xref: /linux/arch/parisc/kernel/ptrace.c (revision 776cfebb430c7b22c208b1b17add97f354d97cab)
1 /*
2  * Kernel support for the ptrace() and syscall tracing interfaces.
3  *
4  * Copyright (C) 2000 Hewlett-Packard Co, Linuxcare Inc.
5  * Copyright (C) 2000 Matthew Wilcox <matthew@wil.cx>
6  * Copyright (C) 2000 David Huggins-Daines <dhd@debian.org>
7  */
8 
9 #include <linux/kernel.h>
10 #include <linux/sched.h>
11 #include <linux/mm.h>
12 #include <linux/smp.h>
13 #include <linux/smp_lock.h>
14 #include <linux/errno.h>
15 #include <linux/ptrace.h>
16 #include <linux/user.h>
17 #include <linux/personality.h>
18 #include <linux/security.h>
19 #include <linux/compat.h>
20 #include <linux/signal.h>
21 
22 #include <asm/uaccess.h>
23 #include <asm/pgtable.h>
24 #include <asm/system.h>
25 #include <asm/processor.h>
26 #include <asm/offsets.h>
27 
28 /* PSW bits we allow the debugger to modify */
29 #define USER_PSW_BITS	(PSW_N | PSW_V | PSW_CB)
30 
31 #undef DEBUG_PTRACE
32 
33 #ifdef DEBUG_PTRACE
34 #define DBG(x...)	printk(x)
35 #else
36 #define DBG(x...)
37 #endif
38 
39 #ifdef __LP64__
40 
41 /* This function is needed to translate 32 bit pt_regs offsets in to
42  * 64 bit pt_regs offsets.  For example, a 32 bit gdb under a 64 bit kernel
43  * will request offset 12 if it wants gr3, but the lower 32 bits of
44  * the 64 bit kernels view of gr3 will be at offset 28 (3*8 + 4).
45  * This code relies on a 32 bit pt_regs being comprised of 32 bit values
46  * except for the fp registers which (a) are 64 bits, and (b) follow
47  * the gr registers at the start of pt_regs.  The 32 bit pt_regs should
48  * be half the size of the 64 bit pt_regs, plus 32*4 to allow for fr[]
49  * being 64 bit in both cases.
50  */
51 
52 static long translate_usr_offset(long offset)
53 {
54 	if (offset < 0)
55 		return -1;
56 	else if (offset <= 32*4)	/* gr[0..31] */
57 		return offset * 2 + 4;
58 	else if (offset <= 32*4+32*8)	/* gr[0..31] + fr[0..31] */
59 		return offset + 32*4;
60 	else if (offset < sizeof(struct pt_regs)/2 + 32*4)
61 		return offset * 2 + 4 - 32*8;
62 	else
63 		return -1;
64 }
65 #endif
66 
67 /*
68  * Called by kernel/ptrace.c when detaching..
69  *
70  * Make sure single step bits etc are not set.
71  */
72 void ptrace_disable(struct task_struct *child)
73 {
74 	/* make sure the trap bits are not set */
75 	pa_psw(child)->r = 0;
76 	pa_psw(child)->t = 0;
77 	pa_psw(child)->h = 0;
78 	pa_psw(child)->l = 0;
79 }
80 
81 long sys_ptrace(long request, pid_t pid, long addr, long data)
82 {
83 	struct task_struct *child;
84 	long ret;
85 #ifdef DEBUG_PTRACE
86 	long oaddr=addr, odata=data;
87 #endif
88 
89 	lock_kernel();
90 	ret = -EPERM;
91 	if (request == PTRACE_TRACEME) {
92 		/* are we already being traced? */
93 		if (current->ptrace & PT_PTRACED)
94 			goto out;
95 
96 		ret = security_ptrace(current->parent, current);
97 		if (ret)
98 			goto out;
99 
100 		/* set the ptrace bit in the process flags. */
101 		current->ptrace |= PT_PTRACED;
102 		ret = 0;
103 		goto out;
104 	}
105 
106 	ret = -ESRCH;
107 	read_lock(&tasklist_lock);
108 	child = find_task_by_pid(pid);
109 	if (child)
110 		get_task_struct(child);
111 	read_unlock(&tasklist_lock);
112 	if (!child)
113 		goto out;
114 	ret = -EPERM;
115 	if (pid == 1)		/* no messing around with init! */
116 		goto out_tsk;
117 
118 	if (request == PTRACE_ATTACH) {
119 		ret = ptrace_attach(child);
120 		goto out_tsk;
121 	}
122 
123 	ret = ptrace_check_attach(child, request == PTRACE_KILL);
124 	if (ret < 0)
125 		goto out_tsk;
126 
127 	switch (request) {
128 	case PTRACE_PEEKTEXT: /* read word at location addr. */
129 	case PTRACE_PEEKDATA: {
130 		int copied;
131 
132 #ifdef __LP64__
133 		if (is_compat_task(child)) {
134 			unsigned int tmp;
135 
136 			addr &= 0xffffffffL;
137 			copied = access_process_vm(child, addr, &tmp, sizeof(tmp), 0);
138 			ret = -EIO;
139 			if (copied != sizeof(tmp))
140 				goto out_tsk;
141 			ret = put_user(tmp,(unsigned int *) data);
142 			DBG("sys_ptrace(PEEK%s, %d, %lx, %lx) returning %ld, data %x\n",
143 				request == PTRACE_PEEKTEXT ? "TEXT" : "DATA",
144 				pid, oaddr, odata, ret, tmp);
145 		}
146 		else
147 #endif
148 		{
149 			unsigned long tmp;
150 
151 			copied = access_process_vm(child, addr, &tmp, sizeof(tmp), 0);
152 			ret = -EIO;
153 			if (copied != sizeof(tmp))
154 				goto out_tsk;
155 			ret = put_user(tmp,(unsigned long *) data);
156 		}
157 		goto out_tsk;
158 	}
159 
160 	/* when I and D space are separate, this will have to be fixed. */
161 	case PTRACE_POKETEXT: /* write the word at location addr. */
162 	case PTRACE_POKEDATA:
163 		ret = 0;
164 #ifdef __LP64__
165 		if (is_compat_task(child)) {
166 			unsigned int tmp = (unsigned int)data;
167 			DBG("sys_ptrace(POKE%s, %d, %lx, %lx)\n",
168 				request == PTRACE_POKETEXT ? "TEXT" : "DATA",
169 				pid, oaddr, odata);
170 			addr &= 0xffffffffL;
171 			if (access_process_vm(child, addr, &tmp, sizeof(tmp), 1) == sizeof(tmp))
172 				goto out_tsk;
173 		}
174 		else
175 #endif
176 		{
177 			if (access_process_vm(child, addr, &data, sizeof(data), 1) == sizeof(data))
178 				goto out_tsk;
179 		}
180 		ret = -EIO;
181 		goto out_tsk;
182 
183 	/* Read the word at location addr in the USER area.  For ptraced
184 	   processes, the kernel saves all regs on a syscall. */
185 	case PTRACE_PEEKUSR: {
186 		ret = -EIO;
187 #ifdef __LP64__
188 		if (is_compat_task(child)) {
189 			unsigned int tmp;
190 
191 			if (addr & (sizeof(int)-1))
192 				goto out_tsk;
193 			if ((addr = translate_usr_offset(addr)) < 0)
194 				goto out_tsk;
195 
196 			tmp = *(unsigned int *) ((char *) task_regs(child) + addr);
197 			ret = put_user(tmp, (unsigned int *) data);
198 			DBG("sys_ptrace(PEEKUSR, %d, %lx, %lx) returning %ld, addr %lx, data %x\n",
199 				pid, oaddr, odata, ret, addr, tmp);
200 		}
201 		else
202 #endif
203 		{
204 			unsigned long tmp;
205 
206 			if ((addr & (sizeof(long)-1)) || (unsigned long) addr >= sizeof(struct pt_regs))
207 				goto out_tsk;
208 			tmp = *(unsigned long *) ((char *) task_regs(child) + addr);
209 			ret = put_user(tmp, (unsigned long *) data);
210 		}
211 		goto out_tsk;
212 	}
213 
214 	/* Write the word at location addr in the USER area.  This will need
215 	   to change when the kernel no longer saves all regs on a syscall.
216 	   FIXME.  There is a problem at the moment in that r3-r18 are only
217 	   saved if the process is ptraced on syscall entry, and even then
218 	   those values are overwritten by actual register values on syscall
219 	   exit. */
220 	case PTRACE_POKEUSR:
221 		ret = -EIO;
222 		/* Some register values written here may be ignored in
223 		 * entry.S:syscall_restore_rfi; e.g. iaoq is written with
224 		 * r31/r31+4, and not with the values in pt_regs.
225 		 */
226 		 /* PT_PSW=0, so this is valid for 32 bit processes under 64
227 		 * bit kernels.
228 		 */
229 		if (addr == PT_PSW) {
230 			/* PT_PSW=0, so this is valid for 32 bit processes
231 			 * under 64 bit kernels.
232 			 *
233 			 * Allow writing to Nullify, Divide-step-correction,
234 			 * and carry/borrow bits.
235 			 * BEWARE, if you set N, and then single step, it won't
236 			 * stop on the nullified instruction.
237 			 */
238 			DBG("sys_ptrace(POKEUSR, %d, %lx, %lx)\n",
239 				pid, oaddr, odata);
240 			data &= USER_PSW_BITS;
241 			task_regs(child)->gr[0] &= ~USER_PSW_BITS;
242 			task_regs(child)->gr[0] |= data;
243 			ret = 0;
244 			goto out_tsk;
245 		}
246 #ifdef __LP64__
247 		if (is_compat_task(child)) {
248 			if (addr & (sizeof(int)-1))
249 				goto out_tsk;
250 			if ((addr = translate_usr_offset(addr)) < 0)
251 				goto out_tsk;
252 			DBG("sys_ptrace(POKEUSR, %d, %lx, %lx) addr %lx\n",
253 				pid, oaddr, odata, addr);
254 			if (addr >= PT_FR0 && addr <= PT_FR31 + 4) {
255 				/* Special case, fp regs are 64 bits anyway */
256 				*(unsigned int *) ((char *) task_regs(child) + addr) = data;
257 				ret = 0;
258 			}
259 			else if ((addr >= PT_GR1+4 && addr <= PT_GR31+4) ||
260 					addr == PT_IAOQ0+4 || addr == PT_IAOQ1+4 ||
261 					addr == PT_SAR+4) {
262 				/* Zero the top 32 bits */
263 				*(unsigned int *) ((char *) task_regs(child) + addr - 4) = 0;
264 				*(unsigned int *) ((char *) task_regs(child) + addr) = data;
265 				ret = 0;
266 			}
267 			goto out_tsk;
268 		}
269 		else
270 #endif
271 		{
272 			if ((addr & (sizeof(long)-1)) || (unsigned long) addr >= sizeof(struct pt_regs))
273 				goto out_tsk;
274 			if ((addr >= PT_GR1 && addr <= PT_GR31) ||
275 					addr == PT_IAOQ0 || addr == PT_IAOQ1 ||
276 					(addr >= PT_FR0 && addr <= PT_FR31 + 4) ||
277 					addr == PT_SAR) {
278 				*(unsigned long *) ((char *) task_regs(child) + addr) = data;
279 				ret = 0;
280 			}
281 			goto out_tsk;
282 		}
283 
284 	case PTRACE_SYSCALL: /* continue and stop at next (return from) syscall */
285 	case PTRACE_CONT:
286 		ret = -EIO;
287 		DBG("sys_ptrace(%s)\n",
288 			request == PTRACE_SYSCALL ? "SYSCALL" : "CONT");
289 		if (!valid_signal(data))
290 			goto out_tsk;
291 		child->ptrace &= ~(PT_SINGLESTEP|PT_BLOCKSTEP);
292 		if (request == PTRACE_SYSCALL) {
293 			set_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
294 		} else {
295 			clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
296 		}
297 		child->exit_code = data;
298 		goto out_wake_notrap;
299 
300 	case PTRACE_KILL:
301 		/*
302 		 * make the child exit.  Best I can do is send it a
303 		 * sigkill.  perhaps it should be put in the status
304 		 * that it wants to exit.
305 		 */
306 		DBG("sys_ptrace(KILL)\n");
307 		if (child->exit_state == EXIT_ZOMBIE)	/* already dead */
308 			goto out_tsk;
309 		child->exit_code = SIGKILL;
310 		goto out_wake_notrap;
311 
312 	case PTRACE_SINGLEBLOCK:
313 		DBG("sys_ptrace(SINGLEBLOCK)\n");
314 		ret = -EIO;
315 		if (!valid_signal(data))
316 			goto out_tsk;
317 		clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
318 		child->ptrace &= ~PT_SINGLESTEP;
319 		child->ptrace |= PT_BLOCKSTEP;
320 		child->exit_code = data;
321 
322 		/* Enable taken branch trap. */
323 		pa_psw(child)->r = 0;
324 		pa_psw(child)->t = 1;
325 		pa_psw(child)->h = 0;
326 		pa_psw(child)->l = 0;
327 		goto out_wake;
328 
329 	case PTRACE_SINGLESTEP:
330 		DBG("sys_ptrace(SINGLESTEP)\n");
331 		ret = -EIO;
332 		if (!valid_signal(data))
333 			goto out_tsk;
334 
335 		clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
336 		child->ptrace &= ~PT_BLOCKSTEP;
337 		child->ptrace |= PT_SINGLESTEP;
338 		child->exit_code = data;
339 
340 		if (pa_psw(child)->n) {
341 			struct siginfo si;
342 
343 			/* Nullified, just crank over the queue. */
344 			task_regs(child)->iaoq[0] = task_regs(child)->iaoq[1];
345 			task_regs(child)->iasq[0] = task_regs(child)->iasq[1];
346 			task_regs(child)->iaoq[1] = task_regs(child)->iaoq[0] + 4;
347 			pa_psw(child)->n = 0;
348 			pa_psw(child)->x = 0;
349 			pa_psw(child)->y = 0;
350 			pa_psw(child)->z = 0;
351 			pa_psw(child)->b = 0;
352 			ptrace_disable(child);
353 			/* Don't wake up the child, but let the
354 			   parent know something happened. */
355 			si.si_code = TRAP_TRACE;
356 			si.si_addr = (void __user *) (task_regs(child)->iaoq[0] & ~3);
357 			si.si_signo = SIGTRAP;
358 			si.si_errno = 0;
359 			force_sig_info(SIGTRAP, &si, child);
360 			//notify_parent(child, SIGCHLD);
361 			//ret = 0;
362 			goto out_wake;
363 		}
364 
365 		/* Enable recovery counter traps.  The recovery counter
366 		 * itself will be set to zero on a task switch.  If the
367 		 * task is suspended on a syscall then the syscall return
368 		 * path will overwrite the recovery counter with a suitable
369 		 * value such that it traps once back in user space.  We
370 		 * disable interrupts in the childs PSW here also, to avoid
371 		 * interrupts while the recovery counter is decrementing.
372 		 */
373 		pa_psw(child)->r = 1;
374 		pa_psw(child)->t = 0;
375 		pa_psw(child)->h = 0;
376 		pa_psw(child)->l = 0;
377 		/* give it a chance to run. */
378 		goto out_wake;
379 
380 	case PTRACE_DETACH:
381 		ret = ptrace_detach(child, data);
382 		goto out_tsk;
383 
384 	case PTRACE_GETEVENTMSG:
385                 ret = put_user(child->ptrace_message, (unsigned int __user *) data);
386 		goto out_tsk;
387 
388 	default:
389 		ret = ptrace_request(child, request, addr, data);
390 		goto out_tsk;
391 	}
392 
393 out_wake_notrap:
394 	ptrace_disable(child);
395 out_wake:
396 	wake_up_process(child);
397 	ret = 0;
398 out_tsk:
399 	put_task_struct(child);
400 out:
401 	unlock_kernel();
402 	DBG("sys_ptrace(%ld, %d, %lx, %lx) returning %ld\n",
403 		request, pid, oaddr, odata, ret);
404 	return ret;
405 }
406 
407 void syscall_trace(void)
408 {
409 	if (!test_thread_flag(TIF_SYSCALL_TRACE))
410 		return;
411 	if (!(current->ptrace & PT_PTRACED))
412 		return;
413 	ptrace_notify(SIGTRAP | ((current->ptrace & PT_TRACESYSGOOD)
414 				 ? 0x80 : 0));
415 	/*
416 	 * this isn't the same as continuing with a signal, but it will do
417 	 * for normal use.  strace only continues with a signal if the
418 	 * stopping signal is not SIGTRAP.  -brl
419 	 */
420 	if (current->exit_code) {
421 		send_sig(current->exit_code, current, 1);
422 		current->exit_code = 0;
423 	}
424 }
425