1/* SPDX-License-Identifier: GPL-2.0 */ 2/* 3 * Common place for both 32- and 64-bit entry routines. 4 */ 5 6#include <linux/export.h> 7#include <linux/kvm_types.h> 8#include <linux/linkage.h> 9#include <linux/objtool.h> 10#include <asm/msr-index.h> 11#include <asm/unwind_hints.h> 12#include <asm/segment.h> 13#include <asm/cache.h> 14#include <asm/cpufeatures.h> 15#include <asm/nospec-branch.h> 16 17#include "calling.h" 18 19.pushsection .noinstr.text, "ax" 20 21/* Clobbers AX, CX, DX */ 22SYM_FUNC_START(write_ibpb) 23 ANNOTATE_NOENDBR 24 movl $MSR_IA32_PRED_CMD, %ecx 25 movl _ASM_RIP(x86_pred_cmd), %eax 26 xorl %edx, %edx 27 wrmsr 28 29 /* Make sure IBPB clears return stack preductions too. */ 30 FILL_RETURN_BUFFER %rax, RSB_CLEAR_LOOPS, X86_BUG_IBPB_NO_RET 31 RET 32SYM_FUNC_END(write_ibpb) 33EXPORT_SYMBOL_FOR_KVM(write_ibpb); 34 35.popsection 36 37/* 38 * Define the VERW operand that is disguised as entry code so that 39 * it can be referenced with KPTI enabled. This ensures VERW can be 40 * used late in exit-to-user path after page tables are switched. 41 */ 42.pushsection .entry.text, "ax" 43 44.align L1_CACHE_BYTES, 0xcc 45SYM_CODE_START_NOALIGN(x86_verw_sel) 46 UNWIND_HINT_UNDEFINED 47 ANNOTATE_NOENDBR 48 .word __KERNEL_DS 49.align L1_CACHE_BYTES, 0xcc 50SYM_CODE_END(x86_verw_sel); 51EXPORT_SYMBOL_FOR_KVM(x86_verw_sel); 52 53.popsection 54 55THUNK warn_thunk_thunk, __warn_thunk 56 57/* 58 * Clang's implementation of TLS stack cookies requires the variable in 59 * question to be a TLS variable. If the variable happens to be defined as an 60 * ordinary variable with external linkage in the same compilation unit (which 61 * amounts to the whole of vmlinux with LTO enabled), Clang will drop the 62 * segment register prefix from the references, resulting in broken code. Work 63 * around this by avoiding the symbol used in -mstack-protector-guard-symbol= 64 * entirely in the C code, and use an alias emitted by the linker script 65 * instead. 66 */ 67#if defined(CONFIG_STACKPROTECTOR) && defined(CONFIG_SMP) 68EXPORT_SYMBOL(__ref_stack_chk_guard); 69#endif 70