blob: 8051976100a615b036f929154f7d50373d03db8c [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
Paul Mundt934135c2008-09-12 19:52:36 +09002 * SuperH process tracing
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 *
Paul Mundt934135c2008-09-12 19:52:36 +09004 * Copyright (C) 1999, 2000 Kaz Kojima & Niibe Yutaka
Paul Mundt34d0b5a2009-12-28 17:53:47 +09005 * Copyright (C) 2002 - 2009 Paul Mundt
Linus Torvalds1da177e2005-04-16 15:20:36 -07006 *
Paul Mundt934135c2008-09-12 19:52:36 +09007 * Audit support by Yuichi Nakamura <ynakam@hitachisoft.jp>
8 *
9 * This file is subject to the terms and conditions of the GNU General Public
10 * License. See the file "COPYING" in the main directory of this archive
11 * for more details.
Linus Torvalds1da177e2005-04-16 15:20:36 -070012 */
Linus Torvalds1da177e2005-04-16 15:20:36 -070013#include <linux/kernel.h>
14#include <linux/sched.h>
15#include <linux/mm.h>
16#include <linux/smp.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070017#include <linux/errno.h>
18#include <linux/ptrace.h>
19#include <linux/user.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070020#include <linux/security.h>
Jesper Juhl7ed20e12005-05-01 08:59:14 -070021#include <linux/signal.h>
Stuart Menefy9432f962007-02-23 13:22:17 +090022#include <linux/io.h>
Yuichi Nakamura1322b9d2007-11-10 19:21:34 +090023#include <linux/audit.h>
Paul Mundtc4637d42008-07-30 15:30:52 +090024#include <linux/seccomp.h>
Paul Mundtab99c732008-07-30 19:55:30 +090025#include <linux/tracehook.h>
Paul Mundt934135c2008-09-12 19:52:36 +090026#include <linux/elf.h>
27#include <linux/regset.h>
Paul Mundt34d0b5a2009-12-28 17:53:47 +090028#include <linux/hw_breakpoint.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070029#include <asm/uaccess.h>
30#include <asm/pgtable.h>
31#include <asm/system.h>
32#include <asm/processor.h>
33#include <asm/mmu_context.h>
Paul Mundtfa439722008-09-04 18:53:58 +090034#include <asm/syscalls.h>
Paul Mundte7ab3cd2008-09-21 19:04:55 +090035#include <asm/fpu.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070036
Paul Mundta74f7e02009-09-16 14:30:34 +090037#define CREATE_TRACE_POINTS
38#include <trace/events/syscalls.h>
Matt Flemingc652d782009-07-06 20:16:33 +090039
Linus Torvalds1da177e2005-04-16 15:20:36 -070040/*
Linus Torvalds1da177e2005-04-16 15:20:36 -070041 * This routine will get a word off of the process kernel stack.
42 */
43static inline int get_stack_long(struct task_struct *task, int offset)
44{
45 unsigned char *stack;
46
Al Viro3cf0f4e2006-01-12 01:05:44 -080047 stack = (unsigned char *)task_pt_regs(task);
Linus Torvalds1da177e2005-04-16 15:20:36 -070048 stack += offset;
49 return (*((int *)stack));
50}
51
52/*
53 * This routine will put a word on the process kernel stack.
54 */
55static inline int put_stack_long(struct task_struct *task, int offset,
56 unsigned long data)
57{
58 unsigned char *stack;
59
Al Viro3cf0f4e2006-01-12 01:05:44 -080060 stack = (unsigned char *)task_pt_regs(task);
Linus Torvalds1da177e2005-04-16 15:20:36 -070061 stack += offset;
62 *(unsigned long *) stack = data;
63 return 0;
64}
65
Peter Zijlstraa8b0ca12011-06-27 14:41:57 +020066void ptrace_triggered(struct perf_event *bp,
Paul Mundt34d0b5a2009-12-28 17:53:47 +090067 struct perf_sample_data *data, struct pt_regs *regs)
68{
69 struct perf_event_attr attr;
70
71 /*
72 * Disable the breakpoint request here since ptrace has defined a
73 * one-shot behaviour for breakpoint exceptions.
74 */
75 attr = bp->attr;
76 attr.disabled = true;
77 modify_user_hw_breakpoint(bp, &attr);
78}
79
80static int set_single_step(struct task_struct *tsk, unsigned long addr)
81{
82 struct thread_struct *thread = &tsk->thread;
83 struct perf_event *bp;
84 struct perf_event_attr attr;
85
86 bp = thread->ptrace_bps[0];
87 if (!bp) {
Frederic Weisbecker73266fc2010-04-22 05:05:45 +020088 ptrace_breakpoint_init(&attr);
Paul Mundt34d0b5a2009-12-28 17:53:47 +090089
90 attr.bp_addr = addr;
91 attr.bp_len = HW_BREAKPOINT_LEN_2;
92 attr.bp_type = HW_BREAKPOINT_R;
93
94 bp = register_user_hw_breakpoint(&attr, ptrace_triggered, tsk);
95 if (IS_ERR(bp))
96 return PTR_ERR(bp);
97
98 thread->ptrace_bps[0] = bp;
99 } else {
100 int err;
101
102 attr = bp->attr;
103 attr.bp_addr = addr;
David Engraffb7f0452011-03-23 11:35:42 +0000104 /* reenable breakpoint */
105 attr.disabled = false;
Paul Mundt34d0b5a2009-12-28 17:53:47 +0900106 err = modify_user_hw_breakpoint(bp, &attr);
107 if (unlikely(err))
108 return err;
109 }
110
111 return 0;
112}
113
Paul Mundtc459dbf2008-07-30 19:09:31 +0900114void user_enable_single_step(struct task_struct *child)
115{
Paul Mundt34d0b5a2009-12-28 17:53:47 +0900116 unsigned long pc = get_stack_long(child, offsetof(struct pt_regs, pc));
Paul Mundtc459dbf2008-07-30 19:09:31 +0900117
118 set_tsk_thread_flag(child, TIF_SINGLESTEP);
Paul Mundt34d0b5a2009-12-28 17:53:47 +0900119
Frederic Weisbeckere0ac8452011-04-08 17:29:36 +0200120 if (ptrace_get_breakpoints(child) < 0)
121 return;
122
Paul Mundt34d0b5a2009-12-28 17:53:47 +0900123 set_single_step(child, pc);
Frederic Weisbeckere0ac8452011-04-08 17:29:36 +0200124 ptrace_put_breakpoints(child);
Paul Mundtc459dbf2008-07-30 19:09:31 +0900125}
126
127void user_disable_single_step(struct task_struct *child)
Stuart Menefy9432f962007-02-23 13:22:17 +0900128{
129 clear_tsk_thread_flag(child, TIF_SINGLESTEP);
Stuart Menefy9432f962007-02-23 13:22:17 +0900130}
131
Linus Torvalds1da177e2005-04-16 15:20:36 -0700132/*
133 * Called by kernel/ptrace.c when detaching..
134 *
135 * Make sure single step bits etc are not set.
136 */
137void ptrace_disable(struct task_struct *child)
138{
Paul Mundtc459dbf2008-07-30 19:09:31 +0900139 user_disable_single_step(child);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700140}
141
Paul Mundt934135c2008-09-12 19:52:36 +0900142static int genregs_get(struct task_struct *target,
143 const struct user_regset *regset,
144 unsigned int pos, unsigned int count,
145 void *kbuf, void __user *ubuf)
146{
147 const struct pt_regs *regs = task_pt_regs(target);
148 int ret;
149
150 ret = user_regset_copyout(&pos, &count, &kbuf, &ubuf,
151 regs->regs,
152 0, 16 * sizeof(unsigned long));
153 if (!ret)
154 /* PC, PR, SR, GBR, MACH, MACL, TRA */
155 ret = user_regset_copyout(&pos, &count, &kbuf, &ubuf,
156 &regs->pc,
157 offsetof(struct pt_regs, pc),
158 sizeof(struct pt_regs));
159 if (!ret)
160 ret = user_regset_copyout_zero(&pos, &count, &kbuf, &ubuf,
161 sizeof(struct pt_regs), -1);
162
163 return ret;
164}
165
166static int genregs_set(struct task_struct *target,
167 const struct user_regset *regset,
168 unsigned int pos, unsigned int count,
169 const void *kbuf, const void __user *ubuf)
170{
171 struct pt_regs *regs = task_pt_regs(target);
172 int ret;
173
174 ret = user_regset_copyin(&pos, &count, &kbuf, &ubuf,
175 regs->regs,
176 0, 16 * sizeof(unsigned long));
177 if (!ret && count > 0)
178 ret = user_regset_copyin(&pos, &count, &kbuf, &ubuf,
179 &regs->pc,
