Re: [PATCH] KVM: selftests: disable stack protector for all KVM tests

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Mar 13, 2019 at 03:56:25PM -0700, Sean Christopherson wrote:
> On Wed, Mar 13, 2019 at 12:43:14PM -0700, Sean Christopherson wrote:
> > Since 4.8.3, gcc has enabled -fstack-protector by default.  This is
> > problematic for the KVM selftests as they do not configure fs or gs
> > segments (the stack canary is pulled from fs:0x28).  With the default
> > behavior, gcc will insert a stack canary on any function that creates
> > buffers of 8 bytes or more.  As a result, ucall() will hit a triple
> > fault shutdown due to reading a bad fs segment when inserting its
> > stack canary, i.e. every test fails with an unexpected SHUTDOWN.
> > 
> > Fixes: 14c47b7530e2d ("kvm: selftests: introduce ucall")
> > Signed-off-by: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
> > ---
> >  tools/testing/selftests/kvm/Makefile | 2 +-
> >  1 file changed, 1 insertion(+), 1 deletion(-)
> > 
> > diff --git a/tools/testing/selftests/kvm/Makefile b/tools/testing/selftests/kvm/Makefile
> > index 3c1f4bdf9000..596c0864d0df 100644
> > --- a/tools/testing/selftests/kvm/Makefile
> > +++ b/tools/testing/selftests/kvm/Makefile
> > @@ -29,7 +29,7 @@ LIBKVM += $(LIBKVM_$(UNAME_M))
> >  INSTALL_HDR_PATH = $(top_srcdir)/usr
> >  LINUX_HDR_PATH = $(INSTALL_HDR_PATH)/include/
> >  LINUX_TOOL_INCLUDE = $(top_srcdir)/tools/include
> > -CFLAGS += -O2 -g -std=gnu99 -I$(LINUX_TOOL_INCLUDE) -I$(LINUX_HDR_PATH) -Iinclude -I$(<D) -Iinclude/$(UNAME_M) -I..
> > +CFLAGS += -O2 -g -std=gnu99 -fno-stack-protector -I$(LINUX_TOOL_INCLUDE) -I$(LINUX_HDR_PATH) -Iinclude -I$(<D) -Iinclude/$(UNAME_M) -I..
> >  LDFLAGS += -pthread
> >  
> >  # After inclusion, $(OUTPUT) is defined and
> 
> Please ignore this patch, I figured out why the TLS wasn't in the elf
> headers, which is a separate fix of its own.  With the TLS in hand a
> better fix is to actually set fs.

Jumped the gun a bit...  Turns out the other issue was due to recent gcc
versions enabling pie by default.  The "separate fix" I referred to was
to build the tests with '-static', whose side effect was to disable pie.
Another side side effect of '-static' is that the TLS section is listed
in the elf headers, which in turn allows the KVM selftests to define a
legitimate fs.base for the stack canary.

I have working code to point fs at the TLS, so we can easily go that
route if we want to.  But AFAICT, building with '-static' and accessing
TLS in the guest is unecessary (except for the stack canary).  Overall I
think disabling the stack protector is a little less ugly than building
a static binary and adding all of the TLS/fs logic.



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux