aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--gdb/ChangeLog7
-rw-r--r--gdb/amd64-tdep.c7
-rw-r--r--gdb/doc/ChangeLog5
-rw-r--r--gdb/doc/gdb.texinfo29
-rw-r--r--gdb/i386-tdep.c7
-rw-r--r--gdb/i387-tdep.c17
-rw-r--r--gdb/i387-tdep.h4
-rw-r--r--gdb/testsuite/ChangeLog5
-rw-r--r--gdb/testsuite/gdb.arch/i386-mpx-call.c131
-rw-r--r--gdb/testsuite/gdb.arch/i386-mpx-call.exp387
10 files changed, 599 insertions, 0 deletions
diff --git a/gdb/ChangeLog b/gdb/ChangeLog
index ddfc94f..aa592d5 100644
--- a/gdb/ChangeLog
+++ b/gdb/ChangeLog
@@ -1,3 +1,10 @@
+2017-03-07 Walfred Tedeschi <walfred.tedeschi@intel.com>
+
+ * i387-tdep.h (i387_reset_bnd_regs): Add function definition.
+ * i387-tdep.c (i387_reset_bnd_regs): Add function implementation.
+ * i386-tdep.c (i386_push_dummy_call): Call i387_reset_bnd_regs.
+ * amd64-tdep (amd64_push_dummy_call): Call i387_reset_bnd_regs.
+
2017-03-06 Simon Marchi <simon.marchi@ericsson.com>
* xtensa-linux-nat.c (fetch_gregs): Remove const.
diff --git a/gdb/amd64-tdep.c b/gdb/amd64-tdep.c
index 4da71e5..98710fe 100644
--- a/gdb/amd64-tdep.c
+++ b/gdb/amd64-tdep.c
@@ -1004,6 +1004,13 @@ amd64_push_dummy_call (struct gdbarch *gdbarch, struct value *function,
enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
gdb_byte buf[8];
+ /* BND registers can be in arbitrary values at the moment of the
+ inferior call. This can cause boundary violations that are not
+ due to a real bug or even desired by the user. The best to be done
+ is set the BND registers to allow access to the whole memory, INIT
+ state, before pushing the inferior call. */
+ i387_reset_bnd_regs (gdbarch, regcache);
+
/* Pass arguments. */
sp = amd64_push_arguments (regcache, nargs, args, sp, struct_return);
diff --git a/gdb/doc/ChangeLog b/gdb/doc/ChangeLog
index 17cd97f..ed41c05 100644
--- a/gdb/doc/ChangeLog
+++ b/gdb/doc/ChangeLog
@@ -1,3 +1,8 @@
+2017-03-07 Walfred Tedeschi <walfred.tedeschi@intel.com>
+
+ * Memory Protection Extensions: Add information about inferior
+ calls.
+
2017-02-20 Jan Kratochvil <jan.kratochvil@redhat.com>
* gdb.texinfo (Print Settings, Tail Call Frames): Rename DW_OP_GNU_*,
diff --git a/gdb/doc/gdb.texinfo b/gdb/doc/gdb.texinfo
index f19e80f..ba56ab2 100644
--- a/gdb/doc/gdb.texinfo
+++ b/gdb/doc/gdb.texinfo
@@ -22552,6 +22552,35 @@ whose bounds are to be changed, @var{lbound} and @var{ubound} are new values
for lower and upper bounds respectively.
@end table
+When you call an inferior function on an Intel MPX enabled program,
+GDB sets the inferior's bound registers to the init (disabled) state
+before calling the function. As a consequence, bounds checks for the
+pointer arguments passed to the function will always pass.
+
+This is necessary because when you call an inferior function, the
+program is usually in the middle of the execution of other function.
+Since at that point bound registers are in an arbitrary state, not
+clearing them would lead to random bound violations in the called
+function.
+
+You can still examine the influence of the bound registers on the
+execution of the called function by stopping the execution of the
+called function at its prologue, setting bound registers, and
+continuing the execution. For example:
+
+@smallexample
+ $ break *upper
+ Breakpoint 2 at 0x4009de: file i386-mpx-call.c, line 47.
+ $ print upper (a, b, c, d, 1)
+ Breakpoint 2, upper (a=0x0, b=0x6e0000005b, c=0x0, d=0x0, len=48)....
+ $ print $bnd0
+ {lbound = 0x0, ubound = ffffffff} : size -1
+@end smallexample
+
+At this last step the value of bnd0 can be changed for investigation of bound
+violations caused along the execution of the call. In order to know how to
+set the bound registers or bound table for the call consult the ABI.
