From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Google-Smtp-Source: AIpwx4/C3nDsoqjGm0R3VISSTF4dMDqfXSjeH5dgxK780T1Ee9HV6ov+IOqyJvH21L7x/28nZofk ARC-Seal: i=1; a=rsa-sha256; t=1522357231; cv=none; d=google.com; s=arc-20160816; b=C8ndhYJsbxJdrKn3zx6pMsPMcSbW3gMTlAUvBABlG56CDieBQI4tv1CG2Hsan7fT0X 9nlSb2FuncGUIATyhBhmQK+vBDAto1pkzyY/GOQxlVuVyGBw4VZpFywCPg0IaQLOO+BN PDp2yNYPmf9LvRII3kZvo8h6slWW3cwiWOkaRQEA6Km2MH1T5UNxaE+kQtta1wAzMr3U jkg/WiBP7PeCdtAsjFouqoBf/78H8ry8X1H3yxJe4Ua+R5D57RmviuwEJvAPxfhBn6p6 LIQXdsHljy5H3VP5UBSdA93BdGaANKZ4sF3aMILNgUaIo6RXx/4ZFP6WFRKURiQXs+qJ QVLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :user-agent:date:message-id:from:references:to:subject :arc-authentication-results; bh=iz8hMXihY+gRh7GwRdn5qteDsfMaTpngWDLcGhcNhaM=; b=T5+mED2IMPKrdKw3lQBDvj13JpXVbMjQDaVKanFfB2aCH94t1Gy2M6sKv/l2Zs/AxP f+vAja+EZhq/36pQBHyMdYnwwAb4vmVZxmyI3SvnpwmqjOEmYZcCWumjECJYFIsQRQ5+ zVB42f8/la/9ccDzRgdlb2bW4W26ZDP9jhJQQ7iKqbFcoqUO2ZCU0P6gUTZXTQqIvdKQ Dl2M8PMleYiaCcnW/BeT9lL6L6LSe2PW28w47a9R/VIAJSTBFdwEnGFp0aC8xVtX12sr 4gQmIviFuzEizEbjA474paSFxKv6pM24ptgsv8qcZU2MqJG35ZeC5ALcSLyedWJjRIPi tOHQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of dave.hansen@linux.intel.com designates 134.134.136.24 as permitted sender) smtp.mailfrom=dave.hansen@linux.intel.com Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of dave.hansen@linux.intel.com designates 134.134.136.24 as permitted sender) smtp.mailfrom=dave.hansen@linux.intel.com X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.48,378,1517904000"; d="scan'208";a="212453336" Subject: Re: [PATCH RFC v10 2/6] x86/entry: Add STACKLEAK erasing the kernel stack at the end of syscalls To: alex.popov@linux.com, Boris Lukashev , kernel-hardening@lists.openwall.com, Kees Cook , PaX Team , Brad Spengler , Ingo Molnar , Andy Lutomirski , Tycho Andersen , Laura Abbott , Mark Rutland , Ard Biesheuvel , Borislav Petkov , Richard Sandiford , Thomas Gleixner , "H . Peter Anvin" , Peter Zijlstra , "Dmitry V . Levin" , Emese Revfy , Jonathan Corbet , Andrey Ryabinin , "Kirill A . Shutemov" , Thomas Garnier , Andrew Morton , Alexei Starovoitov , Josef Bacik , Masami Hiramatsu , Nicholas Piggin , Al Viro , "David S . Miller" , Ding Tianhong , David Woodhouse , Josh Poimboeuf , Steven Rostedt , Dominik Brodowski , Juergen Gross , Greg Kroah-Hartman , Dan Williams , Mathias Krause , Vikas Shivappa , Kyle Huey , Dmitry Safonov , Will Deacon , Arnd Bergmann , Florian Weimer , x86@kernel.org, linux-kernel@vger.kernel.org References: <1522267032-6603-1-git-send-email-alex.popov@linux.com> <1522267032-6603-3-git-send-email-alex.popov@linux.com> <77fab6ea-0bbf-d68b-a38e-3e22d1ae6093@linux.intel.com> <16a56461-6501-7eb9-e1a4-761c9eff9386@linux.com> From: Dave Hansen Message-ID: Date: Thu, 29 Mar 2018 14:00:28 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: =?utf-8?q?1596212693741401562?= X-GMAIL-MSGID: =?utf-8?q?1596307256991982092?= X-Mailing-List: linux-kernel@vger.kernel.org List-ID: On 03/29/2018 01:56 PM, Alexander Popov wrote: > > If STACKLEAK is not banned, would you like me to introduce ERASE_KSTACK (for > cases 1 and 3) and ERASE_KSTACK_NOCLOBBER (for case 2) in > arch/x86/entry/calling.h? Yes, please. But, whatever you do, I think having each name have constant behavior is a must. Please don't have "ERASE_KSTACK" in one file clobber and another not clobber (even if one is 32-bit and the other is not).