diff options
author | Christophe Lyon <christophe.lyon@arm.com> | 2022-04-01 10:22:28 +0100 |
---|---|---|
committer | Christophe Lyon <christophe.lyon@arm.com> | 2022-04-27 15:18:18 +0100 |
commit | ef273377587d440f4aa248265147d5e75f86a018 (patch) | |
tree | 0f7a7056cb9954cdd0ecda587c5e03966971d5d0 /gdb/NEWS | |
parent | ae7e2f45aa4798be449f282bbf75ad41e73f055e (diff) | |
download | gdb-ef273377587d440f4aa248265147d5e75f86a018.zip gdb-ef273377587d440f4aa248265147d5e75f86a018.tar.gz gdb-ef273377587d440f4aa248265147d5e75f86a018.tar.bz2 |
gdb/arm: Extend arm_m_addr_is_magic to support FNC_RETURN, add unwind-secure-frames command
This patch makes use of the support for several stack pointers
introduced by the previous patch to switch between them as needed
during unwinding.
It introduces a new 'unwind-secure-frames' arm command to enable/disable
mode switching during unwinding. It is enabled by default.
It has been tested using an STM32L5 board (with cortex-m33) and the
sample applications shipped with the STM32Cube development
environment: GTZC_TZSC_MPCBB_TrustZone in
STM32CubeL5/Projects/NUCLEO-L552ZE-Q/Examples/GTZC.
The test consisted in setting breakpoints in various places and check
that the backtrace is correct: SecureFault_Callback (Non-secure mode),
__gnu_cmse_nonsecure_call (before and after the vpush instruction),
SecureFault_Handler (Secure mode).
This implies that we tested only some parts of this patch (only MSP*
were used), but remaining parts seem reasonable.
Signed-off-by: Torbjörn Svensson <torbjorn.svensson@st.com>
Signed-off-by: Christophe Lyon <christophe.lyon@foss.st.com>
Signed-off-by: Christophe Lyon <christophe.lyon@arm.com>
Diffstat (limited to 'gdb/NEWS')
-rw-r--r-- | gdb/NEWS | 5 |
1 files changed, 5 insertions, 0 deletions
@@ -5214,6 +5214,11 @@ show arm force-mode the current CPSR value for instructions without symbols; previous versions of GDB behaved as if "set arm fallback-mode arm". +set arm unwind-secure-frames + Enable unwinding from Non-secure to Secure mode on Cortex-M with + Security extension. + This can trigger security exceptions when unwinding exception stacks. + set disable-randomization show disable-randomization Standalone programs run with the virtual address space randomization enabled |