summaryrefslogtreecommitdiffstats
path: root/usr.bin/truss/i386-linux.c
diff options
context:
space:
mode:
Diffstat (limited to 'usr.bin/truss/i386-linux.c')
-rw-r--r--usr.bin/truss/i386-linux.c374
1 files changed, 189 insertions, 185 deletions
diff --git a/usr.bin/truss/i386-linux.c b/usr.bin/truss/i386-linux.c
index 66bccf9..6a0c261 100644
--- a/usr.bin/truss/i386-linux.c
+++ b/usr.bin/truss/i386-linux.c
@@ -86,15 +86,17 @@ static struct linux_syscall {
/* Clear up and free parts of the fsc structure. */
static __inline void
-clear_fsc(void) {
- if (fsc.s_args) {
- int i;
- for (i = 0; i < fsc.nargs; i++)
- if (fsc.s_args[i])
- free(fsc.s_args[i]);
- free(fsc.s_args);
- }
- memset(&fsc, 0, sizeof(fsc));
+clear_fsc(void)
+{
+ int i;
+
+ if (fsc.s_args) {
+ for (i = 0; i < fsc.nargs; i++)
+ if (fsc.s_args[i])
+ free(fsc.s_args[i]);
+ free(fsc.s_args);
+ }
+ memset(&fsc, 0, sizeof(fsc));
}
/*
@@ -105,211 +107,213 @@ clear_fsc(void) {
*/
void
-i386_linux_syscall_entry(struct trussinfo *trussinfo, int nargs) {
- struct reg regs;
- int syscall_num;
- int i;
- struct syscall *sc;
-
- cpid = trussinfo->curthread->tid;
-
- clear_fsc();
-
- if (ptrace(PT_GETREGS, cpid, (caddr_t)&regs, 0) < 0)
- {
- fprintf(trussinfo->outfile, "-- CANNOT READ REGISTERS --\n");
- return;
- }
- syscall_num = regs.r_eax;
-
- fsc.number = syscall_num;
- fsc.name =
- (syscall_num < 0 || syscall_num >= nsyscalls) ? NULL : linux_syscallnames[syscall_num];
- if (!fsc.name) {
- fprintf(trussinfo->outfile, "-- UNKNOWN SYSCALL %d --\n", syscall_num);
- }
-
- if (fsc.name && (trussinfo->flags & FOLLOWFORKS)
- && ((!strcmp(fsc.name, "linux_fork")
- || !strcmp(fsc.name, "linux_vfork"))))
- {
- trussinfo->curthread->in_fork = 1;
- }
-
- if (nargs == 0)
- return;
-
- /*
- * Linux passes syscall arguments in registers, not
- * on the stack. Fortunately, we've got access to the
- * register set. Note that we don't bother checking the
- * number of arguments. And what does linux do for syscalls
- * that have more than five arguments?
- */
-
- fsc.args[0] = regs.r_ebx;
- fsc.args[1] = regs.r_ecx;
- fsc.args[2] = regs.r_edx;
- fsc.args[3] = regs.r_esi;
- fsc.args[4] = regs.r_edi;
-
- sc = get_syscall(fsc.name);
- if (sc) {
- fsc.nargs = sc->nargs;
- } else {
+i386_linux_syscall_entry(struct trussinfo *trussinfo, int nargs)
+{
+ struct reg regs;
+ struct syscall *sc;
+ int i, syscall_num;
+
+ clear_fsc();
+
+ cpid = trussinfo->curthread->tid;
+
+ if (ptrace(PT_GETREGS, cpid, (caddr_t)&regs, 0) < 0) {
+ fprintf(trussinfo->outfile, "-- CANNOT READ REGISTERS --\n");
+ return;
+ }
+
+ syscall_num = regs.r_eax;
+
+ fsc.number = syscall_num;
+ fsc.name = (syscall_num < 0 || syscall_num >= nsyscalls) ?
+ NULL : linux_syscallnames[syscall_num];
+ if (!fsc.name) {
+ fprintf(trussinfo->outfile, "-- UNKNOWN SYSCALL %d --\n",
+ syscall_num);
+ }
+
+ if (fsc.name && (trussinfo->flags & FOLLOWFORKS) &&
+ (strcmp(fsc.name, "linux_fork") == 0 ||
+ strcmp(fsc.name, "linux_vfork") == 0))
+ trussinfo->curthread->in_fork = 1;
+
+ if (nargs == 0)
+ return;
+
+ /*
+ * Linux passes syscall arguments in registers, not
+ * on the stack. Fortunately, we've got access to the
+ * register set. Note that we don't bother checking the
+ * number of arguments. And what does linux do for syscalls
+ * that have more than five arguments?
+ */
+
+ fsc.args[0] = regs.r_ebx;
+ fsc.args[1] = regs.r_ecx;
+ fsc.args[2] = regs.r_edx;
+ fsc.args[3] = regs.r_esi;
+ fsc.args[4] = regs.r_edi;
+
+ sc = get_syscall(fsc.name);
+ if (sc)
+ fsc.nargs = sc->nargs;
+ else {
#if DEBUG
- fprintf(trussinfo->outfile, "unknown syscall %s -- setting args to %d\n",
- fsc.name, nargs);
+ fprintf(trussinfo->outfile, "unknown syscall %s -- setting "
+ "args to %d\n", fsc.name, nargs);
#endif
- fsc.nargs = nargs;
- }
-
- fsc.s_args = calloc(1, (1+fsc.nargs) * sizeof(char*));
- fsc.sc = sc;
+ fsc.nargs = nargs;
+ }
- /*
- * At this point, we set up the system call arguments.
- * We ignore any OUT ones, however -- those are arguments that
- * are set by the system call, and so are probably meaningless
- * now. This doesn't currently support arguments that are
- * passed in *and* out, however.
- */
+ fsc.s_args = calloc(1, (1 + fsc.nargs) * sizeof(char *));
+ fsc.sc = sc;
- if (fsc.name) {
+ /*
+ * At this point, we set up the system call arguments.
+ * We ignore any OUT ones, however -- those are arguments that
+ * are set by the system call, and so are probably meaningless
+ * now. This doesn't currently support arguments that are
+ * passed in *and* out, however.
+ */
+ if (fsc.name) {
#if DEBUG
- fprintf(stderr, "syscall %s(", fsc.name);
+ fprintf(stderr, "syscall %s(", fsc.name);
#endif
- for (i = 0; i < fsc.nargs; i++) {
+ for (i = 0; i < fsc.nargs; i++) {
#if DEBUG
- fprintf(stderr, "0x%x%s",
- sc
- ? fsc.args[sc->args[i].offset]
- : fsc.args[i],
- i < (fsc.nargs - 1) ? "," : "");
+ fprintf(stderr, "0x%x%s", sc ?
+ fsc.args[sc->args[i].offset] : fsc.args[i],
+ i < (fsc.nargs - 1) ? "," : "");
#endif
- if (sc && !(sc->args[i].type & OUT)) {
- fsc.s_args[i] = print_arg(&sc->args[i], fsc.args, 0, trussinfo);
- }
- }
+ if (sc && !(sc->args[i].type & OUT)) {
+ fsc.s_args[i] = print_arg(&sc->args[i],
+ fsc.args, 0, trussinfo);
+ }
+ }
#if DEBUG
- fprintf(stderr, ")\n");
+ fprintf(stderr, ")\n");
#endif
- }
+ }
#if DEBUG
- fprintf(trussinfo->outfile, "\n");
+ fprintf(trussinfo->outfile, "\n");
#endif
- if (fsc.name != NULL &&
- (!strcmp(fsc.name, "linux_execve") || !strcmp(fsc.name, "exit"))) {
-
- /* XXX
- * This could be done in a more general
- * manner but it still wouldn't be very pretty.
- */
- if (!strcmp(fsc.name, "linux_execve")) {
- if ((trussinfo->flags & EXECVEARGS) == 0)
- if (fsc.s_args[1]) {
- free(fsc.s_args[1]);
- fsc.s_args[1] = NULL;
- }
- if ((trussinfo->flags & EXECVEENVS) == 0)
- if (fsc.s_args[2]) {
- free(fsc.s_args[2]);
- fsc.s_args[2] = NULL;
- }
- }
- }
-
- return;
+ if (fsc.name != NULL && (strcmp(fsc.name, "linux_execve") == 0 ||
+ strcmp(fsc.name, "exit") == 0)) {
+ /*
+ * XXX
+ * This could be done in a more general
+ * manner but it still wouldn't be very pretty.
+ */
+ if (strcmp(fsc.name, "linux_execve") == 0) {
+ if ((trussinfo->flags & EXECVEARGS) == 0) {
+ if (fsc.s_args[1]) {
+ free(fsc.s_args[1]);
+ fsc.s_args[1] = NULL;
+ }
+ }
+ if ((trussinfo->flags & EXECVEENVS) == 0) {
+ if (fsc.s_args[2]) {
+ free(fsc.s_args[2]);
+ fsc.s_args[2] = NULL;
+ }
+ }
+ }
+ }
+
+ return;
}
/*
* Linux syscalls return negative errno's, we do positive and map them
*/
static const int bsd_to_linux_errno[] = {
- -0, -1, -2, -3, -4, -5, -6, -7, -8, -9,
- -10, -35, -12, -13, -14, -15, -16, -17, -18, -19,
- -20, -21, -22, -23, -24, -25, -26, -27, -28, -29,
- -30, -31, -32, -33, -34, -11,-115,-114, -88, -89,
- -90, -91, -92, -93, -94, -95, -96, -97, -98, -99,
+ -0, -1, -2, -3, -4, -5, -6, -7, -8, -9,
+ -10, -35, -12, -13, -14, -15, -16, -17, -18, -19,
+ -20, -21, -22, -23, -24, -25, -26, -27, -28, -29,
+ -30, -31, -32, -33, -34, -11,-115,-114, -88, -89,
+ -90, -91, -92, -93, -94, -95, -96, -97, -98, -99,
-100,-101,-102,-103,-104,-105,-106,-107,-108,-109,
-110,-111, -40, -36,-112,-113, -39, -11, -87,-122,
-116, -66, -6, -6, -6, -6, -6, -37, -38, -9,
- -6,
+ -6,
};
long
i386_linux_syscall_exit(struct trussinfo *trussinfo, int syscall_num __unused)
{
- struct reg regs;
- long retval;
- int i;
- int errorp;
- struct syscall *sc;
-
- if (fsc.name == NULL)
- return (-1);
-
- cpid = trussinfo->curthread->tid;
- if (ptrace(PT_GETREGS, cpid, (caddr_t)&regs, 0) < 0)
- {
- fprintf(trussinfo->outfile, "-- CANNOT READ REGISTERS --\n");
- return (-1);
- }
-
- retval = regs.r_eax;
- errorp = !!(regs.r_eflags & PSL_C);
-
- /*
- * This code, while simpler than the initial versions I used, could
- * stand some significant cleaning.
- */
-
- sc = fsc.sc;
- if (!sc) {
- for (i = 0; i < fsc.nargs; i++)
- asprintf(&fsc.s_args[i], "0x%lx", fsc.args[i]);
- } else {
- /*
- * Here, we only look for arguments that have OUT masked in --
- * otherwise, they were handled in the syscall_entry function.
- */
- for (i = 0; i < sc->nargs; i++) {
- char *temp;
- if (sc->args[i].type & OUT) {
+ struct reg regs;
+ struct syscall *sc;
+ long retval;
+ int errorp, i;
+
+ if (fsc.name == NULL)
+ return (-1);
+
+ cpid = trussinfo->curthread->tid;
+
+ if (ptrace(PT_GETREGS, cpid, (caddr_t)&regs, 0) < 0) {
+ fprintf(trussinfo->outfile, "-- CANNOT READ REGISTERS --\n");
+ return (-1);
+ }
+
+ retval = regs.r_eax;
+ errorp = !!(regs.r_eflags & PSL_C);
+
+ /*
+ * This code, while simpler than the initial versions I used, could
+ * stand some significant cleaning.
+ */
+
+ sc = fsc.sc;
+ if (!sc) {
+ for (i = 0; i < fsc.nargs; i++)
+ asprintf(&fsc.s_args[i], "0x%lx", fsc.args[i]);
+ } else {
+ /*
+ * Here, we only look for arguments that have OUT masked in --
+ * otherwise, they were handled in the syscall_entry function.
+ */
+ for (i = 0; i < sc->nargs; i++) {
+ char *temp;
+ if (sc->args[i].type & OUT) {
+ /*
+ * If an error occurred, then don't bother
+ * getting the data; it may not be valid.
+ */
+ if (errorp) {
+ asprintf(&temp, "0x%lx",
+ fsc.args[sc->args[i].offset]);
+ } else {
+ temp = print_arg(&sc->args[i],
+ fsc.args, retval, trussinfo);
+ }
+ fsc.s_args[i] = temp;
+ }
+ }
+ }
+
/*
- * If an error occurred, than don't bothe getting the data;
- * it may not be valid.
+ * It would probably be a good idea to merge the error handling,
+ * but that complicates things considerably.
*/
- if (errorp)
- asprintf(&temp, "0x%lx", fsc.args[sc->args[i].offset]);
- else
- temp = print_arg(&sc->args[i], fsc.args, retval, trussinfo);
- fsc.s_args[i] = temp;
- }
- }
- }
-
- /*
- * It would probably be a good idea to merge the error handling,
- * but that complicates things considerably.
- */
- if (errorp) {
- for (i = 0; (size_t)i < sizeof(bsd_to_linux_errno) / sizeof(int); i++)
- if (retval == bsd_to_linux_errno[i])
- break;
- }
-
- if (fsc.name != NULL &&
- (!strcmp(fsc.name, "linux_execve") || !strcmp(fsc.name, "exit"))) {
- trussinfo->curthread->in_syscall = 1;
- }
-
- print_syscall_ret(trussinfo, fsc.name, fsc.nargs, fsc.s_args, errorp,
- errorp ? i : retval, fsc.sc);
- clear_fsc();
-
- return (retval);
+ if (errorp) {
+ for (i = 0;
+ (size_t)i < sizeof(bsd_to_linux_errno) / sizeof(int); i++) {
+ if (retval == bsd_to_linux_errno[i])
+ break;
+ }
+ }
+
+ if (fsc.name != NULL && (strcmp(fsc.name, "linux_execve") == 0 ||
+ strcmp(fsc.name, "exit") == 0))
+ trussinfo->curthread->in_syscall = 1;
+
+ print_syscall_ret(trussinfo, fsc.name, fsc.nargs, fsc.s_args, errorp,
+ errorp ? i : retval, fsc.sc);
+ clear_fsc();
+
+ return (retval);
}
OpenPOWER on IntegriCloud