]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - include/linux/ptrace.h
UBUNTU: [Config] Updating config after rebasing
[mirror_ubuntu-artful-kernel.git] / include / linux / ptrace.h
CommitLineData
1da177e4
LT
1#ifndef _LINUX_PTRACE_H
2#define _LINUX_PTRACE_H
1da177e4 3
607ca46e
DH
4#include <linux/compiler.h> /* For unlikely. */
5#include <linux/sched.h> /* For struct task_struct. */
3f07c014 6#include <linux/sched/signal.h> /* For send_sig(), same_thread_group(), etc. */
607ca46e
DH
7#include <linux/err.h> /* for IS_ERR_VALUE */
8#include <linux/bug.h> /* For BUG_ON. */
4e52365f 9#include <linux/pid_namespace.h> /* For task_active_pid_ns. */
607ca46e 10#include <uapi/linux/ptrace.h>
1da177e4 11
84d77d3f
EB
12extern int ptrace_access_vm(struct task_struct *tsk, unsigned long addr,
13 void *buf, int len, unsigned int gup_flags);
14
1da177e4
LT
15/*
16 * Ptrace flags
260ea101
EB
17 *
18 * The owner ship rules for task->ptrace which holds the ptrace
19 * flags is simple. When a task is running it owns it's task->ptrace
20 * flags. When the a task is stopped the ptracer owns task->ptrace.
1da177e4
LT
21 */
22
3544d72a 23#define PT_SEIZED 0x00010000 /* SEIZE used, enable new behavior */
1da177e4
LT
24#define PT_PTRACED 0x00000001
25#define PT_DTRACE 0x00000002 /* delayed trace (used on m68k, i386) */
643ad838 26
86b6c1f3 27#define PT_OPT_FLAG_SHIFT 3
643ad838 28/* PT_TRACE_* event enable flags */
86b6c1f3
DV
29#define PT_EVENT_FLAG(event) (1 << (PT_OPT_FLAG_SHIFT + (event)))
30#define PT_TRACESYSGOOD PT_EVENT_FLAG(0)
643ad838
TH
31#define PT_TRACE_FORK PT_EVENT_FLAG(PTRACE_EVENT_FORK)
32#define PT_TRACE_VFORK PT_EVENT_FLAG(PTRACE_EVENT_VFORK)
33#define PT_TRACE_CLONE PT_EVENT_FLAG(PTRACE_EVENT_CLONE)
34#define PT_TRACE_EXEC PT_EVENT_FLAG(PTRACE_EVENT_EXEC)
35#define PT_TRACE_VFORK_DONE PT_EVENT_FLAG(PTRACE_EVENT_VFORK_DONE)
36#define PT_TRACE_EXIT PT_EVENT_FLAG(PTRACE_EVENT_EXIT)
fb0fadf9 37#define PT_TRACE_SECCOMP PT_EVENT_FLAG(PTRACE_EVENT_SECCOMP)
1da177e4 38
992fb6e1 39#define PT_EXITKILL (PTRACE_O_EXITKILL << PT_OPT_FLAG_SHIFT)
13c4a901 40#define PT_SUSPEND_SECCOMP (PTRACE_O_SUSPEND_SECCOMP << PT_OPT_FLAG_SHIFT)
992fb6e1 41
1da177e4
LT
42/* single stepping state bits (used on ARM and PA-RISC) */
43#define PT_SINGLESTEP_BIT 31
44#define PT_SINGLESTEP (1<<PT_SINGLESTEP_BIT)
45#define PT_BLOCKSTEP_BIT 30
46#define PT_BLOCKSTEP (1<<PT_BLOCKSTEP_BIT)
47
9b05a69e
NK
48extern long arch_ptrace(struct task_struct *child, long request,
49 unsigned long addr, unsigned long data);
1da177e4
LT
50extern int ptrace_readdata(struct task_struct *tsk, unsigned long src, char __user *dst, int len);
51extern int ptrace_writedata(struct task_struct *tsk, char __user *src, unsigned long dst, int len);
1da177e4 52extern void ptrace_disable(struct task_struct *);
4abf9869
NK
53extern int ptrace_request(struct task_struct *child, long request,
54 unsigned long addr, unsigned long data);
1da177e4
LT
55extern void ptrace_notify(int exit_code);
56extern void __ptrace_link(struct task_struct *child,
c70d9d80
EB
57 struct task_struct *new_parent,
58 const struct cred *ptracer_cred);
1da177e4 59extern void __ptrace_unlink(struct task_struct *child);
7c8bd232 60extern void exit_ptrace(struct task_struct *tracer, struct list_head *dead);
69f594a3
EP
61#define PTRACE_MODE_READ 0x01
62#define PTRACE_MODE_ATTACH 0x02
63#define PTRACE_MODE_NOAUDIT 0x04
caaee623
JH
64#define PTRACE_MODE_FSCREDS 0x08
65#define PTRACE_MODE_REALCREDS 0x10
96d520d0 66#define PTRACE_MODE_NOACCESS_CHK 0x20
caaee623
JH
67
68/* shorthands for READ/ATTACH and FSCREDS/REALCREDS combinations */
69#define PTRACE_MODE_READ_FSCREDS (PTRACE_MODE_READ | PTRACE_MODE_FSCREDS)
70#define PTRACE_MODE_READ_REALCREDS (PTRACE_MODE_READ | PTRACE_MODE_REALCREDS)
71#define PTRACE_MODE_ATTACH_FSCREDS (PTRACE_MODE_ATTACH | PTRACE_MODE_FSCREDS)
72#define PTRACE_MODE_ATTACH_REALCREDS (PTRACE_MODE_ATTACH | PTRACE_MODE_REALCREDS)
96d520d0
TC
73#define PTRACE_MODE_IBPB (PTRACE_MODE_ATTACH | PTRACE_MODE_NOAUDIT \
74 | PTRACE_MODE_NOACCESS_CHK | PTRACE_MODE_REALCREDS)
caaee623
JH
75
76/**
77 * ptrace_may_access - check whether the caller is permitted to access
78 * a target task.
79 * @task: target task
80 * @mode: selects type of access and caller credentials
81 *
82 * Returns true on success, false on denial.
83 *
84 * One of the flags PTRACE_MODE_FSCREDS and PTRACE_MODE_REALCREDS must
85 * be set in @mode to specify whether the access was requested through
86 * a filesystem syscall (should use effective capabilities and fsuid
87 * of the caller) or through an explicit syscall such as
88 * process_vm_writev or ptrace (and should use the real credentials).
89 */
006ebb40 90extern bool ptrace_may_access(struct task_struct *task, unsigned int mode);
96d520d0
TC
91
92extern int ___ptrace_may_access(struct task_struct *cur, struct task_struct *task,
93 unsigned int mode);
1da177e4 94
53b6f9fb
ON
95static inline int ptrace_reparented(struct task_struct *child)
96{
0347e177 97 return !same_thread_group(child->real_parent, child->parent);
53b6f9fb 98}
c6a47cc2 99
1da177e4
LT
100static inline void ptrace_unlink(struct task_struct *child)
101{
102 if (unlikely(child->ptrace))
103 __ptrace_unlink(child);
104}
105
4abf9869
NK
106int generic_ptrace_peekdata(struct task_struct *tsk, unsigned long addr,
107 unsigned long data);
108int generic_ptrace_pokedata(struct task_struct *tsk, unsigned long addr,
109 unsigned long data);
1da177e4 110
06d98473
TH
111/**
112 * ptrace_parent - return the task that is tracing the given task
113 * @task: task to consider
114 *
115 * Returns %NULL if no one is tracing @task, or the &struct task_struct
116 * pointer to its tracer.
117 *
118 * Must called under rcu_read_lock(). The pointer returned might be kept
119 * live only by RCU. During exec, this may be called with task_lock() held
120 * on @task, still held from when check_unsafe_exec() was called.
121 */
122static inline struct task_struct *ptrace_parent(struct task_struct *task)
123{
124 if (unlikely(task->ptrace))
125 return rcu_dereference(task->parent);
126 return NULL;
127}
128
643ad838
TH
129/**
130 * ptrace_event_enabled - test whether a ptrace event is enabled
131 * @task: ptracee of interest
132 * @event: %PTRACE_EVENT_* to test
133 *
134 * Test whether @event is enabled for ptracee @task.
135 *
136 * Returns %true if @event is enabled, %false otherwise.
137 */
138static inline bool ptrace_event_enabled(struct task_struct *task, int event)
139{
140 return task->ptrace & PT_EVENT_FLAG(event);
141}
142
88ac2921
RM
143/**
144 * ptrace_event - possibly stop for a ptrace event notification
643ad838 145 * @event: %PTRACE_EVENT_* value to report
88ac2921
RM
146 * @message: value for %PTRACE_GETEVENTMSG to return
147 *
643ad838
TH
148 * Check whether @event is enabled and, if so, report @event and @message
149 * to the ptrace parent.
88ac2921 150 *
88ac2921
RM
151 * Called without locks.
152 */
f3c04b93 153static inline void ptrace_event(int event, unsigned long message)
88ac2921 154{
f3c04b93
TH
155 if (unlikely(ptrace_event_enabled(current, event))) {
156 current->ptrace_message = message;
157 ptrace_notify((event << 8) | SIGTRAP);
b1845ff5 158 } else if (event == PTRACE_EVENT_EXEC) {
f3c04b93 159 /* legacy EXEC report via SIGTRAP */
b1845ff5
ON
160 if ((current->ptrace & (PT_PTRACED|PT_SEIZED)) == PT_PTRACED)
161 send_sig(SIGTRAP, current, 0);
f3c04b93 162 }
88ac2921
RM
163}
164
4e52365f
MD
165/**
166 * ptrace_event_pid - possibly stop for a ptrace event notification
167 * @event: %PTRACE_EVENT_* value to report
168 * @pid: process identifier for %PTRACE_GETEVENTMSG to return
169 *
170 * Check whether @event is enabled and, if so, report @event and @pid
171 * to the ptrace parent. @pid is reported as the pid_t seen from the
172 * the ptrace parent's pid namespace.
173 *
174 * Called without locks.
175 */
176static inline void ptrace_event_pid(int event, struct pid *pid)
177{
178 /*
179 * FIXME: There's a potential race if a ptracer in a different pid
180 * namespace than parent attaches between computing message below and
181 * when we acquire tasklist_lock in ptrace_stop(). If this happens,
182 * the ptracer will get a bogus pid from PTRACE_GETEVENTMSG.
183 */
184 unsigned long message = 0;
185 struct pid_namespace *ns;
186
187 rcu_read_lock();
188 ns = task_active_pid_ns(rcu_dereference(current->parent));
189 if (ns)
190 message = pid_nr_ns(pid, ns);
191 rcu_read_unlock();
192
193 ptrace_event(event, message);
194}
195
09a05394
RM
196/**
197 * ptrace_init_task - initialize ptrace state for a new child
198 * @child: new child task
199 * @ptrace: true if child should be ptrace'd by parent's tracer
200 *
201 * This is called immediately after adding @child to its parent's children
202 * list. @ptrace is false in the normal case, and true to ptrace @child.
203 *
204 * Called with current's siglock and write_lock_irq(&tasklist_lock) held.
205 */
206static inline void ptrace_init_task(struct task_struct *child, bool ptrace)
207{
208 INIT_LIST_HEAD(&child->ptrace_entry);
209 INIT_LIST_HEAD(&child->ptraced);
6634ae10 210 child->jobctl = 0;
09a05394 211 child->ptrace = 0;
6634ae10
ON
212 child->parent = child->real_parent;
213
214 if (unlikely(ptrace) && current->ptrace) {
09a05394 215 child->ptrace = current->ptrace;
c70d9d80 216 __ptrace_link(child, current->parent, current->ptracer_cred);
dcace06c 217
d184d6eb
ON
218 if (child->ptrace & PT_SEIZED)
219 task_set_jobctl_pending(child, JOBCTL_TRAP_STOP);
220 else
221 sigaddset(&child->pending.signal, SIGSTOP);
222
dcace06c 223 set_tsk_thread_flag(child, TIF_SIGPENDING);
09a05394 224 }
c70d9d80
EB
225 else
226 child->ptracer_cred = NULL;
09a05394
RM
227}
228
dae33574
RM
229/**
230 * ptrace_release_task - final ptrace-related cleanup of a zombie being reaped
231 * @task: task in %EXIT_DEAD state
232 *
233 * Called with write_lock(&tasklist_lock) held.
234 */
235static inline void ptrace_release_task(struct task_struct *task)
236{
237 BUG_ON(!list_empty(&task->ptraced));
238 ptrace_unlink(task);
239 BUG_ON(!list_empty(&task->ptrace_entry));
240}
241
1da177e4
LT
242#ifndef force_successful_syscall_return
243/*
244 * System call handlers that, upon successful completion, need to return a
245 * negative value should call force_successful_syscall_return() right before
246 * returning. On architectures where the syscall convention provides for a
247 * separate error flag (e.g., alpha, ia64, ppc{,64}, sparc{,64}, possibly
248 * others), this macro can be used to ensure that the error flag will not get
249 * set. On architectures which do not support a separate error flag, the macro
250 * is a no-op and the spurious error condition needs to be filtered out by some
251 * other means (e.g., in user-level, by passing an extra argument to the
252 * syscall handler, or something along those lines).
253 */
254#define force_successful_syscall_return() do { } while (0)
255#endif
256
d7e7528b
EP
257#ifndef is_syscall_success
258/*
259 * On most systems we can tell if a syscall is a success based on if the retval
260 * is an error value. On some systems like ia64 and powerpc they have different
261 * indicators of success/failure and must define their own.
262 */
263#define is_syscall_success(regs) (!IS_ERR_VALUE((unsigned long)(regs_return_value(regs))))
264#endif
265
fb7fa8f1
RM
266/*
267 * <asm/ptrace.h> should define the following things inside #ifdef __KERNEL__.
268 *
269 * These do-nothing inlines are used when the arch does not
270 * implement single-step. The kerneldoc comments are here
271 * to document the interface for all arch definitions.
272 */
273
274#ifndef arch_has_single_step
275/**
276 * arch_has_single_step - does this CPU support user-mode single-step?
277 *
278 * If this is defined, then there must be function declarations or
279 * inlines for user_enable_single_step() and user_disable_single_step().
280 * arch_has_single_step() should evaluate to nonzero iff the machine
281 * supports instruction single-step for user mode.
282 * It can be a constant or it can test a CPU feature bit.
283 */
284#define arch_has_single_step() (0)
285
286/**
287 * user_enable_single_step - single-step in user-mode task
288 * @task: either current or a task stopped in %TASK_TRACED
289 *
290 * This can only be called when arch_has_single_step() has returned nonzero.
291 * Set @task so that when it returns to user mode, it will trap after the
dc802c2d
RM
292 * next single instruction executes. If arch_has_block_step() is defined,
293 * this must clear the effects of user_enable_block_step() too.
fb7fa8f1
RM
294 */
295static inline void user_enable_single_step(struct task_struct *task)
296{
297 BUG(); /* This can never be called. */
298}
299
300/**
301 * user_disable_single_step - cancel user-mode single-step
302 * @task: either current or a task stopped in %TASK_TRACED
303 *
dc802c2d
RM
304 * Clear @task of the effects of user_enable_single_step() and
305 * user_enable_block_step(). This can be called whether or not either
306 * of those was ever called on @task, and even if arch_has_single_step()
307 * returned zero.
fb7fa8f1
RM
308 */
309static inline void user_disable_single_step(struct task_struct *task)
310{
311}
dacbe41f
CH
312#else
313extern void user_enable_single_step(struct task_struct *);
314extern void user_disable_single_step(struct task_struct *);
fb7fa8f1
RM
315#endif /* arch_has_single_step */
316
dc802c2d
RM
317#ifndef arch_has_block_step
318/**
319 * arch_has_block_step - does this CPU support user-mode block-step?
320 *
321 * If this is defined, then there must be a function declaration or inline
322 * for user_enable_block_step(), and arch_has_single_step() must be defined
323 * too. arch_has_block_step() should evaluate to nonzero iff the machine
324 * supports step-until-branch for user mode. It can be a constant or it
325 * can test a CPU feature bit.
