Re: [RESEND][PATCH] x86: don't destroy %rbp on kernel-mode faults

From: Ingo Molnar
Date: Fri Jun 27 2008 - 11:46:41 EST



* Vegard Nossum <vegard.nossum@xxxxxxxxx> wrote:

> >From the code:
>
> "B stepping K8s sometimes report an truncated RIP for IRET exceptions
> returning to compat mode. Check for these here too."
>
> The code then proceeds to truncate the upper 32 bits of %rbp. This means
> that when do_page_fault() is finally called, its prologue,
>
> do_page_fault:
> push %rbp
> movl %rsp, %rbp
>
> will put the truncated base pointer on the stack. This means that the
> stack tracer will not be able to follow the base-pointer changes and
> will see all subsequent stack frames as unreliable.
>
> This patch changes the code to use a different register (%rcx) for the
> checking and leaves %rbp untouched.

applied to tip/x86/debug - thanks Vegard!

Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/