From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by sourceware.org (Postfix) with ESMTPS id 77AEF3847825 for ; Wed, 9 Nov 2022 08:43:44 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 77AEF3847825 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=oracle.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=oracle.com Received: from pps.filterd (m0246629.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 2A98arlA028817; Wed, 9 Nov 2022 08:43:32 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : content-transfer-encoding : content-type : mime-version; s=corp-2022-7-12; bh=md7pmPhaqKAqHohb7BCdRlU6bFi/9JyG0ebq1NygJpY=; b=VSdWn2UJD/ksThVIbU8RubXPMlWlx/aXFqWJYEyXH7bOofkoSZ5Hvw2snOSF33q7mM2H HHWyVpkf9RmVwVSTILfW3FEgXEzOjHDcjDg5Qs2Ebn+y+CtwHKRKDqAX5YDxwuNp/QRc vbAvUsw4rOcL49i0LWo1vWmoLAA/7gIivhCf3Ry5AsOxHiWrw4ii6hHx+aTEjizonHZJ gCRUOrnqehaqDM8PvkT7kpH5UTyXNYUsXlPZV366cCbkOW4mxP5nX7rCkSPCm6NSTyAf 773Q3xqB4WuGy+U4V6D85q4VfJuX5v2ydqhv5Ic8xmTgDIkT2pzgqx/DPZScG94HtN8P DQ== Received: from phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta01.appoci.oracle.com [138.1.114.2]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3kr8urr1he-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 09 Nov 2022 08:43:30 +0000 Received: from pps.filterd (phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (8.17.1.5/8.17.1.5) with ESMTP id 2A97fBFH004344; Wed, 9 Nov 2022 08:43:13 GMT Received: from nam12-mw2-obe.outbound.protection.outlook.com (mail-mw2nam12lp2047.outbound.protection.outlook.com [104.47.66.47]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 3kpcq33jff-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 09 Nov 2022 08:43:13 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BSw9iC+/+lV95MB9WSCj25hrX2aSNjhzkQlZNZQjAzlHMK6eS4+pSgf0dNj2vzZy9hLK27/c7ldmWDUfuqIHo2pZF78lGese43Z7QK/9NpCA4fGO/RKU8hXwBiBodHmpL5eUmeh4onIc38trryQL2ogec0RBtIg1GJOV2trNG95B+FNW6gX7gi6m2FY3ldHkTQJ+iZe/a0U2J+GyJSh1ed3/yLreRFgD/hp0NA8EIAtE62ESt7yZSJi/Ov1JmDZG7JI6I0jrsCykd6tOAd9rBp/4LVzd3g6JIPu98MV9ydAT+1duuLCo5bAIXcTANcQXGWT24Uq8D9TGaH5oimS9ng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=md7pmPhaqKAqHohb7BCdRlU6bFi/9JyG0ebq1NygJpY=; b=R+lB6tBrqxo1uwTbFN12Lwb1orFLX7GdF1ayybyS52ox/4YT4+fm0DJLEwu/CT2U+MBmXZatNTaQN2POVQVWFw8huAaHQOjwJVXMsbbLpfFmwAKSS4TMXCmjO3UfbenJkSYzXlffdBrx2KXf2VTsddBaY8GQmfEW0IUe9AbBjM81sKGB8BoGT6JFcnwgekin5JMwRDEOV1FTtT6UZ9YuruC68VU7seUSE0886iX9uTYKymIkWOxzw06l9ttxplRzvYT8YqUzZf4QJ9SQ2M99vCTaJzt4fgOKVpTRxVvWAhztstw1HDr1f4R6aqMiE1SHoBXgT30fAypKND0IM5GwIA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=md7pmPhaqKAqHohb7BCdRlU6bFi/9JyG0ebq1NygJpY=; b=rE0MldhGvh2r07NRdBNw3TCUaj0nXtWFWcRBoNV0wlQqLL0hElBIHlDxB8KZpQiJukNGjCEIkvSS5jC37Skqhch90YMiu2yVvv9TyM2AjBn7+melhksakhz1hLAnTD5A31K+k4xH24mtn4CDSMMygwzFOGUoM5KCcIq8JgRcatI= Received: from MWHPR1001MB2158.namprd10.prod.outlook.com (2603:10b6:301:2d::17) by CO1PR10MB4772.namprd10.prod.outlook.com (2603:10b6:303:94::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5769.19; Wed, 9 Nov 2022 08:43:10 +0000 Received: from MWHPR1001MB2158.namprd10.prod.outlook.com ([fe80::a505:15c2:a248:efa2]) by MWHPR1001MB2158.namprd10.prod.outlook.com ([fe80::a505:15c2:a248:efa2%7]) with mapi id 15.20.5723.033; Wed, 9 Nov 2022 08:43:10 +0000 From: Indu Bhagat To: binutils@sourceware.org Cc: weimin.pan@oracle.com, nickc@redhat.com, Indu Bhagat Subject: [PATCH,V4 04/11] gas: testsuite: add new tests for SFrame unwind info Date: Wed, 9 Nov 2022 00:42:37 -0800 Message-Id: <20221109084244.261296-5-indu.bhagat@oracle.com> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20221109084244.261296-1-indu.bhagat@oracle.com> References: <20221109084244.261296-1-indu.bhagat@oracle.com> Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: MW4PR03CA0077.namprd03.prod.outlook.com (2603:10b6:303:b6::22) To MWHPR1001MB2158.namprd10.prod.outlook.com (2603:10b6:301:2d::17) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MWHPR1001MB2158:EE_|CO1PR10MB4772:EE_ X-MS-Office365-Filtering-Correlation-Id: b9cb75b0-aaf2-4045-592b-08dac22e6e90 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MWHPR1001MB2158.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230022)(346002)(136003)(39860400002)(366004)(396003)(376002)(451199015)(66476007)(66556008)(6512007)(8676002)(86362001)(6506007)(44832011)(4326008)(66946007)(5660300002)(30864003)(83380400001)(8936002)(38100700002)(2906002)(36756003)(41300700001)(6916009)(186003)(2616005)(6486002)(107886003)(316002)(6666004)(478600001)(1076003)(2004002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?/oMJQTQRwoHqjmzjLD30G/JK53LfhS777GdsRUGItiMCvfFfxJB4KzBvweer?= =?us-ascii?Q?8BVHiG7g3ue0sHs8fF7IJ8PBS2cGYxGR4ZMWMEACmWhaE0rX5D4XkVozMt7b?= =?us-ascii?Q?PtOGxH8c959d2ZFBaBHD+8cDaCQjgKejoGteoPeJA2RW83v+H/ilZjtvk53Q?= =?us-ascii?Q?KllF19neuA8E1nUIhyQRmK1DZKTNxF3w58z2q6IgyHonA0IwP+Iyx67bLWoL?= =?us-ascii?Q?E89H7v8UBd80Sj4pGH5HSz/bzsxfjmnBZFDxLQyoKEyuBcuOS6D9HZmeLy1I?= =?us-ascii?Q?AkpPatk8TWiJ21pC/XmqeBKnkTICgorzbevHDOwMrVC5sqk7w+4HppGwnt4j?= =?us-ascii?Q?Obytfi7u5AmAY+a55KBV7Ub2jf2yNfUXQu3RNSrvK/mkqcoTLq4TF5F/SqRH?= =?us-ascii?Q?uM7C/Ss/fvvjrTx57SYRQzdfbq3YdqpYpOCdfphSWqsIMN5cvY6ej9HNRM+y?= =?us-ascii?Q?aKQ9dnXb9qnfuML08TtVsthDWkyB5V4k8LkO+4Cwae9FSzp1mGHJBrJyFP9s?= =?us-ascii?Q?XdG8BEocTIHqiY8Ga3r331fnK7zB7yE3pV1PZ0UNBFnyT8bNaklM5oYkW9By?= =?us-ascii?Q?F7V4Vr26K98zdp3GnRdjt4X4Qadj0RXfs4XO3Mg0XR0XJFfd4j/DO67thQgi?= =?us-ascii?Q?fxlxh8yESvGJw+erGWqQMPj4FrU/ypZpX8zMjujfP9ogOk29Fg38P5H+rkvX?= =?us-ascii?Q?f7N7qlHX5JtpCqPb1qmIIW0iqkR6vaXm2yuYNApLPe2akFa8TU28EhmuET0/?= =?us-ascii?Q?yXwFM+eIvPuXubgOn9YsWmf/igYgqA6cnisouhA0uhpiK4fToKsIuQDWBiNy?= =?us-ascii?Q?XtSIYi4u/v0rMT989OJLCVuoW8RUYhE/2akjE1WWtsOXd0F9R5vSmA//UQoQ?= =?us-ascii?Q?HuzPRV53BV99LNsj3xiBqzuv4ojJ0CrugvD5Hq8ceRrTINts5Ct7llxQpeQX?= =?us-ascii?Q?PN8RxBPjQjJYeCy/esZ/Pgv6J69c48AIBKb9zeTbfhHhF1CbUDqE11gh09KG?= =?us-ascii?Q?zi3h9jeW/zbNDStqKDLJrDCS3Fy+xqDmyWJyc5M1gbPAm2bn7NXBrTMXUqfI?= =?us-ascii?Q?7XTsXkX9Tqi2HWsB0m8OJi/Pekx0VsOTSRuulkMunMZ887Wnn3i97ni3KCh2?= =?us-ascii?Q?IPED6O/0ikl3chIqaodnh8WsTYr3eCx05pJrVBRIT4mKMwjnrSGD2pJlpm5T?= =?us-ascii?Q?B1UcpAB100RBA7XwsCoa4lSeg3pOexRebVSpgXgJUuZHw5R2b4FtOj3UOKBF?= =?us-ascii?Q?445jB5g79FfMP9zrwLADtqpSKChivDvkvTrYMmJPV79FQzzn/YIzNIb8SoTg?= =?us-ascii?Q?tYCoI9GHDHsyfkfN/cU4ct/KSldU8uQl1usZsDv/X/0z6Hj+gEVrnoYq3V4P?= =?us-ascii?Q?kKPxkksCR4YxWiBUVvDg2LdF05U4GFR2LkNA/uolQuSZQKkg6LZ+o36uiZw6?= =?us-ascii?Q?hDkLAeOFfkr7U19zpZ9if+a6uYvgHKHiKDe6z8rN+N5QtaRJSrmaae+d0d8w?= =?us-ascii?Q?86SAlL2yPkSDcgEETSW1V3u8AI2iq5vjNmQVK5we0kW5XxN3raHY4J/Numgc?= =?us-ascii?Q?yrTtWcBE15QqfRtFVN4SSFsNIyYWcRgcRE7dwEvRk1LvrwrdCY/7h7FEGbAN?= =?us-ascii?Q?59HboGfiybkcWP7+ZoVdx50=3D?= X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: b9cb75b0-aaf2-4045-592b-08dac22e6e90 X-MS-Exchange-CrossTenant-AuthSource: MWHPR1001MB2158.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Nov 2022 08:43:10.7927 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: l3O4NqFNabMy+R8QgFrRrhmaCEEXiwM0qXnMA+nBr46RKUrS0b3k5GQplVykVUTR+rsVj4woO0mZhwDM1hyp9g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR10MB4772 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.895,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-11-09_03,2022-11-08_01,2022-06-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 spamscore=0 adultscore=0 malwarescore=0 mlxlogscore=999 mlxscore=0 phishscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2210170000 definitions=main-2211090066 X-Proofpoint-GUID: P1QoS3wlb8EuIVD_eiipq_rtD_uOqRIW X-Proofpoint-ORIG-GUID: P1QoS3wlb8EuIVD_eiipq_rtD_uOqRIW X-Spam-Status: No, score=-12.7 required=5.0 tests=BAYES_00,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,GIT_PATCH_0,RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H2,SCC_5_SHORT_WORD_LINES,SPF_HELO_NONE,SPF_NONE,TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: [No chnages in V4, V3] [Changes in V2] - fixed the string to match aarch64_be-*-* in cfi-sframe.exp. Prior to this, cfi-sframe testsuite was not running when --target=aarch64_be-linux-gnu - Also added new proc to check if as supports SFrame. Prior to this fix, cfi-sframe testsuite was also running when --target=aarch64_be-linux-gnu_ilp32. SFrame is not supported for this ABI/arch. [End of changes in V2] Earlier these tests were in the same commit as previous which adds the support in GNU assembler to generate .sframe section from CFI directives. Splitting this out here for ease of applying and testing. ChangeLog: * gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-1.d: New file. * gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-1.s: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-1.d: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-1.s: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-2.d: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-2.s: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-3.d: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-3.s: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-4.d: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-4.s: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-5.d: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-5.s: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-6.d: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-6.s: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-7.d: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-7.s: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-8.d: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-common-8.s: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-x86_64-1.d: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe-x86_64-1.s: Likewise. * gas/testsuite/gas/cfi-sframe/cfi-sframe.exp: Likewise. * gas/testsuite/gas/cfi-sframe/common-empty-1.d: Likewise. * gas/testsuite/gas/cfi-sframe/common-empty-1.s: Likewise. * gas/testsuite/gas/cfi-sframe/common-empty-2.d: Likewise. * gas/testsuite/gas/cfi-sframe/common-empty-2.s: Likewise. * gas/testsuite/gas/cfi-sframe/common-empty-3.d: Likewise. * gas/testsuite/gas/cfi-sframe/common-empty-3.s: Likewise. * gas/testsuite/gas/cfi-sframe/common-empty-4.d: Likewise. * gas/testsuite/gas/cfi-sframe/common-empty-4.s: Likewise. --- .../gas/cfi-sframe/cfi-sframe-aarch64-1.d | 20 ++++ .../gas/cfi-sframe/cfi-sframe-aarch64-1.s | 61 +++++++++++ .../gas/cfi-sframe/cfi-sframe-common-1.d | 17 +++ .../gas/cfi-sframe/cfi-sframe-common-1.s | 3 + .../gas/cfi-sframe/cfi-sframe-common-2.d | 17 +++ .../gas/cfi-sframe/cfi-sframe-common-2.s | 2 + .../gas/cfi-sframe/cfi-sframe-common-3.d | 17 +++ .../gas/cfi-sframe/cfi-sframe-common-3.s | 4 + .../gas/cfi-sframe/cfi-sframe-common-4.d | 21 ++++ .../gas/cfi-sframe/cfi-sframe-common-4.s | 8 ++ .../gas/cfi-sframe/cfi-sframe-common-5.d | 21 ++++ .../gas/cfi-sframe/cfi-sframe-common-5.s | 7 ++ .../gas/cfi-sframe/cfi-sframe-common-6.d | 21 ++++ .../gas/cfi-sframe/cfi-sframe-common-6.s | 7 ++ .../gas/cfi-sframe/cfi-sframe-common-7.d | 21 ++++ .../gas/cfi-sframe/cfi-sframe-common-7.s | 7 ++ .../gas/cfi-sframe/cfi-sframe-common-8.d | 20 ++++ .../gas/cfi-sframe/cfi-sframe-common-8.s | 12 +++ .../gas/cfi-sframe/cfi-sframe-x86_64-1.d | 22 ++++ .../gas/cfi-sframe/cfi-sframe-x86_64-1.s | 30 ++++++ gas/testsuite/gas/cfi-sframe/cfi-sframe.exp | 100 ++++++++++++++++++ gas/testsuite/gas/cfi-sframe/common-empty-1.d | 14 +++ gas/testsuite/gas/cfi-sframe/common-empty-1.s | 5 + gas/testsuite/gas/cfi-sframe/common-empty-2.d | 14 +++ gas/testsuite/gas/cfi-sframe/common-empty-2.s | 8 ++ gas/testsuite/gas/cfi-sframe/common-empty-3.d | 14 +++ gas/testsuite/gas/cfi-sframe/common-empty-3.s | 9 ++ gas/testsuite/gas/cfi-sframe/common-empty-4.d | 14 +++ gas/testsuite/gas/cfi-sframe/common-empty-4.s | 17 +++ 29 files changed, 533 insertions(+) create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-1.d create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-1.s create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-1.d create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-1.s create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-2.d create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-2.s create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-3.d create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-3.s create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-4.d create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-4.s create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-5.d create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-5.s create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-6.d create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-6.s create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-7.d create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-7.s create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-8.d create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-common-8.s create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-x86_64-1.d create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-x86_64-1.s create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe.exp create mode 100644 gas/testsuite/gas/cfi-sframe/common-empty-1.d create mode 100644 gas/testsuite/gas/cfi-sframe/common-empty-1.s create mode 100644 gas/testsuite/gas/cfi-sframe/common-empty-2.d create mode 100644 gas/testsuite/gas/cfi-sframe/common-empty-2.s create mode 100644 gas/testsuite/gas/cfi-sframe/common-empty-3.d create mode 100644 gas/testsuite/gas/cfi-sframe/common-empty-3.s create mode 100644 gas/testsuite/gas/cfi-sframe/common-empty-4.d create mode 100644 gas/testsuite/gas/cfi-sframe/common-empty-4.s diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-1.d b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-1.d new file mode 100644 index 00000000000..aeefbc9cdef --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-1.d @@ -0,0 +1,20 @@ +#as: +#objdump: --sframe=.sframe +#name: SFrame generation on aarch64 +#... +Contents of the SFrame section .sframe: + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 1 + Num FREs: 3 + + Function Index : + + func idx \[0\]: pc = 0x0, size = 80 bytes + STARTPC +CFA +FP +RA + + 0+0000 +sp\+0 +u +u + + 0+0004 +sp\+144 +u +u + + 0+004c +sp\+0 +u +u + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-1.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-1.s new file mode 100644 index 00000000000..082c8a32046 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-1.s @@ -0,0 +1,61 @@ + .cfi_sections .sframe + .cfi_startproc + stp x19, x20, [sp, -144]! + .cfi_def_cfa_offset 144 + .cfi_offset 19, -144 + .cfi_offset 20, -136 + stp x21, x22, [sp, 16] + stp x23, x24, [sp, 32] + stp x25, x26, [sp, 48] + stp x27, x28, [sp, 64] + stp d8, d9, [sp, 80] + stp d10, d11, [sp, 96] + stp d12, d13, [sp, 112] + stp d14, d15, [sp, 128] + .cfi_offset 21, -128 + .cfi_offset 22, -120 + .cfi_offset 23, -112 + .cfi_offset 24, -104 + .cfi_offset 25, -96 + .cfi_offset 26, -88 + .cfi_offset 27, -80 + .cfi_offset 28, -72 + .cfi_offset 72, -64 + .cfi_offset 73, -56 + .cfi_offset 74, -48 + .cfi_offset 75, -40 + .cfi_offset 76, -32 + .cfi_offset 77, -24 + .cfi_offset 78, -16 + .cfi_offset 79, -8 + nop + ldp x21, x22, [sp, 16] + ldp x23, x24, [sp, 32] + ldp x25, x26, [sp, 48] + ldp x27, x28, [sp, 64] + ldp d8, d9, [sp, 80] + ldp d10, d11, [sp, 96] + ldp d12, d13, [sp, 112] + ldp d14, d15, [sp, 128] + ldp x19, x20, [sp], 144 + .cfi_restore 