summaryrefslogtreecommitdiff
path: root/devdocs/gcc~13/x86-control-flow-protection-intrinsics.html
diff options
context:
space:
mode:
authorCraig Jennings <c@cjennings.net>2024-04-07 13:41:34 -0500
committerCraig Jennings <c@cjennings.net>2024-04-07 13:41:34 -0500
commit754bbf7a25a8dda49b5d08ef0d0443bbf5af0e36 (patch)
treef1190704f78f04a2b0b4c977d20fe96a828377f1 /devdocs/gcc~13/x86-control-flow-protection-intrinsics.html
new repository
Diffstat (limited to 'devdocs/gcc~13/x86-control-flow-protection-intrinsics.html')
-rw-r--r--devdocs/gcc~13/x86-control-flow-protection-intrinsics.html31
1 files changed, 31 insertions, 0 deletions
diff --git a/devdocs/gcc~13/x86-control-flow-protection-intrinsics.html b/devdocs/gcc~13/x86-control-flow-protection-intrinsics.html
new file mode 100644
index 00000000..51992c58
--- /dev/null
+++ b/devdocs/gcc~13/x86-control-flow-protection-intrinsics.html
@@ -0,0 +1,31 @@
+<div class="subsection-level-extent" id="x86-control-flow-protection-intrinsics"> <div class="nav-panel"> <p> Previous: <a href="x86-transactional-memory-intrinsics" accesskey="p" rel="prev">x86 Transactional Memory Intrinsics</a>, Up: <a href="target-builtins" accesskey="u" rel="up">Built-in Functions Specific to Particular Target Machines</a> [<a href="index#SEC_Contents" title="Table of contents" rel="contents">Contents</a>][<a href="indices" title="Index" rel="index">Index</a>]</p> </div> <h1 class="subsection" id="x86-Control-Flow-Protection-Intrinsics"><span>6.60.37 x86 Control-Flow Protection Intrinsics<a class="copiable-link" href="#x86-Control-Flow-Protection-Intrinsics"> ¶</a></span></h1> <dl class="first-deftypefn"> <dt class="deftypefn" id="index-_005fget_005fssp">
+<span class="category-def">CET Function: </span><span><code class="def-type">ret_type</code> <strong class="def-name">_get_ssp</strong> <code class="def-code-arguments">(void)</code><a class="copiable-link" href="#index-_005fget_005fssp"> ¶</a></span>
+</dt> <dd><p>Get the current value of shadow stack pointer if shadow stack support from Intel CET is enabled in the hardware or <code class="code">0</code> otherwise. The <code class="code">ret_type</code> is <code class="code">unsigned long long</code> for 64-bit targets and <code class="code">unsigned int</code> for 32-bit targets. </p></dd>
+</dl> <dl class="first-deftypefn"> <dt class="deftypefn" id="index-_005finc_005fssp">
+<span class="category-def">CET Function: </span><span><code class="def-type">void</code> <strong class="def-name">_inc_ssp</strong> <code class="def-code-arguments">(unsigned int)</code><a class="copiable-link" href="#index-_005finc_005fssp"> ¶</a></span>
+</dt> <dd><p>Increment the current shadow stack pointer by the size specified by the function argument. The argument is masked to a byte value for security reasons, so to increment by more than 255 bytes you must call the function multiple times. </p></dd>
+</dl> <p>The shadow stack unwind code looks like: </p> <div class="example smallexample"> <pre class="example-preformatted" data-language="cpp">#include &lt;immintrin.h&gt;
+
+/* Unwind the shadow stack for EH. */
+#define _Unwind_Frames_Extra(x) \
+ do \
+ { \
+ _Unwind_Word ssp = _get_ssp (); \
+ if (ssp != 0) \
+ { \
+ _Unwind_Word tmp = (x); \
+ while (tmp &gt; 255) \
+ { \
+ _inc_ssp (tmp); \
+ tmp -= 255; \
+ } \
+ _inc_ssp (tmp); \
+ } \
+ } \
+ while (0)</pre>
+</div> <p>This code runs unconditionally on all 64-bit processors. For 32-bit processors the code runs on those that support multi-byte NOP instructions. </p> </div><div class="_attribution">
+ <p class="_attribution-p">
+ &copy; Free Software Foundation<br>Licensed under the GNU Free Documentation License, Version 1.3.<br>
+ <a href="https://gcc.gnu.org/onlinedocs/gcc-13.1.0/gcc/x86-control-flow-protection-intrinsics.html" class="_attribution-link">https://gcc.gnu.org/onlinedocs/gcc-13.1.0/gcc/x86-control-flow-protection-intrinsics.html</a>
+ </p>
+</div>