1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright 2010 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 * 26 * Portions Copyright 2007 Chad Mynhier 27 * Copyright 2012 DEY Storage Systems, Inc. All rights reserved. 28 * Copyright (c) 2013 by Delphix. All rights reserved. 29 */ 30 31 #include <assert.h> 32 #include <stdio.h> 33 #include <stdlib.h> 34 #include <unistd.h> 35 #include <ctype.h> 36 #include <fcntl.h> 37 #include <string.h> 38 #include <strings.h> 39 #include <memory.h> 40 #include <errno.h> 41 #include <dirent.h> 42 #include <limits.h> 43 #include <signal.h> 44 #include <atomic.h> 45 #include <zone.h> 46 #include <sys/types.h> 47 #include <sys/uio.h> 48 #include <sys/stat.h> 49 #include <sys/resource.h> 50 #include <sys/param.h> 51 #include <sys/stack.h> 52 #include <sys/fault.h> 53 #include <sys/syscall.h> 54 #include <sys/sysmacros.h> 55 #include <sys/systeminfo.h> 56 57 #include "libproc.h" 58 #include "Pcontrol.h" 59 #include "Putil.h" 60 #include "P32ton.h" 61 62 int _libproc_debug; /* set non-zero to enable debugging printfs */ 63 int _libproc_no_qsort; /* set non-zero to inhibit sorting */ 64 /* of symbol tables */ 65 int _libproc_incore_elf; /* only use in-core elf data */ 66 67 sigset_t blockable_sigs; /* signals to block when we need to be safe */ 68 static int minfd; /* minimum file descriptor returned by dupfd(fd, 0) */ 69 char procfs_path[PATH_MAX] = "/proc"; 70 71 /* 72 * Function prototypes for static routines in this module. 73 */ 74 static void deadcheck(struct ps_prochandle *); 75 static void restore_tracing_flags(struct ps_prochandle *); 76 static void Lfree_internal(struct ps_prochandle *, struct ps_lwphandle *); 77 static prheader_t *read_lfile(struct ps_prochandle *, const char *); 78 79 /* 80 * Ops vector functions for live processes. 81 */ 82 83 /*ARGSUSED*/ 84 static ssize_t 85 Pread_live(struct ps_prochandle *P, void *buf, size_t n, uintptr_t addr, 86 void *data) 87 { 88 return (pread(P->asfd, buf, n, (off_t)addr)); 89 } 90 91 /*ARGSUSED*/ 92 static ssize_t 93 Pwrite_live(struct ps_prochandle *P, const void *buf, size_t n, uintptr_t addr, 94 void *data) 95 { 96 return (pwrite(P->asfd, buf, n, (off_t)addr)); 97 } 98 99 /*ARGSUSED*/ 100 static int 101 Pread_maps_live(struct ps_prochandle *P, prmap_t **Pmapp, ssize_t *nmapp, 102 void *data) 103 { 104 char mapfile[PATH_MAX]; 105 int mapfd; 106 struct stat statb; 107 ssize_t nmap; 108 prmap_t *Pmap = NULL; 109 110 (void) snprintf(mapfile, sizeof (mapfile), "%s/%d/map", 111 procfs_path, (int)P->pid); 112 if ((mapfd = open(mapfile, O_RDONLY)) < 0 || 113 fstat(mapfd, &statb) != 0 || 114 statb.st_size < sizeof (prmap_t) || 115 (Pmap = malloc(statb.st_size)) == NULL || 116 (nmap = pread(mapfd, Pmap, statb.st_size, 0L)) <= 0 || 117 (nmap /= sizeof (prmap_t)) == 0) { 118 if (Pmap != NULL) 119 free(Pmap); 120 if (mapfd >= 0) 121 (void) close(mapfd); 122 Preset_maps(P); /* utter failure; destroy tables */ 123 return (-1); 124 } 125 (void) close(mapfd); 126 127 *Pmapp = Pmap; 128 *nmapp = nmap; 129 130 return (0); 131 } 132 133 /*ARGSUSED*/ 134 static void 135 Pread_aux_live(struct ps_prochandle *P, auxv_t **auxvp, int *nauxp, void *data) 136 { 137 char auxfile[64]; 138 int fd; 139 struct stat statb; 140 auxv_t *auxv; 141 ssize_t naux; 142 143 (void) snprintf(auxfile, sizeof (auxfile), "%s/%d/auxv", 144 procfs_path, (int)P->pid); 145 if ((fd = open(auxfile, O_RDONLY)) < 0) { 146 dprintf("%s: failed to open %s: %s\n", 147 __func__, auxfile, strerror(errno)); 148 return; 149 } 150 151 if (fstat(fd, &statb) == 0 && 152 statb.st_size >= sizeof (auxv_t) && 153 (auxv = malloc(statb.st_size + sizeof (auxv_t))) != NULL) { 154 if ((naux = read(fd, auxv, statb.st_size)) < 0 || 155 (naux /= sizeof (auxv_t)) < 1) { 156 dprintf("%s: read failed: %s\n", 157 __func__, strerror(errno)); 158 free(auxv); 159 } else { 160 auxv[naux].a_type = AT_NULL; 161 auxv[naux].a_un.a_val = 0L; 162 163 *auxvp = auxv; 164 *nauxp = (int)naux; 165 } 166 } 167 168 (void) close(fd); 169 } 170 171 /*ARGSUSED*/ 172 static int 173 Pcred_live(struct ps_prochandle *P, prcred_t *pcrp, int ngroups, void *data) 174 { 175 return (proc_get_cred(P->pid, pcrp, ngroups)); 176 } 177 178 /*ARGSUSED*/ 179 static int 180 Ppriv_live(struct ps_prochandle *P, prpriv_t **pprv, void *data) 181 { 182 prpriv_t *pp; 183 184 pp = proc_get_priv(P->pid); 185 if (pp == NULL) { 186 return (-1); 187 } 188 189 *pprv = pp; 190 return (0); 191 } 192 193 /*ARGSUSED*/ 194 static const psinfo_t * 195 Ppsinfo_live(struct ps_prochandle *P, psinfo_t *psinfo, void *data) 196 { 197 if (proc_get_psinfo(P->pid, psinfo) == -1) 198 return (NULL); 199 200 return (psinfo); 201 } 202 203 /*ARGSUSED*/ 204 static prheader_t * 205 Plstatus_live(struct ps_prochandle *P, void *data) 206 { 207 return (read_lfile(P, "lstatus")); 208 } 209 210 /*ARGSUSED*/ 211 static prheader_t * 212 Plpsinfo_live(struct ps_prochandle *P, void *data) 213 { 214 return (read_lfile(P, "lpsinfo")); 215 } 216 217 /*ARGSUSED*/ 218 static char * 219 Pplatform_live(struct ps_prochandle *P, char *s, size_t n, void *data) 220 { 221 if (sysinfo(SI_PLATFORM, s, n) == -1) 222 return (NULL); 223 return (s); 224 } 225 226 /*ARGSUSED*/ 227 static int 228 Puname_live(struct ps_prochandle *P, struct utsname *u, void *data) 229 { 230 return (uname(u)); 231 } 232 233 /*ARGSUSED*/ 234 static char * 235 Pzonename_live(struct ps_prochandle *P, char *s, size_t n, void *data) 236 { 237 if (getzonenamebyid(P->status.pr_zoneid, s, n) < 0) 238 return (NULL); 239 s[n - 1] = '\0'; 240 return (s); 241 } 242 243 /* 244 * Callback function for Pfindexec(). We return a match if we can stat the 245 * suggested pathname and confirm its device and inode number match our 246 * previous information about the /proc/<pid>/object/a.out file. 247 */ 248 static int 249 stat_exec(const char *path, void *arg) 250 { 251 struct stat64 *stp = arg; 252 struct stat64 st; 253 254 return (stat64(path, &st) == 0 && S_ISREG(st.st_mode) && 255 stp->st_dev == st.st_dev && stp->st_ino == st.st_ino); 256 } 257 258 /*ARGSUSED*/ 259 static char * 260 Pexecname_live(struct ps_prochandle *P, char *buf, size_t buflen, void *data) 261 { 262 char exec_name[PATH_MAX]; 263 char cwd[PATH_MAX]; 264 char proc_cwd[64]; 265 struct stat64 st; 266 int ret; 267 268 /* 269 * Try to get the path information first. 270 */ 271 (void) snprintf(exec_name, sizeof (exec_name), 272 "%s/%d/path/a.out", procfs_path, (int)P->pid); 273 if ((ret = readlink(exec_name, buf, buflen - 1)) > 0) { 274 buf[ret] = '\0'; 275 (void) Pfindobj(P, buf, buf, buflen); 276 return (buf); 277 } 278 279 /* 280 * Stat the executable file so we can compare Pfindexec's 281 * suggestions to the actual device and inode number. 282 */ 283 (void) snprintf(exec_name, sizeof (exec_name), 284 "%s/%d/object/a.out", procfs_path, (int)P->pid); 285 286 if (stat64(exec_name, &st) != 0 || !S_ISREG(st.st_mode)) 287 return (NULL); 288 289 /* 290 * Attempt to figure out the current working directory of the 291 * target process. This only works if the target process has 292 * not changed its current directory since it was exec'd. 293 */ 294 (void) snprintf(proc_cwd, sizeof (proc_cwd), 295 "%s/%d/path/cwd", procfs_path, (int)P->pid); 296 297 if ((ret = readlink(proc_cwd, cwd, PATH_MAX - 1)) > 0) 298 cwd[ret] = '\0'; 299 300 (void) Pfindexec(P, ret > 0 ? cwd : NULL, stat_exec, &st); 301 302 return (NULL); 303 } 304 305 #if defined(__i386) || defined(__amd64) 306 /*ARGSUSED*/ 307 static int 308 Pldt_live(struct ps_prochandle *P, struct ssd *pldt, int nldt, void *data) 309 { 310 return (proc_get_ldt(P->pid, pldt, nldt)); 311 } 312 #endif 313 314 static const ps_ops_t P_live_ops = { 315 .pop_pread = Pread_live, 316 .pop_pwrite = Pwrite_live, 317 .pop_read_maps = Pread_maps_live, 318 .pop_read_aux = Pread_aux_live, 319 .pop_cred = Pcred_live, 320 .pop_priv = Ppriv_live, 321 .pop_psinfo = Ppsinfo_live, 322 .pop_lstatus = Plstatus_live, 323 .pop_lpsinfo = Plpsinfo_live, 324 .pop_platform = Pplatform_live, 325 .pop_uname = Puname_live, 326 .pop_zonename = Pzonename_live, 327 .pop_execname = Pexecname_live, 328 #if defined(__i386) || defined(__amd64) 329 .pop_ldt = Pldt_live 330 #endif 331 }; 332 333 /* 334 * This is the library's .init handler. 335 */ 336 #pragma init(_libproc_init) 337 void 338 _libproc_init(void) 339 { 340 _libproc_debug = getenv("LIBPROC_DEBUG") != NULL; 341 _libproc_no_qsort = getenv("LIBPROC_NO_QSORT") != NULL; 342 _libproc_incore_elf = getenv("LIBPROC_INCORE_ELF") != NULL; 343 344 (void) sigfillset(&blockable_sigs); 345 (void) sigdelset(&blockable_sigs, SIGKILL); 346 (void) sigdelset(&blockable_sigs, SIGSTOP); 347 } 348 349 void 350 Pset_procfs_path(const char *path) 351 { 352 (void) snprintf(procfs_path, sizeof (procfs_path), "%s", path); 353 } 354 355 /* 356 * Call set_minfd() once before calling dupfd() several times. 357 * We assume that the application will not reduce its current file 358 * descriptor limit lower than 512 once it has set at least that value. 359 */ 360 int 361 set_minfd(void) 362 { 363 static mutex_t minfd_lock = DEFAULTMUTEX; 364 struct rlimit rlim; 365 int fd; 366 367 if ((fd = minfd) < 256) { 368 (void) mutex_lock(&minfd_lock); 369 if ((fd = minfd) < 256) { 370 if (getrlimit(RLIMIT_NOFILE, &rlim) != 0) 371 rlim.rlim_cur = rlim.rlim_max = 0; 372 if (rlim.rlim_cur >= 512) 373 fd = 256; 374 else if ((fd = rlim.rlim_cur / 2) < 3) 375 fd = 3; 376 membar_producer(); 377 minfd = fd; 378 } 379 (void) mutex_unlock(&minfd_lock); 380 } 381 return (fd); 382 } 383 384 int 385 dupfd(int fd, int dfd) 386 { 387 int mfd; 388 389 /* 390 * Make fd be greater than 255 (the 32-bit stdio limit), 391 * or at least make it greater than 2 so that the 392 * program will work when spawned by init(1m). 393 * Also, if dfd is non-zero, dup the fd to be dfd. 394 */ 395 if ((mfd = minfd) == 0) 396 mfd = set_minfd(); 397 if (dfd > 0 || (0 <= fd && fd < mfd)) { 398 if (dfd <= 0) 399 dfd = mfd; 400 dfd = fcntl(fd, F_DUPFD, dfd); 401 (void) close(fd); 402 fd = dfd; 403 } 404 /* 405 * Mark it close-on-exec so any created process doesn't inherit it. 406 */ 407 if (fd >= 0) 408 (void) fcntl(fd, F_SETFD, FD_CLOEXEC); 409 return (fd); 410 } 411 412 /* 413 * Create a new controlled process. 414 * Leave it stopped on successful exit from exec() or execve(). 415 * Return an opaque pointer to its process control structure. 416 * Return NULL if process cannot be created (fork()/exec() not successful). 417 */ 418 struct ps_prochandle * 419 Pxcreate(const char *file, /* executable file name */ 420 char *const *argv, /* argument vector */ 421 char *const *envp, /* environment */ 422 int *perr, /* pointer to error return code */ 423 char *path, /* if non-null, holds exec path name on return */ 424 size_t len) /* size of the path buffer */ 425 { 426 char execpath[PATH_MAX]; 427 char procname[PATH_MAX]; 428 struct ps_prochandle *P; 429 pid_t pid; 430 int fd; 431 char *fname; 432 int rc; 433 int lasterrno = 0; 434 435 if (len == 0) /* zero length, no path */ 436 path = NULL; 437 if (path != NULL) 438 *path = '\0'; 439 440 if ((P = malloc(sizeof (struct ps_prochandle))) == NULL) { 441 *perr = C_STRANGE; 442 return (NULL); 443 } 444 445 if ((pid = fork1()) == -1) { 446 free(P); 447 *perr = C_FORK; 448 return (NULL); 449 } 450 451 if (pid == 0) { /* child process */ 452 id_t id; 453 extern char **environ; 454 455 /* 456 * If running setuid or setgid, reset credentials to normal. 457 */ 458 if ((id = getgid()) != getegid()) 459 (void) setgid(id); 460 if ((id = getuid()) != geteuid()) 461 (void) setuid(id); 462 463 Pcreate_callback(P); /* execute callback (see below) */ 464 (void) pause(); /* wait for PRSABORT from parent */ 465 466 /* 467 * This is ugly. There is no execvep() function that takes a 468 * path and an environment. We cheat here by replacing the 469 * global 'environ' variable right before we call this. 470 */ 471 if (envp) 472 environ = (char **)envp; 473 474 (void) execvp(file, argv); /* execute the program */ 475 _exit(127); 476 } 477 478 /* 479 * Initialize the process structure. 480 */ 481 (void) memset(P, 0, sizeof (*P)); 482 (void) mutex_init(&P->proc_lock, USYNC_THREAD, NULL); 483 P->flags |= CREATED; 484 P->state = PS_RUN; 485 P->pid = pid; 486 P->asfd = -1; 487 P->ctlfd = -1; 488 P->statfd = -1; 489 P->agentctlfd = -1; 490 P->agentstatfd = -1; 491 Pinit_ops(&P->ops, &P_live_ops); 492 Pinitsym(P); 493 494 /* 495 * Open the /proc/pid files. 496 */ 497 (void) snprintf(procname, sizeof (procname), "%s/%d/", 498 procfs_path, (int)pid); 499 fname = procname + strlen(procname); 500 (void) set_minfd(); 501 502 /* 503 * Exclusive write open advises others not to interfere. 504 * There is no reason for any of these open()s to fail. 505 */ 506 (void) strcpy(fname, "as"); 507 if ((fd = open(procname, (O_RDWR|O_EXCL))) < 0 || 508 (fd = dupfd(fd, 0)) < 0) { 509 dprintf("Pcreate: failed to open %s: %s\n", 510 procname, strerror(errno)); 511 rc = C_STRANGE; 512 goto bad; 513 } 514 P->asfd = fd; 515 516 (void) strcpy(fname, "status"); 517 if ((fd = open(procname, O_RDONLY)) < 0 || 518 (fd = dupfd(fd, 0)) < 0) { 519 dprintf("Pcreate: failed to open %s: %s\n", 520 procname, strerror(errno)); 521 rc = C_STRANGE; 522 goto bad; 523 } 524 P->statfd = fd; 525 526 (void) strcpy(fname, "ctl"); 527 if ((fd = open(procname, O_WRONLY)) < 0 || 528 (fd = dupfd(fd, 0)) < 0) { 529 dprintf("Pcreate: failed to open %s: %s\n", 530 procname, strerror(errno)); 531 rc = C_STRANGE; 532 goto bad; 533 } 534 P->ctlfd = fd; 535 536 (void) Pstop(P, 0); /* stop the controlled process */ 537 538 /* 539 * Wait for process to sleep in pause(). 540 * If the process has already called pause(), then it should be 541 * stopped (PR_REQUESTED) while asleep in pause and we are done. 542 * Else we set up to catch entry/exit to pause() and set the process 543 * running again, expecting it to stop when it reaches pause(). 544 * There is no reason for this to fail other than an interrupt. 545 */ 546 (void) Psysentry(P, SYS_pause, 1); 547 (void) Psysexit(P, SYS_pause, 1); 548 for (;;) { 549 if (P->state == PS_STOP && 550 P->status.pr_lwp.pr_syscall == SYS_pause && 551 (P->status.pr_lwp.pr_why == PR_REQUESTED || 552 P->status.pr_lwp.pr_why == PR_SYSENTRY || 553 P->status.pr_lwp.pr_why == PR_SYSEXIT)) 554 break; 555 556 if (P->state != PS_STOP || /* interrupt or process died */ 557 Psetrun(P, 0, 0) != 0) { /* can't restart */ 558 if (errno == EINTR || errno == ERESTART) 559 rc = C_INTR; 560 else { 561 dprintf("Pcreate: Psetrun failed: %s\n", 562 strerror(errno)); 563 rc = C_STRANGE; 564 } 565 goto bad; 566 } 567 568 (void) Pwait(P, 0); 569 } 570 (void) Psysentry(P, SYS_pause, 0); 571 (void) Psysexit(P, SYS_pause, 0); 572 573 /* 574 * Kick the process off the pause() and catch 575 * it again on entry to exec() or exit(). 576 */ 577 (void) Psysentry(P, SYS_exit, 1); 578 (void) Psysentry(P, SYS_execve, 1); 579 if (Psetrun(P, 0, PRSABORT) == -1) { 580 dprintf("Pcreate: Psetrun failed: %s\n", strerror(errno)); 581 rc = C_STRANGE; 582 goto bad; 583 } 584 (void) Pwait(P, 0); 585 if (P->state != PS_STOP) { 586 dprintf("Pcreate: Pwait failed: %s\n", strerror(errno)); 587 rc = C_STRANGE; 588 goto bad; 589 } 590 591 /* 592 * Move the process through instances of failed exec()s 593 * to reach the point of stopped on successful exec(). 594 */ 595 (void) Psysexit(P, SYS_execve, TRUE); 596 597 while (P->state == PS_STOP && 598 P->status.pr_lwp.pr_why == PR_SYSENTRY && 599 P->status.pr_lwp.pr_what == SYS_execve) { 600 /* 601 * Fetch the exec path name now, before we complete 602 * the exec(). We may lose the process and be unable 603 * to get the information later. 604 */ 605 (void) Pread_string(P, execpath, sizeof (execpath), 606 (off_t)P->status.pr_lwp.pr_sysarg[0]); 607 if (path != NULL) 608 (void) strncpy(path, execpath, len); 609 /* 610 * Set the process running and wait for 611 * it to stop on exit from the exec(). 612 */ 613 (void) Psetrun(P, 0, 0); 614 (void) Pwait(P, 0); 615 616 if (P->state == PS_LOST && /* we lost control */ 617 Preopen(P) != 0) { /* and we can't get it back */ 618 rc = C_PERM; 619 goto bad; 620 } 621 622 /* 623 * If the exec() failed, continue the loop, expecting 624 * there to be more attempts to exec(), based on PATH. 625 */ 626 if (P->state == PS_STOP && 627 P->status.pr_lwp.pr_why == PR_SYSEXIT && 628 P->status.pr_lwp.pr_what == SYS_execve && 629 (lasterrno = P->status.pr_lwp.pr_errno) != 0) { 630 /* 631 * The exec() failed. Set the process running and 632 * wait for it to stop on entry to the next exec(). 633 */ 634 (void) Psetrun(P, 0, 0); 635 (void) Pwait(P, 0); 636 637 continue; 638 } 639 break; 640 } 641 642 if (P->state == PS_STOP && 643 P->status.pr_lwp.pr_why == PR_SYSEXIT && 644 P->status.pr_lwp.pr_what == SYS_execve && 645 P->status.pr_lwp.pr_errno == 0) { 646 /* 647 * The process is stopped on successful exec() or execve(). 648 * Turn off all tracing flags and return success. 649 */ 650 restore_tracing_flags(P); 651 #ifndef _LP64 652 /* We must be a 64-bit process to deal with a 64-bit process */ 653 if (P->status.pr_dmodel == PR_MODEL_LP64) { 654 rc = C_LP64; 655 goto bad; 656 } 657 #endif 658 /* 659 * Set run-on-last-close so the controlled process 660 * runs even if we die on a signal. 661 */ 662 (void) Psetflags(P, PR_RLC); 663 *perr = 0; 664 return (P); 665 } 666 667 rc = lasterrno == ENOENT ? C_NOENT : C_NOEXEC; 668 669 bad: 670 (void) kill(pid, SIGKILL); 671 if (path != NULL && rc != C_PERM && rc != C_LP64) 672 *path = '\0'; 673 Pfree(P); 674 *perr = rc; 675 return (NULL); 676 } 677 678 struct ps_prochandle * 679 Pcreate( 680 const char *file, /* executable file name */ 681 char *const *argv, /* argument vector */ 682 int *perr, /* pointer to error return code */ 683 char *path, /* if non-null, holds exec path name on return */ 684 size_t len) /* size of the path buffer */ 685 { 686 return (Pxcreate(file, argv, NULL, perr, path, len)); 687 } 688 689 /* 690 * Return a printable string corresponding to a Pcreate() error return. 691 */ 692 const char * 693 Pcreate_error(int error) 694 { 695 const char *str; 696 697 switch (error) { 698 case C_FORK: 699 str = "cannot fork"; 700 break; 701 case C_PERM: 702 str = "file is set-id or unreadable"; 703 break; 704 case C_NOEXEC: 705 str = "cannot execute file"; 706 break; 707 case C_INTR: 708 str = "operation interrupted"; 709 break; 710 case C_LP64: 711 str = "program is _LP64, self is not"; 712 break; 713 case C_STRANGE: 714 str = "unanticipated system error"; 715 break; 716 case C_NOENT: 717 str = "cannot find executable file"; 718 break; 719 default: 720 str = "unknown error"; 721 break; 722 } 723 724 return (str); 725 } 726 727 /* 728 * Callback to execute in each child process created with Pcreate() after fork 729 * but before it execs the new process image. By default, we do nothing, but 730 * by calling this function we allow the client program to define its own 731 * version of the function which will interpose on our empty default. This 732 * may be useful for clients that need to modify signal dispositions, terminal 733 * attributes, or process group and session properties for each new victim. 734 */ 735 /*ARGSUSED*/ 736 void 737 Pcreate_callback(struct ps_prochandle *P) 738 { 739 /* nothing to do here */ 740 } 741 742 /* 743 * Grab an existing process. 744 * Return an opaque pointer to its process control structure. 745 * 746 * pid: UNIX process ID. 747 * flags: 748 * PGRAB_RETAIN Retain tracing flags (default clears all tracing flags). 749 * PGRAB_FORCE Grab regardless of whether process is already traced. 750 * PGRAB_RDONLY Open the address space file O_RDONLY instead of O_RDWR, 751 * and do not open the process control file. 752 * PGRAB_NOSTOP Open the process but do not force it to stop. 753 * perr: pointer to error return code. 754 */ 755 struct ps_prochandle * 756 Pgrab(pid_t pid, int flags, int *perr) 757 { 758 struct ps_prochandle *P; 759 int fd, omode; 760 char procname[PATH_MAX]; 761 char *fname; 762 int rc = 0; 763 764 /* 765 * PGRAB_RDONLY means that we do not open the /proc/<pid>/control file, 766 * and so it implies RETAIN and NOSTOP since both require control. 767 */ 768 if (flags & PGRAB_RDONLY) 769 flags |= PGRAB_RETAIN | PGRAB_NOSTOP; 770 771 if ((P = malloc(sizeof (struct ps_prochandle))) == NULL) { 772 *perr = G_STRANGE; 773 return (NULL); 774 } 775 776 P->asfd = -1; 777 P->ctlfd = -1; 778 P->statfd = -1; 779 780 again: /* Come back here if we lose it in the Window of Vulnerability */ 781 if (P->ctlfd >= 0) 782 (void) close(P->ctlfd); 783 if (P->asfd >= 0) 784 (void) close(P->asfd); 785 if (P->statfd >= 0) 786 (void) close(P->statfd); 787 (void) memset(P, 0, sizeof (*P)); 788 (void) mutex_init(&P->proc_lock, USYNC_THREAD, NULL); 789 P->ctlfd = -1; 790 P->asfd = -1; 791 P->statfd = -1; 792 P->agentctlfd = -1; 793 P->agentstatfd = -1; 794 Pinit_ops(&P->ops, &P_live_ops); 795 Pinitsym(P); 796 797 /* 798 * Open the /proc/pid files 799 */ 800 (void) snprintf(procname, sizeof (procname), "%s/%d/", 801 procfs_path, (int)pid); 802 fname = procname + strlen(procname); 803 (void) set_minfd(); 804 805 /* 806 * Request exclusive open to avoid grabbing someone else's 807 * process and to prevent others from interfering afterwards. 808 * If this fails and the 'PGRAB_FORCE' flag is set, attempt to 809 * open non-exclusively. 810 */ 811 (void) strcpy(fname, "as"); 812 omode = (flags & PGRAB_RDONLY) ? O_RDONLY : O_RDWR; 813 814 if (((fd = open(procname, omode | O_EXCL)) < 0 && 815 (fd = ((flags & PGRAB_FORCE)? open(procname, omode) : -1)) < 0) || 816 (fd = dupfd(fd, 0)) < 0) { 817 switch (errno) { 818 case ENOENT: 819 rc = G_NOPROC; 820 break; 821 case EACCES: 822 case EPERM: 823 rc = G_PERM; 824 break; 825 case EMFILE: 826 rc = G_NOFD; 827 break; 828 case EBUSY: 829 if (!(flags & PGRAB_FORCE) || geteuid() != 0) { 830 rc = G_BUSY; 831 break; 832 } 833 /* FALLTHROUGH */ 834 default: 835 dprintf("Pgrab: failed to open %s: %s\n", 836 procname, strerror(errno)); 837 rc = G_STRANGE; 838 break; 839 } 840 goto err; 841 } 842 P->asfd = fd; 843 844 (void) strcpy(fname, "status"); 845 if ((fd = open(procname, O_RDONLY)) < 0 || 846 (fd = dupfd(fd, 0)) < 0) { 847 switch (errno) { 848 case ENOENT: 849 rc = G_NOPROC; 850 break; 851 case EMFILE: 852 rc = G_NOFD; 853 break; 854 default: 855 dprintf("Pgrab: failed to open %s: %s\n", 856 procname, strerror(errno)); 857 rc = G_STRANGE; 858 break; 859 } 860 goto err; 861 } 862 P->statfd = fd; 863 864 if (!(flags & PGRAB_RDONLY)) { 865 (void) strcpy(fname, "ctl"); 866 if ((fd = open(procname, O_WRONLY)) < 0 || 867 (fd = dupfd(fd, 0)) < 0) { 868 switch (errno) { 869 case ENOENT: 870 rc = G_NOPROC; 871 break; 872 case EMFILE: 873 rc = G_NOFD; 874 break; 875 default: 876 dprintf("Pgrab: failed to open %s: %s\n", 877 procname, strerror(errno)); 878 rc = G_STRANGE; 879 break; 880 } 881 goto err; 882 } 883 P->ctlfd = fd; 884 } 885 886 P->state = PS_RUN; 887 P->pid = pid; 888 889 /* 890 * We are now in the Window of Vulnerability (WoV). The process may 891 * exec() a setuid/setgid or unreadable object file between the open() 892 * and the PCSTOP. We will get EAGAIN in this case and must start over. 893 * As Pstopstatus will trigger the first read() from a /proc file, 894 * we also need to handle EOVERFLOW here when 32-bit as an indicator 895 * that this process is 64-bit. Finally, if the process has become 896 * a zombie (PS_UNDEAD) while we were trying to grab it, just remain 897 * silent about this and pretend there was no process. 898 */ 899 if (Pstopstatus(P, PCNULL, 0) != 0) { 900 #ifndef _LP64 901 if (errno == EOVERFLOW) { 902 rc = G_LP64; 903 goto err; 904 } 905 #endif 906 if (P->state == PS_LOST) { /* WoV */ 907 (void) mutex_destroy(&P->proc_lock); 908 goto again; 909 } 910 911 if (P->state == PS_UNDEAD) 912 rc = G_NOPROC; 913 else 914 rc = G_STRANGE; 915 916 goto err; 917 } 918 919 /* 920 * If the process is a system process, we can't control it even as root 921 */ 922 if (P->status.pr_flags & PR_ISSYS) { 923 rc = G_SYS; 924 goto err; 925 } 926 #ifndef _LP64 927 /* 928 * We must be a 64-bit process to deal with a 64-bit process 929 */ 930 if (P->status.pr_dmodel == PR_MODEL_LP64) { 931 rc = G_LP64; 932 goto err; 933 } 934 #endif 935 936 /* 937 * Remember the status for use by Prelease(). 938 */ 939 P->orig_status = P->status; /* structure copy */ 940 941 /* 942 * Before stopping the process, make sure we are not grabbing ourselves. 943 * If we are, make sure we are doing it PGRAB_RDONLY. 944 */ 945 if (pid == getpid()) { 946 /* 947 * Verify that the process is really ourself: 948 * Set a magic number, read it through the 949 * /proc file and see if the results match. 950 */ 951 uint32_t magic1 = 0; 952 uint32_t magic2 = 2; 953 954 errno = 0; 955 956 if (Pread(P, &magic2, sizeof (magic2), (uintptr_t)&magic1) 957 == sizeof (magic2) && 958 magic2 == 0 && 959 (magic1 = 0xfeedbeef) && 960 Pread(P, &magic2, sizeof (magic2), (uintptr_t)&magic1) 961 == sizeof (magic2) && 962 magic2 == 0xfeedbeef && 963 !(flags & PGRAB_RDONLY)) { 964 rc = G_SELF; 965 goto err; 966 } 967 } 968 969 /* 970 * If the process is already stopped or has been directed 971 * to stop via /proc, do not set run-on-last-close. 972 */ 973 if (!(P->status.pr_lwp.pr_flags & (PR_ISTOP|PR_DSTOP)) && 974 !(flags & PGRAB_RDONLY)) { 975 /* 976 * Mark the process run-on-last-close so 977 * it runs even if we die from SIGKILL. 978 */ 979 if (Psetflags(P, PR_RLC) != 0) { 980 if (errno == EAGAIN) { /* WoV */ 981 (void) mutex_destroy(&P->proc_lock); 982 goto again; 983 } 984 if (errno == ENOENT) /* No complaint about zombies */ 985 rc = G_ZOMB; 986 else { 987 dprintf("Pgrab: failed to set RLC\n"); 988 rc = G_STRANGE; 989 } 990 goto err; 991 } 992 } 993 994 /* 995 * If a stop directive is pending and the process has not yet stopped, 996 * then synchronously wait for the stop directive to take effect. 997 * Limit the time spent waiting for the process to stop by iterating 998 * at most 10 times. The time-out of 20 ms corresponds to the time 999 * between sending the stop directive and the process actually stopped 1000 * as measured by DTrace on a slow, busy system. If the process doesn't 1001 * stop voluntarily, clear the PR_DSTOP flag so that the code below 1002 * forces the process to stop. 1003 */ 1004 if (!(flags & PGRAB_RDONLY)) { 1005 int niter = 0; 1006 while ((P->status.pr_lwp.pr_flags & (PR_STOPPED|PR_DSTOP)) == 1007 PR_DSTOP && niter < 10 && 1008 Pstopstatus(P, PCTWSTOP, 20) != 0) { 1009 niter++; 1010 if (flags & PGRAB_NOSTOP) 1011 break; 1012 } 1013 if (niter == 10 && !(flags & PGRAB_NOSTOP)) { 1014 /* Try it harder down below */ 1015 P->status.pr_lwp.pr_flags &= ~PR_DSTOP; 1016 } 1017 } 1018 1019 /* 1020 * If the process is not already stopped or directed to stop 1021 * and PGRAB_NOSTOP was not specified, stop the process now. 1022 */ 1023 if (!(P->status.pr_lwp.pr_flags & (PR_ISTOP|PR_DSTOP)) && 1024 !(flags & PGRAB_NOSTOP)) { 1025 /* 1026 * Stop the process, get its status and signal/syscall masks. 1027 */ 1028 if (((P->status.pr_lwp.pr_flags & PR_STOPPED) && 1029 Pstopstatus(P, PCDSTOP, 0) != 0) || 1030 Pstopstatus(P, PCSTOP, 2000) != 0) { 1031 #ifndef _LP64 1032 if (errno == EOVERFLOW) { 1033 rc = G_LP64; 1034 goto err; 1035 } 1036 #endif 1037 if (P->state == PS_LOST) { /* WoV */ 1038 (void) mutex_destroy(&P->proc_lock); 1039 goto again; 1040 } 1041 if ((errno != EINTR && errno != ERESTART) || 1042 (P->state != PS_STOP && 1043 !(P->status.pr_flags & PR_DSTOP))) { 1044 if (P->state != PS_RUN && errno != ENOENT) { 1045 dprintf("Pgrab: failed to PCSTOP\n"); 1046 rc = G_STRANGE; 1047 } else { 1048 rc = G_ZOMB; 1049 } 1050 goto err; 1051 } 1052 } 1053 1054 /* 1055 * Process should now either be stopped via /proc or there 1056 * should be an outstanding stop directive. 1057 */ 1058 if (!(P->status.pr_flags & (PR_ISTOP|PR_DSTOP))) { 1059 dprintf("Pgrab: process is not stopped\n"); 1060 rc = G_STRANGE; 1061 goto err; 1062 } 1063 #ifndef _LP64 1064 /* 1065 * Test this again now because the 32-bit victim process may 1066 * have exec'd a 64-bit process in the meantime. 1067 */ 1068 if (P->status.pr_dmodel == PR_MODEL_LP64) { 1069 rc = G_LP64; 1070 goto err; 1071 } 1072 #endif 1073 } 1074 1075 /* 1076 * Cancel all tracing flags unless the PGRAB_RETAIN flag is set. 1077 */ 1078 if (!(flags & PGRAB_RETAIN)) { 1079 (void) Psysentry(P, 0, FALSE); 1080 (void) Psysexit(P, 0, FALSE); 1081 (void) Psignal(P, 0, FALSE); 1082 (void) Pfault(P, 0, FALSE); 1083 Psync(P); 1084 } 1085 1086 *perr = 0; 1087 return (P); 1088 1089 err: 1090 Pfree(P); 1091 *perr = rc; 1092 return (NULL); 1093 } 1094 1095 /* 1096 * Return a printable string corresponding to a Pgrab() error return. 1097 */ 1098 const char * 1099 Pgrab_error(int error) 1100 { 1101 const char *str; 1102 1103 switch (error) { 1104 case G_NOPROC: 1105 str = "no such process"; 1106 break; 1107 case G_NOCORE: 1108 str = "no such core file"; 1109 break; 1110 case G_NOPROCORCORE: 1111 str = "no such process or core file"; 1112 break; 1113 case G_NOEXEC: 1114 str = "cannot find executable file"; 1115 break; 1116 case G_ZOMB: 1117 str = "zombie process"; 1118 break; 1119 case G_PERM: 1120 str = "permission denied"; 1121 break; 1122 case G_BUSY: 1123 str = "process is traced"; 1124 break; 1125 case G_SYS: 1126 str = "system process"; 1127 break; 1128 case G_SELF: 1129 str = "attempt to grab self"; 1130 break; 1131 case G_INTR: 1132 str = "operation interrupted"; 1133 break; 1134 case G_LP64: 1135 str = "program is _LP64, self is not"; 1136 break; 1137 case G_FORMAT: 1138 str = "file is not an ELF core file"; 1139 break; 1140 case G_ELF: 1141 str = "libelf error"; 1142 break; 1143 case G_NOTE: 1144 str = "core file is corrupt or missing required data"; 1145 break; 1146 case G_STRANGE: 1147 str = "unanticipated system error"; 1148 break; 1149 case G_ISAINVAL: 1150 str = "wrong ELF machine type"; 1151 break; 1152 case G_BADLWPS: 1153 str = "bad lwp specification"; 1154 break; 1155 case G_NOFD: 1156 str = "too many open files"; 1157 break; 1158 default: 1159 str = "unknown error"; 1160 break; 1161 } 1162 1163 return (str); 1164 } 1165 1166 /* 1167 * Free a process control structure. 1168 * Close the file descriptors but don't do the Prelease logic. 1169 */ 1170 void 1171 Pfree(struct ps_prochandle *P) 1172 { 1173 uint_t i; 1174 1175 if (P->ucaddrs != NULL) { 1176 free(P->ucaddrs); 1177 P->ucaddrs = NULL; 1178 P->ucnelems = 0; 1179 } 1180 1181 (void) mutex_lock(&P->proc_lock); 1182 if (P->hashtab != NULL) { 1183 struct ps_lwphandle *L; 1184 for (i = 0; i < HASHSIZE; i++) { 1185 while ((L = P->hashtab[i]) != NULL) 1186 Lfree_internal(P, L); 1187 } 1188 free(P->hashtab); 1189 } 1190 1191 while (P->num_fd > 0) { 1192 fd_info_t *fip = list_next(&P->fd_head); 1193 list_unlink(fip); 1194 free(fip); 1195 P->num_fd--; 1196 } 1197 (void) mutex_unlock(&P->proc_lock); 1198 (void) mutex_destroy(&P->proc_lock); 1199 1200 if (P->agentctlfd >= 0) 1201 (void) close(P->agentctlfd); 1202 if (P->agentstatfd >= 0) 1203 (void) close(P->agentstatfd); 1204 if (P->ctlfd >= 0) 1205 (void) close(P->ctlfd); 1206 if (P->asfd >= 0) 1207 (void) close(P->asfd); 1208 if (P->statfd >= 0) 1209 (void) close(P->statfd); 1210 Preset_maps(P); 1211 P->ops.pop_fini(P, P->data); 1212 1213 /* clear out the structure as a precaution against reuse */ 1214 (void) memset(P, 0, sizeof (*P)); 1215 P->ctlfd = -1; 1216 P->asfd = -1; 1217 P->statfd = -1; 1218 P->agentctlfd = -1; 1219 P->agentstatfd = -1; 1220 1221 free(P); 1222 } 1223 1224 /* 1225 * Return the state of the process, one of the PS_* values. 1226 */ 1227 int 1228 Pstate(struct ps_prochandle *P) 1229 { 1230 return (P->state); 1231 } 1232 1233 /* 1234 * Return the open address space file descriptor for the process. 1235 * Clients must not close this file descriptor, not use it 1236 * after the process is freed. 1237 */ 1238 int 1239 Pasfd(struct ps_prochandle *P) 1240 { 1241 return (P->asfd); 1242 } 1243 1244 /* 1245 * Return the open control file descriptor for the process. 1246 * Clients must not close this file descriptor, not use it 1247 * after the process is freed. 1248 */ 1249 int 1250 Pctlfd(struct ps_prochandle *P) 1251 { 1252 return (P->ctlfd); 1253 } 1254 1255 /* 1256 * Return a pointer to the process psinfo structure. 1257 * Clients should not hold on to this pointer indefinitely. 1258 * It will become invalid on Prelease(). 1259 */ 1260 const psinfo_t * 1261 Ppsinfo(struct ps_prochandle *P) 1262 { 1263 return (P->ops.pop_psinfo(P, &P->psinfo, P->data)); 1264 } 1265 1266 /* 1267 * Return a pointer to the process status structure. 1268 * Clients should not hold on to this pointer indefinitely. 1269 * It will become invalid on Prelease(). 1270 */ 1271 const pstatus_t * 1272 Pstatus(struct ps_prochandle *P) 1273 { 1274 return (&P->status); 1275 } 1276 1277 static void 1278 Pread_status(struct ps_prochandle *P) 1279 { 1280 P->ops.pop_status(P, &P->status, P->data); 1281 } 1282 1283 /* 1284 * Fill in a pointer to a process credentials structure. The ngroups parameter 1285 * is the number of supplementary group entries allocated in the caller's cred 1286 * structure. It should equal zero or one unless extra space has been 1287 * allocated for the group list by the caller. 1288 */ 1289 int 1290 Pcred(struct ps_prochandle *P, prcred_t *pcrp, int ngroups) 1291 { 1292 return (P->ops.pop_cred(P, pcrp, ngroups, P->data)); 1293 } 1294 1295 static prheader_t * 1296 Plstatus(struct ps_prochandle *P) 1297 { 1298 return (P->ops.pop_lstatus(P, P->data)); 1299 } 1300 1301 static prheader_t * 1302 Plpsinfo(struct ps_prochandle *P) 1303 { 1304 return (P->ops.pop_lpsinfo(P, P->data)); 1305 } 1306 1307 1308 #if defined(__i386) || defined(__amd64) 1309 /* 1310 * Fill in a pointer to a process LDT structure. 1311 * The caller provides a buffer of size 'nldt * sizeof (struct ssd)'; 1312 * If pldt == NULL or nldt == 0, we return the number of existing LDT entries. 1313 * Otherwise we return the actual number of LDT entries fetched (<= nldt). 1314 */ 1315 int 1316 Pldt(struct ps_prochandle *P, struct ssd *pldt, int nldt) 1317 { 1318 return (P->ops.pop_ldt(P, pldt, nldt, P->data)); 1319 1320 } 1321 #endif /* __i386 */ 1322 1323 /* 1324 * Return a malloced process privilege structure in *pprv. 1325 */ 1326 int 1327 Ppriv(struct ps_prochandle *P, prpriv_t **pprv) 1328 { 1329 return (P->ops.pop_priv(P, pprv, P->data)); 1330 } 1331 1332 int 1333 Psetpriv(struct ps_prochandle *P, prpriv_t *pprv) 1334 { 1335 int rc; 1336 long *ctl; 1337 size_t sz; 1338 1339 if (P->state == PS_DEAD) { 1340 errno = EBADF; 1341 return (-1); 1342 } 1343 1344 sz = PRIV_PRPRIV_SIZE(pprv) + sizeof (long); 1345 1346 sz = ((sz - 1) / sizeof (long) + 1) * sizeof (long); 1347 1348 ctl = malloc(sz); 1349 if (ctl == NULL) 1350 return (-1); 1351 1352 ctl[0] = PCSPRIV; 1353 1354 (void) memcpy(&ctl[1], pprv, PRIV_PRPRIV_SIZE(pprv)); 1355 1356 if (write(P->ctlfd, ctl, sz) != sz) 1357 rc = -1; 1358 else 1359 rc = 0; 1360 1361 free(ctl); 1362 1363 return (rc); 1364 } 1365 1366 void * 1367 Pprivinfo(struct ps_prochandle *P) 1368 { 1369 core_info_t *core = P->data; 1370 1371 /* Use default from libc */ 1372 if (P->state != PS_DEAD) 1373 return (NULL); 1374 1375 return (core->core_privinfo); 1376 } 1377 1378 /* 1379 * Ensure that all cached state is written to the process. 1380 * The cached state is the LWP's signal mask and registers 1381 * and the process's tracing flags. 1382 */ 1383 void 1384 Psync(struct ps_prochandle *P) 1385 { 1386 int ctlfd = (P->agentctlfd >= 0)? P->agentctlfd : P->ctlfd; 1387 long cmd[6]; 1388 iovec_t iov[12]; 1389 int n = 0; 1390 1391 if (P->flags & SETHOLD) { 1392 cmd[0] = PCSHOLD; 1393 iov[n].iov_base = (caddr_t)&cmd[0]; 1394 iov[n++].iov_len = sizeof (long); 1395 iov[n].iov_base = (caddr_t)&P->status.pr_lwp.pr_lwphold; 1396 iov[n++].iov_len = sizeof (P->status.pr_lwp.pr_lwphold); 1397 } 1398 if (P->flags & SETREGS) { 1399 cmd[1] = PCSREG; 1400 #ifdef __i386 1401 /* XX64 we should probably restore REG_GS after this */ 1402 if (ctlfd == P->agentctlfd) 1403 P->status.pr_lwp.pr_reg[GS] = 0; 1404 #elif defined(__amd64) 1405 /* XX64 */ 1406 #endif 1407 iov[n].iov_base = (caddr_t)&cmd[1]; 1408 iov[n++].iov_len = sizeof (long); 1409 iov[n].iov_base = (caddr_t)&P->status.pr_lwp.pr_reg[0]; 1410 iov[n++].iov_len = sizeof (P->status.pr_lwp.pr_reg); 1411 } 1412 if (P->flags & SETSIG) { 1413 cmd[2] = PCSTRACE; 1414 iov[n].iov_base = (caddr_t)&cmd[2]; 1415 iov[n++].iov_len = sizeof (long); 1416 iov[n].iov_base = (caddr_t)&P->status.pr_sigtrace; 1417 iov[n++].iov_len = sizeof (P->status.pr_sigtrace); 1418 } 1419 if (P->flags & SETFAULT) { 1420 cmd[3] = PCSFAULT; 1421 iov[n].iov_base = (caddr_t)&cmd[3]; 1422 iov[n++].iov_len = sizeof (long); 1423 iov[n].iov_base = (caddr_t)&P->status.pr_flttrace; 1424 iov[n++].iov_len = sizeof (P->status.pr_flttrace); 1425 } 1426 if (P->flags & SETENTRY) { 1427 cmd[4] = PCSENTRY; 1428 iov[n].iov_base = (caddr_t)&cmd[4]; 1429 iov[n++].iov_len = sizeof (long); 1430 iov[n].iov_base = (caddr_t)&P->status.pr_sysentry; 1431 iov[n++].iov_len = sizeof (P->status.pr_sysentry); 1432 } 1433 if (P->flags & SETEXIT) { 1434 cmd[5] = PCSEXIT; 1435 iov[n].iov_base = (caddr_t)&cmd[5]; 1436 iov[n++].iov_len = sizeof (long); 1437 iov[n].iov_base = (caddr_t)&P->status.pr_sysexit; 1438 iov[n++].iov_len = sizeof (P->status.pr_sysexit); 1439 } 1440 1441 if (n == 0 || writev(ctlfd, iov, n) < 0) 1442 return; /* nothing to do or write failed */ 1443 1444 P->flags &= ~(SETSIG|SETFAULT|SETENTRY|SETEXIT|SETHOLD|SETREGS); 1445 } 1446 1447 /* 1448 * Reopen the /proc file (after PS_LOST). 1449 */ 1450 int 1451 Preopen(struct ps_prochandle *P) 1452 { 1453 int fd; 1454 char procname[PATH_MAX]; 1455 char *fname; 1456 1457 if (P->state == PS_DEAD || P->state == PS_IDLE) 1458 return (0); 1459 1460 if (P->agentcnt > 0) { 1461 P->agentcnt = 1; 1462 Pdestroy_agent(P); 1463 } 1464 1465 (void) snprintf(procname, sizeof (procname), "%s/%d/", 1466 procfs_path, (int)P->pid); 1467 fname = procname + strlen(procname); 1468 1469 (void) strcpy(fname, "as"); 1470 if ((fd = open(procname, O_RDWR)) < 0 || 1471 close(P->asfd) < 0 || 1472 (fd = dupfd(fd, P->asfd)) != P->asfd) { 1473 dprintf("Preopen: failed to open %s: %s\n", 1474 procname, strerror(errno)); 1475 if (fd >= 0) 1476 (void) close(fd); 1477 return (-1); 1478 } 1479 P->asfd = fd; 1480 1481 (void) strcpy(fname, "status"); 1482 if ((fd = open(procname, O_RDONLY)) < 0 || 1483 close(P->statfd) < 0 || 1484 (fd = dupfd(fd, P->statfd)) != P->statfd) { 1485 dprintf("Preopen: failed to open %s: %s\n", 1486 procname, strerror(errno)); 1487 if (fd >= 0) 1488 (void) close(fd); 1489 return (-1); 1490 } 1491 P->statfd = fd; 1492 1493 (void) strcpy(fname, "ctl"); 1494 if ((fd = open(procname, O_WRONLY)) < 0 || 1495 close(P->ctlfd) < 0 || 1496 (fd = dupfd(fd, P->ctlfd)) != P->ctlfd) { 1497 dprintf("Preopen: failed to open %s: %s\n", 1498 procname, strerror(errno)); 1499 if (fd >= 0) 1500 (void) close(fd); 1501 return (-1); 1502 } 1503 P->ctlfd = fd; 1504 1505 /* 1506 * Set the state to PS_RUN and wait for the process to stop so that 1507 * we re-read the status from the new P->statfd. If this fails, Pwait 1508 * will reset the state to PS_LOST and we fail the reopen. Before 1509 * returning, we also forge a bit of P->status to allow the debugger to 1510 * see that we are PS_LOST following a successful exec. 1511 */ 1512 P->state = PS_RUN; 1513 if (Pwait(P, 0) == -1) { 1514 #ifdef _ILP32 1515 if (errno == EOVERFLOW) 1516 P->status.pr_dmodel = PR_MODEL_LP64; 1517 #endif 1518 P->status.pr_lwp.pr_why = PR_SYSEXIT; 1519 P->status.pr_lwp.pr_what = SYS_execve; 1520 P->status.pr_lwp.pr_errno = 0; 1521 return (-1); 1522 } 1523 1524 /* 1525 * The process should be stopped on exec (REQUESTED) 1526 * or else should be stopped on exit from exec() (SYSEXIT) 1527 */ 1528 if (P->state == PS_STOP && 1529 (P->status.pr_lwp.pr_why == PR_REQUESTED || 1530 (P->status.pr_lwp.pr_why == PR_SYSEXIT && 1531 P->status.pr_lwp.pr_what == SYS_execve))) { 1532 /* fake up stop-on-exit-from-execve */ 1533 if (P->status.pr_lwp.pr_why == PR_REQUESTED) { 1534 P->status.pr_lwp.pr_why = PR_SYSEXIT; 1535 P->status.pr_lwp.pr_what = SYS_execve; 1536 P->status.pr_lwp.pr_errno = 0; 1537 } 1538 } else { 1539 dprintf("Preopen: expected REQUESTED or " 1540 "SYSEXIT(SYS_execve) stop\n"); 1541 } 1542 1543 return (0); 1544 } 1545 1546 /* 1547 * Define all settable flags other than the microstate accounting flags. 1548 */ 1549 #define ALL_SETTABLE_FLAGS (PR_FORK|PR_RLC|PR_KLC|PR_ASYNC|PR_BPTADJ|PR_PTRACE) 1550 1551 /* 1552 * Restore /proc tracing flags to their original values 1553 * in preparation for releasing the process. 1554 * Also called by Pcreate() to clear all tracing flags. 1555 */ 1556 static void 1557 restore_tracing_flags(struct ps_prochandle *P) 1558 { 1559 long flags; 1560 long cmd[4]; 1561 iovec_t iov[8]; 1562 1563 if (P->flags & CREATED) { 1564 /* we created this process; clear all tracing flags */ 1565 premptyset(&P->status.pr_sigtrace); 1566 premptyset(&P->status.pr_flttrace); 1567 premptyset(&P->status.pr_sysentry); 1568 premptyset(&P->status.pr_sysexit); 1569 if ((P->status.pr_flags & ALL_SETTABLE_FLAGS) != 0) 1570 (void) Punsetflags(P, ALL_SETTABLE_FLAGS); 1571 } else { 1572 /* we grabbed the process; restore its tracing flags */ 1573 P->status.pr_sigtrace = P->orig_status.pr_sigtrace; 1574 P->status.pr_flttrace = P->orig_status.pr_flttrace; 1575 P->status.pr_sysentry = P->orig_status.pr_sysentry; 1576 P->status.pr_sysexit = P->orig_status.pr_sysexit; 1577 if ((P->status.pr_flags & ALL_SETTABLE_FLAGS) != 1578 (flags = (P->orig_status.pr_flags & ALL_SETTABLE_FLAGS))) { 1579 (void) Punsetflags(P, ALL_SETTABLE_FLAGS); 1580 if (flags) 1581 (void) Psetflags(P, flags); 1582 } 1583 } 1584 1585 cmd[0] = PCSTRACE; 1586 iov[0].iov_base = (caddr_t)&cmd[0]; 1587 iov[0].iov_len = sizeof (long); 1588 iov[1].iov_base = (caddr_t)&P->status.pr_sigtrace; 1589 iov[1].iov_len = sizeof (P->status.pr_sigtrace); 1590 1591 cmd[1] = PCSFAULT; 1592 iov[2].iov_base = (caddr_t)&cmd[1]; 1593 iov[2].iov_len = sizeof (long); 1594 iov[3].iov_base = (caddr_t)&P->status.pr_flttrace; 1595 iov[3].iov_len = sizeof (P->status.pr_flttrace); 1596 1597 cmd[2] = PCSENTRY; 1598 iov[4].iov_base = (caddr_t)&cmd[2]; 1599 iov[4].iov_len = sizeof (long); 1600 iov[5].iov_base = (caddr_t)&P->status.pr_sysentry; 1601 iov[5].iov_len = sizeof (P->status.pr_sysentry); 1602 1603 cmd[3] = PCSEXIT; 1604 iov[6].iov_base = (caddr_t)&cmd[3]; 1605 iov[6].iov_len = sizeof (long); 1606 iov[7].iov_base = (caddr_t)&P->status.pr_sysexit; 1607 iov[7].iov_len = sizeof (P->status.pr_sysexit); 1608 1609 (void) writev(P->ctlfd, iov, 8); 1610 1611 P->flags &= ~(SETSIG|SETFAULT|SETENTRY|SETEXIT); 1612 } 1613 1614 /* 1615 * Release the process. Frees the process control structure. 1616 * flags: 1617 * PRELEASE_CLEAR Clear all tracing flags. 1618 * PRELEASE_RETAIN Retain current tracing flags. 1619 * PRELEASE_HANG Leave the process stopped and abandoned. 1620 * PRELEASE_KILL Terminate the process with SIGKILL. 1621 */ 1622 void 1623 Prelease(struct ps_prochandle *P, int flags) 1624 { 1625 if (P->state == PS_DEAD) { 1626 dprintf("Prelease: releasing handle %p PS_DEAD of pid %d\n", 1627 (void *)P, (int)P->pid); 1628 Pfree(P); 1629 return; 1630 } 1631 1632 if (P->state == PS_IDLE) { 1633 file_info_t *fptr = list_next(&P->file_head); 1634 dprintf("Prelease: releasing handle %p PS_IDLE of file %s\n", 1635 (void *)P, fptr->file_pname); 1636 Pfree(P); 1637 return; 1638 } 1639 1640 dprintf("Prelease: releasing handle %p pid %d\n", 1641 (void *)P, (int)P->pid); 1642 1643 if (P->ctlfd == -1) { 1644 Pfree(P); 1645 return; 1646 } 1647 1648 if (P->agentcnt > 0) { 1649 P->agentcnt = 1; 1650 Pdestroy_agent(P); 1651 } 1652 1653 /* 1654 * Attempt to stop the process. 1655 */ 1656 P->state = PS_RUN; 1657 (void) Pstop(P, 1000); 1658 1659 if (flags & PRELEASE_KILL) { 1660 if (P->state == PS_STOP) 1661 (void) Psetrun(P, SIGKILL, 0); 1662 (void) kill(P->pid, SIGKILL); 1663 Pfree(P); 1664 return; 1665 } 1666 1667 /* 1668 * If we lost control, all we can do now is close the files. 1669 * In this case, the last close sets the process running. 1670 */ 1671 if (P->state != PS_STOP && 1672 (P->status.pr_lwp.pr_flags & (PR_ISTOP|PR_DSTOP)) == 0) { 1673 Pfree(P); 1674 return; 1675 } 1676 1677 /* 1678 * We didn't lose control; we do more. 1679 */ 1680 Psync(P); 1681 1682 if (flags & PRELEASE_CLEAR) 1683 P->flags |= CREATED; 1684 1685 if (!(flags & PRELEASE_RETAIN)) 1686 restore_tracing_flags(P); 1687 1688 if (flags & PRELEASE_HANG) { 1689 /* Leave the process stopped and abandoned */ 1690 (void) Punsetflags(P, PR_RLC|PR_KLC); 1691 Pfree(P); 1692 return; 1693 } 1694 1695 /* 1696 * Set the process running if we created it or if it was 1697 * not originally stopped or directed to stop via /proc 1698 * or if we were given the PRELEASE_CLEAR flag. 1699 */ 1700 if ((P->flags & CREATED) || 1701 (P->orig_status.pr_lwp.pr_flags & (PR_ISTOP|PR_DSTOP)) == 0) { 1702 (void) Psetflags(P, PR_RLC); 1703 /* 1704 * We do this repeatedly because the process may have 1705 * more than one LWP stopped on an event of interest. 1706 * This makes sure all of them are set running. 1707 */ 1708 do { 1709 if (Psetrun(P, 0, 0) == -1 && errno == EBUSY) 1710 break; /* Agent LWP may be stuck */ 1711 } while (Pstopstatus(P, PCNULL, 0) == 0 && 1712 P->status.pr_lwp.pr_flags & (PR_ISTOP|PR_DSTOP)); 1713 1714 if (P->status.pr_lwp.pr_flags & (PR_ISTOP|PR_DSTOP)) 1715 dprintf("Prelease: failed to set process running\n"); 1716 } 1717 1718 Pfree(P); 1719 } 1720 1721 /* debugging */ 1722 void 1723 prldump(const char *caller, lwpstatus_t *lsp) 1724 { 1725 char name[32]; 1726 uint32_t bits; 1727 1728 switch (lsp->pr_why) { 1729 case PR_REQUESTED: 1730 dprintf("%s: REQUESTED\n", caller); 1731 break; 1732 case PR_SIGNALLED: 1733 dprintf("%s: SIGNALLED %s\n", caller, 1734 proc_signame(lsp->pr_what, name, sizeof (name))); 1735 break; 1736 case PR_FAULTED: 1737 dprintf("%s: FAULTED %s\n", caller, 1738 proc_fltname(lsp->pr_what, name, sizeof (name))); 1739 break; 1740 case PR_SYSENTRY: 1741 dprintf("%s: SYSENTRY %s\n", caller, 1742 proc_sysname(lsp->pr_what, name, sizeof (name))); 1743 break; 1744 case PR_SYSEXIT: 1745 dprintf("%s: SYSEXIT %s\n", caller, 1746 proc_sysname(lsp->pr_what, name, sizeof (name))); 1747 break; 1748 case PR_JOBCONTROL: 1749 dprintf("%s: JOBCONTROL %s\n", caller, 1750 proc_signame(lsp->pr_what, name, sizeof (name))); 1751 break; 1752 case PR_SUSPENDED: 1753 dprintf("%s: SUSPENDED\n", caller); 1754 break; 1755 default: 1756 dprintf("%s: Unknown\n", caller); 1757 break; 1758 } 1759 1760 if (lsp->pr_cursig) 1761 dprintf("%s: p_cursig = %d\n", caller, lsp->pr_cursig); 1762 1763 bits = *((uint32_t *)&lsp->pr_lwppend); 1764 if (bits) 1765 dprintf("%s: pr_lwppend = 0x%.8X\n", caller, bits); 1766 } 1767 1768 /* debugging */ 1769 static void 1770 prdump(struct ps_prochandle *P) 1771 { 1772 uint32_t bits; 1773 1774 prldump("Pstopstatus", &P->status.pr_lwp); 1775 1776 bits = *((uint32_t *)&P->status.pr_sigpend); 1777 if (bits) 1778 dprintf("Pstopstatus: pr_sigpend = 0x%.8X\n", bits); 1779 } 1780 1781 /* 1782 * Wait for the specified process to stop or terminate. 1783 * Or, just get the current status (PCNULL). 1784 * Or, direct it to stop and get the current status (PCDSTOP). 1785 * If the agent LWP exists, do these things to the agent, 1786 * else do these things to the process as a whole. 1787 */ 1788 int 1789 Pstopstatus(struct ps_prochandle *P, 1790 long request, /* PCNULL, PCDSTOP, PCSTOP, PCWSTOP */ 1791 uint_t msec) /* if non-zero, timeout in milliseconds */ 1792 { 1793 int ctlfd = (P->agentctlfd >= 0)? P->agentctlfd : P->ctlfd; 1794 long ctl[3]; 1795 ssize_t rc; 1796 int err; 1797 int old_state = P->state; 1798 1799 switch (P->state) { 1800 case PS_RUN: 1801 break; 1802 case PS_STOP: 1803 if (request != PCNULL && request != PCDSTOP) 1804 return (0); 1805 break; 1806 case PS_LOST: 1807 if (request != PCNULL) { 1808 errno = EAGAIN; 1809 return (-1); 1810 } 1811 break; 1812 case PS_UNDEAD: 1813 case PS_DEAD: 1814 case PS_IDLE: 1815 if (request != PCNULL) { 1816 errno = ENOENT; 1817 return (-1); 1818 } 1819 break; 1820 default: /* corrupted state */ 1821 dprintf("Pstopstatus: corrupted state: %d\n", P->state); 1822 errno = EINVAL; 1823 return (-1); 1824 } 1825 1826 ctl[0] = PCDSTOP; 1827 ctl[1] = PCTWSTOP; 1828 ctl[2] = (long)msec; 1829 rc = 0; 1830 switch (request) { 1831 case PCSTOP: 1832 rc = write(ctlfd, &ctl[0], 3*sizeof (long)); 1833 break; 1834 case PCWSTOP: 1835 rc = write(ctlfd, &ctl[1], 2*sizeof (long)); 1836 break; 1837 case PCDSTOP: 1838 rc = write(ctlfd, &ctl[0], 1*sizeof (long)); 1839 break; 1840 case PCNULL: 1841 if (P->state == PS_DEAD || P->state == PS_IDLE) 1842 return (0); 1843 break; 1844 default: /* programming error */ 1845 errno = EINVAL; 1846 return (-1); 1847 } 1848 err = (rc < 0)? errno : 0; 1849 Psync(P); 1850 1851 if (P->agentstatfd < 0) { 1852 if (pread(P->statfd, &P->status, 1853 sizeof (P->status), (off_t)0) < 0) 1854 err = errno; 1855 } else { 1856 if (pread(P->agentstatfd, &P->status.pr_lwp, 1857 sizeof (P->status.pr_lwp), (off_t)0) < 0) 1858 err = errno; 1859 P->status.pr_flags = P->status.pr_lwp.pr_flags; 1860 } 1861 1862 if (err) { 1863 switch (err) { 1864 case EINTR: /* user typed ctl-C */ 1865 case ERESTART: 1866 dprintf("Pstopstatus: EINTR\n"); 1867 break; 1868 case EAGAIN: /* we lost control of the the process */ 1869 case EOVERFLOW: 1870 dprintf("Pstopstatus: PS_LOST, errno=%d\n", err); 1871 P->state = PS_LOST; 1872 break; 1873 default: /* check for dead process */ 1874 if (_libproc_debug) { 1875 const char *errstr; 1876 1877 switch (request) { 1878 case PCNULL: 1879 errstr = "Pstopstatus PCNULL"; break; 1880 case PCSTOP: 1881 errstr = "Pstopstatus PCSTOP"; break; 1882 case PCDSTOP: 1883 errstr = "Pstopstatus PCDSTOP"; break; 1884 case PCWSTOP: 1885 errstr = "Pstopstatus PCWSTOP"; break; 1886 default: 1887 errstr = "Pstopstatus PC???"; break; 1888 } 1889 dprintf("%s: %s\n", errstr, strerror(err)); 1890 } 1891 deadcheck(P); 1892 break; 1893 } 1894 if (err != EINTR && err != ERESTART) { 1895 errno = err; 1896 return (-1); 1897 } 1898 } 1899 1900 if (!(P->status.pr_flags & PR_STOPPED)) { 1901 P->state = PS_RUN; 1902 if (request == PCNULL || request == PCDSTOP || msec != 0) 1903 return (0); 1904 dprintf("Pstopstatus: process is not stopped\n"); 1905 errno = EPROTO; 1906 return (-1); 1907 } 1908 1909 P->state = PS_STOP; 1910 1911 if (_libproc_debug) /* debugging */ 1912 prdump(P); 1913 1914 /* 1915 * If the process was already stopped coming into Pstopstatus(), 1916 * then don't use its PC to set P->sysaddr since it may have been 1917 * changed since the time the process originally stopped. 1918 */ 1919 if (old_state == PS_STOP) 1920 return (0); 1921 1922 switch (P->status.pr_lwp.pr_why) { 1923 case PR_SYSENTRY: 1924 case PR_SYSEXIT: 1925 if (Pissyscall_prev(P, P->status.pr_lwp.pr_reg[R_PC], 1926 &P->sysaddr) == 0) 1927 P->sysaddr = P->status.pr_lwp.pr_reg[R_PC]; 1928 break; 1929 case PR_REQUESTED: 1930 case PR_SIGNALLED: 1931 case PR_FAULTED: 1932 case PR_JOBCONTROL: 1933 case PR_SUSPENDED: 1934 break; 1935 default: 1936 errno = EPROTO; 1937 return (-1); 1938 } 1939 1940 return (0); 1941 } 1942 1943 /* 1944 * Wait for the process to stop for any reason. 1945 */ 1946 int 1947 Pwait(struct ps_prochandle *P, uint_t msec) 1948 { 1949 return (Pstopstatus(P, PCWSTOP, msec)); 1950 } 1951 1952 /* 1953 * Direct the process to stop; wait for it to stop. 1954 */ 1955 int 1956 Pstop(struct ps_prochandle *P, uint_t msec) 1957 { 1958 return (Pstopstatus(P, PCSTOP, msec)); 1959 } 1960 1961 /* 1962 * Direct the process to stop; don't wait. 1963 */ 1964 int 1965 Pdstop(struct ps_prochandle *P) 1966 { 1967 return (Pstopstatus(P, PCDSTOP, 0)); 1968 } 1969 1970 static void 1971 deadcheck(struct ps_prochandle *P) 1972 { 1973 int fd; 1974 void *buf; 1975 size_t size; 1976 1977 if (P->statfd < 0) 1978 P->state = PS_UNDEAD; 1979 else { 1980 if (P->agentstatfd < 0) { 1981 fd = P->statfd; 1982 buf = &P->status; 1983 size = sizeof (P->status); 1984 } else { 1985 fd = P->agentstatfd; 1986 buf = &P->status.pr_lwp; 1987 size = sizeof (P->status.pr_lwp); 1988 } 1989 while (pread(fd, buf, size, (off_t)0) != size) { 1990 switch (errno) { 1991 default: 1992 P->state = PS_UNDEAD; 1993 break; 1994 case EINTR: 1995 case ERESTART: 1996 continue; 1997 case EAGAIN: 1998 P->state = PS_LOST; 1999 break; 2000 } 2001 break; 2002 } 2003 P->status.pr_flags = P->status.pr_lwp.pr_flags; 2004 } 2005 } 2006 2007 /* 2008 * Get the value of one register from stopped process. 2009 */ 2010 int 2011 Pgetareg(struct ps_prochandle *P, int regno, prgreg_t *preg) 2012 { 2013 if (regno < 0 || regno >= NPRGREG) { 2014 errno = EINVAL; 2015 return (-1); 2016 } 2017 2018 if (P->state == PS_IDLE) { 2019 errno = ENODATA; 2020 return (-1); 2021 } 2022 2023 if (P->state != PS_STOP && P->state != PS_DEAD) { 2024 errno = EBUSY; 2025 return (-1); 2026 } 2027 2028 *preg = P->status.pr_lwp.pr_reg[regno]; 2029 return (0); 2030 } 2031 2032 /* 2033 * Put value of one register into stopped process. 2034 */ 2035 int 2036 Pputareg(struct ps_prochandle *P, int regno, prgreg_t reg) 2037 { 2038 if (regno < 0 || regno >= NPRGREG) { 2039 errno = EINVAL; 2040 return (-1); 2041 } 2042 2043 if (P->state != PS_STOP) { 2044 errno = EBUSY; 2045 return (-1); 2046 } 2047 2048 P->status.pr_lwp.pr_reg[regno] = reg; 2049 P->flags |= SETREGS; /* set registers before continuing */ 2050 return (0); 2051 } 2052 2053 int 2054 Psetrun(struct ps_prochandle *P, 2055 int sig, /* signal to pass to process */ 2056 int flags) /* PRSTEP|PRSABORT|PRSTOP|PRCSIG|PRCFAULT */ 2057 { 2058 int ctlfd = (P->agentctlfd >= 0) ? P->agentctlfd : P->ctlfd; 2059 int sbits = (PR_DSTOP | PR_ISTOP | PR_ASLEEP); 2060 2061 long ctl[1 + /* PCCFAULT */ 2062 1 + sizeof (siginfo_t)/sizeof (long) + /* PCSSIG/PCCSIG */ 2063 2 ]; /* PCRUN */ 2064 2065 long *ctlp = ctl; 2066 size_t size; 2067 2068 if (P->state != PS_STOP && (P->status.pr_lwp.pr_flags & sbits) == 0) { 2069 errno = EBUSY; 2070 return (-1); 2071 } 2072 2073 Psync(P); /* flush tracing flags and registers */ 2074 2075 if (flags & PRCFAULT) { /* clear current fault */ 2076 *ctlp++ = PCCFAULT; 2077 flags &= ~PRCFAULT; 2078 } 2079 2080 if (flags & PRCSIG) { /* clear current signal */ 2081 *ctlp++ = PCCSIG; 2082 flags &= ~PRCSIG; 2083 } else if (sig && sig != P->status.pr_lwp.pr_cursig) { 2084 /* make current signal */ 2085 siginfo_t *infop; 2086 2087 *ctlp++ = PCSSIG; 2088 infop = (siginfo_t *)ctlp; 2089 (void) memset(infop, 0, sizeof (*infop)); 2090 infop->si_signo = sig; 2091 ctlp += sizeof (siginfo_t) / sizeof (long); 2092 } 2093 2094 *ctlp++ = PCRUN; 2095 *ctlp++ = flags; 2096 size = (char *)ctlp - (char *)ctl; 2097 2098 P->info_valid = 0; /* will need to update map and file info */ 2099 2100 /* 2101 * If we've cached ucontext-list information while we were stopped, 2102 * free it now. 2103 */ 2104 if (P->ucaddrs != NULL) { 2105 free(P->ucaddrs); 2106 P->ucaddrs = NULL; 2107 P->ucnelems = 0; 2108 } 2109 2110 if (write(ctlfd, ctl, size) != size) { 2111 /* If it is dead or lost, return the real status, not PS_RUN */ 2112 if (errno == ENOENT || errno == EAGAIN) { 2113 (void) Pstopstatus(P, PCNULL, 0); 2114 return (0); 2115 } 2116 /* If it is not in a jobcontrol stop, issue an error message */ 2117 if (errno != EBUSY || 2118 P->status.pr_lwp.pr_why != PR_JOBCONTROL) { 2119 dprintf("Psetrun: %s\n", strerror(errno)); 2120 return (-1); 2121 } 2122 /* Otherwise pretend that the job-stopped process is running */ 2123 } 2124 2125 P->state = PS_RUN; 2126 return (0); 2127 } 2128 2129 ssize_t 2130 Pread(struct ps_prochandle *P, 2131 void *buf, /* caller's buffer */ 2132 size_t nbyte, /* number of bytes to read */ 2133 uintptr_t address) /* address in process */ 2134 { 2135 return (P->ops.pop_pread(P, buf, nbyte, address, P->data)); 2136 } 2137 2138 ssize_t 2139 Pread_string(struct ps_prochandle *P, 2140 char *buf, /* caller's buffer */ 2141 size_t size, /* upper limit on bytes to read */ 2142 uintptr_t addr) /* address in process */ 2143 { 2144 enum { STRSZ = 40 }; 2145 char string[STRSZ + 1]; 2146 ssize_t leng = 0; 2147 int nbyte; 2148 2149 if (size < 2) { 2150 errno = EINVAL; 2151 return (-1); 2152 } 2153 2154 size--; /* ensure trailing null fits in buffer */ 2155 2156 *buf = '\0'; 2157 string[STRSZ] = '\0'; 2158 2159 for (nbyte = STRSZ; nbyte == STRSZ && leng < size; addr += STRSZ) { 2160 if ((nbyte = P->ops.pop_pread(P, string, STRSZ, addr, 2161 P->data)) <= 0) { 2162 buf[leng] = '\0'; 2163 return (leng ? leng : -1); 2164 } 2165 if ((nbyte = strlen(string)) > 0) { 2166 if (leng + nbyte > size) 2167 nbyte = size - leng; 2168 (void) strncpy(buf + leng, string, nbyte); 2169 leng += nbyte; 2170 } 2171 } 2172 buf[leng] = '\0'; 2173 return (leng); 2174 } 2175 2176 ssize_t 2177 Pwrite(struct ps_prochandle *P, 2178 const void *buf, /* caller's buffer */ 2179 size_t nbyte, /* number of bytes to write */ 2180 uintptr_t address) /* address in process */ 2181 { 2182 return (P->ops.pop_pwrite(P, buf, nbyte, address, P->data)); 2183 } 2184 2185 int 2186 Pclearsig(struct ps_prochandle *P) 2187 { 2188 int ctlfd = (P->agentctlfd >= 0)? P->agentctlfd : P->ctlfd; 2189 long ctl = PCCSIG; 2190 2191 if (write(ctlfd, &ctl, sizeof (ctl)) != sizeof (ctl)) 2192 return (-1); 2193 P->status.pr_lwp.pr_cursig = 0; 2194 return (0); 2195 } 2196 2197 int 2198 Pclearfault(struct ps_prochandle *P) 2199 { 2200 int ctlfd = (P->agentctlfd >= 0)? P->agentctlfd : P->ctlfd; 2201 long ctl = PCCFAULT; 2202 2203 if (write(ctlfd, &ctl, sizeof (ctl)) != sizeof (ctl)) 2204 return (-1); 2205 return (0); 2206 } 2207 2208 /* 2209 * Set a breakpoint trap, return original instruction. 2210 */ 2211 int 2212 Psetbkpt(struct ps_prochandle *P, uintptr_t address, ulong_t *saved) 2213 { 2214 long ctl[1 + sizeof (priovec_t) / sizeof (long) + /* PCREAD */ 2215 1 + sizeof (priovec_t) / sizeof (long)]; /* PCWRITE */ 2216 long *ctlp = ctl; 2217 size_t size; 2218 priovec_t *iovp; 2219 instr_t bpt = BPT; 2220 instr_t old; 2221 2222 if (P->state == PS_DEAD || P->state == PS_UNDEAD || 2223 P->state == PS_IDLE) { 2224 errno = ENOENT; 2225 return (-1); 2226 } 2227 2228 /* fetch the old instruction */ 2229 *ctlp++ = PCREAD; 2230 iovp = (priovec_t *)ctlp; 2231 iovp->pio_base = &old; 2232 iovp->pio_len = sizeof (old); 2233 iovp->pio_offset = address; 2234 ctlp += sizeof (priovec_t) / sizeof (long); 2235 2236 /* write the BPT instruction */ 2237 *ctlp++ = PCWRITE; 2238 iovp = (priovec_t *)ctlp; 2239 iovp->pio_base = &bpt; 2240 iovp->pio_len = sizeof (bpt); 2241 iovp->pio_offset = address; 2242 ctlp += sizeof (priovec_t) / sizeof (long); 2243 2244 size = (char *)ctlp - (char *)ctl; 2245 if (write(P->ctlfd, ctl, size) != size) 2246 return (-1); 2247 2248 /* 2249 * Fail if there was already a breakpoint there from another debugger 2250 * or DTrace's user-level tracing on x86. 2251 */ 2252 if (old == BPT) { 2253 errno = EBUSY; 2254 return (-1); 2255 } 2256 2257 *saved = (ulong_t)old; 2258 return (0); 2259 } 2260 2261 /* 2262 * Restore original instruction where a breakpoint was set. 2263 */ 2264 int 2265 Pdelbkpt(struct ps_prochandle *P, uintptr_t address, ulong_t saved) 2266 { 2267 instr_t old = (instr_t)saved; 2268 instr_t cur; 2269 2270 if (P->state == PS_DEAD || P->state == PS_UNDEAD || 2271 P->state == PS_IDLE) { 2272 errno = ENOENT; 2273 return (-1); 2274 } 2275 2276 /* 2277 * If the breakpoint instruction we had placed has been overwritten 2278 * with a new instruction, then don't try to replace it with the 2279 * old instruction. Doing do can cause problems with self-modifying 2280 * code -- PLTs for example. If the Pread() fails, we assume that we 2281 * should proceed though most likely the Pwrite() will also fail. 2282 */ 2283 if (Pread(P, &cur, sizeof (cur), address) == sizeof (cur) && 2284 cur != BPT) 2285 return (0); 2286 2287 if (Pwrite(P, &old, sizeof (old), address) != sizeof (old)) 2288 return (-1); 2289 2290 return (0); 2291 } 2292 2293 /* 2294 * Common code for Pxecbkpt() and Lxecbkpt(). 2295 * Develop the array of requests that will do the job, then 2296 * write them to the specified control file descriptor. 2297 * Return the non-zero errno if the write fails. 2298 */ 2299 static int 2300 execute_bkpt( 2301 int ctlfd, /* process or LWP control file descriptor */ 2302 const fltset_t *faultset, /* current set of traced faults */ 2303 const sigset_t *sigmask, /* current signal mask */ 2304 uintptr_t address, /* address of breakpint */ 2305 ulong_t saved) /* the saved instruction */ 2306 { 2307 long ctl[ 2308 1 + sizeof (sigset_t) / sizeof (long) + /* PCSHOLD */ 2309 1 + sizeof (fltset_t) / sizeof (long) + /* PCSFAULT */ 2310 1 + sizeof (priovec_t) / sizeof (long) + /* PCWRITE */ 2311 2 + /* PCRUN */ 2312 1 + /* PCWSTOP */ 2313 1 + /* PCCFAULT */ 2314 1 + sizeof (priovec_t) / sizeof (long) + /* PCWRITE */ 2315 1 + sizeof (fltset_t) / sizeof (long) + /* PCSFAULT */ 2316 1 + sizeof (sigset_t) / sizeof (long)]; /* PCSHOLD */ 2317 long *ctlp = ctl; 2318 sigset_t unblock; 2319 size_t size; 2320 ssize_t ssize; 2321 priovec_t *iovp; 2322 sigset_t *holdp; 2323 fltset_t *faultp; 2324 instr_t old = (instr_t)saved; 2325 instr_t bpt = BPT; 2326 int error = 0; 2327 2328 /* block our signals for the duration */ 2329 (void) sigprocmask(SIG_BLOCK, &blockable_sigs, &unblock); 2330 2331 /* hold posted signals */ 2332 *ctlp++ = PCSHOLD; 2333 holdp = (sigset_t *)ctlp; 2334 prfillset(holdp); 2335 prdelset(holdp, SIGKILL); 2336 prdelset(holdp, SIGSTOP); 2337 ctlp += sizeof (sigset_t) / sizeof (long); 2338 2339 /* force tracing of FLTTRACE */ 2340 if (!(prismember(faultset, FLTTRACE))) { 2341 *ctlp++ = PCSFAULT; 2342 faultp = (fltset_t *)ctlp; 2343 *faultp = *faultset; 2344 praddset(faultp, FLTTRACE); 2345 ctlp += sizeof (fltset_t) / sizeof (long); 2346 } 2347 2348 /* restore the old instruction */ 2349 *ctlp++ = PCWRITE; 2350 iovp = (priovec_t *)ctlp; 2351 iovp->pio_base = &old; 2352 iovp->pio_len = sizeof (old); 2353 iovp->pio_offset = address; 2354 ctlp += sizeof (priovec_t) / sizeof (long); 2355 2356 /* clear current signal and fault; set running w/ single-step */ 2357 *ctlp++ = PCRUN; 2358 *ctlp++ = PRCSIG | PRCFAULT | PRSTEP; 2359 2360 /* wait for stop, cancel the fault */ 2361 *ctlp++ = PCWSTOP; 2362 *ctlp++ = PCCFAULT; 2363 2364 /* restore the breakpoint trap */ 2365 *ctlp++ = PCWRITE; 2366 iovp = (priovec_t *)ctlp; 2367 iovp->pio_base = &bpt; 2368 iovp->pio_len = sizeof (bpt); 2369 iovp->pio_offset = address; 2370 ctlp += sizeof (priovec_t) / sizeof (long); 2371 2372 /* restore fault tracing set */ 2373 if (!(prismember(faultset, FLTTRACE))) { 2374 *ctlp++ = PCSFAULT; 2375 *(fltset_t *)ctlp = *faultset; 2376 ctlp += sizeof (fltset_t) / sizeof (long); 2377 } 2378 2379 /* restore the hold mask */ 2380 *ctlp++ = PCSHOLD; 2381 *(sigset_t *)ctlp = *sigmask; 2382 ctlp += sizeof (sigset_t) / sizeof (long); 2383 2384 size = (char *)ctlp - (char *)ctl; 2385 if ((ssize = write(ctlfd, ctl, size)) != size) 2386 error = (ssize == -1)? errno : EINTR; 2387 (void) sigprocmask(SIG_SETMASK, &unblock, NULL); 2388 return (error); 2389 } 2390 2391 /* 2392 * Step over a breakpoint, i.e., execute the instruction that 2393 * really belongs at the breakpoint location (the current %pc) 2394 * and leave the process stopped at the next instruction. 