mach.c 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568
  1. /*
  2. * Server-side debugger support using Mach primitives
  3. *
  4. * Copyright (C) 1999, 2006 Alexandre Julliard
  5. * Copyright (C) 2006 Ken Thomases for CodeWeavers
  6. *
  7. * This library is free software; you can redistribute it and/or
  8. * modify it under the terms of the GNU Lesser General Public
  9. * License as published by the Free Software Foundation; either
  10. * version 2.1 of the License, or (at your option) any later version.
  11. *
  12. * This library is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  15. * Lesser General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU Lesser General Public
  18. * License along with this library; if not, write to the Free Software
  19. * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
  20. */
  21. #include "config.h"
  22. #include <assert.h>
  23. #include <errno.h>
  24. #include <stdio.h>
  25. #include <signal.h>
  26. #include <stdarg.h>
  27. #include <sys/types.h>
  28. #include <unistd.h>
  29. #ifdef HAVE_SYS_SYSCTL_H
  30. #include <sys/sysctl.h>
  31. #endif
  32. #include "ntstatus.h"
  33. #define WIN32_NO_STATUS
  34. #include "winternl.h"
  35. #include "file.h"
  36. #include "process.h"
  37. #include "thread.h"
  38. #include "request.h"
  39. #ifdef USE_MACH
  40. #include <mach/mach.h>
  41. #include <mach/mach_error.h>
  42. #include <mach/thread_act.h>
  43. #include <mach/mach_vm.h>
  44. #include <servers/bootstrap.h>
  45. static mach_port_t server_mach_port;
  46. void sigchld_callback(void)
  47. {
  48. assert(0); /* should never be called on MacOS */
  49. }
  50. static void mach_set_error(kern_return_t mach_error)
  51. {
  52. switch (mach_error)
  53. {
  54. case KERN_SUCCESS: break;
  55. case KERN_INVALID_ARGUMENT: set_error(STATUS_INVALID_PARAMETER); break;
  56. case KERN_NO_SPACE: set_error(STATUS_NO_MEMORY); break;
  57. case KERN_PROTECTION_FAILURE: set_error(STATUS_ACCESS_DENIED); break;
  58. case KERN_INVALID_ADDRESS: set_error(STATUS_ACCESS_VIOLATION); break;
  59. default: set_error(STATUS_UNSUCCESSFUL); break;
  60. }
  61. }
  62. static mach_port_t get_process_port( struct process *process )
  63. {
  64. return process->trace_data;
  65. }
  66. static int is_rosetta( void )
  67. {
  68. static int rosetta_status, did_check = 0;
  69. if (!did_check)
  70. {
  71. /* returns 0 for native process or on error, 1 for translated */
  72. int ret = 0;
  73. size_t size = sizeof(ret);
  74. if (sysctlbyname( "sysctl.proc_translated", &ret, &size, NULL, 0 ) == -1)
  75. rosetta_status = 0;
  76. else
  77. rosetta_status = ret;
  78. did_check = 1;
  79. }
  80. return rosetta_status;
  81. }
  82. extern kern_return_t bootstrap_register2( mach_port_t bp, name_t service_name, mach_port_t sp, uint64_t flags );
  83. /* initialize the process control mechanism */
  84. void init_tracing_mechanism(void)
  85. {
  86. mach_port_t bp;
  87. if (task_get_bootstrap_port( mach_task_self(), &bp ) != KERN_SUCCESS)
  88. fatal_error( "Can't find bootstrap port\n" );
  89. if (mach_port_allocate( mach_task_self(), MACH_PORT_RIGHT_RECEIVE, &server_mach_port ) != KERN_SUCCESS)
  90. fatal_error( "Can't allocate port\n" );
  91. if (mach_port_insert_right( mach_task_self(),
  92. server_mach_port,
  93. server_mach_port,
  94. MACH_MSG_TYPE_MAKE_SEND ) != KERN_SUCCESS)
  95. fatal_error( "Error inserting rights\n" );
  96. if (bootstrap_register2( bp, server_dir, server_mach_port, 0 ) != KERN_SUCCESS)
  97. fatal_error( "Can't check in server_mach_port\n" );
  98. mach_port_deallocate( mach_task_self(), bp );
  99. }
  100. /* initialize the per-process tracing mechanism */
  101. void init_process_tracing( struct process *process )
  102. {
  103. int pid, ret;
  104. struct
  105. {
  106. mach_msg_header_t header;
  107. mach_msg_body_t body;
  108. mach_msg_port_descriptor_t task_port;
  109. mach_msg_trailer_t trailer; /* only present on receive */
  110. } msg;
  111. for (;;)
  112. {
  113. ret = mach_msg( &msg.header, MACH_RCV_MSG|MACH_RCV_TIMEOUT, 0, sizeof(msg),
  114. server_mach_port, 0, 0 );
  115. if (ret)
  116. {
  117. if (ret != MACH_RCV_TIMED_OUT && debug_level)
  118. fprintf( stderr, "warning: mach port receive failed with %x\n", ret );
  119. return;
  120. }
  121. /* if anything in the message is invalid, ignore it */
  122. if (msg.header.msgh_size != offsetof(typeof(msg), trailer)) continue;
  123. if (msg.body.msgh_descriptor_count != 1) continue;
  124. if (msg.task_port.type != MACH_MSG_PORT_DESCRIPTOR) continue;
  125. if (msg.task_port.disposition != MACH_MSG_TYPE_PORT_SEND) continue;
  126. if (msg.task_port.name == MACH_PORT_NULL) continue;
  127. if (msg.task_port.name == MACH_PORT_DEAD) continue;
  128. if (!pid_for_task( msg.task_port.name, &pid ))
  129. {
  130. struct thread *thread = get_thread_from_pid( pid );
  131. if (thread && !thread->process->trace_data)
  132. thread->process->trace_data = msg.task_port.name;
  133. else
  134. mach_port_deallocate( mach_task_self(), msg.task_port.name );
  135. }
  136. }
  137. }
  138. /* terminate the per-process tracing mechanism */
  139. void finish_process_tracing( struct process *process )
  140. {
  141. if (process->trace_data)
  142. {
  143. mach_port_deallocate( mach_task_self(), process->trace_data );
  144. process->trace_data = 0;
  145. }
  146. }
  147. /* initialize registers in new thread if necessary */
  148. void init_thread_context( struct thread *thread )
  149. {
  150. }
  151. /* retrieve the thread x86 registers */
  152. void get_thread_context( struct thread *thread, context_t *context, unsigned int flags )
  153. {
  154. #if defined(__i386__) || defined(__x86_64__)
  155. x86_debug_state_t state;
  156. mach_msg_type_number_t count = sizeof(state) / sizeof(int);
  157. mach_msg_type_name_t type;
  158. mach_port_t port, process_port = get_process_port( thread->process );
  159. kern_return_t ret;
  160. unsigned long dr[8];
  161. /* all other regs are handled on the client side */
  162. assert( flags == SERVER_CTX_DEBUG_REGISTERS );
  163. if (is_rosetta())
  164. {
  165. /* getting debug registers of a translated process is not supported cross-process, return all zeroes */
  166. memset( &context->debug, 0, sizeof(context->debug) );
  167. context->flags |= SERVER_CTX_DEBUG_REGISTERS;
  168. return;
  169. }
  170. if (thread->unix_pid == -1 || !process_port ||
  171. mach_port_extract_right( process_port, thread->unix_tid,
  172. MACH_MSG_TYPE_COPY_SEND, &port, &type ))
  173. {
  174. set_error( STATUS_ACCESS_DENIED );
  175. return;
  176. }
  177. ret = thread_get_state( port, x86_DEBUG_STATE, (thread_state_t)&state, &count );
  178. if (!ret)
  179. {
  180. assert( state.dsh.flavor == x86_DEBUG_STATE32 ||
  181. state.dsh.flavor == x86_DEBUG_STATE64 );
  182. if (state.dsh.flavor == x86_DEBUG_STATE64)
  183. {
  184. dr[0] = state.uds.ds64.__dr0;
  185. dr[1] = state.uds.ds64.__dr1;
  186. dr[2] = state.uds.ds64.__dr2;
  187. dr[3] = state.uds.ds64.__dr3;
  188. dr[6] = state.uds.ds64.__dr6;
  189. dr[7] = state.uds.ds64.__dr7;
  190. }
  191. else
  192. {
  193. dr[0] = state.uds.ds32.__dr0;
  194. dr[1] = state.uds.ds32.__dr1;
  195. dr[2] = state.uds.ds32.__dr2;
  196. dr[3] = state.uds.ds32.__dr3;
  197. dr[6] = state.uds.ds32.__dr6;
  198. dr[7] = state.uds.ds32.__dr7;
  199. }
  200. switch (context->machine)
  201. {
  202. case IMAGE_FILE_MACHINE_I386:
  203. context->debug.i386_regs.dr0 = dr[0];
  204. context->debug.i386_regs.dr1 = dr[1];
  205. context->debug.i386_regs.dr2 = dr[2];
  206. context->debug.i386_regs.dr3 = dr[3];
  207. context->debug.i386_regs.dr6 = dr[6];
  208. context->debug.i386_regs.dr7 = dr[7];
  209. break;
  210. case IMAGE_FILE_MACHINE_AMD64:
  211. context->debug.x86_64_regs.dr0 = dr[0];
  212. context->debug.x86_64_regs.dr1 = dr[1];
  213. context->debug.x86_64_regs.dr2 = dr[2];
  214. context->debug.x86_64_regs.dr3 = dr[3];
  215. context->debug.x86_64_regs.dr6 = dr[6];
  216. context->debug.x86_64_regs.dr7 = dr[7];
  217. break;
  218. default:
  219. set_error( STATUS_INVALID_PARAMETER );
  220. goto done;
  221. }
  222. context->flags |= SERVER_CTX_DEBUG_REGISTERS;
  223. }
  224. else
  225. mach_set_error( ret );
  226. done:
  227. mach_port_deallocate( mach_task_self(), port );
  228. #endif
  229. }
  230. /* set the thread x86 registers */
  231. void set_thread_context( struct thread *thread, const context_t *context, unsigned int flags )
  232. {
  233. #if defined(__i386__) || defined(__x86_64__)
  234. x86_debug_state_t state;
  235. mach_msg_type_number_t count = sizeof(state) / sizeof(int);
  236. mach_msg_type_name_t type;
  237. mach_port_t port, process_port = get_process_port( thread->process );
  238. unsigned long dr[8];
  239. kern_return_t ret;
  240. /* all other regs are handled on the client side */
  241. assert( flags == SERVER_CTX_DEBUG_REGISTERS );
  242. if (is_rosetta())
  243. {
  244. /* Setting debug registers of a translated process is not supported cross-process
  245. * (and even in-process, setting debug registers never has the desired effect).
  246. */
  247. set_error( STATUS_UNSUCCESSFUL );
  248. return;
  249. }
  250. if (thread->unix_pid == -1 || !process_port ||
  251. mach_port_extract_right( process_port, thread->unix_tid,
  252. MACH_MSG_TYPE_COPY_SEND, &port, &type ))
  253. {
  254. set_error( STATUS_ACCESS_DENIED );
  255. return;
  256. }
  257. /* get the debug state to determine which flavor to use */
  258. ret = thread_get_state(port, x86_DEBUG_STATE, (thread_state_t)&state, &count);
  259. if (ret)
  260. {
  261. mach_set_error( ret );
  262. goto done;
  263. }
  264. assert( state.dsh.flavor == x86_DEBUG_STATE32 ||
  265. state.dsh.flavor == x86_DEBUG_STATE64 );
  266. switch (context->machine)
  267. {
  268. case IMAGE_FILE_MACHINE_I386:
  269. dr[0] = context->debug.i386_regs.dr0;
  270. dr[1] = context->debug.i386_regs.dr1;
  271. dr[2] = context->debug.i386_regs.dr2;
  272. dr[3] = context->debug.i386_regs.dr3;
  273. dr[6] = context->debug.i386_regs.dr6;
  274. dr[7] = context->debug.i386_regs.dr7;
  275. break;
  276. case IMAGE_FILE_MACHINE_AMD64:
  277. dr[0] = context->debug.x86_64_regs.dr0;
  278. dr[1] = context->debug.x86_64_regs.dr1;
  279. dr[2] = context->debug.x86_64_regs.dr2;
  280. dr[3] = context->debug.x86_64_regs.dr3;
  281. dr[6] = context->debug.x86_64_regs.dr6;
  282. dr[7] = context->debug.x86_64_regs.dr7;
  283. break;
  284. default:
  285. set_error( STATUS_INVALID_PARAMETER );
  286. goto done;
  287. }
  288. /* Mac OS doesn't allow setting the global breakpoint flags */
  289. dr[7] = (dr[7] & ~0xaa) | ((dr[7] & 0xaa) >> 1);
  290. if (state.dsh.flavor == x86_DEBUG_STATE64)
  291. {
  292. state.dsh.count = sizeof(state.uds.ds64) / sizeof(int);
  293. state.uds.ds64.__dr0 = dr[0];
  294. state.uds.ds64.__dr1 = dr[1];
  295. state.uds.ds64.__dr2 = dr[2];
  296. state.uds.ds64.__dr3 = dr[3];
  297. state.uds.ds64.__dr4 = 0;
  298. state.uds.ds64.__dr5 = 0;
  299. state.uds.ds64.__dr6 = dr[6];
  300. state.uds.ds64.__dr7 = dr[7];
  301. }
  302. else
  303. {
  304. state.dsh.count = sizeof(state.uds.ds32) / sizeof(int);
  305. state.uds.ds32.__dr0 = dr[0];
  306. state.uds.ds32.__dr1 = dr[1];
  307. state.uds.ds32.__dr2 = dr[2];
  308. state.uds.ds32.__dr3 = dr[3];
  309. state.uds.ds32.__dr4 = 0;
  310. state.uds.ds32.__dr5 = 0;
  311. state.uds.ds32.__dr6 = dr[6];
  312. state.uds.ds32.__dr7 = dr[7];
  313. }
  314. ret = thread_set_state( port, x86_DEBUG_STATE, (thread_state_t)&state, count );
  315. if (ret)
  316. mach_set_error( ret );
  317. done:
  318. mach_port_deallocate( mach_task_self(), port );
  319. #endif
  320. }
  321. extern int __pthread_kill( mach_port_t, int );
  322. int send_thread_signal( struct thread *thread, int sig )
  323. {
  324. int ret = -1;
  325. mach_port_t process_port = get_process_port( thread->process );
  326. if (thread->unix_pid != -1 && process_port)
  327. {
  328. mach_msg_type_name_t type;
  329. mach_port_t port;
  330. if (!mach_port_extract_right( process_port, thread->unix_tid,
  331. MACH_MSG_TYPE_COPY_SEND, &port, &type ))
  332. {
  333. ret = __pthread_kill( port, sig );
  334. mach_port_deallocate( mach_task_self(), port );
  335. }
  336. else errno = ESRCH;
  337. if (ret == -1 && errno == ESRCH) /* thread got killed */
  338. {
  339. thread->unix_pid = -1;
  340. thread->unix_tid = -1;
  341. }
  342. }
  343. if (debug_level && ret != -1)
  344. fprintf( stderr, "%04x: *sent signal* signal=%d\n", thread->id, sig );
  345. return (ret != -1);
  346. }
  347. /* read data from a process memory space */
  348. int read_process_memory( struct process *process, client_ptr_t ptr, data_size_t size, char *dest )
  349. {
  350. kern_return_t ret;
  351. mach_msg_type_number_t bytes_read;
  352. mach_vm_offset_t offset;
  353. vm_offset_t data;
  354. mach_vm_address_t aligned_address;
  355. mach_vm_size_t aligned_size;
  356. unsigned int page_size = get_page_size();
  357. mach_port_t process_port = get_process_port( process );
  358. if (!process_port)
  359. {
  360. set_error( STATUS_ACCESS_DENIED );
  361. return 0;
  362. }
  363. if ((mach_vm_address_t)ptr != ptr)
  364. {
  365. set_error( STATUS_ACCESS_DENIED );
  366. return 0;
  367. }
  368. if ((ret = task_suspend( process_port )) != KERN_SUCCESS)
  369. {
  370. mach_set_error( ret );
  371. return 0;
  372. }
  373. offset = ptr % page_size;
  374. aligned_address = (mach_vm_address_t)(ptr - offset);
  375. aligned_size = (size + offset + page_size - 1) / page_size * page_size;
  376. ret = mach_vm_read( process_port, aligned_address, aligned_size, &data, &bytes_read );
  377. if (ret != KERN_SUCCESS) mach_set_error( ret );
  378. else
  379. {
  380. memcpy( dest, (char *)data + offset, size );
  381. mach_vm_deallocate( mach_task_self(), data, bytes_read );
  382. }
  383. task_resume( process_port );
  384. return (ret == KERN_SUCCESS);
  385. }
  386. /* write data to a process memory space */
  387. int write_process_memory( struct process *process, client_ptr_t ptr, data_size_t size, const char *src )
  388. {
  389. kern_return_t ret;
  390. mach_vm_address_t aligned_address, region_address;
  391. mach_vm_size_t aligned_size, region_size;
  392. mach_msg_type_number_t info_size, bytes_read;
  393. mach_vm_offset_t offset;
  394. vm_offset_t task_mem = 0;
  395. struct vm_region_basic_info_64 info;
  396. mach_port_t dummy;
  397. unsigned int page_size = get_page_size();
  398. mach_port_t process_port = get_process_port( process );
  399. if (!process_port)
  400. {
  401. set_error( STATUS_ACCESS_DENIED );
  402. return 0;
  403. }
  404. if ((mach_vm_address_t)ptr != ptr)
  405. {
  406. set_error( STATUS_ACCESS_DENIED );
  407. return 0;
  408. }
  409. offset = ptr % page_size;
  410. aligned_address = (mach_vm_address_t)(ptr - offset);
  411. aligned_size = (size + offset + page_size - 1) / page_size * page_size;
  412. if ((ret = task_suspend( process_port )) != KERN_SUCCESS)
  413. {
  414. mach_set_error( ret );
  415. return 0;
  416. }
  417. ret = mach_vm_read( process_port, aligned_address, aligned_size, &task_mem, &bytes_read );
  418. if (ret != KERN_SUCCESS)
  419. {
  420. mach_set_error( ret );
  421. goto failed;
  422. }
  423. region_address = aligned_address;
  424. info_size = sizeof(info);
  425. ret = mach_vm_region( process_port, &region_address, &region_size, VM_REGION_BASIC_INFO_64,
  426. (vm_region_info_t)&info, &info_size, &dummy );
  427. if (ret != KERN_SUCCESS)
  428. {
  429. mach_set_error( ret );
  430. goto failed;
  431. }
  432. if (region_address > aligned_address ||
  433. region_address + region_size < aligned_address + aligned_size)
  434. {
  435. /* FIXME: should support multiple regions */
  436. set_error( ERROR_ACCESS_DENIED );
  437. goto failed;
  438. }
  439. ret = mach_vm_protect( process_port, aligned_address, aligned_size, 0, VM_PROT_READ | VM_PROT_WRITE );
  440. if (ret != KERN_SUCCESS)
  441. {
  442. mach_set_error( ret );
  443. goto failed;
  444. }
  445. /* FIXME: there's an optimization that can be made: check first and last */
  446. /* pages for writability; read first and last pages; write interior */
  447. /* pages to task without ever reading&modifying them; if that succeeds, */
  448. /* modify first and last pages and write them. */
  449. memcpy( (char*)task_mem + offset, src, size );
  450. ret = mach_vm_write( process_port, aligned_address, task_mem, bytes_read );
  451. if (ret != KERN_SUCCESS) mach_set_error( ret );
  452. else
  453. {
  454. mach_vm_deallocate( mach_task_self(), task_mem, bytes_read );
  455. /* restore protection */
  456. mach_vm_protect( process_port, aligned_address, aligned_size, 0, info.protection );
  457. task_resume( process_port );
  458. return 1;
  459. }
  460. failed:
  461. if (task_mem) mach_vm_deallocate( mach_task_self(), task_mem, bytes_read );
  462. task_resume( process_port );
  463. return 0;
  464. }
  465. /* retrieve an LDT selector entry */
  466. void get_selector_entry( struct thread *thread, int entry, unsigned int *base,
  467. unsigned int *limit, unsigned char *flags )
  468. {
  469. const unsigned int total_size = (2 * sizeof(int) + 1) * 8192;
  470. struct process *process = thread->process;
  471. unsigned int page_size = get_page_size();
  472. vm_offset_t data;
  473. kern_return_t ret;
  474. mach_msg_type_number_t bytes_read;
  475. mach_port_t process_port = get_process_port( thread->process );
  476. if (!process->ldt_copy || !process_port)
  477. {
  478. set_error( STATUS_ACCESS_DENIED );
  479. return;
  480. }
  481. if (entry >= 8192)
  482. {
  483. set_error( STATUS_INVALID_PARAMETER ); /* FIXME */
  484. return;
  485. }
  486. if ((ret = task_suspend( process_port )) == KERN_SUCCESS)
  487. {
  488. mach_vm_offset_t offset = process->ldt_copy % page_size;
  489. mach_vm_address_t aligned_address = (mach_vm_address_t)(process->ldt_copy - offset);
  490. mach_vm_size_t aligned_size = (total_size + offset + page_size - 1) / page_size * page_size;
  491. ret = mach_vm_read( process_port, aligned_address, aligned_size, &data, &bytes_read );
  492. if (ret != KERN_SUCCESS) mach_set_error( ret );
  493. else
  494. {
  495. const int *ldt = (const int *)((char *)data + offset);
  496. memcpy( base, ldt + entry, sizeof(int) );
  497. memcpy( limit, ldt + entry + 8192, sizeof(int) );
  498. memcpy( flags, (char *)(ldt + 2 * 8192) + entry, 1 );
  499. mach_vm_deallocate( mach_task_self(), data, bytes_read );
  500. }
  501. task_resume( process_port );
  502. }
  503. else mach_set_error( ret );
  504. }
  505. #endif /* USE_MACH */