llvm.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
* [PATCH v4 0/4] stackleak: Support Clang stack depth tracking
@ 2025-07-24  5:50 Kees Cook
  2025-07-24  5:50 ` [PATCH v4 1/4] arm64: Handle KCOV __init vs inline mismatches Kees Cook
                   ` (4 more replies)
  0 siblings, 5 replies; 12+ messages in thread
From: Kees Cook @ 2025-07-24  5:50 UTC (permalink / raw)
  To: Arnd Bergmann
  Cc: Kees Cook, Will Deacon, Ard Biesheuvel, Catalin Marinas,
	Jonathan Cameron, Gavin Shan, Russell King (Oracle), James Morse,
	Oza Pawandeep, Anshuman Khandual, Thomas Gleixner, Ingo Molnar,
	Borislav Petkov, Dave Hansen, H. Peter Anvin, Paolo Bonzini,
	Mike Rapoport, Vitaly Kuznetsov, Henrique de Moraes Holschuh,
	Hans de Goede, Ilpo Järvinen, Rafael J. Wysocki, Len Brown,
	Masami Hiramatsu, Michal Wilczynski, Juergen Gross,
	Andy Shevchenko, Kirill A. Shutemov, Roger Pau Monne,
	David Woodhouse, Usama Arif, Guilherme G. Piccoli, Thomas Huth,
	Brian Gerst, Marco Elver, Andrey Konovalov, Andrey Ryabinin,
	Hou Wenlong, Andrew Morton, Masahiro Yamada,
	Peter Zijlstra (Intel), Luis Chamberlain, Sami Tolvanen,
	Christophe Leroy, Nathan Chancellor, Nicolas Schier,
	Gustavo A. R. Silva, Andy Lutomirski, Baoquan He, Alexander Graf,
	Changyuan Lyu, Paul Moore, James Morris, Serge E. Hallyn,
	Nick Desaulniers, Bill Wendling, Justin Stitt, Jan Beulich,
	Boqun Feng, Viresh Kumar, Paul E. McKenney, Bibo Mao,
	linux-kernel, linux-arm-kernel, x86, kvm, ibm-acpi-devel,
	platform-driver-x86, linux-acpi, linux-trace-kernel, linux-efi,
	linux-mm, kasan-dev, linux-kbuild, linux-hardening, kexec,
	linux-security-module, llvm

 v4:
  - rebase on for-next/hardening tree (took subset of v3 patches)
  - improve commit logs for x86 and arm64 changes (Mike, Will, Ard)
 v3: https://lore.kernel.org/lkml/20250717231756.make.423-kees@kernel.org/
 v2: https://lore.kernel.org/lkml/20250523043251.it.550-kees@kernel.org/
 v1: https://lore.kernel.org/lkml/20250507180852.work.231-kees@kernel.org/

Hi,

These are the remaining changes needed to support Clang stack depth
tracking for kstack_erase (nee stackleak).

Thanks!

-Kees

Kees Cook (4):
  arm64: Handle KCOV __init vs inline mismatches
  x86: Handle KCOV __init vs inline mismatches
  init.h: Disable sanitizer coverage for __init and __head
  kstack_erase: Support Clang stack depth tracking

 security/Kconfig.hardening      | 5 ++++-
 scripts/Makefile.kstack_erase   | 6 ++++++
 arch/arm64/include/asm/acpi.h   | 2 +-
 arch/x86/include/asm/acpi.h     | 4 ++--
 arch/x86/include/asm/init.h     | 2 +-
 arch/x86/include/asm/realmode.h | 2 +-
 include/linux/acpi.h            | 4 ++--
 include/linux/bootconfig.h      | 2 +-
 include/linux/efi.h             | 2 +-
 include/linux/init.h            | 4 +++-
 include/linux/memblock.h        | 2 +-
 include/linux/smp.h             | 2 +-
 arch/x86/kernel/kvm.c           | 2 +-
 arch/x86/mm/init_64.c           | 2 +-
 kernel/kexec_handover.c         | 4 ++--
 15 files changed, 28 insertions(+), 17 deletions(-)

-- 
2.34.1


^ permalink raw reply	[flat|nested] 12+ messages in thread

end of thread, other threads:[~2025-07-29  9:35 UTC | newest]

Thread overview: 12+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-07-24  5:50 [PATCH v4 0/4] stackleak: Support Clang stack depth tracking Kees Cook
2025-07-24  5:50 ` [PATCH v4 1/4] arm64: Handle KCOV __init vs inline mismatches Kees Cook
2025-07-29  8:10   ` Will Deacon
2025-07-24  5:50 ` [PATCH v4 2/4] x86: " Kees Cook
2025-07-29  8:28   ` Mike Rapoport
2025-07-29  9:34   ` Arnd Bergmann
2025-07-24  5:50 ` [PATCH v4 3/4] init.h: Disable sanitizer coverage for __init and __head Kees Cook
2025-07-24  5:50 ` [PATCH v4 4/4] kstack_erase: Support Clang stack depth tracking Kees Cook
2025-07-24 13:08   ` Nicolas Schier
2025-07-26  0:43 ` [PATCH v4 0/4] stackleak: " Nathan Chancellor
2025-07-26  6:27   ` Kees Cook
2025-07-26 21:47   ` Kees Cook

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).