]> err.no Git - linux-2.6/commitdiff
x86 single_step: TIF_FORCED_TF
authorRoland McGrath <roland@redhat.com>
Wed, 30 Jan 2008 12:30:50 +0000 (13:30 +0100)
committerIngo Molnar <mingo@elte.hu>
Wed, 30 Jan 2008 12:30:50 +0000 (13:30 +0100)
This changes the single-step support to use a new thread_info flag
TIF_FORCED_TF instead of the PT_DTRACE flag in task_struct.ptrace.
This keeps arch implementation uses out of this non-arch field.

This changes the ptrace access to eflags to mask TF and maintain
the TIF_FORCED_TF flag directly if userland sets TF, instead of
relying on ptrace_signal_deliver.  The 64-bit and 32-bit kernels
are harmonized on this same behavior.  The ptrace_signal_deliver
approach works now, but this change makes the low-level register
access code reliable when called from different contexts than a
ptrace stop, which will be possible in the future.

The 64-bit do_debug exception handler is also changed not to clear TF
from user-mode registers.  This matches the 32-bit kernel's behavior.

Signed-off-by: Roland McGrath <roland@redhat.com>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
12 files changed:
arch/x86/ia32/ptrace32.c
arch/x86/kernel/process_32.c
arch/x86/kernel/process_64.c
arch/x86/kernel/ptrace_32.c
arch/x86/kernel/ptrace_64.c
arch/x86/kernel/signal_32.c
arch/x86/kernel/signal_64.c
arch/x86/kernel/step.c
arch/x86/kernel/traps_64.c
include/asm-x86/signal.h
include/asm-x86/thread_info_32.h
include/asm-x86/thread_info_64.h

index 9d754b6402058241170cd29055626fd34281c203..5dee334173131230e89cc6843ca0544c5bd78cc7 100644 (file)
@@ -89,6 +89,15 @@ static int putreg32(struct task_struct *child, unsigned regno, u32 val)
                __u64 *flags = &stack[offsetof(struct pt_regs, eflags)/8];
 
                val &= FLAG_MASK;
+               /*
+                * If the user value contains TF, mark that
+                * it was not "us" (the debugger) that set it.
+                * If not, make sure it stays set if we had.
+                */
+               if (val & X86_EFLAGS_TF)
+                       clear_tsk_thread_flag(child, TIF_FORCED_TF);
+               else if (test_tsk_thread_flag(child, TIF_FORCED_TF))
+                       val |= X86_EFLAGS_TF;
                *flags = val | (*flags & ~FLAG_MASK);
                break;
        }
@@ -179,9 +188,17 @@ static int getreg32(struct task_struct *child, unsigned regno, u32 *val)
        R32(eax, rax);
        R32(orig_eax, orig_rax);
        R32(eip, rip);
-       R32(eflags, eflags);
        R32(esp, rsp);
 
+       case offsetof(struct user32, regs.eflags):
+               /*
+                * If the debugger set TF, hide it from the readout.
+                */
+               *val = stack[offsetof(struct pt_regs, eflags)/8];
+               if (test_tsk_thread_flag(child, TIF_FORCED_TF))
+                       *val &= ~X86_EFLAGS_TF;
+               break;
+
        case offsetof(struct user32, u_debugreg[0]):
                *val = child->thread.debugreg0;
                break;
@@ -425,4 +442,3 @@ asmlinkage long sys32_ptrace(long request, u32 pid, u32 addr, u32 data)
        put_task_struct(child);
        return ret;
 }
-
index 4d66a56280d3ee86f048cd1d998a8dd7c1ed24e0..d9905c9d0fd5a343e469758198072d89e41fd061 100644 (file)
@@ -817,9 +817,6 @@ asmlinkage int sys_execve(struct pt_regs regs)
                        (char __user * __user *) regs.edx,
                        &regs);
        if (error == 0) {
-               task_lock(current);
-               current->ptrace &= ~PT_DTRACE;
-               task_unlock(current);
                /* Make sure we don't return using sysenter.. */
                set_thread_flag(TIF_IRET);
        }
index ccc9d68d5a586717a23a88508cbdc72f12c2b413..f7356e5517f630ece4658750d20d0cd85ca4977b 100644 (file)
@@ -709,11 +709,6 @@ long sys_execve(char __user *name, char __user * __user *argv,
        if (IS_ERR(filename)) 
                return error;
        error = do_execve(filename, argv, envp, &regs); 
-       if (error == 0) {
-               task_lock(current);
-               current->ptrace &= ~PT_DTRACE;
-               task_unlock(current);
-       }
        putname(filename);
        return error;
 }
index b73960885c3ff1fab13a3d9cf25d443666f3ff28..bc7fd802dcc7ff3c6e5083564b5062fa38261c90 100644 (file)
@@ -104,6 +104,15 @@ static int putreg(struct task_struct *child,
                        break;
                case EFL:
                        value &= FLAG_MASK;
+                       /*
+                        * If the user value contains TF, mark that
+                        * it was not "us" (the debugger) that set it.
+                        * If not, make sure it stays set if we had.
+                        */
+                       if (value & X86_EFLAGS_TF)
+                               clear_tsk_thread_flag(child, TIF_FORCED_TF);
+                       else if (test_tsk_thread_flag(child, TIF_FORCED_TF))
+                               value |= X86_EFLAGS_TF;
                        value |= get_stack_long(child, EFL_OFFSET) & ~FLAG_MASK;
                        break;
        }
@@ -119,6 +128,14 @@ static unsigned long getreg(struct task_struct *child,
        unsigned long retval = ~0UL;
 
        switch (regno >> 2) {
+               case EFL:
+                       /*
+                        * If the debugger set TF, hide it from the readout.
+                        */
+                       retval = get_stack_long(child, EFL_OFFSET);
+                       if (test_tsk_thread_flag(child, TIF_FORCED_TF))
+                               retval &= ~X86_EFLAGS_TF;
+                       break;
                case GS:
                        retval = child->thread.gs;
                        break;
index 4abfbced9b2681edd36d0b0f7e187fe29a0de137..035d53e99c5727e309efebcb4d08604a10bad049 100644 (file)
@@ -143,6 +143,15 @@ static int putreg(struct task_struct *child,
                        return 0;
                case offsetof(struct user_regs_struct, eflags):
                        value &= FLAG_MASK;
+                       /*
+                        * If the user value contains TF, mark that
+                        * it was not "us" (the debugger) that set it.
+                        * If not, make sure it stays set if we had.
+                        */
+                       if (value & X86_EFLAGS_TF)
+                               clear_tsk_thread_flag(child, TIF_FORCED_TF);
+                       else if (test_tsk_thread_flag(child, TIF_FORCED_TF))
+                               value |= X86_EFLAGS_TF;
                        tmp = get_stack_long(child, EFL_OFFSET); 
                        tmp &= ~FLAG_MASK; 
                        value |= tmp;
@@ -189,6 +198,17 @@ static unsigned long getreg(struct task_struct *child, unsigned long regno)
                        if (child->thread.gsindex != GS_TLS_SEL)
                                return 0;
                        return get_desc_base(&child->thread.tls_array[GS_TLS]);
+               case offsetof(struct user_regs_struct, eflags):
+                       /*
+                        * If the debugger set TF, hide it from the readout.
+                        */
+                       regno = regno - sizeof(struct pt_regs);
+                       val = get_stack_long(child, regno);
+                       if (test_tsk_thread_flag(child, TIF_IA32))
+                               val &= 0xffffffff;
+                       if (test_tsk_thread_flag(child, TIF_FORCED_TF))
+                               val &= ~X86_EFLAGS_TF;
+                       return val;
                default:
                        regno = regno - sizeof(struct pt_regs);
                        val = get_stack_long(child, regno);
index 1ac53e9a0859ee1697ed14d9fee1daf760bf1a6d..0a7c812212c995064c553c4174e4d085552994d8 100644 (file)
@@ -545,14 +545,12 @@ handle_signal(unsigned long sig, siginfo_t *info, struct k_sigaction *ka,
        }
 
        /*
-        * If TF is set due to a debugger (PT_DTRACE), clear the TF flag so
-        * that register information in the sigcontext is correct.
+        * If TF is set due to a debugger (TIF_FORCED_TF), clear the TF
+        * flag so that register information in the sigcontext is correct.
         */
-       if (unlikely(regs->eflags & TF_MASK)
-           && likely(current->ptrace & PT_DTRACE)) {
-               current->ptrace &= ~PT_DTRACE;
-               regs->eflags &= ~TF_MASK;
-       }
+       if (unlikely(regs->eflags & X86_EFLAGS_TF) &&
+           likely(test_and_clear_thread_flag(TIF_FORCED_TF)))
+               regs->eflags &= ~X86_EFLAGS_TF;
 
        /* Set up the stack frame */
        if (ka->sa.sa_flags & SA_SIGINFO)
index 38d806467c0f3ee8ad7e1935a7a5e0b18de9cd26..ab0178ebe00a90a4e582b148407f3c2ea08b14b1 100644 (file)
@@ -349,16 +349,12 @@ handle_signal(unsigned long sig, siginfo_t *info, struct k_sigaction *ka,
        }
 
        /*
-        * If TF is set due to a debugger (PT_DTRACE), clear the TF
-        * flag so that register information in the sigcontext is
-        * correct.
+        * If TF is set due to a debugger (TIF_FORCED_TF), clear the TF
+        * flag so that register information in the sigcontext is correct.
         */
-       if (unlikely(regs->eflags & TF_MASK)) {
-               if (likely(current->ptrace & PT_DTRACE)) {
-                       current->ptrace &= ~PT_DTRACE;
-                       regs->eflags &= ~TF_MASK;
-               }
-       }
+       if (unlikely(regs->eflags & X86_EFLAGS_TF) &&
+           likely(test_and_clear_thread_flag(TIF_FORCED_TF)))
+               regs->eflags &= ~X86_EFLAGS_TF;
 
 #ifdef CONFIG_IA32_EMULATION
        if (test_thread_flag(TIF_IA32)) {
index 6732272e3479a551ca91bc54dc84a457909761d2..243bff650ca5ddb7777abec824329399dff9f730 100644 (file)
@@ -135,7 +135,7 @@ void user_enable_single_step(struct task_struct *child)
        if (is_setting_trap_flag(child, regs))
                return;
 
-       child->ptrace |= PT_DTRACE;
+       set_tsk_thread_flag(child, TIF_FORCED_TF);
 }
 
 void user_disable_single_step(struct task_struct *child)
@@ -144,9 +144,6 @@ void user_disable_single_step(struct task_struct *child)
        clear_tsk_thread_flag(child, TIF_SINGLESTEP);
 
        /* But touch TF only if it was set by us.. */
-       if (child->ptrace & PT_DTRACE) {
-               struct pt_regs *regs = task_pt_regs(child);
-               regs->eflags &= ~X86_EFLAGS_TF;
-               child->ptrace &= ~PT_DTRACE;
-       }
+       if (test_and_clear_tsk_thread_flag(child, TIF_FORCED_TF))
+               task_pt_regs(child)->eflags &= ~X86_EFLAGS_TF;
 }
index aa248d75453375718fbfc775fedbc400d9cf9bc3..874aca397b02428f6f342142f28b11b841ae7b0d 100644 (file)
@@ -865,27 +865,14 @@ asmlinkage void __kprobes do_debug(struct pt_regs * regs,
 
        tsk->thread.debugreg6 = condition;
 
-       /* Mask out spurious TF errors due to lazy TF clearing */
+
+       /*
+        * Single-stepping through TF: make sure we ignore any events in
+        * kernel space (but re-enable TF when returning to user mode).
+        */
        if (condition & DR_STEP) {
-               /*
-                * The TF error should be masked out only if the current
-                * process is not traced and if the TRAP flag has been set
-                * previously by a tracing process (condition detected by
-                * the PT_DTRACE flag); remember that the i386 TRAP flag
-                * can be modified by the process itself in user mode,
-                * allowing programs to debug themselves without the ptrace()
-                * interface.
-                */
                 if (!user_mode(regs))
                        goto clear_TF_reenable;
-               /*
-                * Was the TF flag set by a debugger? If so, clear it now,
-                * so that register information is correct.
-                */
-               if (tsk->ptrace & PT_DTRACE) {
-                       regs->eflags &= ~TF_MASK;
-                       tsk->ptrace &= ~PT_DTRACE;
-               }
        }
 
        /* Ok, finally something we can handle */
index 987a422a2c788975a2996cfe4f453d67d4231923..aee7eca585ab07d400cd9f4a66d1f6e7eb3fc2ce 100644 (file)
@@ -245,21 +245,14 @@ static __inline__ int sigfindinword(unsigned long word)
 
 struct pt_regs;
 
-#define ptrace_signal_deliver(regs, cookie)            \
-       do {                                            \
-               if (current->ptrace & PT_DTRACE) {      \
-                       current->ptrace &= ~PT_DTRACE;  \
-                       (regs)->eflags &= ~TF_MASK;     \
-               }                                       \
-       } while (0)
-
 #else /* __i386__ */
 
 #undef __HAVE_ARCH_SIG_BITOPS
 
+#endif /* !__i386__ */
+
 #define ptrace_signal_deliver(regs, cookie) do { } while (0)
 
-#endif /* !__i386__ */
 #endif /* __KERNEL__ */
 #endif /* __ASSEMBLY__ */
 
index a516e9192f1135a2a6b310caf5aaf0525df43220..009ecc6ad38bd8393ec03065d3515dbe9f2b3488 100644 (file)
@@ -138,6 +138,7 @@ static inline struct thread_info *current_thread_info(void)
 #define TIF_IO_BITMAP          18      /* uses I/O bitmap */
 #define TIF_FREEZE             19      /* is freezing for suspend */
 #define TIF_NOTSC              20      /* TSC is not accessible in userland */
+#define TIF_FORCED_TF          21      /* true if TF in eflags artificially */
 
 #define _TIF_SYSCALL_TRACE     (1<<TIF_SYSCALL_TRACE)
 #define _TIF_SIGPENDING                (1<<TIF_SIGPENDING)
@@ -153,6 +154,7 @@ static inline struct thread_info *current_thread_info(void)
 #define _TIF_IO_BITMAP         (1<<TIF_IO_BITMAP)
 #define _TIF_FREEZE            (1<<TIF_FREEZE)
 #define _TIF_NOTSC             (1<<TIF_NOTSC)
+#define _TIF_FORCED_TF         (1<<TIF_FORCED_TF)
 
 /* work to do on interrupt/exception return */
 #define _TIF_WORK_MASK \
index c8e7736fc79220d11aa3818f61fd329039f4e5a6..e0f41b3deced6e2e99b0d56a2fe761a6e635edc6 100644 (file)
@@ -121,6 +121,7 @@ static inline struct thread_info *stack_thread_info(void)
 #define TIF_DEBUG              21      /* uses debug registers */
 #define TIF_IO_BITMAP          22      /* uses I/O bitmap */
 #define TIF_FREEZE             23      /* is freezing for suspend */
+#define TIF_FORCED_TF          24      /* true if TF in eflags artificially */
 
 #define _TIF_SYSCALL_TRACE     (1<<TIF_SYSCALL_TRACE)
 #define _TIF_SIGPENDING                (1<<TIF_SIGPENDING)
@@ -138,6 +139,7 @@ static inline struct thread_info *stack_thread_info(void)
 #define _TIF_DEBUG             (1<<TIF_DEBUG)
 #define _TIF_IO_BITMAP         (1<<TIF_IO_BITMAP)
 #define _TIF_FREEZE            (1<<TIF_FREEZE)
+#define _TIF_FORCED_TF         (1<<TIF_FORCED_TF)
 
 /* work to do on interrupt/exception return */
 #define _TIF_WORK_MASK \