[PATCH] arm64: Apply dynamic shadow call stack patching in two passes

Catalin Marinas catalin.marinas at arm.com
Thu Jan 26 10:49:09 PST 2023


On Tue, 13 Dec 2022 15:28:49 +0100, Ard Biesheuvel wrote:
> Code patching for the dynamically enabled shadow call stack comes down
> to finding PACIASP and AUTIASP instructions -which behave as NOPs on
> cores that do not implement pointer authentication- and converting them
> into shadow call stack pushes and pops, respectively.
> 
> Due to past bad experiences with the highly complex and overengineered
> DWARF standard that describes the unwind metadata that we are using to
> locate these instructions, let's make this patching logic a little bit
> more robust so that any issues with the unwind metadata detected at boot
> time can de dealt with gracefully.
> 
> [...]

Applied to arm64 (for-next/misc), thanks!

[1/1] arm64: Apply dynamic shadow call stack patching in two passes
      https://git.kernel.org/arm64/c/54c968bec344

-- 
Catalin




More information about the linux-arm-kernel mailing list