2 * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3 * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4 * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
5 * Copyright (c) 1996-1999 Wichert Akkerman <wichert@cistron.nl>
6 * Copyright (c) 1999 IBM Deutschland Entwicklung GmbH, IBM Corporation
7 * Linux for s390 port by D.J. Barrow
8 * <barrow_dj@mail.yahoo.com,djbarrow@de.ibm.com>
9 * Copyright (c) 2000 PocketPenguins Inc. Linux for Hitachi SuperH
10 * port by Greg Banks <gbanks@pocketpenguins.com>
13 * All rights reserved.
15 * Redistribution and use in source and binary forms, with or without
16 * modification, are permitted provided that the following conditions
18 * 1. Redistributions of source code must retain the above copyright
19 * notice, this list of conditions and the following disclaimer.
20 * 2. Redistributions in binary form must reproduce the above copyright
21 * notice, this list of conditions and the following disclaimer in the
22 * documentation and/or other materials provided with the distribution.
23 * 3. The name of the author may not be used to endorse or promote products
24 * derived from this software without specific prior written permission.
26 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
27 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
28 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
29 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
30 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
31 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
32 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
33 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
34 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
46 #include <sys/resource.h>
47 #include <sys/utsname.h>
49 #include <sys/syscall.h>
52 #include <machine/reg.h>
56 #include <sys/ptrace.h>
60 #if defined (SPARC) || defined (SPARC64)
61 # define fpq kernel_fpq
63 # define fpu kernel_fpu
64 #endif /* SPARC || SPARC64 */
66 #if defined (SPARC) || defined (SPARC64)
70 #endif /* SPARC || SPARC64 */
71 #endif /* HAVE_ASM_REG_H */
75 #ifndef PTRACE_PEEKUSR
76 # define PTRACE_PEEKUSR PTRACE_PEEKUSER
78 #ifndef PTRACE_POKEUSR
79 # define PTRACE_POKEUSR PTRACE_POKEUSER
83 #ifdef HAVE_LINUX_PTRACE_H
85 # ifdef HAVE_STRUCT_IA64_FPREG
86 # define ia64_fpreg XXX_ia64_fpreg
88 # ifdef HAVE_STRUCT_PT_ALL_USER_REGS
89 # define pt_all_user_regs XXX_pt_all_user_regs
91 #include <linux/ptrace.h>
93 # undef pt_all_user_regs
96 #if defined (LINUX) && defined (SPARC64)
98 # undef PTRACE_GETREGS
99 # define PTRACE_GETREGS PTRACE_GETREGS64
100 # undef PTRACE_SETREGS
101 # define PTRACE_SETREGS PTRACE_SETREGS64
102 #endif /* LINUX && SPARC64 */
104 #ifdef HAVE_LINUX_FUTEX_H
105 #include <linux/futex.h>
109 # define FUTEX_WAIT 0
112 # define FUTEX_WAKE 1
117 # ifndef FUTEX_REQUEUE
118 # define FUTEX_REQUEUE 3
124 #include <asm/posix_types.h>
126 #define GETGROUPS_T __kernel_gid_t
128 #define GETGROUPS32_T __kernel_gid32_t
131 #if defined(LINUX) && defined(IA64)
132 # include <asm/ptrace_offsets.h>
133 # include <asm/rse.h>
137 #include <sys/prctl.h>
141 #define WCOREDUMP(status) ((status) & 0200)
144 /* WTA: this was `&& !defined(LINUXSPARC)', this seems unneeded though? */
145 #if defined(HAVE_PRCTL)
146 static const struct xlat prctl_options[] = {
148 { PR_MAXPROCS, "PR_MAXPROCS" },
151 { PR_ISBLOCKED, "PR_ISBLOCKED" },
153 #ifdef PR_SETSTACKSIZE
154 { PR_SETSTACKSIZE, "PR_SETSTACKSIZE" },
156 #ifdef PR_GETSTACKSIZE
157 { PR_GETSTACKSIZE, "PR_GETSTACKSIZE" },
160 { PR_MAXPPROCS, "PR_MAXPPROCS" },
162 #ifdef PR_UNBLKONEXEC
163 { PR_UNBLKONEXEC, "PR_UNBLKONEXEC" },
166 { PR_ATOMICSIM, "PR_ATOMICSIM" },
169 { PR_SETEXITSIG, "PR_SETEXITSIG" },
172 { PR_RESIDENT, "PR_RESIDENT" },
175 { PR_ATTACHADDR, "PR_ATTACHADDR" },
178 { PR_DETACHADDR, "PR_DETACHADDR" },
181 { PR_TERMCHILD, "PR_TERMCHILD" },
184 { PR_GETSHMASK, "PR_GETSHMASK" },
187 { PR_GETNSHARE, "PR_GETNSHARE" },
189 #if defined(PR_SET_PDEATHSIG)
190 { PR_SET_PDEATHSIG, "PR_SET_PDEATHSIG" },
193 { PR_COREPID, "PR_COREPID" },
195 #ifdef PR_ATTACHADDRPERM
196 { PR_ATTACHADDRPERM, "PR_ATTACHADDRPERM" },
198 #ifdef PR_PTHREADEXIT
199 { PR_PTHREADEXIT, "PR_PTHREADEXIT" },
201 #ifdef PR_SET_PDEATHSIG
202 { PR_SET_PDEATHSIG, "PR_SET_PDEATHSIG" },
204 #ifdef PR_GET_PDEATHSIG
205 { PR_GET_PDEATHSIG, "PR_GET_PDEATHSIG" },
207 #ifdef PR_GET_UNALIGN
208 { PR_GET_UNALIGN, "PR_GET_UNALIGN" },
210 #ifdef PR_SET_UNALIGN
211 { PR_SET_UNALIGN, "PR_SET_UNALIGN" },
213 #ifdef PR_GET_KEEPCAPS
214 { PR_GET_KEEPCAPS, "PR_GET_KEEP_CAPS" },
216 #ifdef PR_SET_KEEPCAPS
217 { PR_SET_KEEPCAPS, "PR_SET_KEEP_CAPS" },
224 unalignctl_string (unsigned int ctl)
229 #ifdef PR_UNALIGN_NOPRINT
230 case PR_UNALIGN_NOPRINT:
233 #ifdef PR_UNALIGN_SIGBUS
234 case PR_UNALIGN_SIGBUS:
240 sprintf(buf, "%x", ctl);
252 printxval(prctl_options, tcp->u_arg[0], "PR_???");
253 switch (tcp->u_arg[0]) {
258 #ifdef PR_SET_DEATHSIG
259 case PR_GET_PDEATHSIG:
262 #ifdef PR_SET_UNALIGN
264 tprintf(", %s", unalignctl_string(tcp->u_arg[1]));
267 #ifdef PR_GET_UNALIGN
269 tprintf(", %#lx", tcp->u_arg[1]);
273 for (i = 1; i < tcp->u_nargs; i++)
274 tprintf(", %#lx", tcp->u_arg[i]);
278 switch (tcp->u_arg[0]) {
279 #ifdef PR_GET_PDEATHSIG
280 case PR_GET_PDEATHSIG:
281 for (i=1; i<tcp->u_nargs; i++)
282 tprintf(", %#lx", tcp->u_arg[i]);
285 #ifdef PR_SET_UNALIGN
289 #ifdef PR_GET_UNALIGN
294 umove(tcp, tcp->u_arg[1], &ctl);
295 tcp->auxstr = unalignctl_string(ctl);
306 #endif /* HAVE_PRCTL */
322 printpathn(tcp, tcp->u_arg[0], tcp->u_arg[1]);
323 tprintf(", %lu", tcp->u_arg[1]);
334 tprintf("%#lx", tcp->u_arg[0]);
336 printpath(tcp, tcp->u_arg[0]);
337 tprintf(", %lu", tcp->u_arg[1]);
343 sys_setdomainname(tcp)
347 printpathn(tcp, tcp->u_arg[0], tcp->u_arg[1]);
348 tprintf(", %lu", tcp->u_arg[1]);
356 sys_getdomainname(tcp)
361 tprintf("%#lx", tcp->u_arg[0]);
363 printpath(tcp, tcp->u_arg[0]);
364 tprintf(", %lu", tcp->u_arg[1]);
375 fprintf(stderr, "_exit returned!\n");
378 /* special case: we stop tracing this process, finish line now */
379 tprintf("%ld) ", tcp->u_arg[0]);
391 tcp->flags |= TCB_EXITING;
392 #ifdef __NR_exit_group
395 if (tcp->scno == 252)
396 tcp->flags |= TCB_GROUP_EXITING;
399 if (tcp->scno == __NR_exit_group)
400 tcp->flags |= TCB_GROUP_EXITING;
406 /* TCP is creating a child we want to follow.
407 If there will be space in tcbtab for it, set TCB_FOLLOWFORK and return 0.
408 If not, clear TCB_FOLLOWFORK, print an error, and return 1. */
410 fork_tcb(struct tcb *tcp)
412 if (nprocs == tcbtabsize) {
413 if (expand_tcbtab()) {
414 tcp->flags &= ~TCB_FOLLOWFORK;
415 fprintf(stderr, "sys_fork: tcb table full\n");
419 tcp->flags |= TCB_FOLLOWFORK;
431 tcp->auxstr = "child process";
432 return RVAL_UDECIMAL | RVAL_STR;
445 tprintf ("%ld", tcp->u_arg[0]);
449 tcp->auxstr = "child process";
450 return RVAL_UDECIMAL | RVAL_STR;
462 struct tcb *tcpchild;
466 if (tcp->scno == SYS_rfork && !(tcp->u_arg[0]&RFPROC))
477 if ((tcpchild = alloctcb(tcp->u_rval)) == NULL) {
478 fprintf(stderr, "sys_fork: tcb table full\n");
481 if (proc_open(tcpchild, 2) < 0)
487 #else /* !USE_PROCFS */
491 /* defines copied from linux/sched.h since we can't include that
492 * ourselves (it conflicts with *lots* of libc includes)
494 #define CSIGNAL 0x000000ff /* signal mask to be sent at exit */
495 #define CLONE_VM 0x00000100 /* set if VM shared between processes */
496 #define CLONE_FS 0x00000200 /* set if fs info shared between processes */
497 #define CLONE_FILES 0x00000400 /* set if open files shared between processes */
498 #define CLONE_SIGHAND 0x00000800 /* set if signal handlers shared */
499 #define CLONE_IDLETASK 0x00001000 /* kernel-only flag */
500 #define CLONE_PTRACE 0x00002000 /* set if we want to let tracing continue on the child too */
501 #define CLONE_VFORK 0x00004000 /* set if the parent wants the child to wake it up on mm_release */
502 #define CLONE_PARENT 0x00008000 /* set if we want to have the same parent as the cloner */
503 #define CLONE_THREAD 0x00010000 /* Same thread group? */
504 #define CLONE_NEWNS 0x00020000 /* New namespace group? */
505 #define CLONE_SYSVSEM 0x00040000 /* share system V SEM_UNDO semantics */
506 #define CLONE_SETTLS 0x00080000 /* create a new TLS for the child */
507 #define CLONE_PARENT_SETTID 0x00100000 /* set the TID in the parent */
508 #define CLONE_CHILD_CLEARTID 0x00200000 /* clear the TID in the child */
509 #define CLONE_DETACHED 0x00400000 /* parent wants no child-exit signal */
510 #define CLONE_UNTRACED 0x00800000 /* set if the tracing process can't force CLONE_PTRACE on this clone */
511 #define CLONE_CHILD_SETTID 0x01000000 /* set the TID in the child */
513 static const struct xlat clone_flags[] = {
514 { CLONE_VM, "CLONE_VM" },
515 { CLONE_FS, "CLONE_FS" },
516 { CLONE_FILES, "CLONE_FILES" },
517 { CLONE_SIGHAND, "CLONE_SIGHAND" },
518 { CLONE_IDLETASK, "CLONE_IDLETASK"},
519 { CLONE_PTRACE, "CLONE_PTRACE" },
520 { CLONE_VFORK, "CLONE_VFORK" },
521 { CLONE_PARENT, "CLONE_PARENT" },
522 { CLONE_THREAD, "CLONE_THREAD" },
523 { CLONE_NEWNS, "CLONE_NEWNS" },
524 { CLONE_SYSVSEM, "CLONE_SYSVSEM" },
525 { CLONE_SETTLS, "CLONE_SETTLS" },
526 { CLONE_PARENT_SETTID,"CLONE_PARENT_SETTID" },
527 { CLONE_CHILD_CLEARTID,"CLONE_CHILD_CLEARTID" },
528 { CLONE_DETACHED, "CLONE_DETACHED" },
529 { CLONE_UNTRACED, "CLONE_UNTRACED" },
530 { CLONE_CHILD_SETTID,"CLONE_CHILD_SETTID" },
535 # include <asm/ldt.h>
536 # ifdef HAVE_STRUCT_USER_DESC
537 # define modify_ldt_ldt_s user_desc
539 extern void print_ldt_entry();
545 # define ARG_STACKSIZE (tcp->scno == SYS_clone2 ? 2 : -1)
546 # define ARG_PTID (tcp->scno == SYS_clone2 ? 3 : 2)
547 # define ARG_CTID (tcp->scno == SYS_clone2 ? 4 : 3)
548 # define ARG_TLS (tcp->scno == SYS_clone2 ? 5 : 4)
549 # elif defined S390 || defined S390X
555 # elif defined X86_64 || defined ALPHA
574 unsigned long flags = tcp->u_arg[ARG_FLAGS];
575 tprintf("child_stack=%#lx, ", tcp->u_arg[ARG_STACK]);
576 # ifdef ARG_STACKSIZE
577 if (ARG_STACKSIZE != -1)
578 tprintf("stack_size=%#lx, ",
579 tcp->u_arg[ARG_STACKSIZE]);
582 if (printflags(clone_flags, flags &~ CSIGNAL) == 0)
584 if ((flags & CSIGNAL) != 0)
585 tprintf("|%s", signame(flags & CSIGNAL));
586 if ((flags & (CLONE_PARENT_SETTID|CLONE_CHILD_SETTID
587 |CLONE_CHILD_CLEARTID|CLONE_SETTLS)) == 0)
589 if (flags & CLONE_PARENT_SETTID)
590 tprintf(", parent_tidptr=%#lx", tcp->u_arg[ARG_PTID]);
591 if (flags & CLONE_SETTLS) {
593 struct modify_ldt_ldt_s copy;
594 if (umove(tcp, tcp->u_arg[ARG_TLS], ©) != -1) {
595 tprintf(", {entry_number:%d, ",
600 print_ldt_entry(©);
604 tprintf(", tls=%#lx", tcp->u_arg[ARG_TLS]);
606 if (flags & (CLONE_CHILD_SETTID|CLONE_CHILD_CLEARTID))
607 tprintf(", child_tidptr=%#lx", tcp->u_arg[ARG_CTID]);
618 return RVAL_UDECIMAL;
623 change_syscall(tcp, new)
629 /* Attempt to make vfork into fork, which we can follow. */
630 if (ptrace(PTRACE_POKEUSER, tcp->pid, (char*)(ORIG_EAX * 4), new) < 0)
633 #elif defined(X86_64)
634 /* Attempt to make vfork into fork, which we can follow. */
635 if (ptrace(PTRACE_POKEUSER, tcp->pid, (char*)(ORIG_RAX * 8), new) < 0)
638 #elif defined(POWERPC)
639 if (ptrace(PTRACE_POKEUSER, tcp->pid,
640 (char*)(sizeof(unsigned long)*PT_R0), new) < 0)
643 #elif defined(S390) || defined(S390X)
644 /* s390 linux after 2.4.7 has a hook in entry.S to allow this */
645 if (ptrace(PTRACE_POKEUSER, tcp->pid, (char*)(PT_GPR2), new)<0)
649 if (ptrace(PTRACE_POKEUSER, tcp->pid, (char*)(4*PT_ORIG_D0), new)<0)
652 #elif defined(SPARC) || defined(SPARC64)
654 if (ptrace(PTRACE_GETREGS, tcp->pid, (char*)®s, 0)<0)
657 if (ptrace(PTRACE_SETREGS, tcp->pid, (char*)®s, 0)<0)
661 if (ptrace(PTRACE_POKEUSER, tcp->pid, (char*)(REG_V0), new)<0)
665 if (ptrace(PTRACE_POKEUSER, tcp->pid, (char*)(REG_A3), new)<0)
671 case 2: break; /* x86 SYS_fork */
672 case SYS_clone: new = 120; break;
674 fprintf(stderr, "%s: unexpected syscall %d\n",
678 if (ptrace(PTRACE_POKEUSER, tcp->pid, (char*)(PT_R1), new)<0)
680 } else if (ptrace(PTRACE_POKEUSER, tcp->pid, (char*)(PT_R15), new)<0)
684 if (ptrace(PTRACE_POKEUSER, tcp->pid, (char*)(PT_GR20), new)<0)
688 if (ptrace(PTRACE_POKEUSER, tcp->pid, (char*)(4*(REG_REG0+3)), new)<0)
692 /* Top half of reg encodes the no. of args n as 0x1n.
693 Assume 0 args as kernel never actually checks... */
694 if (ptrace(PTRACE_POKEUSER, tcp->pid, (char*)(REG_SYSCALL),
699 #warning Do not know how to handle change_syscall for this architecture
700 #endif /* architecture */
712 unsigned long *bsp, *ap;
714 if (upeek(tcp->pid, PT_AR_BSP, (long *) &bsp) , 0)
717 ap = ia64_rse_skip_regs(bsp, argnum);
719 ptrace(PTRACE_POKEDATA, tcp->pid, (char *) ap, tcp->u_arg[argnum]);
726 ptrace(PTRACE_POKEUSER, tcp->pid, (char*)(4*argnum), tcp->u_arg[argnum]);
730 #elif defined(X86_64)
732 ptrace(PTRACE_POKEUSER, tcp->pid, (char*)(8*(long)argnum), tcp->u_arg[argnum]);
736 #elif defined(POWERPC)
738 #define PT_ORIG_R3 34
741 ptrace(PTRACE_POKEUSER, tcp->pid,
742 (char*)((argnum==0 ? PT_ORIG_R3 : argnum+PT_R3)*sizeof(unsigned long)),
751 ptrace(PTRACE_POKEUSER, tcp->pid,
752 (char*)(REG_A0 + argnum), tcp->u_arg[argnum]);
756 if (upeek(tcp->pid, REG_SP, (long *) &sp) , 0)
759 ptrace(PTRACE_POKEDATA, tcp->pid,
760 (char*)(sp + argnum - 4), tcp->u_arg[argnum]);
765 #elif defined(S390) || defined(S390X)
768 ptrace(PTRACE_POKEUSER, tcp->pid,
769 (char *) (argnum==0 ? PT_ORIGGPR2 :
770 PT_GPR2 + argnum*sizeof(long)),
778 # warning Sorry, setargs not implemented for this architecture.
783 #if defined SYS_clone || defined SYS_clone2
788 struct tcb *tcpchild;
798 int bpt = tcp->flags & TCB_BPTSET;
800 if (!(tcp->flags & TCB_FOLLOWFORK))
811 #ifdef CLONE_PTRACE /* See new setbpt code. */
812 tcpchild = pid2tcb(pid);
813 if (tcpchild != NULL) {
814 /* The child already reported its startup trap
815 before the parent reported its syscall return. */
817 & (TCB_STARTUP|TCB_ATTACHED|TCB_SUSPENDED))
818 != (TCB_STARTUP|TCB_ATTACHED|TCB_SUSPENDED))
820 [preattached child %d of %d in weird state!]\n",
825 if ((tcpchild = alloctcb(pid)) == NULL) {
828 fprintf(stderr, " [tcb table full]\n");
829 kill(pid, SIGKILL); /* XXX */
834 /* Attach to the new child */
835 if (ptrace(PTRACE_ATTACH, pid, (char *) 1, 0) < 0) {
838 perror("PTRACE_ATTACH");
839 fprintf(stderr, "Too late?\n");
848 tcpchild->flags |= TCB_ATTACHED;
849 /* Child has BPT too, must be removed on first occasion. */
851 tcpchild->flags |= TCB_BPTSET;
852 tcpchild->baddr = tcp->baddr;
853 memcpy(tcpchild->inst, tcp->inst,
854 sizeof tcpchild->inst);
856 tcpchild->parent = tcp;
858 if (tcpchild->flags & TCB_SUSPENDED) {
859 /* The child was born suspended, due to our having
860 forced CLONE_PTRACE. */
864 tcpchild->flags &= ~(TCB_SUSPENDED|TCB_STARTUP);
865 if (ptrace(PTRACE_SYSCALL, pid, (char *) 1, 0) < 0) {
866 perror("resume: ptrace(PTRACE_SYSCALL, ...)");
872 Process %u resumed (parent %d ready)\n",
878 fprintf(stderr, "Process %d attached\n", pid);
881 #ifdef TCB_CLONE_THREAD
884 * Save the flags used in this call,
885 * in case we point TCP to our parent below.
887 int call_flags = tcp->u_arg[ARG_FLAGS];
888 if ((tcp->flags & TCB_CLONE_THREAD) &&
889 tcp->parent != NULL) {
890 /* The parent in this clone is itself a
891 thread belonging to another process.
892 There is no meaning to the parentage
893 relationship of the new child with the
894 thread, only with the process. We
895 associate the new thread with our
896 parent. Since this is done for every
897 new thread, there will never be a
898 TCB_CLONE_THREAD process that has
902 tcpchild->parent = tcp;
905 if (call_flags & CLONE_THREAD) {
906 tcpchild->flags |= TCB_CLONE_THREAD;
907 ++tcp->nclone_threads;
909 if (call_flags & CLONE_DETACHED) {
910 tcpchild->flags |= TCB_CLONE_DETACHED;
911 ++tcp->nclone_detached;
926 /* We do special magic with clone for any clone or fork. */
927 return internal_clone(tcp);
930 struct tcb *tcpchild;
935 if (tcp->scno == SYS_vfork) {
936 /* Attempt to make vfork into fork, which we can follow. */
938 change_syscall(tcp, SYS_fork) < 0)
943 if (!followfork || dont_follow)
951 int bpt = tcp->flags & TCB_BPTSET;
953 if (!(tcp->flags & TCB_FOLLOWFORK))
962 if ((tcpchild = alloctcb(pid)) == NULL) {
963 fprintf(stderr, " [tcb table full]\n");
964 kill(pid, SIGKILL); /* XXX */
969 /* The child must have run before it can be attached. */
970 /* This must be a bug in the parisc kernel, but I havn't
971 * identified it yet. Seems to be an issue associated
972 * with attaching to a process (which sends it a signal)
973 * before that process has ever been scheduled. When
974 * debugging, I started seeing crashes in
975 * arch/parisc/kernel/signal.c:do_signal(), apparently
976 * caused by r8 getting corrupt over the dequeue_signal()
977 * call. Didn't make much sense though...
983 select(0, NULL, NULL, NULL, &tv);
986 if (ptrace(PTRACE_ATTACH, pid, (char *) 1, 0) < 0) {
987 perror("PTRACE_ATTACH");
988 fprintf(stderr, "Too late?\n");
995 /* The child must have run before it can be attached. */
1000 select(0, NULL, NULL, NULL, &tv);
1002 if (ptrace(PTRACE_ATTACH, pid, (char *)1, 0) < 0) {
1003 perror("PTRACE_ATTACH");
1004 fprintf(stderr, "Too late?\n");
1009 /* Try to catch the new process as soon as possible. */
1012 for (i = 0; i < 1024; i++)
1013 if (ptrace(PTRACE_ATTACH, pid, (char *) 1, 0) >= 0)
1016 perror("PTRACE_ATTACH");
1017 fprintf(stderr, "Too late?\n");
1022 #endif /* !oldway */
1024 tcpchild->flags |= TCB_ATTACHED;
1025 /* Child has BPT too, must be removed on first occasion */
1027 tcpchild->flags |= TCB_BPTSET;
1028 tcpchild->baddr = tcp->baddr;
1029 memcpy(tcpchild->inst, tcp->inst,
1030 sizeof tcpchild->inst);
1033 tcpchild->parent = tcp;
1036 fprintf(stderr, "Process %d attached\n", pid);
1042 #endif /* !USE_PROCFS */
1044 #if defined(SUNOS4) || defined(LINUX) || defined(FREEBSD)
1051 return RVAL_UDECIMAL;
1055 #endif /* SUNOS4 || LINUX || FREEBSD */
1059 static char idstr[16];
1066 sprintf(idstr, "ppid %lu", getrval2(tcp));
1067 tcp->auxstr = idstr;
1078 sprintf(idstr, "euid %lu", getrval2(tcp));
1079 tcp->auxstr = idstr;
1090 sprintf(idstr, "egid %lu", getrval2(tcp));
1091 tcp->auxstr = idstr;
1105 if (entering(tcp)) {
1106 tprintf("%u", (uid_t) tcp->u_arg[0]);
1115 if (entering(tcp)) {
1116 tprintf("%u", (gid_t) tcp->u_arg[0]);
1128 tprintf("%#lx, %#lx, %#lx", tcp->u_arg[0],
1129 tcp->u_arg[1], tcp->u_arg[2]);
1131 if (umove(tcp, tcp->u_arg[0], &uid) < 0)
1132 tprintf("%#lx, ", tcp->u_arg[0]);
1134 tprintf("[%lu], ", (unsigned long) uid);
1135 if (umove(tcp, tcp->u_arg[1], &uid) < 0)
1136 tprintf("%#lx, ", tcp->u_arg[1]);
1138 tprintf("[%lu], ", (unsigned long) uid);
1139 if (umove(tcp, tcp->u_arg[2], &uid) < 0)
1140 tprintf("%#lx", tcp->u_arg[2]);
1142 tprintf("[%lu]", (unsigned long) uid);
1155 tprintf("%#lx, %#lx, %#lx", tcp->u_arg[0],
1156 tcp->u_arg[1], tcp->u_arg[2]);
1158 if (umove(tcp, tcp->u_arg[0], &gid) < 0)
1159 tprintf("%#lx, ", tcp->u_arg[0]);
1161 tprintf("[%lu], ", (unsigned long) gid);
1162 if (umove(tcp, tcp->u_arg[1], &gid) < 0)
1163 tprintf("%#lx, ", tcp->u_arg[1]);
1165 tprintf("[%lu], ", (unsigned long) gid);
1166 if (umove(tcp, tcp->u_arg[2], &gid) < 0)
1167 tprintf("%#lx", tcp->u_arg[2]);
1169 tprintf("[%lu]", (unsigned long) gid);
1181 if (entering(tcp)) {
1182 printuid("", tcp->u_arg[0]);
1183 printuid(", ", tcp->u_arg[1]);
1192 if (entering(tcp)) {
1193 printuid("", tcp->u_arg[0]);
1194 printuid(", ", tcp->u_arg[1]);
1199 #if defined(LINUX) || defined(FREEBSD)
1204 if (entering(tcp)) {
1205 printuid("", tcp->u_arg[0]);
1206 printuid(", ", tcp->u_arg[1]);
1207 printuid(", ", tcp->u_arg[2]);
1215 if (entering(tcp)) {
1216 printuid("", tcp->u_arg[0]);
1217 printuid(", ", tcp->u_arg[1]);
1218 printuid(", ", tcp->u_arg[2]);
1223 #endif /* LINUX || FREEBSD */
1230 GETGROUPS_T *gidset;
1232 if (entering(tcp)) {
1233 len = tcp->u_arg[0];
1234 tprintf("%u, ", len);
1239 gidset = (GETGROUPS_T *) malloc(len * sizeof(GETGROUPS_T));
1240 if (gidset == NULL) {
1241 fprintf(stderr, "sys_setgroups: out of memory\n");
1245 tprintf("%#lx", tcp->u_arg[1]);
1246 else if (umoven(tcp, tcp->u_arg[1],
1247 len * sizeof(GETGROUPS_T), (char *) gidset) < 0)
1251 for (i = 0; i < len; i++)
1252 tprintf("%s%lu", i ? ", " : "",
1253 (unsigned long) gidset[i]);
1256 free((char *) gidset);
1266 GETGROUPS_T *gidset;
1268 if (entering(tcp)) {
1269 len = tcp->u_arg[0];
1270 tprintf("%u, ", len);
1277 gidset = (GETGROUPS_T *) malloc(len * sizeof(GETGROUPS_T));
1278 if (gidset == NULL) {
1279 fprintf(stderr, "sys_getgroups: out of memory\n");
1284 else if (!verbose(tcp) || tcp->u_arg[0] == 0)
1285 tprintf("%#lx", tcp->u_arg[1]);
1286 else if (umoven(tcp, tcp->u_arg[1],
1287 len * sizeof(GETGROUPS_T), (char *) gidset) < 0)
1291 for (i = 0; i < len; i++)
1292 tprintf("%s%lu", i ? ", " : "",
1293 (unsigned long) gidset[i]);
1296 free((char *)gidset);
1303 sys_setgroups32(tcp)
1307 GETGROUPS32_T *gidset;
1309 if (entering(tcp)) {
1310 len = tcp->u_arg[0];
1311 tprintf("%u, ", len);
1316 gidset = (GETGROUPS32_T *) malloc(len * sizeof(GETGROUPS32_T));
1317 if (gidset == NULL) {
1318 fprintf(stderr, "sys_setgroups32: out of memory\n");
1322 tprintf("%#lx", tcp->u_arg[1]);
1323 else if (umoven(tcp, tcp->u_arg[1],
1324 len * sizeof(GETGROUPS32_T), (char *) gidset) < 0)
1328 for (i = 0; i < len; i++)
1329 tprintf("%s%lu", i ? ", " : "",
1330 (unsigned long) gidset[i]);
1333 free((char *) gidset);
1339 sys_getgroups32(tcp)
1343 GETGROUPS32_T *gidset;
1345 if (entering(tcp)) {
1346 len = tcp->u_arg[0];
1347 tprintf("%u, ", len);
1354 gidset = (GETGROUPS32_T *) malloc(len * sizeof(GETGROUPS32_T));
1355 if (gidset == NULL) {
1356 fprintf(stderr, "sys_getgroups32: out of memory\n");
1361 else if (!verbose(tcp) || tcp->u_arg[0] == 0)
1362 tprintf("%#lx", tcp->u_arg[1]);
1363 else if (umoven(tcp, tcp->u_arg[1],
1364 len * sizeof(GETGROUPS32_T), (char *) gidset) < 0)
1368 for (i = 0; i < len; i++)
1369 tprintf("%s%lu", i ? ", " : "",
1370 (unsigned long) gidset[i]);
1373 free((char *)gidset);
1383 if (entering(tcp)) {
