Right, and if I put on the breaks and they don't work because the
factory has not designed the break shoes yet, it is not a bug???

This is a correct description of the problem, but I don't agree that it
is not a bug!

And further, if I can get even a hint (from the maintainers) as to how
to fix the problem, I stand ready to pick at my trusty keys and do it.

Or am I expecting too much?

Corollary to "the squeaky wheel gets the grease":  He who complains most
about the squeaking gets to do the greasing.

George

"Amit S. Kale" wrote:
> 
> When debugging applications, gdb pushes function parameters on
> *application*'s
> stack. Since kgdb stub shares stack with the kernel code being debugged,
> evaluating a function from gdb currupts the kernel stack.
> This is how stack appears when in debugger (stack grows downward)
> 
> address, flags and error code where breakpoint/fault occured
> Saved registers
> Debugger function parameters and local variables
> 
> This is not a bug, hence hasn't been addressed yet.
> 
> George Anzinger wrote:
> >
> > Using the 386 kgdb code, I wanted to get gdb to evaluate a kernel
> > function.  The result wiped out the system (i.e. reboot).  I think the
> > problem is that gdb puts the calling code and parameters on the stack,
> > but i386_stub is using the same stack.  Gdb only knows the stack address
> > above the call to the stub (i.e. where the trap was taken).  This means
> > that the stubs stack is wiped.  Has anyone addressed this?  What gdb
> > does makes sense if it is using ptrace, but not if it is remote
> > debugging.
> >
> > George
> >
> 
> --
> Amit Kale
> Veritas Software ( http://www.veritas.com )

Reply via email to