On Tue, Nov 29, 2022 at 05:48:48PM +0100, Ard Biesheuvel wrote: > We have a pair of macros on arm64 that can be used in asm code to set up > and tear down the stack frame when implementing a non-leaf function. > > We will be adding support for shadow call stack and pointer > authentication to those macros, so that the code in question is less > likely to be abused for someone's ROP/JOP enjoyment. So let's fix the > existing crypto code to use those macros where they should be used. > > Ard Biesheuvel (4): > crypto: arm64/aes-neonbs - use frame_push/pop consistently > crypto: arm64/aes-modes - use frame_push/pop macros consistently > crypto: arm64/crct10dif - use frame_push/pop macros consistently > crypto: arm64/ghash-ce - use frame_push/pop macros consistently > > arch/arm64/crypto/aes-modes.S | 34 +++++++------------- > arch/arm64/crypto/aes-neonbs-core.S | 16 ++++----- > arch/arm64/crypto/crct10dif-ce-core.S | 5 ++- > arch/arm64/crypto/ghash-ce-core.S | 8 ++--- > 4 files changed, 24 insertions(+), 39 deletions(-) > > -- > 2.35.1 All applied. Thanks. -- Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt