blob: 3653651e019f740ecb1cc1539a702fae8f2c8338 [file] [log] [blame]
Juan Cespedesd44c6b81998-09-25 14:48:42 +02001#if HAVE_CONFIG_H
2#include "config.h"
3#endif
4
Juan Cespedes5e01f651998-03-08 22:31:44 +01005#define _GNU_SOURCE
6#include <stdio.h>
7#include <string.h>
Juan Cespedes1fe93d51998-03-13 00:29:21 +01008#include <stdlib.h>
Juan Cespedes28f60191998-04-12 00:04:39 +02009#include <signal.h>
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +020010#include <assert.h>
Juan Cespedesd65efa32003-02-03 00:22:30 +010011#include <sys/time.h>
Juan Cespedes5e01f651998-03-08 22:31:44 +010012
13#include "ltrace.h"
14#include "output.h"
15#include "options.h"
Juan Cespedes81690ef1998-03-13 19:31:29 +010016#include "elf.h"
Juan Cespedescac15c32003-01-31 18:58:58 +010017#include "debug.h"
Juan Cespedes5e01f651998-03-08 22:31:44 +010018
Juan Cespedesf1bfe202002-03-27 00:22:23 +010019#ifdef __powerpc__
20#include <sys/ptrace.h>
21#endif
22
Juan Cespedes393f1d02009-05-07 11:13:54 +020023static void process_signal(Event *event);
24static void process_exit(Event *event);
25static void process_exit_signal(Event *event);
26static void process_syscall(Event *event);
27static void process_arch_syscall(Event *event);
28static void process_sysret(Event *event);
29static void process_arch_sysret(Event *event);
Juan Cespedes393f1d02009-05-07 11:13:54 +020030static void process_clone(Event *event);
31static void process_exec(Event *event);
32static void process_breakpoint(Event *event);
Juan Cespedes8f6d1ec2009-05-07 17:50:34 +020033static void process_new(Event *event);
Juan Cespedesa8909f72009-04-28 20:02:41 +020034static void remove_proc(Process *proc);
Juan Cespedes5e01f651998-03-08 22:31:44 +010035
Juan Cespedesa8909f72009-04-28 20:02:41 +020036static void callstack_push_syscall(Process *proc, int sysnum);
37static void callstack_push_symfunc(Process *proc,
Ian Wienand2d45b1a2006-02-20 22:48:07 +010038 struct library_symbol *sym);
Juan Cespedesa8909f72009-04-28 20:02:41 +020039static void callstack_pop(Process *proc);
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +020040
Juan Cespedesbc8caf02009-05-07 19:38:38 +020041/* TODO */
42void * address_clone(void * addr) {
Juan Cespedescd8976d2009-05-14 13:47:58 +020043 debug(DEBUG_FUNCTION, "address_clone(%p)", addr);
Juan Cespedesbc8caf02009-05-07 19:38:38 +020044 return addr;
45}
46
47void * breakpoint_clone(void * bp) {
48 Breakpoint * b;
Juan Cespedescd8976d2009-05-14 13:47:58 +020049 debug(DEBUG_FUNCTION, "breakpoint_clone(%p)", bp);
Juan Cespedesbc8caf02009-05-07 19:38:38 +020050 b = malloc(sizeof(Breakpoint));
51 if (!b) {
52 perror("malloc()");
53 exit(1);
54 }
55 memcpy(b, bp, sizeof(Breakpoint));
56 return b;
57}
58
59typedef struct Pending_New Pending_New;
60struct Pending_New {
61 pid_t pid;
62 Pending_New * next;
63};
64static Pending_New * pending_news = NULL;
65
66static int
67pending_new(pid_t pid) {
Juan Cespedescd8976d2009-05-14 13:47:58 +020068 Pending_New * p;
69
70 debug(DEBUG_FUNCTION, "pending_new(%d)", pid);
71
72 p = pending_news;
Juan Cespedesbc8caf02009-05-07 19:38:38 +020073 while (p) {
74 if (p->pid == pid) {
75 return 1;
76 }
77 p = p->next;
78 }
79 return 0;
80}
81
82static void
83pending_new_insert(pid_t pid) {
Juan Cespedescd8976d2009-05-14 13:47:58 +020084 Pending_New * p;
85
86 debug(DEBUG_FUNCTION, "pending_new_insert(%d)", pid);
87
88 p = malloc(sizeof(Pending_New));
Juan Cespedesbc8caf02009-05-07 19:38:38 +020089 if (!p) {
90 perror("malloc()");
91 exit(1);
92 }
93 p->pid = pid;
94 p->next = pending_news;
95 pending_news = p;
96}
97
98static void
99pending_new_remove(pid_t pid) {
100 Pending_New *p, *pred;
101
Juan Cespedescd8976d2009-05-14 13:47:58 +0200102 debug(DEBUG_FUNCTION, "pending_new_remove(%d)", pid);
103
Juan Cespedesbc8caf02009-05-07 19:38:38 +0200104 p = pending_news;
105 if (p->pid == pid) {
106 pending_news = p->next;
107 free(p);
108 } else {
109 while (p) {
