[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220701082435.126596-1-xiujianfeng@huawei.com>
Date: Fri, 1 Jul 2022 16:24:33 +0800
From: Xiu Jianfeng <xiujianfeng@...wei.com>
To: <mpe@...erman.id.au>, <benh@...nel.crashing.org>,
<paulus@...ba.org>, <npiggin@...il.com>,
<christophe.leroy@...roup.eu>, <tglx@...utronix.de>,
<mark.rutland@....com>
CC: <linuxppc-dev@...ts.ozlabs.org>, <linux-kernel@...r.kernel.org>,
<linux-hardening@...r.kernel.org>
Subject: [PATCH -next v3 0/2] powerpc: add support for syscall stack randomization
Hi,
This patchset adds support for syscall stack randomization for
powerpc, which can make harder the various stack-based attacks that
rely on deterministic stack structure.
Changes in v3:
-add a lead-up patch to move system_call_exception() to syscall.c to
avoid disabling stack protector for all functions in interrupt.c
Changes in v2:
-move choose choose_random_kstack_offset() to the end of system_call_exception
-allow full 6 (10) bits of entropy
-disable stack-protector for interrupt.c
Xiu Jianfeng (2):
powerpc: Move system_call_exception() to syscall.c
powerpc: add support for syscall stack randomization
arch/powerpc/Kconfig | 1 +
arch/powerpc/kernel/Makefile | 9 +-
arch/powerpc/kernel/interrupt.c | 161 ---------------------------
arch/powerpc/kernel/syscall.c | 190 ++++++++++++++++++++++++++++++++
4 files changed, 199 insertions(+), 162 deletions(-)
create mode 100644 arch/powerpc/kernel/syscall.c
--
2.17.1
Powered by blists - more mailing lists