blob: ee275e9f48ab8fa3f45b4b0cbce6f3f096fe1620 [file] [log] [blame]
Ingo Molnarb2b062b2009-01-18 18:37:14 +01001#ifndef _ASM_STACKPROTECTOR_H
2#define _ASM_STACKPROTECTOR_H 1
3
Tejun Heo76397f72009-02-09 22:17:39 +09004#ifdef CONFIG_CC_STACKPROTECTOR
5
Ingo Molnarb2b062b2009-01-18 18:37:14 +01006#include <asm/tsc.h>
Brian Gerst947e76c2009-01-19 12:21:28 +09007#include <asm/processor.h>
Tejun Heo76397f72009-02-09 22:17:39 +09008#include <asm/percpu.h>
9#include <linux/random.h>
Ingo Molnarb2b062b2009-01-18 18:37:14 +010010
11/*
12 * Initialize the stackprotector canary value.
13 *
14 * NOTE: this must only be called from functions that never return,
15 * and it must always be inlined.
16 */
17static __always_inline void boot_init_stack_canary(void)
18{
19 u64 canary;
20 u64 tsc;
21
22 /*
Tejun Heoc6e50f92009-01-20 12:29:19 +090023 * Build time only check to make sure the stack_canary is at
24 * offset 40 in the pda; this is a gcc ABI requirement
25 */
Brian Gerst947e76c2009-01-19 12:21:28 +090026 BUILD_BUG_ON(offsetof(union irq_stack_union, stack_canary) != 40);
Tejun Heoc6e50f92009-01-20 12:29:19 +090027
28 /*
Ingo Molnarb2b062b2009-01-18 18:37:14 +010029 * We both use the random pool and the current TSC as a source
30 * of randomness. The TSC only matters for very early init,
31 * there it already has some randomness on most systems. Later
32 * on during the bootup the random pool has true entropy too.
33 */
34 get_random_bytes(&canary, sizeof(canary));
35 tsc = __native_read_tsc();
36 canary += tsc + (tsc << 32UL);
37
38 current->stack_canary = canary;
Brian Gerst947e76c2009-01-19 12:21:28 +090039 percpu_write(irq_stack_union.stack_canary, canary);
Ingo Molnarb2b062b2009-01-18 18:37:14 +010040}
41
Tejun Heo76397f72009-02-09 22:17:39 +090042#endif /* CC_STACKPROTECTOR */
43#endif /* _ASM_STACKPROTECTOR_H */