search for: __stack_chk_guard

Displaying 20 results from an estimated 24 matches for "__stack_chk_guard".

2016 Jun 30
2
Implementing stack probes
I am trying to implement stack probes for our SHAVE target, and I see that the compiler injects references to '__stack_chk_guard' and '__stack_chk_fail'. The code that gets generated is horribly wrong, but in order to understand how to fix it I was wondering if there is a clear statement of how the mechanism is supposed to work? The variable '__stack_chk_guard' appears to be a pointer to an unsigned...
2016 Jun 30
1
Implementing stack probes
On Thu, Jun 30, 2016 at 8:29 AM, Martin J. O'Riordan via llvm-dev < llvm-dev at lists.llvm.org> wrote: > I am trying to implement stack probes for our SHAVE target, and I see that > the compiler injects references to ‘__stack_chk_guard’ and > ‘__stack_chk_fail’. The code that gets generated is horribly wrong, but in > order to understand how to fix it I was wondering if there is a clear > statement of how the mechanism is supposed to work? > __stack_chk_guard is loaded and the resulting value is stored on the stack....
2016 Jan 25
5
[PPC] Linker fails on -fstack-protector
When -fstack-protector is turned on, linker fails to find the symbol "__stack_chk_guard" because at least for powerpc64le, glibc doesn't provide this symbol. Instead, they put the stack guard into TCB. x86 fixed this issue by injecting a special address space (which is later translated to TCB register access) and hard code the offset of stack_guard, but I don't see a eas...
2013 Mar 09
1
Can't cross-compile from git now.
...erd.com> > Date: Sat Mar 9 08:55:37 2013 +1100 > > configure.ac : Don't enable stack protector for mingw* host_os. > Hi, Please do a link time test instead, I am not getting this error and would like to keep stack protector on. The test case below will trigger ___stack_chk_guard to emit. int main(){ int i = 0; char a[1000]; while(1){ a[i] = 0; i++; } } "i686-w64-mingw32-gcc -D_FORTIFY_SOURCE=2 -fstack-protector --param ssp-buffer-size=4 -v" shows that libssp is already added. -------------- next part -------------- A non-text attachment was sc...
2013 Mar 09
4
Can't cross-compile from git now.
...e been introduced on 5 Mar 2013 >> with commit 05609d5 (configure.ac : Add hardening compile options.) > Resending, likely caught by filters. Hi, Please do a link time test instead, I am not getting this error and would like to keep stack protector on. The test case below will trigger ___stack_chk_guard to emit. int main(){ int i = 0; char a[1000]; while(1){ a[i] = 0; i++; } } "i686-w64-mingw32-gcc -D_FORTIFY_SOURCE=2 -fstack-protector --param ssp-buffer-size=4 -v" shows that libssp is already added. Alternatively, to include __stack_chk_fail, use: extern void __stack...
2016 Feb 11
2
[PPC] Linker fails on -fstack-protector
...16 6:59:50 PM > Subject: Re: [llvm-dev] [PPC] Linker fails on -fstack-protector > On Mon, Jan 25, 2016 at 11:58 AM Tim Shen via llvm-dev < > llvm-dev at lists.llvm.org > wrote: > > When -fstack-protector is turned on, linker fails to find the > > symbol > > " __stack_chk_guard" because at least for powerpc64le, glibc > > doesn't > > provide this symbol. Instead, they put the stack guard into TCB. > > > x86 fixed this issue by injecting a special address space (which is > > later translated to TCB register access) and hard code the of...
2016 Feb 20
2
[PPC] Linker fails on -fstack-protector
...] [PPC] Linker fails on -fstack-protector >> >> >> >> >> >> On Mon, Jan 25, 2016 at 11:58 AM Tim Shen via llvm-dev < >> llvm-dev at lists.llvm.org> wrote: >> >>> When -fstack-protector is turned on, linker fails to find the symbol "__stack_chk_guard" >>> because at least for powerpc64le, glibc doesn't provide this symbol. >>> Instead, they put the stack guard into TCB. >>> >>> x86 fixed this issue by injecting a special address space (which is >>> later translated to TCB register access) an...
2013 Mar 08
6
Can't cross-compile from git now.
...untu1). I think that the problem might have been introduced on 5 Mar 2013 with commit 05609d5 (configure.ac : Add hardening compile options.) Gives errors like this:- /home/user/FLAC_build/flac-05609d5/src/libFLAC/.libs/libFLAC.a(ogg_helper.o):ogg_helper.c:(.text+0x173): undefined reference to `___stack_chk_guard' /home/user/FLAC_build/flac-05609d5/src/libFLAC/.libs/libFLAC.a(ogg_helper.o):ogg_helper.c:(.text+0x45c): undefined reference to `___stack_chk_guard' /home/user/FLAC_build/flac-05609d5/src/libFLAC/.libs/libFLAC.a(ogg_helper.o):ogg_helper.c:(.text+0x463): undefined reference to `___stack_chk...
2019 Jul 09
6
Dovecot 2.3.6 on Solaris10: build issues, segfaults
...real problem was a compilation failure when "--enable-hardening" is used. Demonstration: # echo 'int main(){char a[1]; strcpy(a,a);} ' | gcc -w -fstack-protector-strong -x c - Undefined first referenced symbol in file __stack_chk_guard /var/tmp//cc12L9zV.o (symbol scope specifies local binding) ld: fatal: symbol referencing errors. No output written to a.out collect2: error: ld returned 1 exit status I'm not sure if this is a Solaris10 fumble, but configuring "--disable-hardening" removes...
2016 Feb 22
4
[PPC] Linker fails on -fstack-protector
...gt; >>>> >>>> >>>> >>>> On Mon, Jan 25, 2016 at 11:58 AM Tim Shen via llvm-dev < >>>> llvm-dev at lists.llvm.org> wrote: >>>> >>>>> When -fstack-protector is turned on, linker fails to find the symbol "__stack_chk_guard" >>>>> because at least for powerpc64le, glibc doesn't provide this symbol. >>>>> Instead, they put the stack guard into TCB. >>>>> >>>>> x86 fixed this issue by injecting a special address space (which is >>>>> lat...
2013 Feb 20
3
[LLVMdev] Is va_arg correct on Mips backend?
...order .set nomacro .set noat # BB#0: lui $2, %hi(_gp_disp) addiu $2, $2, %lo(_gp_disp) addiu $sp, $sp, -64 $tmp2: .cfi_def_cfa_offset 64 sw $ra, 60($sp) # 4-byte Folded Spill $tmp3: .cfi_offset 31, -4 addu $gp, $2, $25 sw $7, 76($sp) sw $6, 72($sp) sw $5, 68($sp) lw $3, %got(__stack_chk_guard)($gp) lw $1, 0($3) sw $1, 56($sp) sw $4, 52($sp) sw $zero, 48($sp) // i sw $zero, 44($sp) // val sw $zero, 40($sp) // sum addiu $1, $sp, 68 sw $1, 16($sp) // arg_ptr1 sw $zero, 48($sp) b $BB0_2 addiu $2, $zero, 40 $BB0_1: # in Loop: Header=BB0_2 Depth=...
2013 Feb 20
0
[LLVMdev] Is va_arg correct on Mips backend?
...i(_gp_disp) > addiu $2, $2, %lo(_gp_disp) > addiu $sp, $sp, -64 > $tmp2: > .cfi_def_cfa_offset 64 > sw $ra, 60($sp) # 4-byte Folded Spill > $tmp3: > .cfi_offset 31, -4 > addu $gp, $2, $25 > sw $7, 76($sp) > sw $6, 72($sp) > sw $5, 68($sp) > lw $3, %got(__stack_chk_guard)($gp) > lw $1, 0($3) > sw $1, 56($sp) > sw $4, 52($sp) > sw $zero, 48($sp) // i > sw $zero, 44($sp) // val > sw $zero, 40($sp) // sum > addiu $1, $sp, 68 > sw $1, 16($sp) // arg_ptr1 > sw $zero, 48($sp) > b $BB0_2 > addiu $2, $zero, 40 > $BB0_1:...
2019 Jul 09
0
Dovecot 2.3.6 on Solaris10: build issues, segfaults
...> ????"--enable-hardening" is used.? Demonstration: > > ????# echo 'int main(){char a[1]; strcpy(a,a);} ' | gcc -w > -fstack-protector-strong -x c - > ????Undefined?????????????????????? first referenced > ???? symbol???????????????????????????? in file > ????__stack_chk_guard?????????????????? /var/tmp//cc12L9zV.o? (symbol > scope specifies local binding) > ????ld: fatal: symbol referencing errors. No output written to a.out > ????collect2: error: ld returned 1 exit status > > ????I'm not sure if this is a Solaris10 fumble, but configuring > ????&q...
2011 Apr 09
1
pop3-login segfaults (new backtrace)
...e info available. #24 0x00007fffffffe308 in ?? () No symbol table info available. #25 0x00000001005333d0 in ?? () No symbol table info available. #26 0x0000000000000001 in ?? () No symbol table info available. #27 0x00007fffffffe308 in ?? () No symbol table info available. #28 0x0000000800ace8b0 in __stack_chk_guard () from /lib/libc.so.7 No symbol table info available. #29 0x0000000000000001 in ?? () No symbol table info available. #30 0x00007fffffffe2e0 in ?? () No symbol table info available. #31 0x00007fffffffe318 in ?? () No symbol table info available. #32 0x00007fffffffe308 in ?? () No symbol table info...
2013 Feb 19
0
[LLVMdev] Is va_arg correct on Mips backend?
Which part of the generated code do you think is not correct? Could you be more specific? I compiled this program with clang and ran it on a mips board. It returns the expected result (21). On Tue, Feb 19, 2013 at 4:15 AM, Jonathan <gamma_chen at yahoo.com.tw> wrote: > I check the Mips backend for the following C code fragment compile result. > It seems not correct. Is it my
2013 Feb 19
2
[LLVMdev] Is va_arg correct on Mips backend?
I check the Mips backend for the following C code fragment compile result. It seems not correct. Is it my misunderstand or it's a bug. //ch8_3.cpp #include <stdarg.h> int sum_i(int amount, ...) { int i = 0; int val = 0; int sum = 0; va_list vl; va_start(vl, amount); for (i = 0; i < amount; i++) { val = va_arg(vl, int); sum += val; } va_end(vl);
2007 Dec 25
3
ProPolice/SSP in 7.0
Hi there, I'm still running 6.2 on various servers without any tweaks (GENERIC kernel, binary updates via freebsd-update etc.) but lots of ports (apache, postgresql, diablo-jdk etc.) and would like to use stack smashing protection in order to harden my boxes and avoid many potential exploits. I've known about ProPolice/SSP for a while now (from the Gentoo world) and am aware that
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to