2 * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3 * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4 * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
5 * Copyright (c) 1996-2000 Wichert Akkerman <wichert@cistron.nl>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. The name of the author may not be used to endorse or promote products
17 * derived from this software without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
20 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
21 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
23 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
24 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
33 #include <sys/socket.h>
36 #include <netinet/in.h>
37 #ifdef HAVE_NETINET_TCP_H
38 # include <netinet/tcp.h>
40 #ifdef HAVE_NETINET_UDP_H
41 # include <netinet/udp.h>
43 #ifdef HAVE_NETINET_SCTP_H
44 # include <netinet/sctp.h>
46 #include <arpa/inet.h>
48 #include <asm/types.h>
49 #if defined(__GLIBC__)
50 # include <netipx/ipx.h>
52 # include <linux/ipx.h>
55 #if defined(HAVE_LINUX_IP_VS_H)
56 # include <linux/ip_vs.h>
58 #if defined(HAVE_LINUX_NETLINK_H)
59 # include <linux/netlink.h>
61 #if defined(HAVE_LINUX_NETFILTER_ARP_ARP_TABLES_H)
62 # include <linux/netfilter_arp/arp_tables.h>
64 #if defined(HAVE_LINUX_NETFILTER_BRIDGE_EBTABLES_H)
65 # include <linux/netfilter_bridge/ebtables.h>
67 #if defined(HAVE_LINUX_NETFILTER_IPV4_IP_TABLES_H)
68 # include <linux/netfilter_ipv4/ip_tables.h>
70 #if defined(HAVE_LINUX_NETFILTER_IPV6_IP6_TABLES_H)
71 # include <linux/netfilter_ipv6/ip6_tables.h>
73 #if defined(HAVE_LINUX_IF_PACKET_H)
74 # include <linux/if_packet.h>
76 #if defined(HAVE_LINUX_ICMP_H)
77 # include <linux/icmp.h>
79 #ifdef HAVE_BLUETOOTH_BLUETOOTH_H
80 # include <bluetooth/bluetooth.h>
81 # include <bluetooth/hci.h>
82 # include <bluetooth/l2cap.h>
83 # include <bluetooth/rfcomm.h>
84 # include <bluetooth/sco.h>
87 #include "xlat/addrfams.h"
88 #include "xlat/socktypes.h"
89 #include "xlat/sock_type_flags.h"
90 #ifndef SOCK_TYPE_MASK
91 # define SOCK_TYPE_MASK 0xf
94 #include "xlat/socketlayers.h"
96 #include "xlat/inet_protocols.h"
99 # if !defined NETLINK_SOCK_DIAG && defined NETLINK_INET_DIAG
100 # define NETLINK_SOCK_DIAG NETLINK_INET_DIAG
102 # include "xlat/netlink_protocols.h"
105 #if defined(HAVE_BLUETOOTH_BLUETOOTH_H)
106 # include "xlat/bt_protocols.h"
109 #include "xlat/msg_flags.h"
111 #if defined(AF_PACKET) /* from e.g. linux/if_packet.h */
112 # include "xlat/af_packet_types.h"
116 print_ifindex(unsigned int ifindex)
118 #ifdef HAVE_IF_INDEXTONAME
119 char buf[IFNAMSIZ + 1];
121 if (if_indextoname(ifindex, buf)) {
122 tprints("if_nametoindex(");
123 print_quoted_string(buf, sizeof(buf), QUOTE_0_TERMINATED);
128 tprintf("%u", ifindex);
134 struct sockaddr_in sin;
135 struct sockaddr_un sau;
136 #ifdef HAVE_INET_NTOP
137 struct sockaddr_in6 sa6;
140 struct sockaddr_ipx sipx;
143 struct sockaddr_ll ll;
146 struct sockaddr_nl nl;
148 #ifdef HAVE_BLUETOOTH_BLUETOOTH_H
149 struct sockaddr_hci hci;
150 struct sockaddr_l2 l2;
151 struct sockaddr_rc rc;
152 struct sockaddr_sco sco;
157 print_sockaddr(struct tcb *tcp, const sockaddr_buf_t *addr, const int addrlen)
159 tprints("{sa_family=");
160 printxval(addrfams, addr->sa.sa_family, "AF_???");
163 switch (addr->sa.sa_family) {
167 } else if (addr->sau.sun_path[0]) {
168 tprints("sun_path=");
169 print_quoted_string(addr->sau.sun_path,
170 sizeof(addr->sau.sun_path) + 1,
173 tprints("sun_path=@");
174 print_quoted_string(addr->sau.sun_path + 1,
175 sizeof(addr->sau.sun_path),
180 tprintf("sin_port=htons(%u), sin_addr=inet_addr(\"%s\")",
181 ntohs(addr->sin.sin_port), inet_ntoa(addr->sin.sin_addr));
183 #ifdef HAVE_INET_NTOP
186 char string_addr[100];
187 inet_ntop(AF_INET6, &addr->sa6.sin6_addr,
188 string_addr, sizeof(string_addr));
189 tprintf("sin6_port=htons(%u), inet_pton(AF_INET6"
190 ", \"%s\", &sin6_addr), sin6_flowinfo=%u",
191 ntohs(addr->sa6.sin6_port), string_addr,
192 addr->sa6.sin6_flowinfo);
193 # ifdef HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID
194 tprints(", sin6_scope_id=");
195 # if defined IN6_IS_ADDR_LINKLOCAL && defined IN6_IS_ADDR_MC_LINKLOCAL
196 if (IN6_IS_ADDR_LINKLOCAL(&addr->sa6.sin6_addr)
197 || IN6_IS_ADDR_MC_LINKLOCAL(&addr->sa6.sin6_addr))
198 print_ifindex(addr->sa6.sin6_scope_id);
201 tprintf("%u", addr->sa6.sin6_scope_id);
202 # endif /* HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID */
210 tprintf("sipx_port=htons(%u), ",
211 ntohs(addr->sipx.sipx_port));
212 /* Yes, I know, this does not look too
213 * strace-ish, but otherwise the IPX
214 * addresses just look monstrous...
215 * Anyways, feel free if you don't like
218 tprintf("%08lx:", (unsigned long)ntohl(addr->sipx.sipx_network));
219 for (i = 0; i < IPX_NODE_LEN; i++)
220 tprintf("%02x", addr->sipx.sipx_node[i]);
221 tprintf("/[%02x]", addr->sipx.sipx_type);
229 tprintf("proto=%#04x, if%d, pkttype=",
230 ntohs(addr->ll.sll_protocol),
231 addr->ll.sll_ifindex);
232 printxval(af_packet_types, addr->ll.sll_pkttype, "PACKET_???");
233 tprintf(", addr(%d)={%d, ",
235 addr->ll.sll_hatype);
236 for (i = 0; i < addr->ll.sll_halen; i++)
237 tprintf("%02x", addr->ll.sll_addr[i]);
241 #endif /* AF_PACKET */
244 tprintf("pid=%d, groups=%08x", addr->nl.nl_pid, addr->nl.nl_groups);
246 #endif /* AF_NETLINK */
247 #if defined(AF_BLUETOOTH) && defined(HAVE_BLUETOOTH_BLUETOOTH_H)
249 tprintf("{sco_bdaddr=%02X:%02X:%02X:%02X:%02X:%02X} or "
250 "{rc_bdaddr=%02X:%02X:%02X:%02X:%02X:%02X, rc_channel=%d} or "
251 "{l2_psm=htobs(%d), l2_bdaddr=%02X:%02X:%02X:%02X:%02X:%02X, l2_cid=htobs(%d)} or "
252 "{hci_dev=htobs(%d)}",
253 addr->sco.sco_bdaddr.b[0], addr->sco.sco_bdaddr.b[1],
254 addr->sco.sco_bdaddr.b[2], addr->sco.sco_bdaddr.b[3],
255 addr->sco.sco_bdaddr.b[4], addr->sco.sco_bdaddr.b[5],
256 addr->rc.rc_bdaddr.b[0], addr->rc.rc_bdaddr.b[1],
257 addr->rc.rc_bdaddr.b[2], addr->rc.rc_bdaddr.b[3],
258 addr->rc.rc_bdaddr.b[4], addr->rc.rc_bdaddr.b[5],
260 btohs(addr->l2.l2_psm), addr->l2.l2_bdaddr.b[0],
261 addr->l2.l2_bdaddr.b[1], addr->l2.l2_bdaddr.b[2],
262 addr->l2.l2_bdaddr.b[3], addr->l2.l2_bdaddr.b[4],
263 addr->l2.l2_bdaddr.b[5], btohs(addr->l2.l2_cid),
264 btohs(addr->hci.hci_dev));
266 #endif /* AF_BLUETOOTH && HAVE_BLUETOOTH_BLUETOOTH_H */
267 /* AF_AX25 AF_APPLETALK AF_NETROM AF_BRIDGE AF_AAL5
268 AF_X25 AF_ROSE etc. still need to be done */
272 print_quoted_string(addr->sa.sa_data,
273 sizeof(addr->sa.sa_data), 0);
280 printsock(struct tcb *tcp, long addr, int addrlen)
282 sockaddr_buf_t addrbuf;
289 if (addrlen > (int) sizeof(addrbuf))
290 addrlen = sizeof(addrbuf);
292 memset(&addrbuf, 0, sizeof(addrbuf));
293 if (umoven_or_printaddr(tcp, addr, addrlen, addrbuf.pad))
295 addrbuf.pad[sizeof(addrbuf.pad) - 1] = '\0';
297 print_sockaddr(tcp, &addrbuf, addrlen);
300 #include "xlat/scmvals.h"
301 #include "xlat/ip_cmsg_types.h"
303 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
313 struct cmsghdr *cmsg;
314 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
315 struct cmsghdr32 *cmsg32;
320 print_scm_rights(struct tcb *tcp, const void *cmsg_data,
321 const size_t data_len)
323 const int *fds = cmsg_data;
324 const char *end = (const char *) cmsg_data + data_len;
327 if (sizeof(*fds) > data_len)
331 while ((const char *) fds < end) {
336 printfd(tcp, *fds++);
342 print_scm_creds(struct tcb *tcp, const void *cmsg_data,
343 const size_t data_len)
345 const struct ucred *uc = cmsg_data;
347 if (sizeof(*uc) > data_len)
350 tprintf(", {pid=%u, uid=%u, gid=%u}",
351 (unsigned) uc->pid, (unsigned) uc->uid, (unsigned) uc->gid);
355 print_scm_security(struct tcb *tcp, const void *cmsg_data,
356 const size_t data_len)
362 print_quoted_string(cmsg_data, data_len, 0);
366 print_cmsg_ip_pktinfo(struct tcb *tcp, const void *cmsg_data,
367 const size_t data_len)
369 const struct in_pktinfo *info = cmsg_data;
371 if (sizeof(*info) > data_len)
374 tprints(", {ipi_ifindex=");
375 print_ifindex(info->ipi_ifindex);
376 tprintf(", ipi_spec_dst=inet_addr(\"%s\"), ipi_addr=inet_addr(\"%s\")}",
377 inet_ntoa(info->ipi_spec_dst), inet_ntoa(info->ipi_addr));
381 print_cmsg_ip_ttl(struct tcb *tcp, const void *cmsg_data,
382 const size_t data_len)
384 const unsigned int *ttl = cmsg_data;
386 if (sizeof(*ttl) > data_len)
389 tprintf(", {ttl=%u}", *ttl);
393 print_cmsg_ip_tos(struct tcb *tcp, const void *cmsg_data,
394 const size_t data_len)
396 const uint8_t *tos = cmsg_data;
398 if (sizeof(*tos) > data_len)
401 tprintf(", {tos=%x}", *tos);
405 print_cmsg_ip_checksum(struct tcb *tcp, const void *cmsg_data,
406 const size_t data_len)
408 const uint32_t *csum = cmsg_data;
410 if (sizeof(*csum) > data_len)
413 tprintf(", {csum=%u}", *csum);
417 print_cmsg_ip_opts(struct tcb *tcp, const void *cmsg_data,
418 const size_t data_len)
420 const unsigned char *opts = cmsg_data;
426 tprints(", {opts=0x");
427 for (i = 0; i < data_len; ++i)
428 tprintf("%02x", opts[i]);
433 print_cmsg_ip_recverr(struct tcb *tcp, const void *cmsg_data,
434 const size_t data_len)
444 struct sockaddr_in offender;
447 if (sizeof(*err) > data_len)
450 tprintf(", {ee_errno=%u, ee_origin=%u, ee_type=%u, ee_code=%u"
451 ", ee_info=%u, ee_data=%u, offender=",
452 err->ee_errno, err->ee_origin, err->ee_type,
453 err->ee_code, err->ee_info, err->ee_data);
454 print_sockaddr(tcp, (const void *) &err->offender,
455 sizeof(err->offender));
460 print_cmsg_ip_origdstaddr(struct tcb *tcp, const void *cmsg_data,
461 const size_t data_len)
463 if (sizeof(struct sockaddr_in) > data_len)
467 print_sockaddr(tcp, cmsg_data, data_len);
471 print_cmsg_type_data(struct tcb *tcp, const int cmsg_level, const int cmsg_type,
472 const void *cmsg_data, const size_t data_len)
474 switch (cmsg_level) {
476 printxval(scmvals, cmsg_type, "SCM_???");
479 print_scm_rights(tcp, cmsg_data, data_len);
481 case SCM_CREDENTIALS:
482 print_scm_creds(tcp, cmsg_data, data_len);
485 print_scm_security(tcp, cmsg_data, data_len);
490 printxval(ip_cmsg_types, cmsg_type, "IP_???");
493 print_cmsg_ip_pktinfo(tcp, cmsg_data, data_len);
496 print_cmsg_ip_ttl(tcp, cmsg_data, data_len);
499 print_cmsg_ip_tos(tcp, cmsg_data, data_len);
503 print_cmsg_ip_opts(tcp, cmsg_data, data_len);
506 print_cmsg_ip_recverr(tcp, cmsg_data, data_len);
509 print_cmsg_ip_origdstaddr(tcp, cmsg_data, data_len);
512 print_cmsg_ip_checksum(tcp, cmsg_data, data_len);
515 print_scm_security(tcp, cmsg_data, data_len);
520 tprintf("%u", cmsg_type);
525 printcmsghdr(struct tcb *tcp, unsigned long addr, size_t len)
527 const size_t cmsg_size =
528 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
529 (current_wordsize < sizeof(long)) ? sizeof(struct cmsghdr32) :
531 sizeof(struct cmsghdr);
533 char *buf = len < cmsg_size ? NULL : malloc(len);
534 if (!buf || umoven(tcp, addr, len, buf) < 0) {
535 tprints(", msg_control=");
541 union_cmsghdr u = { .ptr = buf };
544 while (len >= cmsg_size) {
546 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
547 (current_wordsize < sizeof(long)) ? u.cmsg32->cmsg_len :
551 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
552 (current_wordsize < sizeof(long)) ? u.cmsg32->cmsg_level :
556 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
557 (current_wordsize < sizeof(long)) ? u.cmsg32->cmsg_type :
563 tprintf("{cmsg_len=%lu, cmsg_level=", (unsigned long) cmsg_len);
564 printxval(socketlayers, cmsg_level, "SOL_???");
565 tprints(", cmsg_type=");
570 print_cmsg_type_data(tcp, cmsg_level, cmsg_type,
571 (const void *) (u.ptr + cmsg_size),
572 cmsg_len > cmsg_size ? cmsg_len - cmsg_size: 0);
575 if (cmsg_len < cmsg_size) {
579 cmsg_len = (cmsg_len + current_wordsize - 1) &
580 (size_t) ~(current_wordsize - 1);
581 if (cmsg_len >= len) {
595 do_msghdr(struct tcb *tcp, struct msghdr *msg, unsigned long data_size)
597 tprintf("{msg_name(%d)=", msg->msg_namelen);
598 printsock(tcp, (long)msg->msg_name, msg->msg_namelen);
600 tprintf(", msg_iov(%lu)=", (unsigned long)msg->msg_iovlen);
601 tprint_iov_upto(tcp, (unsigned long)msg->msg_iovlen,
602 (unsigned long)msg->msg_iov, 1, data_size);
604 #ifdef HAVE_STRUCT_MSGHDR_MSG_CONTROL
605 tprintf(", msg_controllen=%lu", (unsigned long)msg->msg_controllen);
606 if (msg->msg_controllen)
607 printcmsghdr(tcp, (unsigned long) msg->msg_control,
608 msg->msg_controllen);
609 tprints(", msg_flags=");
610 printflags(msg_flags, msg->msg_flags, "MSG_???");
611 #else /* !HAVE_STRUCT_MSGHDR_MSG_CONTROL */
612 tprintf("msg_accrights=%#lx, msg_accrightslen=%u",
613 (unsigned long) msg->msg_accrights, msg->msg_accrightslen);
614 #endif /* !HAVE_STRUCT_MSGHDR_MSG_CONTROL */
619 uint32_t /* void* */ msg_name;
620 uint32_t /* socklen_t */msg_namelen;
621 uint32_t /* iovec* */ msg_iov;
622 uint32_t /* size_t */ msg_iovlen;
623 uint32_t /* void* */ msg_control;
624 uint32_t /* size_t */ msg_controllen;
625 uint32_t /* int */ msg_flags;
628 struct msghdr32 msg_hdr;
629 uint32_t /* unsigned */ msg_len;
632 #ifndef HAVE_STRUCT_MMSGHDR
634 struct msghdr msg_hdr;
639 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
641 copy_from_msghdr32(struct msghdr *to_msg, struct msghdr32 *from_msg32)
643 to_msg->msg_name = (void*)(long)from_msg32->msg_name;
644 to_msg->msg_namelen = from_msg32->msg_namelen;
645 to_msg->msg_iov = (void*)(long)from_msg32->msg_iov;
646 to_msg->msg_iovlen = from_msg32->msg_iovlen;
647 to_msg->msg_control = (void*)(long)from_msg32->msg_control;
648 to_msg->msg_controllen = from_msg32->msg_controllen;
649 to_msg->msg_flags = from_msg32->msg_flags;
654 extractmsghdr(struct tcb *tcp, long addr, struct msghdr *msg)
656 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
657 if (current_wordsize == 4) {
658 struct msghdr32 msg32;
660 if (umove(tcp, addr, &msg32) < 0)
662 copy_from_msghdr32(msg, &msg32);
665 if (umove(tcp, addr, msg) < 0)
671 extractmmsghdr(struct tcb *tcp, long addr, unsigned int idx, struct mmsghdr *mmsg)
673 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
674 if (current_wordsize == 4) {
675 struct mmsghdr32 mmsg32;
677 addr += sizeof(struct mmsghdr32) * idx;
678 if (umove(tcp, addr, &mmsg32) < 0)
681 copy_from_msghdr32(&mmsg->msg_hdr, &mmsg32.msg_hdr);
682 mmsg->msg_len = mmsg32.msg_len;
686 addr += sizeof(*mmsg) * idx;
687 if (umove(tcp, addr, mmsg) < 0)
694 printmsghdr(struct tcb *tcp, long addr, unsigned long data_size)
698 if (verbose(tcp) && extractmsghdr(tcp, addr, &msg))
699 do_msghdr(tcp, &msg, data_size);
705 dumpiov_in_msghdr(struct tcb *tcp, long addr, unsigned long data_size)
709 if (extractmsghdr(tcp, addr, &msg))
710 dumpiov_upto(tcp, msg.msg_iovlen, (long)msg.msg_iov, data_size);
714 printmmsghdr(struct tcb *tcp, long addr, unsigned int idx, unsigned long msg_len)
718 if (extractmmsghdr(tcp, addr, idx, &mmsg)) {
720 do_msghdr(tcp, &mmsg.msg_hdr, msg_len ? msg_len : mmsg.msg_len);
721 tprintf(", %u}", mmsg.msg_len);
728 decode_mmsg(struct tcb *tcp, unsigned long msg_len)
732 printaddr(tcp->u_arg[1]);
734 unsigned int len = tcp->u_rval;
738 for (i = 0; i < len; ++i) {
741 printmmsghdr(tcp, tcp->u_arg[1], i, msg_len);
746 tprintf(", %u, ", (unsigned int) tcp->u_arg[2]);
748 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
752 dumpiov_in_mmsghdr(struct tcb *tcp, long addr)
754 unsigned int len = tcp->u_rval;
758 for (i = 0; i < len; ++i) {
759 if (extractmmsghdr(tcp, addr, i, &mmsg)) {
760 tprintf(" = %lu buffers in vector %u\n",
761 (unsigned long)mmsg.msg_hdr.msg_iovlen, i);
762 dumpiov_upto(tcp, mmsg.msg_hdr.msg_iovlen,
763 (long)mmsg.msg_hdr.msg_iov, mmsg.msg_len);
769 * low bits of the socket type define real socket type,
770 * other bits are socket type flags.
773 tprint_sock_type(int flags)
775 const char *str = xlookup(socktypes, flags & SOCK_TYPE_MASK);
779 flags &= ~SOCK_TYPE_MASK;
784 printflags(sock_type_flags, flags, "SOCK_???");
789 printxval(addrfams, tcp->u_arg[0], "AF_???");
791 tprint_sock_type(tcp->u_arg[1]);
793 switch (tcp->u_arg[0]) {
798 printxval(inet_protocols, tcp->u_arg[2], "IPPROTO_???");
802 /* BTW: I don't believe this.. */
804 printxval(addrfams, tcp->u_arg[2], "AF_???");
810 printxval(netlink_protocols, tcp->u_arg[2], "NETLINK_???");
813 #if defined(AF_BLUETOOTH) && defined(HAVE_BLUETOOTH_BLUETOOTH_H)
815 printxval(bt_protocols, tcp->u_arg[2], "BTPROTO_???");
819 tprintf("%lu", tcp->u_arg[2]);
823 return RVAL_DECODED | RVAL_FD;
828 printfd(tcp, tcp->u_arg[0]);
830 printsock(tcp, tcp->u_arg[1], tcp->u_arg[2]);
831 tprintf(", %lu", tcp->u_arg[2]);
838 printfd(tcp, tcp->u_arg[0]);
840 tprintf("%lu", tcp->u_arg[1]);
846 do_sockname(struct tcb *tcp, int flags_arg)
849 printfd(tcp, tcp->u_arg[0]);
855 if (!tcp->u_arg[2] || !verbose(tcp) || syserror(tcp) ||
856 umove(tcp, tcp->u_arg[2], &len) < 0) {
857 printaddr(tcp->u_arg[1]);
859 printaddr(tcp->u_arg[2]);
861 printsock(tcp, tcp->u_arg[1], len);
862 tprintf(", [%d]", len);
865 if (flags_arg >= 0) {
867 printflags(sock_type_flags, tcp->u_arg[flags_arg],
875 do_sockname(tcp, -1);
887 printfd(tcp, tcp->u_arg[0]);
889 printstr(tcp, tcp->u_arg[1], tcp->u_arg[2]);
890 tprintf(", %lu, ", tcp->u_arg[2]);
892 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
899 printfd(tcp, tcp->u_arg[0]);
901 printstr(tcp, tcp->u_arg[1], tcp->u_arg[2]);
902 tprintf(", %lu, ", tcp->u_arg[2]);
904 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
907 printsock(tcp, tcp->u_arg[4], tcp->u_arg[5]);
909 tprintf(", %lu", tcp->u_arg[5]);
916 printfd(tcp, tcp->u_arg[0]);
918 printmsghdr(tcp, tcp->u_arg[1], (unsigned long) -1L);
921 printflags(msg_flags, tcp->u_arg[2], "MSG_???");
930 printfd(tcp, tcp->u_arg[0]);
933 tprintf("%#lx, %u, ",
934 tcp->u_arg[1], (unsigned int) tcp->u_arg[2]);
935 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
939 decode_mmsg(tcp, (unsigned long) -1L);
947 printfd(tcp, tcp->u_arg[0]);
951 printaddr(tcp->u_arg[1]);
953 printstr(tcp, tcp->u_arg[1], tcp->u_rval);
955 tprintf(", %lu, ", tcp->u_arg[2]);
956 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
966 printfd(tcp, tcp->u_arg[0]);
971 printaddr(tcp->u_arg[1]);
973 printstr(tcp, tcp->u_arg[1], tcp->u_rval);
976 tprintf(", %lu, ", tcp->u_arg[2]);
978 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
980 if (syserror(tcp) || !tcp->u_arg[4] || !tcp->u_arg[5] ||
981 umove(tcp, tcp->u_arg[5], &fromlen) < 0) {
982 /* from address, len */
983 printaddr(tcp->u_arg[4]);
985 printaddr(tcp->u_arg[5]);
989 printsock(tcp, tcp->u_arg[4], fromlen);
991 tprintf(", [%u]", fromlen);
999 printfd(tcp, tcp->u_arg[0]);
1003 printaddr(tcp->u_arg[1]);
1005 printmsghdr(tcp, tcp->u_arg[1], tcp->u_rval);
1008 printflags(msg_flags, tcp->u_arg[2], "MSG_???");
1015 static char str[sizeof("left") + TIMESPEC_TEXT_BUFSIZE];
1017 if (entering(tcp)) {
1018 printfd(tcp, tcp->u_arg[0]);
1021 /* Abusing tcp->auxstr as temp storage.
1022 * Will be used and cleared on syscall exit.
1024 tcp->auxstr = sprint_timespec(tcp, tcp->u_arg[4]);
1026 tprintf("%#lx, %ld, ", tcp->u_arg[1], tcp->u_arg[2]);
1027 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1029 print_timespec(tcp, tcp->u_arg[4]);
1034 decode_mmsg(tcp, 0);
1036 /* timeout on entrance */
1037 tprints(tcp->auxstr);
1042 if (tcp->u_rval == 0) {
1043 tcp->auxstr = "Timeout";
1048 /* timeout on exit */
1049 snprintf(str, sizeof(str), "left %s",
1050 sprint_timespec(tcp, tcp->u_arg[4]));
1056 #include "xlat/shutdown_modes.h"
1060 printfd(tcp, tcp->u_arg[0]);
1062 printxval(shutdown_modes, tcp->u_arg[1], "SHUT_???");
1064 return RVAL_DECODED;
1067 SYS_FUNC(getsockname)
1069 return do_sockname(tcp, -1);
1073 printpair_fd(struct tcb *tcp, const int i0, const int i1)
1083 decode_pair_fd(struct tcb *tcp, const long addr)
1087 if (umove_or_printaddr(tcp, addr, &pair))
1090 printpair_fd(tcp, pair[0], pair[1]);
1094 do_pipe(struct tcb *tcp, int flags_arg)
1097 decode_pair_fd(tcp, tcp->u_arg[0]);
1098 if (flags_arg >= 0) {
1100 printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???");
1108 #ifdef HAVE_GETRVAL2
1109 if (exiting(tcp) && !syserror(tcp))
1110 printpair_fd(tcp, tcp->u_rval, getrval2(tcp));
1113 return do_pipe(tcp, -1);
1119 return do_pipe(tcp, 1);
1122 SYS_FUNC(socketpair)
1124 if (entering(tcp)) {
1125 printxval(addrfams, tcp->u_arg[0], "AF_???");
1127 tprint_sock_type(tcp->u_arg[1]);
1128 tprintf(", %lu", tcp->u_arg[2]);
1131 decode_pair_fd(tcp, tcp->u_arg[3]);
1136 #include "xlat/sockoptions.h"
1137 #include "xlat/sockipoptions.h"
1138 #include "xlat/getsockipoptions.h"
1139 #include "xlat/setsockipoptions.h"
1140 #include "xlat/sockipv6options.h"
1141 #include "xlat/getsockipv6options.h"
1142 #include "xlat/setsockipv6options.h"
1143 #include "xlat/sockipxoptions.h"
1144 #include "xlat/sockrawoptions.h"
1145 #include "xlat/sockpacketoptions.h"
1146 #include "xlat/socksctpoptions.h"
1147 #include "xlat/socktcpoptions.h"
1150 print_sockopt_fd_level_name(struct tcb *tcp, int fd, unsigned int level,
1151 unsigned int name, bool is_getsockopt)
1155 printxval(socketlayers, level, "SOL_??");
1160 printxval(sockoptions, name, "SO_???");
1163 printxvals(name, "IP_???", sockipoptions,
1164 is_getsockopt ? getsockipoptions : setsockipoptions, NULL);
1167 printxvals(name, "IPV6_???", sockipv6options,
1168 is_getsockopt ? getsockipv6options : setsockipv6options, NULL);
1171 printxval(sockipxoptions, name, "IPX_???");
1174 printxval(sockpacketoptions, name, "PACKET_???");
1177 printxval(socktcpoptions, name, "TCP_???");
1180 printxval(socksctpoptions, name, "SCTP_???");
1183 printxval(sockrawoptions, name, "RAW_???");
1186 /* Other SOL_* protocol levels still need work. */
1189 tprintf("%u", name);
1197 print_linger(struct tcb *tcp, long addr, int len)
1199 struct linger linger;
1201 if (len != sizeof(linger) ||
1202 umove(tcp, addr, &linger) < 0) {
1207 tprintf("{onoff=%d, linger=%d}",
1211 #endif /* SO_LINGER */
1215 print_ucred(struct tcb *tcp, long addr, int len)
1219 if (len != sizeof(uc) ||
1220 umove(tcp, addr, &uc) < 0) {
1223 tprintf("{pid=%u, uid=%u, gid=%u}",
1229 #endif /* SO_PEERCRED */
1231 #ifdef PACKET_STATISTICS
1233 print_tpacket_stats(struct tcb *tcp, long addr, int len)
1235 struct tpacket_stats stats;
1237 if (len != sizeof(stats) ||
1238 umove(tcp, addr, &stats) < 0) {
1241 tprintf("{packets=%u, drops=%u}",
1246 #endif /* PACKET_STATISTICS */
1249 # include "xlat/icmpfilterflags.h"
1252 print_icmp_filter(struct tcb *tcp, long addr, int len)
1254 struct icmp_filter filter;
1256 if (len != sizeof(filter) ||
1257 umove(tcp, addr, &filter) < 0) {
1263 printflags(icmpfilterflags, ~filter.data, "ICMP_???");
1266 #endif /* ICMP_FILTER */
1269 print_getsockopt(struct tcb *tcp, unsigned int level, unsigned int name,
1272 if (addr && verbose(tcp))
1278 print_linger(tcp, addr, len);
1283 print_ucred(tcp, addr, len);
1291 #ifdef PACKET_STATISTICS
1292 case PACKET_STATISTICS:
1293 print_tpacket_stats(tcp, addr, len);
1303 print_icmp_filter(tcp, addr, len);
1310 /* default arg printing */
1313 if (len == sizeof(int)) {
1314 printnum_int(tcp, addr, "%d");
1316 printstr(tcp, addr, len);
1322 tprintf(", [%d]", len);
1325 SYS_FUNC(getsockopt)
1327 if (entering(tcp)) {
1328 print_sockopt_fd_level_name(tcp, tcp->u_arg[0],
1329 tcp->u_arg[1], tcp->u_arg[2], true);
1333 if (syserror(tcp) || umove(tcp, tcp->u_arg[4], &len) < 0) {
1334 tprintf("%#lx, %#lx",
1335 tcp->u_arg[3], tcp->u_arg[4]);
1337 print_getsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2],
1338 tcp->u_arg[3], len);
1344 #ifdef IP_ADD_MEMBERSHIP
1346 print_mreq(struct tcb *tcp, long addr, unsigned int len)
1348 struct ip_mreq mreq;
1350 if (len < sizeof(mreq)) {
1351 printstr(tcp, addr, len);
1354 if (umove_or_printaddr(tcp, addr, &mreq))
1357 tprints("{imr_multiaddr=inet_addr(");
1358 print_quoted_string(inet_ntoa(mreq.imr_multiaddr),
1359 16, QUOTE_0_TERMINATED);
1360 tprints("), imr_interface=inet_addr(");
1361 print_quoted_string(inet_ntoa(mreq.imr_interface),
1362 16, QUOTE_0_TERMINATED);
1365 #endif /* IP_ADD_MEMBERSHIP */
1367 #ifdef IPV6_ADD_MEMBERSHIP
1369 print_mreq6(struct tcb *tcp, long addr, unsigned int len)
1371 struct ipv6_mreq mreq;
1373 if (len < sizeof(mreq))
1376 if (umove_or_printaddr(tcp, addr, &mreq))
1379 #ifdef HAVE_INET_NTOP
1380 const struct in6_addr *in6 = &mreq.ipv6mr_multiaddr;
1381 char address[INET6_ADDRSTRLEN];
1383 if (!inet_ntop(AF_INET6, in6, address, sizeof(address)))
1386 tprints("{ipv6mr_multiaddr=inet_pton(");
1387 print_quoted_string(address, sizeof(address), QUOTE_0_TERMINATED);
1388 tprints("), ipv6mr_interface=");
1389 print_ifindex(mreq.ipv6mr_interface);
1392 #endif /* HAVE_INET_NTOP */
1395 printstr(tcp, addr, len);
1397 #endif /* IPV6_ADD_MEMBERSHIP */
1399 #ifdef MCAST_JOIN_GROUP
1401 print_group_req(struct tcb *tcp, long addr, int len)
1403 struct group_req greq;
1405 if (len != sizeof(greq) ||
1406 umove(tcp, addr, &greq) < 0) {
1411 tprintf("{gr_interface=%u, gr_group=", greq.gr_interface);
1412 print_sockaddr(tcp, (const void *) &greq.gr_group,
1413 sizeof(greq.gr_group));
1417 #endif /* MCAST_JOIN_GROUP */
1419 #ifdef PACKET_RX_RING
1421 print_tpacket_req(struct tcb *tcp, long addr, int len)
1423 struct tpacket_req req;
1425 if (len != sizeof(req) ||
1426 umove(tcp, addr, &req) < 0) {
1429 tprintf("{block_size=%u, block_nr=%u, "
1430 "frame_size=%u, frame_nr=%u}",
1437 #endif /* PACKET_RX_RING */
1439 #ifdef PACKET_ADD_MEMBERSHIP
1440 # include "xlat/packet_mreq_type.h"
1443 print_packet_mreq(struct tcb *tcp, long addr, int len)
1445 struct packet_mreq mreq;
1447 if (len != sizeof(mreq) ||
1448 umove(tcp, addr, &mreq) < 0) {
1453 tprintf("{mr_ifindex=%u, mr_type=", mreq.mr_ifindex);
1454 printxval(packet_mreq_type, mreq.mr_type, "PACKET_MR_???");
1455 tprintf(", mr_alen=%u, mr_address=", mreq.mr_alen);
1456 if (mreq.mr_alen > ARRAY_SIZE(mreq.mr_address))
1457 mreq.mr_alen = ARRAY_SIZE(mreq.mr_address);
1458 for (i = 0; i < mreq.mr_alen; ++i)
1459 tprintf("%02x", mreq.mr_address[i]);
1463 #endif /* PACKET_ADD_MEMBERSHIP */
1466 print_setsockopt(struct tcb *tcp, unsigned int level, unsigned int name,
1469 if (addr && verbose(tcp))
1475 print_linger(tcp, addr, len);
1483 #ifdef IP_ADD_MEMBERSHIP
1484 case IP_ADD_MEMBERSHIP:
1485 case IP_DROP_MEMBERSHIP:
1486 print_mreq(tcp, addr, len);
1488 #endif /* IP_ADD_MEMBERSHIP */
1489 #ifdef MCAST_JOIN_GROUP
1490 case MCAST_JOIN_GROUP:
1491 case MCAST_LEAVE_GROUP:
1492 print_group_req(tcp, addr, len);
1494 #endif /* MCAST_JOIN_GROUP */
1500 #ifdef IPV6_ADD_MEMBERSHIP
1501 case IPV6_ADD_MEMBERSHIP:
1502 case IPV6_DROP_MEMBERSHIP:
1503 # ifdef IPV6_JOIN_ANYCAST
1504 case IPV6_JOIN_ANYCAST:
1506 # ifdef IPV6_LEAVE_ANYCAST
1507 case IPV6_LEAVE_ANYCAST:
1509 print_mreq6(tcp, addr, len);
1511 #endif /* IPV6_ADD_MEMBERSHIP */
1517 #ifdef PACKET_RX_RING
1518 case PACKET_RX_RING:
1519 # ifdef PACKET_TX_RING
1520 case PACKET_TX_RING:
1522 print_tpacket_req(tcp, addr, len);
1524 #endif /* PACKET_RX_RING */
1525 #ifdef PACKET_ADD_MEMBERSHIP
1526 case PACKET_ADD_MEMBERSHIP:
1527 case PACKET_DROP_MEMBERSHIP:
1528 print_packet_mreq(tcp, addr, len);
1530 #endif /* PACKET_ADD_MEMBERSHIP */
1538 print_icmp_filter(tcp, addr, len);
1545 /* default arg printing */
1548 if (len == sizeof(int)) {
1549 printnum_int(tcp, addr, "%d");
1551 printstr(tcp, addr, len);
1557 tprintf(", %d", len);
1560 SYS_FUNC(setsockopt)
1562 print_sockopt_fd_level_name(tcp, tcp->u_arg[0],
1563 tcp->u_arg[1], tcp->u_arg[2], false);
1564 print_setsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2],
1565 tcp->u_arg[3], tcp->u_arg[4]);
1567 return RVAL_DECODED;