Home | History | Annotate | Download | only in strace
      1 /*
      2  * Copyright (c) 1991, 1992 Paul Kranenburg <pk (at) cs.few.eur.nl>
      3  * Copyright (c) 1993 Branko Lankester <branko (at) hacktic.nl>
      4  * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs (at) world.std.com>
      5  * Copyright (c) 1996-2000 Wichert Akkerman <wichert (at) cistron.nl>
      6  * Copyright (c) 1999-2018 The strace developers.
      7  * All rights reserved.
      8  *
      9  * Redistribution and use in source and binary forms, with or without
     10  * modification, are permitted provided that the following conditions
     11  * are met:
     12  * 1. Redistributions of source code must retain the above copyright
     13  *    notice, this list of conditions and the following disclaimer.
     14  * 2. Redistributions in binary form must reproduce the above copyright
     15  *    notice, this list of conditions and the following disclaimer in the
     16  *    documentation and/or other materials provided with the distribution.
     17  * 3. The name of the author may not be used to endorse or promote products
     18  *    derived from this software without specific prior written permission.
     19  *
     20  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     21  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     22  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     23  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
     24  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
     25  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     26  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     27  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     28  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
     29  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     30  */
     31 
     32 #include "defs.h"
     33 #include "print_fields.h"
     34 
     35 #include <sys/stat.h>
     36 #include <sys/socket.h>
     37 #include <sys/uio.h>
     38 #include <sys/un.h>
     39 #include <netinet/in.h>
     40 #ifdef HAVE_NETINET_TCP_H
     41 # include <netinet/tcp.h>
     42 #endif
     43 #ifdef HAVE_NETINET_UDP_H
     44 # include <netinet/udp.h>
     45 #endif
     46 #ifdef HAVE_NETINET_SCTP_H
     47 # include <netinet/sctp.h>
     48 #endif
     49 #include <arpa/inet.h>
     50 #include <net/if.h>
     51 #include <asm/types.h>
     52 #ifdef HAVE_NETIPX_IPX_H
     53 # include <netipx/ipx.h>
     54 #else
     55 # include <linux/ipx.h>
     56 #endif
     57 
     58 #if defined(HAVE_LINUX_IP_VS_H)
     59 # include <linux/ip_vs.h>
     60 #endif
     61 #include "netlink.h"
     62 #if defined(HAVE_LINUX_NETFILTER_ARP_ARP_TABLES_H)
     63 # include <linux/netfilter_arp/arp_tables.h>
     64 #endif
     65 #if defined(HAVE_LINUX_NETFILTER_BRIDGE_EBTABLES_H)
     66 # include <linux/netfilter_bridge/ebtables.h>
     67 #endif
     68 #if defined(HAVE_LINUX_NETFILTER_IPV4_IP_TABLES_H)
     69 # include <linux/netfilter_ipv4/ip_tables.h>
     70 #endif
     71 #if defined(HAVE_LINUX_NETFILTER_IPV6_IP6_TABLES_H)
     72 # include <linux/netfilter_ipv6/ip6_tables.h>
     73 #endif
     74 #include <linux/if_packet.h>
     75 #include <linux/icmp.h>
     76 
     77 #include "xlat/socktypes.h"
     78 #include "xlat/sock_type_flags.h"
     79 #ifndef SOCK_TYPE_MASK
     80 # define SOCK_TYPE_MASK 0xf
     81 #endif
     82 
     83 #include "xlat/socketlayers.h"
     84 
     85 #include "xlat/inet_protocols.h"
     86 
     87 #define XLAT_MACROS_ONLY
     88 # include "xlat/addrfams.h"
     89 # include "xlat/ethernet_protocols.h"
     90 #undef XLAT_MACROS_ONLY
     91 #include "xlat/ax25_protocols.h"
     92 #include "xlat/irda_protocols.h"
     93 #include "xlat/can_protocols.h"
     94 #include "xlat/bt_protocols.h"
     95 #include "xlat/isdn_protocols.h"
     96 #include "xlat/phonet_protocols.h"
     97 #include "xlat/caif_protocols.h"
     98 #include "xlat/nfc_protocols.h"
     99 #include "xlat/kcm_protocols.h"
    100 #include "xlat/smc_protocols.h"
    101 
    102 const size_t inet_protocols_size = ARRAY_SIZE(inet_protocols) - 1;
    103 
    104 static void
    105 decode_sockbuf(struct tcb *const tcp, const int fd, const kernel_ulong_t addr,
    106 	       const kernel_ulong_t addrlen)
    107 {
    108 
    109 	switch (verbose(tcp) ? getfdproto(tcp, fd) : SOCK_PROTO_UNKNOWN) {
    110 	case SOCK_PROTO_NETLINK:
    111 		decode_netlink(tcp, fd, addr, addrlen);
    112 		break;
    113 	default:
    114 		printstrn(tcp, addr, addrlen);
    115 	}
    116 }
    117 
    118 /*
    119  * low bits of the socket type define real socket type,
    120  * other bits are socket type flags.
    121  */
    122 static void
    123 tprint_sock_type(unsigned int flags)
    124 {
    125 	const char *str = xlookup(socktypes, flags & SOCK_TYPE_MASK);
    126 
    127 	if (str) {
    128 		print_xlat_ex(flags & SOCK_TYPE_MASK, str, XLAT_STYLE_DEFAULT);
    129 		flags &= ~SOCK_TYPE_MASK;
    130 		if (!flags)
    131 			return;
    132 		tprints("|");
    133 	}
    134 	printflags(sock_type_flags, flags, "SOCK_???");
    135 }
    136 
    137 SYS_FUNC(socket)
    138 {
    139 	printxval(addrfams, tcp->u_arg[0], "AF_???");
    140 	tprints(", ");
    141 	tprint_sock_type(tcp->u_arg[1]);
    142 	tprints(", ");
    143 	switch (tcp->u_arg[0]) {
    144 	case AF_INET:
    145 	case AF_INET6:
    146 		printxval_search(inet_protocols, tcp->u_arg[2], "IPPROTO_???");
    147 		break;
    148 
    149 	case AF_AX25:
    150 		/* Those are not available in public headers.  */
    151 		printxval_searchn_ex(ARRSZ_PAIR(ax25_protocols), tcp->u_arg[2],
    152 				     "AX25_P_???", XLAT_STYLE_VERBOSE);
    153 		break;
    154 
    155 	case AF_NETLINK:
    156 		printxval(netlink_protocols, tcp->u_arg[2], "NETLINK_???");
    157 		break;
    158 
    159 	case AF_PACKET:
    160 		tprints("htons(");
    161 		printxval_searchn(ethernet_protocols, ethernet_protocols_size,
    162 				  ntohs(tcp->u_arg[2]), "ETH_P_???");
    163 		tprints(")");
    164 		break;
    165 
    166 	case AF_IRDA:
    167 		printxval_index(can_protocols, tcp->u_arg[2], "IRDAPROTO_???");
    168 		break;
    169 
    170 	case AF_CAN:
    171 		printxval_index(can_protocols, tcp->u_arg[2], "CAN_???");
    172 		break;
    173 
    174 	case AF_BLUETOOTH:
    175 		printxval_index(bt_protocols, tcp->u_arg[2], "BTPROTO_???");
    176 		break;
    177 
    178 	case AF_RXRPC:
    179 		printxval(addrfams, tcp->u_arg[2], "AF_???");
    180 		break;
    181 
    182 	case AF_ISDN:
    183 		printxval(isdn_protocols, tcp->u_arg[2], "ISDN_P_???");
    184 		break;
    185 
    186 	case AF_PHONET:
    187 		printxval_index(phonet_protocols, tcp->u_arg[2], "PN_PROTO_???");
    188 		break;
    189 
    190 	case AF_CAIF:
    191 		printxval_index(caif_protocols, tcp->u_arg[2], "CAIFPROTO_???");
    192 		break;
    193 
    194 	case AF_NFC:
    195 		printxval_index(nfc_protocols, tcp->u_arg[2],
    196 				"NFC_SOCKPROTO_???");
    197 		break;
    198 
    199 	case AF_KCM:
    200 		printxval_index(kcm_protocols, tcp->u_arg[2], "KCMPROTO_???");
    201 		break;
    202 
    203 	case AF_SMC:
    204 		printxval_index(smc_protocols, tcp->u_arg[2], "SMCPROTO_???");
    205 		break;
    206 
    207 	default:
    208 		tprintf("%" PRI_klu, tcp->u_arg[2]);
    209 		break;
    210 	}
    211 
    212 	return RVAL_DECODED | RVAL_FD;
    213 }
    214 
    215 static bool
    216 fetch_socklen(struct tcb *const tcp, int *const plen,
    217 	      const kernel_ulong_t sockaddr, const kernel_ulong_t socklen)
    218 {
    219 	return verbose(tcp) && sockaddr && socklen
    220 	       && umove(tcp, socklen, plen) == 0;
    221 }
    222 
    223 static int
    224 decode_sockname(struct tcb *tcp)
    225 {
    226 	int ulen, rlen;
    227 
    228 	if (entering(tcp)) {
    229 		printfd(tcp, tcp->u_arg[0]);
    230 		tprints(", ");
    231 		if (fetch_socklen(tcp, &ulen, tcp->u_arg[1], tcp->u_arg[2])) {
    232 			set_tcb_priv_ulong(tcp, ulen);
    233 			return 0;
    234 		} else {
    235 			printaddr(tcp->u_arg[1]);
    236 			tprints(", ");
    237 			printaddr(tcp->u_arg[2]);
    238 			return RVAL_DECODED;
    239 		}
    240 	}
    241 
    242 	ulen = get_tcb_priv_ulong(tcp);
    243 
    244 	if (syserror(tcp) || umove(tcp, tcp->u_arg[2], &rlen) < 0) {
    245 		printaddr(tcp->u_arg[1]);
    246 		tprintf(", [%d]", ulen);
    247 	} else {
    248 		decode_sockaddr(tcp, tcp->u_arg[1], ulen > rlen ? rlen : ulen);
    249 		if (ulen != rlen)
    250 			tprintf(", [%d->%d]", ulen, rlen);
    251 		else
    252 			tprintf(", [%d]", rlen);
    253 	}
    254 
    255 	return RVAL_DECODED;
    256 }
    257 
    258 SYS_FUNC(accept)
    259 {
    260 	return decode_sockname(tcp) | RVAL_FD;
    261 }
    262 
    263 SYS_FUNC(accept4)
    264 {
    265 	int rc = decode_sockname(tcp);
    266 
    267 	if (rc & RVAL_DECODED) {
    268 		tprints(", ");
    269 		printflags(sock_type_flags, tcp->u_arg[3], "SOCK_???");
