diff options
author | Ingo Molnar <mingo@elte.hu> | 2008-02-23 01:06:55 -0500 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2008-05-26 10:15:31 -0400 |
commit | 4c7f8900f1d8a0e464e7092f132a7e93f7c20f2f (patch) | |
tree | 2f3eed17ac2723d5a68aec38683478599c2096b3 /arch/x86/kernel/Makefile | |
parent | b3733034f113a4119f734b84e94180a42c8bc1a1 (diff) |
x86: stackprotector & PARAVIRT fix
on paravirt enabled 64-bit kernels the paravirt ops do function
calls themselves - which is bad with the stackprotector - for
example pda_init() loads 0 into %gs and then does MSR_GS_BASE
write (which modifies gs.base) - but that MSR write is a function
call on paravirt, which with stackprotector tries to read the
stack canary from the PDA ... crashing the bootup.
the solution was suggested by Arjan van de Ven: to exclude paravirt.c
from stackprotector, too many lowlevel functionality is in it. It's
not like we'll have paravirt functions with character arrays on
their stack anyway...
Signed-off-by: Arjan van de Ven <arjan@linux.intel.com>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Diffstat (limited to 'arch/x86/kernel/Makefile')
-rw-r--r-- | arch/x86/kernel/Makefile | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/arch/x86/kernel/Makefile b/arch/x86/kernel/Makefile index 5e618c3b4720..8161e5a91ca9 100644 --- a/arch/x86/kernel/Makefile +++ b/arch/x86/kernel/Makefile | |||
@@ -14,6 +14,7 @@ nostackp := $(call cc-option, -fno-stack-protector) | |||
14 | CFLAGS_vsyscall_64.o := $(PROFILING) -g0 $(nostackp) | 14 | CFLAGS_vsyscall_64.o := $(PROFILING) -g0 $(nostackp) |
15 | CFLAGS_hpet.o := $(nostackp) | 15 | CFLAGS_hpet.o := $(nostackp) |
16 | CFLAGS_tsc_64.o := $(nostackp) | 16 | CFLAGS_tsc_64.o := $(nostackp) |
17 | CFLAGS_paravirt.o := $(nostackp) | ||
17 | 18 | ||
18 | obj-y := process_$(BITS).o signal_$(BITS).o entry_$(BITS).o | 19 | obj-y := process_$(BITS).o signal_$(BITS).o entry_$(BITS).o |
19 | obj-y += traps_$(BITS).o irq_$(BITS).o | 20 | obj-y += traps_$(BITS).o irq_$(BITS).o |