From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from simark.ca by simark.ca with LMTP id ejSPAP/YyWOIahsAWB0awg (envelope-from ) for ; Thu, 19 Jan 2023 18:57:51 -0500 Received: by simark.ca (Postfix, from userid 112) id EB3441E128; Thu, 19 Jan 2023 18:57:50 -0500 (EST) Authentication-Results: simark.ca; dkim=pass (1024-bit key; secure) header.d=sourceware.org header.i=@sourceware.org header.a=rsa-sha256 header.s=default header.b=ZQP5SjJF; dkim-atps=neutral X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on simark.ca X-Spam-Level: X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,RCVD_IN_DNSWL_MED, RDNS_DYNAMIC,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 Received: from sourceware.org (ip-8-43-85-97.sourceware.org [8.43.85.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by simark.ca (Postfix) with ESMTPS id 84F1F1E112 for ; Thu, 19 Jan 2023 18:57:50 -0500 (EST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 64613385840C for ; Thu, 19 Jan 2023 23:57:49 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 64613385840C DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sourceware.org; s=default; t=1674172669; bh=6XnQ3XcwXDWbFq1OvNtJ5yDA/ysuQSfuZxFvAzk2tME=; h=To:Cc:Date:In-Reply-To:References:Subject:List-Id: List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe: From:Reply-To:From; b=ZQP5SjJFCjzw1uQfyZcKJrHwEQM2Z20h7VhCRBzIKc+eoLhKyV28YPVK9cnOK/lAk w/e6dOxFprEc+RKCsAJs0ygjjm9suTVUrRKfcUbtVwaDrnsjrWSYkLsa7PqDHH/iHL aiQ+sKIp1qn01IXGgX9mls6tncgjqx0467xwzhqQ= Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) by sourceware.org (Postfix) with ESMTPS id 355E33858C54 for ; Thu, 19 Jan 2023 23:57:27 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 355E33858C54 Received: from pps.filterd (m0098410.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 30JNoKcf003585; Thu, 19 Jan 2023 23:57:26 GMT Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 3n7fvxg40p-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 19 Jan 2023 23:57:25 +0000 Received: from m0098410.ppops.net (m0098410.ppops.net [127.0.0.1]) by pps.reinject (8.17.1.5/8.17.1.5) with ESMTP id 30JNpbsv006400; Thu, 19 Jan 2023 23:57:25 GMT Received: from ppma02dal.us.ibm.com (a.bd.3ea9.ip4.static.sl-reverse.com [169.62.189.10]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 3n7fvxg40d-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 19 Jan 2023 23:57:25 +0000 Received: from pps.filterd (ppma02dal.us.ibm.com [127.0.0.1]) by ppma02dal.us.ibm.com (8.17.1.19/8.17.1.19) with ESMTP id 30JM23WE005665; Thu, 19 Jan 2023 23:57:24 GMT Received: from smtprelay02.dal12v.mail.ibm.com ([9.208.130.97]) by ppma02dal.us.ibm.com (PPS) with ESMTPS id 3n3m180u2f-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 19 Jan 2023 23:57:24 +0000 Received: from smtpav05.dal12v.mail.ibm.com (smtpav05.dal12v.mail.ibm.com [10.241.53.104]) by smtprelay02.dal12v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 30JNvNoK23724384 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 19 Jan 2023 23:57:23 GMT Received: from smtpav05.dal12v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 5D80E5804C; Thu, 19 Jan 2023 23:57:23 +0000 (GMT) Received: from smtpav05.dal12v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id E980458056; Thu, 19 Jan 2023 23:57:22 +0000 (GMT) Received: from li-e362e14c-2378-11b2-a85c-87d605f3c641.ibm.com (unknown [9.163.12.142]) by smtpav05.dal12v.mail.ibm.com (Postfix) with ESMTP; Thu, 19 Jan 2023 23:57:22 +0000 (GMT) Message-ID: To: Bruno Larsen , Tom de Vries , Ulrich Weigand , gdb-patches@sourceware.org Cc: cel@us.ibm.com Date: Thu, 19 Jan 2023 15:57:22 -0800 In-Reply-To: References: <071f24ecf9b3a2bbbe8fee7db77492eb55c5f3ff.camel@us.ibm.com> <1d9b21914354bef6a290ac30673741e722e11757.camel@de.ibm.com> <3e3c9c40f07ab01c79fe10915e76ffa187c42ad9.camel@us.ibm.com> <122f5d2d3db9ef1979b0f8da927d005f32bba82c.camel@us.ibm.com> <011768e8-2b76-f8ed-1174-fbaa020b15e7@redhat.com> <78b464a1-e32e-c3da-85e4-7bfc322cc29f@redhat.com> <7848e9858b54e33e399b871774ffc0b5058c1736.camel@us.ibm.com> <65d44121-65f7-a212-79ec-07ce53c15ecb@suse.de> <9fe94c0979cb40979b0dea7693a901c2d9f66164.camel@us.ibm.com> <59417813-eb4a-baf8-4e5d-e225d6732f71@suse.de> <7a494157-494f-6adf-d533-bf373b0f054f@redhat.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.5 (3.28.5-18.el8) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 X-Proofpoint-ORIG-GUID: 8mNednT5bEvJj_7M5QEwOQ3BDK1fL5M_ X-Proofpoint-GUID: RHVgI8zmy68rJeThAVvQ24HkoVdk32IV Subject: RE: [PATCH 2/2 version 2] fix for gdb.reverse/finish-precsave.exp and gdb.reverse/finish-reverse.exp X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.930,Hydra:6.0.562,FMLib:17.11.122.1 definitions=2023-01-19_14,2023-01-19_01,2022-06-22_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxscore=0 suspectscore=0 priorityscore=1501 mlxlogscore=999 adultscore=0 malwarescore=0 clxscore=1015 bulkscore=0 impostorscore=0 phishscore=0 spamscore=0 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2212070000 definitions=main-2301190200 X-BeenThere: gdb-patches@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gdb-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , From: Carl Love via Gdb-patches Reply-To: Carl Love Errors-To: gdb-patches-bounces+public-inbox=simark.ca@sourceware.org Sender: "Gdb-patches" Bruno, Tom: On Thu, 2023-01-19 at 08:56 -0800, Carl Love wrote: > > > > If you have the test compiled, you can trigger the bug using > > regular > > record, no need to use btrace specifically. > > Thanks, I went back and tried the tailcall again. I was able to get > it > to generate 2 fails on my laptop with just the X86 patch. Not sure > why > I didn't see that before, maybe I had a typo??? I reviewed the full regression log on my X86 laptop and yup there are the two errors for tailcall in the log. I just missed them when I was looking. Argh. > I did note that git > on my laptop seems to act a bit weird so maybe that was an issue?? I > am having to double check the code changes after running git to make > sure it applied the changes correctly. Not sure why I didn't see the > passes in the full regression suite either. Anyway, I am looking to > see if I can figure out what the regression issue is for this test. > > The gdb.btrace/rn-dl-bind.exp test still runs fine with 9 passes. I claim, the test case for gdb.btrace/tailcall.exp also needs fixing. Without the patch, when you were in the main program at "answer += 1" and did a reverse-next, gdb would go back thru the call to function bar and thru the call to function foo stopping in main. That doesn't seem right to me as you have stepped back thru function foo and bar. With the patch the reverse-next only step back thru function bar and stops in function foo at the call to bar, i.e. doesn't continue to step back thru function bar. The following is the tailcall source code with comments showing where the reverse-step and reverse-next stop with and without the X86 patch applied. Hopefully the code below is a little easier to follow. Initially, the reverse-step and reverse-next tests are executed from the line "answer += 1;" in function main. static __attribute__ ((noinline)) int bar (void) { return 42; } <- reverse-step stops here (with no patch and with X86 patch) static __attribute__ ((noinline)) int foo (void) { return bar (); <- reverse-next stops here (patch X86 applied) } int main (void) { int answer; answer = foo (); <- reverse-next tops here (no patch applied, stepped back thru both the bar and foo functions) answer += 1; <- GDB is here, now issue the reverse-step and reverse-next commands return answer; } As a result of the change in the reverse-next instruction, the expected test results for the tailcall test need to be updated to reflect the fact that gdb now stops in function foo not main. --- a/gdb/testsuite/gdb.btrace/tailcall.exp +++ b/gdb/testsuite/gdb.btrace/tailcall.exp @@ -102,9 +102,9 @@ gdb_test "reverse-step" "\[^\r\n\]*main \\(\\) at tailcall.c :37\r\n.*" \ "reverse-step.2" gdb_test "next" "\[^\r\n\]*38.*" \ "next.1" -gdb_test "reverse-next" "\[^\r\n\]*main \\(\\) at tailcall.c:37\r\n.*" \ +gdb_test "reverse-next" "\[^\r\n\]*foo \\(\\) at tailcall.c:29\r\n.*" \ "reverse-next.1" -gdb_test "step" "\[^\r\n\]*foo \\(\\) at tailcall.c:29\r\n.*" \ +gdb_test "step" "\[^\r\n\]*bar \\(\\) at tailcall.c:24\r\n.*" \ "step.1" gdb_test "finish" "\[^\r\n\]*main \\(\\) at tailcall.c:38\r\n.*" \ "finish.2" With this change, the tailcall.exp test now passes on my X86 laptop. The PowerPC do not change since the test is not supported on PowerPC. I will post an updated version of the X86 patch with the fixes to the tailcall test. It will be version 3. There are no changes to the PowerPC patch. The gdb.btrace/rn-dl-bind.exp test passes with and without my patches. I still can not get this test to fail on my system. Carl