This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
Re: Kprobes might be stealing int3
- From: Ananth N Mavinakayanahalli <ananth at in dot ibm dot com>
- To: "Mao, Bibo" <bibo dot mao at intel dot com>
- Cc: "Keshavamurthy, Anil S" <anil dot s dot keshavamurthy at intel dot com>, systemtap at sources dot redhat dot com
- Date: Fri, 24 Feb 2006 08:09:23 +0530
- Subject: Re: Kprobes might be stealing int3
- References: <9FBCE015AF479F46B3B410499F3AE05B0898FC@pdsmsx405>
- Reply-to: ananth at in dot ibm dot com
On Fri, Feb 24, 2006 at 08:56:47AM +0800, Mao, Bibo wrote:
> Anil,
> I search the x86 assembly manual, about INT instruction there are three kinds:
> CC INT 3 Interrupt 3âtrap to debugger
> CD ib INT imm8 Interrupt vector number specified by immediate byte
> CE INTO Interrupt 4âif overflow flag is 1
> So like this test program, the instruction encoding will be 0x03cd, it has the same effect with 0xcc encoding.
> And currently in kprobe BREAK_INSTRUCTION is only defined as 0xcc. Maybe another encoding also need be judged.
I think you are right. We had a similar problem with PowerPC where you
can potentially have _many_ opcodes for a "TRAP". For a while, GDB on
Power was borken 'cos we weren't taking care of all cases. That resulted
in the IS_TRAP() macro in include/asm-powerpc/kprobes.h. Something of
that sort may be needed for the other archs in question.
In effect, the
if (*addr != BREAKPOINT_INSTRUCTION)
must be expanded to consider the other opcode cases and pass on control
to other apps that may be waiting on it (Again check
arch/powerpc/kernel/kprobes.c for usage of IS_TRAP).
Ananth
> Thanks
> bibo,mao
>
> >-----Original Message-----
> >From: systemtap-owner@sourceware.org [mailto:systemtap-owner@sourceware.org]
> >On Behalf Of Keshavamurthy, Anil S
> >Sent: 2006å2æ24æ 7:34
> >To: systemtap@sources.redhat.com
> >Subject: FW: Kprobes might be stealing int3
> >
> >I went little further and found why the application is segmentation
> >fault'ing.
> >
> >In the kprobes_handler() code, we are checking
> >If (*addr != BREAK_INSTRUCTION) and this is where the
> >app is crashing since we are trying to dereference this address
> >which is not a linear address.
> >
> >I would be happy to tryout any fix that any one provides.
> >
> >Thanks,
> >Anil
> >-----Original Message-----
> >From: Keshavamurthy Anil S [mailto:anil.s.keshavamurthy@intel.com]
> >Sent: Thursday, February 23, 2006 12:11 PM
> >To: Systemtap
> >Cc: Keshavamurthy, Anil S
> >Subject: Kprobes might be stealing int3
> >
> >Hi,
> > I tried running the below program on both
> >x86_64 and i386 and on both architecture,
> >if the kernel is compiled with CONFIG_KPROBES,
> >my below application segmentation faults.
> >
> >On kernel where CONFIG_KPROBES set to N, the
> >same test program passes.
> >
> >Here goes the test program...
> >-------------------------
> >#include <stdlib.h>
> >#include <signal.h>
> >
> >void my_trap(int sig)
> >{
> > printf("Test passed, all OK\n");
> > exit(0);
> >}
> >
> >int main()
> >{
> > signal(SIGTRAP, my_trap);
> > asm volatile (".byte 0xcd,3");
> > printf("Stolen interrupt, very bad!\n");
> >}
> >----------------------------------
> >
> >
> >
> >
> >
> >