• Jisheng Zhang's avatar
    riscv: enable HAVE_ARCH_STACKLEAK · b5db73fb
    Jisheng Zhang authored
    Add support for the stackleak feature. Whenever the kernel returns to user
    space the kernel stack is filled with a poison value.
    
    At the same time, disables the plugin in EFI stub code because EFI stub
    is out of scope for the protection.
    
    Tested on qemu and milkv duo:
    / # echo STACKLEAK_ERASING > /sys/kernel/debug/provoke-crash/DIRECT
    [   38.675575] lkdtm: Performing direct entry STACKLEAK_ERASING
    [   38.678448] lkdtm: stackleak stack usage:
    [   38.678448]   high offset: 288 bytes
    [   38.678448]   current:     496 bytes
    [   38.678448]   lowest:      1328 bytes
    [   38.678448]   tracked:     1328 bytes
    [   38.678448]   untracked:   448 bytes
    [   38.678448]   poisoned:    14312 bytes
    [   38.678448]   low offset:  8 bytes
    [   38.689887] lkdtm: OK: the rest of the thread stack is properly erased
    Signed-off-by: default avatarJisheng Zhang <jszhang@kernel.org>
    Reviewed-by: default avatarCharlie Jenkins <charlie@rivosinc.com>
    Link: https://lore.kernel.org/r/20240623235316.2010-1-jszhang@kernel.orgSigned-off-by: default avatarPalmer Dabbelt <palmer@rivosinc.com>
    b5db73fb
thread_info.h 3.69 KB