/* * This file is part of ltrace. * Copyright (C) 2012 Petr Machata, Red Hat Inc. * Copyright (C) 2001,2005 IBM Corp. * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License as * published by the Free Software Foundation; either version 2 of the * License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA */ #include "config.h" #include <asm/ptrace.h> #include <sys/ptrace.h> #include <sys/types.h> #include <sys/wait.h> #include <assert.h> #include <errno.h> #include <signal.h> #include <stdlib.h> #include "common.h" #include "proc.h" #include "type.h" #if (!defined(PTRACE_PEEKUSER) && defined(PTRACE_PEEKUSR)) # define PTRACE_PEEKUSER PTRACE_PEEKUSR #endif #if (!defined(PTRACE_POKEUSER) && defined(PTRACE_POKEUSR)) # define PTRACE_POKEUSER PTRACE_POKEUSR #endif void get_arch_dep(struct process *proc) { #ifdef __s390x__ unsigned long psw; if (proc->arch_ptr) return; psw = ptrace(PTRACE_PEEKUSER, proc->pid, PT_PSWMASK, 0); if ((psw & 0x000000180000000) == 0x000000080000000) { proc->mask_32bit = 1; proc->personality = 1; } proc->arch_ptr = (void *)1; #endif } /* Returns 1 if syscall, 2 if sysret, 0 otherwise. */ int syscall_p(struct process *proc, int status, int *sysnum) { long pc, opcode, offset_reg, scno, tmp; void *svc_addr; int gpr_offset[16] = { PT_GPR0, PT_GPR1, PT_ORIGGPR2, PT_GPR3, PT_GPR4, PT_GPR5, PT_GPR6, PT_GPR7, PT_GPR8, PT_GPR9, PT_GPR10, PT_GPR11, PT_GPR12, PT_GPR13, PT_GPR14, PT_GPR15 }; if (WIFSTOPPED(status) && WSTOPSIG(status) == (SIGTRAP | proc->tracesysgood)) { /* * If we have PTRACE_O_TRACESYSGOOD and we have the new style * of passing the system call number to user space via PT_GPR2 * then the task is quite easy. */ *sysnum = ptrace(PTRACE_PEEKUSER, proc->pid, PT_GPR2, 0); if (proc->tracesysgood) { /* System call was encountered... */ if (proc->callstack_depth > 0 && proc->callstack[proc->callstack_depth - 1].is_syscall) { /* syscall exit */ *sysnum = proc->callstack[proc->callstack_depth - 1].c_un.syscall; return 2; } else { /* syscall enter */ if (*sysnum != -ENOSYS) return 1; } } /* * At least one of the two requirements mentioned above is not * met. Therefore the fun part starts here: * We try to do some instruction decoding without even knowing * the instruction code length of the last instruction executed. * Needs to be done to get the system call number or to decide * if we reached a breakpoint or even checking for a completely * unrelated instruction. * Just a heuristic that most of the time appears to work... */ pc = ptrace(PTRACE_PEEKUSER, proc->pid, PT_PSWADDR, 0); opcode = ptrace(PTRACE_PEEKTEXT, proc->pid, (char *)(pc - sizeof(long)), 0); if ((opcode & 0xffff) == 0x0001) { /* Breakpoint */ return 0; } else if ((opcode & 0xff00) == 0x0a00) { /* SVC opcode */ scno = opcode & 0xff; } else if ((opcode & 0xff000000) == 0x44000000) { /* Instruction decoding of EXECUTE... */ svc_addr = (void *)(opcode & 0xfff); offset_reg = (opcode & 0x000f0000) >> 16; if (offset_reg) svc_addr += ptrace(PTRACE_PEEKUSER, proc->pid, gpr_offset[offset_reg], 0); offset_reg = (opcode & 0x0000f000) >> 12; if (offset_reg) svc_addr += ptrace(PTRACE_PEEKUSER, proc->pid, gpr_offset[offset_reg], 0); scno = ptrace(PTRACE_PEEKTEXT, proc->pid, svc_addr, 0); #ifdef __s390x__ scno >>= 48; #else scno >>= 16; #endif if ((scno & 0xff00) != 0x0a000) return 0; tmp = 0; offset_reg = (opcode & 0x00f00000) >> 20; if (offset_reg) tmp = ptrace(PTRACE_PEEKUSER, proc->pid, gpr_offset[offset_reg], 0); scno = (scno | tmp) & 0xff; } else { /* No opcode related to syscall handling */ return 0; } if (scno == 0) scno = ptrace(PTRACE_PEEKUSER, proc->pid, PT_GPR1, 0); *sysnum = scno; /* System call was encountered... */ if (proc->callstack_depth > 0 && proc->callstack[proc->callstack_depth - 1].is_syscall) { return 2; } else { return 1; } } /* Unknown status... */ return 0; } size_t arch_type_sizeof(struct process *proc, struct arg_type_info *info) { if (proc == NULL) return (size_t)-2; switch (info->type) { case ARGTYPE_VOID: return 0; case ARGTYPE_CHAR: return 1; case ARGTYPE_SHORT: case ARGTYPE_USHORT: return 2; case ARGTYPE_INT: case ARGTYPE_UINT: return 4; case ARGTYPE_LONG: case ARGTYPE_ULONG: case ARGTYPE_POINTER: return proc->e_class == ELFCLASS64 ? 8 : 4; case ARGTYPE_FLOAT: return 4; case ARGTYPE_DOUBLE: return 8; case ARGTYPE_ARRAY: case ARGTYPE_STRUCT: /* Use default value. */ return (size_t)-2; default: assert(info->type != info->type); abort(); } } size_t arch_type_alignof(struct process *proc, struct arg_type_info *info) { if (proc == NULL) return (size_t)-2; switch (info->type) { default: assert(info->type != info->type); break; case ARGTYPE_CHAR: return 1; case ARGTYPE_SHORT: case ARGTYPE_USHORT: return 2; case ARGTYPE_INT: case ARGTYPE_UINT: return 4; case ARGTYPE_LONG: case ARGTYPE_ULONG: case ARGTYPE_POINTER: return proc->e_class == ELFCLASS64 ? 8 : 4; case ARGTYPE_FLOAT: return 4; case ARGTYPE_DOUBLE: return 8; case ARGTYPE_ARRAY: case ARGTYPE_STRUCT: /* Use default value. */ return (size_t)-2; } abort(); }