From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 3769 invoked by alias); 20 Apr 2018 16:13:38 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 3758 invoked by uid 89); 20 Apr 2018 16:13:37 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-2.9 required=5.0 tests=AWL,BAYES_00,RCVD_IN_DNSWL_NONE,SPF_PASS autolearn=ham version=3.3.2 spammy= X-HELO: mail-wr0-f193.google.com Received: from mail-wr0-f193.google.com (HELO mail-wr0-f193.google.com) (209.85.128.193) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Fri, 20 Apr 2018 16:13:34 +0000 Received: by mail-wr0-f193.google.com with SMTP id o15-v6so24382748wro.11 for ; Fri, 20 Apr 2018 09:13:33 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=ekhWBGcJo42kDEtsT8w8OShOEwDOEphy/De4SRJoqsA=; b=csbFG7R9w+IfwEerrOG0vePM2EIiKhX6hxLYJl/lx/mpjwgC69pVB/1GKqvEqBd1lJ bPLSBRdu4p765JfvmiwYGsFHOKgL0IoF4wPEverwMJGANcNlSetAsmUyFAVVLmCxHcip GqvSHQGxYyfVL1gxV0eSZP9A15Zbxh3FOsmK1ETdGObKDyPBRZJOqTOzi6EkYfdlzLPE 6Cw1xgKaSOL9DmC+jKt63vZQqQ2hqxrPEnPYgsXbd4t23Nci20oRpCgjLXnNxgsTTmVW 3+F+kVJeENpgxefChsSpwJxskMspg8AHuYx2cvvs46qc6vTbJ8dULQk8Jchd8EPx5inu Q86A== X-Gm-Message-State: ALQs6tDqwfnMwASgyPTHTwEbvdZ+U29qjB73V70RmynuFE291jcwEwJP 6pbRIG+c8yAQm89CXWJqaULG1gpAnF0= X-Google-Smtp-Source: AIpwx48rBUXXtxztx8C/ChnszMHE47OrWNNjf6iFmKDv4qd6ZspubLZB+pXSuarlvG6r7GrK5QrP2g== X-Received: by 10.28.113.24 with SMTP id m24mr2566052wmc.150.1524240811576; Fri, 20 Apr 2018 09:13:31 -0700 (PDT) Received: from holly.lan (cpc141214-aztw34-2-0-cust773.18-1.cable.virginm.net. [86.9.19.6]) by smtp.googlemail.com with ESMTPSA id z72sm1707825wmc.28.2018.04.20.09.13.30 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 20 Apr 2018 09:13:30 -0700 (PDT) Subject: Re: Re: [PATCH 0/3 v3] [AArch64] Support tagged pointer To: Omair Javaid , Pedro Alves Cc: Yao Qi , GDB Patches References: <1512727471-30745-1-git-send-email-yao.qi@linaro.org> <5429b7f0-ee91-67f4-3b15-f5de9aa06389@redhat.com> <5e21c13b-9261-f947-e06c-dad9568278bf@redhat.com> <061e956c-72a7-2c2e-512b-3dfe42881818@redhat.com> <56373ed6-3a63-4508-61fa-54a3a456d785@redhat.com> From: Daniel Thompson Message-ID: Date: Fri, 20 Apr 2018 16:13:00 -0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-IsSubscribed: yes X-SW-Source: 2018-04/txt/msg00409.txt.bz2 On 20/04/18 15:33, Omair Javaid wrote: > On 17 April 2018 at 03:57, Pedro Alves wrote: > >> On 04/16/2018 02:36 AM, Omair Javaid wrote: >>> On 11 April 2018 at 23:27, Pedro Alves wrote: >>> >>>> On 04/11/2018 12:59 PM, Omair Javaid wrote: >>>> >>>>> Yes I can submit a patch that enables set_gdbarch_significant_addr_bit >>>> for aarch64-linux-tdep only. >>>>> >>>>> But a point to discuss here is the use-case where some people use >>>> *-linux-gdb for debugging seamlessly between kernel and user-space. >>>>> >>>>> There can be ways we can distinguish between user/kernel address space >>>> and clear or set top byte of the address even in case of linux targets. >>>>> >>>>> Does this sound something we should do? >>>> >>>> Yeah, why not. >>>> >>>> What are the pending kernel debugging patches using to distinguish >>>> userspace and kernel debugging modes? Off hand, I'd think we'd want to >>>> make those separate ABIs / osabis / gdbarchs. >>>> >>> >>> Sorry for late reply on this I am out of office this week. >>> >>> I have given this a thought and I propose to do the following: >>> >>> Turn on pointer tagging on OSABI (LINUX) by default. >>> >>> Add commands set aarch64 pointer-tagging show/enable/disable. >>> >>> Once LKD patches for aarch64/arm land in our need for this will >>> automatically be solved. >> >> Makes sense, but I'd like to clarify usefulness of the separate >> "set aarch64 pointer-tagging" command. >> If indeed we're doing to end up with a separate osabi for the Linux >> kernel, then "set osabi linux-kernel" will result >> in disabling pointer-tagging too. So, will it still be useful to have >> the specific "set aarch64 pointer-tagging" commands? Do you see >> use cases for "set aarch64 pointer-tagging" beyond disabling it >> for Linux kernel debugging? I'm thinking that it may be useful >> for bare metal debugging. But, ideally, GDB would figure it out >> on its own without user intervention. Is there's some bit in some >> register gdb could read that indicates whether tagging is enabled? >> >> > Pointer tagging information is stored in MMU registers so in linux > user-space we cannot actually read if pointer tagging is enabled or not > based on register bits. > JTAG debuggers should be able to read MMU registers and know whether > pointer tagging is enabled or not. Perhaps a dumb question but could gdb be persuaded to mask the pointers at a lower level. The current patches end up masking the pointer tags relatively early, which results in masked pointers being sent via the gdb remote protocol (which is what causes some of the problems at present: kgdb and OpenOCD get asked for the wrong pointer). If the pointers were masked as the arguments to ptrace() were marshaled this would behave much more like the real hardware and would make debugging Linux kernel mode entirely transparent (since you cannot ptrace() kernel memory we would never try masking out the tag). More generally masking would become the problem of the register read code for the target. I suspect many JTAG debuggers would (and certainly should) already work correctly as their register reads can honour the TTBR0 status. Daniel.