#include "defs.h"
#include "netlink.h"
-
-#include <arpa/inet.h>
-#include <linux/inet_diag.h>
-#include <linux/netlink_diag.h>
-#include <linux/packet_diag.h>
-#ifdef AF_SMC
-# include <linux/smc_diag.h>
-#endif
-#include <linux/unix_diag.h>
-
-#include "xlat/inet_diag_extended_flags.h"
-
-#include "xlat/tcp_states.h"
-#include "xlat/tcp_state_flags.h"
-
-#include "xlat/netlink_diag_show.h"
-#include "xlat/netlink_states.h"
-
-#include "xlat/packet_diag_show.h"
-
-#ifdef AF_SMC
-# include "xlat/smc_diag_extended_flags.h"
-# include "xlat/smc_states.h"
-#endif
-
-#include "xlat/unix_diag_show.h"
+#include "netlink_sock_diag.h"
static void
decode_family(struct tcb *const tcp, const uint8_t family,
- const kernel_ulong_t addr, const kernel_ulong_t len)
+ const kernel_ulong_t addr, const unsigned int len)
{
tprints("{family=");
printxval(addrfams, family, "AF_???");
if (len > sizeof(family)) {
tprints(", ");
- printstrn(tcp, addr + sizeof(family),
- len - sizeof(family));
+ printstr_ex(tcp, addr + sizeof(family),
+ len - sizeof(family), QUOTE_FORCE_HEX);
}
tprints("}");
}
-static void
-decode_unix_diag_req(struct tcb *const tcp,
- const struct nlmsghdr *const nlmsghdr,
- const uint8_t family,
- const kernel_ulong_t addr,
- const kernel_ulong_t len)
-{
- struct unix_diag_req req = { .sdiag_family = family };
- const size_t offset = sizeof(req.sdiag_family);
-
- tprints("{sdiag_family=");
- printxval(addrfams, req.sdiag_family, "AF_???");
-
- tprints(", ");
- if (len >= sizeof(req)) {
- if (!umoven_or_printaddr(tcp, addr + offset,
- sizeof(req) - offset,
- (void *) &req + offset)) {
- tprintf("sdiag_protocol=%" PRIu8 ", udiag_states=",
- req.sdiag_protocol);
- printflags(tcp_state_flags, req.udiag_states,
- "1<<TCP_???");
- tprintf(", udiag_ino=%" PRIu32 ", udiag_show=",
- req.udiag_ino);
- printflags(unix_diag_show, req.udiag_show,
- "UDIAG_SHOW_???");
- tprintf(", udiag_cookie=[%" PRIu32 ", %" PRIu32 "]",
- req.udiag_cookie[0], req.udiag_cookie[1]);
- }
- } else
- tprints("...");
- tprints("}");
-}
-
-static void
-decode_unix_diag_msg(struct tcb *const tcp,
- const struct nlmsghdr *const nlmsghdr,
- const uint8_t family,
- const kernel_ulong_t addr,
- const kernel_ulong_t len)
-{
- struct unix_diag_msg msg = { .udiag_family = family };
- const size_t offset = sizeof(msg.udiag_family);
-
- tprints("{udiag_family=");
- printxval(addrfams, msg.udiag_family, "AF_???");
-
- tprints(", ");
- if (len >= sizeof(msg)) {
- if (!umoven_or_printaddr(tcp, addr + offset,
- sizeof(msg) - offset,
- (void *) &msg + offset)) {
- tprints("udiag_type=");
- printxval(socktypes, msg.udiag_type, "SOCK_???");
- tprintf(", udiag_state=");
- printxval(tcp_states, msg.udiag_state, "TCP_???");
- tprintf(", udiag_ino=%" PRIu32
- ", udiag_cookie=[%" PRIu32 ", %" PRIu32 "]",
- msg.udiag_ino,
- msg.udiag_cookie[0], msg.udiag_cookie[1]);
- }
- } else
- tprints("...");
- tprints("}");
-}
-
-static void
-decode_netlink_diag_req(struct tcb *const tcp,
- const struct nlmsghdr *const nlmsghdr,
- const uint8_t family,
- const kernel_ulong_t addr,
- const kernel_ulong_t len)
-{
- struct netlink_diag_req req = { .sdiag_family = family };
- const size_t offset = sizeof(req.sdiag_family);
-
- tprints("{sdiag_family=");
- printxval(addrfams, req.sdiag_family, "AF_???");
-
- tprints(", ");
- if (len >= sizeof(req)) {
