2 /* By Ross Biro 1/23/92 */
3 /* edited by Linus Torvalds */
4 /* mangled further by Bob Manson (manson@santafe.edu) */
5 /* more mutilation by David Mosberger (davidm@azstarnet.com) */
7 #include <linux/kernel.h>
8 #include <linux/sched.h>
10 #include <linux/smp.h>
11 #include <linux/smp_lock.h>
12 #include <linux/errno.h>
13 #include <linux/ptrace.h>
14 #include <linux/user.h>
15 #include <linux/slab.h>
16 #include <linux/security.h>
17 #include <linux/signal.h>
19 #include <asm/uaccess.h>
20 #include <asm/pgtable.h>
21 #include <asm/system.h>
35 #define DBG(fac,args) {if ((fac) & DEBUG) printk args;}
40 #define BREAKINST 0x00000080 /* call_pal bpt */
43 * does not yet catch signals sent when the child dies.
44 * in exit.c or in signal.c.
48 * Processes always block with the following stack-layout:
50 * +================================+ <---- task + 2*PAGE_SIZE
51 * | PALcode saved frame (ps, pc, | ^
52 * | gp, a0, a1, a2) | |
53 * +================================+ | struct pt_regs
55 * | frame generated by SAVE_ALL | |
57 * +================================+
59 * | frame saved by do_switch_stack | | struct switch_stack
61 * +================================+
65 * The following table maps a register index into the stack offset at
66 * which the register is saved. Register indices are 0-31 for integer
67 * regs, 32-63 for fp regs, and 64 for the pc. Notice that sp and
68 * zero have no stack-slot and need to be treated specially (see
69 * get_reg/put_reg below).
72 REG_R0
= 0, REG_F0
= 32, REG_FPCR
= 63, REG_PC
= 64
75 static int regoff
[] = {
76 PT_REG( r0
), PT_REG( r1
), PT_REG( r2
), PT_REG( r3
),
77 PT_REG( r4
), PT_REG( r5
), PT_REG( r6
), PT_REG( r7
),
78 PT_REG( r8
), SW_REG( r9
), SW_REG( r10
), SW_REG( r11
),
79 SW_REG( r12
), SW_REG( r13
), SW_REG( r14
), SW_REG( r15
),
80 PT_REG( r16
), PT_REG( r17
), PT_REG( r18
), PT_REG( r19
),
81 PT_REG( r20
), PT_REG( r21
), PT_REG( r22
), PT_REG( r23
),
82 PT_REG( r24
), PT_REG( r25
), PT_REG( r26
), PT_REG( r27
),
83 PT_REG( r28
), PT_REG( gp
), -1, -1,
84 SW_REG(fp
[ 0]), SW_REG(fp
[ 1]), SW_REG(fp
[ 2]), SW_REG(fp
[ 3]),
85 SW_REG(fp
[ 4]), SW_REG(fp
[ 5]), SW_REG(fp
[ 6]), SW_REG(fp
[ 7]),
86 SW_REG(fp
[ 8]), SW_REG(fp
[ 9]), SW_REG(fp
[10]), SW_REG(fp
[11]),
87 SW_REG(fp
[12]), SW_REG(fp
[13]), SW_REG(fp
[14]), SW_REG(fp
[15]),
88 SW_REG(fp
[16]), SW_REG(fp
[17]), SW_REG(fp
[18]), SW_REG(fp
[19]),
89 SW_REG(fp
[20]), SW_REG(fp
[21]), SW_REG(fp
[22]), SW_REG(fp
[23]),
90 SW_REG(fp
[24]), SW_REG(fp
[25]), SW_REG(fp
[26]), SW_REG(fp
[27]),
91 SW_REG(fp
[28]), SW_REG(fp
[29]), SW_REG(fp
[30]), SW_REG(fp
[31]),
95 static unsigned long zero
;
98 * Get address of register REGNO in task TASK.
100 static unsigned long *
101 get_reg_addr(struct task_struct
* task
, unsigned long regno
)
106 addr
= &task
->thread_info
->pcb
.usp
;
107 } else if (regno
== 65) {
108 addr
= &task
->thread_info
->pcb
.unique
;
109 } else if (regno
== 31 || regno
> 65) {
113 addr
= (void *)task
->thread_info
+ regoff
[regno
];
119 * Get contents of register REGNO in task TASK.
122 get_reg(struct task_struct
* task
, unsigned long regno
)
124 /* Special hack for fpcr -- combine hardware and software bits. */
126 unsigned long fpcr
= *get_reg_addr(task
, regno
);
128 = task
->thread_info
->ieee_state
& IEEE_SW_MASK
;
129 swcr
= swcr_update_status(swcr
, fpcr
);
132 return *get_reg_addr(task
, regno
);
136 * Write contents of register REGNO in task TASK.
139 put_reg(struct task_struct
*task
, unsigned long regno
, unsigned long data
)
142 task
->thread_info
->ieee_state
143 = ((task
->thread_info
->ieee_state
& ~IEEE_SW_MASK
)
144 | (data
& IEEE_SW_MASK
));
145 data
= (data
& FPCR_DYN_MASK
) | ieee_swcr_to_fpcr(data
);
147 *get_reg_addr(task
, regno
) = data
;
152 read_int(struct task_struct
*task
, unsigned long addr
, int * data
)
154 int copied
= access_process_vm(task
, addr
, data
, sizeof(int), 0);
155 return (copied
== sizeof(int)) ? 0 : -EIO
;
159 write_int(struct task_struct
*task
, unsigned long addr
, int data
)
161 int copied
= access_process_vm(task
, addr
, &data
, sizeof(int), 1);
162 return (copied
== sizeof(int)) ? 0 : -EIO
;
169 ptrace_set_bpt(struct task_struct
* child
)
171 int displ
, i
, res
, reg_b
, nsaved
= 0;
172 unsigned int insn
, op_code
;
175 pc
= get_reg(child
, REG_PC
);
176 res
= read_int(child
, pc
, (int *) &insn
);
180 op_code
= insn
>> 26;
181 if (op_code
>= 0x30) {
183 * It's a branch: instead of trying to figure out
184 * whether the branch will be taken or not, we'll put
185 * a breakpoint at either location. This is simpler,
186 * more reliable, and probably not a whole lot slower
187 * than the alternative approach of emulating the
188 * branch (emulation can be tricky for fp branches).
190 displ
= ((s32
)(insn
<< 11)) >> 9;
191 child
->thread_info
->bpt_addr
[nsaved
++] = pc
+ 4;
192 if (displ
) /* guard against unoptimized code */
193 child
->thread_info
->bpt_addr
[nsaved
++]
195 DBG(DBG_BPT
, ("execing branch\n"));
196 } else if (op_code
== 0x1a) {
197 reg_b
= (insn
>> 16) & 0x1f;
198 child
->thread_info
->bpt_addr
[nsaved
++] = get_reg(child
, reg_b
);
199 DBG(DBG_BPT
, ("execing jump\n"));
201 child
->thread_info
->bpt_addr
[nsaved
++] = pc
+ 4;
202 DBG(DBG_BPT
, ("execing normal insn\n"));
205 /* install breakpoints: */
206 for (i
= 0; i
< nsaved
; ++i
) {
207 res
= read_int(child
, child
->thread_info
->bpt_addr
[i
],
211 child
->thread_info
->bpt_insn
[i
] = insn
;
212 DBG(DBG_BPT
, (" -> next_pc=%lx\n",
213 child
->thread_info
->bpt_addr
[i
]));
214 res
= write_int(child
, child
->thread_info
->bpt_addr
[i
],
219 child
->thread_info
->bpt_nsaved
= nsaved
;
224 * Ensure no single-step breakpoint is pending. Returns non-zero
225 * value if child was being single-stepped.
228 ptrace_cancel_bpt(struct task_struct
* child
)
230 int i
, nsaved
= child
->thread_info
->bpt_nsaved
;
232 child
->thread_info
->bpt_nsaved
= 0;
235 printk("ptrace_cancel_bpt: bogus nsaved: %d!\n", nsaved
);
239 for (i
= 0; i
< nsaved
; ++i
) {
240 write_int(child
, child
->thread_info
->bpt_addr
[i
],
241 child
->thread_info
->bpt_insn
[i
]);
243 return (nsaved
!= 0);
247 * Called by kernel/ptrace.c when detaching..
249 * Make sure the single step bit is not set.
251 void ptrace_disable(struct task_struct
*child
)
253 ptrace_cancel_bpt(child
);
257 do_sys_ptrace(long request
, long pid
, long addr
, long data
,
258 struct pt_regs
*regs
)
260 struct task_struct
*child
;
266 DBG(DBG_MEM
, ("request=%ld pid=%ld addr=0x%lx data=0x%lx\n",
267 request
, pid
, addr
, data
));
269 if (request
== PTRACE_TRACEME
) {
270 /* are we already being traced? */
271 if (current
->ptrace
& PT_PTRACED
)
273 ret
= security_ptrace(current
->parent
, current
);
276 /* set the ptrace bit in the process ptrace flags. */
277 current
->ptrace
|= PT_PTRACED
;
281 if (pid
== 1) /* you may not mess with init */
285 read_lock(&tasklist_lock
);
286 child
= find_task_by_pid(pid
);
288 get_task_struct(child
);
289 read_unlock(&tasklist_lock
);
293 if (request
== PTRACE_ATTACH
) {
294 ret
= ptrace_attach(child
);
298 ret
= ptrace_check_attach(child
, request
== PTRACE_KILL
);
303 /* When I and D space are separate, these will need to be fixed. */
304 case PTRACE_PEEKTEXT
: /* read word at location addr. */
305 case PTRACE_PEEKDATA
:
306 copied
= access_process_vm(child
, addr
, &tmp
, sizeof(tmp
), 0);
308 if (copied
!= sizeof(tmp
))
311 regs
->r0
= 0; /* special return: no errors */
315 /* Read register number ADDR. */
317 regs
->r0
= 0; /* special return: no errors */
318 ret
= get_reg(child
, addr
);
319 DBG(DBG_MEM
, ("peek $%ld->%#lx\n", addr
, ret
));
322 /* When I and D space are separate, this will have to be fixed. */
323 case PTRACE_POKETEXT
: /* write the word at location addr. */
324 case PTRACE_POKEDATA
:
326 copied
= access_process_vm(child
, addr
, &tmp
, sizeof(tmp
), 1);
327 ret
= (copied
== sizeof(tmp
)) ? 0 : -EIO
;
330 case PTRACE_POKEUSR
: /* write the specified register */
331 DBG(DBG_MEM
, ("poke $%ld<-%#lx\n", addr
, data
));
332 ret
= put_reg(child
, addr
, data
);
336 /* continue and stop at next (return from) syscall */
337 case PTRACE_CONT
: /* restart after signal. */
339 if (!valid_signal(data
))
341 if (request
== PTRACE_SYSCALL
)
342 set_tsk_thread_flag(child
, TIF_SYSCALL_TRACE
);
344 clear_tsk_thread_flag(child
, TIF_SYSCALL_TRACE
);
345 child
->exit_code
= data
;
346 /* make sure single-step breakpoint is gone. */
347 ptrace_cancel_bpt(child
);
348 wake_up_process(child
);
353 * Make the child exit. Best I can do is send it a sigkill.
354 * perhaps it should be put in the status that it wants to
359 if (child
->exit_state
== EXIT_ZOMBIE
)
361 child
->exit_code
= SIGKILL
;
362 /* make sure single-step breakpoint is gone. */
363 ptrace_cancel_bpt(child
);
364 wake_up_process(child
);
367 case PTRACE_SINGLESTEP
: /* execute single instruction. */
369 if (!valid_signal(data
))
371 /* Mark single stepping. */
372 child
->thread_info
->bpt_nsaved
= -1;
373 clear_tsk_thread_flag(child
, TIF_SYSCALL_TRACE
);
374 child
->exit_code
= data
;
375 wake_up_process(child
);
376 /* give it a chance to run. */
380 case PTRACE_DETACH
: /* detach a process that was attached. */
381 ret
= ptrace_detach(child
, data
);
385 ret
= ptrace_request(child
, request
, addr
, data
);
389 put_task_struct(child
);
398 if (!test_thread_flag(TIF_SYSCALL_TRACE
))
400 if (!(current
->ptrace
& PT_PTRACED
))
402 /* The 0x80 provides a way for the tracing parent to distinguish
403 between a syscall stop and SIGTRAP delivery */
404 ptrace_notify(SIGTRAP
| ((current
->ptrace
& PT_TRACESYSGOOD
)
408 * This isn't the same as continuing with a signal, but it will do
409 * for normal use. strace only continues with a signal if the
410 * stopping signal is not SIGTRAP. -brl
412 if (current
->exit_code
) {
413 send_sig(current
->exit_code
, current
, 1);
414 current
->exit_code
= 0;