180 offsetof(struct pt_regs, pc),
181 sizeof(struct pt_regs));
182 if (!ret)
183 ret = user_regset_copyin_ignore(&pos, &count, &kbuf, &ubuf,
184 sizeof(struct pt_regs), -1);
185
186 return ret;
187}
188
Paul Mundte7ab3cd2008-09-21 19:04:55 +0900189#ifdef CONFIG_SH_FPU
190int fpregs_get(struct task_struct *target,
191 const struct user_regset *regset,
192 unsigned int pos, unsigned int count,
193 void *kbuf, void __user *ubuf)
194{
195 int ret;
196
197 ret = init_fpu(target);
198 if (ret)
199 return ret;
200
201 if ((boot_cpu_data.flags & CPU_HAS_FPU))
202 return user_regset_copyout(&pos, &count, &kbuf, &ubuf,
Paul Mundt0ea820c2010-01-13 12:51:40 +0900203 &target->thread.xstate->hardfpu, 0, -1);
Paul Mundte7ab3cd2008-09-21 19:04:55 +0900204
205 return user_regset_copyout(&pos, &count, &kbuf, &ubuf,
Paul Mundt0ea820c2010-01-13 12:51:40 +0900206 &target->thread.xstate->softfpu, 0, -1);
Paul Mundte7ab3cd2008-09-21 19:04:55 +0900207}
208
209static int fpregs_set(struct task_struct *target,
210 const struct user_regset *regset,
211 unsigned int pos, unsigned int count,
212 const void *kbuf, const void __user *ubuf)
213{
214 int ret;
215
216 ret = init_fpu(target);
217 if (ret)
218 return ret;
219
220 set_stopped_child_used_math(target);
221
222 if ((boot_cpu_data.flags & CPU_HAS_FPU))
223 return user_regset_copyin(&pos, &count, &kbuf, &ubuf,
Paul Mundt0ea820c2010-01-13 12:51:40 +0900224 &target->thread.xstate->hardfpu, 0, -1);
Paul Mundte7ab3cd2008-09-21 19:04:55 +0900225
226 return user_regset_copyin(&pos, &count, &kbuf, &ubuf,
Paul Mundt0ea820c2010-01-13 12:51:40 +0900227 &target->thread.xstate->softfpu, 0, -1);
Paul Mundte7ab3cd2008-09-21 19:04:55 +0900228}
229
230static int fpregs_active(struct task_struct *target,
231 const struct user_regset *regset)
232{
233 return tsk_used_math(target) ? regset->n : 0;
234}
235#endif
236
Paul Mundt5dadb342008-09-12 22:42:10 +0900237#ifdef CONFIG_SH_DSP
238static int dspregs_get(struct task_struct *target,
239 const struct user_regset *regset,
240 unsigned int pos, unsigned int count,
241 void *kbuf, void __user *ubuf)
242{
Michael Trimarchi01ab1032009-04-03 17:32:33 +0000243 const struct pt_dspregs *regs =
244 (struct pt_dspregs *)&target->thread.dsp_status.dsp_regs;
Paul Mundt5dadb342008-09-12 22:42:10 +0900245 int ret;
246
247 ret = user_regset_copyout(&pos, &count, &kbuf, &ubuf, regs,
248 0, sizeof(struct pt_dspregs));
249 if (!ret)
250 ret = user_regset_copyout_zero(&pos, &count, &kbuf, &ubuf,
251 sizeof(struct pt_dspregs), -1);
252
253 return ret;
254}
255
256static int dspregs_set(struct task_struct *target,
257 const struct user_regset *regset,
258 unsigned int pos, unsigned int count,
259 const void *kbuf, const void __user *ubuf)
260{
Michael Trimarchi01ab1032009-04-03 17:32:33 +0000261 struct pt_dspregs *regs =
262 (struct pt_dspregs *)&target->thread.dsp_status.dsp_regs;
Paul Mundt5dadb342008-09-12 22:42:10 +0900263 int ret;
264
265 ret = user_regset_copyin(&pos, &count, &kbuf, &ubuf, regs,
266 0, sizeof(struct pt_dspregs));
267 if (!ret)
268 ret = user_regset_copyin_ignore(&pos, &count, &kbuf, &ubuf,
269 sizeof(struct pt_dspregs), -1);
270
271 return ret;
272}
Paul Mundt72461992008-09-12 22:56:35 +0900273
274static int dspregs_active(struct task_struct *target,
275 const struct user_regset *regset)
276{
277 struct pt_regs *regs = task_pt_regs(target);
278
279 return regs->sr & SR_DSP ? regset->n : 0;
280}
Paul Mundt5dadb342008-09-12 22:42:10 +0900281#endif
282
Paul Mundteaaaeef2010-06-14 15:16:53 +0900283const struct pt_regs_offset regoffset_table[] = {
284 REGS_OFFSET_NAME(0),
285 REGS_OFFSET_NAME(1),
286 REGS_OFFSET_NAME(2),
287 REGS_OFFSET_NAME(3),
288 REGS_OFFSET_NAME(4),
289 REGS_OFFSET_NAME(5),
290 REGS_OFFSET_NAME(6),
291 REGS_OFFSET_NAME(7),
292 REGS_OFFSET_NAME(8),
293 REGS_OFFSET_NAME(9),
294 REGS_OFFSET_NAME(10),
295 REGS_OFFSET_NAME(11),
296 REGS_OFFSET_NAME(12),
297 REGS_OFFSET_NAME(13),
298 REGS_OFFSET_NAME(14),
299 REGS_OFFSET_NAME(15),
300 REG_OFFSET_NAME(pc),
301 REG_OFFSET_NAME(pr),
302 REG_OFFSET_NAME(sr),
303 REG_OFFSET_NAME(gbr),
304 REG_OFFSET_NAME(mach),
305 REG_OFFSET_NAME(macl),
306 REG_OFFSET_NAME(tra),
307 REG_OFFSET_END,
308};
309
Paul Mundt934135c2008-09-12 19:52:36 +0900310/*
311 * These are our native regset flavours.
312 */
313enum sh_regset {
314 REGSET_GENERAL,
Paul Mundte7ab3cd2008-09-21 19:04:55 +0900315#ifdef CONFIG_SH_FPU
316 REGSET_FPU,
317#endif
Paul Mundt5dadb342008-09-12 22:42:10 +0900318#ifdef CONFIG_SH_DSP
319 REGSET_DSP,
320#endif
Paul Mundt934135c2008-09-12 19:52:36 +0900321};
322
323static const struct user_regset sh_regsets[] = {
324 /*
325 * Format is:
326 * R0 --> R15
327 * PC, PR, SR, GBR, MACH, MACL, TRA
328 */
329 [REGSET_GENERAL] = {
330 .core_note_type = NT_PRSTATUS,
331 .n = ELF_NGREG,
332 .size = sizeof(long),
333 .align = sizeof(long),
334 .get = genregs_get,
335 .set = genregs_set,
336 },
Paul Mundt5dadb342008-09-12 22:42:10 +0900337
Paul Mundte7ab3cd2008-09-21 19:04:55 +0900338#ifdef CONFIG_SH_FPU
339 [REGSET_FPU] = {
340 .core_note_type = NT_PRFPREG,
341 .n = sizeof(struct user_fpu_struct) / sizeof(long),
342 .size = sizeof(long),
343 .align = sizeof(long),
344 .get = fpregs_get,
345 .set = fpregs_set,
346 .active = fpregs_active,
347 },
348#endif
349
Paul Mundt5dadb342008-09-12 22:42:10 +0900350#ifdef CONFIG_SH_DSP
351 [REGSET_DSP] = {
352 .n = sizeof(struct pt_dspregs) / sizeof(long),
353 .size = sizeof(long),
354 .align = sizeof(long),
355 .get = dspregs_get,
356 .set = dspregs_set,
Paul Mundt72461992008-09-12 22:56:35 +0900357 .active = dspregs_active,
Paul Mundt5dadb342008-09-12 22:42:10 +0900358 },
359#endif
Paul Mundt934135c2008-09-12 19:52:36 +0900360};
361
362static const struct user_regset_view user_sh_native_view = {
363 .name = "sh",
364 .e_machine = EM_SH,
365 .regsets = sh_regsets,
366 .n = ARRAY_SIZE(sh_regsets),
367};
368
Paul Mundtf9540ec2008-09-12 22:42:43 +0900369const struct user_regset_view *task_user_regset_view(struct task_struct *task)
370{
371 return &user_sh_native_view;
372}
373
Namhyung Kim9b05a692010-10-27 15:33:47 -0700374long arch_ptrace(struct task_struct *child, long request,
375 unsigned long addr, unsigned long data)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700376{
Paul Mundtfa439722008-09-04 18:53:58 +0900377 unsigned long __user *datap = (unsigned long __user *)data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700378 int ret;
379
Linus Torvalds1da177e2005-04-16 15:20:36 -0700380 switch (request) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700381 /* read the word at location addr in the USER area. */
382 case PTRACE_PEEKUSR: {
383 unsigned long tmp;
384
385 ret = -EIO;
Stuart Menefy9432f962007-02-23 13:22:17 +0900386 if ((addr & 3) || addr < 0 ||
Linus Torvalds1da177e2005-04-16 15:20:36 -0700387 addr > sizeof(struct user) - 3)
388 break;
389
390 if (addr < sizeof(struct pt_regs))
391 tmp = get_stack_long(child, addr);
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700392 else if (addr >= offsetof(struct user, fpu) &&
393 addr < offsetof(struct user, u_fpvalid)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700394 if (!tsk_used_math(child)) {
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700395 if (addr == offsetof(struct user, fpu.fpscr))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700396 tmp = FPSCR_INIT;
397 else
398 tmp = 0;
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700399 } else {
400 unsigned long index;
Phil Edworthyc49b6ec2011-03-18 14:16:31 +0000401 ret = init_fpu(child);
402 if (ret)
403 break;
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700404 index = addr - offsetof(struct user, fpu);
Namhyung Kim9b05a692010-10-27 15:33:47 -0700405 tmp = ((unsigned long *)child->thread.xstate)
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700406 [index >> 2];
407 }
408 } else if (addr == offsetof(struct user, u_fpvalid))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700409 tmp = !!tsk_used_math(child);
Peter Griffinba0d4742009-05-08 15:50:54 +0100410 else if (addr == PT_TEXT_ADDR)
411 tmp = child->mm->start_code;
412 else if (addr == PT_DATA_ADDR)
413 tmp = child->mm->start_data;
414 else if (addr == PT_TEXT_END_ADDR)
415 tmp = child->mm->end_code;
416 else if (addr == PT_TEXT_LEN)
417 tmp = child->mm->end_code - child->mm->start_code;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700418 else
419 tmp = 0;
Paul Mundtfa439722008-09-04 18:53:58 +0900420 ret = put_user(tmp, datap);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700421 break;
422 }
423
Linus Torvalds1da177e2005-04-16 15:20:36 -0700424 case PTRACE_POKEUSR: /* write the word at location addr in the USER area */
425 ret = -EIO;
Stuart Menefy9432f962007-02-23 13:22:17 +0900426 if ((addr & 3) || addr < 0 ||
Linus Torvalds1da177e2005-04-16 15:20:36 -0700427 addr > sizeof(struct user) - 3)
428 break;
429
430 if (addr < sizeof(struct pt_regs))
431 ret = put_stack_long(child, addr, data);
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700432 else if (addr >= offsetof(struct user, fpu) &&
433 addr < offsetof(struct user, u_fpvalid)) {
434 unsigned long index;
Phil Edworthyc49b6ec2011-03-18 14:16:31 +0000435 ret = init_fpu(child);
436 if (ret)
437 break;
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700438 index = addr - offsetof(struct user, fpu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700439 set_stopped_child_used_math(child);
Namhyung Kim9b05a692010-10-27 15:33:47 -0700440 ((unsigned long *)child->thread.xstate)
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700441 [index >> 2] = data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700442 ret = 0;
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700443 } else if (addr == offsetof(struct user, u_fpvalid)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700444 conditional_stopped_child_used_math(data, child);
445 ret = 0;
446 }
447 break;
448
Paul Mundt934135c2008-09-12 19:52:36 +0900449 case PTRACE_GETREGS:
450 return copy_regset_to_user(child, &user_sh_native_view,
451 REGSET_GENERAL,
452 0, sizeof(struct pt_regs),
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700453 datap);
Paul Mundt934135c2008-09-12 19:52:36 +0900454 case PTRACE_SETREGS:
455 return copy_regset_from_user(child, &user_sh_native_view,
456 REGSET_GENERAL,
457 0, sizeof(struct pt_regs),
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700458 datap);
Paul Mundte7ab3cd2008-09-21 19:04:55 +0900459#ifdef CONFIG_SH_FPU
460 case PTRACE_GETFPREGS:
461 return copy_regset_to_user(child, &user_sh_native_view,
462 REGSET_FPU,
463 0, sizeof(struct user_fpu_struct),
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700464 datap);
Paul Mundte7ab3cd2008-09-21 19:04:55 +0900465 case PTRACE_SETFPREGS:
466 return copy_regset_from_user(child, &user_sh_native_view,
467 REGSET_FPU,
468 0, sizeof(struct user_fpu_struct),
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700469 datap);
Paul Mundte7ab3cd2008-09-21 19:04:55 +0900470#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700471#ifdef CONFIG_SH_DSP
Paul Mundt5dadb342008-09-12 22:42:10 +0900472 case PTRACE_GETDSPREGS:
473 return copy_regset_to_user(child, &user_sh_native_view,
474 REGSET_DSP,
475 0, sizeof(struct pt_dspregs),
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700476 datap);
Paul Mundt5dadb342008-09-12 22:42:10 +0900477 case PTRACE_SETDSPREGS:
478 return copy_regset_from_user(child, &user_sh_native_view,
479 REGSET_DSP,
480 0, sizeof(struct pt_dspregs),
Namhyung Kim9e1cb202010-10-27 15:34:03 -0700481 datap);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700482#endif
483 default:
484 ret = ptrace_request(child, request, addr, data);
485 break;
486 }
Christoph Hellwig481bed42005-11-07 00:59:47 -0800487
Linus Torvalds1da177e2005-04-16 15:20:36 -0700488 return ret;
489}
490
Paul Mundt9e5e2112008-07-30 20:05:35 +0900491static inline int audit_arch(void)
492{
493 int arch = EM_SH;
494
495#ifdef CONFIG_CPU_LITTLE_ENDIAN
496 arch |= __AUDIT_ARCH_LE;
497#endif
498
499 return arch;
500}
501
Paul Mundtab99c732008-07-30 19:55:30 +0900502asmlinkage long do_syscall_trace_enter(struct pt_regs *regs)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700503{
Paul Mundtab99c732008-07-30 19:55:30 +0900504 long ret = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700505
Paul Mundtc4637d42008-07-30 15:30:52 +0900506 secure_computing(regs->regs[0]);
507
Paul Mundtab99c732008-07-30 19:55:30 +0900508 if (test_thread_flag(TIF_SYSCALL_TRACE) &&
509 tracehook_report_syscall_entry(regs))
510 /*
511 * Tracing decided this syscall should not happen.
512 * We'll return a bogus call number to get an ENOSYS
513 * error, but leave the original number in regs->regs[0].
514 */
515 ret = -1L;
Yuichi Nakamura1322b9d2007-11-10 19:21:34 +0900516
Paul Mundta74f7e02009-09-16 14:30:34 +0900517 if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT)))
518 trace_sys_enter(regs, regs->regs[0]);
Matt Flemingc652d782009-07-06 20:16:33 +0900519
Paul Mundtab99c732008-07-30 19:55:30 +0900520 if (unlikely(current->audit_context))
Paul Mundt9e5e2112008-07-30 20:05:35 +0900521 audit_syscall_entry(audit_arch(), regs->regs[3],
Yuichi Nakamura1322b9d2007-11-10 19:21:34 +0900522 regs->regs[4], regs->regs[5],
523 regs->regs[6], regs->regs[7]);
524
Paul Mundtab99c732008-07-30 19:55:30 +0900525 return ret ?: regs->regs[0];
526}
527
528asmlinkage void do_syscall_trace_leave(struct pt_regs *regs)
529{
530 int step;
531
532 if (unlikely(current->audit_context))
533 audit_syscall_exit(AUDITSC_RESULT(regs->regs[0]),
534 regs->regs[0]);
535
Paul Mundta74f7e02009-09-16 14:30:34 +0900536 if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT)))
537 trace_sys_exit(regs, regs->regs[0]);
Matt Flemingc652d782009-07-06 20:16:33 +0900538
Paul Mundtab99c732008-07-30 19:55:30 +0900539 step = test_thread_flag(TIF_SINGLESTEP);
540 if (step || test_thread_flag(TIF_SYSCALL_TRACE))
541 tracehook_report_syscall_exit(regs, step);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700542}