Received: by 10.223.185.116 with SMTP id b49csp4734068wrg; Tue, 27 Feb 2018 01:29:30 -0800 (PST) X-Google-Smtp-Source: AH8x227KNZnT8Tys7eM153n/J03Ssy6K/IVwunhC8LXvS+FOkPgS3anr65XjuFtH3juoY6yqr5eB X-Received: by 10.98.64.146 with SMTP id f18mr13614567pfd.30.1519723770443; Tue, 27 Feb 2018 01:29:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519723770; cv=none; d=google.com; s=arc-20160816; b=lEt/g458nUvZnIZTnOiK9pLdOEjHPwtoAqJ33Z4hJBSI9eGsJeOhUFQqlfw14XmJUr g7BpNvip1qMn3bHN/zsRWZ+XaH6RgbKw/iARx6LreGMyTG/1JGZDsNS6jYTNCm1ZejF7 bp+sQeCVMvHQsBUoaAM9yGyYrqQ0Eq/gTBXuC5Wt2dwiHkEDx4+0TNs9teNP6I8vNgHM u9biv2CuS8ruOcVEqiIiR9hcoF7wKC2cyNTnl59j/0b13wB1bMj4Leo8XPZIWOHVUzqZ F+DOXInVOaN3/OxSCpWwvYNnXTEiLyfAFBSPkackcr+rYInItEEpduaEgVJ6KLivGRLb OGVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=dtyqdzgi8/qMfA1uvoQx5WXGDKwR2q89QvM7hEbgNq4=; b=hfOoPxFGcdPP4pwIaKrhg5BGU2PCrEAXAboJnln8mENw9FRiUwj98SA5ZsfK3NaRZF CFuvhGPkDKRLnkZv1WKxggav8xdgsv+ZUQ7qfJm0IhmTTs3pQXfjvxHauL3D/WsvQKGs prZ46tICBkZ1JsxZIy/mmp+P5QM35Ky1woQpnC4FeDoMoxZwz3azH+p8B1dRGutR77LE n8AhAGHhg7FqUqoCxHgK5mbeywJd1NeZnTxvMV/yFf7cdWlyqYZ5sKOWpnW+crVc4vZF Z8MHkCC/Jd+XBGkmkvsZk0IlSEeeOLHFhOxmOY9+JTsG2sNYLPV2gMXZofhynkdSvmlv mOzQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x8-v6si8103296plv.166.2018.02.27.01.29.15; Tue, 27 Feb 2018 01:29:30 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752392AbeB0J2h (ORCPT + 99 others); Tue, 27 Feb 2018 04:28:37 -0500 Received: from mail.skyhub.de ([5.9.137.197]:43336 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752017AbeB0J2e (ORCPT ); Tue, 27 Feb 2018 04:28:34 -0500 X-Virus-Scanned: Nedap ESD1 at mail.skyhub.de Received: from mail.skyhub.de ([127.0.0.1]) by localhost (blast.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id n5HYjFpUzgbq; Tue, 27 Feb 2018 10:28:33 +0100 (CET) Received: from pd.tnic (p200300EC2BCDD900C0F39F3CF1943F44.dip0.t-ipconnect.de [IPv6:2003:ec:2bcd:d900:c0f3:9f3c:f194:3f44]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id E33201EC00F4; Tue, 27 Feb 2018 10:28:32 +0100 (CET) Date: Tue, 27 Feb 2018 10:28:10 +0100 From: Borislav Petkov To: Tom Lendacky Cc: x86@kernel.org, linux-kernel@vger.kernel.org, "H. Peter Anvin" , Thomas Gleixner , Linus Torvalds , Ingo Molnar , "Kirill A. Shutemov" Subject: Re: [PATCH] x86/mm/sme: Disable stack protection for mem_encrypt_identity.c Message-ID: <20180227092810.GA26097@pd.tnic> References: <20180226232554.14108.16881.stgit@tlendack-t1.amdoffice.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20180226232554.14108.16881.stgit@tlendack-t1.amdoffice.net> User-Agent: Mutt/1.9.3 (2018-01-21) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Feb 26, 2018 at 05:25:54PM -0600, Tom Lendacky wrote: > Stack protection is not compatible with early boot code. All of the early > SME boot code is now isolated in a separate file, mem_encrypt_identity.c, > so arch/x86/mm/Makefile can be updated to turn off stack protection for > the entire file. This eliminates the need to worry about other functions > within the file being instrumented with stack protection (as was seen > when a newer version of GCC instrumented sme_encrypt_kernel() where an > older version hadn't). It also allows removal of the __nostackprotector > attribute from individual functions. > > Signed-off-by: Tom Lendacky > --- > arch/x86/mm/Makefile | 1 + > arch/x86/mm/mem_encrypt_identity.c | 4 ++-- > 2 files changed, 3 insertions(+), 2 deletions(-) Reviewed-by: Borislav Petkov -- Regards/Gruss, Boris. Good mailing practices for 400: avoid top-posting and trim the reply.