From: Srinath Parvathaneni <Srinath.Parvathaneni@arm.com>
To: Alan Hayward <Alan.Hayward@arm.com>
Cc: "gdb-patches@sourceware.org" <gdb-patches@sourceware.org>,
nd <nd@arm.com>, Simon Marchi <simark@simark.ca>,
"tom@tromey.com" <tom@tromey.com>
Subject: Re: [PATCH v2][GDB][ARM]: gdb cannot step across CMSE secure entry function code.
Date: Fri, 19 Jul 2019 15:48:00 -0000 [thread overview]
Message-ID: <61e66c34-f3c4-0c1a-4af4-2cfe54821d55@arm.com> (raw)
In-Reply-To: <056372DC-9E53-4640-A97C-1E31DF1F53BA@arm.com>
On 7/19/19 3:58 PM, Alan Hayward wrote:
>
>
>> On 19 Jul 2019, at 13:23, Srinath Parvathaneni <Srinath.Parvathaneni@arm.com> wrote:
>>
>> Hello Alan, Simon and Tom.
>>
>> Thank you very much for reviewing my first patch to GDB and providing me your feedback.
>> https://sourceware.org/ml/gdb-patches/2019-07/msg00392.html
>>
>> I have incorporating all your review comments and sending a new patch here.
>>
>> Hello,
>>
>> GDB is not able to execute "step" command on function calls of Armv8-M cmse secure entry functions.
>> Everytime GNU linker come across definition of any cmse secure entry function in object file(s),
>> it creates two new instructions secure gateway (sg) and original branch destination (b.w),
>> place those two instructions in ".gnu.sgstubs" section of executable.
>> Any function calls to these cmse secure entry functions is re-directed through secure gateway (sg)
>> present in ".gnu.sgstubs" section.
>>
>> Example:
>> Following is a function call to cmse secure entry function "foo":
>> ...
>> bl xxxx <foo> --->(a)
>> ...
>> <foo>
>> xxxx: push {r7, lr}
>>
>> GNU linker on finding out "foo" is a cmse secure entry function, created sg and b.w instructions and
>> place them in ".gnu.sgstubs" section (marked by c).
>>
>> The "bl" instruction (marked by a) which is a call to cmse secure entry function is modified by GNU linker
>> (as marked by b) and call flow is re-directly through secure gateway (sg) in ".gnu.sgstubs" section.
>> ...
>> bl yyyy <foo> ---> (b)
>> ...
>> section .gnu.sgstubs: ---> (c)
>> yyyy <foo>
>> yyyy: sg // secure gateway
>> b.w xxxx <__acle_se_foo> // original_branch_dest
>> ...
>> 0000xxxx <__acle_se_foo>
>> xxxx: push {r7, lr} ---> (d)
>>
>> On invoking GDB, when the control is at "b" and we pass "step" command, the pc returns "yyyy"
>> (sg address) which is a trampoline and which does not exist in source code. So GDB jumps
>> to next line without jumping to "__acle_se_foo" (marked by d).
>>
>> The above details are published on the Arm website [1], please refer to section 5.4 (Entry functions)
>> and section 3.4.4 (C level development flow of secure code).
>>
>> [1] https://developer.arm.com/architectures/cpu-architecture/m-profile/docs/ecm0359818/latest/armv8-m-security-extensions-requirements-on-development-tools-engineering-specification
>>
>> This patch fixes above problem by returning target pc "xxxx" to GDB on executing "step"
>> command at "b", so that the control jumps to "__acle_se_foo" (marked by d).
>>
>> This patch is tested by debugging the CMSE executable using GDB on Aarch32 box.
>> Regression tested for armv7hl-redhat-linux-gnueabi and found no regressions.
>>
>> Ok for master? If ok, could someone commit this on my behalf,
>> I don't have the commit rights.
>
> LGTM.
> I tried the patch, and it works for me.
Thank you for the review.
> I’ll give it a few days for someone else to comment, and if not, then I'll commit
> early next week.
Understood and thank you once again.
> Thanks!
> Alan.
>
>
>
>>
>> gdb/ChangeLog:
>>
>> 2019-07-19 Srinath Parvathaneni <srinath.parvathaneni@arm.com>
>>
>> * gdb/arm-tdep.c (arm_skip_cmse_entry):New function. When gdb
>> encounters a "step" command on cmse secure entry function (eg:func),
>> this function return an address of "__acle_se_<func>" to PC instead
>> of secure gateaway (sg) address which is present in ".gnu.sgstubs"
>> section.
>> (arm_is_sgstubs_section):New function. To check the current section is
>> ".gnu.sgstubs".
>> (arm_skip_stub):Add call to arm_skip_cmse_entry function.
>> * gdb/arm-tdep.h (arm_is_sgstubs_section):New function declaration.
>>
>> gdb/testsuite/ChangeLog:
>>
>> 2019-07-19 Srinath Parvathaneni <srinath.parvathaneni@arm.com>
>>
>> * gdb.arch/arm-cmse-sgstubs.c: New test.
>> * gdb.arch/arm-cmse-sgstubs.exp: New file.
>>
>>
>>
>> ############### Attachment also inlined for ease of reply ###############
>>
>>
>> diff --git a/gdb/arm-tdep.h b/gdb/arm-tdep.h
>> index 23dd40ea8beb1b00289a4cd4e65647399d351580..9482e765a7fc5bb58676096f6b879eae2a7c858e 100644
>> --- a/gdb/arm-tdep.h
>> +++ b/gdb/arm-tdep.h
>> @@ -259,6 +259,7 @@ ULONGEST arm_get_next_pcs_read_memory_unsigned_integer (CORE_ADDR memaddr,
>>
>> CORE_ADDR arm_get_next_pcs_addr_bits_remove (struct arm_get_next_pcs *self,
>> CORE_ADDR val);
>> +bool arm_is_sgstubs_section (struct obj_section *);
>>
>> int arm_get_next_pcs_is_thumb (struct arm_get_next_pcs *self);
>>
>> diff --git a/gdb/arm-tdep.c b/gdb/arm-tdep.c
>> index d244707210628ab045f677c0cbad3d8b0c6d6269..e3b7ab6f096eb91da067d772b8798ffd0737e3d6 100644
>> --- a/gdb/arm-tdep.c
>> +++ b/gdb/arm-tdep.c
>> @@ -8211,6 +8211,53 @@ arm_get_longjmp_target (struct frame_info *frame, CORE_ADDR *pc)
>> *pc = extract_unsigned_integer (buf, INT_REGISTER_SIZE, byte_order);
>> return 1;
>> }
>> +/* A call to cmse secure entry function "foo" at "a" is modified by
>> + GNU ld as "b".
>> + a) bl xxxx <foo>
>> +
>> + <foo>
>> + xxxx:
>> +
>> + b) bl yyyy <__acle_se_foo>
>> +
>> + section .gnu.sgstubs:
>> + <foo>
>> + yyyy: sg // secure gateway
>> + b.w xxxx <__acle_se_foo> // original_branch_dest
>> +
>> + <__acle_se_foo>
>> + xxxx:
>> +
>> + When the control at "b", the pc contains "yyyy" (sg address) which is a
>> + trampoline and does not exist in source code. This function returns the
>> + target pc "xxxx". For more details please refer to section 5.4
>> + (Entry functions) and section 3.4.4 (C level development flow of secure code)
>> + of "armv8-m-security-extensions-requirements-on-development-tools-engineering-specification"
>> + document on www.developer.arm.com. */
>> +
>> +static CORE_ADDR
>> +arm_skip_cmse_entry (CORE_ADDR pc, const char *name, struct objfile *objfile)
>> +{
>> + struct bound_minimal_symbol minsym;
>> + int target_len = strlen (name) + strlen ("__acle_se_") + 1;
>> + char *target_name = (char *) alloca (target_len);
>> + xsnprintf (target_name, target_len, "%s%s", "__acle_se_",name);
>> + minsym = lookup_minimal_symbol (target_name, NULL, objfile);
>> + if (minsym.minsym != nullptr)
>> + return BMSYMBOL_VALUE_ADDRESS (minsym);
>> + return 0;
>> +}
>> +
>> +/* Return true when sec points to ".gnu.sgstubs" section. */
>> +bool
>> +arm_is_sgstubs_section (struct obj_section *sec)
>> +{
>> + if (sec != nullptr && sec->the_bfd_section != nullptr
>> + && sec->the_bfd_section->name != nullptr
>> + && streq (sec->the_bfd_section->name,".gnu.sgstubs"))
>> + return true;
>> + return false;
>> +}
>>
>> /* Recognize GCC and GNU ld's trampolines. If we are in a trampoline,
>> return the target PC. Otherwise return 0. */
>> @@ -8221,6 +8268,7 @@ arm_skip_stub (struct frame_info *frame, CORE_ADDR pc)
>> const char *name;
>> int namelen;
>> CORE_ADDR start_addr;
>> + struct obj_section *section;
>>
>> /* Find the starting address and name of the function containing the PC. */
>> if (find_pc_partial_function (pc, &name, &start_addr, NULL) == 0)
>> @@ -8290,6 +8338,10 @@ arm_skip_stub (struct frame_info *frame, CORE_ADDR pc)
>> return 0;
>> }
>>
>> + section = find_pc_section (pc);
>> + /* checks whether address pc holds belows to ".gnu.sgstubs" section. */
>> + if (arm_is_sgstubs_section (section))
>> + return arm_skip_cmse_entry (pc, name, section->objfile);
>> return 0;/* not a stub */
>> }
>>
>> diff --git a/gdb/testsuite/gdb.arch/arm-cmse-sgstubs.c b/gdb/testsuite/gdb.arch/arm-cmse-sgstubs.c
>> new file mode 100644
