1 // SPDX-License-Identifier: GPL-2.0-only
3 * Based on arch/arm/kernel/ptrace.c
6 * edited by Linus Torvalds
7 * ARM modifications Copyright (C) 2000 Russell King
8 * Copyright (C) 2012 ARM Ltd.
11 #include <linux/audit.h>
12 #include <linux/compat.h>
13 #include <linux/kernel.h>
14 #include <linux/sched/signal.h>
15 #include <linux/sched/task_stack.h>
17 #include <linux/nospec.h>
18 #include <linux/smp.h>
19 #include <linux/ptrace.h>
20 #include <linux/user.h>
21 #include <linux/seccomp.h>
22 #include <linux/security.h>
23 #include <linux/init.h>
24 #include <linux/signal.h>
25 #include <linux/string.h>
26 #include <linux/uaccess.h>
27 #include <linux/perf_event.h>
28 #include <linux/hw_breakpoint.h>
29 #include <linux/regset.h>
30 #include <linux/tracehook.h>
31 #include <linux/elf.h>
33 #include <asm/compat.h>
34 #include <asm/cpufeature.h>
35 #include <asm/debug-monitors.h>
36 #include <asm/fpsimd.h>
37 #include <asm/pgtable.h>
38 #include <asm/pointer_auth.h>
39 #include <asm/stacktrace.h>
40 #include <asm/syscall.h>
41 #include <asm/traps.h>
42 #include <asm/system_misc.h>
44 #define CREATE_TRACE_POINTS
45 #include <trace/events/syscalls.h>
47 struct pt_regs_offset
{
52 #define REG_OFFSET_NAME(r) {.name = #r, .offset = offsetof(struct pt_regs, r)}
53 #define REG_OFFSET_END {.name = NULL, .offset = 0}
54 #define GPR_OFFSET_NAME(r) \
55 {.name = "x" #r, .offset = offsetof(struct pt_regs, regs[r])}
57 static const struct pt_regs_offset regoffset_table
[] = {
89 {.name
= "lr", .offset
= offsetof(struct pt_regs
, regs
[30])},
92 REG_OFFSET_NAME(pstate
),
97 * regs_query_register_offset() - query register offset from its name
98 * @name: the name of a register
100 * regs_query_register_offset() returns the offset of a register in struct
101 * pt_regs from its name. If the name is invalid, this returns -EINVAL;
103 int regs_query_register_offset(const char *name
)
105 const struct pt_regs_offset
*roff
;
107 for (roff
= regoffset_table
; roff
->name
!= NULL
; roff
++)
108 if (!strcmp(roff
->name
, name
))
114 * regs_within_kernel_stack() - check the address in the stack
115 * @regs: pt_regs which contains kernel stack pointer.
116 * @addr: address which is checked.
118 * regs_within_kernel_stack() checks @addr is within the kernel stack page(s).
119 * If @addr is within the kernel stack, it returns true. If not, returns false.
121 static bool regs_within_kernel_stack(struct pt_regs
*regs
, unsigned long addr
)
123 return ((addr
& ~(THREAD_SIZE
- 1)) ==
124 (kernel_stack_pointer(regs
) & ~(THREAD_SIZE
- 1))) ||
125 on_irq_stack(addr
, NULL
);
129 * regs_get_kernel_stack_nth() - get Nth entry of the stack
130 * @regs: pt_regs which contains kernel stack pointer.
131 * @n: stack entry number.
133 * regs_get_kernel_stack_nth() returns @n th entry of the kernel stack which
134 * is specified by @regs. If the @n th entry is NOT in the kernel stack,
137 unsigned long regs_get_kernel_stack_nth(struct pt_regs
*regs
, unsigned int n
)
139 unsigned long *addr
= (unsigned long *)kernel_stack_pointer(regs
);
142 if (regs_within_kernel_stack(regs
, (unsigned long)addr
))
149 * TODO: does not yet catch signals sent when the child dies.
150 * in exit.c or in signal.c.
154 * Called by kernel/ptrace.c when detaching..
156 void ptrace_disable(struct task_struct
*child
)
159 * This would be better off in core code, but PTRACE_DETACH has
160 * grown its fair share of arch-specific worts and changing it
161 * is likely to cause regressions on obscure architectures.
163 user_disable_single_step(child
);
166 #ifdef CONFIG_HAVE_HW_BREAKPOINT
168 * Handle hitting a HW-breakpoint.
170 static void ptrace_hbptriggered(struct perf_event
*bp
,
171 struct perf_sample_data
*data
,
172 struct pt_regs
*regs
)
174 struct arch_hw_breakpoint
*bkpt
= counter_arch_bp(bp
);
175 const char *desc
= "Hardware breakpoint trap (ptrace)";
178 if (is_compat_task()) {
182 for (i
= 0; i
< ARM_MAX_BRP
; ++i
) {
183 if (current
->thread
.debug
.hbp_break
[i
] == bp
) {
184 si_errno
= (i
<< 1) + 1;
189 for (i
= 0; i
< ARM_MAX_WRP
; ++i
) {
190 if (current
->thread
.debug
.hbp_watch
[i
] == bp
) {
191 si_errno
= -((i
<< 1) + 1);
195 arm64_force_sig_ptrace_errno_trap(si_errno
,
196 (void __user
*)bkpt
->trigger
,
200 arm64_force_sig_fault(SIGTRAP
, TRAP_HWBKPT
,
201 (void __user
*)(bkpt
->trigger
),
206 * Unregister breakpoints from this task and reset the pointers in
209 void flush_ptrace_hw_breakpoint(struct task_struct
*tsk
)
212 struct thread_struct
*t
= &tsk
->thread
;
214 for (i
= 0; i
< ARM_MAX_BRP
; i
++) {
215 if (t
->debug
.hbp_break
[i
]) {
216 unregister_hw_breakpoint(t
->debug
.hbp_break
[i
]);
217 t
->debug
.hbp_break
[i
] = NULL
;
221 for (i
= 0; i
< ARM_MAX_WRP
; i
++) {
222 if (t
->debug
.hbp_watch
[i
]) {
223 unregister_hw_breakpoint(t
->debug
.hbp_watch
[i
]);
224 t
->debug
.hbp_watch
[i
] = NULL
;
229 void ptrace_hw_copy_thread(struct task_struct
*tsk
)
231 memset(&tsk
->thread
.debug
, 0, sizeof(struct debug_info
));
234 static struct perf_event
*ptrace_hbp_get_event(unsigned int note_type
,
235 struct task_struct
*tsk
,
238 struct perf_event
*bp
= ERR_PTR(-EINVAL
);
241 case NT_ARM_HW_BREAK
:
242 if (idx
>= ARM_MAX_BRP
)
244 idx
= array_index_nospec(idx
, ARM_MAX_BRP
);
245 bp
= tsk
->thread
.debug
.hbp_break
[idx
];
247 case NT_ARM_HW_WATCH
:
248 if (idx
>= ARM_MAX_WRP
)
250 idx
= array_index_nospec(idx
, ARM_MAX_WRP
);
251 bp
= tsk
->thread
.debug
.hbp_watch
[idx
];
259 static int ptrace_hbp_set_event(unsigned int note_type
,
260 struct task_struct
*tsk
,
262 struct perf_event
*bp
)
267 case NT_ARM_HW_BREAK
:
268 if (idx
>= ARM_MAX_BRP
)
270 idx
= array_index_nospec(idx
, ARM_MAX_BRP
);
271 tsk
->thread
.debug
.hbp_break
[idx
] = bp
;
274 case NT_ARM_HW_WATCH
:
275 if (idx
>= ARM_MAX_WRP
)
277 idx
= array_index_nospec(idx
, ARM_MAX_WRP
);
278 tsk
->thread
.debug
.hbp_watch
[idx
] = bp
;
287 static struct perf_event
*ptrace_hbp_create(unsigned int note_type
,
288 struct task_struct
*tsk
,
291 struct perf_event
*bp
;
292 struct perf_event_attr attr
;
296 case NT_ARM_HW_BREAK
:
297 type
= HW_BREAKPOINT_X
;
299 case NT_ARM_HW_WATCH
:
300 type
= HW_BREAKPOINT_RW
;
303 return ERR_PTR(-EINVAL
);
306 ptrace_breakpoint_init(&attr
);
309 * Initialise fields to sane defaults
310 * (i.e. values that will pass validation).
313 attr
.bp_len
= HW_BREAKPOINT_LEN_4
;
317 bp
= register_user_hw_breakpoint(&attr
, ptrace_hbptriggered
, NULL
, tsk
);
321 err
= ptrace_hbp_set_event(note_type
, tsk
, idx
, bp
);
328 static int ptrace_hbp_fill_attr_ctrl(unsigned int note_type
,
329 struct arch_hw_breakpoint_ctrl ctrl
,
330 struct perf_event_attr
*attr
)
332 int err
, len
, type
, offset
, disabled
= !ctrl
.enabled
;
334 attr
->disabled
= disabled
;
338 err
= arch_bp_generic_fields(ctrl
, &len
, &type
, &offset
);
343 case NT_ARM_HW_BREAK
:
344 if ((type
& HW_BREAKPOINT_X
) != type
)
347 case NT_ARM_HW_WATCH
:
348 if ((type
& HW_BREAKPOINT_RW
) != type
)
356 attr
->bp_type
= type
;
357 attr
->bp_addr
+= offset
;
362 static int ptrace_hbp_get_resource_info(unsigned int note_type
, u32
*info
)
368 case NT_ARM_HW_BREAK
:
369 num
= hw_breakpoint_slots(TYPE_INST
);
371 case NT_ARM_HW_WATCH
:
372 num
= hw_breakpoint_slots(TYPE_DATA
);
378 reg
|= debug_monitors_arch();
386 static int ptrace_hbp_get_ctrl(unsigned int note_type
,
387 struct task_struct
*tsk
,
391 struct perf_event
*bp
= ptrace_hbp_get_event(note_type
, tsk
, idx
);
396 *ctrl
= bp
? encode_ctrl_reg(counter_arch_bp(bp
)->ctrl
) : 0;
400 static int ptrace_hbp_get_addr(unsigned int note_type
,
401 struct task_struct
*tsk
,
405 struct perf_event
*bp
= ptrace_hbp_get_event(note_type
, tsk
, idx
);
410 *addr
= bp
? counter_arch_bp(bp
)->address
: 0;
414 static struct perf_event
*ptrace_hbp_get_initialised_bp(unsigned int note_type
,
415 struct task_struct
*tsk
,
418 struct perf_event
*bp
= ptrace_hbp_get_event(note_type
, tsk
, idx
);
421 bp
= ptrace_hbp_create(note_type
, tsk
, idx
);
426 static int ptrace_hbp_set_ctrl(unsigned int note_type
,
427 struct task_struct
*tsk
,
432 struct perf_event
*bp
;
433 struct perf_event_attr attr
;
434 struct arch_hw_breakpoint_ctrl ctrl
;
436 bp
= ptrace_hbp_get_initialised_bp(note_type
, tsk
, idx
);
443 decode_ctrl_reg(uctrl
, &ctrl
);
444 err
= ptrace_hbp_fill_attr_ctrl(note_type
, ctrl
, &attr
);
448 return modify_user_hw_breakpoint(bp
, &attr
);
451 static int ptrace_hbp_set_addr(unsigned int note_type
,
452 struct task_struct
*tsk
,
457 struct perf_event
*bp
;
458 struct perf_event_attr attr
;
460 bp
= ptrace_hbp_get_initialised_bp(note_type
, tsk
, idx
);
468 err
= modify_user_hw_breakpoint(bp
, &attr
);
472 #define PTRACE_HBP_ADDR_SZ sizeof(u64)
473 #define PTRACE_HBP_CTRL_SZ sizeof(u32)
474 #define PTRACE_HBP_PAD_SZ sizeof(u32)
476 static int hw_break_get(struct task_struct
*target
,
477 const struct user_regset
*regset
,
478 unsigned int pos
, unsigned int count
,
479 void *kbuf
, void __user
*ubuf
)
481 unsigned int note_type
= regset
->core_note_type
;
482 int ret
, idx
= 0, offset
, limit
;
487 ret
= ptrace_hbp_get_resource_info(note_type
, &info
);
491 ret
= user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
, &info
, 0,
497 offset
= offsetof(struct user_hwdebug_state
, pad
);
498 ret
= user_regset_copyout_zero(&pos
, &count
, &kbuf
, &ubuf
, offset
,
499 offset
+ PTRACE_HBP_PAD_SZ
);
503 /* (address, ctrl) registers */
504 offset
= offsetof(struct user_hwdebug_state
, dbg_regs
);
505 limit
= regset
->n
* regset
->size
;
506 while (count
&& offset
< limit
) {
507 ret
= ptrace_hbp_get_addr(note_type
, target
, idx
, &addr
);
510 ret
= user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
, &addr
,
511 offset
, offset
+ PTRACE_HBP_ADDR_SZ
);
514 offset
+= PTRACE_HBP_ADDR_SZ
;
516 ret
= ptrace_hbp_get_ctrl(note_type
, target
, idx
, &ctrl
);
519 ret
= user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
, &ctrl
,
520 offset
, offset
+ PTRACE_HBP_CTRL_SZ
);
523 offset
+= PTRACE_HBP_CTRL_SZ
;
525 ret
= user_regset_copyout_zero(&pos
, &count
, &kbuf
, &ubuf
,
527 offset
+ PTRACE_HBP_PAD_SZ
);
530 offset
+= PTRACE_HBP_PAD_SZ
;
537 static int hw_break_set(struct task_struct
*target
,
538 const struct user_regset
*regset
,
539 unsigned int pos
, unsigned int count
,
540 const void *kbuf
, const void __user
*ubuf
)
542 unsigned int note_type
= regset
->core_note_type
;
543 int ret
, idx
= 0, offset
, limit
;
547 /* Resource info and pad */
548 offset
= offsetof(struct user_hwdebug_state
, dbg_regs
);
549 ret
= user_regset_copyin_ignore(&pos
, &count
, &kbuf
, &ubuf
, 0, offset
);
553 /* (address, ctrl) registers */
554 limit
= regset
->n
* regset
->size
;
555 while (count
&& offset
< limit
) {
556 if (count
< PTRACE_HBP_ADDR_SZ
)
558 ret
= user_regset_copyin(&pos
, &count
, &kbuf
, &ubuf
, &addr
,
559 offset
, offset
+ PTRACE_HBP_ADDR_SZ
);
562 ret
= ptrace_hbp_set_addr(note_type
, target
, idx
, addr
);
565 offset
+= PTRACE_HBP_ADDR_SZ