20 + .cfi_restore 19 + .cfi_restore 78 + .cfi_restore 79 + .cfi_restore 76 + .cfi_restore 77 + .cfi_restore 74 + .cfi_restore 75 + .cfi_restore 72 + .cfi_restore 73 + .cfi_restore 27 + .cfi_restore 28 + .cfi_restore 25 + .cfi_restore 26 + .cfi_restore 23 + .cfi_restore 24 + .cfi_restore 21 + .cfi_restore 22 + .cfi_def_cfa_offset 0 + ret + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-1.d b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-1.d new file mode 100644 index 00000000000..7d97383bb90 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-1.d @@ -0,0 +1,17 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: SFrame generation using CFI directive .cfi_sections +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 1 + Num FREs: 1 + + Function Index : + func idx \[0\]: pc = 0x0, size = 0 bytes + STARTPC + CFA + FP + RA + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-1.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-1.s new file mode 100644 index 00000000000..ac9c6ca2cf3 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-1.s @@ -0,0 +1,3 @@ + .cfi_sections .sframe + .cfi_startproc + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-2.d b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-2.d new file mode 100644 index 00000000000..fc7d5c440db --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-2.d @@ -0,0 +1,17 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: Command line option for generating SFrame +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 1 + Num FREs: 1 + + Function Index : + func idx \[0\]: pc = 0x0, size = 0 bytes + STARTPC + CFA + FP + RA + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-2.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-2.s new file mode 100644 index 00000000000..659b3b9d99b --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-2.s @@ -0,0 +1,2 @@ + .cfi_startproc + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-3.d b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-3.d new file mode 100644 index 00000000000..95954508e3d --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-3.d @@ -0,0 +1,17 @@ +#as: +#objdump: --sframe=.sframe +#name: SFrame can co-exist with EH Frame +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 1 + Num FREs: 1 + + Function Index : + func idx \[0\]: pc = 0x0, size = 0 bytes + STARTPC + CFA + FP + RA + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-3.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-3.s new file mode 100644 index 00000000000..36d31fe5348 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-3.s @@ -0,0 +1,4 @@ + .cfi_sections .eh_frame + .cfi_sections .sframe + .cfi_startproc + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-4.d b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-4.d new file mode 100644 index 00000000000..b835980ecbd --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-4.d @@ -0,0 +1,21 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: SFrame cfi_def_cfa_offset test +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 1 + Num FREs: 3 + + Function Index : + func idx \[0\]: pc = 0x0, size = 12 bytes + STARTPC + CFA + FP + RA + +#... + 0+0004 +sp\+16 +u +u + + 0+0008 +sp\+32 +u +u + + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-4.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-4.s new file mode 100644 index 00000000000..0d026bba71a --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-4.s @@ -0,0 +1,8 @@ +## Testcase for cfi_def_cfa_offset + .cfi_startproc + .long 0 + .cfi_def_cfa_offset 16 + .long 0 + .cfi_def_cfa_offset 32 + .long 0 + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-5.d b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-5.d new file mode 100644 index 00000000000..d2bef7507c2 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-5.d @@ -0,0 +1,21 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: SFrame cfi_adjust_cfa_offset test +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 1 + Num FREs: 3 + + Function Index : + func idx \[0\]: pc = 0x0, size = 12 bytes + STARTPC + CFA + FP + RA + +#... + 0+0004 +sp\+16 +u +u + + 0+0008 +sp\+24 +u +u + + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-5.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-5.s new file mode 100644 index 00000000000..c985c39af9d --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-5.s @@ -0,0 +1,7 @@ + .cfi_startproc + .long 0 + .cfi_def_cfa_offset 16 + .long 0 + .cfi_adjust_cfa_offset 8 + .long 0 + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-6.d b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-6.d new file mode 100644 index 00000000000..f915ac5f234 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-6.d @@ -0,0 +1,21 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: SFrame cfi_offset test +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 1 + Num FREs: 3 + + Function Index : + func idx \[0\]: pc = 0x0, size = 12 bytes + STARTPC + CFA + FP + RA + +#... + 0+0004 +sp\+8 +u +u + + 0+0008 +sp\+8 +u +u + + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-6.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-6.s new file mode 100644 index 00000000000..389f324dc5f --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-6.s @@ -0,0 +1,7 @@ + .cfi_startproc + .long 0 + .cfi_def_cfa_offset 8 + .long 0 + .cfi_offset 0, 8 + .long 0 + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-7.d b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-7.d new file mode 100644 index 00000000000..cab19d5bc25 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-7.d @@ -0,0 +1,21 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: SFrame cfi_rel_offset test +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 1 + Num FREs: 3 + + Function Index : + func idx \[0\]: pc = 0x0, size = 12 bytes + STARTPC + CFA + FP + RA + +#... + 0+0004 +sp\+8 +u +u + + 0+0008 +sp\+8 +u +u + + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-7.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-7.s new file mode 100644 index 00000000000..21fa031fb30 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-7.s @@ -0,0 +1,7 @@ + .cfi_startproc + .long 0 + .cfi_def_cfa_offset 8 + .long 0 + .cfi_rel_offset 1, 8 + .long 0 + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-8.d b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-8.d new file mode 100644 index 00000000000..c0a4a8de250 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-8.d @@ -0,0 +1,20 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: SFrame cfi_val_offset test +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 1 + Num FREs: 2 + + Function Index : + func idx \[0\]: pc = 0x0, size = 8 bytes + STARTPC + CFA + FP + RA + +#... + 0+0004 +sp\+16 +u +u + + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-8.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-8.s new file mode 100644 index 00000000000..f2083e6a106 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-common-8.s @@ -0,0 +1,12 @@ +## cfi_val_offset when used with "not interesting" registers (from the +## perspective of SFrame section, non FP/RA registers are not +## interesting) does not affect the asynchronicity of the SFrame +## unwind information. Such CFI directives can be skipped for SFrame +## unwind info generation. + .cfi_startproc + .long 0 + .cfi_def_cfa_offset 16 + .cfi_val_offset 1, 8 + .cfi_val_offset 2, -32 + .long 0 + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-x86_64-1.d b/gas/testsuite/gas/cfi-sframe/cfi-sframe-x86_64-1.d new file mode 100644 index 00000000000..bba3b5920f1 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-x86_64-1.d @@ -0,0 +1,22 @@ +#as: -O0 +#objdump: --sframe=.sframe +#name: SFrame generation on x86_64 +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 1 + Num FREs: 4 + + Function Index : + + func idx \[0\]: pc = 0x0, size = 25 bytes + STARTPC +CFA +FP +RA + + 0+0000 +sp\+8 +u +u + + 0+0001 +sp\+16 +c\-16 +u + + 0+0004 +fp\+16 +c\-16 +u + + 0+0018 +sp\+8 +c\-16 +u + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-x86_64-1.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-x86_64-1.s new file mode 100644 index 00000000000..77f3578f0d8 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-x86_64-1.s @@ -0,0 +1,30 @@ + .cfi_sections .sframe + .cfi_startproc + pushq %rbp + .cfi_def_cfa_offset 16 + .cfi_offset 6, -16 + movq %rsp, %rbp + .cfi_def_cfa_register 6 + pushq %r15 + pushq %r14 + pushq %r13 + pushq %r12 + pushq %rbx + ## These CFI opcodes are not interesting + ## for SFrame generation and will be + ## skipped. + .cfi_offset 15, -24 + .cfi_offset 14, -32 + .cfi_offset 13, -40 + .cfi_offset 12, -48 + .cfi_offset 3, -56 + nop + popq %rbx + popq %r12 + popq %r13 + popq %r14 + popq %r15 + popq %rbp + .cfi_def_cfa 7, 8 + ret + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp b/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp new file mode 100644 index 00000000000..eb6da614c2f --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp @@ -0,0 +1,100 @@ +# Copyright (C) 2022 Free Software Foundation, Inc. + +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, write to the Free Software +# Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. + +if { ![is_elf_format] } then { + return +} + +proc gas_sframe_check { } { + global check_as_sframe_result + global AS + global ASFLAGS + if [info exists check_as_sframe_result] { + return $check_as_sframe_result + } + + set as_file "tmpdir/check_as_sframe.s" + set as_fh [open $as_file w 0666] + puts $as_fh "# Generated file. DO NOT EDIT" + puts $as_fh "\t.cfi_startproc" + puts $as_fh "\t.cfi_endproc" + close $as_fh + remote_download host $as_file + verbose -log "Checking SFrame support in AS:" + + set old_ASFLAGS "$ASFLAGS" + set ASFLAGS "$ASFLAGS --gsframe" + + global comp_output + + set output_file "tmpdir/check_as_sframe.out" + set status [gas_host_run "$AS $ASFLAGS $as_file" "2>$output_file"] + set comp_output [file_contents "$output_file"] + set ASFLAGS "$old_ASFLAGS" + + if { ![string match "" $comp_output] + || [string match "*sframe not supported for target*" $comp_output] } then { + verbose -log "SFrame not supported in AS" + return 0 + } else { + verbose -log "SFrame supported in AS" + return 1 + } +} + +proc gas_x86_64_check { } { + global NM + global NMFLAGS + + set status [gas_host_run "$NM $NMFLAGS --help" ""] + return [regexp "targets:.*x86-64" [lindex $status 1]]; +} + +# common tests +if { ([istarget "x86_64-*-*"] || [istarget "aarch64*-*-*"]) \ + && [gas_sframe_check] } then { + + global ASFLAGS + set old_ASFLAGS "$ASFLAGS" + + run_dump_test "cfi-sframe-common-1" + run_dump_test "cfi-sframe-common-2" + run_dump_test "cfi-sframe-common-3" + run_dump_test "cfi-sframe-common-4" + run_dump_test "cfi-sframe-common-5" + run_dump_test "cfi-sframe-common-6" + run_dump_test "cfi-sframe-common-7" + run_dump_test "cfi-sframe-common-8" + + run_dump_test "common-empty-1" + run_dump_test "common-empty-2" + run_dump_test "common-empty-3" + run_dump_test "common-empty-4" +} + +# x86-64 specific tests +if { [istarget "x86_64-*-*"] && [gas_sframe_check] } then { + if { [gas_x86_64_check] } then { + set ASFLAGS "$ASFLAGS --64" + run_dump_test "cfi-sframe-x86_64-1" + set ASFLAGS "$old_ASFLAGS" + } +} + +# aarch64 specific tests +if { [istarget "aarch64*-*-*"] && [gas_sframe_check] } then { + run_dump_test "cfi-sframe-aarch64-1" +} diff --git a/gas/testsuite/gas/cfi-sframe/common-empty-1.d b/gas/testsuite/gas/cfi-sframe/common-empty-1.d new file mode 100644 index 00000000000..0b09799826c --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/common-empty-1.d @@ -0,0 +1,14 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: Uninteresting cfi directives generate an empty SFrame section +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 0 + Num FREs: 0 + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/common-empty-1.s b/gas/testsuite/gas/cfi-sframe/common-empty-1.s new file mode 100644 index 00000000000..e26e998189f --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/common-empty-1.s @@ -0,0 +1,5 @@ + .cfi_sections .sframe + .cfi_startproc + .cfi_remember_state + .cfi_restore_state + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/common-empty-2.d b/gas/testsuite/gas/cfi-sframe/common-empty-2.d new file mode 100644 index 00000000000..e566c078249 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/common-empty-2.d @@ -0,0 +1,14 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: SFrame supports only FP/SP based CFA +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 0 + Num FREs: 0 + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/common-empty-2.s b/gas/testsuite/gas/cfi-sframe/common-empty-2.s new file mode 100644 index 00000000000..146c53de785 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/common-empty-2.s @@ -0,0 +1,8 @@ +## CFA register is not defined to be SP/FP. +## No SFrame unwind info for this function will be generated. + .cfi_startproc simple + .long 0 + .long 0 + .cfi_adjust_cfa_offset 16 + .long 0 + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/common-empty-3.d b/gas/testsuite/gas/cfi-sframe/common-empty-3.d new file mode 100644 index 00000000000..f7a6062d392 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/common-empty-3.d @@ -0,0 +1,14 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: SFrame supports only default return column +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 0 + Num FREs: 0 + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/common-empty-3.s b/gas/testsuite/gas/cfi-sframe/common-empty-3.s new file mode 100644 index 00000000000..982fe0c851d --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/common-empty-3.s @@ -0,0 +1,9 @@ +## The return column is not the default value. +## No SFrame unwind info for this function will be generated. + .cfi_startproc + .cfi_return_column 0 + .long 0 + .long 0 + .cfi_adjust_cfa_offset 16 + .long 0 + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/common-empty-4.d b/gas/testsuite/gas/cfi-sframe/common-empty-4.d new file mode 100644 index 00000000000..f7a6062d392 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/common-empty-4.d @@ -0,0 +1,14 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: SFrame supports only default return column +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 0 + Num FREs: 0 + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/common-empty-4.s b/gas/testsuite/gas/cfi-sframe/common-empty-4.s new file mode 100644 index 00000000000..f97ca2f7ff9 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/common-empty-4.s @@ -0,0 +1,17 @@ +## ARMv8.3 addded support a new security feature named Pointer Authentication. The +## main idea behind this is to use the unused bits in the pointer values. +## Each pointer is patched with a PAC before writing to memory, and is verified +## before using it. +## When the pointers are mangled, the unwinder needs to know so it can mask off +## the PAC from the pointer value to recover the return address, and +## conversely, skip doing so if the pointers are not mangled. +## +## .cfi_negate_ra_state CFI directive is used to convey this information. +## +## SFrame does not have any means to represent this information at this time. + .cfi_startproc + .long 0 + .cfi_def_cfa_offset 16 + .cfi_negate_ra_state + .long 0 + .cfi_endproc -- 2.37.2