2 * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3 * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4 * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
5 * Copyright (c) 1996-1999 Wichert Akkerman <wichert@cistron.nl>
6 * Copyright (c) 1999 IBM Deutschland Entwicklung GmbH, IBM Corporation
7 * Linux for s390 port by D.J. Barrow
8 * <barrow_dj@mail.yahoo.com,djbarrow@de.ibm.com>
9 * Copyright (c) 2000 PocketPenguins Inc. Linux for Hitachi SuperH
10 * port by Greg Banks <gbanks@pocketpenguins.com>
11 * Copyright (c) 1999-2018 The strace developers.
13 * All rights reserved.
15 * SPDX-License-Identifier: LGPL-2.1-or-later
25 #include "ptrace_syscall_info.h"
28 #include "xlat/nt_descriptor_types.h"
29 #include "xlat/ptrace_cmds.h"
30 #include "xlat/ptrace_setoptions_flags.h"
31 #include "xlat/ptrace_peeksiginfo_flags.h"
33 #define uoff(member) offsetof(struct user, member)
34 #define XLAT_UOFF(member) { uoff(member), "offsetof(struct user, " #member ")" }
36 static const struct xlat_data struct_user_offsets_data[] = {
41 static const struct xlat struct_user_offsets = {
43 .size = ARRAY_SIZE(struct_user_offsets_data) - 1,
44 .data = struct_user_offsets_data,
48 print_user_offset_addr(const kernel_ulong_t addr)
50 const uint64_t last_user_offset = struct_user_offsets.size ?
51 struct_user_offsets.data[struct_user_offsets.size - 1].val : 0;
53 uint64_t base_addr = addr;
54 const char *str = xlookup_le(&struct_user_offsets, &base_addr);
56 /* We don't want to pretty print addresses beyond struct user */
57 if (addr > base_addr && base_addr == last_user_offset)
60 if (!str || xlat_verbose(xlat_verbosity) != XLAT_STYLE_ABBREV)
62 if (!str || xlat_verbose(xlat_verbosity) == XLAT_STYLE_RAW)
65 if (xlat_verbose(xlat_verbosity) == XLAT_STYLE_VERBOSE)
68 if (base_addr == addr)
71 tprintf("%s + %" PRI_klu,
72 str, addr - (kernel_ulong_t) base_addr);
74 if (xlat_verbose(xlat_verbosity) == XLAT_STYLE_VERBOSE)
80 const kernel_ulong_t request = tcp->u_arg[0];
81 const int pid = tcp->u_arg[1];
82 const kernel_ulong_t addr = tcp->u_arg[2];
83 const kernel_ulong_t data = tcp->u_arg[3];
87 printxval64(ptrace_cmds, request, "PTRACE_???");
89 if (request == PTRACE_TRACEME) {
90 /* pid, addr, and data are ignored. */
100 case PTRACE_INTERRUPT:
103 /* addr and data are ignored */
105 case PTRACE_PEEKUSER:
106 case PTRACE_POKEUSER:
108 print_user_offset_addr(addr);
110 case PTRACE_GETREGSET:
111 case PTRACE_SETREGSET:
113 printxval(nt_descriptor_types, addr, "NT_???");
115 case PTRACE_GETSIGMASK:
116 case PTRACE_SETSIGMASK:
117 case PTRACE_SECCOMP_GET_FILTER:
118 case PTRACE_SECCOMP_GET_METADATA:
119 case PTRACE_GET_SYSCALL_INFO:
120 tprintf(", %" PRI_klu, addr);
122 case PTRACE_PEEKSIGINFO: {
