Ptrace.cpp 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191
  1. /*
  2. * Copyright (c) 2020, Itamar S. <itamar8910@gmail.com>
  3. * All rights reserved.
  4. *
  5. * Redistribution and use in source and binary forms, with or without
  6. * modification, are permitted provided that the following conditions are met:
  7. *
  8. * 1. Redistributions of source code must retain the above copyright notice, this
  9. * list of conditions and the following disclaimer.
  10. *
  11. * 2. Redistributions in binary form must reproduce the above copyright notice,
  12. * this list of conditions and the following disclaimer in the documentation
  13. * and/or other materials provided with the distribution.
  14. *
  15. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
  16. * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  17. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  18. * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
  19. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  20. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
  21. * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
  22. * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
  23. * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  24. * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  25. */
  26. #include <Kernel/Process.h>
  27. #include <Kernel/Ptrace.h>
  28. #include <Kernel/Thread.h>
  29. #include <Kernel/ThreadTracer.h>
  30. #include <Kernel/VM/MemoryManager.h>
  31. #include <Kernel/VM/ProcessPagingScope.h>
  32. namespace Ptrace {
  33. KResultOr<u32> handle_syscall(const Kernel::Syscall::SC_ptrace_params& params, Process& caller)
  34. {
  35. if (params.request == PT_TRACE_ME) {
  36. if (Thread::current()->tracer())
  37. return KResult(-EBUSY);
  38. caller.set_wait_for_tracer_at_next_execve(true);
  39. return KSuccess;
  40. }
  41. if (params.pid == caller.pid())
  42. return KResult(-EINVAL);
  43. Thread* peer = nullptr;
  44. {
  45. InterruptDisabler disabler;
  46. peer = Thread::from_tid(params.pid);
  47. }
  48. if (!peer)
  49. return KResult(-ESRCH);
  50. if ((peer->process().uid() != caller.euid())
  51. || (peer->process().uid() != peer->process().euid())) // Disallow tracing setuid processes
  52. return KResult(-EACCES);
  53. if (params.request == PT_ATTACH) {
  54. if (peer->tracer()) {
  55. return KResult(-EBUSY);
  56. }
  57. peer->start_tracing_from(caller.pid());
  58. if (peer->state() != Thread::State::Stopped) {
  59. ScopedSpinLock lock(peer->get_lock());
  60. if (!(peer->has_blocker() && peer->blocker().is_reason_signal()))
  61. peer->send_signal(SIGSTOP, &caller);
  62. }
  63. return KSuccess;
  64. }
  65. auto* tracer = peer->tracer();
  66. if (!tracer)
  67. return KResult(-EPERM);
  68. if (tracer->tracer_pid() != caller.pid())
  69. return KResult(-EBUSY);
  70. if (peer->state() == Thread::State::Running)
  71. return KResult(-EBUSY);
  72. switch (params.request) {
  73. case PT_CONTINUE:
  74. peer->send_signal(SIGCONT, &caller);
  75. break;
  76. case PT_DETACH:
  77. peer->stop_tracing();
  78. peer->send_signal(SIGCONT, &caller);
  79. break;
  80. case PT_SYSCALL:
  81. tracer->set_trace_syscalls(true);
  82. peer->send_signal(SIGCONT, &caller);
  83. break;
  84. case PT_GETREGS: {
  85. if (!tracer->has_regs())
  86. return KResult(-EINVAL);
  87. auto* regs = reinterpret_cast<PtraceRegisters*>(params.addr.unsafe_userspace_ptr());
  88. if (!caller.validate_write_typed(regs))
  89. return KResult(-EFAULT);
  90. copy_to_user(regs, &tracer->regs());
  91. break;
  92. }
  93. case PT_SETREGS: {
  94. if (!tracer->has_regs())
  95. return KResult(-EINVAL);
  96. PtraceRegisters regs;
  97. if (!caller.validate_read_and_copy_typed(&regs, (const PtraceRegisters*)params.addr.unsafe_userspace_ptr()))
  98. return KResult(-EFAULT);
  99. auto& peer_saved_registers = peer->get_register_dump_from_stack();
  100. // Verify that the saved registers are in usermode context
  101. if ((peer_saved_registers.cs & 0x03) != 3)
  102. return KResult(-EFAULT);
  103. tracer->set_regs(regs);
  104. copy_ptrace_registers_into_kernel_registers(peer_saved_registers, regs);
  105. break;
  106. }
  107. case PT_PEEK: {
  108. Kernel::Syscall::SC_ptrace_peek_params peek_params;
  109. if (!caller.validate_read_and_copy_typed(&peek_params, reinterpret_cast<Kernel::Syscall::SC_ptrace_peek_params*>(params.addr.unsafe_userspace_ptr())))
  110. return -EFAULT;
  111. // read validation is done inside 'peek_user_data'
  112. auto result = peer->process().peek_user_data(peek_params.address);
  113. if (result.is_error())
  114. return -EFAULT;
  115. if (!caller.validate_write(peek_params.out_data, sizeof(u32)))
  116. return -EFAULT;
  117. copy_to_user(peek_params.out_data, &result.value());
  118. break;
  119. }
  120. case PT_POKE: {
  121. Userspace<u32*> addr = reinterpret_cast<FlatPtr>(params.addr.ptr());
  122. // write validation is done inside 'poke_user_data'
  123. return peer->process().poke_user_data(addr, params.data);
  124. }
  125. default:
  126. return -EINVAL;
  127. }
  128. return 0;
  129. }
  130. void copy_kernel_registers_into_ptrace_registers(PtraceRegisters& ptrace_regs, const RegisterState& kernel_regs)
  131. {
  132. ptrace_regs.eax = kernel_regs.eax,
  133. ptrace_regs.ecx = kernel_regs.ecx,
  134. ptrace_regs.edx = kernel_regs.edx,
  135. ptrace_regs.ebx = kernel_regs.ebx,
  136. ptrace_regs.esp = kernel_regs.userspace_esp,
  137. ptrace_regs.ebp = kernel_regs.ebp,
  138. ptrace_regs.esi = kernel_regs.esi,
  139. ptrace_regs.edi = kernel_regs.edi,
  140. ptrace_regs.eip = kernel_regs.eip,
  141. ptrace_regs.eflags = kernel_regs.eflags,
  142. ptrace_regs.cs = 0;
  143. ptrace_regs.ss = 0;
  144. ptrace_regs.ds = 0;
  145. ptrace_regs.es = 0;
  146. ptrace_regs.fs = 0;
  147. ptrace_regs.gs = 0;
  148. }
  149. void copy_ptrace_registers_into_kernel_registers(RegisterState& kernel_regs, const PtraceRegisters& ptrace_regs)
  150. {
  151. kernel_regs.eax = ptrace_regs.eax;
  152. kernel_regs.ecx = ptrace_regs.ecx;
  153. kernel_regs.edx = ptrace_regs.edx;
  154. kernel_regs.ebx = ptrace_regs.ebx;
  155. kernel_regs.esp = ptrace_regs.esp;
  156. kernel_regs.ebp = ptrace_regs.ebp;
  157. kernel_regs.esi = ptrace_regs.esi;
  158. kernel_regs.edi = ptrace_regs.edi;
  159. kernel_regs.eip = ptrace_regs.eip;
  160. kernel_regs.eflags = ptrace_regs.eflags;
  161. }
  162. }