diff options
author | Sami Tolvanen | 2022-09-08 14:54:59 -0700 |
---|---|---|
committer | Kees Cook | 2022-09-26 10:13:15 -0700 |
commit | 3c68a92d17add767109441f4040391b9e8a14a98 (patch) | |
tree | a5a94e0eb9ebf345acbca171560ddf59d2739196 /kernel | |
parent | 5141d3a06b2da1731ac82091298b766a1f95d3d8 (diff) |
objtool: Disable CFI warnings
The __cfi_ preambles contain a mov instruction that embeds the KCFI
type identifier in the following format:
; type preamble
__cfi_function:
mov <id>, %eax
function:
...
While the preamble symbols are STT_FUNC and contain valid
instructions, they are never executed and always fall through. Skip
the warning for them.
.kcfi_traps sections point to CFI traps in text sections. Also skip
the warning about them referencing !ENDBR instructions.
Signed-off-by: Sami Tolvanen <samitolvanen@google.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
Tested-by: Kees Cook <keescook@chromium.org>
Tested-by: Nathan Chancellor <nathan@kernel.org>
Acked-by: Josh Poimboeuf <jpoimboe@kernel.org>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Tested-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
Link: https://lore.kernel.org/r/20220908215504.3686827-18-samitolvanen@google.com
Diffstat (limited to 'kernel')
0 files changed, 0 insertions, 0 deletions