2008-02-14 15:41:09 +07:00
|
|
|
#ifndef _ASM_STACKPROTECTOR_H
|
|
|
|
#define _ASM_STACKPROTECTOR_H 1
|
|
|
|
|
2008-02-14 15:56:04 +07:00
|
|
|
#include <asm/tsc.h>
|
2009-01-19 10:21:28 +07:00
|
|
|
#include <asm/processor.h>
|
2008-02-14 15:56:04 +07:00
|
|
|
|
2008-02-14 15:42:02 +07:00
|
|
|
/*
|
|
|
|
* Initialize the stackprotector canary value.
|
|
|
|
*
|
|
|
|
* NOTE: this must only be called from functions that never return,
|
|
|
|
* and it must always be inlined.
|
|
|
|
*/
|
|
|
|
static __always_inline void boot_init_stack_canary(void)
|
|
|
|
{
|
2008-02-14 15:56:04 +07:00
|
|
|
u64 canary;
|
|
|
|
u64 tsc;
|
|
|
|
|
2008-02-14 15:42:02 +07:00
|
|
|
/*
|
2009-01-20 10:29:19 +07:00
|
|
|
* Build time only check to make sure the stack_canary is at
|
|
|
|
* offset 40 in the pda; this is a gcc ABI requirement
|
|
|
|
*/
|
2009-01-19 10:21:28 +07:00
|
|
|
BUILD_BUG_ON(offsetof(union irq_stack_union, stack_canary) != 40);
|
2009-01-20 10:29:19 +07:00
|
|
|
|
|
|
|
/*
|
2008-02-14 15:56:04 +07:00
|
|
|
* We both use the random pool and the current TSC as a source
|
|
|
|
* of randomness. The TSC only matters for very early init,
|
|
|
|
* there it already has some randomness on most systems. Later
|
|
|
|
* on during the bootup the random pool has true entropy too.
|
2008-02-14 15:42:02 +07:00
|
|
|
*/
|
2008-02-14 15:56:04 +07:00
|
|
|
get_random_bytes(&canary, sizeof(canary));
|
|
|
|
tsc = __native_read_tsc();
|
|
|
|
canary += tsc + (tsc << 32UL);
|
|
|
|
|
|
|
|
current->stack_canary = canary;
|
2009-01-19 10:21:28 +07:00
|
|
|
percpu_write(irq_stack_union.stack_canary, canary);
|
2008-02-14 15:42:02 +07:00
|
|
|
}
|
|
|
|
|
2008-02-14 15:41:09 +07:00
|
|
|
#endif
|