From: Mark Kettenis <mark.kettenis@xs4all.nl>
To: dje@google.com
Cc: gdb@sourceware.org
Subject: Re: i386 int3 handling, running vs stepping
Date: Tue, 03 Feb 2009 09:21:00 -0000 [thread overview]
Message-ID: <200902030920.n139KqMX010260@brahms.sibelius.xs4all.nl> (raw)
In-Reply-To: <20090201231819.A9FB61C7A19@localhost> (dje@google.com)
> Date: Sun, 1 Feb 2009 15:18:19 -0800 (PST)
> From: dje@google.com (Doug Evans)
>
> gdb is inconsistent in its handling of int3 instructions on x86.
>
> bash$ cat int3.S
> .text
> .global main
> main:
> nop
> int3
> nop
> hlt
>
> bash$ gcc -g -Wa,-g int3.S -o int3
> bash$ gdb int3
> (gdb) run
> -->
> Program received signal SIGTRAP, Trace/breakpoint trap.
> main () at int3.S:6
> 6 nop
>
> Note that $pc is the insn AFTER the int3.
> Question: Is this a bug? Should $pc point to the int3 instead?
No, this is not a bug. It is how the architecture works.
> I can argue either case, I don't have a preference per se.
>
> Trying things again, this time stepi'ing over the insn:
>
> bash$ gdb int3
> (gdb) start
> [...]
> Temporary breakpoint 1, main () at int3.S:4
> 4 nop
> Current language: auto; currently asm
> (gdb) si
> 5 int3
> (gdb) si
> 6 nop
> (gdb)
>
> Note that int3 was stepping over without a SIGTRAP being generated.
Yes, the SIGTRAP is eaten by gdb because it was an expected
side-effect of single-stepping the instruction. The ptrace(2)/wait(2)
interface traditionally used by debuggers can't really tell the
difference between hitting a breakpoint and single-stepping. This
could be overcome with some kernel hacking by making it possible to
look at the signal code (probably already possible on recent Linux
kernels). But I don't see a real reason to do that.
> [I haven't tried setting a breakpoint at the int3 insn, but
> GDB can know whether it's stepping over one of its own breakpoints
> or an int3 that's part of the program, so I think(!) gdb can be consistent
> here regardless.]
GDB will interpret this as a normal breakpoint, and won't generate a SIGTRAP.
> The only question I have is what should the value of $pc be after
> hitting an int3 instruction during normal execution? (ie. no stepping,
> no breakpoints).
The address of the instruction immediately following the int3 instruction.
prev parent reply other threads:[~2009-02-03 9:21 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-02-01 23:18 Doug Evans
2009-02-01 23:33 ` Daniel Jacobowitz
2009-02-01 23:38 ` Doug Evans
2009-02-02 4:25 ` Daniel Jacobowitz
2009-02-02 20:03 ` Doug Evans
2009-02-02 21:49 ` Daniel Jacobowitz
2009-02-03 1:26 ` Doug Evans
2009-02-03 4:08 ` Daniel Jacobowitz
2009-02-03 9:22 ` Mark Kettenis
2009-02-02 0:52 ` Doug Evans
2009-02-02 6:08 ` Robert Dewar
2009-02-02 6:19 ` teawater
2009-02-03 9:21 ` Mark Kettenis [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200902030920.n139KqMX010260@brahms.sibelius.xs4all.nl \
--to=mark.kettenis@xs4all.nl \
--cc=dje@google.com \
--cc=gdb@sourceware.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox