */
30
31 #include <sys/param.h>
32 #include <sys/file.h>
33 #include <sys/socket.h>
34 #include <sys/socketvar.h>
35 #include <sys/sysctl.h>
36 #include <sys/jail.h>
37 #include <sys/user.h>
38 #include <sys/queue.h>
39 #include <sys/tree.h>
40
41 #include <sys/un.h>
42 #include <sys/unpcb.h>
43
44 #include <net/route.h>
45
46 #include <netinet/in.h>
47 #include <netinet/in_pcb.h>
48 #include <netinet/sctp.h>
49 #include <netinet/tcp.h>
50 #define TCPSTATES /* load state names */
51 #include <netinet/tcp_fsm.h>
52 #include <netinet/tcp_seq.h>
53 #include <netinet/tcp_var.h>
54 #include <arpa/inet.h>
55
56 #include <capsicum_helpers.h>
57 #include <ctype.h>
58 #include <err.h>
59 #include <errno.h>
60 #include <inttypes.h>
61 #include <jail.h>
62 #include <netdb.h>
63 #include <pwd.h>
64 #include <stdarg.h>
65 #include <stdio.h>
66 #include <stdlib.h>
67 #include <string.h>
68 #include <unistd.h>
69
70 #include <libcasper.h>
71 #include <casper/cap_net.h>
72 #include <casper/cap_netdb.h>
73 #include <casper/cap_pwd.h>
74 #include <casper/cap_sysctl.h>
75
76 #define sstosin(ss)     ((struct sockaddr_in *)(ss))
77 #define sstosin6(ss)    ((struct sockaddr_in6 *)(ss))
78 #define sstosun(ss)     ((struct sockaddr_un *)(ss))
79 #define sstosa(ss)      ((struct sockaddr *)(ss))
80
81 static int       opt_4;         /* Show IPv4 sockets */
82 static int       opt_6;         /* Show IPv6 sockets */
83 static int       opt_C;         /* Show congestion control */
84 static int       opt_c;         /* Show connected sockets */
85 static int       opt_i;         /* Show inp_gencnt */
86 static int       opt_j;         /* Show specified jail */
87 static int       opt_L;         /* Don't show IPv4 or IPv6 loopback sockets */
88 static int       opt_l;         /* Show listening sockets */
89 static int       opt_n;         /* Don't resolve UIDs to user names */
90 static int       opt_q;         /* Don't show header */
91 static int       opt_S;         /* Show protocol stack if applicable */
92 static int       opt_s;         /* Show protocol state if applicable */
93 static int       opt_U;         /* Show remote UDP encapsulation port number */
94 static int       opt_u;         /* Show Unix domain sockets */
95 static int       opt_v;         /* Verbose mode */
96 static int       opt_w;         /* Wide print area for addresses */
97
98 /*
99  * Default protocols to use if no -P was defined.
100  */
101 static const char *default_protos[] = {"sctp", "tcp", "udp", "divert" };
102 static size_t      default_numprotos = nitems(default_protos);
103
104 static int      *protos;        /* protocols to use */
105 static size_t    numprotos;     /* allocated size of protos[] */
106
107 static int      *ports;
108
109 #define INT_BIT (sizeof(int)*CHAR_BIT)
110 #define SET_PORT(p) do { ports[p / INT_BIT] |= 1 << (p % INT_BIT); } while (0)
111 #define CHK_PORT(p) (ports[p / INT_BIT] & (1 << (p % INT_BIT)))
112
113 struct addr {
114         union {
115                 struct sockaddr_storage address;
116                 struct {        /* unix(4) faddr */
117                         kvaddr_t conn;
118                         kvaddr_t firstref;
119                         kvaddr_t nextref;
120                 };
121         };
122         unsigned int encaps_port;
123         int state;
124         struct addr *next;
125 };
126
127 struct sock {
128         union {
129                 RB_ENTRY(sock) socket_tree;     /* tree of pcbs with socket */
130                 SLIST_ENTRY(sock) socket_list;  /* list of pcbs w/o socket */
131         };
132         RB_ENTRY(sock) pcb_tree;
133         kvaddr_t socket;
134         kvaddr_t pcb;
135         uint64_t inp_gencnt;
136         int shown;
137         int vflag;
138         int family;
139         int proto;
140         int state;
141         const char *protoname;
142         char stack[TCP_FUNCTION_NAME_LEN_MAX];
143         char cc[TCP_CA_NAME_MAX];
144         struct addr *laddr;
145         struct addr *faddr;
146 };
147
148 static RB_HEAD(socks_t, sock) socks = RB_INITIALIZER(&socks);
149 static int64_t
150 socket_compare(const struct sock *a, const struct sock *b)
151 {
152         return ((int64_t)(a->socket/2 - b->socket/2));
153 }
154 RB_GENERATE_STATIC(socks_t, sock, socket_tree, socket_compare);
155
156 static RB_HEAD(pcbs_t, sock) pcbs = RB_INITIALIZER(&pcbs);
157 static int64_t
158 pcb_compare(const struct sock *a, const struct sock *b)
159 {
160         return ((int64_t)(a->pcb/2 - b->pcb/2));
161 }
162 RB_GENERATE_STATIC(pcbs_t, sock, pcb_tree, pcb_compare);
163
164 static SLIST_HEAD(, sock) nosocks = SLIST_HEAD_INITIALIZER(&nosocks);
165
166 struct file {
167         RB_ENTRY(file)  file_tree;
168         kvaddr_t        xf_data;
169         pid_t   xf_pid;
170         uid_t   xf_uid;
171         int     xf_fd;
172 };
173
174 static RB_HEAD(files_t, file) ftree = RB_INITIALIZER(&ftree);
175 static int64_t
176 file_compare(const struct file *a, const struct file *b)
177 {
178         return ((int64_t)(a->xf_data/2 - b->xf_data/2));
179 }
180 RB_GENERATE_STATIC(files_t, file, file_tree, file_compare);
181
182 static struct file *files;
183 static int nfiles;
184
185 static cap_channel_t *capnet;
186 static cap_channel_t *capnetdb;
187 static cap_channel_t *capsysctl;
188 static cap_channel_t *cappwd;
189
190 static int
191 xprintf(const char *fmt, ...)
192 {
193         va_list ap;
194         int len;
195
196         va_start(ap, fmt);
197         len = vprintf(fmt, ap);
198         va_end(ap);
199         if (len < 0)
200                 err(1, "printf()");
201         return (len);
202 }
203
204 static bool
205 _check_ksize(size_t received_size, size_t expected_size, const char *struct_name)
206 {
207         if (received_size != expected_size) {
208                 warnx("%s size mismatch: expected %zd, received %zd",
209                     struct_name, expected_size, received_size);
210                 return false;
211         }
212         return true;
213 }
214 #define check_ksize(_sz, _struct)       (_check_ksize(_sz, sizeof(_struct), #_struct))
215
216 static void
217 _enforce_ksize(size_t received_size, size_t expected_size, const char *struct_name)
218 {
219         if (received_size != expected_size) {
220                 errx(1, "fatal: struct %s size mismatch: expected %zd, received %zd",
221                     struct_name, expected_size, received_size);
222         }
223 }
224 #define enforce_ksize(_sz, _struct)     (_enforce_ksize(_sz, sizeof(_struct), #_struct))
225
226 static int
227 get_proto_type(const char *proto)
228 {
229         struct protoent *pent;
230
231         if (strlen(proto) == 0)
232                 return (0);
233         if (capnetdb != NULL)
234                 pent = cap_getprotobyname(capnetdb, proto);
235         else
236                 pent = getprotobyname(proto);
237         if (pent == NULL) {
238                 warn("cap_getprotobyname");
239                 return (-1);
240         }
241         return (pent->p_proto);
242 }
243
244 static void
245 init_protos(int num)
246 {
247         int proto_count = 0;
248
249         if (num > 0) {
250                 proto_count = num;
251         } else {
252                 /* Find the maximum number of possible protocols. */
253                 while (getprotoent() != NULL)
254                         proto_count++;
255                 endprotoent();
256         }
257
258         if ((protos = malloc(sizeof(int) * proto_count)) == NULL)
259                 err(1, "malloc");
260         numprotos = proto_count;
261 }
262
263 static int
264 parse_protos(char *protospec)
265 {
266         char *prot;
267         int proto_type, proto_index;
268
269         if (protospec == NULL)
270                 return (-1);
271
272         init_protos(0);
273         proto_index = 0;
274         while ((prot = strsep(&protospec, ",")) != NULL) {
275                 if (strlen(prot) == 0)
276                         continue;
277                 proto_type = get_proto_type(prot);
278                 if (proto_type != -1)
279                         protos[proto_index++] = proto_type;
280         }
281         numprotos = proto_index;
282         return (proto_index);
283 }
284
285 static void
286 parse_ports(const char *portspec)
287 {
288         const char *p, *q;
289         int port, end;
290
291         if (ports == NULL)
292                 if ((ports = calloc(65536 / INT_BIT, sizeof(int))) == NULL)
293                         err(1, "calloc()");
294         p = portspec;
295         while (*p != '\0') {
296                 if (!isdigit(*p))
297                         errx(1, "syntax error in port range");
298                 for (q = p; *q != '\0' && isdigit(*q); ++q)
299                         /* nothing */ ;
300                 for (port = 0; p < q; ++p)
301                         port = port * 10 + digittoint(*p);
302                 if (port < 0 || port > 65535)
303                         errx(1, "invalid port number");
304                 SET_PORT(port);
305                 switch (*p) {
306                 case '-':
307                         ++p;
308                         break;
309                 case ',':
310                         ++p;
311                         /* fall through */
312                 case '\0':
313                 default:
314                         continue;
315                 }
316                 for (q = p; *q != '\0' && isdigit(*q); ++q)
317                         /* nothing */ ;
318                 for (end = 0; p < q; ++p)
319                         end = end * 10 + digittoint(*p);
320                 if (end < port || end > 65535)
321                         errx(1, "invalid port number");
322                 while (port++ < end)
323                         SET_PORT(port);
324                 if (*p == ',')
325                         ++p;
326         }
327 }
328
329 static void
330 sockaddr(struct sockaddr_storage *ss, int af, void *addr, int port)
331 {
332         struct sockaddr_in *sin4;
333         struct sockaddr_in6 *sin6;
334
335         bzero(ss, sizeof(*ss));
336         switch (af) {
337         case AF_INET:
338                 sin4 = sstosin(ss);
339                 sin4->sin_len = sizeof(*sin4);
340                 sin4->sin_family = af;
341                 sin4->sin_port = port;
342                 sin4->sin_addr = *(struct in_addr *)addr;
343                 break;
344         case AF_INET6:
345                 sin6 = sstosin6(ss);
346                 sin6->sin6_len = sizeof(*sin6);
347                 sin6->sin6_family = af;
348                 sin6->sin6_port = port;
349                 sin6->sin6_addr = *(struct in6_addr *)addr;
350 #define s6_addr16       __u6_addr.__u6_addr16
351                 if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)) {
352                         sin6->sin6_scope_id =
353                             ntohs(sin6->sin6_addr.s6_addr16[1]);
354                         sin6->sin6_addr.s6_addr16[1] = 0;
355                 }
356                 break;
357         default:
358                 abort();
359         }
360 }
361
362 static void
363 free_socket(struct sock *sock)
364 {
365         struct addr *cur, *next;
366
367         cur = sock->laddr;
368         while (cur != NULL) {
369                 next = cur->next;
370                 free(cur);
371                 cur = next;
372         }
373         cur = sock->faddr;
374         while (cur != NULL) {
375                 next = cur->next;
376                 free(cur);
377                 cur = next;
378         }
379         free(sock);
380 }
381
382 static void
383 gather_sctp(void)
384 {
385         struct sock *sock;
386         struct addr *laddr, *prev_laddr, *faddr, *prev_faddr;
387         struct xsctp_inpcb *xinpcb;
388         struct xsctp_tcb *xstcb;
389         struct xsctp_raddr *xraddr;
390         struct xsctp_laddr *xladdr;
391         const char *varname;
392         size_t len, offset;
393         char *buf;
394         int vflag;
395         int no_stcb, local_all_loopback, foreign_all_loopback;
396
397         vflag = 0;
398         if (opt_4)
399                 vflag |= INP_IPV4;
400         if (opt_6)
401                 vflag |= INP_IPV6;
402
403         varname = "net.inet.sctp.assoclist";
404         if (cap_sysctlbyname(capsysctl, varname, 0, &len, 0, 0) < 0) {
405                 if (errno != ENOENT)
406                         err(1, "cap_sysctlbyname()");
407                 return;
408         }
409         if ((buf = (char *)malloc(len)) == NULL) {
410                 err(1, "malloc()");
411                 return;
412         }
413         if (cap_sysctlbyname(capsysctl, varname, buf, &len, 0, 0) < 0) {
414                 err(1, "cap_sysctlbyname()");
415                 free(buf);
416                 return;
417         }
418         xinpcb = (struct xsctp_inpcb *)(void *)buf;
419         offset = sizeof(struct xsctp_inpcb);
420         while ((offset < len) && (xinpcb->last == 0)) {
421                 if ((sock = calloc(1, sizeof *sock)) == NULL)
422                         err(1, "malloc()");
423                 sock->socket = xinpcb->socket;
424                 sock->proto = IPPROTO_SCTP;
425                 sock->protoname = "sctp";
426                 if (xinpcb->maxqlen == 0)
427                         sock->state = SCTP_CLOSED;
428                 else
429                         sock->state = SCTP_LISTEN;
430                 if (xinpcb->flags & SCTP_PCB_FLAGS_BOUND_V6) {
431                         sock->family = AF_INET6;
432                         /*
433                          * Currently there is no way to distinguish between
434                          * IPv6 only sockets or dual family sockets.
435                          * So mark it as dual socket.
436                          */
437                         sock->vflag = INP_IPV6 | INP_IPV4;
438                 } else {
439                         sock->family = AF_INET;
440                         sock->vflag = INP_IPV4;
441                 }
442                 prev_laddr = NULL;
443                 local_all_loopback = 1;
444                 while (offset < len) {
445                         xladdr = (struct xsctp_laddr *)(void *)(buf + offset);
446                         offset += sizeof(struct xsctp_laddr);
447                         if (xladdr->last == 1)
448                                 break;
449                         if ((laddr = calloc(1, sizeof(struct addr))) == NULL)
450                                 err(1, "malloc()");
451                         switch (xladdr->address.sa.sa_family) {
452                         case AF_INET:
453 #define __IN_IS_ADDR_LOOPBACK(pina) \
454         ((ntohl((pina)->s_addr) >> IN_CLASSA_NSHIFT) == IN_LOOPBACKNET)
455                                 if (!__IN_IS_ADDR_LOOPBACK(
456                                     &xladdr->address.sin.sin_addr))
457                                         local_all_loopback = 0;
458 #undef  __IN_IS_ADDR_LOOPBACK
459                                 sockaddr(&laddr->address, AF_INET,
460                                     &xladdr->address.sin.sin_addr,
461                                     htons(xinpcb->local_port));
462                                 break;
463                         case AF_INET6:
464                                 if (!IN6_IS_ADDR_LOOPBACK(
465                                     &xladdr->address.sin6.sin6_addr))
466                                         local_all_loopback = 0;
467                                 sockaddr(&laddr->address, AF_INET6,
468                                     &xladdr->address.sin6.sin6_addr,
469                                     htons(xinpcb->local_port));
470                                 break;
471                         default:
472                                 errx(1, "address family %d not supported",
473                                     xladdr->address.sa.sa_family);
474                         }
475                         laddr->next = NULL;
476                         if (prev_laddr == NULL)
477                                 sock->laddr = laddr;
478                         else
479                                 prev_laddr->next = laddr;
480                         prev_laddr = laddr;
481                 }
482                 if (sock->laddr == NULL) {
483                         if ((sock->laddr =
484                             calloc(1, sizeof(struct addr))) == NULL)
485                                 err(1, "malloc()");
486                         sock->laddr->address.ss_family = sock->family;
487                         if (sock->family == AF_INET)
488                                 sock->laddr->address.ss_len =
489                                     sizeof(struct sockaddr_in);
490                         else
491                                 sock->laddr->address.ss_len =
492                                     sizeof(struct sockaddr_in6);
493                         local_all_loopback = 0;
494                 }
495                 if ((sock->faddr = calloc(1, sizeof(struct addr))) == NULL)
496                         err(1, "malloc()");
497                 sock->faddr->address.ss_family = sock->family;
498                 if (sock->family == AF_INET)
499                         sock->faddr->address.ss_len =
500                             sizeof(struct sockaddr_in);
501                 else
502                         sock->faddr->address.ss_len =
503                             sizeof(struct sockaddr_in6);
504                 no_stcb = 1;
505                 while (offset < len) {
506                         xstcb = (struct xsctp_tcb *)(void *)(buf + offset);
507                         offset += sizeof(struct xsctp_tcb);
508                         if (no_stcb) {
509                                 if (opt_l && (sock->vflag & vflag) &&
510                                     (!opt_L || !local_all_loopback) &&
511                                     ((xinpcb->flags & SCTP_PCB_FLAGS_UDPTYPE) ||
512                                      (xstcb->last == 1))) {
513                                         RB_INSERT(socks_t, &socks, sock);
514                                 } else {
515                                         free_socket(sock);
516                                 }
517                         }
518                         if (xstcb->last == 1)
519                                 break;
520                         no_stcb = 0;
521                         if (opt_c) {
522                                 if ((sock = calloc(1, sizeof *sock)) == NULL)
523                                         err(1, "malloc()");
524                                 sock->socket = xinpcb->socket;
525                                 sock->proto = IPPROTO_SCTP;
526                                 sock->protoname = "sctp";
527                                 sock->state = (int)xstcb->state;
528                                 if (xinpcb->flags & SCTP_PCB_FLAGS_BOUND_V6) {
529                                         sock->family = AF_INET6;
530                                 /*
531                                  * Currently there is no way to distinguish
532                                  * between IPv6 only sockets or dual family
533                                  *  sockets. So mark it as dual socket.
534                                  */
535                                         sock->vflag = INP_IPV6 | INP_IPV4;
536                                 } else {
537                                         sock->family = AF_INET;
538                                         sock->vflag = INP_IPV4;
539                                 }
540                         }
541                         prev_laddr = NULL;
542                         local_all_loopback = 1;
543                         while (offset < len) {
544                                 xladdr = (struct xsctp_laddr *)(void *)(buf +
545                                     offset);
546                                 offset += sizeof(struct xsctp_laddr);
547                                 if (xladdr->last == 1)
548                                         break;
549                                 if (!opt_c)
550                                         continue;
551                                 laddr = calloc(1, sizeof(struct addr));
552                                 if (laddr == NULL)
553                                         err(1, "malloc()");
554                                 switch (xladdr->address.sa.sa_family) {
555                                 case AF_INET:
556 #define __IN_IS_ADDR_LOOPBACK(pina) \
557         ((ntohl((pina)->s_addr) >> IN_CLASSA_NSHIFT) == IN_LOOPBACKNET)
558                                         if (!__IN_IS_ADDR_LOOPBACK(
559                                             &xladdr->address.sin.sin_addr))
560                                                 local_all_loopback = 0;
561 #undef  __IN_IS_ADDR_LOOPBACK
562                                         sockaddr(&laddr->address, AF_INET,
563                                             &xladdr->address.sin.sin_addr,
564                                             htons(xstcb->local_port));
565                                         break;
566                                 case AF_INET6:
567                                         if (!IN6_IS_ADDR_LOOPBACK(
568                                             &xladdr->address.sin6.sin6_addr))
569                                                 local_all_loopback = 0;
570                                         sockaddr(&laddr->address, AF_INET6,
571                                             &xladdr->address.sin6.sin6_addr,
572                                             htons(xstcb->local_port));
573                                         break;
574                                 default:
575                                         errx(1,
576                                             "address family %d not supported",
577                                             xladdr->address.sa.sa_family);
578                                 }
579                                 laddr->next = NULL;
580                                 if (prev_laddr == NULL)
581                                         sock->laddr = laddr;
582                                 else
583                                         prev_laddr->next = laddr;
584                                 prev_laddr = laddr;
585                         }
586                         prev_faddr = NULL;
587                         foreign_all_loopback = 1;
588                         while (offset < len) {
589                                 xraddr = (struct xsctp_raddr *)(void *)(buf +
590                                     offset);
591                                 offset += sizeof(struct xsctp_raddr);
592                                 if (xraddr->last == 1)
593                                         break;
594                                 if (!opt_c)
595                                         continue;
596                                 faddr = calloc(1, sizeof(struct addr));
597                                 if (faddr == NULL)
598                                         err(1, "malloc()");
599                                 switch (xraddr->address.sa.sa_family) {
600                                 case AF_INET:
601 #define __IN_IS_ADDR_LOOPBACK(pina) \
602         ((ntohl((pina)->s_addr) >> IN_CLASSA_NSHIFT) == IN_LOOPBACKNET)
603                                         if (!__IN_IS_ADDR_LOOPBACK(
604                                             &xraddr->address.sin.sin_addr))
605                                                 foreign_all_loopback = 0;
606 #undef  __IN_IS_ADDR_LOOPBACK
607                                         sockaddr(&faddr->address, AF_INET,
608                                             &xraddr->address.sin.sin_addr,
609                                             htons(xstcb->remote_port));
610                                         break;
611                                 case AF_INET6:
612                                         if (!IN6_IS_ADDR_LOOPBACK(
613                                             &xraddr->address.sin6.sin6_addr))
614                                                 foreign_all_loopback = 0;
615                                         sockaddr(&faddr->address, AF_INET6,
616                                             &xraddr->address.sin6.sin6_addr,
617                                             htons(xstcb->remote_port));
618                                         break;
619                                 default:
620                                         errx(1,
621                                             "address family %d not supported",
622                                             xraddr->address.sa.sa_family);
623                                 }
624                                 faddr->encaps_port = xraddr->encaps_port;
625                                 faddr->state = xraddr->state;
626                                 faddr->next = NULL;
627                                 if (prev_faddr == NULL)
628                                         sock->faddr = faddr;
629                                 else
630                                         prev_faddr->next = faddr;
631                                 prev_faddr = faddr;
632                         }
633                         if (opt_c) {
634                                 if ((sock->vflag & vflag) &&
635                                     (!opt_L ||
636                                      !(local_all_loopback ||
637                                      foreign_all_loopback))) {
638                                         RB_INSERT(socks_t, &socks, sock);
639                                 } else {
640                                         free_socket(sock);
641                                 }
642                         }
643                 }
644                 xinpcb = (struct xsctp_inpcb *)(void *)(buf + offset);
645                 offset += sizeof(struct xsctp_inpcb);
646         }
647         free(buf);
648 }
649
650 static void
651 gather_inet(int proto)
652 {
653         struct xinpgen *xig, *exig;
654         struct xinpcb *xip;
655         struct xtcpcb *xtp = NULL;
656         struct xsocket *so;
657         struct sock *sock;
658         struct addr *laddr, *faddr;
659         const char *varname, *protoname;
660         size_t len, bufsize;
661         void *buf;
662         int retry, vflag;
663
664         vflag = 0;
665         if (opt_4)
666                 vflag |= INP_IPV4;
667         if (opt_6)
668                 vflag |= INP_IPV6;
669
670         switch (proto) {
671         case IPPROTO_TCP:
672                 varname = "net.inet.tcp.pcblist";
673                 protoname = "tcp";
674                 break;
675         case IPPROTO_UDP:
676                 varname = "net.inet.udp.pcblist";
677                 protoname = "udp";
678                 break;
679         case IPPROTO_DIVERT:
680                 varname = "net.inet.divert.pcblist";
681                 protoname = "div";
682                 break;
683         default:
684                 errx(1, "protocol %d not supported", proto);
685         }
686
687         buf = NULL;
688         bufsize = 8192;
689         retry = 5;
690         do {
691                 for (;;) {
692                         if ((buf = realloc(buf, bufsize)) == NULL)
693                                 err(1, "realloc()");
694                         len = bufsize;
695                         if (cap_sysctlbyname(capsysctl, varname, buf, &len,
696                             NULL, 0) == 0)
697                                 break;
698                         if (errno == ENOENT)
699                                 goto out;
700                         if (errno != ENOMEM || len != bufsize)
701                                 err(1, "cap_sysctlbyname()");
702                         bufsize *= 2;
703                 }
704                 xig = (struct xinpgen *)buf;
705                 exig = (struct xinpgen *)(void *)
706                     ((char *)buf + len - sizeof *exig);
707                 enforce_ksize(xig->xig_len, struct xinpgen);
708                 enforce_ksize(exig->xig_len, struct xinpgen);
709         } while (xig->xig_gen != exig->xig_gen && retry--);
710
711         if (xig->xig_gen != exig->xig_gen && opt_v)
712                 warnx("warning: data may be inconsistent");
713
714         for (;;) {
715                 xig = (struct xinpgen *)(void *)((char *)xig + xig->xig_len);
716                 if (xig >= exig)
717                         break;
718                 switch (proto) {
719                 case IPPROTO_TCP:
720                         xtp = (struct xtcpcb *)xig;
721                         xip = &xtp->xt_inp;
722                         if (!check_ksize(xtp->xt_len, struct xtcpcb))
723                                 goto out;
724                         protoname = xtp->t_flags & TF_TOE ? "toe" : "tcp";
725                         break;
726                 case IPPROTO_UDP:
727                 case IPPROTO_DIVERT:
728                         xip = (struct xinpcb *)xig;
729                         if (!check_ksize(xip->xi_len, struct xinpcb))
730                                 goto out;
731                         break;
732                 default:
733                         errx(1, "protocol %d not supported", proto);
734                 }
735                 so = &xip->xi_socket;
736                 if ((xip->inp_vflag & vflag) == 0)
737                         continue;
738                 if (xip->inp_vflag & INP_IPV4) {
739                         if ((xip->inp_fport == 0 && !opt_l) ||
740                             (xip->inp_fport != 0 && !opt_c))
741                                 continue;
742 #define __IN_IS_ADDR_LOOPBACK(pina) \
743         ((ntohl((pina)->s_addr) >> IN_CLASSA_NSHIFT) == IN_LOOPBACKNET)
744                         if (opt_L &&
745                             (__IN_IS_ADDR_LOOPBACK(&xip->inp_faddr) ||
746                              __IN_IS_ADDR_LOOPBACK(&xip->inp_laddr)))
747                                 continue;
748 #undef  __IN_IS_ADDR_LOOPBACK
749                 } else if (xip->inp_vflag & INP_IPV6) {
750                         if ((xip->inp_fport == 0 && !opt_l) ||
751                             (xip->inp_fport != 0 && !opt_c))
752                                 continue;
753                         if (opt_L &&
754                             (IN6_IS_ADDR_LOOPBACK(&xip->in6p_faddr) ||
755                              IN6_IS_ADDR_LOOPBACK(&xip->in6p_laddr)))
756                                 continue;
757                 } else {
758                         if (opt_v)
759                                 warnx("invalid vflag 0x%x", xip->inp_vflag);
760                         continue;
761                 }
762                 if ((sock = calloc(1, sizeof(*sock))) == NULL)
763                         err(1, "malloc()");
764                 if ((laddr = calloc(1, sizeof *laddr)) == NULL)
765                         err(1, "malloc()");
766                 if ((faddr = calloc(1, sizeof *faddr)) == NULL)
767                         err(1, "malloc()");
768                 sock->socket = so->xso_so;
769                 sock->proto = proto;
770                 sock->inp_gencnt = xip->inp_gencnt;
771                 if (xip->inp_vflag & INP_IPV4) {
772                         sock->family = AF_INET;
773                         sockaddr(&laddr->address, sock->family,
774                             &xip->inp_laddr, xip->inp_lport);
775                         sockaddr(&faddr->address, sock->family,
776                             &xip->inp_faddr, xip->inp_fport);
777                 } else if (xip->inp_vflag & INP_IPV6) {
778                         sock->family = AF_INET6;
779                         sockaddr(&laddr->address, sock->family,
780                             &xip->in6p_laddr, xip->inp_lport);
781                         sockaddr(&faddr->address, sock->family,
782                             &xip->in6p_faddr, xip->inp_fport);
783                 }
784                 if (proto == IPPROTO_TCP)
785                         faddr->encaps_port = xtp->xt_encaps_port;
786                 laddr->next = NULL;
787                 faddr->next = NULL;
788                 sock->laddr = laddr;
789                 sock->faddr = faddr;
790                 sock->vflag = xip->inp_vflag;
791                 if (proto == IPPROTO_TCP) {
792                         sock->state = xtp->t_state;
793                         memcpy(sock->stack, xtp->xt_stack,
794                             TCP_FUNCTION_NAME_LEN_MAX);
795                         memcpy(sock->cc, xtp->xt_cc, TCP_CA_NAME_MAX);
796                 }
797                 sock->protoname = protoname;
798                 if (sock->socket != 0)
799                         RB_INSERT(socks_t, &socks, sock);
800                 else
801                         SLIST_INSERT_HEAD(&nosocks, sock, socket_list);
802         }
803 out:
804         free(buf);
805 }
806
807 static void
808 gather_unix(int proto)
809 {
810         struct xunpgen *xug, *exug;
811         struct xunpcb *xup;
812         struct sock *sock;
813         struct addr *laddr, *faddr;
814         const char *varname, *protoname;
815         size_t len, bufsize;
816         void *buf;
817         int retry;
818
819         switch (proto) {
820         case SOCK_STREAM:
821                 varname = "net.local.stream.pcblist";
822                 protoname = "stream";
823                 break;
824         case SOCK_DGRAM:
825                 varname = "net.local.dgram.pcblist";
826                 protoname = "dgram";
827                 break;
828         case SOCK_SEQPACKET:
829                 varname = "net.local.seqpacket.pcblist";
830                 protoname = "seqpac";
831                 break;
832         default:
833                 abort();
834         }
835         buf = NULL;
836         bufsize = 8192;
837         retry = 5;
838         do {
839                 for (;;) {
840                         if ((buf = realloc(buf, bufsize)) == NULL)
841                                 err(1, "realloc()");
842                         len = bufsize;
843                         if (cap_sysctlbyname(capsysctl, varname, buf, &len,
844                             NULL, 0) == 0)
845                                 break;
846                         if (errno != ENOMEM || len != bufsize)
847                                 err(1, "cap_sysctlbyname()");
848                         bufsize *= 2;
849                 }
850                 xug = (struct xunpgen *)buf;
851                 exug = (struct xunpgen *)(void *)
852                     ((char *)buf + len - sizeof(*exug));
853                 if (!check_ksize(xug->xug_len, struct xunpgen) ||
854                     !check_ksize(exug->xug_len, struct xunpgen))
855                         goto out;
856         } while (xug->xug_gen != exug->xug_gen && retry--);
857
858         if (xug->xug_gen != exug->xug_gen && opt_v)
859                 warnx("warning: data may be inconsistent");
860
861         for (;;) {
862                 xug = (struct xunpgen *)(void *)((char *)xug + xug->xug_len);
863                 if (xug >= exug)
864                         break;
865                 xup = (struct xunpcb *)xug;
866                 if (!check_ksize(xup->xu_len, struct xunpcb))
867                         goto out;
868                 if ((xup->unp_conn == 0 && !opt_l) ||
869                     (xup->unp_conn != 0 && !opt_c))
870                         continue;
871                 if ((sock = calloc(1, sizeof(*sock))) == NULL)
872                         err(1, "malloc()");
873                 if ((laddr = calloc(1, sizeof *laddr)) == NULL)
874                         err(1, "malloc()");
875                 if ((faddr = calloc(1, sizeof *faddr)) == NULL)
876                         err(1, "malloc()");
877                 sock->socket = xup->xu_socket.xso_so;
878                 sock->pcb = xup->xu_unpp;
879                 sock->proto = proto;
880                 sock->family = AF_UNIX;
881                 sock->protoname = protoname;
882                 if (xup->xu_addr.sun_family == AF_UNIX)
883                         laddr->address =
884                             *(struct sockaddr_storage *)(void *)&xup->xu_addr;
885                 faddr->conn = xup->unp_conn;
886                 faddr->firstref = xup->xu_firstref;
887                 faddr->nextref = xup->xu_nextref;
888                 laddr->next = NULL;
889                 faddr->next = NULL;
890                 sock->laddr = laddr;
891                 sock->faddr = faddr;
892                 RB_INSERT(socks_t, &socks, sock);
893                 RB_INSERT(pcbs_t, &pcbs, sock);
894         }
895 out:
896         free(buf);
897 }
898
899 static void
900 getfiles(void)
901 {
902         struct xfile *xfiles;
903         size_t len, olen;
904
905         olen = len = sizeof(*xfiles);
906         if ((xfiles = malloc(len)) == NULL)
907                 err(1, "malloc()");
908         while (cap_sysctlbyname(capsysctl, "kern.file", xfiles, &len, 0, 0)
909             == -1) {
910                 if (errno != ENOMEM || len != olen)
911                         err(1, "cap_sysctlbyname()");
912                 olen = len *= 2;
913                 if ((xfiles = realloc(xfiles, len)) == NULL)
914                         err(1, "realloc()");
915         }
916         if (len > 0)
917                 enforce_ksize(xfiles->xf_size, struct xfile);
918         nfiles = len / sizeof(*xfiles);
919
920         if ((files = malloc(nfiles * sizeof(struct file))) == NULL)
921                 err(1, "malloc()");
922
923         for (int i = 0; i < nfiles; i++) {
924                 files[i].xf_data = xfiles[i].xf_data;
925                 files[i].xf_pid = xfiles[i].xf_pid;
926                 files[i].xf_uid = xfiles[i].xf_uid;
927                 files[i].xf_fd = xfiles[i].xf_fd;
928                 RB_INSERT(files_t, &ftree, &files[i]);
929         }
930
931         free(xfiles);
932 }
933
934 static int
935 printaddr(struct sockaddr_storage *ss)
936 {
937         struct sockaddr_un *sun;
938         char addrstr[NI_MAXHOST] = { '\0', '\0' };
939         int error, off, port = 0;
940
941         switch (ss->ss_family) {
942         case AF_INET:
943                 if (sstosin(ss)->sin_addr.s_addr == INADDR_ANY)
944                         addrstr[0] = '*';
945                 port = ntohs(sstosin(ss)->sin_port);
946                 break;
947         case AF_INET6:
948                 if (IN6_IS_ADDR_UNSPECIFIED(&sstosin6(ss)->sin6_addr))
949                         addrstr[0] = '*';
950                 port = ntohs(sstosin6(ss)->sin6_port);
951                 break;
952         case AF_UNIX:
953                 sun = sstosun(ss);
954                 off = (int)((char *)&sun->sun_path - (char *)sun);
955                 return (xprintf("%.*s", sun->sun_len - off, sun->sun_path));
956         }
957         if (addrstr[0] == '\0') {
958                 error = cap_getnameinfo(capnet, sstosa(ss), ss->ss_len,
959                     addrstr, sizeof(addrstr), NULL, 0, NI_NUMERICHOST);
960                 if (error)
961                         errx(1, "cap_getnameinfo()");
962         }
963         if (port == 0)
964                 return xprintf("%s:*", addrstr);
965         else
966                 return xprintf("%s:%d", addrstr, port);
967 }
968
969 static const char *
970 getprocname(pid_t pid)
971 {
972         static struct kinfo_proc proc;
973         size_t len;
974         int mib[4];
975
976         mib[0] = CTL_KERN;
977         mib[1] = KERN_PROC;
978         mib[2] = KERN_PROC_PID;
979         mib[3] = (int)pid;
980         len = sizeof(proc);
981         if (cap_sysctl(capsysctl, mib, nitems(mib), &proc, &len, NULL, 0)
982             == -1) {
983                 /* Do not warn if the process exits before we get its name. */
984                 if (errno != ESRCH)
985                         warn("cap_sysctl()");
986                 return ("??");
987         }
988         return (proc.ki_comm);
989 }
990
991 static int
992 getprocjid(pid_t pid)
993 {
994         static struct kinfo_proc proc;
995         size_t len;
996         int mib[4];
997
998         mib[0] = CTL_KERN;
999         mib[1] = KERN_PROC;
1000         mib[2] = KERN_PROC_PID;
1001         mib[3] = (int)pid;
1002         len = sizeof(proc);
1003         if (cap_sysctl(capsysctl, mib, nitems(mib), &proc, &len, NULL, 0)
1004             == -1) {
1005                 /* Do not warn if the process exits before we get its jid. */
1006                 if (errno != ESRCH)
1007                         warn("cap_sysctl()");
1008                 return (-1);
1009         }
1010         return (proc.ki_jid);
1011 }
1012
1013 static int
1014 check_ports(struct sock *s)
1015 {
1016         int port;
1017         struct addr *addr;
1018
1019         if (ports == NULL)
1020                 return (1);
1021         if ((s->family != AF_INET) && (s->family != AF_INET6))
1022                 return (1);
1023         for (addr = s->laddr; addr != NULL; addr = addr->next) {
1024                 if (s->family == AF_INET)
1025                         port = ntohs(sstosin(&addr->address)->sin_port);
1026                 else
1027                         port = ntohs(sstosin6(&addr->address)->sin6_port);
1028                 if (CHK_PORT(port))
1029                         return (1);
1030         }
1031         for (addr = s->faddr; addr != NULL; addr = addr->next) {
1032                 if (s->family == AF_INET)
1033                         port = ntohs(sstosin(&addr->address)->sin_port);
1034                 else
1035                         port = ntohs(sstosin6(&addr->address)->sin6_port);
1036                 if (CHK_PORT(port))
1037                         return (1);
1038         }
1039         return (0);
1040 }
1041
1042 static const char *
1043 sctp_conn_state(int state)
1044 {
1045         switch (state) {
1046         case SCTP_CLOSED:
1047                 return "CLOSED";
1048                 break;
1049         case SCTP_BOUND:
1050                 return "BOUND";
1051                 break;
1052         case SCTP_LISTEN:
1053                 return "LISTEN";
1054                 break;
1055         case SCTP_COOKIE_WAIT:
1056                 return "COOKIE_WAIT";
1057                 break;
1058         case SCTP_COOKIE_ECHOED:
1059                 return "COOKIE_ECHOED";
1060                 break;
1061         case SCTP_ESTABLISHED:
1062                 return "ESTABLISHED";
1063                 break;
1064         case SCTP_SHUTDOWN_SENT:
1065                 return "SHUTDOWN_SENT";
1066                 break;
1067         case SCTP_SHUTDOWN_RECEIVED:
1068                 return "SHUTDOWN_RECEIVED";
1069                 break;
1070         case SCTP_SHUTDOWN_ACK_SENT:
1071                 return "SHUTDOWN_ACK_SENT";
1072                 break;
1073         case SCTP_SHUTDOWN_PENDING:
1074                 return "SHUTDOWN_PENDING";
1075                 break;
1076         default:
1077                 return "UNKNOWN";
1078                 break;
1079         }
1080 }
1081
1082 static const char *
1083 sctp_path_state(int state)
1084 {
1085         switch (state) {
1086         case SCTP_UNCONFIRMED:
1087                 return "UNCONFIRMED";
1088                 break;
1089         case SCTP_ACTIVE:
1090                 return "ACTIVE";
1091                 break;
1092         case SCTP_INACTIVE:
1093                 return "INACTIVE";
1094                 break;
1095         default:
1096                 return "UNKNOWN";
1097                 break;
1098         }
1099 }
1100
1101 static void
1102 displaysock(struct sock *s, int pos)
1103 {
1104         int first, offset;
1105         struct addr *laddr, *faddr;
1106
1107         while (pos < 30)
1108                 pos += xprintf(" ");
1109         pos += xprintf("%s", s->protoname);
1110         if (s->vflag & INP_IPV4)
1111                 pos += xprintf("4");
1112         if (s->vflag & INP_IPV6)
1113                 pos += xprintf("6");
1114         if (s->vflag & (INP_IPV4 | INP_IPV6))
1115                 pos += xprintf(" ");
1116         laddr = s->laddr;
1117         faddr = s->faddr;
1118         first = 1;
1119         while (laddr != NULL || faddr != NULL) {
1120                 offset = 37;
1121                 while (pos < offset)
1122                         pos += xprintf(" ");
1123                 switch (s->family) {
1124                 case AF_INET:
1125                 case AF_INET6:
1126                         if (laddr != NULL) {
1127                                 pos += printaddr(&laddr->address);
1128                                 if (s->family == AF_INET6 && pos >= 58)
1129                                         pos += xprintf(" ");
1130                         }
1131                         offset += opt_w ? 46 : 22;
1132                         while (pos < offset)
1133                                 pos += xprintf(" ");
1134                         if (faddr != NULL)
1135                                 pos += printaddr(&faddr->address);
1136                         offset += opt_w ? 46 : 22;
1137                         break;
1138                 case AF_UNIX:
1139                         if ((laddr == NULL) || (faddr == NULL))
1140                                 errx(1, "laddr = %p or faddr = %p is NULL",
1141                                     (void *)laddr, (void *)faddr);
1142                         if (laddr->address.ss_len == 0 && faddr->conn == 0) {
1143                                 pos += xprintf("(not connected)");
1144                                 offset += opt_w ? 92 : 44;
1145                                 break;
1146                         }
1147                         /* Local bind(2) address, if any. */
1148                         if (laddr->address.ss_len > 0)
1149                                 pos += printaddr(&laddr->address);
1150                         /* Remote peer we connect(2) to, if any. */
1151                         if (faddr->conn != 0) {
1152                                 struct sock *p;
1153
1154                                 pos += xprintf("%s-> ",
1155                                     laddr->address.ss_len > 0 ? " " : "");
1156                                 p = RB_FIND(pcbs_t, &pcbs,
1157                                     &(struct sock){ .pcb = faddr->conn });
1158                                 if (__predict_false(p == NULL)) {
1159                                         /* XXGL: can this happen at all? */
1160                                         pos += xprintf("??");
1161                                 }  else if (p->laddr->address.ss_len == 0) {
1162                                         struct file *f;
1163
1164                                         f = RB_FIND(files_t, &ftree,
1165                                             &(struct file){ .xf_data =
1166                                             p->socket });
1167                                         pos += xprintf("[%lu %d]",
1168                                             (u_long)f->xf_pid, f->xf_fd);
1169                                 } else
1170                                         pos += printaddr(&p->laddr->address);
1171                         }
1172                         /* Remote peer(s) connect(2)ed to us, if any. */
1173                         if (faddr->firstref != 0) {
1174                                 struct sock *p;
1175                                 struct file *f;
1176                                 kvaddr_t ref = faddr->firstref;
1177                                 bool fref = true;
1178
1179                                 pos += xprintf(" <- ");
1180
1181                                 while ((p = RB_FIND(pcbs_t, &pcbs,
1182                                     &(struct sock){ .pcb = ref })) != 0) {
1183                                         f = RB_FIND(files_t, &ftree,
1184                                             &(struct file){ .xf_data =
1185                                             p->socket });
1186                                         pos += xprintf("%s[%lu %d]",
1187                                             fref ? "" : ",",
1188                                             (u_long)f->xf_pid, f->xf_fd);
1189                                         ref = p->faddr->nextref;
1190                                         fref = false;
1191                                 }
1192                         }
1193                         offset += opt_w ? 92 : 44;
1194                         break;
1195                 default:
1196                         abort();
1197                 }
1198                 if (opt_i) {
1199                         if (s->proto == IPPROTO_TCP ||
1200                             s->proto == IPPROTO_UDP) {
1201                                 while (pos < offset)
1202                                         pos += xprintf(" ");
1203                                 pos += xprintf("%" PRIu64, s->inp_gencnt);
1204                         }
1205                         offset += 9;
1206                 }
1207                 if (opt_U) {
1208                         if (faddr != NULL &&
1209                             ((s->proto == IPPROTO_SCTP &&
1210                               s->state != SCTP_CLOSED &&
1211                               s->state != SCTP_BOUND &&
1212                               s->state != SCTP_LISTEN) ||
1213                              (s->proto == IPPROTO_TCP &&
1214                               s->state != TCPS_CLOSED &&
1215                               s->state != TCPS_LISTEN))) {
1216                                 while (pos < offset)
1217                                         pos += xprintf(" ");
1218                                 pos += xprintf("%u",
1219                                     ntohs(faddr->encaps_port));
1220                         }
1221                         offset += 7;
1222                 }
1223                 if (opt_s) {
1224                         if (faddr != NULL &&
1225                             s->proto == IPPROTO_SCTP &&
1226                             s->state != SCTP_CLOSED &&
1227                             s->state != SCTP_BOUND &&
1228                             s->state != SCTP_LISTEN) {
1229                                 while (pos < offset)
1230                                         pos += xprintf(" ");
1231                                 pos += xprintf("%s",
1232                                     sctp_path_state(faddr->state));
1233                         }
1234                         offset += 13;
1235                 }
1236                 if (first) {
1237                         if (opt_s) {
1238                                 if (s->proto == IPPROTO_SCTP ||
1239                                     s->proto == IPPROTO_TCP) {
1240                                         while (pos < offset)
1241                                                 pos += xprintf(" ");
1242                                         switch (s->proto) {
1243                                         case IPPROTO_SCTP:
1244                                                 pos += xprintf("%s",
1245                                                     sctp_conn_state(s->state));
1246                                                 break;
1247                                         case IPPROTO_TCP:
1248                                                 if (s->state >= 0 &&
1249                                                     s->state < TCP_NSTATES)
1250                                                         pos += xprintf("%s",
1251                                                             tcpstates[s->state]);
1252                                                 else
1253                                                         pos += xprintf("?");
1254                                                 break;
1255                                         }
1256                                 }
1257                                 offset += 13;
1258                         }
1259                         if (opt_S) {
1260                                 if (s->proto == IPPROTO_TCP) {
1261                                         while (pos < offset)
1262                                                 pos += xprintf(" ");
1263                                         pos += xprintf("%.*s",
1264                                             TCP_FUNCTION_NAME_LEN_MAX,
1265                                             s->stack);
1266                                 }
1267                                 offset += TCP_FUNCTION_NAME_LEN_MAX + 1;
1268                         }
1269                         if (opt_C) {
1270                                 if (s->proto == IPPROTO_TCP) {
1271                                         while (pos < offset)
1272                                                 pos += xprintf(" ");
1273                                         xprintf("%.*s", TCP_CA_NAME_MAX, s->cc);
1274                                 }
1275                                 offset += TCP_CA_NAME_MAX + 1;
1276                         }
1277                 }
1278                 if (laddr != NULL)
1279                         laddr = laddr->next;
1280                 if (faddr != NULL)
1281                         faddr = faddr->next;
1282                 if ((laddr != NULL) || (faddr != NULL)) {
1283                         xprintf("\n");
1284                         pos = 0;
1285                 }
1286                 first = 0;
1287         }
1288         xprintf("\n");
1289 }
1290
1291 static void
1292 display(void)
1293 {
1294         struct passwd *pwd;
1295         struct file *xf;
1296         struct sock *s;
1297         int n, pos;
1298
1299         if (opt_q != 1) {
1300                 printf("%-8s %-10s %-5s %-3s %-6s %-*s %-*s",
1301                     "USER", "COMMAND", "PID", "FD", "PROTO",
1302                     opt_w ? 45 : 21, "LOCAL ADDRESS",
1303                     opt_w ? 45 : 21, "FOREIGN ADDRESS");
1304                 if (opt_i)
1305                         printf(" %-8s", "ID");
1306                 if (opt_U)
1307                         printf(" %-6s", "ENCAPS");
1308                 if (opt_s) {
1309                         printf(" %-12s", "PATH STATE");
1310                         printf(" %-12s", "CONN STATE");
1311                 }
1312                 if (opt_S)
1313                         printf(" %-*.*s", TCP_FUNCTION_NAME_LEN_MAX,
1314                             TCP_FUNCTION_NAME_LEN_MAX, "STACK");
1315                 if (opt_C)
1316                         printf(" %-.*s", TCP_CA_NAME_MAX, "CC");
1317                 printf("\n");
1318         }
1319         cap_setpassent(cappwd, 1);
1320         for (xf = files, n = 0; n < nfiles; ++n, ++xf) {
1321                 if (xf->xf_data == 0)
1322                         continue;
1323                 if (opt_j >= 0 && opt_j != getprocjid(xf->xf_pid))
1324                         continue;
1325                 s = RB_FIND(socks_t, &socks,
1326                     &(struct sock){ .socket = xf->xf_data});
1327                 if (s != NULL && check_ports(s)) {
1328                         s->shown = 1;
1329                         pos = 0;
1330                         if (opt_n ||
1331                             (pwd = cap_getpwuid(cappwd, xf->xf_uid)) == NULL)
1332                                 pos += xprintf("%lu ", (u_long)xf->xf_uid);
1333                         else
1334                                 pos += xprintf("%s ", pwd->pw_name);
1335                         while (pos < 9)
1336                                 pos += xprintf(" ");
1337                         pos += xprintf("%.10s", getprocname(xf->xf_pid));
1338                         while (pos < 20)
1339                                 pos += xprintf(" ");
1340                         pos += xprintf("%5lu ", (u_long)xf->xf_pid);
1341                         while (pos < 26)
1342                                 pos += xprintf(" ");
1343                         pos += xprintf("%-3d ", xf->xf_fd);
1344                         displaysock(s, pos);
1345                 }
1346         }
1347         if (opt_j >= 0)
1348                 return;
1349         SLIST_FOREACH(s, &nosocks, socket_list) {
1350                 if (!check_ports(s))
1351                         continue;
1352                 pos = xprintf("%-8s %-10s %-5s %-2s ",
1353                     "?", "?", "?", "?");
1354                 displaysock(s, pos);
1355         }
1356         RB_FOREACH(s, socks_t, &socks) {
1357                 if (s->shown)
1358                         continue;
1359                 if (!check_ports(s))
1360                         continue;
1361                 pos = xprintf("%-8s %-10s %-5s %-2s ",
1362                     "?", "?", "?", "?");
1363                 displaysock(s, pos);
1364         }
1365 }
1366
1367 static int
1368 set_default_protos(void)
1369 {
1370         struct protoent *prot;
1371         const char *pname;
1372         size_t pindex;
1373
1374         init_protos(default_numprotos);
1375
1376         for (pindex = 0; pindex < default_numprotos; pindex++) {
1377                 pname = default_protos[pindex];
1378                 prot = cap_getprotobyname(capnetdb, pname);
1379                 if (prot == NULL)
1380                         err(1, "cap_getprotobyname: %s", pname);
1381                 protos[pindex] = prot->p_proto;
1382         }
1383         numprotos = pindex;
1384         return (pindex);
1385 }
1386
1387 /*
1388  * Return the vnet property of the jail, or -1 on error.
1389  */
1390 static int
1391 jail_getvnet(int jid)
1392 {
1393         struct iovec jiov[6];
1394         int vnet;
1395         size_t len = sizeof(vnet);
1396
1397         if (sysctlbyname("kern.features.vimage", &vnet, &len, NULL, 0) != 0)
1398                 return (0);
1399
1400         vnet = -1;
1401         jiov[0].iov_base = __DECONST(char *, "jid");
1402         jiov[0].iov_len = sizeof("jid");
1403         jiov[1].iov_base = &jid;
1404         jiov[1].iov_len = sizeof(jid);
1405         jiov[2].iov_base = __DECONST(char *, "vnet");
1406         jiov[2].iov_len = sizeof("vnet");
1407         jiov[3].iov_base = &vnet;
1408         jiov[3].iov_len = sizeof(vnet);
1409         jiov[4].iov_base = __DECONST(char *, "errmsg");
1410         jiov[4].iov_len = sizeof("errmsg");
1411         jiov[5].iov_base = jail_errmsg;
1412         jiov[5].iov_len = JAIL_ERRMSGLEN;
1413         jail_errmsg[0] = '\0';
1414         if (jail_get(jiov, nitems(jiov), 0) < 0) {
1415                 if (!jail_errmsg[0])
1416                         snprintf(jail_errmsg, JAIL_ERRMSGLEN,
1417                             "jail_get: %s", strerror(errno));
1418                 return (-1);
1419         }
1420         return (vnet);
1421 }
1422
1423 static void
1424 usage(void)
1425 {
1426         fprintf(stderr,
1427             "usage: sockstat [-46CciLlnqSsUuvw] [-j jid] [-p ports] [-P protocols]\n");
1428         exit(1);
1429 }
1430
1431 int
1432 main(int argc, char *argv[])
1433 {
1434         cap_channel_t *capcas;
1435         cap_net_limit_t *limit;
1436         const char *pwdcmds[] = { "setpassent", "getpwuid" };
1437         const char *pwdfields[] = { "pw_name" };
1438         int protos_defined = -1;
1439         int o, i;
1440
1441         opt_j = -1;
1442         while ((o = getopt(argc, argv, "46Ccij:Llnp:P:qSsUuvw")) != -1)
1443                 switch (o) {
1444                 case '4':
1445                         opt_4 = 1;
1446                         break;
1447                 case '6':
1448                         opt_6 = 1;
1449                         break;
1450                 case 'C':
1451                         opt_C = 1;
1452                         break;
1453                 case 'c':
1454                         opt_c = 1;
1455                         break;
1456                 case 'i':
1457                         opt_i = 1;
1458                         break;
1459                 case 'j':
1460                         opt_j = jail_getid(optarg);
1461                         if (opt_j < 0)
1462                                 errx(1, "jail_getid: %s", jail_errmsg);
1463                         break;
1464                 case 'L':
1465                         opt_L = 1;
1466                         break;
1467                 case 'l':
1468                         opt_l = 1;
1469                         break;
1470                 case 'n':
1471                         opt_n = 1;
1472                         break;
1473                 case 'p':
1474                         parse_ports(optarg);
1475                         break;
1476                 case 'P':
1477                         protos_defined = parse_protos(optarg);
1478                         break;
1479                 case 'q':
1480                         opt_q = 1;
1481                         break;
1482                 case 'S':
1483                         opt_S = 1;
1484                         break;
1485                 case 's':
1486                         opt_s = 1;
1487                         break;
1488                 case 'U':
1489                         opt_U = 1;
1490                         break;
1491                 case 'u':
1492                         opt_u = 1;
1493                         break;
1494                 case 'v':
1495                         ++opt_v;
1496                         break;
1497                 case 'w':
1498                         opt_w = 1;
1499                         break;
1500                 default:
1501                         usage();
1502                 }
1503
1504         argc -= optind;
1505         argv += optind;
1506
1507         if (argc > 0)
1508                 usage();
1509
1510         if (opt_j > 0) {
1511                 switch (jail_getvnet(opt_j)) {
1512                 case -1:
1513                         errx(2, "jail_getvnet: %s", jail_errmsg);
1514                 case JAIL_SYS_NEW:
1515                         if (jail_attach(opt_j) < 0)
1516                                 err(3, "jail_attach()");
1517                         /* Set back to -1 for normal output in vnet jail. */
1518                         opt_j = -1;
1519                         break;
1520                 default:
1521                         break;
1522                 }
1523         }
1524
1525         capcas = cap_init();
1526         if (capcas == NULL)
1527                 err(1, "Unable to contact Casper");
1528         if (caph_enter_casper() < 0)
1529                 err(1, "Unable to enter capability mode");
1530         capnet = cap_service_open(capcas, "system.net");
1531         if (capnet == NULL)
1532                 err(1, "Unable to open system.net service");
1533         capnetdb = cap_service_open(capcas, "system.netdb");
1534         if (capnetdb == NULL)
1535                 err(1, "Unable to open system.netdb service");
1536         capsysctl = cap_service_open(capcas, "system.sysctl");
1537         if (capsysctl == NULL)
1538                 err(1, "Unable to open system.sysctl service");
1539         cappwd = cap_service_open(capcas, "system.pwd");
1540         if (cappwd == NULL)
1541                 err(1, "Unable to open system.pwd service");
1542         cap_close(capcas);
1543         limit = cap_net_limit_init(capnet, CAPNET_ADDR2NAME);
1544         if (limit == NULL)
1545                 err(1, "Unable to init cap_net limits");
1546         if (cap_net_limit(limit) < 0)
1547                 err(1, "Unable to apply limits");
1548         if (cap_pwd_limit_cmds(cappwd, pwdcmds, nitems(pwdcmds)) < 0)
1549                 err(1, "Unable to apply pwd commands limits");
1550         if (cap_pwd_limit_fields(cappwd, pwdfields, nitems(pwdfields)) < 0)
1551                 err(1, "Unable to apply pwd commands limits");
1552
1553         if ((!opt_4 && !opt_6) && protos_defined != -1)
1554                 opt_4 = opt_6 = 1;
1555         if (!opt_4 && !opt_6 && !opt_u)
1556                 opt_4 = opt_6 = opt_u = 1;
1557         if ((opt_4 || opt_6) && protos_defined == -1)
1558                 protos_defined = set_default_protos();
1559         if (!opt_c && !opt_l)
1560                 opt_c = opt_l = 1;
1561
1562         if (opt_4 || opt_6) {
1563                 for (i = 0; i < protos_defined; i++)
1564                         if (protos[i] == IPPROTO_SCTP)
1565                                 gather_sctp();
1566                         else
1567                                 gather_inet(protos[i]);
1568         }
1569
1570         if (opt_u || (protos_defined == -1 && !opt_4 && !opt_6)) {
1571                 gather_unix(SOCK_STREAM);
1572                 gather_unix(SOCK_DGRAM);
1573                 gather_unix(SOCK_SEQPACKET);
1574         }
1575         getfiles();
1576         display();
1577         exit(0);
1578 }