windows-nt/Source/XPSP1/NT/inetsrv/iis/iisrearc/ul/ulkd/irp.c

399 lines
8.6 KiB
C
Raw Normal View History

2020-09-26 03:20:57 -05:00
/*++
Copyright (c) 1999-2001 Microsoft Corporation
Module Name:
irp.c
Abstract:
Implements the irplog command.
Author:
Keith Moore (keithmo) 10-Aug-1999
Environment:
User Mode.
Revision History:
--*/
#include "precomp.h"
//
// Private constants.
//
//
// Private globals.
//
PSTR g_pIrpActions[] =
{
"INCOMING",
"ALLOCATE",
"FREE ",
"CALL ",
"COMPLETE"
};
C_ASSERT( DIM(g_pIrpActions) == IRP_ACTION_COUNT );
//
// Public functions.
//
DECLARE_API( irplog )
/*++
Routine Description:
Dumps the IRP trace log.
Arguments:
None.
Return Value:
None.
--*/
{
ULONG_PTR address = 0;
ULONGLONG context = 0;
ULONGLONG flags = 0;
ULONG_PTR entryAddress;
ULONG_PTR logPointer;
ULONG result;
TRACE_LOG logHeader;
LONGLONG numEntries;
IRP_TRACE_LOG_ENTRY logEntry;
PSTR pFileName;
PSTR pAction;
LONGLONG index;
LONGLONG StartingIndex = 0;
ULONG_PTR offset1;
ULONG_PTR offset2;
CHAR filePath[MAX_PATH];
CHAR symbol1[MAX_SYMBOL_LENGTH];
CHAR symbol2[MAX_SYMBOL_LENGTH];
CHAR invalidAction[sizeof("2047")];
ULONG64 context64 = 0;
ULONG64 flags64 = 0;
ULONG64 StartingIndex64 = 0;
SNAPSHOT_EXTENSION_DATA();
//
// Snag the optional context, flags, and StartingIndex from the command line.
//
if (GetExpressionEx(args, &context64, &args))
if (GetExpressionEx(args, &flags64, &args))
GetExpressionEx(args, &StartingIndex64, &args);
context = (ULONG_PTR) context64;
flags = (ULONG_PTR) flags64;
StartingIndex = (ULONG_PTR) StartingIndex64;
//
// Find the log.
//
address = GetExpression( "&http!g_pIrpTraceLog" );
if (address == 0)
{
dprintf( "irplog: cannot find http!g_pIrpTraceLog\n" );
return;
}
//
// Read the pointer.
//
if (!ReadMemory(
address,
&logPointer,
sizeof(logPointer),
&result
))
{
dprintf(
"irplog: cannot read PTRACE_LOG @ %p\n",
address
);
return;
}
//
// Read the log header.
//
if (!ReadMemory(
logPointer,
&logHeader,
sizeof(logHeader),
&result
))
{
dprintf(
"ref: cannot read TRACE_LOG @ %p\n",
logPointer
);
return;
}
dprintf(
"ref: log @ %p\n"
" Signature = %08lx '%c%c%c%c' (%s)\n"
" TypeSignature = %08lx '%c%c%c%c'\n"
" LogSize = %lu\n"
" NextEntry = %I64d\n"
" EntrySize = %lu\n"
" LogBuffer = %p\n",
address,
logHeader.Signature,
DECODE_SIGNATURE(logHeader.Signature),
logHeader.Signature == TRACE_LOG_SIGNATURE
? "OK"
: logHeader.Signature == TRACE_LOG_SIGNATURE_X
? "FREED"
: "INVALID",
logHeader.TypeSignature,
DECODE_SIGNATURE(logHeader.TypeSignature),
logHeader.LogSize,
logHeader.NextEntry,
logHeader.EntrySize,
logHeader.pLogBuffer
);
if (logHeader.pLogBuffer > ( (PUCHAR)address + sizeof(logHeader) ))
{
dprintf(
" ExtraData @ %p\n",
address + sizeof(logHeader)
);
}
if (logHeader.Signature != TRACE_LOG_SIGNATURE &&
logHeader.Signature != TRACE_LOG_SIGNATURE_X)
{
dprintf(
"irplog: log @ %p has invalid signature %08lx:\n",
address,
logHeader.Signature
);
return;
}
if (logHeader.EntrySize != sizeof(logEntry)
|| logHeader.TypeSignature != IRP_TRACE_LOG_SIGNATURE)
{
dprintf(
"irplog: log @ %p is not an IRP trace log\n",
address
);
return;
}
if (logHeader.NextEntry == -1)
{
dprintf(
"irplog: empty log @ %p\n",
address
);
return;
}
//
// Calculate the log size to dump.
//
if (logHeader.NextEntry < logHeader.LogSize)
{
numEntries = logHeader.NextEntry + 1;
index = 0;
}
else
{
numEntries = logHeader.LogSize;
index = (logHeader.NextEntry + 1) % logHeader.LogSize;
}
entryAddress = (ULONG_PTR)logHeader.pLogBuffer +
(ULONG_PTR)( index * sizeof(logEntry) );
if (entryAddress >=
( (ULONG_PTR)logHeader.pLogBuffer + (ULONG_PTR)( numEntries * sizeof(logEntry) ) ) )
{
dprintf(
"irplog: log @ %p has invalid data\n",
address
);
return;
}
if ((flags & 4) && (StartingIndex!=0) && (StartingIndex<numEntries))
{
index = StartingIndex;
entryAddress += (ULONG_PTR)(sizeof(logEntry)*index);
numEntries -= StartingIndex;
}
//
// Dump the log.
//
for (;
numEntries > 0 ;
index++,
numEntries--,
entryAddress += sizeof(logEntry))
{
if (CheckControlC())
{
break;
}
if (index >= logHeader.LogSize)
{
index = 0;
entryAddress = (ULONG_PTR)logHeader.pLogBuffer;
}
if (!ReadMemory(
entryAddress,
&logEntry,
sizeof(logEntry),
NULL
))
{
dprintf(
"irplog: cannot read memory @ %p\n",
entryAddress
);
return;
}
if (context == 0 ||
context == (ULONG_PTR)logEntry.pIrp)
{
if (ReadMemory(
(ULONG_PTR)logEntry.pFileName,
filePath,
sizeof(filePath),
&result
))
{
pFileName = strrchr( filePath, '\\' );
if (pFileName != NULL)
{
pFileName++;
}
else
{
pFileName = filePath;
}
}
else
{
sprintf(
filePath,
"%p",
logEntry.pFileName
);
pFileName = filePath;
}
if (logEntry.Action < IRP_ACTION_COUNT)
{
pAction = g_pIrpActions[logEntry.Action];
}
else
{
sprintf( invalidAction, "%lu", (ULONG)logEntry.Action );
pAction = invalidAction;
}
dprintf(
"Entry=%lu CPU=%lu IRP=%p Act=%s Src=%s:%lu\n",
index,
(ULONG)logEntry.Processor,
logEntry.pIrp,
pAction,
pFileName,
logEntry.LineNumber
);
if (flags & 1)
{
GetSymbol(
logEntry.pCaller,
symbol1,
&offset1
);
GetSymbol(
logEntry.pCallersCaller,
symbol2,
&offset2
);
dprintf(
" Process=%p Thread=%p\n"
" Caller1=%p (%s+0x%p)\n"
" Caller2=%p (%s+0x%p)\n",
logEntry.pProcess,
logEntry.pThread,
logEntry.pCaller,
symbol1,
offset1,
logEntry.pCallersCaller,
symbol2,
offset2
);
}
#if ENABLE_IRP_CAPTURE
if (flags & 2)
{
CHAR temp[sizeof("1234567812345678 f")];
sprintf(
temp,
"%p",
REMOTE_OFFSET(
entryAddress,
IRP_TRACE_LOG_ENTRY,
CapturedIrp
)
);
if (flags & 4)
{
strcat( temp, " f" );
}
CallExtensionRoutine( "irp", temp );
}
#endif
}
}
} // irplog