apply hidden visibility to tlsdesc accessor functions
these functions are never called directly; only their addresses are used, so PLT indirections should never happen unless a broken application tries to redefine them, but it's still best to make them hidden.
Showing
想要评论请 注册 或 登录