Mirror of the gdb-patches mailing list
 help / color / mirror / Atom feed
From: Luis Machado <luis.machado@arm.com>
To: "Schimpe, Christina" <christina.schimpe@intel.com>,
	"gdb-patches@sourceware.org" <gdb-patches@sourceware.org>
Cc: "thiago.bauermann@linaro.org" <thiago.bauermann@linaro.org>,
	"eliz@gnu.org" <eliz@gnu.org>
Subject: Re: [PATCH v4 07/11] gdb: Handle shadow stack pointer register unwinding for amd64 linux.
Date: Mon, 23 Jun 2025 16:06:27 +0100	[thread overview]
Message-ID: <81a32c0a-d9a5-4a58-a6ac-eb8cdb498ada@arm.com> (raw)
In-Reply-To: <SN7PR11MB7638E430C041094B80F1AFCEF979A@SN7PR11MB7638.namprd11.prod.outlook.com>

On 6/23/25 16:00, Schimpe, Christina wrote:
> Hi Luis, 
> 
> Thanks for the feedback. Please find my comments below.
> 
>> -----Original Message-----
>> From: Luis Machado <luis.machado@arm.com>
>> Sent: Thursday, June 19, 2025 11:25 AM
>> To: Schimpe, Christina <christina.schimpe@intel.com>; gdb-
>> patches@sourceware.org
>> Cc: thiago.bauermann@linaro.org; eliz@gnu.org
>> Subject: Re: [PATCH v4 07/11] gdb: Handle shadow stack pointer register
>> unwinding for amd64 linux.
>>
>> On 6/17/25 13:11, Christina Schimpe wrote:
>>> Unwind the $pl3_ssp register.
>>> We now have an updated value for the shadow stack pointer when moving
>>> up or down the frame level.  Note that $pl3_ssp can become unavailable
>>> when moving to a frame before the shadow stack enablement.  In the
>>> example below, shadow stack is enabled in the function 'call1'.  Thus,
>>> when moving to a frame level above the function, $pl3_ssp will become
>>> unavaiable.
>>> Following the restriction of the linux kernel, implement the unwinding
>>> for amd64 linux only.
>>>
>>> Before this patch:
>>> ~~~
>>> Breakpoint 1, call2 (j=3) at sample.c:44
>>> 44	  return 42;
>>> (gdb) p $pl3_ssp
>>> $1 = (void *) 0x7ffff79ffff8
>>> (gdb) up
>>> 55	  call2 (3);
>>> (gdb) p $pl3_ssp
>>> $2 = (void *) 0x7ffff79ffff8
>>> (gdb) up
>>> 68	  call1 (43);
>>> (gdb) p $pl3_ssp
>>> $3 = (void *) 0x7ffff79ffff8
>>> ~~~
>>>
>>> After this patch:
>>> ~~~
>>> Breakpoint 1, call2 (j=3) at sample.c:44
>>> 44	  return 42;
>>> (gdb) p $pl3_ssp
>>> $1 = (void *) 0x7ffff79ffff8
>>> (gdb) up
>>> 55	  call2 (3);
>>> (gdb) p $pl3_ssp
>>> $2 = (void *) 0x7ffff7a00000
>>> (gdb) up
>>> 68	  call1 (43i);
>>> (gdb) p $pl3_ssp
>>> $3 = <unavailable>
>>> ~~~
>>>
>>> As we now have an updated value for each selected frame, the return
>>> command is now enabled for shadow stack enabled programs, too.
>>>
>>> We therefore add a test for the return command and shadow stack
>>> support, and for an updated shadow stack pointer after a frame level change.
>>>
>>> Reviewed-by: Thiago Jung Bauermann <thiago.bauermann@linaro.org>
>>> ---
>>>  gdb/amd64-linux-tdep.c                        | 84 ++++++++++++++++++
>>>  gdb/linux-tdep.c                              | 47 ++++++++++
>>>  gdb/linux-tdep.h                              |  7 ++
>>>  .../gdb.arch/amd64-shadow-stack-cmds.exp      | 88 +++++++++++++++++++
>>>  gdb/testsuite/gdb.arch/amd64-shadow-stack.c   | 13 +++
>>>  5 files changed, 239 insertions(+)
>>>  create mode 100644 gdb/testsuite/gdb.arch/amd64-shadow-stack-cmds.exp
>>>
>>> diff --git a/gdb/amd64-linux-tdep.c b/gdb/amd64-linux-tdep.c index
>>> d806d3cb1f7..9436f0b190c 100644
>>> --- a/gdb/amd64-linux-tdep.c
>>> +++ b/gdb/amd64-linux-tdep.c
>>> @@ -47,6 +47,8 @@
>>>  #include "arch/amd64-linux-tdesc.h"
>>>  #include "inferior.h"
>>>  #include "x86-tdep.h"
>>> +#include "dwarf2/frame.h"
>>> +#include "frame-unwind.h"
>>>
>>>  /* The syscall's XML filename for i386.  */  #define
>>> XML_SYSCALL_FILENAME_AMD64 "syscalls/amd64-linux.xml"
>>> @@ -1917,6 +1919,87 @@ amd64_linux_get_tls_dtv_addr (struct gdbarch
>> *gdbarch, ptid_t ptid,
>>>    return dtv_addr;
>>>  }
>>>
>>> +/* Return the number of bytes required to update the shadow stack pointer
>>> +   by one element.  For x32 the shadow stack elements are still 64-bit
>>> +   aligned.  Thus, gdbarch_addr_bit cannot be used to compute the new
>>> +   stack pointer.  */
>>> +
>>> +static inline int
>>> +amd64_linux_shadow_stack_element_size_aligned (gdbarch *gdbarch) {
>>> +  const bfd_arch_info *binfo = gdbarch_bfd_arch_info (gdbarch);
>>> +  return (binfo->bits_per_word / binfo->bits_per_byte); }
>>> +
>>> +
>>> +/* Implement shadow stack pointer unwinding. For each new shadow stack
>>> +   pointer check if its address is still in the shadow stack memory range.
>>> +   If it's outside the range set the returned value to unavailable,
>>> +   otherwise return a value containing the new shadow stack pointer.
>>> +*/
>>> +
>>> +static value *
>>> +amd64_linux_dwarf2_prev_ssp (const frame_info_ptr &this_frame,
>>> +			     void **this_cache, int regnum) {
>>> +  value *v = frame_unwind_got_register (this_frame, regnum, regnum);
>>> +  gdb_assert (v != nullptr);
>>> +
>>> +  gdbarch *gdbarch = get_frame_arch (this_frame);
>>> +
>>> +  if (v->entirely_available () && !v->optimized_out ())
>>> +    {
>>> +      int size = register_size (gdbarch, regnum);
>>> +      bfd_endian byte_order = gdbarch_byte_order (gdbarch);
>>> +      CORE_ADDR ssp = extract_unsigned_integer (v->contents_all ().data (),
>>> +						size, byte_order);
>>> +
>>> +      /* Starting with v6.6., the Linux kernel supports CET shadow stack.
>>
>> Same typo as before, period after "v6.6".
> 
> Will fix.
> 
>>
>>> +	 Using /proc/PID/smaps we can only check if the current shadow
>>> +	 stack pointer SSP points to shadow stack memory.  Only if this is
>>> +	 the case a valid previous shadow stack pointer can be
>>> +	 calculated.  */
>>> +      std::pair<CORE_ADDR, CORE_ADDR> range;
>>> +      if (linux_address_in_shadow_stack_mem_range (ssp, &range))
>>> +	{
>>> +	  /* The shadow stack grows downwards.  To compute the previous
>>> +	     shadow stack pointer, we need to increment SSP.  */
>>> +	  CORE_ADDR new_ssp
>>> +	    = ssp + amd64_linux_shadow_stack_element_size_aligned (gdbarch);
>>> +
>>> +	  /* If NEW_SSP points to the end of or before (<=) the current
>>> +	     shadow stack memory range we consider NEW_SSP as valid (but
>>> +	     empty).  */
>>
>> I couldn't quite understand the difference between the empty case and the
>> unavailable case. But maybe I just don't fully understand the feature.
>>
>> Would it be possible to make the comment a bit more clear?
> 
> Is this a bit clearer?
> 
> "There can be scenarios where we have a shadow stack pointer but the shadow stack
> is empty, as no call instruction has been executed yet.  If NEW_SSP points to the end
> of or before (<=) the current shadow stack memory range we consider NEW_SSP as
> valid (but empty). "

Yes, that clear it up. Thanks!

> 
> Please also see my answer to Thiago:
> https://sourceware.org/pipermail/gdb-patches/2025-June/218908.html

Thanks. It would be nice if both series were consistent in this regard (<= or <).

  reply	other threads:[~2025-06-23 15:07 UTC|newest]

Thread overview: 53+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-06-17 12:11 [PATCH v4 00/11] Add CET shadow stack support Christina Schimpe
2025-06-17 12:11 ` [PATCH v4 01/11] gdbserver: Add optional runtime register set type Christina Schimpe
2025-06-19  9:27   ` Luis Machado
2025-06-17 12:11 ` [PATCH v4 02/11] gdbserver: Add assert in x86_linux_read_description Christina Schimpe
2025-06-19  9:27   ` Luis Machado
2025-06-17 12:11 ` [PATCH v4 03/11] gdb: Sync up x86-gcc-cpuid.h with cpuid.h from gcc 14 branch Christina Schimpe
2025-06-17 18:12   ` Tom Tromey
2025-06-20 12:39     ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 04/11] gdb, gdbserver: Use xstate_bv for target description creation on x86 Christina Schimpe
2025-06-19  9:23   ` Luis Machado
2025-06-23 12:46     ` Schimpe, Christina
2025-06-23 12:56       ` Luis Machado
2025-06-24 13:46         ` Schimpe, Christina
2025-06-26 16:03           ` Luis Machado
2025-06-17 12:11 ` [PATCH v4 05/11] gdb, gdbserver: Add support of Intel shadow stack pointer register Christina Schimpe
2025-06-17 12:20   ` Eli Zaretskii
2025-06-19  9:24   ` Luis Machado
2025-06-23 13:05     ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 06/11] gdb: amd64 linux coredump support with shadow stack Christina Schimpe
2025-06-19  9:24   ` Luis Machado
2025-06-23 13:16     ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 07/11] gdb: Handle shadow stack pointer register unwinding for amd64 linux Christina Schimpe
2025-06-19  9:25   ` Luis Machado
2025-06-20  1:42     ` Thiago Jung Bauermann
2025-06-23 14:55       ` Schimpe, Christina
2025-06-23 23:26         ` Thiago Jung Bauermann
2025-06-23 15:00     ` Schimpe, Christina
2025-06-23 15:06       ` Luis Machado [this message]
2025-06-23 23:36         ` Thiago Jung Bauermann
2025-06-20  1:52   ` Thiago Jung Bauermann
2025-06-17 12:11 ` [PATCH v4 08/11] gdb, gdbarch: Enable inferior calls for shadow stack support Christina Schimpe
2025-06-19  9:25   ` Luis Machado
2025-06-23 17:49     ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 09/11] gdb: Implement amd64 linux shadow stack support for inferior calls Christina Schimpe
2025-06-17 12:21   ` Eli Zaretskii
2025-06-19  9:25   ` Luis Machado
2025-06-27 19:52     ` Schimpe, Christina
2025-06-28 10:38       ` Luis Machado
2025-06-28 20:03         ` Thiago Jung Bauermann
2025-06-28 21:05           ` Thiago Jung Bauermann
2025-06-17 12:11 ` [PATCH v4 10/11] gdb, gdbarch: Introduce gdbarch method to get the shadow stack pointer Christina Schimpe
2025-06-17 18:16   ` Tom Tromey
2025-06-20 12:59     ` Schimpe, Christina
2025-06-19  9:26   ` Luis Machado
2025-06-23 18:00     ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 11/11] gdb: Enable displaced stepping with shadow stack on amd64 linux Christina Schimpe
2025-06-17 12:22   ` Eli Zaretskii
2025-06-17 15:16     ` Schimpe, Christina
2025-06-19  9:26   ` Luis Machado
2025-06-23 18:24     ` Schimpe, Christina
2025-06-24  8:05       ` Luis Machado
2025-06-27 19:26         ` Schimpe, Christina
2025-06-28 10:35           ` Luis Machado

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=81a32c0a-d9a5-4a58-a6ac-eb8cdb498ada@arm.com \
    --to=luis.machado@arm.com \
    --cc=christina.schimpe@intel.com \
    --cc=eliz@gnu.org \
    --cc=gdb-patches@sourceware.org \
    --cc=thiago.bauermann@linaro.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox