linux/arch/x86
Thomas Gleixner e81dc127ef x86/callthunks: Add call patching for call depth tracking
Mitigating the Intel SKL RSB underflow issue in software requires to
track the call depth. That is every CALL and every RET need to be
intercepted and additional code injected.

The existing retbleed mitigations already include means of redirecting
RET to __x86_return_thunk; this can be re-purposed and RET can be
redirected to another function doing RET accounting.

CALL accounting will use the function padding introduced in prior
patches. For each CALL instruction, the destination symbol's padding
is rewritten to do the accounting and the CALL instruction is adjusted
to call into the padding.

This ensures only affected CPUs pay the overhead of this accounting.
Unaffected CPUs will leave the padding unused and have their 'JMP
__x86_return_thunk' replaced with an actual 'RET' instruction.

Objtool has been modified to supply a .call_sites section that lists
all the 'CALL' instructions. Additionally the paravirt instruction
sites are iterated since they will have been patched from an indirect
call to direct calls (or direct instructions in which case it'll be
ignored).

Module handling and the actual thunk code for SKL will be added in
subsequent steps.

Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lore.kernel.org/r/20220915111147.470877038@infradead.org
2022-10-17 16:41:13 +02:00
..
boot arch: Introduce CONFIG_FUNCTION_ALIGNMENT 2022-10-17 16:40:58 +02:00
coco x86/tdx: Handle load_unaligned_zeropad() page-cross to a shared page 2022-06-17 15:37:33 -07:00
configs x86/defconfig: Enable CONFIG_DEBUG_WX=y 2022-09-02 10:41:42 +02:00
crypto crypto: x86/poly1305: Remove custom function alignment 2022-10-17 16:41:03 +02:00
entry x86/entry: Make some entry symbols global 2022-10-17 16:41:12 +02:00
events Perf events updates for v6.1: 2022-10-10 09:27:46 -07:00
hyperv x86/hyperv: Replace kmap() with kmap_local_page() 2022-10-03 08:49:48 +00:00
ia32
include x86/callthunks: Add call patching for call depth tracking 2022-10-17 16:41:13 +02:00
kernel x86/callthunks: Add call patching for call depth tracking 2022-10-17 16:41:13 +02:00
kvm ARM: 2022-10-11 20:07:44 -07:00
lib x86/putuser: Provide room for padding 2022-10-17 16:41:10 +02:00
math-emu
mm treewide: use prandom_u32_max() when possible, part 1 2022-10-11 17:42:55 -06:00
net Networking changes for 6.1. 2022-10-04 13:38:03 -07:00
pci x86/PCI: Revert "x86/PCI: Clip only host bridge windows for E820 regions" 2022-06-17 14:24:14 -05:00
platform EFI updates for v6.1 2022-10-09 08:56:54 -07:00
power
purgatory x86/purgatory: Disable CFI 2022-09-26 10:13:16 -07:00
ras
realmode x86: kmsan: disable instrumentation of unsupported code 2022-10-03 14:03:24 -07:00
tools x86/tools/relocs: Ignore __kcfi_typeid_ relocations 2022-09-26 10:13:15 -07:00
um arch: um: Mark the stack non-executable to fix a binutils warning 2022-09-21 09:11:42 +02:00
video
virt/vmx/tdx
xen x86/cpu: Get rid of redundant switch_to_new_gdt() invocations 2022-10-17 16:40:56 +02:00
.gitignore x86/purgatory: Omit use of bin2c 2022-07-25 10:32:32 +02:00
Kbuild
Kconfig x86/callthunks: Add call patching for call depth tracking 2022-10-17 16:41:13 +02:00
Kconfig.assembler
Kconfig.cpu
Kconfig.debug arch: make TRACE_IRQFLAGS_NMI_SUPPORT generic 2022-06-23 15:39:21 +01:00
Makefile x86/Kconfig: Introduce function padding 2022-10-17 16:41:10 +02:00
Makefile.um
Makefile_32.cpu