Searched hist:"1547 db7d1f4481c1f3ec731f3edc724ef3026ede" (Results 1 – 3 of 3) sorted by relevance
/linux/arch/powerpc/kernel/ |
H A D | syscall.c | 1547db7d1f4481c1f3ec731f3edc724ef3026ede Fri Jul 01 10:24:34 CEST 2022 Xiu Jianfeng <xiujianfeng@huawei.com> powerpc: Move system_call_exception() to syscall.c
This is a lead-up patch to enable syscall stack randomization, which uses alloca() and makes the compiler add unconditional stack canaries on syscall entry. In order to avoid triggering needless checks and slowing down the entry path, the feature needs to disable stack protector at the compilation unit level as there is no general way to control stack protector coverage with a function attribute.
So move system_call_exception() to syscall.c to avoid affecting other functions in interrupt.c.
Suggested-by: Michael Ellerman <mpe@ellerman.id.au> Signed-off-by: Xiu Jianfeng <xiujianfeng@huawei.com> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au> Link: https://lore.kernel.org/r/20220701082435.126596-2-xiujianfeng@huawei.com
|
H A D | interrupt.c | diff 1547db7d1f4481c1f3ec731f3edc724ef3026ede Fri Jul 01 10:24:34 CEST 2022 Xiu Jianfeng <xiujianfeng@huawei.com> powerpc: Move system_call_exception() to syscall.c
This is a lead-up patch to enable syscall stack randomization, which uses alloca() and makes the compiler add unconditional stack canaries on syscall entry. In order to avoid triggering needless checks and slowing down the entry path, the feature needs to disable stack protector at the compilation unit level as there is no general way to control stack protector coverage with a function attribute.
So move system_call_exception() to syscall.c to avoid affecting other functions in interrupt.c.
Suggested-by: Michael Ellerman <mpe@ellerman.id.au> Signed-off-by: Xiu Jianfeng <xiujianfeng@huawei.com> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au> Link: https://lore.kernel.org/r/20220701082435.126596-2-xiujianfeng@huawei.com
|
H A D | Makefile | diff 1547db7d1f4481c1f3ec731f3edc724ef3026ede Fri Jul 01 10:24:34 CEST 2022 Xiu Jianfeng <xiujianfeng@huawei.com> powerpc: Move system_call_exception() to syscall.c
This is a lead-up patch to enable syscall stack randomization, which uses alloca() and makes the compiler add unconditional stack canaries on syscall entry. In order to avoid triggering needless checks and slowing down the entry path, the feature needs to disable stack protector at the compilation unit level as there is no general way to control stack protector coverage with a function attribute.
So move system_call_exception() to syscall.c to avoid affecting other functions in interrupt.c.
Suggested-by: Michael Ellerman <mpe@ellerman.id.au> Signed-off-by: Xiu Jianfeng <xiujianfeng@huawei.com> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au> Link: https://lore.kernel.org/r/20220701082435.126596-2-xiujianfeng@huawei.com
|