Files
android_kernel_xiaomi_sm8450/arch/x86/kernel
Oleg Nesterov 9bd1190a11 uprobes/x86: Do not (ab)use TIF_SINGLESTEP/user_*_single_step() for single-stepping
user_enable/disable_single_step() was designed for ptrace, it assumes
a single user and does unnecessary and wrong things for uprobes. For
example:

	- arch_uprobe_enable_step() can't trust TIF_SINGLESTEP, an
	  application itself can set X86_EFLAGS_TF which must be
	  preserved after arch_uprobe_disable_step().

	- we do not want to set TIF_SINGLESTEP/TIF_FORCED_TF in
	  arch_uprobe_enable_step(), this only makes sense for ptrace.

	- otoh we leak TIF_SINGLESTEP if arch_uprobe_disable_step()
	  doesn't do user_disable_single_step(), the application will
	  be killed after the next syscall.

	- arch_uprobe_enable_step() does access_process_vm() we do
	  not need/want.

Change arch_uprobe_enable/disable_step() to set/clear X86_EFLAGS_TF
directly, this is much simpler and more correct. However, we need to
clear TIF_BLOCKSTEP/DEBUGCTLMSR_BTF before executing the probed insn,
add set_task_blockstep(false).

Note: with or without this patch, there is another (hopefully minor)
problem. A probed "pushf" insn can see the wrong X86_EFLAGS_TF set by
uprobes. Perhaps we should change _disable to update the stack, or
teach arch_uprobe_skip_sstep() to emulate this insn.

Signed-off-by: Oleg Nesterov <oleg@redhat.com>
Acked-by: Srikar Dronamraju <srikar@linux.vnet.ibm.com>
2012-09-15 17:37:30 +02:00
..
2012-06-06 11:58:38 +02:00
2011-12-12 14:26:10 -08:00
2012-03-28 18:11:12 +01:00
2011-07-01 10:37:14 +02:00
2012-03-28 18:11:12 +01:00
2011-02-17 14:59:22 +01:00
2012-05-08 14:08:44 +02:00
2012-06-18 10:53:18 +02:00
2012-03-28 18:11:12 +01:00
2012-03-28 18:11:12 +01:00
2012-06-25 13:48:30 +02:00
2012-05-14 11:49:38 +02:00
2012-03-28 18:11:12 +01:00
2011-03-18 10:39:30 +01:00