This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug uprobes/15972] core dump with process probes


https://sourceware.org/bugzilla/show_bug.cgi?id=15972

--- Comment #6 from Josh Stone <jistone at redhat dot com> ---
(In reply to Mark Wielaard from comment #2)
> I am surprised gdb sees the int3.

I'm not surprised.  The int3 can't be hidden from the process itself, of
course, since it needs to be executed.  Hiding from gdb would require uprobes
to intercept and fake the ptrace peek, which I suppose is possible, but
questionable.

> And that it gets a SIGSEGV here (not a SIGTRAP).

If uprobes is trying to send IP to 7fffffffe080, as dmesg suggests, and if that
doesn't exist, then a SIGSEGV is perfectly reasonable.  I expect that address
is supposed to be where the out-of-line instruction copy lives.

-- 
You are receiving this mail because:
You are the assignee for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]