Peter Zijlstra 2105a92748 static_call,x86: Robustify trampoline patching
Add a few signature bytes after the static call trampoline and verify
those bytes match before patching the trampoline. This avoids patching
random other JMPs (such as CFI jump-table entries) instead.

These bytes decode as:

   d:   53                      push   %rbx
   e:   43 54                   rex.XB push %r12

And happen to spell "SCT".

Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lkml.kernel.org/r/20211030074758.GT174703@worktop.programming.kicks-ass.net
2021-11-11 13:09:31 +01:00
..
2021-11-06 14:36:12 -07:00
2021-11-01 21:17:39 -07:00
2021-11-02 11:24:14 -07:00
2021-10-20 23:57:54 +02:00
2021-11-02 06:20:58 -07:00
2021-11-10 11:14:21 -08:00
2021-11-04 08:32:38 -07:00
2021-08-26 22:28:03 +02:00
2021-11-10 11:14:21 -08:00
2021-11-06 14:48:06 -07:00
2021-11-08 09:15:45 -08:00