From patchwork Fri Jul 17 21:49:39 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Hauke Mehrtens X-Patchwork-Id: 1331442 X-Patchwork-Delegate: hauke@hauke-m.de Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.openwrt.org (client-ip=2001:8b0:10b:1231::1; helo=merlin.infradead.org; envelope-from=openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=hauke-m.de Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=merlin.20170209 header.b=a5M1ZXqx; dkim-atps=neutral Received: from merlin.infradead.org (merlin.infradead.org [IPv6:2001:8b0:10b:1231::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4B7lQ50GD6z9sRk for ; Sat, 18 Jul 2020 07:59:08 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:To:From: Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender :Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Owner; bh=kfZZ+Ugqi/1HD4LI866lRMW7N8SBF9cDVWWY/CbD+gg=; b=a5M1ZXqxjrGvR15aPEU49mKWxX j+3KvpheG6hru65yzFRJM6Ygv/g/xq/75lqv0HTZcAuldtNBLQD0wh8O535BvIq0J1U/JaQRQ0JBw Kv1HPfAaYF5EyjDF0HX3Y6mcfKkYjXBChPucXArQqfU463KlgT3jtg2D5MwNRVuWD0yzuXiDWS8vG r6IIuGM7u8fRuEuBOEJfwcXdTxKiNf87AUG2d/0tU9Q32fjJwgBEgDR6fWypgDdkMB0bz4Ald85Fy O0uUU5cB96sFl5BwqqrzCXA9lER1WKy8b4vOEf0NGZiMPNlv6qI45UdNqO0WzzqyTAUl3GyNaezL3 bLpE8n2Q==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1jwYF0-0000rL-Ll; Fri, 17 Jul 2020 21:50:02 +0000 Received: from mout-p-103.mailbox.org ([2001:67c:2050::465:103]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1jwYEx-0000qi-Tk for openwrt-devel@lists.openwrt.org; Fri, 17 Jul 2020 21:50:01 +0000 Received: from smtp2.mailbox.org (smtp2.mailbox.org [IPv6:2001:67c:2050:105:465:1:2:0]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by mout-p-103.mailbox.org (Postfix) with ESMTPS id 4B7lCR6KhZzKmgV; Fri, 17 Jul 2020 23:49:55 +0200 (CEST) X-Virus-Scanned: amavisd-new at heinlein-support.de Received: from smtp2.mailbox.org ([80.241.60.241]) by spamfilter04.heinlein-hosting.de (spamfilter04.heinlein-hosting.de [80.241.56.122]) (amavisd-new, port 10030) with ESMTP id JfDOveIVJTAc; Fri, 17 Jul 2020 23:49:52 +0200 (CEST) From: Hauke Mehrtens To: openwrt-devel@lists.openwrt.org Subject: [PATCH] build: Remove dependency of user space stack cookies from kernel Date: Fri, 17 Jul 2020 23:49:39 +0200 Message-Id: <20200717214939.19554-1-hauke@hauke-m.de> MIME-Version: 1.0 X-MBO-SPAM-Probability: 0 X-Rspamd-Score: -4.21 / 15.00 / 15.00 X-Rspamd-Queue-Id: 033A91780 X-Rspamd-UID: 155b3f X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20200717_175000_112589_9789E268 X-CRM114-Status: UNSURE ( 8.49 ) X-CRM114-Notice: Please train this message. X-Spam-Score: 0.0 (/) X-Spam-Report: SpamAssassin version 3.4.4 on merlin.infradead.org summary: Content analysis details: (0.0 points) pts rule name description ---- ---------------------- -------------------------------------------------- -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record X-BeenThere: openwrt-devel@lists.openwrt.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: OpenWrt Development List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Hauke Mehrtens Sender: "openwrt-devel" Errors-To: openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org Currently the user space stack cookies work well also when the kernel stack cookies are not activated. This is handled completely in user space and does not need kernel support. This dependency was probably needed some years ago when the libc did not support stack cookies. Signed-off-by: Hauke Mehrtens Reviewed-by: Ian Cooper --- config/Config-build.in | 2 -- 1 file changed, 2 deletions(-) diff --git a/config/Config-build.in b/config/Config-build.in index ac1e05d2ff49..199277167bf7 100644 --- a/config/Config-build.in +++ b/config/Config-build.in @@ -256,10 +256,8 @@ menu "Global build settings" bool "None" config PKG_CC_STACKPROTECTOR_REGULAR bool "Regular" - depends on KERNEL_CC_STACKPROTECTOR_REGULAR config PKG_CC_STACKPROTECTOR_STRONG bool "Strong" - depends on KERNEL_CC_STACKPROTECTOR_STRONG endchoice choice