summaryrefslogtreecommitdiff
path: root/tools/testing/selftests/bpf/prog_tests/bpf_insn_array.c
diff options
context:
space:
mode:
authorAnton Protopopov <a.s.protopopov@gmail.com>2025-11-05 12:04:03 +0300
committerAlexei Starovoitov <ast@kernel.org>2025-11-06 04:53:22 +0300
commit30ec0ec09bf53e3309c02e79dc325a4d1244bd4b (patch)
tree1c51f04daa1e8e0d167fb26e35990df4d49c936a /tools/testing/selftests/bpf/prog_tests/bpf_insn_array.c
parent218edd6db6b984d09d9965553b1742f42138754b (diff)
downloadlinux-30ec0ec09bf53e3309c02e79dc325a4d1244bd4b.tar.xz
bpf: support instructions arrays with constants blinding
When bpf_jit_harden is enabled, all constants in the BPF code are blinded to prevent JIT spraying attacks. This happens during JIT phase. Adjust all the related instruction arrays accordingly. Signed-off-by: Anton Protopopov <a.s.protopopov@gmail.com> Reviewed-by: Eduard Zingerman <eddyz87@gmail.com> Link: https://lore.kernel.org/r/20251105090410.1250500-6-a.s.protopopov@gmail.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/bpf_insn_array.c')
0 files changed, 0 insertions, 0 deletions