Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
arm64: Always force a branch protection mode when the compiler has one
commit b8fdef3 upstream. Compilers with branch protection support can be configured to enable it by default, it is likely that distributions will do this as part of deploying branch protection system wide. As well as the slight overhead from having some extra NOPs for unused branch protection features this can cause more serious problems when the kernel is providing pointer authentication to userspace but not built for pointer authentication itself. In that case our switching of keys for userspace can affect the kernel unexpectedly, causing pointer authentication instructions in the kernel to corrupt addresses. To ensure that we get consistent and reliable behaviour always explicitly initialise the branch protection mode, ensuring that the kernel is built the same way regardless of the compiler defaults. [This is a reworked version of b8fdef3 ("arm64: Always force a branch protection mode when the compiler has one") for backport. Kernels prior to 74afda4 ("arm64: compile the kernel with ptrauth return address signing") don't have any Makefile machinery for forcing on pointer auth but still have issues if the compiler defaults it on so need this reworked version. -- broonie] Fixes: 7503197 (arm64: add basic pointer authentication support) Reported-by: Szabolcs Nagy <[email protected]> Signed-off-by: Mark Brown <[email protected]> Cc: [email protected] [[email protected]: remove Kconfig option in favour of Makefile check] Signed-off-by: Catalin Marinas <[email protected]> Signed-off-by: Greg Kroah-Hartman <[email protected]>
- Loading branch information