2 * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3 * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4 * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
5 * Copyright (c) 1996-1999 Wichert Akkerman <wichert@cistron.nl>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. The name of the author may not be used to endorse or promote products
17 * derived from this software without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
20 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
21 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
23 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
24 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
40 #ifdef HAVE_SYS_EPOLL_H
41 #include <sys/epoll.h>
47 #if HAVE_LONG_LONG_OFF_T
49 * Hacks for systems that have a long long off_t
51 #define flock64 flock /* Horrid hack */
52 #define printflock printflock64 /* Horrider hack */
56 static const struct xlat fcntlcmds[] = {
57 { F_DUPFD, "F_DUPFD" },
58 { F_GETFD, "F_GETFD" },
59 { F_SETFD, "F_SETFD" },
60 { F_GETFL, "F_GETFL" },
61 { F_SETFL, "F_SETFL" },
62 { F_GETLK, "F_GETLK" },
63 { F_SETLK, "F_SETLK" },
64 { F_SETLKW, "F_SETLKW" },
65 { F_GETOWN, "F_GETOWN" },
66 { F_SETOWN, "F_SETOWN" },
68 { F_RSETLK, "F_RSETLK" },
71 { F_RSETLKW, "F_RSETLKW" },
74 { F_RGETLK, "F_RGETLK" },
80 { F_SETSIG, "F_SETSIG" },
83 { F_GETSIG, "F_GETSIG" },
86 { F_CHKFL, "F_CHKFL" },
89 { F_DUP2FD, "F_DUP2FD" },
92 { F_ALLOCSP, "F_ALLOCSP" },
95 { F_ISSTREAM, "F_ISSTREAM" },
101 { F_NPRIV, "F_NPRIV" },
104 { F_QUOTACL, "F_QUOTACL" },
107 { F_BLOCKS, "F_BLOCKS" },
110 { F_BLKSIZE, "F_BLKSIZE" },
113 { F_GETOWN, "F_GETOWN" },
116 { F_SETOWN, "F_SETOWN" },
119 { F_REVOKE, "F_REVOKE" },
122 { F_SETLK, "F_SETLK" },
125 { F_SETLKW, "F_SETLKW" },
128 { F_FREESP, "F_FREESP" },
131 { F_GETLK, "F_GETLK" },
134 { F_SETLK64, "F_SETLK64" },
137 { F_SETLKW64, "F_SETLKW64" },
140 { F_FREESP64, "F_FREESP64" },
143 { F_GETLK64, "F_GETLK64" },
146 { F_SHARE, "F_SHARE" },
149 { F_UNSHARE, "F_UNSHARE" },
152 { F_SETLEASE, "F_SETLEASE" },
155 { F_GETLEASE, "F_GETLEASE" },
158 { F_NOTIFY, "F_NOTIFY" },
160 #ifdef F_DUPFD_CLOEXEC
161 { F_DUPFD_CLOEXEC,"F_DUPFD_CLOEXEC"},
166 static const struct xlat fdflags[] = {
168 { FD_CLOEXEC, "FD_CLOEXEC" },
175 static const struct xlat flockcmds[] = {
176 { LOCK_SH, "LOCK_SH" },
177 { LOCK_EX, "LOCK_EX" },
178 { LOCK_NB, "LOCK_NB" },
179 { LOCK_UN, "LOCK_UN" },
185 static const struct xlat lockfcmds[] = {
186 { F_RDLCK, "F_RDLCK" },
187 { F_WRLCK, "F_WRLCK" },
188 { F_UNLCK, "F_UNLCK" },
190 { F_EXLCK, "F_EXLCK" },
193 { F_SHLCK, "F_SHLCK" },
199 static const struct xlat notifyflags[] = {
201 { DN_ACCESS, "DN_ACCESS" },
204 { DN_MODIFY, "DN_MODIFY" },
207 { DN_CREATE, "DN_CREATE" },
210 { DN_DELETE, "DN_DELETE" },
213 { DN_RENAME, "DN_RENAME" },
216 { DN_ATTRIB, "DN_ATTRIB" },
219 { DN_MULTISHOT, "DN_MULTISHOT" },
225 static const struct xlat whence[] = {
226 { SEEK_SET, "SEEK_SET" },
227 { SEEK_CUR, "SEEK_CUR" },
228 { SEEK_END, "SEEK_END" },
232 #ifndef HAVE_LONG_LONG_OFF_T
235 printflock(struct tcb *tcp, long addr, int getlk)
239 #if SUPPORTED_PERSONALITIES > 1
240 if (personality_wordsize[current_personality] != sizeof(fl.l_start)) {
241 if (personality_wordsize[current_personality] == 4) {
242 /* 32-bit x86 app on x86_64 and similar cases */
246 int32_t l_start; /* off_t */
247 int32_t l_len; /* off_t */
248 int32_t l_pid; /* pid_t */
250 if (umove(tcp, addr, &fl32) < 0) {
254 fl.l_type = fl32.l_type;
255 fl.l_whence = fl32.l_whence;
256 fl.l_start = fl32.l_start;
257 fl.l_len = fl32.l_len;
258 fl.l_pid = fl32.l_pid;
260 /* let people know we have a problem here */
261 tprintf("{ <decode error: unsupported wordsize %d> }",
262 personality_wordsize[current_personality]);
268 if (umove(tcp, addr, &fl) < 0) {
274 printxval(lockfcmds, fl.l_type, "F_???");
275 tprintf(", whence=");
276 printxval(whence, fl.l_whence, "SEEK_???");
277 tprintf(", start=%ld, len=%ld", fl.l_start, fl.l_len);
279 tprintf(", pid=%lu}", (unsigned long) fl.l_pid);
285 #if _LFS64_LARGEFILE || HAVE_LONG_LONG_OFF_T
288 printflock64(struct tcb *tcp, long addr, int getlk)
292 if (umove(tcp, addr, &fl) < 0) {
297 printxval(lockfcmds, fl.l_type, "F_???");
298 tprintf(", whence=");
299 printxval(whence, fl.l_whence, "SEEK_???");
300 tprintf(", start=%lld, len=%lld", (long long) fl.l_start, (long long) fl.l_len);
302 tprintf(", pid=%lu}", (unsigned long) fl.l_pid);
309 sys_fcntl(struct tcb *tcp)
312 tprintf("%ld, ", tcp->u_arg[0]);
313 printxval(fcntlcmds, tcp->u_arg[1], "F_???");
314 switch (tcp->u_arg[1]) {
317 printflags(fdflags, tcp->u_arg[2], "FD_???");
319 case F_SETOWN: case F_DUPFD:
320 #ifdef F_DUPFD_CLOEXEC
321 case F_DUPFD_CLOEXEC:
323 tprintf(", %ld", tcp->u_arg[2]);
327 tprint_open_modes(tcp->u_arg[2]);
329 case F_SETLK: case F_SETLKW:
334 printflock(tcp, tcp->u_arg[2], 0);
340 /* Linux glibc defines SETLK64 as SETLK,
341 even though the kernel has different values - as does Solaris. */
342 #if defined(F_SETLK64) && F_SETLK64 + 0 != F_SETLK
345 #if defined(F_SETLKW64) && F_SETLKW64 + 0 != F_SETLKW
349 printflock64(tcp, tcp->u_arg[2], 0);
355 printflags(notifyflags, tcp->u_arg[2], "DN_???");
361 printxval(lockfcmds, tcp->u_arg[2], "F_???");
367 switch (tcp->u_arg[1]) {
369 #ifdef F_DUPFD_CLOEXEC
370 case F_DUPFD_CLOEXEC:
372 case F_SETFD: case F_SETFL:
373 case F_SETLK: case F_SETLKW:
374 case F_SETOWN: case F_GETOWN:
383 if (syserror(tcp) || tcp->u_rval == 0)
385 tcp->auxstr = sprintflags("flags ", fdflags, tcp->u_rval);
386 return RVAL_HEX|RVAL_STR;
390 tcp->auxstr = sprint_open_modes(tcp->u_rval);
391 return RVAL_HEX|RVAL_STR;
394 printflock(tcp, tcp->u_arg[2], 1);
397 #if defined(F_GETLK64) && F_GETLK64+0!=F_GETLK
401 printflock64(tcp, tcp->u_arg[2], 1);
408 tcp->auxstr = xlookup(lockfcmds, tcp->u_rval);
409 return RVAL_HEX|RVAL_STR;
412 tprintf(", %#lx", tcp->u_arg[2]);
422 sys_flock(struct tcb *tcp)
425 tprintf("%ld, ", tcp->u_arg[0]);
426 printflags(flockcmds, tcp->u_arg[1], "LOCK_???");
433 sys_close(struct tcb *tcp)
436 tprintf("%ld", tcp->u_arg[0]);
442 sys_dup(struct tcb *tcp)
445 tprintf("%ld", tcp->u_arg[0]);
451 do_dup2(struct tcb *tcp, int flags_arg)
454 tprintf("%ld, %ld", tcp->u_arg[0], tcp->u_arg[1]);
455 if (flags_arg >= 0) {
457 printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???");
464 sys_dup2(struct tcb *tcp)
466 return do_dup2(tcp, -1);
471 sys_dup3(struct tcb *tcp)
473 return do_dup2(tcp, 2);
477 #if defined(ALPHA) || defined(FREEBSD) || defined(SUNOS4)
479 sys_getdtablesize(struct tcb *tcp)
483 #endif /* ALPHA || FREEBSD || SUNOS4 */
486 decode_select(struct tcb *tcp, long *args, enum bitness_t bitness)
489 unsigned int fdsize = ((((args[0] + 7) / 8) + sizeof(long) - 1)
492 static char outstr[1024];
497 fds = (fd_set *) malloc(fdsize);
499 fprintf(stderr, "out of memory\n");
502 for (i = 0; i < 3; i++) {
508 if (fds == NULL || !verbose(tcp)) {
509 tprintf(", %#lx", arg);
512 if (umoven(tcp, arg, fdsize, (char *) fds) < 0) {
517 for (j = 0, sep = ""; j < nfds; j++) {
518 if (FD_ISSET(j, fds)) {
519 tprintf("%s%u", sep, j);
527 printtv_bitness(tcp, args[4], bitness, 0);
531 unsigned int cumlen = 0;
537 if ((nfds = tcp->u_rval) == 0) {
538 tcp->auxstr = "Timeout";
542 fds = (fd_set *) malloc(fdsize);
544 fprintf(stderr, "out of memory\n");
547 for (i = 0; i < 3; i++) {
550 tcp->auxstr = outstr;
552 if (fds == NULL || !arg ||
553 umoven(tcp, arg, fdsize, (char *) fds) < 0)
555 for (j = 0; j < args[0]; j++) {
556 if (FD_ISSET(j, fds)) {
557 char str[11 + 3 * sizeof(int)];
560 sprintf(str, "%s%s [%u", sep,
568 sprintf(str, " %u", j);
569 cumlen += strlen(str);
570 if (cumlen < sizeof(outstr))
582 /* This contains no useful information on SunOS. */
586 sprintf(str, "%sleft ", sep);
587 sprinttv(tcp, args[4], bitness, str + strlen(str));
588 if ((cumlen += strlen(str)) < sizeof(outstr))
600 sys_oldselect(struct tcb *tcp)
604 if (umoven(tcp, tcp->u_arg[0], sizeof args, (char *) args) < 0) {
608 return decode_select(tcp, args, BITNESS_CURRENT);
613 sys_osf_select(struct tcb *tcp)
615 long *args = tcp->u_arg;
616 return decode_select(tcp, args, BITNESS_32);
620 static const struct xlat epollctls[] = {
622 { EPOLL_CTL_ADD, "EPOLL_CTL_ADD" },
625 { EPOLL_CTL_MOD, "EPOLL_CTL_MOD" },
628 { EPOLL_CTL_DEL, "EPOLL_CTL_DEL" },
633 static const struct xlat epollevents[] = {
635 { EPOLLIN, "EPOLLIN" },
638 { EPOLLPRI, "EPOLLPRI" },
641 { EPOLLOUT, "EPOLLOUT" },
644 { EPOLLRDNORM, "EPOLLRDNORM" },
647 { EPOLLRDBAND, "EPOLLRDBAND" },
650 { EPOLLWRNORM, "EPOLLWRNORM" },
653 { EPOLLWRBAND, "EPOLLWRBAND" },
656 { EPOLLMSG, "EPOLLMSG" },
659 { EPOLLERR, "EPOLLERR" },
662 { EPOLLHUP, "EPOLLHUP" },
665 { EPOLLONESHOT, "EPOLLONESHOT" },
668 { EPOLLET, "EPOLLET" },
674 sys_epoll_create(struct tcb *tcp)
677 tprintf("%ld", tcp->u_arg[0]);
682 sys_epoll_create1(struct tcb *tcp)
685 printflags(open_mode_flags, tcp->u_arg[0], "O_???");
689 #ifdef HAVE_SYS_EPOLL_H
691 print_epoll_event(struct epoll_event *ev)
694 printflags(epollevents, ev->events, "EPOLL???");
695 /* We cannot know what format the program uses, so print u32 and u64
696 which will cover every value. */
697 tprintf(", {u32=%" PRIu32 ", u64=%" PRIu64 "}}",
698 ev->data.u32, ev->data.u64);
703 sys_epoll_ctl(struct tcb *tcp)
706 tprintf("%ld, ", tcp->u_arg[0]);
707 printxval(epollctls, tcp->u_arg[1], "EPOLL_CTL_???");
708 tprintf(", %ld, ", tcp->u_arg[2]);
709 if (tcp->u_arg[3] == 0)
712 #ifdef HAVE_SYS_EPOLL_H
713 struct epoll_event ev;
714 if (umove(tcp, tcp->u_arg[3], &ev) == 0)
715 print_epoll_event(&ev);
725 epoll_wait_common(struct tcb *tcp)
728 tprintf("%ld, ", tcp->u_arg[0]);
731 tprintf("%lx", tcp->u_arg[1]);
732 else if (tcp->u_rval == 0)
735 #ifdef HAVE_SYS_EPOLL_H
736 struct epoll_event ev, *start, *cur, *end;
740 start = (struct epoll_event *) tcp->u_arg[1];
741 end = start + tcp->u_rval;
742 for (cur = start; cur < end; ++cur) {
745 if (umove(tcp, (long) cur, &ev) == 0)
746 print_epoll_event(&ev);
755 tprintf(" %#lx", (long) start);
760 tprintf(", %ld, %ld", tcp->u_arg[2], tcp->u_arg[3]);
765 sys_epoll_wait(struct tcb *tcp)
767 epoll_wait_common(tcp);
772 sys_epoll_pwait(struct tcb *tcp)
774 epoll_wait_common(tcp);
777 print_sigset(tcp, tcp->u_arg[4], 0);
783 sys_io_setup(struct tcb *tcp)
786 tprintf("%ld, ", tcp->u_arg[0]);
789 tprintf("0x%0lx", tcp->u_arg[1]);
791 unsigned long user_id;
792 if (umove(tcp, tcp->u_arg[1], &user_id) == 0)
793 tprintf("{%lu}", user_id);
802 sys_io_destroy(struct tcb *tcp)
805 tprintf("%lu", tcp->u_arg[0]);
810 sys_io_submit(struct tcb *tcp)
814 tprintf("%lu, %ld, ", tcp->u_arg[0], tcp->u_arg[1]);
816 /* and if nr is negative? */
822 struct iocb *iocbp, **iocbs = (void *)tcp->u_arg[2];
824 for (i = 0; i < nr; i++, iocbs++) {
831 if (umove(tcp, (unsigned long)iocbs, &iocbp) ||
832 umove(tcp, (unsigned long)iocbp, &iocb)) {
836 tprintf("{%p, %u, %hu, %hu, %d}",
839 iocb.aio_reqprio, iocb.aio_fildes);
852 sys_io_cancel(struct tcb *tcp)
858 tprintf("%lu, ", tcp->u_arg[0]);
860 if (umove(tcp, tcp->u_arg[1], &iocb) == 0) {
861 tprintf("{%p, %u, %hu, %hu, %d}, ",
864 iocb.aio_reqprio, iocb.aio_fildes);
873 struct io_event event;
874 if (umove(tcp, tcp->u_arg[2], &event) == 0)
875 tprintf("{%p, %p, %ld, %ld}",
876 event.data, event.obj,
877 event.res, event.res2);
887 sys_io_getevents(struct tcb *tcp)
890 tprintf("%ld, %ld, %ld, ", tcp->u_arg[0], tcp->u_arg[1],
893 if (tcp->u_rval == 0) {
897 struct io_event *events = (void *)tcp->u_arg[3];
898 long i, nr = tcp->u_rval;
900 for (i = 0; i < nr; i++, events++) {
901 struct io_event event;
908 if (umove(tcp, (unsigned long)events, &event) != 0) {
912 tprintf("{%p, %p, %ld, %ld}", event.data,
913 event.obj, event.res, event.res2);
921 print_timespec(tcp, tcp->u_arg[4]);
928 sys_select(struct tcb *tcp)
930 return decode_select(tcp, tcp->u_arg, BITNESS_CURRENT);
935 sys_pselect6(struct tcb *tcp)
937 int rc = decode_select(tcp, tcp->u_arg, BITNESS_CURRENT);
943 if (umove(tcp, tcp->u_arg[5], &data) < 0)
944 tprintf(", %#lx", tcp->u_arg[5]);
947 if (data.len < sizeof(long))
948 tprintf("%#lx", (long)data.ss);
950 print_sigset(tcp, (long)data.ss, 0);
951 tprintf(", %lu}", data.len);
958 do_eventfd(struct tcb *tcp, int flags_arg)
961 tprintf("%lu", tcp->u_arg[0]);
962 if (flags_arg >= 0) {
964 printflags(open_mode_flags, tcp->u_arg[flags_arg], "O_???");
971 sys_eventfd(struct tcb *tcp)
973 return do_eventfd(tcp, -1);
977 sys_eventfd2(struct tcb *tcp)
979 return do_eventfd(tcp, 1);