diff options
author | Alexander Popov <alex.popov@linux.com> | 2020-06-24 15:33:27 +0300 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2020-06-24 07:48:27 -0700 |
commit | ddfaf0e43e9bd4341dc2c24d48ac218f2fb1530a (patch) | |
tree | 852de6402040c64b01d3c83bb1f0159119c9802a /kernel/stackleak.c | |
parent | 005e696df65d0ff90468ecf38a50aa584dc82421 (diff) | |
download | linux-ddfaf0e43e9bd4341dc2c24d48ac218f2fb1530a.tar.bz2 |
ARM: vdso: Don't use gcc plugins for building vgettimeofday.c
Don't use gcc plugins for building arch/arm/vdso/vgettimeofday.c to
avoid unneeded instrumentation. As previously discussed[1]:
arm_ssp_per_task_plugin.c
32-bit ARM only (but likely needs disabling for 32-bit ARM vDSO?)
cyc_complexity_plugin.c
compile-time reporting only
latent_entropy_plugin.c
this shouldn't get triggered for the vDSO (no __latent_entropy
nor __init attributes in vDSO), but perhaps explicitly disabling
it would be a sensible thing to do, just for robustness?
randomize_layout_plugin.c
this shouldn't get triggered (again, lacking attributes), but
should likely be disabled too.
sancov_plugin.c
This should be tracking the KCOV directly (see
scripts/Makefile.kcov), which is already disabled here.
structleak_plugin.c
This should be fine in the vDSO, but there's no security
boundary here, so it wouldn't be important to KEEP it enabled.
[1] https://lore.kernel.org/lkml/20200610073046.GA15939@willie-the-truck/
Signed-off-by: Alexander Popov <alex.popov@linux.com>
Link: https://lore.kernel.org/r/20200624123330.83226-3-alex.popov@linux.com
Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'kernel/stackleak.c')
0 files changed, 0 insertions, 0 deletions