|
Message-ID: <201906142002.833D224C6F@keescook> Date: Fri, 14 Jun 2019 20:08:42 -0700 From: Kees Cook <keescook@...omium.org> To: Jann Horn <jannh@...gle.com> Cc: Denis 'GNUtoo' Carikli <GNUtoo@...erdimension.org>, Emese Revfy <re.emese@...il.com>, Paul Kocialkowski <paul.kocialkowski@...tlin.com>, Kernel Hardening <kernel-hardening@...ts.openwall.com>, linux-arm-kernel@...ts.infradead.org, Russell King <linux@...linux.org.uk> Subject: Re: [PATCH] security: do not enable CONFIG_GCC_PLUGINS by default On Fri, Jun 14, 2019 at 06:05:19PM +0200, Jann Horn wrote: > On Fri, Jun 14, 2019 at 5:10 PM Denis 'GNUtoo' Carikli > <GNUtoo@...erdimension.org> wrote: > > Booting was broken by the following commit: > > 9f671e58159a ("security: Create "kernel hardening" config area") > > I don't think GCC_PLUGINS alone is supposed to generate any code? It > just makes it possible to enable a bunch of other kconfig flags that > can generate code. > > STACKPROTECTOR_PER_TASK defaults to y and depends on GCC_PLUGINS, so > is that perhaps what broke? Can you try whether disabling just that > works for you? Yes, this has come up before: the option you want to disable is as Jann mentions: CONFIG_STACKPROTECTOR_PER_TASK. > My guess is that maybe there is some early boot code that needs to > have the stack protector disabled, or something like that. Right, though I'm not sure what portion would be specific to that device. You can turn off SSP on a per-file basis with: CFLAGS_target.o += $(DISABLE_ARM_SSP_PER_TASK_PLUGIN) or per-Makefile, as in arch/arm/boot/compressed/Makefile. -- Kees Cook
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.