Print this page
11787 Kernel needs to be built with retpolines
11788 Kernel needs to generally use RSB stuffing
Reviewed by: Jerry Jelinek <jerry.jelinek@joyent.com>
Reviewed by: John Levon <john.levon@joyent.com>
*** 1189,1199 ****
movq %rdi, %r12
call dtrace_instr_size
addq %rax, %r12
movq %r12, REGOFF_RIP(%rbp)
INTR_POP
! call *x86_md_clear
jmp tr_iret_auto
/*NOTREACHED*/
3:
leaq dtrace_badflags(%rip), %rdi
xorl %eax, %eax
--- 1189,1199 ----
movq %rdi, %r12
call dtrace_instr_size
addq %rax, %r12
movq %r12, REGOFF_RIP(%rbp)
INTR_POP
! call x86_md_clear
jmp tr_iret_auto
/*NOTREACHED*/
3:
leaq dtrace_badflags(%rip), %rdi
xorl %eax, %eax
*** 1595,1615 ****
/*
* Return to 32-bit userland
*/
ALTENTRY(sys_rtt_syscall32)
USER32_POP
! call *x86_md_clear
jmp tr_iret_user
/*NOTREACHED*/
ALTENTRY(sys_rtt_syscall)
/*
* Return to 64-bit userland
*/
USER_POP
ALTENTRY(nopop_sys_rtt_syscall)
! call *x86_md_clear
jmp tr_iret_user
/*NOTREACHED*/
SET_SIZE(nopop_sys_rtt_syscall)
/*
--- 1595,1615 ----
/*
* Return to 32-bit userland
*/
ALTENTRY(sys_rtt_syscall32)
USER32_POP
! call x86_md_clear
jmp tr_iret_user
/*NOTREACHED*/
ALTENTRY(sys_rtt_syscall)
/*
* Return to 64-bit userland
*/
USER_POP
ALTENTRY(nopop_sys_rtt_syscall)
! call x86_md_clear
jmp tr_iret_user
/*NOTREACHED*/
SET_SIZE(nopop_sys_rtt_syscall)
/*