[prev in list] [next in list] [prev in thread] [next in thread]
List: linux-api
Subject: [PATCH v17 1/7] x86/cet/ibt: Update Kconfig for user-mode Indirect Branch Tracking
From: Yu-cheng Yu <yu-cheng.yu () intel ! com>
Date: 2020-12-29 21:33:44
Message-ID: 20201229213350.17010-2-yu-cheng.yu () intel ! com
[Download RAW message or body]
Indirect branch tracking is a hardware security feature that verifies near
indirect call/jump instructions arrive at intended targets, which are
labeled by the compiler with ENDBR opcodes. If such instructions reach
unlabeled locations, the processor raises control-protection faults.
Check the compiler is up-to-date at config time.
Signed-off-by: Yu-cheng Yu <yu-cheng.yu@intel.com>
---
arch/x86/Kconfig | 1 +
1 file changed, 1 insertion(+)
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
index b26c79c87558..d19f8aa381db 100644
--- a/arch/x86/Kconfig
+++ b/arch/x86/Kconfig
@@ -1961,6 +1961,7 @@ config X86_CET_USER
def_bool n
depends on CPU_SUP_INTEL && X86_64
depends on AS_WRUSS
+ depends on $(cc-option,-fcf-protection)
select ARCH_USES_HIGH_VMA_FLAGS
select ARCH_HAS_SHADOW_STACK
select ARCH_MAYBE_MKWRITE
--
2.21.0
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic