linux/arch/x86/entry
Brian Gerst 3aec4ecb3d x86: Rewrite ret_from_fork() in C
When kCFI is enabled, special handling is needed for the indirect call
to the kernel thread function.  Rewrite the ret_from_fork() function in
C so that the compiler can properly handle the indirect call.

Suggested-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Brian Gerst <brgerst@gmail.com>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Sami Tolvanen <samitolvanen@google.com>
Link: https://lkml.kernel.org/r/20230623225529.34590-3-brgerst@gmail.com
2023-07-10 09:52:25 +02:00
..
syscalls cachestat: implement cachestat syscall 2023-06-09 16:25:16 -07:00
vdso x86/vdso: Include vdso/processor.h 2023-05-18 11:56:18 -07:00
vsyscall x86: Allow atomic MM_CONTEXT flags setting 2023-03-16 13:08:39 -07:00
calling.h x86/retbleed: Add fine grained Kconfig knobs 2022-06-29 17:43:41 +02:00
common.c X86 entry code related updates: 2021-06-29 12:44:51 -07:00
entry_32.S x86: Rewrite ret_from_fork() in C 2023-07-10 09:52:25 +02:00
entry_64_compat.S - Add the call depth tracking mitigation for Retbleed which has 2022-12-14 15:03:00 -08:00
entry_64.S x86: Rewrite ret_from_fork() in C 2023-07-10 09:52:25 +02:00
entry.S x86/bugs: Add retbleed=ibpb 2022-06-27 10:34:00 +02:00
Makefile x86/entry: Build thunk_$(BITS) only if CONFIG_PREEMPTION=y 2022-08-04 12:23:50 +02:00
syscall_32.c x86/syscalls: Stop filling syscall arrays with *_sys_ni_syscall 2021-05-20 15:03:59 +02:00
syscall_64.c x86/syscalls: Stop filling syscall arrays with *_sys_ni_syscall 2021-05-20 15:03:59 +02:00
syscall_x32.c x86/syscalls: Stop filling syscall arrays with *_sys_ni_syscall 2021-05-20 15:03:59 +02:00
thunk_32.S x86/entry: Build thunk_$(BITS) only if CONFIG_PREEMPTION=y 2022-08-04 12:23:50 +02:00
thunk_64.S x86/entry: Move thunk restore code into thunk functions 2023-06-07 09:54:45 -07:00