2 * Copyright (c) 2014 Zubin Mithra <zubin.mithra@gmail.com>
3 * Copyright (c) 2014-2016 Dmitry V. Levin <ldv@altlinux.org>
4 * Copyright (c) 2014-2017 The strace developers.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. The name of the author may not be used to endorse or promote products
16 * derived from this software without specific prior written permission.
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
19 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
20 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
21 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
22 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
23 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
24 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
25 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
26 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
27 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 #include <netinet/in.h>
32 #include <sys/socket.h>
33 #include <arpa/inet.h>
35 #include <linux/sock_diag.h>
36 #include <linux/inet_diag.h>
37 #include <linux/unix_diag.h>
38 #include <linux/netlink_diag.h>
39 #include <linux/rtnetlink.h>
40 #if HAVE_LINUX_GENETLINK_H
41 #include <linux/genetlink.h>
46 # define UNIX_PATH_MAX sizeof(((struct sockaddr_un *) 0)->sun_path)
56 #define CACHE_SIZE 1024U
57 static cache_entry cache[CACHE_SIZE];
58 #define CACHE_MASK (CACHE_SIZE - 1)
61 cache_inode_details(const unsigned long inode, char *const details)
63 cache_entry *e = &cache[inode & CACHE_MASK];
72 get_sockaddr_by_inode_cached(const unsigned long inode)
74 const cache_entry *const e = &cache[inode & CACHE_MASK];
75 return (e && inode == e->inode) ? e->details : NULL;
79 print_sockaddr_by_inode_cached(const unsigned long inode)
81 const char *const details = get_sockaddr_by_inode_cached(inode);
90 send_query(struct tcb *tcp, const int fd, void *req, size_t req_size)
92 struct sockaddr_nl nladdr = {
93 .nl_family = AF_NETLINK
99 const struct msghdr msg = {
101 .msg_namelen = sizeof(nladdr),
107 if (sendmsg(fd, &msg, 0) < 0) {
117 inet_send_query(struct tcb *tcp, const int fd, const int family,
121 const struct nlmsghdr nlh;
122 const struct inet_diag_req_v2 idr;
125 .nlmsg_len = sizeof(req),
126 .nlmsg_type = SOCK_DIAG_BY_FAMILY,
127 .nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST
130 .sdiag_family = family,
131 .sdiag_protocol = proto,
135 return send_query(tcp, fd, &req, sizeof(req));
139 inet_parse_response(const void *const data, const int data_len,
140 const unsigned long inode, void *opaque_data)
142 const char *const proto_name = opaque_data;
143 const struct inet_diag_msg *const diag_msg = data;
144 static const char zero_addr[sizeof(struct in6_addr)];
145 socklen_t addr_size, text_size;
147 if (data_len < (int) NLMSG_LENGTH(sizeof(*diag_msg)))
149 if (diag_msg->idiag_inode != inode)
152 switch (diag_msg->idiag_family) {
154 addr_size = sizeof(struct in_addr);
155 text_size = INET_ADDRSTRLEN;
158 addr_size = sizeof(struct in6_addr);
159 text_size = INET6_ADDRSTRLEN;
165 char src_buf[text_size];
168 if (!inet_ntop(diag_msg->idiag_family, diag_msg->id.idiag_src,
172 if (diag_msg->id.idiag_dport ||
173 memcmp(zero_addr, diag_msg->id.idiag_dst, addr_size)) {
174 char dst_buf[text_size];
176 if (!inet_ntop(diag_msg->idiag_family, diag_msg->id.idiag_dst,
180 if (asprintf(&details, "%s:[%s:%u->%s:%u]", proto_name,
181 src_buf, ntohs(diag_msg->id.idiag_sport),
182 dst_buf, ntohs(diag_msg->id.idiag_dport)) < 0)
185 if (asprintf(&details, "%s:[%s:%u]", proto_name, src_buf,
186 ntohs(diag_msg->id.idiag_sport)) < 0)
190 return cache_inode_details(inode, details);
194 receive_responses(struct tcb *tcp, const int fd, const unsigned long inode,
195 const unsigned long expected_msg_type,
196 int (*parser)(const void *, int,
197 unsigned long, void *),
202 long buf[8192 / sizeof(long)];
205 struct sockaddr_nl nladdr = {
206 .nl_family = AF_NETLINK
209 .iov_base = hdr_buf.buf,
210 .iov_len = sizeof(hdr_buf.buf)
215 struct msghdr msg = {
217 .msg_namelen = sizeof(nladdr),
222 ssize_t ret = recvmsg(fd, &msg, flags);
229 const struct nlmsghdr *h = &hdr_buf.hdr;
230 if (!NLMSG_OK(h, ret))
232 for (; NLMSG_OK(h, ret); h = NLMSG_NEXT(h, ret)) {
233 if (h->nlmsg_type != expected_msg_type)
235 const int rc = parser(NLMSG_DATA(h),
236 h->nlmsg_len, inode, opaque_data);
242 flags = MSG_DONTWAIT;
247 unix_send_query(struct tcb *tcp, const int fd, const unsigned long inode)
250 const struct nlmsghdr nlh;
251 const struct unix_diag_req udr;
254 .nlmsg_len = sizeof(req),
255 .nlmsg_type = SOCK_DIAG_BY_FAMILY,
256 .nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST
259 .sdiag_family = AF_UNIX,
262 .udiag_show = UDIAG_SHOW_NAME | UDIAG_SHOW_PEER
265 return send_query(tcp, fd, &req, sizeof(req));
269 unix_parse_response(const void *data, const int data_len,
270 const unsigned long inode, void *opaque_data)
272 const char *proto_name = opaque_data;
273 const struct unix_diag_msg *diag_msg = data;
275 int rta_len = data_len - NLMSG_LENGTH(sizeof(*diag_msg));
278 char path[UNIX_PATH_MAX + 1];
282 if (diag_msg->udiag_ino != inode)
284 if (diag_msg->udiag_family != AF_UNIX)
287 for (attr = (struct rtattr *) (diag_msg + 1);
288 RTA_OK(attr, rta_len);
289 attr = RTA_NEXT(attr, rta_len)) {
290 switch (attr->rta_type) {
293 path_len = RTA_PAYLOAD(attr);
294 if (path_len > UNIX_PATH_MAX)
295 path_len = UNIX_PATH_MAX;
296 memcpy(path, RTA_DATA(attr), path_len);
297 path[path_len] = '\0';
301 if (RTA_PAYLOAD(attr) >= 4)
302 peer = *(uint32_t *) RTA_DATA(attr);
308 * print obtained information in the following format:
309 * "UNIX:[" SELF_INODE [ "->" PEER_INODE ][ "," SOCKET_FILE ] "]"
311 if (!peer && !path_len)
314 char peer_str[3 + sizeof(peer) * 3];
316 xsprintf(peer_str, "->%u", peer);
320 const char *path_str;
322 char *outstr = alloca(4 * path_len + 4);
325 if (path[0] == '\0') {
327 string_quote(path + 1, outstr + 2,
328 path_len - 1, QUOTE_0_TERMINATED);
330 string_quote(path, outstr + 1,
331 path_len, QUOTE_0_TERMINATED);
339 if (asprintf(&details, "%s:[%lu%s%s]", proto_name, inode,
340 peer_str, path_str) < 0)
343 return cache_inode_details(inode, details);
347 netlink_send_query(struct tcb *tcp, const int fd, const unsigned long inode)
350 const struct nlmsghdr nlh;
351 const struct netlink_diag_req ndr;
354 .nlmsg_len = sizeof(req),
355 .nlmsg_type = SOCK_DIAG_BY_FAMILY,
356 .nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST
359 .sdiag_family = AF_NETLINK,
360 .sdiag_protocol = NDIAG_PROTO_ALL,
361 .ndiag_show = NDIAG_SHOW_MEMINFO
364 return send_query(tcp, fd, &req, sizeof(req));
368 netlink_parse_response(const void *data, const int data_len,
369 const unsigned long inode, void *opaque_data)
371 const char *proto_name = opaque_data;
372 const struct netlink_diag_msg *const diag_msg = data;
373 const char *netlink_proto;
376 if (data_len < (int) NLMSG_LENGTH(sizeof(*diag_msg)))
378 if (diag_msg->ndiag_ino != inode)
381 if (diag_msg->ndiag_family != AF_NETLINK)
384 netlink_proto = xlookup(netlink_protocols,
385 diag_msg->ndiag_protocol);
388 netlink_proto = STR_STRIP_PREFIX(netlink_proto, "NETLINK_");
389 if (asprintf(&details, "%s:[%s:%u]", proto_name,
390 netlink_proto, diag_msg->ndiag_portid) < 0)
393 if (asprintf(&details, "%s:[%u]", proto_name,
394 (unsigned) diag_msg->ndiag_protocol) < 0)
398 return cache_inode_details(inode, details);
402 unix_get(struct tcb *tcp, const int fd, const unsigned long inode)
404 return unix_send_query(tcp, fd, inode)
405 && receive_responses(tcp, fd, inode, SOCK_DIAG_BY_FAMILY,
406 unix_parse_response, (void *) "UNIX")
407 ? get_sockaddr_by_inode_cached(inode) : NULL;
411 inet_get(struct tcb *tcp, const int fd, const int family, const int protocol,
412 const unsigned long inode, const char *proto_name)
414 return inet_send_query(tcp, fd, family, protocol)
415 && receive_responses(tcp, fd, inode, SOCK_DIAG_BY_FAMILY,
416 inet_parse_response, (void *) proto_name)
417 ? get_sockaddr_by_inode_cached(inode) : NULL;
421 tcp_v4_get(struct tcb *tcp, const int fd, const unsigned long inode)
423 return inet_get(tcp, fd, AF_INET, IPPROTO_TCP, inode, "TCP");
427 udp_v4_get(struct tcb *tcp, const int fd, const unsigned long inode)
429 return inet_get(tcp, fd, AF_INET, IPPROTO_UDP, inode, "UDP");
433 tcp_v6_get(struct tcb *tcp, const int fd, const unsigned long inode)
435 return inet_get(tcp, fd, AF_INET6, IPPROTO_TCP, inode, "TCPv6");
439 udp_v6_get(struct tcb *tcp, const int fd, const unsigned long inode)
441 return inet_get(tcp, fd, AF_INET6, IPPROTO_UDP, inode, "UDPv6");
445 netlink_get(struct tcb *tcp, const int fd, const unsigned long inode)
447 return netlink_send_query(tcp, fd, inode)
448 && receive_responses(tcp, fd, inode, SOCK_DIAG_BY_FAMILY,
449 netlink_parse_response, (void *) "NETLINK")
450 ? get_sockaddr_by_inode_cached(inode) : NULL;
453 static const struct {
454 const char *const name;
455 const char * (*const get)(struct tcb *, int, unsigned long);
457 [SOCK_PROTO_UNIX] = { "UNIX", unix_get },
458 [SOCK_PROTO_TCP] = { "TCP", tcp_v4_get },
459 [SOCK_PROTO_UDP] = { "UDP", udp_v4_get },
460 [SOCK_PROTO_TCPv6] = { "TCPv6", tcp_v6_get },
461 [SOCK_PROTO_UDPv6] = { "UDPv6", udp_v6_get },
462 [SOCK_PROTO_NETLINK] = { "NETLINK", netlink_get }
466 get_proto_by_name(const char *const name)
469 for (i = (unsigned int) SOCK_PROTO_UNKNOWN + 1;
470 i < ARRAY_SIZE(protocols); ++i) {
471 if (protocols[i].name && !strcmp(name, protocols[i].name))
472 return (enum sock_proto) i;
474 return SOCK_PROTO_UNKNOWN;
478 get_sockaddr_by_inode_uncached(struct tcb *tcp, const unsigned long inode,
479 const enum sock_proto proto)
481 if ((unsigned int) proto >= ARRAY_SIZE(protocols) ||
482 (proto != SOCK_PROTO_UNKNOWN && !protocols[proto].get))
485 const int fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_SOCK_DIAG);
488 const char *details = NULL;
490 if (proto != SOCK_PROTO_UNKNOWN) {
491 details = protocols[proto].get(tcp, fd, inode);
494 for (i = (unsigned int) SOCK_PROTO_UNKNOWN + 1;
495 i < ARRAY_SIZE(protocols); ++i) {
496 if (!protocols[i].get)
498 details = protocols[i].get(tcp, fd, inode);
509 print_sockaddr_by_inode_uncached(struct tcb *tcp, const unsigned long inode,
510 const enum sock_proto proto)
512 const char *details = get_sockaddr_by_inode_uncached(tcp, inode, proto);
519 if ((unsigned int) proto < ARRAY_SIZE(protocols) &&
520 protocols[proto].name) {
521 tprintf("%s:[%lu]", protocols[proto].name, inode);
528 /* Given an inode number of a socket, return its protocol details. */
530 get_sockaddr_by_inode(struct tcb *const tcp, const int fd,
531 const unsigned long inode)
533 const char *details = get_sockaddr_by_inode_cached(inode);
534 return details ? details :
535 get_sockaddr_by_inode_uncached(tcp, inode, getfdproto(tcp, fd));
538 /* Given an inode number of a socket, print out its protocol details. */
540 print_sockaddr_by_inode(struct tcb *const tcp, const int fd,
541 const unsigned long inode)
543 return print_sockaddr_by_inode_cached(inode) ? true :
544 print_sockaddr_by_inode_uncached(tcp, inode,
545 getfdproto(tcp, fd));
548 #ifdef HAVE_LINUX_GENETLINK_H
550 * Managing the cache for decoding communications of Netlink GENERIC protocol
552 * As name shown Netlink GENERIC protocol is generic protocol. The
553 * numbers of msg types used in the protocol are not defined
554 * statically. Kernel defines them on demand. So the xlat converted
555 * from header files doesn't help for decoding the protocol. Following
556 * codes are building xlat(dyxlat) at runtime.
559 genl_send_dump_families(struct tcb *tcp, const int fd)
562 const struct nlmsghdr nlh;
563 struct genlmsghdr gnlh;
566 .nlmsg_len = sizeof(req),
567 .nlmsg_type = GENL_ID_CTRL,
568 .nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
571 .cmd = CTRL_CMD_GETFAMILY,
574 return send_query(tcp, fd, &req, sizeof(req));
578 genl_parse_families_response(const void *const data,
579 const int data_len, const unsigned long inode,
582 struct dyxlat *const dyxlat = opaque_data;
583 const struct genlmsghdr *const gnlh = data;
585 int rta_len = data_len - NLMSG_LENGTH(sizeof(*gnlh));
588 unsigned int name_len = 0;
593 if (gnlh->cmd != CTRL_CMD_NEWFAMILY)
595 if (gnlh->version != 2)
598 for (attr = (struct rtattr *) (gnlh + 1);
599 RTA_OK(attr, rta_len);
600 attr = RTA_NEXT(attr, rta_len)) {
601 switch (attr->rta_type) {
602 case CTRL_ATTR_FAMILY_NAME:
604 name = RTA_DATA(attr);
605 name_len = RTA_PAYLOAD(attr);
608 case CTRL_ATTR_FAMILY_ID:
609 if (!id && RTA_PAYLOAD(attr) == sizeof(*id))
615 dyxlat_add_pair(dyxlat, *id, name, name_len);
625 genl_families_xlat(struct tcb *tcp)
627 static struct dyxlat *dyxlat;
630 dyxlat = dyxlat_alloc(32);
632 int fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC);
636 if (genl_send_dump_families(tcp, fd))
637 receive_responses(tcp, fd, 0, GENL_ID_CTRL,
638 genl_parse_families_response, dyxlat);
643 return dyxlat_get(dyxlat);
646 #else /* !HAVE_LINUX_GENETLINK_H */
649 genl_families_xlat(struct tcb *tcp)