Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp4894597iob; Mon, 9 May 2022 04:17:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw/meaYon3V4nDAJJOhQgSWpJ8qDI96HWSAjwC3+4MjQETNjkyH4+DcVpNaAFQMQi+Wj76t X-Received: by 2002:a17:90b:38c3:b0:1dc:b8c1:d428 with SMTP id nn3-20020a17090b38c300b001dcb8c1d428mr23859701pjb.55.1652095073677; Mon, 09 May 2022 04:17:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652095073; cv=none; d=google.com; s=arc-20160816; b=YWiKvkBDpmjquvqnx46Take1quswaHWy1Bf9glWGB5+55Wbl43qxu+hOYM6oEprQ3w hkL1PShKE7f0akFDtBSrnPSn2aMv3z+3w7GETe9Rl8zTt6Dc0rbnKppHtVl+l7sVEJk+ oglUXFxBduErVBPYj+vbFuRm4Sq4g1V03mmSE0DqNQUpJ/AmhCxhIu41hvF1M2MvIwA2 MQUyIgqJgVRjhBzPYGS4cJooSR15uq8yx0WoXTu10ThOG+cSJu/N9N/dAUjrUtBfcgRE KZL0dlBK9sGNVzxVVdFKbXRHUw/rGKjK7kho4GKxPDSMVi4yvpp5RL1CvVj09rlxT/ke 7WAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=tbNrxLsfVgH6piDwDDryTAV3N2W6MRy2uP+lA20/Pno=; b=wbE2poa0E+7yGPwn30+XYto44x1b8iYz471nOD1TfP60lvDhrxYmzhPKYda5aqbU0c Op4u9Q2qZ7esZu4TBkagXcKjxNc6CRcmLXmbGlP1B6E0TbY5ChpjO3zLzwA7n+nv/0dz VKnVtbEQbDZ37Cc957E3aplXQegJYPVlQsf/W4EEAA1Ka8QNOh5PA1CJKlq+lTUePMnI HfF4U4kl12rpg0s4ZIAC0tzdsyLeXEGkUWfYN0TxGnDKrUJfL19JYzKfP7zPhpRVPILF 5d6UnkHFwQUMIltvwo2b6RgqxdbUTgHJCMhwhi1J50h2KAgVXm96HXDYjcWmi0gXfovt C9mQ== ARC-Authentication-Results: i=1; mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id i185-20020a6387c2000000b003ab7a19db31si4540619pge.347.2022.05.09.04.17.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 09 May 2022 04:17:53 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id E84172A1FEC; Mon, 9 May 2022 03:28:37 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1377770AbiEDT72 (ORCPT + 99 others); Wed, 4 May 2022 15:59:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32918 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238208AbiEDT7Y (ORCPT ); Wed, 4 May 2022 15:59:24 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7A1CD282 for ; Wed, 4 May 2022 12:55:47 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 34088B828AA for ; Wed, 4 May 2022 19:55:46 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3EDC2C385AF; Wed, 4 May 2022 19:55:43 +0000 (UTC) Date: Wed, 4 May 2022 20:55:39 +0100 From: Catalin Marinas To: Kees Cook Cc: Mark Rutland , linux-arm-kernel@lists.infradead.org, akpm@linux-foundation.org, alex.popov@linux.com, linux-kernel@vger.kernel.org, luto@kernel.org, will@kernel.org Subject: Re: [PATCH v2 01/13] arm64: stackleak: fix current_top_of_stack() Message-ID: References: <20220427173128.2603085-1-mark.rutland@arm.com> <20220427173128.2603085-2-mark.rutland@arm.com> <202205041200.147A737@keescook> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <202205041200.147A737@keescook> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, May 04, 2022 at 12:01:11PM -0700, Kees Cook wrote: > On Wed, May 04, 2022 at 05:41:32PM +0100, Catalin Marinas wrote: > > On Wed, Apr 27, 2022 at 06:31:16PM +0100, Mark Rutland wrote: > > > [...] > > > Fixes: 0b3e336601b82c6a ("arm64: Add support for STACKLEAK gcc plugin") > > > Signed-off-by: Mark Rutland > > > Cc: Alexander Popov > > > Cc: Andrew Morton > > > Cc: Andy Lutomirski > > > Cc: Catalin Marinas > > > Cc: Kees Cook > > > Cc: Will Deacon > > > > I thought this was queued already but I couldn't find it in -next. So: > > > > Acked-by: Catalin Marinas > > Should this patch go via the arm64 tree for -rc6, or should I just carry > it as part of the overall stackleak series? I'll leave this up to Will (we take turns in managing the kernel releases) but it doesn't look urgent at all to me since it fixes a commit in 4.19. -- Catalin