1 /*
2 * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3 * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4 * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
5 * Copyright (c) 1996-2000 Wichert Akkerman <wichert@cistron.nl>
6 * Copyright (c) 1999-2017 The strace developers.
7 * All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. The name of the author may not be used to endorse or promote products
18 * derived from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
22 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
23 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
24 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
25 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
26 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
27 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
28 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
29 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 */
31
32 #include "defs.h"
33 #include <sys/stat.h>
34 #include <sys/socket.h>
35 #include <sys/uio.h>
36 #include <sys/un.h>
37 #include <netinet/in.h>
38 #ifdef HAVE_NETINET_TCP_H
39 # include <netinet/tcp.h>
40 #endif
41 #ifdef HAVE_NETINET_UDP_H
42 # include <netinet/udp.h>
43 #endif
44 #ifdef HAVE_NETINET_SCTP_H
45 # include <netinet/sctp.h>
46 #endif
47 #include <arpa/inet.h>
48 #include <net/if.h>
49 #include <asm/types.h>
50 #ifdef HAVE_NETIPX_IPX_H
51 # include <netipx/ipx.h>
52 #else
53 # include <linux/ipx.h>
54 #endif
55
56 #if defined(HAVE_LINUX_IP_VS_H)
57 # include <linux/ip_vs.h>
58 #endif
59 #include "netlink.h"
60 #if defined(HAVE_LINUX_NETFILTER_ARP_ARP_TABLES_H)
61 # include <linux/netfilter_arp/arp_tables.h>
62 #endif
63 #if defined(HAVE_LINUX_NETFILTER_BRIDGE_EBTABLES_H)
64 # include <linux/netfilter_bridge/ebtables.h>
65 #endif
66 #if defined(HAVE_LINUX_NETFILTER_IPV4_IP_TABLES_H)
67 # include <linux/netfilter_ipv4/ip_tables.h>
68 #endif
69 #if defined(HAVE_LINUX_NETFILTER_IPV6_IP6_TABLES_H)
70 # include <linux/netfilter_ipv6/ip6_tables.h>
71 #endif
72 #include <linux/if_packet.h>
73 #include <linux/icmp.h>
74
75 #include "xlat/socktypes.h"
76 #include "xlat/sock_type_flags.h"
77 #ifndef SOCK_TYPE_MASK
78 # define SOCK_TYPE_MASK 0xf
79 #endif
80
81 #include "xlat/socketlayers.h"
82
83 #include "xlat/inet_protocols.h"
84
85 #ifdef HAVE_BLUETOOTH_BLUETOOTH_H
86 # include <bluetooth/bluetooth.h>
87 # include "xlat/bt_protocols.h"
88 #endif
89
90 void
print_ifindex(unsigned int ifindex)91 print_ifindex(unsigned int ifindex)
92 {
93 #ifdef HAVE_IF_INDEXTONAME
94 char buf[IFNAMSIZ + 1];
95
96 if (if_indextoname(ifindex, buf)) {
97 tprints("if_nametoindex(");
98 print_quoted_string(buf, sizeof(buf), QUOTE_0_TERMINATED);
99 tprints(")");
100 return;
101 }
102 #endif
103 tprintf("%u", ifindex);
104 }
105
106 static void
decode_sockbuf(struct tcb * const tcp,const int fd,const kernel_ulong_t addr,const kernel_ulong_t addrlen)107 decode_sockbuf(struct tcb *const tcp, const int fd, const kernel_ulong_t addr,
108 const kernel_ulong_t addrlen)
109 {
110
111 switch (verbose(tcp) ? getfdproto(tcp, fd) : SOCK_PROTO_UNKNOWN) {
112 case SOCK_PROTO_NETLINK:
113 decode_netlink(tcp, fd, addr, addrlen);
114 break;
115 default:
116 printstrn(tcp, addr, addrlen);
117 }
118 }
119
120 /*
121 * low bits of the socket type define real socket type,
122 * other bits are socket type flags.
123 */
124 static void
tprint_sock_type(unsigned int flags)125 tprint_sock_type(unsigned int flags)
126 {
127 const char *str = xlookup(socktypes, flags & SOCK_TYPE_MASK);
128
129 if (str) {
130 tprints(str);
131 flags &= ~SOCK_TYPE_MASK;
132 if (!flags)
133 return;
134 tprints("|");
135 }
136 printflags(sock_type_flags, flags, "SOCK_???");
137 }
138
SYS_FUNC(socket)139 SYS_FUNC(socket)
140 {
141 printxval(addrfams, tcp->u_arg[0], "AF_???");
142 tprints(", ");
143 tprint_sock_type(tcp->u_arg[1]);
144 tprints(", ");
145 switch (tcp->u_arg[0]) {
146 case AF_INET:
147 case AF_INET6:
148 printxval(inet_protocols, tcp->u_arg[2], "IPPROTO_???");
149 break;
150
151 case AF_NETLINK:
152 printxval(netlink_protocols, tcp->u_arg[2], "NETLINK_???");
153 break;
154
155 #ifdef HAVE_BLUETOOTH_BLUETOOTH_H
156 case AF_BLUETOOTH:
157 printxval(bt_protocols, tcp->u_arg[2], "BTPROTO_???");
158 break;
159 #endif
160
161 default:
162 tprintf("%" PRI_klu, tcp->u_arg[2]);
163 break;
164 }
165
166 return RVAL_DECODED | RVAL_FD;
167 }
168
SYS_FUNC(bind)169 SYS_FUNC(bind)
170 {
171 printfd(tcp, tcp->u_arg[0]);
172 tprints(", ");
173 const int addrlen = tcp->u_arg[2];
174 decode_sockaddr(tcp, tcp->u_arg[1], addrlen);
175 tprintf(", %d", addrlen);
176
177 return RVAL_DECODED;
178 }
179
SYS_FUNC(listen)180 SYS_FUNC(listen)
181 {
182 printfd(tcp, tcp->u_arg[0]);
183 tprints(", ");
184 tprintf("%" PRI_klu, tcp->u_arg[1]);
185
186 return RVAL_DECODED;
187 }
188
189 static bool
fetch_socklen(struct tcb * const tcp,int * const plen,const kernel_ulong_t sockaddr,const kernel_ulong_t socklen)190 fetch_socklen(struct tcb *const tcp, int *const plen,
191 const kernel_ulong_t sockaddr, const kernel_ulong_t socklen)
192 {
193 return verbose(tcp) && sockaddr && socklen
194 && umove(tcp, socklen, plen) == 0;
195 }
196
197 static int
decode_sockname(struct tcb * tcp)198 decode_sockname(struct tcb *tcp)
199 {
200 int ulen, rlen;
201
202 if (entering(tcp)) {
203 printfd(tcp, tcp->u_arg[0]);
204 tprints(", ");
205 if (fetch_socklen(tcp, &ulen, tcp->u_arg[1], tcp->u_arg[2])) {
206 set_tcb_priv_ulong(tcp, ulen);
207 return 0;
208 } else {
209 printaddr(tcp->u_arg[1]);
210 tprints(", ");
211 printaddr(tcp->u_arg[2]);
212 return RVAL_DECODED;
213 }
214 }
215
216 ulen = get_tcb_priv_ulong(tcp);
217
218 if (syserror(tcp) || umove(tcp, tcp->u_arg[2], &rlen) < 0) {
219 printaddr(tcp->u_arg[1]);
220 tprintf(", [%d]", ulen);
221 } else {
222 decode_sockaddr(tcp, tcp->u_arg[1], ulen > rlen ? rlen : ulen);
223 if (ulen != rlen)
224 tprintf(", [%d->%d]", ulen, rlen);
225 else
226 tprintf(", [%d]", rlen);
227 }
228
229 return RVAL_DECODED;
230 }
231
SYS_FUNC(accept)232 SYS_FUNC(accept)
233 {
234 return decode_sockname(tcp) | RVAL_FD;
235 }
236
SYS_FUNC(accept4)237 SYS_FUNC(accept4)
238 {
239 int rc = decode_sockname(tcp);
240
241 if (rc & RVAL_DECODED) {
242 tprints(", ");
243 printflags(sock_type_flags, tcp->u_arg[3], "SOCK_???");
244 }
245
246 return rc | RVAL_FD;
247 }
248
SYS_FUNC(send)249 SYS_FUNC(send)
250 {
251 printfd(tcp, tcp->u_arg[0]);
252 tprints(", ");
253 decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1], tcp->u_arg[2]);
254 tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
255 /* flags */
256 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
257
258 return RVAL_DECODED;
259 }
260
SYS_FUNC(sendto)261 SYS_FUNC(sendto)
262 {
263 printfd(tcp, tcp->u_arg[0]);
264 tprints(", ");
265 decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1], tcp->u_arg[2]);
266 tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
267 /* flags */
268 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
269 /* to address */
270 const int addrlen = tcp->u_arg[5];
271 tprints(", ");
272 decode_sockaddr(tcp, tcp->u_arg[4], addrlen);
273 /* to length */
274 tprintf(", %d", addrlen);
275
276 return RVAL_DECODED;
277 }
278
SYS_FUNC(recv)279 SYS_FUNC(recv)
280 {
281 if (entering(tcp)) {
282 printfd(tcp, tcp->u_arg[0]);
283 tprints(", ");
284 } else {
285 if (syserror(tcp)) {
286 printaddr(tcp->u_arg[1]);
287 } else {
288 decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1],
289 tcp->u_rval);
290 }
291
292 tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
293 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
294 }
295 return 0;
296 }
297
SYS_FUNC(recvfrom)298 SYS_FUNC(recvfrom)
299 {
300 int ulen, rlen;
301
302 if (entering(tcp)) {
303 printfd(tcp, tcp->u_arg[0]);
304 tprints(", ");
305 if (fetch_socklen(tcp, &ulen, tcp->u_arg[4], tcp->u_arg[5])) {
306 set_tcb_priv_ulong(tcp, ulen);
307 }
308 } else {
309 /* buf */
310 if (syserror(tcp)) {
311 printaddr(tcp->u_arg[1]);
312 } else {
313 decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1],
314 tcp->u_rval);
315 }
316 /* size */
317 tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
318 /* flags */
319 printflags(msg_flags, tcp->u_arg[3], "MSG_???");
320 tprints(", ");
321
322 ulen = get_tcb_priv_ulong(tcp);
323
324 if (!fetch_socklen(tcp, &rlen, tcp->u_arg[4], tcp->u_arg[5])) {
325 /* from address */
326 printaddr(tcp->u_arg[4]);
327 tprints(", ");
328 /* from length */
329 printaddr(tcp->u_arg[5]);
330 return 0;
331 }
332 if (syserror(tcp)) {
333 /* from address */
334 printaddr(tcp->u_arg[4]);
335 /* from length */
336 tprintf(", [%d]", ulen);
337 return 0;
338 }
339 /* from address */
340 decode_sockaddr(tcp, tcp->u_arg[4], ulen > rlen ? rlen : ulen);
341 /* from length */
342 if (ulen != rlen)
343 tprintf(", [%d->%d]", ulen, rlen);
344 else
345 tprintf(", [%d]", rlen);
346 }
347 return 0;
348 }
349
350 #include "xlat/shutdown_modes.h"
351
SYS_FUNC(shutdown)352 SYS_FUNC(shutdown)
353 {
354 printfd(tcp, tcp->u_arg[0]);
355 tprints(", ");
356 printxval(shutdown_modes, tcp->u_arg[1], "SHUT_???");
357
358 return RVAL_DECODED;
359 }
360
SYS_FUNC(getsockname)361 SYS_FUNC(getsockname)
362 {
363 return decode_sockname(tcp);
364 }
365
366 static void
printpair_fd(struct tcb * tcp,const int i0,const int i1)367 printpair_fd(struct tcb *tcp, const int i0, const int i1)
368 {
369 tprints("[");
370 printfd(tcp, i0);
371 tprints(", ");
372 printfd(tcp, i1);
373 tprints("]");
374 }
375
376 static void
decode_pair_fd(struct tcb * const tcp,const kernel_ulong_t addr)377 decode_pair_fd(struct tcb *const tcp, const kernel_ulong_t addr)
378 {
379 int pair[2];
380
381 if (umove_or_printaddr(tcp, addr, &pair))
382 return;
383
384 printpair_fd(tcp, pair[0], pair[1]);
385 }
386
387 static int
do_pipe(struct tcb * tcp,int flags_arg)388 do_pipe(struct tcb *tcp, int flags_arg)
389 {
390 if (exiting(tcp)) {
391 decode_pair_fd(tcp, tcp->u_arg[0]);
392 if (flags_arg >= 0) {
393 tprints(", ");
394 printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???");
395 }
396 }
397 return 0;
398 }
399
SYS_FUNC(pipe)400 SYS_FUNC(pipe)
401 {
402 #ifdef HAVE_GETRVAL2
403 if (exiting(tcp) && !syserror(tcp))
404 printpair_fd(tcp, tcp->u_rval, getrval2(tcp));
405 return 0;
406 #else
407 return do_pipe(tcp, -1);
408 #endif
409 }
410
SYS_FUNC(pipe2)411 SYS_FUNC(pipe2)
412 {
413 return do_pipe(tcp, 1);
414 }
415
SYS_FUNC(socketpair)416 SYS_FUNC(socketpair)
417 {
418 if (entering(tcp)) {
419 printxval(addrfams, tcp->u_arg[0], "AF_???");
420 tprints(", ");
421 tprint_sock_type(tcp->u_arg[1]);
422 tprintf(", %" PRI_klu, tcp->u_arg[2]);
423 } else {
424 tprints(", ");
425 decode_pair_fd(tcp, tcp->u_arg[3]);
426 }
427 return 0;
428 }
429
430 #include "xlat/sockoptions.h"
431 #include "xlat/sockipoptions.h"
432 #include "xlat/getsockipoptions.h"
433 #include "xlat/setsockipoptions.h"
434 #include "xlat/sockipv6options.h"
435 #include "xlat/getsockipv6options.h"
436 #include "xlat/setsockipv6options.h"
437 #include "xlat/sockipxoptions.h"
438 #include "xlat/sockrawoptions.h"
439 #include "xlat/sockpacketoptions.h"
440 #include "xlat/socksctpoptions.h"
441 #include "xlat/socktcpoptions.h"
442
443 static void
print_sockopt_fd_level_name(struct tcb * tcp,int fd,unsigned int level,unsigned int name,bool is_getsockopt)444 print_sockopt_fd_level_name(struct tcb *tcp, int fd, unsigned int level,
445 unsigned int name, bool is_getsockopt)
446 {
447 printfd(tcp, fd);
448 tprints(", ");
449 printxval(socketlayers, level, "SOL_??");
450 tprints(", ");
451
452 switch (level) {
453 case SOL_SOCKET:
454 printxval(sockoptions, name, "SO_???");
455 break;
456 case SOL_IP:
457 printxvals(name, "IP_???", sockipoptions,
458 is_getsockopt ? getsockipoptions : setsockipoptions, NULL);
459 break;
460 case SOL_IPV6:
461 printxvals(name, "IPV6_???", sockipv6options,
462 is_getsockopt ? getsockipv6options : setsockipv6options, NULL);
463 break;
464 case SOL_IPX:
465 printxval(sockipxoptions, name, "IPX_???");
466 break;
467 case SOL_PACKET:
468 printxval(sockpacketoptions, name, "PACKET_???");
469 break;
470 case SOL_TCP:
471 printxval(socktcpoptions, name, "TCP_???");
472 break;
473 case SOL_SCTP:
474 printxval(socksctpoptions, name, "SCTP_???");
475 break;
476 case SOL_RAW:
477 printxval(sockrawoptions, name, "RAW_???");
478 break;
479
480 /* Other SOL_* protocol levels still need work. */
481
482 default:
483 tprintf("%u", name);
484 }
485
486 tprints(", ");
487 }
488
489 static void
print_linger(struct tcb * const tcp,const kernel_ulong_t addr,const int len)490 print_linger(struct tcb *const tcp, const kernel_ulong_t addr, const int len)
491 {
492 struct linger linger;
493
494 if (len != sizeof(linger) ||
495 umove(tcp, addr, &linger) < 0) {
496 printaddr(addr);
497 return;
498 }
499
500 tprintf("{onoff=%d, linger=%d}",
501 linger.l_onoff,
502 linger.l_linger);
503 }
504
505 #ifdef SO_PEERCRED
506 static void
print_ucred(struct tcb * const tcp,const kernel_ulong_t addr,const int len)507 print_ucred(struct tcb *const tcp, const kernel_ulong_t addr, const int len)
508 {
509 struct ucred uc;
510
511 if (len != sizeof(uc) ||
512 umove(tcp, addr, &uc) < 0) {
513 printaddr(addr);
514 } else {
515 tprintf("{pid=%u, uid=%u, gid=%u}",
516 (unsigned) uc.pid,
517 (unsigned) uc.uid,
518 (unsigned) uc.gid);
519 }
520 }
521 #endif /* SO_PEERCRED */
522
523 #ifdef PACKET_STATISTICS
524 static void
print_tpacket_stats(struct tcb * const tcp,const kernel_ulong_t addr,const int len)525 print_tpacket_stats(struct tcb *const tcp, const kernel_ulong_t addr,
526 const int len)
527 {
528 struct tpacket_stats stats;
529
530 if (len != sizeof(stats) ||
531 umove(tcp, addr, &stats) < 0) {
532 printaddr(addr);
533 } else {
534 tprintf("{packets=%u, drops=%u}",
535 stats.tp_packets,
536 stats.tp_drops);
537 }
538 }
539 #endif /* PACKET_STATISTICS */
540
541 #include "xlat/icmpfilterflags.h"
542
543 static void
print_icmp_filter(struct tcb * const tcp,const kernel_ulong_t addr,int len)544 print_icmp_filter(struct tcb *const tcp, const kernel_ulong_t addr, int len)
545 {
546 struct icmp_filter filter = {};
547
548 if (len > (int) sizeof(filter))
549 len = sizeof(filter);
550 else if (len <= 0) {
551 printaddr(addr);
552 return;
553 }
554
555 if (umoven_or_printaddr(tcp, addr, len, &filter))
556 return;
557
558 tprints("~(");
559 printflags(icmpfilterflags, ~filter.data, "ICMP_???");
560 tprints(")");
561 }
562
563 static void
print_getsockopt(struct tcb * const tcp,const unsigned int level,const unsigned int name,const kernel_ulong_t addr,const int len)564 print_getsockopt(struct tcb *const tcp, const unsigned int level,
565 const unsigned int name, const kernel_ulong_t addr,
566 const int len)
567 {
568 if (addr && verbose(tcp))
569 switch (level) {
570 case SOL_SOCKET:
571 switch (name) {
572 case SO_LINGER:
573 print_linger(tcp, addr, len);
574 goto done;
575 #ifdef SO_PEERCRED
576 case SO_PEERCRED:
577 print_ucred(tcp, addr, len);
578 goto done;
579 #endif
580 }
581 break;
582
583 case SOL_PACKET:
584 switch (name) {
585 #ifdef PACKET_STATISTICS
586 case PACKET_STATISTICS:
587 print_tpacket_stats(tcp, addr, len);
588 goto done;
589 #endif
590 }
591 break;
592
593 case SOL_RAW:
594 switch (name) {
595 case ICMP_FILTER:
596 print_icmp_filter(tcp, addr, len);
597 goto done;
598 }
599 break;
600 }
601
602 /* default arg printing */
603
604 if (verbose(tcp)) {
605 if (len == sizeof(int)) {
606 printnum_int(tcp, addr, "%d");
607 } else {
608 printstrn(tcp, addr, len);
609 }
610 } else {
611 printaddr(addr);
612 }
613 done:
614 tprintf(", [%d]", len);
615 }
616
SYS_FUNC(getsockopt)617 SYS_FUNC(getsockopt)
618 {
619 if (entering(tcp)) {
620 print_sockopt_fd_level_name(tcp, tcp->u_arg[0],
621 tcp->u_arg[1], tcp->u_arg[2], true);
622 } else {
623 int len;
624
625 if (syserror(tcp) || umove(tcp, tcp->u_arg[4], &len) < 0) {
626 printaddr(tcp->u_arg[3]);
627 tprints(", ");
628 printaddr(tcp->u_arg[4]);
629 } else {
630 print_getsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2],
631 tcp->u_arg[3], len);
632 }
633 }
634 return 0;
635 }
636
637 #ifdef IP_ADD_MEMBERSHIP
638 static void
print_mreq(struct tcb * const tcp,const kernel_ulong_t addr,const unsigned int len)639 print_mreq(struct tcb *const tcp, const kernel_ulong_t addr,
640 const unsigned int len)
641 {
642 struct ip_mreq mreq;
643
644 if (len < sizeof(mreq)) {
645 printstrn(tcp, addr, len);
646 return;
647 }
648 if (umove_or_printaddr(tcp, addr, &mreq))
649 return;
650
651 tprintf("{imr_multiaddr=inet_addr(\"%s\")",
652 inet_ntoa(mreq.imr_multiaddr));
653 tprintf(", imr_interface=inet_addr(\"%s\")}",
654 inet_ntoa(mreq.imr_interface));
655 }
656 #endif /* IP_ADD_MEMBERSHIP */
657
658 #ifdef IPV6_ADD_MEMBERSHIP
659 static void
print_mreq6(struct tcb * const tcp,const kernel_ulong_t addr,const unsigned int len)660 print_mreq6(struct tcb *const tcp, const kernel_ulong_t addr,
661 const unsigned int len)
662 {
663 struct ipv6_mreq mreq;
664
665 if (len < sizeof(mreq)) {
666 printstrn(tcp, addr, len);
667 return;
668 }
669 if (umove_or_printaddr(tcp, addr, &mreq))
670 return;
671
672 tprints("{");
673 print_inet_addr(AF_INET6, &mreq.ipv6mr_multiaddr,
674 sizeof(mreq.ipv6mr_multiaddr), "ipv6mr_multiaddr");
675
676 tprints(", ipv6mr_interface=");
677 print_ifindex(mreq.ipv6mr_interface);
678 tprints("}");
679 }
680 #endif /* IPV6_ADD_MEMBERSHIP */
681
682 #ifdef MCAST_JOIN_GROUP
683 static void
print_group_req(struct tcb * const tcp,const kernel_ulong_t addr,const int len)684 print_group_req(struct tcb *const tcp, const kernel_ulong_t addr, const int len)
685 {
686 struct group_req greq;
687
688 if (len != sizeof(greq) ||
689 umove(tcp, addr, &greq) < 0) {
690 printaddr(addr);
691 return;
692 }
693
694 tprintf("{gr_interface=%u, gr_group=", greq.gr_interface);
695 print_sockaddr(tcp, &greq.gr_group, sizeof(greq.gr_group));
696 tprints("}");
697
698 }
699 #endif /* MCAST_JOIN_GROUP */
700
701 #ifdef PACKET_RX_RING
702 static void
print_tpacket_req(struct tcb * const tcp,const kernel_ulong_t addr,const int len)703 print_tpacket_req(struct tcb *const tcp, const kernel_ulong_t addr, const int len)
704 {
705 struct tpacket_req req;
706
707 if (len != sizeof(req) ||
708 umove(tcp, addr, &req) < 0) {
709 printaddr(addr);
710 } else {
711 tprintf("{block_size=%u, block_nr=%u, "
712 "frame_size=%u, frame_nr=%u}",
713 req.tp_block_size,
714 req.tp_block_nr,
715 req.tp_frame_size,
716 req.tp_frame_nr);
717 }
718 }
719 #endif /* PACKET_RX_RING */
720
721 #ifdef PACKET_ADD_MEMBERSHIP
722 # include "xlat/packet_mreq_type.h"
723
724 static void
print_packet_mreq(struct tcb * const tcp,const kernel_ulong_t addr,const int len)725 print_packet_mreq(struct tcb *const tcp, const kernel_ulong_t addr, const int len)
726 {
727 struct packet_mreq mreq;
728
729 if (len != sizeof(mreq) ||
730 umove(tcp, addr, &mreq) < 0) {
731 printaddr(addr);
732 } else {
733 unsigned int i;
734
735 tprintf("{mr_ifindex=%u, mr_type=", mreq.mr_ifindex);
736 printxval(packet_mreq_type, mreq.mr_type, "PACKET_MR_???");
737 tprintf(", mr_alen=%u, mr_address=", mreq.mr_alen);
738 if (mreq.mr_alen > ARRAY_SIZE(mreq.mr_address))
739 mreq.mr_alen = ARRAY_SIZE(mreq.mr_address);
740 for (i = 0; i < mreq.mr_alen; ++i)
741 tprintf("%02x", mreq.mr_address[i]);
742 tprints("}");
743 }
744 }
745 #endif /* PACKET_ADD_MEMBERSHIP */
746
747 static void
print_setsockopt(struct tcb * const tcp,const unsigned int level,const unsigned int name,const kernel_ulong_t addr,const int len)748 print_setsockopt(struct tcb *const tcp, const unsigned int level,
749 const unsigned int name, const kernel_ulong_t addr,
750 const int len)
751 {
752 if (addr && verbose(tcp))
753 switch (level) {
754 case SOL_SOCKET:
755 switch (name) {
756 case SO_LINGER:
757 print_linger(tcp, addr, len);
758 goto done;
759 }
760 break;
761
762 case SOL_IP:
763 switch (name) {
764 #ifdef IP_ADD_MEMBERSHIP
765 case IP_ADD_MEMBERSHIP:
766 case IP_DROP_MEMBERSHIP:
767 print_mreq(tcp, addr, len);
768 goto done;
769 #endif /* IP_ADD_MEMBERSHIP */
770 #ifdef MCAST_JOIN_GROUP
771 case MCAST_JOIN_GROUP:
772 case MCAST_LEAVE_GROUP:
773 print_group_req(tcp, addr, len);
774 goto done;
775 #endif /* MCAST_JOIN_GROUP */
776 }
777 break;
778
779 case SOL_IPV6:
780 switch (name) {
781 #ifdef IPV6_ADD_MEMBERSHIP
782 case IPV6_ADD_MEMBERSHIP:
783 case IPV6_DROP_MEMBERSHIP:
784 # ifdef IPV6_JOIN_ANYCAST
785 case IPV6_JOIN_ANYCAST:
786 # endif
787 # ifdef IPV6_LEAVE_ANYCAST
788 case IPV6_LEAVE_ANYCAST:
789 # endif
790 print_mreq6(tcp, addr, len);
791 goto done;
792 #endif /* IPV6_ADD_MEMBERSHIP */
793 }
794 break;
795
796 case SOL_PACKET:
797 switch (name) {
798 #ifdef PACKET_RX_RING
799 case PACKET_RX_RING:
800 # ifdef PACKET_TX_RING
801 case PACKET_TX_RING:
802 # endif
803 print_tpacket_req(tcp, addr, len);
804 goto done;
805 #endif /* PACKET_RX_RING */
806 #ifdef PACKET_ADD_MEMBERSHIP
807 case PACKET_ADD_MEMBERSHIP:
808 case PACKET_DROP_MEMBERSHIP:
809 print_packet_mreq(tcp, addr, len);
810 goto done;
811 #endif /* PACKET_ADD_MEMBERSHIP */
812 }
813 break;
814
815 case SOL_RAW:
816 switch (name) {
817 case ICMP_FILTER:
818 print_icmp_filter(tcp, addr, len);
819 goto done;
820 }
821 break;
822 }
823
824 /* default arg printing */
825
826 if (verbose(tcp)) {
827 if (len == sizeof(int)) {
828 printnum_int(tcp, addr, "%d");
829 } else {
830 printstrn(tcp, addr, len);
831 }
832 } else {
833 printaddr(addr);
834 }
835 done:
836 tprintf(", %d", len);
837 }
838
SYS_FUNC(setsockopt)839 SYS_FUNC(setsockopt)
840 {
841 print_sockopt_fd_level_name(tcp, tcp->u_arg[0],
842 tcp->u_arg[1], tcp->u_arg[2], false);
843 print_setsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2],
844 tcp->u_arg[3], tcp->u_arg[4]);
845
846 return RVAL_DECODED;
847 }
848