From: Kees Cook <keescook@chromium.org> To: Masahiro Yamada <masahiroy@kernel.org> Cc: Peter Zijlstra <peterz@infradead.org>, Thomas Gleixner <tglx@linutronix.de>, X86 ML <x86@kernel.org>, Linux Kbuild mailing list <linux-kbuild@vger.kernel.org>, linux-arm-kernel <linux-arm-kernel@lists.infradead.org>, Linux Kernel Mailing List <linux-kernel@vger.kernel.org> Subject: Re: [PATCH] kbuild: Provide way to actually disable stack protector Date: Fri, 26 Jun 2020 13:18:46 -0700 [thread overview] Message-ID: <202006261314.B6856AA96@keescook> (raw) In-Reply-To: <CAK7LNARRU7j_aSgZreuR-jyFYAipaJwZjUwzmE9RcohgKJvS8w@mail.gmail.com> On Sat, Jun 27, 2020 at 04:04:33AM +0900, Masahiro Yamada wrote: > On Tue, Jun 23, 2020 at 2:37 PM Kees Cook <keescook@chromium.org> wrote: > > > > On Tue, Jun 23, 2020 at 11:33:53AM +0900, Masahiro Yamada wrote: > > > Is it OK to not patch syscall_x32.c ? > > > > Good question. Peter? (It seems all the syscall_*.c files are just a > > table, not code -- why do they need any instrumentation changes?) I'd still like to know the answer to this one... > Is it useful when we know > DISABLE_STACKPROTECTOR = -fno-stack-protector ? I'm fine with that. My point was the using _REMOVE isn't going to work for some compiler builds. > I'd rather want to apply this patch > https://patchwork.kernel.org/patch/11628493/ > and hard-code -fno-stack-protector where necessary. That's fine. I will send a separate fix for arch/x86/entry/Makefile. > cc-flags-y comes after KBUILD_CFLAGS > so that -fno-stack-protector can negate -fstack-protector(-strong) Okay, good. -- Kees Cook
WARNING: multiple messages have this Message-ID (diff)
From: Kees Cook <keescook@chromium.org> To: Masahiro Yamada <masahiroy@kernel.org> Cc: Linux Kbuild mailing list <linux-kbuild@vger.kernel.org>, Peter Zijlstra <peterz@infradead.org>, X86 ML <x86@kernel.org>, Linux Kernel Mailing List <linux-kernel@vger.kernel.org>, Thomas Gleixner <tglx@linutronix.de>, linux-arm-kernel <linux-arm-kernel@lists.infradead.org> Subject: Re: [PATCH] kbuild: Provide way to actually disable stack protector Date: Fri, 26 Jun 2020 13:18:46 -0700 [thread overview] Message-ID: <202006261314.B6856AA96@keescook> (raw) In-Reply-To: <CAK7LNARRU7j_aSgZreuR-jyFYAipaJwZjUwzmE9RcohgKJvS8w@mail.gmail.com> On Sat, Jun 27, 2020 at 04:04:33AM +0900, Masahiro Yamada wrote: > On Tue, Jun 23, 2020 at 2:37 PM Kees Cook <keescook@chromium.org> wrote: > > > > On Tue, Jun 23, 2020 at 11:33:53AM +0900, Masahiro Yamada wrote: > > > Is it OK to not patch syscall_x32.c ? > > > > Good question. Peter? (It seems all the syscall_*.c files are just a > > table, not code -- why do they need any instrumentation changes?) I'd still like to know the answer to this one... > Is it useful when we know > DISABLE_STACKPROTECTOR = -fno-stack-protector ? I'm fine with that. My point was the using _REMOVE isn't going to work for some compiler builds. > I'd rather want to apply this patch > https://patchwork.kernel.org/patch/11628493/ > and hard-code -fno-stack-protector where necessary. That's fine. I will send a separate fix for arch/x86/entry/Makefile. > cc-flags-y comes after KBUILD_CFLAGS > so that -fno-stack-protector can negate -fstack-protector(-strong) Okay, good. -- Kees Cook _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
next prev parent reply other threads:[~2020-06-26 20:18 UTC|newest] Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top 2020-06-22 19:02 [PATCH] kbuild: Provide way to actually disable stack protector Kees Cook 2020-06-23 2:33 ` Masahiro Yamada 2020-06-23 5:37 ` Kees Cook 2020-06-26 19:04 ` Masahiro Yamada 2020-06-26 19:04 ` Masahiro Yamada 2020-06-26 20:18 ` Kees Cook [this message] 2020-06-26 20:18 ` Kees Cook
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=202006261314.B6856AA96@keescook \ --to=keescook@chromium.org \ --cc=linux-arm-kernel@lists.infradead.org \ --cc=linux-kbuild@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=masahiroy@kernel.org \ --cc=peterz@infradead.org \ --cc=tglx@linutronix.de \ --cc=x86@kernel.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.