se_ptrace.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594
  1. /*
  2. * Copyright (C) 2011-2016 Intel Corporation. All rights reserved.
  3. *
  4. * Redistribution and use in source and binary forms, with or without
  5. * modification, are permitted provided that the following conditions
  6. * are met:
  7. *
  8. * * Redistributions of source code must retain the above copyright
  9. * notice, this list of conditions and the following disclaimer.
  10. * * Redistributions in binary form must reproduce the above copyright
  11. * notice, this list of conditions and the following disclaimer in
  12. * the documentation and/or other materials provided with the
  13. * distribution.
  14. * * Neither the name of Intel Corporation nor the names of its
  15. * contributors may be used to endorse or promote products derived
  16. * from this software without specific prior written permission.
  17. *
  18. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  19. * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  20. * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
  21. * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
  22. * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  23. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
  24. * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
  25. * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
  26. * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  27. * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  28. * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  29. *
  30. */
  31. #include "arch.h"
  32. #include "thread_data.h"
  33. #include "util.h"
  34. #include "se_trace.h"
  35. #include "se_memory.h"
  36. #include <unistd.h>
  37. #include <sys/ptrace.h>
  38. #include <dlfcn.h>
  39. #include <stdarg.h>
  40. #include <stdio.h>
  41. #include <stdio.h>
  42. #include <sys/user.h>
  43. #include <sys/ptrace.h>
  44. #include <sys/types.h>
  45. #include <sys/stat.h>
  46. #include <fcntl.h>
  47. #include <elf.h>
  48. #include <assert.h>
  49. //NOTE: Need align with thread_data_t in RTS.
  50. #define ELF32_SSA_FS_OFFSET 0x34
  51. #ifdef __x86_64__
  52. #define SSA2USER_REG(to, from, name) to->r##name = from.r##name
  53. #define USER_REG2SSA(to, from, name) to.r##name = from->r##name
  54. #else
  55. #define SSA2USER_REG(to, from, name) to->e##name = from.e##name
  56. #define USER_REG2SSA(to, from, name) to.e##name = from->e##name
  57. #endif
  58. #define XSTATE_MAX_SIZE 832
  59. typedef enum _direction_t
  60. {
  61. FORWARD,
  62. BACKWARD
  63. } direction_t;
  64. typedef long int (* ptrace_t)(enum __ptrace_request request, pid_t pid,
  65. void *addr, void *data);
  66. static ptrace_t g_sys_ptrace = NULL;
  67. __attribute__((constructor)) void init()
  68. {
  69. g_sys_ptrace = (ptrace_t)dlsym(RTLD_NEXT, "ptrace");
  70. }
  71. #ifdef SE_DEBUG
  72. static void dump_ssa_gregs(ssa_gpr_t* gpr) __attribute__((unused));
  73. void dump_ssa_gregs(ssa_gpr_t* gpr)
  74. {
  75. SE_TRACE(SE_TRACE_DEBUG, "ssa generic registers:\n");
  76. SE_TRACE(SE_TRACE_DEBUG, "xbx = %#lx\t", gpr->REG(bx));
  77. SE_TRACE(SE_TRACE_DEBUG, "xcx = %#lx\t", gpr->REG(cx));
  78. SE_TRACE(SE_TRACE_DEBUG, "xdx = %#lx\t", gpr->REG(dx));
  79. SE_TRACE(SE_TRACE_DEBUG, "xsi = %#lx\t", gpr->REG(si));
  80. SE_TRACE(SE_TRACE_DEBUG, "xdi = %#lx\t", gpr->REG(di));
  81. SE_TRACE(SE_TRACE_DEBUG, "xbp = %#lx\t", gpr->REG(bp));
  82. SE_TRACE(SE_TRACE_DEBUG, "xax = %#lx\t", gpr->REG(ax));
  83. SE_TRACE(SE_TRACE_DEBUG, "xip = %#lx\t", gpr->REG(ip));
  84. SE_TRACE(SE_TRACE_DEBUG, "xflags = %#lx\t", gpr->REG(flags));
  85. SE_TRACE(SE_TRACE_DEBUG, "xsp = %#lx\t", gpr->REG(sp));
  86. }
  87. static void dump_regs(struct user_regs_struct *regs) __attribute__((unused));
  88. void dump_regs(struct user_regs_struct *regs)
  89. {
  90. SE_TRACE(SE_TRACE_DEBUG, "user regisers:\n");
  91. SE_TRACE(SE_TRACE_DEBUG, "xbx = %#x\t", regs->REG(bx));
  92. SE_TRACE(SE_TRACE_DEBUG, "xcx = %#x\t", regs->REG(cx));
  93. SE_TRACE(SE_TRACE_DEBUG, "xdx = %#x\t", regs->REG(dx));
  94. SE_TRACE(SE_TRACE_DEBUG, "xsi = %#x\t", regs->REG(si));
  95. SE_TRACE(SE_TRACE_DEBUG, "xdi = %#x\t", regs->REG(di));
  96. SE_TRACE(SE_TRACE_DEBUG, "xbp = %#x\t", regs->REG(bp));
  97. SE_TRACE(SE_TRACE_DEBUG, "xax = %#x\t", regs->REG(ax));
  98. SE_TRACE(SE_TRACE_DEBUG, "xip = %#x\t", regs->REG(ip));
  99. SE_TRACE(SE_TRACE_DEBUG, "xflags = %#x\t", regs->eflags);
  100. SE_TRACE(SE_TRACE_DEBUG, "xsp = %#x\t", regs->REG(sp));
  101. }
  102. #else
  103. #define dump_ssa_gregs(gpr)
  104. #define dump_regs(regs)
  105. #endif
  106. #ifdef __x86_64__
  107. static int get_exec_class(pid_t pid)
  108. {
  109. char filename[64];
  110. int fd = -1;
  111. unsigned char e_ident[EI_NIDENT];
  112. snprintf(filename, 64, "/proc/%d/exe", pid);
  113. fd = open(filename, O_RDONLY | O_LARGEFILE);
  114. if(fd == -1)
  115. return ELFCLASSNONE;
  116. if(-1 == read(fd, e_ident, EI_NIDENT))
  117. {
  118. return ELFCLASSNONE;
  119. }
  120. close(fd);
  121. return e_ident[EI_CLASS];
  122. }
  123. #endif
  124. static inline uint32_t get_ssa_frame_size(pid_t pid, thread_data_t* td)
  125. {
  126. uint32_t ssa_frame_size = td->ssa_frame_size;
  127. #ifdef __x86_64__
  128. //on x64, we may debug elf32 enclave, we need refer to different offset in td field.
  129. if(ELFCLASS32 == get_exec_class(pid))
  130. {
  131. ssa_frame_size = *GET_PTR(uint32_t, td, ELF32_SSA_FS_OFFSET);
  132. }
  133. #else
  134. UNUSED(pid);
  135. #endif
  136. //When debug trts, ssa_frame_size in TD is not initialized, so the value will be 0.
  137. //It is a limitation to debug trts. As work around, the default size is 1 page, so
  138. //we can debug enclave from the start of enclave_entry.
  139. if(0 == ssa_frame_size)
  140. ssa_frame_size = 1;
  141. return ssa_frame_size;
  142. }
  143. /*
  144. *This function get the position/offset with SSA
  145. * @pid, process id
  146. * @tcs_addr, TCS start address
  147. * @dir, calculate the position from start of SSA or from the end of SSA
  148. * @offset, offset from the start
  149. * @size, size of data from the postion that is going to be accessed
  150. * @pos, the result of postion that the function output
  151. * @return, TRUE on success, FALSE on fail. The result is copied to parameter pos
  152. * */
  153. static int get_ssa_pos(pid_t pid, long tcs_addr, direction_t dir, long offset, long size, long *pos)
  154. {
  155. tcs_t tcs;
  156. thread_data_t td;
  157. uint32_t ssa_frame_size = 0;
  158. long addr = 0;
  159. //read TCS;
  160. if(!se_read_process_mem(pid, (void *)tcs_addr, (void *)&tcs, 72, NULL))
  161. return FALSE;
  162. //Align with RTS. We assume TD is next to TCS
  163. long ssa_start = tcs_addr + TCS_SIZE;
  164. //ossa point to the start address of SSA, and fs/gs point to the start address of TD.
  165. long td_start = ssa_start - tcs.ossa + tcs.ofs_base;
  166. //Read thread data; On x64, sizeof(thread_data_t) of elf64 is larger than elf32,
  167. //so it won't miss any field if it is elf32 executable;
  168. if(!se_read_process_mem(pid, (void *)td_start, (void *)&td, sizeof(thread_data_t), NULL))
  169. return FALSE;
  170. ssa_frame_size = get_ssa_frame_size(pid, &td);
  171. //The request should not exceed ssa frame boundary.
  172. if((offset + size) > (long)ssa_frame_size * SE_PAGE_SIZE)
  173. return FALSE;
  174. assert(tcs.cssa > 0);
  175. //If it is required to calculate from the start of SSA
  176. if(FORWARD == dir)
  177. {
  178. addr = ssa_start + (tcs.cssa - 1) * ssa_frame_size * SE_PAGE_SIZE + offset;
  179. }
  180. //If it is required to calculate from the end of SSA
  181. else if(BACKWARD == dir)
  182. {
  183. addr = ssa_start + tcs.cssa * ssa_frame_size * SE_PAGE_SIZE - offset;
  184. }
  185. else
  186. return FALSE;
  187. *pos = addr;
  188. return TRUE;
  189. }
  190. static inline int read_ssa(pid_t pid, long tcs_addr, direction_t dir, long offset, long size, void *buf)
  191. {
  192. long addr = 0;
  193. if(!get_ssa_pos(pid, tcs_addr, dir, offset, size, &addr))
  194. return FALSE;
  195. //read the content of ssa
  196. if(!se_read_process_mem(pid, (void *)addr, buf, size, NULL))
  197. return FALSE;
  198. return TRUE;
  199. }
  200. static inline int write_ssa(pid_t pid, long tcs_addr, direction_t dir, long offset, long size, void *buf)
  201. {
  202. long addr = 0;
  203. if(!get_ssa_pos(pid, tcs_addr, dir, offset, size, &addr))
  204. return FALSE;
  205. //write the content of ssa
  206. if(!se_write_process_mem(pid, (void *)addr, buf, size, NULL))
  207. return FALSE;
  208. return TRUE;
  209. }
  210. static inline int get_ssa_gpr(pid_t pid, long tcs_addr, ssa_gpr_t* gpr)
  211. {
  212. //read general registers. ssa_gpr_t is elf32/elf64 independent.
  213. return read_ssa(pid, tcs_addr, BACKWARD, sizeof(ssa_gpr_t), sizeof(ssa_gpr_t), (void *)gpr);
  214. }
  215. static inline int set_ssa_gpr(pid_t pid, long tcs_addr, ssa_gpr_t* gpr)
  216. {
  217. //read general registers. ssa_gpr_t is elf32/elf64 independent.
  218. return write_ssa(pid, tcs_addr, BACKWARD, sizeof(ssa_gpr_t), sizeof(ssa_gpr_t), (void *)gpr);
  219. }
  220. static inline int get_ssa_fpregs(pid_t pid, long tcs_addr, struct user_fpregs_struct* fpregs)
  221. {
  222. return read_ssa(pid, tcs_addr, FORWARD, 0, sizeof(struct user_fpregs_struct), (void *)fpregs);
  223. }
  224. static inline int set_ssa_fpregs(pid_t pid, long tcs_addr, struct user_fpregs_struct* fpregs)
  225. {
  226. return write_ssa(pid, tcs_addr, FORWARD, 0, sizeof(struct user_fpregs_struct), (void *)fpregs);
  227. }
  228. #if !defined(__x86_64__) && !defined(__x86_64)
  229. static inline int get_ssa_fpxregs(pid_t pid, long tcs_addr, struct user_fpxregs_struct* fpxregs)
  230. {
  231. return read_ssa(pid, tcs_addr, FORWARD, 0, sizeof(struct user_fpxregs_struct), (void *)fpxregs);
  232. }
  233. static inline int set_ssa_fpxregs(pid_t pid, long tcs_addr, struct user_fpxregs_struct* fpxregs)
  234. {
  235. return write_ssa(pid, tcs_addr, FORWARD, 0, sizeof(struct user_fpxregs_struct), (void *)fpxregs);
  236. }
  237. #else
  238. #define get_ssa_fpxregs get_ssa_fpregs
  239. #define set_ssa_fpxregs set_ssa_fpregs
  240. #define user_fpxregs_struct user_fpregs_struct
  241. #endif
  242. static inline int get_ssa_xstate(pid_t pid, long tcs_addr, int len, char *buf)
  243. {
  244. return read_ssa(pid, tcs_addr, FORWARD, 0, len, buf);
  245. }
  246. static inline int set_ssa_xstate(pid_t pid, long tcs_addr, int len, char *buf)
  247. {
  248. return write_ssa(pid, tcs_addr, FORWARD, 0, len, buf);
  249. }
  250. static int get_enclave_gregs(pid_t pid, struct user_regs_struct *regs, long tcs_addr)
  251. {
  252. ssa_gpr_t gpr;
  253. if(!get_ssa_gpr(pid, tcs_addr, &gpr))
  254. return -1;
  255. //convert gpr to user_regs_struct.
  256. SSA2USER_REG(regs, gpr, bx);
  257. SSA2USER_REG(regs, gpr, cx);
  258. SSA2USER_REG(regs, gpr, dx);
  259. SSA2USER_REG(regs, gpr, si);
  260. SSA2USER_REG(regs, gpr, di);
  261. SSA2USER_REG(regs, gpr, bp);
  262. SSA2USER_REG(regs, gpr, ax);
  263. SSA2USER_REG(regs, gpr, ip);
  264. regs->eflags = gpr.REG(flags);
  265. SSA2USER_REG(regs, gpr, sp);
  266. #ifdef __x86_64__
  267. SSA2USER_REG(regs, gpr, 8);
  268. SSA2USER_REG(regs, gpr, 9);
  269. SSA2USER_REG(regs, gpr, 10);
  270. SSA2USER_REG(regs, gpr, 11);
  271. SSA2USER_REG(regs, gpr, 12);
  272. SSA2USER_REG(regs, gpr, 13);
  273. SSA2USER_REG(regs, gpr, 14);
  274. SSA2USER_REG(regs, gpr, 15);
  275. #endif
  276. return 0;
  277. }
  278. static int set_enclave_gregs(pid_t pid, struct user_regs_struct *regs, long tcs_addr)
  279. {
  280. ssa_gpr_t gpr;
  281. //Since there is some field won't be written, we need save it first
  282. if(!get_ssa_gpr(pid, tcs_addr, &gpr))
  283. return -1;
  284. //convert gpr to user_regs_struct.
  285. USER_REG2SSA(gpr, regs, bx);
  286. USER_REG2SSA(gpr, regs, cx);
  287. USER_REG2SSA(gpr, regs, dx);
  288. USER_REG2SSA(gpr, regs, si);
  289. USER_REG2SSA(gpr, regs, di);
  290. USER_REG2SSA(gpr, regs, bp);
  291. USER_REG2SSA(gpr, regs, ax);
  292. USER_REG2SSA(gpr, regs, ip);
  293. gpr.REG(flags) = regs->eflags;
  294. USER_REG2SSA(gpr, regs, sp);
  295. #ifdef __x86_64__
  296. USER_REG2SSA(gpr, regs, 8);
  297. USER_REG2SSA(gpr, regs, 9);
  298. USER_REG2SSA(gpr, regs, 10);
  299. USER_REG2SSA(gpr, regs, 11);
  300. USER_REG2SSA(gpr, regs, 12);
  301. USER_REG2SSA(gpr, regs, 13);
  302. USER_REG2SSA(gpr, regs, 14);
  303. USER_REG2SSA(gpr, regs, 15);
  304. #endif
  305. //write general registers to ssa
  306. if(!set_ssa_gpr(pid, tcs_addr, &gpr))
  307. return -1;
  308. return 0;
  309. }
  310. static int is_eresume(pid_t pid, struct user_regs_struct *regs)
  311. {
  312. unsigned int instr;
  313. if(!se_read_process_mem(pid, (void *)regs->REG(ip), (char *)&instr, sizeof(instr), NULL))
  314. return FALSE;
  315. if((ENCLU == (instr & 0xffffff))
  316. && (SE_ERESUME == regs->REG(ax)))
  317. return TRUE;
  318. return FALSE;
  319. }
  320. static long int get_regs(pid_t pid, void* addr, void* data)
  321. {
  322. int ret = 0;
  323. if(!data)
  324. return -1;
  325. struct user_regs_struct *regs = (struct user_regs_struct *)data;
  326. if(-1 == (ret = g_sys_ptrace(PTRACE_GETREGS, pid, addr, data)))
  327. return -1;
  328. if(is_eresume(pid, regs))
  329. {
  330. //If it is ERESUME instruction, set the real register value
  331. if(-1 == get_enclave_gregs(pid, regs, regs->REG(bx)))
  332. return -1;
  333. else
  334. {
  335. return ret;
  336. }
  337. }
  338. return ret;
  339. }
  340. static long int set_regs(pid_t pid, void* addr, void* data)
  341. {
  342. int ret = 0;
  343. struct user_regs_struct aep_regs;
  344. if(!data)
  345. return -1;
  346. if(-1 == g_sys_ptrace(PTRACE_GETREGS, pid, 0, (void*)&aep_regs))
  347. return -1;
  348. if(is_eresume(pid, &aep_regs))
  349. {
  350. struct user_regs_struct *regs = (struct user_regs_struct *)data;
  351. //get tcs address
  352. if(-1 == (ret = set_enclave_gregs(pid, regs, aep_regs.REG(bx))))
  353. return -1;
  354. else
  355. return ret;
  356. }
  357. else
  358. {
  359. return g_sys_ptrace(PTRACE_SETREGS, pid, addr, data);
  360. }
  361. }
  362. static long int get_fpregs(pid_t pid, void* addr, void* data, int extend)
  363. {
  364. int ret = 0;
  365. if(!data)
  366. return -1;
  367. struct user_regs_struct regs;
  368. if(-1 == (ret = g_sys_ptrace(PTRACE_GETREGS, pid, 0, &regs)))
  369. return -1;
  370. if(is_eresume(pid, &regs))
  371. {
  372. if(extend)
  373. ret = get_ssa_fpxregs(pid, regs.REG(bx), (struct user_fpxregs_struct *)data);
  374. else
  375. ret = get_ssa_fpregs(pid, regs.REG(bx), (struct user_fpregs_struct *)data);
  376. if(ret)
  377. return 0;
  378. else
  379. return -1;
  380. }
  381. else
  382. {
  383. return g_sys_ptrace(PTRACE_GETFPREGS, pid, addr, data);
  384. }
  385. }
  386. static long int set_fpregs(pid_t pid, void* addr, void* data, int extend)
  387. {
  388. int ret = 0;
  389. if(!data)
  390. return -1;
  391. struct user_regs_struct regs;
  392. if(-1 == (ret = g_sys_ptrace(PTRACE_GETREGS, pid, 0, &regs)))
  393. return -1;
  394. if(is_eresume(pid, &regs))
  395. {
  396. if(extend)
  397. ret = set_ssa_fpxregs(pid, regs.REG(bx), (struct user_fpxregs_struct *)data);
  398. else
  399. ret = set_ssa_fpregs(pid, regs.REG(bx), (struct user_fpregs_struct *)data);
  400. if(ret)
  401. return 0;
  402. else
  403. return -1;
  404. }
  405. else
  406. {
  407. return g_sys_ptrace(PTRACE_GETFPREGS, pid, addr, data);
  408. }
  409. }
  410. static long int get_regset(pid_t pid, void* addr, void* data)
  411. {
  412. int ret = 0;
  413. unsigned long type = (unsigned long)addr;
  414. if(!data)
  415. return -1;
  416. struct user_regs_struct regs;
  417. if(-1 == (ret = g_sys_ptrace(PTRACE_GETREGS, pid, 0, &regs)))
  418. return -1;
  419. if(is_eresume(pid, &regs))
  420. {
  421. if(NT_X86_XSTATE != type)
  422. {
  423. SE_TRACE(SE_TRACE_WARNING, "unexpected type for PTRACE_GETREGSET\n");
  424. return -1;
  425. }
  426. struct iovec *iov = (struct iovec *)data;
  427. if(iov->iov_base && iov->iov_len
  428. && get_ssa_xstate(pid, regs.REG(bx), iov->iov_len, (char *)iov->iov_base))
  429. {
  430. return 0;
  431. }
  432. else
  433. return -1;
  434. }
  435. else
  436. {
  437. return g_sys_ptrace(PTRACE_GETREGSET, pid, addr, data);
  438. }
  439. }
  440. static long int set_regset(pid_t pid, void* addr, void* data)
  441. {
  442. int ret = 0;
  443. unsigned long type = (unsigned long)addr;
  444. if(!data)
  445. return -1;
  446. struct user_regs_struct regs;
  447. if(-1 == (ret = g_sys_ptrace(PTRACE_GETREGS, pid, 0, &regs)))
  448. return -1;
  449. if(is_eresume(pid, &regs))
  450. {
  451. if(NT_X86_XSTATE != type)
  452. {
  453. SE_TRACE(SE_TRACE_WARNING, "unexpected type for PTRACE_SETREGSET\n");
  454. return -1;
  455. }
  456. struct iovec *iov = (struct iovec *)data;
  457. if(iov->iov_base && iov->iov_len
  458. && set_ssa_xstate(pid, regs.REG(bx), iov->iov_len, (char *)iov->iov_base))
  459. {
  460. return 0;
  461. }
  462. else
  463. return -1;
  464. }
  465. else
  466. {
  467. return g_sys_ptrace(PTRACE_SETREGSET, pid, addr, data);
  468. }
  469. }
  470. long int ptrace (enum __ptrace_request __request, ...)
  471. {
  472. pid_t pid;
  473. void *addr, *data;
  474. va_list ap;
  475. va_start(ap, __request);
  476. pid = va_arg(ap, pid_t);
  477. addr = va_arg(ap, void *);
  478. data = va_arg(ap, void *);
  479. va_end(ap);
  480. if(__request == PTRACE_GETREGS)
  481. {
  482. return get_regs(pid, addr, data);
  483. }
  484. else if(__request == PTRACE_SETREGS)
  485. {
  486. return set_regs(pid, addr, data);
  487. }
  488. #if 0
  489. //some old system may require this command to get register
  490. else if(__request == PTRACE_PEEKUSER)
  491. {
  492. }
  493. #endif
  494. else if(__request == PTRACE_GETFPREGS)
  495. {
  496. return get_fpregs(pid, addr, data, FALSE);
  497. }
  498. else if(__request == PTRACE_SETFPREGS)
  499. {
  500. return set_fpregs(pid, addr, data, FALSE);
  501. }
  502. else if(__request == PTRACE_GETFPXREGS)
  503. {
  504. return get_fpregs(pid, addr, data, TRUE);
  505. }
  506. else if(__request == PTRACE_SETFPXREGS)
  507. {
  508. return set_fpregs(pid, addr, data, TRUE);
  509. }
  510. //xstave for avx
  511. else if(__request == PTRACE_GETREGSET)
  512. {
  513. return get_regset(pid, addr, data);
  514. }
  515. else if(__request == PTRACE_SETREGSET)
  516. {
  517. return set_regset(pid, addr, data);
  518. }
  519. //For other request just forward it to real ptrace call;
  520. return g_sys_ptrace(__request, pid, addr, data);
  521. }