129 if (umove_or_printaddr(tcp, addr, &psi)) {
134 tprintf("{off=%" PRIu64 ", flags=", psi.off);
135 printflags(ptrace_peeksiginfo_flags, psi.flags,
136 "PTRACE_PEEKSIGINFO_???");
137 tprintf(", nr=%u}", psi.nr);
145 #if defined IA64 || defined SPARC || defined SPARC64
148 case PTRACE_PEEKDATA:
149 case PTRACE_PEEKTEXT:
150 case PTRACE_PEEKUSER:
151 /* data is ignored */
152 return RVAL_DECODED | RVAL_HEX;
154 # if defined SPARC || defined SPARC64
157 case PTRACE_GETFPREGS:
158 case PTRACE_SETFPREGS:
159 /* data is ignored */
161 # endif /* SPARC || SPARC64 */
163 #endif /* IA64 || SPARC || SPARC64 */
172 #ifdef PTRACE_SINGLESTEP
173 case PTRACE_SINGLESTEP:
175 #ifdef PTRACE_SINGLEBLOCK
176 case PTRACE_SINGLEBLOCK:
181 #ifdef PTRACE_SYSEMU_SINGLESTEP
182 case PTRACE_SYSEMU_SINGLESTEP:
187 case PTRACE_SETOPTIONS:
188 #ifdef PTRACE_OLDSETOPTIONS
189 case PTRACE_OLDSETOPTIONS:
191 printflags64(ptrace_setoptions_flags, data, "PTRACE_O_???");
193 case PTRACE_SETSIGINFO:
194 printsiginfo_at(tcp, data);
196 case PTRACE_SETSIGMASK:
197 print_sigset_addr_len(tcp, data, addr);
199 case PTRACE_SETREGSET:
200 tprint_iov(tcp, /*len:*/ 1, data, IOV_DECODE_ADDR);
202 case PTRACE_SECCOMP_GET_METADATA:
205 if (addr < sizeof(filter_off) ||
206 umove(tcp, data, &filter_off)) {
211 tprintf("{filter_off=%" PRIu64, filter_off);
218 case PTRACE_PEEKDATA:
219 case PTRACE_PEEKTEXT:
220 case PTRACE_PEEKUSER:
222 case PTRACE_GETEVENTMSG:
223 case PTRACE_GETREGSET:
224 case PTRACE_GETSIGINFO:
225 case PTRACE_GETSIGMASK:
226 case PTRACE_PEEKSIGINFO:
227 case PTRACE_SECCOMP_GET_FILTER:
228 case PTRACE_GET_SYSCALL_INFO:
230 /* print data on exiting syscall */
233 ATTRIBUTE_FALLTHROUGH;
243 case PTRACE_PEEKDATA:
244 case PTRACE_PEEKTEXT:
245 case PTRACE_PEEKUSER:
246 printnum_ptr(tcp, data);
249 case PTRACE_GETEVENTMSG:
250 printnum_ulong(tcp, data);
252 case PTRACE_GETREGSET:
253 tprint_iov(tcp, /*len:*/ 1, data, IOV_DECODE_ADDR);
255 case PTRACE_GETSIGINFO:
256 printsiginfo_at(tcp, data);
258 case PTRACE_GETSIGMASK:
259 print_sigset_addr_len(tcp, data, addr);
261 case PTRACE_PEEKSIGINFO:
262 print_siginfo_array(tcp, data, tcp->u_rval);
264 case PTRACE_SECCOMP_GET_FILTER:
265 print_seccomp_fprog(tcp, data, tcp->u_rval);
267 case PTRACE_SECCOMP_GET_METADATA: {
268 const size_t offset = sizeof(uint64_t);
270 size_t ret_size = MIN((kernel_ulong_t) tcp->u_rval,
271 offset + sizeof(flags));
273 if (syserror(tcp) || ret_size <= offset) {
278 if (umoven(tcp, data + offset, ret_size - offset,
285 printflags64(seccomp_filter_flags, flags,
286 "SECCOMP_FILTER_FLAG_???");
288 if ((kernel_ulong_t) tcp->u_rval > ret_size)
294 case PTRACE_GET_SYSCALL_INFO:
295 print_ptrace_syscall_info(tcp, data, addr);