From: "Schimpe, Christina" <christina.schimpe@intel.com>
To: gdb-patches@sourceware.org
Subject: [PATCH v6 2/2] LAM: Enable tagged pointer support for watchpoints.
Date: Mon, 28 Oct 2024 08:46:27 +0000 [thread overview]
Message-ID: <20241028084627.453792-3-christina.schimpe@intel.com> (raw)
In-Reply-To: <20241028084627.453792-1-christina.schimpe@intel.com>
From: Christina Schimpe <christina.schimpe@intel.com>
The Intel (R) linear address masking (LAM) feature modifies the checking
applied to 64-bit linear addresses. With this so-called "modified
canonicality check" the processor masks the metadata bits in a pointer
before using it as a linear address. LAM supports two different modes that
differ regarding which pointer bits are masked and can be used for
metadata: LAM 48 resulting in a LAM width of 15 and LAM 57 resulting in a
LAM width of 6.
This patch adjusts watchpoint addresses based on the currently enabled
LAM mode using the untag mask provided in the /proc/<pid>/status file.
As LAM can be enabled at runtime or as the configuration may change
when entering an enclave, GDB checks enablement state each time a watchpoint
is updated.
In contrast to the patch implemented for ARM's Top Byte Ignore "Clear
non-significant bits of address on memory access", it is not necessary to
adjust addresses before they are passed to the target layer cache, as
for LAM tagged pointers are supported by the system call to read memory.
Additionally, LAM applies only to addresses used for data accesses.
Thus, it is sufficient to mask addresses used for watchpoints.
The following examples are based on a LAM57 enabled program.
Before this patch tagged pointers were not supported for watchpoints:
~~~
(gdb) print pi_tagged
$2 = (int *) 0x10007ffffffffe004
(gdb) watch *pi_tagged
Hardware watchpoint 2: *pi_tagged
(gdb) c
Continuing.
Couldn't write debug register: Invalid argument.
~~~~
Once LAM 48 or LAM 57 is enabled for the current program, GDB can now
specify watchpoints for tagged addresses with LAM width 15 or 6,
respectively.
Approved-By: Felix Willgerodt <felix.willgerodt@intel.com>
---
gdb/NEWS | 5 +++
gdb/amd64-linux-tdep.c | 64 ++++++++++++++++++++++++++++
gdb/testsuite/gdb.arch/amd64-lam.c | 49 +++++++++++++++++++++
gdb/testsuite/gdb.arch/amd64-lam.exp | 46 ++++++++++++++++++++
gdb/testsuite/lib/gdb.exp | 63 +++++++++++++++++++++++++++
5 files changed, 227 insertions(+)
create mode 100755 gdb/testsuite/gdb.arch/amd64-lam.c
create mode 100644 gdb/testsuite/gdb.arch/amd64-lam.exp
diff --git a/gdb/NEWS b/gdb/NEWS
index 42b8a88fd8a..e25b6c414c9 100644
--- a/gdb/NEWS
+++ b/gdb/NEWS
@@ -3,6 +3,11 @@
*** Changes since GDB 15
+* GDB now supports watchpoints for tagged data pointers (see
+ https://en.wikipedia.org/wiki/Tagged_pointer) on amd64, such as the
+ one used by the Linear Address Masking (LAM) feature provided by
+ Intel.
+
* Debugging support for Intel MPX has been removed. This includes the
removal of
** MPX register support
diff --git a/gdb/amd64-linux-tdep.c b/gdb/amd64-linux-tdep.c
index 77de8211d86..2c76a1de5a8 100644
--- a/gdb/amd64-linux-tdep.c
+++ b/gdb/amd64-linux-tdep.c
@@ -43,6 +43,7 @@
#include "target-descriptions.h"
#include "expop.h"
#include "arch/amd64-linux-tdesc.h"
+#include "inferior.h"
/* The syscall's XML filename for i386. */
#define XML_SYSCALL_FILENAME_AMD64 "syscalls/amd64-linux.xml"
@@ -50,6 +51,10 @@
#include "record-full.h"
#include "linux-record.h"
+#include <string_view>
+
+#define DEFAULT_TAG_MASK 0xffffffffffffffffULL
+
/* Mapping between the general-purpose registers in `struct user'
format and GDB's register cache layout. */
@@ -1767,6 +1772,62 @@ amd64_dtrace_parse_probe_argument (struct gdbarch *gdbarch,
}
}
+/* Extract the untagging mask based on the currently active linear address
+ masking (LAM) mode, which is stored in the /proc/<pid>/status file.
+ If we cannot extract the untag mask (for example, if we don't have
+ execution), we assume address tagging is not enabled and return the
+ DEFAULT_TAG_MASK. */
+
+static CORE_ADDR
+amd64_linux_lam_untag_mask ()
+{
+ if (!target_has_execution ())
+ return DEFAULT_TAG_MASK;
+
+ inferior *inf = current_inferior ();
+ if (inf->fake_pid_p)
+ return DEFAULT_TAG_MASK;
+
+ const std::string filename = string_printf ("/proc/%d/status", inf->pid);
+ gdb::unique_xmalloc_ptr<char> status_file
+ = target_fileio_read_stralloc (nullptr, filename.c_str ());
+
+ if (status_file == nullptr)
+ return DEFAULT_TAG_MASK;
+
+ std::string_view status_file_view (status_file.get ());
+ constexpr std::string_view untag_mask_str = "untag_mask:\t";
+ const size_t found = status_file_view.find (untag_mask_str);
+ if (found != std::string::npos)
+ {
+ const char* start = status_file_view.data() + found
+ + untag_mask_str.length ();
+ char* endptr;
+ errno = 0;
+ unsigned long long result = std::strtoul (start, &endptr, 0);
+ if (errno != 0 || endptr == start)
+ error (_("Failed to parse untag_mask from file %s."),
+ std::string (filename).c_str ());
+
+ return result;
+ }
+
+ return DEFAULT_TAG_MASK;
+}
+
+/* Adjust watchpoint address based on the currently active linear address
+ masking (LAM) mode using the untag mask. Check each time for a new
+ mask, as LAM is enabled at runtime. */
+
+static CORE_ADDR
+amd64_linux_remove_non_address_bits_watchpoint (gdbarch *gdbarch,
+ CORE_ADDR addr)
+{
+ /* Clear insignificant bits of a target address using the untag
+ mask. */
+ return (addr & amd64_linux_lam_untag_mask ());
+}
+
static void
amd64_linux_init_abi_common(struct gdbarch_info info, struct gdbarch *gdbarch,
int num_disp_step_buffers)
@@ -1818,6 +1879,9 @@ amd64_linux_init_abi_common(struct gdbarch_info info, struct gdbarch *gdbarch,
set_gdbarch_process_record (gdbarch, i386_process_record);
set_gdbarch_process_record_signal (gdbarch, amd64_linux_record_signal);
+
+ set_gdbarch_remove_non_address_bits_watchpoint
+ (gdbarch, amd64_linux_remove_non_address_bits_watchpoint);
}
static void
diff --git a/gdb/testsuite/gdb.arch/amd64-lam.c b/gdb/testsuite/gdb.arch/amd64-lam.c
new file mode 100755
index 00000000000..0fe2bc6c2ad
--- /dev/null
+++ b/gdb/testsuite/gdb.arch/amd64-lam.c
@@ -0,0 +1,49 @@
+/* This testcase is part of GDB, the GNU debugger.
+
+ Copyright 2023-2024 Free Software Foundation, Inc.
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <http://www.gnu.org/licenses/>. */
+
+#define _GNU_SOURCE
+#include <stdint.h>
+#include <unistd.h>
+#include <stdlib.h>
+#include <sys/syscall.h>
+#include <assert.h>
+#include <errno.h>
+#include <asm/prctl.h>
+
+int
+main (int argc, char **argv)
+{
+ int i;
+ int* pi = &i;
+ int* pi_tagged;
+
+ /* Enable LAM 57. */
+ errno = 0;
+ syscall (SYS_arch_prctl, ARCH_ENABLE_TAGGED_ADDR, 6);
+ assert_perror (errno);
+
+ /* Add tagging at bit 61. */
+ pi_tagged = (int *) ((uintptr_t) pi | (1LL << 60));
+
+ i = 0; /* Breakpoint here. */
+ *pi = 1;
+ *pi_tagged = 2;
+ *pi = 3;
+ *pi_tagged = 4;
+
+ return 0;
+}
diff --git a/gdb/testsuite/gdb.arch/amd64-lam.exp b/gdb/testsuite/gdb.arch/amd64-lam.exp
new file mode 100644
index 00000000000..0bcbb639b66
--- /dev/null
+++ b/gdb/testsuite/gdb.arch/amd64-lam.exp
@@ -0,0 +1,46 @@
+# Copyright 2023-2024 Free Software Foundation, Inc.
+
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
+
+# Test Linear Address Masking (LAM) support.
+
+require allow_lam_tests
+
+standard_testfile amd64-lam.c
+
+# Test LAM 57.
+if { [prepare_for_testing "failed to prepare" ${testfile} ${srcfile}] } {
+ return -1
+}
+
+if { ![runto_main] } {
+ return -1
+}
+
+gdb_breakpoint [gdb_get_line_number "Breakpoint here"]
+gdb_continue_to_breakpoint "Breakpoint here"
+
+# Test hw watchpoint for a tagged and an untagged address with hit on a
+# tagged and an untagged address each.
+
+foreach symbol {"pi" "pi_tagged"} {
+ gdb_test "watch *${symbol}"
+ gdb_test "continue" \
+ "Continuing\\..*Hardware watchpoint \[0-9\]+.*" \
+ "run until watchpoint on ${symbol}"
+ gdb_test "continue" \
+ "Continuing\\..*Hardware watchpoint \[0-9\]+.*" \
+ "run until watchpoint on ${symbol}, 2nd hit"
+ delete_breakpoints
+}
diff --git a/gdb/testsuite/lib/gdb.exp b/gdb/testsuite/lib/gdb.exp
index a438a101fc9..0ab29f35393 100644
--- a/gdb/testsuite/lib/gdb.exp
+++ b/gdb/testsuite/lib/gdb.exp
@@ -4295,6 +4295,69 @@ gdb_caching_proc allow_avx512fp16_tests {} {
return $allow_avx512fp16_tests
}
+# Run a test on the target to see if it supports LAM 57. Return 1 if so,
+# 0 if it does not. Based on the arch_prctl() handle ARCH_ENABLE_TAGGED_ADDR
+# to enable LAM which fails if the hardware or the OS does not support LAM.
+
+gdb_caching_proc allow_lam_tests {} {
+ global gdb_prompt inferior_exited_re
+
+ set me "allow_lam_tests"
+ if { ![istarget "x86_64-*-*"] } {
+ verbose "$me: target does not support LAM, returning 1" 2
+ return 0
+ }
+
+ # Compile a test program.
+ set src {
+ #define _GNU_SOURCE
+ #include <sys/syscall.h>
+ #include <assert.h>
+ #include <errno.h>
+ #include <asm/prctl.h>
+
+ int configure_lam ()
+ {
+ errno = 0;
+ syscall (SYS_arch_prctl, ARCH_ENABLE_TAGGED_ADDR, 6);
+ assert_perror (errno);
+ return errno;
+ }
+
+ int
+ main () { return configure_lam (); }
+ }
+
+ if {![gdb_simple_compile $me $src executable ""]} {
+ return 0
+ }
+ # No error message, compilation succeeded so now run it via gdb.
+
+ set allow_lam_tests 0
+ clean_restart $obj
+ gdb_run_cmd
+ gdb_expect {
+ -re ".*$inferior_exited_re with code.*${gdb_prompt} $" {
+ verbose -log "$me: LAM support not detected."
+ }
+ -re ".*Program received signal SIGABRT, Aborted.*${gdb_prompt} $" {
+ verbose -log "$me: LAM support not detected."
+ }
+ -re ".*$inferior_exited_re normally.*${gdb_prompt} $" {
+ verbose -log "$me: LAM support detected."
+ set allow_lam_tests 1
+ }
+ default {
+ warning "\n$me: default case taken."
+ }
+ }
+ gdb_exit
+ remote_file build delete $obj
+
+ verbose "$me: returning $allow_lam_tests" 2
+ return $allow_lam_tests
+}
+
# Run a test on the target to see if it supports btrace hardware. Return 1 if so,
# 0 if it does not. Based on 'check_vmx_hw_available' from the GCC testsuite.
--
2.34.1
Intel Deutschland GmbH
Registered Address: Am Campeon 10, 85579 Neubiberg, Germany
Tel: +49 89 99 8853-0, www.intel.de
Managing Directors: Sean Fennelly, Jeffrey Schneiderman, Tiffany Doon Silva
Chairperson of the Supervisory Board: Nicole Lau
Registered Office: Munich
Commercial Register: Amtsgericht Muenchen HRB 186928
next prev parent reply other threads:[~2024-10-28 8:46 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-10-28 8:46 [PATCH v6 0/2] Add amd64 LAM watchpoint support Schimpe, Christina
2024-10-28 8:46 ` [PATCH v6 1/2] gdb: Make tagged pointer support configurable Schimpe, Christina
2024-11-04 11:17 ` Luis Machado
2024-11-05 14:07 ` Schimpe, Christina
2024-11-05 14:22 ` Luis Machado
2024-11-05 14:40 ` Schimpe, Christina
2024-11-05 14:51 ` Luis Machado
2024-11-05 15:09 ` Schimpe, Christina
2024-11-05 15:14 ` Luis Machado
2024-11-05 15:36 ` Schimpe, Christina
2024-10-28 8:46 ` Schimpe, Christina [this message]
2024-11-04 8:37 ` [PATCH v6 0/2] Add amd64 LAM watchpoint support Schimpe, Christina
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20241028084627.453792-3-christina.schimpe@intel.com \
--to=christina.schimpe@intel.com \
--cc=gdb-patches@sourceware.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).