public inbox for llvm@lists.linux.dev
 help / color / mirror / Atom feed
* [PATCH 0/1] Fix CFI hash randomization with KASAN
@ 2023-01-12 22:49 Sami Tolvanen
  2023-01-12 22:49 ` [PATCH 1/1] kbuild: " Sami Tolvanen
  2023-01-13 23:15 ` [PATCH 0/1] " Kees Cook
  0 siblings, 2 replies; 5+ messages in thread
From: Sami Tolvanen @ 2023-01-12 22:49 UTC (permalink / raw)
  To: Peter Zijlstra (Intel), Masahiro Yamada
  Cc: Nathan Chancellor, Nick Desaulniers, Kees Cook, linux-kbuild,
	llvm, linux-kernel, Sami Tolvanen

Peter, Masahiro,

I noticed that KASAN+CFI fails to boot on x86_64 without
cfi=norand. The randomization code is missing a couple of KASAN
constructors in object files that are not part of vmlinux.o. This
happens because we don't run objtool for the files, which means
the type hashes are not included in the .cfi_sites section.

This patch simply disables KASAN for these files, which seems
reasonable to me and fixes the boot issue, but perhaps you have
better ideas?

Sami


Sami Tolvanen (1):
  kbuild: Fix CFI hash randomization with KASAN

 init/Makefile            | 1 +
 scripts/Makefile.vmlinux | 1 +
 2 files changed, 2 insertions(+)


base-commit: c757fc92a3f73734872c7793b97f06434773d65d
-- 
2.39.0.314.g84b9a713c41-goog


^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2023-01-13 23:15 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-01-12 22:49 [PATCH 0/1] Fix CFI hash randomization with KASAN Sami Tolvanen
2023-01-12 22:49 ` [PATCH 1/1] kbuild: " Sami Tolvanen
2023-01-12 22:52   ` Kees Cook
2023-01-13  9:27   ` Peter Zijlstra
2023-01-13 23:15 ` [PATCH 0/1] " Kees Cook

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox