This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug uprobes/15972] core dump with process probes
- From: "jistone at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Fri, 20 Sep 2013 18:33:44 +0000
- Subject: [Bug uprobes/15972] core dump with process probes
- Auto-submitted: auto-generated
- References: <bug-15972-6586 at http dot sourceware dot org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=15972
--- Comment #6 from Josh Stone <jistone at redhat dot com> ---
(In reply to Mark Wielaard from comment #2)
> I am surprised gdb sees the int3.
I'm not surprised. The int3 can't be hidden from the process itself, of
course, since it needs to be executed. Hiding from gdb would require uprobes
to intercept and fake the ptrace peek, which I suppose is possible, but
questionable.
> And that it gets a SIGSEGV here (not a SIGTRAP).
If uprobes is trying to send IP to 7fffffffe080, as dmesg suggests, and if that
doesn't exist, then a SIGSEGV is perfectly reasonable. I expect that address
is supposed to be where the out-of-line instruction copy lives.
--
You are receiving this mail because:
You are the assignee for the bug.