2 * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3 * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4 * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
5 * Copyright (c) 1996-2000 Wichert Akkerman <wichert@cistron.nl>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. The name of the author may not be used to endorse or promote products
17 * derived from this software without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
20 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
21 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
23 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
24 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
33 #include <sys/socket.h>
35 #if defined(HAVE_SIN6_SCOPE_ID_LINUX)
36 # define in6_addr in6_addr_libc
37 # define ipv6_mreq ipv6_mreq_libc
38 # define sockaddr_in6 sockaddr_in6_libc
40 #include <netinet/in.h>
41 #ifdef HAVE_NETINET_TCP_H
42 # include <netinet/tcp.h>
44 #ifdef HAVE_NETINET_UDP_H
45 # include <netinet/udp.h>
47 #ifdef HAVE_NETINET_SCTP_H
48 # include <netinet/sctp.h>
50 #include <arpa/inet.h>
52 #include <asm/types.h>
53 #if defined(__GLIBC__)
54 # include <netipx/ipx.h>
56 # include <linux/ipx.h>
59 #if defined(__GLIBC__) && defined(HAVE_SIN6_SCOPE_ID_LINUX)
60 # if defined(HAVE_LINUX_IN6_H)
61 # if defined(HAVE_SIN6_SCOPE_ID_LINUX)
65 # define in6_addr in6_addr_kernel
66 # define ipv6_mreq ipv6_mreq_kernel
67 # define sockaddr_in6 sockaddr_in6_kernel
69 # include <linux/in6.h>
70 # if defined(HAVE_SIN6_SCOPE_ID_LINUX)
74 # define in6_addr in6_addr_libc
75 # define ipv6_mreq ipv6_mreq_libc
76 # define sockaddr_in6 sockaddr_in6_kernel
81 #if defined(HAVE_SYS_UIO_H)
84 #if defined(HAVE_LINUX_NETLINK_H)
85 # include <linux/netlink.h>
87 #if defined(HAVE_LINUX_IF_PACKET_H)
88 # include <linux/if_packet.h>
90 #if defined(HAVE_LINUX_ICMP_H)
91 # include <linux/icmp.h>
94 # define PF_UNSPEC AF_UNSPEC
97 static const struct xlat domains[] = {
223 const struct xlat addrfams[] = {
349 static const struct xlat socktypes[] = {
358 #ifdef SOCK_SEQPACKET
359 XLAT(SOCK_SEQPACKET),
369 static const struct xlat sock_type_flags[] = {
378 #ifndef SOCK_TYPE_MASK
379 # define SOCK_TYPE_MASK 0xf
381 static const struct xlat socketlayers[] = {
385 #if defined(SOL_ICMP)
394 #if defined(SOL_IPV6)
397 #if defined(SOL_ICMPV6)
400 #if defined(SOL_SCTP)
403 #if defined(SOL_UDPLITE)
412 #if defined(SOL_AX25)
415 #if defined(SOL_ATALK)
418 #if defined(SOL_NETROM)
421 #if defined(SOL_ROSE)
424 #if defined(SOL_DECNET)
430 #if defined(SOL_PACKET)
439 #if defined(SOL_IRDA)
442 #if defined(SOL_NETBEUI)
448 #if defined(SOL_DCCP)
451 #if defined(SOL_NETLINK)
454 #if defined(SOL_TIPC)
457 #if defined(SOL_RXRPC)
460 #if defined(SOL_PPPOL2TP)
463 #if defined(SOL_BLUETOOTH)
466 #if defined(SOL_PNPIPE)
472 #if defined(SOL_IUVC)
475 #if defined(SOL_CAIF)
478 XLAT(SOL_SOCKET), /* Never used! */
479 /* The SOL_* array should remain not NULL-terminated. */
481 /*** WARNING: DANGER WILL ROBINSON: NOTE "socketlayers" array above
482 falls into "protocols" array below!!!! This is intended!!! ***/
483 static const struct xlat protocols[] = {
515 #ifdef IPPROTO_ROUTING
516 XLAT(IPPROTO_ROUTING),
518 #ifdef IPPROTO_FRAGMENT
519 XLAT(IPPROTO_FRAGMENT),
533 #ifdef IPPROTO_ICMPV6
534 XLAT(IPPROTO_ICMPV6),
539 #ifdef IPPROTO_DSTOPTS
540 XLAT(IPPROTO_DSTOPTS),
563 #ifdef IPPROTO_UDPLITE
564 XLAT(IPPROTO_UDPLITE),
574 static const struct xlat msg_flags[] = {
621 #ifdef MSG_WAITFORONE
622 XLAT(MSG_WAITFORONE),
630 #ifdef MSG_CMSG_CLOEXEC
631 XLAT(MSG_CMSG_CLOEXEC),
636 static const struct xlat sockoptions[] = {
643 #ifdef SO_ATTACH_FILTER
644 XLAT(SO_ATTACH_FILTER),
646 #ifdef SO_BINDTODEVICE
647 XLAT(SO_BINDTODEVICE),
658 #ifdef SO_DETACH_FILTER
659 XLAT(SO_DETACH_FILTER),
694 #ifdef SO_PARALLELSVR
695 XLAT(SO_PARALLELSVR),
733 #ifdef SO_SECURITY_AUTHENTICATION
734 XLAT(SO_SECURITY_AUTHENTICATION),
736 #ifdef SO_SECURITY_ENCRYPTION_NETWORK
737 XLAT(SO_SECURITY_ENCRYPTION_NETWORK),
739 #ifdef SO_SECURITY_ENCRYPTION_TRANSPORT
740 XLAT(SO_SECURITY_ENCRYPTION_TRANSPORT),
760 #ifdef SO_USELOOPBACK
761 XLAT(SO_USELOOPBACK),
766 #if !defined(SOL_IP) && defined(IPPROTO_IP)
767 #define SOL_IP IPPROTO_IP
771 static const struct xlat sockipoptions[] = {
784 #ifdef IP_ROUTER_ALERT
785 XLAT(IP_ROUTER_ALERT),
787 #ifdef IP_RECVOPTIONS
788 XLAT(IP_RECVOPTIONS),
793 #ifdef IP_RECVRETOPTS
794 XLAT(IP_RECVRETOPTS),
796 #ifdef IP_RECVDSTADDR
797 XLAT(IP_RECVDSTADDR),
808 #ifdef IP_MTU_DISCOVER
809 XLAT(IP_MTU_DISCOVER),
823 #ifdef IP_MULTICAST_IF
824 XLAT(IP_MULTICAST_IF),
826 #ifdef IP_MULTICAST_TTL
827 XLAT(IP_MULTICAST_TTL),
829 #ifdef IP_MULTICAST_LOOP
830 XLAT(IP_MULTICAST_LOOP),
832 #ifdef IP_ADD_MEMBERSHIP
833 XLAT(IP_ADD_MEMBERSHIP),
835 #ifdef IP_DROP_MEMBERSHIP
836 XLAT(IP_DROP_MEMBERSHIP),
838 #ifdef IP_BROADCAST_IF
839 XLAT(IP_BROADCAST_IF),
841 #ifdef IP_RECVIFINDEX
842 XLAT(IP_RECVIFINDEX),
847 #ifdef MCAST_MSFILTER
848 XLAT(MCAST_MSFILTER),
853 #ifdef IP_IPSEC_POLICY
854 XLAT(IP_IPSEC_POLICY),
856 #ifdef IP_XFRM_POLICY
857 XLAT(IP_XFRM_POLICY),
862 #ifdef IP_TRANSPARENT
863 XLAT(IP_TRANSPARENT),
865 #ifdef IP_ORIGDSTADDR
866 XLAT(IP_ORIGDSTADDR),
868 #ifdef IP_RECVORIGDSTADDR
869 XLAT(IP_RECVORIGDSTADDR),
877 #ifdef IP_UNBLOCK_SOURCE
878 XLAT(IP_UNBLOCK_SOURCE),
880 #ifdef IP_BLOCK_SOURCE
881 XLAT(IP_BLOCK_SOURCE),
883 #ifdef IP_ADD_SOURCE_MEMBERSHIP
884 XLAT(IP_ADD_SOURCE_MEMBERSHIP),
886 #ifdef IP_DROP_SOURCE_MEMBERSHIP
887 XLAT(IP_DROP_SOURCE_MEMBERSHIP),
889 #ifdef MCAST_JOIN_GROUP
890 XLAT(MCAST_JOIN_GROUP),
892 #ifdef MCAST_BLOCK_SOURCE
893 XLAT(MCAST_BLOCK_SOURCE),
895 #ifdef MCAST_UNBLOCK_SOURCE
896 XLAT(MCAST_UNBLOCK_SOURCE),
898 #ifdef MCAST_LEAVE_GROUP
899 XLAT(MCAST_LEAVE_GROUP),
901 #ifdef MCAST_JOIN_SOURCE_GROUP
902 XLAT(MCAST_JOIN_SOURCE_GROUP),
904 #ifdef MCAST_LEAVE_SOURCE_GROUP
905 XLAT(MCAST_LEAVE_SOURCE_GROUP),
907 #ifdef IP_MULTICAST_ALL
908 XLAT(IP_MULTICAST_ALL),
918 static const struct xlat sockipv6options[] = {
925 #ifdef IPV6_PKTOPTIONS
926 XLAT(IPV6_PKTOPTIONS),
952 #ifdef IPV6_UNICAST_HOPS
953 XLAT(IPV6_UNICAST_HOPS),
955 #ifdef IPV6_MULTICAST_HOPS
956 XLAT(IPV6_MULTICAST_HOPS),
958 #ifdef IPV6_MULTICAST_LOOP
959 XLAT(IPV6_MULTICAST_LOOP),
961 #ifdef IPV6_MULTICAST_IF
962 XLAT(IPV6_MULTICAST_IF),
964 #ifdef IPV6_MTU_DISCOVER
965 XLAT(IPV6_MTU_DISCOVER),
970 #ifdef IPV6_FLOWINFO_SEND
971 XLAT(IPV6_FLOWINFO_SEND),
973 #ifdef IPV6_ADD_MEMBERSHIP
974 XLAT(IPV6_ADD_MEMBERSHIP),
976 #ifdef IPV6_DROP_MEMBERSHIP
977 XLAT(IPV6_DROP_MEMBERSHIP),
979 #ifdef IPV6_ROUTER_ALERT
980 XLAT(IPV6_ROUTER_ALERT),
984 #endif /* SOL_IPV6 */
987 static const struct xlat sockipxoptions[] = {
994 static const struct xlat sockrawoptions[] = {
995 #if defined(ICMP_FILTER)
1000 #endif /* SOL_RAW */
1003 static const struct xlat sockpacketoptions[] = {
1004 #ifdef PACKET_ADD_MEMBERSHIP
1005 XLAT(PACKET_ADD_MEMBERSHIP),
1007 #ifdef PACKET_DROP_MEMBERSHIP
1008 XLAT(PACKET_DROP_MEMBERSHIP),
1010 #if defined(PACKET_RECV_OUTPUT)
1011 XLAT(PACKET_RECV_OUTPUT),
1013 #if defined(PACKET_RX_RING)
1014 XLAT(PACKET_RX_RING),
1016 #if defined(PACKET_STATISTICS)
1017 XLAT(PACKET_STATISTICS),
1019 #if defined(PACKET_COPY_THRESH)
1020 XLAT(PACKET_COPY_THRESH),
1022 #if defined(PACKET_AUXDATA)
1023 XLAT(PACKET_AUXDATA),
1025 #if defined(PACKET_ORIGDEV)
1026 XLAT(PACKET_ORIGDEV),
1028 #if defined(PACKET_VERSION)
1029 XLAT(PACKET_VERSION),
1031 #if defined(PACKET_HDRLEN)
1032 XLAT(PACKET_HDRLEN),
1034 #if defined(PACKET_RESERVE)
1035 XLAT(PACKET_RESERVE),