+
@node Alpha
@subsection Alpha
diff --git a/gdb/i386-tdep.c b/gdb/i386-tdep.c
index c81f3e0..ec8b5d3 100644
--- a/gdb/i386-tdep.c
+++ b/gdb/i386-tdep.c
@@ -2684,6 +2684,13 @@ i386_push_dummy_call (struct gdbarch *gdbarch, struct value *function,
int write_pass;
int args_space = 0;
+ /* BND registers can be in arbitrary values at the moment of the
+ inferior call. This can cause boundary violations that are not
+ due to a real bug or even desired by the user. The best to be done
+ is set the BND registers to allow access to the whole memory, INIT
+ state, before pushing the inferior call. */
+ i387_reset_bnd_regs (gdbarch, regcache);
+
/* Determine the total space required for arguments and struct
return address in a first pass (allowing for 16-byte-aligned
arguments), then push arguments in a second pass. */
diff --git a/gdb/i387-tdep.c b/gdb/i387-tdep.c
index c986e39..9206109 100644
--- a/gdb/i387-tdep.c
+++ b/gdb/i387-tdep.c
@@ -1860,3 +1860,20 @@ i387_return_value (struct gdbarch *gdbarch, struct regcache *regcache)
regcache_raw_write_unsigned (regcache, I387_FTAG_REGNUM (tdep), 0x3fff);
}
+
+/* See i387-tdep.h. */
+
+void
+i387_reset_bnd_regs (struct gdbarch *gdbarch, struct regcache *regcache)
+{
+ struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
+
+ if (I387_BND0R_REGNUM (tdep) > 0)
+ {
+ gdb_byte bnd_buf[16];
+
+ memset (bnd_buf, 0, 16);
+ for (int i = 0; i < I387_NUM_BND_REGS; i++)
+ regcache_raw_write (regcache, I387_BND0R_REGNUM (tdep) + i, bnd_buf);
+ }
+}
diff --git a/gdb/i387-tdep.h b/gdb/i387-tdep.h
index 6a97e4f..0455130 100644
--- a/gdb/i387-tdep.h
+++ b/gdb/i387-tdep.h
@@ -161,4 +161,8 @@ extern void i387_collect_xsave (const struct regcache *regcache,
extern void i387_return_value (struct gdbarch *gdbarch,
struct regcache *regcache);
+/* Set all bnd registers to the INIT state. INIT state means
+ all memory range can be accessed. */
+extern void i387_reset_bnd_regs (struct gdbarch *gdbarch,
+ struct regcache *regcache);
#endif /* i387-tdep.h */
diff --git a/gdb/testsuite/ChangeLog b/gdb/testsuite/ChangeLog
index cb8bf53..33d3b15 100644
--- a/gdb/testsuite/ChangeLog
+++ b/gdb/testsuite/ChangeLog
@@ -1,3 +1,8 @@
+2017-03-07 Walfred Tedeschi <walfred.tedeschi@intel.com>
+
+ * i386-mpx-call.c: New file.
+ * i386-mpx-call.exp: New file.
+
2017-02-28 Peter Bergner <bergner@vnet.ibm.com>
* gdb.arch/powerpc-power.exp: Delete test.
diff --git a/gdb/testsuite/gdb.arch/i386-mpx-call.c b/gdb/testsuite/gdb.arch/i386-mpx-call.c
new file mode 100644
index 0000000..52e6570
--- /dev/null
+++ b/gdb/testsuite/gdb.arch/i386-mpx-call.c
@@ -0,0 +1,131 @@
+/* Test for inferior function calls MPX context.
+
+ Copyright (C) 2017 Free Software Foundation, Inc.
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <http://www.gnu.org/licenses/>. */
+
+#include <stdlib.h>
+#include <string.h>
+#include "x86-cpuid.h"
+
+/* Defined size for arrays. */
+#define ARRAY_LENGTH 5
+
+unsigned int
+have_mpx (void)
+{
+ unsigned int eax, ebx, ecx, edx;
+
+ if (!__get_cpuid (1, &eax, &ebx, &ecx, &edx))
+ return 0;
+
+ if ((ecx & bit_OSXSAVE) == bit_OSXSAVE)
+ {
+ if (__get_cpuid_max (0, NULL) < 7)
+ return 0;
+
+ __cpuid_count (7, 0, eax, ebx, ecx, edx);
+
+ if ((ebx & bit_MPX) == bit_MPX)
+ return 1;
+ else
+ return 0;
+ }
+ return 0;
+}
+
+
+int
+upper (int *a, int *b, int *c, int *d, int len)
+{
+ int value;
+
+ value = *(a + len);
+ value = *(b + len);
+ value = *(c + len);
+ value = *(d + len);
+
+ value = value - *a + 1;
+ return value;
+}
+
+
+int
+lower (int *a, int *b, int *c, int *d, int len)
+{
+ int value;
+
+ value = *(a - len);
+ value = *(b - len);
+ value = *(c - len);
+ value = *(d - len);
+
+ value = value - *a + 1;
+ return value;
+}
+
+
+char
+char_upper (char *str, int length)
+{
+ char ch;
+ ch = *(str + length);
+
+ return ch;
+}
+
+
+char
+char_lower (char *str, int length)
+{
+ char ch;
+ ch = *(str - length);
+
+ return ch;
+}
+
+
+int
+main (void)
+{
+ if (have_mpx ())
+ {
+ int sa[ARRAY_LENGTH];
+ int sb[ARRAY_LENGTH];
+ int sc[ARRAY_LENGTH];
+ int sd[ARRAY_LENGTH];
+ int *x, *a, *b, *c, *d;
+ char mchar;
+ char hello[] = "Hello";
+
+ x = malloc (sizeof (int) * ARRAY_LENGTH);
+ a = malloc (sizeof (int) * ARRAY_LENGTH);
+ b = malloc (sizeof (int) * ARRAY_LENGTH);
+ c = malloc (sizeof (int) * ARRAY_LENGTH);
+ d = malloc (sizeof (int) * ARRAY_LENGTH);
+
+ *x = upper (sa, sb, sc, sd, 0); /* bkpt 1. */
+ *x = lower (a, b, c, d, 0);
+
+ mchar = char_upper (hello, 10);
+ mchar = char_lower (hello, 10);
+
+ free (x);
+ free (a);
+ free (b);
+ free (c);
+ free (d);
+ }
+ return 0;
+}
diff --git a/gdb/testsuite/gdb.arch/i386-mpx-call.exp b/gdb/testsuite/gdb.arch/i386-mpx-call.exp
new file mode 100644
index 0000000..cd8eec4
--- /dev/null
+++ b/gdb/testsuite/gdb.arch/i386-mpx-call.exp
@@ -0,0 +1,387 @@
+# Copyright (C) 2017 Free Software Foundation, Inc.
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
+
+
+if { ![istarget i?86-*-*] && ![istarget x86_64-*-* ] } {
+ untested "skipping x86 MPX tests."
+ return
+}
+
+standard_testfile
+
+set comp_flags "-mmpx -fcheck-pointer-bounds -I${srcdir}/../nat"
+
+if {[prepare_for_testing "failed to prepare" ${testfile} ${srcfile} \
+ [list debug additional_flags=${comp_flags}]] } {
+ return -1
+}
+
+if ![runto_main] {
+ untested "could not run to main"
+ return -1
+}
+
+set test "check whether processor supports MPX"
+gdb_test_multiple "print have_mpx ()" $test {
+ -re ".*= 1\r\n$gdb_prompt " {
+ pass $test
+ }
+ -re ".*= 0\r\n$gdb_prompt " {
+ pass $test
+ untested "processor does not support MPX; skipping tests"
+ return
+ }
+}
+
+# Convenience for returning from an inferior call that causes a BND violation.
+#
+gdb_test_no_output "set confirm off"
+
+# Convenience variable.
+#
+set bound_reg " = \\\{lbound = $hex, ubound = $hex\\\}.*"
+set int_braw_reg " = \\\{lbound = 0x0, ubound_raw = 0x0\\\}.*"
+set bndcfg_reg " = \\\{raw = $hex, config = \\\{base = $hex, reserved = $hex,\
+ preserved = $hex, enabled = $hex\\\}\\\}"
+set bndstatus_reg " = \\\{raw = $hex, status = \\\{bde = $hex,\
+ error = $hex\\\}\\\}"
+set u_fault [multi_line "Program received signal SIGSEGV, Segmentation fault" \
+ "Upper bound violation while accessing address $hex" \
+ "Bounds: \\\[lower = $hex, upper = $hex\\\]"]
+
+
+# Simplify the tests below.
+#
+proc sanity_check_bndregs {arglist} {
+
+ global int_braw_reg
+
+ foreach a $arglist {
+ gdb_test "p /x $a" "$int_braw_reg"\
+ "$a"
+ }
+}
+
+# Set bnd register to have no access to memory.
+#
+proc remove_memory_access {reg} {
+ global hex
+
+ sanity_check_bndregs {"\$bnd0raw" "\$bnd1raw" "\$bnd2raw" "\$bnd3raw"}
+
+ gdb_test "p /x $reg.lbound = $reg.ubound" "= $hex"\
+ "$reg lower bound set"
+ gdb_test "p /x $reg.ubound = 0" " = 0x0"\
+ "$reg upper bound set"
+}
+
+
+# Prepare convenience variables for bndconfig and status
+# for posterior comparison.
+#
+proc prepare_bndcfg_bndstatus {} {
+
+ global bndcfg_reg
+ global bndstatus_reg
+
+ gdb_test "p /x \$temp_bndcfgu = \$bndcfgu" "$bndcfg_reg"\
+ "bndcfgu should not change"
+
+ gdb_test "p /x \$temp_bndstatus = \$bndstatus" "$bndstatus_reg"\
+ "bndstatus should not change"
+}
+
+# Compare values set for convenience variables and actual values of bndconfig
+# and bndstatus registers.
+#
+proc compare_bndstatus_with_convenience {} {
+
+ gdb_test "p \$temp_bndcfgu == \$bndcfgu" "= 1"\
+ "bndcfgu compare before and after"
+ gdb_test "p \$temp_bndstatus == \$bndstatus" "= 1"\
+ "bndstatus compare before and after"
+}
+
+# Perform an inferior call defined in func.
+#
+proc perform_a_call {func} {
+
+ global inf_call_stopped
+ global gdb_prompt
+
+ gdb_test "p /x $func" [multi_line "The program being debugged\
+ stopped while in a function called from GDB." \
+ "Evaluation of the expression containing the\
+ function.*" \
+ ] "inferior call stopped"
+}
+
+# Perform an inferior call defined in func.
+#
+proc check_bound_violation {parm parm_type is_positive} {
+
+ global u_fault
+
+ gdb_test "continue" "$u_fault.*" "continue to a bnd violation"
+
+ set message "access only one position"
+ if {$is_positive == 1} {
+ gdb_test "p (((void *)\$_siginfo._sifields._sigfault.si_addr\
+ - (void*)$parm))/sizeof($parm_type) == 1"\
+ " = 1" $message
+ } else {
+ gdb_test "p ((void*)$parm\
+ - (void *)\$_siginfo._sifields._sigfault.si_addr)\
+ /sizeof($parm_type) == 1"\
+ " = 1" $message
+ }
+ gdb_test "return" "\\\#.*main.*i386-mpx-call\\\.c:.*" "return from the fault"
+}
+
+
+# Start testing!
+#
+
+# Set up for stopping in the middle of main for calling a function in the
+# inferior.
+#
+set break "bkpt 1."
+gdb_breakpoint [gdb_get_line_number "${break}"]
+gdb_continue_to_breakpoint "${break}" ".*${break}.*"
+
+
+# Consistency:
+# default run execution of call should succeed without violations.
+#
+with_test_prefix "default_run" {
+
+ gdb_test "p \$keep_bnd0_value=\$bnd0" $bound_reg\
+ "store bnd0 register in a convenience variable"
+
+ gdb_test "p /x upper (a, b, c, d, 0)" " = $hex"\
+ "default inferior call"
+
+ gdb_test "p ((\$bnd0.lbound==\$keep_bnd0_value.lbound) &&\
+ (\$bnd0.ubound==\$keep_bnd0_value.ubound))" "= 1" \
+ "bnd register value after and before call"
+}
+
+# Consistency: Examine bnd registers values before and after the call.
+#
+#
+with_test_prefix "verify_default_values" {
+
+ prepare_bndcfg_bndstatus
+
+ gdb_breakpoint "*upper"
+ perform_a_call "upper (a, b, c, d, 1)"
+
+ sanity_check_bndregs {"\$bnd0raw" "\$bnd1raw" "\$bnd2raw" "\$bnd3raw"}
+
+ compare_bndstatus_with_convenience
+
+ gdb_test_multiple "continue" "inferior call test" {
+ -re ".*Continuing.\r\n$gdb_prompt " {
+ pass "inferior call performed"
+ }
+ }
+}
+
+# Examine: Cause an upper bound violation changing BND0.
+#
+#
+with_test_prefix "upper_bnd0" {
+
+ prepare_bndcfg_bndstatus
+
+ gdb_breakpoint "*upper"
+ perform_a_call "upper (a, b, c, d, 1)"
+
+ remove_memory_access "\$bnd0"
+
+ compare_bndstatus_with_convenience
+
+ check_bound_violation "a" "int" 1
+}
+
+# Examine: Cause an upper bound violation changing BND1.
+#
+#
+with_test_prefix "upper_bnd1" {
+
+ prepare_bndcfg_bndstatus
+
+ gdb_breakpoint "*upper"
+ perform_a_call "upper (a, b, c, d, 1)"
+
+ remove_memory_access "\$bnd1"
+
+ compare_bndstatus_with_convenience
+
+ check_bound_violation "b" "int" 1
+}
+
+# Examine: Cause an upper bound violation changing BND2.
+#
+#
+with_test_prefix "upper_bnd2" {
+
+ prepare_bndcfg_bndstatus
+
+ gdb_breakpoint "*upper"
+ perform_a_call "upper (a, b, c, d, 1)"
+
+ remove_memory_access "\$bnd2"
+
+ compare_bndstatus_with_convenience
+
+ check_bound_violation "c" "int" 1
+}
+
+# Examine: Cause an upper bound violation changing BND3.
+#
+#
+with_test_prefix "upper_bnd3" {
+ prepare_bndcfg_bndstatus
+
+ gdb_breakpoint "*upper"
+ perform_a_call "upper (a, b, c, d, 1)"
+
+ remove_memory_access "\$bnd3"
+
+ compare_bndstatus_with_convenience
+
+ check_bound_violation "d" "int" 1
+}
+
+# Examine: Cause a lower bound violation changing BND0.
+#
+#
+with_test_prefix "lower_bnd0" {
+
+ prepare_bndcfg_bndstatus
+
+ gdb_breakpoint "*lower"
+ perform_a_call "lower (a, b, c, d, 1)"
+
+ remove_memory_access "\$bnd0"
+
+ compare_bndstatus_with_convenience
+
+ check_bound_violation "a" "int" 0
+}
+
+# Examine: Cause a lower bound violation changing BND1.
+#
+#
+with_test_prefix "lower_bnd1" {
+
+ prepare_bndcfg_bndstatus
+
+ gdb_breakpoint "*lower"
+ perform_a_call "lower (a, b, c, d, 1)"
+
+ remove_memory_access "\$bnd1"
+
+ compare_bndstatus_with_convenience
+
+ check_bound_violation "b" "int" 0
+}
+
+# Examine: Cause a lower bound violation changing BND2.
+#
+#
+with_test_prefix "lower_bnd2" {
+
+ prepare_bndcfg_bndstatus
+
+ gdb_breakpoint "*lower"
+ perform_a_call "lower (a, b, c, d, 1)"
+
+ remove_memory_access "\$bnd2"
+
+ compare_bndstatus_with_convenience
+
+ check_bound_violation "c" "int" 0
+}
+
+# Examine: Cause a lower bound violation changing BND3.
+#
+#
+with_test_prefix "lower_bnd3" {
+
+ prepare_bndcfg_bndstatus
+
+ gdb_breakpoint "*lower"
+ perform_a_call "lower (a, b, c, d, 1)"
+
+ remove_memory_access "\$bnd3"
+
+ compare_bndstatus_with_convenience
+
+ check_bound_violation "d" "int" 0
+}
+
+# Examine: String causing a upper bound violation changing BND0.
+#
+#
+with_test_prefix "chars_up" {
+
+ prepare_bndcfg_bndstatus
+
+ gdb_breakpoint "*char_upper"
+ perform_a_call "char_upper (hello, 1)"
+
+ remove_memory_access "\$bnd0"
+
+ compare_bndstatus_with_convenience
+
+ check_bound_violation "str" "char" 1
+}
+
+
+# Examine: String causing an lower bound violation changing BND0.
+#
+#
+with_test_prefix "chars_low" {
+
+ prepare_bndcfg_bndstatus
+
+ gdb_breakpoint "*char_lower"
+ perform_a_call "char_lower (hello, 1)"
+
+ remove_memory_access "\$bnd0"
+
+ compare_bndstatus_with_convenience
+
+ check_bound_violation "str" "char" 0
+}
+
+# Examine: String causing an lower bound violation changing BND0.
+#
+#
+with_test_prefix "chars_low_adhoc_parm" {
+
+ prepare_bndcfg_bndstatus
+
+ gdb_breakpoint "*char_lower"
+ perform_a_call "char_lower (\"tryme\", 1)"
+
+ remove_memory_access "\$bnd0"
+
+ compare_bndstatus_with_convenience
+
+ check_bound_violation "str" "char" 0
+}