From: Luis Machado <luis.machado@arm.com>
To: "Schimpe, Christina" <christina.schimpe@intel.com>,
"gdb-patches@sourceware.org" <gdb-patches@sourceware.org>
Cc: "thiago.bauermann@linaro.org" <thiago.bauermann@linaro.org>,
"eliz@gnu.org" <eliz@gnu.org>
Subject: Re: [PATCH v4 09/11] gdb: Implement amd64 linux shadow stack support for inferior calls.
Date: Sat, 28 Jun 2025 11:38:07 +0100 [thread overview]
Message-ID: <90c58552-df58-4cf5-acad-d35b9eafab79@arm.com> (raw)
In-Reply-To: <SN7PR11MB7638A5372FF50837E0E1DC18F945A@SN7PR11MB7638.namprd11.prod.outlook.com>
On 6/27/25 20:52, Schimpe, Christina wrote:
> Hi Luis,
>
> Thanks for the review.
>
> <...>
>
>>> +
>>> + /* Starting with v6.6., the Linux kernel supports CET shadow stack.
>>
>> Typo, period after "v6.6".
>>
>>> + Dependent on the target the ssp register can be invalid or nullptr
>>> + when shadow stack is supported by HW and the linux kernel but not
>>> + enabled for the current thread. */
>>
>> I feel the comment doesn't quite reflect this case very well. We don't have a
>> nullptr here, so I suppose ssp == 0x0 means ssp is unavailable? We should
>> make that clear here, but we don't need to have this more generic comment
>> pasted here again, as it was explained elsewhere already.
>
> I agree. I removed the "Starting with v6.6., the Linux kernel supports..." comment
> and rewrote the sentence afterwards as follows:
>
> "Dependent on the target in case the shadow stack pointer is unavailable, the ssp
> register can be invalid or 0x0."
>
> I hope this is a bit better.
>
That sounds better to me. Thanks.
>>> + if (ssp == 0x0)
>>> + return {};
>>> +
>>> + return ssp;
>>> +}
>>> +
>>> +/* If shadow stack is enabled, push the address NEW_ADDR on the
>>> +shadow
>>
>> s/the address NEW_ADDR on/NEW_ADDR to
>>
>>> + stack and increment the shadow stack pointer accordingly. */
>>> +
>>> +static void
>>> +amd64_linux_shadow_stack_push (gdbarch *gdbarch, CORE_ADDR
>> new_addr,
>>> + regcache *regcache)
>>> +{
>>> + std::optional<CORE_ADDR> ssp
>>> + = amd64_linux_get_shadow_stack_pointer (gdbarch, regcache);
>>> + if (!ssp.has_value ())
>>> + return;
>>> +
>>> + /* The shadow stack grows downwards. To push addresses on the
>>> + stack,
>>
>> s/on the/to the
>>
>>> + we need to decrement SSP. */
>>> + const int element_size
>>> + = amd64_linux_shadow_stack_element_size_aligned (gdbarch); const
>>> + CORE_ADDR new_ssp = *ssp - element_size;
>>> +
>>> + /* Starting with v6.6., the Linux kernel supports CET shadow stack.
>>
>> Same typo, period after "v6.6". I feel this comment has been repeated
>> enough times throughout the code. If it is available at a visible location, I
>> think we can do without it elsewhere.
>
> I agree.
>
>> For instance, we could even mention the
>> kernel version in the news entry, or at the gdbarch initialization code when
>> we are fetching a target description. Then it should be enough.
>
> I would suggest to remove the comment
>
> "Starting with v6.6., the Linux kernel supports CET shadow stack."
>
> everywhere except in the allow_ssp_tests procedure, as it fits best there in my opinion.
>
> Would that be acceptable?
I think so. If you want to mention it somewhere in the gdb sources, then maybe the gdbarch initialization
function would be another acceptable spot.
>
> <...>
>
>> Otherwise this is OK.
>>
>> Reviewed-By: Luis Machado <luis.machado@arm.com>
>
> I actually missed to reply to this feedback in the first place. Sorry for the late reply.
> I'll post my v5 soon, as I'll be out for one week. If anything suggested above is not acceptable,
> it would be great if you could let me know.
> Since this is affecting comments only, I think it should be straight-forward to fix.
> For now I'll post my v5 as suggested above.
No worries. I see v5 on the list and will go through it. Have a nice break.
next prev parent reply other threads:[~2025-06-28 10:39 UTC|newest]
Thread overview: 53+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-06-17 12:11 [PATCH v4 00/11] Add CET shadow stack support Christina Schimpe
2025-06-17 12:11 ` [PATCH v4 01/11] gdbserver: Add optional runtime register set type Christina Schimpe
2025-06-19 9:27 ` Luis Machado
2025-06-17 12:11 ` [PATCH v4 02/11] gdbserver: Add assert in x86_linux_read_description Christina Schimpe
2025-06-19 9:27 ` Luis Machado
2025-06-17 12:11 ` [PATCH v4 03/11] gdb: Sync up x86-gcc-cpuid.h with cpuid.h from gcc 14 branch Christina Schimpe
2025-06-17 18:12 ` Tom Tromey
2025-06-20 12:39 ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 04/11] gdb, gdbserver: Use xstate_bv for target description creation on x86 Christina Schimpe
2025-06-19 9:23 ` Luis Machado
2025-06-23 12:46 ` Schimpe, Christina
2025-06-23 12:56 ` Luis Machado
2025-06-24 13:46 ` Schimpe, Christina
2025-06-26 16:03 ` Luis Machado
2025-06-17 12:11 ` [PATCH v4 05/11] gdb, gdbserver: Add support of Intel shadow stack pointer register Christina Schimpe
2025-06-17 12:20 ` Eli Zaretskii
2025-06-19 9:24 ` Luis Machado
2025-06-23 13:05 ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 06/11] gdb: amd64 linux coredump support with shadow stack Christina Schimpe
2025-06-19 9:24 ` Luis Machado
2025-06-23 13:16 ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 07/11] gdb: Handle shadow stack pointer register unwinding for amd64 linux Christina Schimpe
2025-06-19 9:25 ` Luis Machado
2025-06-20 1:42 ` Thiago Jung Bauermann
2025-06-23 14:55 ` Schimpe, Christina
2025-06-23 23:26 ` Thiago Jung Bauermann
2025-06-23 15:00 ` Schimpe, Christina
2025-06-23 15:06 ` Luis Machado
2025-06-23 23:36 ` Thiago Jung Bauermann
2025-06-20 1:52 ` Thiago Jung Bauermann
2025-06-17 12:11 ` [PATCH v4 08/11] gdb, gdbarch: Enable inferior calls for shadow stack support Christina Schimpe
2025-06-19 9:25 ` Luis Machado
2025-06-23 17:49 ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 09/11] gdb: Implement amd64 linux shadow stack support for inferior calls Christina Schimpe
2025-06-17 12:21 ` Eli Zaretskii
2025-06-19 9:25 ` Luis Machado
2025-06-27 19:52 ` Schimpe, Christina
2025-06-28 10:38 ` Luis Machado [this message]
2025-06-28 20:03 ` Thiago Jung Bauermann
2025-06-28 21:05 ` Thiago Jung Bauermann
2025-06-17 12:11 ` [PATCH v4 10/11] gdb, gdbarch: Introduce gdbarch method to get the shadow stack pointer Christina Schimpe
2025-06-17 18:16 ` Tom Tromey
2025-06-20 12:59 ` Schimpe, Christina
2025-06-19 9:26 ` Luis Machado
2025-06-23 18:00 ` Schimpe, Christina
2025-06-17 12:11 ` [PATCH v4 11/11] gdb: Enable displaced stepping with shadow stack on amd64 linux Christina Schimpe
2025-06-17 12:22 ` Eli Zaretskii
2025-06-17 15:16 ` Schimpe, Christina
2025-06-19 9:26 ` Luis Machado
2025-06-23 18:24 ` Schimpe, Christina
2025-06-24 8:05 ` Luis Machado
2025-06-27 19:26 ` Schimpe, Christina
2025-06-28 10:35 ` Luis Machado
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=90c58552-df58-4cf5-acad-d35b9eafab79@arm.com \
--to=luis.machado@arm.com \
--cc=christina.schimpe@intel.com \
--cc=eliz@gnu.org \
--cc=gdb-patches@sourceware.org \
--cc=thiago.bauermann@linaro.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox