2 * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3 * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4 * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
5 * Copyright (c) 1996-2000 Wichert Akkerman <wichert@cistron.nl>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. The name of the author may not be used to endorse or promote products
17 * derived from this software without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
20 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
21 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
23 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
24 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 #include <sys/socket.h>
39 #if defined(HAVE_SIN6_SCOPE_ID_LINUX)
40 #define in6_addr in6_addr_libc
41 #define ipv6_mreq ipv6_mreq_libc
42 #define sockaddr_in6 sockaddr_in6_libc
45 #include <netinet/in.h>
46 #ifdef HAVE_NETINET_TCP_H
47 #include <netinet/tcp.h>
49 #ifdef HAVE_NETINET_UDP_H
50 #include <netinet/udp.h>
52 #include <arpa/inet.h>
55 #include <asm/types.h>
56 #if defined(__GLIBC__) && (__GLIBC__ >= 2) && (__GLIBC__ + __GLIBC_MINOR__ >= 3)
57 # include <netipx/ipx.h>
59 # include <linux/ipx.h>
63 #if defined (__GLIBC__) && (((__GLIBC__ < 2) || (__GLIBC__ == 2 && __GLIBC_MINOR__ < 1)) || defined(HAVE_SIN6_SCOPE_ID_LINUX))
64 #if defined(HAVE_LINUX_IN6_H)
65 #if defined(HAVE_SIN6_SCOPE_ID_LINUX)
69 #define in6_addr in6_addr_kernel
70 #define ipv6_mreq ipv6_mreq_kernel
71 #define sockaddr_in6 sockaddr_in6_kernel
73 #include <linux/in6.h>
74 #if defined(HAVE_SIN6_SCOPE_ID_LINUX)
78 #define in6_addr in6_addr_libc
79 #define ipv6_mreq ipv6_mreq_libc
80 #define sockaddr_in6 sockaddr_in6_kernel
85 #if defined(HAVE_SYS_UIO_H)
89 #if defined(HAVE_LINUX_NETLINK_H)
90 #include <linux/netlink.h>
93 #if defined(HAVE_LINUX_IF_PACKET_H)
94 #include <linux/if_packet.h>
97 #if defined(HAVE_LINUX_ICMP_H)
98 #include <linux/icmp.h>
102 #define PF_UNSPEC AF_UNSPEC
106 #define HAVE_SENDMSG 1 /* HACK - *FIXME* */
110 /* Under Linux these are enums so we can't test for them with ifdef. */
111 #define IPPROTO_EGP IPPROTO_EGP
112 #define IPPROTO_PUP IPPROTO_PUP
113 #define IPPROTO_IDP IPPROTO_IDP
114 #define IPPROTO_IGMP IPPROTO_IGMP
115 #define IPPROTO_RAW IPPROTO_RAW
116 #define IPPROTO_MAX IPPROTO_MAX
119 static const struct xlat domains[] = {
121 { PF_AAL5, "PF_AAL5" },
124 { PF_APPLETALK, "PF_APPLETALK" },
127 { PF_ASH, "PF_ASH" },
130 { PF_ATMPVC, "PF_ATMPVC" },
133 { PF_ATMSVC, "PF_ATMSVC" },
136 { PF_AX25, "PF_AX25" },
139 { PF_BLUETOOTH, "PF_BLUETOOTH" },
142 { PF_BRIDGE, "PF_BRIDGE" },
145 { PF_DECnet, "PF_DECnet" },
148 { PF_DECNET, "PF_DECNET" },
151 { PF_ECONET, "PF_ECONET" },
154 { PF_FILE, "PF_FILE" },
157 { PF_IMPLINK, "PF_IMPLINK" },
160 { PF_INET, "PF_INET" },
163 { PF_INET6, "PF_INET6" },
166 { PF_IPX, "PF_IPX" },
169 { PF_IRDA, "PF_IRDA" },
172 { PF_ISO, "PF_ISO" },
175 { PF_KEY, "PF_KEY" },
178 { PF_UNIX, "PF_UNIX" },
181 { PF_LOCAL, "PF_LOCAL" },
184 { PF_NETBEUI, "PF_NETBEUI" },
187 { PF_NETLINK, "PF_NETLINK" },
190 { PF_NETROM, "PF_NETROM" },
193 { PF_PACKET, "PF_PACKET" },
196 { PF_PPPOX, "PF_PPPOX" },
199 { PF_ROSE, "PF_ROSE" },
202 { PF_ROUTE, "PF_ROUTE" },
205 { PF_SECURITY, "PF_SECURITY" },
208 { PF_SNA, "PF_SNA" },
211 { PF_UNSPEC, "PF_UNSPEC" },
214 { PF_WANPIPE, "PF_WANPIPE" },
217 { PF_X25, "PF_X25" },
221 const struct xlat addrfams[] = {
223 { AF_APPLETALK, "AF_APPLETALK" },
226 { AF_ASH, "AF_ASH" },
229 { AF_ATMPVC, "AF_ATMPVC" },
232 { AF_ATMSVC, "AF_ATMSVC" },
235 { AF_AX25, "AF_AX25" },
238 { AF_BLUETOOTH, "AF_BLUETOOTH" },
241 { AF_BRIDGE, "AF_BRIDGE" },
244 { AF_DECnet, "AF_DECnet" },
247 { AF_ECONET, "AF_ECONET" },
250 { AF_FILE, "AF_FILE" },
253 { AF_IMPLINK, "AF_IMPLINK" },
256 { AF_INET, "AF_INET" },
259 { AF_INET6, "AF_INET6" },
262 { AF_IPX, "AF_IPX" },
265 { AF_IRDA, "AF_IRDA" },
268 { AF_ISO, "AF_ISO" },
271 { AF_KEY, "AF_KEY" },
274 { AF_UNIX, "AF_UNIX" },
277 { AF_LOCAL, "AF_LOCAL" },
280 { AF_NETBEUI, "AF_NETBEUI" },
283 { AF_NETLINK, "AF_NETLINK" },
286 { AF_NETROM, "AF_NETROM" },
289 { AF_PACKET, "AF_PACKET" },
292 { AF_PPPOX, "AF_PPPOX" },
295 { AF_ROSE, "AF_ROSE" },
298 { AF_ROUTE, "AF_ROUTE" },
301 { AF_SECURITY, "AF_SECURITY" },
304 { AF_SNA, "AF_SNA" },
307 { AF_UNSPEC, "AF_UNSPEC" },
310 { AF_WANPIPE, "AF_WANPIPE" },
313 { AF_X25, "AF_X25" },
317 static const struct xlat socktypes[] = {
318 { SOCK_STREAM, "SOCK_STREAM" },
319 { SOCK_DGRAM, "SOCK_DGRAM" },
321 { SOCK_RAW, "SOCK_RAW" },
324 { SOCK_RDM, "SOCK_RDM" },
326 #ifdef SOCK_SEQPACKET
327 { SOCK_SEQPACKET,"SOCK_SEQPACKET"},
330 { SOCK_DCCP, "SOCK_DCCP" },
333 { SOCK_PACKET, "SOCK_PACKET" },
337 const struct xlat sock_type_flags[] = {
339 { SOCK_CLOEXEC, "SOCK_CLOEXEC" },
342 { SOCK_NONBLOCK,"SOCK_NONBLOCK" },
346 #ifndef SOCK_TYPE_MASK
347 # define SOCK_TYPE_MASK 0xf
349 static const struct xlat socketlayers[] = {
351 { SOL_IP, "SOL_IP" },
353 #if defined(SOL_ICMP)
354 { SOL_ICMP, "SOL_ICMP" },
357 { SOL_TCP, "SOL_TCP" },
360 { SOL_UDP, "SOL_UDP" },
362 #if defined(SOL_IPV6)
363 { SOL_IPV6, "SOL_IPV6" },
365 #if defined(SOL_ICMPV6)
366 { SOL_ICMPV6, "SOL_ICMPV6" },
369 { SOL_RAW, "SOL_RAW" },
372 { SOL_IPX, "SOL_IPX" },
375 { SOL_IPX, "SOL_IPX" },
377 #if defined(SOL_AX25)
378 { SOL_AX25, "SOL_AX25" },
380 #if defined(SOL_ATALK)
381 { SOL_ATALK, "SOL_ATALK" },
383 #if defined(SOL_NETROM)
384 { SOL_NETROM, "SOL_NETROM" },
386 #if defined(SOL_ROSE)
387 { SOL_ROSE, "SOL_ROSE" },
389 #if defined(SOL_DECNET)
390 { SOL_DECNET, "SOL_DECNET" },
393 { SOL_X25, "SOL_X25" },
395 #if defined(SOL_PACKET)
396 { SOL_PACKET, "SOL_PACKET" },
399 { SOL_ATM, "SOL_ATM" },
402 { SOL_AAL, "SOL_AAL" },
404 #if defined(SOL_IRDA)
405 { SOL_IRDA, "SOL_IRDA" },
407 { SOL_SOCKET, "SOL_SOCKET" }, /* Never used! */
409 /*** WARNING: DANGER WILL ROBINSON: NOTE "socketlayers" array above
410 falls into "protocols" array below!!!! This is intended!!! ***/
411 static const struct xlat protocols[] = {
412 { IPPROTO_IP, "IPPROTO_IP" },
413 { IPPROTO_ICMP, "IPPROTO_ICMP" },
414 { IPPROTO_TCP, "IPPROTO_TCP" },
415 { IPPROTO_UDP, "IPPROTO_UDP" },
417 { IPPROTO_GGP, "IPPROTO_GGP" },
420 { IPPROTO_EGP, "IPPROTO_EGP" },
423 { IPPROTO_PUP, "IPPROTO_PUP" },
426 { IPPROTO_IDP, "IPPROTO_IDP" },
429 { IPPROTO_IPV6, "IPPROTO_IPV6" },
431 #ifdef IPPROTO_ICMPV6
432 { IPPROTO_ICMPV6,"IPPROTO_ICMPV6"},
435 { IPPROTO_IGMP, "IPPROTO_IGMP" },
438 { IPPROTO_HELLO,"IPPROTO_HELLO" },
441 { IPPROTO_ND, "IPPROTO_ND" },
444 { IPPROTO_RAW, "IPPROTO_RAW" },
447 { IPPROTO_MAX, "IPPROTO_MAX" },
450 { IPPROTO_IPIP, "IPPROTO_IPIP" },
454 static const struct xlat msg_flags[] = {
455 { MSG_OOB, "MSG_OOB" },
457 { MSG_DONTROUTE, "MSG_DONTROUTE" },
460 { MSG_PEEK, "MSG_PEEK" },
463 { MSG_CTRUNC, "MSG_CTRUNC" },
466 { MSG_PROXY, "MSG_PROXY" },
469 { MSG_EOR, "MSG_EOR" },
472 { MSG_WAITALL, "MSG_WAITALL" },
475 { MSG_TRUNC, "MSG_TRUNC" },
478 { MSG_CTRUNC, "MSG_CTRUNC" },
481 { MSG_ERRQUEUE, "MSG_ERRQUEUE" },
484 { MSG_DONTWAIT, "MSG_DONTWAIT" },
487 { MSG_CONFIRM, "MSG_CONFIRM" },
490 { MSG_PROBE, "MSG_PROBE" },
493 { MSG_FIN, "MSG_FIN" },
496 { MSG_SYN, "MSG_SYN" },
499 { MSG_RST, "MSG_RST" },
502 { MSG_NOSIGNAL, "MSG_NOSIGNAL" },
505 { MSG_MORE, "MSG_MORE" },
507 #ifdef MSG_CMSG_CLOEXEC
508 { MSG_CMSG_CLOEXEC, "MSG_CMSG_CLOEXEC" },
513 static const struct xlat sockoptions[] = {
515 { SO_ACCEPTCONN, "SO_ACCEPTCONN" },
518 { SO_ALLRAW, "SO_ALLRAW" },
520 #ifdef SO_ATTACH_FILTER
521 { SO_ATTACH_FILTER, "SO_ATTACH_FILTER" },
523 #ifdef SO_BINDTODEVICE
524 { SO_BINDTODEVICE, "SO_BINDTODEVICE" },
527 { SO_BROADCAST, "SO_BROADCAST" },
530 { SO_BSDCOMPAT, "SO_BSDCOMPAT" },
533 { SO_DEBUG, "SO_DEBUG" },
535 #ifdef SO_DETACH_FILTER
536 { SO_DETACH_FILTER, "SO_DETACH_FILTER" },
539 { SO_DONTROUTE, "SO_DONTROUTE" },
542 { SO_ERROR, "SO_ERROR" },
545 { SO_ICS, "SO_ICS" },
548 { SO_IMASOCKET, "SO_IMASOCKET" },
551 { SO_KEEPALIVE, "SO_KEEPALIVE" },
554 { SO_LINGER, "SO_LINGER" },
557 { SO_LISTENING, "SO_LISTENING" },
560 { SO_MGMT, "SO_MGMT" },
563 { SO_NO_CHECK, "SO_NO_CHECK" },
566 { SO_OOBINLINE, "SO_OOBINLINE" },
569 { SO_ORDREL, "SO_ORDREL" },
571 #ifdef SO_PARALLELSVR
572 { SO_PARALLELSVR, "SO_PARALLELSVR" },
575 { SO_PASSCRED, "SO_PASSCRED" },
578 { SO_PEERCRED, "SO_PEERCRED" },
581 { SO_PEERNAME, "SO_PEERNAME" },
584 { SO_PEERSEC, "SO_PEERSEC" },
587 { SO_PRIORITY, "SO_PRIORITY" },
590 { SO_PROTOTYPE, "SO_PROTOTYPE" },
593 { SO_RCVBUF, "SO_RCVBUF" },
596 { SO_RCVLOWAT, "SO_RCVLOWAT" },
599 { SO_RCVTIMEO, "SO_RCVTIMEO" },
602 { SO_RDWR, "SO_RDWR" },
605 { SO_REUSEADDR, "SO_REUSEADDR" },
608 { SO_REUSEPORT, "SO_REUSEPORT" },
610 #ifdef SO_SECURITY_AUTHENTICATION
611 { SO_SECURITY_AUTHENTICATION,"SO_SECURITY_AUTHENTICATION"},
613 #ifdef SO_SECURITY_ENCRYPTION_NETWORK
614 { SO_SECURITY_ENCRYPTION_NETWORK,"SO_SECURITY_ENCRYPTION_NETWORK"},
616 #ifdef SO_SECURITY_ENCRYPTION_TRANSPORT
617 { SO_SECURITY_ENCRYPTION_TRANSPORT,"SO_SECURITY_ENCRYPTION_TRANSPORT"},
620 { SO_SEMA, "SO_SEMA" },
623 { SO_SNDBUF, "SO_SNDBUF" },
626 { SO_SNDLOWAT, "SO_SNDLOWAT" },
629 { SO_SNDTIMEO, "SO_SNDTIMEO" },
632 { SO_TIMESTAMP, "SO_TIMESTAMP" },
635 { SO_TYPE, "SO_TYPE" },
637 #ifdef SO_USELOOPBACK
638 { SO_USELOOPBACK, "SO_USELOOPBACK" },
643 #if !defined (SOL_IP) && defined (IPPROTO_IP)
644 #define SOL_IP IPPROTO_IP
648 static const struct xlat sockipoptions[] = {
650 { IP_TOS, "IP_TOS" },
653 { IP_TTL, "IP_TTL" },
656 { IP_HDRINCL, "IP_HDRINCL" },
659 { IP_OPTIONS, "IP_OPTIONS" },
661 #ifdef IP_ROUTER_ALERT
662 { IP_ROUTER_ALERT, "IP_ROUTER_ALERT" },
664 #ifdef IP_RECVOPTIONS
665 { IP_RECVOPTIONS, "IP_RECVOPTIONS" },
668 { IP_RECVOPTS, "IP_RECVOPTS" },
670 #ifdef IP_RECVRETOPTS
671 { IP_RECVRETOPTS, "IP_RECVRETOPTS" },
673 #ifdef IP_RECVDSTADDR
674 { IP_RECVDSTADDR, "IP_RECVDSTADDR" },
677 { IP_RETOPTS, "IP_RETOPTS" },
680 { IP_PKTINFO, "IP_PKTINFO" },
683 { IP_PKTOPTIONS, "IP_PKTOPTIONS" },
685 #ifdef IP_MTU_DISCOVER
686 { IP_MTU_DISCOVER, "IP_MTU_DISCOVER" },
689 { IP_RECVERR, "IP_RECVERR" },
692 { IP_RECVTTL, "IP_RECVTTL" },
695 { IP_RECVTOS, "IP_RECVTOS" },
698 { IP_MTU, "IP_MTU" },
700 #ifdef IP_MULTICAST_IF
701 { IP_MULTICAST_IF, "IP_MULTICAST_IF" },
703 #ifdef IP_MULTICAST_TTL
704 { IP_MULTICAST_TTL, "IP_MULTICAST_TTL" },
706 #ifdef IP_MULTICAST_LOOP
707 { IP_MULTICAST_LOOP, "IP_MULTICAST_LOOP" },
709 #ifdef IP_ADD_MEMBERSHIP
710 { IP_ADD_MEMBERSHIP, "IP_ADD_MEMBERSHIP" },
712 #ifdef IP_DROP_MEMBERSHIP
713 { IP_DROP_MEMBERSHIP, "IP_DROP_MEMBERSHIP" },
715 #ifdef IP_BROADCAST_IF
716 { IP_BROADCAST_IF, "IP_BROADCAST_IF" },
718 #ifdef IP_RECVIFINDEX
719 { IP_RECVIFINDEX, "IP_RECVIFINDEX" },
722 { IP_MSFILTER, "IP_MSFILTER" },
724 #ifdef MCAST_MSFILTER
725 { MCAST_MSFILTER, "MCAST_MSFILTER" },
728 { IP_FREEBIND, "IP_FREEBIND" },
735 static const struct xlat sockipv6options[] = {
737 { IPV6_ADDRFORM, "IPV6_ADDRFORM" },
740 { MCAST_FILTER, "MCAST_FILTER" },
742 #ifdef IPV6_PKTOPTIONS
743 { IPV6_PKTOPTIONS, "IPV6_PKTOPTIONS" },
746 { IPV6_MTU, "IPV6_MTU" },
749 { IPV6_V6ONLY, "IPV6_V6ONLY" },
752 { IPV6_PKTINFO, "IPV6_PKTINFO" },
755 { IPV6_HOPLIMIT, "IPV6_HOPLIMIT" },
758 { IPV6_RTHDR, "IPV6_RTHDR" },
761 { IPV6_HOPOPTS, "IPV6_HOPOPTS" },
764 { IPV6_DSTOPTS, "IPV6_DSTOPTS" },
767 { IPV6_FLOWINFO, "IPV6_FLOWINFO" },
769 #ifdef IPV6_UNICAST_HOPS
770 { IPV6_UNICAST_HOPS, "IPV6_UNICAST_HOPS" },
772 #ifdef IPV6_MULTICAST_HOPS
773 { IPV6_MULTICAST_HOPS, "IPV6_MULTICAST_HOPS" },
775 #ifdef IPV6_MULTICAST_LOOP
776 { IPV6_MULTICAST_LOOP, "IPV6_MULTICAST_LOOP" },
778 #ifdef IPV6_MULTICAST_IF
779 { IPV6_MULTICAST_IF, "IPV6_MULTICAST_IF" },
781 #ifdef IPV6_MTU_DISCOVER
782 { IPV6_MTU_DISCOVER, "IPV6_MTU_DISCOVER" },
785 { IPV6_RECVERR, "IPV6_RECVERR" },
787 #ifdef IPV6_FLOWINFO_SEND
788 { IPV6_FLOWINFO_SEND, "IPV6_FLOWINFO_SEND" },
790 #ifdef IPV6_ADD_MEMBERSHIP
791 { IPV6_ADD_MEMBERSHIP, "IPV6_ADD_MEMBERSHIP" },
793 #ifdef IPV6_DROP_MEMBERSHIP
794 { IPV6_DROP_MEMBERSHIP, "IPV6_DROP_MEMBERSHIP" },
796 #ifdef IPV6_ROUTER_ALERT
797 { IPV6_ROUTER_ALERT, "IPV6_ROUTER_ALERT" },
801 #endif /* SOL_IPV6 */
804 static const struct xlat sockipxoptions[] = {
805 { IPX_TYPE, "IPX_TYPE" },
811 static const struct xlat sockrawoptions[] = {
812 #if defined(ICMP_FILTER)
813 { ICMP_FILTER, "ICMP_FILTER" },
820 static const struct xlat sockpacketoptions[] = {
821 #ifdef PACKET_ADD_MEMBERSHIP
822 { PACKET_ADD_MEMBERSHIP, "PACKET_ADD_MEMBERSHIP" },
824 #ifdef PACKET_DROP_MEMBERSHIP
825 { PACKET_DROP_MEMBERSHIP, "PACKET_DROP_MEMBERSHIP"},
827 #if defined(PACKET_RECV_OUTPUT)
828 { PACKET_RECV_OUTPUT, "PACKET_RECV_OUTPUT" },
830 #if defined(PACKET_RX_RING)
831 { PACKET_RX_RING, "PACKET_RX_RING" },
833 #if defined(PACKET_STATISTICS)
834 { PACKET_STATISTICS, "PACKET_STATISTICS" },
836 #if defined(PACKET_COPY_THRESH)
837 { PACKET_COPY_THRESH, "PACKET_COPY_THRESH" },
839 #if defined(PACKET_AUXDATA)
840 { PACKET_AUXDATA, "PACKET_AUXDATA" },
842 #if defined(PACKET_ORIGDEV)
843 { PACKET_ORIGDEV, "PACKET_ORIGDEV" },
845 #if defined(PACKET_VERSION)
846 { PACKET_VERSION, "PACKET_VERSION" },
848 #if defined(PACKET_HDRLEN)
849 { PACKET_HDRLEN, "PACKET_HDRLEN" },
851 #if defined(PACKET_RESERVE)
852 { PACKET_RESERVE, "PACKET_RESERVE" },
854 #if defined(PACKET_TX_RING)
855 { PACKET_TX_RING, "PACKET_TX_RING" },
857 #if defined(PACKET_LOSS)
858 { PACKET_LOSS, "PACKET_LOSS" },
862 #endif /* SOL_PACKET */
864 #if !defined (SOL_TCP) && defined (IPPROTO_TCP)
865 #define SOL_TCP IPPROTO_TCP
869 static const struct xlat socktcpoptions[] = {
870 { TCP_NODELAY, "TCP_NODELAY" },
871 { TCP_MAXSEG, "TCP_MAXSEG" },
872 #if defined(TCP_CORK)
873 { TCP_CORK, "TCP_CORK" },
875 #if defined(TCP_KEEPIDLE)
876 { TCP_KEEPIDLE, "TCP_KEEPIDLE" },
878 #if defined(TCP_KEEPINTVL)
879 { TCP_KEEPINTVL, "TCP_KEEPINTVL" },
881 #if defined(TCP_KEEPCNT)
882 { TCP_KEEPCNT, "TCP_KEEPCNT" },
884 #if defined(TCP_NKEEP)
885 { TCP_NKEEP, "TCP_NKEEP" },
887 #if defined(TCP_SYNCNT)
888 { TCP_SYNCNT, "TCP_SYNCNT" },
890 #if defined(TCP_LINGER2)
891 { TCP_LINGER2, "TCP_LINGER2" },
893 #if defined(TCP_DEFER_ACCEPT)
894 { TCP_DEFER_ACCEPT, "TCP_DEFER_ACCEPT" },
896 #if defined(TCP_WINDOW_CLAMP)
897 { TCP_WINDOW_CLAMP, "TCP_WINDOW_CLAMP" },
899 #if defined(TCP_INFO)
900 { TCP_INFO, "TCP_INFO" },
902 #if defined(TCP_QUICKACK)
903 { TCP_QUICKACK, "TCP_QUICKACK" },
910 static const struct xlat icmpfilterflags[] = {
911 #if defined(ICMP_ECHOREPLY)
912 { (1<<ICMP_ECHOREPLY), "ICMP_ECHOREPLY" },
914 #if defined(ICMP_DEST_UNREACH)
915 { (1<<ICMP_DEST_UNREACH), "ICMP_DEST_UNREACH" },
917 #if defined(ICMP_SOURCE_QUENCH)
918 { (1<<ICMP_SOURCE_QUENCH), "ICMP_SOURCE_QUENCH" },
920 #if defined(ICMP_REDIRECT)
921 { (1<<ICMP_REDIRECT), "ICMP_REDIRECT" },
923 #if defined(ICMP_ECHO)
924 { (1<<ICMP_ECHO), "ICMP_ECHO" },
926 #if defined(ICMP_TIME_EXCEEDED)
927 { (1<<ICMP_TIME_EXCEEDED), "ICMP_TIME_EXCEEDED" },
929 #if defined(ICMP_PARAMETERPROB)
930 { (1<<ICMP_PARAMETERPROB), "ICMP_PARAMETERPROB" },
932 #if defined(ICMP_TIMESTAMP)
933 { (1<<ICMP_TIMESTAMP), "ICMP_TIMESTAMP" },
935 #if defined(ICMP_TIMESTAMPREPLY)
936 { (1<<ICMP_TIMESTAMPREPLY), "ICMP_TIMESTAMPREPLY" },
938 #if defined(ICMP_INFO_REQUEST)
939 { (1<<ICMP_INFO_REQUEST), "ICMP_INFO_REQUEST" },
941 #if defined(ICMP_INFO_REPLY)
942 { (1<<ICMP_INFO_REPLY), "ICMP_INFO_REPLY" },
944 #if defined(ICMP_ADDRESS)
945 { (1<<ICMP_ADDRESS), "ICMP_ADDRESS" },
947 #if defined(ICMP_ADDRESSREPLY)
948 { (1<<ICMP_ADDRESSREPLY), "ICMP_ADDRESSREPLY" },
954 #if defined(AF_PACKET) /* from e.g. linux/if_packet.h */
955 static const struct xlat af_packet_types[] = {
956 #if defined(PACKET_HOST)
957 { PACKET_HOST, "PACKET_HOST" },
959 #if defined(PACKET_BROADCAST)
960 { PACKET_BROADCAST, "PACKET_BROADCAST" },
962 #if defined(PACKET_MULTICAST)
963 { PACKET_MULTICAST, "PACKET_MULTICAST" },
965 #if defined(PACKET_OTHERHOST)
966 { PACKET_OTHERHOST, "PACKET_OTHERHOST" },
968 #if defined(PACKET_OUTGOING)
969 { PACKET_OUTGOING, "PACKET_OUTGOING" },
971 #if defined(PACKET_LOOPBACK)
972 { PACKET_LOOPBACK, "PACKET_LOOPBACK" },
974 #if defined(PACKET_FASTROUTE)
975 { PACKET_FASTROUTE, "PACKET_FASTROUTE" },
979 #endif /* defined(AF_PACKET) */
983 printsock(struct tcb *tcp, long addr, int addrlen)
988 struct sockaddr_in sin;
989 struct sockaddr_un sau;
990 #ifdef HAVE_INET_NTOP
991 struct sockaddr_in6 sa6;
993 #if defined(LINUX) && defined(AF_IPX)
994 struct sockaddr_ipx sipx;
997 struct sockaddr_ll ll;
1000 struct sockaddr_nl nl;
1003 char string_addr[100];
1009 if (!verbose(tcp)) {
1010 tprintf("%#lx", addr);
1014 if (addrlen < 2 || addrlen > sizeof(addrbuf))
1015 addrlen = sizeof(addrbuf);
1017 memset(&addrbuf, 0, sizeof(addrbuf));
1018 if (umoven(tcp, addr, addrlen, addrbuf.pad) < 0) {
1022 addrbuf.pad[sizeof(addrbuf.pad) - 1] = '\0';
1024 tprintf("{sa_family=");
1025 printxval(addrfams, addrbuf.sa.sa_family, "AF_???");
1028 switch (addrbuf.sa.sa_family) {
1032 } else if (addrbuf.sau.sun_path[0]) {
1034 printpathn(tcp, addr + 2, strlen(addrbuf.sau.sun_path));
1037 printpathn(tcp, addr + 3, strlen(addrbuf.sau.sun_path + 1));
1041 tprintf("sin_port=htons(%u), sin_addr=inet_addr(\"%s\")",
1042 ntohs(addrbuf.sin.sin_port), inet_ntoa(addrbuf.sin.sin_addr));
1044 #ifdef HAVE_INET_NTOP
1046 inet_ntop(AF_INET6, &addrbuf.sa6.sin6_addr, string_addr, sizeof(string_addr));
1047 tprintf("sin6_port=htons(%u), inet_pton(AF_INET6, \"%s\", &sin6_addr), sin6_flowinfo=%u",
1048 ntohs(addrbuf.sa6.sin6_port), string_addr,
1049 addrbuf.sa6.sin6_flowinfo);
1050 #ifdef HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID
1052 #if defined(HAVE_IF_INDEXTONAME) && defined(IN6_IS_ADDR_LINKLOCAL) && defined(IN6_IS_ADDR_MC_LINKLOCAL)
1053 int numericscope = 0;
1054 if (IN6_IS_ADDR_LINKLOCAL (&addrbuf.sa6.sin6_addr)
1055 || IN6_IS_ADDR_MC_LINKLOCAL (&addrbuf.sa6.sin6_addr)) {
1056 char scopebuf[IFNAMSIZ + 1];
1058 if (if_indextoname (addrbuf.sa6.sin6_scope_id, scopebuf) == NULL)
1061 tprintf(", sin6_scope_id=if_nametoindex(\"%s\")", scopebuf);
1067 tprintf(", sin6_scope_id=%u", addrbuf.sa6.sin6_scope_id);
1072 #if defined(AF_IPX) && defined(linux)
1076 tprintf("sipx_port=htons(%u), ",
1077 ntohs(addrbuf.sipx.sipx_port));
1078 /* Yes, I know, this does not look too
1079 * strace-ish, but otherwise the IPX
1080 * addresses just look monstrous...
1081 * Anyways, feel free if you don't like
1084 tprintf("%08lx:", (unsigned long)ntohl(addrbuf.sipx.sipx_network));
1085 for (i = 0; i<IPX_NODE_LEN; i++)
1086 tprintf("%02x", addrbuf.sipx.sipx_node[i]);
1087 tprintf("/[%02x]", addrbuf.sipx.sipx_type);
1090 #endif /* AF_IPX && linux */
1095 tprintf("proto=%#04x, if%d, pkttype=",
1096 ntohs(addrbuf.ll.sll_protocol),
1097 addrbuf.ll.sll_ifindex);
1098 printxval(af_packet_types, addrbuf.ll.sll_pkttype, "?");
1099 tprintf(", addr(%d)={%d, ",
1100 addrbuf.ll.sll_halen,
1101 addrbuf.ll.sll_hatype);
1102 for (i=0; i<addrbuf.ll.sll_halen; i++)
1103 tprintf("%02x", addrbuf.ll.sll_addr[i]);
1107 #endif /* AF_APACKET */
1110 tprintf("pid=%d, groups=%08x", addrbuf.nl.nl_pid, addrbuf.nl.nl_groups);
1112 #endif /* AF_NETLINK */
1113 /* AF_AX25 AF_APPLETALK AF_NETROM AF_BRIDGE AF_AAL5
1114 AF_X25 AF_ROSE etc. still need to be done */
1117 tprintf("sa_data=");
1118 printstr(tcp, (long) &((struct sockaddr *) addr)->sa_data,
1119 sizeof addrbuf.sa.sa_data);
1126 static const struct xlat scmvals[] = {
1128 { SCM_RIGHTS, "SCM_RIGHTS" },
1130 #ifdef SCM_CREDENTIALS
1131 { SCM_CREDENTIALS, "SCM_CREDENTIALS" },
1137 printcmsghdr(struct tcb *tcp, unsigned long addr, unsigned long len)
1139 struct cmsghdr *cmsg = len < sizeof(struct cmsghdr) ?
1141 if (cmsg == NULL || umoven(tcp, addr, len, (char *) cmsg) < 0) {
1142 tprintf(", msg_control=%#lx", addr);
1147 tprintf(", {cmsg_len=%u, cmsg_level=", (unsigned) cmsg->cmsg_len);
1148 printxval(socketlayers, cmsg->cmsg_level, "SOL_???");
1149 tprintf(", cmsg_type=");
1151 if (cmsg->cmsg_level == SOL_SOCKET) {
1152 unsigned long cmsg_len;
1154 printxval(scmvals, cmsg->cmsg_type, "SCM_???");
1155 cmsg_len = (len < cmsg->cmsg_len) ? len : cmsg->cmsg_len;
1157 if (cmsg->cmsg_type == SCM_RIGHTS
1158 && CMSG_LEN(sizeof(int)) <= cmsg_len) {
1159 int *fds = (int *) CMSG_DATA (cmsg);
1163 while ((char *) fds < ((char *) cmsg + cmsg_len)) {
1166 tprintf("%d", *fds++);
1173 if (cmsg->cmsg_type == SCM_CREDENTIALS
1174 && CMSG_LEN(sizeof(struct ucred)) <= cmsg_len) {
1175 struct ucred *uc = (struct ucred *) CMSG_DATA (cmsg);
1177 tprintf("{pid=%ld, uid=%ld, gid=%ld}}",
1178 (long)uc->pid, (long)uc->uid, (long)uc->gid);
1188 printmsghdr(tcp, addr)
1194 if (umove(tcp, addr, &msg) < 0) {
1195 tprintf("%#lx", addr);
1198 tprintf("{msg_name(%d)=", msg.msg_namelen);
1199 printsock(tcp, (long)msg.msg_name, msg.msg_namelen);
1201 tprintf(", msg_iov(%lu)=", (unsigned long)msg.msg_iovlen);
1202 tprint_iov(tcp, (unsigned long)msg.msg_iovlen,
1203 (unsigned long)msg.msg_iov);
1205 #ifdef HAVE_STRUCT_MSGHDR_MSG_CONTROL
1206 tprintf(", msg_controllen=%lu", (unsigned long)msg.msg_controllen);
1207 if (msg.msg_controllen)
1208 printcmsghdr(tcp, (unsigned long) msg.msg_control,
1209 msg.msg_controllen);
1210 tprintf(", msg_flags=");
1211 printflags(msg_flags, msg.msg_flags, "MSG_???");
1212 #else /* !HAVE_STRUCT_MSGHDR_MSG_CONTROL */
1213 tprintf("msg_accrights=%#lx, msg_accrightslen=%u",
1214 (unsigned long) msg.msg_accrights, msg.msg_accrightslen);
1215 #endif /* !HAVE_STRUCT_MSGHDR_MSG_CONTROL */
1219 #endif /* HAVE_SENDMSG */
1222 * low bits of the socket type define real socket type,
1223 * other bits are socket type flags.
1226 tprint_sock_type(struct tcb *tcp, int flags)
1228 const char *str = xlookup(socktypes, flags & SOCK_TYPE_MASK);
1233 flags &= ~SOCK_TYPE_MASK;
1238 printflags(sock_type_flags, flags, "SOCK_???");
1242 sys_socket(struct tcb *tcp)
1244 if (entering(tcp)) {
1245 printxval(domains, tcp->u_arg[0], "PF_???");
1247 tprint_sock_type(tcp, tcp->u_arg[1]);
1249 switch (tcp->u_arg[0]) {
1254 printxval(protocols, tcp->u_arg[2], "IPPROTO_???");
1258 /* BTW: I don't believe this.. */
1260 printxval(domains, tcp->u_arg[2], "PF_???");
1265 tprintf("%lu", tcp->u_arg[2]);
1277 if (entering(tcp)) {
1278 /* not sure really what these args are... but this
1279 * is how truss prints it
1281 tprintf("%ld, %ld, %ld, ",
1282 tcp->u_arg[0], tcp->u_arg[1], tcp->u_arg[2]);
1283 printpath(tcp, tcp->u_arg[3]);
1284 tprintf(", %ld", tcp->u_arg[4]);
1290 sys_so_socketpair(tcp)
1293 if (entering(tcp)) {
1294 /* not sure what this arg is */
1295 tprintf("0x%lx", tcp->u_arg[0]);
1305 if (entering(tcp)) {
1306 tprintf("%ld, ", tcp->u_arg[0]);
1307 printsock(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1308 tprintf(", %lu", tcp->u_arg[2]);
1317 return sys_bind(tcp);
1324 if (entering(tcp)) {
1325 tprintf("%ld, %lu", tcp->u_arg[0], tcp->u_arg[1]);
1331 do_accept(struct tcb *tcp, int flags_arg)
1333 if (entering(tcp)) {
1334 tprintf("%ld, ", tcp->u_arg[0]);
1338 tprintf("%#lx, NULL", tcp->u_arg[1]);
1341 if (tcp->u_arg[1] == 0 || syserror(tcp)
1342 || umove (tcp, tcp->u_arg[2], &len) < 0) {
1343 tprintf("%#lx", tcp->u_arg[1]);
1345 printsock(tcp, tcp->u_arg[1], len);
1348 printnum_int(tcp, tcp->u_arg[2], "%u");
1350 if (flags_arg >= 0) {
1352 printflags(sock_type_flags, tcp->u_arg[flags_arg],
1359 sys_accept(struct tcb *tcp)
1361 return do_accept(tcp, -1);
1366 sys_accept4(struct tcb *tcp)
1368 return do_accept(tcp, 3);
1376 if (entering(tcp)) {
1377 tprintf("%ld, ", tcp->u_arg[0]);
1378 printstr(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1379 tprintf(", %lu, ", tcp->u_arg[2]);
1381 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1390 if (entering(tcp)) {
1391 tprintf("%ld, ", tcp->u_arg[0]);
1392 printstr(tcp, tcp->u_arg[1], tcp->u_arg[2]);
1393 tprintf(", %lu, ", tcp->u_arg[2]);
1395 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1398 printsock(tcp, tcp->u_arg[4], tcp->u_arg[5]);
1400 tprintf(", %lu", tcp->u_arg[5]);
1411 if (entering(tcp)) {
1412 tprintf("%ld, ", tcp->u_arg[0]);
1413 printmsghdr(tcp, tcp->u_arg[1]);
1416 printflags(msg_flags, tcp->u_arg[2], "MSG_???");
1421 #endif /* HAVE_SENDMSG */
1427 if (entering(tcp)) {
1428 tprintf("%ld, ", tcp->u_arg[0]);
1431 tprintf("%#lx", tcp->u_arg[1]);
1433 printstr(tcp, tcp->u_arg[1], tcp->u_rval);
1435 tprintf(", %lu, ", tcp->u_arg[2]);
1436 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1447 if (entering(tcp)) {
1448 tprintf("%ld, ", tcp->u_arg[0]);
1450 if (syserror(tcp)) {
1451 tprintf("%#lx, %lu, %lu, %#lx, %#lx",
1452 tcp->u_arg[1], tcp->u_arg[2], tcp->u_arg[3],
1453 tcp->u_arg[4], tcp->u_arg[5]);
1457 printstr(tcp, tcp->u_arg[1], tcp->u_rval);
1459 tprintf(", %lu, ", tcp->u_arg[2]);
1461 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1462 /* from address, len */
1463 if (!tcp->u_arg[4] || !tcp->u_arg[5]) {
1464 if (tcp->u_arg[4] == 0)
1467 tprintf(", %#lx", tcp->u_arg[4]);
1468 if (tcp->u_arg[5] == 0)
1471 tprintf(", %#lx", tcp->u_arg[5]);
1474 if (umove(tcp, tcp->u_arg[5], &fromlen) < 0) {
1475 tprintf(", {...}, [?]");
1479 printsock(tcp, tcp->u_arg[4], tcp->u_arg[5]);
1481 tprintf(", [%u]", fromlen);
1492 if (entering(tcp)) {
1493 tprintf("%ld, ", tcp->u_arg[0]);
1495 if (syserror(tcp) || !verbose(tcp))
1496 tprintf("%#lx", tcp->u_arg[1]);
1498 printmsghdr(tcp, tcp->u_arg[1]);
1501 printflags(msg_flags, tcp->u_arg[2], "MSG_???");
1506 #endif /* HAVE_SENDMSG */
1512 if (entering(tcp)) {
1513 tprintf("%ld, %ld", tcp->u_arg[0], tcp->u_arg[1]);
1514 switch (tcp->u_arg[1]) {
1516 tprintf("%s", " /* receive */");
1519 tprintf("%s", " /* send */");
1522 tprintf("%s", " /* send and receive */");
1530 sys_getsockname(tcp)
1533 return sys_accept(tcp);
1537 sys_getpeername(tcp)
1540 return sys_accept(tcp);
1544 do_pipe(struct tcb *tcp, int flags_arg)
1547 if (syserror(tcp)) {
1548 tprintf("%#lx", tcp->u_arg[0]);
1550 #if defined(LINUX) && !defined(SPARC) && !defined(SPARC64) && !defined(SH) && !defined(IA64)
1553 if (umoven(tcp, tcp->u_arg[0], sizeof fds, (char *) fds) < 0)
1556 tprintf("[%u, %u]", fds[0], fds[1]);
1557 #elif defined(SPARC) || defined(SPARC64) || defined(SH) || defined(SVR4) || defined(FREEBSD) || defined(IA64)
1558 tprintf("[%lu, %lu]", tcp->u_rval, getrval2(tcp));
1560 tprintf("%#lx", tcp->u_arg[0]);
1563 if (flags_arg >= 0) {
1565 printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???");
1572 sys_pipe(struct tcb *tcp)
1574 return do_pipe(tcp, -1);
1579 sys_pipe2(struct tcb *tcp)
1581 return do_pipe(tcp, 1);
1586 sys_socketpair(struct tcb *tcp)
1592 if (entering(tcp)) {
1593 printxval(domains, tcp->u_arg[0], "PF_???");
1595 tprint_sock_type(tcp, tcp->u_arg[1]);
1597 switch (tcp->u_arg[0]) {
1599 printxval(protocols, tcp->u_arg[2], "IPPROTO_???");
1603 /* BTW: I don't believe this.. */
1605 printxval(domains, tcp->u_arg[2], "PF_???");
1610 tprintf("%lu", tcp->u_arg[2]);
1614 if (syserror(tcp)) {
1615 tprintf(", %#lx", tcp->u_arg[3]);
1619 if (umoven(tcp, tcp->u_arg[3], sizeof fds, (char *) fds) < 0)
1622 tprintf(", [%u, %u]", fds[0], fds[1]);
1624 #if defined(SUNOS4) || defined(SVR4) || defined(FREEBSD)
1625 tprintf(", [%lu, %lu]", tcp->u_rval, getrval2(tcp));
1626 #endif /* SUNOS4 || SVR4 || FREEBSD */
1632 sys_getsockopt(struct tcb *tcp)
1634 if (entering(tcp)) {
1635 tprintf("%ld, ", tcp->u_arg[0]);
1636 printxval(socketlayers, tcp->u_arg[1], "SOL_???");
1638 switch (tcp->u_arg[1]) {
1640 printxval(sockoptions, tcp->u_arg[2], "SO_???");
1644 printxval(sockipoptions, tcp->u_arg[2], "IP_???");
1649 printxval(sockipv6options, tcp->u_arg[2], "IPV6_???");
1654 printxval(sockipxoptions, tcp->u_arg[2], "IPX_???");
1659 printxval(sockpacketoptions, tcp->u_arg[2], "PACKET_???");
1664 printxval(socktcpoptions, tcp->u_arg[2], "TCP_???");
1668 /* SOL_AX25 SOL_ROSE SOL_ATALK SOL_NETROM SOL_UDP SOL_DECNET SOL_X25
1669 * etc. still need work */
1671 tprintf("%lu", tcp->u_arg[2]);
1677 if (syserror(tcp) || umove (tcp, tcp->u_arg[4], &len) < 0) {
1678 tprintf("%#lx, %#lx",
1679 tcp->u_arg[3], tcp->u_arg[4]);
1683 switch (tcp->u_arg[1]) {
1685 switch (tcp->u_arg[2]) {
1688 if (len == sizeof (struct linger)) {
1689 struct linger linger;
1694 tprintf("{onoff=%d, linger=%d}, "
1706 switch (tcp->u_arg[2]) {
1707 #ifdef PACKET_STATISTICS
1708 case PACKET_STATISTICS:
1709 if (len == sizeof(struct tpacket_stats)) {
1710 struct tpacket_stats stats;
1715 tprintf("{packets=%u, drops=%u}, "
1728 if (len == sizeof (int)) {
1729 printnum_int(tcp, tcp->u_arg[3], "%d");
1732 printstr (tcp, tcp->u_arg[3], len);
1734 tprintf(", [%d]", len);
1739 #if defined(ICMP_FILTER)
1740 static void printicmpfilter(tcp, addr)
1744 struct icmp_filter filter;
1750 if (syserror(tcp) || !verbose(tcp)) {
1751 tprintf("%#lx", addr);
1754 if (umove(tcp, addr, &filter) < 0) {
1760 printflags(icmpfilterflags, ~filter.data, "ICMP_???");
1763 #endif /* ICMP_FILTER */
1766 printsockopt (tcp, level, name, addr, len)
1773 printxval(socketlayers, level, "SOL_??");
1777 printxval(sockoptions, name, "SO_???");
1779 #if defined(SO_LINGER)
1781 if (len == sizeof (struct linger)) {
1782 struct linger linger;
1783 if (umove (tcp, addr, &linger) < 0)
1785 tprintf(", {onoff=%d, linger=%d}",
1796 printxval(sockipoptions, name, "IP_???");
1801 printxval(sockipv6options, name, "IPV6_???");
1806 printxval(sockipxoptions, name, "IPX_???");
1811 printxval(sockpacketoptions, name, "PACKET_???");
1812 /* TODO: decode packate_mreq for PACKET_*_MEMBERSHIP */
1814 #ifdef PACKET_RX_RING
1815 case PACKET_RX_RING:
1817 #ifdef PACKET_TX_RING
1818 case PACKET_TX_RING:
1820 #if defined(PACKET_RX_RING) || defined(PACKET_TX_RING)
1821 if (len == sizeof(struct tpacket_req)) {
1822 struct tpacket_req req;
1823 if (umove(tcp, addr, &req) < 0)
1825 tprintf(", {block_size=%u, block_nr=%u, frame_size=%u, frame_nr=%u}",
1833 #endif /* PACKET_RX_RING || PACKET_TX_RING */
1839 printxval(socktcpoptions, name, "TCP_???");
1844 printxval(sockrawoptions, name, "RAW_???");
1846 #if defined(ICMP_FILTER)
1849 printicmpfilter(tcp, addr);
1856 /* SOL_AX25 SOL_ATALK SOL_NETROM SOL_UDP SOL_DECNET SOL_X25
1857 * etc. still need work */
1860 tprintf("%u", name);
1863 /* default arg printing */
1867 if (len == sizeof (int)) {
1868 printnum_int (tcp, addr, "%d");
1871 printstr (tcp, addr, len);
1877 #ifdef HAVE_STRUCT_OPTHDR
1880 print_sock_optmgmt (tcp, addr, len)
1888 while (len >= (int) sizeof hdr) {
1889 if (umove(tcp, addr, &hdr) < 0) break;
1893 else if (len > hdr.len + sizeof hdr) {
1899 printsockopt (tcp, hdr.level, hdr.name, addr, hdr.len);
1907 if (c++) tprintf (", ");
1908 printstr (tcp, addr, len);
1910 if (c > 1) tprintf ("]");
1919 if (entering(tcp)) {
1920 tprintf("%ld, ", tcp->u_arg[0]);
1921 printsockopt (tcp, tcp->u_arg[1], tcp->u_arg[2],
1922 tcp->u_arg[3], tcp->u_arg[4]);
1923 tprintf(", %lu", tcp->u_arg[4]);
1930 static const struct xlat sock_version[] = {
1931 { __NETLIB_UW211_SVR4, "UW211_SVR4" },
1932 { __NETLIB_UW211_XPG4, "UW211_XPG4" },
1933 { __NETLIB_GEMINI_SVR4, "GEMINI_SVR4" },
1934 { __NETLIB_GEMINI_XPG4, "GEMINI_XPG4" },
1935 { __NETLIB_FP1_SVR4, "FP1_SVR4" },
1936 { __NETLIB_FP1_XPG4, "FP1_XPG4" },
1942 netlib_call(tcp, func)
1946 if (entering(tcp)) {
1948 printxval (sock_version, tcp->u_arg[0], "__NETLIB_???");
1951 for (i = 0; i < tcp->u_nargs; i++)
1952 tcp->u_arg[i] = tcp->u_arg[i + 1];
1964 return netlib_call (tcp, sys_socket);
1968 sys_xsocketpair(tcp)
1971 return netlib_call (tcp, sys_socketpair);
1978 return netlib_call (tcp, sys_bind);
1985 return netlib_call (tcp, sys_connect);
1992 return netlib_call (tcp, sys_listen);
1999 return netlib_call (tcp, sys_accept);
2006 return netlib_call (tcp, sys_sendmsg);
2013 return netlib_call (tcp, sys_recvmsg);
2017 sys_xgetsockaddr(tcp)
2020 if (entering(tcp)) {
2021 printxval (sock_version, tcp->u_arg[0], "__NETLIB_???");
2023 if (tcp->u_arg[1] == 0) {
2024 tprintf ("LOCALNAME, ");
2026 else if (tcp->u_arg[1] == 1) {
2027 tprintf ("REMOTENAME, ");
2030 tprintf ("%ld, ", tcp->u_arg [1]);
2032 tprintf ("%ld, ", tcp->u_arg [2]);
2035 if (tcp->u_arg[3] == 0 || syserror(tcp)) {
2036 tprintf("%#lx", tcp->u_arg[3]);
2038 printsock(tcp, tcp->u_arg[3], tcp->u_arg[4]);
2041 printnum(tcp, tcp->u_arg[4], "%lu");
2049 sys_xgetsockopt(tcp)
2052 return netlib_call (tcp, sys_getsockopt);
2056 sys_xsetsockopt(tcp)
2059 return netlib_call (tcp, sys_setsockopt);
2066 return netlib_call (tcp, sys_shutdown);
2069 #endif /* UNIXWARE */