An ELF file's .note.gnu.property indicates features the file supports.
The property is parsed at loading time and passed to arch_setup_elf_
property().  Update it for Indirect Branch Tracking.

Signed-off-by: Yu-cheng Yu <[email protected]>
Cc: Kees Cook <[email protected]>
---
v24:
- Update for changes introduced from splitting shadow stack and ibt.

 arch/x86/Kconfig             | 2 ++
 arch/x86/kernel/process_64.c | 8 ++++++++
 2 files changed, 10 insertions(+)

diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
index a58c5230e957..5496a1b79318 100644
--- a/arch/x86/Kconfig
+++ b/arch/x86/Kconfig
@@ -1975,6 +1975,8 @@ config X86_IBT
        depends on X86_64
        depends on $(cc-option,-fcf-protection)
        select X86_CET
+       select ARCH_USE_GNU_PROPERTY
+       select ARCH_BINFMT_ELF_STATE
        help
          Indirect Branch Tracking (IBT) provides protection against
          CALL-/JMP-oriented programming attacks.  It is active when
diff --git a/arch/x86/kernel/process_64.c b/arch/x86/kernel/process_64.c
index 892d8e742e3b..8137e8af4503 100644
--- a/arch/x86/kernel/process_64.c
+++ b/arch/x86/kernel/process_64.c
@@ -864,6 +864,14 @@ int arch_setup_elf_property(struct arch_elf_state *state)
                        r = shstk_setup();
        }
 
+       if (r < 0)
+               return r;
+
+       if (cpu_feature_enabled(X86_FEATURE_IBT)) {
+               if (state->gnu_property & GNU_PROPERTY_X86_FEATURE_1_IBT)
+                       r = ibt_setup();
+       }
+
        return r;
 }
 #endif
-- 
2.21.0

Reply via email to