1385 tprintf("%lu, %lu", tcp->u_arg[0], tcp->u_arg[1]);
1395 if (entering(tcp)) {
1397 tprintf("%lu", tcp->u_arg[0]);
1407 if (entering(tcp)) {
1408 tprintf("%lu", tcp->u_arg[0]);
1424 if (entering(tcp)) {
1425 tprintf("%lu", tcp->u_arg[0]);
1434 if (entering(tcp)) {
1435 tprintf("%lu, %lu", tcp->u_arg[0], tcp->u_arg[1]);
1442 #include <sys/privilege.h>
1445 static const struct xlat procpriv_cmds [] = {
1446 { SETPRV, "SETPRV" },
1447 { CLRPRV, "CLRPRV" },
1448 { PUTPRV, "PUTPRV" },
1449 { GETPRV, "GETPRV" },
1450 { CNTPRV, "CNTPRV" },
1455 static const struct xlat procpriv_priv [] = {
1456 { P_OWNER, "P_OWNER" },
1457 { P_AUDIT, "P_AUDIT" },
1458 { P_COMPAT, "P_COMPAT" },
1459 { P_DACREAD, "P_DACREAD" },
1460 { P_DACWRITE, "P_DACWRITE" },
1462 { P_FILESYS, "P_FILESYS" },
1463 { P_MACREAD, "P_MACREAD" },
1464 { P_MACWRITE, "P_MACWRITE" },
1465 { P_MOUNT, "P_MOUNT" },
1466 { P_MULTIDIR, "P_MULTIDIR" },
1467 { P_SETPLEVEL, "P_SETPLEVEL" },
1468 { P_SETSPRIV, "P_SETSPRIV" },
1469 { P_SETUID, "P_SETUID" },
1470 { P_SYSOPS, "P_SYSOPS" },
1471 { P_SETUPRIV, "P_SETUPRIV" },
1472 { P_DRIVER, "P_DRIVER" },
1473 { P_RTIME, "P_RTIME" },
1474 { P_MACUPGRADE, "P_MACUPGRADE" },
1475 { P_FSYSRANGE, "P_FSYSRANGE" },
1476 { P_SETFLEVEL, "P_SETFLEVEL" },
1477 { P_AUDITWR, "P_AUDITWR" },
1478 { P_TSHAR, "P_TSHAR" },
1479 { P_PLOCK, "P_PLOCK" },
1480 { P_CORE, "P_CORE" },
1481 { P_LOADMOD, "P_LOADMOD" },
1482 { P_BIND, "P_BIND" },
1483 { P_ALLPRIVS, "P_ALLPRIVS" },
1488 static const struct xlat procpriv_type [] = {
1489 { PS_FIX, "PS_FIX" },
1490 { PS_INH, "PS_INH" },
1491 { PS_MAX, "PS_MAX" },
1492 { PS_WKG, "PS_WKG" },
1498 printpriv(tcp, addr, len, opt)
1502 const struct xlat *opt;
1505 int max = verbose (tcp) ? sizeof buf / sizeof buf [0] : 10;
1506 int dots = len > max;
1509 if (len > max) len = max;
1512 umoven (tcp, addr, len * sizeof buf[0], (char *) buf) < 0)
1514 tprintf ("%#lx", addr);
1520 for (i = 0; i < len; ++i) {
1523 if (i) tprintf (", ");
1525 if ((t = xlookup (procpriv_type, buf [i] & PS_TYPE)) &&
1526 (p = xlookup (procpriv_priv, buf [i] & ~PS_TYPE)))
1528 tprintf ("%s|%s", t, p);
1531 tprintf ("%#lx", buf [i]);
1535 if (dots) tprintf (" ...");
1545 if (entering(tcp)) {
1546 printxval(procpriv_cmds, tcp->u_arg[0], "???PRV");
1547 switch (tcp->u_arg[0]) {
1549 tprintf(", %#lx, %ld", tcp->u_arg[1], tcp->u_arg[2]);
1557 printpriv (tcp, tcp->u_arg[1], tcp->u_arg[2]);
1558 tprintf (", %ld", tcp->u_arg[2]);
1561 else if (tcp->u_arg[0] == GETPRV) {
1562 if (syserror (tcp)) {
1563 tprintf(", %#lx, %ld", tcp->u_arg[1], tcp->u_arg[2]);
1567 printpriv (tcp, tcp->u_arg[1], tcp->u_rval);
1568 tprintf (", %ld", tcp->u_arg[2]);
1579 fake_execve(tcp, program, argv, envp)
1588 if (!(qual_flags[SYS_execve - __NR_SYSCALL_BASE] & QUAL_TRACE))
1591 if (!(qual_flags[SYS_execve] & QUAL_TRACE))
1596 string_quote(program);
1598 for (i = 0; argv[i] != NULL; i++) {
1601 string_quote(argv[i]);
1603 for (i = 0; envp[i] != NULL; i++)
1605 tprintf("], [/* %d var%s */]) ", i, (i != 1) ? "s" : "");
1612 printargv(tcp, addr)
1618 int max = max_strlen / 2;
1620 for (sep = ""; --max >= 0; sep = ", ") {
1623 if (umove(tcp, addr, &cp) < 0) {
1624 tprintf("%#lx", addr);
1630 printstr(tcp, (long) cp, -1);
1631 addr += sizeof(char *);
1638 printargc(fmt, tcp, addr)
1646 for (count = 0; umove(tcp, addr, &cp) >= 0 && cp != NULL; count++) {
1647 addr += sizeof(char *);
1649 tprintf(fmt, count, count == 1 ? "" : "s");
1656 if (entering(tcp)) {
1657 printpath(tcp, tcp->u_arg[0]);
1659 tprintf(", %#lx", tcp->u_arg[1]);
1661 else if (abbrev(tcp))
1662 printargc(", [/* %d arg%s */]", tcp, tcp->u_arg[1]);
1666 printargv(tcp, tcp->u_arg[1]);
1677 if (entering(tcp)) {
1678 printpath(tcp, tcp->u_arg[0]);
1680 tprintf(", %#lx", tcp->u_arg[1]);
1682 else if (abbrev(tcp))
1683 printargc(", [/* %d arg%s */]", tcp, tcp->u_arg[1]);
1687 printargv(tcp, tcp->u_arg[1]);
1691 tprintf(", %#lx", tcp->u_arg[2]);
1692 else if (abbrev(tcp))
1693 printargc(", [/* %d var%s */]", tcp, tcp->u_arg[2]);
1696 printargv(tcp, tcp->u_arg[2]);
1705 int sys_rexecve(tcp)
1708 if (entering (tcp)) {
1710 tprintf (", %ld", tcp->u_arg[3]);
1722 if (exiting(tcp) && !syserror(tcp) && followfork)
1725 #if defined LINUX && defined TCB_WAITEXECVE
1726 if (exiting(tcp) && syserror(tcp))
1727 tcp->flags &= ~TCB_WAITEXECVE;
1729 tcp->flags |= TCB_WAITEXECVE;
1730 #endif /* LINUX && TCB_WAITEXECVE */
1736 #define __WNOTHREAD 0x20000000
1739 #define __WALL 0x40000000
1742 #define __WCLONE 0x80000000
1746 static const struct xlat wait4_options[] = {
1747 { WNOHANG, "WNOHANG" },
1749 { WUNTRACED, "WUNTRACED" },
1752 { WEXITED, "WEXITED" },
1755 { WTRAPPED, "WTRAPPED" },
1758 { WSTOPPED, "WSTOPPED" },
1761 { WCONTINUED, "WCONTINUED" },
1764 { WNOWAIT, "WNOWAIT" },
1767 { __WCLONE, "__WCLONE" },
1770 { __WALL, "__WALL" },
1773 { __WNOTHREAD, "__WNOTHREAD" },
1778 #if !defined WCOREFLAG && defined WCOREFLG
1779 # define WCOREFLAG WCOREFLG
1782 #define WCOREFLAG 0x80
1786 #define W_STOPCODE(sig) ((sig) << 8 | 0x7f)
1789 #define W_EXITCODE(ret, sig) ((ret) << 8 | (sig))
1799 * Here is a tricky presentation problem. This solution
1800 * is still not entirely satisfactory but since there
1801 * are no wait status constructors it will have to do.
1803 if (WIFSTOPPED(status)) {
1804 tprintf("[{WIFSTOPPED(s) && WSTOPSIG(s) == %s}",
1805 signame(WSTOPSIG(status)));
1806 status &= ~W_STOPCODE(WSTOPSIG(status));
1808 else if (WIFSIGNALED(status)) {
1809 tprintf("[{WIFSIGNALED(s) && WTERMSIG(s) == %s%s}",
1810 signame(WTERMSIG(status)),
1811 WCOREDUMP(status) ? " && WCOREDUMP(s)" : "");
1812 status &= ~(W_EXITCODE(0, WTERMSIG(status)) | WCOREFLAG);
1814 else if (WIFEXITED(status)) {
1815 tprintf("[{WIFEXITED(s) && WEXITSTATUS(s) == %d}",
1816 WEXITSTATUS(status));
1818 status &= ~W_EXITCODE(WEXITSTATUS(status), 0);
1821 tprintf("[%#x]", status);
1828 tprintf(" | %#x]", status);
1834 printwaitn(tcp, n, bitness)
1842 if (entering(tcp)) {
1843 tprintf("%ld, ", tcp->u_arg[0]);
1848 else if (syserror(tcp) || tcp->u_rval == 0)
1849 tprintf("%#lx", tcp->u_arg[1]);
1850 else if (umove(tcp, tcp->u_arg[1], &status) < 0)
1853 exited = printstatus(status);
1856 if (!printflags(wait4_options, tcp->u_arg[2]))
1864 else if (tcp->u_rval > 0) {
1867 printrusage32(tcp, tcp->u_arg[3]);
1870 printrusage(tcp, tcp->u_arg[3]);
1874 else if (tcp->u_rval > 0 && exited)
1875 printrusage(tcp, tcp->u_arg[3]);
1878 tprintf("%#lx", tcp->u_arg[3]);
1885 internal_wait(tcp, flagarg)
1891 #ifdef TCB_CLONE_THREAD
1892 if (tcp->flags & TCB_CLONE_THREAD)
1893 /* The children we wait for are our parent's children. */
1894 got_kids = (tcp->parent->nchildren
1895 > tcp->parent->nclone_detached);
1897 got_kids = (tcp->nchildren > tcp->nclone_detached);
1899 got_kids = tcp->nchildren > 0;
1902 if (entering(tcp) && got_kids) {
1903 /* There are children that this parent should block for.
1904 But ptrace made us the parent of the traced children
1905 and the real parent will get ECHILD from the wait call.
