32-bit Thumb-2 breakpoints

Russell King - ARM Linux linux at arm.linux.org.uk
Wed Feb 3 11:35:22 EST 2010


On Wed, Feb 03, 2010 at 10:35:01AM -0500, Daniel Jacobowitz wrote:
> On Wed, Feb 03, 2010 at 03:30:25PM +0000, Russell King - ARM Linux wrote:
> > On Wed, Feb 03, 2010 at 10:19:31AM -0500, Daniel Jacobowitz wrote:
> > > On a related note, it would be Very Helpful(TM) if someone would
> > > implement read-only access to the helper page via ptrace!  Not as
> > > helpful as a visible vDSO with symbol names would be, but it would
> > > still make things a lot easier.
> > 
> > Apart from the TLS value which can be obtained by PTRACE_GET_THREAD_AREA,
> > the contents of the page is constant across all processes on all CPUs.
> 
> Yes, I'm aware of that - but having it unreadable means special cases
> all through GDB, gdbserver, and anything else that wants to read
> memory.

Well, we could siphon off the PEEK calls, and special case them at
the arch layer - it'll basically be the same hack as what you're
suggesting, only in the kernel instead.

So really the question is whether we want a hack for this in the
kernel or in userspace.



More information about the linux-arm-kernel mailing list