]> git.ipfire.org Git - thirdparty/linux.git/commit
kstack_erase: Disable kstack_erase for all of arm compressed boot code
authorKees Cook <kees@kernel.org>
Sat, 26 Jul 2025 06:44:26 +0000 (23:44 -0700)
committerKees Cook <kees@kernel.org>
Sat, 26 Jul 2025 21:27:33 +0000 (14:27 -0700)
commit431a380f935e2c74cbaeac65367c70fc18903315
tree69d9022a6784e443959c0bfc37d767ba52b3a1b0
parent8245d47cfaba8a38337a447230b4d01f9946f5e1
kstack_erase: Disable kstack_erase for all of arm compressed boot code

When building with CONFIG_KSTACK_ERASE=y and CONFIG_ARM_ATAG_DTB_COMPAT=y,
the compressed boot environment encounters an undefined symbol error:

    ld.lld: error: undefined symbol: __sanitizer_cov_stack_depth
    >>> referenced by atags_to_fdt.c:135

This occurs because the compiler instruments the atags_to_fdt() function
with sanitizer coverage calls, but the minimal compressed boot environment
lacks access to sanitizer runtime support.

The compressed boot environment already disables stack protector with
-fno-stack-protector. Similarly disable sanitizer coverage by adding
$(DISABLE_KSTACK_ERASE) to the general compiler flags (and remove it
from the one place it was noticed before), which contains the appropriate
flags to prevent sanitizer instrumentation.

This follows the same pattern used in other early boot contexts where
sanitizer runtime support is unavailable.

Reported-by: Linux Kernel Functional Testing <lkft@linaro.org>
Closes: https://lore.kernel.org/all/CA+G9fYtBk8qnpWvoaFwymCx5s5i-5KXtPGpmf=_+UKJddCOnLA@mail.gmail.com
Reported-by: Nathan Chancellor <nathan@kernel.org>
Closes: https://lore.kernel.org/all/20250726004313.GA3650901@ax162
Suggested-by: Nathan Chancellor <nathan@kernel.org>
Tested-by: Nathan Chancellor <nathan@kernel.org>
Signed-off-by: Kees Cook <kees@kernel.org>
arch/arm/boot/compressed/Makefile