| /* |
| * Copyright (c) 2016 Fabien Siron <[email protected]> |
| * Copyright (c) 2016 Dmitry V. Levin <[email protected]> |
| * Copyright (c) 2016-2018 The strace developers. |
| * All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * 3. The name of the author may not be used to endorse or promote products |
| * derived from this software without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include "defs.h" |
| #include "netlink.h" |
| #include "nlattr.h" |
| #include <linux/audit.h> |
| #include <linux/rtnetlink.h> |
| #include <linux/xfrm.h> |
| #include "xlat/netlink_ack_flags.h" |
| #include "xlat/netlink_delete_flags.h" |
| #include "xlat/netlink_flags.h" |
| #include "xlat/netlink_get_flags.h" |
| #include "xlat/netlink_new_flags.h" |
| #include "xlat/netlink_protocols.h" |
| #include "xlat/netlink_types.h" |
| #include "xlat/nf_acct_msg_types.h" |
| #include "xlat/nf_cthelper_msg_types.h" |
| #include "xlat/nf_ctnetlink_exp_msg_types.h" |
| #include "xlat/nf_ctnetlink_msg_types.h" |
| #include "xlat/nf_cttimeout_msg_types.h" |
| #include "xlat/nf_ipset_msg_types.h" |
| #include "xlat/nf_nft_compat_msg_types.h" |
| #include "xlat/nf_nftables_msg_types.h" |
| #include "xlat/nf_osf_msg_types.h" |
| #include "xlat/nf_queue_msg_types.h" |
| #include "xlat/nf_ulog_msg_types.h" |
| #include "xlat/nl_audit_types.h" |
| #include "xlat/nl_crypto_types.h" |
| #include "xlat/nl_netfilter_subsys_ids.h" |
| #include "xlat/nl_selinux_types.h" |
| #include "xlat/nl_sock_diag_types.h" |
| #include "xlat/nl_xfrm_types.h" |
| #include "xlat/nlmsgerr_attrs.h" |
| |
| /* |
| * Fetch a struct nlmsghdr from the given address. |
| */ |
| static bool |
| fetch_nlmsghdr(struct tcb *const tcp, struct nlmsghdr *const nlmsghdr, |
| const kernel_ulong_t addr, const kernel_ulong_t len, |
| const bool in_array) |
| { |
| if (len < sizeof(struct nlmsghdr)) { |
| printstr_ex(tcp, addr, len, QUOTE_FORCE_HEX); |
| return false; |
| } |
| |
| if (tfetch_obj(tcp, addr, nlmsghdr)) |
| return true; |
| |
| if (in_array) { |
| tprints("..."); |
| printaddr_comment(addr); |
| } else { |
| printaddr(addr); |
| } |
| |
| return false; |
| } |
| |
| static int |
| get_fd_nl_family(struct tcb *const tcp, const int fd) |
| { |
| const unsigned long inode = getfdinode(tcp, fd); |
| if (!inode) |
| return -1; |
| |
| const char *const details = get_sockaddr_by_inode(tcp, fd, inode); |
| if (!details) |
| return -1; |
| |
| const char *const nl_details = STR_STRIP_PREFIX(details, "NETLINK:["); |
| if (nl_details == details) |
| return -1; |
| |
| const struct xlat *xlats = netlink_protocols; |
| for (; xlats->str; ++xlats) { |
| const char *name = STR_STRIP_PREFIX(xlats->str, "NETLINK_"); |
| if (!strncmp(nl_details, name, strlen(name))) |
| return xlats->val; |
| } |
| |
| if (*nl_details >= '0' && *nl_details <= '9') |
| return atoi(nl_details); |
| |
| return -1; |
| } |
| |
| static void |
| decode_nlmsg_type_default(struct tcb *tcp, const struct xlat *const xlat, |
| const uint16_t type, |
