-
Vlad Tsyrklevich authored
Control Flow Integrity [1] indirect call checking verifies that function pointers only call valid functions with a matching type signature. It can't verify dynamically resolved function pointers, instead store them in ProtectedMemory and calls them using base::UnsanitizedCfiCall() to disable cfi-icall checks. [1] https://www.chromium.org/developers/testing/control-flow-integrity BUG=771365 Change-Id: I79b4c8a2bb6b7a77ff35860e7d4f7ad226745dca Reviewed-on: https://chromium-review.googlesource.com/1000426Reviewed-by:
Thomas Anderson <thomasanderson@chromium.org> Commit-Queue: Peter Collingbourne <pcc@chromium.org> Cr-Commit-Position: refs/heads/master@{#549250}
daf551db