Blame view

kernel/ptrace.c 22.7 KB
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1
2
3
4
5
6
7
8
  /*
   * linux/kernel/ptrace.c
   *
   * (C) Copyright 1999 Linus Torvalds
   *
   * Common interfaces for "ptrace()" which we do not want
   * to continually duplicate across every architecture.
   */
c59ede7b7   Randy.Dunlap   [PATCH] move capa...
9
  #include <linux/capability.h>
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
10
11
12
13
14
15
  #include <linux/module.h>
  #include <linux/sched.h>
  #include <linux/errno.h>
  #include <linux/mm.h>
  #include <linux/highmem.h>
  #include <linux/pagemap.h>
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
16
17
  #include <linux/ptrace.h>
  #include <linux/security.h>
7ed20e1ad   Jesper Juhl   [PATCH] convert t...
18
  #include <linux/signal.h>
a5cb013da   Al Viro   [PATCH] auditing ...
19
  #include <linux/audit.h>
b488893a3   Pavel Emelyanov   pid namespaces: c...
20
  #include <linux/pid_namespace.h>
f17d30a80   Adrian Bunk   kernel/ptrace.c s...
21
  #include <linux/syscalls.h>
3a7097035   Roland McGrath   ptrace: some chec...
22
  #include <linux/uaccess.h>
2225a122a   Suresh Siddha   ptrace: Add suppo...
23
  #include <linux/regset.h>
bf26c0184   Frederic Weisbecker   ptrace: Prepare t...
24
  #include <linux/hw_breakpoint.h>
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
25

bf53de907   Markus Metzger   x86, bts: add for...
26
27
  
  /*
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
28
29
30
31
32
   * ptrace a task: make the debugger its new parent and
   * move it to the ptrace list.
   *
   * Must be called with the tasklist lock write-held.
   */
36c8b5868   Ingo Molnar   [PATCH] sched: cl...
33
  void __ptrace_link(struct task_struct *child, struct task_struct *new_parent)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
34
  {
f470021ad   Roland McGrath   ptrace children r...
35
36
  	BUG_ON(!list_empty(&child->ptrace_entry));
  	list_add(&child->ptrace_entry, &new_parent->ptraced);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
37
  	child->parent = new_parent;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
38
  }
3a7097035   Roland McGrath   ptrace: some chec...
39

e3bd058f6   Tejun Heo   ptrace: Collapse ...
40
41
42
  /**
   * __ptrace_unlink - unlink ptracee and restore its execution state
   * @child: ptracee to be unlinked
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
43
   *
0e9f0a4ab   Tejun Heo   ptrace: Always pu...
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
   * Remove @child from the ptrace list, move it back to the original parent,
   * and restore the execution state so that it conforms to the group stop
   * state.
   *
   * Unlinking can happen via two paths - explicit PTRACE_DETACH or ptracer
   * exiting.  For PTRACE_DETACH, unless the ptracee has been killed between
   * ptrace_check_attach() and here, it's guaranteed to be in TASK_TRACED.
   * If the ptracer is exiting, the ptracee can be in any state.
   *
   * After detach, the ptracee should be in a state which conforms to the
   * group stop.  If the group is stopped or in the process of stopping, the
   * ptracee should be put into TASK_STOPPED; otherwise, it should be woken
   * up from TASK_TRACED.
   *
   * If the ptracee is in TASK_TRACED and needs to be moved to TASK_STOPPED,
   * it goes through TRACED -> RUNNING -> STOPPED transition which is similar
   * to but in the opposite direction of what happens while attaching to a
   * stopped task.  However, in this direction, the intermediate RUNNING
   * state is not hidden even from the current ptracer and if it immediately
   * re-attaches and performs a WNOHANG wait(2), it may fail.
e3bd058f6   Tejun Heo   ptrace: Collapse ...
64
65
66
   *
   * CONTEXT:
   * write_lock_irq(tasklist_lock)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
67
   */
36c8b5868   Ingo Molnar   [PATCH] sched: cl...
68
  void __ptrace_unlink(struct task_struct *child)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
69
  {
5ecfbae09   Oleg Nesterov   [PATCH] fix zap_t...
70
  	BUG_ON(!child->ptrace);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
71
  	child->ptrace = 0;
f470021ad   Roland McGrath   ptrace children r...
72
73
  	child->parent = child->real_parent;
  	list_del_init(&child->ptrace_entry);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
74

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
75
  	spin_lock(&child->sighand->siglock);
0e9f0a4ab   Tejun Heo   ptrace: Always pu...
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
  
  	/*
  	 * Reinstate GROUP_STOP_PENDING if group stop is in effect and
  	 * @child isn't dead.
  	 */
  	if (!(child->flags & PF_EXITING) &&
  	    (child->signal->flags & SIGNAL_STOP_STOPPED ||
  	     child->signal->group_stop_count))
  		child->group_stop |= GROUP_STOP_PENDING;
  
  	/*
  	 * If transition to TASK_STOPPED is pending or in TASK_TRACED, kick
  	 * @child in the butt.  Note that @resume should be used iff @child
  	 * is in TASK_TRACED; otherwise, we might unduly disrupt
  	 * TASK_KILLABLE sleeps.
  	 */
  	if (child->group_stop & GROUP_STOP_PENDING || task_is_traced(child))
  		signal_wake_up(child, task_is_traced(child));
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
94
  	spin_unlock(&child->sighand->siglock);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
  }
  
  /*
   * Check that we have indeed attached to the thing..
   */
  int ptrace_check_attach(struct task_struct *child, int kill)
  {
  	int ret = -ESRCH;
  
  	/*
  	 * We take the read lock around doing both checks to close a
  	 * possible race where someone else was tracing our child and
  	 * detached between these two checks.  After this locked check,
  	 * we are sure that this is our traced child and that can only
  	 * be changed by us so it's not changing right after this.
  	 */
  	read_lock(&tasklist_lock);
c0c0b649d   Oleg Nesterov   ptrace_check_atta...
112
  	if ((child->ptrace & PT_PTRACED) && child->parent == current) {
c0c0b649d   Oleg Nesterov   ptrace_check_atta...
113
114
115
116
  		/*
  		 * child->sighand can't be NULL, release_task()
  		 * does ptrace_unlink() before __exit_signal().
  		 */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
117
  		spin_lock_irq(&child->sighand->siglock);
321fb5619   Oleg Nesterov   ptrace: ptrace_ch...
118
119
120
  		WARN_ON_ONCE(task_is_stopped(child));
  		if (task_is_traced(child) || kill)
  			ret = 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
121
122
123
  		spin_unlock_irq(&child->sighand->siglock);
  	}
  	read_unlock(&tasklist_lock);
d9ae90ac4   Oleg Nesterov   use __set_task_st...
124
  	if (!ret && !kill)
85ba2d862   Roland McGrath   tracehook: wait_t...
125
  		ret = wait_task_inactive(child, TASK_TRACED) ? 0 : -ESRCH;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
126
127
128
129
  
  	/* All systems go.. */
  	return ret;
  }
006ebb40d   Stephen Smalley   Security: split p...
130
  int __ptrace_may_access(struct task_struct *task, unsigned int mode)
ab8d11beb   Miklos Szeredi   [PATCH] remove du...
131
  {
c69e8d9c0   David Howells   CRED: Use RCU to ...
132
  	const struct cred *cred = current_cred(), *tcred;
b6dff3ec5   David Howells   CRED: Separate ta...
133

df26c40e5   Eric W. Biederman   [PATCH] proc: Cle...
134
135
136
137
138
139
140
141
142
143
144
145
  	/* May we inspect the given task?
  	 * This check is used both for attaching with ptrace
  	 * and for allowing access to sensitive information in /proc.
  	 *
  	 * ptrace_attach denies several cases that /proc allows
  	 * because setting up the necessary parent/child relationship
  	 * or halting the specified task is impossible.
  	 */
  	int dumpable = 0;
  	/* Don't let security modules deny introspection */
  	if (task == current)
  		return 0;
c69e8d9c0   David Howells   CRED: Use RCU to ...
146
147
  	rcu_read_lock();
  	tcred = __task_cred(task);
8409cca70   Serge E. Hallyn   userns: allow ptr...
148
149
150
151
152
153
154
155
156
157
158
159
160
  	if (cred->user->user_ns == tcred->user->user_ns &&
  	    (cred->uid == tcred->euid &&
  	     cred->uid == tcred->suid &&
  	     cred->uid == tcred->uid  &&
  	     cred->gid == tcred->egid &&
  	     cred->gid == tcred->sgid &&
  	     cred->gid == tcred->gid))
  		goto ok;
  	if (ns_capable(tcred->user->user_ns, CAP_SYS_PTRACE))
  		goto ok;
  	rcu_read_unlock();
  	return -EPERM;
  ok:
c69e8d9c0   David Howells   CRED: Use RCU to ...
161
  	rcu_read_unlock();
ab8d11beb   Miklos Szeredi   [PATCH] remove du...
162
  	smp_rmb();
df26c40e5   Eric W. Biederman   [PATCH] proc: Cle...
163
  	if (task->mm)
6c5d52382   Kawai, Hidehiro   coredump masking:...
164
  		dumpable = get_dumpable(task->mm);
8409cca70   Serge E. Hallyn   userns: allow ptr...
165
  	if (!dumpable && !task_ns_capable(task, CAP_SYS_PTRACE))
ab8d11beb   Miklos Szeredi   [PATCH] remove du...
166
  		return -EPERM;
9e48858f7   Ingo Molnar   security: rename ...
167
  	return security_ptrace_access_check(task, mode);
ab8d11beb   Miklos Szeredi   [PATCH] remove du...
168
  }
006ebb40d   Stephen Smalley   Security: split p...
169
  bool ptrace_may_access(struct task_struct *task, unsigned int mode)
ab8d11beb   Miklos Szeredi   [PATCH] remove du...
170
171
172
  {
  	int err;
  	task_lock(task);
006ebb40d   Stephen Smalley   Security: split p...
173
  	err = __ptrace_may_access(task, mode);
ab8d11beb   Miklos Szeredi   [PATCH] remove du...
174
  	task_unlock(task);
3a7097035   Roland McGrath   ptrace: some chec...
175
  	return !err;
ab8d11beb   Miklos Szeredi   [PATCH] remove du...
176
  }
e3e89cc53   Linus Torvalds   Mark ptrace_{trac...
177
  static int ptrace_attach(struct task_struct *task)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
178
  {
d79fdd6d9   Tejun Heo   ptrace: Clean tra...
179
  	bool wait_trap = false;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
180
  	int retval;
f5b40e363   Linus Torvalds   Fix ptrace_attach...
181

a5cb013da   Al Viro   [PATCH] auditing ...
182
  	audit_ptrace(task);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
183
  	retval = -EPERM;
b79b7ba93   Oleg Nesterov   ptrace: ptrace_at...
184
185
  	if (unlikely(task->flags & PF_KTHREAD))
  		goto out;
bac0abd61   Pavel Emelyanov   Isolate some expl...
186
  	if (same_thread_group(task, current))
f5b40e363   Linus Torvalds   Fix ptrace_attach...
187
  		goto out;
f2f0b00ad   Oleg Nesterov   ptrace: cleanup c...
188
189
  	/*
  	 * Protect exec's credential calculations against our interference;
5e751e992   David Howells   CRED: Rename cred...
190
191
  	 * interference; SUID, SGID and LSM creds get determined differently
  	 * under ptrace.
d84f4f992   David Howells   CRED: Inaugurate ...
192
  	 */
793285fca   Oleg Nesterov   cred_guard_mutex:...
193
  	retval = -ERESTARTNOINTR;
9b1bf12d5   KOSAKI Motohiro   signals: move cre...
194
  	if (mutex_lock_interruptible(&task->signal->cred_guard_mutex))
d84f4f992   David Howells   CRED: Inaugurate ...
195
  		goto out;
f5b40e363   Linus Torvalds   Fix ptrace_attach...
196

4b105cbba   Oleg Nesterov   ptrace: do not us...
197
  	task_lock(task);
006ebb40d   Stephen Smalley   Security: split p...
198
  	retval = __ptrace_may_access(task, PTRACE_MODE_ATTACH);
4b105cbba   Oleg Nesterov   ptrace: do not us...
199
  	task_unlock(task);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
200
  	if (retval)
4b105cbba   Oleg Nesterov   ptrace: do not us...
201
  		goto unlock_creds;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
202

4b105cbba   Oleg Nesterov   ptrace: do not us...
203
  	write_lock_irq(&tasklist_lock);
b79b7ba93   Oleg Nesterov   ptrace: ptrace_at...
204
205
  	retval = -EPERM;
  	if (unlikely(task->exit_state))
4b105cbba   Oleg Nesterov   ptrace: do not us...
206
  		goto unlock_tasklist;
f2f0b00ad   Oleg Nesterov   ptrace: cleanup c...
207
  	if (task->ptrace)
4b105cbba   Oleg Nesterov   ptrace: do not us...
208
  		goto unlock_tasklist;
b79b7ba93   Oleg Nesterov   ptrace: ptrace_at...
209

f2f0b00ad   Oleg Nesterov   ptrace: cleanup c...
210
  	task->ptrace = PT_PTRACED;
8409cca70   Serge E. Hallyn   userns: allow ptr...
211
  	if (task_ns_capable(task, CAP_SYS_PTRACE))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
212
  		task->ptrace |= PT_PTRACE_CAP;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
213

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
214
  	__ptrace_link(task, current);
33e9fc7d0   Oleg Nesterov   ptrace: ptrace_at...
215
  	send_sig_info(SIGSTOP, SEND_SIG_FORCED, task);
b79b7ba93   Oleg Nesterov   ptrace: ptrace_at...
216

d79fdd6d9   Tejun Heo   ptrace: Clean tra...
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
  	spin_lock(&task->sighand->siglock);
  
  	/*
  	 * If the task is already STOPPED, set GROUP_STOP_PENDING and
  	 * TRAPPING, and kick it so that it transits to TRACED.  TRAPPING
  	 * will be cleared if the child completes the transition or any
  	 * event which clears the group stop states happens.  We'll wait
  	 * for the transition to complete before returning from this
  	 * function.
  	 *
  	 * This hides STOPPED -> RUNNING -> TRACED transition from the
  	 * attaching thread but a different thread in the same group can
  	 * still observe the transient RUNNING state.  IOW, if another
  	 * thread's WNOHANG wait(2) on the stopped tracee races against
  	 * ATTACH, the wait(2) may fail due to the transient RUNNING.
  	 *
  	 * The following task_is_stopped() test is safe as both transitions
  	 * in and out of STOPPED are protected by siglock.
  	 */
  	if (task_is_stopped(task)) {
  		task->group_stop |= GROUP_STOP_PENDING | GROUP_STOP_TRAPPING;
  		signal_wake_up(task, 1);
  		wait_trap = true;
  	}
  
  	spin_unlock(&task->sighand->siglock);
b79b7ba93   Oleg Nesterov   ptrace: ptrace_at...
243
  	retval = 0;
4b105cbba   Oleg Nesterov   ptrace: do not us...
244
245
246
  unlock_tasklist:
  	write_unlock_irq(&tasklist_lock);
  unlock_creds:
9b1bf12d5   KOSAKI Motohiro   signals: move cre...
247
  	mutex_unlock(&task->signal->cred_guard_mutex);
f5b40e363   Linus Torvalds   Fix ptrace_attach...
248
  out:
d79fdd6d9   Tejun Heo   ptrace: Clean tra...
249
250
251
  	if (wait_trap)
  		wait_event(current->signal->wait_chldexit,
  			   !(task->group_stop & GROUP_STOP_TRAPPING));
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
252
253
  	return retval;
  }
f2f0b00ad   Oleg Nesterov   ptrace: cleanup c...
254
255
256
257
258
259
  /**
   * ptrace_traceme  --  helper for PTRACE_TRACEME
   *
   * Performs checks and sets PT_PTRACED.
   * Should be used by all ptrace implementations for PTRACE_TRACEME.
   */
e3e89cc53   Linus Torvalds   Mark ptrace_{trac...
260
  static int ptrace_traceme(void)
f2f0b00ad   Oleg Nesterov   ptrace: cleanup c...
261
262
  {
  	int ret = -EPERM;
4b105cbba   Oleg Nesterov   ptrace: do not us...
263
264
  	write_lock_irq(&tasklist_lock);
  	/* Are we already being traced? */
f2f0b00ad   Oleg Nesterov   ptrace: cleanup c...
265
  	if (!current->ptrace) {
f2f0b00ad   Oleg Nesterov   ptrace: cleanup c...
266
  		ret = security_ptrace_traceme(current->parent);
f2f0b00ad   Oleg Nesterov   ptrace: cleanup c...
267
268
269
270
271
272
273
274
275
  		/*
  		 * Check PF_EXITING to ensure ->real_parent has not passed
  		 * exit_ptrace(). Otherwise we don't report the error but
  		 * pretend ->real_parent untraces us right after return.
  		 */
  		if (!ret && !(current->real_parent->flags & PF_EXITING)) {
  			current->ptrace = PT_PTRACED;
  			__ptrace_link(current, current->real_parent);
  		}
f2f0b00ad   Oleg Nesterov   ptrace: cleanup c...
276
  	}
4b105cbba   Oleg Nesterov   ptrace: do not us...
277
  	write_unlock_irq(&tasklist_lock);
f2f0b00ad   Oleg Nesterov   ptrace: cleanup c...
278
279
  	return ret;
  }
39c626ae4   Oleg Nesterov   forget_original_p...
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
  /*
   * Called with irqs disabled, returns true if childs should reap themselves.
   */
  static int ignoring_children(struct sighand_struct *sigh)
  {
  	int ret;
  	spin_lock(&sigh->siglock);
  	ret = (sigh->action[SIGCHLD-1].sa.sa_handler == SIG_IGN) ||
  	      (sigh->action[SIGCHLD-1].sa.sa_flags & SA_NOCLDWAIT);
  	spin_unlock(&sigh->siglock);
  	return ret;
  }
  
  /*
   * Called with tasklist_lock held for writing.
   * Unlink a traced task, and clean it up if it was a traced zombie.
   * Return true if it needs to be reaped with release_task().
   * (We can't call release_task() here because we already hold tasklist_lock.)
   *
   * If it's a zombie, our attachedness prevented normal parent notification
   * or self-reaping.  Do notification now if it would have happened earlier.
   * If it should reap itself, return true.
   *
a7f0765ed   Oleg Nesterov   ptrace: __ptrace_...
303
304
305
306
   * If it's our own child, there is no notification to do. But if our normal
   * children self-reap, then this child was prevented by ptrace and we must
   * reap it now, in that case we must also wake up sub-threads sleeping in
   * do_wait().
39c626ae4   Oleg Nesterov   forget_original_p...
307
308
309
310
311
312
313
314
315
   */
  static bool __ptrace_detach(struct task_struct *tracer, struct task_struct *p)
  {
  	__ptrace_unlink(p);
  
  	if (p->exit_state == EXIT_ZOMBIE) {
  		if (!task_detached(p) && thread_group_empty(p)) {
  			if (!same_thread_group(p->real_parent, tracer))
  				do_notify_parent(p, p->exit_signal);
a7f0765ed   Oleg Nesterov   ptrace: __ptrace_...
316
317
  			else if (ignoring_children(tracer->sighand)) {
  				__wake_up_parent(p, tracer);
39c626ae4   Oleg Nesterov   forget_original_p...
318
  				p->exit_signal = -1;
a7f0765ed   Oleg Nesterov   ptrace: __ptrace_...
319
  			}
39c626ae4   Oleg Nesterov   forget_original_p...
320
321
322
323
324
325
326
327
328
329
  		}
  		if (task_detached(p)) {
  			/* Mark it as in the process of being reaped. */
  			p->exit_state = EXIT_DEAD;
  			return true;
  		}
  	}
  
  	return false;
  }
e3e89cc53   Linus Torvalds   Mark ptrace_{trac...
330
  static int ptrace_detach(struct task_struct *child, unsigned int data)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
331
  {
39c626ae4   Oleg Nesterov   forget_original_p...
332
  	bool dead = false;
4576145c1   Oleg Nesterov   ptrace: fix possi...
333

7ed20e1ad   Jesper Juhl   [PATCH] convert t...
334
  	if (!valid_signal(data))
5ecfbae09   Oleg Nesterov   [PATCH] fix zap_t...
335
  		return -EIO;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
336
337
338
  
  	/* Architecture-specific hardware disable .. */
  	ptrace_disable(child);
7d9414329   Roland McGrath   Fix spurious sysc...
339
  	clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
340

95c3eb76d   Oleg Nesterov   ptrace: kill __pt...
341
  	write_lock_irq(&tasklist_lock);
39c626ae4   Oleg Nesterov   forget_original_p...
342
343
344
345
  	/*
  	 * This child can be already killed. Make sure de_thread() or
  	 * our sub-thread doing do_wait() didn't do release_task() yet.
  	 */
95c3eb76d   Oleg Nesterov   ptrace: kill __pt...
346
347
  	if (child->ptrace) {
  		child->exit_code = data;
4576145c1   Oleg Nesterov   ptrace: fix possi...
348
  		dead = __ptrace_detach(current, child);
95c3eb76d   Oleg Nesterov   ptrace: kill __pt...
349
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
350
  	write_unlock_irq(&tasklist_lock);
4576145c1   Oleg Nesterov   ptrace: fix possi...
351
352
  	if (unlikely(dead))
  		release_task(child);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
353
354
  	return 0;
  }
39c626ae4   Oleg Nesterov   forget_original_p...
355
  /*
c7e49c148   Oleg Nesterov   ptrace: optimize ...
356
357
358
   * Detach all tasks we were using ptrace on. Called with tasklist held
   * for writing, and returns with it held too. But note it can release
   * and reacquire the lock.
39c626ae4   Oleg Nesterov   forget_original_p...
359
360
   */
  void exit_ptrace(struct task_struct *tracer)
c4b5ed250   Namhyung Kim   ptrace: annotate ...
361
362
  	__releases(&tasklist_lock)
  	__acquires(&tasklist_lock)
39c626ae4   Oleg Nesterov   forget_original_p...
363
364
365
  {
  	struct task_struct *p, *n;
  	LIST_HEAD(ptrace_dead);
c7e49c148   Oleg Nesterov   ptrace: optimize ...
366
367
  	if (likely(list_empty(&tracer->ptraced)))
  		return;
39c626ae4   Oleg Nesterov   forget_original_p...
368
369
370
371
  	list_for_each_entry_safe(p, n, &tracer->ptraced, ptrace_entry) {
  		if (__ptrace_detach(tracer, p))
  			list_add(&p->ptrace_entry, &ptrace_dead);
  	}
39c626ae4   Oleg Nesterov   forget_original_p...
372

c7e49c148   Oleg Nesterov   ptrace: optimize ...
373
  	write_unlock_irq(&tasklist_lock);
39c626ae4   Oleg Nesterov   forget_original_p...
374
375
376
377
378
379
  	BUG_ON(!list_empty(&tracer->ptraced));
  
  	list_for_each_entry_safe(p, n, &ptrace_dead, ptrace_entry) {
  		list_del_init(&p->ptrace_entry);
  		release_task(p);
  	}
c7e49c148   Oleg Nesterov   ptrace: optimize ...
380
381
  
  	write_lock_irq(&tasklist_lock);
39c626ae4   Oleg Nesterov   forget_original_p...
382
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
  int ptrace_readdata(struct task_struct *tsk, unsigned long src, char __user *dst, int len)
  {
  	int copied = 0;
  
  	while (len > 0) {
  		char buf[128];
  		int this_len, retval;
  
  		this_len = (len > sizeof(buf)) ? sizeof(buf) : len;
  		retval = access_process_vm(tsk, src, buf, this_len, 0);
  		if (!retval) {
  			if (copied)
  				break;
  			return -EIO;
  		}
  		if (copy_to_user(dst, buf, retval))
  			return -EFAULT;
  		copied += retval;
  		src += retval;
  		dst += retval;
3a7097035   Roland McGrath   ptrace: some chec...
403
  		len -= retval;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
  	}
  	return copied;
  }
  
  int ptrace_writedata(struct task_struct *tsk, char __user *src, unsigned long dst, int len)
  {
  	int copied = 0;
  
  	while (len > 0) {
  		char buf[128];
  		int this_len, retval;
  
  		this_len = (len > sizeof(buf)) ? sizeof(buf) : len;
  		if (copy_from_user(buf, src, this_len))
  			return -EFAULT;
  		retval = access_process_vm(tsk, dst, buf, this_len, 1);
  		if (!retval) {
  			if (copied)
  				break;
  			return -EIO;
  		}
  		copied += retval;
  		src += retval;
  		dst += retval;
3a7097035   Roland McGrath   ptrace: some chec...
428
  		len -= retval;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
429
430
431
  	}
  	return copied;
  }
4abf98696   Namhyung Kim   ptrace: change si...
432
  static int ptrace_setoptions(struct task_struct *child, unsigned long data)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
  {
  	child->ptrace &= ~PT_TRACE_MASK;
  
  	if (data & PTRACE_O_TRACESYSGOOD)
  		child->ptrace |= PT_TRACESYSGOOD;
  
  	if (data & PTRACE_O_TRACEFORK)
  		child->ptrace |= PT_TRACE_FORK;
  
  	if (data & PTRACE_O_TRACEVFORK)
  		child->ptrace |= PT_TRACE_VFORK;
  
  	if (data & PTRACE_O_TRACECLONE)
  		child->ptrace |= PT_TRACE_CLONE;
  
  	if (data & PTRACE_O_TRACEEXEC)
  		child->ptrace |= PT_TRACE_EXEC;
  
  	if (data & PTRACE_O_TRACEVFORKDONE)
  		child->ptrace |= PT_TRACE_VFORK_DONE;
  
  	if (data & PTRACE_O_TRACEEXIT)
  		child->ptrace |= PT_TRACE_EXIT;
  
  	return (data & ~PTRACE_O_MASK) ? -EINVAL : 0;
  }
e16b27816   Roland McGrath   ptrace: compat_pt...
459
  static int ptrace_getsiginfo(struct task_struct *child, siginfo_t *info)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
460
  {
e49612544   Oleg Nesterov   ptrace: don't tak...
461
  	unsigned long flags;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
462
  	int error = -ESRCH;
e49612544   Oleg Nesterov   ptrace: don't tak...
463
  	if (lock_task_sighand(child, &flags)) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
464
  		error = -EINVAL;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
465
  		if (likely(child->last_siginfo != NULL)) {
e16b27816   Roland McGrath   ptrace: compat_pt...
466
  			*info = *child->last_siginfo;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
467
468
  			error = 0;
  		}
e49612544   Oleg Nesterov   ptrace: don't tak...
469
  		unlock_task_sighand(child, &flags);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
470
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
471
472
  	return error;
  }
e16b27816   Roland McGrath   ptrace: compat_pt...
473
  static int ptrace_setsiginfo(struct task_struct *child, const siginfo_t *info)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
474
  {
e49612544   Oleg Nesterov   ptrace: don't tak...
475
  	unsigned long flags;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
476
  	int error = -ESRCH;
e49612544   Oleg Nesterov   ptrace: don't tak...
477
  	if (lock_task_sighand(child, &flags)) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
478
  		error = -EINVAL;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
479
  		if (likely(child->last_siginfo != NULL)) {
e16b27816   Roland McGrath   ptrace: compat_pt...
480
  			*child->last_siginfo = *info;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
481
482
  			error = 0;
  		}
e49612544   Oleg Nesterov   ptrace: don't tak...
483
  		unlock_task_sighand(child, &flags);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
484
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
485
486
  	return error;
  }
36df29d79   Roland McGrath   ptrace: generic r...
487
488
489
490
491
492
  
  #ifdef PTRACE_SINGLESTEP
  #define is_singlestep(request)		((request) == PTRACE_SINGLESTEP)
  #else
  #define is_singlestep(request)		0
  #endif
5b88abbf7   Roland McGrath   ptrace: generic P...
493
494
495
496
497
  #ifdef PTRACE_SINGLEBLOCK
  #define is_singleblock(request)		((request) == PTRACE_SINGLEBLOCK)
  #else
  #define is_singleblock(request)		0
  #endif
36df29d79   Roland McGrath   ptrace: generic r...
498
499
500
501
502
  #ifdef PTRACE_SYSEMU
  #define is_sysemu_singlestep(request)	((request) == PTRACE_SYSEMU_SINGLESTEP)
  #else
  #define is_sysemu_singlestep(request)	0
  #endif
4abf98696   Namhyung Kim   ptrace: change si...
503
504
  static int ptrace_resume(struct task_struct *child, long request,
  			 unsigned long data)
36df29d79   Roland McGrath   ptrace: generic r...
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
  {
  	if (!valid_signal(data))
  		return -EIO;
  
  	if (request == PTRACE_SYSCALL)
  		set_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
  	else
  		clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
  
  #ifdef TIF_SYSCALL_EMU
  	if (request == PTRACE_SYSEMU || request == PTRACE_SYSEMU_SINGLESTEP)
  		set_tsk_thread_flag(child, TIF_SYSCALL_EMU);
  	else
  		clear_tsk_thread_flag(child, TIF_SYSCALL_EMU);
  #endif
5b88abbf7   Roland McGrath   ptrace: generic P...
520
521
522
523
524
  	if (is_singleblock(request)) {
  		if (unlikely(!arch_has_block_step()))
  			return -EIO;
  		user_enable_block_step(child);
  	} else if (is_singlestep(request) || is_sysemu_singlestep(request)) {
36df29d79   Roland McGrath   ptrace: generic r...
525
526
527
  		if (unlikely(!arch_has_single_step()))
  			return -EIO;
  		user_enable_single_step(child);
3a7097035   Roland McGrath   ptrace: some chec...
528
  	} else {
36df29d79   Roland McGrath   ptrace: generic r...
529
  		user_disable_single_step(child);
3a7097035   Roland McGrath   ptrace: some chec...
530
  	}
36df29d79   Roland McGrath   ptrace: generic r...
531
532
  
  	child->exit_code = data;
0666fb51b   Oleg Nesterov   ptrace: ptrace_re...
533
  	wake_up_state(child, __TASK_TRACED);
36df29d79   Roland McGrath   ptrace: generic r...
534
535
536
  
  	return 0;
  }
2225a122a   Suresh Siddha   ptrace: Add suppo...
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
  #ifdef CONFIG_HAVE_ARCH_TRACEHOOK
  
  static const struct user_regset *
  find_regset(const struct user_regset_view *view, unsigned int type)
  {
  	const struct user_regset *regset;
  	int n;
  
  	for (n = 0; n < view->n; ++n) {
  		regset = view->regsets + n;
  		if (regset->core_note_type == type)
  			return regset;
  	}
  
  	return NULL;
  }
  
  static int ptrace_regset(struct task_struct *task, int req, unsigned int type,
  			 struct iovec *kiov)
  {
  	const struct user_regset_view *view = task_user_regset_view(task);
  	const struct user_regset *regset = find_regset(view, type);
  	int regset_no;
  
  	if (!regset || (kiov->iov_len % regset->size) != 0)
c6a0dd7ec   Suresh Siddha   ptrace: Fix ptrac...
562
  		return -EINVAL;
2225a122a   Suresh Siddha   ptrace: Add suppo...
563
564
565
566
567
568
569
570
571
572
573
574
575
576
  
  	regset_no = regset - view->regsets;
  	kiov->iov_len = min(kiov->iov_len,
  			    (__kernel_size_t) (regset->n * regset->size));
  
  	if (req == PTRACE_GETREGSET)
  		return copy_regset_to_user(task, view, regset_no, 0,
  					   kiov->iov_len, kiov->iov_base);
  	else
  		return copy_regset_from_user(task, view, regset_no, 0,
  					     kiov->iov_len, kiov->iov_base);
  }
  
  #endif
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
577
  int ptrace_request(struct task_struct *child, long request,
4abf98696   Namhyung Kim   ptrace: change si...
578
  		   unsigned long addr, unsigned long data)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
579
580
  {
  	int ret = -EIO;
e16b27816   Roland McGrath   ptrace: compat_pt...
581
  	siginfo_t siginfo;
9fed81dc4   Namhyung Kim   ptrace: cleanup p...
582
583
  	void __user *datavp = (void __user *) data;
  	unsigned long __user *datalp = datavp;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
584
585
  
  	switch (request) {
16c3e389e   Roland McGrath   x86: ptrace_reque...
586
587
588
589
590
591
  	case PTRACE_PEEKTEXT:
  	case PTRACE_PEEKDATA:
  		return generic_ptrace_peekdata(child, addr, data);
  	case PTRACE_POKETEXT:
  	case PTRACE_POKEDATA:
  		return generic_ptrace_pokedata(child, addr, data);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
592
593
594
595
596
597
598
  #ifdef PTRACE_OLDSETOPTIONS
  	case PTRACE_OLDSETOPTIONS:
  #endif
  	case PTRACE_SETOPTIONS:
  		ret = ptrace_setoptions(child, data);
  		break;
  	case PTRACE_GETEVENTMSG:
9fed81dc4   Namhyung Kim   ptrace: cleanup p...
599
  		ret = put_user(child->ptrace_message, datalp);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
600
  		break;
e16b27816   Roland McGrath   ptrace: compat_pt...
601

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
602
  	case PTRACE_GETSIGINFO:
e16b27816   Roland McGrath   ptrace: compat_pt...
603
604
  		ret = ptrace_getsiginfo(child, &siginfo);
  		if (!ret)
9fed81dc4   Namhyung Kim   ptrace: cleanup p...
605
  			ret = copy_siginfo_to_user(datavp, &siginfo);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
606
  		break;
e16b27816   Roland McGrath   ptrace: compat_pt...
607

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
608
  	case PTRACE_SETSIGINFO:
9fed81dc4   Namhyung Kim   ptrace: cleanup p...
609
  		if (copy_from_user(&siginfo, datavp, sizeof siginfo))
e16b27816   Roland McGrath   ptrace: compat_pt...
610
611
612
  			ret = -EFAULT;
  		else
  			ret = ptrace_setsiginfo(child, &siginfo);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
613
  		break;
e16b27816   Roland McGrath   ptrace: compat_pt...
614

1bcf54829   Alexey Dobriyan   Consolidate PTRAC...
615
616
617
  	case PTRACE_DETACH:	 /* detach a process that was attached. */
  		ret = ptrace_detach(child, data);
  		break;
36df29d79   Roland McGrath   ptrace: generic r...
618

9c1a12592   Mike Frysinger   ptrace: unify FDP...
619
620
  #ifdef CONFIG_BINFMT_ELF_FDPIC
  	case PTRACE_GETFDPIC: {
e0129ef91   Oleg Nesterov   ptrace: PTRACE_GE...
621
  		struct mm_struct *mm = get_task_mm(child);
9c1a12592   Mike Frysinger   ptrace: unify FDP...
622
  		unsigned long tmp = 0;
e0129ef91   Oleg Nesterov   ptrace: PTRACE_GE...
623
624
625
  		ret = -ESRCH;
  		if (!mm)
  			break;
9c1a12592   Mike Frysinger   ptrace: unify FDP...
626
627
  		switch (addr) {
  		case PTRACE_GETFDPIC_EXEC:
e0129ef91   Oleg Nesterov   ptrace: PTRACE_GE...
628
  			tmp = mm->context.exec_fdpic_loadmap;
9c1a12592   Mike Frysinger   ptrace: unify FDP...
629
630
  			break;
  		case PTRACE_GETFDPIC_INTERP:
e0129ef91   Oleg Nesterov   ptrace: PTRACE_GE...
631
  			tmp = mm->context.interp_fdpic_loadmap;
9c1a12592   Mike Frysinger   ptrace: unify FDP...
632
633
634
635
  			break;
  		default:
  			break;
  		}
e0129ef91   Oleg Nesterov   ptrace: PTRACE_GE...
636
  		mmput(mm);
9c1a12592   Mike Frysinger   ptrace: unify FDP...
637

9fed81dc4   Namhyung Kim   ptrace: cleanup p...
638
  		ret = put_user(tmp, datalp);
9c1a12592   Mike Frysinger   ptrace: unify FDP...
639
640
641
  		break;
  	}
  #endif
36df29d79   Roland McGrath   ptrace: generic r...
642
643
644
  #ifdef PTRACE_SINGLESTEP
  	case PTRACE_SINGLESTEP:
  #endif
5b88abbf7   Roland McGrath   ptrace: generic P...
645
646
647
  #ifdef PTRACE_SINGLEBLOCK
  	case PTRACE_SINGLEBLOCK:
  #endif
36df29d79   Roland McGrath   ptrace: generic r...
648
649
650
651
652
653
654
655
656
657
658
659
  #ifdef PTRACE_SYSEMU
  	case PTRACE_SYSEMU:
  	case PTRACE_SYSEMU_SINGLESTEP:
  #endif
  	case PTRACE_SYSCALL:
  	case PTRACE_CONT:
  		return ptrace_resume(child, request, data);
  
  	case PTRACE_KILL:
  		if (child->exit_state)	/* already dead */
  			return 0;
  		return ptrace_resume(child, request, SIGKILL);
2225a122a   Suresh Siddha   ptrace: Add suppo...
660
661
662
663
664
  #ifdef CONFIG_HAVE_ARCH_TRACEHOOK
  	case PTRACE_GETREGSET:
  	case PTRACE_SETREGSET:
  	{
  		struct iovec kiov;
9fed81dc4   Namhyung Kim   ptrace: cleanup p...
665
  		struct iovec __user *uiov = datavp;
2225a122a   Suresh Siddha   ptrace: Add suppo...
666
667
668
669
670
671
672
673
674
675
676
677
678
679
  
  		if (!access_ok(VERIFY_WRITE, uiov, sizeof(*uiov)))
  			return -EFAULT;
  
  		if (__get_user(kiov.iov_base, &uiov->iov_base) ||
  		    __get_user(kiov.iov_len, &uiov->iov_len))
  			return -EFAULT;
  
  		ret = ptrace_regset(child, request, addr, &kiov);
  		if (!ret)
  			ret = __put_user(kiov.iov_len, &uiov->iov_len);
  		break;
  	}
  #endif
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
680
681
682
683
684
685
  	default:
  		break;
  	}
  
  	return ret;
  }
481bed454   Christoph Hellwig   [PATCH] consolida...
686

8053bdd5c   Oleg Nesterov   ptrace_get_task_s...
687
  static struct task_struct *ptrace_get_task_struct(pid_t pid)
6b9c7ed84   Christoph Hellwig   [PATCH] use ptrac...
688
689
  {
  	struct task_struct *child;
481bed454   Christoph Hellwig   [PATCH] consolida...
690

8053bdd5c   Oleg Nesterov   ptrace_get_task_s...
691
  	rcu_read_lock();
228ebcbe6   Pavel Emelyanov   Uninline find_tas...
692
  	child = find_task_by_vpid(pid);
481bed454   Christoph Hellwig   [PATCH] consolida...
693
694
  	if (child)
  		get_task_struct(child);
8053bdd5c   Oleg Nesterov   ptrace_get_task_s...
695
  	rcu_read_unlock();
f400e198b   Sukadev Bhattiprolu   [PATCH] pidspace:...
696

481bed454   Christoph Hellwig   [PATCH] consolida...
697
  	if (!child)
6b9c7ed84   Christoph Hellwig   [PATCH] use ptrac...
698
699
  		return ERR_PTR(-ESRCH);
  	return child;
481bed454   Christoph Hellwig   [PATCH] consolida...
700
  }
0ac155591   Christoph Hellwig   m32r: convert to ...
701
702
703
  #ifndef arch_ptrace_attach
  #define arch_ptrace_attach(child)	do { } while (0)
  #endif
4abf98696   Namhyung Kim   ptrace: change si...
704
705
  SYSCALL_DEFINE4(ptrace, long, request, long, pid, unsigned long, addr,
  		unsigned long, data)
481bed454   Christoph Hellwig   [PATCH] consolida...
706
707
708
  {
  	struct task_struct *child;
  	long ret;
6b9c7ed84   Christoph Hellwig   [PATCH] use ptrac...
709
710
  	if (request == PTRACE_TRACEME) {
  		ret = ptrace_traceme();
6ea6dd93c   Haavard Skinnemoen   ptrace: Call arch...
711
712
  		if (!ret)
  			arch_ptrace_attach(current);
481bed454   Christoph Hellwig   [PATCH] consolida...
713
  		goto out;
6b9c7ed84   Christoph Hellwig   [PATCH] use ptrac...
714
715
716
717
718
719
720
  	}
  
  	child = ptrace_get_task_struct(pid);
  	if (IS_ERR(child)) {
  		ret = PTR_ERR(child);
  		goto out;
  	}
481bed454   Christoph Hellwig   [PATCH] consolida...
721
722
723
  
  	if (request == PTRACE_ATTACH) {
  		ret = ptrace_attach(child);
0ac155591   Christoph Hellwig   m32r: convert to ...
724
725
726
727
728
729
  		/*
  		 * Some architectures need to do book-keeping after
  		 * a ptrace attach.
  		 */
  		if (!ret)
  			arch_ptrace_attach(child);
005f18dfd   Christoph Hellwig   [PATCH] fix task_...
730
  		goto out_put_task_struct;
481bed454   Christoph Hellwig   [PATCH] consolida...
731
732
733
734
735
736
737
  	}
  
  	ret = ptrace_check_attach(child, request == PTRACE_KILL);
  	if (ret < 0)
  		goto out_put_task_struct;
  
  	ret = arch_ptrace(child, request, addr, data);
481bed454   Christoph Hellwig   [PATCH] consolida...
738
739
740
741
  
   out_put_task_struct:
  	put_task_struct(child);
   out:
481bed454   Christoph Hellwig   [PATCH] consolida...
742
743
  	return ret;
  }
766473231   Alexey Dobriyan   PTRACE_PEEKDATA c...
744

4abf98696   Namhyung Kim   ptrace: change si...
745
746
  int generic_ptrace_peekdata(struct task_struct *tsk, unsigned long addr,
  			    unsigned long data)
766473231   Alexey Dobriyan   PTRACE_PEEKDATA c...
747
748
749
750
751
752
753
754
755
  {
  	unsigned long tmp;
  	int copied;
  
  	copied = access_process_vm(tsk, addr, &tmp, sizeof(tmp), 0);
  	if (copied != sizeof(tmp))
  		return -EIO;
  	return put_user(tmp, (unsigned long __user *)data);
  }
f284ce726   Alexey Dobriyan   PTRACE_POKEDATA c...
756

4abf98696   Namhyung Kim   ptrace: change si...
757
758
  int generic_ptrace_pokedata(struct task_struct *tsk, unsigned long addr,
  			    unsigned long data)
f284ce726   Alexey Dobriyan   PTRACE_POKEDATA c...
759
760
761
762
763
764
  {
  	int copied;
  
  	copied = access_process_vm(tsk, addr, &data, sizeof(data), 1);
  	return (copied == sizeof(data)) ? 0 : -EIO;
  }
032d82d90   Roland McGrath   x86: compat_ptrac...
765

96b8936a9   Christoph Hellwig   remove __ARCH_WAN...
766
  #if defined CONFIG_COMPAT
032d82d90   Roland McGrath   x86: compat_ptrac...
767
768
769
770
771
772
773
  #include <linux/compat.h>
  
  int compat_ptrace_request(struct task_struct *child, compat_long_t request,
  			  compat_ulong_t addr, compat_ulong_t data)
  {
  	compat_ulong_t __user *datap = compat_ptr(data);
  	compat_ulong_t word;
e16b27816   Roland McGrath   ptrace: compat_pt...
774
  	siginfo_t siginfo;
032d82d90   Roland McGrath   x86: compat_ptrac...
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
  	int ret;
  
  	switch (request) {
  	case PTRACE_PEEKTEXT:
  	case PTRACE_PEEKDATA:
  		ret = access_process_vm(child, addr, &word, sizeof(word), 0);
  		if (ret != sizeof(word))
  			ret = -EIO;
  		else
  			ret = put_user(word, datap);
  		break;
  
  	case PTRACE_POKETEXT:
  	case PTRACE_POKEDATA:
  		ret = access_process_vm(child, addr, &data, sizeof(data), 1);
  		ret = (ret != sizeof(data) ? -EIO : 0);
  		break;
  
  	case PTRACE_GETEVENTMSG:
  		ret = put_user((compat_ulong_t) child->ptrace_message, datap);
  		break;
e16b27816   Roland McGrath   ptrace: compat_pt...
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
  	case PTRACE_GETSIGINFO:
  		ret = ptrace_getsiginfo(child, &siginfo);
  		if (!ret)
  			ret = copy_siginfo_to_user32(
  				(struct compat_siginfo __user *) datap,
  				&siginfo);
  		break;
  
  	case PTRACE_SETSIGINFO:
  		memset(&siginfo, 0, sizeof siginfo);
  		if (copy_siginfo_from_user32(
  			    &siginfo, (struct compat_siginfo __user *) datap))
  			ret = -EFAULT;
  		else
  			ret = ptrace_setsiginfo(child, &siginfo);
  		break;
2225a122a   Suresh Siddha   ptrace: Add suppo...
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
  #ifdef CONFIG_HAVE_ARCH_TRACEHOOK
  	case PTRACE_GETREGSET:
  	case PTRACE_SETREGSET:
  	{
  		struct iovec kiov;
  		struct compat_iovec __user *uiov =
  			(struct compat_iovec __user *) datap;
  		compat_uptr_t ptr;
  		compat_size_t len;
  
  		if (!access_ok(VERIFY_WRITE, uiov, sizeof(*uiov)))
  			return -EFAULT;
  
  		if (__get_user(ptr, &uiov->iov_base) ||
  		    __get_user(len, &uiov->iov_len))
  			return -EFAULT;
  
  		kiov.iov_base = compat_ptr(ptr);
  		kiov.iov_len = len;
  
  		ret = ptrace_regset(child, request, addr, &kiov);
  		if (!ret)
  			ret = __put_user(kiov.iov_len, &uiov->iov_len);
  		break;
  	}
  #endif
e16b27816   Roland McGrath   ptrace: compat_pt...
838

032d82d90   Roland McGrath   x86: compat_ptrac...
839
840
841
842
843
844
  	default:
  		ret = ptrace_request(child, request, addr, data);
  	}
  
  	return ret;
  }
c269f1961   Roland McGrath   x86: compat_sys_p...
845

c269f1961   Roland McGrath   x86: compat_sys_p...
846
847
848
849
850
  asmlinkage long compat_sys_ptrace(compat_long_t request, compat_long_t pid,
  				  compat_long_t addr, compat_long_t data)
  {
  	struct task_struct *child;
  	long ret;
c269f1961   Roland McGrath   x86: compat_sys_p...
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
  	if (request == PTRACE_TRACEME) {
  		ret = ptrace_traceme();
  		goto out;
  	}
  
  	child = ptrace_get_task_struct(pid);
  	if (IS_ERR(child)) {
  		ret = PTR_ERR(child);
  		goto out;
  	}
  
  	if (request == PTRACE_ATTACH) {
  		ret = ptrace_attach(child);
  		/*
  		 * Some architectures need to do book-keeping after
  		 * a ptrace attach.
  		 */
  		if (!ret)
  			arch_ptrace_attach(child);
  		goto out_put_task_struct;
  	}
  
  	ret = ptrace_check_attach(child, request == PTRACE_KILL);
  	if (!ret)
  		ret = compat_arch_ptrace(child, request, addr, data);
  
   out_put_task_struct:
  	put_task_struct(child);
   out:
c269f1961   Roland McGrath   x86: compat_sys_p...
880
881
  	return ret;
  }
96b8936a9   Christoph Hellwig   remove __ARCH_WAN...
882
  #endif	/* CONFIG_COMPAT */
bf26c0184   Frederic Weisbecker   ptrace: Prepare t...
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
  
  #ifdef CONFIG_HAVE_HW_BREAKPOINT
  int ptrace_get_breakpoints(struct task_struct *tsk)
  {
  	if (atomic_inc_not_zero(&tsk->ptrace_bp_refcnt))
  		return 0;
  
  	return -1;
  }
  
  void ptrace_put_breakpoints(struct task_struct *tsk)
  {
  	if (atomic_dec_and_test(&tsk->ptrace_bp_refcnt))
  		flush_ptrace_hw_breakpoint(tsk);
  }
  #endif /* CONFIG_HAVE_HW_BREAKPOINT */