summaryrefslogtreecommitdiffstats
path: root/debugger.c (follow)
AgeCommit message (Collapse)AuthorFilesLines
2024-05-08Only update ncurses display on activity or keypressHEADmasterMalfurious1-1/+3
Previously, the test UI logic would constantly regenerate and print the screen's contents every iteration of the main processing loop to naively ensure that changes to the underlying system were reflected immediately. Sometimes, this would result in a screen flicker due to the rapid clearing and printing. This makes the UI a bit smarter about when refreshes occur, by monitoring activity results from the debugger and console modules in addition to user input. This should improve the screen flicker performance. This also addresses an issue selecting text on the screen, which was previously not possible due to the rapid refreshing as well. Signed-off-by: Malfurious <m@lfurio.us>
2024-05-08Parameterize architecture-specific detailsMalfurious1-10/+31
Abstract architecture details into architecture.h and add x86 constants. This is slightly complicated by the fact that 64-bit hosts can run 32-bit code, so we do still need to resolve some values dynamically. The architecture_info() function is intented to address this, and performs parameter lookups based on the current state of the guest process. Resolving values on a per-process-state basis is important due to the process model under Linux. If we fork to debug a 32-bit program, the forked process will be native 64-bit until the execve system call. And of course, the process is then free to exec anything it likes later on as well. Signed-off-by: Malfurious <m@lfurio.us>
2024-04-27Fix removal of temporary breakpoints when rapidly restarting threadMalfurious1-9/+10
This bug would occur when the debugger keeps rapidly hitting a breakpoint and restarting execution (and the breakpoint is temporary / one-time). For example, stepping over a long recursive call. It would be possible for the user to manually interrupt execution at the precise moment that the debugee was returning from a single step over the breakpoint. In this scenario, the thread would correctly remain stopped as requested, however the temporary breakpoint would incorrectly remain in the breakpoint list. The cause of this issue is that uninstall_breakpoints only considered removing temporaries if they were currently installed for use. This makes sense, as we have used the b->installed flag as a sort of check to see if we have YET installed the breakpoint (rather than "is it STILL installed?") to ensure that we don't remove it too soon. The more accurate logic here is to acctually check whether the breakpoint has EVER been installed and only then consider it for removal if it is temporary. This fixes the case in question without breaking behavior when performing an initial run single step. Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Don't spin waiting to interrupt zombie processMalfurious1-1/+1
Targets can get into this state, for example, when receiving a killing signal. Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Allow termination and exec events to propagate immediatelyMalfurious1-3/+1
Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Implement support for PTRACE_EVENT_FORK and uiMalfurious1-0/+18
Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Handle PTRACE_EVENT_EXIT to capture a final state snapshotMalfurious1-2/+12
Also, it is now possible for interrupt_all_threads to fail to stop threads in uninterruptable sleep (eg: the main thread during execve). This may happen in more general cases as well, but it is now common enough in that case to worry about. Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Detect out-of-band thread exec state changes to prevent deadlockMalfurious1-12/+41
Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Tweak SCHEDULER_DELAY for use with installing breakpointsMalfurious1-1/+6
Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Ignore breakpoints during singlestepMalfurious1-20/+13
Due to new independent thread control, it is now possible and likely that breakpoints will be installed before singlesteps are waited upon to be completed. also clean detect_breakpoint with get_breakpoint. Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Fix bug with cleaning temporary breakpointsMalfurious1-9/+10
dont remove them before initial use Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Independent thread control refactorMalfurious1-213/+199
Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Multithread version 3Malfurious1-292/+300
Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Prevent lingering traps after detachMalfurious1-0/+3
There can sometimes be a pending SIGTRAP when we resume a thread. This is usually due to interrupting a hung single-step. If this trap is hit after the debugger leaves, the original process will crash. This is a quick workaround to attempt to consume such traps ourselves before detaching. Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Handle PTRACE_EVENT_EXECMalfurious1-0/+29
Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Workaround SIGSTOP on child process startupMalfurious1-1/+2
The debugger design prefers to use PTRACE_SEIZE instead of PTRACE_ATTACH, due to the simpler thread control semantics that are available. However, to utilize the same featureset for forked processes, we can no longer use PTRACE_TRACEME to guarantee that the child becomes a tracee before it execs into the target program. Manually raising SIGSTOP to act as a synchronization point is problematic for a couple reasons: - We need to detect whether the special SIGSTOP was or was not yet encountered by the time our debugger module attaches and interrupts the thread. This complicates the dance of input controls to ensure we are at the exec (and nowhere else) when the real user takes over the controls. - The injection of an extra signal circumvents the benefits we hope to leverage by using the PTRACE_SEIZE semantics. We can no longer assume that all incoming signals are genuine. For the time being, sleep in the newly forked child for the scheduler delay period. This is not bullet-proof, but tends to allow the debugger module enough time to actually seize the thread before anything interesting happens. At this point a single dbg_cont() will cause the child to arrive and stop at the user's exec. Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24dbg_realcont for testing purposesMalfurious1-0/+19
Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24(Un)install breakpoints via specific threadMalfurious1-15/+15
We need to perform these changes with a thread ID that is known to be in ptrace stop. This is a requirement of the API even though the memory change is seen by all threads of the guest process. Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Don't drop temporary breakpoints when execution is to be restartedMalfurious1-9/+16
Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Fix capture_state edge casesMalfurious1-5/+21
Use `th->state == NULL` as an indicator that each thread's state is capturable, discard use of the `all` parameter. Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Multithread version 2Malfurious1-277/+191
Signed-off-by: Malfurious <m@lfurio.us>
2024-04-24Multithread version 1Malfurious1-179/+565
Signed-off-by: Malfurious <m@lfurio.us>
2023-07-08Initial debugger core and test UIMalfurious1-0/+282
This is vaguely competent at tracing single-threaded programs. Vi-like keybinds defined in misplays.c. Signed-off-by: Malfurious <m@lfurio.us>