diff options
author | Peter Zijlstra <[email protected]> | 2023-06-21 22:17:12 +0200 |
---|---|---|
committer | Peter Zijlstra <[email protected]> | 2023-07-10 09:52:24 +0200 |
commit | 9831c6253ace48051189f6d18a15f658f94babc2 (patch) | |
tree | 2c2d1e8e79478c161c37c8d55620ec5758065eb7 /tools/testing/selftests/bpf/progs/test_prog_array_init.c | |
parent | be0fffa5ca894a971a31c5e28aa77b633a97d1dc (diff) |
x86/cfi: Extend ENDBR sealing to kCFI
Kees noted that IBT sealing could be extended to kCFI.
Fundamentally it is the list of functions that do not have their
address taken and are thus never called indirectly. It doesn't matter
that objtool uses IBT infrastructure to determine this list, once we
have it it can also be used to clobber kCFI hashes and avoid kCFI
indirect calls.
Suggested-by: Kees Cook <[email protected]>
Signed-off-by: Peter Zijlstra (Intel) <[email protected]>
Reviewed-by: Kees Cook <[email protected]>
Reviewed-by: Sami Tolvanen <[email protected]>
Link: https://lkml.kernel.org/r/20230622144321.494426891%40infradead.org
Diffstat (limited to 'tools/testing/selftests/bpf/progs/test_prog_array_init.c')
0 files changed, 0 insertions, 0 deletions