| Summary: | -fstack-protector-all causes ssh to SIGSEGV | ||
|---|---|---|---|
| Product: | buildroot | Reporter: | Mario Klebsch <mario> |
| Component: | Other | Assignee: | unassigned |
| Status: | RESOLVED WORKSFORME | ||
| Severity: | normal | CC: | abeard, buildroot |
| Priority: | P5 | ||
| Version: | unspecified | ||
| Target Milestone: | 2010.08 | ||
| Hardware: | PC | ||
| OS: | Linux | ||
| Host: | Target: | ||
| Build: | |||
|
Description
Mario Klebsch
2010-12-20 15:43:55 UTC
Do you have "Enable stack protection support" (BR2_TOOLCHAIN_BUILDROOT_USE_SSP) enabled? If yes, do things work if you disable that and do a fresh rebuild (make clean; make) (In reply to comment #1) > Do you have "Enable stack protection support" (BR2_TOOLCHAIN_BUILDROOT_USE_SSP) > enabled? If yes, do things work if you disable that and do a fresh rebuild > (make clean; make) Where can I find this option? I think, I searched all menuconfig branches, but was unable to find this option. I anso grep'ed all Config.in's for "Enable stack protection support" and for BR2_TOOLCHAIN_BUILDROOT_USE_SSP, but I cannot find this entry. :-( 73, Mario (In reply to comment #2) > Where can I find this option? I think, I searched all menuconfig branches, but > was unable to find this option. I anso grep'ed all Config.in's for "Enable > stack protection support" and for BR2_TOOLCHAIN_BUILDROOT_USE_SSP, but I cannot > find this entry. :-( I finally found it in toolchain/toolchain-buildroot/Config.in.2 The compiler is still running... 73, Mario (In reply to comment #1) > Do you have "Enable stack protection support" (BR2_TOOLCHAIN_BUILDROOT_USE_SSP) > enabled? If yes, do things work if you disable that and do a fresh rebuild > (make clean; make) This option was enabled, and now, after I have disabled this option and rebuild everything, it seems to work fine. - Is there an incomaptibility bewteen stack prot4ectiona nd ucLibC or my alix target system? - Could it be, that some choosen value in my kernels .config might be the cause of my trouble? - Will Buildroot 2010.11 allow me to use stack protection on my target system? - How does the %gs register fit into this problem? I have learned, that this register is related to thread local storage, but it is hard to find information about x86 register usage on linux systems on the web. 73, Mario I seem to be having the same problem on a proprietary Geode LX board I'm working with. I just updated to the 2011.02 and with uclibc 0.9.31 if I enable stack protection all ssh related executables immediately cause a segfault. Disabling stack protection seems to alleviate the problem. One thing I have found is that this problem does not seem to occur with uclibc 09.32-rc2, though. With the new release candidate I can enable or disable stack protection without causing a problem. At this point we're still trying to decide if we'd rather continue with a pre-release c library or without stack protection. Maybe this should be reported on the uclibc list. Also the official 0.9.32 should be released fairly soon now, so probably you'll be able to have *both* an official release and stack protection in your product :-) Mario, Andrew, any news on this bug ? I think it's safe to close this bug, i've done testing with stack protection and openssh and couldn't hit this issue. Besides it seems to be solved by uclibc 0.9.32+ according to comment #5 and we don't do 0.9.31 for anything other than avr32 now. |