mirror_ubuntu-kernels/arch/x86/entry
Josh Poimboeuf b2620facef x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
If a kernel is built with CONFIG_RETPOLINE=n, but the user still wants
to mitigate Spectre v2 using IBRS or eIBRS, the RSB filling will be
silently disabled.

There's nothing retpoline-specific about RSB buffer filling.  Remove the
CONFIG_RETPOLINE guards around it.

Signed-off-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Borislav Petkov <bp@suse.de>
2022-06-27 10:34:00 +02:00
..
syscalls Kbuild updates for v5.18 2022-03-31 11:59:03 -07:00
vdso x86: Use return-thunk in asm code 2022-06-27 10:33:58 +02:00
vsyscall x86/vsyscall_emu/64: Don't use RET in vsyscall emulation 2022-06-27 10:33:58 +02:00
calling.h x86/entry: Add kernel IBRS implementation 2022-06-27 10:33:59 +02:00
common.c X86 entry code related updates: 2021-06-29 12:44:51 -07:00
entry_32.S x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n 2022-06-27 10:34:00 +02:00
entry_64_compat.S objtool: Add entry UNRET validation 2022-06-27 10:34:00 +02:00
entry_64.S x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n 2022-06-27 10:34:00 +02:00
entry.S x86/bugs: Add retbleed=ibpb 2022-06-27 10:34:00 +02:00
Makefile x86/bugs: Add retbleed=ibpb 2022-06-27 10:34:00 +02:00
syscall_32.c x86/syscalls: Stop filling syscall arrays with *_sys_ni_syscall 2021-05-20 15:03:59 +02:00
syscall_64.c x86/syscalls: Stop filling syscall arrays with *_sys_ni_syscall 2021-05-20 15:03:59 +02:00
syscall_x32.c x86/syscalls: Stop filling syscall arrays with *_sys_ni_syscall 2021-05-20 15:03:59 +02:00
thunk_32.S x86: Prepare asm files for straight-line-speculation 2021-12-08 12:25:37 +01:00
thunk_64.S x86: Prepare asm files for straight-line-speculation 2021-12-08 12:25:37 +01:00