110 if (p->pid == pid) {
111 pred->next = p->next;
112 free(p);
113 }
114 pred = p;
115 p = p->next;
116 }
117 }
118}
119
120static void
121process_clone(Event * event) {
122 Process *p;
123
Juan Cespedescd8976d2009-05-14 13:47:58 +0200124 debug(DEBUG_FUNCTION, "process_clone(pid=%d)", event->proc->pid);
125
Juan Cespedesbc8caf02009-05-07 19:38:38 +0200126 p = malloc(sizeof(Process));
127 if (!p) {
128 perror("malloc()");
129 exit(1);
130 }
131 memcpy(p, event->proc, sizeof(Process));
132 p->breakpoints = dict_clone(event->proc->breakpoints, address_clone, breakpoint_clone);
133 p->pid = event->e_un.newpid;
Juan Cespedes2721e6a2009-05-21 15:15:40 +0200134 p->parent = event->proc;
Juan Cespedesbc8caf02009-05-07 19:38:38 +0200135
136 if (pending_new(p->pid)) {
137 pending_new_remove(p->pid);
138 if (p->breakpoint_being_enabled) {
139 enable_breakpoint(p->pid, p->breakpoint_being_enabled);
140 p->breakpoint_being_enabled = NULL;
141 }
142 p->state = STATE_ATTACHED;
143 continue_process(p->pid);
144 p->next = list_of_processes;
145 list_of_processes = p;
146 } else {
147 p->state = STATE_BEING_CREATED;
Juan Cespedes2721e6a2009-05-21 15:15:40 +0200148 p->next = list_of_processes;
149 list_of_processes = p;
Juan Cespedesbc8caf02009-05-07 19:38:38 +0200150 }
Juan Cespedes2721e6a2009-05-21 15:15:40 +0200151 continue_process(event->proc->pid);
Juan Cespedesbc8caf02009-05-07 19:38:38 +0200152}
153
154static void
155process_new(Event * event) {
Juan Cespedescd8976d2009-05-14 13:47:58 +0200156 Process * proc;
157
158 debug(DEBUG_FUNCTION, "process_new(pid=%d)", event->e_un.newpid);
159
160 proc = pid2proc(event->e_un.newpid);
Juan Cespedesbc8caf02009-05-07 19:38:38 +0200161 if (!proc) {
162 pending_new_insert(event->e_un.newpid);
163 } else {
164 assert(proc->state == STATE_BEING_CREATED);
165 if (proc->breakpoint_being_enabled) {
166 enable_breakpoint(proc->pid, proc->breakpoint_being_enabled);
167 proc->breakpoint_being_enabled = NULL;
168 }
169 proc->state = STATE_ATTACHED;
170 continue_process(proc->pid);
171 }
172}
173
Juan Cespedesf1350522008-12-16 18:19:58 +0100174static char *
Juan Cespedesa8909f72009-04-28 20:02:41 +0200175shortsignal(Process *proc, int signum) {
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100176 static char *signalent0[] = {
177#include "signalent.h"
Juan Cespedes5e01f651998-03-08 22:31:44 +0100178 };
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100179 static char *signalent1[] = {
180#include "signalent1.h"
Ian Wienand9a2ad352006-02-20 22:44:45 +0100181 };
182 static char **signalents[] = { signalent0, signalent1 };
183 int nsignals[] = { sizeof signalent0 / sizeof signalent0[0],
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100184 sizeof signalent1 / sizeof signalent1[0]
185 };
Juan Cespedes5e01f651998-03-08 22:31:44 +0100186
Juan Cespedescd8976d2009-05-14 13:47:58 +0200187 debug(DEBUG_FUNCTION, "shortsignal(pid=%d, signum=%d)", proc->pid, signum);
188
Ian Wienand9a2ad352006-02-20 22:44:45 +0100189 if (proc->personality > sizeof signalents / sizeof signalents[0])
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100190 abort();
Ian Wienand9a2ad352006-02-20 22:44:45 +0100191 if (signum < 0 || signum >= nsignals[proc->personality]) {
Juan Cespedes5e01f651998-03-08 22:31:44 +0100192 return "UNKNOWN_SIGNAL";
193 } else {
Ian Wienand9a2ad352006-02-20 22:44:45 +0100194 return signalents[proc->personality][signum];
Juan Cespedes5e01f651998-03-08 22:31:44 +0100195 }
196}
197
Juan Cespedesf1350522008-12-16 18:19:58 +0100198static char *
Juan Cespedesa8909f72009-04-28 20:02:41 +0200199sysname(Process *proc, int sysnum) {
Juan Cespedes5e01f651998-03-08 22:31:44 +0100200 static char result[128];
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100201 static char *syscalent0[] = {
202#include "syscallent.h"
Juan Cespedes5e01f651998-03-08 22:31:44 +0100203 };
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100204 static char *syscalent1[] = {
