565f13088f
Change the kernel to add features to vircopy and safecopies so that transparent copy fixing won't happen to avoid deadlocks, and such copies fail with EFAULT. Transparently making copying work from filesystems (as normally done by the kernel & VM when copying fails because of missing/readonly memory) is problematic as it can happen that, for file-mapped ranges, that that same filesystem that is blocked on the copy request is needed to satisfy the memory range, leading to deadlock. Dito for VFS itself, if done with a blocking call. This change makes the copying done from a filesystem fail in such cases with EFAULT by VFS adding the CPF_TRY flag to the grants. If a FS call fails with EFAULT, VFS will then request the range to be made available to VM after the FS is unblocked, allowing it to be used to satisfy the range if need be in another VFS thread. Similarly, for datacopies that VFS itself does, it uses the failable vircopy variant and callers use a wrapper that talk to VM if necessary to get the copy to work. . kernel: add CPF_TRY flag to safecopies . kernel: only request writable ranges to VM for the target buffer when copying fails . do copying in VFS TRY-first . some fixes in VM to build SANITYCHECK mode . add regression test for the cases where - a FS system call needs memory mapped in a process that the FS itself must map. - such a range covers more than one file-mapped region. . add 'try' mode to vircopy, physcopy . add flags field to copy kernel call messages . if CP_FLAG_TRY is set, do not transparently try to fix memory ranges . for use by VFS when accessing user buffers to avoid deadlock . remove some obsolete backwards compatability assignments . VFS: let thread scheduling work for VM requests too Allows VFS to make calls to VM while suspending and resuming the currently running thread. Does currently not work for the main thread. . VM: add fix memory range call for use by VFS Change-Id: I295794269cea51a3163519a9cfe5901301d90b32
274 lines
8 KiB
C
274 lines
8 KiB
C
/* This file handles the process manager's part of debugging, using the
|
|
* ptrace system call. Most of the commands are passed on to the system
|
|
* task for completion.
|
|
*
|
|
* The debugging commands available are:
|
|
* T_STOP stop the process
|
|
* T_OK enable tracing by parent for this process
|
|
* T_GETINS return value from instruction space
|
|
* T_GETDATA return value from data space
|
|
* T_GETUSER return value from user process table
|
|
* T_SETINS set value in instruction space
|
|
* T_SETDATA set value in data space
|
|
* T_SETUSER set value in user process table
|
|
* T_RESUME resume execution
|
|
* T_EXIT exit
|
|
* T_STEP set trace bit
|
|
* T_SYSCALL trace system call
|
|
* T_ATTACH attach to an existing process
|
|
* T_DETACH detach from a traced process
|
|
* T_SETOPT set trace options
|
|
* T_GETRANGE get range of values
|
|
* T_SETRANGE set range of values
|
|
*
|
|
* The T_OK, T_ATTACH, T_EXIT, and T_SETOPT commands are handled here, and the
|
|
* T_RESUME, T_STEP, T_SYSCALL, and T_DETACH commands are partially handled
|
|
* here and completed by the system task. The rest are handled entirely by the
|
|
* system task.
|
|
*/
|
|
|
|
#include "pm.h"
|
|
#include <minix/com.h>
|
|
#include <minix/callnr.h>
|
|
#include <sys/ptrace.h>
|
|
#include <sys/wait.h>
|
|
#include <signal.h>
|
|
#include "mproc.h"
|
|
|
|
/*===========================================================================*
|
|
* do_trace *
|
|
*===========================================================================*/
|
|
int do_trace()
|
|
{
|
|
register struct mproc *child;
|
|
struct ptrace_range pr;
|
|
int i, r, req;
|
|
|
|
req = m_in.PM_PTRACE_REQ;
|
|
|
|
/* The T_OK call is made by the child fork of the debugger before it execs
|
|
* the process to be traced. The T_ATTACH call is made by the debugger itself
|
|
* to attach to an existing process.
|
|
*/
|
|
switch (req) {
|
|
case T_OK: /* enable tracing by parent for this proc */
|
|
if (mp->mp_tracer != NO_TRACER) return(EBUSY);
|
|
|
|
mp->mp_tracer = mp->mp_parent;
|
|
mp->mp_reply.PM_PTRACE_DATA = 0;
|
|
return(OK);
|
|
|
|
case T_ATTACH: /* attach to an existing process */
|
|
if ((child = find_proc(m_in.PM_PTRACE_PID)) == NULL) return(ESRCH);
|
|
if (child->mp_flags & EXITING) return(ESRCH);
|
|
|
|
/* For non-root processes, user and group ID must match. */
|
|
if (mp->mp_effuid != SUPER_USER &&
|
|
(mp->mp_effuid != child->mp_effuid ||
|
|
mp->mp_effgid != child->mp_effgid ||
|
|
child->mp_effuid != child->mp_realuid ||
|
|
child->mp_effgid != child->mp_realgid)) return(EPERM);
|
|
|
|
/* Only root may trace system servers. */
|
|
if (mp->mp_effuid != SUPER_USER && (child->mp_flags & PRIV_PROC))
|
|
return(EPERM);
|
|
|
|
/* System servers may not trace anyone. They can use sys_trace(). */
|
|
if (mp->mp_flags & PRIV_PROC) return(EPERM);
|
|
|
|
/* Can't trace self, PM or VM. */
|
|
if (child == mp || child->mp_endpoint == PM_PROC_NR ||
|
|
child->mp_endpoint == VM_PROC_NR) return(EPERM);
|
|
|
|
/* Can't trace a process that is already being traced. */
|
|
if (child->mp_tracer != NO_TRACER) return(EBUSY);
|
|
|
|
child->mp_tracer = who_p;
|
|
child->mp_trace_flags = TO_NOEXEC;
|
|
|
|
sig_proc(child, SIGSTOP, TRUE /*trace*/, FALSE /* ksig */);
|
|
|
|
mp->mp_reply.PM_PTRACE_DATA = 0;
|
|
return(OK);
|
|
|
|
case T_STOP: /* stop the process */
|
|
/* This call is not exposed to user programs, because its effect can be
|
|
* achieved better by sending the traced process a signal with kill(2).
|
|
*/
|
|
return(EINVAL);
|
|
|
|
case T_READB_INS: /* special hack for reading text segments */
|
|
if (mp->mp_effuid != SUPER_USER) return(EPERM);
|
|
if ((child = find_proc(m_in.PM_PTRACE_PID)) == NULL) return(ESRCH);
|
|
if (child->mp_flags & EXITING) return(ESRCH);
|
|
|
|
r = sys_trace(req, child->mp_endpoint, m_in.PM_PTRACE_ADDR,
|
|
&m_in.PM_PTRACE_DATA);
|
|
if (r != OK) return(r);
|
|
|
|
mp->mp_reply.PM_PTRACE_DATA = m_in.PM_PTRACE_DATA;
|
|
return(OK);
|
|
|
|
case T_WRITEB_INS: /* special hack for patching text segments */
|
|
if (mp->mp_effuid != SUPER_USER) return(EPERM);
|
|
if ((child = find_proc(m_in.PM_PTRACE_PID)) == NULL) return(ESRCH);
|
|
if (child->mp_flags & EXITING) return(ESRCH);
|
|
|
|
#if 0
|
|
/* Should check for shared text */
|
|
|
|
/* Make sure the text segment is not used as a source for shared
|
|
* text.
|
|
*/
|
|
child->mp_ino = 0;
|
|
child->mp_dev = 0;
|
|
child->mp_ctime = 0;
|
|
#endif
|
|
|
|
r = sys_trace(req, child->mp_endpoint, m_in.PM_PTRACE_ADDR,
|
|
&m_in.PM_PTRACE_DATA);
|
|
if (r != OK) return(r);
|
|
|
|
mp->mp_reply.PM_PTRACE_DATA = m_in.PM_PTRACE_DATA;
|
|
return(OK);
|
|
}
|
|
|
|
/* All the other calls are made by the tracing process to control execution
|
|
* of the child. For all these calls, the child must be stopped.
|
|
*/
|
|
if ((child = find_proc(m_in.PM_PTRACE_PID)) == NULL) return(ESRCH);
|
|
if (child->mp_flags & EXITING) return(ESRCH);
|
|
if (child->mp_tracer != who_p) return(ESRCH);
|
|
if (!(child->mp_flags & TRACE_STOPPED)) return(EBUSY);
|
|
|
|
switch (req) {
|
|
case T_EXIT: /* exit */
|
|
child->mp_flags |= TRACE_EXIT;
|
|
|
|
/* Defer the exit if the traced process has an VFS call pending. */
|
|
if (child->mp_flags & VFS_CALL)
|
|
child->mp_exitstatus = (int) m_in.PM_PTRACE_DATA; /* save it */
|
|
else
|
|
exit_proc(child, (int) m_in.PM_PTRACE_DATA,
|
|
FALSE /*dump_core*/);
|
|
|
|
/* Do not reply to the caller until VFS has processed the exit
|
|
* request.
|
|
*/
|
|
return(SUSPEND);
|
|
|
|
case T_SETOPT: /* set trace options */
|
|
child->mp_trace_flags = m_in.PM_PTRACE_DATA;
|
|
|
|
mp->mp_reply.PM_PTRACE_DATA = 0;
|
|
return(OK);
|
|
|
|
case T_GETRANGE:
|
|
case T_SETRANGE: /* get/set range of values */
|
|
r = sys_datacopy(who_e, (vir_bytes) m_in.PM_PTRACE_ADDR,
|
|
SELF, (vir_bytes) &pr, (phys_bytes) sizeof(pr));
|
|
if (r != OK) return(r);
|
|
|
|
if (pr.pr_space != TS_INS && pr.pr_space != TS_DATA) return(EINVAL);
|
|
if (pr.pr_size == 0 || pr.pr_size > LONG_MAX) return(EINVAL);
|
|
|
|
if (req == T_GETRANGE)
|
|
r = sys_vircopy(child->mp_endpoint, (vir_bytes) pr.pr_addr,
|
|
who_e, (vir_bytes) pr.pr_ptr,
|
|
(phys_bytes) pr.pr_size, 0);
|
|
else
|
|
r = sys_vircopy(who_e, (vir_bytes) pr.pr_ptr,
|
|
child->mp_endpoint, (vir_bytes) pr.pr_addr,
|
|
(phys_bytes) pr.pr_size, 0);
|
|
|
|
if (r != OK) return(r);
|
|
|
|
mp->mp_reply.PM_PTRACE_DATA = 0;
|
|
return(OK);
|
|
|
|
case T_DETACH: /* detach from traced process */
|
|
if (m_in.PM_PTRACE_DATA < 0 || m_in.PM_PTRACE_DATA >= _NSIG)
|
|
return(EINVAL);
|
|
|
|
child->mp_tracer = NO_TRACER;
|
|
|
|
/* Let all tracer-pending signals through the filter. */
|
|
for (i = 1; i < _NSIG; i++) {
|
|
if (sigismember(&child->mp_sigtrace, i)) {
|
|
sigdelset(&child->mp_sigtrace, i);
|
|
check_sig(child->mp_pid, i, FALSE /* ksig */);
|
|
}
|
|
}
|
|
|
|
if (m_in.PM_PTRACE_DATA > 0) { /* issue signal */
|
|
sig_proc(child, (int) m_in.PM_PTRACE_DATA, TRUE /*trace*/,
|
|
FALSE /* ksig */);
|
|
}
|
|
|
|
/* Resume the child as if nothing ever happened. */
|
|
child->mp_flags &= ~TRACE_STOPPED;
|
|
child->mp_trace_flags = 0;
|
|
|
|
check_pending(child);
|
|
|
|
break;
|
|
|
|
case T_RESUME:
|
|
case T_STEP:
|
|
case T_SYSCALL: /* resume execution */
|
|
if (m_in.PM_PTRACE_DATA < 0 || m_in.PM_PTRACE_DATA >= _NSIG)
|
|
return(EINVAL);
|
|
|
|
if (m_in.PM_PTRACE_DATA > 0) { /* issue signal */
|
|
sig_proc(child, (int) m_in.PM_PTRACE_DATA, FALSE /*trace*/,
|
|
FALSE /* ksig */);
|
|
}
|
|
|
|
/* If there are any other signals waiting to be delivered,
|
|
* feign a successful resumption.
|
|
*/
|
|
for (i = 1; i < _NSIG; i++) {
|
|
if (sigismember(&child->mp_sigtrace, i)) {
|
|
mp->mp_reply.PM_PTRACE_DATA = 0;
|
|
return(OK);
|
|
}
|
|
}
|
|
|
|
child->mp_flags &= ~TRACE_STOPPED;
|
|
|
|
check_pending(child);
|
|
|
|
break;
|
|
}
|
|
r = sys_trace(req, child->mp_endpoint, m_in.PM_PTRACE_ADDR,
|
|
&m_in.PM_PTRACE_DATA);
|
|
if (r != OK) return(r);
|
|
|
|
mp->mp_reply.PM_PTRACE_DATA = m_in.PM_PTRACE_DATA;
|
|
return(OK);
|
|
}
|
|
|
|
/*===========================================================================*
|
|
* trace_stop *
|
|
*===========================================================================*/
|
|
void trace_stop(rmp, signo)
|
|
register struct mproc *rmp;
|
|
int signo;
|
|
{
|
|
/* A traced process got a signal so stop it. */
|
|
|
|
register struct mproc *rpmp = mproc + rmp->mp_tracer;
|
|
int r;
|
|
|
|
r = sys_trace(T_STOP, rmp->mp_endpoint, 0L, (long *) 0);
|
|
if (r != OK) panic("sys_trace failed: %d", r);
|
|
|
|
rmp->mp_flags |= TRACE_STOPPED;
|
|
if (wait_test(rpmp, rmp)) {
|
|
sigdelset(&rmp->mp_sigtrace, signo);
|
|
|
|
rpmp->mp_flags &= ~WAITING; /* parent is no longer waiting */
|
|
rpmp->mp_reply.PM_WAITPID_STATUS = W_STOPCODE(signo);
|
|
reply(rmp->mp_tracer, rmp->mp_pid);
|
|
}
|
|
}
|