1907 XXX If we attached with strace -f -p PID, then there
1908 may be untraced dead children the parent could be reaping
1909 now, but we make him block. */
1911 /* ??? WTA: fix bug with hanging children */
1913 if (!(tcp->u_arg[flagarg] & WNOHANG)) {
1915 * There are traced children. We'll make the parent
1916 * block to avoid a false ECHILD error due to our
1917 * ptrace having stolen the children. However,
1918 * we shouldn't block if there are zombies to reap.
1919 * XXX doesn't handle pgrp matches (u_arg[0]==0,<-1)
1921 struct tcb *child = NULL;
1922 if (tcp->nzombies > 0 &&
1923 (tcp->u_arg[0] == -1 ||
1924 (child = pid2tcb(tcp->u_arg[0])) == NULL))
1926 if (tcp->u_arg[0] > 0) {
1928 * If the parent waits for a specified child
1929 * PID, then it must get ECHILD right away
1930 * if that PID is not one of its children.
1931 * Make sure that the requested PID matches
1932 * one of the parent's children that we are
1933 * tracing, and don't suspend it otherwise.
1936 child = pid2tcb(tcp->u_arg[0]);
1937 if (child == NULL || child->parent != (
1938 #ifdef TCB_CLONE_THREAD
1939 (tcp->flags & TCB_CLONE_THREAD)
1945 tcp->flags |= TCB_SUSPENDED;
1946 tcp->waitpid = tcp->u_arg[0];
1947 #ifdef TCB_CLONE_THREAD
1948 if (tcp->flags & TCB_CLONE_THREAD)
1949 tcp->parent->nclone_waiting++;
1953 if (exiting(tcp) && tcp->u_error == ECHILD && got_kids) {
1954 if (tcp->u_arg[flagarg] & WNOHANG) {
1955 /* We must force a fake result of 0 instead of
1956 the ECHILD error. */
1957 extern int force_result();
1958 return force_result(tcp, 0, 0);
1961 else if (exiting(tcp) && tcp->u_error == 0 && tcp->u_rval > 0 &&
1962 tcp->nzombies > 0 && pid2tcb(tcp->u_rval) == NULL) {
1964 * We just reaped a child we don't know about,
1965 * presumably a zombie we already droptcb'd.
1979 /* The library wrapper stuffs this into the user variable. */
1981 printstatus(getrval2(tcp));
1996 if (!syserror(tcp)) {
1997 if (umove(tcp, tcp->u_arg[0], &status) < 0)
1998 tprintf("%#lx", tcp->u_arg[0]);
2000 printstatus(status);
2011 return printwaitn(tcp, 3, 0);
2018 return printwaitn(tcp, 4, 0);
2026 return printwaitn(tcp, 4, 1);
2030 #if defined SVR4 || defined LINUX
2032 static const struct xlat waitid_types[] = {
2035 { P_PPID, "P_PPID" },
2037 { P_PGID, "P_PGID" },
2052 { P_LWPID, "P_LWPID" },
2064 if (entering(tcp)) {
2065 printxval(waitid_types, tcp->u_arg[0], "P_???");
2066 tprintf(", %ld, ", tcp->u_arg[1]);
2073 else if (syserror(tcp))
2074 tprintf("%#lx", tcp->u_arg[2]);
2075 else if (umove(tcp, tcp->u_arg[2], &si) < 0)
2078 printsiginfo(&si, verbose (tcp));
2081 if (!printflags(wait4_options, tcp->u_arg[3]))
2083 if (tcp->u_nargs > 4) {
2088 else if (tcp->u_error)
2089 tprintf("%#lx", tcp->u_arg[4]);
2091 printrusage(tcp, tcp->u_arg[4]);
2097 #endif /* SVR4 or LINUX */
2104 tprintf("%lu", tcp->u_arg[0]);
2112 struct utsname uname;
2115 if (syserror(tcp) || !verbose(tcp))
2116 tprintf("%#lx", tcp->u_arg[0]);
2117 else if (umove(tcp, tcp->u_arg[0], &uname) < 0)
2119 else if (!abbrev(tcp)) {
2121 tprintf("{sysname=\"%s\", nodename=\"%s\", ",
2122 uname.sysname, uname.nodename);
2123 tprintf("release=\"%s\", version=\"%s\", ",
2124 uname.release, uname.version);
2125 tprintf("machine=\"%s\"", uname.machine);
2128 tprintf(", domainname=\"%s\"", uname.domainname);
2129 #endif /* __GLIBC__ */
2134 tprintf("{sys=\"%s\", node=\"%s\", ...}",
2135 uname.sysname, uname.nodename);
2142 static const struct xlat ptrace_cmds[] = {
2144 { PTRACE_TRACEME, "PTRACE_TRACEME" },
2145 { PTRACE_PEEKTEXT, "PTRACE_PEEKTEXT", },
2146 { PTRACE_PEEKDATA, "PTRACE_PEEKDATA", },
2147 { PTRACE_PEEKUSER, "PTRACE_PEEKUSER", },
2148 { PTRACE_POKETEXT, "PTRACE_POKETEXT", },
2149 { PTRACE_POKEDATA, "PTRACE_POKEDATA", },
2150 { PTRACE_POKEUSER, "PTRACE_POKEUSER", },
2151 { PTRACE_CONT, "PTRACE_CONT" },
2152 { PTRACE_KILL, "PTRACE_KILL" },
2153 { PTRACE_SINGLESTEP, "PTRACE_SINGLESTEP" },
2154 { PTRACE_ATTACH, "PTRACE_ATTACH" },
2155 { PTRACE_DETACH, "PTRACE_DETACH" },
2156 #ifdef PTRACE_GETREGS
2157 { PTRACE_GETREGS, "PTRACE_GETREGS" },
2159 #ifdef PTRACE_SETREGS
2160 { PTRACE_SETREGS, "PTRACE_SETREGS" },
2162 #ifdef PTRACE_GETFPREGS
2163 { PTRACE_GETFPREGS, "PTRACE_GETFPREGS", },
2165 #ifdef PTRACE_SETFPREGS
2166 { PTRACE_SETFPREGS, "PTRACE_SETFPREGS", },
2168 #ifdef PTRACE_GETFPXREGS
2169 { PTRACE_GETFPXREGS, "PTRACE_GETFPXREGS", },
2171 #ifdef PTRACE_SETFPXREGS
2172 { PTRACE_SETFPXREGS, "PTRACE_SETFPXREGS", },
2175 { PTRACE_READDATA, "PTRACE_READDATA" },
2176 { PTRACE_WRITEDATA, "PTRACE_WRITEDATA" },
2177 { PTRACE_READTEXT, "PTRACE_READTEXT" },
2178 { PTRACE_WRITETEXT, "PTRACE_WRITETEXT" },
2179 { PTRACE_GETFPAREGS, "PTRACE_GETFPAREGS" },
2180 { PTRACE_SETFPAREGS, "PTRACE_SETFPAREGS" },
2182 { PTRACE_GETWINDOW, "PTRACE_GETWINDOW" },
2183 { PTRACE_SETWINDOW, "PTRACE_SETWINDOW" },
2185 { PTRACE_22, "PTRACE_PTRACE_22" },
2186 { PTRACE_23, "PTRACE_PTRACE_23" },
2189 { PTRACE_SYSCALL, "PTRACE_SYSCALL" },
2191 { PTRACE_DUMPCORE, "PTRACE_DUMPCORE" },
2193 { PTRACE_SETWRBKPT, "PTRACE_SETWRBKPT" },
2194 { PTRACE_SETACBKPT, "PTRACE_SETACBKPT" },
2195 { PTRACE_CLRDR7, "PTRACE_CLRDR7" },
2197 { PTRACE_26, "PTRACE_26" },
2198 { PTRACE_27, "PTRACE_27" },
2199 { PTRACE_28, "PTRACE_28" },
2201 { PTRACE_GETUCODE, "PTRACE_GETUCODE" },
2204 { PT_TRACE_ME, "PT_TRACE_ME" },
2205 { PT_READ_I, "PT_READ_I" },
2206 { PT_READ_D, "PT_READ_D" },
2207 { PT_WRITE_I, "PT_WRITE_I" },
2208 { PT_WRITE_D, "PT_WRITE_D" },
2210 { PT_READ_U, "PT_READ_U" },
2212 { PT_CONTINUE, "PT_CONTINUE" },
2213 { PT_KILL, "PT_KILL" },
2214 { PT_STEP, "PT_STEP" },
2215 { PT_ATTACH, "PT_ATTACH" },
2216 { PT_DETACH, "PT_DETACH" },
2217 { PT_GETREGS, "PT_GETREGS" },
2218 { PT_SETREGS, "PT_SETREGS" },
2219 { PT_GETFPREGS, "PT_GETFPREGS" },
2220 { PT_SETFPREGS, "PT_SETFPREGS" },
2221 { PT_GETDBREGS, "PT_GETDBREGS" },
2222 { PT_SETDBREGS, "PT_SETDBREGS" },
2223 #endif /* FREEBSD */
2228 #ifndef SUNOS4_KERNEL_ARCH_KLUDGE
2230 #endif /* !SUNOS4_KERNEL_ARCH_KLUDGE */
2231 const struct xlat struct_user_offsets[] = {
2233 #if defined(S390) || defined(S390X)
2234 { PT_PSWMASK, "psw_mask" },
2235 { PT_PSWADDR, "psw_addr" },
2236 { PT_GPR0, "gpr0" },
2237 { PT_GPR1, "gpr1" },
2238 { PT_GPR2, "gpr2" },
2239 { PT_GPR3, "gpr3" },
2240 { PT_GPR4, "gpr4" },
2241 { PT_GPR5, "gpr5" },
2242 { PT_GPR6, "gpr6" },
2243 { PT_GPR7, "gpr7" },
2244 { PT_GPR8, "gpr8" },
2245 { PT_GPR9, "gpr9" },
2246 { PT_GPR10, "gpr10" },
2247 { PT_GPR11, "gpr11" },
