PTRACE_PEEKDATA consolidation
[linux-2.6/openmoko-kernel.git] / arch / avr32 / kernel / ptrace.c
blob1043fdc2df7ff476444fd845171640611247ec7b
1 /*
2 * Copyright (C) 2004-2006 Atmel Corporation
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
7 */
8 #undef DEBUG
9 #include <linux/kernel.h>
10 #include <linux/sched.h>
11 #include <linux/mm.h>
12 #include <linux/ptrace.h>
13 #include <linux/errno.h>
14 #include <linux/user.h>
15 #include <linux/security.h>
16 #include <linux/unistd.h>
17 #include <linux/notifier.h>
19 #include <asm/traps.h>
20 #include <asm/uaccess.h>
21 #include <asm/ocd.h>
22 #include <asm/mmu_context.h>
23 #include <linux/kdebug.h>
25 static struct pt_regs *get_user_regs(struct task_struct *tsk)
27 return (struct pt_regs *)((unsigned long)task_stack_page(tsk) +
28 THREAD_SIZE - sizeof(struct pt_regs));
31 static void ptrace_single_step(struct task_struct *tsk)
33 pr_debug("ptrace_single_step: pid=%u, SR=0x%08lx\n",
34 tsk->pid, tsk->thread.cpu_context.sr);
35 if (!(tsk->thread.cpu_context.sr & SR_D)) {
37 * Set a breakpoint at the current pc to force the
38 * process into debug mode. The syscall/exception
39 * exit code will set a breakpoint at the return
40 * address when this flag is set.
42 pr_debug("ptrace_single_step: Setting TIF_BREAKPOINT\n");
43 set_tsk_thread_flag(tsk, TIF_BREAKPOINT);
46 /* The monitor code will do the actual step for us */
47 set_tsk_thread_flag(tsk, TIF_SINGLE_STEP);
51 * Called by kernel/ptrace.c when detaching
53 * Make sure any single step bits, etc. are not set
55 void ptrace_disable(struct task_struct *child)
57 clear_tsk_thread_flag(child, TIF_SINGLE_STEP);
61 * Handle hitting a breakpoint
63 static void ptrace_break(struct task_struct *tsk, struct pt_regs *regs)
65 siginfo_t info;
67 info.si_signo = SIGTRAP;
68 info.si_errno = 0;
69 info.si_code = TRAP_BRKPT;
70 info.si_addr = (void __user *)instruction_pointer(regs);
72 pr_debug("ptrace_break: Sending SIGTRAP to PID %u (pc = 0x%p)\n",
73 tsk->pid, info.si_addr);
74 force_sig_info(SIGTRAP, &info, tsk);
78 * Read the word at offset "offset" into the task's "struct user". We
79 * actually access the pt_regs struct stored on the kernel stack.
81 static int ptrace_read_user(struct task_struct *tsk, unsigned long offset,
82 unsigned long __user *data)
84 unsigned long *regs;
85 unsigned long value;
87 pr_debug("ptrace_read_user(%p, %#lx, %p)\n",
88 tsk, offset, data);
90 if (offset & 3 || offset >= sizeof(struct user)) {
91 printk("ptrace_read_user: invalid offset 0x%08lx\n", offset);
92 return -EIO;
95 regs = (unsigned long *)get_user_regs(tsk);
97 value = 0;
98 if (offset < sizeof(struct pt_regs))
99 value = regs[offset / sizeof(regs[0])];
101 return put_user(value, data);
105 * Write the word "value" to offset "offset" into the task's "struct
106 * user". We actually access the pt_regs struct stored on the kernel
107 * stack.
109 static int ptrace_write_user(struct task_struct *tsk, unsigned long offset,
110 unsigned long value)
112 unsigned long *regs;
114 if (offset & 3 || offset >= sizeof(struct user)) {
115 printk("ptrace_write_user: invalid offset 0x%08lx\n", offset);
116 return -EIO;
119 if (offset >= sizeof(struct pt_regs))
120 return 0;
122 regs = (unsigned long *)get_user_regs(tsk);
123 regs[offset / sizeof(regs[0])] = value;
125 return 0;
128 static int ptrace_getregs(struct task_struct *tsk, void __user *uregs)
130 struct pt_regs *regs = get_user_regs(tsk);
132 return copy_to_user(uregs, regs, sizeof(*regs)) ? -EFAULT : 0;
135 static int ptrace_setregs(struct task_struct *tsk, const void __user *uregs)
137 struct pt_regs newregs;
138 int ret;
140 ret = -EFAULT;
141 if (copy_from_user(&newregs, uregs, sizeof(newregs)) == 0) {
142 struct pt_regs *regs = get_user_regs(tsk);
144 ret = -EINVAL;
145 if (valid_user_regs(&newregs)) {
146 *regs = newregs;
147 ret = 0;
151 return ret;
154 long arch_ptrace(struct task_struct *child, long request, long addr, long data)
156 int ret;
158 pr_debug("arch_ptrace(%ld, %d, %#lx, %#lx)\n",
159 request, child->pid, addr, data);
161 pr_debug("ptrace: Enabling monitor mode...\n");
162 __mtdr(DBGREG_DC, __mfdr(DBGREG_DC) | DC_MM | DC_DBE);
164 switch (request) {
165 /* Read the word at location addr in the child process */
166 case PTRACE_PEEKTEXT:
167 case PTRACE_PEEKDATA:
168 ret = generic_ptrace_peekdata(child, addr, data);
169 break;
171 case PTRACE_PEEKUSR:
172 ret = ptrace_read_user(child, addr,
173 (unsigned long __user *)data);
174 break;
176 /* Write the word in data at location addr */
177 case PTRACE_POKETEXT:
178 case PTRACE_POKEDATA:
179 ret = access_process_vm(child, addr, &data, sizeof(data), 1);
180 if (ret == sizeof(data))
181 ret = 0;
182 else
183 ret = -EIO;
184 break;
186 case PTRACE_POKEUSR:
187 ret = ptrace_write_user(child, addr, data);
188 break;
190 /* continue and stop at next (return from) syscall */
191 case PTRACE_SYSCALL:
192 /* restart after signal */
193 case PTRACE_CONT:
194 ret = -EIO;
195 if (!valid_signal(data))
196 break;
197 if (request == PTRACE_SYSCALL)
198 set_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
199 else
200 clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
201 child->exit_code = data;
202 /* XXX: Are we sure no breakpoints are active here? */
203 wake_up_process(child);
204 ret = 0;
205 break;
208 * Make the child exit. Best I can do is send it a
209 * SIGKILL. Perhaps it should be put in the status that it
210 * wants to exit.
212 case PTRACE_KILL:
213 ret = 0;
214 if (child->exit_state == EXIT_ZOMBIE)
215 break;
216 child->exit_code = SIGKILL;
217 wake_up_process(child);
218 break;
221 * execute single instruction.
223 case PTRACE_SINGLESTEP:
224 ret = -EIO;
225 if (!valid_signal(data))
226 break;
227 clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
228 ptrace_single_step(child);
229 child->exit_code = data;
230 wake_up_process(child);
231 ret = 0;
232 break;
234 /* Detach a process that was attached */
235 case PTRACE_DETACH:
236 ret = ptrace_detach(child, data);
237 break;
239 case PTRACE_GETREGS:
240 ret = ptrace_getregs(child, (void __user *)data);
241 break;
243 case PTRACE_SETREGS:
244 ret = ptrace_setregs(child, (const void __user *)data);
245 break;
247 default:
248 ret = ptrace_request(child, request, addr, data);
249 break;
252 pr_debug("sys_ptrace returning %d (DC = 0x%08lx)\n", ret, __mfdr(DBGREG_DC));
253 return ret;
256 asmlinkage void syscall_trace(void)
258 pr_debug("syscall_trace called\n");
259 if (!test_thread_flag(TIF_SYSCALL_TRACE))
260 return;
261 if (!(current->ptrace & PT_PTRACED))
262 return;
264 pr_debug("syscall_trace: notifying parent\n");
265 /* The 0x80 provides a way for the tracing parent to
266 * distinguish between a syscall stop and SIGTRAP delivery */
267 ptrace_notify(SIGTRAP | ((current->ptrace & PT_TRACESYSGOOD)
268 ? 0x80 : 0));
271 * this isn't the same as continuing with a signal, but it
272 * will do for normal use. strace only continues with a
273 * signal if the stopping signal is not SIGTRAP. -brl
275 if (current->exit_code) {
276 pr_debug("syscall_trace: sending signal %d to PID %u\n",
277 current->exit_code, current->pid);
278 send_sig(current->exit_code, current, 1);
279 current->exit_code = 0;
283 asmlinkage void do_debug_priv(struct pt_regs *regs)
285 unsigned long dc, ds;
286 unsigned long die_val;
288 ds = __mfdr(DBGREG_DS);
290 pr_debug("do_debug_priv: pc = %08lx, ds = %08lx\n", regs->pc, ds);
292 if (ds & DS_SSS)
293 die_val = DIE_SSTEP;
294 else
295 die_val = DIE_BREAKPOINT;
297 if (notify_die(die_val, "ptrace", regs, 0, 0, SIGTRAP) == NOTIFY_STOP)
298 return;
300 if (likely(ds & DS_SSS)) {
301 extern void itlb_miss(void);
302 extern void tlb_miss_common(void);
303 struct thread_info *ti;
305 dc = __mfdr(DBGREG_DC);
306 dc &= ~DC_SS;
307 __mtdr(DBGREG_DC, dc);
309 ti = current_thread_info();
310 set_ti_thread_flag(ti, TIF_BREAKPOINT);
312 /* The TLB miss handlers don't check thread flags */
313 if ((regs->pc >= (unsigned long)&itlb_miss)
314 && (regs->pc <= (unsigned long)&tlb_miss_common)) {
315 __mtdr(DBGREG_BWA2A, sysreg_read(RAR_EX));
316 __mtdr(DBGREG_BWC2A, 0x40000001 | (get_asid() << 1));
320 * If we're running in supervisor mode, the breakpoint
321 * will take us where we want directly, no need to
322 * single step.
324 if ((regs->sr & MODE_MASK) != MODE_SUPERVISOR)
325 set_ti_thread_flag(ti, TIF_SINGLE_STEP);
326 } else {
327 panic("Unable to handle debug trap at pc = %08lx\n",
328 regs->pc);
333 * Handle breakpoints, single steps and other debuggy things. To keep
334 * things simple initially, we run with interrupts and exceptions
335 * disabled all the time.
337 asmlinkage void do_debug(struct pt_regs *regs)
339 unsigned long dc, ds;
341 ds = __mfdr(DBGREG_DS);
342 pr_debug("do_debug: pc = %08lx, ds = %08lx\n", regs->pc, ds);
344 if (test_thread_flag(TIF_BREAKPOINT)) {
345 pr_debug("TIF_BREAKPOINT set\n");
346 /* We're taking care of it */
347 clear_thread_flag(TIF_BREAKPOINT);
348 __mtdr(DBGREG_BWC2A, 0);
351 if (test_thread_flag(TIF_SINGLE_STEP)) {
352 pr_debug("TIF_SINGLE_STEP set, ds = 0x%08lx\n", ds);
353 if (ds & DS_SSS) {
354 dc = __mfdr(DBGREG_DC);
355 dc &= ~DC_SS;
356 __mtdr(DBGREG_DC, dc);
358 clear_thread_flag(TIF_SINGLE_STEP);
359 ptrace_break(current, regs);
361 } else {
362 /* regular breakpoint */
363 ptrace_break(current, regs);