Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1851297pxk; Tue, 1 Sep 2020 09:13:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx9OGG9RWpI3RDMo7miAEvABiPQgJzLmy5yu/BjX3NCyOYS8DNrPe2ErNbYyeJUWmSMxiUJ X-Received: by 2002:a17:906:4a8c:: with SMTP id x12mr2213465eju.271.1598976835207; Tue, 01 Sep 2020 09:13:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598976835; cv=none; d=google.com; s=arc-20160816; b=Hogttg4vZZIbP72PEDYk6m1kK/2SSrncgzDHfKQqBTJeRkTJFbA4Y7ozE6EpjU/Sp7 QxQayXwGhLgRXkYa2dnnTD+2dkojAyJr81V7i7YhSNP5CTbjpfwzpfDrB8G5VfMgtI+L JCQliljDPPKHjB/8X26CiNcL+onUulHNQF1FvrsCFF5XVtPNgXlcxTQrskcOAy7mq3YX xHu79DevvcVKWlr4aYzPdanYnS32jy7qOehVMOXyk70FwudYV5Jq4WKwRWVHy1JvMxyl jx+eKK6WSH2nMmhm+W5Cj5OjZ1R3iVOFGdqwb3RUkq//HyBMkOCftUI+NbaporPE1Y5R vulg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=sCj7sN2uQ6ZqikiM2mArFLFMtgdIxc36LNJQEAQcEJ4=; b=aooNOkhHkqpnK83gqsr+OUCDDgDGhaBAmkyA+BC+5+LQjzM0Y2mzR0gYHnM0zpouC/ U8w8XDvRDuipJnUsHLbsQVhDs3OqVN0jYkJk+fBUX5TQn1R4FnoJsQveCEm9h/60hlXP yuX+DRKtBQhX3zi66hxyoFYSo4e/X3OJntBkSlZ4QfrV1W7/RMGIQyRMlMPUGtggCZEP 9kztXtAxq6hDGSqTcdKIoPXkJBHtB7lCJ4Dd9Ta8+QhIw8WV6dW1ToThM1aKJ1bgPgUT I7dVMjf8dekNXmByK9w4QjF5S08xi2wMWl+2FAyrvFBh2Bm1gi4weQ3Nl4EYOcGBUvJj mqjw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yl6BC8DZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 4si735112edw.95.2020.09.01.09.13.30; Tue, 01 Sep 2020 09:13:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yl6BC8DZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731241AbgIAQKp (ORCPT + 99 others); Tue, 1 Sep 2020 12:10:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:46882 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731391AbgIAPiJ (ORCPT ); Tue, 1 Sep 2020 11:38:09 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2E42220E65; Tue, 1 Sep 2020 15:38:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1598974688; bh=oTjC9jfaLqaZgNMzxkpn5Xgk4LZV2PW+EeOGjegi/zA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=yl6BC8DZp1TErz3osVJr9xSHxuyTGiQKyn/2O53+D8ETQ7LwLkSHVdahnYXoANRTe JA+yllBT37Jl0y1x4m8zzy+yM5l6WxxTTf2npci+5T1GTXZdSOM7fv/wSwAMTbDmLJ Ywy0Hfi9wS5Lx2hrycgPWCYwgyh5nz5jjCA0eoc0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexander Popov , Kees Cook , Sasha Levin Subject: [PATCH 5.8 016/255] gcc-plugins/stackleak: Dont instrument itself Date: Tue, 1 Sep 2020 17:07:52 +0200 Message-Id: <20200901151001.568883262@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200901151000.800754757@linuxfoundation.org> References: <20200901151000.800754757@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexander Popov [ Upstream commit 005e696df65d0ff90468ecf38a50aa584dc82421 ] There is no need to try instrumenting functions in kernel/stackleak.c. Otherwise that can cause issues if the cleanup pass of stackleak gcc plugin is disabled. Signed-off-by: Alexander Popov Link: https://lore.kernel.org/r/20200624123330.83226-2-alex.popov@linux.com Signed-off-by: Kees Cook Signed-off-by: Sasha Levin --- kernel/Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/kernel/Makefile b/kernel/Makefile index f3218bc5ec69f..155b5380500ad 100644 --- a/kernel/Makefile +++ b/kernel/Makefile @@ -125,6 +125,7 @@ obj-$(CONFIG_WATCH_QUEUE) += watch_queue.o obj-$(CONFIG_SYSCTL_KUNIT_TEST) += sysctl-test.o +CFLAGS_stackleak.o += $(DISABLE_STACKLEAK_PLUGIN) obj-$(CONFIG_GCC_PLUGIN_STACKLEAK) += stackleak.o KASAN_SANITIZE_stackleak.o := n KCSAN_SANITIZE_stackleak.o := n -- 2.25.1