2 * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3 * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4 * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
5 * Copyright (c) 1996-2000 Wichert Akkerman <wichert@cistron.nl>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. The name of the author may not be used to endorse or promote products
17 * derived from this software without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
20 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
21 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
23 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
24 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 #include <sys/socket.h>
39 #if defined(HAVE_SIN6_SCOPE_ID_LINUX)
40 #define in6_addr in6_addr_libc
41 #define ipv6_mreq ipv6_mreq_libc
42 #define sockaddr_in6 sockaddr_in6_libc
45 #include <netinet/in.h>
46 #ifdef HAVE_NETINET_TCP_H
47 #include <netinet/tcp.h>
49 #ifdef HAVE_NETINET_UDP_H
50 #include <netinet/udp.h>
52 #include <arpa/inet.h>
55 #include <asm/types.h>
56 #if defined(__GLIBC__) && (__GLIBC__ >= 2) && (__GLIBC__ + __GLIBC_MINOR__ >= 3)
57 # include <netipx/ipx.h>
59 # include <linux/ipx.h>
63 #if defined (__GLIBC__) && (((__GLIBC__ < 2) || (__GLIBC__ == 2 && __GLIBC_MINOR__ < 1)) || defined(HAVE_SIN6_SCOPE_ID_LINUX))
64 #if defined(HAVE_LINUX_IN6_H)
65 #if defined(HAVE_SIN6_SCOPE_ID_LINUX)
69 #define in6_addr in6_addr_kernel
70 #define ipv6_mreq ipv6_mreq_kernel
71 #define sockaddr_in6 sockaddr_in6_kernel
73 #include <linux/in6.h>
74 #if defined(HAVE_SIN6_SCOPE_ID_LINUX)
78 #define in6_addr in6_addr_libc
79 #define ipv6_mreq ipv6_mreq_libc
80 #define sockaddr_in6 sockaddr_in6_kernel
85 #if defined(HAVE_SYS_UIO_H)
89 #if defined(HAVE_LINUX_NETLINK_H)
90 #include <linux/netlink.h>
93 #if defined(HAVE_LINUX_IF_PACKET_H)
94 #include <linux/if_packet.h>
97 #if defined(HAVE_LINUX_ICMP_H)
98 #include <linux/icmp.h>
102 #define PF_UNSPEC AF_UNSPEC
106 #define HAVE_SENDMSG 1 /* HACK - *FIXME* */
110 /* Under Linux these are enums so we can't test for them with ifdef. */
111 #define IPPROTO_EGP IPPROTO_EGP
112 #define IPPROTO_PUP IPPROTO_PUP
113 #define IPPROTO_IDP IPPROTO_IDP
114 #define IPPROTO_IGMP IPPROTO_IGMP
115 #define IPPROTO_RAW IPPROTO_RAW
116 #define IPPROTO_MAX IPPROTO_MAX
119 static const struct xlat domains[] = {
121 { PF_AAL5, "PF_AAL5" },
124 { PF_APPLETALK, "PF_APPLETALK" },
127 { PF_ASH, "PF_ASH" },
130 { PF_ATMPVC, "PF_ATMPVC" },
133 { PF_ATMSVC, "PF_ATMSVC" },
136 { PF_AX25, "PF_AX25" },
139 { PF_BLUETOOTH, "PF_BLUETOOTH" },
142 { PF_BRIDGE, "PF_BRIDGE" },
145 { PF_DECnet, "PF_DECnet" },
148 { PF_DECNET, "PF_DECNET" },
151 { PF_ECONET, "PF_ECONET" },
154 { PF_FILE, "PF_FILE" },
157 { PF_IMPLINK, "PF_IMPLINK" },
160 { PF_INET, "PF_INET" },
163 { PF_INET6, "PF_INET6" },
166 { PF_IPX, "PF_IPX" },
169 { PF_IRDA, "PF_IRDA" },
172 { PF_ISO, "PF_ISO" },
175 { PF_KEY, "PF_KEY" },
178 { PF_UNIX, "PF_UNIX" },
181 { PF_LOCAL, "PF_LOCAL" },
184 { PF_NETBEUI, "PF_NETBEUI" },
187 { PF_NETLINK, "PF_NETLINK" },
190 { PF_NETROM, "PF_NETROM" },
193 { PF_PACKET, "PF_PACKET" },
196 { PF_PPPOX, "PF_PPPOX" },
199 { PF_ROSE, "PF_ROSE" },
202 { PF_ROUTE, "PF_ROUTE" },
205 { PF_SECURITY, "PF_SECURITY" },
208 { PF_SNA, "PF_SNA" },
211 { PF_UNSPEC, "PF_UNSPEC" },
214 { PF_WANPIPE, "PF_WANPIPE" },
217 { PF_X25, "PF_X25" },
221 const struct xlat addrfams[] = {
223 { AF_APPLETALK, "AF_APPLETALK" },
226 { AF_ASH, "AF_ASH" },
229 { AF_ATMPVC, "AF_ATMPVC" },
232 { AF_ATMSVC, "AF_ATMSVC" },
235 { AF_AX25, "AF_AX25" },
238 { AF_BLUETOOTH, "AF_BLUETOOTH" },
241 { AF_BRIDGE, "AF_BRIDGE" },
244 { AF_DECnet, "AF_DECnet" },
247 { AF_ECONET, "AF_ECONET" },
250 { AF_FILE, "AF_FILE" },
253 { AF_IMPLINK, "AF_IMPLINK" },
256 { AF_INET, "AF_INET" },
259 { AF_INET6, "AF_INET6" },
262 { AF_IPX, "AF_IPX" },
265 { AF_IRDA, "AF_IRDA" },
268 { AF_ISO, "AF_ISO" },
271 { AF_KEY, "AF_KEY" },
274 { AF_UNIX, "AF_UNIX" },
277 { AF_LOCAL, "AF_LOCAL" },
280 { AF_NETBEUI, "AF_NETBEUI" },
283 { AF_NETLINK, "AF_NETLINK" },
286 { AF_NETROM, "AF_NETROM" },
289 { AF_PACKET, "AF_PACKET" },
292 { AF_PPPOX, "AF_PPPOX" },
295 { AF_ROSE, "AF_ROSE" },
298 { AF_ROUTE, "AF_ROUTE" },
301 { AF_SECURITY, "AF_SECURITY" },
304 { AF_SNA, "AF_SNA" },
307 { AF_UNSPEC, "AF_UNSPEC" },
310 { AF_WANPIPE, "AF_WANPIPE" },
313 { AF_X25, "AF_X25" },
317 static const struct xlat socktypes[] = {
318 { SOCK_STREAM, "SOCK_STREAM" },
319 { SOCK_DGRAM, "SOCK_DGRAM" },
321 { SOCK_RAW, "SOCK_RAW" },
323 #ifdef SOCK_SEQPACKET
324 { SOCK_SEQPACKET,"SOCK_SEQPACKET"},
327 { SOCK_RDM, "SOCK_RDM" },
330 { SOCK_PACKET, "SOCK_PACKET" },
334 static const struct xlat socketlayers[] = {
336 { SOL_IP, "SOL_IP" },
338 #if defined(SOL_ICMP)
339 { SOL_ICMP, "SOL_ICMP" },
342 { SOL_TCP, "SOL_TCP" },
345 { SOL_UDP, "SOL_UDP" },
347 #if defined(SOL_IPV6)
348 { SOL_IPV6, "SOL_IPV6" },
350 #if defined(SOL_ICMPV6)
351 { SOL_ICMPV6, "SOL_ICMPV6" },
354 { SOL_RAW, "SOL_RAW" },
357 { SOL_IPX, "SOL_IPX" },
360 { SOL_IPX, "SOL_IPX" },
362 #if defined(SOL_AX25)
363 { SOL_AX25, "SOL_AX25" },
365 #if defined(SOL_ATALK)
366 { SOL_ATALK, "SOL_ATALK" },
368 #if defined(SOL_NETROM)
369 { SOL_NETROM, "SOL_NETROM" },
371 #if defined(SOL_ROSE)
372 { SOL_ROSE, "SOL_ROSE" },
374 #if defined(SOL_DECNET)
375 { SOL_DECNET, "SOL_DECNET" },
378 { SOL_X25, "SOL_X25" },
380 #if defined(SOL_PACKET)
381 { SOL_PACKET, "SOL_PACKET" },
384 { SOL_ATM, "SOL_ATM" },
387 { SOL_AAL, "SOL_AAL" },
389 #if defined(SOL_IRDA)
390 { SOL_IRDA, "SOL_IRDA" },
392 { SOL_SOCKET, "SOL_SOCKET" }, /* Never used! */
394 /*** WARNING: DANGER WILL ROBINSON: NOTE "socketlayers" array above
395 falls into "protocols" array below!!!! This is intended!!! ***/
396 static const struct xlat protocols[] = {
397 { IPPROTO_IP, "IPPROTO_IP" },
398 { IPPROTO_ICMP, "IPPROTO_ICMP" },
399 { IPPROTO_TCP, "IPPROTO_TCP" },
400 { IPPROTO_UDP, "IPPROTO_UDP" },
402 { IPPROTO_GGP, "IPPROTO_GGP" },
405 { IPPROTO_EGP, "IPPROTO_EGP" },
408 { IPPROTO_PUP, "IPPROTO_PUP" },
411 { IPPROTO_IDP, "IPPROTO_IDP" },
414 { IPPROTO_IPV6, "IPPROTO_IPV6" },
416 #ifdef IPPROTO_ICMPV6
417 { IPPROTO_ICMPV6,"IPPROTO_ICMPV6"},
420 { IPPROTO_IGMP, "IPPROTO_IGMP" },
423 { IPPROTO_HELLO,"IPPROTO_HELLO" },
426 { IPPROTO_ND, "IPPROTO_ND" },
429 { IPPROTO_RAW, "IPPROTO_RAW" },
432 { IPPROTO_MAX, "IPPROTO_MAX" },
435 { IPPROTO_IPIP, "IPPROTO_IPIP" },
439 static const struct xlat msg_flags[] = {
440 { MSG_OOB, "MSG_OOB" },
442 { MSG_DONTROUTE, "MSG_DONTROUTE" },
445 { MSG_PEEK, "MSG_PEEK" },
448 { MSG_CTRUNC, "MSG_CTRUNC" },
451 { MSG_PROXY, "MSG_PROXY" },
454 { MSG_EOR, "MSG_EOR" },
457 { MSG_WAITALL, "MSG_WAITALL" },
460 { MSG_TRUNC, "MSG_TRUNC" },
463 { MSG_CTRUNC, "MSG_CTRUNC" },
466 { MSG_ERRQUEUE, "MSG_ERRQUEUE" },
469 { MSG_DONTWAIT, "MSG_DONTWAIT" },
472 { MSG_CONFIRM, "MSG_CONFIRM" },
475 { MSG_PROBE, "MSG_PROBE" },
478 { MSG_FIN, "MSG_FIN" },
481 { MSG_SYN, "MSG_SYN" },
484 { MSG_RST, "MSG_RST" },
487 { MSG_NOSIGNAL, "MSG_NOSIGNAL" },
490 { MSG_MORE, "MSG_MORE" },
492 #ifdef MSG_CMSG_CLOEXEC
493 { MSG_CMSG_CLOEXEC, "MSG_CMSG_CLOEXEC" },
498 static const struct xlat sockoptions[] = {
500 { SO_ACCEPTCONN, "SO_ACCEPTCONN" },
503 { SO_ALLRAW, "SO_ALLRAW" },
505 #ifdef SO_ATTACH_FILTER
506 { SO_ATTACH_FILTER, "SO_ATTACH_FILTER" },
508 #ifdef SO_BINDTODEVICE
509 { SO_BINDTODEVICE, "SO_BINDTODEVICE" },
512 { SO_BROADCAST, "SO_BROADCAST" },
515 { SO_BSDCOMPAT, "SO_BSDCOMPAT" },
518 { SO_DEBUG, "SO_DEBUG" },
520 #ifdef SO_DETACH_FILTER
521 { SO_DETACH_FILTER, "SO_DETACH_FILTER" },
524 { SO_DONTROUTE, "SO_DONTROUTE" },
527 { SO_ERROR, "SO_ERROR" },
530 { SO_ICS, "SO_ICS" },
533 { SO_IMASOCKET, "SO_IMASOCKET" },
536 { SO_KEEPALIVE, "SO_KEEPALIVE" },
539 { SO_LINGER, "SO_LINGER" },
542 { SO_LISTENING, "SO_LISTENING" },
545 { SO_MGMT, "SO_MGMT" },
548 { SO_NO_CHECK, "SO_NO_CHECK" },
551 { SO_OOBINLINE, "SO_OOBINLINE" },
554 { SO_ORDREL, "SO_ORDREL" },
556 #ifdef SO_PARALLELSVR
557 { SO_PARALLELSVR, "SO_PARALLELSVR" },
560 { SO_PASSCRED, "SO_PASSCRED" },
563 { SO_PEERCRED, "SO_PEERCRED" },
566 { SO_PEERNAME, "SO_PEERNAME" },
569 { SO_PEERSEC, "SO_PEERSEC" },
572 { SO_PRIORITY, "SO_PRIORITY" },
575 { SO_PROTOTYPE, "SO_PROTOTYPE" },
578 { SO_RCVBUF, "SO_RCVBUF" },
581 { SO_RCVLOWAT, "SO_RCVLOWAT" },
584 { SO_RCVTIMEO, "SO_RCVTIMEO" },
587 { SO_RDWR, "SO_RDWR" },
590 { SO_REUSEADDR, "SO_REUSEADDR" },
593 { SO_REUSEPORT, "SO_REUSEPORT" },
595 #ifdef SO_SECURITY_AUTHENTICATION
596 { SO_SECURITY_AUTHENTICATION,"SO_SECURITY_AUTHENTICATION"},
598 #ifdef SO_SECURITY_ENCRYPTION_NETWORK
599 { SO_SECURITY_ENCRYPTION_NETWORK,"SO_SECURITY_ENCRYPTION_NETWORK"},
601 #ifdef SO_SECURITY_ENCRYPTION_TRANSPORT
602 { SO_SECURITY_ENCRYPTION_TRANSPORT,"SO_SECURITY_ENCRYPTION_TRANSPORT"},
605 { SO_SEMA, "SO_SEMA" },
608 { SO_SNDBUF, "SO_SNDBUF" },
611 { SO_SNDLOWAT, "SO_SNDLOWAT" },
614 { SO_SNDTIMEO, "SO_SNDTIMEO" },
617 { SO_TIMESTAMP, "SO_TIMESTAMP" },
620 { SO_TYPE, "SO_TYPE" },
622 #ifdef SO_USELOOPBACK
623 { SO_USELOOPBACK, "SO_USELOOPBACK" },
628 #if !defined (SOL_IP) && defined (IPPROTO_IP)
629 #define SOL_IP IPPROTO_IP
633 static const struct xlat sockipoptions[] = {
635 { IP_TOS, "IP_TOS" },
638 { IP_TTL, "IP_TTL" },
641 { IP_HDRINCL, "IP_HDRINCL" },
644 { IP_OPTIONS, "IP_OPTIONS" },
646 #ifdef IP_ROUTER_ALERT
647 { IP_ROUTER_ALERT, "IP_ROUTER_ALERT" },
649 #ifdef IP_RECVOPTIONS
650 { IP_RECVOPTIONS, "IP_RECVOPTIONS" },
653 { IP_RECVOPTS, "IP_RECVOPTS" },
655 #ifdef IP_RECVRETOPTS
656 { IP_RECVRETOPTS, "IP_RECVRETOPTS" },
658 #ifdef IP_RECVDSTADDR
659 { IP_RECVDSTADDR, "IP_RECVDSTADDR" },
662 { IP_RETOPTS, "IP_RETOPTS" },
665 { IP_PKTINFO, "IP_PKTINFO" },
668 { IP_PKTOPTIONS, "IP_PKTOPTIONS" },
670 #ifdef IP_MTU_DISCOVER
671 { IP_MTU_DISCOVER, "IP_MTU_DISCOVER" },
674 { IP_RECVERR, "IP_RECVERR" },
677 { IP_RECVTTL, "IP_RECVTTL" },
680 { IP_RECVTOS, "IP_RECVTOS" },
683 { IP_MTU, "IP_MTU" },
685 #ifdef IP_MULTICAST_IF
686 { IP_MULTICAST_IF, "IP_MULTICAST_IF" },
688 #ifdef IP_MULTICAST_TTL
689 { IP_MULTICAST_TTL, "IP_MULTICAST_TTL" },
691 #ifdef IP_MULTICAST_LOOP
692 { IP_MULTICAST_LOOP, "IP_MULTICAST_LOOP" },
694 #ifdef IP_ADD_MEMBERSHIP
695 { IP_ADD_MEMBERSHIP, "IP_ADD_MEMBERSHIP" },
697 #ifdef IP_DROP_MEMBERSHIP
698 { IP_DROP_MEMBERSHIP, "IP_DROP_MEMBERSHIP" },
700 #ifdef IP_BROADCAST_IF
701 { IP_BROADCAST_IF, "IP_BROADCAST_IF" },
703 #ifdef IP_RECVIFINDEX
704 { IP_RECVIFINDEX, "IP_RECVIFINDEX" },
