]> granicus.if.org Git - strace/blobdiff - netlink_sock_diag.c
Remove linux/ptp_clock.h
[strace] / netlink_sock_diag.c
index bdefe8b68d6105b91f831a5c303e38f507eb46c9..dd1e03d3602a0592458782a2c179c4b81ea23736 100644 (file)
 
 #include "defs.h"
 #include "netlink.h"
-
-#include <arpa/inet.h>
-#include <linux/inet_diag.h>
-#include <linux/netlink_diag.h>
-#include <linux/packet_diag.h>
-#ifdef AF_SMC
-# include <linux/smc_diag.h>
-#endif
-#include <linux/unix_diag.h>
-
-#include "xlat/inet_diag_extended_flags.h"
-
-#include "xlat/tcp_states.h"
-#include "xlat/tcp_state_flags.h"
-
-#include "xlat/netlink_diag_show.h"
-#include "xlat/netlink_states.h"
-
-#include "xlat/packet_diag_show.h"
-
-#ifdef AF_SMC
-# include "xlat/smc_diag_extended_flags.h"
-# include "xlat/smc_states.h"
-#endif
-
-#include "xlat/unix_diag_show.h"
+#include "netlink_sock_diag.h"
 
 static void
 decode_family(struct tcb *const tcp, const uint8_t family,
-             const kernel_ulong_t addr, const kernel_ulong_t len)
+             const kernel_ulong_t addr, const unsigned int len)
 {
        tprints("{family=");
        printxval(addrfams, family, "AF_???");
        if (len > sizeof(family)) {
                tprints(", ");
-               printstrn(tcp, addr + sizeof(family),
-                         len - sizeof(family));
+               printstr_ex(tcp, addr + sizeof(family),
+                           len - sizeof(family), QUOTE_FORCE_HEX);
        }
        tprints("}");
 }
 
-static void
-decode_unix_diag_req(struct tcb *const tcp,
-                    const struct nlmsghdr *const nlmsghdr,
-                    const uint8_t family,
-                    const kernel_ulong_t addr,
-                    const kernel_ulong_t len)
-{
-       struct unix_diag_req req = { .sdiag_family = family };
-       const size_t offset = sizeof(req.sdiag_family);
-
-       tprints("{sdiag_family=");
-       printxval(addrfams, req.sdiag_family, "AF_???");
-
-       tprints(", ");
-       if (len >= sizeof(req)) {
-               if (!umoven_or_printaddr(tcp, addr + offset,
-                                        sizeof(req) - offset,
-                                        (void *) &req + offset)) {
-                       tprintf("sdiag_protocol=%" PRIu8 ", udiag_states=",
-                               req.sdiag_protocol);
-                       printflags(tcp_state_flags, req.udiag_states,
-                                  "1<<TCP_???");
-                       tprintf(", udiag_ino=%" PRIu32 ", udiag_show=",
-                               req.udiag_ino);
-                       printflags(unix_diag_show, req.udiag_show,
-                                  "UDIAG_SHOW_???");
-                       tprintf(", udiag_cookie=[%" PRIu32 ", %" PRIu32 "]",
-                               req.udiag_cookie[0], req.udiag_cookie[1]);
-               }
-       } else
-               tprints("...");
-       tprints("}");
-}
-
-static void
-decode_unix_diag_msg(struct tcb *const tcp,
-                    const struct nlmsghdr *const nlmsghdr,
-                    const uint8_t family,
-                    const kernel_ulong_t addr,
-                    const kernel_ulong_t len)
-{
-       struct unix_diag_msg msg = { .udiag_family = family };
-       const size_t offset = sizeof(msg.udiag_family);
-
-       tprints("{udiag_family=");
-       printxval(addrfams, msg.udiag_family, "AF_???");
-
-       tprints(", ");
-       if (len >= sizeof(msg)) {
-               if (!umoven_or_printaddr(tcp, addr + offset,
-                                        sizeof(msg) - offset,
-                                        (void *) &msg + offset)) {
-                       tprints("udiag_type=");
-                       printxval(socktypes, msg.udiag_type, "SOCK_???");
-                       tprintf(", udiag_state=");
-                       printxval(tcp_states, msg.udiag_state, "TCP_???");
-                       tprintf(", udiag_ino=%" PRIu32
-                               ", udiag_cookie=[%" PRIu32 ", %" PRIu32 "]",
-                               msg.udiag_ino,
-                               msg.udiag_cookie[0], msg.udiag_cookie[1]);
-               }
-       } else
-               tprints("...");
-       tprints("}");
-}
-
-static void
-decode_netlink_diag_req(struct tcb *const tcp,
-                       const struct nlmsghdr *const nlmsghdr,
-                       const uint8_t family,
-                       const kernel_ulong_t addr,
-                       const kernel_ulong_t len)
-{
-       struct netlink_diag_req req = { .sdiag_family = family };
-       const size_t offset = sizeof(req.sdiag_family);
-
-       tprints("{sdiag_family=");
-       printxval(addrfams, req.sdiag_family, "AF_???");
-
-       tprints(", ");
-       if (len >= sizeof(req)) {
-               if (!umoven_or_printaddr(tcp, addr + offset,
-                                        sizeof(req) - offset,
-                                        (void *) &req + offset)) {
-                       tprints("sdiag_protocol=");
-                       if (NDIAG_PROTO_ALL == req.sdiag_protocol)
-                               tprints("NDIAG_PROTO_ALL");
-                       else
-                               printxval(netlink_protocols,
-                                         req.sdiag_protocol, "NETLINK_???");
-                       tprintf(", ndiag_ino=%" PRIu32 ", ndiag_show=",
-                               req.ndiag_ino);
-                       printflags(netlink_diag_show, req.ndiag_show,
-                                  "NDIAG_SHOW_???");
-                       tprintf(", ndiag_cookie=[%" PRIu32 ", %" PRIu32 "]",
-                               req.ndiag_cookie[0], req.ndiag_cookie[1]);
-               }
-       } else
-               tprints("...");
-       tprints("}");
-}
-
-static void
-decode_netlink_diag_msg(struct tcb *const tcp,
-                       const struct nlmsghdr *const nlmsghdr,
-                       const uint8_t family,
-                       const kernel_ulong_t addr,
-                       const kernel_ulong_t len)
-{
-       struct netlink_diag_msg msg = { .ndiag_family = family };
-       const size_t offset = sizeof(msg.ndiag_family);
-
-       tprints("{ndiag_family=");
-       printxval(addrfams, msg.ndiag_family, "AF_???");
-
-       tprints(", ");
-       if (len >= sizeof(msg)) {
-               if (!umoven_or_printaddr(tcp, addr + offset,
-                                        sizeof(msg) - offset,
-                                        (void *) &msg + offset)) {
-                       tprints("ndiag_type=");
-                       printxval(socktypes, msg.ndiag_type, "SOCK_???");
-                       tprints(", ndiag_protocol=");
-                       printxval(netlink_protocols, msg.ndiag_protocol,
-                                 "NETLINK_???");
-                       tprints(", ndiag_state=");
-                       printxval(netlink_states, msg.ndiag_state,
-                                 "NETLINK_???");
-                       tprintf(", ndiag_portid=%" PRIu32
-                               ", ndiag_dst_portid=%" PRIu32
-                               ", ndiag_dst_group=%" PRIu32
-                               ", ndiag_ino=%" PRIu32
-                               ", ndiag_cookie=[%" PRIu32
-                               ", %" PRIu32 "]",
-                               msg.ndiag_portid,
-                               msg.ndiag_dst_portid,
-                               msg.ndiag_dst_group,
-                               msg.ndiag_ino,
-                               msg.ndiag_cookie[0],
-                               msg.ndiag_cookie[1]);
-               }
-       } else
-               tprints("...");
-       tprints("}");
-}
-
-static void
-decode_packet_diag_req(struct tcb *const tcp,
-                      const struct nlmsghdr *const nlmsghdr,
-                      const uint8_t family,
-                      const kernel_ulong_t addr,
-                      const kernel_ulong_t len)
-{
-       struct packet_diag_req req = { .sdiag_family = family };
-       const size_t offset = sizeof(req.sdiag_family);
-
-       tprints("{sdiag_family=");
-       printxval(addrfams, req.sdiag_family, "AF_???");
-       tprints(", ");
-       if (len >= sizeof(req)) {
-               if (!umoven_or_printaddr(tcp, addr + offset,
-                                        sizeof(req) - offset,
-                                        (void *) &req + offset)) {
-                       tprints("sdiag_protocol=");
-                       printxval(ethernet_protocols, req.sdiag_protocol,
-                                 "ETH_P_???");
-                       tprintf(", pdiag_ino=%" PRIu32 ", pdiag_show=",
-                               req.pdiag_ino);
-                       printflags(packet_diag_show, req.pdiag_show,
-                                  "PACKET_SHOW_???");
-                       tprintf(", pdiag_cookie=[%" PRIu32 ", %" PRIu32 "]",
-                               req.pdiag_cookie[0], req.pdiag_cookie[1]);
-               }
-       } else
-               tprints("...");
-       tprints("}");
-}
-
-static void
-decode_packet_diag_msg(struct tcb *const tcp,
-                      const struct nlmsghdr *const nlmsghdr,
-                      const uint8_t family,
-                      const kernel_ulong_t addr,
-                      const kernel_ulong_t len)
-{
-       struct packet_diag_msg msg = { .pdiag_family = family };
-       const size_t offset = sizeof(msg.pdiag_family);
-
-       tprints("{pdiag_family=");
-       printxval(addrfams, msg.pdiag_family, "AF_???");
-
-       tprints(", ");
-       if (len >= sizeof(msg)) {
-               if (!umoven_or_printaddr(tcp, addr + offset,
-                                        sizeof(msg) - offset,
-                                        (void *) &msg + offset)) {
-                       tprints("pdiag_type=");
-                       printxval(socktypes, msg.pdiag_type, "SOCK_???");
-                       tprintf(", pdiag_num=%" PRIu16 ", pdiag_ino=%" PRIu32
-                               ", pdiag_cookie=[%" PRIu32 ", %" PRIu32 "]",
-                               msg.pdiag_num, msg.pdiag_ino, msg.pdiag_cookie[0],
-                               msg.pdiag_cookie[1]);
-               }
-       } else
-               tprints("...");
-       tprints("}");
-}
-
-static void
-print_inet_diag_sockid(const struct inet_diag_sockid *id, const uint8_t family)
-{
-       tprintf("{idiag_sport=htons(%u), idiag_dport=htons(%u)",
-               ntohs(id->idiag_sport), ntohs(id->idiag_dport));
-
-       tprints(", ");
-       print_inet_addr(family, id->idiag_src,
-                       sizeof(id->idiag_src), "idiag_src");
-       tprints(", ");
-       print_inet_addr(family, id->idiag_dst,
-                       sizeof(id->idiag_dst), "idiag_dst");
-
-       tprintf(", idiag_if=%" PRIu32
-               ", idiag_cookie=[%" PRIu32 ", %" PRIu32 "]}",
-               id->idiag_if, id->idiag_cookie[0], id->idiag_cookie[1]);
-}
-
-static void
-decode_inet_diag_req_compat(struct tcb *const tcp,
-                           const struct nlmsghdr *const nlmsghdr,
-                           const uint8_t family,
-                           const kernel_ulong_t addr,
-                           const kernel_ulong_t len)
-{
-       struct inet_diag_req req = { .idiag_family = family };
-       const size_t offset = sizeof(req.idiag_family);
-
-       tprints("{idiag_family=");
-       printxval(addrfams, req.idiag_family, "AF_???");
-
-       tprints(", ");
-       if (len >= sizeof(req)) {
-               if (!umoven_or_printaddr(tcp, addr + offset,
-                                        sizeof(req) - offset,
-                                        (void *) &req + offset)) {
-                       tprintf("idiag_src_len=%" PRIu8
-                               ", idiag_dst_len=%" PRIu8,
-                               req.idiag_src_len,
-                               req.idiag_dst_len);
-                       tprints(", idiag_ext=");
-                       printflags(inet_diag_extended_flags, req.idiag_ext,
-                                  "1<<INET_DIAG_\?\?\?-1");
-                       tprints(", id=");
-                       print_inet_diag_sockid(&req.id, req.idiag_family);
-                       tprints(", idiag_states=");
-                       printflags(tcp_state_flags, req.idiag_states,
-                                  "1<<TCP_???");
-                       tprintf(", idiag_dbs=%" PRIu32, req.idiag_dbs);
-               }
-       } else
-               tprints("...");
-       tprints("}");
-}
-
-static void
-decode_inet_diag_req_v2(struct tcb *const tcp,
-                       const struct nlmsghdr *const nlmsghdr,
-                       const uint8_t family,
-                       const kernel_ulong_t addr,
-                       const kernel_ulong_t len)
-{
-       struct inet_diag_req_v2 req = { .sdiag_family = family };
-       const size_t offset = sizeof(req.sdiag_family);
-
-       tprints("{sdiag_family=");
-       printxval(addrfams, req.sdiag_family, "AF_???");
-
-       tprints(", ");
-       if (len >= sizeof(req)) {
-               if (!umoven_or_printaddr(tcp, addr + offset,
-                                        sizeof(req) - offset,
-                                        (void *) &req + offset)) {
-                       tprints("sdiag_protocol=");
-                       printxval(inet_protocols, req.sdiag_protocol,
-                                 "IPPROTO_???");
-                       tprints(", idiag_ext=");
-                       printflags(inet_diag_extended_flags, req.idiag_ext,
-                                  "1<<INET_DIAG_\?\?\?-1");
-                       tprints(", idiag_states=");
-                       printflags(tcp_state_flags, req.idiag_states,
-                                  "1<<TCP_???");
-                       tprints(", id=");
-                       print_inet_diag_sockid(&req.id, req.sdiag_family);
-               }
-       } else
-               tprints("...");
-       tprints("}");
-}
-
-static void
-decode_inet_diag_req(struct tcb *const tcp,
-                    const struct nlmsghdr *const nlmsghdr,
-                    const uint8_t family,
-                    const kernel_ulong_t addr,
-                    const kernel_ulong_t len)
-{
-       if (nlmsghdr->nlmsg_type == TCPDIAG_GETSOCK
-           || nlmsghdr->nlmsg_type == DCCPDIAG_GETSOCK)
-               return decode_inet_diag_req_compat(tcp, nlmsghdr,
-                                                  family, addr, len);
-       else
-               return decode_inet_diag_req_v2(tcp, nlmsghdr,
-                                              family, addr, len);
-}
-
-static void
-decode_inet_diag_msg(struct tcb *const tcp,
-                    const struct nlmsghdr *const nlmsghdr,
-                    const uint8_t family,
-                    const kernel_ulong_t addr,
-                    const kernel_ulong_t len)
-{
-       struct inet_diag_msg msg = { .idiag_family = family };
-       const size_t offset = sizeof(msg.idiag_family);
-
-       tprints("{idiag_family=");
-       printxval(addrfams, msg.idiag_family, "AF_???");
-
-       tprints(", ");
-       if (len >= sizeof(msg)) {
-               if (!umoven_or_printaddr(tcp, addr + offset,
-                                        sizeof(msg) - offset,
-                                        (void *) &msg + offset)) {
-                       tprints("idiag_state=");
-                       printxval(tcp_states, msg.idiag_state, "TCP_???");
-                       tprintf(", idiag_timer=%" PRIu8
-                               ", idiag_retrans=%" PRIu8,
-                               msg.idiag_timer, msg.idiag_retrans);
-                       tprints(", id=");
-                       print_inet_diag_sockid(&msg.id, msg.idiag_family);
-                       tprintf(", idiag_expires=%" PRIu32
-                               ", idiag_rqueue=%" PRIu32
-                               ", idiag_wqueue=%" PRIu32
-                               ", idiag_uid=%" PRIu32
-                               ", idiag_inode=%" PRIu32,
-                               msg.idiag_expires,
-                               msg.idiag_rqueue,
-                               msg.idiag_wqueue,
-                               msg.idiag_uid,
-                               msg.idiag_inode);
-               }
-       } else
-               tprints("...");
-       tprints("}");
-}
-
-#ifdef AF_SMC
-static void
-decode_smc_diag_req(struct tcb *const tcp,
-                   const struct nlmsghdr *const nlmsghdr,
-                   const uint8_t family,
-                   const kernel_ulong_t addr,
-                   const kernel_ulong_t len)
-{
-       struct smc_diag_req req = { .diag_family = family };
-       const size_t offset = sizeof(req.diag_family);
-
-       tprints("{diag_family=");
-       printxval(addrfams, req.diag_family, "AF_???");
-
-       tprints(", ");
-       if (len >= sizeof(req)) {
-               if (!umoven_or_printaddr(tcp, addr + offset,
-                                        sizeof(req) - offset,
-                                        (void *) &req + offset)) {
-                       tprints("diag_ext=");
-                       printflags(smc_diag_extended_flags, req.diag_ext,
-                                  "1<<SMC_DIAG_\?\?\?-1");
-                       tprints(", id=");
-                       /*
-                        * AF_SMC protocol family socket handler
-                        * keeping the AF_INET sock address.
-                        */
-                       print_inet_diag_sockid(&req.id, AF_INET);
-               }
-       } else
-               tprints("...");
-       tprints("}");
-}
-
-static void
-decode_smc_diag_msg(struct tcb *const tcp,
-                   const struct nlmsghdr *const nlmsghdr,
-                   const uint8_t family,
-                   const kernel_ulong_t addr,
-                   const kernel_ulong_t len)
-{
-       struct smc_diag_msg msg = { .diag_family = family };
-       const size_t offset = sizeof(msg.diag_family);
-
-       tprints("{diag_family=");
-       printxval(addrfams, msg.diag_family, "AF_???");
-
-       tprints(", ");
-       if (len >= sizeof(msg)) {
-               if (!umoven_or_printaddr(tcp, addr + offset,
-                                        sizeof(msg) - offset,
-                                        (void *) &msg + offset)) {
-                       tprints("diag_state=");
-                       printxval(smc_states, msg.diag_state, "SMC_???");
-                       tprintf(", diag_fallback=%" PRIu8
-                               ", diag_shutdown=%" PRIu8,
-                               msg.diag_fallback, msg.diag_shutdown);
-                       tprints(", id=");
-                       /*
-                        * AF_SMC protocol family socket handler
-                        * keeping the AF_INET sock address.
-                        */
-                       print_inet_diag_sockid(&msg.id, AF_INET);
-                       tprintf(", diag_uid=%" PRIu32 ", diag_inode=%" PRIu64,
-                               msg.diag_uid, msg.diag_inode);
-               }
-       } else
-               tprints("...");
-       tprints("}");
-
-}
-#endif
-
-typedef void (*netlink_diag_decoder_t)(struct tcb *,
-                                      const struct nlmsghdr *,
-                                      uint8_t family,
-                                      kernel_ulong_t addr,
-                                      kernel_ulong_t len);
+typedef DECL_NETLINK_DIAG_DECODER((*netlink_diag_decoder_t));
 
 static const struct {
        const netlink_diag_decoder_t request, response;
@@ -521,10 +64,13 @@ bool
 decode_netlink_sock_diag(struct tcb *const tcp,
                         const struct nlmsghdr *const nlmsghdr,
                         const kernel_ulong_t addr,
-                        const kernel_ulong_t len)
+                        const unsigned int len)
 {
        uint8_t family;
 
+       if (nlmsghdr->nlmsg_type == NLMSG_DONE)
+               return false;
+
        if (!umove_or_printaddr(tcp, addr, &family)) {
                if (family < ARRAY_SIZE(diag_decoders)
                    && len > sizeof(family)) {