Displaying 12 results from an estimated 12 matches for "___stack_chk_guard".
Did you mean:
__stack_chk_guard
2013 Mar 12
3
Can't cross-compile from git now.
...compile for instance, this detects
SSP as working, but when I compile it fails with:
CC stream_encoder_framing.lo
CC window.lo
CCLD libFLAC.la
Creating library file: .libs/libFLAC.dll.a
.libs/metadata_iterators.o:metadata_iterators.c:(.text+0x8d): undefined reference to `___stack_chk_guard'
.libs/metadata_iterators.o:metadata_iterators.c:(.text+0x121): undefined reference to `___stack_chk_guard'
.libs/metadata_iterators.o:metadata_iterators.c:(.text+0x14f): undefined reference to `___stack_chk_fail'
The odd thinh is, if I use this MinGW cross-compiler to compile a sm...
2013 Mar 08
6
Can't cross-compile from git now.
...buntu1).
I think that the problem might have been introduced on 5 Mar 2013 with commit 05609d5 (configure.ac : Add hardening compile options.)
Gives errors like this:-
/home/user/FLAC_build/flac-05609d5/src/libFLAC/.libs/libFLAC.a(ogg_helper.o):ogg_helper.c:(.text+0x173): undefined reference to `___stack_chk_guard'
/home/user/FLAC_build/flac-05609d5/src/libFLAC/.libs/libFLAC.a(ogg_helper.o):ogg_helper.c:(.text+0x45c): undefined reference to `___stack_chk_guard'
/home/user/FLAC_build/flac-05609d5/src/libFLAC/.libs/libFLAC.a(ogg_helper.o):ogg_helper.c:(.text+0x463): undefined reference to `___stack_chk...
2013 Mar 09
1
Can't cross-compile from git now.
...nerd.com>
> Date: Sat Mar 9 08:55:37 2013 +1100
>
> configure.ac : Don't enable stack protector for mingw* host_os.
>
Hi,
Please do a link time test instead, I am not getting this error and
would like to keep stack protector on.
The test case below will trigger ___stack_chk_guard to emit.
int main(){
int i = 0;
char a[1000];
while(1){
a[i] = 0;
i++;
}
}
"i686-w64-mingw32-gcc -D_FORTIFY_SOURCE=2 -fstack-protector --param
ssp-buffer-size=4 -v" shows that libssp is already added.
-------------- next part --------------
A non-text attachment was sc...
2013 Mar 12
2
Can't cross-compile from git now.
Erik de Castro Lopo wrote:
> JonY wrote:
>
> > Please do a link time test instead, I am not getting this error and
> > would like to keep stack protector on.
>
> I'll write an m4 macro.
I have attampted to write a macro that reliably detects the availability
of stack smash protection.
I currently have two configurations where my detection says that SSP is
available
2012 Mar 25
1
[LLVMdev] LLVM Metadata to Dwarf tags
...n that thread.
(Example: AsmPrinter::processDebugLoc() no longer exists). Does anyone
have any pointers on how to update this for LLVM/clang 3.0?
To be more specific, I've added a special stack guard intrinsic similar to
StackProtector.cpp which uses a per function random immediate instead
of ___stack_chk_guard. What I am trying to accomplish is to get the offset
into the final x86 object file of each one of these immediate values.
An example of the output in Assembly looks like:
movq $653406579, -8(%rbp) ## imm = 0x26F23173
In reality, I'd settle for a simple way to get the offset into the Obj...
2013 Mar 12
3
Can't cross-compile from git now.
...en I compile it fails with:
>>
>> CC stream_encoder_framing.lo
>> CC window.lo
>> CCLD libFLAC.la
>> Creating library file: .libs/libFLAC.dll.a
>> .libs/metadata_iterators.o:metadata_iterators.c:(.text+0x8d): undefined reference to `___stack_chk_guard'
>> .libs/metadata_iterators.o:metadata_iterators.c:(.text+0x121): undefined reference to `___stack_chk_guard'
>> .libs/metadata_iterators.o:metadata_iterators.c:(.text+0x14f): undefined reference to `___stack_chk_fail'
>>
>> The odd thinh is, if I use this...
2012 Oct 23
1
[LLVMdev] dyld: lazy symbol binding failed: fast lazy bind offset out of range
...ry.cpp:77
77 void *handle = dlopen(filename, RTLD_LAZY|RTLD_GLOBAL);
(gdb)
Reading symbols for shared libraries ... done
dyld: bind: libisl.10.dylib:0x101292010 = libsystem_c.dylib:__DefaultRuneLocale, *0x101292010 = 0x7FFF7A145890
dyld: bind: libisl.10.dylib:0x101292018 = libsystem_c.dylib:___stack_chk_guard, *0x101292018 = 0x7FFF7A1474B0
....
dyld: weak bind: LLVMPolly.so:0x100FB3128 = libc++.1.dylib:__ZdaPv, *0x100FB3128 = 0x7FFF898BD1C6
dyld: weak bind: LLVMPolly.so:0x100FB3130 = libc++.1.dylib:__ZdlPv, *0x100FB3130 = 0x7FFF898BD1AB
dyld: weak bind: LLVMPolly.so:0x100FB3138 = libc++.1.dylib:__Znam,...
2012 Oct 23
0
[LLVMdev] dyld: lazy symbol binding failed: fast lazy bind offset out of range
...void *handle = dlopen(filename, RTLD_LAZY|RTLD_GLOBAL);
> (gdb)
> Reading symbols for shared libraries ... done
> dyld: bind: libisl.10.dylib:0x101292010 = libsystem_c.dylib:__DefaultRuneLocale, *0x101292010 = 0x7FFF7A145890
> dyld: bind: libisl.10.dylib:0x101292018 = libsystem_c.dylib:___stack_chk_guard, *0x101292018 = 0x7FFF7A1474B0
> ....
> dyld: weak bind: LLVMPolly.so:0x100FB3128 = libc++.1.dylib:__ZdaPv, *0x100FB3128 = 0x7FFF898BD1C6
> dyld: weak bind: LLVMPolly.so:0x100FB3130 = libc++.1.dylib:__ZdlPv, *0x100FB3130 = 0x7FFF898BD1AB
> dyld: weak bind: LLVMPolly.so:0x100FB3138 = lib...
2013 Mar 09
4
Can't cross-compile from git now.
...ve been introduced on 5 Mar 2013
>> with commit 05609d5 (configure.ac : Add hardening compile options.)
>
Resending, likely caught by filters.
Hi,
Please do a link time test instead, I am not getting this error and
would like to keep stack protector on.
The test case below will trigger ___stack_chk_guard to emit.
int main(){
int i = 0;
char a[1000];
while(1){
a[i] = 0;
i++;
}
}
"i686-w64-mingw32-gcc -D_FORTIFY_SOURCE=2 -fstack-protector --param
ssp-buffer-size=4 -v" shows that libssp is already added.
Alternatively, to include __stack_chk_fail, use:
extern void __stack...
2012 Oct 22
5
[LLVMdev] dyld: lazy symbol binding failed: fast lazy bind offset out of range
On Oct 22, 2012, at 11:34 AM, Jack Howarth wrote:
> Nick,
> I have uploaded the full walk with 'set env DYLD_PRINT_INITIALIZERS'. It didn't seem very informative
> as the dyld error occurs right after...
>
> (gdb)
> llvm::sys::DynamicLibrary::getPermanentLibrary (filename=0x142903da8 "/sw/opt/llvm-3.2/lib/LLVMPolly.so", errMsg=0x7fff5fbfe6e0) at
2012 Oct 23
2
[LLVMdev] dyld: lazy symbol binding failed: fast lazy bind offset out of range
...n(filename, RTLD_LAZY|RTLD_GLOBAL);
> > (gdb)
> > Reading symbols for shared libraries ... done
> > dyld: bind: libisl.10.dylib:0x101292010 = libsystem_c.dylib:__DefaultRuneLocale, *0x101292010 = 0x7FFF7A145890
> > dyld: bind: libisl.10.dylib:0x101292018 = libsystem_c.dylib:___stack_chk_guard, *0x101292018 = 0x7FFF7A1474B0
> > ....
> > dyld: weak bind: LLVMPolly.so:0x100FB3128 = libc++.1.dylib:__ZdaPv, *0x100FB3128 = 0x7FFF898BD1C6
> > dyld: weak bind: LLVMPolly.so:0x100FB3130 = libc++.1.dylib:__ZdlPv, *0x100FB3130 = 0x7FFF898BD1AB
> > dyld: weak bind: LLVMPolly....
2013 Oct 15
0
[LLVMdev] [llvm-commits] r192750 - Enable MI Sched for x86.
...====================================
>> --- llvm/trunk/test/CodeGen/X86/2010-09-17-SideEffectsInChain.ll (original)
>> +++ llvm/trunk/test/CodeGen/X86/2010-09-17-SideEffectsInChain.ll Tue Oct 15 18:33:07 2013
>> @@ -19,8 +19,8 @@ entry:
>> }
>>
>> ; CHECK: movq ___stack_chk_guard at GOTPCREL(%rip)
>> -; CHECK: movb 38(%rsp), [[R0:%.+]]
>> -; CHECK: movb 8(%rsp), [[R1:%.+]]
>> -; CHECK: movb [[R1]], 8(%rsp)
>> -; CHECK: movb [[R0]], 38(%rsp)
>> +; CHECK: movb (%rsp), [[R1:%.+]]
>> +; CHECK: movb 30(%rsp), [[R0:%.+]]
>> +;...