Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp900846imu; Tue, 11 Dec 2018 09:16:36 -0800 (PST) X-Google-Smtp-Source: AFSGD/XNryh8XoAkT4kpVUExLLlKppfhgGKCNSvOGEO2puaec87isjfXn0LVE/DbKRdAiFvc8/Mi X-Received: by 2002:a17:902:76cb:: with SMTP id j11mr9425909plt.179.1544548596354; Tue, 11 Dec 2018 09:16:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544548596; cv=none; d=google.com; s=arc-20160816; b=rELHlzCsAzcaaR4F/rQWb30yLFmxCMLwHId51a0sZupguf8WEh1POvR4UacSLRGw2/ 7JfZw4HvJydD6Y86bTUsGJAIkhW7H+KYbADw/1ppiN2CiqDAuzL/NUXRNF+4RF8TedCZ Xcqqr59wACjBooWZtRiqQZYbYi6YjL/GNf1O/7j0zSmb2TEqtMjzbfoJBapGNYti6RNG Sj+RoFeCxG/mjLJsAoTAnxqWN1ojC42URsilEH9U276uHrCrJQ5+DASvQahZZIqqyLiU xHeMOuT5vKVGYy+OSA+avqqDbSWYvUGlO3YBPYLWOg6dIs/qbtc0l3E3rXJhFXS4b/QR CD1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=w0D/FF1a9ekP5O/jyf9bch4ZeGTj2EJOzzT7Bf21fMM=; b=fkgTobagld7HGZB+no3f1LPR9Oadnd9WN0gKVXksDXokiEjBz3lMWDtRuvlLTLgYNA 9ET6h64QHmjvCaI4fs4eJxaDsN96YVOYPX6YXTzFIhG0l1CVJV6r+2Dg1kzBBrG+POKF Vg8ho+NwnG8EkmK2YDoXZzh8CLnjxvTjRab/zTfLCludUmqYJv+4vY+Chz7pl+Vjesga PG2aDyRYfA6pJpCWyPnN2HWrvDOagilNpOSVrrX+9PaIObXh2DhInvvtq8n3RZ8tnAIy nN1sugVWdL+LscUB9G3rsS+XflNMaMWBklML5b1AgeTWyzoA8pPNm+MlF9DbSHCyHCyF GCwQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HY+K6TgF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j20si11654644pgg.162.2018.12.11.09.16.21; Tue, 11 Dec 2018 09:16:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HY+K6TgF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728525AbeLKPwu (ORCPT + 99 others); Tue, 11 Dec 2018 10:52:50 -0500 Received: from mail.kernel.org ([198.145.29.99]:41386 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729774AbeLKPwn (ORCPT ); Tue, 11 Dec 2018 10:52:43 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1FAB02146F; Tue, 11 Dec 2018 15:52:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1544543562; bh=HuF+PECMEawAfoILl0MolxWjoey1fepCWEjhZCTC0ns=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HY+K6TgFp9LK7dD4OtF58/r4OcRKP85Y2n1TiwNVh0Ew+2m2bObf/u8Q2TtmjzVqa koKHJFBzi1BJIl9/RqbFCYKQLq3XOzuuMDn+QE9H34SaSFB7gwY81rCZhuL4MCSS3a 2UTYF4jZfaN5eU/JBOAQg6bxhjfQdxEdLk+i0Jcc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, William Cohen , Laura Abbott , Masami Hiramatsu , Kees Cook , Russell King Subject: [PATCH 4.14 46/67] ARM: 8806/1: kprobes: Fix false positive with FORTIFY_SOURCE Date: Tue, 11 Dec 2018 16:41:46 +0100 Message-Id: <20181211151632.705493291@linuxfoundation.org> X-Mailer: git-send-email 2.20.0 In-Reply-To: <20181211151630.378216233@linuxfoundation.org> References: <20181211151630.378216233@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Kees Cook commit e46daee53bb50bde38805f1823a182979724c229 upstream. The arm compiler internally interprets an inline assembly label as an unsigned long value, not a pointer. As a result, under CONFIG_FORTIFY_SOURCE, the address of a label has a size of 4 bytes, which was tripping the runtime checks. Instead, we can just cast the label (as done with the size calculations earlier). Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1639397 Reported-by: William Cohen Fixes: 6974f0c4555e ("include/linux/string.h: add the option of fortified string.h functions") Cc: stable@vger.kernel.org Acked-by: Laura Abbott Acked-by: Masami Hiramatsu Tested-by: William Cohen Signed-off-by: Kees Cook Signed-off-by: Russell King Signed-off-by: Greg Kroah-Hartman --- arch/arm/probes/kprobes/opt-arm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/arch/arm/probes/kprobes/opt-arm.c +++ b/arch/arm/probes/kprobes/opt-arm.c @@ -247,7 +247,7 @@ int arch_prepare_optimized_kprobe(struct } /* Copy arch-dep-instance from template. */ - memcpy(code, &optprobe_template_entry, + memcpy(code, (unsigned char *)optprobe_template_entry, TMPL_END_IDX * sizeof(kprobe_opcode_t)); /* Adjust buffer according to instruction. */