• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3  * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4  * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
5  * Copyright (c) 1996-2000 Wichert Akkerman <wichert@cistron.nl>
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. The name of the author may not be used to endorse or promote products
17  *    derived from this software without specific prior written permission.
18  *
19  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
20  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
21  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
23  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
24  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29  */
30 
31 #include "defs.h"
32 #include <sys/stat.h>
33 #include <sys/socket.h>
34 #include <sys/uio.h>
35 #include <sys/un.h>
36 #include <netinet/in.h>
37 #ifdef HAVE_NETINET_TCP_H
38 # include <netinet/tcp.h>
39 #endif
40 #ifdef HAVE_NETINET_UDP_H
41 # include <netinet/udp.h>
42 #endif
43 #ifdef HAVE_NETINET_SCTP_H
44 # include <netinet/sctp.h>
45 #endif
46 #include <arpa/inet.h>
47 #include <net/if.h>
48 #include <asm/types.h>
49 #ifdef HAVE_NETIPX_IPX_H
50 # include <netipx/ipx.h>
51 #else
52 # include <linux/ipx.h>
53 #endif
54 
55 #if defined(HAVE_LINUX_IP_VS_H)
56 # include <linux/ip_vs.h>
57 #endif
58 #include <linux/netlink.h>
59 #if defined(HAVE_LINUX_NETFILTER_ARP_ARP_TABLES_H)
60 # include <linux/netfilter_arp/arp_tables.h>
61 #endif
62 #if defined(HAVE_LINUX_NETFILTER_BRIDGE_EBTABLES_H)
63 # include <linux/netfilter_bridge/ebtables.h>
64 #endif
65 #if defined(HAVE_LINUX_NETFILTER_IPV4_IP_TABLES_H)
66 # include <linux/netfilter_ipv4/ip_tables.h>
67 #endif
68 #if defined(HAVE_LINUX_NETFILTER_IPV6_IP6_TABLES_H)
69 # include <linux/netfilter_ipv6/ip6_tables.h>
70 #endif
71 #include <linux/if_packet.h>
72 #include <linux/icmp.h>
73 
74 #include "xlat/socktypes.h"
75 #include "xlat/sock_type_flags.h"
76 #ifndef SOCK_TYPE_MASK
77 # define SOCK_TYPE_MASK 0xf
78 #endif
79 
80 #include "xlat/socketlayers.h"
81 
82 #include "xlat/inet_protocols.h"
83 #include "xlat/netlink_protocols.h"
84 
85 #ifdef HAVE_BLUETOOTH_BLUETOOTH_H
86 # include <bluetooth/bluetooth.h>
87 # include "xlat/bt_protocols.h"
88 #endif
89 
90 void
print_ifindex(unsigned int ifindex)91 print_ifindex(unsigned int ifindex)
92 {
93 #ifdef HAVE_IF_INDEXTONAME
94 	char buf[IFNAMSIZ + 1];
95 
96 	if (if_indextoname(ifindex, buf)) {
97 		tprints("if_nametoindex(");
98 		print_quoted_string(buf, sizeof(buf), QUOTE_0_TERMINATED);
99 		tprints(")");
100 		return;
101 	}
102 #endif
103 	tprintf("%u", ifindex);
104 }
105 
106 static void
decode_sockbuf(struct tcb * const tcp,const int fd,const kernel_ulong_t addr,const kernel_ulong_t addrlen)107 decode_sockbuf(struct tcb *const tcp, const int fd, const kernel_ulong_t addr,
108 	       const kernel_ulong_t addrlen)
109 {
110 
111 	switch (verbose(tcp) ? getfdproto(tcp, fd) : SOCK_PROTO_UNKNOWN) {
112 	case SOCK_PROTO_NETLINK:
113 		decode_netlink(tcp, addr, addrlen);
114 		break;
115 	default:
116 		printstrn(tcp, addr, addrlen);
117 	}
118 }
119 
120 /*
121  * low bits of the socket type define real socket type,
122  * other bits are socket type flags.
123  */
124 static void
tprint_sock_type(unsigned int flags)125 tprint_sock_type(unsigned int flags)
126 {
127 	const char *str = xlookup(socktypes, flags & SOCK_TYPE_MASK);
128 
129 	if (str) {
130 		tprints(str);
131 		flags &= ~SOCK_TYPE_MASK;
132 		if (!flags)
133 			return;
134 		tprints("|");
135 	}
136 	printflags(sock_type_flags, flags, "SOCK_???");
137 }
138 
SYS_FUNC(socket)139 SYS_FUNC(socket)
140 {
141 	printxval(addrfams, tcp->u_arg[0], "AF_???");
142 	tprints(", ");
143 	tprint_sock_type(tcp->u_arg[1]);
144 	tprints(", ");
145 	switch (tcp->u_arg[0]) {
146 	case AF_INET:
147 	case AF_INET6:
148 		printxval(inet_protocols, tcp->u_arg[2], "IPPROTO_???");
149 		break;
150 
151 	case AF_NETLINK:
152 		printxval(netlink_protocols, tcp->u_arg[2], "NETLINK_???");
153 		break;
154 
155 #ifdef HAVE_BLUETOOTH_BLUETOOTH_H
156 	case AF_BLUETOOTH:
157 		printxval(bt_protocols, tcp->u_arg[2], "BTPROTO_???");
158 		break;
159 #endif
160 
161 	default:
162 		tprintf("%" PRI_klu, tcp->u_arg[2]);
163 		break;
164 	}
165 
166 	return RVAL_DECODED | RVAL_FD;
167 }
168 
SYS_FUNC(bind)169 SYS_FUNC(bind)
170 {
171 	printfd(tcp, tcp->u_arg[0]);
172 	tprints(", ");
173 	const int addrlen = tcp->u_arg[2];
174 	decode_sockaddr(tcp, tcp->u_arg[1], addrlen);
175 	tprintf(", %d", addrlen);
176 
177 	return RVAL_DECODED;
178 }
179 
SYS_FUNC(listen)180 SYS_FUNC(listen)
181 {
182 	printfd(tcp, tcp->u_arg[0]);
183 	tprints(", ");
184 	tprintf("%" PRI_klu, tcp->u_arg[1]);
185 
186 	return RVAL_DECODED;
187 }
188 
189 static bool
fetch_socklen(struct tcb * const tcp,int * const plen,const kernel_ulong_t sockaddr,const kernel_ulong_t socklen)190 fetch_socklen(struct tcb *const tcp, int *const plen,
191 	      const kernel_ulong_t sockaddr, const kernel_ulong_t socklen)
192 {
193 	return verbose(tcp) && sockaddr && socklen
194 	       && umove(tcp, socklen, plen) == 0;
195 }
196 
197 static int
decode_sockname(struct tcb * tcp)198 decode_sockname(struct tcb *tcp)
199 {
200 	int ulen, rlen;
201 
202 	if (entering(tcp)) {
203 		printfd(tcp, tcp->u_arg[0]);
204 		tprints(", ");
205 		if (fetch_socklen(tcp, &ulen, tcp->u_arg[1], tcp->u_arg[2])) {
206 			set_tcb_priv_ulong(tcp, ulen);
207 			return 0;
208 		} else {
209 			printaddr(tcp->u_arg[1]);
210 			tprints(", ");
211 			printaddr(tcp->u_arg[2]);
212 			return RVAL_DECODED;
213 		}
214 	}
215 
216 	ulen = get_tcb_priv_ulong(tcp);
217 
218 	if (syserror(tcp) || umove(tcp, tcp->u_arg[2], &rlen) < 0) {
219 		printaddr(tcp->u_arg[1]);
220 		tprintf(", [%d]", ulen);
221 	} else {
222 		decode_sockaddr(tcp, tcp->u_arg[1], ulen > rlen ? rlen : ulen);
223 		if (ulen != rlen)
224 			tprintf(", [%d->%d]", ulen, rlen);
225 		else
226 			tprintf(", [%d]", rlen);
227 	}
228 
229 	return RVAL_DECODED;
230 }
231 
SYS_FUNC(accept)232 SYS_FUNC(accept)
233 {
234 	return decode_sockname(tcp) | RVAL_FD;
235 }
236 
SYS_FUNC(accept4)237 SYS_FUNC(accept4)
238 {
239 	int rc = decode_sockname(tcp);
240 
241 	if (rc & RVAL_DECODED) {
242 		tprints(", ");
243 		printflags(sock_type_flags, tcp->u_arg[3], "SOCK_???");
244 	}
245 
246 	return rc | RVAL_FD;
247 }
248 
SYS_FUNC(send)249 SYS_FUNC(send)
250 {
251 	printfd(tcp, tcp->u_arg[0]);
252 	tprints(", ");
253 	decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1], tcp->u_arg[2]);
254 	tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
255 	/* flags */
256 	printflags(msg_flags, tcp->u_arg[3], "MSG_???");
257 
258 	return RVAL_DECODED;
259 }
260 
SYS_FUNC(sendto)261 SYS_FUNC(sendto)
262 {
263 	printfd(tcp, tcp->u_arg[0]);
264 	tprints(", ");
265 	decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1], tcp->u_arg[2]);
266 	tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
267 	/* flags */
268 	printflags(msg_flags, tcp->u_arg[3], "MSG_???");
269 	/* to address */
270 	const int addrlen = tcp->u_arg[5];
271 	tprints(", ");
272 	decode_sockaddr(tcp, tcp->u_arg[4], addrlen);
273 	/* to length */
274 	tprintf(", %d", addrlen);
275 
276 	return RVAL_DECODED;
277 }
278 
SYS_FUNC(recv)279 SYS_FUNC(recv)
280 {
281 	if (entering(tcp)) {
282 		printfd(tcp, tcp->u_arg[0]);
283 		tprints(", ");
284 	} else {
285 		if (syserror(tcp)) {
286 			printaddr(tcp->u_arg[1]);
287 		} else {
288 			decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1],
289 				     tcp->u_rval);
290 		}
291 
292 		tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
293 		printflags(msg_flags, tcp->u_arg[3], "MSG_???");
294 	}
295 	return 0;
296 }
297 
SYS_FUNC(recvfrom)298 SYS_FUNC(recvfrom)
299 {
300 	int ulen, rlen;
301 
302 	if (entering(tcp)) {
303 		printfd(tcp, tcp->u_arg[0]);
304 		tprints(", ");
305 		if (fetch_socklen(tcp, &ulen, tcp->u_arg[4], tcp->u_arg[5])) {
306 			set_tcb_priv_ulong(tcp, ulen);
307 		}
308 	} else {
309 		/* buf */
310 		if (syserror(tcp)) {
311 			printaddr(tcp->u_arg[1]);
312 		} else {
313 			decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1],
314 				     tcp->u_rval);
315 		}
316 		/* size */
317 		tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
318 		/* flags */
319 		printflags(msg_flags, tcp->u_arg[3], "MSG_???");
320 		tprints(", ");
321 
322 		ulen = get_tcb_priv_ulong(tcp);
323 
324 		if (!fetch_socklen(tcp, &rlen, tcp->u_arg[4], tcp->u_arg[5])) {
325 			/* from address */
326 			printaddr(tcp->u_arg[4]);
327 			tprints(", ");
328 			/* from length */
329 			printaddr(tcp->u_arg[5]);
330 			return 0;
331 		}
332 		if (syserror(tcp)) {
333 			/* from address */
334 			printaddr(tcp->u_arg[4]);
335 			/* from length */
336 			tprintf(", [%d]", ulen);
337 			return 0;
338 		}
339 		/* from address */
340 		decode_sockaddr(tcp, tcp->u_arg[4], ulen > rlen ? rlen : ulen);
341 		/* from length */
342 		if (ulen != rlen)
343 			tprintf(", [%d->%d]", ulen, rlen);
344 		else
345 			tprintf(", [%d]", rlen);
346 	}
347 	return 0;
348 }
349 
350 #include "xlat/shutdown_modes.h"
351 
SYS_FUNC(shutdown)352 SYS_FUNC(shutdown)
353 {
354 	printfd(tcp, tcp->u_arg[0]);
355 	tprints(", ");
356 	printxval(shutdown_modes, tcp->u_arg[1], "SHUT_???");
357 
358 	return RVAL_DECODED;
359 }
360 
SYS_FUNC(getsockname)361 SYS_FUNC(getsockname)
362 {
363 	return decode_sockname(tcp);
364 }
365 
366 static void
printpair_fd(struct tcb * tcp,const int i0,const int i1)367 printpair_fd(struct tcb *tcp, const int i0, const int i1)
368 {
369 	tprints("[");
370 	printfd(tcp, i0);
371 	tprints(", ");
372 	printfd(tcp, i1);
373 	tprints("]");
374 }
375 
376 static void
decode_pair_fd(struct tcb * const tcp,const kernel_ulong_t addr)377 decode_pair_fd(struct tcb *const tcp, const kernel_ulong_t addr)
378 {
379 	int pair[2];
380 
381 	if (umove_or_printaddr(tcp, addr, &pair))
382 		return;
383 
384 	printpair_fd(tcp, pair[0], pair[1]);
385 }
386 
387 static int
do_pipe(struct tcb * tcp,int flags_arg)388 do_pipe(struct tcb *tcp, int flags_arg)
389 {
390 	if (exiting(tcp)) {
391 		decode_pair_fd(tcp, tcp->u_arg[0]);
392 		if (flags_arg >= 0) {
393 			tprints(", ");
394 			printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???");
395 		}
396 	}
397 	return 0;
398 }
399 
SYS_FUNC(pipe)400 SYS_FUNC(pipe)
401 {
402 #ifdef HAVE_GETRVAL2
403 	if (exiting(tcp) && !syserror(tcp))
404 		printpair_fd(tcp, tcp->u_rval, getrval2(tcp));
405 	return 0;
406 #else
407 	return do_pipe(tcp, -1);
408 #endif
409 }
410 
SYS_FUNC(pipe2)411 SYS_FUNC(pipe2)
412 {
413 	return do_pipe(tcp, 1);
414 }
415 
SYS_FUNC(socketpair)416 SYS_FUNC(socketpair)
417 {
418 	if (entering(tcp)) {
419 		printxval(addrfams, tcp->u_arg[0], "AF_???");
420 		tprints(", ");
421 		tprint_sock_type(tcp->u_arg[1]);
422 		tprintf(", %" PRI_klu, tcp->u_arg[2]);
423 	} else {
424 		tprints(", ");
425 		decode_pair_fd(tcp, tcp->u_arg[3]);
426 	}
427 	return 0;
428 }
429 
430 #include "xlat/sockoptions.h"
431 #include "xlat/sockipoptions.h"
432 #include "xlat/getsockipoptions.h"
433 #include "xlat/setsockipoptions.h"
434 #include "xlat/sockipv6options.h"
435 #include "xlat/getsockipv6options.h"
436 #include "xlat/setsockipv6options.h"
437 #include "xlat/sockipxoptions.h"
438 #include "xlat/sockrawoptions.h"
439 #include "xlat/sockpacketoptions.h"
440 #include "xlat/socksctpoptions.h"
441 #include "xlat/socktcpoptions.h"
442 
443 static void
print_sockopt_fd_level_name(struct tcb * tcp,int fd,unsigned int level,unsigned int name,bool is_getsockopt)444 print_sockopt_fd_level_name(struct tcb *tcp, int fd, unsigned int level,
445 			    unsigned int name, bool is_getsockopt)
446 {
447 	printfd(tcp, fd);
448 	tprints(", ");
449 	printxval(socketlayers, level, "SOL_??");
450 	tprints(", ");
451 
452 	switch (level) {
453 	case SOL_SOCKET:
454 		printxval(sockoptions, name, "SO_???");
455 		break;
456 	case SOL_IP:
457 		printxvals(name, "IP_???", sockipoptions,
458 			is_getsockopt ? getsockipoptions : setsockipoptions, NULL);
459 		break;
460 	case SOL_IPV6:
461 		printxvals(name, "IPV6_???", sockipv6options,
462 			is_getsockopt ? getsockipv6options : setsockipv6options, NULL);
463 		break;
464 	case SOL_IPX:
465 		printxval(sockipxoptions, name, "IPX_???");
466 		break;
467 	case SOL_PACKET:
468 		printxval(sockpacketoptions, name, "PACKET_???");
469 		break;
470 	case SOL_TCP:
471 		printxval(socktcpoptions, name, "TCP_???");
472 		break;
473 	case SOL_SCTP:
474 		printxval(socksctpoptions, name, "SCTP_???");
475 		break;
476 	case SOL_RAW:
477 		printxval(sockrawoptions, name, "RAW_???");
478 		break;
479 
480 		/* Other SOL_* protocol levels still need work. */
481 
482 	default:
483 		tprintf("%u", name);
484 	}
485 
486 	tprints(", ");
487 }
488 
489 static void
print_linger(struct tcb * const tcp,const kernel_ulong_t addr,const int len)490 print_linger(struct tcb *const tcp, const kernel_ulong_t addr, const int len)
491 {
492 	struct linger linger;
493 
494 	if (len != sizeof(linger) ||
495 	    umove(tcp, addr, &linger) < 0) {
496 		printaddr(addr);
497 		return;
498 	}
499 
500 	tprintf("{onoff=%d, linger=%d}",
501 		linger.l_onoff,
502 		linger.l_linger);
503 }
504 
505 #ifdef SO_PEERCRED
506 static void
print_ucred(struct tcb * const tcp,const kernel_ulong_t addr,const int len)507 print_ucred(struct tcb *const tcp, const kernel_ulong_t addr, const int len)
508 {
509 	struct ucred uc;
510 
511 	if (len != sizeof(uc) ||
512 	    umove(tcp, addr, &uc) < 0) {
513 		printaddr(addr);
514 	} else {
515 		tprintf("{pid=%u, uid=%u, gid=%u}",
516 			(unsigned) uc.pid,
517 			(unsigned) uc.uid,
518 			(unsigned) uc.gid);
519 	}
520 }
521 #endif /* SO_PEERCRED */
522 
523 #ifdef PACKET_STATISTICS
524 static void
print_tpacket_stats(struct tcb * const tcp,const kernel_ulong_t addr,const int len)525 print_tpacket_stats(struct tcb *const tcp, const kernel_ulong_t addr,
526 		    const int len)
527 {
528 	struct tpacket_stats stats;
529 
530 	if (len != sizeof(stats) ||
531 	    umove(tcp, addr, &stats) < 0) {
532 		printaddr(addr);
533 	} else {
534 		tprintf("{packets=%u, drops=%u}",
535 			stats.tp_packets,
536 			stats.tp_drops);
537 	}
538 }
539 #endif /* PACKET_STATISTICS */
540 
541 #include "xlat/icmpfilterflags.h"
542 
543 static void
print_icmp_filter(struct tcb * const tcp,const kernel_ulong_t addr,int len)544 print_icmp_filter(struct tcb *const tcp, const kernel_ulong_t addr, int len)
