Peter Zijlstra 40ea97290b x86/uaccess, kcov: Disable stack protector
New tooling noticed this mishap:

  kernel/kcov.o: warning: objtool: write_comp_data()+0x138: call to __stack_chk_fail() with UACCESS enabled
  kernel/kcov.o: warning: objtool: __sanitizer_cov_trace_pc()+0xd9: call to __stack_chk_fail() with UACCESS enabled

All the other instrumentation (KASAN,UBSAN) also have stack protector
disabled.

Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Josh Poimboeuf <jpoimboe@redhat.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2019-04-03 11:02:24 +02:00
..
2019-03-22 22:50:41 +01:00
2019-03-15 14:22:59 -07:00
2019-03-09 15:53:03 -08:00
2019-02-01 20:55:38 +01:00
2018-12-28 12:42:30 -08:00
2018-10-31 08:54:16 -07:00
2019-03-16 13:05:32 -07:00
2019-03-16 13:47:14 -07:00
2018-07-03 09:20:44 +02:00
2019-03-16 13:47:14 -07:00
2019-01-11 18:05:40 -08:00