| /* |
| * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl> |
| * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl> |
| * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com> |
| * Copyright (c) 1996-2000 Wichert Akkerman <wichert@cistron.nl> |
| * All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * 3. The name of the author may not be used to endorse or promote products |
| * derived from this software without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include "defs.h" |
| #include "msghdr.h" |
| #include <sys/stat.h> |
| #include <sys/socket.h> |
| #include <sys/uio.h> |
| #include <sys/un.h> |
| #include <netinet/in.h> |
| #ifdef HAVE_NETINET_TCP_H |
| # include <netinet/tcp.h> |
| #endif |
| #ifdef HAVE_NETINET_UDP_H |
| # include <netinet/udp.h> |
| #endif |
| #ifdef HAVE_NETINET_SCTP_H |
| # include <netinet/sctp.h> |
| #endif |
| #include <arpa/inet.h> |
| #include <net/if.h> |
| #include <asm/types.h> |
| #ifdef HAVE_NETIPX_IPX_H |
| # include <netipx/ipx.h> |
| #else |
| # include <linux/ipx.h> |
| #endif |
| |
| #if defined(HAVE_LINUX_IP_VS_H) |
| # include <linux/ip_vs.h> |
| #endif |
| #include <linux/netlink.h> |
| #if defined(HAVE_LINUX_NETFILTER_ARP_ARP_TABLES_H) |
| # include <linux/netfilter_arp/arp_tables.h> |
| #endif |
| #if defined(HAVE_LINUX_NETFILTER_BRIDGE_EBTABLES_H) |
| # include <linux/netfilter_bridge/ebtables.h> |
| #endif |
| #if defined(HAVE_LINUX_NETFILTER_IPV4_IP_TABLES_H) |
| # include <linux/netfilter_ipv4/ip_tables.h> |
| #endif |
| #if defined(HAVE_LINUX_NETFILTER_IPV6_IP6_TABLES_H) |
| # include <linux/netfilter_ipv6/ip6_tables.h> |
| #endif |
| #include <linux/if_packet.h> |
| #include <linux/icmp.h> |
| |
| #include "xlat/socktypes.h" |
| #include "xlat/sock_type_flags.h" |
| #ifndef SOCK_TYPE_MASK |
| # define SOCK_TYPE_MASK 0xf |
| #endif |
| |
| #include "xlat/socketlayers.h" |
| |
| #include "xlat/inet_protocols.h" |
| |
| #if !defined NETLINK_SOCK_DIAG && defined NETLINK_INET_DIAG |
| # define NETLINK_SOCK_DIAG NETLINK_INET_DIAG |
| #endif |
| #include "xlat/netlink_protocols.h" |
| |
| #ifdef HAVE_BLUETOOTH_BLUETOOTH_H |
| # include <bluetooth/bluetooth.h> |
| # include "xlat/bt_protocols.h" |
| #endif |
| |
| #include "xlat/msg_flags.h" |
| |
| void |
| print_ifindex(unsigned int ifindex) |
| { |
| #ifdef HAVE_IF_INDEXTONAME |
| char buf[IFNAMSIZ + 1]; |
| |
| if (if_indextoname(ifindex, buf)) { |
| tprints("if_nametoindex("); |
| print_quoted_string(buf, sizeof(buf), QUOTE_0_TERMINATED); |
| tprints(")"); |
| return; |
| } |
| #endif |
| tprintf("%u", ifindex); |
| } |
| |
| #include "xlat/scmvals.h" |
| #include "xlat/ip_cmsg_types.h" |
| |
| #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4 |
| struct cmsghdr32 { |
| uint32_t cmsg_len; |
| int cmsg_level; |
| int cmsg_type; |
| }; |
| #endif |
| |
| typedef union { |
| char *ptr; |
| struct cmsghdr *cmsg; |
| #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4 |
| struct cmsghdr32 *cmsg32; |
| #endif |
| } union_cmsghdr; |
| |
| static void |
| print_scm_rights(struct tcb *tcp, const void *cmsg_data, |
| const size_t data_len) |
| { |
| const int *fds = cmsg_data; |
| const char *end = (const char *) cmsg_data + data_len; |
| bool seen = false; |
| |
| if (sizeof(*fds) > data_len) |
| return; |
| |
| tprints(", ["); |
| while ((const char *) fds < end) { |
| if (seen) |
| tprints(", "); |
| else |
| seen = true; |
| printfd(tcp, *fds++); |
| } |
| tprints("]"); |
| } |
| |
| static void |
| print_scm_creds(struct tcb *tcp, const void *cmsg_data, |
| const size_t data_len) |
| { |
| const struct ucred *uc = cmsg_data; |
| |
| if (sizeof(*uc) > data_len) |
| return; |
| |
| tprintf(", {pid=%u, uid=%u, gid=%u}", |
| (unsigned) uc->pid, (unsigned) uc->uid, (unsigned) uc->gid); |
| } |
| |
| static void |
| print_scm_security(struct tcb *tcp, const void *cmsg_data, |
| const size_t data_len) |
| { |
| if (!data_len) |
| return; |
| |
| tprints(", "); |
| print_quoted_string(cmsg_data, data_len, 0); |
| } |
| |
| static void |
| print_cmsg_ip_pktinfo(struct tcb *tcp, const void *cmsg_data, |
| const size_t data_len) |
| { |
| const struct in_pktinfo *info = cmsg_data; |
| |
| if (sizeof(*info) > data_len) |
| return; |
| |
| tprints(", {ipi_ifindex="); |
| print_ifindex(info->ipi_ifindex); |
| tprintf(", ipi_spec_dst=inet_addr(\"%s\"), ipi_addr=inet_addr(\"%s\")}", |
| inet_ntoa(info->ipi_spec_dst), inet_ntoa(info->ipi_addr)); |
| } |
| |
| static void |
| print_cmsg_ip_ttl(struct tcb *tcp, const void *cmsg_data, |
| const size_t data_len) |
| { |
| const unsigned int *ttl = cmsg_data; |
| |
| if (sizeof(*ttl) > data_len) |
| return; |
| |
| tprintf(", {ttl=%u}", *ttl); |
| } |
| |
| static void |
| print_cmsg_ip_tos(struct tcb *tcp, const void *cmsg_data, |
| const size_t data_len) |
| { |
| const uint8_t *tos = cmsg_data; |
| |
| if (sizeof(*tos) > data_len) |
| return; |
| |
| tprintf(", {tos=%x}", *tos); |
| } |
| |
| static void |
| print_cmsg_ip_checksum(struct tcb *tcp, const void *cmsg_data, |
| const size_t data_len) |
| { |
| const uint32_t *csum = cmsg_data; |
| |
| if (sizeof(*csum) > data_len) |
| return; |
| |
| tprintf(", {csum=%u}", *csum); |
| } |
| |
| static void |
| print_cmsg_ip_opts(struct tcb *tcp, const void *cmsg_data, |
| const size_t data_len) |
| { |
| const unsigned char *opts = cmsg_data; |
| size_t i; |
| |
| if (!data_len) |
| return; |
| |
| tprints(", {opts=0x"); |
| for (i = 0; i < data_len; ++i) |
| tprintf("%02x", opts[i]); |
| tprints("}"); |
| } |
| |
| static void |
| print_cmsg_ip_recverr(struct tcb *tcp, const void *cmsg_data, |
| const size_t data_len) |
| { |
| const struct { |
| uint32_t ee_errno; |
| uint8_t ee_origin; |
| uint8_t ee_type; |
| uint8_t ee_code; |
| uint8_t ee_pad; |
| uint32_t ee_info; |
| uint32_t ee_data; |
| struct sockaddr_in offender; |
| } *err = cmsg_data; |
| |
| if (sizeof(*err) > data_len) |
| return; |
| |
| tprintf(", {ee_errno=%u, ee_origin=%u, ee_type=%u, ee_code=%u" |
| ", ee_info=%u, ee_data=%u, offender=", |
| err->ee_errno, err->ee_origin, err->ee_type, |
| err->ee_code, err->ee_info, err->ee_data); |
| print_sockaddr(tcp, &err->offender, sizeof(err->offender)); |
| tprints("}"); |
| } |
| |
| static void |
| print_cmsg_ip_origdstaddr(struct tcb *tcp, const void *cmsg_data, |
| const size_t data_len) |
| { |
| if (sizeof(struct sockaddr_in) > data_len) |
| return; |
| |
| tprints(", "); |
| print_sockaddr(tcp, cmsg_data, data_len); |
| } |
| |
| static void |
| print_cmsg_type_data(struct tcb *tcp, const int cmsg_level, const int cmsg_type, |
| const void *cmsg_data, const size_t data_len) |
| { |
| switch (cmsg_level) { |
| case SOL_SOCKET: |
| printxval(scmvals, cmsg_type, "SCM_???"); |
| switch (cmsg_type) { |
| case SCM_RIGHTS: |
| print_scm_rights(tcp, cmsg_data, data_len); |
| break; |
| case SCM_CREDENTIALS: |
| print_scm_creds(tcp, cmsg_data, data_len); |
| break; |
| case SCM_SECURITY: |
| print_scm_security(tcp, cmsg_data, data_len); |
| break; |
| } |
| break; |
| case SOL_IP: |
| printxval(ip_cmsg_types, cmsg_type, "IP_???"); |
| switch (cmsg_type) { |
| case IP_PKTINFO: |
| print_cmsg_ip_pktinfo(tcp, cmsg_data, data_len); |
| break; |
| case IP_TTL: |
| print_cmsg_ip_ttl(tcp, cmsg_data, data_len); |
| break; |
| case IP_TOS: |
| print_cmsg_ip_tos(tcp, cmsg_data, data_len); |
| break; |
| case IP_RECVOPTS: |
| case IP_RETOPTS: |
| print_cmsg_ip_opts(tcp, cmsg_data, data_len); |
| break; |
| case IP_RECVERR: |
| print_cmsg_ip_recverr(tcp, cmsg_data, data_len); |
| break; |
| case IP_ORIGDSTADDR: |
| print_cmsg_ip_origdstaddr(tcp, cmsg_data, data_len); |
| break; |
| case IP_CHECKSUM: |
| print_cmsg_ip_checksum(tcp, cmsg_data, data_len); |
| break; |
| case SCM_SECURITY: |
| print_scm_security(tcp, cmsg_data, data_len); |
| break; |
| } |
| break; |
| default: |
| tprintf("%u", cmsg_type); |
| } |
| } |
| |
| static void |
| decode_msg_control(struct tcb *tcp, unsigned long addr, size_t len) |
| { |
| const size_t cmsg_size = |
| #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4 |
| (current_wordsize < sizeof(long)) ? sizeof(struct cmsghdr32) : |
| #endif |
| sizeof(struct cmsghdr); |
| |
| if (!len) |
| return; |
| tprints(", msg_control="); |
| |
| char *buf = len < cmsg_size ? NULL : malloc(len); |
| if (!buf || umoven(tcp, addr, len, buf) < 0) { |
| printaddr(addr); |
| free(buf); |
| return; |
| } |
| |
| union_cmsghdr u = { .ptr = buf }; |
| |
| tprints("["); |
| while (len >= cmsg_size) { |
| size_t cmsg_len = |
| #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4 |
| (current_wordsize < sizeof(long)) ? u.cmsg32->cmsg_len : |
| #endif |
| u.cmsg->cmsg_len; |
| int cmsg_level = |
| #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4 |
| (current_wordsize < sizeof(long)) ? u.cmsg32->cmsg_level : |
| #endif |
| u.cmsg->cmsg_level; |
| int cmsg_type = |
| #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4 |
| (current_wordsize < sizeof(long)) ? u.cmsg32->cmsg_type : |
| #endif |
| u.cmsg->cmsg_type; |
| |
| if (u.ptr != buf) |
| tprints(", "); |
| tprintf("{cmsg_len=%lu, cmsg_level=", (unsigned long) cmsg_len); |
| printxval(socketlayers, cmsg_level, "SOL_???"); |
| tprints(", cmsg_type="); |
| |
| if (cmsg_len > len) |
| cmsg_len = len; |
| |
| print_cmsg_type_data(tcp, cmsg_level, cmsg_type, |
| (const void *) (u.ptr + cmsg_size), |
| cmsg_len > cmsg_size ? cmsg_len - cmsg_size: 0); |
| tprints("}"); |
| |
| if (cmsg_len < cmsg_size) { |
| len -= cmsg_size; |
| break; |
| } |
| cmsg_len = (cmsg_len + current_wordsize - 1) & |
| (size_t) ~(current_wordsize - 1); |
| if (cmsg_len >= len) { |
| len = 0; |
| break; |
| } |
| u.ptr += cmsg_len; |
| len -= cmsg_len; |
| } |
| if (len) |
| tprints(", ..."); |
| tprints("]"); |
| free(buf); |
| } |
| |
| static void |
| print_msghdr(struct tcb *tcp, struct msghdr *msg, unsigned long data_size) |
| { |
| tprints("{msg_name="); |
| decode_sockaddr(tcp, (long)msg->msg_name, msg->msg_namelen); |
| tprintf(", msg_namelen=%d", msg->msg_namelen); |
| |
| tprints(", msg_iov="); |
| tprint_iov_upto(tcp, (unsigned long) msg->msg_iovlen, |
| (unsigned long) msg->msg_iov, IOV_DECODE_STR, data_size); |
| tprintf(", msg_iovlen=%lu", (unsigned long) msg->msg_iovlen); |
| |
| decode_msg_control(tcp, (unsigned long) msg->msg_control, |
| msg->msg_controllen); |
| tprintf(", msg_controllen=%lu", (unsigned long) msg->msg_controllen); |
| |
| tprints(", msg_flags="); |
| printflags(msg_flags, msg->msg_flags, "MSG_???"); |
| tprints("}"); |
| } |
| |
| static void |
| decode_msghdr(struct tcb *tcp, long addr, unsigned long data_size) |
| { |
| struct msghdr msg; |
| |
| if (addr && verbose(tcp) && fetch_struct_msghdr(tcp, addr, &msg)) |
| print_msghdr(tcp, &msg, data_size); |
| else |
| printaddr(addr); |
| } |
| |
| void |
| dumpiov_in_msghdr(struct tcb *tcp, long addr, unsigned long data_size) |
| { |
| struct msghdr msg; |
| |
| if (fetch_struct_msghdr(tcp, addr, &msg)) |
| dumpiov_upto(tcp, msg.msg_iovlen, (long)msg.msg_iov, data_size); |
| } |
| |
| static int |
| decode_mmsghdr(struct tcb *tcp, long addr, bool use_msg_len) |
| { |
| struct mmsghdr mmsg; |
| int fetched = fetch_struct_mmsghdr(tcp, addr, &mmsg); |
| |
| if (fetched) { |
| tprints("{"); |
| print_msghdr(tcp, &mmsg.msg_hdr, use_msg_len ? mmsg.msg_len : -1UL); |
| tprintf(", %u}", mmsg.msg_len); |
| } else { |
| printaddr(addr); |
| } |
| |
| return fetched; |
| } |
| |
| static void |
| decode_mmsgvec(struct tcb *tcp, unsigned long addr, unsigned int len, |
| bool use_msg_len) |
| { |
| if (syserror(tcp)) { |
| printaddr(addr); |
| } else { |
| unsigned int i, fetched; |
| |
| tprints("["); |
| for (i = 0; i < len; ++i, addr += fetched) { |
| if (i) |
| tprints(", "); |
| fetched = decode_mmsghdr(tcp, addr, use_msg_len); |
| if (!fetched) |
| break; |
| } |
| tprints("]"); |
| } |
| } |
| |
| void |
| dumpiov_in_mmsghdr(struct tcb *tcp, long addr) |
| { |
| unsigned int len = tcp->u_rval; |
| unsigned int i, fetched; |
| struct mmsghdr mmsg; |
| |
| for (i = 0; i < len; ++i, addr += fetched) { |
| fetched = fetch_struct_mmsghdr(tcp, addr, &mmsg); |
| if (!fetched) |
| break; |
| tprintf(" = %lu buffers in vector %u\n", |
| (unsigned long)mmsg.msg_hdr.msg_iovlen, i); |
| dumpiov_upto(tcp, mmsg.msg_hdr.msg_iovlen, |
| (long)mmsg.msg_hdr.msg_iov, mmsg.msg_len); |
| } |
| } |
| |
| /* |
| * low bits of the socket type define real socket type, |
| * other bits are socket type flags. |
| */ |
| static void |
| tprint_sock_type(unsigned int flags) |
| { |
| const char *str = xlookup(socktypes, flags & SOCK_TYPE_MASK); |
| |
| if (str) { |
| tprints(str); |
| flags &= ~SOCK_TYPE_MASK; |
| if (!flags) |
| return; |
| tprints("|"); |
| } |
| printflags(sock_type_flags, flags, "SOCK_???"); |
| } |
| |
| SYS_FUNC(socket) |
| { |
| printxval(addrfams, tcp->u_arg[0], "AF_???"); |
| tprints(", "); |
| tprint_sock_type(tcp->u_arg[1]); |
| tprints(", "); |
| switch (tcp->u_arg[0]) { |
| case AF_INET: |
| case AF_INET6: |
| printxval(inet_protocols, tcp->u_arg[2], "IPPROTO_???"); |
| break; |
| |
| case AF_NETLINK: |
| printxval(netlink_protocols, tcp->u_arg[2], "NETLINK_???"); |
| break; |
| |
| #ifdef HAVE_BLUETOOTH_BLUETOOTH_H |
| case AF_BLUETOOTH: |
| printxval(bt_protocols, tcp->u_arg[2], "BTPROTO_???"); |
| break; |
| #endif |
| |
| default: |
| tprintf("%lu", tcp->u_arg[2]); |
| break; |
| } |
| |
| return RVAL_DECODED | RVAL_FD; |
| } |
| |
| SYS_FUNC(bind) |
| { |
| printfd(tcp, tcp->u_arg[0]); |
| tprints(", "); |
| decode_sockaddr(tcp, tcp->u_arg[1], tcp->u_arg[2]); |
| tprintf(", %lu", tcp->u_arg[2]); |
| |
| return RVAL_DECODED; |
| } |
| |
| SYS_FUNC(listen) |
| { |
| printfd(tcp, tcp->u_arg[0]); |
| tprints(", "); |
| tprintf("%lu", tcp->u_arg[1]); |
| |
| return RVAL_DECODED; |
| } |
| |
| static int |
| do_sockname(struct tcb *tcp, int flags_arg) |
| { |
| if (entering(tcp)) { |
| printfd(tcp, tcp->u_arg[0]); |
| tprints(", "); |
| return 0; |
| } |
| |
| int len; |
| if (!tcp->u_arg[2] || !verbose(tcp) || syserror(tcp) || |
| umove(tcp, tcp->u_arg[2], &len) < 0) { |
| printaddr(tcp->u_arg[1]); |
| tprints(", "); |
| printaddr(tcp->u_arg[2]); |
| } else { |
| decode_sockaddr(tcp, tcp->u_arg[1], len); |
| tprintf(", [%d]", len); |
| } |
| |
| if (flags_arg >= 0) { |
| tprints(", "); |
| printflags(sock_type_flags, tcp->u_arg[flags_arg], |
| "SOCK_???"); |
| } |
| return 0; |
| } |
| |
| SYS_FUNC(accept) |
| { |
| do_sockname(tcp, -1); |
| return RVAL_FD; |
| } |
| |
| SYS_FUNC(accept4) |
| { |
| do_sockname(tcp, 3); |
| return RVAL_FD; |
| } |
| |
| SYS_FUNC(send) |
| { |
| printfd(tcp, tcp->u_arg[0]); |
| tprints(", "); |
| printstr(tcp, tcp->u_arg[1], tcp->u_arg[2]); |
| tprintf(", %lu, ", tcp->u_arg[2]); |
| /* flags */ |
| printflags(msg_flags, tcp->u_arg[3], "MSG_???"); |
| |
| return RVAL_DECODED; |
| } |
| |
| SYS_FUNC(sendto) |
| { |
| printfd(tcp, tcp->u_arg[0]); |
| tprints(", "); |
| printstr(tcp, tcp->u_arg[1], tcp->u_arg[2]); |
| tprintf(", %lu, ", tcp->u_arg[2]); |
| /* flags */ |
| printflags(msg_flags, tcp->u_arg[3], "MSG_???"); |
| /* to address */ |
| tprints(", "); |
| decode_sockaddr(tcp, tcp->u_arg[4], tcp->u_arg[5]); |
| /* to length */ |
| tprintf(", %lu", tcp->u_arg[5]); |
| |
| return RVAL_DECODED; |
| } |
| |
| SYS_FUNC(sendmsg) |
| { |
| printfd(tcp, tcp->u_arg[0]); |
| tprints(", "); |
| decode_msghdr(tcp, tcp->u_arg[1], (unsigned long) -1L); |
| /* flags */ |
| tprints(", "); |
| printflags(msg_flags, tcp->u_arg[2], "MSG_???"); |
| |
| return RVAL_DECODED; |
| } |
| |
| SYS_FUNC(sendmmsg) |
| { |
| if (entering(tcp)) { |
| /* sockfd */ |
| printfd(tcp, tcp->u_arg[0]); |
| tprints(", "); |
| if (!verbose(tcp)) { |
| printaddr(tcp->u_arg[1]); |
| /* vlen */ |
| tprintf(", %u, ", (unsigned int) tcp->u_arg[2]); |
| /* flags */ |
| printflags(msg_flags, tcp->u_arg[3], "MSG_???"); |
| return RVAL_DECODED; |
| } |
| } else { |
| decode_mmsgvec(tcp, tcp->u_arg[1], tcp->u_rval, false); |
| /* vlen */ |
| tprintf(", %u, ", (unsigned int) tcp->u_arg[2]); |
| /* flags */ |
| printflags(msg_flags, tcp->u_arg[3], "MSG_???"); |
| } |
| return 0; |
| } |
| |
| SYS_FUNC(recv) |
| { |
| if (entering(tcp)) { |
| printfd(tcp, tcp->u_arg[0]); |
| tprints(", "); |
| } else { |
| if (syserror(tcp)) |
| printaddr(tcp->u_arg[1]); |
| else |
| printstr(tcp, tcp->u_arg[1], tcp->u_rval); |
| |
| tprintf(", %lu, ", tcp->u_arg[2]); |
| printflags(msg_flags, tcp->u_arg[3], "MSG_???"); |
| } |
| return 0; |
| } |
| |
| SYS_FUNC(recvfrom) |
| { |
| int fromlen; |
| |
| if (entering(tcp)) { |
| printfd(tcp, tcp->u_arg[0]); |
| tprints(", "); |
| } else { |
| /* buf */ |
| if (syserror(tcp)) { |
| printaddr(tcp->u_arg[1]); |
| } else { |
| printstr(tcp, tcp->u_arg[1], tcp->u_rval); |
| } |
| /* len */ |
| tprintf(", %lu, ", tcp->u_arg[2]); |
| /* flags */ |
| printflags(msg_flags, tcp->u_arg[3], "MSG_???"); |
| tprints(", "); |
| if (syserror(tcp) || !tcp->u_arg[4] || !tcp->u_arg[5] || |
| umove(tcp, tcp->u_arg[5], &fromlen) < 0) { |
| /* from address, len */ |
| printaddr(tcp->u_arg[4]); |
| tprints(", "); |
| printaddr(tcp->u_arg[5]); |
| return 0; |
| } |
| /* from address */ |
| decode_sockaddr(tcp, tcp->u_arg[4], fromlen); |
| /* from length */ |
| tprintf(", [%u]", fromlen); |
| } |
| return 0; |
| } |
| |
| SYS_FUNC(recvmsg) |
| { |
| if (entering(tcp)) { |
| printfd(tcp, tcp->u_arg[0]); |
| tprints(", "); |
| } else { |
| if (syserror(tcp)) |
| printaddr(tcp->u_arg[1]); |
| else |
| decode_msghdr(tcp, tcp->u_arg[1], tcp->u_rval); |
| /* flags */ |
| tprints(", "); |
| printflags(msg_flags, tcp->u_arg[2], "MSG_???"); |
| } |
| return 0; |
| } |
| |
| SYS_FUNC(recvmmsg) |
| { |
| static char str[sizeof("left") + TIMESPEC_TEXT_BUFSIZE]; |
| |
| if (entering(tcp)) { |
| printfd(tcp, tcp->u_arg[0]); |
| tprints(", "); |
| if (verbose(tcp)) { |
| /* Abusing tcp->auxstr as temp storage. |
| * Will be used and cleared on syscall exit. |
| */ |
| tcp->auxstr = sprint_timespec(tcp, tcp->u_arg[4]); |
| } else { |
| printaddr(tcp->u_arg[1]); |
| /* vlen */ |
| tprintf(", %u, ", (unsigned int) tcp->u_arg[2]); |
| /* flags */ |
| printflags(msg_flags, tcp->u_arg[3], "MSG_???"); |
| tprints(", "); |
| print_timespec(tcp, tcp->u_arg[4]); |
| } |
| return 0; |
| } else { |
| if (verbose(tcp)) { |
| decode_mmsgvec(tcp, tcp->u_arg[1], tcp->u_rval, true); |
| /* vlen */ |
| tprintf(", %u, ", (unsigned int) tcp->u_arg[2]); |
| /* flags */ |
| printflags(msg_flags, tcp->u_arg[3], "MSG_???"); |
| tprints(", "); |
| /* timeout on entrance */ |
| tprints(tcp->auxstr); |
| tcp->auxstr = NULL; |
| } |
| if (syserror(tcp)) |
| return 0; |
| if (tcp->u_rval == 0) { |
| tcp->auxstr = "Timeout"; |
| return RVAL_STR; |
| } |
| if (!verbose(tcp)) |
| return 0; |
| /* timeout on exit */ |
| snprintf(str, sizeof(str), "left %s", |
| sprint_timespec(tcp, tcp->u_arg[4])); |
| tcp->auxstr = str; |
| return RVAL_STR; |
| } |
| } |
| |
| #include "xlat/shutdown_modes.h" |
| |
| SYS_FUNC(shutdown) |
| { |
| printfd(tcp, tcp->u_arg[0]); |
| tprints(", "); |
| printxval(shutdown_modes, tcp->u_arg[1], "SHUT_???"); |
| |
| return RVAL_DECODED; |
| } |
| |
| SYS_FUNC(getsockname) |
| { |
| return do_sockname(tcp, -1); |
| } |
| |
| static void |
| printpair_fd(struct tcb *tcp, const int i0, const int i1) |
| { |
| tprints("["); |
| printfd(tcp, i0); |
| tprints(", "); |
| printfd(tcp, i1); |
| tprints("]"); |
| } |
| |
| static void |
| decode_pair_fd(struct tcb *tcp, const long addr) |
| { |
| int pair[2]; |
| |
| if (umove_or_printaddr(tcp, addr, &pair)) |
| return; |
| |
| printpair_fd(tcp, pair[0], pair[1]); |
| } |
| |
| static int |
| do_pipe(struct tcb *tcp, int flags_arg) |
| { |
| if (exiting(tcp)) { |
| decode_pair_fd(tcp, tcp->u_arg[0]); |
| if (flags_arg >= 0) { |
| tprints(", "); |
| printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???"); |
| } |
| } |
| return 0; |
| } |
| |
| SYS_FUNC(pipe) |
| { |
| #ifdef HAVE_GETRVAL2 |
| if (exiting(tcp) && !syserror(tcp)) |
| printpair_fd(tcp, tcp->u_rval, getrval2(tcp)); |
| return 0; |
| #else |
| return do_pipe(tcp, -1); |
| #endif |
| } |
| |
| SYS_FUNC(pipe2) |
| { |
| return do_pipe(tcp, 1); |
| } |
| |
| SYS_FUNC(socketpair) |
| { |
| if (entering(tcp)) { |
| printxval(addrfams, tcp->u_arg[0], "AF_???"); |
| tprints(", "); |
| tprint_sock_type(tcp->u_arg[1]); |
| tprintf(", %lu", tcp->u_arg[2]); |
| } else { |
| tprints(", "); |
| decode_pair_fd(tcp, tcp->u_arg[3]); |
| } |
| return 0; |
| } |
| |
| #include "xlat/sockoptions.h" |
| #include "xlat/sockipoptions.h" |
| #include "xlat/getsockipoptions.h" |
| #include "xlat/setsockipoptions.h" |
| #include "xlat/sockipv6options.h" |
| #include "xlat/getsockipv6options.h" |
| #include "xlat/setsockipv6options.h" |
| #include "xlat/sockipxoptions.h" |
| #include "xlat/sockrawoptions.h" |
| #include "xlat/sockpacketoptions.h" |
| #include "xlat/socksctpoptions.h" |
| #include "xlat/socktcpoptions.h" |
| |
| static void |
| print_sockopt_fd_level_name(struct tcb *tcp, int fd, unsigned int level, |
| unsigned int name, bool is_getsockopt) |
| { |
| printfd(tcp, fd); |
| tprints(", "); |
| printxval(socketlayers, level, "SOL_??"); |
| tprints(", "); |
| |
| switch (level) { |
| case SOL_SOCKET: |
| printxval(sockoptions, name, "SO_???"); |
| break; |
| case SOL_IP: |
| printxvals(name, "IP_???", sockipoptions, |
| is_getsockopt ? getsockipoptions : setsockipoptions, NULL); |
| break; |
| case SOL_IPV6: |
| printxvals(name, "IPV6_???", sockipv6options, |
| is_getsockopt ? getsockipv6options : setsockipv6options, NULL); |
| break; |
| case SOL_IPX: |
| printxval(sockipxoptions, name, "IPX_???"); |
| break; |
| case SOL_PACKET: |
| printxval(sockpacketoptions, name, "PACKET_???"); |
| break; |
| case SOL_TCP: |
| printxval(socktcpoptions, name, "TCP_???"); |
| break; |
| case SOL_SCTP: |
| printxval(socksctpoptions, name, "SCTP_???"); |
| break; |
| case SOL_RAW: |
| printxval(sockrawoptions, name, "RAW_???"); |
| break; |
| |
| /* Other SOL_* protocol levels still need work. */ |
| |
| default: |
| tprintf("%u", name); |
| } |
| |
| tprints(", "); |
| } |
| |
| static void |
| print_linger(struct tcb *tcp, long addr, int len) |
| { |
| struct linger linger; |
| |
| if (len != sizeof(linger) || |
| umove(tcp, addr, &linger) < 0) { |
| printaddr(addr); |
| return; |
| } |
| |
| tprintf("{onoff=%d, linger=%d}", |
| linger.l_onoff, |
| linger.l_linger); |
| } |
| |
| #ifdef SO_PEERCRED |
| static void |
| print_ucred(struct tcb *tcp, long addr, int len) |
| { |
| struct ucred uc; |
| |
| if (len != sizeof(uc) || |
| umove(tcp, addr, &uc) < 0) { |
| printaddr(addr); |
| } else { |
| tprintf("{pid=%u, uid=%u, gid=%u}", |
| (unsigned) uc.pid, |
| (unsigned) uc.uid, |
| (unsigned) uc.gid); |
| } |
| } |
| #endif /* SO_PEERCRED */ |
| |
| #ifdef PACKET_STATISTICS |
| static void |
| print_tpacket_stats(struct tcb *tcp, long addr, int len) |
| { |
| struct tpacket_stats stats; |
| |
| if (len != sizeof(stats) || |
| umove(tcp, addr, &stats) < 0) { |
| printaddr(addr); |
| } else { |
| tprintf("{packets=%u, drops=%u}", |
| stats.tp_packets, |
| stats.tp_drops); |
| } |
| } |
| #endif /* PACKET_STATISTICS */ |
| |
| #include "xlat/icmpfilterflags.h" |
| |
| static void |
| print_icmp_filter(struct tcb *tcp, const long addr, int len) |
| { |
| struct icmp_filter filter = {}; |
| |
| if (len > (int) sizeof(filter)) |
| len = sizeof(filter); |
| else if (len <= 0) { |
| printaddr(addr); |
| return; |
| } |
| |
| if (umoven_or_printaddr(tcp, addr, len, &filter)) |
| return; |
| |
| tprints("~("); |
| printflags(icmpfilterflags, ~filter.data, "ICMP_???"); |
| tprints(")"); |
| } |
| |
| static void |
| print_getsockopt(struct tcb *tcp, unsigned int level, unsigned int name, |
| long addr, int len) |
| { |
| if (addr && verbose(tcp)) |
| switch (level) { |
| case SOL_SOCKET: |
| switch (name) { |
| case SO_LINGER: |
| print_linger(tcp, addr, len); |
| goto done; |
| #ifdef SO_PEERCRED |
| case SO_PEERCRED: |
| print_ucred(tcp, addr, len); |
| goto done; |
| #endif |
| } |
| break; |
| |
| case SOL_PACKET: |
| switch (name) { |
| #ifdef PACKET_STATISTICS |
| case PACKET_STATISTICS: |
| print_tpacket_stats(tcp, addr, len); |
| goto done; |
| #endif |
| } |
| break; |
| |
| case SOL_RAW: |
| switch (name) { |
| case ICMP_FILTER: |
| print_icmp_filter(tcp, addr, len); |
| goto done; |
| } |
| break; |
| } |
| |
| /* default arg printing */ |
| |
| if (verbose(tcp)) { |
| if (len == sizeof(int)) { |
| printnum_int(tcp, addr, "%d"); |
| } else { |
| printstr(tcp, addr, len); |
| } |
| } else { |
| printaddr(addr); |
| } |
| done: |
| tprintf(", [%d]", len); |
| } |
| |
| SYS_FUNC(getsockopt) |
| { |
| if (entering(tcp)) { |
| print_sockopt_fd_level_name(tcp, tcp->u_arg[0], |
| tcp->u_arg[1], tcp->u_arg[2], true); |
| } else { |
| int len; |
| |
| if (syserror(tcp) || umove(tcp, tcp->u_arg[4], &len) < 0) { |
| printaddr(tcp->u_arg[3]); |
| tprints(", "); |
| printaddr(tcp->u_arg[4]); |
| } else { |
| print_getsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2], |
| tcp->u_arg[3], len); |
| } |
| } |
| return 0; |
| } |
| |
| #ifdef IP_ADD_MEMBERSHIP |
| static void |
| print_mreq(struct tcb *tcp, long addr, unsigned int len) |
| { |
| struct ip_mreq mreq; |
| |
| if (len < sizeof(mreq)) { |
| printstr(tcp, addr, len); |
| return; |
| } |
| if (umove_or_printaddr(tcp, addr, &mreq)) |
| return; |
| |
| tprints("{imr_multiaddr=inet_addr("); |
| print_quoted_string(inet_ntoa(mreq.imr_multiaddr), |
| 16, QUOTE_0_TERMINATED); |
| tprints("), imr_interface=inet_addr("); |
| print_quoted_string(inet_ntoa(mreq.imr_interface), |
| 16, QUOTE_0_TERMINATED); |
| tprints(")}"); |
| } |
| #endif /* IP_ADD_MEMBERSHIP */ |
| |
| #ifdef IPV6_ADD_MEMBERSHIP |
| static void |
| print_mreq6(struct tcb *tcp, long addr, unsigned int len) |
| { |
| struct ipv6_mreq mreq; |
| |
| if (len < sizeof(mreq)) |
| goto fail; |
| |
| if (umove_or_printaddr(tcp, addr, &mreq)) |
| return; |
| |
| const struct in6_addr *in6 = &mreq.ipv6mr_multiaddr; |
| char address[INET6_ADDRSTRLEN]; |
| |
| if (!inet_ntop(AF_INET6, in6, address, sizeof(address))) |
| goto fail; |
| |
| tprints("{ipv6mr_multiaddr=inet_pton("); |
| print_quoted_string(address, sizeof(address), QUOTE_0_TERMINATED); |
| tprints("), ipv6mr_interface="); |
| print_ifindex(mreq.ipv6mr_interface); |
| tprints("}"); |
| return; |
| |
| fail: |
| printstr(tcp, addr, len); |
| } |
| #endif /* IPV6_ADD_MEMBERSHIP */ |
| |
| #ifdef MCAST_JOIN_GROUP |
| static void |
| print_group_req(struct tcb *tcp, long addr, int len) |
| { |
| struct group_req greq; |
| |
| if (len != sizeof(greq) || |
| umove(tcp, addr, &greq) < 0) { |
| printaddr(addr); |
| return; |
| } |
| |
| tprintf("{gr_interface=%u, gr_group=", greq.gr_interface); |
| print_sockaddr(tcp, &greq.gr_group, sizeof(greq.gr_group)); |
| tprintf("}"); |
| |
| } |
| #endif /* MCAST_JOIN_GROUP */ |
| |
| #ifdef PACKET_RX_RING |
| static void |
| print_tpacket_req(struct tcb *tcp, long addr, int len) |
| { |
| struct tpacket_req req; |
| |
| if (len != sizeof(req) || |
| umove(tcp, addr, &req) < 0) { |
| printaddr(addr); |
| } else { |
| tprintf("{block_size=%u, block_nr=%u, " |
| "frame_size=%u, frame_nr=%u}", |
| req.tp_block_size, |
| req.tp_block_nr, |
| req.tp_frame_size, |
| req.tp_frame_nr); |
| } |
| } |
| #endif /* PACKET_RX_RING */ |
| |
| #ifdef PACKET_ADD_MEMBERSHIP |
| # include "xlat/packet_mreq_type.h" |
| |
| static void |
| print_packet_mreq(struct tcb *tcp, long addr, int len) |
| { |
| struct packet_mreq mreq; |
| |
| if (len != sizeof(mreq) || |
| umove(tcp, addr, &mreq) < 0) { |
| printaddr(addr); |
| } else { |
| unsigned int i; |
| |
| tprintf("{mr_ifindex=%u, mr_type=", mreq.mr_ifindex); |
| printxval(packet_mreq_type, mreq.mr_type, "PACKET_MR_???"); |
| tprintf(", mr_alen=%u, mr_address=", mreq.mr_alen); |
| if (mreq.mr_alen > ARRAY_SIZE(mreq.mr_address)) |
| mreq.mr_alen = ARRAY_SIZE(mreq.mr_address); |
| for (i = 0; i < mreq.mr_alen; ++i) |
| tprintf("%02x", mreq.mr_address[i]); |
| tprints("}"); |
| } |
| } |
| #endif /* PACKET_ADD_MEMBERSHIP */ |
| |
| static void |
| print_setsockopt(struct tcb *tcp, unsigned int level, unsigned int name, |
| long addr, int len) |
| { |
| if (addr && verbose(tcp)) |
| switch (level) { |
| case SOL_SOCKET: |
| switch (name) { |
| case SO_LINGER: |
| print_linger(tcp, addr, len); |
| goto done; |
| } |
| break; |
| |
| case SOL_IP: |
| switch (name) { |
| #ifdef IP_ADD_MEMBERSHIP |
| case IP_ADD_MEMBERSHIP: |
| case IP_DROP_MEMBERSHIP: |
| print_mreq(tcp, addr, len); |
| goto done; |
| #endif /* IP_ADD_MEMBERSHIP */ |
| #ifdef MCAST_JOIN_GROUP |
| case MCAST_JOIN_GROUP: |
| case MCAST_LEAVE_GROUP: |
| print_group_req(tcp, addr, len); |
| goto done; |
| #endif /* MCAST_JOIN_GROUP */ |
| } |
| break; |
| |
| case SOL_IPV6: |
| switch (name) { |
| #ifdef IPV6_ADD_MEMBERSHIP |
| case IPV6_ADD_MEMBERSHIP: |
| case IPV6_DROP_MEMBERSHIP: |
| # ifdef IPV6_JOIN_ANYCAST |
| case IPV6_JOIN_ANYCAST: |
| # endif |
| # ifdef IPV6_LEAVE_ANYCAST |
| case IPV6_LEAVE_ANYCAST: |
| # endif |
| print_mreq6(tcp, addr, len); |
| goto done; |
| #endif /* IPV6_ADD_MEMBERSHIP */ |
| } |
| break; |
| |
| case SOL_PACKET: |
| switch (name) { |
| #ifdef PACKET_RX_RING |
| case PACKET_RX_RING: |
| # ifdef PACKET_TX_RING |
| case PACKET_TX_RING: |
| # endif |
| print_tpacket_req(tcp, addr, len); |
| goto done; |
| #endif /* PACKET_RX_RING */ |
| #ifdef PACKET_ADD_MEMBERSHIP |
| case PACKET_ADD_MEMBERSHIP: |
| case PACKET_DROP_MEMBERSHIP: |
| print_packet_mreq(tcp, addr, len); |
| goto done; |
| #endif /* PACKET_ADD_MEMBERSHIP */ |
| } |
| break; |
| |
| case SOL_RAW: |
| switch (name) { |
| case ICMP_FILTER: |
| print_icmp_filter(tcp, addr, len); |
| goto done; |
| } |
| break; |
| } |
| |
| /* default arg printing */ |
| |
| if (verbose(tcp)) { |
| if (len == sizeof(int)) { |
| printnum_int(tcp, addr, "%d"); |
| } else { |
| printstr(tcp, addr, len); |
| } |
| } else { |
| printaddr(addr); |
| } |
| done: |
| tprintf(", %d", len); |
| } |
| |
| SYS_FUNC(setsockopt) |
| { |
| print_sockopt_fd_level_name(tcp, tcp->u_arg[0], |
| tcp->u_arg[1], tcp->u_arg[2], false); |
| print_setsockopt(tcp, tcp->u_arg[1], tcp->u_arg[2], |
| tcp->u_arg[3], tcp->u_arg[4]); |
| |
| return RVAL_DECODED; |
| } |