/* * Copyright (c) 1991, 1992 Paul Kranenburg * Copyright (c) 1993 Branko Lankester * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey * Copyright (c) 1996-1999 Wichert Akkerman * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote products * derived from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "defs.h" #include #include #ifdef HAVE_SYS_EPOLL_H # include #endif #ifdef HAVE_LINUX_PERF_EVENT_H # include #endif static const struct xlat fcntlcmds[] = { XLAT(F_DUPFD), XLAT(F_GETFD), XLAT(F_SETFD), XLAT(F_GETFL), XLAT(F_SETFL), XLAT(F_GETLK), XLAT(F_SETLK), XLAT(F_SETLKW), XLAT(F_GETOWN), XLAT(F_SETOWN), #ifdef F_RSETLK XLAT(F_RSETLK), #endif #ifdef F_RSETLKW XLAT(F_RSETLKW), #endif #ifdef F_RGETLK XLAT(F_RGETLK), #endif #ifdef F_CNVT XLAT(F_CNVT), #endif #ifdef F_SETSIG XLAT(F_SETSIG), #endif #ifdef F_GETSIG XLAT(F_GETSIG), #endif #ifdef F_CHKFL XLAT(F_CHKFL), #endif #ifdef F_DUP2FD XLAT(F_DUP2FD), #endif #ifdef F_ALLOCSP XLAT(F_ALLOCSP), #endif #ifdef F_ISSTREAM XLAT(F_ISSTREAM), #endif #ifdef F_PRIV XLAT(F_PRIV), #endif #ifdef F_NPRIV XLAT(F_NPRIV), #endif #ifdef F_QUOTACL XLAT(F_QUOTACL), #endif #ifdef F_BLOCKS XLAT(F_BLOCKS), #endif #ifdef F_BLKSIZE XLAT(F_BLKSIZE), #endif #ifdef F_GETOWN XLAT(F_GETOWN), #endif #ifdef F_SETOWN XLAT(F_SETOWN), #endif #ifdef F_REVOKE XLAT(F_REVOKE), #endif #ifdef F_SETLK XLAT(F_SETLK), #endif #ifdef F_SETLKW XLAT(F_SETLKW), #endif #ifdef F_GETLK XLAT(F_GETLK), #endif #ifdef F_SETLK64 XLAT(F_SETLK64), #endif #ifdef F_SETLKW64 XLAT(F_SETLKW64), #endif #ifdef F_GETLK64 XLAT(F_GETLK64), #endif #ifdef F_SHARE XLAT(F_SHARE), #endif #ifdef F_UNSHARE XLAT(F_UNSHARE), #endif #ifdef F_SETLEASE XLAT(F_SETLEASE), #endif #ifdef F_GETLEASE XLAT(F_GETLEASE), #endif #ifdef F_NOTIFY XLAT(F_NOTIFY), #endif #ifdef F_DUPFD_CLOEXEC XLAT(F_DUPFD_CLOEXEC), #endif XLAT_END }; static const struct xlat fdflags[] = { #ifdef FD_CLOEXEC XLAT(FD_CLOEXEC), #endif XLAT_END }; #ifdef LOCK_SH static const struct xlat flockcmds[] = { XLAT(LOCK_SH), XLAT(LOCK_EX), XLAT(LOCK_NB), XLAT(LOCK_UN), XLAT_END }; #endif /* LOCK_SH */ static const struct xlat lockfcmds[] = { XLAT(F_RDLCK), XLAT(F_WRLCK), XLAT(F_UNLCK), #ifdef F_EXLCK XLAT(F_EXLCK), #endif #ifdef F_SHLCK XLAT(F_SHLCK), #endif XLAT_END }; #ifdef F_NOTIFY static const struct xlat notifyflags[] = { #ifdef DN_ACCESS XLAT(DN_ACCESS), #endif #ifdef DN_MODIFY XLAT(DN_MODIFY), #endif #ifdef DN_CREATE XLAT(DN_CREATE), #endif #ifdef DN_DELETE XLAT(DN_DELETE), #endif #ifdef DN_RENAME XLAT(DN_RENAME), #endif #ifdef DN_ATTRIB XLAT(DN_ATTRIB), #endif #ifdef DN_MULTISHOT XLAT(DN_MULTISHOT), #endif XLAT_END }; #endif static const struct xlat perf_event_open_flags[] = { #ifdef PERF_FLAG_FD_NO_GROUP XLAT(PERF_FLAG_FD_NO_GROUP), #endif #ifdef PERF_FLAG_FD_OUTPUT XLAT(PERF_FLAG_FD_OUTPUT), #endif #ifdef PERF_FLAG_PID_CGROUP XLAT(PERF_FLAG_PID_CGROUP), #endif XLAT_END }; /* * Assume that F_SETLK64, F_SETLKW64, and F_GETLK64 are either defined * or not defined altogether. */ #if defined(F_SETLK64) && F_SETLK64 + 0 != F_SETLK # define USE_PRINTFLOCK64 1 #else # define USE_PRINTFLOCK64 0 #endif #if USE_PRINTFLOCK64 # ifndef HAVE_STRUCT_FLOCK64 struct flock64 { short int l_type, l_whence; int64_t l_start, l_len; int l_pid; }; # endif static void printflock64(struct tcb *tcp, long addr, int getlk) { struct flock64 fl; if (umove(tcp, addr, &fl) < 0) { tprints("{...}"); return; } tprints("{type="); printxval(lockfcmds, fl.l_type, "F_???"); tprints(", whence="); printxval(whence_codes, fl.l_whence, "SEEK_???"); tprintf(", start=%lld, len=%lld", (long long) fl.l_start, (long long) fl.l_len); if (getlk) tprintf(", pid=%lu}", (unsigned long) fl.l_pid); else tprints("}"); } #endif /* USE_PRINTFLOCK64 */ static void printflock(struct tcb *tcp, long addr, int getlk) { struct flock fl; int r; #if SUPPORTED_PERSONALITIES > 1 if ( # if SIZEOF_OFF_T > SIZEOF_LONG current_personality > 0 && #endif current_wordsize != sizeof(fl.l_start)) { if (current_wordsize == 4) { /* 32-bit x86 app on x86_64 and similar cases */ struct { short int l_type; short int l_whence; int32_t l_start; /* off_t */ int32_t l_len; /* off_t */ int32_t l_pid; /* pid_t */ } fl32; r = umove(tcp, addr, &fl32); if (r >= 0) { fl.l_type = fl32.l_type; fl.l_whence = fl32.l_whence; fl.l_start = fl32.l_start; fl.l_len = fl32.l_len; fl.l_pid = fl32.l_pid; } } else { /* let people know we have a problem here */ tprintf("", current_wordsize); return; } } else #endif { r = umove(tcp, addr, &fl); } if (r < 0) { tprints("{...}"); return; } tprints("{type="); printxval(lockfcmds, fl.l_type, "F_???"); tprints(", whence="); printxval(whence_codes, fl.l_whence, "SEEK_???"); #if SIZEOF_OFF_T > SIZEOF_LONG tprintf(", start=%lld, len=%lld", fl.l_start, fl.l_len); #else tprintf(", start=%ld, len=%ld", fl.l_start, fl.l_len); #endif if (getlk) tprintf(", pid=%lu}", (unsigned long) fl.l_pid); else tprints("}"); } int sys_fcntl(struct tcb *tcp) { if (entering(tcp)) { printfd(tcp, tcp->u_arg[0]); tprints(", "); printxval(fcntlcmds, tcp->u_arg[1], "F_???"); switch (tcp->u_arg[1]) { case F_SETFD: tprints(", "); printflags(fdflags, tcp->u_arg[2], "FD_???"); break; case F_SETOWN: case F_DUPFD: #ifdef F_DUPFD_CLOEXEC case F_DUPFD_CLOEXEC: #endif tprintf(", %ld", tcp->u_arg[2]); break; case F_SETFL: tprints(", "); tprint_open_modes(tcp->u_arg[2]); break; case F_SETLK: case F_SETLKW: tprints(", "); printflock(tcp, tcp->u_arg[2], 0); break; #if USE_PRINTFLOCK64 case F_SETLK64: case F_SETLKW64: tprints(", "); printflock64(tcp, tcp->u_arg[2], 0); break; #endif /* USE_PRINTFLOCK64 */ #ifdef F_NOTIFY case F_NOTIFY: tprints(", "); printflags(notifyflags, tcp->u_arg[2], "DN_???"); break; #endif #ifdef F_SETLEASE case F_SETLEASE: tprints(", "); printxval(lockfcmds, tcp->u_arg[2], "F_???"); break; #endif } } else { switch (tcp->u_arg[1]) { case F_DUPFD: #ifdef F_DUPFD_CLOEXEC case F_DUPFD_CLOEXEC: #endif case F_SETFD: case F_SETFL: case F_SETLK: case F_SETLKW: case F_SETOWN: case F_GETOWN: #ifdef F_NOTIFY case F_NOTIFY: #endif #ifdef F_SETLEASE case F_SETLEASE: #endif break; case F_GETFD: if (syserror(tcp) || tcp->u_rval == 0) return 0; tcp->auxstr = sprintflags("flags ", fdflags, tcp->u_rval); return RVAL_HEX|RVAL_STR; case F_GETFL: if (syserror(tcp)) return 0; tcp->auxstr = sprint_open_modes(tcp->u_rval); return RVAL_HEX|RVAL_STR; case F_GETLK: tprints(", "); printflock(tcp, tcp->u_arg[2], 1); break; #if USE_PRINTFLOCK64 case F_GETLK64: tprints(", "); printflock64(tcp, tcp->u_arg[2], 1); break; #endif #ifdef F_GETLEASE case F_GETLEASE: if (syserror(tcp)) return 0; tcp->auxstr = xlookup(lockfcmds, tcp->u_rval); return RVAL_HEX|RVAL_STR; #endif default: tprintf(", %#lx", tcp->u_arg[2]); break; } } return 0; } #ifdef LOCK_SH int sys_flock(struct tcb *tcp) { if (entering(tcp)) { printfd(tcp, tcp->u_arg[0]); tprints(", "); printflags(flockcmds, tcp->u_arg[1], "LOCK_???"); } return 0; } #endif /* LOCK_SH */ int sys_close(struct tcb *tcp) { if (entering(tcp)) { printfd(tcp, tcp->u_arg[0]); } return 0; } static int do_dup2(struct tcb *tcp, int flags_arg) { if (entering(tcp)) { printfd(tcp, tcp->u_arg[0]); tprints(", "); printfd(tcp, tcp->u_arg[1]); if (flags_arg >= 0) { tprints(", "); printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???"); } } return 0; } int sys_dup2(struct tcb *tcp) { return do_dup2(tcp, -1); } int sys_dup3(struct tcb *tcp) { return do_dup2(tcp, 2); } #if defined(ALPHA) int sys_getdtablesize(struct tcb *tcp) { return 0; } #endif static int decode_select(struct tcb *tcp, long *args, enum bitness_t bitness) { int i, j; int nfds, fdsize; fd_set *fds; const char *sep; long arg; /* Kernel truncates arg[0] to int, we do the same. */ nfds = (int) args[0]; /* Kernel rejects negative nfds, so we don't parse it either. */ if (nfds < 0) { nfds = 0; fds = NULL; } /* Beware of select(2^31-1, NULL, NULL, NULL) and similar... */ if (nfds > 1024*1024) nfds = 1024*1024; /* * We had bugs a-la "while (j < args[0])" and "umoven(args[0])" below. * Instead of args[0], use nfds for fd count, fdsize for array lengths. */ fdsize = (((nfds + 7) / 8) + current_wordsize-1) & -current_wordsize; if (entering(tcp)) { tprintf("%d", (int) args[0]); if (fdsize > 0) { fds = malloc(fdsize); if (!fds) die_out_of_memory(); } for (i = 0; i < 3; i++) { arg = args[i+1]; if (arg == 0) { tprints(", NULL"); continue; } if (!verbose(tcp) || !fds) { tprintf(", %#lx", arg); continue; } if (umoven(tcp, arg, fdsize, (char *) fds) < 0) { tprints(", [?]"); continue; } tprints(", ["); for (j = 0, sep = "";; j++) { j = next_set_bit(fds, j, nfds); if (j < 0) break; tprints(sep); printfd(tcp, j); sep = " "; } tprints("]"); } free(fds); tprints(", "); printtv_bitness(tcp, args[4], bitness, 0); } else { static char outstr[1024]; char *outptr; #define end_outstr (outstr + sizeof(outstr)) int ready_fds; if (syserror(tcp)) return 0; ready_fds = tcp->u_rval; if (ready_fds == 0) { tcp->auxstr = "Timeout"; return RVAL_STR; } fds = malloc(fdsize); if (!fds) die_out_of_memory(); outptr = outstr; sep = ""; for (i = 0; i < 3 && ready_fds > 0; i++) { int first = 1; arg = args[i+1]; if (!arg || umoven(tcp, arg, fdsize, (char *) fds) < 0) continue; for (j = 0;; j++) { j = next_set_bit(fds, j, nfds); if (j < 0) break; /* +2 chars needed at the end: ']',NUL */ if (outptr < end_outstr - (sizeof(", except [") + sizeof(int)*3 + 2)) { if (first) { outptr += sprintf(outptr, "%s%s [%u", sep, i == 0 ? "in" : i == 1 ? "out" : "except", j ); first = 0; sep = ", "; } else { outptr += sprintf(outptr, " %u", j); } } if (--ready_fds == 0) break; } if (outptr != outstr) *outptr++ = ']'; } free(fds); /* This contains no useful information on SunOS. */ if (args[4]) { if (outptr < end_outstr - (10 + TIMEVAL_TEXT_BUFSIZE)) { outptr += sprintf(outptr, "%sleft ", sep); outptr = sprinttv(outptr, tcp, args[4], bitness, /*special:*/ 0); } } *outptr = '\0'; tcp->auxstr = outstr; return RVAL_STR; #undef end_outstr } return 0; } int sys_oldselect(struct tcb *tcp) { long args[5]; if (umoven(tcp, tcp->u_arg[0], sizeof args, (char *) args) < 0) { tprints("[...]"); return 0; } return decode_select(tcp, args, BITNESS_CURRENT); } #ifdef ALPHA int sys_osf_select(struct tcb *tcp) { long *args = tcp->u_arg; return decode_select(tcp, args, BITNESS_32); } #endif static const struct xlat epollctls[] = { #ifdef EPOLL_CTL_ADD XLAT(EPOLL_CTL_ADD), #endif #ifdef EPOLL_CTL_MOD XLAT(EPOLL_CTL_MOD), #endif #ifdef EPOLL_CTL_DEL XLAT(EPOLL_CTL_DEL), #endif XLAT_END }; static const struct xlat epollevents[] = { #ifdef EPOLLIN XLAT(EPOLLIN), #endif #ifdef EPOLLPRI XLAT(EPOLLPRI), #endif #ifdef EPOLLOUT XLAT(EPOLLOUT), #endif #ifdef EPOLLRDNORM XLAT(EPOLLRDNORM), #endif #ifdef EPOLLRDBAND XLAT(EPOLLRDBAND), #endif #ifdef EPOLLWRNORM XLAT(EPOLLWRNORM), #endif #ifdef EPOLLWRBAND XLAT(EPOLLWRBAND), #endif #ifdef EPOLLMSG XLAT(EPOLLMSG), #endif #ifdef EPOLLERR XLAT(EPOLLERR), #endif #ifdef EPOLLHUP XLAT(EPOLLHUP), #endif #ifdef EPOLLRDHUP XLAT(EPOLLRDHUP), #endif #ifdef EPOLLONESHOT XLAT(EPOLLONESHOT), #endif #ifdef EPOLLET XLAT(EPOLLET), #endif XLAT_END }; /* Not aliased to printargs_ld: we want it to have a distinct address */ int sys_epoll_create(struct tcb *tcp) { return printargs_ld(tcp); } static const struct xlat epollflags[] = { #ifdef EPOLL_CLOEXEC XLAT(EPOLL_CLOEXEC), #endif #ifdef EPOLL_NONBLOCK XLAT(EPOLL_NONBLOCK), #endif XLAT_END }; int sys_epoll_create1(struct tcb *tcp) { if (entering(tcp)) printflags(epollflags, tcp->u_arg[0], "EPOLL_???"); return 0; } #ifdef HAVE_SYS_EPOLL_H static void print_epoll_event(struct epoll_event *ev) { tprints("{"); printflags(epollevents, ev->events, "EPOLL???"); /* We cannot know what format the program uses, so print u32 and u64 which will cover every value. */ tprintf(", {u32=%" PRIu32 ", u64=%" PRIu64 "}}", ev->data.u32, ev->data.u64); } #endif int sys_epoll_ctl(struct tcb *tcp) { if (entering(tcp)) { printfd(tcp, tcp->u_arg[0]); tprints(", "); printxval(epollctls, tcp->u_arg[1], "EPOLL_CTL_???"); tprints(", "); printfd(tcp, tcp->u_arg[2]); tprints(", "); if (tcp->u_arg[3] == 0) tprints("NULL"); else { #ifdef HAVE_SYS_EPOLL_H struct epoll_event ev; if ( #ifdef EPOLL_CTL_DEL (tcp->u_arg[1] != EPOLL_CTL_DEL) && #endif umove(tcp, tcp->u_arg[3], &ev) == 0) print_epoll_event(&ev); else #endif tprintf("%lx", tcp->u_arg[3]); } } return 0; } static void epoll_wait_common(struct tcb *tcp) { if (entering(tcp)) { printfd(tcp, tcp->u_arg[0]); tprints(", "); } else { if (syserror(tcp)) tprintf("%lx", tcp->u_arg[1]); else if (tcp->u_rval == 0) tprints("{}"); else { #ifdef HAVE_SYS_EPOLL_H struct epoll_event ev, *start, *cur, *end; int failed = 0; tprints("{"); start = (struct epoll_event *) tcp->u_arg[1]; end = start + tcp->u_rval; for (cur = start; cur < end; ++cur) { if (cur > start) tprints(", "); if (umove(tcp, (long) cur, &ev) == 0) print_epoll_event(&ev); else { tprints("?"); failed = 1; break; } } tprints("}"); if (failed) tprintf(" %#lx", (long) start); #else tprints("{...}"); #endif } tprintf(", %d, %d", (int) tcp->u_arg[2], (int) tcp->u_arg[3]); } } int sys_epoll_wait(struct tcb *tcp) { epoll_wait_common(tcp); return 0; } int sys_epoll_pwait(struct tcb *tcp) { epoll_wait_common(tcp); if (exiting(tcp)) { tprints(", "); /* NB: kernel requires arg[5] == NSIG / 8 */ print_sigset_addr_len(tcp, tcp->u_arg[4], tcp->u_arg[5]); tprintf(", %lu", tcp->u_arg[5]); } return 0; } int sys_select(struct tcb *tcp) { return decode_select(tcp, tcp->u_arg, BITNESS_CURRENT); } int sys_pselect6(struct tcb *tcp) { int rc = decode_select(tcp, tcp->u_arg, BITNESS_CURRENT); if (entering(tcp)) { long r; struct { unsigned long ptr; unsigned long len; } data; #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4 if (current_wordsize == 4) { struct { uint32_t ptr; uint32_t len; } data32; r = umove(tcp, tcp->u_arg[5], &data32); data.ptr = data32.ptr; data.len = data32.len; } else #endif r = umove(tcp, tcp->u_arg[5], &data); if (r < 0) tprintf(", %#lx", tcp->u_arg[5]); else { tprints(", {"); /* NB: kernel requires data.len == NSIG / 8 */ print_sigset_addr_len(tcp, data.ptr, data.len); tprintf(", %lu}", data.len); } } return rc; } static int do_eventfd(struct tcb *tcp, int flags_arg) { if (entering(tcp)) { tprintf("%lu", tcp->u_arg[0]); if (flags_arg >= 0) { tprints(", "); printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???"); } } return 0; } int sys_eventfd(struct tcb *tcp) { return do_eventfd(tcp, -1); } int sys_eventfd2(struct tcb *tcp) { return do_eventfd(tcp, 1); } int sys_perf_event_open(struct tcb *tcp) { if (entering(tcp)) { tprintf("%#lx, %d, %d, %d, ", tcp->u_arg[0], (int) tcp->u_arg[1], (int) tcp->u_arg[2], (int) tcp->u_arg[3]); printflags(perf_event_open_flags, tcp->u_arg[4], "PERF_FLAG_???"); } return 0; }