mirror of
https://sourceware.org/git/glibc.git
synced 2024-12-14 23:30:06 +00:00
de6591238b
When dynamically linking, ifunc resolvers are called before TLS is initialized, so they cannot be safely stack-protected. We avoid disabling stack-protection on large numbers of files by using __attribute__ ((__optimize__ ("-fno-stack-protector"))) to turn it off just for the resolvers themselves. (We provide the attribute even when statically linking, because we will later use it elsewhere too.)
66 lines
962 B
C
66 lines
962 B
C
/* Test STT_GNU_IFUNC symbols in PIE:
|
|
|
|
1. Direct function call.
|
|
2. Function pointer.
|
|
3. Reference from a shared library.
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include "ifunc-sel.h"
|
|
|
|
typedef int (*foo_p) (void);
|
|
extern foo_p foo_ptr;
|
|
|
|
static int
|
|
one (void)
|
|
{
|
|
return -30;
|
|
}
|
|
|
|
void * foo_ifunc (void) __asm__ ("foo");
|
|
__asm__(".type foo, %gnu_indirect_function");
|
|
|
|
void *
|
|
inhibit_stack_protector
|
|
foo_ifunc (void)
|
|
{
|
|
return ifunc_one (one);
|
|
}
|
|
|
|
extern int foo (void);
|
|
extern foo_p get_foo (void);
|
|
extern foo_p get_foo_p (void);
|
|
|
|
foo_p my_foo_ptr = foo;
|
|
|
|
int
|
|
main (void)
|
|
{
|
|
foo_p p;
|
|
|
|
p = get_foo ();
|
|
if (p != foo)
|
|
abort ();
|
|
if ((*p) () != -30)
|
|
abort ();
|
|
|
|
p = get_foo_p ();
|
|
if (p != foo)
|
|
abort ();
|
|
if ((*p) () != -30)
|
|
abort ();
|
|
|
|
if (foo_ptr != foo)
|
|
abort ();
|
|
if (my_foo_ptr != foo)
|
|
abort ();
|
|
if ((*foo_ptr) () != -30)
|
|
abort ();
|
|
if ((*my_foo_ptr) () != -30)
|
|
abort ();
|
|
if (foo () != -30)
|
|
abort ();
|
|
|
|
return 0;
|
|
}
|