blob: 238e215d0003c96138d3553ee41016818ee4bea7 [file] [log] [blame]
Luca Clementi327064b2013-07-23 00:11:35 -07001/*
2 * Copyright (c) 2013 Luca Clementi <luca.clementi@gmail.com>
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
12 * 3. The name of the author may not be used to endorse or promote products
13 * derived from this software without specific prior written permission.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25 */
26
27#include "defs.h"
28#include <limits.h>
29#include <libunwind-ptrace.h>
30
Dmitry V. Levinc903c822014-06-05 15:12:42 +000031#ifdef _LARGEFILE64_SOURCE
32# ifdef HAVE_FOPEN64
33# define fopen_for_input fopen64
34# else
35# define fopen_for_input fopen
36# endif
37#else
38# define fopen_for_input fopen
39#endif
40
Dmitry V. Levin6c8ef052015-05-25 22:51:19 +000041#define DPRINTF(F, A, ...) if (debug_flag) error_msg("[unwind(" A ")] " F, __VA_ARGS__)
Masatake YAMATO4e121e52014-04-16 15:33:05 +090042
Luca Clementi327064b2013-07-23 00:11:35 -070043/*
44 * Кeep a sorted array of cache entries,
45 * so that we can binary search through it.
46 */
47struct mmap_cache_t {
48 /**
49 * example entry:
Dmitry V. Levin9a349c72014-06-12 18:01:45 +040050 * 7fabbb09b000-7fabbb09f000 r-xp 00179000 fc:00 1180246 /lib/libc-2.11.1.so
Luca Clementi327064b2013-07-23 00:11:35 -070051 *
52 * start_addr is 0x7fabbb09b000
53 * end_addr is 0x7fabbb09f000
54 * mmap_offset is 0x179000
55 * binary_filename is "/lib/libc-2.11.1.so"
56 */
57 unsigned long start_addr;
58 unsigned long end_addr;
59 unsigned long mmap_offset;
Dmitry V. Levin806539c2014-06-05 22:37:09 +000060 char *binary_filename;
Luca Clementi327064b2013-07-23 00:11:35 -070061};
62
Masatake YAMATO2d534da2014-04-16 15:33:04 +090063/*
64 * Type used in stacktrace walker
65 */
66typedef void (*call_action_fn)(void *data,
Dmitry V. Levin806539c2014-06-05 22:37:09 +000067 const char *binary_filename,
68 const char *symbol_name,
Dmitry V. Levin65557112014-06-05 21:44:40 +000069 unw_word_t function_offset,
Masatake YAMATO2d534da2014-04-16 15:33:04 +090070 unsigned long true_offset);
71typedef void (*error_action_fn)(void *data,
72 const char *error,
73 unsigned long true_offset);
74
Masatake YAMATOf8e39d72014-04-16 15:33:06 +090075/*
76 * Type used in stacktrace capturing
77 */
78struct call_t {
79 struct call_t* next;
80 char *output_line;
81};
82
83struct queue_t {
84 struct call_t *tail;
85 struct call_t *head;
86};
Masatake YAMATO9bc65612014-04-16 15:33:07 +090087
Masatake YAMATOf8e39d72014-04-16 15:33:06 +090088static void queue_print(struct queue_t *queue);
Masatake YAMATO9bc65612014-04-16 15:33:07 +090089static void delete_mmap_cache(struct tcb *tcp, const char *caller);
Masatake YAMATO2d534da2014-04-16 15:33:04 +090090
Luca Clementi327064b2013-07-23 00:11:35 -070091static unw_addr_space_t libunwind_as;
Masatake YAMATO9bc65612014-04-16 15:33:07 +090092static unsigned int mmap_cache_generation;
Luca Clementi327064b2013-07-23 00:11:35 -070093
94void
Masatake YAMATO61413922014-04-16 15:33:02 +090095unwind_init(void)
Luca Clementi327064b2013-07-23 00:11:35 -070096{
97 libunwind_as = unw_create_addr_space(&_UPT_accessors, 0);
98 if (!libunwind_as)
99 error_msg_and_die("failed to create address space for stack tracing");
Masatake YAMATOa0b4ee72014-04-16 15:33:10 +0900100 unw_set_caching_policy(libunwind_as, UNW_CACHE_GLOBAL);
Luca Clementi327064b2013-07-23 00:11:35 -0700101}
102
103void
Masatake YAMATO61413922014-04-16 15:33:02 +0900104unwind_tcb_init(struct tcb *tcp)
Luca Clementi327064b2013-07-23 00:11:35 -0700105{
106 tcp->libunwind_ui = _UPT_create(tcp->pid);
107 if (!tcp->libunwind_ui)
108 die_out_of_memory();
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900109
Dmitry V. Levin3e9d71f2015-05-25 20:41:02 +0000110 tcp->queue = xmalloc(sizeof(*tcp->queue));
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900111 tcp->queue->head = NULL;
112 tcp->queue->tail = NULL;
Luca Clementi327064b2013-07-23 00:11:35 -0700113}
114
115void
Masatake YAMATO61413922014-04-16 15:33:02 +0900116unwind_tcb_fin(struct tcb *tcp)
Luca Clementi327064b2013-07-23 00:11:35 -0700117{
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900118 queue_print(tcp->queue);
119 free(tcp->queue);
120 tcp->queue = NULL;
121
Masatake YAMATO9bc65612014-04-16 15:33:07 +0900122 delete_mmap_cache(tcp, __FUNCTION__);
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900123
Luca Clementi327064b2013-07-23 00:11:35 -0700124 _UPT_destroy(tcp->libunwind_ui);
125 tcp->libunwind_ui = NULL;
126}
127
128/*
129 * caching of /proc/ID/maps for each process to speed up stack tracing
130 *
Dmitry V. Levin9a349c72014-06-12 18:01:45 +0400131 * The cache must be refreshed after syscalls that affect memory mappings,
132 * e.g. mmap, mprotect, munmap, execve.
Luca Clementi327064b2013-07-23 00:11:35 -0700133 */
Masatake YAMATOb65042f2014-04-16 15:33:00 +0900134static void
Masatake YAMATO9bc65612014-04-16 15:33:07 +0900135build_mmap_cache(struct tcb* tcp)
Luca Clementi327064b2013-07-23 00:11:35 -0700136{
Dmitry V. Levin9a349c72014-06-12 18:01:45 +0400137 FILE *fp;
138 struct mmap_cache_t *cache_head;
Luca Clementi327064b2013-07-23 00:11:35 -0700139 /* start with a small dynamically-allocated array and then expand it */
140 size_t cur_array_size = 10;
Dmitry V. Levin9a349c72014-06-12 18:01:45 +0400141 char filename[sizeof("/proc/4294967296/maps")];
142 char buffer[PATH_MAX + 80];
Luca Clementi327064b2013-07-23 00:11:35 -0700143
Dmitry V. Levin9a349c72014-06-12 18:01:45 +0400144 unw_flush_cache(libunwind_as, 0, 0);
Masatake YAMATOa0b4ee72014-04-16 15:33:10 +0900145
Dmitry V. Levin9a349c72014-06-12 18:01:45 +0400146 sprintf(filename, "/proc/%u/maps", tcp->pid);
Dmitry V. Levinc903c822014-06-05 15:12:42 +0000147 fp = fopen_for_input(filename, "r");
Luca Clementi327064b2013-07-23 00:11:35 -0700148 if (!fp) {
149 perror_msg("fopen: %s", filename);
150 return;
151 }
152
Dmitry V. Levin3e9d71f2015-05-25 20:41:02 +0000153 cache_head = xcalloc(cur_array_size, sizeof(*cache_head));
Luca Clementi327064b2013-07-23 00:11:35 -0700154
155 while (fgets(buffer, sizeof(buffer), fp) != NULL) {
Dmitry V. Levin9a349c72014-06-12 18:01:45 +0400156 struct mmap_cache_t *entry;
157 unsigned long start_addr, end_addr, mmap_offset;
Dmitry V. Levin73741d22014-06-13 18:50:24 +0400158 char exec_bit;
Dmitry V. Levin9a349c72014-06-12 18:01:45 +0400159 char binary_path[PATH_MAX];
Luca Clementi327064b2013-07-23 00:11:35 -0700160
Dmitry V. Levin9a349c72014-06-12 18:01:45 +0400161 if (sscanf(buffer, "%lx-%lx %*c%*c%c%*c %lx %*x:%*x %*d %[^\n]",
Dmitry V. Levin73741d22014-06-13 18:50:24 +0400162 &start_addr, &end_addr, &exec_bit,
163 &mmap_offset, binary_path) != 5)
164 continue;
165
166 /* ignore mappings that have no PROT_EXEC bit set */
167 if (exec_bit != 'x')
Luca Clementi327064b2013-07-23 00:11:35 -0700168 continue;
Dmitry V. Levin9a349c72014-06-12 18:01:45 +0400169
170 if (end_addr < start_addr) {
171 error_msg("%s: unrecognized file format", filename);
172 break;
Luca Clementi327064b2013-07-23 00:11:35 -0700173 }
174
Luca Clementi327064b2013-07-23 00:11:35 -0700175 /*
176 * sanity check to make sure that we're storing
177 * non-overlapping regions in ascending order
178 */
179 if (tcp->mmap_cache_size > 0) {
Dmitry V. Levin9a349c72014-06-12 18:01:45 +0400180 entry = &cache_head[tcp->mmap_cache_size - 1];
Dmitry V. Levin9a349c72014-06-12 18:01:45 +0400181 if (entry->start_addr == start_addr &&
182 entry->end_addr == end_addr) {
183 /* duplicate entry, e.g. [vsyscall] */
184 continue;
185 }
186 if (start_addr <= entry->start_addr ||
187 start_addr < entry->end_addr) {
188 error_msg("%s: overlapping memory region",
189 filename);
190 continue;
191 }
192 }
193
Luca Clementi327064b2013-07-23 00:11:35 -0700194 if (tcp->mmap_cache_size >= cur_array_size) {
195 cur_array_size *= 2;
Dmitry V. Levin3e9d71f2015-05-25 20:41:02 +0000196 cache_head = xreallocarray(cache_head, cur_array_size,
197 sizeof(*cache_head));
Luca Clementi327064b2013-07-23 00:11:35 -0700198 }
Dmitry V. Levin9a349c72014-06-12 18:01:45 +0400199
200 entry = &cache_head[tcp->mmap_cache_size];
201 entry->start_addr = start_addr;
202 entry->end_addr = end_addr;
203 entry->mmap_offset = mmap_offset;
Dmitry V. Levin3e9d71f2015-05-25 20:41:02 +0000204 entry->binary_filename = xstrdup(binary_path);
Dmitry V. Levin9a349c72014-06-12 18:01:45 +0400205 tcp->mmap_cache_size++;
Luca Clementi327064b2013-07-23 00:11:35 -0700206 }
207 fclose(fp);
208 tcp->mmap_cache = cache_head;
Masatake YAMATO9bc65612014-04-16 15:33:07 +0900209 tcp->mmap_cache_generation = mmap_cache_generation;
210
211 DPRINTF("tgen=%u, ggen=%u, tcp=%p, cache=%p",
212 "cache-build",
213 tcp->mmap_cache_generation,
214 mmap_cache_generation,
215 tcp, tcp->mmap_cache);
Luca Clementi327064b2013-07-23 00:11:35 -0700216}
217
218/* deleting the cache */
Masatake YAMATO9bc65612014-04-16 15:33:07 +0900219static void
220delete_mmap_cache(struct tcb *tcp, const char *caller)
Luca Clementi327064b2013-07-23 00:11:35 -0700221{
222 unsigned int i;
Masatake YAMATO9bc65612014-04-16 15:33:07 +0900223
224 DPRINTF("tgen=%u, ggen=%u, tcp=%p, cache=%p, caller=%s",
225 "cache-delete",
226 tcp->mmap_cache_generation,
227 mmap_cache_generation,
228 tcp, tcp->mmap_cache, caller);
229
Luca Clementi327064b2013-07-23 00:11:35 -0700230 for (i = 0; i < tcp->mmap_cache_size; i++) {
231 free(tcp->mmap_cache[i].binary_filename);
232 tcp->mmap_cache[i].binary_filename = NULL;
233 }
234 free(tcp->mmap_cache);
235 tcp->mmap_cache = NULL;
236 tcp->mmap_cache_size = 0;
237}
238
Masatake YAMATO9bc65612014-04-16 15:33:07 +0900239static bool
240rebuild_cache_if_invalid(struct tcb *tcp, const char *caller)
241{
242 if ((tcp->mmap_cache_generation != mmap_cache_generation)
243 && tcp->mmap_cache)
244 delete_mmap_cache(tcp, caller);
245
246 if (!tcp->mmap_cache)
247 build_mmap_cache(tcp);
248
249 if (!tcp->mmap_cache || !tcp->mmap_cache_size)
250 return false;
251 else
252 return true;
253}
254
255void
256unwind_cache_invalidate(struct tcb* tcp)
257{
Luca Clementif1d73112014-06-09 22:05:38 -0700258#if SUPPORTED_PERSONALITIES > 1
259 if (tcp->currpers != DEFAULT_PERSONALITY) {
260 /* disable strack trace */
261 return;
262 }
263#endif
Masatake YAMATO9bc65612014-04-16 15:33:07 +0900264 mmap_cache_generation++;
265 DPRINTF("tgen=%u, ggen=%u, tcp=%p, cache=%p", "increment",
266 tcp->mmap_cache_generation,
267 mmap_cache_generation,
268 tcp,
269 tcp->mmap_cache);
270}
271
Dmitry V. Levin52840ed2014-06-05 22:28:57 +0000272static void
273get_symbol_name(unw_cursor_t *cursor, char **name,
274 size_t *size, unw_word_t *offset)
275{
276 for (;;) {
277 int rc = unw_get_proc_name(cursor, *name, *size, offset);
278 if (rc == 0)
279 break;
280 if (rc != -UNW_ENOMEM) {
281 **name = '\0';
282 *offset = 0;
283 break;
284 }
Dmitry V. Levin3e9d71f2015-05-25 20:41:02 +0000285 *name = xreallocarray(*name, 2, *size);
Dmitry V. Levin52840ed2014-06-05 22:28:57 +0000286 *size *= 2;
Dmitry V. Levin52840ed2014-06-05 22:28:57 +0000287 }
288}
289
290static int
291print_stack_frame(struct tcb *tcp,
292 call_action_fn call_action,
293 error_action_fn error_action,
294 void *data,
295 unw_cursor_t *cursor,
296 char **symbol_name,
297 size_t *symbol_name_size)
298{
299 unw_word_t ip;
300 int lower = 0;
301 int upper = (int) tcp->mmap_cache_size - 1;
302
303 if (unw_get_reg(cursor, UNW_REG_IP, &ip) < 0) {
304 perror_msg("Can't walk the stack of process %d", tcp->pid);
305 return -1;
306 }
307
308 while (lower <= upper) {
309 struct mmap_cache_t *cur_mmap_cache;
310 int mid = (upper + lower) / 2;
311
312 cur_mmap_cache = &tcp->mmap_cache[mid];
313
314 if (ip >= cur_mmap_cache->start_addr &&
315 ip < cur_mmap_cache->end_addr) {
316 unsigned long true_offset;
317 unw_word_t function_offset;
318
319 get_symbol_name(cursor, symbol_name, symbol_name_size,
320 &function_offset);
321 true_offset = ip - cur_mmap_cache->start_addr +
322 cur_mmap_cache->mmap_offset;
323 call_action(data,
324 cur_mmap_cache->binary_filename,
325 *symbol_name,
326 function_offset,
327 true_offset);
328 return 0;
329 }
330 else if (ip < cur_mmap_cache->start_addr)
331 upper = mid - 1;
332 else
333 lower = mid + 1;
334 }
335
336 /*
337 * there is a bug in libunwind >= 1.0
338 * after a set_tid_address syscall
339 * unw_get_reg returns IP == 0
340 */
341 if(ip)
342 error_action(data, "unexpected_backtracing_error", ip);
343 return -1;
344}
345
Masatake YAMATO2d534da2014-04-16 15:33:04 +0900346/*
347 * walking the stack
348 */
349static void
350stacktrace_walk(struct tcb *tcp,
351 call_action_fn call_action,
352 error_action_fn error_action,
353 void *data)
Luca Clementi327064b2013-07-23 00:11:35 -0700354{
Dmitry V. Levin52840ed2014-06-05 22:28:57 +0000355 char *symbol_name;
Luca Clementi327064b2013-07-23 00:11:35 -0700356 size_t symbol_name_size = 40;
Dmitry V. Levin52840ed2014-06-05 22:28:57 +0000357 unw_cursor_t cursor;
358 int stack_depth;
Luca Clementi327064b2013-07-23 00:11:35 -0700359
360 if (!tcp->mmap_cache)
Masatake YAMATO9bc65612014-04-16 15:33:07 +0900361 error_msg_and_die("bug: mmap_cache is NULL");
362 if (tcp->mmap_cache_size == 0)
363 error_msg_and_die("bug: mmap_cache is empty");
Luca Clementi327064b2013-07-23 00:11:35 -0700364
Dmitry V. Levin3e9d71f2015-05-25 20:41:02 +0000365 symbol_name = xmalloc(symbol_name_size);
Luca Clementi327064b2013-07-23 00:11:35 -0700366
367 if (unw_init_remote(&cursor, libunwind_as, tcp->libunwind_ui) < 0)
368 perror_msg_and_die("Can't initiate libunwind");
369
Dmitry V. Levin52840ed2014-06-05 22:28:57 +0000370 for (stack_depth = 0; stack_depth < 256; ++stack_depth) {
371 if (print_stack_frame(tcp, call_action, error_action, data,
372 &cursor, &symbol_name, &symbol_name_size) < 0)
Luca Clementi327064b2013-07-23 00:11:35 -0700373 break;
Dmitry V. Levin52840ed2014-06-05 22:28:57 +0000374 if (unw_step(&cursor) <= 0)
Luca Clementi327064b2013-07-23 00:11:35 -0700375 break;
Dmitry V. Levin52840ed2014-06-05 22:28:57 +0000376 }
377 if (stack_depth >= 256)
378 error_action(data, "too many stack frames", 0);
379
Luca Clementi327064b2013-07-23 00:11:35 -0700380 free(symbol_name);
381}
Masatake YAMATO2d534da2014-04-16 15:33:04 +0900382
383/*
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900384 * printing an entry in stack to stream or buffer
Masatake YAMATO2d534da2014-04-16 15:33:04 +0900385 */
386/*
387 * we want to keep the format used by backtrace_symbols from the glibc
388 *
389 * ./a.out() [0x40063d]
390 * ./a.out() [0x4006bb]
391 * ./a.out() [0x4006c6]
392 * /lib64/libc.so.6(__libc_start_main+0xed) [0x7fa2f8a5976d]
393 * ./a.out() [0x400569]
394 */
395#define STACK_ENTRY_SYMBOL_FMT \
396 " > %s(%s+0x%lx) [0x%lx]\n", \
397 binary_filename, \
398 symbol_name, \
Dmitry V. Levin65557112014-06-05 21:44:40 +0000399 (unsigned long) function_offset, \
Masatake YAMATO2d534da2014-04-16 15:33:04 +0900400 true_offset
401#define STACK_ENTRY_NOSYMBOL_FMT \
402 " > %s() [0x%lx]\n", \
403 binary_filename, true_offset
404#define STACK_ENTRY_BUG_FMT \
405 " > BUG IN %s\n"
406#define STACK_ENTRY_ERROR_WITH_OFFSET_FMT \
407 " > %s [0x%lx]\n", error, true_offset
408#define STACK_ENTRY_ERROR_FMT \
409 " > %s\n", error
410
411static void
412print_call_cb(void *dummy,
Dmitry V. Levin806539c2014-06-05 22:37:09 +0000413 const char *binary_filename,
414 const char *symbol_name,
Dmitry V. Levin65557112014-06-05 21:44:40 +0000415 unw_word_t function_offset,
Masatake YAMATO2d534da2014-04-16 15:33:04 +0900416 unsigned long true_offset)
417{
Thomas De Schampheleire22deda32014-11-06 13:59:04 +0100418 if (symbol_name && (symbol_name[0] != '\0'))
Masatake YAMATO2d534da2014-04-16 15:33:04 +0900419 tprintf(STACK_ENTRY_SYMBOL_FMT);
420 else if (binary_filename)
421 tprintf(STACK_ENTRY_NOSYMBOL_FMT);
422 else
423 tprintf(STACK_ENTRY_BUG_FMT, __FUNCTION__);
424
425 line_ended();
426}
427
428static void
429print_error_cb(void *dummy,
430 const char *error,
431 unsigned long true_offset)
432{
433 if (true_offset)
434 tprintf(STACK_ENTRY_ERROR_WITH_OFFSET_FMT);
435 else
436 tprintf(STACK_ENTRY_ERROR_FMT);
437
438 line_ended();
439}
440
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900441static char *
Dmitry V. Levin806539c2014-06-05 22:37:09 +0000442sprint_call_or_error(const char *binary_filename,
443 const char *symbol_name,
Dmitry V. Levin65557112014-06-05 21:44:40 +0000444 unw_word_t function_offset,
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900445 unsigned long true_offset,
446 const char *error)
447{
448 char *output_line = NULL;
449 int n;
450
451 if (symbol_name)
452 n = asprintf(&output_line, STACK_ENTRY_SYMBOL_FMT);
453 else if (binary_filename)
454 n = asprintf(&output_line, STACK_ENTRY_NOSYMBOL_FMT);
455 else if (error)
456 n = true_offset
457 ? asprintf(&output_line, STACK_ENTRY_ERROR_WITH_OFFSET_FMT)
458 : asprintf(&output_line, STACK_ENTRY_ERROR_FMT);
459 else
460 n = asprintf(&output_line, STACK_ENTRY_BUG_FMT, __FUNCTION__);
461
462 if (n < 0)
463 error_msg_and_die("error in asprintf");
464
465 return output_line;
466}
467
468/*
469 * queue manipulators
470 */
471static void
472queue_put(struct queue_t *queue,
Dmitry V. Levin806539c2014-06-05 22:37:09 +0000473 const char *binary_filename,
474 const char *symbol_name,
Dmitry V. Levin65557112014-06-05 21:44:40 +0000475 unw_word_t function_offset,
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900476 unsigned long true_offset,
477 const char *error)
478{
479 struct call_t *call;
480
Dmitry V. Levin3e9d71f2015-05-25 20:41:02 +0000481 call = xmalloc(sizeof(*call));
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900482 call->output_line = sprint_call_or_error(binary_filename,
483 symbol_name,
Dmitry V. Levin65557112014-06-05 21:44:40 +0000484 function_offset,
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900485 true_offset,
486 error);
487 call->next = NULL;
488
489 if (!queue->head) {
490 queue->head = call;
491 queue->tail = call;
492 } else {
493 queue->tail->next = call;
494 queue->tail = call;
495 }
496}
497
498static void
499queue_put_call(void *queue,
Dmitry V. Levin806539c2014-06-05 22:37:09 +0000500 const char *binary_filename,
501 const char *symbol_name,
Dmitry V. Levin65557112014-06-05 21:44:40 +0000502 unw_word_t function_offset,
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900503 unsigned long true_offset)
504{
505 queue_put(queue,
506 binary_filename,
507 symbol_name,
Dmitry V. Levin65557112014-06-05 21:44:40 +0000508 function_offset,
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900509 true_offset,
510 NULL);
511}
512
513static void
514queue_put_error(void *queue,
515 const char *error,
Dmitry V. Levine4113972014-06-05 14:37:04 +0000516 unsigned long ip)
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900517{
518 queue_put(queue, NULL, NULL, 0, ip, error);
519}
520
521static void
522queue_print(struct queue_t *queue)
523{
524 struct call_t *call, *tmp;
525
526 queue->tail = NULL;
527 call = queue->head;
528 queue->head = NULL;
529 while (call) {
530 tmp = call;
531 call = call->next;
532
533 tprints(tmp->output_line);
534 line_ended();
535
536 free(tmp->output_line);
537 tmp->output_line = NULL;
538 tmp->next = NULL;
539 free(tmp);
540 }
541}
542
Masatake YAMATO2d534da2014-04-16 15:33:04 +0900543/*
544 * printing stack
545 */
546void
547unwind_print_stacktrace(struct tcb* tcp)
548{
Luca Clementif1d73112014-06-09 22:05:38 -0700549#if SUPPORTED_PERSONALITIES > 1
550 if (tcp->currpers != DEFAULT_PERSONALITY) {
551 /* disable strack trace */
552 return;
553 }
554#endif
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900555 if (tcp->queue->head) {
556 DPRINTF("tcp=%p, queue=%p", "queueprint", tcp, tcp->queue->head);
557 queue_print(tcp->queue);
558 }
Masatake YAMATO9bc65612014-04-16 15:33:07 +0900559 else if (rebuild_cache_if_invalid(tcp, __FUNCTION__)) {
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900560 DPRINTF("tcp=%p, queue=%p", "stackprint", tcp, tcp->queue->head);
561 stacktrace_walk(tcp, print_call_cb, print_error_cb, NULL);
562 }
563}
564
565/*
566 * capturing stack
567 */
568void
569unwind_capture_stacktrace(struct tcb *tcp)
570{
Luca Clementif1d73112014-06-09 22:05:38 -0700571#if SUPPORTED_PERSONALITIES > 1
572 if (tcp->currpers != DEFAULT_PERSONALITY) {
573 /* disable strack trace */
574 return;
575 }
576#endif
Masatake YAMATOf8e39d72014-04-16 15:33:06 +0900577 if (tcp->queue->head)
578 error_msg_and_die("bug: unprinted entries in queue");
579
Masatake YAMATO9bc65612014-04-16 15:33:07 +0900580 if (rebuild_cache_if_invalid(tcp, __FUNCTION__)) {
581 stacktrace_walk(tcp, queue_put_call, queue_put_error,
582 tcp->queue);
583 DPRINTF("tcp=%p, queue=%p", "captured", tcp, tcp->queue->head);
584 }
Masatake YAMATO2d534da2014-04-16 15:33:04 +0900585}