2 * Copyright (c) 1991, 1992 Paul Kranenburg <pk@cs.few.eur.nl>
3 * Copyright (c) 1993 Branko Lankester <branko@hacktic.nl>
4 * Copyright (c) 1993, 1994, 1995, 1996 Rick Sladkey <jrs@world.std.com>
5 * Copyright (c) 1996-1999 Wichert Akkerman <wichert@cistron.nl>
6 * Copyright (c) 1999 IBM Deutschland Entwicklung GmbH, IBM Corporation
7 * Linux for s390 port by D.J. Barrow
8 * <barrow_dj@mail.yahoo.com,djbarrow@de.ibm.com>
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. The name of the author may not be used to endorse or promote products
20 * derived from this software without specific prior written permission.
22 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
23 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
24 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
25 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
26 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
27 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
31 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35 #include <sys/param.h>
38 #ifdef HAVE_SYS_XATTR_H
39 # include <sys/xattr.h>
47 string_to_uint(const char *str)
55 value = strtol(str, &error, 10);
56 if (errno || *error || value < 0 || (long)(int)value != value)
62 tv_nz(const struct timeval *a)
64 return a->tv_sec || a->tv_usec;
68 tv_cmp(const struct timeval *a, const struct timeval *b)
70 if (a->tv_sec < b->tv_sec
71 || (a->tv_sec == b->tv_sec && a->tv_usec < b->tv_usec))
73 if (a->tv_sec > b->tv_sec
74 || (a->tv_sec == b->tv_sec && a->tv_usec > b->tv_usec))
80 tv_float(const struct timeval *tv)
82 return tv->tv_sec + tv->tv_usec/1000000.0;
86 tv_add(struct timeval *tv, const struct timeval *a, const struct timeval *b)
88 tv->tv_sec = a->tv_sec + b->tv_sec;
89 tv->tv_usec = a->tv_usec + b->tv_usec;
90 if (tv->tv_usec >= 1000000) {
92 tv->tv_usec -= 1000000;
97 tv_sub(struct timeval *tv, const struct timeval *a, const struct timeval *b)
99 tv->tv_sec = a->tv_sec - b->tv_sec;
100 tv->tv_usec = a->tv_usec - b->tv_usec;
101 if (((long) tv->tv_usec) < 0) {
103 tv->tv_usec += 1000000;
108 tv_div(struct timeval *tv, const struct timeval *a, int n)
110 tv->tv_usec = (a->tv_sec % n * 1000000 + a->tv_usec + n / 2) / n;
111 tv->tv_sec = a->tv_sec / n + tv->tv_usec / 1000000;
112 tv->tv_usec %= 1000000;
116 tv_mul(struct timeval *tv, const struct timeval *a, int n)
118 tv->tv_usec = a->tv_usec * n;
119 tv->tv_sec = a->tv_sec * n + tv->tv_usec / 1000000;
120 tv->tv_usec %= 1000000;
124 xlookup(const struct xlat *xlat, const uint64_t val)
126 for (; xlat->str != NULL; xlat++)
127 if (xlat->val == val)
133 xlat_bsearch_compare(const void *a, const void *b)
135 const uint64_t val1 = *(const uint64_t *) a;
136 const uint64_t val2 = ((const struct xlat *) b)->val;
137 return (val1 > val2) ? 1 : (val1 < val2) ? -1 : 0;
141 xlat_search(const struct xlat *xlat, const size_t nmemb, const uint64_t val)
143 const struct xlat *e =
144 bsearch((const void*) &val,
145 xlat, nmemb, sizeof(*xlat), xlat_bsearch_compare);
147 return e ? e->str : NULL;
150 #if !defined HAVE_STPCPY
152 stpcpy(char *dst, const char *src)
154 while ((*dst = *src++) != '\0')
160 /* Find a next bit which is set.
161 * Starts testing at cur_bit.
162 * Returns -1 if no more bits are set.
164 * We never touch bytes we don't need to.
