lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <175805110604.263842.2881563818650081445.b4-ty@kernel.org>
Date: Tue, 16 Sep 2025 22:13:49 +0100
From: Will Deacon <will@...nel.org>
To: linux-trace-kernel@...r.kernel.org,
	Jeremy Linton <jeremy.linton@....com>
Cc: catalin.marinas@....com,
	kernel-team@...roid.com,
	Will Deacon <will@...nel.org>,
	linux-perf-users@...r.kernel.org,
	mhiramat@...nel.org,
	oleg@...hat.com,
	peterz@...radead.org,
	mingo@...hat.com,
	acme@...nel.org,
	namhyung@...nel.org,
	mark.rutland@....com,
	alexander.shishkin@...ux.intel.com,
	jolsa@...nel.org,
	irogers@...gle.com,
	adrian.hunter@...el.com,
	kan.liang@...ux.intel.com,
	thiago.bauermann@...aro.org,
	broonie@...nel.org,
	yury.khrustalev@....com,
	kristina.martsenko@....com,
	liaochang1@...wei.com,
	linux-arm-kernel@...ts.infradead.org,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH v7 0/7] arm64: Enable UPROBES with GCS

On Sun, 24 Aug 2025 22:34:14 -0500, Jeremy Linton wrote:
> Currently uprobes and the Arm Guarded Control Stack (GCS) feature are
> exclusive of each other. This restriction needs to be lifted in order
> to utilize GCS for generic Linux distro images where the expectation
> is that core debugging features like uprobes work.
> 
> This series adds some user accessors to read/push/pop the userspace
> shadow stack. It then utilizes those functions in the uprobe paths as
> needed to synchronize GCS with the changes in control flow at probe
> locations.
> 
> [...]

Applied to arm64 (for-next/uprobes), thanks!

[1/7] arm64: probes: Break ret out from bl/blr
      https://git.kernel.org/arm64/c/47687aa4d9c9
[2/7] arm64: uaccess: Move existing GCS accessors definitions to gcs.h
      https://git.kernel.org/arm64/c/ea920b50ac9f
[3/7] arm64: uaccess: Add additional userspace GCS accessors
      https://git.kernel.org/arm64/c/9cd2a7f1180f
[4/7] arm64: probes: Add GCS support to bl/blr/ret
      https://git.kernel.org/arm64/c/efb07ac534e2
[5/7] arm64: uprobes: Add GCS support to uretprobes
      https://git.kernel.org/arm64/c/4a601714bb24
[6/7] arm64: Kconfig: Remove GCS restrictions on UPROBES
      https://git.kernel.org/arm64/c/cc66c711e58f
[7/7] uprobes: uprobe_warn should use passed task
      https://git.kernel.org/arm64/c/ba1afc94deb8

Cheers,
-- 
Will

https://fixes.arm64.dev
https://next.arm64.dev
https://will.arm64.dev

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