]> www.pilppa.org Git - linux-2.6-omap-h63xx.git/blob - arch/sh/kernel/ptrace_32.c
sh: Add missing task_user_regset_view() definition.
[linux-2.6-omap-h63xx.git] / arch / sh / kernel / ptrace_32.c
1 /*
2  * SuperH process tracing
3  *
4  * Copyright (C) 1999, 2000  Kaz Kojima & Niibe Yutaka
5  * Copyright (C) 2002 - 2008  Paul Mundt
6  *
7  * Audit support by Yuichi Nakamura <ynakam@hitachisoft.jp>
8  *
9  * This file is subject to the terms and conditions of the GNU General Public
10  * License.  See the file "COPYING" in the main directory of this archive
11  * for more details.
12  */
13 #include <linux/kernel.h>
14 #include <linux/sched.h>
15 #include <linux/mm.h>
16 #include <linux/smp.h>
17 #include <linux/errno.h>
18 #include <linux/ptrace.h>
19 #include <linux/user.h>
20 #include <linux/slab.h>
21 #include <linux/security.h>
22 #include <linux/signal.h>
23 #include <linux/io.h>
24 #include <linux/audit.h>
25 #include <linux/seccomp.h>
26 #include <linux/tracehook.h>
27 #include <linux/elf.h>
28 #include <linux/regset.h>
29 #include <asm/uaccess.h>
30 #include <asm/pgtable.h>
31 #include <asm/system.h>
32 #include <asm/processor.h>
33 #include <asm/mmu_context.h>
34 #include <asm/syscalls.h>
35
36 /*
37  * This routine will get a word off of the process kernel stack.
38  */
39 static inline int get_stack_long(struct task_struct *task, int offset)
40 {
41         unsigned char *stack;
42
43         stack = (unsigned char *)task_pt_regs(task);
44         stack += offset;
45         return (*((int *)stack));
46 }
47
48 /*
49  * This routine will put a word on the process kernel stack.
50  */
51 static inline int put_stack_long(struct task_struct *task, int offset,
52                                  unsigned long data)
53 {
54         unsigned char *stack;
55
56         stack = (unsigned char *)task_pt_regs(task);
57         stack += offset;
58         *(unsigned long *) stack = data;
59         return 0;
60 }
61
62 void user_enable_single_step(struct task_struct *child)
63 {
64         /* Next scheduling will set up UBC */
65         if (child->thread.ubc_pc == 0)
66                 ubc_usercnt += 1;
67
68         child->thread.ubc_pc = get_stack_long(child,
69                                 offsetof(struct pt_regs, pc));
70
71         set_tsk_thread_flag(child, TIF_SINGLESTEP);
72 }
73
74 void user_disable_single_step(struct task_struct *child)
75 {
76         clear_tsk_thread_flag(child, TIF_SINGLESTEP);
77
78         /*
79          * Ensure the UBC is not programmed at the next context switch.
80          *
81          * Normally this is not needed but there are sequences such as
82          * singlestep, signal delivery, and continue that leave the
83          * ubc_pc non-zero leading to spurious SIGTRAPs.
84          */
85         if (child->thread.ubc_pc != 0) {
86                 ubc_usercnt -= 1;
87                 child->thread.ubc_pc = 0;
88         }
89 }
90
91 /*
92  * Called by kernel/ptrace.c when detaching..
93  *
94  * Make sure single step bits etc are not set.
