blob: bf7f3adf581393884afd2fda289dc7de2bf89aac [file] [log] [blame]
Petr Machata64262602012-01-07 03:41:36 +01001/*
2 * This file is part of ltrace.
3 * Copyright (C) 2011,2012 Petr Machata, Red Hat Inc.
4 * Copyright (C) 2010 Joe Damato
5 * Copyright (C) 1998,2009 Juan Cespedes
6 *
7 * This program is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU General Public License as
9 * published by the Free Software Foundation; either version 2 of the
10 * License, or (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
20 * 02110-1301 USA
21 */
22
Joe Damatoab3b72c2010-10-31 00:21:53 -070023#include "config.h"
24
Petr Machataba1664b2012-04-28 14:59:05 +020025#include <sys/types.h>
26#include <assert.h>
27#include <errno.h>
28#include <stdio.h>
29#include <stdlib.h>
30#include <string.h>
31
Joe Damatoab3b72c2010-10-31 00:21:53 -070032#if defined(HAVE_LIBUNWIND)
33#include <libunwind.h>
34#include <libunwind-ptrace.h>
35#endif /* defined(HAVE_LIBUNWIND) */
36
Petr Machata64262602012-01-07 03:41:36 +010037#include "backend.h"
Petr Machataba1664b2012-04-28 14:59:05 +020038#include "breakpoint.h"
39#include "debug.h"
40#include "fetch.h"
41#include "proc.h"
42#include "value_dict.h"
Juan Cespedes273ea6d1998-03-14 23:02:40 +010043
Petr Machata744f2552012-04-15 04:33:18 +020044#ifndef ARCH_HAVE_PROCESS_DATA
45int
46arch_process_init(struct Process *proc)
47{
48 return 0;
49}
50
51void
52arch_process_destroy(struct Process *proc)
53{
54}
55
56int
57arch_process_clone(struct Process *retp, struct Process *proc)
58{
59 return 0;
60}
61
62int
63arch_process_exec(struct Process *proc)
64{
65 return 0;
66}
67#endif
68
Petr Machata0f6e6d92012-10-26 23:42:17 +020069#ifndef OS_HAVE_PROCESS_DATA
70int
71os_process_init(struct Process *proc)
72{
73 return 0;
74}
75
76void
77os_process_destroy(struct Process *proc)
78{
79}
80
81int
82os_process_clone(struct Process *retp, struct Process *proc)
83{
84 return 0;
85}
86
87int
88os_process_exec(struct Process *proc)
89{
90 return 0;
91}
92#endif
93
Petr Machata93d95df2012-04-17 05:16:19 +020094#ifndef ARCH_HAVE_DYNLINK_DONE
95void
96arch_dynlink_done(struct Process *proc)
97{
98}
99#endif
100
Petr Machata3d0c91c2012-04-14 02:37:38 +0200101static void add_process(struct Process *proc, int was_exec);
Petr Machata61686c22012-05-03 18:39:49 +0200102static void unlist_process(struct Process *proc);
Petr Machata44965c72012-04-06 19:59:20 +0200103
Petr Machatae677c7e2012-10-26 22:23:43 +0200104static void
105destroy_unwind(struct Process *proc)
106{
107#if defined(HAVE_LIBUNWIND)
108 _UPT_destroy(proc->unwind_priv);
109 unw_destroy_addr_space(proc->unwind_as);
110#endif /* defined(HAVE_LIBUNWIND) */
111}
112
Petr Machata2b46cfc2012-02-18 11:17:29 +0100113static int
Petr Machata3d0c91c2012-04-14 02:37:38 +0200114process_bare_init(struct Process *proc, const char *filename,
115 pid_t pid, int was_exec)
Petr Machata2b46cfc2012-02-18 11:17:29 +0100116{
Petr Machata3d0c91c2012-04-14 02:37:38 +0200117 if (!was_exec) {
118 memset(proc, 0, sizeof(*proc));
Petr Machata1974dbc2011-08-19 18:58:01 +0200119
Petr Machata3d0c91c2012-04-14 02:37:38 +0200120 proc->filename = strdup(filename);
121 if (proc->filename == NULL) {
122 fail:
123 free(proc->filename);
124 if (proc->breakpoints != NULL)
125 dict_clear(proc->breakpoints);
126 return -1;
127 }
Petr Machata2b46cfc2012-02-18 11:17:29 +0100128 }
129
130 /* Add process so that we know who the leader is. */
Petr Machata1b17dbf2011-07-08 19:22:52 +0200131 proc->pid = pid;
Petr Machata3d0c91c2012-04-14 02:37:38 +0200132 add_process(proc, was_exec);
Petr Machata2b46cfc2012-02-18 11:17:29 +0100133 if (proc->leader == NULL)
134 goto fail;
135
136 if (proc->leader == proc) {
Petr Machataecb082f2012-04-05 02:10:10 +0200137 proc->breakpoints = dict_init(target_address_hash,
138 target_address_cmp);
Petr Machata2b46cfc2012-02-18 11:17:29 +0100139 if (proc->breakpoints == NULL)
140 goto fail;
141 } else {
142 proc->breakpoints = NULL;
143 }
144
Joe Damatoab3b72c2010-10-31 00:21:53 -0700145#if defined(HAVE_LIBUNWIND)
Petr Machata1b17dbf2011-07-08 19:22:52 +0200146 proc->unwind_priv = _UPT_create(pid);
147 proc->unwind_as = unw_create_addr_space(&_UPT_accessors, 0);
Joe Damatoab3b72c2010-10-31 00:21:53 -0700148#endif /* defined(HAVE_LIBUNWIND) */
Joe Damatoab3b72c2010-10-31 00:21:53 -0700149
Petr Machata2b46cfc2012-02-18 11:17:29 +0100150 return 0;
151}
152
153static void
Petr Machata3d0c91c2012-04-14 02:37:38 +0200154process_bare_destroy(struct Process *proc, int was_exec)
Petr Machata2b46cfc2012-02-18 11:17:29 +0100155{
Petr Machata2b46cfc2012-02-18 11:17:29 +0100156 dict_clear(proc->breakpoints);
Petr Machata3d0c91c2012-04-14 02:37:38 +0200157 if (!was_exec) {
158 free(proc->filename);
Petr Machata61686c22012-05-03 18:39:49 +0200159 unlist_process(proc);
Petr Machatae677c7e2012-10-26 22:23:43 +0200160 destroy_unwind(proc);
Petr Machata3d0c91c2012-04-14 02:37:38 +0200161 }
Petr Machata2b46cfc2012-02-18 11:17:29 +0100162}
163
Petr Machata3d0c91c2012-04-14 02:37:38 +0200164static int
165process_init_main(struct Process *proc)
Petr Machata2b46cfc2012-02-18 11:17:29 +0100166{
Petr Machata3d0c91c2012-04-14 02:37:38 +0200167 if (breakpoints_init(proc) < 0) {
Petr Machata18bd8ff2012-04-10 04:32:39 +0200168 fprintf(stderr, "failed to init breakpoints %d\n",
169 proc->pid);
Petr Machata218c5ff2012-04-15 04:22:39 +0200170 return -1;
Petr Machata18bd8ff2012-04-10 04:32:39 +0200171 }
172
Petr Machata2b46cfc2012-02-18 11:17:29 +0100173 return 0;
174}
175
Petr Machata3d0c91c2012-04-14 02:37:38 +0200176int
177process_init(struct Process *proc, const char *filename, pid_t pid)
178{
179 if (process_bare_init(proc, filename, pid, 0) < 0) {
Petr Machata218c5ff2012-04-15 04:22:39 +0200180 fail:
Petr Machatacc0e1e42012-04-25 13:42:07 +0200181 fprintf(stderr, "failed to initialize process %d: %s\n",
182 pid, strerror(errno));
Petr Machata3d0c91c2012-04-14 02:37:38 +0200183 return -1;
184 }
185
Petr Machata0f6e6d92012-10-26 23:42:17 +0200186 if (os_process_init(proc) < 0) {
187 process_bare_destroy(proc, 0);
188 goto fail;
189 }
190
Petr Machata744f2552012-04-15 04:33:18 +0200191 if (arch_process_init(proc) < 0) {
Petr Machata0f6e6d92012-10-26 23:42:17 +0200192 os_process_destroy(proc);
Petr Machata744f2552012-04-15 04:33:18 +0200193 process_bare_destroy(proc, 0);
194 goto fail;
195 }
196
Petr Machata218c5ff2012-04-15 04:22:39 +0200197 if (proc->leader != proc)
Petr Machata3d0c91c2012-04-14 02:37:38 +0200198 return 0;
Petr Machata218c5ff2012-04-15 04:22:39 +0200199 if (process_init_main(proc) < 0) {
200 process_bare_destroy(proc, 0);
201 goto fail;
202 }
203 return 0;
Petr Machata3d0c91c2012-04-14 02:37:38 +0200204}
205
Petr Machata8ead1cd2012-04-24 18:13:09 +0200206static enum callback_status
207destroy_breakpoint_cb(struct Process *proc, struct breakpoint *bp, void *data)
Petr Machata3d0c91c2012-04-14 02:37:38 +0200208{
Petr Machata3d0c91c2012-04-14 02:37:38 +0200209 breakpoint_destroy(bp);
210 free(bp);
Petr Machata8ead1cd2012-04-24 18:13:09 +0200211 return CBS_CONT;
Petr Machata3d0c91c2012-04-14 02:37:38 +0200212}
213
Petr Machatae0e89ed2012-10-26 22:25:33 +0200214// XXX see comment in handle_event.c
215void callstack_pop(struct Process *proc);
216
Petr Machata3d0c91c2012-04-14 02:37:38 +0200217static void
Petr Machatae0e89ed2012-10-26 22:25:33 +0200218private_process_destroy(struct Process *proc, int was_exec)
Petr Machata3d0c91c2012-04-14 02:37:38 +0200219{
Petr Machatae0e89ed2012-10-26 22:25:33 +0200220 /* Pop remaining stack elements. */
221 while (proc->callstack_depth > 0) {
222 /* When this is called just before a process is
223 * destroyed, the breakpoints should either have been
224 * retracted by now, or were killed by exec. In any
225 * case, it's safe to pretend that there are no
226 * breakpoints associated with the stack elements, so
227 * that stack_pop doesn't attempt to destroy them. */
228 size_t i = proc->callstack_depth - 1;
229 if (!proc->callstack[i].is_syscall)
230 proc->callstack[i].return_addr = 0;
231
232 callstack_pop(proc);
233 }
234
235 if (!was_exec)
Petr Machata3d0c91c2012-04-14 02:37:38 +0200236 free(proc->filename);
237
Petr Machata8ead1cd2012-04-24 18:13:09 +0200238 /* Libraries and symbols. This is only relevant in
239 * leader. */
Petr Machata3d0c91c2012-04-14 02:37:38 +0200240 struct library *lib;
241 for (lib = proc->libraries; lib != NULL; ) {
242 struct library *next = lib->next;
243 library_destroy(lib);
244 free(lib);
245 lib = next;
246 }
247 proc->libraries = NULL;
248
249 /* Breakpoints. */
Petr Machata8ead1cd2012-04-24 18:13:09 +0200250 if (proc->breakpoints != NULL) {
251 proc_each_breakpoint(proc, NULL, destroy_breakpoint_cb, NULL);
252 dict_clear(proc->breakpoints);
253 proc->breakpoints = NULL;
254 }
Petr Machatae677c7e2012-10-26 22:23:43 +0200255
256 destroy_unwind(proc);
Petr Machata3d0c91c2012-04-14 02:37:38 +0200257}
258
259void
260process_destroy(struct Process *proc)
261{
Petr Machata744f2552012-04-15 04:33:18 +0200262 arch_process_destroy(proc);
Petr Machata0f6e6d92012-10-26 23:42:17 +0200263 os_process_destroy(proc);
Petr Machata3cc0cd12012-10-26 22:30:51 +0200264 private_process_destroy(proc, 0);
Petr Machata3d0c91c2012-04-14 02:37:38 +0200265}
266
267int
268process_exec(struct Process *proc)
269{
Petr Machata0f6e6d92012-10-26 23:42:17 +0200270 /* Call exec handlers first, before we destroy the main
Petr Machata3cc0cd12012-10-26 22:30:51 +0200271 * state. */
Petr Machata0f6e6d92012-10-26 23:42:17 +0200272 if (arch_process_exec(proc) < 0
273 || os_process_exec(proc) < 0)
Petr Machata744f2552012-04-15 04:33:18 +0200274 return -1;
275
Petr Machata3d0c91c2012-04-14 02:37:38 +0200276 private_process_destroy(proc, 1);
Petr Machata3cc0cd12012-10-26 22:30:51 +0200277
Petr Machata3d0c91c2012-04-14 02:37:38 +0200278 if (process_bare_init(proc, NULL, proc->pid, 1) < 0)
279 return -1;
280 if (process_init_main(proc) < 0) {
281 process_bare_destroy(proc, 1);
282 return -1;
283 }
284 return 0;
285}
286
Petr Machata2b46cfc2012-02-18 11:17:29 +0100287struct Process *
Petr Machata75934ad2012-04-14 02:28:03 +0200288open_program(const char *filename, pid_t pid)
Petr Machata2b46cfc2012-02-18 11:17:29 +0100289{
Petr Machata2b46cfc2012-02-18 11:17:29 +0100290 assert(pid != 0);
291 struct Process *proc = malloc(sizeof(*proc));
Petr Machata75934ad2012-04-14 02:28:03 +0200292 if (proc == NULL || process_init(proc, filename, pid) < 0) {
Petr Machata1974dbc2011-08-19 18:58:01 +0200293 free(proc);
294 return NULL;
295 }
Petr Machata2b46cfc2012-02-18 11:17:29 +0100296 return proc;
297}
Juan Cespedes273ea6d1998-03-14 23:02:40 +0100298
Petr Machata2b46cfc2012-02-18 11:17:29 +0100299struct clone_single_bp_data {
300 struct Process *old_proc;
301 struct Process *new_proc;
302 int error;
303};
304
Petr Machata2b46cfc2012-02-18 11:17:29 +0100305static void
306clone_single_bp(void *key, void *value, void *u)
307{
Petr Machata2b46cfc2012-02-18 11:17:29 +0100308 struct breakpoint *bp = value;
309 struct clone_single_bp_data *data = u;
310
Petr Machata81bc82c2012-10-27 19:26:44 +0200311 /* Don't bother if there were errors anyway. */
312 if (data->error != 0)
313 return;
314
Petr Machata2b46cfc2012-02-18 11:17:29 +0100315 struct breakpoint *clone = malloc(sizeof(*clone));
316 if (clone == NULL
Petr Machatad3cc9882012-04-13 21:40:23 +0200317 || breakpoint_clone(clone, data->new_proc,
318 bp, data->old_proc) < 0) {
319 fail:
320 free(clone);
Petr Machata2b46cfc2012-02-18 11:17:29 +0100321 data->error = -1;
Petr Machata2b46cfc2012-02-18 11:17:29 +0100322 }
Petr Machatad3cc9882012-04-13 21:40:23 +0200323 if (proc_add_breakpoint(data->new_proc->leader, clone) < 0) {
324 breakpoint_destroy(clone);
325 goto fail;
326 }
Petr Machata2b46cfc2012-02-18 11:17:29 +0100327}
328
329int
330process_clone(struct Process *retp, struct Process *proc, pid_t pid)
331{
Petr Machata3d0c91c2012-04-14 02:37:38 +0200332 if (process_bare_init(retp, proc->filename, pid, 0) < 0) {
Petr Machataba1664b2012-04-28 14:59:05 +0200333 fail1:
Petr Machatacc0e1e42012-04-25 13:42:07 +0200334 fprintf(stderr, "failed to clone process %d->%d : %s\n",
335 proc->pid, pid, strerror(errno));
Petr Machata2b46cfc2012-02-18 11:17:29 +0100336 return -1;
337 }
338
Petr Machatacf1679a2012-04-06 19:56:17 +0200339 retp->tracesysgood = proc->tracesysgood;
Petr Machata2cb124c2012-04-19 18:44:45 +0200340 retp->e_machine = proc->e_machine;
Petr Machata4d4e1b82012-05-30 11:08:39 -0400341 retp->e_class = proc->e_class;
Petr Machatacf1679a2012-04-06 19:56:17 +0200342
Petr Machata2b46cfc2012-02-18 11:17:29 +0100343 /* For non-leader processes, that's all we need to do. */
Petr Machatad3cc9882012-04-13 21:40:23 +0200344 if (retp->leader != retp)
Petr Machata2b46cfc2012-02-18 11:17:29 +0100345 return 0;
346
347 /* Clone symbols first so that we can clone and relink
348 * breakpoints. */
349 struct library *lib;
350 struct library **nlibp = &retp->libraries;
351 for (lib = proc->libraries; lib != NULL; lib = lib->next) {
352 *nlibp = malloc(sizeof(**nlibp));
353 if (*nlibp == NULL
354 || library_clone(*nlibp, lib) < 0) {
355 fail2:
Petr Machata3d0c91c2012-04-14 02:37:38 +0200356 process_bare_destroy(retp, 0);
Petr Machata2b46cfc2012-02-18 11:17:29 +0100357
358 /* Error when cloning. Unroll what was done. */
359 for (lib = retp->libraries; lib != NULL; ) {
360 struct library *next = lib->next;
361 library_destroy(lib);
362 free(lib);
363 lib = next;
364 }
Petr Machataba1664b2012-04-28 14:59:05 +0200365 goto fail1;
Petr Machata2b46cfc2012-02-18 11:17:29 +0100366 }
367
368 nlibp = &(*nlibp)->next;
369 }
370
371 /* Now clone breakpoints. Symbol relinking is done in
372 * clone_single_bp. */
373 struct clone_single_bp_data data = {
374 .old_proc = proc,
375 .new_proc = retp,
376 .error = 0,
377 };
378 dict_apply_to_all(proc->breakpoints, &clone_single_bp, &data);
Petr Machata94078ec2012-01-05 18:07:02 +0100379 if (data.error < 0)
380 goto fail2;
Petr Machata2b46cfc2012-02-18 11:17:29 +0100381
Petr Machataded6f972012-04-13 23:15:48 +0200382 /* And finally the call stack. */
Petr Machatab6de8412012-10-27 19:31:22 +0200383 /* XXX clearly the callstack handling should be moved to a
384 * separate module and this whole business extracted to
385 * callstack_clone, or callstack_element_clone. */
Petr Machataded6f972012-04-13 23:15:48 +0200386 memcpy(retp->callstack, proc->callstack, sizeof(retp->callstack));
387 retp->callstack_depth = proc->callstack_depth;
388
Petr Machata94078ec2012-01-05 18:07:02 +0100389 size_t i;
390 for (i = 0; i < retp->callstack_depth; ++i) {
Petr Machatab6de8412012-10-27 19:31:22 +0200391 struct callstack_element *elem = &retp->callstack[i];
392 struct fetch_context *ctx = elem->fetch_context;
Petr Machataf6ec08a2012-01-06 16:58:54 +0100393 if (ctx != NULL) {
Petr Machataba1664b2012-04-28 14:59:05 +0200394 struct fetch_context *nctx = fetch_arg_clone(retp, ctx);
Petr Machataf6ec08a2012-01-06 16:58:54 +0100395 if (nctx == NULL) {
Petr Machataba1664b2012-04-28 14:59:05 +0200396 size_t j;
397 fail3:
Petr Machataf6ec08a2012-01-06 16:58:54 +0100398 for (j = 0; j < i; ++j) {
Petr Machatab6de8412012-10-27 19:31:22 +0200399 nctx = elem->fetch_context;
Petr Machataf6ec08a2012-01-06 16:58:54 +0100400 fetch_arg_done(nctx);
Petr Machatab6de8412012-10-27 19:31:22 +0200401 elem->fetch_context = NULL;
Petr Machataf6ec08a2012-01-06 16:58:54 +0100402 }
403 goto fail2;
