[PATCH v2 0/2] arm64: harden shadow call stack pointer handling

Catalin Marinas catalin.marinas at arm.com
Fri Jan 20 08:59:36 PST 2023


On Mon, 09 Jan 2023 18:47:58 +0100, Ard Biesheuvel wrote:
> A couple of tweaks to the arm64 entry code to avoid loading the shadow
> call stack pointer in a way that could potentially be unsafe in the
> context of ROP attacks.
> 
> Changes since v1:
> - rebase onto v6.2-rc1
> 
> [...]

Applied to arm64 (for-next/scs), thanks!

[1/2] arm64: Always load shadow stack pointer directly from the task struct
      https://git.kernel.org/arm64/c/2198d07c509f
[2/2] arm64: Stash shadow stack pointer in the task struct on interrupt
      https://git.kernel.org/arm64/c/59b37fe52f49

-- 
Catalin




More information about the linux-arm-kernel mailing list