#!/usr/bin/ksh
#
# tcpsnoop - snoop TCP network packets by process.
# Written using DTrace (Solaris 10 3/05)
#
# This analyses TCP network packets and prints the responsible PID and UID,
# plus standard details such as IP address and port. This captures traffic
# of newly created TCP connections that were established while this program
# was running. It can help identify which processes is causing TCP traffic.
#
# WARNING: This script may only work on Solaris 10 3/05, since it uses the
# fbt provider to trace the raw operation of a specific version of the kernel.
# In the future, a 'stable' network provider should exist which will allow
# this to be written for that and subsequent versions of the kernel. In the
# meantime, check for other versions of this script in the /Net directory,
# and read the Notes/ALLfbt_notes.txt for more background on fbt.
#
# $Id: tcpsnoop 69 2007-10-04 13:40:00Z brendan $
#
# USAGE: tcpsnoop [-a|hjsvZ] [-n name] [-p pid]
#
# -a # print all data
# -j # print project ID
# -s # print time, us
# -v # print time, string
# -Z # print zone ID
# -n name # command name to snoop
# -p pid # PID to snoop
# eg,
# tcpsnoop -v # human readable timestamps
# tcpsnoop -Z # print zonename
# tcpsnoop -n sshd # snoop sshd traffic only
#
# FIELDS:
# UID user ID
# PID process ID
# CMD command
# LADDR local IP address
# RADDR remote IP address
# LPORT local port number
# RPORT remote port number
# DR direction
# SIZE packet size, bytes
# TIME timestamp, us
# STRTIME human readable timestamp, string
# ZONE zone ID
# PROJ project ID
#
# SEE ALSO: snoop -rS
#
# COPYRIGHT: Copyright (c) 2005, 2006 Brendan Gregg.
#
# CDDL HEADER START
#
# The contents of this file are subject to the terms of the
# Common Development and Distribution License, Version 1.0 only
# (the "License"). You may not use this file except in compliance
# with the License.
#
# You can obtain a copy of the license at Docs/cddl1.txt
# or http://www.opensolaris.org/os/licensing.
# See the License for the specific language governing permissions
# and limitations under the License.
#
# CDDL HEADER END
#
# Author: Brendan Gregg [Sydney, Australia]
#
# TODO: IPv6
#
# CODE:
# The FILTER syntax matches on packets rather than initial
# connections, so that it can follow inetd connections properly.
#
# 09-Jul-2004 Brendan Gregg Created this.
# 12-Mar-2005 " " Changed probes, size info now printed.
# 02-Jul-2005 " " Many more probes. Renamed "tcpsnoop.d".
# 04-Jul-2005 " " Now wrapped in shell, called "tcpsnoop".
# 03-Dec-2005 " " Fixed tcp_accept_finish bug, now 100% correct
# execname. Thanks Kias Belgaied for expertise.
# 20-Apr-2006 " " Fixed SS_TCP_FAST_ACCEPT bug in build 31+.
# 20-Apr-2006 " " Last update.
#
##############################
# --- Process Arguments ---
#
### default variables
opt_name=0; opt_time=0; opt_timestr=0; filter=0; pname=.
opt_zone=0; opt_proj=0; opt_pid=0; pid=0
### process options
while getopts ahjsvZn:p: name
do
case $name in
a) opt_time=1; opt_timestr=1; opt_zone=1; opt_proj=1 ;;
n) opt_name=1; pname=$OPTARG ;;
p) opt_pid=1; pid=$OPTARG ;;
j) opt_proj=1 ;;
s) opt_time=1 ;;
v) opt_timestr=1 ;;
Z) opt_zone=1 ;;
h|?) cat <<-END >&2
USAGE: tcpsnoop [-a|hjsvZ] [-n name] [-p pid]
tcpsnoop # default output
-a # print all data
-j # print project ID
-s # print start time, us
-v # print start time, string
-Z # print zonename
-n name # command name to snoop
-p pid # PID to snoop
eg,
tcpsnoop -v # human readable timestamps
tcpsnoop -Z # print zonename
tcpsnoop -n sshd # snoop sshd traffic only
END
exit 1
esac
done
### option logic
if (( opt_name || opt_pid )); then
filter=1
fi
#################################
# --- Main Program, DTrace ---
#
/usr/sbin/dtrace -Cs <( print -r '
/*
* Command line arguments
*/
inline int OPT_name = '$opt_name';
inline int OPT_pid = '$opt_pid';
inline int OPT_time = '$opt_time';
inline int OPT_timestr = '$opt_timestr';
inline int OPT_zone = '$opt_zone';
inline int OPT_proj = '$opt_proj';
inline int PID = '$pid';
inline int FILTER = '$filter';
inline string NAME = "'$pname'";
#pragma D option quiet
#pragma D option switchrate=10hz
#include <sys/file.h>
#include <inet/common.h>
#include <sys/byteorder.h>
#include <sys/socket.h>
#include <sys/socketvar.h>
/*
* Print header
*/
dtrace:::BEGIN
{
/* print optional headers */
OPT_time ? printf("%-14s ", "TIME") : 1;
OPT_timestr ? printf("%-20s ", "STRTIME") : 1;
OPT_zone ? printf("%4s ", "ZONE") : 1;
OPT_proj ? printf("%4s ", "PROJ") : 1;
/* print main headers */
printf("%5s %6s %-15s %5s %2s %-15s %5s %5s %s\n",
"UID", "PID", "LADDR", "LPORT", "DR", "RADDR", "RPORT",
"SIZE", "CMD");
}
/*
* TCP Process inbound connections
*
* 0x00200000 has been hardcoded. It was SS_TCP_FAST_ACCEPT, but was
* renamed to SS_DIRECT around build 31.
*/
fbt:sockfs:sotpi_accept:entry
/(arg1 & FREAD) && (arg1 & FWRITE) && (args[0]->so_state & 0x00200000)/
{
self->sop = args[0];
}
fbt:sockfs:sotpi_create:return
/self->sop/
{
self->nsop = (struct sonode *)arg1;
}
fbt:sockfs:sotpi_accept:return
/self->nsop/
{
this->tcpp = (tcp_t *)self->nsop->so_priv;
self->connp = (conn_t *)this->tcpp->tcp_connp;
tname[(int)self->connp] = execname;
tpid[(int)self->connp] = pid;
tuid[(int)self->connp] = uid;
}
fbt:sockfs:sotpi_accept:return
{
self->nsop = 0;
self->sop = 0;
}
/*
* TCP Process outbound connections
*/
fbt:ip:tcp_connect:entry
{
this->tcpp = (tcp_t *)arg0;
self->connp = (conn_t *)this->tcpp->tcp_connp;
tname[(int)self->connp] = execname;
tpid[(int)self->connp] = pid;
tuid[(int)self->connp] = uid;
OPT_proj ? tproj[(int)self->connp] = curpsinfo->pr_projid : 1;
}
/*
* TCP Data translations
*/
fbt:sockfs:sotpi_accept:return,
fbt:ip:tcp_connect:return
/self->connp/
{
/* fetch ports */
#if defined(_BIG_ENDIAN)
self->lport = self->connp->u_port.tcpu_ports.tcpu_lport;
self->fport = self->connp->u_port.tcpu_ports.tcpu_fport;
#else
self->lport = BSWAP_16(self->connp->u_port.tcpu_ports.tcpu_lport);
self->fport = BSWAP_16(self->connp->u_port.tcpu_ports.tcpu_fport);
#endif
/* fetch IPv4 addresses */
this->fad12 =
(int)self->connp->connua_v6addr.connua_faddr._S6_un._S6_u8[12];
this->fad13 =
(int)self->connp->connua_v6addr.connua_faddr._S6_un._S6_u8[13];
this->fad14 =
(int)self->connp->connua_v6addr.connua_faddr._S6_un._S6_u8[14];
this->fad15 =
(int)self->connp->connua_v6addr.connua_faddr._S6_un._S6_u8[15];
this->lad12 =
(int)self->connp->connua_v6addr.connua_laddr._S6_un._S6_u8[12];
this->lad13 =
(int)self->connp->connua_v6addr.connua_laddr._S6_un._S6_u8[13];
this->lad14 =
(int)self->connp->connua_v6addr.connua_laddr._S6_un._S6_u8[14];
this->lad15 =
(int)self->connp->connua_v6addr.connua_laddr._S6_un._S6_u8[15];
/* convert type for use with lltostr() */
this->fad12 = this->fad12 < 0 ? 256 + this->fad12 : this->fad12;
this->fad13 = this->fad13 < 0 ? 256 + this->fad13 : this->fad13;
this->fad14 = this->fad14 < 0 ? 256 + this->fad14 : this->fad14;
this->fad15 = this->fad15 < 0 ? 256 + this->fad15 : this->fad15;
this->lad12 = this->lad12 < 0 ? 256 + this->lad12 : this->lad12;
this->lad13 = this->lad13 < 0 ? 256 + this->lad13 : this->lad13;
this->lad14 = this->lad14 < 0 ? 256 + this->lad14 : this->lad14;
this->lad15 = this->lad15 < 0 ? 256 + this->lad15 : this->lad15;
/* stringify addresses */
self->faddr = strjoin(lltostr(this->fad12), ".");
self->faddr = strjoin(self->faddr, strjoin(lltostr(this->fad13), "."));
self->faddr = strjoin(self->faddr, strjoin(lltostr(this->fad14), "."));
self->faddr = strjoin(self->faddr, lltostr(this->fad15 + 0));
self->laddr = strjoin(lltostr(this->lad12), ".");
self->laddr = strjoin(self->laddr, strjoin(lltostr(this->lad13), "."));
self->laddr = strjoin(self->laddr, strjoin(lltostr(this->lad14), "."));
self->laddr = strjoin(self->laddr, lltostr(this->lad15 + 0));
/* fix direction and save values */
tladdr[(int)self->connp] = self->laddr;
tfaddr[(int)self->connp] = self->faddr;
tlport[(int)self->connp] = self->lport;
tfport[(int)self->connp] = self->fport;
/* all systems go */
tok[(int)self->connp] = 1;
}
/*
* TCP Clear connp
*/
fbt:ip:tcp_get_conn:return
{
/* Q_TO_CONN */
this->connp = (conn_t *)arg1;
tok[(int)this->connp] = 0;
tpid[(int)this->connp] = 0;
tuid[(int)this->connp] = 0;
tname[(int)this->connp] = 0;
tproj[(int)this->connp] = 0;
}
/*
* TCP Process "port closed"
*/
fbt:ip:tcp_xmit_early_reset:entry
/FILTER == 0/
{
this->queuep = (queue_t *)`tcp_g_q; /* ` */
this->connp = (conn_t *)this->queuep->q_ptr;
this->tcpp = (tcp_t *)this->connp->conn_tcp;
self->zoneid = this->connp->conn_zoneid;
/* split addresses */
this->ipha = (ipha_t *)args[1]->b_rptr;
this->fad15 = (this->ipha->ipha_src & 0xff000000) >> 24;
this->fad14 = (this->ipha->ipha_src & 0x00ff0000) >> 16;
this->fad13 = (this->ipha->ipha_src & 0x0000ff00) >> 8;
this->fad12 = (this->ipha->ipha_src & 0x000000ff);
this->lad15 = (this->ipha->ipha_dst & 0xff000000) >> 24;
this->lad14 = (this->ipha->ipha_dst & 0x00ff0000) >> 16;
this->lad13 = (this->ipha->ipha_dst & 0x0000ff00) >> 8;
this->lad12 = (this->ipha->ipha_dst & 0x000000ff);
/* stringify addresses */
self->faddr = strjoin(lltostr(this->fad12), ".");
self->faddr = strjoin(self->faddr, strjoin(lltostr(this->fad13), "."));
self->faddr = strjoin(self->faddr, strjoin(lltostr(this->fad14), "."));
self->faddr = strjoin(self->faddr, lltostr(this->fad15 + 0));
self->laddr = strjoin(lltostr(this->lad12), ".");
self->laddr = strjoin(self->laddr, strjoin(lltostr(this->lad13), "."));
self->laddr = strjoin(self->laddr, strjoin(lltostr(this->lad14), "."));
self->laddr = strjoin(self->laddr, lltostr(this->lad15 + 0));
self->reset = 1;
}
/*
* TCP Fetch "port closed" ports
*/
fbt:ip:tcp_xchg:entry
/self->reset/
{
#if defined(_BIG_ENDIAN)
self->lport = (uint16_t)arg0;
self->fport = (uint16_t)arg1;
#else
self->lport = BSWAP_16((uint16_t)arg0);
self->fport = BSWAP_16((uint16_t)arg1);
#endif
self->lport = BE16_TO_U16(arg0);
self->fport = BE16_TO_U16(arg1);
}
/*
* TCP Print "port closed"
*/
fbt:ip:tcp_xmit_early_reset:return
/FILTER == 0/
{
self->name = "<closed>";
self->pid = 0;
self->uid = 0;
self->proj = 0;
self->size = 54; /* should check trailers */
self->dir = "<-";
OPT_time ? printf("%-14d ", timestamp/1000) : 1;
OPT_timestr ? printf("%-20Y ", walltimestamp) : 1;
OPT_zone ? printf("%4d ", self->zoneid) : 1;
OPT_proj ? printf("%4d ", self->proj) : 1;
printf("%5d %6d %-15s %5d %2s %-15s %5d %5d %s\n",
self->uid, self->pid, self->laddr, self->lport, self->dir,
self->faddr, self->fport, self->size, self->name);
self->dir = "->";
OPT_time ? printf("%-14d ", timestamp/1000) : 1;
OPT_timestr ? printf("%-20Y ", walltimestamp) : 1;
OPT_zone ? printf("%4d ", self->zoneid) : 1;
OPT_proj ? printf("%4d ", self->proj) : 1;
printf("%5d %6d %-15s %5d %2s %-15s %5d %5d %s\n",
self->uid, self->pid, self->laddr, self->lport, self->dir,
self->faddr, self->fport, self->size, self->name);
self->reset = 0;
self->size = 0;
self->name = 0;
self->zoneid = 0;
}
/*
* TCP Process Write
*/
fbt:ip:tcp_send_data:entry
{
self->conn_p = (conn_t *)args[0]->tcp_connp;
}
fbt:ip:tcp_send_data:entry
/tok[(int)self->conn_p]/
{
self->dir = "->";
self->size = msgdsize(args[2]) + 14; /* should check trailers */
self->uid = tuid[(int)self->conn_p];
self->laddr = tladdr[(int)self->conn_p];
self->faddr = tfaddr[(int)self->conn_p];
self->lport = tlport[(int)self->conn_p];
self->fport = tfport[(int)self->conn_p];
OPT_proj ? self->proj = tproj[(int)self->conn_p] : 1;
self->zoneid = self->conn_p->conn_zoneid;
self->ok = 2;
/* follow inetd -> in.* transitions */
self->name = pid && (tname[(int)self->conn_p] == "inetd") ?
execname : tname[(int)self->conn_p];
self->pid = pid && (tname[(int)self->conn_p] == "inetd") ?
pid : tpid[(int)self->conn_p];
tname[(int)self->conn_p] = self->name;
tpid[(int)self->conn_p] = self->pid;
}
/*
* TCP Process Read
*/
fbt:ip:tcp_rput_data:entry
{
self->conn_p = (conn_t *)arg0;
self->size = msgdsize(args[1]) + 14; /* should check trailers */
}
fbt:ip:tcp_rput_data:entry
/tok[(int)self->conn_p]/
{
self->dir = "<-";
self->uid = tuid[(int)self->conn_p];
self->laddr = tladdr[(int)self->conn_p];
self->faddr = tfaddr[(int)self->conn_p];
self->lport = tlport[(int)self->conn_p];
self->fport = tfport[(int)self->conn_p];
OPT_proj ? self->proj = tproj[(int)self->conn_p] : 1;
self->zoneid = self->conn_p->conn_zoneid;
self->ok = 2;
/* follow inetd -> in.* transitions */
self->name = pid && (tname[(int)self->conn_p] == "inetd") ?
execname : tname[(int)self->conn_p];
self->pid = pid && (tname[(int)self->conn_p] == "inetd") ?
pid : tpid[(int)self->conn_p];
tname[(int)self->conn_p] = self->name;
tpid[(int)self->conn_p] = self->pid;
}
/*
* TCP Complete printing outbound handshake
*/
fbt:ip:tcp_connect:return
/self->connp/
{
self->name = tname[(int)self->connp];
self->pid = tpid[(int)self->connp];
self->uid = tuid[(int)self->connp];
self->zoneid = self->connp->conn_zoneid;
OPT_proj ? self->proj = tproj[(int)self->connp] : 1;
self->size = 54; /* should check trailers */
self->dir = "->";
}
fbt:ip:tcp_connect:return
/(self->connp) &&
((FILTER == 0) ||
(OPT_pid && self->pid == PID) ||
(OPT_name && self->name == NAME))/
{
/* this packet occured before connp was fully established */
OPT_time ? printf("%-14d ", timestamp/1000) : 1;
OPT_timestr ? printf("%-20Y ", walltimestamp) : 1;
OPT_zone ? printf("%4d ", self->zoneid) : 1;
OPT_proj ? printf("%4d ", self->proj) : 1;
printf("%5d %6d %-15s %5d %2s %-15s %5d %5d %s\n",
self->uid, self->pid, self->laddr, self->lport, self->dir,
self->faddr, self->fport, self->size, self->name);
}
/*
* TCP Complete printing inbound handshake
*/
fbt:sockfs:sotpi_accept:return
/self->connp/
{
self->name = tname[(int)self->connp];
self->pid = tpid[(int)self->connp];
self->uid = tuid[(int)self->connp];
self->zoneid = self->connp->conn_zoneid;
OPT_proj ? self->proj = tproj[(int)self->connp] : 1;
self->size = 54; /* should check trailers */
self->dir = "<-";
}
fbt:sockfs:sotpi_accept:return
/(self->connp) &&
((FILTER == 0) ||
(OPT_pid && self->pid == PID) ||
(OPT_name && self->name == NAME))/
{
/* these packets occured before connp was fully established */
OPT_time ? printf("%-14d ", timestamp/1000) : 1;
OPT_timestr ? printf("%-20Y ", walltimestamp) : 1;
OPT_zone ? printf("%4d ", self->zoneid) : 1;
OPT_proj ? printf("%4d ", self->proj) : 1;
printf("%5d %6d %-15s %5d %2s %-15s %5d %5d %s\n",
self->uid, self->pid, self->laddr, self->lport, self->dir,
self->faddr, self->fport, self->size, self->name);
self->dir = "->";
OPT_time ? printf("%-14d ", timestamp/1000) : 1;
OPT_timestr ? printf("%-20Y ", walltimestamp) : 1;
OPT_zone ? printf("%4d ", self->zoneid) : 1;
OPT_proj ? printf("%4d ", self->proj) : 1;
printf("%5d %6d %-15s %5d %2s %-15s %5d %5d %s\n",
self->uid, self->pid, self->laddr, self->lport, self->dir,
self->faddr, self->fport, self->size, self->name);
self->dir = "<-";
OPT_time ? printf("%-14d ", timestamp/1000) : 1;
OPT_timestr ? printf("%-20Y ", walltimestamp) : 1;
OPT_zone ? printf("%4d ", self->zoneid) : 1;
OPT_proj ? printf("%4d ", self->proj) : 1;
printf("%5d %6d %-15s %5d %2s %-15s %5d %5d %s\n",
self->uid, self->pid, self->laddr, self->lport, self->dir,
self->faddr, self->fport, self->size, self->name);
}
/*
* Print output
*/
fbt:ip:tcp_send_data:entry,
fbt:ip:tcp_rput_data:entry
/(self->ok == 2) &&
((FILTER == 0) ||
(OPT_pid && self->pid == PID) ||
(OPT_name && self->name == NAME))/
{
/* print optional fields */
OPT_time ? printf("%-14d ", timestamp/1000) : 1;
OPT_timestr ? printf("%-20Y ", walltimestamp) : 1;
OPT_zone ? printf("%4d ", self->zoneid) : 1;
OPT_proj ? printf("%4d ", self->proj) : 1;
/* print output line */
printf("%5d %6d %-15s %5d %2s %-15s %5d %5d %s\n",
self->uid, self->pid, self->laddr, self->lport, self->dir,
self->faddr, self->fport, self->size, self->name);
}
/*
* TCP Clear connect variables
*/
fbt:sockfs:sotpi_accept:return,
fbt:ip:tcp_connect:return
/self->connp/
{
self->faddr = 0;
self->laddr = 0;
self->fport = 0;
self->lport = 0;
self->connp = 0;
self->name = 0;
self->pid = 0;
self->uid = 0;
}
/*
* TCP Clear r/w variables
*/
fbt:ip:tcp_send_data:entry,
fbt:ip:tcp_rput_data:entry
{
self->ok = 0;
self->dir = 0;
self->uid = 0;
self->pid = 0;
self->size = 0;
self->name = 0;
self->lport = 0;
self->fport = 0;
self->laddr = 0;
self->faddr = 0;
self->conn_p = 0;
self->zoneid = 0;
self->proj = 0;
}
')