trace.c revision 929bd57ca202fd2f2e8485ebf65d683e664f67b5
1/*
2 * This file is part of ltrace.
3 * Copyright (C) 2012 Petr Machata, Red Hat Inc.
4 * Copyright (C) 2001,2005 IBM Corp.
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License as
8 * published by the Free Software Foundation; either version 2 of the
9 * License, or (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14 * General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
19 * 02110-1301 USA
20 */
21
22#include "config.h"
23
24#include <asm/ptrace.h>
25#include <sys/ptrace.h>
26#include <sys/types.h>
27#include <sys/wait.h>
28#include <assert.h>
29#include <errno.h>
30#include <signal.h>
31#include <stdlib.h>
32
33#include "common.h"
34#include "proc.h"
35#include "type.h"
36
37#if (!defined(PTRACE_PEEKUSER) && defined(PTRACE_PEEKUSR))
38# define PTRACE_PEEKUSER PTRACE_PEEKUSR
39#endif
40
41#if (!defined(PTRACE_POKEUSER) && defined(PTRACE_POKEUSR))
42# define PTRACE_POKEUSER PTRACE_POKEUSR
43#endif
44
45void
46get_arch_dep(struct process *proc)
47{
48#ifdef __s390x__
49	unsigned long psw;
50
51	if (proc->arch_ptr)
52		return;
53
54	psw = ptrace(PTRACE_PEEKUSER, proc->pid, PT_PSWMASK, 0);
55
56	if ((psw & 0x000000180000000) == 0x000000080000000) {
57		proc->mask_32bit = 1;
58		proc->personality = 1;
59	}
60
61	proc->arch_ptr = (void *)1;
62#endif
63}
64
65/* Returns 1 if syscall, 2 if sysret, 0 otherwise.
66 */
67int
68syscall_p(struct process *proc, int status, int *sysnum)
69{
70	long pc, opcode, offset_reg, scno, tmp;
71	void *svc_addr;
72	int gpr_offset[16] = { PT_GPR0, PT_GPR1, PT_ORIGGPR2, PT_GPR3,
73		PT_GPR4, PT_GPR5, PT_GPR6, PT_GPR7,
74		PT_GPR8, PT_GPR9, PT_GPR10, PT_GPR11,
75		PT_GPR12, PT_GPR13, PT_GPR14, PT_GPR15
76	};
77
78	if (WIFSTOPPED(status)
79	    && WSTOPSIG(status) == (SIGTRAP | proc->tracesysgood)) {
80
81		/*
82		 * If we have PTRACE_O_TRACESYSGOOD and we have the new style
83		 * of passing the system call number to user space via PT_GPR2
84		 * then the task is quite easy.
85		 */
86
87		*sysnum = ptrace(PTRACE_PEEKUSER, proc->pid, PT_GPR2, 0);
88
89		if (proc->tracesysgood) {
90			/* System call was encountered... */
91			if (proc->callstack_depth > 0 &&
92			    proc->callstack[proc->callstack_depth -
93					    1].is_syscall) {
94				/* syscall exit */
95				*sysnum =
96				    proc->callstack[proc->callstack_depth -
97						    1].c_un.syscall;
98				return 2;
99			} else {
100				/* syscall enter */
101				if (*sysnum != -ENOSYS)
102					return 1;
103			}
104		}
105
106		/*
107		 * At least one of the two requirements mentioned above is not
108		 * met. Therefore the fun part starts here:
109		 * We try to do some instruction decoding without even knowing
110		 * the instruction code length of the last instruction executed.
111		 * Needs to be done to get the system call number or to decide
112		 * if we reached a breakpoint or even checking for a completely
113		 * unrelated instruction.
114		 * Just a heuristic that most of the time appears to work...
115		 */
116
117		pc = ptrace(PTRACE_PEEKUSER, proc->pid, PT_PSWADDR, 0);
118		opcode = ptrace(PTRACE_PEEKTEXT, proc->pid,
119				(char *)(pc - sizeof(long)), 0);
120
121		if ((opcode & 0xffff) == 0x0001) {
122			/* Breakpoint */
123			return 0;
124		} else if ((opcode & 0xff00) == 0x0a00) {
125			/* SVC opcode */
126			scno = opcode & 0xff;
127		} else if ((opcode & 0xff000000) == 0x44000000) {
128			/* Instruction decoding of EXECUTE... */
129			svc_addr = (void *)(opcode & 0xfff);
130
131			offset_reg = (opcode & 0x000f0000) >> 16;
132			if (offset_reg)
133				svc_addr += ptrace(PTRACE_PEEKUSER, proc->pid,
134						   gpr_offset[offset_reg], 0);
135
136			offset_reg = (opcode & 0x0000f000) >> 12;
137			if (offset_reg)
138				svc_addr += ptrace(PTRACE_PEEKUSER, proc->pid,
139						   gpr_offset[offset_reg], 0);
140
141			scno = ptrace(PTRACE_PEEKTEXT, proc->pid, svc_addr, 0);
142#ifdef __s390x__
143			scno >>= 48;
144#else
145			scno >>= 16;
146#endif
147			if ((scno & 0xff00) != 0x0a000)
148				return 0;
149
150			tmp = 0;
151			offset_reg = (opcode & 0x00f00000) >> 20;
152			if (offset_reg)
153				tmp = ptrace(PTRACE_PEEKUSER, proc->pid,
154					     gpr_offset[offset_reg], 0);
155
156			scno = (scno | tmp) & 0xff;
157		} else {
158			/* No opcode related to syscall handling */
159			return 0;
160		}
161
162		if (scno == 0)
163			scno = ptrace(PTRACE_PEEKUSER, proc->pid, PT_GPR1, 0);
164
165		*sysnum = scno;
166
167		/* System call was encountered... */
168		if (proc->callstack_depth > 0 &&
169		    proc->callstack[proc->callstack_depth - 1].is_syscall) {
170			return 2;
171		} else {
172			return 1;
173		}
174	}
175	/* Unknown status... */
176	return 0;
177}
178
179size_t
180arch_type_sizeof(struct process *proc, struct arg_type_info *info)
181{
182	if (proc == NULL)
183		return (size_t)-2;
184
185	switch (info->type) {
186	case ARGTYPE_VOID:
187		return 0;
188
189	case ARGTYPE_CHAR:
190		return 1;
191
192	case ARGTYPE_SHORT:
193	case ARGTYPE_USHORT:
194		return 2;
195
196	case ARGTYPE_INT:
197	case ARGTYPE_UINT:
198		return 4;
199
200	case ARGTYPE_LONG:
201	case ARGTYPE_ULONG:
202	case ARGTYPE_POINTER:
203		return proc->e_class == ELFCLASS64 ? 8 : 4;
204
205	case ARGTYPE_FLOAT:
206		return 4;
207	case ARGTYPE_DOUBLE:
208		return 8;
209
210	case ARGTYPE_ARRAY:
211	case ARGTYPE_STRUCT:
212		/* Use default value.  */
213		return (size_t)-2;
214
215	default:
216		assert(info->type != info->type);
217		abort();
218	}
219}
220
221size_t
222arch_type_alignof(struct process *proc, struct arg_type_info *info)
223{
224	if (proc == NULL)
225		return (size_t)-2;
226
227	switch (info->type) {
228	default:
229		assert(info->type != info->type);
230		break;
231
232	case ARGTYPE_CHAR:
233		return 1;
234
235	case ARGTYPE_SHORT:
236	case ARGTYPE_USHORT:
237		return 2;
238
239	case ARGTYPE_INT:
240	case ARGTYPE_UINT:
241		return 4;
242
243	case ARGTYPE_LONG:
244	case ARGTYPE_ULONG:
245	case ARGTYPE_POINTER:
246		return proc->e_class == ELFCLASS64 ? 8 : 4;
247
248	case ARGTYPE_FLOAT:
249		return 4;
250	case ARGTYPE_DOUBLE:
251		return 8;
252
253	case ARGTYPE_ARRAY:
254	case ARGTYPE_STRUCT:
255		/* Use default value.  */
256		return (size_t)-2;
257	}
258	abort();
259}
260