326 */
5b88abbf 327#define arch_has_block_step() (0)
dc802c2d
RM
328
329/**
330 * user_enable_block_step - step until branch in user-mode task
331 * @task: either current or a task stopped in %TASK_TRACED
332 *
333 * This can only be called when arch_has_block_step() has returned nonzero,
334 * and will never be called when single-instruction stepping is being used.
335 * Set @task so that when it returns to user mode, it will trap after the
336 * next branch or trap taken.
337 */
338static inline void user_enable_block_step(struct task_struct *task)
339{
340 BUG(); /* This can never be called. */
341}
dacbe41f
CH
342#else
343extern void user_enable_block_step(struct task_struct *);
dc802c2d
RM
344#endif /* arch_has_block_step */
345
85ec7fd9
ON
346#ifdef ARCH_HAS_USER_SINGLE_STEP_INFO
347extern void user_single_step_siginfo(struct task_struct *tsk,
348 struct pt_regs *regs, siginfo_t *info);
349#else
350static inline void user_single_step_siginfo(struct task_struct *tsk,
351 struct pt_regs *regs, siginfo_t *info)
352{
353 memset(info, 0, sizeof(*info));
354 info->si_signo = SIGTRAP;
355}
356#endif
357
1a669c2f
RM
358#ifndef arch_ptrace_stop_needed
359/**
360 * arch_ptrace_stop_needed - Decide whether arch_ptrace_stop() should be called
361 * @code: current->exit_code value ptrace will stop with
362 * @info: siginfo_t pointer (or %NULL) for signal ptrace will stop with
363 *
364 * This is called with the siglock held, to decide whether or not it's
365 * necessary to release the siglock and call arch_ptrace_stop() with the
366 * same @code and @info arguments. It can be defined to a constant if
367 * arch_ptrace_stop() is never required, or always is. On machines where
368 * this makes sense, it should be defined to a quick test to optimize out
369 * calling arch_ptrace_stop() when it would be superfluous. For example,
370 * if the thread has not been back to user mode since the last stop, the
371 * thread state might indicate that nothing needs to be done.
b9cd18de
TH
372 *
373 * This is guaranteed to be invoked once before a task stops for ptrace and
374 * may include arch-specific operations necessary prior to a ptrace stop.
1a669c2f
RM
375 */
376#define arch_ptrace_stop_needed(code, info) (0)
377#endif
378
379#ifndef arch_ptrace_stop
380/**
381 * arch_ptrace_stop - Do machine-specific work before stopping for ptrace
382 * @code: current->exit_code value ptrace will stop with
383 * @info: siginfo_t pointer (or %NULL) for signal ptrace will stop with
384 *
385 * This is called with no locks held when arch_ptrace_stop_needed() has
386 * just returned nonzero. It is allowed to block, e.g. for user memory
387 * access. The arch can have machine-specific work to be done before
388 * ptrace stops. On ia64, register backing store gets written back to user
389 * memory here. Since this can be costly (requires dropping the siglock),
390 * we only do it when the arch requires it for this particular stop, as
391 * indicated by arch_ptrace_stop_needed().
392 */
393#define arch_ptrace_stop(code, info) do { } while (0)
394#endif
395
a3460a59
AV
396#ifndef current_pt_regs
397#define current_pt_regs() task_pt_regs(current)
398#endif
399
22062a96
AV
400/*
401 * unlike current_pt_regs(), this one is equal to task_pt_regs(current)
402 * on *all* architectures; the only reason to have a per-arch definition
403 * is optimisation.
404 */
405#ifndef signal_pt_regs
406#define signal_pt_regs() task_pt_regs(current)
407#endif
408
1ca97bb5
AV
409#ifndef current_user_stack_pointer
410#define current_user_stack_pointer() user_stack_pointer(current_pt_regs())
411#endif
412
bbc69863
RM
413extern int task_current_syscall(struct task_struct *target, long *callno,
414 unsigned long args[6], unsigned int maxargs,
415 unsigned long *sp, unsigned long *pc);
416
1da177e4 417#endif