362 lines
9.5 KiB
C++
362 lines
9.5 KiB
C++
/*
|
|
www.sourceforge.net/projects/dfhack
|
|
Copyright (c) 2009 Petr Mrázek (peterix), Kenneth Ferland (Impaler[WrG]), dorf
|
|
|
|
This software is provided 'as-is', without any express or implied
|
|
warranty. In no event will the authors be held liable for any
|
|
damages arising from the use of this software.
|
|
|
|
Permission is granted to anyone to use this software for any
|
|
purpose, including commercial applications, and to alter it and
|
|
redistribute it freely, subject to the following restrictions:
|
|
|
|
1. The origin of this software must not be misrepresented; you must
|
|
not claim that you wrote the original software. If you use this
|
|
software in a product, an acknowledgment in the product documentation
|
|
would be appreciated but is not required.
|
|
|
|
2. Altered source versions must be plainly marked as such, and
|
|
must not be misrepresented as being the original software.
|
|
|
|
3. This notice may not be removed or altered from any source
|
|
distribution.
|
|
*/
|
|
#include "DFCommonInternal.h"
|
|
using namespace DFHack;
|
|
|
|
class Process::Private
|
|
{
|
|
public:
|
|
Private()
|
|
{
|
|
my_datamodel = NULL;
|
|
my_descriptor = NULL;
|
|
my_handle = NULL;
|
|
my_pid = 0;
|
|
attached = false;
|
|
suspended = false;
|
|
};
|
|
~Private(){};
|
|
DataModel* my_datamodel;
|
|
memory_info * my_descriptor;
|
|
ProcessHandle my_handle;
|
|
uint32_t my_pid;
|
|
string memFile;
|
|
bool attached;
|
|
bool suspended;
|
|
bool identified;
|
|
bool validate(char * exe_file, uint32_t pid, char * mem_file, vector <memory_info> & known_versions);
|
|
};
|
|
|
|
Process::Process(uint32_t pid, vector <memory_info> & known_versions)
|
|
: d(new Private())
|
|
{
|
|
char dir_name [256];
|
|
char exe_link_name [256];
|
|
char mem_name [256];
|
|
char cwd_name [256];
|
|
char cmdline_name [256];
|
|
char target_name[1024];
|
|
int target_result;
|
|
|
|
d->identified = false;
|
|
|
|
sprintf(dir_name,"/proc/%d/", pid);
|
|
sprintf(exe_link_name,"/proc/%d/exe", pid);
|
|
sprintf(mem_name,"/proc/%d/mem", pid);
|
|
sprintf(cwd_name,"/proc/%d/cwd", pid);
|
|
sprintf(cmdline_name,"/proc/%d/cmdline", pid);
|
|
|
|
// resolve /proc/PID/exe link
|
|
target_result = readlink(exe_link_name, target_name, sizeof(target_name)-1);
|
|
if (target_result == -1)
|
|
{
|
|
return;
|
|
}
|
|
// make sure we have a null terminated string...
|
|
target_name[target_result] = 0;
|
|
|
|
// is this the regular linux DF?
|
|
if (strstr(target_name, "dwarfort.exe") != NULL)
|
|
{
|
|
// create linux process, add it to the vector
|
|
d->identified = d->validate(target_name,pid,mem_name,known_versions );
|
|
return;
|
|
}
|
|
|
|
// FIXME: this fails when the wine process isn't started from the 'current working directory'. strip path data from cmdline
|
|
// is this windows version of Df running in wine?
|
|
if(strstr(target_name, "wine-preloader")!= NULL)
|
|
{
|
|
// get working directory
|
|
target_result = readlink(cwd_name, target_name, sizeof(target_name)-1);
|
|
target_name[target_result] = 0;
|
|
|
|
// got path to executable, do the same for its name
|
|
ifstream ifs ( cmdline_name , ifstream::in );
|
|
string cmdline;
|
|
getline(ifs,cmdline);
|
|
if (cmdline.find("dwarfort-w.exe") != string::npos || cmdline.find("dwarfort.exe") != string::npos || cmdline.find("Dwarf Fortress.exe") != string::npos)
|
|
{
|
|
char exe_link[1024];
|
|
// put executable name and path together
|
|
sprintf(exe_link,"%s/%s",target_name,cmdline.c_str());
|
|
|
|
// create wine process, add it to the vector
|
|
d->identified = d->validate(exe_link,pid,mem_name,known_versions);
|
|
}
|
|
}
|
|
}
|
|
|
|
bool Process::isSuspended()
|
|
{
|
|
return d->suspended;
|
|
}
|
|
bool Process::isAttached()
|
|
{
|
|
return d->attached;
|
|
}
|
|
|
|
bool Process::isIdentified()
|
|
{
|
|
return d->identified;
|
|
}
|
|
|
|
bool Process::Private::validate(char * exe_file,uint32_t pid, char * memFile, vector <memory_info> & known_versions)
|
|
{
|
|
md5wrapper md5;
|
|
// get hash of the running DF process
|
|
string hash = md5.getHashFromFile(exe_file);
|
|
vector<memory_info>::iterator it;
|
|
|
|
// iterate over the list of memory locations
|
|
for ( it=known_versions.begin() ; it < known_versions.end(); it++ )
|
|
{
|
|
if(hash == (*it).getString("md5")) // are the md5 hashes the same?
|
|
{
|
|
memory_info * m = &*it;
|
|
Process * ret;
|
|
//cout <<"Found process " << PH << ". It's DF version " << m->getVersion() << "." << endl;
|
|
|
|
// df can run under wine on Linux
|
|
if(memory_info::OS_WINDOWS == (*it).getOS())
|
|
{
|
|
my_datamodel =new DMWindows40d();
|
|
my_descriptor = m;
|
|
my_handle = my_pid = pid;
|
|
}
|
|
else if (memory_info::OS_LINUX == (*it).getOS())
|
|
{
|
|
my_datamodel =new DMLinux40d();
|
|
my_descriptor = m;
|
|
my_handle = my_pid = pid;
|
|
}
|
|
else
|
|
{
|
|
// some error happened, continue with next process
|
|
continue;
|
|
}
|
|
// tell Process about the /proc/PID/mem file
|
|
this->memFile = memFile;
|
|
identified = true;
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
Process::~Process()
|
|
{
|
|
if(d->attached)
|
|
{
|
|
detach();
|
|
}
|
|
// destroy data model. this is assigned by processmanager
|
|
delete d->my_datamodel;
|
|
delete d;
|
|
}
|
|
|
|
|
|
DataModel *Process::getDataModel()
|
|
{
|
|
return d->my_datamodel;
|
|
}
|
|
|
|
memory_info * Process::getDescriptor()
|
|
{
|
|
return d->my_descriptor;
|
|
}
|
|
|
|
//FIXME: implement
|
|
bool Process::getThreadIDs(vector<uint32_t> & threads )
|
|
{
|
|
return false;
|
|
}
|
|
|
|
//FIXME: cross-reference with ELF segment entries?
|
|
void Process::getMemRanges( vector<t_memrange> & ranges )
|
|
{
|
|
char buffer[1024];
|
|
char name[1024];
|
|
char permissions[5]; // r/-, w/-, x/-, p/s, 0
|
|
|
|
sprintf(buffer, "/proc/%lu/maps", d->my_pid);
|
|
FILE *mapFile = ::fopen(buffer, "r");
|
|
uint64_t begin, end, offset, device1, device2, node;
|
|
|
|
while (fgets(buffer, 1024, mapFile))
|
|
{
|
|
t_memrange temp;
|
|
temp.name[0] = 0;
|
|
sscanf(buffer, "%llx-%llx %s %llx %2llu:%2llu %llu %s",
|
|
&temp.start,
|
|
&temp.end,
|
|
(char*)&permissions,
|
|
&offset, &device1, &device2, &node,
|
|
(char*)&temp.name);
|
|
temp.read = permissions[0] == 'r';
|
|
temp.write = permissions[1] == 'w';
|
|
temp.execute = permissions[2] == 'x';
|
|
ranges.push_back(temp);
|
|
}
|
|
}
|
|
|
|
bool Process::suspend()
|
|
{
|
|
int status;
|
|
if(!d->attached)
|
|
return false;
|
|
if(d->suspended)
|
|
return true;
|
|
if (kill(d->my_handle, SIGSTOP) == -1)
|
|
{
|
|
// no, we got an error
|
|
perror("kill SIGSTOP error");
|
|
return false;
|
|
}
|
|
while(true)
|
|
{
|
|
// we wait on the pid
|
|
pid_t w = waitpid(d->my_handle, &status, 0);
|
|
if (w == -1)
|
|
{
|
|
// child died
|
|
perror("DF exited during suspend call");
|
|
return false;
|
|
}
|
|
// stopped -> let's continue
|
|
if (WIFSTOPPED(status))
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
d->suspended = true;
|
|
}
|
|
|
|
bool Process::forceresume()
|
|
{
|
|
return resume();
|
|
}
|
|
|
|
bool Process::resume()
|
|
{
|
|
int status;
|
|
if(!d->attached)
|
|
return false;
|
|
if(!d->suspended)
|
|
return true;
|
|
if (ptrace(PTRACE_CONT, d->my_handle, NULL, NULL) == -1)
|
|
{
|
|
// no, we got an error
|
|
perror("ptrace resume error");
|
|
return false;
|
|
}
|
|
d->suspended = false;
|
|
}
|
|
|
|
|
|
bool Process::attach()
|
|
{
|
|
int status;
|
|
if(g_pProcess != NULL)
|
|
{
|
|
return false;
|
|
}
|
|
// can we attach?
|
|
if (ptrace(PTRACE_ATTACH , d->my_handle, NULL, NULL) == -1)
|
|
{
|
|
// no, we got an error
|
|
perror("ptrace attach error");
|
|
cerr << "attach failed on pid " << d->my_handle << endl;
|
|
return false;
|
|
}
|
|
while(true)
|
|
{
|
|
// we wait on the pid
|
|
pid_t w = waitpid(d->my_handle, &status, 0);
|
|
if (w == -1)
|
|
{
|
|
// child died
|
|
perror("wait inside attach()");
|
|
return false;
|
|
}
|
|
// stopped -> let's continue
|
|
if (WIFSTOPPED(status))
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
d->suspended = true;
|
|
|
|
int proc_pid_mem = open(d->memFile.c_str(),O_RDONLY);
|
|
if(proc_pid_mem == -1)
|
|
{
|
|
ptrace(PTRACE_DETACH, d->my_handle, NULL, NULL);
|
|
cerr << "couldn't open /proc/" << d->my_handle << "/mem" << endl;
|
|
perror("open(memFile.c_str(),O_RDONLY)");
|
|
return false;
|
|
}
|
|
else
|
|
{
|
|
d->attached = true;
|
|
g_pProcess = this;
|
|
g_ProcessHandle = d->my_handle;
|
|
|
|
g_ProcessMemFile = proc_pid_mem;
|
|
return true; // we are attached
|
|
}
|
|
}
|
|
|
|
bool Process::detach()
|
|
{
|
|
if(!d->attached) return false;
|
|
if(!d->suspended) suspend();
|
|
int result = 0;
|
|
// close /proc/PID/mem
|
|
result = close(g_ProcessMemFile);
|
|
if(result == -1)
|
|
{
|
|
cerr << "couldn't close /proc/"<< d->my_handle <<"/mem" << endl;
|
|
perror("mem file close");
|
|
return false;
|
|
}
|
|
else
|
|
{
|
|
// detach
|
|
g_ProcessMemFile = -1;
|
|
result = ptrace(PTRACE_DETACH, d->my_handle, NULL, NULL);
|
|
if(result == -1)
|
|
{
|
|
cerr << "couldn't detach from process pid" << d->my_handle << endl;
|
|
perror("ptrace detach");
|
|
return false;
|
|
}
|
|
else
|
|
{
|
|
d->attached = false;
|
|
g_pProcess = NULL;
|
|
g_ProcessHandle = 0;
|
|
return true;
|
|
}
|
|
}
|
|
} |