Skip to content

Commit 1723d39

Browse files
mrutland-armkees
authored andcommitted
stackleak: clarify variable names
The logic within __stackleak_erase() can be a little hard to follow, as `boundary` switches from being the low bound to the high bound mid way through the function, and `kstack_ptr` is used to represent the start of the region to erase while `boundary` represents the end of the region to erase. Make this a little clearer by consistently using clearer variable names. The `boundary` variable is removed, the bounds of the region to erase are described by `erase_low` and `erase_high`, and bounds of the task stack are described by `task_stack_low` and `task_stack_high`. As the same time, remove the comment above the variables, since it is unclear whether it's intended as rationale, a complaint, or a TODO, and is more confusing than helpful. There should be no functional change as a result of this patch. Signed-off-by: Mark Rutland <mark.rutland@arm.com> Cc: Alexander Popov <alex.popov@linux.com> Cc: Andrew Morton <akpm@linux-foundation.org> Cc: Andy Lutomirski <luto@kernel.org> Cc: Kees Cook <keescook@chromium.org> Signed-off-by: Kees Cook <keescook@chromium.org> Link: https://lore.kernel.org/r/20220427173128.2603085-6-mark.rutland@arm.com
1 parent 9ec7984 commit 1723d39

1 file changed

Lines changed: 14 additions & 16 deletions

File tree

kernel/stackleak.c

Lines changed: 14 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -73,40 +73,38 @@ late_initcall(stackleak_sysctls_init);
7373
static __always_inline void __stackleak_erase(void)
7474
{
7575
const unsigned long task_stack_low = stackleak_task_low_bound(current);
76-
77-
/* It would be nice not to have 'kstack_ptr' and 'boundary' on stack */
78-
unsigned long kstack_ptr = current->lowest_stack;
79-
unsigned long boundary = task_stack_low;
76+
unsigned long erase_low = current->lowest_stack;
77+
unsigned long erase_high;
8078
unsigned int poison_count = 0;
8179
const unsigned int depth = STACKLEAK_SEARCH_DEPTH / sizeof(unsigned long);
8280

8381
/* Search for the poison value in the kernel stack */
84-
while (kstack_ptr > boundary && poison_count <= depth) {
85-
if (*(unsigned long *)kstack_ptr == STACKLEAK_POISON)
82+
while (erase_low > task_stack_low && poison_count <= depth) {
83+
if (*(unsigned long *)erase_low == STACKLEAK_POISON)
8684
poison_count++;
8785
else
8886
poison_count = 0;
8987

90-
kstack_ptr -= sizeof(unsigned long);
88+
erase_low -= sizeof(unsigned long);
9189
}
9290

9391
#ifdef CONFIG_STACKLEAK_METRICS
94-
current->prev_lowest_stack = kstack_ptr;
92+
current->prev_lowest_stack = erase_low;
9593
#endif
9694

9795
/*
98-
* Now write the poison value to the kernel stack. Start from
99-
* 'kstack_ptr' and move up till the new 'boundary'. We assume that
100-
* the stack pointer doesn't change when we write poison.
96+
* Now write the poison value to the kernel stack between 'erase_low'
97+
* and 'erase_high'. We assume that the stack pointer doesn't change
98+
* when we write poison.
10199
*/
102100
if (on_thread_stack())
103-
boundary = current_stack_pointer;
101+
erase_high = current_stack_pointer;
104102
else
105-
boundary = current_top_of_stack();
103+
erase_high = current_top_of_stack();
106104

107-
while (kstack_ptr < boundary) {
108-
*(unsigned long *)kstack_ptr = STACKLEAK_POISON;
109-
kstack_ptr += sizeof(unsigned long);
105+
while (erase_low < erase_high) {
106+
*(unsigned long *)erase_low = STACKLEAK_POISON;
107+
erase_low += sizeof(unsigned long);
110108
}
111109

112110
/* Reset the 'lowest_stack' value for the next syscall */

0 commit comments

Comments
 (0)