From patchwork Sat Jun 11 16:12:12 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kees Cook X-Patchwork-Id: 9171079 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 5B4C160573 for ; Sat, 11 Jun 2016 16:12:36 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 4E1D626907 for ; Sat, 11 Jun 2016 16:12:36 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 42BA426E1A; Sat, 11 Jun 2016 16:12:36 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_MED,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from mother.openwall.net (mother.openwall.net [195.42.179.200]) by mail.wl.linuxfoundation.org (Postfix) with SMTP id 60DD126907 for ; Sat, 11 Jun 2016 16:12:34 +0000 (UTC) Received: (qmail 13424 invoked by uid 550); 11 Jun 2016 16:12:32 -0000 Mailing-List: contact kernel-hardening-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-ID: Reply-To: kernel-hardening@lists.openwall.com Delivered-To: mailing list kernel-hardening@lists.openwall.com Received: (qmail 13360 invoked from network); 11 Jun 2016 16:12:27 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=date:from:to:cc:subject:message-id:mime-version:content-disposition; bh=mTezW0NuoRcJcic+ygcN7pZhpzHk8rsrOYMVWxUVV1U=; b=oGvCXFp/17MV0Ehp8QWt2QjjwvAz/53fp2pi+epQGWzPggMcG6X+t5GltMV6zpH/L5 uZpuJG5mcI3a3g3Hqt0knaviZmCBrQFykKAoI7xtpLT6h/+w/89Fgb2hg3n1ls7Bwtlp 3k9zsYxYrnUbJfqnhCiQyNaNXMDx0o2WaHpQQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:date:from:to:cc:subject:message-id:mime-version :content-disposition; bh=mTezW0NuoRcJcic+ygcN7pZhpzHk8rsrOYMVWxUVV1U=; b=ZGpuJux+yNBGxIuHddPSVoDoeXu7qzpKSt5oEqvocGVM5RS9fpZu/6YPN7yBmXXcwL 1FVE97e/bB5ktJYWEBQ2qcspBztLz4v41VlEAxkwIuyBJO3x3SF8+A4t82eQ0Q03t9ca dNgGseKthMvCb+groCLV27YsVZll3iv6VCRxbcx1//YaBpfNMrBRO7ylgeBJ9hL4ZaUU 8AMcSfuV3P02IoHRdvTa1kv5vxoJ1lUQnvQsXqIaPftPY6aS27q8SpcD/kz9KMwcToyQ 9IeKGET8EGZtv9kKVlTRKtpM0qsu3DlE3whiA5uas4HjN24ofng0G8edUPtDGNEBs13p YIOw== X-Gm-Message-State: ALyK8tKOnV450JwuqgJ7Aei59ZtrkrSrvThzi38VYlfuBbivwtxbuBsQQJClKteHOqWvs9uq X-Received: by 10.66.170.168 with SMTP id an8mr9545157pac.47.1465661534903; Sat, 11 Jun 2016 09:12:14 -0700 (PDT) Date: Sat, 11 Jun 2016 09:12:12 -0700 From: Kees Cook To: Michal Marek Cc: Stephen Rothwell , Emese Revfy , Paul Gortmaker , Sudip Mukherjee , Linux-Next , linux-kernel@vger.kernel.org, kernel-hardening@lists.openwall.com Message-ID: <20160611161212.GA29370@www.outflux.net> MIME-Version: 1.0 Content-Disposition: inline Subject: [kernel-hardening] [PATCH] gcc-plugins: disable under COMPILE_TEST X-Virus-Scanned: ClamAV using ClamSMTP Since adding the gcc plugin development headers is required for the gcc plugin support, we should ease into this new kernel build dependency more slowly. For now, disable the gcc plugins under COMPILE_TEST so that all*config builds will skip it. Signed-off-by: Kees Cook --- arch/Kconfig | 1 + lib/Kconfig.debug | 4 ++-- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/arch/Kconfig b/arch/Kconfig index 83aa2a3c470d..3f06d678b1d7 100644 --- a/arch/Kconfig +++ b/arch/Kconfig @@ -366,6 +366,7 @@ config HAVE_GCC_PLUGINS menuconfig GCC_PLUGINS bool "GCC plugins" depends on HAVE_GCC_PLUGINS + depends on !COMPILE_TEST help GCC plugins are loadable modules that provide extra features to the compiler. They are useful for runtime instrumentation and static analysis. diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index d40833b9b7f4..0f9981999a27 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug @@ -713,8 +713,8 @@ config KCOV bool "Code coverage for fuzzing" depends on ARCH_HAS_KCOV select DEBUG_FS - select GCC_PLUGINS - select GCC_PLUGIN_SANCOV + select GCC_PLUGINS if !COMPILE_TEST + select GCC_PLUGIN_SANCOV if !COMPILE_TEST help KCOV exposes kernel code coverage information in a form suitable for coverage-guided fuzzing (randomized testing).