Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp4137974pxb; Mon, 27 Sep 2021 10:09:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJycHQflIQ1aq8k9hMqxivrwC3SWpj7YdFnZb1xoHEfqvr/Jh+LX6MHGeFPCEiVXSWmRJwgt X-Received: by 2002:a17:902:ed42:b0:13e:2dfa:c9e4 with SMTP id y2-20020a170902ed4200b0013e2dfac9e4mr913730plb.23.1632762562231; Mon, 27 Sep 2021 10:09:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632762562; cv=none; d=google.com; s=arc-20160816; b=FmEeS61tKrjbCDnEEZBMX+/ToAdBDXCue8me3I+/PQpUXg6lh3hKvbpF2beHVUrODG ZE+pZ7yGeqGe0FzJIdyZWYzGJjqON+Ouv79xtBrjbsrRxLUdBMsDR36KwBtW9L94/YL9 tmrcrL5Z4D34+a0tcDao3bw8txpwYRGv4xv6DGt6UYAvWm3IP+VsJ4Ea4Hd6pAO2bw5N 109nTtxYOy8nQkRmAOFDXPYhQ/sbw5CtqOT4KlqC15PMtAbJtLlgKS5Ag8seUANLtHrY QdCfguU4f1A5weXft3FXCrnqdUv3u+CKecG6vdtDYS5r48rrZEHQBMj/ayo5uoYLaLhO B3+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Iqlyo1Oev2W0QXh6crqP+nbO4UBXQ+UOZlroyjGEK2M=; b=0vxwCNA3QpKf48s/cOqYydCUAmyJPzXgh3ZDoPzAl7q4UR4QVhweSNyCFZpDFk8X2b EwUKvqz6ZRxCY3mox8nRDqqSpgBrgIullHPouZSuM7hY23ubudrmxcCvAcxn1A9jaqHJ reFo0fY6j/1lWN/5BXtcqF7MEGv/7yCmWOmKn2954bMR3LvjrZMHliqx+gGw6L+/sC78 GKR2F9KAYWmStHxSEBAt3DUlN77lvz6qg5y24sJD+l1FEY51DuvY3vGhT1++Kia9l3+T daBTHMDXB4KKpP4muY1ZCoDsIDm/UjbSQ7nz+7T/n/ZXoVxvvD+CcEM5KxoxgxFjvwUA cBdA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=2O9QLwot; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id lk14si126466pjb.20.2021.09.27.10.09.09; Mon, 27 Sep 2021 10:09:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=2O9QLwot; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236407AbhI0RIl (ORCPT + 99 others); Mon, 27 Sep 2021 13:08:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:44560 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236220AbhI0RHf (ORCPT ); Mon, 27 Sep 2021 13:07:35 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 302576109F; Mon, 27 Sep 2021 17:05:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1632762357; bh=CgYa0ibwVUPKcIRAvu2TBAhiXYzbcgNSV7BAfqaSZ98=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2O9QLwotjwhBT+1qZBVW7qgv5UaCK+2tcnwuu86TRIigM7+2JEvJJkDpNlcj5n9/s mzOQVvXn7pQUr0jqAtQ8Fs0LpwWgajg0DRoy6RFoY1VlMscvtAZyARAkfKZ3FKa/Lv e41cGUIKZuKs3JeR4Pcflo3iMnHP+gZaT/Px5cxg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Li , Mark Rutland , Catalin Marinas , Sasha Levin Subject: [PATCH 5.4 60/68] arm64: Mark __stack_chk_guard as __ro_after_init Date: Mon, 27 Sep 2021 19:02:56 +0200 Message-Id: <20210927170222.049602894@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210927170219.901812470@linuxfoundation.org> References: <20210927170219.901812470@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dan Li [ Upstream commit 9fcb2e93f41c07a400885325e7dbdfceba6efaec ] __stack_chk_guard is setup once while init stage and never changed after that. Although the modification of this variable at runtime will usually cause the kernel to crash (so does the attacker), it should be marked as __ro_after_init, and it should not affect performance if it is placed in the ro_after_init section. Signed-off-by: Dan Li Acked-by: Mark Rutland Link: https://lore.kernel.org/r/1631612642-102881-1-git-send-email-ashimida@linux.alibaba.com Signed-off-by: Catalin Marinas Signed-off-by: Sasha Levin --- arch/arm64/kernel/process.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm64/kernel/process.c b/arch/arm64/kernel/process.c index 7d7cfa128b71..f61ef46ebff7 100644 --- a/arch/arm64/kernel/process.c +++ b/arch/arm64/kernel/process.c @@ -56,7 +56,7 @@ #if defined(CONFIG_STACKPROTECTOR) && !defined(CONFIG_STACKPROTECTOR_PER_TASK) #include -unsigned long __stack_chk_guard __read_mostly; +unsigned long __stack_chk_guard __ro_after_init; EXPORT_SYMBOL(__stack_chk_guard); #endif -- 2.33.0