static_call,x86: Robustify trampoline patching
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2090231 commit 2105a927 Author: Peter Zijlstra <peterz@infradead.org> Date: Sat, 30 Oct 2021 09:47:58 +0200 static_call,x86: Robustify trampoline patching Add a few signature bytes after the static call trampoline and verify those bytes match before patching the trampoline. This avoids patching random other JMPs (such as CFI jump-table entries) instead. These bytes decode as: d: 53 push %rbx e: 43 54 rex.XB push %r12 And happen to spell "SCT". Signed-off-by:Peter Zijlstra (Intel) <peterz@infradead.org> Link: https://lkml.kernel.org/r/20211030074758.GT174703@worktop.programming.kicks-ass.net Signed-off-by:
Waiman Long <longman@redhat.com>
Please register or sign in to comment