-
-
Notifications
You must be signed in to change notification settings - Fork 15.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
gdb: configure with stdenv.cc.cc.lib safe path #73574
Conversation
@tmplt Could you please rebase to staging? |
@veprbl done. Pardon the review requests; forgot to change target branch before I pushed the rebase. |
This seems good, but in general what are these safe plugins and where do they come from? I ask because long term I want to always use separate derivations for libgcc, libstdc++, etc, just as we do for compiler-rt and libc++, etc (#26004). |
On 17-11-2019 17:00, John Ericson wrote:
what are these safe plugins and where do they come from?
I'm afraid I don't know. This patch is merely for convenience.
|
name = gdb.name; | ||
buildInputs = [ makeWrapper ]; | ||
propagatedBuildInputs = [ gdb ]; | ||
propagatedUserEnvPkgs = [ gdb ]; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please avoid propagatedUserEnvPkgs
. It's not needed either.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If removed the man-page for gdb is not available. Is there an alternative?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The wrapper could become part of the package itself.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So I should apply my changes in gdb/default.nix
instead?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For sake of simplicity I would actually prefer gdb not being a script.
Instead I would suggest to compile stdenv.cc.cc.lib as default safe path into gcc: https://sourceware.org/gdb/onlinedocs/gdb/Auto_002dloading-safe-path.html using --with-auto-load-safe-path
. Since libgcc is a dependency of gdb this would not increase closure size. There might be other packages that could be of interests such as go
in safe-path. However I would rather put this into a nixos/homemanager module since not everybody uses those.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Personally I just have the whole /nix/store
in my safe path, since I trust the programs that I am debugging in general.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
--with-auto-load-safe-path
Ah, so there is a configure-time option for this; I'll try it out.
I just have the whole
/nix/store
Does this not require you to trust your whole store? I don't, so I have ad-hoc white-listed the libstd++ plugin every update before this patch.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@tmplt right, however I personally don't consider this a problem, since I don't attach GDB to random processes and it depends on the libraries to linked to a process what plugins gdb would load. Also I don't quite share the threat model of GDB. If I execute a malicious program the system would be screwed anyway. An malicious gdb plugin does not add much. It would be only a problem if GDB would attach to an untrusted process, which is not what most people do.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Latest commit adds a configuration flag and scaps the wrapper.
buildInputs = [ makeWrapper ]; | ||
propagatedBuildInputs = [ gdb ]; | ||
propagatedUserEnvPkgs = [ gdb ]; | ||
phases = "installPhase fixupPhase"; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Avoid setting phases. Instead, pass e.g. dontBuild = true;
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ditto: using something like buildCommand
instead doesn't make the man-page available.
They are provided by the packages itself. i.e.:
Gdb looks for them next to the library and load them if their path is white-listed. |
Actually wait, I am not sure about |
@Ericson2314 can you elaborate on what you mean with |
Co-Authored-By: Jörg Thalheim <Mic92@users.noreply.github.com>
Is the intent that you are whitlisiting the libgcc that built gdb, or the libgcc that's probably used in the executable being debugged? |
On 28-11-2019 09:09, John Ericson wrote:
Is the intent that you are whitlisiting the libgcc that built gdb, or the libgcc that's probably used in the executable being debugged?
The latter, but in my use-case it has always been the same libgcc that
built gdb. I haven't considered version mismatch between gdb and
executable before; thanks for pointing that out.
|
So this makes it definitionally the one that built gdb, while I would rather revert this and have a |
@Ericson2314 is |
@Mic92 It is, but each stage has it's own (potentially different) |
Ah i was totally wrong, |
Motivation for this change
Before:
After:
Things done
sandbox
innix.conf
on non-NixOS linux)nix-shell -p nix-review --run "nix-review wip"
./result/bin/
)nix path-info -S
before and after)Notify maintainers
cc @globin