linux/tools/objtool/arch/x86
Peter Zijlstra 7d209d13e7 objtool: Add IBT/ENDBR decoding
Intel IBT requires the target of any indirect CALL or JMP instruction
to be the ENDBR instruction; optionally it allows those two
instructions to have a NOTRACK prefix in order to avoid this
requirement.

The kernel will not enable the use of NOTRACK, as such any occurence
of it in compiler generated code should be flagged.

Teach objtool to Decode ENDBR instructions and WARN about NOTRACK
prefixes.

Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Acked-by: Josh Poimboeuf <jpoimboe@redhat.com>
Link: https://lore.kernel.org/r/20220308154319.645963517@infradead.org
2022-03-15 10:32:46 +01:00
..
include/arch objtool: Decode jump_entry::key addend 2021-05-12 14:54:55 +02:00
Build objtool: Abstract alternative special case handling 2020-09-10 10:43:13 -05:00
decode.c objtool: Add IBT/ENDBR decoding 2022-03-15 10:32:46 +01:00
special.c objtool: Fix retpoline detection in asm code 2021-01-26 11:11:59 -06:00