diff options
author | Nick Alcock <nick.alcock@oracle.com> | 2016-12-26 10:08:41 +0100 |
---|---|---|
committer | Florian Weimer <fweimer@redhat.com> | 2016-12-26 10:08:41 +0100 |
commit | de6591238b478bc86b8cf5af01a484114e399213 (patch) | |
tree | 2717c115fbc7518fcbe9348239ff536eb914d267 /configure | |
parent | Initialize the stack guard earlier when linking statically [BZ #7065] (diff) | |
download | glibc-de6591238b478bc86b8cf5af01a484114e399213.tar.gz glibc-de6591238b478bc86b8cf5af01a484114e399213.tar.bz2 glibc-de6591238b478bc86b8cf5af01a484114e399213.zip |
Do not stack-protect ifunc resolvers [BZ #7065]
When dynamically linking, ifunc resolvers are called before TLS is
initialized, so they cannot be safely stack-protected.
We avoid disabling stack-protection on large numbers of files by
using __attribute__ ((__optimize__ ("-fno-stack-protector")))
to turn it off just for the resolvers themselves. (We provide
the attribute even when statically linking, because we will later
use it elsewhere too.)
Diffstat (limited to 'configure')
-rwxr-xr-x | configure | 2 |
1 files changed, 2 insertions, 0 deletions
@@ -3994,6 +3994,8 @@ stack_protector= no_stack_protector= if test "$libc_cv_ssp" = yes; then no_stack_protector="-fno-stack-protector -DSTACK_PROTECTOR_LEVEL=0" + $as_echo "#define HAVE_CC_NO_STACK_PROTECTOR 1" >>confdefs.h + fi if test "$enable_stack_protector" = yes && test "$libc_cv_ssp" = yes; then |