2395 */ 2396 int 2397 Pxecbkpt(struct ps_prochandle *P, ulong_t saved) 2398 { 2399 int ctlfd = (P->agentctlfd >= 0)? P->agentctlfd : P->ctlfd; 2400 int rv, error; 2401 2402 if (P->state != PS_STOP) { 2403 errno = EBUSY; 2404 return (-1); 2405 } 2406 2407 Psync(P); 2408 2409 error = execute_bkpt(ctlfd, 2410 &P->status.pr_flttrace, &P->status.pr_lwp.pr_lwphold, 2411 P->status.pr_lwp.pr_reg[R_PC], saved); 2412 rv = Pstopstatus(P, PCNULL, 0); 2413 2414 if (error != 0) { 2415 if (P->status.pr_lwp.pr_why == PR_JOBCONTROL && 2416 error == EBUSY) { /* jobcontrol stop -- back off */ 2417 P->state = PS_RUN; 2418 return (0); 2419 } 2420 if (error == ENOENT) 2421 return (0); 2422 errno = error; 2423 return (-1); 2424 } 2425 2426 return (rv); 2427 } 2428 2429 /* 2430 * Install the watchpoint described by wp. 2431 */ 2432 int 2433 Psetwapt(struct ps_prochandle *P, const prwatch_t *wp) 2434 { 2435 long ctl[1 + sizeof (prwatch_t) / sizeof (long)]; 2436 prwatch_t *cwp = (prwatch_t *)&ctl[1]; 2437 2438 if (P->state == PS_DEAD || P->state == PS_UNDEAD || 2439 P->state == PS_IDLE) { 2440 errno = ENOENT; 2441 return (-1); 2442 } 2443 2444 ctl[0] = PCWATCH; 2445 cwp->pr_vaddr = wp->pr_vaddr; 2446 cwp->pr_size = wp->pr_size; 2447 cwp->pr_wflags = wp->pr_wflags; 2448 2449 if (write(P->ctlfd, ctl, sizeof (ctl)) != sizeof (ctl)) 2450 return (-1); 2451 2452 return (0); 2453 } 2454 2455 /* 2456 * Remove the watchpoint described by wp. 2457 */ 2458 int 2459 Pdelwapt(struct ps_prochandle *P, const prwatch_t *wp) 2460 { 2461 long ctl[1 + sizeof (prwatch_t) / sizeof (long)]; 2462 prwatch_t *cwp = (prwatch_t *)&ctl[1]; 2463 2464 if (P->state == PS_DEAD || P->state == PS_UNDEAD || 2465 P->state == PS_IDLE) { 2466 errno = ENOENT; 2467 return (-1); 2468 } 2469 2470 ctl[0] = PCWATCH; 2471 cwp->pr_vaddr = wp->pr_vaddr; 2472 cwp->pr_size = wp->pr_size; 2473 cwp->pr_wflags = 0; 2474 2475 if (write(P->ctlfd, ctl, sizeof (ctl)) != sizeof (ctl)) 2476 return (-1); 2477 2478 return (0); 2479 } 2480 2481 /* 2482 * Common code for Pxecwapt() and Lxecwapt(). Develop the array of requests 2483 * that will do the job, then write them to the specified control file 2484 * descriptor. Return the non-zero errno if the write fails. 2485 */ 2486 static int 2487 execute_wapt( 2488 int ctlfd, /* process or LWP control file descriptor */ 2489 const fltset_t *faultset, /* current set of traced faults */ 2490 const sigset_t *sigmask, /* current signal mask */ 2491 const prwatch_t *wp) /* watchpoint descriptor */ 2492 { 2493 long ctl[ 2494 1 + sizeof (sigset_t) / sizeof (long) + /* PCSHOLD */ 2495 1 + sizeof (fltset_t) / sizeof (long) + /* PCSFAULT */ 2496 1 + sizeof (prwatch_t) / sizeof (long) + /* PCWATCH */ 2497 2 + /* PCRUN */ 2498 1 + /* PCWSTOP */ 2499 1 + /* PCCFAULT */ 2500 1 + sizeof (prwatch_t) / sizeof (long) + /* PCWATCH */ 2501 1 + sizeof (fltset_t) / sizeof (long) + /* PCSFAULT */ 2502 1 + sizeof (sigset_t) / sizeof (long)]; /* PCSHOLD */ 2503 2504 long *ctlp = ctl; 2505 int error = 0; 2506 2507 sigset_t unblock; 2508 sigset_t *holdp; 2509 fltset_t *faultp; 2510 prwatch_t *prw; 2511 ssize_t ssize; 2512 size_t size; 2513 2514 (void) sigprocmask(SIG_BLOCK, &blockable_sigs, &unblock); 2515 2516 /* 2517 * Hold all posted signals in the victim process prior to stepping. 2518 */ 2519 *ctlp++ = PCSHOLD; 2520 holdp = (sigset_t *)ctlp; 2521 prfillset(holdp); 2522 prdelset(holdp, SIGKILL); 2523 prdelset(holdp, SIGSTOP); 2524 ctlp += sizeof (sigset_t) / sizeof (long); 2525 2526 /* 2527 * Force tracing of FLTTRACE since we need to single step. 2528 */ 2529 if (!(prismember(faultset, FLTTRACE))) { 2530 *ctlp++ = PCSFAULT; 2531 faultp = (fltset_t *)ctlp; 2532 *faultp = *faultset; 2533 praddset(faultp, FLTTRACE); 2534 ctlp += sizeof (fltset_t) / sizeof (long); 2535 } 2536 2537 /* 2538 * Clear only the current watchpoint by setting pr_wflags to zero. 2539 */ 2540 *ctlp++ = PCWATCH; 2541 prw = (prwatch_t *)ctlp; 2542 prw->pr_vaddr = wp->pr_vaddr; 2543 prw->pr_size = wp->pr_size; 2544 prw->pr_wflags = 0; 2545 ctlp += sizeof (prwatch_t) / sizeof (long); 2546 2547 /* 2548 * Clear the current signal and fault; set running with single-step. 2549 * Then wait for the victim to stop and cancel the FLTTRACE. 2550 */ 2551 *ctlp++ = PCRUN; 2552 *ctlp++ = PRCSIG | PRCFAULT | PRSTEP; 2553 *ctlp++ = PCWSTOP; 2554 *ctlp++ = PCCFAULT; 2555 2556 /* 2557 * Restore the current watchpoint. 2558 */ 2559 *ctlp++ = PCWATCH; 2560 (void) memcpy(ctlp, wp, sizeof (prwatch_t)); 2561 ctlp += sizeof (prwatch_t) / sizeof (long); 2562 2563 /* 2564 * Restore fault tracing set if we modified it. 2565 */ 2566 if (!(prismember(faultset, FLTTRACE))) { 2567 *ctlp++ = PCSFAULT; 2568 *(fltset_t *)ctlp = *faultset; 2569 ctlp += sizeof (fltset_t) / sizeof (long); 2570 } 2571 2572 /* 2573 * Restore the hold mask to the current hold mask (i.e. the one 2574 * before we executed any of the previous operations). 2575 */ 2576 *ctlp++ = PCSHOLD; 2577 *(sigset_t *)ctlp = *sigmask; 2578 ctlp += sizeof (sigset_t) / sizeof (long); 2579 2580 size = (char *)ctlp - (char *)ctl; 2581 if ((ssize = write(ctlfd, ctl, size)) != size) 2582 error = (ssize == -1)? errno : EINTR; 2583 (void) sigprocmask(SIG_SETMASK, &unblock, NULL); 2584 return (error); 2585 } 2586 2587 /* 2588 * Step over a watchpoint, i.e., execute the instruction that was stopped by 2589 * the watchpoint, and then leave the LWP stopped at the next instruction. 2590 */ 2591 int 2592 Pxecwapt(struct ps_prochandle *P, const prwatch_t *wp) 2593 { 2594 int ctlfd = (P->agentctlfd >= 0)? P->agentctlfd : P->ctlfd; 2595 int rv, error; 2596 2597 if (P->state != PS_STOP) { 2598 errno = EBUSY; 2599 return (-1); 2600 } 2601 2602 Psync(P); 2603 error = execute_wapt(ctlfd, 2604 &P->status.pr_flttrace, &P->status.pr_lwp.pr_lwphold, wp); 2605 rv = Pstopstatus(P, PCNULL, 0); 2606 2607 if (error != 0) { 2608 if (P->status.pr_lwp.pr_why == PR_JOBCONTROL && 2609 error == EBUSY) { /* jobcontrol stop -- back off */ 2610 P->state = PS_RUN; 2611 return (0); 2612 } 2613 if (error == ENOENT) 2614 return (0); 2615 errno = error; 2616 return (-1); 2617 } 2618 2619 return (rv); 2620 } 2621 2622 int 2623 Psetflags(struct ps_prochandle *P, long flags) 2624 { 2625 int rc; 2626 long ctl[2]; 2627 2628 ctl[0] = PCSET; 2629 ctl[1] = flags; 2630 2631 if (write(P->ctlfd, ctl, 2*sizeof (long)) != 2*sizeof (long)) { 2632 rc = -1; 2633 } else { 2634 P->status.pr_flags |= flags; 2635 P->status.pr_lwp.pr_flags |= flags; 2636 rc = 0; 2637 } 2638 2639 return (rc); 2640 } 2641 2642 int 2643 Punsetflags(struct ps_prochandle *P, long flags) 2644 { 2645 int rc; 2646 long ctl[2]; 2647 2648 ctl[0] = PCUNSET; 2649 ctl[1] = flags; 2650 2651 if (write(P->ctlfd, ctl, 2*sizeof (long)) != 2*sizeof (long)) { 2652 rc = -1; 2653 } else { 2654 P->status.pr_flags &= ~flags; 2655 P->status.pr_lwp.pr_flags &= ~flags; 2656 rc = 0; 2657 } 2658 2659 return (rc); 2660 } 2661 2662 /* 2663 * Common function to allow clients to manipulate the action to be taken 2664 * on receipt of a signal, receipt of machine fault, entry to a system call, 2665 * or exit from a system call. We make use of our private prset_* functions 2666 * in order to make this code be common. The 'which' parameter identifies 2667 * the code for the event of interest (0 means change the entire set), and 2668 * the 'stop' parameter is a boolean indicating whether the process should 2669 * stop when the event of interest occurs. The previous value is returned 2670 * to the caller; -1 is returned if an error occurred. 2671 */ 2672 static int 2673 Psetaction(struct ps_prochandle *P, void *sp, size_t size, 2674 uint_t flag, int max, int which, int stop) 2675 { 2676 int oldval; 2677 2678 if (which < 0 || which > max) { 2679 errno = EINVAL; 2680 return (-1); 2681 } 2682 2683 if (P->state == PS_DEAD || P->state == PS_UNDEAD || 2684 P->state == PS_IDLE) { 2685 errno = ENOENT; 2686 return (-1); 2687 } 2688 2689 oldval = prset_ismember(sp, size, which) ? TRUE : FALSE; 2690 2691 if (stop) { 2692 if (which == 0) { 2693 prset_fill(sp, size); 2694 P->flags |= flag; 2695 } else if (!oldval) { 2696 prset_add(sp, size, which); 2697 P->flags |= flag; 2698 } 2699 } else { 2700 if (which == 0) { 2701 prset_empty(sp, size); 2702 P->flags |= flag; 2703 } else if (oldval) { 2704 prset_del(sp, size, which); 2705 P->flags |= flag; 2706 } 2707 } 2708 2709 if (P->state == PS_RUN) 2710 Psync(P); 2711 2712 return (oldval); 2713 } 2714 2715 /* 2716 * Set action on specified signal. 2717 */ 2718 int 2719 Psignal(struct ps_prochandle *P, int which, int stop) 2720 { 2721 int oldval; 2722 2723 if (which == SIGKILL && stop != 0) { 2724 errno = EINVAL; 2725 return (-1); 2726 } 2727 2728 oldval = Psetaction(P, &P->status.pr_sigtrace, sizeof (sigset_t), 2729 SETSIG, PRMAXSIG, which, stop); 2730 2731 if (oldval != -1 && which == 0 && stop != 0) 2732 prdelset(&P->status.pr_sigtrace, SIGKILL); 2733 2734 return (oldval); 2735 } 2736 2737 /* 2738 * Set all signal tracing flags. 2739 */ 2740 void 2741 Psetsignal(struct ps_prochandle *P, const sigset_t *set) 2742 { 2743 if (P->state == PS_DEAD || P->state == PS_UNDEAD || 2744 P->state == PS_IDLE) 2745 return; 2746 2747 P->status.pr_sigtrace = *set; 2748 P->flags |= SETSIG; 2749 2750 if (P->state == PS_RUN) 2751 Psync(P); 2752 } 2753 2754 /* 2755 * Set action on specified fault. 2756 */ 2757 int 2758 Pfault(struct ps_prochandle *P, int which, int stop) 2759 { 2760 return (Psetaction(P, &P->status.pr_flttrace, sizeof (fltset_t), 2761 SETFAULT, PRMAXFAULT, which, stop)); 2762 } 2763 2764 /* 2765 * Set all machine fault tracing flags. 2766 */ 2767 void 2768 Psetfault(struct ps_prochandle *P, const fltset_t *set) 2769 { 2770 if (P->state == PS_DEAD || P->state == PS_UNDEAD || 2771 P->state == PS_IDLE) 2772 return; 2773 2774 P->status.pr_flttrace = *set; 2775 P->flags |= SETFAULT; 2776 2777 if (P->state == PS_RUN) 2778 Psync(P); 2779 } 2780 2781 /* 2782 * Set action on specified system call entry. 2783 */ 2784 int 2785 Psysentry(struct ps_prochandle *P, int which, int stop) 2786 { 2787 return (Psetaction(P, &P->status.pr_sysentry, sizeof (sysset_t), 2788 SETENTRY, PRMAXSYS, which, stop)); 2789 } 2790 2791 /* 2792 * Set all system call entry tracing flags. 2793 */ 2794 void 2795 Psetsysentry(struct ps_prochandle *P, const sysset_t *set) 2796 { 2797 if (P->state == PS_DEAD || P->state == PS_UNDEAD || 2798 P->state == PS_IDLE) 2799 return; 2800 2801 P->status.pr_sysentry = *set; 2802 P->flags |= SETENTRY; 2803 2804 if (P->state == PS_RUN) 2805 Psync(P); 2806 } 2807 2808 /* 2809 * Set action on specified system call exit. 2810 */ 2811 int 2812 Psysexit(struct ps_prochandle *P, int which, int stop) 2813 { 2814 return (Psetaction(P, &P->status.pr_sysexit, sizeof (sysset_t), 2815 SETEXIT, PRMAXSYS, which, stop)); 2816 } 2817 2818 /* 2819 * Set all system call exit tracing flags. 2820 */ 2821 void 2822 Psetsysexit(struct ps_prochandle *P, const sysset_t *set) 2823 { 2824 if (P->state == PS_DEAD || P->state == PS_UNDEAD || 2825 P->state == PS_IDLE) 2826 return; 2827 2828 P->status.pr_sysexit = *set; 2829 P->flags |= SETEXIT; 2830 2831 if (P->state == PS_RUN) 2832 Psync(P); 2833 } 2834 2835 /* 2836 * Utility function to read the contents of a file that contains a 2837 * prheader_t at the start (/proc/pid/lstatus or /proc/pid/lpsinfo). 2838 * Returns a malloc()d buffer or NULL on failure. 2839 */ 2840 static prheader_t * 2841 read_lfile(struct ps_prochandle *P, const char *lname) 2842 { 2843 prheader_t *Lhp; 2844 char lpath[PATH_MAX]; 2845 struct stat64 statb; 2846 int fd; 2847 size_t size; 2848 ssize_t rval; 2849 2850 (void) snprintf(lpath, sizeof (lpath), "%s/%d/%s", procfs_path, 2851 (int)P->status.pr_pid, lname); 2852 if ((fd = open(lpath, O_RDONLY)) < 0 || fstat64(fd, &statb) != 0) { 2853 if (fd >= 0) 2854 (void) close(fd); 2855 return (NULL); 2856 } 2857 2858 /* 2859 * 'size' is just the initial guess at the buffer size. 2860 * It will have to grow if the number of lwps increases 2861 * while we are looking at the process. 2862 * 'size' must be larger than the actual file size. 2863 */ 2864 size = statb.st_size + 32; 2865 2866 for (;;) { 2867 if ((Lhp = malloc(size)) == NULL) 2868 break; 2869 if ((rval = pread(fd, Lhp, size, 0)) < 0 || 2870 rval <= sizeof (prheader_t)) { 2871 free(Lhp); 2872 Lhp = NULL; 2873 break; 2874 } 2875 if (rval < size) 2876 break; 2877 /* need a bigger buffer */ 2878 free(Lhp); 2879 size *= 2; 2880 } 2881 2882 (void) close(fd); 2883 return (Lhp); 2884 } 2885 2886 /* 2887 * LWP iteration interface. 2888 */ 2889 int 2890 Plwp_iter(struct ps_prochandle *P, proc_lwp_f *func, void *cd) 2891 { 2892 prheader_t *Lhp; 2893 lwpstatus_t *Lsp; 2894 long nlwp; 2895 int rv; 2896 2897 switch (P->state) { 2898 case PS_RUN: 2899 (void) Pstopstatus(P, PCNULL, 0); 2900 break; 2901 2902 case PS_STOP: 2903 Psync(P); 2904 break; 2905 2906 case PS_IDLE: 2907 errno = ENODATA; 2908 return (-1); 2909 } 2910 2911 /* 2912 * For either live processes or cores, the single LWP case is easy: 2913 * the pstatus_t contains the lwpstatus_t for the only LWP. 2914 */ 2915 if (P->status.pr_nlwp <= 1) 2916 return (func(cd, &P->status.pr_lwp)); 2917 2918 /* 2919 * For the core file multi-LWP case, we just iterate through the 2920 * list of LWP structs we read in from the core file. 2921 */ 2922 if (P->state == PS_DEAD) { 2923 core_info_t *core = P->data; 2924 lwp_info_t *lwp = list_prev(&core->core_lwp_head); 2925 uint_t i; 2926 2927 for (i = 0; i < core->core_nlwp; i++, lwp = list_prev(lwp)) { 2928 if (lwp->lwp_psinfo.pr_sname != 'Z' && 2929 (rv = func(cd, &lwp->lwp_status)) != 0) 2930 break; 2931 } 2932 2933 return (rv); 2934 } 2935 2936 /* 2937 * For the live process multi-LWP case, we have to work a little 2938 * harder: the /proc/pid/lstatus file has the array of LWP structs. 2939 */ 2940 if ((Lhp = Plstatus(P)) == NULL) 2941 return (-1); 2942 2943 for (nlwp = Lhp->pr_nent, Lsp = (lwpstatus_t *)(uintptr_t)(Lhp + 1); 2944 nlwp > 0; 2945 nlwp--, Lsp = (lwpstatus_t *)((uintptr_t)Lsp + Lhp->pr_entsize)) { 2946 if ((rv = func(cd, Lsp)) != 0) 2947 break; 2948 } 2949 2950 free(Lhp); 2951 return (rv); 2952 } 2953 2954 /* 2955 * Extended LWP iteration interface. 2956 * Iterate over all LWPs, active and zombie. 2957 */ 2958 int 2959 Plwp_iter_all(struct ps_prochandle *P, proc_lwp_all_f *func, void *cd) 2960 { 2961 prheader_t *Lhp = NULL; 2962 lwpstatus_t *Lsp; 2963 lwpstatus_t *sp; 2964 prheader_t *Lphp = NULL; 2965 lwpsinfo_t *Lpsp; 2966 long nstat; 2967 long ninfo; 2968 int rv; 2969 2970 retry: 2971 if (Lhp != NULL) 2972 free(Lhp); 2973 if (Lphp != NULL) 2974 free(Lphp); 2975 if (P->state == PS_RUN) 2976 (void) Pstopstatus(P, PCNULL, 0); 2977 (void) Ppsinfo(P); 2978 2979 if (P->state == PS_STOP) 2980 Psync(P); 2981 2982 /* 2983 * For either live processes or cores, the single LWP case is easy: 2984 * the pstatus_t contains the lwpstatus_t for the only LWP and 2985 * the psinfo_t contains the lwpsinfo_t for the only LWP. 2986 */ 2987 if (P->status.pr_nlwp + P->status.pr_nzomb <= 1) 2988 return (func(cd, &P->status.pr_lwp, &P->psinfo.pr_lwp)); 2989 2990 /* 2991 * For the core file multi-LWP case, we just iterate through the 2992 * list of LWP structs we read in from the core file. 2993 */ 2994 if (P->state == PS_DEAD) { 2995 core_info_t *core = P->data; 2996 lwp_info_t *lwp = list_prev(&core->core_lwp_head); 2997 uint_t i; 2998 2999 for (i = 0; i < core->core_nlwp; i++, lwp = list_prev(lwp)) { 3000 sp = (lwp->lwp_psinfo.pr_sname == 'Z')? NULL : 3001 &lwp->lwp_status; 3002 if ((rv = func(cd, sp, &lwp->lwp_psinfo)) != 0) 3003 break; 3004 } 3005 3006 return (rv); 3007 } 3008 3009 /* 3010 * For all other cases retrieve the array of lwpstatus_t's and 3011 * lwpsinfo_t's. 3012 */ 3013 if ((Lhp = Plstatus(P)) == NULL) 3014 return (-1); 3015 if ((Lphp = Plpsinfo(P)) == NULL) { 3016 free(Lhp); 3017 return (-1); 3018 } 3019 3020 /* 3021 * If we are looking at a running process, or one we do not control, 3022 * the active and zombie lwps in the process may have changed since 3023 * we read the process status structure. If so, just start over. 3024 */ 3025 if (Lhp->pr_nent != P->status.pr_nlwp || 3026 Lphp->pr_nent != P->status.pr_nlwp + P->status.pr_nzomb) 3027 goto retry; 3028 3029 /* 3030 * To be perfectly safe, prescan the two arrays, checking consistency. 3031 * We rely on /proc giving us lwpstatus_t's and lwpsinfo_t's in the 3032 * same order (the lwp directory order) in their respective files. 3033 * We also rely on there being (possibly) more lwpsinfo_t's than 3034 * lwpstatus_t's (the extra lwpsinfo_t's are for zombie lwps). 3035 */ 3036 Lsp = (lwpstatus_t *)(uintptr_t)(Lhp + 1); 3037 Lpsp = (lwpsinfo_t *)(uintptr_t)(Lphp + 1); 3038 nstat = Lhp->pr_nent; 3039 for (ninfo = Lphp->pr_nent; ninfo != 0; ninfo--) { 3040 if (Lpsp->pr_sname != 'Z') { 3041 /* 3042 * Not a zombie lwp; check for matching lwpids. 3043 */ 3044 if (nstat == 0 || Lsp->pr_lwpid != Lpsp->pr_lwpid) 3045 goto retry; 3046 Lsp = (lwpstatus_t *)((uintptr_t)Lsp + Lhp->pr_entsize); 3047 nstat--; 3048 } 3049 Lpsp = (lwpsinfo_t *)((uintptr_t)Lpsp + Lphp->pr_entsize); 3050 } 3051 if (nstat != 0) 3052 goto retry; 3053 3054 /* 3055 * Rescan, this time for real. 3056 */ 3057 Lsp = (lwpstatus_t *)(uintptr_t)(Lhp + 1); 3058 Lpsp = (lwpsinfo_t *)(uintptr_t)(Lphp + 1); 3059 for (ninfo = Lphp->pr_nent; ninfo != 0; ninfo--) { 3060 if (Lpsp->pr_sname != 'Z') { 3061 sp = Lsp; 3062 Lsp = (lwpstatus_t *)((uintptr_t)Lsp + Lhp->pr_entsize); 3063 } else { 3064 sp = NULL; 3065 } 3066 if ((rv = func(cd, sp, Lpsp)) != 0) 3067 break; 3068 Lpsp = (lwpsinfo_t *)((uintptr_t)Lpsp + Lphp->pr_entsize); 3069 } 3070 3071 free(Lhp); 3072 free(Lphp); 3073 return (rv); 3074 } 3075 3076 core_content_t 3077 Pcontent(struct ps_prochandle *P) 3078 { 3079 core_info_t *core = P->data; 3080 3081 if (P->state == PS_DEAD) 3082 return (core->core_content); 3083 if (P->state == PS_IDLE) 3084 return (CC_CONTENT_TEXT | CC_CONTENT_DATA | CC_CONTENT_CTF); 3085 3086 return (CC_CONTENT_ALL); 3087 } 3088 3089 /* 3090 * ================================================================= 3091 * The remainder of the functions in this file are for the 3092 * control of individual LWPs in the controlled process. 3093 * ================================================================= 3094 */ 3095 3096 /* 3097 * Find an entry in the process hash table for the specified lwpid. 3098 * The entry will either point to an existing struct ps_lwphandle 3099 * or it will point to an empty slot for a new struct ps_lwphandle. 3100 */ 3101 static struct ps_lwphandle ** 3102 Lfind(struct ps_prochandle *P, lwpid_t lwpid) 3103 { 3104 struct ps_lwphandle **Lp; 3105 struct ps_lwphandle *L; 3106 3107 for (Lp = &P->hashtab[lwpid % (HASHSIZE - 1)]; 3108 (L = *Lp) != NULL; Lp = &L->lwp_hash) 3109 if (L->lwp_id == lwpid) 3110 break; 3111 return (Lp); 3112 } 3113 3114 /* 3115 * Grab an LWP contained within the controlled process. 3116 * Return an opaque pointer to its LWP control structure. 3117 * perr: pointer to error return code. 3118 */ 3119 struct ps_lwphandle * 3120 Lgrab(struct ps_prochandle *P, lwpid_t lwpid, int *perr) 3121 { 3122 struct ps_lwphandle **Lp; 3123 struct ps_lwphandle *L; 3124 int fd; 3125 char procname[PATH_MAX]; 3126 char *fname; 3127 int rc = 0; 3128 3129 (void) mutex_lock(&P->proc_lock); 3130 3131 if (P->state == PS_UNDEAD || P->state == PS_IDLE) 3132 rc = G_NOPROC; 3133 else if (P->hashtab == NULL && 3134 (P->hashtab = calloc(HASHSIZE, sizeof (struct ps_lwphandle *))) 3135 == NULL) 3136 rc = G_STRANGE; 3137 else if (*(Lp = Lfind(P, lwpid)) != NULL) 3138 rc = G_BUSY; 3139 else if ((L = malloc(sizeof (struct ps_lwphandle))) == NULL) 3140 rc = G_STRANGE; 3141 if (rc) { 3142 *perr = rc; 3143 (void) mutex_unlock(&P->proc_lock); 3144 return (NULL); 3145 } 3146 3147 (void) memset(L, 0, sizeof (*L)); 3148 L->lwp_ctlfd = -1; 3149 L->lwp_statfd = -1; 3150 L->lwp_proc = P; 3151 L->lwp_id = lwpid; 3152 *Lp = L; /* insert into the hash table */ 3153 3154 if (P->state == PS_DEAD) { /* core file */ 3155 if (getlwpstatus(P, lwpid, &L->lwp_status) == -1) { 3156 rc = G_NOPROC; 3157 goto err; 3158 } 3159 L->lwp_state = PS_DEAD; 3160 *perr = 0; 3161 (void) mutex_unlock(&P->proc_lock); 3162 return (L); 3163 } 3164 3165 /* 3166 * Open the /proc/<pid>/lwp/<lwpid> files 3167 */ 3168 (void) snprintf(procname, sizeof (procname), "%s/%d/lwp/%d/", 3169 procfs_path, (int)P->pid, (int)lwpid); 3170 fname = procname + strlen(procname); 3171 (void) set_minfd(); 3172 3173 (void) strcpy(fname, "lwpstatus"); 3174 if ((fd = open(procname, O_RDONLY)) < 0 || 3175 (fd = dupfd(fd, 0)) < 0) { 3176 switch (errno) { 3177 case ENOENT: 3178 rc = G_NOPROC; 3179 break; 3180 default: 3181 dprintf("Lgrab: failed to open %s: %s\n", 3182 procname, strerror(errno)); 3183 rc = G_STRANGE; 3184 break; 3185 } 3186 goto err; 3187 } 3188 L->lwp_statfd = fd; 3189 3190 if (pread(fd, &L->lwp_status, sizeof (L->lwp_status), (off_t)0) < 0) { 3191 switch (errno) { 3192 case ENOENT: 3193 rc = G_NOPROC; 3194 break; 3195 default: 3196 dprintf("Lgrab: failed to read %s: %s\n", 3197 procname, strerror(errno)); 3198 rc = G_STRANGE; 3199 break; 3200 } 3201 goto err; 3202 } 3203 3204 (void) strcpy(fname, "lwpctl"); 3205 if ((fd = open(procname, O_WRONLY)) < 0 || 3206 (fd = dupfd(fd, 0)) < 0) { 3207 switch (errno) { 3208 case ENOENT: 3209 rc = G_NOPROC; 3210 break; 3211 default: 3212 dprintf("Lgrab: failed to open %s: %s\n", 3213 procname, strerror(errno)); 3214 rc = G_STRANGE; 3215 break; 3216 } 3217 goto err; 3218 } 3219 L->lwp_ctlfd = fd; 3220 3221 L->lwp_state = 3222 ((L->lwp_status.pr_flags & (PR_STOPPED|PR_ISTOP)) 3223 == (PR_STOPPED|PR_ISTOP))? 3224 PS_STOP : PS_RUN; 3225 3226 *perr = 0; 3227 (void) mutex_unlock(&P->proc_lock); 3228 return (L); 3229 3230 err: 3231 Lfree_internal(P, L); 3232 *perr = rc; 3233 (void) mutex_unlock(&P->proc_lock); 3234 return (NULL); 3235 } 3236 3237 /* 3238 * Return a printable string corresponding to an Lgrab() error return. 3239 */ 3240 const char * 3241 Lgrab_error(int error) 3242 { 3243 const char *str; 3244 3245 switch (error) { 3246 case G_NOPROC: 3247 str = "no such LWP"; 3248 break; 3249 case G_BUSY: 3250 str = "LWP already grabbed"; 3251 break; 3252 case G_STRANGE: 3253 str = "unanticipated system error"; 3254 break; 3255 default: 3256 str = "unknown error"; 3257 break; 3258 } 3259 3260 return (str); 3261 } 3262 3263 /* 3264 * Free an LWP control structure. 3265 */ 3266 void 3267 Lfree(struct ps_lwphandle *L) 3268 { 3269 struct ps_prochandle *P = L->lwp_proc; 3270 3271 (void) mutex_lock(&P->proc_lock); 3272 Lfree_internal(P, L); 3273 (void) mutex_unlock(&P->proc_lock); 3274 } 3275 3276 static void 3277 Lfree_internal(struct ps_prochandle *P, struct ps_lwphandle *L) 3278 { 3279 *Lfind(P, L->lwp_id) = L->lwp_hash; /* delete from hash table */ 3280 if (L->lwp_ctlfd >= 0) 3281 (void) close(L->lwp_ctlfd); 3282 if (L->lwp_statfd >= 0) 3283 (void) close(L->lwp_statfd); 3284 3285 /* clear out the structure as a precaution against reuse */ 3286 (void) memset(L, 0, sizeof (*L)); 3287 L->lwp_ctlfd = -1; 3288 L->lwp_statfd = -1; 3289 3290 free(L); 3291 } 3292 3293 /* 3294 * Return the state of the process, one of the PS_* values. 3295 */ 3296 int 3297 Lstate(struct ps_lwphandle *L) 3298 { 3299 return (L->lwp_state); 3300 } 3301 3302 /* 3303 * Return the open control file descriptor for the LWP. 3304 * Clients must not close this file descriptor, nor use it 3305 * after the LWP is freed. 3306 */ 3307 int 3308 Lctlfd(struct ps_lwphandle *L) 3309 { 3310 return (L->lwp_ctlfd); 3311 } 3312 3313 /* 3314 * Return a pointer to the LWP lwpsinfo structure. 3315 * Clients should not hold on to this pointer indefinitely. 3316 * It will become invalid on Lfree(). 3317 */ 3318 const lwpsinfo_t * 3319 Lpsinfo(struct ps_lwphandle *L) 3320 { 3321 if (Plwp_getpsinfo(L->lwp_proc, L->lwp_id, &L->lwp_psinfo) == -1) 3322 return (NULL); 3323 3324 return (&L->lwp_psinfo); 3325 } 3326 3327 /* 3328 * Return a pointer to the LWP status structure. 3329 * Clients should not hold on to this pointer indefinitely. 3330 * It will become invalid on Lfree(). 3331 */ 3332 const lwpstatus_t * 3333 Lstatus(struct ps_lwphandle *L) 3334 { 3335 return (&L->lwp_status); 3336 } 3337 3338 /* 3339 * Given an LWP handle, return the process handle. 3340 */ 3341 struct ps_prochandle * 3342 Lprochandle(struct ps_lwphandle *L) 3343 { 3344 return (L->lwp_proc); 3345 } 3346 3347 /* 3348 * Ensure that all cached state is written to the LWP. 3349 * The cached state is the LWP's signal mask and registers. 3350 */ 3351 void 3352 Lsync(struct ps_lwphandle *L) 3353 { 3354 int ctlfd = L->lwp_ctlfd; 3355 long cmd[2]; 3356 iovec_t iov[4]; 3357 int n = 0; 3358 3359 if (L->lwp_flags & SETHOLD) { 3360 cmd[0] = PCSHOLD; 3361 iov[n].iov_base = (caddr_t)&cmd[0]; 3362 iov[n++].iov_len = sizeof (long); 3363 iov[n].iov_base = (caddr_t)&L->lwp_status.pr_lwphold; 3364 iov[n++].iov_len = sizeof (L->lwp_status.pr_lwphold); 3365 } 3366 if (L->lwp_flags & SETREGS) { 3367 cmd[1] = PCSREG; 3368 iov[n].iov_base = (caddr_t)&cmd[1]; 3369 iov[n++].iov_len = sizeof (long); 3370 iov[n].iov_base = (caddr_t)&L->lwp_status.pr_reg[0]; 3371 iov[n++].iov_len = sizeof (L->lwp_status.pr_reg); 3372 } 3373 3374 if (n == 0 || writev(ctlfd, iov, n) < 0) 3375 return; /* nothing to do or write failed */ 3376 3377 L->lwp_flags &= ~(SETHOLD|SETREGS); 3378 } 3379 3380 /* 3381 * Wait for the specified LWP to stop or terminate. 3382 * Or, just get the current status (PCNULL). 3383 * Or, direct it to stop and get the current status (PCDSTOP). 3384 */ 3385 static int 3386 Lstopstatus(struct ps_lwphandle *L, 3387 long request, /* PCNULL, PCDSTOP, PCSTOP, PCWSTOP */ 3388 uint_t msec) /* if non-zero, timeout in milliseconds */ 3389 { 3390 int ctlfd = L->lwp_ctlfd; 3391 long ctl[3]; 3392 ssize_t rc; 3393 int err; 3394 3395 switch (L->lwp_state) { 3396 case PS_RUN: 3397 break; 3398 case PS_STOP: 3399 if (request != PCNULL && request != PCDSTOP) 3400 return (0); 3401 break; 3402 case PS_LOST: 3403 if (request != PCNULL) { 3404 errno = EAGAIN; 3405 return (-1); 3406 } 3407 break; 3408 case PS_UNDEAD: 3409 case PS_DEAD: 3410 if (request != PCNULL) { 3411 errno = ENOENT; 3412 return (-1); 3413 } 3414 break; 3415 default: /* corrupted state */ 3416 dprintf("Lstopstatus: corrupted state: %d\n", L->lwp_state); 3417 errno = EINVAL; 3418 return (-1); 3419 } 3420 3421 ctl[0] = PCDSTOP; 3422 ctl[1] = PCTWSTOP; 3423 ctl[2] = (long)msec; 3424 rc = 0; 3425 switch (request) { 3426 case PCSTOP: 3427 rc = write(ctlfd, &ctl[0], 3*sizeof (long)); 3428 break; 3429 case PCWSTOP: 3430 rc = write(ctlfd, &ctl[1], 2*sizeof (long)); 3431 break; 3432 case PCDSTOP: 3433 rc = write(ctlfd, &ctl[0], 1*sizeof (long)); 3434 break; 3435 case PCNULL: 3436 if (L->lwp_state == PS_DEAD) 3437 return (0); /* Nothing else to do for cores */ 3438 break; 3439 default: /* programming error */ 3440 errno = EINVAL; 3441 return (-1); 3442 } 3443 err = (rc < 0)? errno : 0; 3444 Lsync(L); 3445 3446 if (pread(L->lwp_statfd, &L->lwp_status, 3447 sizeof (L->lwp_status), (off_t)0) < 0) 3448 err = errno; 3449 3450 if (err) { 3451 switch (err) { 3452 case EINTR: /* user typed ctl-C */ 3453 case ERESTART: 3454 dprintf("Lstopstatus: EINTR\n"); 3455 break; 3456 case EAGAIN: /* we lost control of the the process */ 3457 dprintf("Lstopstatus: EAGAIN\n"); 3458 L->lwp_state = PS_LOST; 3459 errno = err; 3460 return (-1); 3461 default: 3462 if (_libproc_debug) { 3463 const char *errstr; 3464 3465 switch (request) { 3466 case PCNULL: 3467 errstr = "Lstopstatus PCNULL"; break; 3468 case PCSTOP: 3469 errstr = "Lstopstatus PCSTOP"; break; 3470 case PCDSTOP: 3471 errstr = "Lstopstatus PCDSTOP"; break; 3472 case PCWSTOP: 3473 errstr = "Lstopstatus PCWSTOP"; break; 3474 default: 3475 errstr = "Lstopstatus PC???"; break; 3476 } 3477 dprintf("%s: %s\n", errstr, strerror(err)); 3478 } 3479 L->lwp_state = PS_UNDEAD; 3480 errno = err; 3481 return (-1); 3482 } 3483 } 3484 3485 if ((L->lwp_status.pr_flags & (PR_STOPPED|PR_ISTOP)) 3486 != (PR_STOPPED|PR_ISTOP)) { 3487 L->lwp_state = PS_RUN; 3488 if (request == PCNULL || request == PCDSTOP || msec != 0) 3489 return (0); 3490 dprintf("Lstopstatus: LWP is not stopped\n"); 3491 errno = EPROTO; 3492 return (-1); 3493 } 3494 3495 L->lwp_state = PS_STOP; 3496 3497 if (_libproc_debug) /* debugging */ 3498 prldump("Lstopstatus", &L->lwp_status); 3499 3500 switch (L->lwp_status.pr_why) { 3501 case PR_SYSENTRY: 3502 case PR_SYSEXIT: 3503 case PR_REQUESTED: 3504 case PR_SIGNALLED: 3505 case PR_FAULTED: 3506 case PR_JOBCONTROL: 3507 case PR_SUSPENDED: 3508 break; 3509 default: 3510 errno = EPROTO; 3511 return (-1); 3512 } 3513 3514 return (0); 3515 } 3516 3517 /* 3518 * Wait for the LWP to stop for any reason. 3519 */ 3520 int 3521 Lwait(struct ps_lwphandle *L, uint_t msec) 3522 { 3523 return (Lstopstatus(L, PCWSTOP, msec)); 3524 } 3525 3526 /* 3527 * Direct the LWP to stop; wait for it to stop. 3528 */ 3529 int 3530 Lstop(struct ps_lwphandle *L, uint_t msec) 3531 { 3532 return (Lstopstatus(L, PCSTOP, msec)); 3533 } 3534 3535 /* 3536 * Direct the LWP to stop; don't wait. 3537 */ 3538 int 3539 Ldstop(struct ps_lwphandle *L) 3540 { 3541 return (Lstopstatus(L, PCDSTOP, 0)); 3542 } 3543 3544 /* 3545 * Get the value of one register from stopped LWP. 3546 */ 3547 int 3548 Lgetareg(struct ps_lwphandle *L, int regno, prgreg_t *preg) 3549 { 3550 if (regno < 0 || regno >= NPRGREG) { 3551 errno = EINVAL; 3552 return (-1); 3553 } 3554 3555 if (L->lwp_state != PS_STOP) { 3556 errno = EBUSY; 3557 return (-1); 3558 } 3559 3560 *preg = L->lwp_status.pr_reg[regno]; 3561 return (0); 3562 } 3563 3564 /* 3565 * Put value of one register into stopped LWP. 3566 */ 3567 int 3568 Lputareg(struct ps_lwphandle *L, int regno, prgreg_t reg) 3569 { 3570 if (regno < 0 || regno >= NPRGREG) { 3571 errno = EINVAL; 3572 return (-1); 3573 } 3574 3575 if (L->lwp_state != PS_STOP) { 3576 errno = EBUSY; 3577 return (-1); 3578 } 3579 3580 L->lwp_status.pr_reg[regno] = reg; 3581 L->lwp_flags |= SETREGS; /* set registers before continuing */ 3582 return (0); 3583 } 3584 3585 int 3586 Lsetrun(struct ps_lwphandle *L, 3587 int sig, /* signal to pass to LWP */ 3588 int flags) /* PRSTEP|PRSABORT|PRSTOP|PRCSIG|PRCFAULT */ 3589 { 3590 int ctlfd = L->lwp_ctlfd; 3591 int sbits = (PR_DSTOP | PR_ISTOP | PR_ASLEEP); 3592 3593 long ctl[1 + /* PCCFAULT */ 3594 1 + sizeof (siginfo_t)/sizeof (long) + /* PCSSIG/PCCSIG */ 3595 2 ]; /* PCRUN */ 3596 3597 long *ctlp = ctl; 3598 size_t size; 3599 3600 if (L->lwp_state != PS_STOP && 3601 (L->lwp_status.pr_flags & sbits) == 0) { 3602 errno = EBUSY; 3603 return (-1); 3604 } 3605 3606 Lsync(L); /* flush registers */ 3607 3608 if (flags & PRCFAULT) { /* clear current fault */ 3609 *ctlp++ = PCCFAULT; 3610 flags &= ~PRCFAULT; 3611 } 3612 3613 if (flags & PRCSIG) { /* clear current signal */ 3614 *ctlp++ = PCCSIG; 3615 flags &= ~PRCSIG; 3616 } else if (sig && sig != L->lwp_status.pr_cursig) { 3617 /* make current signal */ 3618 siginfo_t *infop; 3619 3620 *ctlp++ = PCSSIG; 3621 infop = (siginfo_t *)ctlp; 3622 (void) memset(infop, 0, sizeof (*infop)); 3623 infop->si_signo = sig; 3624 ctlp += sizeof (siginfo_t) / sizeof (long); 3625 } 3626 3627 *ctlp++ = PCRUN; 3628 *ctlp++ = flags; 3629 size = (char *)ctlp - (char *)ctl; 3630 3631 L->lwp_proc->info_valid = 0; /* will need to update map and file info */ 3632 L->lwp_proc->state = PS_RUN; 3633 L->lwp_state = PS_RUN; 3634 3635 if (write(ctlfd, ctl, size) != size) { 3636 /* Pretend that a job-stopped LWP is running */ 3637 if (errno != EBUSY || L->lwp_status.pr_why != PR_JOBCONTROL) 3638 return (Lstopstatus(L, PCNULL, 0)); 3639 } 3640 3641 return (0); 3642 } 3643 3644 int 3645 Lclearsig(struct ps_lwphandle *L) 3646 { 3647 int ctlfd = L->lwp_ctlfd; 3648 long ctl = PCCSIG; 3649 3650 if (write(ctlfd, &ctl, sizeof (ctl)) != sizeof (ctl)) 3651 return (-1); 3652 L->lwp_status.pr_cursig = 0; 3653 return (0); 3654 } 3655 3656 int 3657 Lclearfault(struct ps_lwphandle *L) 3658 { 3659 int ctlfd = L->lwp_ctlfd; 3660 long ctl = PCCFAULT; 3661 3662 if (write(ctlfd, &ctl, sizeof (ctl)) != sizeof (ctl)) 3663 return (-1); 3664 return (0); 3665 } 3666 3667 /* 3668 * Step over a breakpoint, i.e., execute the instruction that 3669 * really belongs at the breakpoint location (the current %pc) 3670 * and leave the LWP stopped at the next instruction. 3671 */ 3672 int 3673 Lxecbkpt(struct ps_lwphandle *L, ulong_t saved) 3674 { 3675 struct ps_prochandle *P = L->lwp_proc; 3676 int rv, error; 3677 3678 if (L->lwp_state != PS_STOP) { 3679 errno = EBUSY; 3680 return (-1); 3681 } 3682 3683 Lsync(L); 3684 error = execute_bkpt(L->lwp_ctlfd, 3685 &P->status.pr_flttrace, &L->lwp_status.pr_lwphold, 3686 L->lwp_status.pr_reg[R_PC], saved); 3687 rv = Lstopstatus(L, PCNULL, 0); 3688 3689 if (error != 0) { 3690 if (L->lwp_status.pr_why == PR_JOBCONTROL && 3691 error == EBUSY) { /* jobcontrol stop -- back off */ 3692 L->lwp_state = PS_RUN; 3693 return (0); 3694 } 3695 if (error == ENOENT) 3696 return (0); 3697 errno = error; 3698 return (-1); 3699 } 3700 3701 return (rv); 3702 } 3703 3704 /* 3705 * Step over a watchpoint, i.e., execute the instruction that was stopped by 3706 * the watchpoint, and then leave the LWP stopped at the next instruction. 3707 */ 3708 int 3709 Lxecwapt(struct ps_lwphandle *L, const prwatch_t *wp) 3710 { 3711 struct ps_prochandle *P = L->lwp_proc; 3712 int rv, error; 3713 3714 if (L->lwp_state != PS_STOP) { 3715 errno = EBUSY; 3716 return (-1); 3717 } 3718 3719 Lsync(L); 3720 error = execute_wapt(L->lwp_ctlfd, 3721 &P->status.pr_flttrace, &L->lwp_status.pr_lwphold, wp); 3722 rv = Lstopstatus(L, PCNULL, 0); 3723 3724 if (error != 0) { 3725 if (L->lwp_status.pr_why == PR_JOBCONTROL && 3726 error == EBUSY) { /* jobcontrol stop -- back off */ 3727 L->lwp_state = PS_RUN; 3728 return (0); 3729 } 3730 if (error == ENOENT) 3731 return (0); 3732 errno = error; 3733 return (-1); 3734 } 3735 3736 return (rv); 3737 } 3738 3739 int 3740 Lstack(struct ps_lwphandle *L, stack_t *stkp) 3741 { 3742 struct ps_prochandle *P = L->lwp_proc; 3743 uintptr_t addr = L->lwp_status.pr_ustack; 3744 3745 if (P->status.pr_dmodel == PR_MODEL_NATIVE) { 3746 if (Pread(P, stkp, sizeof (*stkp), addr) != sizeof (*stkp)) 3747 return (-1); 3748 #ifdef _LP64 3749 } else { 3750 stack32_t stk32; 3751 3752 if (Pread(P, &stk32, sizeof (stk32), addr) != sizeof (stk32)) 3753 return (-1); 3754 3755 stack_32_to_n(&stk32, stkp); 3756 #endif 3757 } 3758 3759 return (0); 3760 } 3761 3762 int 3763 Lmain_stack(struct ps_lwphandle *L, stack_t *stkp) 3764 { 3765 struct ps_prochandle *P = L->lwp_proc; 3766 3767 if (Lstack(L, stkp) != 0) 3768 return (-1); 3769 3770 /* 3771 * If the SS_ONSTACK flag is set then this LWP is operating on the 3772 * alternate signal stack. We can recover the original stack from 3773 * pr_oldcontext. 3774 */ 3775 if (!(stkp->ss_flags & SS_ONSTACK)) 3776 return (0); 3777 3778 if (P->status.pr_dmodel == PR_MODEL_NATIVE) { 3779 ucontext_t *ctxp = (void *)L->lwp_status.pr_oldcontext; 3780 3781 if (Pread(P, stkp, sizeof (*stkp), 3782 (uintptr_t)&ctxp->uc_stack) != sizeof (*stkp)) 3783 return (-1); 3784 #ifdef _LP64 3785 } else { 3786 ucontext32_t *ctxp = (void *)L->lwp_status.pr_oldcontext; 3787 stack32_t stk32; 3788 3789 if (Pread(P, &stk32, sizeof (stk32), 3790 (uintptr_t)&ctxp->uc_stack) != sizeof (stk32)) 3791 return (-1); 3792 3793 stack_32_to_n(&stk32, stkp); 3794 #endif 3795 } 3796 3797 return (0); 3798 } 3799 3800 int 3801 Lalt_stack(struct ps_lwphandle *L, stack_t *stkp) 3802 { 3803 if (L->lwp_status.pr_altstack.ss_flags & SS_DISABLE) { 3804 errno = ENODATA; 3805 return (-1); 3806 } 3807 3808 *stkp = L->lwp_status.pr_altstack; 3809 3810 return (0); 3811 } 3812 3813 /* 3814 * Add a mapping to the given proc handle. Resizes the array as appropriate and 3815 * manages reference counts on the given file_info_t. 3816 * 3817 * The 'map_relocate' member is used to tell Psort_mappings() that the 3818 * associated file_map pointer needs to be relocated after the mappings have 3819 * been sorted. It is only set for the first mapping, and has no meaning 3820 * outside these two functions. 3821 */ 3822 int 3823 Padd_mapping(struct ps_prochandle *P, off64_t off, file_info_t *fp, 3824 prmap_t *pmap) 3825 { 3826 map_info_t *mp; 3827 3828 if (P->map_count == P->map_alloc) { 3829 size_t next = P->map_alloc ? P->map_alloc * 2 : 16; 3830 3831 if ((P->mappings = realloc(P->mappings, 3832 next * sizeof (map_info_t))) == NULL) 3833 return (-1); 3834 3835 P->map_alloc = next; 3836 } 3837 3838 mp = &P->mappings[P->map_count++]; 3839 3840 mp->map_offset = off; 3841 mp->map_pmap = *pmap; 3842 mp->map_relocate = 0; 3843 if ((mp->map_file = fp) != NULL) { 3844 if (fp->file_map == NULL) { 3845 fp->file_map = mp; 3846 mp->map_relocate = 1; 3847 } 3848 fp->file_ref++; 3849 } 3850 3851 return (0); 3852 } 3853 3854 static int 3855 map_sort(const void *a, const void *b) 3856 { 3857 const map_info_t *ap = a, *bp = b; 3858 3859 if (ap->map_pmap.pr_vaddr < bp->map_pmap.pr_vaddr) 3860 return (-1); 3861 else if (ap->map_pmap.pr_vaddr > bp->map_pmap.pr_vaddr) 3862 return (1); 3863 else 3864 return (0); 3865 } 3866 3867 /* 3868 * Sort the current set of mappings. Should be called during target 3869 * initialization after all calls to Padd_mapping() have been made. 3870 */ 3871 void 3872 Psort_mappings(struct ps_prochandle *P) 3873 { 3874 int i; 3875 map_info_t *mp; 3876 3877 qsort(P->mappings, P->map_count, sizeof (map_info_t), map_sort); 3878 3879 /* 3880 * Update all the file_map pointers to refer to the new locations. 3881 */ 3882 for (i = 0; i < P->map_count; i++) { 3883 mp = &P->mappings[i]; 3884 if (mp->map_relocate) 3885 mp->map_file->file_map = mp; 3886 mp->map_relocate = 0; 3887 } 3888 } 3889 3890 struct ps_prochandle * 3891 Pgrab_ops(pid_t pid, void *data, const ps_ops_t *ops, int flags) 3892 { 3893 struct ps_prochandle *P; 3894 3895 if ((P = calloc(1, sizeof (*P))) == NULL) { 3896 return (NULL); 3897 } 3898 3899 Pinit_ops(&P->ops, ops); 3900 (void) mutex_init(&P->proc_lock, USYNC_THREAD, NULL); 3901 P->pid = pid; 3902 P->state = PS_STOP; 3903 P->asfd = -1; 3904 P->ctlfd = -1; 3905 P->statfd = -1; 3906 P->agentctlfd = -1; 3907 P->agentstatfd = -1; 3908 Pinitsym(P); 3909 P->data = data; 3910 Pread_status(P); 3911 3912 if (flags & PGRAB_INCORE) { 3913 P->flags |= INCORE; 3914 } 3915 3916 return (P); 3917 } 3918