strace/net.c
Dmitry V. Levin 476b03b33a net: fix off-by-one error in sorted xlat lookup
* net.c (ax25_protocols): Decrement xlat size by one to account
for XLAT_END as other users of sorted xlats do.

Fixes: v4.25~28 "net: add support for AX.25 protocols and socket option names decoding"
2018-12-23 22:12:36 +00:00

1092 lines
24 KiB
C

/*
* Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
* Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
* Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
* Copyright (c) 1996-2000 Wichert Akkerman <wichert@cistron.nl>
* Copyright (c) 1999-2018 The strace developers.
* All rights reserved.
*
* SPDX-License-Identifier: LGPL-2.1-or-later
*/
#include "defs.h"
#include "print_fields.h"
#include <sys/stat.h>
#include <sys/socket.h>
#include <sys/uio.h>
#include <sys/un.h>
#include <netinet/in.h>
#ifdef HAVE_NETINET_TCP_H
# include <netinet/tcp.h>
#endif
#ifdef HAVE_NETINET_UDP_H
# include <netinet/udp.h>
#endif
#ifdef HAVE_NETINET_SCTP_H
# include <netinet/sctp.h>
#endif
#include <arpa/inet.h>
#include <net/if.h>
#include <asm/types.h>
#ifdef HAVE_NETIPX_IPX_H
# include <netipx/ipx.h>
#else
# include <linux/ipx.h>
#endif
#if defined(HAVE_LINUX_IP_VS_H)
# include <linux/ip_vs.h>
#endif
#include "netlink.h"
#if defined(HAVE_LINUX_NETFILTER_ARP_ARP_TABLES_H)
# include <linux/netfilter_arp/arp_tables.h>
#endif
#if defined(HAVE_LINUX_NETFILTER_BRIDGE_EBTABLES_H)
# include <linux/netfilter_bridge/ebtables.h>
#endif
#if defined(HAVE_LINUX_NETFILTER_IPV4_IP_TABLES_H)
# include <linux/netfilter_ipv4/ip_tables.h>
#endif
#if defined(HAVE_LINUX_NETFILTER_IPV6_IP6_TABLES_H)
# include <linux/netfilter_ipv6/ip6_tables.h>
#endif
#include <linux/if_packet.h>
#include <linux/icmp.h>
#include "xlat/socktypes.h"
#include "xlat/sock_type_flags.h"
#ifndef SOCK_TYPE_MASK
# define SOCK_TYPE_MASK 0xf
#endif
#include "xlat/socketlayers.h"
#include "xlat/inet_protocols.h"
#define XLAT_MACROS_ONLY
# include "xlat/addrfams.h"
# include "xlat/ethernet_protocols.h"
#undef XLAT_MACROS_ONLY
#include "xlat/ax25_protocols.h"
#include "xlat/irda_protocols.h"
#include "xlat/can_protocols.h"
#include "xlat/bt_protocols.h"
#include "xlat/isdn_protocols.h"
#include "xlat/phonet_protocols.h"
#include "xlat/caif_protocols.h"
#include "xlat/nfc_protocols.h"
#include "xlat/kcm_protocols.h"
#include "xlat/smc_protocols.h"
const size_t inet_protocols_size = ARRAY_SIZE(inet_protocols) - 1;
static void
decode_sockbuf(struct tcb *const tcp, const int fd, const kernel_ulong_t addr,
const kernel_ulong_t addrlen)
{
switch (verbose(tcp) ? getfdproto(tcp, fd) : SOCK_PROTO_UNKNOWN) {
case SOCK_PROTO_NETLINK:
decode_netlink(tcp, fd, addr, addrlen);
break;
default:
printstrn(tcp, addr, addrlen);
}
}
/*
* low bits of the socket type define real socket type,
* other bits are socket type flags.
*/
static void
tprint_sock_type(unsigned int flags)
{
const char *str = xlookup(socktypes, flags & SOCK_TYPE_MASK);
if (str) {
print_xlat_ex(flags & SOCK_TYPE_MASK, str, XLAT_STYLE_DEFAULT);
flags &= ~SOCK_TYPE_MASK;
if (!flags)
return;
tprints("|");
}
printflags(sock_type_flags, flags, "SOCK_???");
}
SYS_FUNC(socket)
{
printxval(addrfams, tcp->u_arg[0], "AF_???");
tprints(", ");
tprint_sock_type(tcp->u_arg[1]);
tprints(", ");
switch (tcp->u_arg[0]) {
case AF_INET:
case AF_INET6:
printxval_search(inet_protocols, tcp->u_arg[2], "IPPROTO_???");
break;
case AF_AX25:
/* Those are not available in public headers. */
printxval_searchn_ex(ARRSZ_PAIR(ax25_protocols) - 1,
tcp->u_arg[2], "AX25_P_???",
XLAT_STYLE_VERBOSE);
break;
case AF_NETLINK:
printxval(netlink_protocols, tcp->u_arg[2], "NETLINK_???");
break;
case AF_PACKET:
tprints("htons(");
printxval_searchn(ethernet_protocols, ethernet_protocols_size,
ntohs(tcp->u_arg[2]), "ETH_P_???");
tprints(")");
break;
case AF_IRDA:
printxval_index(can_protocols, tcp->u_arg[2], "IRDAPROTO_???");
break;
case AF_CAN:
printxval_index(can_protocols, tcp->u_arg[2], "CAN_???");
break;
case AF_BLUETOOTH:
printxval_index(bt_protocols, tcp->u_arg[2], "BTPROTO_???");
break;
case AF_RXRPC:
printxval(addrfams, tcp->u_arg[2], "AF_???");
break;
case AF_ISDN:
printxval(isdn_protocols, tcp->u_arg[2], "ISDN_P_???");
break;
case AF_PHONET:
printxval_index(phonet_protocols, tcp->u_arg[2], "PN_PROTO_???");
break;
case AF_CAIF:
printxval_index(caif_protocols, tcp->u_arg[2], "CAIFPROTO_???");
break;
case AF_NFC:
printxval_index(nfc_protocols, tcp->u_arg[2],
"NFC_SOCKPROTO_???");
break;
case AF_KCM:
printxval_index(kcm_protocols, tcp->u_arg[2], "KCMPROTO_???");
break;
case AF_SMC:
printxval_index(smc_protocols, tcp->u_arg[2], "SMCPROTO_???");
break;
default:
tprintf("%" PRI_klu, tcp->u_arg[2]);
break;
}
return RVAL_DECODED | RVAL_FD;
}
static bool
fetch_socklen(struct tcb *const tcp, int *const plen,
const kernel_ulong_t sockaddr, const kernel_ulong_t socklen)
{
return verbose(tcp) && sockaddr && socklen
&& umove(tcp, socklen, plen) == 0;
}
static int
decode_sockname(struct tcb *tcp)
{
int ulen, rlen;
if (entering(tcp)) {
printfd(tcp, tcp->u_arg[0]);
tprints(", ");
if (fetch_socklen(tcp, &ulen, tcp->u_arg[1], tcp->u_arg[2])) {
set_tcb_priv_ulong(tcp, ulen);
return 0;
} else {
printaddr(tcp->u_arg[1]);
tprints(", ");
printaddr(tcp->u_arg[2]);
return RVAL_DECODED;
}
}
ulen = get_tcb_priv_ulong(tcp);
if (syserror(tcp) || umove(tcp, tcp->u_arg[2], &rlen) < 0) {
printaddr(tcp->u_arg[1]);
tprintf(", [%d]", ulen);
} else {
decode_sockaddr(tcp, tcp->u_arg[1], ulen > rlen ? rlen : ulen);
if (ulen != rlen)
tprintf(", [%d->%d]", ulen, rlen);
else
tprintf(", [%d]", rlen);
}
return RVAL_DECODED;
}
SYS_FUNC(accept)
{
return decode_sockname(tcp) | RVAL_FD;
}
SYS_FUNC(accept4)
{
int rc = decode_sockname(tcp);
if (rc & RVAL_DECODED) {
tprints(", ");
printflags(sock_type_flags, tcp->u_arg[3], "SOCK_???");
}
return rc | RVAL_FD;
}
SYS_FUNC(send)
{
printfd(tcp, tcp->u_arg[0]);
tprints(", ");
decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1], tcp->u_arg[2]);
tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
/* flags */
printflags(msg_flags, tcp->u_arg[3], "MSG_???");
return RVAL_DECODED;
}
SYS_FUNC(sendto)
{
printfd(tcp, tcp->u_arg[0]);
tprints(", ");
decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1], tcp->u_arg[2]);
tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
/* flags */
printflags(msg_flags, tcp->u_arg[3], "MSG_???");
/* to address */
const int addrlen = tcp->u_arg[5];
tprints(", ");
decode_sockaddr(tcp, tcp->u_arg[4], addrlen);
/* to length */
tprintf(", %d", addrlen);
return RVAL_DECODED;
}
SYS_FUNC(recv)
{
if (entering(tcp)) {
printfd(tcp, tcp->u_arg[0]);
tprints(", ");
} else {
if (syserror(tcp)) {
printaddr(tcp->u_arg[1]);
} else {
decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1],
tcp->u_rval);
}
tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
printflags(msg_flags, tcp->u_arg[3], "MSG_???");
}
return 0;
}
SYS_FUNC(recvfrom)
{
int ulen, rlen;
if (entering(tcp)) {
printfd(tcp, tcp->u_arg[0]);
tprints(", ");
if (fetch_socklen(tcp, &ulen, tcp->u_arg[4], tcp->u_arg[5])) {
set_tcb_priv_ulong(tcp, ulen);
}
} else {
/* buf */
if (syserror(tcp)) {
printaddr(tcp->u_arg[1]);
} else {
decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1],
tcp->u_rval);
}
/* size */
tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
/* flags */
printflags(msg_flags, tcp->u_arg[3], "MSG_???");
tprints(", ");
ulen = get_tcb_priv_ulong(tcp);
if (!fetch_socklen(tcp, &rlen, tcp->u_arg[4], tcp->u_arg[5])) {
/* from address */
printaddr(tcp->u_arg[4]);
tprints(", ");
/* from length */
printaddr(tcp->u_arg[5]);
return 0;
}
if (syserror(tcp)) {
/* from address */
printaddr(tcp->u_arg[4]);
/* from length */
tprintf(", [%d]", ulen);
return 0;
}
/* from address */
decode_sockaddr(tcp, tcp->u_arg[4], ulen > rlen ? rlen : ulen);
/* from length */
if (ulen != rlen)
tprintf(", [%d->%d]", ulen, rlen);
else
tprintf(", [%d]", rlen);
}
return 0;
}
SYS_FUNC(getsockname)
{
return decode_sockname(tcp);
}
static void
printpair_fd(struct tcb *tcp, const int i0, const int i1)
{
tprints("[");
printfd(tcp, i0);
tprints(", ");
printfd(tcp, i1);
tprints("]");
}
static void
decode_pair_fd(struct tcb *const tcp, const kernel_ulong_t addr)
{
int pair[2];
if (umove_or_printaddr(tcp, addr, &pair))
return;
printpair_fd(tcp, pair[0], pair[1]);
}
static int
do_pipe(struct tcb *tcp, int flags_arg)
{
if (exiting(tcp)) {
decode_pair_fd(tcp, tcp->u_arg[0]);
if (flags_arg >= 0) {
tprints(", ");
printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???");
}
}
return 0;
}
SYS_FUNC(pipe)
{
#if HAVE_ARCH_GETRVAL2
if (exiting(tcp) && !syserror(tcp))
printpair_fd(tcp, tcp->u_rval, getrval2(tcp));
return 0;
#else
return do_pipe(tcp, -1);
#endif
}
SYS_FUNC(pipe2)
{
return do_pipe(tcp, 1);
}
SYS_FUNC(socketpair)
{
if (entering(tcp)) {
printxval(addrfams, tcp->u_arg[0], "AF_???");
tprints(", ");
tprint_sock_type(tcp->u_arg[1]);
tprintf(", %" PRI_klu, tcp->u_arg[2]);
} else {
tprints(", ");
decode_pair_fd(tcp, tcp->u_arg[3]);
}
return 0;
}
#include "xlat/sock_options.h"
#include "xlat/getsock_options.h"
#include "xlat/setsock_options.h"
#include "xlat/sock_ip_options.h"
#include "xlat/getsock_ip_options.h"
#include "xlat/setsock_ip_options.h"
#include "xlat/sock_ipv6_options.h"
#include "xlat/getsock_ipv6_options.h"
#include "xlat/setsock_ipv6_options.h"
#include "xlat/sock_ipx_options.h"
#include "xlat/sock_ax25_options.h"
#include "xlat/sock_netlink_options.h"
#include "xlat/sock_packet_options.h"
#include "xlat/sock_raw_options.h"
#include "xlat/sock_sctp_options.h"
#include "xlat/sock_tcp_options.h"
#include "xlat/sock_udp_options.h"
#include "xlat/sock_irda_options.h"
#include "xlat/sock_llc_options.h"
#include "xlat/sock_dccp_options.h"
#include "xlat/sock_tipc_options.h"
#include "xlat/sock_rxrpc_options.h"
#include "xlat/sock_pppol2tp_options.h"
#include "xlat/sock_bluetooth_options.h"
#include "xlat/sock_pnp_options.h"
#include "xlat/sock_rds_options.h"
#include "xlat/sock_iucv_options.h"
#include "xlat/sock_caif_options.h"
#include "xlat/sock_alg_options.h"
#include "xlat/sock_nfcllcp_options.h"
#include "xlat/sock_kcm_options.h"
#include "xlat/sock_tls_options.h"
#include "xlat/sock_xdp_options.h"
static void
print_sockopt_fd_level_name(struct tcb *tcp, int fd, unsigned int level,
unsigned int name, bool is_getsockopt)
{
printfd(tcp, fd);
tprints(", ");
printxval_search(socketlayers, level, "SOL_??");
tprints(", ");
switch (level) {
case SOL_SOCKET:
printxvals(name, "SO_???", sock_options,
is_getsockopt ? getsock_options :
setsock_options, NULL);
break;
case SOL_IP:
printxvals(name, "IP_???", sock_ip_options,
is_getsockopt ? getsock_ip_options :
setsock_ip_options, NULL);
break;
case SOL_IPV6:
printxvals(name, "IPV6_???", sock_ipv6_options,
is_getsockopt ? getsock_ipv6_options :
setsock_ipv6_options, NULL);
break;
case SOL_IPX:
printxval(sock_ipx_options, name, "IPX_???");
break;
case SOL_AX25:
printxval_search(sock_ax25_options, name, "AX25_???");
break;
case SOL_PACKET:
printxval(sock_packet_options, name, "PACKET_???");
break;
case SOL_TCP:
printxval_index(sock_tcp_options, name, "TCP_???");
break;
case SOL_SCTP:
printxval(sock_sctp_options, name, "SCTP_???");
break;
case SOL_RAW:
printxval(sock_raw_options, name, "RAW_???");
break;
case SOL_NETLINK:
printxval(sock_netlink_options, name, "NETLINK_???");
break;
case SOL_UDP:
printxval(sock_udp_options, name, "UDP_???");
break;
case SOL_IRDA:
printxval_index(sock_irda_options, name, "IRLMP_???");
break;
case SOL_LLC:
printxval_index(sock_llc_options, name, "LLC_OPT_???");
break;
case SOL_DCCP:
printxval_search(sock_dccp_options, name, "DCCP_SOCKOPT_???");
break;
case SOL_TIPC:
printxval_search(sock_tipc_options, name, "TIPC_???");
break;
case SOL_RXRPC:
printxval_index(sock_rxrpc_options, name, "RXRPC_???");
break;
case SOL_PPPOL2TP:
printxval_index(sock_pppol2tp_options, name, "PPPOL2TP_SO_???");
break;
case SOL_BLUETOOTH:
printxval_search(sock_bluetooth_options, name, "BT_???");
break;
case SOL_PNPIPE:
printxval(sock_pnp_options, name, "PNPIPE_???");
break;
case SOL_RDS:
printxval_search(sock_rds_options, name, "RDS_???");
break;
case SOL_IUCV:
printxval(sock_iucv_options, name, "SO_???");
break;
case SOL_CAIF:
printxval(sock_caif_options, name, "CAIFSO_???");
break;
case SOL_ALG:
printxval_index(sock_alg_options, name, "ALG_???");
break;
case SOL_NFC:
printxval_index(sock_nfcllcp_options, name, "NFC_LLCP_???");
break;
case SOL_KCM:
printxval(sock_kcm_options, name, "KCM_???");
break;
case SOL_TLS:
printxval(sock_tls_options, name, "TLS_???");
break;
case SOL_XDP:
printxval_index(sock_xdp_options, name, "XDP_???");
break;
/* Other SOL_* protocol levels still need work. */
default:
tprintf("%u", name);
}
tprints(", ");
}
static void
print_get_linger(struct tcb *const tcp, const kernel_ulong_t addr,
unsigned int len)
{
struct linger linger;
/*
* The kernel cannot return len > sizeof(linger) because struct linger
* cannot change, but extra safety won't harm either.
*/
if (len > sizeof(linger))
len = sizeof(linger);
if (umoven_or_printaddr(tcp, addr, len, &linger))
return;
if (len < sizeof(linger.l_onoff)) {
tprints("{l_onoff=");
print_quoted_string((void *) &linger.l_onoff,
len, QUOTE_FORCE_HEX);
} else {
PRINT_FIELD_D("{", linger, l_onoff);
if (len > offsetof(struct linger, l_linger)) {
len -= offsetof(struct linger, l_linger);
if (len < sizeof(linger.l_linger)) {
tprints(", l_linger=");
print_quoted_string((void *) &linger.l_linger,
len, QUOTE_FORCE_HEX);
} else {
PRINT_FIELD_D(", ", linger, l_linger);
}
}
}
tprints("}");
}
static void
print_get_ucred(struct tcb *const tcp, const kernel_ulong_t addr,
unsigned int len)
{
struct ucred uc;
/*
* The kernel is very unlikely to return len > sizeof(uc)
* because struct ucred is very unlikely to change,
* but extra safety won't harm either.
*/
if (len > sizeof(uc))
len = sizeof(uc);
if (umoven_or_printaddr(tcp, addr, len, &uc))
return;
if (len < sizeof(uc.pid)) {
tprints("{pid=");
print_quoted_string((void *) &uc.pid,
len, QUOTE_FORCE_HEX);
} else {
PRINT_FIELD_D("{", uc, pid);
if (len > offsetof(struct ucred, uid)) {
len -= offsetof(struct ucred, uid);
if (len < sizeof(uc.uid)) {
tprints(", uid=");
print_quoted_string((void *) &uc.uid,
len, QUOTE_FORCE_HEX);
} else {
PRINT_FIELD_UID(", ", uc, uid);
if (len > offsetof(struct ucred, gid) -
offsetof(struct ucred, uid)) {
len -= offsetof(struct ucred, gid) -
offsetof(struct ucred, uid);
if (len < sizeof(uc.gid)) {
tprints(", gid=");
print_quoted_string((void *) &uc.gid,
len,
QUOTE_FORCE_HEX);
} else {
PRINT_FIELD_UID(", ", uc, gid);
}
}
}
}
}
tprints("}");
}
static void
print_get_error(struct tcb *const tcp, const kernel_ulong_t addr,
unsigned int len)
{
unsigned int err;
if (len > sizeof(err))
err = sizeof(err);
if (umoven_or_printaddr(tcp, addr, len, &err))
return;
tprints("[");
print_xlat_ex(err, err_name(err), XLAT_STYLE_FMT_U);
tprints("]");
}
#ifdef PACKET_STATISTICS
static void
print_tpacket_stats(struct tcb *const tcp, const kernel_ulong_t addr,
unsigned int len)
{
struct tp_stats {
unsigned int tp_packets, tp_drops, tp_freeze_q_cnt;
} stats;
/*
* The kernel may return len > sizeof(stats) if the kernel structure
* grew as it happened when tpacket_stats_v3 was introduced.
*/
if (len > sizeof(stats))
len = sizeof(stats);
if (umoven_or_printaddr(tcp, addr, len, &stats))
return;
if (len < sizeof(stats.tp_packets)) {
tprints("{tp_packets=");
print_quoted_string((void *) &stats.tp_packets,
len, QUOTE_FORCE_HEX);
} else {
PRINT_FIELD_U("{", stats, tp_packets);
if (len > offsetof(struct tp_stats, tp_drops)) {
len -= offsetof(struct tp_stats, tp_drops);
if (len < sizeof(stats.tp_drops)) {
tprints(", tp_drops=");
print_quoted_string((void *) &stats.tp_drops,
len, QUOTE_FORCE_HEX);
} else {
PRINT_FIELD_U(", ", stats, tp_drops);
if (len > offsetof(struct tp_stats, tp_freeze_q_cnt) -
offsetof(struct tp_stats, tp_drops)) {
len -= offsetof(struct tp_stats, tp_freeze_q_cnt) -
offsetof(struct tp_stats, tp_drops);
if (len < sizeof(stats.tp_freeze_q_cnt)) {
tprints(", tp_freeze_q_cnt=");
print_quoted_string((void *) &stats.tp_freeze_q_cnt,
len,
QUOTE_FORCE_HEX);
} else {
PRINT_FIELD_U(", ", stats, tp_freeze_q_cnt);
}
}
}
}
}
tprints("}");
}
#endif /* PACKET_STATISTICS */
#include "xlat/icmpfilterflags.h"
static void
print_icmp_filter(struct tcb *const tcp, const kernel_ulong_t addr, int len)
{
struct icmp_filter filter = {};
if (len > (int) sizeof(filter))
len = sizeof(filter);
else if (len <= 0) {
printaddr(addr);
return;
}
if (umoven_or_printaddr(tcp, addr, len, &filter))
return;
tprints("~(");
printflags(icmpfilterflags, ~filter.data, "ICMP_???");
tprints(")");
}
static void
print_getsockopt(struct tcb *const tcp, const unsigned int level,
const unsigned int name, const kernel_ulong_t addr,
const int ulen, const int rlen)
{
if (ulen <= 0 || rlen <= 0) {
/*
* As the kernel neither accepts nor returns a negative
* length in case of successful getsockopt syscall
* invocation, negative values must have been forged
* by userspace.
*/
printaddr(addr);
return;
}
if (addr && verbose(tcp))
switch (level) {
case SOL_SOCKET:
switch (name) {
case SO_LINGER:
print_get_linger(tcp, addr, rlen);
return;
case SO_PEERCRED:
print_get_ucred(tcp, addr, rlen);
return;
case SO_ATTACH_FILTER:
/*
* The length returned by the kernel in case of
* successful getsockopt syscall invocation is struct
* sock_fprog.len that has type unsigned short,
* anything else must have been forged by userspace.
*/
if ((unsigned short) rlen == (unsigned int) rlen)
print_sock_fprog(tcp, addr, rlen);
else
printaddr(addr);
return;
case SO_ERROR:
print_get_error(tcp, addr, rlen);
return;
}
break;
case SOL_PACKET:
switch (name) {
#ifdef PACKET_STATISTICS
case PACKET_STATISTICS:
print_tpacket_stats(tcp, addr, rlen);
return;
#endif
}
break;
case SOL_RAW:
switch (name) {
case ICMP_FILTER:
print_icmp_filter(tcp, addr, rlen);
return;
}
break;
case SOL_NETLINK:
switch (name) {
case NETLINK_LIST_MEMBERSHIPS: {
uint32_t buf;
print_array(tcp, addr, MIN(ulen, rlen) / sizeof(buf),
&buf, sizeof(buf),
tfetch_mem, print_uint32_array_member, 0);
break;
}
default:
printnum_int(tcp, addr, "%d");
break;
}
return;
}
/* default arg printing */
if (verbose(tcp)) {
if (rlen == sizeof(int)) {
printnum_int(tcp, addr, "%d");
} else {
printstrn(tcp, addr, rlen);
}
} else {
printaddr(addr);
}
}
SYS_FUNC(getsockopt)
{
int ulen, rlen;
if (entering(tcp)) {
print_sockopt_fd_level_name(tcp, tcp->u_arg[0],
tcp->u_arg[1], tcp->u_arg[2], true);
if (verbose(tcp) && tcp->u_arg[4]
&& umove(tcp, tcp->u_arg[4], &ulen) == 0) {
set_tcb_priv_ulong(tcp, ulen);
return 0;
} else {
printaddr(tcp->u_arg[3]);
tprints(", ");
printaddr(tcp->u_arg[4]);
return RVAL_DECODED;
}
} else {
ulen = get_tcb_priv_ulong(tcp);
if (syserror(tcp) || umove(tcp, tcp->u_arg[4], &rlen) < 0) {
printaddr(tcp->u_arg[3]);
tprintf(", [%d]", ulen);
} else {
print_getsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2],
tcp->u_arg[3], ulen, rlen);
if (ulen != rlen)
tprintf(", [%d->%d]", ulen, rlen);
else
tprintf(", [%d]", rlen);
}
}
return 0;
}
static void
print_set_linger(struct tcb *const tcp, const kernel_ulong_t addr,
const int len)
{
struct linger linger;
if (len < (int) sizeof(linger)) {
printaddr(addr);
} else if (!umove_or_printaddr(tcp, addr, &linger)) {
PRINT_FIELD_D("{", linger, l_onoff);
PRINT_FIELD_D(", ", linger, l_linger);
tprints("}");
}
}
#ifdef IP_ADD_MEMBERSHIP
static void
print_mreq(struct tcb *const tcp, const kernel_ulong_t addr,
const int len)
{
struct ip_mreq mreq;
if (len < (int) sizeof(mreq)) {
printaddr(addr);
} else if (!umove_or_printaddr(tcp, addr, &mreq)) {
PRINT_FIELD_INET4_ADDR("{", mreq, imr_multiaddr);
PRINT_FIELD_INET4_ADDR(", ", mreq, imr_interface);
tprints("}");
}
}
#endif /* IP_ADD_MEMBERSHIP */
#ifdef IPV6_ADD_MEMBERSHIP
static void
print_mreq6(struct tcb *const tcp, const kernel_ulong_t addr,
const int len)
{
struct ipv6_mreq mreq;
if (len < (int) sizeof(mreq)) {
printaddr(addr);
} else if (!umove_or_printaddr(tcp, addr, &mreq)) {
PRINT_FIELD_INET_ADDR("{", mreq, ipv6mr_multiaddr, AF_INET6);
PRINT_FIELD_IFINDEX(", ", mreq, ipv6mr_interface);
tprints("}");
}
}
#endif /* IPV6_ADD_MEMBERSHIP */
#ifdef PACKET_RX_RING
static void
print_tpacket_req(struct tcb *const tcp, const kernel_ulong_t addr, const int len)
{
struct tpacket_req req;
if (len != sizeof(req) ||
umove(tcp, addr, &req) < 0) {
printaddr(addr);
} else {
PRINT_FIELD_U("{", req, tp_block_size);
PRINT_FIELD_U(", ", req, tp_block_nr);
PRINT_FIELD_U(", ", req, tp_frame_size);
PRINT_FIELD_U(", ", req, tp_frame_nr);
tprints("}");
}
}
#endif /* PACKET_RX_RING */
#ifdef PACKET_ADD_MEMBERSHIP
# include "xlat/packet_mreq_type.h"
static void
print_packet_mreq(struct tcb *const tcp, const kernel_ulong_t addr, const int len)
{
struct packet_mreq mreq;
if (len != sizeof(mreq) ||
umove(tcp, addr, &mreq) < 0) {
printaddr(addr);
} else {
unsigned int i;
PRINT_FIELD_IFINDEX("{", mreq, mr_ifindex);
PRINT_FIELD_XVAL(", ", mreq, mr_type, packet_mreq_type,
"PACKET_MR_???");
PRINT_FIELD_U(", ", mreq, mr_alen);
tprints(", mr_address=");
if (mreq.mr_alen > ARRAY_SIZE(mreq.mr_address))
mreq.mr_alen = ARRAY_SIZE(mreq.mr_address);
for (i = 0; i < mreq.mr_alen; ++i)
tprintf("%02x", mreq.mr_address[i]);
tprints("}");
}
}
#endif /* PACKET_ADD_MEMBERSHIP */
static void
print_setsockopt(struct tcb *const tcp, const unsigned int level,
const unsigned int name, const kernel_ulong_t addr,
const int len)
{
if (addr && verbose(tcp))
switch (level) {
case SOL_SOCKET:
switch (name) {
case SO_LINGER:
print_set_linger(tcp, addr, len);
return;
case SO_ATTACH_FILTER:
case SO_ATTACH_REUSEPORT_CBPF:
if ((unsigned int) len == get_sock_fprog_size())
decode_sock_fprog(tcp, addr);
else
printaddr(addr);
return;
}
break;
case SOL_IP:
switch (name) {
#ifdef IP_ADD_MEMBERSHIP
case IP_ADD_MEMBERSHIP:
case IP_DROP_MEMBERSHIP:
print_mreq(tcp, addr, len);
return;
#endif /* IP_ADD_MEMBERSHIP */
#ifdef MCAST_JOIN_GROUP
case MCAST_JOIN_GROUP:
case MCAST_LEAVE_GROUP:
print_group_req(tcp, addr, len);
return;
#endif /* MCAST_JOIN_GROUP */
}
break;
case SOL_IPV6:
switch (name) {
#ifdef IPV6_ADD_MEMBERSHIP
case IPV6_ADD_MEMBERSHIP:
case IPV6_DROP_MEMBERSHIP:
# ifdef IPV6_JOIN_ANYCAST
case IPV6_JOIN_ANYCAST:
# endif
# ifdef IPV6_LEAVE_ANYCAST
case IPV6_LEAVE_ANYCAST:
# endif
print_mreq6(tcp, addr, len);
return;
#endif /* IPV6_ADD_MEMBERSHIP */
#ifdef MCAST_JOIN_GROUP
case MCAST_JOIN_GROUP:
case MCAST_LEAVE_GROUP:
print_group_req(tcp, addr, len);
return;
#endif /* MCAST_JOIN_GROUP */
}
break;
case SOL_PACKET:
switch (name) {
#ifdef PACKET_RX_RING
case PACKET_RX_RING:
# ifdef PACKET_TX_RING
case PACKET_TX_RING:
# endif
print_tpacket_req(tcp, addr, len);
return;
#endif /* PACKET_RX_RING */
#ifdef PACKET_ADD_MEMBERSHIP
case PACKET_ADD_MEMBERSHIP:
case PACKET_DROP_MEMBERSHIP:
print_packet_mreq(tcp, addr, len);
return;
#endif /* PACKET_ADD_MEMBERSHIP */
}
break;
case SOL_RAW:
switch (name) {
case ICMP_FILTER:
print_icmp_filter(tcp, addr, len);
return;
}
break;
case SOL_NETLINK:
if (len < (int) sizeof(int))
printaddr(addr);
else
printnum_int(tcp, addr, "%d");
return;
}
/* default arg printing */
if (verbose(tcp)) {
if (len == sizeof(int)) {
printnum_int(tcp, addr, "%d");
} else {
printstrn(tcp, addr, len);
}
} else {
printaddr(addr);
}
}
SYS_FUNC(setsockopt)
{
print_sockopt_fd_level_name(tcp, tcp->u_arg[0],
tcp->u_arg[1], tcp->u_arg[2], false);
print_setsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2],
tcp->u_arg[3], tcp->u_arg[4]);
tprintf(", %d", (int) tcp->u_arg[4]);
return RVAL_DECODED;
}