Message ID | 20250213220021.2897526-1-volodymyr_babchuk@epam.com (mailing list archive) |
---|---|
Headers | show |
Series | Add/enable stack protector | expand |
On 13/02/2025 10:00 pm, Volodymyr Babchuk wrote: > Volodymyr Babchuk (4): > common: remove -fno-stack-protector from EMBEDDED_EXTRA_CFLAGS > xen: common: add ability to enable stack protector > xen: arm: enable stack protector feature > CHANGELOG.md: Mention stack-protector feature Given the last minute observation on v4, I ran this through GitlabCI with STACK_PROTECTOR forced on. https://gitlab.com/xen-project/people/andyhhp/xen/-/pipelines/1670468808 is the full run. https://gitlab.com/xen-project/people/andyhhp/xen/-/commit/b07b024f51907bc0f93d581287d36cf5bbfa98e2 is the patch to force things on, including some extra UBSAN because that got missed. This is relevant because the only 3 failures present are ARM32 UBSAN failures in credit2. Second, in all 3 failures, we've got an `ERROR-EOF!` interrupting the backtrace, which I presume is something coming out of Expect. Stefano, any ideas? My main observation is that there's no exterior way of telling whether stack protector is actually active or not. i.e. nothing printed during setup. However, all 4 builds did build common/stack-protector.o so I'm assuming it was properly active. If it was going to explode, it would have done before the UBSAN failures, which are reasonably late on boot. ~Andrew
Hi Andrew, Andrew Cooper <andrew.cooper3@citrix.com> writes: > On 13/02/2025 10:00 pm, Volodymyr Babchuk wrote: >> Volodymyr Babchuk (4): >> common: remove -fno-stack-protector from EMBEDDED_EXTRA_CFLAGS >> xen: common: add ability to enable stack protector >> xen: arm: enable stack protector feature >> CHANGELOG.md: Mention stack-protector feature > > Given the last minute observation on v4, I ran this through GitlabCI > with STACK_PROTECTOR forced on. > > https://gitlab.com/xen-project/people/andyhhp/xen/-/pipelines/1670468808 > is the full run. I noticed that you enabled both UBSAN and STACK_PROTECTOR for arm32. Have you tried to run arm32 test with UBSAN only? [...] -- WBR, Volodymyr
On 14/02/2025 12:34 am, Volodymyr Babchuk wrote: > Hi Andrew, > > Andrew Cooper <andrew.cooper3@citrix.com> writes: > >> On 13/02/2025 10:00 pm, Volodymyr Babchuk wrote: >>> Volodymyr Babchuk (4): >>> common: remove -fno-stack-protector from EMBEDDED_EXTRA_CFLAGS >>> xen: common: add ability to enable stack protector >>> xen: arm: enable stack protector feature >>> CHANGELOG.md: Mention stack-protector feature >> Given the last minute observation on v4, I ran this through GitlabCI >> with STACK_PROTECTOR forced on. >> >> https://gitlab.com/xen-project/people/andyhhp/xen/-/pipelines/1670468808 >> is the full run. > I noticed that you enabled both UBSAN and STACK_PROTECTOR for > arm32. Have you tried to run arm32 test with UBSAN only? No, but I'm also confident that the UBSAN failure is unrelated to STACK_PROTECTOR. It turns out it's very gnarly to fix. ~Andrew