1994-05-27 12:33:43 +00:00
|
|
|
/*-
|
|
|
|
* Copyright (c) 1988, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef lint
|
1997-07-16 06:49:49 +00:00
|
|
|
static const char copyright[] =
|
1994-05-27 12:33:43 +00:00
|
|
|
"@(#) Copyright (c) 1988, 1993\n\
|
|
|
|
The Regents of the University of California. All rights reserved.\n";
|
|
|
|
#endif /* not lint */
|
|
|
|
|
|
|
|
#ifndef lint
|
1997-07-16 06:49:49 +00:00
|
|
|
#if 0
|
1994-05-27 12:33:43 +00:00
|
|
|
static char sccsid[] = "@(#)kdump.c 8.1 (Berkeley) 6/6/93";
|
1997-07-16 06:49:49 +00:00
|
|
|
#endif
|
1994-05-27 12:33:43 +00:00
|
|
|
#endif /* not lint */
|
2002-06-30 05:25:07 +00:00
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
1994-05-27 12:33:43 +00:00
|
|
|
|
1999-12-29 05:07:58 +00:00
|
|
|
#define _KERNEL
|
1994-08-22 14:28:54 +00:00
|
|
|
extern int errno;
|
|
|
|
#include <sys/errno.h>
|
1999-12-29 05:07:58 +00:00
|
|
|
#undef _KERNEL
|
1994-05-27 12:33:43 +00:00
|
|
|
#include <sys/param.h>
|
2014-03-16 11:04:44 +00:00
|
|
|
#include <sys/capsicum.h>
|
1994-05-27 12:33:43 +00:00
|
|
|
#include <sys/errno.h>
|
2002-07-28 16:05:07 +00:00
|
|
|
#define _KERNEL
|
1994-05-27 12:33:43 +00:00
|
|
|
#include <sys/time.h>
|
2002-07-28 16:05:07 +00:00
|
|
|
#undef _KERNEL
|
1994-05-27 12:33:43 +00:00
|
|
|
#include <sys/uio.h>
|
|
|
|
#include <sys/ktrace.h>
|
|
|
|
#include <sys/ioctl.h>
|
2007-01-04 04:46:59 +00:00
|
|
|
#include <sys/socket.h>
|
2008-02-23 01:01:49 +00:00
|
|
|
#include <sys/stat.h>
|
2011-02-25 22:07:23 +00:00
|
|
|
#include <sys/sysent.h>
|
2014-10-13 16:37:06 +00:00
|
|
|
#include <sys/umtx.h>
|
2008-02-23 01:01:49 +00:00
|
|
|
#include <sys/un.h>
|
2011-02-25 22:07:23 +00:00
|
|
|
#include <sys/queue.h>
|
2013-09-12 18:08:25 +00:00
|
|
|
#include <sys/wait.h>
|
2009-03-20 18:29:52 +00:00
|
|
|
#include <arpa/inet.h>
|
2008-02-23 01:01:49 +00:00
|
|
|
#include <netinet/in.h>
|
2009-03-20 18:29:52 +00:00
|
|
|
#include <ctype.h>
|
2007-01-09 17:50:05 +00:00
|
|
|
#include <dlfcn.h>
|
1997-07-16 06:49:49 +00:00
|
|
|
#include <err.h>
|
2008-02-23 01:01:49 +00:00
|
|
|
#include <grp.h>
|
|
|
|
#include <inttypes.h>
|
2013-12-15 23:09:05 +00:00
|
|
|
#ifdef HAVE_LIBCAPSICUM
|
|
|
|
#include <libcapsicum.h>
|
|
|
|
#include <libcapsicum_grp.h>
|
|
|
|
#include <libcapsicum_pwd.h>
|
|
|
|
#include <libcapsicum_service.h>
|
|
|
|
#endif
|
1997-07-16 06:49:49 +00:00
|
|
|
#include <locale.h>
|
2013-06-07 08:06:48 +00:00
|
|
|
#include <netdb.h>
|
2013-05-28 21:25:28 +00:00
|
|
|
#include <nl_types.h>
|
2013-12-15 23:09:05 +00:00
|
|
|
#ifdef HAVE_LIBCAPSICUM
|
|
|
|
#include <nv.h>
|
|
|
|
#endif
|
2008-02-23 01:01:49 +00:00
|
|
|
#include <pwd.h>
|
1994-05-27 12:33:43 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2013-05-28 21:25:28 +00:00
|
|
|
#include <termios.h>
|
2008-02-23 01:01:49 +00:00
|
|
|
#include <time.h>
|
1997-07-16 06:49:49 +00:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <vis.h>
|
1994-05-27 12:33:43 +00:00
|
|
|
#include "ktrace.h"
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
#include "kdump_subr.h"
|
1994-05-27 12:33:43 +00:00
|
|
|
|
2011-02-25 22:07:23 +00:00
|
|
|
u_int abidump(struct ktr_header *);
|
|
|
|
int fetchprocinfo(struct ktr_header *, u_int *);
|
2002-07-28 16:05:07 +00:00
|
|
|
int fread_tail(void *, int, int);
|
|
|
|
void dumpheader(struct ktr_header *);
|
2011-02-25 22:07:23 +00:00
|
|
|
void ktrsyscall(struct ktr_syscall *, u_int);
|
|
|
|
void ktrsysret(struct ktr_sysret *, u_int);
|
2002-07-28 16:05:07 +00:00
|
|
|
void ktrnamei(char *, int);
|
2003-06-03 01:44:43 +00:00
|
|
|
void hexdump(char *, int, int);
|
|
|
|
void visdump(char *, int, int);
|
2002-07-28 16:05:07 +00:00
|
|
|
void ktrgenio(struct ktr_genio *, int);
|
2011-03-01 16:42:28 +00:00
|
|
|
void ktrpsig(struct ktr_psig *);
|
2002-07-28 16:05:07 +00:00
|
|
|
void ktrcsw(struct ktr_csw *);
|
2012-04-20 15:32:36 +00:00
|
|
|
void ktrcsw_old(struct ktr_csw_old *);
|
2014-10-13 16:17:42 +00:00
|
|
|
void ktruser_malloc(void *);
|
|
|
|
void ktruser_rtld(int, void *);
|
|
|
|
void ktruser(int, void *);
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
void ktrcaprights(cap_rights_t *);
|
2008-02-23 01:01:49 +00:00
|
|
|
void ktrsockaddr(struct sockaddr *);
|
|
|
|
void ktrstat(struct stat *);
|
|
|
|
void ktrstruct(char *, size_t);
|
2011-10-11 20:37:10 +00:00
|
|
|
void ktrcapfail(struct ktr_cap_fail *);
|
2012-04-05 17:13:14 +00:00
|
|
|
void ktrfault(struct ktr_fault *);
|
|
|
|
void ktrfaultend(struct ktr_faultend *);
|
2013-05-28 21:25:28 +00:00
|
|
|
void limitfd(int fd);
|
2002-07-28 16:05:07 +00:00
|
|
|
void usage(void);
|
2011-10-08 12:47:00 +00:00
|
|
|
void ioctlname(unsigned long, int);
|
2002-07-28 16:05:07 +00:00
|
|
|
|
2014-03-25 23:37:57 +00:00
|
|
|
#define TIMESTAMP_NONE 0x0
|
|
|
|
#define TIMESTAMP_ABSOLUTE 0x1
|
|
|
|
#define TIMESTAMP_ELAPSED 0x2
|
|
|
|
#define TIMESTAMP_RELATIVE 0x4
|
|
|
|
|
2014-10-13 16:17:42 +00:00
|
|
|
extern const char *signames[], *syscallnames[];
|
|
|
|
extern int nsyscalls;
|
|
|
|
|
|
|
|
static int timestamp, decimal, fancy = 1, suppressdata, tail, threads, maxdata,
|
2014-03-28 16:11:20 +00:00
|
|
|
resolv = 0, abiflag = 0, syscallno = 0;
|
2014-10-13 16:17:42 +00:00
|
|
|
static const char *tracefile = DEF_TRACEFILE;
|
|
|
|
static struct ktr_header ktr_header;
|
1994-05-27 12:33:43 +00:00
|
|
|
|
2008-02-23 01:01:49 +00:00
|
|
|
#define TIME_FORMAT "%b %e %T %Y"
|
1994-05-27 12:33:43 +00:00
|
|
|
#define eqs(s1, s2) (strcmp((s1), (s2)) == 0)
|
|
|
|
|
2011-10-11 15:04:58 +00:00
|
|
|
#define print_number(i,n,c) do { \
|
|
|
|
if (decimal) \
|
|
|
|
printf("%c%jd", c, (intmax_t)*i); \
|
|
|
|
else \
|
|
|
|
printf("%c%#jx", c, (uintmax_t)(u_register_t)*i); \
|
|
|
|
i++; \
|
|
|
|
n--; \
|
|
|
|
c = ','; \
|
2011-10-08 21:02:08 +00:00
|
|
|
} while (0)
|
2011-03-01 16:42:28 +00:00
|
|
|
|
|
|
|
#if defined(__amd64__) || defined(__i386__)
|
|
|
|
|
|
|
|
void linux_ktrsyscall(struct ktr_syscall *);
|
|
|
|
void linux_ktrsysret(struct ktr_sysret *);
|
|
|
|
extern char *linux_syscallnames[];
|
|
|
|
extern int nlinux_syscalls;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* from linux.h
|
|
|
|
* Linux syscalls return negative errno's, we do positive and map them
|
|
|
|
*/
|
|
|
|
static int bsd_to_linux_errno[ELAST + 1] = {
|
|
|
|
-0, -1, -2, -3, -4, -5, -6, -7, -8, -9,
|
|
|
|
-10, -35, -12, -13, -14, -15, -16, -17, -18, -19,
|
|
|
|
-20, -21, -22, -23, -24, -25, -26, -27, -28, -29,
|
|
|
|
-30, -31, -32, -33, -34, -11,-115,-114, -88, -89,
|
|
|
|
-90, -91, -92, -93, -94, -95, -96, -97, -98, -99,
|
|
|
|
-100,-101,-102,-103,-104,-105,-106,-107,-108,-109,
|
|
|
|
-110,-111, -40, -36,-112,-113, -39, -11, -87,-122,
|
|
|
|
-116, -66, -6, -6, -6, -6, -6, -37, -38, -9,
|
|
|
|
-6, -6, -43, -42, -75,-125, -84, -95, -16, -74,
|
|
|
|
-72, -67, -71
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2011-02-25 22:07:23 +00:00
|
|
|
struct proc_info
|
|
|
|
{
|
|
|
|
TAILQ_ENTRY(proc_info) info;
|
|
|
|
u_int sv_flags;
|
|
|
|
pid_t pid;
|
|
|
|
};
|
|
|
|
|
2014-10-13 16:17:42 +00:00
|
|
|
static TAILQ_HEAD(trace_procs, proc_info) trace_procs;
|
2011-02-25 22:07:23 +00:00
|
|
|
|
2013-12-15 23:09:05 +00:00
|
|
|
#ifdef HAVE_LIBCAPSICUM
|
|
|
|
static cap_channel_t *cappwd, *capgrp;
|
|
|
|
#endif
|
|
|
|
|
2013-07-18 21:56:10 +00:00
|
|
|
static void
|
|
|
|
strerror_init(void)
|
|
|
|
{
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Cache NLS data before entering capability mode.
|
|
|
|
* XXXPJD: There should be strerror_init() and strsignal_init() in libc.
|
|
|
|
*/
|
|
|
|
(void)catopen("libc", NL_CAT_LOCALE);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
localtime_init(void)
|
|
|
|
{
|
|
|
|
time_t ltime;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Allow localtime(3) to cache /etc/localtime content before entering
|
|
|
|
* capability mode.
|
|
|
|
* XXXPJD: There should be localtime_init() in libc.
|
|
|
|
*/
|
|
|
|
(void)time(<ime);
|
|
|
|
(void)localtime(<ime);
|
|
|
|
}
|
|
|
|
|
2013-12-15 23:09:05 +00:00
|
|
|
#ifdef HAVE_LIBCAPSICUM
|
|
|
|
static int
|
|
|
|
cappwdgrp_setup(cap_channel_t **cappwdp, cap_channel_t **capgrpp)
|
|
|
|
{
|
|
|
|
cap_channel_t *capcas, *cappwdloc, *capgrploc;
|
|
|
|
const char *cmds[1], *fields[1];
|
|
|
|
|
|
|
|
capcas = cap_init();
|
|
|
|
if (capcas == NULL) {
|
|
|
|
warn("unable to contact casperd");
|
2013-12-19 00:51:48 +00:00
|
|
|
return (-1);
|
2013-12-15 23:09:05 +00:00
|
|
|
}
|
|
|
|
cappwdloc = cap_service_open(capcas, "system.pwd");
|
|
|
|
capgrploc = cap_service_open(capcas, "system.grp");
|
|
|
|
/* Casper capability no longer needed. */
|
|
|
|
cap_close(capcas);
|
|
|
|
if (cappwdloc == NULL || capgrploc == NULL) {
|
|
|
|
if (cappwdloc == NULL)
|
|
|
|
warn("unable to open system.pwd service");
|
|
|
|
if (capgrploc == NULL)
|
|
|
|
warn("unable to open system.grp service");
|
2013-12-19 00:51:48 +00:00
|
|
|
exit(1);
|
2013-12-15 23:09:05 +00:00
|
|
|
}
|
|
|
|
/* Limit system.pwd to only getpwuid() function and pw_name field. */
|
|
|
|
cmds[0] = "getpwuid";
|
2013-12-19 00:51:48 +00:00
|
|
|
if (cap_pwd_limit_cmds(cappwdloc, cmds, 1) < 0)
|
|
|
|
err(1, "unable to limit system.pwd service");
|
2013-12-15 23:09:05 +00:00
|
|
|
fields[0] = "pw_name";
|
2013-12-19 00:51:48 +00:00
|
|
|
if (cap_pwd_limit_fields(cappwdloc, fields, 1) < 0)
|
|
|
|
err(1, "unable to limit system.pwd service");
|
2013-12-15 23:09:05 +00:00
|
|
|
/* Limit system.grp to only getgrgid() function and gr_name field. */
|
|
|
|
cmds[0] = "getgrgid";
|
2013-12-19 00:51:48 +00:00
|
|
|
if (cap_grp_limit_cmds(capgrploc, cmds, 1) < 0)
|
|
|
|
err(1, "unable to limit system.grp service");
|
2013-12-15 23:09:05 +00:00
|
|
|
fields[0] = "gr_name";
|
2013-12-19 00:51:48 +00:00
|
|
|
if (cap_grp_limit_fields(capgrploc, fields, 1) < 0)
|
|
|
|
err(1, "unable to limit system.grp service");
|
2013-12-15 23:09:05 +00:00
|
|
|
|
|
|
|
*cappwdp = cappwdloc;
|
|
|
|
*capgrpp = capgrploc;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
#endif /* HAVE_LIBCAPSICUM */
|
|
|
|
|
2002-07-28 16:05:07 +00:00
|
|
|
int
|
|
|
|
main(int argc, char *argv[])
|
1994-05-27 12:33:43 +00:00
|
|
|
{
|
|
|
|
int ch, ktrlen, size;
|
2002-07-28 16:05:07 +00:00
|
|
|
void *m;
|
1994-05-27 12:33:43 +00:00
|
|
|
int trpoints = ALL_POINTS;
|
2003-03-13 18:46:35 +00:00
|
|
|
int drop_logged;
|
2003-06-03 01:44:43 +00:00
|
|
|
pid_t pid = 0;
|
2011-02-25 22:07:23 +00:00
|
|
|
u_int sv_flags;
|
1994-05-27 12:33:43 +00:00
|
|
|
|
2011-10-08 12:28:06 +00:00
|
|
|
setlocale(LC_CTYPE, "");
|
1995-10-26 22:16:45 +00:00
|
|
|
|
2014-03-25 23:37:57 +00:00
|
|
|
timestamp = TIMESTAMP_NONE;
|
|
|
|
|
2014-03-28 16:11:20 +00:00
|
|
|
while ((ch = getopt(argc,argv,"f:dElm:np:AHRrSsTt:")) != -1)
|
2011-10-08 12:28:06 +00:00
|
|
|
switch (ch) {
|
2011-02-25 22:07:23 +00:00
|
|
|
case 'A':
|
|
|
|
abiflag = 1;
|
|
|
|
break;
|
1994-05-27 12:33:43 +00:00
|
|
|
case 'f':
|
|
|
|
tracefile = optarg;
|
|
|
|
break;
|
|
|
|
case 'd':
|
|
|
|
decimal = 1;
|
|
|
|
break;
|
|
|
|
case 'l':
|
|
|
|
tail = 1;
|
|
|
|
break;
|
|
|
|
case 'm':
|
|
|
|
maxdata = atoi(optarg);
|
|
|
|
break;
|
|
|
|
case 'n':
|
|
|
|
fancy = 0;
|
|
|
|
break;
|
2003-06-03 01:44:43 +00:00
|
|
|
case 'p':
|
|
|
|
pid = atoi(optarg);
|
|
|
|
break;
|
2008-02-23 01:01:49 +00:00
|
|
|
case 'r':
|
|
|
|
resolv = 1;
|
|
|
|
break;
|
2014-03-28 16:11:20 +00:00
|
|
|
case 'S':
|
|
|
|
syscallno = 1;
|
|
|
|
break;
|
2005-11-12 14:21:48 +00:00
|
|
|
case 's':
|
|
|
|
suppressdata = 1;
|
|
|
|
break;
|
2003-12-07 01:06:32 +00:00
|
|
|
case 'E':
|
2014-03-25 23:37:57 +00:00
|
|
|
timestamp |= TIMESTAMP_ELAPSED;
|
2003-12-07 01:06:32 +00:00
|
|
|
break;
|
2005-11-01 14:48:23 +00:00
|
|
|
case 'H':
|
|
|
|
threads = 1;
|
|
|
|
break;
|
1994-05-27 12:33:43 +00:00
|
|
|
case 'R':
|
2014-03-25 23:37:57 +00:00
|
|
|
timestamp |= TIMESTAMP_RELATIVE;
|
1994-05-27 12:33:43 +00:00
|
|
|
break;
|
|
|
|
case 'T':
|
2014-03-25 23:37:57 +00:00
|
|
|
timestamp |= TIMESTAMP_ABSOLUTE;
|
1994-05-27 12:33:43 +00:00
|
|
|
break;
|
|
|
|
case 't':
|
|
|
|
trpoints = getpoints(optarg);
|
1997-07-16 06:49:49 +00:00
|
|
|
if (trpoints < 0)
|
|
|
|
errx(1, "unknown trace point in %s", optarg);
|
1994-05-27 12:33:43 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
usage();
|
|
|
|
}
|
|
|
|
|
1996-11-18 19:37:52 +00:00
|
|
|
if (argc > optind)
|
1994-05-27 12:33:43 +00:00
|
|
|
usage();
|
|
|
|
|
2011-10-08 12:28:06 +00:00
|
|
|
m = malloc(size = 1025);
|
1997-07-16 06:49:49 +00:00
|
|
|
if (m == NULL)
|
|
|
|
errx(1, "%s", strerror(ENOMEM));
|
|
|
|
if (!freopen(tracefile, "r", stdin))
|
|
|
|
err(1, "%s", tracefile);
|
2013-05-28 21:25:28 +00:00
|
|
|
|
2013-07-18 21:56:10 +00:00
|
|
|
strerror_init();
|
|
|
|
localtime_init();
|
2013-12-15 23:09:05 +00:00
|
|
|
#ifdef HAVE_LIBCAPSICUM
|
|
|
|
if (resolv != 0) {
|
|
|
|
if (cappwdgrp_setup(&cappwd, &capgrp) < 0) {
|
|
|
|
cappwd = NULL;
|
|
|
|
capgrp = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (resolv == 0 || (cappwd != NULL && capgrp != NULL)) {
|
|
|
|
if (cap_enter() < 0 && errno != ENOSYS)
|
|
|
|
err(1, "unable to enter capability mode");
|
|
|
|
}
|
|
|
|
#else
|
2013-05-30 21:59:29 +00:00
|
|
|
if (resolv == 0) {
|
|
|
|
if (cap_enter() < 0 && errno != ENOSYS)
|
|
|
|
err(1, "unable to enter capability mode");
|
|
|
|
}
|
2013-12-15 23:09:05 +00:00
|
|
|
#endif
|
2013-05-28 21:25:28 +00:00
|
|
|
limitfd(STDIN_FILENO);
|
|
|
|
limitfd(STDOUT_FILENO);
|
|
|
|
limitfd(STDERR_FILENO);
|
2013-12-15 23:09:05 +00:00
|
|
|
if (cap_sandboxed())
|
|
|
|
fprintf(stderr, "capability mode sandbox enabled\n");
|
2013-05-28 21:25:28 +00:00
|
|
|
|
2011-02-25 22:07:23 +00:00
|
|
|
TAILQ_INIT(&trace_procs);
|
2003-03-13 18:46:35 +00:00
|
|
|
drop_logged = 0;
|
1994-05-27 12:33:43 +00:00
|
|
|
while (fread_tail(&ktr_header, sizeof(struct ktr_header), 1)) {
|
2003-03-13 18:46:35 +00:00
|
|
|
if (ktr_header.ktr_type & KTR_DROP) {
|
|
|
|
ktr_header.ktr_type &= ~KTR_DROP;
|
2005-11-01 14:48:23 +00:00
|
|
|
if (!drop_logged && threads) {
|
2011-10-08 12:28:06 +00:00
|
|
|
printf(
|
2010-02-06 16:01:38 +00:00
|
|
|
"%6jd %6jd %-8.*s Events dropped.\n",
|
|
|
|
(intmax_t)ktr_header.ktr_pid,
|
|
|
|
ktr_header.ktr_tid > 0 ?
|
|
|
|
(intmax_t)ktr_header.ktr_tid : 0,
|
|
|
|
MAXCOMLEN, ktr_header.ktr_comm);
|
2005-11-01 14:48:23 +00:00
|
|
|
drop_logged = 1;
|
|
|
|
} else if (!drop_logged) {
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("%6jd %-8.*s Events dropped.\n",
|
2010-02-06 16:01:38 +00:00
|
|
|
(intmax_t)ktr_header.ktr_pid, MAXCOMLEN,
|
2003-03-13 18:46:35 +00:00
|
|
|
ktr_header.ktr_comm);
|
|
|
|
drop_logged = 1;
|
|
|
|
}
|
|
|
|
}
|
1994-05-27 12:33:43 +00:00
|
|
|
if (trpoints & (1<<ktr_header.ktr_type))
|
2012-06-04 19:09:14 +00:00
|
|
|
if (pid == 0 || ktr_header.ktr_pid == pid ||
|
|
|
|
ktr_header.ktr_tid == pid)
|
2003-06-03 01:44:43 +00:00
|
|
|
dumpheader(&ktr_header);
|
1997-07-16 06:49:49 +00:00
|
|
|
if ((ktrlen = ktr_header.ktr_len) < 0)
|
|
|
|
errx(1, "bogus length 0x%x", ktrlen);
|
1994-05-27 12:33:43 +00:00
|
|
|
if (ktrlen > size) {
|
2011-10-08 12:28:06 +00:00
|
|
|
m = realloc(m, ktrlen+1);
|
1997-07-16 06:49:49 +00:00
|
|
|
if (m == NULL)
|
|
|
|
errx(1, "%s", strerror(ENOMEM));
|
1994-05-27 12:33:43 +00:00
|
|
|
size = ktrlen;
|
|
|
|
}
|
1997-07-16 06:49:49 +00:00
|
|
|
if (ktrlen && fread_tail(m, ktrlen, 1) == 0)
|
|
|
|
errx(1, "data too short");
|
2011-02-25 22:07:23 +00:00
|
|
|
if (fetchprocinfo(&ktr_header, (u_int *)m) != 0)
|
|
|
|
continue;
|
|
|
|
sv_flags = abidump(&ktr_header);
|
2012-06-04 19:09:14 +00:00
|
|
|
if (pid && ktr_header.ktr_pid != pid &&
|
|
|
|
ktr_header.ktr_tid != pid)
|
2003-06-03 01:44:43 +00:00
|
|
|
continue;
|
1994-05-27 12:33:43 +00:00
|
|
|
if ((trpoints & (1<<ktr_header.ktr_type)) == 0)
|
|
|
|
continue;
|
2003-03-13 18:46:35 +00:00
|
|
|
drop_logged = 0;
|
1994-05-27 12:33:43 +00:00
|
|
|
switch (ktr_header.ktr_type) {
|
|
|
|
case KTR_SYSCALL:
|
2011-03-01 16:42:28 +00:00
|
|
|
#if defined(__amd64__) || defined(__i386__)
|
|
|
|
if ((sv_flags & SV_ABI_MASK) == SV_ABI_LINUX)
|
|
|
|
linux_ktrsyscall((struct ktr_syscall *)m);
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
ktrsyscall((struct ktr_syscall *)m, sv_flags);
|
1994-05-27 12:33:43 +00:00
|
|
|
break;
|
|
|
|
case KTR_SYSRET:
|
2011-03-01 16:42:28 +00:00
|
|
|
#if defined(__amd64__) || defined(__i386__)
|
|
|
|
if ((sv_flags & SV_ABI_MASK) == SV_ABI_LINUX)
|
|
|
|
linux_ktrsysret((struct ktr_sysret *)m);
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
ktrsysret((struct ktr_sysret *)m, sv_flags);
|
1994-05-27 12:33:43 +00:00
|
|
|
break;
|
|
|
|
case KTR_NAMEI:
|
2009-03-11 21:48:36 +00:00
|
|
|
case KTR_SYSCTL:
|
1994-05-27 12:33:43 +00:00
|
|
|
ktrnamei(m, ktrlen);
|
|
|
|
break;
|
|
|
|
case KTR_GENIO:
|
|
|
|
ktrgenio((struct ktr_genio *)m, ktrlen);
|
|
|
|
break;
|
|
|
|
case KTR_PSIG:
|
2011-03-01 16:42:28 +00:00
|
|
|
ktrpsig((struct ktr_psig *)m);
|
1994-05-27 12:33:43 +00:00
|
|
|
break;
|
|
|
|
case KTR_CSW:
|
2012-04-20 15:32:36 +00:00
|
|
|
if (ktrlen == sizeof(struct ktr_csw_old))
|
|
|
|
ktrcsw_old((struct ktr_csw_old *)m);
|
|
|
|
else
|
|
|
|
ktrcsw((struct ktr_csw *)m);
|
1994-05-27 12:33:43 +00:00
|
|
|
break;
|
1996-09-19 19:50:45 +00:00
|
|
|
case KTR_USER:
|
1996-09-22 18:18:20 +00:00
|
|
|
ktruser(ktrlen, m);
|
1996-09-19 19:50:45 +00:00
|
|
|
break;
|
2008-02-23 01:01:49 +00:00
|
|
|
case KTR_STRUCT:
|
|
|
|
ktrstruct(m, ktrlen);
|
|
|
|
break;
|
2011-10-11 20:37:10 +00:00
|
|
|
case KTR_CAPFAIL:
|
|
|
|
ktrcapfail((struct ktr_cap_fail *)m);
|
2012-04-05 17:13:14 +00:00
|
|
|
break;
|
|
|
|
case KTR_FAULT:
|
|
|
|
ktrfault((struct ktr_fault *)m);
|
|
|
|
break;
|
|
|
|
case KTR_FAULTEND:
|
|
|
|
ktrfaultend((struct ktr_faultend *)m);
|
|
|
|
break;
|
2003-03-13 18:58:39 +00:00
|
|
|
default:
|
|
|
|
printf("\n");
|
|
|
|
break;
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
|
|
|
if (tail)
|
2011-10-08 12:28:06 +00:00
|
|
|
fflush(stdout);
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
2002-07-28 16:05:07 +00:00
|
|
|
return 0;
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
|
|
|
|
2013-05-28 21:25:28 +00:00
|
|
|
void
|
|
|
|
limitfd(int fd)
|
|
|
|
{
|
|
|
|
cap_rights_t rights;
|
|
|
|
unsigned long cmd;
|
|
|
|
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
cap_rights_init(&rights, CAP_FSTAT);
|
2014-10-13 16:17:42 +00:00
|
|
|
cmd = 0;
|
2013-05-28 21:25:28 +00:00
|
|
|
|
|
|
|
switch (fd) {
|
|
|
|
case STDIN_FILENO:
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
cap_rights_set(&rights, CAP_READ);
|
2013-05-28 21:25:28 +00:00
|
|
|
break;
|
|
|
|
case STDOUT_FILENO:
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
cap_rights_set(&rights, CAP_IOCTL, CAP_WRITE);
|
2013-05-28 21:25:28 +00:00
|
|
|
cmd = TIOCGETA; /* required by isatty(3) in printf(3) */
|
|
|
|
break;
|
|
|
|
case STDERR_FILENO:
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
cap_rights_set(&rights, CAP_WRITE);
|
2013-05-28 21:25:28 +00:00
|
|
|
if (!suppressdata) {
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
cap_rights_set(&rights, CAP_IOCTL);
|
2013-05-28 21:25:28 +00:00
|
|
|
cmd = TIOCGWINSZ;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
if (cap_rights_limit(fd, &rights) < 0 && errno != ENOSYS)
|
2013-05-28 21:25:28 +00:00
|
|
|
err(1, "unable to limit rights for descriptor %d", fd);
|
2014-10-13 16:17:42 +00:00
|
|
|
if (cmd != 0 && cap_ioctls_limit(fd, &cmd, 1) < 0 && errno != ENOSYS)
|
2013-05-28 21:25:28 +00:00
|
|
|
err(1, "unable to limit ioctls for descriptor %d", fd);
|
|
|
|
}
|
|
|
|
|
2002-07-28 16:05:07 +00:00
|
|
|
int
|
|
|
|
fread_tail(void *buf, int size, int num)
|
1994-05-27 12:33:43 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
while ((i = fread(buf, size, num, stdin)) == 0 && tail) {
|
2011-10-08 12:28:06 +00:00
|
|
|
sleep(1);
|
1994-05-27 12:33:43 +00:00
|
|
|
clearerr(stdin);
|
|
|
|
}
|
|
|
|
return (i);
|
|
|
|
}
|
|
|
|
|
2011-02-25 22:07:23 +00:00
|
|
|
int
|
|
|
|
fetchprocinfo(struct ktr_header *kth, u_int *flags)
|
|
|
|
{
|
|
|
|
struct proc_info *pi;
|
|
|
|
|
|
|
|
switch (kth->ktr_type) {
|
|
|
|
case KTR_PROCCTOR:
|
|
|
|
TAILQ_FOREACH(pi, &trace_procs, info) {
|
|
|
|
if (pi->pid == kth->ktr_pid) {
|
|
|
|
TAILQ_REMOVE(&trace_procs, pi, info);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
pi = malloc(sizeof(struct proc_info));
|
|
|
|
if (pi == NULL)
|
|
|
|
errx(1, "%s", strerror(ENOMEM));
|
|
|
|
pi->sv_flags = *flags;
|
|
|
|
pi->pid = kth->ktr_pid;
|
|
|
|
TAILQ_INSERT_TAIL(&trace_procs, pi, info);
|
|
|
|
return (1);
|
|
|
|
|
|
|
|
case KTR_PROCDTOR:
|
|
|
|
TAILQ_FOREACH(pi, &trace_procs, info) {
|
|
|
|
if (pi->pid == kth->ktr_pid) {
|
|
|
|
TAILQ_REMOVE(&trace_procs, pi, info);
|
|
|
|
free(pi);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
u_int
|
|
|
|
abidump(struct ktr_header *kth)
|
|
|
|
{
|
|
|
|
struct proc_info *pi;
|
|
|
|
const char *abi;
|
|
|
|
const char *arch;
|
|
|
|
u_int flags = 0;
|
|
|
|
|
|
|
|
TAILQ_FOREACH(pi, &trace_procs, info) {
|
|
|
|
if (pi->pid == kth->ktr_pid) {
|
|
|
|
flags = pi->sv_flags;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (abiflag == 0)
|
|
|
|
return (flags);
|
|
|
|
|
|
|
|
switch (flags & SV_ABI_MASK) {
|
|
|
|
case SV_ABI_LINUX:
|
|
|
|
abi = "L";
|
|
|
|
break;
|
|
|
|
case SV_ABI_FREEBSD:
|
|
|
|
abi = "F";
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
abi = "U";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (flags != 0) {
|
|
|
|
if (flags & SV_LP64)
|
|
|
|
arch = "64";
|
|
|
|
else
|
|
|
|
arch = "32";
|
|
|
|
} else
|
|
|
|
arch = "00";
|
|
|
|
|
|
|
|
printf("%s%s ", abi, arch);
|
|
|
|
|
|
|
|
return (flags);
|
|
|
|
}
|
|
|
|
|
2002-07-28 16:05:07 +00:00
|
|
|
void
|
|
|
|
dumpheader(struct ktr_header *kth)
|
1994-05-27 12:33:43 +00:00
|
|
|
{
|
|
|
|
static char unknown[64];
|
2014-03-25 23:37:57 +00:00
|
|
|
static struct timeval prevtime, prevtime_e, temp;
|
2002-07-28 16:05:07 +00:00
|
|
|
const char *type;
|
1994-05-27 12:33:43 +00:00
|
|
|
|
|
|
|
switch (kth->ktr_type) {
|
|
|
|
case KTR_SYSCALL:
|
|
|
|
type = "CALL";
|
|
|
|
break;
|
|
|
|
case KTR_SYSRET:
|
|
|
|
type = "RET ";
|
|
|
|
break;
|
|
|
|
case KTR_NAMEI:
|
|
|
|
type = "NAMI";
|
|
|
|
break;
|
|
|
|
case KTR_GENIO:
|
|
|
|
type = "GIO ";
|
|
|
|
break;
|
|
|
|
case KTR_PSIG:
|
|
|
|
type = "PSIG";
|
|
|
|
break;
|
|
|
|
case KTR_CSW:
|
2007-07-10 00:01:30 +00:00
|
|
|
type = "CSW ";
|
1994-05-27 12:33:43 +00:00
|
|
|
break;
|
1996-09-19 19:50:45 +00:00
|
|
|
case KTR_USER:
|
|
|
|
type = "USER";
|
|
|
|
break;
|
2008-02-23 01:01:49 +00:00
|
|
|
case KTR_STRUCT:
|
|
|
|
type = "STRU";
|
|
|
|
break;
|
2009-03-11 21:48:36 +00:00
|
|
|
case KTR_SYSCTL:
|
|
|
|
type = "SCTL";
|
|
|
|
break;
|
2011-02-25 22:07:23 +00:00
|
|
|
case KTR_PROCCTOR:
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
case KTR_PROCDTOR:
|
|
|
|
return;
|
2011-10-11 20:37:10 +00:00
|
|
|
case KTR_CAPFAIL:
|
|
|
|
type = "CAP ";
|
|
|
|
break;
|
2012-04-05 17:13:14 +00:00
|
|
|
case KTR_FAULT:
|
|
|
|
type = "PFLT";
|
|
|
|
break;
|
|
|
|
case KTR_FAULTEND:
|
|
|
|
type = "PRET";
|
|
|
|
break;
|
1994-05-27 12:33:43 +00:00
|
|
|
default:
|
2011-10-08 12:28:06 +00:00
|
|
|
sprintf(unknown, "UNKNOWN(%d)", kth->ktr_type);
|
1994-05-27 12:33:43 +00:00
|
|
|
type = unknown;
|
|
|
|
}
|
|
|
|
|
2005-11-01 14:48:23 +00:00
|
|
|
/*
|
|
|
|
* The ktr_tid field was previously the ktr_buffer field, which held
|
|
|
|
* the kernel pointer value for the buffer associated with data
|
|
|
|
* following the record header. It now holds a threadid, but only
|
|
|
|
* for trace files after the change. Older trace files still contain
|
|
|
|
* kernel pointers. Detect this and suppress the results by printing
|
|
|
|
* negative tid's as 0.
|
|
|
|
*/
|
|
|
|
if (threads)
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("%6jd %6jd %-8.*s ", (intmax_t)kth->ktr_pid,
|
2010-02-06 16:01:38 +00:00
|
|
|
kth->ktr_tid > 0 ? (intmax_t)kth->ktr_tid : 0,
|
|
|
|
MAXCOMLEN, kth->ktr_comm);
|
2005-11-01 14:48:23 +00:00
|
|
|
else
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("%6jd %-8.*s ", (intmax_t)kth->ktr_pid, MAXCOMLEN,
|
2005-11-01 14:48:23 +00:00
|
|
|
kth->ktr_comm);
|
2014-03-25 23:37:57 +00:00
|
|
|
if (timestamp) {
|
|
|
|
if (timestamp & TIMESTAMP_ABSOLUTE) {
|
|
|
|
printf("%jd.%06ld ", (intmax_t)kth->ktr_time.tv_sec,
|
|
|
|
kth->ktr_time.tv_usec);
|
|
|
|
}
|
|
|
|
if (timestamp & TIMESTAMP_ELAPSED) {
|
|
|
|
if (prevtime_e.tv_sec == 0)
|
|
|
|
prevtime_e = kth->ktr_time;
|
|
|
|
timevalsub(&kth->ktr_time, &prevtime_e);
|
|
|
|
printf("%jd.%06ld ", (intmax_t)kth->ktr_time.tv_sec,
|
|
|
|
kth->ktr_time.tv_usec);
|
|
|
|
timevaladd(&kth->ktr_time, &prevtime_e);
|
2003-12-07 01:06:32 +00:00
|
|
|
}
|
2014-03-25 23:37:57 +00:00
|
|
|
if (timestamp & TIMESTAMP_RELATIVE) {
|
1994-05-27 12:33:43 +00:00
|
|
|
temp = kth->ktr_time;
|
|
|
|
timevalsub(&kth->ktr_time, &prevtime);
|
|
|
|
prevtime = temp;
|
2014-03-25 23:37:57 +00:00
|
|
|
printf("%jd.%06ld ", (intmax_t)kth->ktr_time.tv_sec,
|
|
|
|
kth->ktr_time.tv_usec);
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
|
|
|
}
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("%s ", type);
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#include <sys/syscall.h>
|
|
|
|
#define KTRACE
|
1994-11-21 00:53:32 +00:00
|
|
|
#include <sys/kern/syscalls.c>
|
1994-05-27 12:33:43 +00:00
|
|
|
#undef KTRACE
|
|
|
|
int nsyscalls = sizeof (syscallnames) / sizeof (syscallnames[0]);
|
|
|
|
|
2002-07-28 16:05:07 +00:00
|
|
|
void
|
2011-02-25 22:07:23 +00:00
|
|
|
ktrsyscall(struct ktr_syscall *ktr, u_int flags)
|
1994-05-27 12:33:43 +00:00
|
|
|
{
|
2002-07-28 16:05:07 +00:00
|
|
|
int narg = ktr->ktr_narg;
|
|
|
|
register_t *ip;
|
2011-10-11 20:37:10 +00:00
|
|
|
intmax_t arg;
|
1994-05-27 12:33:43 +00:00
|
|
|
|
2011-02-25 22:07:23 +00:00
|
|
|
if ((flags != 0 && ((flags & SV_ABI_MASK) != SV_ABI_FREEBSD)) ||
|
|
|
|
(ktr->ktr_code >= nsyscalls || ktr->ktr_code < 0))
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("[%d]", ktr->ktr_code);
|
2014-03-28 16:11:20 +00:00
|
|
|
else {
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("%s", syscallnames[ktr->ktr_code]);
|
2014-03-28 16:11:20 +00:00
|
|
|
if (syscallno)
|
|
|
|
printf("[%d]", ktr->ktr_code);
|
|
|
|
}
|
1999-06-16 18:46:40 +00:00
|
|
|
ip = &ktr->ktr_args[0];
|
1994-05-27 12:33:43 +00:00
|
|
|
if (narg) {
|
|
|
|
char c = '(';
|
2011-02-25 22:07:23 +00:00
|
|
|
if (fancy &&
|
|
|
|
(flags == 0 || (flags & SV_ABI_MASK) == SV_ABI_FREEBSD)) {
|
2013-08-13 19:57:35 +00:00
|
|
|
switch (ktr->ktr_code) {
|
2013-08-13 20:33:50 +00:00
|
|
|
case SYS_bindat:
|
|
|
|
case SYS_connectat:
|
2013-08-13 19:57:35 +00:00
|
|
|
case SYS_faccessat:
|
|
|
|
case SYS_fchmodat:
|
|
|
|
case SYS_fchownat:
|
|
|
|
case SYS_fstatat:
|
|
|
|
case SYS_futimesat:
|
|
|
|
case SYS_linkat:
|
|
|
|
case SYS_mkdirat:
|
|
|
|
case SYS_mkfifoat:
|
|
|
|
case SYS_mknodat:
|
|
|
|
case SYS_openat:
|
|
|
|
case SYS_readlinkat:
|
|
|
|
case SYS_renameat:
|
|
|
|
case SYS_unlinkat:
|
|
|
|
putchar('(');
|
|
|
|
atfdname(*ip, decimal);
|
|
|
|
c = ',';
|
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
break;
|
|
|
|
}
|
2011-10-08 11:51:48 +00:00
|
|
|
switch (ktr->ktr_code) {
|
|
|
|
case SYS_ioctl: {
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:47:00 +00:00
|
|
|
putchar(c);
|
|
|
|
ioctlname(*ip, decimal);
|
1994-05-27 12:33:43 +00:00
|
|
|
c = ',';
|
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case SYS_ptrace:
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('(');
|
2011-10-08 21:02:08 +00:00
|
|
|
ptraceopname(*ip);
|
1994-05-27 12:33:43 +00:00
|
|
|
c = ',';
|
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_access:
|
|
|
|
case SYS_eaccess:
|
2013-08-13 19:57:35 +00:00
|
|
|
case SYS_faccessat:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
accessmodename(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_open:
|
2013-08-13 19:57:35 +00:00
|
|
|
case SYS_openat:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
flagsandmodename(ip[0], ip[1], decimal);
|
2011-10-08 11:51:48 +00:00
|
|
|
ip += 2;
|
|
|
|
narg -= 2;
|
|
|
|
break;
|
|
|
|
case SYS_wait4:
|
2013-09-12 18:08:25 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
|
|
|
/*
|
|
|
|
* A flags value of zero is valid for
|
|
|
|
* wait4() but not for wait6(), so
|
|
|
|
* handle zero special here.
|
|
|
|
*/
|
|
|
|
if (*ip == 0) {
|
|
|
|
print_number(ip, narg, c);
|
|
|
|
} else {
|
|
|
|
putchar(',');
|
|
|
|
wait6optname(*ip);
|
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case SYS_wait6:
|
|
|
|
putchar('(');
|
|
|
|
idtypename(*ip, decimal);
|
|
|
|
c = ',';
|
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2013-09-12 18:08:25 +00:00
|
|
|
wait6optname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_chmod:
|
|
|
|
case SYS_fchmod:
|
|
|
|
case SYS_lchmod:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
modename(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_mknod:
|
2013-08-13 19:57:35 +00:00
|
|
|
case SYS_mknodat:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
modename(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_getfsstat:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
getfsstatflagsname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_mount:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
mountflagsname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_unmount:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
mountflagsname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_recvmsg:
|
|
|
|
case SYS_sendmsg:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
sendrecvflagsname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_recvfrom:
|
|
|
|
case SYS_sendto:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
sendrecvflagsname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_chflags:
|
|
|
|
case SYS_fchflags:
|
|
|
|
case SYS_lchflags:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
modename(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_kill:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
signame(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_reboot:
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('(');
|
2011-10-08 21:02:08 +00:00
|
|
|
rebootoptname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_umask:
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('(');
|
2011-10-08 21:02:08 +00:00
|
|
|
modename(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_msync:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
msyncflagsname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
2007-07-04 23:32:49 +00:00
|
|
|
#ifdef SYS_freebsd6_mmap
|
2011-10-08 11:51:48 +00:00
|
|
|
case SYS_freebsd6_mmap:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
mmapprotname(*ip);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2007-07-04 23:32:49 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 21:02:08 +00:00
|
|
|
mmapflagsname(*ip);
|
2007-07-04 23:32:49 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
2007-07-04 23:32:49 +00:00
|
|
|
#endif
|
2011-10-08 11:51:48 +00:00
|
|
|
case SYS_mmap:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
mmapprotname(*ip);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 21:02:08 +00:00
|
|
|
mmapflagsname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_mprotect:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
mmapprotname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_madvise:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
madvisebehavname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_setpriority:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
prioname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_fcntl:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
fcntlcmdname(ip[0], ip[1], decimal);
|
2011-10-08 11:51:48 +00:00
|
|
|
ip += 2;
|
|
|
|
narg -= 2;
|
|
|
|
break;
|
|
|
|
case SYS_socket: {
|
2007-01-04 04:46:59 +00:00
|
|
|
int sockdomain;
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('(');
|
2011-10-08 21:02:08 +00:00
|
|
|
sockdomain = *ip;
|
2007-01-04 04:46:59 +00:00
|
|
|
sockdomainname(sockdomain);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2013-08-26 17:22:51 +00:00
|
|
|
socktypenamewithflags(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2007-01-04 04:46:59 +00:00
|
|
|
if (sockdomain == PF_INET ||
|
|
|
|
sockdomain == PF_INET6) {
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
sockipprotoname(*ip);
|
2007-01-04 04:46:59 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
}
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
c = ',';
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case SYS_setsockopt:
|
|
|
|
case SYS_getsockopt:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
sockoptlevelname(*ip, decimal);
|
2011-10-08 12:21:51 +00:00
|
|
|
if (*ip == SOL_SOCKET) {
|
2008-01-07 18:50:25 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
sockoptname(*ip);
|
2008-01-07 18:50:25 +00:00
|
|
|
}
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
2007-07-04 23:32:49 +00:00
|
|
|
#ifdef SYS_freebsd6_lseek
|
2011-10-08 11:51:48 +00:00
|
|
|
case SYS_freebsd6_lseek:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
/* Hidden 'pad' argument, not in lseek(2) */
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
whencename(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
2007-07-04 23:32:49 +00:00
|
|
|
#endif
|
2011-10-08 11:51:48 +00:00
|
|
|
case SYS_lseek:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2007-07-04 23:32:49 +00:00
|
|
|
/* Hidden 'pad' argument, not in lseek(2) */
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
whencename(*ip);
|
2007-07-04 23:32:49 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_flock:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
flockname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_mkfifo:
|
2013-08-13 19:57:35 +00:00
|
|
|
case SYS_mkfifoat:
|
2011-10-08 11:51:48 +00:00
|
|
|
case SYS_mkdir:
|
2013-08-13 19:57:35 +00:00
|
|
|
case SYS_mkdirat:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
modename(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_shutdown:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
shutdownhowname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_socketpair:
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('(');
|
2011-10-08 21:02:08 +00:00
|
|
|
sockdomainname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2013-08-26 17:22:51 +00:00
|
|
|
socktypenamewithflags(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
c = ',';
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_getrlimit:
|
|
|
|
case SYS_setrlimit:
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('(');
|
2011-10-08 21:02:08 +00:00
|
|
|
rlimitname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
c = ',';
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_quotactl:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
quotactlname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
c = ',';
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_nfssvc:
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('(');
|
2011-10-08 21:02:08 +00:00
|
|
|
nfssvcname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
c = ',';
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_rtprio:
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('(');
|
2011-10-08 21:02:08 +00:00
|
|
|
rtprioname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
c = ',';
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS___semctl:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
semctlname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_semget:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
semgetname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_msgctl:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
shmctlname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_shmat:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
shmatname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_shmctl:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
shmctlname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
2014-08-01 23:28:21 +00:00
|
|
|
case SYS_shm_open:
|
|
|
|
print_number(ip, narg, c);
|
|
|
|
putchar(',');
|
|
|
|
flagsname(ip[0]);
|
2014-10-13 16:17:42 +00:00
|
|
|
printf(",0%o", (unsigned int)ip[1]);
|
2014-08-01 23:28:21 +00:00
|
|
|
ip += 3;
|
|
|
|
narg -= 3;
|
|
|
|
break;
|
2011-10-08 11:51:48 +00:00
|
|
|
case SYS_minherit:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
minheritname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_rfork:
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('(');
|
2011-10-08 21:02:08 +00:00
|
|
|
rforkname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
c = ',';
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_lio_listio:
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('(');
|
2011-10-08 21:02:08 +00:00
|
|
|
lio_listioname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
c = ',';
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_mlockall:
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('(');
|
2011-10-08 21:02:08 +00:00
|
|
|
mlockallname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_sched_setscheduler:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
schedpolicyname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_sched_get_priority_max:
|
|
|
|
case SYS_sched_get_priority_min:
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('(');
|
2011-10-08 21:02:08 +00:00
|
|
|
schedpolicyname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_sendfile:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
sendfileflagsname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_kldsym:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
kldsymcmdname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_sigprocmask:
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('(');
|
2011-10-08 21:02:08 +00:00
|
|
|
sigprocmaskhowname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
c = ',';
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS___acl_get_file:
|
|
|
|
case SYS___acl_set_file:
|
|
|
|
case SYS___acl_get_fd:
|
|
|
|
case SYS___acl_set_fd:
|
|
|
|
case SYS___acl_delete_file:
|
|
|
|
case SYS___acl_delete_fd:
|
|
|
|
case SYS___acl_aclcheck_file:
|
|
|
|
case SYS___acl_aclcheck_fd:
|
|
|
|
case SYS___acl_get_link:
|
|
|
|
case SYS___acl_set_link:
|
|
|
|
case SYS___acl_delete_link:
|
|
|
|
case SYS___acl_aclcheck_link:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
acltypename(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_sigaction:
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('(');
|
2011-10-08 21:02:08 +00:00
|
|
|
signame(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
c = ',';
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_extattrctl:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
extattrctlname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_nmount:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
mountflagsname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_thr_create:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
thrcreateflagsname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_thr_kill:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
signame(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
|
|
|
case SYS_kldunloadf:
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(',');
|
2011-10-08 21:02:08 +00:00
|
|
|
kldunloadfflagsname(*ip);
|
Change kdump to print more useful information, i.e. it changes from
32229 telnet CALL mmap(0,0x8000,0x3,0x1002,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,0,0x1b6)
32229 telnet CALL socket(0x2,0x2,0)
to
32229 telnet CALL mmap(0,0x8000,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,0xffffffff,0,0,0)
32229 telnet CALL open(0x2807bc28,O_RDONLY,<unused>0x1b6)
32229 telnet CALL socket(PF_INET,SOCK_DGRAM,0)
David wanted to implement the suggestions which came up at the review from
arch@ too, but real life rejected this proposal. So I commit what we already
got and let another volunteer pick the remaining work from the ideas list.
Submitted by: "David Kirchner" <dpk@dpk.net>
Suggested by: FreeBSD ideas list page
Reviewed by: arch
2006-05-20 14:27:22 +00:00
|
|
|
ip++;
|
|
|
|
narg--;
|
2011-10-08 11:51:48 +00:00
|
|
|
break;
|
2013-08-13 19:57:35 +00:00
|
|
|
case SYS_linkat:
|
|
|
|
case SYS_renameat:
|
|
|
|
case SYS_symlinkat:
|
|
|
|
print_number(ip, narg, c);
|
|
|
|
putchar(',');
|
|
|
|
atfdname(*ip, decimal);
|
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
break;
|
Merge Capsicum overhaul:
- Capability is no longer separate descriptor type. Now every descriptor
has set of its own capability rights.
- The cap_new(2) system call is left, but it is no longer documented and
should not be used in new code.
- The new syscall cap_rights_limit(2) should be used instead of
cap_new(2), which limits capability rights of the given descriptor
without creating a new one.
- The cap_getrights(2) syscall is renamed to cap_rights_get(2).
- If CAP_IOCTL capability right is present we can further reduce allowed
ioctls list with the new cap_ioctls_limit(2) syscall. List of allowed
ioctls can be retrived with cap_ioctls_get(2) syscall.
- If CAP_FCNTL capability right is present we can further reduce fcntls
that can be used with the new cap_fcntls_limit(2) syscall and retrive
them with cap_fcntls_get(2).
- To support ioctl and fcntl white-listing the filedesc structure was
heavly modified.
- The audit subsystem, kdump and procstat tools were updated to
recognize new syscalls.
- Capability rights were revised and eventhough I tried hard to provide
backward API and ABI compatibility there are some incompatible changes
that are described in detail below:
CAP_CREATE old behaviour:
- Allow for openat(2)+O_CREAT.
- Allow for linkat(2).
- Allow for symlinkat(2).
CAP_CREATE new behaviour:
- Allow for openat(2)+O_CREAT.
Added CAP_LINKAT:
- Allow for linkat(2). ABI: Reuses CAP_RMDIR bit.
- Allow to be target for renameat(2).
Added CAP_SYMLINKAT:
- Allow for symlinkat(2).
Removed CAP_DELETE. Old behaviour:
- Allow for unlinkat(2) when removing non-directory object.
- Allow to be source for renameat(2).
Removed CAP_RMDIR. Old behaviour:
- Allow for unlinkat(2) when removing directory.
Added CAP_RENAMEAT:
- Required for source directory for the renameat(2) syscall.
Added CAP_UNLINKAT (effectively it replaces CAP_DELETE and CAP_RMDIR):
- Allow for unlinkat(2) on any object.
- Required if target of renameat(2) exists and will be removed by this
call.
Removed CAP_MAPEXEC.
CAP_MMAP old behaviour:
- Allow for mmap(2) with any combination of PROT_NONE, PROT_READ and
PROT_WRITE.
CAP_MMAP new behaviour:
- Allow for mmap(2)+PROT_NONE.
Added CAP_MMAP_R:
- Allow for mmap(PROT_READ).
Added CAP_MMAP_W:
- Allow for mmap(PROT_WRITE).
Added CAP_MMAP_X:
- Allow for mmap(PROT_EXEC).
Added CAP_MMAP_RW:
- Allow for mmap(PROT_READ | PROT_WRITE).
Added CAP_MMAP_RX:
- Allow for mmap(PROT_READ | PROT_EXEC).
Added CAP_MMAP_WX:
- Allow for mmap(PROT_WRITE | PROT_EXEC).
Added CAP_MMAP_RWX:
- Allow for mmap(PROT_READ | PROT_WRITE | PROT_EXEC).
Renamed CAP_MKDIR to CAP_MKDIRAT.
Renamed CAP_MKFIFO to CAP_MKFIFOAT.
Renamed CAP_MKNODE to CAP_MKNODEAT.
CAP_READ old behaviour:
- Allow pread(2).
- Disallow read(2), readv(2) (if there is no CAP_SEEK).
CAP_READ new behaviour:
- Allow read(2), readv(2).
- Disallow pread(2) (CAP_SEEK was also required).
CAP_WRITE old behaviour:
- Allow pwrite(2).
- Disallow write(2), writev(2) (if there is no CAP_SEEK).
CAP_WRITE new behaviour:
- Allow write(2), writev(2).
- Disallow pwrite(2) (CAP_SEEK was also required).
Added convinient defines:
#define CAP_PREAD (CAP_SEEK | CAP_READ)
#define CAP_PWRITE (CAP_SEEK | CAP_WRITE)
#define CAP_MMAP_R (CAP_MMAP | CAP_SEEK | CAP_READ)
#define CAP_MMAP_W (CAP_MMAP | CAP_SEEK | CAP_WRITE)
#define CAP_MMAP_X (CAP_MMAP | CAP_SEEK | 0x0000000000000008ULL)
#define CAP_MMAP_RW (CAP_MMAP_R | CAP_MMAP_W)
#define CAP_MMAP_RX (CAP_MMAP_R | CAP_MMAP_X)
#define CAP_MMAP_WX (CAP_MMAP_W | CAP_MMAP_X)
#define CAP_MMAP_RWX (CAP_MMAP_R | CAP_MMAP_W | CAP_MMAP_X)
#define CAP_RECV CAP_READ
#define CAP_SEND CAP_WRITE
#define CAP_SOCK_CLIENT \
(CAP_CONNECT | CAP_GETPEERNAME | CAP_GETSOCKNAME | CAP_GETSOCKOPT | \
CAP_PEELOFF | CAP_RECV | CAP_SEND | CAP_SETSOCKOPT | CAP_SHUTDOWN)
#define CAP_SOCK_SERVER \
(CAP_ACCEPT | CAP_BIND | CAP_GETPEERNAME | CAP_GETSOCKNAME | \
CAP_GETSOCKOPT | CAP_LISTEN | CAP_PEELOFF | CAP_RECV | CAP_SEND | \
CAP_SETSOCKOPT | CAP_SHUTDOWN)
Added defines for backward API compatibility:
#define CAP_MAPEXEC CAP_MMAP_X
#define CAP_DELETE CAP_UNLINKAT
#define CAP_MKDIR CAP_MKDIRAT
#define CAP_RMDIR CAP_UNLINKAT
#define CAP_MKFIFO CAP_MKFIFOAT
#define CAP_MKNOD CAP_MKNODAT
#define CAP_SOCK_ALL (CAP_SOCK_CLIENT | CAP_SOCK_SERVER)
Sponsored by: The FreeBSD Foundation
Reviewed by: Christoph Mallon <christoph.mallon@gmx.de>
Many aspects discussed with: rwatson, benl, jonathan
ABI compatibility discussed with: kib
2013-03-02 00:53:12 +00:00
|
|
|
case SYS_cap_fcntls_limit:
|
|
|
|
print_number(ip, narg, c);
|
|
|
|
putchar(',');
|
|
|
|
arg = *ip;
|
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
capfcntlname(arg);
|
|
|
|
break;
|
2012-02-23 21:08:21 +00:00
|
|
|
case SYS_posix_fadvise:
|
2012-02-24 20:12:53 +00:00
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
|
|
|
print_number(ip, narg, c);
|
2012-02-23 21:08:21 +00:00
|
|
|
(void)putchar(',');
|
|
|
|
fadvisebehavname((int)*ip);
|
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
break;
|
2013-09-19 18:53:42 +00:00
|
|
|
case SYS_procctl:
|
|
|
|
putchar('(');
|
|
|
|
idtypename(*ip, decimal);
|
|
|
|
c = ',';
|
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
print_number(ip, narg, c);
|
|
|
|
putchar(',');
|
|
|
|
procctlcmdname(*ip);
|
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
break;
|
2014-10-13 16:37:06 +00:00
|
|
|
case SYS__umtx_op:
|
|
|
|
print_number(ip, narg, c);
|
|
|
|
putchar(',');
|
|
|
|
umtxopname(*ip);
|
|
|
|
switch (*ip) {
|
|
|
|
case UMTX_OP_CV_WAIT:
|
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
putchar(',');
|
|
|
|
umtxcvwaitflags(*ip);
|
|
|
|
break;
|
|
|
|
case UMTX_OP_RW_RDLOCK:
|
|
|
|
ip++;
|
|
|
|
narg--;
|
|
|
|
putchar(',');
|
|
|
|
umtxrwlockflags(*ip);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
ip++;
|
|
|
|
narg--;
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
|
|
|
}
|
2009-11-07 21:46:34 +00:00
|
|
|
while (narg > 0) {
|
2011-10-08 12:10:16 +00:00
|
|
|
print_number(ip, narg, c);
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(')');
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('\n');
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
|
|
|
|
2002-07-28 16:05:07 +00:00
|
|
|
void
|
2011-02-25 22:07:23 +00:00
|
|
|
ktrsysret(struct ktr_sysret *ktr, u_int flags)
|
1994-05-27 12:33:43 +00:00
|
|
|
{
|
2002-07-28 16:05:07 +00:00
|
|
|
register_t ret = ktr->ktr_retval;
|
|
|
|
int error = ktr->ktr_error;
|
|
|
|
int code = ktr->ktr_code;
|
1994-05-27 12:33:43 +00:00
|
|
|
|
2011-02-25 22:07:23 +00:00
|
|
|
if ((flags != 0 && ((flags & SV_ABI_MASK) != SV_ABI_FREEBSD)) ||
|
|
|
|
(code >= nsyscalls || code < 0))
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("[%d] ", code);
|
2014-03-28 16:11:20 +00:00
|
|
|
else {
|
|
|
|
printf("%s", syscallnames[code]);
|
|
|
|
if (syscallno)
|
|
|
|
printf("[%d]", code);
|
|
|
|
printf(" ");
|
|
|
|
}
|
1994-05-27 12:33:43 +00:00
|
|
|
|
|
|
|
if (error == 0) {
|
|
|
|
if (fancy) {
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("%ld", (long)ret);
|
1994-05-27 12:33:43 +00:00
|
|
|
if (ret < 0 || ret > 9)
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("/%#lx", (unsigned long)ret);
|
1994-05-27 12:33:43 +00:00
|
|
|
} else {
|
|
|
|
if (decimal)
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("%ld", (long)ret);
|
1994-05-27 12:33:43 +00:00
|
|
|
else
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("%#lx", (unsigned long)ret);
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
|
|
|
} else if (error == ERESTART)
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("RESTART");
|
1994-05-27 12:33:43 +00:00
|
|
|
else if (error == EJUSTRETURN)
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("JUSTRETURN");
|
1994-05-27 12:33:43 +00:00
|
|
|
else {
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("-1 errno %d", ktr->ktr_error);
|
1994-05-27 12:33:43 +00:00
|
|
|
if (fancy)
|
2011-10-08 12:28:06 +00:00
|
|
|
printf(" %s", strerror(ktr->ktr_error));
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('\n');
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
|
|
|
|
2002-07-28 16:05:07 +00:00
|
|
|
void
|
|
|
|
ktrnamei(char *cp, int len)
|
1994-05-27 12:33:43 +00:00
|
|
|
{
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("\"%.*s\"\n", len, cp);
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
|
|
|
|
2002-07-28 16:05:07 +00:00
|
|
|
void
|
2003-06-03 01:44:43 +00:00
|
|
|
hexdump(char *p, int len, int screenwidth)
|
1994-05-27 12:33:43 +00:00
|
|
|
{
|
2003-06-03 01:44:43 +00:00
|
|
|
int n, i;
|
2002-07-28 16:05:07 +00:00
|
|
|
int width;
|
1994-05-27 12:33:43 +00:00
|
|
|
|
2003-06-03 01:44:43 +00:00
|
|
|
width = 0;
|
|
|
|
do {
|
|
|
|
width += 2;
|
|
|
|
i = 13; /* base offset */
|
|
|
|
i += (width / 2) + 1; /* spaces every second byte */
|
|
|
|
i += (width * 2); /* width of bytes */
|
|
|
|
i += 3; /* " |" */
|
|
|
|
i += width; /* each byte */
|
|
|
|
i += 1; /* "|" */
|
|
|
|
} while (i < screenwidth);
|
|
|
|
width -= 2;
|
1994-05-27 12:33:43 +00:00
|
|
|
|
2003-06-03 01:44:43 +00:00
|
|
|
for (n = 0; n < len; n += width) {
|
|
|
|
for (i = n; i < n + width; i++) {
|
|
|
|
if ((i % width) == 0) { /* beginning of line */
|
|
|
|
printf(" 0x%04x", i);
|
|
|
|
}
|
|
|
|
if ((i % 2) == 0) {
|
|
|
|
printf(" ");
|
|
|
|
}
|
|
|
|
if (i < len)
|
|
|
|
printf("%02x", p[i] & 0xff);
|
|
|
|
else
|
|
|
|
printf(" ");
|
|
|
|
}
|
|
|
|
printf(" |");
|
|
|
|
for (i = n; i < n + width; i++) {
|
|
|
|
if (i >= len)
|
|
|
|
break;
|
|
|
|
if (p[i] >= ' ' && p[i] <= '~')
|
|
|
|
printf("%c", p[i]);
|
|
|
|
else
|
|
|
|
printf(".");
|
|
|
|
}
|
|
|
|
printf("|\n");
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
2003-06-03 01:44:43 +00:00
|
|
|
if ((i % width) != 0)
|
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
visdump(char *dp, int datalen, int screenwidth)
|
|
|
|
{
|
|
|
|
int col = 0;
|
|
|
|
char *cp;
|
|
|
|
int width;
|
|
|
|
char visbuf[5];
|
|
|
|
|
2011-10-08 12:28:06 +00:00
|
|
|
printf(" \"");
|
1994-05-27 12:33:43 +00:00
|
|
|
col = 8;
|
|
|
|
for (;datalen > 0; datalen--, dp++) {
|
2011-10-08 12:28:06 +00:00
|
|
|
vis(visbuf, *dp, VIS_CSTYLE, *(dp+1));
|
1994-05-27 12:33:43 +00:00
|
|
|
cp = visbuf;
|
|
|
|
/*
|
|
|
|
* Keep track of printables and
|
|
|
|
* space chars (like fold(1)).
|
|
|
|
*/
|
|
|
|
if (col == 0) {
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('\t');
|
1994-05-27 12:33:43 +00:00
|
|
|
col = 8;
|
|
|
|
}
|
|
|
|
switch(*cp) {
|
|
|
|
case '\n':
|
|
|
|
col = 0;
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar('\n');
|
1994-05-27 12:33:43 +00:00
|
|
|
continue;
|
|
|
|
case '\t':
|
|
|
|
width = 8 - (col&07);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
width = strlen(cp);
|
|
|
|
}
|
|
|
|
if (col + width > (screenwidth-2)) {
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("\\\n\t");
|
1994-05-27 12:33:43 +00:00
|
|
|
col = 8;
|
|
|
|
}
|
|
|
|
col += width;
|
|
|
|
do {
|
2011-10-08 12:28:06 +00:00
|
|
|
putchar(*cp++);
|
1994-05-27 12:33:43 +00:00
|
|
|
} while (*cp);
|
|
|
|
}
|
|
|
|
if (col == 0)
|
2011-10-08 12:28:06 +00:00
|
|
|
printf(" ");
|
|
|
|
printf("\"\n");
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
|
|
|
|
2003-06-03 01:44:43 +00:00
|
|
|
void
|
|
|
|
ktrgenio(struct ktr_genio *ktr, int len)
|
|
|
|
{
|
|
|
|
int datalen = len - sizeof (struct ktr_genio);
|
|
|
|
char *dp = (char *)ktr + sizeof (struct ktr_genio);
|
|
|
|
static int screenwidth = 0;
|
|
|
|
int i, binary;
|
|
|
|
|
2013-05-28 21:21:46 +00:00
|
|
|
printf("fd %d %s %d byte%s\n", ktr->ktr_fd,
|
|
|
|
ktr->ktr_rw == UIO_READ ? "read" : "wrote", datalen,
|
|
|
|
datalen == 1 ? "" : "s");
|
|
|
|
if (suppressdata)
|
|
|
|
return;
|
2003-06-03 01:44:43 +00:00
|
|
|
if (screenwidth == 0) {
|
|
|
|
struct winsize ws;
|
|
|
|
|
|
|
|
if (fancy && ioctl(fileno(stderr), TIOCGWINSZ, &ws) != -1 &&
|
|
|
|
ws.ws_col > 8)
|
|
|
|
screenwidth = ws.ws_col;
|
|
|
|
else
|
|
|
|
screenwidth = 80;
|
|
|
|
}
|
|
|
|
if (maxdata && datalen > maxdata)
|
|
|
|
datalen = maxdata;
|
|
|
|
|
|
|
|
for (i = 0, binary = 0; i < datalen && binary == 0; i++) {
|
|
|
|
if (dp[i] >= 32 && dp[i] < 127)
|
|
|
|
continue;
|
|
|
|
if (dp[i] == 10 || dp[i] == 13 || dp[i] == 0 || dp[i] == 9)
|
|
|
|
continue;
|
|
|
|
binary = 1;
|
|
|
|
}
|
|
|
|
if (binary)
|
|
|
|
hexdump(dp, datalen, screenwidth);
|
|
|
|
else
|
|
|
|
visdump(dp, datalen, screenwidth);
|
|
|
|
}
|
|
|
|
|
2002-07-28 16:05:07 +00:00
|
|
|
const char *signames[] = {
|
1994-05-27 12:33:43 +00:00
|
|
|
"NULL", "HUP", "INT", "QUIT", "ILL", "TRAP", "IOT", /* 1 - 6 */
|
|
|
|
"EMT", "FPE", "KILL", "BUS", "SEGV", "SYS", /* 7 - 12 */
|
|
|
|
"PIPE", "ALRM", "TERM", "URG", "STOP", "TSTP", /* 13 - 18 */
|
|
|
|
"CONT", "CHLD", "TTIN", "TTOU", "IO", "XCPU", /* 19 - 24 */
|
|
|
|
"XFSZ", "VTALRM", "PROF", "WINCH", "29", "USR1", /* 25 - 30 */
|
|
|
|
"USR2", NULL, /* 31 - 32 */
|
|
|
|
};
|
|
|
|
|
2002-07-28 16:05:07 +00:00
|
|
|
void
|
2011-03-01 16:42:28 +00:00
|
|
|
ktrpsig(struct ktr_psig *psig)
|
1994-05-27 12:33:43 +00:00
|
|
|
{
|
2011-03-01 16:42:28 +00:00
|
|
|
if (psig->signo > 0 && psig->signo < NSIG)
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("SIG%s ", signames[psig->signo]);
|
2006-07-12 12:41:56 +00:00
|
|
|
else
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("SIG %d ", psig->signo);
|
2012-09-22 12:40:00 +00:00
|
|
|
if (psig->action == SIG_DFL) {
|
|
|
|
printf("SIG_DFL code=");
|
|
|
|
sigcodename(psig->signo, psig->code);
|
|
|
|
putchar('\n');
|
|
|
|
} else {
|
|
|
|
printf("caught handler=0x%lx mask=0x%x code=",
|
|
|
|
(u_long)psig->action, psig->mask.__bits[0]);
|
|
|
|
sigcodename(psig->signo, psig->code);
|
|
|
|
putchar('\n');
|
2002-07-28 16:05:07 +00:00
|
|
|
}
|
1994-05-27 12:33:43 +00:00
|
|
|
}
|
|
|
|
|
2002-07-28 16:05:07 +00:00
|
|
|
void
|
2012-04-20 15:32:36 +00:00
|
|
|
ktrcsw_old(struct ktr_csw_old *cs)
|
1994-05-27 12:33:43 +00:00
|
|
|
{
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("%s %s\n", cs->out ? "stop" : "resume",
|
1994-05-27 12:33:43 +00:00
|
|
|
cs->user ? "user" : "kernel");
|
|
|
|
}
|
|
|
|
|
2012-04-20 15:32:36 +00:00
|
|
|
void
|
|
|
|
ktrcsw(struct ktr_csw *cs)
|
|
|
|
{
|
|
|
|
printf("%s %s \"%s\"\n", cs->out ? "stop" : "resume",
|
|
|
|
cs->user ? "user" : "kernel", cs->wmesg);
|
|
|
|
}
|
|
|
|
|
2007-01-09 17:50:05 +00:00
|
|
|
#define UTRACE_DLOPEN_START 1
|
|
|
|
#define UTRACE_DLOPEN_STOP 2
|
|
|
|
#define UTRACE_DLCLOSE_START 3
|
|
|
|
#define UTRACE_DLCLOSE_STOP 4
|
|
|
|
#define UTRACE_LOAD_OBJECT 5
|
|
|
|
#define UTRACE_UNLOAD_OBJECT 6
|
|
|
|
#define UTRACE_ADD_RUNDEP 7
|
|
|
|
#define UTRACE_PRELOAD_FINISHED 8
|
|
|
|
#define UTRACE_INIT_CALL 9
|
|
|
|
#define UTRACE_FINI_CALL 10
|
|
|
|
|
|
|
|
struct utrace_rtld {
|
|
|
|
char sig[4]; /* 'RTLD' */
|
|
|
|
int event;
|
|
|
|
void *handle;
|
|
|
|
void *mapbase;
|
|
|
|
size_t mapsize;
|
|
|
|
int refcnt;
|
|
|
|
char name[MAXPATHLEN];
|
|
|
|
};
|
|
|
|
|
|
|
|
void
|
2014-10-13 16:17:42 +00:00
|
|
|
ktruser_rtld(int len, void *p)
|
2007-01-09 17:50:05 +00:00
|
|
|
{
|
2014-10-13 16:17:42 +00:00
|
|
|
struct utrace_rtld *ut = p;
|
|
|
|
unsigned char *cp;
|
2007-01-09 17:50:05 +00:00
|
|
|
void *parent;
|
|
|
|
int mode;
|
|
|
|
|
|
|
|
switch (ut->event) {
|
|
|
|
case UTRACE_DLOPEN_START:
|
|
|
|
mode = ut->refcnt;
|
|
|
|
printf("dlopen(%s, ", ut->name);
|
|
|
|
switch (mode & RTLD_MODEMASK) {
|
|
|
|
case RTLD_NOW:
|
|
|
|
printf("RTLD_NOW");
|
|
|
|
break;
|
|
|
|
case RTLD_LAZY:
|
|
|
|
printf("RTLD_LAZY");
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
printf("%#x", mode & RTLD_MODEMASK);
|
|
|
|
}
|
|
|
|
if (mode & RTLD_GLOBAL)
|
|
|
|
printf(" | RTLD_GLOBAL");
|
|
|
|
if (mode & RTLD_TRACE)
|
|
|
|
printf(" | RTLD_TRACE");
|
|
|
|
if (mode & ~(RTLD_MODEMASK | RTLD_GLOBAL | RTLD_TRACE))
|
|
|
|
printf(" | %#x", mode &
|
|
|
|
~(RTLD_MODEMASK | RTLD_GLOBAL | RTLD_TRACE));
|
|
|
|
printf(")\n");
|
|
|
|
break;
|
|
|
|
case UTRACE_DLOPEN_STOP:
|
|
|
|
printf("%p = dlopen(%s) ref %d\n", ut->handle, ut->name,
|
|
|
|
ut->refcnt);
|
|
|
|
break;
|
|
|
|
case UTRACE_DLCLOSE_START:
|
|
|
|
printf("dlclose(%p) (%s, %d)\n", ut->handle, ut->name,
|
|
|
|
ut->refcnt);
|
|
|
|
break;
|
|
|
|
case UTRACE_DLCLOSE_STOP:
|
|
|
|
printf("dlclose(%p) finished\n", ut->handle);
|
|
|
|
break;
|
|
|
|
case UTRACE_LOAD_OBJECT:
|
|
|
|
printf("RTLD: loaded %p @ %p - %p (%s)\n", ut->handle,
|
|
|
|
ut->mapbase, (char *)ut->mapbase + ut->mapsize - 1,
|
|
|
|
ut->name);
|
|
|
|
break;
|
|
|
|
case UTRACE_UNLOAD_OBJECT:
|
|
|
|
printf("RTLD: unloaded %p @ %p - %p (%s)\n", ut->handle,
|
|
|
|
ut->mapbase, (char *)ut->mapbase + ut->mapsize - 1,
|
|
|
|
ut->name);
|
|
|
|
break;
|
|
|
|
case UTRACE_ADD_RUNDEP:
|
|
|
|
parent = ut->mapbase;
|
|
|
|
printf("RTLD: %p now depends on %p (%s, %d)\n", parent,
|
|
|
|
ut->handle, ut->name, ut->refcnt);
|
|
|
|
break;
|
|
|
|
case UTRACE_PRELOAD_FINISHED:
|
|
|
|
printf("RTLD: LD_PRELOAD finished\n");
|
|
|
|
break;
|
|
|
|
case UTRACE_INIT_CALL:
|
|
|
|
printf("RTLD: init %p for %p (%s)\n", ut->mapbase, ut->handle,
|
|
|
|
ut->name);
|
|
|
|
break;
|
|
|
|
case UTRACE_FINI_CALL:
|
|
|
|
printf("RTLD: fini %p for %p (%s)\n", ut->mapbase, ut->handle,
|
|
|
|
ut->name);
|
|
|
|
break;
|
|
|
|
default:
|
2014-10-13 16:17:42 +00:00
|
|
|
cp = p;
|
|
|
|
cp += 4;
|
2007-01-09 17:50:05 +00:00
|
|
|
len -= 4;
|
|
|
|
printf("RTLD: %d ", len);
|
|
|
|
while (len--)
|
|
|
|
if (decimal)
|
2014-10-13 16:17:42 +00:00
|
|
|
printf(" %d", *cp++);
|
2007-01-09 17:50:05 +00:00
|
|
|
else
|
2014-10-13 16:17:42 +00:00
|
|
|
printf(" %02x", *cp++);
|
2007-01-09 17:50:05 +00:00
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-01-05 21:04:37 +00:00
|
|
|
struct utrace_malloc {
|
|
|
|
void *p;
|
|
|
|
size_t s;
|
|
|
|
void *r;
|
|
|
|
};
|
|
|
|
|
|
|
|
void
|
2014-10-13 16:17:42 +00:00
|
|
|
ktruser_malloc(void *p)
|
2007-01-05 21:04:37 +00:00
|
|
|
{
|
2014-10-13 16:17:42 +00:00
|
|
|
struct utrace_malloc *ut = p;
|
2007-01-05 21:04:37 +00:00
|
|
|
|
2009-11-14 09:33:51 +00:00
|
|
|
if (ut->p == (void *)(intptr_t)(-1))
|
|
|
|
printf("malloc_init()\n");
|
|
|
|
else if (ut->s == 0)
|
|
|
|
printf("free(%p)\n", ut->p);
|
|
|
|
else if (ut->p == NULL)
|
|
|
|
printf("%p = malloc(%zu)\n", ut->r, ut->s);
|
|
|
|
else
|
|
|
|
printf("%p = realloc(%p, %zu)\n", ut->r, ut->p, ut->s);
|
2007-01-05 21:04:37 +00:00
|
|
|
}
|
|
|
|
|
2002-07-28 16:05:07 +00:00
|
|
|
void
|
2014-10-13 16:17:42 +00:00
|
|
|
ktruser(int len, void *p)
|
1996-09-19 19:50:45 +00:00
|
|
|
{
|
2014-10-13 16:17:42 +00:00
|
|
|
unsigned char *cp;
|
2007-01-05 21:04:37 +00:00
|
|
|
|
2007-01-09 17:50:05 +00:00
|
|
|
if (len >= 8 && bcmp(p, "RTLD", 4) == 0) {
|
|
|
|
ktruser_rtld(len, p);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2007-01-05 21:04:37 +00:00
|
|
|
if (len == sizeof(struct utrace_malloc)) {
|
2011-10-12 21:45:12 +00:00
|
|
|
ktruser_malloc(p);
|
2007-01-05 21:04:37 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("%d ", len);
|
2014-10-13 16:17:42 +00:00
|
|
|
cp = p;
|
1996-09-22 18:18:20 +00:00
|
|
|
while (len--)
|
2004-03-25 12:33:55 +00:00
|
|
|
if (decimal)
|
2014-10-13 16:17:42 +00:00
|
|
|
printf(" %d", *cp++);
|
2004-03-25 12:33:55 +00:00
|
|
|
else
|
2014-10-13 16:17:42 +00:00
|
|
|
printf(" %02x", *cp++);
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("\n");
|
1996-09-19 19:50:45 +00:00
|
|
|
}
|
|
|
|
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
void
|
|
|
|
ktrcaprights(cap_rights_t *rightsp)
|
|
|
|
{
|
|
|
|
|
|
|
|
printf("cap_rights_t ");
|
|
|
|
capname(rightsp);
|
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
|
2008-02-23 01:01:49 +00:00
|
|
|
void
|
|
|
|
ktrsockaddr(struct sockaddr *sa)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
TODO: Support additional address families
|
|
|
|
#include <netnatm/natm.h>
|
|
|
|
struct sockaddr_natm *natm;
|
2013-06-28 21:00:08 +00:00
|
|
|
#include <netsmb/netbios.h>
|
|
|
|
struct sockaddr_nb *nb;
|
2008-02-23 01:01:49 +00:00
|
|
|
*/
|
|
|
|
char addr[64];
|
|
|
|
|
|
|
|
/*
|
|
|
|
* note: ktrstruct() has already verified that sa points to a
|
|
|
|
* buffer at least sizeof(struct sockaddr) bytes long and exactly
|
|
|
|
* sa->sa_len bytes long.
|
|
|
|
*/
|
|
|
|
printf("struct sockaddr { ");
|
|
|
|
sockfamilyname(sa->sa_family);
|
|
|
|
printf(", ");
|
|
|
|
|
|
|
|
#define check_sockaddr_len(n) \
|
2011-10-12 21:45:12 +00:00
|
|
|
if (sa_##n.s##n##_len < sizeof(struct sockaddr_##n)) { \
|
2008-02-23 01:01:49 +00:00
|
|
|
printf("invalid"); \
|
|
|
|
break; \
|
|
|
|
}
|
|
|
|
|
|
|
|
switch(sa->sa_family) {
|
|
|
|
case AF_INET: {
|
2011-10-12 21:45:12 +00:00
|
|
|
struct sockaddr_in sa_in;
|
2008-02-23 01:01:49 +00:00
|
|
|
|
2011-10-12 21:45:12 +00:00
|
|
|
memset(&sa_in, 0, sizeof(sa_in));
|
2013-02-12 18:48:11 +00:00
|
|
|
memcpy(&sa_in, sa, sa->sa_len);
|
2008-02-23 01:01:49 +00:00
|
|
|
check_sockaddr_len(in);
|
2011-10-12 21:45:12 +00:00
|
|
|
inet_ntop(AF_INET, &sa_in.sin_addr, addr, sizeof addr);
|
|
|
|
printf("%s:%u", addr, ntohs(sa_in.sin_port));
|
2008-02-23 01:01:49 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case AF_INET6: {
|
2011-10-12 21:45:12 +00:00
|
|
|
struct sockaddr_in6 sa_in6;
|
2008-02-23 01:01:49 +00:00
|
|
|
|
2011-10-12 21:45:12 +00:00
|
|
|
memset(&sa_in6, 0, sizeof(sa_in6));
|
2013-02-12 18:48:11 +00:00
|
|
|
memcpy(&sa_in6, sa, sa->sa_len);
|
2008-02-23 01:01:49 +00:00
|
|
|
check_sockaddr_len(in6);
|
2013-06-07 08:06:48 +00:00
|
|
|
getnameinfo((struct sockaddr *)&sa_in6, sizeof(sa_in6),
|
|
|
|
addr, sizeof(addr), NULL, 0, NI_NUMERICHOST);
|
2011-10-12 21:45:12 +00:00
|
|
|
printf("[%s]:%u", addr, htons(sa_in6.sin6_port));
|
2008-02-23 01:01:49 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case AF_UNIX: {
|
2011-10-12 21:45:12 +00:00
|
|
|
struct sockaddr_un sa_un;
|
2008-02-23 01:01:49 +00:00
|
|
|
|
2011-10-12 21:45:12 +00:00
|
|
|
memset(&sa_un, 0, sizeof(sa_un));
|
2013-02-12 18:48:11 +00:00
|
|
|
memcpy(&sa_un, sa, sa->sa_len);
|
2011-10-12 21:45:12 +00:00
|
|
|
printf("%.*s", (int)sizeof(sa_un.sun_path), sa_un.sun_path);
|
2008-02-23 01:01:49 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
printf("unknown address family");
|
|
|
|
}
|
|
|
|
printf(" }\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ktrstat(struct stat *statp)
|
|
|
|
{
|
|
|
|
char mode[12], timestr[PATH_MAX + 4];
|
|
|
|
struct passwd *pwd;
|
|
|
|
struct group *grp;
|
|
|
|
struct tm *tm;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* note: ktrstruct() has already verified that statp points to a
|
|
|
|
* buffer exactly sizeof(struct stat) bytes long.
|
|
|
|
*/
|
|
|
|
printf("struct stat {");
|
2013-10-07 11:23:01 +00:00
|
|
|
printf("dev=%ju, ino=%ju, ",
|
|
|
|
(uintmax_t)statp->st_dev, (uintmax_t)statp->st_ino);
|
|
|
|
if (resolv == 0)
|
|
|
|
printf("mode=0%jo, ", (uintmax_t)statp->st_mode);
|
|
|
|
else {
|
|
|
|
strmode(statp->st_mode, mode);
|
|
|
|
printf("mode=%s, ", mode);
|
|
|
|
}
|
|
|
|
printf("nlink=%ju, ", (uintmax_t)statp->st_nlink);
|
2013-12-15 23:09:05 +00:00
|
|
|
if (resolv == 0) {
|
|
|
|
pwd = NULL;
|
|
|
|
} else {
|
|
|
|
#ifdef HAVE_LIBCAPSICUM
|
|
|
|
if (cappwd != NULL)
|
|
|
|
pwd = cap_getpwuid(cappwd, statp->st_uid);
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
pwd = getpwuid(statp->st_uid);
|
|
|
|
}
|
|
|
|
if (pwd == NULL)
|
2008-02-23 01:01:49 +00:00
|
|
|
printf("uid=%ju, ", (uintmax_t)statp->st_uid);
|
|
|
|
else
|
|
|
|
printf("uid=\"%s\", ", pwd->pw_name);
|
2013-12-15 23:09:05 +00:00
|
|
|
if (resolv == 0) {
|
|
|
|
grp = NULL;
|
|
|
|
} else {
|
|
|
|
#ifdef HAVE_LIBCAPSICUM
|
|
|
|
if (capgrp != NULL)
|
|
|
|
grp = cap_getgrgid(capgrp, statp->st_gid);
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
grp = getgrgid(statp->st_gid);
|
|
|
|
}
|
|
|
|
if (grp == NULL)
|
2008-02-23 01:01:49 +00:00
|
|
|
printf("gid=%ju, ", (uintmax_t)statp->st_gid);
|
|
|
|
else
|
|
|
|
printf("gid=\"%s\", ", grp->gr_name);
|
|
|
|
printf("rdev=%ju, ", (uintmax_t)statp->st_rdev);
|
|
|
|
printf("atime=");
|
|
|
|
if (resolv == 0)
|
2010-03-28 13:16:08 +00:00
|
|
|
printf("%jd", (intmax_t)statp->st_atim.tv_sec);
|
2008-02-23 01:01:49 +00:00
|
|
|
else {
|
2010-03-28 13:16:08 +00:00
|
|
|
tm = localtime(&statp->st_atim.tv_sec);
|
2011-10-08 12:28:06 +00:00
|
|
|
strftime(timestr, sizeof(timestr), TIME_FORMAT, tm);
|
2008-02-23 01:01:49 +00:00
|
|
|
printf("\"%s\"", timestr);
|
|
|
|
}
|
2010-03-28 13:16:08 +00:00
|
|
|
if (statp->st_atim.tv_nsec != 0)
|
|
|
|
printf(".%09ld, ", statp->st_atim.tv_nsec);
|
2008-02-23 01:01:49 +00:00
|
|
|
else
|
|
|
|
printf(", ");
|
|
|
|
printf("stime=");
|
|
|
|
if (resolv == 0)
|
2010-03-28 13:16:08 +00:00
|
|
|
printf("%jd", (intmax_t)statp->st_mtim.tv_sec);
|
2008-02-23 01:01:49 +00:00
|
|
|
else {
|
2010-03-28 13:16:08 +00:00
|
|
|
tm = localtime(&statp->st_mtim.tv_sec);
|
2011-10-08 12:28:06 +00:00
|
|
|
strftime(timestr, sizeof(timestr), TIME_FORMAT, tm);
|
2008-02-23 01:01:49 +00:00
|
|
|
printf("\"%s\"", timestr);
|
|
|
|
}
|
2010-03-28 13:16:08 +00:00
|
|
|
if (statp->st_mtim.tv_nsec != 0)
|
|
|
|
printf(".%09ld, ", statp->st_mtim.tv_nsec);
|
2008-02-23 01:01:49 +00:00
|
|
|
else
|
|
|
|
printf(", ");
|
|
|
|
printf("ctime=");
|
|
|
|
if (resolv == 0)
|
2010-03-28 13:16:08 +00:00
|
|
|
printf("%jd", (intmax_t)statp->st_ctim.tv_sec);
|
2008-02-23 01:01:49 +00:00
|
|
|
else {
|
2010-03-28 13:16:08 +00:00
|
|
|
tm = localtime(&statp->st_ctim.tv_sec);
|
2011-10-08 12:28:06 +00:00
|
|
|
strftime(timestr, sizeof(timestr), TIME_FORMAT, tm);
|
2008-02-23 01:01:49 +00:00
|
|
|
printf("\"%s\"", timestr);
|
|
|
|
}
|
2010-03-28 13:16:08 +00:00
|
|
|
if (statp->st_ctim.tv_nsec != 0)
|
|
|
|
printf(".%09ld, ", statp->st_ctim.tv_nsec);
|
2008-02-23 01:01:49 +00:00
|
|
|
else
|
|
|
|
printf(", ");
|
|
|
|
printf("birthtime=");
|
|
|
|
if (resolv == 0)
|
2010-03-28 13:16:08 +00:00
|
|
|
printf("%jd", (intmax_t)statp->st_birthtim.tv_sec);
|
2008-02-23 01:01:49 +00:00
|
|
|
else {
|
2010-03-28 13:16:08 +00:00
|
|
|
tm = localtime(&statp->st_birthtim.tv_sec);
|
2011-10-08 12:28:06 +00:00
|
|
|
strftime(timestr, sizeof(timestr), TIME_FORMAT, tm);
|
2008-02-23 01:01:49 +00:00
|
|
|
printf("\"%s\"", timestr);
|
|
|
|
}
|
2010-03-28 13:16:08 +00:00
|
|
|
if (statp->st_birthtim.tv_nsec != 0)
|
|
|
|
printf(".%09ld, ", statp->st_birthtim.tv_nsec);
|
2008-02-23 01:01:49 +00:00
|
|
|
else
|
|
|
|
printf(", ");
|
|
|
|
printf("size=%jd, blksize=%ju, blocks=%jd, flags=0x%x",
|
|
|
|
(uintmax_t)statp->st_size, (uintmax_t)statp->st_blksize,
|
|
|
|
(intmax_t)statp->st_blocks, statp->st_flags);
|
|
|
|
printf(" }\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ktrstruct(char *buf, size_t buflen)
|
|
|
|
{
|
|
|
|
char *name, *data;
|
|
|
|
size_t namelen, datalen;
|
|
|
|
int i;
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
cap_rights_t rights;
|
2010-02-18 16:05:09 +00:00
|
|
|
struct stat sb;
|
|
|
|
struct sockaddr_storage ss;
|
2008-02-23 01:01:49 +00:00
|
|
|
|
|
|
|
for (name = buf, namelen = 0;
|
|
|
|
namelen < buflen && name[namelen] != '\0';
|
|
|
|
++namelen)
|
|
|
|
/* nothing */;
|
|
|
|
if (namelen == buflen)
|
|
|
|
goto invalid;
|
|
|
|
if (name[namelen] != '\0')
|
|
|
|
goto invalid;
|
|
|
|
data = buf + namelen + 1;
|
|
|
|
datalen = buflen - namelen - 1;
|
|
|
|
if (datalen == 0)
|
|
|
|
goto invalid;
|
|
|
|
/* sanity check */
|
2011-10-12 21:45:12 +00:00
|
|
|
for (i = 0; i < (int)namelen; ++i)
|
|
|
|
if (!isalpha(name[i]))
|
2008-02-23 01:01:49 +00:00
|
|
|
goto invalid;
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
if (strcmp(name, "caprights") == 0) {
|
|
|
|
if (datalen != sizeof(cap_rights_t))
|
|
|
|
goto invalid;
|
|
|
|
memcpy(&rights, data, datalen);
|
|
|
|
ktrcaprights(&rights);
|
|
|
|
} else if (strcmp(name, "stat") == 0) {
|
2008-02-23 01:01:49 +00:00
|
|
|
if (datalen != sizeof(struct stat))
|
|
|
|
goto invalid;
|
2010-02-18 16:05:09 +00:00
|
|
|
memcpy(&sb, data, datalen);
|
|
|
|
ktrstat(&sb);
|
2008-02-23 01:01:49 +00:00
|
|
|
} else if (strcmp(name, "sockaddr") == 0) {
|
2010-02-18 16:05:09 +00:00
|
|
|
if (datalen > sizeof(ss))
|
|
|
|
goto invalid;
|
|
|
|
memcpy(&ss, data, datalen);
|
2013-02-12 19:10:54 +00:00
|
|
|
if (datalen != ss.ss_len)
|
2008-02-23 01:01:49 +00:00
|
|
|
goto invalid;
|
2010-02-18 16:05:09 +00:00
|
|
|
ktrsockaddr((struct sockaddr *)&ss);
|
2008-02-23 01:01:49 +00:00
|
|
|
} else {
|
|
|
|
printf("unknown structure\n");
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
invalid:
|
|
|
|
printf("invalid record\n");
|
|
|
|
}
|
|
|
|
|
2011-10-11 20:37:10 +00:00
|
|
|
void
|
|
|
|
ktrcapfail(struct ktr_cap_fail *ktr)
|
|
|
|
{
|
2011-10-18 07:28:58 +00:00
|
|
|
switch (ktr->cap_type) {
|
|
|
|
case CAPFAIL_NOTCAPABLE:
|
|
|
|
/* operation on fd with insufficient capabilities */
|
|
|
|
printf("operation requires ");
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
capname(&ktr->cap_needed);
|
2014-02-23 22:13:16 +00:00
|
|
|
printf(", descriptor holds ");
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
capname(&ktr->cap_held);
|
2011-10-18 07:28:58 +00:00
|
|
|
break;
|
|
|
|
case CAPFAIL_INCREASE:
|
|
|
|
/* requested more capabilities than fd already has */
|
|
|
|
printf("attempt to increase capabilities from ");
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
capname(&ktr->cap_held);
|
2011-10-18 09:39:41 +00:00
|
|
|
printf(" to ");
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
capname(&ktr->cap_needed);
|
2011-10-18 07:28:58 +00:00
|
|
|
break;
|
|
|
|
case CAPFAIL_SYSCALL:
|
|
|
|
/* called restricted syscall */
|
|
|
|
printf("disallowed system call");
|
|
|
|
break;
|
|
|
|
case CAPFAIL_LOOKUP:
|
|
|
|
/* used ".." in strict-relative mode */
|
|
|
|
printf("restricted VFS lookup");
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
printf("unknown capability failure: ");
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
capname(&ktr->cap_needed);
|
2011-10-18 07:28:58 +00:00
|
|
|
printf(" ");
|
Change the cap_rights_t type from uint64_t to a structure that we can extend
in the future in a backward compatible (API and ABI) way.
The cap_rights_t represents capability rights. We used to use one bit to
represent one right, but we are running out of spare bits. Currently the new
structure provides place for 114 rights (so 50 more than the previous
cap_rights_t), but it is possible to grow the structure to hold at least 285
rights, although we can make it even larger if 285 rights won't be enough.
The structure definition looks like this:
struct cap_rights {
uint64_t cr_rights[CAP_RIGHTS_VERSION + 2];
};
The initial CAP_RIGHTS_VERSION is 0.
The top two bits in the first element of the cr_rights[] array contain total
number of elements in the array - 2. This means if those two bits are equal to
0, we have 2 array elements.
The top two bits in all remaining array elements should be 0.
The next five bits in all array elements contain array index. Only one bit is
used and bit position in this five-bits range defines array index. This means
there can be at most five array elements in the future.
To define new right the CAPRIGHT() macro must be used. The macro takes two
arguments - an array index and a bit to set, eg.
#define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL)
We still support aliases that combine few rights, but the rights have to belong
to the same array element, eg:
#define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL)
#define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL)
#define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP)
There is new API to manage the new cap_rights_t structure:
cap_rights_t *cap_rights_init(cap_rights_t *rights, ...);
void cap_rights_set(cap_rights_t *rights, ...);
void cap_rights_clear(cap_rights_t *rights, ...);
bool cap_rights_is_set(const cap_rights_t *rights, ...);
bool cap_rights_is_valid(const cap_rights_t *rights);
void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src);
void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src);
bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little);
Capability rights to the cap_rights_init(), cap_rights_set(),
cap_rights_clear() and cap_rights_is_set() functions are provided by
separating them with commas, eg:
cap_rights_t rights;
cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT);
There is no need to terminate the list of rights, as those functions are
actually macros that take care of the termination, eg:
#define cap_rights_set(rights, ...) \
__cap_rights_set((rights), __VA_ARGS__, 0ULL)
void __cap_rights_set(cap_rights_t *rights, ...);
Thanks to using one bit as an array index we can assert in those functions that
there are no two rights belonging to different array elements provided
together. For example this is illegal and will be detected, because CAP_LOOKUP
belongs to element 0 and CAP_PDKILL to element 1:
cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL);
Providing several rights that belongs to the same array's element this way is
correct, but is not advised. It should only be used for aliases definition.
This commit also breaks compatibility with some existing Capsicum system calls,
but I see no other way to do that. This should be fine as Capsicum is still
experimental and this change is not going to 9.x.
Sponsored by: The FreeBSD Foundation
2013-09-05 00:09:56 +00:00
|
|
|
capname(&ktr->cap_held);
|
2011-10-18 07:28:58 +00:00
|
|
|
break;
|
|
|
|
}
|
2012-04-05 17:13:14 +00:00
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ktrfault(struct ktr_fault *ktr)
|
|
|
|
{
|
|
|
|
|
|
|
|
printf("0x%jx ", ktr->vaddr);
|
|
|
|
vmprotname(ktr->type);
|
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ktrfaultend(struct ktr_faultend *ktr)
|
|
|
|
{
|
|
|
|
|
|
|
|
vmresultname(ktr->result);
|
|
|
|
printf("\n");
|
2011-10-11 20:37:10 +00:00
|
|
|
}
|
|
|
|
|
2011-03-01 16:42:28 +00:00
|
|
|
#if defined(__amd64__) || defined(__i386__)
|
|
|
|
void
|
|
|
|
linux_ktrsyscall(struct ktr_syscall *ktr)
|
|
|
|
{
|
|
|
|
int narg = ktr->ktr_narg;
|
|
|
|
register_t *ip;
|
|
|
|
|
|
|
|
if (ktr->ktr_code >= nlinux_syscalls || ktr->ktr_code < 0)
|
|
|
|
printf("[%d]", ktr->ktr_code);
|
2014-03-28 16:11:20 +00:00
|
|
|
else {
|
2011-03-01 16:42:28 +00:00
|
|
|
printf("%s", linux_syscallnames[ktr->ktr_code]);
|
2014-03-28 16:11:20 +00:00
|
|
|
if (syscallno)
|
|
|
|
printf("[%d]", ktr->ktr_code);
|
|
|
|
}
|
2011-03-01 16:42:28 +00:00
|
|
|
ip = &ktr->ktr_args[0];
|
|
|
|
if (narg) {
|
|
|
|
char c = '(';
|
|
|
|
while (narg > 0)
|
|
|
|
print_number(ip, narg, c);
|
|
|
|
putchar(')');
|
|
|
|
}
|
|
|
|
putchar('\n');
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
linux_ktrsysret(struct ktr_sysret *ktr)
|
|
|
|
{
|
|
|
|
register_t ret = ktr->ktr_retval;
|
|
|
|
int error = ktr->ktr_error;
|
|
|
|
int code = ktr->ktr_code;
|
|
|
|
|
|
|
|
if (code >= nlinux_syscalls || code < 0)
|
|
|
|
printf("[%d] ", code);
|
2014-03-28 16:11:20 +00:00
|
|
|
else {
|
|
|
|
printf("%s", linux_syscallnames[code]);
|
|
|
|
if (syscallno)
|
|
|
|
printf("[%d]", code);
|
|
|
|
printf(" ");
|
|
|
|
}
|
2011-03-01 16:42:28 +00:00
|
|
|
|
|
|
|
if (error == 0) {
|
|
|
|
if (fancy) {
|
|
|
|
printf("%ld", (long)ret);
|
|
|
|
if (ret < 0 || ret > 9)
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("/%#lx", (unsigned long)ret);
|
2011-03-01 16:42:28 +00:00
|
|
|
} else {
|
|
|
|
if (decimal)
|
|
|
|
printf("%ld", (long)ret);
|
|
|
|
else
|
2011-10-08 12:28:06 +00:00
|
|
|
printf("%#lx", (unsigned long)ret);
|
2011-03-01 16:42:28 +00:00
|
|
|
}
|
|
|
|
} else if (error == ERESTART)
|
|
|
|
printf("RESTART");
|
|
|
|
else if (error == EJUSTRETURN)
|
|
|
|
printf("JUSTRETURN");
|
|
|
|
else {
|
|
|
|
if (ktr->ktr_error <= ELAST + 1)
|
|
|
|
error = abs(bsd_to_linux_errno[ktr->ktr_error]);
|
|
|
|
else
|
|
|
|
error = 999;
|
|
|
|
printf("-1 errno %d", error);
|
|
|
|
if (fancy)
|
|
|
|
printf(" %s", strerror(ktr->ktr_error));
|
|
|
|
}
|
|
|
|
putchar('\n');
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2002-07-28 16:05:07 +00:00
|
|
|
void
|
|
|
|
usage(void)
|
1994-05-27 12:33:43 +00:00
|
|
|
{
|
2014-03-28 16:11:20 +00:00
|
|
|
fprintf(stderr, "usage: kdump [-dEnlHRrSsTA] [-f trfile] "
|
2008-04-02 09:41:29 +00:00
|
|
|
"[-m maxdata] [-p pid] [-t trstr]\n");
|
1994-05-27 12:33:43 +00:00
|
|
|
exit(1);
|
|
|
|
}
|