-
-
Notifications
You must be signed in to change notification settings - Fork 15.4k
make-bootstrap-tools: add libssp to allow stack protector to work #80497
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not very familiar with linux bootstrapping, but looks good to me otherwise.
(vcunat said he'd take a look soon) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm a bit late, but anyway...
👍 though I trust you on this change being sufficient to fix those 32-bit ARMs. These libs are tiny (27k together on x86_64) and adding them seems very unlikely to break anything.
I still have no idea why platforms differ in needing this stack-protector stuff during bootstrap, but that doesn't seem important. Also it's unclear to me how to choose between *.a
and *.so
for bootGCC libs; static ones seem safer if they work, with respect to the risk of retaining references when using the resulting boodstrap tools... so 👍 for choosing that here.
I originally tried adding the .so, and it resulted in a reference to the bootstrap tools. From what I can tell, GCC normally prefers the static library anyway, even if both are available. |
Motivation for this change
The bootstrap tools lack
libssp.a
andlibssp_nonshared.a
, which causes linker errors when attempting to use stack protection, at least on 32-bit ARM. This PR is related to #79793 and needs to be merged first so that Hydra can build working bootstrap tarballs.Things done
sandbox
innix.conf
on non-NixOS linux)nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
./result/bin/
)nix path-info -S
before and after)cc @samueldr @thefloweringash