702 lines
18 KiB
C
702 lines
18 KiB
C
/*
|
|
* Copyright (c) 2014 Zubin Mithra <zubin.mithra@gmail.com>
|
|
* Copyright (c) 2014-2016 Dmitry V. Levin <ldv@altlinux.org>
|
|
* Copyright (c) 2014-2018 The strace developers.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. The name of the author may not be used to endorse or promote products
|
|
* derived from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "defs.h"
|
|
#include <netinet/in.h>
|
|
#include <sys/socket.h>
|
|
#include <arpa/inet.h>
|
|
#include "netlink.h"
|
|
#include <linux/sock_diag.h>
|
|
#include <linux/inet_diag.h>
|
|
#include <linux/unix_diag.h>
|
|
#include <linux/netlink_diag.h>
|
|
#include <linux/rtnetlink.h>
|
|
#if HAVE_LINUX_GENETLINK_H
|
|
#include <linux/genetlink.h>
|
|
#endif
|
|
|
|
#include <sys/un.h>
|
|
#ifndef UNIX_PATH_MAX
|
|
# define UNIX_PATH_MAX sizeof(((struct sockaddr_un *) 0)->sun_path)
|
|
#endif
|
|
|
|
#include "xstring.h"
|
|
|
|
#define XLAT_MACROS_ONLY
|
|
# include "xlat/inet_protocols.h"
|
|
#undef XLAT_MACROS_ONLY
|
|
|
|
typedef struct {
|
|
unsigned long inode;
|
|
char *details;
|
|
} cache_entry;
|
|
|
|
#define CACHE_SIZE 1024U
|
|
static cache_entry cache[CACHE_SIZE];
|
|
#define CACHE_MASK (CACHE_SIZE - 1)
|
|
|
|
static int
|
|
cache_inode_details(const unsigned long inode, char *const details)
|
|
{
|
|
cache_entry *e = &cache[inode & CACHE_MASK];
|
|
free(e->details);
|
|
e->inode = inode;
|
|
e->details = details;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static const char *
|
|
get_sockaddr_by_inode_cached(const unsigned long inode)
|
|
{
|
|
const cache_entry *const e = &cache[inode & CACHE_MASK];
|
|
return (e && inode == e->inode) ? e->details : NULL;
|
|
}
|
|
|
|
static bool
|
|
print_sockaddr_by_inode_cached(const unsigned long inode)
|
|
{
|
|
const char *const details = get_sockaddr_by_inode_cached(inode);
|
|
if (details) {
|
|
tprints(details);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
static bool
|
|
send_query(struct tcb *tcp, const int fd, void *req, size_t req_size)
|
|
{
|
|
struct sockaddr_nl nladdr = {
|
|
.nl_family = AF_NETLINK
|
|
};
|
|
struct iovec iov = {
|
|
.iov_base = req,
|
|
.iov_len = req_size
|
|
};
|
|
const struct msghdr msg = {
|
|
.msg_name = &nladdr,
|
|
.msg_namelen = sizeof(nladdr),
|
|
.msg_iov = &iov,
|
|
.msg_iovlen = 1
|
|
};
|
|
|
|
for (;;) {
|
|
if (sendmsg(fd, &msg, 0) < 0) {
|
|
if (errno == EINTR)
|
|
continue;
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
}
|
|
|
|
static bool
|
|
inet_send_query(struct tcb *tcp, const int fd, const int family,
|
|
const int proto)
|
|
{
|
|
struct {
|
|
const struct nlmsghdr nlh;
|
|
const struct inet_diag_req_v2 idr;
|
|
} req = {
|
|
.nlh = {
|
|
.nlmsg_len = sizeof(req),
|
|
.nlmsg_type = SOCK_DIAG_BY_FAMILY,
|
|
.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST
|
|
},
|
|
.idr = {
|
|
.sdiag_family = family,
|
|
.sdiag_protocol = proto,
|
|
.idiag_states = -1
|
|
}
|
|
};
|
|
return send_query(tcp, fd, &req, sizeof(req));
|
|
}
|
|
|
|
static int
|
|
inet_parse_response(const void *const data, const int data_len,
|
|
const unsigned long inode, void *opaque_data)
|
|
{
|
|
const char *const proto_name = opaque_data;
|
|
const struct inet_diag_msg *const diag_msg = data;
|
|
static const char zero_addr[sizeof(struct in6_addr)];
|
|
socklen_t addr_size, text_size;
|
|
|
|
if (data_len < (int) NLMSG_LENGTH(sizeof(*diag_msg)))
|
|
return -1;
|
|
if (diag_msg->idiag_inode != inode)
|
|
return 0;
|
|
|
|
switch (diag_msg->idiag_family) {
|
|
case AF_INET:
|
|
addr_size = sizeof(struct in_addr);
|
|
text_size = INET_ADDRSTRLEN;
|
|
break;
|
|
case AF_INET6:
|
|
addr_size = sizeof(struct in6_addr);
|
|
text_size = INET6_ADDRSTRLEN;
|
|
break;
|
|
default:
|
|
return -1;
|
|
}
|
|
|
|
char src_buf[text_size];
|
|
char *details;
|
|
|
|
/* open/closing brackets for IPv6 addresses */
|
|
const char *ob = diag_msg->idiag_family == AF_INET6 ? "[" : "";
|
|
const char *cb = diag_msg->idiag_family == AF_INET6 ? "]" : "";
|
|
|
|
if (!inet_ntop(diag_msg->idiag_family, diag_msg->id.idiag_src,
|
|
src_buf, text_size))
|
|
return -1;
|
|
|
|
if (diag_msg->id.idiag_dport ||
|
|
memcmp(zero_addr, diag_msg->id.idiag_dst, addr_size)) {
|
|
char dst_buf[text_size];
|
|
|
|
if (!inet_ntop(diag_msg->idiag_family, diag_msg->id.idiag_dst,
|
|
dst_buf, text_size))
|
|
return -1;
|
|
|
|
if (asprintf(&details, "%s:[%s%s%s:%u->%s%s%s:%u]", proto_name,
|
|
ob, src_buf, cb, ntohs(diag_msg->id.idiag_sport),
|
|
ob, dst_buf, cb, ntohs(diag_msg->id.idiag_dport))
|
|
< 0)
|
|
return false;
|
|
} else {
|
|
if (asprintf(&details, "%s:[%s%s%s:%u]",
|
|
proto_name, ob, src_buf, cb,
|
|
ntohs(diag_msg->id.idiag_sport)) < 0)
|
|
return false;
|
|
}
|
|
|
|
return cache_inode_details(inode, details);
|
|
}
|
|
|
|
static bool
|
|
receive_responses(struct tcb *tcp, const int fd, const unsigned long inode,
|
|
const unsigned long expected_msg_type,
|
|
int (*parser)(const void *, int,
|
|
unsigned long, void *),
|
|
void *opaque_data)
|
|
{
|
|
static union {
|
|
struct nlmsghdr hdr;
|
|
long buf[8192 / sizeof(long)];
|
|
} hdr_buf;
|
|
|
|
struct sockaddr_nl nladdr = {
|
|
.nl_family = AF_NETLINK
|
|
};
|
|
struct iovec iov = {
|
|
.iov_base = hdr_buf.buf,
|
|
.iov_len = sizeof(hdr_buf.buf)
|
|
};
|
|
int flags = 0;
|
|
|
|
for (;;) {
|
|
struct msghdr msg = {
|
|
.msg_name = &nladdr,
|
|
.msg_namelen = sizeof(nladdr),
|
|
.msg_iov = &iov,
|
|
.msg_iovlen = 1
|
|
};
|
|
|
|
ssize_t ret = recvmsg(fd, &msg, flags);
|
|
if (ret < 0) {
|
|
if (errno == EINTR)
|
|
continue;
|
|
return false;
|
|
}
|
|
|
|
const struct nlmsghdr *h = &hdr_buf.hdr;
|
|
if (!is_nlmsg_ok(h, ret))
|
|
return false;
|
|
for (; is_nlmsg_ok(h, ret); h = NLMSG_NEXT(h, ret)) {
|
|
if (h->nlmsg_type != expected_msg_type)
|
|
return false;
|
|
const int rc = parser(NLMSG_DATA(h),
|
|
h->nlmsg_len, inode, opaque_data);
|
|
if (rc > 0)
|
|
return true;
|
|
if (rc < 0)
|
|
return false;
|
|
}
|
|
flags = MSG_DONTWAIT;
|
|
}
|
|
}
|
|
|
|
static bool
|
|
unix_send_query(struct tcb *tcp, const int fd, const unsigned long inode)
|
|
{
|
|
/*
|
|
* The kernel bug was fixed in mainline by commit v4.5-rc6~35^2~11
|
|
* and backported to stable/linux-4.4.y by commit v4.4.4~297.
|
|
*/
|
|
const uint16_t dump_flag =
|
|
os_release < KERNEL_VERSION(4, 4, 4) ? NLM_F_DUMP : 0;
|
|
|
|
struct {
|
|
const struct nlmsghdr nlh;
|
|
const struct unix_diag_req udr;
|
|
} req = {
|
|
.nlh = {
|
|
.nlmsg_len = sizeof(req),
|
|
.nlmsg_type = SOCK_DIAG_BY_FAMILY,
|
|
.nlmsg_flags = NLM_F_REQUEST | dump_flag
|
|
},
|
|
.udr = {
|
|
.sdiag_family = AF_UNIX,
|
|
.udiag_ino = inode,
|
|
.udiag_states = -1,
|
|
.udiag_show = UDIAG_SHOW_NAME | UDIAG_SHOW_PEER,
|
|
.udiag_cookie = { ~0U, ~0U }
|
|
}
|
|
};
|
|
return send_query(tcp, fd, &req, sizeof(req));
|
|
}
|
|
|
|
static int
|
|
unix_parse_response(const void *data, const int data_len,
|
|
const unsigned long inode, void *opaque_data)
|
|
{
|
|
const char *proto_name = opaque_data;
|
|
const struct unix_diag_msg *diag_msg = data;
|
|
struct rtattr *attr;
|
|
int rta_len = data_len - NLMSG_LENGTH(sizeof(*diag_msg));
|
|
uint32_t peer = 0;
|
|
size_t path_len = 0;
|
|
char path[UNIX_PATH_MAX + 1];
|
|
|
|
if (rta_len < 0)
|
|
return -1;
|
|
if (diag_msg->udiag_ino != inode)
|
|
return 0;
|
|
if (diag_msg->udiag_family != AF_UNIX)
|
|
return -1;
|
|
|
|
for (attr = (struct rtattr *) (diag_msg + 1);
|
|
RTA_OK(attr, rta_len);
|
|
attr = RTA_NEXT(attr, rta_len)) {
|
|
switch (attr->rta_type) {
|
|
case UNIX_DIAG_NAME:
|
|
if (!path_len) {
|
|
path_len = RTA_PAYLOAD(attr);
|
|
if (path_len > UNIX_PATH_MAX)
|
|
path_len = UNIX_PATH_MAX;
|
|
memcpy(path, RTA_DATA(attr), path_len);
|
|
path[path_len] = '\0';
|
|
}
|
|
break;
|
|
case UNIX_DIAG_PEER:
|
|
if (RTA_PAYLOAD(attr) >= 4)
|
|
peer = *(uint32_t *) RTA_DATA(attr);
|
|
break;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* print obtained information in the following format:
|
|
* "UNIX:[" SELF_INODE [ "->" PEER_INODE ][ "," SOCKET_FILE ] "]"
|
|
*/
|
|
if (!peer && !path_len)
|
|
return -1;
|
|
|
|
char peer_str[3 + sizeof(peer) * 3];
|
|
if (peer)
|
|
xsprintf(peer_str, "->%u", peer);
|
|
else
|
|
peer_str[0] = '\0';
|
|
|
|
const char *path_str;
|
|
if (path_len) {
|
|
char *outstr = alloca(4 * path_len + 4);
|
|
|
|
outstr[0] = ',';
|
|
if (path[0] == '\0') {
|
|
outstr[1] = '@';
|
|
string_quote(path + 1, outstr + 2,
|
|
path_len - 1, QUOTE_0_TERMINATED, NULL);
|
|
} else {
|
|
string_quote(path, outstr + 1,
|
|
path_len, QUOTE_0_TERMINATED, NULL);
|
|
}
|
|
path_str = outstr;
|
|
} else {
|
|
path_str = "";
|
|
}
|
|
|
|
char *details;
|
|
if (asprintf(&details, "%s:[%lu%s%s]", proto_name, inode,
|
|
peer_str, path_str) < 0)
|
|
return -1;
|
|
|
|
return cache_inode_details(inode, details);
|
|
}
|
|
|
|
static bool
|
|
netlink_send_query(struct tcb *tcp, const int fd, const unsigned long inode)
|
|
{
|
|
struct {
|
|
const struct nlmsghdr nlh;
|
|
const struct netlink_diag_req ndr;
|
|
} req = {
|
|
.nlh = {
|
|
.nlmsg_len = sizeof(req),
|
|
.nlmsg_type = SOCK_DIAG_BY_FAMILY,
|
|
.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST
|
|
},
|
|
.ndr = {
|
|
.sdiag_family = AF_NETLINK,
|
|
.sdiag_protocol = NDIAG_PROTO_ALL
|
|
}
|
|
};
|
|
return send_query(tcp, fd, &req, sizeof(req));
|
|
}
|
|
|
|
static int
|
|
netlink_parse_response(const void *data, const int data_len,
|
|
const unsigned long inode, void *opaque_data)
|
|
{
|
|
const char *proto_name = opaque_data;
|
|
const struct netlink_diag_msg *const diag_msg = data;
|
|
const char *netlink_proto;
|
|
char *details;
|
|
|
|
if (data_len < (int) NLMSG_LENGTH(sizeof(*diag_msg)))
|
|
return -1;
|
|
if (diag_msg->ndiag_ino != inode)
|
|
return 0;
|
|
|
|
if (diag_msg->ndiag_family != AF_NETLINK)
|
|
return -1;
|
|
|
|
netlink_proto = xlookup(netlink_protocols,
|
|
diag_msg->ndiag_protocol);
|
|
|
|
if (netlink_proto) {
|
|
netlink_proto = STR_STRIP_PREFIX(netlink_proto, "NETLINK_");
|
|
if (asprintf(&details, "%s:[%s:%u]", proto_name,
|
|
netlink_proto, diag_msg->ndiag_portid) < 0)
|
|
return -1;
|
|
} else {
|
|
if (asprintf(&details, "%s:[%u]", proto_name,
|
|
(unsigned) diag_msg->ndiag_protocol) < 0)
|
|
return -1;
|
|
}
|
|
|
|
return cache_inode_details(inode, details);
|
|
}
|
|
|
|
static const char *
|
|
unix_get(struct tcb *tcp, const int fd, const int family, const int proto,
|
|
const unsigned long inode, const char *name)
|
|
{
|
|
return unix_send_query(tcp, fd, inode)
|
|
&& receive_responses(tcp, fd, inode, SOCK_DIAG_BY_FAMILY,
|
|
unix_parse_response, (void *) name)
|
|
? get_sockaddr_by_inode_cached(inode) : NULL;
|
|
}
|
|
|
|
static const char *
|
|
inet_get(struct tcb *tcp, const int fd, const int family, const int protocol,
|
|
const unsigned long inode, const char *proto_name)
|
|
{
|
|
return inet_send_query(tcp, fd, family, protocol)
|
|
&& receive_responses(tcp, fd, inode, SOCK_DIAG_BY_FAMILY,
|
|
inet_parse_response, (void *) proto_name)
|
|
? get_sockaddr_by_inode_cached(inode) : NULL;
|
|
}
|
|
|
|
static const char *
|
|
netlink_get(struct tcb *tcp, const int fd, const int family, const int protocol,
|
|
const unsigned long inode, const char *proto_name)
|
|
{
|
|
return netlink_send_query(tcp, fd, inode)
|
|
&& receive_responses(tcp, fd, inode, SOCK_DIAG_BY_FAMILY,
|
|
netlink_parse_response,
|
|
(void *) proto_name)
|
|
? get_sockaddr_by_inode_cached(inode) : NULL;
|
|
}
|
|
|
|
static const struct {
|
|
const char *const name;
|
|
const char * (*const get)(struct tcb *, int fd, int family,
|
|
int protocol, unsigned long inode,
|
|
const char *proto_name);
|
|
int family;
|
|
int proto;
|
|
} protocols[] = {
|
|
[SOCK_PROTO_UNIX] = { "UNIX", unix_get, AF_UNIX},
|
|
/*
|
|
* inet_diag handlers are currently implemented only for TCP,
|
|
* UDP(lite), SCTP, RAW, and DCCP, but we try to resolve it for all
|
|
* protocols anyway, just in case.
|
|
*/
|
|
[SOCK_PROTO_TCP] =
|
|
{ "TCP", inet_get, AF_INET, IPPROTO_TCP },
|
|
[SOCK_PROTO_UDP] =
|
|
{ "UDP", inet_get, AF_INET, IPPROTO_UDP },
|
|
[SOCK_PROTO_UDPLITE] =
|
|
{ "UDPLITE", inet_get, AF_INET, IPPROTO_UDPLITE },
|
|
[SOCK_PROTO_DCCP] =
|
|
{ "DCCP", inet_get, AF_INET, IPPROTO_DCCP },
|
|
[SOCK_PROTO_SCTP] =
|
|
{ "SCTP", inet_get, AF_INET, IPPROTO_SCTP },
|
|
[SOCK_PROTO_L2TP_IP] =
|
|
{ "L2TP/IP", inet_get, AF_INET, IPPROTO_L2TP },
|
|
[SOCK_PROTO_PING] =
|
|
{ "PING", inet_get, AF_INET, IPPROTO_ICMP },
|
|
[SOCK_PROTO_RAW] =
|
|
{ "RAW", inet_get, AF_INET, IPPROTO_RAW },
|
|
[SOCK_PROTO_TCPv6] =
|
|
{ "TCPv6", inet_get, AF_INET6, IPPROTO_TCP },
|
|
[SOCK_PROTO_UDPv6] =
|
|
{ "UDPv6", inet_get, AF_INET6, IPPROTO_UDP },
|
|
[SOCK_PROTO_UDPLITEv6] =
|
|
{ "UDPLITEv6", inet_get, AF_INET6, IPPROTO_UDPLITE },
|
|
[SOCK_PROTO_DCCPv6] =
|
|
{ "DCCPv6", inet_get, AF_INET6, IPPROTO_DCCP },
|
|
[SOCK_PROTO_SCTPv6] =
|
|
{ "SCTPv6", inet_get, AF_INET6, IPPROTO_SCTP },
|
|
[SOCK_PROTO_L2TP_IPv6] =
|
|
{ "L2TP/IPv6", inet_get, AF_INET6, IPPROTO_L2TP },
|
|
[SOCK_PROTO_PINGv6] =
|
|
{ "PINGv6", inet_get, AF_INET6, IPPROTO_ICMP },
|
|
[SOCK_PROTO_RAWv6] =
|
|
{ "RAWv6", inet_get, AF_INET6, IPPROTO_RAW },
|
|
[SOCK_PROTO_NETLINK] = { "NETLINK", netlink_get, AF_NETLINK },
|
|
};
|
|
|
|
enum sock_proto
|
|
get_proto_by_name(const char *const name)
|
|
{
|
|
unsigned int i;
|
|
for (i = (unsigned int) SOCK_PROTO_UNKNOWN + 1;
|
|
i < ARRAY_SIZE(protocols); ++i) {
|
|
if (protocols[i].name && !strcmp(name, protocols[i].name))
|
|
return (enum sock_proto) i;
|
|
}
|
|
return SOCK_PROTO_UNKNOWN;
|
|
}
|
|
|
|
int
|
|
get_family_by_proto(enum sock_proto proto)
|
|
{
|
|
if ((size_t) proto < ARRAY_SIZE(protocols))
|
|
return protocols[proto].family;
|
|
|
|
return AF_UNSPEC;
|
|
}
|
|
|
|
static const char *
|
|
get_sockaddr_by_inode_uncached(struct tcb *tcp, const unsigned long inode,
|
|
const enum sock_proto proto)
|
|
{
|
|
if ((unsigned int) proto >= ARRAY_SIZE(protocols) ||
|
|
(proto != SOCK_PROTO_UNKNOWN && !protocols[proto].get))
|
|
return NULL;
|
|
|
|
const int fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_SOCK_DIAG);
|
|
if (fd < 0)
|
|
return NULL;
|
|
const char *details = NULL;
|
|
|
|
if (proto != SOCK_PROTO_UNKNOWN) {
|
|
details = protocols[proto].get(tcp, fd, protocols[proto].family,
|
|
protocols[proto].proto, inode,
|
|
protocols[proto].name);
|
|
} else {
|
|
unsigned int i;
|
|
for (i = (unsigned int) SOCK_PROTO_UNKNOWN + 1;
|
|
i < ARRAY_SIZE(protocols); ++i) {
|
|
if (!protocols[i].get)
|
|
continue;
|
|
details = protocols[i].get(tcp, fd,
|
|
protocols[proto].family,
|
|
protocols[proto].proto,
|
|
inode,
|
|
protocols[proto].name);
|
|
if (details)
|
|
break;
|
|
}
|
|
}
|
|
|
|
close(fd);
|
|
return details;
|
|
}
|
|
|
|
static bool
|
|
print_sockaddr_by_inode_uncached(struct tcb *tcp, const unsigned long inode,
|
|
const enum sock_proto proto)
|
|
{
|
|
const char *details = get_sockaddr_by_inode_uncached(tcp, inode, proto);
|
|
|
|
if (details) {
|
|
tprints(details);
|
|
return true;
|
|
}
|
|
|
|
if ((unsigned int) proto < ARRAY_SIZE(protocols) &&
|
|
protocols[proto].name) {
|
|
tprintf("%s:[%lu]", protocols[proto].name, inode);
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
/* Given an inode number of a socket, return its protocol details. */
|
|
const char *
|
|
get_sockaddr_by_inode(struct tcb *const tcp, const int fd,
|
|
const unsigned long inode)
|
|
{
|
|
const char *details = get_sockaddr_by_inode_cached(inode);
|
|
return details ? details :
|
|
get_sockaddr_by_inode_uncached(tcp, inode, getfdproto(tcp, fd));
|
|
}
|
|
|
|
/* Given an inode number of a socket, print out its protocol details. */
|
|
bool
|
|
print_sockaddr_by_inode(struct tcb *const tcp, const int fd,
|
|
const unsigned long inode)
|
|
{
|
|
return print_sockaddr_by_inode_cached(inode) ? true :
|
|
print_sockaddr_by_inode_uncached(tcp, inode,
|
|
getfdproto(tcp, fd));
|
|
}
|
|
|
|
#ifdef HAVE_LINUX_GENETLINK_H
|
|
/*
|
|
* Managing the cache for decoding communications of Netlink GENERIC protocol
|
|
*
|
|
* As name shown Netlink GENERIC protocol is generic protocol. The
|
|
* numbers of msg types used in the protocol are not defined
|
|
* statically. Kernel defines them on demand. So the xlat converted
|
|
* from header files doesn't help for decoding the protocol. Following
|
|
* codes are building xlat(dyxlat) at runtime.
|
|
*/
|
|
static bool
|
|
genl_send_dump_families(struct tcb *tcp, const int fd)
|
|
{
|
|
struct {
|
|
const struct nlmsghdr nlh;
|
|
struct genlmsghdr gnlh;
|
|
} req = {
|
|
.nlh = {
|
|
.nlmsg_len = sizeof(req),
|
|
.nlmsg_type = GENL_ID_CTRL,
|
|
.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
|
|
},
|
|
.gnlh = {
|
|
.cmd = CTRL_CMD_GETFAMILY,
|
|
}
|
|
};
|
|
return send_query(tcp, fd, &req, sizeof(req));
|
|
}
|
|
|
|
static int
|
|
genl_parse_families_response(const void *const data,
|
|
const int data_len, const unsigned long inode,
|
|
void *opaque_data)
|
|
{
|
|
struct dyxlat *const dyxlat = opaque_data;
|
|
const struct genlmsghdr *const gnlh = data;
|
|
struct rtattr *attr;
|
|
int rta_len = data_len - NLMSG_LENGTH(sizeof(*gnlh));
|
|
|
|
char *name = NULL;
|
|
unsigned int name_len = 0;
|
|
uint16_t *id = NULL;
|
|
|
|
if (rta_len < 0)
|
|
return -1;
|
|
if (gnlh->cmd != CTRL_CMD_NEWFAMILY)
|
|
return -1;
|
|
if (gnlh->version != 2)
|
|
return -1;
|
|
|
|
for (attr = (struct rtattr *) (gnlh + 1);
|
|
RTA_OK(attr, rta_len);
|
|
attr = RTA_NEXT(attr, rta_len)) {
|
|
switch (attr->rta_type) {
|
|
case CTRL_ATTR_FAMILY_NAME:
|
|
if (!name) {
|
|
name = RTA_DATA(attr);
|
|
name_len = RTA_PAYLOAD(attr);
|
|
}
|
|
break;
|
|
case CTRL_ATTR_FAMILY_ID:
|
|
if (!id && RTA_PAYLOAD(attr) == sizeof(*id))
|
|
id = RTA_DATA(attr);
|
|
break;
|
|
}
|
|
|
|
if (name && id) {
|
|
dyxlat_add_pair(dyxlat, *id, name, name_len);
|
|
name = NULL;
|
|
id = NULL;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
const struct xlat *
|
|
genl_families_xlat(struct tcb *tcp)
|
|
{
|
|
static struct dyxlat *dyxlat;
|
|
|
|
if (!dyxlat) {
|
|
dyxlat = dyxlat_alloc(32);
|
|
|
|
int fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC);
|
|
if (fd < 0)
|
|
goto out;
|
|
|
|
if (genl_send_dump_families(tcp, fd))
|
|
receive_responses(tcp, fd, 0, GENL_ID_CTRL,
|
|
genl_parse_families_response, dyxlat);
|
|
close(fd);
|
|
}
|
|
|
|
out:
|
|
return dyxlat_get(dyxlat);
|
|
}
|
|
|
|
#else /* !HAVE_LINUX_GENETLINK_H */
|
|
|
|
const struct xlat *
|
|
genl_families_xlat(struct tcb *tcp)
|
|
{
|
|
return NULL;
|
|
}
|
|
#endif
|