]> git.karo-electronics.de Git - linux-beck.git/commitdiff
powerpc/32: Change the stack protector canary value per task
authorChristophe Leroy <christophe.leroy@c-s.fr>
Tue, 22 Nov 2016 10:49:32 +0000 (11:49 +0100)
committerMichael Ellerman <mpe@ellerman.id.au>
Wed, 23 Nov 2016 11:57:20 +0000 (22:57 +1100)
Partially copied from commit df0698be14c66 ("ARM: stack protector:
change the canary value per task")

A new random value for the canary is stored in the task struct whenever
a new task is forked.  This is meant to allow for different canary values
per task.  On powerpc, GCC expects the canary value to be found in a global
variable called __stack_chk_guard.  So this variable has to be updated
with the value stored in the task struct whenever a task switch occurs.

Because the variable GCC expects is global, this cannot work on SMP
unfortunately.  So, on SMP, the same initial canary value is kept
throughout, making this feature a bit less effective although it is still
useful.

Signed-off-by: Christophe Leroy <christophe.leroy@c-s.fr>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
arch/powerpc/kernel/asm-offsets.c
arch/powerpc/kernel/entry_32.S

index caec7bf3b99aebc22f5ed14b468e376b571cd9b6..5c860302efecd926bdc757b1c3b0a1cd55254679 100644 (file)
@@ -91,6 +91,9 @@ int main(void)
        DEFINE(TI_livepatch_sp, offsetof(struct thread_info, livepatch_sp));
 #endif
 
+#ifdef CONFIG_CC_STACKPROTECTOR
+       DEFINE(TSK_STACK_CANARY, offsetof(struct task_struct, stack_canary));
+#endif
        DEFINE(KSP, offsetof(struct thread_struct, ksp));
        DEFINE(PT_REGS, offsetof(struct thread_struct, regs));
 #ifdef CONFIG_BOOKE
index 3841d749a430069f4d4f2705c4199c08609b3757..5742dbdbee4677924ebf0019b891e43879410131 100644 (file)
@@ -674,7 +674,11 @@ BEGIN_FTR_SECTION
        mtspr   SPRN_SPEFSCR,r0         /* restore SPEFSCR reg */
 END_FTR_SECTION_IFSET(CPU_FTR_SPE)
 #endif /* CONFIG_SPE */
-
+#if defined(CONFIG_CC_STACKPROTECTOR) && !defined(CONFIG_SMP)
+       lwz     r0,TSK_STACK_CANARY(r2)
+       lis     r4,__stack_chk_guard@ha
+       stw     r0,__stack_chk_guard@l(r4)
+#endif
        lwz     r0,_CCR(r1)
        mtcrf   0xFF,r0
        /* r3-r12 are destroyed -- Cort */