From patchwork Mon Nov 25 16:28:46 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Matthieu Longo X-Patchwork-Id: 101839 Return-Path: X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id E274C3858416 for ; Mon, 25 Nov 2024 16:37:09 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org E274C3858416 Authentication-Results: sourceware.org; dkim=pass (1024-bit key, unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=GRZ30m6X; dkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=GRZ30m6X X-Original-To: binutils@sourceware.org Delivered-To: binutils@sourceware.org Received: from EUR02-VI1-obe.outbound.protection.outlook.com (mail-vi1eur02on20611.outbound.protection.outlook.com [IPv6:2a01:111:f403:2607::611]) by sourceware.org (Postfix) with ESMTPS id 689EC3858405 for ; Mon, 25 Nov 2024 16:29:59 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 689EC3858405 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 689EC3858405 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=2a01:111:f403:2607::611 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1732552199; cv=pass; b=Ozg0gO0En86NN5fw07qvzcH7OGj90PAgW89L7fmGGXhUPu0ZbYhG8v1x3jCuzmVG8akvYB5s0VylIcfdj81d1X82CNzanGaDeGQy52Pcu3JwO3TjqB0pwVxShEKZWZtsF3t/eb7oOb78x8Vdk/ynFWrEvfMrJjNBMBoGq51acE4= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1732552199; c=relaxed/simple; bh=ZDndl0bB7p2Z1N06L5TCdEi3pjctmKQyMTAyYqXbj4A=; h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID: MIME-Version; b=RYEVq97Ws+KQ6ACacXJSxvpS8PgEFk2TS/lCj7IYM6kF0SI+EI1iQrzrSc0P1F7nXtv72YPm8dSMIjgmpj03HbFBn+UrfoWZXoRJWoTcIrAwcIkpwpPQo+z4cesiU0rF6hap/4SNVu8SyWgPu46DVL/jK6z9m3rgxtHUDPvwrds= ARC-Authentication-Results: i=3; server2.sourceware.org DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 689EC3858405 ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=Qzuj3b178+C9yXYMUxGYqTCL/Ybefl3JVDIFbgfIEsB9ZGft+C77hKlEyGed13nzq9RFUiKZuwm9Nyjj9E9u47prpkbSK6X7Mez2LPpq1DFAKIV9LMhajQOR0P+mP5ogjGaKqz1KrW7kojdYfrZosdHGWV4TFc3EBuhZwv1N/gkYA66rZietZ/8zLMxb3dquW0vfdrlJgChDRApV98Oi69i9j3WHK0x2vYJ7KxHs+DXACIJm0f3/XCh2WR4Qd15DFD5itxOuw3lu+gdH5rg35uV55+UX4tDvhQ8faABoIK2uozBxUQkwnwEwCSgImEgu6YM7CUUt45wKa2LINXJk3w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YpuygwnmbNRnCk+SOajnDtw1HEAClaJgqOBBAs/1sx0=; b=lQWSmxNhQwxXxRXV4Ba7105CnTco6GkPpw9P8vQxbHjdi0mUtO+x0Z6gqcciCJTNYXQaBytiEbW3n8nVTKMvSzo1lyn+Gdo94k+exyCURD8yU329enYD8WZ3cuEfrBG7Xr76IoNQ43gTOK3+jmRKcqh/mr7YPkT5FGLJDiA+z89/HiZJrB3mMKxmEhdM5X6TaW9Z2dWp7H3yOkHl3ITP3fkMuVqfSwCpBcYrUOd9V5Ajq+tPNRs6HtqgYir2/6bUixViZbctRFnS3uOulr1gMv6KeE7a4bDWIqX2TIgCKB3ZsV9iRdSZzCvmUMRyQ4D9RULc54I0AT7OUCpsqAOH/g== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=sourceware.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YpuygwnmbNRnCk+SOajnDtw1HEAClaJgqOBBAs/1sx0=; b=GRZ30m6Xei4dB/hSGP3Z0v35/8V2HFwg6jZHYa1kxJzlTjP4rJi9OSgFqzssfGmZ4GhMaM+TMuzIXk6hwLMz9/FQgyHuRS1Qt0mUcXhBg/GULCG4medApIVwgiBA+Lvp8nIH852WLpwUQb7Fm73cixyV1H2dpnffzhbKXO430x8= Received: from AM0PR05CA0090.eurprd05.prod.outlook.com (2603:10a6:208:136::30) by AS4PR08MB7782.eurprd08.prod.outlook.com (2603:10a6:20b:516::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8182.18; Mon, 25 Nov 2024 16:29:51 +0000 Received: from AMS0EPF000001B5.eurprd05.prod.outlook.com (2603:10a6:208:136:cafe::e7) by AM0PR05CA0090.outlook.office365.com (2603:10a6:208:136::30) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8182.18 via Frontend Transport; Mon, 25 Nov 2024 16:29:51 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=arm.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AMS0EPF000001B5.mail.protection.outlook.com (10.167.16.169) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8207.12 via Frontend Transport; Mon, 25 Nov 2024 16:29:51 +0000 Received: ("Tessian outbound bf1c175f6cbb:v490"); Mon, 25 Nov 2024 16:29:51 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 013b3ca622fd881e X-TessianGatewayMetadata: AyND1UBH2cW6XDyM3kNb41nfE8bKxphQdMGD8pV4Qiy6IkE6602CspTc+DwgM6bA/+Wh2OLIjcRRybHSJ2Q2bozud6RD90ngJghAEPu3eEfCoDKiTMAALeDcS199JF75Q+6tWpxtHCinreX3ri3LwEFbXgyb+T3TcMrHhHYyRKg= X-CR-MTA-TID: 64aa7808 Received: from Lef1c5d93b520.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 51C3BEE8-A82A-4C69-935E-67CC8F784B3D.1; Mon, 25 Nov 2024 16:29:44 +0000 Received: from EUR03-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id Lef1c5d93b520.1 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384); Mon, 25 Nov 2024 16:29:44 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=pxE5Ik5c3d33AZ7tPlPs1oYCVeIYud04AaEahRRZAuKJLasC2anNaGZaGC7ckkmfdllGYxJZO7Jk5zofzaMqCKty/D77zG5989WmHCl/fQxWAfo3vR/IJ3FijMQQY8MJ4yNfUCKUfxSF7ddAYyxOvO/KMT1h24bR7OK+47QNvbKQY8a/vcpHkij+9/uZH7F066LExIeX3vshj4Anr/UmIHfOozBelmULakStqdspspdVlsB8lKY6LZwzaaRNmHmirbGz4GYiYtLdqUDeQ51FTxpMTJDpNOohay1T05QoAGLNCrdi/Dnc8JOpoP6g6S2qBN5gNln7JtK5cID3EL3eJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YpuygwnmbNRnCk+SOajnDtw1HEAClaJgqOBBAs/1sx0=; b=IjdofEFDE9f6hvEXmeuxEsyVj5sHOf0YwSbK5dkfafKEoY95qIDM9HBk/hGP3nWq4G06GiY0NVhDtbznc9lwp5eulj4XapZo+pAA+3OjlvrOVQassfUzsbeYF/gycoO3O41F2FvtTs7zekTGqd2wgIt9xbpjRrH0qGvk/W5DHXLRNRX7M7VuSzcUSP1yxxh6HLlwR7i745QheExRo5T294nniV56Fz4DfTbBtA2+/mlgBUd82JEiNYpnSm6+Tb7D3FQdmpON+MS2cgdQLrcrUN3tWid3pjPhNFJh4sZO6EryLEjgciEcNsfA+AnRQM6odJ6+6S2gwtGK7jcxZZ/iSg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=sourceware.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YpuygwnmbNRnCk+SOajnDtw1HEAClaJgqOBBAs/1sx0=; b=GRZ30m6Xei4dB/hSGP3Z0v35/8V2HFwg6jZHYa1kxJzlTjP4rJi9OSgFqzssfGmZ4GhMaM+TMuzIXk6hwLMz9/FQgyHuRS1Qt0mUcXhBg/GULCG4medApIVwgiBA+Lvp8nIH852WLpwUQb7Fm73cixyV1H2dpnffzhbKXO430x8= Received: from DB3PR08CA0028.eurprd08.prod.outlook.com (2603:10a6:8::41) by AM0PR08MB5363.eurprd08.prod.outlook.com (2603:10a6:208:188::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8182.20; Mon, 25 Nov 2024 16:29:38 +0000 Received: from DU6PEPF0000A7E4.eurprd02.prod.outlook.com (2603:10a6:8:0:cafe::40) by DB3PR08CA0028.outlook.office365.com (2603:10a6:8::41) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8182.20 via Frontend Transport; Mon, 25 Nov 2024 16:29:38 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by DU6PEPF0000A7E4.mail.protection.outlook.com (10.167.8.43) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8207.12 via Frontend Transport; Mon, 25 Nov 2024 16:29:38 +0000 Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Mon, 25 Nov 2024 16:29:34 +0000 Received: from PW070M4K.arm.com (10.1.38.166) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Mon, 25 Nov 2024 16:29:34 +0000 From: Matthieu Longo To: , Indu Bhagat CC: Richard Earnshaw , Nick Clifton , Matthieu Longo Subject: [PATCH v1 4/4] aarch64 SFrame: skip with warning new CFI directive used with pauth_lr Date: Mon, 25 Nov 2024 16:28:46 +0000 Message-ID: <20241125162846.94691-5-matthieu.longo@arm.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: <20241125162846.94691-1-matthieu.longo@arm.com> References: <20241125162846.94691-1-matthieu.longo@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: DU6PEPF0000A7E4:EE_|AM0PR08MB5363:EE_|AMS0EPF000001B5:EE_|AS4PR08MB7782:EE_ X-MS-Office365-Filtering-Correlation-Id: 202ccc8e-41ac-42a0-64ea-08dd0d6e62f6 X-LD-Processed: f34e5979-57d9-4aaa-ad4d-b122a662184d,ExtAddr x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; ARA:13230040|376014|82310400026|1800799024|36860700013; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230040)(376014)(82310400026)(1800799024)(36860700013); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5363 X-MS-Exchange-SkipListedInternetSender: ip=[2603:10a6:8::41]; domain=DB3PR08CA0028.eurprd08.prod.outlook.com X-MS-Exchange-Transport-CrossTenantHeadersStripped: AMS0EPF000001B5.eurprd05.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 15fe08c6-5d27-4abe-30ec-08dd0d6e5b0b X-Microsoft-Antispam: BCL:0; ARA:13230040|14060799003|1800799024|36860700013|376014|35042699022|82310400026; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:64aa7808-outbound-1.mta.getcheckrecipient.com; CAT:NONE; SFS:(13230040)(14060799003)(1800799024)(36860700013)(376014)(35042699022)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Nov 2024 16:29:51.3888 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 202ccc8e-41ac-42a0-64ea-08dd0d6e62f6 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AMS0EPF000001B5.eurprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS4PR08MB7782 X-Spam-Status: No, score=-11.3 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FORGED_SPF_HELO, GIT_PATCH_0, SPF_HELO_PASS, SPF_NONE, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: binutils@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Binutils mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: binutils-bounces~patchwork=sourceware.org@sourceware.org Today, SFrame v2 specification does not describe how to encode the information corresponding to the PAC signing method. SFrame v3 specification should hopefully specify it. In the meantime, if the GNU assembler finds .cfi_negate_ra_state_with_pc and --gsframe is specified, it will output a warning to the user and will fail to generate the FDE entry. A new SFrame test for .cfi_negate_ra_state_with_pc is also added to reflect this issue. --- gas/gen-sframe.c | 16 ++++++++++++ .../gas/cfi-sframe/cfi-sframe-aarch64-4.d | 25 +++++++++++++++++++ .../gas/cfi-sframe/cfi-sframe-aarch64-4.s | 23 +++++++++++++++++ gas/testsuite/gas/cfi-sframe/cfi-sframe.exp | 1 + 4 files changed, 65 insertions(+) create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.d create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.s diff --git a/gas/gen-sframe.c b/gas/gen-sframe.c index be48b339609..041c4c7b83e 100644 --- a/gas/gen-sframe.c +++ b/gas/gen-sframe.c @@ -1282,6 +1282,19 @@ sframe_xlate_do_aarch64_negate_ra_state (struct sframe_xlate_ctx *xlate_ctx, return SFRAME_XLATE_OK; } +/* Translate DW_CFA_AARCH64_negate_ra_state_with_pc into SFrame context. + Return SFRAME_XLATE_OK if success. */ + +static int +sframe_xlate_do_aarch64_negate_ra_state_with_pc (struct sframe_xlate_ctx *xlate_ctx ATTRIBUTE_UNUSED, + struct cfi_insn_data *cfi_insn ATTRIBUTE_UNUSED) +{ + as_warn (_("skipping SFrame FDE; .cfi_negate_ra_state_with_pc")); + /* The used signing method should be encoded inside the FDE in SFrame v3. + For now, PAuth_LR extension is not supported with SFrame. */ + return SFRAME_XLATE_ERR_NOTREPRESENTED; /* Not represented. */ +} + /* Translate DW_CFA_GNU_window_save into SFrame context. DW_CFA_GNU_window_save is a DWARF Sparc extension, but is multiplexed with a directive of DWARF AArch64 extension: DW_CFA_AARCH64_negate_ra_state. @@ -1397,6 +1410,9 @@ sframe_do_cfi_insn (struct sframe_xlate_ctx *xlate_ctx, case DW_CFA_GNU_window_save: err = sframe_xlate_do_gnu_window_save (xlate_ctx, cfi_insn); break; + case DW_CFA_AARCH64_negate_ra_state_with_pc: + err = sframe_xlate_do_aarch64_negate_ra_state_with_pc (xlate_ctx, cfi_insn); + break; case DW_CFA_register: err = sframe_xlate_do_register (xlate_ctx, cfi_insn); break; diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.d b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.d new file mode 100644 index 00000000000..c81888b0021 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.d @@ -0,0 +1,25 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: SFrame cfi_negate_ra_state_with_pc test +#warning: Warning: skipping SFrame FDE; \.cfi_negate_ra_state_with_pc + +## The support for .cfi_negate_ra_state_with_pc is currently pending on SFrame +## v3 (currently in development). The unimplemented support is reported to the +## user as a warning. Then the handler returns an error that will cause no +## creation of a SFrame FDE later (hence "Num FDEs: 0"). +## Note: this test will be expected to fail when the support of PAuth_LR in +## SFrame will be added, so will have to be fixed. + +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_2 + Flags: NONE + Num FDEs: 0 + Num FREs: 0 + + Function Index : + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.s new file mode 100644 index 00000000000..5fec6740047 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.s @@ -0,0 +1,23 @@ +## ARMv9.5 enhanced the existing PAuth feature with a new extensio called +## PAuth_LR. It aims at hardening the PAC in a signed return address. When +## signing the return address in LR, the PC is used as a diversifier, in +## addition to the SP to generate the PAC code. +## As for PAuth, when the pointers are mangled with PAuth_LR, the stack trace +## generator needs to know so it can mask off the PAC from the pointer value to +## recover the return address, and conversely, skip doing so if the pointers are +## not mangled. +## +## .cfi_negate_ra_state_with_pc CFI directive is used to convey this information. +## +## SFrame has currently no support for this. The support is expected in SFrame +## v3. This testcase ensures that the directive is understood, and outputs +## a warning to the user before failing to generate the FDE. + .cfi_startproc + .long 0 + .cfi_def_cfa_offset 16 + .cfi_negate_ra_state_with_pc + .long 0 + .cfi_offset 29, -16 + .cfi_offset 30, -8 + .long 0 + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp b/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp index c646b109895..162c2b4573d 100644 --- a/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp @@ -98,5 +98,6 @@ if { [istarget "aarch64*-*-*"] && [gas_sframe_check] } then { run_dump_test "cfi-sframe-aarch64-1" run_dump_test "cfi-sframe-aarch64-2" run_dump_test "cfi-sframe-aarch64-3" + run_dump_test "cfi-sframe-aarch64-4" run_dump_test "cfi-sframe-aarch64-pac-ab-key-1" }