blob: b289b8482774cabe411356402c83fe3547f8a7b7 [file] [log] [blame] [edit]
# Copyright 2020-2025 Free Software Foundation, Inc.
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
# Test skipping a prologue that was generated with gcc's -fcf-protection=full
# (control flow protection) option.
#
# This option places an `endbr32`/`endbr64` instruction at the start of
# all functions, which can interfere with prologue analysis.
standard_testfile .c -stackalign.c
require {is_any_target x86_64-*-* i?86-*-*}
require supports_fcf_protection
# Tests if breakpoint set on main is placed past main's entry.
proc test_run {} {
# Get start address of function main.
set main_addr [get_integer_valueof &main -1]
gdb_assert {$main_addr != -1}
set bp_addr -1
# Put breakpoint on main, get the address where the breakpoint was installed.
gdb_test_multiple "break -q main" "break on main, get address" {
-re -wrap "Breakpoint $::decimal at ($::hex).*" {
set bp_addr $expect_out(1,string)
# Convert to decimal.
set bp_addr [expr $bp_addr]
pass $gdb_test_name
}
}
# Make sure some prologue was skipped.
gdb_assert {$bp_addr != -1 && $bp_addr > $main_addr} \
"breakpoint placed past main's entry"
}
with_test_prefix "skip-cf-protection" {
set opts {debug additional_flags=-fcf-protection=full}
if { [gdb_compile "${srcdir}/${subdir}/${srcfile}" "${binfile}" executable \
$opts] != "" } {
untested "failed to compile"
return
}
clean_restart ${::testfile}
test_run
}
# Now, make sure that the prologue analysis does not end up at function's entry
# when stack alignment sequence is generated right after 'endbr64'/'endbr32'.
# That could happen if GDB handled those incorrectly - there was a bug that
# checked for those two in incorrect order, which caused such issue.
with_test_prefix "skip-cf-protection-stackalign" {
# gcc is easier to make it produce the sequence of interest.
if { ![is_c_compiler_gcc] } {
unsupported "stackalign test part requires gcc compiler"
return
}
if { [prepare_for_testing "failed to prepare" "${testfile}-stackalign" \
$srcfile2 [list optimize=-O0 additional_flags=-fcf-protection=full]] } {
return
}
test_run
}