From patchwork Mon Nov 25 16:28:43 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Matthieu Longo X-Patchwork-Id: 101836 Return-Path: X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id C5E7F3858416 for ; Mon, 25 Nov 2024 16:31:13 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org C5E7F3858416 Authentication-Results: sourceware.org; dkim=pass (1024-bit key, unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=goj2eJL9; dkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=goj2eJL9 X-Original-To: binutils@sourceware.org Delivered-To: binutils@sourceware.org Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on20615.outbound.protection.outlook.com [IPv6:2a01:111:f403:2612::615]) by sourceware.org (Postfix) with ESMTPS id DA63C385840B for ; Mon, 25 Nov 2024 16:29:21 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org DA63C385840B Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org DA63C385840B Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=2a01:111:f403:2612::615 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1732552162; cv=pass; b=GlajGKeB/QKKBMkECxnLFkyVB8YsZlxrF7A5TmPCCgyhxYdQsLlPeaXo5XebIuJkK6NCGak+EQc4OEIuH0mbE1KsGyVM+fub48/eGZZ/npVMg44kXtpQgcKC7sqFjQOn0PB0nK66CsdIkrSqHWaZDA0KKgDWnIrNyVAfMexQfts= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1732552162; c=relaxed/simple; bh=pZ/73LUGTm9tHLepkNASrr86bXtVjREGI6ki7h9CYY0=; h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID: MIME-Version; b=WtwgOs9aQyf9GRoAHKtA91acISZVF/om5ElCYwfAUB/W/BVxY7aWfQF36LiHD/dsM0NR74b2XG3p4m7G3oPvvZsDtjzWglZUe2gidzTNY6wlkJ6gcA5JaKfK5Bue+PI4bABkcELlq/IupRNe7Hl2nxQLb4npQCmC6VaQLo2oewM= ARC-Authentication-Results: i=3; server2.sourceware.org DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org DA63C385840B ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=CmJLddpCZyzIBgdwUv9gnu01e+1lA7SF2sMSL79gwRUYfjJZtwPnUwm6B6waacDjH7T7M6iHS1qcFUtf7AhvzKC4A9jih5cpEm4cNUP1jn/M8wtZe7D8jfgm3K+8i/o1Nfge9RRdwgejBgBIoun6XDpgNq/3y3qt+h414JFKFmC01JksUJNxPYvHSuRPUrHkvNc2Od0xuUi/eV8/uENy9pgVPoUkSqmL7gADivzoSlfj91oiKBAoVfif08CVPRYvkfk0idy1hZBZkkF07GPZqbxpBWwYKhfNI3KPEwkYB6m/qZb6ZulGicxo42JFADGpD14C5QEWr51oC9QfE/+EQg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=bCEfyw6D7Pasmnaj8hTy0MnEWWCd/+DB25q2s8TvRi0=; b=YjuxBCqtrPohtTBQtg5+uPsJCH/iqrJCZESRnW74VaRHHkrQ+ebyd8cfZh8Cs0fTBFIb9qiW8+u8tjr2ivGk2JgG3dpU5wCPTlv43gjRsTK1tp3eeWtAkyAUaNiy5zvE3IIc9xEl17494yNuwFQ0CmplfHMi8mio7ju6JPdzg4q4/l7LUx0652qffH5BM5mnNZiy8x3iqDWR4UuAOKOFDs8dLIf9/oouRLwZbyIbu+8srZWWobi+pxHRXpmIn8qWqYA77ZNxifp4D6TDO5uXSwc3ddcJLz0UMSKXsFNZ7/v8MIT8eVr3BbRUoMQu27beWEOTo1ih0Kuj+5K2v+eYIA== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=sourceware.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bCEfyw6D7Pasmnaj8hTy0MnEWWCd/+DB25q2s8TvRi0=; b=goj2eJL9VEWeQchI6r31+kg8alNA/ZlG/Omxm01Z1PQQ2baAGy2GzRADuJoZEz2S85J29uDf6kqx7N139H7EQ2z4os+/XtCOfvshZDcuWi7KRjkzvTGbMzbi6IRfznXg25LPIXKLx6jrZGFgqEV61eH2MEv6PoQYK0YC/CFqbQs= Received: from AS9PR04CA0161.eurprd04.prod.outlook.com (2603:10a6:20b:530::7) by PAWPR08MB8816.eurprd08.prod.outlook.com (2603:10a6:102:338::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8182.18; Mon, 25 Nov 2024 16:29:17 +0000 Received: from AMS0EPF000001A2.eurprd05.prod.outlook.com (2603:10a6:20b:530:cafe::94) by AS9PR04CA0161.outlook.office365.com (2603:10a6:20b:530::7) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8182.19 via Frontend Transport; Mon, 25 Nov 2024 16:29:17 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=arm.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AMS0EPF000001A2.mail.protection.outlook.com (10.167.16.235) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8207.12 via Frontend Transport; Mon, 25 Nov 2024 16:29:16 +0000 Received: ("Tessian outbound 99d3b165dfe9:v490"); Mon, 25 Nov 2024 16:29:16 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 5a14fb3db87d1468 X-TessianGatewayMetadata: DMh+t6gBpODZTmY2eQuD4OSvE/YPhnl2+0DxtKEguIIT7uyp0SXgLXXgnCnFQRI4BJabum3RnyUktUXNsmxlf4YYE7wu+Bvw2moC5o3Kpk9QhOw7zzYBHYXCcY7lulD2sMEb3q26NbENvK2dqZYEmKGiHzQf5rez65B2vLO/ru4= X-CR-MTA-TID: 64aa7808 Received: from L1d6c1efa8252.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id DF7449DB-3ECE-4997-83F2-587967E0E355.1; Mon, 25 Nov 2024 16:29:09 +0000 Received: from EUR03-AM7-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id L1d6c1efa8252.1 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384); Mon, 25 Nov 2024 16:29:09 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=kDShXc/7wUPm9Chyr7xB4GCrfl+wVPpE2hLTC5hDunltk9I3phyALA3MG4O8TBmHtpyNpKXkEpNBJahrkv4syPe8aw7iKTJ2uA9/zkGORYK55UcYWcZtxtMwf41jMB/+Dm7OGTp5bw4S7jvMlFL8a8cPns0vHKx3vHTPvlb9A+YQTifIzkhAjjDCRw9HIzuoAfAaKkOQ0LE2YX6y9Jn3ogNlv9jzSAGwpXAl/3lYhAh9sA3lAWr32gNh0bGOsABmwMjWnnN/XN8UFdFVaUCj8cUTnS8nwcdLEzuXjkwg9fY15D5lH/Tw3yscvOZ8y/oYmruaWdH3+7yOyXYTkwl8Kg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=bCEfyw6D7Pasmnaj8hTy0MnEWWCd/+DB25q2s8TvRi0=; b=A9Dk9glzm4rDJvqoq+dgxkzWF+Axn9gkcY8m3myk33jhu6o0DC0UZlWkIyL2k+NzznHboLVOmqpPBitFjTkbHq2dLfPmswp1rVZ4yTgBY+q6mUG/QAAfCAB283RSXg8pLM7h9Ia1+ngiXWVfC6I9JhwY3GZ+pClFgZ/SyH+JfBoE9CcEBRYZwbxu8qREk4BHVUsyIyQ3yvLEDqVyQK21Pzp4I0yZFLtgkY0yRlZVdfCz2tHAA2g36uhUZ04WGGGEe8aLHnZuniC9K0GtHnr4xhai7l2kIvuhT2CSXXEbDAq9n6N5/nJ5490kHg90L8auWbBS+0oJeqKrTGTXPeOsPw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=sourceware.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bCEfyw6D7Pasmnaj8hTy0MnEWWCd/+DB25q2s8TvRi0=; b=goj2eJL9VEWeQchI6r31+kg8alNA/ZlG/Omxm01Z1PQQ2baAGy2GzRADuJoZEz2S85J29uDf6kqx7N139H7EQ2z4os+/XtCOfvshZDcuWi7KRjkzvTGbMzbi6IRfznXg25LPIXKLx6jrZGFgqEV61eH2MEv6PoQYK0YC/CFqbQs= Received: from AM4PR07CA0033.eurprd07.prod.outlook.com (2603:10a6:205:1::46) by PAXPR08MB6656.eurprd08.prod.outlook.com (2603:10a6:102:135::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8182.20; Mon, 25 Nov 2024 16:29:07 +0000 Received: from AMS0EPF0000019D.eurprd05.prod.outlook.com (2603:10a6:205:1:cafe::8f) by AM4PR07CA0033.outlook.office365.com (2603:10a6:205:1::46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8207.10 via Frontend Transport; Mon, 25 Nov 2024 16:29:07 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by AMS0EPF0000019D.mail.protection.outlook.com (10.167.16.249) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8182.16 via Frontend Transport; Mon, 25 Nov 2024 16:29:07 +0000 Received: from AZ-NEU-EX06.Arm.com (10.240.25.134) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Mon, 25 Nov 2024 16:29:04 +0000 Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX06.Arm.com (10.240.25.134) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Mon, 25 Nov 2024 16:29:03 +0000 Received: from PW070M4K.arm.com (10.1.38.166) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Mon, 25 Nov 2024 16:29:03 +0000 From: Matthieu Longo To: , Indu Bhagat CC: Richard Earnshaw , Nick Clifton , Matthieu Longo Subject: [PATCH v1 1/4] aarch64: make explicit that CFI gnu_window_save is for Sparc, not AArch64 Date: Mon, 25 Nov 2024 16:28:43 +0000 Message-ID: <20241125162846.94691-2-matthieu.longo@arm.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: <20241125162846.94691-1-matthieu.longo@arm.com> References: <20241125162846.94691-1-matthieu.longo@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: AMS0EPF0000019D:EE_|PAXPR08MB6656:EE_|AMS0EPF000001A2:EE_|PAWPR08MB8816:EE_ X-MS-Office365-Filtering-Correlation-Id: c06970ff-0564-4c9e-dd27-08dd0d6e4e66 X-LD-Processed: f34e5979-57d9-4aaa-ad4d-b122a662184d,ExtAddr x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; ARA:13230040|376014|82310400026|1800799024|36860700013; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230040)(376014)(82310400026)(1800799024)(36860700013); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB6656 X-MS-Exchange-SkipListedInternetSender: ip=[2603:10a6:205:1::46]; domain=AM4PR07CA0033.eurprd07.prod.outlook.com X-MS-Exchange-Transport-CrossTenantHeadersStripped: AMS0EPF000001A2.eurprd05.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: a66b50c7-aaab-4177-5fdb-08dd0d6e48b6 X-Microsoft-Antispam: BCL:0; ARA:13230040|376014|14060799003|1800799024|82310400026|36860700013|35042699022; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:64aa7808-outbound-1.mta.getcheckrecipient.com; CAT:NONE; SFS:(13230040)(376014)(14060799003)(1800799024)(82310400026)(36860700013)(35042699022); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Nov 2024 16:29:16.8781 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: c06970ff-0564-4c9e-dd27-08dd0d6e4e66 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AMS0EPF000001A2.eurprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAWPR08MB8816 X-Spam-Status: No, score=-11.0 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FORGED_SPF_HELO, GIT_PATCH_0, KAM_NUMSUBJECT, RCVD_IN_DNSWL_NONE, SPF_HELO_PASS, SPF_NONE, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: binutils@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Binutils mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: binutils-bounces~patchwork=sourceware.org@sourceware.org - add a detailed comment when parsing DW_CFA_GNU_window_save in SFrame to explain why we are checking whether the targeted architecture is AArch64, whereas this CFI is a Sparc extension. - replace .cfi_gnu_window_save by .cfi_negate_ra_state in existing AArch64 DWARF tests as this is the preferred directive since GCC 15. - add a new AARch64 test to check backward compatibility with old GCC versions that emits .cfi_gnu_window_save. --- gas/gen-sframe.c | 8 +++++- gas/testsuite/gas/aarch64/pac_ab_key.s | 4 +-- .../gas/aarch64/pac_compat_cfi_window_save.d | 26 +++++++++++++++++++ .../gas/aarch64/pac_compat_cfi_window_save.s | 20 ++++++++++++++ 4 files changed, 55 insertions(+), 3 deletions(-) create mode 100644 gas/testsuite/gas/aarch64/pac_compat_cfi_window_save.d create mode 100644 gas/testsuite/gas/aarch64/pac_compat_cfi_window_save.s diff --git a/gas/gen-sframe.c b/gas/gen-sframe.c index 626dc33b71d..be48b339609 100644 --- a/gas/gen-sframe.c +++ b/gas/gen-sframe.c @@ -1283,7 +1283,13 @@ sframe_xlate_do_aarch64_negate_ra_state (struct sframe_xlate_ctx *xlate_ctx, } /* Translate DW_CFA_GNU_window_save into SFrame context. - DW_CFA_AARCH64_negate_ra_state is multiplexed with DW_CFA_GNU_window_save. + DW_CFA_GNU_window_save is a DWARF Sparc extension, but is multiplexed with a + directive of DWARF AArch64 extension: DW_CFA_AARCH64_negate_ra_state. + The AArch64 backend of GCC 14 and older versions was emitting mistakenly the + Sparc CFI directive (.cfi_window_save). From GCC 15, the AArch64 backend only + emits .cfi_negate_ra_state. For backward compatibility, the handler for + .cfi_window_save needs to check whether the directive was used in a AArch ABI + context or not. Return SFRAME_XLATE_OK if success. */ static int diff --git a/gas/testsuite/gas/aarch64/pac_ab_key.s b/gas/testsuite/gas/aarch64/pac_ab_key.s index 4b328e72ae4..3b81919409d 100644 --- a/gas/testsuite/gas/aarch64/pac_ab_key.s +++ b/gas/testsuite/gas/aarch64/pac_ab_key.s @@ -7,7 +7,7 @@ _Z5foo_av: .LFB0: .cfi_startproc hint 25 // paciasp - .cfi_window_save + .cfi_negate_ra_state stp x29, x30, [sp, -16]! .cfi_def_cfa_offset 16 .cfi_offset 29, -16 @@ -23,7 +23,7 @@ _Z5foo_bv: .cfi_startproc .cfi_b_key_frame hint 27 // pacibsp - .cfi_window_save + .cfi_negate_ra_state stp x29, x30, [sp, -16]! .cfi_def_cfa_offset 16 .cfi_offset 29, -16 diff --git a/gas/testsuite/gas/aarch64/pac_compat_cfi_window_save.d b/gas/testsuite/gas/aarch64/pac_compat_cfi_window_save.d new file mode 100644 index 00000000000..f49cebcbfde --- /dev/null +++ b/gas/testsuite/gas/aarch64/pac_compat_cfi_window_save.d @@ -0,0 +1,26 @@ +#objdump: --dwarf=frames +# This test is only valid on ELF based ports. +#notarget: *-*-*coff *-*-pe *-*-wince *-*-*aout* *-*-netbsd + +.+: file .+ + +Contents of the .eh_frame section: + +0+ 0+10 0+ CIE + Version: 1 + Augmentation: "zR" + Code alignment factor: 4 + Data alignment factor: -8 + Return address column: 30 + Augmentation data: 1b + DW_CFA_def_cfa: r31 \(sp\) ofs 0 + +0+14 0+18 0+18 FDE cie=0+ pc=0+\.\.0+8 + DW_CFA_advance_loc: 4 to 0+4 + DW_CFA_AARCH64_negate_ra_state + DW_CFA_advance_loc: 4 to 0+8 + DW_CFA_def_cfa_offset: 16 + DW_CFA_offset: r29 \(x29\) at cfa-16 + DW_CFA_offset: r30 \(x30\) at cfa-8 + DW_CFA_nop + DW_CFA_nop diff --git a/gas/testsuite/gas/aarch64/pac_compat_cfi_window_save.s b/gas/testsuite/gas/aarch64/pac_compat_cfi_window_save.s new file mode 100644 index 00000000000..1bfdef71f22 --- /dev/null +++ b/gas/testsuite/gas/aarch64/pac_compat_cfi_window_save.s @@ -0,0 +1,20 @@ + .arch armv8-a + .text + .align 2 + .global _Z5foo_av + .type _Z5foo_av, %function +_Z5foo_av: +.LFB0: + .cfi_startproc + hint 25 // paciasp + .cfi_window_save + stp x29, x30, [sp, -16]! + .cfi_def_cfa_offset 16 + .cfi_offset 29, -16 + .cfi_offset 30, -8 + .cfi_endproc +.LFE0: + .size _Z5foo_av, .-_Z5foo_av + .align 2 + .global _Z5foo_bv + .type _Z5foo_bv, %function From patchwork Mon Nov 25 16:28:44 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Matthieu Longo X-Patchwork-Id: 101838 Return-Path: X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 476353858C2B for ; Mon, 25 Nov 2024 16:32:25 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 476353858C2B Authentication-Results: sourceware.org; dkim=pass (1024-bit key, unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=LGrInr08; dkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=LGrInr08 X-Original-To: binutils@sourceware.org Delivered-To: binutils@sourceware.org Received: from EUR02-DB5-obe.outbound.protection.outlook.com (mail-db5eur02on2062c.outbound.protection.outlook.com [IPv6:2a01:111:f403:2608::62c]) by sourceware.org (Postfix) with ESMTPS id EB9CF3858C31 for ; Mon, 25 Nov 2024 16:29:37 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org EB9CF3858C31 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org EB9CF3858C31 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=2a01:111:f403:2608::62c ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1732552178; cv=pass; b=hkfCI61hjAky/WNVD2lFEwrK384YS68i2NEint6gQN4Esgv7eB7mzmOpGV11goYghe67CvwH4kucywt7jp4AUjpjsm9G1e04GfslISXJnGe1s+MKQd0Xq0Jdk9SRkIQMoIIwiHX67f+MetpPaap8dzjbaoBL5hVtXdBCVBDssNw= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1732552178; c=relaxed/simple; bh=QXjprRMPQgGLi/NxcndC3c+lk2V3HfhyBIYz6pbpg7k=; h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID: MIME-Version; b=OAKWJOnHIv6km7oFqRjvkLKXeNsESNjLbnKdIkPKYlckfwavVvCgQQLFgvck+SwyYhz4qgwEgeAcfOsg9fyC88QIUvTOninncqy2z0C1ycz1D+uRYXP36pQcq/7huGXyZq0BOUDanHqJNj7PGAw/e0ivYk8JXn3rrsyjeGdOqSY= ARC-Authentication-Results: i=3; server2.sourceware.org DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org EB9CF3858C31 ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=F3GpkWMep7FENjndId5YhY0KIiCqPo+gFqaznHWaxIecj7RmQgh8K5Ivq1tqPoUMzi2Qz87gmdACfcDFNLa8WA+7YEnAx1bMUm3DbOXtNKsazlSfA9QrNAuBEC03USTt5PaQZqYVaNYv+8I/MQOKcnhi1qJAGHyMuVqmgH30Z0fJdkBEWw04fqwXL2x/6fd1NHAzU58+TsHCM4TXUMuBpFXFL71lt9TSaTMDJUZBpWd1v8SmeIiT8y5PyY17d7EQOpF8prx730QSNy5U+MGxdDxqWPyo4g+h29EqFqng9ypeAHsmEjnMXCUn/bdCNTCnNRXDiKskQDPiv4vCTe9utw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=x8neAv+mii41A9V5yyu8yiylbTB9qK+6Zzanz36N/kU=; b=iGJwtnj0nF4eheMxNfRuHdBCpdysPMNBkYdwH2ENSoqbHdeAeFufoN6IbbtjigKUM6xndGpRvPr3kJFb+f51sV9lVvb1t4dIqoz018qyIbBBRp6vnA7d1Aw96Opuowl0FvR4J/UYoVQktiOSyPICVZsoTajWqoTwfNPa5WaIAwxLZPmmzXNL5bhp5Ad/KpSxUDMdQJpfr0DKSR13tB2Gp3kdHzvr/dsiYfR268+hdF3Fw+VEUPiqoHHlXFfRq6+MezREFu+kFbgFrf4YT74uI0WpTFJh6piYwKGfToiEjTPxLYvTz0tm65BZ3zt9sETWW0PWxIDQ54MKlCQdn/L3rA== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=sourceware.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=x8neAv+mii41A9V5yyu8yiylbTB9qK+6Zzanz36N/kU=; b=LGrInr08ofKbOyMrZ+VSH8CT87br/Hlhk5jvT4coeXUziHckJaAl/C+VTsgby8W49dDBUG40mRo+EQvpk7QQOaX1A5Zf1uYxpw+L53ASlE0rypE9t/e7mHjwU/dRnpNWeyjYsqVR3ocqMgU0aVxF/jTw0HrgiziHLUVUVihCILg= Received: from AM6P191CA0003.EURP191.PROD.OUTLOOK.COM (2603:10a6:209:8b::16) by PA4PR08MB7668.eurprd08.prod.outlook.com (2603:10a6:102:265::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8182.19; Mon, 25 Nov 2024 16:29:33 +0000 Received: from AM2PEPF0001C712.eurprd05.prod.outlook.com (2603:10a6:209:8b:cafe::d5) by AM6P191CA0003.outlook.office365.com (2603:10a6:209:8b::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8158.20 via Frontend Transport; Mon, 25 Nov 2024 16:29:33 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=arm.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM2PEPF0001C712.mail.protection.outlook.com (10.167.16.182) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8182.16 via Frontend Transport; Mon, 25 Nov 2024 16:29:33 +0000 Received: ("Tessian outbound bf1c175f6cbb:v490"); Mon, 25 Nov 2024 16:29:33 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: ca8c5fd6d4cd1e46 X-TessianGatewayMetadata: XamEJlErLjxAd4ObXgyf66zl0LQPOGqiaradELeM6dBTPV4lvKMeViWrVR4YOclXPSFoX4sqMYFLdLl/1+Mp7zzdJJQS5dJ66Jn616Fb3rt3vi5EYWVSNVfgOgLpr1hKNGuzkJltZmPVqzqY/e5W8O27rkQzSkUgfvmBG21QE3A= X-CR-MTA-TID: 64aa7808 Received: from L60ef4ef81478.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 199DEE28-159F-49EC-9AA0-F9001517524F.1; Mon, 25 Nov 2024 16:29:21 +0000 Received: from DU2PR03CU002.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id L60ef4ef81478.1 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384); Mon, 25 Nov 2024 16:29:21 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=BJwM2VDvo53k1g+fRMTq6+9ceCOhVwljbF4WMyhrwvcr8uJL4N4rvJJChNslznQUETFQ2ucw7sZY4cL6j1kEuaE7+pkfu/MNNqOCWu7k0CYE4i5yxJvj5DuwHJ9GXNZXtK/Sy9aR9rGomas2Wn38N/XGVC53WWQ9uHcQ8GwjTpprkDZK2Lob7dIglRe+gOqFCSeq0GfDgYBNQdcd6xZzSgDX2d4KJEAtYhdVBy/gb4a0WAr8beMSNXa9Q1xQRdzPLBk0zQY+q38tLfj8RGhi/Q93F5YM9sK6Gre/m8nS5RfB4WPlv9Qd3ajkSRUTbyWuFMnbW6SPkZl3SWHOAuuF8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=x8neAv+mii41A9V5yyu8yiylbTB9qK+6Zzanz36N/kU=; b=aycW1OG/r1DdlY3o208zCm+eAhOqo5Wz/+OQlDvSTw+vk4mOcxxlM4YqZ2cuVxinvZgMHqAuucD7hpOnedM4enoEqaM44HGcdzyhdkn3SfE/1dJEV+0vDtKlMe2i+f/DmalDnu7iCSmiHic8WAfgAjq3v5cnYvArcTq36Na8jifmqaefyr7OPRi9vACxBLNhkbugLt1BDNerDl9RzL/i1ucyyoZO7sJKXn1fNOXIj7AvTcr+dgObH/hp9UgKdfWFlGAFtcCBTXYo1LLEQnrkMaaL6tqkFTY5twr69oWyVokB/IC+rHfsmQEk9rhRLYlTeazf+ft6j/8BIYeF9PPWGA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=sourceware.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=x8neAv+mii41A9V5yyu8yiylbTB9qK+6Zzanz36N/kU=; b=LGrInr08ofKbOyMrZ+VSH8CT87br/Hlhk5jvT4coeXUziHckJaAl/C+VTsgby8W49dDBUG40mRo+EQvpk7QQOaX1A5Zf1uYxpw+L53ASlE0rypE9t/e7mHjwU/dRnpNWeyjYsqVR3ocqMgU0aVxF/jTw0HrgiziHLUVUVihCILg= Received: from DU2PR04CA0293.eurprd04.prod.outlook.com (2603:10a6:10:28c::28) by DBAPR08MB5671.eurprd08.prod.outlook.com (2603:10a6:10:1a1::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8182.20; Mon, 25 Nov 2024 16:29:18 +0000 Received: from DU6PEPF0000A7DD.eurprd02.prod.outlook.com (2603:10a6:10:28c:cafe::e9) by DU2PR04CA0293.outlook.office365.com (2603:10a6:10:28c::28) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8182.20 via Frontend Transport; Mon, 25 Nov 2024 16:29:18 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by DU6PEPF0000A7DD.mail.protection.outlook.com (10.167.8.37) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8207.12 via Frontend Transport; Mon, 25 Nov 2024 16:29:17 +0000 Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Mon, 25 Nov 2024 16:29:14 +0000 Received: from PW070M4K.arm.com (10.1.38.166) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Mon, 25 Nov 2024 16:29:13 +0000 From: Matthieu Longo To: , Indu Bhagat CC: Richard Earnshaw , Nick Clifton , Matthieu Longo Subject: [PATCH v1 2/4] aarch64 SFrame: use preferred CFI directive for AArch64 PAC Date: Mon, 25 Nov 2024 16:28:44 +0000 Message-ID: <20241125162846.94691-3-matthieu.longo@arm.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: <20241125162846.94691-1-matthieu.longo@arm.com> References: <20241125162846.94691-1-matthieu.longo@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: DU6PEPF0000A7DD:EE_|DBAPR08MB5671:EE_|AM2PEPF0001C712:EE_|PA4PR08MB7668:EE_ X-MS-Office365-Filtering-Correlation-Id: 5280a5ec-c510-4f8b-b2a2-08dd0d6e5833 X-LD-Processed: f34e5979-57d9-4aaa-ad4d-b122a662184d,ExtAddr x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; ARA:13230040|82310400026|376014|36860700013|1800799024; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230040)(82310400026)(376014)(36860700013)(1800799024); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBAPR08MB5671 X-MS-Exchange-SkipListedInternetSender: ip=[2603:10a6:10:28c::28]; domain=DU2PR04CA0293.eurprd04.prod.outlook.com X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM2PEPF0001C712.eurprd05.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: f98f318f-67f5-4a54-0759-08dd0d6e4e76 X-Microsoft-Antispam: BCL:0; ARA:13230040|376014|82310400026|35042699022|14060799003|1800799024|36860700013; X-Microsoft-Antispam-Message-Info: eDHHkwxxCQ8e3MJqzEJKPF6i5hbc0qyaJZ5GOXeZ8dUIrbskvvN0CAox8eiUaIflWCvdgY6Y16aPGisqPrPcAZP8g+LRXM4u9BDUwe5k8f7KrnQZ3dJ0IcdHTjlJ43goOnmLylJTxj4u9Vlp0Q1BJke5s/BPXumwpC9mU16+BjYxZpdr6MXO3wcbkxo12RF9PW+JUdgpq3kLnYq4PUQEC9R48XFepz23invC4OPJgLyiZoUMej0MbioCT+lbo1IXAZ0jtmcPcdbUIC6YiMFVC7bh1zyQvylXxKl1nZycbDb2/kXbwvHJ58xpc/FlSkxHKxjWgqutwjcgdv0y+bC198s0sMDEgzmSRzVz9n8E4M1A1eJ0f7MtgAPcWEAqgSCnyNv0MhrVUHBilDeQljg02adQudyDpwpxUJS+YRHxbU1TSnVHJhOBgegLYSwMnH7jwKv2bPaxJ2niqmqb+5npTCi4pXFEZx/+OLvYuelGeU23Ykn7/VLIH7Rfs2P7q8gStvOO1CclVjcr1Xlwmqh/RfJnAdhmi9IsvYsZLmC2MqtEGCr3meD5YYdi25Um7K1GslqVRI8y+UneKNHeieqT+N+jTlR999dKD3UOD3X3gOKDe2faX0ooYOVKz7qWolkErKPa5QxkttyJbRytIeNEllPd9f4w1wCpjwq/YE2nK1OfILjuRZ/W5A4YVyccAkQutj/gMgxeibjMdpyBQvBtTVDz8lhvm5o63LsrC0yc16zYJDQPK+uIuQuO6Rc5SLyc+DEphxpWyilZELRAJul3TSPfktQUXXzacImGYs3OwwlJLqoyu7tSRzZJB++TfJ10ITVTylpCBL1uUkrxDlg9JS3bBTpxaALNCzVtCjTH+M0bkr1MokuDnOz6mPts9z3fssMzqs7k8w06iES8yEcD8OGFJz7CQTC/chiyMy/lofz8SvqegTvkmk8DlYwSv1gplTgu5ExsG9KRq0ahe2LiJx2rgMT1GdnRzlqHuIOiTYLdp4Wg5wUL8CaPBDT8F7CL6Sn9eR8RfELtX3ID1LGdiGbnF/3fmBBhsXne+0R7+EhLuit/FOACW5MgqbmaomPgrm5Cr+u+WT98DmFPNsDqVOeLTCPuthB7mhAUyPQXEqpotobeNqp9Uf4VzY5Yc5ZsBrupFSnE+KbWKtqS1DA1kzaM65tp4L6AuQDxF9V0+20MoF76FN8gPKFm5oDhvYe3H3LBdVe+Uw9/yEV1iRjgldny9vVZxUhguwdfd20Mhi13esmrt5ukygx7IsLH13ubuqrIqYipuMIxs3JvjRJguw6xIqlUAHNl45rtUkVf87CCZ/aN8/W9sAup2xq+sHvWwyAeKpaMPPvaLOQ1ubBjRt4Ow32SU1UWrXOTGbaYJ3rGjCwAhrS3/D7LvpuU6wi8e16aBYpcQ6t/KxM+B21NWuEWlMrBJAoJySwq5BKLDuMQ2LHWix0uv0aoEbvmhzdr X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:64aa7808-outbound-1.mta.getcheckrecipient.com; CAT:NONE; SFS:(13230040)(376014)(82310400026)(35042699022)(14060799003)(1800799024)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Nov 2024 16:29:33.3200 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 5280a5ec-c510-4f8b-b2a2-08dd0d6e5833 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM2PEPF0001C712.eurprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR08MB7668 X-Spam-Status: No, score=-11.3 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FORGED_SPF_HELO, GIT_PATCH_0, SPF_HELO_PASS, SPF_NONE, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: binutils@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Binutils mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: binutils-bounces~patchwork=sourceware.org@sourceware.org ARMv8.3 addded support for a new security feature named Pointer Authentication. Support for this feature in SFrame already exists, but is relying on the deprecated "AArch64" (actually Sparc) CFI directive .cfi_gnu_window_save. .cfi_negate_ra_state CFI directive should be used instead to convey this information. In GCC 14 and older, the Sparc DWARF extension .cfi_gnu_window_save is emitted instead of .cfi_negate_ra_state. GCC 15 fixed this issue, but this behavior is preserved for backward compatibility. The existing sframe test for AArch64 PAC was using .cfi_gnu_window_save. This patch replaces this CFI in the existing test by the preferred one, and adds a new test to check for backward compatibility when using .cfi_gnu_window_save. --- .../gas/cfi-sframe/cfi-sframe-aarch64-3.d | 20 ++++++++++++++++++ .../gas/cfi-sframe/cfi-sframe-aarch64-3.s | 21 +++++++++++++++++++ .../cfi-sframe-aarch64-pac-ab-key-1.s | 8 +++---- gas/testsuite/gas/cfi-sframe/cfi-sframe.exp | 1 + 4 files changed, 46 insertions(+), 4 deletions(-) create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-3.d create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-3.s diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-3.d b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-3.d new file mode 100644 index 00000000000..f72b70a970a --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-3.d @@ -0,0 +1,20 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: SFrame cfi_negate_ra_state test (using cfi_window_save) +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_2 + Flags: NONE + Num FDEs: 1 + Num FREs: 2 + + Function Index : + func idx \[0\]: pc = 0x0, size = 8 bytes + STARTPC + CFA + FP + RA + +#... + 0+0004 +sp\+16 +u +u\[s\] + + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-3.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-3.s new file mode 100644 index 00000000000..df6ff6e8c8f --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-3.s @@ -0,0 +1,21 @@ +## ARMv8.3 addded support a new security feature named Pointer Authentication. The +## main idea behind this is to use the unused bits in the pointer values. +## Each pointer is patched with a PAC before writing to memory, and is verified +## before using it. +## When the pointers are mangled, the stack trace generator needs to know so it +## can mask off the PAC from the pointer value to recover the return address, +## and conversely, skip doing so if the pointers are not mangled. +## +## .cfi_negate_ra_state CFI directive is usually used to convey this information. +## In GCC 14 and older, the Sparc DWARF extension .cfi_window_save is emitted +## instead of .cfi_negate_ra_state. GCC 15 fixed this issue, but this behavior +## is preserved in binutils for backward compatibility. +## +## SFrame has support for this. This testcase ensures that the directive +## is interpreted successfully. + .cfi_startproc + .long 0 + .cfi_def_cfa_offset 16 + .cfi_window_save + .long 0 + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-pac-ab-key-1.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-pac-ab-key-1.s index d9a408c668c..84230a99e3c 100644 --- a/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-pac-ab-key-1.s +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-pac-ab-key-1.s @@ -8,12 +8,12 @@ _Z5foo_av: .LFB0: .cfi_startproc hint 25 // paciasp - .cfi_window_save + .cfi_negate_ra_state stp x29, x30, [sp, -16]! .cfi_def_cfa_offset 16 .cfi_offset 29, -16 .cfi_offset 30, -8 - ret + ret .cfi_endproc .LFE0: .size _Z5foo_av, .-_Z5foo_av @@ -25,12 +25,12 @@ _Z5foo_bv: .cfi_startproc .cfi_b_key_frame hint 27 // pacibsp - .cfi_window_save + .cfi_negate_ra_state stp x29, x30, [sp, -16]! .cfi_def_cfa_offset 16 .cfi_offset 29, -16 .cfi_offset 30, -8 nop nop - ret + ret .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp b/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp index cfae28d39aa..c646b109895 100644 --- a/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp @@ -97,5 +97,6 @@ if { [istarget "x86_64-*-*"] && [gas_sframe_check] } then { if { [istarget "aarch64*-*-*"] && [gas_sframe_check] } then { run_dump_test "cfi-sframe-aarch64-1" run_dump_test "cfi-sframe-aarch64-2" + run_dump_test "cfi-sframe-aarch64-3" run_dump_test "cfi-sframe-aarch64-pac-ab-key-1" } From patchwork Mon Nov 25 16:28:45 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Matthieu Longo X-Patchwork-Id: 101837 Return-Path: X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id DF9C5385829B for ; Mon, 25 Nov 2024 16:32:16 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org DF9C5385829B Authentication-Results: sourceware.org; dkim=pass (1024-bit key, unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=k5edJOLM; dkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=k5edJOLM X-Original-To: binutils@sourceware.org Delivered-To: binutils@sourceware.org Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on20631.outbound.protection.outlook.com [IPv6:2a01:111:f403:2612::631]) by sourceware.org (Postfix) with ESMTPS id E100C3858429 for ; Mon, 25 Nov 2024 16:29:43 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org E100C3858429 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org E100C3858429 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=2a01:111:f403:2612::631 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1732552184; cv=pass; b=B8VhJcdh/gMzBRd9K+3q4YKn8QoYvZtjhbK6J8Oj/1M5KCMsRsCikCukKGAi1lKPeuF2DV00pRhSY27gwsCOkn2eiyJ5q9QD1PeYtX6DMkjBxsCcvGwCt6sKLt87/zo1PcPc6jdYVaicNfhgfRwfUUJNXphREcLzxYeNLXPZzoc= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1732552184; c=relaxed/simple; bh=M4FeR7MNnShZLIic1VhCRpjVkCJwPVa4kDKC8ePJuVI=; h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID: MIME-Version; b=h4Vth85bBmmodbgPsudiUNv7nEJ/J+3AVIZ1GbhLGmvqISAw5YP+Uxe63Xq0W7odHLsQHLculpju3nGofM3aNnzsKyqqKVAvGrXPC/5RhqdIjnlaD1V0K5ZINcdzMKfJlAgffY22MmqS0nz4B3CopWx+Tth9JB4xsvpk7oIwccs= ARC-Authentication-Results: i=3; server2.sourceware.org DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org E100C3858429 ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=bkNtSoGogj0ZNxn1HKIxK4i4IZ//Ir6pXQ7/dhZkAQm9pipfK8T20ouPr98PgjcBGvxPd8P1dM3o8AURxWYIxluEJJSrOBkrfeAG/dAOYtZtGjEGrtxF7XG/EXHO12VJ6eIEGWMOFOAlVeA66jUcQ4bdZ7TL87GaDzXrV/UOh3R3HzDOSdUThuqf6r9RSjQ5VMMpF2nGzkjIuoRKyA3XG/Pnoxe15D69HHN6KazchGUk8TgsG7F/fS6epYuGifECeDbZeekmUpeYi5vekFNxYJPEkgg1h/fa71KkYNBDNpkFz9nuR3ZKCD7xI0xPvQJbGbEt/QpQCMaoHJ/qY2YiPw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YDQtKzU3sF/LngczfqEbbgz7U/m8cEmEvyC39l13cjg=; b=QEi0icBfu8pvKVdnopbGhIT5SdgwPzwxJr2j4H6Uh4BRmg23RG1p5wsot4q7XET+pCIuA2zaScUdtuWjzQ11Ph98cpoaFEgT+6qed8C5hp2Rv+V60tOG78Smo4mBiFfOIkn2i3y+ZJaytNupDY8Ker12TBh4kgTxtgGuRbl+u8EjeQXS35+OUJA5dMVMu3OGtJQsoCWpE9l13StuBvn+y3//h26DQlUc05PVg25I7Mf+IiDZVBeZGT10ZGu/cKuIolWfc4TeAQ9+KeD82qVQKyFVsUHOs0GgVcURDarqgst1vGTjcckcLzB8gm7TiPTRRjvInU8Gs9AsHdfqGoSExg== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=sourceware.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YDQtKzU3sF/LngczfqEbbgz7U/m8cEmEvyC39l13cjg=; b=k5edJOLMQME1LqjHpWHzdNihGSMMDeJKsoj+hTgEubVqa00+Kf/Lq9qrXwGIrD32Cdb/Z/gyJiK5qfk2Ijf/p6c+Inbarex0INbcKYO+cbDROA79+q0kOf5B8ySr4CW0gbOK8RLPzEouFsUCe9DtLLH3QB7TZpiZFAnp60T2Wzk= Received: from AS4P195CA0027.EURP195.PROD.OUTLOOK.COM (2603:10a6:20b:5d6::16) by GVXPR08MB10586.eurprd08.prod.outlook.com (2603:10a6:150:14f::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8182.18; Mon, 25 Nov 2024 16:29:39 +0000 Received: from AMS1EPF00000041.eurprd04.prod.outlook.com (2603:10a6:20b:5d6:cafe::f6) by AS4P195CA0027.outlook.office365.com (2603:10a6:20b:5d6::16) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8182.20 via Frontend Transport; Mon, 25 Nov 2024 16:29:39 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=arm.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AMS1EPF00000041.mail.protection.outlook.com (10.167.16.38) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8207.12 via Frontend Transport; Mon, 25 Nov 2024 16:29:38 +0000 Received: ("Tessian outbound d013e61db77e:v490"); Mon, 25 Nov 2024 16:29:38 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 51ce4dbcdf08bdc4 X-TessianGatewayMetadata: sNb7iXb8Vpk63An/NkMXbx7Y/XtVXOCUefmoKRxkyUuTNdnXIGHetP2lZp2pKa9reTdHKr+Gw+7Wms4GGizVoPmgiB3AoLT+rJB+5/EFxQat0QUtTcPLb5Haqc/tV/3KJMLr0DrRHUaf69cFx8PD+qHWHyFShZOllV/bS6PGnrI= X-CR-MTA-TID: 64aa7808 Received: from Lab052d958f19.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id B5FDE267-3F7F-4CC7-B6DC-9CD454082BC8.1; Mon, 25 Nov 2024 16:29:30 +0000 Received: from EUR03-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id Lab052d958f19.1 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384); Mon, 25 Nov 2024 16:29:30 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=uWmgy/KPsoNOtsKKj+399phVuJ+evjZf1gZn90OfZ9bKf2NYprEwEBrLeWeTqRcYcJDhzewIPZXUZWM0Cq7ub7tQ1sAlswyBmq5ffC3L3hyd3FWOhUAn/8olIWBqUqJ6ZSSF8bsy/FpMg1HXXh9Gnegfeh3ATM+Iw4QDpk7SIzgHiZy1YKlj6ihe4Ns89/w/CYtF8emgkaRxidG9WHGq25uy3FCdZqAKmuGDrjWL9lg2zohXOhej4U6UU2/TVjS6mB/EJbQIl+KFoGMgwpdj7NjN/YvyLbAeu7nOHS5j0Fj58eEn7eJGVe2vKHmXOxdpDEwUXabltdDrZnL707GvSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YDQtKzU3sF/LngczfqEbbgz7U/m8cEmEvyC39l13cjg=; b=TAyTDZb1EHl+wqjPaogD7RgjCC99idu5uAmBe8qkW6e/rLyERWFNuyX9syXsCBwLFkw7UGrz6fB++81KqEDM9Rc8rY9ySRn4/lMcraiZ5A41mnA0b77y0CjYRFK/Dz9TV0R2Ru7UdD7G6r8GAG2Cv9bSc8UkETKpw0Hd0vCAVNbCoC4xoVtwguyx0AK9NUv6OAVtRyu46eHyuKMmDwzEVhyT+Q2FguxvVQnRjFU5ibKWOfh2Y6XmjQArZ/kKX/wrdiFx+gOEvLuaXFnLFMUhKKs9gXmzmQagyfNScZQHgXMkwUVYReUtXDs3oCK3WzciC3eYYHej6N5ycJOB/VPH/A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=sourceware.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YDQtKzU3sF/LngczfqEbbgz7U/m8cEmEvyC39l13cjg=; b=k5edJOLMQME1LqjHpWHzdNihGSMMDeJKsoj+hTgEubVqa00+Kf/Lq9qrXwGIrD32Cdb/Z/gyJiK5qfk2Ijf/p6c+Inbarex0INbcKYO+cbDROA79+q0kOf5B8ySr4CW0gbOK8RLPzEouFsUCe9DtLLH3QB7TZpiZFAnp60T2Wzk= Received: from DB7PR03CA0075.eurprd03.prod.outlook.com (2603:10a6:10:72::16) by AM0PR08MB5522.eurprd08.prod.outlook.com (2603:10a6:208:18c::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8182.21; Mon, 25 Nov 2024 16:29:26 +0000 Received: from DU6PEPF0000A7E4.eurprd02.prod.outlook.com (2603:10a6:10:72:cafe::18) by DB7PR03CA0075.outlook.office365.com (2603:10a6:10:72::16) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8182.16 via Frontend Transport; Mon, 25 Nov 2024 16:29:26 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by DU6PEPF0000A7E4.mail.protection.outlook.com (10.167.8.43) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8207.12 via Frontend Transport; Mon, 25 Nov 2024 16:29:26 +0000 Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Mon, 25 Nov 2024 16:29:24 +0000 Received: from PW070M4K.arm.com (10.1.38.166) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Mon, 25 Nov 2024 16:29:24 +0000 From: Matthieu Longo To: , Indu Bhagat CC: Richard Earnshaw , Nick Clifton , Matthieu Longo Subject: [PATCH v1 3/4] aarch64 DWARF: add new CFI directive for PAuth_LR Date: Mon, 25 Nov 2024 16:28:45 +0000 Message-ID: <20241125162846.94691-4-matthieu.longo@arm.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: <20241125162846.94691-1-matthieu.longo@arm.com> References: <20241125162846.94691-1-matthieu.longo@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: DU6PEPF0000A7E4:EE_|AM0PR08MB5522:EE_|AMS1EPF00000041:EE_|GVXPR08MB10586:EE_ X-MS-Office365-Filtering-Correlation-Id: 0179a4b7-a45d-468b-329e-08dd0d6e5b55 X-LD-Processed: f34e5979-57d9-4aaa-ad4d-b122a662184d,ExtAddr x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; ARA:13230040|82310400026|376014|36860700013|1800799024; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230040)(82310400026)(376014)(36860700013)(1800799024); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5522 X-MS-Exchange-SkipListedInternetSender: ip=[2603:10a6:10:72::16]; domain=DB7PR03CA0075.eurprd03.prod.outlook.com X-MS-Exchange-Transport-CrossTenantHeadersStripped: AMS1EPF00000041.eurprd04.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 6d9bdb90-5d1c-4306-80b6-08dd0d6e5443 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|376014|14060799003|36860700013|82310400026|35042699022; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:64aa7808-outbound-1.mta.getcheckrecipient.com; CAT:NONE; SFS:(13230040)(1800799024)(376014)(14060799003)(36860700013)(82310400026)(35042699022); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Nov 2024 16:29:38.5883 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 0179a4b7-a45d-468b-329e-08dd0d6e5b55 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AMS1EPF00000041.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: GVXPR08MB10586 X-Spam-Status: No, score=-11.3 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FORGED_SPF_HELO, GIT_PATCH_0, RCVD_IN_DNSWL_NONE, SPF_HELO_PASS, SPF_NONE, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: binutils@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Binutils mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: binutils-bounces~patchwork=sourceware.org@sourceware.org This patch adds a new CFI directive (cfi_negate_ra_state_with_pc) which set an additional bit in the RA state to inform that RA was signed with SP but also PC as an additional diversifier. RA state | Description 0b00 | Return address not signed (default if no cfi_negate_ra_state*) 0b01 | Return address signed with SP (cfi_negate_ra_state) 0b10 | Invalid state 0b11 | Return address signed with SP+PC (cfi_negate_ra_state_with_pc) --- bfd/elf-eh-frame.c | 1 + binutils/dwarf.c | 5 +++++ gas/dw2gencfi.c | 10 ++++++++++ gas/scfidw2gen.c | 1 + include/dwarf2.def | 4 +++- 5 files changed, 20 insertions(+), 1 deletion(-) diff --git a/bfd/elf-eh-frame.c b/bfd/elf-eh-frame.c index ebe162f2e5f..6029ae75a26 100644 --- a/bfd/elf-eh-frame.c +++ b/bfd/elf-eh-frame.c @@ -359,6 +359,7 @@ skip_cfa_op (bfd_byte **iter, bfd_byte *end, unsigned int encoded_ptr_width) case DW_CFA_remember_state: case DW_CFA_restore_state: case DW_CFA_GNU_window_save: + case DW_CFA_AARCH64_negate_ra_state_with_pc: /* No arguments. */ return true; diff --git a/binutils/dwarf.c b/binutils/dwarf.c index 4b46100c753..f02f4ba6fd2 100644 --- a/binutils/dwarf.c +++ b/binutils/dwarf.c @@ -10355,6 +10355,11 @@ display_debug_frames (struct dwarf_section *section, fc->pc_begin += ofs; break; + case DW_CFA_AARCH64_negate_ra_state_with_pc: + if (! do_debug_frames_interp) + printf (" DW_CFA_AARCH64_negate_ra_state_with_pc\n"); + break; + case DW_CFA_GNU_window_save: if (! do_debug_frames_interp) printf (" %s\n", DW_CFA_GNU_window_save_name[is_aarch64]); diff --git a/gas/dw2gencfi.c b/gas/dw2gencfi.c index 14b73ef33c5..5071a161576 100644 --- a/gas/dw2gencfi.c +++ b/gas/dw2gencfi.c @@ -718,6 +718,7 @@ const pseudo_typeS cfi_pseudo_table[] = { "cfi_restore_state", dot_cfi, DW_CFA_restore_state }, { "cfi_window_save", dot_cfi, DW_CFA_GNU_window_save }, { "cfi_negate_ra_state", dot_cfi, DW_CFA_AARCH64_negate_ra_state }, + { "cfi_negate_ra_state_with_pc", dot_cfi, DW_CFA_AARCH64_negate_ra_state_with_pc }, { "cfi_escape", dot_cfi_escape, 0 }, { "cfi_signal_frame", dot_cfi, CFI_signal_frame }, { "cfi_personality", dot_cfi_personality, 0 }, @@ -918,6 +919,10 @@ dot_cfi (int arg) cfi_add_CFA_insn (DW_CFA_GNU_window_save); break; + case DW_CFA_AARCH64_negate_ra_state_with_pc: + cfi_add_CFA_insn (DW_CFA_AARCH64_negate_ra_state_with_pc); + break; + case CFI_signal_frame: frchain_now->frch_cfi_data->cur_fde_data->signal_frame = 1; break; @@ -1758,6 +1763,10 @@ output_cfi_insn (struct cfi_insn_data *insn) out_one (DW_CFA_GNU_window_save); break; + case DW_CFA_AARCH64_negate_ra_state_with_pc: + out_one (DW_CFA_AARCH64_negate_ra_state_with_pc); + break; + case CFI_escape: { struct cfi_escape_data *e; @@ -2216,6 +2225,7 @@ cfi_change_reg_numbers (struct cfi_insn_data *insn, segT ccseg) case DW_CFA_remember_state: case DW_CFA_restore_state: case DW_CFA_GNU_window_save: + case DW_CFA_AARCH64_negate_ra_state_with_pc: case CFI_escape: case CFI_label: break; diff --git a/gas/scfidw2gen.c b/gas/scfidw2gen.c index 2b018fac8bd..1fd0cd832e5 100644 --- a/gas/scfidw2gen.c +++ b/gas/scfidw2gen.c @@ -113,6 +113,7 @@ const pseudo_typeS scfi_pseudo_table[] = { "cfi_restore_state", dot_scfi_ignore, 0 }, { "cfi_window_save", dot_scfi_ignore, 0 }, { "cfi_negate_ra_state", dot_scfi_ignore, 0 }, + { "cfi_negate_ra_state_with_pc", dot_scfi_ignore, 0 }, { "cfi_escape", dot_scfi_ignore, 0 }, { "cfi_personality", dot_scfi_ignore, 0 }, { "cfi_personality_id", dot_scfi_ignore, 0 }, diff --git a/include/dwarf2.def b/include/dwarf2.def index 66c7fa1220f..95601fc7018 100644 --- a/include/dwarf2.def +++ b/include/dwarf2.def @@ -788,9 +788,11 @@ DW_CFA (DW_CFA_MIPS_advance_loc8, 0x1d) /* GNU extensions. NOTE: DW_CFA_GNU_window_save is multiplexed on Sparc and AArch64. */ DW_CFA (DW_CFA_GNU_window_save, 0x2d) -DW_CFA_DUP (DW_CFA_AARCH64_negate_ra_state, 0x2d) DW_CFA (DW_CFA_GNU_args_size, 0x2e) DW_CFA (DW_CFA_GNU_negative_offset_extended, 0x2f) +/* AArch64 extensions. */ +DW_CFA (DW_CFA_AARCH64_negate_ra_state_with_pc, 0x2c) +DW_CFA_DUP (DW_CFA_AARCH64_negate_ra_state, 0x2d) DW_END_CFA From patchwork Mon Nov 25 16:28:46 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Matthieu Longo X-Patchwork-Id: 101839 Return-Path: X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id E274C3858416 for ; Mon, 25 Nov 2024 16:37:09 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org E274C3858416 Authentication-Results: sourceware.org; dkim=pass (1024-bit key, unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=GRZ30m6X; dkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=GRZ30m6X X-Original-To: binutils@sourceware.org Delivered-To: binutils@sourceware.org Received: from EUR02-VI1-obe.outbound.protection.outlook.com (mail-vi1eur02on20611.outbound.protection.outlook.com [IPv6:2a01:111:f403:2607::611]) by sourceware.org (Postfix) with ESMTPS id 689EC3858405 for ; Mon, 25 Nov 2024 16:29:59 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 689EC3858405 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 689EC3858405 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=2a01:111:f403:2607::611 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1732552199; cv=pass; b=Ozg0gO0En86NN5fw07qvzcH7OGj90PAgW89L7fmGGXhUPu0ZbYhG8v1x3jCuzmVG8akvYB5s0VylIcfdj81d1X82CNzanGaDeGQy52Pcu3JwO3TjqB0pwVxShEKZWZtsF3t/eb7oOb78x8Vdk/ynFWrEvfMrJjNBMBoGq51acE4= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1732552199; c=relaxed/simple; bh=ZDndl0bB7p2Z1N06L5TCdEi3pjctmKQyMTAyYqXbj4A=; h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID: MIME-Version; b=RYEVq97Ws+KQ6ACacXJSxvpS8PgEFk2TS/lCj7IYM6kF0SI+EI1iQrzrSc0P1F7nXtv72YPm8dSMIjgmpj03HbFBn+UrfoWZXoRJWoTcIrAwcIkpwpPQo+z4cesiU0rF6hap/4SNVu8SyWgPu46DVL/jK6z9m3rgxtHUDPvwrds= ARC-Authentication-Results: i=3; server2.sourceware.org DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 689EC3858405 ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=Qzuj3b178+C9yXYMUxGYqTCL/Ybefl3JVDIFbgfIEsB9ZGft+C77hKlEyGed13nzq9RFUiKZuwm9Nyjj9E9u47prpkbSK6X7Mez2LPpq1DFAKIV9LMhajQOR0P+mP5ogjGaKqz1KrW7kojdYfrZosdHGWV4TFc3EBuhZwv1N/gkYA66rZietZ/8zLMxb3dquW0vfdrlJgChDRApV98Oi69i9j3WHK0x2vYJ7KxHs+DXACIJm0f3/XCh2WR4Qd15DFD5itxOuw3lu+gdH5rg35uV55+UX4tDvhQ8faABoIK2uozBxUQkwnwEwCSgImEgu6YM7CUUt45wKa2LINXJk3w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YpuygwnmbNRnCk+SOajnDtw1HEAClaJgqOBBAs/1sx0=; b=lQWSmxNhQwxXxRXV4Ba7105CnTco6GkPpw9P8vQxbHjdi0mUtO+x0Z6gqcciCJTNYXQaBytiEbW3n8nVTKMvSzo1lyn+Gdo94k+exyCURD8yU329enYD8WZ3cuEfrBG7Xr76IoNQ43gTOK3+jmRKcqh/mr7YPkT5FGLJDiA+z89/HiZJrB3mMKxmEhdM5X6TaW9Z2dWp7H3yOkHl3ITP3fkMuVqfSwCpBcYrUOd9V5Ajq+tPNRs6HtqgYir2/6bUixViZbctRFnS3uOulr1gMv6KeE7a4bDWIqX2TIgCKB3ZsV9iRdSZzCvmUMRyQ4D9RULc54I0AT7OUCpsqAOH/g== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=sourceware.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YpuygwnmbNRnCk+SOajnDtw1HEAClaJgqOBBAs/1sx0=; b=GRZ30m6Xei4dB/hSGP3Z0v35/8V2HFwg6jZHYa1kxJzlTjP4rJi9OSgFqzssfGmZ4GhMaM+TMuzIXk6hwLMz9/FQgyHuRS1Qt0mUcXhBg/GULCG4medApIVwgiBA+Lvp8nIH852WLpwUQb7Fm73cixyV1H2dpnffzhbKXO430x8= Received: from AM0PR05CA0090.eurprd05.prod.outlook.com (2603:10a6:208:136::30) by AS4PR08MB7782.eurprd08.prod.outlook.com (2603:10a6:20b:516::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8182.18; Mon, 25 Nov 2024 16:29:51 +0000 Received: from AMS0EPF000001B5.eurprd05.prod.outlook.com (2603:10a6:208:136:cafe::e7) by AM0PR05CA0090.outlook.office365.com (2603:10a6:208:136::30) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8182.18 via Frontend Transport; Mon, 25 Nov 2024 16:29:51 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=arm.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AMS0EPF000001B5.mail.protection.outlook.com (10.167.16.169) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8207.12 via Frontend Transport; Mon, 25 Nov 2024 16:29:51 +0000 Received: ("Tessian outbound bf1c175f6cbb:v490"); Mon, 25 Nov 2024 16:29:51 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 013b3ca622fd881e X-TessianGatewayMetadata: AyND1UBH2cW6XDyM3kNb41nfE8bKxphQdMGD8pV4Qiy6IkE6602CspTc+DwgM6bA/+Wh2OLIjcRRybHSJ2Q2bozud6RD90ngJghAEPu3eEfCoDKiTMAALeDcS199JF75Q+6tWpxtHCinreX3ri3LwEFbXgyb+T3TcMrHhHYyRKg= X-CR-MTA-TID: 64aa7808 Received: from Lef1c5d93b520.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 51C3BEE8-A82A-4C69-935E-67CC8F784B3D.1; Mon, 25 Nov 2024 16:29:44 +0000 Received: from EUR03-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id Lef1c5d93b520.1 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384); Mon, 25 Nov 2024 16:29:44 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=pxE5Ik5c3d33AZ7tPlPs1oYCVeIYud04AaEahRRZAuKJLasC2anNaGZaGC7ckkmfdllGYxJZO7Jk5zofzaMqCKty/D77zG5989WmHCl/fQxWAfo3vR/IJ3FijMQQY8MJ4yNfUCKUfxSF7ddAYyxOvO/KMT1h24bR7OK+47QNvbKQY8a/vcpHkij+9/uZH7F066LExIeX3vshj4Anr/UmIHfOozBelmULakStqdspspdVlsB8lKY6LZwzaaRNmHmirbGz4GYiYtLdqUDeQ51FTxpMTJDpNOohay1T05QoAGLNCrdi/Dnc8JOpoP6g6S2qBN5gNln7JtK5cID3EL3eJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YpuygwnmbNRnCk+SOajnDtw1HEAClaJgqOBBAs/1sx0=; b=IjdofEFDE9f6hvEXmeuxEsyVj5sHOf0YwSbK5dkfafKEoY95qIDM9HBk/hGP3nWq4G06GiY0NVhDtbznc9lwp5eulj4XapZo+pAA+3OjlvrOVQassfUzsbeYF/gycoO3O41F2FvtTs7zekTGqd2wgIt9xbpjRrH0qGvk/W5DHXLRNRX7M7VuSzcUSP1yxxh6HLlwR7i745QheExRo5T294nniV56Fz4DfTbBtA2+/mlgBUd82JEiNYpnSm6+Tb7D3FQdmpON+MS2cgdQLrcrUN3tWid3pjPhNFJh4sZO6EryLEjgciEcNsfA+AnRQM6odJ6+6S2gwtGK7jcxZZ/iSg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=sourceware.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YpuygwnmbNRnCk+SOajnDtw1HEAClaJgqOBBAs/1sx0=; b=GRZ30m6Xei4dB/hSGP3Z0v35/8V2HFwg6jZHYa1kxJzlTjP4rJi9OSgFqzssfGmZ4GhMaM+TMuzIXk6hwLMz9/FQgyHuRS1Qt0mUcXhBg/GULCG4medApIVwgiBA+Lvp8nIH852WLpwUQb7Fm73cixyV1H2dpnffzhbKXO430x8= Received: from DB3PR08CA0028.eurprd08.prod.outlook.com (2603:10a6:8::41) by AM0PR08MB5363.eurprd08.prod.outlook.com (2603:10a6:208:188::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8182.20; Mon, 25 Nov 2024 16:29:38 +0000 Received: from DU6PEPF0000A7E4.eurprd02.prod.outlook.com (2603:10a6:8:0:cafe::40) by DB3PR08CA0028.outlook.office365.com (2603:10a6:8::41) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8182.20 via Frontend Transport; Mon, 25 Nov 2024 16:29:38 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by DU6PEPF0000A7E4.mail.protection.outlook.com (10.167.8.43) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8207.12 via Frontend Transport; Mon, 25 Nov 2024 16:29:38 +0000 Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Mon, 25 Nov 2024 16:29:34 +0000 Received: from PW070M4K.arm.com (10.1.38.166) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Mon, 25 Nov 2024 16:29:34 +0000 From: Matthieu Longo To: , Indu Bhagat CC: Richard Earnshaw , Nick Clifton , Matthieu Longo Subject: [PATCH v1 4/4] aarch64 SFrame: skip with warning new CFI directive used with pauth_lr Date: Mon, 25 Nov 2024 16:28:46 +0000 Message-ID: <20241125162846.94691-5-matthieu.longo@arm.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: <20241125162846.94691-1-matthieu.longo@arm.com> References: <20241125162846.94691-1-matthieu.longo@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: DU6PEPF0000A7E4:EE_|AM0PR08MB5363:EE_|AMS0EPF000001B5:EE_|AS4PR08MB7782:EE_ X-MS-Office365-Filtering-Correlation-Id: 202ccc8e-41ac-42a0-64ea-08dd0d6e62f6 X-LD-Processed: f34e5979-57d9-4aaa-ad4d-b122a662184d,ExtAddr x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; ARA:13230040|376014|82310400026|1800799024|36860700013; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230040)(376014)(82310400026)(1800799024)(36860700013); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5363 X-MS-Exchange-SkipListedInternetSender: ip=[2603:10a6:8::41]; domain=DB3PR08CA0028.eurprd08.prod.outlook.com X-MS-Exchange-Transport-CrossTenantHeadersStripped: AMS0EPF000001B5.eurprd05.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 15fe08c6-5d27-4abe-30ec-08dd0d6e5b0b X-Microsoft-Antispam: BCL:0; ARA:13230040|14060799003|1800799024|36860700013|376014|35042699022|82310400026; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:64aa7808-outbound-1.mta.getcheckrecipient.com; CAT:NONE; SFS:(13230040)(14060799003)(1800799024)(36860700013)(376014)(35042699022)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Nov 2024 16:29:51.3888 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 202ccc8e-41ac-42a0-64ea-08dd0d6e62f6 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AMS0EPF000001B5.eurprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS4PR08MB7782 X-Spam-Status: No, score=-11.3 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FORGED_SPF_HELO, GIT_PATCH_0, SPF_HELO_PASS, SPF_NONE, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: binutils@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Binutils mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: binutils-bounces~patchwork=sourceware.org@sourceware.org Today, SFrame v2 specification does not describe how to encode the information corresponding to the PAC signing method. SFrame v3 specification should hopefully specify it. In the meantime, if the GNU assembler finds .cfi_negate_ra_state_with_pc and --gsframe is specified, it will output a warning to the user and will fail to generate the FDE entry. A new SFrame test for .cfi_negate_ra_state_with_pc is also added to reflect this issue. --- gas/gen-sframe.c | 16 ++++++++++++ .../gas/cfi-sframe/cfi-sframe-aarch64-4.d | 25 +++++++++++++++++++ .../gas/cfi-sframe/cfi-sframe-aarch64-4.s | 23 +++++++++++++++++ gas/testsuite/gas/cfi-sframe/cfi-sframe.exp | 1 + 4 files changed, 65 insertions(+) create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.d create mode 100644 gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.s diff --git a/gas/gen-sframe.c b/gas/gen-sframe.c index be48b339609..041c4c7b83e 100644 --- a/gas/gen-sframe.c +++ b/gas/gen-sframe.c @@ -1282,6 +1282,19 @@ sframe_xlate_do_aarch64_negate_ra_state (struct sframe_xlate_ctx *xlate_ctx, return SFRAME_XLATE_OK; } +/* Translate DW_CFA_AARCH64_negate_ra_state_with_pc into SFrame context. + Return SFRAME_XLATE_OK if success. */ + +static int +sframe_xlate_do_aarch64_negate_ra_state_with_pc (struct sframe_xlate_ctx *xlate_ctx ATTRIBUTE_UNUSED, + struct cfi_insn_data *cfi_insn ATTRIBUTE_UNUSED) +{ + as_warn (_("skipping SFrame FDE; .cfi_negate_ra_state_with_pc")); + /* The used signing method should be encoded inside the FDE in SFrame v3. + For now, PAuth_LR extension is not supported with SFrame. */ + return SFRAME_XLATE_ERR_NOTREPRESENTED; /* Not represented. */ +} + /* Translate DW_CFA_GNU_window_save into SFrame context. DW_CFA_GNU_window_save is a DWARF Sparc extension, but is multiplexed with a directive of DWARF AArch64 extension: DW_CFA_AARCH64_negate_ra_state. @@ -1397,6 +1410,9 @@ sframe_do_cfi_insn (struct sframe_xlate_ctx *xlate_ctx, case DW_CFA_GNU_window_save: err = sframe_xlate_do_gnu_window_save (xlate_ctx, cfi_insn); break; + case DW_CFA_AARCH64_negate_ra_state_with_pc: + err = sframe_xlate_do_aarch64_negate_ra_state_with_pc (xlate_ctx, cfi_insn); + break; case DW_CFA_register: err = sframe_xlate_do_register (xlate_ctx, cfi_insn); break; diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.d b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.d new file mode 100644 index 00000000000..c81888b0021 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.d @@ -0,0 +1,25 @@ +#as: --gsframe +#objdump: --sframe=.sframe +#name: SFrame cfi_negate_ra_state_with_pc test +#warning: Warning: skipping SFrame FDE; \.cfi_negate_ra_state_with_pc + +## The support for .cfi_negate_ra_state_with_pc is currently pending on SFrame +## v3 (currently in development). The unimplemented support is reported to the +## user as a warning. Then the handler returns an error that will cause no +## creation of a SFrame FDE later (hence "Num FDEs: 0"). +## Note: this test will be expected to fail when the support of PAuth_LR in +## SFrame will be added, so will have to be fixed. + +#... +Contents of the SFrame section .sframe: + + Header : + + Version: SFRAME_VERSION_2 + Flags: NONE + Num FDEs: 0 + Num FREs: 0 + + Function Index : + +#pass diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.s b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.s new file mode 100644 index 00000000000..5fec6740047 --- /dev/null +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe-aarch64-4.s @@ -0,0 +1,23 @@ +## ARMv9.5 enhanced the existing PAuth feature with a new extensio called +## PAuth_LR. It aims at hardening the PAC in a signed return address. When +## signing the return address in LR, the PC is used as a diversifier, in +## addition to the SP to generate the PAC code. +## As for PAuth, when the pointers are mangled with PAuth_LR, the stack trace +## generator needs to know so it can mask off the PAC from the pointer value to +## recover the return address, and conversely, skip doing so if the pointers are +## not mangled. +## +## .cfi_negate_ra_state_with_pc CFI directive is used to convey this information. +## +## SFrame has currently no support for this. The support is expected in SFrame +## v3. This testcase ensures that the directive is understood, and outputs +## a warning to the user before failing to generate the FDE. + .cfi_startproc + .long 0 + .cfi_def_cfa_offset 16 + .cfi_negate_ra_state_with_pc + .long 0 + .cfi_offset 29, -16 + .cfi_offset 30, -8 + .long 0 + .cfi_endproc diff --git a/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp b/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp index c646b109895..162c2b4573d 100644 --- a/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp +++ b/gas/testsuite/gas/cfi-sframe/cfi-sframe.exp @@ -98,5 +98,6 @@ if { [istarget "aarch64*-*-*"] && [gas_sframe_check] } then { run_dump_test "cfi-sframe-aarch64-1" run_dump_test "cfi-sframe-aarch64-2" run_dump_test "cfi-sframe-aarch64-3" + run_dump_test "cfi-sframe-aarch64-4" run_dump_test "cfi-sframe-aarch64-pac-ab-key-1" }