Dmitry V. Levin
b93d52fe3d
strace is now provided under the terms of the GNU Lesser General Public License version 2.1 or later, see COPYING for more details. strace test suite is now provided under the terms of the GNU General Public License version 2 or later, see tests/COPYING for more details.
670 lines
16 KiB
C
670 lines
16 KiB
C
/*
|
|
* Copyright (c) 2014 Zubin Mithra <zubin.mithra@gmail.com>
|
|
* Copyright (c) 2014-2016 Dmitry V. Levin <ldv@altlinux.org>
|
|
* Copyright (c) 2014-2018 The strace developers.
|
|
* All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: LGPL-2.1-or-later
|
|
*/
|
|
|
|
#include "defs.h"
|
|
#include <netinet/in.h>
|
|
#include <sys/socket.h>
|
|
#include <arpa/inet.h>
|
|
#include "netlink.h"
|
|
#include <linux/sock_diag.h>
|
|
#include <linux/inet_diag.h>
|
|
#include <linux/unix_diag.h>
|
|
#include <linux/netlink_diag.h>
|
|
#include <linux/rtnetlink.h>
|
|
#include <linux/genetlink.h>
|
|
|
|
#include <sys/un.h>
|
|
#ifndef UNIX_PATH_MAX
|
|
# define UNIX_PATH_MAX sizeof(((struct sockaddr_un *) 0)->sun_path)
|
|
#endif
|
|
|
|
#include "xstring.h"
|
|
|
|
#define XLAT_MACROS_ONLY
|
|
# include "xlat/inet_protocols.h"
|
|
#undef XLAT_MACROS_ONLY
|
|
|
|
typedef struct {
|
|
unsigned long inode;
|
|
char *details;
|
|
} cache_entry;
|
|
|
|
#define CACHE_SIZE 1024U
|
|
static cache_entry cache[CACHE_SIZE];
|
|
#define CACHE_MASK (CACHE_SIZE - 1)
|
|
|
|
static int
|
|
cache_inode_details(const unsigned long inode, char *const details)
|
|
{
|
|
cache_entry *e = &cache[inode & CACHE_MASK];
|
|
free(e->details);
|
|
e->inode = inode;
|
|
e->details = details;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static const char *
|
|
get_sockaddr_by_inode_cached(const unsigned long inode)
|
|
{
|
|
const cache_entry *const e = &cache[inode & CACHE_MASK];
|
|
return (e && inode == e->inode) ? e->details : NULL;
|
|
}
|
|
|
|
static bool
|
|
print_sockaddr_by_inode_cached(const unsigned long inode)
|
|
{
|
|
const char *const details = get_sockaddr_by_inode_cached(inode);
|
|
if (details) {
|
|
tprints(details);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
static bool
|
|
send_query(struct tcb *tcp, const int fd, void *req, size_t req_size)
|
|
{
|
|
struct sockaddr_nl nladdr = {
|
|
.nl_family = AF_NETLINK
|
|
};
|
|
struct iovec iov = {
|
|
.iov_base = req,
|
|
.iov_len = req_size
|
|
};
|
|
const struct msghdr msg = {
|
|
.msg_name = &nladdr,
|
|
.msg_namelen = sizeof(nladdr),
|
|
.msg_iov = &iov,
|
|
.msg_iovlen = 1
|
|
};
|
|
|
|
for (;;) {
|
|
if (sendmsg(fd, &msg, 0) < 0) {
|
|
if (errno == EINTR)
|
|
continue;
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
}
|
|
|
|
static bool
|
|
inet_send_query(struct tcb *tcp, const int fd, const int family,
|
|
const int proto)
|
|
{
|
|
struct {
|
|
const struct nlmsghdr nlh;
|
|
const struct inet_diag_req_v2 idr;
|
|
} req = {
|
|
.nlh = {
|
|
.nlmsg_len = sizeof(req),
|
|
.nlmsg_type = SOCK_DIAG_BY_FAMILY,
|
|
.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST
|
|
},
|
|
.idr = {
|
|
.sdiag_family = family,
|
|
.sdiag_protocol = proto,
|
|
.idiag_states = -1
|
|
}
|
|
};
|
|
return send_query(tcp, fd, &req, sizeof(req));
|
|
}
|
|
|
|
static int
|
|
inet_parse_response(const void *const data, const int data_len,
|
|
const unsigned long inode, void *opaque_data)
|
|
{
|
|
const char *const proto_name = opaque_data;
|
|
const struct inet_diag_msg *const diag_msg = data;
|
|
static const char zero_addr[sizeof(struct in6_addr)];
|
|
socklen_t addr_size, text_size;
|
|
|
|
if (data_len < (int) NLMSG_LENGTH(sizeof(*diag_msg)))
|
|
return -1;
|
|
if (diag_msg->idiag_inode != inode)
|
|
return 0;
|
|
|
|
switch (diag_msg->idiag_family) {
|
|
case AF_INET:
|
|
addr_size = sizeof(struct in_addr);
|
|
text_size = INET_ADDRSTRLEN;
|
|
break;
|
|
case AF_INET6:
|
|
addr_size = sizeof(struct in6_addr);
|
|
text_size = INET6_ADDRSTRLEN;
|
|
break;
|
|
default:
|
|
return -1;
|
|
}
|
|
|
|
char src_buf[text_size];
|
|
char *details;
|
|
|
|
/* open/closing brackets for IPv6 addresses */
|
|
const char *ob = diag_msg->idiag_family == AF_INET6 ? "[" : "";
|
|
const char *cb = diag_msg->idiag_family == AF_INET6 ? "]" : "";
|
|
|
|
if (!inet_ntop(diag_msg->idiag_family, diag_msg->id.idiag_src,
|
|
src_buf, text_size))
|
|
return -1;
|
|
|
|
if (diag_msg->id.idiag_dport ||
|
|
memcmp(zero_addr, diag_msg->id.idiag_dst, addr_size)) {
|
|
char dst_buf[text_size];
|
|
|
|
if (!inet_ntop(diag_msg->idiag_family, diag_msg->id.idiag_dst,
|
|
dst_buf, text_size))
|
|
return -1;
|
|
|
|
if (asprintf(&details, "%s:[%s%s%s:%u->%s%s%s:%u]", proto_name,
|
|
ob, src_buf, cb, ntohs(diag_msg->id.idiag_sport),
|
|
ob, dst_buf, cb, ntohs(diag_msg->id.idiag_dport))
|
|
< 0)
|
|
return false;
|
|
} else {
|
|
if (asprintf(&details, "%s:[%s%s%s:%u]",
|
|
proto_name, ob, src_buf, cb,
|
|
ntohs(diag_msg->id.idiag_sport)) < 0)
|
|
return false;
|
|
}
|
|
|
|
return cache_inode_details(inode, details);
|
|
}
|
|
|
|
static bool
|
|
receive_responses(struct tcb *tcp, const int fd, const unsigned long inode,
|
|
const unsigned long expected_msg_type,
|
|
int (*parser)(const void *, int,
|
|
unsigned long, void *),
|
|
void *opaque_data)
|
|
{
|
|
static union {
|
|
struct nlmsghdr hdr;
|
|
long buf[8192 / sizeof(long)];
|
|
} hdr_buf;
|
|
|
|
struct sockaddr_nl nladdr = {
|
|
.nl_family = AF_NETLINK
|
|
};
|
|
struct iovec iov = {
|
|
.iov_base = hdr_buf.buf,
|
|
.iov_len = sizeof(hdr_buf.buf)
|
|
};
|
|
int flags = 0;
|
|
|
|
for (;;) {
|
|
struct msghdr msg = {
|
|
.msg_name = &nladdr,
|
|
.msg_namelen = sizeof(nladdr),
|
|
.msg_iov = &iov,
|
|
.msg_iovlen = 1
|
|
};
|
|
|
|
ssize_t ret = recvmsg(fd, &msg, flags);
|
|
if (ret < 0) {
|
|
if (errno == EINTR)
|
|
continue;
|
|
return false;
|
|
}
|
|
|
|
const struct nlmsghdr *h = &hdr_buf.hdr;
|
|
if (!is_nlmsg_ok(h, ret))
|
|
return false;
|
|
for (; is_nlmsg_ok(h, ret); h = NLMSG_NEXT(h, ret)) {
|
|
if (h->nlmsg_type != expected_msg_type)
|
|
return false;
|
|
const int rc = parser(NLMSG_DATA(h),
|
|
h->nlmsg_len, inode, opaque_data);
|
|
if (rc > 0)
|
|
return true;
|
|
if (rc < 0)
|
|
return false;
|
|
}
|
|
flags = MSG_DONTWAIT;
|
|
}
|
|
}
|
|
|
|
static bool
|
|
unix_send_query(struct tcb *tcp, const int fd, const unsigned long inode)
|
|
{
|
|
/*
|
|
* The kernel bug was fixed in mainline by commit v4.5-rc6~35^2~11
|
|
* and backported to stable/linux-4.4.y by commit v4.4.4~297.
|
|
*/
|
|
const uint16_t dump_flag =
|
|
os_release < KERNEL_VERSION(4, 4, 4) ? NLM_F_DUMP : 0;
|
|
|
|
struct {
|
|
const struct nlmsghdr nlh;
|
|
const struct unix_diag_req udr;
|
|
} req = {
|
|
.nlh = {
|
|
.nlmsg_len = sizeof(req),
|
|
.nlmsg_type = SOCK_DIAG_BY_FAMILY,
|
|
.nlmsg_flags = NLM_F_REQUEST | dump_flag
|
|
},
|
|
.udr = {
|
|
.sdiag_family = AF_UNIX,
|
|
.udiag_ino = inode,
|
|
.udiag_states = -1,
|
|
.udiag_show = UDIAG_SHOW_NAME | UDIAG_SHOW_PEER,
|
|
.udiag_cookie = { ~0U, ~0U }
|
|
}
|
|
};
|
|
return send_query(tcp, fd, &req, sizeof(req));
|
|
}
|
|
|
|
static int
|
|
unix_parse_response(const void *data, const int data_len,
|
|
const unsigned long inode, void *opaque_data)
|
|
{
|
|
const char *proto_name = opaque_data;
|
|
const struct unix_diag_msg *diag_msg = data;
|
|
struct rtattr *attr;
|
|
int rta_len = data_len - NLMSG_LENGTH(sizeof(*diag_msg));
|
|
uint32_t peer = 0;
|
|
size_t path_len = 0;
|
|
char path[UNIX_PATH_MAX + 1];
|
|
|
|
if (rta_len < 0)
|
|
return -1;
|
|
if (diag_msg->udiag_ino != inode)
|
|
return 0;
|
|
if (diag_msg->udiag_family != AF_UNIX)
|
|
return -1;
|
|
|
|
for (attr = (struct rtattr *) (diag_msg + 1);
|
|
RTA_OK(attr, rta_len);
|
|
attr = RTA_NEXT(attr, rta_len)) {
|
|
switch (attr->rta_type) {
|
|
case UNIX_DIAG_NAME:
|
|
if (!path_len) {
|
|
path_len = RTA_PAYLOAD(attr);
|
|
if (path_len > UNIX_PATH_MAX)
|
|
path_len = UNIX_PATH_MAX;
|
|
memcpy(path, RTA_DATA(attr), path_len);
|
|
path[path_len] = '\0';
|
|
}
|
|
break;
|
|
case UNIX_DIAG_PEER:
|
|
if (RTA_PAYLOAD(attr) >= 4)
|
|
peer = *(uint32_t *) RTA_DATA(attr);
|
|
break;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* print obtained information in the following format:
|
|
* "UNIX:[" SELF_INODE [ "->" PEER_INODE ][ "," SOCKET_FILE ] "]"
|
|
*/
|
|
if (!peer && !path_len)
