lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 2 Sep 2021 18:18:29 +0200
From:   Ard Biesheuvel <>
To:     Kees Cook <>
Cc:     Keith Packard <>,
        Linux Kernel Mailing List <>,
        Abbott Liu <>,
        Alexander Sverdlin <>,
        Al Viro <>,
        Andrew Morton <>,
        Anshuman Khandual <>,
        Arnd Bergmann <>,
        Bjorn Andersson <>,
        Florian Fainelli <>,
        Geert Uytterhoeven <>,
        Hartley Sweeten <>,
        Jens Axboe <>, Jian Cai <>,
        Joe Perches <>,
        Linus Walleij <>,
        Linux ARM <>,
        Maninder Singh <>,
        Manivannan Sadhasivam <>,
        Marc Zyngier <>,
        Masahiro Yamada <>,
        Mike Rapoport <>,
        Nick Desaulniers <>,
        Nick Desaulniers <>,
        Nicolas Pitre <>,
        Peter Zijlstra <>,
        Russell King <>,
        Thomas Gleixner <>,
        Uwe Kleine-K├Ânig 
        Valentin Schneider <>,
        Vaneet Narang <>,
        "Wolfram Sang (Renesas)" <>,
        YiFei Zhu <>,
        Keith Packard <>,
Subject: Re: [PATCH 0/2]: ARM: Enable THREAD_INFO_IN_TASK

On Thu, 2 Sept 2021 at 18:07, Kees Cook <> wrote:
> On Thu, Sep 02, 2021 at 08:54:26AM -0700, Keith Packard wrote:
> > Placing thread_info in the kernel stack leaves it vulnerable to stack
> > overflow attacks. This short series addresses that by using the
> > existing THREAD_INFO_IN_TASK infrastructure.
> Very cool! Thanks for working on this. If you want, you can refer to the
> KSPP bug for this too:
> (Anyone want to do MIPS?)

I take it this breaks the GCC plugin based per-task stack protector,
given that it emits code to mask the stack pointer and apply an offset
to the resulting value.

It would be nice if we could replace this with something suitable for
THREAD_INFO_IN_TASK, and if it is suitable enough, try and get the
GCC/Clang folks to adopt it as well (which was never going to happen
for the stack pointer mask/offset approach)

Where can I find these patches? I don't see them on linux-arm-kernel@

Powered by blists - more mailing lists