* [PATCH] Fix size of register buffer [not found] <20241028175239.314-1-ssbssa.ref@yahoo.de> @ 2024-10-28 17:52 ` Hannes Domani 2024-10-28 19:44 ` Tom Tromey 0 siblings, 1 reply; 4+ messages in thread From: Hannes Domani @ 2024-10-28 17:52 UTC (permalink / raw) To: gdb-patches When calling a function with double arguments, I get this asan error: ==7920==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x0053131ece38 at pc 0x7ff79697a68f bp 0x0053131ec790 sp 0x0053131ebf40 READ of size 16 at 0x0053131ece38 thread T0 #0 0x7ff79697a68e in MemcmpInterceptorCommon(void*, int (*)(void const*, void const*, unsigned long long), void const*, void const*, unsigned long long) C:/gcc/src/gcc-14.2.0/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:814 #1 0x7ff79697aebd in memcmp C:/gcc/src/gcc-14.2.0/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:845 #2 0x7ff79697aebd in memcmp C:/gcc/src/gcc-14.2.0/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:840 #3 0x7ff7927e237f in regcache::raw_write(int, gdb::array_view<unsigned char const>) C:/gdb/src/gdb.git/gdb/regcache.c:874 #4 0x7ff7927e3c85 in regcache::cooked_write(int, gdb::array_view<unsigned char const>) C:/gdb/src/gdb.git/gdb/regcache.c:914 #5 0x7ff7927e5d89 in regcache::cooked_write(int, unsigned char const*) C:/gdb/src/gdb.git/gdb/regcache.c:933 #6 0x7ff7911d5965 in amd64_windows_store_arg_in_reg C:/gdb/src/gdb.git/gdb/amd64-windows-tdep.c:216 Address 0x0053131ece38 is located in stack of thread T0 at offset 40 in frame #0 0x7ff7911d565f in amd64_windows_store_arg_in_reg C:/gdb/src/gdb.git/gdb/amd64-windows-tdep.c:208 This frame has 4 object(s): [32, 40) 'buf' (line 211) <== Memory access at offset 40 overflows this variable It's because the first 4 double arguments are passed via XMM registers, and they need a buffer of 16 bytes, even if we only use 8 bytes of them. --- gdb/amd64-windows-tdep.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/gdb/amd64-windows-tdep.c b/gdb/amd64-windows-tdep.c index 555e225219d..70390fcaf22 100644 --- a/gdb/amd64-windows-tdep.c +++ b/gdb/amd64-windows-tdep.c @@ -208,7 +208,8 @@ amd64_windows_store_arg_in_reg (struct regcache *regcache, { struct type *type = arg->type (); const gdb_byte *valbuf = arg->contents ().data (); - gdb_byte buf[8]; + /* We only set 8 bytes, buf if it's a XMM register, 16 bytes are read. */ + gdb_byte buf[16]; gdb_assert (type->length () <= 8); memset (buf, 0, sizeof buf); -- 2.35.1 ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] Fix size of register buffer 2024-10-28 17:52 ` [PATCH] Fix size of register buffer Hannes Domani @ 2024-10-28 19:44 ` Tom Tromey 2024-10-28 20:02 ` Hannes Domani 0 siblings, 1 reply; 4+ messages in thread From: Tom Tromey @ 2024-10-28 19:44 UTC (permalink / raw) To: Hannes Domani; +Cc: gdb-patches >>>>> "Hannes" == Hannes Domani <ssbssa@yahoo.de> writes: Hannes> It's because the first 4 double arguments are passed via XMM registers, Hannes> and they need a buffer of 16 bytes, even if we only use 8 bytes of them. Thanks, this is ok. Approved-By: Tom Tromey <tom@tromey.com> Tom ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] Fix size of register buffer 2024-10-28 19:44 ` Tom Tromey @ 2024-10-28 20:02 ` Hannes Domani 2024-10-29 11:55 ` Tom de Vries 0 siblings, 1 reply; 4+ messages in thread From: Hannes Domani @ 2024-10-28 20:02 UTC (permalink / raw) To: Tom Tromey; +Cc: gdb-patches Am Montag, 28. Oktober 2024 um 20:44:32 MEZ hat Tom Tromey <tom@tromey.com> Folgendes geschrieben: > >>>>> "Hannes" == Hannes Domani <ssbssa@yahoo.de> writes: > > Hannes> It's because the first 4 double arguments are passed via XMM registers, > Hannes> and they need a buffer of 16 bytes, even if we only use 8 bytes of them. Pushed, thanks. Hannes ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] Fix size of register buffer 2024-10-28 20:02 ` Hannes Domani @ 2024-10-29 11:55 ` Tom de Vries 0 siblings, 0 replies; 4+ messages in thread From: Tom de Vries @ 2024-10-29 11:55 UTC (permalink / raw) To: Hannes Domani, Tom Tromey; +Cc: gdb-patches On 10/28/24 21:02, Hannes Domani wrote: > Am Montag, 28. Oktober 2024 um 20:44:32 MEZ hat Tom Tromey <tom@tromey.com> Folgendes geschrieben: > >>>>>>> "Hannes" == Hannes Domani <ssbssa@yahoo.de> writes: >> >> Hannes> It's because the first 4 double arguments are passed via XMM registers, >> Hannes> and they need a buffer of 16 bytes, even if we only use 8 bytes of them. > > Pushed, thanks. Hi Hannes, I had a question about what we could do to detect this problem without address sanitizer, and ended up writing a patch ( https://sourceware.org/pipermail/gdb-patches/2024-October/212723.html ) which unfortunately I cannot test. It would be great if you or anybody else with a windows setup could test that patch. Thanks, - Tom ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2024-10-30 8:58 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
[not found] <20241028175239.314-1-ssbssa.ref@yahoo.de>
2024-10-28 17:52 ` [PATCH] Fix size of register buffer Hannes Domani
2024-10-28 19:44 ` Tom Tromey
2024-10-28 20:02 ` Hannes Domani
2024-10-29 11:55 ` Tom de Vries
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox