2 * This file is subject to the terms and conditions of the GNU General Public
3 * License. See the file "COPYING" in the main directory of this archive
6 * Copyright (C) 1992 Ross Biro
7 * Copyright (C) Linus Torvalds
8 * Copyright (C) 1994, 95, 96, 97, 98, 2000 Ralf Baechle
9 * Copyright (C) 1996 David S. Miller
10 * Kevin D. Kissell, kevink@mips.com and Carsten Langgaard, carstenl@mips.com
11 * Copyright (C) 1999 MIPS Technologies, Inc.
12 * Copyright (C) 2000 Ulf Carlsson
14 * At this time Linux/MIPS64 only supports syscall tracing, even for 32-bit
17 #include <linux/config.h>
18 #include <linux/compiler.h>
19 #include <linux/kernel.h>
20 #include <linux/sched.h>
22 #include <linux/errno.h>
23 #include <linux/ptrace.h>
24 #include <linux/audit.h>
25 #include <linux/smp.h>
26 #include <linux/smp_lock.h>
27 #include <linux/user.h>
28 #include <linux/security.h>
29 #include <linux/signal.h>
31 #include <asm/byteorder.h>
35 #include <asm/mipsregs.h>
36 #include <asm/mipsmtregs.h>
37 #include <asm/pgtable.h>
39 #include <asm/system.h>
40 #include <asm/uaccess.h>
41 #include <asm/bootinfo.h>
45 * Called by kernel/ptrace.c when detaching..
47 * Make sure single step bits etc are not set.
49 void ptrace_disable(struct task_struct *child)
55 * Read a general register set. We always use the 64-bit format, even
56 * for 32-bit kernels and for 32-bit processes on a 64-bit kernel.
57 * Registers are sign extended to fill the available space.
59 int ptrace_getregs (struct task_struct *child, __s64 __user *data)
64 if (!access_ok(VERIFY_WRITE, data, 38 * 8))
67 regs = (struct pt_regs *) ((unsigned long) child->thread_info +
68 THREAD_SIZE - 32 - sizeof(struct pt_regs));
70 for (i = 0; i < 32; i++)
71 __put_user (regs->regs[i], data + i);
72 __put_user (regs->lo, data + EF_LO - EF_R0);
73 __put_user (regs->hi, data + EF_HI - EF_R0);
74 __put_user (regs->cp0_epc, data + EF_CP0_EPC - EF_R0);
75 __put_user (regs->cp0_badvaddr, data + EF_CP0_BADVADDR - EF_R0);
76 __put_user (regs->cp0_status, data + EF_CP0_STATUS - EF_R0);
77 __put_user (regs->cp0_cause, data + EF_CP0_CAUSE - EF_R0);
83 * Write a general register set. As for PTRACE_GETREGS, we always use
84 * the 64-bit format. On a 32-bit kernel only the lower order half
85 * (according to endianness) will be used.
87 int ptrace_setregs (struct task_struct *child, __s64 __user *data)
92 if (!access_ok(VERIFY_READ, data, 38 * 8))
95 regs = (struct pt_regs *) ((unsigned long) child->thread_info +
96 THREAD_SIZE - 32 - sizeof(struct pt_regs));
98 for (i = 0; i < 32; i++)
99 __get_user (regs->regs[i], data + i);
100 __get_user (regs->lo, data + EF_LO - EF_R0);
101 __get_user (regs->hi, data + EF_HI - EF_R0);
102 __get_user (regs->cp0_epc, data + EF_CP0_EPC - EF_R0);
104 /* badvaddr, status, and cause may not be written. */
109 int ptrace_getfpregs (struct task_struct *child, __u32 __user *data)
113 if (!access_ok(VERIFY_WRITE, data, 33 * 8))
116 if (tsk_used_math(child)) {
117 fpureg_t *fregs = get_fpu_regs(child);
118 for (i = 0; i < 32; i++)
119 __put_user (fregs[i], i + (__u64 __user *) data);
121 for (i = 0; i < 32; i++)
122 __put_user ((__u64) -1, i + (__u64 __user *) data);
126 unsigned int flags, tmp;
128 __put_user (child->thread.fpu.hard.fcr31, data + 64);
131 if (cpu_has_mipsmt) {
132 unsigned int vpflags = dvpe();
133 flags = read_c0_status();
135 __asm__ __volatile__("cfc1\t%0,$0" : "=r" (tmp));
136 write_c0_status(flags);
139 flags = read_c0_status();
141 __asm__ __volatile__("cfc1\t%0,$0" : "=r" (tmp));
142 write_c0_status(flags);
145 __put_user (tmp, data + 65);
147 __put_user (child->thread.fpu.soft.fcr31, data + 64);
148 __put_user ((__u32) 0, data + 65);
154 int ptrace_setfpregs (struct task_struct *child, __u32 __user *data)
159 if (!access_ok(VERIFY_READ, data, 33 * 8))
162 fregs = get_fpu_regs(child);
164 for (i = 0; i < 32; i++)
165 __get_user (fregs[i], i + (__u64 __user *) data);
168 __get_user (child->thread.fpu.hard.fcr31, data + 64);
170 __get_user (child->thread.fpu.soft.fcr31, data + 64);
172 /* FIR may not be written. */
177 asmlinkage long sys_ptrace(long request, long pid, long addr, long data)
179 struct task_struct *child;
183 printk("ptrace(r=%d,pid=%d,addr=%08lx,data=%08lx)\n",
184 (int) request, (int) pid, (unsigned long) addr,
185 (unsigned long) data);
189 if (request == PTRACE_TRACEME) {
190 /* are we already being traced? */
191 if (current->ptrace & PT_PTRACED)
193 if ((ret = security_ptrace(current->parent, current)))
195 /* set the ptrace bit in the process flags. */
196 current->ptrace |= PT_PTRACED;
201 read_lock(&tasklist_lock);
202 child = find_task_by_pid(pid);
204 get_task_struct(child);
205 read_unlock(&tasklist_lock);
210 if (pid == 1) /* you may not mess with init */
213 if (request == PTRACE_ATTACH) {
214 ret = ptrace_attach(child);
218 ret = ptrace_check_attach(child, request == PTRACE_KILL);
223 /* when I and D space are separate, these will need to be fixed. */
224 case PTRACE_PEEKTEXT: /* read word at location addr. */
225 case PTRACE_PEEKDATA: {
229 copied = access_process_vm(child, addr, &tmp, sizeof(tmp), 0);
231 if (copied != sizeof(tmp))
233 ret = put_user(tmp,(unsigned long __user *) data);
237 /* Read the word at location addr in the USER area. */
238 case PTRACE_PEEKUSR: {
239 struct pt_regs *regs;
240 unsigned long tmp = 0;
242 regs = (struct pt_regs *) ((unsigned long) child->thread_info +
243 THREAD_SIZE - 32 - sizeof(struct pt_regs));
244 ret = 0; /* Default return value. */
248 tmp = regs->regs[addr];
250 case FPR_BASE ... FPR_BASE + 31:
251 if (tsk_used_math(child)) {
252 fpureg_t *fregs = get_fpu_regs(child);
256 * The odd registers are actually the high
257 * order bits of the values stored in the even
258 * registers - unless we're using r2k_switch.S.
261 tmp = (unsigned long) (fregs[((addr & ~1) - 32)] >> 32);
263 tmp = (unsigned long) (fregs[(addr - 32)] & 0xffffffff);
266 tmp = fregs[addr - FPR_BASE];
269 tmp = -1; /* FP not yet used */
276 tmp = regs->cp0_cause;
279 tmp = regs->cp0_badvaddr;
289 tmp = child->thread.fpu.hard.fcr31;
291 tmp = child->thread.fpu.soft.fcr31;
293 case FPC_EIR: { /* implementation / version register */
300 if (cpu_has_mipsmt) {
301 unsigned int vpflags = dvpe();
302 flags = read_c0_status();
304 __asm__ __volatile__("cfc1\t%0,$0": "=r" (tmp));
305 write_c0_status(flags);
308 flags = read_c0_status();
310 __asm__ __volatile__("cfc1\t%0,$0": "=r" (tmp));
311 write_c0_status(flags);
316 case DSP_BASE ... DSP_BASE + 5: {
324 if (child->thread.dsp.used_dsp) {
325 dregs = __get_dsp_regs(child);
326 tmp = (unsigned long) (dregs[addr - DSP_BASE]);
328 tmp = -1; /* DSP registers yet used */
338 tmp = child->thread.dsp.dspcontrol;
345 ret = put_user(tmp, (unsigned long __user *) data);
349 /* when I and D space are separate, this will have to be fixed. */
350 case PTRACE_POKETEXT: /* write the word at location addr. */
351 case PTRACE_POKEDATA:
353 if (access_process_vm(child, addr, &data, sizeof(data), 1)
359 case PTRACE_POKEUSR: {
360 struct pt_regs *regs;
362 regs = (struct pt_regs *) ((unsigned long) child->thread_info +
363 THREAD_SIZE - 32 - sizeof(struct pt_regs));
367 regs->regs[addr] = data;
369 case FPR_BASE ... FPR_BASE + 31: {
370 fpureg_t *fregs = get_fpu_regs(child);
372 if (!tsk_used_math(child)) {
373 /* FP not yet used */
374 memset(&child->thread.fpu.hard, ~0,
375 sizeof(child->thread.fpu.hard));
376 child->thread.fpu.hard.fcr31 = 0;
380 * The odd registers are actually the high order bits
381 * of the values stored in the even registers - unless
382 * we're using r2k_switch.S.
385 fregs[(addr & ~1) - FPR_BASE] &= 0xffffffff;
386 fregs[(addr & ~1) - FPR_BASE] |= ((unsigned long long) data) << 32;
388 fregs[addr - FPR_BASE] &= ~0xffffffffLL;
389 fregs[addr - FPR_BASE] |= data;
393 fregs[addr - FPR_BASE] = data;
398 regs->cp0_epc = data;
408 child->thread.fpu.hard.fcr31 = data;
410 child->thread.fpu.soft.fcr31 = data;
412 case DSP_BASE ... DSP_BASE + 5: {
420 dregs = __get_dsp_regs(child);
421 dregs[addr - DSP_BASE] = data;
429 child->thread.dsp.dspcontrol = data;
432 /* The rest are not allowed. */
440 ret = ptrace_getregs (child, (__u64 __user *) data);
444 ret = ptrace_setregs (child, (__u64 __user *) data);
447 case PTRACE_GETFPREGS:
448 ret = ptrace_getfpregs (child, (__u32 __user *) data);
451 case PTRACE_SETFPREGS:
452 ret = ptrace_setfpregs (child, (__u32 __user *) data);
455 case PTRACE_SYSCALL: /* continue and stop at next (return from) syscall */
456 case PTRACE_CONT: { /* restart after signal. */
458 if (!valid_signal(data))
460 if (request == PTRACE_SYSCALL) {
461 set_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
464 clear_tsk_thread_flag(child, TIF_SYSCALL_TRACE);
466 child->exit_code = data;
467 wake_up_process(child);
473 * make the child exit. Best I can do is send it a sigkill.
474 * perhaps it should be put in the status that it wants to
479 if (child->exit_state == EXIT_ZOMBIE) /* already dead */
481 child->exit_code = SIGKILL;
482 wake_up_process(child);
485 case PTRACE_DETACH: /* detach a process that was attached. */
486 ret = ptrace_detach(child, data);
489 case PTRACE_GET_THREAD_AREA:
490 ret = put_user(child->thread_info->tp_value,
491 (unsigned long __user *) data);
495 ret = ptrace_request(child, request, addr, data);
500 put_task_struct(child);
506 static inline int audit_arch(void)
510 arch |= __AUDIT_ARCH_64BIT;
512 #if defined(__LITTLE_ENDIAN)
513 arch |= __AUDIT_ARCH_LE;
519 * Notification of system call entry/exit
520 * - triggered by current->work.syscall_trace
522 asmlinkage void do_syscall_trace(struct pt_regs *regs, int entryexit)
524 if (unlikely(current->audit_context) && entryexit)
525 audit_syscall_exit(current, AUDITSC_RESULT(regs->regs[2]),
528 if (!(current->ptrace & PT_PTRACED))
530 if (!test_thread_flag(TIF_SYSCALL_TRACE))
533 /* The 0x80 provides a way for the tracing parent to distinguish
534 between a syscall stop and SIGTRAP delivery */
535 ptrace_notify(SIGTRAP | ((current->ptrace & PT_TRACESYSGOOD) ?
539 * this isn't the same as continuing with a signal, but it will do
540 * for normal use. strace only continues with a signal if the
541 * stopping signal is not SIGTRAP. -brl
543 if (current->exit_code) {
544 send_sig(current->exit_code, current, 1);
545 current->exit_code = 0;
548 if (unlikely(current->audit_context) && !entryexit)
549 audit_syscall_entry(current, audit_arch(), regs->regs[2],
550 regs->regs[4], regs->regs[5],
551 regs->regs[6], regs->regs[7]);