All of lore.kernel.org
 help / color / mirror / Atom feed
* [Buildroot] [PATCH] package/xvisor: unconditionally disable SSP
@ 2019-11-09 16:47 Eric Le Bihan
  2019-11-10 18:45 ` Yann E. MORIN
  2019-12-31  8:58 ` Yann E. MORIN
  0 siblings, 2 replies; 4+ messages in thread
From: Eric Le Bihan @ 2019-11-09 16:47 UTC (permalink / raw)
  To: buildroot

Fixes:

- http://autobuild.buildroot.net/results/5de37d3da17ca5cb17c0113d942ce8c22c0074e0
- http://autobuild.buildroot.net/results/41b00d95ec4eb851abceaa7919aa1c533d4f16e8
- http://autobuild.buildroot.net/results/119e22e8b03991ab9196e428a131f5a8ae2a2b2f

Signed-off-by: Eric Le Bihan <eric.le.bihan.dev@free.fr>
---
 ...MAKEFILE-Unconditionally-disable-SSP.patch | 31 +++++++++++++++++++
 1 file changed, 31 insertions(+)
 create mode 100644 package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch

diff --git a/package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch b/package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch
new file mode 100644
index 0000000000..b69a745462
--- /dev/null
+++ b/package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch
@@ -0,0 +1,31 @@
+From f04d1b73a9060e8f09cf1173f89daab73d6c0a18 Mon Sep 17 00:00:00 2001
+From: Eric Le Bihan <eric.le.bihan.dev@free.fr>
+Date: Sat, 9 Nov 2019 17:13:46 +0100
+Subject: [PATCH] [MAKEFILE] Unconditionally disable SSP
+
+Though -nostdlib is passed in $(cflags), -fno-stack-protector must also be
+passed to avoid linking errors related to undefined references to
+'__stack_chk_guard' and '__stack_chk_fail' if toolchain enforces
+-fstack-protector.
+
+Signed-off-by: Eric Le Bihan <eric.le.bihan.dev@free.fr>
+---
+ Makefile | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/Makefile b/Makefile
+index d6bcf519..de8e1043 100644
+--- a/Makefile
++++ b/Makefile
+@@ -137,7 +137,7 @@ cppflags+=$(cpu-cppflags)
+ cppflags+=$(board-cppflags)
+ cppflags+=$(libs-cppflags-y)
+ cc=$(CROSS_COMPILE)gcc
+-cflags=-g -Wall -nostdlib --sysroot=$(drivers_dir)/include -fno-builtin -D__VMM__
++cflags=-g -Wall -nostdlib --sysroot=$(drivers_dir)/include -fno-builtin -D__VMM__ -fno-stack-protector
+ cflags+=$(board-cflags) 
+ cflags+=$(cpu-cflags) 
+ cflags+=$(libs-cflags-y) 
+-- 
+2.21.0
+
-- 
2.21.0

^ permalink raw reply related	[flat|nested] 4+ messages in thread

* [Buildroot] [PATCH] package/xvisor: unconditionally disable SSP
  2019-11-09 16:47 [Buildroot] [PATCH] package/xvisor: unconditionally disable SSP Eric Le Bihan
@ 2019-11-10 18:45 ` Yann E. MORIN
  2019-11-17 18:35   ` Arnout Vandecappelle
  2019-12-31  8:58 ` Yann E. MORIN
  1 sibling, 1 reply; 4+ messages in thread
From: Yann E. MORIN @ 2019-11-10 18:45 UTC (permalink / raw)
  To: buildroot

Arnout, All,

This change looks a lot like what was done for kvm-unit-tests in c0ffd16e4.
What do you think of it?

Regards,
Yann E. MORIN.

On 2019-11-09 17:47 +0100, Eric Le Bihan spake thusly:
> Fixes:
> - http://autobuild.buildroot.net/results/5de37d3da17ca5cb17c0113d942ce8c22c0074e0
> - http://autobuild.buildroot.net/results/41b00d95ec4eb851abceaa7919aa1c533d4f16e8
> - http://autobuild.buildroot.net/results/119e22e8b03991ab9196e428a131f5a8ae2a2b2f
> 
> Signed-off-by: Eric Le Bihan <eric.le.bihan.dev@free.fr>
> ---
>  ...MAKEFILE-Unconditionally-disable-SSP.patch | 31 +++++++++++++++++++
>  1 file changed, 31 insertions(+)
>  create mode 100644 package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch
> 
> diff --git a/package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch b/package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch
> new file mode 100644
> index 0000000000..b69a745462
> --- /dev/null
> +++ b/package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch
> @@ -0,0 +1,31 @@
> +From f04d1b73a9060e8f09cf1173f89daab73d6c0a18 Mon Sep 17 00:00:00 2001
> +From: Eric Le Bihan <eric.le.bihan.dev@free.fr>
> +Date: Sat, 9 Nov 2019 17:13:46 +0100
> +Subject: [PATCH] [MAKEFILE] Unconditionally disable SSP
> +
> +Though -nostdlib is passed in $(cflags), -fno-stack-protector must also be
> +passed to avoid linking errors related to undefined references to
> +'__stack_chk_guard' and '__stack_chk_fail' if toolchain enforces
> +-fstack-protector.
> +
> +Signed-off-by: Eric Le Bihan <eric.le.bihan.dev@free.fr>
> +---
> + Makefile | 2 +-
> + 1 file changed, 1 insertion(+), 1 deletion(-)
> +
> +diff --git a/Makefile b/Makefile
> +index d6bcf519..de8e1043 100644
> +--- a/Makefile
> ++++ b/Makefile
> +@@ -137,7 +137,7 @@ cppflags+=$(cpu-cppflags)
> + cppflags+=$(board-cppflags)
> + cppflags+=$(libs-cppflags-y)
> + cc=$(CROSS_COMPILE)gcc
> +-cflags=-g -Wall -nostdlib --sysroot=$(drivers_dir)/include -fno-builtin -D__VMM__
> ++cflags=-g -Wall -nostdlib --sysroot=$(drivers_dir)/include -fno-builtin -D__VMM__ -fno-stack-protector
> + cflags+=$(board-cflags) 
> + cflags+=$(cpu-cflags) 
> + cflags+=$(libs-cflags-y) 
> +-- 
> +2.21.0
> +
> -- 
> 2.21.0
> 
> _______________________________________________
> buildroot mailing list
> buildroot at busybox.net
> http://lists.busybox.net/mailman/listinfo/buildroot

-- 
.-----------------.--------------------.------------------.--------------------.
|  Yann E. MORIN  | Real-Time Embedded | /"\ ASCII RIBBON | Erics' conspiracy: |
| +33 662 376 056 | Software  Designer | \ / CAMPAIGN     |  ___               |
| +33 561 099 427 `------------.-------:  X  AGAINST      |  \e/  There is no  |
| http://ymorin.is-a-geek.org/ | _/*\_ | / \ HTML MAIL    |   v   conspiracy.  |
'------------------------------^-------^------------------^--------------------'

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [Buildroot] [PATCH] package/xvisor: unconditionally disable SSP
  2019-11-10 18:45 ` Yann E. MORIN
@ 2019-11-17 18:35   ` Arnout Vandecappelle
  0 siblings, 0 replies; 4+ messages in thread
From: Arnout Vandecappelle @ 2019-11-17 18:35 UTC (permalink / raw)
  To: buildroot



On 10/11/2019 19:45, Yann E. MORIN wrote:
> Arnout, All,
> 
> This change looks a lot like what was done for kvm-unit-tests in c0ffd16e4.
> What do you think of it?

 It's not entirely the same: kvm-unit-tests uses HOSTCC, which is broken on
Arch. Since we can't fix the host compiler, that's the best we could do.

 [I notice now that that commit didn't actually fix anything... I'll send a
patch for it.]

 Here, however, the target compiler does get used, so it's Buildroot's compiler
that is broken. So I'd prefer to find a solution that fixes the compiler :-)

> 
> Regards,
> Yann E. MORIN.
> 
> On 2019-11-09 17:47 +0100, Eric Le Bihan spake thusly:
>> Fixes:
>> - http://autobuild.buildroot.net/results/5de37d3da17ca5cb17c0113d942ce8c22c0074e0
>> - http://autobuild.buildroot.net/results/41b00d95ec4eb851abceaa7919aa1c533d4f16e8
>> - http://autobuild.buildroot.net/results/119e22e8b03991ab9196e428a131f5a8ae2a2b2f
>>
>> Signed-off-by: Eric Le Bihan <eric.le.bihan.dev@free.fr>
>> ---
>>  ...MAKEFILE-Unconditionally-disable-SSP.patch | 31 +++++++++++++++++++
>>  1 file changed, 31 insertions(+)
>>  create mode 100644 package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch
>>
>> diff --git a/package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch b/package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch
>> new file mode 100644
>> index 0000000000..b69a745462
>> --- /dev/null
>> +++ b/package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch
>> @@ -0,0 +1,31 @@
>> +From f04d1b73a9060e8f09cf1173f89daab73d6c0a18 Mon Sep 17 00:00:00 2001
>> +From: Eric Le Bihan <eric.le.bihan.dev@free.fr>
>> +Date: Sat, 9 Nov 2019 17:13:46 +0100
>> +Subject: [PATCH] [MAKEFILE] Unconditionally disable SSP
>> +
>> +Though -nostdlib is passed in $(cflags), -fno-stack-protector must also be
>> +passed to avoid linking errors related to undefined references to
>> +'__stack_chk_guard' and '__stack_chk_fail' if toolchain enforces
>> +-fstack-protector.
>> +
>> +Signed-off-by: Eric Le Bihan <eric.le.bihan.dev@free.fr>
>> +---
>> + Makefile | 2 +-
>> + 1 file changed, 1 insertion(+), 1 deletion(-)
>> +
>> +diff --git a/Makefile b/Makefile
>> +index d6bcf519..de8e1043 100644
>> +--- a/Makefile
>> ++++ b/Makefile
>> +@@ -137,7 +137,7 @@ cppflags+=$(cpu-cppflags)
>> + cppflags+=$(board-cppflags)
>> + cppflags+=$(libs-cppflags-y)
>> + cc=$(CROSS_COMPILE)gcc
>> +-cflags=-g -Wall -nostdlib --sysroot=$(drivers_dir)/include -fno-builtin -D__VMM__
>> ++cflags=-g -Wall -nostdlib --sysroot=$(drivers_dir)/include -fno-builtin -D__VMM__ -fno-stack-protector

 I think we should not add -fstack-protector in our toolchain-wrapper if
-nostdlib of -ffreestanding is passed on the command line. It probably doesn't
capture all cases (e.g. it's possible to build a simple file without
-ffreestanding and then link it with -nostdlib, but the object file will already
have stack protector in that case so it will still fail).

 On the other hand, maybe the number of packages that suffer from this is so
small that it's easier to fix packages. This patch does look pretty
upstreamable. And apparently it was merged [1] though I don't see it in the repo...

 Regards,
 Arnout

[1] https://github.com/xvisor/xvisor/pull/120

>> + cflags+=$(board-cflags) 
>> + cflags+=$(cpu-cflags) 
>> + cflags+=$(libs-cflags-y) 
>> +-- 
>> +2.21.0
>> +
>> -- 
>> 2.21.0
>>
>> _______________________________________________
>> buildroot mailing list
>> buildroot at busybox.net
>> http://lists.busybox.net/mailman/listinfo/buildroot
> 

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [Buildroot] [PATCH] package/xvisor: unconditionally disable SSP
  2019-11-09 16:47 [Buildroot] [PATCH] package/xvisor: unconditionally disable SSP Eric Le Bihan
  2019-11-10 18:45 ` Yann E. MORIN
@ 2019-12-31  8:58 ` Yann E. MORIN
  1 sibling, 0 replies; 4+ messages in thread
From: Yann E. MORIN @ 2019-12-31  8:58 UTC (permalink / raw)
  To: buildroot

?ric, All,

On 2019-11-09 17:47 +0100, Eric Le Bihan spake thusly:
> Fixes:
> 
> - http://autobuild.buildroot.net/results/5de37d3da17ca5cb17c0113d942ce8c22c0074e0
> - http://autobuild.buildroot.net/results/41b00d95ec4eb851abceaa7919aa1c533d4f16e8
> - http://autobuild.buildroot.net/results/119e22e8b03991ab9196e428a131f5a8ae2a2b2f
> 
> Signed-off-by: Eric Le Bihan <eric.le.bihan.dev@free.fr>

I added a pointer to the upstream commit, now that it has been accepted,
and applied to master, thanks.

Regards,
Yann E. MORIN.

> ---
>  ...MAKEFILE-Unconditionally-disable-SSP.patch | 31 +++++++++++++++++++
>  1 file changed, 31 insertions(+)
>  create mode 100644 package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch
> 
> diff --git a/package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch b/package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch
> new file mode 100644
> index 0000000000..b69a745462
> --- /dev/null
> +++ b/package/xvisor/0001-MAKEFILE-Unconditionally-disable-SSP.patch
> @@ -0,0 +1,31 @@
> +From f04d1b73a9060e8f09cf1173f89daab73d6c0a18 Mon Sep 17 00:00:00 2001
> +From: Eric Le Bihan <eric.le.bihan.dev@free.fr>
> +Date: Sat, 9 Nov 2019 17:13:46 +0100
> +Subject: [PATCH] [MAKEFILE] Unconditionally disable SSP
> +
> +Though -nostdlib is passed in $(cflags), -fno-stack-protector must also be
> +passed to avoid linking errors related to undefined references to
> +'__stack_chk_guard' and '__stack_chk_fail' if toolchain enforces
> +-fstack-protector.
> +
> +Signed-off-by: Eric Le Bihan <eric.le.bihan.dev@free.fr>
> +---
> + Makefile | 2 +-
> + 1 file changed, 1 insertion(+), 1 deletion(-)
> +
> +diff --git a/Makefile b/Makefile
> +index d6bcf519..de8e1043 100644
> +--- a/Makefile
> ++++ b/Makefile
> +@@ -137,7 +137,7 @@ cppflags+=$(cpu-cppflags)
> + cppflags+=$(board-cppflags)
> + cppflags+=$(libs-cppflags-y)
> + cc=$(CROSS_COMPILE)gcc
> +-cflags=-g -Wall -nostdlib --sysroot=$(drivers_dir)/include -fno-builtin -D__VMM__
> ++cflags=-g -Wall -nostdlib --sysroot=$(drivers_dir)/include -fno-builtin -D__VMM__ -fno-stack-protector
> + cflags+=$(board-cflags) 
> + cflags+=$(cpu-cflags) 
> + cflags+=$(libs-cflags-y) 
> +-- 
> +2.21.0
> +
> -- 
> 2.21.0
> 
> _______________________________________________
> buildroot mailing list
> buildroot at busybox.net
> http://lists.busybox.net/mailman/listinfo/buildroot

-- 
.-----------------.--------------------.------------------.--------------------.
|  Yann E. MORIN  | Real-Time Embedded | /"\ ASCII RIBBON | Erics' conspiracy: |
| +33 662 376 056 | Software  Designer | \ / CAMPAIGN     |  ___               |
| +33 561 099 427 `------------.-------:  X  AGAINST      |  \e/  There is no  |
| http://ymorin.is-a-geek.org/ | _/*\_ | / \ HTML MAIL    |   v   conspiracy.  |
'------------------------------^-------^------------------^--------------------'

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2019-12-31  8:58 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-11-09 16:47 [Buildroot] [PATCH] package/xvisor: unconditionally disable SSP Eric Le Bihan
2019-11-10 18:45 ` Yann E. MORIN
2019-11-17 18:35   ` Arnout Vandecappelle
2019-12-31  8:58 ` Yann E. MORIN

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.