165 * On big-endian, array is assumed to consist of
166 * current_wordsize wide words: for example, is current_wordsize is 4,
167 * the bytes are walked in 3,2,1,0, 7,6,5,4, 11,10,9,8 ... sequence.
168 * On little-endian machines, word size is immaterial.
171 next_set_bit(const void *bit_array, unsigned cur_bit, unsigned size_bits)
173 const unsigned endian = 1;
174 int little_endian = *(char*)&endian;
176 const uint8_t *array = bit_array;
177 unsigned pos = cur_bit / 8;
178 unsigned pos_xor_mask = little_endian ? 0 : current_wordsize-1;
184 if (cur_bit >= size_bits)
186 cur_byte = array[pos ^ pos_xor_mask];
188 cur_bit = (cur_bit + 8) & (-8);
192 bitmask = 1 << (cur_bit & 7);
194 if (cur_byte & bitmask)
197 if (cur_bit >= size_bits)
200 /* This check *can't be* optimized out: */
208 * Print entry in struct xlat table, if there.
211 printxvals(const uint64_t val, const char *dflt, const struct xlat *xlat, ...)
215 va_start(args, xlat);
216 for (; xlat; xlat = va_arg(args, const struct xlat *)) {
217 const char *str = xlookup(xlat, val);
225 /* No hits -- print raw # instead. */
226 tprintf("%#" PRIx64 " /* %s */", val, dflt);
232 * Fetch 64bit argument at position arg_no and
233 * return the index of the next argument.
236 getllval(struct tcb *tcp, unsigned long long *val, int arg_no)
238 #if SIZEOF_LONG > 4 && SIZEOF_LONG == SIZEOF_LONG_LONG
239 # if SUPPORTED_PERSONALITIES > 1
241 if (current_personality != 1) {
243 if (current_wordsize > 4) {
246 *val = tcp->u_arg[arg_no];
248 # if SUPPORTED_PERSONALITIES > 1
250 # if defined(AARCH64) || defined(POWERPC64)
251 /* Align arg_no to the next even number. */
252 arg_no = (arg_no + 1) & 0xe;
253 # endif /* AARCH64 || POWERPC64 */
254 *val = LONG_LONG(tcp->u_arg[arg_no], tcp->u_arg[arg_no + 1]);
257 # endif /* SUPPORTED_PERSONALITIES > 1 */
258 #elif SIZEOF_LONG > 4
259 # error Unsupported configuration: SIZEOF_LONG > 4 && SIZEOF_LONG_LONG > SIZEOF_LONG
260 #elif defined LINUX_MIPSN32
261 *val = tcp->ext_arg[arg_no];
264 if (current_personality == 0) {
265 *val = tcp->ext_arg[arg_no];
268 *val = LONG_LONG(tcp->u_arg[arg_no], tcp->u_arg[arg_no + 1]);
272 # if defined __ARM_EABI__ || \
273 defined LINUX_MIPSO32 || \
276 /* Align arg_no to the next even number. */
277 arg_no = (arg_no + 1) & 0xe;
279 *val = LONG_LONG(tcp->u_arg[arg_no], tcp->u_arg[arg_no + 1]);
287 * Print 64bit argument at position arg_no and
288 * return the index of the next argument.
291 printllval(struct tcb *tcp, const char *format, int arg_no)
293 unsigned long long val = 0;
295 arg_no = getllval(tcp, &val, arg_no);
296 tprintf(format, val);
301 * Interpret `xlat' as an array of flags
302 * print the entries whose bits are on in `flags'
303 * return # of flags printed.
306 addflags(const struct xlat *xlat, uint64_t flags)
308 for (; xlat->str; xlat++) {
309 if (xlat->val && (flags & xlat->val) == xlat->val) {
310 tprintf("|%s", xlat->str);
315 tprintf("|%#" PRIx64, flags);
320 * Interpret `xlat' as an array of flags.
321 * Print to static string the entries whose bits are on in `flags'
322 * Return static string.
325 sprintflags(const char *prefix, const struct xlat *xlat, uint64_t flags)
327 static char outstr[1024];
331 outptr = stpcpy(outstr, prefix);
333 if (flags == 0 && xlat->val == 0 && xlat->str) {
334 strcpy(outptr, xlat->str);
338 for (; xlat->str; xlat++) {
339 if (xlat->val && (flags & xlat->val) == xlat->val) {
342 outptr = stpcpy(outptr, xlat->str);
352 outptr += sprintf(outptr, "%#" PRIx64, flags);
359 printflags64(const struct xlat *xlat, uint64_t flags, const char *dflt)
364 if (flags == 0 && xlat->val == 0 && xlat->str) {
370 for (n = 0; xlat->str; xlat++) {
371 if (xlat->val && (flags & xlat->val) == xlat->val) {
372 tprintf("%s%s", sep, xlat->str);
381 tprintf("%s%#" PRIx64, sep, flags);
386 tprintf("%#" PRIx64, flags);
388 tprintf(" /* %s */", dflt);
399 printaddr(const long addr)
404 tprintf("%#lx", addr);
407 #define DEF_PRINTNUM(name, type) \
409 printnum_ ## name(struct tcb *tcp, const long addr, const char *fmt) \
412 if (umove_or_printaddr(tcp, addr, &num)) \
420 #define DEF_PRINTPAIR(name, type) \
422 printpair_ ## name(struct tcb *tcp, const long addr, const char *fmt) \
425 if (umove_or_printaddr(tcp, addr, &pair)) \
428 tprintf(fmt, pair[0]); \
430 tprintf(fmt, pair[1]); \
435 DEF_PRINTNUM(int, int)
436 DEF_PRINTPAIR(int, int)
437 DEF_PRINTNUM(short, short)
438 DEF_PRINTNUM(int64, uint64_t)
439 DEF_PRINTPAIR(int64, uint64_t)
441 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
443 printnum_long_int(struct tcb *tcp, const long addr,
444 const char *fmt_long, const char *fmt_int)
446 if (current_wordsize > sizeof(int)) {
447 return printnum_int64(tcp, addr, fmt_long);
449 return printnum_int(tcp, addr, fmt_int);
458 static char buf[sizeof(int) * 3 * 6];
466 snprintf(buf, sizeof buf, "%02d/%02d/%02d-%02d:%02d:%02d",
467 tmp->tm_year + 1900, tmp->tm_mon + 1, tmp->tm_mday,
468 tmp->tm_hour, tmp->tm_min, tmp->tm_sec);
470 snprintf(buf, sizeof buf, "%lu", (unsigned long) t);
476 getfdproto(struct tcb *tcp, int fd, char *buf, unsigned bufsize)
478 #ifdef HAVE_SYS_XATTR_H
480 char path[sizeof("/proc/%u/fd/%u") + 2 * sizeof(int)*3];
485 sprintf(path, "/proc/%u/fd/%u", tcp->pid, fd);
486 r = getxattr(path, "system.sockprotoname", buf, bufsize - 1);
491 * This is a protection for the case when the kernel
492 * side does not append a null byte to the buffer.
503 printfd(struct tcb *tcp, int fd)
505 char path[PATH_MAX + 1];
506 if (show_fd_path && getfdpath(tcp, fd, path, sizeof(path)) >= 0) {
507 static const char socket_prefix[] = "socket:[";
508 const size_t socket_prefix_len = sizeof(socket_prefix) - 1;
509 const size_t path_len = strlen(path);
512 if (show_fd_path > 1 &&
513 strncmp(path, socket_prefix, socket_prefix_len) == 0 &&
514 path[path_len - 1] == ']') {
515 unsigned long inode =
516 strtoul(path + socket_prefix_len, NULL, 10);
518 if (!print_sockaddr_by_inode_cached(inode)) {
521 getfdproto(tcp, fd, buf, sizeof(buf));
522 if (!print_sockaddr_by_inode(inode, proto))
526 print_quoted_string(path, path_len,
527 QUOTE_OMIT_LEADING_TRAILING_QUOTES);
535 * Quote string `instr' of length `size'
536 * Write up to (3 + `size' * 4) bytes to `outstr' buffer.
538 * If QUOTE_0_TERMINATED `style' flag is set,
539 * treat `instr' as a NUL-terminated string,
540 * checking up to (`size' + 1) bytes of `instr'.
542 * If QUOTE_OMIT_LEADING_TRAILING_QUOTES `style' flag is set,
543 * do not add leading and trailing quoting symbols.
545 * Returns 0 if QUOTE_0_TERMINATED is set and NUL was seen, 1 otherwise.
546 * Note that if QUOTE_0_TERMINATED is not set, always returns 1.
549 string_quote(const char *instr, char *outstr, const unsigned int size,
550 const unsigned int style)
552 const unsigned char *ustr = (const unsigned char *) instr;
557 if (style & QUOTE_0_TERMINATED)
560 eol = 0x100; /* this can never match a char */
566 /* Check for presence of symbol which require
567 to hex-quote the whole string. */
568 for (i = 0; i < size; ++i) {
570 /* Check for NUL-terminated string. */
574 /* Force hex unless c is printable or whitespace */
579 /* In ASCII isspace is only these chars: "\t\n\v\f\r".
580 * They happen to have ASCII codes 9,10,11,12,13.
582 if (c < ' ' && (unsigned)(c - 9) >= 5) {
589 if (!(style & QUOTE_OMIT_LEADING_TRAILING_QUOTES))
593 /* Hex-quote the whole string. */
594 for (i = 0; i < size; ++i) {
596 /* Check for NUL-terminated string. */
601 *s++ = "0123456789abcdef"[c >> 4];
602 *s++ = "0123456789abcdef"[c & 0xf];
605 for (i = 0; i < size; ++i) {
607 /* Check for NUL-terminated string. */
611 case '\"': case '\\':
636 if (c >= ' ' && c <= 0x7e)
642 && ustr[i + 1] >= '0'
643 && ustr[i + 1] <= '9'
646 *s++ = '0' + (c >> 6);
647 *s++ = '0' + ((c >> 3) & 0x7);
652 *s++ = '0' + (c >> 6);
653 *s++ = '0' + ((c >> 3) & 0x7);
656 *s++ = '0' + (c & 0x7);
663 if (!(style & QUOTE_OMIT_LEADING_TRAILING_QUOTES))
667 /* Return zero if we printed entire ASCIZ string (didn't truncate it) */
668 if (style & QUOTE_0_TERMINATED && ustr[i] == '\0') {
669 /* We didn't see NUL yet (otherwise we'd jump to 'asciz_ended')
670 * but next char is NUL.
678 if (!(style & QUOTE_OMIT_LEADING_TRAILING_QUOTES))
681 /* Return zero: we printed entire ASCIZ string (didn't truncate it) */
685 #ifndef ALLOCA_CUTOFF
686 # define ALLOCA_CUTOFF 4032
688 #define use_alloca(n) ((n) <= ALLOCA_CUTOFF)
691 * Quote string `str' of length `size' and print the result.
693 * If QUOTE_0_TERMINATED `style' flag is set,
694 * treat `str' as a NUL-terminated string and
695 * quote at most (`size' - 1) bytes.
697 * If QUOTE_OMIT_LEADING_TRAILING_QUOTES `style' flag is set,
698 * do not add leading and trailing quoting symbols.
700 * Returns 0 if QUOTE_0_TERMINATED is set and NUL was seen, 1 otherwise.
701 * Note that if QUOTE_0_TERMINATED is not set, always returns 1.
704 print_quoted_string(const char *str, unsigned int size,
705 const unsigned int style)
709 unsigned int alloc_size;
712 if (size && style & QUOTE_0_TERMINATED)
715 alloc_size = 4 * size;
716 if (alloc_size / 4 != size) {
717 error_msg("Out of memory");
721 alloc_size += 1 + (style & QUOTE_OMIT_LEADING_TRAILING_QUOTES ? 0 : 2);
723 if (use_alloca(alloc_size)) {
724 outstr = alloca(alloc_size);
727 outstr = buf = malloc(alloc_size);
729 error_msg("Out of memory");
735 rc = string_quote(str, outstr, size, style);
743 * Print path string specified by address `addr' and length `n'.
744 * If path length exceeds `n', append `...' to the output.
747 printpathn(struct tcb *tcp, long addr, unsigned int n)
749 char path[PATH_MAX + 1];
757 /* Cap path length to the path buffer size */
758 if (n > sizeof path - 1)
761 /* Fetch one byte more to find out whether path length > n. */
762 nul_seen = umovestr(tcp, addr, n + 1, path);
764 tprintf("%#lx", addr);
767 print_quoted_string(path, n, QUOTE_0_TERMINATED);
774 printpath(struct tcb *tcp, long addr)
776 /* Size must correspond to char path[] size in printpathn */
777 printpathn(tcp, addr, PATH_MAX);
781 * Print string specified by address `addr' and length `len'.
782 * If `len' < 0, treat the string as a NUL-terminated string.
783 * If string length exceeds `max_strlen', append `...' to the output.
786 printstr(struct tcb *tcp, long addr, long len)
788 static char *str = NULL;
798 /* Allocate static buffers if they are not allocated yet. */
800 unsigned int outstr_size = 4 * max_strlen + /*for quotes and NUL:*/ 3;
802 if (outstr_size / 4 != max_strlen)
804 str = xmalloc(max_strlen + 1);
805 outstr = xmalloc(outstr_size);
811 * Treat as a NUL-terminated string: fetch one byte more
812 * because string_quote may look one byte ahead.
814 if (umovestr(tcp, addr, size + 1, str) < 0) {
815 tprintf("%#lx", addr);
818 style = QUOTE_0_TERMINATED;
821 if (size > (unsigned long)len)
822 size = (unsigned long)len;
823 if (umoven(tcp, addr, size, str) < 0) {
824 tprintf("%#lx", addr);
830 /* If string_quote didn't see NUL and (it was supposed to be ASCIZ str
831 * or we were requested to print more than -s NUM chars)...
833 ellipsis = (string_quote(str, outstr, size, style) &&
834 (len < 0 || (unsigned long) len > max_strlen));
842 dumpiov_upto(struct tcb *tcp, int len, long addr, unsigned long data_size)
844 #if SUPPORTED_PERSONALITIES > 1
846 struct { uint32_t base; uint32_t len; } *iov32;
847 struct { uint64_t base; uint64_t len; } *iov64;
849 #define iov iovu.iov64
851 (current_wordsize == 4 ? sizeof(*iovu.iov32) : sizeof(*iovu.iov64))
852 #define iov_iov_base(i) \
853 (current_wordsize == 4 ? (uint64_t) iovu.iov32[i].base : iovu.iov64[i].base)
854 #define iov_iov_len(i) \
855 (current_wordsize == 4 ? (uint64_t) iovu.iov32[i].len : iovu.iov64[i].len)
858 #define sizeof_iov sizeof(*iov)
859 #define iov_iov_base(i) iov[i].iov_base
860 #define iov_iov_len(i) iov[i].iov_len
865 size = sizeof_iov * len;
866 /* Assuming no sane program has millions of iovs */
867 if ((unsigned)len > 1024*1024 /* insane or negative size? */
868 || (iov = malloc(size)) == NULL) {
869 error_msg("Out of memory");
872 if (umoven(tcp, addr, size, iov) >= 0) {
873 for (i = 0; i < len; i++) {
874 unsigned long iov_len = iov_iov_len(i);
875 if (iov_len > data_size)
879 data_size -= iov_len;
880 /* include the buffer number to make it easy to
881 * match up the trace with the source */
882 tprintf(" * %lu bytes in buffer %d\n", iov_len, i);
883 dumpstr(tcp, (long) iov_iov_base(i), iov_len);
894 dumpstr(struct tcb *tcp, long addr, int len)
896 static int strsize = -1;
897 static unsigned char *str;
902 "xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx "
903 "1234567890123456") + /*in case I'm off by few:*/ 4)
904 /*align to 8 to make memset easier:*/ + 7) & -8
906 const unsigned char *src;
909 memset(outbuf, ' ', sizeof(outbuf));
911 if (strsize < len + 16) {
913 str = malloc(len + 16);
916 error_msg("Out of memory");
922 if (umoven(tcp, addr, len, str) < 0)
925 /* Space-pad to 16 bytes */
937 *dst++ = "0123456789abcdef"[*src >> 4];
938 *dst++ = "0123456789abcdef"[*src & 0xf];
944 dst++; /* space is there by memset */
947 dst++; /* space is there by memset */
954 if (*src >= ' ' && *src < 0x7f)
961 tprintf(" | %05x %s |\n", i - 16, outbuf);
965 #ifdef HAVE_PROCESS_VM_READV
966 /* C library supports this, but the kernel might not. */
967 static bool process_vm_readv_not_supported = 0;
970 /* Need to do this since process_vm_readv() is not yet available in libc.
971 * When libc is be updated, only "static bool process_vm_readv_not_supported"
972 * line should remain.
974 #if !defined(__NR_process_vm_readv)
976 # define __NR_process_vm_readv 347
977 # elif defined(X86_64)
978 # define __NR_process_vm_readv 310
979 # elif defined(POWERPC)
980 # define __NR_process_vm_readv 351
984 #if defined(__NR_process_vm_readv)
985 static bool process_vm_readv_not_supported = 0;
986 /* Have to avoid duplicating with the C library headers. */
987 static ssize_t strace_process_vm_readv(pid_t pid,
988 const struct iovec *lvec,
989 unsigned long liovcnt,
990 const struct iovec *rvec,
991 unsigned long riovcnt,
994 return syscall(__NR_process_vm_readv, (long)pid, lvec, liovcnt, rvec, riovcnt, flags);
996 #define process_vm_readv strace_process_vm_readv
998 static bool process_vm_readv_not_supported = 1;
999 # define process_vm_readv(...) (errno = ENOSYS, -1)
1002 #endif /* end of hack */
1005 vm_read_mem(pid_t pid, void *laddr, long raddr, size_t len)
1007 const struct iovec local = {
1011 const struct iovec remote = {
1012 .iov_base = (void *) raddr,
1016 return process_vm_readv(pid, &local, 1, &remote, 1, 0);
1020 * move `len' bytes of data from process `pid'
1021 * at address `addr' to our space at `our_addr'
1024 umoven(struct tcb *tcp, long addr, unsigned int len, void *our_addr)
1026 char *laddr = our_addr;
1028 unsigned int n, m, nread;
1031 char x[sizeof(long)];
1034 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
1035 if (current_wordsize < sizeof(addr))
1036 addr &= (1ul << 8 * current_wordsize) - 1;
1039 if (!process_vm_readv_not_supported) {
1040 int r = vm_read_mem(pid, laddr, addr, len);
1041 if ((unsigned int) r == len)
1044 error_msg("umoven: short read (%u < %u) @0x%lx",
1045 (unsigned int) r, len, addr);
1050 process_vm_readv_not_supported = 1;
1053 /* operation not permitted, try PTRACE_PEEKDATA */
1056 /* the process is gone */
1058 case EFAULT: case EIO:
1059 /* address space is inaccessible */
1062 /* all the rest is strange and should be reported */
1063 perror_msg("process_vm_readv");
1069 if (addr & (sizeof(long) - 1)) {
1070 /* addr not a multiple of sizeof(long) */
1071 n = addr & (sizeof(long) - 1); /* residue */
1072 addr &= -sizeof(long); /* aligned address */
1074 u.val = ptrace(PTRACE_PEEKDATA, pid, (char *) addr, 0);
1078 case ESRCH: case EINVAL:
1079 /* these could be seen if the process is gone */
1081 case EFAULT: case EIO: case EPERM:
1082 /* address space is inaccessible */
1085 /* all the rest is strange and should be reported */
1086 perror_msg("umoven: PTRACE_PEEKDATA pid:%d @0x%lx",
1090 m = MIN(sizeof(long) - n, len);
1091 memcpy(laddr, &u.x[n], m);
1092 addr += sizeof(long);
1099 u.val = ptrace(PTRACE_PEEKDATA, pid, (char *) addr, 0);
1103 case ESRCH: case EINVAL:
1104 /* these could be seen if the process is gone */
1106 case EFAULT: case EIO: case EPERM:
1107 /* address space is inaccessible */
1109 perror_msg("umoven: short read (%u < %u) @0x%lx",
1110 nread, nread + len, addr - nread);
1114 /* all the rest is strange and should be reported */
1115 perror_msg("umoven: PTRACE_PEEKDATA pid:%d @0x%lx",
1119 m = MIN(sizeof(long), len);
1120 memcpy(laddr, u.x, m);
1121 addr += sizeof(long);
1131 umoven_or_printaddr(struct tcb *tcp, const long addr, const unsigned int len,
1138 if (!verbose(tcp) || (exiting(tcp) && syserror(tcp)) ||
1139 umoven(tcp, addr, len, our_addr) < 0) {
1140 tprintf("%#lx", addr);
1147 * Like `umove' but make the additional effort of looking
1148 * for a terminating zero byte.
1150 * Returns < 0 on error, > 0 if NUL was seen,
1151 * (TODO if useful: return count of bytes including NUL),
1152 * else 0 if len bytes were read but no NUL byte seen.
1154 * Note: there is no guarantee we won't overwrite some bytes
1155 * in laddr[] _after_ terminating NUL (but, of course,
1156 * we never write past laddr[len-1]).
1159 umovestr(struct tcb *tcp, long addr, unsigned int len, char *laddr)
1161 #if SIZEOF_LONG == 4
1162 const unsigned long x01010101 = 0x01010101ul;
1163 const unsigned long x80808080 = 0x80808080ul;
1164 #elif SIZEOF_LONG == 8
1165 const unsigned long x01010101 = 0x0101010101010101ul;
1166 const unsigned long x80808080 = 0x8080808080808080ul;
1168 # error SIZEOF_LONG > 8
1172 unsigned int n, m, nread;
1175 char x[sizeof(long)];
1178 #if SUPPORTED_PERSONALITIES > 1 && SIZEOF_LONG > 4
1179 if (current_wordsize < sizeof(addr))
1180 addr &= (1ul << 8 * current_wordsize) - 1;
1184 if (!process_vm_readv_not_supported) {
1185 const size_t page_size = get_pagesize();
1186 const size_t page_mask = page_size - 1;
1189 unsigned int chunk_len;
1190 unsigned int end_in_page;
1193 * Don't cross pages, otherwise we can get EFAULT
1194 * and fail to notice that terminating NUL lies
1195 * in the existing (first) page.
1197 chunk_len = len > page_size ? page_size : len;
1198 end_in_page = (addr + chunk_len) & page_mask;
1199 if (chunk_len > end_in_page) /* crosses to the next page */
1200 chunk_len -= end_in_page;
1202 int r = vm_read_mem(pid, laddr, addr, chunk_len);
1204 if (memchr(laddr, '\0', r))
1214 process_vm_readv_not_supported = 1;
1215 goto vm_readv_didnt_work;
1217 /* the process is gone */
1220 /* operation not permitted, try PTRACE_PEEKDATA */
1222 goto vm_readv_didnt_work;
1224 case EFAULT: case EIO:
1225 /* address space is inaccessible */
1227 perror_msg("umovestr: short read (%d < %d) @0x%lx",
1228 nread, nread + len, addr - nread);
1232 /* all the rest is strange and should be reported */
1233 perror_msg("process_vm_readv");
1239 vm_readv_didnt_work:
1241 if (addr & (sizeof(long) - 1)) {
1242 /* addr not a multiple of sizeof(long) */
1243 n = addr & (sizeof(long) - 1); /* residue */
1244 addr &= -sizeof(long); /* aligned address */
1246 u.val = ptrace(PTRACE_PEEKDATA, pid, (char *)addr, 0);
1250 case ESRCH: case EINVAL:
1251 /* these could be seen if the process is gone */
1253 case EFAULT: case EIO: case EPERM:
1254 /* address space is inaccessible */
1257 /* all the rest is strange and should be reported */
1258 perror_msg("umovestr: PTRACE_PEEKDATA pid:%d @0x%lx",
1262 m = MIN(sizeof(long) - n, len);
1263 memcpy(laddr, &u.x[n], m);
1264 while (n & (sizeof(long) - 1))
1265 if (u.x[n++] == '\0')
1267 addr += sizeof(long);
1275 u.val = ptrace(PTRACE_PEEKDATA, pid, (char *)addr, 0);
1279 case ESRCH: case EINVAL:
1280 /* these could be seen if the process is gone */
1282 case EFAULT: case EIO: case EPERM:
1283 /* address space is inaccessible */
1285 perror_msg("umovestr: short read (%d < %d) @0x%lx",
1286 nread, nread + len, addr - nread);
1290 /* all the rest is strange and should be reported */
1291 perror_msg("umovestr: PTRACE_PEEKDATA pid:%d @0x%lx",
1295 m = MIN(sizeof(long), len);
1296 memcpy(laddr, u.x, m);
1297 /* "If a NUL char exists in this word" */
1298 if ((u.val - x01010101) & ~u.val & x80808080)
1300 addr += sizeof(long);
1309 * Iteratively fetch and print up to nmemb elements of elem_size size
1310 * from the array that starts at tracee's address start_addr.
1312 * Array elements are being fetched to the address specified by elem_buf.
1314 * The fetcher callback function specified by umoven_func should follow
1315 * the same semantics as umoven_or_printaddr function.
1317 * The printer callback function specified by print_func is expected
1318 * to print something; if it returns false, no more iterations will be made.
1320 * The pointer specified by opaque_data is passed to each invocation
1321 * of print_func callback function.
1323 * This function prints:
1324 * - "NULL", if start_addr is NULL;
1325 * - "[]", if nmemb is 0;
1326 * - start_addr, if nmemb * elem_size overflows or wraps around;
1327 * - nothing, if the first element cannot be fetched
1328 * (if umoven_func returns non-zero), but it is assumed that
1329 * umoven_func has printed the address it failed to fetch data from;
1330 * - elements of the array, delimited by ", ", with the array itself
1331 * enclosed with [] brackets.
1333 * If abbrev(tcp) is true, then
1334 * - the maximum number of elements printed equals to max_strlen;
1335 * - "..." is printed instead of max_strlen+1 element
1336 * and no more iterations will be made.
1338 * This function returns true only if
1339 * - umoven_func has been called at least once AND
1340 * - umoven_func has not returned false.
1343 print_array(struct tcb *tcp,
1344 const unsigned long start_addr,
1346 void *const elem_buf,
1347 const size_t elem_size,
1348 int (*const umoven_func)(struct tcb *,
1352 bool (*const print_func)(struct tcb *,
1356 void *const opaque_data)
1368 const size_t size = nmemb * elem_size;
1369 const unsigned long end_addr = start_addr + size;
1371 if (end_addr <= start_addr || size / elem_size != nmemb) {
1372 printaddr(start_addr);
1376 const unsigned long abbrev_end =
1377 (abbrev(tcp) && max_strlen < nmemb) ?
1378 start_addr + elem_size * max_strlen : end_addr;
1381 for (cur = start_addr; cur < end_addr; cur += elem_size) {
1382 if (cur != start_addr)
1385 if (umoven_func(tcp, cur, elem_size, elem_buf))
1388 if (cur == start_addr)
1391 if (cur >= abbrev_end) {
1397 if (!print_func(tcp, elem_buf, elem_size, opaque_data)) {
1402 if (cur != start_addr)
1405 return cur >= end_addr;