Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp1606136rwl; Fri, 7 Apr 2023 20:54:43 -0700 (PDT) X-Google-Smtp-Source: AKy350YD4htCCEY3hdHnHlmr7rjyhVfzHnadm1iC3MoMT7hThxPQZDBOOnXAAYebsf+9bksxmRcT X-Received: by 2002:a05:6402:348e:b0:504:7b24:7dff with SMTP id v14-20020a056402348e00b005047b247dffmr3770066edc.9.1680926083095; Fri, 07 Apr 2023 20:54:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680926083; cv=none; d=google.com; s=arc-20160816; b=E3TXP/lGWpjCUMabvr2/HMr9r960eMdQoEhSIKUD6ffMEvyA5TuIBqJk/i5uatHyAA NXHRXu7hV8zhArFEzcAC4UkoJpwF5b8dbD+Q+FCAqTrz91Z+Do7IgxPbaEPUfDTG7FdI aGgFF4vi9oeK2iRnH07007ZPVYzKQTRnnGpPJ3DiAqSYHxIiUd9gOQkdIXt6xXJSuHOI t/wiS06j79WLS2/nvnQ79cMG6YRQfAuFl/if4KbDks0CElLC1CfOnpUwSxbkr6VWmSel bMJiq47F7Panexc4ralBC1iMEz29sKk8KjhFTEzOBKQpLBeQLuR+rTANF+sxr+g9vO4d 9LkA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature:dkim-filter; bh=GDCnssCJSi5ZzpxOgDYvEE6c5OxHsAcZTC6GaGuaaYQ=; b=zbNRu/VxdpEkl2Ph/ML/1shhevYQFjyKOQ0ghr97eynkOXBmBLgJ9FZ2GO5esAuj5w VBcMQZvpZbjG7bknDon9h5/FQJjd3CPPCshBz+syED1HOdmYfxRBL4kLQcZNq8pjeqH9 MwELuSzt4HVRMmKJPzr7jryrGEKQLyGtaWij10KVfHP4fkwqdprwK8sL0FvkHmDbkek1 Dibj6sxzc+H2BrM/PtyqAUgLE24tpP3uzjGYsbWm+Y2850cXF/Ka71+u6jVqqvQsdenY 4tW5zkqPGnQE7zF1DWVW0iTT4oINsWOixXpe1JvE/ywuaxFJOeJH4UGd2OmqJMg/AP3c YixA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=CXtTBbcd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i23-20020aa7dd17000000b005048c6a2eb1si72966edv.484.2023.04.07.20.54.18; Fri, 07 Apr 2023 20:54:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=CXtTBbcd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229741AbjDHDlp (ORCPT + 99 others); Fri, 7 Apr 2023 23:41:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54442 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229484AbjDHDln (ORCPT ); Fri, 7 Apr 2023 23:41:43 -0400 Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id D82E8F4; Fri, 7 Apr 2023 20:41:42 -0700 (PDT) Received: from [192.168.254.32] (unknown [47.189.246.67]) by linux.microsoft.com (Postfix) with ESMTPSA id 221E1213B635; Fri, 7 Apr 2023 20:41:41 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 221E1213B635 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1680925302; bh=GDCnssCJSi5ZzpxOgDYvEE6c5OxHsAcZTC6GaGuaaYQ=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=CXtTBbcdVZ7cuMqkv2b0z/mNgLenvkvqfYv/FCyJJhgPx67ncX81u9QDD+j5i94bs p77doHIbx4kyN3r8SHmch0iEbMgEJe3tV8u3udHOeV5ywjjc2otw5A6TqeQot1OWXj rvj8d4IOgMUTd+j0NshfTRtzIutdikxcKbx4MMXY= Message-ID: <26149caf-af5f-01b0-1356-09dcf7c74cf0@linux.microsoft.com> Date: Fri, 7 Apr 2023 22:41:40 -0500 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.9.0 Subject: Re: [RFC PATCH v3 00/22] arm64: livepatch: Use ORC for dynamic frame pointer validation Content-Language: en-US To: Dylan Hatch , misono.tomohiro@fujitsu.com Cc: broonie@kernel.org, catalin.marinas@arm.com, chenzhongjin@huawei.com, jamorris@linux.microsoft.com, jpoimboe@redhat.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, live-patching@vger.kernel.org, mark.rutland@arm.com, nobuta.keiya@fujitsu.com, peterz@infradead.org, pmladek@suse.com, sjitindarsingh@gmail.com, will@kernel.org References: From: "Madhavan T. Venkataraman" In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-19.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,ENV_AND_HDR_SPF_MATCH,NICE_REPLY_A,RCVD_IN_DNSWL_MED, SPF_HELO_PASS,SPF_PASS,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Sorry for the delay. Someone else also pointed out the same thing. I just have not had the chance to look at this. I plan to soon. Thanks. Madhavan On 4/3/23 17:26, Dylan Hatch wrote: >> Then, I noticed that invoke_syscall generates instructions to add random offset >> in sp when RANDOMIZE_KSTACK_OFFSET=y, which is true in the above case. > > I'm also seeing this behavior when compiling with > RANDOMIZE_KSTACK_OFFSET=y. I wonder if a special hint type > could/should be added to allow for skipping the reliability check for > stack frames with this randomized offset? Forgive me if this is a > naive suggestion. > > Thanks, > Dylan