https://bugzilla.kernel.org/show_bug.cgi?id=65561

--- Comment #30 from Jidong Xiao <[email protected]> ---
Jatin,

I have the following program and I did test the single step for sti command,

(gdb) disas main
Dump of assembler code for function main:
   0x08048414 <+0>:     push   %ebp
   0x08048415 <+1>:     mov    %esp,%ebp
   0x08048417 <+3>:     and    $0xfffffff0,%esp
   0x0804841a <+6>:     sub    $0x10,%esp
=> 0x0804841d <+9>:     sti
   0x0804841e <+10>:    movl   $0x8048500,(%esp)
   0x08048425 <+17>:    call   0x8048350 <puts@plt>
   0x0804842a <+22>:    leave
   0x0804842b <+23>:    ret
End of assembler dump.
(gdb) nexti

Program received signal SIGSEGV, Segmentation fault.
0x0804841d in main ()
(gdb)

And what I have got is a segmentation fault. Since you said you triggered the
bug via a kernel module, how did you do the single step test for a kernel
module?

In the meanwhile I am studying kvm-unit-test, since Paolo said it provides a
single step test platform.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to