freebsd-nq/usr.bin/truss/i386-linux.c
1997-12-06 05:23:12 +00:00

222 lines
5.0 KiB
C

/*
* Linux/i386-specific system call handling. Given how much of this code
* is taken from the freebsd equivalent, I can probably put even more of
* it in support routines that can be used by any personality support.
*/
/*
* $Id$
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include <err.h>
#include <signal.h>
#include <fcntl.h>
#include <unistd.h>
#include <sys/ioctl.h>
#include <sys/pioctl.h>
#include <machine/reg.h>
#include <machine/psl.h>
#include "syscall.h"
static int fd = -1;
static int cpid = -1;
extern int Procfd;
extern FILE *outfile;
#include "linux_syscalls.h"
static int nsyscalls =
sizeof(linux_syscallnames) / sizeof(linux_syscallnames[0]);
/* See the comment in i386-fbsd.c about this structure. */
static struct linux_syscall {
struct syscall *sc;
char *name;
int number;
unsigned long args[5];
int nargs; /* number of arguments -- *not* number of words! */
char **s_args; /* the printable arguments */
} lsc;
static inline void
clear_lsc() {
if (lsc.s_args) {
int i;
for (i = 0; i < lsc.nargs; i++)
if (lsc.s_args[i])
free(lsc.s_args[i]);
free(lsc.s_args);
}
memset(&lsc, 0, sizeof(lsc));
}
void
i386_linux_syscall_entry(int pid, int nargs) {
char buf[32];
struct reg regs = { 0 };
int syscall;
int i;
int memfd;
struct syscall *sc;
if (fd == -1 || pid != cpid) {
sprintf(buf, "/proc/%d/regs", pid);
fd = open(buf, O_RDWR);
if (fd == -1) {
fprintf(outfile, "-- CANNOT READ REGISTERS --\n");
return;
}
cpid = pid;
}
clear_lsc();
lseek(fd, 0L, 0);
i = read(fd, &regs, sizeof(regs));
syscall = regs.r_eax;
lsc.number = syscall;
lsc.name =
(syscall < 0 || syscall > nsyscalls) ? NULL : linux_syscallnames[syscall];
if (!lsc.name) {
fprintf (outfile, "-- UNKNOWN SYSCALL %d\n", syscall);
}
if (nargs == 0)
return;
/*
* Linux passes syscall arguments in registers, not
* on the stack. Fortunately, we've got access to the
* register set. Note that we don't bother checking the
* number of arguments. And what does linux do for syscalls
* that have more than five arguments?
*/
lsc.args[0] = regs.r_ebx;
lsc.args[1] = regs.r_ecx;
lsc.args[2] = regs.r_edx;
lsc.args[3] = regs.r_esi;
lsc.args[4] = regs.r_edi;
sc = get_syscall(lsc.name);
if (sc) {
lsc.nargs = sc->nargs;
} else {
#ifdef DEBUG
fprintf(outfile, "unknown syscall %s -- setting args to %d\n",
lsc.name, nargs);
#endif
lsc.nargs = nargs;
}
lsc.s_args = malloc((1+lsc.nargs) * sizeof(char*));
memset(lsc.s_args, 0, lsc.nargs * sizeof(char*));
lsc.sc = sc;
if (lsc.name) {
char *tmp;
#ifdef DEBUG
fprintf(stderr, "syscall %s(", lsc.name);
#endif
for (i = 0; i < lsc.nargs ; i++) {
#ifdef DEBUG
fprintf(stderr, "0x%x%s",
sc ?
lsc.args[sc->args[i].offset]
: lsc.args[i],
i < (lsc.nargs - 1) ? "," : "");
#endif
if (sc && !(sc->args[i].type & OUT)) {
lsc.s_args[i] = print_arg(Procfd, &sc->args[i], lsc.args);
}
}
#ifdef DEBUG
fprintf(stderr, ")\n");
#endif
}
if (!strcmp(lsc.name, "linux_execve") || !strcmp(lsc.name, "exit")) {
print_syscall(outfile, lsc.name, lsc.nargs, lsc.s_args);
}
return;
}
/*
* Linux syscalls return negative errno's, we do positive and map them
*/
int bsd_to_linux_errno[] = {
-0, -1, -2, -3, -4, -5, -6, -7, -8, -9,
-10, -35, -12, -13, -14, -15, -16, -17, -18, -19,
-20, -21, -22, -23, -24, -25, -26, -27, -28, -29,
-30, -31, -32, -33, -34, -11,-115,-114, -88, -89,
-90, -91, -92, -93, -94, -95, -96, -97, -98, -99,
-100,-101,-102,-103,-104,-105,-106,-107,-108,-109,
-110,-111, -40, -36,-112,-113, -39, -11, -87,-122,
-116, -66, -6, -6, -6, -6, -6, -37, -38, -9,
-6,
};
void
i386_linux_syscall_exit(int pid, int syscall) {
char buf[32];
struct reg regs;
int retval;
int i;
int errorp;
struct syscall *sc;
if (fd == -1 || pid != cpid) {
sprintf(buf, "/proc/%d/regs", pid);
fd = open(buf, O_RDONLY);
if (fd == -1) {
fprintf(outfile, "-- CANNOT READ REGISTERS --\n");
return;
}
cpid = pid;
}
lseek(fd, 0L, 0);
if (read(fd, &regs, sizeof(regs)) != sizeof(regs))
return;
retval = regs.r_eax;
errorp = !!(regs.r_eflags & PSL_C);
sc = lsc.sc;
if (!sc) {
for (i = 0; i < lsc.nargs; i++) {
lsc.s_args[i] = malloc(12);
sprintf(lsc.s_args[i], "0x%x", lsc.args[i]);
}
} else {
for (i = 0; i < sc->nargs; i++) {
char *temp;
if (sc->args[i].type & OUT) {
if (errorp) {
temp = malloc(12);
sprintf(temp, "0x%x", lsc.args[sc->args[i].offset]);
} else {
temp = print_arg(Procfd, &sc->args[i], lsc.args);
}
lsc.s_args[i] = temp;
}
}
}
print_syscall(outfile, lsc.name, lsc.nargs, lsc.s_args);
if (errorp) {
for (i = 0; i < sizeof(bsd_to_linux_errno) / sizeof(int); i++)
if (retval == bsd_to_linux_errno[i])
break;
fprintf(outfile, "errno %d '%s'\n", retval, strerror(i));
} else {
fprintf(outfile, "returns %d (0x%x)\n", retval, retval);
}
clear_lsc();
return;
}