2248 { PT_GPR12, "gpr12" },
2249 { PT_GPR13, "gpr13" },
2250 { PT_GPR14, "gpr14" },
2251 { PT_GPR15, "gpr15" },
2252 { PT_ACR0, "acr0" },
2253 { PT_ACR1, "acr1" },
2254 { PT_ACR2, "acr2" },
2255 { PT_ACR3, "acr3" },
2256 { PT_ACR4, "acr4" },
2257 { PT_ACR5, "acr5" },
2258 { PT_ACR6, "acr6" },
2259 { PT_ACR7, "acr7" },
2260 { PT_ACR8, "acr8" },
2261 { PT_ACR9, "acr9" },
2262 { PT_ACR10, "acr10" },
2263 { PT_ACR11, "acr11" },
2264 { PT_ACR12, "acr12" },
2265 { PT_ACR13, "acr13" },
2266 { PT_ACR14, "acr14" },
2267 { PT_ACR15, "acr15" },
2268 { PT_ORIGGPR2, "orig_gpr2" },
2271 { PT_FPR0_HI, "fpr0.hi" },
2272 { PT_FPR0_LO, "fpr0.lo" },
2273 { PT_FPR1_HI, "fpr1.hi" },
2274 { PT_FPR1_LO, "fpr1.lo" },
2275 { PT_FPR2_HI, "fpr2.hi" },
2276 { PT_FPR2_LO, "fpr2.lo" },
2277 { PT_FPR3_HI, "fpr3.hi" },
2278 { PT_FPR3_LO, "fpr3.lo" },
2279 { PT_FPR4_HI, "fpr4.hi" },
2280 { PT_FPR4_LO, "fpr4.lo" },
2281 { PT_FPR5_HI, "fpr5.hi" },
2282 { PT_FPR5_LO, "fpr5.lo" },
2283 { PT_FPR6_HI, "fpr6.hi" },
2284 { PT_FPR6_LO, "fpr6.lo" },
2285 { PT_FPR7_HI, "fpr7.hi" },
2286 { PT_FPR7_LO, "fpr7.lo" },
2287 { PT_FPR8_HI, "fpr8.hi" },
2288 { PT_FPR8_LO, "fpr8.lo" },
2289 { PT_FPR9_HI, "fpr9.hi" },
2290 { PT_FPR9_LO, "fpr9.lo" },
2291 { PT_FPR10_HI, "fpr10.hi" },
2292 { PT_FPR10_LO, "fpr10.lo" },
2293 { PT_FPR11_HI, "fpr11.hi" },
2294 { PT_FPR11_LO, "fpr11.lo" },
2295 { PT_FPR12_HI, "fpr12.hi" },
2296 { PT_FPR12_LO, "fpr12.lo" },
2297 { PT_FPR13_HI, "fpr13.hi" },
2298 { PT_FPR13_LO, "fpr13.lo" },
2299 { PT_FPR14_HI, "fpr14.hi" },
2300 { PT_FPR14_LO, "fpr14.lo" },
2301 { PT_FPR15_HI, "fpr15.hi" },
2302 { PT_FPR15_LO, "fpr15.lo" },
2305 { PT_FPR0, "fpr0" },
2306 { PT_FPR1, "fpr1" },
2307 { PT_FPR2, "fpr2" },
2308 { PT_FPR3, "fpr3" },
2309 { PT_FPR4, "fpr4" },
2310 { PT_FPR5, "fpr5" },
2311 { PT_FPR6, "fpr6" },
2312 { PT_FPR7, "fpr7" },
2313 { PT_FPR8, "fpr8" },
2314 { PT_FPR9, "fpr9" },
2315 { PT_FPR10, "fpr10" },
2316 { PT_FPR11, "fpr11" },
2317 { PT_FPR12, "fpr12" },
2318 { PT_FPR13, "fpr13" },
2319 { PT_FPR14, "fpr14" },
2320 { PT_FPR15, "fpr15" },
2323 { PT_CR_10, "cr10" },
2324 { PT_CR_11, "cr11" },
2325 { PT_IEEE_IP, "ieee_exception_ip" },
2328 /* XXX No support for these offsets yet. */
2330 /* XXX No support for these offsets yet. */
2331 #elif defined(POWERPC)
2333 #define PT_ORIG_R3 34
2335 #define REGSIZE (sizeof(unsigned long))
2336 { REGSIZE*PT_R0, "r0" },
2337 { REGSIZE*PT_R1, "r1" },
2338 { REGSIZE*PT_R2, "r2" },
2339 { REGSIZE*PT_R3, "r3" },
2340 { REGSIZE*PT_R4, "r4" },
2341 { REGSIZE*PT_R5, "r5" },
2342 { REGSIZE*PT_R6, "r6" },
2343 { REGSIZE*PT_R7, "r7" },
2344 { REGSIZE*PT_R8, "r8" },
2345 { REGSIZE*PT_R9, "r9" },
2346 { REGSIZE*PT_R10, "r10" },
2347 { REGSIZE*PT_R11, "r11" },
2348 { REGSIZE*PT_R12, "r12" },
2349 { REGSIZE*PT_R13, "r13" },
2350 { REGSIZE*PT_R14, "r14" },
2351 { REGSIZE*PT_R15, "r15" },
2352 { REGSIZE*PT_R16, "r16" },
2353 { REGSIZE*PT_R17, "r17" },
2354 { REGSIZE*PT_R18, "r18" },
2355 { REGSIZE*PT_R19, "r19" },
2356 { REGSIZE*PT_R20, "r20" },
2357 { REGSIZE*PT_R21, "r21" },
2358 { REGSIZE*PT_R22, "r22" },
2359 { REGSIZE*PT_R23, "r23" },
2360 { REGSIZE*PT_R24, "r24" },
2361 { REGSIZE*PT_R25, "r25" },
2362 { REGSIZE*PT_R26, "r26" },
2363 { REGSIZE*PT_R27, "r27" },
2364 { REGSIZE*PT_R28, "r28" },
2365 { REGSIZE*PT_R29, "r29" },
2366 { REGSIZE*PT_R30, "r30" },
2367 { REGSIZE*PT_R31, "r31" },
2368 { REGSIZE*PT_NIP, "NIP" },
2369 { REGSIZE*PT_MSR, "MSR" },
2370 { REGSIZE*PT_ORIG_R3, "ORIG_R3" },
2371 { REGSIZE*PT_CTR, "CTR" },
2372 { REGSIZE*PT_LNK, "LNK" },
2373 { REGSIZE*PT_XER, "XER" },
2374 { REGSIZE*PT_CCR, "CCR" },
2375 { REGSIZE*PT_FPR0, "FPR0" },
2446 { PT_F32, "f32" }, { PT_F33, "f33" }, { PT_F34, "f34" },
2447 { PT_F35, "f35" }, { PT_F36, "f36" }, { PT_F37, "f37" },
2448 { PT_F38, "f38" }, { PT_F39, "f39" }, { PT_F40, "f40" },
2449 { PT_F41, "f41" }, { PT_F42, "f42" }, { PT_F43, "f43" },
2450 { PT_F44, "f44" }, { PT_F45, "f45" }, { PT_F46, "f46" },
2451 { PT_F47, "f47" }, { PT_F48, "f48" }, { PT_F49, "f49" },
2452 { PT_F50, "f50" }, { PT_F51, "f51" }, { PT_F52, "f52" },
2453 { PT_F53, "f53" }, { PT_F54, "f54" }, { PT_F55, "f55" },
2454 { PT_F56, "f56" }, { PT_F57, "f57" }, { PT_F58, "f58" },
2455 { PT_F59, "f59" }, { PT_F60, "f60" }, { PT_F61, "f61" },
2456 { PT_F62, "f62" }, { PT_F63, "f63" }, { PT_F64, "f64" },
2457 { PT_F65, "f65" }, { PT_F66, "f66" }, { PT_F67, "f67" },
2458 { PT_F68, "f68" }, { PT_F69, "f69" }, { PT_F70, "f70" },
2459 { PT_F71, "f71" }, { PT_F72, "f72" }, { PT_F73, "f73" },
2460 { PT_F74, "f74" }, { PT_F75, "f75" }, { PT_F76, "f76" },
2461 { PT_F77, "f77" }, { PT_F78, "f78" }, { PT_F79, "f79" },
2462 { PT_F80, "f80" }, { PT_F81, "f81" }, { PT_F82, "f82" },
2463 { PT_F83, "f83" }, { PT_F84, "f84" }, { PT_F85, "f85" },
2464 { PT_F86, "f86" }, { PT_F87, "f87" }, { PT_F88, "f88" },
2465 { PT_F89, "f89" }, { PT_F90, "f90" }, { PT_F91, "f91" },
2466 { PT_F92, "f92" }, { PT_F93, "f93" }, { PT_F94, "f94" },
2467 { PT_F95, "f95" }, { PT_F96, "f96" }, { PT_F97, "f97" },
2468 { PT_F98, "f98" }, { PT_F99, "f99" }, { PT_F100, "f100" },
2469 { PT_F101, "f101" }, { PT_F102, "f102" }, { PT_F103, "f103" },
2470 { PT_F104, "f104" }, { PT_F105, "f105" }, { PT_F106, "f106" },
2471 { PT_F107, "f107" }, { PT_F108, "f108" }, { PT_F109, "f109" },
2472 { PT_F110, "f110" }, { PT_F111, "f111" }, { PT_F112, "f112" },
2473 { PT_F113, "f113" }, { PT_F114, "f114" }, { PT_F115, "f115" },
2474 { PT_F116, "f116" }, { PT_F117, "f117" }, { PT_F118, "f118" },
2475 { PT_F119, "f119" }, { PT_F120, "f120" }, { PT_F121, "f121" },
2476 { PT_F122, "f122" }, { PT_F123, "f123" }, { PT_F124, "f124" },
2477 { PT_F125, "f125" }, { PT_F126, "f126" }, { PT_F127, "f127" },
2479 { PT_F2, "f2" }, { PT_F3, "f3" }, { PT_F4, "f4" },
2480 { PT_F5, "f5" }, { PT_F10, "f10" }, { PT_F11, "f11" },
2481 { PT_F12, "f12" }, { PT_F13, "f13" }, { PT_F14, "f14" },
2482 { PT_F15, "f15" }, { PT_F16, "f16" }, { PT_F17, "f17" },
2483 { PT_F18, "f18" }, { PT_F19, "f19" }, { PT_F20, "f20" },
2484 { PT_F21, "f21" }, { PT_F22, "f22" }, { PT_F23, "f23" },
2485 { PT_F24, "f24" }, { PT_F25, "f25" }, { PT_F26, "f26" },
2486 { PT_F27, "f27" }, { PT_F28, "f28" }, { PT_F29, "f29" },
2487 { PT_F30, "f30" }, { PT_F31, "f31" }, { PT_R4, "r4" },
2488 { PT_R5, "r5" }, { PT_R6, "r6" }, { PT_R7, "r7" },
2489 { PT_B1, "b1" }, { PT_B2, "b2" }, { PT_B3, "b3" },
2490 { PT_B4, "b4" }, { PT_B5, "b5" },
2491 { PT_AR_EC, "ar.ec" }, { PT_AR_LC, "ar.lc" },
2493 { PT_CR_IPSR, "psr" }, { PT_CR_IIP, "ip" },
2494 { PT_CFM, "cfm" }, { PT_AR_UNAT, "ar.unat" },
2495 { PT_AR_PFS, "ar.pfs" }, { PT_AR_RSC, "ar.rsc" },
2496 { PT_AR_RNAT, "ar.rnat" }, { PT_AR_BSPSTORE, "ar.bspstore" },
2497 { PT_PR, "pr" }, { PT_B6, "b6" }, { PT_AR_BSP, "ar.bsp" },
2498 { PT_R1, "r1" }, { PT_R2, "r2" }, { PT_R3, "r3" },
2499 { PT_R12, "r12" }, { PT_R13, "r13" }, { PT_R14, "r14" },
2500 { PT_R15, "r15" }, { PT_R8, "r8" }, { PT_R9, "r9" },
2501 { PT_R10, "r10" }, { PT_R11, "r11" }, { PT_R16, "r16" },
2502 { PT_R17, "r17" }, { PT_R18, "r18" }, { PT_R19, "r19" },
2503 { PT_R20, "r20" }, { PT_R21, "r21" }, { PT_R22, "r22" },
2504 { PT_R23, "r23" }, { PT_R24, "r24" }, { PT_R25, "r25" },
2505 { PT_R26, "r26" }, { PT_R27, "r27" }, { PT_R28, "r28" },
2506 { PT_R29, "r29" }, { PT_R30, "r30" }, { PT_R31, "r31" },
2507 { PT_AR_CCV, "ar.ccv" }, { PT_AR_FPSR, "ar.fpsr" },
2508 { PT_B0, "b0" }, { PT_B7, "b7" }, { PT_F6, "f6" },
2509 { PT_F7, "f7" }, { PT_F8, "f8" }, { PT_F9, "f9" },
2511 { PT_AR_CSD, "ar.csd" },
2514 { PT_AR_SSD, "ar.ssd" },
2516 { PT_DBR, "dbr" }, { PT_IBR, "ibr" }, { PT_PMD, "pmd" },
2530 { 4*ORIG_EAX, "4*ORIG_EAX" },
2534 { 4*UESP, "4*UESP" },
2554 { 8*ORIG_RAX, "8*ORIG_EAX" },
2557 { 8*EFLAGS, "8*EFL" },
2567 { 4*PT_D1, "4*PT_D1" },
2568 { 4*PT_D2, "4*PT_D2" },
2569 { 4*PT_D3, "4*PT_D3" },
2570 { 4*PT_D4, "4*PT_D4" },
2571 { 4*PT_D5, "4*PT_D5" },
2572 { 4*PT_D6, "4*PT_D6" },
2573 { 4*PT_D7, "4*PT_D7" },
2574 { 4*PT_A0, "4*PT_A0" },
2575 { 4*PT_A1, "4*PT_A1" },
2576 { 4*PT_A2, "4*PT_A2" },
2577 { 4*PT_A3, "4*PT_A3" },
2578 { 4*PT_A4, "4*PT_A4" },
2579 { 4*PT_A5, "4*PT_A5" },
2580 { 4*PT_A6, "4*PT_A6" },
2581 { 4*PT_D0, "4*PT_D0" },
2582 { 4*PT_USP, "4*PT_USP" },
2583 { 4*PT_ORIG_D0, "4*PT_ORIG_D0" },
2584 { 4*PT_SR, "4*PT_SR" },
2585 { 4*PT_PC, "4*PT_PC" },
2589 { 4*REG_REG0, "4*REG_REG0" },
2590 { 4*(REG_REG0+1), "4*REG_REG1" },
2591 { 4*(REG_REG0+2), "4*REG_REG2" },
2592 { 4*(REG_REG0+3), "4*REG_REG3" },
2593 { 4*(REG_REG0+4), "4*REG_REG4" },
2594 { 4*(REG_REG0+5), "4*REG_REG5" },
2595 { 4*(REG_REG0+6), "4*REG_REG6" },
2596 { 4*(REG_REG0+7), "4*REG_REG7" },
2597 { 4*(REG_REG0+8), "4*REG_REG8" },
2598 { 4*(REG_REG0+9), "4*REG_REG9" },
2599 { 4*(REG_REG0+10), "4*REG_REG10" },
2600 { 4*(REG_REG0+11), "4*REG_REG11" },
2601 { 4*(REG_REG0+12), "4*REG_REG12" },
2602 { 4*(REG_REG0+13), "4*REG_REG13" },
2603 { 4*(REG_REG0+14), "4*REG_REG14" },
2604 { 4*REG_REG15, "4*REG_REG15" },
2605 { 4*REG_PC, "4*REG_PC" },
2606 { 4*REG_PR, "4*REG_PR" },
2607 { 4*REG_SR, "4*REG_SR" },
2608 { 4*REG_GBR, "4*REG_GBR" },
2609 { 4*REG_MACH, "4*REG_MACH" },
2610 { 4*REG_MACL, "4*REG_MACL" },
2611 { 4*REG_SYSCALL, "4*REG_SYSCALL" },
2612 { 4*REG_FPUL, "4*REG_FPUL" },
2613 { 4*REG_FPREG0, "4*REG_FPREG0" },
2614 { 4*(REG_FPREG0+1), "4*REG_FPREG1" },
2615 { 4*(REG_FPREG0+2), "4*REG_FPREG2" },
2616 { 4*(REG_FPREG0+3), "4*REG_FPREG3" },
2617 { 4*(REG_FPREG0+4), "4*REG_FPREG4" },
2618 { 4*(REG_FPREG0+5), "4*REG_FPREG5" },
2619 { 4*(REG_FPREG0+6), "4*REG_FPREG6" },
2620 { 4*(REG_FPREG0+7), "4*REG_FPREG7" },
2621 { 4*(REG_FPREG0+8), "4*REG_FPREG8" },
2622 { 4*(REG_FPREG0+9), "4*REG_FPREG9" },
2623 { 4*(REG_FPREG0+10), "4*REG_FPREG10" },
2624 { 4*(REG_FPREG0+11), "4*REG_FPREG11" },
2625 { 4*(REG_FPREG0+12), "4*REG_FPREG12" },
2626 { 4*(REG_FPREG0+13), "4*REG_FPREG13" },
2627 { 4*(REG_FPREG0+14), "4*REG_FPREG14" },
2628 { 4*REG_FPREG15, "4*REG_FPREG15" },
2630 { 4*REG_XDREG0, "4*REG_XDREG0" },
2631 { 4*(REG_XDREG0+2), "4*REG_XDREG2" },
2632 { 4*(REG_XDREG0+4), "4*REG_XDREG4" },
2633 { 4*(REG_XDREG0+6), "4*REG_XDREG6" },
2634 { 4*(REG_XDREG0+8), "4*REG_XDREG8" },
2635 { 4*(REG_XDREG0+10), "4*REG_XDREG10" },
2636 { 4*(REG_XDREG0+12), "4*REG_XDREG12" },
2637 { 4*REG_XDREG14, "4*REG_XDREG14" },
2639 { 4*REG_FPSCR, "4*REG_FPSCR" },
2646 { 16, "syscall no.(L)" },
2647 { 20, "syscall_no.(U)" },
2790 /* This entry is in case pt_regs contains dregs (depends on
2791 the kernel build options). */
2792 { uoff(regs), "offsetof(struct user, regs)" },
2793 { uoff(fpu), "offsetof(struct user, fpu)" },
2796 { uoff(regs.ARM_r0), "r0" },
2797 { uoff(regs.ARM_r1), "r1" },
2798 { uoff(regs.ARM_r2), "r2" },
2799 { uoff(regs.ARM_r3), "r3" },
2800 { uoff(regs.ARM_r4), "r4" },
2801 { uoff(regs.ARM_r5), "r5" },
2802 { uoff(regs.ARM_r6), "r6" },
2803 { uoff(regs.ARM_r7), "r7" },
2804 { uoff(regs.ARM_r8), "r8" },
2805 { uoff(regs.ARM_r9), "r9" },
2806 { uoff(regs.ARM_r10), "r10" },
2807 { uoff(regs.ARM_fp), "fp" },
2808 { uoff(regs.ARM_ip), "ip" },
2809 { uoff(regs.ARM_sp), "sp" },
2810 { uoff(regs.ARM_lr), "lr" },
2811 { uoff(regs.ARM_pc), "pc" },
2812 { uoff(regs.ARM_cpsr), "cpsr" },
2815 #if !defined(S390) && !defined(S390X) && !defined(MIPS) && !defined(SPARC64)
2816 { uoff(u_fpvalid), "offsetof(struct user, u_fpvalid)" },
2818 #if defined(I386) || defined(X86_64)
2819 { uoff(i387), "offsetof(struct user, i387)" },
2822 { uoff(m68kfp), "offsetof(struct user, m68kfp)" },
2825 { uoff(u_tsize), "offsetof(struct user, u_tsize)" },
2826 { uoff(u_dsize), "offsetof(struct user, u_dsize)" },
2827 { uoff(u_ssize), "offsetof(struct user, u_ssize)" },
2828 #if !defined(SPARC64)
2829 { uoff(start_code), "offsetof(struct user, start_code)" },
2832 { uoff(start_data), "offsetof(struct user, start_data)" },
2834 #if !defined(SPARC64)
2835 { uoff(start_stack), "offsetof(struct user, start_stack)" },
2837 { uoff(signal), "offsetof(struct user, signal)" },
2838 #if !defined(S390) && !defined(S390X) && !defined(MIPS) && !defined(SH) && !defined(SH64) && !defined(SPARC64)
2839 { uoff(reserved), "offsetof(struct user, reserved)" },
2841 #if !defined(SPARC64)
2842 { uoff(u_ar0), "offsetof(struct user, u_ar0)" },
2844 #if !defined(ARM) && !defined(MIPS) && !defined(S390) && !defined(S390X) && !defined(SPARC64)
2845 { uoff(u_fpstate), "offsetof(struct user, u_fpstate)" },
2847 { uoff(magic), "offsetof(struct user, magic)" },
2848 { uoff(u_comm), "offsetof(struct user, u_comm)" },
2849 #if defined(I386) || defined(X86_64)
2850 { uoff(u_debugreg), "offsetof(struct user, u_debugreg)" },
2854 #endif /* !POWERPC/!SPARC */
2857 { uoff(u_pcb), "offsetof(struct user, u_pcb)" },
2858 { uoff(u_procp), "offsetof(struct user, u_procp)" },
2859 { uoff(u_ar0), "offsetof(struct user, u_ar0)" },
2860 { uoff(u_comm[0]), "offsetof(struct user, u_comm[0])" },
2861 { uoff(u_arg[0]), "offsetof(struct user, u_arg[0])" },
2862 { uoff(u_ap), "offsetof(struct user, u_ap)" },
2863 { uoff(u_qsave), "offsetof(struct user, u_qsave)" },
2864 { uoff(u_rval1), "offsetof(struct user, u_rval1)" },
2865 { uoff(u_rval2), "offsetof(struct user, u_rval2)" },
2866 { uoff(u_error), "offsetof(struct user, u_error)" },
2867 { uoff(u_eosys), "offsetof(struct user, u_eosys)" },
2868 { uoff(u_ssave), "offsetof(struct user, u_ssave)" },
2869 { uoff(u_signal[0]), "offsetof(struct user, u_signal)" },
2870 { uoff(u_sigmask[0]), "offsetof(struct user, u_sigmask)" },
2871 { uoff(u_sigonstack), "offsetof(struct user, u_sigonstack)" },
2872 { uoff(u_sigintr), "offsetof(struct user, u_sigintr)" },
2873 { uoff(u_sigreset), "offsetof(struct user, u_sigreset)" },
2874 { uoff(u_oldmask), "offsetof(struct user, u_oldmask)" },
2875 { uoff(u_code), "offsetof(struct user, u_code)" },
2876 { uoff(u_addr), "offsetof(struct user, u_addr)" },
2877 { uoff(u_sigstack), "offsetof(struct user, u_sigstack)" },
2878 { uoff(u_ofile), "offsetof(struct user, u_ofile)" },
2879 { uoff(u_pofile), "offsetof(struct user, u_pofile)" },
2880 { uoff(u_ofile_arr[0]), "offsetof(struct user, u_ofile_arr[0])" },
2881 { uoff(u_pofile_arr[0]),"offsetof(struct user, u_pofile_arr[0])"},
2882 { uoff(u_lastfile), "offsetof(struct user, u_lastfile)" },
2883 { uoff(u_cwd), "offsetof(struct user, u_cwd)" },
2884 { uoff(u_cdir), "offsetof(struct user, u_cdir)" },
2885 { uoff(u_rdir), "offsetof(struct user, u_rdir)" },
2886 { uoff(u_cmask), "offsetof(struct user, u_cmask)" },
2887 { uoff(u_ru), "offsetof(struct user, u_ru)" },
2888 { uoff(u_cru), "offsetof(struct user, u_cru)" },
2889 { uoff(u_timer[0]), "offsetof(struct user, u_timer[0])" },
2890 { uoff(u_XXX[0]), "offsetof(struct user, u_XXX[0])" },
2891 { uoff(u_ioch), "offsetof(struct user, u_ioch)" },
2892 { uoff(u_start), "offsetof(struct user, u_start)" },
2893 { uoff(u_acflag), "offsetof(struct user, u_acflag)" },
2894 { uoff(u_prof.pr_base), "offsetof(struct user, u_prof.pr_base)" },
2895 { uoff(u_prof.pr_size), "offsetof(struct user, u_prof.pr_size)" },
2896 { uoff(u_prof.pr_off), "offsetof(struct user, u_prof.pr_off)" },
2897 { uoff(u_prof.pr_scale),"offsetof(struct user, u_prof.pr_scale)"},
2898 { uoff(u_rlimit[0]), "offsetof(struct user, u_rlimit)" },
2899 { uoff(u_exdata.Ux_A), "offsetof(struct user, u_exdata.Ux_A)" },
2900 { uoff(u_exdata.ux_shell[0]),"offsetof(struct user, u_exdata.ux_shell[0])"},
2901 { uoff(u_lofault), "offsetof(struct user, u_lofault)" },
2904 { sizeof(struct user), "sizeof(struct user)" },
2914 const struct xlat *x;
2917 if (entering(tcp)) {
2918 printxval(ptrace_cmds, tcp->u_arg[0],
2925 tprintf(", %lu, ", tcp->u_arg[1]);
2926 addr = tcp->u_arg[2];
2928 if (tcp->u_arg[0] == PTRACE_PEEKUSER
2929 || tcp->u_arg[0] == PTRACE_POKEUSER) {
2930 for (x = struct_user_offsets; x->str; x++) {
2935 tprintf("%#lx, ", addr);
2936 else if (x->val > addr && x != struct_user_offsets) {
2938 tprintf("%s + %ld, ", x->str, addr - x->val);
2941 tprintf("%s, ", x->str);
2945 tprintf("%#lx, ", tcp->u_arg[2]);
2947 switch (tcp->u_arg[0]) {
2948 case PTRACE_PEEKDATA:
2949 case PTRACE_PEEKTEXT:
2950 case PTRACE_PEEKUSER:
2953 case PTRACE_SINGLESTEP:
2954 case PTRACE_SYSCALL:
2956 printsignal(tcp->u_arg[3]);
2959 tprintf("%#lx", tcp->u_arg[3]);
2963 switch (tcp->u_arg[0]) {
2964 case PTRACE_PEEKDATA:
2965 case PTRACE_PEEKTEXT:
2966 case PTRACE_PEEKUSER:
2967 printnum(tcp, tcp->u_arg[3], "%#lx");
2973 if (tcp->u_arg[0] == PTRACE_WRITEDATA ||
2974 tcp->u_arg[0] == PTRACE_WRITETEXT) {
2975 tprintf("%lu, ", tcp->u_arg[3]);
2976 printstr(tcp, tcp->u_arg[4], tcp->u_arg[3]);
2977 } else if (tcp->u_arg[0] != PTRACE_READDATA &&
2978 tcp->u_arg[0] != PTRACE_READTEXT) {
2979 tprintf("%#lx", tcp->u_arg[3]);
2982 if (tcp->u_arg[0] == PTRACE_READDATA ||
2983 tcp->u_arg[0] == PTRACE_READTEXT) {
2984 tprintf("%lu, ", tcp->u_arg[3]);
2985 printstr(tcp, tcp->u_arg[4], tcp->u_arg[3]);
2990 tprintf("%lu", tcp->u_arg[3]);
2992 #endif /* FREEBSD */
2999 static const struct xlat futexops[] = {
3000 { FUTEX_WAIT, "FUTEX_WAIT" },
3001 { FUTEX_WAKE, "FUTEX_WAKE" },
3002 { FUTEX_FD, "FUTEX_FD" },
3003 { FUTEX_REQUEUE,"FUTEX_REQUEUE" },
3011 if (entering(tcp)) {
3012 tprintf("%p, ", (void *) tcp->u_arg[0]);
3013 printxval(futexops, tcp->u_arg[1], "FUTEX_???");
3014 tprintf(", %ld", tcp->u_arg[2]);
3015 if (tcp->u_arg[1] == FUTEX_WAIT) {
3017 printtv(tcp, tcp->u_arg[3]);
3018 } else if (tcp->u_arg[1] == FUTEX_REQUEUE)
3019 tprintf(", %ld, %p", tcp->u_arg[3], (void *) tcp->u_arg[4]);
3025 print_affinitylist(tcp, list, len)
3032 while (len >= sizeof (unsigned long)) {
3034 umove(tcp, list, &w);
3035 tprintf("%s %lx", first ? "" : ",", w);
3037 len -= sizeof (unsigned long);
3038 list += sizeof(unsigned long);
3044 sys_sched_setaffinity(tcp)
3047 if (entering(tcp)) {
3048 tprintf("%ld, %lu, ", tcp->u_arg[0], tcp->u_arg[1]);
3049 print_affinitylist(tcp, tcp->u_arg[2], tcp->u_arg[1]);
3055 sys_sched_getaffinity(tcp)
3058 if (entering(tcp)) {
3059 tprintf("%ld, %lu, ", tcp->u_arg[0], tcp->u_arg[1]);
3061 if (tcp->u_rval == -1)
3062 tprintf("%#lx", tcp->u_arg[2]);
3064 print_affinitylist(tcp, tcp->u_arg[2], tcp->u_rval);
3069 static const struct xlat schedulers[] = {
3070 { SCHED_OTHER, "SCHED_OTHER" },
3071 { SCHED_RR, "SCHED_RR" },
3072 { SCHED_FIFO, "SCHED_FIFO" },
3077 sys_sched_getscheduler(tcp)
3080 if (entering(tcp)) {
3081 tprintf("%d", (int) tcp->u_arg[0]);
3082 } else if (! syserror(tcp)) {
3083 tcp->auxstr = xlookup (schedulers, tcp->u_rval);
3084 if (tcp->auxstr != NULL)
3091 sys_sched_setscheduler(tcp)
3094 if (entering(tcp)) {
3095 struct sched_param p;
3096 tprintf("%d, ", (int) tcp->u_arg[0]);
3097 printxval(schedulers, tcp->u_arg[1], "SCHED_???");
3098 if (umove(tcp, tcp->u_arg[2], &p) < 0)
3099 tprintf(", %lx", tcp->u_arg[2]);
3101 tprintf(", { %d }", p.__sched_priority);
3107 sys_sched_getparam(tcp)
3110 if (entering(tcp)) {
3111 tprintf("%d, ", (int) tcp->u_arg[0]);
3113 struct sched_param p;
3114 if (umove(tcp, tcp->u_arg[1], &p) < 0)
3115 tprintf("%lx", tcp->u_arg[1]);
3117 tprintf("{ %d }", p.__sched_priority);
3123 sys_sched_setparam(tcp)
3126 if (entering(tcp)) {
3127 struct sched_param p;
3128 if (umove(tcp, tcp->u_arg[1], &p) < 0)
3129 tprintf("%d, %lx", (int) tcp->u_arg[0], tcp->u_arg[1]);
3131 tprintf("%d, { %d }", (int) tcp->u_arg[0], p.__sched_priority);
3137 sys_sched_get_priority_min(tcp)
3140 if (entering(tcp)) {
3141 printxval(schedulers, tcp->u_arg[0], "SCHED_???");