xref: /freebsd/lib/libsys/ptrace.2 (revision f126890ac5386406dadf7c4cfa9566cbb56537c5)
1.\"	$NetBSD: ptrace.2,v 1.2 1995/02/27 12:35:37 cgd Exp $
2.\"
3.\" This file is in the public domain.
4.Dd August 18, 2023
5.Dt PTRACE 2
6.Os
7.Sh NAME
8.Nm ptrace
9.Nd process tracing and debugging
10.Sh LIBRARY
11.Lb libc
12.Sh SYNOPSIS
13.In sys/types.h
14.In sys/ptrace.h
15.Ft int
16.Fn ptrace "int request" "pid_t pid" "caddr_t addr" "int data"
17.Sh DESCRIPTION
18The
19.Fn ptrace
20system call
21provides tracing and debugging facilities.
22It allows one process
23(the
24.Em tracing
25process)
26to control another
27(the
28.Em traced
29process).
30The tracing process must first attach to the traced process, and then
31issue a series of
32.Fn ptrace
33system calls to control the execution of the process, as well as access
34process memory and register state.
35For the duration of the tracing session, the traced process will be
36.Dq re-parented ,
37with its parent process ID (and resulting behavior)
38changed to the tracing process.
39It is permissible for a tracing process to attach to more than one
40other process at a time.
41When the tracing process has completed its work, it must detach the
42traced process; if a tracing process exits without first detaching all
43processes it has attached, those processes will be killed.
44.Pp
45Most of the time, the traced process runs normally, but when it
46receives a signal
47(see
48.Xr sigaction 2 ) ,
49it stops.
50The tracing process is expected to notice this via
51.Xr wait 2
52or the delivery of a
53.Dv SIGCHLD
54signal, examine the state of the stopped process, and cause it to
55terminate or continue as appropriate.
56The signal may be a normal process signal, generated as a result of
57traced process behavior, or use of the
58.Xr kill 2
59system call; alternatively, it may be generated by the tracing facility
60as a result of attaching, stepping by the tracing
61process,
62or an event in the traced process.
63The tracing process may choose to intercept the signal, using it to
64observe process behavior (such as
65.Dv SIGTRAP ) ,
66or forward the signal to the process if appropriate.
67The
68.Fn ptrace
69system call
70is the mechanism by which all this happens.
71.Pp
72A traced process may report additional signal stops corresponding to
73events in the traced process.
74These additional signal stops are reported as
75.Dv SIGTRAP
76or
77.Dv SIGSTOP
78signals.
79The tracing process can use the
80.Dv PT_LWPINFO
81request to determine which events are associated with a
82.Dv SIGTRAP
83or
84.Dv SIGSTOP
85signal.
86Note that multiple events may be associated with a single signal.
87For example, events indicated by the
88.Dv PL_FLAG_BORN ,
89.Dv PL_FLAG_FORKED ,
90and
91.Dv PL_FLAG_EXEC
92flags are also reported as a system call exit event
93.Pq Dv PL_FLAG_SCX .
94The signal stop for a new child process enabled via
95.Dv PTRACE_FORK
96will report a
97.Dv SIGSTOP
98signal.
99All other additional signal stops use
100.Dv SIGTRAP .
101.Sh DETACH AND TERMINATION
102.Pp
103Normally, exiting tracing process should wait for all pending
104debugging events and then detach from all alive traced processes
105before exiting using
106.Dv PT_DETACH
107request.
108If tracing process exits without detaching, for instance due to abnormal
109termination, the destiny of the traced children processes is determined
110by the
111.Dv kern.kill_on_debugger_exit
112sysctl control.
113.Pp
114If the control is set to the default value 1, such traced processes
115are terminated.
116If set to zero, kernel implicitly detaches traced processes.
117Traced processes are un-stopped if needed, and then continue the execution
118without tracing.
119Kernel drops any
120.Dv SIGTRAP
121signals queued to the traced children, which could be either generated by
122not yet consumed debug events, or sent by other means, the later should
123not be done anyway.
124.Sh SELECTING THE TARGET
125The
126.Fa pid
127argument of the call specifies the target on which to perform
128the requested operation.
129For operations affecting the global process state, the process ID
130is typically passed there.
131Similarly, for operations affecting only a thread, the thread ID
132needs to be passed.
133.Pp
134Still, for global operations, the ID of any thread can be used as the
135target, and system will perform the request on the process owning
136that thread.
137If a thread operation got the process ID as
138.Fa pid ,
139the system randomly selects a thread from among the threads owned
140by the process.
141For single-threaded processes there is no difference between specifying
142process or thread ID as the target.
143.Sh DISABLING PTRACE
144The
145.Nm
146subsystem provides rich facilities to manipulate other processes state.
147Sometimes it may be desirable to disallow it either completely, or limit
148its scope.
149The following controls are provided for this:
150.Bl -tag -width security.bsd.unprivileged_proc_debug
151.It Dv security.bsd.allow_ptrace
152Setting this sysctl to zero makes
153.Nm
154return
155.Er ENOSYS
156always as if the syscall is not implemented by the kernel.
157.It Dv security.bsd.unprivileged_proc_debug
158Setting this sysctl to zero disallows the use of
159.Fn ptrace
160by unprivileged processes.
161.It Dv security.bsd.see_other_uids
162Setting this sysctl to zero prevents
163.Fn ptrace
164requests from targeting processes with a real user identifier different
165from the caller's.
166These requests will fail with error
167.Er ESRCH .
168.It Dv security.bsd.see_other_gids
169Setting this sysctl to zero disallows
170.Fn ptrace
171requests from processes that have no groups in common with the target process,
172considering their sets of real and supplementary groups.
173These requests will fail with error
174.Er ESRCH .
175.It Dv security.bsd.see_jail_proc
176Setting this sysctl to zero disallows
177.Fn ptrace
178requests from processes belonging to a different jail than that of the target
179process, even if the requesting process' jail is an ancestor of the target
180process'.
181These requests will fail with error
182.Er ESRCH .
183.It Dv securelevel and init
184The
185.Xr init 1
186process can only be traced with
187.Nm
188if securelevel is zero.
189.It Dv procctl(2) PROC_TRACE_CTL
190Process can deny attempts to trace itself with
191.Xr procctl 2
192.Dv PROC_TRACE_CTL
193request.
194In this case requests return
195.Xr EPERM
196error.
197.El
198.Sh TRACING EVENTS
199.Pp
200Each traced process has a tracing event mask.
201An event in the traced process only reports a
202signal stop if the corresponding flag is set in the tracing event mask.
203The current set of tracing event flags include:
204.Bl -tag -width "Dv PTRACE_SYSCALL"
205.It Dv PTRACE_EXEC
206Report a stop for a successful invocation of
207.Xr execve 2 .
208This event is indicated by the
209.Dv PL_FLAG_EXEC
210flag in the
211.Va pl_flags
212member of
213.Vt "struct ptrace_lwpinfo" .
214.It Dv PTRACE_SCE
215Report a stop on each system call entry.
216This event is indicated by the
217.Dv PL_FLAG_SCE
218flag in the
219.Va pl_flags
220member of
221.Vt "struct ptrace_lwpinfo" .
222.It Dv PTRACE_SCX
223Report a stop on each system call exit.
224This event is indicated by the
225.Dv PL_FLAG_SCX
226flag in the
227.Va pl_flags
228member of
229.Vt "struct ptrace_lwpinfo" .
230.It Dv PTRACE_SYSCALL
231Report stops for both system call entry and exit.
232.It Dv PTRACE_FORK
233This event flag controls tracing for new child processes of a traced process.
234.Pp
235When this event flag is enabled,
236new child processes will enable tracing and stop before executing their
237first instruction.
238The new child process will include the
239.Dv PL_FLAG_CHILD
240flag in the
241.Va pl_flags
242member of
243.Vt "struct ptrace_lwpinfo" .
244The traced process will report a stop that includes the
245.Dv PL_FLAG_FORKED
246flag.
247The process ID of the new child process will also be present in the
248.Va pl_child_pid
249member of
250.Vt "struct ptrace_lwpinfo" .
251If the new child process was created via
252.Xr vfork 2 ,
253the traced process's stop will also include the
254.Dv PL_FLAG_VFORKED
255flag.
256Note that new child processes will be attached with the default
257tracing event mask;
258they do not inherit the event mask of the traced process.
259.Pp
260When this event flag is not enabled,
261new child processes will execute without tracing enabled.
262.It Dv PTRACE_LWP
263This event flag controls tracing of LWP
264.Pq kernel thread
265creation and destruction.
266When this event is enabled,
267new LWPs will stop and report an event with
268.Dv PL_FLAG_BORN
269set before executing their first instruction,
270and exiting LWPs will stop and report an event with
271.Dv PL_FLAG_EXITED
272set before completing their termination.
273.Pp
274Note that new processes do not report an event for the creation of their
275initial thread,
276and exiting processes do not report an event for the termination of the
277last thread.
278.It Dv PTRACE_VFORK
279Report a stop event when a parent process resumes after a
280.Xr vfork 2 .
281.Pp
282When a thread in the traced process creates a new child process via
283.Xr vfork 2 ,
284the stop that reports
285.Dv PL_FLAG_FORKED
286and
287.Dv PL_FLAG_SCX
288occurs just after the child process is created,
289but before the thread waits for the child process to stop sharing process
290memory.
291If a debugger is not tracing the new child process,
292it must ensure that no breakpoints are enabled in the shared process
293memory before detaching from the new child process.
294This means that no breakpoints are enabled in the parent process either.
295.Pp
296The
297.Dv PTRACE_VFORK
298flag enables a new stop that indicates when the new child process stops
299sharing the process memory of the parent process.
300A debugger can reinsert breakpoints in the parent process and resume it
301in response to this event.
302This event is indicated by setting the
303.Dv PL_FLAG_VFORK_DONE
304flag.
305.El
306.Pp
307The default tracing event mask when attaching to a process via
308.Dv PT_ATTACH ,
309.Dv PT_TRACE_ME ,
310or
311.Dv PTRACE_FORK
312includes only
313.Dv PTRACE_EXEC
314events.
315All other event flags are disabled.
316.Sh PTRACE REQUESTS
317.Pp
318The
319.Fa request
320argument specifies what operation is being performed; the meaning of
321the rest of the arguments depends on the operation, but except for one
322special case noted below, all
323.Fn ptrace
324calls are made by the tracing process, and the
325.Fa pid
326argument specifies the process ID of the traced process
327or a corresponding thread ID.
328The
329.Fa request
330argument
331can be:
332.Bl -tag -width "Dv PT_GET_EVENT_MASK"
333.It Dv PT_TRACE_ME
334This request is the only one used by the traced process; it declares
335that the process expects to be traced by its parent.
336All the other arguments are ignored.
337(If the parent process does not expect to trace the child, it will
338probably be rather confused by the results; once the traced process
339stops, it cannot be made to continue except via
340.Fn ptrace . )
341When a process has used this request and calls
342.Xr execve 2
343or any of the routines built on it
344(such as
345.Xr execv 3 ) ,
346it will stop before executing the first instruction of the new image.
