it looks like enabling this flag on armel/armhf is a little bit premature.
Apparently it's not completely supported upstream, and might cause regressions, according to
https://bugzilla.redhat.com/show_bug.cgi?id=1522678
Is that a feature that the Debian ARM32 porters and the security team really want to support actively, despite the missing upstream support?
In Ubuntu, people tracked down segfaults due to this change in at least valgrind and gnutls, maybe more.
According to https://bugs.debian.org/918914#73 there were no pending toolchain issues related to this.
Hello!
On 2023-11-24 01:34, Guillem Jover wrote:
According to https://bugs.debian.org/918914#73 there were no pending
toolchain issues related to this.
That is correct. The GCC maintainers at Arm confirm that stack-clash-protection is supported on 32 bit too.
In case there are any bugs, which is of course possible, please file
them and add debian-arm@ to X-Debbugs-CC.
So far I'm only aware of an issue with plplot, which turned out to be an actual bug in the software that stack-clash-protection helped uncover: https://bugs.debian.org/1055228#24
Hello!
On 2023-11-24 01:34, Guillem Jover wrote:
According to https://bugs.debian.org/918914#73 there were no pending
toolchain issues related to this.
That is correct. The GCC maintainers at Arm confirm that stack-clash-protection is supported on 32 bit too.
On 24.11.23 07:19, Emanuele Rocca wrote:
Hello!
On 2023-11-24 01:34, Guillem Jover wrote:
According to https://bugs.debian.org/918914#73 there were no pending toolchain issues related to this.
That is correct. The GCC maintainers at Arm confirm that stack-clash-protection is supported on 32 bit too.
yes, but it's a different implementation, that apparently breaks a few more things than on the other architectures where it is enabled.
In case there are any bugs, which is of course possible, please file
them and add debian-arm@ to X-Debbugs-CC.
No, I will not do that. Sorry, but the task of the porters it NOT to put this kind of work on the shoulders on others, but to do this analysis themself. You seem to rely on every other package maintainer to figure out these issues on their own. Please don't do that.
Debian is the first distro to turn this on on armhf, but didn't do any
checks or test rebuilds before turning this on.
So far I'm only aware of an issue with plplot, which turned out to be an actual bug in the software that stack-clash-protection helped uncover: https://bugs.debian.org/1055228#24
I filed now
https://bugs.launchpad.net/ubuntu/+source/libselinux/+bug/2044506
to collect some information what Ubuntu apparently hit.
A major problem will be valgrind stopping to work, causing issues in the
test suites of other packages.
Also after rebuilding libxml2, libarchive, gnutls28, libselinux without this flag on armhf, issues go away again. I'm not directly working on these, so can't give more information.
On Thu, 2023-11-23 at 10:45:33 +0100, Matthias Klose wrote:
it looks like enabling this flag on armel/armhf is a little bit premature.
In Ubuntu, people tracked down segfaults due to this change in at least valgrind and gnutls, maybe more.
If there's some missing support somewhere that might make this a
common thing instead of just affecting a handful of packages that
could simply disable the flags, and the Arm porters consider that
fixing that is not feasible in the short term, I guess it makes
sense to stop emitting the flag for the arm32 arches.
Is that a feature that the Debian ARM32 porters and the security team really
want to support actively, despite the missing upstream support?
According to https://bugs.debian.org/918914#73 there were no pending toolchain issues related to this. And I think the security team mostly deferred to the ports teams.
On 24.11.23 07:19, Emanuele Rocca wrote:
In case there are any bugs, which is of course possible, please file
them and add debian-arm@ to X-Debbugs-CC.
No, I will not do that. Sorry, but the task of the porters it NOT to put this kind of work on the shoulders on others, but to do this analysis themself. You seem to rely on every other package maintainer to figure out these issues on their own. Please don't do that.
Debian is the first distro to turn this on on armhf, but didn't do any
checks or test rebuilds before turning this on.
I filed now
https://bugs.launchpad.net/ubuntu/+source/libselinux/+bug/2044506
to collect some information what Ubuntu apparently hit.
A major problem will be valgrind stopping to work, causing issues in the
test suites of other packages.
A major problem will be valgrind stopping to work, causing issues in the
test suites of other packages.
Also after rebuilding libxml2, libarchive, gnutls28, libselinux without this flag on armhf, issues go away again.
Hi,
it looks like enabling this flag on armel/armhf is a little bit premature.
Apparently it's not completely supported upstream, and might cause regressions, according to
https://bugzilla.redhat.com/show_bug.cgi?id=1522678
Is that a feature that the Debian ARM32 porters and the security team really want to support actively, despite the missing upstream support?
In Ubuntu, people tracked down segfaults due to this change in at least valgrind and gnutls, maybe more.
For debian we'll keep an eye on it, do a belated rebuild to see how
much of a problem we really have, and then decide if we should revert
it too until some stuff if fixed.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 465 |
Nodes: | 16 (2 / 14) |
Uptime: | 85:18:48 |
Calls: | 9,416 |
Files: | 13,575 |
Messages: | 6,102,630 |