Commit graph

18 commits

Author SHA1 Message Date
Merijn Broeren
133103d709
treewide: replace make/build/configure/patchFlags with nix lists 2019-12-30 12:58:11 +01:00
volth
08f68313a4 treewide: remove redundant rec 2019-08-28 11:07:32 +00:00
c0bw3b
4c5dc1fa30 memtest86+: 5.01+coreboot-20180113 -> 5.01-coreboot-002
Latest stable stag of the coreboot fork
2019-05-08 17:01:05 +02:00
Jan Malakhovski
f360278c8d memtest86plus: disable tests 2018-08-11 09:35:39 +00:00
Jan Malakhovski
c3148948ff memtest86plus: 5.01 -> 5.01+coreboot-20180113
aka 5.01+coreboot-001+

The version maintained by coreboot project is superior to Debian, it
integrates all the Debian patches and fixes a bunch more bugs.

In particular, it fixes SMP freezes and apparent memory errors when
running under coreboot ROM.
2018-04-22 21:51:05 +03:00
Jan Malakhovski
7de43f38e0 memtest86plus: disable all hardening
With hardening enabled it reports errors on known-good memory modules
on my Thinkpad X230 (Ivy Bridge). It's the same bug as reported in
https://bugs.launchpad.net/ubuntu/+source/memtest86+/+bug/1071209 but
memtest86+ fails on test #9 instead of test #7 (because #7 in 4.20
became #9 in 5.01) and with all the addresses multiplied by 2 (I guess
the bug was reported for i686, and I test on x86_64, it was 2012 after
all).
2018-04-22 21:51:05 +03:00
Tuomas Tynkkynen
9a13bc817e memtest86plus: Broken on non-x86
https://hydra.nixos.org/build/65048457
2017-12-03 19:51:58 +02:00
Jan Malakhovski
358604aae2 memtest86+: use debian patches, use default gcc 2017-08-29 11:08:06 +00:00
Robin Gloster
32eecf9877
memtest86Plus: fix runtime errors with fortify hardening
fixes #6630
2017-03-07 15:40:40 +01:00
Robin Gloster
1b979d8384 Merge remote-tracking branch 'upstream/master' into hardened-stdenv 2016-08-03 13:34:44 +00:00
Tuomas Tynkkynen
21f17d69f6 treewide: Add lots of meta.platforms
Build-tested on x86_64 Linux & Mac.
2016-08-02 21:42:43 +03:00
Franz Pletz
aff1f4ab94 Use general hardening flag toggle lists
The following parameters are now available:

  * hardeningDisable
    To disable specific hardening flags
  * hardeningEnable
    To enable specific hardening flags

Only the cc-wrapper supports this right now, but these may be reused by
other wrappers, builders or setup hooks.

cc-wrapper supports the following flags:

  * fortify
  * stackprotector
  * pie (disabled by default)
  * pic
  * strictoverflow
  * format
  * relro
  * bindnow
2016-03-05 18:55:26 +01:00
Tristan Helmich
c3096a4160 memtest86+: disable pic/stackprotector hardening 2016-03-04 14:56:58 +01:00
William A. Kennington III
06b2804bea memtest86+: Make compatible with gcc5 2015-06-27 15:49:30 -07:00
Bob van der Linden
3b40ec5012 memtest86+: fixed reboot issues 2015-02-28 00:30:36 +01:00
Eelco Dolstra
e26b828f4a memtest86+: Remove bogus executable bit 2013-10-02 12:32:12 +02:00
Eelco Dolstra
b8cf0a32fd memtest86+: Update to 5.01 2013-10-02 12:32:12 +02:00
Eelco Dolstra
feeac34635 Move memtest86+ to its own directory 2013-10-02 12:32:11 +02:00