From: mark.rutland@arm.com (Mark Rutland)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH] arm64: Rework valid_user_regs
Date: Wed, 10 Feb 2016 16:05:50 +0000 [thread overview]
Message-ID: <20160210160550.GF2632@leverpostej> (raw)
In-Reply-To: <20160210160420.GQ1052@arm.com>
On Wed, Feb 10, 2016 at 04:04:21PM +0000, Will Deacon wrote:
> On Wed, Feb 10, 2016 at 04:01:27PM +0000, Mark Rutland wrote:
> > On Wed, Feb 10, 2016 at 02:43:24PM +0000, Will Deacon wrote:
> > > On Wed, Feb 10, 2016 at 02:23:29PM +0000, Peter Maydell wrote:
> > > > On 10 February 2016 at 12:31, Mark Rutland <mark.rutland@arm.com> wrote:
> > > > > On Wed, Feb 10, 2016 at 11:58:53AM +0000, Will Deacon wrote:
> > > > >> I think we should err on the side of caution and nuke SS and IL for both
> > > > >> native and compat too, although that seems a odds with the PSR_s mask.
> > > > >> I wonder how relevant those PSR groups are in ARMv8...
> > > > >
> > > > > Ok.
> > > >
> > > > If you nuke SS does that have any side effects in the case
> > > > of (for instance) interactions between ptrace single step
> > > > and ptrace syscall tracing? (ie do we ever end up in a situation
> > > > where the ptracer can read a PSR for the debuggee which has
> > > > SS set? if so then it should be able to write back the PSR
> > > > it has just read without any bits being unset.)
> > >
> > > I don't think so -- the signal dispatch logic "fast-forwards" the stepping
> > > state machine so that we step into the signal handler, therefore the SS
> > > bit should always be clear on entry afaict.
> >
> > That handles entry, but what about exit?
> >
> > Is there are a guarantee that we won't call user_enable_single_step() if
> > the return path is traced?
>
> Why would that be a problem? I think I'm missing your point...
We would nuke the SS bit if the tracing happens after
user_enable_single_step, if the tracer fiddled with pstate at all. So
you wouldn't get the single stepping you expected.
Maybe I'm missing some reason this is prevented by construction.
Mark.
next prev parent reply other threads:[~2016-02-10 16:05 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-02-09 18:11 [PATCH] arm64: Rework valid_user_regs Mark Rutland
2016-02-10 11:58 ` Will Deacon
2016-02-10 12:31 ` Mark Rutland
2016-02-10 14:23 ` Peter Maydell
2016-02-10 14:43 ` Will Deacon
2016-02-10 16:01 ` Mark Rutland
2016-02-10 16:04 ` Will Deacon
2016-02-10 16:05 ` Mark Rutland [this message]
2016-02-10 16:36 ` Will Deacon
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20160210160550.GF2632@leverpostej \
--to=mark.rutland@arm.com \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox