1 /*- 2 * Copyright (c) 1988, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the University nor the names of its contributors 14 * may be used to endorse or promote products derived from this software 15 * without specific prior written permission. 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27 * SUCH DAMAGE. 28 */ 29 30 #ifndef lint 31 static const char copyright[] = 32 "@(#) Copyright (c) 1988, 1993\n\ 33 The Regents of the University of California. All rights reserved.\n"; 34 #endif /* not lint */ 35 36 #ifndef lint 37 #if 0 38 static char sccsid[] = "@(#)kdump.c 8.1 (Berkeley) 6/6/93"; 39 #endif 40 #endif /* not lint */ 41 #include <sys/cdefs.h> 42 __FBSDID("$FreeBSD$"); 43 44 #define _WANT_KERNEL_ERRNO 45 #include <sys/param.h> 46 #include <sys/capsicum.h> 47 #include <sys/errno.h> 48 #include <sys/time.h> 49 #include <sys/uio.h> 50 #include <sys/ktrace.h> 51 #include <sys/ioctl.h> 52 #include <sys/socket.h> 53 #include <sys/stat.h> 54 #include <sys/sysent.h> 55 #include <sys/umtx.h> 56 #include <sys/un.h> 57 #include <sys/queue.h> 58 #include <sys/wait.h> 59 #ifdef HAVE_LIBCASPER 60 #include <sys/nv.h> 61 #endif 62 #include <arpa/inet.h> 63 #include <netinet/in.h> 64 #include <ctype.h> 65 #include <capsicum_helpers.h> 66 #include <err.h> 67 #include <grp.h> 68 #include <inttypes.h> 69 #include <locale.h> 70 #include <netdb.h> 71 #include <nl_types.h> 72 #include <pwd.h> 73 #include <stddef.h> 74 #include <stdio.h> 75 #include <stdlib.h> 76 #include <string.h> 77 #include <sysdecode.h> 78 #include <time.h> 79 #include <unistd.h> 80 #include <vis.h> 81 #include "ktrace.h" 82 83 #ifdef HAVE_LIBCASPER 84 #include <libcasper.h> 85 86 #include <casper/cap_grp.h> 87 #include <casper/cap_pwd.h> 88 #endif 89 90 u_int abidump(struct ktr_header *); 91 int fetchprocinfo(struct ktr_header *, u_int *); 92 int fread_tail(void *, int, int); 93 void dumpheader(struct ktr_header *); 94 void ktrsyscall(struct ktr_syscall *, u_int); 95 void ktrsysret(struct ktr_sysret *, u_int); 96 void ktrnamei(char *, int); 97 void hexdump(char *, int, int); 98 void visdump(char *, int, int); 99 void ktrgenio(struct ktr_genio *, int); 100 void ktrpsig(struct ktr_psig *); 101 void ktrcsw(struct ktr_csw *); 102 void ktrcsw_old(struct ktr_csw_old *); 103 void ktruser(int, void *); 104 void ktrcaprights(cap_rights_t *); 105 void ktritimerval(struct itimerval *it); 106 void ktrsockaddr(struct sockaddr *); 107 void ktrstat(struct stat *); 108 void ktrstruct(char *, size_t); 109 void ktrcapfail(struct ktr_cap_fail *); 110 void ktrfault(struct ktr_fault *); 111 void ktrfaultend(struct ktr_faultend *); 112 void usage(void); 113 114 #define TIMESTAMP_NONE 0x0 115 #define TIMESTAMP_ABSOLUTE 0x1 116 #define TIMESTAMP_ELAPSED 0x2 117 #define TIMESTAMP_RELATIVE 0x4 118 119 static int timestamp, decimal, fancy = 1, suppressdata, tail, threads, maxdata, 120 resolv = 0, abiflag = 0, syscallno = 0; 121 static const char *tracefile = DEF_TRACEFILE; 122 static struct ktr_header ktr_header; 123 124 #define TIME_FORMAT "%b %e %T %Y" 125 #define eqs(s1, s2) (strcmp((s1), (s2)) == 0) 126 127 #define print_number64(first,i,n,c) do { \ 128 uint64_t __v; \ 129 \ 130 if (quad_align && (((ptrdiff_t)((i) - (first))) & 1) == 1) { \ 131 (i)++; \ 132 (n)--; \ 133 } \ 134 if (quad_slots == 2) \ 135 __v = (uint64_t)(uint32_t)(i)[0] | \ 136 ((uint64_t)(uint32_t)(i)[1]) << 32; \ 137 else \ 138 __v = (uint64_t)*(i); \ 139 if (decimal) \ 140 printf("%c%jd", (c), (intmax_t)__v); \ 141 else \ 142 printf("%c%#jx", (c), (uintmax_t)__v); \ 143 (i) += quad_slots; \ 144 (n) -= quad_slots; \ 145 (c) = ','; \ 146 } while (0) 147 148 #define print_number(i,n,c) do { \ 149 if (decimal) \ 150 printf("%c%jd", c, (intmax_t)*i); \ 151 else \ 152 printf("%c%#jx", c, (uintmax_t)(u_register_t)*i); \ 153 i++; \ 154 n--; \ 155 c = ','; \ 156 } while (0) 157 158 struct proc_info 159 { 160 TAILQ_ENTRY(proc_info) info; 161 u_int sv_flags; 162 pid_t pid; 163 }; 164 165 static TAILQ_HEAD(trace_procs, proc_info) trace_procs; 166 167 #ifdef HAVE_LIBCASPER 168 static cap_channel_t *cappwd, *capgrp; 169 #endif 170 171 static void 172 strerror_init(void) 173 { 174 175 /* 176 * Cache NLS data before entering capability mode. 177 * XXXPJD: There should be strerror_init() and strsignal_init() in libc. 178 */ 179 (void)catopen("libc", NL_CAT_LOCALE); 180 } 181 182 static void 183 localtime_init(void) 184 { 185 time_t ltime; 186 187 /* 188 * Allow localtime(3) to cache /etc/localtime content before entering 189 * capability mode. 190 * XXXPJD: There should be localtime_init() in libc. 191 */ 192 (void)time(<ime); 193 (void)localtime(<ime); 194 } 195 196 #ifdef HAVE_LIBCASPER 197 static int 198 cappwdgrp_setup(cap_channel_t **cappwdp, cap_channel_t **capgrpp) 199 { 200 cap_channel_t *capcas, *cappwdloc, *capgrploc; 201 const char *cmds[1], *fields[1]; 202 203 capcas = cap_init(); 204 if (capcas == NULL) { 205 err(1, "unable to create casper process"); 206 exit(1); 207 } 208 cappwdloc = cap_service_open(capcas, "system.pwd"); 209 capgrploc = cap_service_open(capcas, "system.grp"); 210 /* Casper capability no longer needed. */ 211 cap_close(capcas); 212 if (cappwdloc == NULL || capgrploc == NULL) { 213 if (cappwdloc == NULL) 214 warn("unable to open system.pwd service"); 215 if (capgrploc == NULL) 216 warn("unable to open system.grp service"); 217 exit(1); 218 } 219 /* Limit system.pwd to only getpwuid() function and pw_name field. */ 220 cmds[0] = "getpwuid"; 221 if (cap_pwd_limit_cmds(cappwdloc, cmds, 1) < 0) 222 err(1, "unable to limit system.pwd service"); 223 fields[0] = "pw_name"; 224 if (cap_pwd_limit_fields(cappwdloc, fields, 1) < 0) 225 err(1, "unable to limit system.pwd service"); 226 /* Limit system.grp to only getgrgid() function and gr_name field. */ 227 cmds[0] = "getgrgid"; 228 if (cap_grp_limit_cmds(capgrploc, cmds, 1) < 0) 229 err(1, "unable to limit system.grp service"); 230 fields[0] = "gr_name"; 231 if (cap_grp_limit_fields(capgrploc, fields, 1) < 0) 232 err(1, "unable to limit system.grp service"); 233 234 *cappwdp = cappwdloc; 235 *capgrpp = capgrploc; 236 return (0); 237 } 238 #endif /* HAVE_LIBCASPER */ 239 240 static void 241 print_integer_arg(const char *(*decoder)(int), int value) 242 { 243 const char *str; 244 245 str = decoder(value); 246 if (str != NULL) 247 printf("%s", str); 248 else { 249 if (decimal) 250 printf("<invalid=%d>", value); 251 else 252 printf("<invalid=%#x>", value); 253 } 254 } 255 256 /* Like print_integer_arg but unknown values are treated as valid. */ 257 static void 258 print_integer_arg_valid(const char *(*decoder)(int), int value) 259 { 260 const char *str; 261 262 str = decoder(value); 263 if (str != NULL) 264 printf("%s", str); 265 else { 266 if (decimal) 267 printf("%d", value); 268 else 269 printf("%#x", value); 270 } 271 } 272 273 static void 274 print_mask_arg(bool (*decoder)(FILE *, int, int *), int value) 275 { 276 bool invalid; 277 int rem; 278 279 printf("%#x<", value); 280 invalid = !decoder(stdout, value, &rem); 281 printf(">"); 282 if (invalid) 283 printf("<invalid>%u", rem); 284 } 285 286 static void 287 print_mask_arg0(bool (*decoder)(FILE *, int, int *), int value) 288 { 289 bool invalid; 290 int rem; 291 292 if (value == 0) { 293 printf("0"); 294 return; 295 } 296 printf("%#x<", value); 297 invalid = !decoder(stdout, value, &rem); 298 printf(">"); 299 if (invalid) 300 printf("<invalid>%u", rem); 301 } 302 303 static void 304 decode_fileflags(fflags_t value) 305 { 306 bool invalid; 307 fflags_t rem; 308 309 if (value == 0) { 310 printf("0"); 311 return; 312 } 313 printf("%#x<", value); 314 invalid = !sysdecode_fileflags(stdout, value, &rem); 315 printf(">"); 316 if (invalid) 317 printf("<invalid>%u", rem); 318 } 319 320 static void 321 decode_filemode(int value) 322 { 323 bool invalid; 324 int rem; 325 326 if (value == 0) { 327 printf("0"); 328 return; 329 } 330 printf("%#o<", value); 331 invalid = !sysdecode_filemode(stdout, value, &rem); 332 printf(">"); 333 if (invalid) 334 printf("<invalid>%u", rem); 335 } 336 337 static void 338 print_mask_arg32(bool (*decoder)(FILE *, uint32_t, uint32_t *), uint32_t value) 339 { 340 bool invalid; 341 uint32_t rem; 342 343 printf("%#x<", value); 344 invalid = !decoder(stdout, value, &rem); 345 printf(">"); 346 if (invalid) 347 printf("<invalid>%u", rem); 348 } 349 350 static void 351 print_mask_argul(bool (*decoder)(FILE *, u_long, u_long *), u_long value) 352 { 353 bool invalid; 354 u_long rem; 355 356 if (value == 0) { 357 printf("0"); 358 return; 359 } 360 printf("%#lx<", value); 361 invalid = !decoder(stdout, value, &rem); 362 printf(">"); 363 if (invalid) 364 printf("<invalid>%lu", rem); 365 } 366 367 int 368 main(int argc, char *argv[]) 369 { 370 int ch, ktrlen, size; 371 void *m; 372 int trpoints = ALL_POINTS; 373 int drop_logged; 374 pid_t pid = 0; 375 u_int sv_flags; 376 377 setlocale(LC_CTYPE, ""); 378 379 timestamp = TIMESTAMP_NONE; 380 381 while ((ch = getopt(argc,argv,"f:dElm:np:AHRrSsTt:")) != -1) 382 switch (ch) { 383 case 'A': 384 abiflag = 1; 385 break; 386 case 'f': 387 tracefile = optarg; 388 break; 389 case 'd': 390 decimal = 1; 391 break; 392 case 'l': 393 tail = 1; 394 break; 395 case 'm': 396 maxdata = atoi(optarg); 397 break; 398 case 'n': 399 fancy = 0; 400 break; 401 case 'p': 402 pid = atoi(optarg); 403 break; 404 case 'r': 405 resolv = 1; 406 break; 407 case 'S': 408 syscallno = 1; 409 break; 410 case 's': 411 suppressdata = 1; 412 break; 413 case 'E': 414 timestamp |= TIMESTAMP_ELAPSED; 415 break; 416 case 'H': 417 threads = 1; 418 break; 419 case 'R': 420 timestamp |= TIMESTAMP_RELATIVE; 421 break; 422 case 'T': 423 timestamp |= TIMESTAMP_ABSOLUTE; 424 break; 425 case 't': 426 trpoints = getpoints(optarg); 427 if (trpoints < 0) 428 errx(1, "unknown trace point in %s", optarg); 429 break; 430 default: 431 usage(); 432 } 433 434 if (argc > optind) 435 usage(); 436 437 m = malloc(size = 1025); 438 if (m == NULL) 439 errx(1, "%s", strerror(ENOMEM)); 440 if (strcmp(tracefile, "-") != 0) 441 if (!freopen(tracefile, "r", stdin)) 442 err(1, "%s", tracefile); 443 444 strerror_init(); 445 localtime_init(); 446 #ifdef HAVE_LIBCASPER 447 if (resolv != 0) { 448 if (cappwdgrp_setup(&cappwd, &capgrp) < 0) { 449 cappwd = NULL; 450 capgrp = NULL; 451 } 452 } 453 if (resolv == 0 || (cappwd != NULL && capgrp != NULL)) { 454 if (cap_enter() < 0 && errno != ENOSYS) 455 err(1, "unable to enter capability mode"); 456 } 457 #else 458 if (resolv == 0) { 459 if (cap_enter() < 0 && errno != ENOSYS) 460 err(1, "unable to enter capability mode"); 461 } 462 #endif 463 if (caph_limit_stdio() == -1) 464 err(1, "unable to limit stdio"); 465 466 TAILQ_INIT(&trace_procs); 467 drop_logged = 0; 468 while (fread_tail(&ktr_header, sizeof(struct ktr_header), 1)) { 469 if (ktr_header.ktr_type & KTR_DROP) { 470 ktr_header.ktr_type &= ~KTR_DROP; 471 if (!drop_logged && threads) { 472 printf( 473 "%6jd %6jd %-8.*s Events dropped.\n", 474 (intmax_t)ktr_header.ktr_pid, 475 ktr_header.ktr_tid > 0 ? 476 (intmax_t)ktr_header.ktr_tid : 0, 477 MAXCOMLEN, ktr_header.ktr_comm); 478 drop_logged = 1; 479 } else if (!drop_logged) { 480 printf("%6jd %-8.*s Events dropped.\n", 481 (intmax_t)ktr_header.ktr_pid, MAXCOMLEN, 482 ktr_header.ktr_comm); 483 drop_logged = 1; 484 } 485 } 486 if (trpoints & (1<<ktr_header.ktr_type)) 487 if (pid == 0 || ktr_header.ktr_pid == pid || 488 ktr_header.ktr_tid == pid) 489 dumpheader(&ktr_header); 490 if ((ktrlen = ktr_header.ktr_len) < 0) 491 errx(1, "bogus length 0x%x", ktrlen); 492 if (ktrlen > size) { 493 m = realloc(m, ktrlen+1); 494 if (m == NULL) 495 errx(1, "%s", strerror(ENOMEM)); 496 size = ktrlen; 497 } 498 if (ktrlen && fread_tail(m, ktrlen, 1) == 0) 499 errx(1, "data too short"); 500 if (fetchprocinfo(&ktr_header, (u_int *)m) != 0) 501 continue; 502 sv_flags = abidump(&ktr_header); 503 if (pid && ktr_header.ktr_pid != pid && 504 ktr_header.ktr_tid != pid) 505 continue; 506 if ((trpoints & (1<<ktr_header.ktr_type)) == 0) 507 continue; 508 drop_logged = 0; 509 switch (ktr_header.ktr_type) { 510 case KTR_SYSCALL: 511 ktrsyscall((struct ktr_syscall *)m, sv_flags); 512 break; 513 case KTR_SYSRET: 514 ktrsysret((struct ktr_sysret *)m, sv_flags); 515 break; 516 case KTR_NAMEI: 517 case KTR_SYSCTL: 518 ktrnamei(m, ktrlen); 519 break; 520 case KTR_GENIO: 521 ktrgenio((struct ktr_genio *)m, ktrlen); 522 break; 523 case KTR_PSIG: 524 ktrpsig((struct ktr_psig *)m); 525 break; 526 case KTR_CSW: 527 if (ktrlen == sizeof(struct ktr_csw_old)) 528 ktrcsw_old((struct ktr_csw_old *)m); 529 else 530 ktrcsw((struct ktr_csw *)m); 531 break; 532 case KTR_USER: 533 ktruser(ktrlen, m); 534 break; 535 case KTR_STRUCT: 536 ktrstruct(m, ktrlen); 537 break; 538 case KTR_CAPFAIL: 539 ktrcapfail((struct ktr_cap_fail *)m); 540 break; 541 case KTR_FAULT: 542 ktrfault((struct ktr_fault *)m); 543 break; 544 case KTR_FAULTEND: 545 ktrfaultend((struct ktr_faultend *)m); 546 break; 547 default: 548 printf("\n"); 549 break; 550 } 551 if (tail) 552 fflush(stdout); 553 } 554 return 0; 555 } 556 557 int 558 fread_tail(void *buf, int size, int num) 559 { 560 int i; 561 562 while ((i = fread(buf, size, num, stdin)) == 0 && tail) { 563 sleep(1); 564 clearerr(stdin); 565 } 566 return (i); 567 } 568 569 int 570 fetchprocinfo(struct ktr_header *kth, u_int *flags) 571 { 572 struct proc_info *pi; 573 574 switch (kth->ktr_type) { 575 case KTR_PROCCTOR: 576 TAILQ_FOREACH(pi, &trace_procs, info) { 577 if (pi->pid == kth->ktr_pid) { 578 TAILQ_REMOVE(&trace_procs, pi, info); 579 break; 580 } 581 } 582 pi = malloc(sizeof(struct proc_info)); 583 if (pi == NULL) 584 errx(1, "%s", strerror(ENOMEM)); 585 pi->sv_flags = *flags; 586 pi->pid = kth->ktr_pid; 587 TAILQ_INSERT_TAIL(&trace_procs, pi, info); 588 return (1); 589 590 case KTR_PROCDTOR: 591 TAILQ_FOREACH(pi, &trace_procs, info) { 592 if (pi->pid == kth->ktr_pid) { 593 TAILQ_REMOVE(&trace_procs, pi, info); 594 free(pi); 595 break; 596 } 597 } 598 return (1); 599 } 600 601 return (0); 602 } 603 604 u_int 605 abidump(struct ktr_header *kth) 606 { 607 struct proc_info *pi; 608 const char *abi; 609 const char *arch; 610 u_int flags = 0; 611 612 TAILQ_FOREACH(pi, &trace_procs, info) { 613 if (pi->pid == kth->ktr_pid) { 614 flags = pi->sv_flags; 615 break; 616 } 617 } 618 619 if (abiflag == 0) 620 return (flags); 621 622 switch (flags & SV_ABI_MASK) { 623 case SV_ABI_LINUX: 624 abi = "L"; 625 break; 626 case SV_ABI_FREEBSD: 627 abi = "F"; 628 break; 629 case SV_ABI_CLOUDABI: 630 abi = "C"; 631 break; 632 default: 633 abi = "U"; 634 break; 635 } 636 637 if (flags & SV_LP64) 638 arch = "64"; 639 else if (flags & SV_ILP32) 640 arch = "32"; 641 else 642 arch = "00"; 643 644 printf("%s%s ", abi, arch); 645 646 return (flags); 647 } 648 649 void 650 dumpheader(struct ktr_header *kth) 651 { 652 static char unknown[64]; 653 static struct timeval prevtime, prevtime_e; 654 struct timeval temp; 655 const char *type; 656 const char *sign; 657 658 switch (kth->ktr_type) { 659 case KTR_SYSCALL: 660 type = "CALL"; 661 break; 662 case KTR_SYSRET: 663 type = "RET "; 664 break; 665 case KTR_NAMEI: 666 type = "NAMI"; 667 break; 668 case KTR_GENIO: 669 type = "GIO "; 670 break; 671 case KTR_PSIG: 672 type = "PSIG"; 673 break; 674 case KTR_CSW: 675 type = "CSW "; 676 break; 677 case KTR_USER: 678 type = "USER"; 679 break; 680 case KTR_STRUCT: 681 type = "STRU"; 682 break; 683 case KTR_SYSCTL: 684 type = "SCTL"; 685 break; 686 case KTR_PROCCTOR: 687 /* FALLTHROUGH */ 688 case KTR_PROCDTOR: 689 return; 690 case KTR_CAPFAIL: 691 type = "CAP "; 692 break; 693 case KTR_FAULT: 694 type = "PFLT"; 695 break; 696 case KTR_FAULTEND: 697 type = "PRET"; 698 break; 699 default: 700 sprintf(unknown, "UNKNOWN(%d)", kth->ktr_type); 701 type = unknown; 702 } 703 704 /* 705 * The ktr_tid field was previously the ktr_buffer field, which held 706 * the kernel pointer value for the buffer associated with data 707 * following the record header. It now holds a threadid, but only 708 * for trace files after the change. Older trace files still contain 709 * kernel pointers. Detect this and suppress the results by printing 710 * negative tid's as 0. 711 */ 712 if (threads) 713 printf("%6jd %6jd %-8.*s ", (intmax_t)kth->ktr_pid, 714 kth->ktr_tid > 0 ? (intmax_t)kth->ktr_tid : 0, 715 MAXCOMLEN, kth->ktr_comm); 716 else 717 printf("%6jd %-8.*s ", (intmax_t)kth->ktr_pid, MAXCOMLEN, 718 kth->ktr_comm); 719 if (timestamp) { 720 if (timestamp & TIMESTAMP_ABSOLUTE) { 721 printf("%jd.%06ld ", (intmax_t)kth->ktr_time.tv_sec, 722 kth->ktr_time.tv_usec); 723 } 724 if (timestamp & TIMESTAMP_ELAPSED) { 725 if (prevtime_e.tv_sec == 0) 726 prevtime_e = kth->ktr_time; 727 timersub(&kth->ktr_time, &prevtime_e, &temp); 728 printf("%jd.%06ld ", (intmax_t)temp.tv_sec, 729 temp.tv_usec); 730 } 731 if (timestamp & TIMESTAMP_RELATIVE) { 732 if (prevtime.tv_sec == 0) 733 prevtime = kth->ktr_time; 734 if (timercmp(&kth->ktr_time, &prevtime, <)) { 735 timersub(&prevtime, &kth->ktr_time, &temp); 736 sign = "-"; 737 } else { 738 timersub(&kth->ktr_time, &prevtime, &temp); 739 sign = ""; 740 } 741 prevtime = kth->ktr_time; 742 printf("%s%jd.%06ld ", sign, (intmax_t)temp.tv_sec, 743 temp.tv_usec); 744 } 745 } 746 printf("%s ", type); 747 } 748 749 #include <sys/syscall.h> 750 751 static void 752 ioctlname(unsigned long val) 753 { 754 const char *str; 755 756 str = sysdecode_ioctlname(val); 757 if (str != NULL) 758 printf("%s", str); 759 else if (decimal) 760 printf("%lu", val); 761 else 762 printf("%#lx", val); 763 } 764 765 static enum sysdecode_abi 766 syscallabi(u_int sv_flags) 767 { 768 769 if (sv_flags == 0) 770 return (SYSDECODE_ABI_FREEBSD); 771 switch (sv_flags & SV_ABI_MASK) { 772 case SV_ABI_FREEBSD: 773 return (SYSDECODE_ABI_FREEBSD); 774 #if defined(__amd64__) || defined(__i386__) 775 case SV_ABI_LINUX: 776 #ifdef __amd64__ 777 if (sv_flags & SV_ILP32) 778 return (SYSDECODE_ABI_LINUX32); 779 #endif 780 return (SYSDECODE_ABI_LINUX); 781 #endif 782 #if defined(__aarch64__) || defined(__amd64__) 783 case SV_ABI_CLOUDABI: 784 return (SYSDECODE_ABI_CLOUDABI64); 785 #endif 786 default: 787 return (SYSDECODE_ABI_UNKNOWN); 788 } 789 } 790 791 static void 792 syscallname(u_int code, u_int sv_flags) 793 { 794 const char *name; 795 796 name = sysdecode_syscallname(syscallabi(sv_flags), code); 797 if (name == NULL) 798 printf("[%d]", code); 799 else { 800 printf("%s", name); 801 if (syscallno) 802 printf("[%d]", code); 803 } 804 } 805 806 static void 807 print_signal(int signo) 808 { 809 const char *signame; 810 811 signame = sysdecode_signal(signo); 812 if (signame != NULL) 813 printf("%s", signame); 814 else 815 printf("SIG %d", signo); 816 } 817 818 void 819 ktrsyscall(struct ktr_syscall *ktr, u_int sv_flags) 820 { 821 int narg = ktr->ktr_narg; 822 register_t *ip, *first; 823 intmax_t arg; 824 int quad_align, quad_slots; 825 826 syscallname(ktr->ktr_code, sv_flags); 827 ip = first = &ktr->ktr_args[0]; 828 if (narg) { 829 char c = '('; 830 if (fancy && 831 (sv_flags == 0 || 832 (sv_flags & SV_ABI_MASK) == SV_ABI_FREEBSD)) { 833 quad_align = 0; 834 if (sv_flags & SV_ILP32) { 835 #ifdef __powerpc__ 836 quad_align = 1; 837 #endif 838 quad_slots = 2; 839 } else 840 quad_slots = 1; 841 switch (ktr->ktr_code) { 842 case SYS_bindat: 843 case SYS_chflagsat: 844 case SYS_connectat: 845 case SYS_faccessat: 846 case SYS_fchmodat: 847 case SYS_fchownat: 848 case SYS_fstatat: 849 case SYS_futimesat: 850 case SYS_linkat: 851 case SYS_mkdirat: 852 case SYS_mkfifoat: 853 case SYS_mknodat: 854 case SYS_openat: 855 case SYS_readlinkat: 856 case SYS_renameat: 857 case SYS_unlinkat: 858 case SYS_utimensat: 859 putchar('('); 860 print_integer_arg_valid(sysdecode_atfd, *ip); 861 c = ','; 862 ip++; 863 narg--; 864 break; 865 } 866 switch (ktr->ktr_code) { 867 case SYS_ioctl: { 868 print_number(ip, narg, c); 869 putchar(c); 870 ioctlname(*ip); 871 c = ','; 872 ip++; 873 narg--; 874 break; 875 } 876 case SYS_ptrace: 877 putchar('('); 878 print_integer_arg(sysdecode_ptrace_request, *ip); 879 c = ','; 880 ip++; 881 narg--; 882 break; 883 case SYS_access: 884 case SYS_eaccess: 885 case SYS_faccessat: 886 print_number(ip, narg, c); 887 putchar(','); 888 print_mask_arg(sysdecode_access_mode, *ip); 889 ip++; 890 narg--; 891 break; 892 case SYS_open: 893 case SYS_openat: 894 print_number(ip, narg, c); 895 putchar(','); 896 print_mask_arg(sysdecode_open_flags, ip[0]); 897 if ((ip[0] & O_CREAT) == O_CREAT) { 898 putchar(','); 899 decode_filemode(ip[1]); 900 } 901 ip += 2; 902 narg -= 2; 903 break; 904 case SYS_wait4: 905 print_number(ip, narg, c); 906 print_number(ip, narg, c); 907 putchar(','); 908 print_mask_arg0(sysdecode_wait4_options, *ip); 909 ip++; 910 narg--; 911 break; 912 case SYS_wait6: 913 putchar('('); 914 print_integer_arg(sysdecode_idtype, *ip); 915 c = ','; 916 ip++; 917 narg--; 918 print_number64(first, ip, narg, c); 919 print_number(ip, narg, c); 920 putchar(','); 921 print_mask_arg(sysdecode_wait6_options, *ip); 922 ip++; 923 narg--; 924 break; 925 case SYS_chmod: 926 case SYS_fchmod: 927 case SYS_lchmod: 928 case SYS_fchmodat: 929 print_number(ip, narg, c); 930 putchar(','); 931 decode_filemode(*ip); 932 ip++; 933 narg--; 934 break; 935 case SYS_mknod: 936 case SYS_mknodat: 937 print_number(ip, narg, c); 938 putchar(','); 939 decode_filemode(*ip); 940 ip++; 941 narg--; 942 break; 943 case SYS_getfsstat: 944 print_number(ip, narg, c); 945 print_number(ip, narg, c); 946 putchar(','); 947 print_integer_arg(sysdecode_getfsstat_mode, *ip); 948 ip++; 949 narg--; 950 break; 951 case SYS_mount: 952 print_number(ip, narg, c); 953 print_number(ip, narg, c); 954 putchar(','); 955 print_mask_arg(sysdecode_mount_flags, *ip); 956 ip++; 957 narg--; 958 break; 959 case SYS_unmount: 960 print_number(ip, narg, c); 961 putchar(','); 962 print_mask_arg(sysdecode_mount_flags, *ip); 963 ip++; 964 narg--; 965 break; 966 case SYS_recvmsg: 967 case SYS_sendmsg: 968 print_number(ip, narg, c); 969 print_number(ip, narg, c); 970 putchar(','); 971 print_mask_arg0(sysdecode_msg_flags, *ip); 972 ip++; 973 narg--; 974 break; 975 case SYS_recvfrom: 976 case SYS_sendto: 977 print_number(ip, narg, c); 978 print_number(ip, narg, c); 979 print_number(ip, narg, c); 980 putchar(','); 981 print_mask_arg0(sysdecode_msg_flags, *ip); 982 ip++; 983 narg--; 984 break; 985 case SYS_chflags: 986 case SYS_chflagsat: 987 case SYS_fchflags: 988 case SYS_lchflags: 989 print_number(ip, narg, c); 990 putchar(','); 991 decode_fileflags(*ip); 992 ip++; 993 narg--; 994 break; 995 case SYS_kill: 996 print_number(ip, narg, c); 997 putchar(','); 998 print_signal(*ip); 999 ip++; 1000 narg--; 1001 break; 1002 case SYS_reboot: 1003 putchar('('); 1004 print_mask_arg(sysdecode_reboot_howto, *ip); 1005 ip++; 1006 narg--; 1007 break; 1008 case SYS_umask: 1009 putchar('('); 1010 decode_filemode(*ip); 1011 ip++; 1012 narg--; 1013 break; 1014 case SYS_msync: 1015 print_number(ip, narg, c); 1016 print_number(ip, narg, c); 1017 putchar(','); 1018 print_mask_arg(sysdecode_msync_flags, *ip); 1019 ip++; 1020 narg--; 1021 break; 1022 #ifdef SYS_freebsd6_mmap 1023 case SYS_freebsd6_mmap: 1024 print_number(ip, narg, c); 1025 print_number(ip, narg, c); 1026 putchar(','); 1027 print_mask_arg(sysdecode_mmap_prot, *ip); 1028 putchar(','); 1029 ip++; 1030 narg--; 1031 print_mask_arg(sysdecode_mmap_flags, *ip); 1032 ip++; 1033 narg--; 1034 break; 1035 #endif 1036 case SYS_mmap: 1037 print_number(ip, narg, c); 1038 print_number(ip, narg, c); 1039 putchar(','); 1040 print_mask_arg(sysdecode_mmap_prot, *ip); 1041 putchar(','); 1042 ip++; 1043 narg--; 1044 print_mask_arg(sysdecode_mmap_flags, *ip); 1045 ip++; 1046 narg--; 1047 break; 1048 case SYS_mprotect: 1049 print_number(ip, narg, c); 1050 print_number(ip, narg, c); 1051 putchar(','); 1052 print_mask_arg(sysdecode_mmap_prot, *ip); 1053 ip++; 1054 narg--; 1055 break; 1056 case SYS_madvise: 1057 print_number(ip, narg, c); 1058 print_number(ip, narg, c); 1059 putchar(','); 1060 print_integer_arg(sysdecode_madvice, *ip); 1061 ip++; 1062 narg--; 1063 break; 1064 case SYS_setpriority: 1065 print_number(ip, narg, c); 1066 print_number(ip, narg, c); 1067 putchar(','); 1068 print_integer_arg(sysdecode_prio_which, *ip); 1069 ip++; 1070 narg--; 1071 break; 1072 case SYS_fcntl: 1073 print_number(ip, narg, c); 1074 putchar(','); 1075 print_integer_arg(sysdecode_fcntl_cmd, ip[0]); 1076 if (sysdecode_fcntl_arg_p(ip[0])) { 1077 putchar(','); 1078 if (ip[0] == F_SETFL) 1079 print_mask_arg( 1080 sysdecode_fcntl_fileflags, 1081 ip[1]); 1082 else 1083 sysdecode_fcntl_arg(stdout, 1084 ip[0], ip[1], 1085 decimal ? 10 : 16); 1086 } 1087 ip += 2; 1088 narg -= 2; 1089 break; 1090 case SYS_socket: { 1091 int sockdomain; 1092 putchar('('); 1093 sockdomain = *ip; 1094 print_integer_arg(sysdecode_socketdomain, 1095 sockdomain); 1096 ip++; 1097 narg--; 1098 putchar(','); 1099 print_mask_arg(sysdecode_socket_type, *ip); 1100 ip++; 1101 narg--; 1102 if (sockdomain == PF_INET || 1103 sockdomain == PF_INET6) { 1104 putchar(','); 1105 print_integer_arg(sysdecode_ipproto, 1106 *ip); 1107 ip++; 1108 narg--; 1109 } 1110 c = ','; 1111 break; 1112 } 1113 case SYS_setsockopt: 1114 case SYS_getsockopt: { 1115 const char *str; 1116 1117 print_number(ip, narg, c); 1118 putchar(','); 1119 print_integer_arg_valid(sysdecode_sockopt_level, 1120 *ip); 1121 str = sysdecode_sockopt_name(ip[0], ip[1]); 1122 if (str != NULL) { 1123 printf(",%s", str); 1124 ip++; 1125 narg--; 1126 } 1127 ip++; 1128 narg--; 1129 break; 1130 } 1131 #ifdef SYS_freebsd6_lseek 1132 case SYS_freebsd6_lseek: 1133 print_number(ip, narg, c); 1134 /* Hidden 'pad' argument, not in lseek(2) */ 1135 print_number(ip, narg, c); 1136 print_number64(first, ip, narg, c); 1137 putchar(','); 1138 print_integer_arg(sysdecode_whence, *ip); 1139 ip++; 1140 narg--; 1141 break; 1142 #endif 1143 case SYS_lseek: 1144 print_number(ip, narg, c); 1145 print_number64(first, ip, narg, c); 1146 putchar(','); 1147 print_integer_arg(sysdecode_whence, *ip); 1148 ip++; 1149 narg--; 1150 break; 1151 case SYS_flock: 1152 print_number(ip, narg, c); 1153 putchar(','); 1154 print_mask_arg(sysdecode_flock_operation, *ip); 1155 ip++; 1156 narg--; 1157 break; 1158 case SYS_mkfifo: 1159 case SYS_mkfifoat: 1160 case SYS_mkdir: 1161 case SYS_mkdirat: 1162 print_number(ip, narg, c); 1163 putchar(','); 1164 decode_filemode(*ip); 1165 ip++; 1166 narg--; 1167 break; 1168 case SYS_shutdown: 1169 print_number(ip, narg, c); 1170 putchar(','); 1171 print_integer_arg(sysdecode_shutdown_how, *ip); 1172 ip++; 1173 narg--; 1174 break; 1175 case SYS_socketpair: 1176 putchar('('); 1177 print_integer_arg(sysdecode_socketdomain, *ip); 1178 ip++; 1179 narg--; 1180 putchar(','); 1181 print_mask_arg(sysdecode_socket_type, *ip); 1182 ip++; 1183 narg--; 1184 c = ','; 1185 break; 1186 case SYS_getrlimit: 1187 case SYS_setrlimit: 1188 putchar('('); 1189 print_integer_arg(sysdecode_rlimit, *ip); 1190 ip++; 1191 narg--; 1192 c = ','; 1193 break; 1194 case SYS_quotactl: 1195 print_number(ip, narg, c); 1196 putchar(','); 1197 if (!sysdecode_quotactl_cmd(stdout, *ip)) { 1198 if (decimal) 1199 printf("<invalid=%d>", (int)*ip); 1200 else 1201 printf("<invalid=%#x>", 1202 (int)*ip); 1203 } 1204 ip++; 1205 narg--; 1206 c = ','; 1207 break; 1208 case SYS_nfssvc: 1209 putchar('('); 1210 print_integer_arg(sysdecode_nfssvc_flags, *ip); 1211 ip++; 1212 narg--; 1213 c = ','; 1214 break; 1215 case SYS_rtprio: 1216 putchar('('); 1217 print_integer_arg(sysdecode_rtprio_function, 1218 *ip); 1219 ip++; 1220 narg--; 1221 c = ','; 1222 break; 1223 case SYS___semctl: 1224 print_number(ip, narg, c); 1225 print_number(ip, narg, c); 1226 putchar(','); 1227 print_integer_arg(sysdecode_semctl_cmd, *ip); 1228 ip++; 1229 narg--; 1230 break; 1231 case SYS_semget: 1232 print_number(ip, narg, c); 1233 print_number(ip, narg, c); 1234 putchar(','); 1235 print_mask_arg(sysdecode_semget_flags, *ip); 1236 ip++; 1237 narg--; 1238 break; 1239 case SYS_msgctl: 1240 print_number(ip, narg, c); 1241 putchar(','); 1242 print_integer_arg(sysdecode_msgctl_cmd, *ip); 1243 ip++; 1244 narg--; 1245 break; 1246 case SYS_shmat: 1247 print_number(ip, narg, c); 1248 print_number(ip, narg, c); 1249 putchar(','); 1250 print_mask_arg(sysdecode_shmat_flags, *ip); 1251 ip++; 1252 narg--; 1253 break; 1254 case SYS_shmctl: 1255 print_number(ip, narg, c); 1256 putchar(','); 1257 print_integer_arg(sysdecode_shmctl_cmd, *ip); 1258 ip++; 1259 narg--; 1260 break; 1261 case SYS_shm_open: 1262 print_number(ip, narg, c); 1263 putchar(','); 1264 print_mask_arg(sysdecode_open_flags, ip[0]); 1265 putchar(','); 1266 decode_filemode(ip[1]); 1267 ip += 2; 1268 narg -= 2; 1269 break; 1270 case SYS_minherit: 1271 print_number(ip, narg, c); 1272 print_number(ip, narg, c); 1273 putchar(','); 1274 print_integer_arg(sysdecode_minherit_inherit, 1275 *ip); 1276 ip++; 1277 narg--; 1278 break; 1279 case SYS_rfork: 1280 putchar('('); 1281 print_mask_arg(sysdecode_rfork_flags, *ip); 1282 ip++; 1283 narg--; 1284 c = ','; 1285 break; 1286 case SYS_lio_listio: 1287 putchar('('); 1288 print_integer_arg(sysdecode_lio_listio_mode, 1289 *ip); 1290 ip++; 1291 narg--; 1292 c = ','; 1293 break; 1294 case SYS_mlockall: 1295 putchar('('); 1296 print_mask_arg(sysdecode_mlockall_flags, *ip); 1297 ip++; 1298 narg--; 1299 break; 1300 case SYS_sched_setscheduler: 1301 print_number(ip, narg, c); 1302 putchar(','); 1303 print_integer_arg(sysdecode_scheduler_policy, 1304 *ip); 1305 