Mirror of the gdb-patches mailing list
 help / color / mirror / Atom feed
From: Pedro Alves <pedro@codesourcery.com>
To: Michael Snyder <msnyder@vmware.com>
Cc: "gdb-patches@sourceware.org" <gdb-patches@sourceware.org>,
	 teawater <teawater@gmail.com>
Subject: Re: [reverse/record] adjust_pc_after_break in reverse execution mode?
Date: Sat, 18 Oct 2008 03:09:00 -0000	[thread overview]
Message-ID: <200810180408.42297.pedro@codesourcery.com> (raw)
In-Reply-To: <48F93A22.7070409@vmware.com>

A Saturday 18 October 2008 02:21:38, Michael Snyder wrote:
> Grump grump -- there's a "consecutive.exp" test in the testsuite,
> but your example shows it to be inadequate -- it places two bps
> on consecutive instructions, but doesn't make sure that they are
> one byte in size.
> 
> So naturally, my derived "consecutive-reverse.exp" test
> (see the branch) has the same failing.
> 
> Got any ideas how we could address this, testsuite-wise?
> Ideally we'd like it to be arch-independent...
> 

I think asm ("nop") like below is your best bet.  Is there any assembler
that doesn't understand "nop"?  I believe it should pretty much be a safe
bet that nop will be the smallest possible sized instruction on
variable sized instruction archs, and the same size of a decr_pc_after_break
(or of a breakpoint insn).  Else, the .exp could -DNOP_ASM depending on target,
and the code could use 'asm (NOP_ASM);'.  NOP_ASM could be any instruction
other than jmps and branches, doesn't really have to be a "nop".

> Pedro Alves wrote:
> > Just noticed this, while looking at the code, so I tried it out against
> > the record target (x86) on the reverse-20080930-branch branch.
> > 
> > 4       int main ()
> > 5       {
> > 6               asm ("nop");
> > 7               asm ("nop");
> > 8               asm ("nop");
> > 9               asm ("nop");
> > 10      }
> > 
> > (gdb) disassemble
> > Dump of assembler code for function main:
> > 0x08048344 <main+0>:    lea    0x4(%esp),%ecx
> > 0x08048348 <main+4>:    and    $0xfffffff0,%esp
> > 0x0804834b <main+7>:    pushl  -0x4(%ecx)
> > 0x0804834e <main+10>:   push   %ebp
> > 0x0804834f <main+11>:   mov    %esp,%ebp
> > 0x08048351 <main+13>:   push   %ecx
> > 0x08048352 <main+14>:   nop
> > 0x08048353 <main+15>:   nop
> > 0x08048354 <main+16>:   nop
> > 0x08048355 <main+17>:   nop
> > 0x08048356 <main+18>:   pop    %ecx
> > 
> > Now let's try reverse continuing until hitting a breakpoint at 0x8048353 (line 7):
> > 
> >   (gdb) b 7
> >   Breakpoint 1 at 0x8048353: file nop.c, line 7.
> >   (gdb) start
> >   Temporary breakpoint 2 at 0x8048352: file nop.c, line 6.
> >   Starting program: /home/pedro/gdb/reverse-20080930-branch/build32/gdb/nop
> > 
> >   Temporary breakpoint 2, main () at nop.c:6
> >   6               asm ("nop");
> >   (gdb) record
> >   (gdb) n
> > 
> >   Breakpoint 1, main () at nop.c:7
> >   7               asm ("nop");
> >   (gdb) n
> >   8               asm ("nop");
> >   (gdb) n
> >   9               asm ("nop");
> >   (gdb) p $pc
> >   $1 = (void (*)()) 0x8048355 <main+17>
> >   (gdb) reverse-continue
> >   Continuing.
> > 
> >   Breakpoint 1, main () at nop.c:7
> >   7               asm ("nop");
> >   (gdb) p $pc
> >   $1 = (void (*)()) 0x8048353 <main+15>
> >   (gdb)
> > 
> > Now, let's try reverse continuing to a breakpoint at 0x8048353 (line 6),
> > but this time, let's also sneak a breakpoint at 0x8048352 (line 6):
> > 
> >   (gdb) start
> >   Temporary breakpoint 1 at 0x8048352: file nop.c, line 6.
> >   Starting program: /home/pedro/gdb/reverse-20080930-branch/build32/gdb/nop
> > 
> >   Temporary breakpoint 1, main () at nop.c:6
> >   6               asm ("nop");
> >   (gdb) b 6
> >   Breakpoint 2 at 0x8048352: file nop.c, line 6.
> >   (gdb) b 7
> >   Breakpoint 3 at 0x8048353: file nop.c, line 7.
> >   (gdb) record
> >   (gdb) n
> > 
> >   Breakpoint 3, main () at nop.c:7
> >   7               asm ("nop");
> >   (gdb) n
> >   8               asm ("nop");
> >   (gdb) n
> >   9               asm ("nop");
> >   (gdb) p $pc
> >   $1 = (void (*)()) 0x8048355 <main+17>
> >   (gdb) reverse-continue
> >   Continuing.
> > 
> >   Breakpoint 2, main () at nop.c:6
> >   6               asm ("nop");
> >   (gdb) p $pc
> >   $1 = (void (*)()) 0x8048352 <main+14>
> > 
> > Oh-oh.  Not good.
> > 
> > So, in the second example, reverse execution should continue until
> > breakpoint 3, but, adjust_pc_after_break finds a breakpoint
> > at `PC - decr_pc_after_break' (1 on x86), adjusts the PC, and then we
> > report breakpoint 2 being hit.  The first example didn't trip on the
> > problem, because there was no breakpoint at `PC - 1' when GDB went to
> > look if adjustment was needed.
> > 
> > I'm guessing the attached patch should be correct for all
> > targets/archs, or could it be your targets are behaving differently?
> > 
> > --
> > Pedro Alves
> > 
> > 
> > ------------------------------------------------------------------------
> > 
> > 2008-10-18  Pedro Alves  <pedro@codesourcery.com>
> > 
> > 	* infrun.c (adjust_pc_after_break): Do nothing if executing in
> > 	reverse.
> > 
> > ---
> >  gdb/infrun.c |   27 +++++++++++++++++++++++++++
> >  1 file changed, 27 insertions(+)
> > 
> > Index: src/gdb/infrun.c
> > ===================================================================
> > --- src.orig/gdb/infrun.c	2008-10-18 02:06:15.000000000 +0100
> > +++ src/gdb/infrun.c	2008-10-18 02:09:36.000000000 +0100
> > @@ -1787,6 +1787,33 @@ adjust_pc_after_break (struct execution_
> >    if (ecs->ws.value.sig != TARGET_SIGNAL_TRAP)
> >      return;
> >  
> > +  /* In reverse execution, when a breakpoint is hit, the instruction
> > +     under it has already been de-executed.  The reported PC always
> > +     points at the breakpoint address, so adjusting it further would
> > +     be wrong.  E.g., consider:
> > +
> > +       B1         0x08000000 :   INSN1
> > +       B2         0x08000001 :   INSN2
> > +		  0x08000002 :   INSN3
> > +	    PC -> 0x08000003 :   INSN4
> > +
> > +      Say you're stopped at 0x08000003 as above.  Reverse continuing
> > +      from that point should hit B2 as below.  Reading the PC when the
> > +      SIGTRAP is reported should read 0x08000001 and INSN2 should have
> > +      been de-executed already.
> > +
> > +       B1         0x08000000 :   INSN1
> > +       B2   PC -> 0x08000001 :   INSN2
> > +		  0x08000002 :   INSN3
> > +		  0x08000003 :   INSN4
> > +
> > +      If we tried to adjust the PC on for example, a
> > +      decr_pc_after_break == 1 architecture, we would wrongly further
> > +      adjust the PC to 0x08000000 and report a hit on B1, although the
> > +      INSN1 effects hadn't been de-executed yet.  */
> > +  if (execution_direction == EXEC_REVERSE)
> > +    return;
> > +
> >    /* If this target does not decrement the PC after breakpoints, then
> >       we have nothing to do.  */
> >    regcache = get_thread_regcache (ecs->ptid);
> 
> 



-- 
Pedro Alves


  reply	other threads:[~2008-10-18  3:09 UTC|newest]

Thread overview: 45+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2008-10-18  1:11 Pedro Alves
2008-10-18  1:26 ` Michael Snyder
2008-10-18  3:09   ` Pedro Alves [this message]
2008-10-18  3:18     ` teawater
2008-10-18  8:42     ` Andreas Schwab
2008-10-19 14:28       ` teawater
2008-10-19 20:10     ` Daniel Jacobowitz
2008-10-18  3:07 ` teawater
2008-10-18  3:26   ` Pedro Alves
2008-10-19 22:44 ` Michael Snyder
2008-10-20  0:10   ` Pedro Alves
2008-10-20  0:44     ` Michael Snyder
2008-10-20  1:46       ` Daniel Jacobowitz
2008-10-20 12:10       ` Pedro Alves
2008-10-20 15:50         ` teawater
2008-10-20 17:44       ` Pedro Alves
2008-10-20 17:51         ` Michael Snyder
2008-10-20 23:36           ` teawater
2008-10-21  0:21             ` Pedro Alves
2008-10-21  0:56               ` teawater
2008-10-21  3:13                 ` teawater
2008-10-21  6:52               ` teawater
2008-10-21  6:52                 ` teawater
2008-10-23 23:28                 ` Michael Snyder
2008-10-21  7:04               ` teawater
2008-10-21 18:36                 ` Michael Snyder
2008-10-22  0:39                   ` teawater
2008-10-23 23:32     ` Michael Snyder
2008-10-23 23:46       ` Pedro Alves
2008-10-23 23:55         ` Pedro Alves
2008-10-24  0:45           ` Michael Snyder
2008-10-24  0:43         ` Michael Snyder
2008-10-24  1:51           ` Pedro Alves
2008-10-24  8:11             ` teawater
2008-10-24  9:58               ` teawater
2008-10-25  7:08                 ` teawater
2008-10-28  3:21                   ` teawater
2008-10-29  1:24                   ` Michael Snyder
2008-10-30  3:01                     ` teawater
2008-10-30 12:21                     ` Pedro Alves
2008-10-30 22:06                       ` Michael Snyder
2008-10-30 21:44                         ` Pedro Alves
2008-10-30 21:29                           ` Michael Snyder
2008-10-31 13:04                           ` teawater
2008-10-31  0:25                       ` teawater

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=200810180408.42297.pedro@codesourcery.com \
    --to=pedro@codesourcery.com \
    --cc=gdb-patches@sourceware.org \
    --cc=msnyder@vmware.com \
    --cc=teawater@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox