block/snapshot: Clarify goto fallback behavior
[qemu.git] / bsd-user / strace.c
blobbe40b8a20cf29c444d5c68969405c1ecddf39da1
1 /*
2 * System call tracing and debugging
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, see <http://www.gnu.org/licenses/>.
19 #include "qemu/osdep.h"
20 #include <sys/select.h>
21 #include <sys/syscall.h>
22 #include <sys/ioccom.h>
23 #include <ctype.h>
25 #include "qemu.h"
27 #include "os-strace.h" /* OS dependent strace print functions */
29 int do_strace;
32 * Utility functions
35 static void print_sysctl(const struct syscallname *name, abi_long arg1,
36 abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5,
37 abi_long arg6)
39 uint32_t i;
40 int32_t *namep;
42 gemu_log("%s({ ", name->name);
43 namep = lock_user(VERIFY_READ, arg1, sizeof(int32_t) * arg2, 1);
44 if (namep) {
45 int32_t *p = namep;
47 for (i = 0; i < (uint32_t)arg2; i++) {
48 gemu_log("%d ", tswap32(*p++));
50 unlock_user(namep, arg1, 0);
52 gemu_log("}, %u, 0x" TARGET_ABI_FMT_lx ", 0x" TARGET_ABI_FMT_lx ", 0x"
53 TARGET_ABI_FMT_lx ", 0x" TARGET_ABI_FMT_lx ")",
54 (uint32_t)arg2, arg3, arg4, arg5, arg6);
57 static void print_execve(const struct syscallname *name, abi_long arg1,
58 abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5,
59 abi_long arg6)
61 abi_ulong arg_ptr_addr;
62 char *s;
64 s = lock_user_string(arg1);
65 if (s == NULL) {
66 return;
68 gemu_log("%s(\"%s\",{", name->name, s);
69 unlock_user(s, arg1, 0);
71 for (arg_ptr_addr = arg2; ; arg_ptr_addr += sizeof(abi_ulong)) {
72 abi_ulong *arg_ptr, arg_addr;
74 arg_ptr = lock_user(VERIFY_READ, arg_ptr_addr, sizeof(abi_ulong), 1);
75 if (!arg_ptr) {
76 return;
78 arg_addr = tswapl(*arg_ptr);
79 unlock_user(arg_ptr, arg_ptr_addr, 0);
80 if (!arg_addr) {
81 break;
83 if ((s = lock_user_string(arg_addr))) {
84 gemu_log("\"%s\",", s);
85 unlock_user(s, arg_addr, 0);
88 gemu_log("NULL})");
91 static void print_ioctl(const struct syscallname *name,
92 abi_long arg1, abi_long arg2, abi_long arg3, abi_long arg4,
93 abi_long arg5, abi_long arg6)
95 /* Decode the ioctl request */
96 gemu_log("%s(%d, 0x%0lx { IO%s%s GRP:0x%x('%c') CMD:%d LEN:%d }, 0x"
97 TARGET_ABI_FMT_lx ", ...)",
98 name->name,
99 (int)arg1,
100 (unsigned long)arg2,
101 arg2 & IOC_OUT ? "R" : "",
102 arg2 & IOC_IN ? "W" : "",
103 (unsigned)IOCGROUP(arg2),
104 isprint(IOCGROUP(arg2)) ? (char)IOCGROUP(arg2) : '?',
105 (int)arg2 & 0xFF,
106 (int)IOCPARM_LEN(arg2),
107 arg3);
110 static void print_sysarch(const struct syscallname *name, abi_long arg1,
111 abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5,
112 abi_long arg6)
114 /* This is os dependent. */
115 do_os_print_sysarch(name, arg1, arg2, arg3, arg4, arg5, arg6);
119 * Variants for the return value output function
122 static void print_syscall_ret_addr(const struct syscallname *name, abi_long ret)
124 if (ret == -1) {
125 gemu_log(" = -1 errno=%d (%s)\n", errno, strerror(errno));
126 } else {
127 gemu_log(" = 0x" TARGET_ABI_FMT_lx "\n", ret);
132 * An array of all of the syscalls we know about
135 static const struct syscallname freebsd_scnames[] = {
136 #include "freebsd/strace.list"
138 static const struct syscallname netbsd_scnames[] = {
139 #include "netbsd/strace.list"
141 static const struct syscallname openbsd_scnames[] = {
142 #include "openbsd/strace.list"
145 static void print_syscall(int num, const struct syscallname *scnames,
146 unsigned int nscnames, abi_long arg1, abi_long arg2, abi_long arg3,
147 abi_long arg4, abi_long arg5, abi_long arg6)
149 unsigned int i;
150 const char *format="%s(" TARGET_ABI_FMT_ld "," TARGET_ABI_FMT_ld ","
151 TARGET_ABI_FMT_ld "," TARGET_ABI_FMT_ld "," TARGET_ABI_FMT_ld ","
152 TARGET_ABI_FMT_ld ")";
154 gemu_log("%d ", getpid() );
156 for (i = 0; i < nscnames; i++) {
157 if (scnames[i].nr == num) {
158 if (scnames[i].call != NULL) {
159 scnames[i].call(&scnames[i], arg1, arg2, arg3, arg4, arg5,
160 arg6);
161 } else {
162 /* XXX: this format system is broken because it uses
163 host types and host pointers for strings */
164 if (scnames[i].format != NULL) {
165 format = scnames[i].format;
167 gemu_log(format, scnames[i].name, arg1, arg2, arg3, arg4, arg5,
168 arg6);
170 return;
173 gemu_log("Unknown syscall %d\n", num);
176 static void print_syscall_ret(int num, abi_long ret,
177 const struct syscallname *scnames, unsigned int nscnames)
179 unsigned int i;
181 for (i = 0; i < nscnames; i++) {
182 if (scnames[i].nr == num) {
183 if (scnames[i].result != NULL) {
184 scnames[i].result(&scnames[i], ret);
185 } else {
186 if (ret < 0) {
187 gemu_log(" = -1 errno=" TARGET_ABI_FMT_ld " (%s)\n", -ret,
188 strerror(-ret));
189 } else {
190 gemu_log(" = " TARGET_ABI_FMT_ld "\n", ret);
193 break;
199 * The public interface to this module.
201 void print_freebsd_syscall(int num, abi_long arg1, abi_long arg2, abi_long arg3,
202 abi_long arg4, abi_long arg5, abi_long arg6)
205 print_syscall(num, freebsd_scnames, ARRAY_SIZE(freebsd_scnames), arg1, arg2,
206 arg3, arg4, arg5, arg6);
209 void print_freebsd_syscall_ret(int num, abi_long ret)
212 print_syscall_ret(num, ret, freebsd_scnames, ARRAY_SIZE(freebsd_scnames));
215 void print_netbsd_syscall(int num, abi_long arg1, abi_long arg2, abi_long arg3,
216 abi_long arg4, abi_long arg5, abi_long arg6)
219 print_syscall(num, netbsd_scnames, ARRAY_SIZE(netbsd_scnames),
220 arg1, arg2, arg3, arg4, arg5, arg6);
223 void print_netbsd_syscall_ret(int num, abi_long ret)
226 print_syscall_ret(num, ret, netbsd_scnames, ARRAY_SIZE(netbsd_scnames));
229 void print_openbsd_syscall(int num, abi_long arg1, abi_long arg2, abi_long arg3,
230 abi_long arg4, abi_long arg5, abi_long arg6)
233 print_syscall(num, openbsd_scnames, ARRAY_SIZE(openbsd_scnames), arg1, arg2,
234 arg3, arg4, arg5, arg6);
237 void print_openbsd_syscall_ret(int num, abi_long ret)
240 print_syscall_ret(num, ret, openbsd_scnames, ARRAY_SIZE(openbsd_scnames));