lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20220701082435.126596-1-xiujianfeng@huawei.com> Date: Fri, 1 Jul 2022 16:24:33 +0800 From: Xiu Jianfeng <xiujianfeng@...wei.com> To: <mpe@...erman.id.au>, <benh@...nel.crashing.org>, <paulus@...ba.org>, <npiggin@...il.com>, <christophe.leroy@...roup.eu>, <tglx@...utronix.de>, <mark.rutland@....com> CC: <linuxppc-dev@...ts.ozlabs.org>, <linux-kernel@...r.kernel.org>, <linux-hardening@...r.kernel.org> Subject: [PATCH -next v3 0/2] powerpc: add support for syscall stack randomization Hi, This patchset adds support for syscall stack randomization for powerpc, which can make harder the various stack-based attacks that rely on deterministic stack structure. Changes in v3: -add a lead-up patch to move system_call_exception() to syscall.c to avoid disabling stack protector for all functions in interrupt.c Changes in v2: -move choose choose_random_kstack_offset() to the end of system_call_exception -allow full 6 (10) bits of entropy -disable stack-protector for interrupt.c Xiu Jianfeng (2): powerpc: Move system_call_exception() to syscall.c powerpc: add support for syscall stack randomization arch/powerpc/Kconfig | 1 + arch/powerpc/kernel/Makefile | 9 +- arch/powerpc/kernel/interrupt.c | 161 --------------------------- arch/powerpc/kernel/syscall.c | 190 ++++++++++++++++++++++++++++++++ 4 files changed, 199 insertions(+), 162 deletions(-) create mode 100644 arch/powerpc/kernel/syscall.c -- 2.17.1
Powered by blists - more mailing lists