diff options
| author | Christophe Leroy <[email protected]> | 2022-02-15 13:41:08 +0100 |
|---|---|---|
| committer | Michael Ellerman <[email protected]> | 2022-02-16 23:25:12 +1100 |
| commit | 5e5a6c5441654d1b9e576ce4ca8a1759e701079e (patch) | |
| tree | d99c9937f48ccec679d26db730a591410f1e2297 /tools/perf/scripts/python/event_analyzing_sample.py | |
| parent | 72a86433049dcfe918886645ac3d19c1eaaa67ab (diff) | |
lkdtm: Add a test for function descriptors protection
Add WRITE_OPD to check that you can't modify function
descriptors.
Gives the following result when function descriptors are
not protected:
lkdtm: Performing direct entry WRITE_OPD
lkdtm: attempting bad 16 bytes write at c00000000269b358
lkdtm: FAIL: survived bad write
lkdtm: do_nothing was hijacked!
Looks like a standard compiler barrier() is not enough to force
GCC to use the modified function descriptor. Had to add a fake empty
inline assembly to force GCC to reload the function descriptor.
Signed-off-by: Christophe Leroy <[email protected]>
Acked-by: Kees Cook <[email protected]>
Signed-off-by: Michael Ellerman <[email protected]>
Link: https://lore.kernel.org/r/7eeba50d16a35e9d799820e43304150225f20197.1644928018.git.christophe.leroy@csgroup.eu
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions