x86/mm/sme: Disable stack protection for mem_encrypt_identity.c
authorTom Lendacky <thomas.lendacky@amd.com>
Mon, 26 Feb 2018 23:25:54 +0000 (17:25 -0600)
committerThomas Gleixner <tglx@linutronix.de>
Wed, 28 Feb 2018 14:24:12 +0000 (15:24 +0100)
commitae8d1d0061ad7996c2c5e769e809a593544fa145
treef89d79990bb9af94618f69159e11e34b00cf04ae
parent1ea4fe84973854a7302e4d1c479f10ae25a93e4a
x86/mm/sme: Disable stack protection for mem_encrypt_identity.c

Stack protection is not compatible with early boot code.  All of the early
SME boot code is now isolated in a separate file, mem_encrypt_identity.c,
so arch/x86/mm/Makefile can be updated to turn off stack protection for
the entire file.  This eliminates the need to worry about other functions
within the file being instrumented with stack protection (as was seen
when a newer version of GCC instrumented sme_encrypt_kernel() where an
older version hadn't).  It also allows removal of the __nostackprotector
attribute from individual functions.

Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Borislav Petkov <bp@suse.de>
Acked-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Borislav Petkov <bp@alien8.de>
Link: https://lkml.kernel.org/r/20180226232554.14108.16881.stgit@tlendack-t1.amdoffice.net
arch/x86/mm/Makefile
arch/x86/mm/mem_encrypt_identity.c