Merge master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6
[linux-drm-fsl-dcu.git] / arch / xtensa / kernel / ptrace.c
1 // TODO some minor issues
2 /*
3  * This file is subject to the terms and conditions of the GNU General Public
4  * License.  See the file "COPYING" in the main directory of this archive
5  * for more details.
6  *
7  * Copyright (C) 2001 - 2005  Tensilica Inc.
8  *
9  * Joe Taylor   <joe@tensilica.com, joetylr@yahoo.com>
10  * Chris Zankel <chris@zankel.net>
11  * Scott Foehner<sfoehner@yahoo.com>,
12  * Kevin Chea
13  * Marc Gauthier<marc@tensilica.com> <marc@alumni.uwaterloo.ca>
14  */
15
16 #include <linux/kernel.h>
17 #include <linux/sched.h>
18 #include <linux/mm.h>
19 #include <linux/errno.h>
20 #include <linux/ptrace.h>
21 #include <linux/smp.h>
22 #include <linux/security.h>
23 #include <linux/signal.h>
24
25 #include <asm/pgtable.h>
26 #include <asm/page.h>
27 #include <asm/system.h>
28 #include <asm/uaccess.h>
29 #include <asm/ptrace.h>
30 #include <asm/elf.h>
31
32 #define TEST_KERNEL     // verify kernel operations FIXME: remove
33
34
35 /*
36  * Called by kernel/ptrace.c when detaching..
37  *
38  * Make sure single step bits etc are not set.
39  */
40
41 void ptrace_disable(struct task_struct *child)
42 {
43         /* Nothing to do.. */
44 }
45
46 long arch_ptrace(struct task_struct *child, long request, long addr, long data)
47 {
48         int ret = -EPERM;
49
50         switch (request) {
51         case PTRACE_PEEKTEXT: /* read word at location addr. */
52         case PTRACE_PEEKDATA:
53         {
54                 unsigned long tmp;
55                 int copied;
56
57                 copied = access_process_vm(child, addr, &tmp, sizeof(tmp), 0);
58                 ret = -EIO;
59                 if (copied != sizeof(tmp))
60                         break;
61                 ret = put_user(tmp,(unsigned long *) data);
62
63                 goto out;
64         }
65
66         /* Read the word at location addr in the USER area.  */
67
68         case PTRACE_PEEKUSR:
69                 {
70                 struct pt_regs *regs;
71                 unsigned long tmp;
72
73                 regs = task_pt_regs(child);
74                 tmp = 0;  /* Default return value. */
75
76                 switch(addr) {
77
78                 case REG_AR_BASE ... REG_AR_BASE + XCHAL_NUM_AREGS - 1:
79                         {
80                         int ar = addr - REG_AR_BASE - regs->windowbase * 4;
81                         ar &= (XCHAL_NUM_AREGS - 1);
82                         if (ar < 16 && ar + (regs->wmask >> 4) * 4 >= 0)
83                                 tmp = regs->areg[ar];
84                         else
85                                 ret = -EIO;
86                         break;
87                         }
88                 case REG_A_BASE ... REG_A_BASE + 15:
89                         tmp = regs->areg[addr - REG_A_BASE];
90                         break;
91                 case REG_PC:
92                         tmp = regs->pc;
93                         break;
94                 case REG_PS:
95                         /* Note:  PS.EXCM is not set while user task is running;
96                          * its being set in regs is for exception handling
97                          * convenience.  */
98                         tmp = (regs->ps & ~(1 << PS_EXCM_BIT));
99                         break;
100                 case REG_WB:
101                         tmp = regs->windowbase;
102                         break;
103                 case REG_WS:
104                         tmp = regs->windowstart;
105                         break;
106                 case REG_LBEG:
107                         tmp = regs->lbeg;
108                         break;
109                 case REG_LEND:
110                         tmp = regs->lend;
111                         break;
112                 case REG_LCOUNT:
113                         tmp = regs->lcount;
114                         break;
115                 case REG_SAR:
116                         tmp = regs->sar;
117                         break;
118                 case REG_DEPC:
119                         tmp = regs->depc;
120                         break;
121                 case REG_EXCCAUSE:
122                         tmp = regs->exccause;
123                         break;
124                 case REG_EXCVADDR:
125                         tmp = regs->excvaddr;
126                         break;
127                 case SYSCALL_NR:
128                         tmp = regs->syscall;
129                         break;
130                 default:
131                         tmp = 0;
132                         ret = -EIO;
133                         goto out;
134                 }
135                 ret = put_user(tmp, (unsigned long *) data);
136                 goto out;
137                 }
138
139         case PTRACE_POKETEXT: /* write the word at location addr. */
140         case PTRACE_POKEDATA:
141                 if (access_process_vm(child, addr, &data, sizeof(data), 1)
142                     == sizeof(data))
143                         break;
144                 ret = -EIO;
145                 goto out;
146
147         case PTRACE_POKEUSR:
148                 {
149                 struct pt_regs *regs;
150                 regs = task_pt_regs(child);
151
152                 switch (addr) {
153                 case REG_AR_BASE ... REG_AR_BASE + XCHAL_NUM_AREGS - 1:
154                         {
155                         int ar = addr - REG_AR_BASE - regs->windowbase * 4;
156                         if (ar < 16 && ar + (regs->wmask >> 4) * 4 >= 0)
157                                 regs->areg[ar & (XCHAL_NUM_AREGS - 1)] = data;
158                         else
159                                 ret = -EIO;
160                         break;
161                         }
162                 case REG_A_BASE ... REG_A_BASE + 15:
163                         regs->areg[addr - REG_A_BASE] = data;
164                         break;
165                 case REG_PC:
166                         regs->pc = data;
167                         break;
168                 case SYSCALL_NR:
169                         regs->syscall = data;
170                         break;
171 #ifdef TEST_KERNEL
172                 case REG_WB:
173                         regs->windowbase = data;
174                         break;
175                 case REG_WS:
176                         regs->windowstart = data;
177                         break;
178 #endif
179
180                 default:
181                         /* The rest are not allowed. */
182                         ret = -EIO;
183                         break;
184                 }
185                 break;
186                 }
187
188         /* continue and stop at next (return from) syscall */
189         case PTRACE_SYSCALL:
190         case PTRACE_CONT: /* restart after signal. */
191         {
192                 ret = -EIO;
193                 if (!valid_signal(data))
194                         break;
195                 if (request == PTRACE_SYSCALL)
196                         set_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
197                 else
198                         clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
199                 child->exit_code = data;
200                 /* Make sure the single step bit is not set. */
201                 child->ptrace &= ~PT_SINGLESTEP;
202                 wake_up_process(child);
203                 ret = 0;
204                 break;
205         }
206
207         /*
208          * make the child exit.  Best I can do is send it a sigkill.
209          * perhaps it should be put in the status that it wants to
210          * exit.
211          */
212         case PTRACE_KILL:
213                 ret = 0;
214                 if (child->exit_state == EXIT_ZOMBIE)   /* already dead */
215                         break;
216                 child->exit_code = SIGKILL;
217                 child->ptrace &= ~PT_SINGLESTEP;
218                 wake_up_process(child);
219                 break;
220
221         case PTRACE_SINGLESTEP:
222                 ret = -EIO;
223                 if (!valid_signal(data))
224                         break;
225                 clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
226                 child->ptrace |= PT_SINGLESTEP;
227                 child->exit_code = data;
228                 wake_up_process(child);
229                 ret = 0;
230                 break;
231
232         case PTRACE_GETREGS:
233         {
234                 /* 'data' points to user memory in which to write.
235                  * Mainly due to the non-live register values, we
236                  * reformat the register values into something more
237                  * standard.  For convenience, we use the handy
238                  * elf_gregset_t format. */
239
240                 xtensa_gregset_t format;
241                 struct pt_regs *regs = task_pt_regs(child);
242
243                 do_copy_regs (&format, regs, child);
244
245                 /* Now, copy to user space nice and easy... */
246                 ret = 0;
247                 if (copy_to_user((void *)data, &format, sizeof(elf_gregset_t)))
248                         ret = -EFAULT;
249                 break;
250         }
251
252         case PTRACE_SETREGS:
253         {
254                 /* 'data' points to user memory that contains the new
255                  * values in the elf_gregset_t format. */
256
257                 xtensa_gregset_t format;
258                 struct pt_regs *regs = task_pt_regs(child);
259
260                 if (copy_from_user(&format,(void *)data,sizeof(elf_gregset_t))){
261                         ret = -EFAULT;
262                         break;
263                 }
264
265                 /* FIXME: Perhaps we want some sanity checks on
266                  * these user-space values?  See ARM version.  Are
267                  * debuggers a security concern? */
268
269                 do_restore_regs (&format, regs, child);
270
271                 ret = 0;
272                 break;
273         }
274
275         case PTRACE_GETFPREGS:
276         {
277                 /* 'data' points to user memory in which to write.
278                  * For convenience, we use the handy
279                  * elf_fpregset_t format. */
280
281                 elf_fpregset_t fpregs;
282                 struct pt_regs *regs = task_pt_regs(child);
283
284                 do_save_fpregs (&fpregs, regs, child);
285
286                 /* Now, copy to user space nice and easy... */
287                 ret = 0;
288                 if (copy_to_user((void *)data, &fpregs, sizeof(elf_fpregset_t)))
289                         ret = -EFAULT;
290
291                 break;
292         }
293
294         case PTRACE_SETFPREGS:
295         {
296                 /* 'data' points to user memory that contains the new
297                  * values in the elf_fpregset_t format.
298                  */
299                 elf_fpregset_t fpregs;
300                 struct pt_regs *regs = task_pt_regs(child);
301
302                 ret = 0;
303                 if (copy_from_user(&fpregs, (void *)data, sizeof(elf_fpregset_t))) {
304                         ret = -EFAULT;
305                         break;
306                 }
307
308                 if (do_restore_fpregs (&fpregs, regs, child))
309                         ret = -EIO;
310                 break;
311         }
312
313         case PTRACE_GETFPREGSIZE:
314                 /* 'data' points to 'unsigned long' set to the size
315                  * of elf_fpregset_t
316                  */
317                 ret = put_user(sizeof(elf_fpregset_t), (unsigned long *) data);
318                 break;
319
320         case PTRACE_DETACH: /* detach a process that was attached. */
321                 ret = ptrace_detach(child, data);
322                 break;
323
324         default:
325                 ret = ptrace_request(child, request, addr, data);
326                 goto out;
327         }
328  out:
329         return ret;
330 }
331
332 void do_syscall_trace(void)
333 {
334         /*
335          * The 0x80 provides a way for the tracing parent to distinguish
336          * between a syscall stop and SIGTRAP delivery
337          */
338         ptrace_notify(SIGTRAP|((current->ptrace & PT_TRACESYSGOOD) ? 0x80 : 0));
339
340         /*
341          * this isn't the same as continuing with a signal, but it will do
342          * for normal use.  strace only continues with a signal if the
343          * stopping signal is not SIGTRAP.  -brl
344          */
345         if (current->exit_code) {
346                 send_sig(current->exit_code, current, 1);
347                 current->exit_code = 0;
348         }
349 }
350
351 void do_syscall_trace_enter(struct pt_regs *regs)
352 {
353         if (test_thread_flag(TIF_SYSCALL_TRACE)
354                         && (current->ptrace & PT_PTRACED))
355                 do_syscall_trace();
356
357 #if 0
358         if (unlikely(current->audit_context))
359                 audit_syscall_entry(current, AUDIT_ARCH_XTENSA..);
360 #endif
361 }
362
363 void do_syscall_trace_leave(struct pt_regs *regs)
364 {
365         if ((test_thread_flag(TIF_SYSCALL_TRACE))
366                         && (current->ptrace & PT_PTRACED))
367                 do_syscall_trace();
368 }
369