]>
Commit | Line | Data |
---|---|---|
5a0015d6 CZ |
1 | // TODO some minor issues |
2 | /* | |
3 | * This file is subject to the terms and conditions of the GNU General Public | |
4 | * License. See the file "COPYING" in the main directory of this archive | |
5 | * for more details. | |
6 | * | |
7 | * Copyright (C) 2001 - 2005 Tensilica Inc. | |
8 | * | |
9 | * Joe Taylor <joe@tensilica.com, joetylr@yahoo.com> | |
10 | * Chris Zankel <chris@zankel.net> | |
11 | * Scott Foehner<sfoehner@yahoo.com>, | |
12 | * Kevin Chea | |
13 | * Marc Gauthier<marc@tensilica.com> <marc@alumni.uwaterloo.ca> | |
14 | */ | |
15 | ||
5a0015d6 CZ |
16 | #include <linux/kernel.h> |
17 | #include <linux/sched.h> | |
18 | #include <linux/mm.h> | |
19 | #include <linux/errno.h> | |
20 | #include <linux/ptrace.h> | |
21 | #include <linux/smp.h> | |
22 | #include <linux/smp_lock.h> | |
23 | #include <linux/security.h> | |
0ee23b50 | 24 | #include <linux/signal.h> |
5a0015d6 CZ |
25 | |
26 | #include <asm/pgtable.h> | |
27 | #include <asm/page.h> | |
28 | #include <asm/system.h> | |
29 | #include <asm/uaccess.h> | |
30 | #include <asm/ptrace.h> | |
31 | #include <asm/elf.h> | |
32 | ||
33 | #define TEST_KERNEL // verify kernel operations FIXME: remove | |
34 | ||
35 | ||
36 | /* | |
37 | * Called by kernel/ptrace.c when detaching.. | |
38 | * | |
39 | * Make sure single step bits etc are not set. | |
40 | */ | |
41 | ||
42 | void ptrace_disable(struct task_struct *child) | |
43 | { | |
44 | /* Nothing to do.. */ | |
45 | } | |
46 | ||
481bed45 | 47 | long arch_ptrace(struct task_struct *child, long request, long addr, long data) |
5a0015d6 | 48 | { |
5a0015d6 CZ |
49 | int ret = -EPERM; |
50 | ||
5a0015d6 CZ |
51 | switch (request) { |
52 | case PTRACE_PEEKTEXT: /* read word at location addr. */ | |
53 | case PTRACE_PEEKDATA: | |
54 | { | |
55 | unsigned long tmp; | |
56 | int copied; | |
57 | ||
58 | copied = access_process_vm(child, addr, &tmp, sizeof(tmp), 0); | |
59 | ret = -EIO; | |
60 | if (copied != sizeof(tmp)) | |
61 | break; | |
62 | ret = put_user(tmp,(unsigned long *) data); | |
63 | ||
64 | goto out; | |
65 | } | |
66 | ||
67 | /* Read the word at location addr in the USER area. */ | |
68 | ||
69 | case PTRACE_PEEKUSR: | |
70 | { | |
71 | struct pt_regs *regs; | |
72 | unsigned long tmp; | |
73 | ||
04fe6faf | 74 | regs = task_pt_regs(child); |
5a0015d6 CZ |
75 | tmp = 0; /* Default return value. */ |
76 | ||
77 | switch(addr) { | |
78 | ||
79 | case REG_AR_BASE ... REG_AR_BASE + XCHAL_NUM_AREGS - 1: | |
80 | { | |
81 | int ar = addr - REG_AR_BASE - regs->windowbase * 4; | |
82 | ar &= (XCHAL_NUM_AREGS - 1); | |
83 | if (ar < 16 && ar + (regs->wmask >> 4) * 4 >= 0) | |
84 | tmp = regs->areg[ar]; | |
85 | else | |
86 | ret = -EIO; | |
87 | break; | |
88 | } | |
89 | case REG_A_BASE ... REG_A_BASE + 15: | |
90 | tmp = regs->areg[addr - REG_A_BASE]; | |
91 | break; | |
92 | case REG_PC: | |
93 | tmp = regs->pc; | |
94 | break; | |
95 | case REG_PS: | |
96 | /* Note: PS.EXCM is not set while user task is running; | |
97 | * its being set in regs is for exception handling | |
98 | * convenience. */ | |
99 | tmp = (regs->ps & ~XCHAL_PS_EXCM_MASK); | |
100 | break; | |
101 | case REG_WB: | |
102 | tmp = regs->windowbase; | |
103 | break; | |
104 | case REG_WS: | |
105 | tmp = regs->windowstart; | |
106 | break; | |
107 | case REG_LBEG: | |
108 | tmp = regs->lbeg; | |
109 | break; | |
110 | case REG_LEND: | |
111 | tmp = regs->lend; | |
112 | break; | |
113 | case REG_LCOUNT: | |
114 | tmp = regs->lcount; | |
115 | break; | |
116 | case REG_SAR: | |
117 | tmp = regs->sar; | |
118 | break; | |
119 | case REG_DEPC: | |
120 | tmp = regs->depc; | |
121 | break; | |
122 | case REG_EXCCAUSE: | |
123 | tmp = regs->exccause; | |
124 | break; | |
125 | case REG_EXCVADDR: | |
126 | tmp = regs->excvaddr; | |
127 | break; | |
128 | case SYSCALL_NR: | |
129 | tmp = regs->syscall; | |
130 | break; | |
131 | default: | |
132 | tmp = 0; | |
133 | ret = -EIO; | |
134 | goto out; | |
135 | } | |
136 | ret = put_user(tmp, (unsigned long *) data); | |
137 | goto out; | |
138 | } | |
139 | ||
140 | case PTRACE_POKETEXT: /* write the word at location addr. */ | |
141 | case PTRACE_POKEDATA: | |
142 | if (access_process_vm(child, addr, &data, sizeof(data), 1) | |
143 | == sizeof(data)) | |
144 | break; | |
145 | ret = -EIO; | |
146 | goto out; | |
147 | ||
148 | case PTRACE_POKEUSR: | |
149 | { | |
150 | struct pt_regs *regs; | |
04fe6faf | 151 | regs = task_pt_regs(child); |
5a0015d6 CZ |
152 | |
153 | switch (addr) { | |
154 | case REG_AR_BASE ... REG_AR_BASE + XCHAL_NUM_AREGS - 1: | |
155 | { | |
156 | int ar = addr - REG_AR_BASE - regs->windowbase * 4; | |
157 | if (ar < 16 && ar + (regs->wmask >> 4) * 4 >= 0) | |
158 | regs->areg[ar & (XCHAL_NUM_AREGS - 1)] = data; | |
159 | else | |
160 | ret = -EIO; | |
161 | break; | |
162 | } | |
163 | case REG_A_BASE ... REG_A_BASE + 15: | |
164 | regs->areg[addr - REG_A_BASE] = data; | |
165 | break; | |
166 | case REG_PC: | |
167 | regs->pc = data; | |
168 | break; | |
169 | case SYSCALL_NR: | |
170 | regs->syscall = data; | |
171 | break; | |
172 | #ifdef TEST_KERNEL | |
173 | case REG_WB: | |
174 | regs->windowbase = data; | |
175 | break; | |
176 | case REG_WS: | |
177 | regs->windowstart = data; | |
178 | break; | |
179 | #endif | |
180 | ||
181 | default: | |
182 | /* The rest are not allowed. */ | |
183 | ret = -EIO; | |
184 | break; | |
185 | } | |
186 | break; | |
187 | } | |
188 | ||
189 | /* continue and stop at next (return from) syscall */ | |
190 | case PTRACE_SYSCALL: | |
191 | case PTRACE_CONT: /* restart after signal. */ | |
192 | { | |
193 | ret = -EIO; | |
0ee23b50 | 194 | if (!valid_signal(data)) |
5a0015d6 CZ |
195 | break; |
196 | if (request == PTRACE_SYSCALL) | |
197 | set_tsk_thread_flag(child, TIF_SYSCALL_TRACE); | |
198 | else | |
199 | clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE); | |
200 | child->exit_code = data; | |
201 | /* Make sure the single step bit is not set. */ | |
202 | child->ptrace &= ~PT_SINGLESTEP; | |
203 | wake_up_process(child); | |
204 | ret = 0; | |
205 | break; | |
206 | } | |
207 | ||
208 | /* | |
209 | * make the child exit. Best I can do is send it a sigkill. | |
210 | * perhaps it should be put in the status that it wants to | |
211 | * exit. | |
212 | */ | |
213 | case PTRACE_KILL: | |
214 | ret = 0; | |
215 | if (child->state == EXIT_ZOMBIE) /* already dead */ | |
216 | break; | |
217 | child->exit_code = SIGKILL; | |
218 | child->ptrace &= ~PT_SINGLESTEP; | |
219 | wake_up_process(child); | |
220 | break; | |
221 | ||
222 | case PTRACE_SINGLESTEP: | |
223 | ret = -EIO; | |
0ee23b50 | 224 | if (!valid_signal(data)) |
5a0015d6 CZ |
225 | break; |
226 | clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE); | |
227 | child->ptrace |= PT_SINGLESTEP; | |
228 | child->exit_code = data; | |
229 | wake_up_process(child); | |
230 | ret = 0; | |
231 | break; | |
232 | ||
233 | case PTRACE_GETREGS: | |
234 | { | |
235 | /* 'data' points to user memory in which to write. | |
236 | * Mainly due to the non-live register values, we | |
237 | * reformat the register values into something more | |
238 | * standard. For convenience, we use the handy | |
239 | * elf_gregset_t format. */ | |
240 | ||
241 | xtensa_gregset_t format; | |
04fe6faf | 242 | struct pt_regs *regs = task_pt_regs(child); |
5a0015d6 CZ |
243 | |
244 | do_copy_regs (&format, regs, child); | |
245 | ||
246 | /* Now, copy to user space nice and easy... */ | |
247 | ret = 0; | |
248 | if (copy_to_user((void *)data, &format, sizeof(elf_gregset_t))) | |
249 | ret = -EFAULT; | |
250 | break; | |
251 | } | |
252 | ||
253 | case PTRACE_SETREGS: | |
254 | { | |
255 | /* 'data' points to user memory that contains the new | |
256 | * values in the elf_gregset_t format. */ | |
257 | ||
258 | xtensa_gregset_t format; | |
04fe6faf | 259 | struct pt_regs *regs = task_pt_regs(child); |
5a0015d6 CZ |
260 | |
261 | if (copy_from_user(&format,(void *)data,sizeof(elf_gregset_t))){ | |
262 | ret = -EFAULT; | |
263 | break; | |
264 | } | |
265 | ||
266 | /* FIXME: Perhaps we want some sanity checks on | |
267 | * these user-space values? See ARM version. Are | |
268 | * debuggers a security concern? */ | |
269 | ||
270 | do_restore_regs (&format, regs, child); | |
271 | ||
272 | ret = 0; | |
273 | break; | |
274 | } | |
275 | ||
276 | case PTRACE_GETFPREGS: | |
277 | { | |
278 | /* 'data' points to user memory in which to write. | |
279 | * For convenience, we use the handy | |
280 | * elf_fpregset_t format. */ | |
281 | ||
282 | elf_fpregset_t fpregs; | |
04fe6faf | 283 | struct pt_regs *regs = task_pt_regs(child); |
5a0015d6 CZ |
284 | |
285 | do_save_fpregs (&fpregs, regs, child); | |
286 | ||
287 | /* Now, copy to user space nice and easy... */ | |
288 | ret = 0; | |
289 | if (copy_to_user((void *)data, &fpregs, sizeof(elf_fpregset_t))) | |
290 | ret = -EFAULT; | |
291 | ||
292 | break; | |
293 | } | |
294 | ||
295 | case PTRACE_SETFPREGS: | |
296 | { | |
297 | /* 'data' points to user memory that contains the new | |
298 | * values in the elf_fpregset_t format. | |
299 | */ | |
300 | elf_fpregset_t fpregs; | |
04fe6faf | 301 | struct pt_regs *regs = task_pt_regs(child); |
5a0015d6 CZ |
302 | |
303 | ret = 0; | |
304 | if (copy_from_user(&fpregs, (void *)data, sizeof(elf_fpregset_t))) { | |
305 | ret = -EFAULT; | |
306 | break; | |
307 | } | |
308 | ||
309 | if (do_restore_fpregs (&fpregs, regs, child)) | |
310 | ret = -EIO; | |
311 | break; | |
312 | } | |
313 | ||
314 | case PTRACE_GETFPREGSIZE: | |
315 | /* 'data' points to 'unsigned long' set to the size | |
316 | * of elf_fpregset_t | |
317 | */ | |
318 | ret = put_user(sizeof(elf_fpregset_t), (unsigned long *) data); | |
319 | break; | |
320 | ||
321 | case PTRACE_DETACH: /* detach a process that was attached. */ | |
322 | ret = ptrace_detach(child, data); | |
323 | break; | |
324 | ||
325 | default: | |
326 | ret = ptrace_request(child, request, addr, data); | |
327 | goto out; | |
328 | } | |
481bed45 | 329 | out: |
5a0015d6 CZ |
330 | return ret; |
331 | } | |
332 | ||
333 | void do_syscall_trace(void) | |
334 | { | |
335 | if (!test_thread_flag(TIF_SYSCALL_TRACE)) | |
336 | return; | |
337 | ||
338 | if (!(current->ptrace & PT_PTRACED)) | |
339 | return; | |
340 | ||
341 | /* | |
342 | * The 0x80 provides a way for the tracing parent to distinguish | |
343 | * between a syscall stop and SIGTRAP delivery | |
344 | */ | |
345 | ptrace_notify(SIGTRAP|((current->ptrace & PT_TRACESYSGOOD) ? 0x80 : 0)); | |
346 | ||
347 | /* | |
348 | * this isn't the same as continuing with a signal, but it will do | |
349 | * for normal use. strace only continues with a signal if the | |
350 | * stopping signal is not SIGTRAP. -brl | |
351 | */ | |
352 | if (current->exit_code) { | |
353 | send_sig(current->exit_code, current, 1); | |
354 | current->exit_code = 0; | |
355 | } | |
356 | } |