blob: 8533d2fea2d711aafbca366c880848ef2b99be9b [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Roland McGrathbbc69862008-07-25 19:45:59 -07002#include <linux/ptrace.h>
3#include <linux/sched.h>
Ingo Molnar68db0cf2017-02-08 18:51:37 +01004#include <linux/sched/task_stack.h>
Paul Gortmaker8bc3bcc2011-11-16 21:29:17 -05005#include <linux/export.h>
Roland McGrathbbc69862008-07-25 19:45:59 -07006#include <asm/syscall.h>
7
Steven Rostedt (Red Hat)631b7ab2016-11-07 16:26:35 -05008static int collect_syscall(struct task_struct *target, struct syscall_info *info)
Roland McGrathbbc69862008-07-25 19:45:59 -07009{
Andy Lutomirskiaa1f1a62016-09-15 22:45:47 -070010 struct pt_regs *regs;
11
12 if (!try_get_task_stack(target)) {
13 /* Task has no stack, so the task isn't in a syscall. */
Steven Rostedt (Red Hat)631b7ab2016-11-07 16:26:35 -050014 memset(info, 0, sizeof(*info));
15 info->data.nr = -1;
Andy Lutomirskiaa1f1a62016-09-15 22:45:47 -070016 return 0;
17 }
18
19 regs = task_pt_regs(target);
20 if (unlikely(!regs)) {
21 put_task_stack(target);
Roland McGrathbbc69862008-07-25 19:45:59 -070022 return -EAGAIN;
Andy Lutomirskiaa1f1a62016-09-15 22:45:47 -070023 }
Roland McGrathbbc69862008-07-25 19:45:59 -070024
Steven Rostedt (Red Hat)631b7ab2016-11-07 16:26:35 -050025 info->sp = user_stack_pointer(regs);
26 info->data.instruction_pointer = instruction_pointer(regs);
Roland McGrathbbc69862008-07-25 19:45:59 -070027
Steven Rostedt (Red Hat)631b7ab2016-11-07 16:26:35 -050028 info->data.nr = syscall_get_nr(target, regs);
29 if (info->data.nr != -1L)
Steven Rostedt (Red Hat)b35f5492016-11-07 16:26:37 -050030 syscall_get_arguments(target, regs,
Steven Rostedt (Red Hat)631b7ab2016-11-07 16:26:35 -050031 (unsigned long *)&info->data.args[0]);
Roland McGrathbbc69862008-07-25 19:45:59 -070032
Andy Lutomirskiaa1f1a62016-09-15 22:45:47 -070033 put_task_stack(target);
Roland McGrathbbc69862008-07-25 19:45:59 -070034 return 0;
35}
36
37/**
38 * task_current_syscall - Discover what a blocked task is doing.
39 * @target: thread to examine
Steven Rostedt (Red Hat)631b7ab2016-11-07 16:26:35 -050040 * @info: structure with the following fields:
41 * .sp - filled with user stack pointer
42 * .data.nr - filled with system call number or -1
43 * .data.args - filled with @maxargs system call arguments
44 * .data.instruction_pointer - filled with user PC
Roland McGrathbbc69862008-07-25 19:45:59 -070045 *
Steven Rostedt (Red Hat)631b7ab2016-11-07 16:26:35 -050046 * If @target is blocked in a system call, returns zero with @info.data.nr
Randy Dunlap408a93a2020-10-15 20:11:07 -070047 * set to the call's number and @info.data.args filled in with its
Steven Rostedt (Red Hat)631b7ab2016-11-07 16:26:35 -050048 * arguments. Registers not used for system call arguments may not be available
49 * and it is not kosher to use &struct user_regset calls while the system
Roland McGrathbbc69862008-07-25 19:45:59 -070050 * call is still in progress. Note we may get this result if @target
51 * has finished its system call but not yet returned to user mode, such
52 * as when it's stopped for signal handling or syscall exit tracing.
53 *
54 * If @target is blocked in the kernel during a fault or exception,
Steven Rostedt (Red Hat)631b7ab2016-11-07 16:26:35 -050055 * returns zero with *@info.data.nr set to -1 and does not fill in
56 * @info.data.args. If so, it's now safe to examine @target using
57 * &struct user_regset get() calls as long as we're sure @target won't return
58 * to user mode.
Roland McGrathbbc69862008-07-25 19:45:59 -070059 *
60 * Returns -%EAGAIN if @target does not remain blocked.
Roland McGrathbbc69862008-07-25 19:45:59 -070061 */
Steven Rostedt (Red Hat)631b7ab2016-11-07 16:26:35 -050062int task_current_syscall(struct task_struct *target, struct syscall_info *info)
Roland McGrathbbc69862008-07-25 19:45:59 -070063{
64 long state;
65 unsigned long ncsw;
66
Roland McGrathbbc69862008-07-25 19:45:59 -070067 if (target == current)
Steven Rostedt (Red Hat)631b7ab2016-11-07 16:26:35 -050068 return collect_syscall(target, info);
Roland McGrathbbc69862008-07-25 19:45:59 -070069
70 state = target->state;
71 if (unlikely(!state))
72 return -EAGAIN;
73
74 ncsw = wait_task_inactive(target, state);
75 if (unlikely(!ncsw) ||
Steven Rostedt (Red Hat)631b7ab2016-11-07 16:26:35 -050076 unlikely(collect_syscall(target, info)) ||
Roland McGrathbbc69862008-07-25 19:45:59 -070077 unlikely(wait_task_inactive(target, state) != ncsw))
78 return -EAGAIN;
79
80 return 0;
81}