[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230405130841.1350565-1-hca@linux.ibm.com>
Date: Wed, 5 Apr 2023 15:08:39 +0200
From: Heiko Carstens <hca@...ux.ibm.com>
To: Kees Cook <keescook@...omium.org>,
Mark Rutland <mark.rutland@....com>,
Alexander Popov <alex.popov@...ux.com>
Cc: Vasily Gorbik <gor@...ux.ibm.com>, linux-kernel@...r.kernel.org
Subject: [PATCH 0/2] stackleak: allow to specify arch specific stackleak poison function
Factor out the code that fills the stack with the stackleak poison value in
order to allow architectures to provide a faster implementation.
Use this to provide an s390 specific implementation which can fill the
stack with the poison value much faster (factor of ~10 compared to the
current version).
Note that the s390 stackleak support is currently only available via
linux-next (as of today), and the s390 kernel tree at kernel.org[1].
Therefore, if there are no objections, I'd like to add these two patches to
the s390 tree, so they can go upstream via the next merge window together
with the s390 support.
[1] https://git.kernel.org/pub/scm/linux/kernel/git/s390/linux.git/commit/?h=features&id=b94c0ebb1ec752016a3e41bfb66bb51ea905e533
Thanks,
Heiko
Heiko Carstens (2):
stackleak: allow to specify arch specific stackleak poison function
s390/stackleak: provide fast __stackleak_poison() implementation
arch/s390/include/asm/processor.h | 35 +++++++++++++++++++++++++++++++
kernel/stackleak.c | 17 +++++++++++----
2 files changed, 48 insertions(+), 4 deletions(-)
--
2.37.2
Powered by blists - more mailing lists