- if (!umoven_or_printaddr(tcp, addr + offset,
- sizeof(req) - offset,
- (void *) &req + offset)) {
- tprints("sdiag_protocol=");
- if (NDIAG_PROTO_ALL == req.sdiag_protocol)
- tprints("NDIAG_PROTO_ALL");
- else
- printxval(netlink_protocols,
- req.sdiag_protocol, "NETLINK_???");
- tprintf(", ndiag_ino=%" PRIu32 ", ndiag_show=",
- req.ndiag_ino);
- printflags(netlink_diag_show, req.ndiag_show,
- "NDIAG_SHOW_???");
- tprintf(", ndiag_cookie=[%" PRIu32 ", %" PRIu32 "]",
- req.ndiag_cookie[0], req.ndiag_cookie[1]);
- }
- } else
- tprints("...");
- tprints("}");
-}
-
-static void
-decode_netlink_diag_msg(struct tcb *const tcp,
- const struct nlmsghdr *const nlmsghdr,
- const uint8_t family,
- const kernel_ulong_t addr,
- const kernel_ulong_t len)
-{
- struct netlink_diag_msg msg = { .ndiag_family = family };
- const size_t offset = sizeof(msg.ndiag_family);
-
- tprints("{ndiag_family=");
- printxval(addrfams, msg.ndiag_family, "AF_???");
-
- tprints(", ");
- if (len >= sizeof(msg)) {
- if (!umoven_or_printaddr(tcp, addr + offset,
- sizeof(msg) - offset,
- (void *) &msg + offset)) {
- tprints("ndiag_type=");
- printxval(socktypes, msg.ndiag_type, "SOCK_???");
- tprints(", ndiag_protocol=");
- printxval(netlink_protocols, msg.ndiag_protocol,
- "NETLINK_???");
- tprints(", ndiag_state=");
- printxval(netlink_states, msg.ndiag_state,
- "NETLINK_???");
- tprintf(", ndiag_portid=%" PRIu32
- ", ndiag_dst_portid=%" PRIu32
- ", ndiag_dst_group=%" PRIu32
- ", ndiag_ino=%" PRIu32
- ", ndiag_cookie=[%" PRIu32
- ", %" PRIu32 "]",
- msg.ndiag_portid,
- msg.ndiag_dst_portid,
- msg.ndiag_dst_group,
- msg.ndiag_ino,
- msg.ndiag_cookie[0],
- msg.ndiag_cookie[1]);
- }
- } else
- tprints("...");
- tprints("}");
-}
-
-static void
-decode_packet_diag_req(struct tcb *const tcp,
- const struct nlmsghdr *const nlmsghdr,
- const uint8_t family,
- const kernel_ulong_t addr,
- const kernel_ulong_t len)
-{
- struct packet_diag_req req = { .sdiag_family = family };
- const size_t offset = sizeof(req.sdiag_family);
-
- tprints("{sdiag_family=");
- printxval(addrfams, req.sdiag_family, "AF_???");
- tprints(", ");
- if (len >= sizeof(req)) {
- if (!umoven_or_printaddr(tcp, addr + offset,
- sizeof(req) - offset,
- (void *) &req + offset)) {
- tprints("sdiag_protocol=");
- printxval(ethernet_protocols, req.sdiag_protocol,
- "ETH_P_???");
- tprintf(", pdiag_ino=%" PRIu32 ", pdiag_show=",
- req.pdiag_ino);
- printflags(packet_diag_show, req.pdiag_show,
- "PACKET_SHOW_???");
- tprintf(", pdiag_cookie=[%" PRIu32 ", %" PRIu32 "]",
- req.pdiag_cookie[0], req.pdiag_cookie[1]);
- }
- } else
- tprints("...");
- tprints("}");
-}
-
-static void
-decode_packet_diag_msg(struct tcb *const tcp,
- const struct nlmsghdr *const nlmsghdr,
- const uint8_t family,
- const kernel_ulong_t addr,
- const kernel_ulong_t len)
-{
- struct packet_diag_msg msg = { .pdiag_family = family };
- const size_t offset = sizeof(msg.pdiag_family);
-
- tprints("{pdiag_family=");
- printxval(addrfams, msg.pdiag_family, "AF_???");
-
- tprints(", ");
- if (len >= sizeof(msg)) {
- if (!umoven_or_printaddr(tcp, addr + offset,
- sizeof(msg) - offset,
- (void *) &msg + offset)) {
- tprints("pdiag_type=");
- printxval(socktypes, msg.pdiag_type, "SOCK_???");
- tprintf(", pdiag_num=%" PRIu16 ", pdiag_ino=%" PRIu32