707 { IP_MSFILTER, "IP_MSFILTER" },
709 #ifdef MCAST_MSFILTER
710 { MCAST_MSFILTER, "MCAST_MSFILTER" },
713 { IP_FREEBIND, "IP_FREEBIND" },
720 static const struct xlat sockipv6options[] = {
722 { IPV6_ADDRFORM, "IPV6_ADDRFORM" },
725 { MCAST_FILTER, "MCAST_FILTER" },
727 #ifdef IPV6_PKTOPTIONS
728 { IPV6_PKTOPTIONS, "IPV6_PKTOPTIONS" },
731 { IPV6_MTU, "IPV6_MTU" },
734 { IPV6_V6ONLY, "IPV6_V6ONLY" },
737 { IPV6_PKTINFO, "IPV6_PKTINFO" },
740 { IPV6_HOPLIMIT, "IPV6_HOPLIMIT" },
743 { IPV6_RTHDR, "IPV6_RTHDR" },
746 { IPV6_HOPOPTS, "IPV6_HOPOPTS" },
749 { IPV6_DSTOPTS, "IPV6_DSTOPTS" },
752 { IPV6_FLOWINFO, "IPV6_FLOWINFO" },
754 #ifdef IPV6_UNICAST_HOPS
755 { IPV6_UNICAST_HOPS, "IPV6_UNICAST_HOPS" },
757 #ifdef IPV6_MULTICAST_HOPS
758 { IPV6_MULTICAST_HOPS, "IPV6_MULTICAST_HOPS" },
760 #ifdef IPV6_MULTICAST_LOOP
761 { IPV6_MULTICAST_LOOP, "IPV6_MULTICAST_LOOP" },
763 #ifdef IPV6_MULTICAST_IF
764 { IPV6_MULTICAST_IF, "IPV6_MULTICAST_IF" },
766 #ifdef IPV6_MTU_DISCOVER
767 { IPV6_MTU_DISCOVER, "IPV6_MTU_DISCOVER" },
770 { IPV6_RECVERR, "IPV6_RECVERR" },
772 #ifdef IPV6_FLOWINFO_SEND
773 { IPV6_FLOWINFO_SEND, "IPV6_FLOWINFO_SEND" },
775 #ifdef IPV6_ADD_MEMBERSHIP
776 { IPV6_ADD_MEMBERSHIP, "IPV6_ADD_MEMBERSHIP" },
778 #ifdef IPV6_DROP_MEMBERSHIP
779 { IPV6_DROP_MEMBERSHIP, "IPV6_DROP_MEMBERSHIP" },
781 #ifdef IPV6_ROUTER_ALERT
782 { IPV6_ROUTER_ALERT, "IPV6_ROUTER_ALERT" },
786 #endif /* SOL_IPV6 */
789 static const struct xlat sockipxoptions[] = {
790 { IPX_TYPE, "IPX_TYPE" },
796 static const struct xlat sockrawoptions[] = {
797 #if defined(ICMP_FILTER)
798 { ICMP_FILTER, "ICMP_FILTER" },
805 static const struct xlat sockpacketoptions[] = {
806 { PACKET_ADD_MEMBERSHIP, "PACKET_ADD_MEMBERSHIP" },
807 { PACKET_DROP_MEMBERSHIP, "PACKET_DROP_MEMBERSHIP"},
808 #if defined(PACKET_RECV_OUTPUT)
809 { PACKET_RECV_OUTPUT, "PACKET_RECV_OUTPUT" },
811 #if defined(PACKET_RX_RING)
812 { PACKET_RX_RING, "PACKET_RX_RING" },
814 #if defined(PACKET_STATISTICS)
815 { PACKET_STATISTICS, "PACKET_STATISTICS" },
819 #endif /* SOL_PACKET */
821 #if !defined (SOL_TCP) && defined (IPPROTO_TCP)
822 #define SOL_TCP IPPROTO_TCP
826 static const struct xlat socktcpoptions[] = {
827 { TCP_NODELAY, "TCP_NODELAY" },
828 { TCP_MAXSEG, "TCP_MAXSEG" },
829 #if defined(TCP_CORK)
830 { TCP_CORK, "TCP_CORK" },
832 #if defined(TCP_KEEPIDLE)
833 { TCP_KEEPIDLE, "TCP_KEEPIDLE" },
835 #if defined(TCP_KEEPINTVL)
836 { TCP_KEEPINTVL, "TCP_KEEPINTVL" },
838 #if defined(TCP_KEEPCNT)
839 { TCP_KEEPCNT, "TCP_KEEPCNT" },
841 #if defined(TCP_NKEEP)
842 { TCP_NKEEP, "TCP_NKEEP" },
844 #if defined(TCP_SYNCNT)
845 { TCP_SYNCNT, "TCP_SYNCNT" },
847 #if defined(TCP_LINGER2)
848 { TCP_LINGER2, "TCP_LINGER2" },
850 #if defined(TCP_DEFER_ACCEPT)
851 { TCP_DEFER_ACCEPT, "TCP_DEFER_ACCEPT" },
853 #if defined(TCP_WINDOW_CLAMP)
854 { TCP_WINDOW_CLAMP, "TCP_WINDOW_CLAMP" },
856 #if defined(TCP_INFO)
857 { TCP_INFO, "TCP_INFO" },
859 #if defined(TCP_QUICKACK)
860 { TCP_QUICKACK, "TCP_QUICKACK" },
867 static const struct xlat icmpfilterflags[] = {
868 #if defined(ICMP_ECHOREPLY)
869 { (1<<ICMP_ECHOREPLY), "ICMP_ECHOREPLY" },
871 #if defined(ICMP_DEST_UNREACH)
872 { (1<<ICMP_DEST_UNREACH), "ICMP_DEST_UNREACH" },
874 #if defined(ICMP_SOURCE_QUENCH)
875 { (1<<ICMP_SOURCE_QUENCH), "ICMP_SOURCE_QUENCH" },
877 #if defined(ICMP_REDIRECT)
878 { (1<<ICMP_REDIRECT), "ICMP_REDIRECT" },
880 #if defined(ICMP_ECHO)
881 { (1<<ICMP_ECHO), "ICMP_ECHO" },
883 #if defined(ICMP_TIME_EXCEEDED)
884 { (1<<ICMP_TIME_EXCEEDED), "ICMP_TIME_EXCEEDED" },
886 #if defined(ICMP_PARAMETERPROB)
887 { (1<<ICMP_PARAMETERPROB), "ICMP_PARAMETERPROB" },
889 #if defined(ICMP_TIMESTAMP)
890 { (1<<ICMP_TIMESTAMP), "ICMP_TIMESTAMP" },
892 #if defined(ICMP_TIMESTAMPREPLY)
893 { (1<<ICMP_TIMESTAMPREPLY), "ICMP_TIMESTAMPREPLY" },
895 #if defined(ICMP_INFO_REQUEST)
896 { (1<<ICMP_INFO_REQUEST), "ICMP_INFO_REQUEST" },
898 #if defined(ICMP_INFO_REPLY)
899 { (1<<ICMP_INFO_REPLY), "ICMP_INFO_REPLY" },
901 #if defined(ICMP_ADDRESS)
902 { (1<<ICMP_ADDRESS), "ICMP_ADDRESS" },
904 #if defined(ICMP_ADDRESSREPLY)
905 { (1<<ICMP_ADDRESSREPLY), "ICMP_ADDRESSREPLY" },
911 #if defined(AF_PACKET) /* from e.g. linux/if_packet.h */
912 static const struct xlat af_packet_types[] = {
913 #if defined(PACKET_HOST)
914 { PACKET_HOST, "PACKET_HOST" },
916 #if defined(PACKET_BROADCAST)
917 { PACKET_BROADCAST, "PACKET_BROADCAST" },
919 #if defined(PACKET_MULTICAST)
920 { PACKET_MULTICAST, "PACKET_MULTICAST" },
922 #if defined(PACKET_OTHERHOST)
923 { PACKET_OTHERHOST, "PACKET_OTHERHOST" },
925 #if defined(PACKET_OUTGOING)
926 { PACKET_OUTGOING, "PACKET_OUTGOING" },
928 #if defined(PACKET_LOOPBACK)
929 { PACKET_LOOPBACK, "PACKET_LOOPBACK" },
931 #if defined(PACKET_FASTROUTE)
932 { PACKET_FASTROUTE, "PACKET_FASTROUTE" },
936 #endif /* defined(AF_PACKET) */
940 printsock(struct tcb *tcp, long addr, int addrlen)
945 struct sockaddr_in sin;
946 struct sockaddr_un sau;
947 #ifdef HAVE_INET_NTOP
948 struct sockaddr_in6 sa6;
950 #if defined(LINUX) && defined(AF_IPX)
951 struct sockaddr_ipx sipx;
954 struct sockaddr_ll ll;
957 struct sockaddr_nl nl;
960 char string_addr[100];
967 tprintf("%#lx", addr);
971 if (addrlen < 2 || addrlen > sizeof(addrbuf))
972 addrlen = sizeof(addrbuf);
974 memset(&addrbuf, 0, sizeof(addrbuf));
975 if (umoven(tcp, addr, addrlen, addrbuf.pad) < 0) {
979 addrbuf.pad[sizeof(addrbuf.pad) - 1] = '\0';
981 tprintf("{sa_family=");
982 printxval(addrfams, addrbuf.sa.sa_family, "AF_???");
985 switch (addrbuf.sa.sa_family) {
989 } else if (addrbuf.sau.sun_path[0]) {
991 printpathn(tcp, addr + 2, strlen(addrbuf.sau.sun_path));
994 printpathn(tcp, addr + 3, strlen(addrbuf.sau.sun_path + 1));
998 tprintf("sin_port=htons(%u), sin_addr=inet_addr(\"%s\")",
999 ntohs(addrbuf.sin.sin_port), inet_ntoa(addrbuf.sin.sin_addr));
1001 #ifdef HAVE_INET_NTOP
1003 inet_ntop(AF_INET6, &addrbuf.sa6.sin6_addr, string_addr, sizeof(string_addr));
1004 tprintf("sin6_port=htons(%u), inet_pton(AF_INET6, \"%s\", &sin6_addr), sin6_flowinfo=%u",
1005 ntohs(addrbuf.sa6.sin6_port), string_addr,
1006 addrbuf.sa6.sin6_flowinfo);
1007 #ifdef HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID
1009 #if defined(HAVE_IF_INDEXTONAME) && defined(IN6_IS_ADDR_LINKLOCAL) && defined(IN6_IS_ADDR_MC_LINKLOCAL)
1010 int numericscope = 0;
1011 if (IN6_IS_ADDR_LINKLOCAL (&addrbuf.sa6.sin6_addr)
1012 || IN6_IS_ADDR_MC_LINKLOCAL (&addrbuf.sa6.sin6_addr)) {
1013 char scopebuf[IFNAMSIZ + 1];
1015 if (if_indextoname (addrbuf.sa6.sin6_scope_id, scopebuf) == NULL)
1018 tprintf(", sin6_scope_id=if_nametoindex(\"%s\")", scopebuf);
1024 tprintf(", sin6_scope_id=%u", addrbuf.sa6.sin6_scope_id);
1029 #if defined(AF_IPX) && defined(linux)
1033 tprintf("sipx_port=htons(%u), ",
1034 ntohs(addrbuf.sipx.sipx_port));
1035 /* Yes, I know, this does not look too
1036 * strace-ish, but otherwise the IPX
1037 * addresses just look monstrous...
1038 * Anyways, feel free if you don't like
1041 tprintf("%08lx:", (unsigned long)ntohl(addrbuf.sipx.sipx_network));
1042 for (i = 0; i<IPX_NODE_LEN; i++)
1043 tprintf("%02x", addrbuf.sipx.sipx_node[i]);
1044 tprintf("/[%02x]", addrbuf.sipx.sipx_type);
1047 #endif /* AF_IPX && linux */
1052 tprintf("proto=%#04x, if%d, pkttype=",
1053 ntohs(addrbuf.ll.sll_protocol),
1054 addrbuf.ll.sll_ifindex);
1055 printxval(af_packet_types, addrbuf.ll.sll_pkttype, "?");
1056 tprintf(", addr(%d)={%d, ",
1057 addrbuf.ll.sll_halen,
1058 addrbuf.ll.sll_hatype);
1059 for (i=0; i<addrbuf.ll.sll_halen; i++)
1060 tprintf("%02x", addrbuf.ll.sll_addr[i]);
1064 #endif /* AF_APACKET */
1067 tprintf("pid=%d, groups=%08x", addrbuf.nl.nl_pid, addrbuf.nl.nl_groups);
1069 #endif /* AF_NETLINK */
1070 /* AF_AX25 AF_APPLETALK AF_NETROM AF_BRIDGE AF_AAL5
1071 AF_X25 AF_ROSE etc. still need to be done */
1074 tprintf("sa_data=");
1075 printstr(tcp, (long) &((struct sockaddr *) addr)->sa_data,
1076 sizeof addrbuf.sa.sa_data);
1083 static const struct xlat scmvals[] = {
1085 { SCM_RIGHTS, "SCM_RIGHTS" },
1087 #ifdef SCM_CREDENTIALS
1088 { SCM_CREDENTIALS, "SCM_CREDENTIALS" },
1094 printcmsghdr(tcp, addr, len)
1099 struct cmsghdr *cmsg = len < sizeof(struct cmsghdr) ?
1101 if (cmsg == NULL || umoven(tcp, addr, len, (char *) cmsg) < 0) {
1102 tprintf(", msg_control=%#lx", addr);
1107 tprintf(", {cmsg_len=%zu, cmsg_level=", cmsg->cmsg_len);
1108 printxval(socketlayers, cmsg->cmsg_level, "SOL_???");
1109 tprintf(", cmsg_type=");
1111 if (cmsg->cmsg_level == SOL_SOCKET) {
1112 unsigned long cmsg_len;
1114 printxval(scmvals, cmsg->cmsg_type, "SCM_???");
1115 cmsg_len = (len < cmsg->cmsg_len) ? len : cmsg->cmsg_len;
1117 if (cmsg->cmsg_type == SCM_RIGHTS
1118 && CMSG_LEN(sizeof(int)) <= cmsg_len) {
1119 int *fds = (int *) CMSG_DATA (cmsg);
1123 while ((char *) fds < ((char *) cmsg + cmsg_len)) {
1126 tprintf("%d", *fds++);
1133 if (cmsg->cmsg_type == SCM_CREDENTIALS
1134 && CMSG_LEN(sizeof(struct ucred)) <= cmsg_len) {
1135 struct ucred *uc = (struct ucred *) CMSG_DATA (cmsg);
1137 tprintf("{pid=%ld, uid=%ld, gid=%ld}}",
1138 (long)uc->pid, (long)uc->uid, (long)uc->gid);
1148 printmsghdr(tcp, addr)
1154 if (umove(tcp, addr, &msg) < 0) {
1155 tprintf("%#lx", addr);
1158 tprintf("{msg_name(%d)=", msg.msg_namelen);
1159 printsock(tcp, (long)msg.msg_name, msg.msg_namelen);
1161 tprintf(", msg_iov(%lu)=", (unsigned long)msg.msg_iovlen);
1162 tprint_iov(tcp, (unsigned long)msg.msg_iovlen,
1163 (unsigned long)msg.msg_iov);
1165 #ifdef HAVE_STRUCT_MSGHDR_MSG_CONTROL
1166 tprintf(", msg_controllen=%lu", (unsigned long)msg.msg_controllen);
1167 if (msg.msg_controllen)
1168 printcmsghdr(tcp, (unsigned long) msg.msg_control,
1169 msg.msg_controllen);
1170 tprintf(", msg_flags=");
1171 printflags(msg_flags, msg.msg_flags, "MSG_???");
1172 #else /* !HAVE_STRUCT_MSGHDR_MSG_CONTROL */
1173 tprintf("msg_accrights=%#lx, msg_accrightslen=%u",
1174 (unsigned long) msg.msg_accrights, msg.msg_accrightslen);
1175 #endif /* !HAVE_STRUCT_MSGHDR_MSG_CONTROL */
1179 #endif /* HAVE_SENDMSG */
1185 if (entering(tcp)) {
1186 printxval(domains, tcp->u_arg[0], "PF_???");
1188 printxval(socktypes, tcp->u_arg[1], "SOCK_???");
1190 switch (tcp->u_arg[0]) {
1195 printxval(protocols, tcp->u_arg[2], "IPPROTO_???");
1199 /* BTW: I don't believe this.. */
1201 printxval(domains, tcp->u_arg[2], "PF_???");
1206 tprintf("%lu", tcp->u_arg[2]);
1218 if (entering(tcp)) {
1219 /* not sure really what these args are... but this
1220 * is how truss prints it
1222 tprintf("%ld, %ld, %ld, ",
1223 tcp->u_arg[0], tcp->u_arg[1], tcp->u_arg[2]);
1224 printpath(tcp, tcp->u_arg[3]);
1225 tprintf(", %ld", tcp->u_arg[4]);
1231 sys_so_socketpair(tcp)
1234 if (entering(tcp)) {
1235 /* not sure what this arg is */
1236 tprintf("0x%lx", tcp->u_arg[0]);
1246 if (entering(tcp)) {
1247 tprintf("%ld, ", tcp->u_arg[0]);
1248 printsock(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1249 tprintf(", %lu", tcp->u_arg[2]);
1258 return sys_bind(tcp);
1265 if (entering(tcp)) {
1266 tprintf("%ld, %lu", tcp->u_arg[0], tcp->u_arg[1]);
1275 if (entering(tcp)) {
1276 tprintf("%ld, ", tcp->u_arg[0]);
1277 } else if (!tcp->u_arg[2])
1278 tprintf("%#lx, NULL", tcp->u_arg[1]);
1280 if (tcp->u_arg[1] == 0 || syserror(tcp)) {
1281 tprintf("%#lx", tcp->u_arg[1]);
1283 printsock(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1286 printnum(tcp, tcp->u_arg[2], "%lu");
1295 if (entering(tcp)) {
1296 tprintf("%ld, ", tcp->u_arg[0]);
1297 printstr(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1298 tprintf(", %lu, ", tcp->u_arg[2]);
1300 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1309 if (entering(tcp)) {
1310 tprintf("%ld, ", tcp->u_arg[0]);
1311 printstr(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1312 tprintf(", %lu, ", tcp->u_arg[2]);
1314 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1317 printsock(tcp, tcp->u_arg[4], tcp->u_arg[5]);
1319 tprintf(", %lu", tcp->u_arg[5]);
1330 if (entering(tcp)) {
1331 tprintf("%ld, ", tcp->u_arg[0]);
1332 printmsghdr(tcp, tcp->u_arg[1]);
1335 printflags(msg_flags, tcp->u_arg[2], "MSG_???");
1340 #endif /* HAVE_SENDMSG */
1346 if (entering(tcp)) {
1347 tprintf("%ld, ", tcp->u_arg[0]);
1350 tprintf("%#lx", tcp->u_arg[1]);
1352 printstr(tcp, tcp->u_arg[1], tcp->u_rval);
1354 tprintf(", %lu, ", tcp->u_arg[2]);
1355 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1366 if (entering(tcp)) {
1367 tprintf("%ld, ", tcp->u_arg[0]);
1369 if (syserror(tcp)) {
1370 tprintf("%#lx, %lu, %lu, %#lx, %#lx",
1371 tcp->u_arg[1], tcp->u_arg[2], tcp->u_arg[3],
1372 tcp->u_arg[4], tcp->u_arg[5]);
1376 printstr(tcp, tcp->u_arg[1], tcp->u_rval);
1378 tprintf(", %lu, ", tcp->u_arg[2]);
1380 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1381 /* from address, len */
1382 if (!tcp->u_arg[4] || !tcp->u_arg[5]) {
1383 if (tcp->u_arg[4] == 0)
1386 tprintf(", %#lx", tcp->u_arg[4]);
1387 if (tcp->u_arg[5] == 0)
1390 tprintf(", %#lx", tcp->u_arg[5]);
1393 if (umove(tcp, tcp->u_arg[5], &fromlen) < 0) {
1394 tprintf(", {...}, [?]");
1398 printsock(tcp, tcp->u_arg[4], tcp->u_arg[5]);
1400 tprintf(", [%u]", fromlen);
1411 if (entering(tcp)) {
1412 tprintf("%ld, ", tcp->u_arg[0]);
1414 if (syserror(tcp) || !verbose(tcp))
1415 tprintf("%#lx", tcp->u_arg[1]);
1417 printmsghdr(tcp, tcp->u_arg[1]);
1420 printflags(msg_flags, tcp->u_arg[2], "MSG_???");
1425 #endif /* HAVE_SENDMSG */
1431 if (entering(tcp)) {
1432 tprintf("%ld, %ld", tcp->u_arg[0], tcp->u_arg[1]);
1433 switch (tcp->u_arg[1]) {
1435 tprintf("%s", " /* receive */");
1438 tprintf("%s", " /* send */");
1441 tprintf("%s", " /* send and receive */");
1449 sys_getsockname(tcp)
1452 return sys_accept(tcp);
1456 sys_getpeername(tcp)
1459 return sys_accept(tcp);
1467 #if defined(LINUX) && !defined(SPARC) && !defined(SPARC64) && !defined(SH) && !defined(IA64)
1471 if (syserror(tcp)) {
1472 tprintf("%#lx", tcp->u_arg[0]);
1475 if (umoven(tcp, tcp->u_arg[0], sizeof fds, (char *) fds) < 0)
1478 tprintf("[%u, %u]", fds[0], fds[1]);
1480 #elif defined(SPARC) || defined(SPARC64) || defined(SH) || defined(SVR4) || defined(FREEBSD) || defined(IA64)
1482 tprintf("[%lu, %lu]", tcp->u_rval, getrval2(tcp));
1495 if (entering(tcp)) {
1496 printxval(domains, tcp->u_arg[0], "PF_???");
1498 printxval(socktypes, tcp->u_arg[1], "SOCK_???");
1500 switch (tcp->u_arg[0]) {
1502 printxval(protocols, tcp->u_arg[2], "IPPROTO_???");
1506 /* BTW: I don't believe this.. */
1508 printxval(domains, tcp->u_arg[2], "PF_???");
1513 tprintf("%lu", tcp->u_arg[2]);
1517 if (syserror(tcp)) {
1518 tprintf(", %#lx", tcp->u_arg[3]);
1522 if (umoven(tcp, tcp->u_arg[3], sizeof fds, (char *) fds) < 0)
1525 tprintf(", [%u, %u]", fds[0], fds[1]);
1527 #if defined(SUNOS4) || defined(SVR4) || defined(FREEBSD)
1528 tprintf(", [%lu, %lu]", tcp->u_rval, getrval2(tcp));
1529 #endif /* SUNOS4 || SVR4 || FREEBSD */
1538 if (entering(tcp)) {
1539 tprintf("%ld, ", tcp->u_arg[0]);
1540 printxval(socketlayers, tcp->u_arg[1], "SOL_???");
1542 switch (tcp->u_arg[1]) {
1544 printxval(sockoptions, tcp->u_arg[2], "SO_???");
1548 printxval(sockipoptions, tcp->u_arg[2], "IP_???");
1553 printxval(sockipv6options, tcp->u_arg[2], "IPV6_???");
1558 printxval(sockipxoptions, tcp->u_arg[2], "IPX_???");
1563 printxval(sockpacketoptions, tcp->u_arg[2], "PACKET_???");
1568 printxval(socktcpoptions, tcp->u_arg[2], "TCP_???");
1572 /* SOL_AX25 SOL_ROSE SOL_ATALK SOL_NETROM SOL_UDP SOL_DECNET SOL_X25
1573 * etc. still need work */
1575 tprintf("%lu", tcp->u_arg[2]);
1580 if (syserror(tcp) || umove (tcp, tcp->u_arg[4], &len) < 0) {
1581 tprintf(", %#lx, %#lx",
1582 tcp->u_arg[3], tcp->u_arg[4]);
1586 switch (tcp->u_arg[1]) {
1588 switch (tcp->u_arg[2]) {
1591 if (len == sizeof (struct linger)) {
1592 struct linger linger;
1597 tprintf(", {onoff=%d, linger=%d}, "
1611 if (len == sizeof (int)) {
1612 printnum(tcp, tcp->u_arg[3], "%ld");
1615 printstr (tcp, tcp->u_arg[3], len);
1617 tprintf(", [%d]", len);
1622 #if defined(ICMP_FILTER)
1623 static void printicmpfilter(tcp, addr)
1627 struct icmp_filter filter;
1633 if (syserror(tcp) || !verbose(tcp)) {
1634 tprintf("%#lx", addr);
1637 if (umove(tcp, addr, &filter) < 0) {
1643 printflags(icmpfilterflags, ~filter.data, "ICMP_???");
1646 #endif /* ICMP_FILTER */
1649 printsockopt (tcp, level, name, addr, len)
1656 printxval(socketlayers, level, "SOL_??");
1660 printxval(sockoptions, name, "SO_???");
1662 #if defined(SO_LINGER)
1664 if (len == sizeof (struct linger)) {
1665 struct linger linger;
1666 if (umove (tcp, addr, &linger) < 0)
1668 tprintf(", {onoff=%d, linger=%d}",
1679 printxval(sockipoptions, name, "IP_???");
1684 printxval(sockipv6options, name, "IPV6_???");
1689 printxval(sockipxoptions, name, "IPX_???");
1694 printxval(sockpacketoptions, name, "PACKET_???");
1695 /* TODO: decode packate_mreq for PACKET_*_MEMBERSHIP */
1700 printxval(socktcpoptions, name, "TCP_???");
1705 printxval(sockrawoptions, name, "RAW_???");
1707 #if defined(ICMP_FILTER)
1710 printicmpfilter(tcp, addr);
1717 /* SOL_AX25 SOL_ATALK SOL_NETROM SOL_UDP SOL_DECNET SOL_X25
1718 * etc. still need work */
1721 tprintf("%u", name);
1724 /* default arg printing */
1728 if (len == sizeof (int)) {
1729 printnum_int (tcp, addr, "%d");
1732 printstr (tcp, addr, len);
1738 #ifdef HAVE_STRUCT_OPTHDR
1741 print_sock_optmgmt (tcp, addr, len)
1749 while (len >= (int) sizeof hdr) {
1750 if (umove(tcp, addr, &hdr) < 0) break;
1754 else if (len > hdr.len + sizeof hdr) {
1760 printsockopt (tcp, hdr.level, hdr.name, addr, hdr.len);
1768 if (c++) tprintf (", ");
1769 printstr (tcp, addr, len);
1771 if (c > 1) tprintf ("]");
1780 if (entering(tcp)) {
1781 tprintf("%ld, ", tcp->u_arg[0]);
1782 printsockopt (tcp, tcp->u_arg[1], tcp->u_arg[2],
1783 tcp->u_arg[3], tcp->u_arg[4]);
1784 tprintf(", %lu", tcp->u_arg[4]);
1791 static const struct xlat sock_version[] = {
1792 { __NETLIB_UW211_SVR4, "UW211_SVR4" },
1793 { __NETLIB_UW211_XPG4, "UW211_XPG4" },
1794 { __NETLIB_GEMINI_SVR4, "GEMINI_SVR4" },
1795 { __NETLIB_GEMINI_XPG4, "GEMINI_XPG4" },
1796 { __NETLIB_FP1_SVR4, "FP1_SVR4" },
1797 { __NETLIB_FP1_XPG4, "FP1_XPG4" },
1803 netlib_call(tcp, func)
1807 if (entering(tcp)) {
1809 printxval (sock_version, tcp->u_arg[0], "__NETLIB_???");
1812 for (i = 0; i < tcp->u_nargs; i++)
1813 tcp->u_arg[i] = tcp->u_arg[i + 1];
1825 return netlib_call (tcp, sys_socket);
1829 sys_xsocketpair(tcp)
1832 return netlib_call (tcp, sys_socketpair);
1839 return netlib_call (tcp, sys_bind);
1846 return netlib_call (tcp, sys_connect);
1853 return netlib_call (tcp, sys_listen);
1860 return netlib_call (tcp, sys_accept);
1867 return netlib_call (tcp, sys_sendmsg);
1874 return netlib_call (tcp, sys_recvmsg);
1878 sys_xgetsockaddr(tcp)
1881 if (entering(tcp)) {
1882 printxval (sock_version, tcp->u_arg[0], "__NETLIB_???");
1884 if (tcp->u_arg[1] == 0) {
1885 tprintf ("LOCALNAME, ");
1887 else if (tcp->u_arg[1] == 1) {
1888 tprintf ("REMOTENAME, ");
1891 tprintf ("%ld, ", tcp->u_arg [1]);
1893 tprintf ("%ld, ", tcp->u_arg [2]);
1896 if (tcp->u_arg[3] == 0 || syserror(tcp)) {
1897 tprintf("%#lx", tcp->u_arg[3]);
1899 printsock(tcp, tcp->u_arg[3], tcp->u_arg[4]);
1902 printnum(tcp, tcp->u_arg[4], "%lu");
1912 sys_xsetsockaddr(tcp)
1915 return netlib_call (tcp, sys_setsockaddr);
1921 sys_xgetsockopt(tcp)
1924 return netlib_call (tcp, sys_getsockopt);
1928 sys_xsetsockopt(tcp)
1931 return netlib_call (tcp, sys_setsockopt);
1938 return netlib_call (tcp, sys_shutdown);