ip++; 1306 narg--; 1307 break; 1308 case SYS_sched_get_priority_max: 1309 case SYS_sched_get_priority_min: 1310 putchar('('); 1311 print_integer_arg(sysdecode_scheduler_policy, 1312 *ip); 1313 ip++; 1314 narg--; 1315 break; 1316 case SYS_sendfile: 1317 print_number(ip, narg, c); 1318 print_number(ip, narg, c); 1319 print_number(ip, narg, c); 1320 print_number(ip, narg, c); 1321 print_number(ip, narg, c); 1322 print_number(ip, narg, c); 1323 putchar(','); 1324 print_mask_arg(sysdecode_sendfile_flags, *ip); 1325 ip++; 1326 narg--; 1327 break; 1328 case SYS_kldsym: 1329 print_number(ip, narg, c); 1330 putchar(','); 1331 print_integer_arg(sysdecode_kldsym_cmd, *ip); 1332 ip++; 1333 narg--; 1334 break; 1335 case SYS_sigprocmask: 1336 putchar('('); 1337 print_integer_arg(sysdecode_sigprocmask_how, 1338 *ip); 1339 ip++; 1340 narg--; 1341 c = ','; 1342 break; 1343 case SYS___acl_get_file: 1344 case SYS___acl_set_file: 1345 case SYS___acl_get_fd: 1346 case SYS___acl_set_fd: 1347 case SYS___acl_delete_file: 1348 case SYS___acl_delete_fd: 1349 case SYS___acl_aclcheck_file: 1350 case SYS___acl_aclcheck_fd: 1351 case SYS___acl_get_link: 1352 case SYS___acl_set_link: 1353 case SYS___acl_delete_link: 1354 case SYS___acl_aclcheck_link: 1355 print_number(ip, narg, c); 1356 putchar(','); 1357 print_integer_arg(sysdecode_acltype, *ip); 1358 ip++; 1359 narg--; 1360 break; 1361 case SYS_sigaction: 1362 putchar('('); 1363 print_signal(*ip); 1364 ip++; 1365 narg--; 1366 c = ','; 1367 break; 1368 case SYS_extattrctl: 1369 print_number(ip, narg, c); 1370 putchar(','); 1371 print_integer_arg(sysdecode_extattrnamespace, 1372 *ip); 1373 ip++; 1374 narg--; 1375 break; 1376 case SYS_nmount: 1377 print_number(ip, narg, c); 1378 print_number(ip, narg, c); 1379 putchar(','); 1380 print_mask_arg(sysdecode_mount_flags, *ip); 1381 ip++; 1382 narg--; 1383 break; 1384 case SYS_thr_create: 1385 print_number(ip, narg, c); 1386 print_number(ip, narg, c); 1387 putchar(','); 1388 print_mask_arg(sysdecode_thr_create_flags, *ip); 1389 ip++; 1390 narg--; 1391 break; 1392 case SYS_thr_kill: 1393 print_number(ip, narg, c); 1394 putchar(','); 1395 print_signal(*ip); 1396 ip++; 1397 narg--; 1398 break; 1399 case SYS_kldunloadf: 1400 print_number(ip, narg, c); 1401 putchar(','); 1402 print_integer_arg(sysdecode_kldunload_flags, 1403 *ip); 1404 ip++; 1405 narg--; 1406 break; 1407 case SYS_linkat: 1408 case SYS_renameat: 1409 case SYS_symlinkat: 1410 print_number(ip, narg, c); 1411 putchar(','); 1412 print_integer_arg_valid(sysdecode_atfd, *ip); 1413 ip++; 1414 narg--; 1415 break; 1416 case SYS_cap_fcntls_limit: 1417 print_number(ip, narg, c); 1418 putchar(','); 1419 arg = *ip; 1420 ip++; 1421 narg--; 1422 print_mask_arg32(sysdecode_cap_fcntlrights, arg); 1423 break; 1424 case SYS_posix_fadvise: 1425 print_number(ip, narg, c); 1426 print_number(ip, narg, c); 1427 print_number(ip, narg, c); 1428 (void)putchar(','); 1429 print_integer_arg(sysdecode_fadvice, *ip); 1430 ip++; 1431 narg--; 1432 break; 1433 case SYS_procctl: 1434 putchar('('); 1435 print_integer_arg(sysdecode_idtype, *ip); 1436 c = ','; 1437 ip++; 1438 narg--; 1439 print_number64(first, ip, narg, c); 1440 putchar(','); 1441 print_integer_arg(sysdecode_procctl_cmd, *ip); 1442 ip++; 1443 narg--; 1444 break; 1445 case SYS__umtx_op: 1446 print_number(ip, narg, c); 1447 putchar(','); 1448 print_integer_arg(sysdecode_umtx_op, *ip); 1449 switch (*ip) { 1450 case UMTX_OP_CV_WAIT: 1451 ip++; 1452 narg--; 1453 putchar(','); 1454 print_mask_argul( 1455 sysdecode_umtx_cvwait_flags, *ip); 1456 break; 1457 case UMTX_OP_RW_RDLOCK: 1458 ip++; 1459 narg--; 1460 putchar(','); 1461 print_mask_argul( 1462 sysdecode_umtx_rwlock_flags, *ip); 1463 break; 1464 } 1465 ip++; 1466 narg--; 1467 break; 1468 case SYS_ftruncate: 1469 case SYS_truncate: 1470 print_number(ip, narg, c); 1471 print_number64(first, ip, narg, c); 1472 break; 1473 } 1474 } 1475 while (narg > 0) { 1476 print_number(ip, narg, c); 1477 } 1478 putchar(')'); 1479 } 1480 putchar('\n'); 1481 } 1482 1483 void 1484 ktrsysret(struct ktr_sysret *ktr, u_int sv_flags) 1485 { 1486 register_t ret = ktr->ktr_retval; 1487 int error = ktr->ktr_error; 1488 1489 syscallname(ktr->ktr_code, sv_flags); 1490 printf(" "); 1491 1492 if (error == 0) { 1493 if (fancy) { 1494 printf("%ld", (long)ret); 1495 if (ret < 0 || ret > 9) 1496 printf("/%#lx", (unsigned long)ret); 1497 } else { 1498 if (decimal) 1499 printf("%ld", (long)ret); 1500 else 1501 printf("%#lx", (unsigned long)ret); 1502 } 1503 } else if (error == ERESTART) 1504 printf("RESTART"); 1505 else if (error == EJUSTRETURN) 1506 printf("JUSTRETURN"); 1507 else { 1508 printf("-1 errno %d", sysdecode_freebsd_to_abi_errno( 1509 syscallabi(sv_flags), error)); 1510 if (fancy) 1511 printf(" %s", strerror(ktr->ktr_error)); 1512 } 1513 putchar('\n'); 1514 } 1515 1516 void 1517 ktrnamei(char *cp, int len) 1518 { 1519 printf("\"%.*s\"\n", len, cp); 1520 } 1521 1522 void 1523 hexdump(char *p, int len, int screenwidth) 1524 { 1525 int n, i; 1526 int width; 1527 1528 width = 0; 1529 do { 1530 width += 2; 1531 i = 13; /* base offset */ 1532 i += (width / 2) + 1; /* spaces every second byte */ 1533 i += (width * 2); /* width of bytes */ 1534 i += 3; /* " |" */ 1535 i += width; /* each byte */ 1536 i += 1; /* "|" */ 1537 } while (i < screenwidth); 1538 width -= 2; 1539 1540 for (n = 0; n < len; n += width) { 1541 for (i = n; i < n + width; i++) { 1542 if ((i % width) == 0) { /* beginning of line */ 1543 printf(" 0x%04x", i); 1544 } 1545 if ((i % 2) == 0) { 1546 printf(" "); 1547 } 1548 if (i < len) 1549 printf("%02x", p[i] & 0xff); 1550 else 1551 printf(" "); 1552 } 1553 printf(" |"); 1554 for (i = n; i < n + width; i++) { 1555 if (i >= len) 1556 break; 1557 if (p[i] >= ' ' && p[i] <= '~') 1558 printf("%c", p[i]); 1559 else 1560 printf("."); 1561 } 1562 printf("|\n"); 1563 } 1564 if ((i % width) != 0) 1565 printf("\n"); 1566 } 1567 1568 void 1569 visdump(char *dp, int datalen, int screenwidth) 1570 { 1571 int col = 0; 1572 char *cp; 1573 int width; 1574 char visbuf[5]; 1575 1576 printf(" \""); 1577 col = 8; 1578 for (;datalen > 0; datalen--, dp++) { 1579 vis(visbuf, *dp, VIS_CSTYLE, *(dp+1)); 1580 cp = visbuf; 1581 /* 1582 * Keep track of printables and 1583 * space chars (like fold(1)). 1584 */ 1585 if (col == 0) { 1586 putchar('\t'); 1587 col = 8; 1588 } 1589 switch(*cp) { 1590 case '\n': 1591 col = 0; 1592 putchar('\n'); 1593 continue; 1594 case '\t': 1595 width = 8 - (col&07); 1596 break; 1597 default: 1598 width = strlen(cp); 1599 } 1600 if (col + width > (screenwidth-2)) { 1601 printf("\\\n\t"); 1602 col = 8; 1603 } 1604 col += width; 1605 do { 1606 putchar(*cp++); 1607 } while (*cp); 1608 } 1609 if (col == 0) 1610 printf(" "); 1611 printf("\"\n"); 1612 } 1613 1614 void 1615 ktrgenio(struct ktr_genio *ktr, int len) 1616 { 1617 int datalen = len - sizeof (struct ktr_genio); 1618 char *dp = (char *)ktr + sizeof (struct ktr_genio); 1619 static int screenwidth = 0; 1620 int i, binary; 1621 1622 printf("fd %d %s %d byte%s\n", ktr->ktr_fd, 1623 ktr->ktr_rw == UIO_READ ? "read" : "wrote", datalen, 1624 datalen == 1 ? "" : "s"); 1625 if (suppressdata) 1626 return; 1627 if (screenwidth == 0) { 1628 struct winsize ws; 1629 1630 if (fancy && ioctl(fileno(stderr), TIOCGWINSZ, &ws) != -1 && 1631 ws.ws_col > 8) 1632 screenwidth = ws.ws_col; 1633 else 1634 screenwidth = 80; 1635 } 1636 if (maxdata && datalen > maxdata) 1637 datalen = maxdata; 1638 1639 for (i = 0, binary = 0; i < datalen && binary == 0; i++) { 1640 if (dp[i] >= 32 && dp[i] < 127) 1641 continue; 1642 if (dp[i] == 10 || dp[i] == 13 || dp[i] == 0 || dp[i] == 9) 1643 continue; 1644 binary = 1; 1645 } 1646 if (binary) 1647 hexdump(dp, datalen, screenwidth); 1648 else 1649 visdump(dp, datalen, screenwidth); 1650 } 1651 1652 void 1653 ktrpsig(struct ktr_psig *psig) 1654 { 1655 const char *str; 1656 1657 print_signal(psig->signo); 1658 if (psig->action == SIG_DFL) { 1659 printf(" SIG_DFL"); 1660 } else { 1661 printf(" caught handler=0x%lx mask=0x%x", 1662 (u_long)psig->action, psig->mask.__bits[0]); 1663 } 1664 printf(" code="); 1665 str = sysdecode_sigcode(psig->signo, psig->code); 1666 if (str != NULL) 1667 printf("%s", str); 1668 else 1669 printf("<invalid=%#x>", psig->code); 1670 putchar('\n'); 1671 } 1672 1673 void 1674 ktrcsw_old(struct ktr_csw_old *cs) 1675 { 1676 printf("%s %s\n", cs->out ? "stop" : "resume", 1677 cs->user ? "user" : "kernel"); 1678 } 1679 1680 void 1681 ktrcsw(struct ktr_csw *cs) 1682 { 1683 printf("%s %s \"%s\"\n", cs->out ? "stop" : "resume", 1684 cs->user ? "user" : "kernel", cs->wmesg); 1685 } 1686 1687 void 1688 ktruser(int len, void *p) 1689 { 1690 unsigned char *cp; 1691 1692 if (sysdecode_utrace(stdout, p, len)) { 1693 printf("\n"); 1694 return; 1695 } 1696 1697 printf("%d ", len); 1698 cp = p; 1699 while (len--) 1700 if (decimal) 1701 printf(" %d", *cp++); 1702 else 1703 printf(" %02x", *cp++); 1704 printf("\n"); 1705 } 1706 1707 void 1708 ktrcaprights(cap_rights_t *rightsp) 1709 { 1710 1711 printf("cap_rights_t "); 1712 sysdecode_cap_rights(stdout, rightsp); 1713 printf("\n"); 1714 } 1715 1716 static void 1717 ktrtimeval(struct timeval *tv) 1718 { 1719 1720 printf("{%ld, %ld}", (long)tv->tv_sec, tv->tv_usec); 1721 } 1722 1723 void 1724 ktritimerval(struct itimerval *it) 1725 { 1726 1727 printf("itimerval { .interval = "); 1728 ktrtimeval(&it->it_interval); 1729 printf(", .value = "); 1730 ktrtimeval(&it->it_value); 1731 printf(" }\n"); 1732 } 1733 1734 void 1735 ktrsockaddr(struct sockaddr *sa) 1736 { 1737 /* 1738 TODO: Support additional address families 1739 #include <netnatm/natm.h> 1740 struct sockaddr_natm *natm; 1741 #include <netsmb/netbios.h> 1742 struct sockaddr_nb *nb; 1743 */ 1744 const char *str; 1745 char addr[64]; 1746 1747 /* 1748 * note: ktrstruct() has already verified that sa points to a 1749 * buffer at least sizeof(struct sockaddr) bytes long and exactly 1750 * sa->sa_len bytes long. 1751 */ 1752 printf("struct sockaddr { "); 1753 str = sysdecode_sockaddr_family(sa->sa_family); 1754 if (str != NULL) 1755 printf("%s", str); 1756 else 1757 printf("<invalid=%d>", sa->sa_family); 1758 printf(", "); 1759 1760 #define check_sockaddr_len(n) \ 1761 if (sa_##n.s##n##_len < sizeof(struct sockaddr_##n)) { \ 1762 printf("invalid"); \ 1763 break; \ 1764 } 1765 1766 switch(sa->sa_family) { 1767 case AF_INET: { 1768 struct sockaddr_in sa_in; 1769 1770 memset(&sa_in, 0, sizeof(sa_in)); 1771 memcpy(&sa_in, sa, sa->sa_len); 1772 check_sockaddr_len(in); 1773 inet_ntop(AF_INET, &sa_in.sin_addr, addr, sizeof addr); 1774 printf("%s:%u", addr, ntohs(sa_in.sin_port)); 1775 break; 1776 } 1777 case AF_INET6: { 1778 struct sockaddr_in6 sa_in6; 1779 1780 memset(&sa_in6, 0, sizeof(sa_in6)); 1781 memcpy(&sa_in6, sa, sa->sa_len); 1782 check_sockaddr_len(in6); 1783 getnameinfo((struct sockaddr *)&sa_in6, sizeof(sa_in6), 1784 addr, sizeof(addr), NULL, 0, NI_NUMERICHOST); 1785 printf("[%s]:%u", addr, htons(sa_in6.sin6_port)); 1786 break; 1787 } 1788 case AF_UNIX: { 1789 struct sockaddr_un sa_un; 1790 1791 memset(&sa_un, 0, sizeof(sa_un)); 1792 memcpy(&sa_un, sa, sa->sa_len); 1793 printf("%.*s", (int)sizeof(sa_un.sun_path), sa_un.sun_path); 1794 break; 1795 } 1796 default: 1797 printf("unknown address family"); 1798 } 1799 printf(" }\n"); 1800 } 1801 1802 void 1803 ktrstat(struct stat *statp) 1804 { 1805 char mode[12], timestr[PATH_MAX + 4]; 1806 struct passwd *pwd; 1807 struct group *grp; 1808 struct tm *tm; 1809 1810 /* 1811 * note: ktrstruct() has already verified that statp points to a 1812 * buffer exactly sizeof(struct stat) bytes long. 1813 */ 1814 printf("struct stat {"); 1815 printf("dev=%ju, ino=%ju, ", 1816 (uintmax_t)statp->st_dev, (uintmax_t)statp->st_ino); 1817 if (resolv == 0) 1818 printf("mode=0%jo, ", (uintmax_t)statp->st_mode); 1819 else { 1820 strmode(statp->st_mode, mode); 1821 printf("mode=%s, ", mode); 1822 } 1823 printf("nlink=%ju, ", (uintmax_t)statp->st_nlink); 1824 if (resolv == 0) { 1825 pwd = NULL; 1826 } else { 1827 #ifdef HAVE_LIBCASPER 1828 if (cappwd != NULL) 1829 pwd = cap_getpwuid(cappwd, statp->st_uid); 1830 else 1831 #endif 1832 pwd = getpwuid(statp->st_uid); 1833 } 1834 if (pwd == NULL) 1835 printf("uid=%ju, ", (uintmax_t)statp->st_uid); 1836 else 1837 printf("uid=\"%s\", ", pwd->pw_name); 1838 if (resolv == 0) { 1839 grp = NULL; 1840 } else { 1841 #ifdef HAVE_LIBCASPER 1842 if (capgrp != NULL) 1843 grp = cap_getgrgid(capgrp, statp->st_gid); 1844 else 1845 #endif 1846 grp = getgrgid(statp->st_gid); 1847 } 1848 if (grp == NULL) 1849 printf("gid=%ju, ", (uintmax_t)statp->st_gid); 1850 else 1851 printf("gid=\"%s\", ", grp->gr_name); 1852 printf("rdev=%ju, ", (uintmax_t)statp->st_rdev); 1853 printf("atime="); 1854 if (resolv == 0) 1855 printf("%jd", (intmax_t)statp->st_atim.tv_sec); 1856 else { 1857 tm = localtime(&statp->st_atim.tv_sec); 1858 strftime(timestr, sizeof(timestr), TIME_FORMAT, tm); 1859 printf("\"%s\"", timestr); 1860 } 1861 if (statp->st_atim.tv_nsec != 0) 1862 printf(".%09ld, ", statp->st_atim.tv_nsec); 1863 else 1864 printf(", "); 1865 printf("mtime="); 1866 if (resolv == 0) 1867 printf("%jd", (intmax_t)statp->st_mtim.tv_sec); 1868 else { 1869 tm = localtime(&statp->st_mtim.tv_sec); 1870 strftime(timestr, sizeof(timestr), TIME_FORMAT, tm); 1871 printf("\"%s\"", timestr); 1872 } 1873 if (statp->st_mtim.tv_nsec != 0) 1874 printf(".%09ld, ", statp->st_mtim.tv_nsec); 1875 else 1876 printf(", "); 1877 printf("ctime="); 1878 if (resolv == 0) 1879 printf("%jd", (intmax_t)statp->st_ctim.tv_sec); 1880 else { 1881 tm = localtime(&statp->st_ctim.tv_sec); 1882 strftime(timestr, sizeof(timestr), TIME_FORMAT, tm); 1883 printf("\"%s\"", timestr); 1884 } 1885 if (statp->st_ctim.tv_nsec != 0) 1886 printf(".%09ld, ", statp->st_ctim.tv_nsec); 1887 else 1888 printf(", "); 1889 printf("birthtime="); 1890 if (resolv == 0) 1891 printf("%jd", (intmax_t)statp->st_birthtim.tv_sec); 1892 else { 1893 tm = localtime(&statp->st_birthtim.tv_sec); 1894 strftime(timestr, sizeof(timestr), TIME_FORMAT, tm); 1895 printf("\"%s\"", timestr); 1896 } 1897 if (statp->st_birthtim.tv_nsec != 0) 1898 printf(".%09ld, ", statp->st_birthtim.tv_nsec); 1899 else 1900 printf(", "); 1901 printf("size=%jd, blksize=%ju, blocks=%jd, flags=0x%x", 1902 (uintmax_t)statp->st_size, (uintmax_t)statp->st_blksize, 1903 (intmax_t)statp->st_blocks, statp->st_flags); 1904 printf(" }\n"); 1905 } 1906 1907 void 1908 ktrstruct(char *buf, size_t buflen) 1909 { 1910 char *name, *data; 1911 size_t namelen, datalen; 1912 int i; 1913 cap_rights_t rights; 1914 struct itimerval it; 1915 struct stat sb; 1916 struct sockaddr_storage ss; 1917 1918 for (name = buf, namelen = 0; 1919 namelen < buflen && name[namelen] != '\0'; 1920 ++namelen) 1921 /* nothing */; 1922 if (namelen == buflen) 1923 goto invalid; 1924 if (name[namelen] != '\0') 1925 goto invalid; 1926 data = buf + namelen + 1; 1927 datalen = buflen - namelen - 1; 1928 if (datalen == 0) 1929 goto invalid; 1930 /* sanity check */ 1931 for (i = 0; i < (int)namelen; ++i) 1932 if (!isalpha(name[i])) 1933 goto invalid; 1934 if (strcmp(name, "caprights") == 0) { 1935 if (datalen != sizeof(cap_rights_t)) 1936 goto invalid; 1937 memcpy(&rights, data, datalen); 1938 ktrcaprights(&rights); 1939 } else if (strcmp(name, "itimerval") == 0) { 1940 if (datalen != sizeof(struct itimerval)) 1941 goto invalid; 1942 memcpy(&it, data, datalen); 1943 ktritimerval(&it); 1944 } else if (strcmp(name, "stat") == 0) { 1945 if (datalen != sizeof(struct stat)) 1946 goto invalid; 1947 memcpy(&sb, data, datalen); 1948 ktrstat(&sb); 1949 } else if (strcmp(name, "sockaddr") == 0) { 1950 if (datalen > sizeof(ss)) 1951 goto invalid; 1952 memcpy(&ss, data, datalen); 1953 if (datalen != ss.ss_len) 1954 goto invalid; 1955 ktrsockaddr((struct sockaddr *)&ss); 1956 } else { 1957 printf("unknown structure\n"); 1958 } 1959 return; 1960 invalid: 1961 printf("invalid record\n"); 1962 } 1963 1964 void 1965 ktrcapfail(struct ktr_cap_fail *ktr) 1966 { 1967 switch (ktr->cap_type) { 1968 case CAPFAIL_NOTCAPABLE: 1969 /* operation on fd with insufficient capabilities */ 1970 printf("operation requires "); 1971 sysdecode_cap_rights(stdout, &ktr->cap_needed); 1972 printf(", descriptor holds "); 1973 sysdecode_cap_rights(stdout, &ktr->cap_held); 1974 break; 1975 case CAPFAIL_INCREASE: 1976 /* requested more capabilities than fd already has */ 1977 printf("attempt to increase capabilities from "); 1978 sysdecode_cap_rights(stdout, &ktr->cap_held); 1979 printf(" to "); 1980 sysdecode_cap_rights(stdout, &ktr->cap_needed); 1981 break; 1982 case CAPFAIL_SYSCALL: 1983 /* called restricted syscall */ 1984 printf("disallowed system call"); 1985 break; 1986 case CAPFAIL_LOOKUP: 1987 /* used ".." in strict-relative mode */ 1988 printf("restricted VFS lookup"); 1989 break; 1990 default: 1991 printf("unknown capability failure: "); 1992 sysdecode_cap_rights(stdout, &ktr->cap_needed); 1993 printf(" "); 1994 sysdecode_cap_rights(stdout, &ktr->cap_held); 1995 break; 1996 } 1997 printf("\n"); 1998 } 1999 2000 void 2001 ktrfault(struct ktr_fault *ktr) 2002 { 2003 2004 printf("0x%jx ", (uintmax_t)ktr->vaddr); 2005 print_mask_arg(sysdecode_vmprot, ktr->type); 2006 printf("\n"); 2007 } 2008 2009 void 2010 ktrfaultend(struct ktr_faultend *ktr) 2011 { 2012 const char *str; 2013 2014 str = sysdecode_vmresult(ktr->result); 2015 if (str != NULL) 2016 printf("%s", str); 2017 else 2018 printf("<invalid=%d>", ktr->result); 2019 printf("\n"); 2020 } 2021 2022 void 2023 usage(void) 2024 { 2025 fprintf(stderr, "usage: kdump [-dEnlHRrSsTA] [-f trfile] " 2026 "[-m maxdata] [-p pid] [-t trstr]\n"); 2027 exit(1); 2028 } 2029