All of lore.kernel.org
 help / color / mirror / Atom feed
From: linux@armlinux.org.uk (Russell King - ARM Linux)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v3 0/9] ARM: spectre-v1.1 mitigations
Date: Mon, 10 Sep 2018 17:35:18 +0100	[thread overview]
Message-ID: <20180910163518.GW30658@n2100.armlinux.org.uk> (raw)
In-Reply-To: <1536576168-40096-1-git-send-email-julien.thierry@arm.com>

Hi Julien,

I think this now looks fine, please drop it into the patch system.
Thanks.

On Mon, Sep 10, 2018 at 11:42:39AM +0100, Julien Thierry wrote:
> Hi,
> 
> The series provides mitigations for spectre-v1.1. It is mostly mirroring
> what Russell did [1], but this time for writes to user provided addresses.
> 
> * Patches 1-5 replace some __put_user_error calls with __copy_to_user, this
>   both reduces the number of time address sanitizing is performed and also
>   the number of time PAN needs to be toggled.
> 
> * Patches 6-9 ensure user addresses used by __put_user* and
>   __copy_to_user functions are sanitized before being used.
> 
> Changes since v2[2]:
> - Ensure padding in vfp_sigframe is properly initialized
> - Fix incorrect copy of oabi events
> 
> Changes since v1[3]:
> - Fixed off-by-one error in uaccess_mask_range_ptr, spotted by Russell
> - Remove remaining calls to __put_user_error() and get rid of the macro
> - Reorder the patches to better reflect the spectre-v1 series
> 
> [1] http://lists.infradead.org/pipermail/linux-arm-kernel/2018-July/589869.html
> [2] https://www.spinics.net/lists/arm-kernel/msg674995.html
> [3] https://www.spinics.net/lists/arm-kernel/msg671026.html
> 
> Cheers,
> 
> Julien
> 
> 
> Julien Thierry (9):
>   ARM: signal: copy registers using __copy_to_user()
>   ARM: signal: always use __copy_to_user to save iwmmxt context
>   ARM: vfp: use __copy_to_user() when saving VFP state
>   ARM: oabi-compat: copy oabi events using __copy_to_user()
>   ARM: signal: replace __put_user_error with __put_user
>   ARM: uaccess: Prevent speculative use of the current addr_limit
>   ARM: spectre-v1.1: use put_user() for __put_user()
>   ARM: spectre-v1,v1.1: provide helpers for address sanitization
>   ARM: spectre-v1.1: harden __copy_to_user
> 
>  arch/arm/include/asm/assembler.h   | 11 ++++++
>  arch/arm/include/asm/thread_info.h |  4 +-
>  arch/arm/include/asm/uaccess.h     | 49 ++++++++++++++++++++---
>  arch/arm/kernel/signal.c           | 80 +++++++++++++++++++++-----------------
>  arch/arm/kernel/sys_oabi-compat.c  |  8 +++-
>  arch/arm/lib/copy_from_user.S      |  6 +--
>  arch/arm/lib/copy_to_user.S        |  6 ++-
>  arch/arm/lib/uaccess_with_memcpy.c |  3 +-
>  arch/arm/vfp/vfpmodule.c           | 20 ++++------
>  9 files changed, 122 insertions(+), 65 deletions(-)
> 
> --
> 1.9.1

-- 
RMK's Patch system: http://www.armlinux.org.uk/developer/patches/
FTTC broadband for 0.8mile line in suburbia: sync at 13.8Mbps down 630kbps up
According to speedtest.net: 13Mbps down 490kbps up

  parent reply	other threads:[~2018-09-10 16:35 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-09-10 10:42 [PATCH v3 0/9] ARM: spectre-v1.1 mitigations Julien Thierry
2018-09-10 10:42 ` [PATCH v3 1/9] ARM: signal: copy registers using __copy_to_user() Julien Thierry
2018-09-10 10:42 ` [PATCH v3 2/9] ARM: signal: always use __copy_to_user to save iwmmxt context Julien Thierry
2018-09-10 10:42 ` [PATCH v3 3/9] ARM: vfp: use __copy_to_user() when saving VFP state Julien Thierry
2018-09-10 10:42 ` [PATCH v3 4/9] ARM: oabi-compat: copy oabi events using __copy_to_user() Julien Thierry
2018-09-10 10:42 ` [PATCH v3 5/9] ARM: signal: replace __put_user_error with __put_user Julien Thierry
2018-09-10 10:42 ` [PATCH v3 6/9] ARM: uaccess: Prevent speculative use of the current addr_limit Julien Thierry
2018-09-10 10:42 ` [PATCH v3 7/9] ARM: spectre-v1.1: use put_user() for __put_user() Julien Thierry
2018-09-10 10:42 ` [PATCH v3 8/9] ARM: spectre-v1, v1.1: provide helpers for address sanitization Julien Thierry
2018-09-10 10:42 ` [PATCH v3 9/9] ARM: spectre-v1.1: harden __copy_to_user Julien Thierry
2018-09-10 16:35 ` Russell King - ARM Linux [this message]
2018-09-11  9:18   ` [PATCH v3 0/9] ARM: spectre-v1.1 mitigations Julien Thierry

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180910163518.GW30658@n2100.armlinux.org.uk \
    --to=linux@armlinux.org.uk \
    --cc=linux-arm-kernel@lists.infradead.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.