Mirror of the gdb-patches mailing list
 help / color / mirror / Atom feed
From: Luis Machado <luis.machado@arm.com>
To: Christina Schimpe <christina.schimpe@intel.com>,
	gdb-patches@sourceware.org
Cc: thiago.bauermann@linaro.org, eliz@gnu.org
Subject: Re: [PATCH v4 01/11] gdbserver: Add optional runtime register set type.
Date: Thu, 19 Jun 2025 10:27:11 +0100	[thread overview]
Message-ID: <461114e3-5363-4e4b-a950-76d2d30c9d0b@arm.com> (raw)
In-Reply-To: <20250617121147.1956686-2-christina.schimpe@intel.com>

On 6/17/25 13:11, Christina Schimpe wrote:
> Some register sets can be activated and deactivated by the OS during the runtime of
> a process.  One example register is the Intel CET shadow stack pointer.  This patch
> adds a new type of register set to handle such cases.  We shouldn't deactivate these
> regsets and should not show a warning if the register set is not active but supported
> by the kernel.  However, it is safe to deactivate them, if they are unsupported by the
> kernel.  To differentiate those scenarios we can use the errno returned by the ptrace
> call.
> 
> Reviewed-by: Thiago Jung Bauermann <thiago.bauermann@linaro.org>
> ---
>  gdbserver/linux-low.cc | 50 ++++++++++++++++++++++++++++++------------
>  gdbserver/linux-low.h  |  7 +++++-
>  2 files changed, 42 insertions(+), 15 deletions(-)
> 
> diff --git a/gdbserver/linux-low.cc b/gdbserver/linux-low.cc
> index 1d223c11db9..93fa14ddae9 100644
> --- a/gdbserver/linux-low.cc
> +++ b/gdbserver/linux-low.cc
> @@ -5006,23 +5006,31 @@ regsets_fetch_inferior_registers (struct regsets_info *regsets_info,
>        if (res < 0)
>  	{
>  	  if (errno == EIO
> -	      || (errno == EINVAL && regset->type == OPTIONAL_REGS))
> +	      || (errno == EINVAL
> +		  && (regset->type == OPTIONAL_REGS
> +		      || regset->type == OPTIONAL_RUNTIME_REGS)))
>  	    {
>  	      /* If we get EIO on a regset, or an EINVAL and the regset is
> -		 optional, do not try it again for this process mode.  */
> +		 optional, do not try it again for this process mode.
> +		 Even if the regset can be enabled at runtime it is safe
> +		 to deactivate the regset in case of EINVAL, as we know
> +		 the regset itself was the invalid argument of the ptrace
> +		 call which means that it's unsupported by the kernel.  */
>  	      disable_regset (regsets_info, regset);
>  	    }
> -	  else if (errno == ENODATA)
> +	  else if (errno == ENODATA
> +		   || (errno == ENODEV
> +		       && regset->type == OPTIONAL_RUNTIME_REGS)
> +		   || errno == ESRCH)
>  	    {
> -	      /* ENODATA may be returned if the regset is currently
> -		 not "active".  This can happen in normal operation,
> -		 so suppress the warning in this case.  */
> -	    }
> -	  else if (errno == ESRCH)
> -	    {
> -	      /* At this point, ESRCH should mean the process is
> -		 already gone, in which case we simply ignore attempts
> -		 to read its registers.  */
> +	      /* ENODATA or ENODEV may be returned if the regset is
> +		 currently not "active".  For ENODEV we additionally check
> +		 if the register set is of type OPTIONAL_RUNTIME_REGS.
> +		 This can happen in normal operation, so suppress the
> +		 warning in this case.
> +		 ESRCH should mean the process is already gone at this
> +		 point, in which case we simply ignore attempts to read
> +		 its registers.  */
>  	    }
>  	  else
>  	    {
> @@ -5104,12 +5112,26 @@ regsets_store_inferior_registers (struct regsets_info *regsets_info,
>        if (res < 0)
>  	{
>  	  if (errno == EIO
> -	      || (errno == EINVAL && regset->type == OPTIONAL_REGS))
> +	      || (errno == EINVAL
> +		   && (regset->type == OPTIONAL_REGS
> +		       || regset->type == OPTIONAL_RUNTIME_REGS)))
>  	    {
>  	      /* If we get EIO on a regset, or an EINVAL and the regset is
> -		 optional, do not try it again for this process mode.  */
> +		 optional, do not try it again for this process mode.
> +		 Even if the regset can be enabled at runtime it is safe
> +		 to deactivate the regset in case of EINVAL, as we know
> +		 the regset itself was the invalid argument of the ptrace
> +		 call which means that it's unsupported by the kernel.  */
>  	      disable_regset (regsets_info, regset);
>  	    }
> +	  else if (errno == ENODEV
> +		   && regset->type == OPTIONAL_RUNTIME_REGS)
> +	    {
> +	      /* If we get ENODEV on a regset and the regset can be
> +		 enabled at runtime try it again for this process mode.
> +		 This can happen in normal operation, so suppress the
> +		 warning in this case.  */
> +	    }
>  	  else if (errno == ESRCH)
>  	    {
>  	      /* At this point, ESRCH should mean the process is
> diff --git a/gdbserver/linux-low.h b/gdbserver/linux-low.h
> index 7d3e35fa9b0..8a2b4302c76 100644
> --- a/gdbserver/linux-low.h
> +++ b/gdbserver/linux-low.h
> @@ -42,7 +42,12 @@ enum regset_type {
>    GENERAL_REGS,
>    FP_REGS,
>    EXTENDED_REGS,
> -  OPTIONAL_REGS, /* Do not error if the regset cannot be accessed.  */
> +  OPTIONAL_REGS, /* Do not error if the regset cannot be accessed.
> +		    Disable the regset instead.  */
> +  OPTIONAL_RUNTIME_REGS, /* Some optional regsets can only be accessed
> +			    dependent on the execution flow.  For such
> +			    access errors don't show a warning and don't
> +			    disable the regset.  */
>  };
>  
>  /* The arch's regsets array initializer must be terminated with a NULL

