2 * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3 * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4 * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
5 * Copyright (c) 1996-2000 Wichert Akkerman <wichert@cistron.nl>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. The name of the author may not be used to endorse or promote products
17 * derived from this software without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
20 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
21 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
23 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
24 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
33 #include <sys/socket.h>
35 #if defined(HAVE_SIN6_SCOPE_ID_LINUX)
36 # define in6_addr in6_addr_libc
37 # define ipv6_mreq ipv6_mreq_libc
38 # define sockaddr_in6 sockaddr_in6_libc
40 #include <netinet/in.h>
41 #ifdef HAVE_NETINET_TCP_H
42 # include <netinet/tcp.h>
44 #ifdef HAVE_NETINET_UDP_H
45 # include <netinet/udp.h>
47 #ifdef HAVE_NETINET_SCTP_H
48 # include <netinet/sctp.h>
50 #include <arpa/inet.h>
52 #include <asm/types.h>
53 #if defined(__GLIBC__)
54 # include <netipx/ipx.h>
56 # include <linux/ipx.h>
59 #if defined(__GLIBC__) && defined(HAVE_SIN6_SCOPE_ID_LINUX)
60 # if defined(HAVE_LINUX_IN6_H)
61 # if defined(HAVE_SIN6_SCOPE_ID_LINUX)
65 # define in6_addr in6_addr_kernel
66 # define ipv6_mreq ipv6_mreq_kernel
67 # define sockaddr_in6 sockaddr_in6_kernel
69 # include <linux/in6.h>
70 # if defined(HAVE_SIN6_SCOPE_ID_LINUX)
74 # define in6_addr in6_addr_libc
75 # define ipv6_mreq ipv6_mreq_libc
76 # define sockaddr_in6 sockaddr_in6_kernel
81 #if defined(HAVE_SYS_UIO_H)
84 #if defined(HAVE_LINUX_NETLINK_H)
85 # include <linux/netlink.h>
87 #if defined(HAVE_LINUX_IF_PACKET_H)
88 # include <linux/if_packet.h>
90 #if defined(HAVE_LINUX_ICMP_H)
91 # include <linux/icmp.h>
94 # define PF_UNSPEC AF_UNSPEC
97 static const struct xlat domains[] = {
223 const struct xlat addrfams[] = {
349 static const struct xlat socktypes[] = {
358 #ifdef SOCK_SEQPACKET
359 XLAT(SOCK_SEQPACKET),
369 static const struct xlat sock_type_flags[] = {
378 #ifndef SOCK_TYPE_MASK
379 # define SOCK_TYPE_MASK 0xf
381 static const struct xlat socketlayers[] = {
385 #if defined(SOL_ICMP)
394 #if defined(SOL_IPV6)
397 #if defined(SOL_ICMPV6)
400 #if defined(SOL_SCTP)
403 #if defined(SOL_UDPLITE)
412 #if defined(SOL_AX25)
415 #if defined(SOL_ATALK)
418 #if defined(SOL_NETROM)
421 #if defined(SOL_ROSE)
424 #if defined(SOL_DECNET)
430 #if defined(SOL_PACKET)
439 #if defined(SOL_IRDA)
442 #if defined(SOL_NETBEUI)
448 #if defined(SOL_DCCP)
451 #if defined(SOL_NETLINK)
454 #if defined(SOL_TIPC)
457 #if defined(SOL_RXRPC)
460 #if defined(SOL_PPPOL2TP)
463 #if defined(SOL_BLUETOOTH)
466 #if defined(SOL_PNPIPE)
472 #if defined(SOL_IUVC)
475 #if defined(SOL_CAIF)
478 XLAT(SOL_SOCKET), /* Never used! */
479 /* The SOL_* array should remain not NULL-terminated. */
481 /*** WARNING: DANGER WILL ROBINSON: NOTE "socketlayers" array above
482 falls into "inet_protocols" array below!!!! This is intended!!! ***/
483 static const struct xlat inet_protocols[] = {
515 #ifdef IPPROTO_ROUTING
516 XLAT(IPPROTO_ROUTING),
518 #ifdef IPPROTO_FRAGMENT
519 XLAT(IPPROTO_FRAGMENT),
533 #ifdef IPPROTO_ICMPV6
534 XLAT(IPPROTO_ICMPV6),
539 #ifdef IPPROTO_DSTOPTS
540 XLAT(IPPROTO_DSTOPTS),
563 #ifdef IPPROTO_UDPLITE
564 XLAT(IPPROTO_UDPLITE),
576 static const struct xlat netlink_protocols[] = {
580 #ifdef NETLINK_UNUSED
581 XLAT(NETLINK_UNUSED),
583 #ifdef NETLINK_USERSOCK
584 XLAT(NETLINK_USERSOCK),
586 #ifdef NETLINK_FIREWALL
587 XLAT(NETLINK_FIREWALL),
589 #ifdef NETLINK_SOCK_DIAG
590 XLAT(NETLINK_SOCK_DIAG),
598 #ifdef NETLINK_SELINUX
599 XLAT(NETLINK_SELINUX),
607 #ifdef NETLINK_FIB_LOOKUP
608 XLAT(NETLINK_FIB_LOOKUP),
610 #ifdef NETLINK_CONNECTOR
611 XLAT(NETLINK_CONNECTOR),
613 #ifdef NETLINK_NETFILTER
614 XLAT(NETLINK_NETFILTER),
616 #ifdef NETLINK_IP6_FW
617 XLAT(NETLINK_IP6_FW),
619 #ifdef NETLINK_DNRTMSG
620 XLAT(NETLINK_DNRTMSG),
622 #ifdef NETLINK_KOBJECT_UEVENT
623 XLAT(NETLINK_KOBJECT_UEVENT),
625 #ifdef NETLINK_GENERIC
626 XLAT(NETLINK_GENERIC),
628 #ifdef NETLINK_SCSITRANSPORT
629 XLAT(NETLINK_SCSITRANSPORT),
631 #ifdef NETLINK_ECRYPTFS
632 XLAT(NETLINK_ECRYPTFS),
637 #ifdef NETLINK_CRYPTO
638 XLAT(NETLINK_CRYPTO),
644 static const struct xlat msg_flags[] = {
691 #ifdef MSG_WAITFORONE
692 XLAT(MSG_WAITFORONE),
700 #ifdef MSG_CMSG_CLOEXEC
701 XLAT(MSG_CMSG_CLOEXEC),
706 static const struct xlat sockoptions[] = {
713 #ifdef SO_ATTACH_FILTER
714 XLAT(SO_ATTACH_FILTER),
716 #ifdef SO_BINDTODEVICE
717 XLAT(SO_BINDTODEVICE),
728 #ifdef SO_DETACH_FILTER
729 XLAT(SO_DETACH_FILTER),
764 #ifdef SO_PARALLELSVR
765 XLAT(SO_PARALLELSVR),
803 #ifdef SO_SECURITY_AUTHENTICATION
804 XLAT(SO_SECURITY_AUTHENTICATION),
806 #ifdef SO_SECURITY_ENCRYPTION_NETWORK
807 XLAT(SO_SECURITY_ENCRYPTION_NETWORK),
809 #ifdef SO_SECURITY_ENCRYPTION_TRANSPORT
810 XLAT(SO_SECURITY_ENCRYPTION_TRANSPORT),
830 #ifdef SO_USELOOPBACK
831 XLAT(SO_USELOOPBACK),
836 #if !defined(SOL_IP) && defined(IPPROTO_IP)
837 #define SOL_IP IPPROTO_IP
841 static const struct xlat sockipoptions[] = {
854 #ifdef IP_ROUTER_ALERT
855 XLAT(IP_ROUTER_ALERT),
857 #ifdef IP_RECVOPTIONS
858 XLAT(IP_RECVOPTIONS),
863 #ifdef IP_RECVRETOPTS
864 XLAT(IP_RECVRETOPTS),
866 #ifdef IP_RECVDSTADDR
867 XLAT(IP_RECVDSTADDR),
878 #ifdef IP_MTU_DISCOVER
879 XLAT(IP_MTU_DISCOVER),
893 #ifdef IP_MULTICAST_IF
894 XLAT(IP_MULTICAST_IF),
896 #ifdef IP_MULTICAST_TTL
897 XLAT(IP_MULTICAST_TTL),
899 #ifdef IP_MULTICAST_LOOP
900 XLAT(IP_MULTICAST_LOOP),
902 #ifdef IP_ADD_MEMBERSHIP
903 XLAT(IP_ADD_MEMBERSHIP),
905 #ifdef IP_DROP_MEMBERSHIP
906 XLAT(IP_DROP_MEMBERSHIP),
908 #ifdef IP_BROADCAST_IF
909 XLAT(IP_BROADCAST_IF),
911 #ifdef IP_RECVIFINDEX
912 XLAT(IP_RECVIFINDEX),
917 #ifdef MCAST_MSFILTER
918 XLAT(MCAST_MSFILTER),
923 #ifdef IP_IPSEC_POLICY
924 XLAT(IP_IPSEC_POLICY),
926 #ifdef IP_XFRM_POLICY
927 XLAT(IP_XFRM_POLICY),
932 #ifdef IP_TRANSPARENT
933 XLAT(IP_TRANSPARENT),
935 #ifdef IP_ORIGDSTADDR
936 XLAT(IP_ORIGDSTADDR),
938 #ifdef IP_RECVORIGDSTADDR
939 XLAT(IP_RECVORIGDSTADDR),
947 #ifdef IP_UNBLOCK_SOURCE
948 XLAT(IP_UNBLOCK_SOURCE),
950 #ifdef IP_BLOCK_SOURCE
951 XLAT(IP_BLOCK_SOURCE),
953 #ifdef IP_ADD_SOURCE_MEMBERSHIP
954 XLAT(IP_ADD_SOURCE_MEMBERSHIP),
956 #ifdef IP_DROP_SOURCE_MEMBERSHIP
957 XLAT(IP_DROP_SOURCE_MEMBERSHIP),
959 #ifdef MCAST_JOIN_GROUP
960 XLAT(MCAST_JOIN_GROUP),
962 #ifdef MCAST_BLOCK_SOURCE
963 XLAT(MCAST_BLOCK_SOURCE),
965 #ifdef MCAST_UNBLOCK_SOURCE
966 XLAT(MCAST_UNBLOCK_SOURCE),
968 #ifdef MCAST_LEAVE_GROUP
969 XLAT(MCAST_LEAVE_GROUP),
971 #ifdef MCAST_JOIN_SOURCE_GROUP
972 XLAT(MCAST_JOIN_SOURCE_GROUP),
974 #ifdef MCAST_LEAVE_SOURCE_GROUP
975 XLAT(MCAST_LEAVE_SOURCE_GROUP),
977 #ifdef IP_MULTICAST_ALL
978 XLAT(IP_MULTICAST_ALL),
988 static const struct xlat sockipv6options[] = {
995 #ifdef IPV6_PKTOPTIONS
996 XLAT(IPV6_PKTOPTIONS),
1007 #ifdef IPV6_HOPLIMIT
1008 XLAT(IPV6_HOPLIMIT),
1019 #ifdef IPV6_FLOWINFO
1020 XLAT(IPV6_FLOWINFO),
1022 #ifdef IPV6_UNICAST_HOPS
1023 XLAT(IPV6_UNICAST_HOPS),
1025 #ifdef IPV6_MULTICAST_HOPS
1026 XLAT(IPV6_MULTICAST_HOPS),
1028 #ifdef IPV6_MULTICAST_LOOP
1029 XLAT(IPV6_MULTICAST_LOOP),
1031 #ifdef IPV6_MULTICAST_IF
1032 XLAT(IPV6_MULTICAST_IF),
1034 #ifdef IPV6_MTU_DISCOVER
1035 XLAT(IPV6_MTU_DISCOVER),
1040 #ifdef IPV6_FLOWINFO_SEND
1041 XLAT(IPV6_FLOWINFO_SEND),
1043 #ifdef IPV6_ADD_MEMBERSHIP
1044 XLAT(IPV6_ADD_MEMBERSHIP),
1046 #ifdef IPV6_DROP_MEMBERSHIP
1047 XLAT(IPV6_DROP_MEMBERSHIP),
1049 #ifdef IPV6_ROUTER_ALERT
1050 XLAT(IPV6_ROUTER_ALERT),
1054 #endif /* SOL_IPV6 */
1057 static const struct xlat sockipxoptions[] = {
1061 #endif /* SOL_IPX */
1064 static const struct xlat sockrawoptions[] = {
1065 #if defined(ICMP_FILTER)
1070 #endif /* SOL_RAW */
1073 static const struct xlat sockpacketoptions[] = {
1074 #ifdef PACKET_ADD_MEMBERSHIP
1075 XLAT(PACKET_ADD_MEMBERSHIP),
1077 #ifdef PACKET_DROP_MEMBERSHIP
1078 XLAT(PACKET_DROP_MEMBERSHIP),
1080 #if defined(PACKET_RECV_OUTPUT)
1081 XLAT(PACKET_RECV_OUTPUT),
1083 #if defined(PACKET_RX_RING)
1084 XLAT(PACKET_RX_RING),
1086 #if defined(PACKET_STATISTICS)
1087 XLAT(PACKET_STATISTICS),
1089 #if defined(PACKET_COPY_THRESH)
1090 XLAT(PACKET_COPY_THRESH),
1092 #if defined(PACKET_AUXDATA)
1093 XLAT(PACKET_AUXDATA),
1095 #if defined(PACKET_ORIGDEV)
1096 XLAT(PACKET_ORIGDEV),
1098 #if defined(PACKET_VERSION)
1099 XLAT(PACKET_VERSION),
1101 #if defined(PACKET_HDRLEN)
1102 XLAT(PACKET_HDRLEN),
1104 #if defined(PACKET_RESERVE)
1105 XLAT(PACKET_RESERVE),
1107 #if defined(PACKET_TX_RING)
1108 XLAT(PACKET_TX_RING),
1110 #if defined(PACKET_LOSS)
1115 #endif /* SOL_PACKET */
1118 static const struct xlat socksctpoptions[] = {
1119 #if defined(SCTP_RTOINFO)
1122 #if defined(SCTP_ASSOCINFO)
1123 XLAT(SCTP_ASSOCINFO),
1125 #if defined(SCTP_INITMSG)
1128 #if defined(SCTP_NODELAY)
1131 #if defined(SCTP_AUTOCLOSE)
1132 XLAT(SCTP_AUTOCLOSE),
1134 #if defined(SCTP_SET_PEER_PRIMARY_ADDR)
1135 XLAT(SCTP_SET_PEER_PRIMARY_ADDR),
1137 #if defined(SCTP_PRIMARY_ADDR)
1138 XLAT(SCTP_PRIMARY_ADDR),
1140 #if defined(SCTP_ADAPTATION_LAYER)
1141 XLAT(SCTP_ADAPTATION_LAYER),
1143 #if defined(SCTP_DISABLE_FRAGMENTS)
1144 XLAT(SCTP_DISABLE_FRAGMENTS),
1146 #if defined(SCTP_PEER_ADDR_PARAMS)
1147 XLAT(SCTP_PEER_ADDR_PARAMS),
1149 #if defined(SCTP_DEFAULT_SEND_PARAM)
1150 XLAT(SCTP_DEFAULT_SEND_PARAM),
1152 #if defined(SCTP_EVENTS)
1155 #if defined(SCTP_I_WANT_MAPPED_V4_ADDR)
1156 XLAT(SCTP_I_WANT_MAPPED_V4_ADDR),
1158 #if defined(SCTP_MAXSEG)
1161 #if defined(SCTP_STATUS)
1164 #if defined(SCTP_GET_PEER_ADDR_INFO)
1165 XLAT(SCTP_GET_PEER_ADDR_INFO),
1167 #if defined(SCTP_DELAYED_ACK)
1168 XLAT(SCTP_DELAYED_ACK),
1170 #if defined(SCTP_CONTEXT)
1173 #if defined(SCTP_FRAGMENT_INTERLEAVE)
1174 XLAT(SCTP_FRAGMENT_INTERLEAVE),
1176 #if defined(SCTP_PARTIAL_DELIVERY_POINT)
1177 XLAT(SCTP_PARTIAL_DELIVERY_POINT),
1179 #if defined(SCTP_MAX_BURST)
1180 XLAT(SCTP_MAX_BURST),
1182 #if defined(SCTP_AUTH_CHUNK)
1183 XLAT(SCTP_AUTH_CHUNK),
1185 #if defined(SCTP_HMAC_IDENT)
1186 XLAT(SCTP_HMAC_IDENT),
1188 #if defined(SCTP_AUTH_KEY)
1189 XLAT(SCTP_AUTH_KEY),
1191 #if defined(SCTP_AUTH_ACTIVE_KEY)
1192 XLAT(SCTP_AUTH_ACTIVE_KEY),
1194 #if defined(SCTP_AUTH_DELETE_KEY)
1195 XLAT(SCTP_AUTH_DELETE_KEY),
1197 #if defined(SCTP_PEER_AUTH_CHUNKS)
1198 XLAT(SCTP_PEER_AUTH_CHUNKS),
1200 #if defined(SCTP_LOCAL_AUTH_CHUNKS)
1201 XLAT(SCTP_LOCAL_AUTH_CHUNKS),
1203 #if defined(SCTP_GET_ASSOC_NUMBER)
1204 XLAT(SCTP_GET_ASSOC_NUMBER),
1207 /* linux specific things */
1208 #if defined(SCTP_SOCKOPT_BINDX_ADD)
1209 XLAT(SCTP_SOCKOPT_BINDX_ADD),
1211 #if defined(SCTP_SOCKOPT_BINDX_REM)
1212 XLAT(SCTP_SOCKOPT_BINDX_REM),
1214 #if defined(SCTP_SOCKOPT_PEELOFF)
1215 XLAT(SCTP_SOCKOPT_PEELOFF),
1217 #if defined(SCTP_GET_PEER_ADDRS_NUM_OLD)
1218 XLAT(SCTP_GET_PEER_ADDRS_NUM_OLD),
1220 #if defined(SCTP_GET_PEER_ADDRS_OLD)
1221 XLAT(SCTP_GET_PEER_ADDRS_OLD),
1223 #if defined(SCTP_GET_LOCAL_ADDRS_NUM_OLD)
1224 XLAT(SCTP_GET_LOCAL_ADDRS_NUM_OLD),
1226 #if defined(SCTP_GET_LOCAL_ADDRS_OLD)
1227 XLAT(SCTP_GET_LOCAL_ADDRS_OLD),
1229 #if defined(SCTP_SOCKOPT_CONNECTX_OLD)
1230 XLAT(SCTP_SOCKOPT_CONNECTX_OLD),
1232 #if defined(SCTP_GET_PEER_ADDRS)
1233 XLAT(SCTP_GET_PEER_ADDRS),
1235 #if defined(SCTP_GET_LOCAL_ADDRS)
1236 XLAT(SCTP_GET_LOCAL_ADDRS),
1243 #if !defined(SOL_TCP) && defined(IPPROTO_TCP)
1244 #define SOL_TCP IPPROTO_TCP
1248 static const struct xlat socktcpoptions[] = {
1257 #ifdef TCP_KEEPINTVL
1258 XLAT(TCP_KEEPINTVL),
1269 #ifdef TCP_DEFER_ACCEPT
1270 XLAT(TCP_DEFER_ACCEPT),
1272 #ifdef TCP_WINDOW_CLAMP
1273 XLAT(TCP_WINDOW_CLAMP),
1281 #ifdef TCP_CONGESTION
1282 XLAT(TCP_CONGESTION),
1287 #ifdef TCP_COOKIE_TRANSACTIONS
1288 XLAT(TCP_COOKIE_TRANSACTIONS),
1290 #ifdef TCP_THIN_LINEAR_TIMEOUTS
1291 XLAT(TCP_THIN_LINEAR_TIMEOUTS),
1293 #ifdef TCP_THIN_DUPACK
1294 XLAT(TCP_THIN_DUPACK),
1296 #ifdef TCP_USER_TIMEOUT
1297 XLAT(TCP_USER_TIMEOUT),
1302 #ifdef TCP_REPAIR_QUEUE
1303 XLAT(TCP_REPAIR_QUEUE),
1305 #ifdef TCP_QUEUE_SEQ
1306 XLAT(TCP_QUEUE_SEQ),
1308 #ifdef TCP_REPAIR_OPTIONS
1309 XLAT(TCP_REPAIR_OPTIONS),
1314 #ifdef TCP_TIMESTAMP
1315 XLAT(TCP_TIMESTAMP),
1319 #endif /* SOL_TCP */
1322 static const struct xlat icmpfilterflags[] = {
1323 #if defined(ICMP_ECHOREPLY)
1324 { (1<<ICMP_ECHOREPLY), "ICMP_ECHOREPLY" },
1326 #if defined(ICMP_DEST_UNREACH)
1327 { (1<<ICMP_DEST_UNREACH), "ICMP_DEST_UNREACH" },
1329 #if defined(ICMP_SOURCE_QUENCH)
1330 { (1<<ICMP_SOURCE_QUENCH), "ICMP_SOURCE_QUENCH" },
1332 #if defined(ICMP_REDIRECT)
1333 { (1<<ICMP_REDIRECT), "ICMP_REDIRECT" },
1335 #if defined(ICMP_ECHO)
1336 { (1<<ICMP_ECHO), "ICMP_ECHO" },
1338 #if defined(ICMP_TIME_EXCEEDED)
1339 { (1<<ICMP_TIME_EXCEEDED), "ICMP_TIME_EXCEEDED" },
1341 #if defined(ICMP_PARAMETERPROB)
1342 { (1<<ICMP_PARAMETERPROB), "ICMP_PARAMETERPROB" },
1344 #if defined(ICMP_TIMESTAMP)
1345 { (1<<ICMP_TIMESTAMP), "ICMP_TIMESTAMP" },
1347 #if defined(ICMP_TIMESTAMPREPLY)
1348 { (1<<ICMP_TIMESTAMPREPLY), "ICMP_TIMESTAMPREPLY" },
1350 #if defined(ICMP_INFO_REQUEST)
1351 { (1<<ICMP_INFO_REQUEST), "ICMP_INFO_REQUEST" },
1353 #if defined(ICMP_INFO_REPLY)
1354 { (1<<ICMP_INFO_REPLY), "ICMP_INFO_REPLY" },
1356 #if defined(ICMP_ADDRESS)
1357 { (1<<ICMP_ADDRESS), "ICMP_ADDRESS" },
1359 #if defined(ICMP_ADDRESSREPLY)
1360 { (1<<ICMP_ADDRESSREPLY), "ICMP_ADDRESSREPLY" },
1364 #endif /* SOL_RAW */
1366 #if defined(AF_PACKET) /* from e.g. linux/if_packet.h */
1367 static const struct xlat af_packet_types[] = {
1368 #if defined(PACKET_HOST)
1371 #if defined(PACKET_BROADCAST)
1372 XLAT(PACKET_BROADCAST),
1374 #if defined(PACKET_MULTICAST)
1375 XLAT(PACKET_MULTICAST),
1377 #if defined(PACKET_OTHERHOST)
1378 XLAT(PACKET_OTHERHOST),
1380 #if defined(PACKET_OUTGOING)
1381 XLAT(PACKET_OUTGOING),
1383 #if defined(PACKET_LOOPBACK)
1384 XLAT(PACKET_LOOPBACK),
1386 #if defined(PACKET_FASTROUTE)
1387 XLAT(PACKET_FASTROUTE),
1391 #endif /* defined(AF_PACKET) */
1394 printsock(struct tcb *tcp, long addr, int addrlen)
1399 struct sockaddr_in sin;
1400 struct sockaddr_un sau;
1401 #ifdef HAVE_INET_NTOP
1402 struct sockaddr_in6 sa6;
1405 struct sockaddr_ipx sipx;
1408 struct sockaddr_ll ll;
1411 struct sockaddr_nl nl;
1414 char string_addr[100];
1420 if (!verbose(tcp)) {
1421 tprintf("%#lx", addr);
1425 if (addrlen < 2 || addrlen > sizeof(addrbuf))
1426 addrlen = sizeof(addrbuf);
1428 memset(&addrbuf, 0, sizeof(addrbuf));
1429 if (umoven(tcp, addr, addrlen, addrbuf.pad) < 0) {
1433 addrbuf.pad[sizeof(addrbuf.pad) - 1] = '\0';
1435 tprints("{sa_family=");
1436 printxval(addrfams, addrbuf.sa.sa_family, "AF_???");
1439 switch (addrbuf.sa.sa_family) {
1443 } else if (addrbuf.sau.sun_path[0]) {
1444 tprints("sun_path=");
1445 printpathn(tcp, addr + 2, strlen(addrbuf.sau.sun_path));
1447 tprints("sun_path=@");
1448 printpathn(tcp, addr + 3, strlen(addrbuf.sau.sun_path + 1));
1452 tprintf("sin_port=htons(%u), sin_addr=inet_addr(\"%s\")",
1453 ntohs(addrbuf.sin.sin_port), inet_ntoa(addrbuf.sin.sin_addr));
1455 #ifdef HAVE_INET_NTOP
1457 inet_ntop(AF_INET6, &addrbuf.sa6.sin6_addr, string_addr, sizeof(string_addr));
1458 tprintf("sin6_port=htons(%u), inet_pton(AF_INET6, \"%s\", &sin6_addr), sin6_flowinfo=%u",
1459 ntohs(addrbuf.sa6.sin6_port), string_addr,
1460 addrbuf.sa6.sin6_flowinfo);
1461 #ifdef HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID
1463 #if defined(HAVE_IF_INDEXTONAME) && defined(IN6_IS_ADDR_LINKLOCAL) && defined(IN6_IS_ADDR_MC_LINKLOCAL)
1464 int numericscope = 0;
1465 if (IN6_IS_ADDR_LINKLOCAL(&addrbuf.sa6.sin6_addr)
1466 || IN6_IS_ADDR_MC_LINKLOCAL(&addrbuf.sa6.sin6_addr)) {
1467 char scopebuf[IFNAMSIZ + 1];
1469 if (if_indextoname(addrbuf.sa6.sin6_scope_id, scopebuf) == NULL)
1472 tprintf(", sin6_scope_id=if_nametoindex(\"%s\")", scopebuf);
1478 tprintf(", sin6_scope_id=%u", addrbuf.sa6.sin6_scope_id);
1487 tprintf("sipx_port=htons(%u), ",
1488 ntohs(addrbuf.sipx.sipx_port));
1489 /* Yes, I know, this does not look too
1490 * strace-ish, but otherwise the IPX
1491 * addresses just look monstrous...
1492 * Anyways, feel free if you don't like
1495 tprintf("%08lx:", (unsigned long)ntohl(addrbuf.sipx.sipx_network));
1496 for (i = 0; i < IPX_NODE_LEN; i++)
1497 tprintf("%02x", addrbuf.sipx.sipx_node[i]);
1498 tprintf("/[%02x]", addrbuf.sipx.sipx_type);
1506 tprintf("proto=%#04x, if%d, pkttype=",
1507 ntohs(addrbuf.ll.sll_protocol),
1508 addrbuf.ll.sll_ifindex);
1509 printxval(af_packet_types, addrbuf.ll.sll_pkttype, "?");
1510 tprintf(", addr(%d)={%d, ",
1511 addrbuf.ll.sll_halen,
1512 addrbuf.ll.sll_hatype);
1513 for (i = 0; i < addrbuf.ll.sll_halen; i++)
1514 tprintf("%02x", addrbuf.ll.sll_addr[i]);
1518 #endif /* AF_PACKET */
1521 tprintf("pid=%d, groups=%08x", addrbuf.nl.nl_pid, addrbuf.nl.nl_groups);
1523 #endif /* AF_NETLINK */
1524 /* AF_AX25 AF_APPLETALK AF_NETROM AF_BRIDGE AF_AAL5
1525 AF_X25 AF_ROSE etc. still need to be done */
1528 tprints("sa_data=");
1529 printstr(tcp, (long) &((struct sockaddr *) addr)->sa_data,
1530 sizeof addrbuf.sa.sa_data);
1537 static const struct xlat scmvals[] = {
1541 #ifdef SCM_CREDENTIALS
1542 XLAT(SCM_CREDENTIALS),
1548 printcmsghdr(struct tcb *tcp, unsigned long addr, unsigned long len)
1550 struct cmsghdr *cmsg = len < sizeof(struct cmsghdr) ?
1552 if (cmsg == NULL || umoven(tcp, addr, len, (char *) cmsg) < 0) {
1553 tprintf(", msg_control=%#lx", addr);
1558 tprintf(", {cmsg_len=%u, cmsg_level=", (unsigned) cmsg->cmsg_len);
1559 printxval(socketlayers, cmsg->cmsg_level, "SOL_???");
1560 tprints(", cmsg_type=");
1562 if (cmsg->cmsg_level == SOL_SOCKET) {
1563 unsigned long cmsg_len;
1565 printxval(scmvals, cmsg->cmsg_type, "SCM_???");
1566 cmsg_len = (len < cmsg->cmsg_len) ? len : cmsg->cmsg_len;
1568 if (cmsg->cmsg_type == SCM_RIGHTS
1569 && CMSG_LEN(sizeof(int)) <= cmsg_len) {
1570 int *fds = (int *) CMSG_DATA(cmsg);
1574 while ((char *) fds < ((char *) cmsg + cmsg_len)) {
1577 tprintf("%d", *fds++);
1584 if (cmsg->cmsg_type == SCM_CREDENTIALS
1585 && CMSG_LEN(sizeof(struct ucred)) <= cmsg_len) {
