赞
踩
main()
{
char c='x';
read(0,&c,1);
printf("go\n");
printf("come\n");
}
编译生成a.out后,运行gdb a.out
(gdb) b main
Breakpoint 1 at 0x80483e5: file gdb.c, line 3.
(gdb) r
Starting program: /tmp/tx
Breakpoint 1, main () at gdb.c:3
3 char c='x';
(gdb) set $foo=&c
(gdb) watch *$foo //对c所在的地址设置一个观察点
Hardware watchpoint 2: *$foo
(gdb) del 1
(gdb) c
Continuing.
Hardware watchpoint 2: *$foo
Old value = 0 '\0'
New value = 120 'x'
main () at gdb.c:4
4 read(0,&c,1);
(gdb) c
Continuing. //输入回车
Hardware watchpoint 2: *$foo
Old value = 120 'x'
New value = 10 '\n'
0x00ae3402 in __kernel_vsyscall ()
(gdb)
Continuing.
Program received signal SIGTRAP, Trace/breakpoint trap. //此后,gdb不停收到sigtrap信号,不知何故
0x009f23f3 in __read_nocancel () from /lib/libc.so.6
(gdb)
Continuing.
Program received signal SIGTRAP, Trace/breakpoint trap.
0x009f23f4 in __read_nocancel () from /lib/libc.so.6
(gdb)
Continuing.
Program received signal SIGTRAP, Trace/breakpoint trap.
0x009f23f9 in __read_nocancel () from /lib/libc.so.6
(gdb)
但如果把代码改成
main()
{
char c='x';
printf("go\n");
c++;
printf("come\n");
}
sigtrap就不会发生。第一个程序,c的值是在kernel里面被改的,第二个程序,c是在用户空间被改的。为什么在kernel里修改观察点的值,就会不断收到sigtrap呢?
=====================================================================解决办法
=====================================================================
本帖最后由 cjog 于 2012-01-17 17:29 编辑
找到解决问题的办法了
在kernel mode改写了watchpoint的值以后,cpu把eflags的TF位置1了,照理说gdb应该清0这一位,但由于未知原因,gdb没清0该位,
(gdb) info registers
eax 0x1 1
ecx 0xbfa4fc93 -1079706477
edx 0x1 1
ebx 0x0 0
esp 0xbfa4fc64 0xbfa4fc64
ebp 0xbfa4fc98 0xbfa4fc98
esi 0x92dca0 9624736
edi 0x0 0
eip 0x978402 0x978402 <__kernel_vsyscall>
eflags 0x200346 [ PF ZF TF IF ID ]
cs 0x73 115
ss 0x7b 123
ds 0x7b 123
es 0x7b 123
fs 0x0 0
gs 0x33 51
(gdb)
只需手动清楚该位即可:
(gdb) set $ps&=~(1<<8) 【on x86-based machines $ps is an alias for the eflags register,TF is the 9th bit of eflags】
(gdb) info registers
eax 0x1 1
ecx 0xbf90f353 -1081019565
edx 0x1 1
ebx 0x0 0
esp 0xbf90f324 0xbf90f324
ebp 0xbf90f358 0xbf90f358
esi 0x92dca0 9624736
edi 0x0 0
eip 0xe66402 0xe66402 <__kernel_vsyscall>
eflags 0x200246 [ PF ZF IF ID ]
cs 0x73 115
ss 0x7b 123
ds 0x7b 123
es 0x7b 123
fs 0x0 0
gs 0x33 51
(gdb)
再continue,gdb就不会不停收到SIGTRAP了
Copyright © 2003-2013 www.wpsshop.cn 版权所有,并保留所有权利。