404 }
Petr Machatab6de8412012-10-27 19:31:22 +0200405 elem->fetch_context = nctx;
Petr Machataf6ec08a2012-01-06 16:58:54 +0100406 }
407
Petr Machatab6de8412012-10-27 19:31:22 +0200408 struct value_dict *args = elem->arguments;
Petr Machata94078ec2012-01-05 18:07:02 +0100409 if (args != NULL) {
Petr Machata94078ec2012-01-05 18:07:02 +0100410 struct value_dict *nargs = malloc(sizeof(*nargs));
Petr Machata94078ec2012-01-05 18:07:02 +0100411 if (nargs == NULL
412 || val_dict_clone(nargs, args) < 0) {
Petr Machataba1664b2012-04-28 14:59:05 +0200413 size_t j;
Petr Machata94078ec2012-01-05 18:07:02 +0100414 for (j = 0; j < i; ++j) {
Petr Machatab6de8412012-10-27 19:31:22 +0200415 nargs = elem->arguments;
Petr Machata94078ec2012-01-05 18:07:02 +0100416 val_dict_destroy(nargs);
417 free(nargs);
Petr Machatab6de8412012-10-27 19:31:22 +0200418 elem->arguments = NULL;
Petr Machata94078ec2012-01-05 18:07:02 +0100419 }
Petr Machataf6ec08a2012-01-06 16:58:54 +0100420
421 /* Pretend that this round went well,
Petr Machataba1664b2012-04-28 14:59:05 +0200422 * so that fail3 frees I-th
Petr Machataf6ec08a2012-01-06 16:58:54 +0100423 * fetch_context. */
424 ++i;
Petr Machataba1664b2012-04-28 14:59:05 +0200425 goto fail3;
Petr Machata94078ec2012-01-05 18:07:02 +0100426 }
Petr Machatab6de8412012-10-27 19:31:22 +0200427 elem->arguments = nargs;
Petr Machata94078ec2012-01-05 18:07:02 +0100428 }
Petr Machata165b5662012-10-27 19:23:12 +0200429
430 /* If it's not a syscall, we need to find the
431 * corresponding library symbol in the cloned
432 * library. */
433 if (!elem->is_syscall && elem->c_un.libfunc != NULL) {
434 struct library_symbol *libfunc = elem->c_un.libfunc;
435 int rc = proc_find_symbol(retp, libfunc,
436 NULL, &elem->c_un.libfunc);
437 assert(rc == 0);
438 }
Petr Machata94078ec2012-01-05 18:07:02 +0100439 }
Petr Machata2b46cfc2012-02-18 11:17:29 +0100440
Petr Machata5bf47142012-10-27 19:29:00 +0200441 /* At this point, retp is fully initialized, except for OS and
442 * arch parts, and we can call private_process_destroy. */
443 if (os_process_clone(retp, proc) < 0) {
444 private_process_destroy(retp, 0);
445 return -1;
446 }
447 if (arch_process_clone(retp, proc) < 0) {
448 os_process_destroy(retp);
449 private_process_destroy(retp, 0);
450 return -1;
451 }
Petr Machata744f2552012-04-15 04:33:18 +0200452
Petr Machata2b46cfc2012-02-18 11:17:29 +0100453 return 0;
Juan Cespedes273ea6d1998-03-14 23:02:40 +0100454}
455
Petr Machata3c516d52011-08-18 03:53:18 +0200456static int
Petr Machata9a5420c2011-07-09 11:21:23 +0200457open_one_pid(pid_t pid)
458{
Juan Cespedesa8909f72009-04-28 20:02:41 +0200459 Process *proc;
Ian Wienand2d45b1a2006-02-20 22:48:07 +0100460 char *filename;
Petr Machata9a5420c2011-07-09 11:21:23 +0200461 debug(DEBUG_PROCESS, "open_one_pid(pid=%d)", pid);
462
Petr Machata1974dbc2011-08-19 18:58:01 +0200463 /* Get the filename first. Should the trace_pid fail, we can
464 * easily free it, untracing is more work. */
465 if ((filename = pid2name(pid)) == NULL
466 || trace_pid(pid) < 0) {
Petr Machataef0c74d2012-10-27 00:30:57 +0200467 fail:
Petr Machata1974dbc2011-08-19 18:58:01 +0200468 free(filename);
469 return -1;
470 }
Juan Cespedes35d70631998-03-15 14:05:40 +0100471
Petr Machata75934ad2012-04-14 02:28:03 +0200472 proc = open_program(filename, pid);
Petr Machata1974dbc2011-08-19 18:58:01 +0200473 if (proc == NULL)
Petr Machataef0c74d2012-10-27 00:30:57 +0200474 goto fail;
475 free(filename);
Petr Machata3ed2a422012-04-06 17:18:55 +0200476 trace_set_options(proc);
Petr Machata3c516d52011-08-18 03:53:18 +0200477
Petr Machata1974dbc2011-08-19 18:58:01 +0200478 return 0;
479}
480
Petr Machata2b46cfc2012-02-18 11:17:29 +0100481static enum callback_status
Petr Machata1974dbc2011-08-19 18:58:01 +0200482start_one_pid(Process * proc, void * data)
483{
484 continue_process(proc->pid);
Petr Machata2b46cfc2012-02-18 11:17:29 +0100485 return CBS_CONT;
Juan Cespedes273ea6d1998-03-14 23:02:40 +0100486}
Juan Cespedese74c80d2009-02-11 11:32:31 +0100487
Petr Machata9a5420c2011-07-09 11:21:23 +0200488void
489open_pid(pid_t pid)
490{
491 debug(DEBUG_PROCESS, "open_pid(pid=%d)", pid);
Petr Machata3c516d52011-08-18 03:53:18 +0200492 /* If we are already tracing this guy, we should be seeing all
493 * his children via normal tracing route. */
494 if (pid2proc(pid) != NULL)
495 return;
Petr Machata9a5420c2011-07-09 11:21:23 +0200496
Petr Machata3c516d52011-08-18 03:53:18 +0200497 /* First, see if we can attach the requested PID itself. */
Petr Machata1974dbc2011-08-19 18:58:01 +0200498 if (open_one_pid(pid)) {
Petr Machata3c516d52011-08-18 03:53:18 +0200499 fprintf(stderr, "Cannot attach to pid %u: %s\n",
500 pid, strerror(errno));
Petr Machatacec06ec2012-04-10 13:31:55 +0200501 trace_fail_warning(pid);
Petr Machata3c516d52011-08-18 03:53:18 +0200502 return;
Petr Machata9a5420c2011-07-09 11:21:23 +0200503 }
504
Petr Machata3c516d52011-08-18 03:53:18 +0200505 /* Now attach to all tasks that belong to that PID. There's a
506 * race between process_tasks and open_one_pid. So when we
507 * fail in open_one_pid below, we just do another round.
508 * Chances are that by then that PID will have gone away, and
509 * that's why we have seen the failure. The processes that we
510 * manage to open_one_pid are stopped, so we should eventually
511 * reach a point where process_tasks doesn't give any new
512 * processes (because there's nobody left to produce
513 * them). */
Petr Machata1974dbc2011-08-19 18:58:01 +0200514 size_t old_ntasks = 0;
Petr Machata3c516d52011-08-18 03:53:18 +0200515 int have_all;
Petr Machata1974dbc2011-08-19 18:58:01 +0200516 while (1) {
Petr Machata3c516d52011-08-18 03:53:18 +0200517 pid_t *tasks;
518 size_t ntasks;
519 size_t i;
Petr Machata1974dbc2011-08-19 18:58:01 +0200520
Petr Machata3c516d52011-08-18 03:53:18 +0200521 if (process_tasks(pid, &tasks, &ntasks) < 0) {
522 fprintf(stderr, "Cannot obtain tasks of pid %u: %s\n",
523 pid, strerror(errno));
Petr Machatafed1e8d2012-02-07 02:06:29 +0100524 break;
Petr Machata3c516d52011-08-18 03:53:18 +0200525 }
Petr Machata9a5420c2011-07-09 11:21:23 +0200526
Petr Machata3c516d52011-08-18 03:53:18 +0200527 have_all = 1;
528 for (i = 0; i < ntasks; ++i)
529 if (pid2proc(tasks[i]) == NULL
Petr Machata1974dbc2011-08-19 18:58:01 +0200530 && open_one_pid(tasks[i]))
Petr Machata3c516d52011-08-18 03:53:18 +0200531 have_all = 0;
532
Petr Machata9a5420c2011-07-09 11:21:23 +0200533 free(tasks);
Petr Machata3c516d52011-08-18 03:53:18 +0200534
Petr Machata1974dbc2011-08-19 18:58:01 +0200535 if (have_all && old_ntasks == ntasks)
536 break;
537 old_ntasks = ntasks;
538 }
539
Petr Machata93d95df2012-04-17 05:16:19 +0200540 struct Process *leader = pid2proc(pid)->leader;
541
542 /* XXX Is there a way to figure out whether _start has
543 * actually already been hit? */
544 arch_dynlink_done(leader);
545
Petr Machata2f9b78e2012-04-16 21:08:54 +0200546 /* Done. Continue everyone. */
Petr Machata93d95df2012-04-17 05:16:19 +0200547 each_task(leader, NULL, start_one_pid, NULL);
Petr Machata9a5420c2011-07-09 11:21:23 +0200548}
549
Petr Machata2b46cfc2012-02-18 11:17:29 +0100550static enum callback_status
Petr Machatacebb8842011-07-09 11:14:11 +0200551find_proc(Process * proc, void * data)
552{
553 pid_t pid = (pid_t)(uintptr_t)data;
Petr Machata2b46cfc2012-02-18 11:17:29 +0100554 return proc->pid == pid ? CBS_STOP : CBS_CONT;
Petr Machatacebb8842011-07-09 11:14:11 +0200555}
556
Juan Cespedesa8909f72009-04-28 20:02:41 +0200557Process *
Juan Cespedese74c80d2009-02-11 11:32:31 +0100558pid2proc(pid_t pid) {
Petr Machatacebb8842011-07-09 11:14:11 +0200559 return each_process(NULL, &find_proc, (void *)(uintptr_t)pid);
560}
Juan Cespedese74c80d2009-02-11 11:32:31 +0100561
Petr Machatacebb8842011-07-09 11:14:11 +0200562static Process * list_of_processes = NULL;
563
Petr Machatacbe29c62011-09-27 02:27:58 +0200564static void
565unlist_process(Process * proc)
566{
567 Process *tmp;
568
569 if (list_of_processes == proc) {
570 list_of_processes = list_of_processes->next;
571 return;
572 }
573
574 for (tmp = list_of_processes; ; tmp = tmp->next) {
575 /* If the following assert fails, the process wasn't
576 * in the list. */
577 assert(tmp->next != NULL);
578
579 if (tmp->next == proc) {
580 tmp->next = tmp->next->next;
581 return;
582 }
583 }
584}
585
Petr Machata2b46cfc2012-02-18 11:17:29 +0100586struct Process *
Petr Machata74132a42012-03-16 02:46:18 +0100587each_process(struct Process *start_after,
Petr Machata2b46cfc2012-02-18 11:17:29 +0100588 enum callback_status(*cb)(struct Process *proc, void *data),
589 void *data)
Petr Machatacebb8842011-07-09 11:14:11 +0200590{
Petr Machata74132a42012-03-16 02:46:18 +0100591 struct Process *it = start_after == NULL ? list_of_processes
592 : start_after->next;
593
594 while (it != NULL) {
Petr Machatacebb8842011-07-09 11:14:11 +0200595 /* Callback might call remove_process. */
Petr Machata74132a42012-03-16 02:46:18 +0100596 struct Process *next = it->next;
Petr Machata2b46cfc2012-02-18 11:17:29 +0100597 switch ((*cb)(it, data)) {
Petr Machataef7fa372012-03-28 02:05:36 +0200598 case CBS_FAIL:
599 /* XXX handle me */
Petr Machata2b46cfc2012-02-18 11:17:29 +0100600 case CBS_STOP:
Petr Machatacebb8842011-07-09 11:14:11 +0200601 return it;
Petr Machata2b46cfc2012-02-18 11:17:29 +0100602 case CBS_CONT:
603 break;
604 }
Petr Machatacebb8842011-07-09 11:14:11 +0200605 it = next;
606 }
607 return NULL;
608}
Petr Machata9a5420c2011-07-09 11:21:23 +0200609
610Process *
Petr Machata74132a42012-03-16 02:46:18 +0100611each_task(struct Process *proc, struct Process *start_after,
Petr Machata2b46cfc2012-02-18 11:17:29 +0100612 enum callback_status(*cb)(struct Process *proc, void *data),
613 void *data)
Petr Machata9a5420c2011-07-09 11:21:23 +0200614{
Petr Machata74132a42012-03-16 02:46:18 +0100615 assert(proc != NULL);
616 struct Process *it = start_after == NULL ? proc->leader
617 : start_after->next;
618
Petr Machata9a5420c2011-07-09 11:21:23 +0200619 if (it != NULL) {
Petr Machata74132a42012-03-16 02:46:18 +0100620 struct Process *leader = it->leader;
621 while (it != NULL && it->leader == leader) {
Petr Machata9a5420c2011-07-09 11:21:23 +0200622 /* Callback might call remove_process. */
Petr Machata74132a42012-03-16 02:46:18 +0100623 struct Process *next = it->next;
Petr Machata2b46cfc2012-02-18 11:17:29 +0100624 switch ((*cb)(it, data)) {
Petr Machataef7fa372012-03-28 02:05:36 +0200625 case CBS_FAIL:
626 /* XXX handle me */
Petr Machata2b46cfc2012-02-18 11:17:29 +0100627 case CBS_STOP:
Petr Machata9a5420c2011-07-09 11:21:23 +0200628 return it;
Petr Machata2b46cfc2012-02-18 11:17:29 +0100629 case CBS_CONT:
630 break;
631 }
Petr Machata9a5420c2011-07-09 11:21:23 +0200632 it = next;
633 }
634 }
635 return NULL;
636}
637
Petr Machata44965c72012-04-06 19:59:20 +0200638static void
Petr Machata3d0c91c2012-04-14 02:37:38 +0200639add_process(struct Process *proc, int was_exec)
Petr Machatacebb8842011-07-09 11:14:11 +0200640{
Petr Machata9a5420c2011-07-09 11:21:23 +0200641 Process ** leaderp = &list_of_processes;
642 if (proc->pid) {
643 pid_t tgid = process_leader(proc->pid);
Petr Machata1974dbc2011-08-19 18:58:01 +0200644 if (tgid == 0)
645 /* Must have been terminated before we managed
646 * to fully attach. */
647 return;
Petr Machata9a5420c2011-07-09 11:21:23 +0200648 if (tgid == proc->pid)
649 proc->leader = proc;
650 else {
651 Process * leader = pid2proc(tgid);
652 proc->leader = leader;
653 if (leader != NULL)
Petr Machata9a5420c2011-07-09 11:21:23 +0200654 leaderp = &leader->next;
655 }
656 }
Petr Machata3d0c91c2012-04-14 02:37:38 +0200657
658 if (!was_exec) {
659 proc->next = *leaderp;
660 *leaderp = proc;
661 }
Petr Machata9a5420c2011-07-09 11:21:23 +0200662}
663
Petr Machatacbe29c62011-09-27 02:27:58 +0200664void
665change_process_leader(Process * proc, Process * leader)
666{
667 Process ** leaderp = &list_of_processes;
668 if (proc->leader == leader)
669 return;
670
671 assert(leader != NULL);
672 unlist_process(proc);
673 if (proc != leader)
674 leaderp = &leader->next;
675
676 proc->leader = leader;
677 proc->next = *leaderp;
678 *leaderp = proc;
679}
680
Petr Machata2b46cfc2012-02-18 11:17:29 +0100681static enum callback_status
682clear_leader(struct Process *proc, void *data)
Petr Machata9a5420c2011-07-09 11:21:23 +0200683{
684 debug(DEBUG_FUNCTION, "detach_task %d from leader %d",
685 proc->pid, proc->leader->pid);
686 proc->leader = NULL;
Petr Machata2b46cfc2012-02-18 11:17:29 +0100687 return CBS_CONT;
Petr Machatacebb8842011-07-09 11:14:11 +0200688}
689
690void
691remove_process(Process *proc)
692{
Petr Machatacebb8842011-07-09 11:14:11 +0200693 debug(DEBUG_FUNCTION, "remove_proc(pid=%d)", proc->pid);
694
Petr Machata9a5420c2011-07-09 11:21:23 +0200695 if (proc->leader == proc)
Petr Machata74132a42012-03-16 02:46:18 +0100696 each_task(proc, NULL, &clear_leader, NULL);
Petr Machata9a5420c2011-07-09 11:21:23 +0200697
Petr Machatacbe29c62011-09-27 02:27:58 +0200698 unlist_process(proc);
Petr Machatacd972582012-01-07 03:02:07 +0100699 process_removed(proc);
Petr Machata9b87e822012-04-24 18:12:10 +0200700 process_destroy(proc);
701 free(proc);
Juan Cespedese74c80d2009-02-11 11:32:31 +0100702}
Petr Machata4007d742011-07-09 11:29:42 +0200703
704void
Petr Machata366c2f42012-02-09 19:34:36 +0100705install_event_handler(Process *proc, struct event_handler *handler)
Petr Machata4007d742011-07-09 11:29:42 +0200706{
Petr Machata75dcf7d2011-10-06 14:30:19 +0200707 debug(DEBUG_FUNCTION, "install_event_handler(pid=%d, %p)", proc->pid, handler);
Petr Machata4007d742011-07-09 11:29:42 +0200708 assert(proc->event_handler == NULL);
709 proc->event_handler = handler;
710}
711
712void
713destroy_event_handler(Process * proc)
714{
Petr Machata366c2f42012-02-09 19:34:36 +0100715 struct event_handler *handler = proc->event_handler;
Petr Machata75dcf7d2011-10-06 14:30:19 +0200716 debug(DEBUG_FUNCTION, "destroy_event_handler(pid=%d, %p)", proc->pid, handler);
Petr Machata4007d742011-07-09 11:29:42 +0200717 assert(handler != NULL);
Petr Machatacbe29c62011-09-27 02:27:58 +0200718 if (handler->destroy != NULL)
719 handler->destroy(handler);
Petr Machata4007d742011-07-09 11:29:42 +0200720 free(handler);
721 proc->event_handler = NULL;
722}
Petr Machata2b46cfc2012-02-18 11:17:29 +0100723
Petr Machataef2fd272012-09-28 00:43:01 +0200724static int
725breakpoint_for_symbol(struct library_symbol *libsym, struct Process *proc)
Petr Machata2b46cfc2012-02-18 11:17:29 +0100726{
Edgar E. Iglesiasad640472012-09-27 12:07:34 +0200727 arch_addr_t bp_addr;
Petr Machatad5e85562012-04-05 15:18:38 +0200728 assert(proc->leader == proc);
Petr Machata2b46cfc2012-02-18 11:17:29 +0100729
Petr Machataef2fd272012-09-28 00:43:01 +0200730 /* Don't enable latent or delayed symbols. */
731 if (libsym->latent || libsym->delayed)
732 return 0;
Edgar E. Iglesias6ef7b252012-09-27 17:02:38 +0200733
Edgar E. Iglesiasf97b1872012-10-01 12:43:34 +0200734 bp_addr = sym2addr(proc, libsym);
735
Petr Machatad5e85562012-04-05 15:18:38 +0200736 /* If there is an artificial breakpoint on the same address,
737 * its libsym will be NULL, and we can smuggle our libsym
738 * there. That artificial breakpoint is there presumably for
739 * the callbacks, which we don't touch. If there is a real
740 * breakpoint, then this is a bug. ltrace-elf.c should filter
Petr Machataa2416362012-04-06 02:43:34 +0200741 * symbols and ignore extra symbol aliases.
742 *
743 * The other direction is more complicated and currently not
744 * supported. If a breakpoint has custom callbacks, it might
745 * be also custom-allocated, and we would really need to swap
746 * the two: delete the one now in the dictionary, swap values
747 * around, and put the new breakpoint back in. */
Petr Machatad5e85562012-04-05 15:18:38 +0200748 struct breakpoint *bp = dict_find_entry(proc->breakpoints,
Edgar E. Iglesiasad640472012-09-27 12:07:34 +0200749 bp_addr);
Petr Machatad5e85562012-04-05 15:18:38 +0200750 if (bp != NULL) {
751 assert(bp->libsym == NULL);
752 bp->libsym = libsym;
Petr Machataef2fd272012-09-28 00:43:01 +0200753 return 0;
Petr Machatad5e85562012-04-05 15:18:38 +0200754 }
755
756 bp = malloc(sizeof(*bp));
Petr Machata3fd099b2012-04-03 02:25:42 +0200757 if (bp == NULL
Edgar E. Iglesiasad640472012-09-27 12:07:34 +0200758 || breakpoint_init(bp, proc, bp_addr, libsym) < 0) {
Petr Machata3fd099b2012-04-03 02:25:42 +0200759 fail:
760 free(bp);
Petr Machataef2fd272012-09-28 00:43:01 +0200761 return -1;
Petr Machata3fd099b2012-04-03 02:25:42 +0200762 }
763 if (proc_add_breakpoint(proc, bp) < 0) {
764 breakpoint_destroy(bp);
765 goto fail;
766 }
Petr Machata2b46cfc2012-02-18 11:17:29 +0100767
Petr Machatafa0c5702012-04-13 18:43:40 +0200768 if (breakpoint_turn_on(bp, proc) < 0) {
Petr Machata76dd9292012-04-03 13:02:06 +0200769 proc_remove_breakpoint(proc, bp);
770 breakpoint_destroy(bp);
771 goto fail;
772 }
773
Petr Machataef2fd272012-09-28 00:43:01 +0200774 return 0;
775}
776
777static enum callback_status
778cb_breakpoint_for_symbol(struct library_symbol *libsym, void *data)
779{
780 return breakpoint_for_symbol(libsym, data) < 0 ? CBS_FAIL : CBS_CONT;
781}
782
783static int
784proc_activate_latent_symbol(struct Process *proc,
785 struct library_symbol *libsym)
786{
787 assert(libsym->latent);
788 libsym->latent = 0;
789 return breakpoint_for_symbol(libsym, proc);
790}
791
792int
793proc_activate_delayed_symbol(struct Process *proc,
794 struct library_symbol *libsym)
795{
796 assert(libsym->delayed);
797 libsym->delayed = 0;
798 return breakpoint_for_symbol(libsym, proc);
Petr Machata2b46cfc2012-02-18 11:17:29 +0100799}
800
Petr Machataa1f76832012-09-28 00:08:00 +0200801static enum callback_status
802activate_latent_in(struct Process *proc, struct library *lib, void *data)
803{
804 struct library_exported_name *exported;
805 for (exported = data; exported != NULL; exported = exported->next) {
806 struct library_symbol *libsym = NULL;
807 while ((libsym = library_each_symbol(lib, libsym,
808 library_symbol_named_cb,
809 (void *)exported->name))
810 != NULL)
811 if (libsym->latent
812 && proc_activate_latent_symbol(proc, libsym) < 0)
813 return CBS_FAIL;
814 }
815 return CBS_CONT;
816}
817
Petr Machata2b46cfc2012-02-18 11:17:29 +0100818void
819proc_add_library(struct Process *proc, struct library *lib)
820{
821 assert(lib->next == NULL);
822 lib->next = proc->libraries;
823 proc->libraries = lib;
Petr Machata8b00d5b2012-04-06 16:05:10 +0200824 debug(DEBUG_PROCESS, "added library %s@%p (%s) to %d",
825 lib->soname, lib->base, lib->pathname, proc->pid);
Petr Machata2b46cfc2012-02-18 11:17:29 +0100826
Petr Machataef2fd272012-09-28 00:43:01 +0200827 /* Insert breakpoints for all active (non-latent) symbols. */
Petr Machata2b46cfc2012-02-18 11:17:29 +0100828 struct library_symbol *libsym = NULL;
Petr Machataef2fd272012-09-28 00:43:01 +0200829 while ((libsym = library_each_symbol(lib, libsym,
830 cb_breakpoint_for_symbol,
Petr Machata74132a42012-03-16 02:46:18 +0100831 proc)) != NULL)
Petr Machataef2fd272012-09-28 00:43:01 +0200832 fprintf(stderr, "Couldn't insert breakpoint for %s to %d: %s.",
Petr Machatacc0e1e42012-04-25 13:42:07 +0200833 libsym->name, proc->pid, strerror(errno));
Petr Machataa1f76832012-09-28 00:08:00 +0200834
835 /* Look through export list of the new library and compare it
836 * with latent symbols of all libraries (including this
837 * library itself). */
838 struct library *lib2 = NULL;
839 while ((lib2 = proc_each_library(proc, lib2, activate_latent_in,
840 lib->exported_names)) != NULL)
841 fprintf(stderr,
842 "Couldn't activate latent symbols for %s in %d: %s.",
843 libsym->name, proc->pid, strerror(errno));
Petr Machata2b46cfc2012-02-18 11:17:29 +0100844}
845
846int
847proc_remove_library(struct Process *proc, struct library *lib)
848{
849 struct library **libp;
850 for (libp = &proc->libraries; *libp != NULL; libp = &(*libp)->next)
851 if (*libp == lib) {
852 *libp = lib->next;
853 return 0;
854 }
855 return -1;
856}
857
858struct library *
859proc_each_library(struct Process *proc, struct library *it,
860 enum callback_status (*cb)(struct Process *proc,
861 struct library *lib, void *data),
862 void *data)
863{
864 if (it == NULL)
865 it = proc->libraries;
866
867 while (it != NULL) {
868 struct library *next = it->next;
869
870 switch (cb(proc, it, data)) {
Petr Machataef7fa372012-03-28 02:05:36 +0200871 case CBS_FAIL:
872 /* XXX handle me */
Petr Machata2b46cfc2012-02-18 11:17:29 +0100873 case CBS_STOP:
874 return it;
875 case CBS_CONT:
876 break;
877 }
878
879 it = next;
880 }
881
882 return NULL;
883}
Petr Machata52dbfb12012-03-29 16:38:26 +0200884
Petr Machataf7fee432012-04-19 17:00:53 +0200885static void
886check_leader(struct Process *proc)
Petr Machata52dbfb12012-03-29 16:38:26 +0200887{
Petr Machata52dbfb12012-03-29 16:38:26 +0200888 /* Only the group leader should be getting the breakpoints and
889 * thus have ->breakpoint initialized. */
Petr Machatafa0c5702012-04-13 18:43:40 +0200890 assert(proc->leader != NULL);
891 assert(proc->leader == proc);
892 assert(proc->breakpoints != NULL);
Petr Machataf7fee432012-04-19 17:00:53 +0200893}
Petr Machata52dbfb12012-03-29 16:38:26 +0200894
Petr Machataf7fee432012-04-19 17:00:53 +0200895int
896proc_add_breakpoint(struct Process *proc, struct breakpoint *bp)
897{
Petr Machatafa0c5702012-04-13 18:43:40 +0200898 debug(DEBUG_FUNCTION, "proc_add_breakpoint(pid=%d, %s@%p)",
Petr Machata52dbfb12012-03-29 16:38:26 +0200899 proc->pid, breakpoint_name(bp), bp->addr);
Petr Machataf7fee432012-04-19 17:00:53 +0200900 check_leader(proc);
Petr Machata52dbfb12012-03-29 16:38:26 +0200901
Petr Machataa2416362012-04-06 02:43:34 +0200902 /* XXX We might merge bp->libsym instead of the following
Petr Machata00928202012-04-07 01:14:24 +0200903 * assert, but that's not necessary right now. Read the
904 * comment in breakpoint_for_symbol. */
Petr Machatafa0c5702012-04-13 18:43:40 +0200905 assert(dict_find_entry(proc->breakpoints, bp->addr) == NULL);
Petr Machataa2416362012-04-06 02:43:34 +0200906
Petr Machatafa0c5702012-04-13 18:43:40 +0200907 if (dict_enter(proc->breakpoints, bp->addr, bp) < 0) {
Petr Machatacc0e1e42012-04-25 13:42:07 +0200908 fprintf(stderr,
909 "couldn't enter breakpoint %s@%p to dictionary: %s\n",
910 breakpoint_name(bp), bp->addr, strerror(errno));
Petr Machata52dbfb12012-03-29 16:38:26 +0200911 return -1;
912 }
913
Petr Machata52dbfb12012-03-29 16:38:26 +0200914 return 0;
915}
916
Petr Machataf7fee432012-04-19 17:00:53 +0200917void
Petr Machata52dbfb12012-03-29 16:38:26 +0200918proc_remove_breakpoint(struct Process *proc, struct breakpoint *bp)
919{
Petr Machataf7fee432012-04-19 17:00:53 +0200920 debug(DEBUG_FUNCTION, "proc_remove_breakpoint(pid=%d, %s@%p)",
921 proc->pid, breakpoint_name(bp), bp->addr);
922 check_leader(proc);
923 struct breakpoint *removed = dict_remove(proc->breakpoints, bp->addr);
924 assert(removed == bp);
Petr Machata52dbfb12012-03-29 16:38:26 +0200925}
Petr Machatad3cc9882012-04-13 21:40:23 +0200926
927/* Dict doesn't support iteration restarts, so here's this contraption
928 * for now. XXX add restarts to dict. */
929struct each_breakpoint_data
930{
931 void *start;
932 void *end;
933 struct Process *proc;
934 enum callback_status (*cb)(struct Process *proc,
935 struct breakpoint *bp,
936 void *data);
937 void *cb_data;
938};
939
940static void
941each_breakpoint_cb(void *key, void *value, void *d)
942{
943 struct each_breakpoint_data *data = d;
944 if (data->end != NULL)
945 return;
946 if (data->start == key)
947 data->start = NULL;
948
949 if (data->start == NULL) {
950 switch (data->cb(data->proc, value, data->cb_data)) {
951 case CBS_FAIL:
952 /* XXX handle me */
953 case CBS_STOP:
954 data->end = key;
955 case CBS_CONT:
956 return;
957 }
958 }
959}
960
961void *
962proc_each_breakpoint(struct Process *proc, void *start,
963 enum callback_status (*cb)(struct Process *proc,
964 struct breakpoint *bp,
965 void *data), void *data)
966{
967 struct each_breakpoint_data dd = {
968 .start = start,
969 .proc = proc,
970 .cb = cb,
971 .cb_data = data,
972 };
973 dict_apply_to_all(proc->breakpoints, &each_breakpoint_cb, &dd);
974 return dd.end;
975}
Petr Machata165b5662012-10-27 19:23:12 +0200976
977int
978proc_find_symbol(struct Process *proc, struct library_symbol *sym,
979 struct library **retlib, struct library_symbol **retsym)
980{
981 struct library *lib = sym->lib;
982 assert(lib != NULL);
983
984 struct library *flib
985 = proc_each_library(proc, NULL, library_with_key_cb, &lib->key);
986 if (flib == NULL)
987 return -1;
988
989 struct library_symbol *fsym
990 = library_each_symbol(flib, NULL, library_symbol_named_cb,
991 (char *)sym->name);
992 if (fsym == NULL)
993 return -1;
994
995 if (retlib != NULL)
996 *retlib = flib;
997 if (retsym != NULL)
998 *retsym = fsym;
999
1000 return 0;
1001}