From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758087Ab3AIRxh (ORCPT ); Wed, 9 Jan 2013 12:53:37 -0500 Received: from mx1.redhat.com ([209.132.183.28]:23812 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758023Ab3AIRxf (ORCPT ); Wed, 9 Jan 2013 12:53:35 -0500 Date: Wed, 9 Jan 2013 18:52:03 +0100 From: Oleg Nesterov To: Pedro Alves Cc: u3557@miso.sublimeip.com, Denys Vlasenko , Jan Kratochvil , Cyrill Gorcunov , Pavel Emelyanov , Steven Rostedt , Frederic Weisbecker , Ingo Molnar , Peter Zijlstra , linux-kernel@vger.kernel.org Subject: Re: PTRACE_SYSCALL && vsyscall (Was: arch_check_bp_in_kernelspace: fix the range check) Message-ID: <20130109175203.GA32191@redhat.com> References: <20121125225533.GA24905@redhat.com> <20121125234834.DAC34592076@miso.sublimeip.com> <20121202193058.GA4264@redhat.com> <841b7a319f9d22402d269eed23d03835.squirrel@mail.sublimeip.com> <20121204175933.GA11537@redhat.com> <50EC527C.5030800@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <50EC527C.5030800@redhat.com> User-Agent: Mutt/1.5.18 (2008-05-17) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/08, Pedro Alves wrote: > > On 12/04/2012 05:59 PM, Oleg Nesterov wrote: > > > But If we want to allow to trace vsyscall's, hw bp doesn't look very > > nice imo. HBP_NUM = 4 and you need to setup 3 bp's to trace them all. > > Irrespective of the whole syscall tracing issue, allowing HW bkpts in > the vsyscall just seems like a bug fix to me. And I never argued. I sent the patch iirc ;) > > That is why I think PTRACE_SYSCALL should "simply work" somehow. And > > so far I think that "just report syscall_exit with orig_ax = -1" is > > the best (and simple) solution. > > If you report exit alone, you'll confuse current GDB into mistaking > it for an enter, Sure. That is why I asked Jan. > > OK. We can do more. We can report both syscall_enter/exit and we can > > change orig_ax/ax temporary to "fool" the tracer, so that everything > > will look as a "normal" syscall. Like vsyscall_seccomp() does. > > > > But this needs much more changes. > > I'd just like to add, that if any new syscall related option is > to be added, can we please just go all the way and add > PTRACE_EVENT_SYSCALL_ENTER|PTRACE_EVENT_SYSCALL_EXIT instead? Oh yes, this was suggested many times. Oleg.