[PATCH] arm64: Apply dynamic shadow call stack patching in two passes
Catalin Marinas
catalin.marinas at arm.com
Thu Jan 26 10:49:09 PST 2023
On Tue, 13 Dec 2022 15:28:49 +0100, Ard Biesheuvel wrote:
> Code patching for the dynamically enabled shadow call stack comes down
> to finding PACIASP and AUTIASP instructions -which behave as NOPs on
> cores that do not implement pointer authentication- and converting them
> into shadow call stack pushes and pops, respectively.
>
> Due to past bad experiences with the highly complex and overengineered
> DWARF standard that describes the unwind metadata that we are using to
> locate these instructions, let's make this patching logic a little bit
> more robust so that any issues with the unwind metadata detected at boot
> time can de dealt with gracefully.
>
> [...]
Applied to arm64 (for-next/misc), thanks!
[1/1] arm64: Apply dynamic shadow call stack patching in two passes
https://git.kernel.org/arm64/c/54c968bec344
--
Catalin
More information about the linux-arm-kernel
mailing list