Go to file
Peter Zijlstra 0c3e806ec0 x86/cfi: Add boot time hash randomization
In order to avoid known hashes (from knowing the boot image),
randomize the CFI hashes with a per-boot random seed.

Suggested-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Link: https://lore.kernel.org/r/20221027092842.765195516@infradead.org
2022-11-01 13:44:11 +01:00
arch x86/cfi: Add boot time hash randomization 2022-11-01 13:44:11 +01:00
block
certs
crypto
Documentation
drivers
fs
include x86/ibt: Implement FineIBT 2022-11-01 13:44:10 +01:00
init
io_uring
ipc
kernel
lib
LICENSES
mm
net
rust
samples
scripts x86/ibt: Implement FineIBT 2022-11-01 13:44:10 +01:00
security
sound
tools objtool: Add --cfi to generate the .cfi_sites section 2022-11-01 13:44:10 +01:00
usr
virt
.clang-format
.cocciconfig
.get_maintainer.ignore
.gitattributes
.gitignore
.mailmap
.rustfmt.toml
COPYING
CREDITS
Kbuild
Kconfig
MAINTAINERS
Makefile
README

Linux kernel
============

There are several guides for kernel developers and users. These guides can
be rendered in a number of formats, like HTML and PDF. Please read
Documentation/admin-guide/README.rst first.

In order to build the documentation, use ``make htmldocs`` or
``make pdfdocs``.  The formatted documentation can also be read online at:

    https://www.kernel.org/doc/html/latest/

There are various text files in the Documentation/ subdirectory,
several of them using the Restructured Text markup notation.

Please read the Documentation/process/changes.rst file, as it contains the
requirements for building and running the kernel, and information about
the problems which may result by upgrading your kernel.