[PATCH] m68k: indent sys_ptrace
[deliverable/linux.git] / arch / m68k / kernel / ptrace.c
CommitLineData
1da177e4
LT
1/*
2 * linux/arch/m68k/kernel/ptrace.c
3 *
4 * Copyright (C) 1994 by Hamish Macdonald
5 * Taken from linux/kernel/ptrace.c and modified for M680x0.
6 * linux/kernel/ptrace.c is by Ross Biro 1/23/92, edited by Linus Torvalds
7 *
8 * This file is subject to the terms and conditions of the GNU General
9 * Public License. See the file COPYING in the main directory of
10 * this archive for more details.
11 */
12
13#include <linux/kernel.h>
14#include <linux/sched.h>
15#include <linux/mm.h>
16#include <linux/smp.h>
17#include <linux/smp_lock.h>
18#include <linux/errno.h>
19#include <linux/ptrace.h>
20#include <linux/user.h>
21#include <linux/config.h>
7ed20e1a 22#include <linux/signal.h>
1da177e4
LT
23
24#include <asm/uaccess.h>
25#include <asm/page.h>
26#include <asm/pgtable.h>
27#include <asm/system.h>
28#include <asm/processor.h>
29
30/*
31 * does not yet catch signals sent when the child dies.
32 * in exit.c or in signal.c.
33 */
34
35/* determines which bits in the SR the user has access to. */
36/* 1 = access 0 = no access */
37#define SR_MASK 0x001f
38
39/* sets the trace bits. */
40#define TRACE_BITS 0x8000
41
42/* Find the stack offset for a register, relative to thread.esp0. */
43#define PT_REG(reg) ((long)&((struct pt_regs *)0)->reg)
44#define SW_REG(reg) ((long)&((struct switch_stack *)0)->reg \
45 - sizeof(struct switch_stack))
46/* Mapping from PT_xxx to the stack offset at which the register is
47 saved. Notice that usp has no stack-slot and needs to be treated
48 specially (see get_reg/put_reg below). */
49static int regoff[] = {
50 [0] = PT_REG(d1),
51 [1] = PT_REG(d2),
52 [2] = PT_REG(d3),
53 [3] = PT_REG(d4),
54 [4] = PT_REG(d5),
55 [5] = SW_REG(d6),
56 [6] = SW_REG(d7),
57 [7] = PT_REG(a0),
58 [8] = PT_REG(a1),
59 [9] = PT_REG(a2),
60 [10] = SW_REG(a3),
61 [11] = SW_REG(a4),
62 [12] = SW_REG(a5),
63 [13] = SW_REG(a6),
64 [14] = PT_REG(d0),
65 [15] = -1,
66 [16] = PT_REG(orig_d0),
67 [17] = PT_REG(sr),
68 [18] = PT_REG(pc),
69};
70
71/*
72 * Get contents of register REGNO in task TASK.
73 */
74static inline long get_reg(struct task_struct *task, int regno)
75{
76 unsigned long *addr;
77
78 if (regno == PT_USP)
79 addr = &task->thread.usp;
80 else if (regno < sizeof(regoff)/sizeof(regoff[0]))
81 addr = (unsigned long *)(task->thread.esp0 + regoff[regno]);
82 else
83 return 0;
84 return *addr;
85}
86
87/*
88 * Write contents of register REGNO in task TASK.
89 */
90static inline int put_reg(struct task_struct *task, int regno,
91 unsigned long data)
92{
93 unsigned long *addr;
94
95 if (regno == PT_USP)
96 addr = &task->thread.usp;
97 else if (regno < sizeof(regoff)/sizeof(regoff[0]))
b3319f50 98 addr = (unsigned long *)(task->thread.esp0 + regoff[regno]);
1da177e4
LT
99 else
100 return -1;
101 *addr = data;
102 return 0;
103}
104
105/*
106 * Called by kernel/ptrace.c when detaching..
107 *
108 * Make sure the single step bit is not set.
109 */
110void ptrace_disable(struct task_struct *child)
111{
112 unsigned long tmp;
113 /* make sure the single step bit is not set. */
114 tmp = get_reg(child, PT_SR) & ~(TRACE_BITS << 16);
115 put_reg(child, PT_SR, tmp);
116 child->thread.work.delayed_trace = 0;
117 child->thread.work.syscall_trace = 0;
118}
119
120asmlinkage int sys_ptrace(long request, long pid, long addr, long data)
121{
122 struct task_struct *child;
123 int ret;
124
125 lock_kernel();
126 ret = -EPERM;
127 if (request == PTRACE_TRACEME) {
128 /* are we already being traced? */
129 if (current->ptrace & PT_PTRACED)
130 goto out;
131 /* set the ptrace bit in the process flags. */
132 current->ptrace |= PT_PTRACED;
133 ret = 0;
134 goto out;
135 }
136 ret = -ESRCH;
137 read_lock(&tasklist_lock);
138 child = find_task_by_pid(pid);
139 if (child)
140 get_task_struct(child);
141 read_unlock(&tasklist_lock);
142 if (!child)
143 goto out;
144
145 ret = -EPERM;
146 if (pid == 1) /* you may not mess with init */
147 goto out_tsk;
148
149 if (request == PTRACE_ATTACH) {
150 ret = ptrace_attach(child);
151 goto out_tsk;
152 }
153
154 ret = ptrace_check_attach(child, request == PTRACE_KILL);
155 if (ret < 0)
156 goto out_tsk;
157
158 switch (request) {
159 /* when I and D space are separate, these will need to be fixed. */
b3319f50
RZ
160 case PTRACE_PEEKTEXT: /* read word at location addr. */
161 case PTRACE_PEEKDATA: {
162 unsigned long tmp;
163 int copied;
164
165 copied = access_process_vm(child, addr, &tmp, sizeof(tmp), 0);
166 ret = -EIO;
167 if (copied != sizeof(tmp))
1da177e4 168 break;
b3319f50
RZ
169 ret = put_user(tmp, (unsigned long *)data);
170 break;
171 }
1da177e4
LT
172
173 /* read the word at location addr in the USER area. */
b3319f50
RZ
174 case PTRACE_PEEKUSR: {
175 unsigned long tmp;
1da177e4 176
b3319f50
RZ
177 ret = -EIO;
178 if ((addr & 3) || addr < 0 ||
179 addr > sizeof(struct user) - 3)
180 break;
1da177e4 181
b3319f50
RZ
182 tmp = 0; /* Default return condition */
183 addr = addr >> 2; /* temporary hack. */
184 ret = -EIO;
185 if (addr < 19) {
186 tmp = get_reg(child, addr);
187 if (addr == PT_SR)
188 tmp >>= 16;
189 } else if (addr >= 21 && addr < 49) {
190 tmp = child->thread.fp[addr - 21];
1da177e4 191#ifdef CONFIG_M68KFPU_EMU
b3319f50
RZ
192 /* Convert internal fpu reg representation
193 * into long double format
194 */
195 if (FPU_IS_EMU && (addr < 45) && !(addr % 3))
196 tmp = ((tmp & 0xffff0000) << 15) |
197 ((tmp & 0x0000ffff) << 16);
1da177e4 198#endif
b3319f50 199 } else
1da177e4 200 break;
b3319f50
RZ
201 ret = put_user(tmp, (unsigned long *)data);
202 break;
203 }
1da177e4 204
b3319f50
RZ
205 /* when I and D space are separate, this will have to be fixed. */
206 case PTRACE_POKETEXT: /* write the word at location addr. */
207 case PTRACE_POKEDATA:
208 ret = 0;
209 if (access_process_vm(child, addr, &data, sizeof(data), 1) == sizeof(data))
1da177e4 210 break;
b3319f50
RZ
211 ret = -EIO;
212 break;
1da177e4 213
b3319f50
RZ
214 case PTRACE_POKEUSR: /* write the word at location addr in the USER area */
215 ret = -EIO;
216 if ((addr & 3) || addr < 0 ||
217 addr > sizeof(struct user) - 3)
1da177e4
LT
218 break;
219
b3319f50 220 addr = addr >> 2; /* temporary hack. */
1da177e4 221
b3319f50
RZ
222 if (addr == PT_SR) {
223 data &= SR_MASK;
224 data <<= 16;
225 data |= get_reg(child, PT_SR) & ~(SR_MASK << 16);
226 }
227 if (addr < 19) {
228 if (put_reg(child, addr, data))
1da177e4 229 break;
1da177e4
LT
230 ret = 0;
231 break;
232 }
b3319f50
RZ
233 if (addr >= 21 && addr < 48) {
234#ifdef CONFIG_M68KFPU_EMU
235 /* Convert long double format
236 * into internal fpu reg representation
237 */
238 if (FPU_IS_EMU && (addr < 45) && !(addr % 3)) {
239 data = (unsigned long)data << 15;
240 data = (data & 0xffff0000) |
241 ((data & 0x0000ffff) >> 1);
242 }
243#endif
244 child->thread.fp[addr - 21] = data;
1da177e4 245 ret = 0;
1da177e4 246 }
b3319f50 247 break;
1da177e4 248
b3319f50
RZ
249 case PTRACE_SYSCALL: /* continue and stop at next (return from) syscall */
250 case PTRACE_CONT: { /* restart after signal. */
251 long tmp;
1da177e4 252
b3319f50
RZ
253 ret = -EIO;
254 if (!valid_signal(data))
255 break;
256 if (request == PTRACE_SYSCALL) {
257 child->thread.work.syscall_trace = ~0;
258 } else {
1da177e4 259 child->thread.work.syscall_trace = 0;
b3319f50
RZ
260 }
261 child->exit_code = data;
262 /* make sure the single step bit is not set. */
263 tmp = get_reg(child, PT_SR) & ~(TRACE_BITS << 16);
264 put_reg(child, PT_SR, tmp);
265 child->thread.work.delayed_trace = 0;
266 wake_up_process(child);
267 ret = 0;
268 break;
269 }
1da177e4 270
b3319f50
RZ
271 /*
272 * make the child exit. Best I can do is send it a sigkill.
273 * perhaps it should be put in the status that it wants to
274 * exit.
275 */
276 case PTRACE_KILL: {
277 long tmp;
278
279 ret = 0;
280 if (child->exit_state == EXIT_ZOMBIE) /* already dead */
1da177e4 281 break;
b3319f50
RZ
282 child->exit_code = SIGKILL;
283 /* make sure the single step bit is not set. */
284 tmp = get_reg(child, PT_SR) & ~(TRACE_BITS << 16);
285 put_reg(child, PT_SR, tmp);
286 child->thread.work.delayed_trace = 0;
287 wake_up_process(child);
288 break;
289 }
290
291 case PTRACE_SINGLESTEP: { /* set the trap flag. */
292 long tmp;
1da177e4 293
b3319f50
RZ
294 ret = -EIO;
295 if (!valid_signal(data))
1da177e4 296 break;
b3319f50
RZ
297 child->thread.work.syscall_trace = 0;
298 tmp = get_reg(child, PT_SR) | (TRACE_BITS << 16);
299 put_reg(child, PT_SR, tmp);
300 child->thread.work.delayed_trace = 1;
301
302 child->exit_code = data;
303 /* give it a chance to run. */
304 wake_up_process(child);
305 ret = 0;
306 break;
307 }
308
309 case PTRACE_DETACH: /* detach a process that was attached. */
310 ret = ptrace_detach(child, data);
311 break;
1da177e4 312
b3319f50
RZ
313 case PTRACE_GETREGS: { /* Get all gp regs from the child. */
314 int i;
315 unsigned long tmp;
316 for (i = 0; i < 19; i++) {
317 tmp = get_reg(child, i);
318 if (i == PT_SR)
1da177e4 319 tmp >>= 16;
b3319f50 320 if (put_user(tmp, (unsigned long *)data)) {
1da177e4
LT
321 ret = -EFAULT;
322 break;
1da177e4 323 }
b3319f50 324 data += sizeof(long);
1da177e4 325 }
b3319f50
RZ
326 ret = 0;
327 break;
328 }
1da177e4 329
b3319f50
RZ
330 case PTRACE_SETREGS: { /* Set all gp regs in the child. */
331 int i;
332 unsigned long tmp;
333 for (i = 0; i < 19; i++) {
334 if (get_user(tmp, (unsigned long *)data)) {
1da177e4
LT
335 ret = -EFAULT;
336 break;
b3319f50
RZ
337 }
338 if (i == PT_SR) {
1da177e4
LT
339 tmp &= SR_MASK;
340 tmp <<= 16;
341 tmp |= get_reg(child, PT_SR) & ~(SR_MASK << 16);
1da177e4 342 }
b3319f50
RZ
343 put_reg(child, i, tmp);
344 data += sizeof(long);
1da177e4 345 }
b3319f50
RZ
346 ret = 0;
347 break;
348 }
1da177e4 349
b3319f50
RZ
350 case PTRACE_GETFPREGS: { /* Get the child FPU state. */
351 ret = 0;
352 if (copy_to_user((void *)data, &child->thread.fp,
353 sizeof(struct user_m68kfp_struct)))
354 ret = -EFAULT;
355 break;
356 }
1da177e4 357
b3319f50
RZ
358 case PTRACE_SETFPREGS: { /* Set the child FPU state. */
359 ret = 0;
360 if (copy_from_user(&child->thread.fp, (void *)data,
361 sizeof(struct user_m68kfp_struct)))
362 ret = -EFAULT;
363 break;
364 }
1da177e4 365
b3319f50
RZ
366 default:
367 ret = ptrace_request(child, request, addr, data);
368 break;
1da177e4
LT
369 }
370out_tsk:
371 put_task_struct(child);
372out:
373 unlock_kernel();
374 return ret;
375}
376
377asmlinkage void syscall_trace(void)
378{
379 if (!current->thread.work.delayed_trace &&
380 !current->thread.work.syscall_trace)
381 return;
382 ptrace_notify(SIGTRAP | ((current->ptrace & PT_TRACESYSGOOD)
383 ? 0x80 : 0));
384 /*
385 * this isn't the same as continuing with a signal, but it will do
386 * for normal use. strace only continues with a signal if the
387 * stopping signal is not SIGTRAP. -brl
388 */
389 if (current->exit_code) {
390 send_sig(current->exit_code, current, 1);
391 current->exit_code = 0;
392 }
393}
This page took 0.07069 seconds and 5 git commands to generate.