From: will.deacon@arm.com (Will Deacon)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v8 2/6] arm64: ptrace: allow tracer to skip a system call
Date: Wed, 19 Nov 2014 19:06:01 +0000 [thread overview]
Message-ID: <20141119190601.GM15985@arm.com> (raw)
In-Reply-To: <546C58DB.5080204@linaro.org>
On Wed, Nov 19, 2014 at 08:46:19AM +0000, AKASHI Takahiro wrote:
> On 11/18/2014 11:04 PM, Will Deacon wrote:
> > On Tue, Nov 18, 2014 at 01:10:34AM +0000, AKASHI Takahiro wrote:
> >>
> >> + if (((int)regs->syscallno == -1) && (orig_syscallno == -1)) {
> >> + /*
> >> + * user-issued syscall(-1):
> >> + * RESTRICTION: We always return ENOSYS whatever value is
> >> + * stored in x0 (a return value) at this point.
> >> + * Normally, with ptrace off, syscall(-1) returns -ENOSYS.
> >> + * With ptrace on, however, if a tracer didn't pay any
> >> + * attention to user-issued syscall(-1) and just let it go
> >> + * without a hack here, it would return a value in x0 as in
> >> + * other system call cases. This means that this system call
> >> + * might succeed and see any bogus return value.
> >> + * This should be definitely avoided.
> >> + */
> >> + regs->regs[0] = -ENOSYS;
> >> + }
> >
> > I'm still really uncomfortable with this, and it doesn't seem to match what
> > arch/arm/ does either.
>
> Yeah, I know but
> as I mentioned before, syscall(-1) will be signaled on arm, and so we don't
> have to care about a return value :)
What does x86 do?
> > Doesn't it also prevent a tracer from skipping syscall(-1)?
>
> Syscall(-1) will return -ENOSYS whether or not a syscallno is explicitly
> replaced with -1 by a tracer, and, in this sense, it is *skipped*.
Ok, but now userspace sees -ENOSYS for a skipped system call in that case,
whereas it would usually see whatever the trace put in x0, right?
Will
next prev parent reply other threads:[~2014-11-19 19:06 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-11-18 1:10 [PATCH v8 0/6] arm64: add seccomp support AKASHI Takahiro
2014-11-18 1:10 ` [PATCH v8 1/6] arm64: ptrace: add NT_ARM_SYSTEM_CALL regset AKASHI Takahiro
2014-11-18 1:10 ` [PATCH v8 2/6] arm64: ptrace: allow tracer to skip a system call AKASHI Takahiro
2014-11-18 14:04 ` Will Deacon
2014-11-19 8:46 ` AKASHI Takahiro
2014-11-19 19:06 ` Will Deacon [this message]
2014-11-20 5:13 ` AKASHI Takahiro
2014-11-20 5:52 ` AKASHI Takahiro
2014-11-25 13:56 ` Will Deacon
2014-11-20 19:17 ` Will Deacon
2014-11-25 7:42 ` AKASHI Takahiro
2014-11-25 10:30 ` Will Deacon
2014-11-25 14:14 ` Russell King - ARM Linux
2014-11-18 1:10 ` [PATCH v8 3/6] asm-generic: add generic seccomp.h for secure computing mode 1 AKASHI Takahiro
2014-11-18 1:10 ` [PATCH v8 4/6] arm64: add seccomp syscall for compat task AKASHI Takahiro
2014-11-18 1:10 ` [PATCH v8 5/6] arm64: add SIGSYS siginfo " AKASHI Takahiro
2014-11-18 1:10 ` [PATCH v8 6/6] arm64: add seccomp support AKASHI Takahiro
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20141119190601.GM15985@arm.com \
--to=will.deacon@arm.com \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).