1037 #if defined(PACKET_TX_RING)
1038 XLAT(PACKET_TX_RING),
1040 #if defined(PACKET_LOSS)
1045 #endif /* SOL_PACKET */
1048 static const struct xlat socksctpoptions[] = {
1049 #if defined(SCTP_RTOINFO)
1052 #if defined(SCTP_ASSOCINFO)
1053 XLAT(SCTP_ASSOCINFO),
1055 #if defined(SCTP_INITMSG)
1058 #if defined(SCTP_NODELAY)
1061 #if defined(SCTP_AUTOCLOSE)
1062 XLAT(SCTP_AUTOCLOSE),
1064 #if defined(SCTP_SET_PEER_PRIMARY_ADDR)
1065 XLAT(SCTP_SET_PEER_PRIMARY_ADDR),
1067 #if defined(SCTP_PRIMARY_ADDR)
1068 XLAT(SCTP_PRIMARY_ADDR),
1070 #if defined(SCTP_ADAPTATION_LAYER)
1071 XLAT(SCTP_ADAPTATION_LAYER),
1073 #if defined(SCTP_DISABLE_FRAGMENTS)
1074 XLAT(SCTP_DISABLE_FRAGMENTS),
1076 #if defined(SCTP_PEER_ADDR_PARAMS)
1077 XLAT(SCTP_PEER_ADDR_PARAMS),
1079 #if defined(SCTP_DEFAULT_SEND_PARAM)
1080 XLAT(SCTP_DEFAULT_SEND_PARAM),
1082 #if defined(SCTP_EVENTS)
1085 #if defined(SCTP_I_WANT_MAPPED_V4_ADDR)
1086 XLAT(SCTP_I_WANT_MAPPED_V4_ADDR),
1088 #if defined(SCTP_MAXSEG)
1091 #if defined(SCTP_STATUS)
1094 #if defined(SCTP_GET_PEER_ADDR_INFO)
1095 XLAT(SCTP_GET_PEER_ADDR_INFO),
1097 #if defined(SCTP_DELAYED_ACK)
1098 XLAT(SCTP_DELAYED_ACK),
1100 #if defined(SCTP_CONTEXT)
1103 #if defined(SCTP_FRAGMENT_INTERLEAVE)
1104 XLAT(SCTP_FRAGMENT_INTERLEAVE),
1106 #if defined(SCTP_PARTIAL_DELIVERY_POINT)
1107 XLAT(SCTP_PARTIAL_DELIVERY_POINT),
1109 #if defined(SCTP_MAX_BURST)
1110 XLAT(SCTP_MAX_BURST),
1112 #if defined(SCTP_AUTH_CHUNK)
1113 XLAT(SCTP_AUTH_CHUNK),
1115 #if defined(SCTP_HMAC_IDENT)
1116 XLAT(SCTP_HMAC_IDENT),
1118 #if defined(SCTP_AUTH_KEY)
1119 XLAT(SCTP_AUTH_KEY),
1121 #if defined(SCTP_AUTH_ACTIVE_KEY)
1122 XLAT(SCTP_AUTH_ACTIVE_KEY),
1124 #if defined(SCTP_AUTH_DELETE_KEY)
1125 XLAT(SCTP_AUTH_DELETE_KEY),
1127 #if defined(SCTP_PEER_AUTH_CHUNKS)
1128 XLAT(SCTP_PEER_AUTH_CHUNKS),
1130 #if defined(SCTP_LOCAL_AUTH_CHUNKS)
1131 XLAT(SCTP_LOCAL_AUTH_CHUNKS),
1133 #if defined(SCTP_GET_ASSOC_NUMBER)
1134 XLAT(SCTP_GET_ASSOC_NUMBER),
1137 /* linux specific things */
1138 #if defined(SCTP_SOCKOPT_BINDX_ADD)
1139 XLAT(SCTP_SOCKOPT_BINDX_ADD),
1141 #if defined(SCTP_SOCKOPT_BINDX_REM)
1142 XLAT(SCTP_SOCKOPT_BINDX_REM),
1144 #if defined(SCTP_SOCKOPT_PEELOFF)
1145 XLAT(SCTP_SOCKOPT_PEELOFF),
1147 #if defined(SCTP_GET_PEER_ADDRS_NUM_OLD)
1148 XLAT(SCTP_GET_PEER_ADDRS_NUM_OLD),
1150 #if defined(SCTP_GET_PEER_ADDRS_OLD)
1151 XLAT(SCTP_GET_PEER_ADDRS_OLD),
1153 #if defined(SCTP_GET_LOCAL_ADDRS_NUM_OLD)
1154 XLAT(SCTP_GET_LOCAL_ADDRS_NUM_OLD),
1156 #if defined(SCTP_GET_LOCAL_ADDRS_OLD)
1157 XLAT(SCTP_GET_LOCAL_ADDRS_OLD),
1159 #if defined(SCTP_SOCKOPT_CONNECTX_OLD)
1160 XLAT(SCTP_SOCKOPT_CONNECTX_OLD),
1162 #if defined(SCTP_GET_PEER_ADDRS)
1163 XLAT(SCTP_GET_PEER_ADDRS),
1165 #if defined(SCTP_GET_LOCAL_ADDRS)
1166 XLAT(SCTP_GET_LOCAL_ADDRS),
1173 #if !defined(SOL_TCP) && defined(IPPROTO_TCP)
1174 #define SOL_TCP IPPROTO_TCP
1178 static const struct xlat socktcpoptions[] = {
1187 #ifdef TCP_KEEPINTVL
1188 XLAT(TCP_KEEPINTVL),
1199 #ifdef TCP_DEFER_ACCEPT
1200 XLAT(TCP_DEFER_ACCEPT),
1202 #ifdef TCP_WINDOW_CLAMP
1203 XLAT(TCP_WINDOW_CLAMP),
1211 #ifdef TCP_CONGESTION
1212 XLAT(TCP_CONGESTION),
1217 #ifdef TCP_COOKIE_TRANSACTIONS
1218 XLAT(TCP_COOKIE_TRANSACTIONS),
1220 #ifdef TCP_THIN_LINEAR_TIMEOUTS
1221 XLAT(TCP_THIN_LINEAR_TIMEOUTS),
1223 #ifdef TCP_THIN_DUPACK
1224 XLAT(TCP_THIN_DUPACK),
1226 #ifdef TCP_USER_TIMEOUT
1227 XLAT(TCP_USER_TIMEOUT),
1232 #ifdef TCP_REPAIR_QUEUE
1233 XLAT(TCP_REPAIR_QUEUE),
1235 #ifdef TCP_QUEUE_SEQ
1236 XLAT(TCP_QUEUE_SEQ),
1238 #ifdef TCP_REPAIR_OPTIONS
1239 XLAT(TCP_REPAIR_OPTIONS),
1244 #ifdef TCP_TIMESTAMP
1245 XLAT(TCP_TIMESTAMP),
1249 #endif /* SOL_TCP */
1252 static const struct xlat icmpfilterflags[] = {
1253 #if defined(ICMP_ECHOREPLY)
1254 { (1<<ICMP_ECHOREPLY), "ICMP_ECHOREPLY" },
1256 #if defined(ICMP_DEST_UNREACH)
1257 { (1<<ICMP_DEST_UNREACH), "ICMP_DEST_UNREACH" },
1259 #if defined(ICMP_SOURCE_QUENCH)
1260 { (1<<ICMP_SOURCE_QUENCH), "ICMP_SOURCE_QUENCH" },
1262 #if defined(ICMP_REDIRECT)
1263 { (1<<ICMP_REDIRECT), "ICMP_REDIRECT" },
1265 #if defined(ICMP_ECHO)
1266 { (1<<ICMP_ECHO), "ICMP_ECHO" },
1268 #if defined(ICMP_TIME_EXCEEDED)
1269 { (1<<ICMP_TIME_EXCEEDED), "ICMP_TIME_EXCEEDED" },
1271 #if defined(ICMP_PARAMETERPROB)
1272 { (1<<ICMP_PARAMETERPROB), "ICMP_PARAMETERPROB" },
1274 #if defined(ICMP_TIMESTAMP)
1275 { (1<<ICMP_TIMESTAMP), "ICMP_TIMESTAMP" },
1277 #if defined(ICMP_TIMESTAMPREPLY)
1278 { (1<<ICMP_TIMESTAMPREPLY), "ICMP_TIMESTAMPREPLY" },
1280 #if defined(ICMP_INFO_REQUEST)
1281 { (1<<ICMP_INFO_REQUEST), "ICMP_INFO_REQUEST" },
1283 #if defined(ICMP_INFO_REPLY)
1284 { (1<<ICMP_INFO_REPLY), "ICMP_INFO_REPLY" },
1286 #if defined(ICMP_ADDRESS)
1287 { (1<<ICMP_ADDRESS), "ICMP_ADDRESS" },
1289 #if defined(ICMP_ADDRESSREPLY)
1290 { (1<<ICMP_ADDRESSREPLY), "ICMP_ADDRESSREPLY" },
1294 #endif /* SOL_RAW */
1296 #if defined(AF_PACKET) /* from e.g. linux/if_packet.h */
1297 static const struct xlat af_packet_types[] = {
1298 #if defined(PACKET_HOST)
1301 #if defined(PACKET_BROADCAST)
1302 XLAT(PACKET_BROADCAST),
1304 #if defined(PACKET_MULTICAST)
1305 XLAT(PACKET_MULTICAST),
1307 #if defined(PACKET_OTHERHOST)
1308 XLAT(PACKET_OTHERHOST),
1310 #if defined(PACKET_OUTGOING)
1311 XLAT(PACKET_OUTGOING),
1313 #if defined(PACKET_LOOPBACK)
1314 XLAT(PACKET_LOOPBACK),
1316 #if defined(PACKET_FASTROUTE)
1317 XLAT(PACKET_FASTROUTE),
1321 #endif /* defined(AF_PACKET) */
1324 printsock(struct tcb *tcp, long addr, int addrlen)
1329 struct sockaddr_in sin;
1330 struct sockaddr_un sau;
1331 #ifdef HAVE_INET_NTOP
1332 struct sockaddr_in6 sa6;
1335 struct sockaddr_ipx sipx;
1338 struct sockaddr_ll ll;
1341 struct sockaddr_nl nl;
1344 char string_addr[100];
1350 if (!verbose(tcp)) {
1351 tprintf("%#lx", addr);
1355 if (addrlen < 2 || addrlen > sizeof(addrbuf))
1356 addrlen = sizeof(addrbuf);
1358 memset(&addrbuf, 0, sizeof(addrbuf));
1359 if (umoven(tcp, addr, addrlen, addrbuf.pad) < 0) {
1363 addrbuf.pad[sizeof(addrbuf.pad) - 1] = '\0';
1365 tprints("{sa_family=");
1366 printxval(addrfams, addrbuf.sa.sa_family, "AF_???");
1369 switch (addrbuf.sa.sa_family) {
1373 } else if (addrbuf.sau.sun_path[0]) {
1374 tprints("sun_path=");
1375 printpathn(tcp, addr + 2, strlen(addrbuf.sau.sun_path));
1377 tprints("sun_path=@");
1378 printpathn(tcp, addr + 3, strlen(addrbuf.sau.sun_path + 1));
1382 tprintf("sin_port=htons(%u), sin_addr=inet_addr(\"%s\")",
1383 ntohs(addrbuf.sin.sin_port), inet_ntoa(addrbuf.sin.sin_addr));
1385 #ifdef HAVE_INET_NTOP
1387 inet_ntop(AF_INET6, &addrbuf.sa6.sin6_addr, string_addr, sizeof(string_addr));
1388 tprintf("sin6_port=htons(%u), inet_pton(AF_INET6, \"%s\", &sin6_addr), sin6_flowinfo=%u",
1389 ntohs(addrbuf.sa6.sin6_port), string_addr,
1390 addrbuf.sa6.sin6_flowinfo);
1391 #ifdef HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID
1393 #if defined(HAVE_IF_INDEXTONAME) && defined(IN6_IS_ADDR_LINKLOCAL) && defined(IN6_IS_ADDR_MC_LINKLOCAL)
1394 int numericscope = 0;
1395 if (IN6_IS_ADDR_LINKLOCAL(&addrbuf.sa6.sin6_addr)
1396 || IN6_IS_ADDR_MC_LINKLOCAL(&addrbuf.sa6.sin6_addr)) {
1397 char scopebuf[IFNAMSIZ + 1];
1399 if (if_indextoname(addrbuf.sa6.sin6_scope_id, scopebuf) == NULL)
1402 tprintf(", sin6_scope_id=if_nametoindex(\"%s\")", scopebuf);
1408 tprintf(", sin6_scope_id=%u", addrbuf.sa6.sin6_scope_id);
1417 tprintf("sipx_port=htons(%u), ",
1418 ntohs(addrbuf.sipx.sipx_port));
1419 /* Yes, I know, this does not look too
1420 * strace-ish, but otherwise the IPX
1421 * addresses just look monstrous...