This looks OK to me.

Reviewed-By: Luis Machado <luis.machado@arm.com>

  reply	other threads:[~2025-06-19  9:30 UTC|newest]

Thread overview: 53+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-06-17 12:11 [PATCH v4 00/11] Add CET shadow stack support Christina Schimpe
2025-06-17 12:11 ` [PATCH v4 01/11] gdbserver: Add optional runtime register set type Christina Schimpe
2025-06-19  9:27   ` Luis Machado [this message]
2025-06-17 12:11 ` [PATCH v4 02/11] gdbserver: Add assert in x86_linux_read_description Christina Schimpe
2025-06-19  9:27   ` Luis Machado
2025-06-17 12:11 ` [PATCH v4 03/11] gdb: Sync up x86-gcc-cpuid.h with cpuid.h from gcc 14 branch Christina Schimpe
2025-06-17 18:12   ` Tom Tromey
2025-06-20 12:39     ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 04/11] gdb, gdbserver: Use xstate_bv for target description creation on x86 Christina Schimpe
2025-06-19  9:23   ` Luis Machado
2025-06-23 12:46     ` Schimpe, Christina
2025-06-23 12:56       ` Luis Machado
2025-06-24 13:46         ` Schimpe, Christina
2025-06-26 16:03           ` Luis Machado
2025-06-17 12:11 ` [PATCH v4 05/11] gdb, gdbserver: Add support of Intel shadow stack pointer register Christina Schimpe
2025-06-17 12:20   ` Eli Zaretskii
2025-06-19  9:24   ` Luis Machado
2025-06-23 13:05     ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 06/11] gdb: amd64 linux coredump support with shadow stack Christina Schimpe
2025-06-19  9:24   ` Luis Machado
2025-06-23 13:16     ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 07/11] gdb: Handle shadow stack pointer register unwinding for amd64 linux Christina Schimpe
2025-06-19  9:25   ` Luis Machado
2025-06-20  1:42     ` Thiago Jung Bauermann
2025-06-23 14:55       ` Schimpe, Christina
2025-06-23 23:26         ` Thiago Jung Bauermann
2025-06-23 15:00     ` Schimpe, Christina
2025-06-23 15:06       ` Luis Machado
2025-06-23 23:36         ` Thiago Jung Bauermann
2025-06-20  1:52   ` Thiago Jung Bauermann
2025-06-17 12:11 ` [PATCH v4 08/11] gdb, gdbarch: Enable inferior calls for shadow stack support Christina Schimpe
2025-06-19  9:25   ` Luis Machado
2025-06-23 17:49     ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 09/11] gdb: Implement amd64 linux shadow stack support for inferior calls Christina Schimpe
2025-06-17 12:21   ` Eli Zaretskii
2025-06-19  9:25   ` Luis Machado
2025-06-27 19:52     ` Schimpe, Christina
2025-06-28 10:38       ` Luis Machado
2025-06-28 20:03         ` Thiago Jung Bauermann
2025-06-28 21:05           ` Thiago Jung Bauermann
2025-06-17 12:11 ` [PATCH v4 10/11] gdb, gdbarch: Introduce gdbarch method to get the shadow stack pointer Christina Schimpe
2025-06-17 18:16   ` Tom Tromey
2025-06-20 12:59     ` Schimpe, Christina
2025-06-19  9:26   ` Luis Machado
2025-06-23 18:00     ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 11/11] gdb: Enable displaced stepping with shadow stack on amd64 linux Christina Schimpe
2025-06-17 12:22   ` Eli Zaretskii
2025-06-17 15:16     ` Schimpe, Christina
2025-06-19  9:26   ` Luis Machado
2025-06-23 18:24     ` Schimpe, Christina
2025-06-24  8:05       ` Luis Machado
2025-06-27 19:26         ` Schimpe, Christina
2025-06-28 10:35           ` Luis Machado

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=461114e3-5363-4e4b-a950-76d2d30c9d0b@arm.com \
    --to=luis.machado@arm.com \
    --cc=christina.schimpe@intel.com \
    --cc=eliz@gnu.org \
    --cc=gdb-patches@sourceware.org \
    --cc=thiago.bauermann@linaro.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox