2 * x86 single-step support code, common to 32-bit and 64-bit.
4 #include <linux/sched.h>
6 #include <linux/ptrace.h>
11 unsigned long convert_rip_to_linear(struct task_struct *child, struct pt_regs *regs)
13 unsigned long addr, seg;
17 seg = regs->cs & 0xffff;
20 seg = regs->xcs & 0xffff;
21 if (regs->eflags & X86_EFLAGS_VM) {
22 addr = (addr & 0xffff) + (seg << 4);
28 * We'll assume that the code segments in the GDT
29 * are all zero-based. That is largely true: the
30 * TLS segments are used for data, and the PNPBIOS
31 * and APM bios ones we just ignore here.
33 if ((seg & SEGMENT_TI_MASK) == SEGMENT_LDT) {
39 mutex_lock(&child->mm->context.lock);
40 if (unlikely((seg >> 3) >= child->mm->context.size))
41 addr = -1L; /* bogus selector, access would fault */
43 desc = child->mm->context.ldt + seg;
44 base = ((desc[0] >> 16) |
45 ((desc[1] & 0xff) << 16) |
46 (desc[1] & 0xff000000));
48 /* 16-bit code segment? */
49 if (!((desc[1] >> 22) & 1))
53 mutex_unlock(&child->mm->context.lock);
59 static int is_setting_trap_flag(struct task_struct *child, struct pt_regs *regs)
62 unsigned char opcode[15];
63 unsigned long addr = convert_rip_to_linear(child, regs);
65 copied = access_process_vm(child, addr, opcode, sizeof(opcode), 0);
66 for (i = 0; i < copied; i++) {
74 /* opcode and address size prefixes */
77 /* irrelevant prefixes (segment overrides and repeats) */
81 case 0xf0: case 0xf2: case 0xf3:
86 if (regs->cs != __USER_CS)
87 /* 32-bit mode: register increment */
89 /* 64-bit mode: REX prefix */
96 * pushf: NOTE! We should probably not let
97 * the user see the TF bit being set. But
98 * it's more pain than it's worth to avoid
99 * it, and a debugger could emulate this
100 * all in user space if it _really_ cares.
110 void user_enable_single_step(struct task_struct *child)
112 struct pt_regs *regs = task_pt_regs(child);
115 * Always set TIF_SINGLESTEP - this guarantees that
116 * we single-step system calls etc.. This will also
117 * cause us to set TF when returning to user mode.
119 set_tsk_thread_flag(child, TIF_SINGLESTEP);
122 * If TF was already set, don't do anything else
124 if (regs->eflags & X86_EFLAGS_TF)
127 /* Set TF on the kernel stack.. */
128 regs->eflags |= X86_EFLAGS_TF;
131 * ..but if TF is changed by the instruction we will trace,
132 * don't mark it as being "us" that set it, so that we
133 * won't clear it by hand later.
135 if (is_setting_trap_flag(child, regs))
138 child->ptrace |= PT_DTRACE;
141 void user_disable_single_step(struct task_struct *child)
143 /* Always clear TIF_SINGLESTEP... */
144 clear_tsk_thread_flag(child, TIF_SINGLESTEP);
146 /* But touch TF only if it was set by us.. */
147 if (child->ptrace & PT_DTRACE) {
148 struct pt_regs *regs = task_pt_regs(child);
149 regs->eflags &= ~X86_EFLAGS_TF;
150 child->ptrace &= ~PT_DTRACE;