Bug in i386_process_record?
Hui Zhu
teawater@gmail.com
Thu Aug 27 15:35:00 GMT 2009
On Thu, Aug 27, 2009 at 09:43, Hui Zhu<teawater@gmail.com> wrote:
> On Thu, Aug 27, 2009 at 08:28, Michael Snyder<msnyder@vmware.com> wrote:
>> Michael Snyder wrote:
>>>
>>> Hui Zhu wrote:
>>>>
>>>> On Wed, Aug 26, 2009 at 02:42, Eli Zaretskii<eliz@gnu.org> wrote:
>>>>>>
>>>>>> From: Hui Zhu <teawater@gmail.com>
>>>>>> Date: Tue, 25 Aug 2009 13:02:44 +0800
>>>>>> Cc: msnyder@vmware.com, gdb-patches@sourceware.org
>>>>>>
>>>>>> It seems that the segment (It is not the section) registers in x86
>>>>>> protect mode is just help MMU to get the physical address. It's
>>>>>> transparent for the user level program.
>>>>>
>>>>> It's transparent if $es and $ds have the same value (which they
>>>>> usually do, AFAIK).
>>>>>
>>>>>> What do you think about remove this warning from this patch?
>>>>>
>>>>> I would indeed do that, if we find that $es and $ds have the same
>>>>> values. Assuming that someone who knows Linux better than I do
>>>>> confirms that these two registers hold the same selector when a normal
>>>>> application is running in user mode.
>>>>>
>>>> Thanks for remind me. We cannot get the value of each segment
>>>> register, but we can get each segment register point to. So if the
>>>> value of segment registers, it's means that the value of them is same.
>>>>
>>>> I add some code about it:
>>>> regcache_raw_read_unsigned (ir.regcache,
>>>> ir.regmap[X86_RECORD_ES_REGNUM],
>>>> &es);
>>>> regcache_raw_read_unsigned (ir.regcache,
>>>> ir.regmap[X86_RECORD_DS_REGNUM],
>>>> &ds);
>>>> if (ir.aflag && (es != ds))
>>>> {
>>>>
>>>> After that, we will not get the warning because the es is same with ds
>>>> in user level.
>>>>
>>>> What do you think about it?
>>>
>>> I think it is the best version I have seen so far.
>>> And it seems to follow the conclusions of the discussion.
>>> And I've tested it, and it seems to work.
>>>
>>> I would say wait until end-of-business Friday, and
>>> if there are no more comments, check it in!
>>
>> Hui,
>>
>> Do you think you could add some new tests to i386-reverse.exp,
>> to verify the string instructions?
>>
>> Thanks,
>> Michael
>>
>
> OK. I will do it.
>
> Thanks,
> Hui
>
Hi Michael,
I make a patch to add the test for string insn.
Please help me review it.
Thanks,
Hui
2009-08-27 Hui Zhu <teawater@gmail.com>
* gdb.reverse/i386-reverse.c (string_insn_tests): New function.
(main): Call "string_insn_tests".
---
testsuite/gdb.reverse/i386-reverse.c | 16 ++++++++++++++++
1 file changed, 16 insertions(+)
--- a/testsuite/gdb.reverse/i386-reverse.c
+++ b/testsuite/gdb.reverse/i386-reverse.c
@@ -38,9 +38,25 @@ inc_dec_tests (void)
asm ("dec %edi");
} /* end inc_dec_tests */
+void
+string_insn_tests (void)
+{
+ register char x asm("ax");
+ char *dstp = (char *) 1;
+ int d0;
+ int len = 0;
+
+ asm volatile("rep\n"
+ "stosb" /* %0, %2, %3 */ :
+ "=D" (dstp), "=c" (d0) :
+ "0" (dstp), "1" (len), "a" (x) :
+ "memory");
+}
+
int
main ()
{
inc_dec_tests ();
+ string_insn_tests ();
return 0; /* end of main */
}
-------------- next part --------------
---
testsuite/gdb.reverse/i386-reverse.c | 16 ++++++++++++++++
1 file changed, 16 insertions(+)
--- a/testsuite/gdb.reverse/i386-reverse.c
+++ b/testsuite/gdb.reverse/i386-reverse.c
@@ -38,9 +38,25 @@ inc_dec_tests (void)
asm ("dec %edi");
} /* end inc_dec_tests */
+void
+string_insn_tests (void)
+{
+ register char x asm("ax");
+ char *dstp = (char *) 1;
+ int d0;
+ int len = 0;
+
+ asm volatile("rep\n"
+ "stosb" /* %0, %2, %3 */ :
+ "=D" (dstp), "=c" (d0) :
+ "0" (dstp), "1" (len), "a" (x) :
+ "memory");
+}
+
int
main ()
{
inc_dec_tests ();
+ string_insn_tests ();
return 0; /* end of main */
}
More information about the Gdb-patches
mailing list