2 * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3 * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4 * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
5 * Copyright (c) 1996-1999 Wichert Akkerman <wichert@cistron.nl>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. The name of the author may not be used to endorse or promote products
17 * derived from this software without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
20 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
21 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
23 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
24 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35 #include <sys/types.h>
39 #include <sys/param.h>
41 #include <sys/resource.h>
51 # include <asm/unistd.h>
52 # if defined __NR_tgkill
53 # define my_tgkill(pid, tid, sig) syscall(__NR_tgkill, (pid), (tid), (sig))
54 # elif defined __NR_tkill
55 # define my_tgkill(pid, tid, sig) syscall(__NR_tkill, (tid), (sig))
57 /* kill() may choose arbitrarily the target task of the process group
58 while we later wait on a that specific TID. PID process waits become
59 TID task specific waits for a process under ptrace(2). */
60 # warning "Neither tkill(2) nor tgkill(2) available, risk of strace hangs!"
61 # define my_tgkill(pid, tid, sig) kill((tid), (sig))
65 #if defined(IA64) && defined(LINUX)
66 # include <asm/ptrace_offsets.h>
74 #include <sys/stropts.h>
81 extern char **environ;
86 int debug = 0, followfork = 0;
87 unsigned int ptrace_setoptions = 0;
88 /* Which WSTOPSIG(status) value marks syscall traps? */
89 static unsigned int syscall_trap_sig = SIGTRAP;
90 int dtime = 0, xflag = 0, qflag = 0;
91 cflag_t cflag = CFLAG_NONE;
92 static int iflag = 0, interactive = 0, pflag_seen = 0, rflag = 0, tflag = 0;
94 * daemonized_tracer supports -D option.
95 * With this option, strace forks twice.
96 * Unlike normal case, with -D *grandparent* process exec's,
97 * becoming a traced process. Child exits (this prevents traced process
98 * from having children it doesn't expect to have), and grandchild
99 * attaches to grandparent similarly to strace -p PID.
100 * This allows for more transparent interaction in cases
101 * when process and its parent are communicating via signals,
102 * wait() etc. Without -D, strace process gets lodged in between,
103 * disrupting parent<->child link.
105 static bool daemonized_tracer = 0;
107 /* Sometimes we want to print only succeeding syscalls. */
108 int not_failing_only = 0;
110 /* Show path associated with fd arguments */
111 int show_fd_path = 0;
113 /* are we filtering traces based on paths? */
114 int tracing_paths = 0;
116 static int exit_code = 0;
117 static int strace_child = 0;
118 static int strace_tracer_pid = 0;
120 static char *username = NULL;
124 int acolumn = DEFAULT_ACOLUMN;
125 int max_strlen = DEFAULT_STRLEN;
126 static char *outfname = NULL;
130 unsigned int nprocs, tcbtabsize;
131 const char *progname;
132 extern char **environ;
134 static int detach(struct tcb *tcp, int sig);
135 static int trace(void);
136 static void cleanup(void);
137 static void interrupt(int sig);
138 static sigset_t empty_set, blocked_set;
140 #ifdef HAVE_SIG_ATOMIC_T
141 static volatile sig_atomic_t interrupted;
142 #else /* !HAVE_SIG_ATOMIC_T */
143 static volatile int interrupted;
144 #endif /* !HAVE_SIG_ATOMIC_T */
148 static struct tcb *pfd2tcb(int pfd);
149 static void reaper(int sig);
150 static void rebuild_pollv(void);
151 static struct pollfd *pollv;
153 #ifndef HAVE_POLLABLE_PROCFS
155 static void proc_poll_open(void);
156 static void proc_poller(int pfd);
164 static int poller_pid;
165 static int proc_poll_pipe[2] = { -1, -1 };
167 #endif /* !HAVE_POLLABLE_PROCFS */
169 #ifdef HAVE_MP_PROCFS
170 #define POLLWANT POLLWRNORM
172 #define POLLWANT POLLPRI
174 #endif /* USE_PROCFS */
182 usage: strace [-CdDffhiqrtttTvVxxy] [-a column] [-e expr] ... [-o file]\n\
183 [-p pid] ... [-s strsize] [-u username] [-E var=val] ...\n\
184 [-P path] [command [arg ...]]\n\
185 or: strace -c [-D] [-e expr] ... [-O overhead] [-S sortby] [-E var=val] ...\n\
186 [command [arg ...]]\n\
187 -c -- count time, calls, and errors for each syscall and report summary\n\
188 -C -- like -c but also print regular output while processes are running\n\
189 -f -- follow forks, -ff -- with output into separate files\n\
190 -F -- attempt to follow vforks, -h -- print help message\n\
191 -i -- print instruction pointer at time of syscall\n\
192 -q -- suppress messages about attaching, detaching, etc.\n\
193 -r -- print relative timestamp, -t -- absolute timestamp, -tt -- with usecs\n\
194 -T -- print time spent in each syscall, -V -- print version\n\
195 -v -- verbose mode: print unabbreviated argv, stat, termio[s], etc. args\n\
196 -x -- print non-ascii strings in hex, -xx -- print all strings in hex\n\
197 -y -- print paths associated with file descriptor arguments\n\
198 -a column -- alignment COLUMN for printing syscall results (default %d)\n\
199 -e expr -- a qualifying expression: option=[!]all or option=[!]val1[,val2]...\n\
200 options: trace, abbrev, verbose, raw, signal, read, or write\n\
201 -o file -- send trace output to FILE instead of stderr\n\
202 -O overhead -- set overhead for tracing syscalls to OVERHEAD usecs\n\
203 -p pid -- trace process with process id PID, may be repeated\n\
204 -D -- run tracer process as a detached grandchild, not as parent\n\
205 -s strsize -- limit length of print strings to STRSIZE chars (default %d)\n\
206 -S sortby -- sort syscall counts by: time, calls, name, nothing (default %s)\n\
207 -u username -- run command as username handling setuid and/or setgid\n\
208 -E var=val -- put var=val in the environment for command\n\
209 -E var -- remove var from the environment for command\n\
210 -P path -- trace accesses to path\n\
211 " /* this is broken, so don't document it
212 -z -- print only succeeding syscalls\n\
214 , DEFAULT_ACOLUMN, DEFAULT_STRLEN, DEFAULT_SORTBY);
218 static void die(void) __attribute__ ((noreturn));
219 static void die(void)
221 if (strace_tracer_pid == getpid()) {
228 static void verror_msg(int err_no, const char *fmt, va_list p)
231 fprintf(stderr, "%s: ", progname);
232 vfprintf(stderr, fmt, p);
234 fprintf(stderr, ": %s\n", strerror(err_no));
240 void error_msg(const char *fmt, ...)
244 verror_msg(0, fmt, p);
248 void error_msg_and_die(const char *fmt, ...)
252 verror_msg(0, fmt, p);
256 void perror_msg(const char *fmt, ...)
260 verror_msg(errno, fmt, p);
264 void perror_msg_and_die(const char *fmt, ...)
268 verror_msg(errno, fmt, p);
281 /* Glue for systems without a MMU that cannot provide fork() */
283 # define strace_vforked 0
285 # define strace_vforked 1
286 # define fork() vfork()
290 set_cloexec_flag(int fd)
294 if ((flags = fcntl(fd, F_GETFD, 0)) < 0)
296 fprintf(stderr, "%s: fcntl F_GETFD: %s\n",
297 progname, strerror(errno));
301 newflags = flags | FD_CLOEXEC;
302 if (flags == newflags)
305 if (fcntl(fd, F_SETFD, newflags) < 0)
307 fprintf(stderr, "%s: fcntl F_SETFD: %s\n",
308 progname, strerror(errno));
316 * When strace is setuid executable, we have to swap uids
317 * before and after filesystem and process management operations.
323 int euid = geteuid(), uid = getuid();
325 if (euid != uid && setreuid(euid, uid) < 0)
327 fprintf(stderr, "%s: setreuid: %s\n",
328 progname, strerror(errno));
335 # define fopen_for_output fopen64
337 # define fopen_for_output fopen
341 strace_fopen(const char *path, const char *mode)
346 if ((fp = fopen_for_output(path, mode)) == NULL)
347 fprintf(stderr, "%s: can't fopen '%s': %s\n",
348 progname, path, strerror(errno));
350 if (fp && set_cloexec_flag(fileno(fp)) < 0)
358 static int popen_pid = -1;
361 # define _PATH_BSHELL "/bin/sh"
365 * We cannot use standard popen(3) here because we have to distinguish
366 * popen child process from other processes we trace, and standard popen(3)
367 * does not export its child's pid.
370 strace_popen(const char *command)
377 fprintf(stderr, "%s: pipe: %s\n",
378 progname, strerror(errno));
383 if (set_cloexec_flag(fds[1]) < 0)
391 if ((popen_pid = fork()) == -1)
393 fprintf(stderr, "%s: fork: %s\n",
394 progname, strerror(errno));
406 return fdopen(fds[1], "w");
411 if (fds[0] && (dup2(fds[0], 0) || close(fds[0])))
413 fprintf(stderr, "%s: dup2: %s\n",
414 progname, strerror(errno));
417 execl(_PATH_BSHELL, "sh", "-c", command, NULL);
418 fprintf(stderr, "%s: execl: %s: %s\n",
419 progname, _PATH_BSHELL, strerror(errno));
425 newoutf(struct tcb *tcp)
427 if (outfname && followfork > 1) {
428 char name[520 + sizeof(int) * 3];
431 sprintf(name, "%.512s.%u", outfname, tcp->pid);
432 if ((fp = strace_fopen(name, "w")) == NULL)
446 * Block user interruptions as we would leave the traced
447 * process stopped (process state T) if we would terminate in
448 * between PTRACE_ATTACH and wait4 () on SIGSTOP.
449 * We rely on cleanup() from this point on.
452 sigprocmask(SIG_BLOCK, &blocked_set, NULL);
454 if (daemonized_tracer) {
459 if (pid) { /* parent */
461 * Wait for grandchild to attach to straced process
462 * (grandparent). Grandchild SIGKILLs us after it attached.
463 * Grandparent's wait() is unblocked by our death,
464 * it proceeds to exec the straced program.
467 _exit(0); /* paranoia */
470 /* We will be the tracer process. Remember our new pid: */
471 strace_tracer_pid = getpid();
474 for (tcbi = 0; tcbi < tcbtabsize; tcbi++) {
476 if (!(tcp->flags & TCB_INUSE) || !(tcp->flags & TCB_ATTACHED))
479 if (tcp->flags & TCB_CLONE_THREAD)
482 /* Reinitialize the output since it may have changed. */
484 if (newoutf(tcp) < 0)
488 if (proc_open(tcp, 1) < 0) {
489 fprintf(stderr, "trouble opening proc file\n");
493 #else /* !USE_PROCFS */
495 if (followfork && !daemonized_tracer) {
496 char procdir[sizeof("/proc/%d/task") + sizeof(int) * 3];
499 sprintf(procdir, "/proc/%d/task", tcp->pid);
500 dir = opendir(procdir);
502 unsigned int ntid = 0, nerr = 0;
505 while ((de = readdir(dir)) != NULL) {
506 if (de->d_fileno == 0)
508 tid = atoi(de->d_name);
512 if (ptrace(PTRACE_ATTACH, tid, (char *) 1, 0) < 0)
514 else if (tid != tcbtab[tcbi]->pid) {
516 tcp->flags |= TCB_ATTACHED|TCB_CLONE_THREAD|TCB_FOLLOWFORK;
517 tcbtab[tcbi]->nclone_threads++;
518 tcp->parent = tcbtab[tcbi];
521 sigprocmask(SIG_SETMASK, &empty_set, NULL);
524 sigprocmask(SIG_BLOCK, &blocked_set, NULL);
530 perror("attach: ptrace(PTRACE_ATTACH, ...)");
535 fprintf(stderr, ntid > 1
536 ? "Process %u attached with %u threads - interrupt to quit\n"
537 : "Process %u attached - interrupt to quit\n",
538 tcbtab[tcbi]->pid, ntid);
541 } /* if (opendir worked) */
544 if (ptrace(PTRACE_ATTACH, tcp->pid, (char *) 1, 0) < 0) {
545 perror("attach: ptrace(PTRACE_ATTACH, ...)");
549 /* INTERRUPTED is going to be checked at the top of TRACE. */
551 if (daemonized_tracer) {
553 * It is our grandparent we trace, not a -p PID.
554 * Don't want to just detach on exit, so...
556 tcp->flags &= ~TCB_ATTACHED;
558 * Make parent go away.
559 * Also makes grandparent's wait() unblock.
561 kill(getppid(), SIGKILL);
564 #endif /* !USE_PROCFS */
567 "Process %u attached - interrupt to quit\n",
572 sigprocmask(SIG_SETMASK, &empty_set, NULL);
576 startup_child(char **argv)
579 const char *filename;
580 char pathname[MAXPATHLEN];
585 if (strchr(filename, '/')) {
586 if (strlen(filename) > sizeof pathname - 1) {
587 errno = ENAMETOOLONG;
588 perror("strace: exec");
591 strcpy(pathname, filename);
593 #ifdef USE_DEBUGGING_EXEC
595 * Debuggers customarily check the current directory
596 * first regardless of the path but doing that gives
597 * security geeks a panic attack.
599 else if (stat(filename, &statbuf) == 0)
600 strcpy(pathname, filename);
601 #endif /* USE_DEBUGGING_EXEC */
606 for (path = getenv("PATH"); path && *path; path += m) {
607 if (strchr(path, ':')) {
608 n = strchr(path, ':') - path;
612 m = n = strlen(path);
614 if (!getcwd(pathname, MAXPATHLEN))
616 len = strlen(pathname);
618 else if (n > sizeof pathname - 1)
621 strncpy(pathname, path, n);
624 if (len && pathname[len - 1] != '/')
625 pathname[len++] = '/';
626 strcpy(pathname + len, filename);
627 if (stat(pathname, &statbuf) == 0 &&
628 /* Accept only regular files
629 with some execute bits set.
630 XXX not perfect, might still fail */
631 S_ISREG(statbuf.st_mode) &&
632 (statbuf.st_mode & 0111))
636 if (stat(pathname, &statbuf) < 0) {
637 fprintf(stderr, "%s: %s: command not found\n",
641 strace_child = pid = fork();
643 perror("strace: fork");
647 if ((pid != 0 && daemonized_tracer) /* -D: parent to become a traced process */
648 || (pid == 0 && !daemonized_tracer) /* not -D: child to become a traced process */
652 if (outf != stderr) close(fileno(outf));
654 /* Kludge for SGI, see proc_open for details. */
655 sa.sa_handler = foobar;
657 sigemptyset(&sa.sa_mask);
658 sigaction(SIGINT, &sa, NULL);
663 kill(pid, SIGSTOP); /* stop HERE */
665 #else /* !USE_PROCFS */
669 if (!daemonized_tracer) {
670 if (ptrace(PTRACE_TRACEME, 0, (char *) 1, 0) < 0) {
671 perror("strace: ptrace(PTRACE_TRACEME, ...)");
678 if (username != NULL || geteuid() == 0) {
679 uid_t run_euid = run_uid;
680 gid_t run_egid = run_gid;
682 if (statbuf.st_mode & S_ISUID)
683 run_euid = statbuf.st_uid;
684 if (statbuf.st_mode & S_ISGID)
685 run_egid = statbuf.st_gid;
688 * It is important to set groups before we
689 * lose privileges on setuid.
691 if (username != NULL) {
692 if (initgroups(username, run_gid) < 0) {
693 perror("initgroups");
696 if (setregid(run_gid, run_egid) < 0) {
700 if (setreuid(run_uid, run_euid) < 0) {
707 setreuid(run_uid, run_uid);
709 if (!daemonized_tracer) {
711 * Induce an immediate stop so that the parent
712 * will resume us with PTRACE_SYSCALL and display
713 * this execve call normally.
714 * Unless of course we're on a no-MMU system where
715 * we vfork()-ed, so we cannot stop the child.
718 kill(getpid(), SIGSTOP);
720 struct sigaction sv_sigchld;
721 sigaction(SIGCHLD, NULL, &sv_sigchld);
723 * Make sure it is not SIG_IGN, otherwise wait
726 signal(SIGCHLD, SIG_DFL);
728 * Wait for grandchild to attach to us.
729 * It kills child after that, and wait() unblocks.
734 sigaction(SIGCHLD, &sv_sigchld, NULL);
736 #endif /* !USE_PROCFS */
738 execv(pathname, argv);
739 perror("strace: exec");
743 /* We are the tracer. */
744 /* With -D, we are *child* here, IOW: different pid. Fetch it. */
745 strace_tracer_pid = getpid();
747 tcp = alloctcb(daemonized_tracer ? getppid() : pid);
748 if (daemonized_tracer) {
749 /* We want subsequent startup_attach() to attach to it. */
750 tcp->flags |= TCB_ATTACHED;
753 if (proc_open(tcp, 0) < 0) {
754 fprintf(stderr, "trouble opening proc file\n");
758 #endif /* USE_PROCFS */
763 * Test whether the kernel support PTRACE_O_TRACECLONE et al options.
764 * First fork a new child, call ptrace with PTRACE_SETOPTIONS on it,
765 * and then see which options are supported by the kernel.
768 test_ptrace_setoptions_followfork(void)
770 int pid, expected_grandchild = 0, found_grandchild = 0;
771 const unsigned int test_options = PTRACE_O_TRACECLONE |
775 if ((pid = fork()) < 0)
778 if (ptrace(PTRACE_TRACEME, 0, (char *)1, 0) < 0)
780 kill(getpid(), SIGSTOP);
785 int status, tracee_pid;
787 tracee_pid = wait(&status);
788 if (tracee_pid == -1) {
791 else if (errno == ECHILD)
793 perror("test_ptrace_setoptions_followfork");
796 if (tracee_pid != pid) {
797 found_grandchild = tracee_pid;
798 if (ptrace(PTRACE_CONT, tracee_pid, 0, 0) < 0 &&
800 kill(tracee_pid, SIGKILL);
802 else if (WIFSTOPPED(status)) {
803 switch (WSTOPSIG(status)) {
805 if (ptrace(PTRACE_SETOPTIONS, pid,
806 NULL, test_options) < 0) {
812 if (status >> 16 == PTRACE_EVENT_FORK) {
815 if (ptrace(PTRACE_GETEVENTMSG, pid,
816 NULL, (long) &msg) == 0)
817 expected_grandchild = msg;
821 if (ptrace(PTRACE_SYSCALL, pid, 0, 0) < 0 &&
826 if (expected_grandchild && expected_grandchild == found_grandchild)
827 ptrace_setoptions |= test_options;
832 * Test whether the kernel support PTRACE_O_TRACESYSGOOD.
833 * First fork a new child, call ptrace(PTRACE_SETOPTIONS) on it,
834 * and then see whether it will stop with (SIGTRAP | 0x80).
836 * Use of this option enables correct handling of user-generated SIGTRAPs,
837 * and SIGTRAPs generated by special instructions such as int3 on x86:
838 * _start: .globl _start
843 * (compile with: "gcc -nostartfiles -nostdlib -o int3 int3.S")
846 test_ptrace_setoptions_for_all(void)
848 const unsigned int test_options = PTRACE_O_TRACESYSGOOD | PTRACE_O_TRACEEXEC;
854 perror_msg_and_die("fork");
858 if (ptrace(PTRACE_TRACEME, 0L, 0L, 0L) < 0)
859 /* Note: exits with exitcode 1 */
860 perror_msg_and_die("%s: PTRACE_TRACEME doesn't work", __func__);
862 _exit(0); /* parent should see entry into this syscall */
866 int status, tracee_pid;
869 tracee_pid = wait(&status);
870 if (tracee_pid <= 0) {
874 perror_msg_and_die("%s: unexpected wait result %d", __func__, tracee_pid);
876 if (WIFEXITED(status)) {
877 if (WEXITSTATUS(status) == 0)
879 /* PTRACE_TRACEME failed in child. This is fatal. */
882 if (!WIFSTOPPED(status)) {
884 error_msg_and_die("%s: unexpected wait status %x", __func__, status);
886 if (WSTOPSIG(status) == SIGSTOP) {
888 * We don't check "options aren't accepted" error.
889 * If it happens, we'll never get (SIGTRAP | 0x80),
890 * and thus will decide to not use the option.
891 * IOW: the outcome of the test will be correct.
893 if (ptrace(PTRACE_SETOPTIONS, pid, 0L, test_options) < 0)
895 perror_msg("PTRACE_SETOPTIONS");
897 if (WSTOPSIG(status) == (SIGTRAP | 0x80)) {
900 if (ptrace(PTRACE_SYSCALL, pid, 0L, 0L) < 0) {
902 perror_msg_and_die("PTRACE_SYSCALL doesn't work");
907 syscall_trap_sig = (SIGTRAP | 0x80);
908 ptrace_setoptions |= test_options;
910 fprintf(stderr, "ptrace_setoptions = %#x\n",
916 "Test for PTRACE_O_TRACESYSGOOD failed, giving up using this feature.\n");
921 main(int argc, char *argv[])
928 static char buf[BUFSIZ];
930 progname = argv[0] ? argv[0] : "strace";
932 strace_tracer_pid = getpid();
934 /* Allocate the initial tcbtab. */
935 tcbtabsize = argc; /* Surely enough for all -p args. */
936 if ((tcbtab = calloc(tcbtabsize, sizeof tcbtab[0])) == NULL) {
937 fprintf(stderr, "%s: out of memory\n", progname);
940 if ((tcbtab[0] = calloc(tcbtabsize, sizeof tcbtab[0][0])) == NULL) {
941 fprintf(stderr, "%s: out of memory\n", progname);
944 for (tcp = tcbtab[0]; tcp < &tcbtab[0][tcbtabsize]; ++tcp)
945 tcbtab[tcp - tcbtab[0]] = &tcbtab[0][tcp - tcbtab[0]];
949 set_sortby(DEFAULT_SORTBY);
950 set_personality(DEFAULT_PERSONALITY);
951 qualify("trace=all");
952 qualify("abbrev=all");
953 qualify("verbose=all");
954 qualify("signal=all");
955 while ((c = getopt(argc, argv,
960 "a:e:o:O:p:s:S:u:E:P:")) != EOF) {
963 if (cflag == CFLAG_BOTH) {
964 fprintf(stderr, "%s: -c and -C are mutually exclusive options\n",
968 cflag = CFLAG_ONLY_STATS;
971 if (cflag == CFLAG_ONLY_STATS) {
972 fprintf(stderr, "%s: -c and -C are mutually exclusive options\n",
983 daemonized_tracer = 1;
1018 qualify("abbrev=none");
1021 printf("%s -- version %s\n", PACKAGE_NAME, VERSION);
1025 not_failing_only = 1;
1028 acolumn = atoi(optarg);
1034 outfname = strdup(optarg);
1037 set_overhead(atoi(optarg));
1040 if ((pid = atoi(optarg)) <= 0) {
1041 fprintf(stderr, "%s: Invalid process id: %s\n",
1045 if (pid == strace_tracer_pid) {
1046 fprintf(stderr, "%s: I'm sorry, I can't let you do that, Dave.\n", progname);
1049 tcp = alloc_tcb(pid, 0);
1050 tcp->flags |= TCB_ATTACHED;
1055 if (pathtrace_select(optarg)) {
1056 fprintf(stderr, "%s : failed to select path '%s'\n", progname, optarg);
1061 max_strlen = atoi(optarg);
1062 if (max_strlen < 0) {
1064 "%s: invalid -s argument: %s\n",
1073 username = strdup(optarg);
1076 if (putenv(optarg) < 0) {
1077 fprintf(stderr, "%s: out of memory\n",
1088 if ((optind == argc) == !pflag_seen)
1091 if (pflag_seen && daemonized_tracer) {
1093 "%s: -D and -p are mutually exclusive options\n",
1101 if (followfork > 1 && cflag) {
1103 "%s: (-c or -C) and -ff are mutually exclusive options\n",
1108 /* See if they want to run as another user. */
1109 if (username != NULL) {
1110 struct passwd *pent;
1112 if (getuid() != 0 || geteuid() != 0) {
1114 "%s: you must be root to use the -u option\n",
1118 if ((pent = getpwnam(username)) == NULL) {
1119 fprintf(stderr, "%s: cannot find user `%s'\n",
1120 progname, username);
1123 run_uid = pent->pw_uid;
1124 run_gid = pent->pw_gid;
1133 if (test_ptrace_setoptions_followfork() < 0) {
1135 "Test for options supported by PTRACE_SETOPTIONS "
1136 "failed, giving up using this feature.\n");
1137 ptrace_setoptions = 0;
1140 fprintf(stderr, "ptrace_setoptions = %#x\n",
1143 test_ptrace_setoptions_for_all();
1146 /* Check if they want to redirect the output. */
1148 /* See if they want to pipe the output. */
1149 if (outfname[0] == '|' || outfname[0] == '!') {
1151 * We can't do the <outfname>.PID funny business
1152 * when using popen, so prohibit it.
1154 if (followfork > 1) {
1156 %s: piping the output and -ff are mutually exclusive options\n",
1161 if ((outf = strace_popen(outfname + 1)) == NULL)
1164 else if (followfork <= 1 &&
1165 (outf = strace_fopen(outfname, "w")) == NULL)
1169 if (!outfname || outfname[0] == '|' || outfname[0] == '!')
1170 setvbuf(outf, buf, _IOLBF, BUFSIZ);
1171 if (outfname && optind < argc) {
1176 /* Valid states here:
1177 optind < argc pflag_seen outfname interactive
1184 /* STARTUP_CHILD must be called before the signal handlers get
1185 installed below as they are inherited into the spawned process.
1186 Also we do not need to be protected by them as during interruption
1187 in the STARTUP_CHILD mode we kill the spawned process anyway. */
1189 startup_child(&argv[optind]);
1191 sigemptyset(&empty_set);
1192 sigemptyset(&blocked_set);
1193 sa.sa_handler = SIG_IGN;
1194 sigemptyset(&sa.sa_mask);
1196 sigaction(SIGTTOU, &sa, NULL);
1197 sigaction(SIGTTIN, &sa, NULL);
1199 sigaddset(&blocked_set, SIGHUP);
1200 sigaddset(&blocked_set, SIGINT);
1201 sigaddset(&blocked_set, SIGQUIT);
1202 sigaddset(&blocked_set, SIGPIPE);
1203 sigaddset(&blocked_set, SIGTERM);
1204 sa.sa_handler = interrupt;
1206 /* POSIX signals on sunos4.1 are a little broken. */
1207 sa.sa_flags = SA_INTERRUPT;
1210 sigaction(SIGHUP, &sa, NULL);
1211 sigaction(SIGINT, &sa, NULL);
1212 sigaction(SIGQUIT, &sa, NULL);
1213 sigaction(SIGPIPE, &sa, NULL);
1214 sigaction(SIGTERM, &sa, NULL);
1216 sa.sa_handler = reaper;
1217 sigaction(SIGCHLD, &sa, NULL);
1219 /* Make sure SIGCHLD has the default action so that waitpid
1220 definitely works without losing track of children. The user
1221 should not have given us a bogus state to inherit, but he might
1222 have. Arguably we should detect SIG_IGN here and pass it on
1223 to children, but probably noone really needs that. */
1224 sa.sa_handler = SIG_DFL;
1225 sigaction(SIGCHLD, &sa, NULL);
1226 #endif /* USE_PROCFS */
1228 if (pflag_seen || daemonized_tracer)
1235 if (exit_code > 0xff) {
1236 /* Child was killed by a signal, mimic that. */
1238 signal(exit_code, SIG_DFL);
1240 /* Paranoia - what if this signal is not fatal?
1241 Exit with 128 + signo then. */
1250 /* Allocate some more TCBs and expand the table.
1251 We don't want to relocate the TCBs because our
1252 callers have pointers and it would be a pain.
1253 So tcbtab is a table of pointers. Since we never
1254 free the TCBs, we allocate a single chunk of many. */
1256 struct tcb *newtcbs = calloc(tcbtabsize, sizeof(newtcbs[0]));
1257 struct tcb **newtab = realloc(tcbtab, tcbtabsize * 2 * sizeof(tcbtab[0]));
1258 if (newtab == NULL || newtcbs == NULL)
1259 error_msg_and_die("expand_tcbtab: out of memory");
1262 while (i < tcbtabsize)
1263 tcbtab[i++] = newtcbs++;
1267 alloc_tcb(int pid, int command_options_parsed)
1272 if (nprocs == tcbtabsize)
1275 for (i = 0; i < tcbtabsize; i++) {
1277 if ((tcp->flags & TCB_INUSE) == 0) {
1278 memset(tcp, 0, sizeof(*tcp));
1280 tcp->flags = TCB_INUSE | TCB_STARTUP;
1281 tcp->outf = outf; /* Initialise to current out file */
1284 if (command_options_parsed)
1289 error_msg_and_die("bug in alloc_tcb");
1294 proc_open(struct tcb *tcp, int attaching)
1304 #ifndef HAVE_POLLABLE_PROCFS
1305 static int last_pfd;
1308 #ifdef HAVE_MP_PROCFS
1309 /* Open the process pseudo-files in /proc. */
1310 sprintf(proc, "/proc/%d/ctl", tcp->pid);
1311 if ((tcp->pfd = open(proc, O_WRONLY|O_EXCL)) < 0) {
1312 perror("strace: open(\"/proc/...\", ...)");
1315 if (set_cloexec_flag(tcp->pfd) < 0) {
1318 sprintf(proc, "/proc/%d/status", tcp->pid);
1319 if ((tcp->pfd_stat = open(proc, O_RDONLY|O_EXCL)) < 0) {
1320 perror("strace: open(\"/proc/...\", ...)");
1323 if (set_cloexec_flag(tcp->pfd_stat) < 0) {
1326 sprintf(proc, "/proc/%d/as", tcp->pid);
1327 if ((tcp->pfd_as = open(proc, O_RDONLY|O_EXCL)) < 0) {
1328 perror("strace: open(\"/proc/...\", ...)");
1331 if (set_cloexec_flag(tcp->pfd_as) < 0) {
1335 /* Open the process pseudo-file in /proc. */
1337 sprintf(proc, "/proc/%d", tcp->pid);
1338 tcp->pfd = open(proc, O_RDWR|O_EXCL);
1340 sprintf(proc, "/proc/%d/mem", tcp->pid);
1341 tcp->pfd = open(proc, O_RDWR);
1342 #endif /* FREEBSD */
1344 perror("strace: open(\"/proc/...\", ...)");
1347 if (set_cloexec_flag(tcp->pfd) < 0) {
1352 sprintf(proc, "/proc/%d/regs", tcp->pid);
1353 if ((tcp->pfd_reg = open(proc, O_RDONLY)) < 0) {
1354 perror("strace: open(\"/proc/.../regs\", ...)");
1358 sprintf(proc, "/proc/%d/status", tcp->pid);
1359 if ((tcp->pfd_status = open(proc, O_RDONLY)) < 0) {
1360 perror("strace: open(\"/proc/.../status\", ...)");
1364 tcp->pfd_status = -1;
1365 #endif /* FREEBSD */
1369 * Wait for the child to pause. Because of a race
1370 * condition we have to poll for the event.
1373 if (IOCTL_STATUS(tcp) < 0) {
1374 perror("strace: PIOCSTATUS");
1377 if (tcp->status.PR_FLAGS & PR_ASLEEP)
1382 /* Stop the process so that we own the stop. */
1383 if (IOCTL(tcp->pfd, PIOCSTOP, (char *)NULL) < 0) {
1384 perror("strace: PIOCSTOP");
1389 /* Set Run-on-Last-Close. */
1391 if (IOCTL(tcp->pfd, PIOCSET, &arg) < 0) {
1392 perror("PIOCSET PR_RLC");
1395 /* Set or Reset Inherit-on-Fork. */
1397 if (IOCTL(tcp->pfd, followfork ? PIOCSET : PIOCRESET, &arg) < 0) {
1398 perror("PIOC{SET,RESET} PR_FORK");
1401 #else /* !PIOCSET */
1403 if (ioctl(tcp->pfd, PIOCSRLC) < 0) {
1407 if (ioctl(tcp->pfd, followfork ? PIOCSFORK : PIOCRFORK) < 0) {
1408 perror("PIOC{S,R}FORK");
1412 /* just unset the PF_LINGER flag for the Run-on-Last-Close. */
1413 if (ioctl(tcp->pfd, PIOCGFL, &arg) < 0) {
1418 if (ioctl(tcp->pfd, PIOCSFL, arg) < 0) {
1422 #endif /* FREEBSD */
1423 #endif /* !PIOCSET */
1425 /* Enable all syscall entries we care about. */
1426 premptyset(&syscalls);
1427 for (i = 1; i < MAX_QUALS; ++i) {
1428 if (i > (sizeof syscalls) * CHAR_BIT) break;
1429 if (qual_flags[i] & QUAL_TRACE) praddset(&syscalls, i);
1431 praddset(&syscalls, SYS_execve);
1433 praddset(&syscalls, SYS_fork);
1435 praddset(&syscalls, SYS_forkall);
1438 praddset(&syscalls, SYS_fork1);
1441 praddset(&syscalls, SYS_rfork1);
1444 praddset(&syscalls, SYS_rforkall);
1447 if (IOCTL(tcp->pfd, PIOCSENTRY, &syscalls) < 0) {
1448 perror("PIOCSENTRY");
1451 /* Enable the syscall exits. */
1452 if (IOCTL(tcp->pfd, PIOCSEXIT, &syscalls) < 0) {
1456 /* Enable signals we care about. */
1457 premptyset(&signals);
1458 for (i = 1; i < MAX_QUALS; ++i) {
1459 if (i > (sizeof signals) * CHAR_BIT) break;
1460 if (qual_flags[i] & QUAL_SIGNAL) praddset(&signals, i);
1462 if (IOCTL(tcp->pfd, PIOCSTRACE, &signals) < 0) {
1463 perror("PIOCSTRACE");
1466 /* Enable faults we care about */
1467 premptyset(&faults);
1468 for (i = 1; i < MAX_QUALS; ++i) {
1469 if (i > (sizeof faults) * CHAR_BIT) break;
1470 if (qual_flags[i] & QUAL_FAULT) praddset(&faults, i);
1472 if (IOCTL(tcp->pfd, PIOCSFAULT, &faults) < 0) {
1473 perror("PIOCSFAULT");
1477 /* set events flags. */
1478 arg = S_SIG | S_SCE | S_SCX;
1479 if (ioctl(tcp->pfd, PIOCBIS, arg) < 0) {
1483 #endif /* FREEBSD */
1487 * The SGI PRSABORT doesn't work for pause() so
1488 * we send it a caught signal to wake it up.
1490 kill(tcp->pid, SIGINT);
1493 /* The child is in a pause(), abort it. */
1495 if (IOCTL(tcp->pfd, PIOCRUN, &arg) < 0) {
1502 /* wake up the child if it received the SIGSTOP */
1503 kill(tcp->pid, SIGCONT);
1506 /* Wait for the child to do something. */
1507 if (IOCTL_WSTOP(tcp) < 0) {
1508 perror("PIOCWSTOP");
1511 if (tcp->status.PR_WHY == PR_SYSENTRY) {
1512 tcp->flags &= ~TCB_INSYSCALL;
1514 if (known_scno(tcp) == SYS_execve)
1517 /* Set it running: maybe execve will be next. */
1520 if (IOCTL(tcp->pfd, PIOCRUN, &arg) < 0) {
1522 if (IOCTL(tcp->pfd, PIOCRUN, 0) < 0) {
1523 #endif /* FREEBSD */
1528 /* handle the case where we "opened" the child before
1529 it did the kill -STOP */
1530 if (tcp->status.PR_WHY == PR_SIGNALLED &&
1531 tcp->status.PR_WHAT == SIGSTOP)
1532 kill(tcp->pid, SIGCONT);
1539 if (attaching < 2) {
1540 /* We are attaching to an already running process.
1541 * Try to figure out the state of the process in syscalls,
1542 * to handle the first event well.
1543 * This is done by having a look at the "wchan" property of the
1544 * process, which tells where it is stopped (if it is). */
1546 char wchan[20]; /* should be enough */
1548 sprintf(proc, "/proc/%d/status", tcp->pid);
1549 status = fopen(proc, "r");
1551 (fscanf(status, "%*s %*d %*d %*d %*d %*d,%*d %*s %*d,%*d"
1552 "%*d,%*d %*d,%*d %19s", wchan) == 1) &&
1553 strcmp(wchan, "nochan") && strcmp(wchan, "spread") &&
1554 strcmp(wchan, "stopevent")) {
1555 /* The process is asleep in the middle of a syscall.
1556 Fake the syscall entry event */
1557 tcp->flags &= ~(TCB_INSYSCALL|TCB_STARTUP);
1558 tcp->status.PR_WHY = PR_SYSENTRY;
1563 } /* otherwise it's a fork being followed */
1565 #endif /* FREEBSD */
1566 #ifndef HAVE_POLLABLE_PROCFS
1567 if (proc_poll_pipe[0] != -1)
1568 proc_poller(tcp->pfd);
1569 else if (nprocs > 1) {
1571 proc_poller(last_pfd);
1572 proc_poller(tcp->pfd);
1574 last_pfd = tcp->pfd;
1575 #endif /* !HAVE_POLLABLE_PROCFS */
1579 #endif /* USE_PROCFS */
1589 for (i = 0; i < tcbtabsize; i++) {
1590 struct tcb *tcp = tcbtab[i];
1591 if (tcp->pid == pid && (tcp->flags & TCB_INUSE))
1601 first_used_tcb(void)
1605 for (i = 0; i < tcbtabsize; i++) {
1607 if (tcp->flags & TCB_INUSE)
1618 for (i = 0; i < tcbtabsize; i++) {
1619 struct tcb *tcp = tcbtab[i];
1620 if (tcp->pfd != pfd)
1622 if (tcp->flags & TCB_INUSE)
1628 #endif /* USE_PROCFS */
1631 droptcb(struct tcb *tcp)
1635 #ifdef TCB_CLONE_THREAD
1636 if (tcp->nclone_threads > 0) {
1637 /* There are other threads left in this process, but this
1638 is the one whose PID represents the whole process.
1639 We need to keep this record around as a zombie until
1640 all the threads die. */
1641 tcp->flags |= TCB_EXITING;
1648 if (tcp->parent != NULL) {
1649 #ifdef TCB_CLONE_THREAD
1650 if (tcp->flags & TCB_CLONE_THREAD)
1651 tcp->parent->nclone_threads--;
1654 /* Update fields like NCLONE_DETACHED, only
1655 for zombie group leader that has already reported
1656 and been short-circuited at the top of this
1657 function. The same condition as at the top of DETACH. */
1658 if ((tcp->flags & TCB_CLONE_THREAD) &&
1659 tcp->parent->nclone_threads == 0 &&
1660 (tcp->parent->flags & TCB_EXITING))
1661 droptcb(tcp->parent);
1667 if (tcp->pfd != -1) {
1671 if (tcp->pfd_reg != -1) {
1672 close(tcp->pfd_reg);
1675 if (tcp->pfd_status != -1) {
1676 close(tcp->pfd_status);
1677 tcp->pfd_status = -1;
1679 #endif /* !FREEBSD */
1681 rebuild_pollv(); /* Note, flags needs to be cleared by now. */
1685 if (outfname && followfork > 1 && tcp->outf)
1691 /* detach traced process; continue with sig
1692 Never call DETACH twice on the same process as both unattached and
1693 attached-unstopped processes give the same ESRCH. For unattached process we
1694 would SIGSTOP it and wait for its SIGSTOP notification forever. */
1697 detach(struct tcb *tcp, int sig)
1701 int status, catch_sigstop;
1702 struct tcb *zombie = NULL;
1704 /* If the group leader is lingering only because of this other
1705 thread now dying, then detach the leader as well. */
1706 if ((tcp->flags & TCB_CLONE_THREAD) &&
1707 tcp->parent->nclone_threads == 1 &&
1708 (tcp->parent->flags & TCB_EXITING))
1709 zombie = tcp->parent;
1712 if (tcp->flags & TCB_BPTSET)
1717 * Linux wrongly insists the child be stopped
1718 * before detaching. Arghh. We go through hoops
1719 * to make a clean break of things.
1722 #undef PTRACE_DETACH
1723 #define PTRACE_DETACH PTRACE_SUNDETACH
1726 * On TCB_STARTUP we did PTRACE_ATTACH but still did not get the
1727 * expected SIGSTOP. We must catch exactly one as otherwise the
1728 * detached process would be left stopped (process state T).
1730 catch_sigstop = (tcp->flags & TCB_STARTUP);
1731 if ((error = ptrace(PTRACE_DETACH, tcp->pid, (char *) 1, sig)) == 0) {
1732 /* On a clear day, you can see forever. */
1734 else if (errno != ESRCH) {
1735 /* Shouldn't happen. */
1736 perror("detach: ptrace(PTRACE_DETACH, ...)");
1738 else if (my_tgkill((tcp->flags & TCB_CLONE_THREAD ? tcp->parent->pid
1742 perror("detach: checking sanity");
1744 else if (!catch_sigstop && my_tgkill((tcp->flags & TCB_CLONE_THREAD
1745 ? tcp->parent->pid : tcp->pid),
1746 tcp->pid, SIGSTOP) < 0) {
1748 perror("detach: stopping child");
1752 if (catch_sigstop) {
1755 if (wait4(tcp->pid, &status, __WALL, NULL) < 0) {
1756 if (errno == ECHILD) /* Already gone. */
1758 if (errno != EINVAL) {
1759 perror("detach: waiting");
1763 /* No __WALL here. */
1764 if (waitpid(tcp->pid, &status, 0) < 0) {
1765 if (errno != ECHILD) {
1766 perror("detach: waiting");
1770 /* If no processes, try clones. */
1771 if (wait4(tcp->pid, &status, __WCLONE,
1773 if (errno != ECHILD)
1774 perror("detach: waiting");
1777 #endif /* __WCLONE */
1782 if (!WIFSTOPPED(status)) {
1783 /* Au revoir, mon ami. */
1786 if (WSTOPSIG(status) == SIGSTOP) {
1787 ptrace_restart(PTRACE_DETACH, tcp, sig);
1790 error = ptrace_restart(PTRACE_CONT, tcp,
1791 WSTOPSIG(status) == syscall_trap_sig ? 0
1792 : WSTOPSIG(status));
1800 /* PTRACE_DETACH won't respect `sig' argument, so we post it here. */
1801 if (sig && kill(tcp->pid, sig) < 0)
1802 perror("detach: kill");
1804 error = ptrace_restart(PTRACE_DETACH, tcp, sig);
1808 fprintf(stderr, "Process %u detached\n", tcp->pid);
1813 if (zombie != NULL) {
1814 /* TCP no longer exists therefore you must not detach() it. */
1824 static void reaper(int sig)
1829 while ((pid = waitpid(-1, &status, WNOHANG)) > 0) {
1833 #endif /* USE_PROCFS */
1841 for (i = 0; i < tcbtabsize; i++) {
1843 if (!(tcp->flags & TCB_INUSE))
1847 "cleanup: looking at pid %u\n", tcp->pid);
1849 (!outfname || followfork < 2 || tcp_last == tcp)) {
1850 tprintf(" <unfinished ...>");
1853 if (tcp->flags & TCB_ATTACHED)
1856 kill(tcp->pid, SIGCONT);
1857 kill(tcp->pid, SIGTERM);
1870 #ifndef HAVE_STRERROR
1872 #if !HAVE_DECL_SYS_ERRLIST
1873 extern int sys_nerr;
1874 extern char *sys_errlist[];
1875 #endif /* HAVE_DECL_SYS_ERRLIST */
1878 strerror(int err_no)
1880 static char buf[64];
1882 if (err_no < 1 || err_no >= sys_nerr) {
1883 sprintf(buf, "Unknown error %d", err_no);
1886 return sys_errlist[err_no];
1889 #endif /* HAVE_STERRROR */
1891 #ifndef HAVE_STRSIGNAL
1893 #if defined HAVE_SYS_SIGLIST && !defined HAVE_DECL_SYS_SIGLIST
1894 extern char *sys_siglist[];
1896 #if defined HAVE_SYS__SIGLIST && !defined HAVE_DECL__SYS_SIGLIST
1897 extern char *_sys_siglist[];
1903 static char buf[64];
1905 if (sig < 1 || sig >= NSIG) {
1906 sprintf(buf, "Unknown signal %d", sig);
1909 #ifdef HAVE__SYS_SIGLIST
1910 return _sys_siglist[sig];
1912 return sys_siglist[sig];
1916 #endif /* HAVE_STRSIGNAL */
1927 pollv = (struct pollfd *) malloc(nprocs * sizeof pollv[0]);
1928 if (pollv == NULL) {
1929 fprintf(stderr, "%s: out of memory\n", progname);
1933 for (i = j = 0; i < tcbtabsize; i++) {
1934 struct tcb *tcp = tcbtab[i];
1935 if (!(tcp->flags & TCB_INUSE))
1937 pollv[j].fd = tcp->pfd;
1938 pollv[j].events = POLLWANT;
1942 fprintf(stderr, "strace: proc miscount\n");
1947 #ifndef HAVE_POLLABLE_PROCFS
1950 proc_poll_open(void)
1954 if (pipe(proc_poll_pipe) < 0) {
1958 for (i = 0; i < 2; i++) {
1959 if (set_cloexec_flag(proc_poll_pipe[i]) < 0) {
1966 proc_poll(struct pollfd *pollv, int nfds, int timeout)
1970 struct proc_pollfd pollinfo;
1972 if ((n = read(proc_poll_pipe[0], &pollinfo, sizeof(pollinfo))) < 0)
1974 if (n != sizeof(struct proc_pollfd)) {
1975 fprintf(stderr, "panic: short read: %d\n", n);
1978 for (i = 0; i < nprocs; i++) {
1979 if (pollv[i].fd == pollinfo.fd)
1980 pollv[i].revents = pollinfo.revents;
1982 pollv[i].revents = 0;
1984 poller_pid = pollinfo.pid;
1989 wakeup_handler(int sig)
1994 proc_poller(int pfd)
1996 struct proc_pollfd pollinfo;
1997 struct sigaction sa;
1998 sigset_t blocked_set, empty_set;
2003 struct procfs_status pfs;
2004 #endif /* FREEBSD */
2016 sa.sa_handler = interactive ? SIG_DFL : SIG_IGN;
2018 sigemptyset(&sa.sa_mask);
2019 sigaction(SIGHUP, &sa, NULL);
2020 sigaction(SIGINT, &sa, NULL);
2021 sigaction(SIGQUIT, &sa, NULL);
2022 sigaction(SIGPIPE, &sa, NULL);
2023 sigaction(SIGTERM, &sa, NULL);
2024 sa.sa_handler = wakeup_handler;
2025 sigaction(SIGUSR1, &sa, NULL);
2026 sigemptyset(&blocked_set);
2027 sigaddset(&blocked_set, SIGUSR1);
2028 sigprocmask(SIG_BLOCK, &blocked_set, NULL);
2029 sigemptyset(&empty_set);
2031 if (getrlimit(RLIMIT_NOFILE, &rl) < 0) {
2032 perror("getrlimit(RLIMIT_NOFILE, ...)");
2036 for (i = 0; i < n; i++) {
2037 if (i != pfd && i != proc_poll_pipe[1])
2042 pollinfo.pid = getpid();
2045 if (ioctl(pfd, PIOCWSTOP, NULL) < 0)
2047 if (ioctl(pfd, PIOCWSTOP, &pfs) < 0)
2054 pollinfo.revents = POLLERR;
2057 pollinfo.revents = POLLHUP;
2060 perror("proc_poller: PIOCWSTOP");
2062 write(proc_poll_pipe[1], &pollinfo, sizeof(pollinfo));
2065 pollinfo.revents = POLLWANT;
2066 write(proc_poll_pipe[1], &pollinfo, sizeof(pollinfo));
2067 sigsuspend(&empty_set);
2071 #endif /* !HAVE_POLLABLE_PROCFS */
2081 if (followfork < 2 &&
2082 last < nprocs && (pollv[last].revents & POLLWANT)) {
2084 * The previous process is ready to run again. We'll
2085 * let it do so if it is currently in a syscall. This
2086 * heuristic improves the readability of the trace.
2088 tcp = pfd2tcb(pollv[last].fd);
2089 if (tcp && (tcp->flags & TCB_INSYSCALL))
2090 return pollv[last].fd;
2093 for (i = 0; i < nprocs; i++) {
2094 /* Let competing children run round robin. */
2095 j = (i + last + 1) % nprocs;
2096 if (pollv[j].revents & (POLLHUP | POLLERR)) {
2097 tcp = pfd2tcb(pollv[j].fd);
2099 fprintf(stderr, "strace: lost proc\n");
2105 if (pollv[j].revents & POLLWANT) {
2110 fprintf(stderr, "strace: nothing ready\n");
2118 struct tcb *in_syscall = NULL;
2123 int ioctl_result = 0, ioctl_errno = 0;
2128 sigprocmask(SIG_SETMASK, &empty_set, NULL);
2135 #ifndef HAVE_POLLABLE_PROCFS
2136 if (proc_poll_pipe[0] == -1) {
2138 tcp = first_used_tcb();
2145 #ifndef HAVE_POLLABLE_PROCFS
2147 /* fall through ... */
2148 #endif /* !HAVE_POLLABLE_PROCFS */
2150 #ifdef HAVE_POLLABLE_PROCFS
2152 /* On some systems (e.g. UnixWare) we get too much ugly
2153 "unfinished..." stuff when multiple proceses are in
2154 syscalls. Here's a nasty hack */
2161 pv.events = POLLWANT;
2162 if ((what = poll(&pv, 1, 1)) < 0) {
2167 else if (what == 1 && pv.revents & POLLWANT) {
2173 if (poll(pollv, nprocs, INFTIM) < 0) {
2178 #else /* !HAVE_POLLABLE_PROCFS */
2179 if (proc_poll(pollv, nprocs, INFTIM) < 0) {
2184 #endif /* !HAVE_POLLABLE_PROCFS */
2191 /* Look up `pfd' in our table. */
2192 if ((tcp = pfd2tcb(pfd)) == NULL) {
2193 fprintf(stderr, "unknown pfd: %u\n", pfd);
2199 /* Get the status of the process. */
2202 ioctl_result = IOCTL_WSTOP(tcp);
2204 /* Thanks to some scheduling mystery, the first poller
2205 sometimes waits for the already processed end of fork
2206 event. Doing a non blocking poll here solves the problem. */
2207 if (proc_poll_pipe[0] != -1)
2208 ioctl_result = IOCTL_STATUS(tcp);
2210 ioctl_result = IOCTL_WSTOP(tcp);
2211 #endif /* FREEBSD */
2212 ioctl_errno = errno;
2213 #ifndef HAVE_POLLABLE_PROCFS
2214 if (proc_poll_pipe[0] != -1) {
2215 if (ioctl_result < 0)
2216 kill(poller_pid, SIGKILL);
2218 kill(poller_pid, SIGUSR1);
2220 #endif /* !HAVE_POLLABLE_PROCFS */
2226 sigprocmask(SIG_BLOCK, &blocked_set, NULL);
2228 if (ioctl_result < 0) {
2229 /* Find out what happened if it failed. */
2230 switch (ioctl_errno) {
2241 perror("PIOCWSTOP");
2247 if ((tcp->flags & TCB_STARTUP) && (tcp->status.PR_WHY == PR_SYSEXIT)) {
2248 /* discard first event for a syscall we never entered */
2249 IOCTL(tcp->pfd, PIOCRUN, 0);
2254 /* clear the just started flag */
2255 tcp->flags &= ~TCB_STARTUP;
2257 /* set current output file */
2259 curcol = tcp->curcol;
2262 struct timeval stime;
2267 if ((len = pread(tcp->pfd_status, buf, sizeof(buf) - 1, 0)) > 0) {
2270 "%*s %*d %*d %*d %*d %*d,%*d %*s %*d,%*d %*d,%*d %ld,%ld",
2271 &stime.tv_sec, &stime.tv_usec);
2273 stime.tv_sec = stime.tv_usec = 0;
2274 #else /* !FREEBSD */
2275 stime.tv_sec = tcp->status.pr_stime.tv_sec;
2276 stime.tv_usec = tcp->status.pr_stime.tv_nsec/1000;
2277 #endif /* !FREEBSD */
2278 tv_sub(&tcp->dtime, &stime, &tcp->stime);
2281 what = tcp->status.PR_WHAT;
2282 switch (tcp->status.PR_WHY) {
2285 if (tcp->status.PR_FLAGS & PR_ASLEEP) {
2286 tcp->status.PR_WHY = PR_SYSENTRY;
2287 if (trace_syscall(tcp) < 0) {
2288 fprintf(stderr, "syscall trouble\n");
2293 #endif /* !FREEBSD */
2299 if (trace_syscall(tcp) < 0) {
2300 fprintf(stderr, "syscall trouble\n");
2305 if (cflag != CFLAG_ONLY_STATS
2306 && (qual_flags[what] & QUAL_SIGNAL)) {
2308 tprintf("--- %s (%s) ---",
2309 signame(what), strsignal(what));
2312 if (tcp->status.PR_INFO.si_signo == what) {
2314 tprintf(" siginfo=");
2315 printsiginfo(&tcp->status.PR_INFO, 1);
2322 if (cflag != CFLAGS_ONLY_STATS
2323 && (qual_flags[what] & QUAL_FAULT)) {
2325 tprintf("=== FAULT %d ===", what);
2330 case 0: /* handle case we polled for nothing */
2334 fprintf(stderr, "odd stop %d\n", tcp->status.PR_WHY);
2338 /* Remember current print column before continuing. */
2339 tcp->curcol = curcol;
2342 if (IOCTL(tcp->pfd, PIOCRUN, &arg) < 0)
2344 if (IOCTL(tcp->pfd, PIOCRUN, 0) < 0)
2354 #else /* !USE_PROCFS */
2356 #ifdef TCB_GROUP_EXITING
2357 /* Handle an exit detach or death signal that is taking all the
2358 related clone threads with it. This is called in three circumstances:
2359 SIG == -1 TCP has already died (TCB_ATTACHED is clear, strace is parent).
2360 SIG == 0 Continuing TCP will perform an exit_group syscall.
2361 SIG == other Continuing TCP with SIG will kill the process.
2364 handle_group_exit(struct tcb *tcp, int sig)
2366 /* We need to locate our records of all the clone threads
2367 related to TCP, either its children or siblings. */
2368 struct tcb *leader = NULL;
2370 if (tcp->flags & TCB_CLONE_THREAD)
2371 leader = tcp->parent;
2374 if (leader != NULL && leader != tcp
2375 && !(leader->flags & TCB_GROUP_EXITING)
2376 && !(tcp->flags & TCB_STARTUP)
2379 "PANIC: handle_group_exit: %d leader %d\n",
2380 tcp->pid, leader ? leader->pid : -1);
2382 /* TCP no longer exists therefore you must not detach() it. */
2383 droptcb(tcp); /* Already died. */
2386 /* Mark that we are taking the process down. */
2387 tcp->flags |= TCB_EXITING | TCB_GROUP_EXITING;
2388 if (tcp->flags & TCB_ATTACHED) {
2390 if (leader != NULL && leader != tcp)
2391 leader->flags |= TCB_GROUP_EXITING;
2393 if (ptrace_restart(PTRACE_CONT, tcp, sig) < 0) {
2397 if (leader != NULL) {
2398 leader->flags |= TCB_GROUP_EXITING;
2402 /* The leader will report to us as parent now,
2403 and then we'll get to the SIG==-1 case. */
2414 handle_ptrace_event(int status, struct tcb *tcp)
2416 if (status >> 16 == PTRACE_EVENT_VFORK ||
2417 status >> 16 == PTRACE_EVENT_CLONE ||
2418 status >> 16 == PTRACE_EVENT_FORK) {
2421 if (do_ptrace(PTRACE_GETEVENTMSG, tcp, NULL, &childpid) < 0) {
2422 if (errno != ESRCH) {
2424 %s: handle_ptrace_event: ptrace cannot get new child's pid\n",
2431 return handle_new_child(tcp, childpid, 0);
2433 if (status >> 16 == PTRACE_EVENT_EXEC) {
2435 fprintf(stderr, "PTRACE_EVENT_EXEC on pid %d (ignored)\n", tcp->pid);
2438 /* Some PTRACE_EVENT_foo we didn't ask for?! */
2439 error_msg("Unexpected status %x on pid %d", status, tcp->pid);
2454 static int wait4_options = __WALL;
2458 while (nprocs != 0) {
2462 sigprocmask(SIG_SETMASK, &empty_set, NULL);
2465 pid = wait4(-1, &status, wait4_options, cflag ? &ru : NULL);
2466 if (pid < 0 && (wait4_options & __WALL) && errno == EINVAL) {
2467 /* this kernel does not support __WALL */
2468 wait4_options &= ~__WALL;
2470 pid = wait4(-1, &status, wait4_options,
2471 cflag ? &ru : NULL);
2473 if (pid < 0 && !(wait4_options & __WALL) && errno == ECHILD) {
2474 /* most likely a "cloned" process */
2475 pid = wait4(-1, &status, __WCLONE,
2476 cflag ? &ru : NULL);
2478 fprintf(stderr, "strace: clone wait4 "
2479 "failed: %s\n", strerror(errno));
2483 pid = wait4(-1, &status, 0, cflag ? &ru : NULL);
2487 pid = wait(&status);
2491 sigprocmask(SIG_BLOCK, &blocked_set, NULL);
2494 switch (wait_errno) {
2499 * We would like to verify this case
2500 * but sometimes a race in Solbourne's
2501 * version of SunOS sometimes reports
2502 * ECHILD before sending us SIGCHILD.
2507 perror("strace: wait");
2511 if (pid == popen_pid) {
2512 if (WIFEXITED(status) || WIFSIGNALED(status))
2517 fprintf(stderr, " [wait(%#x) = %u]\n", status, pid);
2519 /* Look up `pid' in our table. */
2520 if ((tcp = pid2tcb(pid)) == NULL) {
2523 /* This is needed to go with the CLONE_PTRACE
2524 changes in process.c/util.c: we might see
2525 the child's initial trap before we see the
2526 parent return from the clone syscall.
2527 Leave the child suspended until the parent
2528 returns from its system call. Only then
2529 will we have the association of parent and
2530 child so that we know how to do clearbpt
2532 tcp = alloctcb(pid);
2533 tcp->flags |= TCB_ATTACHED | TCB_SUSPENDED;
2536 Process %d attached (waiting for parent)\n",
2540 /* This can happen if a clone call used
2541 CLONE_PTRACE itself. */
2544 fprintf(stderr, "unknown pid: %u\n", pid);
2545 if (WIFSTOPPED(status))
2546 ptrace(PTRACE_CONT, pid, (char *) 1, 0);
2550 /* set current output file */
2552 curcol = tcp->curcol;
2555 tv_sub(&tcp->dtime, &ru.ru_stime, &tcp->stime);
2556 tcp->stime = ru.ru_stime;
2560 if (tcp->flags & TCB_SUSPENDED) {
2562 * Apparently, doing any ptrace() call on a stopped
2563 * process, provokes the kernel to report the process
2564 * status again on a subsequent wait(), even if the
2565 * process has not been actually restarted.
2566 * Since we have inspected the arguments of suspended
2567 * processes we end up here testing for this case.
2571 if (WIFSIGNALED(status)) {
2572 if (pid == strace_child)
2573 exit_code = 0x100 | WTERMSIG(status);
2574 if (cflag != CFLAG_ONLY_STATS
2575 && (qual_flags[WTERMSIG(status)] & QUAL_SIGNAL)) {
2577 tprintf("+++ killed by %s %s+++",
2578 signame(WTERMSIG(status)),
2580 WCOREDUMP(status) ? "(core dumped) " :
2585 #ifdef TCB_GROUP_EXITING
2586 handle_group_exit(tcp, -1);
2592 if (WIFEXITED(status)) {
2593 if (pid == strace_child)
2594 exit_code = WEXITSTATUS(status);
2596 fprintf(stderr, "pid %u exited with %d\n", pid, WEXITSTATUS(status));
2597 if ((tcp->flags & (TCB_ATTACHED|TCB_STARTUP)) == TCB_ATTACHED
2598 #ifdef TCB_GROUP_EXITING
2599 && !(tcp->parent && (tcp->parent->flags & TCB_GROUP_EXITING))
2600 && !(tcp->flags & TCB_GROUP_EXITING)
2604 "PANIC: attached pid %u exited with %d\n",
2605 pid, WEXITSTATUS(status));
2607 if (tcp == tcp_last) {
2608 if ((tcp->flags & (TCB_INSYSCALL|TCB_REPRINT)) == TCB_INSYSCALL)
2609 tprintf(" <unfinished ... exit status %d>\n",
2610 WEXITSTATUS(status));
2613 #ifdef TCB_GROUP_EXITING
2614 handle_group_exit(tcp, -1);
2620 if (!WIFSTOPPED(status)) {
2621 fprintf(stderr, "PANIC: pid %u not stopped\n", pid);
2626 fprintf(stderr, "pid %u stopped, [%s]\n",
2627 pid, signame(WSTOPSIG(status)));
2630 if (handle_ptrace_event(status, tcp) != 1)
2635 * Interestingly, the process may stop
2636 * with STOPSIG equal to some other signal
2637 * than SIGSTOP if we happend to attach
2638 * just before the process takes a signal.
2639 * A no-MMU vforked child won't send up a signal,
2640 * so skip the first (lost) execve notification.
2642 if ((tcp->flags & TCB_STARTUP) &&
2643 (WSTOPSIG(status) == SIGSTOP || strace_vforked)) {
2645 * This flag is there to keep us in sync.
2646 * Next time this process stops it should
2647 * really be entering a system call.
2649 tcp->flags &= ~TCB_STARTUP;
2650 if (tcp->flags & TCB_BPTSET) {
2652 * One example is a breakpoint inherited from
2653 * parent through fork ().
2655 if (clearbpt(tcp) < 0) /* Pretty fatal */ {
2662 /* If options were not set for this tracee yet */
2663 if (tcp->parent == NULL) {
2664 if (ptrace_setoptions) {
2666 fprintf(stderr, "setting opts %x on pid %d\n", ptrace_setoptions, tcp->pid);
2667 if (ptrace(PTRACE_SETOPTIONS, tcp->pid, NULL, ptrace_setoptions) < 0) {
2668 if (errno != ESRCH) {
2669 /* Should never happen, really */
2670 perror_msg_and_die("PTRACE_SETOPTIONS");
2679 if (WSTOPSIG(status) != syscall_trap_sig) {
2680 if (WSTOPSIG(status) == SIGSTOP &&
2681 (tcp->flags & TCB_SIGTRAPPED)) {
2683 * Trapped attempt to block SIGTRAP
2684 * Hope we are back in control now.
2686 tcp->flags &= ~(TCB_INSYSCALL | TCB_SIGTRAPPED);
2687 if (ptrace_restart(PTRACE_SYSCALL, tcp, 0) < 0) {
2693 if (cflag != CFLAG_ONLY_STATS
2694 && (qual_flags[WSTOPSIG(status)] & QUAL_SIGNAL)) {
2696 #if defined(PT_CR_IPSR) && defined(PT_CR_IIP)
2700 upeek(tcp, PT_CR_IPSR, &psr);
2701 upeek(tcp, PT_CR_IIP, &pc);
2704 pc += (psr >> PSR_RI) & 0x3;
2705 # define PC_FORMAT_STR " @ %lx"
2706 # define PC_FORMAT_ARG pc
2708 # define PC_FORMAT_STR "%s"
2709 # define PC_FORMAT_ARG ""
2712 if (ptrace(PTRACE_GETSIGINFO, pid, 0, &si) == 0) {
2714 printsiginfo(&si, verbose(tcp));
2715 tprintf(" (%s)" PC_FORMAT_STR " ---",
2716 strsignal(WSTOPSIG(status)),
2719 tprintf("--- %s by %s" PC_FORMAT_STR " ---",
2720 strsignal(WSTOPSIG(status)),
2721 signame(WSTOPSIG(status)),
2725 if (((tcp->flags & TCB_ATTACHED) ||
2726 tcp->nclone_threads > 0) &&
2727 !sigishandled(tcp, WSTOPSIG(status))) {
2728 #ifdef TCB_GROUP_EXITING
2729 handle_group_exit(tcp, WSTOPSIG(status));
2731 detach(tcp, WSTOPSIG(status));
2735 if (ptrace_restart(PTRACE_SYSCALL, tcp, WSTOPSIG(status)) < 0) {
2739 tcp->flags &= ~TCB_SUSPENDED;
2742 /* we handled the STATUS, we are permitted to interrupt now. */
2745 if (trace_syscall(tcp) < 0 && !tcp->ptrace_errno) {
2746 /* ptrace() failed in trace_syscall() with ESRCH.
2747 * Likely a result of process disappearing mid-flight.
2748 * Observed case: exit_group() terminating
2749 * all processes in thread group. In this case, threads
2750 * "disappear" in an unpredictable moment without any
2751 * notification to strace via wait().
2753 if (tcp->flags & TCB_ATTACHED) {
2755 /* Do we have dangling line "syscall(param, param"?
2756 * Finish the line then. We cannot
2758 tcp_last->flags |= TCB_REPRINT;
2759 tprintf(" <unfinished ...>");
2765 tcp->pid, (char *) 1, SIGTERM);
2770 if (tcp->flags & TCB_EXITING) {
2771 #ifdef TCB_GROUP_EXITING
2772 if (tcp->flags & TCB_GROUP_EXITING) {
2773 if (handle_group_exit(tcp, 0) < 0)
2778 if (tcp->flags & TCB_ATTACHED)
2780 else if (ptrace_restart(PTRACE_CONT, tcp, 0) < 0) {
2786 if (tcp->flags & TCB_SUSPENDED) {
2788 fprintf(stderr, "Process %u suspended\n", pid);
2792 /* Remember current print column before continuing. */
2793 tcp->curcol = curcol;
2794 if (ptrace_restart(PTRACE_SYSCALL, tcp, 0) < 0) {
2802 #endif /* !USE_PROCFS */
2807 tprintf(const char *fmt, ...)
2811 va_start(args, fmt);
2813 int n = vfprintf(outf, fmt, args);
2816 perror(outfname == NULL
2817 ? "<writing to pipe>" : outfname);
2826 printleader(struct tcb *tcp)
2829 if (tcp_last->ptrace_errno) {
2830 if (tcp_last->flags & TCB_INSYSCALL) {
2831 tprintf(" <unavailable>) ");
2834 tprintf("= ? <unavailable>\n");
2835 tcp_last->ptrace_errno = 0;
2836 } else if (!outfname || followfork < 2 || tcp_last == tcp) {
2837 tcp_last->flags |= TCB_REPRINT;
2838 tprintf(" <unfinished ...>\n");
2842 if ((followfork == 1 || pflag_seen > 1) && outfname)
2843 tprintf("%-5d ", tcp->pid);
2844 else if (nprocs > 1 && !outfname)
2845 tprintf("[pid %5u] ", tcp->pid);
2847 char str[sizeof("HH:MM:SS")];
2848 struct timeval tv, dtv;
2849 static struct timeval otv;
2851 gettimeofday(&tv, NULL);
2853 if (otv.tv_sec == 0)
2855 tv_sub(&dtv, &tv, &otv);
2856 tprintf("%6ld.%06ld ",
2857 (long) dtv.tv_sec, (long) dtv.tv_usec);
2860 else if (tflag > 2) {
2861 tprintf("%ld.%06ld ",
2862 (long) tv.tv_sec, (long) tv.tv_usec);
2865 time_t local = tv.tv_sec;
2866 strftime(str, sizeof(str), "%T", localtime(&local));
2868 tprintf("%s.%06ld ", str, (long) tv.tv_usec);
2870 tprintf("%s ", str);
2881 tprintf("%*s", col - curcol, "");
2891 #ifdef HAVE_MP_PROCFS
2894 mp_ioctl(int fd, int cmd, void *arg, int size)
2896 struct iovec iov[2];
2899 iov[0].iov_base = &cmd;
2900 iov[0].iov_len = sizeof cmd;
2903 iov[1].iov_base = arg;
2904 iov[1].iov_len = size;
2907 return writev(fd, iov, n);