diff options
author | Frédéric Bérat <fberat@redhat.com> | 2023-04-26 11:32:04 +0200 |
---|---|---|
committer | Frédéric Bérat <fberat@redhat.com> | 2023-07-05 16:59:48 +0200 |
commit | eea000f6e69a829425fae25a7c2519f5c79551de (patch) | |
tree | 12d02e16ae0ce9ab2f559d724d69c3a811dc4dbe /include | |
parent | 505c884aeb059ee7741c23d1bfc47956bd9c2a0e (diff) | |
download | glibc-eea000f6e69a829425fae25a7c2519f5c79551de.zip glibc-eea000f6e69a829425fae25a7c2519f5c79551de.tar.gz glibc-eea000f6e69a829425fae25a7c2519f5c79551de.tar.bz2 |
misc/sys/cdefs.h: Create FORTIFY redirects for internal calls
The __REDIRECT* macros are creating aliases which may lead to unwanted
PLT entries when fortification is enabled.
To prevent these entries, the REDIRECT alias should be set to point to the
existing __GI_* aliases.
This is done transparently by creating a __REDIRECT_FORTIFY* version of
these macros, that can be overwritten internally when necessary.
Reviewed-by: Siddhesh Poyarekar <siddhesh@sourceware.org>
Diffstat (limited to 'include')
-rw-r--r-- | include/sys/cdefs.h | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/include/sys/cdefs.h b/include/sys/cdefs.h index 56adb23..b84ad34 100644 --- a/include/sys/cdefs.h +++ b/include/sys/cdefs.h @@ -40,6 +40,20 @@ rtld_hidden_proto (__chk_fail) #endif +#if defined SHARED +#if IS_IN (libc) && __USE_FORTIFY_LEVEL > 0 && defined __fortify_function + +#undef __REDIRECT_FORTIFY +#define __REDIRECT_FORTIFY(name, proto, alias) \ + __REDIRECT(name, proto, __GI_##alias) + +#undef __REDIRECT_FORTIFY_NTH +#define __REDIRECT_FORTIFY_NTH(name, proto, alias) \ + __REDIRECT_NTH(name, proto, __GI_##alias) + +#endif +#endif /* defined SHARED */ + #endif /* !defined _ISOMAC */ #endif |