From mboxrd@z Thu Jan 1 00:00:00 1970 From: rostedt at goodmis.org (Steven Rostedt) Date: Tue, 7 May 2019 17:24:18 -0400 Subject: [RFC][PATCH 1/2] x86: Allow breakpoints to emulate call functions In-Reply-To: <20190507172159.5t3bm3mjkwagvite@treble> References: <20190506225819.11756974@oasis.local.home> <20190506232158.13c9123b@oasis.local.home> <20190507111227.1d4268d7@gandalf.local.home> <20190507163440.GV2606@hirez.programming.kicks-ass.net> <20190507172159.5t3bm3mjkwagvite@treble> Message-ID: <20190507172418.67ef6fc3@gandalf.local.home> On Tue, 7 May 2019 12:21:59 -0500 Josh Poimboeuf wrote: > regs->sp is *undefined* on x86-32. We're damning our future selves to > have to always remember to use that darn kernel_stack_pointer() helper > for eternity just because of x86-32. And there's been several times I forget that regs->sp can not be read directly. Especially most of my bug reports are for x86_64 these days. But when I had that seldom x86_32 one, and go debugging, I would print out "regs->sp" and then the system would crash. And I spend some time wondering why? It's been a bane of mine for some time. -- Steve From mboxrd@z Thu Jan 1 00:00:00 1970 From: rostedt@goodmis.org (Steven Rostedt) Date: Tue, 7 May 2019 17:24:18 -0400 Subject: [RFC][PATCH 1/2] x86: Allow breakpoints to emulate call functions In-Reply-To: <20190507172159.5t3bm3mjkwagvite@treble> References: <20190506225819.11756974@oasis.local.home> <20190506232158.13c9123b@oasis.local.home> <20190507111227.1d4268d7@gandalf.local.home> <20190507163440.GV2606@hirez.programming.kicks-ass.net> <20190507172159.5t3bm3mjkwagvite@treble> Message-ID: <20190507172418.67ef6fc3@gandalf.local.home> Content-Type: text/plain; charset="UTF-8" Message-ID: <20190507212418.IEldoPFQOAT9EPb4Az3R_MNIDZNoNUmXvSN1BHh6ekU@z> On Tue, 7 May 2019 12:21:59 -0500 Josh Poimboeuf wrote: > regs->sp is *undefined* on x86-32. We're damning our future selves to > have to always remember to use that darn kernel_stack_pointer() helper > for eternity just because of x86-32. And there's been several times I forget that regs->sp can not be read directly. Especially most of my bug reports are for x86_64 these days. But when I had that seldom x86_32 one, and go debugging, I would print out "regs->sp" and then the system would crash. And I spend some time wondering why? It's been a bane of mine for some time. -- Steve