• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3  * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4  * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
5  * Copyright (c) 1996-2000 Wichert Akkerman <wichert@cistron.nl>
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. The name of the author may not be used to endorse or promote products
17  *    derived from this software without specific prior written permission.
18  *
19  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
20  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
21  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
23  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
24  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29  */
30 
31 #include "defs.h"
32 #include <sys/stat.h>
33 #include <sys/socket.h>
34 #include <sys/uio.h>
35 #include <sys/un.h>
36 #include <netinet/in.h>
37 #ifdef HAVE_NETINET_TCP_H
38 # include <netinet/tcp.h>
39 #endif
40 #ifdef HAVE_NETINET_UDP_H
41 # include <netinet/udp.h>
42 #endif
43 #ifdef HAVE_NETINET_SCTP_H
44 # include <netinet/sctp.h>
45 #endif
46 #include <arpa/inet.h>
47 #include <net/if.h>
48 #include <asm/types.h>
49 #if defined(__GLIBC__)
50 # include <netipx/ipx.h>
51 #else
52 # include <linux/ipx.h>
53 #endif
54 
55 #if defined(HAVE_LINUX_IP_VS_H)
56 # include <linux/ip_vs.h>
57 #endif
58 #if defined(HAVE_LINUX_NETLINK_H)
59 # include <linux/netlink.h>
60 #endif
61 #if defined(HAVE_LINUX_NETFILTER_ARP_ARP_TABLES_H)
62 # include <linux/netfilter_arp/arp_tables.h>
63 #endif
64 #if defined(HAVE_LINUX_NETFILTER_BRIDGE_EBTABLES_H)
65 # include <linux/netfilter_bridge/ebtables.h>
66 #endif
67 #if defined(HAVE_LINUX_NETFILTER_IPV4_IP_TABLES_H)
68 # include <linux/netfilter_ipv4/ip_tables.h>
69 #endif
70 #if defined(HAVE_LINUX_NETFILTER_IPV6_IP6_TABLES_H)
71 # include <linux/netfilter_ipv6/ip6_tables.h>
72 #endif
73 #if defined(HAVE_LINUX_IF_PACKET_H)
74 # include <linux/if_packet.h>
75 #endif
76 #if defined(HAVE_LINUX_ICMP_H)
77 # include <linux/icmp.h>
78 #endif
79 #ifdef HAVE_BLUETOOTH_BLUETOOTH_H
80 # include <bluetooth/bluetooth.h>
81 # include <bluetooth/hci.h>
82 # include <bluetooth/l2cap.h>
83 # include <bluetooth/rfcomm.h>
84 # include <bluetooth/sco.h>
85 #endif
86 #ifndef PF_UNSPEC
87 # define PF_UNSPEC AF_UNSPEC
88 #endif
89 
90 #include "xlat/domains.h"
91 #include "xlat/addrfams.h"
92 #include "xlat/socktypes.h"
93 #include "xlat/sock_type_flags.h"
94 #ifndef SOCK_TYPE_MASK
95 # define SOCK_TYPE_MASK 0xf
96 #endif
97 
98 #include "xlat/socketlayers.h"
99 
100 #include "xlat/inet_protocols.h"
101 
102 #ifdef PF_NETLINK
103 # if !defined NETLINK_SOCK_DIAG && defined NETLINK_INET_DIAG
104 #  define NETLINK_SOCK_DIAG NETLINK_INET_DIAG
105 # endif
106 # include "xlat/netlink_protocols.h"
107 #endif
108 
109 #if defined(HAVE_BLUETOOTH_BLUETOOTH_H)
110 # include "xlat/bt_protocols.h"
111 #endif
112 
113 #include "xlat/msg_flags.h"
114 
115 #if defined(AF_PACKET) /* from e.g. linux/if_packet.h */
116 # include "xlat/af_packet_types.h"
117 #endif
118 
119 static void
print_ifindex(unsigned int ifindex)120 print_ifindex(unsigned int ifindex)
121 {
122 #ifdef HAVE_IF_INDEXTONAME
123 	char buf[IFNAMSIZ + 1];
124 
125 	if (if_indextoname(ifindex, buf)) {
126 		tprints("if_nametoindex(");
127 		print_quoted_string(buf, sizeof(buf), QUOTE_0_TERMINATED);
128 		tprints(")");
129 		return;
130 	}
131 #endif
132 	tprintf("%u", ifindex);
133 }
134 
135 typedef union {
136 	char pad[128];
137 	struct sockaddr sa;
138 	struct sockaddr_in sin;
139 	struct sockaddr_un sau;
140 #ifdef HAVE_INET_NTOP
141 	struct sockaddr_in6 sa6;
142 #endif
143 #if defined(AF_IPX)
144 	struct sockaddr_ipx sipx;
145 #endif
146 #ifdef AF_PACKET
147 	struct sockaddr_ll ll;
148 #endif
149 #ifdef AF_NETLINK
150 	struct sockaddr_nl nl;
151 #endif
152 #ifdef HAVE_BLUETOOTH_BLUETOOTH_H
153 	struct sockaddr_hci hci;
154 	struct sockaddr_l2 l2;
155 	struct sockaddr_rc rc;
156 	struct sockaddr_sco sco;
157 #endif
158 } sockaddr_buf_t;
159 
160 static void
print_sockaddr(struct tcb * tcp,const sockaddr_buf_t * addr,const int addrlen)161 print_sockaddr(struct tcb *tcp, const sockaddr_buf_t *addr, const int addrlen)
162 {
163 	tprints("{sa_family=");
164 	printxval(addrfams, addr->sa.sa_family, "AF_???");
165 	tprints(", ");
166 
167 	switch (addr->sa.sa_family) {
168 	case AF_UNIX:
169 		if (addrlen == 2) {
170 			tprints("NULL");
171 		} else if (addr->sau.sun_path[0]) {
172 			tprints("sun_path=");
173 			print_quoted_string(addr->sau.sun_path,
174 					    sizeof(addr->sau.sun_path) + 1,
175 					    QUOTE_0_TERMINATED);
176 		} else {
177 			tprints("sun_path=@");
178 			print_quoted_string(addr->sau.sun_path + 1,
179 					    sizeof(addr->sau.sun_path),
180 					    QUOTE_0_TERMINATED);
181 		}
182 		break;
183 	case AF_INET:
184 		tprintf("sin_port=htons(%u), sin_addr=inet_addr(\"%s\")",
185 			ntohs(addr->sin.sin_port), inet_ntoa(addr->sin.sin_addr));
186 		break;
187 #ifdef HAVE_INET_NTOP
188 	case AF_INET6:
189 		{
190 			char string_addr[100];
191 			inet_ntop(AF_INET6, &addr->sa6.sin6_addr,
192 				  string_addr, sizeof(string_addr));
193 			tprintf("sin6_port=htons(%u), inet_pton(AF_INET6"
194 				", \"%s\", &sin6_addr), sin6_flowinfo=%u",
195 				ntohs(addr->sa6.sin6_port), string_addr,
196 				addr->sa6.sin6_flowinfo);
197 # ifdef HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID
198 			tprints(", sin6_scope_id=");
199 #  if defined IN6_IS_ADDR_LINKLOCAL && defined IN6_IS_ADDR_MC_LINKLOCAL
200 			if (IN6_IS_ADDR_LINKLOCAL(&addr->sa6.sin6_addr)
201 			    || IN6_IS_ADDR_MC_LINKLOCAL(&addr->sa6.sin6_addr))
202 				print_ifindex(addr->sa6.sin6_scope_id);
203 			else
204 #  endif
205 				tprintf("%u", addr->sa6.sin6_scope_id);
206 # endif /* HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID */
207 		}
208 		break;
209 #endif
210 #if defined(AF_IPX)
211 	case AF_IPX:
212 		{
213 			int i;
214 			tprintf("sipx_port=htons(%u), ",
215 					ntohs(addr->sipx.sipx_port));
216 			/* Yes, I know, this does not look too
217 			 * strace-ish, but otherwise the IPX
218 			 * addresses just look monstrous...
219 			 * Anyways, feel free if you don't like
220 			 * this way.. :)
221 			 */
222 			tprintf("%08lx:", (unsigned long)ntohl(addr->sipx.sipx_network));
223 			for (i = 0; i < IPX_NODE_LEN; i++)
224 				tprintf("%02x", addr->sipx.sipx_node[i]);
225 			tprintf("/[%02x]", addr->sipx.sipx_type);
226 		}
227 		break;
228 #endif /* AF_IPX */
229 #ifdef AF_PACKET
230 	case AF_PACKET:
231 		{
232 			int i;
233 			tprintf("proto=%#04x, if%d, pkttype=",
234 					ntohs(addr->ll.sll_protocol),
235 					addr->ll.sll_ifindex);
236 			printxval(af_packet_types, addr->ll.sll_pkttype, "PACKET_???");
237 			tprintf(", addr(%d)={%d, ",
238 					addr->ll.sll_halen,
239 					addr->ll.sll_hatype);
240 			for (i = 0; i < addr->ll.sll_halen; i++)
241 				tprintf("%02x", addr->ll.sll_addr[i]);
242 		}
243 		break;
244 
245 #endif /* AF_PACKET */
246 #ifdef AF_NETLINK
247 	case AF_NETLINK:
248 		tprintf("pid=%d, groups=%08x", addr->nl.nl_pid, addr->nl.nl_groups);
249 		break;
250 #endif /* AF_NETLINK */
251 #if defined(AF_BLUETOOTH) && defined(HAVE_BLUETOOTH_BLUETOOTH_H)
252 	case AF_BLUETOOTH:
253 		tprintf("{sco_bdaddr=%02X:%02X:%02X:%02X:%02X:%02X} or "
254 			"{rc_bdaddr=%02X:%02X:%02X:%02X:%02X:%02X, rc_channel=%d} or "
255 			"{l2_psm=htobs(%d), l2_bdaddr=%02X:%02X:%02X:%02X:%02X:%02X, l2_cid=htobs(%d)} or "
256 			"{hci_dev=htobs(%d)}",
257 			addr->sco.sco_bdaddr.b[0], addr->sco.sco_bdaddr.b[1],
258 			addr->sco.sco_bdaddr.b[2], addr->sco.sco_bdaddr.b[3],
259 			addr->sco.sco_bdaddr.b[4], addr->sco.sco_bdaddr.b[5],
260 			addr->rc.rc_bdaddr.b[0], addr->rc.rc_bdaddr.b[1],
261 			addr->rc.rc_bdaddr.b[2], addr->rc.rc_bdaddr.b[3],
262 			addr->rc.rc_bdaddr.b[4], addr->rc.rc_bdaddr.b[5],
263 			addr->rc.rc_channel,
264 			btohs(addr->l2.l2_psm), addr->l2.l2_bdaddr.b[0],
265 			addr->l2.l2_bdaddr.b[1], addr->l2.l2_bdaddr.b[2],
266 			addr->l2.l2_bdaddr.b[3], addr->l2.l2_bdaddr.b[4],
267 			addr->l2.l2_bdaddr.b[5], btohs(addr->l2.l2_cid),
268 			btohs(addr->hci.hci_dev));
269 		break;
270 #endif /* AF_BLUETOOTH && HAVE_BLUETOOTH_BLUETOOTH_H */
271 	/* AF_AX25 AF_APPLETALK AF_NETROM AF_BRIDGE AF_AAL5
272 	AF_X25 AF_ROSE etc. still need to be done */
273 
274 	default:
275 		tprints("sa_data=");
276 		print_quoted_string(addr->sa.sa_data,
277 				    sizeof(addr->sa.sa_data), 0);
278 		break;
279 	}
280 	tprints("}");
281 }
282 
283 void
printsock(struct tcb * tcp,long addr,int addrlen)284 printsock(struct tcb *tcp, long addr, int addrlen)
285 {
286 	sockaddr_buf_t addrbuf;
287 
288 	if (addrlen < 2) {
289 		printaddr(addr);
290 		return;
291 	}
292 
293 	if (addrlen > (int) sizeof(addrbuf))
294 		addrlen = sizeof(addrbuf);
295 
296 	memset(&addrbuf, 0, sizeof(addrbuf));
297 	if (umoven_or_printaddr(tcp, addr, addrlen, addrbuf.pad))
298 		return;
299 	addrbuf.pad[sizeof(addrbuf.pad) - 1] = '\0';
300 
301 	print_sockaddr(tcp, &addrbuf, addrlen);
302 }
303 
304 #include "xlat/scmvals.h"
305 #include "xlat/ip_cmsg_types.h"
306 
307 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
308 struct cmsghdr32 {
309 	uint32_t cmsg_len;
310 	int cmsg_level;
311 	int cmsg_type;
312 };
313 #endif
314 
315 typedef union {
316 	char *ptr;
317 	struct cmsghdr *cmsg;
318 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
319 	struct cmsghdr32 *cmsg32;
320 #endif
321 } union_cmsghdr;
322 
323 static void
print_scm_rights(struct tcb * tcp,const void * cmsg_data,const size_t data_len)324 print_scm_rights(struct tcb *tcp, const void *cmsg_data,
325 		 const size_t data_len)
326 {
327 	const int *fds = cmsg_data;
328 	const char *end = (const char *) cmsg_data + data_len;
329 	bool seen = false;
330 
331 	if (sizeof(*fds) > data_len)
332 		return;
333 
334 	tprints(", [");
335 	while ((const char *) fds < end) {
336 		if (seen)
337 			tprints(", ");
338 		else
339 			seen = true;
340 		printfd(tcp, *fds++);
341 	}
342 	tprints("]");
343 }
344 
345 static void
print_scm_creds(struct tcb * tcp,const void * cmsg_data,const size_t data_len)346 print_scm_creds(struct tcb *tcp, const void *cmsg_data,
347 		const size_t data_len)
348 {
349 	const struct ucred *uc = cmsg_data;
350 
351 	if (sizeof(*uc) > data_len)
352 		return;
353 
354 	tprintf(", {pid=%u, uid=%u, gid=%u}",
355 		(unsigned) uc->pid, (unsigned) uc->uid, (unsigned) uc->gid);
356 }
357 
358 static void
print_scm_security(struct tcb * tcp,const void * cmsg_data,const size_t data_len)359 print_scm_security(struct tcb *tcp, const void *cmsg_data,
360 		   const size_t data_len)
361 {
362 	if (!data_len)
363 		return;
364 
365 	tprints(", ");
366 	print_quoted_string(cmsg_data, data_len, 0);
367 }
368 
369 static void
print_cmsg_ip_pktinfo(struct tcb * tcp,const void * cmsg_data,const size_t data_len)370 print_cmsg_ip_pktinfo(struct tcb *tcp, const void *cmsg_data,
371 		      const size_t data_len)
372 {
373 	const struct in_pktinfo *info = cmsg_data;
374 
375 	if (sizeof(*info) > data_len)
376 		return;
377 
378 	tprints(", {ipi_ifindex=");
379 	print_ifindex(info->ipi_ifindex);
380 	tprintf(", ipi_spec_dst=inet_addr(\"%s\"), ipi_addr=inet_addr(\"%s\")}",
381 		inet_ntoa(info->ipi_spec_dst), inet_ntoa(info->ipi_addr));
382 }
383 
384 static void
print_cmsg_ip_ttl(struct tcb * tcp,const void * cmsg_data,const size_t data_len)385 print_cmsg_ip_ttl(struct tcb *tcp, const void *cmsg_data,
386 		  const size_t data_len)
387 {
388 	const unsigned int *ttl = cmsg_data;
389 
390 	if (sizeof(*ttl) > data_len)
391 		return;
392 
393 	tprintf(", {ttl=%u}", *ttl);
394 }
395 
396 static void
print_cmsg_ip_tos(struct tcb * tcp,const void * cmsg_data,const size_t data_len)397 print_cmsg_ip_tos(struct tcb *tcp, const void *cmsg_data,
398 		  const size_t data_len)
399 {
400 	const uint8_t *tos = cmsg_data;
401 
402 	if (sizeof(*tos) > data_len)
403 		return;
404 
405 	tprintf(", {tos=%x}", *tos);
406 }
407 
408 static void
print_cmsg_ip_checksum(struct tcb * tcp,const void * cmsg_data,const size_t data_len)409 print_cmsg_ip_checksum(struct tcb *tcp, const void *cmsg_data,
410 		       const size_t data_len)
411 {
412 	const uint32_t *csum = cmsg_data;
413 
414 	if (sizeof(*csum) > data_len)
415 		return;
416 
417 	tprintf(", {csum=%u}", *csum);
418 }
419 
420 static void
print_cmsg_ip_opts(struct tcb * tcp,const void * cmsg_data,const size_t data_len)421 print_cmsg_ip_opts(struct tcb *tcp, const void *cmsg_data,
422 		   const size_t data_len)
423 {
424 	const unsigned char *opts = cmsg_data;
425 	size_t i;
426 
427 	if (!data_len)
428 		return;
429 
430 	tprints(", {opts=0x");
431 	for (i = 0; i < data_len; ++i)
432 		tprintf("%02x", opts[i]);
433 	tprints("}");
434 }
435 
436 static void
print_cmsg_ip_recverr(struct tcb * tcp,const void * cmsg_data,const size_t data_len)437 print_cmsg_ip_recverr(struct tcb *tcp, const void *cmsg_data,
438 		      const size_t data_len)
439 {
440 	const struct {
441 		uint32_t ee_errno;
442 		uint8_t  ee_origin;
443 		uint8_t  ee_type;
444 		uint8_t  ee_code;
445 		uint8_t  ee_pad;
446 		uint32_t ee_info;
447 		uint32_t ee_data;
448 		struct sockaddr_in offender;
449 	} *err = cmsg_data;
450 
451 	if (sizeof(*err) > data_len)
452 		return;
453 
454 	tprintf(", {ee_errno=%u, ee_origin=%u, ee_type=%u, ee_code=%u"
455 		", ee_info=%u, ee_data=%u, offender=",
456 		err->ee_errno, err->ee_origin, err->ee_type,
457 		err->ee_code, err->ee_info, err->ee_data);
458 	print_sockaddr(tcp, (const void *) &err->offender,
459 		sizeof(err->offender));
460 	tprints("}");
461 }
462 
463 static void
print_cmsg_ip_origdstaddr(struct tcb * tcp,const void * cmsg_data,const size_t data_len)464 print_cmsg_ip_origdstaddr(struct tcb *tcp, const void *cmsg_data,
465 			  const size_t data_len)
466 {
467 	if (sizeof(struct sockaddr_in) > data_len)
468 		return;
469 
470 	tprints(", ");
471 	print_sockaddr(tcp, cmsg_data, data_len);
472 }
473 
474 static void
print_cmsg_type_data(struct tcb * tcp,const int cmsg_level,const int cmsg_type,const void * cmsg_data,const size_t data_len)475 print_cmsg_type_data(struct tcb *tcp, const int cmsg_level, const int cmsg_type,
476 		     const void *cmsg_data, const size_t data_len)
477 {
478 	switch (cmsg_level) {
479 	case SOL_SOCKET:
480 		printxval(scmvals, cmsg_type, "SCM_???");
481 		switch (cmsg_type) {
482 		case SCM_RIGHTS:
483 			print_scm_rights(tcp, cmsg_data, data_len);
484 			break;
485 		case SCM_CREDENTIALS:
486 			print_scm_creds(tcp, cmsg_data, data_len);
487 			break;
488 		case SCM_SECURITY:
489 			print_scm_security(tcp, cmsg_data, data_len);
490 			break;
491 		}
492 		break;
493 	case SOL_IP:
494 		printxval(ip_cmsg_types, cmsg_type, "IP_???");
495 		switch (cmsg_type) {
496 		case IP_PKTINFO:
497 			print_cmsg_ip_pktinfo(tcp, cmsg_data, data_len);
498 			break;
499 		case IP_TTL:
500 			print_cmsg_ip_ttl(tcp, cmsg_data, data_len);
501 			break;
502 		case IP_TOS:
503 			print_cmsg_ip_tos(tcp, cmsg_data, data_len);
504 			break;
505 		case IP_RECVOPTS:
506 		case IP_RETOPTS:
507 			print_cmsg_ip_opts(tcp, cmsg_data, data_len);
508 			break;
509 		case IP_RECVERR:
510 			print_cmsg_ip_recverr(tcp, cmsg_data, data_len);
511 			break;
512 		case IP_ORIGDSTADDR:
513 			print_cmsg_ip_origdstaddr(tcp, cmsg_data, data_len);
514 			break;
515 		case IP_CHECKSUM:
516 			print_cmsg_ip_checksum(tcp, cmsg_data, data_len);
517 			break;
518 		case SCM_SECURITY:
519 			print_scm_security(tcp, cmsg_data, data_len);
520 			break;
521 		}
522 		break;
523 	default:
524 		tprintf("%u", cmsg_type);
525 	}
526 }
527 
528 static void
printcmsghdr(struct tcb * tcp,unsigned long addr,size_t len)529 printcmsghdr(struct tcb *tcp, unsigned long addr, size_t len)
530 {
531 	const size_t cmsg_size =
532 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
533 		(current_wordsize < sizeof(long)) ? sizeof(struct cmsghdr32) :
534 #endif
535 			sizeof(struct cmsghdr);
536 
537 	char *buf = len < cmsg_size ? NULL : malloc(len);
538 	if (!buf || umoven(tcp, addr, len, buf) < 0) {
539 		tprints(", msg_control=");
540 		printaddr(addr);
541 		free(buf);
542 		return;
543 	}
544 
545 	union_cmsghdr u = { .ptr = buf };
546 
547 	tprints(", [");
548 	while (len >= cmsg_size) {
549 		size_t cmsg_len =
550 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
551 			(current_wordsize < sizeof(long)) ? u.cmsg32->cmsg_len :
552 #endif
553 				u.cmsg->cmsg_len;
554 		int cmsg_level =
555 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
556 			(current_wordsize < sizeof(long)) ? u.cmsg32->cmsg_level :
557 #endif
558 				u.cmsg->cmsg_level;
559 		int cmsg_type =
560 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
561 			(current_wordsize < sizeof(long)) ? u.cmsg32->cmsg_type :
562 #endif
563 				u.cmsg->cmsg_type;
564 
565 		if (u.ptr != buf)
566 			tprints(", ");
567 		tprintf("{cmsg_len=%lu, cmsg_level=", (unsigned long) cmsg_len);
568 		printxval(socketlayers, cmsg_level, "SOL_???");
569 		tprints(", cmsg_type=");
570 
571 		if (cmsg_len > len)
572 			cmsg_len = len;
573 
574 		print_cmsg_type_data(tcp, cmsg_level, cmsg_type,
575 				     (const void *) (u.ptr + cmsg_size),
576 				     cmsg_len > cmsg_size ? cmsg_len - cmsg_size: 0);
577 		tprints("}");
578 
579 		if (cmsg_len < cmsg_size) {
580 			len -= cmsg_size;
581 			break;
582 		}
583 		cmsg_len = (cmsg_len + current_wordsize - 1) &
584 			(size_t) ~(current_wordsize - 1);
585 		if (cmsg_len >= len) {
586 			len = 0;
587 			break;
588 		}
589 		u.ptr += cmsg_len;
590 		len -= cmsg_len;
591 	}
592 	if (len)
593 		tprints(", ...");
594 	tprints("]");
595 	free(buf);
596 }
597 
598 static void
do_msghdr(struct tcb * tcp,struct msghdr * msg,unsigned long data_size)599 do_msghdr(struct tcb *tcp, struct msghdr *msg, unsigned long data_size)
600 {
601 	tprintf("{msg_name(%d)=", msg->msg_namelen);
602 	printsock(tcp, (long)msg->msg_name, msg->msg_namelen);
603 
604 	tprintf(", msg_iov(%lu)=", (unsigned long)msg->msg_iovlen);
605 	tprint_iov_upto(tcp, (unsigned long)msg->msg_iovlen,
606 		   (unsigned long)msg->msg_iov, 1, data_size);
607 
608 #ifdef HAVE_STRUCT_MSGHDR_MSG_CONTROL
609 	tprintf(", msg_controllen=%lu", (unsigned long)msg->msg_controllen);
610 	if (msg->msg_controllen)
611 		printcmsghdr(tcp, (unsigned long) msg->msg_control,
612 			     msg->msg_controllen);
613 	tprints(", msg_flags=");
614 	printflags(msg_flags, msg->msg_flags, "MSG_???");
615 #else /* !HAVE_STRUCT_MSGHDR_MSG_CONTROL */
616 	tprintf("msg_accrights=%#lx, msg_accrightslen=%u",
617 		(unsigned long) msg->msg_accrights, msg->msg_accrightslen);
618 #endif /* !HAVE_STRUCT_MSGHDR_MSG_CONTROL */
619 	tprints("}");
620 }
621 
622 struct msghdr32 {
623 	uint32_t /* void* */    msg_name;
624 	uint32_t /* socklen_t */msg_namelen;
625 	uint32_t /* iovec* */   msg_iov;
626 	uint32_t /* size_t */   msg_iovlen;
627 	uint32_t /* void* */    msg_control;
628 	uint32_t /* size_t */   msg_controllen;
629 	uint32_t /* int */      msg_flags;
630 };
631 struct mmsghdr32 {
632 	struct msghdr32         msg_hdr;
633 	uint32_t /* unsigned */ msg_len;
634 };
635 
636 #ifndef HAVE_STRUCT_MMSGHDR
637 struct mmsghdr {
638 	struct msghdr msg_hdr;
639 	unsigned msg_len;
640 };
641 #endif
642 
643 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
644 static void
copy_from_msghdr32(struct msghdr * to_msg,struct msghdr32 * from_msg32)645 copy_from_msghdr32(struct msghdr *to_msg, struct msghdr32 *from_msg32)
646 {
647 	to_msg->msg_name       = (void*)(long)from_msg32->msg_name;
648 	to_msg->msg_namelen    =              from_msg32->msg_namelen;
649 	to_msg->msg_iov        = (void*)(long)from_msg32->msg_iov;
650 	to_msg->msg_iovlen     =              from_msg32->msg_iovlen;
651 	to_msg->msg_control    = (void*)(long)from_msg32->msg_control;
652 	to_msg->msg_controllen =              from_msg32->msg_controllen;
653 	to_msg->msg_flags      =              from_msg32->msg_flags;
654 }
655 #endif
656 
657 static bool
extractmsghdr(struct tcb * tcp,long addr,struct msghdr * msg)658 extractmsghdr(struct tcb *tcp, long addr, struct msghdr *msg)
659 {
660 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
661 	if (current_wordsize == 4) {
662 		struct msghdr32 msg32;
663 
664 		if (umove(tcp, addr, &msg32) < 0)
665 			return false;
666 		copy_from_msghdr32(msg, &msg32);
667 	} else
668 #endif
669 	if (umove(tcp, addr, msg) < 0)
670 		return false;
671 	return true;
672 }
673 
674 static bool
extractmmsghdr(struct tcb * tcp,long addr,unsigned int idx,struct mmsghdr * mmsg)675 extractmmsghdr(struct tcb *tcp, long addr, unsigned int idx, struct mmsghdr *mmsg)
676 {
677 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
678 	if (current_wordsize == 4) {
679 		struct mmsghdr32 mmsg32;
680 
681 		addr += sizeof(struct mmsghdr32) * idx;
682 		if (umove(tcp, addr, &mmsg32) < 0)
683 			return false;
684 
685 		copy_from_msghdr32(&mmsg->msg_hdr, &mmsg32.msg_hdr);
686 		mmsg->msg_len = mmsg32.msg_len;
687 	} else
688 #endif
689 	{
690 		addr += sizeof(*mmsg) * idx;
691 		if (umove(tcp, addr, mmsg) < 0)
692 			return false;
693 	}
694 	return true;
695 }
696 
697 static void
printmsghdr(struct tcb * tcp,long addr,unsigned long data_size)698 printmsghdr(struct tcb *tcp, long addr, unsigned long data_size)
699 {
700 	struct msghdr msg;
701 
702 	if (verbose(tcp) && extractmsghdr(tcp, addr, &msg))
703 		do_msghdr(tcp, &msg, data_size);
704 	else
705 		printaddr(addr);
706 }
707 
708 void
dumpiov_in_msghdr(struct tcb * tcp,long addr)709 dumpiov_in_msghdr(struct tcb *tcp, long addr)
710 {
711 	struct msghdr msg;
712 
713 	if (extractmsghdr(tcp, addr, &msg))
714 		dumpiov(tcp, msg.msg_iovlen, (long)msg.msg_iov);
715 }
716 
717 static void
printmmsghdr(struct tcb * tcp,long addr,unsigned int idx,unsigned long msg_len)718 printmmsghdr(struct tcb *tcp, long addr, unsigned int idx, unsigned long msg_len)
719 {
720 	struct mmsghdr mmsg;
721 
722 	if (extractmmsghdr(tcp, addr, idx, &mmsg)) {
723 		tprints("{");
724 		do_msghdr(tcp, &mmsg.msg_hdr, msg_len ? msg_len : mmsg.msg_len);
725 		tprintf(", %u}", mmsg.msg_len);
726 	}
727 	else
728 		printaddr(addr);
729 }
730 
731 static void
decode_mmsg(struct tcb * tcp,unsigned long msg_len)732 decode_mmsg(struct tcb *tcp, unsigned long msg_len)
733 {
734 	/* mmsgvec */
735 	if (syserror(tcp)) {
736 		printaddr(tcp->u_arg[1]);
737 	} else {
738 		unsigned int len = tcp->u_rval;
739 		unsigned int i;
740 
741 		tprints("{");
742 		for (i = 0; i < len; ++i) {
743 			if (i)
744 				tprints(", ");
745 			printmmsghdr(tcp, tcp->u_arg[1], i, msg_len);
746 		}
747 		tprints("}");
748 	}
749 	/* vlen */
750 	tprintf(", %u, ", (unsigned int) tcp->u_arg[2]);
751 	/* flags */
752 	printflags(msg_flags, tcp->u_arg[3], "MSG_???");
753 }
754 
755 void
dumpiov_in_mmsghdr(struct tcb * tcp,long addr)756 dumpiov_in_mmsghdr(struct tcb *tcp, long addr)
757 {
758 	unsigned int len = tcp->u_rval;
759 	unsigned int i;
760 	struct mmsghdr mmsg;
761 
762 	for (i = 0; i < len; ++i) {
763 		if (extractmmsghdr(tcp, addr, i, &mmsg)) {
764 			tprintf(" = %lu buffers in vector %u\n",
765 				(unsigned long)mmsg.msg_hdr.msg_iovlen, i);
766 			dumpiov(tcp, mmsg.msg_hdr.msg_iovlen,
767 				(long)mmsg.msg_hdr.msg_iov);
768 		}
769 	}
770 }
771 
772 /*
773  * low bits of the socket type define real socket type,
774  * other bits are socket type flags.
775  */
776 static void
tprint_sock_type(int flags)777 tprint_sock_type(int flags)
778 {
779 	const char *str = xlookup(socktypes, flags & SOCK_TYPE_MASK);
780 
781 	if (str) {
782 		tprints(str);
783 		flags &= ~SOCK_TYPE_MASK;
784 		if (!flags)
785 			return;
786 		tprints("|");
787 	}
788 	printflags(sock_type_flags, flags, "SOCK_???");
789 }
790 
SYS_FUNC(socket)791 SYS_FUNC(socket)
792 {
793 	printxval(domains, tcp->u_arg[0], "PF_???");
794 	tprints(", ");
795 	tprint_sock_type(tcp->u_arg[1]);
796 	tprints(", ");
797 	switch (tcp->u_arg[0]) {
798 	case PF_INET:
799 #ifdef PF_INET6
800 	case PF_INET6:
801 #endif
802 		printxval(inet_protocols, tcp->u_arg[2], "IPPROTO_???");
803 		break;
804 #ifdef PF_IPX
805 	case PF_IPX:
806 		/* BTW: I don't believe this.. */
807 		tprints("[");
808 		printxval(domains, tcp->u_arg[2], "PF_???");
809 		tprints("]");
810 		break;
811 #endif /* PF_IPX */
812 #ifdef PF_NETLINK
813 	case PF_NETLINK:
814 		printxval(netlink_protocols, tcp->u_arg[2], "NETLINK_???");
815 		break;
816 #endif
817 #if defined(PF_BLUETOOTH) && defined(HAVE_BLUETOOTH_BLUETOOTH_H)
818 	case PF_BLUETOOTH:
819 		printxval(bt_protocols, tcp->u_arg[2], "BTPROTO_???");
820 		break;
821 #endif
822 	default:
823 		tprintf("%lu", tcp->u_arg[2]);
824 		break;
825 	}
826 
827 	return RVAL_DECODED | RVAL_FD;
828 }
829 
SYS_FUNC(bind)830 SYS_FUNC(bind)
831 {
832 	printfd(tcp, tcp->u_arg[0]);
833 	tprints(", ");
834 	printsock(tcp, tcp->u_arg[1], tcp->u_arg[2]);
835 	tprintf(", %lu", tcp->u_arg[2]);
836 
837 	return RVAL_DECODED;
838 }
839 
SYS_FUNC(listen)840 SYS_FUNC(listen)
841 {
842 	printfd(tcp, tcp->u_arg[0]);
843 	tprints(", ");
844 	tprintf("%lu", tcp->u_arg[1]);
845 
846 	return RVAL_DECODED;
847 }
848 
849 static int
do_sockname(struct tcb * tcp,int flags_arg)850 do_sockname(struct tcb *tcp, int flags_arg)
851 {
852 	if (entering(tcp)) {
853 		printfd(tcp, tcp->u_arg[0]);
854 		tprints(", ");
855 		return 0;
856 	}
857 
858 	int len;
859 	if (!tcp->u_arg[2] || !verbose(tcp) || syserror(tcp) ||
860 	    umove(tcp, tcp->u_arg[2], &len) < 0) {
861 		printaddr(tcp->u_arg[1]);
862 		tprints(", ");
863 		printaddr(tcp->u_arg[2]);
864 	} else {
865 		printsock(tcp, tcp->u_arg[1], len);
866 		tprintf(", [%d]", len);
867 	}
868 
869 	if (flags_arg >= 0) {
870 		tprints(", ");
871 		printflags(sock_type_flags, tcp->u_arg[flags_arg],
872 			   "SOCK_???");
873 	}
874 	return 0;
875 }
876 
SYS_FUNC(accept)877 SYS_FUNC(accept)
878 {
879 	do_sockname(tcp, -1);
880 	return RVAL_FD;
881 }
882 
SYS_FUNC(accept4)883 SYS_FUNC(accept4)
884 {
885 	do_sockname(tcp, 3);
886 	return RVAL_FD;
887 }
888 
SYS_FUNC(send)889 SYS_FUNC(send)
890 {
891 	printfd(tcp, tcp->u_arg[0]);
892 	tprints(", ");
893 	printstr(tcp, tcp->u_arg[1], tcp->u_arg[2]);
894 	tprintf(", %lu, ", tcp->u_arg[2]);
895 	/* flags */
896 	printflags(msg_flags, tcp->u_arg[3], "MSG_???");
897 
898 	return RVAL_DECODED;
899 }
900 
SYS_FUNC(sendto)901 SYS_FUNC(sendto)
902 {
903 	printfd(tcp, tcp->u_arg[0]);
904 	tprints(", ");
905 	printstr(tcp, tcp->u_arg[1], tcp->u_arg[2]);
906 	tprintf(", %lu, ", tcp->u_arg[2]);
907 	/* flags */
908 	printflags(msg_flags, tcp->u_arg[3], "MSG_???");
909 	/* to address */
910 	tprints(", ");
911 	printsock(tcp, tcp->u_arg[4], tcp->u_arg[5]);
912 	/* to length */
913 	tprintf(", %lu", tcp->u_arg[5]);
914 
915 	return RVAL_DECODED;
916 }
917 
SYS_FUNC(sendmsg)918 SYS_FUNC(sendmsg)
919 {
920 	printfd(tcp, tcp->u_arg[0]);
921 	tprints(", ");
922 	printmsghdr(tcp, tcp->u_arg[1], (unsigned long) -1L);
923 	/* flags */
924 	tprints(", ");
925 	printflags(msg_flags, tcp->u_arg[2], "MSG_???");
926 
927 	return RVAL_DECODED;
928 }
929 
SYS_FUNC(sendmmsg)930 SYS_FUNC(sendmmsg)
931 {
932 	if (entering(tcp)) {
933 		/* sockfd */
934 		printfd(tcp, tcp->u_arg[0]);
935 		tprints(", ");
936 		if (!verbose(tcp)) {
937 			tprintf("%#lx, %u, ",
938 				tcp->u_arg[1], (unsigned int) tcp->u_arg[2]);
939 			printflags(msg_flags, tcp->u_arg[3], "MSG_???");
940 		}
941 	} else {
942 		if (verbose(tcp))
943 			decode_mmsg(tcp, (unsigned long) -1L);
944 	}
945 	return 0;
946 }
947 
SYS_FUNC(recv)948 SYS_FUNC(recv)
949 {
950 	if (entering(tcp)) {
951 		printfd(tcp, tcp->u_arg[0]);
952 		tprints(", ");
953 	} else {
954 		if (syserror(tcp))
955 			printaddr(tcp->u_arg[1]);
956 		else
957 			printstr(tcp, tcp->u_arg[1], tcp->u_rval);
958 
959 		tprintf(", %lu, ", tcp->u_arg[2]);
960 		printflags(msg_flags, tcp->u_arg[3], "MSG_???");
961 	}
962 	return 0;
963 }
964 
SYS_FUNC(recvfrom)965 SYS_FUNC(recvfrom)
966 {
967 	int fromlen;
968 
969 	if (entering(tcp)) {
970 		printfd(tcp, tcp->u_arg[0]);
971 		tprints(", ");
972 	} else {
973 		/* buf */
974 		if (syserror(tcp)) {
975 			printaddr(tcp->u_arg[1]);
976 		} else {
977 			printstr(tcp, tcp->u_arg[1], tcp->u_rval);
978 		}
979 		/* len */
980 		tprintf(", %lu, ", tcp->u_arg[2]);
981 		/* flags */
982 		printflags(msg_flags, tcp->u_arg[3], "MSG_???");
983 		tprints(", ");
984 		if (syserror(tcp) || !tcp->u_arg[4] || !tcp->u_arg[5] ||
985 		    umove(tcp, tcp->u_arg[5], &fromlen) < 0) {
986 			/* from address, len */
987 			printaddr(tcp->u_arg[4]);
988 			tprints(", ");
989 			printaddr(tcp->u_arg[5]);
990 			return 0;
991 		}
992 		/* from address */
993 		printsock(tcp, tcp->u_arg[4], fromlen);
994 		/* from length */
995 		tprintf(", [%u]", fromlen);
996 	}
997 	return 0;
998 }
999 
SYS_FUNC(recvmsg)1000 SYS_FUNC(recvmsg)
1001 {
1002 	if (entering(tcp)) {
1003 		printfd(tcp, tcp->u_arg[0]);
1004 		tprints(", ");
1005 	} else {
1006 		if (syserror(tcp))
1007 			printaddr(tcp->u_arg[1]);
1008 		else
1009 			printmsghdr(tcp, tcp->u_arg[1], tcp->u_rval);
1010 		/* flags */
1011 		tprints(", ");
1012 		printflags(msg_flags, tcp->u_arg[2], "MSG_???");
1013 	}
1014 	return 0;
1015 }
1016 
SYS_FUNC(recvmmsg)1017 SYS_FUNC(recvmmsg)
1018 {
1019 	static char str[sizeof("left") + TIMESPEC_TEXT_BUFSIZE];
1020 
1021 	if (entering(tcp)) {
1022 		printfd(tcp, tcp->u_arg[0]);
1023 		tprints(", ");
1024 		if (verbose(tcp)) {
1025 			/* Abusing tcp->auxstr as temp storage.
1026 			 * Will be used and cleared on syscall exit.
1027 			 */
1028 			tcp->auxstr = sprint_timespec(tcp, tcp->u_arg[4]);
1029 		} else {
1030 			tprintf("%#lx, %ld, ", tcp->u_arg[1], tcp->u_arg[2]);
1031 			printflags(msg_flags, tcp->u_arg[3], "MSG_???");
1032 			tprints(", ");
1033 			print_timespec(tcp, tcp->u_arg[4]);
1034 		}
1035 		return 0;
1036 	} else {
1037 		if (verbose(tcp)) {
1038 			decode_mmsg(tcp, 0);
1039 			tprints(", ");
1040 			/* timeout on entrance */
1041 			tprints(tcp->auxstr);
1042 			tcp->auxstr = NULL;
1043 		}
1044 		if (syserror(tcp))
1045 			return 0;
1046 		if (tcp->u_rval == 0) {
1047 			tcp->auxstr = "Timeout";
1048 			return RVAL_STR;
1049 		}
1050 		if (!verbose(tcp))
1051 			return 0;
1052 		/* timeout on exit */
1053 		snprintf(str, sizeof(str), "left %s",
1054 			 sprint_timespec(tcp, tcp->u_arg[4]));
1055 		tcp->auxstr = str;
1056 		return RVAL_STR;
1057 	}
1058 }
1059 
1060 #include "xlat/shutdown_modes.h"
1061 
SYS_FUNC(shutdown)1062 SYS_FUNC(shutdown)
1063 {
1064 	printfd(tcp, tcp->u_arg[0]);
1065 	tprints(", ");
1066 	printxval(shutdown_modes, tcp->u_arg[1], "SHUT_???");
1067 
1068 	return RVAL_DECODED;
1069 }
1070 
SYS_FUNC(getsockname)1071 SYS_FUNC(getsockname)
1072 {
1073 	return do_sockname(tcp, -1);
1074 }
1075 
1076 static void
printpair_fd(struct tcb * tcp,const int i0,const int i1)1077 printpair_fd(struct tcb *tcp, const int i0, const int i1)
1078 {
1079 	tprints("[");
1080 	printfd(tcp, i0);
1081 	tprints(", ");
1082 	printfd(tcp, i1);
1083 	tprints("]");
1084 }
1085 
1086 static void
decode_pair_fd(struct tcb * tcp,const long addr)1087 decode_pair_fd(struct tcb *tcp, const long addr)
1088 {
1089 	int pair[2];
1090 
1091 	if (umove_or_printaddr(tcp, addr, &pair))
1092 		return;
1093 
1094 	printpair_fd(tcp, pair[0], pair[1]);
1095 }
1096 
1097 static int
do_pipe(struct tcb * tcp,int flags_arg)1098 do_pipe(struct tcb *tcp, int flags_arg)
1099 {
1100 	if (exiting(tcp)) {
1101 		if (syserror(tcp)) {
1102 			printaddr(tcp->u_arg[0]);
1103 		} else {
1104 #ifdef HAVE_GETRVAL2
1105 			if (flags_arg < 0) {
1106 				printpair_fd(tcp, tcp->u_rval, getrval2(tcp));
1107 			} else
1108 #endif
1109 				decode_pair_fd(tcp, tcp->u_arg[0]);
1110 		}
1111 		if (flags_arg >= 0) {
1112 			tprints(", ");
1113 			printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???");
1114 		}
1115 	}
1116 	return 0;
1117 }
1118 
SYS_FUNC(pipe)1119 SYS_FUNC(pipe)
1120 {
1121 	return do_pipe(tcp, -1);
1122 }
1123 
SYS_FUNC(pipe2)1124 SYS_FUNC(pipe2)
1125 {
1126 	return do_pipe(tcp, 1);
1127 }
1128 
SYS_FUNC(socketpair)1129 SYS_FUNC(socketpair)
1130 {
1131 	if (entering(tcp)) {
1132 		printxval(domains, tcp->u_arg[0], "PF_???");
1133 		tprints(", ");
1134 		tprint_sock_type(tcp->u_arg[1]);
1135 		tprintf(", %lu", tcp->u_arg[2]);
1136 	} else {
1137 		tprints(", ");
1138 		decode_pair_fd(tcp, tcp->u_arg[3]);
1139 	}
1140 	return 0;
1141 }
1142 
1143 #include "xlat/sockoptions.h"
1144 #include "xlat/sockipoptions.h"
1145 #include "xlat/getsockipoptions.h"
1146 #include "xlat/setsockipoptions.h"
1147 #include "xlat/sockipv6options.h"
1148 #include "xlat/getsockipv6options.h"
1149 #include "xlat/setsockipv6options.h"
1150 #include "xlat/sockipxoptions.h"
1151 #include "xlat/sockrawoptions.h"
1152 #include "xlat/sockpacketoptions.h"
1153 #include "xlat/socksctpoptions.h"
1154 #include "xlat/socktcpoptions.h"
1155 
1156 static void
print_sockopt_fd_level_name(struct tcb * tcp,int fd,int level,int name,bool is_getsockopt)1157 print_sockopt_fd_level_name(struct tcb *tcp, int fd, int level, int name, bool is_getsockopt)
1158 {
1159 	printfd(tcp, fd);
1160 	tprints(", ");
1161 	printxval(socketlayers, level, "SOL_??");
1162 	tprints(", ");
1163 
1164 	switch (level) {
1165 	case SOL_SOCKET:
1166 		printxval(sockoptions, name, "SO_???");
1167 		break;
1168 	case SOL_IP:
1169 		printxvals(name, "IP_???", sockipoptions,
1170 			is_getsockopt ? getsockipoptions : setsockipoptions, NULL);
1171 		break;
1172 	case SOL_IPV6:
1173 		printxvals(name, "IPV6_???", sockipv6options,
1174 			is_getsockopt ? getsockipv6options : setsockipv6options, NULL);
1175 		break;
1176 	case SOL_IPX:
1177 		printxval(sockipxoptions, name, "IPX_???");
1178 		break;
1179 	case SOL_PACKET:
1180 		printxval(sockpacketoptions, name, "PACKET_???");
1181 		break;
1182 	case SOL_TCP:
1183 		printxval(socktcpoptions, name, "TCP_???");
1184 		break;
1185 	case SOL_SCTP:
1186 		printxval(socksctpoptions, name, "SCTP_???");
1187 		break;
1188 	case SOL_RAW:
1189 		printxval(sockrawoptions, name, "RAW_???");
1190 		break;
1191 
1192 		/* Other SOL_* protocol levels still need work. */
1193 
1194 	default:
1195 		tprintf("%u", name);
1196 	}
1197 
1198 	tprints(", ");
1199 }
1200 
1201 #ifdef SO_LINGER
1202 static void
print_linger(struct tcb * tcp,long addr,int len)1203 print_linger(struct tcb *tcp, long addr, int len)
1204 {
1205 	struct linger linger;
1206 
1207 	if (len != sizeof(linger) ||
1208 	    umove(tcp, addr, &linger) < 0) {
1209 		printaddr(addr);
1210 		return;
1211 	}
1212 
1213 	tprintf("{onoff=%d, linger=%d}",
1214 		linger.l_onoff,
1215 		linger.l_linger);
1216 }
1217 #endif /* SO_LINGER */
1218 
1219 #ifdef SO_PEERCRED
1220 static void
print_ucred(struct tcb * tcp,long addr,int len)1221 print_ucred(struct tcb *tcp, long addr, int len)
1222 {
1223 	struct ucred uc;
1224 
1225 	if (len != sizeof(uc) ||
1226 	    umove(tcp, addr, &uc) < 0) {
1227 		printaddr(addr);
1228 	} else {
1229 		tprintf("{pid=%u, uid=%u, gid=%u}",
1230 			(unsigned) uc.pid,
1231 			(unsigned) uc.uid,
1232 			(unsigned) uc.gid);
1233 	}
1234 }
1235 #endif /* SO_PEERCRED */
1236 
1237 #ifdef PACKET_STATISTICS
1238 static void
print_tpacket_stats(struct tcb * tcp,long addr,int len)1239 print_tpacket_stats(struct tcb *tcp, long addr, int len)
1240 {
1241 	struct tpacket_stats stats;
1242 
1243 	if (len != sizeof(stats) ||
1244 	    umove(tcp, addr, &stats) < 0) {
1245 		printaddr(addr);
1246 	} else {
1247 		tprintf("{packets=%u, drops=%u}",
1248 			stats.tp_packets,
1249 			stats.tp_drops);
1250 	}
1251 }
1252 #endif /* PACKET_STATISTICS */
1253 
1254 #ifdef ICMP_FILTER
1255 # include "xlat/icmpfilterflags.h"
1256 
1257 static void
print_icmp_filter(struct tcb * tcp,long addr,int len)1258 print_icmp_filter(struct tcb *tcp, long addr, int len)
1259 {
1260 	struct icmp_filter	filter;
1261 
1262 	if (len != sizeof(filter) ||
1263 	    umove(tcp, addr, &filter) < 0) {
1264 		printaddr(addr);
1265 		return;
1266 	}
1267 
1268 	tprints("~(");
1269 	printflags(icmpfilterflags, ~filter.data, "ICMP_???");
1270 	tprints(")");
1271 }
1272 #endif /* ICMP_FILTER */
1273 
1274 static void
print_getsockopt(struct tcb * tcp,int level,int name,long addr,int len)1275 print_getsockopt(struct tcb *tcp, int level, int name, long addr, int len)
1276 {
1277 	if (addr && verbose(tcp))
1278 	switch (level) {
1279 	case SOL_SOCKET:
1280 		switch (name) {
1281 #ifdef SO_LINGER
1282 		case SO_LINGER:
1283 			print_linger(tcp, addr, len);
1284 			goto done;
1285 #endif
1286 #ifdef SO_PEERCRED
1287 		case SO_PEERCRED:
1288 			print_ucred(tcp, addr, len);
1289 			goto done;
1290 #endif
1291 		}
1292 		break;
1293 
1294 	case SOL_PACKET:
1295 		switch (name) {
1296 #ifdef PACKET_STATISTICS
1297 		case PACKET_STATISTICS:
1298 			print_tpacket_stats(tcp, addr, len);
1299 			goto done;
1300 #endif
1301 		}
1302 		break;
1303 
1304 	case SOL_RAW:
1305 		switch (name) {
1306 #ifdef ICMP_FILTER
1307 		case ICMP_FILTER:
1308 			print_icmp_filter(tcp, addr, len);
1309 			goto done;
1310 #endif
1311 		}
1312 		break;
1313 	}
1314 
1315 	/* default arg printing */
1316 
1317 	if (verbose(tcp)) {
1318 		if (len == sizeof(int)) {
1319 			printnum_int(tcp, addr, "%d");
1320 		} else {
1321 			printstr(tcp, addr, len);
1322 		}
1323 	} else {
1324 		printaddr(addr);
1325 	}
1326 done:
1327 	tprintf(", [%d]", len);
1328 }
1329 
SYS_FUNC(getsockopt)1330 SYS_FUNC(getsockopt)
1331 {
1332 	if (entering(tcp)) {
1333 		print_sockopt_fd_level_name(tcp, tcp->u_arg[0],
1334 					    tcp->u_arg[1], tcp->u_arg[2], true);
1335 	} else {
1336 		int len;
1337 
1338 		if (syserror(tcp) || umove(tcp, tcp->u_arg[4], &len) < 0) {
1339 			tprintf("%#lx, %#lx",
1340 				tcp->u_arg[3], tcp->u_arg[4]);
1341 		} else {
1342 			print_getsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2],
1343 					 tcp->u_arg[3], len);
1344 		}
1345 	}
1346 	return 0;
1347 }
1348 
1349 #ifdef IP_ADD_MEMBERSHIP
1350 static void
print_mreq(struct tcb * tcp,long addr,unsigned int len)1351 print_mreq(struct tcb *tcp, long addr, unsigned int len)
1352 {
1353 	struct ip_mreq mreq;
1354 
1355 	if (len < sizeof(mreq)) {
1356 		printstr(tcp, addr, len);
1357 		return;
1358 	}
1359 	if (umove_or_printaddr(tcp, addr, &mreq))
1360 		return;
1361 
1362 	tprints("{imr_multiaddr=inet_addr(");
1363 	print_quoted_string(inet_ntoa(mreq.imr_multiaddr),
1364 			    16, QUOTE_0_TERMINATED);
1365 	tprints("), imr_interface=inet_addr(");
1366 	print_quoted_string(inet_ntoa(mreq.imr_interface),
1367 			    16, QUOTE_0_TERMINATED);
1368 	tprints(")}");
1369 }
1370 #endif /* IP_ADD_MEMBERSHIP */
1371 
1372 #ifdef IPV6_ADD_MEMBERSHIP
1373 static void
print_mreq6(struct tcb * tcp,long addr,unsigned int len)1374 print_mreq6(struct tcb *tcp, long addr, unsigned int len)
1375 {
1376 	struct ipv6_mreq mreq;
1377 
1378 	if (len < sizeof(mreq))
1379 		goto fail;
1380 
1381 	if (umove_or_printaddr(tcp, addr, &mreq))
1382 		return;
1383 
1384 #ifdef HAVE_INET_NTOP
1385 	const struct in6_addr *in6 = &mreq.ipv6mr_multiaddr;
1386 	char address[INET6_ADDRSTRLEN];
1387 
1388 	if (!inet_ntop(AF_INET6, in6, address, sizeof(address)))
1389 		goto fail;
1390 
1391 	tprints("{ipv6mr_multiaddr=inet_pton(");
1392 	print_quoted_string(address, sizeof(address), QUOTE_0_TERMINATED);
1393 	tprints("), ipv6mr_interface=");
1394 	print_ifindex(mreq.ipv6mr_interface);
1395 	tprints("}");
1396 	return;
1397 #endif /* HAVE_INET_NTOP */
1398 
1399 fail:
1400 	printstr(tcp, addr, len);
1401 }
1402 #endif /* IPV6_ADD_MEMBERSHIP */
1403 
1404 #ifdef MCAST_JOIN_GROUP
1405 static void
print_group_req(struct tcb * tcp,long addr,int len)1406 print_group_req(struct tcb *tcp, long addr, int len)
1407 {
1408 	struct group_req greq;
1409 
1410 	if (len != sizeof(greq) ||
1411 	    umove(tcp, addr, &greq) < 0) {
1412 		printaddr(addr);
1413 		return;
1414 	}
1415 
1416 	tprintf("{gr_interface=%u, gr_group=", greq.gr_interface);
1417 	print_sockaddr(tcp, (const void *) &greq.gr_group,
1418 		       sizeof(greq.gr_group));
1419 	tprintf("}");
1420 
1421 }
1422 #endif /* MCAST_JOIN_GROUP */
1423 
1424 #ifdef PACKET_RX_RING
1425 static void
print_tpacket_req(struct tcb * tcp,long addr,int len)1426 print_tpacket_req(struct tcb *tcp, long addr, int len)
1427 {
1428 	struct tpacket_req req;
1429 
1430 	if (len != sizeof(req) ||
1431 	    umove(tcp, addr, &req) < 0) {
1432 		printaddr(addr);
1433 	} else {
1434 		tprintf("{block_size=%u, block_nr=%u, "
1435 			"frame_size=%u, frame_nr=%u}",
1436 			req.tp_block_size,
1437 			req.tp_block_nr,
1438 			req.tp_frame_size,
1439 			req.tp_frame_nr);
1440 	}
1441 }
1442 #endif /* PACKET_RX_RING */
1443 
1444 #ifdef PACKET_ADD_MEMBERSHIP
1445 # include "xlat/packet_mreq_type.h"
1446 
1447 static void
print_packet_mreq(struct tcb * tcp,long addr,int len)1448 print_packet_mreq(struct tcb *tcp, long addr, int len)
1449 {
1450 	struct packet_mreq mreq;
1451 
1452 	if (len != sizeof(mreq) ||
1453 	    umove(tcp, addr, &mreq) < 0) {
1454 		printaddr(addr);
1455 	} else {
1456 		unsigned int i;
1457 
1458 		tprintf("{mr_ifindex=%u, mr_type=", mreq.mr_ifindex);
1459 		printxval(packet_mreq_type, mreq.mr_type, "PACKET_MR_???");
1460 		tprintf(", mr_alen=%u, mr_address=", mreq.mr_alen);
1461 		if (mreq.mr_alen > ARRAY_SIZE(mreq.mr_address))
1462 			mreq.mr_alen = ARRAY_SIZE(mreq.mr_address);
1463 		for (i = 0; i < mreq.mr_alen; ++i)
1464 			tprintf("%02x", mreq.mr_address[i]);
1465 		tprints("}");
1466 	}
1467 }
1468 #endif /* PACKET_ADD_MEMBERSHIP */
1469 
1470 static void
print_setsockopt(struct tcb * tcp,int level,int name,long addr,int len)1471 print_setsockopt(struct tcb *tcp, int level, int name, long addr, int len)
1472 {
1473 	if (addr && verbose(tcp))
1474 	switch (level) {
1475 	case SOL_SOCKET:
1476 		switch (name) {
1477 #ifdef SO_LINGER
1478 		case SO_LINGER:
1479 			print_linger(tcp, addr, len);
1480 			goto done;
1481 #endif
1482 		}
1483 		break;
1484 
1485 	case SOL_IP:
1486 		switch (name) {
1487 #ifdef IP_ADD_MEMBERSHIP
1488 		case IP_ADD_MEMBERSHIP:
1489 		case IP_DROP_MEMBERSHIP:
1490 			print_mreq(tcp, addr, len);
1491 			goto done;
1492 #endif /* IP_ADD_MEMBERSHIP */
1493 #ifdef MCAST_JOIN_GROUP
1494 		case MCAST_JOIN_GROUP:
1495 		case MCAST_LEAVE_GROUP:
1496 			print_group_req(tcp, addr, len);
1497 			goto done;
1498 #endif /* MCAST_JOIN_GROUP */
1499 		}
1500 		break;
1501 
1502 	case SOL_IPV6:
1503 		switch (name) {
1504 #ifdef IPV6_ADD_MEMBERSHIP
1505 		case IPV6_ADD_MEMBERSHIP:
1506 		case IPV6_DROP_MEMBERSHIP:
1507 # ifdef IPV6_JOIN_ANYCAST
1508 		case IPV6_JOIN_ANYCAST:
1509 # endif
1510 # ifdef IPV6_LEAVE_ANYCAST
1511 		case IPV6_LEAVE_ANYCAST:
1512 # endif
1513 			print_mreq6(tcp, addr, len);
1514 			goto done;
1515 #endif /* IPV6_ADD_MEMBERSHIP */
1516 		}
1517 		break;
1518 
1519 	case SOL_PACKET:
1520 		switch (name) {
1521 #ifdef PACKET_RX_RING
1522 		case PACKET_RX_RING:
1523 # ifdef PACKET_TX_RING
1524 		case PACKET_TX_RING:
1525 # endif
1526 			print_tpacket_req(tcp, addr, len);
1527 			goto done;
1528 #endif /* PACKET_RX_RING */
1529 #ifdef PACKET_ADD_MEMBERSHIP
1530 		case PACKET_ADD_MEMBERSHIP:
1531 		case PACKET_DROP_MEMBERSHIP:
1532 			print_packet_mreq(tcp, addr, len);
1533 			goto done;
1534 #endif /* PACKET_ADD_MEMBERSHIP */
1535 		}
1536 		break;
1537 
1538 	case SOL_RAW:
1539 		switch (name) {
1540 #ifdef ICMP_FILTER
1541 		case ICMP_FILTER:
1542 			print_icmp_filter(tcp, addr, len);
1543 			goto done;
1544 #endif
1545 		}
1546 		break;
1547 	}
1548 
1549 	/* default arg printing */
1550 
1551 	if (verbose(tcp)) {
1552 		if (len == sizeof(int)) {
1553 			printnum_int(tcp, addr, "%d");
1554 		} else {
1555 			printstr(tcp, addr, len);
1556 		}
1557 	} else {
1558 		printaddr(addr);
1559 	}
1560 done:
1561 	tprintf(", %d", len);
1562 }
1563 
SYS_FUNC(setsockopt)1564 SYS_FUNC(setsockopt)
1565 {
1566 	print_sockopt_fd_level_name(tcp, tcp->u_arg[0],
1567 				    tcp->u_arg[1], tcp->u_arg[2], false);
1568 	print_setsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2],
1569 			 tcp->u_arg[3], tcp->u_arg[4]);
1570 
1571 	return RVAL_DECODED;
1572 }
1573