From mboxrd@z Thu Jan 1 00:00:00 1970 From: Arnout Vandecappelle Date: Fri, 13 Nov 2015 08:10:05 +0100 Subject: [Buildroot] [PATCH v2 1/1] qemu: add patch to fix SSP support detection In-Reply-To: References: <1447280301-9225-1-git-send-email-rprebello@gmail.com> <5643CF83.6000800@mind.be> <56444B9D.3060501@mind.be> Message-ID: <56458CCD.6030305@mind.be> List-Id: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: buildroot@busybox.net On 12-11-15 16:04, Rodrigo Rebello wrote: > Arnout, All > > 2015-11-12 6:19 GMT-02:00 Arnout Vandecappelle : >> >> >> On 12-11-15 00:49, Rodrigo Rebello wrote: >>> Arnout, >>> >>> 2015-11-11 21:30 GMT-02:00 Arnout Vandecappelle : >>>> On 11-11-15 23:18, Rodrigo Rebello wrote: >> [snip] >>>>> +diff --git a/configure b/configure >>>>> +index cd219d8..a6f4101 100755 >>>>> +--- a/configure >>>>> ++++ b/configure >>>>> +@@ -1471,6 +1471,24 @@ for flag in $gcc_flags; do >>>>> + done >>>>> + >>>>> + if test "$stack_protector" != "no"; then >>>>> ++ cat > $TMPC << EOF >>>>> ++void foo(const char *c); >>>> >>>> This declaration is unnecessary. >>>> >>> >>> Actually it is necessary, otherwise compiling the test code fails with: >>> >>> config-temp/qemu-conf.c:3:6: error: no previous prototype for ?foo? >>> [-Werror=missing-prototypes] >>> void foo(const char *c) >>> ^ >>> >>> Because in configure, line 410, -Wmissing-prototypes is added to >>> QEMU_FLAGS (used in every compile test), and tests are run with >>> -Werror by default, unless --disable-werror is passed to the configure >>> script. >> >> Right. And I guess declaring it static means that the whole function could be >> elided so still no stack protection. >> >> I wonder what would happen if LTO were enabled, since in that case the function >> could be elided again... >> > > Indeed, I've run a test with LTO enabled and no stack protection code > gets emitted due to the optimizations. Finding a test code fragment > that works for all possibilities isn't so simple after all. > > Maybe we should stick to the original v1 of this patch which disables > SSP detection when it's known to be unsupported in the toolchain? Far > from perfect, but at least it's more robust. It would be nicer to find a fundamental upstreamable solution, but yes, the original solution was more robust. > >> To solve this fundamentally in buildroot, perhaps we should patch the gcc >> wrapper to fail when -fstack-protector-* is passed when SSP is not enabled. >> > > Yes, that would be nice since it would serve as a solution to many > other similar SSP detection failure cases. Perhaps I should look into > that? Or wait until more people provide their views on this? Feel free to look into that. It shouldn't be too hard, we're already iterating over all the arguments in the wrapper so you have an example of how to do it. Just exit(1) immediately when you encounter an option that is not allowed. Regards, Arnout -- Arnout Vandecappelle arnout at mind be Senior Embedded Software Architect +32-16-286500 Essensium/Mind http://www.mind.be G.Geenslaan 9, 3001 Leuven, Belgium BE 872 984 063 RPR Leuven LinkedIn profile: http://www.linkedin.com/in/arnoutvandecappelle GPG fingerprint: 7493 020B C7E3 8618 8DEC 222C 82EB F404 F9AC 0DDF