Merge branch 'vendor/NCURSES'
[dragonfly.git] / sys / emulation / linux / i386 / linux_ptrace.c
1 /*
2  * Copyright (c) 2001 Alexander Kabaev
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer
10  *    in this position and unchanged.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  *    notice, this list of conditions and the following disclaimer in the
13  *    documentation and/or other materials provided with the distribution.
14  * 3. The name of the author may not be used to endorse or promote products
15  *    derived from this software without specific prior written permission.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27  *
28  * $FreeBSD: src/sys/i386/linux/linux_ptrace.c,v 1.7.4.3 2003/01/03 17:13:23 kan Exp $
29  * $DragonFly: src/sys/emulation/linux/i386/linux_ptrace.c,v 1.15 2007/02/19 01:14:23 corecode Exp $
30  */
31
32 #include "opt_cpu.h"
33
34 #include <sys/param.h>
35 #include <sys/lock.h>
36 #include <sys/proc.h>
37 #include <sys/ptrace.h>
38 #include <sys/systm.h>
39
40 #include <vm/vm.h>
41 #include <vm/pmap.h>
42 #include <vm/vm_map.h>
43 #include <sys/user.h>
44 #include <sys/reg.h>
45
46 #include <machine/md_var.h>
47 #include <machine/pcb.h>
48
49 #include "linux.h"
50 #include "linux_proto.h"
51
52 /*
53  *   Linux ptrace requests numbers. Mostly identical to FreeBSD,
54  *   except for MD ones and PT_ATTACH/PT_DETACH.
55  */
56 #define PTRACE_TRACEME          0
57 #define PTRACE_PEEKTEXT         1
58 #define PTRACE_PEEKDATA         2
59 #define PTRACE_PEEKUSR          3
60 #define PTRACE_POKETEXT         4
61 #define PTRACE_POKEDATA         5
62 #define PTRACE_POKEUSR          6
63 #define PTRACE_CONT             7
64 #define PTRACE_KILL             8
65 #define PTRACE_SINGLESTEP       9
66
67 #define PTRACE_ATTACH           16
68 #define PTRACE_DETACH           17
69
70 #define PTRACE_SYSCALL          24
71
72 #define PTRACE_GETREGS          12
73 #define PTRACE_SETREGS          13
74 #define PTRACE_GETFPREGS        14
75 #define PTRACE_SETFPREGS        15
76 #define PTRACE_GETFPXREGS       18
77 #define PTRACE_SETFPXREGS       19
78
79 #define PTRACE_SETOPTIONS       21
80
81 /*
82  * Linux keeps debug registers at the following
83  * offset in the user struct
84  */
85 #define LINUX_DBREG_OFFSET      252
86 #define LINUX_DBREG_SIZE        (8*sizeof(l_int))
87
88 static __inline__ int
89 map_signum(int signum)
90 {
91
92         if (signum > 0 && signum <= LINUX_SIGTBLSZ)
93                 signum = linux_to_bsd_signal[_SIG_IDX(signum)];
94         return ((signum == SIGSTOP)? 0 : signum);
95 }
96
97 struct linux_pt_reg {
98         l_long  ebx;
99         l_long  ecx;
100         l_long  edx;
101         l_long  esi;
102         l_long  edi;
103         l_long  ebp;
104         l_long  eax;
105         l_int   xds;
106         l_int   xes;
107         l_int   xfs;
108         l_int   xgs;
109         l_long  orig_eax;
110         l_long  eip;
111         l_int   xcs;
112         l_long  eflags;
113         l_long  esp;
114         l_int   xss;
115 };
116
117 /*
118  *   Translate i386 ptrace registers between Linux and FreeBSD formats.
119  *   The translation is pretty straighforward, for all registers, but
120  *   orig_eax on Linux side and r_trapno and r_err in FreeBSD
121  */
122 static void
123 map_regs_to_linux(struct reg *bsd_r, struct linux_pt_reg *linux_r)
124 {
125         linux_r->ebx = bsd_r->r_ebx;
126         linux_r->ecx = bsd_r->r_ecx;
127         linux_r->edx = bsd_r->r_edx;
128         linux_r->esi = bsd_r->r_esi;
129         linux_r->edi = bsd_r->r_edi;
130         linux_r->ebp = bsd_r->r_ebp;
131         linux_r->eax = bsd_r->r_eax;
132         linux_r->xds = bsd_r->r_ds;
133         linux_r->xes = bsd_r->r_es;
134         linux_r->xfs = bsd_r->r_fs;
135         linux_r->xgs = bsd_r->r_gs;
136         linux_r->orig_eax = bsd_r->r_eax;
137         linux_r->eip = bsd_r->r_eip;
138         linux_r->xcs = bsd_r->r_cs;
139         linux_r->eflags = bsd_r->r_eflags;
140         linux_r->esp = bsd_r->r_esp;
141         linux_r->xss = bsd_r->r_ss;
142 }
143
144 static void
145 map_regs_from_linux(struct reg *bsd_r, struct linux_pt_reg *linux_r)
146 {
147         bsd_r->r_ebx = linux_r->ebx;
148         bsd_r->r_ecx = linux_r->ecx;
149         bsd_r->r_edx = linux_r->edx;
150         bsd_r->r_esi = linux_r->esi;
151         bsd_r->r_edi = linux_r->edi;
152         bsd_r->r_ebp = linux_r->ebp;
153         bsd_r->r_eax = linux_r->eax;
154         bsd_r->r_ds  = linux_r->xds;
155         bsd_r->r_es  = linux_r->xes;
156         bsd_r->r_fs  = linux_r->xfs;
157         bsd_r->r_gs  = linux_r->xgs;
158         bsd_r->r_eip = linux_r->eip;
159         bsd_r->r_cs  = linux_r->xcs;
160         bsd_r->r_eflags = linux_r->eflags;
161         bsd_r->r_esp = linux_r->esp;
162         bsd_r->r_ss = linux_r->xss;
163 }
164
165 struct linux_pt_fpreg {
166         l_long cwd;
167         l_long swd;
168         l_long twd;
169         l_long fip;
170         l_long fcs;
171         l_long foo;
172         l_long fos;
173         l_long st_space[2*10];
174 };
175
176 static void
177 map_fpregs_to_linux(struct fpreg *bsd_r, struct linux_pt_fpreg *linux_r)
178 {
179         linux_r->cwd = bsd_r->fpr_env[0];
180         linux_r->swd = bsd_r->fpr_env[1];
181         linux_r->twd = bsd_r->fpr_env[2];
182         linux_r->fip = bsd_r->fpr_env[3];
183         linux_r->fcs = bsd_r->fpr_env[4];
184         linux_r->foo = bsd_r->fpr_env[5];
185         linux_r->fos = bsd_r->fpr_env[6];
186         bcopy(bsd_r->fpr_acc, linux_r->st_space, sizeof(linux_r->st_space));
187 }
188
189 static void
190 map_fpregs_from_linux(struct fpreg *bsd_r, struct linux_pt_fpreg *linux_r)
191 {
192         bsd_r->fpr_env[0] = linux_r->cwd;
193         bsd_r->fpr_env[1] = linux_r->swd;
194         bsd_r->fpr_env[2] = linux_r->twd;
195         bsd_r->fpr_env[3] = linux_r->fip;
196         bsd_r->fpr_env[4] = linux_r->fcs;
197         bsd_r->fpr_env[5] = linux_r->foo;
198         bsd_r->fpr_env[6] = linux_r->fos;
199         bcopy(bsd_r->fpr_acc, linux_r->st_space, sizeof(bsd_r->fpr_acc));
200 }
201
202 struct linux_pt_fpxreg {
203         l_ushort        cwd;
204         l_ushort        swd;
205         l_ushort        twd;
206         l_ushort        fop;
207         l_long          fip;
208         l_long          fcs;
209         l_long          foo;
210         l_long          fos;
211         l_long          mxcsr;
212         l_long          reserved;
213         l_long          st_space[32];
214         l_long          xmm_space[32];
215         l_long          padding[56];
216 };
217
218 #ifndef CPU_DISABLE_SSE
219 static int
220 linux_proc_read_fpxregs(struct lwp *lp, struct linux_pt_fpxreg *fpxregs)
221 {
222         int error;
223
224         error = 0;
225         if (cpu_fxsr == 0)
226                 error = EIO;
227         else
228                 bcopy(&lp->lwp_thread->td_pcb->pcb_save.sv_xmm,
229                     fpxregs, sizeof(*fpxregs));
230         return (error);
231 }
232
233 static int
234 linux_proc_write_fpxregs(struct lwp *lp, struct linux_pt_fpxreg *fpxregs)
235 {
236         int error;
237
238         error = 0;
239         if (cpu_fxsr == 0)
240                 error = EIO;
241         else
242                 bcopy(fpxregs, &lp->lwp_thread->td_pcb->pcb_save.sv_xmm,
243                     sizeof(*fpxregs));
244         return (error);
245 }
246 #endif
247
248 /*
249  * MPALMOSTSAFE
250  */
251 int
252 sys_linux_ptrace(struct linux_ptrace_args *uap)
253 {
254         struct thread *td = curthread;
255         struct proc *curp = td->td_proc;
256         union {
257                 struct linux_pt_reg     reg;
258                 struct linux_pt_fpreg   fpreg;
259                 struct linux_pt_fpxreg  fpxreg;
260         } r;
261         union {
262                 struct reg              bsd_reg;
263                 struct fpreg            bsd_fpreg;
264                 struct dbreg            bsd_dbreg;
265         } u;
266         void *addr;
267         pid_t pid;
268         int error, req;
269
270         error = 0;
271
272         /* by default, just copy data intact */
273         req  = uap->req;
274         pid  = (pid_t)uap->pid;
275         addr = (void *)uap->addr;
276
277         get_mplock();
278
279         switch (req) {
280         case PTRACE_TRACEME:
281         case PTRACE_POKETEXT:
282         case PTRACE_POKEDATA:
283         case PTRACE_KILL:
284                 error = kern_ptrace(curp, req, pid, addr, uap->data,
285                                     &uap->sysmsg_iresult);
286                 break;
287         case PTRACE_PEEKTEXT:
288         case PTRACE_PEEKDATA: {
289                 /* need to preserve return value, use dummy */
290                 l_int rval = 0;
291                 error = kern_ptrace(curp, req, pid, addr, 0, &rval);
292                 if (error == 0) {
293                         error = copyout(&rval, (caddr_t)uap->data, sizeof(l_int));
294                 }
295                 break;
296         }
297         case PTRACE_DETACH:
298                 error = kern_ptrace(curp, PT_DETACH, pid, (void *)1,
299                                     map_signum(uap->data),
300                                     &uap->sysmsg_iresult);
301                 break;
302         case PTRACE_SINGLESTEP:
303         case PTRACE_CONT:
304                 error = kern_ptrace(curp, req, pid, (void *)1,
305                                     map_signum(uap->data),
306                                     &uap->sysmsg_iresult);
307                 break;
308         case PTRACE_ATTACH:
309                 error = kern_ptrace(curp, PT_ATTACH, pid, addr, uap->data,
310                                     &uap->sysmsg_iresult);
311                 break;
312         case PTRACE_GETREGS:
313                 /* Linux is using data where FreeBSD is using addr */
314                 error = kern_ptrace(curp, PT_GETREGS, pid, &u.bsd_reg, 0,
315                                     &uap->sysmsg_iresult);
316                 if (error == 0) {
317                         map_regs_to_linux(&u.bsd_reg, &r.reg);
318                         error = copyout(&r.reg, (void *)uap->data,
319                                         sizeof(r.reg));
320                 }
321                 break;
322         case PTRACE_SETREGS:
323                 /* Linux is using data where FreeBSD is using addr */
324                 error = copyin((caddr_t)uap->data, &r.reg, sizeof(r.reg));
325                 if (error == 0) {
326                         map_regs_from_linux(&u.bsd_reg, &r.reg);
327                         error = kern_ptrace(curp, PT_SETREGS, pid, &u.bsd_reg,
328                                             0, &uap->sysmsg_iresult);
329                 }
330                 break;
331         case PTRACE_GETFPREGS:
332                 /* Linux is using data where FreeBSD is using addr */
333                 error = kern_ptrace(curp, PT_GETFPREGS, pid, &u.bsd_fpreg,
334                                     0, &uap->sysmsg_iresult);
335                 if (error == 0) {
336                         map_fpregs_to_linux(&u.bsd_fpreg, &r.fpreg);
337                         error = copyout(&r.fpreg, (caddr_t)uap->data,
338                             sizeof(r.fpreg));
339                 }
340                 break;
341         case PTRACE_SETFPREGS:
342                 /* Linux is using data where FreeBSD is using addr */
343                 error = copyin((caddr_t)uap->data, &r.fpreg, sizeof(r.fpreg));
344                 if (error == 0) {
345                         map_fpregs_from_linux(&u.bsd_fpreg, &r.fpreg);
346                         error = kern_ptrace(curp, PT_SETFPREGS, pid,
347                                             &u.bsd_fpreg,
348                                             0, &uap->sysmsg_iresult);
349                 }
350                 break;
351         case PTRACE_SETFPXREGS:
352 #ifndef CPU_DISABLE_SSE
353                 error = copyin((caddr_t)uap->data, &r.fpxreg,
354                     sizeof(r.fpxreg));
355                 if (error)
356                         break;
357 #endif
358                 /* FALL THROUGH */
359         case PTRACE_GETFPXREGS: {
360 #ifndef CPU_DISABLE_SSE
361                 struct proc *p;
362                 struct lwp *lp;
363
364                 if (sizeof(struct linux_pt_fpxreg) != sizeof(struct savexmm)) {
365                         static int once = 0;
366                         if (!once) {
367                                 kprintf("linux: savexmm != linux_pt_fpxreg\n");
368                                 once = 1;
369                         }
370                         error = EIO;
371                         break;
372                 }
373
374                 if ((p = pfind(uap->pid)) == NULL) {
375                         error = ESRCH;
376                         break;
377                 }
378
379                 if (!PRISON_CHECK(curp->p_ucred, p->p_ucred)) {
380                         error = ESRCH;
381                         goto fail;
382                 }
383
384                 /* System processes can't be debugged. */
385                 if ((p->p_flag & P_SYSTEM) != 0) {
386                         error = EINVAL;
387                         goto fail;
388                 }
389
390                 /* not being traced... */
391                 if ((p->p_flag & P_TRACED) == 0) {
392                         error = EPERM;
393                         goto fail;
394                 }
395
396                 /* not being traced by YOU */
397                 if (p->p_pptr != curp) {
398                         error = EBUSY;
399                         goto fail;
400                 }
401
402                 /* not currently stopped */
403                 if ((p->p_flag & (P_TRACED|P_WAITED)) == 0) {
404                         error = EBUSY;
405                         goto fail;
406                 }
407
408                 /* XXX lwp */
409                 lp = FIRST_LWP_IN_PROC(p);
410
411                 if (req == PTRACE_GETFPXREGS) {
412                         LWPHOLD(lp);
413                         error = linux_proc_read_fpxregs(lp, &r.fpxreg);
414                         LWPRELE(lp);
415                         if (error == 0)
416                                 error = copyout(&r.fpxreg, (caddr_t)uap->data,
417                                     sizeof(r.fpxreg));
418                 } else {
419                         /* clear dangerous bits exactly as Linux does*/
420                         r.fpxreg.mxcsr &= 0xffbf;
421                         LWPHOLD(lp);
422                         error = linux_proc_write_fpxregs(lp, &r.fpxreg);
423                         LWPRELE(lp);
424                 }
425                 break;
426
427         fail:
428 #else
429                 error = EIO;
430 #endif
431                 break;
432         }
433         case PTRACE_PEEKUSR:
434         case PTRACE_POKEUSR: {
435                 error = EIO;
436
437                 /* check addr for alignment */
438                 if (uap->addr < 0 || uap->addr & (sizeof(l_int) - 1))
439                         break;
440                 /*
441                  * Allow linux programs to access register values in
442                  * user struct. We simulate this through PT_GET/SETREGS
443                  * as necessary.
444                  */
445                 if (uap->addr < sizeof(struct linux_pt_reg)) {
446                         error = kern_ptrace(curp, PT_GETREGS, pid, &u.bsd_reg,
447                                             0, &uap->sysmsg_iresult);
448                         if (error != 0)
449                                 break;
450
451                         map_regs_to_linux(&u.bsd_reg, &r.reg);
452                         if (req == PTRACE_PEEKUSR) {
453                                 error = copyout((char *)&r.reg + uap->addr,
454                                     (caddr_t)uap->data, sizeof(l_int));
455                                 break;
456                         }
457
458                         *(l_int *)((char *)&r.reg + uap->addr) =
459                             (l_int)uap->data;
460
461                         map_regs_from_linux(&u.bsd_reg, &r.reg);
462                         error = kern_ptrace(curp, PT_SETREGS, pid, &u.bsd_reg,
463                                             0, &uap->sysmsg_iresult);
464                 }
465
466                 /*
467                  * Simulate debug registers access
468                  */
469                 if (uap->addr >= LINUX_DBREG_OFFSET &&
470                     uap->addr <= LINUX_DBREG_OFFSET + LINUX_DBREG_SIZE) {
471                         error = kern_ptrace(curp, PT_GETDBREGS, pid, 
472                                             &u.bsd_dbreg,
473                                             0, &uap->sysmsg_iresult);
474                         if (error != 0)
475                                 break;
476
477                         uap->addr -= LINUX_DBREG_OFFSET;
478                         if (req == PTRACE_PEEKUSR) {
479                                 error = copyout((char *)&u.bsd_dbreg +
480                                     uap->addr, (caddr_t)uap->data,
481                                     sizeof(l_int));
482                                 break;
483                         }
484
485                         *(l_int *)((char *)&u.bsd_dbreg + uap->addr) =
486                              uap->data;
487                         error = kern_ptrace(curp, PT_SETDBREGS, pid,
488                                             &u.bsd_dbreg,
489                                             0, &uap->sysmsg_iresult);
490                 }
491
492                 break;
493         }
494         case PTRACE_SYSCALL:
495                 /* fall through */
496         default:
497                 kprintf("linux: ptrace(%u, ...) not implemented\n",
498                     (unsigned int)uap->req);
499                 error = EINVAL;
500                 break;
501         }
502
503         rel_mplock();
504         return (error);
505 }