[PATCH] purgatory: Disabling GCC's stack protection

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Apr 30, 2015 at 01:39:50PM +0900, Simon Horman wrote:
> Hi Kevin,
> 
> On Tue, Apr 28, 2015 at 08:50:19PM +0800, Kevin Hao wrote:
> > If the GCC's stack protection is enabled by default, the purgatory will
> > also be built with this option. But it makes no sense to enable this
> > for the purgatory code, and would cause error when we are trying to
> > relocate the purgatory codes because symbol like __stack_chk_fail is
> > unresolved. Instead of disabling this for some archs specifically,
> > disable it for all the archs.
> > 
> > Signed-off-by: Kevin Hao <kexin.hao at windriver.com>
> 
> This seems like a reasonable change to me, however, it does
> not apply cleanly to the kexec tree on kernel.org which I maintain.
> 
> https://git.kernel.org/pub/scm/utils/kernel/kexec/kexec-tools.git
> 
> Could you rebase and repost?

I have now realised that Mike Frysinger has posted a similar,
slightly more comprehensive, patch which I have now applied.

Could you see if it addresses the problem you are seeing?

It is the following commit in the above tree:

4a837c9a19f9 purgatory: force PIC/PIE/SSP off



[Index of Archives]     [LM Sensors]     [Linux Sound]     [ALSA Users]     [ALSA Devel]     [Linux Audio Users]     [Linux Media]     [Kernel]     [Gimp]     [Yosemite News]     [Linux Media]

  Powered by Linux