public inbox for glibc-cvs@sourceware.org help / color / mirror / Atom feed
From: Adhemerval Zanella <azanella@sourceware.org> To: glibc-cvs@sourceware.org Subject: [glibc/azanella/clang] Move inhibit_stack_protector to its own header Date: Wed, 17 Apr 2024 20:11:07 +0000 (GMT) [thread overview] Message-ID: <20240417201107.CF9D83858D3C@sourceware.org> (raw) https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=3fd243990decbecb032f6a4ea1c834d7d833c638 commit 3fd243990decbecb032f6a4ea1c834d7d833c638 Author: Adhemerval Zanella <adhemerval.zanella@linaro.org> Date: Thu Aug 25 09:47:31 2022 -0300 Move inhibit_stack_protector to its own header It is used on tests as well. Diff: --- include/libc-symbols.h | 15 +-------------- include/stackprotector.h | 38 ++++++++++++++++++++++++++++++++++++++ 2 files changed, 39 insertions(+), 14 deletions(-) diff --git a/include/libc-symbols.h b/include/libc-symbols.h index 92b64c09f1..014f695f85 100644 --- a/include/libc-symbols.h +++ b/include/libc-symbols.h @@ -87,6 +87,7 @@ /* Obtain the definition of symbol_version_reference. */ #include <libc-symver.h> #include <libc-diag.h> +#include <stackprotector.h> /* When PIC is defined and SHARED isn't defined, we are building PIE by default. */ @@ -363,20 +364,6 @@ for linking") #define attribute_relro __attribute__ ((section (".data.rel.ro"))) -/* Used to disable stack protection in sensitive places, like ifunc - resolvers and early static TLS init. */ -#ifdef HAVE_CC_NO_STACK_PROTECTOR -# ifdef __clang__ -# define inhibit_stack_protector \ - __attribute__((no_stack_protector)) -# else -# define inhibit_stack_protector \ - __attribute__ ((__optimize__ ("-fno-stack-protector"))) -# endif -#else -# define inhibit_stack_protector -#endif - /* The following macros are used for PLT bypassing within libc.so (and if needed other libraries similarly). First of all, you need to have the function prototyped somewhere, diff --git a/include/stackprotector.h b/include/stackprotector.h new file mode 100644 index 0000000000..10230bac06 --- /dev/null +++ b/include/stackprotector.h @@ -0,0 +1,38 @@ +/* Details about stack protection enablement and how to disable it. + Copyright (C) 2022 Free Software Foundation, Inc. + This file is part of the GNU C Library. + + The GNU C Library is free software; you can redistribute it and/or + modify it under the terms of the GNU Lesser General Public + License as published by the Free Software Foundation; either + version 2.1 of the License, or (at your option) any later version. + + The GNU C Library is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public + License along with the GNU C Library; if not, see + <https://www.gnu.org/licenses/>. */ + +#ifndef _INCLUDE_STACKPROTECTOR_H +#define _INCLUDE_STACKPROTECTOR_H + +#include <config.h> + +/* Used to disable stack protection in sensitive places, like ifunc + resolvers and early static TLS init. */ +#ifdef HAVE_CC_NO_STACK_PROTECTOR +# ifdef __clang__ +# define inhibit_stack_protector \ + __attribute__((no_stack_protector)) +# else +# define inhibit_stack_protector \ + __attribute__ ((__optimize__ ("-fno-stack-protector"))) +# endif +#else +# define inhibit_stack_protector +#endif + +#endif
next reply other threads:[~2024-04-17 20:11 UTC|newest] Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top 2024-04-17 20:11 Adhemerval Zanella [this message] -- strict thread matches above, loose matches on Subject: below -- 2024-04-02 15:57 Adhemerval Zanella 2024-02-09 17:35 Adhemerval Zanella 2024-02-07 14:10 Adhemerval Zanella 2024-01-29 18:01 Adhemerval Zanella 2023-12-21 18:57 Adhemerval Zanella 2023-09-28 17:55 Adhemerval Zanella 2023-08-30 12:40 Adhemerval Zanella 2023-02-09 19:52 Adhemerval Zanella 2022-10-28 17:45 Adhemerval Zanella 2022-10-04 13:03 Adhemerval Zanella
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20240417201107.CF9D83858D3C@sourceware.org \ --to=azanella@sourceware.org \ --cc=glibc-cvs@sourceware.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).