[Buildroot] [PATCH v2 01/28] boot/arm-trusted-firmware: option to disable stack protection

Thomas Petazzoni thomas.petazzoni at bootlin.com
Wed Jun 9 21:40:15 UTC 2021


On Wed,  9 Jun 2021 22:59:36 +0300
Sergey Matyukevich <geomatsi at gmail.com> wrote:

> +config BR2_TARGET_ARM_TRUSTED_FIRMWARE_DISABLE_SSP
> +	bool "Disable stack protection"
> +	help
> +	  Select this option to explicitly disable stack protection checks in GCC.
> +	  Such checks need to be disabled if ATF platform port does not implement
> +	  plat_get_stack_protector_canary() hook.

It's a bit annoying that we have to tell TF-A about this. If TF-A
doesn't implement plat_get_stack_protector_canary() for a certain
platform, why does it try to enable SSP ? It feels like something that
should be fixed in TF-A.

Thomas
-- 
Thomas Petazzoni, co-owner and CEO, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com



More information about the buildroot mailing list