| Issue |
183482
|
| Summary |
LLDB displays corrupted Call Stack when paciasp Modifies the Return Address on AArch64
|
| Labels |
new issue
|
| Assignees |
|
| Reporter |
Chandrashekar203
|
We are using LLDB (v22.1.0) to debug an ARM SoC based on the AArch64 architecture.
When debugging functions that utilize Pointer Authentication (PA), we see that the call stack is not correctly displayed and appears corrupt.
LLDB is not able to correctly display the call stack in functions where the paciasp instruction is used for return address Pointer Authentication. paciasp instruction cryptographically signs the x30 (LR) register and stores the Pointer Authentication Code (PAC) in the higher bits of the LR. Is there any provision/setting in LLDB to ignore the PAC bits and handle this to properly display the call stack properly?
_______________________________________________
llvm-bugs mailing list
[email protected]
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs