The stack-protector issue has been raised to priority number one for the 
library folks within the Linaro toolchain group. I have followed up with 
members of the toolchain and steering committees as appropriate to ensure this 
is going to be taken care of extremely swiftly.

Next!

-- 
Sent from my iPad

On Jul 12, 2013, at 5:36, Jonathan Masters <j...@redhat.com> wrote:

> Note that there are teams within Linaro doing benchmarking and driving such. 
> And once the specific stack protector issue was raised, I poked Marcus in 
> person and he escalated it such that it will be looked at this next 
> engineering cycle. In general we can plan ahead if we know there are issues. 
> We can't offer a 4 hour SLA. This isn't meant to be aimed at Jakub :) just 
> replying here.
> 
> Btw, on a tangent, those throwing stones in the other subthreads need to bear 
> in mind no architecture can guarantee every feature at all times. If you 
> would like, we can scrub through and find something broken on x86 that a test 
> suite claims to work, and we can infer all kinds of insulting things from 
> that. But it will achieve nothing. Sometimes stuff just is unintentionally 
> broken. Audit was one such issue a year back - silent register corruption due 
> to a busted patch and lack of people historically using it to notice. But we 
> fixed that. And we will find more issues over time and fix those, especially 
> now that we have many folks running Fedora kernels and others in Linaro 
> ramping up on testing upstream with non-embedded configs.
> 
> Jon.
> 
> -- 
> Sent from my iPad
> 
> On Jul 11, 2013, at 20:03, Jakub Jelinek <ja...@redhat.com> wrote:
> 
>> On Thu, Jul 11, 2013 at 11:52:34AM -0700, Brendan Conoboy wrote:
>>> On 07/11/2013 11:49 AM, Jakub Jelinek wrote:
>>>> Stack guards are present, but using libssp, which is the fallback way,
>>>> second class citizen and most likely slower than the standard way.
>>>> E.g. the libssp stack guard setup always uses /dev/urandom, while I guess
>>>> even on ARM kernel provides AT_RANDOM that can be just used.
>>>> And I'd bet that even on ARM reading the stack guard via TLS (well,
>>>> static only always, i.e. hardcoded offset from TLS register), especially 
>>>> for
>>>> PIC, is faster than doing GOT read and two memory references.
>>> 
>>> Thanks.  Security-wise, is the implementation roughly equivalent in
>>> what is protected against, albeit less efficient?
>> 
>> Not sure how exactly /dev/urandom compares to AT_RANDOM security-wise,
>> but most probably it is just less efficient.  Definitely something to be
>> benchmarked, analyzed for code size etc.
>> 
>>   Jakub
>> -- 
>> devel mailing list
>> devel@lists.fedoraproject.org
>> https://admin.fedoraproject.org/mailman/listinfo/devel
> -- 
> devel mailing list
> devel@lists.fedoraproject.org
> https://admin.fedoraproject.org/mailman/listinfo/devel
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Reply via email to