[PATCH] arm64: efi: Make runtime service wrapper more robust

Kees Cook keescook at chromium.org
Thu Dec 1 15:45:16 PST 2022


On Mon, Nov 28, 2022 at 10:49:39AM +0100, Ard Biesheuvel wrote:
> Prevent abuse of the runtime service wrapper code by avoiding restoring
> the shadow call stack pointer from the ordinary stack, or the stack
> pointer itself from a GPR. Also, given that the exception recovery
> routine is never called in an ordinary way, it doesn't need BTI landing
> pads so it can be SYM_CODE rather than SYM_FUNC.

Does this mean x18 is now being spilled to the stack? (Do we already
spill it in other places?)

-- 
Kees Cook



More information about the linux-arm-kernel mailing list