diff options
author | Nikolay Borisov <nik.borisov@suse.com> | 2023-06-23 14:14:05 +0300 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2023-09-14 14:19:53 +0300 |
commit | f71e1d2ff8e6a183bd4004bc97c453ba527b7dc6 (patch) | |
tree | 797fb2c69c608ad7aa6fdfc6b0697be79a9cf32c /arch/x86/entry | |
parent | 1da5c9bc119d3a749b519596b93f9b2667e93c4a (diff) | |
download | linux-f71e1d2ff8e6a183bd4004bc97c453ba527b7dc6.tar.xz |
x86/entry: Rename ignore_sysret()
The SYSCALL instruction cannot really be disabled in compatibility mode.
The best that can be done is to configure the CSTAR msr to point to a
minimal handler. Currently this handler has a rather misleading name -
ignore_sysret() as it's not really doing anything with sysret.
Give it a more descriptive name.
Signed-off-by: Nikolay Borisov <nik.borisov@suse.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Link: https://lore.kernel.org/r/20230623111409.3047467-3-nik.borisov@suse.com
Diffstat (limited to 'arch/x86/entry')
-rw-r--r-- | arch/x86/entry/entry_64.S | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/arch/x86/entry/entry_64.S b/arch/x86/entry/entry_64.S index 43606de22511..3be71accb7a0 100644 --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -1516,12 +1516,12 @@ SYM_CODE_END(asm_exc_nmi) * This handles SYSCALL from 32-bit code. There is no way to program * MSRs to fully disable 32-bit SYSCALL. */ -SYM_CODE_START(ignore_sysret) +SYM_CODE_START(entry_SYSCALL32_ignore) UNWIND_HINT_END_OF_STACK ENDBR mov $-ENOSYS, %eax sysretl -SYM_CODE_END(ignore_sysret) +SYM_CODE_END(entry_SYSCALL32_ignore) #endif .pushsection .text, "ax" |