lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 17 Feb 2017 11:47:52 +0100 From: Jiri Slaby <jslaby@...e.cz> To: mingo@...hat.com Cc: tglx@...utronix.de, hpa@...or.com, x86@...nel.org, jpoimboe@...hat.com, linux-kernel@...r.kernel.org, Jiri Slaby <jslaby@...e.cz> Subject: [PATCH 05/10] x86: kernel, annotate local functions Use the newly added ENTRY_LOCAL to annotate starts of all functions which do not have ".globl" annotation. This is needed to balance ENDPROC for tools that are about to generate debuginfo. In this patch, do it for local verify_cpu and early_idt_handler_common properly. Note that the latter already has ENDPROC. Signed-off-by: Jiri Slaby <jslaby@...e.cz> Cc: Thomas Gleixner <tglx@...utronix.de> Cc: Ingo Molnar <mingo@...hat.com> Cc: "H. Peter Anvin" <hpa@...or.com> Cc: <x86@...nel.org> --- arch/x86/kernel/head_64.S | 2 +- arch/x86/kernel/verify_cpu.S | 3 ++- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/arch/x86/kernel/head_64.S b/arch/x86/kernel/head_64.S index 7c14ab3a0f3b..4e9da8814bef 100644 --- a/arch/x86/kernel/head_64.S +++ b/arch/x86/kernel/head_64.S @@ -357,7 +357,7 @@ ENTRY(early_idt_handler_array) .endr ENDPROC(early_idt_handler_array) -early_idt_handler_common: +ENTRY_LOCAL(early_idt_handler_common) /* * The stack is the hardware frame, an error code or zero, and the * vector number. diff --git a/arch/x86/kernel/verify_cpu.S b/arch/x86/kernel/verify_cpu.S index 014ea59aa153..88782bed43e9 100644 --- a/arch/x86/kernel/verify_cpu.S +++ b/arch/x86/kernel/verify_cpu.S @@ -33,7 +33,7 @@ #include <asm/cpufeatures.h> #include <asm/msr-index.h> -verify_cpu: +ENTRY_LOCAL(verify_cpu) pushf # Save caller passed flags push $0 # Kill any dangerous flags popf @@ -139,3 +139,4 @@ verify_cpu: popf # Restore caller passed flags xorl %eax, %eax ret +ENDPROC(verify_cpu) -- 2.11.1
Powered by blists - more mailing lists