From: Vad Rulezz <vad@vr5.epicgamer.org>
To: openrisc@lists.librecores.org
Subject: [OpenRISC] trap exception handling in linux kernel
Date: Sun, 03 Mar 2019 22:37:18 +0300 [thread overview]
Message-ID: <5C7C2CEE.60903@vr5.epicgamer.org> (raw)
In-Reply-To: <CAAfxs74fdH=AnRi=MZq7G_e-09nuupOfT930fk_c7HcbZaYYRg@mail.gmail.com>
I have actually discovered it in a native debugger, ofc it was not hard to remove the line in my copy of kernel and everything ran well after that,
but I still decided to ask because I thought that maybe there is a software that depends on existing behavior.
As noone except you replied I think it's safe to remove the increment in the mainline. It likely will simplify things for native GDB too.
Vad Rulezz
On 03.03.2019 18:29, Stafford Horne wrote:
> Did you ever get a response for this? I believe this is to allow
> jumping over the openrisc l.trap instruction. But, as you say
> GDB/debuggers will replace that instruction with the real instruction,
> so it shouldn't be needed.
>
> Have you noticed an issue or are you just auditing this? We don't
> usually run GDB from within openrisc linux, I haven't run into this
> issue before.
>
> -Stafford
>
> On Mon, Jan 7, 2019 at 3:07 AM Vad Rulezz <vad@vr5.epicgamer.org> wrote:
>>
>> Hello
>>
>> In arch/openrisc/kernel/traps.c we have a function:
>>
>> asmlinkage void do_trap(struct pt_regs *regs, unsigned long address)
>> {
>> force_sig_fault(SIGTRAP, TRAP_TRACE, (void __user *)address, current);
>>
>> regs->pc += 4;
>> }
>>
>> Is there a reason for regs->pc increment?
>>
>> I think typically debuggers wants to resume program execution from the same address which caused a trap (after disabling a breakpoint, and it's a sw breakpoint after replacing an instruction at this address).
>>
>>
>>
>> Vad Rulezz
>> _______________________________________________
>> OpenRISC mailing list
>> OpenRISC at lists.librecores.org
>> https://lists.librecores.org/listinfo/openrisc
>
next prev parent reply other threads:[~2019-03-03 19:37 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-01-06 18:07 [OpenRISC] trap exception handling in linux kernel Vad Rulezz
2019-03-03 15:29 ` Stafford Horne
2019-03-03 19:37 ` Vad Rulezz [this message]
2019-03-03 23:10 ` Stafford Horne
2019-03-04 1:15 ` Vad Rulezz
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5C7C2CEE.60903@vr5.epicgamer.org \
--to=vad@vr5.epicgamer.org \
--cc=openrisc@lists.librecores.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox