[Bug 46472] Linux kernel 4.19 breaks startup of BO2 due to change in PTRACE_POKEUSER hw breakpoint behavior

wine-bugs at winehq.org wine-bugs at winehq.org
Sat Feb 16 19:45:19 CST 2019


https://bugs.winehq.org/show_bug.cgi?id=46472

--- Comment #35 from tjb <troyb at us.ibm.com> ---
I corrected my pilot error in intercepting peeks and pokes.  The code I used is 
added to server/ptrace.c as follows, where ptrace call is replaced with ptraced
for ever POKEUSER and PEEKUSER.  I attached the results for the crash case (new
hw breakpoint code in 4.19) and for the successful launch case (same 4.19
kernel with hw breakpoint reverted to previous behavior).


#if 1
long ptraced(enum __ptrace_request request, pid_t pid,
             void *addr, void *data) 

{
   if (request == PTRACE_POKEUSER)
      fprintf(stderr,"PTRACE_POKEUSER pid %x addr %p data %p\n",pid,addr,data);
   else if (request == PTRACE_PEEKUSER)
      fprintf(stderr,"PTRACE_PEEKUSER pid %x addr %p data %p\n",pid,addr,data);

   return(ptrace(request,pid,addr,data));
}
#else
#define ptraced(request,pid,addr,data) ptrace(request,pid,addr,data)
#endif

-- 
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.



More information about the wine-bugs mailing list