All of lore.kernel.org
 help / color / mirror / Atom feed
From: Sami Tolvanen <samitolvanen@google.com>
To: Mark Rutland <mark.rutland@arm.com>
Cc: Will Deacon <will@kernel.org>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Steven Rostedt <rostedt@goodmis.org>,
	Masami Hiramatsu <mhiramat@kernel.org>,
	Ard Biesheuvel <ard.biesheuvel@linaro.org>,
	Dave Martin <Dave.Martin@arm.com>,
	Kees Cook <keescook@chromium.org>,
	Laura Abbott <labbott@redhat.com>, Marc Zyngier <maz@kernel.org>,
	Nick Desaulniers <ndesaulniers@google.com>,
	Jann Horn <jannh@google.com>,
	Miguel Ojeda <miguel.ojeda.sandonis@gmail.com>,
	Masahiro Yamada <yamada.masahiro@socionext.com>,
	clang-built-linux <clang-built-linux@googlegroups.com>,
	Kernel Hardening <kernel-hardening@lists.openwall.com>,
	linux-arm-kernel <linux-arm-kernel@lists.infradead.org>,
	LKML <linux-kernel@vger.kernel.org>
Subject: Re: [PATCH v5 14/14] arm64: implement Shadow Call Stack
Date: Mon, 18 Nov 2019 15:13:43 -0800	[thread overview]
Message-ID: <20191118231343.GA231930@google.com> (raw)
In-Reply-To: <CABCJKudm28QaKRxPHWgKuEfRvm=EvuUEmcAVOnNkbxBCJcYX5A@mail.gmail.com>

On Fri, Nov 15, 2019 at 12:19:20PM -0800, Sami Tolvanen wrote:
> On Fri, Nov 15, 2019 at 7:20 AM Mark Rutland <mark.rutland@arm.com> wrote:
> >
> > On Tue, Nov 05, 2019 at 03:56:08PM -0800, Sami Tolvanen wrote:
> > > This change implements shadow stack switching, initial SCS set-up,
> > > and interrupt shadow stacks for arm64.
> >
> > Each CPU also has an overflow stack, and two SDEI stacks, which should
> > presumably be given their own SCS. SDEI is effectively a software-NMI,
> > so it should almost certainly have the same treatement as IRQ.
> 
> Makes sense. I'll take a look at adding shadow stacks for the SDEI handler.

Mark, I wrote a preliminary patch for adding SDEI shadow stacks, but
turns out I don't really have a way to test the SDEI code. Does the approach
below look sane to you?

Sami


---
 arch/arm64/include/asm/scs.h        |   2 +
 arch/arm64/include/asm/stacktrace.h |   4 --
 arch/arm64/kernel/entry.S           |  14 +++-
 arch/arm64/kernel/scs.c             | 106 +++++++++++++++++++++++-----
 arch/arm64/kernel/sdei.c            |   7 ++
 5 files changed, 112 insertions(+), 21 deletions(-)

diff --git a/arch/arm64/include/asm/scs.h b/arch/arm64/include/asm/scs.h
index c50d2b0c6c5f..8e327e14bc15 100644
--- a/arch/arm64/include/asm/scs.h
+++ b/arch/arm64/include/asm/scs.h
@@ -9,6 +9,7 @@
 #ifdef CONFIG_SHADOW_CALL_STACK
 
 extern void scs_init_irq(void);
+extern int scs_init_sdei(void);
 
 static __always_inline void scs_save(struct task_struct *tsk)
 {
@@ -27,6 +28,7 @@ static inline void scs_overflow_check(struct task_struct *tsk)
 #else /* CONFIG_SHADOW_CALL_STACK */
 
 static inline void scs_init_irq(void) {}
+static inline int scs_init_sdei(void) { return 0; }
 static inline void scs_save(struct task_struct *tsk) {}
 static inline void scs_overflow_check(struct task_struct *tsk) {}
 
diff --git a/arch/arm64/include/asm/stacktrace.h b/arch/arm64/include/asm/stacktrace.h
index b6cf32fb4efe..4d9b1f48dc39 100644
--- a/arch/arm64/include/asm/stacktrace.h
+++ b/arch/arm64/include/asm/stacktrace.h
@@ -68,10 +68,6 @@ extern void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk);
 
 DECLARE_PER_CPU(unsigned long *, irq_stack_ptr);
 
-#ifdef CONFIG_SHADOW_CALL_STACK
-DECLARE_PER_CPU(unsigned long *, irq_shadow_call_stack_ptr);
-#endif
-
 static inline bool on_irq_stack(unsigned long sp,
 				struct stack_info *info)
 {
diff --git a/arch/arm64/kernel/entry.S b/arch/arm64/kernel/entry.S
index 5a02b61fc3e6..ac9dfb3da440 100644
--- a/arch/arm64/kernel/entry.S
+++ b/arch/arm64/kernel/entry.S
@@ -1309,13 +1309,16 @@ ENTRY(__sdei_asm_handler)
 
 	mov	x19, x1
 
+#if defined(CONFIG_VMAP_STACK) || defined(CONFIG_SHADOW_CALL_STACK)
+	ldrb	w4, [x19, #SDEI_EVENT_PRIORITY]
+#endif
+
 #ifdef CONFIG_VMAP_STACK
 	/*
 	 * entry.S may have been using sp as a scratch register, find whether
 	 * this is a normal or critical event and switch to the appropriate
 	 * stack for this CPU.
 	 */
-	ldrb	w4, [x19, #SDEI_EVENT_PRIORITY]
 	cbnz	w4, 1f
 	ldr_this_cpu dst=x5, sym=sdei_stack_normal_ptr, tmp=x6
 	b	2f
@@ -1325,6 +1328,15 @@ ENTRY(__sdei_asm_handler)
 	mov	sp, x5
 #endif
 
+#ifdef CONFIG_SHADOW_CALL_STACK
+	/* Use a separate shadow call stack for normal and critical events */
+	cbnz	w4, 3f
+	ldr_this_cpu dst=x18, sym=sdei_shadow_call_stack_normal_ptr, tmp=x6
+	b	4f
+3:	ldr_this_cpu dst=x18, sym=sdei_shadow_call_stack_critical_ptr, tmp=x6
+4:
+#endif
+
 	/*
 	 * We may have interrupted userspace, or a guest, or exit-from or
 	 * return-to either of these. We can't trust sp_el0, restore it.
diff --git a/arch/arm64/kernel/scs.c b/arch/arm64/kernel/scs.c
index 9a1305a6eb5b..dddb7c56518b 100644
--- a/arch/arm64/kernel/scs.c
+++ b/arch/arm64/kernel/scs.c
@@ -10,31 +10,105 @@
 #include <asm/pgtable.h>
 #include <asm/scs.h>
 
-DEFINE_PER_CPU(unsigned long *, irq_shadow_call_stack_ptr);
+#define DECLARE_SCS(name)						\
+	DECLARE_PER_CPU(unsigned long *, name ## _ptr);			\
+	DECLARE_PER_CPU(unsigned long [SCS_SIZE/sizeof(long)], name)
 
-#ifndef CONFIG_SHADOW_CALL_STACK_VMAP
-DEFINE_PER_CPU(unsigned long [SCS_SIZE/sizeof(long)], irq_shadow_call_stack)
-	__aligned(SCS_SIZE);
+#ifdef CONFIG_SHADOW_CALL_STACK_VMAP
+#define DEFINE_SCS(name)						\
+	DEFINE_PER_CPU(unsigned long *, name ## _ptr)
+#else
+/* Allocate a static per-CPU shadow stack */
+#define DEFINE_SCS(name)						\
+	DEFINE_PER_CPU(unsigned long *, name ## _ptr);			\
+	DEFINE_PER_CPU(unsigned long [SCS_SIZE/sizeof(long)], name)	\
+		__aligned(SCS_SIZE)
+#endif /* CONFIG_SHADOW_CALL_STACK_VMAP */
+
+DECLARE_SCS(irq_shadow_call_stack);
+DECLARE_SCS(sdei_shadow_call_stack_normal);
+DECLARE_SCS(sdei_shadow_call_stack_critical);
+
+DEFINE_SCS(irq_shadow_call_stack);
+#ifdef CONFIG_ARM_SDE_INTERFACE
+DEFINE_SCS(sdei_shadow_call_stack_normal);
+DEFINE_SCS(sdei_shadow_call_stack_critical);
 #endif
 
+static int scs_alloc_percpu(unsigned long * __percpu *ptr, int cpu)
+{
+	unsigned long *p;
+
+	p = __vmalloc_node_range(PAGE_SIZE, SCS_SIZE,
+				 VMALLOC_START, VMALLOC_END,
+				 GFP_SCS, PAGE_KERNEL,
+				 0, cpu_to_node(cpu),
+				 __builtin_return_address(0));
+
+	if (!p)
+		return -ENOMEM;
+	per_cpu(*ptr, cpu) = p;
+
+	return 0;
+}
+
+static void scs_free_percpu(unsigned long * __percpu *ptr, int cpu)
+{
+	unsigned long *p = per_cpu(*ptr, cpu);
+
+	if (p) {
+		per_cpu(*ptr, cpu) = NULL;
+		vfree(p);
+	}
+}
+
+static void scs_free_sdei(void)
+{
+	int cpu;
+
+	for_each_possible_cpu(cpu) {
+		scs_free_percpu(&sdei_shadow_call_stack_normal_ptr, cpu);
+		scs_free_percpu(&sdei_shadow_call_stack_critical_ptr, cpu);
+	}
+}
+
 void scs_init_irq(void)
 {
 	int cpu;
 
 	for_each_possible_cpu(cpu) {
-#ifdef CONFIG_SHADOW_CALL_STACK_VMAP
-		unsigned long *p;
+		if (IS_ENABLED(CONFIG_SHADOW_CALL_STACK_VMAP))
+			WARN_ON(scs_alloc_percpu(&irq_shadow_call_stack_ptr,
+						 cpu));
+		else
+			per_cpu(irq_shadow_call_stack_ptr, cpu) =
+				per_cpu(irq_shadow_call_stack, cpu);
+	}
+}
 
-		p = __vmalloc_node_range(SCS_SIZE, SCS_SIZE,
-					 VMALLOC_START, VMALLOC_END,
-					 GFP_SCS, PAGE_KERNEL,
-					 0, cpu_to_node(cpu),
-					 __builtin_return_address(0));
+int scs_init_sdei(void)
+{
+	int cpu;
 
-		per_cpu(irq_shadow_call_stack_ptr, cpu) = p;
-#else
-		per_cpu(irq_shadow_call_stack_ptr, cpu) =
-			per_cpu(irq_shadow_call_stack, cpu);
-#endif /* CONFIG_SHADOW_CALL_STACK_VMAP */
+	if (!IS_ENABLED(CONFIG_ARM_SDE_INTERFACE))
+		return 0;
+
+	for_each_possible_cpu(cpu) {
+		if (IS_ENABLED(CONFIG_SHADOW_CALL_STACK_VMAP)) {
+			if (scs_alloc_percpu(
+				&sdei_shadow_call_stack_normal_ptr, cpu) ||
+			    scs_alloc_percpu(
+				&sdei_shadow_call_stack_critical_ptr, cpu)) {
+				scs_free_sdei();
+				return -ENOMEM;
+			}
+		} else {
+			per_cpu(sdei_shadow_call_stack_normal_ptr, cpu) =
+				per_cpu(sdei_shadow_call_stack_normal, cpu);
+			per_cpu(sdei_shadow_call_stack_critical_ptr, cpu) =
+				per_cpu(sdei_shadow_call_stack_critical, cpu);
+		}
 	}
+
+	return 0;
 }
diff --git a/arch/arm64/kernel/sdei.c b/arch/arm64/kernel/sdei.c
index ea94cf8f9dc6..3e85017a9c8b 100644
--- a/arch/arm64/kernel/sdei.c
+++ b/arch/arm64/kernel/sdei.c
@@ -12,6 +12,7 @@
 #include <asm/kprobes.h>
 #include <asm/mmu.h>
 #include <asm/ptrace.h>
+#include <asm/scs.h>
 #include <asm/sections.h>
 #include <asm/stacktrace.h>
 #include <asm/sysreg.h>
@@ -161,6 +162,12 @@ unsigned long sdei_arch_get_entry_point(int conduit)
 			return 0;
 	}
 
+	if (scs_init_sdei()) {
+		if (IS_ENABLED(CONFIG_VMAP_STACK))
+			free_sdei_stacks();
+		return 0;
+	}
+
 	sdei_exit_mode = (conduit == CONDUIT_HVC) ? SDEI_EXIT_HVC : SDEI_EXIT_SMC;
 
 #ifdef CONFIG_UNMAP_KERNEL_AT_EL0


WARNING: multiple messages have this Message-ID (diff)
From: Sami Tolvanen <samitolvanen@google.com>
To: Mark Rutland <mark.rutland@arm.com>
Cc: Kees Cook <keescook@chromium.org>,
	Ard Biesheuvel <ard.biesheuvel@linaro.org>,
	Masahiro Yamada <yamada.masahiro@socionext.com>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Jann Horn <jannh@google.com>,
	Nick Desaulniers <ndesaulniers@google.com>,
	LKML <linux-kernel@vger.kernel.org>,
	Steven Rostedt <rostedt@goodmis.org>,
	Miguel Ojeda <miguel.ojeda.sandonis@gmail.com>,
	clang-built-linux <clang-built-linux@googlegroups.com>,
	Masami Hiramatsu <mhiramat@kernel.org>,
	Marc Zyngier <maz@kernel.org>,
	Kernel Hardening <kernel-hardening@lists.openwall.com>,
	Laura Abbott <labbott@redhat.com>, Will Deacon <will@kernel.org>,
	Dave Martin <Dave.Martin@arm.com>,
	linux-arm-kernel <linux-arm-kernel@lists.infradead.org>
Subject: Re: [PATCH v5 14/14] arm64: implement Shadow Call Stack
Date: Mon, 18 Nov 2019 15:13:43 -0800	[thread overview]
Message-ID: <20191118231343.GA231930@google.com> (raw)
In-Reply-To: <CABCJKudm28QaKRxPHWgKuEfRvm=EvuUEmcAVOnNkbxBCJcYX5A@mail.gmail.com>

On Fri, Nov 15, 2019 at 12:19:20PM -0800, Sami Tolvanen wrote:
> On Fri, Nov 15, 2019 at 7:20 AM Mark Rutland <mark.rutland@arm.com> wrote:
> >
> > On Tue, Nov 05, 2019 at 03:56:08PM -0800, Sami Tolvanen wrote:
> > > This change implements shadow stack switching, initial SCS set-up,
> > > and interrupt shadow stacks for arm64.
> >
> > Each CPU also has an overflow stack, and two SDEI stacks, which should
> > presumably be given their own SCS. SDEI is effectively a software-NMI,
> > so it should almost certainly have the same treatement as IRQ.
> 
> Makes sense. I'll take a look at adding shadow stacks for the SDEI handler.

Mark, I wrote a preliminary patch for adding SDEI shadow stacks, but
turns out I don't really have a way to test the SDEI code. Does the approach
below look sane to you?

Sami


---
 arch/arm64/include/asm/scs.h        |   2 +
 arch/arm64/include/asm/stacktrace.h |   4 --
 arch/arm64/kernel/entry.S           |  14 +++-
 arch/arm64/kernel/scs.c             | 106 +++++++++++++++++++++++-----
 arch/arm64/kernel/sdei.c            |   7 ++
 5 files changed, 112 insertions(+), 21 deletions(-)

diff --git a/arch/arm64/include/asm/scs.h b/arch/arm64/include/asm/scs.h
index c50d2b0c6c5f..8e327e14bc15 100644
--- a/arch/arm64/include/asm/scs.h
+++ b/arch/arm64/include/asm/scs.h
@@ -9,6 +9,7 @@
 #ifdef CONFIG_SHADOW_CALL_STACK
 
 extern void scs_init_irq(void);
+extern int scs_init_sdei(void);
 
 static __always_inline void scs_save(struct task_struct *tsk)
 {
@@ -27,6 +28,7 @@ static inline void scs_overflow_check(struct task_struct *tsk)
 #else /* CONFIG_SHADOW_CALL_STACK */
 
 static inline void scs_init_irq(void) {}
+static inline int scs_init_sdei(void) { return 0; }
 static inline void scs_save(struct task_struct *tsk) {}
 static inline void scs_overflow_check(struct task_struct *tsk) {}
 
diff --git a/arch/arm64/include/asm/stacktrace.h b/arch/arm64/include/asm/stacktrace.h
index b6cf32fb4efe..4d9b1f48dc39 100644
--- a/arch/arm64/include/asm/stacktrace.h
+++ b/arch/arm64/include/asm/stacktrace.h
@@ -68,10 +68,6 @@ extern void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk);
 
 DECLARE_PER_CPU(unsigned long *, irq_stack_ptr);
 
-#ifdef CONFIG_SHADOW_CALL_STACK
-DECLARE_PER_CPU(unsigned long *, irq_shadow_call_stack_ptr);
-#endif
-
 static inline bool on_irq_stack(unsigned long sp,
 				struct stack_info *info)
 {
diff --git a/arch/arm64/kernel/entry.S b/arch/arm64/kernel/entry.S
index 5a02b61fc3e6..ac9dfb3da440 100644
--- a/arch/arm64/kernel/entry.S
+++ b/arch/arm64/kernel/entry.S
@@ -1309,13 +1309,16 @@ ENTRY(__sdei_asm_handler)
 
 	mov	x19, x1
 
+#if defined(CONFIG_VMAP_STACK) || defined(CONFIG_SHADOW_CALL_STACK)
+	ldrb	w4, [x19, #SDEI_EVENT_PRIORITY]
+#endif
+
 #ifdef CONFIG_VMAP_STACK
 	/*
 	 * entry.S may have been using sp as a scratch register, find whether
 	 * this is a normal or critical event and switch to the appropriate
 	 * stack for this CPU.
 	 */
-	ldrb	w4, [x19, #SDEI_EVENT_PRIORITY]
 	cbnz	w4, 1f
 	ldr_this_cpu dst=x5, sym=sdei_stack_normal_ptr, tmp=x6
 	b	2f
@@ -1325,6 +1328,15 @@ ENTRY(__sdei_asm_handler)
 	mov	sp, x5
 #endif
 
+#ifdef CONFIG_SHADOW_CALL_STACK
+	/* Use a separate shadow call stack for normal and critical events */
+	cbnz	w4, 3f
+	ldr_this_cpu dst=x18, sym=sdei_shadow_call_stack_normal_ptr, tmp=x6
+	b	4f
+3:	ldr_this_cpu dst=x18, sym=sdei_shadow_call_stack_critical_ptr, tmp=x6
+4:
+#endif
+
 	/*
 	 * We may have interrupted userspace, or a guest, or exit-from or
 	 * return-to either of these. We can't trust sp_el0, restore it.
diff --git a/arch/arm64/kernel/scs.c b/arch/arm64/kernel/scs.c
index 9a1305a6eb5b..dddb7c56518b 100644
--- a/arch/arm64/kernel/scs.c
+++ b/arch/arm64/kernel/scs.c
@@ -10,31 +10,105 @@
 #include <asm/pgtable.h>
 #include <asm/scs.h>
 
-DEFINE_PER_CPU(unsigned long *, irq_shadow_call_stack_ptr);
+#define DECLARE_SCS(name)						\
+	DECLARE_PER_CPU(unsigned long *, name ## _ptr);			\
+	DECLARE_PER_CPU(unsigned long [SCS_SIZE/sizeof(long)], name)
 
-#ifndef CONFIG_SHADOW_CALL_STACK_VMAP
-DEFINE_PER_CPU(unsigned long [SCS_SIZE/sizeof(long)], irq_shadow_call_stack)
-	__aligned(SCS_SIZE);
+#ifdef CONFIG_SHADOW_CALL_STACK_VMAP
+#define DEFINE_SCS(name)						\
+	DEFINE_PER_CPU(unsigned long *, name ## _ptr)
+#else
+/* Allocate a static per-CPU shadow stack */
+#define DEFINE_SCS(name)						\
+	DEFINE_PER_CPU(unsigned long *, name ## _ptr);			\
+	DEFINE_PER_CPU(unsigned long [SCS_SIZE/sizeof(long)], name)	\
+		__aligned(SCS_SIZE)
+#endif /* CONFIG_SHADOW_CALL_STACK_VMAP */
+
+DECLARE_SCS(irq_shadow_call_stack);
+DECLARE_SCS(sdei_shadow_call_stack_normal);
+DECLARE_SCS(sdei_shadow_call_stack_critical);
+
+DEFINE_SCS(irq_shadow_call_stack);
+#ifdef CONFIG_ARM_SDE_INTERFACE
+DEFINE_SCS(sdei_shadow_call_stack_normal);
+DEFINE_SCS(sdei_shadow_call_stack_critical);
 #endif
 
+static int scs_alloc_percpu(unsigned long * __percpu *ptr, int cpu)
+{
+	unsigned long *p;
+
+	p = __vmalloc_node_range(PAGE_SIZE, SCS_SIZE,
+				 VMALLOC_START, VMALLOC_END,
+				 GFP_SCS, PAGE_KERNEL,
+				 0, cpu_to_node(cpu),
+				 __builtin_return_address(0));
+
+	if (!p)
+		return -ENOMEM;
+	per_cpu(*ptr, cpu) = p;
+
+	return 0;
+}
+
+static void scs_free_percpu(unsigned long * __percpu *ptr, int cpu)
+{
+	unsigned long *p = per_cpu(*ptr, cpu);
+
+	if (p) {
+		per_cpu(*ptr, cpu) = NULL;
+		vfree(p);
+	}
+}
+
+static void scs_free_sdei(void)
+{
+	int cpu;
+
+	for_each_possible_cpu(cpu) {
+		scs_free_percpu(&sdei_shadow_call_stack_normal_ptr, cpu);
+		scs_free_percpu(&sdei_shadow_call_stack_critical_ptr, cpu);
+	}
+}
+
 void scs_init_irq(void)
 {
 	int cpu;
 
 	for_each_possible_cpu(cpu) {
-#ifdef CONFIG_SHADOW_CALL_STACK_VMAP
-		unsigned long *p;
+		if (IS_ENABLED(CONFIG_SHADOW_CALL_STACK_VMAP))
+			WARN_ON(scs_alloc_percpu(&irq_shadow_call_stack_ptr,
+						 cpu));
+		else
+			per_cpu(irq_shadow_call_stack_ptr, cpu) =
+				per_cpu(irq_shadow_call_stack, cpu);
+	}
+}
 
-		p = __vmalloc_node_range(SCS_SIZE, SCS_SIZE,
-					 VMALLOC_START, VMALLOC_END,
-					 GFP_SCS, PAGE_KERNEL,
-					 0, cpu_to_node(cpu),
-					 __builtin_return_address(0));
+int scs_init_sdei(void)
+{
+	int cpu;
 
-		per_cpu(irq_shadow_call_stack_ptr, cpu) = p;
-#else
-		per_cpu(irq_shadow_call_stack_ptr, cpu) =
-			per_cpu(irq_shadow_call_stack, cpu);
-#endif /* CONFIG_SHADOW_CALL_STACK_VMAP */
+	if (!IS_ENABLED(CONFIG_ARM_SDE_INTERFACE))
+		return 0;
+
+	for_each_possible_cpu(cpu) {
+		if (IS_ENABLED(CONFIG_SHADOW_CALL_STACK_VMAP)) {
+			if (scs_alloc_percpu(
+				&sdei_shadow_call_stack_normal_ptr, cpu) ||
+			    scs_alloc_percpu(
+				&sdei_shadow_call_stack_critical_ptr, cpu)) {
+				scs_free_sdei();
+				return -ENOMEM;
+			}
+		} else {
+			per_cpu(sdei_shadow_call_stack_normal_ptr, cpu) =
+				per_cpu(sdei_shadow_call_stack_normal, cpu);
+			per_cpu(sdei_shadow_call_stack_critical_ptr, cpu) =
+				per_cpu(sdei_shadow_call_stack_critical, cpu);
+		}
 	}
+
+	return 0;
 }
diff --git a/arch/arm64/kernel/sdei.c b/arch/arm64/kernel/sdei.c
index ea94cf8f9dc6..3e85017a9c8b 100644
--- a/arch/arm64/kernel/sdei.c
+++ b/arch/arm64/kernel/sdei.c
@@ -12,6 +12,7 @@
 #include <asm/kprobes.h>
 #include <asm/mmu.h>
 #include <asm/ptrace.h>
+#include <asm/scs.h>
 #include <asm/sections.h>
 #include <asm/stacktrace.h>
 #include <asm/sysreg.h>
@@ -161,6 +162,12 @@ unsigned long sdei_arch_get_entry_point(int conduit)
 			return 0;
 	}
 
+	if (scs_init_sdei()) {
+		if (IS_ENABLED(CONFIG_VMAP_STACK))
+			free_sdei_stacks();
+		return 0;
+	}
+
 	sdei_exit_mode = (conduit == CONDUIT_HVC) ? SDEI_EXIT_HVC : SDEI_EXIT_SMC;
 
 #ifdef CONFIG_UNMAP_KERNEL_AT_EL0


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

  reply	other threads:[~2019-11-18 23:13 UTC|newest]

Thread overview: 1147+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-10-18 16:10 [PATCH 00/18] add support for Clang's Shadow Call Stack Sami Tolvanen
2019-10-18 16:10 ` Sami Tolvanen
2019-10-18 16:10 ` Sami Tolvanen
2019-10-18 16:10 ` [PATCH 01/18] arm64: mm: don't use x18 in idmap_kpti_install_ng_mappings Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:43   ` Nick Desaulniers
2019-10-18 16:43     ` Nick Desaulniers
2019-10-18 16:43     ` Nick Desaulniers
2019-10-18 16:10 ` [PATCH 02/18] arm64/lib: copy_page: avoid x18 register in assembler code Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10 ` [PATCH 03/18] arm64: kvm: stop treating register x18 as caller save Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-21  6:19   ` Ard Biesheuvel
2019-10-21  6:19     ` Ard Biesheuvel
2019-10-21  6:19     ` Ard Biesheuvel
2019-10-22 17:22   ` Marc Zyngier
2019-10-22 17:22     ` Marc Zyngier
2019-10-22 21:45     ` Sami Tolvanen
2019-10-22 21:45       ` Sami Tolvanen
2019-10-22 21:45       ` Sami Tolvanen
2019-10-18 16:10 ` [PATCH 04/18] arm64: kernel: avoid x18 as an arbitrary temp register Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10 ` [PATCH 05/18] arm64: kbuild: reserve reg x18 from general allocation by the compiler Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 17:32   ` Nick Desaulniers
2019-10-18 17:32     ` Nick Desaulniers
2019-10-18 17:32     ` Nick Desaulniers
2019-10-18 19:00     ` Sami Tolvanen
2019-10-18 19:00       ` Sami Tolvanen
2019-10-18 19:00       ` Sami Tolvanen
2019-10-21  6:12       ` Ard Biesheuvel
2019-10-21  6:12         ` Ard Biesheuvel
2019-10-21  6:12         ` Ard Biesheuvel
2019-10-21 20:43         ` Sami Tolvanen
2019-10-21 20:43           ` Sami Tolvanen
2019-10-21 20:43           ` Sami Tolvanen
2019-10-18 16:10 ` [PATCH 06/18] add support for Clang's Shadow Call Stack (SCS) Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:58   ` Joe Perches
2019-10-18 16:58     ` Joe Perches
2019-10-18 16:58     ` Joe Perches
2019-10-18 17:08   ` Nick Desaulniers
2019-10-18 17:08     ` Nick Desaulniers
2019-10-18 17:08     ` Nick Desaulniers
2019-10-18 17:11     ` Sami Tolvanen
2019-10-18 17:11       ` Sami Tolvanen
2019-10-18 17:11       ` Sami Tolvanen
2019-10-18 18:32       ` Miguel Ojeda
2019-10-18 18:32         ` Miguel Ojeda
2019-10-18 18:32         ` Miguel Ojeda
2019-10-18 20:33         ` Nick Desaulniers
2019-10-18 20:33           ` Nick Desaulniers
2019-10-18 20:33           ` Nick Desaulniers
2019-10-19  0:21           ` Miguel Ojeda
2019-10-19  0:21             ` Miguel Ojeda
2019-10-19  0:21             ` Miguel Ojeda
2019-10-18 17:42   ` Jann Horn
2019-10-18 17:42     ` Jann Horn
2019-10-18 17:42     ` Jann Horn
2019-10-18 17:56     ` Sami Tolvanen
2019-10-18 17:56       ` Sami Tolvanen
2019-10-18 17:56       ` Sami Tolvanen
2019-10-22 16:28   ` Mark Rutland
2019-10-22 16:28     ` Mark Rutland
2019-10-22 16:30     ` Kees Cook
2019-10-22 16:30       ` Kees Cook
2019-10-22 16:49       ` Mark Rutland
2019-10-22 16:49         ` Mark Rutland
2019-10-22 19:26     ` Sami Tolvanen
2019-10-22 19:26       ` Sami Tolvanen
2019-10-22 19:26       ` Sami Tolvanen
2019-10-24 13:28       ` Mark Rutland
2019-10-24 13:28         ` Mark Rutland
2019-10-24 14:38         ` Masahiro Yamada
2019-10-24 14:38           ` Masahiro Yamada
2019-10-23 16:59     ` Sami Tolvanen
2019-10-23 16:59       ` Sami Tolvanen
2019-10-23 16:59       ` Sami Tolvanen
2019-10-24  1:47       ` Masahiro Yamada
2019-10-24  1:47         ` Masahiro Yamada
2019-10-24 12:04       ` Steven Rostedt
2019-10-24 12:04         ` Steven Rostedt
2019-10-24 22:17         ` Sami Tolvanen
2019-10-24 22:17           ` Sami Tolvanen
2019-10-24 22:17           ` Sami Tolvanen
2019-10-18 16:10 ` [PATCH 07/18] scs: add accounting Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10 ` [PATCH 08/18] scs: add support for stack usage debugging Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10 ` [PATCH 09/18] trace: disable function graph tracing with SCS Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 17:01   ` Steven Rostedt
2019-10-18 17:01     ` Steven Rostedt
2019-10-18 17:08     ` Sami Tolvanen
2019-10-18 17:08       ` Sami Tolvanen
2019-10-18 17:08       ` Sami Tolvanen
2019-10-21  6:15   ` Ard Biesheuvel
2019-10-21  6:15     ` Ard Biesheuvel
2019-10-21  6:15     ` Ard Biesheuvel
2019-10-18 16:10 ` [PATCH 10/18] kprobes: fix compilation without CONFIG_KRETPROBES Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 17:02   ` Steven Rostedt
2019-10-18 17:02     ` Steven Rostedt
2019-10-21  9:13     ` Masami Hiramatsu
2019-10-21  9:13       ` Masami Hiramatsu
2019-10-18 16:10 ` [PATCH 11/18] kprobes: disable kretprobes with SCS Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 17:04   ` Steven Rostedt
2019-10-18 17:04     ` Steven Rostedt
2019-10-21  9:15     ` Masami Hiramatsu
2019-10-21  9:15       ` Masami Hiramatsu
2019-10-18 16:10 ` [PATCH 12/18] arm64: reserve x18 only with Shadow Call Stack Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 21:23   ` Nick Desaulniers
2019-10-18 21:23     ` Nick Desaulniers
2019-10-18 21:23     ` Nick Desaulniers
2019-10-22 16:00     ` Mark Rutland
2019-10-22 16:00       ` Mark Rutland
2019-10-22 16:27       ` Kees Cook
2019-10-22 16:27         ` Kees Cook
2019-10-18 16:10 ` [PATCH 13/18] arm64: preserve x18 when CPU is suspended Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:49   ` Nick Desaulniers
2019-10-18 16:49     ` Nick Desaulniers
2019-10-18 16:49     ` Nick Desaulniers
2019-10-18 17:05     ` Sami Tolvanen
2019-10-18 17:05       ` Sami Tolvanen
2019-10-18 17:05       ` Sami Tolvanen
2019-10-21 16:56   ` Mark Rutland
2019-10-21 16:56     ` Mark Rutland
2019-10-21 22:43     ` Sami Tolvanen
2019-10-21 22:43       ` Sami Tolvanen
2019-10-21 22:43       ` Sami Tolvanen
2019-10-22 15:47       ` Mark Rutland
2019-10-22 15:47         ` Mark Rutland
2019-10-18 16:10 ` [PATCH 14/18] arm64: efi: restore x18 if it was corrupted Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-21  6:20   ` Ard Biesheuvel
2019-10-21  6:20     ` Ard Biesheuvel
2019-10-21  6:20     ` Ard Biesheuvel
2019-10-21 22:39     ` Sami Tolvanen
2019-10-21 22:39       ` Sami Tolvanen
2019-10-21 22:39       ` Sami Tolvanen
2019-10-22  5:54       ` Ard Biesheuvel
2019-10-22  5:54         ` Ard Biesheuvel
2019-10-22  5:54         ` Ard Biesheuvel
2019-10-18 16:10 ` [PATCH 15/18] arm64: vdso: disable Shadow Call Stack Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10 ` [PATCH 16/18] arm64: kprobes: fix kprobes without CONFIG_KRETPROBES Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-21  6:21   ` Ard Biesheuvel
2019-10-21  6:21     ` Ard Biesheuvel
2019-10-21  6:21     ` Ard Biesheuvel
2019-10-21 16:06     ` Kees Cook
2019-10-21 16:06       ` Kees Cook
2019-10-18 16:10 ` [PATCH 17/18] arm64: disable SCS for hypervisor code Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10 ` [PATCH 18/18] arm64: implement Shadow Call Stack Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 16:10   ` Sami Tolvanen
2019-10-18 17:12   ` Jann Horn
2019-10-18 17:12     ` Jann Horn
2019-10-18 17:12     ` Jann Horn
2019-10-18 17:18     ` Sami Tolvanen
2019-10-18 17:18       ` Sami Tolvanen
2019-10-18 17:18       ` Sami Tolvanen
2019-10-18 17:23     ` Mark Rutland
2019-10-18 17:23       ` Mark Rutland
2019-10-18 17:35       ` Sami Tolvanen
2019-10-18 17:35         ` Sami Tolvanen
2019-10-18 17:35         ` Sami Tolvanen
2019-10-21 16:49         ` Mark Rutland
2019-10-21 16:49           ` Mark Rutland
2019-10-21  9:28 ` [PATCH 00/18] add support for Clang's " Masami Hiramatsu
2019-10-21  9:28   ` Masami Hiramatsu
2019-10-24 22:51 ` [PATCH v2 00/17] " samitolvanen
2019-10-24 22:51   ` samitolvanen
2019-10-24 22:51   ` samitolvanen
2019-10-24 22:51   ` [PATCH v2 01/17] arm64: mm: don't use x18 in idmap_kpti_install_ng_mappings samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-25  9:24     ` Mark Rutland
2019-10-25  9:24       ` Mark Rutland
2019-10-24 22:51   ` [PATCH v2 02/17] arm64/lib: copy_page: avoid x18 register in assembler code samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-25  9:41     ` Mark Rutland
2019-10-25  9:41       ` Mark Rutland
2019-10-25 21:40       ` Sami Tolvanen
2019-10-25 21:40         ` Sami Tolvanen
2019-10-25 21:40         ` Sami Tolvanen
2019-10-24 22:51   ` [PATCH v2 03/17] arm64: kvm: stop treating register x18 as caller save samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51   ` [PATCH v2 04/17] arm64: kernel: avoid x18 as an arbitrary temp register samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-25 10:02     ` Mark Rutland
2019-10-25 10:02       ` Mark Rutland
2019-10-24 22:51   ` [PATCH v2 05/17] add support for Clang's Shadow Call Stack (SCS) samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-25 10:56     ` Mark Rutland
2019-10-25 10:56       ` Mark Rutland
2019-10-25 20:49       ` Sami Tolvanen
2019-10-25 20:49         ` Sami Tolvanen
2019-10-25 20:49         ` Sami Tolvanen
2019-10-28 16:35         ` Mark Rutland
2019-10-28 16:35           ` Mark Rutland
2019-10-28 19:57           ` Kees Cook
2019-10-28 19:57             ` Kees Cook
2019-10-29 18:06             ` Sami Tolvanen
2019-10-29 18:06               ` Sami Tolvanen
2019-10-29 18:06               ` Sami Tolvanen
2019-10-25 16:22     ` Nick Desaulniers
2019-10-25 16:22       ` Nick Desaulniers
2019-10-25 16:22       ` Nick Desaulniers
2019-10-25 20:51       ` Sami Tolvanen
2019-10-25 20:51         ` Sami Tolvanen
2019-10-25 20:51         ` Sami Tolvanen
2019-10-26 15:57     ` Joe Perches
2019-10-26 15:57       ` Joe Perches
2019-10-26 15:57       ` Joe Perches
2019-10-28 15:19       ` Sami Tolvanen
2019-10-28 15:19         ` Sami Tolvanen
2019-10-28 15:19         ` Sami Tolvanen
2019-10-28 15:31         ` Miguel Ojeda
2019-10-28 16:15           ` Sami Tolvanen
2019-10-28 16:15             ` Sami Tolvanen
2019-10-28 16:15             ` Sami Tolvanen
2019-10-24 22:51   ` [PATCH v2 06/17] scs: add accounting samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51   ` [PATCH v2 07/17] scs: add support for stack usage debugging samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51   ` [PATCH v2 08/17] kprobes: fix compilation without CONFIG_KRETPROBES samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51   ` [PATCH v2 09/17] arm64: disable function graph tracing with SCS samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-25 11:03     ` Mark Rutland
2019-10-25 11:03       ` Mark Rutland
2019-10-29 17:45       ` Sami Tolvanen
2019-10-29 17:45         ` Sami Tolvanen
2019-10-29 17:45         ` Sami Tolvanen
2019-10-29 20:35         ` Nick Desaulniers
2019-10-29 20:35           ` Nick Desaulniers
2019-10-29 20:35           ` Nick Desaulniers
2019-10-24 22:51   ` [PATCH v2 10/17] arm64: disable kretprobes " samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51   ` [PATCH v2 11/17] arm64: reserve x18 from general allocation " samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51   ` [PATCH v2 12/17] arm64: preserve x18 when CPU is suspended samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51   ` [PATCH v2 13/17] arm64: efi: restore x18 if it was corrupted samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51   ` [PATCH v2 14/17] arm64: vdso: disable Shadow Call Stack samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51   ` [PATCH v2 15/17] arm64: kprobes: fix kprobes without CONFIG_KRETPROBES samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51   ` [PATCH v2 16/17] arm64: disable SCS for hypervisor code samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-25  1:20     ` Steven Rostedt
2019-10-25  1:20       ` Steven Rostedt
2019-10-25  1:29     ` Masahiro Yamada
2019-10-25  1:29       ` Masahiro Yamada
2019-10-25  1:42       ` Steven Rostedt
2019-10-25  1:42         ` Steven Rostedt
2019-10-25 19:24       ` Sami Tolvanen
2019-10-25 19:24         ` Sami Tolvanen
2019-10-25 19:24         ` Sami Tolvanen
2019-10-24 22:51   ` [PATCH v2 17/17] arm64: implement Shadow Call Stack samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-24 22:51     ` samitolvanen
2019-10-31 16:46 ` [PATCH v3 00/17] add support for Clang's " samitolvanen
2019-10-31 16:46   ` samitolvanen
2019-10-31 16:46   ` samitolvanen
2019-10-31 16:46   ` [PATCH v3 01/17] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46   ` [PATCH v3 02/17] arm64/lib: copy_page: avoid x18 register in assembler code samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46   ` [PATCH v3 03/17] arm64: kvm: stop treating register x18 as caller save samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-11-01  3:48     ` Kees Cook
2019-11-01  3:48       ` Kees Cook
2019-10-31 16:46   ` [PATCH v3 04/17] arm64: kernel: avoid x18 __cpu_soft_restart samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-11-01  3:47     ` Kees Cook
2019-11-01  3:47       ` Kees Cook
2019-10-31 16:46   ` [PATCH v3 05/17] add support for Clang's Shadow Call Stack (SCS) samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-11-01  3:51     ` Kees Cook
2019-11-01  3:51       ` Kees Cook
2019-11-01 16:28       ` Sami Tolvanen
2019-11-01 16:28         ` Sami Tolvanen
2019-11-01 16:28         ` Sami Tolvanen
2019-10-31 16:46   ` [PATCH v3 06/17] scs: add accounting samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-11-01  3:52     ` Kees Cook
2019-11-01  3:52       ` Kees Cook
2019-10-31 16:46   ` [PATCH v3 07/17] scs: add support for stack usage debugging samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-11-01  3:55     ` Kees Cook
2019-11-01  3:55       ` Kees Cook
2019-11-01 16:32       ` Sami Tolvanen
2019-11-01 16:32         ` Sami Tolvanen
2019-11-01 16:32         ` Sami Tolvanen
2019-11-01 19:02         ` Kees Cook
2019-11-01 19:02           ` Kees Cook
2019-10-31 16:46   ` [PATCH v3 08/17] kprobes: fix compilation without CONFIG_KRETPROBES samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-11-01  3:55     ` Kees Cook
2019-11-01  3:55       ` Kees Cook
2019-10-31 16:46   ` [PATCH v3 09/17] arm64: kprobes: fix kprobes " samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-11-01  3:56     ` Kees Cook
2019-11-01  3:56       ` Kees Cook
2019-10-31 16:46   ` [PATCH v3 10/17] arm64: disable kretprobes with SCS samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-11-01  3:56     ` Kees Cook
2019-11-01  3:56       ` Kees Cook
2019-10-31 16:46   ` [PATCH v3 11/17] arm64: disable function graph tracing " samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-11-01  3:58     ` Kees Cook
2019-11-01  3:58       ` Kees Cook
2019-11-01 20:32       ` Sami Tolvanen
2019-11-01 20:32         ` Sami Tolvanen
2019-11-01 20:32         ` Sami Tolvanen
2019-10-31 16:46   ` [PATCH v3 12/17] arm64: reserve x18 from general allocation " samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 17:11     ` Nick Desaulniers
2019-10-31 17:11       ` Nick Desaulniers
2019-10-31 17:11       ` Nick Desaulniers
2019-11-01  3:59     ` Kees Cook
2019-11-01  3:59       ` Kees Cook
2019-10-31 16:46   ` [PATCH v3 13/17] arm64: preserve x18 when CPU is suspended samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 17:18     ` Nick Desaulniers
2019-10-31 17:18       ` Nick Desaulniers
2019-10-31 17:18       ` Nick Desaulniers
2019-10-31 17:27       ` Sami Tolvanen
2019-10-31 17:27         ` Sami Tolvanen
2019-10-31 17:27         ` Sami Tolvanen
2019-10-31 17:34         ` Nick Desaulniers
2019-10-31 17:34           ` Nick Desaulniers
2019-10-31 17:34           ` Nick Desaulniers
2019-10-31 17:42           ` Sami Tolvanen
2019-10-31 17:42             ` Sami Tolvanen
2019-10-31 17:42             ` Sami Tolvanen
2019-11-01  3:59           ` Kees Cook
2019-11-01  3:59             ` Kees Cook
2019-10-31 16:46   ` [PATCH v3 14/17] arm64: efi: restore x18 if it was corrupted samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-11-01  4:00     ` Kees Cook
2019-11-01  4:00       ` Kees Cook
2019-10-31 16:46   ` [PATCH v3 15/17] arm64: vdso: disable Shadow Call Stack samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 17:28     ` Nick Desaulniers
2019-10-31 17:28       ` Nick Desaulniers
2019-10-31 17:28       ` Nick Desaulniers
2019-11-01  4:01     ` Kees Cook
2019-11-01  4:01       ` Kees Cook
2019-10-31 16:46   ` [PATCH v3 16/17] arm64: disable SCS for hypervisor code samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-11-01  3:46     ` Kees Cook
2019-11-01  3:46       ` Kees Cook
2019-11-01  4:02     ` Kees Cook
2019-11-01  4:02       ` Kees Cook
2019-10-31 16:46   ` [PATCH v3 17/17] arm64: implement Shadow Call Stack samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-10-31 16:46     ` samitolvanen
2019-11-01  3:45     ` Kees Cook
2019-11-01  3:45       ` Kees Cook
2019-11-01 15:44       ` Sami Tolvanen
2019-11-01 15:44         ` Sami Tolvanen
2019-11-01 15:44         ` Sami Tolvanen
2019-11-01 22:11 ` [PATCH v4 00/17] add support for Clang's " Sami Tolvanen
2019-11-01 22:11   ` Sami Tolvanen
2019-11-01 22:11   ` Sami Tolvanen
2019-11-01 22:11   ` [PATCH v4 01/17] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11   ` [PATCH v4 02/17] arm64/lib: copy_page: avoid x18 register in assembler code Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11   ` [PATCH v4 03/17] arm64: kvm: stop treating register x18 as caller save Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-04 11:04     ` Marc Zyngier
2019-11-04 11:04       ` Marc Zyngier
2019-11-04 13:30       ` Marc Zyngier
2019-11-04 13:30         ` Marc Zyngier
2019-11-04 11:51     ` Mark Rutland
2019-11-04 11:51       ` Mark Rutland
2019-11-04 21:44       ` Sami Tolvanen
2019-11-04 21:44         ` Sami Tolvanen
2019-11-04 21:44         ` Sami Tolvanen
2019-11-01 22:11   ` [PATCH v4 04/17] arm64: kernel: avoid x18 __cpu_soft_restart Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-04 11:39     ` Mark Rutland
2019-11-04 11:39       ` Mark Rutland
2019-11-04 16:44       ` Sami Tolvanen
2019-11-04 16:44         ` Sami Tolvanen
2019-11-04 16:44         ` Sami Tolvanen
2019-11-01 22:11   ` [PATCH v4 05/17] add support for Clang's Shadow Call Stack (SCS) Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:36     ` Miguel Ojeda
2019-11-01 22:36       ` Miguel Ojeda
2019-11-01 22:36       ` Miguel Ojeda
2019-11-04 12:31     ` Mark Rutland
2019-11-04 12:31       ` Mark Rutland
2019-11-04 18:25       ` Sami Tolvanen
2019-11-04 18:25         ` Sami Tolvanen
2019-11-04 18:25         ` Sami Tolvanen
2019-11-01 22:11   ` [PATCH v4 06/17] scs: add accounting Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-04 13:13     ` Marc Zyngier
2019-11-04 13:13       ` Marc Zyngier
2019-11-04 16:42       ` Sami Tolvanen
2019-11-04 16:42         ` Sami Tolvanen
2019-11-04 16:42         ` Sami Tolvanen
2019-11-04 16:59         ` Marc Zyngier
2019-11-04 16:59           ` Marc Zyngier
2019-11-01 22:11   ` [PATCH v4 07/17] scs: add support for stack usage debugging Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-02 17:31     ` Kees Cook
2019-11-02 17:31       ` Kees Cook
2019-11-04 12:40     ` Mark Rutland
2019-11-04 12:40       ` Mark Rutland
2019-11-04 21:35       ` Sami Tolvanen
2019-11-04 21:35         ` Sami Tolvanen
2019-11-04 21:35         ` Sami Tolvanen
2019-11-05  9:17         ` Mark Rutland
2019-11-05  9:17           ` Mark Rutland
2019-11-01 22:11   ` [PATCH v4 08/17] kprobes: fix compilation without CONFIG_KRETPROBES Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-13 20:27     ` Steven Rostedt
2019-11-13 20:27       ` Steven Rostedt
2019-11-01 22:11   ` [PATCH v4 09/17] arm64: kprobes: fix kprobes " Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11   ` [PATCH v4 10/17] arm64: disable kretprobes with SCS Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-04 17:04     ` Mark Rutland
2019-11-04 17:04       ` Mark Rutland
2019-11-04 23:42       ` Sami Tolvanen
2019-11-04 23:42         ` Sami Tolvanen
2019-11-04 23:42         ` Sami Tolvanen
2019-11-05  9:04         ` Mark Rutland
2019-11-05  9:04           ` Mark Rutland
2019-11-01 22:11   ` [PATCH v4 11/17] arm64: disable function graph tracing " Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-04 17:11     ` Mark Rutland
2019-11-04 17:11       ` Mark Rutland
2019-11-04 23:44       ` Sami Tolvanen
2019-11-04 23:44         ` Sami Tolvanen
2019-11-04 23:44         ` Sami Tolvanen
2019-11-05  9:15         ` Mark Rutland
2019-11-05  9:15           ` Mark Rutland
2019-11-05 20:00           ` Nick Desaulniers
2019-11-05 20:00             ` Nick Desaulniers
2019-11-05 20:00             ` Nick Desaulniers
2019-11-05 22:05           ` Sami Tolvanen
2019-11-05 22:05             ` Sami Tolvanen
2019-11-05 22:05             ` Sami Tolvanen
2019-11-01 22:11   ` [PATCH v4 12/17] arm64: reserve x18 from general allocation " Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11   ` [PATCH v4 13/17] arm64: preserve x18 when CPU is suspended Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-04 13:20     ` Marc Zyngier
2019-11-04 13:20       ` Marc Zyngier
2019-11-04 21:38       ` Sami Tolvanen
2019-11-04 21:38         ` Sami Tolvanen
2019-11-04 21:38         ` Sami Tolvanen
2019-11-04 21:59         ` Nick Desaulniers
2019-11-04 21:59           ` Nick Desaulniers
2019-11-04 21:59           ` Nick Desaulniers
2019-11-05  0:02           ` Sami Tolvanen
2019-11-05  0:02             ` Sami Tolvanen
2019-11-05  0:02             ` Sami Tolvanen
2019-11-05 14:55             ` Marc Zyngier
2019-11-05 14:55               ` Marc Zyngier
2019-11-01 22:11   ` [PATCH v4 14/17] arm64: efi: restore x18 if it was corrupted Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11   ` [PATCH v4 15/17] arm64: vdso: disable Shadow Call Stack Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11   ` [PATCH v4 16/17] arm64: disable SCS for hypervisor code Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11   ` [PATCH v4 17/17] arm64: implement Shadow Call Stack Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-01 22:11     ` Sami Tolvanen
2019-11-05 23:55 ` [PATCH v5 00/14] add support for Clang's " Sami Tolvanen
2019-11-05 23:55   ` Sami Tolvanen
2019-11-05 23:55   ` Sami Tolvanen
2019-11-05 23:55   ` [PATCH v5 01/14] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings Sami Tolvanen
2019-11-05 23:55     ` Sami Tolvanen
2019-11-05 23:55     ` Sami Tolvanen
2019-11-05 23:55   ` [PATCH v5 02/14] arm64/lib: copy_page: avoid x18 register in assembler code Sami Tolvanen
2019-11-05 23:55     ` Sami Tolvanen
2019-11-05 23:55     ` Sami Tolvanen
2019-11-05 23:55   ` [PATCH v5 03/14] arm64: kvm: stop treating register x18 as caller save Sami Tolvanen
2019-11-05 23:55     ` Sami Tolvanen
2019-11-05 23:55     ` Sami Tolvanen
2019-11-05 23:55   ` [PATCH v5 04/14] arm64: kernel: avoid x18 in __cpu_soft_restart Sami Tolvanen
2019-11-05 23:55     ` Sami Tolvanen
2019-11-05 23:55     ` Sami Tolvanen
2019-11-05 23:55   ` [PATCH v5 05/14] add support for Clang's Shadow Call Stack (SCS) Sami Tolvanen
2019-11-05 23:55     ` Sami Tolvanen
2019-11-05 23:55     ` Sami Tolvanen
2019-11-15 15:37     ` Mark Rutland
2019-11-15 15:37       ` Mark Rutland
2019-11-15 18:34       ` Sami Tolvanen
2019-11-15 18:34         ` Sami Tolvanen
2019-11-15 18:34         ` Sami Tolvanen
2019-11-05 23:56   ` [PATCH v5 06/14] scs: add accounting Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-05 23:56   ` [PATCH v5 07/14] scs: add support for stack usage debugging Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-05 23:56   ` [PATCH v5 08/14] arm64: disable function graph tracing with SCS Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-15 14:18     ` Mark Rutland
2019-11-15 14:18       ` Mark Rutland
2019-11-05 23:56   ` [PATCH v5 09/14] arm64: reserve x18 from general allocation " Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-05 23:56   ` [PATCH v5 10/14] arm64: preserve x18 when CPU is suspended Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-06 20:39     ` Nick Desaulniers
2019-11-06 20:39       ` Nick Desaulniers
2019-11-06 20:39       ` Nick Desaulniers
2019-11-15 14:27     ` Mark Rutland
2019-11-15 14:27       ` Mark Rutland
2019-11-05 23:56   ` [PATCH v5 11/14] arm64: efi: restore x18 if it was corrupted Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-06  4:45     ` Miguel Ojeda
2019-11-06  4:45       ` Miguel Ojeda
2019-11-06  4:45       ` Miguel Ojeda
2019-11-07 10:51       ` Ard Biesheuvel
2019-11-07 10:51         ` Ard Biesheuvel
2019-11-07 10:51         ` Ard Biesheuvel
2019-11-07 16:26         ` Sami Tolvanen
2019-11-07 16:26           ` Sami Tolvanen
2019-11-07 16:26           ` Sami Tolvanen
2019-11-05 23:56   ` [PATCH v5 12/14] arm64: vdso: disable Shadow Call Stack Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-15 14:43     ` Mark Rutland
2019-11-15 14:43       ` Mark Rutland
2019-11-05 23:56   ` [PATCH v5 13/14] arm64: disable SCS for hypervisor code Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-15 14:46     ` Mark Rutland
2019-11-15 14:46       ` Mark Rutland
2019-11-05 23:56   ` [PATCH v5 14/14] arm64: implement Shadow Call Stack Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-05 23:56     ` Sami Tolvanen
2019-11-15 15:20     ` Mark Rutland
2019-11-15 15:20       ` Mark Rutland
2019-11-15 20:19       ` Sami Tolvanen
2019-11-15 20:19         ` Sami Tolvanen
2019-11-15 20:19         ` Sami Tolvanen
2019-11-18 23:13         ` Sami Tolvanen [this message]
2019-11-18 23:13           ` Sami Tolvanen
2019-11-12 23:44   ` [PATCH v5 00/14] add support for Clang's " Kees Cook
2019-11-12 23:44     ` Kees Cook
2019-11-13 12:03     ` Will Deacon
2019-11-13 12:03       ` Will Deacon
2019-11-13 18:33       ` Kees Cook
2019-11-13 18:33         ` Kees Cook
2019-11-15 14:16     ` Mark Rutland
2019-11-15 14:16       ` Mark Rutland
2019-12-06 22:13 ` [PATCH v6 00/15] " Sami Tolvanen
2019-12-06 22:13   ` Sami Tolvanen
2019-12-06 22:13   ` Sami Tolvanen
2019-12-06 22:13   ` [PATCH v6 01/15] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13   ` [PATCH v6 02/15] arm64/lib: copy_page: avoid x18 register in assembler code Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13   ` [PATCH v6 03/15] arm64: kvm: stop treating register x18 as caller save Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13   ` [PATCH v6 04/15] arm64: kernel: avoid x18 in __cpu_soft_restart Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13   ` [PATCH v6 05/15] add support for Clang's Shadow Call Stack (SCS) Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13   ` [PATCH v6 06/15] scs: add accounting Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13   ` [PATCH v6 07/15] scs: add support for stack usage debugging Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13   ` [PATCH v6 08/15] arm64: disable function graph tracing with SCS Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2020-01-16 17:39     ` Will Deacon
2020-01-16 17:39       ` Will Deacon
2020-01-16 21:45       ` Sami Tolvanen
2020-01-16 21:45         ` Sami Tolvanen
2020-01-16 21:45         ` Sami Tolvanen
2019-12-06 22:13   ` [PATCH v6 09/15] arm64: reserve x18 from general allocation " Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2020-01-16 17:37     ` Will Deacon
2020-01-16 17:37       ` Will Deacon
2019-12-06 22:13   ` [PATCH v6 10/15] arm64: preserve x18 when CPU is suspended Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2020-01-16 17:42     ` Will Deacon
2020-01-16 17:42       ` Will Deacon
2019-12-06 22:13   ` [PATCH v6 11/15] arm64: efi: restore x18 if it was corrupted Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2020-01-16 17:44     ` Will Deacon
2020-01-16 17:44       ` Will Deacon
2020-01-16 20:36       ` Sami Tolvanen
2020-01-16 20:36         ` Sami Tolvanen
2020-01-16 20:36         ` Sami Tolvanen
2019-12-06 22:13   ` [PATCH v6 12/15] arm64: vdso: disable Shadow Call Stack Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2020-01-16 17:46     ` Will Deacon
2020-01-16 17:46       ` Will Deacon
2020-01-16 18:14       ` Sami Tolvanen
2020-01-16 18:14         ` Sami Tolvanen
2020-01-16 18:14         ` Sami Tolvanen
2020-01-16 18:18         ` Will Deacon
2020-01-16 18:18           ` Will Deacon
2019-12-06 22:13   ` [PATCH v6 13/15] arm64: disable SCS for hypervisor code Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2020-01-16 17:47     ` Will Deacon
2020-01-16 17:47       ` Will Deacon
2020-01-16 20:16       ` Sami Tolvanen
2020-01-16 20:16         ` Sami Tolvanen
2020-01-16 20:16         ` Sami Tolvanen
2019-12-06 22:13   ` [PATCH v6 14/15] arm64: implement Shadow Call Stack Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2020-01-16 18:24     ` Will Deacon
2020-01-16 18:24       ` Will Deacon
2020-01-16 21:57       ` Sami Tolvanen
2020-01-16 21:57         ` Sami Tolvanen
2020-01-16 21:57         ` Sami Tolvanen
2019-12-06 22:13   ` [PATCH v6 15/15] arm64: scs: add shadow stacks for SDEI Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2019-12-06 22:13     ` Sami Tolvanen
2020-01-16 17:48     ` Will Deacon
2020-01-16 17:48       ` Will Deacon
2020-01-16 18:24   ` [PATCH v6 00/15] add support for Clang's Shadow Call Stack Will Deacon
2020-01-16 18:24     ` Will Deacon
2020-01-28 18:49 ` [PATCH v7 00/11] " Sami Tolvanen
2020-01-28 18:49   ` Sami Tolvanen
2020-01-28 18:49   ` Sami Tolvanen
2020-01-28 18:49   ` [PATCH v7 01/11] add support for Clang's Shadow Call Stack (SCS) Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49   ` [PATCH v7 02/11] scs: add accounting Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49   ` [PATCH v7 03/11] scs: add support for stack usage debugging Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49   ` [PATCH v7 04/11] scs: disable when function graph tracing is enabled Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 22:50     ` Kees Cook
2020-01-28 22:50       ` Kees Cook
2020-01-28 18:49   ` [PATCH v7 05/11] arm64: reserve x18 from general allocation with SCS Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49   ` [PATCH v7 06/11] arm64: preserve x18 when CPU is suspended Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49   ` [PATCH v7 07/11] arm64: efi: restore x18 if it was corrupted Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-02-10 16:41     ` Will Deacon
2020-02-10 16:41       ` Will Deacon
2020-01-28 18:49   ` [PATCH v7 08/11] arm64: vdso: disable Shadow Call Stack Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49   ` [PATCH v7 09/11] arm64: disable SCS for hypervisor code Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-02-10 16:44     ` Will Deacon
2020-02-10 16:44       ` Will Deacon
2020-02-10 17:18     ` James Morse
2020-02-10 17:18       ` James Morse
2020-02-10 17:52       ` Will Deacon
2020-02-10 17:52         ` Will Deacon
2020-02-10 18:03         ` Mark Rutland
2020-02-10 18:03           ` Mark Rutland
2020-02-10 18:07           ` Will Deacon
2020-02-10 18:07             ` Will Deacon
2020-02-10 18:24             ` Mark Rutland
2020-02-10 18:24               ` Mark Rutland
2020-02-11  9:54               ` Will Deacon
2020-02-11  9:54                 ` Will Deacon
2020-02-12 17:30                 ` Sami Tolvanen
2020-02-12 17:30                   ` Sami Tolvanen
2020-02-12 17:30                   ` Sami Tolvanen
2020-02-11  9:14             ` Marc Zyngier
2020-02-11  9:14               ` Marc Zyngier
2020-02-11  9:55               ` Will Deacon
2020-02-11  9:55                 ` Will Deacon
2020-02-11 10:00                 ` Marc Zyngier
2020-02-11 10:00                   ` Marc Zyngier
2020-01-28 18:49   ` [PATCH v7 10/11] arm64: implement Shadow Call Stack Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49   ` [PATCH v7 11/11] arm64: scs: add shadow stacks for SDEI Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-01-28 18:49     ` Sami Tolvanen
2020-02-11 13:57     ` James Morse
2020-02-11 13:57       ` James Morse
2020-02-12 20:59       ` Sami Tolvanen
2020-02-12 20:59         ` Sami Tolvanen
2020-02-12 20:59         ` Sami Tolvanen
2020-02-14 18:13         ` James Morse
2020-02-14 18:13           ` James Morse
2020-02-11 13:57   ` [PATCH v7 00/11] add support for Clang's Shadow Call Stack James Morse
2020-02-11 13:57     ` James Morse
2020-02-12 17:36     ` Sami Tolvanen
2020-02-12 17:36       ` Sami Tolvanen
2020-02-12 17:36       ` Sami Tolvanen
2020-02-19  0:08 ` [PATCH v8 00/12] " Sami Tolvanen
2020-02-19  0:08   ` Sami Tolvanen
2020-02-19  0:08   ` Sami Tolvanen
2020-02-19  0:08   ` [PATCH v8 01/12] add support for Clang's Shadow Call Stack (SCS) Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  4:19     ` Randy Dunlap
2020-02-19  4:19       ` Randy Dunlap
2020-02-19 17:25       ` Sami Tolvanen
2020-02-19 17:25         ` Sami Tolvanen
2020-02-19 17:25         ` Sami Tolvanen
2020-02-19  0:08   ` [PATCH v8 02/12] scs: add accounting Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08   ` [PATCH v8 03/12] scs: add support for stack usage debugging Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08   ` [PATCH v8 04/12] scs: disable when function graph tracing is enabled Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19 11:33     ` Mark Rutland
2020-02-19 11:33       ` Mark Rutland
2020-02-19 18:01       ` Sami Tolvanen
2020-02-19 18:01         ` Sami Tolvanen
2020-02-19 18:01         ` Sami Tolvanen
2020-02-19  0:08   ` [PATCH v8 05/12] arm64: reserve x18 from general allocation with SCS Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08   ` [PATCH v8 06/12] arm64: preserve x18 when CPU is suspended Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08   ` [PATCH v8 07/12] arm64: efi: restore x18 if it was corrupted Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08   ` [PATCH v8 08/12] arm64: vdso: disable Shadow Call Stack Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08   ` [PATCH v8 09/12] arm64: disable SCS for hypervisor code Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:58     ` Kees Cook
2020-02-19  0:58       ` Kees Cook
2020-02-19  7:50     ` Marc Zyngier
2020-02-19  7:50       ` Marc Zyngier
2020-02-19  0:08   ` [PATCH v8 10/12] arm64: implement Shadow Call Stack Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08   ` [PATCH v8 11/12] arm64: scs: add shadow stacks for SDEI Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08   ` [PATCH v8 12/12] efi/libstub: disable SCS Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:08     ` Sami Tolvanen
2020-02-19  0:58     ` Kees Cook
2020-02-19  0:58       ` Kees Cook
2020-02-19  7:40     ` Ard Biesheuvel
2020-02-19  7:40       ` Ard Biesheuvel
2020-02-19  7:40       ` Ard Biesheuvel
2020-02-19 18:27       ` Sami Tolvanen
2020-02-19 18:27         ` Sami Tolvanen
2020-02-19 18:27         ` Sami Tolvanen
2020-02-19 18:38   ` [PATCH v8 00/12] add support for Clang's Shadow Call Stack James Morse
2020-02-19 18:38     ` James Morse
2020-02-19 18:53     ` Ard Biesheuvel
2020-02-19 18:53       ` Ard Biesheuvel
2020-02-19 18:53       ` Ard Biesheuvel
2020-02-20  9:55       ` Marc Zyngier
2020-02-20  9:55         ` Marc Zyngier
2020-02-19 20:12     ` Sami Tolvanen
2020-02-19 20:12       ` Sami Tolvanen
2020-02-19 20:12       ` Sami Tolvanen
2020-02-25 17:39 ` [PATCH v9 " Sami Tolvanen
2020-02-25 17:39   ` Sami Tolvanen
2020-02-25 17:39   ` Sami Tolvanen
2020-02-25 17:39   ` [PATCH v9 01/12] add support for Clang's Shadow Call Stack (SCS) Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39   ` [PATCH v9 02/12] scs: add accounting Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39   ` [PATCH v9 03/12] scs: add support for stack usage debugging Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39   ` [PATCH v9 04/12] scs: disable when function graph tracing is enabled Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39   ` [PATCH v9 05/12] arm64: reserve x18 from general allocation with SCS Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39   ` [PATCH v9 06/12] arm64: preserve x18 when CPU is suspended Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39   ` [PATCH v9 07/12] arm64: efi: restore x18 if it was corrupted Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39   ` [PATCH v9 08/12] arm64: vdso: disable Shadow Call Stack Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39   ` [PATCH v9 09/12] arm64: disable SCS for hypervisor code Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39   ` [PATCH v9 10/12] arm64: implement Shadow Call Stack Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-28 16:31     ` James Morse
2020-02-28 16:31       ` James Morse
2020-02-28 20:51       ` Sami Tolvanen
2020-02-28 20:51         ` Sami Tolvanen
2020-02-28 20:51         ` Sami Tolvanen
2020-02-25 17:39   ` [PATCH v9 11/12] arm64: scs: add shadow stacks for SDEI Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39   ` [PATCH v9 12/12] efi/libstub: disable SCS Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-02-25 17:39     ` Sami Tolvanen
2020-04-06 16:41 ` [PATCH v10 00/12] add support for Clang's Shadow Call Stack Sami Tolvanen
2020-04-06 16:41   ` Sami Tolvanen
2020-04-06 16:41   ` Sami Tolvanen
2020-04-06 16:41   ` [PATCH v10 01/12] add support for Clang's Shadow Call Stack (SCS) Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41   ` [PATCH v10 02/12] scs: add accounting Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41   ` [PATCH v10 03/12] scs: add support for stack usage debugging Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41   ` [PATCH v10 04/12] scs: disable when function graph tracing is enabled Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41   ` [PATCH v10 05/12] arm64: reserve x18 from general allocation with SCS Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41   ` [PATCH v10 06/12] arm64: preserve x18 when CPU is suspended Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41   ` [PATCH v10 07/12] arm64: efi: restore x18 if it was corrupted Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41   ` [PATCH v10 08/12] arm64: vdso: disable Shadow Call Stack Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41   ` [PATCH v10 09/12] arm64: disable SCS for hypervisor code Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 18:23     ` Kees Cook
2020-04-06 18:23       ` Kees Cook
2020-04-06 16:41   ` [PATCH v10 10/12] arm64: implement Shadow Call Stack Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41   ` [PATCH v10 11/12] arm64: scs: add shadow stacks for SDEI Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41   ` [PATCH v10 12/12] efi/libstub: disable SCS Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 16:41     ` Sami Tolvanen
2020-04-06 18:25     ` Kees Cook
2020-04-06 18:25       ` Kees Cook
2020-04-07 12:00     ` Ard Biesheuvel
2020-04-07 12:00       ` Ard Biesheuvel
2020-04-07 12:00       ` Ard Biesheuvel
2020-04-16 16:12 ` [PATCH v11 00/12] add support for Clang's Shadow Call Stack Sami Tolvanen
2020-04-16 16:12   ` Sami Tolvanen
2020-04-16 16:12   ` Sami Tolvanen
2020-04-16 16:12   ` [PATCH v11 01/12] add support for Clang's Shadow Call Stack (SCS) Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-20 17:17     ` Will Deacon
2020-04-20 17:17       ` Will Deacon
2020-04-16 16:12   ` [PATCH v11 02/12] scs: add accounting Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12   ` [PATCH v11 03/12] scs: add support for stack usage debugging Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12   ` [PATCH v11 04/12] scs: disable when function graph tracing is enabled Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-17 10:00     ` Peter Zijlstra
2020-04-17 10:00       ` Peter Zijlstra
2020-04-17 14:46       ` Mark Rutland
2020-04-17 14:46         ` Mark Rutland
2020-04-17 15:26         ` Peter Zijlstra
2020-04-17 15:26           ` Peter Zijlstra
2020-04-17 15:46           ` Mark Rutland
2020-04-17 15:46             ` Mark Rutland
2020-04-17 23:19             ` Sami Tolvanen
2020-04-17 23:19               ` Sami Tolvanen
2020-04-16 16:12   ` [PATCH v11 05/12] arm64: reserve x18 from general allocation with SCS Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12   ` [PATCH v11 06/12] arm64: preserve x18 when CPU is suspended Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12   ` [PATCH v11 07/12] arm64: efi: restore x18 if it was corrupted Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12   ` [PATCH v11 08/12] arm64: vdso: disable Shadow Call Stack Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12   ` [PATCH v11 09/12] arm64: disable SCS for hypervisor code Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12   ` [PATCH v11 10/12] arm64: implement Shadow Call Stack Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12   ` [PATCH v11 11/12] arm64: scs: add shadow stacks for SDEI Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12   ` [PATCH v11 12/12] efi/libstub: disable SCS Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen
2020-04-16 16:12     ` Sami Tolvanen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20191118231343.GA231930@google.com \
    --to=samitolvanen@google.com \
    --cc=Dave.Martin@arm.com \
    --cc=ard.biesheuvel@linaro.org \
    --cc=catalin.marinas@arm.com \
    --cc=clang-built-linux@googlegroups.com \
    --cc=jannh@google.com \
    --cc=keescook@chromium.org \
    --cc=kernel-hardening@lists.openwall.com \
    --cc=labbott@redhat.com \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=mark.rutland@arm.com \
    --cc=maz@kernel.org \
    --cc=mhiramat@kernel.org \
    --cc=miguel.ojeda.sandonis@gmail.com \
    --cc=ndesaulniers@google.com \
    --cc=rostedt@goodmis.org \
    --cc=will@kernel.org \
    --cc=yamada.masahiro@socionext.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.