qed: Fix static checker warning
[linux/fpc-iii.git] / tools / perf / trace / beauty / fcntl.c
blob9e8900c13cb1380a38e016430e572191a534b831
1 /*
2 * trace/beauty/fcntl.c
4 * Copyright (C) 2017, Red Hat Inc, Arnaldo Carvalho de Melo <acme@redhat.com>
6 * Released under the GPL v2. (and only v2, not any later version)
7 */
9 #include "trace/beauty/beauty.h"
10 #include <linux/kernel.h>
11 #include <uapi/linux/fcntl.h>
13 static size_t fcntl__scnprintf_getfd(unsigned long val, char *bf, size_t size)
15 return scnprintf(bf, size, "%s", val ? "CLOEXEC" : "0");
18 static size_t syscall_arg__scnprintf_fcntl_getfd(char *bf, size_t size, struct syscall_arg *arg)
20 return fcntl__scnprintf_getfd(arg->val, bf, size);
23 static size_t fcntl__scnprintf_getlease(unsigned long val, char *bf, size_t size)
25 static const char *fcntl_setlease[] = { "RDLCK", "WRLCK", "UNLCK", };
26 static DEFINE_STRARRAY(fcntl_setlease);
28 return strarray__scnprintf(&strarray__fcntl_setlease, bf, size, "%x", val);
31 static size_t syscall_arg__scnprintf_fcntl_getlease(char *bf, size_t size, struct syscall_arg *arg)
33 return fcntl__scnprintf_getlease(arg->val, bf, size);
36 size_t syscall_arg__scnprintf_fcntl_cmd(char *bf, size_t size, struct syscall_arg *arg)
38 if (arg->val == F_GETFL) {
39 syscall_arg__set_ret_scnprintf(arg, syscall_arg__scnprintf_open_flags);
40 goto mask_arg;
42 if (arg->val == F_GETFD) {
43 syscall_arg__set_ret_scnprintf(arg, syscall_arg__scnprintf_fcntl_getfd);
44 goto mask_arg;
46 if (arg->val == F_DUPFD_CLOEXEC || arg->val == F_DUPFD) {
47 syscall_arg__set_ret_scnprintf(arg, syscall_arg__scnprintf_fd);
48 goto out;
50 if (arg->val == F_GETOWN) {
51 syscall_arg__set_ret_scnprintf(arg, syscall_arg__scnprintf_pid);
52 goto mask_arg;
54 if (arg->val == F_GETLEASE) {
55 syscall_arg__set_ret_scnprintf(arg, syscall_arg__scnprintf_fcntl_getlease);
56 goto mask_arg;
59 * Some commands ignore the third fcntl argument, "arg", so mask it
61 if (arg->val == F_GET_SEALS ||
62 arg->val == F_GETSIG) {
63 mask_arg:
64 arg->mask |= (1 << 2);
66 out:
67 return syscall_arg__scnprintf_strarrays(bf, size, arg);
70 size_t syscall_arg__scnprintf_fcntl_arg(char *bf, size_t size, struct syscall_arg *arg)
72 int cmd = syscall_arg__val(arg, 1);
74 if (cmd == F_DUPFD)
75 return syscall_arg__scnprintf_fd(bf, size, arg);
77 if (cmd == F_SETFD)
78 return fcntl__scnprintf_getfd(arg->val, bf, size);
80 if (cmd == F_SETFL)
81 return open__scnprintf_flags(arg->val, bf, size);
83 if (cmd == F_SETOWN)
84 return syscall_arg__scnprintf_pid(bf, size, arg);
86 if (cmd == F_SETLEASE)
87 return fcntl__scnprintf_getlease(arg->val, bf, size);
89 * We still don't grab the contents of pointers on entry or exit,
90 * so just print them as hex numbers
92 if (cmd == F_SETLK || cmd == F_SETLKW || cmd == F_GETLK ||
93 cmd == F_OFD_SETLK || cmd == F_OFD_SETLKW || cmd == F_OFD_GETLK ||
94 cmd == F_GETOWN_EX || cmd == F_SETOWN_EX ||
95 cmd == F_GET_RW_HINT || cmd == F_SET_RW_HINT ||
96 cmd == F_GET_FILE_RW_HINT || cmd == F_SET_FILE_RW_HINT)
97 return syscall_arg__scnprintf_hex(bf, size, arg);
99 return syscall_arg__scnprintf_long(bf, size, arg);