diff options
author | Kees Cook <keescook@chromium.org> | 2019-06-17 21:55:03 -0700 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2019-06-22 11:55:22 +0200 |
commit | 8dbec27a242cd3e2816eeb98d3237b9f57cf6232 (patch) | |
tree | a9c5be74991e89af735157cd60cabcfff34a86b6 /arch/arm/kernel/entry-ftrace.S | |
parent | 873d50d58f67ef15d2777b5e7f7a5268bb1fbae2 (diff) |
x86/asm: Pin sensitive CR0 bits
With sensitive CR4 bits pinned now, it's possible that the WP bit for
CR0 might become a target as well.
Following the same reasoning for the CR4 pinning, pin CR0's WP
bit. Contrary to the cpu feature dependend CR4 pinning this can be done
with a constant value.
Suggested-by: Peter Zijlstra <peterz@infradead.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Dave Hansen <dave.hansen@intel.com>
Cc: kernel-hardening@lists.openwall.com
Link: https://lkml.kernel.org/r/20190618045503.39105-4-keescook@chromium.org
Diffstat (limited to 'arch/arm/kernel/entry-ftrace.S')
0 files changed, 0 insertions, 0 deletions