- ", pdiag_cookie=[%" PRIu32 ", %" PRIu32 "]",
- msg.pdiag_num, msg.pdiag_ino, msg.pdiag_cookie[0],
- msg.pdiag_cookie[1]);
- }
- } else
- tprints("...");
- tprints("}");
-}
-
-static void
-print_inet_diag_sockid(const struct inet_diag_sockid *id, const uint8_t family)
-{
- tprintf("{idiag_sport=htons(%u), idiag_dport=htons(%u)",
- ntohs(id->idiag_sport), ntohs(id->idiag_dport));
-
- tprints(", ");
- print_inet_addr(family, id->idiag_src,
- sizeof(id->idiag_src), "idiag_src");
- tprints(", ");
- print_inet_addr(family, id->idiag_dst,
- sizeof(id->idiag_dst), "idiag_dst");
-
- tprintf(", idiag_if=%" PRIu32
- ", idiag_cookie=[%" PRIu32 ", %" PRIu32 "]}",
- id->idiag_if, id->idiag_cookie[0], id->idiag_cookie[1]);
-}
-
-static void
-decode_inet_diag_req_compat(struct tcb *const tcp,
- const struct nlmsghdr *const nlmsghdr,
- const uint8_t family,
- const kernel_ulong_t addr,
- const kernel_ulong_t len)
-{
- struct inet_diag_req req = { .idiag_family = family };
- const size_t offset = sizeof(req.idiag_family);
-
- tprints("{idiag_family=");
- printxval(addrfams, req.idiag_family, "AF_???");
-
- tprints(", ");
- if (len >= sizeof(req)) {
- if (!umoven_or_printaddr(tcp, addr + offset,
- sizeof(req) - offset,
- (void *) &req + offset)) {
- tprintf("idiag_src_len=%" PRIu8
- ", idiag_dst_len=%" PRIu8,
- req.idiag_src_len,
- req.idiag_dst_len);
- tprints(", idiag_ext=");
- printflags(inet_diag_extended_flags, req.idiag_ext,
- "1<<INET_DIAG_\?\?\?-1");
- tprints(", id=");
- print_inet_diag_sockid(&req.id, req.idiag_family);
- tprints(", idiag_states=");
- printflags(tcp_state_flags, req.idiag_states,
- "1<<TCP_???");
- tprintf(", idiag_dbs=%" PRIu32, req.idiag_dbs);
- }
- } else
- tprints("...");
- tprints("}");
-}
-
-static void
-decode_inet_diag_req_v2(struct tcb *const tcp,
- const struct nlmsghdr *const nlmsghdr,
- const uint8_t family,
- const kernel_ulong_t addr,
- const kernel_ulong_t len)
-{
- struct inet_diag_req_v2 req = { .sdiag_family = family };
- const size_t offset = sizeof(req.sdiag_family);
-
- tprints("{sdiag_family=");
- printxval(addrfams, req.sdiag_family, "AF_???");
-
- tprints(", ");
- if (len >= sizeof(req)) {
- if (!umoven_or_printaddr(tcp, addr + offset,
- sizeof(req) - offset,
- (void *) &req + offset)) {
- tprints("sdiag_protocol=");
- printxval(inet_protocols, req.sdiag_protocol,
- "IPPROTO_???");
- tprints(", idiag_ext=");
- printflags(inet_diag_extended_flags, req.idiag_ext,
- "1<<INET_DIAG_\?\?\?-1");
- tprints(", idiag_states=");
- printflags(tcp_state_flags, req.idiag_states,
- "1<<TCP_???");
- tprints(", id=");
- print_inet_diag_sockid(&req.id, req.sdiag_family);
- }
- } else
- tprints("...");
- tprints("}");
-}
-
-static void
-decode_inet_diag_req(struct tcb *const tcp,
- const struct nlmsghdr *const nlmsghdr,
- const uint8_t family,
- const kernel_ulong_t addr,
- const kernel_ulong_t len)
-{
- if (nlmsghdr->nlmsg_type == TCPDIAG_GETSOCK
- || nlmsghdr->nlmsg_type == DCCPDIAG_GETSOCK)
- return decode_inet_diag_req_compat(tcp, nlmsghdr,
- family, addr, len);
- else
- return decode_inet_diag_req_v2(tcp, nlmsghdr,
- family, addr, len);
-}
-
-static void
-decode_inet_diag_msg(struct tcb *const tcp,
- const struct nlmsghdr *const nlmsghdr,
- const uint8_t family,
- const kernel_ulong_t addr,
- const kernel_ulong_t len)
-{
- struct inet_diag_msg msg = { .idiag_family = family };
- const size_t offset = sizeof(msg.idiag_family);
-
- tprints("{idiag_family=");
- printxval(addrfams, msg.idiag_family, "AF_???");
-
- tprints(", ");
- if (len >= sizeof(msg)) {
- if (!umoven_or_printaddr(tcp, addr + offset,
- sizeof(msg) - offset,
- (void *) &msg + offset)) {
- tprints("idiag_state=");
- printxval(tcp_states, msg.idiag_state, "TCP_???");
- tprintf(", idiag_timer=%" PRIu8
- ", idiag_retrans=%" PRIu8,
- msg.idiag_timer, msg.idiag_retrans);
- tprints(", id=");
- print_inet_diag_sockid(&msg.id, msg.idiag_family);
- tprintf(", idiag_expires=%" PRIu32
- ", idiag_rqueue=%" PRIu32
- ", idiag_wqueue=%" PRIu32
- ", idiag_uid=%" PRIu32
- ", idiag_inode=%" PRIu32,
- msg.idiag_expires,
- msg.idiag_rqueue,
- msg.idiag_wqueue,
- msg.idiag_uid,
- msg.idiag_inode);
- }
- } else
- tprints("...");
- tprints("}");
-}
-
-#ifdef AF_SMC
-static void
-decode_smc_diag_req(struct tcb *const tcp,
- const struct nlmsghdr *const nlmsghdr,
- const uint8_t family,
- const kernel_ulong_t addr,
- const kernel_ulong_t len)
-{
- struct smc_diag_req req = { .diag_family = family };
- const size_t offset = sizeof(req.diag_family);
-
- tprints("{diag_family=");
- printxval(addrfams, req.diag_family, "AF_???");
-
- tprints(", ");
- if (len >= sizeof(req)) {
- if (!umoven_or_printaddr(tcp, addr + offset,
- sizeof(req) - offset,
- (void *) &req + offset)) {
- tprints("diag_ext=");
- printflags(smc_diag_extended_flags, req.diag_ext,
- "1<<SMC_DIAG_\?\?\?-1");
- tprints(", id=");
- /*
- * AF_SMC protocol family socket handler
- * keeping the AF_INET sock address.
- */
- print_inet_diag_sockid(&req.id, AF_INET);
- }
- } else
- tprints("...");
- tprints("}");
-}
-
-static void
-decode_smc_diag_msg(struct tcb *const tcp,
- const struct nlmsghdr *const nlmsghdr,
- const uint8_t family,
- const kernel_ulong_t addr,
- const kernel_ulong_t len)
-{
- struct smc_diag_msg msg = { .diag_family = family };
- const size_t offset = sizeof(msg.diag_family);
-
- tprints("{diag_family=");
- printxval(addrfams, msg.diag_family, "AF_???");
-
- tprints(", ");
- if (len >= sizeof(msg)) {
- if (!umoven_or_printaddr(tcp, addr + offset,
- sizeof(msg) - offset,
- (void *) &msg + offset)) {
- tprints("diag_state=");
- printxval(smc_states, msg.diag_state, "SMC_???");
- tprintf(", diag_fallback=%" PRIu8
- ", diag_shutdown=%" PRIu8,
- msg.diag_fallback, msg.diag_shutdown);
- tprints(", id=");
- /*
- * AF_SMC protocol family socket handler
- * keeping the AF_INET sock address.
- */
- print_inet_diag_sockid(&msg.id, AF_INET);
- tprintf(", diag_uid=%" PRIu32 ", diag_inode=%" PRIu64,
- msg.diag_uid, msg.diag_inode);
- }
- } else
- tprints("...");
- tprints("}");
-
-}
-#endif
-
-typedef void (*netlink_diag_decoder_t)(struct tcb *,
- const struct nlmsghdr *,
- uint8_t family,
- kernel_ulong_t addr,
- kernel_ulong_t len);
+typedef DECL_NETLINK_DIAG_DECODER((*netlink_diag_decoder_t));
static const struct {
const netlink_diag_decoder_t request, response;
decode_netlink_sock_diag(struct tcb *const tcp,
const struct nlmsghdr *const nlmsghdr,
const kernel_ulong_t addr,
- const kernel_ulong_t len)
+ const unsigned int len)
{
uint8_t family;
+ if (nlmsghdr->nlmsg_type == NLMSG_DONE)
+ return false;
+
if (!umove_or_printaddr(tcp, addr, &family)) {
if (family < ARRAY_SIZE(diag_decoders)
&& len > sizeof(family)) {