diff options
author | Samuel Thibault <samuel.thibault@ens-lyon.org> | 2023-05-01 13:38:57 +0200 |
---|---|---|
committer | Samuel Thibault <samuel.thibault@ens-lyon.org> | 2023-05-01 13:38:57 +0200 |
commit | e11a6734c4607fee78a1c4fa16c8474f95270b74 (patch) | |
tree | d4df05d742b57caed6bf4a49d3f3e65d038c233e | |
parent | d44995a4b35cd41c6a8fea86411ecf3b3068679f (diff) | |
download | glibc-e11a6734c4607fee78a1c4fa16c8474f95270b74.zip glibc-e11a6734c4607fee78a1c4fa16c8474f95270b74.tar.gz glibc-e11a6734c4607fee78a1c4fa16c8474f95270b74.tar.bz2 |
hurd 64bit: Add missing data file for check-localplt test
-rw-r--r-- | sysdeps/mach/hurd/x86_64/localplt.data | 44 |
1 files changed, 44 insertions, 0 deletions
diff --git a/sysdeps/mach/hurd/x86_64/localplt.data b/sysdeps/mach/hurd/x86_64/localplt.data new file mode 100644 index 0000000..ce12ef0 --- /dev/null +++ b/sysdeps/mach/hurd/x86_64/localplt.data @@ -0,0 +1,44 @@ +# See scripts/check-localplt.awk for how this file is processed. +# PLT use is required for the malloc family and for matherr because +# users can define their own functions and have library internals call them. +# Linker in binutils 2.26 and newer consolidates R_X86_64_JUMP_SLOT +# relocation with R_X86_64_GLOB_DAT relocation against the same symbol. +libc.so: calloc + RELA R_X86_64_GLOB_DAT +libc.so: free + RELA R_X86_64_GLOB_DAT +libc.so: malloc + RELA R_X86_64_GLOB_DAT +libc.so: realloc + RELA R_X86_64_GLOB_DAT +# The dynamic linker has its own versions of basic functions for initial loading +# of shared libraries. These need to be overriden by libc once loaded. +ld.so: __open ? +ld.so: __open64 ? +ld.so: __open_nocancel +ld.so: __close ? +ld.so: __close_nocancel +ld.so: __read ? +ld.so: __read_nocancel +ld.so: __pread64 +ld.so: __pread64_nocancel +ld.so: __write ? +ld.so: __write_nocancel +ld.so: __writev +ld.so: __libc_lseek64 +ld.so: __mmap +ld.so: __fstat64 +ld.so: __stat64 +ld.so: __access +ld.so: __access_noerrno +ld.so: __getpid +ld.so: __getcwd +ld.so: _exit ? +ld.so: abort +ld.so: _hurd_intr_rpc_mach_msg +ld.so: __errno_location +ld.so: _dl_init_first +# +# These should ideally be avoided, but is currently difficult +libc.so: siglongjmp ? +libc.so: longjmp ? +# This is from lseek.c +libc.so: __libc_lseek64 ? +# This is through cleanup_region_start from vfprintf.c +libc.so: _IO_funlockfile ? |