2 * Debugger memory handling
4 * Copyright 1993 Eric Youngdale
5 * Copyright 1995 Alexandre Julliard
11 #include "wine/winbase16.h"
16 /************************************************************
18 * Check if linear pointer in [addr, addr+size[
22 ************************************************************/
24 BOOL DEBUG_checkmap_bad( const char *addr, size_t size, int rwflag)
27 char buf[200]; /* temporary line buffer */
28 char prot[5]; /* protection string */
34 The entries in /proc/self/maps are of the form:
35 08000000-08002000 r-xp 00000000 03:41 2361
36 08002000-08003000 rw-p 00001000 03:41 2361
37 08003000-08005000 rwxp 00000000 00:00 0
38 40000000-40005000 r-xp 00000000 03:41 67219
39 40005000-40006000 rw-p 00004000 03:41 67219
40 40006000-40007000 rw-p 00000000 00:00 0
42 start end perm ??? major:minor inode
44 Only permissions start and end are used here
48 % cat /proc/curproc/map
49 start end resident private perm type
50 0x1000 0xe000 12 0 r-x COW vnode
51 0xe000 0x10000 2 2 rwx COW vnode
52 0x10000 0x27000 4 4 rwx default
53 0x800e000 0x800f000 1 1 rw- default
54 0xefbde000 0xefbfe000 1 1 rwx default
59 % cat /proc/curproc/map on FreeBSD 3.0
60 start end ? ? ? prot ? ? ? ? ? ?
61 0x8048000 0x8054000 12 14 114770 r-x 2 1 0x0 COW NC vnode
62 0x8054000 0x8055000 1 0 166664 rwx 1 0 0x2180 COW NNC vnode
63 0x8055000 0x806a000 5 0 166662 rwx 1 0 0x2180 NCOW NNC default
64 0x28054000 0x28055000 1 0 166666 rwx 1 0 0x2180 NCOW NNC default
65 0xefbde000 0xefbfe000 1 0 166663 rwx 1 0 0x2180 NCOW NNC default
71 if (!(fp = fopen("/proc/self/maps","r")) &&
72 !(fp = fopen("/proc/curproc/map","r"))
78 * *FOO* read(2) less than length of /proc/.../map fails with EFBIG
80 * $ dd bs=256 </proc/curproc/map
81 * dd: stdin: File too large
84 * 0 bytes transferred in 0.001595 secs (0 bytes/sec)
86 setvbuf(fp, (char *)NULL, _IOFBF, 0x4000);
88 while (fgets( buf, sizeof(buf)-1, fp)) {
90 sscanf(buf, "%x-%x %3s", (int *) &start, (int *) &end, prot);
92 sscanf(buf, "%x %x %*d %*d %3s", (int *) &start, (int *) &end, prot);
93 if (prot[0]!='r' && prot[0]!='-') /* FreeBSD 3.0 format */
94 sscanf(buf, "%x %x %*d %*d %*d %3s", (int *) &start, (int *) &end, prot);
98 if (start <= addr && addr+size <= end) {
100 ret = (prot[0] != 'r'); /* test for reading */
102 ret = (prot[1] != 'w'); /* test for writing */
111 /***********************************************************************
114 * Check if we are allowed to read memory at 'address'.
116 BOOL DEBUG_IsBadReadPtr( const DBG_ADDR *address, int size )
118 if (!IS_SELECTOR_V86(address->seg))
119 if (address->seg) /* segmented addr */
121 if (IsBadReadPtr16( (SEGPTR)MAKELONG( (WORD)address->off,
122 (WORD)address->seg ), size ))
125 return DEBUG_checkmap_bad( DBG_ADDR_TO_LIN(address), size, 1);
129 /***********************************************************************
130 * DEBUG_IsBadWritePtr
132 * Check if we are allowed to write memory at 'address'.
134 BOOL DEBUG_IsBadWritePtr( const DBG_ADDR *address, int size )
136 if (!IS_SELECTOR_V86(address->seg))
137 if (address->seg) /* segmented addr */
139 /* Note: we use IsBadReadPtr here because we are */
140 /* always allowed to write to read-only segments */
141 if (IsBadReadPtr16( (SEGPTR)MAKELONG( (WORD)address->off,
142 (WORD)address->seg ), size ))
145 return DEBUG_checkmap_bad( DBG_ADDR_TO_LIN(address), size, 0);
149 /***********************************************************************
152 * Read a memory value.
154 int DEBUG_ReadMemory( const DBG_ADDR *address )
156 DBG_ADDR addr = *address;
158 DBG_FIX_ADDR_SEG( &addr, DS_reg(&DEBUG_context) );
159 if (!DBG_CHECK_READ_PTR( &addr, sizeof(int) )) return 0;
160 return *(int *)DBG_ADDR_TO_LIN( &addr );
164 /***********************************************************************
167 * Store a value in memory.
169 void DEBUG_WriteMemory( const DBG_ADDR *address, int value )
171 DBG_ADDR addr = *address;
173 DBG_FIX_ADDR_SEG( &addr, DS_reg(&DEBUG_context) );
174 if (!DBG_CHECK_WRITE_PTR( &addr, sizeof(int) )) return;
175 *(int *)DBG_ADDR_TO_LIN( &addr ) = value;
179 /***********************************************************************
180 * DEBUG_ExamineMemory
182 * Implementation of the 'x' command.
184 void DEBUG_ExamineMemory( const DBG_ADDR *address, int count, char format )
186 DBG_ADDR addr = * address;
191 struct datatype * testtype;
192 unsigned short int * wdump;
194 DBG_FIX_ADDR_SEG( &addr, (format == 'i') ?
195 CS_reg(&DEBUG_context) : DS_reg(&DEBUG_context) );
198 * Dereference pointer to get actual memory address we need to be
199 * reading. We will use the same segment as what we have already,
200 * and hope that this is a sensible thing to do.
202 if( addr.type != NULL )
204 if( addr.type == DEBUG_TypeIntConst )
207 * We know that we have the actual offset stored somewhere
208 * else in 32-bit space. Grab it, and we
213 addr.off = DEBUG_GetExprValue(&addr, NULL);
218 if (!DBG_CHECK_READ_PTR( &addr, 1 )) return;
219 DEBUG_TypeDerefPointer(&addr, &testtype);
220 if( testtype != NULL || addr.type == DEBUG_TypeIntConst )
222 addr.off = DEBUG_GetExprValue(&addr, NULL);
226 else if (!addr.seg && !addr.off)
228 fprintf(stderr,"Invalid expression\n");
232 if (format != 'i' && count > 1)
234 DEBUG_PrintAddress( &addr, dbg_mode, FALSE );
235 fprintf(stderr,": ");
238 pnt = DBG_ADDR_TO_LIN( &addr );
243 WCHAR *ptr = (WCHAR*)pnt;
244 if (count == 1) count = 256;
247 if (!DBG_CHECK_READ_PTR( &addr, sizeof(WCHAR) )) return;
250 fputc( (char)*ptr++, stderr );
252 fprintf(stderr,"\n");
256 if (count == 1) count = 256;
259 if (!DBG_CHECK_READ_PTR( &addr, sizeof(char) )) return;
262 fputc( *pnt++, stderr );
264 fprintf(stderr,"\n");
270 DEBUG_PrintAddress( &addr, dbg_mode, TRUE );
271 fprintf(stderr,": ");
272 if (!DBG_CHECK_READ_PTR( &addr, 1 )) return;
273 DEBUG_Disasm( &addr, TRUE );
274 fprintf(stderr,"\n");
278 dump = (unsigned int *)pnt;
279 for(i=0; i<count; i++)
281 if (!DBG_CHECK_READ_PTR( &addr, sizeof(int) )) return;
282 fprintf(stderr," %8.8x", *dump++);
283 addr.off += sizeof(int);
286 fprintf(stderr,"\n");
287 DEBUG_PrintAddress( &addr, dbg_mode, FALSE );
288 fprintf(stderr,": ");
291 fprintf(stderr,"\n");
295 dump = (unsigned int *)pnt;
296 for(i=0; i<count; i++)
298 if (!DBG_CHECK_READ_PTR( &addr, sizeof(int) )) return;
299 fprintf(stderr," %10d", *dump++);
300 addr.off += sizeof(int);
303 fprintf(stderr,"\n");
304 DEBUG_PrintAddress( &addr, dbg_mode, FALSE );
305 fprintf(stderr,": ");
308 fprintf(stderr,"\n");
312 wdump = (unsigned short *)pnt;
313 for(i=0; i<count; i++)
315 if (!DBG_CHECK_READ_PTR( &addr, sizeof(short) )) return;
316 fprintf(stderr," %04x", *wdump++);
317 addr.off += sizeof(short);
320 fprintf(stderr,"\n");
321 DEBUG_PrintAddress( &addr, dbg_mode, FALSE );
322 fprintf(stderr,": ");
325 fprintf(stderr,"\n");
329 for(i=0; i<count; i++)
331 if (!DBG_CHECK_READ_PTR( &addr, sizeof(char) )) return;
337 else fprintf(stderr," %c", *pnt++);
341 fprintf(stderr,"\n");
342 DEBUG_PrintAddress( &addr, dbg_mode, FALSE );
343 fprintf(stderr,": ");
346 fprintf(stderr,"\n");
350 for(i=0; i<count; i++)
352 if (!DBG_CHECK_READ_PTR( &addr, sizeof(char) )) return;
353 fprintf(stderr," %02x", (*pnt++) & 0xff);
357 fprintf(stderr,"\n");
358 DEBUG_PrintAddress( &addr, dbg_mode, FALSE );
359 fprintf(stderr,": ");
362 fprintf(stderr,"\n");