lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <165909979124.253830.3036774942147857937.b4-ty@ellerman.id.au> Date: Fri, 29 Jul 2022 23:03:11 +1000 From: Michael Ellerman <patch-notifications@...erman.id.au> To: mpe@...erman.id.au, paulus@...ba.org, tglx@...utronix.de, npiggin@...il.com, Xiu Jianfeng <xiujianfeng@...wei.com>, christophe.leroy@...roup.eu, mark.rutland@....com, benh@...nel.crashing.org Cc: linux-hardening@...r.kernel.org, linux-kernel@...r.kernel.org, linuxppc-dev@...ts.ozlabs.org Subject: Re: [PATCH -next v3 0/2] powerpc: add support for syscall stack randomization On Fri, 1 Jul 2022 16:24:33 +0800, Xiu Jianfeng wrote: > This patchset adds support for syscall stack randomization for > powerpc, which can make harder the various stack-based attacks that > rely on deterministic stack structure. > > Changes in v3: > -add a lead-up patch to move system_call_exception() to syscall.c to > avoid disabling stack protector for all functions in interrupt.c > Changes in v2: > -move choose choose_random_kstack_offset() to the end of system_call_exception > -allow full 6 (10) bits of entropy > -disable stack-protector for interrupt.c > > [...] Applied to powerpc/next. [1/2] powerpc: Move system_call_exception() to syscall.c https://git.kernel.org/powerpc/c/1547db7d1f4481c1f3ec731f3edc724ef3026ede [2/2] powerpc: add support for syscall stack randomization https://git.kernel.org/powerpc/c/f4a0318f278d98d9492916722e85f258c2221f88 cheers
Powered by blists - more mailing lists