2020-07-30 23:38:15 +02:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright notice, this
|
|
|
|
* list of conditions and the following disclaimer.
|
|
|
|
*
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
|
|
* and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
|
|
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
|
|
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
|
|
|
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
2020-09-11 21:11:07 -06:00
|
|
|
#include <AK/ScopeGuard.h>
|
2020-07-30 23:38:15 +02:00
|
|
|
#include <Kernel/Process.h>
|
|
|
|
#include <Kernel/Ptrace.h>
|
|
|
|
#include <Kernel/VM/MemoryManager.h>
|
|
|
|
#include <Kernel/VM/PrivateInodeVMObject.h>
|
|
|
|
#include <Kernel/VM/ProcessPagingScope.h>
|
|
|
|
#include <Kernel/VM/Region.h>
|
|
|
|
#include <Kernel/VM/SharedInodeVMObject.h>
|
|
|
|
|
|
|
|
namespace Kernel {
|
|
|
|
|
2020-08-01 15:25:19 -07:00
|
|
|
int Process::sys$ptrace(Userspace<const Syscall::SC_ptrace_params*> user_params)
|
2020-07-30 23:38:15 +02:00
|
|
|
{
|
2021-01-11 22:30:57 +01:00
|
|
|
REQUIRE_PROMISE(ptrace);
|
2020-07-30 23:38:15 +02:00
|
|
|
Syscall::SC_ptrace_params params;
|
2020-09-11 21:11:07 -06:00
|
|
|
if (!copy_from_user(¶ms, user_params))
|
2020-07-30 23:38:15 +02:00
|
|
|
return -EFAULT;
|
|
|
|
auto result = Ptrace::handle_syscall(params, *this);
|
2021-01-20 23:11:17 +01:00
|
|
|
return result.is_error() ? result.error().error() : result.value();
|
2020-07-30 23:38:15 +02:00
|
|
|
}
|
|
|
|
|
2020-08-08 17:32:34 +02:00
|
|
|
/**
|
|
|
|
* "Does this process have a thread that is currently being traced by the provided process?"
|
|
|
|
*/
|
2020-12-08 21:18:45 -07:00
|
|
|
bool Process::has_tracee_thread(ProcessID tracer_pid)
|
2020-07-30 23:38:15 +02:00
|
|
|
{
|
2020-12-08 21:18:45 -07:00
|
|
|
if (auto tracer = this->tracer())
|
|
|
|
return tracer->tracer_pid() == tracer_pid;
|
|
|
|
return false;
|
2020-07-30 23:38:15 +02:00
|
|
|
}
|
|
|
|
|
2020-08-01 15:25:19 -07:00
|
|
|
KResultOr<u32> Process::peek_user_data(Userspace<const u32*> address)
|
2020-07-30 23:38:15 +02:00
|
|
|
{
|
|
|
|
uint32_t result;
|
|
|
|
|
|
|
|
// This function can be called from the context of another
|
|
|
|
// process that called PT_PEEK
|
|
|
|
ProcessPagingScope scope(*this);
|
2020-09-11 21:11:07 -06:00
|
|
|
if (!copy_from_user(&result, address)) {
|
2021-01-10 16:21:56 +01:00
|
|
|
dbgln("Invalid address for peek_user_data: {}", address.ptr());
|
2021-01-20 23:11:17 +01:00
|
|
|
return EFAULT;
|
2020-09-11 21:11:07 -06:00
|
|
|
}
|
2020-07-30 23:38:15 +02:00
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2020-08-01 15:25:19 -07:00
|
|
|
KResult Process::poke_user_data(Userspace<u32*> address, u32 data)
|
2020-07-30 23:38:15 +02:00
|
|
|
{
|
|
|
|
Range range = { VirtualAddress(address), sizeof(u32) };
|
2021-02-08 15:45:40 +01:00
|
|
|
auto* region = space().find_region_containing(range);
|
2020-12-20 18:45:08 +01:00
|
|
|
if (!region)
|
2021-01-20 23:11:17 +01:00
|
|
|
return EFAULT;
|
2021-01-09 15:42:03 +01:00
|
|
|
ProcessPagingScope scope(*this);
|
2020-07-30 23:38:15 +02:00
|
|
|
if (region->is_shared()) {
|
|
|
|
// If the region is shared, we change its vmobject to a PrivateInodeVMObject
|
2020-08-01 15:25:19 -07:00
|
|
|
// to prevent the write operation from changing any shared inode data
|
2020-07-30 23:38:15 +02:00
|
|
|
ASSERT(region->vmobject().is_shared_inode());
|
|
|
|
region->set_vmobject(PrivateInodeVMObject::create_with_inode(static_cast<SharedInodeVMObject&>(region->vmobject()).inode()));
|
|
|
|
region->set_shared(false);
|
|
|
|
}
|
|
|
|
const bool was_writable = region->is_writable();
|
2020-09-18 09:49:51 +02:00
|
|
|
if (!was_writable) {
|
2020-07-30 23:38:15 +02:00
|
|
|
region->set_writable(true);
|
|
|
|
region->remap();
|
|
|
|
}
|
2020-09-11 21:11:07 -06:00
|
|
|
ScopeGuard rollback([&]() {
|
|
|
|
if (!was_writable) {
|
|
|
|
region->set_writable(false);
|
|
|
|
region->remap();
|
|
|
|
}
|
|
|
|
});
|
2020-07-30 23:38:15 +02:00
|
|
|
|
2020-09-11 21:11:07 -06:00
|
|
|
if (!copy_to_user(address, &data)) {
|
2021-01-09 15:42:03 +01:00
|
|
|
dbgln("poke_user_data: Bad address {:p}", address.ptr());
|
2021-01-20 23:11:17 +01:00
|
|
|
return EFAULT;
|
2020-07-30 23:38:15 +02:00
|
|
|
}
|
2020-09-11 21:11:07 -06:00
|
|
|
|
2021-01-09 15:42:03 +01:00
|
|
|
return KSuccess;
|
2020-07-30 23:38:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|