1
2
3
4
5
6
7
8#undef DEBUG
9#include <linux/kernel.h>
10#include <linux/sched.h>
11#include <linux/mm.h>
12#include <linux/ptrace.h>
13#include <linux/errno.h>
14#include <linux/user.h>
15#include <linux/security.h>
16#include <linux/unistd.h>
17#include <linux/notifier.h>
18
19#include <asm/traps.h>
20#include <asm/uaccess.h>
21#include <asm/ocd.h>
22#include <asm/mmu_context.h>
23#include <linux/kdebug.h>
24
25static struct pt_regs *get_user_regs(struct task_struct *tsk)
26{
27 return (struct pt_regs *)((unsigned long)task_stack_page(tsk) +
28 THREAD_SIZE - sizeof(struct pt_regs));
29}
30
31void user_enable_single_step(struct task_struct *tsk)
32{
33 pr_debug("user_enable_single_step: pid=%u, PC=0x%08lx, SR=0x%08lx\n",
34 tsk->pid, task_pt_regs(tsk)->pc, task_pt_regs(tsk)->sr);
35
36
37
38
39
40
41
42
43
44
45
46
47
48 set_tsk_thread_flag(tsk, TIF_BREAKPOINT);
49 set_tsk_thread_flag(tsk, TIF_SINGLE_STEP);
50}
51
52void user_disable_single_step(struct task_struct *child)
53{
54
55}
56
57
58
59
60
61
62void ptrace_disable(struct task_struct *child)
63{
64 clear_tsk_thread_flag(child, TIF_SINGLE_STEP);
65 clear_tsk_thread_flag(child, TIF_BREAKPOINT);
66 ocd_disable(child);
67}
68
69
70
71
72
73static int ptrace_read_user(struct task_struct *tsk, unsigned long offset,
74 unsigned long __user *data)
75{
76 unsigned long *regs;
77 unsigned long value;
78
79 if (offset & 3 || offset >= sizeof(struct user)) {
80 printk("ptrace_read_user: invalid offset 0x%08lx\n", offset);
81 return -EIO;
82 }
83
84 regs = (unsigned long *)get_user_regs(tsk);
85
86 value = 0;
87 if (offset < sizeof(struct pt_regs))
88 value = regs[offset / sizeof(regs[0])];
89
90 pr_debug("ptrace_read_user(%s[%u], %#lx, %p) -> %#lx\n",
91 tsk->comm, tsk->pid, offset, data, value);
92
93 return put_user(value, data);
94}
95
96
97
98
99
100
101static int ptrace_write_user(struct task_struct *tsk, unsigned long offset,
102 unsigned long value)
103{
104 unsigned long *regs;
105
106 pr_debug("ptrace_write_user(%s[%u], %#lx, %#lx)\n",
107 tsk->comm, tsk->pid, offset, value);
108
109 if (offset & 3 || offset >= sizeof(struct user)) {
110 pr_debug(" invalid offset 0x%08lx\n", offset);
111 return -EIO;
112 }
113
114 if (offset >= sizeof(struct pt_regs))
115 return 0;
116
117 regs = (unsigned long *)get_user_regs(tsk);
118 regs[offset / sizeof(regs[0])] = value;
119
120 return 0;
121}
122
123static int ptrace_getregs(struct task_struct *tsk, void __user *uregs)
124{
125 struct pt_regs *regs = get_user_regs(tsk);
126
127 return copy_to_user(uregs, regs, sizeof(*regs)) ? -EFAULT : 0;
128}
129
130static int ptrace_setregs(struct task_struct *tsk, const void __user *uregs)
131{
132 struct pt_regs newregs;
133 int ret;
134
135 ret = -EFAULT;
136 if (copy_from_user(&newregs, uregs, sizeof(newregs)) == 0) {
137 struct pt_regs *regs = get_user_regs(tsk);
138
139 ret = -EINVAL;
140 if (valid_user_regs(&newregs)) {
141 *regs = newregs;
142 ret = 0;
143 }
144 }
145
146 return ret;
147}
148
149long arch_ptrace(struct task_struct *child, long request,
150 unsigned long addr, unsigned long data)
151{
152 int ret;
153 void __user *datap = (void __user *) data;
154
155 switch (request) {
156
157 case PTRACE_PEEKTEXT:
158 case PTRACE_PEEKDATA:
159 ret = generic_ptrace_peekdata(child, addr, data);
160 break;
161
162 case PTRACE_PEEKUSR:
163 ret = ptrace_read_user(child, addr, datap);
164 break;
165
166
167 case PTRACE_POKETEXT:
168 case PTRACE_POKEDATA:
169 ret = generic_ptrace_pokedata(child, addr, data);
170 break;
171
172 case PTRACE_POKEUSR:
