Linux Audio

Check our new training course

Yocto / OpenEmbedded training

Mar 24-27, 2025, special US time zones
Register
Loading...
v3.5.6
  1/*
  2 * Copyright (C) 2004-2006 Atmel Corporation
  3 *
  4 * This program is free software; you can redistribute it and/or modify
  5 * it under the terms of the GNU General Public License version 2 as
  6 * published by the Free Software Foundation.
  7 */
  8#undef DEBUG
  9#include <linux/kernel.h>
 10#include <linux/sched.h>
 11#include <linux/mm.h>
 12#include <linux/ptrace.h>
 13#include <linux/errno.h>
 14#include <linux/user.h>
 15#include <linux/security.h>
 16#include <linux/unistd.h>
 17#include <linux/notifier.h>
 18
 19#include <asm/traps.h>
 20#include <asm/uaccess.h>
 21#include <asm/ocd.h>
 22#include <asm/mmu_context.h>
 23#include <linux/kdebug.h>
 24
 25static struct pt_regs *get_user_regs(struct task_struct *tsk)
 26{
 27	return (struct pt_regs *)((unsigned long)task_stack_page(tsk) +
 28				  THREAD_SIZE - sizeof(struct pt_regs));
 29}
 30
 31void user_enable_single_step(struct task_struct *tsk)
 32{
 33	pr_debug("user_enable_single_step: pid=%u, PC=0x%08lx, SR=0x%08lx\n",
 34		 tsk->pid, task_pt_regs(tsk)->pc, task_pt_regs(tsk)->sr);
 35
 36	/*
 37	 * We can't schedule in Debug mode, so when TIF_BREAKPOINT is
 38	 * set, the system call or exception handler will do a
 39	 * breakpoint to enter monitor mode before returning to
 40	 * userspace.
 41	 *
 42	 * The monitor code will then notice that TIF_SINGLE_STEP is
 43	 * set and return to userspace with single stepping enabled.
 44	 * The CPU will then enter monitor mode again after exactly
 45	 * one instruction has been executed, and the monitor code
 46	 * will then send a SIGTRAP to the process.
 47	 */
 48	set_tsk_thread_flag(tsk, TIF_BREAKPOINT);
 49	set_tsk_thread_flag(tsk, TIF_SINGLE_STEP);
 50}
 51
 52void user_disable_single_step(struct task_struct *child)
 53{
 54	/* XXX(hch): a no-op here seems wrong.. */
 55}
 56
 57/*
 58 * Called by kernel/ptrace.c when detaching
 59 *
 60 * Make sure any single step bits, etc. are not set
 61 */
 62void ptrace_disable(struct task_struct *child)
 63{
 64	clear_tsk_thread_flag(child, TIF_SINGLE_STEP);
 65	clear_tsk_thread_flag(child, TIF_BREAKPOINT);
 66	ocd_disable(child);
 67}
 68
 69/*
 70 * Read the word at offset "offset" into the task's "struct user". We
 71 * actually access the pt_regs struct stored on the kernel stack.
 72 */
 73static int ptrace_read_user(struct task_struct *tsk, unsigned long offset,
 74			    unsigned long __user *data)
 75{
 76	unsigned long *regs;
 77	unsigned long value;
 78
 79	if (offset & 3 || offset >= sizeof(struct user)) {
 80		printk("ptrace_read_user: invalid offset 0x%08lx\n", offset);
 81		return -EIO;
 82	}
 83
 84	regs = (unsigned long *)get_user_regs(tsk);
 85
 86	value = 0;
 87	if (offset < sizeof(struct pt_regs))
 88		value = regs[offset / sizeof(regs[0])];
 89
 90	pr_debug("ptrace_read_user(%s[%u], %#lx, %p) -> %#lx\n",
 91		 tsk->comm, tsk->pid, offset, data, value);
 92
 93	return put_user(value, data);
 94}
 95
 96/*
 97 * Write the word "value" to offset "offset" into the task's "struct
 98 * user". We actually access the pt_regs struct stored on the kernel
 99 * stack.
100 */
101static int ptrace_write_user(struct task_struct *tsk, unsigned long offset,
102			     unsigned long value)
103{
104	unsigned long *regs;
105
106	pr_debug("ptrace_write_user(%s[%u], %#lx, %#lx)\n",
107			tsk->comm, tsk->pid, offset, value);
108
109	if (offset & 3 || offset >= sizeof(struct user)) {
110		pr_debug("  invalid offset 0x%08lx\n", offset);
111		return -EIO;
112	}
113
114	if (offset >= sizeof(struct pt_regs))
115		return 0;
116
117	regs = (unsigned long *)get_user_regs(tsk);
118	regs[offset / sizeof(regs[0])] = value;
119
120	return 0;
121}
122
123static int ptrace_getregs(struct task_struct *tsk, void __user *uregs)
124{
125	struct pt_regs *regs = get_user_regs(tsk);
126
127	return copy_to_user(uregs, regs, sizeof(*regs)) ? -EFAULT : 0;
128}
129
130static int ptrace_setregs(struct task_struct *tsk, const void __user *uregs)
131{
132	struct pt_regs newregs;
133	int ret;
134
135	ret = -EFAULT;
136	if (copy_from_user(&newregs, uregs, sizeof(newregs)) == 0) {
137		struct pt_regs *regs = get_user_regs(tsk);
138
139		ret = -EINVAL;
140		if (valid_user_regs(&newregs)) {
141			*regs = newregs;
142			ret = 0;
143		}
144	}
145
146	return ret;
147}
148
149long arch_ptrace(struct task_struct *child, long request,
150		 unsigned long addr, unsigned long data)
151{
152	int ret;
153	void __user *datap = (void __user *) data;
154
155	switch (request) {
156	/* Read the word at location addr in the child process */
157	case PTRACE_PEEKTEXT:
158	case PTRACE_PEEKDATA:
159		ret = generic_ptrace_peekdata(child, addr, data);
160		break;
161
162	case PTRACE_PEEKUSR:
163		ret = ptrace_read_user(child, addr, datap);
164		break;
165
166	/* Write the word in data at location addr */
167	case PTRACE_POKETEXT:
168	case PTRACE_POKEDATA:
169		ret = generic_ptrace_pokedata(child, addr, data);
170		break;
171
172	case PTRACE_POKEUSR:
173		ret = ptrace_write_user(child, addr, data);
174		break;
175
176	case PTRACE_GETREGS:
177		ret = ptrace_getregs(child, datap);
178		break;
179
180	case PTRACE_SETREGS:
181		ret = ptrace_setregs(child, datap);
182		break;
183
184	default:
185		ret = ptrace_request(child, request, addr, data);
186		break;
187	}
188
189	return ret;
190}
191
192asmlinkage void syscall_trace(void)
193{
194	if (!test_thread_flag(TIF_SYSCALL_TRACE))
195		return;
196	if (!(current->ptrace & PT_PTRACED))
197		return;
198
199	/* The 0x80 provides a way for the tracing parent to
200	 * distinguish between a syscall stop and SIGTRAP delivery */
201	ptrace_notify(SIGTRAP | ((current->ptrace & PT_TRACESYSGOOD)
202				 ? 0x80 : 0));
203
204	/*
205	 * this isn't the same as continuing with a signal, but it
206	 * will do for normal use.  strace only continues with a
207	 * signal if the stopping signal is not SIGTRAP.  -brl
208	 */
209	if (current->exit_code) {
210		pr_debug("syscall_trace: sending signal %d to PID %u\n",
211			 current->exit_code, current->pid);
212		send_sig(current->exit_code, current, 1);
213		current->exit_code = 0;
214	}
215}
216
217/*
218 * debug_trampoline() is an assembly stub which will store all user
219 * registers on the stack and execute a breakpoint instruction.
220 *
221 * If we single-step into an exception handler which runs with
222 * interrupts disabled the whole time so it doesn't have to check for
223 * pending work, its return address will be modified so that it ends
224 * up returning to debug_trampoline.
225 *
226 * If the exception handler decides to store the user context and
227 * enable interrupts after all, it will restore the original return
228 * address and status register value. Before it returns, it will
229 * notice that TIF_BREAKPOINT is set and execute a breakpoint
230 * instruction.
231 */
232extern void debug_trampoline(void);
233
234asmlinkage struct pt_regs *do_debug(struct pt_regs *regs)
235{
236	struct thread_info	*ti;
237	unsigned long		trampoline_addr;
238	u32			status;
239	u32			ctrl;
240	int			code;
241
242	status = ocd_read(DS);
243	ti = current_thread_info();
244	code = TRAP_BRKPT;
245
246	pr_debug("do_debug: status=0x%08x PC=0x%08lx SR=0x%08lx tif=0x%08lx\n",
247			status, regs->pc, regs->sr, ti->flags);
248
249	if (!user_mode(regs)) {
250		unsigned long	die_val = DIE_BREAKPOINT;
251
252		if (status & (1 << OCD_DS_SSS_BIT))
253			die_val = DIE_SSTEP;
254
255		if (notify_die(die_val, "ptrace", regs, 0, 0, SIGTRAP)
256				== NOTIFY_STOP)
257			return regs;
258
259		if ((status & (1 << OCD_DS_SWB_BIT))
260				&& test_and_clear_ti_thread_flag(
261					ti, TIF_BREAKPOINT)) {
262			/*
263			 * Explicit breakpoint from trampoline or
264			 * exception/syscall/interrupt handler.
265			 *
266			 * The real saved regs are on the stack right
267			 * after the ones we saved on entry.
268			 */
269			regs++;
270			pr_debug("  -> TIF_BREAKPOINT done, adjusted regs:"
271					"PC=0x%08lx SR=0x%08lx\n",
272					regs->pc, regs->sr);
273			BUG_ON(!user_mode(regs));
274
275			if (test_thread_flag(TIF_SINGLE_STEP)) {
276				pr_debug("Going to do single step...\n");
277				return regs;
278			}
279
280			/*
281			 * No TIF_SINGLE_STEP means we're done
282			 * stepping over a syscall. Do the trap now.
283			 */
284			code = TRAP_TRACE;
285		} else if ((status & (1 << OCD_DS_SSS_BIT))
286				&& test_ti_thread_flag(ti, TIF_SINGLE_STEP)) {
287
288			pr_debug("Stepped into something, "
289					"setting TIF_BREAKPOINT...\n");
290			set_ti_thread_flag(ti, TIF_BREAKPOINT);
291
292			/*
293			 * We stepped into an exception, interrupt or
294			 * syscall handler. Some exception handlers
295			 * don't check for pending work, so we need to
296			 * set up a trampoline just in case.
297			 *
298			 * The exception entry code will undo the
299			 * trampoline stuff if it does a full context
300			 * save (which also means that it'll check for
301			 * pending work later.)
302			 */
303			if ((regs->sr & MODE_MASK) == MODE_EXCEPTION) {
304				trampoline_addr
305					= (unsigned long)&debug_trampoline;
306
307				pr_debug("Setting up trampoline...\n");
308				ti->rar_saved = sysreg_read(RAR_EX);
309				ti->rsr_saved = sysreg_read(RSR_EX);
310				sysreg_write(RAR_EX, trampoline_addr);
311				sysreg_write(RSR_EX, (MODE_EXCEPTION
312							| SR_EM | SR_GM));
313				BUG_ON(ti->rsr_saved & MODE_MASK);
314			}
315
316			/*
317			 * If we stepped into a system call, we
318			 * shouldn't do a single step after we return
319			 * since the return address is right after the
320			 * "scall" instruction we were told to step
321			 * over.
322			 */
323			if ((regs->sr & MODE_MASK) == MODE_SUPERVISOR) {
324				pr_debug("Supervisor; no single step\n");
325				clear_ti_thread_flag(ti, TIF_SINGLE_STEP);
326			}
327
328			ctrl = ocd_read(DC);
329			ctrl &= ~(1 << OCD_DC_SS_BIT);
330			ocd_write(DC, ctrl);
331
332			return regs;
333		} else {
334			printk(KERN_ERR "Unexpected OCD_DS value: 0x%08x\n",
335					status);
336			printk(KERN_ERR "Thread flags: 0x%08lx\n", ti->flags);
337			die("Unhandled debug trap in kernel mode",
338					regs, SIGTRAP);
339		}
340	} else if (status & (1 << OCD_DS_SSS_BIT)) {
341		/* Single step in user mode */
342		code = TRAP_TRACE;
343
344		ctrl = ocd_read(DC);
345		ctrl &= ~(1 << OCD_DC_SS_BIT);
346		ocd_write(DC, ctrl);
347	}
348
349	pr_debug("Sending SIGTRAP: code=%d PC=0x%08lx SR=0x%08lx\n",
350			code, regs->pc, regs->sr);
351
352	clear_thread_flag(TIF_SINGLE_STEP);
353	_exception(SIGTRAP, regs, code, instruction_pointer(regs));
354
355	return regs;
356}
v3.1
  1/*
  2 * Copyright (C) 2004-2006 Atmel Corporation
  3 *
  4 * This program is free software; you can redistribute it and/or modify
  5 * it under the terms of the GNU General Public License version 2 as
  6 * published by the Free Software Foundation.
