public inbox for glibc-cvs@sourceware.org
help / color / mirror / Atom feed
* [glibc] string: Disable stack protector for memset in early static initialization
@ 2024-01-23 13:23 Adhemerval Zanella
  0 siblings, 0 replies; only message in thread
From: Adhemerval Zanella @ 2024-01-23 13:23 UTC (permalink / raw)
  To: glibc-cvs

https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=77c6a2717de1b6a78e79538b2074579ed77839ed

commit 77c6a2717de1b6a78e79538b2074579ed77839ed
Author: Adhemerval Zanella <adhemerval.zanella@linaro.org>
Date:   Mon Jan 22 10:42:19 2024 -0300

    string: Disable stack protector for memset in early static initialization
    
    For ports that use the default memset, the compiler might generate early
    calls before the stack protector is initialized (for instance, riscv
    with -fstack-protector-all on _dl_aux_init).
    
    Checked on riscv64-linux-gnu-rv64imafdc-lp64d.
    
    Reviewed-by: Florian Weimer <fweimer@redhat.com>

Diff:
---
 string/Makefile | 1 +
 1 file changed, 1 insertion(+)

diff --git a/string/Makefile b/string/Makefile
index 3ba77e1b2f..8f31fa49e6 100644
--- a/string/Makefile
+++ b/string/Makefile
@@ -270,6 +270,7 @@ CFLAGS-memcpy.c += $(no-stack-protector)
 CFLAGS-wordcopy.c += $(no-stack-protector)
 # Called during static initialization
 CFLAGS-strncmp.c += $(no-stack-protector)
+CFLAGS-memset.c += $(no-stack-protector)
 
 CFLAGS-argz-next.c += $(config-cflags-wno-ignored-attributes)
 CFLAGS-basename.c += $(config-cflags-wno-ignored-attributes)

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2024-01-23 13:23 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-01-23 13:23 [glibc] string: Disable stack protector for memset in early static initialization Adhemerval Zanella

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).