173 ret = ptrace_write_user(child, addr, data);
174 break;
175
176 case PTRACE_GETREGS:
177 ret = ptrace_getregs(child, datap);
178 break;
179
180 case PTRACE_SETREGS:
181 ret = ptrace_setregs(child, datap);
182 break;
183
184 default:
185 ret = ptrace_request(child, request, addr, data);
186 break;
187 }
188
189 return ret;
190}
191
192asmlinkage void syscall_trace(void)
193{
194 if (!test_thread_flag(TIF_SYSCALL_TRACE))
195 return;
196 if (!(current->ptrace & PT_PTRACED))
197 return;
198
199
200
201 ptrace_notify(SIGTRAP | ((current->ptrace & PT_TRACESYSGOOD)
202 ? 0x80 : 0));
203
204
205
206
207
208
209 if (current->exit_code) {
210 pr_debug("syscall_trace: sending signal %d to PID %u\n",
211 current->exit_code, current->pid);
212 send_sig(current->exit_code, current, 1);
213 current->exit_code = 0;
214 }
215}
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232extern void debug_trampoline(void);
233
234asmlinkage struct pt_regs *do_debug(struct pt_regs *regs)
235{
236 struct thread_info *ti;
237 unsigned long trampoline_addr;
238 u32 status;
239 u32 ctrl;
240 int code;
241
242 status = ocd_read(DS);
243 ti = current_thread_info();
244 code = TRAP_BRKPT;
245
246 pr_debug("do_debug: status=0x%08x PC=0x%08lx SR=0x%08lx tif=0x%08lx\n",
247 status, regs->pc, regs->sr, ti->flags);
248
249 if (!user_mode(regs)) {
250 unsigned long die_val = DIE_BREAKPOINT;
251
252 if (status & (1 << OCD_DS_SSS_BIT))
253 die_val = DIE_SSTEP;
254
255 if (notify_die(die_val, "ptrace", regs, 0, 0, SIGTRAP)
256 == NOTIFY_STOP)
257 return regs;
258
259 if ((status & (1 << OCD_DS_SWB_BIT))
260 && test_and_clear_ti_thread_flag(
261 ti, TIF_BREAKPOINT)) {
262
263
264
265
266
267
268
269 regs++;
270 pr_debug(" -> TIF_BREAKPOINT done, adjusted regs:"
271 "PC=0x%08lx SR=0x%08lx\n",
272 regs->pc, regs->sr);
273 BUG_ON(!user_mode(regs));
274
275 if (test_thread_flag(TIF_SINGLE_STEP)) {
276 pr_debug("Going to do single step...\n");
277 return regs;
278 }
279
280
281
282
283
284 code = TRAP_TRACE;
285 } else if ((status & (1 << OCD_DS_SSS_BIT))
286 && test_ti_thread_flag(ti, TIF_SINGLE_STEP)) {
287
288 pr_debug("Stepped into something, "
289 "setting TIF_BREAKPOINT...\n");
290 set_ti_thread_flag(ti, TIF_BREAKPOINT);
291
292
293
294
295
296
297
298
299
300
301
302
303 if ((regs->sr & MODE_MASK) == MODE_EXCEPTION) {
304 trampoline_addr
305 = (unsigned long)&debug_trampoline;
306
307 pr_debug("Setting up trampoline...\n");
308 ti->rar_saved = sysreg_read(RAR_EX);
309 ti->rsr_saved = sysreg_read(RSR_EX);
310 sysreg_write(RAR_EX, trampoline_addr);
311 sysreg_write(RSR_EX, (MODE_EXCEPTION
312 | SR_EM | SR_GM));
313 BUG_ON(ti->rsr_saved & MODE_MASK);
314 }
315
316
317
318
319
320
321
322
323 if ((regs->sr & MODE_MASK) == MODE_SUPERVISOR) {
324 pr_debug("Supervisor; no single step\n");
325 clear_ti_thread_flag(ti, TIF_SINGLE_STEP);
326 }
327
328 ctrl = ocd_read(DC);
329 ctrl &= ~(1 << OCD_DC_SS_BIT);
330 ocd_write(DC, ctrl);
331
332 return regs;
333 } else {
334 printk(KERN_ERR "Unexpected OCD_DS value: 0x%08x\n",
335 status);
336 printk(KERN_ERR "Thread flags: 0x%08lx\n", ti->flags);
337 die("Unhandled debug trap in kernel mode",
338 regs, SIGTRAP);
339 }
340 } else if (status & (1 << OCD_DS_SSS_BIT)) {
341
342 code = TRAP_TRACE;
343
344 ctrl = ocd_read(DC);
345 ctrl &= ~(1 << OCD_DC_SS_BIT);
346 ocd_write(DC, ctrl);
347 }
348
349 pr_debug("Sending SIGTRAP: code=%d PC=0x%08lx SR=0x%08lx\n",
350 code, regs->pc, regs->sr);
351
352 clear_thread_flag(TIF_SINGLE_STEP);
353 _exception(SIGTRAP, regs, code, instruction_pointer(regs));
354
355 return regs;
356}
357