Received: by 10.223.185.116 with SMTP id b49csp119579wrg; Tue, 20 Feb 2018 17:15:12 -0800 (PST) X-Google-Smtp-Source: AH8x226huYwFzZAbmXwUusZDxWnztZC+pcURwhpbDoOY+Ew5Syvl2RHZz380zox46GPHaf39hjjW X-Received: by 2002:a17:902:6683:: with SMTP id e3-v6mr1439684plk.22.1519175712837; Tue, 20 Feb 2018 17:15:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519175712; cv=none; d=google.com; s=arc-20160816; b=zNIQ0jDta13xAKHtgTCDx9JKH34zTUFofwhohAHpCu45iCcb6q95NejCKsEagZQK62 Ow7UBF6O2Gy3FcLaQP5vZzKpEMXFFmCQ9oEnXYKLbMdGl+0hiW4cCmLCwdT6TlLyve9y up0r31cMt+QoEWtsmYkA7Fn3anwAYAdy7uTsjUK/rtoKzc+Wa2IxCdmTS3bcNKSEBayM qyL0n4b3IQy26Gxc+3ObDzeFps0gO7BtZCRdVkefugxPII8BsBeOl72L87ZMYNt8AzTI lpP/nRqo0jGFxIHIp4acc9rwuaPP6w10p4u3YAUuC1EKK53y88dl1eRePYkPFtVAgSVl 9gnw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:message-id:date:subject:cc:to :from:arc-authentication-results; bh=2DodRybBUoVpk+tBN8BpkouRwrJdqiuqgtWyrevh6EI=; b=w2k3lSeNbgXquzgJfWbK0IojnLyUIfrVEk3SYAhmD43ipoRi6rWOKDXqSnsQ6Ci3Nl U5CmOc/f25slGVSf1ZI4jX33KvPN6dxGslb5TmfkXar1YauFFVy6SJaywSclD3Idao0F NPez7SLVsQcSl745GBXD9igemxO8+6Fq8cCmQhLbbuAiilYERHnnaO0Kf5raiKRb5ijf iBLrbTQPB3ab2K6SY/VzLhIpo2MbUll8n0bvYjMJcFkhafhAp7Dg5bWvrEHNKq8ttRkd Ifbrfcm2J04dkigtlpBf1I09hwLA8ORlfso3HC0iFVBTnE9gxJHP1/bwNs1wF8O8cRDw zUtA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y17si597817pgv.311.2018.02.20.17.14.58; Tue, 20 Feb 2018 17:15:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751265AbeBUBNN (ORCPT + 99 others); Tue, 20 Feb 2018 20:13:13 -0500 Received: from mail-oi0-f66.google.com ([209.85.218.66]:44689 "EHLO mail-oi0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750781AbeBUBNM (ORCPT ); Tue, 20 Feb 2018 20:13:12 -0500 Received: by mail-oi0-f66.google.com with SMTP id b8so15981oib.11 for ; Tue, 20 Feb 2018 17:13:12 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to; bh=2DodRybBUoVpk+tBN8BpkouRwrJdqiuqgtWyrevh6EI=; b=pmb4lgV1e8iLd77rq9FWpZzH2+ESsrdSL5y61ZwP2aqLLwL9PUEjxCGKL48JVGMTFS 7H0iswPYAbe2m4V1lK3EKIki6AMUSW6Ihnl82DS8Zzd3SjYIosRvUb93mOsVp6bwjUgW L1d68HTgDucuROsSD10qJQ0HiBLY8DsYIB5XbtHtjQNKkqKnhcCUUroyu7h9aEXvpfY7 fq67410SnUCqBmIHzv/xlM70gKCXNkt9NKVg8nuWsTul6RblEFn6sWmv2uFvffiyoyup HQN++RJEmvK0LKQ8kS9GoOZxS/EjS9+81i0XVnCmKeFhIdG/L+OyEFk4RNYsKAW531A8 DIeA== X-Gm-Message-State: APf1xPA5OUWasZvarWMGxONTd1FSi6+nXT5mfgJH4fvo0hmJJJCBgv4Z oIdywjl1zEMWpPwtgMqpCzTprw== X-Received: by 10.202.17.3 with SMTP id 3mr984462oir.171.1519175592344; Tue, 20 Feb 2018 17:13:12 -0800 (PST) Received: from labbott-redhat.redhat.com ([2601:602:9802:a8dc::f21a]) by smtp.gmail.com with ESMTPSA id 125sm13664765oih.57.2018.02.20.17.13.10 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 20 Feb 2018 17:13:11 -0800 (PST) From: Laura Abbott To: Alexander Popov , Kees Cook , Mark Rutland , Ard Biesheuvel Cc: Laura Abbott , kernel-hardening@lists.openwall.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH 0/2] Stackleak for arm64 Date: Tue, 20 Feb 2018 17:13:01 -0800 Message-Id: <20180221011303.20392-1-labbott@redhat.com> X-Mailer: git-send-email 2.14.3 In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the arm64 version of the STACKLEAK plugin originall from grsecurity. See https://marc.info/?l=kernel-hardening&m=151880470609808 for the full x86 version. This is based on top of Kees' branch for stackleak and has been cleaned up to use a few macros from that branch. Comments welcome, if there are no major objections Kees will queue this up to get some CI testing. This passed both of the LKDTM tests. Laura Abbott (2): stackleak: Update for arm64 arm64: Clear the stack arch/arm64/Kconfig | 1 + arch/arm64/include/asm/processor.h | 6 ++ arch/arm64/kernel/asm-offsets.c | 3 + arch/arm64/kernel/entry.S | 108 +++++++++++++++++++++++++++++++++ arch/arm64/kernel/process.c | 16 +++++ drivers/firmware/efi/libstub/Makefile | 3 +- scripts/Makefile.gcc-plugins | 5 +- scripts/gcc-plugins/stackleak_plugin.c | 5 ++ 8 files changed, 145 insertions(+), 2 deletions(-) -- 2.14.3