ptrace.c 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408
  1. // TODO some minor issues
  2. /*
  3. * This file is subject to the terms and conditions of the GNU General Public
  4. * License. See the file "COPYING" in the main directory of this archive
  5. * for more details.
  6. *
  7. * Copyright (C) 2001 - 2005 Tensilica Inc.
  8. *
  9. * Joe Taylor <joe@tensilica.com, joetylr@yahoo.com>
  10. * Chris Zankel <chris@zankel.net>
  11. * Scott Foehner<sfoehner@yahoo.com>,
  12. * Kevin Chea
  13. * Marc Gauthier<marc@tensilica.com> <marc@alumni.uwaterloo.ca>
  14. */
  15. #include <linux/config.h>
  16. #include <linux/kernel.h>
  17. #include <linux/sched.h>
  18. #include <linux/mm.h>
  19. #include <linux/errno.h>
  20. #include <linux/ptrace.h>
  21. #include <linux/smp.h>
  22. #include <linux/smp_lock.h>
  23. #include <linux/security.h>
  24. #include <linux/signal.h>
  25. #include <asm/pgtable.h>
  26. #include <asm/page.h>
  27. #include <asm/system.h>
  28. #include <asm/uaccess.h>
  29. #include <asm/ptrace.h>
  30. #include <asm/elf.h>
  31. #define TEST_KERNEL // verify kernel operations FIXME: remove
  32. /*
  33. * Called by kernel/ptrace.c when detaching..
  34. *
  35. * Make sure single step bits etc are not set.
  36. */
  37. void ptrace_disable(struct task_struct *child)
  38. {
  39. /* Nothing to do.. */
  40. }
  41. int sys_ptrace(long request, long pid, long addr, long data)
  42. {
  43. struct task_struct *child;
  44. int ret = -EPERM;
  45. lock_kernel();
  46. #if 0
  47. if ((int)request != 1)
  48. printk("ptrace(r=%d,pid=%d,addr=%08lx,data=%08lx)\n",
  49. (int) request, (int) pid, (unsigned long) addr,
  50. (unsigned long) data);
  51. #endif
  52. if (request == PTRACE_TRACEME) {
  53. /* Are we already being traced? */
  54. if (current->ptrace & PT_PTRACED)
  55. goto out;
  56. if ((ret = security_ptrace(current->parent, current)))
  57. goto out;
  58. /* Set the ptrace bit in the process flags. */
  59. current->ptrace |= PT_PTRACED;
  60. ret = 0;
  61. goto out;
  62. }
  63. ret = -ESRCH;
  64. read_lock(&tasklist_lock);
  65. child = find_task_by_pid(pid);
  66. if (child)
  67. get_task_struct(child);
  68. read_unlock(&tasklist_lock);
  69. if (!child)
  70. goto out;
  71. ret = -EPERM;
  72. if (pid == 1) /* you may not mess with init */
  73. goto out;
  74. if (request == PTRACE_ATTACH) {
  75. ret = ptrace_attach(child);
  76. goto out_tsk;
  77. }
  78. if ((ret = ptrace_check_attach(child, request == PTRACE_KILL)) < 0)
  79. goto out_tsk;
  80. switch (request) {
  81. case PTRACE_PEEKTEXT: /* read word at location addr. */
  82. case PTRACE_PEEKDATA:
  83. {
  84. unsigned long tmp;
  85. int copied;
  86. copied = access_process_vm(child, addr, &tmp, sizeof(tmp), 0);
  87. ret = -EIO;
  88. if (copied != sizeof(tmp))
  89. break;
  90. ret = put_user(tmp,(unsigned long *) data);
  91. goto out;
  92. }
  93. /* Read the word at location addr in the USER area. */
  94. case PTRACE_PEEKUSR:
  95. {
  96. struct pt_regs *regs;
  97. unsigned long tmp;
  98. regs = xtensa_pt_regs(child);
  99. tmp = 0; /* Default return value. */
  100. switch(addr) {
  101. case REG_AR_BASE ... REG_AR_BASE + XCHAL_NUM_AREGS - 1:
  102. {
  103. int ar = addr - REG_AR_BASE - regs->windowbase * 4;
