aboutsummaryrefslogtreecommitdiff
path: root/arch/x86/net
diff options
context:
space:
mode:
authorGravatar Thomas Gleixner <tglx@linutronix.de> 2022-09-15 13:11:24 +0200
committerGravatar Peter Zijlstra <peterz@infradead.org> 2022-10-17 16:41:13 +0200
commiteaf44c816ed8d1ef94c354e3ed47d53cd5a5cb13 (patch)
treeb9e072355d06dea0077131300ee961c149234789 /arch/x86/net
parentx86/callthunks: Add call patching for call depth tracking (diff)
downloadlinux-eaf44c816ed8d1ef94c354e3ed47d53cd5a5cb13.tar.gz
linux-eaf44c816ed8d1ef94c354e3ed47d53cd5a5cb13.tar.bz2
linux-eaf44c816ed8d1ef94c354e3ed47d53cd5a5cb13.zip
x86/modules: Add call patching
As for the builtins create call thunks and patch the call sites to call the thunk on Intel SKL CPUs for retbleed mitigation. Note, that module init functions are ignored for sake of simplicity because loading modules is not something which is done in high frequent loops and the attacker has not really a handle on when this happens in order to launch a matching attack. The depth tracking will still work for calls into the builtins and because the call is not accounted it will underflow faster and overstuff, but that's mitigated by the saturating counter and the side effect is only temporary. Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org> Link: https://lore.kernel.org/r/20220915111147.575673066@infradead.org
Diffstat (limited to 'arch/x86/net')
0 files changed, 0 insertions, 0 deletions