347Also, any setuid or setgid bits on the executable being executed will
348be ignored.
349If the child was created by
350.Xr vfork 2
351system call or
352.Xr rfork 2
353call with the
354.Dv RFMEM
355flag specified, the debugging events are reported to the parent
356only after the
357.Xr execve 2
358is executed.
359.It Dv PT_READ_I , Dv PT_READ_D
360These requests read a single
361.Vt int
362of data from the traced process's address space.
363Traditionally,
364.Fn ptrace
365has allowed for machines with distinct address spaces for instruction
366and data, which is why there are two requests: conceptually,
367.Dv PT_READ_I
368reads from the instruction space and
369.Dv PT_READ_D
370reads from the data space.
371In the current
372.Fx
373implementation, these two requests are completely identical.
374The
375.Fa addr
376argument specifies the address
377(in the traced process's virtual address space)
378at which the read is to be done.
379This address does not have to meet any alignment constraints.
380The value read is returned as the return value from
381.Fn ptrace .
382.It Dv PT_WRITE_I , Dv PT_WRITE_D
383These requests parallel
384.Dv PT_READ_I
385and
386.Dv PT_READ_D ,
387except that they write rather than read.
388The
389.Fa data
390argument supplies the value to be written.
391.It Dv PT_IO
392This request allows reading and writing arbitrary amounts of data in
393the traced process's address space.
394The
395.Fa addr
396argument specifies a pointer to a
397.Vt "struct ptrace_io_desc" ,
398which is defined as follows:
399.Bd -literal
400struct ptrace_io_desc {
401	int	piod_op;	/* I/O operation */
402	void	*piod_offs;	/* child offset */
403	void	*piod_addr;	/* parent offset */
404	size_t	piod_len;	/* request length */
405};
406
407/*
408 * Operations in piod_op.
409 */
410#define PIOD_READ_D	1	/* Read from D space */
411#define PIOD_WRITE_D	2	/* Write to D space */
412#define PIOD_READ_I	3	/* Read from I space */
413#define PIOD_WRITE_I	4	/* Write to I space */
414.Ed
415.Pp
416The
417.Fa data
418argument is ignored.
419The actual number of bytes read or written is stored in
420.Va piod_len
421upon return.
422.It Dv PT_CONTINUE
423The traced process continues execution.
424The
425.Fa addr
426argument
427is an address specifying the place where execution is to be resumed
428(a new value for the program counter),
429or
430.Po Vt caddr_t Pc Ns 1
431to indicate that execution is to pick up where it left off.
432The
433.Fa data
434argument
435provides a signal number to be delivered to the traced process as it
436resumes execution, or 0 if no signal is to be sent.
437.It Dv PT_STEP
438The traced process is single stepped one instruction.
439The
440.Fa addr
441argument
442should be passed
443.Po Vt caddr_t Pc Ns 1 .
444The
445.Fa data
446argument
447provides a signal number to be delivered to the traced process as it
448resumes execution, or 0 if no signal is to be sent.
449.It Dv PT_KILL
450The traced process terminates, as if
451.Dv PT_CONTINUE
452had been used with
453.Dv SIGKILL
454given as the signal to be delivered.
455.It Dv PT_ATTACH
456This request allows a process to gain control of an otherwise
457unrelated process and begin tracing it.
458It does not need any cooperation from the process to trace.
459In
460this case,
461.Fa pid
462specifies the process ID of the process to trace, and the other
463two arguments are ignored.
464This request requires that the target process must have the same real
465UID as the tracing process, and that it must not be executing a setuid
466or setgid executable.
467(If the tracing process is running as root, these restrictions do not
468apply.)
469The tracing process will see the newly-traced process stop and may
470then control it as if it had been traced all along.
471.It Dv PT_DETACH
472This request is like PT_CONTINUE, except that it does not allow
473specifying an alternate place to continue execution, and after it
474succeeds, the traced process is no longer traced and continues
475execution normally.
476.It Dv PT_GETREGS
477This request reads the traced process's machine registers into the
478.Do
479.Vt "struct reg"
480.Dc
481(defined in
482.In machine/reg.h )
483pointed to by
484.Fa addr .
485.It Dv PT_SETREGS
486This request is the converse of
487.Dv PT_GETREGS ;
488it loads the traced process's machine registers from the
489.Do
490.Vt "struct reg"
491.Dc
492(defined in
493.In machine/reg.h )
494pointed to by
495.Fa addr .
496.It Dv PT_GETFPREGS
497This request reads the traced process's floating-point registers into
498the
499.Do
500.Vt "struct fpreg"
501.Dc
502(defined in
503.In machine/reg.h )
504pointed to by
505.Fa addr .
506.It Dv PT_SETFPREGS
507This request is the converse of
508.Dv PT_GETFPREGS ;
509it loads the traced process's floating-point registers from the
510.Do
511.Vt "struct fpreg"
512.Dc
513(defined in
514.In machine/reg.h )
515pointed to by
516.Fa addr .
517.It Dv PT_GETDBREGS
518This request reads the traced process's debug registers into
519the
520.Do
521.Vt "struct dbreg"
522.Dc
523(defined in
524.In machine/reg.h )
525pointed to by
526.Fa addr .
527.It Dv PT_SETDBREGS
528This request is the converse of
529.Dv PT_GETDBREGS ;
530it loads the traced process's debug registers from the
531.Do
532.Vt "struct dbreg"
533.Dc
534(defined in
535.In machine/reg.h )
536pointed to by
537.Fa addr .
538.It Dv PT_GETREGSET
539This request reads the registers from the traced process.
540The
541.Fa data
542argument specifies the register set to read, with the
543.Fa addr
544argument pointing at a
545.Vt "struct iovec"
546where the
547.Va iov_base
548field points to a register set specific structure to hold the registers,
549and the
550.Va iov_len
551field holds the length of the structure.
552.It Dv PT_SETREGSET
553This request writes to the registers of the traced process.
554The
555.Fa data
556argument specifies the register set to write to, with the
557.Fa addr
558argument pointing at a
559.Vt "struct iovec"
560where the
561.Va iov_base
562field points to a register set specific structure to hold the registers,
563and the
564.Va iov_len
565field holds the length of the structure.
566If
567.Va iov_base
568is NULL the kernel will return the expected length of the register set
569specific structure in the
570.Va iov_len
571field and not change the target register set.
572.It Dv PT_LWPINFO
573This request can be used to obtain information about the kernel thread,
574also known as light-weight process, that caused the traced process to stop.
575The
576.Fa addr
577argument specifies a pointer to a
578.Vt "struct ptrace_lwpinfo" ,
579which is defined as follows:
580.Bd -literal
581struct ptrace_lwpinfo {
582	lwpid_t pl_lwpid;
583	int	pl_event;
584	int	pl_flags;
585	sigset_t pl_sigmask;
586	sigset_t pl_siglist;
587	siginfo_t pl_siginfo;
588	char	pl_tdname[MAXCOMLEN + 1];
589	pid_t	pl_child_pid;
590	u_int	pl_syscall_code;
591	u_int	pl_syscall_narg;
592};
593.Ed
594.Pp
595The
596.Fa data
597argument is to be set to the size of the structure known to the caller.
598This allows the structure to grow without affecting older programs.
599.Pp
600The fields in the
601.Vt "struct ptrace_lwpinfo"
602have the following meaning:
603.Bl -tag -width indent -compact
604.It Va pl_lwpid
605LWP id of the thread
606.It Va pl_event
607Event that caused the stop.
608Currently defined events are:
609.Bl -tag -width "Dv PL_EVENT_SIGNAL" -compact
610.It Dv PL_EVENT_NONE
611No reason given
612.It Dv PL_EVENT_SIGNAL
613Thread stopped due to the pending signal
614.El
615.It Va pl_flags
616Flags that specify additional details about observed stop.
617Currently defined flags are:
618.Bl -tag -width indent -compact
619.It Dv PL_FLAG_SCE
620The thread stopped due to system call entry, right after the kernel is entered.
621The debugger may examine syscall arguments that are stored in memory and
622registers according to the ABI of the current process, and modify them,
623if needed.
624.It Dv PL_FLAG_SCX
625The thread is stopped immediately before syscall is returning to the usermode.
626The debugger may examine system call return values in the ABI-defined registers
627and/or memory.
628.It Dv PL_FLAG_EXEC
629When
630.Dv PL_FLAG_SCX
631is set, this flag may be additionally specified to inform that the
632program being executed by debuggee process has been changed by successful
633execution of a system call from the
634.Fn execve 2
635family.
636.It Dv PL_FLAG_SI
637Indicates that
638.Va pl_siginfo
639member of
640.Vt "struct ptrace_lwpinfo"
641contains valid information.
642.It Dv PL_FLAG_FORKED
643Indicates that the process is returning from a call to
644.Fn fork 2
645that created a new child process.
646The process identifier of the new process is available in the
647.Va pl_child_pid
648member of
649.Vt "struct ptrace_lwpinfo" .
650.It Dv PL_FLAG_CHILD
651The flag is set for first event reported from a new child which is
652automatically attached when
653.Dv PTRACE_FORK
654is enabled.
655.It Dv PL_FLAG_BORN
656This flag is set for the first event reported from a new LWP when
657.Dv PTRACE_LWP
658is enabled.
659It is reported along with
660.Dv PL_FLAG_SCX .
661.It Dv PL_FLAG_EXITED
662This flag is set for the last event reported by an exiting LWP when
663.Dv PTRACE_LWP
664is enabled.
665Note that this event is not reported when the last LWP in a process exits.
666The termination of the last thread is reported via a normal process exit
667event.
668.It Dv PL_FLAG_VFORKED
669Indicates that the thread is returning from a call to
670.Xr vfork 2
671that created a new child process.
672This flag is set in addition to
673.Dv PL_FLAG_FORKED .
674.It Dv PL_FLAG_VFORK_DONE
675Indicates that the thread has resumed after a child process created via
676.Xr vfork 2
677has stopped sharing its address space with the traced process.
678.El
679.It Va pl_sigmask
680The current signal mask of the LWP
681.It Va pl_siglist
682The current pending set of signals for the LWP.
683Note that signals that are delivered to the process would not appear
684on an LWP siglist until the thread is selected for delivery.
685.It Va pl_siginfo
686The siginfo that accompanies the signal pending.
687Only valid for
688.Dv PL_EVENT_SIGNAL
689stop when
690.Dv PL_FLAG_SI
691is set in
692.Va pl_flags .
693.It Va pl_tdname
694The name of the thread.
695.It Va pl_child_pid
696The process identifier of the new child process.
697Only valid for a
698.Dv PL_EVENT_SIGNAL
699stop when
700.Dv PL_FLAG_FORKED
701is set in
702.Va pl_flags .
703.It Va pl_syscall_code
704The ABI-specific identifier of the current system call.
705Note that for indirect system calls this field reports the indirected
706system call.
707Only valid when
708.Dv PL_FLAG_SCE
709or
710.Dv PL_FLAG_SCX
711is set in
712.Va pl_flags .
713.It Va pl_syscall_narg
714The number of arguments passed to the current system call not counting
715the system call identifier.
716Note that for indirect system calls this field reports the arguments
717passed to the indirected system call.
718Only valid when
719.Dv PL_FLAG_SCE
720or
721.Dv PL_FLAG_SCX
722is set in
723.Va pl_flags .
724.El
725.It Dv PT_GETNUMLWPS
726This request returns the number of kernel threads associated with the
727traced process.
728.It Dv PT_GETLWPLIST
729This request can be used to get the current thread list.
730A pointer to an array of type
731.Vt lwpid_t
732should be passed in
733.Fa addr ,
734with the array size specified by
735.Fa data .
736The return value from
737.Fn ptrace
738is the count of array entries filled in.
739.It Dv PT_SETSTEP
740This request will turn on single stepping of the specified process.
741Stepping is automatically disabled when a single step trap is caught.
742.It Dv PT_CLEARSTEP
743This request will turn off single stepping of the specified process.
744.It Dv PT_SUSPEND
745This request will suspend the specified thread.
746.It Dv PT_RESUME
747This request will resume the specified thread.
748.It Dv PT_TO_SCE
749This request will set the
750.Dv PTRACE_SCE
751event flag to trace all future system call entries and continue the process.
752The
753.Fa addr
754and
755.Fa data
756arguments are used the same as for
757.Dv PT_CONTINUE .
758.It Dv PT_TO_SCX
759This request will set the
760.Dv PTRACE_SCX
761event flag to trace all future system call exits and continue the process.
762The
763.Fa addr
764and
765.Fa data
766arguments are used the same as for
767.Dv PT_CONTINUE .
768.It Dv PT_SYSCALL
769This request will set the
770.Dv PTRACE_SYSCALL
771event flag to trace all future system call entries and exits and continue
772the process.
773The
774.Fa addr
775and
776.Fa data
777arguments are used the same as for
778.Dv PT_CONTINUE .
779.It Dv PT_GET_SC_ARGS
780For the thread which is stopped in either
781.Dv PL_FLAG_SCE
782or
783.Dv PL_FLAG_SCX
784state, that is, on entry or exit to a syscall,
785this request fetches the syscall arguments.
786.Pp
787The arguments are copied out into the buffer pointed to by the
788.Fa addr
789pointer, sequentially.
790Each syscall argument is stored as the machine word.
791Kernel copies out as many arguments as the syscall accepts,
792see the
793.Va pl_syscall_narg
794member of the
795.Vt struct ptrace_lwpinfo ,
796but not more than the
797.Fa data
798bytes in total are copied.
799.It Dv PT_GET_SC_RET
800Fetch the system call return values on exit from a syscall.
801This request is only valid for threads stopped in a syscall
802exit (the
803.Dv PL_FLAG_SCX
804state).
805The
806.Fa addr
807argument specifies a pointer to a
808.Vt "struct ptrace_sc_ret" ,
809which is defined as follows:
810.Bd -literal
811struct ptrace_sc_ret {
812	register_t	sr_retval[2];
813	int		sr_error;
814};
815.Ed
816.Pp
817The
818.Fa data
819argument is set to the size of the structure.
820.Pp
821If the system call completed successfully,
822.Va sr_error
823is set to zero and the return values of the system call are saved in
824.Va sr_retval .
825If the system call failed to execute,
826.Va sr_error
827field is set to a positive
828.Xr errno 2
829value.
830If the system call completed in an unusual fashion,
831.Va sr_error
832is set to a negative value:
833.Bl -tag -width Dv EJUSTRETURN -compact
834.It Dv ERESTART
835System call will be restarted.
836.It Dv EJUSTRETURN
837System call completed sucessfully but did not set a return value
838.Po for example,
839.Xr setcontext 2
840and
841.Xr sigreturn 2
842.Pc .
843.El
844.It Dv PT_FOLLOW_FORK
845This request controls tracing for new child processes of a traced process.
846If
847.Fa data
848is non-zero,
849.Dv PTRACE_FORK
850is set in the traced process's event tracing mask.
851If
852.Fa data
853is zero,
854.Dv PTRACE_FORK
855is cleared from the traced process's event tracing mask.
856.It Dv PT_LWP_EVENTS
857This request controls tracing of LWP creation and destruction.
858If
859.Fa data
860is non-zero,
861.Dv PTRACE_LWP
862is set in the traced process's event tracing mask.
863If
864.Fa data
865is zero,
866.Dv PTRACE_LWP
867is cleared from the traced process's event tracing mask.
868.It Dv PT_GET_EVENT_MASK
869This request reads the traced process's event tracing mask into the
870integer pointed to by
871.Fa addr .
872The size of the integer must be passed in
873.Fa data .
874.It Dv PT_SET_EVENT_MASK
875This request sets the traced process's event tracing mask from the
876integer pointed to by
877.Fa addr .
878The size of the integer must be passed in
879.Fa data .
880.It Dv PT_VM_TIMESTAMP
881This request returns the generation number or timestamp of the memory map of
882the traced process as the return value from
883.Fn ptrace .
884This provides a low-cost way for the tracing process to determine if the
885VM map changed since the last time this request was made.
886.It Dv PT_VM_ENTRY
887This request is used to iterate over the entries of the VM map of the traced
888process.
889The
890.Fa addr
891argument specifies a pointer to a
892.Vt "struct ptrace_vm_entry" ,
893which is defined as follows:
894.Bd -literal
895struct ptrace_vm_entry {
896	int		pve_entry;
897	int		pve_timestamp;
898	u_long		pve_start;
899	u_long		pve_end;
900	u_long		pve_offset;
901	u_int		pve_prot;
902	u_int		pve_pathlen;
903	long		pve_fileid;
904	uint32_t	pve_fsid;
905	char		*pve_path;
906};
907.Ed
908.Pp
909The first entry is returned by setting
910.Va pve_entry
911to zero.
912Subsequent entries are returned by leaving
913.Va pve_entry
914unmodified from the value returned by previous requests.
915The
916.Va pve_timestamp
917field can be used to detect changes to the VM map while iterating over the
918entries.
919The tracing process can then take appropriate action, such as restarting.
920By setting
921.Va pve_pathlen
922to a non-zero value on entry, the pathname of the backing object is returned
923in the buffer pointed to by
924.Va pve_path ,
925provided the entry is backed by a vnode.
926The
927.Va pve_pathlen
928field is updated with the actual length of the pathname (including the
929terminating null character).
930The
931.Va pve_offset
932field is the offset within the backing object at which the range starts.
933The range is located in the VM space at
934.Va pve_start
935and extends up to
936.Va pve_end
937(inclusive).
938.Pp
939The
940.Fa data
941argument is ignored.
942.It Dv PT_COREDUMP
943This request creates a coredump for the stopped program.
944The
945.Fa addr
946argument specifies a pointer to a
947.Vt "struct ptrace_coredump" ,
948which is defined as follows:
949.Bd -literal
950struct ptrace_coredump {
951	int		pc_fd;
952	uint32_t	pc_flags;
953	off_t		pc_limit;
954};
955.Ed
956The fields of the structure are:
957.Bl -tag -width pc_flags
958.It Dv pc_fd
959File descriptor to write the dump to.
960It must refer to a regular file, opened for writing.
961.It Dv pc_flags
962Flags.
963The following flags are defined:
964.Bl -tag -width PC_COMPRESS
965.It Dv PC_COMPRESS
966Request compression of the dump.
967.It Dv PC_ALL
968Include non-dumpable entries into the dump.
969The dumper ignores
970.Dv MAP_NOCORE
971flag of the process map entry, but device mappings are not dumped even with
972.Dv PC_ALL
973set.
974.El
975.It Dv pc_limit
976Maximum size of the coredump.
977Specify zero for no limit.
978.El
979.Pp
980The size of
981.Vt "struct ptrace_coredump"
982must be passed in
983.Fa data .
984.It Dv PT_SC_REMOTE
985Request to execute a syscall in the context of the traced process,
986in the specified thread.
987The
988.Fa addr
989argument must point to the
990.Vt "struct ptrace_sc_remote" ,
991which describes the requested syscall and its arguments, and receives
992the result.
993The size of
994.Vt "struct ptrace_sc_remote"
995must be passed in
996.Fa data.
997.Bd -literal
998struct ptrace_sc_remote {
999	struct ptrace_sc_ret pscr_ret;
1000	u_int	pscr_syscall;
1001	u_int	pscr_nargs;
1002	u_long	*pscr_args;
1003};
1004.Ed
1005The
1006.Dv pscr_syscall
1007contains the syscall number to execute, the
1008.Dv pscr_nargs
1009is the number of supplied arguments, which are supplied in the
1010.Dv pscr_args
1011array.
1012Result of the execution is returned in the
1013.Dv pscr_ret
1014member.
1015Note that the request and its result do not affect the returned value from
1016the currently executed syscall, if any.
1017.El
1018.Sh PT_COREDUMP and PT_SC_REMOTE usage
1019The process must be stopped before dumping or initiating a remote system call.
1020A single thread in the target process is temporarily unsuspended
1021in the kernel to perform the action.
1022If the
1023.Nm
1024call fails before a thread is unsuspended, there is no event to
1025.Xr waitpid 2
1026for.
1027If a thread was unsuspended, it will stop again before the
1028.Nm
1029call returns, and the process must be waited upon using
1030.Xr waitpid 2
1031to consume the new stop event.
1032Since it is hard to deduce whether a thread was unsuspended before
1033an error occurred, it is recommended to unconditionally perform
1034.Xr waitpid 2
1035with
1036.Dv WNOHANG
1037flag after
1038.Dv PT_COREDUMP
1039and
1040.Dv PT_SC_REMOTE ,
1041and silently accept zero result from it.
1042.Pp
1043For
1044.Dv PT_SC_REMOTE ,
1045the selected thread must be stopped in the safe place, which is
1046currently defined as a syscall exit, or a return from kernel to
1047user mode (basically, a signal handler call place).
1048Kernel returns
1049.Er EBUSY
1050status if attempt is made to execute remote syscall at unsafe stop.
1051.Pp
1052Note that neither
1053.Dv kern.trap_enotcap
1054sysctl setting, nor the corresponding
1055.Xr procctl 2
1056flag
1057.Dv PROC_TRAPCAP_CTL_ENABLE
1058are obeyed during the execution of the syscall by
1059.Dv PT_SC_REMOTE .
1060In other words,
1061.Dv SIGTRAP
1062signal is not sent to a process executing in capability mode,
1063which violated a mode access restriction.
1064.Pp
1065Note that due to the mode of execution for the remote syscall, in
1066particular, the setting where only one thread is allowed to run,
1067the syscall might block on resources owned by suspended threads.
1068This might result in the target process deadlock.
1069In this situation, the only way out is to kill the target.
1070.Sh ARM MACHINE-SPECIFIC REQUESTS
1071.Bl -tag -width "Dv PT_SETVFPREGS"
1072.It Dv PT_GETVFPREGS
1073Return the thread's
1074.Dv VFP
1075machine state in the buffer pointed to by
1076.Fa addr .
1077.Pp
1078The
1079.Fa data
1080argument is ignored.
1081.It Dv PT_SETVFPREGS
1082Set the thread's
1083.Dv VFP
1084machine state from the buffer pointed to by
1085.Fa addr .
1086.Pp
1087The
1088.Fa data
1089argument is ignored.
1090.El
1091.Sh x86 MACHINE-SPECIFIC REQUESTS
1092.Bl -tag -width "Dv PT_GETXSTATE_INFO"
1093.It Dv PT_GETXMMREGS
1094Copy the XMM FPU state into the buffer pointed to by the
1095argument
1096.Fa addr .
1097The buffer has the same layout as the 32-bit save buffer for the
1098machine instruction
1099.Dv FXSAVE .
1100.Pp
1101This request is only valid for i386 programs, both on native 32-bit
1102systems and on amd64 kernels.
1103For 64-bit amd64 programs, the XMM state is reported as part of
1104the FPU state returned by the
1105.Dv PT_GETFPREGS
1106request.
1107.Pp
1108The
1109.Fa data
1110argument is ignored.
1111.It Dv PT_SETXMMREGS
1112Load the XMM FPU state for the thread from the buffer pointed to
1113by the argument
1114.Fa addr .
1115The buffer has the same layout as the 32-bit load buffer for the
1116machine instruction
1117.Dv FXRSTOR .
1118.Pp
1119As with
1120.Dv PT_GETXMMREGS ,
1121this request is only valid for i386 programs.
1122.Pp
1123The
1124.Fa data
1125argument is ignored.
1126.It Dv PT_GETXSTATE_INFO
1127Report which XSAVE FPU extensions are supported by the CPU
1128and allowed in userspace programs.
1129The
1130.Fa addr
1131argument must point to a variable of type
1132.Vt struct ptrace_xstate_info ,
1133which contains the information on the request return.
1134.Vt struct ptrace_xstate_info
1135is defined as follows:
1136.Bd -literal
1137struct ptrace_xstate_info {
1138	uint64_t	xsave_mask;
1139	uint32_t	xsave_len;
1140};
1141.Ed
1142The
1143.Dv xsave_mask
1144field is a bitmask of the currently enabled extensions.
1145The meaning of the bits is defined in the Intel and AMD
1146processor documentation.
1147The
1148.Dv xsave_len
1149field reports the length of the XSAVE area for storing the hardware
1150state for currently enabled extensions in the format defined by the x86
1151.Dv XSAVE
1152machine instruction.
1153.Pp
1154The
1155.Fa data
1156argument value must be equal to the size of the
1157.Vt struct ptrace_xstate_info .
1158.It Dv PT_GETXSTATE
1159Return the content of the XSAVE area for the thread.
1160The
1161.Fa addr
1162argument points to the buffer where the content is copied, and the
1163.Fa data
1164argument specifies the size of the buffer.
1165The kernel copies out as much content as allowed by the buffer size.
1166The buffer layout is specified by the layout of the save area for the
1167.Dv XSAVE
1168machine instruction.
1169.It Dv PT_SETXSTATE
1170Load the XSAVE state for the thread from the buffer specified by the
1171.Fa addr
1172pointer.
1173The buffer size is passed in the
1174.Fa data
1175argument.
1176The buffer must be at least as large as the
1177.Vt struct savefpu
1178(defined in
1179.Pa x86/fpu.h )
1180to allow the complete x87 FPU and XMM state load.
1181It must not be larger than the XSAVE state length, as reported by the
1182.Dv xsave_len
1183field from the
1184.Vt struct ptrace_xstate_info
1185of the
1186.Dv PT_GETXSTATE_INFO
1187request.
1188Layout of the buffer is identical to the layout of the load area for the
1189.Dv XRSTOR
1190machine instruction.
1191.It Dv PT_GETFSBASE
1192Return the value of the base used when doing segmented
1193memory addressing using the %fs segment register.
1194The
1195.Fa addr
1196argument points to an
1197.Vt unsigned long
1198variable where the base value is stored.
1199.Pp
1200The
1201.Fa data
1202argument is ignored.
1203.It Dv PT_GETGSBASE
1204Like the
1205.Dv PT_GETFSBASE
1206request, but returns the base for the %gs segment register.
1207.It Dv PT_SETFSBASE
1208Set the base for the %fs segment register to the value pointed to
1209by the
1210.Fa addr
1211argument.
1212.Fa addr
1213must point to the
1214.Vt unsigned long
1215variable containing the new base.
1216.Pp
1217The
1218.Fa data
1219argument is ignored.
1220.It Dv PT_SETGSBASE
1221Like the
1222.Dv PT_SETFSBASE
1223request, but sets the base for the %gs segment register.
1224.El
1225.Sh PowerPC MACHINE-SPECIFIC REQUESTS
1226.Bl -tag -width "Dv PT_SETVRREGS"
1227.It Dv PT_GETVRREGS
1228Return the thread's
1229.Dv ALTIVEC
1230machine state in the buffer pointed to by
1231.Fa addr .
1232.Pp
1233The
1234.Fa data
1235argument is ignored.
1236.It Dv PT_SETVRREGS
1237Set the thread's
1238.Dv ALTIVEC
1239machine state from the buffer pointed to by
1240.Fa addr .
1241.Pp
1242The
1243.Fa data
1244argument is ignored.
1245.It Dv PT_GETVSRREGS
1246Return doubleword 1 of the thread's
1247.Dv VSX
1248registers VSR0-VSR31 in the buffer pointed to by
1249.Fa addr .
1250.Pp
1251The
1252.Fa data
1253argument is ignored.
1254.It Dv PT_SETVSRREGS
1255Set doubleword 1 of the thread's
1256.Dv VSX
1257registers VSR0-VSR31 from the buffer pointed to by
1258.Fa addr .
1259.Pp
1260The
1261.Fa data
1262argument is ignored.
1263.El
1264.Pp
1265Additionally, other machine-specific requests can exist.
1266.Sh RETURN VALUES
1267Most requests return 0 on success and \-1 on error.
1268Some requests can cause
1269.Fn ptrace
1270to return
1271\-1
1272as a non-error value, among them are
1273.Dv PT_READ_I
1274and
1275.Dv PT_READ_D ,
1276which return the value read from the process memory on success.
1277To disambiguate,
1278.Va errno
1279can be set to 0 before the call and checked afterwards.
1280.Pp
1281The current
1282.Fn ptrace
1283implementation always sets
1284.Va errno
1285to 0 before calling into the kernel, both for historic reasons and for
1286consistency with other operating systems.
1287It is recommended to assign zero to
1288.Va errno
1289explicitly for forward compatibility.
1290.Sh ERRORS
1291The
1292.Fn ptrace
1293system call may fail if:
1294.Bl -tag -width Er
1295.It Bq Er ESRCH
1296.Bl -bullet -compact
1297.It
1298No process having the specified process ID exists.
1299.El
1300.It Bq Er EINVAL
1301.Bl -bullet -compact
1302.It
1303A process attempted to use
1304.Dv PT_ATTACH
1305on itself.
1306.It
1307The
1308.Fa request
1309argument
1310was not one of the legal requests.
1311.It
1312The signal number
1313(in
1314.Fa data )
1315to
1316.Dv PT_CONTINUE
1317was neither 0 nor a legal signal number.
1318.It
1319.Dv PT_GETREGS ,
1320.Dv PT_SETREGS ,
1321.Dv PT_GETFPREGS ,
1322.Dv PT_SETFPREGS ,
1323.Dv PT_GETDBREGS ,
1324or
1325.Dv PT_SETDBREGS
1326was attempted on a process with no valid register set.
1327(This is normally true only of system processes.)
1328.It
1329.Dv PT_VM_ENTRY
1330was given an invalid value for
1331.Fa pve_entry .
1332This can also be caused by changes to the VM map of the process.
1333.It
1334The size (in
1335.Fa data )
1336provided to
1337.Dv PT_LWPINFO
1338was less than or equal to zero, or larger than the
1339.Vt ptrace_lwpinfo
1340structure known to the kernel.
1341.It
1342The size (in
1343.Fa data )
1344provided to the x86-specific
1345.Dv PT_GETXSTATE_INFO
1346request was not equal to the size of the
1347.Vt struct ptrace_xstate_info .
1348.It
1349The size (in
1350.Fa data )
1351provided to the x86-specific
1352.Dv PT_SETXSTATE
1353request was less than the size of the x87 plus the XMM save area.
1354.It
1355The size (in
1356.Fa data )
1357provided to the x86-specific
1358.Dv PT_SETXSTATE
1359request was larger than returned in the
1360.Dv xsave_len
1361member of the
1362.Vt struct ptrace_xstate_info
1363from the
1364.Dv PT_GETXSTATE_INFO
1365request.
1366.It
1367The base value, provided to the amd64-specific requests
1368.Dv PT_SETFSBASE
1369or
1370.Dv PT_SETGSBASE ,
1371pointed outside of the valid user address space.
1372This error will not occur in 32-bit programs.
1373.El
1374.It Bq Er EBUSY
1375.Bl -bullet -compact
1376.It
1377.Dv PT_ATTACH
1378was attempted on a process that was already being traced.
1379.It
1380A request attempted to manipulate a process that was being traced by
1381some process other than the one making the request.
1382.It
1383A request
1384(other than
1385.Dv PT_ATTACH )
1386specified a process that was not stopped.
1387.El
1388.It Bq Er EPERM
1389.Bl -bullet -compact
1390.It
1391A request
1392(other than
1393.Dv PT_ATTACH )
1394attempted to manipulate a process that was not being traced at all.
1395.It
1396An attempt was made to use
1397.Dv PT_ATTACH
1398on a process in violation of the requirements listed under
1399.Dv PT_ATTACH
1400above.
1401.El
1402.It Bq Er ENOENT
1403.Bl -bullet -compact
1404.It
1405.Dv PT_VM_ENTRY
1406previously returned the last entry of the memory map.
1407No more entries exist.
1408.El
1409.It Bq Er ENOMEM
1410.Bl -bullet -compact
1411.It
1412A
1413.Dv PT_READ_I,
1414.Dv PT_READ_D,
1415.Dv PT_WRITE_I, or
1416.Dv PT_WRITE_D
1417request attempted to access an invalid address, or a memory allocation failure
1418occurred when accessing process memory.
1419.El
1420.It Bq Er ENAMETOOLONG
1421.Bl -bullet -compact
1422.It
1423.Dv PT_VM_ENTRY
1424cannot return the pathname of the backing object because the buffer is not big
1425enough.
1426.Fa pve_pathlen
1427holds the minimum buffer size required on return.
1428.El
1429.El
1430.Sh SEE ALSO
1431.Xr execve 2 ,
1432.Xr sigaction 2 ,
1433.Xr wait 2 ,
1434.Xr execv 3 ,
1435.Xr i386_clr_watch 3 ,
1436.Xr i386_set_watch 3
1437.Sh HISTORY
1438The
1439.Fn ptrace
1440function appeared in
1441.At v6 .
1442