diff options
author | Sebastian Andrzej Siewior <bigeasy@linutronix.de> | 2012-08-20 12:47:34 +0200 |
---|---|---|
committer | Oleg Nesterov <oleg@redhat.com> | 2012-09-15 17:37:28 +0200 |
commit | bdc1e47217315be14ba04881b0a4c8ecb3ff320c (patch) | |
tree | 12f3ad73096cffde4d560c44783d791c5333a797 /arch/x86/include/asm/uprobes.h | |
parent | 9d778782266f95e5c6ec43ed8195ba331c821018 (diff) | |
download | talos-obmc-linux-bdc1e47217315be14ba04881b0a4c8ecb3ff320c.tar.gz talos-obmc-linux-bdc1e47217315be14ba04881b0a4c8ecb3ff320c.zip |
uprobes/x86: Implement x86 specific arch_uprobe_*_step
The arch specific implementation behaves like user_enable_single_step()
except that it does not disable single stepping if it was already
enabled by ptrace. This allows the debugger to single step over an
uprobe. The state of block stepping is not restored. It makes only sense
together with TF and if that was enabled then the debugger is notified.
Note: this is still not correct. For example, TIF_SINGLESTEP check
is not right, the application itself can set X86_EFLAGS_TF. And otoh
we leak TIF_SINGLESTEP (set by enable) if the probed insn is "popf".
See the next patches, we need the changes in arch/x86/kernel/step.c
first.
Signed-off-by: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
Signed-off-by: Oleg Nesterov <oleg@redhat.com>
Acked-by: Srikar Dronamraju <srikar@linux.vnet.ibm.com>
Diffstat (limited to 'arch/x86/include/asm/uprobes.h')
-rw-r--r-- | arch/x86/include/asm/uprobes.h | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/arch/x86/include/asm/uprobes.h b/arch/x86/include/asm/uprobes.h index f3971bbcd1de..cee58624cb30 100644 --- a/arch/x86/include/asm/uprobes.h +++ b/arch/x86/include/asm/uprobes.h @@ -46,6 +46,8 @@ struct arch_uprobe_task { #ifdef CONFIG_X86_64 unsigned long saved_scratch_register; #endif +#define UPROBE_CLEAR_TF (1 << 0) + unsigned int restore_flags; }; extern int arch_uprobe_analyze_insn(struct arch_uprobe *aup, struct mm_struct *mm, unsigned long addr); |