aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python
diff options
context:
space:
mode:
authorPeter Zijlstra <[email protected]>2023-06-21 22:17:12 +0200
committerPeter Zijlstra <[email protected]>2023-07-10 09:52:24 +0200
commit9831c6253ace48051189f6d18a15f658f94babc2 (patch)
tree2c2d1e8e79478c161c37c8d55620ec5758065eb7 /tools/perf/scripts/python
parentbe0fffa5ca894a971a31c5e28aa77b633a97d1dc (diff)
x86/cfi: Extend ENDBR sealing to kCFI
Kees noted that IBT sealing could be extended to kCFI. Fundamentally it is the list of functions that do not have their address taken and are thus never called indirectly. It doesn't matter that objtool uses IBT infrastructure to determine this list, once we have it it can also be used to clobber kCFI hashes and avoid kCFI indirect calls. Suggested-by: Kees Cook <[email protected]> Signed-off-by: Peter Zijlstra (Intel) <[email protected]> Reviewed-by: Kees Cook <[email protected]> Reviewed-by: Sami Tolvanen <[email protected]> Link: https://lkml.kernel.org/r/20230622144321.494426891%40infradead.org
Diffstat (limited to 'tools/perf/scripts/python')
0 files changed, 0 insertions, 0 deletions