Received: by 2002:ac0:e350:0:0:0:0:0 with SMTP id g16csp274230imn; Fri, 29 Jul 2022 06:32:55 -0700 (PDT) X-Google-Smtp-Source: AGRyM1tgdWnDIvusr+db4Q0qyRnAv6yMPS7rOc2eIdbTttW0C6egM62ahKgeW74stQl1d6yJmsJj X-Received: by 2002:a63:8449:0:b0:41b:4a5b:c5ca with SMTP id k70-20020a638449000000b0041b4a5bc5camr3026738pgd.6.1659101575238; Fri, 29 Jul 2022 06:32:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1659101575; cv=none; d=google.com; s=arc-20160816; b=xOR5hbsdWgAg1K2ZXBBOG3eXA3EkKJ2zxegqw2FPEXxyl+N5iXYcif/iScJA7i+OU7 Ufx6oxpai491ZGyEDytiGOHob9Rk8Qy/ew2EmL22q5R5cNS9ja83C6ZaZg6uSTMpdimU WvdtLTWJCvZP20J1opFfUNSNefoc6CnEaW0DQ812mxCtOs74u1TNJHboW+/BKrlGk4U7 BbY8L2ruaipZYQvEkHu78r5btzALvTeiBnMLbgJsmC6aZUdB38KCqMXRrv27db9gylaQ kaX4fCfS0ogMdCwQbifPHc8gPruxkGxIGUW3XL+5/ghh92IEiz0WC67F4bqsbDC5EKlY disA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version:date :message-id:subject:references:in-reply-to:cc:to:from; bh=n2DA1/4c6/eZ9CR++hHlF74m2rpWrSChW0GdzUDJUf4=; b=JGdX369d297Hg5YLAuKCovNmZIz21F9pRt/y1O3p5dZCy9lhsHSbB4a1XeatonHCfn DbSvCslI7OWZdS8UbPr0VBTK7pRM+bSEJcdTfqUYHTFucQsUpb8/olU0mf+pX8ZSl4E2 16SUgqzlRUZAbFHnRMCuhcQ6hdab4BndfPq0JHECXjLMvn9Sv31UbJeG8fJRwqxh6u0+ iHCZYhMO1ivjnTx4d/OFnABlhgrE9FS3J1Zj3h/y3GHuXbYUP3boySUpQimXcaQG/pvt aT8WCvfNVnp8d5StkIh6ymFMcKIvSoCGcu8wyoFyrMi4TTmTvRuYyys9BRiRdlgB8Q3B xu5w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u1-20020a62d441000000b0052c8b7d7586si3424134pfl.45.2022.07.29.06.32.39; Fri, 29 Jul 2022 06:32:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236526AbiG2NTd (ORCPT + 99 others); Fri, 29 Jul 2022 09:19:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41256 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236492AbiG2NT3 (ORCPT ); Fri, 29 Jul 2022 09:19:29 -0400 Received: from gandalf.ozlabs.org (gandalf.ozlabs.org [150.107.74.76]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AE3D4558F6; Fri, 29 Jul 2022 06:19:26 -0700 (PDT) Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4LvSlw50l5z4x1b; Fri, 29 Jul 2022 23:19:24 +1000 (AEST) From: Michael Ellerman To: mpe@ellerman.id.au, paulus@samba.org, tglx@linutronix.de, npiggin@gmail.com, Xiu Jianfeng , christophe.leroy@csgroup.eu, mark.rutland@arm.com, benh@kernel.crashing.org Cc: linux-hardening@vger.kernel.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org In-Reply-To: <20220701082435.126596-1-xiujianfeng@huawei.com> References: <20220701082435.126596-1-xiujianfeng@huawei.com> Subject: Re: [PATCH -next v3 0/2] powerpc: add support for syscall stack randomization Message-Id: <165909979124.253830.3036774942147857937.b4-ty@ellerman.id.au> Date: Fri, 29 Jul 2022 23:03:11 +1000 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_PASS, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 1 Jul 2022 16:24:33 +0800, Xiu Jianfeng wrote: > This patchset adds support for syscall stack randomization for > powerpc, which can make harder the various stack-based attacks that > rely on deterministic stack structure. > > Changes in v3: > -add a lead-up patch to move system_call_exception() to syscall.c to > avoid disabling stack protector for all functions in interrupt.c > Changes in v2: > -move choose choose_random_kstack_offset() to the end of system_call_exception > -allow full 6 (10) bits of entropy > -disable stack-protector for interrupt.c > > [...] Applied to powerpc/next. [1/2] powerpc: Move system_call_exception() to syscall.c https://git.kernel.org/powerpc/c/1547db7d1f4481c1f3ec731f3edc724ef3026ede [2/2] powerpc: add support for syscall stack randomization https://git.kernel.org/powerpc/c/f4a0318f278d98d9492916722e85f258c2221f88 cheers