* H. J. Lu:

> On Wed, May 11, 2022 at 11:45 AM Florian Weimer <fwei...@redhat.com> wrote:
>>
>> * H. J. Lu:
>>
>> >> NOTRACK avoids the need for ENDBR instructions, right?  That's a
>> >> hardening improvement, so it should be used by default.
>> >
>> > NOTRACK weakens IBT since it disables IBT on the indirect jump instruction.
>> > GCC uses it in the jump table to avoid ENDBR.
>>
>> Typical jump table code looks like this:
>>
>> Dump of assembler code for function __cache_sysconf:
>>    0x00000000000f7a80 <+0>:     endbr64
>>    0x00000000000f7a84 <+4>:     sub    $0xb9,%edi
>>    0x00000000000f7a8a <+10>:    cmp    $0xc,%edi
>>    0x00000000000f7a8d <+13>:    ja     0xf7b70 <__cache_sysconf+240>
>>    0x00000000000f7a93 <+19>:    lea    0xba926(%rip),%rdx        # 0x1b23c0
>>    0x00000000000f7a9a <+26>:    movslq (%rdx,%rdi,4),%rax
>>    0x00000000000f7a9e <+30>:    add    %rdx,%rax
>>    0x00000000000f7aa1 <+33>:    notrack jmp *%rax
>>
>> There's no ENDBR instruction between range check, the address
>> computation, and the NOTRACK JMP, so it's not possible to redirect that
>> JMP to some other place.
>
> That is the assumption we made.   RAX will always point to the valid
> address.

Which means that NOTRACK should not weaken anything here.  What am I
missing?

Thanks,
Florian

Reply via email to