2020-06-14 14:08:32 +00:00
|
|
|
/* radare - LGPL - Copyright 2008-2020 - pancake */
|
2010-03-12 18:11:43 +00:00
|
|
|
|
|
|
|
#include <r_debug.h>
|
2014-11-02 00:21:45 +00:00
|
|
|
|
2014-10-30 22:58:22 +00:00
|
|
|
// DO IT WITH SDB
|
|
|
|
|
2021-12-21 18:52:17 +00:00
|
|
|
R_API RDebugTrace *r_debug_trace_new(void) {
|
2016-05-24 20:22:15 +00:00
|
|
|
RDebugTrace *t = R_NEW0 (RDebugTrace);
|
2018-09-13 08:17:26 +00:00
|
|
|
if (!t) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2010-06-04 21:47:35 +00:00
|
|
|
t->tag = 1; // UT32_MAX;
|
2010-06-13 09:59:17 +00:00
|
|
|
t->addresses = NULL;
|
2015-09-14 00:08:31 +00:00
|
|
|
t->enabled = false;
|
2010-06-03 22:56:44 +00:00
|
|
|
t->traces = r_list_new ();
|
2016-05-24 20:22:15 +00:00
|
|
|
if (!t->traces) {
|
|
|
|
r_debug_trace_free (t);
|
|
|
|
return NULL;
|
|
|
|
}
|
2010-06-03 22:56:44 +00:00
|
|
|
t->traces->free = free;
|
2020-05-20 13:02:42 +00:00
|
|
|
t->ht = ht_pp_new0 ();
|
|
|
|
if (!t->ht) {
|
2016-05-24 20:22:15 +00:00
|
|
|
r_debug_trace_free (t);
|
|
|
|
return NULL;
|
|
|
|
}
|
2010-06-03 22:56:44 +00:00
|
|
|
return t;
|
2010-03-12 18:11:43 +00:00
|
|
|
}
|
|
|
|
|
2021-12-21 18:52:17 +00:00
|
|
|
R_API void r_debug_trace_free(RDebugTrace *trace) {
|
2018-09-13 08:17:26 +00:00
|
|
|
if (!trace) {
|
|
|
|
return;
|
|
|
|
}
|
2016-06-01 10:23:10 +00:00
|
|
|
r_list_purge (trace->traces);
|
|
|
|
free (trace->traces);
|
2020-05-20 13:02:42 +00:00
|
|
|
ht_pp_free (trace->ht);
|
2018-11-14 20:23:20 +00:00
|
|
|
R_FREE (trace);
|
2010-06-03 22:56:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: added overlap/mask support here... wtf?
|
|
|
|
// TODO: think about tagged traces
|
2021-12-21 18:52:17 +00:00
|
|
|
R_API int r_debug_trace_tag(RDebug *dbg, int tag) {
|
2010-06-03 22:56:44 +00:00
|
|
|
//if (tag>0 && tag<31) core->dbg->trace->tag = 1<<(sz-1);
|
|
|
|
return (dbg->trace->tag = (tag>0)? tag: UT32_MAX);
|
2010-03-12 18:11:43 +00:00
|
|
|
}
|
|
|
|
|
2020-07-27 04:54:33 +00:00
|
|
|
R_API bool r_debug_trace_ins_before(RDebug *dbg) {
|
|
|
|
RListIter *it, *it_tmp;
|
|
|
|
RAnalValue *val;
|
|
|
|
ut8 buf_pc[32];
|
|
|
|
|
|
|
|
// Analyze current instruction
|
|
|
|
ut64 pc = r_debug_reg_get (dbg, dbg->reg->name[R_REG_NAME_PC]);
|
|
|
|
if (!dbg->iob.read_at) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!dbg->iob.read_at (dbg->iob.io, pc, buf_pc, sizeof (buf_pc))) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
dbg->cur_op = R_NEW0 (RAnalOp);
|
|
|
|
if (!dbg->cur_op) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!r_anal_op (dbg->anal, dbg->cur_op, pc, buf_pc, sizeof (buf_pc), R_ANAL_OP_MASK_VAL)) {
|
|
|
|
r_anal_op_free (dbg->cur_op);
|
|
|
|
dbg->cur_op = NULL;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// resolve mem write address
|
|
|
|
r_list_foreach_safe (dbg->cur_op->access, it, it_tmp, val) {
|
|
|
|
switch (val->type) {
|
|
|
|
case R_ANAL_VAL_REG:
|
|
|
|
if (!(val->access & R_ANAL_ACC_W)) {
|
|
|
|
r_list_delete (dbg->cur_op->access, it);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case R_ANAL_VAL_MEM:
|
|
|
|
if (val->memref > 32) {
|
2022-06-28 00:49:42 +00:00
|
|
|
R_LOG_ERROR ("adding changes to %d bytes in memory.", val->memref);
|
2020-07-27 04:54:33 +00:00
|
|
|
r_list_delete (dbg->cur_op->access, it);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (val->access & R_ANAL_ACC_W) {
|
|
|
|
// resolve memory address
|
|
|
|
ut64 addr = 0;
|
|
|
|
addr += val->delta;
|
|
|
|
if (val->seg) {
|
|
|
|
addr += r_reg_get_value (dbg->reg, val->seg);
|
|
|
|
}
|
|
|
|
if (val->reg) {
|
|
|
|
addr += r_reg_get_value (dbg->reg, val->reg);
|
|
|
|
}
|
|
|
|
if (val->regdelta) {
|
|
|
|
int mul = val->mul ? val->mul : 1;
|
|
|
|
addr += mul * r_reg_get_value (dbg->reg, val->regdelta);
|
|
|
|
}
|
|
|
|
// resolve address into base for ins_after
|
|
|
|
val->base = addr;
|
|
|
|
} else {
|
|
|
|
r_list_delete (dbg->cur_op->access, it);
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
R_API bool r_debug_trace_ins_after(RDebug *dbg) {
|
|
|
|
RListIter *it;
|
|
|
|
RAnalValue *val;
|
|
|
|
|
|
|
|
// Add reg/mem write change
|
|
|
|
r_debug_reg_sync (dbg, R_REG_TYPE_ALL, false);
|
|
|
|
r_list_foreach (dbg->cur_op->access, it, val) {
|
|
|
|
if (!(val->access & R_ANAL_ACC_W)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (val->type) {
|
|
|
|
case R_ANAL_VAL_REG:
|
|
|
|
{
|
2021-01-19 02:41:09 +00:00
|
|
|
if (!val->reg) {
|
2022-06-28 00:49:42 +00:00
|
|
|
R_LOG_ERROR ("invalid register, unable to trace register state");
|
2021-01-19 02:41:09 +00:00
|
|
|
continue;
|
|
|
|
}
|
2020-07-27 04:54:33 +00:00
|
|
|
ut64 data = r_reg_get_value (dbg->reg, val->reg);
|
|
|
|
|
|
|
|
// add reg write
|
|
|
|
r_debug_session_add_reg_change (dbg->session, val->reg->arena, val->reg->offset, data);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case R_ANAL_VAL_MEM:
|
|
|
|
{
|
2022-03-12 01:48:37 +00:00
|
|
|
ut8 buf[32] = {0};
|
2020-07-27 04:54:33 +00:00
|
|
|
if (!dbg->iob.read_at (dbg->iob.io, val->base, buf, val->memref)) {
|
2022-06-28 00:49:42 +00:00
|
|
|
R_LOG_ERROR ("Error reading memory at 0x%"PFMT64x, val->base);
|
2020-07-27 04:54:33 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
// add mem write
|
|
|
|
size_t i;
|
|
|
|
for (i = 0; i < val->memref; i++) {
|
|
|
|
r_debug_session_add_mem_change (dbg->session, val->base + i, buf[i]);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
r_anal_op_free (dbg->cur_op);
|
|
|
|
dbg->cur_op = NULL;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
Major rework to the native debugger (esp on Linux) (#5185)
The major contribution here is completely re-worked breakpoint hit/recoil
handling. This work fixes #4907 and lays the ground work for future native
debugger improvements (multi-threading, etc).
* Give a human friendly type to enums
* Change many wait functions to return RDebugReasonType
* Better return checking (from r_debug_reg_sync, r_bp_restore)
* Optimized register synchronization
* Lots of comments and whitespace changes
* Improved inferior death detection
Handle EXIT_PID events differently than DEAD process events
* Move breakpoint/recoil handling to wait/cont/step
Rather than handing breakpoint related things inside cmd_debug.c, do that
inside the r_debug API functions. This seems like the most logical place for it
to live since it should apply to just about any platform/architecture. This
also centralizes calling into "cmd.bp" handling via the CoreBind callback.
* Track how the caller wishes to continue
It turns out that handling break point recoils is very complicated. The ptrace
API on Linux returns SIGTRAP for just about every type of operation (not just
breakpoints getting hit). Add the "recoil_mode" flag to indicate whether we are
single-stepping or continuing and whether or not we are inside the recoil.
* Proper handling for swstep=true
Since r_debug_step_soft calls r_debug_continue, it's already hitting the recoil
case there. Move the recoil handling from r_debug_step to r_debug_step_hard
only.
For the swstep=true case, special handling is required inside r_debug_recoil.
By resetting all of the breakpoints except the one we just hit, we ensure we
can step the original instruction and hit the new swstep breakpoint. Add a new
bp function called r_bp_restore_except to do this.
To make matters worse, we cannot use a BreakpointItem pointer because that
leads to a use-after-free condition. Instead, we the breakpoint address
instead.
Now breakpoints should work regardless of the swtep setting.
* Always call the recoil before continuing
Some callers of r_debug_continue might not have ever inserted any breakpoints
before. If we don't restore breakpoints before each call to the underlying
continue we won't hit them.
* Hide software step breakpoint events from the user
When a breakpoint even happens due to a software-step, hide it from the user.
They aren't really breakpoints as far as they are concerned.
* Improve process exit handling on Linux
There are three types of process exiting events on Linux:
1. PTRACE_EVENT_EXIT occurs just before a process exits. It's not possible to
prevent it from exiting, but it can be used to inspect the pre-exit state.
2. The process can exit for a variety of reasons and we can notice when we call
waitpid(2).
3. The process could die randomly on us :-/
On Windows, h->wait will return R_DEBUG_REASON_EXIT_PID, but it's more likely
on Linux to find out the process is already dead.
* Check more bits within waitpid status
We can often make a decision about what happened strictly by looking at the
status returned from waitpid. In other cases, we need to call
r_debug_handle_signals.
If we reach the end of this function without knowing what happened, consider it
an error.
2016-06-22 08:34:45 +00:00
|
|
|
/*
|
|
|
|
* something happened at the given pc that we need to trace
|
|
|
|
*/
|
2017-08-22 21:55:18 +00:00
|
|
|
R_API int r_debug_trace_pc(RDebug *dbg, ut64 pc) {
|
2010-06-04 21:47:35 +00:00
|
|
|
ut8 buf[32];
|
2017-07-24 07:42:15 +00:00
|
|
|
RAnalOp op = {0};
|
2017-09-02 20:30:47 +00:00
|
|
|
if (!dbg->iob.is_valid_offset (dbg->iob.io, pc, 0)) {
|
2022-06-28 00:49:42 +00:00
|
|
|
R_LOG_ERROR ("trace_pc: cannot read memory at 0x%"PFMT64x, pc);
|
2016-07-01 14:15:42 +00:00
|
|
|
return false;
|
|
|
|
}
|
2017-09-02 20:30:47 +00:00
|
|
|
(void)dbg->iob.read_at (dbg->iob.io, pc, buf, sizeof (buf));
|
2018-05-28 04:45:53 +00:00
|
|
|
if (r_anal_op (dbg->anal, &op, pc, buf, sizeof (buf), R_ANAL_OP_MASK_ESIL) < 1) {
|
2022-06-28 00:49:42 +00:00
|
|
|
R_LOG_ERROR ("trace_pc: cannot get opcode size at 0x%"PFMT64x, pc);
|
2016-07-01 14:15:42 +00:00
|
|
|
return false;
|
|
|
|
}
|
2020-05-13 18:51:26 +00:00
|
|
|
r_debug_trace_op (dbg, &op);
|
|
|
|
r_anal_op_fini (&op);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
R_API void r_debug_trace_op(RDebug *dbg, RAnalOp *op) {
|
|
|
|
static ut64 oldpc = UT64_MAX; // Must trace the previously traced instruction
|
2019-07-16 12:34:33 +00:00
|
|
|
if (dbg->trace->enabled) {
|
|
|
|
if (dbg->anal->esil) {
|
2020-08-22 09:07:26 +00:00
|
|
|
r_anal_esil_trace_op (dbg->anal->esil, op);
|
2019-07-16 12:34:33 +00:00
|
|
|
} else {
|
|
|
|
if (dbg->verbose) {
|
2022-06-28 00:49:42 +00:00
|
|
|
R_LOG_ERROR ("Run aeim to get dbg->anal->esil initialized");
|
2019-07-16 12:34:33 +00:00
|
|
|
}
|
2019-06-11 11:21:50 +00:00
|
|
|
}
|
2022-05-21 19:34:25 +00:00
|
|
|
if (oldpc != UT64_MAX) {
|
|
|
|
r_debug_trace_add (dbg, oldpc, op->size); //XXX review what this line really do
|
|
|
|
}
|
Major rework to the native debugger (esp on Linux) (#5185)
The major contribution here is completely re-worked breakpoint hit/recoil
handling. This work fixes #4907 and lays the ground work for future native
debugger improvements (multi-threading, etc).
* Give a human friendly type to enums
* Change many wait functions to return RDebugReasonType
* Better return checking (from r_debug_reg_sync, r_bp_restore)
* Optimized register synchronization
* Lots of comments and whitespace changes
* Improved inferior death detection
Handle EXIT_PID events differently than DEAD process events
* Move breakpoint/recoil handling to wait/cont/step
Rather than handing breakpoint related things inside cmd_debug.c, do that
inside the r_debug API functions. This seems like the most logical place for it
to live since it should apply to just about any platform/architecture. This
also centralizes calling into "cmd.bp" handling via the CoreBind callback.
* Track how the caller wishes to continue
It turns out that handling break point recoils is very complicated. The ptrace
API on Linux returns SIGTRAP for just about every type of operation (not just
breakpoints getting hit). Add the "recoil_mode" flag to indicate whether we are
single-stepping or continuing and whether or not we are inside the recoil.
* Proper handling for swstep=true
Since r_debug_step_soft calls r_debug_continue, it's already hitting the recoil
case there. Move the recoil handling from r_debug_step to r_debug_step_hard
only.
For the swstep=true case, special handling is required inside r_debug_recoil.
By resetting all of the breakpoints except the one we just hit, we ensure we
can step the original instruction and hit the new swstep breakpoint. Add a new
bp function called r_bp_restore_except to do this.
To make matters worse, we cannot use a BreakpointItem pointer because that
leads to a use-after-free condition. Instead, we the breakpoint address
instead.
Now breakpoints should work regardless of the swtep setting.
* Always call the recoil before continuing
Some callers of r_debug_continue might not have ever inserted any breakpoints
before. If we don't restore breakpoints before each call to the underlying
continue we won't hit them.
* Hide software step breakpoint events from the user
When a breakpoint even happens due to a software-step, hide it from the user.
They aren't really breakpoints as far as they are concerned.
* Improve process exit handling on Linux
There are three types of process exiting events on Linux:
1. PTRACE_EVENT_EXIT occurs just before a process exits. It's not possible to
prevent it from exiting, but it can be used to inspect the pre-exit state.
2. The process can exit for a variety of reasons and we can notice when we call
waitpid(2).
3. The process could die randomly on us :-/
On Windows, h->wait will return R_DEBUG_REASON_EXIT_PID, but it's more likely
on Linux to find out the process is already dead.
* Check more bits within waitpid status
We can often make a decision about what happened strictly by looking at the
status returned from waitpid. In other cases, we need to call
r_debug_handle_signals.
If we reach the end of this function without knowing what happened, consider it
an error.
2016-06-22 08:34:45 +00:00
|
|
|
}
|
2020-05-13 18:51:26 +00:00
|
|
|
oldpc = op->addr;
|
2010-03-12 18:11:43 +00:00
|
|
|
}
|
|
|
|
|
2010-06-13 09:59:17 +00:00
|
|
|
R_API void r_debug_trace_at(RDebug *dbg, const char *str) {
|
|
|
|
// TODO: parse offsets and so use ut64 instead of strstr()
|
|
|
|
free (dbg->trace->addresses);
|
|
|
|
dbg->trace->addresses = (str&&*str)? strdup (str): NULL;
|
|
|
|
}
|
|
|
|
|
2021-01-14 23:08:27 +00:00
|
|
|
R_API RDebugTracepoint *r_debug_trace_get(RDebug *dbg, ut64 addr) {
|
2010-06-04 21:47:35 +00:00
|
|
|
int tag = dbg->trace->tag;
|
2022-01-18 17:35:31 +00:00
|
|
|
r_strf_var (key, 64, "trace.%d.%"PFMT64x, tag, addr);
|
|
|
|
return ht_pp_find (dbg->trace->ht, key, NULL);
|
2010-03-12 18:11:43 +00:00
|
|
|
}
|
|
|
|
|
2021-01-14 23:08:27 +00:00
|
|
|
static int cmpaddr(const void *_a, const void *_b) {
|
2019-06-10 11:47:04 +00:00
|
|
|
const RListInfo *a = _a, *b = _b;
|
2019-04-28 17:30:15 +00:00
|
|
|
return (r_itv_begin (a->pitv) > r_itv_begin (b->pitv))? 1:
|
|
|
|
(r_itv_begin (a->pitv) < r_itv_begin (b->pitv))? -1: 0;
|
|
|
|
}
|
|
|
|
|
2021-01-14 23:08:27 +00:00
|
|
|
R_API void r_debug_trace_list(RDebug *dbg, int mode, ut64 offset) {
|
2010-06-04 21:47:35 +00:00
|
|
|
int tag = dbg->trace->tag;
|
2012-02-14 17:19:16 +00:00
|
|
|
RListIter *iter;
|
2019-04-28 17:30:15 +00:00
|
|
|
bool flag = false;
|
|
|
|
RList *info_list = r_list_new ();
|
|
|
|
if (!info_list && mode == '=') {
|
|
|
|
return;
|
|
|
|
}
|
2012-02-14 17:19:16 +00:00
|
|
|
RDebugTracepoint *trace;
|
|
|
|
r_list_foreach (dbg->trace->traces, iter, trace) {
|
2010-06-04 21:47:35 +00:00
|
|
|
if (!trace->tag || (tag & trace->tag)) {
|
2015-08-12 08:40:24 +00:00
|
|
|
switch (mode) {
|
2019-03-23 13:59:15 +00:00
|
|
|
case 'q':
|
|
|
|
dbg->cb_printf ("0x%"PFMT64x"\n", trace->addr);
|
|
|
|
break;
|
2019-04-28 17:30:15 +00:00
|
|
|
case '=': {
|
2019-06-10 11:47:04 +00:00
|
|
|
RListInfo *info = R_NEW0 (RListInfo);
|
2019-04-28 17:30:15 +00:00
|
|
|
if (!info) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
info->pitv = (RInterval) {trace->addr, trace->size};
|
|
|
|
info->vitv = info->pitv;
|
|
|
|
info->perm = -1;
|
|
|
|
info->name = r_str_newf ("%d", trace->times);
|
|
|
|
info->extra = r_str_newf ("%d", trace->count);
|
|
|
|
r_list_append (info_list, info);
|
|
|
|
flag = true;
|
|
|
|
} break;
|
2015-08-12 08:40:24 +00:00
|
|
|
case 1:
|
|
|
|
case '*':
|
2017-07-17 12:13:13 +00:00
|
|
|
dbg->cb_printf ("dt+ 0x%"PFMT64x" %d\n", trace->addr, trace->times);
|
2015-08-12 08:40:24 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
dbg->cb_printf ("0x%08"PFMT64x" size=%d count=%d times=%d tag=%d\n",
|
|
|
|
trace->addr, trace->size, trace->count, trace->times, trace->tag);
|
|
|
|
break;
|
|
|
|
}
|
2010-06-04 21:47:35 +00:00
|
|
|
}
|
2010-03-12 18:11:43 +00:00
|
|
|
}
|
2019-04-28 17:30:15 +00:00
|
|
|
if (flag) {
|
|
|
|
r_list_sort (info_list, cmpaddr);
|
2021-01-14 23:08:27 +00:00
|
|
|
RTable *table = r_table_new ("traces");
|
2019-09-24 08:46:06 +00:00
|
|
|
table->cons = r_cons_singleton();
|
|
|
|
RIO *io = dbg->iob.io;
|
|
|
|
r_table_visual_list (table, info_list, offset, 1,
|
|
|
|
r_cons_get_size (NULL), io->va);
|
|
|
|
io->cb_printf ("\n%s\n", r_table_tostring (table));
|
|
|
|
r_table_free (table);
|
2019-04-28 17:30:15 +00:00
|
|
|
r_list_free (info_list);
|
|
|
|
}
|
2010-03-12 18:11:43 +00:00
|
|
|
}
|
|
|
|
|
2010-06-13 09:59:17 +00:00
|
|
|
// XXX: find better name, make it public?
|
2022-05-21 19:34:25 +00:00
|
|
|
static bool r_debug_trace_is_traceable(RDebug *dbg, ut64 addr) {
|
2010-06-13 09:59:17 +00:00
|
|
|
if (dbg->trace->addresses) {
|
2015-09-14 00:08:31 +00:00
|
|
|
char addr_str[32];
|
2010-06-13 09:59:17 +00:00
|
|
|
snprintf (addr_str, sizeof (addr_str), "0x%08"PFMT64x, addr);
|
2018-09-13 08:17:26 +00:00
|
|
|
if (!strstr (dbg->trace->addresses, addr_str)) {
|
2015-09-14 00:08:31 +00:00
|
|
|
return false;
|
2018-09-13 08:17:26 +00:00
|
|
|
}
|
2010-06-13 09:59:17 +00:00
|
|
|
}
|
2015-09-14 00:08:31 +00:00
|
|
|
return true;
|
2010-06-13 09:59:17 +00:00
|
|
|
}
|
|
|
|
|
2021-12-21 18:52:17 +00:00
|
|
|
R_API RDebugTracepoint *r_debug_trace_add(RDebug *dbg, ut64 addr, int size) {
|
2010-06-13 09:59:17 +00:00
|
|
|
RDebugTracepoint *tp;
|
2010-06-04 21:47:35 +00:00
|
|
|
int tag = dbg->trace->tag;
|
2018-09-13 08:17:26 +00:00
|
|
|
if (!r_debug_trace_is_traceable (dbg, addr)) {
|
2010-06-13 09:59:17 +00:00
|
|
|
return NULL;
|
2018-09-13 08:17:26 +00:00
|
|
|
}
|
2011-02-11 10:22:43 +00:00
|
|
|
r_anal_trace_bb (dbg->anal, addr);
|
2019-06-13 10:00:05 +00:00
|
|
|
tp = R_NEW0 (RDebugTracepoint);
|
2010-06-03 22:56:44 +00:00
|
|
|
if (!tp) {
|
2019-06-13 10:00:05 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
2020-08-12 16:54:49 +00:00
|
|
|
tp->stamp = r_time_now ();
|
2019-06-13 10:00:05 +00:00
|
|
|
tp->addr = addr;
|
|
|
|
tp->tags = tag;
|
|
|
|
tp->size = size;
|
|
|
|
tp->count = ++dbg->trace->count;
|
|
|
|
tp->times = 1;
|
|
|
|
r_list_append (dbg->trace->traces, tp);
|
2022-01-18 17:35:31 +00:00
|
|
|
r_strf_var (key, 64, "trace.%d.%"PFMT64x, tag, addr);
|
|
|
|
ht_pp_update (dbg->trace->ht, key, tp);
|
2010-06-03 22:56:44 +00:00
|
|
|
return tp;
|
2010-03-12 18:11:43 +00:00
|
|
|
}
|
2010-11-24 22:19:17 +00:00
|
|
|
|
2021-12-21 18:52:17 +00:00
|
|
|
R_API void r_debug_trace_reset(RDebug *dbg) {
|
2010-11-24 22:19:17 +00:00
|
|
|
RDebugTrace *t = dbg->trace;
|
2014-05-02 14:54:27 +00:00
|
|
|
r_list_purge (t->traces);
|
2020-05-20 13:02:42 +00:00
|
|
|
ht_pp_free (t->ht);
|
|
|
|
t->ht = ht_pp_new0 ();
|
2010-11-24 22:19:17 +00:00
|
|
|
t->traces = r_list_new ();
|
|
|
|
t->traces->free = free;
|
|
|
|
}
|