From patchwork Mon Jan 27 18:13:36 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Luis Machado X-Patchwork-Id: 182983 Delivered-To: patch@linaro.org Received: by 2002:a92:1f12:0:0:0:0:0 with SMTP id i18csp4070978ile; Mon, 27 Jan 2020 10:13:56 -0800 (PST) X-Google-Smtp-Source: APXvYqz+731P90rQcvgM4jjn3Cw19HxHpdpC1qAjNUqdJIchlQQyX1uasDMBeIo5mMXCAHBn5MPR X-Received: by 2002:aca:cc07:: with SMTP id c7mr189734oig.165.1580148835941; Mon, 27 Jan 2020 10:13:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580148835; cv=none; d=google.com; s=arc-20160816; b=Cv0qNAhhjBnEuzM7SSahzOI36GXJYOwxb5KPQ9OAR1s0ec/JCeb99AI8Oka6smMmLu WcpQJ6NOF+w6Lxma48pH7WfbH6lElGv5fTuLDVc0gT2FJEb9yUlZKHcHLJFcCUnUNJ/7 CwLH5YiQTd2wbdkuSDwdRT2MX0qL3XTohlbhnbR2lPusFNNsP5r7bUPzLahntBmoJ5uB ZKlUyffWlE25dh0p9evMBwiTupoeRqZfQSB/V/uWYnKRVpU0A4cXw0rasqrznCtVXrwN o5O4h08Zys7QppE461eblYdY6SEJjx3uxWloHCNiSATv8CANXW9i78dk4GRKU2Cwomz1 Rfwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:delivered-to:sender:list-help:list-post:list-archive :list-subscribe:list-unsubscribe:list-id:precedence:mailing-list :dkim-signature:domainkey-signature; bh=t/2GARqaC7ctfP0PI6Y+HZEZVZgQ1giglOnmXZrsYz8=; b=vg7VmGDz+mapdWit0nKhOg9hOVhG0VdwpYDv1HlO5kB0NWgwDxe77S5jkG8sFwP4eR G1OasTiIyFoxlO1R3OSnQTiD1K+/XG5X0HX2XkqPHmTDLXumSCbMCY0kDkYpeXngo+0j vZc1+40r8pIF4tqOC8hQG/3TgVkHlJTIl3H+w3VgpoPUeDE62+ZKY3uv5guhrsfmmGXv hskUG3hrczdMbLEyDHQQgiYwyu0ZgeCuk/aa7jAbJHnUb+Nt2ih7BoHj5/yUXIr9mRek Z/70DpW1jIug9lp75aJKJsm7yRRq1e303UlK9iZ6AhfI7zJj7PnBAOfH+JpLeHdhK0B9 IKeg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sourceware.org header.s=default header.b=EXisvKFf; dkim=pass header.i=@linaro.org header.s=google header.b=cq8gM19l; spf=pass (google.com: domain of gdb-patches-return-163569-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) smtp.mailfrom="gdb-patches-return-163569-patch=linaro.org@sourceware.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from sourceware.org (server1.sourceware.org. [209.132.180.131]) by mx.google.com with ESMTPS id h125si4054371oia.253.2020.01.27.10.13.55 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 27 Jan 2020 10:13:55 -0800 (PST) Received-SPF: pass (google.com: domain of gdb-patches-return-163569-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) client-ip=209.132.180.131; Authentication-Results: mx.google.com; dkim=pass header.i=@sourceware.org header.s=default header.b=EXisvKFf; dkim=pass header.i=@linaro.org header.s=google header.b=cq8gM19l; spf=pass (google.com: domain of gdb-patches-return-163569-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) smtp.mailfrom="gdb-patches-return-163569-patch=linaro.org@sourceware.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:cc:subject:date:message-id:in-reply-to :references; q=dns; s=default; b=PvAzCPvKj0K7yuSr7lG8etM8XnyKjXF SPgyc6tZyHbfZtZt7IcWt0DTmxDmATiLv8hBij7tVP3k22La0YJBz/pcptuTXlQV kHPA/jRB/EH685B+lcuLOjhU4egEWioYOJaMYsTkp4hul3OwEKtk8vtQ9ZQ+H4l1 erw5rrHS+EAU= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:cc:subject:date:message-id:in-reply-to :references; s=default; bh=aWtx3pMCBRGLR7wnBOgQpA9hDQo=; b=EXisv KFfKVz72K1cx0AgztmiD+qE7Sjkn5hYeN5O6b7A0tGGJ9g9BZsHIsns70oqT888i YUNYBYbALxuFTCoRkS5xYYM2zVdJpUlHOQnA5bLH324oYewwjbyCOxLA2T3TyLxB b9EbG/PLSmGiD63LxwA8MRqWNtWd3ZIRqCuIpo= Received: (qmail 40522 invoked by alias); 27 Jan 2020 18:13:49 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Delivered-To: mailing list gdb-patches@sourceware.org Received: (qmail 40514 invoked by uid 89); 27 Jan 2020 18:13:48 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-17.7 required=5.0 tests=AWL, BAYES_00, GIT_PATCH_0, GIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, KAM_SHORT, RCVD_IN_DNSWL_NONE, SPF_PASS autolearn=ham version=3.3.1 spammy=rewrote, Breakpoint, couples, landing X-HELO: mail-qk1-f194.google.com Received: from mail-qk1-f194.google.com (HELO mail-qk1-f194.google.com) (209.85.222.194) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Mon, 27 Jan 2020 18:13:46 +0000 Received: by mail-qk1-f194.google.com with SMTP id w25so4872821qki.3 for ; Mon, 27 Jan 2020 10:13:45 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=t/2GARqaC7ctfP0PI6Y+HZEZVZgQ1giglOnmXZrsYz8=; b=cq8gM19leGWmpcVJl6w6R5GlJLvBYSHqndmiIpN6WVTT3huhB7KaP5YKdBC2kcvzEZ j+PwSLdYK0F3qHp9N4FYKtDucaq8tAWzWFcXOwws723+Mr4vbvtzC4+FMLXAtuXM1qfZ DJhb5XmbfcxiUlfyCZ7hEU05dNu3fviNcYgDUV6Jqo5bSxvQ4ma7gDKl4LRa0HVPx28x S4ga1l4wBaGUoUPYzDNQOiOI2kftuYNw1WCBcQccsTfP09qwjwMBtscLzW1zxBLVMkj/ SwWDVBwCTxndLeTJ7rkIf3U5zD+qqrSK184tqkN99SsGZVrmup5BFYquWuSmqZLfx8mo Z/ow== Return-Path: Received: from localhost.localdomain ([191.34.221.247]) by smtp.gmail.com with ESMTPSA id v1sm9695237qkg.90.2020.01.27.10.13.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 Jan 2020 10:13:42 -0800 (PST) From: Luis Machado To: gdb-patches@sourceware.org Cc: Alan.Hayward@arm.com, simark@simark.ca Subject: [PATCH v3] Harden gdb.base/step-over-syscall.exp Date: Mon, 27 Jan 2020 15:13:36 -0300 Message-Id: <20200127181336.13893-1-luis.machado@linaro.org> In-Reply-To: <20200115203645.26360-1-luis.machado@linaro.org> References: <20200115203645.26360-1-luis.machado@linaro.org> X-IsSubscribed: yes I decided to take another shot at validating the syscall numbers. It was a good testsuite exercise and nice to see some of the differences between targets. Updated to check the syscall numbers and confirmed it works by running tests on the buildbot. New in v3: - Verify if the syscall number matches what is expected for the target. - Used gdb_assert for one more check. --- New in v2: - Set initial values to -1 instead of 0. - Rewrote RE to prevent unexpected matching when parsing one character at a time. - Used gdb_assert for an additional check. - Validated with check-read1 --- There are a couple problems with this test. First -- gdb.base/step-over-syscall.exp records the address of a syscall instruction within fork/vfork/clone functions and also the address of the instruction after that syscall instruction. It uses these couples addresses to make sure we stepped over a syscall instruction (fork/vfork/clone events) correctly. The way the test fetches the addresses of the instructions is by stepi-ing its way through the fork/vfork/clone functions until it finds a match for a syscall. Then it stepi's once again to get the address of the next instruction. This assumes that stepi-ing over a syscall is working correctly and landing in the right PC. This is not the case for AArch64/Linux, where we're landing a couple instructions after the syscall in some cases. The following patch lets the test execute as before, but adds a new instruction address check using the x command as opposed to stepi. I didn't want to change how the test works since we may also be interested in checking if stepi-ing over the syscall under different conditions (displaced stepping on/off) yields the same results. I don't feel strongly about this, so i'm OK with changing how we compare PC's for the entire test if folks decide it is reasonable. Second -- FAIL: gdb.base/step-over-syscall.exp: vfork: displaced=off: continue to vfork (3rd time) (the program exited) FAIL: gdb.base/step-over-syscall.exp: vfork: displaced=off: continue to syscall insn vfork (the program is no longer running) FAIL: gdb.base/step-over-syscall.exp: vfork: displaced=off: single step over vfork (the program is no longer running) Depending on the glibc version we may have different code generated for the fork/vfork/clone functions. I ran into the situation where vfork for newer glibc's on AArch64/Linux is very short, so "break vfork" will put a breakpoint right at the syscall instruction, which is something the testcase isn't expecting (a off-by-1 of sorts). The patch adds extra code to handle this case. If the test detects we're already sitting at a syscall instruction, it records the address and moves on to record the address after that particular instruction. Another measure is to "break *$syscall" instead of "break $syscall". That guarantees we're stopping at the first instruction of the syscall function, if it ever happens that the syscall instruction is the first instruction of those functions. With these changes i can fix some failures for aarch64-linux-gnu and also expose the problems i've reported here: https://sourceware.org/ml/gdb-patches/2019-12/msg01071.html These tests now fail for aarch64-linux-gnu (patch for this is going through reviews): FAIL: gdb.base/step-over-syscall.exp: vfork: displaced=off: pc after stepi matches insn addr after syscall FAIL: gdb.base/step-over-syscall.exp: vfork: displaced=on: pc after stepi matches insn addr after syscall gdb/testsuite/ChangeLog: 2020-01-24 Luis Machado * gdb.base/step-over-syscall.exp (setup): Check if we're already sitting at a syscall instruction when we hit the syscall function's breakpoint. Check PC against one obtained with the x command. (step_over_syscall): Don't continue to the syscall instruction if we're already there. --- gdb/testsuite/gdb.base/step-over-syscall.exp | 135 ++++++++++++++----- 1 file changed, 102 insertions(+), 33 deletions(-) -- 2.17.1 diff --git a/gdb/testsuite/gdb.base/step-over-syscall.exp b/gdb/testsuite/gdb.base/step-over-syscall.exp index b373c169c0..190b8fb066 100644 --- a/gdb/testsuite/gdb.base/step-over-syscall.exp +++ b/gdb/testsuite/gdb.base/step-over-syscall.exp @@ -16,13 +16,27 @@ # along with this program. If not, see . set syscall_insn "" +set syscall_register "" +array set syscall_number {} -# Define the syscall instruction for each target. +# Define the syscall instructions, registers and numbers for each target. if { [istarget "i\[34567\]86-*-linux*"] || [istarget "x86_64-*-linux*"] } { set syscall_insn "\[ \t\](int|syscall|sysenter)\[ \t\]" + set syscall_register "eax" + array set syscall_number {fork "(56|120)" vfork "(58|190)" \ + clone "(56|120)"} } elseif { [istarget "aarch64*-*-linux*"] || [istarget "arm*-*-linux*"] } { set syscall_insn "\[ \t\](swi|svc)\[ \t\]" + + if { [istarget "aarch64*-*-linux*"] } { + set syscall_register "x8" + } else { + set syscall_register "r7" + } + + array set syscall_number {fork "(120|220)" vfork "(190|220)" \ + clone "(120|220)"} } else { return -1 } @@ -30,13 +44,22 @@ if { [istarget "i\[34567\]86-*-linux*"] || [istarget "x86_64-*-linux*"] } { proc_with_prefix check_pc_after_cross_syscall { syscall syscall_insn_next_addr } { set syscall_insn_next_addr_found [get_hexadecimal_valueof "\$pc" "0"] - set test "single step over $syscall final pc" - if {$syscall_insn_next_addr != 0 - && $syscall_insn_next_addr == $syscall_insn_next_addr_found} { - pass $test - } else { - fail $test - } + gdb_assert {$syscall_insn_next_addr != 0 \ + && $syscall_insn_next_addr == $syscall_insn_next_addr_found} \ + "single step over $syscall final pc" +} + +# Verify the syscall number is the correct one. + +proc syscall_number_matches { syscall } { + global syscall_register syscall_number + + if {[gdb_test "p \$$syscall_register" ".*= $syscall_number($syscall)" \ + "syscall number matches"] != 0} { + return 0 + } + + return 1 } # Restart GDB and set up the test. Return a list in which the first one @@ -47,6 +70,8 @@ proc_with_prefix check_pc_after_cross_syscall { syscall syscall_insn_next_addr } proc setup { syscall } { global gdb_prompt syscall_insn + global hex + set next_insn_addr -1 set testfile "step-over-$syscall" clean_restart $testfile @@ -62,7 +87,7 @@ proc setup { syscall } { gdb_test_no_output "set displaced-stepping off" \ "set displaced-stepping off during test setup" - gdb_test "break $syscall" "Breakpoint \[0-9\]* at .*" + gdb_test "break \*$syscall" "Breakpoint \[0-9\]* at .*" gdb_test "continue" "Continuing\\..*Breakpoint \[0-9\]+, (.* in |__libc_|)$syscall \\(\\).*" \ "continue to $syscall (1st time)" @@ -75,39 +100,78 @@ proc setup { syscall } { # Hit the breakpoint on $syscall for the second time. In this time, # the address of syscall insn and next insn of syscall are recorded. - gdb_test "display/i \$pc" ".*" + # Check if the first instruction we stopped at is the syscall one. + set syscall_insn_addr -1 + gdb_test_multiple "display/i \$pc" "fetch first stop pc" { + -re "display/i .*: x/i .*=> ($hex) .*:.*$syscall_insn.*$gdb_prompt $" { + set insn_addr $expect_out(1,string) - # Single step until we see a syscall insn or we reach the - # upper bound of loop iterations. - set msg "find syscall insn in $syscall" - set steps 0 - set max_steps 1000 - gdb_test_multiple "stepi" $msg { - -re ".*$syscall_insn.*$gdb_prompt $" { - pass $msg + # Is the syscall number the correct one? + if {[syscall_number_matches $syscall]} { + set syscall_insn_addr $insn_addr + } + pass $gdb_test_name } - -re "x/i .*=>.*\r\n$gdb_prompt $" { - incr steps - if {$steps == $max_steps} { - fail $msg - } else { - send_gdb "stepi\n" - exp_continue + -re ".*$gdb_prompt $" { + pass $gdb_test_name + } + } + + # If we are not at the syscall instruction yet, keep looking for it with + # stepi commands. + if {$syscall_insn_addr == -1} { + # Single step until we see a syscall insn or we reach the + # upper bound of loop iterations. + set msg "find syscall insn in $syscall" + set steps 0 + set max_steps 1000 + gdb_test_multiple "stepi" $msg { + -re ".*$syscall_insn.*$gdb_prompt $" { + # Is the syscall number the correct one? + if {[syscall_number_matches $syscall]} { + pass $gdb_test_name + } else { + exp_continue + } } + -re "x/i .*=>.*\r\n$gdb_prompt $" { + incr steps + if {$steps == $max_steps} { + fail $gdb_test_name + } else { + send_gdb "stepi\n" + exp_continue + } + } + } + + if {$steps == $max_steps} { + return { -1, -1 } } } - if {$steps == $max_steps} { - return { -1, -1 } + # We have found the syscall instruction. Now record the next instruction. + # Use the X command instead of stepi since we can't guarantee + # stepi is working properly. + gdb_test_multiple "x/2i \$pc" "pc before/after syscall instruction" { + -re "x/2i .*=> ($hex) .*:.*$syscall_insn.* ($hex) .*:.*$gdb_prompt $" { + set syscall_insn_addr $expect_out(1,string) + set next_insn_addr $expect_out(3,string) + pass $gdb_test_name + } } - set syscall_insn_addr [get_hexadecimal_valueof "\$pc" "0" \ - "pc before stepi"] if {[gdb_test "stepi" "x/i .*=>.*" "stepi $syscall insn"] != 0} { return { -1, -1 } } - return [list $syscall_insn_addr [get_hexadecimal_valueof "\$pc" \ - "0" "pc after stepi"]] + + set pc_after_stepi [get_hexadecimal_valueof "\$pc" "0" \ + "pc after stepi"] + + gdb_assert {$next_insn_addr == $pc_after_stepi} \ + "pc after stepi matches insn addr after syscall" + + return [list $syscall_insn_addr $pc_after_stepi] } proc step_over_syscall { syscall } { @@ -156,8 +220,13 @@ proc step_over_syscall { syscall } { } } - gdb_test "continue" "Continuing\\..*Breakpoint \[0-9\]+, .*" \ - "continue to syscall insn $syscall" + # Check if the syscall breakpoint is at the syscall instruction + # address. If so, no need to continue, otherwise we will run the + # inferior to completion. + if {$syscall_insn_addr != [get_hexadecimal_valueof "\$pc" "0"]} { + gdb_test "continue" "Continuing\\..*Breakpoint \[0-9\]+, .*" \ + "continue to syscall insn $syscall" + } gdb_test_no_output "set displaced-stepping $displaced"