Emulator.cpp 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555
  1. /*
  2. * Copyright (c) 2020-2021, Andreas Kling <kling@serenityos.org>
  3. * All rights reserved.
  4. *
  5. * Redistribution and use in source and binary forms, with or without
  6. * modification, are permitted provided that the following conditions are met:
  7. *
  8. * 1. Redistributions of source code must retain the above copyright notice, this
  9. * list of conditions and the following disclaimer.
  10. *
  11. * 2. Redistributions in binary form must reproduce the above copyright notice,
  12. * this list of conditions and the following disclaimer in the documentation
  13. * and/or other materials provided with the distribution.
  14. *
  15. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
  16. * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  17. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  18. * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
  19. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  20. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
  21. * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
  22. * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
  23. * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  24. * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  25. */
  26. #include "Emulator.h"
  27. #include "MmapRegion.h"
  28. #include "SimpleRegion.h"
  29. #include "SoftCPU.h"
  30. #include <AK/Debug.h>
  31. #include <AK/Format.h>
  32. #include <AK/LexicalPath.h>
  33. #include <AK/MappedFile.h>
  34. #include <LibELF/AuxiliaryVector.h>
  35. #include <LibELF/Image.h>
  36. #include <LibELF/Validation.h>
  37. #include <LibX86/ELFSymbolProvider.h>
  38. #include <fcntl.h>
  39. #include <syscall.h>
  40. #include <unistd.h>
  41. #if defined(__GNUC__) && !defined(__clang__)
  42. # pragma GCC optimize("O3")
  43. #endif
  44. namespace UserspaceEmulator {
  45. static constexpr u32 stack_location = 0x10000000;
  46. static constexpr size_t stack_size = 1 * MiB;
  47. static Emulator* s_the;
  48. Emulator& Emulator::the()
  49. {
  50. VERIFY(s_the);
  51. return *s_the;
  52. }
  53. Emulator::Emulator(const String& executable_path, const Vector<String>& arguments, const Vector<String>& environment)
  54. : m_executable_path(executable_path)
  55. , m_arguments(arguments)
  56. , m_environment(environment)
  57. , m_mmu(*this)
  58. , m_cpu(*this)
  59. {
  60. m_malloc_tracer = make<MallocTracer>(*this);
  61. static constexpr FlatPtr userspace_range_base = 0x00800000;
  62. static constexpr FlatPtr userspace_range_ceiling = 0xbe000000;
  63. #ifdef UE_ASLR
  64. static constexpr FlatPtr page_mask = 0xfffff000u;
  65. size_t random_offset = (get_random<u8>() % 32 * MiB) & page_mask;
  66. FlatPtr base = userspace_range_base + random_offset;
  67. #else
  68. FlatPtr base = userspace_range_base;
  69. #endif
  70. m_range_allocator.initialize_with_range(VirtualAddress(base), userspace_range_ceiling - base);
  71. VERIFY(!s_the);
  72. s_the = this;
  73. // setup_stack(arguments, environment);
  74. register_signal_handlers();
  75. setup_signal_trampoline();
  76. }
  77. Vector<ELF::AuxiliaryValue> Emulator::generate_auxiliary_vector(FlatPtr load_base, FlatPtr entry_eip, String executable_path, int executable_fd) const
  78. {
  79. // FIXME: This is not fully compatible with the auxiliary vector the kernel generates, this is just the bare
  80. // minimum to get the loader going.
  81. Vector<ELF::AuxiliaryValue> auxv;
  82. // PHDR/EXECFD
  83. // PH*
  84. auxv.append({ ELF::AuxiliaryValue::PageSize, PAGE_SIZE });
  85. auxv.append({ ELF::AuxiliaryValue::BaseAddress, (void*)load_base });
  86. auxv.append({ ELF::AuxiliaryValue::Entry, (void*)entry_eip });
  87. // FIXME: Don't hard code this? We might support other platforms later.. (e.g. x86_64)
  88. auxv.append({ ELF::AuxiliaryValue::Platform, "i386" });
  89. auxv.append({ ELF::AuxiliaryValue::ExecFilename, executable_path });
  90. auxv.append({ ELF::AuxiliaryValue::ExecFileDescriptor, executable_fd });
  91. auxv.append({ ELF::AuxiliaryValue::Null, 0L });
  92. return auxv;
  93. }
  94. void Emulator::setup_stack(Vector<ELF::AuxiliaryValue> aux_vector)
  95. {
  96. auto stack_region = make<SimpleRegion>(stack_location, stack_size);
  97. stack_region->set_stack(true);
  98. m_mmu.add_region(move(stack_region));
  99. m_cpu.set_esp(shadow_wrap_as_initialized<u32>(stack_location + stack_size));
  100. Vector<u32> argv_entries;
  101. for (auto& argument : m_arguments) {
  102. m_cpu.push_string(argument.characters());
  103. argv_entries.append(m_cpu.esp().value());
  104. }
  105. Vector<u32> env_entries;
  106. for (auto& variable : m_environment) {
  107. m_cpu.push_string(variable.characters());
  108. env_entries.append(m_cpu.esp().value());
  109. }
  110. for (auto& auxv : aux_vector) {
  111. if (!auxv.optional_string.is_empty()) {
  112. m_cpu.push_string(auxv.optional_string.characters());
  113. auxv.auxv.a_un.a_ptr = (void*)m_cpu.esp().value();
  114. }
  115. }
  116. for (ssize_t i = aux_vector.size() - 1; i >= 0; --i) {
  117. auto& value = aux_vector[i].auxv;
  118. m_cpu.push_buffer((const u8*)&value, sizeof(value));
  119. }
  120. m_cpu.push32(shadow_wrap_as_initialized<u32>(0)); // char** envp = { envv_entries..., nullptr }
  121. for (ssize_t i = env_entries.size() - 1; i >= 0; --i)
  122. m_cpu.push32(shadow_wrap_as_initialized(env_entries[i]));
  123. u32 envp = m_cpu.esp().value();
  124. m_cpu.push32(shadow_wrap_as_initialized<u32>(0)); // char** argv = { argv_entries..., nullptr }
  125. for (ssize_t i = argv_entries.size() - 1; i >= 0; --i)
  126. m_cpu.push32(shadow_wrap_as_initialized(argv_entries[i]));
  127. u32 argv = m_cpu.esp().value();
  128. m_cpu.push32(shadow_wrap_as_initialized<u32>(0)); // (alignment)
  129. u32 argc = argv_entries.size();
  130. m_cpu.push32(shadow_wrap_as_initialized(envp));
  131. m_cpu.push32(shadow_wrap_as_initialized(argv));
  132. m_cpu.push32(shadow_wrap_as_initialized(argc));
  133. m_cpu.push32(shadow_wrap_as_initialized<u32>(0)); // (alignment)
  134. }
  135. bool Emulator::load_elf()
  136. {
  137. auto file_or_error = MappedFile::map(m_executable_path);
  138. if (file_or_error.is_error()) {
  139. reportln("Unable to map {}: {}", m_executable_path, file_or_error.error());
  140. return false;
  141. }
  142. auto elf_image_data = file_or_error.value()->bytes();
  143. ELF::Image executable_elf(elf_image_data);
  144. if (!executable_elf.is_dynamic()) {
  145. // FIXME: Support static objects
  146. VERIFY_NOT_REACHED();
  147. }
  148. String interpreter_path;
  149. if (!ELF::validate_program_headers(*(const Elf32_Ehdr*)elf_image_data.data(), elf_image_data.size(), (const u8*)elf_image_data.data(), elf_image_data.size(), &interpreter_path)) {
  150. reportln("failed to validate ELF file");
  151. return false;
  152. }
  153. VERIFY(!interpreter_path.is_null());
  154. dbgln("interpreter: {}", interpreter_path);
  155. auto interpreter_file_or_error = MappedFile::map(interpreter_path);
  156. VERIFY(!interpreter_file_or_error.is_error());
  157. auto interpreter_image_data = interpreter_file_or_error.value()->bytes();
  158. ELF::Image interpreter_image(interpreter_image_data);
  159. constexpr FlatPtr interpreter_load_offset = 0x08000000;
  160. interpreter_image.for_each_program_header([&](const ELF::Image::ProgramHeader& program_header) {
  161. // Loader is not allowed to have its own TLS regions
  162. VERIFY(program_header.type() != PT_TLS);
  163. if (program_header.type() == PT_LOAD) {
  164. auto region = make<SimpleRegion>(program_header.vaddr().offset(interpreter_load_offset).get(), program_header.size_in_memory());
  165. if (program_header.is_executable() && !program_header.is_writable())
  166. region->set_text(true);
  167. memcpy(region->data(), program_header.raw_data(), program_header.size_in_image());
  168. memset(region->shadow_data(), 0x01, program_header.size_in_memory());
  169. if (program_header.is_executable()) {
  170. m_loader_text_base = region->base();
  171. m_loader_text_size = region->size();
  172. }
  173. mmu().add_region(move(region));
  174. return IterationDecision::Continue;
  175. }
  176. return IterationDecision::Continue;
  177. });
  178. auto entry_point = interpreter_image.entry().offset(interpreter_load_offset).get();
  179. m_cpu.set_eip(entry_point);
  180. // executable_fd will be used by the loader
  181. int executable_fd = open(m_executable_path.characters(), O_RDONLY);
  182. if (executable_fd < 0)
  183. return false;
  184. auto aux_vector = generate_auxiliary_vector(interpreter_load_offset, entry_point, m_executable_path, executable_fd);
  185. setup_stack(move(aux_vector));
  186. return true;
  187. }
  188. int Emulator::exec()
  189. {
  190. // X86::ELFSymbolProvider symbol_provider(*m_elf);
  191. X86::ELFSymbolProvider* symbol_provider = nullptr;
  192. constexpr bool trace = false;
  193. while (!m_shutdown) {
  194. m_cpu.save_base_eip();
  195. auto insn = X86::Instruction::from_stream(m_cpu, true, true);
  196. if constexpr (trace) {
  197. outln("{:p} \033[33;1m{}\033[0m", m_cpu.base_eip(), insn.to_string(m_cpu.base_eip(), symbol_provider));
  198. }
  199. (m_cpu.*insn.handler())(insn);
  200. if constexpr (trace) {
  201. m_cpu.dump();
  202. }
  203. if (m_pending_signals) [[unlikely]] {
  204. dispatch_one_pending_signal();
  205. }
  206. }
  207. if (auto* tracer = malloc_tracer())
  208. tracer->dump_leak_report();
  209. return m_exit_status;
  210. }
  211. Vector<FlatPtr> Emulator::raw_backtrace()
  212. {
  213. Vector<FlatPtr, 128> backtrace;
  214. backtrace.append(m_cpu.base_eip());
  215. // FIXME: Maybe do something if the backtrace has uninitialized data in the frame chain.
  216. u32 frame_ptr = m_cpu.ebp().value();
  217. while (frame_ptr) {
  218. u32 ret_ptr = m_mmu.read32({ 0x23, frame_ptr + 4 }).value();
  219. if (!ret_ptr)
  220. break;
  221. backtrace.append(ret_ptr);
  222. frame_ptr = m_mmu.read32({ 0x23, frame_ptr }).value();
  223. }
  224. return backtrace;
  225. }
  226. const MmapRegion* Emulator::find_text_region(FlatPtr address)
  227. {
  228. const MmapRegion* matching_region = nullptr;
  229. mmu().for_each_region([&](auto& region) {
  230. if (!is<MmapRegion>(region))
  231. return IterationDecision::Continue;
  232. const auto& mmap_region = static_cast<const MmapRegion&>(region);
  233. if (!(mmap_region.is_executable() && address >= mmap_region.base() && address < mmap_region.base() + mmap_region.size()))
  234. return IterationDecision::Continue;
  235. matching_region = &mmap_region;
  236. return IterationDecision::Break;
  237. });
  238. return matching_region;
  239. }
  240. String Emulator::create_backtrace_line(FlatPtr address)
  241. {
  242. String minimal = String::format("=={%d}== %p", getpid(), (void*)address);
  243. const auto* region = find_text_region(address);
  244. if (!region)
  245. return minimal;
  246. auto separator_index = region->name().index_of(":");
  247. if (!separator_index.has_value())
  248. return minimal;
  249. String lib_name = region->name().substring(0, separator_index.value());
  250. String lib_path = lib_name;
  251. if (region->name().contains(".so"))
  252. lib_path = String::formatted("/usr/lib/{}", lib_path);
  253. if (!m_dynamic_library_cache.contains(lib_path)) {
  254. auto file_or_error = MappedFile::map(lib_path);
  255. if (file_or_error.is_error())
  256. return minimal;
  257. auto debug_info = make<Debug::DebugInfo>(make<ELF::Image>(file_or_error.value()->bytes()));
  258. m_dynamic_library_cache.set(lib_path, CachedELF { file_or_error.release_value(), move(debug_info) });
  259. }
  260. auto it = m_dynamic_library_cache.find(lib_path);
  261. auto& elf = it->value.debug_info->elf();
  262. String symbol = elf.symbolicate(address - region->base());
  263. auto line_without_source_info = String::format("=={%d}== %p [%s]: %s", getpid(), (void*)address, lib_name.characters(), symbol.characters());
  264. auto source_position = it->value.debug_info->get_source_position(address - region->base());
  265. if (source_position.has_value())
  266. return String::format("=={%d}== %p [%s]: %s (\033[34;1m%s\033[0m:%zu)", getpid(), (void*)address, lib_name.characters(), symbol.characters(), LexicalPath(source_position.value().file_path).basename().characters(), source_position.value().line_number);
  267. return line_without_source_info;
  268. }
  269. void Emulator::dump_backtrace(const Vector<FlatPtr>& backtrace)
  270. {
  271. for (auto& address : backtrace) {
  272. reportln("{}", create_backtrace_line(address));
  273. }
  274. }
  275. void Emulator::dump_backtrace()
  276. {
  277. dump_backtrace(raw_backtrace());
  278. }
  279. static void emulator_signal_handler(int signum)
  280. {
  281. Emulator::the().did_receive_signal(signum);
  282. }
  283. void Emulator::register_signal_handlers()
  284. {
  285. for (int signum = 0; signum < NSIG; ++signum)
  286. signal(signum, emulator_signal_handler);
  287. }
  288. enum class DefaultSignalAction {
  289. Terminate,
  290. Ignore,
  291. DumpCore,
  292. Stop,
  293. Continue,
  294. };
  295. static DefaultSignalAction default_signal_action(int signal)
  296. {
  297. VERIFY(signal && signal < NSIG);
  298. switch (signal) {
  299. case SIGHUP:
  300. case SIGINT:
  301. case SIGKILL:
  302. case SIGPIPE:
  303. case SIGALRM:
  304. case SIGUSR1:
  305. case SIGUSR2:
  306. case SIGVTALRM:
  307. case SIGSTKFLT:
  308. case SIGIO:
  309. case SIGPROF:
  310. case SIGTERM:
  311. return DefaultSignalAction::Terminate;
  312. case SIGCHLD:
  313. case SIGURG:
  314. case SIGWINCH:
  315. case SIGINFO:
  316. return DefaultSignalAction::Ignore;
  317. case SIGQUIT:
  318. case SIGILL:
  319. case SIGTRAP:
  320. case SIGABRT:
  321. case SIGBUS:
  322. case SIGFPE:
  323. case SIGSEGV:
  324. case SIGXCPU:
  325. case SIGXFSZ:
  326. case SIGSYS:
  327. return DefaultSignalAction::DumpCore;
  328. case SIGCONT:
  329. return DefaultSignalAction::Continue;
  330. case SIGSTOP:
  331. case SIGTSTP:
  332. case SIGTTIN:
  333. case SIGTTOU:
  334. return DefaultSignalAction::Stop;
  335. }
  336. VERIFY_NOT_REACHED();
  337. }
  338. void Emulator::dispatch_one_pending_signal()
  339. {
  340. int signum = -1;
  341. for (signum = 1; signum < NSIG; ++signum) {
  342. int mask = 1 << signum;
  343. if (m_pending_signals & mask)
  344. break;
  345. }
  346. VERIFY(signum != -1);
  347. m_pending_signals &= ~(1 << signum);
  348. auto& handler = m_signal_handler[signum];
  349. if (handler.handler == 0) {
  350. // SIG_DFL
  351. auto action = default_signal_action(signum);
  352. if (action == DefaultSignalAction::Ignore)
  353. return;
  354. reportln("\n=={}== Got signal {} ({}), no handler registered", getpid(), signum, strsignal(signum));
  355. m_shutdown = true;
  356. return;
  357. }
  358. if (handler.handler == 1) {
  359. // SIG_IGN
  360. return;
  361. }
  362. reportln("\n=={}== Got signal {} ({}), handler at {:p}", getpid(), signum, strsignal(signum), handler.handler);
  363. auto old_esp = m_cpu.esp();
  364. u32 stack_alignment = (m_cpu.esp().value() - 56) % 16;
  365. m_cpu.set_esp(shadow_wrap_as_initialized(m_cpu.esp().value() - stack_alignment));
  366. m_cpu.push32(shadow_wrap_as_initialized(m_cpu.eflags()));
  367. m_cpu.push32(shadow_wrap_as_initialized(m_cpu.eip()));
  368. m_cpu.push32(m_cpu.eax());
  369. m_cpu.push32(m_cpu.ecx());
  370. m_cpu.push32(m_cpu.edx());
  371. m_cpu.push32(m_cpu.ebx());
  372. m_cpu.push32(old_esp);
  373. m_cpu.push32(m_cpu.ebp());
  374. m_cpu.push32(m_cpu.esi());
  375. m_cpu.push32(m_cpu.edi());
  376. // FIXME: Push old signal mask here.
  377. m_cpu.push32(shadow_wrap_as_initialized(0u));
  378. m_cpu.push32(shadow_wrap_as_initialized((u32)signum));
  379. m_cpu.push32(shadow_wrap_as_initialized(handler.handler));
  380. m_cpu.push32(shadow_wrap_as_initialized(0u));
  381. VERIFY((m_cpu.esp().value() % 16) == 0);
  382. m_cpu.set_eip(m_signal_trampoline);
  383. }
  384. // Make sure the compiler doesn't "optimize away" this function:
  385. extern void signal_trampoline_dummy();
  386. void signal_trampoline_dummy()
  387. {
  388. // The trampoline preserves the current eax, pushes the signal code and
  389. // then calls the signal handler. We do this because, when interrupting a
  390. // blocking syscall, that syscall may return some special error code in eax;
  391. // This error code would likely be overwritten by the signal handler, so it's
  392. // necessary to preserve it here.
  393. asm(
  394. ".intel_syntax noprefix\n"
  395. "asm_signal_trampoline:\n"
  396. "push ebp\n"
  397. "mov ebp, esp\n"
  398. "push eax\n" // we have to store eax 'cause it might be the return value from a syscall
  399. "sub esp, 4\n" // align the stack to 16 bytes
  400. "mov eax, [ebp+12]\n" // push the signal code
  401. "push eax\n"
  402. "call [ebp+8]\n" // call the signal handler
  403. "add esp, 8\n"
  404. "mov eax, %P0\n"
  405. "int 0x82\n" // sigreturn syscall
  406. "asm_signal_trampoline_end:\n"
  407. ".att_syntax" ::"i"(Syscall::SC_sigreturn));
  408. }
  409. extern "C" void asm_signal_trampoline(void);
  410. extern "C" void asm_signal_trampoline_end(void);
  411. void Emulator::setup_signal_trampoline()
  412. {
  413. auto trampoline_region = make<SimpleRegion>(0xb0000000, 4096);
  414. u8* trampoline = (u8*)asm_signal_trampoline;
  415. u8* trampoline_end = (u8*)asm_signal_trampoline_end;
  416. size_t trampoline_size = trampoline_end - trampoline;
  417. u8* code_ptr = trampoline_region->data();
  418. memcpy(code_ptr, trampoline, trampoline_size);
  419. m_signal_trampoline = trampoline_region->base();
  420. mmu().add_region(move(trampoline_region));
  421. }
  422. bool Emulator::find_malloc_symbols(const MmapRegion& libc_text)
  423. {
  424. auto file_or_error = MappedFile::map("/usr/lib/libc.so");
  425. if (file_or_error.is_error())
  426. return false;
  427. ELF::Image image(file_or_error.value()->bytes());
  428. auto malloc_symbol = image.find_demangled_function("malloc");
  429. auto free_symbol = image.find_demangled_function("free");
  430. auto realloc_symbol = image.find_demangled_function("realloc");
  431. auto calloc_symbol = image.find_demangled_function("calloc");
  432. auto malloc_size_symbol = image.find_demangled_function("malloc_size");
  433. if (!malloc_symbol.has_value() || !free_symbol.has_value() || !realloc_symbol.has_value() || !malloc_size_symbol.has_value())
  434. return false;
  435. m_malloc_symbol_start = malloc_symbol.value().value() + libc_text.base();
  436. m_malloc_symbol_end = m_malloc_symbol_start + malloc_symbol.value().size();
  437. m_free_symbol_start = free_symbol.value().value() + libc_text.base();
  438. m_free_symbol_end = m_free_symbol_start + free_symbol.value().size();
  439. m_realloc_symbol_start = realloc_symbol.value().value() + libc_text.base();
  440. m_realloc_symbol_end = m_realloc_symbol_start + realloc_symbol.value().size();
  441. m_calloc_symbol_start = calloc_symbol.value().value() + libc_text.base();
  442. m_calloc_symbol_end = m_calloc_symbol_start + calloc_symbol.value().size();
  443. m_malloc_size_symbol_start = malloc_size_symbol.value().value() + libc_text.base();
  444. m_malloc_size_symbol_end = m_malloc_size_symbol_start + malloc_size_symbol.value().size();
  445. return true;
  446. }
  447. void Emulator::dump_regions() const
  448. {
  449. const_cast<SoftMMU&>(m_mmu).for_each_region([&](const Region& region) {
  450. reportln("{:p}-{:p} {:c}{:c}{:c} {} {}{}{} ",
  451. region.base(),
  452. region.end() - 1,
  453. region.is_readable() ? 'R' : '-',
  454. region.is_writable() ? 'W' : '-',
  455. region.is_executable() ? 'X' : '-',
  456. is<MmapRegion>(region) ? static_cast<const MmapRegion&>(region).name() : "",
  457. is<MmapRegion>(region) ? "(mmap) " : "",
  458. region.is_stack() ? "(stack) " : "",
  459. region.is_text() ? "(text) " : "");
  460. return IterationDecision::Continue;
  461. });
  462. }
  463. }