  7 */
  8#undef DEBUG
  9#include <linux/kernel.h>
 10#include <linux/sched.h>
 11#include <linux/mm.h>
 12#include <linux/ptrace.h>
 13#include <linux/errno.h>
 14#include <linux/user.h>
 15#include <linux/security.h>
 16#include <linux/unistd.h>
 17#include <linux/notifier.h>
 18
 19#include <asm/traps.h>
 20#include <asm/uaccess.h>
 21#include <asm/ocd.h>
 22#include <asm/mmu_context.h>
 23#include <linux/kdebug.h>
 24
 25static struct pt_regs *get_user_regs(struct task_struct *tsk)
 26{
 27	return (struct pt_regs *)((unsigned long)task_stack_page(tsk) +
 28				  THREAD_SIZE - sizeof(struct pt_regs));
 29}
 30
 31void user_enable_single_step(struct task_struct *tsk)
 32{
 33	pr_debug("user_enable_single_step: pid=%u, PC=0x%08lx, SR=0x%08lx\n",
 34		 tsk->pid, task_pt_regs(tsk)->pc, task_pt_regs(tsk)->sr);
 35
 36	/*
 37	 * We can't schedule in Debug mode, so when TIF_BREAKPOINT is
 38	 * set, the system call or exception handler will do a
 39	 * breakpoint to enter monitor mode before returning to
 40	 * userspace.
 41	 *
 42	 * The monitor code will then notice that TIF_SINGLE_STEP is
 43	 * set and return to userspace with single stepping enabled.
 44	 * The CPU will then enter monitor mode again after exactly
 45	 * one instruction has been executed, and the monitor code
 46	 * will then send a SIGTRAP to the process.
 47	 */
 48	set_tsk_thread_flag(tsk, TIF_BREAKPOINT);
 49	set_tsk_thread_flag(tsk, TIF_SINGLE_STEP);
 50}
 51
 52void user_disable_single_step(struct task_struct *child)
 53{
 54	/* XXX(hch): a no-op here seems wrong.. */
 55}
 56
 57/*
 58 * Called by kernel/ptrace.c when detaching
 59 *
 60 * Make sure any single step bits, etc. are not set
 61 */
 62void ptrace_disable(struct task_struct *child)
 63{
 64	clear_tsk_thread_flag(child, TIF_SINGLE_STEP);
 65	clear_tsk_thread_flag(child, TIF_BREAKPOINT);
 66	ocd_disable(child);
 67}
 68
 69/*
 70 * Read the word at offset "offset" into the task's "struct user". We
 71 * actually access the pt_regs struct stored on the kernel stack.
 72 */
 73static int ptrace_read_user(struct task_struct *tsk, unsigned long offset,
 74			    unsigned long __user *data)
 75{
 76	unsigned long *regs;
 77	unsigned long value;
 78
 79	if (offset & 3 || offset >= sizeof(struct user)) {
 80		printk("ptrace_read_user: invalid offset 0x%08lx\n", offset);
 81		return -EIO;
 82	}
 83
 84	regs = (unsigned long *)get_user_regs(tsk);
 85
 86	value = 0;
 87	if (offset < sizeof(struct pt_regs))
 88		value = regs[offset / sizeof(regs[0])];
 89
 90	pr_debug("ptrace_read_user(%s[%u], %#lx, %p) -> %#lx\n",
 91		 tsk->comm, tsk->pid, offset, data, value);
 92
 93	return put_user(value, data);
 94}
 95
 96/*
 97 * Write the word "value" to offset "offset" into the task's "struct
 98 * user". We actually access the pt_regs struct stored on the kernel
 99 * stack.
100 */
101static int ptrace_write_user(struct task_struct *tsk, unsigned long offset,
102			     unsigned long value)
103{
104	unsigned long *regs;
105
106	pr_debug("ptrace_write_user(%s[%u], %#lx, %#lx)\n",
107			tsk->comm, tsk->pid, offset, value);
108
109	if (offset & 3 || offset >= sizeof(struct user)) {
110		pr_debug("  invalid offset 0x%08lx\n", offset);
111		return -EIO;
112	}
113
114	if (offset >= sizeof(struct pt_regs))
115		return 0;
116
117	regs = (unsigned long *)get_user_regs(tsk);
118	regs[offset / sizeof(regs[0])] = value;
119
120	return 0;
121}
122
123static int ptrace_getregs(struct task_struct *tsk, void __user *uregs)
124{
125	struct pt_regs *regs = get_user_regs(tsk);
126
127	return copy_to_user(uregs, regs, sizeof(*regs)) ? -EFAULT : 0;
128}
129
130static int ptrace_setregs(struct task_struct *tsk, const void __user *uregs)
131{
132	struct pt_regs newregs;
133	int ret;
134
135	ret = -EFAULT;
136	if (copy_from_user(&newregs, uregs, sizeof(newregs)) == 0) {
137		struct pt_regs *regs = get_user_regs(tsk);
138
139		ret = -EINVAL;
140		if (valid_user_regs(&newregs)) {
141			*regs = newregs;
142			ret = 0;
143		}
144	}
145
146	return ret;
147}
148
149long arch_ptrace(struct task_struct *child, long request,
150		 unsigned long addr, unsigned long data)
151{
152	int ret;
153	void __user *datap = (void __user *) data;
154
155	switch (request) {
156	/* Read the word at location addr in the child process */
157	case PTRACE_PEEKTEXT:
158	case PTRACE_PEEKDATA:
159		ret = generic_ptrace_peekdata(child, addr, data);
160		break;
161
162	case PTRACE_PEEKUSR:
163		ret = ptrace_read_user(child, addr, datap);
164		break;
165
166	/* Write the word in data at location addr */
167	case PTRACE_POKETEXT:
168	case PTRACE_POKEDATA:
169		ret = generic_ptrace_pokedata(child, addr, data);
170		break;
171
172	case PTRACE_POKEUSR:
173		ret = ptrace_write_user(child, addr, data);
174		break;
175
176	case PTRACE_GETREGS:
177		ret = ptrace_getregs(child, datap);
178		break;
179
180	case PTRACE_SETREGS:
181		ret = ptrace_setregs(child, datap);
182		break;
183
184	default:
185		ret = ptrace_request(child, request, addr, data);
186		break;
187	}
188
189	return ret;
190}
191
192asmlinkage void syscall_trace(void)
193{
194	if (!test_thread_flag(TIF_SYSCALL_TRACE))
195		return;
196	if (!(current->ptrace & PT_PTRACED))
197		return;
198
199	/* The 0x80 provides a way for the tracing parent to
200	 * distinguish between a syscall stop and SIGTRAP delivery */
201	ptrace_notify(SIGTRAP | ((current->ptrace & PT_TRACESYSGOOD)
202				 ? 0x80 : 0));
203
204	/*
205	 * this isn't the same as continuing with a signal, but it
206	 * will do for normal use.  strace only continues with a
207	 * signal if the stopping signal is not SIGTRAP.  -brl
208	 */
209	if (current->exit_code) {
210		pr_debug("syscall_trace: sending signal %d to PID %u\n",
211			 current->exit_code, current->pid);
212		send_sig(current->exit_code, current, 1);
213		current->exit_code = 0;
214	}
215}
216
217/*
218 * debug_trampoline() is an assembly stub which will store all user
219 * registers on the stack and execute a breakpoint instruction.
220 *
221 * If we single-step into an exception handler which runs with
222 * interrupts disabled the whole time so it doesn't have to check for
223 * pending work, its return address will be modified so that it ends
224 * up returning to debug_trampoline.
225 *
226 * If the exception handler decides to store the user context and
227 * enable interrupts after all, it will restore the original return
228 * address and status register value. Before it returns, it will
229 * notice that TIF_BREAKPOINT is set and execute a breakpoint
230 * instruction.
231 */
232extern void debug_trampoline(void);
233
234asmlinkage struct pt_regs *do_debug(struct pt_regs *regs)
235{
236	struct thread_info	*ti;
237	unsigned long		trampoline_addr;
238	u32			status;
239	u32			ctrl;
240	int			code;
241
242	status = ocd_read(DS);
243	ti = current_thread_info();
244	code = TRAP_BRKPT;
245
246	pr_debug("do_debug: status=0x%08x PC=0x%08lx SR=0x%08lx tif=0x%08lx\n",
247			status, regs->pc, regs->sr, ti->flags);
248
249	if (!user_mode(regs)) {
250		unsigned long	die_val = DIE_BREAKPOINT;
251
252		if (status & (1 << OCD_DS_SSS_BIT))
253			die_val = DIE_SSTEP;
254
255		if (notify_die(die_val, "ptrace", regs, 0, 0, SIGTRAP)
256				== NOTIFY_STOP)
257			return regs;
258
259		if ((status & (1 << OCD_DS_SWB_BIT))
260				&& test_and_clear_ti_thread_flag(
261					ti, TIF_BREAKPOINT)) {
262			/*
263			 * Explicit breakpoint from trampoline or
264			 * exception/syscall/interrupt handler.
265			 *
266			 * The real saved regs are on the stack right
267			 * after the ones we saved on entry.
268			 */
269			regs++;
270			pr_debug("  -> TIF_BREAKPOINT done, adjusted regs:"
271					"PC=0x%08lx SR=0x%08lx\n",
272					regs->pc, regs->sr);
273			BUG_ON(!user_mode(regs));
274
275			if (test_thread_flag(TIF_SINGLE_STEP)) {
276				pr_debug("Going to do single step...\n");
277				return regs;
278			}
279
280			/*
281			 * No TIF_SINGLE_STEP means we're done
282			 * stepping over a syscall. Do the trap now.
283			 */
284			code = TRAP_TRACE;
285		} else if ((status & (1 << OCD_DS_SSS_BIT))
286				&& test_ti_thread_flag(ti, TIF_SINGLE_STEP)) {
287
288			pr_debug("Stepped into something, "
289					"setting TIF_BREAKPOINT...\n");
290			set_ti_thread_flag(ti, TIF_BREAKPOINT);
291
292			/*
293			 * We stepped into an exception, interrupt or
294			 * syscall handler. Some exception handlers
295			 * don't check for pending work, so we need to
296			 * set up a trampoline just in case.
297			 *
298			 * The exception entry code will undo the
299			 * trampoline stuff if it does a full context
300			 * save (which also means that it'll check for
301			 * pending work later.)
302			 */
303			if ((regs->sr & MODE_MASK) == MODE_EXCEPTION) {
304				trampoline_addr
305					= (unsigned long)&debug_trampoline;
306
307				pr_debug("Setting up trampoline...\n");
308				ti->rar_saved = sysreg_read(RAR_EX);
309				ti->rsr_saved = sysreg_read(RSR_EX);
310				sysreg_write(RAR_EX, trampoline_addr);
311				sysreg_write(RSR_EX, (MODE_EXCEPTION
312							| SR_EM | SR_GM));
313				BUG_ON(ti->rsr_saved & MODE_MASK);
314			}
315
316			/*
317			 * If we stepped into a system call, we
318			 * shouldn't do a single step after we return
319			 * since the return address is right after the
320			 * "scall" instruction we were told to step
321			 * over.
322			 */
323			if ((regs->sr & MODE_MASK) == MODE_SUPERVISOR) {
324				pr_debug("Supervisor; no single step\n");
325				clear_ti_thread_flag(ti, TIF_SINGLE_STEP);
326			}
327
328			ctrl = ocd_read(DC);
329			ctrl &= ~(1 << OCD_DC_SS_BIT);
330			ocd_write(DC, ctrl);
331
332			return regs;
333		} else {
334			printk(KERN_ERR "Unexpected OCD_DS value: 0x%08x\n",
335					status);
336			printk(KERN_ERR "Thread flags: 0x%08lx\n", ti->flags);
337			die("Unhandled debug trap in kernel mode",
338					regs, SIGTRAP);
339		}
340	} else if (status & (1 << OCD_DS_SSS_BIT)) {
341		/* Single step in user mode */
342		code = TRAP_TRACE;
343
344		ctrl = ocd_read(DC);
345		ctrl &= ~(1 << OCD_DC_SS_BIT);
346		ocd_write(DC, ctrl);
347	}
348
349	pr_debug("Sending SIGTRAP: code=%d PC=0x%08lx SR=0x%08lx\n",
350			code, regs->pc, regs->sr);
351
352	clear_thread_flag(TIF_SINGLE_STEP);
353	_exception(SIGTRAP, regs, code, instruction_pointer(regs));
354
355	return regs;
356}