Re: + arm64-entry-use-stackleak_erase_on_task_stack.patch added to -mm tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

I don't think these should be applied to -mm. They would normally go via
my hardening tree (with other gcc plugins), but also Mark is going to be
spinning a v2...

-Kees

On Tue, Apr 26, 2022 at 01:51:41PM -0700, Andrew Morton wrote:
> 
> The patch titled
>      Subject: arm64: entry: use stackleak_erase_on_task_stack()
> has been added to the -mm tree.  Its filename is
>      arm64-entry-use-stackleak_erase_on_task_stack.patch
> 
> This patch should soon appear at
>     https://ozlabs.org/~akpm/mmots/broken-out/arm64-entry-use-stackleak_erase_on_task_stack.patch
> and later at
>     https://ozlabs.org/~akpm/mmotm/broken-out/arm64-entry-use-stackleak_erase_on_task_stack.patch
> 
> Before you just go and hit "reply", please:
>    a) Consider who else should be cc'ed
>    b) Prefer to cc a suitable mailing list as well
>    c) Ideally: find the original patch on the mailing list and do a
>       reply-to-all to that, adding suitable additional cc's
> 
> *** Remember to use Documentation/process/submit-checklist.rst when testing your code ***
> 
> The -mm tree is included into linux-next and is updated
> there every 3-4 working days
> 
> ------------------------------------------------------
> From: Mark Rutland <mark.rutland@xxxxxxx>
> Subject: arm64: entry: use stackleak_erase_on_task_stack()
> 
> On arm64 we always call stackleak_erase() on a task stack, and never call
> it on another stack.  We can avoid some redundant work by using
> stackleak_erase_on_task_stack(), telling the stackleak code that it's
> being called on a task stack.
> 
> Link: https://lkml.kernel.org/r/20220425115603.781311-9-mark.rutland@xxxxxxx
> Signed-off-by: Mark Rutland <mark.rutland@xxxxxxx>
> Cc: Alexander Popov <alex.popov@xxxxxxxxx>
> Cc: Andy Lutomirski <luto@xxxxxxxxxx>
> Cc: Catalin Marinas <catalin.marinas@xxxxxxx>
> Cc: Kees Cook <keescook@xxxxxxxxxxxx>
> Cc: Will Deacon <will@xxxxxxxxxx>
> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
> ---
> 
>  arch/arm64/kernel/entry.S |    2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> --- a/arch/arm64/kernel/entry.S~arm64-entry-use-stackleak_erase_on_task_stack
> +++ a/arch/arm64/kernel/entry.S
> @@ -596,7 +596,7 @@ SYM_CODE_START_LOCAL(ret_to_user)
>  	ldr	x19, [tsk, #TSK_TI_FLAGS]	// re-check for single-step
>  	enable_step_tsk x19, x2
>  #ifdef CONFIG_GCC_PLUGIN_STACKLEAK
> -	bl	stackleak_erase
> +	bl	stackleak_erase_on_task_stack
>  #endif
>  	kernel_exit 0
>  SYM_CODE_END(ret_to_user)
> _
> 
> Patches currently in -mm which might be from mark.rutland@xxxxxxx are
> 
> arm64-stackleak-fix-current_top_of_stack.patch
> stackleak-move-skip_erasing-check-earlier.patch
> stackleak-rework-stack-low-bound-handling.patch
> stackleak-clarify-variable-names.patch
> stackleak-rework-stack-high-bound-handling.patch
> stackleak-remove-redundant-check.patch
> stackleak-add-on-off-stack-variants.patch
> arm64-entry-use-stackleak_erase_on_task_stack.patch
> 

-- 
Kees Cook



[Index of Archives]     [Kernel Archive]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]

  Powered by Linux