From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by sourceware.org (Postfix) with ESMTPS id 0C5CE38A90BC for ; Sat, 17 Dec 2022 06:42:06 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 0C5CE38A90BC Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=oracle.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=oracle.com Received: from pps.filterd (m0246629.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 2BH4Wusb026851 for ; Sat, 17 Dec 2022 06:42:06 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : content-transfer-encoding : content-type : mime-version; s=corp-2022-7-12; bh=+0gGIj2hn5yqOaSm++Nlcc+tUzSz1mO9EWOPCCtPiBY=; b=1jBwquhRBDao/0DblCDbYm++1SiDk9uYuieoPUUTNdZ5S9Zxr5IP0Hz/yJzeSkxNU+XU NQojt/k03A/9ZU1+ZX+mCStlZIXSl8u2TnXSgD3qVG9G8/rF9ozOxS8mWtbSOL9SZZd5 2Dj4emX4SNuvmNaA+fIxzh+w2YgSbs94qkNkAr37zzFFO5bqKXVMizkKNwW/kR/BTQsU VmC9VDvr6bLSfFMt8lL3pAUD4OGYEv+C121OGebAI+A02kb7vp5zxxx4O3jZHRSnNDGB QXc3MyT9ZvmkUWhZRZzfdOQ7x0WqQ7wMmn6kY2Lou0u24PlriFLMelwpRP62baD9UxSE 0w== Received: from phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta01.appoci.oracle.com [138.1.114.2]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3mh6tp02au-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Sat, 17 Dec 2022 06:42:05 +0000 Received: from pps.filterd (phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (8.17.1.5/8.17.1.5) with ESMTP id 2BH58RBo006774 for ; Sat, 17 Dec 2022 06:42:05 GMT Received: from nam12-bn8-obe.outbound.protection.outlook.com (mail-bn8nam12lp2176.outbound.protection.outlook.com [104.47.55.176]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 3mh471nspx-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Sat, 17 Dec 2022 06:42:05 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=IroxWf3WUYioNjAo3Yu/jWXQD3hIItjgmfbhMN19Mhkkx69eC1hZ0F6/K9o0X3Ylw8HR48q/xAer9dn6bJJa+ceBjRuD+QNzMU0bCH25nV/cU3M7Osbt1igCQmCs5EAv1PH4Z/0mOQ3x828Qad/clIMD5iJ+YAz/xdg0SCP6lJsi7zCvdosyT5nYloQZapkPGVmotu8p7ufU65scqiDk0FnW+r5n/UjlI2NbAAReuyT6a/o6TGCykOpNkFLa1Ly6Elxb1OBc1U7LtZYskcaDFT1z5M47aRcoOtvixq6w7+K3D5/5/MVsgM01TYMwYlzHYH0mdmorKApTUP7OgagCnQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=+0gGIj2hn5yqOaSm++Nlcc+tUzSz1mO9EWOPCCtPiBY=; b=XI+HnSR3cBEaiSRwGJ3jD/xxjSlSLHjMrJzQ/cT1oyOIGqh3ZY1JL99IX3TaQDBPJ16HDc+dk09a+dQLqWLEAfipfOs55sT5v3FtMejKVG37KcyZ65qFV024HdjPDx2yhX5H8PvSOHHQd/At2KKmktJ2fqWorCOMOmbCDiyicKSDOCwFcGMs1k0gDGR7O7eftAaNeWKexsXqmhMFErDjYBcS1BQSIYRT8Rzxu+sudznYjgukbRY/q/O9rNoR+nHDKEwjHqqpdvYm/YScItNq/7CUCwWSMFL82rhs1JnUSWgNkC7iKCGtMrNxHlDjMyYhU4hLM8dkXiKCg/u6kSC2UQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+0gGIj2hn5yqOaSm++Nlcc+tUzSz1mO9EWOPCCtPiBY=; b=zw6wZMcZk7YCVau5jW4FVZD8bGbi6VbeiREv8W7xYQk8NyO6OVoCT48zu05rlu9C7oCm6kNZGXLF5STRAx1tkduC3SP1dv0l1Qofkpew7g9X+B0Xub/fTbF66/byXMLucnwSUdj0QIIII/uEAPcwfIOWRxjVvrA80n2iYg7ftNA= Received: from MWHPR1001MB2158.namprd10.prod.outlook.com (2603:10b6:301:2d::17) by BN0PR10MB5285.namprd10.prod.outlook.com (2603:10b6:408:12e::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5880.18; Sat, 17 Dec 2022 06:42:03 +0000 Received: from MWHPR1001MB2158.namprd10.prod.outlook.com ([fe80::ee70:1952:4416:1bdc]) by MWHPR1001MB2158.namprd10.prod.outlook.com ([fe80::ee70:1952:4416:1bdc%5]) with mapi id 15.20.5924.012; Sat, 17 Dec 2022 06:42:03 +0000 From: Indu Bhagat To: binutils@sourceware.org Cc: Indu Bhagat Subject: [COMMITTED, V2 5/6] gas: sframe: testsuite: add testcase for .cfi_negate_ra_state Date: Fri, 16 Dec 2022 22:41:27 -0800 Message-Id: <20221217064128.11326-6-indu.bhagat@oracle.com> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20221217064128.11326-1-indu.bhagat@oracle.com> References: <20221217064128.11326-1-indu.bhagat@oracle.com> Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: MW3PR05CA0030.namprd05.prod.outlook.com (2603:10b6:303:2b::35) To MWHPR1001MB2158.namprd10.prod.outlook.com (2603:10b6:301:2d::17) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MWHPR1001MB2158:EE_|BN0PR10MB5285:EE_ X-MS-Office365-Filtering-Correlation-Id: e2646295-9a81-424c-2d13-08dadff9ce62 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MWHPR1001MB2158.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230022)(376002)(136003)(396003)(366004)(346002)(39860400002)(451199015)(83380400001)(2906002)(38100700002)(8936002)(1076003)(186003)(66556008)(2616005)(41300700001)(66946007)(6916009)(36756003)(316002)(66476007)(6512007)(86362001)(8676002)(6486002)(4326008)(5660300002)(6506007)(44832011)(6666004)(107886003)(478600001)(142923001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?WkKDQ1NncxmVoCHCHT/ntjGuPsTdUZ5wfkNpb3OmQ/Mo3CvpbQzLKMfmWP0i?= =?us-ascii?Q?E3HdoGTxRT8mzEkD3WK1nsmyZyGr/Y33baQVml+HybkUxYVLQpvD2bkEJqsM?= =?us-ascii?Q?JGMvxXY0CL26FVY7G018L/kbjqm2yHc8tfXAq9d2f9DL4iPdvYVzucSqes+k?= =?us-ascii?Q?uGt7WpEBSzKM/JQB490kgWzQq7g6OlJS/CQozBhtKLeW+3OTt4S692rvSIv+?= =?us-ascii?Q?j8c3Anu+Hb4QvHipU9Ynku6O4IueT6K3f5DT/1htkM4INqrtSmGkkiekPFLk?= =?us-ascii?Q?0Zwu1V/F3+B+KwS3MRShHJaBrpn1X3vWTsEakB3uWpriNGWT8sLoXyvWx4iU?= =?us-ascii?Q?kmUKsL3wHxqbU1r8iUYEL8qEm2iY1/su0S1S0xlfQY3td3mUdX5YCPFEyoVz?= =?us-ascii?Q?l5L3nh2iA7SqoDmWoycOHIBSUheK/CNLtw0YCEvQDp4Sx5ThIK6A/NSJRxmw?= =?us-ascii?Q?7trB3HRSP8U1boZXuiioKXl3osCio1c5neIGDlRlzSWZD4E5/PCkPnoo06OZ?= =?us-ascii?Q?ZXhInxXMOZx2+DqUiXlx6FFHHA7ahny+GYzFs0dXIwhu3Mx/9R2gAW/g1N13?= =?us-ascii?Q?l/w4Uydq4DpMPwBEF3iRYYpZ9VuzMr7oNO2k5bFtFYLA8NwMx0lovL1VtT+S?= =?us-ascii?Q?SXr2Lxt9hQlipt3mfgnt3e3kfseuw4cfnTcV213CZMW6SobqMJCFl6buUnbC?= =?us-ascii?Q?KYMciZUa6C+DmsCr1qm3hDduTIGhO92P4NKCeLsm9j2zaDYM0CzCny7alXy7?= =?us-ascii?Q?7AvYwtBYALyPQoP43S8pwu8EN6RSnR/kHW23Lzkh2Klf1SzQVxVvA65m+PwP?= =?us-ascii?Q?VSR6y9rvqW5jz+RkXwvKUFp63pBLIW27NrI7MykbdjTTtHHl+w0oFNK6Pz7n?= =?us-ascii?Q?zhzsfx6sBZ3kawELqedc1aTi6FIugnfpj5Mm5s85EA21eMtY51LEWecin15e?= =?us-ascii?Q?o4Px1R7z+n+JYuBVZtvY+S1hifPtfu/suTFx9dMDmpwE36GFIZEO6+89UGfl?= =?us-ascii?Q?J7k0oJNnACt8Qhox4ekUFK11WgHCfbjuI5o+h06D++esUl8nMxOi6oJSRQKW?= =?us-ascii?Q?0jNQ9jRL5EDmSIcA/HJ3EN3k13T/jEmB9d+XaRtodX2YEo8BfKUiswOEr1kv?= =?us-ascii?Q?jozC/poDXqmc0yW+QTI0RDcBQxFR6YcnfgqwmlZ5ThzPYhAswlZc2rLzfC6b?= =?us-ascii?Q?1CCuDuqIU9cpXiZIuyMoDRGyJaw/07oIimiI91iPsemMXPYSCMlzTGzniXZd?= =?us-ascii?Q?ad8hc/sGCf3XWiLlsvOGM1jjMmH9B23YebNAYcPzLq/QXi+KyHbvNgPNQ57y?= =?us-ascii?Q?33Wv7Vglamu7akJjOXn4zmJcZACqTM6/tU76Tn3b47KmCGiUgo04aV7qJTSX?= =?us-ascii?Q?yG//d7T7dLJvMT86I9LtZgljUWduO44Tu/rhsmoiPAKlCU8qRA7+b5lvOrJb?= =?us-ascii?Q?7y8d2614GgNy6uVm/hFVaB7Cv0souMwxgPoAobfLlxKdDG6zxcayeJAO7C4C?= =?us-ascii?Q?12J7keZLfre4kSakXC9y961OTQWyB/LHPZOag2toJ72mirdcXFbQYZAnOzNm?= =?us-ascii?Q?QEk0nq/OCtHGC4CWn6qHtPTcFwHTE04KWpZbIveepQxj16FQkPNFcldm9Zi8?= =?us-ascii?Q?cSO7cKwbkoXkTjuuqdqT/0Y=3D?= X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: e2646295-9a81-424c-2d13-08dadff9ce62 X-MS-Exchange-CrossTenant-AuthSource: MWHPR1001MB2158.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Dec 2022 06:42:03.1237 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: BPrQZWinvqOd9g2DWx7vrXMItuz0vmhcETdpLKWFHzGaW0IApCrYM+cEVdVbi+eshPkFtvvZJqr882SwxcdwNg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN0PR10MB5285 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.923,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-12-17_01,2022-12-15_02,2022-06-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 bulkscore=0 mlxscore=0 adultscore=0 phishscore=0 suspectscore=0 spamscore=0 mlxlogscore=999 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2212070000 definitions=main-2212170057 X-Proofpoint-GUID: eU_MtHL0fEGQP43b2tN9zvsqbyXelfD_ X-Proofpoint-ORIG-GUID: eU_MtHL0fEGQP43b2tN9zvsqbyXelfD_ X-Spam-Status: No, score=-13.2 required=5.0 tests=BAYES_00,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,GIT_PATCH_0,RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE,TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: [Changes in V2] - Split out a subset of this commit deleting testcase to a previous commit. [End of changes in V2] Add a new test to check that .cfi_negate_ra_state on aarch64 is handled well (a non-empty SFrame section with valid SFrame FREs is generated). ChangeLog: * testsuite/gas/cfi-sframe/cfi-sframe-aarch64-2.d: New test. * testsuite/gas/cfi-sframe/cfi-sframe-aarch64-2.s: Likewise. * testsuite/gas/cfi-sframe/cfi-sframe.exp: Adjust the list accordingly. --- .../gas/cfi-sframe/cfi-sframe-aarch64-2.d | 20 +++++++++++++++++++ .../gas/cfi-sframe/cfi-sframe-aarch64-2.s | 18 +++++++++++++++++ gas/testsuite/gas/cfi-sframe/cfi-sframe.exp | 1 + 3 files changed, 39 insertions(+) create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-2.d create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-2.s diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-2.d b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-2.d new file mode 100644 index 00000000000..985f51fcda9 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-2.d @@ -0,0 +1,20 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: SFrame cfi_negate_ra_state test +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_1 + Flags: NONE + Num FDEs: 1 + Num FREs: 2 + + Function Index : + func idx \[0\]: pc = 0x0, size = 8 bytes + STARTPC + CFA + FP + RA + +#... + 0+0004 +sp\+16 +u +u\[s\] + + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-2.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-2.s new file mode 100644 index 00000000000..8106c937b39 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-2.s @@ -0,0 +1,18 @@ +## ARMv8.3 addded support a new security feature named Pointer Authentication. The +## main idea behind this is to use the unused bits in the pointer values. +## Each pointer is patched with a PAC before writing to memory, and is verified +## before using it. +## When the pointers are mangled, the unwinder needs to know so it can mask off +## the PAC from the pointer value to recover the return address, and +## conversely, skip doing so if the pointers are not mangled. +## +## .cfi_negate_ra_state CFI directive is used to convey this information. +## +## SFrame has support for this. This testcase ensures that the directive +## is interpreted successfully. + .cfi_startproc + .long 0 + .cfi_def_cfa_offset 16 + .cfi_negate_ra_state + .long 0 + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp b/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp index 8129e86ccce..f001fad0e8e 100644 --- a/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp @@ -96,4 +96,5 @@ if { [istarget "x86_64-*-*"] && [gas_sframe_check] } then { # aarch64 specific tests if { [istarget "aarch64*-*-*"] && [gas_sframe_check] } then { run_dump_test "cfi-sframe-aarch64-1" + run_dump_test "cfi-sframe-aarch64-2" } -- 2.37.2