Date: Mon, 10 Jul 2017 15:04:41 -0700 From: Laura Abbott <labbott@...hat.com> To: Kees Cook <keescook@...omium.org>, Alex Popov <alex.popov@...ux.com> Cc: Laura Abbott <labbott@...hat.com>, kernel-hardening@...ts.openwall.com, Mark Rutland <mark.rutland@....com>, Ard Biesheuvel <ard.biesheuvel@...aro.org> Subject: [RFC][PATCH 0/2] draft of stack clearing for arm64 I made an attempt at implementing stack clearing for arm64 using roughly the same algorithm as x86. It passes some level of basic tests but it definitely needs more careful review and thought ("submit early and often"). As an added follow up, self-protection.rst should also be updated with some details about how stackleak actually works for people who want to follow on for other arches. Laura Abbott (2): stackleak: Update for arm64 arm64: Clear the stack arch/arm64/Kconfig | 1 + arch/arm64/include/asm/processor.h | 3 ++ arch/arm64/kernel/asm-offsets.c | 3 ++ arch/arm64/kernel/entry.S | 92 ++++++++++++++++++++++++++++++++++ arch/arm64/kernel/process.c | 18 +++++++ drivers/firmware/efi/libstub/Makefile | 3 +- scripts/Makefile.gcc-plugins | 5 +- scripts/gcc-plugins/stackleak_plugin.c | 25 +++++++-- 8 files changed, 143 insertions(+), 7 deletions(-) -- 2.7.5
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.