x86/ibt,entry: Sprinkle ENDBR dust
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2090231 commit 8f93402b Author: Peter Zijlstra <peterz@infradead.org> Date: Tue, 8 Mar 2022 16:30:24 +0100 x86/ibt,entry: Sprinkle ENDBR dust Kernel entry points should be having ENDBR on for IBT configs. The SYSCALL entry points are found through taking their respective address in order to program them in the MSRs, while the exception entry points are found through UNWIND_HINT_IRET_REGS. The rule is that any UNWIND_HINT_IRET_REGS at sym+0 should have an ENDBR, see the later objtool ibt validation patch. Signed-off-by:Peter Zijlstra (Intel) <peterz@infradead.org> Acked-by:
Josh Poimboeuf <jpoimboe@redhat.com> Link: https://lore.kernel.org/r/20220308154317.933157479@infradead.org Signed-off-by:
Waiman Long <longman@redhat.com>
Showing
- arch/x86/entry/entry_64.S 7 additions, 0 deletionsarch/x86/entry/entry_64.S
- arch/x86/entry/entry_64_compat.S 3 additions, 0 deletionsarch/x86/entry/entry_64_compat.S
- arch/x86/include/asm/idtentry.h 11 additions, 9 deletionsarch/x86/include/asm/idtentry.h
- arch/x86/include/asm/segment.h 2 additions, 1 deletionarch/x86/include/asm/segment.h
- arch/x86/kernel/head_64.S 3 additions, 1 deletionarch/x86/kernel/head_64.S
- arch/x86/kernel/idt.c 3 additions, 2 deletionsarch/x86/kernel/idt.c
Loading
Please register or sign in to comment