1586 struct ucred *uc = (struct ucred *) CMSG_DATA(cmsg);
1588 tprintf("{pid=%ld, uid=%ld, gid=%ld}}",
1589 (long)uc->pid, (long)uc->uid, (long)uc->gid);
1599 do_msghdr(struct tcb *tcp, struct msghdr *msg, unsigned long data_size)
1601 tprintf("{msg_name(%d)=", msg->msg_namelen);
1602 printsock(tcp, (long)msg->msg_name, msg->msg_namelen);
1604 tprintf(", msg_iov(%lu)=", (unsigned long)msg->msg_iovlen);
1605 tprint_iov_upto(tcp, (unsigned long)msg->msg_iovlen,
1606 (unsigned long)msg->msg_iov, 1, data_size);
1608 #ifdef HAVE_STRUCT_MSGHDR_MSG_CONTROL
1609 tprintf(", msg_controllen=%lu", (unsigned long)msg->msg_controllen);
1610 if (msg->msg_controllen)
1611 printcmsghdr(tcp, (unsigned long) msg->msg_control,
1612 msg->msg_controllen);
1613 tprints(", msg_flags=");
1614 printflags(msg_flags, msg->msg_flags, "MSG_???");
1615 #else /* !HAVE_STRUCT_MSGHDR_MSG_CONTROL */
1616 tprintf("msg_accrights=%#lx, msg_accrightslen=%u",
1617 (unsigned long) msg->msg_accrights, msg->msg_accrightslen);
1618 #endif /* !HAVE_STRUCT_MSGHDR_MSG_CONTROL */
1623 uint32_t /* void* */ msg_name;
1624 uint32_t /* socklen_t */msg_namelen;
1625 uint32_t /* iovec* */ msg_iov;
1626 uint32_t /* size_t */ msg_iovlen;
1627 uint32_t /* void* */ msg_control;
1628 uint32_t /* size_t */ msg_controllen;
1629 uint32_t /* int */ msg_flags;
1632 struct msghdr32 msg_hdr;
1633 uint32_t /* unsigned */ msg_len;
1637 printmsghdr(struct tcb *tcp, long addr, unsigned long data_size)
1641 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
1642 if (current_wordsize == 4) {
1643 struct msghdr32 msg32;
1645 if (umove(tcp, addr, &msg32) < 0) {
1646 tprintf("%#lx", addr);
1649 msg.msg_name = (void*)(long)msg32.msg_name;
1650 msg.msg_namelen = msg32.msg_namelen;
1651 msg.msg_iov = (void*)(long)msg32.msg_iov;
1652 msg.msg_iovlen = msg32.msg_iovlen;
1653 msg.msg_control = (void*)(long)msg32.msg_control;
1654 msg.msg_controllen = msg32.msg_controllen;
1655 msg.msg_flags = msg32.msg_flags;
1658 if (umove(tcp, addr, &msg) < 0) {
1659 tprintf("%#lx", addr);
1662 do_msghdr(tcp, &msg, data_size);
1666 printmmsghdr(struct tcb *tcp, long addr, unsigned int idx, unsigned long msg_len)
1669 struct msghdr msg_hdr;
1673 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
1674 if (current_wordsize == 4) {
1675 struct mmsghdr32 mmsg32;
1677 addr += sizeof(mmsg32) * idx;
1678 if (umove(tcp, addr, &mmsg32) < 0) {
1679 tprintf("%#lx", addr);
1682 mmsg.msg_hdr.msg_name = (void*)(long)mmsg32.msg_hdr.msg_name;
1683 mmsg.msg_hdr.msg_namelen = mmsg32.msg_hdr.msg_namelen;
1684 mmsg.msg_hdr.msg_iov = (void*)(long)mmsg32.msg_hdr.msg_iov;
1685 mmsg.msg_hdr.msg_iovlen = mmsg32.msg_hdr.msg_iovlen;
1686 mmsg.msg_hdr.msg_control = (void*)(long)mmsg32.msg_hdr.msg_control;
1687 mmsg.msg_hdr.msg_controllen = mmsg32.msg_hdr.msg_controllen;
1688 mmsg.msg_hdr.msg_flags = mmsg32.msg_hdr.msg_flags;
1689 mmsg.msg_len = mmsg32.msg_len;
1693 addr += sizeof(mmsg) * idx;
1694 if (umove(tcp, addr, &mmsg) < 0) {
1695 tprintf("%#lx", addr);
1700 do_msghdr(tcp, &mmsg.msg_hdr, msg_len ? msg_len : mmsg.msg_len);
1701 tprintf(", %u}", mmsg.msg_len);
1705 decode_mmsg(struct tcb *tcp, unsigned long msg_len)
1708 if (syserror(tcp)) {
1709 tprintf("%#lx", tcp->u_arg[1]);
1711 unsigned int len = tcp->u_rval;
1715 for (i = 0; i < len; ++i) {
1718 printmmsghdr(tcp, tcp->u_arg[1], i, msg_len);
1723 tprintf(", %u, ", (unsigned int) tcp->u_arg[2]);
1725 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1728 #endif /* HAVE_SENDMSG */
1731 * low bits of the socket type define real socket type,
1732 * other bits are socket type flags.
1735 tprint_sock_type(struct tcb *tcp, int flags)
1737 const char *str = xlookup(socktypes, flags & SOCK_TYPE_MASK);
1741 flags &= ~SOCK_TYPE_MASK;
1746 printflags(sock_type_flags, flags, "SOCK_???");
1750 sys_socket(struct tcb *tcp)
1752 if (entering(tcp)) {
1753 printxval(domains, tcp->u_arg[0], "PF_???");
1755 tprint_sock_type(tcp, tcp->u_arg[1]);
1757 switch (tcp->u_arg[0]) {
1762 printxval(inet_protocols, tcp->u_arg[2], "IPPROTO_???");
1766 /* BTW: I don't believe this.. */
1768 printxval(domains, tcp->u_arg[2], "PF_???");
1774 printxval(netlink_protocols, tcp->u_arg[2], "NETLINK_???");
1778 tprintf("%lu", tcp->u_arg[2]);
1786 sys_bind(struct tcb *tcp)
1788 if (entering(tcp)) {
1789 printfd(tcp, tcp->u_arg[0]);
1791 printsock(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1792 tprintf(", %lu", tcp->u_arg[2]);
1798 sys_connect(struct tcb *tcp)
1800 return sys_bind(tcp);
1804 sys_listen(struct tcb *tcp)
1806 if (entering(tcp)) {
1807 printfd(tcp, tcp->u_arg[0]);
1809 tprintf("%lu", tcp->u_arg[1]);
1815 do_accept(struct tcb *tcp, int flags_arg)
1817 if (entering(tcp)) {
1818 printfd(tcp, tcp->u_arg[0]);
1823 tprintf("%#lx, NULL", tcp->u_arg[1]);
1826 if (tcp->u_arg[1] == 0 || syserror(tcp)
1827 || umove(tcp, tcp->u_arg[2], &len) < 0) {
1828 tprintf("%#lx", tcp->u_arg[1]);
1830 printsock(tcp, tcp->u_arg[1], len);
1833 printnum_int(tcp, tcp->u_arg[2], "%u");
1835 if (flags_arg >= 0) {
1837 printflags(sock_type_flags, tcp->u_arg[flags_arg],
1844 sys_accept(struct tcb *tcp)
1846 return do_accept(tcp, -1);
1850 sys_accept4(struct tcb *tcp)
1852 return do_accept(tcp, 3);
1856 sys_send(struct tcb *tcp)
1858 if (entering(tcp)) {
1859 printfd(tcp, tcp->u_arg[0]);
1861 printstr(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1862 tprintf(", %lu, ", tcp->u_arg[2]);
1864 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1870 sys_sendto(struct tcb *tcp)
1872 if (entering(tcp)) {
1873 printfd(tcp, tcp->u_arg[0]);
1875 printstr(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1876 tprintf(", %lu, ", tcp->u_arg[2]);
1878 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1881 printsock(tcp, tcp->u_arg[4], tcp->u_arg[5]);
1883 tprintf(", %lu", tcp->u_arg[5]);
1891 sys_sendmsg(struct tcb *tcp)
1893 if (entering(tcp)) {
1894 printfd(tcp, tcp->u_arg[0]);
1896 printmsghdr(tcp, tcp->u_arg[1], (unsigned long) -1L);
1899 printflags(msg_flags, tcp->u_arg[2], "MSG_???");
1905 sys_sendmmsg(struct tcb *tcp)
1907 if (entering(tcp)) {
1909 printfd(tcp, tcp->u_arg[0]);
1911 if (!verbose(tcp)) {
1912 tprintf("%#lx, %u, ",
1913 tcp->u_arg[1], (unsigned int) tcp->u_arg[2]);
1914 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1918 decode_mmsg(tcp, (unsigned long) -1L);
1923 #endif /* HAVE_SENDMSG */
1926 sys_recv(struct tcb *tcp)
1928 if (entering(tcp)) {
1929 printfd(tcp, tcp->u_arg[0]);
1933 tprintf("%#lx", tcp->u_arg[1]);
1935 printstr(tcp, tcp->u_arg[1], tcp->u_rval);
1937 tprintf(", %lu, ", tcp->u_arg[2]);
1938 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1944 sys_recvfrom(struct tcb *tcp)
1948 if (entering(tcp)) {
1949 printfd(tcp, tcp->u_arg[0]);
1952 if (syserror(tcp)) {
1953 tprintf("%#lx, %lu, %lu, %#lx, %#lx",
1954 tcp->u_arg[1], tcp->u_arg[2], tcp->u_arg[3],
1955 tcp->u_arg[4], tcp->u_arg[5]);
1959 printstr(tcp, tcp->u_arg[1], tcp->u_rval);
1961 tprintf(", %lu, ", tcp->u_arg[2]);
1963 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1964 /* from address, len */
1965 if (!tcp->u_arg[4] || !tcp->u_arg[5]) {
1966 if (tcp->u_arg[4] == 0)
1969 tprintf(", %#lx", tcp->u_arg[4]);
1970 if (tcp->u_arg[5] == 0)
1973 tprintf(", %#lx", tcp->u_arg[5]);
1976 if (umove(tcp, tcp->u_arg[5], &fromlen) < 0) {
1977 tprints(", {...}, [?]");
1981 printsock(tcp, tcp->u_arg[4], tcp->u_arg[5]);
1983 tprintf(", [%u]", fromlen);
1991 sys_recvmsg(struct tcb *tcp)
1993 if (entering(tcp)) {
1994 printfd(tcp, tcp->u_arg[0]);
1997 if (syserror(tcp) || !verbose(tcp))
1998 tprintf("%#lx", tcp->u_arg[1]);
2000 printmsghdr(tcp, tcp->u_arg[1], tcp->u_rval);
2003 printflags(msg_flags, tcp->u_arg[2], "MSG_???");
2009 sys_recvmmsg(struct tcb *tcp)
2011 /* +5 chars are for "left " prefix */
2012 static char str[5 + TIMESPEC_TEXT_BUFSIZE];
2014 if (entering(tcp)) {
2015 printfd(tcp, tcp->u_arg[0]);
2018 sprint_timespec(str, tcp, tcp->u_arg[4]);
2019 /* Abusing tcp->auxstr as temp storage.
2020 * Will be used and freed on syscall exit.
2022 tcp->auxstr = strdup(str);
2024 tprintf("%#lx, %ld, ", tcp->u_arg[1], tcp->u_arg[2]);
2025 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
2027 print_timespec(tcp, tcp->u_arg[4]);
2032 decode_mmsg(tcp, 0);
2033 /* timeout on entrance */
2034 tprintf(", %s", tcp->auxstr ? tcp->auxstr : "{...}");
2035 free((void *) tcp->auxstr);
2040 if (tcp->u_rval == 0) {
2041 tcp->auxstr = "Timeout";
2046 /* timeout on exit */
2047 sprint_timespec(stpcpy(str, "left "), tcp, tcp->u_arg[4]);
2053 #endif /* HAVE_SENDMSG */
2055 static const struct xlat shutdown_modes[] = {
2063 sys_shutdown(struct tcb *tcp)
2065 if (entering(tcp)) {
2066 printfd(tcp, tcp->u_arg[0]);
2068 printxval(shutdown_modes, tcp->u_arg[1], "SHUT_???");
2074 sys_getsockname(struct tcb *tcp)
2076 return sys_accept(tcp);
2080 sys_getpeername(struct tcb *tcp)
2082 return sys_accept(tcp);
2086 do_pipe(struct tcb *tcp, int flags_arg)
2089 if (syserror(tcp)) {
2090 tprintf("%#lx", tcp->u_arg[0]);
2092 #if !defined(SPARC) && !defined(SPARC64) && !defined(SH) && !defined(IA64)
2095 if (umoven(tcp, tcp->u_arg[0], sizeof fds, (char *) fds) < 0)
2098 tprintf("[%u, %u]", fds[0], fds[1]);
2099 #elif defined(SPARC) || defined(SPARC64) || defined(SH) || defined(IA64)
2100 tprintf("[%lu, %lu]", tcp->u_rval, getrval2(tcp));
2102 tprintf("%#lx", tcp->u_arg[0]);
2105 if (flags_arg >= 0) {
2107 printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???");
2114 sys_pipe(struct tcb *tcp)
2116 return do_pipe(tcp, -1);
2120 sys_pipe2(struct tcb *tcp)
2122 return do_pipe(tcp, 1);
2126 sys_socketpair(struct tcb *tcp)
2130 if (entering(tcp)) {
2131 printxval(domains, tcp->u_arg[0], "PF_???");
2133 tprint_sock_type(tcp, tcp->u_arg[1]);
2134 tprintf(", %lu", tcp->u_arg[2]);
2136 if (syserror(tcp)) {
2137 tprintf(", %#lx", tcp->u_arg[3]);
2140 if (umoven(tcp, tcp->u_arg[3], sizeof fds, (char *) fds) < 0)
2143 tprintf(", [%u, %u]", fds[0], fds[1]);
2149 sys_getsockopt(struct tcb *tcp)
2151 if (entering(tcp)) {
2152 printfd(tcp, tcp->u_arg[0]);
2154 printxval(socketlayers, tcp->u_arg[1], "SOL_???");
2156 switch (tcp->u_arg[1]) {
2158 printxval(sockoptions, tcp->u_arg[2], "SO_???");
2162 printxval(sockipoptions, tcp->u_arg[2], "IP_???");
2167 printxval(sockipv6options, tcp->u_arg[2], "IPV6_???");
2172 printxval(sockipxoptions, tcp->u_arg[2], "IPX_???");
2177 printxval(sockpacketoptions, tcp->u_arg[2], "PACKET_???");
2182 printxval(socktcpoptions, tcp->u_arg[2], "TCP_???");
2187 printxval(socksctpoptions, tcp->u_arg[2], "SCTP_???");
2191 /* SOL_AX25 SOL_ROSE SOL_ATALK SOL_NETROM SOL_UDP SOL_DECNET SOL_X25
2192 * etc. still need work */
2194 tprintf("%lu", tcp->u_arg[2]);
2200 if (syserror(tcp) || umove(tcp, tcp->u_arg[4], &len) < 0) {
2201 tprintf("%#lx, %#lx",
2202 tcp->u_arg[3], tcp->u_arg[4]);
2206 switch (tcp->u_arg[1]) {
2208 switch (tcp->u_arg[2]) {
2211 if (len == sizeof(struct linger)) {
2212 struct linger linger;
2217 tprintf("{onoff=%d, linger=%d}, "
2228 if (len == sizeof(struct ucred)) {
2234 tprintf("{pid=%ld, uid=%ld, gid=%ld}, "
2247 switch (tcp->u_arg[2]) {
2248 #ifdef PACKET_STATISTICS
2249 case PACKET_STATISTICS:
2250 if (len == sizeof(struct tpacket_stats)) {
2251 struct tpacket_stats stats;
2256 tprintf("{packets=%u, drops=%u}, "
2269 if (len == sizeof(int)) {
2270 printnum_int(tcp, tcp->u_arg[3], "%d");
2273 printstr(tcp, tcp->u_arg[3], len);
2275 tprintf(", [%d]", len);
2280 #if defined(ICMP_FILTER)
2281 static void printicmpfilter(struct tcb *tcp, long addr)
2283 struct icmp_filter filter;
2289 if (syserror(tcp) || !verbose(tcp)) {
2290 tprintf("%#lx", addr);
2293 if (umove(tcp, addr, &filter) < 0) {
2299 printflags(icmpfilterflags, ~filter.data, "ICMP_???");
2302 #endif /* ICMP_FILTER */
2305 printsockopt(struct tcb *tcp, int level, int name, long addr, int len)
2307 printxval(socketlayers, level, "SOL_??");
2311 printxval(sockoptions, name, "SO_???");
2313 #if defined(SO_LINGER)
2315 if (len == sizeof(struct linger)) {
2316 struct linger linger;
2317 if (umove(tcp, addr, &linger) < 0)
2319 tprintf(", {onoff=%d, linger=%d}",
2330 printxval(sockipoptions, name, "IP_???");
2335 printxval(sockipv6options, name, "IPV6_???");
2340 printxval(sockipxoptions, name, "IPX_???");
2345 printxval(sockpacketoptions, name, "PACKET_???");
2346 /* TODO: decode packate_mreq for PACKET_*_MEMBERSHIP */
2348 #ifdef PACKET_RX_RING
2349 case PACKET_RX_RING:
2351 #ifdef PACKET_TX_RING
2352 case PACKET_TX_RING:
2354 #if defined(PACKET_RX_RING) || defined(PACKET_TX_RING)
2355 if (len == sizeof(struct tpacket_req)) {
2356 struct tpacket_req req;
2357 if (umove(tcp, addr, &req) < 0)
2359 tprintf(", {block_size=%u, block_nr=%u, frame_size=%u, frame_nr=%u}",
2367 #endif /* PACKET_RX_RING || PACKET_TX_RING */
2373 printxval(socktcpoptions, name, "TCP_???");
2378 printxval(socksctpoptions, name, "SCTP_???");
2383 printxval(sockrawoptions, name, "RAW_???");
2385 #if defined(ICMP_FILTER)
2388 printicmpfilter(tcp, addr);
2395 /* SOL_AX25 SOL_ATALK SOL_NETROM SOL_UDP SOL_DECNET SOL_X25
2396 * etc. still need work */
2399 tprintf("%u", name);
2402 /* default arg printing */
2406 if (len == sizeof(int)) {
2407 printnum_int(tcp, addr, "%d");
2410 printstr(tcp, addr, len);
2416 sys_setsockopt(struct tcb *tcp)
2418 if (entering(tcp)) {
2419 printfd(tcp, tcp->u_arg[0]);
2421 printsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2],
2422 tcp->u_arg[3], tcp->u_arg[4]);
2423 tprintf(", %lu", tcp->u_arg[4]);