  104. ar &= (XCHAL_NUM_AREGS - 1);
  105. if (ar < 16 && ar + (regs->wmask >> 4) * 4 >= 0)
  106. tmp = regs->areg[ar];
  107. else
  108. ret = -EIO;
  109. break;
  110. }
  111. case REG_A_BASE ... REG_A_BASE + 15:
  112. tmp = regs->areg[addr - REG_A_BASE];
  113. break;
  114. case REG_PC:
  115. tmp = regs->pc;
  116. break;
  117. case REG_PS:
  118. /* Note: PS.EXCM is not set while user task is running;
  119. * its being set in regs is for exception handling
  120. * convenience. */
  121. tmp = (regs->ps & ~XCHAL_PS_EXCM_MASK);
  122. break;
  123. case REG_WB:
  124. tmp = regs->windowbase;
  125. break;
  126. case REG_WS:
  127. tmp = regs->windowstart;
  128. break;
  129. case REG_LBEG:
  130. tmp = regs->lbeg;
  131. break;
  132. case REG_LEND:
  133. tmp = regs->lend;
  134. break;
  135. case REG_LCOUNT:
  136. tmp = regs->lcount;
  137. break;
  138. case REG_SAR:
  139. tmp = regs->sar;
  140. break;
  141. case REG_DEPC:
  142. tmp = regs->depc;
  143. break;
  144. case REG_EXCCAUSE:
  145. tmp = regs->exccause;
  146. break;
  147. case REG_EXCVADDR:
  148. tmp = regs->excvaddr;
  149. break;
  150. case SYSCALL_NR:
  151. tmp = regs->syscall;
  152. break;
  153. default:
  154. tmp = 0;
  155. ret = -EIO;
  156. goto out;
  157. }
  158. ret = put_user(tmp, (unsigned long *) data);
  159. goto out;
  160. }
  161. case PTRACE_POKETEXT: /* write the word at location addr. */
  162. case PTRACE_POKEDATA:
  163. if (access_process_vm(child, addr, &data, sizeof(data), 1)
  164. == sizeof(data))
  165. break;
  166. ret = -EIO;
  167. goto out;
  168. case PTRACE_POKEUSR:
  169. {
  170. struct pt_regs *regs;
  171. regs = xtensa_pt_regs(child);
  172. switch (addr) {
  173. case REG_AR_BASE ... REG_AR_BASE + XCHAL_NUM_AREGS - 1:
  174. {
  175. int ar = addr - REG_AR_BASE - regs->windowbase * 4;
  176. if (ar < 16 && ar + (regs->wmask >> 4) * 4 >= 0)
  177. regs->areg[ar & (XCHAL_NUM_AREGS - 1)] = data;
  178. else
  179. ret = -EIO;
  180. break;
  181. }
  182. case REG_A_BASE ... REG_A_BASE + 15:
  183. regs->areg[addr - REG_A_BASE] = data;
  184. break;
  185. case REG_PC:
  186. regs->pc = data;
  187. break;
  188. case SYSCALL_NR:
  189. regs->syscall = data;
  190. break;
  191. #ifdef TEST_KERNEL
  192. case REG_WB:
  193. regs->windowbase = data;
  194. break;
  195. case REG_WS:
  196. regs->windowstart = data;
  197. break;
  198. #endif
  199. default:
  200. /* The rest are not allowed. */
  201. ret = -EIO;
  202. break;
  203. }
  204. break;
  205. }
  206. /* continue and stop at next (return from) syscall */
  207. case PTRACE_SYSCALL:
  208. case PTRACE_CONT: /* restart after signal. */
  209. {
  210. ret = -EIO;
  211. if (!valid_signal(data))
  212. break;
  213. if (request == PTRACE_SYSCALL)
  214. set_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
  215. else
  216. clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
  217. child->exit_code = data;
  218. /* Make sure the single step bit is not set. */
  219. child->ptrace &= ~PT_SINGLESTEP;
  220. wake_up_process(child);
  221. ret = 0;
  222. break;
  223. }
  224. /*
  225. * make the child exit. Best I can do is send it a sigkill.
  226. * perhaps it should be put in the status that it wants to
  227. * exit.
  228. */
  229. case PTRACE_KILL:
  230. ret = 0;
  231. if (child->state == EXIT_ZOMBIE) /* already dead */
  232. break;
  233. child->exit_code = SIGKILL;
  234. child->ptrace &= ~PT_SINGLESTEP;
  235. wake_up_process(child);
  236. break;
  237. case PTRACE_SINGLESTEP:
  238. ret = -EIO;
  239. if (!valid_signal(data))
  240. break;
  241. clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
  242. child->ptrace |= PT_SINGLESTEP;
  243. child->exit_code = data;
  244. wake_up_process(child);
  245. ret = 0;
  246. break;
  247. case PTRACE_GETREGS:
  248. {
  249. /* 'data' points to user memory in which to write.
  250. * Mainly due to the non-live register values, we
  251. * reformat the register values into something more
  252. * standard. For convenience, we use the handy
  253. * elf_gregset_t format. */
  254. xtensa_gregset_t format;
  255. struct pt_regs *regs = xtensa_pt_regs(child);
  256. do_copy_regs (&format, regs, child);
  257. /* Now, copy to user space nice and easy... */
  258. ret = 0;
  259. if (copy_to_user((void *)data, &format, sizeof(elf_gregset_t)))
  260. ret = -EFAULT;
  261. break;
  262. }
  263. case PTRACE_SETREGS:
  264. {
  265. /* 'data' points to user memory that contains the new
  266. * values in the elf_gregset_t format. */
  267. xtensa_gregset_t format;
  268. struct pt_regs *regs = xtensa_pt_regs(child);
  269. if (copy_from_user(&format,(void *)data,sizeof(elf_gregset_t))){
  270. ret = -EFAULT;
  271. break;
  272. }
  273. /* FIXME: Perhaps we want some sanity checks on
  274. * these user-space values? See ARM version. Are
  275. * debuggers a security concern? */
  276. do_restore_regs (&format, regs, child);
  277. ret = 0;
  278. break;
  279. }
  280. case PTRACE_GETFPREGS:
  281. {
  282. /* 'data' points to user memory in which to write.
  283. * For convenience, we use the handy
  284. * elf_fpregset_t format. */
  285. elf_fpregset_t fpregs;
  286. struct pt_regs *regs = xtensa_pt_regs(child);
  287. do_save_fpregs (&fpregs, regs, child);
  288. /* Now, copy to user space nice and easy... */
  289. ret = 0;
  290. if (copy_to_user((void *)data, &fpregs, sizeof(elf_fpregset_t)))
  291. ret = -EFAULT;
  292. break;
  293. }
  294. case PTRACE_SETFPREGS:
  295. {
  296. /* 'data' points to user memory that contains the new
  297. * values in the elf_fpregset_t format.
  298. */
  299. elf_fpregset_t fpregs;
  300. struct pt_regs *regs = xtensa_pt_regs(child);
  301. ret = 0;
  302. if (copy_from_user(&fpregs, (void *)data, sizeof(elf_fpregset_t))) {
  303. ret = -EFAULT;
  304. break;
  305. }
  306. if (do_restore_fpregs (&fpregs, regs, child))
  307. ret = -EIO;
  308. break;
  309. }
  310. case PTRACE_GETFPREGSIZE:
  311. /* 'data' points to 'unsigned long' set to the size
  312. * of elf_fpregset_t
  313. */
  314. ret = put_user(sizeof(elf_fpregset_t), (unsigned long *) data);
  315. break;
  316. case PTRACE_DETACH: /* detach a process that was attached. */
  317. ret = ptrace_detach(child, data);
  318. break;
  319. default:
  320. ret = ptrace_request(child, request, addr, data);
  321. goto out;
  322. }
  323. out_tsk:
  324. put_task_struct(child);
  325. out:
  326. unlock_kernel();
  327. return ret;
  328. }
  329. void do_syscall_trace(void)
  330. {
  331. if (!test_thread_flag(TIF_SYSCALL_TRACE))
  332. return;
  333. if (!(current->ptrace & PT_PTRACED))
  334. return;
  335. /*
  336. * The 0x80 provides a way for the tracing parent to distinguish
  337. * between a syscall stop and SIGTRAP delivery
  338. */
  339. ptrace_notify(SIGTRAP|((current->ptrace & PT_TRACESYSGOOD) ? 0x80 : 0));
  340. /*
  341. * this isn't the same as continuing with a signal, but it will do
  342. * for normal use. strace only continues with a signal if the
  343. * stopping signal is not SIGTRAP. -brl
  344. */
  345. if (current->exit_code) {
  346. send_sig(current->exit_code, current, 1);
  347. current->exit_code = 0;
  348. }
  349. }