| /* | 
 |  * Copyright 2003 PathScale, Inc. | 
 |  * Copyright (C) 2003 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com) | 
 |  * | 
 |  * Licensed under the GPL | 
 |  */ | 
 |  | 
 | #include <linux/mm.h> | 
 | #include <linux/sched.h> | 
 | #include <linux/errno.h> | 
 | #define __FRAME_OFFSETS | 
 | #include <asm/ptrace.h> | 
 | #include <asm/uaccess.h> | 
 |  | 
 | /* | 
 |  * determines which flags the user has access to. | 
 |  * 1 = access 0 = no access | 
 |  */ | 
 | #define FLAG_MASK 0x44dd5UL | 
 |  | 
 | static const int reg_offsets[] = | 
 | { | 
 | 	[R8 >> 3] = HOST_R8, | 
 | 	[R9 >> 3] = HOST_R9, | 
 | 	[R10 >> 3] = HOST_R10, | 
 | 	[R11 >> 3] = HOST_R11, | 
 | 	[R12 >> 3] = HOST_R12, | 
 | 	[R13 >> 3] = HOST_R13, | 
 | 	[R14 >> 3] = HOST_R14, | 
 | 	[R15 >> 3] = HOST_R15, | 
 | 	[RIP >> 3] = HOST_IP, | 
 | 	[RSP >> 3] = HOST_SP, | 
 | 	[RAX >> 3] = HOST_AX, | 
 | 	[RBX >> 3] = HOST_BX, | 
 | 	[RCX >> 3] = HOST_CX, | 
 | 	[RDX >> 3] = HOST_DX, | 
 | 	[RSI >> 3] = HOST_SI, | 
 | 	[RDI >> 3] = HOST_DI, | 
 | 	[RBP >> 3] = HOST_BP, | 
 | 	[CS >> 3] = HOST_CS, | 
 | 	[SS >> 3] = HOST_SS, | 
 | 	[FS_BASE >> 3] = HOST_FS_BASE, | 
 | 	[GS_BASE >> 3] = HOST_GS_BASE, | 
 | 	[DS >> 3] = HOST_DS, | 
 | 	[ES >> 3] = HOST_ES, | 
 | 	[FS >> 3] = HOST_FS, | 
 | 	[GS >> 3] = HOST_GS, | 
 | 	[EFLAGS >> 3] = HOST_EFLAGS, | 
 | 	[ORIG_RAX >> 3] = HOST_ORIG_AX, | 
 | }; | 
 |  | 
 | int putreg(struct task_struct *child, int regno, unsigned long value) | 
 | { | 
 | #ifdef TIF_IA32 | 
 | 	/* | 
 | 	 * Some code in the 64bit emulation may not be 64bit clean. | 
 | 	 * Don't take any chances. | 
 | 	 */ | 
 | 	if (test_tsk_thread_flag(child, TIF_IA32)) | 
 | 		value &= 0xffffffff; | 
 | #endif | 
 | 	switch (regno) { | 
 | 	case R8: | 
 | 	case R9: | 
 | 	case R10: | 
 | 	case R11: | 
 | 	case R12: | 
 | 	case R13: | 
 | 	case R14: | 
 | 	case R15: | 
 | 	case RIP: | 
 | 	case RSP: | 
 | 	case RAX: | 
 | 	case RBX: | 
 | 	case RCX: | 
 | 	case RDX: | 
 | 	case RSI: | 
 | 	case RDI: | 
 | 	case RBP: | 
 | 	case ORIG_RAX: | 
 | 		break; | 
 |  | 
 | 	case FS: | 
 | 	case GS: | 
 | 	case DS: | 
 | 	case ES: | 
 | 	case SS: | 
 | 	case CS: | 
 | 		if (value && (value & 3) != 3) | 
 | 			return -EIO; | 
 | 		value &= 0xffff; | 
 | 		break; | 
 |  | 
 | 	case FS_BASE: | 
 | 	case GS_BASE: | 
 | 		if (!((value >> 48) == 0 || (value >> 48) == 0xffff)) | 
 | 			return -EIO; | 
 | 		break; | 
 |  | 
 | 	case EFLAGS: | 
 | 		value &= FLAG_MASK; | 
 | 		child->thread.regs.regs.gp[HOST_EFLAGS] |= value; | 
 | 		return 0; | 
 |  | 
 | 	default: | 
 | 		panic("Bad register in putreg(): %d\n", regno); | 
 | 	} | 
 |  | 
 | 	child->thread.regs.regs.gp[reg_offsets[regno >> 3]] = value; | 
 | 	return 0; | 
 | } | 
 |  | 
 | int poke_user(struct task_struct *child, long addr, long data) | 
 | { | 
 | 	if ((addr & 3) || addr < 0) | 
 | 		return -EIO; | 
 |  | 
 | 	if (addr < MAX_REG_OFFSET) | 
 | 		return putreg(child, addr, data); | 
 | 	else if ((addr >= offsetof(struct user, u_debugreg[0])) && | 
 | 		(addr <= offsetof(struct user, u_debugreg[7]))) { | 
 | 		addr -= offsetof(struct user, u_debugreg[0]); | 
 | 		addr = addr >> 2; | 
 | 		if ((addr == 4) || (addr == 5)) | 
 | 			return -EIO; | 
 | 		child->thread.arch.debugregs[addr] = data; | 
 | 		return 0; | 
 | 	} | 
 | 	return -EIO; | 
 | } | 
 |  | 
 | unsigned long getreg(struct task_struct *child, int regno) | 
 | { | 
 | 	unsigned long mask = ~0UL; | 
 | #ifdef TIF_IA32 | 
 | 	if (test_tsk_thread_flag(child, TIF_IA32)) | 
 | 		mask = 0xffffffff; | 
 | #endif | 
 | 	switch (regno) { | 
 | 	case R8: | 
 | 	case R9: | 
 | 	case R10: | 
 | 	case R11: | 
 | 	case R12: | 
 | 	case R13: | 
 | 	case R14: | 
 | 	case R15: | 
 | 	case RIP: | 
 | 	case RSP: | 
 | 	case RAX: | 
 | 	case RBX: | 
 | 	case RCX: | 
 | 	case RDX: | 
 | 	case RSI: | 
 | 	case RDI: | 
 | 	case RBP: | 
 | 	case ORIG_RAX: | 
 | 	case EFLAGS: | 
 | 	case FS_BASE: | 
 | 	case GS_BASE: | 
 | 		break; | 
 | 	case FS: | 
 | 	case GS: | 
 | 	case DS: | 
 | 	case ES: | 
 | 	case SS: | 
 | 	case CS: | 
 | 		mask = 0xffff; | 
 | 		break; | 
 | 	default: | 
 | 		panic("Bad register in getreg: %d\n", regno); | 
 | 	} | 
 | 	return mask & child->thread.regs.regs.gp[reg_offsets[regno >> 3]]; | 
 | } | 
 |  | 
 | int peek_user(struct task_struct *child, long addr, long data) | 
 | { | 
 | 	/* read the word at location addr in the USER area. */ | 
 | 	unsigned long tmp; | 
 |  | 
 | 	if ((addr & 3) || addr < 0) | 
 | 		return -EIO; | 
 |  | 
 | 	tmp = 0;  /* Default return condition */ | 
 | 	if (addr < MAX_REG_OFFSET) | 
 | 		tmp = getreg(child, addr); | 
 | 	else if ((addr >= offsetof(struct user, u_debugreg[0])) && | 
 | 		(addr <= offsetof(struct user, u_debugreg[7]))) { | 
 | 		addr -= offsetof(struct user, u_debugreg[0]); | 
 | 		addr = addr >> 2; | 
 | 		tmp = child->thread.arch.debugregs[addr]; | 
 | 	} | 
 | 	return put_user(tmp, (unsigned long *) data); | 
 | } | 
 |  | 
 | /* XXX Mostly copied from sys-i386 */ | 
 | int is_syscall(unsigned long addr) | 
 | { | 
 | 	unsigned short instr; | 
 | 	int n; | 
 |  | 
 | 	n = copy_from_user(&instr, (void __user *) addr, sizeof(instr)); | 
 | 	if (n) { | 
 | 		/* | 
 | 		 * access_process_vm() grants access to vsyscall and stub, | 
 | 		 * while copy_from_user doesn't. Maybe access_process_vm is | 
 | 		 * slow, but that doesn't matter, since it will be called only | 
 | 		 * in case of singlestepping, if copy_from_user failed. | 
 | 		 */ | 
 | 		n = access_process_vm(current, addr, &instr, sizeof(instr), 0); | 
 | 		if (n != sizeof(instr)) { | 
 | 			printk("is_syscall : failed to read instruction from " | 
 | 			       "0x%lx\n", addr); | 
 | 			return 1; | 
 | 		} | 
 | 	} | 
 | 	/* sysenter */ | 
 | 	return instr == 0x050f; | 
 | } | 
 |  | 
 | static int get_fpregs(struct user_i387_struct __user *buf, struct task_struct *child) | 
 | { | 
 | 	int err, n, cpu = ((struct thread_info *) child->stack)->cpu; | 
 | 	long fpregs[HOST_FP_SIZE]; | 
 |  | 
 | 	BUG_ON(sizeof(*buf) != sizeof(fpregs)); | 
 | 	err = save_fp_registers(userspace_pid[cpu], fpregs); | 
 | 	if (err) | 
 | 		return err; | 
 |  | 
 | 	n = copy_to_user(buf, fpregs, sizeof(fpregs)); | 
 | 	if (n > 0) | 
 | 		return -EFAULT; | 
 |  | 
 | 	return n; | 
 | } | 
 |  | 
 | static int set_fpregs(struct user_i387_struct __user *buf, struct task_struct *child) | 
 | { | 
 | 	int n, cpu = ((struct thread_info *) child->stack)->cpu; | 
 | 	long fpregs[HOST_FP_SIZE]; | 
 |  | 
 | 	BUG_ON(sizeof(*buf) != sizeof(fpregs)); | 
 | 	n = copy_from_user(fpregs, buf, sizeof(fpregs)); | 
 | 	if (n > 0) | 
 | 		return -EFAULT; | 
 |  | 
 | 	return restore_fp_registers(userspace_pid[cpu], fpregs); | 
 | } | 
 |  | 
 | long subarch_ptrace(struct task_struct *child, long request, | 
 | 		    unsigned long addr, unsigned long data) | 
 | { | 
 | 	int ret = -EIO; | 
 | 	void __user *datap = (void __user *) data; | 
 |  | 
 | 	switch (request) { | 
 | 	case PTRACE_GETFPREGS: /* Get the child FPU state. */ | 
 | 		ret = get_fpregs(datap, child); | 
 | 		break; | 
 | 	case PTRACE_SETFPREGS: /* Set the child FPU state. */ | 
 | 		ret = set_fpregs(datap, child); | 
 | 		break; | 
 | 	case PTRACE_ARCH_PRCTL: | 
 | 		/* XXX Calls ptrace on the host - needs some SMP thinking */ | 
 | 		ret = arch_prctl(child, data, (void __user *) addr); | 
 | 		break; | 
 | 	} | 
 |  | 
 | 	return ret; | 
 | } |