diff options
author | Peter Zijlstra <peterz@infradead.org> | 2021-10-30 10:47:58 +0300 |
---|---|---|
committer | Peter Zijlstra <peterz@infradead.org> | 2021-11-11 15:09:31 +0300 |
commit | 2105a92748e83e2e3ee6be539da959706bbb3898 (patch) | |
tree | 04dd3c3a9a55be81189d30054b015b2587dc5968 /arch/um/Kconfig | |
parent | debe436e77c72fcee804fb867f275e6d31aa999c (diff) | |
download | linux-2105a92748e83e2e3ee6be539da959706bbb3898.tar.xz |
static_call,x86: Robustify trampoline patching
Add a few signature bytes after the static call trampoline and verify
those bytes match before patching the trampoline. This avoids patching
random other JMPs (such as CFI jump-table entries) instead.
These bytes decode as:
d: 53 push %rbx
e: 43 54 rex.XB push %r12
And happen to spell "SCT".
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lkml.kernel.org/r/20211030074758.GT174703@worktop.programming.kicks-ass.net
Diffstat (limited to 'arch/um/Kconfig')
0 files changed, 0 insertions, 0 deletions