Skip to content
Projects
Groups
Snippets
Help
Loading...
Sign in
Toggle navigation
C
criu
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
zhul
criu
Commits
77576c63
Commit
77576c63
authored
Oct 30, 2013
by
Pavel Emelyanov
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
parasite: Use thread_ctx in parasite_run/_trap calls
Signed-off-by:
Pavel Emelyanov
<
xemul@parallels.com
>
parent
10fb18d1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
14 additions
and
20 deletions
+14
-20
parasite-syscall.c
parasite-syscall.c
+14
-20
No files found.
parasite-syscall.c
View file @
77576c63
...
@@ -66,8 +66,7 @@ static struct vma_area *get_vma_by_ip(struct list_head *vma_area_list, unsigned
...
@@ -66,8 +66,7 @@ static struct vma_area *get_vma_by_ip(struct list_head *vma_area_list, unsigned
}
}
static
int
parasite_run
(
pid_t
pid
,
unsigned
long
ip
,
void
*
stack
,
static
int
parasite_run
(
pid_t
pid
,
unsigned
long
ip
,
void
*
stack
,
user_regs_struct_t
*
regs
,
user_regs_struct_t
*
oregs
,
user_regs_struct_t
*
regs
,
struct
thread_ctx
*
octx
)
k_rtsigset_t
*
omask
)
{
{
k_rtsigset_t
block
;
k_rtsigset_t
block
;
...
@@ -91,10 +90,10 @@ static int parasite_run(pid_t pid, unsigned long ip, void *stack,
...
@@ -91,10 +90,10 @@ static int parasite_run(pid_t pid, unsigned long ip, void *stack,
return
0
;
return
0
;
err_cont:
err_cont:
if
(
ptrace
(
PTRACE_SETREGS
,
pid
,
NULL
,
o
regs
))
if
(
ptrace
(
PTRACE_SETREGS
,
pid
,
NULL
,
&
octx
->
regs
))
pr_perror
(
"Can't restore regs for %d"
,
pid
);
pr_perror
(
"Can't restore regs for %d"
,
pid
);
err_regs:
err_regs:
if
(
ptrace
(
PTRACE_SETSIGMASK
,
pid
,
sizeof
(
k_rtsigset_t
),
o
mask
))
if
(
ptrace
(
PTRACE_SETSIGMASK
,
pid
,
sizeof
(
k_rtsigset_t
),
&
octx
->
sig
mask
))
pr_perror
(
"Can't restore sigmask for %d"
,
pid
);
pr_perror
(
"Can't restore sigmask for %d"
,
pid
);
err_sig:
err_sig:
return
-
1
;
return
-
1
;
...
@@ -103,8 +102,7 @@ err_sig:
...
@@ -103,8 +102,7 @@ err_sig:
/* we run at @regs->ip */
/* we run at @regs->ip */
static
int
parasite_trap
(
struct
parasite_ctl
*
ctl
,
pid_t
pid
,
static
int
parasite_trap
(
struct
parasite_ctl
*
ctl
,
pid_t
pid
,
user_regs_struct_t
*
regs
,
user_regs_struct_t
*
regs
,
user_regs_struct_t
*
regs_orig
,
struct
thread_ctx
*
octx
)
k_rtsigset_t
*
sigmask
)
{
{
siginfo_t
siginfo
;
siginfo_t
siginfo
;
int
status
;
int
status
;
...
@@ -150,11 +148,11 @@ static int parasite_trap(struct parasite_ctl *ctl, pid_t pid,
...
@@ -150,11 +148,11 @@ static int parasite_trap(struct parasite_ctl *ctl, pid_t pid,
ret
=
0
;
ret
=
0
;
err:
err:
if
(
ptrace
(
PTRACE_SETREGS
,
pid
,
NULL
,
regs_orig
))
{
if
(
ptrace
(
PTRACE_SETREGS
,
pid
,
NULL
,
&
octx
->
regs
))
{
pr_perror
(
"Can't restore registers (pid: %d)"
,
pid
);
pr_perror
(
"Can't restore registers (pid: %d)"
,
pid
);
ret
=
-
1
;
ret
=
-
1
;
}
}
if
(
ptrace
(
PTRACE_SETSIGMASK
,
pid
,
sizeof
(
k_rtsigset_t
),
sigmask
))
{
if
(
ptrace
(
PTRACE_SETSIGMASK
,
pid
,
sizeof
(
k_rtsigset_t
),
&
octx
->
sigmask
))
{
pr_perror
(
"Can't block signals"
);
pr_perror
(
"Can't block signals"
);
ret
=
-
1
;
ret
=
-
1
;
}
}
...
@@ -177,11 +175,9 @@ int __parasite_execute_syscall(struct parasite_ctl *ctl, user_regs_struct_t *reg
...
@@ -177,11 +175,9 @@ int __parasite_execute_syscall(struct parasite_ctl *ctl, user_regs_struct_t *reg
return
-
1
;
return
-
1
;
}
}
err
=
parasite_run
(
pid
,
ctl
->
syscall_ip
,
0
,
regs
,
err
=
parasite_run
(
pid
,
ctl
->
syscall_ip
,
0
,
regs
,
&
ctl
->
orig
);
&
ctl
->
orig
.
regs
,
&
ctl
->
orig
.
sigmask
);
if
(
!
err
)
if
(
!
err
)
err
=
parasite_trap
(
ctl
,
pid
,
regs
,
err
=
parasite_trap
(
ctl
,
pid
,
regs
,
&
ctl
->
orig
);
&
ctl
->
orig
.
regs
,
&
ctl
->
orig
.
sigmask
);
if
(
ptrace_poke_area
(
pid
,
(
void
*
)
ctl
->
code_orig
,
if
(
ptrace_poke_area
(
pid
,
(
void
*
)
ctl
->
code_orig
,
(
void
*
)
ctl
->
syscall_ip
,
sizeof
(
ctl
->
code_orig
)))
{
(
void
*
)
ctl
->
syscall_ip
,
sizeof
(
ctl
->
code_orig
)))
{
...
@@ -200,18 +196,17 @@ void *parasite_args_s(struct parasite_ctl *ctl, int args_size)
...
@@ -200,18 +196,17 @@ void *parasite_args_s(struct parasite_ctl *ctl, int args_size)
static
int
parasite_execute_trap_by_pid
(
unsigned
int
cmd
,
static
int
parasite_execute_trap_by_pid
(
unsigned
int
cmd
,
struct
parasite_ctl
*
ctl
,
pid_t
pid
,
struct
parasite_ctl
*
ctl
,
pid_t
pid
,
user_regs_struct_t
*
regs_orig
,
void
*
stack
,
void
*
stack
,
k_rtsigset_t
*
sigmask
)
struct
thread_ctx
*
octx
)
{
{
user_regs_struct_t
regs
=
*
regs_orig
;
user_regs_struct_t
regs
=
octx
->
regs
;
int
ret
;
int
ret
;
*
ctl
->
addr_cmd
=
cmd
;
*
ctl
->
addr_cmd
=
cmd
;
ret
=
parasite_run
(
pid
,
ctl
->
parasite_ip
,
stack
,
&
regs
,
regs_orig
,
sigmask
);
ret
=
parasite_run
(
pid
,
ctl
->
parasite_ip
,
stack
,
&
regs
,
octx
);
if
(
ret
==
0
)
if
(
ret
==
0
)
ret
=
parasite_trap
(
ctl
,
pid
,
&
regs
,
regs_orig
,
sigmask
);
ret
=
parasite_trap
(
ctl
,
pid
,
&
regs
,
octx
);
if
(
ret
==
0
)
if
(
ret
==
0
)
ret
=
(
int
)
REG_RES
(
regs
);
ret
=
(
int
)
REG_RES
(
regs
);
...
@@ -473,8 +468,7 @@ static int parasite_init_daemon(struct parasite_ctl *ctl)
...
@@ -473,8 +468,7 @@ static int parasite_init_daemon(struct parasite_ctl *ctl)
goto
err
;
goto
err
;
regs
=
ctl
->
orig
.
regs
;
regs
=
ctl
->
orig
.
regs
;
if
(
parasite_run
(
pid
,
ctl
->
parasite_ip
,
ctl
->
rstack
,
if
(
parasite_run
(
pid
,
ctl
->
parasite_ip
,
ctl
->
rstack
,
&
regs
,
&
ctl
->
orig
))
&
regs
,
&
ctl
->
orig
.
regs
,
&
ctl
->
orig
.
sigmask
))
goto
err
;
goto
err
;
ctl
->
tsock
=
accept_tsock
();
ctl
->
tsock
=
accept_tsock
();
...
@@ -527,7 +521,7 @@ int parasite_dump_thread_seized(struct parasite_ctl *ctl, int id,
...
@@ -527,7 +521,7 @@ int parasite_dump_thread_seized(struct parasite_ctl *ctl, int id,
}
}
ret
=
parasite_execute_trap_by_pid
(
PARASITE_CMD_DUMP_THREAD
,
ctl
,
ret
=
parasite_execute_trap_by_pid
(
PARASITE_CMD_DUMP_THREAD
,
ctl
,
pid
,
&
octx
.
regs
,
ctl
->
r_thread_stack
,
&
octx
.
sigmask
);
pid
,
ctl
->
r_thread_stack
,
&
octx
);
if
(
ret
)
{
if
(
ret
)
{
pr_err
(
"Can't init thread in parasite %d
\n
"
,
pid
);
pr_err
(
"Can't init thread in parasite %d
\n
"
,
pid
);
return
-
1
;
return
-
1
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment