From patchwork Thu Feb 13 22:00:26 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Volodymyr Babchuk X-Patchwork-Id: 13974105 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 899B7C021A9 for ; Thu, 13 Feb 2025 22:00:51 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.888111.1297521 (Exim 4.92) (envelope-from ) id 1tihG8-0004pe-EE; Thu, 13 Feb 2025 22:00:36 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 888111.1297521; Thu, 13 Feb 2025 22:00:36 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tihG8-0004pV-BZ; Thu, 13 Feb 2025 22:00:36 +0000 Received: by outflank-mailman (input) for mailman id 888111; Thu, 13 Feb 2025 22:00:35 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tihG7-0004bW-3M for xen-devel@lists.xenproject.org; Thu, 13 Feb 2025 22:00:35 +0000 Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on20606.outbound.protection.outlook.com [2a01:111:f403:2614::606]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id f29a8177-ea55-11ef-9896-31a8f345e629; Thu, 13 Feb 2025 23:00:33 +0100 (CET) Received: from GV1PR03MB10456.eurprd03.prod.outlook.com (2603:10a6:150:16a::21) by PA4PR03MB7069.eurprd03.prod.outlook.com (2603:10a6:102:e4::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8445.13; Thu, 13 Feb 2025 22:00:29 +0000 Received: from GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e]) by GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e%4]) with mapi id 15.20.8445.013; Thu, 13 Feb 2025 22:00:29 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: f29a8177-ea55-11ef-9896-31a8f345e629 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=QZkWAiBjmXhnpcK/Nef475bXBvYI8iEBR/MMq5Raq40DlHT1W8jYLJGpha40/sZiD7Cw4bgLx1KJ+SeN7y53KeJAgTZ2z/XAbkhWULFwzpzjer3Mzj9QrWdwR4Zz69W3+x7tPdfBnLJSx5vR78OGXlfhSJxyWsdLVWnbYMjaY5JrUcSIDsF56qvXuIbjcAURYiqPoBPdSXa6dodYkjwvyH5MaQ1SRfhzzQ+gyP6+6WFkafyHqoVz6Y5DrlqpjrIqKBwR0JjfY1+nlPD5SFvG+hSnu1aBfoB7/K2u9F28LYkTp3a5xtR1mcXjSG8HrKm9kh5EUnGtnZG180J5wpVY0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JPQWEWjJWgqQ5ilMuiG6MAnVTekf3gFSc1AqZ/HDA7M=; b=c2cDhrXGhWOMASww+t6OhuFf9hz7/tqLlbR6Wh7LUXZzA9UlFQB1yrmpF2LUjhiVISDQ9at//BeOLZDlCbl3kljOono27BzHxpJ8iFl6yyxIa0ktCZ8lHF2Df9znLjL9pIhE9bGyUFP9xqxjg2H2gDWg7/ICy/brkYByAEjTNlwhUcz8NrC8Of6e6S5T4HnnHBFsdBSw088VP6RMmx51d+pw1+5X3vuC8lbT59ZJuCf5+4Dr5KBL3k0yftwm3wMeuYWiWwl1cdMCK/8J1MqL/B0CCBjB+65hu+J64w5lh9pn6X3ToLewE3EQ5sBop7nliBRc8w4FQciSigRnsPk1/g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JPQWEWjJWgqQ5ilMuiG6MAnVTekf3gFSc1AqZ/HDA7M=; b=XYN1r8R5vLBpFS5DglkgpGkDggqURajUXBbnvQlb4RxcZ9sOn8m225dOi+Xa26+t9VdpvX7xOJAfEZhz1SvqnAUME3iRG8qtV//mEIyDm9QksjKY6H0GQWqqiPMz+Ssw/gNOIeoiffIQjIC3icQMLJG+tQ3zDfwGTrapt3eRG+ffIbGatKhKXaYI8Xvir3CshZ0RcklP7lJteeFH9wCaD0rOtHwDoADpQ+1KciZhnkV/dEHz3eFz06tsGpkEhlnd8KCdQZDv0RDFa2j603EWcX8ZFyYEAA9MCY3caU2riDmwZI7HbhgQ6iOIaeq5Do3IwPgFFO/6x3B8HKSxYs8UIQ== From: Volodymyr Babchuk To: "xen-devel@lists.xenproject.org" CC: Volodymyr Babchuk , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , =?iso-8859-1?q?Roger_Pau_Monn=E9?= , Stefano Stabellini , Samuel Thibault Subject: [PATCH v5 1/4] common: remove -fno-stack-protector from EMBEDDED_EXTRA_CFLAGS Thread-Topic: [PATCH v5 1/4] common: remove -fno-stack-protector from EMBEDDED_EXTRA_CFLAGS Thread-Index: AQHbfmKwo278lWdDqEO53b/eC0p8tw== Date: Thu, 13 Feb 2025 22:00:26 +0000 Message-ID: <20250213220021.2897526-2-volodymyr_babchuk@epam.com> References: <20250213220021.2897526-1-volodymyr_babchuk@epam.com> In-Reply-To: <20250213220021.2897526-1-volodymyr_babchuk@epam.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: git-send-email 2.47.1 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: GV1PR03MB10456:EE_|PA4PR03MB7069:EE_ x-ms-office365-filtering-correlation-id: 90536e17-6912-44b7-3ddc-08dd4c79d449 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?q?BC0pPxhFGM59eQnVEqRt+IlqJg?= =?iso-8859-1?q?N06QdAuGnePImcUpGxZ4IzPMBCke+sNboT0O1A3DO9bktpClB4qCWe0Z2Lxt?= =?iso-8859-1?q?qjYla9XPRdfN+lGOPHWMRskj1LfVwWt3enmFyp9qjA6mf5C32Z5l2ZgVKTL7?= =?iso-8859-1?q?n/n02fN/L5Jtxcs4j3i7+UYMsVE9P3vKuNjA9fIyZEXqfrirPuesXjGurA21?= =?iso-8859-1?q?E72tfMmc8A7FuNXfchkCzxzpNdFbhiwoBRuLAEC/l8hvnpuuYM/8LugtMFtL?= =?iso-8859-1?q?HlWmG8zNQ0mmIUnxQTNpOZTi4PapXDegKMyQe9bwDrJPN73YP1tWlOh0gBNt?= =?iso-8859-1?q?S4KuMYqgc0WHDBF0jeGNjKpzCa2OYsxb39T294Vtxb2pQzaczA60DPCOA4rc?= =?iso-8859-1?q?iAq6IRTNvEuNlJi3zMQJOPhySdGPc0fY7aaROodkR4a4UWdR2ZuHCCRvwD8B?= =?iso-8859-1?q?HFMnQNiTiNm0p8HhW2uoBPq30pGNEGrqwRF5GoaQpThXhqt+KFMAVkqHl51B?= =?iso-8859-1?q?KMQrIfTIcv8rmesEC3XrXz/iKzepTnhd1JXD25VKxVICb7HiHKUI9pwtU3Kv?= =?iso-8859-1?q?jhjX1gLnvWB20Jboe/NCFvh1Qd3yn8Vt0Wzns1QOsd/tHZUpLC6OUs4xBHxs?= =?iso-8859-1?q?yQAxYuTJNwn/+bNnwSKStyE6eTxR5Yd2UJksgS7rnKpfYAvmHm55H5n+oKKE?= =?iso-8859-1?q?5J74n5uD9bHLe0zdyRxZ3gZIwll6vV+R1DpSxf6PI7pWa8UOBY0G0tL2ZiGu?= =?iso-8859-1?q?Gh6NDlrqhmEReFIufjb4PzfH1RqpwAOvvOyLqLGR+G+tFCxHX7NGHWtL+nD3?= =?iso-8859-1?q?oRRfzufgRFy5KBWXahFuGs8HnFEkNd5sQ/VRPNtaWGdyKyiIptcSN6t8sW4E?= =?iso-8859-1?q?Axh+J0qzBmKr45l0RarPL6YWZC6rT0vQDqIAn4q7E2sYEPzB+MosBGWABJSz?= =?iso-8859-1?q?dBwPQ2U9U7WXbSmG5OE3Kkq75ENLL4lmRHUOGANhtIUOaaFCJ3u8WYYawfTH?= =?iso-8859-1?q?C0snjEV4/2TalPtm0dQqlHTci9i/ONzHBbEBOVLeiQfsZNGJ51oW6eDEeXJZ?= =?iso-8859-1?q?EYicXGBv6DetNYAv1CevTyPa3v7ZfV6N+4Z8fTjKqTwZFsHgSAD8hNpsLr57?= =?iso-8859-1?q?edhpzNKXdos8NOgXsG8gl2BTj8KdolXitQmS5St6hWhZ3xp1iAQLfdvhAx+Q?= =?iso-8859-1?q?eLUUnW89oqvvU71Db2W27nl2jJ/TeH4i6bL/0hlJTAq0oAYerW9j/OHLvUpC?= =?iso-8859-1?q?l9DMfl0ck8fbJfH1aBHM5QN1IJtMSFYtxjplIo+jDXS0odxZOWgg22UbZ8FW?= =?iso-8859-1?q?stjTWfkrK2cBttq2hVlFEpCacJq4OhJIAv2Dbdv/B5sd1G4dhYukwqaUk0jz?= =?iso-8859-1?q?O5sCrtGXEWBy3mF8MN0nKoMRb8WsDk4mNptZqfxJtoFzAOY7ohF00fh4rCR8?= =?iso-8859-1?q?8EhIVWosBkJqRyuh+QDB8ybw=3D=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GV1PR03MB10456.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?q?ahN0x5sRiWgXquYFvg/Uux5?= =?iso-8859-1?q?XvTY1hRjJp201z6ihXpNAhykD6QIgqbpiHgoaoz2/DDrWO1mXuIKnqqjutX6?= =?iso-8859-1?q?zKvSbvJ1LuAgn4UcETvJ2c0B8BR+9DKo3Vrp/ScyWS/XQY5Jy+jwqF05suH/?= =?iso-8859-1?q?0O4+20An2YDBhjGCuSnC4rm8998j/N4QugRpu5CzGW/CkJPg5k9eumVvIZDn?= =?iso-8859-1?q?bxPFaUtBUjTS2dBH3c3AQbL80ijVuAnHYKbUM0RZH9A2L2DqzWrmBpp5wew9?= =?iso-8859-1?q?OnvTESGBx+Hb0detvqpEtN9xJz6o6Jx/QQtJ8RnkVTBeBhkDxX1GdoW8qx7S?= =?iso-8859-1?q?6V9PvTZ8+6LBcVb7Wo1Zxa4u4mbw27gP+X5TKFDqJFkfP40FYsc8YOkyIllg?= =?iso-8859-1?q?B5dXrse5bqul8qR5LYeahOFbC2FEJFrWEorwUACA+70M7oBakwNdDlqbyyHW?= =?iso-8859-1?q?JlqROu+GGxPMbRZ7lXbpqn5wvRe0UiC95jfMFmzyYeOqr5Gvf4Pb8lHMKQLc?= =?iso-8859-1?q?OT2Bfaq6XTn6egjRCZifstpOoO0dOBI359g8SKSNF4Ot7cv5Rr+XUqg3L2Yy?= =?iso-8859-1?q?8+LrwU8Moa+U4gE+sbyyZ+5JUlFiMhtmYDiDisbJBKvGsbsQkq/+cd9SpWVy?= =?iso-8859-1?q?BfC2ryfWhgANsoTRBCGFoGYmYmVLOPqjnOHNb77hklOgqBPSMbkPt2IP05BZ?= =?iso-8859-1?q?Os3rmz8aQuz3IV9YJ39EMfD7XfWqtwnzWScRu9Yq0ILTbp+a57FvUUBkDNfK?= =?iso-8859-1?q?WYHJc8q32m2wfMQTpM+e8Uo8KmFar3zQ+HXqF5IvXXAevlTJYyCV0ZJALXoI?= =?iso-8859-1?q?31zHZ1wgov+H0Na2DrHJV3x14Ugue8eGgrKAIyVVRy7uvgsQIi47lZ7dTeUP?= =?iso-8859-1?q?8dTGrI4xiA5nrlJ5bSmxHQMgN6jIjD/gSseBv1mrc5rV2tZ3TSUfnmvMlsG6?= =?iso-8859-1?q?Bo7jBMqgZejokS1J2S2ovhk3onE99lVhbeNODsfCYCpKdfSvgz3cH3AY+HcE?= =?iso-8859-1?q?DdKUpxnlKa6YcApOfyt+o2MySGBld6Nsmf2fAMZP2Q0iAdJJUnKKXU82pFtg?= =?iso-8859-1?q?m5k1ukVn0UofqaOinWaFF02hadtEix53FaDl31e2WygZ1tmcnz1pZ8oGZ9v3?= =?iso-8859-1?q?SBUnLjUaesaGtIQMvtz1oQa65bO/n3H0IlbeNtOsKHAoQzaLYqfvzPToEYXq?= =?iso-8859-1?q?Ii3hia+F0HXOXIEpNs0Oi5KzTFV0lMp5pyGmmWQvdWFJUxrGMk/MUl+cd17u?= =?iso-8859-1?q?GQiOKtQmuKb0lqOJzVTWcJp0aKSBLYoonLcVHpi1gIOqrDtQYq52jjhKWFU4?= =?iso-8859-1?q?yynTb4k/4Ejcoi71QQ790uDcA5b6RePGu8DnV521dczKxpNs+d30X/ISmJ7w?= =?iso-8859-1?q?XVQ7BiM++5g7FsYioLFCBtY5EjWgT2cutsv9w5a0NOPabpraHOeileok+bVV?= =?iso-8859-1?q?yzs+MJYYTJDJOaemxUVVtbueTT1hLwzjzrjDHyCb5idCdNe1SjQxfPlraWra?= =?iso-8859-1?q?1cFCmHqdjEyow6omibZ0MrJtShOt5ic5+bpyoSzHZKsTKSBASGK6eRtIvnVu?= =?iso-8859-1?q?JPo1fInHRdiqpoTu0H+ni//NM/HX7y1xNdpZLySAJbHsBy2Y4Ldtyi34ERtl?= =?iso-8859-1?q?JGx4S6FaNXXKoxe4kr937aaaSPKQl6uLZVlk6Vw=3D=3D?= MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: GV1PR03MB10456.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 90536e17-6912-44b7-3ddc-08dd4c79d449 X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Feb 2025 22:00:26.7413 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: FTq0l+sjbhS/516sSNbS2kTV9n7okKmNaFX3u6CUKLegLuanCj/AfUSvNzpl9FWK21PSBam73xLdwz5CRDsNC2T3dMzY/veAb8fBA08qVko= X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR03MB7069 This patch is preparation for making stack protector configurable. First step is to remove -fno-stack-protector flag from EMBEDDED_EXTRA_CFLAGS so separate components (Hypervisor in this case) can enable/disable this feature by themselves. Signed-off-by: Volodymyr Babchuk Reviewed-by: Jan Beulich Reviewed-by: Andrew Cooper --- Config.mk | 2 +- stubdom/Makefile | 2 ++ tools/firmware/Rules.mk | 2 ++ tools/tests/x86_emulator/testcase.mk | 2 +- xen/Makefile | 2 ++ xen/arch/x86/boot/Makefile | 1 + 6 files changed, 9 insertions(+), 2 deletions(-) diff --git a/Config.mk b/Config.mk index 1eb6ed04fe..4dd4b50fdf 100644 --- a/Config.mk +++ b/Config.mk @@ -198,7 +198,7 @@ endif APPEND_LDFLAGS += $(foreach i, $(APPEND_LIB), -L$(i)) APPEND_CFLAGS += $(foreach i, $(APPEND_INCLUDES), -I$(i)) -EMBEDDED_EXTRA_CFLAGS := -fno-pie -fno-stack-protector +EMBEDDED_EXTRA_CFLAGS := -fno-pie EMBEDDED_EXTRA_CFLAGS += -fno-exceptions -fno-asynchronous-unwind-tables XEN_EXTFILES_URL ?= https://xenbits.xen.org/xen-extfiles diff --git a/stubdom/Makefile b/stubdom/Makefile index 2a81af28a1..9edcef6e99 100644 --- a/stubdom/Makefile +++ b/stubdom/Makefile @@ -14,6 +14,8 @@ export debug=y # Moved from config/StdGNU.mk CFLAGS += -O1 -fno-omit-frame-pointer +CFLAGS += -fno-stack-protector + ifeq (,$(findstring clean,$(MAKECMDGOALS))) ifeq ($(wildcard $(MINI_OS)/Config.mk),) $(error Please run 'make mini-os-dir' in top-level directory) diff --git a/tools/firmware/Rules.mk b/tools/firmware/Rules.mk index d3482c9ec4..be2692695d 100644 --- a/tools/firmware/Rules.mk +++ b/tools/firmware/Rules.mk @@ -11,6 +11,8 @@ ifneq ($(debug),y) CFLAGS += -DNDEBUG endif +CFLAGS += -fno-stack-protector + $(call cc-options-add,CFLAGS,CC,$(EMBEDDED_EXTRA_CFLAGS)) $(call cc-option-add,CFLAGS,CC,-fcf-protection=none) diff --git a/tools/tests/x86_emulator/testcase.mk b/tools/tests/x86_emulator/testcase.mk index fc95e24589..7875b95d7c 100644 --- a/tools/tests/x86_emulator/testcase.mk +++ b/tools/tests/x86_emulator/testcase.mk @@ -4,7 +4,7 @@ include $(XEN_ROOT)/tools/Rules.mk $(call cc-options-add,CFLAGS,CC,$(EMBEDDED_EXTRA_CFLAGS)) -CFLAGS += -fno-builtin -g0 $($(TESTCASE)-cflags) +CFLAGS += -fno-builtin -fno-stack-protector -g0 $($(TESTCASE)-cflags) LDFLAGS_DIRECT += $(shell { $(LD) -v --warn-rwx-segments; } >/dev/null 2>&1 && echo --no-warn-rwx-segments) diff --git a/xen/Makefile b/xen/Makefile index 65b460e2b4..a0c774ab7d 100644 --- a/xen/Makefile +++ b/xen/Makefile @@ -435,6 +435,8 @@ else CFLAGS_UBSAN := endif +CFLAGS += -fno-stack-protector + ifeq ($(CONFIG_LTO),y) CFLAGS += -flto LDFLAGS-$(CONFIG_CC_IS_CLANG) += -plugin LLVMgold.so diff --git a/xen/arch/x86/boot/Makefile b/xen/arch/x86/boot/Makefile index d457876659..ff0d61d7ac 100644 --- a/xen/arch/x86/boot/Makefile +++ b/xen/arch/x86/boot/Makefile @@ -17,6 +17,7 @@ obj32 := $(addprefix $(obj)/,$(obj32)) CFLAGS_x86_32 := $(subst -m64,-m32 -march=i686,$(XEN_TREEWIDE_CFLAGS)) $(call cc-options-add,CFLAGS_x86_32,CC,$(EMBEDDED_EXTRA_CFLAGS)) CFLAGS_x86_32 += -Werror -fno-builtin -g0 -msoft-float -mregparm=3 +CFLAGS_x86_32 += -fno-stack-protector CFLAGS_x86_32 += -nostdinc -include $(filter %/include/xen/config.h,$(XEN_CFLAGS)) CFLAGS_x86_32 += $(filter -I% -O%,$(XEN_CFLAGS)) -D__XEN__ From patchwork Thu Feb 13 22:00:27 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Volodymyr Babchuk X-Patchwork-Id: 13974102 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 56DC6C021A6 for ; Thu, 13 Feb 2025 22:00:50 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.888112.1297532 (Exim 4.92) (envelope-from ) id 1tihG9-00054i-TH; Thu, 13 Feb 2025 22:00:37 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 888112.1297532; Thu, 13 Feb 2025 22:00:37 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tihG9-00054Z-Pe; Thu, 13 Feb 2025 22:00:37 +0000 Received: by outflank-mailman (input) for mailman id 888112; Thu, 13 Feb 2025 22:00:36 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tihG8-0004bW-L4 for xen-devel@lists.xenproject.org; Thu, 13 Feb 2025 22:00:36 +0000 Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on20606.outbound.protection.outlook.com [2a01:111:f403:2614::606]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id f380d785-ea55-11ef-9896-31a8f345e629; Thu, 13 Feb 2025 23:00:35 +0100 (CET) Received: from GV1PR03MB10456.eurprd03.prod.outlook.com (2603:10a6:150:16a::21) by PA4PR03MB7069.eurprd03.prod.outlook.com (2603:10a6:102:e4::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8445.13; Thu, 13 Feb 2025 22:00:29 +0000 Received: from GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e]) by GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e%4]) with mapi id 15.20.8445.013; Thu, 13 Feb 2025 22:00:29 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: f380d785-ea55-11ef-9896-31a8f345e629 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=VtoOlouxSce9q7zFuCWmziUZGDwSWgaMmUf9NFhHi+uAvOPpoGNw/CIm72QOzWyUAp37rnBtI9jYDZj/h+wTWRtAQce6lIhHdT8lQxzOwoxPqIUdas83C2tk+mDb9kVZXsqgQ0Z5eTHadepqUgAjQ2/S0S70DGPihXDE16bynSQJEiznJG6vffYw8N8D1WxZ+ymN1bKNYOdShCZMaILNHXf/T+OhELH/8lEgz5rLTqbxzAkVBoUvNzstoxQchHOz6JOFHScVhKLSwwDncRF2aW42A2fxA1ofb/AnN1n9sgyNcwiE/BG8JXO+qhnhkrnXpLHdNA7SACP1tlOrvK7eQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=g1uQdAGwFGGyhk0UmxlV4ntFJuw/pAbi5iT6SVTTNG8=; b=GN1eCVGfQ7C45x35XR/xnHq+k6RzLyjckIU5vaX0lQRddWso2ENuBG9IuNahgPF0+ynrFNyPoNb1QEzFqauTL1Z+nIddrX6pWjciBB8qlXz0hXi8MC4JCmSXXJd4ymYFyra83JKFhqDIi3mcvscfIB6UyQe1Y1i1It4yUWr9t6GKTDQpLAKaZ7S4tw3g41556ZhaFl09rqLSIozZXzBLTyf303IWfSAz4KULRSvU/xXN1hBC/pf5ruVaCTN0qtbfIJ0HvRqox6E1mCOQlkwjL0iiJsKnHN7Qu5NuM5Ma0G1CiCEK0bhT9IT0hXCfINXE+0fgW5e5L/tKRlhdidCP6A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=g1uQdAGwFGGyhk0UmxlV4ntFJuw/pAbi5iT6SVTTNG8=; b=it497oKdonehtCCF1IU7J3FEnkO8u1g+ePwPyyV3S60EywULjX9ejMK4AiLJvT+j22MVtyWJPx1+OcJZHshD2HQap1CHxMP71JpMt0Ly7LU29xfwrMppPRoRSfXbPibFJkiJgIqCOQ3LRxxU2MC/ZmGXjgJaZtVjz6/ZDQW+W4fUKqdpamElCgSEayWE70PBUPS2TfyCLdFxHO2AcDerlYdpNUzTPo8vl71vSFc0XqE0dUQKTTeyfAKhdvR6cp3+rZKpdgSTK/LCJQ2iN4Bvl9mPcqYJz2ZXjk8LYmOZJ5/Njb+DrX0Ahc7YZz86Xhx5i6g4iar/ImjwXI81u7IVoQ== From: Volodymyr Babchuk To: "xen-devel@lists.xenproject.org" CC: Volodymyr Babchuk , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , =?utf-8?q?Roger_Pau_Monn=C3=A9?= , Stefano Stabellini Subject: [PATCH v5 2/4] xen: common: add ability to enable stack protector Thread-Topic: [PATCH v5 2/4] xen: common: add ability to enable stack protector Thread-Index: AQHbfmKwgsjxBZVOSE6qB7f/GfKgPA== Date: Thu, 13 Feb 2025 22:00:27 +0000 Message-ID: <20250213220021.2897526-3-volodymyr_babchuk@epam.com> References: <20250213220021.2897526-1-volodymyr_babchuk@epam.com> In-Reply-To: <20250213220021.2897526-1-volodymyr_babchuk@epam.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: git-send-email 2.47.1 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: GV1PR03MB10456:EE_|PA4PR03MB7069:EE_ x-ms-office365-filtering-correlation-id: 2d660be8-1a62-474b-7148-08dd4c79d473 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?utf-8?q?vOKKTxnb11UouWklbvqJchVOwzGGkiZ?= =?utf-8?q?wNoydx5+ydvCIf4ltuaLtLfKp5217UKKBKwWvX/7hYDJPUBjfqvf25srJA5vbOTpi?= =?utf-8?q?VNGJm17Bk09UEMT7/o90PF5vmeEcTDyRZVRhNtgdCcPRQy4+mFhgs1eTmKgnMPVxy?= =?utf-8?q?KrQmCPZoE+dDhcLxfnAr3QEgUuI9tgL3cjka8TzN9x4/ULsBgTYvBfCom1LmBQZM5?= =?utf-8?q?rri87NaBrWTjQKRh4t1ZM1ZIHtFv+74XBx84+Eyj9PcAP2iYQEMSc+yyW/DOdRuxp?= =?utf-8?q?WcGN+J7Hs9vn2RX5Hlljv+Lu4f9JrO1eNuozj+4MYTfnVNUmb6LjK6S3kYai2Ku9h?= =?utf-8?q?Pm6xb0bmrT28RQYEff6RqObT8PrFxdSTMuZrJ3583qvxvEN9g2nJR3HXCCMQ291KS?= =?utf-8?q?x94CwGsmKDhbKVcAqqPG9OAK7XbOBEc/pPOZu+URfGwzGGcmIe2qgh0ZxIx5ChAXf?= =?utf-8?q?dfJ9ubIlaDpuuNQrcX9hKlWysi5PBsvng97ezvzah2/owGL0qjdJ9P3qe08XhY2R7?= =?utf-8?q?LlnUiPJD4/P35TPn3R8OkxB+YhMjDGDamvkTY6wLDcT5BxGoXlN5VVEUgkfEbdjGF?= =?utf-8?q?FhvVhJfsSSrqGu1lwhViLpA27aC2JC3CyrDMtiP4feetoRxliWLcZ5AuP09qkDdsZ?= =?utf-8?q?GVkfYiM//DZGgLpbOE7LXKylY3Mv4c2GGwXAP5KVgvIwLq4sQDU9D/Er/n/I495vl?= =?utf-8?q?q6UfezXsCvvcZTVreRwGxwfa9MvhQH1L3/eBFXFzHurZy61+Jlz8O+/k2zMVWGrlS?= =?utf-8?q?TQxBeei8kLPpKJdm04kq6DF93qpLZVAp9HHQ5APambQ+ZsoKf+PWjXDAjlxSIhwPH?= =?utf-8?q?ba3E5lEqdyCAE2MIZdPh7lxRD+nHDqFsmq2rwpKv0jFUaS4HIXrY6Ye0R2ZeX22ZQ?= =?utf-8?q?NT36nFgsv8myxBHhks0BI9dRx36N1rD4Y92sBVnZrECnxapVDx4e2ymzZur1N9VCd?= =?utf-8?q?IA4y2YxZrbRqe14YlDSU+GCt8mGUWpRp4wJuOd5CtfM777m4faotGf9h7ML9R3TVI?= =?utf-8?q?THsrEuVCUNFheT4UAiYZwjKc2OkXoB/3r2TSROhIs0meZ1QOC+7KrcIm8ecW/rYxM?= =?utf-8?q?NDfUR3xCL89rlcwJfLCWmYgY7ZMm+qgcUIPx5HGZXe+JJOOIiaJ8MYiSoBRoHh3wx?= =?utf-8?q?prb6OW0uYm8r8CBFDqcMmtTZizjR+hptY6D3Iwyn7plbw+efBKPZqAj9C+kPfFhxV?= =?utf-8?q?HxUZQqh22pshZqRFYW9j/r4fEz4YNmmwOXvRt/bS8k9O3idzgd85Ex+ae0DxXdUge?= =?utf-8?q?h76smKDbTK4I7U0NMw7HldLUyrwXPYO599RVyJZnxN3uaEpT/9D+TypF4Eq7OmepX?= =?utf-8?q?FkKSBDNFzCYbBQWHRKUwrDxAOTbVf3quJEDpoYpto7PWahinJxqrCgpewBIz1Mahl?= =?utf-8?q?/XyPCdMr8P7?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GV1PR03MB10456.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?q?nJemuhD/KGz3LhOhIq9ojcPp4OZb?= =?utf-8?q?DEP9YEvbjFm0mt54Lq3CrahMB3N8EL0KFg99GvhBuihCbWh3ZZSpOhYW8niQ1dtmb?= =?utf-8?q?LoaCNKMY1JhbIoiGtLRZbnMSXgwcSO0wynbJ6oGUAgEZvy0+9E+0bii5Dqyid1+oA?= =?utf-8?q?V42/9sqnaoK3rviXR9UB5qHCBPrlIO2uGhLebEm24qGIW/zk+bQhH4tBBEoIA4con?= =?utf-8?q?CaXKdTXU4ay5qlAR9Hu1YE8erfrDjMoZ5Ef+rmdLXffLAkCbKR4hsEa+gFJO6sH/D?= =?utf-8?q?1sujhXvmdbWfZZpSe7gKYdXG6aqVRr6pf/0H2jT2EHoK97SkZgnILFKsTOm2wc6mk?= =?utf-8?q?9pc7LXNFEgJcEQXG5VvYYtxnmxhBOtLSXi6MMUoUPoGMAo8qPBcFbNW6YpB2/qCkc?= =?utf-8?q?ku/QoVDPTaIjqkcUEK7xkfsQJlpFGn5HRCbudRM3VZ/lni48+nHYV9ZTPaVzBMyaR?= =?utf-8?q?Q5ombncT/3Hlr9ILYJKX4JdjlmMXmgko7FVZOR2TQOpREdwbLeQrLdJhG/zxW9gbD?= =?utf-8?q?8UxR7KBPi/PqXS1h8lSna40nzeDtprsYTaVMFlnrOO9fw85wVZLwpabekeSiD+2H7?= =?utf-8?q?RDMYngOycnRAc834oD7ZgT57IMVEcooi6UHw/8Z5Ah7aM7Rbv5XuY6YIcgP1lins0?= =?utf-8?q?3iJiQON2TS+dKqFnqRXBCphgAZw+fD/SV1aTZBt537gU0GQpBiYXj37Yv4Mdk0VJP?= =?utf-8?q?YxstQkGYzbJZQ3V9kkpycsRxT3MQfcHt02KtNKe1nwn+fZKUpdVFCMu2VGt9Jc7YR?= =?utf-8?q?pM3mZ8vOlrA/RNYrM5fUHBEjx/sIlUpF5VRUTQsDsZ6tt1isjFNVlHiiKi1BQST8A?= =?utf-8?q?32bWQ51peZjFgkZO3GDYln9p6OS5kJzrgwwKOcMyOCeUGwZN7nSfsnrgi+R/ZBDg3?= =?utf-8?q?jWiUI9+i/NcwoDsYDW2hTNN6t6uATUM+tuK6JhsjbSvlpSx2nc+rcuhmDESATNWCM?= =?utf-8?q?lbs64lk9Z43OthDbEQujDhayBusBWjdBN8UxGncJUIf49j82jGfKmE5GwOtL9tq79?= =?utf-8?q?f5wGyurS31SSv2A05ZsMrEfIbONHy/vz8MPlo+OHHGb4beAJGOEJwWZ/KzirbjLrJ?= =?utf-8?q?z3iPsTwq9wO70kmdfz0HxmxYrF+4xvQGg2Se4xYcXm3cyIwfJT019LXfzroJDTPQH?= =?utf-8?q?ePX4t/zq2VtJhHw9AbjxWqr0Hh0HPUsVVR6m0Mh7gRwtX5MlDkubc68uGsEvaaHFb?= =?utf-8?q?NkKsba0zwpecVKM7xIdZhloBNF4PZqjSKfJhX8cCJo8XZATgAUrnb/0prhVZFysCQ?= =?utf-8?q?tYudtsRGIinQuTAA62wKQVo2NNr8jRflW7pqWUynZWQmRnWkBU9OTZLK5hpCQm3XV?= =?utf-8?q?5vLoouYMYqCMmJbXI9uDFHqajl3rJ4wyJNKrPr3hyf7tFc5WAqGl/lelKBadltz88?= =?utf-8?q?FiMyJ3wBLREjPRFyaF5ZYnFLsBRcPWKs8XWaD1AcYEKCb2eN8KosSRVbXXY51tnZr?= =?utf-8?q?byAPFUKtpiLslEYEekpPaybLLFg/tftMyYl4XxJ+ApQuVHue2K2PFoJWM1bBSysdX?= =?utf-8?q?xzXnxqQvMd5GCSROcLSg/rFhi5sO68kXMg=3D=3D?= Content-ID: <2E84844C2EAB3148B75ADF4EB1E8D68B@eurprd03.prod.outlook.com> MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: GV1PR03MB10456.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2d660be8-1a62-474b-7148-08dd4c79d473 X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Feb 2025 22:00:27.0708 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: P/EsKjMUnLwJVFv4dmu2Amw9ymz0p/8OUslV90I/TOq01bwMqc+w6Ba51+wKtg0Vh4K+HAzuem9tJaMOL04bRVgV3wzhS0JSOcP8+/L5F9s= X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR03MB7069 Both GCC and Clang support -fstack-protector feature, which add stack canaries to functions where stack corruption is possible. This patch makes general preparations to enable this feature on different supported architectures: - Added CONFIG_HAS_STACK_PROTECTOR option so each architecture can enable this feature individually - Added user-selectable CONFIG_STACK_PROTECTOR option - Implemented code that sets up random stack canary and a basic handler for stack protector failures Stack guard value is initialized in two phases: 1. Pre-defined randomly-selected value. 2. Own implementation linear congruent random number generator. It relies on get_cycles() being available very early. If get_cycles() returns zero, it would leave pre-defined value from the previous step. Signed-off-by: Volodymyr Babchuk Reviewed-by: Andrew Cooper --- Changes in v5: - Fixed indentation - Added stack-protector.h --- xen/Makefile | 4 +++ xen/common/Kconfig | 15 +++++++++ xen/common/Makefile | 1 + xen/common/stack-protector.c | 51 +++++++++++++++++++++++++++++++ xen/include/xen/stack-protector.h | 14 +++++++++ 5 files changed, 85 insertions(+) create mode 100644 xen/common/stack-protector.c create mode 100644 xen/include/xen/stack-protector.h diff --git a/xen/Makefile b/xen/Makefile index a0c774ab7d..48bc17c418 100644 --- a/xen/Makefile +++ b/xen/Makefile @@ -435,7 +435,11 @@ else CFLAGS_UBSAN := endif +ifeq ($(CONFIG_STACK_PROTECTOR),y) +CFLAGS += -fstack-protector +else CFLAGS += -fno-stack-protector +endif ifeq ($(CONFIG_LTO),y) CFLAGS += -flto diff --git a/xen/common/Kconfig b/xen/common/Kconfig index 6166327f4d..bd53dae43c 100644 --- a/xen/common/Kconfig +++ b/xen/common/Kconfig @@ -83,6 +83,9 @@ config HAS_PMAP config HAS_SCHED_GRANULARITY bool +config HAS_STACK_PROTECTOR + bool + config HAS_UBSAN bool @@ -216,6 +219,18 @@ config SPECULATIVE_HARDEN_LOCK endmenu +menu "Other hardening" + +config STACK_PROTECTOR + bool "Stack protector" + depends on HAS_STACK_PROTECTOR + help + Enable the Stack Protector compiler hardening option. This inserts a + canary value in the stack frame of functions, and performs an integrity + check on function exit. + +endmenu + config DIT_DEFAULT bool "Data Independent Timing default" depends on HAS_DIT diff --git a/xen/common/Makefile b/xen/common/Makefile index cba3b32733..8adbf6a3b5 100644 --- a/xen/common/Makefile +++ b/xen/common/Makefile @@ -46,6 +46,7 @@ obj-y += shutdown.o obj-y += softirq.o obj-y += smp.o obj-y += spinlock.o +obj-$(CONFIG_STACK_PROTECTOR) += stack-protector.o obj-y += stop_machine.o obj-y += symbols.o obj-y += tasklet.o diff --git a/xen/common/stack-protector.c b/xen/common/stack-protector.c new file mode 100644 index 0000000000..286753a1b1 --- /dev/null +++ b/xen/common/stack-protector.c @@ -0,0 +1,51 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +#include +#include +#include +#include + +/* + * Initial value is chosen by a fair dice roll. + * It will be updated during boot process. + */ +#if BITS_PER_LONG == 32 +unsigned long __ro_after_init __stack_chk_guard = 0xdd2cc927UL; +#else +unsigned long __ro_after_init __stack_chk_guard = 0x2d853605a4d9a09cUL; +#endif + +/* + * This function should be called from early asm or from a C function + * that escapes stack canary tracking (by calling + * reset_stack_and_jump() for example). + */ +void __init asmlinkage boot_stack_chk_guard_setup(void) +{ + /* + * Linear congruent generator (X_n+1 = X_n * a + c). + * + * Constant is taken from "Tables Of Linear Congruential + * Generators Of Different Sizes And Good Lattice Structure" by + * Pierre L’Ecuyer. + */ +#if BITS_PER_LONG == 32 + const unsigned long a = 2891336453UL; +#else + const unsigned long a = 2862933555777941757UL; +#endif + const unsigned long c = 1; + + unsigned long cycles = get_cycles(); + + /* Use the initial value if we can't generate random one */ + if ( !cycles ) + return; + + __stack_chk_guard = cycles * a + c; +} + +void asmlinkage __stack_chk_fail(void) +{ + dump_execution_state(); + panic("Stack Protector integrity violation identified\n"); +} diff --git a/xen/include/xen/stack-protector.h b/xen/include/xen/stack-protector.h new file mode 100644 index 0000000000..714116498b --- /dev/null +++ b/xen/include/xen/stack-protector.h @@ -0,0 +1,14 @@ +#ifndef __XEN_STACK_PROTECTOR_H__ +#define __XEN_STACK_PROTECTOR_H__ + +#ifdef CONFIG_STACK_PROTECTOR + +void asmlinkage boot_stack_chk_guard_setup(void); + +#else + +static inline void boot_stack_chk_guard_setup(void) {}; + +#endif + +#endif /* __XEN_STACK_PROTECTOR_H__ */ From patchwork Thu Feb 13 22:00:27 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Volodymyr Babchuk X-Patchwork-Id: 13974104 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 696FAC021A7 for ; Thu, 13 Feb 2025 22:00:51 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.888113.1297542 (Exim 4.92) (envelope-from ) id 1tihGB-0005Je-4L; Thu, 13 Feb 2025 22:00:39 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 888113.1297542; Thu, 13 Feb 2025 22:00:39 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tihGB-0005JT-1Q; Thu, 13 Feb 2025 22:00:39 +0000 Received: by outflank-mailman (input) for mailman id 888113; Thu, 13 Feb 2025 22:00:38 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tihGA-0004bW-2w for xen-devel@lists.xenproject.org; Thu, 13 Feb 2025 22:00:38 +0000 Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on20606.outbound.protection.outlook.com [2a01:111:f403:2614::606]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id f46b1ad8-ea55-11ef-9896-31a8f345e629; Thu, 13 Feb 2025 23:00:36 +0100 (CET) Received: from GV1PR03MB10456.eurprd03.prod.outlook.com (2603:10a6:150:16a::21) by PA4PR03MB7069.eurprd03.prod.outlook.com (2603:10a6:102:e4::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8445.13; Thu, 13 Feb 2025 22:00:29 +0000 Received: from GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e]) by GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e%4]) with mapi id 15.20.8445.013; Thu, 13 Feb 2025 22:00:29 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: f46b1ad8-ea55-11ef-9896-31a8f345e629 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=OaGQPsvEjHD6WXdgaM5H8PxD+TdKA/720kPYD7vy1cEfa7hNRuzMLQYBtAzu7b3V1R26Ielklk1lWYl9Fh6v2Ik891eMjIjCwDw7NH0xvW5vRDfuJKS/iJ5kOO/9uHzWbSsYU0F4BcXR8l8uVOvW49eM0qFjdNplvkHsJuX9lz7RV6xIK5ydo+94Ap3pVFaX/QrP9ichLhr7yO9UtvC0/sDh9cVt3CXJcSpFVuWG7J7BRrIqoIHdPa8E5tIccwWdg7iHN8Q+POINKoyxH0lUVrl3WIE+iW5u3MMC4smpsuzl9jOuuQYDbNyZCSW3qna23y4XBDOgNkrsl8NHP5JVGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=rp3sx+Qz/TUPSWt/2rwv/aBkJj8l3/Pj+YsA/GRt+To=; b=Sd14zdgRZj8oEB81mgdQmee7uL24y0zg3GfU5R0Yjj7FU9du7uI0o/TPRIL9EeJD1NdVD9Prfs27Ccj3lF3La7YqzQlSYRAg02pJHNeBUbIaDzuNuXSnIzM2G++v9Bqk65u8EsjyJRDoXwv4MfeBFA+fwp7+gPN0u+D20rKekvBNHU91IJd2J81rqRL7jroRGUL2zYWIhHU1D5xnVE/gZvg/QP6WJC/x6VhQF04TlDgFuz6kw0Q9kSjWV1Pvujd5r5PE8q19NzI577CpfFmhq3BypSLkCYnxTVYEtpJrCuWsTCk2+DokEIIczazpiQYRZxJ/3qBppXHL+cmBTZhwMQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rp3sx+Qz/TUPSWt/2rwv/aBkJj8l3/Pj+YsA/GRt+To=; b=Rlq9XKakpDh1BmVI2tyvgOohIArzQrdagWkqBnfRay9rwtRaqaJ5kNGsgSEus5ayVaUrr4aGJRGmqGJdKnwTiZ7+eid6lq6oBw/6F3fU9idkyUJ06cf8Qt/rYsuG8WwFrPg8OPhdnZ5cBo2ElBfVKmRlqD1f0ZuL2SYt8/JkkYjH3Mnforx+zdq/2tCT9nd4f62vBTWp91XsAWXu4maNwxQmD35j5MRAqzdLMN4H00h3KFiUxkR3mr8g6nWM+ise2k82hmLCW+aJR/50HCIVnaDytDchU+BX1OeQ/ftzEbm0EJ8q13+IARp0lnZxxaIohe2nIFD488WCUiQy+nKJww== From: Volodymyr Babchuk To: "xen-devel@lists.xenproject.org" CC: Volodymyr Babchuk , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk Subject: [PATCH v5 3/4] xen: arm: enable stack protector feature Thread-Topic: [PATCH v5 3/4] xen: arm: enable stack protector feature Thread-Index: AQHbfmKwZ00k4YYKH0WPipI2HVN66Q== Date: Thu, 13 Feb 2025 22:00:27 +0000 Message-ID: <20250213220021.2897526-4-volodymyr_babchuk@epam.com> References: <20250213220021.2897526-1-volodymyr_babchuk@epam.com> In-Reply-To: <20250213220021.2897526-1-volodymyr_babchuk@epam.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: git-send-email 2.47.1 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: GV1PR03MB10456:EE_|PA4PR03MB7069:EE_ x-ms-office365-filtering-correlation-id: 1ef7a720-132a-4e30-c3a1-08dd4c79d497 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?q?AzC8XHGWpTfFAETo0DbfD1KKKs?= =?iso-8859-1?q?h3Cce8xyyr+GByo9tKPTs8xVAXDayXooj2+GmxybBq3FxxjpYwJc61GfcZk/?= =?iso-8859-1?q?V36uOQqodnVtml2c/GAfZXctu9t5+J14l+fjVS7fOJpS5yKgR6lgiAqdR/Wl?= =?iso-8859-1?q?FLOxrkKNKZ/XKq83byFWqzjtqxHsJrOTil49G4rG37zhiUzq00rW3rDm7NsU?= =?iso-8859-1?q?TtW1pxF2EWs3V1hVLj1W9eIRSMaWjTV+rSw8O0F33LzNZ0I0J0QVMZ710IhL?= =?iso-8859-1?q?u/l7/6ElJ3Rm/Py/GKk/VF5lGKdJ5XJsaNTtZI46sT2oVXBubkWIhxaTlS62?= =?iso-8859-1?q?Dz4KDIJ5BEz5eGhQy48HInXlMddFM2Car8v7ui2iDr6kerD4+5rshBt31l8z?= =?iso-8859-1?q?ky8YmAH1r2QSdKt+QuobikR2hbKapSw7X60p8ulewotzvHKzm4pPwoNFIO1T?= =?iso-8859-1?q?EFV7kk+0BQ3+0zX/vnRBmHdTLvY05INLVXjV1iNm/aoCN2j8zYif1NGj9Wv5?= =?iso-8859-1?q?oPK+khL0Y7aqE+sV37CeY8+THyYKeb1VKlpP9I6p9qaGOrnZ8g5KTYFs2Zy9?= =?iso-8859-1?q?aaGrDbU16lFeESJD4N9/JOoGm5KOvn4vKHNoI3OEtT9TPYI39aps0ifb6a8q?= =?iso-8859-1?q?1485TvqgWXPbNhBgLJt7IgKU6Q5pH6dce8WVm+/6824ki7H1Al2jaqqBXw4f?= =?iso-8859-1?q?ujZ0qNoiCmEhDi72HI98HDyjyQDyfzZfLRTM2Zt/cgO2n0t3V4H2xYqomf1e?= =?iso-8859-1?q?B9BsncU7m+o5SSUtQoGBIVEyCG+MWC6HxmLwza3DGlRiB7Sv/KGB4gy7nZ7W?= =?iso-8859-1?q?MxtOMwbEv0yHRck6nsen5sgfBGXgX6q4gxv+LzFIZYOglSSTbNAGPFTtRTY6?= =?iso-8859-1?q?NEJU+0eB5pCMMS5KlkZl4E4udHUhIVLMnDdz2Ve8CeLZZgYUcratOsWZKgsj?= =?iso-8859-1?q?G/eshqlXnQaCSKy9j+UQMLY9dJmYjPRWd5DyywaPJVE44g1klI1AgeliQLBJ?= =?iso-8859-1?q?CRBQWfl+WHYwGOCgYTH7zEhE1bNW3ACEMg66wTILHhJu/pWZIhtQCpTqgluP?= =?iso-8859-1?q?J07adXjT9RrHYK9gx0b0SNDvX4+DE+HhCGaFU+bFMFi7E7YdXiPdDOUP/C2C?= =?iso-8859-1?q?XkMJXnmxKyvSKH5nyLG07QOiMams0rDYPUrjSUfu0hlzVmveEw1Zo9gfhoV3?= =?iso-8859-1?q?MqJAYl+W+RVL+gFtDDUUXnCyy3WFIW69Wmi4+4pUR9b8fEEy7ROKgWHiFrpH?= =?iso-8859-1?q?dXRiUfEBe73fBNn3SKDONAP/c5VK9JVJttfnq3oH8u1byQABrY1C5mEU5ojb?= =?iso-8859-1?q?VzMxZfaRKhy1yh7MFIFORr14JGeRT8gK0Q2lhzMykanelkban645gA5xSub7?= =?iso-8859-1?q?GNFSV2kYKv5RhkdKvBUmTimtKmXa1LIJ8EzAHdhNjy4heVOPIOIRykKtZrem?= =?iso-8859-1?q?EI66JEbBdJ8f4GJSAMMPvcq/0GdVrVBvEPs/s0VyroIke0jzmBf0i7wAo4Zz?= =?iso-8859-1?q?7y+Zz0?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GV1PR03MB10456.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?q?29InrIdOzqkesPSUuxi6cHd?= =?iso-8859-1?q?Xqj6ZWQjPgUVA0PoZELm4eXsWc0PR4LTOoKgPDMVJ1zyppYCyiygOEF/oMDI?= =?iso-8859-1?q?JYgqE0fz8Fk17jZyhLXNC6KHtA3asehe3fwq4MQOggDa83CB0SUBS6DeeUH8?= =?iso-8859-1?q?Ps7Rd+y0M63PLcRknUiSr2P00SMPV+VLWamYBfgPjEja9zg+CkBSScJRqKQv?= =?iso-8859-1?q?+uuycDAIHtAeLxGDT0JCA0aTQRjnqBDN0rXZAJZ50bDKi9+dL7xOsdlLhIc8?= =?iso-8859-1?q?/p7JHc1GQdqv53KBwclpScy1aWK8bY4CZsDeT32StGBYOCMKrHWTkcvtL/z3?= =?iso-8859-1?q?rA5dOjwaFLEg0k5n+o3U4/3WMcsP38AMgwqQ4cA2jDM1JwpnLPqEYhLiIm/d?= =?iso-8859-1?q?IhtfBx1Z8ogUvIMxMXNfRegDXNdojl7yfOghf9ZpkoGj/JBv4ySkEqOS4Ixz?= =?iso-8859-1?q?HN3+B68qzzrCfGK6x6BhD7pzYJHyMZoDH5GaEq4axomALn7IHl8bdQWEXbvA?= =?iso-8859-1?q?1vToHCo/lTw39CMGAiw6GDm3MgOCFTlcG6mu4grdpig7Kp85trqUaUTHsQgy?= =?iso-8859-1?q?rhuBQHfKI6xudN5Gq5TbpNru9+klm7k66vfZoUiVmcN0AscoxTJc8CnX1J+E?= =?iso-8859-1?q?Q/qE3In4AAxi/IN0gYW8x39ddZr8EBIvhRYMrafjR9kjIP1woteLGQ6Aw5Tg?= =?iso-8859-1?q?l8BSpg4bhPYX9A4tNu6mwAfBLW15+hRrxSfyakqLXyIXNIF3dqRIlcWDtSXF?= =?iso-8859-1?q?cC8aI9aBKiVsg0a3eaHJ45SO6G3MkjWgXNMTWJWeH8H32yMCnx28hLeoBxrC?= =?iso-8859-1?q?q0n7l1f/TB+4sAJKwoOLWNJ3TDu+j+QfPT8f6l+K+51K9gMnjK85VgYMnljH?= =?iso-8859-1?q?Mz4bgJTogxYnU+5dHj7ukpxBSV9Gw/6hdfaotUPHNrsAyC9yTIf2Xa+wVi1/?= =?iso-8859-1?q?lbdBhA7Q4ePlHtJ6089fxi06UyxTRF8Ete/wroGurQ9eLZw3CHF09yBXK3qS?= =?iso-8859-1?q?sAx8C18PI6aGVy8BqILMKLWpsFycP7jdxTQWjE6UZfFoYPNmTU+seK+7a6eU?= =?iso-8859-1?q?Ag8BXIpVz+hQ1CZafQosm8ZCY7aeImdsNTXXfZjee9EtdWdu1pswP/QeKY00?= =?iso-8859-1?q?ngNwYDJDAeKWxHkbLEthTnM4XLn9oaUyzje+w2e5Zr7lYRRjJC8h28jBbQdH?= =?iso-8859-1?q?YQ6mIrjj1oGbjrcge1p2jbbyShUoG0K3FnlGdcf7E3g6FTra+JiDHtqiFMwd?= =?iso-8859-1?q?shzoF8d9M59t1Z4A7Lt21FkBNerz6hQiOfj4quIJPPn/FH6536xSR36tZ1Uw?= =?iso-8859-1?q?NuNCH7uvR8x30t9MAAe0b80VhOwa1U/UNOu2M/bv19vyLb4RWq2oqCvYdavs?= =?iso-8859-1?q?6pZx0T6OMy9kmJvGxVrYoKteFnQKrma2U42fI3Xz1w1RB6QWsf86q8yPVwfO?= =?iso-8859-1?q?Iu9FokhP2oU/aXuOv5gsYlIj0tNuIPSu3sGMbll1vdOBZoSup/Pfj52828FA?= =?iso-8859-1?q?x0q9qFIgxl3oJGYC+ArWVSBW6ymz/16HBPMersfC5XiVCLTD5SEsOTy2w/YT?= =?iso-8859-1?q?AHNNViRqLY9DJ1sCZY6PCPZHAA/tmRv1OGVrAxNdd4Lqya/c1dA2VCuGeGSM?= =?iso-8859-1?q?yvr7yRzIV7d7fG4peFjkMtQwEaqeyDWXTIWF5Dg=3D=3D?= MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: GV1PR03MB10456.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 1ef7a720-132a-4e30-c3a1-08dd4c79d497 X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Feb 2025 22:00:27.3488 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: FAEY+YnP6ZqFZLxlzvvYnH2BVcMtveejHLgJ0lgPe0YxQrMhgB/l9dCJZc1kzfuoBa62fIWm21QwnC2CCEzNPPhrRHJzit3afbUpG6BW/Pg= X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR03MB7069 Enable previously added CONFIG_STACK_PROTECTOR feature for ARM platform. Initialize stack protector very early, at the very beginning of start_xen() function. Signed-off-by: Volodymyr Babchuk Acked-by: Julien Grall --- Changes in v5: - Call boot_stack_chk_guard_setup() from start_xen() instead of early ASM --- xen/arch/arm/Kconfig | 1 + xen/arch/arm/setup.c | 3 +++ 2 files changed, 4 insertions(+) diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig index a26d3e1182..8f1a3c7d74 100644 --- a/xen/arch/arm/Kconfig +++ b/xen/arch/arm/Kconfig @@ -16,6 +16,7 @@ config ARM select GENERIC_UART_INIT select HAS_ALTERNATIVE if HAS_VMAP select HAS_DEVICE_TREE + select HAS_STACK_PROTECTOR select HAS_UBSAN config ARCH_DEFCONFIG diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c index c1f2d1b89d..0dca691207 100644 --- a/xen/arch/arm/setup.c +++ b/xen/arch/arm/setup.c @@ -30,6 +30,7 @@ #include #include #include +#include #include #include #include @@ -305,6 +306,8 @@ void asmlinkage __init start_xen(unsigned long fdt_paddr) struct domain *d; int rc, i; + boot_stack_chk_guard_setup(); + dcache_line_bytes = read_dcache_line_bytes(); percpu_init_areas(); From patchwork Thu Feb 13 22:00:27 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Volodymyr Babchuk X-Patchwork-Id: 13974103 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 8237CC021A0 for ; Thu, 13 Feb 2025 22:00:51 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.888114.1297552 (Exim 4.92) (envelope-from ) id 1tihGD-0005at-G8; Thu, 13 Feb 2025 22:00:41 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 888114.1297552; Thu, 13 Feb 2025 22:00:41 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tihGD-0005am-9M; Thu, 13 Feb 2025 22:00:41 +0000 Received: by outflank-mailman (input) for mailman id 888114; Thu, 13 Feb 2025 22:00:39 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tihGB-0004bW-Gi for xen-devel@lists.xenproject.org; Thu, 13 Feb 2025 22:00:39 +0000 Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on20606.outbound.protection.outlook.com [2a01:111:f403:2614::606]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id f546559d-ea55-11ef-9896-31a8f345e629; Thu, 13 Feb 2025 23:00:38 +0100 (CET) Received: from GV1PR03MB10456.eurprd03.prod.outlook.com (2603:10a6:150:16a::21) by PA4PR03MB7069.eurprd03.prod.outlook.com (2603:10a6:102:e4::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8445.13; Thu, 13 Feb 2025 22:00:30 +0000 Received: from GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e]) by GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e%4]) with mapi id 15.20.8445.013; Thu, 13 Feb 2025 22:00:30 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: f546559d-ea55-11ef-9896-31a8f345e629 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=IOxm1UISlyebw7mHGnGuPTdIBmEOp3GwCDdj2szcNJC6Mzl973BHYCF1q7FEogzSuImSdMpNnUZxQ8JPkK7IS528Rf0iSmbu/HQbDdR63455DOphrMrpQdbVeuFjBVjph8XLaBNScyrqN2dHadTfacBHs+OxZnxsR1Q5/Cot9ZNB+ZiO3dJRRbqakXc2KF39FzWN09RwRlQenkFFc49P6hURbV/2y1zZ5eH/vBIayyS4a1NGUWHFqHUJ/1U/bWoRxgTvoQSssf8zW4H9uPmjI0Qz8Nuw1bSYSsVcOotK6Fj5NY3CTi4Y70M2sReanqnVF618UEjQWgKEDwTQmvraxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=dC4E0y7GCBB8QCy6nu9FsWtrUcadfH6fs2ftLDFO9gI=; b=T/Nvwqb2kihn+ws/DHYgHXz7MpHUGINv/2X1z/Y4xzoKraEzbDP3/WaIWMKZy5pSDcVM9WHT4UqcpZ2dld7KNHEjYPQ1PRhiM5eQV7Ls+il8QZK5AN7or6xYVGH0FaHhiITOLazb/bRclAhVC+0s8QQy7omHLDISN0gwqGA0x9DlzPQO51/HOF8Pzji7Zp9yL50Y1R7VuNXpWUn2gWULjMlFdX+XtlLBf7FF/TOf8nybH+6NFZbIRHhqow9aUMwiUmaeq7//XVVtjY9e12SUIVKLeE19L/em3dXSIHRZcrL/6DWYypJAOU7Wj33yLcR+sriovZQdDds674RH056APw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dC4E0y7GCBB8QCy6nu9FsWtrUcadfH6fs2ftLDFO9gI=; b=eBD7Xg9AvJA9XbSr9M/5xAv3viSt9DNtbfffZzU7TlJZt1MU4k8DGV+sKXjPqunIj9K/1J3qE0fZDv8W7btOh4r9x5GKojZEmDFNnruvx/05H0fz8LSsP/pvW2vmBrn4CGct49pLY02m96S5LiI38WfR47jDyxf85Ymma+YhjLbHBk1rSlTuHSyVIkb4TpFbKRNnRHqrZrRjJEoSclOeP2z5x46j3Rh7ziohWca1ZETUWAULEubmYGzc/cAetVMwlQCZRRht7rOUOANSDJJ9yNTUlvmupHWE5zgoFPR2cIpc6gd215A4VaIrbQdRiwSabL2FUOIoZnd6sYiy84g8XA== From: Volodymyr Babchuk To: "xen-devel@lists.xenproject.org" CC: Volodymyr Babchuk , Oleksii Kurochko , Community Manager , Andrew Cooper Subject: [PATCH v5 4/4] CHANGELOG.md: Mention stack-protector feature Thread-Topic: [PATCH v5 4/4] CHANGELOG.md: Mention stack-protector feature Thread-Index: AQHbfmKw/yJjvs5bUE6jn7pI8tvp/w== Date: Thu, 13 Feb 2025 22:00:27 +0000 Message-ID: <20250213220021.2897526-5-volodymyr_babchuk@epam.com> References: <20250213220021.2897526-1-volodymyr_babchuk@epam.com> In-Reply-To: <20250213220021.2897526-1-volodymyr_babchuk@epam.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: git-send-email 2.47.1 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: GV1PR03MB10456:EE_|PA4PR03MB7069:EE_ x-ms-office365-filtering-correlation-id: e53effed-0ec6-4a06-0b7b-08dd4c79d4c4 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?q?MrB8H5qU73Coekmon0tYIzsaAF?= =?iso-8859-1?q?p81g4PwXFfZgSdEOCrUtzvh7iRDcgerOfIIPMYuTwR1vitq8zkbaZNAqQhwt?= =?iso-8859-1?q?o47T1mWdxLqwIrfjSJW1chMgFV0UMipkVOxcflc38+kiMxub+hjGi4INEydj?= =?iso-8859-1?q?9zdQiPxt0wagGvfNjBEQ2iM0G5g3AbC0vn6WVzAPF/c3RjtzL68i/O/jK2mt?= =?iso-8859-1?q?q3ORarps9Q5EjpdJwvQT+ukzlnzOiazHlQpYhL3qXAlMm8mtp1ksZe5bVHkK?= =?iso-8859-1?q?vjkgSmJvpEm5C22XseM0d/lTwzVleYKshXLYl/PfoLQ86JtxPHwkxLLWCXXw?= =?iso-8859-1?q?XPvSCA25rNFmjNgSI/X0ig4zVIaNEOZbYkaK9vx8kywXbrPzP2RpNLeLkb0S?= =?iso-8859-1?q?2xvpYxZTrjn9BEcP5mB5Nj1Ll9mwUDXwPM9Dvvk6mm+vICtbkYBoCWvOBA9f?= =?iso-8859-1?q?h8s1bvkRlOcCX8OkvqG8Q9xttUM+LALXVEFQQuhJEW7KWiQ3qE7brCth/RWa?= =?iso-8859-1?q?pZWry+5O4nDxs253yQizXeEHhgLzLv29IT0R9CLt0rkGgR6MCWG+xGLFQm65?= =?iso-8859-1?q?lq5RM//XE/YlaMXM/hWaU5BiNTiutnfoLOylLaumbWyOB0uMvNb64jdWxSrp?= =?iso-8859-1?q?0i//KwsK1efKkPyox0+kT31yvJDeNqu4l/vAzKN8rUQ4uTOu+9He5GvKLXns?= =?iso-8859-1?q?LwQ7GAVF67UXycfSJmwnD8epRW0jrHop2m9tfIuIpeY21/zy6TecJOQKHePA?= =?iso-8859-1?q?HXom2lPOwCibliFLojQO3y6T29VKL/JeHGA6QWEKk1jJ6AH084uFwQHXkB0u?= =?iso-8859-1?q?/438kwx1CgYlBQc6sOC/KK7S6Mq9yWTPOnhxS82kv+J/8C/4o+925ni9Vkg/?= =?iso-8859-1?q?9IWS2G6p6heKQ7Ssw7oYnJUYd8SRpJ3RcqTjQAqYobUQ5aWiT4AHN3czQI67?= =?iso-8859-1?q?bNv6iGrRQ7OX4mGSGfIyLCuMFM2jghGCZpImV2syTkamS0lSzUS5+crz91pm?= =?iso-8859-1?q?1NntUHAVeHHSfIxtiZZd/7EBKIRnxuNPHc9fu5uk8exd75cC62O9CIemKZ0W?= =?iso-8859-1?q?l4N4ZDu26tQvLLDgbbetVIJL82DNHlO4W5+kgDt1mxoSHvmUNjf7SbzioLoi?= =?iso-8859-1?q?3YO1ykdUfuygMhcoWjF69YPZgZiV0iopbaMUufwobFmYMMy7k8KWx029xRjm?= =?iso-8859-1?q?dUP+c760COZqnjmYadoY2Fy4feJw3WbtoTS5SiAZi+TeeWgzeh48zMnzmigX?= =?iso-8859-1?q?39Y9GFiDPijKrkbxcTvsqa61PG8RTMyGtxW2fNYV/MZQ3kVaNq1nHo1zfSTg?= =?iso-8859-1?q?5iNVqFQaF2s0WpsYJeEmkPcw12v4THBt9RivJSaE7mYyw/iHiYaX2QgqE9M2?= =?iso-8859-1?q?i4Ce6R9JZYbYuaEC8bliNUDkt++zPNqZPT8YmwS/GjAh+cYv5NR87ZRFcbei?= =?iso-8859-1?q?tK?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GV1PR03MB10456.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?q?KfZKP2NEVB8+xsK97JpXV76?= =?iso-8859-1?q?PsRd5tNmefkpNaCf1KZTU3FEf4WGdiOlHfscoRBO3ELIhKjORcFgs87xUfJi?= =?iso-8859-1?q?rdbxsweAJMGhHHZ5A9oH7dmPFO9cdGBAOP6jge780GIiX9cBO4NQQPyOFUOo?= =?iso-8859-1?q?7fEObXz3ynYz54Rc9u72z5r6P9coLTeD3crRhITBx37zgjfnEK8dsz+iYuie?= =?iso-8859-1?q?MA9aB9yE3ARb7bj4qDtN1fj04ehJ6ZAtrY723Tgt2iGMYNA0lsY4I2Ds96R6?= =?iso-8859-1?q?faTQen0Q6bg4boPazV/el1DZ/Nm7kBJ74Ta5haud0K1mt3UVmQLQ0yzba3PX?= =?iso-8859-1?q?IHi/UoCER2/tZTVRQNp19ZJnZulnlXiv7FXhaIIFE1HAk+A7RxvJnoi1Mb8M?= =?iso-8859-1?q?KM5JQjoMs1i+Y4rbqTqsxFI+pPE8LF6hNksHwsYNey1XIsEvk36jrE6i7aO1?= =?iso-8859-1?q?rlGjrB5Vlo8QpTht+yvnT0d98R7/o5D3DTt45Aa1dm3IIiLAW7r3/ecZdTlB?= =?iso-8859-1?q?Yc/8x1uhpanfbPZPKoa5/u/i07gjoDMvpMqvM7NjyxtJ7TULGucBQpxEJVoS?= =?iso-8859-1?q?tAlcd4sQcHdFBSqNPFWf/UcduFc++r6ZArlAiYpZkeEboORa5Kd9DPIQ54UV?= =?iso-8859-1?q?AQkT8aUjfqVEig9qAP6ZgexImFjSi9Z85kPbvBsyDbPfgJDgizmtKxD25oaP?= =?iso-8859-1?q?JxiRSjNuB+Atz+Cjj6nPp/QAzeR8XbrTN3S5nQlyrFsxfpqO0SIjZXNwCYA5?= =?iso-8859-1?q?IijBtLf2xCOBUVxRFLFhouLACzoHTJ5YfqijQD2QkP9iB/UE7dP/ic4NulU/?= =?iso-8859-1?q?PQu7DfLXfKcCwcGlZkrOYLoM23dDGUuoS4RsEqlACxdE1ORtG2eqD4GXnuhU?= =?iso-8859-1?q?6wdhALtNqlh9tLPBMfZ0EmVHCoBEsksHTcjNs3p0IX/lfsxoDvCJmQ0ej1Kh?= =?iso-8859-1?q?8N2B6rPyjyFfSzvmkD9Dg7EtoOoqiITAxZwEueNbxglSZ/Tt8YZ1LEnJXW8M?= =?iso-8859-1?q?U5XkDwZWOp57/wVzd3TObYSI+MjXSeh8/3YhIjj5A6Eo5ki+5r2v/p4GPjzt?= =?iso-8859-1?q?ETKXRt5h0H26MSKb1i81YjT8ctWoQz8zRqhxw1WtxCpE30Ee4n60EZs3ppv/?= =?iso-8859-1?q?lOufJrI2GTqCSLh7j5+Q4e+P9YpBQtWVCfNQvJ1yxI2tt3t919ha9NxBqLAq?= =?iso-8859-1?q?o93tGs3410DiIUAbGM6zpjmauIPxsP6CY/0WmaZHG5DLs4oaWJpm+AgFvHxy?= =?iso-8859-1?q?ciJQG9FsOIHynThweIOvo+clZjWxSRftDdar1V1OU86gCwe0Ww2xT1iaFItA?= =?iso-8859-1?q?VviwRPJljriYWIG9brk1T7A/0YLOruaTm/5yMqXxfsfer8JEZQiHbpjGh4Mf?= =?iso-8859-1?q?R09/+33helnPvxR0OjguStI0Ik2HUv/sagoZpAHnNROCzcPTExYk6AZExpSR?= =?iso-8859-1?q?r+gNHWbR1HxX3EmTARgRbY/E0W0uBeALPQ1nvK/xyRJQqbqorrfggoMatjIC?= =?iso-8859-1?q?yoNoc3CzpFHVjOr5Joh92f41xSJefTzrqfcX5gmaMu5ACiVP5GoQ7Vh85gE9?= =?iso-8859-1?q?Lcr27P8pPgNfcAA9Cv8eO6ccDrIJAT8vlFTCkngZiPwed35KDYYFZbDs80Oc?= =?iso-8859-1?q?Sd3b1jp/j7YsuVGvtjVVpMW3Cy9q4ystMp9y4xw=3D=3D?= MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: GV1PR03MB10456.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: e53effed-0ec6-4a06-0b7b-08dd4c79d4c4 X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Feb 2025 22:00:27.6231 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: FU35gp8gIBJg/7KMUE+lrWqD5Elugm13HC/5q3t8Kim+vtw4UygVaHubSQGLN3m0DjpXK6zNV+SUhuVHWqUVq3uJiKgJFHamQRYGJ2RT/m8= X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR03MB7069 Stack protector is meant to be enabled on all architectures, but currently it is tested (and enabled) only on ARM, so mention it in ARM section. Signed-off-by: Volodymyr Babchuk Reviewed-by: Andrew Cooper --- CHANGELOG.md | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 1de1d1eca1..4cac4079f0 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -23,6 +23,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/) - Basic handling for SCMI requests over SMC using Shared Memory, by allowing forwarding the calls to EL3 FW if coming from hwdom. - Support for LLC (Last Level Cache) coloring. + - Ability to enable stack protector - On x86: - xl suspend/resume subcommands. - `wallclock` command line option to select time source.