    270 	}
    271 
    272 	return rc | RVAL_FD;
    273 }
    274 
    275 SYS_FUNC(send)
    276 {
    277 	printfd(tcp, tcp->u_arg[0]);
    278 	tprints(", ");
    279 	decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1], tcp->u_arg[2]);
    280 	tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
    281 	/* flags */
    282 	printflags(msg_flags, tcp->u_arg[3], "MSG_???");
    283 
    284 	return RVAL_DECODED;
    285 }
    286 
    287 SYS_FUNC(sendto)
    288 {
    289 	printfd(tcp, tcp->u_arg[0]);
    290 	tprints(", ");
    291 	decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1], tcp->u_arg[2]);
    292 	tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
    293 	/* flags */
    294 	printflags(msg_flags, tcp->u_arg[3], "MSG_???");
    295 	/* to address */
    296 	const int addrlen = tcp->u_arg[5];
    297 	tprints(", ");
    298 	decode_sockaddr(tcp, tcp->u_arg[4], addrlen);
    299 	/* to length */
    300 	tprintf(", %d", addrlen);
    301 
    302 	return RVAL_DECODED;
    303 }
    304 
    305 SYS_FUNC(recv)
    306 {
    307 	if (entering(tcp)) {
    308 		printfd(tcp, tcp->u_arg[0]);
    309 		tprints(", ");
    310 	} else {
    311 		if (syserror(tcp)) {
    312 			printaddr(tcp->u_arg[1]);
    313 		} else {
    314 			decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1],
    315 				     tcp->u_rval);
    316 		}
    317 
    318 		tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
    319 		printflags(msg_flags, tcp->u_arg[3], "MSG_???");
    320 	}
    321 	return 0;
    322 }
    323 
    324 SYS_FUNC(recvfrom)
    325 {
    326 	int ulen, rlen;
    327 
    328 	if (entering(tcp)) {
    329 		printfd(tcp, tcp->u_arg[0]);
    330 		tprints(", ");
    331 		if (fetch_socklen(tcp, &ulen, tcp->u_arg[4], tcp->u_arg[5])) {
    332 			set_tcb_priv_ulong(tcp, ulen);
    333 		}
    334 	} else {
    335 		/* buf */
    336 		if (syserror(tcp)) {
    337 			printaddr(tcp->u_arg[1]);
    338 		} else {
    339 			decode_sockbuf(tcp, tcp->u_arg[0], tcp->u_arg[1],
    340 				     tcp->u_rval);
    341 		}
    342 		/* size */
    343 		tprintf(", %" PRI_klu ", ", tcp->u_arg[2]);
    344 		/* flags */
    345 		printflags(msg_flags, tcp->u_arg[3], "MSG_???");
    346 		tprints(", ");
    347 
    348 		ulen = get_tcb_priv_ulong(tcp);
    349 
    350 		if (!fetch_socklen(tcp, &rlen, tcp->u_arg[4], tcp->u_arg[5])) {
    351 			/* from address */
    352 			printaddr(tcp->u_arg[4]);
    353 			tprints(", ");
    354 			/* from length */
    355 			printaddr(tcp->u_arg[5]);
    356 			return 0;
    357 		}
    358 		if (syserror(tcp)) {
    359 			/* from address */
    360 			printaddr(tcp->u_arg[4]);
    361 			/* from length */
    362 			tprintf(", [%d]", ulen);
    363 			return 0;
    364 		}
    365 		/* from address */
    366 		decode_sockaddr(tcp, tcp->u_arg[4], ulen > rlen ? rlen : ulen);
    367 		/* from length */
    368 		if (ulen != rlen)
    369 			tprintf(", [%d->%d]", ulen, rlen);
    370 		else
    371 			tprintf(", [%d]", rlen);
    372 	}
    373 	return 0;
    374 }
    375 
    376 SYS_FUNC(getsockname)
    377 {
    378 	return decode_sockname(tcp);
    379 }
    380 
    381 static void
    382 printpair_fd(struct tcb *tcp, const int i0, const int i1)
    383 {
    384 	tprints("[");
    385 	printfd(tcp, i0);
    386 	tprints(", ");
    387 	printfd(tcp, i1);
    388 	tprints("]");
    389 }
    390 
    391 static void
    392 decode_pair_fd(struct tcb *const tcp, const kernel_ulong_t addr)
    393 {
    394 	int pair[2];
    395 
    396 	if (umove_or_printaddr(tcp, addr, &pair))
    397 		return;
    398 
    399 	printpair_fd(tcp, pair[0], pair[1]);
    400 }
    401 
    402 static int
    403 do_pipe(struct tcb *tcp, int flags_arg)
    404 {
    405 	if (exiting(tcp)) {
    406 		decode_pair_fd(tcp, tcp->u_arg[0]);
    407 		if (flags_arg >= 0) {
    408 			tprints(", ");
    409 			printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???");
    410 		}
    411 	}
    412 	return 0;
    413 }
    414 
    415 SYS_FUNC(pipe)
    416 {
    417 #if HAVE_ARCH_GETRVAL2
    418 	if (exiting(tcp) && !syserror(tcp))
    419 		printpair_fd(tcp, tcp->u_rval, getrval2(tcp));
    420 	return 0;
    421 #else
    422 	return do_pipe(tcp, -1);
    423 #endif
    424 }
    425 
    426 SYS_FUNC(pipe2)
    427 {
    428 	return do_pipe(tcp, 1);
    429 }
    430 
    431 SYS_FUNC(socketpair)
    432 {
    433 	if (entering(tcp)) {
    434 		printxval(addrfams, tcp->u_arg[0], "AF_???");
    435 		tprints(", ");
    436 		tprint_sock_type(tcp->u_arg[1]);
    437 		tprintf(", %" PRI_klu, tcp->u_arg[2]);
    438 	} else {
    439 		tprints(", ");
    440 		decode_pair_fd(tcp, tcp->u_arg[3]);
    441 	}
    442 	return 0;
    443 }
    444 
    445 #include "xlat/sock_options.h"
    446 #include "xlat/getsock_options.h"
    447 #include "xlat/setsock_options.h"
    448 #include "xlat/sock_ip_options.h"
    449 #include "xlat/getsock_ip_options.h"
    450 #include "xlat/setsock_ip_options.h"
    451 #include "xlat/sock_ipv6_options.h"
    452 #include "xlat/getsock_ipv6_options.h"
    453 #include "xlat/setsock_ipv6_options.h"
    454 #include "xlat/sock_ipx_options.h"
    455 #include "xlat/sock_ax25_options.h"
    456 #include "xlat/sock_netlink_options.h"
    457 #include "xlat/sock_packet_options.h"
    458 #include "xlat/sock_raw_options.h"
    459 #include "xlat/sock_sctp_options.h"
    460 #include "xlat/sock_tcp_options.h"
    461 #include "xlat/sock_udp_options.h"
    462 #include "xlat/sock_irda_options.h"
    463 #include "xlat/sock_llc_options.h"
    464 #include "xlat/sock_dccp_options.h"
    465 #include "xlat/sock_tipc_options.h"
    466 #include "xlat/sock_rxrpc_options.h"
    467 #include "xlat/sock_pppol2tp_options.h"
    468 #include "xlat/sock_bluetooth_options.h"
    469 #include "xlat/sock_pnp_options.h"
    470 #include "xlat/sock_rds_options.h"
    471 #include "xlat/sock_iucv_options.h"
    472 #include "xlat/sock_caif_options.h"
    473 #include "xlat/sock_alg_options.h"
    474 #include "xlat/sock_nfcllcp_options.h"
    475 #include "xlat/sock_kcm_options.h"
    476 #include "xlat/sock_tls_options.h"
    477 #include "xlat/sock_xdp_options.h"
    478 
    479 static void
    480 print_sockopt_fd_level_name(struct tcb *tcp, int fd, unsigned int level,
    481 			    unsigned int name, bool is_getsockopt)
    482 {
    483 	printfd(tcp, fd);
    484 	tprints(", ");
    485 	printxval_search(socketlayers, level, "SOL_??");
    486 	tprints(", ");
    487 
    488 	switch (level) {
    489 	case SOL_SOCKET:
    490 		printxvals(name, "SO_???", sock_options,
    491 			   is_getsockopt ? getsock_options :
    492 					   setsock_options, NULL);
    493 		break;
    494 	case SOL_IP:
    495 		printxvals(name, "IP_???", sock_ip_options,
    496 			   is_getsockopt ? getsock_ip_options :
    497 					   setsock_ip_options, NULL);
    498 		break;
    499 	case SOL_IPV6:
    500 		printxvals(name, "IPV6_???", sock_ipv6_options,
    501 			   is_getsockopt ? getsock_ipv6_options :
    502 					   setsock_ipv6_options, NULL);
    503 		break;
    504 	case SOL_IPX:
    505 		printxval(sock_ipx_options, name, "IPX_???");
    506 		break;
    507 	case SOL_AX25:
    508 		printxval_search(sock_ax25_options, name, "AX25_???");
    509 		break;
    510 	case SOL_PACKET:
    511 		printxval(sock_packet_options, name, "PACKET_???");
    512 		break;
    513 	case SOL_TCP:
    514 		printxval_index(sock_tcp_options, name, "TCP_???");
    515 		break;
    516 	case SOL_SCTP:
    517 		printxval(sock_sctp_options, name, "SCTP_???");
    518 		break;
    519 	case SOL_RAW:
    520 		printxval(sock_raw_options, name, "RAW_???");
    521 		break;
    522 	case SOL_NETLINK:
    523 		printxval(sock_netlink_options, name, "NETLINK_???");
    524 		break;
    525 	case SOL_UDP:
    526 		printxval(sock_udp_options, name, "UDP_???");
    527 		break;
    528 	case SOL_IRDA:
    529 		printxval_index(sock_irda_options, name, "IRLMP_???");
    530 		break;
    531 	case SOL_LLC:
    532 		printxval_index(sock_llc_options, name, "LLC_OPT_???");
    533 		break;
    534 	case SOL_DCCP:
    535 		printxval_search(sock_dccp_options, name, "DCCP_SOCKOPT_???");
    536 		break;
    537 	case SOL_TIPC:
    538 		printxval_search(sock_tipc_options, name, "TIPC_???");
    539 		break;
    540 	case SOL_RXRPC:
    541 		printxval_index(sock_rxrpc_options, name, "RXRPC_???");
    542 		break;
    543 	case SOL_PPPOL2TP:
    544 		printxval_index(sock_pppol2tp_options, name, "PPPOL2TP_SO_???");
    545 		break;
    546 	case SOL_BLUETOOTH:
    547 		printxval_search(sock_bluetooth_options, name, "BT_???");
    548 		break;
    549 	case SOL_PNPIPE:
    550 		printxval(sock_pnp_options, name, "PNPIPE_???");
    551 		break;
    552 	case SOL_RDS:
    553 		printxval_search(sock_rds_options, name, "RDS_???");
    554 		break;
    555 	case SOL_IUCV:
    556 		printxval(sock_iucv_options, name, "SO_???");
    557 		break;
    558 	case SOL_CAIF:
    559 		printxval(sock_caif_options, name, "CAIFSO_???");
    560 		break;
    561 	case SOL_ALG:
    562 		printxval_index(sock_alg_options, name, "ALG_???");
    563 		break;
    564 	case SOL_NFC:
    565 		printxval_index(sock_nfcllcp_options, name, "NFC_LLCP_???");
    566 		break;
    567 	case SOL_KCM:
    568 		printxval(sock_kcm_options, name, "KCM_???");
    569 		break;
    570 	case SOL_TLS:
    571 		printxval(sock_tls_options, name, "TLS_???");
    572 		break;
    573 	case SOL_XDP:
    574 		printxval_index(sock_xdp_options, name, "XDP_???");
    575 		break;
    576 
    577 		/* Other SOL_* protocol levels still need work. */
    578 
    579 	default:
    580 		tprintf("%u", name);
    581 	}
    582 
    583 	tprints(", ");
    584 }
    585 
    586 static void
    587 print_get_linger(struct tcb *const tcp, const kernel_ulong_t addr,
    588 		 unsigned int len)
    589 {
    590 	struct linger linger;
    591 
    592 	/*
    593 	 * The kernel cannot return len > sizeof(linger) because struct linger
    594 	 * cannot change, but extra safety won't harm either.
    595 	 */
    596 	if (len > sizeof(linger))
    597 		len = sizeof(linger);
    598 	if (umoven_or_printaddr(tcp, addr, len, &linger))
    599 		return;
    600 
    601 	if (len < sizeof(linger.l_onoff)) {
    602 		tprints("{l_onoff=");
    603 		print_quoted_string((void *) &linger.l_onoff,
    604 				    len, QUOTE_FORCE_HEX);
    605 	} else {
    606 		PRINT_FIELD_D("{", linger, l_onoff);
    607 
    608 		if (len > offsetof(struct linger, l_linger)) {
    609 			len -= offsetof(struct linger, l_linger);
    610 			if (len < sizeof(linger.l_linger)) {
    611 				tprints(", l_linger=");
    612 				print_quoted_string((void *) &linger.l_linger,
    613 						    len, QUOTE_FORCE_HEX);
    614 			} else {
    615 				PRINT_FIELD_D(", ", linger, l_linger);
    616 			}
    617 		}
    618 	}
    619 	tprints("}");
    620 }
    621 
    622 static void
    623 print_get_ucred(struct tcb *const tcp, const kernel_ulong_t addr,
    624 		unsigned int len)
    625 {
    626 	struct ucred uc;
    627 
    628 	/*
    629 	 * The kernel is very unlikely to return len > sizeof(uc)
    630 	 * because struct ucred is very unlikely to change,
    631 	 * but extra safety won't harm either.
    632 	 */
    633 	if (len > sizeof(uc))
    634 		len = sizeof(uc);
    635 
    636 	if (umoven_or_printaddr(tcp, addr, len, &uc))
    637 		return;
    638 
    639 	if (len < sizeof(uc.pid)) {
    640 		tprints("{pid=");
    641 		print_quoted_string((void *) &uc.pid,
    642 				    len, QUOTE_FORCE_HEX);
    643 	} else {
    644 		PRINT_FIELD_D("{", uc, pid);
    645 
    646 		if (len > offsetof(struct ucred, uid)) {
    647 			len -= offsetof(struct ucred, uid);
    648 			if (len < sizeof(uc.uid)) {
    649 				tprints(", uid=");
    650 				print_quoted_string((void *) &uc.uid,
    651 						    len, QUOTE_FORCE_HEX);
    652 			} else {
    653 				PRINT_FIELD_UID(", ", uc, uid);
    654 
    655 				if (len > offsetof(struct ucred, gid) -
    656 					  offsetof(struct ucred, uid)) {
    657 					len -= offsetof(struct ucred, gid) -
    658 					       offsetof(struct ucred, uid);
    659 					if (len < sizeof(uc.gid)) {
    660 						tprints(", gid=");
    661 						print_quoted_string((void *) &uc.gid,
    662 								    len,
    663 								    QUOTE_FORCE_HEX);
    664 					} else {
    665 						PRINT_FIELD_UID(", ", uc, gid);
    666 					}
    667 				}
    668 			}
    669 		}
    670 	}
    671 	tprints("}");
    672 }
    673 
    674 #ifdef PACKET_STATISTICS
    675 static void
    676 print_tpacket_stats(struct tcb *const tcp, const kernel_ulong_t addr,
    677 		    unsigned int len)
    678 {
    679 	struct tp_stats {
    680 		unsigned int tp_packets, tp_drops, tp_freeze_q_cnt;
    681 	} stats;
    682 
    683 	/*
    684 	 * The kernel may return len > sizeof(stats) if the kernel structure
    685 	 * grew as it happened when tpacket_stats_v3 was introduced.
    686 	 */
    687 	if (len > sizeof(stats))
    688 		len = sizeof(stats);
    689 
    690 	if (umoven_or_printaddr(tcp, addr, len, &stats))
    691 		return;
    692 
    693 	if (len < sizeof(stats.tp_packets)) {
    694 		tprints("{tp_packets=");
    695 		print_quoted_string((void *) &stats.tp_packets,
    696 				    len, QUOTE_FORCE_HEX);
    697 	} else {
    698 		PRINT_FIELD_U("{", stats, tp_packets);
    699 
    700 		if (len > offsetof(struct tp_stats, tp_drops)) {
    701 			len -= offsetof(struct tp_stats, tp_drops);
    702 			if (len < sizeof(stats.tp_drops)) {
    703 				tprints(", tp_drops=");
    704 				print_quoted_string((void *) &stats.tp_drops,
    705 						    len, QUOTE_FORCE_HEX);
    706 			} else {
    707 				PRINT_FIELD_U(", ", stats, tp_drops);
    708 
    709 				if (len > offsetof(struct tp_stats, tp_freeze_q_cnt) -
    710 					  offsetof(struct tp_stats, tp_drops)) {
    711 					len -= offsetof(struct tp_stats, tp_freeze_q_cnt) -
    712 					       offsetof(struct tp_stats, tp_drops);
    713 					if (len < sizeof(stats.tp_freeze_q_cnt)) {
    714 						tprints(", tp_freeze_q_cnt=");
    715 						print_quoted_string((void *) &stats.tp_freeze_q_cnt,
    716 								    len,
    717 								    QUOTE_FORCE_HEX);
    718 					} else {
    719 						PRINT_FIELD_U(", ", stats, tp_freeze_q_cnt);
    720 					}
    721 				}
    722 			}
    723 		}
    724 	}
    725 	tprints("}");
    726 }
    727 #endif /* PACKET_STATISTICS */
    728 
    729 #include "xlat/icmpfilterflags.h"
    730 
    731 static void
    732 print_icmp_filter(struct tcb *const tcp, const kernel_ulong_t addr, int len)
    733 {
    734 	struct icmp_filter filter = {};
    735 
    736 	if (len > (int) sizeof(filter))
    737 		len = sizeof(filter);
    738 	else if (len <= 0) {
    739 		printaddr(addr);
    740 		return;
    741 	}
    742 
    743 	if (umoven_or_printaddr(tcp, addr, len, &filter))
    744 		return;
    745 
    746 	tprints("~(");
    747 	printflags(icmpfilterflags, ~filter.data, "ICMP_???");
    748 	tprints(")");
    749 }
    750 
    751 static bool
    752 print_uint32(struct tcb *tcp, void *elem_buf, size_t elem_size, void *data)
    753 {
    754 	tprintf("%u", *(uint32_t *) elem_buf);
    755 
    756 	return true;
    757 }
    758 
    759 static void
    760 print_getsockopt(struct tcb *const tcp, const unsigned int level,
    761 		 const unsigned int name, const kernel_ulong_t addr,
    762 		 const int ulen, const int rlen)
    763 {
    764 	if (ulen <= 0 || rlen <= 0) {
    765 		/*
    766 		 * As the kernel neither accepts nor returns a negative
    767 		 * length in case of successful getsockopt syscall
    768 		 * invocation, negative values must have been forged
    769 		 * by userspace.
    770 		 */
    771 		printaddr(addr);
    772 		return;
    773 	}
    774 
    775 	if (addr && verbose(tcp))
    776 	switch (level) {
    777 	case SOL_SOCKET:
    778 		switch (name) {
    779 		case SO_LINGER:
    780 			print_get_linger(tcp, addr, rlen);
    781 			return;
    782 		case SO_PEERCRED:
    783 			print_get_ucred(tcp, addr, rlen);
    784 			return;
    785 		case SO_ATTACH_FILTER:
    786 			/*
    787 			 * The length returned by the kernel in case of
    788 			 * successful getsockopt syscall invocation is struct
    789 			 * sock_fprog.len that has type unsigned short,
    790 			 * anything else must have been forged by userspace.
    791 			 */
    792 			if ((unsigned short) rlen == (unsigned int) rlen)
    793 				print_sock_fprog(tcp, addr, rlen);
    794 			else
    795 				printaddr(addr);
    796 			return;
    797 		}
    798 		break;
    799 
    800 	case SOL_PACKET:
    801 		switch (name) {
    802 #ifdef PACKET_STATISTICS
    803 		case PACKET_STATISTICS:
    804 			print_tpacket_stats(tcp, addr, rlen);
    805 			return;
    806 #endif
    807 		}
    808 		break;
    809 
    810 	case SOL_RAW:
    811 		switch (name) {
    812 		case ICMP_FILTER:
    813 			print_icmp_filter(tcp, addr, rlen);
    814 			return;
    815 		}
    816 		break;
    817 
    818 	case SOL_NETLINK:
    819 		switch (name) {
    820 		case NETLINK_LIST_MEMBERSHIPS: {
    821 			uint32_t buf;
    822 			print_array(tcp, addr, MIN(ulen, rlen) / sizeof(buf),
    823 				    &buf, sizeof(buf),
    824 				    tfetch_mem, print_uint32, 0);
    825 			break;
    826 			}
    827 		default:
    828 			printnum_int(tcp, addr, "%d");
    829 			break;
    830 		}
    831 		return;
    832 	}
    833 
    834 	/* default arg printing */
    835 
    836 	if (verbose(tcp)) {
    837 		if (rlen == sizeof(int)) {
    838 			printnum_int(tcp, addr, "%d");
    839 		} else {
    840 			printstrn(tcp, addr, rlen);
    841 		}
    842 	} else {
    843 		printaddr(addr);
    844 	}
    845 }
    846 
    847 SYS_FUNC(getsockopt)
    848 {
    849 	int ulen, rlen;
    850 
    851 	if (entering(tcp)) {
    852 		print_sockopt_fd_level_name(tcp, tcp->u_arg[0],
    853 					    tcp->u_arg[1], tcp->u_arg[2], true);
    854 
    855 		if (verbose(tcp) && tcp->u_arg[4]
    856 		    && umove(tcp, tcp->u_arg[4], &ulen) == 0) {
    857 			set_tcb_priv_ulong(tcp, ulen);
    858 			return 0;
    859 		} else {
    860 			printaddr(tcp->u_arg[3]);
    861 			tprints(", ");
    862 			printaddr(tcp->u_arg[4]);
    863 			return RVAL_DECODED;
    864 		}
    865 	} else {
    866 		ulen = get_tcb_priv_ulong(tcp);
    867 
    868 		if (syserror(tcp) || umove(tcp, tcp->u_arg[4], &rlen) < 0) {
    869 			printaddr(tcp->u_arg[3]);
    870 			tprintf(", [%d]", ulen);
    871 		} else {
    872 			print_getsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2],
    873 					 tcp->u_arg[3], ulen, rlen);
    874 			if (ulen != rlen)
    875 				tprintf(", [%d->%d]", ulen, rlen);
    876 			else
    877 				tprintf(", [%d]", rlen);
    878 		}
    879 	}
    880 	return 0;
    881 }
    882 
    883 static void
    884 print_set_linger(struct tcb *const tcp, const kernel_ulong_t addr,
    885 		 const int len)
    886 {
    887 	struct linger linger;
    888 
    889 	if (len < (int) sizeof(linger)) {
    890 		printaddr(addr);
    891 	} else if (!umove_or_printaddr(tcp, addr, &linger)) {
    892 		PRINT_FIELD_D("{", linger, l_onoff);
    893 		PRINT_FIELD_D(", ", linger, l_linger);
    894 		tprints("}");
    895 	}
    896 }
    897 
    898 #ifdef IP_ADD_MEMBERSHIP
    899 static void
    900 print_mreq(struct tcb *const tcp, const kernel_ulong_t addr,
    901 	   const int len)
    902 {
    903 	struct ip_mreq mreq;
    904 
    905 	if (len < (int) sizeof(mreq)) {
    906 		printaddr(addr);
    907 	} else if (!umove_or_printaddr(tcp, addr, &mreq)) {
    908 		PRINT_FIELD_INET4_ADDR("{", mreq, imr_multiaddr);
    909 		PRINT_FIELD_INET4_ADDR(", ", mreq, imr_interface);
    910 		tprints("}");
    911 	}
    912 }
    913 #endif /* IP_ADD_MEMBERSHIP */
    914 
    915 #ifdef IPV6_ADD_MEMBERSHIP
    916 static void
    917 print_mreq6(struct tcb *const tcp, const kernel_ulong_t addr,
    918 	    const int len)
    919 {
    920 	struct ipv6_mreq mreq;
    921 
    922 	if (len < (int) sizeof(mreq)) {
    923 		printaddr(addr);
    924 	} else if (!umove_or_printaddr(tcp, addr, &mreq)) {
    925 		PRINT_FIELD_INET_ADDR("{", mreq, ipv6mr_multiaddr, AF_INET6);
    926 		PRINT_FIELD_IFINDEX(", ", mreq, ipv6mr_interface);
    927 		tprints("}");
    928 	}
    929 }
    930 #endif /* IPV6_ADD_MEMBERSHIP */
    931 
    932 #ifdef PACKET_RX_RING
    933 static void
    934 print_tpacket_req(struct tcb *const tcp, const kernel_ulong_t addr, const int len)
    935 {
    936 	struct tpacket_req req;
    937 
    938 	if (len != sizeof(req) ||
    939 	    umove(tcp, addr, &req) < 0) {
    940 		printaddr(addr);
    941 	} else {
    942 		PRINT_FIELD_U("{", req, tp_block_size);
    943 		PRINT_FIELD_U(", ", req, tp_block_nr);
    944 		PRINT_FIELD_U(", ", req, tp_frame_size);
    945 		PRINT_FIELD_U(", ", req, tp_frame_nr);
    946 		tprints("}");
    947 	}
    948 }
    949 #endif /* PACKET_RX_RING */
    950 
    951 #ifdef PACKET_ADD_MEMBERSHIP
    952 # include "xlat/packet_mreq_type.h"
    953 
    954 static void
    955 print_packet_mreq(struct tcb *const tcp, const kernel_ulong_t addr, const int len)
    956 {
    957 	struct packet_mreq mreq;
    958 
    959 	if (len != sizeof(mreq) ||
    960 	    umove(tcp, addr, &mreq) < 0) {
    961 		printaddr(addr);
    962 	} else {
    963 		unsigned int i;
    964 
    965 		PRINT_FIELD_IFINDEX("{", mreq, mr_ifindex);
    966 		PRINT_FIELD_XVAL(", ", mreq, mr_type, packet_mreq_type,
    967 				 "PACKET_MR_???");
    968 		PRINT_FIELD_U(", ", mreq, mr_alen);
    969 		tprints(", mr_address=");
    970 		if (mreq.mr_alen > ARRAY_SIZE(mreq.mr_address))
    971 			mreq.mr_alen = ARRAY_SIZE(mreq.mr_address);
    972 		for (i = 0; i < mreq.mr_alen; ++i)
    973 			tprintf("%02x", mreq.mr_address[i]);
    974 		tprints("}");
    975 	}
    976 }
    977 #endif /* PACKET_ADD_MEMBERSHIP */
    978 
    979 static void
    980 print_setsockopt(struct tcb *const tcp, const unsigned int level,
    981 		 const unsigned int name, const kernel_ulong_t addr,
    982 		 const int len)
    983 {
    984 	if (addr && verbose(tcp))
    985 	switch (level) {
    986 	case SOL_SOCKET:
    987 		switch (name) {
    988 		case SO_LINGER:
    989 			print_set_linger(tcp, addr, len);
    990 			return;
    991 		case SO_ATTACH_FILTER:
    992 		case SO_ATTACH_REUSEPORT_CBPF:
    993 			if ((unsigned int) len == get_sock_fprog_size())
    994 				decode_sock_fprog(tcp, addr);
    995 			else
    996 				printaddr(addr);
    997 			return;
    998 		}
    999 		break;
   1000 
   1001 	case SOL_IP:
   1002 		switch (name) {
   1003 #ifdef IP_ADD_MEMBERSHIP
   1004 		case IP_ADD_MEMBERSHIP:
   1005 		case IP_DROP_MEMBERSHIP:
   1006 			print_mreq(tcp, addr, len);
   1007 			return;
   1008 #endif /* IP_ADD_MEMBERSHIP */
   1009 #ifdef MCAST_JOIN_GROUP
   1010 		case MCAST_JOIN_GROUP:
   1011 		case MCAST_LEAVE_GROUP:
   1012 			print_group_req(tcp, addr, len);
   1013 			return;
   1014 #endif /* MCAST_JOIN_GROUP */
   1015 		}
   1016 		break;
   1017 
   1018 	case SOL_IPV6:
   1019 		switch (name) {
   1020 #ifdef IPV6_ADD_MEMBERSHIP
   1021 		case IPV6_ADD_MEMBERSHIP:
   1022 		case IPV6_DROP_MEMBERSHIP:
   1023 # ifdef IPV6_JOIN_ANYCAST
   1024 		case IPV6_JOIN_ANYCAST:
   1025 # endif
   1026 # ifdef IPV6_LEAVE_ANYCAST
   1027 		case IPV6_LEAVE_ANYCAST:
   1028 # endif
   1029 			print_mreq6(tcp, addr, len);
   1030 			return;
   1031 #endif /* IPV6_ADD_MEMBERSHIP */
   1032 #ifdef MCAST_JOIN_GROUP
   1033 		case MCAST_JOIN_GROUP:
   1034 		case MCAST_LEAVE_GROUP:
   1035 			print_group_req(tcp, addr, len);
   1036 			return;
   1037 #endif /* MCAST_JOIN_GROUP */
   1038 		}
   1039 		break;
   1040 
   1041 	case SOL_PACKET:
   1042 		switch (name) {
   1043 #ifdef PACKET_RX_RING
   1044 		case PACKET_RX_RING:
   1045 # ifdef PACKET_TX_RING
   1046 		case PACKET_TX_RING:
   1047 # endif
   1048 			print_tpacket_req(tcp, addr, len);
   1049 			return;
   1050 #endif /* PACKET_RX_RING */
   1051 #ifdef PACKET_ADD_MEMBERSHIP
   1052 		case PACKET_ADD_MEMBERSHIP:
   1053 		case PACKET_DROP_MEMBERSHIP:
   1054 			print_packet_mreq(tcp, addr, len);
   1055 			return;
   1056 #endif /* PACKET_ADD_MEMBERSHIP */
   1057 		}
   1058 		break;
   1059 
   1060 	case SOL_RAW:
   1061 		switch (name) {
   1062 		case ICMP_FILTER:
   1063 			print_icmp_filter(tcp, addr, len);
   1064 			return;
   1065 		}
   1066 		break;
   1067 
   1068 	case SOL_NETLINK:
   1069 		if (len < (int) sizeof(int))
   1070 			printaddr(addr);
   1071 		else
   1072 			printnum_int(tcp, addr, "%d");
   1073 		return;
   1074 	}
   1075 
   1076 	/* default arg printing */
   1077 
   1078 	if (verbose(tcp)) {
   1079 		if (len == sizeof(int)) {
   1080 			printnum_int(tcp, addr, "%d");
   1081 		} else {
   1082 			printstrn(tcp, addr, len);
   1083 		}
   1084 	} else {
   1085 		printaddr(addr);
   1086 	}
   1087 }
   1088 
   1089 SYS_FUNC(setsockopt)
   1090 {
   1091 	print_sockopt_fd_level_name(tcp, tcp->u_arg[0],
   1092 				    tcp->u_arg[1], tcp->u_arg[2], false);
   1093 	print_setsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2],
   1094 			 tcp->u_arg[3], tcp->u_arg[4]);
   1095 	tprintf(", %d", (int) tcp->u_arg[4]);
   1096 
   1097 	return RVAL_DECODED;
   1098 }
   1099