xref: /netbsd-src/external/gpl3/gcc.old/dist/libgcc/config/i386/shadow-stack-unwind.h (revision 4c3eb207d36f67d31994830c0a694161fc1ca39b)
1 /* _Unwind_Frames_Extra with shadow stack for x86-64 and x86.
2    Copyright (C) 2017-2020 Free Software Foundation, Inc.
3 
4 This file is part of GCC.
5 
6 GCC is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3, or (at your option)
9 any later version.
10 
11 GCC is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14 GNU General Public License for more details.
15 
16 Under Section 7 of GPL version 3, you are granted additional
17 permissions described in the GCC Runtime Library Exception, version
18 3.1, as published by the Free Software Foundation.
19 
20 You should have received a copy of the GNU General Public License and
21 a copy of the GCC Runtime Library Exception along with this program;
22 see the files COPYING3 and COPYING.RUNTIME respectively.  If not, see
23 <http://www.gnu.org/licenses/>.  */
24 
25 /* NB: We need _get_ssp and _inc_ssp from <cetintrin.h>.  But we can't
26    include <x86intrin.h> which ends up including <mm_malloc.h>, which
27    includes <stdlib.h> and <errno.h> unconditionally.  But we can't
28    include any libc system headers unconditionally from libgcc.  Avoid
29    including <mm_malloc.h> here by defining _IMMINTRIN_H_INCLUDED.  */
30 #define _IMMINTRIN_H_INCLUDED
31 #include <cetintrin.h>
32 #undef _IMMINTRIN_H_INCLUDED
33 
34 /* Unwind the shadow stack for EH.  */
35 #undef _Unwind_Frames_Extra
36 #define _Unwind_Frames_Extra(x)			\
37   do						\
38     {						\
39       _Unwind_Word ssp = _get_ssp ();		\
40       if (ssp != 0)				\
41 	{					\
42 	  _Unwind_Word tmp = (x);		\
43 	  while (tmp > 255)			\
44 	    {					\
45 	      _inc_ssp (255);			\
46 	      tmp -= 255;			\
47 	    }					\
48 	  _inc_ssp (tmp);			\
49 	}					\
50     }						\
51     while (0)
52 
53 /* Linux CET kernel places a restore token on shadow stack for signal
54    handler to enhance security.  The restore token is 8 byte and aligned
55    to 8 bytes.  It is usually transparent to user programs since kernel
56    will pop the restore token when signal handler returns.  But when an
57    exception is thrown from a signal handler, now we need to pop the
58    restore token from shadow stack.  For x86-64, we just need to treat
59    the signal frame as normal frame.  For i386, we need to search for
60    the restore token to check if the original shadow stack is 8 byte
61    aligned.  If the original shadow stack is 8 byte aligned, we just
62    need to pop 2 slots, one restore token, from shadow stack.  Otherwise,
63    we need to pop 3 slots, one restore token + 4 byte padding, from
64    shadow stack.  */
65 #ifndef __x86_64__
66 #undef _Unwind_Frames_Increment
67 #define _Unwind_Frames_Increment(context, frames)	\
68   if (_Unwind_IsSignalFrame (context))			\
69     do							\
70       {							\
71 	_Unwind_Word ssp, prev_ssp, token;		\
72 	ssp = _get_ssp ();				\
73 	if (ssp != 0)					\
74 	  {						\
75 	    /* Align shadow stack pointer to the next	\
76 	       8 byte aligned boundary.  */		\
77 	    ssp = (ssp + 4) & ~7;			\
78 	    do						\
79 	      {						\
80 		/* Look for a restore token.  */	\
81 		token = (*(_Unwind_Word *) (ssp - 8));	\
82 		prev_ssp = token & ~7;			\
83 		if (prev_ssp == ssp)			\
84 		  break;				\
85 		ssp += 8;				\
86 	      }						\
87 	    while (1);					\
88 	    frames += (token & 0x4) ? 3 : 2;		\
89 	  }						\
90       }							\
91     while (0);						\
92   else							\
93     frames++;
94 #endif
95