[Bug ld/29956] mn10300 linker always triggers LOAD segment with RWX permissions test by default
https://sourceware.org/bugzilla/show_bug.cgi?id=29956 Sam James changed: What|Removed |Added CC||sam at gentoo dot org -- You are receiving this mail because: You are on the CC list for the bug.
[Bug ld/29956] mn10300 linker always triggers LOAD segment with RWX permissions test by default
https://sourceware.org/bugzilla/show_bug.cgi?id=29956 --- Comment #4 from Hans-Peter Nilsson --- A maintainer can make the call to add such targets to the clause at ld/configure.tgt line 48. Just don't forget to add the bare-metal specifier (e.g. *-elf) there, for targets where a variant also has with HW-protection-support, so not to match e.g. *-linux. To wit, don't follow the bad pattern of target-*-* there. -- You are receiving this mail because: You are on the CC list for the bug.
[Bug ld/29956] mn10300 linker always triggers LOAD segment with RWX permissions test by default
https://sourceware.org/bugzilla/show_bug.cgi?id=29956 --- Comment #3 from Nick Clifton --- (In reply to Mike Frysinger from comment #2) > is the RWX check useful for ELF (bare-metal) targets in general ? Eh - it is debatable. On the one hand, any RWX segment is a potential weak point that attackers might try to exploit, and programs running on bare metal may still need to be security aware. On the other hand, if you are building a bare metal based system then presumably you know what you are doing and what the potential vulnerabilities are likely to be. I do not think that the linker can make a judgement call on this. It is up to the programmers and toolchain creators to decide what is best. There are linker command line options to disable the warnings, and binutils configure options to change the default behaviour, so things can be customized. But correctly identifying "safe" bare metal configurations vs "vulnerable" bare metal configurations ? This is something that the linker cannot do. Overall I think that it is better that the linker defaults to generating these warnings, and having discussions like this one, than to have the linker default to ignoring the issue and someone not realizing that there is a potential problem. -- You are receiving this mail because: You are on the CC list for the bug.
[Bug ld/29956] mn10300 linker always triggers LOAD segment with RWX permissions test by default
https://sourceware.org/bugzilla/show_bug.cgi?id=29956 --- Comment #2 from Mike Frysinger --- is the RWX check useful for ELF (bare-metal) targets in general ? -- You are receiving this mail because: You are on the CC list for the bug.
[Bug ld/29956] mn10300 linker always triggers LOAD segment with RWX permissions test by default
https://sourceware.org/bugzilla/show_bug.cgi?id=29956 --- Comment #1 from Nick Clifton --- Created attachment 14546 --> https://sourceware.org/bugzilla/attachment.cgi?id=14546&action=edit Proposed patch Hi Guys, Here is a possible patch to fix this problem. Since the issue affects several ports however, it might be better to find a more general solution that only needs to be applied once... Cheers Nick -- You are receiving this mail because: You are on the CC list for the bug.