From: Daniel Jacobowitz <drow@false.org>
To: Mark Kettenis <mark.kettenis@xs4all.nl>
Cc: gdb-patches@sourceware.org
Subject: Re: [commit] Fix OpenBSD/i386 and OpenBSD/amd64 kernel trapframe unwinders
Date: Fri, 23 Dec 2005 08:29:00 -0000 [thread overview]
Message-ID: <20051222152615.GA4248@nevyn.them.org> (raw)
In-Reply-To: <200512221520.jBMFK7fL029527@elgar.sibelius.xs4all.nl>
On Thu, Dec 22, 2005 at 04:20:07PM +0100, Mark Kettenis wrote:
> I've struggled with this for a while. Apart from adding DWARF2 CFI to
> the kernel, there's no real alternative to matching function names.
> And DWARF2 doesn't allow me to terminate the backtrace at the user to
> kernel transition.
Yes it does - what do you think inspired my patches for an undefined
return address column? :-) They were for Linux's KGDB.
Unless the OpenBSD kernel has a distressingly large number of entry
points, the same thing should work there. It's only if you want to do
something besides stop at the boundary that things get really
complicated.
> Simply matching the function names is of course
> unacceptable, so I had to do something a bit more clever. If you look
> at the sniffer for the unwinder, you see the following check:
>
> cs = frame_unwind_register_unsigned (next_frame, AMD64_CS_REGNUM);
> if ((cs & I386_SEL_RPL) == I386_SEL_UPL)
> return 0;
>
> This checks the Requested Protection Level, which is stored in the
> lower two bits of %cs. When executing in the kernel, the RPL is 0,
> for userland its 3. So we can reliably check whether we're in the
> kernel or in userland. And I only check the magic function names when
> the current frame is a kernel frame. I guess I should add a comment
> in the code about that.
Aha, I missed that. And we're OpenBSD targeted here, so if we're in
kernel mode, it's a reasonably safe assumption that we're in the
OpenBSD kernel. I'd appreciate a clarifying comment.
> P.S. The new Xorg X11R6.9/X11R7.0 doesn't need any special patches
> anymore since they now use dlopen(3) to load modules.
Ooh, that's good news. The Linux kernel module loader still does,
though - they've been talking about loading objects as shared libraries
for years, but I don't think it's going to happen soon.
--
Daniel Jacobowitz
CodeSourcery, LLC
next prev parent reply other threads:[~2005-12-22 15:26 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2005-12-22 17:07 Mark Kettenis
2005-12-22 19:45 ` Daniel Jacobowitz
2005-12-22 22:46 ` Mark Kettenis
2005-12-23 8:29 ` Daniel Jacobowitz [this message]
2005-12-23 14:29 ` Mark Kettenis
2005-12-23 18:46 ` Daniel Jacobowitz
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20051222152615.GA4248@nevyn.them.org \
--to=drow@false.org \
--cc=gdb-patches@sourceware.org \
--cc=mark.kettenis@xs4all.nl \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox