diff options
author | Kees Cook <keescook@chromium.org> | 2017-08-16 14:05:09 -0700 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2018-01-15 12:08:05 -0800 |
commit | 9e8084d3f761413b2d58b2625bc6e332eab2bfce (patch) | |
tree | 4ce8c3d3675c3c0775c9060a57b28d56e2647ce0 /arch/arm64/Kconfig | |
parent | f7d83c1cf3c77ae45876792aee5285ae970413ac (diff) | |
download | linux-9e8084d3f761413b2d58b2625bc6e332eab2bfce.tar.gz linux-9e8084d3f761413b2d58b2625bc6e332eab2bfce.tar.bz2 linux-9e8084d3f761413b2d58b2625bc6e332eab2bfce.zip |
arm64: Implement thread_struct whitelist for hardened usercopy
While ARM64 carries FPU state in the thread structure that is saved and
restored during signal handling, it doesn't need to declare a usercopy
whitelist, since existing accessors are all either using a bounce buffer
(for which whitelisting isn't checking the slab), are statically sized
(which will bypass the hardened usercopy check), or both.
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Will Deacon <will.deacon@arm.com>
Cc: Christian Borntraeger <borntraeger@de.ibm.com>
Cc: Ingo Molnar <mingo@kernel.org>
Cc: James Morse <james.morse@arm.com>
Cc: "Peter Zijlstra (Intel)" <peterz@infradead.org>
Cc: Dave Martin <Dave.Martin@arm.com>
Cc: zijun_hu <zijun_hu@htc.com>
Cc: linux-arm-kernel@lists.infradead.org
Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'arch/arm64/Kconfig')
-rw-r--r-- | arch/arm64/Kconfig | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig index a93339f5178f..c84477e6a884 100644 --- a/arch/arm64/Kconfig +++ b/arch/arm64/Kconfig @@ -90,6 +90,7 @@ config ARM64 select HAVE_ARCH_MMAP_RND_BITS select HAVE_ARCH_MMAP_RND_COMPAT_BITS if COMPAT select HAVE_ARCH_SECCOMP_FILTER + select HAVE_ARCH_THREAD_STRUCT_WHITELIST select HAVE_ARCH_TRACEHOOK select HAVE_ARCH_TRANSPARENT_HUGEPAGE select HAVE_ARCH_VMAP_STACK |