cachepc-qemu

Fork of AMDESE/qemu with changes for cachepc side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-qemu
Log | Files | Refs | Submodules | LICENSE | sfeed.txt

strace.c (7107B)


      1/*
      2 *  System call tracing and debugging
      3 *
      4 *
      5 *  This program is free software; you can redistribute it and/or modify
      6 *  it under the terms of the GNU General Public License as published by
      7 *  the Free Software Foundation; either version 2 of the License, or
      8 *  (at your option) any later version.
      9 *
     10 *  This program is distributed in the hope that it will be useful,
     11 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
     12 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
     13 *  GNU General Public License for more details.
     14 *
     15 *  You should have received a copy of the GNU General Public License
     16 *  along with this program; if not, see <http://www.gnu.org/licenses/>.
     17 */
     18
     19#include "qemu/osdep.h"
     20#include <sys/select.h>
     21#include <sys/syscall.h>
     22#include <sys/ioccom.h>
     23#include <ctype.h>
     24
     25#include "qemu.h"
     26
     27#include "os-strace.h"  /* OS dependent strace print functions */
     28
     29int do_strace;
     30
     31/*
     32 * Utility functions
     33 */
     34
     35static void print_sysctl(const struct syscallname *name, abi_long arg1,
     36        abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5,
     37        abi_long arg6)
     38{
     39    uint32_t i;
     40    int32_t *namep;
     41
     42    gemu_log("%s({ ", name->name);
     43    namep = lock_user(VERIFY_READ, arg1, sizeof(int32_t) * arg2, 1);
     44    if (namep) {
     45        int32_t *p = namep;
     46
     47        for (i = 0; i < (uint32_t)arg2; i++) {
     48            gemu_log("%d ", tswap32(*p++));
     49        }
     50        unlock_user(namep, arg1, 0);
     51    }
     52    gemu_log("}, %u, 0x" TARGET_ABI_FMT_lx ", 0x" TARGET_ABI_FMT_lx ", 0x"
     53        TARGET_ABI_FMT_lx ", 0x" TARGET_ABI_FMT_lx ")",
     54        (uint32_t)arg2, arg3, arg4, arg5, arg6);
     55}
     56
     57static void print_execve(const struct syscallname *name, abi_long arg1,
     58        abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5,
     59        abi_long arg6)
     60{
     61    abi_ulong arg_ptr_addr;
     62    char *s;
     63
     64    s = lock_user_string(arg1);
     65    if (s == NULL) {
     66        return;
     67    }
     68    gemu_log("%s(\"%s\",{", name->name, s);
     69    unlock_user(s, arg1, 0);
     70
     71    for (arg_ptr_addr = arg2; ; arg_ptr_addr += sizeof(abi_ulong)) {
     72        abi_ulong *arg_ptr, arg_addr;
     73
     74        arg_ptr = lock_user(VERIFY_READ, arg_ptr_addr, sizeof(abi_ulong), 1);
     75        if (!arg_ptr) {
     76            return;
     77        }
     78        arg_addr = tswapl(*arg_ptr);
     79        unlock_user(arg_ptr, arg_ptr_addr, 0);
     80        if (!arg_addr) {
     81            break;
     82        }
     83        if ((s = lock_user_string(arg_addr))) {
     84            gemu_log("\"%s\",", s);
     85            unlock_user(s, arg_addr, 0);
     86        }
     87    }
     88    gemu_log("NULL})");
     89}
     90
     91static void print_ioctl(const struct syscallname *name,
     92        abi_long arg1, abi_long arg2, abi_long arg3, abi_long arg4,
     93        abi_long arg5, abi_long arg6)
     94{
     95    /* Decode the ioctl request */
     96    gemu_log("%s(%d, 0x%0lx { IO%s%s GRP:0x%x('%c') CMD:%d LEN:%d }, 0x"
     97            TARGET_ABI_FMT_lx ", ...)",
     98            name->name,
     99            (int)arg1,
    100            (unsigned long)arg2,
    101            arg2 & IOC_OUT ? "R" : "",
    102            arg2 & IOC_IN ? "W" : "",
    103            (unsigned)IOCGROUP(arg2),
    104            isprint(IOCGROUP(arg2)) ? (char)IOCGROUP(arg2) : '?',
    105            (int)arg2 & 0xFF,
    106            (int)IOCPARM_LEN(arg2),
    107            arg3);
    108}
    109
    110static void print_sysarch(const struct syscallname *name, abi_long arg1,
    111        abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5,
    112        abi_long arg6)
    113{
    114    /* This is os dependent. */
    115    do_os_print_sysarch(name, arg1, arg2, arg3, arg4, arg5, arg6);
    116}
    117
    118/*
    119 * Variants for the return value output function
    120 */
    121
    122static void print_syscall_ret_addr(const struct syscallname *name, abi_long ret)
    123{
    124    if (ret == -1) {
    125        gemu_log(" = -1 errno=%d (%s)\n", errno, strerror(errno));
    126    } else {
    127        gemu_log(" = 0x" TARGET_ABI_FMT_lx "\n", ret);
    128    }
    129}
    130
    131/*
    132 * An array of all of the syscalls we know about
    133 */
    134
    135static const struct syscallname freebsd_scnames[] = {
    136#include "freebsd/strace.list"
    137};
    138static const struct syscallname netbsd_scnames[] = {
    139#include "netbsd/strace.list"
    140};
    141static const struct syscallname openbsd_scnames[] = {
    142#include "openbsd/strace.list"
    143};
    144
    145static void print_syscall(int num, const struct syscallname *scnames,
    146        unsigned int nscnames, abi_long arg1, abi_long arg2, abi_long arg3,
    147        abi_long arg4, abi_long arg5, abi_long arg6)
    148{
    149    unsigned int i;
    150    const char *format="%s(" TARGET_ABI_FMT_ld "," TARGET_ABI_FMT_ld ","
    151        TARGET_ABI_FMT_ld "," TARGET_ABI_FMT_ld "," TARGET_ABI_FMT_ld ","
    152        TARGET_ABI_FMT_ld ")";
    153
    154    gemu_log("%d ", getpid() );
    155
    156    for (i = 0; i < nscnames; i++) {
    157        if (scnames[i].nr == num) {
    158            if (scnames[i].call != NULL) {
    159                scnames[i].call(&scnames[i], arg1, arg2, arg3, arg4, arg5,
    160                        arg6);
    161            } else {
    162                /* XXX: this format system is broken because it uses
    163                   host types and host pointers for strings */
    164                if (scnames[i].format != NULL) {
    165                    format = scnames[i].format;
    166                }
    167                gemu_log(format, scnames[i].name, arg1, arg2, arg3, arg4, arg5,
    168                        arg6);
    169            }
    170            return;
    171        }
    172    }
    173    gemu_log("Unknown syscall %d\n", num);
    174}
    175
    176static void print_syscall_ret(int num, abi_long ret,
    177        const struct syscallname *scnames, unsigned int nscnames)
    178{
    179    unsigned int i;
    180
    181    for (i = 0; i < nscnames; i++) {
    182        if (scnames[i].nr == num) {
    183            if (scnames[i].result != NULL) {
    184                scnames[i].result(&scnames[i], ret);
    185            } else {
    186                if (ret < 0) {
    187                    gemu_log(" = -1 errno=" TARGET_ABI_FMT_ld " (%s)\n", -ret,
    188                             strerror(-ret));
    189                } else {
    190                    gemu_log(" = " TARGET_ABI_FMT_ld "\n", ret);
    191                }
    192            }
    193            break;
    194        }
    195    }
    196}
    197
    198/*
    199 * The public interface to this module.
    200 */
    201void print_freebsd_syscall(int num, abi_long arg1, abi_long arg2, abi_long arg3,
    202        abi_long arg4, abi_long arg5, abi_long arg6)
    203{
    204
    205    print_syscall(num, freebsd_scnames, ARRAY_SIZE(freebsd_scnames), arg1, arg2,
    206            arg3, arg4, arg5, arg6);
    207}
    208
    209void print_freebsd_syscall_ret(int num, abi_long ret)
    210{
    211
    212    print_syscall_ret(num, ret, freebsd_scnames, ARRAY_SIZE(freebsd_scnames));
    213}
    214
    215void print_netbsd_syscall(int num, abi_long arg1, abi_long arg2, abi_long arg3,
    216        abi_long arg4, abi_long arg5, abi_long arg6)
    217{
    218
    219    print_syscall(num, netbsd_scnames, ARRAY_SIZE(netbsd_scnames),
    220                  arg1, arg2, arg3, arg4, arg5, arg6);
    221}
    222
    223void print_netbsd_syscall_ret(int num, abi_long ret)
    224{
    225
    226    print_syscall_ret(num, ret, netbsd_scnames, ARRAY_SIZE(netbsd_scnames));
    227}
    228
    229void print_openbsd_syscall(int num, abi_long arg1, abi_long arg2, abi_long arg3,
    230        abi_long arg4, abi_long arg5, abi_long arg6)
    231{
    232
    233    print_syscall(num, openbsd_scnames, ARRAY_SIZE(openbsd_scnames), arg1, arg2,
    234            arg3, arg4, arg5, arg6);
    235}
    236
    237void print_openbsd_syscall_ret(int num, abi_long ret)
    238{
    239
    240    print_syscall_ret(num, ret, openbsd_scnames, ARRAY_SIZE(openbsd_scnames));
    241}