On 13/02/2025 10:00 pm, Volodymyr Babchuk wrote:
> Volodymyr Babchuk (4):
> common: remove -fno-stack-protector from EMBEDDED_EXTRA_CFLAGS
> xen: common: add ability to enable stack protector
> xen: arm: enable stack protector feature
> CHANGELOG.md: Mention stack-protector feature
Given the last minute observation on v4, I ran this through GitlabCI
with STACK_PROTECTOR forced on.
https://gitlab.com/xen-project/people/andyhhp/xen/-/pipelines/1670468808
is the full run.
https://gitlab.com/xen-project/people/andyhhp/xen/-/commit/b07b024f51907bc0f93d581287d36cf5bbfa98e2
is the patch to force things on, including some extra UBSAN because that
got missed.
This is relevant because the only 3 failures present are ARM32 UBSAN
failures in credit2.
Second, in all 3 failures, we've got an `ERROR-EOF!` interrupting the
backtrace, which I presume is something coming out of Expect. Stefano,
any ideas?
My main observation is that there's no exterior way of telling whether
stack protector is actually active or not. i.e. nothing printed during
setup. However, all 4 builds did build common/stack-protector.o so I'm
assuming it was properly active.
If it was going to explode, it would have done before the UBSAN
failures, which are reasonably late on boot.
~Andrew