diff options
author | Jo Van Bulck <[email protected]> | 2023-08-19 10:09:21 +0200 |
---|---|---|
committer | Borislav Petkov (AMD) <[email protected]> | 2023-10-20 12:50:14 +0200 |
commit | 0bd7feb2df7ef092c6b8914acca706fb21826f80 (patch) | |
tree | bb82c445ca773ebcf4aa1016cd144bd37ead3d24 /lib/test_fortify/write_overflow-memcpy.c | |
parent | 99ee56c7657f939eecc4e8ac96e0aa0cd6ea7cbd (diff) |
x86/pti: Fix kernel warnings for pti= and nopti cmdline options
Parse the pti= and nopti cmdline options using early_param to fix 'Unknown
kernel command line parameters "nopti", will be passed to user space'
warnings in the kernel log when nopti or pti= are passed to the kernel
cmdline on x86 platforms.
Additionally allow the kernel to warn for malformed pti= options.
Signed-off-by: Jo Van Bulck <[email protected]>
Signed-off-by: Ingo Molnar <[email protected]>
Signed-off-by: Borislav Petkov (AMD) <[email protected]>
Reviewed-by: Sohil Mehta <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Diffstat (limited to 'lib/test_fortify/write_overflow-memcpy.c')
0 files changed, 0 insertions, 0 deletions