lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180318125342.4278-4-liuwenliang@huawei.com>
Date:   Sun, 18 Mar 2018 20:53:38 +0800
From:   Abbott Liu <liuwenliang@...wei.com>
To:     <linux@...linux.org.uk>, <aryabinin@...tuozzo.com>,
        <marc.zyngier@....com>, <kstewart@...uxfoundation.org>,
        <gregkh@...uxfoundation.org>, <f.fainelli@...il.com>,
        <liuwenliang@...wei.com>, <akpm@...ux-foundation.org>,
        <afzal.mohd.ma@...il.com>, <alexander.levin@...izon.com>
CC:     <glider@...gle.com>, <dvyukov@...gle.com>,
        <christoffer.dall@...aro.org>, <linux@...musvillemoes.dk>,
        <mawilcox@...rosoft.com>, <pombredanne@...b.com>,
        <ard.biesheuvel@...aro.org>, <vladimir.murzin@....com>,
        <nicolas.pitre@...aro.org>, <tglx@...utronix.de>,
        <thgarnie@...gle.com>, <dhowells@...hat.com>,
        <keescook@...omium.org>, <arnd@...db.de>, <geert@...ux-m68k.org>,
        <tixy@...aro.org>, <mark.rutland@....com>, <james.morse@....com>,
        <zhichao.huang@...aro.org>, <jinb.park7@...il.com>,
        <labbott@...hat.com>, <philip@....systems>,
        <grygorii.strashko@...aro.org>, <catalin.marinas@....com>,
        <opendmb@...il.com>, <kirill.shutemov@...ux.intel.com>,
        <linux-arm-kernel@...ts.infradead.org>,
        <linux-kernel@...r.kernel.org>, <kasan-dev@...glegroups.com>,
        <kvmarm@...ts.cs.columbia.edu>, <linux-mm@...ck.org>
Subject: [PATCH 3/7] Disable instrumentation for some code

From: Andrey Ryabinin <a.ryabinin@...sung.com>

Disable instrumentation for arch/arm/boot/compressed/*
and arch/arm/vdso/* because those code won't linkd with
kernel image.

Disable kasan check in the function unwind_pop_register
because it doesn't matter that kasan checks failed when
unwind_pop_register read stack memory of task.

Reviewed-by: Russell King - ARM Linux <linux@...linux.org.uk>
Reviewed-by: Florian Fainelli <f.fainelli@...il.com>
Tested-by: Florian Fainelli <f.fainelli@...il.com>
Signed-off-by: Abbott Liu <liuwenliang@...wei.com>
---
 arch/arm/boot/compressed/Makefile | 1 +
 arch/arm/kernel/unwind.c          | 3 ++-
 arch/arm/vdso/Makefile            | 2 ++
 3 files changed, 5 insertions(+), 1 deletion(-)

diff --git a/arch/arm/boot/compressed/Makefile b/arch/arm/boot/compressed/Makefile
index 45a6b9b..966103e 100644
--- a/arch/arm/boot/compressed/Makefile
+++ b/arch/arm/boot/compressed/Makefile
@@ -24,6 +24,7 @@ OBJS		+= hyp-stub.o
 endif
 
 GCOV_PROFILE		:= n
+KASAN_SANITIZE		:= n
 
 #
 # Architecture dependencies
diff --git a/arch/arm/kernel/unwind.c b/arch/arm/kernel/unwind.c
index 0bee233..2e55c7d 100644
--- a/arch/arm/kernel/unwind.c
+++ b/arch/arm/kernel/unwind.c
@@ -249,7 +249,8 @@ static int unwind_pop_register(struct unwind_ctrl_block *ctrl,
 		if (*vsp >= (unsigned long *)ctrl->sp_high)
 			return -URC_FAILURE;
 
-	ctrl->vrs[reg] = *(*vsp)++;
+	ctrl->vrs[reg] = READ_ONCE_NOCHECK(*(*vsp));
+	(*vsp)++;
 	return URC_OK;
 }
 
diff --git a/arch/arm/vdso/Makefile b/arch/arm/vdso/Makefile
index bb411821..87abbb7 100644
--- a/arch/arm/vdso/Makefile
+++ b/arch/arm/vdso/Makefile
@@ -30,6 +30,8 @@ CFLAGS_vgettimeofday.o = -O2
 # Disable gcov profiling for VDSO code
 GCOV_PROFILE := n
 
+KASAN_SANITIZE := n
+
 # Force dependency
 $(obj)/vdso.o : $(obj)/vdso.so
 
-- 
2.9.0

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