205#include "syscallent1.h"
Ian Wienand9a2ad352006-02-20 22:44:45 +0100206 };
207 static char **syscalents[] = { syscalent0, syscalent1 };
208 int nsyscals[] = { sizeof syscalent0 / sizeof syscalent0[0],
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100209 sizeof syscalent1 / sizeof syscalent1[0]
210 };
Juan Cespedes5e01f651998-03-08 22:31:44 +0100211
Juan Cespedescd8976d2009-05-14 13:47:58 +0200212 debug(DEBUG_FUNCTION, "sysname(pid=%d, sysnum=%d)", proc->pid, sysnum);
213
Ian Wienand9a2ad352006-02-20 22:44:45 +0100214 if (proc->personality > sizeof syscalents / sizeof syscalents[0])
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100215 abort();
Ian Wienand9a2ad352006-02-20 22:44:45 +0100216 if (sysnum < 0 || sysnum >= nsyscals[proc->personality]) {
Juan Cespedes5e01f651998-03-08 22:31:44 +0100217 sprintf(result, "SYS_%d", sysnum);
218 return result;
219 } else {
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100220 sprintf(result, "SYS_%s",
221 syscalents[proc->personality][sysnum]);
Juan Cespedes5e01f651998-03-08 22:31:44 +0100222 return result;
223 }
224}
225
Juan Cespedesf1350522008-12-16 18:19:58 +0100226static char *
Juan Cespedesa8909f72009-04-28 20:02:41 +0200227arch_sysname(Process *proc, int sysnum) {
Juan Cespedes63184be2008-12-10 13:30:12 +0100228 static char result[128];
229 static char *arch_syscalent[] = {
230#include "arch_syscallent.h"
231 };
232 int nsyscals = sizeof arch_syscalent / sizeof arch_syscalent[0];
233
Juan Cespedescd8976d2009-05-14 13:47:58 +0200234 debug(DEBUG_FUNCTION, "arch_sysname(pid=%d, sysnum=%d)", proc->pid, sysnum);
235
Juan Cespedes63184be2008-12-10 13:30:12 +0100236 if (sysnum < 0 || sysnum >= nsyscals) {
237 sprintf(result, "ARCH_%d", sysnum);
238 return result;
239 } else {
240 sprintf(result, "ARCH_%s",
241 arch_syscalent[sysnum]);
242 return result;
243 }
244}
245
Juan Cespedesf1350522008-12-16 18:19:58 +0100246void
Juan Cespedes393f1d02009-05-07 11:13:54 +0200247process_event(Event *event) {
Juan Cespedescd8976d2009-05-14 13:47:58 +0200248 debug(DEBUG_FUNCTION, "process_event(pid=%d, type=%d)", event->proc ? event->proc->pid : -1, event->type);
Juan Cespedes8f6d1ec2009-05-07 17:50:34 +0200249 switch (event->type) {
Juan Cespedes138d41c2009-04-07 00:49:12 +0200250 case EVENT_NONE:
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100251 debug(1, "event: none");
252 return;
Juan Cespedes138d41c2009-04-07 00:49:12 +0200253 case EVENT_SIGNAL:
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100254 debug(1, "event: signal (%s [%d])",
255 shortsignal(event->proc, event->e_un.signum),
256 event->e_un.signum);
257 process_signal(event);
258 return;
Juan Cespedes138d41c2009-04-07 00:49:12 +0200259 case EVENT_EXIT:
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100260 debug(1, "event: exit (%d)", event->e_un.ret_val);
261 process_exit(event);
262 return;
Juan Cespedes138d41c2009-04-07 00:49:12 +0200263 case EVENT_EXIT_SIGNAL:
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100264 debug(1, "event: exit signal (%s [%d])",
265 shortsignal(event->proc, event->e_un.signum),
266 event->e_un.signum);
267 process_exit_signal(event);
268 return;
Juan Cespedes138d41c2009-04-07 00:49:12 +0200269 case EVENT_SYSCALL:
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100270 debug(1, "event: syscall (%s [%d])",
271 sysname(event->proc, event->e_un.sysnum),
272 event->e_un.sysnum);
273 process_syscall(event);
274 return;
Juan Cespedes138d41c2009-04-07 00:49:12 +0200275 case EVENT_SYSRET:
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100276 debug(1, "event: sysret (%s [%d])",
277 sysname(event->proc, event->e_un.sysnum),
278 event->e_un.sysnum);
279 process_sysret(event);
280 return;
Juan Cespedes138d41c2009-04-07 00:49:12 +0200281 case EVENT_ARCH_SYSCALL:
Juan Cespedes63184be2008-12-10 13:30:12 +0100282 debug(1, "event: arch_syscall (%s [%d])",
283 arch_sysname(event->proc, event->e_un.sysnum),
284 event->e_un.sysnum);
285 process_arch_syscall(event);
286 return;
Juan Cespedes138d41c2009-04-07 00:49:12 +0200287 case EVENT_ARCH_SYSRET:
Juan Cespedes63184be2008-12-10 13:30:12 +0100288 debug(1, "event: arch_sysret (%s [%d])",
289 arch_sysname(event->proc, event->e_un.sysnum),
290 event->e_un.sysnum);
291 process_arch_sysret(event);
292 return;
Juan Cespedes1e583132009-04-07 18:17:11 +0200293 case EVENT_CLONE:
294 debug(1, "event: clone (%u)", event->e_un.newpid);
295 process_clone(event);
296 return;
297 case EVENT_EXEC:
298 debug(1, "event: exec()");
299 process_exec(event);
300 return;
Juan Cespedes138d41c2009-04-07 00:49:12 +0200301 case EVENT_BREAKPOINT:
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100302 debug(1, "event: breakpoint");
303 process_breakpoint(event);
304 return;
Juan Cespedes8f6d1ec2009-05-07 17:50:34 +0200305 case EVENT_NEW:
306 debug(1, "event: new process");
307 process_new(event);
308 return;
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100309 default:
310 fprintf(stderr, "Error! unknown event?\n");
311 exit(1);
Juan Cespedesefe85f02004-04-04 01:31:38 +0200312 }
313}
314
Juan Cespedesf1350522008-12-16 18:19:58 +0100315static void
Juan Cespedes393f1d02009-05-07 11:13:54 +0200316process_signal(Event *event) {
Juan Cespedescd8976d2009-05-14 13:47:58 +0200317 debug(DEBUG_FUNCTION, "process_signal(pid=%d, signum=%d)", event->proc->pid, event->e_un.signum);
Juan Cespedes28f60191998-04-12 00:04:39 +0200318 if (exiting && event->e_un.signum == SIGSTOP) {
319 pid_t pid = event->proc->pid;
320 disable_all_breakpoints(event->proc);
321 untrace_pid(pid);
322 remove_proc(event->proc);
Juan Cespedes28f60191998-04-12 00:04:39 +0200323 return;
324 }
Juan Cespedes5e01f651998-03-08 22:31:44 +0100325 output_line(event->proc, "--- %s (%s) ---",
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100326 shortsignal(event->proc, event->e_un.signum),
327 strsignal(event->e_un.signum));
Juan Cespedes5e01f651998-03-08 22:31:44 +0100328 continue_after_signal(event->proc->pid, event->e_un.signum);
329}
330
Juan Cespedesf1350522008-12-16 18:19:58 +0100331static void
Juan Cespedes393f1d02009-05-07 11:13:54 +0200332process_exit(Event *event) {
Juan Cespedescd8976d2009-05-14 13:47:58 +0200333 debug(DEBUG_FUNCTION, "process_exit(pid=%d, status=%d)", event->proc->pid, event->e_un.ret_val);
Juan Cespedes5e01f651998-03-08 22:31:44 +0100334 output_line(event->proc, "+++ exited (status %d) +++",
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100335 event->e_un.ret_val);
Juan Cespedes1fe93d51998-03-13 00:29:21 +0100336 remove_proc(event->proc);
Juan Cespedes5e01f651998-03-08 22:31:44 +0100337}
338
Juan Cespedesf1350522008-12-16 18:19:58 +0100339static void
Juan Cespedes393f1d02009-05-07 11:13:54 +0200340process_exit_signal(Event *event) {
Juan Cespedescd8976d2009-05-14 13:47:58 +0200341 debug(DEBUG_FUNCTION, "process_exit_signal(pid=%d, signum=%d)", event->proc->pid, event->e_un.signum);
Juan Cespedes5e01f651998-03-08 22:31:44 +0100342 output_line(event->proc, "+++ killed by %s +++",
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100343 shortsignal(event->proc, event->e_un.signum));
Juan Cespedes1fe93d51998-03-13 00:29:21 +0100344 remove_proc(event->proc);
345}
346
Juan Cespedesf1350522008-12-16 18:19:58 +0100347static void
Juan Cespedesa8909f72009-04-28 20:02:41 +0200348remove_proc(Process *proc) {
349 Process *tmp, *tmp2;
Juan Cespedes1fe93d51998-03-13 00:29:21 +0100350
Juan Cespedescd8976d2009-05-14 13:47:58 +0200351 debug(DEBUG_FUNCTION, "remove_proc(pid=%d)", proc->pid);
Juan Cespedes28f60191998-04-12 00:04:39 +0200352
Juan Cespedes1fe93d51998-03-13 00:29:21 +0100353 if (list_of_processes == proc) {
354 tmp = list_of_processes;
355 list_of_processes = list_of_processes->next;
356 free(tmp);
357 return;
358 }
359 tmp = list_of_processes;
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100360 while (tmp->next) {
361 if (tmp->next == proc) {
Juan Cespedes1fe93d51998-03-13 00:29:21 +0100362 tmp2 = tmp->next;
363 tmp->next = tmp->next->next;
364 free(tmp2);
Juan Cespedes28f60191998-04-12 00:04:39 +0200365 continue;
Juan Cespedes1fe93d51998-03-13 00:29:21 +0100366 }
Juan Cespedes35d70631998-03-15 14:05:40 +0100367 tmp = tmp->next;
Juan Cespedes1fe93d51998-03-13 00:29:21 +0100368 }
Juan Cespedes5e01f651998-03-08 22:31:44 +0100369}
370
Juan Cespedesf1350522008-12-16 18:19:58 +0100371static void
Juan Cespedes393f1d02009-05-07 11:13:54 +0200372process_syscall(Event *event) {
Juan Cespedescd8976d2009-05-14 13:47:58 +0200373 debug(DEBUG_FUNCTION, "process_syscall(pid=%d, sysnum=%d)", event->proc->pid, event->e_un.sysnum);
Juan Cespedesce377d52008-12-16 19:38:10 +0100374 if (options.syscalls) {
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100375 output_left(LT_TOF_SYSCALL, event->proc,
376 sysname(event->proc, event->e_un.sysnum));
Juan Cespedes5e01f651998-03-08 22:31:44 +0100377 }
Juan Cespedes7c3b4312009-05-14 11:35:00 +0200378 if (event->proc->breakpoints_enabled == 0) {
Juan Cespedes81690ef1998-03-13 19:31:29 +0100379 enable_all_breakpoints(event->proc);
Juan Cespedes5e01f651998-03-08 22:31:44 +0100380 }
Juan Cespedesd65efa32003-02-03 00:22:30 +0100381 callstack_push_syscall(event->proc, event->e_un.sysnum);
Juan Cespedes5e01f651998-03-08 22:31:44 +0100382 continue_process(event->proc->pid);
383}
384
Juan Cespedesf1350522008-12-16 18:19:58 +0100385static void
Juan Cespedes393f1d02009-05-07 11:13:54 +0200386process_exec(Event * event) {
Juan Cespedescd8976d2009-05-14 13:47:58 +0200387 debug(DEBUG_FUNCTION, "process_exec(pid=%d)", event->proc->pid);
Juan Cespedes1e583132009-04-07 18:17:11 +0200388 output_line(event->proc, "--- exec() ---");
389 abort();
390}
391
392static void
Juan Cespedes393f1d02009-05-07 11:13:54 +0200393process_arch_syscall(Event *event) {
Juan Cespedescd8976d2009-05-14 13:47:58 +0200394 debug(DEBUG_FUNCTION, "process_arch_syscall(pid=%d, sysnum=%d)", event->proc->pid, event->e_un.sysnum);
Juan Cespedesce377d52008-12-16 19:38:10 +0100395 if (options.syscalls) {
Juan Cespedes63184be2008-12-10 13:30:12 +0100396 output_left(LT_TOF_SYSCALL, event->proc,
397 arch_sysname(event->proc, event->e_un.sysnum));
398 }
399 if (event->proc->breakpoints_enabled == 0) {
400 enable_all_breakpoints(event->proc);
401 }
402 callstack_push_syscall(event->proc, 0xf0000 + event->e_un.sysnum);
403 continue_process(event->proc->pid);
404}
405
Juan Cespedesd65efa32003-02-03 00:22:30 +0100406struct timeval current_time_spent;
407
Juan Cespedesf1350522008-12-16 18:19:58 +0100408static void
Juan Cespedesa8909f72009-04-28 20:02:41 +0200409calc_time_spent(Process *proc) {
Juan Cespedesd65efa32003-02-03 00:22:30 +0100410 struct timeval tv;
411 struct timezone tz;
412 struct timeval diff;
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100413 struct callstack_element *elem;
Juan Cespedesd65efa32003-02-03 00:22:30 +0100414
Juan Cespedescd8976d2009-05-14 13:47:58 +0200415 debug(DEBUG_FUNCTION, "calc_time_spent(pid=%d)", proc->pid);
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100416 elem = &proc->callstack[proc->callstack_depth - 1];
Juan Cespedesd65efa32003-02-03 00:22:30 +0100417
418 gettimeofday(&tv, &tz);
419
420 diff.tv_sec = tv.tv_sec - elem->time_spent.tv_sec;
421 if (tv.tv_usec >= elem->time_spent.tv_usec) {
422 diff.tv_usec = tv.tv_usec - elem->time_spent.tv_usec;
423 } else {
424 diff.tv_sec++;
425 diff.tv_usec = 1000000 + tv.tv_usec - elem->time_spent.tv_usec;
426 }
427 current_time_spent = diff;
428}
429
Juan Cespedesf1350522008-12-16 18:19:58 +0100430static void
Juan Cespedes393f1d02009-05-07 11:13:54 +0200431process_sysret(Event *event) {
Juan Cespedescd8976d2009-05-14 13:47:58 +0200432 debug(DEBUG_FUNCTION, "process_sysret(pid=%d, sysnum=%d)", event->proc->pid, event->e_un.sysnum);
Juan Cespedesda9b9532009-04-07 15:33:50 +0200433 if (opt_T || options.summary) {
Juan Cespedesd65efa32003-02-03 00:22:30 +0100434 calc_time_spent(event->proc);
435 }
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200436 callstack_pop(event->proc);
Juan Cespedesce377d52008-12-16 19:38:10 +0100437 if (options.syscalls) {
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100438 output_right(LT_TOF_SYSCALLR, event->proc,
439 sysname(event->proc, event->e_un.sysnum));
Juan Cespedes21c63a12001-07-07 20:56:56 +0200440 }
Juan Cespedes5e01f651998-03-08 22:31:44 +0100441 continue_process(event->proc->pid);
442}
443
Juan Cespedesf1350522008-12-16 18:19:58 +0100444static void
Juan Cespedes393f1d02009-05-07 11:13:54 +0200445process_arch_sysret(Event *event) {
Juan Cespedescd8976d2009-05-14 13:47:58 +0200446 debug(DEBUG_FUNCTION, "process_arch_sysret(pid=%d, sysnum=%d)", event->proc->pid, event->e_un.sysnum);
Juan Cespedesda9b9532009-04-07 15:33:50 +0200447 if (opt_T || options.summary) {
Juan Cespedes63184be2008-12-10 13:30:12 +0100448 calc_time_spent(event->proc);
449 }
450 callstack_pop(event->proc);
Juan Cespedesce377d52008-12-16 19:38:10 +0100451 if (options.syscalls) {
Juan Cespedes63184be2008-12-10 13:30:12 +0100452 output_right(LT_TOF_SYSCALLR, event->proc,
453 arch_sysname(event->proc, event->e_un.sysnum));
454 }
455 continue_process(event->proc->pid);
456}
457
Juan Cespedesf1350522008-12-16 18:19:58 +0100458static void
Juan Cespedes393f1d02009-05-07 11:13:54 +0200459process_breakpoint(Event *event) {
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100460 int i, j;
Juan Cespedes1dec2172009-05-07 10:12:10 +0200461 Breakpoint *sbp;
Juan Cespedes5e01f651998-03-08 22:31:44 +0100462
Juan Cespedescd8976d2009-05-14 13:47:58 +0200463 debug(DEBUG_FUNCTION, "process_breakpoint(pid=%d, addr=%p)", event->proc->pid, event->e_un.brk_addr);
Juan Cespedesefe85f02004-04-04 01:31:38 +0200464 debug(2, "event: breakpoint (%p)", event->e_un.brk_addr);
Luis Machado55c5feb2008-03-12 15:56:01 +0100465
Paul Gilliam76c61f12006-06-14 06:55:21 +0200466#ifdef __powerpc__
Luis Machado55c5feb2008-03-12 15:56:01 +0100467 /* Need to skip following NOP's to prevent a fake function from being stacked. */
468 long stub_addr = (long) get_count_register(event->proc);
Juan Cespedes1dec2172009-05-07 10:12:10 +0200469 Breakpoint *stub_bp = NULL;
Luis Machado55c5feb2008-03-12 15:56:01 +0100470 char nop_instruction[] = PPC_NOP;
471
472 stub_bp = address2bpstruct (event->proc, event->e_un.brk_addr);
473
474 if (stub_bp) {
475 unsigned char *bp_instruction = stub_bp->orig_value;
476
477 if (memcmp(bp_instruction, nop_instruction,
478 PPC_NOP_LENGTH) == 0) {
479 if (stub_addr != (long) event->e_un.brk_addr) {
480 set_instruction_pointer (event->proc, event->e_un.brk_addr + 4);
481 continue_process(event->proc->pid);
Paul Gilliam76c61f12006-06-14 06:55:21 +0200482 return;
483 }
484 }
Luis Machado55c5feb2008-03-12 15:56:01 +0100485 }
Paul Gilliam76c61f12006-06-14 06:55:21 +0200486#endif
Luis Machado55c5feb2008-03-12 15:56:01 +0100487 if ((sbp = event->proc->breakpoint_being_enabled) != 0) {
Juan Cespedesb1dd77d2002-03-03 00:22:06 +0100488 /* Reinsert breakpoint */
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100489 continue_enabling_breakpoint(event->proc->pid,
490 event->proc->
491 breakpoint_being_enabled);
Juan Cespedes5e01f651998-03-08 22:31:44 +0100492 event->proc->breakpoint_being_enabled = NULL;
493 return;
494 }
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200495
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100496 for (i = event->proc->callstack_depth - 1; i >= 0; i--) {
497 if (event->e_un.brk_addr ==
498 event->proc->callstack[i].return_addr) {
Juan Cespedes5bfb0612002-03-31 20:01:28 +0200499#ifdef __powerpc__
Ian Wienand3219f322006-02-16 06:00:00 +0100500 /*
501 * PPC HACK! (XXX FIXME TODO)
502 * The PLT gets modified during the first call,
503 * so be sure to re-enable the breakpoint.
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100504 */
Ian Wienand9a2ad352006-02-20 22:44:45 +0100505 unsigned long a;
506 struct library_symbol *libsym =
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100507 event->proc->callstack[i].c_un.libfunc;
Paul Gilliam76c61f12006-06-14 06:55:21 +0200508 void *addr = sym2addr(event->proc, libsym);
Juan Cespedes5bfb0612002-03-31 20:01:28 +0200509
Paul Gilliam76c61f12006-06-14 06:55:21 +0200510 if (libsym->plt_type != LS_TOPLT_POINT) {
Ian Wienand9a2ad352006-02-20 22:44:45 +0100511 unsigned char break_insn[] = BREAKPOINT_VALUE;
512
513 sbp = address2bpstruct(event->proc, addr);
514 assert(sbp);
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100515 a = ptrace(PTRACE_PEEKTEXT, event->proc->pid,
516 addr);
Ian Wienand9a2ad352006-02-20 22:44:45 +0100517
Paul Gilliam76c61f12006-06-14 06:55:21 +0200518 if (memcmp(&a, break_insn, BREAKPOINT_LENGTH)) {
Ian Wienand9a2ad352006-02-20 22:44:45 +0100519 sbp->enabled--;
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100520 insert_breakpoint(event->proc, addr,
521 libsym);
Ian Wienand9a2ad352006-02-20 22:44:45 +0100522 }
523 } else {
Juan Cespedesbc8caf02009-05-07 19:38:38 +0200524 sbp = dict_find_entry(event->proc->breakpoints, sym2addr(event->proc, libsym));
Ian Wienand9a2ad352006-02-20 22:44:45 +0100525 assert(sbp);
Paul Gilliam76c61f12006-06-14 06:55:21 +0200526 if (addr != sbp->addr) {
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100527 insert_breakpoint(event->proc, addr,
528 libsym);
Paul Gilliam76c61f12006-06-14 06:55:21 +0200529 }
Ian Wienand3219f322006-02-16 06:00:00 +0100530 }
Eric Vaitl1228a912006-12-28 16:16:56 +0100531#elif defined(__mips__)
Juan Cespedesa413e5b2007-09-04 17:34:53 +0200532 void *addr;
533 void *old_addr;
534 struct library_symbol *sym= event->proc->callstack[i].c_un.libfunc;
Juan Cespedesbc8caf02009-05-07 19:38:38 +0200535 assert(sym);
536 old_addr = dict_find_entry(event->proc->breakpoints, sym2addr(event->proc, sym))->addr;
Juan Cespedesa413e5b2007-09-04 17:34:53 +0200537 addr=sym2addr(event->proc,sym);
538 assert(old_addr !=0 && addr !=0);
539 if(addr != old_addr){
540 struct library_symbol *new_sym;
541 new_sym=malloc(sizeof(*new_sym));
542 memcpy(new_sym,sym,sizeof(*new_sym));
543 new_sym->next=event->proc->list_of_symbols;
544 event->proc->list_of_symbols=new_sym;
Juan Cespedesa413e5b2007-09-04 17:34:53 +0200545 insert_breakpoint(event->proc, addr, new_sym);
546 }
Juan Cespedes5bfb0612002-03-31 20:01:28 +0200547#endif
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100548 for (j = event->proc->callstack_depth - 1; j > i; j--) {
Juan Cespedes5916fda2002-02-25 00:19:21 +0100549 callstack_pop(event->proc);
550 }
Juan Cespedesda9b9532009-04-07 15:33:50 +0200551 if (opt_T || options.summary) {
Juan Cespedesd65efa32003-02-03 00:22:30 +0100552 calc_time_spent(event->proc);
553 }
554 callstack_pop(event->proc);
Juan Cespedes5916fda2002-02-25 00:19:21 +0100555 event->proc->return_addr = event->e_un.brk_addr;
Juan Cespedes5c3fe062004-06-14 18:08:37 +0200556 output_right(LT_TOF_FUNCTIONR, event->proc,
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100557 event->proc->callstack[i].c_un.libfunc->
558 name);
Juan Cespedes5916fda2002-02-25 00:19:21 +0100559 continue_after_breakpoint(event->proc,
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100560 address2bpstruct(event->proc,
561 event->e_un.
562 brk_addr));
Juan Cespedes5916fda2002-02-25 00:19:21 +0100563 return;
564 }
Juan Cespedes5e01f651998-03-08 22:31:44 +0100565 }
566
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100567 if ((sbp = address2bpstruct(event->proc, event->e_un.brk_addr))) {
568 event->proc->stack_pointer = get_stack_pointer(event->proc);
569 event->proc->return_addr =
570 get_return_addr(event->proc, event->proc->stack_pointer);
571 output_left(LT_TOF_FUNCTION, event->proc, sbp->libsym->name);
572 callstack_push_symfunc(event->proc, sbp->libsym);
Paul Gilliambe320772006-04-24 22:06:23 +0200573#ifdef PLT_REINITALISATION_BP
574 if (event->proc->need_to_reinitialize_breakpoints
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100575 && (strcmp(sbp->libsym->name, PLTs_initialized_by_here) ==
576 0))
577 reinitialize_breakpoints(event->proc);
Paul Gilliambe320772006-04-24 22:06:23 +0200578#endif
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100579
580 continue_after_breakpoint(event->proc, sbp);
581 return;
582 }
Ian Wienand9a2ad352006-02-20 22:44:45 +0100583
584 output_line(event->proc, "unexpected breakpoint at %p",
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100585 (void *)event->e_un.brk_addr);
Juan Cespedes5e01f651998-03-08 22:31:44 +0100586 continue_process(event->proc->pid);
587}
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200588
Juan Cespedesf1350522008-12-16 18:19:58 +0100589static void
Juan Cespedesa8909f72009-04-28 20:02:41 +0200590callstack_push_syscall(Process *proc, int sysnum) {
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100591 struct callstack_element *elem;
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200592
Juan Cespedescd8976d2009-05-14 13:47:58 +0200593 debug(DEBUG_FUNCTION, "callstack_push_syscall(pid=%d, sysnum=%d)", proc->pid, sysnum);
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200594 /* FIXME: not good -- should use dynamic allocation. 19990703 mortene. */
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100595 if (proc->callstack_depth == MAX_CALLDEPTH - 1) {
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200596 fprintf(stderr, "Error: call nesting too deep!\n");
597 return;
598 }
599
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100600 elem = &proc->callstack[proc->callstack_depth];
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200601 elem->is_syscall = 1;
602 elem->c_un.syscall = sysnum;
603 elem->return_addr = NULL;
604
605 proc->callstack_depth++;
Juan Cespedesda9b9532009-04-07 15:33:50 +0200606 if (opt_T || options.summary) {
Juan Cespedesd65efa32003-02-03 00:22:30 +0100607 struct timezone tz;
608 gettimeofday(&elem->time_spent, &tz);
609 }
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200610}
611
Juan Cespedes21c63a12001-07-07 20:56:56 +0200612static void
Juan Cespedesa8909f72009-04-28 20:02:41 +0200613callstack_push_symfunc(Process *proc, struct library_symbol *sym) {
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100614 struct callstack_element *elem;
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200615
Juan Cespedescd8976d2009-05-14 13:47:58 +0200616 debug(DEBUG_FUNCTION, "callstack_push_symfunc(pid=%d, symbol=%s)", proc->pid, sym->name);
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200617 /* FIXME: not good -- should use dynamic allocation. 19990703 mortene. */
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100618 if (proc->callstack_depth == MAX_CALLDEPTH - 1) {
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200619 fprintf(stderr, "Error: call nesting too deep!\n");
620 return;
621 }
622
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100623 elem = &proc->callstack[proc->callstack_depth];
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200624 elem->is_syscall = 0;
625 elem->c_un.libfunc = sym;
626
Juan Cespedes3f0b62e2001-07-09 01:02:52 +0200627 elem->return_addr = proc->return_addr;
Juan Cespedesa413e5b2007-09-04 17:34:53 +0200628 if (elem->return_addr) {
Paul Gilliam76c61f12006-06-14 06:55:21 +0200629 insert_breakpoint(proc, elem->return_addr, 0);
630 }
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200631
632 proc->callstack_depth++;
Juan Cespedesda9b9532009-04-07 15:33:50 +0200633 if (opt_T || options.summary) {
Juan Cespedesd65efa32003-02-03 00:22:30 +0100634 struct timezone tz;
635 gettimeofday(&elem->time_spent, &tz);
636 }
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200637}
638
Juan Cespedesf1350522008-12-16 18:19:58 +0100639static void
Juan Cespedesa8909f72009-04-28 20:02:41 +0200640callstack_pop(Process *proc) {
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100641 struct callstack_element *elem;
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200642 assert(proc->callstack_depth > 0);
643
Juan Cespedescd8976d2009-05-14 13:47:58 +0200644 debug(DEBUG_FUNCTION, "callstack_pop(pid=%d)", proc->pid);
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100645 elem = &proc->callstack[proc->callstack_depth - 1];
Paul Gilliam76c61f12006-06-14 06:55:21 +0200646 if (!elem->is_syscall && elem->return_addr) {
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200647 delete_breakpoint(proc, elem->return_addr);
648 }
649 proc->callstack_depth--;
Juan Cespedes5b3ffdf2001-07-02 00:52:45 +0200650}