| /* |
| * dsock.c - DEC OSF/1, Digital UNIX, Tru64 UNIX socket processing functions |
| * for lsof |
| */ |
| |
| |
| /* |
| * Copyright 1994 Purdue Research Foundation, West Lafayette, Indiana |
| * 47907. All rights reserved. |
| * |
| * Written by Victor A. Abell |
| * |
| * This software is not subject to any license of the American Telephone |
| * and Telegraph Company or the Regents of the University of California. |
| * |
| * Permission is granted to anyone to use this software for any purpose on |
| * any computer system, and to alter it and redistribute it freely, subject |
| * to the following restrictions: |
| * |
| * 1. Neither the authors nor Purdue University are responsible for any |
| * consequences of the use of this software. |
| * |
| * 2. The origin of this software must not be misrepresented, either by |
| * explicit claim or by omission. Credit to the authors and Purdue |
| * University must appear in documentation and sources. |
| * |
| * 3. Altered versions must be plainly marked as such, and must not be |
| * misrepresented as being the original software. |
| * |
| * 4. This notice may not be removed or altered. |
| */ |
| |
| #ifndef lint |
| static char copyright[] = |
| "@(#) Copyright 1994 Purdue Research Foundation.\nAll rights reserved.\n"; |
| static char *rcsid = "$Id: dsock.c,v 1.19 2005/08/08 19:56:44 abe Exp $"; |
| #endif |
| |
| |
| #include "lsof.h" |
| |
| |
| /* |
| * process_socket() - process socket |
| */ |
| |
| void |
| process_socket(sa) |
| KA_T sa; /* socket address in kernel */ |
| { |
| struct domain d; |
| unsigned char *fa = (unsigned char *)NULL; |
| int fam; |
| int fp, lp; |
| struct inpcb inp; |
| KA_T ka; |
| unsigned char *la = (unsigned char *)NULL; |
| struct mbuf mb; |
| struct protosw p; |
| struct socket s; |
| struct tcpcb t; |
| struct unpcb uc, unp; |
| struct sockaddr_un *ua = NULL; |
| struct sockaddr_un un; |
| |
| (void) snpf(Lf->type, sizeof(Lf->type), "sock"); |
| Lf->inp_ty = 2; |
| /* |
| * Read the socket, protocol, and domain structures. |
| */ |
| if (!sa) { |
| enter_nm("no socket address"); |
| return; |
| } |
| if (kread(sa, (char *) &s, sizeof(s))) { |
| (void) snpf(Namech, Namechl, "can't read socket struct from %s", |
| print_kptr(sa, (char *)NULL, 0)); |
| enter_nm(Namech); |
| return; |
| } |
| if (!s.so_type) { |
| enter_nm("no socket type"); |
| return; |
| } |
| if (!s.so_proto |
| || kread((KA_T)s.so_proto, (char *)&p, sizeof(p))) { |
| (void) snpf(Namech, Namechl, "can't read protocol switch from %s", |
| print_kptr((KA_T)s.so_proto, (char *)NULL, 0)); |
| enter_nm(Namech); |
| return; |
| } |
| if (!p.pr_domain |
| || kread((KA_T)p.pr_domain, (char *)&d, sizeof(d))) { |
| (void) snpf(Namech, Namechl, "can't read domain struct from %s", |
| print_kptr((KA_T)p.pr_domain, (char *)NULL, 0)); |
| enter_nm(Namech); |
| return; |
| } |
| /* |
| * Save size information. |
| */ |
| if (Fsize) { |
| if (Lf->access == 'r') |
| Lf->sz = (SZOFFTYPE)s.so_rcv.sb_cc; |
| else if (Lf->access == 'w') |
| Lf->sz = (SZOFFTYPE)s.so_snd.sb_cc; |
| else |
| Lf->sz = (SZOFFTYPE)(s.so_rcv.sb_cc + s.so_snd.sb_cc); |
| Lf->sz_def = 1; |
| } else |
| Lf->off_def = 1; |
| |
| #if defined(HASTCPTPIQ) |
| Lf->lts.rq = s.so_rcv.sb_cc; |
| Lf->lts.sq = s.so_snd.sb_cc; |
| Lf->lts.rqs = Lf->lts.sqs = 1; |
| #endif /* defined(HASTCPTPIQ) */ |
| |
| #if defined(HASSOOPT) |
| Lf->lts.ltm = (unsigned int)s.so_linger; |
| Lf->lts.opt = (unsigned int)s.so_options; |
| Lf->lts.pqlen = (unsigned int)s.so_q0len; |
| Lf->lts.qlen = (unsigned int)s.so_qlen; |
| Lf->lts.qlim = (unsigned int)s.so_qlimit; |
| Lf->lts.rbsz = (unsigned long)s.so_rcv.sb_mbmax; |
| Lf->lts.sbsz = (unsigned long)s.so_snd.sb_mbmax; |
| Lf->lts.pqlens = Lf->lts.qlens = Lf->lts.qlims = Lf->lts.rbszs |
| = Lf->lts.sbszs = (unsigned char)1; |
| #endif /* defined(HASSOOPT) */ |
| |
| #if defined(HASSOSTATE) |
| Lf->lts.ss = (unsigned int)s.so_state; |
| #endif /* defined(HASSOSTATE) */ |
| |
| /* |
| * Process socket by the associated domain family. |
| */ |
| switch ((fam = d.dom_family)) { |
| /* |
| * Process an Internet domain socket. |
| */ |
| case AF_INET: |
| |
| #if defined(HASIPv6) |
| case AF_INET6: |
| (void) snpf(Lf->type, sizeof(Lf->type), |
| (fam == AF_INET) ? "IPv4" : "IPv6"); |
| #else /* !defined(HASIPv6) */ |
| (void) snpf(Lf->type, sizeof(Lf->type), "inet"); |
| #endif /* defined(HASIPv6) */ |
| |
| if (Fnet) { |
| if (!FnetTy |
| || ((FnetTy == 4) && (fam == AF_INET)) |
| |
| #if defined(HASIPv6) |
| || ((FnetTy == 6) && (fam == AF_INET6)) |
| #endif /* defined(HASIPv6) */ |
| ) |
| |
| Lf->sf |= SELNET; |
| } |
| printiproto(p.pr_protocol); |
| /* |
| * Read protocol control block. |
| */ |
| if (!s.so_pcb |
| || kread((KA_T)s.so_pcb, (char *)&inp, sizeof(inp))) { |
| (void) snpf(Namech, Namechl, "can't read inpcb at %s", |
| print_kptr((KA_T)s.so_pcb, (char *)NULL, 0)); |
| enter_nm(Namech); |
| return; |
| } |
| /* |
| * Print Internet socket information. |
| */ |
| ka = (KA_T)(inp.inp_ppcb ? inp.inp_ppcb : s.so_pcb); |
| enter_dev_ch(print_kptr((ka & 0xffffffff), (char *)NULL, 0)); |
| |
| #if defined(HASIPv6) |
| if ((fam == AF_INET && IN6_IS_ADDR_UNSPECIFIED(&inp.inp_laddr)) |
| || IN6_IS_ADDR_V4MAPPED(&inp.inp_laddr)) { |
| la = (unsigned char *)&IN6_EXTRACT_V4ADDR(&inp.inp_laddr); |
| fam = AF_INET; |
| } else { |
| la = (unsigned char *)&inp.inp_laddr; |
| fam = AF_INET6; |
| } |
| #else /* !defined(HASIPv6) */ |
| la = (unsigned char *)&inp.inp_laddr; |
| #endif /* defined(HASIPv6) */ |
| |
| lp = (int)ntohs(inp.inp_lport); |
| |
| #if defined(HASIPv6) |
| if (fam == AF_INET) { |
| if (inp.inp_fport |
| || IN6_EXTRACT_V4ADDR(&inp.inp_faddr) != INADDR_ANY) |
| { |
| fa = (unsigned char *)&IN6_EXTRACT_V4ADDR(&inp.inp_faddr); |
| fp = (int)ntohs(inp.inp_fport); |
| } |
| } else { |
| if (inp.inp_fport || !IN6_IS_ADDR_UNSPECIFIED(&inp.inp_faddr)) |
| { |
| fa = (unsigned char *)&inp.inp_faddr; |
| fp = (int)ntohs(inp.inp_fport); |
| } |
| } |
| #else /* !defined(HASIPv6) */ |
| if (inp.inp_faddr.s_addr != INADDR_ANY || inp.inp_fport != 0) { |
| fa = (unsigned char *)&inp.inp_faddr; |
| fp = (int)ntohs(inp.inp_fport); |
| } |
| #endif /* defined(HASIPv6) */ |
| |
| if (fa || la) |
| (void) ent_inaddr(la, lp, fa, fp, fam); |
| if (p.pr_protocol == IPPROTO_TCP && inp.inp_ppcb |
| && !kread((KA_T)inp.inp_ppcb, (char *)&t, sizeof(t))) { |
| Lf->lts.type = 0; |
| Lf->lts.state.i = (int)t.t_state; |
| |
| #if defined(HASSOOPT) |
| Lf->lts.kai = (unsigned int)t.t_timer[TCPT_KEEP]; |
| #endif /* defined(HASSOOPT) */ |
| |
| #if defined(HASTCPOPT) |
| Lf->lts.mss = (unsigned long)t.t_maxseg; |
| Lf->lts.msss = (unsigned char)1; |
| Lf->lts.topt = (unsigned int)t.t_flags; |
| #endif /* defined(HASTCPOPT) */ |
| |
| } |
| break; |
| /* |
| * Process a ROUTE domain socket. |
| */ |
| case AF_ROUTE: |
| (void) snpf(Lf->type, sizeof(Lf->type), "rte"); |
| if (s.so_pcb) { |
| ka = (KA_T)(s.so_pcb); |
| enter_dev_ch(print_kptr((ka & 0xffffffff), (char *)NULL, 0)); |
| } else |
| (void) snpf(Namech, Namechl, "no protocol control block"); |
| if (!Fsize) |
| Lf->off_def = 1; |
| break; |
| /* |
| * Process a Unix domain socket. |
| */ |
| case AF_UNIX: |
| if (Funix) |
| Lf->sf |= SELUNX; |
| (void) snpf(Lf->type, sizeof(Lf->type), "unix"); |
| /* |
| * Read Unix protocol control block and the Unix address structure. |
| */ |
| enter_dev_ch(print_kptr((sa & 0xffffffff), (char *)NULL, 0)); |
| if (kread((KA_T) s.so_pcb, (char *) &unp, sizeof(unp))) { |
| (void) snpf(Namech, Namechl, "can't read unpcb at %s", |
| print_kptr((KA_T)s.so_pcb, (char *)NULL, 0)); |
| break; |
| } |
| if ((struct socket *)sa != unp.unp_socket) { |
| (void) snpf(Namech, Namechl, "unp_socket (%s) mismatch", |
| print_kptr((KA_T)unp.unp_socket, (char *)NULL, 0)); |
| break; |
| } |
| if (unp.unp_addr) { |
| if (kread((KA_T) unp.unp_addr, (char *) &mb, sizeof(mb))) { |
| (void) snpf(Namech, Namechl, "can't read unp_addr at %s", |
| print_kptr((KA_T)unp.unp_addr, (char *)NULL, 0)); |
| break; |
| } |
| ua = (struct sockaddr_un *)((char *)&mb |
| + (mb.m_hdr.mh_data - (caddr_t)unp.unp_addr)); |
| ua->sun_family = AF_UNIX; |
| } |
| if (!ua) { |
| ua = &un; |
| (void) zeromem((char *)ua, sizeof(un)); |
| ua->sun_family = AF_UNSPEC; |
| } |
| /* |
| * Print information on Unix socket that has no address bound |
| * to it, although it may be connected to another Unix domain |
| * socket as a pipe. |
| */ |
| if (ua->sun_family != AF_UNIX) { |
| if (ua->sun_family == AF_UNSPEC) { |
| if (unp.unp_conn) { |
| if (kread((KA_T)unp.unp_conn, (char *)&uc, sizeof(uc))) |
| (void) snpf(Namech, Namechl, |
| "can't read unp_conn at %s", |
| print_kptr((KA_T)unp.unp_conn,(char *)NULL,0)); |
| else { |
| ka = (KA_T)uc.unp_socket; |
| (void) snpf(Namech, Namechl, "->%s", |
| print_kptr((ka & 0xffffffff), (char *)NULL, 0)); |
| } |
| } else |
| (void) snpf(Namech, Namechl, "->(none)"); |
| } else |
| (void) snpf(Namech, Namechl, "unknown sun_family (%d)", |
| ua->sun_family); |
| break; |
| } |
| if (ua->sun_path[0]) { |
| if (mb.m_len >= sizeof(struct sockaddr_un)) |
| mb.m_len = sizeof(struct sockaddr_un) - 1; |
| *((char *)ua + mb.m_len) = '\0'; |
| if (Sfile && is_file_named(ua->sun_path, 0)) |
| Lf->sf |= SELNM; |
| if (!Namech[0]) |
| (void) snpf(Namech, Namechl, "%s", ua->sun_path); |
| } else |
| (void) snpf(Namech, Namechl, "no address"); |
| break; |
| default: |
| printunkaf(fam, 1); |
| } |
| if (Namech[0]) |
| enter_nm(Namech); |
| } |