;
569 ret
= user_regset_copyin(&pos
, &count
, &kbuf
, &ubuf
, &ctrl
,
570 offset
, offset
+ PTRACE_HBP_CTRL_SZ
);
573 ret
= ptrace_hbp_set_ctrl(note_type
, target
, idx
, ctrl
);
576 offset
+= PTRACE_HBP_CTRL_SZ
;
578 ret
= user_regset_copyin_ignore(&pos
, &count
, &kbuf
, &ubuf
,
580 offset
+ PTRACE_HBP_PAD_SZ
);
583 offset
+= PTRACE_HBP_PAD_SZ
;
589 #endif /* CONFIG_HAVE_HW_BREAKPOINT */
591 static int gpr_get(struct task_struct
*target
,
592 const struct user_regset
*regset
,
593 unsigned int pos
, unsigned int count
,
594 void *kbuf
, void __user
*ubuf
)
596 struct user_pt_regs
*uregs
= &task_pt_regs(target
)->user_regs
;
597 return user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
, uregs
, 0, -1);
600 static int gpr_set(struct task_struct
*target
, const struct user_regset
*regset
,
601 unsigned int pos
, unsigned int count
,
602 const void *kbuf
, const void __user
*ubuf
)
605 struct user_pt_regs newregs
= task_pt_regs(target
)->user_regs
;
607 ret
= user_regset_copyin(&pos
, &count
, &kbuf
, &ubuf
, &newregs
, 0, -1);
611 if (!valid_user_regs(&newregs
, target
))
614 task_pt_regs(target
)->user_regs
= newregs
;
619 * TODO: update fp accessors for lazy context switching (sync/flush hwstate)
621 static int __fpr_get(struct task_struct
*target
,
622 const struct user_regset
*regset
,
623 unsigned int pos
, unsigned int count
,
624 void *kbuf
, void __user
*ubuf
, unsigned int start_pos
)
626 struct user_fpsimd_state
*uregs
;
628 sve_sync_to_fpsimd(target
);
630 uregs
= &target
->thread
.uw
.fpsimd_state
;
632 return user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
, uregs
,
633 start_pos
, start_pos
+ sizeof(*uregs
));
636 static int fpr_get(struct task_struct
*target
, const struct user_regset
*regset
,
637 unsigned int pos
, unsigned int count
,
638 void *kbuf
, void __user
*ubuf
)
640 if (target
== current
)
641 fpsimd_preserve_current_state();
643 return __fpr_get(target
, regset
, pos
, count
, kbuf
, ubuf
, 0);
646 static int __fpr_set(struct task_struct
*target
,
647 const struct user_regset
*regset
,
648 unsigned int pos
, unsigned int count
,
649 const void *kbuf
, const void __user
*ubuf
,
650 unsigned int start_pos
)
653 struct user_fpsimd_state newstate
;
656 * Ensure target->thread.uw.fpsimd_state is up to date, so that a
657 * short copyin can't resurrect stale data.
659 sve_sync_to_fpsimd(target
);
661 newstate
= target
->thread
.uw
.fpsimd_state
;
663 ret
= user_regset_copyin(&pos
, &count
, &kbuf
, &ubuf
, &newstate
,
664 start_pos
, start_pos
+ sizeof(newstate
));
668 target
->thread
.uw
.fpsimd_state
= newstate
;
673 static int fpr_set(struct task_struct
*target
, const struct user_regset
*regset
,
674 unsigned int pos
, unsigned int count
,
675 const void *kbuf
, const void __user
*ubuf
)
679 ret
= __fpr_set(target
, regset
, pos
, count
, kbuf
, ubuf
, 0);
683 sve_sync_from_fpsimd_zeropad(target
);
684 fpsimd_flush_task_state(target
);
689 static int tls_get(struct task_struct
*target
, const struct user_regset
*regset
,
690 unsigned int pos
, unsigned int count
,
691 void *kbuf
, void __user
*ubuf
)
693 unsigned long *tls
= &target
->thread
.uw
.tp_value
;
695 if (target
== current
)
696 tls_preserve_current_state();
698 return user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
, tls
, 0, -1);
701 static int tls_set(struct task_struct
*target
, const struct user_regset
*regset
,
702 unsigned int pos
, unsigned int count
,
703 const void *kbuf
, const void __user
*ubuf
)
706 unsigned long tls
= target
->thread
.uw
.tp_value
;
708 ret
= user_regset_copyin(&pos
, &count
, &kbuf
, &ubuf
, &tls
, 0, -1);
712 target
->thread
.uw
.tp_value
= tls
;
716 static int system_call_get(struct task_struct
*target
,
717 const struct user_regset
*regset
,
718 unsigned int pos
, unsigned int count
,
719 void *kbuf
, void __user
*ubuf
)
721 int syscallno
= task_pt_regs(target
)->syscallno
;
723 return user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
,
727 static int system_call_set(struct task_struct
*target
,
728 const struct user_regset
*regset
,
729 unsigned int pos
, unsigned int count
,
730 const void *kbuf
, const void __user
*ubuf
)
732 int syscallno
= task_pt_regs(target
)->syscallno
;
735 ret
= user_regset_copyin(&pos
, &count
, &kbuf
, &ubuf
, &syscallno
, 0, -1);
739 task_pt_regs(target
)->syscallno
= syscallno
;
743 #ifdef CONFIG_ARM64_SVE
745 static void sve_init_header_from_task(struct user_sve_header
*header
,
746 struct task_struct
*target
)
750 memset(header
, 0, sizeof(*header
));
752 header
->flags
= test_tsk_thread_flag(target
, TIF_SVE
) ?
753 SVE_PT_REGS_SVE
: SVE_PT_REGS_FPSIMD
;
754 if (test_tsk_thread_flag(target
, TIF_SVE_VL_INHERIT
))
755 header
->flags
|= SVE_PT_VL_INHERIT
;
757 header
->vl
= target
->thread
.sve_vl
;
758 vq
= sve_vq_from_vl(header
->vl
);
760 header
->max_vl
= sve_max_vl
;
761 header
->size
= SVE_PT_SIZE(vq
, header
->flags
);
762 header
->max_size
= SVE_PT_SIZE(sve_vq_from_vl(header
->max_vl
),
766 static unsigned int sve_size_from_header(struct user_sve_header
const *header
)
768 return ALIGN(header
->size
, SVE_VQ_BYTES
);
771 static unsigned int sve_get_size(struct task_struct
*target
,
772 const struct user_regset
*regset
)
774 struct user_sve_header header
;
776 if (!system_supports_sve())
779 sve_init_header_from_task(&header
, target
);
780 return sve_size_from_header(&header
);
783 static int sve_get(struct task_struct
*target
,
784 const struct user_regset
*regset
,
785 unsigned int pos
, unsigned int count
,
786 void *kbuf
, void __user
*ubuf
)
789 struct user_sve_header header
;
791 unsigned long start
, end
;
793 if (!system_supports_sve())
797 sve_init_header_from_task(&header
, target
);
798 vq
= sve_vq_from_vl(header
.vl
);
800 ret
= user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
, &header
,
805 if (target
== current
)
806 fpsimd_preserve_current_state();
808 /* Registers: FPSIMD-only case */
810 BUILD_BUG_ON(SVE_PT_FPSIMD_OFFSET
!= sizeof(header
));
811 if ((header
.flags
& SVE_PT_REGS_MASK
) == SVE_PT_REGS_FPSIMD
)
812 return __fpr_get(target
, regset
, pos
, count
, kbuf
, ubuf
,
813 SVE_PT_FPSIMD_OFFSET
);
815 /* Otherwise: full SVE case */
817 BUILD_BUG_ON(SVE_PT_SVE_OFFSET
!= sizeof(header
));
818 start
= SVE_PT_SVE_OFFSET
;
819 end
= SVE_PT_SVE_FFR_OFFSET(vq
) + SVE_PT_SVE_FFR_SIZE(vq
);
820 ret
= user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
,
821 target
->thread
.sve_state
,
827 end
= SVE_PT_SVE_FPSR_OFFSET(vq
);
828 ret
= user_regset_copyout_zero(&pos
, &count
, &kbuf
, &ubuf
,
834 * Copy fpsr, and fpcr which must follow contiguously in
835 * struct fpsimd_state:
838 end
= SVE_PT_SVE_FPCR_OFFSET(vq
) + SVE_PT_SVE_FPCR_SIZE
;
839 ret
= user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
,
840 &target
->thread
.uw
.fpsimd_state
.fpsr
,
846 end
= sve_size_from_header(&header
);
847 return user_regset_copyout_zero(&pos
, &count
, &kbuf
, &ubuf
,
851 static int sve_set(struct task_struct
*target
,
852 const struct user_regset
*regset
,
853 unsigned int pos
, unsigned int count
,
854 const void *kbuf
, const void __user
*ubuf
)
857 struct user_sve_header header
;
859 unsigned long start
, end
;
861 if (!system_supports_sve())
865 if (count
< sizeof(header
))
867 ret
= user_regset_copyin(&pos
, &count
, &kbuf
, &ubuf
, &header
,
873 * Apart from PT_SVE_REGS_MASK, all PT_SVE_* flags are consumed by
874 * sve_set_vector_length(), which will also validate them for us:
876 ret
= sve_set_vector_length(target
, header
.vl
,
877 ((unsigned long)header
.flags
& ~SVE_PT_REGS_MASK
) << 16);
881 /* Actual VL set may be less than the user asked for: */
882 vq
= sve_vq_from_vl(target
->thread
.sve_vl
);
884 /* Registers: FPSIMD-only case */
886 BUILD_BUG_ON(SVE_PT_FPSIMD_OFFSET
!= sizeof(header
));
887 if ((header
.flags
& SVE_PT_REGS_MASK
) == SVE_PT_REGS_FPSIMD
) {
888 ret
= __fpr_set(target
, regset
, pos
, count
, kbuf
, ubuf
,
889 SVE_PT_FPSIMD_OFFSET
);
890 clear_tsk_thread_flag(target
, TIF_SVE
);
894 /* Otherwise: full SVE case */
897 * If setting a different VL from the requested VL and there is
898 * register data, the data layout will be wrong: don't even
899 * try to set the registers in this case.
901 if (count
&& vq
!= sve_vq_from_vl(header
.vl
)) {
909 * Ensure target->thread.sve_state is up to date with target's
910 * FPSIMD regs, so that a short copyin leaves trailing registers
913 fpsimd_sync_to_sve(target
);
914 set_tsk_thread_flag(target
, TIF_SVE
);
916 BUILD_BUG_ON(SVE_PT_SVE_OFFSET
!= sizeof(header
));
917 start
= SVE_PT_SVE_OFFSET
;
918 end
= SVE_PT_SVE_FFR_OFFSET(vq
) + SVE_PT_SVE_FFR_SIZE(vq
);
919 ret
= user_regset_copyin(&pos
, &count
, &kbuf
, &ubuf
,
920 target
->thread
.sve_state
,
926 end
= SVE_PT_SVE_FPSR_OFFSET(vq
);
927 ret
= user_regset_copyin_ignore(&pos
, &count
, &kbuf
, &ubuf
,
933 * Copy fpsr, and fpcr which must follow contiguously in
934 * struct fpsimd_state:
937 end
= SVE_PT_SVE_FPCR_OFFSET(vq
) + SVE_PT_SVE_FPCR_SIZE
;
938 ret
= user_regset_copyin(&pos
, &count
, &kbuf
, &ubuf
,
939 &target
->thread
.uw
.fpsimd_state
.fpsr
,
943 fpsimd_flush_task_state(target
);
947 #endif /* CONFIG_ARM64_SVE */
949 #ifdef CONFIG_ARM64_PTR_AUTH
950 static int pac_mask_get(struct task_struct
*target
,
951 const struct user_regset
*regset
,
952 unsigned int pos
, unsigned int count
,
953 void *kbuf
, void __user
*ubuf
)
956 * The PAC bits can differ across data and instruction pointers
957 * depending on TCR_EL1.TBID*, which we may make use of in future, so
958 * we expose separate masks.
960 unsigned long mask
= ptrauth_user_pac_mask();
961 struct user_pac_mask uregs
= {
966 if (!system_supports_address_auth())
969 return user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
, &uregs
, 0, -1);
972 #ifdef CONFIG_CHECKPOINT_RESTORE
973 static __uint128_t
pac_key_to_user(const struct ptrauth_key
*key
)
975 return (__uint128_t
)key
->hi
<< 64 | key
->lo
;
978 static struct ptrauth_key
pac_key_from_user(__uint128_t ukey
)
980 struct ptrauth_key key
= {
981 .lo
= (unsigned long)ukey
,
982 .hi
= (unsigned long)(ukey
>> 64),
988 static void pac_address_keys_to_user(struct user_pac_address_keys
*ukeys
,
989 const struct ptrauth_keys
*keys
)
991 ukeys
->apiakey
= pac_key_to_user(&keys
->apia
);
992 ukeys
->apibkey
= pac_key_to_user(&keys
->apib
);
993 ukeys
->apdakey
= pac_key_to_user(&keys
->apda
);
994 ukeys
->apdbkey
= pac_key_to_user(&keys
->apdb
);
997 static void pac_address_keys_from_user(struct ptrauth_keys
*keys
,
998 const struct user_pac_address_keys
*ukeys
)
1000 keys
->apia
= pac_key_from_user(ukeys
->apiakey
);
1001 keys
->apib
= pac_key_from_user(ukeys
->apibkey
);
1002 keys
->apda
= pac_key_from_user(ukeys
->apdakey
);
1003 keys
->apdb
= pac_key_from_user(ukeys
->apdbkey
);
1006 static int pac_address_keys_get(struct task_struct
*target
,
1007 const struct user_regset
*regset
,
1008 unsigned int pos
, unsigned int count
,
1009 void *kbuf
, void __user
*ubuf
)
1011 struct ptrauth_keys
*keys
= &target
->thread
.keys_user
;
1012 struct user_pac_address_keys user_keys
;
1014 if (!system_supports_address_auth())
1017 pac_address_keys_to_user(&user_keys
, keys
);
1019 return user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
,
1023 static int pac_address_keys_set(struct task_struct
*target
,
1024 const struct user_regset
*regset
,
1025 unsigned int pos
, unsigned int count
,
1026 const void *kbuf
, const void __user
*ubuf
)
1028 struct ptrauth_keys
*keys
= &target
->thread
.keys_user
;
1029 struct user_pac_address_keys user_keys
;
1032 if (!system_supports_address_auth())
1035 pac_address_keys_to_user(&user_keys
, keys
);
1036 ret
= user_regset_copyin(&pos
, &count
, &kbuf
, &ubuf
,
1040 pac_address_keys_from_user(keys
, &user_keys
);
1045 static void pac_generic_keys_to_user(struct user_pac_generic_keys
*ukeys
,
1046 const struct ptrauth_keys
*keys
)
1048 ukeys
->apgakey
= pac_key_to_user(&keys
->apga
);
1051 static void pac_generic_keys_from_user(struct ptrauth_keys
*keys
,
1052 const struct user_pac_generic_keys
*ukeys
)
1054 keys
->apga
= pac_key_from_user(ukeys
->apgakey
);
1057 static int pac_generic_keys_get(struct task_struct
*target
,
1058 const struct user_regset
*regset
,
1059 unsigned int pos
, unsigned int count
,
1060 void *kbuf
, void __user
*ubuf
)
1062 struct ptrauth_keys
*keys
= &target
->thread
.keys_user
;
1063 struct user_pac_generic_keys user_keys
;
1065 if (!system_supports_generic_auth())
1068 pac_generic_keys_to_user(&user_keys
, keys
);
1070 return user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
,
1074 static int pac_generic_keys_set(struct task_struct
*target
,
1075 const struct user_regset
*regset
,
1076 unsigned int pos
, unsigned int count
,
1077 const void *kbuf
, const void __user
*ubuf
)
1079 struct ptrauth_keys
*keys
= &target
->thread
.keys_user
;
1080 struct user_pac_generic_keys user_keys
;
1083 if (!system_supports_generic_auth())
1086 pac_generic_keys_to_user(&user_keys
, keys
);
1087 ret
= user_regset_copyin(&pos
, &count
, &kbuf
, &ubuf
,
1091 pac_generic_keys_from_user(keys
, &user_keys
);
1095 #endif /* CONFIG_CHECKPOINT_RESTORE */
1096 #endif /* CONFIG_ARM64_PTR_AUTH */
1098 enum aarch64_regset
{
1102 #ifdef CONFIG_HAVE_HW_BREAKPOINT
1107 #ifdef CONFIG_ARM64_SVE
1110 #ifdef CONFIG_ARM64_PTR_AUTH
1112 #ifdef CONFIG_CHECKPOINT_RESTORE
1119 static const struct user_regset aarch64_regsets
[] = {
1121 .core_note_type
= NT_PRSTATUS
,
1122 .n
= sizeof(struct user_pt_regs
) / sizeof(u64
),
1123 .size
= sizeof(u64
),
1124 .align
= sizeof(u64
),
1129 .core_note_type
= NT_PRFPREG
,
1130 .n
= sizeof(struct user_fpsimd_state
) / sizeof(u32
),
1132 * We pretend we have 32-bit registers because the fpsr and
1133 * fpcr are 32-bits wide.
1135 .size
= sizeof(u32
),
1136 .align
= sizeof(u32
),
1141 .core_note_type
= NT_ARM_TLS
,
1143 .size
= sizeof(void *),
1144 .align
= sizeof(void *),
1148 #ifdef CONFIG_HAVE_HW_BREAKPOINT
1149 [REGSET_HW_BREAK
] = {
1150 .core_note_type
= NT_ARM_HW_BREAK
,
1151 .n
= sizeof(struct user_hwdebug_state
) / sizeof(u32
),
1152 .size
= sizeof(u32
),
1153 .align
= sizeof(u32
),
1154 .get
= hw_break_get
,
1155 .set
= hw_break_set
,
1157 [REGSET_HW_WATCH
] = {
1158 .core_note_type
= NT_ARM_HW_WATCH
,
1159 .n
= sizeof(struct user_hwdebug_state
) / sizeof(u32
),
1160 .size
= sizeof(u32
),
1161 .align
= sizeof(u32
),
1162 .get
= hw_break_get
,
1163 .set
= hw_break_set
,
1166 [REGSET_SYSTEM_CALL
] = {
1167 .core_note_type
= NT_ARM_SYSTEM_CALL
,
1169 .size
= sizeof(int),
1170 .align
= sizeof(int),
1171 .get
= system_call_get
,
1172 .set
= system_call_set
,
1174 #ifdef CONFIG_ARM64_SVE
1175 [REGSET_SVE
] = { /* Scalable Vector Extension */
1176 .core_note_type
= NT_ARM_SVE
,
1177 .n
= DIV_ROUND_UP(SVE_PT_SIZE(SVE_VQ_MAX
, SVE_PT_REGS_SVE
),
1179 .size
= SVE_VQ_BYTES
,
1180 .align
= SVE_VQ_BYTES
,
1183 .get_size
= sve_get_size
,
1186 #ifdef CONFIG_ARM64_PTR_AUTH
1187 [REGSET_PAC_MASK
] = {
1188 .core_note_type
= NT_ARM_PAC_MASK
,
1189 .n
= sizeof(struct user_pac_mask
) / sizeof(u64
),
1190 .size
= sizeof(u64
),
1191 .align
= sizeof(u64
),
1192 .get
= pac_mask_get
,
1193 /* this cannot be set dynamically */
1195 #ifdef CONFIG_CHECKPOINT_RESTORE
1196 [REGSET_PACA_KEYS
] = {
1197 .core_note_type
= NT_ARM_PACA_KEYS
,
1198 .n
= sizeof(struct user_pac_address_keys
) / sizeof(__uint128_t
),
1199 .size
= sizeof(__uint128_t
),
1200 .align
= sizeof(__uint128_t
),
1201 .get
= pac_address_keys_get
,
1202 .set
= pac_address_keys_set
,
1204 [REGSET_PACG_KEYS
] = {
1205 .core_note_type
= NT_ARM_PACG_KEYS
,
1206 .n
= sizeof(struct user_pac_generic_keys
) / sizeof(__uint128_t
),
1207 .size
= sizeof(__uint128_t
),
1208 .align
= sizeof(__uint128_t
),
1209 .get
= pac_generic_keys_get
,
1210 .set
= pac_generic_keys_set
,
1216 static const struct user_regset_view user_aarch64_view
= {
1217 .name
= "aarch64", .e_machine
= EM_AARCH64
,
1218 .regsets
= aarch64_regsets
, .n
= ARRAY_SIZE(aarch64_regsets
)
1221 #ifdef CONFIG_COMPAT
1222 enum compat_regset
{
1227 static int compat_gpr_get(struct task_struct
*target
,
1228 const struct user_regset
*regset
,
1229 unsigned int pos
, unsigned int count
,
1230 void *kbuf
, void __user
*ubuf
)
1233 unsigned int i
, start
, num_regs
;
1235 /* Calculate the number of AArch32 registers contained in count */
1236 num_regs
= count
/ regset
->size
;
1238 /* Convert pos into an register number */
1239 start
= pos
/ regset
->size
;
1241 if (start
+ num_regs
> regset
->n
)
1244 for (i
= 0; i
< num_regs
; ++i
) {
1245 unsigned int idx
= start
+ i
;
1250 reg
= task_pt_regs(target
)->pc
;
1253 reg
= task_pt_regs(target
)->pstate
;
1254 reg
= pstate_to_compat_psr(reg
);
1257 reg
= task_pt_regs(target
)->orig_x0
;
1260 reg
= task_pt_regs(target
)->regs
[idx
];
1264 memcpy(kbuf
, ®
, sizeof(reg
));
1265 kbuf
+= sizeof(reg
);
1267 ret
= copy_to_user(ubuf
, ®
, sizeof(reg
));
1273 ubuf
+= sizeof(reg
);
1280 static int compat_gpr_set(struct task_struct
*target
,
1281 const struct user_regset
*regset
,
1282 unsigned int pos
, unsigned int count
,
1283 const void *kbuf
, const void __user
*ubuf
)
1285 struct pt_regs newregs
;
1287 unsigned int i
, start
, num_regs
;
1289 /* Calculate the number of AArch32 registers contained in count */
1290 num_regs
= count
/ regset
->size
;
1292 /* Convert pos into an register number */
1293 start
= pos
/ regset
->size
;
1295 if (start
+ num_regs
> regset
->n
)
1298 newregs
= *task_pt_regs(target
);
1300 for (i
= 0; i
< num_regs
; ++i
) {
1301 unsigned int idx
= start
+ i
;
1305 memcpy(®
, kbuf
, sizeof(reg
));
1306 kbuf
+= sizeof(reg
);
1308 ret
= copy_from_user(®
, ubuf
, sizeof(reg
));
1314 ubuf
+= sizeof(reg
);
1322 reg
= compat_psr_to_pstate(reg
);
1323 newregs
.pstate
= reg
;
1326 newregs
.orig_x0
= reg
;
1329 newregs
.regs
[idx
] = reg
;
1334 if (valid_user_regs(&newregs
.user_regs
, target
))
1335 *task_pt_regs(target
) = newregs
;
1342 static int compat_vfp_get(struct task_struct
*target
,
1343 const struct user_regset
*regset
,
1344 unsigned int pos
, unsigned int count
,
1345 void *kbuf
, void __user
*ubuf
)
1347 struct user_fpsimd_state
*uregs
;
1348 compat_ulong_t fpscr
;
1349 int ret
, vregs_end_pos
;
1351 uregs
= &target
->thread
.uw
.fpsimd_state
;
1353 if (target
== current
)
1354 fpsimd_preserve_current_state();
1357 * The VFP registers are packed into the fpsimd_state, so they all sit
1358 * nicely together for us. We just need to create the fpscr separately.
1360 vregs_end_pos
= VFP_STATE_SIZE
- sizeof(compat_ulong_t
);
1361 ret
= user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
, uregs
,
1364 if (count
&& !ret
) {
1365 fpscr
= (uregs
->fpsr
& VFP_FPSCR_STAT_MASK
) |
1366 (uregs
->fpcr
& VFP_FPSCR_CTRL_MASK
);
1368 ret
= user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
, &fpscr
,
1369 vregs_end_pos
, VFP_STATE_SIZE
);
1375 static int compat_vfp_set(struct task_struct
*target
,
1376 const struct user_regset
*regset
,
1377 unsigned int pos
, unsigned int count
,
1378 const void *kbuf
, const void __user
*ubuf
)
1380 struct user_fpsimd_state
*uregs
;
1381 compat_ulong_t fpscr
;
1382 int ret
, vregs_end_pos
;
1384 uregs
= &target
->thread
.uw
.fpsimd_state
;
1386 vregs_end_pos
= VFP_STATE_SIZE
- sizeof(compat_ulong_t
);
1387 ret
= user_regset_copyin(&pos
, &count
, &kbuf
, &ubuf
, uregs
, 0,
1390 if (count
&& !ret
) {
1391 ret
= user_regset_copyin(&pos
, &count
, &kbuf
, &ubuf
, &fpscr
,
1392 vregs_end_pos
, VFP_STATE_SIZE
);
1394 uregs
->fpsr
= fpscr
& VFP_FPSCR_STAT_MASK
;
1395 uregs
->fpcr
= fpscr
& VFP_FPSCR_CTRL_MASK
;
1399 fpsimd_flush_task_state(target
);
1403 static int compat_tls_get(struct task_struct
*target
,
1404 const struct user_regset
*regset
, unsigned int pos
,
1405 unsigned int count
, void *kbuf
, void __user
*ubuf
)
1407 compat_ulong_t tls
= (compat_ulong_t
)target
->thread
.uw
.tp_value
;
1408 return user_regset_copyout(&pos
, &count
, &kbuf
, &ubuf
, &tls
, 0, -1);
1411 static int compat_tls_set(struct task_struct
*target
,
1412 const struct user_regset
*regset
, unsigned int pos
,
1413 unsigned int count
, const void *kbuf
,
1414 const void __user
*ubuf
)
1417 compat_ulong_t tls
= target
->thread
.uw
.tp_value
;
1419 ret
= user_regset_copyin(&pos
, &count
, &kbuf
, &ubuf
, &tls
, 0, -1);
1423 target
->thread
.uw
.tp_value
= tls
;
1427 static const struct user_regset aarch32_regsets
[] = {
1428 [REGSET_COMPAT_GPR
] = {
1429 .core_note_type
= NT_PRSTATUS
,
1430 .n
= COMPAT_ELF_NGREG
,
1431 .size
= sizeof(compat_elf_greg_t
),
1432 .align
= sizeof(compat_elf_greg_t
),
1433 .get
= compat_gpr_get
,
1434 .set
= compat_gpr_set
1436 [REGSET_COMPAT_VFP
] = {
1437 .core_note_type
= NT_ARM_VFP
,
1438 .n
= VFP_STATE_SIZE
/ sizeof(compat_ulong_t
),
1439 .size
= sizeof(compat_ulong_t
),
1440 .align
= sizeof(compat_ulong_t
),
1441 .get
= compat_vfp_get
,
1442 .set
= compat_vfp_set
1446 static const struct user_regset_view user_aarch32_view
= {
1447 .name
= "aarch32", .e_machine
= EM_ARM
,
1448 .regsets
= aarch32_regsets
, .n
= ARRAY_SIZE(aarch32_regsets
)
1451 static const struct user_regset aarch32_ptrace_regsets
[] = {
1453 .core_note_type
= NT_PRSTATUS
,
1454 .n
= COMPAT_ELF_NGREG
,
1455 .size
= sizeof(compat_elf_greg_t
),
1456 .align
= sizeof(compat_elf_greg_t
),
1457 .get
= compat_gpr_get
,
1458 .set
= compat_gpr_set
1461 .core_note_type
= NT_ARM_VFP
,
1462 .n
= VFP_STATE_SIZE
/ sizeof(compat_ulong_t
),
1463 .size
= sizeof(compat_ulong_t
),
1464 .align
= sizeof(compat_ulong_t
),
1465 .get
= compat_vfp_get
,
1466 .set
= compat_vfp_set
1469 .core_note_type
= NT_ARM_TLS
,
1471 .size
= sizeof(compat_ulong_t
),
1472 .align
= sizeof(compat_ulong_t
),
1473 .get
= compat_tls_get
,
1474 .set
= compat_tls_set
,
1476 #ifdef CONFIG_HAVE_HW_BREAKPOINT
1477 [REGSET_HW_BREAK
] = {
1478 .core_note_type
= NT_ARM_HW_BREAK
,
1479 .n
= sizeof(struct user_hwdebug_state
) / sizeof(u32
),
1480 .size
= sizeof(u32
),
1481 .align
= sizeof(u32
),
1482 .get
= hw_break_get
,
1483 .set
= hw_break_set
,
1485 [REGSET_HW_WATCH
] = {
1486 .core_note_type
= NT_ARM_HW_WATCH
,
1487 .n
= sizeof(struct user_hwdebug_state
) / sizeof(u32
),
1488 .size
= sizeof(u32
),
1489 .align
= sizeof(u32
),
1490 .get
= hw_break_get
,
1491 .set
= hw_break_set
,
1494 [REGSET_SYSTEM_CALL
] = {
1495 .core_note_type
= NT_ARM_SYSTEM_CALL
,
1497 .size
= sizeof(int),
1498 .align
= sizeof(int),
1499 .get
= system_call_get
,
1500 .set
= system_call_set
,
1504 static const struct user_regset_view user_aarch32_ptrace_view
= {
1505 .name
= "aarch32", .e_machine
= EM_ARM
,
1506 .regsets
= aarch32_ptrace_regsets
, .n
= ARRAY_SIZE(aarch32_ptrace_regsets
)
1509 static int compat_ptrace_read_user(struct task_struct
*tsk
, compat_ulong_t off
,
1510 compat_ulong_t __user
*ret
)
1517 if (off
== COMPAT_PT_TEXT_ADDR
)
1518 tmp
= tsk
->mm
->start_code
;
1519 else if (off
== COMPAT_PT_DATA_ADDR
)
1520 tmp
= tsk
->mm
->start_data
;
1521 else if (off
== COMPAT_PT_TEXT_END_ADDR
)
1522 tmp
= tsk
->mm
->end_code
;
1523 else if (off
< sizeof(compat_elf_gregset_t
))
1524 return copy_regset_to_user(tsk
, &user_aarch32_view
,
1525 REGSET_COMPAT_GPR
, off
,
1526 sizeof(compat_ulong_t
), ret
);
1527 else if (off
>= COMPAT_USER_SZ
)
1532 return put_user(tmp
, ret
);
1535 static int compat_ptrace_write_user(struct task_struct
*tsk
, compat_ulong_t off
,
1539 mm_segment_t old_fs
= get_fs();
1541 if (off
& 3 || off
>= COMPAT_USER_SZ
)
1544 if (off
>= sizeof(compat_elf_gregset_t
))
1548 ret
= copy_regset_from_user(tsk
, &user_aarch32_view
,
1549 REGSET_COMPAT_GPR
, off
,
1550 sizeof(compat_ulong_t
),
1557 #ifdef CONFIG_HAVE_HW_BREAKPOINT
1560 * Convert a virtual register number into an index for a thread_info
1561 * breakpoint array. Breakpoints are identified using positive numbers
1562 * whilst watchpoints are negative. The registers are laid out as pairs
1563 * of (address, control), each pair mapping to a unique hw_breakpoint struct.
1564 * Register 0 is reserved for describing resource information.
1566 static int compat_ptrace_hbp_num_to_idx(compat_long_t num
)
1568 return (abs(num
) - 1) >> 1;
1571 static int compat_ptrace_hbp_get_resource_info(u32
*kdata
)
1573 u8 num_brps
, num_wrps
, debug_arch
, wp_len
;
1576 num_brps
= hw_breakpoint_slots(TYPE_INST
);
1577 num_wrps
= hw_breakpoint_slots(TYPE_DATA
);
1579 debug_arch
= debug_monitors_arch();
1593 static int compat_ptrace_hbp_get(unsigned int note_type
,
1594 struct task_struct
*tsk
,
1601 int err
, idx
= compat_ptrace_hbp_num_to_idx(num
);
1604 err
= ptrace_hbp_get_addr(note_type
, tsk
, idx
, &addr
);
1607 err
= ptrace_hbp_get_ctrl(note_type
, tsk
, idx
, &ctrl
);
1614 static int compat_ptrace_hbp_set(unsigned int note_type
,
1615 struct task_struct
*tsk
,
1622 int err
, idx
= compat_ptrace_hbp_num_to_idx(num
);
1626 err
= ptrace_hbp_set_addr(note_type
, tsk
, idx
, addr
);
1629 err
= ptrace_hbp_set_ctrl(note_type
, tsk
, idx
, ctrl
);
1635 static int compat_ptrace_gethbpregs(struct task_struct
*tsk
, compat_long_t num
,
1636 compat_ulong_t __user
*data
)
1643 ret
= compat_ptrace_hbp_get(NT_ARM_HW_WATCH
, tsk
, num
, &kdata
);
1645 } else if (num
== 0) {
1646 ret
= compat_ptrace_hbp_get_resource_info(&kdata
);
1649 ret
= compat_ptrace_hbp_get(NT_ARM_HW_BREAK
, tsk
, num
, &kdata
);
1653 ret
= put_user(kdata
, data
);
1658 static int compat_ptrace_sethbpregs(struct task_struct
*tsk
, compat_long_t num
,
1659 compat_ulong_t __user
*data
)
1667 ret
= get_user(kdata
, data
);
1672 ret
= compat_ptrace_hbp_set(NT_ARM_HW_WATCH
, tsk
, num
, &kdata
);
1674 ret
= compat_ptrace_hbp_set(NT_ARM_HW_BREAK
, tsk
, num
, &kdata
);
1678 #endif /* CONFIG_HAVE_HW_BREAKPOINT */
1680 long compat_arch_ptrace(struct task_struct
*child
, compat_long_t request
,
1681 compat_ulong_t caddr
, compat_ulong_t cdata
)
1683 unsigned long addr
= caddr
;
1684 unsigned long data
= cdata
;
1685 void __user
*datap
= compat_ptr(data
);
1689 case PTRACE_PEEKUSR
:
1690 ret
= compat_ptrace_read_user(child
, addr
, datap
);
1693 case PTRACE_POKEUSR
:
1694 ret
= compat_ptrace_write_user(child
, addr
, data
);
1697 case COMPAT_PTRACE_GETREGS
:
1698 ret
= copy_regset_to_user(child
,
1701 0, sizeof(compat_elf_gregset_t
),
1705 case COMPAT_PTRACE_SETREGS
:
1706 ret
= copy_regset_from_user(child
,
1709 0, sizeof(compat_elf_gregset_t
),
1713 case COMPAT_PTRACE_GET_THREAD_AREA
:
1714 ret
= put_user((compat_ulong_t
)child
->thread
.uw
.tp_value
,
1715 (compat_ulong_t __user
*)datap
);
1718 case COMPAT_PTRACE_SET_SYSCALL
:
1719 task_pt_regs(child
)->syscallno
= data
;
1723 case COMPAT_PTRACE_GETVFPREGS
:
1724 ret
= copy_regset_to_user(child
,
1731 case COMPAT_PTRACE_SETVFPREGS
:
1732 ret
= copy_regset_from_user(child
,
1739 #ifdef CONFIG_HAVE_HW_BREAKPOINT
1740 case COMPAT_PTRACE_GETHBPREGS
:
1741 ret
= compat_ptrace_gethbpregs(child
, addr
, datap
);
1744 case COMPAT_PTRACE_SETHBPREGS
:
1745 ret
= compat_ptrace_sethbpregs(child
, addr
, datap
);
1750 ret
= compat_ptrace_request(child
, request
, addr
,
1757 #endif /* CONFIG_COMPAT */
1759 const struct user_regset_view
*task_user_regset_view(struct task_struct
*task
)
1761 #ifdef CONFIG_COMPAT
1763 * Core dumping of 32-bit tasks or compat ptrace requests must use the
1764 * user_aarch32_view compatible with arm32. Native ptrace requests on
1765 * 32-bit children use an extended user_aarch32_ptrace_view to allow
1766 * access to the TLS register.
1768 if (is_compat_task())
1769 return &user_aarch32_view
;
1770 else if (is_compat_thread(task_thread_info(task
)))
1771 return &user_aarch32_ptrace_view
;
1773 return &user_aarch64_view
;
1776 long arch_ptrace(struct task_struct
*child
, long request
,
1777 unsigned long addr
, unsigned long data
)
1779 return ptrace_request(child
, request
, addr
, data
);
1782 enum ptrace_syscall_dir
{
1783 PTRACE_SYSCALL_ENTER
= 0,
1784 PTRACE_SYSCALL_EXIT
,
1787 static void tracehook_report_syscall(struct pt_regs
*regs
,
1788 enum ptrace_syscall_dir dir
)
1791 unsigned long saved_reg
;
1794 * A scratch register (ip(r12) on AArch32, x7 on AArch64) is
1795 * used to denote syscall entry/exit:
1797 regno
= (is_compat_task() ? 12 : 7);
1798 saved_reg
= regs
->regs
[regno
];
1799 regs
->regs
[regno
] = dir
;
1801 if (dir
== PTRACE_SYSCALL_EXIT
)
1802 tracehook_report_syscall_exit(regs
, 0);
1803 else if (tracehook_report_syscall_entry(regs
))
1804 forget_syscall(regs
);
1806 regs
->regs
[regno
] = saved_reg
;
1809 int syscall_trace_enter(struct pt_regs
*regs
)
1811 if (test_thread_flag(TIF_SYSCALL_TRACE
) ||
1812 test_thread_flag(TIF_SYSCALL_EMU
)) {
1813 tracehook_report_syscall(regs
, PTRACE_SYSCALL_ENTER
);
1814 if (!in_syscall(regs
) || test_thread_flag(TIF_SYSCALL_EMU
))
1818 /* Do the secure computing after ptrace; failures should be fast. */
1819 if (secure_computing(NULL
) == -1)
1822 if (test_thread_flag(TIF_SYSCALL_TRACEPOINT
))
1823 trace_sys_enter(regs
, regs
->syscallno
);
1825 audit_syscall_entry(regs
->syscallno
, regs
->orig_x0
, regs
->regs
[1],
1826 regs
->regs
[2], regs
->regs
[3]);
1828 return regs
->syscallno
;
1831 void syscall_trace_exit(struct pt_regs
*regs
)
1833 audit_syscall_exit(regs
);
1835 if (test_thread_flag(TIF_SYSCALL_TRACEPOINT
))
1836 trace_sys_exit(regs
, regs_return_value(regs
));
1838 if (test_thread_flag(TIF_SYSCALL_TRACE
))
1839 tracehook_report_syscall(regs
, PTRACE_SYSCALL_EXIT
);
1845 * SPSR_ELx bits which are always architecturally RES0 per ARM DDI 0487D.a.
1846 * We permit userspace to set SSBS (AArch64 bit 12, AArch32 bit 23) which is
1847 * not described in ARM DDI 0487D.a.
1848 * We treat PAN and UAO as RES0 bits, as they are meaningless at EL0, and may
1849 * be allocated an EL0 meaning in future.
1850 * Userspace cannot use these until they have an architectural meaning.
1851 * Note that this follows the SPSR_ELx format, not the AArch32 PSR format.
1852 * We also reserve IL for the kernel; SS is handled dynamically.
1854 #define SPSR_EL1_AARCH64_RES0_BITS \
1855 (GENMASK_ULL(63, 32) | GENMASK_ULL(27, 25) | GENMASK_ULL(23, 22) | \
1856 GENMASK_ULL(20, 13) | GENMASK_ULL(11, 10) | GENMASK_ULL(5, 5))
1857 #define SPSR_EL1_AARCH32_RES0_BITS \
1858 (GENMASK_ULL(63, 32) | GENMASK_ULL(22, 22) | GENMASK_ULL(20, 20))
1860 static int valid_compat_regs(struct user_pt_regs
*regs
)
1862 regs
->pstate
&= ~SPSR_EL1_AARCH32_RES0_BITS
;
1864 if (!system_supports_mixed_endian_el0()) {
1865 if (IS_ENABLED(CONFIG_CPU_BIG_ENDIAN
))
1866 regs
->pstate
|= PSR_AA32_E_BIT
;
1868 regs
->pstate
&= ~PSR_AA32_E_BIT
;
1871 if (user_mode(regs
) && (regs
->pstate
& PSR_MODE32_BIT
) &&
1872 (regs
->pstate
& PSR_AA32_A_BIT
) == 0 &&
1873 (regs
->pstate
& PSR_AA32_I_BIT
) == 0 &&
1874 (regs
->pstate
& PSR_AA32_F_BIT
) == 0) {
1879 * Force PSR to a valid 32-bit EL0t, preserving the same bits as
1882 regs
->pstate
&= PSR_AA32_N_BIT
| PSR_AA32_Z_BIT
|
1883 PSR_AA32_C_BIT
| PSR_AA32_V_BIT
|
1884 PSR_AA32_Q_BIT
| PSR_AA32_IT_MASK
|
1885 PSR_AA32_GE_MASK
| PSR_AA32_E_BIT
|
1887 regs
->pstate
|= PSR_MODE32_BIT
;
1892 static int valid_native_regs(struct user_pt_regs
*regs
)
1894 regs
->pstate
&= ~SPSR_EL1_AARCH64_RES0_BITS
;
1896 if (user_mode(regs
) && !(regs
->pstate
& PSR_MODE32_BIT
) &&
1897 (regs
->pstate
& PSR_D_BIT
) == 0 &&
1898 (regs
->pstate
& PSR_A_BIT
) == 0 &&
1899 (regs
->pstate
& PSR_I_BIT
) == 0 &&
1900 (regs
->pstate
& PSR_F_BIT
) == 0) {
1904 /* Force PSR to a valid 64-bit EL0t */
1905 regs
->pstate
&= PSR_N_BIT
| PSR_Z_BIT
| PSR_C_BIT
| PSR_V_BIT
;
1911 * Are the current registers suitable for user mode? (used to maintain
1912 * security in signal handlers)
1914 int valid_user_regs(struct user_pt_regs
*regs
, struct task_struct
*task
)
1916 if (!test_tsk_thread_flag(task
, TIF_SINGLESTEP
))
1917 regs
->pstate
&= ~DBG_SPSR_SS
;
1919 if (is_compat_thread(task_thread_info(task
)))
1920 return valid_compat_regs(regs
);
1922 return valid_native_regs(regs
);