| const char *const dflt) |
| { |
| printxval(xlat, type, dflt); |
| } |
| |
| static void |
| decode_nlmsg_type_generic(struct tcb *tcp, const struct xlat *const xlat, |
| const uint16_t type, |
| const char *const dflt) |
| { |
| printxval(genl_families_xlat(tcp), type, dflt); |
| } |
| |
| static const struct { |
| const struct xlat *const xlat; |
| const char *const dflt; |
| } nf_nlmsg_types[] = { |
| [NFNL_SUBSYS_CTNETLINK] = { |
| nf_ctnetlink_msg_types, |
| "IPCTNL_MSG_CT_???" |
| }, |
| [NFNL_SUBSYS_CTNETLINK_EXP] = { |
| nf_ctnetlink_exp_msg_types, |
| "IPCTNL_MSG_EXP_???" |
| }, |
| [NFNL_SUBSYS_QUEUE] = { nf_queue_msg_types, "NFQNL_MSG_???" }, |
| [NFNL_SUBSYS_ULOG] = { nf_ulog_msg_types, "NFULNL_MSG_???" }, |
| [NFNL_SUBSYS_OSF] = { nf_osf_msg_types, "OSF_MSG_???" }, |
| [NFNL_SUBSYS_IPSET] = { nf_ipset_msg_types, "IPSET_CMD_???" }, |
| [NFNL_SUBSYS_ACCT] = { nf_acct_msg_types, "NFNL_MSG_ACCT_???" }, |
| [NFNL_SUBSYS_CTNETLINK_TIMEOUT] = { |
| nf_cttimeout_msg_types, |
| "IPCTNL_MSG_TIMEOUT_???" |
| }, |
| [NFNL_SUBSYS_CTHELPER] = { |
| nf_cthelper_msg_types, |
| "NFNL_MSG_CTHELPER_???" |
| }, |
| [NFNL_SUBSYS_NFTABLES] = { nf_nftables_msg_types, "NFT_MSG_???" }, |
| [NFNL_SUBSYS_NFT_COMPAT] = { |
| nf_nft_compat_msg_types, |
| "NFNL_MSG_COMPAT_???" |
| } |
| }; |
| |
| static void |
| decode_nlmsg_type_netfilter(struct tcb *tcp, const struct xlat *const xlat, |
| const uint16_t type, |
| const char *const dflt) |
| { |
| /* Reserved control nfnetlink messages first. */ |
| const char *const text = xlookup(nl_netfilter_msg_types, type); |
| if (text) { |
| print_xlat_ex(type, text, XLAT_STYLE_DEFAULT); |
| return; |
| } |
| |
| /* |
| * Other netfilter message types are split |
| * in two pieces: 8 bits subsystem and 8 bits type. |
| */ |
| const uint8_t subsys_id = (uint8_t) (type >> 8); |
| const uint8_t msg_type = (uint8_t) type; |
| |
| printxval(xlat, subsys_id, dflt); |
| |
| tprints("<<8|"); |
| if (subsys_id < ARRAY_SIZE(nf_nlmsg_types)) |
| printxval(nf_nlmsg_types[subsys_id].xlat, |
| msg_type, nf_nlmsg_types[subsys_id].dflt); |
| else |
| tprintf("%#x", msg_type); |
| } |
| |
| typedef void (*nlmsg_types_decoder_t)(struct tcb *, const struct xlat *, |
| uint16_t type, |
| const char *dflt); |
| |
| static const struct { |
| const nlmsg_types_decoder_t decoder; |
| const struct xlat *const xlat; |
| const char *const dflt; |
| } nlmsg_types[] = { |
| [NETLINK_AUDIT] = { NULL, nl_audit_types, "AUDIT_???" }, |
| [NETLINK_CRYPTO] = { NULL, nl_crypto_types, "CRYPTO_MSG_???" }, |
| [NETLINK_GENERIC] = { |
| decode_nlmsg_type_generic, |
| NULL, |
| "GENERIC_FAMILY_???" |
| }, |
| [NETLINK_NETFILTER] = { |
| decode_nlmsg_type_netfilter, |
| nl_netfilter_subsys_ids, |
| "NFNL_SUBSYS_???" |
| }, |
| [NETLINK_ROUTE] = { NULL, nl_route_types, "RTM_???" }, |
| [NETLINK_SELINUX] = { NULL, nl_selinux_types, "SELNL_MSG_???" }, |
| [NETLINK_SOCK_DIAG] = { NULL, nl_sock_diag_types, "SOCK_DIAG_???" }, |
| [NETLINK_XFRM] = { NULL, nl_xfrm_types, "XFRM_MSG_???" } |
| }; |
| |
| /* |
| * As all valid netlink families are positive integers, use unsigned int |
| * for family here to filter out -1. |
| */ |
| static void |
| decode_nlmsg_type(struct tcb *tcp, const uint16_t type, |
| const unsigned int family) |
| { |
| nlmsg_types_decoder_t decoder = decode_nlmsg_type_default; |
| const struct xlat *xlat = netlink_types; |
| const char *dflt = "NLMSG_???"; |
| |
| /* |
| * type < NLMSG_MIN_TYPE are reserved control messages |
| * that need no family-specific decoding. |
| */ |
| if (type >= NLMSG_MIN_TYPE && family < ARRAY_SIZE(nlmsg_types)) { |
| if (nlmsg_types[family].decoder) |
| decoder = nlmsg_types[family].decoder; |
| if (nlmsg_types[family].xlat) |
| xlat = nlmsg_types[family].xlat; |
| if (nlmsg_types[family].dflt) |
| dflt = nlmsg_types[family].dflt; |
| } |
| |
| decoder(tcp, xlat, type, dflt); |
| } |
| |
| static const struct xlat * |
| decode_nlmsg_flags_crypto(const uint16_t type) |
| { |
| switch (type) { |
| case CRYPTO_MSG_NEWALG: |
| return netlink_new_flags; |
| case CRYPTO_MSG_DELALG: |
| case CRYPTO_MSG_DELRNG: |
| return netlink_delete_flags; |
| case CRYPTO_MSG_GETALG: |
| return netlink_get_flags; |
| } |
| |
| return NULL; |
| } |
| |
| static const struct xlat * |
| decode_nlmsg_flags_netfilter(const uint16_t type) |
| { |
| const uint8_t subsys_id = (uint8_t) (type >> 8); |
| const uint8_t msg_type = (uint8_t) type; |
| |
| switch (subsys_id) { |
| case NFNL_SUBSYS_CTNETLINK: |
| switch (msg_type) { |
| case IPCTNL_MSG_CT_NEW: |
| return netlink_new_flags; |
| case IPCTNL_MSG_CT_GET: |
| case IPCTNL_MSG_CT_GET_CTRZERO: |
| case IPCTNL_MSG_CT_GET_STATS_CPU: |
| case IPCTNL_MSG_CT_GET_STATS: |
| case IPCTNL_MSG_CT_GET_DYING: |
| case IPCTNL_MSG_CT_GET_UNCONFIRMED: |
| return netlink_get_flags; |
| case IPCTNL_MSG_CT_DELETE: |
| return netlink_delete_flags; |
| } |
| break; |
| case NFNL_SUBSYS_CTNETLINK_EXP: |
| switch (msg_type) { |
| case IPCTNL_MSG_EXP_NEW: |
| return netlink_new_flags; |
| case IPCTNL_MSG_EXP_GET: |
| case IPCTNL_MSG_EXP_GET_STATS_CPU: |
| return netlink_get_flags; |
| case IPCTNL_MSG_EXP_DELETE: |
| return netlink_delete_flags; |
| } |
| break; |
| case NFNL_SUBSYS_ACCT: |
| switch (msg_type) { |
| case NFNL_MSG_ACCT_NEW: |
| return netlink_new_flags; |
| case NFNL_MSG_ACCT_GET: |
| case NFNL_MSG_ACCT_GET_CTRZERO: |
| return netlink_get_flags; |
| case NFNL_MSG_ACCT_DEL: |
| return netlink_delete_flags; |
| } |
| break; |
| case NFNL_SUBSYS_CTNETLINK_TIMEOUT: |
| switch (msg_type) { |
| case IPCTNL_MSG_TIMEOUT_NEW: |
| return netlink_new_flags; |
| case IPCTNL_MSG_TIMEOUT_GET: |
| return netlink_get_flags; |
| case IPCTNL_MSG_TIMEOUT_DELETE: |
| return netlink_delete_flags; |
| } |
| break; |
| case NFNL_SUBSYS_CTHELPER: |
| switch (msg_type) { |
| case NFNL_MSG_CTHELPER_NEW: |
| return netlink_new_flags; |
| case NFNL_MSG_CTHELPER_GET: |
| return netlink_get_flags; |
| case NFNL_MSG_CTHELPER_DEL: |
| return netlink_delete_flags; |
| } |
| break; |
| case NFNL_SUBSYS_NFTABLES: |
| switch (msg_type) { |
| case NFT_MSG_NEWTABLE: |
| case NFT_MSG_NEWCHAIN: |
| case NFT_MSG_NEWRULE: |
| case NFT_MSG_NEWSET: |
| case NFT_MSG_NEWSETELEM: |
| case NFT_MSG_NEWGEN: |
| case NFT_MSG_NEWOBJ: |
| return netlink_new_flags; |
| case NFT_MSG_GETTABLE: |
| case NFT_MSG_GETCHAIN: |
| case NFT_MSG_GETRULE: |
| case NFT_MSG_GETSET: |
| case NFT_MSG_GETSETELEM: |
| case NFT_MSG_GETGEN: |
| case NFT_MSG_GETOBJ: |
| case NFT_MSG_GETOBJ_RESET: |
| return netlink_get_flags; |
| case NFT_MSG_DELTABLE: |
| case NFT_MSG_DELCHAIN: |
| case NFT_MSG_DELRULE: |
| case NFT_MSG_DELSET: |
| case NFT_MSG_DELSETELEM: |
| case NFT_MSG_DELOBJ: |
| return netlink_delete_flags; |
| } |
| break; |
| case NFNL_SUBSYS_NFT_COMPAT: |
| switch (msg_type) { |
| case NFNL_MSG_COMPAT_GET: |
| return netlink_get_flags; |
| } |
| break; |
| } |
| |
| return NULL; |
| } |
| |
| static const struct xlat * |
| decode_nlmsg_flags_route(const uint16_t type) |
| { |
| /* RTM_DELACTION uses NLM_F_ROOT flags */ |
| if (type == RTM_DELACTION) |
| return netlink_get_flags; |
| switch (type & 3) { |
| case 0: |
| return netlink_new_flags; |
| case 1: |
| return netlink_delete_flags; |
| case 2: |
| return netlink_get_flags; |
| } |
| |
| return NULL; |
| } |
| |
| static const struct xlat * |
| decode_nlmsg_flags_sock_diag(const uint16_t type) |
| { |
| return netlink_get_flags; |
| } |
| |
| static const struct xlat * |
| decode_nlmsg_flags_xfrm(const uint16_t type) |
| { |
| switch (type) { |
| case XFRM_MSG_NEWSA: |
| case XFRM_MSG_NEWPOLICY: |
| case XFRM_MSG_NEWAE: |
| case XFRM_MSG_NEWSADINFO: |
| case XFRM_MSG_NEWSPDINFO: |
| return netlink_new_flags; |
| case XFRM_MSG_DELSA: |
| case XFRM_MSG_DELPOLICY: |
| return netlink_delete_flags; |
| case XFRM_MSG_GETSA: |
| case XFRM_MSG_GETPOLICY: |
| case XFRM_MSG_GETAE: |
| case XFRM_MSG_GETSADINFO: |
| case XFRM_MSG_GETSPDINFO: |
| return netlink_get_flags; |
| } |
| |
| return NULL; |
| } |
| |
| typedef const struct xlat *(*nlmsg_flags_decoder_t)(const uint16_t type); |
| |
| static const nlmsg_flags_decoder_t nlmsg_flags[] = { |
| [NETLINK_CRYPTO] = decode_nlmsg_flags_crypto, |
| [NETLINK_NETFILTER] = decode_nlmsg_flags_netfilter, |
| [NETLINK_ROUTE] = decode_nlmsg_flags_route, |
| [NETLINK_SOCK_DIAG] = decode_nlmsg_flags_sock_diag, |
| [NETLINK_XFRM] = decode_nlmsg_flags_xfrm |
| }; |
| |
| /* |
| * As all valid netlink families are positive integers, use unsigned int |
| * for family here to filter out -1. |
| */ |
| static void |
| decode_nlmsg_flags(const uint16_t flags, const uint16_t type, |
| const unsigned int family) |
| { |
| const struct xlat *table = NULL; |
| |
| if (type < NLMSG_MIN_TYPE) { |
| if (type == NLMSG_ERROR) |
| table = netlink_ack_flags; |
| } else if (family < ARRAY_SIZE(nlmsg_flags) && nlmsg_flags[family]) |
| table = nlmsg_flags[family](type); |
| |
| printflags_ex(flags, "NLM_F_???", XLAT_STYLE_DEFAULT, |
| netlink_flags, table, NULL); |
| } |
| |
| static void |
| print_nlmsghdr(struct tcb *tcp, |
| const int fd, |
| const int family, |
| const struct nlmsghdr *const nlmsghdr) |
| { |
| /* print the whole structure regardless of its nlmsg_len */ |
| |
| tprintf("{len=%u, type=", nlmsghdr->nlmsg_len); |
| |
| decode_nlmsg_type(tcp, nlmsghdr->nlmsg_type, family); |
| |
| tprints(", flags="); |
| decode_nlmsg_flags(nlmsghdr->nlmsg_flags, |
| nlmsghdr->nlmsg_type, family); |
| |
| tprintf(", seq=%u, pid=%u}", nlmsghdr->nlmsg_seq, |
| nlmsghdr->nlmsg_pid); |
| } |
| |
| static bool |
| print_cookie(struct tcb *const tcp, void *const elem_buf, |
| const size_t elem_size, void *const opaque_data) |
| { |
| tprintf("%" PRIu8, *(uint8_t *) elem_buf); |
| |
| return true; |
| } |
| |
| static bool |
| decode_nlmsgerr_attr_cookie(struct tcb *const tcp, |
| const kernel_ulong_t addr, |
| const unsigned int len, |
| const void *const opaque_data) |
| { |
| uint8_t cookie; |
| const size_t nmemb = len / sizeof(cookie); |
| |
| print_array(tcp, addr, nmemb, &cookie, sizeof(cookie), |
| tfetch_mem, print_cookie, 0); |
| |
| return true; |
| } |
| |
| static const nla_decoder_t nlmsgerr_nla_decoders[] = { |
| [NLMSGERR_ATTR_MSG] = decode_nla_str, |
| [NLMSGERR_ATTR_OFFS] = decode_nla_u32, |
| [NLMSGERR_ATTR_COOKIE] = decode_nlmsgerr_attr_cookie |
| }; |
| |
| static void |
| decode_nlmsghdr_with_payload(struct tcb *const tcp, |
| const int fd, |
| const int family, |
| const struct nlmsghdr *const nlmsghdr, |
| const kernel_ulong_t addr, |
| const kernel_ulong_t len); |
| |
| static void |
| decode_nlmsgerr(struct tcb *const tcp, |
| const int fd, |
| const int family, |
| kernel_ulong_t addr, |
| unsigned int len, |
| const bool capped) |
| { |
| struct nlmsgerr err; |
| |
| if (len < sizeof(err.error)) { |
| printstr_ex(tcp, addr, len, QUOTE_FORCE_HEX); |
| return; |
| } |
| |
| if (umove_or_printaddr(tcp, addr, &err.error)) |
| return; |
| |
| tprints("{error="); |
| if (err.error < 0 && (unsigned) -err.error < nerrnos) { |
| tprintf("-%s", errnoent[-err.error]); |
| } else { |
| tprintf("%d", err.error); |
| } |
| |
| addr += offsetof(struct nlmsgerr, msg); |
| len -= offsetof(struct nlmsgerr, msg); |
| |
| if (len) { |
| tprints(", msg="); |
| if (fetch_nlmsghdr(tcp, &err.msg, addr, len, false)) { |
| unsigned int payload = |
| capped ? sizeof(err.msg) : err.msg.nlmsg_len; |
| if (payload > len) |
| payload = len; |
| |
| decode_nlmsghdr_with_payload(tcp, fd, family, |
| &err.msg, addr, payload); |
| if (len > payload) { |
| tprints(", "); |
| decode_nlattr(tcp, addr + payload, |
| len - payload, nlmsgerr_attrs, |
| "NLMSGERR_ATTR_???", |
| nlmsgerr_nla_decoders, |
| ARRAY_SIZE(nlmsgerr_nla_decoders), |
| NULL); |
| } |
| } |
| } |
| |
| tprints("}"); |
| } |
| |
| static const netlink_decoder_t netlink_decoders[] = { |
| #ifdef HAVE_LINUX_CRYPTOUSER_H |
| [NETLINK_CRYPTO] = decode_netlink_crypto, |
| #endif |
| #ifdef HAVE_LINUX_NETFILTER_NFNETLINK_H |
| [NETLINK_NETFILTER] = decode_netlink_netfilter, |
| #endif |
| [NETLINK_ROUTE] = decode_netlink_route, |
| [NETLINK_SELINUX] = decode_netlink_selinux, |
| [NETLINK_SOCK_DIAG] = decode_netlink_sock_diag |
