diff options
| author | Kim Phillips <[email protected]> | 2022-06-14 23:15:44 +0200 |
|---|---|---|
| committer | Borislav Petkov <[email protected]> | 2022-06-27 10:33:58 +0200 |
| commit | 0ee9073000e8791f8b134a8ded31bcc767f7f232 (patch) | |
| tree | 44ad8925d2523a1dc64bc9b8c80171f00865158e /net/unix/scm.h | |
| parent | 15583e514eb16744b80be85dea0774ece153177d (diff) | |
x86/sev: Avoid using __x86_return_thunk
Specifically, it's because __enc_copy() encrypts the kernel after
being relocated outside the kernel in sme_encrypt_execute(), and the
RET macro's jmp offset isn't amended prior to execution.
Signed-off-by: Kim Phillips <[email protected]>
Signed-off-by: Peter Zijlstra (Intel) <[email protected]>
Signed-off-by: Borislav Petkov <[email protected]>
Reviewed-by: Josh Poimboeuf <[email protected]>
Signed-off-by: Borislav Petkov <[email protected]>
Diffstat (limited to 'net/unix/scm.h')
0 files changed, 0 insertions, 0 deletions