2 * Copyright (C) 2000-2003, Axis Communications AB.
5 #include <linux/kernel.h>
6 #include <linux/sched.h>
9 #include <linux/smp_lock.h>
10 #include <linux/errno.h>
11 #include <linux/ptrace.h>
12 #include <linux/user.h>
13 #include <linux/signal.h>
14 #include <linux/security.h>
16 #include <asm/uaccess.h>
18 #include <asm/pgtable.h>
19 #include <asm/system.h>
20 #include <asm/processor.h>
23 * Determines which bits in DCCR the user has access to.
24 * 1 = access, 0 = no access.
26 #define DCCR_MASK 0x0000001f /* XNZVC */
29 * Get contents of register REGNO in task TASK.
31 inline long get_reg(struct task_struct
*task
, unsigned int regno
)
33 /* USP is a special case, it's not in the pt_regs struct but
34 * in the tasks thread struct
38 return task
->thread
.usp
;
39 else if (regno
< PT_MAX
)
40 return ((unsigned long *)task_pt_regs(task
))[regno
];
46 * Write contents of register REGNO in task TASK.
48 inline int put_reg(struct task_struct
*task
, unsigned int regno
,
52 task
->thread
.usp
= data
;
53 else if (regno
< PT_MAX
)
54 ((unsigned long *)task_pt_regs(task
))[regno
] = data
;
61 * Called by kernel/ptrace.c when detaching.
63 * Make sure the single step bit is not set.
66 ptrace_disable(struct task_struct
*child
)
68 /* Todo - pending singlesteps? */
72 * Note that this implementation of ptrace behaves differently from vanilla
73 * ptrace. Contrary to what the man page says, in the PTRACE_PEEKTEXT,
74 * PTRACE_PEEKDATA, and PTRACE_PEEKUSER requests the data variable is not
75 * ignored. Instead, the data variable is expected to point at a location
76 * (in user space) where the result of the ptrace call is written (instead of
79 long arch_ptrace(struct task_struct
*child
, long request
, long addr
, long data
)
82 unsigned long __user
*datap
= (unsigned long __user
*)data
;
85 /* Read word at location address. */
87 case PTRACE_PEEKDATA
: {
91 copied
= access_process_vm(child
, addr
, &tmp
, sizeof(tmp
), 0);
94 if (copied
!= sizeof(tmp
))
97 ret
= put_user(tmp
,datap
);
101 /* Read the word at location address in the USER area. */
102 case PTRACE_PEEKUSR
: {
106 if ((addr
& 3) || addr
< 0 || addr
> PT_MAX
<< 2)
109 tmp
= get_reg(child
, addr
>> 2);
110 ret
= put_user(tmp
, datap
);
114 /* Write the word at location address. */
115 case PTRACE_POKETEXT
:
116 case PTRACE_POKEDATA
:
119 if (access_process_vm(child
, addr
, &data
, sizeof(data
), 1) == sizeof(data
))
125 /* Write the word at location address in the USER area. */
128 if ((addr
& 3) || addr
< 0 || addr
> PT_MAX
<< 2)
133 if (addr
== PT_DCCR
) {
134 /* don't allow the tracing process to change stuff like
135 * interrupt enable, kernel/user bit, dma enables etc.
138 data
|= get_reg(child
, PT_DCCR
) & ~DCCR_MASK
;
140 if (put_reg(child
, addr
, data
))
149 if (!valid_signal(data
))
152 if (request
== PTRACE_SYSCALL
) {
153 set_tsk_thread_flag(child
, TIF_SYSCALL_TRACE
);
156 clear_tsk_thread_flag(child
, TIF_SYSCALL_TRACE
);
159 child
->exit_code
= data
;
161 /* TODO: make sure any pending breakpoint is killed */
162 wake_up_process(child
);
167 /* Make the child exit by sending it a sigkill. */
171 if (child
->exit_state
== EXIT_ZOMBIE
)
174 child
->exit_code
= SIGKILL
;
176 /* TODO: make sure any pending breakpoint is killed */
177 wake_up_process(child
);
180 /* Set the trap flag. */
181 case PTRACE_SINGLESTEP
:
184 if (!valid_signal(data
))
187 clear_tsk_thread_flag(child
, TIF_SYSCALL_TRACE
);
189 /* TODO: set some clever breakpoint mechanism... */
191 child
->exit_code
= data
;
192 wake_up_process(child
);
197 ret
= ptrace_detach(child
, data
);
200 /* Get all GP registers from the child. */
201 case PTRACE_GETREGS
: {
206 for (i
= 0; i
<= PT_MAX
; i
++) {
207 tmp
= get_reg(child
, i
);
209 if (put_user(tmp
, datap
)) {
214 data
+= sizeof(long);
220 /* Set all GP registers in the child. */
221 case PTRACE_SETREGS
: {
226 for (i
= 0; i
<= PT_MAX
; i
++) {
227 if (get_user(tmp
, datap
)) {
234 tmp
|= get_reg(child
, PT_DCCR
) & ~DCCR_MASK
;
237 put_reg(child
, i
, tmp
);
238 data
+= sizeof(long);
245 ret
= ptrace_request(child
, request
, addr
, data
);
252 void do_syscall_trace(void)
254 if (!test_thread_flag(TIF_SYSCALL_TRACE
))
257 if (!(current
->ptrace
& PT_PTRACED
))
260 /* the 0x80 provides a way for the tracing parent to distinguish
261 between a syscall stop and SIGTRAP delivery */
262 ptrace_notify(SIGTRAP
| ((current
->ptrace
& PT_TRACESYSGOOD
)
266 * This isn't the same as continuing with a signal, but it will do for
269 if (current
->exit_code
) {
270 send_sig(current
->exit_code
, current
, 1);
271 current
->exit_code
= 0;