[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH 0/3] Stack checking on Arm


  • To: <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Stewart Hildebrand <stewart.hildebrand@xxxxxxx>
  • Date: Mon, 29 Jul 2024 10:24:14 -0400
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=5yeTMOahb9lxcvfHiHivc0gVIAteJro/1tGJf8GjS/g=; b=Fru9bJEPVaLEBNqjZMKYuHBjp2g5Gh9JQa4n0HggAhNrNZMOfEgV0s04T/Dt1O4RdqxEOewjh6nXFXqIxSO774gh8Tec/Oyg5cdEYMVoXoFHTw+DfgvCrGqsvegxvVWJcVTvpLsBZtyahJNl1VYBr4h97tWUM0Hu/k0EV5xnQVLMVWaDRESLCZ/8YYQaNwJxKIkhCxKNeglbuN2GKlkQZzr4ACx7Z1wmEkuXe2JmZkL3KsZTlUP2i4lnF5TVFGEz+fbbobP42LMOXwNLm8DOnAO4n8VVmVmzz4Fx3TZefhHyZq53dac53V+qgFLkjMn1Cb2rlvwo/TWo6djmJ2udIg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=OA/sbVZtZZiK76ej6AVrrEfQre6mXbqj3vYi6rk+xmiORJe3NG9swdMuqMRdw2srZFsortk3DhEiF+8DiBbYt73+RsKjTYOWigxA3WTUvymANPOlifvNCzDc2fWnupNleW7r4ntfA5Bw8yqWAzGHSmm12udQWINqfs2aX3sBpOZtj9E39dQr+ReSsnZISN/s/fxkWR5GVrjIjOFmsUchMwt95xwGo2v5VqCwgiEJPq9CC2y37MwaP/XUVsn6VtRGdS4qmAM4ccto6CBs30S6zNWiQmuuDYfNxWxN5f8j1Lmc0E2ThI18DFO0q+L9D72VZl3BWvZInBh0zLSN5uVZXQ==
  • Cc: Stewart Hildebrand <stewart.hildebrand@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, "Volodymyr Babchuk" <Volodymyr_Babchuk@xxxxxxxx>, "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>, Dario Faggioli <dfaggioli@xxxxxxxx>, "Juergen Gross" <jgross@xxxxxxxx>, George Dunlap <gwd@xxxxxxxxxxxxxx>
  • Delivery-date: Mon, 29 Jul 2024 14:24:44 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

This series introduces stack check instrumentation on Arm. This is
helpful for safety certification efforts. I'm sending this in an RFC
state because I wanted to gather opinions on the approach of using
-finstrument-functions.

Stewart Hildebrand (3):
  xen: add no_instrument_function attributes
  xen: silence maybe-unitialized warning
  xen/arm: stack check instrumentation

 xen/arch/arm/arch.mk                     |  1 +
 xen/arch/arm/arm64/head.S                |  4 +++
 xen/arch/arm/domain.c                    |  3 ++
 xen/arch/arm/include/asm/arm64/cmpxchg.h |  4 +++
 xen/arch/arm/include/asm/arm64/sve.h     |  1 +
 xen/arch/arm/include/asm/atomic.h        |  2 ++
 xen/arch/arm/include/asm/guest_atomics.h |  1 +
 xen/arch/arm/include/asm/page.h          |  2 ++
 xen/arch/arm/include/asm/traps.h         |  8 +++++
 xen/arch/arm/setup.c                     |  4 +++
 xen/arch/arm/smpboot.c                   |  3 ++
 xen/arch/arm/traps.c                     | 45 ++++++++++++++++++++++++
 xen/common/sched/cpupool.c               |  1 +
 xen/include/xsm/dummy.h                  |  1 +
 14 files changed, 80 insertions(+)


base-commit: b25b28ede1cba43eda1e0b84ad967683b8196847
-- 
2.45.2




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.