summaryrefslogtreecommitdiff
path: root/kernel
diff options
context:
space:
mode:
authorGabriel Krisman Bertazi <krisman@collabora.com>2020-11-27 14:32:32 -0500
committerThomas Gleixner <tglx@linutronix.de>2020-12-02 10:32:16 +0100
commitc5c878125ad5aca199dfc10b1af4010165aaa596 (patch)
treef389ef222bb9189a987d5d64bb924d5f241f792f /kernel
parent01fe185d95ba3cdd6629859dd911a94de8800562 (diff)
downloadlinux-next-c5c878125ad5aca199dfc10b1af4010165aaa596.tar.gz
x86: vdso: Expose sigreturn address on vdso to the kernel
Syscall user redirection requires the signal trampoline code to not be captured, in order to support returning with a locked selector while avoiding recursion back into the signal handler. For ia-32, which has the trampoline in the vDSO, expose the entry points to the kernel, such that it can avoid dispatching syscalls from that region to userspace. Suggested-by: Andy Lutomirski <luto@kernel.org> Signed-off-by: Gabriel Krisman Bertazi <krisman@collabora.com> Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Reviewed-by: Kees Cook <keescook@chromium.org> Reviewed-by: Andy Lutomirski <luto@kernel.org> Acked-by: Andy Lutomirski <luto@kernel.org> Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org> Link: https://lore.kernel.org/r/20201127193238.821364-2-krisman@collabora.com
Diffstat (limited to 'kernel')
0 files changed, 0 insertions, 0 deletions