1422 * Anyways, feel free if you don't like
1425 tprintf("%08lx:", (unsigned long)ntohl(addrbuf.sipx.sipx_network));
1426 for (i = 0; i < IPX_NODE_LEN; i++)
1427 tprintf("%02x", addrbuf.sipx.sipx_node[i]);
1428 tprintf("/[%02x]", addrbuf.sipx.sipx_type);
1436 tprintf("proto=%#04x, if%d, pkttype=",
1437 ntohs(addrbuf.ll.sll_protocol),
1438 addrbuf.ll.sll_ifindex);
1439 printxval(af_packet_types, addrbuf.ll.sll_pkttype, "?");
1440 tprintf(", addr(%d)={%d, ",
1441 addrbuf.ll.sll_halen,
1442 addrbuf.ll.sll_hatype);
1443 for (i = 0; i < addrbuf.ll.sll_halen; i++)
1444 tprintf("%02x", addrbuf.ll.sll_addr[i]);
1448 #endif /* AF_PACKET */
1451 tprintf("pid=%d, groups=%08x", addrbuf.nl.nl_pid, addrbuf.nl.nl_groups);
1453 #endif /* AF_NETLINK */
1454 /* AF_AX25 AF_APPLETALK AF_NETROM AF_BRIDGE AF_AAL5
1455 AF_X25 AF_ROSE etc. still need to be done */
1458 tprints("sa_data=");
1459 printstr(tcp, (long) &((struct sockaddr *) addr)->sa_data,
1460 sizeof addrbuf.sa.sa_data);
1467 static const struct xlat scmvals[] = {
1471 #ifdef SCM_CREDENTIALS
1472 XLAT(SCM_CREDENTIALS),
1478 printcmsghdr(struct tcb *tcp, unsigned long addr, unsigned long len)
1480 struct cmsghdr *cmsg = len < sizeof(struct cmsghdr) ?
1482 if (cmsg == NULL || umoven(tcp, addr, len, (char *) cmsg) < 0) {
1483 tprintf(", msg_control=%#lx", addr);
1488 tprintf(", {cmsg_len=%u, cmsg_level=", (unsigned) cmsg->cmsg_len);
1489 printxval(socketlayers, cmsg->cmsg_level, "SOL_???");
1490 tprints(", cmsg_type=");
1492 if (cmsg->cmsg_level == SOL_SOCKET) {
1493 unsigned long cmsg_len;
1495 printxval(scmvals, cmsg->cmsg_type, "SCM_???");
1496 cmsg_len = (len < cmsg->cmsg_len) ? len : cmsg->cmsg_len;
1498 if (cmsg->cmsg_type == SCM_RIGHTS
1499 && CMSG_LEN(sizeof(int)) <= cmsg_len) {
1500 int *fds = (int *) CMSG_DATA(cmsg);
1504 while ((char *) fds < ((char *) cmsg + cmsg_len)) {
1507 tprintf("%d", *fds++);
1514 if (cmsg->cmsg_type == SCM_CREDENTIALS
1515 && CMSG_LEN(sizeof(struct ucred)) <= cmsg_len) {
1516 struct ucred *uc = (struct ucred *) CMSG_DATA(cmsg);
1518 tprintf("{pid=%ld, uid=%ld, gid=%ld}}",
1519 (long)uc->pid, (long)uc->uid, (long)uc->gid);
1529 do_msghdr(struct tcb *tcp, struct msghdr *msg, unsigned long data_size)
1531 tprintf("{msg_name(%d)=", msg->msg_namelen);
1532 printsock(tcp, (long)msg->msg_name, msg->msg_namelen);
1534 tprintf(", msg_iov(%lu)=", (unsigned long)msg->msg_iovlen);
1535 tprint_iov_upto(tcp, (unsigned long)msg->msg_iovlen,
1536 (unsigned long)msg->msg_iov, 1, data_size);
1538 #ifdef HAVE_STRUCT_MSGHDR_MSG_CONTROL
1539 tprintf(", msg_controllen=%lu", (unsigned long)msg->msg_controllen);
1540 if (msg->msg_controllen)
1541 printcmsghdr(tcp, (unsigned long) msg->msg_control,
1542 msg->msg_controllen);
1543 tprints(", msg_flags=");
1544 printflags(msg_flags, msg->msg_flags, "MSG_???");
1545 #else /* !HAVE_STRUCT_MSGHDR_MSG_CONTROL */
1546 tprintf("msg_accrights=%#lx, msg_accrightslen=%u",
1547 (unsigned long) msg->msg_accrights, msg->msg_accrightslen);
1548 #endif /* !HAVE_STRUCT_MSGHDR_MSG_CONTROL */
1553 uint32_t /* void* */ msg_name;
1554 uint32_t /* socklen_t */msg_namelen;
1555 uint32_t /* iovec* */ msg_iov;
1556 uint32_t /* size_t */ msg_iovlen;
1557 uint32_t /* void* */ msg_control;
1558 uint32_t /* size_t */ msg_controllen;
1559 uint32_t /* int */ msg_flags;
1562 struct msghdr32 msg_hdr;
1563 uint32_t /* unsigned */ msg_len;
1567 printmsghdr(struct tcb *tcp, long addr, unsigned long data_size)
1571 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
1572 if (current_wordsize == 4) {
1573 struct msghdr32 msg32;
1575 if (umove(tcp, addr, &msg32) < 0) {
1576 tprintf("%#lx", addr);
1579 msg.msg_name = (void*)(long)msg32.msg_name;
1580 msg.msg_namelen = msg32.msg_namelen;
1581 msg.msg_iov = (void*)(long)msg32.msg_iov;
1582 msg.msg_iovlen = msg32.msg_iovlen;
1583 msg.msg_control = (void*)(long)msg32.msg_control;
1584 msg.msg_controllen = msg32.msg_controllen;
1585 msg.msg_flags = msg32.msg_flags;
1588 if (umove(tcp, addr, &msg) < 0) {
1589 tprintf("%#lx", addr);
1592 do_msghdr(tcp, &msg, data_size);
1596 printmmsghdr(struct tcb *tcp, long addr, unsigned int idx, unsigned long msg_len)
1599 struct msghdr msg_hdr;
1603 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
1604 if (current_wordsize == 4) {
1605 struct mmsghdr32 mmsg32;
1607 addr += sizeof(mmsg32) * idx;
1608 if (umove(tcp, addr, &mmsg32) < 0) {
1609 tprintf("%#lx", addr);
1612 mmsg.msg_hdr.msg_name = (void*)(long)mmsg32.msg_hdr.msg_name;
1613 mmsg.msg_hdr.msg_namelen = mmsg32.msg_hdr.msg_namelen;
1614 mmsg.msg_hdr.msg_iov = (void*)(long)mmsg32.msg_hdr.msg_iov;
1615 mmsg.msg_hdr.msg_iovlen = mmsg32.msg_hdr.msg_iovlen;
1616 mmsg.msg_hdr.msg_control = (void*)(long)mmsg32.msg_hdr.msg_control;
1617 mmsg.msg_hdr.msg_controllen = mmsg32.msg_hdr.msg_controllen;
1618 mmsg.msg_hdr.msg_flags = mmsg32.msg_hdr.msg_flags;
1619 mmsg.msg_len = mmsg32.msg_len;
1623 addr += sizeof(mmsg) * idx;
1624 if (umove(tcp, addr, &mmsg) < 0) {
1625 tprintf("%#lx", addr);
1630 do_msghdr(tcp, &mmsg.msg_hdr, msg_len ? msg_len : mmsg.msg_len);
1631 tprintf(", %u}", mmsg.msg_len);
1635 decode_mmsg(struct tcb *tcp, unsigned long msg_len)
1638 if (syserror(tcp)) {
1639 tprintf("%#lx", tcp->u_arg[1]);
1641 unsigned int len = tcp->u_rval;
1645 for (i = 0; i < len; ++i) {
1648 printmmsghdr(tcp, tcp->u_arg[1], i, msg_len);
1653 tprintf(", %u, ", (unsigned int) tcp->u_arg[2]);
1655 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1658 #endif /* HAVE_SENDMSG */
1661 * low bits of the socket type define real socket type,
1662 * other bits are socket type flags.
1665 tprint_sock_type(struct tcb *tcp, int flags)
1667 const char *str = xlookup(socktypes, flags & SOCK_TYPE_MASK);
1671 flags &= ~SOCK_TYPE_MASK;
1676 printflags(sock_type_flags, flags, "SOCK_???");
1680 sys_socket(struct tcb *tcp)
1682 if (entering(tcp)) {
1683 printxval(domains, tcp->u_arg[0], "PF_???");
1685 tprint_sock_type(tcp, tcp->u_arg[1]);
1687 switch (tcp->u_arg[0]) {
1692 printxval(protocols, tcp->u_arg[2], "IPPROTO_???");
1696 /* BTW: I don't believe this.. */
1698 printxval(domains, tcp->u_arg[2], "PF_???");
1703 tprintf("%lu", tcp->u_arg[2]);
1711 sys_bind(struct tcb *tcp)
1713 if (entering(tcp)) {
1714 printfd(tcp, tcp->u_arg[0]);
1716 printsock(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1717 tprintf(", %lu", tcp->u_arg[2]);
1723 sys_connect(struct tcb *tcp)
1725 return sys_bind(tcp);
1729 sys_listen(struct tcb *tcp)
1731 if (entering(tcp)) {
1732 printfd(tcp, tcp->u_arg[0]);
1734 tprintf("%lu", tcp->u_arg[1]);
1740 do_accept(struct tcb *tcp, int flags_arg)
1742 if (entering(tcp)) {
1743 printfd(tcp, tcp->u_arg[0]);
1748 tprintf("%#lx, NULL", tcp->u_arg[1]);
1751 if (tcp->u_arg[1] == 0 || syserror(tcp)
1752 || umove(tcp, tcp->u_arg[2], &len) < 0) {
1753 tprintf("%#lx", tcp->u_arg[1]);
1755 printsock(tcp, tcp->u_arg[1], len);
1758 printnum_int(tcp, tcp->u_arg[2], "%u");
1760 if (flags_arg >= 0) {
1762 printflags(sock_type_flags, tcp->u_arg[flags_arg],
1769 sys_accept(struct tcb *tcp)
1771 return do_accept(tcp, -1);
1775 sys_accept4(struct tcb *tcp)
1777 return do_accept(tcp, 3);
1781 sys_send(struct tcb *tcp)
1783 if (entering(tcp)) {
1784 printfd(tcp, tcp->u_arg[0]);
1786 printstr(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1787 tprintf(", %lu, ", tcp->u_arg[2]);
1789 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1795 sys_sendto(struct tcb *tcp)
1797 if (entering(tcp)) {
1798 printfd(tcp, tcp->u_arg[0]);
1800 printstr(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1801 tprintf(", %lu, ", tcp->u_arg[2]);
1803 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1806 printsock(tcp, tcp->u_arg[4], tcp->u_arg[5]);
1808 tprintf(", %lu", tcp->u_arg[5]);
1816 sys_sendmsg(struct tcb *tcp)
1818 if (entering(tcp)) {
1819 printfd(tcp, tcp->u_arg[0]);
1821 printmsghdr(tcp, tcp->u_arg[1], (unsigned long) -1L);
1824 printflags(msg_flags, tcp->u_arg[2], "MSG_???");
1830 sys_sendmmsg(struct tcb *tcp)
1832 if (entering(tcp)) {
1834 printfd(tcp, tcp->u_arg[0]);
1836 if (!verbose(tcp)) {
1837 tprintf("%#lx, %u, ",
1838 tcp->u_arg[1], (unsigned int) tcp->u_arg[2]);
1839 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1843 decode_mmsg(tcp, (unsigned long) -1L);
1848 #endif /* HAVE_SENDMSG */
1851 sys_recv(struct tcb *tcp)
1853 if (entering(tcp)) {
1854 printfd(tcp, tcp->u_arg[0]);
1858 tprintf("%#lx", tcp->u_arg[1]);
1860 printstr(tcp, tcp->u_arg[1], tcp->u_rval);
1862 tprintf(", %lu, ", tcp->u_arg[2]);
1863 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1869 sys_recvfrom(struct tcb *tcp)
1873 if (entering(tcp)) {
1874 printfd(tcp, tcp->u_arg[0]);
1877 if (syserror(tcp)) {
1878 tprintf("%#lx, %lu, %lu, %#lx, %#lx",
1879 tcp->u_arg[1], tcp->u_arg[2], tcp->u_arg[3],
1880 tcp->u_arg[4], tcp->u_arg[5]);
1884 printstr(tcp, tcp->u_arg[1], tcp->u_rval);
1886 tprintf(", %lu, ", tcp->u_arg[2]);
1888 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1889 /* from address, len */
1890 if (!tcp->u_arg[4] || !tcp->u_arg[5]) {
1891 if (tcp->u_arg[4] == 0)
1894 tprintf(", %#lx", tcp->u_arg[4]);
1895 if (tcp->u_arg[5] == 0)
1898 tprintf(", %#lx", tcp->u_arg[5]);
1901 if (umove(tcp, tcp->u_arg[5], &fromlen) < 0) {
1902 tprints(", {...}, [?]");
1906 printsock(tcp, tcp->u_arg[4], tcp->u_arg[5]);
1908 tprintf(", [%u]", fromlen);
1916 sys_recvmsg(struct tcb *tcp)
1918 if (entering(tcp)) {
1919 printfd(tcp, tcp->u_arg[0]);
1922 if (syserror(tcp) || !verbose(tcp))
1923 tprintf("%#lx", tcp->u_arg[1]);
1925 printmsghdr(tcp, tcp->u_arg[1], tcp->u_rval);
1928 printflags(msg_flags, tcp->u_arg[2], "MSG_???");
1934 sys_recvmmsg(struct tcb *tcp)
1936 /* +5 chars are for "left " prefix */
1937 static char str[5 + TIMESPEC_TEXT_BUFSIZE];
1939 if (entering(tcp)) {
1940 printfd(tcp, tcp->u_arg[0]);
1943 sprint_timespec(str, tcp, tcp->u_arg[4]);
1944 /* Abusing tcp->auxstr as temp storage.
1945 * Will be used and freed on syscall exit.
1947 tcp->auxstr = strdup(str);
1949 tprintf("%#lx, %ld, ", tcp->u_arg[1], tcp->u_arg[2]);
1950 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1952 print_timespec(tcp, tcp->u_arg[4]);
1957 decode_mmsg(tcp, 0);
1958 /* timeout on entrance */
1959 tprintf(", %s", tcp->auxstr ? tcp->auxstr : "{...}");
1960 free((void *) tcp->auxstr);
1965 if (tcp->u_rval == 0) {
1966 tcp->auxstr = "Timeout";
1971 /* timeout on exit */
1972 sprint_timespec(stpcpy(str, "left "), tcp, tcp->u_arg[4]);
1978 #endif /* HAVE_SENDMSG */
1980 static const struct xlat shutdown_modes[] = {
1988 sys_shutdown(struct tcb *tcp)
1990 if (entering(tcp)) {
1991 printfd(tcp, tcp->u_arg[0]);
1993 printxval(shutdown_modes, tcp->u_arg[1], "SHUT_???");
1999 sys_getsockname(struct tcb *tcp)
2001 return sys_accept(tcp);
2005 sys_getpeername(struct tcb *tcp)
2007 return sys_accept(tcp);
2011 do_pipe(struct tcb *tcp, int flags_arg)
2014 if (syserror(tcp)) {
2015 tprintf("%#lx", tcp->u_arg[0]);
2017 #if !defined(SPARC) && !defined(SPARC64) && !defined(SH) && !defined(IA64)
2020 if (umoven(tcp, tcp->u_arg[0], sizeof fds, (char *) fds) < 0)
2023 tprintf("[%u, %u]", fds[0], fds[1]);
2024 #elif defined(SPARC) || defined(SPARC64) || defined(SH) || defined(IA64)
2025 tprintf("[%lu, %lu]", tcp->u_rval, getrval2(tcp));
2027 tprintf("%#lx", tcp->u_arg[0]);
2030 if (flags_arg >= 0) {
2032 printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???");
2039 sys_pipe(struct tcb *tcp)
2041 return do_pipe(tcp, -1);
2045 sys_pipe2(struct tcb *tcp)
2047 return do_pipe(tcp, 1);
2051 sys_socketpair(struct tcb *tcp)
2055 if (entering(tcp)) {
2056 printxval(domains, tcp->u_arg[0], "PF_???");
2058 tprint_sock_type(tcp, tcp->u_arg[1]);
2060 switch (tcp->u_arg[0]) {
2062 printxval(protocols, tcp->u_arg[2], "IPPROTO_???");
2066 /* BTW: I don't believe this.. */
2068 printxval(domains, tcp->u_arg[2], "PF_???");
2073 tprintf("%lu", tcp->u_arg[2]);
2077 if (syserror(tcp)) {
2078 tprintf(", %#lx", tcp->u_arg[3]);
2081 if (umoven(tcp, tcp->u_arg[3], sizeof fds, (char *) fds) < 0)
2084 tprintf(", [%u, %u]", fds[0], fds[1]);
2090 sys_getsockopt(struct tcb *tcp)
2092 if (entering(tcp)) {
2093 printfd(tcp, tcp->u_arg[0]);
2095 printxval(socketlayers, tcp->u_arg[1], "SOL_???");
2097 switch (tcp->u_arg[1]) {
2099 printxval(sockoptions, tcp->u_arg[2], "SO_???");
2103 printxval(sockipoptions, tcp->u_arg[2], "IP_???");
2108 printxval(sockipv6options, tcp->u_arg[2], "IPV6_???");
2113 printxval(sockipxoptions, tcp->u_arg[2], "IPX_???");
2118 printxval(sockpacketoptions, tcp->u_arg[2], "PACKET_???");
2123 printxval(socktcpoptions, tcp->u_arg[2], "TCP_???");
2128 printxval(socksctpoptions, tcp->u_arg[2], "SCTP_???");
2132 /* SOL_AX25 SOL_ROSE SOL_ATALK SOL_NETROM SOL_UDP SOL_DECNET SOL_X25
2133 * etc. still need work */
2135 tprintf("%lu", tcp->u_arg[2]);
2141 if (syserror(tcp) || umove(tcp, tcp->u_arg[4], &len) < 0) {
2142 tprintf("%#lx, %#lx",
2143 tcp->u_arg[3], tcp->u_arg[4]);
2147 switch (tcp->u_arg[1]) {
2149 switch (tcp->u_arg[2]) {
2152 if (len == sizeof(struct linger)) {
2153 struct linger linger;
2158 tprintf("{onoff=%d, linger=%d}, "
2169 if (len == sizeof(struct ucred)) {
2175 tprintf("{pid=%ld, uid=%ld, gid=%ld}, "
2188 switch (tcp->u_arg[2]) {
2189 #ifdef PACKET_STATISTICS
2190 case PACKET_STATISTICS:
2191 if (len == sizeof(struct tpacket_stats)) {
2192 struct tpacket_stats stats;
2197 tprintf("{packets=%u, drops=%u}, "
2210 if (len == sizeof(int)) {
2211 printnum_int(tcp, tcp->u_arg[3], "%d");
2214 printstr(tcp, tcp->u_arg[3], len);
2216 tprintf(", [%d]", len);
2221 #if defined(ICMP_FILTER)
2222 static void printicmpfilter(struct tcb *tcp, long addr)
2224 struct icmp_filter filter;
2230 if (syserror(tcp) || !verbose(tcp)) {
2231 tprintf("%#lx", addr);
2234 if (umove(tcp, addr, &filter) < 0) {
2240 printflags(icmpfilterflags, ~filter.data, "ICMP_???");
2243 #endif /* ICMP_FILTER */
2246 printsockopt(struct tcb *tcp, int level, int name, long addr, int len)
2248 printxval(socketlayers, level, "SOL_??");
2252 printxval(sockoptions, name, "SO_???");
2254 #if defined(SO_LINGER)
2256 if (len == sizeof(struct linger)) {
2257 struct linger linger;
2258 if (umove(tcp, addr, &linger) < 0)
2260 tprintf(", {onoff=%d, linger=%d}",
2271 printxval(sockipoptions, name, "IP_???");
2276 printxval(sockipv6options, name, "IPV6_???");
2281 printxval(sockipxoptions, name, "IPX_???");
2286 printxval(sockpacketoptions, name, "PACKET_???");
2287 /* TODO: decode packate_mreq for PACKET_*_MEMBERSHIP */
2289 #ifdef PACKET_RX_RING
2290 case PACKET_RX_RING:
2292 #ifdef PACKET_TX_RING
2293 case PACKET_TX_RING:
2295 #if defined(PACKET_RX_RING) || defined(PACKET_TX_RING)
2296 if (len == sizeof(struct tpacket_req)) {
2297 struct tpacket_req req;
2298 if (umove(tcp, addr, &req) < 0)
2300 tprintf(", {block_size=%u, block_nr=%u, frame_size=%u, frame_nr=%u}",
2308 #endif /* PACKET_RX_RING || PACKET_TX_RING */
2314 printxval(socktcpoptions, name, "TCP_???");
2319 printxval(socksctpoptions, name, "SCTP_???");
2324 printxval(sockrawoptions, name, "RAW_???");
2326 #if defined(ICMP_FILTER)
2329 printicmpfilter(tcp, addr);
2336 /* SOL_AX25 SOL_ATALK SOL_NETROM SOL_UDP SOL_DECNET SOL_X25
2337 * etc. still need work */
2340 tprintf("%u", name);
2343 /* default arg printing */
2347 if (len == sizeof(int)) {
2348 printnum_int(tcp, addr, "%d");
2351 printstr(tcp, addr, len);
2357 sys_setsockopt(struct tcb *tcp)
2359 if (entering(tcp)) {
2360 printfd(tcp, tcp->u_arg[0]);
2362 printsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2],
2363 tcp->u_arg[3], tcp->u_arg[4]);
2364 tprintf(", %lu", tcp->u_arg[4]);