Peter Zijlstra
69d4c0d321
entry, kasan, x86: Disallow overriding mem*() functions
...
KASAN cannot just hijack the mem*() functions, it needs to emit
__asan_mem*() variants if it wants instrumentation (other sanitizers
already do this).
vmlinux.o: warning: objtool: sync_regs+0x24: call to memcpy() leaves .noinstr.text section
vmlinux.o: warning: objtool: vc_switch_off_ist+0xbe: call to memcpy() leaves .noinstr.text section
vmlinux.o: warning: objtool: fixup_bad_iret+0x36: call to memset() leaves .noinstr.text section
vmlinux.o: warning: objtool: __sev_get_ghcb+0xa0: call to memcpy() leaves .noinstr.text section
vmlinux.o: warning: objtool: __sev_put_ghcb+0x35: call to memcpy() leaves .noinstr.text section
Remove the weak aliases to ensure nobody hijacks these functions and
add them to the noinstr section.
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Tested-by: Tony Lindgren <tony@atomide.com>
Tested-by: Ulf Hansson <ulf.hansson@linaro.org>
Acked-by: Rafael J. Wysocki <rafael.j.wysocki@intel.com>
Acked-by: Frederic Weisbecker <frederic@kernel.org>
Link: https://lore.kernel.org/r/20230112195542.028523143@infradead.org
2023-01-13 11:48:17 +01:00
..
2022-10-03 14:03:18 -07:00
2022-11-10 16:27:46 +01:00
2022-10-03 14:03:01 -07:00
2021-06-29 10:53:53 -07:00
2022-11-08 17:37:14 -08:00
2022-12-14 12:20:00 -08:00
2023-01-13 11:48:17 +01:00
2022-10-03 14:03:02 -07:00
2022-05-13 07:20:19 -07:00
2022-10-03 14:03:02 -07:00
2022-03-24 19:06:49 -07:00
2022-03-24 19:06:49 -07:00
2022-10-03 14:03:02 -07:00
2022-12-14 12:20:00 -08:00
2023-01-13 11:48:17 +01:00
2022-10-03 14:03:01 -07:00
2022-10-03 14:03:02 -07:00