Mirror of the gdb-patches mailing list
 help / color / mirror / Atom feed
From: "Schimpe, Christina" <christina.schimpe@intel.com>
To: Thiago Jung Bauermann <thiago.bauermann@linaro.org>
Cc: "gdb-patches@sourceware.org" <gdb-patches@sourceware.org>
Subject: RE: [PATCH 6/9] gdb: Implement 'bt shadow' to print the shadow stack backtrace.
Date: Mon, 17 Nov 2025 20:14:52 +0000	[thread overview]
Message-ID: <SN7PR11MB76380C7717A3CB137ACD9C85F9C9A@SN7PR11MB7638.namprd11.prod.outlook.com> (raw)
In-Reply-To: <874irfsoqc.fsf@linaro.org>

Hi Thiago,

Thanks for taking the time to provide this review—I really appreciate your detailed input!

I’ve implemented part of your feedback, and there are still a few open points I’d like to clarify.
I hope I didn’t miss any of your comments, as the review has become quite comprehensive.

Please find my responses and open questions below. Looking forward to your thoughts!

> -----Original Message-----
> From: Thiago Jung Bauermann <thiago.bauermann@linaro.org>
> Sent: Freitag, 31. Oktober 2025 05:02
> To: Schimpe, Christina <christina.schimpe@intel.com>
> Cc: gdb-patches@sourceware.org
> Subject: Re: [PATCH 6/9] gdb: Implement 'bt shadow' to print the shadow
> stack backtrace.
> 
> Christina Schimpe <christina.schimpe@intel.com> writes:
> 
> > Add a subcommand 'bt shadow' for the ordinary backtrace command
> which
> > prints the shadow stack backtrace.
> > Similar to the ordinary backtrace command 'bt shadow' can be
> > configured using COUNT and the command line option -frame-info.
> > However, we always print the address and the command is not affected
> > by the setting "print address" as well as the setting "print frame-info
> location-and-address".
> > Also we do not print the frame arguments.
> >
> > Usage: backtrace|bt shadow [OPTION]... [COUNT | -COUNT]
> >
> > Help output:
> > ~~
> > (gdb) help bt shadow
> > Print backtrace of all shadow stack frames, or innermost COUNT frames.
> > Usage: backtrace shadow [OPTION]... [COUNT | -COUNT]
> >
> > Options:
> >   -frame-info auto|source-line|location|source-and-location|location-and-
> address|short-location
> >     Set printing of shadow stack frame information.
> >
> > With a negative COUNT, print outermost -COUNT elements.
> > ~~
> 
> There's another thread discussion whether to use "bt -shadow" instead,
> and/or "shadow-stack backtrace" so I won't comment on this here.

Yes, I will go ahead with "bt -shadow" for the v2. 

> > Example for the output of 'bt shadow' on amd64 linux:
> > ~~
> > (gdb) bt shadow
> > /#0  0x000000000040111f in call1 at amd64-shadow-stack.c:14
> > /#1  0x000000000040112f in main at amd64-shadow-stack.c:21
> > /#2  0x00007ffff7c3fe70 in __libc_start_call_main at
> > ../sysdeps/nptl/libc_start_call_main.h:58
> > /#3  0x00007ffff7c3ff20 in __libc_start_main_impl at
> > ../csu/libc-start.c:128
> > /#4  0x0000000000401045 in _start
> > ~~
> 
> Here's an example output in my aarch64-linux test VM:
> 
> (gdb) bt shadow
> #0  0x0000aaaaaaaa08ac in call2 at aarch64-gcs-return.c:65
> #1  0x0000aaaaaaaa08c0 in call1 at aarch64-gcs-return.c:71
> #2  0x0000aaaaaaaa09d4 in main at aarch64-gcs-return.c:110
> #3  0x0000000000000000 in ??
> 
> And here is the regular backtrace at the same point:
> 
> (gdb) bt
> #0  call3 () at aarch64-gcs-return.c:58
> #1  0x0000aaaaaaaa08ac in call2 () at aarch64-gcs-return.c:64
> #2  0x0000aaaaaaaa08c0 in call1 () at aarch64-gcs-return.c:70
> #3  0x0000aaaaaaaa09d4 in main () at aarch64-gcs-return.c:107
> 
> I have a few comments on this output, at least as it is appears for GCS. I'm
> assuming x86 shadow stack output is similar:
> 
> 1. The first thing that I notice is that the number of the frames don't match
> between the regular stack and the shadow stack: frame 0 in the regular stack
> doesn't exist in the shadow stack, regular frame 1 is shadow frame 0, and so
> on.
> 
> I think this is confusing. It makes sense that frame 0 doesn't appear in the
> shadow stack backtrace because there really isn't an entry for it in the
> shadow stack, but I think the shadow entries should start with number 1, to
> be consistent.

Mh, it's probably better to align, I agree.
I'll go with starting frame #1 in the v2, and add a comment about that in the
commit message.

> 2. The line numbers corresponding to the return addresses don't match
> between the regular backtrace and the shadow backtrace, even though the
> return addresses are the same. I would say this is a bug. Perhaps there can be
> a test making sure they match, if it's not too complicated?

The reason for that is explained in a comment in do_print_shadow_stack_frame_info:

  /* In contrast to find_frame_sal which is used for the ordinary backtrace
     command, we always want to print the line that is actually referred
     to by the address in the linetable.  That's why we always pass 0 here
     as second argument.  */

Do you think we should align this with the behavior of the ordinary backtrace command
here as well?
I’m not entirely sure if that approach might be too straightforward, since we can’t simply
call the get_frame_address_in_block function as the ordinary bt command does when
invoking it from find_frame_sal.

> 3. One difference between my GCS test programs and your x86 test programs
> is the point at which the shadow stack is enabled. In your case, it appears to
> be done by glibc or the dynamic loader, very early in the process execution.
> For the AArch64 testcases I'm doing it explicitly in main itself, so that the test
> programs don't have to depend on a supported glibc or loader. All this to say
> that there is no GCS entry before main, yet one appears in the output above
> with a zeroed return address. I think this can be solved by stopping the
> backtrace loop if gdbarch_top_addr_empty_shadow_stack returns true in
> backtrace_shadow_command. I have a suggestion about this further down.

Yes, that makes sense to me.

> > diff --git a/gdb/doc/gdb.texinfo b/gdb/doc/gdb.texinfo index
> > e8515883820..ebda4546b58 100644
> > --- a/gdb/doc/gdb.texinfo
> > +++ b/gdb/doc/gdb.texinfo
> > @@ -8840,6 +8840,53 @@ Display an absolute filename.
> >  Show the current way to display filenames.
> >  @end table
> >
> > +@subsection Shadow stack backtrace
> > +@value{GDBN} provides a subcommand of the backtrace command to
> print
> > +the shadow stack backtrace.
> > +
> > +@anchor{shadowstack-backtrace-command}
> > +@kindex backtrace shadow
> > +@kindex bt shadow @r{(@code{backtrace shadow})} To print a backtrace
> > +of the entire shadow stack, use the @code{backtrace shadow} command,
> > +or its alias @code{bt shadow}.  This command will print one line per
> > +element (so-called shadow stack frames) on the shadow stack.
> > +
> > +A shadow stack is supported, for instance, with the Intel
> > +Control-Flow Enforcement Technology (@xref{CET}) on x86.
> 
> Can you also add:
> 
> ... and the Guarded Control Stack feature (@xref{GCS}) on AArch64.
> 
> which would also require a @node entry here:

Yes, will add.

> @@ -27112,6 +27113,7 @@ information automatically from the core file,
> and will show one of the above  messages depending on whether the
> synchronous or asynchronous mode is selected.
>  @xref{Memory Tagging}. @xref{Memory}.
> 
> +@node GCS
>  @subsubsection AArch64 Guarded Control Stack  @cindex Guarded Control
> Stack, AArch64  @cindex GCS, AArch64
> 
> <snip>
> 
> > +/* Return true, if PC is in the middle of a statement.  Note that in the
> > +   middle of a statement PC range includes sal.end (SAL.PC, SAL.END].
> > +   Return false, if
> > +   - SAL.IS_STMT is false
> > +   - there is no location information associated with this SAL, which
> > +   could happen in case of inlined functions
> > +   - PC is not in the range (SAL.PC, SAL.END].
> > +   This function is similar to stack.c:frame_show_address but is used
> > +   to determine if we are in the middle of a statement only, not to decide
> > +   if we should print a frame's address.  */
> > +
> > +static bool
> > +pc_in_middle_of_statement (CORE_ADDR pc, symtab_and_line sal) {
> > +  if (sal.is_stmt == false)
> > +    return false;
> > +
> > +  /* If there is a line number, but no PC, then there is no location
> > +     information associated with this sal.  The only way that should
> > +     happen is for the call sites of inlined functions (SAL comes from
> > +     find_frame_sal).  Otherwise, we would have some PC range if the
> 
> In the case of stack.c:frame_show_address, SAL comes from find_frame_sal,
> but in this case it comes from find_pc_line, right?

Yes, it comes from find_sal_for_pc (when rebased on latest master, find_pc_line was renamed).

> Does the comment still apply in this case?

Good question, I remember I stumbled over this a couple of times when implementing this.
In any case, the comment needs to be corrected to "(SAL comes from find_sal_for_pc)."
If we need this check, I am not sure. In my experiments with inlined functions I could
not reproduce that scenario. But I kept it, to be safe.

> > +     SAL came from a line table.  However, as we don't have a frame for
> > +     this function we cannot assert (in contrast to
> > +     frame_show_address).  */
> > +  if (sal.line != 0 && sal.pc == 0 && sal.end == 0)
> > +    return false;
> > +
> > +  return pc > sal.pc && pc <= sal.end; }
> > +
> > +enum class ssp_unwind_stop_reason
> > +{
> > +  /* No particular reason; either we haven't tried unwinding yet, or we
> > +     didn't fail.  */
> > +  no_error = 0,
> > +
> > +  /* We could not read the memory of the shadow stack element.  */
> > +  memory_read_error
> > +};
> > +
> > +/* Information of a shadow stack frame belonging to a shadow stack
> element
> > +   at shadow stack pointer SSP.  */
> > +
> > +class shadow_stack_frame_info
> > +{
> > +public:
> > +  /* If possible, unwind the previous shadow stack frame info.  RANGE is
> > +     the shadow stack memory range [start_address, end_address)
> belonging
> > +     to this frame's shadow stack pointer.  If we cannot unwind the
> > +     previous frame info, set the unwind_stop_reason attribute.  If we
> > +     reached the bottom of the shadow stack just don't return a
> > +value.  */
> > +  std::optional<shadow_stack_frame_info>
> unwind_prev_shadow_stack_frame_info
> > +    (gdbarch *gdbarch, std::pair<CORE_ADDR, CORE_ADDR> range);
> > +
> > +  /* The shadow stack pointer.  */
> > +  CORE_ADDR ssp;
> 
> Please add an empty line between each member variable and the next
> variable's documentation comment.

Fixed.

> > +  /* The value of the shadow stack at SSP.  */
> > +  CORE_ADDR value;
> > +  /* The level of the element on the shadow stack.  */
> > +  unsigned long level;
> > +  /* If unwinding of the previous frame info fails assign this value to a
> > +     matching condition ssp_unwind_stop_reason
> > +     > ssp_unwind_stop_reason::no_error.  */
> > +  ssp_unwind_stop_reason unwind_stop_reason
> > +    = ssp_unwind_stop_reason::no_error; };
> > +
> > +static
> > +gdb::unique_xmalloc_ptr<char> find_pc_funname (CORE_ADDR pc)
> 
> The return type should be together with the static.
> Also, this function needs a documentation comment.

Fixed.

> > +{
> > +  symbol *func = find_pc_function (pc);
> > +  if (func)
> > +    return find_symbol_funname (func);
> > +
> > +  gdb::unique_xmalloc_ptr<char> funname;  bound_minimal_symbol
> > + msymbol = lookup_minimal_symbol_by_pc (pc);  if (msymbol.minsym !=
> > + nullptr)
> > +    funname.reset (xstrdup (msymbol.minsym->print_name ()));
> 
> Just repeating Tom's comment from patch 4:
> 
> This should use make_unique_xstrdup and plain assignment.

Fixed.

> > +
> > +  return funname;
> > +}
> > +
> > +/* Print information of shadow stack frame info FRAME.  The output is
> > +   formatted according to PRINT_WHAT.  For the meaning of PRINT_WHAT,
> see
> > +   enum print_what comments in frame.h.  Note that PRINT_WHAT is
> overridden,
> > +   if PRINT_OPTIONS.print_frame_info != print_frame_info_auto.  */
> > +
> > +static void
> > +do_print_shadow_stack_frame_info
> > +  (ui_out *uiout, gdbarch *gdbarch,
> > +   const shadow_stack_print_options &print_options,
> > +   const shadow_stack_frame_info &frame, print_what print_what) {
> > +  if (print_options.print_frame_info != print_frame_info_auto)
> > +    {
> > +      /* Use the specific frame information desired by the user.  */
> > +      print_what
> > +	= *print_frame_info_to_print_what (print_options.print_frame_info);
> > +    }
> > +
> > +  /* In contrast to find_frame_sal which is used for the ordinary backtrace
> > +     command, we always want to print the line that is actually referred
> > +     to by the address in the linetable.  That's why we always pass 0 here
> > +     as second argument.  */
> > +  symtab_and_line sal = find_pc_line (frame.value, 0);
> > +
> > +  if (should_print_location (print_what) || sal.symtab == nullptr)
> > +    {
> > +      gdb::unique_xmalloc_ptr<char> funname
> > +	= find_pc_funname (frame.value);
> 
> This line fits in 80 columns and doesn't need to be broken.

Even though there is this soft limit I agree it looks better unbroken.
I changed this.

> > +      { /* Extra scope to print frame tuple.  */
> > +	ui_out_emit_tuple tuple_emitter (uiout, "shadow-stack-frame");
> > +
> > +	annotate_shadowstack_frame_begin (frame.level, gdbarch,
> > +					  frame.value);
> > +
> > +	uiout->text ("#");
> > +	uiout->field_fmt_signed (2, ui_left, "level", frame.level);
> > +
> > +	annotate_shadowstack_frame_address ();
> > +
> > +	/* On x86 there can be a shadow stack token at bit 63.  For x32,
> > +	   the address size is only 32 bit.  Thus, we still must use
> > +	   gdbarch_shadow_stack_element_size_aligned (and not
> > +	   gdbarch_addr_bit) to determine the width of the address to be
> > +	   printed.  */
> > +	const int element_size
> > +	 = gdbarch_shadow_stack_element_size_aligned (gdbarch);
> > +
> > +	uiout->field_string
> > +	  ("addr", hex_string_custom (frame.value, element_size * 2),
> > +	   address_style.style ());
> > +
> > +	annotate_shadowstack_frame_address_end ();
> > +
> > +	uiout->text (" in ");
> > +	print_funname (uiout, funname, true);
> > +
> > +	if (print_what != SHORT_LOCATION && sal.symtab != nullptr)
> > +	  print_filename (uiout, sal, true);
> > +
> > +	if (print_what != SHORT_LOCATION
> > +	    && (funname == nullptr || sal.symtab == nullptr)
> > +	    && sal.pspace != nullptr)
> > +	  {
> > +	    const char *lib = solib_name_from_address (sal.pspace,
> > +						       frame.value);
> 
> This line fits in 80 columns and doesn't need to be broken.

I count 81 characters.

> > +	    if (lib != nullptr)
> > +	      print_lib (uiout, lib, true);
> > +	  }
> > +      } /* Extra scope to print frame tuple.  */
> > +
> > +      uiout->text ("\n");
> > +    }
> > +
> > +  if (print_what == SRC_LINE || print_what == SRC_AND_LOC)
> > +    {
> > +      int mid_statement = pc_in_middle_of_statement (frame.value,
> > + sal);
> 
> mid_statement should be a bool.

Fixed.

> > +
> > +      /* While for the ordinary backtrace printing of pc is based on
> > +	 MID_STATEMENT determined by stack.c:frame_show_address and
> the
> > +	 and the print configuration, for shadow stack backtrace we always
> > +	 print the pc/address on the shadow stack.  */
> > +      bool print_address = true;
> > +      print_source (uiout, gdbarch, frame.value, sal, print_address,
> > +		    mid_statement, "");
> > +    }
> > +
> > +  annotate_shadowstack_frame_end ();
> > +  gdb_flush (gdb_stdout);
> > +}
> > +
> > +/* Redirect output to a temporary buffer for the duration of
> > +   do_print_shadow_stack_frame_info.  */
> > +
> > +static void
> > +print_shadow_stack_frame_info
> > +  (gdbarch *gdbarch, const shadow_stack_print_options &print_options,
> > +   const shadow_stack_frame_info &frame, print_what print_what) {
> > +  do_with_buffered_output
> > +    (do_print_shadow_stack_frame_info, current_uiout, gdbarch,
> > +     print_options, frame, print_what); }
> > +
> > +
> > +/* Extract a char array which can be used for printing a reasonable
> > +   error message for REASON.  Note that in case REASON has the value
> > +   NO_ERROR the returned array is empty.  */
> > +
> > +static const char *
> > +ssp_unwind_stop_reason_to_err_string (ssp_unwind_stop_reason reason)
> > +{
> > +  switch (reason)
> > +    {
> > +    case ssp_unwind_stop_reason::no_error:
> > +      return _("");
> 
> The empty string doesn't need to be translated

True.

> All callers make sure that reason isn't no_error, so perhaps just remove this case?

I am not sure, if I can follow completely. You mean I should remove the case and replace
  gdb_assert_not_reached ("invalid reason"); with return "" ?

> > +    case ssp_unwind_stop_reason::memory_read_error:
> > +      return _("shadow stack memory read failure");
> > +    }
> > +
> > +  gdb_assert_not_reached ("invalid reason"); }
> > +
> > +
> > +/* Read the memory at shadow stack pointer SSP and assign it to
> > +   RETURN_VALUE.  In case we cannot read the memory, set REASON to
> > +   ssp_unwind_stop_reason::memory_read_error and return false.  */
> > +
> > +static bool
> > +read_shadow_stack_memory (gdbarch *gdbarch, CORE_ADDR ssp,
> > +			  CORE_ADDR *return_value,
> > +			  ssp_unwind_stop_reason *reason)
> 
> If a function assumes that a pointer it gets as argument is non-null as this one
> does with return_value and reason, then IMO it's better to get it as a
> reference instead of a pointer. Then the compiler makes sure that it is indeed
> non-null.

I agree, I changed that.

> > +{
> > +  /* On x86 there can be a shadow stack token at bit 63.  For x32, the
> > +     address size is only 32 bit.  Thus, we still must use
> > +     gdbarch_shadow_stack_element_size_aligned (and not
> gdbarch_addr_bit)
> > +     to read the full element for x32 as well.  */
> > +  const int element_size
> > +    = gdbarch_shadow_stack_element_size_aligned (gdbarch);
> > +
> > +  const bfd_endian byte_order = gdbarch_byte_order (gdbarch);
> > +  if (!safe_read_memory_unsigned_integer (ssp, element_size, byte_order,
> > +					  return_value))
> > +    {
> > +      *reason = ssp_unwind_stop_reason::memory_read_error;
> > +      return false;
> > +    }
> > +
> > +  return true;
> > +}
> > +
> > +/*  If possible, return a shadow stack frame info which is COUNT elements
> > +    above the bottom of the shadow stack.  FRAME should point to the top
> > +    of the shadow stack.  RANGE is the shadow stack memory range
> > +    [start_address, end_address) corresponding to FRAME's shadow stack
> > +    pointer.  If COUNT is bigger than the number of elements on the shadow
> > +    stack, return FRAME.
> 
> Here is another place where I find "above/bottom/top" confusing, since
> stacks can grow up or grow down (as pointed out in the next comment in this
> function), and these terms mean different things in each case.

Yes, the comment is now 
"...above the outermost (oldest) element of the shadow stack."

I hope this is more straight-forward.

> > +    In case of failure, assign an appropriate ssp_unwind_stop_reason in
> > +    FRAME->UNWIND_STOP_REASON.  */
> > +
> > +static std::optional<shadow_stack_frame_info>
> > +get_trailing_outermost_shadow_stack_frame_info
> > +  (gdbarch *gdbarch, const std::pair<CORE_ADDR, CORE_ADDR> range,
> > +   const ULONGEST count, shadow_stack_frame_info &frame) {
> > +  /* Compute the number of bytes on the shadow stack, starting at
> > +     FRAME->SSP, which depends on the direction the shadow stack
> > +     grows.  */
> > +  const int element_size
> > +    = gdbarch_shadow_stack_element_size_aligned (gdbarch);
> > +  const unsigned long shadow_stack_bytes
> > +    = (gdbarch_stack_grows_down (gdbarch))
> 
> The parentheses around the function call are superfluous.

Fixed.

> > +       ? range.second - frame.ssp : frame.ssp - range.first +
> > + element_size;
> > +
> > +  gdb_assert ((shadow_stack_bytes % element_size) == 0);  const
> > + unsigned long shadow_stack_size
> > +    = shadow_stack_bytes / element_size;
> 
> This line fits 80 columns and doesn't need to be broken.
> 
> > +  const long level = shadow_stack_size - count;
> 
> In a comment further below you mention that level is 0-based, but doesn't
> this expression mean that it's 1-based? Perhaps it's missing a
> "- 1" term?
> Also, this doesn't work for GCS because it assumes all elements in the stack
> are return addresses. In GCS, the oldest element is a 0 entry
> The 0 entry is why this patch requires AArch64 to implement its own gdbarch
> top_addr_empty_shadow_stack hook.

There is clearly an issue with this function.  But I am not sure if I can follow here.
Shouldn't the issue be fixed when passing LEVEL instead of COUNT, as pointed out by you below?

And if not, do you have an idea how we can fix this? 

> Finally, not a concern for userspace support (and thus this patch
> series) but for OS and hypervisor software there's another kind of GCS entry
> which is the exception return record that is put on the stack when an
> exception is taken. That entry is 32 bytes in size.  I mention this just to
> illustrate that calculating the number of entries in the stack can be non-
> trivial.

Oh, I see. Isn't that already a problem with the current unwinding of the shadow
stack pointer for GCS? How would you fix it there ?

> Not sure how to account for these variations in generic code. Maybe add a
> new gdbarch method for returning the number of entries in the shadow
> stack?

To implement this, I believe we have two possible approaches:

(1) Assume we can determine the number of elements without unwinding each frame (as it is
currently the case). In this scenario, we could introduce a generic gdbarch hook to
retrieve the number of elements for architectures that require a different calculation.

(2) Unwind each shadow stack frame to obtain the trailing outermost frame, similar to how the
normal backtrace works.

Do you see any additional options?

Alternatively, we could keep the current approach for now (without the gdbarch hook, based on
the existing calculation) and only revise the implementation if other OS or hypervisor software
require different logic—once we have the ability to test those cases properly.
What are your thoughts?

> > +
> > +  /* COUNT exceeds the number of elements on the shadow stack.  Return
> the
> > +     starting shadow stack frame info FRAME.  */  if (level <= 0)
> > +    return std::optional<shadow_stack_frame_info> (frame);
> > +
> > +  CORE_ADDR new_ssp = update_shadow_stack_pointer
> > +    (gdbarch, frame.ssp, count, ssp_update_direction::bottom);
> 
> Shouldn't update_shadow_stack_pointer be called with 'level' rather than
> 'count' as argument?

Ah, you’re absolutely right. I’m certain this worked at some point before I posted it.
I’m not sure how this issue slipped in—and even more concerning that my tests didn’t catch it.

> > +  if (gdbarch_stack_grows_down (gdbarch))
> > +    gdb_assert (new_ssp < range.second);  else
> > +    gdb_assert (new_ssp >= range.first);
> > +
> > +  CORE_ADDR new_value;
> > +  if (!read_shadow_stack_memory (gdbarch, new_ssp, &new_value,
> > +				 &frame.unwind_stop_reason))
> > +    return {};
> > +
> > +  return std::optional<shadow_stack_frame_info>
> > +    ({new_ssp, new_value, (ULONGEST) level,
> > +      ssp_unwind_stop_reason::no_error});
> 
> This line causes a compilation error in arm-linux-gnueabihf, and I suppose
> other 32-bit targets as well:
> 
> /home/bauermann/src/binutils-gdb/gdb/shadow-stack.c:471:27: error:
> narrowing conversion of ‘(ULONGEST)((long int)level)’ from ‘ULONGEST’ {aka
> ‘long long unsigned int’} to ‘long unsigned int’ [-Werror=narrowing]
>   471 |     ({new_ssp, new_value, (ULONGEST) level,
> ssp_unwind_stop_reason::no_error});
>       |                           ^~~~~~~~~~~~~~~~
> 
> Also, it fits 80 columns and doesn't need to be broken.

Thanks, casting it as follows:
(unsigned long) level
should hopefully fix this. And then I will have more than 80 characters.

> > +}
> > +
> > +std::optional<shadow_stack_frame_info>
> > +shadow_stack_frame_info::unwind_prev_shadow_stack_frame_info
> > +  (gdbarch *gdbarch, std::pair<CORE_ADDR, CORE_ADDR> range) {
> > +  /* If the user's backtrace limit has been exceeded, stop.  We must
> > +     add two to the current level; one of those accounts for
> > +     backtrace_limit being 1-based and the level being 0-based, and the
> > +     other accounts for the level of the new frame instead of the level
> > +     of the current frame.  */
> > +  if (this->level + 2 > user_set_backtrace_options.backtrace_limit)
> > +    return {};
> > +
> > +  CORE_ADDR new_ssp
> > +    = update_shadow_stack_pointer (gdbarch, this->ssp, 1,
> > +				   ssp_update_direction::bottom);
> > +
> > +  if (gdbarch_stack_grows_down (gdbarch))
> 
> To make this work for GCS, I had to add another if statement before the one
> above, to handle the case where new_ssp is at the initial 0 value:
> 
>   if (gdbarch_top_addr_empty_shadow_stack_p (gdbarch)
>       && gdbarch_top_addr_empty_shadow_stack (gdbarch, new_ssp, range))
>     return {};
>   else if (gdbarch_stack_grows_down (gdbarch))
>     ⋮
> 
> Otherwise "bt shadow" will print the 0 entry:
> 
> (gdb) bt shadow
> #0  0x0000aaaaaaaa08ac in call2 at aarch64-gcs-return.c:65
> #1  0x0000aaaaaaaa08c0 in call1 at aarch64-gcs-return.c:71
> #2  0x0000aaaaaaaa09d4 in main at aarch64-gcs-return.c:110
> #3  0x0000000000000000 in ??

Yes, I missed that. Thanks.

> > +    {
> > +      /* The shadow stack grows downwards.  */
> > +      if (new_ssp >= range.second)
> > +	{
> > +	  /* We reached the bottom of the shadow stack.  */
> 
> In this case, we reached the top actually. This is why I find it confusing to use
> bottom/top as if it where agnostic to whether the stack grows up or down...

In my vision this is to "bottom" actually, if you look at this from a "stack" perspective.
But I changed this to "We reached the outermost element".

> > +	  return {};
> > +	}
> > +      /* We updated new_ssp towards the bottom of the shadow stack
> before,
> > +	 and new_ssp must be pointing to shadow stack memory.  */
> > +      gdb_assert (new_ssp > range.first);
> > +    }
> > +  else
> > +    {
> > +      /* The shadow stack grows upwards.  */
> > +      if (new_ssp < range.first)
> > +	{
> > +	  /* We reached the bottom of the shadow stack.  */
> > +	  return {};
> > +	}
> > +      /* We updated new_ssp towards the bottom of the shadow stack
> before,
> > +	 and new_ssp must be pointing to shadow stack memory.  */
> > +      gdb_assert (new_ssp <= range.second);
> > +    }
> > +
> > +  CORE_ADDR new_value;
> > +  if (!read_shadow_stack_memory (gdbarch, new_ssp, &new_value,
> > +				 &this->unwind_stop_reason))
> > +    return {};
> > +
> > +  return std::optional<shadow_stack_frame_info>
> > +    ({new_ssp, new_value, this->level + 1,
> > +      ssp_unwind_stop_reason::no_error});
> 
> This line fits 80 columns and doesn't need to be broken.

Even though there is this soft limit, I think it looks nicer unbroken, so I changed this.

> > +}
> > +
> > +/* Print all elements on the shadow stack or just the innermost
> COUNT_EXP
> > +   frames.  */
> > +
> > +static void
> > +backtrace_shadow_command (const shadow_stack_print_options
> &print_options,
> > +			  const char *count_exp, int from_tty) {
> > +  if (!target_has_stack ())
> > +    error (_("No shadow stack."));
> > +
> > +  gdbarch *gdbarch = get_current_arch ();
> > +  if (!gdbarch_address_in_shadow_stack_memory_range_p (gdbarch))
> > +    error (_("Printing of the shadow stack backtrace is not supported for"
> > +	     " the current target."));
> > +
> > +  regcache *regcache = get_thread_regcache (inferior_thread ());
> > + bool shadow_stack_enabled = false;
> > +
> > +  std::optional<CORE_ADDR> start_ssp
> > +    = gdbarch_get_shadow_stack_pointer (gdbarch, regcache,
> > +					shadow_stack_enabled);
> > +
> > +  if (!start_ssp.has_value () || !shadow_stack_enabled)
> > +    error (_("Shadow stack is not enabled for the current target."));
> 
> At least for AArch64, GCS can be enabled or disabled per-thread so I would
> say "not enabled for the current thread" here.

I agree, thanks!

> > +  /* Check if START_SSP points to a shadow stack memory range and use
> > +     the returned range to determine when to stop unwinding.
> > +     Note that a shadow stack memory range can change, due to shadow
> stack
> > +     switches for instance on x86 for an inter-privilege far call or when
> > +     calling an interrupt/exception handler at a higher privilege level.
> > +     Shadow stack for userspace is supported for amd64 linux starting with
> > +     Linux kernel v6.6.  However, shadow stack switches are not supported
> > +     due to missing kernel space support.  We therefore implement this
> > +     command without support for shadow stack switches for now.  */
> 
> Hm, I'm not sure if aarch64-linux supports GCS switching. The kernel's gcs.rst
> documentation says:
> 
>   * The architecture provides instructions for switching between guarded
>     control stacks with checks to ensure that the new stack is a valid
>     target for switching.
> 
> And a comment in AArch64's implementation of the map_shadow_stack
> syscall says:
> 
>   /*
>    * Put a cap token at the end of the allocated region so it
>    * can be switched to.
>    */
> 
> But I don't see anything positively mention that it's supported.
> I assume so, but I'll have to confirm. If that is the case, later I will submit a
> patch with any necessary changes.

Ok, so keeping the current comment is fine for you?

> > +  std::pair<CORE_ADDR, CORE_ADDR> range;
> > +  if (!gdbarch_address_in_shadow_stack_memory_range (gdbarch,
> *start_ssp,
> > +						     &range))
> 
> Shouldn't this if condition also check
> gdbarch_top_addr_empty_shadow_stack?

For x86 this logic is fine, but I assume for GCS this does not work for empty
shadow stacks?

> > +    {
> > +      /* If the current shadow stack pointer does not point to shadow
> > +	 stack memory, the shadow stack is empty.  */
> > +      gdb_printf (_("The shadow stack is empty.\n"));
> > +      return;
> > +    }
> > +
> > +  /* Extract the first shadow stack frame info (level 0).  */
> > +  ssp_unwind_stop_reason reason = ssp_unwind_stop_reason::no_error;
> > +  std::optional<shadow_stack_frame_info> current;
> > +  CORE_ADDR new_value;
> > +  if (read_shadow_stack_memory (gdbarch, *start_ssp, &new_value,
> &reason))
> > +    current = {*start_ssp, new_value, 0,
> > +	       ssp_unwind_stop_reason::no_error};
> 
> This line fits in 80 columns and doesn't need to be broken.

Yes, I changed that.

