[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] can't find a register in class `BREG' while reloading `asm'



Tuan Van wrote:
> Kevin wrote:
>> gcc -O2 -fomit-frame-pointer -DNDEBUG -m32 -march=i686 -Wall
>> -Wstrict-prototypes -Wdeclaration-after-statement -nostdinc -fno-builtin
>> -fno-common -fno-strict-aliasing -iwithprefix include -Werror
>> -Wno-pointer-arith -pipe
>> -I/var/tmp/portage/xen-3.0.2/work/xen-3.0.2/xen/include
>> -I/var/tmp/portage/xen-3.0.2/work/xen-3.0.2/xen/include/asm-x86/mach-generic
>>
>> -I/var/tmp/portage/xen-3.0.2/work/xen-3.0.2/xen/include/asm-x86/mach-default
>>
>> -msoft-float -g -D__XEN__ -c multicall.c -o multicall.o
>> memory.c: In function `guest_remove_page':
>> /var/tmp/portage/xen-3.0.2/work/xen-3.0.2/xen/include/asm/mm.h:206:
>> error: can't find a register in class `BREG' while reloading `asm'
> 
> 
> see http://bugs.gentoo.org/show_bug.cgi?id=130167
> 

Thanks for the pointer, Tuan.  I wasn't aware of it and I should have
checked the gentoo & xen bugzillas before posting here.  My apologies
for not doing so.  I have now checked both gentoo and xen bugzillas and
I don't see anything on BREG or register or pie or ssp or hardened in
the xen bugzilla.

The patch mentioned in the gentoo bug report is, however, merely an
implementation of the advice that Keir Fraser gave to A Streetcar back
in 11/2004, and it does indeed allow me to compile xen-3.0.2 (which I
suspected would be true, but it doesn't get me what I'd really like
which is xen code compiled with PIE/SSP for enhanced security).

Keir Fraser wrote in 11/2004:

"I've checked in a patch to the unstable tree that will allow to build
with PIE/SSP-enabled GCC."

May I ask: what's happened with this?  Was a patch applied?  If so, does
something else need to be patched?  Or was the patch subsequently
removed?  Or do the xen-devs prefer against patching xen this way?

Are there negative implications to building xen with PIE/SSP-enabled
GCC? (or for that matter, not doing so?).  Although I'm no guru on
hardened gentoo or PIE/SSP, I had the overall impression that they were
considered by many (all?) to be a good thing for enhancing security.  Is
that not the case with xen?

TIA for any replies.

-Kevin

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.