545 {
546 	struct icmp_filter filter = {};
547 
548 	if (len > (int) sizeof(filter))
549 		len = sizeof(filter);
550 	else if (len <= 0) {
551 		printaddr(addr);
552 		return;
553 	}
554 
555 	if (umoven_or_printaddr(tcp, addr, len, &filter))
556 		return;
557 
558 	tprints("~(");
559 	printflags(icmpfilterflags, ~filter.data, "ICMP_???");
560 	tprints(")");
561 }
562 
563 static void
print_getsockopt(struct tcb * const tcp,const unsigned int level,const unsigned int name,const kernel_ulong_t addr,const int len)564 print_getsockopt(struct tcb *const tcp, const unsigned int level,
565 		 const unsigned int name, const kernel_ulong_t addr,
566 		 const int len)
567 {
568 	if (addr && verbose(tcp))
569 	switch (level) {
570 	case SOL_SOCKET:
571 		switch (name) {
572 		case SO_LINGER:
573 			print_linger(tcp, addr, len);
574 			goto done;
575 #ifdef SO_PEERCRED
576 		case SO_PEERCRED:
577 			print_ucred(tcp, addr, len);
578 			goto done;
579 #endif
580 		}
581 		break;
582 
583 	case SOL_PACKET:
584 		switch (name) {
585 #ifdef PACKET_STATISTICS
586 		case PACKET_STATISTICS:
587 			print_tpacket_stats(tcp, addr, len);
588 			goto done;
589 #endif
590 		}
591 		break;
592 
593 	case SOL_RAW:
594 		switch (name) {
595 		case ICMP_FILTER:
596 			print_icmp_filter(tcp, addr, len);
597 			goto done;
598 		}
599 		break;
600 	}
601 
602 	/* default arg printing */
603 
604 	if (verbose(tcp)) {
605 		if (len == sizeof(int)) {
606 			printnum_int(tcp, addr, "%d");
607 		} else {
608 			printstrn(tcp, addr, len);
609 		}
610 	} else {
611 		printaddr(addr);
612 	}
613 done:
614 	tprintf(", [%d]", len);
615 }
616 
SYS_FUNC(getsockopt)617 SYS_FUNC(getsockopt)
618 {
619 	if (entering(tcp)) {
620 		print_sockopt_fd_level_name(tcp, tcp->u_arg[0],
621 					    tcp->u_arg[1], tcp->u_arg[2], true);
622 	} else {
623 		int len;
624 
625 		if (syserror(tcp) || umove(tcp, tcp->u_arg[4], &len) < 0) {
626 			printaddr(tcp->u_arg[3]);
627 			tprints(", ");
628 			printaddr(tcp->u_arg[4]);
629 		} else {
630 			print_getsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2],
631 					 tcp->u_arg[3], len);
632 		}
633 	}
634 	return 0;
635 }
636 
637 #ifdef IP_ADD_MEMBERSHIP
638 static void
print_mreq(struct tcb * const tcp,const kernel_ulong_t addr,const unsigned int len)639 print_mreq(struct tcb *const tcp, const kernel_ulong_t addr,
640 	   const unsigned int len)
641 {
642 	struct ip_mreq mreq;
643 
644 	if (len < sizeof(mreq)) {
645 		printstrn(tcp, addr, len);
646 		return;
647 	}
648 	if (umove_or_printaddr(tcp, addr, &mreq))
649 		return;
650 
651 	tprints("{imr_multiaddr=inet_addr(");
652 	print_quoted_string(inet_ntoa(mreq.imr_multiaddr),
653 			    16, QUOTE_0_TERMINATED);
654 	tprints("), imr_interface=inet_addr(");
655 	print_quoted_string(inet_ntoa(mreq.imr_interface),
656 			    16, QUOTE_0_TERMINATED);
657 	tprints(")}");
658 }
659 #endif /* IP_ADD_MEMBERSHIP */
660 
661 #ifdef IPV6_ADD_MEMBERSHIP
662 static void
print_mreq6(struct tcb * const tcp,const kernel_ulong_t addr,const unsigned int len)663 print_mreq6(struct tcb *const tcp, const kernel_ulong_t addr,
664 	    const unsigned int len)
665 {
666 	struct ipv6_mreq mreq;
667 
668 	if (len < sizeof(mreq))
669 		goto fail;
670 
671 	if (umove_or_printaddr(tcp, addr, &mreq))
672 		return;
673 
674 	const struct in6_addr *in6 = &mreq.ipv6mr_multiaddr;
675 	char address[INET6_ADDRSTRLEN];
676 
677 	if (!inet_ntop(AF_INET6, in6, address, sizeof(address)))
678 		goto fail;
679 
680 	tprints("{ipv6mr_multiaddr=inet_pton(");
681 	print_quoted_string(address, sizeof(address), QUOTE_0_TERMINATED);
682 	tprints("), ipv6mr_interface=");
683 	print_ifindex(mreq.ipv6mr_interface);
684 	tprints("}");
685 	return;
686 
687 fail:
688 	printstrn(tcp, addr, len);
689 }
690 #endif /* IPV6_ADD_MEMBERSHIP */
691 
692 #ifdef MCAST_JOIN_GROUP
693 static void
print_group_req(struct tcb * const tcp,const kernel_ulong_t addr,const int len)694 print_group_req(struct tcb *const tcp, const kernel_ulong_t addr, const int len)
695 {
696 	struct group_req greq;
697 
698 	if (len != sizeof(greq) ||
699 	    umove(tcp, addr, &greq) < 0) {
700 		printaddr(addr);
701 		return;
702 	}
703 
704 	tprintf("{gr_interface=%u, gr_group=", greq.gr_interface);
705 	print_sockaddr(tcp, &greq.gr_group, sizeof(greq.gr_group));
706 	tprints("}");
707 
708 }
709 #endif /* MCAST_JOIN_GROUP */
710 
711 #ifdef PACKET_RX_RING
712 static void
print_tpacket_req(struct tcb * const tcp,const kernel_ulong_t addr,const int len)713 print_tpacket_req(struct tcb *const tcp, const kernel_ulong_t addr, const int len)
714 {
715 	struct tpacket_req req;
716 
717 	if (len != sizeof(req) ||
718 	    umove(tcp, addr, &req) < 0) {
719 		printaddr(addr);
720 	} else {
721 		tprintf("{block_size=%u, block_nr=%u, "
722 			"frame_size=%u, frame_nr=%u}",
723 			req.tp_block_size,
724 			req.tp_block_nr,
725 			req.tp_frame_size,
726 			req.tp_frame_nr);
727 	}
728 }
729 #endif /* PACKET_RX_RING */
730 
731 #ifdef PACKET_ADD_MEMBERSHIP
732 # include "xlat/packet_mreq_type.h"
733 
734 static void
print_packet_mreq(struct tcb * const tcp,const kernel_ulong_t addr,const int len)735 print_packet_mreq(struct tcb *const tcp, const kernel_ulong_t addr, const int len)
736 {
737 	struct packet_mreq mreq;
738 
739 	if (len != sizeof(mreq) ||
740 	    umove(tcp, addr, &mreq) < 0) {
741 		printaddr(addr);
742 	} else {
743 		unsigned int i;
744 
745 		tprintf("{mr_ifindex=%u, mr_type=", mreq.mr_ifindex);
746 		printxval(packet_mreq_type, mreq.mr_type, "PACKET_MR_???");
747 		tprintf(", mr_alen=%u, mr_address=", mreq.mr_alen);
748 		if (mreq.mr_alen > ARRAY_SIZE(mreq.mr_address))
749 			mreq.mr_alen = ARRAY_SIZE(mreq.mr_address);
750 		for (i = 0; i < mreq.mr_alen; ++i)
751 			tprintf("%02x", mreq.mr_address[i]);
752 		tprints("}");
753 	}
754 }
755 #endif /* PACKET_ADD_MEMBERSHIP */
756 
757 static void
print_setsockopt(struct tcb * const tcp,const unsigned int level,const unsigned int name,const kernel_ulong_t addr,const int len)758 print_setsockopt(struct tcb *const tcp, const unsigned int level,
759 		 const unsigned int name, const kernel_ulong_t addr,
760 		 const int len)
761 {
762 	if (addr && verbose(tcp))
763 	switch (level) {
764 	case SOL_SOCKET:
765 		switch (name) {
766 		case SO_LINGER:
767 			print_linger(tcp, addr, len);
768 			goto done;
769 		}
770 		break;
771 
772 	case SOL_IP:
773 		switch (name) {
774 #ifdef IP_ADD_MEMBERSHIP
775 		case IP_ADD_MEMBERSHIP:
776 		case IP_DROP_MEMBERSHIP:
777 			print_mreq(tcp, addr, len);
778 			goto done;
779 #endif /* IP_ADD_MEMBERSHIP */
780 #ifdef MCAST_JOIN_GROUP
781 		case MCAST_JOIN_GROUP:
782 		case MCAST_LEAVE_GROUP:
783 			print_group_req(tcp, addr, len);
784 			goto done;
785 #endif /* MCAST_JOIN_GROUP */
786 		}
787 		break;
788 
789 	case SOL_IPV6:
790 		switch (name) {
791 #ifdef IPV6_ADD_MEMBERSHIP
792 		case IPV6_ADD_MEMBERSHIP:
793 		case IPV6_DROP_MEMBERSHIP:
794 # ifdef IPV6_JOIN_ANYCAST
795 		case IPV6_JOIN_ANYCAST:
796 # endif
797 # ifdef IPV6_LEAVE_ANYCAST
798 		case IPV6_LEAVE_ANYCAST:
799 # endif
800 			print_mreq6(tcp, addr, len);
801 			goto done;
802 #endif /* IPV6_ADD_MEMBERSHIP */
803 		}
804 		break;
805 
806 	case SOL_PACKET:
807 		switch (name) {
808 #ifdef PACKET_RX_RING
809 		case PACKET_RX_RING:
810 # ifdef PACKET_TX_RING
811 		case PACKET_TX_RING:
812 # endif
813 			print_tpacket_req(tcp, addr, len);
814 			goto done;
815 #endif /* PACKET_RX_RING */
816 #ifdef PACKET_ADD_MEMBERSHIP
817 		case PACKET_ADD_MEMBERSHIP:
818 		case PACKET_DROP_MEMBERSHIP:
819 			print_packet_mreq(tcp, addr, len);
820 			goto done;
821 #endif /* PACKET_ADD_MEMBERSHIP */
822 		}
823 		break;
824 
825 	case SOL_RAW:
826 		switch (name) {
827 		case ICMP_FILTER:
828 			print_icmp_filter(tcp, addr, len);
829 			goto done;
830 		}
831 		break;
832 	}
833 
834 	/* default arg printing */
835 
836 	if (verbose(tcp)) {
837 		if (len == sizeof(int)) {
838 			printnum_int(tcp, addr, "%d");
839 		} else {
840 			printstrn(tcp, addr, len);
841 		}
842 	} else {
843 		printaddr(addr);
844 	}
845 done:
846 	tprintf(", %d", len);
847 }
848 
SYS_FUNC(setsockopt)849 SYS_FUNC(setsockopt)
850 {
851 	print_sockopt_fd_level_name(tcp, tcp->u_arg[0],
852 				    tcp->u_arg[1], tcp->u_arg[2], false);
853 	print_setsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2],
854 			 tcp->u_arg[3], tcp->u_arg[4]);
855 
856 	return RVAL_DECODED;
857 }
858