From nobody Wed Feb 5 12:59:04 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1736828799; cv=pass; d=zohomail.com; s=zohoarc; b=LV7j2L5WLUeXUihgomhog+N0ULykbzaOItzqXSwTsf/GZqnJdVDnRY0ONh80oUzScO3mGl0tMqHqIDxNVSjPvuTkpNMCZfDxUI4DwSR8LXxz1+p9HUM5korCA1ix+e2NExPl3UhnzxU/XU19N9nIIweJ/TSTYzqdU/RKoUTlTdI= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1736828799; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=F7CrkfKLq5jOHyUUc5QDVCpbIzJ4tC6vRwCVPj0QO1U=; b=UKBX7sFg2wZfzmLxCKBG6/zWTExdddzs4GSBFtM8zICdjLOnKOXr/deqnZdSgDzkFJDpvysEzdrGdxFhbIyVje9DloVx2uhvB0D7s/xwe6qtDbmxRhdttHJntbxA8AA1tba7V3ZV9I/kMoEULUux0vpF2IDJbV35Kg6bzA1sRfE= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1736828799061365.7861414921249; Mon, 13 Jan 2025 20:26:39 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.870903.1281976 (Exim 4.92) (envelope-from ) id 1tXYVI-0007zw-81; Tue, 14 Jan 2025 04:26:12 +0000 Received: by outflank-mailman (output) from mailman id 870903.1281976; Tue, 14 Jan 2025 04:26:12 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tXYVI-0007z2-41; Tue, 14 Jan 2025 04:26:12 +0000 Received: by outflank-mailman (input) for mailman id 870903; Tue, 14 Jan 2025 04:26:11 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tXYVH-0007T1-O6 for xen-devel@lists.xenproject.org; Tue, 14 Jan 2025 04:26:11 +0000 Received: from EUR03-AM7-obe.outbound.protection.outlook.com (mail-am7eur03on20612.outbound.protection.outlook.com [2a01:111:f403:260e::612]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id ae50ecf2-d22f-11ef-99a4-01e77a169b0f; Tue, 14 Jan 2025 05:26:10 +0100 (CET) Received: from GV1PR03MB10456.eurprd03.prod.outlook.com (2603:10a6:150:16a::21) by DB8PR03MB6300.eurprd03.prod.outlook.com (2603:10a6:10:13f::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8356.12; Tue, 14 Jan 2025 04:25:58 +0000 Received: from GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e]) by GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e%3]) with mapi id 15.20.8335.015; Tue, 14 Jan 2025 04:25:58 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: ae50ecf2-d22f-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=CNXFYZv/i8RoY9DhK1A9DrY4pdXJC1Iapr7z3cc8RK2kZ2J3kPN50KDRnd3UW5VbxLVqDJF5DxIjxlgqrckFs61qOAbY3PFpCTIqyXZ6Jy0uy3pE7Vbs9VD3kIkjkqfgyDmNEM2AYXXalMQuuKtZaHCTSSePJhv0bSRrHFRKHCA2J3FXKZszxVrPvteXwFmi2dMT2aTESpaVENoHSGueuzM9bpobDWBy9jaegG3sMixrX+SdXq8I5r7gvVZAyFjeJWkVuZFLOA2FvIOUnFR5EQCFDACbE6nVTBKgj21mXi9xtrH9olZrkbTic9aZnVFD3YdjwWgxEDoieEY2uemWsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=F7CrkfKLq5jOHyUUc5QDVCpbIzJ4tC6vRwCVPj0QO1U=; b=LDR0TqthiVKH52S6P3gPieScKBeTAJLuS+swq+eSzT7mJeLrCkxZVK4aXmEbUl7ldnGY3zdfFo6tEZASPtL+DDq+PhDmsJuuypZH9+qBmT+NW7LaYLT6Ub5fUsV0QBaz6CEUy2eFh/QwZnUi2LcRi8UwA0KivmtipxwatO7OdZTShyVw8WKGOu2zuIrxD1eAN8X8aWvAFcov+41+n6Po9Khx0aqA/UZC9kXzAXctfPyfDIg3tKlHKtA2zAkOTUe86Ql9YS+orp+tFJNRcN3vOkDR4ZS6Y/OJ733kn3tj66b0yF8DIRFtIldBkkObqXFEgUgR6+syLrM5NdFXtYL9bA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=F7CrkfKLq5jOHyUUc5QDVCpbIzJ4tC6vRwCVPj0QO1U=; b=Yn9+xYbbUUVHjoYYDr8g4znus83Mz4T5tf/U07jT5qWt4N5fk1665Ium68fQzpIoyNKvOTgxDaP28hPCcS3MDImyDlt4NvBM+ZBV7Z2Swtu8fmUlaaZA/qInRDfNVq+EyEBvc0VzudQpC+2xh7nuoniHwLzyMbxfK7c67MMooNzzqLRGiCqRy3nNOAsQkBJuQ1EZ7+xVjnkmuZ258/jmeoTf5E8zjzPCx5NJMawa1z2zC4qoGQi9tf2vdDmGElwgNyh5pQ278mjvZblMJuqoXmi/7b9/rM7kcqJSqf/NtbPnvpfqIXPrMukyctYt6RCmxZyCTpDVNdYU3IRMALb0ig== From: Volodymyr Babchuk To: "xen-devel@lists.xenproject.org" CC: Volodymyr Babchuk , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stefano Stabellini , Samuel Thibault Subject: [PATCH v4 1/4] common: remove -fno-stack-protector from EMBEDDED_EXTRA_CFLAGS Thread-Topic: [PATCH v4 1/4] common: remove -fno-stack-protector from EMBEDDED_EXTRA_CFLAGS Thread-Index: AQHbZjxnmljcDXAlQke3Qcb/enjdIw== Date: Tue, 14 Jan 2025 04:25:56 +0000 Message-ID: <20250114042553.1624831-2-volodymyr_babchuk@epam.com> References: <20250114042553.1624831-1-volodymyr_babchuk@epam.com> In-Reply-To: <20250114042553.1624831-1-volodymyr_babchuk@epam.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: git-send-email 2.47.1 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: GV1PR03MB10456:EE_|DB8PR03MB6300:EE_ x-ms-office365-filtering-correlation-id: dc1d4bfe-8639-42de-07d5-08dd34538b89 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?+beGIrg/eSZhYUmXb9AHSpzeS0Sx9usP25oSeUHNwkRBHLBkJs9qCRscvK?= =?iso-8859-1?Q?4+6Ba6NcKan/W4mQjc6GnS/gX17ZIuHx/Do6QhAB+rHyaCtUPw6nI1DLQI?= =?iso-8859-1?Q?Xuaj10RP0+LngF6IkhmoCw4Nv1f3aJcpZMIpmNUxTO/AfGI70l66vc2Kou?= =?iso-8859-1?Q?8FHgghsAqVj3gfohzR8UvmQueQbxtlaL0dMWiEctHCz9DqDCuRkOUd6btU?= =?iso-8859-1?Q?50IfXICBI2lasIDtj8cbHF9G7s00WhcSjVsld2IL7nrtFvzULsiefnX2wU?= =?iso-8859-1?Q?vFVZM5nQmSrXZDoFFqOWJO9wT28sBgetWRRRJgTO44j8rzHuj+i3iIt+cz?= =?iso-8859-1?Q?8KjDVTCStyOqrU4qPXBTFqlHLp8TIenapkvOJxz6d5M9XnGx+ClY6AqmS9?= =?iso-8859-1?Q?jtgUQz6QIrA1eVb1X3Chv1Zbx6R8C4atjsnPt/0/TC+hwZpQPj6d8MG9PT?= =?iso-8859-1?Q?ZQJM0s0L+zPn5suO6u3Gaw05NOXpqbcYTMj7ci5flmgN+k6Cj5ws24HSb5?= =?iso-8859-1?Q?rfCYHcaC1xgqSpBQlhCylm5jKuAvCLIOSAdK5r+GWXFhlF86t3gTYPsJVA?= =?iso-8859-1?Q?TETeQiTAY8kreFyb91E1gh4GpY63ahWAvCJWYw5tHUMHVqECitSxs+q7bi?= =?iso-8859-1?Q?hU4LaPwSKnfPGQqZ/507Dl9zlBRYpPr+Ug57NfEMZ79eTjUpm/BSz667pA?= =?iso-8859-1?Q?JMbuQLZVTJS/1mJ5cnEZ79mQgDI6UIxe5lXza0ZrkZJaSuAc5xgQ7ZQmpW?= =?iso-8859-1?Q?qAwJ+/2465YKiLNZ6xWmzFiEclvCuPRi16UvMsziDdi0JLZh238Wzr7JCD?= =?iso-8859-1?Q?Xz4YLMulmNCDnSMNYxPPCeOFgq5fQ9HfAOfFpS+CQhagydRMFy8JmDijA2?= =?iso-8859-1?Q?ZnVvUHFw8j6btnb3x+tUALI8xSuVszBpw22zmMRfHMYvL2Kwe08bzWRt1T?= =?iso-8859-1?Q?2MNCs3TK+mZzxGiHF1+wE2hkifppWWHgLIwN6vVSUxY8pD/xer6AVrElOA?= =?iso-8859-1?Q?9P4oo4vKANGOFLUrSpbeoV35E3vjQh0IgMFxEqMKhYhrH6SeGvF6F1deg8?= =?iso-8859-1?Q?ABvBQFbF4P4so/1Zr8Cqe9OctyoU6Qp3VewaQ9dmrLGJC5cKisiXtVtH/J?= =?iso-8859-1?Q?t9fSeGtOaEMAmxtsVkzGqKNSf6pB/8W0HhjdUiztKFlmAVWSSwhNGAVpJP?= =?iso-8859-1?Q?nZudxmYCH7G5Iu87uV5d1TXNsgdD+G0rHddhmcj4JQ4xln0uPF2pXExYzC?= =?iso-8859-1?Q?kjWHe3qXylAPcPe3x930S/JRBKcTIGGds02ONw0bKwJS8hTk/qhxDdPs62?= =?iso-8859-1?Q?pYauwalBMMXyn7k5N4zagHJH506Bkd27cGEpkG3l/x7Wd/TeLPgsIcCHxY?= =?iso-8859-1?Q?b3L+kV/VFoKUoS9sRMXIYjyYRLZIGHT76WbwSAuKlA33immx/GrHEAtX+8?= =?iso-8859-1?Q?XgW9XG4afYassLJC6qGCisNg4zZWNnxMQ0FzVw=3D=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GV1PR03MB10456.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?L5wvyISKyJDkP5EF9DgmylbMPPeCpLh5QSGlutY8iOkAFzxpp9FWMIG/KL?= =?iso-8859-1?Q?7p5f5egBQKlC3rWHoxaOqr4nihPVv8beG+oX5fQ8bcRkAT4Ge/IJVHWWNB?= =?iso-8859-1?Q?MwqqNN+JwFo/yqN+CVCp3hL+VsR5JVhZqe0DxkMfSbbXhnmDPQWN/2tiJQ?= =?iso-8859-1?Q?nYdhlknWUzQKWpQK/5m962wYBzkRnBXZsmhmt0/twcBlbspiI9Cs1/XZg4?= =?iso-8859-1?Q?08b/vBS3innEUKr2pyWdGg6H+uyKFstrBav2suUV3e+HfK2hQR1H7yuTVa?= =?iso-8859-1?Q?ntBjNJl0U1WzHvI0qSl1eAr7JYPm8rD7OwYAsf5dvDAsMe7L8ZNYJyKTYj?= =?iso-8859-1?Q?pvEvhP4/qItdBZlUhccxejAA2iTLvnUWVoSNP8wPvGj3sgsmscLbge+KvD?= =?iso-8859-1?Q?a/b6vEb/S6yXjTHxuxdYjdbd8VvpFbMMQO/bfiU3KRJfnhRhlJYe1mxH2T?= =?iso-8859-1?Q?kvMDzm9T7ys6f9bDU3b3LNl8A4v4nuDL+ie09kinsmHmMkRID+yuMR37wz?= =?iso-8859-1?Q?sk5Gt0oI/P/c0R/C+qqli4Wq7JR+751bXDTfuwn9NK1x6JezLYuh4joM2T?= =?iso-8859-1?Q?fmh07Erl9EXWkSW/tkx8hp3w4mAWIj5xptNBlnGPQwvhORqjN90pzn7KVP?= =?iso-8859-1?Q?WZ3wWKQWBUlFZm8RMC2ZoMO5VFeSj/wuVEMbBrgPx1l9cKxsjM9Ic3AL5V?= =?iso-8859-1?Q?yElYs8UifwmAcONicjjAGZC6qhcKXiogpmi6z2N+AJQ/Pp7r25KCPxrbyU?= =?iso-8859-1?Q?BBS60jMKgffYdmDjShq9VgKbwton805mn2ZyjD1ItAWPR/S/xF6/fgnpDE?= =?iso-8859-1?Q?PKRXpaN8Sj3psJQixuJGwFN0tmHGddLn2iyIDt1Bn6vOZ19+jPk0OgdADr?= =?iso-8859-1?Q?7Bb9rdvV/zcM7fRFBU5PFUDo6TstOO3VK3nRFYxP9bAsqL/NdRLSjHLF0s?= =?iso-8859-1?Q?gknzs9YZnz9rBhEPAneaz77SNsQEo/KsZiL6xX931Eoz16hJnUKLHcw8l1?= =?iso-8859-1?Q?gOol8qpObSg2iCvFFH+lTIXR2g3SZ7tfm4bNTwv9/5XuP0qKiWDbPAXdJU?= =?iso-8859-1?Q?t1s+LZusLchtJRJBuPtWiHY/Fz7HaTkdL17H5NjO0RfTmjeAvaAU/2AfzM?= =?iso-8859-1?Q?FlD6vimnSlKCNXwHc1FH+EOrcsBhL5e5Ex5Gg9e6nYXsxaqk8HtcjOL+z9?= =?iso-8859-1?Q?0XKWvmNCa3sJnZkFVI+oPR1y120gLniOdJXLwaRrvUZG/QkuUazSD/I3/V?= =?iso-8859-1?Q?TBrW94sjXVkH1qJAUn6f1+Dz9pBiYzjvoU5AQZ1hp7DxTysb06HCEakc86?= =?iso-8859-1?Q?83Ywyp+hdtM+PQL0RInF16Qwaj6fV6ozwjnvhT70RfEWEupr0xkGNjsrRi?= =?iso-8859-1?Q?WmlvHVGLwhlQZUodj27VauuOz1Q/JKoWLS4DQ9hmZhHdonJSfUo8+trICx?= =?iso-8859-1?Q?l4JqL8wcTx+OsESg9xsnleHRT+Er/tjw3hgLtrunNdF+9nEwSfWeVaN4F5?= =?iso-8859-1?Q?qvB8d8ILVH6stqYShRj+jfo+ZhB3t+pl1T+3YH93T5ufPD3nO+tYozFQE2?= =?iso-8859-1?Q?xKW/WM2VwBrlwEnu9TL6LJ0jNdW73GHo+H95eJ3/napLoKbmvf3v4VWCC9?= =?iso-8859-1?Q?8zBUsL8/q+O3SKi6/Kdk2SeCdQtcgQk1jNclFM0Loz6BBkLVmWab25YQ?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: GV1PR03MB10456.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: dc1d4bfe-8639-42de-07d5-08dd34538b89 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Jan 2025 04:25:56.0171 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: SGhmTuRTaWRYryxHSbYKorYCgpSz2uR2NhfXEYeZLtfCB0vw9DL5a9JxUu89Qi2/dFm0fA0nFPc85AdX2QK6rldFn5uWrcPU1CDq0ZQguec= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR03MB6300 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1736828801295019000 Content-Type: text/plain; charset="utf-8" This patch is preparation for making stack protector configurable. First step is to remove -fno-stack-protector flag from EMBEDDED_EXTRA_CFLAGS so separate components (Hypervisor in this case) can enable/disable this feature by themselves. Signed-off-by: Volodymyr Babchuk Reviewed-by: Jan Beulich Reviewed-by: Andrew Cooper --- Changes in v4: - Removed stray hunk - Added x86_32 CFLAG - Added Jan's R-b tag Changes in v3: - Reword commit message - Use CFLAGS +=3D instead of cc-optios-add Changes in v2: - New in v2 --- Config.mk | 2 +- stubdom/Makefile | 2 ++ tools/firmware/Rules.mk | 2 ++ tools/tests/x86_emulator/testcase.mk | 2 +- xen/Makefile | 2 ++ xen/arch/x86/boot/Makefile | 1 + 6 files changed, 9 insertions(+), 2 deletions(-) diff --git a/Config.mk b/Config.mk index 1eb6ed04fe..4dd4b50fdf 100644 --- a/Config.mk +++ b/Config.mk @@ -198,7 +198,7 @@ endif APPEND_LDFLAGS +=3D $(foreach i, $(APPEND_LIB), -L$(i)) APPEND_CFLAGS +=3D $(foreach i, $(APPEND_INCLUDES), -I$(i)) =20 -EMBEDDED_EXTRA_CFLAGS :=3D -fno-pie -fno-stack-protector +EMBEDDED_EXTRA_CFLAGS :=3D -fno-pie EMBEDDED_EXTRA_CFLAGS +=3D -fno-exceptions -fno-asynchronous-unwind-tables =20 XEN_EXTFILES_URL ?=3D https://xenbits.xen.org/xen-extfiles diff --git a/stubdom/Makefile b/stubdom/Makefile index 2a81af28a1..9edcef6e99 100644 --- a/stubdom/Makefile +++ b/stubdom/Makefile @@ -14,6 +14,8 @@ export debug=3Dy # Moved from config/StdGNU.mk CFLAGS +=3D -O1 -fno-omit-frame-pointer =20 +CFLAGS +=3D -fno-stack-protector + ifeq (,$(findstring clean,$(MAKECMDGOALS))) ifeq ($(wildcard $(MINI_OS)/Config.mk),) $(error Please run 'make mini-os-dir' in top-level directory) diff --git a/tools/firmware/Rules.mk b/tools/firmware/Rules.mk index d3482c9ec4..be2692695d 100644 --- a/tools/firmware/Rules.mk +++ b/tools/firmware/Rules.mk @@ -11,6 +11,8 @@ ifneq ($(debug),y) CFLAGS +=3D -DNDEBUG endif =20 +CFLAGS +=3D -fno-stack-protector + $(call cc-options-add,CFLAGS,CC,$(EMBEDDED_EXTRA_CFLAGS)) =20 $(call cc-option-add,CFLAGS,CC,-fcf-protection=3Dnone) diff --git a/tools/tests/x86_emulator/testcase.mk b/tools/tests/x86_emulato= r/testcase.mk index fc95e24589..7875b95d7c 100644 --- a/tools/tests/x86_emulator/testcase.mk +++ b/tools/tests/x86_emulator/testcase.mk @@ -4,7 +4,7 @@ include $(XEN_ROOT)/tools/Rules.mk =20 $(call cc-options-add,CFLAGS,CC,$(EMBEDDED_EXTRA_CFLAGS)) =20 -CFLAGS +=3D -fno-builtin -g0 $($(TESTCASE)-cflags) +CFLAGS +=3D -fno-builtin -fno-stack-protector -g0 $($(TESTCASE)-cflags) =20 LDFLAGS_DIRECT +=3D $(shell { $(LD) -v --warn-rwx-segments; } >/dev/null 2= >&1 && echo --no-warn-rwx-segments) =20 diff --git a/xen/Makefile b/xen/Makefile index 65b460e2b4..a0c774ab7d 100644 --- a/xen/Makefile +++ b/xen/Makefile @@ -435,6 +435,8 @@ else CFLAGS_UBSAN :=3D endif =20 +CFLAGS +=3D -fno-stack-protector + ifeq ($(CONFIG_LTO),y) CFLAGS +=3D -flto LDFLAGS-$(CONFIG_CC_IS_CLANG) +=3D -plugin LLVMgold.so diff --git a/xen/arch/x86/boot/Makefile b/xen/arch/x86/boot/Makefile index d457876659..ff0d61d7ac 100644 --- a/xen/arch/x86/boot/Makefile +++ b/xen/arch/x86/boot/Makefile @@ -17,6 +17,7 @@ obj32 :=3D $(addprefix $(obj)/,$(obj32)) CFLAGS_x86_32 :=3D $(subst -m64,-m32 -march=3Di686,$(XEN_TREEWIDE_CFLAGS)) $(call cc-options-add,CFLAGS_x86_32,CC,$(EMBEDDED_EXTRA_CFLAGS)) CFLAGS_x86_32 +=3D -Werror -fno-builtin -g0 -msoft-float -mregparm=3D3 +CFLAGS_x86_32 +=3D -fno-stack-protector CFLAGS_x86_32 +=3D -nostdinc -include $(filter %/include/xen/config.h,$(XE= N_CFLAGS)) CFLAGS_x86_32 +=3D $(filter -I% -O%,$(XEN_CFLAGS)) -D__XEN__ =20 --=20 2.47.1 From nobody Wed Feb 5 12:59:04 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1736828790; cv=pass; d=zohomail.com; s=zohoarc; b=D2qmfZo+35KInHLw9hUb97qKcKcV57+PpgRot5kmDAAD1UPSWiX6jfXr6AR3P1e3fJ6bn0txb6UMfocCMSXPZxlJj3NWGIAW9GOC0qreI2OvLhigyZeFFCb+/TUI8qIBLXdVArjlOpiWMWRUHEiXvnW1NBedefxe9P6admVVfkQ= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1736828790; h=Content-ID:Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=5MtrRJxarp34S2JOLx/JyEv2kwrG4QQxCgAgsBhf7Ic=; b=jRTbF4mMCOrVdyRKS1stoAMYPxiQJ87/Yg36lqIwKgvi0Xqc7bZf5dg9U3UOC7JTv83lAaaMgcSIvSrkm6o/bk2KY+OqJaoG0OV8wd0vRRUVdnSQ4teIJ0qmUJc5Rpp7c9g4Ux56KeLKtRwSYzJ4b4iwg8lnjLkOEqs2fWunC78= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1736828790585960.2626285433611; Mon, 13 Jan 2025 20:26:30 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.870901.1281960 (Exim 4.92) (envelope-from ) id 1tXYVG-0007hW-M9; Tue, 14 Jan 2025 04:26:10 +0000 Received: by outflank-mailman (output) from mailman id 870901.1281960; Tue, 14 Jan 2025 04:26:10 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tXYVG-0007hN-Im; Tue, 14 Jan 2025 04:26:10 +0000 Received: by outflank-mailman (input) for mailman id 870901; Tue, 14 Jan 2025 04:26:09 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tXYVE-0007T1-SF for xen-devel@lists.xenproject.org; Tue, 14 Jan 2025 04:26:08 +0000 Received: from EUR03-AM7-obe.outbound.protection.outlook.com (mail-am7eur03on20612.outbound.protection.outlook.com [2a01:111:f403:260e::612]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id ac958209-d22f-11ef-99a4-01e77a169b0f; Tue, 14 Jan 2025 05:26:07 +0100 (CET) Received: from GV1PR03MB10456.eurprd03.prod.outlook.com (2603:10a6:150:16a::21) by DB8PR03MB6300.eurprd03.prod.outlook.com (2603:10a6:10:13f::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8356.12; Tue, 14 Jan 2025 04:25:58 +0000 Received: from GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e]) by GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e%3]) with mapi id 15.20.8335.015; Tue, 14 Jan 2025 04:25:58 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: ac958209-d22f-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=l17/z37zEKElYK7zOeWtDOtfKDD2KmUN35OG5ObTUa8FV46PGEj04e4gwhd+ZPcAcQm1yEfUXY9ue7tiHYpkampDoe5spSOdsFx1arurJspQzhVkYI1wLVHkIaFCO8l3v3+p5K6OmCYZW6mN5E1wBOPJSyKRx0WHPQfPbn3TVnDsd3jLqdlHl7S5xT9f2TXFleG36tWr+aV3i7cQ1tRew3zgyDBjKSQ+f3JOjv5S9lwaAls0GUHNGYH7mQdMjz6I54AFTyHKOBURklq44KDdgOlRQAf20WwLCT6vBGJ5XkWH3kdihi1cVhWpPwEj6B9zv3KoP95qnUSO1p5vS+kzSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=5MtrRJxarp34S2JOLx/JyEv2kwrG4QQxCgAgsBhf7Ic=; b=ud15TjL/x8/iOHm4aAt9ALDKbZo4uQqyhml9iGsjChfeEiftf7Fb1NnPvDWjT+ql83ATVvKgT1Hc+dn4SRRgVyaeDAhPh2ECoyIje529Pn4QcC17QqDaC3NuWriQxf6GRAuGkSEfVg2QwuOXSR36XcmsSS5pUsVtr+SGHkAky28/EE+fYbn4lHkMNWGe5DdYOkmFdv2Z+TKwIJYwyH3m6NnTA4BYoU+UjkSS7tGpJidRL7gZsNXNjGDO99cjodPBkYp/kFS+1mC7Uq7C46Vy7POORINkqgLylHtLtrYaZu5l1OI/98cIdtrEOeGm3aOD0Htu7KSMD93eQ0NJGC9JVQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5MtrRJxarp34S2JOLx/JyEv2kwrG4QQxCgAgsBhf7Ic=; b=UnMBEl1LEJULDOTFiJerc7iC/1+DxsRUMT+wbVpeQg9Upypk00+UzM/+IRzOSVtNCQ444AdKy1P7PFLLcAUThVCr5Aga5/J03xNvwAuhxnUFdaNrgVwn5T11jPx67z1pswaCHjWKfqplqAHnn4KClHFM7GC+dRcdaGjbBkhzPcnuoDg5bexhIgJN2gwopDOt5+rqSwvCai4XbF8akUZTciciXz5Xqj6IKGkKV2YkIulEed0lMeQiIrhLq+D2Pq+Pxvxedb+P2CO/fd6ZA73Cv3g2UJ884y8O52GSaHKUAJNY43aACjp5WFqoaehe5VTjliK5gSSYci/zuZ1MP+6iuQ== From: Volodymyr Babchuk To: "xen-devel@lists.xenproject.org" CC: Volodymyr Babchuk , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , =?utf-8?B?Um9nZXIgUGF1IE1vbm7DqQ==?= , Stefano Stabellini Subject: [PATCH v4 2/4] xen: common: add ability to enable stack protector Thread-Topic: [PATCH v4 2/4] xen: common: add ability to enable stack protector Thread-Index: AQHbZjxnv4AIVf4qZ0m9Cu/vUIISVg== Date: Tue, 14 Jan 2025 04:25:56 +0000 Message-ID: <20250114042553.1624831-3-volodymyr_babchuk@epam.com> References: <20250114042553.1624831-1-volodymyr_babchuk@epam.com> In-Reply-To: <20250114042553.1624831-1-volodymyr_babchuk@epam.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: git-send-email 2.47.1 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: GV1PR03MB10456:EE_|DB8PR03MB6300:EE_ x-ms-office365-filtering-correlation-id: 692dc48c-a424-493a-b2c3-08dd34538baf x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?utf-8?B?aVZ2Wk9xMGpEWFoxa3hVYTQxR25jbzVsWGFqcXlpYy9FVEt5ZnpEeHhmN0N2?= =?utf-8?B?MUpaamJuU1doSlU2K0dwOG1LZFdxSDI2d0Z3alFlRHA0U2QvNGxYaVVCMGdU?= =?utf-8?B?RTVBbDJWTmpwTVpYR2d4WUltQWZDM1A4aE5hT3dEN0puR0xROTNYRUwxSGI0?= =?utf-8?B?NW04dDlHd0dSVnZMYzQ4RFNFZytjbEpJYURqeFc1K203Q1lqMzJHb2xaZmxn?= =?utf-8?B?ZllhM0NJSVlGNzMzTlQzM0hadm5MQmhPekt0YmZaaTUyOUxIRENQV0RUakQ1?= =?utf-8?B?OHpRbzJ3T25BTHpUL1E5cmFLbWtKRzZGL0JWSWs3eTB4T3UwWXJJVnhFN0x0?= =?utf-8?B?Z2xCV01ONlY1bUJoVjhXNnArR09yY3JucEtEeWduZTFRMFpWemRVeU44M2d1?= =?utf-8?B?Q0luSHh4Z2JoOVNvQW5pSzQwVWtNT2lMZktWT2FLUm9CNlFPaU4yT1RLVDRu?= =?utf-8?B?UUlSTlJ4bzJic1NaOHgwQlY2bTk3L2hJTDFWbXFwSmxDSktvbVZvelNFckc0?= =?utf-8?B?ZHJ6YUpQcTcvakVGdnJvWmVTVjBUWEdPcUhDUXhwRllRY0lRVFBzL3RhTzR5?= =?utf-8?B?VzJ1dmdWN2hlKy9kemtXZmk3MW9EeFhvTk5mTEduQ0xQR0hid3doV3lkREFo?= =?utf-8?B?d3A0UTdqWVl5aktlMXBqWEtnNGorM3dEWHVMbVZrbjNtT3JZS0JzV0FTUzBa?= =?utf-8?B?ZFI2dHlKU3I4eDJpemRLQVZTRXd2ckUyN2NzbEFBUkkvc1RGYXpNcmt2RFJP?= =?utf-8?B?aExqeGdOdnc2VmVSYXNSV05qUGc3K1BZK3Z2N0dCMVVQZWd6TXcrb21Rd0h3?= =?utf-8?B?UW9xdFRUTmRxMUNsMXVObUgwNDlwZDBlenE1dmRaMHNUUTRHTDhmZFBwQ3Fw?= =?utf-8?B?ZWZ6anRjYlF3VTc5bTY1amxTK2Ivc1R5V3hpbHQwdnJYK0FmNjJxSWVPNDhm?= =?utf-8?B?eEhqTnF1c085QlN4N0pGN3k1dHJBTCtvZElVODNUSm96cEYwOE9oVmN2ZFNI?= =?utf-8?B?SGNBYzRiREkxV25vSFVUZWZPekxqWEtLVkNVMkZtdkwrREkvWFF5bzhaZEpn?= =?utf-8?B?SXR3UnlhdXlvY1I2UjE4ZVA5WlRieitLOE8ycTNEZmlpOVlQUU14RTlZcWVB?= =?utf-8?B?Z3V1V2h6ZHpCbEJuZlU5Qk95bWFFeGV0UFd6VXNvMGM2NXVYZnJXQzA0Q2Uw?= =?utf-8?B?ckJKNzlkSUN6ekNENkpYclRVR3FwajV2NkQvaXpRNEg1SS9KVzBYZHRhbUtW?= =?utf-8?B?Rk1yZGxZMnNZRHR0ekh5akFpNHVNaHFoOTJIeUxIbFZ4MENOSlV5dStrQUc5?= =?utf-8?B?cmIrQ01FOVpENHFXTEFzZEZnS3hNU1RRSVhFVjhHNFlvM3hRS0RlN21iS0N0?= =?utf-8?B?K1Q4QnYzZFJ0RE5MMWI5eWpVT0hZSURBTkhONU9MRlZiQVhQd3lsYXdpRkR6?= =?utf-8?B?cEVUNUVmTnFpTXR2NWRsWHN2TXVFblNoVUNUWmJrblNHcVpvcVRpU3ZXNjBH?= =?utf-8?B?OFpyQTVjUDliRDlrdzJ2Zjc5QmIxVG1Ta0Y1aHc5cEtxV3NDY256T0VBWkpa?= =?utf-8?B?cFd2UGxIcDNzTHVYRklDL3VXQWdrNWMzTEhhaGJYdVZQdzZTaW1RWkZzU1M5?= =?utf-8?B?N3VoMm90cWNqbnBXWFhOWjBnMjFER3FoTXhzRzJVYklUR2ZLN1NVWXMyUDVn?= =?utf-8?B?cWRBZHoxSElDZ3dkY1VmbFZ0aTh3Nms1Z0gzc1kyaFZMeDFqY0t2MWRQU3Fs?= =?utf-8?B?TFdqd0tnRVI2aktQc2RrdzlPU2hHcWVDY3BZQ3JjcWc4UFdHMGFUQjU1SUov?= =?utf-8?B?ZG1OUnZRT2R1ZnpQWEg1UXJsanZhWUZ2ajBqM3R5Q01nQjBIcGxXQmtHUkJD?= =?utf-8?B?R2FRajg2L3B0dGRIMDlua0FzbkFNZ0FQc3pwNVZoOTZleUMwcktDUnlyRTRh?= =?utf-8?Q?XOXKjP+ZnQcpWvf1nz9lKJuWN2eq69UZ?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GV1PR03MB10456.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?VEJuQ1JFQjBBczRjZHVyVmVna25yWGVvTUJBM2VMR1hGcjdPRVROaStGVUEy?= =?utf-8?B?NExYRlNEbU9LVEVVZHE2dXZKdmVqTTBTbEhaMlV4NGpwSWZtcmtVQUdxMWxO?= =?utf-8?B?aTVrc2RtU013ck9iTkk2K2k4QWozVjkyWHdKdC9vYS95ZHdQTWg4RnhURzdW?= =?utf-8?B?VzNmZEJZclpGOFdjc2xMR3NsQk5HQ3hSdlMzeVEzZ3l1NkhwVkpNczJDaWFw?= =?utf-8?B?bit4YTVtWmZab1BHbTRwZ2hkU2xEa3dCRElkRVBhS214Vkd6YWh1aUNGUjh6?= =?utf-8?B?b2pSLzZ5RFJJUzg0b250Rk5wMFZYQmV0dWoyNE85RHRqYzJjSGV3U2ZFQmlL?= =?utf-8?B?V3UyVk5rYkNVYUhYRDdEUDR3bGVDb05EdmRJZnpmUWt5UEJhRWlCeUpCVjRT?= =?utf-8?B?TjlyOUxSRlp1L3pDeTBERC9HcDNvbTU2bXpoTWVjUHpVWlVkN3ZmaFY0SnRN?= =?utf-8?B?QUF2L3A2UXpyOHVCWmFURy9vMVFuSGpGWktObzdBbmVBZmFlYm4wZkJJbmMz?= =?utf-8?B?dXNMZU91Vjd1WXR5RWlzQm12SGdQM3U0WENRUUpITnkvemVaWjZtTFlHUjJ6?= =?utf-8?B?bHJTaDQ2MWxTSTFid1VzcG9pVVNOenZla0ZkSlkxZXhxMTFEZG1SQmRRc0VN?= =?utf-8?B?UURnYmJPQWlaYzUwYm95SnNEeDZJUUM5cjhnWTRBakMxL0JITXY3QWJMY1RL?= =?utf-8?B?eHUzOGN1R3ZRZUZmZ1NFcGYwL29MUDZlR3Q3dFExS29Xa2UrT0tMVDJ5VmNq?= =?utf-8?B?UjVOQk1Pd0tnVlZCVkVlUEgrdlBFTkJ0YmtkS0taekdxL1RQY3RaR09yLzlQ?= =?utf-8?B?djhMS0YzU05ielBSMmtQVGIxSFFLejAwMzlxaGNWZ0tqMjIyZGgvdVc1c2Ru?= =?utf-8?B?d3NlUmRUNGdoZFhlS01DR2FRNU1WWHp2cVhSSGNMYXNFdDJ6VzBqVGZVRjE5?= =?utf-8?B?NEhWNWpXUGdNRUNtbWN6WElOTVZBWTkvT25UbmJFV0UvSmFTcFpHL01EdG5K?= =?utf-8?B?bDFrcE5GKzRVSlYvc2tNektJNzZYUHpBZVJqaElsU0RZaWNPRVNxUnhWS0dT?= =?utf-8?B?azZLVm5MSE01blJEQmo3aERNMzArTUwra2ptVC9FOW1LNzJDOXhHcUIrdVho?= =?utf-8?B?S0tjaDlsRWhJUmRkdWpqelVHY2lEMWhMRlc2ZWM1UFVpcS8rVzVKZDljOGsx?= =?utf-8?B?d0h5S3R4WlFMSHExTWNrdnJLTVQ2aUp3ZW5NbXdSc2pFVkRoMW1hOGhwL004?= =?utf-8?B?RTAwTHJrK0tQc2tIZDhmZ2lYQkxocWgydGg1S003Y0JkcWh3YzhnQVFRdExZ?= =?utf-8?B?L3kvNHhaQUk0UmVxdDI5QVVQMWVRRHdnWFAzeE5VK2pyL1h5MTVGRVM2YXQ5?= =?utf-8?B?WkNlRWNrSUdZODFFbjlTN1g0RzJkY2RjVUJlL1ZsUkFXMUpvMmxOZWxtemRj?= =?utf-8?B?eWJnTG0rV2daZ1ZMQ0MreFRXVFoyU3hKcmYrTUg1VUg0dHB0TTA3bDlsK0Yx?= =?utf-8?B?alI0TjZrNVR1ZDZQYWRlem54cWcvOHdXVGlTeUZIUGFDRnZoMVE2TUNaSXc5?= =?utf-8?B?TTBSbERmNitLS0d0K2g5YTRVUkcvN0Ercnc4bk9wY1Z5dm0xOVJxODlIZnJo?= =?utf-8?B?SmJBNDZtdGFCbWV0V25wWGVpeWNXUGFuNllsTzdNT2xyelZIUHZtU2FqZnlu?= =?utf-8?B?WmI2ZG1BaXh1RGRoT0V0b0JWRm9EdnVrUkNzWUlsdjBnckljN3BNM1BLVkNL?= =?utf-8?B?NjBZTFFHMmNKSzQ0TEIrMVRwWW1sNmZ2cDVuSjZObE85cVp3MUlRN3Zzd2tn?= =?utf-8?B?RzFVbnNqelE1UkZRekpiYkpDZlFDd2Zydk5qKzJjWDFrbmpKQkk1T0ZTN3I5?= =?utf-8?B?UjVaOWxFRnFQNHdQanNBazJxaHJtK0Zxd1hvY3kwMDAvak5TMUsxYnRpdndS?= =?utf-8?B?cFFYNVlWa053bk9wM0drTHFqK1B4ZlJRbjNySHBhUFdlOWE3QjNNVTZ4Z0FY?= =?utf-8?B?Qm1zbjNoa1Q0ejlPL3BOYlFkdVljVks0alg4TlRVUzNDNHhhdTJwUG41eWlC?= =?utf-8?B?ZWRBUEE4NDEzVHp3UzRONkZWcjJOaHJsYTNKWWhLWkZNNXJmcmd0RkpBNUNh?= =?utf-8?B?VGhmVHQrTEhYRFljMDRXdDB3N3RwaUFoYXZmL3AyVDBJelpCWHBYV1RTOWdh?= =?utf-8?B?RFE9PQ==?= Content-Type: text/plain; charset="utf-8" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: GV1PR03MB10456.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 692dc48c-a424-493a-b2c3-08dd34538baf X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Jan 2025 04:25:56.3138 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: lOPPHbF1PoRrJIxzKkAceFvrnygGLR1CNJlNvqAXLOd8KCfBIYmjb6lxz3+R/K3GiE7GjPwNAG1E5myl+8p0GmEEiLBF5KAO1QK7t7d81xE= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR03MB6300 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1736828791299019000 Both GCC and Clang support -fstack-protector feature, which add stack canaries to functions where stack corruption is possible. This patch makes general preparations to enable this feature on different supported architectures: - Added CONFIG_HAS_STACK_PROTECTOR option so each architecture can enable this feature individually - Added user-selectable CONFIG_STACK_PROTECTOR option - Implemented code that sets up random stack canary and a basic handler for stack protector failures Stack guard value is initialized in two phases: 1. Pre-defined randomly-selected value. 2. Own implementation linear congruent random number generator. It relies on get_cycles() being available very early. If get_cycles() returns zero, it would leave pre-defined value from the previous step. Signed-off-by: Volodymyr Babchuk Reviewed-by: Andrew Cooper --- Changes in v4: - Removed third phase of initialization (it was using Xen's RNG) - remove stack-protector.h because it is not required anymore - Reworded comments - __stack_chk_fail() now dumps execution state before calling panic() - "Compiler option" Kconfig entry renamed to "Other hardening" Changes in v3: - Fixed coding style in stack-protector.h - Extended panic() message - Included missed random.h - Renamed Kconfig option - Used Andrew's suggestion for the Kconfig help text - Added "asmlinkage" attribute to __stack_chk_fail() to make Eclair happy - Initial stack guard value is random - Added LCG to generate stack guard value at early boot stages - Added comment to asm-generic/random.h about dependencies - Extended the commit message Changes in v2: - Moved changes to EMBEDDED_EXTRA_CFLAGS into separate patch - Renamed stack_protector.c to stack-protector.c - Renamed stack_protector.h to stack-protector.h - Removed #ifdef CONFIG_X86 in stack-protector.h - Updated comment in stack-protector.h (also, we can't call boot_stack_chk_guard_setup() from asm code in general case, because it calls get_random() and get_random() may depend in per_cpu infrastructure, which is initialized later) - Fixed coding style - Moved CONFIG_STACK_PROTECTOR into newly added "Compiler options" submenu - Marked __stack_chk_guard as __ro_after_init --- xen/Makefile | 4 +++ xen/common/Kconfig | 15 +++++++++++ xen/common/Makefile | 1 + xen/common/stack-protector.c | 51 ++++++++++++++++++++++++++++++++++++ 4 files changed, 71 insertions(+) create mode 100644 xen/common/stack-protector.c diff --git a/xen/Makefile b/xen/Makefile index a0c774ab7d..48bc17c418 100644 --- a/xen/Makefile +++ b/xen/Makefile @@ -435,7 +435,11 @@ else CFLAGS_UBSAN :=3D endif =20 +ifeq ($(CONFIG_STACK_PROTECTOR),y) +CFLAGS +=3D -fstack-protector +else CFLAGS +=3D -fno-stack-protector +endif =20 ifeq ($(CONFIG_LTO),y) CFLAGS +=3D -flto diff --git a/xen/common/Kconfig b/xen/common/Kconfig index 6166327f4d..bd53dae43c 100644 --- a/xen/common/Kconfig +++ b/xen/common/Kconfig @@ -83,6 +83,9 @@ config HAS_PMAP config HAS_SCHED_GRANULARITY bool =20 +config HAS_STACK_PROTECTOR + bool + config HAS_UBSAN bool =20 @@ -216,6 +219,18 @@ config SPECULATIVE_HARDEN_LOCK =20 endmenu =20 +menu "Other hardening" + +config STACK_PROTECTOR + bool "Stack protector" + depends on HAS_STACK_PROTECTOR + help + Enable the Stack Protector compiler hardening option. This inserts a + canary value in the stack frame of functions, and performs an integrity + check on function exit. + +endmenu + config DIT_DEFAULT bool "Data Independent Timing default" depends on HAS_DIT diff --git a/xen/common/Makefile b/xen/common/Makefile index cba3b32733..8adbf6a3b5 100644 --- a/xen/common/Makefile +++ b/xen/common/Makefile @@ -46,6 +46,7 @@ obj-y +=3D shutdown.o obj-y +=3D softirq.o obj-y +=3D smp.o obj-y +=3D spinlock.o +obj-$(CONFIG_STACK_PROTECTOR) +=3D stack-protector.o obj-y +=3D stop_machine.o obj-y +=3D symbols.o obj-y +=3D tasklet.o diff --git a/xen/common/stack-protector.c b/xen/common/stack-protector.c new file mode 100644 index 0000000000..8fa9f6147f --- /dev/null +++ b/xen/common/stack-protector.c @@ -0,0 +1,51 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +#include +#include +#include +#include + +/* + * Initial value is chosen by a fair dice roll. + * It will be updated during boot process. + */ +#if BITS_PER_LONG =3D=3D 32 +unsigned long __ro_after_init __stack_chk_guard =3D 0xdd2cc927UL; +#else +unsigned long __ro_after_init __stack_chk_guard =3D 0x2d853605a4d9a09cUL; +#endif + +/* + * This function should be called from early asm or from a C function + * that escapes stack canary tracking (by calling + * reset_stack_and_jump() for example). + */ +void __init asmlinkage boot_stack_chk_guard_setup(void) +{ + /* + * Linear congruent generator (X_n+1 =3D X_n * a + c). + * + * Constant is taken from "Tables Of Linear Congruential + * Generators Of Different Sizes And Good Lattice Structure" by + * Pierre L=E2=80=99Ecuyer. + */ +#if BITS_PER_LONG =3D=3D 32 + const unsigned long a =3D 2891336453UL; +#else + const unsigned long a =3D 2862933555777941757UL; +#endif + const unsigned long c =3D 1; + + unsigned long cycles =3D get_cycles(); + + /* Use the initial value if we can't generate random one */ + if ( !cycles ) + return; + + __stack_chk_guard =3D cycles * a + c; +} + +void asmlinkage __stack_chk_fail(void) +{ + dump_execution_state(); + panic("Stack Protector integrity violation identified\n"); +} --=20 2.47.1 From nobody Wed Feb 5 12:59:04 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1736828794; cv=pass; d=zohomail.com; s=zohoarc; b=ai3gnBoMmWdMkLL2FucYl+kR0pho6fhKAUv2TCxzh8YTltRX3ZoiyLNtrjqvwh4pDKYJkVUWw6QmVZdwW4iMfq/YxH7NmNKc9E7N0Jk5qGbrOfSevkZc0dyKTJ+dj5GS9Yai7gvdOHf0x3xQv3SlqQzSJAE5gSiE/CGN3gp7Akc= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1736828794; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=oOdNcIAOSgUxY9nIPcgrwfCpmXDyekAM1FEvRJo6MHM=; b=Mt5TJnVIfO1xJP4DcapnHxiHi62dZgJMvmFHAXlRhb+mkS1tgYGp0m4KUscBYhmJZQJc09ELSzBg9gbRD96eyWm/212csJH7OzcOtraV6xH/xVAA9ufsuyGG7h2P2fEFHrOP2zxCr6AO5sbHDfcdA8Dx4gbkJ2knF2JMFzrXG/k= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1736828794265153.54952847899267; Mon, 13 Jan 2025 20:26:34 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.870900.1281950 (Exim 4.92) (envelope-from ) id 1tXYVF-0007TP-BE; Tue, 14 Jan 2025 04:26:09 +0000 Received: by outflank-mailman (output) from mailman id 870900.1281950; Tue, 14 Jan 2025 04:26:09 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tXYVF-0007TI-82; Tue, 14 Jan 2025 04:26:09 +0000 Received: by outflank-mailman (input) for mailman id 870900; Tue, 14 Jan 2025 04:26:07 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tXYVD-0007T1-Qg for xen-devel@lists.xenproject.org; Tue, 14 Jan 2025 04:26:07 +0000 Received: from EUR03-AM7-obe.outbound.protection.outlook.com (mail-am7eur03on20612.outbound.protection.outlook.com [2a01:111:f403:260e::612]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id a8db482b-d22f-11ef-99a4-01e77a169b0f; Tue, 14 Jan 2025 05:26:01 +0100 (CET) Received: from GV1PR03MB10456.eurprd03.prod.outlook.com (2603:10a6:150:16a::21) by DB8PR03MB6300.eurprd03.prod.outlook.com (2603:10a6:10:13f::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8356.12; Tue, 14 Jan 2025 04:25:58 +0000 Received: from GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e]) by GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e%3]) with mapi id 15.20.8335.015; Tue, 14 Jan 2025 04:25:58 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: a8db482b-d22f-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=twLS1QJUg53q+bKBQGsnqe7IItYwsHmxgiwkTBLCrvglecOqxHDRxvzJTDtcCUTKzfsE6jYvCb24eCHWlXj0a7e87QSZR2S36Zzf24XoBUuoCkmAeEj5pvA3BEejXxIHnXkwKMnfkrNSBwrZhX7lSfg+xm+hm8vATCnPHQdn+pKitA+9tu1HvmJEcWWTaaWAnzDHi+6jqWD71iPgonj95Ov42ib2dnxIf/bnqMiHBuqoW5AkofuNEJBtvGyaIVlN9mDbUhW8A8F9wbSoVCV5GiHrgW7wFY6my6FW1r26jBHKFY2UrvjfJ+LTWG9TcFn1Sqfht3ktu3Xou00y//kx8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=oOdNcIAOSgUxY9nIPcgrwfCpmXDyekAM1FEvRJo6MHM=; b=OZ5qxIAQY3sIPXf1sT0VPQhwQc84C5GyHdSMB7GX159pdJ08RAgkZC1U5n9tulYujHOO3QXVC6jnS8xsCT2RGIIALsk+Qj5eET3snS8XpfEI3Vyp4zN1qt/HlzJguuKmeyyDhuXNhfB44v/iJAgg5Y84bgdpawKDYLBOqsSZypqUZCTJXNW4dvjKDNzUBstrqsaS9bHNNPZSOUFjCNVhdrxfL9F6kj+UfR4wSE4uw8U5stVlhhtMZexOdggcFg1cKjeiLrSWnFuux26/bjHLhxriMgkD2axk0VT2CH+OnqTgPk5OevflMyO3oJIRSMY0OuZadT42j5zlQ/TL7Jvr5w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=oOdNcIAOSgUxY9nIPcgrwfCpmXDyekAM1FEvRJo6MHM=; b=DLsg94Ut0KSS77Z7PLwsfNKYBbo5rEkAGFDsjOPLU6OSkN7aAwdLAMHibx1mmWqVeKFTF39MLcKg/If9QHXA0mQW1mmh/oaCqlXHXxcToHF/o9CKSmWVkWYZWlovFqx9Xrzh6SenT0Fwh6nL/qkBfwzNgdjAbp34EEXoL1+tTnJEZ8sG/pWE2PuHKNTKyxFiloS41IjgprQYIxEui6H5wohQD7+DJ+CF97sLNrOPIFgfzJovZSlNZ6+sdClZv5WIoTSZ73y+cqYVXq+denwQLc5+ExaqzsLr7/HqV37+RxmsR65K3I/7dzxLg1lLi+TsWSVe2LLS/GHt6zQ271jOSg== From: Volodymyr Babchuk To: "xen-devel@lists.xenproject.org" CC: Volodymyr Babchuk , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk Subject: [PATCH v4 3/4] xen: arm: enable stack protector feature Thread-Topic: [PATCH v4 3/4] xen: arm: enable stack protector feature Thread-Index: AQHbZjxnrBLNCau4fk6dLN+QtVmLtA== Date: Tue, 14 Jan 2025 04:25:56 +0000 Message-ID: <20250114042553.1624831-4-volodymyr_babchuk@epam.com> References: <20250114042553.1624831-1-volodymyr_babchuk@epam.com> In-Reply-To: <20250114042553.1624831-1-volodymyr_babchuk@epam.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: git-send-email 2.47.1 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: GV1PR03MB10456:EE_|DB8PR03MB6300:EE_ x-ms-office365-filtering-correlation-id: 94f90734-a613-48c2-47cc-08dd34538bd1 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?ZD6Dg1neyJjs7BOLntiqSUddy+Viycyi58r0PQ/kvvxa9WLUCyN4kLZsei?= =?iso-8859-1?Q?P7WpSQfRoLZbq2k7QhtFo4F3ND5V7D41BjdhX9mPZoYf7ssNto0vGYsS5q?= =?iso-8859-1?Q?VDDkHTu5hmuACIS3x9UIjlQNiQNGP2TTIuFbODnJvZKU1mDZzJlzRjHCI3?= =?iso-8859-1?Q?+hUW/RF4l+2QItbU2DIkrCyBjSPOD5SH47DDuTr/kDyBw38eAwz3w+AYR0?= =?iso-8859-1?Q?QCGBEDFqIZH+E8Uy8XsGJ1E4NGUczKKURlKPO98eaNlpTviXvJZIwM9gBO?= =?iso-8859-1?Q?d+nMwQuoUVHVNvXxs+wkh5kGsOi53kC+fBIy4tEIlAWGMukQ8mgBQOONCb?= =?iso-8859-1?Q?3YGYe3qfSrYh1GmvIPhIxPAmINdaYgsWtSafoXdGOW9Xyhnb6QBrYVen+Q?= =?iso-8859-1?Q?6o5kMYHjWvmkeaFZcIFyIoE3wcj6lXbh8jHdRrc741ucZ/apayyP2t5T1x?= =?iso-8859-1?Q?jtVC+UuIXgOqoS6Mb9yr/jxrWvXj2xAoDJm1QnDIoIY9pCwB4ZJb6mMQKW?= =?iso-8859-1?Q?vzhGl4AB7BICQ4P+CQXx33dj35Gl/1J4hDtL0nqkV6F/tsnhgDVfw1eSNc?= =?iso-8859-1?Q?0a5+ccnqEf46tZdqhlGULUa3GMgDNyoiklv+uBgZuZFd7QKwR0gLxUt5LN?= =?iso-8859-1?Q?LsuurMyWA9cjFsQKNPt86i1DLDWuCQuiMX+tPxc9UMGJFIUZe2nqca9r1C?= =?iso-8859-1?Q?g927Z0cWBNQQjjLpRgvGDDAZM4AEme2+V3CE9XINeOdSRyj7NjdenK7dDL?= =?iso-8859-1?Q?m9DmBzpbJT78CU1pORSR1HSdf6pJ5wUFRCtzsPcITC+OhTabJKg5PG60r/?= =?iso-8859-1?Q?oW+9TywXwliTwMZ1s7YCsuNjJbeRVlF/AcpkjZuRCCH9GC4er+2/KnNhlP?= =?iso-8859-1?Q?jDTd32fjYFIKBvjTh7wE80/wrR4KAidAomVERQKf/18HbBQsuqwM5QwyDJ?= =?iso-8859-1?Q?4kU4VgtbeidXmSUdPbCZd6ppqLWU1nX2IJmYZSlg77iXV11RO8yXIrB3RK?= =?iso-8859-1?Q?N2b1a3ogLcqQfYV0JqT4rQfwan45G16Wk5vd1hdjr5ILhjmlzbiD8QpP1M?= =?iso-8859-1?Q?r/x8A+6bUi9phUyDNU3Gv+LUhVpM6+esIB0PxAwx+hu7aP81BmmmVTymi2?= =?iso-8859-1?Q?YCeQfeJIndQbjGjV+OtNNOBP86r/wV6rIAjDJ5Mh0uFfCxcMorAWgXkHnR?= =?iso-8859-1?Q?mnoC/0FBhmQQSTkIktcrwrdTOBBr2Y5CNDTXPQldcpvGCIRRlSqoDFkirQ?= =?iso-8859-1?Q?b9wZcKP7VXtBpoJAZKby4QJTXMe5kHYdoVI09T68bozTkFul34MYqNWpgT?= =?iso-8859-1?Q?rgf7ydOOlgK8npaVRQC2qaHLxmWNxAcWTgAmYTiys+0JMFi9FUnmmVd6Xi?= =?iso-8859-1?Q?AnUKqBrKalLILZL2V5b++ruciA4TKrf6Dxf/z9S21c5JEyL5ObMuSe1/4R?= =?iso-8859-1?Q?ESpkhFSMq5fqS8ZN1Zu+hgL+OEihXG/yPvb5t3KIZfRG9aPLR11voK/+r+?= =?iso-8859-1?Q?mEXYksY0VTWBGfGqXgfnB/?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GV1PR03MB10456.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?ibo6LQp/izy3ntUh8tLNS535CENi5aR1fdc/avEr4jxaxYH8o5yI3ux2Z/?= =?iso-8859-1?Q?VO8IzaS6drbmhLYu8C9qsfPa/9AfTw8NA6W6NFbnNwfLRjqq8poA7jXjaj?= =?iso-8859-1?Q?x27b5UbG3AXaTjSHcybnIaG162H93/6TLMKB3q1kPNFLkj96TguqY1o6/R?= =?iso-8859-1?Q?bGUczuGmYqBfc9Evry1qbeBqz2fMfwlk14tsoZHzatdhkalpsrcyiXzyQd?= =?iso-8859-1?Q?uveXPE5lwNOUNgp8BfsujTifbNina1qXJqpSWXlQ8097n4mTw5hCulPog8?= =?iso-8859-1?Q?AB7NbxNbAj3BQUKfQs5ALzn/zmR6VHLsyJQ//xzTkSUkM3MY0YXkSj6900?= =?iso-8859-1?Q?ILp0owsd7F3yHcH/xqYPvNf/4Ap8gXRdaYqMzC9zRMVLu15K686C/FzAcP?= =?iso-8859-1?Q?jRsn9QIt7lV6JKw2tXFiWIU8AaTm5lzEfJ9ARq0LHCX1yHqo83gtZpqkht?= =?iso-8859-1?Q?hyMmrxsUEL86QrhK27losWsF3AiEfPXAQ8uCW4aABgDp3e0nBuknn6Fxsv?= =?iso-8859-1?Q?bGIh5PoQkPK93z0mdmFa/+M3uI3/alISKT68vuZ2sAcwxQ+A7pH0tAyIKv?= =?iso-8859-1?Q?em+yfKIEadvxnTd7Up5IyOmYTOBZPv228zi94tn34ZJ9n5sWysuV5rsnx/?= =?iso-8859-1?Q?Ql95SEEI6MQMst81NbFpwN4khrVii2cHLd8FlQqs3kJ7oQQefB/ZJBFMDp?= =?iso-8859-1?Q?a1e99VIfYJ12yZol5mTVDL4Ex4xE+hAPkcuUlCFsRYtj5JavYl4D1N2k7F?= =?iso-8859-1?Q?60qO6pc1RfrBZnTWpPl+KLJfr3FYXz6YZteYEEx1lKMJpmSnkLKaQAdwA+?= =?iso-8859-1?Q?ugMyO5J1j3Z+N4PwZ7DDAbumS747Xmkolivs+HwGGY9GL7UHlQL66SjG5S?= =?iso-8859-1?Q?Us3lnNh5IxCf7iv6JY6XwUwtACYmB6Tkg6JeNArxzAYRecb6qvsOC4cd98?= =?iso-8859-1?Q?flW935k977e3k8gisYLeTgYhBhaJoMxi16nPukiIDju1lEvw5QdqZEbUYc?= =?iso-8859-1?Q?kelGKO8LczWllS60/AYHCMdzNuIziTwoMLa5fE8jZ+N4gt3Y/l6e3HD9TC?= =?iso-8859-1?Q?Wm0Wx0/zpr1qteLLDI+u5XxK8APr+YFvxvMiUGUw6hRMitZhpppTFym07P?= =?iso-8859-1?Q?7YPoaP7Dbfu9HFmUYLQdGuDucSnG73V7bpqKu6ezKxmheuxB/MGXwRNooY?= =?iso-8859-1?Q?yzxNrPFvAUrghkXpx1xH+xRwhDFkikEgkC7k50wHv9U9TiSpRw+rjf5TBC?= =?iso-8859-1?Q?DFf1UgvmszPrIKODCJYecTuITygTt2KmNcVZ3h1CsrkqhAejxiXNjPHQYc?= =?iso-8859-1?Q?CKeQlqRyaoTEjqgxNJCVOlYBHUtPGrbHE1tjrXoOX2OfUkUsHWzN4i7jb2?= =?iso-8859-1?Q?OE3OZe664CBsQB1bVYnJ1Fp3ohRD3P/Dy4ojWG/3rq+N5/QonFY8DBVx9/?= =?iso-8859-1?Q?73kOGvV83yjrShZWgu4U1vk2lV8aGsdEUYCxSWWxbZxMxP+AGrAF1nbiMD?= =?iso-8859-1?Q?oA2VnyidisPgUFegG7WWVKTrTPXz/cIDBBbvep95J9dpTAegpub+nCG2/l?= =?iso-8859-1?Q?nYPu3ZuSmMMveWaEz0fNHY3JHFQdzdGzMok7He91b8Ir8tXlKUQxV1y9th?= =?iso-8859-1?Q?6DlljqgLwDtRY6o7rEd/LBHcLOoLwghh/PwBTISxXGArtpR1vA9eblIA?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: GV1PR03MB10456.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 94f90734-a613-48c2-47cc-08dd34538bd1 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Jan 2025 04:25:56.6028 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: +lGlImmpjcC2n94+sI9odtBaapSSisdurf1i8RQHmswF74d0JzvhoV5qYBqZ6vYdnTBP4Oc3/c0vzVzQOIh+ER3Sj7foiXWBqOf6AS2c6J8= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR03MB6300 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1736828795216019000 Content-Type: text/plain; charset="utf-8" Enable previously added CONFIG_STACK_PROTECTOR feature for ARM platform. We initialize stack protector very early, in head.S using boot_stack_chk_guard_setup. This ensures that all C code from the very beginning can use stack protector. Signed-off-by: Volodymyr Babchuk Reviewed-by: Andrew Cooper --- In v4: - setup.c does not call boot_stack_chk_guard_setup() anymore, because the original implementation was removed and boot_stack_chk_guard_setup_early was renamed to boot_stack_chk_guard_set= up In v3: - Call boot_stack_chk_guard_setup_early from head.S to ensure that stack is protected from early boot stages - Call boot_stack_chk_guard_setup() later, when time subsystem is sufficiently initialized to provide values for the random number generator. In v2: - Reordered Kconfig entry --- xen/arch/arm/Kconfig | 1 + xen/arch/arm/arm64/head.S | 3 +++ 2 files changed, 4 insertions(+) diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig index a26d3e1182..8f1a3c7d74 100644 --- a/xen/arch/arm/Kconfig +++ b/xen/arch/arm/Kconfig @@ -16,6 +16,7 @@ config ARM select GENERIC_UART_INIT select HAS_ALTERNATIVE if HAS_VMAP select HAS_DEVICE_TREE + select HAS_STACK_PROTECTOR select HAS_UBSAN =20 config ARCH_DEFCONFIG diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S index 72c7b24498..5cbd62af86 100644 --- a/xen/arch/arm/arm64/head.S +++ b/xen/arch/arm/arm64/head.S @@ -250,6 +250,9 @@ real_start_efi: #endif PRINT("- Boot CPU booting -\r\n") =20 +#ifdef CONFIG_STACK_PROTECTOR + bl boot_stack_chk_guard_setup +#endif bl check_cpu_mode bl cpu_init =20 --=20 2.47.1 From nobody Wed Feb 5 12:59:04 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1736828802; cv=pass; d=zohomail.com; s=zohoarc; b=Vguugc+tshU2WJDzJK1CXo1hqpMnUvHCLRJE9WDzFtSp+N2V21IevcyWPZ7rupTXajLzlobzngYaD3L8D1bzpiFy7jaZqli3uqy4S4Ra59DJ5+Dveff9Kiqa4In04V/oPMhPeSEXC/Jw2rdcIVDlIGP34oobdtZc/rI2338qtEY= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1736828802; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=Ojki7nJQGFp6MabSULR9hew/zeC1tbVTuB9R0uaCM9w=; b=ks2PUpoMrjOwWpgGGRLf5l+5aAPcTRVO14WoNnQvYJ4j+zoOFSgmdqBt+FwgyYhH83qY4FUuNqFrVTMnKLZpMdKEtpkQScRH7WVYjSKcY5Lznr4JBtmsM55zKKTv6/q7AWZKhxaFEY1hiiznmxTf9FR0h9PV1kmV5mzWX8QnObg= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1736828802022452.62856212684164; Mon, 13 Jan 2025 20:26:42 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.870904.1281989 (Exim 4.92) (envelope-from ) id 1tXYVK-0008Qz-H5; Tue, 14 Jan 2025 04:26:14 +0000 Received: by outflank-mailman (output) from mailman id 870904.1281989; Tue, 14 Jan 2025 04:26:14 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tXYVK-0008Qm-Dv; Tue, 14 Jan 2025 04:26:14 +0000 Received: by outflank-mailman (input) for mailman id 870904; Tue, 14 Jan 2025 04:26:13 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tXYVJ-0007T1-4L for xen-devel@lists.xenproject.org; Tue, 14 Jan 2025 04:26:13 +0000 Received: from EUR03-AM7-obe.outbound.protection.outlook.com (mail-am7eur03on20612.outbound.protection.outlook.com [2a01:111:f403:260e::612]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id af320c79-d22f-11ef-99a4-01e77a169b0f; Tue, 14 Jan 2025 05:26:11 +0100 (CET) Received: from GV1PR03MB10456.eurprd03.prod.outlook.com (2603:10a6:150:16a::21) by DB8PR03MB6300.eurprd03.prod.outlook.com (2603:10a6:10:13f::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8356.12; Tue, 14 Jan 2025 04:25:59 +0000 Received: from GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e]) by GV1PR03MB10456.eurprd03.prod.outlook.com ([fe80::a41e:5aa8:e298:757e%3]) with mapi id 15.20.8335.015; Tue, 14 Jan 2025 04:25:59 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: af320c79-d22f-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=TSnouGHV/umH4ucsoS7EOUXQE1nqjAB5+yWyt29EwXkyequkZJokk+ZmYXb4DZM37mH5eXQyGk0RvvOmz/N8R3Svxh4ftL7n9WoR+qDlvrHhNoOZZwT+DmjW1cA6WP2DXGBsfPB0Dz31T0p4530AxZqCEvl1X6liAMamSVsVO9tjOcaAFFOd6CRb2wFLiRwwxSAAEAJ65kyOWq9+3KdLBRYw0pTG8WmOifal58VGM+D7WjvwQdXxrgLIXCvV/ZM1GTuf7+nONq3iwLTMZwF8cz7YeRPub+MzRNWQ1SvnWk1BHDbn290/xykPAEepekNlDDrXdToqwao6HpcSz4Ydmg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Ojki7nJQGFp6MabSULR9hew/zeC1tbVTuB9R0uaCM9w=; b=T+ThCKSx37kfsG8zyPOAwJAQwl3RodYQaC834flyQHEgZclGgUTQ0lBnatKDlaewMjZLxYfhJBzZAtB/KYsiapHhjmuNMWFeyW8efr5CtotyckDWXLo/m41dReGcT3wPcZUtd0TPBDU8xoUJoz2TaY0o/TohaqtTTaQmCtNryOBlJ6SQ7SLlv55G+3KsGMpxyhIsPqj3hgrrD/l0vHDUCD3aKZDqhnxmtHbj3Z0H304Kgdgyvw3IquxKC0QKuYGs8zh2Ye3ZvcZrqGsMiRiFGT9MhgWNbWzr3mU4WXvob+YGateBGJ2YDM4GRTtWHEy+px18khLsxOAR+YaB4lqKQA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ojki7nJQGFp6MabSULR9hew/zeC1tbVTuB9R0uaCM9w=; b=o8ZV4NOSIRdWVlmo2KcY1WMFsf142wl+VabodXmTDwrdxoSP4+VRybtln+mZb3QrmqKqSz/jbd03wdUEynz9l4GPdWpT0er9WoeNV443AtpTcmdP3k9K+g77Uzmgtt1JMdG4xlhjIBBxv8hTiDTKg6tOdQsNQkylAtj0lrI1W+G0s9PjN46WpN0xnswfPBe/+KOWtEWusrUjKsavyRu2yQC6nr7Lp4xrL98Tp5JXmGiPti+74e7T0ypwbzPsdfuR/fF9QorMf4L8QW0sQjuUwX/KJA4spHnXqQ+1ZaYjDIly5HaksxMomlTxHnfLT4E6NXeKvcVxmbDEztwKdGLfqQ== From: Volodymyr Babchuk To: "xen-devel@lists.xenproject.org" CC: Volodymyr Babchuk , Oleksii Kurochko , Community Manager Subject: [PATCH v4 4/4] CHANGELOG.md: Mention stack-protector feature Thread-Topic: [PATCH v4 4/4] CHANGELOG.md: Mention stack-protector feature Thread-Index: AQHbZjxoP9pre94pwUyb17Ngp5RsMQ== Date: Tue, 14 Jan 2025 04:25:56 +0000 Message-ID: <20250114042553.1624831-5-volodymyr_babchuk@epam.com> References: <20250114042553.1624831-1-volodymyr_babchuk@epam.com> In-Reply-To: <20250114042553.1624831-1-volodymyr_babchuk@epam.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: git-send-email 2.47.1 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: GV1PR03MB10456:EE_|DB8PR03MB6300:EE_ x-ms-office365-filtering-correlation-id: b592ae4f-a3b4-4cd1-dbf1-08dd34538bf7 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?W5baY+ao0+c7SVyksNryF+SPy4f8HV+NtjpgXuA2tWsdSxnXdqtiBwR5jx?= =?iso-8859-1?Q?RnqZICm2Am5VMMv/WJbEhA/BCUBYOqd758ga1Dz13uAAQU4Ab9sHNb1pw3?= =?iso-8859-1?Q?KbHgqyMVPrPWbj91WxLeCxHMpnOrVRCEZoB5sTYXuVSGCbp1O1+QZmgXem?= =?iso-8859-1?Q?tX/bpw/LjS1kcQaWhjDmYyKwlQaWcQgZ1lCJB/aF7sqytnip3zWjBxGamV?= =?iso-8859-1?Q?IEdw7xa3MNOUFBM1SjMxGeSPcTFxZQisl7gR4szxk6UCBMzicYYWo4MF/9?= =?iso-8859-1?Q?+X1viIt/rUOVk0FPzVa9cFynCE3+HPGSTeyxza9PVQTCbynJjpSM1J9mJ3?= =?iso-8859-1?Q?YToKsw/WsQsITSMncXLL/x1cXoVy6oMt1I5NVgbQZjO+QZJ9rmdSOztWgw?= =?iso-8859-1?Q?V+G1dyPUz5jivkHr4veacHwSwt990nM+B7FOBoTNVvz+VIjg0Zf+2Trf/Y?= =?iso-8859-1?Q?GNxNVL2i2uIJBaALSOslBlgC31H/SOxWuEArUqMxBmlIZoocIMeKGUDY4k?= =?iso-8859-1?Q?Ro6HKNFZAh4EvT+D8ul6BxOJ5wguoSSZ5Wm+lqJdIVShFJHal5wJwYh/2y?= =?iso-8859-1?Q?GkyXtUm9qnb6JPXvTnAw0DMKVSoVs4rkSnOrlyDWQbmnWrdwntZmlbMSmV?= =?iso-8859-1?Q?uMyAilFrw9/UrhZ1EitVmFaxd0aGZt5AP3Hhe4TzUEjvEH8S185zz/iWvn?= =?iso-8859-1?Q?QWk/ZDnzOCjMtuNOh5dV+Z3gZ3ZLve/HBVoP9vP2oVMXg180BL75ZIUPYi?= =?iso-8859-1?Q?8iNJdbxtUC49RGyrn7zXUjo8CR1P12Gp4bmPjFKgOjgdB6aZ70m+SaTG3S?= =?iso-8859-1?Q?YoptpiDlWyzRe2uIqyc2wSzX/77wqAl/Fkt/DFmKAaFIcnev5m5fX8b2Wz?= =?iso-8859-1?Q?C7Pt/KjBW4PKuxSuz2gf2w1URtxk67pbTpMLDuTtQsttxvvo7dbaN2DKbS?= =?iso-8859-1?Q?ksOy9VfyGZ7Ve0zLGRmwcjbAsb5tqq/CtzvxmYR0c9TzPXEatmy3KuYYad?= =?iso-8859-1?Q?eUweAYlwyH2O71NHjddZ4Jjs/Gh+PEz3i3fpAFqWexr9eMaOWoKcoEdPi/?= =?iso-8859-1?Q?gEfituEewWQWCDeakPLgaMV34O6/Haxjp5m95O55DZn7WXcF8yHFKvWvu3?= =?iso-8859-1?Q?DLN2I4Bn9wQQrCdjPvFG/bCaEvWybQCG5sAx9r/x7Ex6vDhacA2oIgIVBu?= =?iso-8859-1?Q?qnFFn0X4yQRTaZ0a7A91JQMO6oJ3pkryhdBQV2Y/tmTmEcrcm0T8YOUq9R?= =?iso-8859-1?Q?qt4t2FYwI3CSwnutGdyEuegoCRtGDfUGx2krCyoAYfsj65D7inWVPKLL80?= =?iso-8859-1?Q?aAx4HJpSMY0fFZMkaW9RDI7K6n6YFagBA+pgQ0l3EruZ39v4Bf+u+c/bCO?= =?iso-8859-1?Q?8mYKnAjYuIZqbthCCZsDk1wXCPX032sI/+4zcd7+UHbBGBrzsTdbxmoqiW?= =?iso-8859-1?Q?dmSr3NIupcjMQFPn?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GV1PR03MB10456.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?mpI9arIxDVbscoZdZRiUNb7/xR2jb5cqZidTtdXJoH+B0ZanHKiQLVI39a?= =?iso-8859-1?Q?LnN5mJXFq/60gO2L8O64Fzn/I0tINifn9W0Wi3ckurp6Tul2Em86/5JtnA?= =?iso-8859-1?Q?4HkZBFid4p/Ra1krzJfWBQKDh+w+p67FXVGLehq25KvherZBGgxUCwl7zl?= =?iso-8859-1?Q?JjPCOZRi8XjdpPtbScKVhqh+NR2N87lmo5uDKzdwCDJ5dC5Qtq268yJCFB?= =?iso-8859-1?Q?XpzcK1iggP/NRbuuavhhbKV1l0whCeyWiPh6ATMolh2uATTIYIjXlt2pUf?= =?iso-8859-1?Q?/SpdiSmQYqc/6udA++TdR69+i9Pjex5HHPWHNk+XfbOwWTphzzbhS4VPub?= =?iso-8859-1?Q?zs3jvP2VSZBHa9xvigRJU7zTImOIWyHdQiU7dvztNayBhhkqNkEfp5guiz?= =?iso-8859-1?Q?k0YeFqRojdkxQ6TTnhb4oIJAYhXFjTWBE4O9UjfYrCg37WEyWCJ1VQKsAU?= =?iso-8859-1?Q?Rk6QhbmAlvrKGWoChhaHSZdUsZJTT348sP2Vgoson9xU/hNkmAV1rHuYwo?= =?iso-8859-1?Q?K0HtEO1Bpj2DJSkO1FqVrI+4cYhcK8YVa+BiUgzdC6HvD/riN2XRsstnkB?= =?iso-8859-1?Q?Y3suEIpRHtOXhhDmeAhGlT+ufCVVII6CYde7o43su+VXJ3dpVzzPDHGGdS?= =?iso-8859-1?Q?OjoDi5cNTN3us9gtX49jaVjZGFGINlwl1Z2eo2U8zbIklmHvGOT74LAmkD?= =?iso-8859-1?Q?LLAlD9XRSXIlE8wukHcaLe309eK17g2awBOWTiFRe4BqiH0mq2ALlsm3Xm?= =?iso-8859-1?Q?wZ/IhQo2sY250q3Fw9YjZ776/WyBlk+yqaItf6sFz4nqjJ1oYwSJ4v2A7h?= =?iso-8859-1?Q?3pJRs0A52Tla7hVaBIZpwTIup/DSI5Q+DlAqDxKGHKUQjuUHBMmuJlDBzM?= =?iso-8859-1?Q?fNypPjU00WOHldTDLics4FCmfmuKOV8x0ogC5zh90Q2400kJjZzpe+Ezp1?= =?iso-8859-1?Q?+AS+iPwf9bYXoF3lzOqS8duYOyNEdD/pMtSQ1t2I71SWuWznCATkRWsbqD?= =?iso-8859-1?Q?xYbTHMfYnFBiEgt8SLfPlcpmjMQSh3zaE+T8MJPLRymOvWG6iDZdN+nm1B?= =?iso-8859-1?Q?252fAzmnjehHajYfmfR61z355HzAqlNc1r8GI96hHLZ75ngosvj9dDAGhD?= =?iso-8859-1?Q?gnNLtrliFCjvsSYemN6L1scVCz4vZIOzmN2sB5M7DbB/Ye0LebMayV07ou?= =?iso-8859-1?Q?QB1+Ayy/U+ZmZoQ4uFPOoqNCKQyN6gVveof1qAK1DkjZZAOklomHiibLFQ?= =?iso-8859-1?Q?r8iVSyKW9ewUWkLRFGeZ3cny/MiwubQyvTY4ghO58Sxints4TKOSxjAJs9?= =?iso-8859-1?Q?CvLHZX4H2hdQ1B4CZdEWSjQP4/IzOLeS/CAnLhSSzGnOv5miD+SSn2XwlG?= =?iso-8859-1?Q?1eYW0O3R9mByHmmGHybfBOD4xKUJY4mZXRKrxskGSOpOd4WLfUfrW+f1lT?= =?iso-8859-1?Q?ly6iX80xipWfIk/VxpRZ56nnv1QryMyL0NiJZWRIZFDwyzJamaMBCxFzB7?= =?iso-8859-1?Q?vERaCzyWokQIy1deJ46fdR6zMBV2KfuB2vibAa9qclIXeIoPZF3oxfg3Wz?= =?iso-8859-1?Q?p9MDTx8Lx0E1msQMSbZiDEiXTCv8+JgQYC/wKBvr8VtFt9Q4C5plIO1roq?= =?iso-8859-1?Q?eKShlov15ZUPC2GIKMTK2BA5Rpv2xtf5p84WAugaqD+otYh/tEHPl3iA?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: GV1PR03MB10456.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: b592ae4f-a3b4-4cd1-dbf1-08dd34538bf7 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Jan 2025 04:25:56.9105 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: TEKMDAKVKMjmMFf1NHIGcv8ncuv8qCFJMhXIm3f8MOkXw7863yGYfXrTUsviuYpqkUZGjl6IJLBJBYna8mdhsGlf4zKAkQhn/AnjbV6XwVM= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR03MB6300 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1736828803163019000 Content-Type: text/plain; charset="utf-8" Stack protector is meant to be enabled on all architectures, but currently it is tested (and enabled) only on ARM, so mention it in ARM section. Signed-off-by: Volodymyr Babchuk Reviewed-by: Andrew Cooper --- CHANGELOG.md | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 8507e6556a..62e6c26aaf 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -22,6 +22,7 @@ The format is based on [Keep a Changelog](https://keepach= angelog.com/en/1.0.0/) - Basic handling for SCMI requests over SMC using Shared Memory, by all= owing forwarding the calls to EL3 FW if coming from hwdom. - Support for LLC (Last Level Cache) coloring. + - Ability to enable stack protector - On x86: - xl suspend/resume subcommands. =20 --=20 2.47.1