|
|
return -1;
|
|
|
|
char peer_str[3 + sizeof(peer) * 3];
|
|
if (peer)
|
|
xsprintf(peer_str, "->%u", peer);
|
|
else
|
|
peer_str[0] = '\0';
|
|
|
|
const char *path_str;
|
|
if (path_len) {
|
|
char *outstr = alloca(4 * path_len + 4);
|
|
|
|
outstr[0] = ',';
|
|
if (path[0] == '\0') {
|
|
outstr[1] = '@';
|
|
string_quote(path + 1, outstr + 2,
|
|
path_len - 1, QUOTE_0_TERMINATED, NULL);
|
|
} else {
|
|
string_quote(path, outstr + 1,
|
|
path_len, QUOTE_0_TERMINATED, NULL);
|
|
}
|
|
path_str = outstr;
|
|
} else {
|
|
path_str = "";
|
|
}
|
|
|
|
char *details;
|
|
if (asprintf(&details, "%s:[%lu%s%s]", proto_name, inode,
|
|
peer_str, path_str) < 0)
|
|
return -1;
|
|
|
|
return cache_inode_details(inode, details);
|
|
}
|
|
|
|
static bool
|
|
netlink_send_query(struct tcb *tcp, const int fd, const unsigned long inode)
|
|
{
|
|
struct {
|
|
const struct nlmsghdr nlh;
|
|
const struct netlink_diag_req ndr;
|
|
} req = {
|
|
.nlh = {
|
|
.nlmsg_len = sizeof(req),
|
|
.nlmsg_type = SOCK_DIAG_BY_FAMILY,
|
|
.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST
|
|
},
|
|
.ndr = {
|
|
.sdiag_family = AF_NETLINK,
|
|
.sdiag_protocol = NDIAG_PROTO_ALL
|
|
}
|
|
};
|
|
return send_query(tcp, fd, &req, sizeof(req));
|
|
}
|
|
|
|
static int
|
|
netlink_parse_response(const void *data, const int data_len,
|
|
const unsigned long inode, void *opaque_data)
|
|
{
|
|
const char *proto_name = opaque_data;
|
|
const struct netlink_diag_msg *const diag_msg = data;
|
|
const char *netlink_proto;
|
|
char *details;
|
|
|
|
if (data_len < (int) NLMSG_LENGTH(sizeof(*diag_msg)))
|
|
return -1;
|
|
if (diag_msg->ndiag_ino != inode)
|
|
return 0;
|
|
|
|
if (diag_msg->ndiag_family != AF_NETLINK)
|
|
return -1;
|
|
|
|
netlink_proto = xlookup(netlink_protocols,
|
|
diag_msg->ndiag_protocol);
|
|
|
|
if (netlink_proto) {
|
|
netlink_proto = STR_STRIP_PREFIX(netlink_proto, "NETLINK_");
|
|
if (asprintf(&details, "%s:[%s:%u]", proto_name,
|
|
netlink_proto, diag_msg->ndiag_portid) < 0)
|
|
return -1;
|
|
} else {
|
|
if (asprintf(&details, "%s:[%u]", proto_name,
|
|
(unsigned) diag_msg->ndiag_protocol) < 0)
|
|
return -1;
|
|
}
|
|
|
|
return cache_inode_details(inode, details);
|
|
}
|
|
|
|
static const char *
|
|
unix_get(struct tcb *tcp, const int fd, const int family, const int proto,
|
|
const unsigned long inode, const char *name)
|
|
{
|
|
return unix_send_query(tcp, fd, inode)
|
|
&& receive_responses(tcp, fd, inode, SOCK_DIAG_BY_FAMILY,
|
|
unix_parse_response, (void *) name)
|
|
? get_sockaddr_by_inode_cached(inode) : NULL;
|
|
}
|
|
|
|
static const char *
|
|
inet_get(struct tcb *tcp, const int fd, const int family, const int protocol,
|
|
const unsigned long inode, const char *proto_name)
|
|
{
|
|
return inet_send_query(tcp, fd, family, protocol)
|
|
&& receive_responses(tcp, fd, inode, SOCK_DIAG_BY_FAMILY,
|
|
inet_parse_response, (void *) proto_name)
|
|
? get_sockaddr_by_inode_cached(inode) : NULL;
|
|
}
|
|
|
|
static const char *
|
|
netlink_get(struct tcb *tcp, const int fd, const int family, const int protocol,
|
|
const unsigned long inode, const char *proto_name)
|
|
{
|
|
return netlink_send_query(tcp, fd, inode)
|
|
&& receive_responses(tcp, fd, inode, SOCK_DIAG_BY_FAMILY,
|
|
netlink_parse_response,
|
|
(void *) proto_name)
|
|
? get_sockaddr_by_inode_cached(inode) : NULL;
|
|
}
|
|
|
|
static const struct {
|
|
const char *const name;
|
|
const char * (*const get)(struct tcb *, int fd, int family,
|
|
int protocol, unsigned long inode,
|
|
const char *proto_name);
|
|
int family;
|
|
int proto;
|
|
} protocols[] = {
|
|
[SOCK_PROTO_UNIX] = { "UNIX", unix_get, AF_UNIX},
|
|
/*
|
|
* inet_diag handlers are currently implemented only for TCP,
|
|
* UDP(lite), SCTP, RAW, and DCCP, but we try to resolve it for all
|
|
* protocols anyway, just in case.
|
|
*/
|
|
[SOCK_PROTO_TCP] =
|
|
{ "TCP", inet_get, AF_INET, IPPROTO_TCP },
|
|
[SOCK_PROTO_UDP] =
|
|
{ "UDP", inet_get, AF_INET, IPPROTO_UDP },
|
|
[SOCK_PROTO_UDPLITE] =
|
|
{ "UDPLITE", inet_get, AF_INET, IPPROTO_UDPLITE },
|
|
[SOCK_PROTO_DCCP] =
|
|
{ "DCCP", inet_get, AF_INET, IPPROTO_DCCP },
|
|
[SOCK_PROTO_SCTP] =
|
|
{ "SCTP", inet_get, AF_INET, IPPROTO_SCTP },
|
|
[SOCK_PROTO_L2TP_IP] =
|
|
{ "L2TP/IP", inet_get, AF_INET, IPPROTO_L2TP },
|
|
[SOCK_PROTO_PING] =
|
|
{ "PING", inet_get, AF_INET, IPPROTO_ICMP },
|
|
[SOCK_PROTO_RAW] =
|
|
{ "RAW", inet_get, AF_INET, IPPROTO_RAW },
|
|
[SOCK_PROTO_TCPv6] =
|
|
{ "TCPv6", inet_get, AF_INET6, IPPROTO_TCP },
|
|
[SOCK_PROTO_UDPv6] =
|
|
{ "UDPv6", inet_get, AF_INET6, IPPROTO_UDP },
|
|
[SOCK_PROTO_UDPLITEv6] =
|
|
{ "UDPLITEv6", inet_get, AF_INET6, IPPROTO_UDPLITE },
|
|
[SOCK_PROTO_DCCPv6] =
|
|
{ "DCCPv6", inet_get, AF_INET6, IPPROTO_DCCP },
|
|
[SOCK_PROTO_SCTPv6] =
|
|
{ "SCTPv6", inet_get, AF_INET6, IPPROTO_SCTP },
|
|
[SOCK_PROTO_L2TP_IPv6] =
|
|
{ "L2TP/IPv6", inet_get, AF_INET6, IPPROTO_L2TP },
|
|
[SOCK_PROTO_PINGv6] =
|
|
{ "PINGv6", inet_get, AF_INET6, IPPROTO_ICMP },
|
|
[SOCK_PROTO_RAWv6] =
|
|
{ "RAWv6", inet_get, AF_INET6, IPPROTO_RAW },
|
|
[SOCK_PROTO_NETLINK] = { "NETLINK", netlink_get, AF_NETLINK },
|
|
};
|
|
|
|
enum sock_proto
|
|
get_proto_by_name(const char *const name)
|
|
{
|
|
unsigned int i;
|
|
for (i = (unsigned int) SOCK_PROTO_UNKNOWN + 1;
|
|
i < ARRAY_SIZE(protocols); ++i) {
|
|
if (protocols[i].name && !strcmp(name, protocols[i].name))
|
|
return (enum sock_proto) i;
|
|
}
|
|
return SOCK_PROTO_UNKNOWN;
|
|
}
|
|
|
|
int
|
|
get_family_by_proto(enum sock_proto proto)
|
|
{
|
|
if ((size_t) proto < ARRAY_SIZE(protocols))
|
|
return protocols[proto].family;
|
|
|
|
return AF_UNSPEC;
|
|
}
|
|
|
|
static const char *
|
|
get_sockaddr_by_inode_uncached(struct tcb *tcp, const unsigned long inode,
|
|
const enum sock_proto proto)
|
|
{
|
|
if ((unsigned int) proto >= ARRAY_SIZE(protocols) ||
|
|
(proto != SOCK_PROTO_UNKNOWN && !protocols[proto].get))
|
|
return NULL;
|
|
|
|
const int fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_SOCK_DIAG);
|
|
if (fd < 0)
|
|
return NULL;
|
|
const char *details = NULL;
|
|
|
|
if (proto != SOCK_PROTO_UNKNOWN) {
|
|
details = protocols[proto].get(tcp, fd, protocols[proto].family,
|
|
protocols[proto].proto, inode,
|
|
protocols[proto].name);
|
|
} else {
|
|
unsigned int i;
|
|
for (i = (unsigned int) SOCK_PROTO_UNKNOWN + 1;
|
|
i < ARRAY_SIZE(protocols); ++i) {
|
|
if (!protocols[i].get)
|
|
continue;
|
|
details = protocols[i].get(tcp, fd,
|
|
protocols[proto].family,
|
|
protocols[proto].proto,
|
|
inode,
|
|
protocols[proto].name);
|
|
if (details)
|
|
break;
|
|
}
|
|
}
|
|
|
|
close(fd);
|
|
return details;
|
|
}
|
|
|
|
static bool
|
|
print_sockaddr_by_inode_uncached(struct tcb *tcp, const unsigned long inode,
|
|
const enum sock_proto proto)
|
|
{
|
|
const char *details = get_sockaddr_by_inode_uncached(tcp, inode, proto);
|
|
|
|
if (details) {
|
|
tprints(details);
|
|
return true;
|
|
}
|
|
|
|
if ((unsigned int) proto < ARRAY_SIZE(protocols) &&
|
|
protocols[proto].name) {
|
|
tprintf("%s:[%lu]", protocols[proto].name, inode);
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
/* Given an inode number of a socket, return its protocol details. */
|
|
const char *
|
|
get_sockaddr_by_inode(struct tcb *const tcp, const int fd,
|
|
const unsigned long inode)
|
|
{
|
|
const char *details = get_sockaddr_by_inode_cached(inode);
|
|
return details ? details :
|
|
get_sockaddr_by_inode_uncached(tcp, inode, getfdproto(tcp, fd));
|
|
}
|
|
|
|
/* Given an inode number of a socket, print out its protocol details. */
|
|
bool
|
|
print_sockaddr_by_inode(struct tcb *const tcp, const int fd,
|
|
const unsigned long inode)
|
|
{
|
|
return print_sockaddr_by_inode_cached(inode) ? true :
|
|
print_sockaddr_by_inode_uncached(tcp, inode,
|
|
getfdproto(tcp, fd));
|
|
}
|
|
|
|
/*
|
|
* Managing the cache for decoding communications of Netlink GENERIC protocol
|
|
*
|
|
* As name shown Netlink GENERIC protocol is generic protocol. The
|
|
* numbers of msg types used in the protocol are not defined
|
|
* statically. Kernel defines them on demand. So the xlat converted
|
|
* from header files doesn't help for decoding the protocol. Following
|
|
* codes are building xlat(dyxlat) at runtime.
|
|
*/
|
|
static bool
|
|
genl_send_dump_families(struct tcb *tcp, const int fd)
|
|
{
|
|
struct {
|
|
const struct nlmsghdr nlh;
|
|
struct genlmsghdr gnlh;
|
|
} req = {
|
|
.nlh = {
|
|
.nlmsg_len = sizeof(req),
|
|
.nlmsg_type = GENL_ID_CTRL,
|
|
.nlmsg_flags = NLM_F_DUMP | NLM_F_REQUEST,
|
|
},
|
|
.gnlh = {
|
|
.cmd = CTRL_CMD_GETFAMILY,
|
|
}
|
|
};
|
|
return send_query(tcp, fd, &req, sizeof(req));
|
|
}
|
|
|
|
static int
|
|
genl_parse_families_response(const void *const data,
|
|
const int data_len, const unsigned long inode,
|
|
void *opaque_data)
|
|
{
|
|
struct dyxlat *const dyxlat = opaque_data;
|
|
const struct genlmsghdr *const gnlh = data;
|
|
struct rtattr *attr;
|
|
int rta_len = data_len - NLMSG_LENGTH(sizeof(*gnlh));
|
|
|
|
char *name = NULL;
|
|
unsigned int name_len = 0;
|
|
uint16_t *id = NULL;
|
|
|
|
if (rta_len < 0)
|
|
return -1;
|
|
if (gnlh->cmd != CTRL_CMD_NEWFAMILY)
|
|
return -1;
|
|
if (gnlh->version != 2)
|
|
return -1;
|
|
|
|
for (attr = (struct rtattr *) (gnlh + 1);
|
|
RTA_OK(attr, rta_len);
|
|
attr = RTA_NEXT(attr, rta_len)) {
|
|
switch (attr->rta_type) {
|
|
case CTRL_ATTR_FAMILY_NAME:
|
|
if (!name) {
|
|
name = RTA_DATA(attr);
|
|
name_len = RTA_PAYLOAD(attr);
|
|
}
|
|
break;
|
|
case CTRL_ATTR_FAMILY_ID:
|
|
if (!id && RTA_PAYLOAD(attr) == sizeof(*id))
|
|
id = RTA_DATA(attr);
|
|
break;
|
|
}
|
|
|
|
if (name && id) {
|
|
dyxlat_add_pair(dyxlat, *id, name, name_len);
|
|
name = NULL;
|
|
id = NULL;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
const struct xlat *
|
|
genl_families_xlat(struct tcb *tcp)
|
|
{
|
|
static struct dyxlat *dyxlat;
|
|
|
|
if (!dyxlat) {
|
|
dyxlat = dyxlat_alloc(32);
|
|
|
|
int fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC);
|
|
if (fd < 0)
|
|
goto out;
|
|
|
|
if (genl_send_dump_families(tcp, fd))
|
|
receive_responses(tcp, fd, 0, GENL_ID_CTRL,
|
|
genl_parse_families_response, dyxlat);
|
|
close(fd);
|
|
}
|
|
|
|
out:
|
|
return dyxlat_get(dyxlat);
|
|
}
|