2 * This file is subject to the terms and conditions of the GNU General Public
3 * License. See the file "COPYING" in the main directory of this archive
6 * arch/sh64/kernel/ptrace.c
8 * Copyright (C) 2000, 2001 Paolo Alberelli
9 * Copyright (C) 2003 Paul Mundt
11 * Started from SH3/4 version:
12 * SuperH version: Copyright (C) 1999, 2000 Kaz Kojima & Niibe Yutaka
14 * Original x86 implementation:
15 * By Ross Biro 1/23/92
16 * edited by Linus Torvalds
20 #include <linux/config.h>
21 #include <linux/kernel.h>
22 #include <linux/rwsem.h>
23 #include <linux/sched.h>
25 #include <linux/smp.h>
26 #include <linux/smp_lock.h>
27 #include <linux/errno.h>
28 #include <linux/ptrace.h>
29 #include <linux/user.h>
30 #include <linux/signal.h>
33 #include <asm/uaccess.h>
34 #include <asm/pgtable.h>
35 #include <asm/system.h>
36 #include <asm/processor.h>
37 #include <asm/mmu_context.h>
39 /* This mask defines the bits of the SR which the user is not allowed to
40 change, which are everything except S, Q, M, PR, SZ, FR. */
41 #define SR_MASK (0xffff8cfd)
44 * does not yet catch signals sent when the child dies.
45 * in exit.c or in signal.c.
49 * This routine will get a word from the user area in the process kernel stack.
51 static inline int get_stack_long(struct task_struct
*task
, int offset
)
55 stack
= (unsigned char *)(task
->thread
.uregs
);
57 return (*((int *)stack
));
60 static inline unsigned long
61 get_fpu_long(struct task_struct
*task
, unsigned long addr
)
65 regs
= (struct pt_regs
*)((unsigned char *)task
+ THREAD_SIZE
) - 1;
67 if (!tsk_used_math(task
)) {
68 if (addr
== offsetof(struct user_fpu_struct
, fpscr
)) {
71 tmp
= 0xffffffffUL
; /* matches initial value in fpu.c */
76 if (last_task_used_math
== task
) {
78 fpsave(&task
->thread
.fpu
.hard
);
80 last_task_used_math
= 0;
84 tmp
= ((long *)&task
->thread
.fpu
)[addr
/ sizeof(unsigned long)];
89 * This routine will put a word into the user area in the process kernel stack.
91 static inline int put_stack_long(struct task_struct
*task
, int offset
,
96 stack
= (unsigned char *)(task
->thread
.uregs
);
98 *(unsigned long *) stack
= data
;
103 put_fpu_long(struct task_struct
*task
, unsigned long addr
, unsigned long data
)
105 struct pt_regs
*regs
;
107 regs
= (struct pt_regs
*)((unsigned char *)task
+ THREAD_SIZE
) - 1;
109 if (!tsk_used_math(task
)) {
110 fpinit(&task
->thread
.fpu
.hard
);
111 set_stopped_child_used_math(task
);
112 } else if (last_task_used_math
== task
) {
114 fpsave(&task
->thread
.fpu
.hard
);
116 last_task_used_math
= 0;
120 ((long *)&task
->thread
.fpu
)[addr
/ sizeof(unsigned long)] = data
;
124 asmlinkage
int sys_ptrace(long request
, long pid
, long addr
, long data
)
126 struct task_struct
*child
;
127 extern void poke_real_address_q(unsigned long long addr
, unsigned long long data
);
128 #define WPC_DBRMODE 0x0d104008
129 static int first_call
= 1;
135 /* Set WPC.DBRMODE to 0. This makes all debug events get
136 * delivered through RESVEC, i.e. into the handlers in entry.S.
137 * (If the kernel was downloaded using a remote gdb, WPC.DBRMODE
138 * would normally be left set to 1, which makes debug events get
139 * delivered through DBRVEC, i.e. into the remote gdb's
140 * handlers. This prevents ptrace getting them, and confuses
141 * the remote gdb.) */
142 printk("DBRMODE set to 0 to permit native debugging\n");
143 poke_real_address_q(WPC_DBRMODE
, 0);
148 if (request
== PTRACE_TRACEME
) {
149 /* are we already being traced? */
150 if (current
->ptrace
& PT_PTRACED
)
152 /* set the ptrace bit in the process flags. */
153 current
->ptrace
|= PT_PTRACED
;
158 read_lock(&tasklist_lock
);
159 child
= find_task_by_pid(pid
);
161 get_task_struct(child
);
162 read_unlock(&tasklist_lock
);
167 if (pid
== 1) /* you may not mess with init */
170 if (request
== PTRACE_ATTACH
) {
171 ret
= ptrace_attach(child
);
175 ret
= ptrace_check_attach(child
, request
== PTRACE_KILL
);
180 /* when I and D space are separate, these will need to be fixed. */
181 case PTRACE_PEEKTEXT
: /* read word at location addr. */
182 case PTRACE_PEEKDATA
: {
186 copied
= access_process_vm(child
, addr
, &tmp
, sizeof(tmp
), 0);
188 if (copied
!= sizeof(tmp
))
190 ret
= put_user(tmp
,(unsigned long *) data
);
194 /* read the word at location addr in the USER area. */
195 case PTRACE_PEEKUSR
: {
199 if ((addr
& 3) || addr
< 0)
202 if (addr
< sizeof(struct pt_regs
))
203 tmp
= get_stack_long(child
, addr
);
204 else if ((addr
>= offsetof(struct user
, fpu
)) &&
205 (addr
< offsetof(struct user
, u_fpvalid
))) {
206 tmp
= get_fpu_long(child
, addr
- offsetof(struct user
, fpu
));
207 } else if (addr
== offsetof(struct user
, u_fpvalid
)) {
208 tmp
= !!tsk_used_math(child
);
212 ret
= put_user(tmp
, (unsigned long *)data
);
216 /* when I and D space are separate, this will have to be fixed. */
217 case PTRACE_POKETEXT
: /* write the word at location addr. */
218 case PTRACE_POKEDATA
:
220 if (access_process_vm(child
, addr
, &data
, sizeof(data
), 1) == sizeof(data
))
226 /* write the word at location addr in the USER area. We must
227 disallow any changes to certain SR bits or u_fpvalid, since
228 this could crash the kernel or result in a security
231 if ((addr
& 3) || addr
< 0)
234 if (addr
< sizeof(struct pt_regs
)) {
235 /* Ignore change of top 32 bits of SR */
236 if (addr
== offsetof (struct pt_regs
, sr
)+4)
241 /* If lower 32 bits of SR, ignore non-user bits */
242 if (addr
== offsetof (struct pt_regs
, sr
))
244 long cursr
= get_stack_long(child
, addr
);
246 data
|= (cursr
& SR_MASK
);
248 ret
= put_stack_long(child
, addr
, data
);
250 else if ((addr
>= offsetof(struct user
, fpu
)) &&
251 (addr
< offsetof(struct user
, u_fpvalid
))) {
252 ret
= put_fpu_long(child
, addr
- offsetof(struct user
, fpu
), data
);
256 case PTRACE_SYSCALL
: /* continue and stop at next (return from) syscall */
257 case PTRACE_CONT
: { /* restart after signal. */
259 if (!valid_signal(data
))
261 if (request
== PTRACE_SYSCALL
)
262 set_tsk_thread_flag(child
, TIF_SYSCALL_TRACE
);
264 clear_tsk_thread_flag(child
, TIF_SYSCALL_TRACE
);
265 child
->exit_code
= data
;
266 wake_up_process(child
);
272 * make the child exit. Best I can do is send it a sigkill.
273 * perhaps it should be put in the status that it wants to
278 if (child
->exit_state
== EXIT_ZOMBIE
) /* already dead */
280 child
->exit_code
= SIGKILL
;
281 wake_up_process(child
);
285 case PTRACE_SINGLESTEP
: { /* set the trap flag. */
286 struct pt_regs
*regs
;
289 if (!valid_signal(data
))
291 clear_tsk_thread_flag(child
, TIF_SYSCALL_TRACE
);
292 if ((child
->ptrace
& PT_DTRACE
) == 0) {
293 /* Spurious delayed TF traps may occur */
294 child
->ptrace
|= PT_DTRACE
;
297 regs
= child
->thread
.uregs
;
299 regs
->sr
|= SR_SSTEP
; /* auto-resetting upon exception */
301 child
->exit_code
= data
;
302 /* give it a chance to run. */
303 wake_up_process(child
);
308 case PTRACE_DETACH
: /* detach a process that was attached. */
309 ret
= ptrace_detach(child
, data
);
313 ret
= ptrace_request(child
, request
, addr
, data
);
317 put_task_struct(child
);
323 asmlinkage
void syscall_trace(void)
325 struct task_struct
*tsk
= current
;
327 if (!test_thread_flag(TIF_SYSCALL_TRACE
))
329 if (!(tsk
->ptrace
& PT_PTRACED
))
332 ptrace_notify(SIGTRAP
| ((current
->ptrace
& PT_TRACESYSGOOD
)
335 * this isn't the same as continuing with a signal, but it will do
336 * for normal use. strace only continues with a signal if the
337 * stopping signal is not SIGTRAP. -brl
339 if (tsk
->exit_code
) {
340 send_sig(tsk
->exit_code
, tsk
, 1);
345 /* Called with interrupts disabled */
346 asmlinkage
void do_single_step(unsigned long long vec
, struct pt_regs
*regs
)
348 /* This is called after a single step exception (DEBUGSS).
349 There is no need to change the PC, as it is a post-execution
350 exception, as entry.S does not do anything to the PC for DEBUGSS.
351 We need to clear the Single Step setting in SR to avoid
352 continually stepping. */
354 regs
->sr
&= ~SR_SSTEP
;
355 force_sig(SIGTRAP
, current
);
358 /* Called with interrupts disabled */
359 asmlinkage
void do_software_break_point(unsigned long long vec
,
360 struct pt_regs
*regs
)
362 /* We need to forward step the PC, to counteract the backstep done
365 force_sig(SIGTRAP
, current
);
370 * Called by kernel/ptrace.c when detaching..
372 * Make sure single step bits etc are not set.
374 void ptrace_disable(struct task_struct
*child
)
376 /* nothing to do.. */