diff options
author | Thomas Gleixner <tglx@linutronix.de> | 2020-07-22 23:59:56 +0200 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2020-07-24 14:59:03 +0200 |
commit | 142781e108b13b2b0e8f035cfb5bfbbc8f14d887 (patch) | |
tree | e11ce626a38bf77bd2ec08499f2199534e2a9a15 /arch/Kconfig | |
parent | 6823ecabf03031d610a6c5afe7ed4b4fd659a99f (diff) | |
download | linux-142781e108b13b2b0e8f035cfb5bfbbc8f14d887.tar.gz linux-142781e108b13b2b0e8f035cfb5bfbbc8f14d887.tar.bz2 linux-142781e108b13b2b0e8f035cfb5bfbbc8f14d887.zip |
entry: Provide generic syscall entry functionality
On syscall entry certain work needs to be done:
- Establish state (lockdep, context tracking, tracing)
- Conditional work (ptrace, seccomp, audit...)
This code is needlessly duplicated and different in all
architectures.
Provide a generic version based on the x86 implementation which has all the
RCU and instrumentation bits right.
As interrupt/exception entry from user space needs parts of the same
functionality, provide a function for this as well.
syscall_enter_from_user_mode() and irqentry_enter_from_user_mode() must be
called right after the low level ASM entry. The calling code must be
non-instrumentable. After the functions returns state is correct and the
subsequent functions can be instrumented.
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Acked-by: Kees Cook <keescook@chromium.org>
Link: https://lkml.kernel.org/r/20200722220519.513463269@linutronix.de
Diffstat (limited to 'arch/Kconfig')
-rw-r--r-- | arch/Kconfig | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/arch/Kconfig b/arch/Kconfig index 8cc35dc556c7..852a527f418f 100644 --- a/arch/Kconfig +++ b/arch/Kconfig @@ -27,6 +27,9 @@ config HAVE_IMA_KEXEC config HOTPLUG_SMT bool +config GENERIC_ENTRY + bool + config OPROFILE tristate "OProfile system profiling" depends on PROFILING |