95  */
96 void ptrace_disable(struct task_struct *child)
97 {
98         user_disable_single_step(child);
99 }
100
101 static int genregs_get(struct task_struct *target,
102                        const struct user_regset *regset,
103                        unsigned int pos, unsigned int count,
104                        void *kbuf, void __user *ubuf)
105 {
106         const struct pt_regs *regs = task_pt_regs(target);
107         int ret;
108
109         ret = user_regset_copyout(&pos, &count, &kbuf, &ubuf,
110                                   regs->regs,
111                                   0, 16 * sizeof(unsigned long));
112         if (!ret)
113                 /* PC, PR, SR, GBR, MACH, MACL, TRA */
114                 ret = user_regset_copyout(&pos, &count, &kbuf, &ubuf,
115                                           &regs->pc,
116                                           offsetof(struct pt_regs, pc),
117                                           sizeof(struct pt_regs));
118         if (!ret)
119                 ret = user_regset_copyout_zero(&pos, &count, &kbuf, &ubuf,
120                                                sizeof(struct pt_regs), -1);
121
122         return ret;
123 }
124
125 static int genregs_set(struct task_struct *target,
126                        const struct user_regset *regset,
127                        unsigned int pos, unsigned int count,
128                        const void *kbuf, const void __user *ubuf)
129 {
130         struct pt_regs *regs = task_pt_regs(target);
131         int ret;
132
133         ret = user_regset_copyin(&pos, &count, &kbuf, &ubuf,
134                                  regs->regs,
135                                  0, 16 * sizeof(unsigned long));
136         if (!ret && count > 0)
137                 ret = user_regset_copyin(&pos, &count, &kbuf, &ubuf,
138                                          &regs->pc,
139                                          offsetof(struct pt_regs, pc),
140                                          sizeof(struct pt_regs));
141         if (!ret)
142                 ret = user_regset_copyin_ignore(&pos, &count, &kbuf, &ubuf,
143                                                 sizeof(struct pt_regs), -1);
144
145         return ret;
146 }
147
148 #ifdef CONFIG_SH_DSP
149 static int dspregs_get(struct task_struct *target,
150                        const struct user_regset *regset,
151                        unsigned int pos, unsigned int count,
152                        void *kbuf, void __user *ubuf)
153 {
154         const struct pt_dspregs *regs = task_pt_dspregs(target);
155         int ret;
156
157         ret = user_regset_copyout(&pos, &count, &kbuf, &ubuf, regs,
158                                   0, sizeof(struct pt_dspregs));
159         if (!ret)
160                 ret = user_regset_copyout_zero(&pos, &count, &kbuf, &ubuf,
161                                                sizeof(struct pt_dspregs), -1);
162
163         return ret;
164 }
165
166 static int dspregs_set(struct task_struct *target,
167                        const struct user_regset *regset,
168                        unsigned int pos, unsigned int count,
169                        const void *kbuf, const void __user *ubuf)
170 {
171         struct pt_dspregs *regs = task_pt_dspregs(target);
172         int ret;
173
174         ret = user_regset_copyin(&pos, &count, &kbuf, &ubuf, regs,
175                                  0, sizeof(struct pt_dspregs));
176         if (!ret)
177                 ret = user_regset_copyin_ignore(&pos, &count, &kbuf, &ubuf,
178                                                 sizeof(struct pt_dspregs), -1);
179
180         return ret;
181 }
182 #endif
183
184 /*
185  * These are our native regset flavours.
186  */
187 enum sh_regset {
188         REGSET_GENERAL,
189 #ifdef CONFIG_SH_DSP
190         REGSET_DSP,
191 #endif
192 };
193
194 static const struct user_regset sh_regsets[] = {
195         /*
196          * Format is:
197          *      R0 --> R15
198          *      PC, PR, SR, GBR, MACH, MACL, TRA
199          */
200         [REGSET_GENERAL] = {
201                 .core_note_type = NT_PRSTATUS,
202                 .n              = ELF_NGREG,
203                 .size           = sizeof(long),
204                 .align          = sizeof(long),
205                 .get            = genregs_get,
206                 .set            = genregs_set,
207         },
208
209 #ifdef CONFIG_SH_DSP
210         [REGSET_DSP] = {
211                 .n              = sizeof(struct pt_dspregs) / sizeof(long),
212                 .size           = sizeof(long),
213                 .align          = sizeof(long),
214                 .get            = dspregs_get,
215                 .set            = dspregs_set,
216         },
217 #endif
218 };
219
220 static const struct user_regset_view user_sh_native_view = {
221         .name           = "sh",
222         .e_machine      = EM_SH,
223         .regsets        = sh_regsets,
224         .n              = ARRAY_SIZE(sh_regsets),
225 };
226
227 const struct user_regset_view *task_user_regset_view(struct task_struct *task)
228 {
229         return &user_sh_native_view;
230 }
231
232 long arch_ptrace(struct task_struct *child, long request, long addr, long data)
233 {
234         struct user * dummy = NULL;
235         unsigned long __user *datap = (unsigned long __user *)data;
236         int ret;
237
238         switch (request) {
239         /* read the word at location addr in the USER area. */
240         case PTRACE_PEEKUSR: {
241                 unsigned long tmp;
242
243                 ret = -EIO;
244                 if ((addr & 3) || addr < 0 ||
245                     addr > sizeof(struct user) - 3)
246                         break;
247
248                 if (addr < sizeof(struct pt_regs))
249                         tmp = get_stack_long(child, addr);
250                 else if (addr >= (long) &dummy->fpu &&
251                          addr < (long) &dummy->u_fpvalid) {
252                         if (!tsk_used_math(child)) {
253                                 if (addr == (long)&dummy->fpu.fpscr)
254                                         tmp = FPSCR_INIT;
255                                 else
256                                         tmp = 0;
257                         } else
258                                 tmp = ((long *)&child->thread.fpu)
259                                         [(addr - (long)&dummy->fpu) >> 2];
260                 } else if (addr == (long) &dummy->u_fpvalid)
261                         tmp = !!tsk_used_math(child);
262                 else
263                         tmp = 0;
264                 ret = put_user(tmp, datap);
265                 break;
266         }
267
268         case PTRACE_POKEUSR: /* write the word at location addr in the USER area */
269                 ret = -EIO;
270                 if ((addr & 3) || addr < 0 ||
271                     addr > sizeof(struct user) - 3)
272                         break;
273
274                 if (addr < sizeof(struct pt_regs))
275                         ret = put_stack_long(child, addr, data);
276                 else if (addr >= (long) &dummy->fpu &&
277                          addr < (long) &dummy->u_fpvalid) {
278                         set_stopped_child_used_math(child);
279                         ((long *)&child->thread.fpu)
280                                 [(addr - (long)&dummy->fpu) >> 2] = data;
281                         ret = 0;
282                 } else if (addr == (long) &dummy->u_fpvalid) {
283                         conditional_stopped_child_used_math(data, child);
284                         ret = 0;
285                 }
286                 break;
287
288         case PTRACE_GETREGS:
289                 return copy_regset_to_user(child, &user_sh_native_view,
290                                            REGSET_GENERAL,
291                                            0, sizeof(struct pt_regs),
292                                            (void __user *)data);
293         case PTRACE_SETREGS:
294                 return copy_regset_from_user(child, &user_sh_native_view,
295                                              REGSET_GENERAL,
296                                              0, sizeof(struct pt_regs),
297                                              (const void __user *)data);
298 #ifdef CONFIG_SH_DSP
299         case PTRACE_GETDSPREGS:
300                 return copy_regset_to_user(child, &user_sh_native_view,
301                                            REGSET_DSP,
302                                            0, sizeof(struct pt_dspregs),
303                                            (void __user *)data);
304         case PTRACE_SETDSPREGS:
305                 return copy_regset_from_user(child, &user_sh_native_view,
306                                              REGSET_DSP,
307                                              0, sizeof(struct pt_dspregs),
308                                              (const void __user *)data);
309 #endif
310 #ifdef CONFIG_BINFMT_ELF_FDPIC
311         case PTRACE_GETFDPIC: {
312                 unsigned long tmp = 0;
313
314                 switch (addr) {
315                 case PTRACE_GETFDPIC_EXEC:
316                         tmp = child->mm->context.exec_fdpic_loadmap;
317                         break;
318                 case PTRACE_GETFDPIC_INTERP:
319                         tmp = child->mm->context.interp_fdpic_loadmap;
320                         break;
321                 default:
322                         break;
323                 }
324
325                 ret = 0;
326                 if (put_user(tmp, datap)) {
327                         ret = -EFAULT;
328                         break;
329                 }
330                 break;
331         }
332 #endif
333         default:
334                 ret = ptrace_request(child, request, addr, data);
335                 break;
336         }
337
338         return ret;
339 }
340
341 static inline int audit_arch(void)
342 {
343         int arch = EM_SH;
344
345 #ifdef CONFIG_CPU_LITTLE_ENDIAN
346         arch |= __AUDIT_ARCH_LE;
347 #endif
348
349         return arch;
350 }
351
352 asmlinkage long do_syscall_trace_enter(struct pt_regs *regs)
353 {
354         long ret = 0;
355
356         secure_computing(regs->regs[0]);
357
358         if (test_thread_flag(TIF_SYSCALL_TRACE) &&
359             tracehook_report_syscall_entry(regs))
360                 /*
361                  * Tracing decided this syscall should not happen.
362                  * We'll return a bogus call number to get an ENOSYS
363                  * error, but leave the original number in regs->regs[0].
364                  */
365                 ret = -1L;
366
367         if (unlikely(current->audit_context))
368                 audit_syscall_entry(audit_arch(), regs->regs[3],
369                                     regs->regs[4], regs->regs[5],
370                                     regs->regs[6], regs->regs[7]);
371
372         return ret ?: regs->regs[0];
373 }
374
375 asmlinkage void do_syscall_trace_leave(struct pt_regs *regs)
376 {
377         int step;
378
379         if (unlikely(current->audit_context))
380                 audit_syscall_exit(AUDITSC_RESULT(regs->regs[0]),
381                                    regs->regs[0]);
382
383         step = test_thread_flag(TIF_SINGLESTEP);
384         if (step || test_thread_flag(TIF_SYSCALL_TRACE))
385                 tracehook_report_syscall_exit(regs, step);
386 }