This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug string/21791] Unused XXX_chk_XXX functions in libc.a
- From: "cvs-commit at gcc dot gnu.org" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sourceware dot org
- Date: Fri, 21 Jul 2017 12:47:19 +0000
- Subject: [Bug string/21791] Unused XXX_chk_XXX functions in libc.a
- Auto-submitted: auto-generated
- References: <bug-21791-131@http.sourceware.org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=21791
--- Comment #10 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot gnu.org> ---
This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "GNU C Library master sources".
The branch, hjl/pie/static has been created
at e7fdb051a9a72edb96b3ff60a54052fa951b4215 (commit)
- Log -----------------------------------------------------------------
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=e7fdb051a9a72edb96b3ff60a54052fa951b4215
commit e7fdb051a9a72edb96b3ff60a54052fa951b4215
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Wed Jul 19 14:32:42 2017 -0700
Add _startup_sbrk and _startup_fatal
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=18da3c0dfa870cf81746b27a39888ed72e2a1c95
commit 18da3c0dfa870cf81746b27a39888ed72e2a1c95
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Wed Jul 19 12:04:14 2017 -0700
Don't compile tst-prelink.c with PIE for GLOB_DAT relocation
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=014e14e00df45815d0c770e3221122c996c917d2
commit 014e14e00df45815d0c770e3221122c996c917d2
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Wed Jul 19 09:32:45 2017 -0700
i386: Define I386_USE_SYSENTER to 0 or 1 and check PIC
Define I386_USE_SYSENTER to 0 or 1 so that special versions of syscalls
with "int $0x80" can be provided for static PIE during start up. Also
check PIC instead SHARED for PIC version of syscall macros.
* sysdeps/unix/sysv/linux/i386/sysdep.h (I386_USE_SYSENTER):
Define to I386_USE_SYSENTER to 0 or 1 if not defined.
(ENTER_KERNEL): Check if I386_USE_SYSENTER is 1 and check PIC.
(INTERNAL_SYSCALL_MAIN_INLINE): Likewise.
(INTERNAL_SYSCALL_NCS): Likewise.
(LOADARGS_1): Likewise.
(LOADARGS_5): Likewise.
(RESTOREARGS_1): Likewise.
(RESTOREARGS_5): Likewise.
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=696136f9d4d925deef16ddad03e07dade76bad61
commit 696136f9d4d925deef16ddad03e07dade76bad61
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Tue Jul 18 15:46:40 2017 -0700
i386: Check PIC in i386 multiarch functions
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=11058a40bf80f4f738a306817619ac00dd228bbc
commit 11058a40bf80f4f738a306817619ac00dd228bbc
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Tue Jul 18 15:45:46 2017 -0700
i386: Check PIC instead of SHARED in start.S
Support static PIE. Avoid relocation in static PIE since _start is
called before it is relocated.
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=1db5536d8a3442ef1ce3c939ab822f621f555dbb
commit 1db5536d8a3442ef1ce3c939ab822f621f555dbb
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Tue Jul 18 10:42:48 2017 -0700
Use hidden visibility for ENABLE_STATIC_PIE
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=27fea67cb6c5221cfc8dfc2fe22d742f5278647f
commit 27fea67cb6c5221cfc8dfc2fe22d742f5278647f
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Mon Jul 17 13:53:52 2017 -0700
Add _dl_relocate_static_pie
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=137985e4e922424f6925e4adcbadb099fd487396
commit 137985e4e922424f6925e4adcbadb099fd487396
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Mon Jul 17 08:54:40 2017 -0700
Define pie-default/default-pie-ldflag for --enable-static-pie
1. Add $(pie-default) to CFLAGS-.o and CFLAGS-.op.
2. Add $(default-pie-ldflag) to +link-static-before-libc.
3. Define +prectorT/+postctorT to $(+prectorS)/$(+postctorS).
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=9e2276e1e953569bb41c0ac8fea8b77030ae5b2c
commit 9e2276e1e953569bb41c0ac8fea8b77030ae5b2c
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Tue Jul 18 05:58:21 2017 -0700
x86-64: Check if linker supports static PIE
Need the linker with fix for:
https://sourceware.org/bugzilla/show_bug.cgi?id=21782
Binutils 2.29 is OK.
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=1f7a0d1770485209eabbe5ff72441e97b06ac913
commit 1f7a0d1770485209eabbe5ff72441e97b06ac913
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Mon Jul 17 08:36:45 2017 -0700
Add --enable-static-pie
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=8a39392af54a404fee1194da89b1a98418b93680
commit 8a39392af54a404fee1194da89b1a98418b93680
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Fri Jul 21 05:07:19 2017 -0700
Check if -static-pie works
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=3c2e79fcdca45a4051677f461507fe07df5872f7
commit 3c2e79fcdca45a4051677f461507fe07df5872f7
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Mon Jul 17 08:17:32 2017 -0700
Check if linker supports --no-dynamic-linker
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=09f0835ca1ae46c9796c8e31fc59b8518281ef29
commit 09f0835ca1ae46c9796c8e31fc59b8518281ef29
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Tue Jul 18 05:23:21 2017 -0700
x86-64: Check PIC instead of SHARED in start.S
PIC may be the default.
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=f007d0b6e72d414bd2c66374bda9da46a24851ec
commit f007d0b6e72d414bd2c66374bda9da46a24851ec
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Tue Jul 18 15:36:20 2017 -0700
x86: Remove assembly versions of HAS_CPU_FEATURE/HAS_ARCH_FEATURE
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5467dc7f3efd1271bf33efe9d7e47d854e28c41d
commit 5467dc7f3efd1271bf33efe9d7e47d854e28c41d
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Wed Jul 19 06:54:03 2017 -0700
i386: Convert IFUNC selectors to C
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=8cc2d3c298462ad2c574ac06001772210713f1b5
commit 8cc2d3c298462ad2c574ac06001772210713f1b5
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Tue Jul 18 15:35:30 2017 -0700
x86-64: Convert libmathvec IFUNC selectors to C
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=be0774660ae0b6b71656b50beb7c49e8f14a6983
commit be0774660ae0b6b71656b50beb7c49e8f14a6983
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Tue Jul 18 13:56:17 2017 -0700
x86-64: Convert libm IFUNC selectors to C
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=2bb19bfe62a2f0f2351c402f8aafcaef749a459a
commit 2bb19bfe62a2f0f2351c402f8aafcaef749a459a
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Wed Jul 19 08:46:08 2017 -0700
i386: Don't define multiarch __memmove_chk in libc.a [BZ #21791]
There is no need to define multiarch __memmove_chk in libc.a.
[BZ #21791]
* sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S
(MEMCPY_CHK): Define only if SHARED is defined.
* sysdeps/i386/i686/multiarch/memcpy-ssse3-rep.S (MEMCPY_CHK):
Likewise.
* sysdeps/i386/i686/multiarch/memcpy-ssse3.S (MEMCPY_CHK):
Likewise.
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=c274dbd83695c7f54bb0ed2214a58785591d8ad1
commit c274dbd83695c7f54bb0ed2214a58785591d8ad1
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Wed Jul 19 10:56:19 2017 -0700
Avoid accessing corrupted stack from __stack_chk_fail [BZ #21752]
__libc_argv[0] points to address on stack and __libc_secure_getenv
accesses environment variables which are on stack. We should avoid
accessing stack when stack is corrupted.
This patch also renames function argument in __fortify_fail_abort
from do_backtrace to need_backtrace to avoid confusion with do_backtrace
from enum __libc_message_action.
[BZ #21752]
* debug/fortify_fail.c (__fortify_fail_abort): Don't pass down
__libc_argv[0] if we aren't doing backtrace. Rename do_backtrace
to need_backtrace.
* sysdeps/posix/libc_fatal.c (__libc_message): Don't call
__libc_secure_getenv if we aren't doing backtrace.
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=79a77e11663cae25c867aab00666d74163cfeda1
commit 79a77e11663cae25c867aab00666d74163cfeda1
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Wed Jul 19 16:53:06 2017 -0700
tunables: Use direct syscall for access (BZ#21744)
The function maybe_enable_malloc_check, which is called by
__tunables_init, calls __access_noerrno. It isn't problem when
symbol is is in ld.so, which has a special version of __access_noerrno
without stack protector. But when glibc is built with stack protector,
maybe_enable_malloc_check in libc.a can't call the regular version of
__access_noerrno with stack protector.
This patch changes how Linux defines the __access_noerrno to be an
inline call instead and thus preventing defining different build
rules for ld/static and shared.
H.J. Lu <hongjiu.lu@intel.com>
Adhemerval Zanella <adhemerval.zanella@linaro.org>
* elf/dl-tunables.c: Include not-errno.h header.
* include/unistd.h (__access_noerrno): Remove definition.
* sysdeps/unix/sysv/linux/access.c (__access_noerrno): Likewise.
* sysdeps/generic/not-errno.h: New file.
* sysdeps/unix/sysv/linux/not-errno.h: Likewise.
-----------------------------------------------------------------------
--
You are receiving this mail because:
You are on the CC list for the bug.