linuxppc-dev.lists.ozlabs.org archive mirror
 help / color / mirror / Atom feed
* [PATCH -next v3 0/2] powerpc: add support for syscall stack randomization
@ 2022-07-01  8:24 Xiu Jianfeng
  2022-07-01  8:24 ` [PATCH -next v3 1/2] powerpc: Move system_call_exception() to syscall.c Xiu Jianfeng
                   ` (2 more replies)
  0 siblings, 3 replies; 5+ messages in thread
From: Xiu Jianfeng @ 2022-07-01  8:24 UTC (permalink / raw)
  To: mpe, benh, paulus, npiggin, christophe.leroy, tglx, mark.rutland
  Cc: linuxppc-dev, linux-kernel, linux-hardening

Hi,

This patchset adds support for syscall stack randomization for
powerpc, which can make harder the various stack-based attacks that
rely on deterministic stack structure.

Changes in v3:
  -add a lead-up patch to move system_call_exception() to syscall.c to
  avoid disabling stack protector for all functions in interrupt.c
Changes in v2:
  -move choose choose_random_kstack_offset() to the end of system_call_exception
  -allow full 6 (10) bits of entropy
  -disable stack-protector for interrupt.c

Xiu Jianfeng (2):
  powerpc: Move system_call_exception() to syscall.c
  powerpc: add support for syscall stack randomization

 arch/powerpc/Kconfig            |   1 +
 arch/powerpc/kernel/Makefile    |   9 +-
 arch/powerpc/kernel/interrupt.c | 161 ---------------------------
 arch/powerpc/kernel/syscall.c   | 190 ++++++++++++++++++++++++++++++++
 4 files changed, 199 insertions(+), 162 deletions(-)
 create mode 100644 arch/powerpc/kernel/syscall.c

-- 
2.17.1


^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2022-07-29 13:25 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-07-01  8:24 [PATCH -next v3 0/2] powerpc: add support for syscall stack randomization Xiu Jianfeng
2022-07-01  8:24 ` [PATCH -next v3 1/2] powerpc: Move system_call_exception() to syscall.c Xiu Jianfeng
2022-07-01  8:24 ` [PATCH -next v3 2/2] powerpc: add support for syscall stack randomization Xiu Jianfeng
2022-07-27 20:32   ` Kees Cook
2022-07-29 13:03 ` [PATCH -next v3 0/2] " Michael Ellerman

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).