Re: 2.6.17-mm5 -- Busted toolchain? -- usr/klibc/exec_l.c:59: undefined reference to `__stack_chk_fail'

From: Miles Lane
Date: Sat Jul 01 2006 - 18:54:54 EST


On 7/1/06, Miles Lane <miles.lane@xxxxxxxxx> wrote:
On 7/1/06, Arjan van de Ven <arjan@xxxxxxxxxxxxx> wrote:
> On Sat, 2006-07-01 at 14:25 -0700, Miles Lane wrote:
> > On 7/1/06, Arjan van de Ven <arjan@xxxxxxxxxxxxx> wrote:
> > > On Sat, 2006-07-01 at 14:09 -0700, Miles Lane wrote:
> > > > I am getting this:
> > > >
> > > > KLIBCLD usr/klibc/libc.so
> > > > usr/klibc/execl.o: In function `execl':
> > > > usr/klibc/exec_l.c:59: undefined reference to `__stack_chk_fail'
> > > > usr/klibc/execle.o: In function `execle':
> > > > usr/klibc/exec_l.c:59: undefined reference to `__stack_chk_fail'
> > > > usr/klibc/execvpe.o: In function `execvpe':
> > > > usr/klibc/execvpe.c:75: undefined reference to `__stack_chk_fail'
> > > > usr/klibc/execlp.o: In function `execlp':
> > > > usr/klibc/exec_l.c:59: undefined reference to `__stack_chk_fail'
> > > > usr/klibc/execlpe.o: In function `execlpe':
> > > > usr/klibc/exec_l.c:59: undefined reference to `__stack_chk_fail'
> > > > usr/klibc/vfprintf.o:usr/klibc/vfprintf.c:26: more undefined
> > > > references to `__stack_chk_fail' follow
> > > > make[2]: *** [usr/klibc/libc.so] Error 1
> > > >
> > > > But I've searched all the .h and .c files in the tree and found no
> > > > reference to __stack_chk_fail. I am running Ubuntu's Edgy Eft (the
> > > > latest development tree).
> > >
> > > somehow you're getting -fstack-protector added to your CFLAGs.. which
> > > won't do you any good unless you link to glibc or another library that
> > > implements the user side of the feature...
> >
> > The only reference to -fstack-protector in my linux kernel tree is here:
>
>
> try looking at your CFLAGS environment variable.. that may get
> inherited ;)

https://wiki.ubuntu.com/GccSsp

It appears that Ubuntu's Edgy Eft (the development tree) now contains
"Stack Smashing Protection" enabled by default. I found a web page
that states that -fno-stack-protector can be used to disable this
functionality. Interestingly, another web page stated that SSP has
been enabled in Redhat compilers for a long time and is now also
enabled in Debian SID. Perhaps -fno-stack-protector should be added
to the kernel build be default?

Darn it. I don't seem to know how to get -fno-stack-protector to
work. I ran:
export CFLAGS=-fno-stack-protector
make mrproper
cp ../.config .
make oldconfig
CFLAGS=-fno-stack-protector make all install modules modules_install

But I am still getting the errors. Anyone know what I am doing wrong?

Thanks,
Miles
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/