]> www.infradead.org Git - users/hch/misc.git/commitdiff
x86/cfi: Clean up linkage
authorPeter Zijlstra <peterz@infradead.org>
Fri, 7 Feb 2025 12:15:33 +0000 (13:15 +0100)
committerPeter Zijlstra <peterz@infradead.org>
Fri, 14 Feb 2025 09:32:05 +0000 (10:32 +0100)
With the introduction of kCFI the addition of ENDBR to
SYM_FUNC_START* no longer suffices to make the function indirectly
callable. This now requires the use of SYM_TYPED_FUNC_START.

As such, remove the implicit ENDBR from SYM_FUNC_START* and add some
explicit annotations to fix things up again.

Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Reviewed-by: Sami Tolvanen <samitolvanen@google.com>
Link: https://lore.kernel.org/r/20250207122546.409116003@infradead.org
29 files changed:
arch/x86/crypto/aesni-intel_asm.S
arch/x86/entry/calling.h
arch/x86/entry/entry.S
arch/x86/entry/entry_64.S
arch/x86/entry/entry_64_fred.S
arch/x86/entry/vdso/Makefile
arch/x86/include/asm/linkage.h
arch/x86/include/asm/page_64.h
arch/x86/include/asm/paravirt_types.h
arch/x86/include/asm/special_insns.h
arch/x86/include/asm/string_64.h
arch/x86/kernel/acpi/madt_playdead.S
arch/x86/kernel/acpi/wakeup_64.S
arch/x86/kernel/alternative.c
arch/x86/kernel/ftrace_64.S
arch/x86/kernel/irqflags.S
arch/x86/kernel/paravirt.c
arch/x86/lib/clear_page_64.S
arch/x86/lib/copy_user_64.S
arch/x86/lib/copy_user_uncached_64.S
arch/x86/lib/getuser.S
arch/x86/lib/hweight.S
arch/x86/lib/putuser.S
arch/x86/lib/retpoline.S
arch/x86/mm/mem_encrypt_boot.S
arch/x86/power/hibernate_asm_64.S
arch/x86/xen/xen-asm.S
arch/x86/xen/xen-head.S
include/linux/compiler.h

index eb153eff9331afef80a88a012d783d2f7268ee18..b37881bb9f157b4dcb643dbe66d7cd45cf3974db 100644 (file)
@@ -17,6 +17,7 @@
  */
 
 #include <linux/linkage.h>
+#include <linux/objtool.h>
 #include <asm/frame.h>
 
 #define STATE1 %xmm0
@@ -1071,6 +1072,7 @@ SYM_FUNC_END(_aesni_inc)
  *                   size_t len, u8 *iv)
  */
 SYM_FUNC_START(aesni_ctr_enc)
+       ANNOTATE_NOENDBR
        FRAME_BEGIN
        cmp $16, LEN
        jb .Lctr_enc_just_ret
index ea81770629eea62532f8f6429bc08cf6e3be7949..cb0911c5dc5dd7cfa8d9c3f211c480d218b52999 100644 (file)
@@ -431,6 +431,7 @@ For 32-bit we have the following conventions - kernel is built with
 /* rdi:        arg1 ... normal C conventions. rax is saved/restored. */
 .macro THUNK name, func
 SYM_FUNC_START(\name)
+       ANNOTATE_NOENDBR
        pushq %rbp
        movq %rsp, %rbp
 
index b7ea3e8e9eccd540a2ff55eda7a05266a48a4f49..e6d52c2fd0887b75a63387f438d988136dbace6e 100644 (file)
@@ -5,6 +5,7 @@
 
 #include <linux/export.h>
 #include <linux/linkage.h>
+#include <linux/objtool.h>
 #include <asm/msr-index.h>
 #include <asm/unwind_hints.h>
 #include <asm/segment.h>
@@ -17,6 +18,7 @@
 .pushsection .noinstr.text, "ax"
 
 SYM_FUNC_START(entry_ibpb)
+       ANNOTATE_NOENDBR
        movl    $MSR_IA32_PRED_CMD, %ecx
        movl    $PRED_CMD_IBPB, %eax
        xorl    %edx, %edx
index f52dbe0ad93cd1e261f605e7cbd6209517859a07..4e5260cdeb81619bbcb56346bfe4850a340549e2 100644 (file)
@@ -175,6 +175,7 @@ SYM_CODE_END(entry_SYSCALL_64)
  */
 .pushsection .text, "ax"
 SYM_FUNC_START(__switch_to_asm)
+       ANNOTATE_NOENDBR
        /*
         * Save callee-saved registers
         * This must match the order in inactive_task_frame
@@ -742,6 +743,7 @@ _ASM_NOKPROBE(common_interrupt_return)
  * Is in entry.text as it shouldn't be instrumented.
  */
 SYM_FUNC_START(asm_load_gs_index)
+       ANNOTATE_NOENDBR
        FRAME_BEGIN
        swapgs
 .Lgs_change:
@@ -1526,6 +1528,7 @@ SYM_CODE_END(rewind_stack_and_make_dead)
  * refactored in the future if needed.
  */
 SYM_FUNC_START(clear_bhb_loop)
+       ANNOTATE_NOENDBR
        push    %rbp
        mov     %rsp, %rbp
        movl    $5, %ecx
index a02bc6f3d2e6a43d4e00c4657986382029065aa0..29c5c32c16c364fe27251d5cc304a34909024d6f 100644 (file)
@@ -58,6 +58,7 @@ SYM_CODE_END(asm_fred_entrypoint_kernel)
 
 #if IS_ENABLED(CONFIG_KVM_INTEL)
 SYM_FUNC_START(asm_fred_entry_from_kvm)
+       ANNOTATE_NOENDBR
        push %rbp
        mov %rsp, %rbp
 
index c9216ac4fb1eb8c1e5bc5e33b41e9e40c7924cbf..bf9f4f63e1b41eb1762d2e7c1d7846b802346646 100644 (file)
@@ -133,6 +133,7 @@ KBUILD_CFLAGS_32 += -fno-stack-protector
 KBUILD_CFLAGS_32 += $(call cc-option, -foptimize-sibling-calls)
 KBUILD_CFLAGS_32 += -fno-omit-frame-pointer
 KBUILD_CFLAGS_32 += -DDISABLE_BRANCH_PROFILING
+KBUILD_CFLAGS_32 += -DBUILD_VDSO
 
 ifdef CONFIG_MITIGATION_RETPOLINE
 ifneq ($(RETPOLINE_VDSO_CFLAGS),)
index dc31b13b87a0d17020aaf2d3915da366b1b62d59..4835c67bb5ddbc13fa6e918330992aca579d8d50 100644 (file)
 
 /* SYM_FUNC_START -- use for global functions */
 #define SYM_FUNC_START(name)                           \
-       SYM_START(name, SYM_L_GLOBAL, SYM_F_ALIGN)      \
-       ENDBR
+       SYM_START(name, SYM_L_GLOBAL, SYM_F_ALIGN)
 
 /* SYM_FUNC_START_NOALIGN -- use for global functions, w/o alignment */
 #define SYM_FUNC_START_NOALIGN(name)                   \
-       SYM_START(name, SYM_L_GLOBAL, SYM_A_NONE)       \
-       ENDBR
+       SYM_START(name, SYM_L_GLOBAL, SYM_A_NONE)
 
 /* SYM_FUNC_START_LOCAL -- use for local functions */
 #define SYM_FUNC_START_LOCAL(name)                     \
-       SYM_START(name, SYM_L_LOCAL, SYM_F_ALIGN)       \
-       ENDBR
+       SYM_START(name, SYM_L_LOCAL, SYM_F_ALIGN)
 
 /* SYM_FUNC_START_LOCAL_NOALIGN -- use for local functions, w/o alignment */
 #define SYM_FUNC_START_LOCAL_NOALIGN(name)             \
-       SYM_START(name, SYM_L_LOCAL, SYM_A_NONE)        \
-       ENDBR
+       SYM_START(name, SYM_L_LOCAL, SYM_A_NONE)
 
 /* SYM_FUNC_START_WEAK -- use for weak functions */
 #define SYM_FUNC_START_WEAK(name)                      \
-       SYM_START(name, SYM_L_WEAK, SYM_F_ALIGN)        \
-       ENDBR
+       SYM_START(name, SYM_L_WEAK, SYM_F_ALIGN)
 
 /* SYM_FUNC_START_WEAK_NOALIGN -- use for weak functions, w/o alignment */
 #define SYM_FUNC_START_WEAK_NOALIGN(name)              \
-       SYM_START(name, SYM_L_WEAK, SYM_A_NONE)         \
-       ENDBR
+       SYM_START(name, SYM_L_WEAK, SYM_A_NONE)
 
 #endif /* _ASM_X86_LINKAGE_H */
 
index d63576608ce765127bd3b3c654dc4d2d9ca4c46a..5c5cfa076a27ececbaab4ed796f20dec34b34a5d 100644 (file)
@@ -60,6 +60,7 @@ static inline void clear_page(void *page)
 }
 
 void copy_page(void *to, void *from);
+KCFI_REFERENCE(copy_page);
 
 #ifdef CONFIG_X86_5LEVEL
 /*
index fea56b04f4365049d4d5b09fbf327ede3fe2ac7a..8b36a9562191c829445849f9ef0bff7ec23bd32d 100644 (file)
@@ -244,7 +244,17 @@ extern struct paravirt_patch_template pv_ops;
 
 int paravirt_disable_iospace(void);
 
-/* This generates an indirect call based on the operation type number. */
+/*
+ * This generates an indirect call based on the operation type number.
+ *
+ * Since alternatives run after enabling CET/IBT -- the latter setting/clearing
+ * capabilities and the former requiring all capabilities being finalized --
+ * these indirect calls are subject to IBT and the paravirt stubs should have
+ * ENDBR on.
+ *
+ * OTOH since this is effectively a __nocfi indirect call, the paravirt stubs
+ * don't need to bother with CFI prefixes.
+ */
 #define PARAVIRT_CALL                                  \
        ANNOTATE_RETPOLINE_SAFE                         \
        "call *%[paravirt_opptr];"
index 03e7c2d495597597a635f83116fafa1a95ed357e..21ce480658b14b27aaf4f10832a92d1e3aa3c28e 100644 (file)
@@ -42,14 +42,14 @@ static __always_inline void native_write_cr2(unsigned long val)
        asm volatile("mov %0,%%cr2": : "r" (val) : "memory");
 }
 
-static inline unsigned long __native_read_cr3(void)
+static __always_inline unsigned long __native_read_cr3(void)
 {
        unsigned long val;
        asm volatile("mov %%cr3,%0\n\t" : "=r" (val) : __FORCE_ORDER);
        return val;
 }
 
-static inline void native_write_cr3(unsigned long val)
+static __always_inline void native_write_cr3(unsigned long val)
 {
        asm volatile("mov %0,%%cr3": : "r" (val) : "memory");
 }
index 9d0b324eab213a5bac319a3be854daeb0d2f15ba..79e9695dc13e41d889b5479f2d597a27635b6b70 100644 (file)
@@ -21,6 +21,7 @@ extern void *__memcpy(void *to, const void *from, size_t len);
 #define __HAVE_ARCH_MEMSET
 void *memset(void *s, int c, size_t n);
 void *__memset(void *s, int c, size_t n);
+KCFI_REFERENCE(__memset);
 
 /*
  * KMSAN needs to instrument as much code as possible. Use C versions of
@@ -70,6 +71,7 @@ static inline void *memset64(uint64_t *s, uint64_t v, size_t n)
 #define __HAVE_ARCH_MEMMOVE
 void *memmove(void *dest, const void *src, size_t count);
 void *__memmove(void *dest, const void *src, size_t count);
+KCFI_REFERENCE(__memmove);
 
 int memcmp(const void *cs, const void *ct, size_t count);
 size_t strlen(const char *s);
index 4e498d28cdc85933a36fd00c621b1e2c949e5fef..aefb9cb583addd204475653c1e3b8efa5b4480df 100644 (file)
@@ -14,6 +14,7 @@
  * rsi: PGD of the identity mapping
  */
 SYM_FUNC_START(asm_acpi_mp_play_dead)
+       ANNOTATE_NOENDBR
        /* Turn off global entries. Following CR3 write will flush them. */
        movq    %cr4, %rdx
        andq    $~(X86_CR4_PGE), %rdx
index b200a193beeb354c547f3755c66decbadea6b543..04f561f75e9905c994586474aa8e518b44ede6b5 100644 (file)
@@ -17,6 +17,7 @@
         * Hooray, we are in Long 64-bit mode (but still running in low memory)
         */
 SYM_FUNC_START(wakeup_long64)
+       ANNOTATE_NOENDBR
        movq    saved_magic(%rip), %rax
        movq    $0x123456789abcdef0, %rdx
        cmpq    %rdx, %rax
index 9a252bb0d34b8bd8a760ac2b45f41cf9f50df95b..e914a65ff15419be950ea9f905e55430162397a3 100644 (file)
@@ -926,11 +926,7 @@ struct bpf_insn;
 extern unsigned int __bpf_prog_runX(const void *ctx,
                                    const struct bpf_insn *insn);
 
-/*
- * Force a reference to the external symbol so the compiler generates
- * __kcfi_typid.
- */
-__ADDRESSABLE(__bpf_prog_runX);
+KCFI_REFERENCE(__bpf_prog_runX);
 
 /* u32 __ro_after_init cfi_bpf_hash = __kcfi_typeid___bpf_prog_runX; */
 asm (
@@ -947,7 +943,7 @@ asm (
 /* Must match bpf_callback_t */
 extern u64 __bpf_callback_fn(u64, u64, u64, u64, u64);
 
-__ADDRESSABLE(__bpf_callback_fn);
+KCFI_REFERENCE(__bpf_callback_fn);
 
 /* u32 __ro_after_init cfi_bpf_subprog_hash = __kcfi_typeid___bpf_callback_fn; */
 asm (
index d516472285967773e04d12889e2ef0de2ffc9464..367da36381678f1a05d781963aedac861548d453 100644 (file)
@@ -146,12 +146,14 @@ SYM_FUNC_END(ftrace_stub_graph)
 #ifdef CONFIG_DYNAMIC_FTRACE
 
 SYM_FUNC_START(__fentry__)
+       ANNOTATE_NOENDBR
        CALL_DEPTH_ACCOUNT
        RET
 SYM_FUNC_END(__fentry__)
 EXPORT_SYMBOL(__fentry__)
 
 SYM_FUNC_START(ftrace_caller)
+       ANNOTATE_NOENDBR
        /* save_mcount_regs fills in first two parameters */
        save_mcount_regs
 
@@ -197,6 +199,7 @@ SYM_FUNC_END(ftrace_caller);
 STACK_FRAME_NON_STANDARD_FP(ftrace_caller)
 
 SYM_FUNC_START(ftrace_regs_caller)
+       ANNOTATE_NOENDBR
        /* Save the current flags before any operations that can change them */
        pushfq
 
@@ -310,6 +313,7 @@ SYM_FUNC_END(ftrace_regs_caller)
 STACK_FRAME_NON_STANDARD_FP(ftrace_regs_caller)
 
 SYM_FUNC_START(ftrace_stub_direct_tramp)
+       ANNOTATE_NOENDBR
        CALL_DEPTH_ACCOUNT
        RET
 SYM_FUNC_END(ftrace_stub_direct_tramp)
@@ -317,6 +321,7 @@ SYM_FUNC_END(ftrace_stub_direct_tramp)
 #else /* ! CONFIG_DYNAMIC_FTRACE */
 
 SYM_FUNC_START(__fentry__)
+       ANNOTATE_NOENDBR
        CALL_DEPTH_ACCOUNT
 
        cmpq $ftrace_stub, ftrace_trace_function
index 7f542a7799cb760c9e26642cd9ccfdee70a7cde3..fdabd5dda154a57d87e2af86bcfe8efca816a647 100644 (file)
@@ -9,6 +9,7 @@
  */
 .pushsection .noinstr.text, "ax"
 SYM_FUNC_START(native_save_fl)
+       ENDBR
        pushf
        pop %_ASM_AX
        RET
index 1ccaa3397a670894f93e115b2495e43ba81649c0..1dc114c810ac99d42d8ab3edb0b9f39a5e6dc5ac 100644 (file)
@@ -116,6 +116,16 @@ static noinstr void pv_native_write_cr2(unsigned long val)
        native_write_cr2(val);
 }
 
+static noinstr unsigned long pv_native_read_cr3(void)
+{
+       return __native_read_cr3();
+}
+
+static noinstr void pv_native_write_cr3(unsigned long cr3)
+{
+       native_write_cr3(cr3);
+}
+
 static noinstr unsigned long pv_native_get_debugreg(int regno)
 {
        return native_get_debugreg(regno);
@@ -203,8 +213,8 @@ struct paravirt_patch_template pv_ops = {
 #ifdef CONFIG_PARAVIRT_XXL
        .mmu.read_cr2           = __PV_IS_CALLEE_SAVE(pv_native_read_cr2),
        .mmu.write_cr2          = pv_native_write_cr2,
-       .mmu.read_cr3           = __native_read_cr3,
-       .mmu.write_cr3          = native_write_cr3,
+       .mmu.read_cr3           = pv_native_read_cr3,
+       .mmu.write_cr3          = pv_native_write_cr3,
 
        .mmu.pgd_alloc          = __paravirt_pgd_alloc,
        .mmu.pgd_free           = paravirt_nop,
index cc5077b122d6e9ae2ce258a02f47bac381c05b57..a508e4a8c66a2583ef0b2e6dadad2c53686a0097 100644 (file)
@@ -2,6 +2,7 @@
 #include <linux/export.h>
 #include <linux/linkage.h>
 #include <linux/cfi_types.h>
+#include <linux/objtool.h>
 #include <asm/asm.h>
 
 /*
@@ -64,6 +65,7 @@ EXPORT_SYMBOL_GPL(clear_page_erms)
  * rcx: uncleared bytes or 0 if successful.
  */
 SYM_FUNC_START(rep_stos_alternative)
+       ANNOTATE_NOENDBR
        cmpq $64,%rcx
        jae .Lunrolled
 
index fc9fb5d0617443c2b25a2bf97bd8a6ea988b8478..aa8c341b24419ccb569f02b22c293ef05d13a0da 100644 (file)
@@ -8,6 +8,8 @@
 
 #include <linux/export.h>
 #include <linux/linkage.h>
+#include <linux/cfi_types.h>
+#include <linux/objtool.h>
 #include <asm/cpufeatures.h>
 #include <asm/alternative.h>
 #include <asm/asm.h>
@@ -30,6 +32,7 @@
  * it simpler for us, we can clobber rsi/rdi and rax freely.
  */
 SYM_FUNC_START(rep_movs_alternative)
+       ANNOTATE_NOENDBR
        cmpq $64,%rcx
        jae .Llarge
 
index 2918e36eece22a906022975a0e56bdeda934197d..18350b343c2abbaf4731219e7187d3625cdee143 100644 (file)
@@ -5,6 +5,7 @@
 
 #include <linux/export.h>
 #include <linux/linkage.h>
+#include <linux/objtool.h>
 #include <asm/asm.h>
 
 /*
@@ -27,6 +28,7 @@
  * rax uncopied bytes or 0 if successful.
  */
 SYM_FUNC_START(__copy_user_nocache)
+       ANNOTATE_NOENDBR
        /* If destination is not 7-byte aligned, we'll have to align it */
        testb $7,%dil
        jne .Lalign
index 89ecd57c9d4234e58a4fb4f8dd23e93774b2106b..71d8e7da4fc5549de1ec5c645a4ebbeecda2c4d2 100644 (file)
@@ -28,6 +28,7 @@
 
 #include <linux/export.h>
 #include <linux/linkage.h>
+#include <linux/objtool.h>
 #include <asm/page_types.h>
 #include <asm/errno.h>
 #include <asm/asm-offsets.h>
@@ -62,6 +63,7 @@
 
        .text
 SYM_FUNC_START(__get_user_1)
+       ANNOTATE_NOENDBR
        check_range size=1
        ASM_STAC
        UACCESS movzbl (%_ASM_AX),%edx
@@ -72,6 +74,7 @@ SYM_FUNC_END(__get_user_1)
 EXPORT_SYMBOL(__get_user_1)
 
 SYM_FUNC_START(__get_user_2)
+       ANNOTATE_NOENDBR
        check_range size=2
        ASM_STAC
        UACCESS movzwl (%_ASM_AX),%edx
@@ -82,6 +85,7 @@ SYM_FUNC_END(__get_user_2)
 EXPORT_SYMBOL(__get_user_2)
 
 SYM_FUNC_START(__get_user_4)
+       ANNOTATE_NOENDBR
        check_range size=4
        ASM_STAC
        UACCESS movl (%_ASM_AX),%edx
@@ -92,6 +96,7 @@ SYM_FUNC_END(__get_user_4)
 EXPORT_SYMBOL(__get_user_4)
 
 SYM_FUNC_START(__get_user_8)
+       ANNOTATE_NOENDBR
 #ifndef CONFIG_X86_64
        xor %ecx,%ecx
 #endif
@@ -111,6 +116,7 @@ EXPORT_SYMBOL(__get_user_8)
 
 /* .. and the same for __get_user, just without the range checks */
 SYM_FUNC_START(__get_user_nocheck_1)
+       ANNOTATE_NOENDBR
        ASM_STAC
        ASM_BARRIER_NOSPEC
        UACCESS movzbl (%_ASM_AX),%edx
@@ -121,6 +127,7 @@ SYM_FUNC_END(__get_user_nocheck_1)
 EXPORT_SYMBOL(__get_user_nocheck_1)
 
 SYM_FUNC_START(__get_user_nocheck_2)
+       ANNOTATE_NOENDBR
        ASM_STAC
        ASM_BARRIER_NOSPEC
        UACCESS movzwl (%_ASM_AX),%edx
@@ -131,6 +138,7 @@ SYM_FUNC_END(__get_user_nocheck_2)
 EXPORT_SYMBOL(__get_user_nocheck_2)
 
 SYM_FUNC_START(__get_user_nocheck_4)
+       ANNOTATE_NOENDBR
        ASM_STAC
        ASM_BARRIER_NOSPEC
        UACCESS movl (%_ASM_AX),%edx
@@ -141,6 +149,7 @@ SYM_FUNC_END(__get_user_nocheck_4)
 EXPORT_SYMBOL(__get_user_nocheck_4)
 
 SYM_FUNC_START(__get_user_nocheck_8)
+       ANNOTATE_NOENDBR
        ASM_STAC
        ASM_BARRIER_NOSPEC
 #ifdef CONFIG_X86_64
index 774bdf3e6f0a9d633c60943e7b8f0ed11e9ee537..edbeb3ecad38c4845bf3e9a57c870f5bf7c4088c 100644 (file)
@@ -1,6 +1,7 @@
 /* SPDX-License-Identifier: GPL-2.0 */
 #include <linux/export.h>
 #include <linux/linkage.h>
+#include <linux/objtool.h>
 
 #include <asm/asm.h>
 
@@ -9,6 +10,7 @@
  * %rdi: w
  */
 SYM_FUNC_START(__sw_hweight32)
+       ANNOTATE_NOENDBR
 
 #ifdef CONFIG_X86_64
        movl %edi, %eax                         # w
@@ -42,6 +44,7 @@ EXPORT_SYMBOL(__sw_hweight32)
  */
 #ifdef CONFIG_X86_64
 SYM_FUNC_START(__sw_hweight64)
+       ANNOTATE_NOENDBR
        pushq   %rdi
        pushq   %rdx
 
index 975c9c18263d2afd926c12a8bfffe0c2d72d43cd..46d9e9b98a618fa684a2d8eb2c12e144e6ecc717 100644 (file)
@@ -13,6 +13,7 @@
  */
 #include <linux/export.h>
 #include <linux/linkage.h>
+#include <linux/objtool.h>
 #include <asm/thread_info.h>
 #include <asm/errno.h>
 #include <asm/asm.h>
@@ -45,6 +46,7 @@
 
 .text
 SYM_FUNC_START(__put_user_1)
+       ANNOTATE_NOENDBR
        check_range size=1
        ASM_STAC
 1:     movb %al,(%_ASM_CX)
@@ -55,6 +57,7 @@ SYM_FUNC_END(__put_user_1)
 EXPORT_SYMBOL(__put_user_1)
 
 SYM_FUNC_START(__put_user_nocheck_1)
+       ANNOTATE_NOENDBR
        ASM_STAC
 2:     movb %al,(%_ASM_CX)
        xor %ecx,%ecx
@@ -64,6 +67,7 @@ SYM_FUNC_END(__put_user_nocheck_1)
 EXPORT_SYMBOL(__put_user_nocheck_1)
 
 SYM_FUNC_START(__put_user_2)
+       ANNOTATE_NOENDBR
        check_range size=2
        ASM_STAC
 3:     movw %ax,(%_ASM_CX)
@@ -74,6 +78,7 @@ SYM_FUNC_END(__put_user_2)
 EXPORT_SYMBOL(__put_user_2)
 
 SYM_FUNC_START(__put_user_nocheck_2)
+       ANNOTATE_NOENDBR
        ASM_STAC
 4:     movw %ax,(%_ASM_CX)
        xor %ecx,%ecx
@@ -83,6 +88,7 @@ SYM_FUNC_END(__put_user_nocheck_2)
 EXPORT_SYMBOL(__put_user_nocheck_2)
 
 SYM_FUNC_START(__put_user_4)
+       ANNOTATE_NOENDBR
        check_range size=4
        ASM_STAC
 5:     movl %eax,(%_ASM_CX)
@@ -93,6 +99,7 @@ SYM_FUNC_END(__put_user_4)
 EXPORT_SYMBOL(__put_user_4)
 
 SYM_FUNC_START(__put_user_nocheck_4)
+       ANNOTATE_NOENDBR
        ASM_STAC
 6:     movl %eax,(%_ASM_CX)
        xor %ecx,%ecx
@@ -102,6 +109,7 @@ SYM_FUNC_END(__put_user_nocheck_4)
 EXPORT_SYMBOL(__put_user_nocheck_4)
 
 SYM_FUNC_START(__put_user_8)
+       ANNOTATE_NOENDBR
        check_range size=8
        ASM_STAC
 7:     mov %_ASM_AX,(%_ASM_CX)
@@ -115,6 +123,7 @@ SYM_FUNC_END(__put_user_8)
 EXPORT_SYMBOL(__put_user_8)
 
 SYM_FUNC_START(__put_user_nocheck_8)
+       ANNOTATE_NOENDBR
        ASM_STAC
 9:     mov %_ASM_AX,(%_ASM_CX)
 #ifdef CONFIG_X86_32
index 391059b2c6fbc4a571f0582c7c4654147a930cef..038f49a43ab4335cf03df6482530b83760996627 100644 (file)
@@ -326,6 +326,7 @@ SYM_FUNC_END(retbleed_untrain_ret)
 #if defined(CONFIG_MITIGATION_UNRET_ENTRY) || defined(CONFIG_MITIGATION_SRSO)
 
 SYM_FUNC_START(entry_untrain_ret)
+       ANNOTATE_NOENDBR
        ALTERNATIVE JMP_RETBLEED_UNTRAIN_RET, JMP_SRSO_UNTRAIN_RET, X86_FEATURE_SRSO
 SYM_FUNC_END(entry_untrain_ret)
 __EXPORT_THUNK(entry_untrain_ret)
index e25288ee33c2df72755451175269775e8e1481a8..f8a33b25ae869e3be9f841e33ab0e289213033e5 100644 (file)
@@ -72,6 +72,7 @@ SYM_FUNC_START(sme_encrypt_execute)
 SYM_FUNC_END(sme_encrypt_execute)
 
 SYM_FUNC_START(__enc_copy)
+       ANNOTATE_NOENDBR
 /*
  * Routine used to encrypt memory in place.
  *   This routine must be run outside of the kernel proper since
index 0a0539e1cc81427b9e9c0e419e1419a99c630095..8c534c36adfa2865349f1d4c202345abdc721a7e 100644 (file)
@@ -26,6 +26,7 @@
         /* code below belongs to the image kernel */
        .align PAGE_SIZE
 SYM_FUNC_START(restore_registers)
+       ANNOTATE_NOENDBR
        /* go back to the original page tables */
        movq    %r9, %cr3
 
@@ -119,6 +120,7 @@ SYM_FUNC_END(restore_image)
 
        /* code below has been relocated to a safe page */
 SYM_FUNC_START(core_restore_code)
+       ANNOTATE_NOENDBR
        /* switch to temporary page tables */
        movq    %rax, %cr3
        /* flush TLB */
index b518f36d1ca2e73bff35e6734c5bfb4d845af989..109af12f76472787a58f943b7412cdc4434ec77f 100644 (file)
@@ -51,6 +51,7 @@ SYM_FUNC_END(xen_hypercall_pv)
  * non-zero.
  */
 SYM_FUNC_START(xen_irq_disable_direct)
+       ENDBR
        movb $1, PER_CPU_VAR(xen_vcpu_info + XEN_vcpu_info_mask)
        RET
 SYM_FUNC_END(xen_irq_disable_direct)
@@ -90,6 +91,7 @@ SYM_FUNC_END(check_events)
  * then enter the hypervisor to get them handled.
  */
 SYM_FUNC_START(xen_irq_enable_direct)
+       ENDBR
        FRAME_BEGIN
        /* Unmask events */
        movb $0, PER_CPU_VAR(xen_vcpu_info + XEN_vcpu_info_mask)
@@ -120,6 +122,7 @@ SYM_FUNC_END(xen_irq_enable_direct)
  * x86 use opposite senses (mask vs enable).
  */
 SYM_FUNC_START(xen_save_fl_direct)
+       ENDBR
        testb $0xff, PER_CPU_VAR(xen_vcpu_info + XEN_vcpu_info_mask)
        setz %ah
        addb %ah, %ah
@@ -127,6 +130,7 @@ SYM_FUNC_START(xen_save_fl_direct)
 SYM_FUNC_END(xen_save_fl_direct)
 
 SYM_FUNC_START(xen_read_cr2)
+       ENDBR
        FRAME_BEGIN
        _ASM_MOV PER_CPU_VAR(xen_vcpu), %_ASM_AX
        _ASM_MOV XEN_vcpu_info_arch_cr2(%_ASM_AX), %_ASM_AX
@@ -135,6 +139,7 @@ SYM_FUNC_START(xen_read_cr2)
 SYM_FUNC_END(xen_read_cr2);
 
 SYM_FUNC_START(xen_read_cr2_direct)
+       ENDBR
        FRAME_BEGIN
        _ASM_MOV PER_CPU_VAR(xen_vcpu_info + XEN_vcpu_info_arch_cr2), %_ASM_AX
        FRAME_END
index 894edf8d6d62f8a7db7a86b1b5765b0a24e0a3fb..8d6873edff36e550286d213bf825c37cea08e192 100644 (file)
@@ -133,11 +133,13 @@ SYM_FUNC_START(xen_hypercall_hvm)
 SYM_FUNC_END(xen_hypercall_hvm)
 
 SYM_FUNC_START(xen_hypercall_amd)
+       ANNOTATE_NOENDBR
        vmmcall
        RET
 SYM_FUNC_END(xen_hypercall_amd)
 
 SYM_FUNC_START(xen_hypercall_intel)
+       ANNOTATE_NOENDBR
        vmcall
        RET
 SYM_FUNC_END(xen_hypercall_intel)
index 200fd3c5bc70d0f10e9a9df3c7dc425a063d6507..aa7f0a9f6085212d2bb7306aa6b54049b20fc94e 100644 (file)
@@ -212,6 +212,16 @@ void ftrace_likely_update(struct ftrace_likely_data *f, int val,
 
 #endif /* __KERNEL__ */
 
+#if defined(CONFIG_CFI_CLANG) && !defined(__DISABLE_EXPORTS) && !defined(BUILD_VDSO)
+/*
+ * Force a reference to the external symbol so the compiler generates
+ * __kcfi_typid.
+ */
+#define KCFI_REFERENCE(sym) __ADDRESSABLE(sym)
+#else
+#define KCFI_REFERENCE(sym)
+#endif
+
 /**
  * offset_to_ptr - convert a relative memory offset to an absolute pointer
  * @off:       the address of the 32-bit offset value