2 * linux/arch/m32r/kernel/ptrace.c
4 * Copyright (C) 2002 Hirokazu Takata, Takeo Takahashi
5 * Copyright (C) 2004 Hirokazu Takata, Kei Sakamoto
7 * Original x86 implementation:
9 * edited by Linus Torvalds
11 * Some code taken from sh version:
12 * Copyright (C) 1999, 2000 Kaz Kojima & Niibe Yutaka
13 * Some code taken from arm version:
14 * Copyright (C) 2000 Russell King
17 #include <linux/kernel.h>
18 #include <linux/sched.h>
20 #include <linux/err.h>
21 #include <linux/smp.h>
22 #include <linux/errno.h>
23 #include <linux/ptrace.h>
24 #include <linux/user.h>
25 #include <linux/string.h>
26 #include <linux/signal.h>
28 #include <asm/cacheflush.h>
30 #include <asm/uaccess.h>
31 #include <asm/pgtable.h>
32 #include <asm/processor.h>
33 #include <asm/mmu_context.h>
36 * This routine will get a word off of the process kernel stack.
38 static inline unsigned long int
39 get_stack_long(struct task_struct
*task
, int offset
)
43 stack
= (unsigned long *)task_pt_regs(task
);
49 * This routine will put a word on the process kernel stack.
52 put_stack_long(struct task_struct
*task
, int offset
, unsigned long data
)
56 stack
= (unsigned long *)task_pt_regs(task
);
62 static int reg_offset
[] = {
63 PT_R0
, PT_R1
, PT_R2
, PT_R3
, PT_R4
, PT_R5
, PT_R6
, PT_R7
,
64 PT_R8
, PT_R9
, PT_R10
, PT_R11
, PT_R12
, PT_FP
, PT_LR
, PT_SPU
,
68 * Read the word at offset "off" into the "struct user". We
69 * actually access the pt_regs stored on the kernel stack.
71 static int ptrace_read_user(struct task_struct
*tsk
, unsigned long off
,
72 unsigned long __user
*data
)
76 struct user
* dummy
= NULL
;
79 if ((off
& 3) || off
> sizeof(struct user
) - 3)
85 __asm__
__volatile__ (
92 psw
= get_stack_long(tsk
, PT_PSW
);
93 tmp
= ((psw
>> 8) & 1);
97 unsigned long psw
, bbpsw
;
98 psw
= get_stack_long(tsk
, PT_PSW
);
99 bbpsw
= get_stack_long(tsk
, PT_BBPSW
);
100 tmp
= ((psw
>> 8) & 0xff) | ((bbpsw
& 0xff) << 8);
104 tmp
= get_stack_long(tsk
, PT_BPC
);
110 if (off
< (sizeof(struct pt_regs
) >> 2))
111 tmp
= get_stack_long(tsk
, off
);
113 else if (off
>= (long)(&dummy
->fpu
>> 2) &&
114 off
< (long)(&dummy
->u_fpvalid
>> 2)) {
115 if (!tsk_used_math(tsk
)) {
116 if (off
== (long)(&dummy
->fpu
.fpscr
>> 2))
121 tmp
= ((long *)(&tsk
->thread
.fpu
>> 2))
122 [off
- (long)&dummy
->fpu
];
123 } else if (off
== (long)(&dummy
->u_fpvalid
>> 2))
124 tmp
= !!tsk_used_math(tsk
);
125 #endif /* not NO_FPU */
130 return put_user(tmp
, data
);
133 static int ptrace_write_user(struct task_struct
*tsk
, unsigned long off
,
138 struct user
* dummy
= NULL
;
141 if ((off
& 3) || off
> sizeof(struct user
) - 3)
149 /* We don't allow to modify evb. */
154 /* We allow to modify only cbr in psw */
156 psw
= get_stack_long(tsk
, PT_PSW
);
157 psw
= (psw
& ~0x100) | ((data
& 1) << 8);
158 ret
= put_stack_long(tsk
, PT_PSW
, psw
);
166 if (off
< (sizeof(struct pt_regs
) >> 2))
167 ret
= put_stack_long(tsk
, off
, data
);
169 else if (off
>= (long)(&dummy
->fpu
>> 2) &&
170 off
< (long)(&dummy
->u_fpvalid
>> 2)) {
171 set_stopped_child_used_math(tsk
);
172 ((long *)&tsk
->thread
.fpu
)
173 [off
- (long)&dummy
->fpu
] = data
;
175 } else if (off
== (long)(&dummy
->u_fpvalid
>> 2)) {
176 conditional_stopped_child_used_math(data
, tsk
);
179 #endif /* not NO_FPU */
187 * Get all user integer registers.
189 static int ptrace_getregs(struct task_struct
*tsk
, void __user
*uregs
)
191 struct pt_regs
*regs
= task_pt_regs(tsk
);
193 return copy_to_user(uregs
, regs
, sizeof(struct pt_regs
)) ? -EFAULT
: 0;
197 * Set all user integer registers.
199 static int ptrace_setregs(struct task_struct
*tsk
, void __user
*uregs
)
201 struct pt_regs newregs
;
205 if (copy_from_user(&newregs
, uregs
, sizeof(struct pt_regs
)) == 0) {
206 struct pt_regs
*regs
= task_pt_regs(tsk
);
216 check_condition_bit(struct task_struct
*child
)
218 return (int)((get_stack_long(child
, PT_PSW
) >> 8) & 1);
222 check_condition_src(unsigned long op
, unsigned long regno1
,
223 unsigned long regno2
, struct task_struct
*child
)
225 unsigned long reg1
, reg2
;
227 reg2
= get_stack_long(child
, reg_offset
[regno2
]);
231 reg1
= get_stack_long(child
, reg_offset
[regno1
]);
234 reg1
= get_stack_long(child
, reg_offset
[regno1
]);
241 return (int)reg2
< 0;
243 return (int)reg2
>= 0;
245 return (int)reg2
<= 0;
247 return (int)reg2
> 0;
255 compute_next_pc_for_16bit_insn(unsigned long insn
, unsigned long pc
,
256 unsigned long *next_pc
,
257 struct task_struct
*child
)
259 unsigned long op
, op2
, op3
;
264 if (insn
& 0x00008000)
267 insn
&= 0x7fff; /* right slot */
269 insn
>>= 16; /* left slot */
271 op
= (insn
>> 12) & 0xf;
272 op2
= (insn
>> 8) & 0xf;
273 op3
= (insn
>> 4) & 0xf;
279 if (!check_condition_bit(child
)) {
280 disp
= (long)(insn
<< 24) >> 22;
281 *next_pc
= (pc
& ~0x3) + disp
;
287 if (check_condition_bit(child
)) {
288 disp
= (long)(insn
<< 24) >> 22;
289 *next_pc
= (pc
& ~0x3) + disp
;
295 disp
= (long)(insn
<< 24) >> 22;
296 *next_pc
= (pc
& ~0x3) + disp
;
300 } else if (op
== 0x1) {
303 if (op3
== 0xf) { /* TRAP */
307 /* kernel space is not allowed as next_pc */
309 unsigned long trapno
;
311 __asm__
__volatile__ (
316 *next_pc
= evb
+ (trapno
<< 2);
319 } else if (op3
== 0xd) { /* RTE */
320 *next_pc
= get_stack_long(child
, PT_BPC
);
325 if (op3
== 0xc && check_condition_bit(child
)) {
327 *next_pc
= get_stack_long(child
,
333 if (op3
== 0xc && !check_condition_bit(child
)) {
335 *next_pc
= get_stack_long(child
,
342 if (op3
== 0xc) { /* JMP */
344 *next_pc
= get_stack_long(child
,
358 compute_next_pc_for_32bit_insn(unsigned long insn
, unsigned long pc
,
359 unsigned long *next_pc
,
360 struct task_struct
*child
)
365 unsigned long regno1
, regno2
;
367 op
= (insn
>> 28) & 0xf;
368 if (op
== 0xf) { /* branch 24-bit relative */
369 op2
= (insn
>> 24) & 0xf;
373 if (!check_condition_bit(child
)) {
374 disp
= (long)(insn
<< 8) >> 6;
375 *next_pc
= (pc
& ~0x3) + disp
;
381 if (check_condition_bit(child
)) {
382 disp
= (long)(insn
<< 8) >> 6;
383 *next_pc
= (pc
& ~0x3) + disp
;
389 disp
= (long)(insn
<< 8) >> 6;
390 *next_pc
= (pc
& ~0x3) + disp
;
393 } else if (op
== 0xb) { /* branch 16-bit relative */
394 op2
= (insn
>> 20) & 0xf;
404 regno1
= ((insn
>> 24) & 0xf);
405 regno2
= ((insn
>> 16) & 0xf);
406 if (check_condition_src(op2
, regno1
, regno2
, child
)) {
407 disp
= (long)(insn
<< 16) >> 14;
408 *next_pc
= (pc
& ~0x3) + disp
;
418 compute_next_pc(unsigned long insn
, unsigned long pc
,
419 unsigned long *next_pc
, struct task_struct
*child
)
421 if (insn
& 0x80000000)
422 compute_next_pc_for_32bit_insn(insn
, pc
, next_pc
, child
);
424 compute_next_pc_for_16bit_insn(insn
, pc
, next_pc
, child
);
428 register_debug_trap(struct task_struct
*child
, unsigned long next_pc
,
429 unsigned long next_insn
, unsigned long *code
)
431 struct debug_trap
*p
= &child
->thread
.debug_trap
;
432 unsigned long addr
= next_pc
& ~3;
434 if (p
->nr_trap
== MAX_TRAPS
) {
435 printk("kernel BUG at %s %d: p->nr_trap = %d\n",
436 __FILE__
, __LINE__
, p
->nr_trap
);
439 p
->addr
[p
->nr_trap
] = addr
;
440 p
->insn
[p
->nr_trap
] = next_insn
;
443 *code
= (next_insn
& 0xffff0000) | 0x10f1;
446 if ((next_insn
& 0x80000000) || (next_insn
& 0x8000)) {
450 *code
= (next_insn
& 0xffff) | 0x10f10000;
458 unregister_debug_trap(struct task_struct
*child
, unsigned long addr
,
461 struct debug_trap
*p
= &child
->thread
.debug_trap
;
464 /* Search debug trap entry. */
465 for (i
= 0; i
< p
->nr_trap
; i
++) {
466 if (p
->addr
[i
] == addr
)
469 if (i
>= p
->nr_trap
) {
470 /* The trap may be requested from debugger.
471 * ptrace should do nothing in this case.
476 /* Recover original instruction code. */
479 /* Shift debug trap entries. */
480 while (i
< p
->nr_trap
- 1) {
481 p
->insn
[i
] = p
->insn
[i
+ 1];
482 p
->addr
[i
] = p
->addr
[i
+ 1];
490 unregister_all_debug_traps(struct task_struct
*child
)
492 struct debug_trap
*p
= &child
->thread
.debug_trap
;
495 for (i
= 0; i
< p
->nr_trap
; i
++)
496 access_process_vm(child
, p
->addr
[i
], &p
->insn
[i
], sizeof(p
->insn
[i
]), 1);
501 invalidate_cache(void)
503 #if defined(CONFIG_CHIP_M32700) || defined(CONFIG_CHIP_OPSP)
505 _flush_cache_copyback_all();
507 #else /* ! CONFIG_CHIP_M32700 */
509 /* Invalidate cache */
510 __asm__
__volatile__ (
513 "stb r1, @r0 ; cache off \n\t"
517 "stb r1, @r0 ; cache invalidate \n\t"
520 "ldb r1, @r0 ; invalidate check \n\t"
525 "stb r1, @r0 ; cache on \n\t"
526 : : : "r0", "r1", "memory"
528 /* FIXME: copying-back d-cache and invalidating i-cache are needed.
530 #endif /* CONFIG_CHIP_M32700 */
533 /* Embed a debug trap (TRAP1) code */
535 embed_debug_trap(struct task_struct
*child
, unsigned long next_pc
)
537 unsigned long next_insn
, code
;
538 unsigned long addr
= next_pc
& ~3;
540 if (access_process_vm(child
, addr
, &next_insn
, sizeof(next_insn
), 0)
541 != sizeof(next_insn
)) {
542 return -1; /* error */
545 /* Set a trap code. */
546 if (register_debug_trap(child
, next_pc
, next_insn
, &code
)) {
547 return -1; /* error */
549 if (access_process_vm(child
, addr
, &code
, sizeof(code
), 1)
551 return -1; /* error */
553 return 0; /* success */
557 withdraw_debug_trap(struct pt_regs
*regs
)
562 addr
= (regs
->bpc
- 2) & ~3;
564 if (unregister_debug_trap(current
, addr
, &code
)) {
565 access_process_vm(current
, addr
, &code
, sizeof(code
), 1);
571 init_debug_traps(struct task_struct
*child
)
573 struct debug_trap
*p
= &child
->thread
.debug_trap
;
576 for (i
= 0; i
< MAX_TRAPS
; i
++) {
582 void user_enable_single_step(struct task_struct
*child
)
584 unsigned long next_pc
;
585 unsigned long pc
, insn
;
587 clear_tsk_thread_flag(child
, TIF_SYSCALL_TRACE
);
589 /* Compute next pc. */
590 pc
= get_stack_long(child
, PT_BPC
);
592 if (access_process_vm(child
, pc
&~3, &insn
, sizeof(insn
), 0)
596 compute_next_pc(insn
, pc
, &next_pc
, child
);
597 if (next_pc
& 0x80000000)
600 if (embed_debug_trap(child
, next_pc
))
606 void user_disable_single_step(struct task_struct
*child
)
608 unregister_all_debug_traps(child
);
613 * Called by kernel/ptrace.c when detaching..
615 * Make sure single step bits etc are not set.
617 void ptrace_disable(struct task_struct
*child
)
619 /* nothing to do.. */
623 arch_ptrace(struct task_struct
*child
, long request
,
624 unsigned long addr
, unsigned long data
)
627 unsigned long __user
*datap
= (unsigned long __user
*) data
;
631 * read word at location "addr" in the child process.
633 case PTRACE_PEEKTEXT
:
634 case PTRACE_PEEKDATA
:
635 ret
= generic_ptrace_peekdata(child
, addr
, data
);
639 * read the word at location addr in the USER area.
642 ret
= ptrace_read_user(child
, addr
, datap
);
646 * write the word at location addr.
648 case PTRACE_POKETEXT
:
649 case PTRACE_POKEDATA
:
650 ret
= generic_ptrace_pokedata(child
, addr
, data
);
651 if (ret
== 0 && request
== PTRACE_POKETEXT
)
656 * write the word at location addr in the USER area.
659 ret
= ptrace_write_user(child
, addr
, data
);
663 ret
= ptrace_getregs(child
, datap
);
667 ret
= ptrace_setregs(child
, datap
);
671 ret
= ptrace_request(child
, request
, addr
, data
);
678 /* notification of system call entry/exit
679 * - triggered by current->work.syscall_trace
681 void do_syscall_trace(void)
683 if (!test_thread_flag(TIF_SYSCALL_TRACE
))
685 if (!(current
->ptrace
& PT_PTRACED
))
687 /* the 0x80 provides a way for the tracing parent to distinguish
688 between a syscall stop and SIGTRAP delivery */
689 ptrace_notify(SIGTRAP
| ((current
->ptrace
& PT_TRACESYSGOOD
)
693 * this isn't the same as continuing with a signal, but it will do
694 * for normal use. strace only continues with a signal if the
695 * stopping signal is not SIGTRAP. -brl
697 if (current
->exit_code
) {
698 send_sig(current
->exit_code
, current
, 1);
699 current
->exit_code
= 0;