diff options
| author | Anton Protopopov <a.s.protopopov@gmail.com> | 2025-11-05 09:04:03 +0000 |
|---|---|---|
| committer | Alexei Starovoitov <ast@kernel.org> | 2025-11-05 17:53:22 -0800 |
| commit | 30ec0ec09bf53e3309c02e79dc325a4d1244bd4b (patch) | |
| tree | 1c51f04daa1e8e0d167fb26e35990df4d49c936a /tools/testing/selftests/bpf/prog_tests/bpf_insn_array.c | |
| parent | 218edd6db6b984d09d9965553b1742f42138754b (diff) | |
bpf: support instructions arrays with constants blinding
When bpf_jit_harden is enabled, all constants in the BPF code are
blinded to prevent JIT spraying attacks. This happens during JIT
phase. Adjust all the related instruction arrays accordingly.
Signed-off-by: Anton Protopopov <a.s.protopopov@gmail.com>
Reviewed-by: Eduard Zingerman <eddyz87@gmail.com>
Link: https://lore.kernel.org/r/20251105090410.1250500-6-a.s.protopopov@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/bpf_insn_array.c')
0 files changed, 0 insertions, 0 deletions