| }; |
| |
| static void |
| decode_payload(struct tcb *const tcp, |
| const int fd, |
| const int family, |
| const struct nlmsghdr *const nlmsghdr, |
| const kernel_ulong_t addr, |
| const unsigned int len) |
| { |
| if (nlmsghdr->nlmsg_type == NLMSG_ERROR) { |
| decode_nlmsgerr(tcp, fd, family, addr, len, |
| nlmsghdr->nlmsg_flags & NLM_F_CAPPED); |
| return; |
| } |
| |
| /* |
| * While most of NLMSG_DONE messages indeed have payloads |
| * containing just a single integer, there are few exceptions, |
| * so pass payloads of NLMSG_DONE messages to family-specific |
| * netlink payload decoders. |
| * |
| * Other types of reserved control messages need no family-specific |
| * netlink payload decoding. |
| */ |
| if ((nlmsghdr->nlmsg_type >= NLMSG_MIN_TYPE |
| || nlmsghdr->nlmsg_type == NLMSG_DONE) |
| && (unsigned int) family < ARRAY_SIZE(netlink_decoders) |
| && netlink_decoders[family] |
| && netlink_decoders[family](tcp, nlmsghdr, addr, len)) { |
| return; |
| } |
| |
| if (nlmsghdr->nlmsg_type == NLMSG_DONE && len == sizeof(int)) { |
| int num; |
| |
| if (!umove_or_printaddr(tcp, addr, &num)) |
| tprintf("%d", num); |
| return; |
| } |
| |
| printstr_ex(tcp, addr, len, QUOTE_FORCE_HEX); |
| } |
| |
| static void |
| decode_nlmsghdr_with_payload(struct tcb *const tcp, |
| const int fd, |
| const int family, |
| const struct nlmsghdr *const nlmsghdr, |
| const kernel_ulong_t addr, |
| const kernel_ulong_t len) |
| { |
| const unsigned int nlmsg_len = MIN(nlmsghdr->nlmsg_len, len); |
| |
| if (nlmsg_len > NLMSG_HDRLEN) |
| tprints("{"); |
| |
| print_nlmsghdr(tcp, fd, family, nlmsghdr); |
| |
| if (nlmsg_len > NLMSG_HDRLEN) { |
| tprints(", "); |
| decode_payload(tcp, fd, family, nlmsghdr, addr + NLMSG_HDRLEN, |
| nlmsg_len - NLMSG_HDRLEN); |
| tprints("}"); |
| } |
| } |
| |
| void |
| decode_netlink(struct tcb *const tcp, |
| const int fd, |
| kernel_ulong_t addr, |
| kernel_ulong_t len) |
| { |
| const int family = get_fd_nl_family(tcp, fd); |
| |
| if (family == NETLINK_KOBJECT_UEVENT) { |
| decode_netlink_kobject_uevent(tcp, addr, len); |
| return; |
| } |
| |
| struct nlmsghdr nlmsghdr; |
| bool is_array = false; |
| unsigned int elt; |
| |
| for (elt = 0; fetch_nlmsghdr(tcp, &nlmsghdr, addr, len, is_array); |
| elt++) { |
| if (abbrev(tcp) && elt == max_strlen) { |
| tprints("..."); |
| break; |
| } |
| |
| unsigned int nlmsg_len = NLMSG_ALIGN(nlmsghdr.nlmsg_len); |
| kernel_ulong_t next_addr = 0; |
| kernel_ulong_t next_len = 0; |
| |
| if (nlmsghdr.nlmsg_len >= NLMSG_HDRLEN) { |
| next_len = (len >= nlmsg_len) ? len - nlmsg_len : 0; |
| |
| if (next_len && addr + nlmsg_len > addr) |
| next_addr = addr + nlmsg_len; |
| } |
| |
| if (!is_array && next_addr) { |
| tprints("["); |
| is_array = true; |
| } |
| |
| decode_nlmsghdr_with_payload(tcp, fd, family, |
| &nlmsghdr, addr, len); |
| |
| if (!next_addr) |
| break; |
| |
| tprints(", "); |
| addr = next_addr; |
| len = next_len; |
| } |
| |
| if (is_array) { |
| tprints("]"); |
| } |
| } |