[PATCH 2/2] x86: change syscall_trace_leave() to rely on tracehook_report_syscall_exit(step)
Oleg Nesterov
oleg at redhat.com
Sun Nov 8 20:54:42 UTC 2009
Extract arch_fill_sigtrap_info() from send_sigtrap() and change
syscall_trace_leave() to rely on tracehook_report_syscall_exit()
to handle stepping.
Note: before this patch x86 generated the unnecessary SIGTRAP
when PTRACE_SINGLESTEP done at the syscall-exit stop, now x86
matches other architectures.
---
arch/x86/include/asm/ptrace.h | 5 ++++
arch/x86/kernel/ptrace.c | 51 +++++++++++++++++++++++-------------------
2 files changed, 33 insertions(+), 23 deletions(-)
--- TH/arch/x86/include/asm/ptrace.h~2_CONVERT_X86 2009-06-11 14:16:46.000000000 +0200
+++ TH/arch/x86/include/asm/ptrace.h 2009-11-08 20:45:21.000000000 +0100
@@ -230,6 +230,11 @@ extern void user_enable_block_step(struc
#define arch_has_block_step() (boot_cpu_data.x86 >= 6)
#endif
+struct siginfo;
+void arch_fill_sigtrap_info(struct task_struct *tsk, struct pt_regs *regs,
+ struct siginfo *info);
+#define arch_has_fill_sigtrap_info
+
struct user_desc;
extern int do_get_thread_area(struct task_struct *p, int idx,
struct user_desc __user *info);
--- TH/arch/x86/kernel/ptrace.c~2_CONVERT_X86 2009-09-23 21:12:01.000000000 +0200
+++ TH/arch/x86/kernel/ptrace.c 2009-11-08 20:54:26.000000000 +0100
@@ -1437,21 +1437,33 @@ const struct user_regset_view *task_user
#endif
}
-void send_sigtrap(struct task_struct *tsk, struct pt_regs *regs,
- int error_code, int si_code)
+static inline void fill_sigtrap_info(struct task_struct *tsk,
+ struct pt_regs *regs,
+ int error_code, int si_code,
+ struct siginfo *info)
{
- struct siginfo info;
-
tsk->thread.trap_no = 1;
tsk->thread.error_code = error_code;
- memset(&info, 0, sizeof(info));
- info.si_signo = SIGTRAP;
- info.si_code = si_code;
+ memset(info, 0, sizeof(*info));
+ info->si_signo = SIGTRAP;
+ info->si_code = si_code;
+ info->si_addr = user_mode_vm(regs) ? (void __user *) regs->ip : NULL;
+}
- /* User-mode ip? */
- info.si_addr = user_mode_vm(regs) ? (void __user *) regs->ip : NULL;
+void arch_fill_sigtrap_info(struct task_struct *tsk,
+ struct pt_regs *regs,
+ struct siginfo *info)
+{
+ fill_sigtrap_info(tsk, regs, 0, TRAP_BRKPT, info);
+}
+void send_sigtrap(struct task_struct *tsk, struct pt_regs *regs,
+ int error_code, int si_code)
+{
+ struct siginfo info;
+
+ fill_sigtrap_info(tsk, regs, error_code, si_code, &info);
/* Send us the fake SIGTRAP */
force_sig_info(SIGTRAP, &info, tsk);
}
@@ -1516,29 +1528,22 @@ asmregparm long syscall_trace_enter(stru
asmregparm void syscall_trace_leave(struct pt_regs *regs)
{
+ bool step;
+
if (unlikely(current->audit_context))
audit_syscall_exit(AUDITSC_RESULT(regs->ax), regs->ax);
if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT)))
trace_sys_exit(regs, regs->ax);
- if (test_thread_flag(TIF_SYSCALL_TRACE))
- tracehook_report_syscall_exit(regs, 0);
-
/*
* If TIF_SYSCALL_EMU is set, we only get here because of
* TIF_SINGLESTEP (i.e. this is PTRACE_SYSEMU_SINGLESTEP).
* We already reported this syscall instruction in
- * syscall_trace_enter(), so don't do any more now.
- */
- if (unlikely(test_thread_flag(TIF_SYSCALL_EMU)))
- return;
-
- /*
- * If we are single-stepping, synthesize a trap to follow the
- * system call instruction.
+ * syscall_trace_enter().
*/
- if (test_thread_flag(TIF_SINGLESTEP) &&
- tracehook_consider_fatal_signal(current, SIGTRAP))
- send_sigtrap(current, regs, 0, TRAP_BRKPT);
+ step = unlikely(test_thread_flag(TIF_SINGLESTEP)) &&
+ !test_thread_flag(TIF_SYSCALL_EMU);
+ if (step || test_thread_flag(TIF_SYSCALL_TRACE))
+ tracehook_report_syscall_exit(regs, step);
}
More information about the utrace-devel
mailing list