about summary refs log tree commit diff
path: root/ChangeLog
diff options
context:
space:
mode:
authorSamuel Thibault <samuel.thibault@ens-lyon.org>2017-08-27 22:26:49 +0200
committerSamuel Thibault <samuel.thibault@ens-lyon.org>2017-08-27 22:29:43 +0200
commit99ee4d26dc07c3eadfbf6793db26ef9dfb1551e5 (patch)
tree44121c6237d1bfbf27d9508c51328207f94c8802 /ChangeLog
parent97e02ad23392f929862d6a04643e7f2fd91baebc (diff)
downloadglibc-99ee4d26dc07c3eadfbf6793db26ef9dfb1551e5.tar.gz
glibc-99ee4d26dc07c3eadfbf6793db26ef9dfb1551e5.tar.xz
glibc-99ee4d26dc07c3eadfbf6793db26ef9dfb1551e5.zip
hurd: Fix static initialization with -fstack-protector-strong
When linked statically, TLS initialization is not achieved before
mach_init and alike, so ssp accesses to tcbhead's stack_guard would
crash.  We can just avoid using ssp in the few functions needed before
TLS is set up.

	* mach/Makefile (CFLAGS-mach_init.o, CFLAGS-RPC_vm_statistics.o,
	CFLAGS-RPC_vm_map.o, CFLAGS-RPC_vm_protect.o,
	CFLAGS-RPC_i386_set_gdt.o, CFLAGS-RPC_i386_set_ldt.o,
	CFLAGS-RPC_task_get_special_port.o): Add $(no-stack-protector).
	* hurd/Makefile (CFLAGS-hurdstartup.o,
	CFLAGS-RPC_exec_startup_get_info.o): Add $(no-stack-protector).
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog6
1 files changed, 6 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
index 4d94fee93b..a93769f3b5 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -7,6 +7,12 @@
 	stack_chk_fail_local.
 	* mach/Versions (GLIBC_2.4): Add __stack_chk_fail.
 	* hurd/Versions (GLIBC_2.4): Add __stack_chk_fail.
+	* mach/Makefile (CFLAGS-mach_init.o, CFLAGS-RPC_vm_statistics.o,
+	CFLAGS-RPC_vm_map.o, CFLAGS-RPC_vm_protect.o,
+	CFLAGS-RPC_i386_set_gdt.o, CFLAGS-RPC_i386_set_ldt.o,
+	CFLAGS-RPC_task_get_special_port.o): Add $(no-stack-protector).
+	* hurd/Makefile (CFLAGS-hurdstartup.o,
+	CFLAGS-RPC_exec_startup_get_info.o): Add $(no-stack-protector).
 
 2017-08-25  H.J. Lu  <hongjiu.lu@intel.com>