public inbox for gdb-patches@sourceware.org
 help / color / mirror / Atom feed
From: John Baldwin <jhb@FreeBSD.org>
To: gdb-patches@sourceware.org, Simon Marchi <simon.marchi@polymtl.ca>
Subject: Re: [PATCH v6a 08/15] gdb: Update x86 Linux architectures to support XSAVE layouts.
Date: Mon, 14 Aug 2023 10:52:46 -0700	[thread overview]
Message-ID: <e883d041-2333-16d0-2b06-7f994bd698cc@FreeBSD.org> (raw)
In-Reply-To: <e5414c55-266d-75ea-949a-9e182a0f0c54@FreeBSD.org>

On 7/28/23 2:29 PM, John Baldwin wrote:
> Refactor i386_linux_core_read_xcr0 to fetch and return a corresponding
> x86_xsave_layout as well as xcr0 using the size of an existing
> NT_X86_XSTATE core dump to determine the offsets via
> i387_guess_xsave_layout.  Use this to add an implementation of
> gdbarch_core_xfer_x86_xsave_layout.
> 
> Use tdep->xsave_layout.sizeof_xsave as the size of the XSTATE register
> set.
> ---
>    gdb/amd64-linux-tdep.c | 13 +++++++--
>    gdb/i386-linux-tdep.c  | 66 +++++++++++++++++++++++-------------------
>    gdb/i386-linux-tdep.h  | 25 +++++++++-------
>    3 files changed, 61 insertions(+), 43 deletions(-)
> 
> diff --git a/gdb/amd64-linux-tdep.c b/gdb/amd64-linux-tdep.c
> index cbbac1a0c64..e2fdf5fb6c8 100644
> --- a/gdb/amd64-linux-tdep.c
> +++ b/gdb/amd64-linux-tdep.c
> @@ -1616,7 +1616,10 @@ amd64_linux_core_read_description (struct gdbarch *gdbarch,
>    				  bfd *abfd)
>    {
>      /* Linux/x86-64.  */
> -  uint64_t xcr0 = i386_linux_core_read_xcr0 (abfd);
> +  x86_xsave_layout layout;
> +  uint64_t xcr0 = i386_linux_core_read_xsave_info (abfd, layout);
> +  if (xcr0 == 0)
> +    xcr0 = X86_XSTATE_SSE_MASK;
>    
>      return amd64_linux_read_description (xcr0 & X86_XSTATE_ALL_MASK,
>    				       gdbarch_ptr_bit (gdbarch) == 32);
> @@ -1661,8 +1664,10 @@ amd64_linux_iterate_over_regset_sections (struct gdbarch *gdbarch,
>    
>      cb (".reg", 27 * 8, 27 * 8, &i386_gregset, NULL, cb_data);
>      cb (".reg2", 512, 512, &amd64_fpregset, NULL, cb_data);
> -  cb (".reg-xstate", X86_XSTATE_SIZE (tdep->xcr0), X86_XSTATE_SIZE (tdep->xcr0),
> -      &amd64_linux_xstateregset, "XSAVE extended state", cb_data);
> +  if (tdep->xsave_layout.sizeof_xsave != 0)
> +    cb (".reg-xstate", tdep->xsave_layout.sizeof_xsave,
> +	tdep->xsave_layout.sizeof_xsave, &amd64_linux_xstateregset,
> +	"XSAVE extended state", cb_data);
>    }
>    
>    /* The instruction sequences used in x86_64 machines for a
> @@ -1804,6 +1809,8 @@ amd64_linux_init_abi_common(struct gdbarch_info info, struct gdbarch *gdbarch,
>      tdep->sc_num_regs = ARRAY_SIZE (amd64_linux_sc_reg_offset);
>    
>      tdep->xsave_xcr0_offset = I386_LINUX_XSAVE_XCR0_OFFSET;
> +  set_gdbarch_core_read_x86_xsave_layout
> +    (gdbarch, i386_linux_core_read_x86_xsave_layout);
>    
>      /* Add the %orig_rax register used for syscall restarting.  */
>      set_gdbarch_write_pc (gdbarch, amd64_linux_write_pc);
> diff --git a/gdb/i386-linux-tdep.c b/gdb/i386-linux-tdep.c
> index 554c1455a5f..7ff7c155e2c 100644
> --- a/gdb/i386-linux-tdep.c
> +++ b/gdb/i386-linux-tdep.c
> @@ -638,45 +638,48 @@ static int i386_linux_sc_reg_offset[] =
>      0 * 4				/* %gs */
>    };
>    
> -/* Get XSAVE extended state xcr0 from core dump.  */
> +/* See i386-linux-tdep.h.  */
>    
>    uint64_t
> -i386_linux_core_read_xcr0 (bfd *abfd)
> +i386_linux_core_read_xsave_info (bfd *abfd, x86_xsave_layout &layout)
>    {
>      asection *xstate = bfd_get_section_by_name (abfd, ".reg-xstate");
> -  uint64_t xcr0;
> +  if (xstate == nullptr)
> +    return 0;
>    
> -  if (xstate)
> +  /* Check extended state size.  */
> +  size_t size = bfd_section_size (xstate);
> +  if (size < X86_XSTATE_AVX_SIZE)
> +    return 0;
> +
> +  char contents[8];
> +  if (! bfd_get_section_contents (abfd, xstate, contents,
> +				  I386_LINUX_XSAVE_XCR0_OFFSET, 8))
>        {
> -      size_t size = bfd_section_size (xstate);
> -
> -      /* Check extended state size.  */
> -      if (size < X86_XSTATE_AVX_SIZE)
> -	xcr0 = X86_XSTATE_SSE_MASK;
> -      else
> -	{
> -	  char contents[8];
> -
> -	  if (! bfd_get_section_contents (abfd, xstate, contents,
> -					  I386_LINUX_XSAVE_XCR0_OFFSET,
> -					  8))
> -	    {
> -	      warning (_("Couldn't read `xcr0' bytes from "
> -			 "`.reg-xstate' section in core file."));
> -	      return 0;
> -	    }
> -
> -	  xcr0 = bfd_get_64 (abfd, contents);
> -	}
> +      warning (_("Couldn't read `xcr0' bytes from "
> +		 "`.reg-xstate' section in core file."));
> +      return 0;
>        }
> -  else
> -    xcr0 = 0;
> +
> +  uint64_t xcr0 = bfd_get_64 (abfd, contents);
> +
> +  if (!i387_guess_xsave_layout (xcr0, size, layout))
> +    return 0;
>    
>      return xcr0;
>    }
>    
>    /* See i386-linux-tdep.h.  */
>    
> +bool
> +i386_linux_core_read_x86_xsave_layout (struct gdbarch *gdbarch,
> +				       x86_xsave_layout &layout)
> +{
> +  return i386_linux_core_read_xsave_info (core_bfd, layout) != 0;
> +}
> +
> +/* See i386-linux-tdep.h.  */
> +
>    const struct target_desc *
>    i386_linux_read_description (uint64_t xcr0)
>    {
> @@ -708,7 +711,8 @@ i386_linux_core_read_description (struct gdbarch *gdbarch,
>    				  bfd *abfd)
>    {
>      /* Linux/i386.  */
> -  uint64_t xcr0 = i386_linux_core_read_xcr0 (abfd);
> +  x86_xsave_layout layout;
> +  uint64_t xcr0 = i386_linux_core_read_xsave_info (abfd, layout);
>      const struct target_desc *tdesc = i386_linux_read_description (xcr0);
>    
>      if (tdesc != NULL)
> @@ -767,9 +771,9 @@ i386_linux_iterate_over_regset_sections (struct gdbarch *gdbarch,
>    
>      cb (".reg", 68, 68, &i386_gregset, NULL, cb_data);
>    
> -  if (tdep->xcr0 & X86_XSTATE_AVX)
> -    cb (".reg-xstate", X86_XSTATE_SIZE (tdep->xcr0),
> -	X86_XSTATE_SIZE (tdep->xcr0), &i386_linux_xstateregset,
> +  if (tdep->xsave_layout.sizeof_xsave != 0)
> +    cb (".reg-xstate", tdep->xsave_layout.sizeof_xsave,
> +	tdep->xsave_layout.sizeof_xsave, &i386_linux_xstateregset,
>    	"XSAVE extended state", cb_data);
>      else if (tdep->xcr0 & X86_XSTATE_SSE)
>        cb (".reg-xfp", 512, 512, &i386_fpregset, "extended floating-point",
> @@ -872,6 +876,8 @@ i386_linux_init_abi (struct gdbarch_info info, struct gdbarch *gdbarch)
>      tdep->sc_num_regs = ARRAY_SIZE (i386_linux_sc_reg_offset);
>    
>      tdep->xsave_xcr0_offset = I386_LINUX_XSAVE_XCR0_OFFSET;
> +  set_gdbarch_core_read_x86_xsave_layout
> +    (gdbarch, i386_linux_core_read_x86_xsave_layout);
>    
>      set_gdbarch_process_record (gdbarch, i386_process_record);
>      set_gdbarch_process_record_signal (gdbarch, i386_linux_record_signal);
> diff --git a/gdb/i386-linux-tdep.h b/gdb/i386-linux-tdep.h
> index c0fd1f7f300..bd8e328b7fe 100644
> --- a/gdb/i386-linux-tdep.h
> +++ b/gdb/i386-linux-tdep.h
> @@ -20,6 +20,8 @@
>    #ifndef I386_LINUX_TDEP_H
>    #define I386_LINUX_TDEP_H
>    
> +#include "gdbsupport/x86-xstate.h"
> +
>    /* The Linux kernel pretends there is an additional "orig_eax"
>       register.  Since GDB needs access to that register to be able to
>       properly restart system calls when necessary (see
> @@ -34,8 +36,18 @@
>    /* Total number of registers for GNU/Linux.  */
>    #define I386_LINUX_NUM_REGS (I386_LINUX_ORIG_EAX_REGNUM + 1)
>    
> -/* Get XSAVE extended state xcr0 from core dump.  */
> -extern uint64_t i386_linux_core_read_xcr0 (bfd *abfd);
> +/* Read the XSAVE extended state xcr0 value from the ABFD core file.
> +   If it appears to be valid, return it and fill LAYOUT with values
> +   inferred from that value.
> +
> +   Otherwise, return 0 to indicate no state was found and leave LAYOUT
> +   untouched.  */
> +extern uint64_t i386_linux_core_read_xsave_info (bfd *abfd,
> +						 x86_xsave_layout &layout);
> +
> +/* Implement the core_read_x86_xsave_layout gdbarch method.  */
> +extern bool i386_linux_core_read_x86_xsave_layout (struct gdbarch *gdbarch,
> +						   x86_xsave_layout &layout);
>    
>    /* Handle and display information related to the MPX bound violation
>       to the user.  */
> @@ -52,14 +64,7 @@ extern const struct target_desc *i386_linux_read_description (uint64_t xcr0);
>    	  fxsave_bytes[0..463]
>    	  sw_usable_bytes[464..511]
>    	  xstate_hdr_bytes[512..575]
> -	  avx_bytes[576..831]
> -	  mpx_bytes [960..1032]
> -	  avx512_k_regs[1088..1152]
> -	  avx512_zmmh_regs0-7[1153..1407]
> -	  avx512_zmmh_regs8-15[1408..1663]
> -	  avx512_zmm_regs16-31[1664..2687]
> -	  pkru[2688..2752]
> -	  future_state etc
> +	  extended state regions (AVX, MPX, AVX512, PKRU, etc.)
>    	};
>    
>      Same memory layout will be used for the coredump NT_X86_XSTATE

Ping?

-- 
John Baldwin


  reply	other threads:[~2023-08-14 17:52 UTC|newest]

Thread overview: 58+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-07-14 15:51 [PATCH v6 00/15] Handle variable " John Baldwin
2023-07-14 15:51 ` [PATCH v6 01/15] x86: Add an x86_xsave_layout structure to handle " John Baldwin
2023-07-26 19:22   ` Simon Marchi
2023-07-26 21:27     ` John Baldwin
2023-07-26 22:51       ` Simon Marchi
2023-07-14 15:51 ` [PATCH v6 02/15] gdb: Store an x86_xsave_layout in i386_gdbarch_tdep John Baldwin
2023-07-14 15:51 ` [PATCH v6 03/15] core: Support fetching x86 XSAVE layout from architectures John Baldwin
2023-07-26 19:37   ` Simon Marchi
2023-07-26 21:28     ` John Baldwin
2023-07-14 15:51 ` [PATCH v6 04/15] nat/x86-cpuid.h: Add x86_cpuid_count wrapper around __get_cpuid_count John Baldwin
2023-07-26 19:41   ` Simon Marchi
2023-07-14 15:51 ` [PATCH v6 05/15] x86 nat: Add helper functions to save the XSAVE layout for the host John Baldwin
2023-07-26 19:48   ` Simon Marchi
2023-07-26 21:37     ` John Baldwin
2023-07-14 15:51 ` [PATCH v6 06/15] gdb: Update x86 FreeBSD architectures to support XSAVE layouts John Baldwin
2023-07-26 20:04   ` Simon Marchi
2023-07-26 21:43     ` John Baldwin
2023-07-28 21:23   ` [PATCH v6a " John Baldwin
2023-08-28 16:01     ` Simon Marchi
2023-07-14 15:51 ` [PATCH v6 07/15] gdb: Support XSAVE layouts for the current host in the FreeBSD x86 targets John Baldwin
2023-07-26 20:26   ` Simon Marchi
2023-07-14 15:51 ` [PATCH v6 08/15] gdb: Update x86 Linux architectures to support XSAVE layouts John Baldwin
2023-07-26 20:45   ` Simon Marchi
2023-07-26 21:16     ` John Baldwin
2023-07-27 21:48       ` Simon Marchi
2023-07-28 16:30         ` John Baldwin
2023-07-28 17:58           ` Simon Marchi
2023-07-28 21:30             ` John Baldwin
2023-07-28 21:29   ` [PATCH v6a " John Baldwin
2023-08-14 17:52     ` John Baldwin [this message]
2023-08-28 16:21     ` Simon Marchi
2023-07-14 15:51 ` [PATCH v6 09/15] gdb: Support XSAVE layouts for the current host in the Linux x86 targets John Baldwin
2023-07-26 20:51   ` Simon Marchi
2023-07-14 15:51 ` [PATCH v6 10/15] gdb: Use x86_xstate_layout to parse the XSAVE extended state area John Baldwin
2023-08-28 16:34   ` Simon Marchi
2023-07-14 15:51 ` [PATCH v6 11/15] gdbserver: Add a function to set the XSAVE mask and size John Baldwin
2023-08-28 16:46   ` Simon Marchi
2023-07-14 15:51 ` [PATCH v6 12/15] gdbserver: Refactor the legacy region within the xsave struct John Baldwin
2023-08-28 16:50   ` Simon Marchi
2023-08-28 17:32     ` John Baldwin
2023-07-14 15:51 ` [PATCH v6 13/15] gdbserver: Use x86_xstate_layout to parse the XSAVE extended state area John Baldwin
2023-08-28 18:15   ` Simon Marchi
2023-08-28 18:37     ` John Baldwin
2023-07-14 15:51 ` [PATCH v6 14/15] x86: Remove X86_XSTATE_SIZE and related constants John Baldwin
2023-08-28 20:38   ` Simon Marchi
2023-07-14 15:51 ` [PATCH v6 15/15] gdbserver: Simplify handling of ZMM registers John Baldwin
2023-08-28 20:57   ` Simon Marchi
2023-07-14 15:58 ` [PATCH v6 00/15] Handle variable XSAVE layouts John Baldwin
2023-07-26  8:31   ` Willgerodt, Felix
2023-07-25 17:17 ` Keith Seitz
2023-07-25 18:15   ` John Baldwin
2023-07-25 18:43     ` Keith Seitz
2023-07-25 18:59       ` John Baldwin
2023-07-25 20:42         ` Keith Seitz
2023-07-25 22:05           ` John Baldwin
2023-07-26 22:31             ` John Baldwin
2023-07-27 21:36               ` Keith Seitz
2023-07-28 16:35                 ` John Baldwin

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=e883d041-2333-16d0-2b06-7f994bd698cc@FreeBSD.org \
    --to=jhb@freebsd.org \
    --cc=gdb-patches@sourceware.org \
    --cc=simon.marchi@polymtl.ca \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).