forked from mirrors/linux
		
	 2832158233
			
		
	
	
		2832158233
		
	
	
	
	
		
			
			This patch uses the existing boot_init_stack_canary arch function to initialize the ptrauth keys for the booting task in the primary core. The requirement here is that it should be always inline and the caller must never return. As pointer authentication too detects a subset of stack corruption so it makes sense to place this code here. Both pointer authentication and stack canary codes are protected by their respective config option. Suggested-by: Ard Biesheuvel <ardb@kernel.org> Signed-off-by: Amit Daniel Kachhap <amit.kachhap@arm.com> Reviewed-by: Vincenzo Frascino <Vincenzo.Frascino@arm.com> Reviewed-by: Catalin Marinas <catalin.marinas@arm.com> Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
		
			
				
	
	
		
			17 lines
		
	
	
	
		
			361 B
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			17 lines
		
	
	
	
		
			361 B
		
	
	
	
		
			C
		
	
	
	
	
	
| /* SPDX-License-Identifier: GPL-2.0 */
 | |
| #ifndef _LINUX_STACKPROTECTOR_H
 | |
| #define _LINUX_STACKPROTECTOR_H 1
 | |
| 
 | |
| #include <linux/compiler.h>
 | |
| #include <linux/sched.h>
 | |
| #include <linux/random.h>
 | |
| 
 | |
| #if defined(CONFIG_STACKPROTECTOR) || defined(CONFIG_ARM64_PTR_AUTH)
 | |
| # include <asm/stackprotector.h>
 | |
| #else
 | |
| static inline void boot_init_stack_canary(void)
 | |
| {
 | |
| }
 | |
| #endif
 | |
| 
 | |
| #endif
 |