> > +
> > +  std::optional<shadow_stack_frame_info> trailing = current;
> > +
> > +  LONGEST count = -1;
> > +  if (current.has_value () && count_exp != nullptr)
> > +    {
> > +      count = parse_and_eval_long (count_exp);
> > +      /* If count is negative, update trailing with the shadow stack frame
> > +	 info from which we should start printing.  */
> 
> Actually, trailing will be the frame above the one from which we should start
> printing. For example, if count is -3
> get_trailing_outermost_shadow_stack_frame_info will return the frame
> "which is COUNT elements above the bottom of the shadow stack", which in
> this case is the 4th frame counting from the oldest frame. But we need to
> start printing from the 3rd oldest frame ...

> > +      if (count < 0)
> > +	{
> > +	  trailing = get_trailing_outermost_shadow_stack_frame_info
> > +		       (gdbarch, range, std::abs (count), *current);
> 
> ... so this call should pass std::abs (count) - 1 as argument.

Hm, I am not sure if I can follow. With the fix for passing level instead
of count my current output looks as follow:
       
~~~
Breakpoint 1, call2 () at /tmp/amd64-shadow-stack.c:21
21        return 42; /* break call2.  */
(gdb) bt -past-main
#0  call2 () at /tmp /amd64-shadow-stack.c:21
#1  0x0000555555555142 in call1 () at /tmp/amd64-shadow-stack.c:27
#2  0x0000555555555153 in main () at /tmp/amd64-shadow-stack.c:38
#3  0x00007ffff7c2a1ca in __libc_start_call_main ([...]
#4  0x00007ffff7c2a28b in __libc_start_main_impl ([...]) at ../csu/libc-start.c:360
#5  0x0000555555555065 in _start ()
(gdb) bt -past-main -3
#3  0x00007ffff7c2a1ca in __libc_start_call_main ([...]) at ../sysdeps/nptl/libc_start_call_main.h:58
#4  0x00007ffff7c2a28b in __libc_start_main_impl ([...])    at ../csu/libc-start.c:360
#5  0x0000555555555065 in _start ()
(gdb) bt shadow -3
#2  0x00007ffff7c2a1ca in __libc_start_call_main at ../sysdeps/nptl/libc_start_call_main.h:74
#3  0x00007ffff7c2a28b in __libc_start_main_impl at ../csu/libc-start.c:128
#4  0x0000555555555065 in _start
(gdb) bt shadow
#0  0x0000555555555142 in call1 at /tmp/amd64-shadow-stack.c:28
#1  0x0000555555555153 in main at /tmp/amd64-shadow-stack.c:39
#2  0x00007ffff7c2a1ca in __libc_start_call_main at ../sysdeps/nptl/libc_start_call_main.h:74
#3  0x00007ffff7c2a28b in __libc_start_main_impl at ../csu/libc-start.c:128
#4  0x0000555555555065 in _start
~~~

Which is correct from my perspective, but maybe I am missing something. 
I think I lost the overview a bit, there are a number of issues in my code here, unfortunately. :/
Note that for this output I still print the level starting at 0. Will apply this change once the other issues are clear.

> > +	  if (!trailing.has_value ())
> > +	    reason = current->unwind_stop_reason;
> > +	}
> > +    }
> > +
> > +  if (!trailing.has_value ())
> > +    {
> > +      if (reason > ssp_unwind_stop_reason::no_error)
> > +	error (_("Cannot print shadow stack backtrace: %s.\n"),
> > +	       ssp_unwind_stop_reason_to_err_string (reason));
> > +      else
> > +	gdb_assert_not_reached ("invalid reason");
> > +    }
> 
> It's clearer to write this as:
> 
>   if (!trailing.has_value ())
>     {
>       gdb_assert (reason != ssp_unwind_stop_reason::no_error);
> 
>       error (_("Cannot print shadow stack backtrace: %s.\n"),
> 	     ssp_unwind_stop_reason_to_err_string (reason));
>     }

I agree, I changed that.

> > +
> > +  current = trailing;
> > +  while (current.has_value () && count--)
> 
> The GDB Coding Standard says that comparing a number to zero should be
> explicit, so "count-- != 0" here. I see that backtrace_command_1 already has
> the implicit comparison, but it's probably a mistake there (or just old code).

Yes, fixed. Thanks!

> 
> Also, another way of expressing the above would be:
> 
>   for (current = trailing; current.has_value () && count != 0; count--)
> 
> I personally think it's clearer (especially because the comparison and
> decrement are separate), but it's more of a personal preference so I don't
> really mind either way.

I agree, and took your suggestion, thanks !:) 

> 
> > +    {
> > +      QUIT;
> > +
> > +      print_shadow_stack_frame_info (gdbarch, print_options, *current,
> > +				     LOCATION);
> > +
> > +      trailing = current;
> > +      current = current->unwind_prev_shadow_stack_frame_info (gdbarch,
> > +							      range);
> 
> This line fits in 80 columns and doesn't need to be broken.

Hm, weird, I again count more than 80 columns.

> > +    }
> > +
> > +  /* If we've stopped before the end, mention that.  */  if (current
> > + && from_tty)
> 
> While it's correct to use an std::optional in this way to check whether it has a
> value, IMHO it's clearer to be more explicit and use the has_value method.
> It's also consistent with the rest of the code in this function.

I agree. I fixed that.

> > +    gdb_printf (_("(More shadow stack frames follow...)\n"));
> > +
> > +  /* If we've run out of shadow stack frames, and the reason appears to
> > +     be an error condition, print it.  */  if (!current.has_value ()
> > + && trailing.has_value ()
> 
> If I'm not mistaken, trailing.has_value () is always true at this point.

I agree, this logic is from backtrace_command_1. 
I think adding an assert here should be fine instead, so I suggest the following:

~~~
[...]
  /* If we've stopped before the end, mention that.  */
  if (current.has_value () && from_tty)
    gdb_printf (_("(More shadow stack frames follow...)\n"));

  /* Due to the loop above, trailing always has a value at this point.  */
  gdb_assert (trailing.has_value ());

  /* If we've run out of shadow stack frames, and the reason appears to
     be an error condition, print it.  */
[...]
~~~

Please let me know if you think otherwise.

> > +      && (trailing->unwind_stop_reason >
> ssp_unwind_stop_reason::no_error))
> > +    gdb_printf (_("Shadow stack backtrace stopped at shadow stack " \
> > +		  "pointer %s due to: %s.\n"),
> > +		paddress (gdbarch, trailing->ssp),
> > +		ssp_unwind_stop_reason_to_err_string
> > +		  (trailing->unwind_stop_reason));
> > +}
> 
> <snip>
> 
> > diff --git a/gdb/stack.c b/gdb/stack.c index 40756f74a00..30a7d8621be
> > 100644
> > --- a/gdb/stack.c
> > +++ b/gdb/stack.c
> > @@ -50,6 +50,7 @@
> >  #include "linespec.h"
> >  #include "cli/cli-utils.h"
> >  #include "objfiles.h"
> > +#include "shadow-stack.h"
> >
> >  #include "symfile.h"
> >  #include "extension.h"
> > @@ -86,7 +87,7 @@ const char print_frame_info_source_and_location[] =
> > "source-and-location";  const char
> > print_frame_info_location_and_address[] = "location-and-address";
> > const char print_frame_info_short_location[] = "short-location";
> >
> > -static const char *const print_frame_info_choices[] =
> > +const char *const print_frame_info_choices[] =
> >  {
> >    print_frame_info_auto,
> >    print_frame_info_source_line,
> > @@ -962,11 +963,9 @@ do_gdb_disassembly (struct gdbarch *gdbarch,
> >      }
> >  }
> >
> > -/* Converts the PRINT_FRAME_INFO choice to an optional enum
> print_what.
> > -   Value not present indicates to the caller to use default values
> > -   specific to the command being executed.  */
> > +/* See stack.h.  */
> >
> > -static std::optional<enum print_what>
> > +std::optional<enum print_what>
> >  print_frame_info_to_print_what (const char *print_frame_info)  {
> >    for (int i = 0; print_frame_info_choices[i] != NULL; i++) @@
> > -1016,7 +1015,7 @@ get_user_print_what_frame_info
> (std::optional<enum
> > print_what> *what)
> >  /* Return true if PRINT_WHAT is configured to print the location of a
> >     frame.  */
> 
> Change comment here to /* See stack.h.  */

Fixed.

> 
> > -static bool
> > +bool
> >  should_print_location (print_what print_what)  {
> >    return (print_what == LOCATION
> > @@ -1025,14 +1024,9 @@ should_print_location (print_what print_what)
> >  	  || print_what == SHORT_LOCATION);
> >  }
> >
> > -/* Print the source information for PC and SAL to UIOUT.  Based on the
> > -   user-defined configuration disassemble-next-line, display disassembly
> > -   of the next source line, in addition to displaying the source line
> > -   itself.  Print annotations describing source file and and line number
> > -   based on MID_STATEMENT information.  If SHOW_ADDRESS is true, print
> the
> > -   program counter PC including, if non-empty, PC_ADDRESS_FLAGS.  */
> > +/* See stack.h.  */
> >
> > -static void
> > +void
> >  print_source (ui_out *uiout, gdbarch *gdbarch, CORE_ADDR pc,
> >  	      symtab_and_line sal, bool show_address, int mid_statement,
> >  	      const std::string &pc_address_flags) @@ -1298,7 +1292,7 @@
> > get_last_displayed_sal ()
> >
> >  /* Find the function name for the symbol SYM.  */
> 
> Change comment here to /* See stack.h.  */

Right, fixed.

> >
> > -static gdb::unique_xmalloc_ptr<char>
> > +gdb::unique_xmalloc_ptr<char>
> >  find_symbol_funname (const symbol *sym)  {
> >    gdb::unique_xmalloc_ptr<char> funname;
> 
> <snip>
> 
> > +/* Completer for the "backtrace shadow" sub-command.  */
> > +
> > +static void
> > +backtrace_shadow_command_completer (struct cmd_list_element
> *ignore,
> > +				    completion_tracker &tracker,
> > +				    const char *text, const char */*word*/) {
> > +  const auto group
> > +    = make_backtrace_shadow_options_def_group (nullptr);
> > +  if (gdb::option::complete_options
> > +      (tracker, &text,
> gdb::option::PROCESS_OPTIONS_UNKNOWN_IS_OPERAND, group))
> > +    return;
> > +
> > +  const char *word = advance_to_expression_complete_word_point
> > +(tracker, text);
> > +  expression_completer (ignore, tracker, text, word); }
> 
> I would put this function in shadow-stack.c.

Yes, I could do that. But I believe once we changed "bt shadow" to "bt -shadow",
We don't need this anymore. But if we do, I'll move it. 

> 
> <snip>
> 
> > diff --git a/gdb/testsuite/gdb.arch/amd64-shadow-stack-cmds.exp
> > b/gdb/testsuite/gdb.arch/amd64-shadow-stack-cmds.exp
> > index 0ae172d7c41..4563e49d9e4 100644
> > --- a/gdb/testsuite/gdb.arch/amd64-shadow-stack-cmds.exp
> > +++ b/gdb/testsuite/gdb.arch/amd64-shadow-stack-cmds.exp
> > @@ -109,6 +109,94 @@ save_vars { ::env(GLIBC_TUNABLES) } {
> >  	gdb_test "print /x \$pl3_ssp" "= $ssp_call2" "check pl3_ssp of frame
> 0"
> >      }
> >
> > +    set fill "\[^\r\n\]+"
> > +    # Build shadow stack frames to test the 'backtrace shadow' command.
> > +    set sspval_main [get_valueof "/z" "*(long long int*)$ssp_main" ""]
> > +    set sspval_call1 [get_valueof "/z" "*(long long int*)$ssp_call1" ""]
> > +    set sspval_call2 [get_valueof "/z" "*(long long int*)$ssp_call2"
> > + ""]
> 
> I suggest adding a descriptive test name to the get_valueof calls above.
> Perhaps "read newest shadow stack entry at main/call1/call2"?

Ok, added.

> 
> > +    set frame0 "#0\[ \t\]*$sspval_call2 in call1$fill"
> > +    set frame1 "#1\[ \t\]*$sspval_call1 in main$fill"
> > +    set frame2 "#2\[ \t\]*$sspval_main$fill"
> > +
> > +    # We can only test that we print the first 3 frames correctly, as the
> > +    # shadow stack enablement might depend on the underlying OS.
> > +    gdb_test "bt shadow" \
> > +	[multi_line \
> > +	    "$frame0" \
> > +	    "$frame1" \
> > +	    "$frame2" \
> > +	    ".*" ] \
> > +	"test shadow stack backtrace until the bottom of the stack."
> > +
> > +    gdb_test "bt shadow 2" \
> > +	[multi_line \
> > +	    "$frame0" \
> > +	    "$frame1" \
> > +	    "\\(More shadow stack frames follow...\\)" ] \
> > +	"test shadow stack backtrace with a positive value for count"
> > +
> > +    # We can only test that we print a single frame, as the shadow stack
> > +    # enablement might depend on the underlying OS.
> > +    gdb_test "bt shadow -1" "#$decimal\[ \t\]*$hex$fill" \
> > +	"test shadow stack backtrace with a negative value for count"
> 
> In my GCS testcase this test is passing, even though the command is printing
> more than one frame:
> 
> bt shadow -1
> #3  0x0000aaaaaaaa08c0 in call1 at /home/bauermann/src/binutils-
> gdb/gdb/testsuite/gdb.arch/aarch64-gcs-return.c:71
> #4  0x0000aaaaaaaa09d4 in main at /home/bauermann/src/binutils-
> gdb/gdb/testsuite/gdb.arch/aarch64-gcs-return.c:110
> #5  0x0000000000000000 in ??
> (gdb) PASS: gdb.arch/aarch64-gcs-backtrace.exp: test shadow stack backtrace
> with a negative value for count
>
> So there's one bug in GDB, and one in the testcase. To fix the testcase bug, I
> believe you just have to add '^' to the beginning of the pattern.
> The bug in GDB was fixed by changing the expression to calculate 'level'
> in get_trailing_outermost_shadow_stack_frame_info as I mentioned above.
> 
> --
> Thiago

Thanks a lot for spotting this. I fixed the GDB bug by passing "level" instead of count
and added the '^' in the testcase, just like you suggested.

Christina

Intel Deutschland GmbH
Registered Address: Dornacher Straße 1, 85622 Feldkirchen, Germany
Tel: +49 89 991 430, www.intel.de
Managing Directors: Harry Demas, Jeffrey Schneiderman, Yin Chong Sorrell
Chairperson of the Supervisory Board: Nicole Lau
Registered Seat: Munich
Commercial Register: Amtsgericht München HRB 186928

  reply	other threads:[~2025-11-17 20:27 UTC|newest]

Thread overview: 67+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-09-23 11:18 [PATCH 0/9] Add new command " Christina Schimpe
2025-09-23 11:18 ` [PATCH 1/9] gdb: Generalize handling of the shadow stack pointer Christina Schimpe
2025-10-31  1:31   ` Thiago Jung Bauermann
2025-11-17 11:18     ` Schimpe, Christina
2025-11-26  4:19       ` Thiago Jung Bauermann
2025-12-30 10:39         ` Schimpe, Christina
2025-09-23 11:18 ` [PATCH 2/9] gdb: Refactor 'stack.c:print_frame' Christina Schimpe
2025-10-03 20:05   ` Tom Tromey
2025-09-23 11:18 ` [PATCH 3/9] gdb: Introduce 'stack.c:print_pc' function without frame argument Christina Schimpe
2025-10-03 19:56   ` Tom Tromey
2025-09-23 11:18 ` [PATCH 4/9] gdb: Refactor 'find_symbol_funname' and 'info_frame_command_core' in stack.c Christina Schimpe
2025-10-03 19:55   ` Tom Tromey
2025-09-23 11:18 ` [PATCH 5/9] gdb: Refactor 'stack.c:print_frame_info' Christina Schimpe
2025-10-03 20:03   ` Tom Tromey
2025-09-23 11:18 ` [PATCH 6/9] gdb: Implement 'bt shadow' to print the shadow stack backtrace Christina Schimpe
2025-09-23 11:47   ` Eli Zaretskii
2025-09-25 11:06     ` Schimpe, Christina
2025-09-25 13:19       ` Eli Zaretskii
2025-09-25 14:58         ` Simon Marchi
2025-09-26  7:45           ` Schimpe, Christina
2025-10-29 15:05             ` Schimpe, Christina
2025-10-29 15:28               ` Guinevere Larsen
2025-11-03 19:47                 ` Schimpe, Christina
2025-11-04 11:53                   ` Guinevere Larsen
2025-11-05 16:33                     ` Schimpe, Christina
2025-10-13  1:17       ` Thiago Jung Bauermann
2025-10-13  7:19         ` Schimpe, Christina
2025-10-31  4:39           ` Thiago Jung Bauermann
2025-11-06 14:23             ` Schimpe, Christina
2025-10-03 20:15   ` Tom Tromey
2025-10-12 19:45     ` Schimpe, Christina
2026-02-19 17:24       ` Tom Tromey
2026-03-02 12:24         ` Schimpe, Christina
2025-10-31  4:02   ` Thiago Jung Bauermann
2025-11-17 20:14     ` Schimpe, Christina [this message]
2025-11-26  4:07       ` Thiago Jung Bauermann
2025-11-26 16:29         ` Thiago Jung Bauermann
2026-01-22 17:04           ` Schimpe, Christina
2026-03-06  2:35             ` Thiago Jung Bauermann
2026-01-15 14:05         ` Schimpe, Christina
2025-09-23 11:18 ` [PATCH 7/9] gdb: Provide gdbarch hook to distinguish shadow stack backtrace elements Christina Schimpe
2025-09-23 11:49   ` Eli Zaretskii
2025-09-25 11:10     ` Schimpe, Christina
2025-11-02 21:20       ` Thiago Jung Bauermann
2025-11-12 17:28         ` Schimpe, Christina
2025-11-16 18:39           ` Thiago Jung Bauermann
2025-11-17 11:51             ` Schimpe, Christina
2025-09-23 11:18 ` [PATCH 8/9] gdb: Implement the hook 'is_no_return_shadow_stack_address' for amd64 linux Christina Schimpe
2025-11-26  4:22   ` Thiago Jung Bauermann
2025-09-23 11:18 ` [PATCH 9/9] gdb, mi: Add -shadow-stack-list-frames command Christina Schimpe
2025-09-23 11:53   ` Eli Zaretskii
2025-09-25 11:32     ` Schimpe, Christina
2025-10-03 20:17   ` Tom Tromey
2025-10-12 19:54     ` Schimpe, Christina
2025-10-13  0:06       ` Thiago Jung Bauermann
2025-11-26  4:26   ` Thiago Jung Bauermann
2026-01-22 17:01     ` Schimpe, Christina
2026-03-06  2:44       ` Thiago Jung Bauermann
2025-09-25 11:46 ` [PATCH 0/9] Add new command to print the shadow stack backtrace Schimpe, Christina
2025-10-08  1:46   ` Thiago Jung Bauermann
2025-10-13  1:18     ` Thiago Jung Bauermann
2025-10-13  6:34       ` Schimpe, Christina
2025-10-29 14:52         ` Schimpe, Christina
2025-10-31  0:47           ` Thiago Jung Bauermann
2025-12-30 10:16             ` Schimpe, Christina
2026-03-06  2:30               ` Thiago Jung Bauermann
2026-03-12  9:53                 ` Schimpe, Christina

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=SN7PR11MB76380C7717A3CB137ACD9C85F9C9A@SN7PR11MB7638.namprd11.prod.outlook.com \
    --to=christina.schimpe@intel.com \
    --cc=gdb-patches@sourceware.org \
    --cc=thiago.bauermann@linaro.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox