public inbox for gdb-patches@sourceware.org
 help / color / mirror / Atom feed
* Re: [PATCH] Fix exception unwinding for ARM Cortex-M
       [not found] ` <HE1PR1001MB130613C0995C4C21A630373BEF1B0@HE1PR1001MB1306.EURPRD10.PROD.OUTLOOK.COM>
@ 2019-06-10 21:25   ` James-Adam Renquinha Henri
  2019-06-12  9:01     ` Alan Hayward
  0 siblings, 1 reply; 10+ messages in thread
From: James-Adam Renquinha Henri @ 2019-06-10 21:25 UTC (permalink / raw)
  To: Fredrik Hederstierna, Yao Qi, gdb-patches

Hi everyone in this thread, (not many as I see)

We could take another shot at integrating some changes to GDB so it 
works correctly, but that may only happen if there are the least amount 
of useless bike-shedding and that the right people in the mailing list 
contribute.

Basically, we must 1) make *very* clear the fact that Cortex-M devices 
are used typically in a bare-metal system with no OS (read: Linux) 
whatsoever, only possibly a tiny scheduler and that's all. That means we 
don't have to be concerned about "user visible" registers and whatnot, 
they are all visible anyway, and if the spec says that a register 
exists, *it is visible*, period. Other thing though, 2) my patch 
achieved its goal in a rather weaselly way, and the correct way is 
indeed to have it integrated into target features. But I need more info 
on the matter, and I'm a bit clueless about what to do with those 
"target features", how they are handled by GDB and how I can test the 
new configuration in isolation, without being "altered" by e.g. OpenOCD, 
which handily provides a target description that I can use as I did before.

I sure can figure it out all by myself, but that might be only after 
pouring an rather big amount of time into the matter that I cannot 
afford to do now. I need active collaboration and answers.

Here, let that message be in the mailing list for everyone to see.

James-Adam Renquinha Henri, Ing. jr
Ingénieur d'application
CIMEQ INC.


On 19-06-02 03 h 31, Fredrik Hederstierna wrote:
> Hi Yao, Adam,
> 
> 
> Some years back there was done some work done on unwinding on Cortex-M.
> 
> Only the very first start of the chain of patches was completed (new 
> function arm_m_pc_is_magic()).
> 
> 
> The actual real patch work with code work by me/Adam for cortex-M4F 
> MSP/PSP and unwinding did never reached the repo.
> 
> 
> What do you think of making another attempt to fix the stuff, I guess 
> all paper-work etc is in place, so we can try do a retake on this?
> 
> 
> Thanks, Best Regards, Fredrik
> 
> ------------------------------------------------------------------------
> *From:* Yao Qi <qiyaoltc@gmail.com>
> *Sent:* Tuesday, September 27, 2016 3:38 AM
> *To:* Adam Renquinha
> *Cc:* Fredrik Hederstierna; gdb-patches@sourceware.org
> *Subject:* Re: [PATCH] Fix exception unwinding for ARM Cortex-M
> On Mon, Sep 26, 2016 at 3:26 PM, Adam Renquinha <arenquinha@cimeq.qc.ca> 
> wrote:
>> That looks correct.
>>
> 
> Patch is pushed into master and 7.12.  The rest of your original
> patch is still welcome!
> 
> -- 
> Yao (齐尧)

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] Fix exception unwinding for ARM Cortex-M
  2019-06-10 21:25   ` [PATCH] Fix exception unwinding for ARM Cortex-M James-Adam Renquinha Henri
@ 2019-06-12  9:01     ` Alan Hayward
  2020-08-29  8:35       ` [PATCH] Fix exception stack " Fredrik Hederstierna
  0 siblings, 1 reply; 10+ messages in thread
From: Alan Hayward @ 2019-06-12  9:01 UTC (permalink / raw)
  To: James-Adam Renquinha Henri, Fredrik Hederstierna
  Cc: Yao Qi, gdb-patches\@sourceware.org, nd

Not much development happens on the Arm port of GDB these days, so getting unwinding support in would be useful and much appreciated.  I have on my backlog a plan to switch the Arm port to the newer way of doing target descriptions - I suspect that might help your patches.

I’m happy to take a look at what you had. To save time and to make things easier, for the remaining patches that are still outstanding could you please either repost them or provide some links to sourceware.org/ml/gdb-patches/ where they were posted. Also, so as not to just repeat the original discussions, what were the outstanding objections with them?

Alan.

> On 10 Jun 2019, at 22:24, James-Adam Renquinha Henri <arenquinha@cimeq.qc.ca> wrote:
> 
> Hi everyone in this thread, (not many as I see)
> 
> We could take another shot at integrating some changes to GDB so it works correctly, but that may only happen if there are the least amount of useless bike-shedding and that the right people in the mailing list contribute.
> 
> Basically, we must 1) make *very* clear the fact that Cortex-M devices are used typically in a bare-metal system with no OS (read: Linux) whatsoever, only possibly a tiny scheduler and that's all. That means we don't have to be concerned about "user visible" registers and whatnot, they are all visible anyway, and if the spec says that a register exists, *it is visible*, period. Other thing though, 2) my patch achieved its goal in a rather weaselly way, and the correct way is indeed to have it integrated into target features. But I need more info on the matter, and I'm a bit clueless about what to do with those "target features", how they are handled by GDB and how I can test the new configuration in isolation, without being "altered" by e.g. OpenOCD, which handily provides a target description that I can use as I did before.
> 
> I sure can figure it out all by myself, but that might be only after pouring an rather big amount of time into the matter that I cannot afford to do now. I need active collaboration and answers.
> 
> Here, let that message be in the mailing list for everyone to see.
> 
> James-Adam Renquinha Henri, Ing. jr
> Ingénieur d'application
> CIMEQ INC.
> 
> 
> On 19-06-02 03 h 31, Fredrik Hederstierna wrote:
>> Hi Yao, Adam,
>> Some years back there was done some work done on unwinding on Cortex-M.
>> Only the very first start of the chain of patches was completed (new function arm_m_pc_is_magic()).
>> The actual real patch work with code work by me/Adam for cortex-M4F MSP/PSP and unwinding did never reached the repo.
>> What do you think of making another attempt to fix the stuff, I guess all paper-work etc is in place, so we can try do a retake on this?
>> Thanks, Best Regards, Fredrik
>> ------------------------------------------------------------------------
>> *From:* Yao Qi <qiyaoltc@gmail.com>
>> *Sent:* Tuesday, September 27, 2016 3:38 AM
>> *To:* Adam Renquinha
>> *Cc:* Fredrik Hederstierna; gdb-patches@sourceware.org
>> *Subject:* Re: [PATCH] Fix exception unwinding for ARM Cortex-M
>> On Mon, Sep 26, 2016 at 3:26 PM, Adam Renquinha <arenquinha@cimeq.qc.ca> wrote:
>>> That looks correct.
>>> 
>> Patch is pushed into master and 7.12.  The rest of your original
>> patch is still welcome!
>> -- 
>> Yao (齐尧)


^ permalink raw reply	[flat|nested] 10+ messages in thread

* [PATCH] Fix exception stack unwinding for ARM Cortex-M
  2019-06-12  9:01     ` Alan Hayward
@ 2020-08-29  8:35       ` Fredrik Hederstierna
  2020-09-02 13:24         ` Alan Hayward
  0 siblings, 1 reply; 10+ messages in thread
From: Fredrik Hederstierna @ 2020-08-29  8:35 UTC (permalink / raw)
  To: gdb-patches\@sourceware.org; +Cc: nd, James-Adam Renquinha Henri, Alan Hayward

[-- Attachment #1: Type: text/plain, Size: 661 bytes --]

For Cortex-M targets using floating-point, eg the Cortex-M4F, its not possible to get any call-stack backtrace if setting a breakpoint in ISR.

The exception stack unwinder for Cortex-M does not consider if floating-point registers was stacked or not,
further the Cortex-M has two stack pointers: MSP (Main Stack Pointer) and PSP (Process Stack Pointer).
This is not handled when GDB tries to backtrace in the exception stack unwinder.

This patch fixes this, and gives a correct call-stack backtrace from breakpoints set in a handler or ISR.

Best Regards,
Fredrik Hederstierna

Senior Software Developer
Verisure Innovation Centre
Malmoe Sweden

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: gdb-cortex-m-exception-unwind-fix.patch --]
[-- Type: text/x-patch; name="gdb-cortex-m-exception-unwind-fix.patch", Size: 5233 bytes --]

diff --git a/gdb/ChangeLog b/gdb/ChangeLog
index 1ff47c3355..1d80e8cfc8 100644
--- a/gdb/ChangeLog
+++ b/gdb/ChangeLog
@@ -1,3 +1,9 @@
+2020-08-29  Fredrik Hederstierna  <fredrik.hederstierna@verisure.com>
+	    Adam Renquinha <arenquinha@cimeq.qc.ca>
+
+	* arm-tdep.c (arm_m_exception_cache): Try use correct stack
+	pointer and stack frame offset when unwinding.
+
 2020-08-29  Pedro Alves  <pedro@palves.net>
 
 	* progspace.c (print_program_space): Use all_inferiors.  Switch to
diff --git a/gdb/arm-tdep.c b/gdb/arm-tdep.c
index 074eedb480..ed7d4b1d37 100644
--- a/gdb/arm-tdep.c
+++ b/gdb/arm-tdep.c
@@ -2923,14 +2923,59 @@ arm_m_exception_cache (struct frame_info *this_frame)
   struct gdbarch *gdbarch = get_frame_arch (this_frame);
   enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
   struct arm_prologue_cache *cache;
+  CORE_ADDR lr;
+  CORE_ADDR sp;
   CORE_ADDR unwound_sp;
   LONGEST xpsr;
+  uint32_t main_stack_used;
+  uint32_t extended_frame_used;
 
   cache = FRAME_OBSTACK_ZALLOC (struct arm_prologue_cache);
   cache->saved_regs = trad_frame_alloc_saved_regs (this_frame);
 
-  unwound_sp = get_frame_register_unsigned (this_frame,
-					    ARM_SP_REGNUM);
+  /* ARMv7-M Architecture Reference "B1.5.6 Exception entry behavior"
+     describes which bits in LR that define which stack was used prior
+     to the exception and if FPU is used (causing extended stack frame).  */
+
+  lr = get_frame_register_unsigned (this_frame, ARM_LR_REGNUM);
+  sp = get_frame_register_unsigned (this_frame, ARM_SP_REGNUM);
+
+  /* Check if main stack was used.  */
+  main_stack_used = ((lr & 0xf) != 0xd);
+  if (main_stack_used)
+    {
+      /* Main stack used, use MSP as SP.  */
+      unwound_sp = sp;
+    }
+  else
+    {
+      /* Thread (process) stack used.
+         Potentially this could be other register defined by target, but PSP
+         can be considered a standard name for the "Process Stack Pointer".
+         To be fully aware of system registers like MSP and PSP, these could
+         be added to a separate XML arm-m-system-profile that is valid for
+         ARMv6-M and ARMv7-M architectures. Also to be able to debug eg a
+         corefile off-line, then these registers must be defined by GDB,
+         and also be included in the corefile regsets.  */
+
+      int psp_regnum = user_reg_map_name_to_regnum (gdbarch, "psp", -1);
+      if (psp_regnum == -1)
+        {
+          /* Thread (process) stack could not be fetched,
+             give warning and exit.  */
+
+          warning (_("no PSP thread stack unwinding supported, exiting."));
+
+          /* Terminate any further stack unwinding by refer to self.  */
+          cache->prev_sp = sp;
+          return cache;
+        }
+      else
+        {
+          /* Thread (process) stack used, use PSP as SP.  */
+          unwound_sp = get_frame_register_unsigned (this_frame, psp_regnum);
+        }
+    }
 
   /* The hardware saves eight 32-bit words, comprising xPSR,
      ReturnAddress, LR (R14), R12, R3, R2, R1, R0.  See details in
@@ -2940,15 +2985,47 @@ arm_m_exception_cache (struct frame_info *this_frame)
   cache->saved_regs[1].addr = unwound_sp + 4;
   cache->saved_regs[2].addr = unwound_sp + 8;
   cache->saved_regs[3].addr = unwound_sp + 12;
-  cache->saved_regs[12].addr = unwound_sp + 16;
-  cache->saved_regs[14].addr = unwound_sp + 20;
-  cache->saved_regs[15].addr = unwound_sp + 24;
+  cache->saved_regs[ARM_IP_REGNUM].addr = unwound_sp + 16;
+  cache->saved_regs[ARM_LR_REGNUM].addr = unwound_sp + 20;
+  cache->saved_regs[ARM_PC_REGNUM].addr = unwound_sp + 24;
   cache->saved_regs[ARM_PS_REGNUM].addr = unwound_sp + 28;
 
+  /* Check if extended stack frame (FPU regs stored) was used.  */
+  extended_frame_used = ((lr & (1 << 4)) == 0);
+  if (extended_frame_used)
+    {
+      int i;
+      int fpu_regs_stack_offset;
+
+      /* This code does not take into account the lazy stacking, see "Lazy
+         context save of FP state", in B1.5.7, also ARM AN298, supported
+         by Cortex-M4F architecture. Give a warning and try do best effort.
+         To fully handle this the FPCCR register (Floating-point Context
+         Control Register) needs to be read out and the bits ASPEN and LSPEN
+         could be checked to setup correct lazy stacked FP registers.  */
+
+      warning (_("no FPU lazy stack unwinding supported, check FPCCR."));
+
+      fpu_regs_stack_offset = unwound_sp + 0x20;
+      for (i = 0; i < 16; i++)
+        {
+          cache->saved_regs[ARM_D0_REGNUM + i].addr = fpu_regs_stack_offset;
+          fpu_regs_stack_offset += 4;
+        }
+      cache->saved_regs[ARM_FPSCR_REGNUM].addr = unwound_sp + 0x60;
+
+      /* Offset 0x64 is reserved.  */
+      cache->prev_sp = unwound_sp + 0x68;
+    }
+  else
+    {
+      /* Basic frame type used.  */
+      cache->prev_sp = unwound_sp + 32;
+    }
+
   /* If bit 9 of the saved xPSR is set, then there is a four-byte
      aligner between the top of the 32-byte stack frame and the
      previous context's stack pointer.  */
-  cache->prev_sp = unwound_sp + 32;
   if (safe_read_memory_integer (unwound_sp + 28, 4, byte_order, &xpsr)
       && (xpsr & (1 << 9)) != 0)
     cache->prev_sp += 4;

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] Fix exception stack unwinding for ARM Cortex-M
  2020-08-29  8:35       ` [PATCH] Fix exception stack " Fredrik Hederstierna
@ 2020-09-02 13:24         ` Alan Hayward
  2020-09-06  9:27           ` Fredrik Hederstierna
  0 siblings, 1 reply; 10+ messages in thread
From: Alan Hayward @ 2020-09-02 13:24 UTC (permalink / raw)
  To: Fredrik Hederstierna
  Cc: gdb-patches\@sourceware.org, nd, James-Adam Renquinha Henri



> On 29 Aug 2020, at 09:35, Fredrik Hederstierna <fredrik.hederstierna@verisure.com> wrote:
> 
> For Cortex-M targets using floating-point, eg the Cortex-M4F, its not possible to get any call-stack backtrace if setting a breakpoint in ISR.
> 
> The exception stack unwinder for Cortex-M does not consider if floating-point registers was stacked or not,
> further the Cortex-M has two stack pointers: MSP (Main Stack Pointer) and PSP (Process Stack Pointer).
> This is not handled when GDB tries to backtrace in the exception stack unwinder.
> 
> This patch fixes this, and gives a correct call-stack backtrace from breakpoints set in a handler or ISR.

Thanks for doing this fix. This mostly looks fine, but comments inlined below.

How easy is it to compile a binary that exhibits this behaviour? If so then a
test in testsuite/gdb.arch/ would be nice. For reference, aarch64-sighandler-regs.exp
is a similar test but for AArch64.

> 
> Best Regards,
> Fredrik Hederstierna

Have you signed the copyright assignment?
https://sourceware.org/gdb/wiki/ContributionChecklist#FSF_copyright_Assignment

> 
> Senior Software Developer
> Verisure Innovation Centre
> Malmoe Sweden
> <gdb-cortex-m-exception-unwind-fix.patch>


> diff --git a/gdb/ChangeLog b/gdb/ChangeLog
> index 1ff47c3355..1d80e8cfc8 100644
> --- a/gdb/ChangeLog
> +++ b/gdb/ChangeLog
> @@ -1,3 +1,9 @@
> +2020-08-29  Fredrik Hederstierna  <fredrik.hederstierna@verisure.com>
> +	    Adam Renquinha <arenquinha@cimeq.qc.ca>
> +
> +	* arm-tdep.c (arm_m_exception_cache): Try use correct stack
> +	pointer and stack frame offset when unwinding.
> +

Ideally this part should be left separate from the patch as to prevent
merge issues.

>  2020-08-29  Pedro Alves  <pedro@palves.net>
>
>  	* progspace.c (print_program_space): Use all_inferiors.  Switch to
> diff --git a/gdb/arm-tdep.c b/gdb/arm-tdep.c
> index 074eedb480..ed7d4b1d37 100644
> --- a/gdb/arm-tdep.c
> +++ b/gdb/arm-tdep.c
> @@ -2923,14 +2923,59 @@ arm_m_exception_cache (struct frame_info *this_frame)
>    struct gdbarch *gdbarch = get_frame_arch (this_frame);
>    enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
>    struct arm_prologue_cache *cache;
> +  CORE_ADDR lr;
> +  CORE_ADDR sp;
>    CORE_ADDR unwound_sp;
>    LONGEST xpsr;
> +  uint32_t main_stack_used;
> +  uint32_t extended_frame_used;
>
>    cache = FRAME_OBSTACK_ZALLOC (struct arm_prologue_cache);
>    cache->saved_regs = trad_frame_alloc_saved_regs (this_frame);
>
> -  unwound_sp = get_frame_register_unsigned (this_frame,
> -					    ARM_SP_REGNUM);
> +  /* ARMv7-M Architecture Reference "B1.5.6 Exception entry behavior"
> +     describes which bits in LR that define which stack was used prior
> +     to the exception and if FPU is used (causing extended stack frame).  */
> +
> +  lr = get_frame_register_unsigned (this_frame, ARM_LR_REGNUM);
> +  sp = get_frame_register_unsigned (this_frame, ARM_SP_REGNUM);
> +
> +  /* Check if main stack was used.  */
> +  main_stack_used = ((lr & 0xf) != 0xd);

This took me a while to confirm. Could you mention that you are checking for
SPSEL in the comment. Also, I wonder if it’s worth checking the other bits in lr.
Yes they should be all ones in either case. But I’d rather be a little cautious.
Only go into the else case if all the bits are correct.

> +  if (main_stack_used)
> +    {
> +      /* Main stack used, use MSP as SP.  */
> +      unwound_sp = sp;
> +    }
> +  else
> +    {
> +      /* Thread (process) stack used.
> +         Potentially this could be other register defined by target, but PSP
> +         can be considered a standard name for the "Process Stack Pointer".
> +         To be fully aware of system registers like MSP and PSP, these could
> +         be added to a separate XML arm-m-system-profile that is valid for
> +         ARMv6-M and ARMv7-M architectures. Also to be able to debug eg a
> +         corefile off-line, then these registers must be defined by GDB,
> +         and also be included in the corefile regsets.  */
> +
> +      int psp_regnum = user_reg_map_name_to_regnum (gdbarch, "psp", -1);
> +      if (psp_regnum == -1)
> +        {
> +          /* Thread (process) stack could not be fetched,
> +             give warning and exit.  */
> +
> +          warning (_("no PSP thread stack unwinding supported, exiting."));

I don’t think you mean exit. Maybe just remove “exiting” from the string.

> +
> +          /* Terminate any further stack unwinding by refer to self.  */
> +          cache->prev_sp = sp;
> +          return cache;
> +        }
> +      else
> +        {
> +          /* Thread (process) stack used, use PSP as SP.  */
> +          unwound_sp = get_frame_register_unsigned (this_frame, psp_regnum);
> +        }
> +    }
>
>    /* The hardware saves eight 32-bit words, comprising xPSR,
>       ReturnAddress, LR (R14), R12, R3, R2, R1, R0.  See details in
> @@ -2940,15 +2985,47 @@ arm_m_exception_cache (struct frame_info *this_frame)
>    cache->saved_regs[1].addr = unwound_sp + 4;
>    cache->saved_regs[2].addr = unwound_sp + 8;
>    cache->saved_regs[3].addr = unwound_sp + 12;
> -  cache->saved_regs[12].addr = unwound_sp + 16;
> -  cache->saved_regs[14].addr = unwound_sp + 20;
> -  cache->saved_regs[15].addr = unwound_sp + 24;
> +  cache->saved_regs[ARM_IP_REGNUM].addr = unwound_sp + 16;
> +  cache->saved_regs[ARM_LR_REGNUM].addr = unwound_sp + 20;
> +  cache->saved_regs[ARM_PC_REGNUM].addr = unwound_sp + 24;
>    cache->saved_regs[ARM_PS_REGNUM].addr = unwound_sp + 28;

Thanks for switching this to use the enums.

>
> +  /* Check if extended stack frame (FPU regs stored) was used.  */
> +  extended_frame_used = ((lr & (1 << 4)) == 0);
> +  if (extended_frame_used)
> +    {
> +      int i;
> +      int fpu_regs_stack_offset;
> +
> +      /* This code does not take into account the lazy stacking, see "Lazy
> +         context save of FP state", in B1.5.7, also ARM AN298, supported
> +         by Cortex-M4F architecture. Give a warning and try do best effort.
> +         To fully handle this the FPCCR register (Floating-point Context
> +         Control Register) needs to be read out and the bits ASPEN and LSPEN
> +         could be checked to setup correct lazy stacked FP registers.  */
> +
> +      warning (_("no FPU lazy stack unwinding supported, check FPCCR."));

This means that we will always get a warning if the extended frame is used.
I’d rather that didn’t happen.
How easy would be be to check the FPCCR register and then give a warning only if
lazy stacking is being used?

> +
> +      fpu_regs_stack_offset = unwound_sp + 0x20;
> +      for (i = 0; i < 16; i++)
> +        {
> +          cache->saved_regs[ARM_D0_REGNUM + i].addr = fpu_regs_stack_offset;
> +          fpu_regs_stack_offset += 4;
> +        }
> +      cache->saved_regs[ARM_FPSCR_REGNUM].addr = unwound_sp + 0x60;
> +
> +      /* Offset 0x64 is reserved.  */
> +      cache->prev_sp = unwound_sp + 0x68;
> +    }
> +  else
> +    {
> +      /* Basic frame type used.  */
> +      cache->prev_sp = unwound_sp + 32;

The mix of hex and decimal in the function is a little glaring.
Could you switch this one to 0x20.

> +    }
> +
>    /* If bit 9 of the saved xPSR is set, then there is a four-byte
>       aligner between the top of the 32-byte stack frame and the
>       previous context's stack pointer.  */
> -  cache->prev_sp = unwound_sp + 32;
>    if (safe_read_memory_integer (unwound_sp + 28, 4, byte_order, &xpsr)
>        && (xpsr & (1 << 9)) != 0)
>      cache->prev_sp += 4;



Thanks,
Alan.



^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] Fix exception stack unwinding for ARM Cortex-M
  2020-09-02 13:24         ` Alan Hayward
@ 2020-09-06  9:27           ` Fredrik Hederstierna
  2020-09-09  8:12             ` Alan Hayward
  0 siblings, 1 reply; 10+ messages in thread
From: Fredrik Hederstierna @ 2020-09-06  9:27 UTC (permalink / raw)
  To: Alan Hayward; +Cc: gdb-patches\@sourceware.org, nd, James-Adam Renquinha Henri

[-- Attachment #1: Type: text/plain, Size: 3566 bytes --]

Hi,
I updated that patch to address your comments, see below and attached patch take2

> From: Alan Hayward <Alan.Hayward@arm.com>
> Sent: Wednesday, September 2, 2020 3:24 PM
> To: Fredrik Hederstierna <fredrik.hederstierna@verisure.com>

> How easy is it to compile a binary that exhibits this behaviour? If so then a
> test in testsuite/gdb.arch/ would be nice. For reference, aarch64-sighandler-regs.exp
> is a similar test but for AArch64.

I have not had time to further look into this, its probably possible to add such a test case, but I have no possibility to do this currently unfortunately.

> Have you signed the copyright assignment?

Yes, to my understanding everything is clear.

>> diff --git a/gdb/ChangeLog b/gdb/ChangeLog
>> index 1ff47c3355..1d80e8cfc8 100644
>> --- a/gdb/ChangeLog
>> +++ b/gdb/ChangeLog
>> @@ -1,3 +1,9 @@
>> +2020-08-29  Fredrik Hederstierna  <fredrik.hederstierna@verisure.com>
>> +         Adam Renquinha <arenquinha@cimeq.qc.ca>
>> +
>> +     * arm-tdep.c (arm_m_exception_cache): Try use correct stack
>> +     pointer and stack frame offset when unwinding.
>> +
>
> Ideally this part should be left separate from the patch as to prevent
> merge issues.

Ok, removed from patch.

>> +  /* Check if main stack was used.  */
>> +  main_stack_used = ((lr & 0xf) != 0xd);
>
> This took me a while to confirm. Could you mention that you are checking for
> SPSEL in the comment. Also, I wonder if it’s worth checking the other bits in lr.
> Yes they should be all ones in either case. But I’d rather be a little cautious.
> Only go into the else case if all the bits are correct.

Ok, added more clear comments and more strict bit checking.

>> +          /* Thread (process) stack could not be fetched,
>> +             give warning and exit.  */
>> +
>> +          warning (_("no PSP thread stack unwinding supported, exiting."));
>
> I don’t think you mean exit. Maybe just remove “exiting” from the string.

Ok, removed 'exiting'

>> +      /* This code does not take into account the lazy stacking, see "Lazy
>> +         context save of FP state", in B1.5.7, also ARM AN298, supported
>> +         by Cortex-M4F architecture. Give a warning and try do best effort.
>> +         To fully handle this the FPCCR register (Floating-point Context
>> +         Control Register) needs to be read out and the bits ASPEN and LSPEN
>> +         could be checked to setup correct lazy stacked FP registers.  */
>> +
>> +      warning (_("no FPU lazy stack unwinding supported, check FPCCR."));
>
> This means that we will always get a warning if the extended frame is used.
> I’d rather that didn’t happen.
> How easy would be be to check the FPCCR register and then give a warning only if
> lazy stacking is being used?

Maybe its possible, but have to time to solve this currently, added memory address of FPCCR,
its not a register, but probably possible to do memory reading to dig deeper into this.
Removed warning.

>> +      /* Basic frame type used.  */
>> +      cache->prev_sp = unwound_sp + 32;
>
> The mix of hex and decimal in the function is a little glaring.
> Could you switch this one to 0x20.

Ok, fixed.


Here is ChangeLog, separated, new patch variant attached.

2020-09-06  Fredrik Hederstierna  <fredrik.hederstierna@verisure.com>
            Adam Renquinha <arenquinha@cimeq.qc.ca>

        * arm-tdep.c (arm_m_exception_cache): Try use correct stack
        pointer and stack frame offset when unwinding.


BR Fredrik

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: gdb-cortex-m-exception-unwind-fix2.patch --]
[-- Type: text/x-patch; name="gdb-cortex-m-exception-unwind-fix2.patch", Size: 7024 bytes --]

diff --git a/gdb/arm-tdep.c b/gdb/arm-tdep.c
index 074eedb480..1a5017495a 100644
--- a/gdb/arm-tdep.c
+++ b/gdb/arm-tdep.c
@@ -469,7 +469,7 @@ arm_pc_is_thumb (struct gdbarch *gdbarch, CORE_ADDR memaddr)
 }
 
 /* Determine if the address specified equals any of these magic return
-   values, called EXC_RETURN, defined by the ARM v6-M and v7-M
+   values, called EXC_RETURN, defined by the ARM v6-M, v7-M and v8-M
    architectures.
 
    From ARMv6-M Reference Manual B1.5.8
@@ -500,13 +500,25 @@ arm_pc_is_thumb (struct gdbarch *gdbarch, CORE_ADDR memaddr)
    0xFFFFFFFD    Thread mode      Process         Basic
 
    For more details see "B1.5.8 Exception return behavior"
-   in both ARMv6-M and ARMv7-M Architecture Reference Manuals.  */
+   in both ARMv6-M and ARMv7-M Architecture Reference Manuals.
+
+   In the ARMv8-M Architecture Technical Reference also adds
+   for implementations without the Security Extension:
+
+   EXC_RETURN    Condition
+   0xFFFFFFB0    Return to Handler mode.
+   0xFFFFFFB8    Return to Thread mode using the main stack.
+   0xFFFFFFBC    Return to Thread mode using the process stack.  */
 
 static int
 arm_m_addr_is_magic (CORE_ADDR addr)
 {
   switch (addr)
     {
+      /* Values from ARMv8-M Architecture Technical Reference.  */
+      case 0xffffffb0:
+      case 0xffffffb8:
+      case 0xffffffbc:
       /* Values from Tables in B1.5.8 the EXC_RETURN definitions of
 	 the exception return behavior.  */
       case 0xffffffe1:
@@ -2923,14 +2935,64 @@ arm_m_exception_cache (struct frame_info *this_frame)
   struct gdbarch *gdbarch = get_frame_arch (this_frame);
   enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
   struct arm_prologue_cache *cache;
+  CORE_ADDR lr;
+  CORE_ADDR sp;
   CORE_ADDR unwound_sp;
   LONGEST xpsr;
+  uint32_t exc_return;
+  uint32_t process_stack_used;
+  uint32_t extended_frame_used;
+  uint32_t secure_stack_used;
 
   cache = FRAME_OBSTACK_ZALLOC (struct arm_prologue_cache);
   cache->saved_regs = trad_frame_alloc_saved_regs (this_frame);
 
-  unwound_sp = get_frame_register_unsigned (this_frame,
-					    ARM_SP_REGNUM);
+  /* ARMv7-M Architecture Reference "B1.5.6 Exception entry behavior"
+     describes which bits in LR that define which stack was used prior
+     to the exception and if FPU is used (causing extended stack frame).  */
+
+  lr = get_frame_register_unsigned (this_frame, ARM_LR_REGNUM);
+  sp = get_frame_register_unsigned (this_frame, ARM_SP_REGNUM);
+
+  /* Check EXC_RETURN indicator bits.  */
+  exc_return = (((lr >> 28) & 0xf) == 0xf);
+
+  /* Check EXC_RETURN bit SPSEL if Main or Thread (process) stack used.  */
+  process_stack_used = ((lr & (1 << 2)) != 0);
+  if (exc_return && process_stack_used)
+    {
+      /* Thread (process) stack used.
+         Potentially this could be other register defined by target, but PSP
+         can be considered a standard name for the "Process Stack Pointer".
+         To be fully aware of system registers like MSP and PSP, these could
+         be added to a separate XML arm-m-system-profile that is valid for
+         ARMv6-M and ARMv7-M architectures. Also to be able to debug eg a
+         corefile off-line, then these registers must be defined by GDB,
+         and also be included in the corefile regsets.  */
+
+      int psp_regnum = user_reg_map_name_to_regnum (gdbarch, "psp", -1);
+      if (psp_regnum == -1)
+        {
+          /* Thread (process) stack could not be fetched,
+             give warning and exit.  */
+
+          warning (_("no PSP thread stack unwinding supported."));
+
+          /* Terminate any further stack unwinding by refer to self.  */
+          cache->prev_sp = sp;
+          return cache;
+        }
+      else
+        {
+          /* Thread (process) stack used, use PSP as SP.  */
+          unwound_sp = get_frame_register_unsigned (this_frame, psp_regnum);
+        }
+    }
+  else
+    {
+      /* Main stack used, use MSP as SP.  */
+      unwound_sp = sp;
+    }
 
   /* The hardware saves eight 32-bit words, comprising xPSR,
      ReturnAddress, LR (R14), R12, R3, R2, R1, R0.  See details in
@@ -2940,15 +3002,62 @@ arm_m_exception_cache (struct frame_info *this_frame)
   cache->saved_regs[1].addr = unwound_sp + 4;
   cache->saved_regs[2].addr = unwound_sp + 8;
   cache->saved_regs[3].addr = unwound_sp + 12;
-  cache->saved_regs[12].addr = unwound_sp + 16;
-  cache->saved_regs[14].addr = unwound_sp + 20;
-  cache->saved_regs[15].addr = unwound_sp + 24;
+  cache->saved_regs[ARM_IP_REGNUM].addr = unwound_sp + 16;
+  cache->saved_regs[ARM_LR_REGNUM].addr = unwound_sp + 20;
+  cache->saved_regs[ARM_PC_REGNUM].addr = unwound_sp + 24;
   cache->saved_regs[ARM_PS_REGNUM].addr = unwound_sp + 28;
 
+  /* Check EXC_RETURN bit FTYPE if extended stack frame (FPU regs stored)
+     type used.  */
+  extended_frame_used = ((lr & (1 << 4)) == 0);
+  if (exc_return && extended_frame_used)
+    {
+      int i;
+      int fpu_regs_stack_offset;
+
+      /* This code does not take into account the lazy stacking, see "Lazy
+         context save of FP state", in B1.5.7, also ARM AN298, supported
+         by Cortex-M4F architecture.
+         To fully handle this the FPCCR register (Floating-point Context
+         Control Register) needs to be read out and the bits ASPEN and LSPEN
+         could be checked to setup correct lazy stacked FP registers.
+         This register is located at address 0xE000EF34.  */
+
+      /* Extended stack frame type used.  */
+      fpu_regs_stack_offset = unwound_sp + 0x20;
+      for (i = 0; i < 16; i++)
+        {
+          cache->saved_regs[ARM_D0_REGNUM + i].addr = fpu_regs_stack_offset;
+          fpu_regs_stack_offset += 4;
+        }
+      cache->saved_regs[ARM_FPSCR_REGNUM].addr = unwound_sp + 0x60;
+
+      /* Offset 0x64 is reserved.  */
+      cache->prev_sp = unwound_sp + 0x68;
+    }
+  else
+    {
+      /* Standard stack frame type used.  */
+      cache->prev_sp = unwound_sp + 0x20;
+    }
+
+  /* Check EXC_RETURN bit S if Secure or Non-secure stack used.  */
+  secure_stack_used = ((lr & (1 << 6)) != 0);
+  if (exc_return && secure_stack_used)
+    {
+      /* ARMv8-M Exception and interrupt handling is not considered here.
+	 In the ARMv8-M architecture also EXC_RETURN bit S is controlling if
+	 the Secure or Non-secure stack was used. To separate Secure and
+	 Non-secure stacks, processors that are based on the ARMv8-M
+	 architecture support 4 stack pointers: MSP_S, PSP_S, MSP_NS, PSP_NS.
+	 In addition, a stack limit feature is provided using stack limit
+	 registers (accessible using MSR and MRS instructions) in Privileged
+	 level.  */
+    }
+
   /* If bit 9 of the saved xPSR is set, then there is a four-byte
      aligner between the top of the 32-byte stack frame and the
      previous context's stack pointer.  */
-  cache->prev_sp = unwound_sp + 32;
   if (safe_read_memory_integer (unwound_sp + 28, 4, byte_order, &xpsr)
       && (xpsr & (1 << 9)) != 0)
     cache->prev_sp += 4;

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] Fix exception stack unwinding for ARM Cortex-M
  2020-09-06  9:27           ` Fredrik Hederstierna
@ 2020-09-09  8:12             ` Alan Hayward
  2020-09-10 21:00               ` Fredrik Hederstierna
  0 siblings, 1 reply; 10+ messages in thread
From: Alan Hayward @ 2020-09-09  8:12 UTC (permalink / raw)
  To: Fredrik Hederstierna
  Cc: gdb-patches\@sourceware.org, nd, James-Adam Renquinha Henri

Ok, everything looks good to me now.

It’s fairly clear in the code where there is still work to be done.
Do you have a bugzilla account? If so, could you please raise two bugs for the two features.
If not, I can add them.

Doesn’t look like you have write access, so I’ll leave this to early next week and if there
have been no other comments then I’ll commit it.

Thanks for the patch!

Alan.


> On 6 Sep 2020, at 10:27, Fredrik Hederstierna <fredrik.hederstierna@verisure.com> wrote:
> 
> Hi,
> I updated that patch to address your comments, see below and attached patch take2
> 
>> From: Alan Hayward <Alan.Hayward@arm.com>
>> Sent: Wednesday, September 2, 2020 3:24 PM
>> To: Fredrik Hederstierna <fredrik.hederstierna@verisure.com>
> 
>> How easy is it to compile a binary that exhibits this behaviour? If so then a
>> test in testsuite/gdb.arch/ would be nice. For reference, aarch64-sighandler-regs.exp
>> is a similar test but for AArch64.
> 
> I have not had time to further look into this, its probably possible to add such a test case, but I have no possibility to do this currently unfortunately.
> 
>> Have you signed the copyright assignment?
> 
> Yes, to my understanding everything is clear.
> 
>>> diff --git a/gdb/ChangeLog b/gdb/ChangeLog
>>> index 1ff47c3355..1d80e8cfc8 100644
>>> --- a/gdb/ChangeLog
>>> +++ b/gdb/ChangeLog
>>> @@ -1,3 +1,9 @@
>>> +2020-08-29  Fredrik Hederstierna  <fredrik.hederstierna@verisure.com>
>>> +         Adam Renquinha <arenquinha@cimeq.qc.ca>
>>> +
>>> +     * arm-tdep.c (arm_m_exception_cache): Try use correct stack
>>> +     pointer and stack frame offset when unwinding.
>>> +
>> 
>> Ideally this part should be left separate from the patch as to prevent
>> merge issues.
> 
> Ok, removed from patch.
> 
>>> +  /* Check if main stack was used.  */
>>> +  main_stack_used = ((lr & 0xf) != 0xd);
>> 
>> This took me a while to confirm. Could you mention that you are checking for
>> SPSEL in the comment. Also, I wonder if it’s worth checking the other bits in lr.
>> Yes they should be all ones in either case. But I’d rather be a little cautious.
>> Only go into the else case if all the bits are correct.
> 
> Ok, added more clear comments and more strict bit checking.
> 
>>> +          /* Thread (process) stack could not be fetched,
>>> +             give warning and exit.  */
>>> +
>>> +          warning (_("no PSP thread stack unwinding supported, exiting."));
>> 
>> I don’t think you mean exit. Maybe just remove “exiting” from the string.
> 
> Ok, removed 'exiting'
> 
>>> +      /* This code does not take into account the lazy stacking, see "Lazy
>>> +         context save of FP state", in B1.5.7, also ARM AN298, supported
>>> +         by Cortex-M4F architecture. Give a warning and try do best effort.
>>> +         To fully handle this the FPCCR register (Floating-point Context
>>> +         Control Register) needs to be read out and the bits ASPEN and LSPEN
>>> +         could be checked to setup correct lazy stacked FP registers.  */
>>> +
>>> +      warning (_("no FPU lazy stack unwinding supported, check FPCCR."));
>> 
>> This means that we will always get a warning if the extended frame is used.
>> I’d rather that didn’t happen.
>> How easy would be be to check the FPCCR register and then give a warning only if
>> lazy stacking is being used?
> 
> Maybe its possible, but have to time to solve this currently, added memory address of FPCCR,
> its not a register, but probably possible to do memory reading to dig deeper into this.
> Removed warning.
> 
>>> +      /* Basic frame type used.  */
>>> +      cache->prev_sp = unwound_sp + 32;
>> 
>> The mix of hex and decimal in the function is a little glaring.
>> Could you switch this one to 0x20.
> 
> Ok, fixed.
> 
> 
> Here is ChangeLog, separated, new patch variant attached.
> 
> 2020-09-06  Fredrik Hederstierna  <fredrik.hederstierna@verisure.com>
>            Adam Renquinha <arenquinha@cimeq.qc.ca>
> 
>        * arm-tdep.c (arm_m_exception_cache): Try use correct stack
>        pointer and stack frame offset when unwinding.
> 
> 
> BR Fredrik
> <gdb-cortex-m-exception-unwind-fix2.patch>


^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] Fix exception stack unwinding for ARM Cortex-M
  2020-09-09  8:12             ` Alan Hayward
@ 2020-09-10 21:00               ` Fredrik Hederstierna
  2020-09-14 14:44                 ` Alan Hayward
  0 siblings, 1 reply; 10+ messages in thread
From: Fredrik Hederstierna @ 2020-09-10 21:00 UTC (permalink / raw)
  To: Alan Hayward; +Cc: gdb-patches\@sourceware.org, nd, James-Adam Renquinha Henri

Hi Alan,
sounds great! thank for committing the patch,
I do not have any GDB Bugzilla account, so please submit bugs for the additional features.
It would be great if patch goes in before the GDB 10 branching,
thanks! Best Regards, Fredrik
________________________________
From: Alan Hayward <Alan.Hayward@arm.com>
Sent: Wednesday, September 9, 2020 10:12 AM
To: Fredrik Hederstierna <fredrik.hederstierna@verisure.com>
Cc: gdb-patches\@sourceware.org <gdb-patches@sourceware.org>; nd <nd@arm.com>; James-Adam Renquinha Henri <arenquinha@cimeq.qc.ca>
Subject: Re: [PATCH] Fix exception stack unwinding for ARM Cortex-M

Ok, everything looks good to me now.

It’s fairly clear in the code where there is still work to be done.
Do you have a bugzilla account? If so, could you please raise two bugs for the two features.
If not, I can add them.

Doesn’t look like you have write access, so I’ll leave this to early next week and if there
have been no other comments then I’ll commit it.

Thanks for the patch!

Alan.


> On 6 Sep 2020, at 10:27, Fredrik Hederstierna <fredrik.hederstierna@verisure.com> wrote:
>
> Hi,
> I updated that patch to address your comments, see below and attached patch take2
>
>> From: Alan Hayward <Alan.Hayward@arm.com>
>> Sent: Wednesday, September 2, 2020 3:24 PM
>> To: Fredrik Hederstierna <fredrik.hederstierna@verisure.com>
>
>> How easy is it to compile a binary that exhibits this behaviour? If so then a
>> test in testsuite/gdb.arch/ would be nice. For reference, aarch64-sighandler-regs.exp
>> is a similar test but for AArch64.
>
> I have not had time to further look into this, its probably possible to add such a test case, but I have no possibility to do this currently unfortunately.
>
>> Have you signed the copyright assignment?
>
> Yes, to my understanding everything is clear.
>
>>> diff --git a/gdb/ChangeLog b/gdb/ChangeLog
>>> index 1ff47c3355..1d80e8cfc8 100644
>>> --- a/gdb/ChangeLog
>>> +++ b/gdb/ChangeLog
>>> @@ -1,3 +1,9 @@
>>> +2020-08-29  Fredrik Hederstierna  <fredrik.hederstierna@verisure.com>
>>> +         Adam Renquinha <arenquinha@cimeq.qc.ca>
>>> +
>>> +     * arm-tdep.c (arm_m_exception_cache): Try use correct stack
>>> +     pointer and stack frame offset when unwinding.
>>> +
>>
>> Ideally this part should be left separate from the patch as to prevent
>> merge issues.
>
> Ok, removed from patch.
>
>>> +  /* Check if main stack was used.  */
>>> +  main_stack_used = ((lr & 0xf) != 0xd);
>>
>> This took me a while to confirm. Could you mention that you are checking for
>> SPSEL in the comment. Also, I wonder if it’s worth checking the other bits in lr.
>> Yes they should be all ones in either case. But I’d rather be a little cautious.
>> Only go into the else case if all the bits are correct.
>
> Ok, added more clear comments and more strict bit checking.
>
>>> +          /* Thread (process) stack could not be fetched,
>>> +             give warning and exit.  */
>>> +
>>> +          warning (_("no PSP thread stack unwinding supported, exiting."));
>>
>> I don’t think you mean exit. Maybe just remove “exiting” from the string.
>
> Ok, removed 'exiting'
>
>>> +      /* This code does not take into account the lazy stacking, see "Lazy
>>> +         context save of FP state", in B1.5.7, also ARM AN298, supported
>>> +         by Cortex-M4F architecture. Give a warning and try do best effort.
>>> +         To fully handle this the FPCCR register (Floating-point Context
>>> +         Control Register) needs to be read out and the bits ASPEN and LSPEN
>>> +         could be checked to setup correct lazy stacked FP registers.  */
>>> +
>>> +      warning (_("no FPU lazy stack unwinding supported, check FPCCR."));
>>
>> This means that we will always get a warning if the extended frame is used.
>> I’d rather that didn’t happen.
>> How easy would be be to check the FPCCR register and then give a warning only if
>> lazy stacking is being used?
>
> Maybe its possible, but have to time to solve this currently, added memory address of FPCCR,
> its not a register, but probably possible to do memory reading to dig deeper into this.
> Removed warning.
>
>>> +      /* Basic frame type used.  */
>>> +      cache->prev_sp = unwound_sp + 32;
>>
>> The mix of hex and decimal in the function is a little glaring.
>> Could you switch this one to 0x20.
>
> Ok, fixed.
>
>
> Here is ChangeLog, separated, new patch variant attached.
>
> 2020-09-06  Fredrik Hederstierna  <fredrik.hederstierna@verisure.com>
>            Adam Renquinha <arenquinha@cimeq.qc.ca>
>
>        * arm-tdep.c (arm_m_exception_cache): Try use correct stack
>        pointer and stack frame offset when unwinding.
>
>
> BR Fredrik
> <gdb-cortex-m-exception-unwind-fix2.patch>


^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] Fix exception stack unwinding for ARM Cortex-M
  2020-09-10 21:00               ` Fredrik Hederstierna
@ 2020-09-14 14:44                 ` Alan Hayward
  2020-09-14 18:31                   ` Joel Brobecker
  0 siblings, 1 reply; 10+ messages in thread
From: Alan Hayward @ 2020-09-14 14:44 UTC (permalink / raw)
  To: Fredrik Hederstierna, Joel Brobecker
  Cc: gdb-patches\@sourceware.org, nd, James-Adam Renquinha Henri



> On 10 Sep 2020, at 22:00, Fredrik Hederstierna <fredrik.hederstierna@verisure.com> wrote:
> 
> Hi Alan,
> sounds great! thank for committing the patch,


Committed to head.


> I do not have any GDB Bugzilla account, so please submit bugs for the additional features.

Added:
https://sourceware.org/bugzilla/show_bug.cgi?id=26611
https://sourceware.org/bugzilla/show_bug.cgi?id=26612
https://sourceware.org/bugzilla/show_bug.cgi?id=26613


> It would be great if patch goes in before the GDB 10 branching,


Joel:
Is it ok to pull this patch across to GDB 10? (And is that something you do?)
It’s Arm only, and will only effect programs that are using special stack setups.


Alan.

> thanks! Best Regards, Fredrik
> From: Alan Hayward <Alan.Hayward@arm.com>
> Sent: Wednesday, September 9, 2020 10:12 AM
> To: Fredrik Hederstierna <fredrik.hederstierna@verisure.com>
> Cc: gdb-patches\@sourceware.org <gdb-patches@sourceware.org>; nd <nd@arm.com>; James-Adam Renquinha Henri <arenquinha@cimeq.qc.ca>
> Subject: Re: [PATCH] Fix exception stack unwinding for ARM Cortex-M
>  
> Ok, everything looks good to me now.
> 
> It’s fairly clear in the code where there is still work to be done.
> Do you have a bugzilla account? If so, could you please raise two bugs for the two features.
> If not, I can add them.
> 
> Doesn’t look like you have write access, so I’ll leave this to early next week and if there
> have been no other comments then I’ll commit it.
> 
> Thanks for the patch!
> 
> Alan.
> 
> 
> > On 6 Sep 2020, at 10:27, Fredrik Hederstierna <fredrik.hederstierna@verisure.com> wrote:
> > 
> > Hi,
> > I updated that patch to address your comments, see below and attached patch take2
> > 
> >> From: Alan Hayward <Alan.Hayward@arm.com>
> >> Sent: Wednesday, September 2, 2020 3:24 PM
> >> To: Fredrik Hederstierna <fredrik.hederstierna@verisure.com>
> > 
> >> How easy is it to compile a binary that exhibits this behaviour? If so then a
> >> test in testsuite/gdb.arch/ would be nice. For reference, aarch64-sighandler-regs.exp
> >> is a similar test but for AArch64.
> > 
> > I have not had time to further look into this, its probably possible to add such a test case, but I have no possibility to do this currently unfortunately.
> > 
> >> Have you signed the copyright assignment?
> > 
> > Yes, to my understanding everything is clear.
> > 
> >>> diff --git a/gdb/ChangeLog b/gdb/ChangeLog
> >>> index 1ff47c3355..1d80e8cfc8 100644
> >>> --- a/gdb/ChangeLog
> >>> +++ b/gdb/ChangeLog
> >>> @@ -1,3 +1,9 @@
> >>> +2020-08-29  Fredrik Hederstierna  <fredrik.hederstierna@verisure.com>
> >>> +         Adam Renquinha <arenquinha@cimeq.qc.ca>
> >>> +
> >>> +     * arm-tdep.c (arm_m_exception_cache): Try use correct stack
> >>> +     pointer and stack frame offset when unwinding.
> >>> +
> >> 
> >> Ideally this part should be left separate from the patch as to prevent
> >> merge issues.
> > 
> > Ok, removed from patch.
> > 
> >>> +  /* Check if main stack was used.  */
> >>> +  main_stack_used = ((lr & 0xf) != 0xd);
> >> 
> >> This took me a while to confirm. Could you mention that you are checking for
> >> SPSEL in the comment. Also, I wonder if it’s worth checking the other bits in lr.
> >> Yes they should be all ones in either case. But I’d rather be a little cautious.
> >> Only go into the else case if all the bits are correct.
> > 
> > Ok, added more clear comments and more strict bit checking.
> > 
> >>> +          /* Thread (process) stack could not be fetched,
> >>> +             give warning and exit.  */
> >>> +
> >>> +          warning (_("no PSP thread stack unwinding supported, exiting."));
> >> 
> >> I don’t think you mean exit. Maybe just remove “exiting” from the string.
> > 
> > Ok, removed 'exiting'
> > 
> >>> +      /* This code does not take into account the lazy stacking, see "Lazy
> >>> +         context save of FP state", in B1.5.7, also ARM AN298, supported
> >>> +         by Cortex-M4F architecture. Give a warning and try do best effort.
> >>> +         To fully handle this the FPCCR register (Floating-point Context
> >>> +         Control Register) needs to be read out and the bits ASPEN and LSPEN
> >>> +         could be checked to setup correct lazy stacked FP registers.  */
> >>> +
> >>> +      warning (_("no FPU lazy stack unwinding supported, check FPCCR."));
> >> 
> >> This means that we will always get a warning if the extended frame is used.
> >> I’d rather that didn’t happen.
> >> How easy would be be to check the FPCCR register and then give a warning only if
> >> lazy stacking is being used?
> > 
> > Maybe its possible, but have to time to solve this currently, added memory address of FPCCR,
> > its not a register, but probably possible to do memory reading to dig deeper into this.
> > Removed warning.
> > 
> >>> +      /* Basic frame type used.  */
> >>> +      cache->prev_sp = unwound_sp + 32;
> >> 
> >> The mix of hex and decimal in the function is a little glaring.
> >> Could you switch this one to 0x20.
> > 
> > Ok, fixed.
> > 
> > 
> > Here is ChangeLog, separated, new patch variant attached.
> > 
> > 2020-09-06  Fredrik Hederstierna  <fredrik.hederstierna@verisure.com>
> >            Adam Renquinha <arenquinha@cimeq.qc.ca>
> > 
> >        * arm-tdep.c (arm_m_exception_cache): Try use correct stack
> >        pointer and stack frame offset when unwinding.
> > 
> > 
> > BR Fredrik
> > <gdb-cortex-m-exception-unwind-fix2.patch>


^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] Fix exception stack unwinding for ARM Cortex-M
  2020-09-14 14:44                 ` Alan Hayward
@ 2020-09-14 18:31                   ` Joel Brobecker
  2020-09-15 14:05                     ` Alan Hayward
  0 siblings, 1 reply; 10+ messages in thread
From: Joel Brobecker @ 2020-09-14 18:31 UTC (permalink / raw)
  To: Alan Hayward
  Cc: Fredrik Hederstierna, gdb-patches\@sourceware.org, nd,
	James-Adam Renquinha Henri

Hi Alan,

> > I do not have any GDB Bugzilla account, so please submit bugs for the additional features.
> 
> Added:
> https://sourceware.org/bugzilla/show_bug.cgi?id=26611
> https://sourceware.org/bugzilla/show_bug.cgi?id=26612
> https://sourceware.org/bugzilla/show_bug.cgi?id=26613
> 
> 
> > It would be great if patch goes in before the GDB 10 branching,
> 
> 
> Joel:
> Is it ok to pull this patch across to GDB 10? (And is that something you do?)
> It’s Arm only, and will only effect programs that are using special stack setups.

As the Area Maintainer for ARM, if the patch looks sufficiently safe
to you, you can approve the backport to a release branch. I'm always
happy to provide a second pair of eyes and an opinion when asked,
but that's not a requirement, simply because I'm not as well versed
in most areas of the code.

Looking at how the patch is written, it's not entirely obvious to me how
this can only affect programs using that special stack setup, but that's
probably because I don't know the ARM architecture as well as you do.
If you're confident about the patch, go ahead.

-- 
Joel

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH] Fix exception stack unwinding for ARM Cortex-M
  2020-09-14 18:31                   ` Joel Brobecker
@ 2020-09-15 14:05                     ` Alan Hayward
  0 siblings, 0 replies; 10+ messages in thread
From: Alan Hayward @ 2020-09-15 14:05 UTC (permalink / raw)
  To: Joel Brobecker
  Cc: Fredrik Hederstierna, gdb-patches\@sourceware.org, nd,
	James-Adam Renquinha Henri



> On 14 Sep 2020, at 19:31, Joel Brobecker <brobecker@adacore.com> wrote:
> 
> Hi Alan,
> 
>>> I do not have any GDB Bugzilla account, so please submit bugs for the additional features.
>> 
>> Added:
>> https://sourceware.org/bugzilla/show_bug.cgi?id=26611
>> https://sourceware.org/bugzilla/show_bug.cgi?id=26612
>> https://sourceware.org/bugzilla/show_bug.cgi?id=26613
>> 
>> 
>>> It would be great if patch goes in before the GDB 10 branching,
>> 
>> 
>> Joel:
>> Is it ok to pull this patch across to GDB 10? (And is that something you do?)
>> It’s Arm only, and will only effect programs that are using special stack setups.
> 
> As the Area Maintainer for ARM, if the patch looks sufficiently safe
> to you, you can approve the backport to a release branch. I'm always
> happy to provide a second pair of eyes and an opinion when asked,
> but that's not a requirement, simply because I'm not as well versed
> in most areas of the code.
> 
> Looking at how the patch is written, it's not entirely obvious to me how
> this can only affect programs using that special stack setup, but that's
> probably because I don't know the ARM architecture as well as you do.
> If you're confident about the patch, go ahead.

Ok, thanks for clearing that up :)

Agreed it’s not immediately obvious, but the new code is all inside if blocks,
with the standard case behaving identical to previously.

I’ve pushed the patch to gdb-10-branch now.


Thanks!
Alan.



> 
> -- 
> Joel


^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2020-09-15 14:05 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <AM4PR1001MB0948AC4D9CB635F5A9A2FC82EFDC0@AM4PR1001MB0948.EURPRD10.PROD.OUTLOOK.COM>
     [not found] ` <HE1PR1001MB130613C0995C4C21A630373BEF1B0@HE1PR1001MB1306.EURPRD10.PROD.OUTLOOK.COM>
2019-06-10 21:25   ` [PATCH] Fix exception unwinding for ARM Cortex-M James-Adam Renquinha Henri
2019-06-12  9:01     ` Alan Hayward
2020-08-29  8:35       ` [PATCH] Fix exception stack " Fredrik Hederstierna
2020-09-02 13:24         ` Alan Hayward
2020-09-06  9:27           ` Fredrik Hederstierna
2020-09-09  8:12             ` Alan Hayward
2020-09-10 21:00               ` Fredrik Hederstierna
2020-09-14 14:44                 ` Alan Hayward
2020-09-14 18:31                   ` Joel Brobecker
2020-09-15 14:05                     ` Alan Hayward

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).