[Buildroot] [PATCH v2 01/28] boot/arm-trusted-firmware: option to disable stack protection
Thomas Petazzoni
thomas.petazzoni at bootlin.com
Wed Jun 9 21:40:15 UTC 2021
On Wed, 9 Jun 2021 22:59:36 +0300
Sergey Matyukevich <geomatsi at gmail.com> wrote:
> +config BR2_TARGET_ARM_TRUSTED_FIRMWARE_DISABLE_SSP
> + bool "Disable stack protection"
> + help
> + Select this option to explicitly disable stack protection checks in GCC.
> + Such checks need to be disabled if ATF platform port does not implement
> + plat_get_stack_protector_canary() hook.
It's a bit annoying that we have to tell TF-A about this. If TF-A
doesn't implement plat_get_stack_protector_canary() for a certain
platform, why does it try to enable SSP ? It feels like something that
should be fixed in TF-A.
Thomas
--
Thomas Petazzoni, co-owner and CEO, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com
More information about the buildroot
mailing list