>> index 0000000000000000000000000000000000000000..7f3b40f20c67abfdd2410614e7ee29ae77d37966
>> --- /dev/null
>> +++ b/gdb/testsuite/gdb.arch/arm-cmse-sgstubs.c
>> @@ -0,0 +1,29 @@
>> +#include <stdio.h>
>> +extern void func();
>> +void __acle_se_func ()
>> +{
>> + printf("__acle_se_func\n");
>> +}
>> +
>> +/* The following code is written using asm so that the instructions in function
>> + * "func" will be placed in .gnu.sgstubs section of the executable. */
>> +asm ("\t.section .gnu.sgstubs,\"ax\",%progbits\n"
>> + "\t.global func\n"
>> + "\t.type func, %function\n"
>> + "func:\n"
>> + "\tnop @sg\n"
>> + "\tb __acle_se_func @b.w");
>> +
>> +void fun1 ()
>> +{
>> + printf("In fun1\n");
>> +}
>> +
>> +int main (void)
>> +{
>> + func();
>> + fun1();
>> + __acle_se_func();
>> + func();
>> + return 0;
>> +}
>> diff --git a/gdb/testsuite/gdb.arch/arm-cmse-sgstubs.exp b/gdb/testsuite/gdb.arch/arm-cmse-sgstubs.exp
>> new file mode 100644
>> index 0000000000000000000000000000000000000000..3416e887d9ebe5ebc52336eff15ba83a6d16df21
>> --- /dev/null
>> +++ b/gdb/testsuite/gdb.arch/arm-cmse-sgstubs.exp
>> @@ -0,0 +1,60 @@
>> +# Copyright 2019 Free Software Foundation, Inc.
>> +
>> +# This program is free software; you can redistribute it and/or modify
>> +# it under the terms of the GNU General Public License as published by
>> +# the Free Software Foundation; either version 3 of the License, or
>> +# (at your option) any later version.
>> +#
>> +# This program is distributed in the hope that it will be useful,
>> +# but WITHOUT ANY WARRANTY; without even the implied warranty of
>> +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
>> +# GNU General Public License for more details.
>> +#
>> +# You should have received a copy of the GNU General Public License
>> +# along with this program. If not, see <http://www.gnu.org/licenses/>.
>> +
>> +# This file is part of the gdb testsuite.
>> +
>> +if { ![istarget "arm*-*-*"]} {
>> + return 1
>> +}
>> +
>> +standard_testfile
>> +if { [prepare_for_testing "failed to prepare" $testfile $srcfile ]} {
>> + return -1
>> +}
>> +
>> +if ![runto_main] {
>> + untested "could not run to main"
>> + return -1
>> +}
>> +
>> +set test "branch to func from main"
>> +gdb_test "si" "0x.*" "$test"
>> +
>> +set test "next instruction in func"
>> +gdb_test "ni" "0x.*" "$test"
>> +
>> +set test "branch to __acle_se_func from func"
>> +gdb_test "ni" "__acle_se_func ().*" "${test}"
>> +
>> +set test "next in __acle_se_func function"
>> +gdb_test "next" "5 .*" "$test"
>> +
>> +set test "next in __acle_se_func function outputs __acle_se_func"
>> +gdb_test "next" "__acle_se_func.*" "$test"
>> +
>> +set test "next in __acle_se_func function controls returns to main"
>> +gdb_test "next" "main ().*" "$test"
>> +
>> +set test "next in main outputs In fun1"
>> +gdb_test "next" "In fun1.*" "$test"
>> +
>> +set test "next in main outputs __acle_se_func"
>> +gdb_test "next" "__acle_se_func.*" "$test"
>> +
>> +set test "control jumps to __acle_se_func from main via func"
>> +gdb_test "step" "__acle_se_func ().*" "${test}"
>> +
>> +set test "next in __acle_se_func function via func"
>> +gdb_test "next" "__acle_se_func.*" "$test"
>>
>> <rb11415.patch>
>
next prev parent reply other threads:[~2019-07-19 15:48 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-07-19 12:23 Srinath Parvathaneni
2019-07-19 14:58 ` Alan Hayward
2019-07-19 15:48 ` Srinath Parvathaneni [this message]
2019-07-19 16:24 ` Simon Marchi
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=61e66c34-f3c4-0c1a-4af4-2cfe54821d55@arm.com \
--to=srinath.parvathaneni@arm.com \
--cc=Alan.Hayward@arm.com \
--cc=gdb-patches@sourceware.org \
--cc=nd@arm.com \
--cc=simark@simark.ca \
--cc=tom@tromey.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox