path: root/kernel/panic.c
diff options
authorThomas Gleixner <tglx@linutronix.de>2020-03-13 13:49:51 +0100
committerThomas Gleixner <tglx@linutronix.de>2020-06-11 15:14:36 +0200
commit5916d5f9b3347344a3d96ba6b54cf8e290eba96a (patch)
tree371d7a89374c7fc5f74b22b5a8210b71a76f44c6 /kernel/panic.c
parent126f21f0e8d46e2c0e9daafb67546dbfb316d325 (diff)
bug: Annotate WARN/BUG/stackfail as noinstr safe
Warnings, bugs and stack protection fails from noinstr sections, e.g. low level and early entry code, are likely to be fatal. Mark them as "safe" to be invoked from noinstr protected code to avoid annotating all usage sites. Getting the information out is important. Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Reviewed-by: Alexandre Chartre <alexandre.chartre@oracle.com> Acked-by: Peter Zijlstra <peterz@infradead.org> Link: https://lkml.kernel.org/r/20200505134100.376598577@linutronix.de
Diffstat (limited to 'kernel/panic.c')
1 files changed, 3 insertions, 1 deletions
diff --git a/kernel/panic.c b/kernel/panic.c
index 85568bbfb12b..e2157ca387c8 100644
--- a/kernel/panic.c
+++ b/kernel/panic.c
@@ -680,10 +680,12 @@ device_initcall(register_warn_debugfs);
* Called when gcc's -fstack-protector feature is used, and
* gcc detects corruption of the on-stack canary value
-__visible void __stack_chk_fail(void)
+__visible noinstr void __stack_chk_fail(void)
+ instrumentation_begin();
panic("stack-protector: Kernel stack is corrupted in: %pB",
+ instrumentation_end();

Privacy Policy