1. 22 4月, 2015 4 次提交
    • R
      remove dead case for F_SETLKW in fcntl · ea1b6bb6
      Rich Felker 提交于
      the first switch already returns in the F_SETLKW code path so it need
      not be handled in the second switch. moreover the code in the second
      switch is wrong for the F_SETLKW command: it's not cancellable.
      ea1b6bb6
    • R
      fix mmap leak in sem_open failure path for link call · 086793ad
      Rich Felker 提交于
      the leak was found by static analysis (reported by Alexander Monakov),
      not tested/observed, but seems to have occured both when failing due
      to O_EXCL, and in a race condition with O_CREAT but not O_EXCL where a
      semaphore by the same name was created concurrently.
      086793ad
    • R
      remove always-true conditional in dynamic linker TLSDESC processing · c5ab5bd3
      Rich Felker 提交于
      the allocating path which can fail is for dynamic TLS, which can only
      occur at runtime, and the check for runtime was already made in the
      outer conditional.
      c5ab5bd3
    • R
      remove redundant code in do_dlsym function · 97b72d22
      Rich Felker 提交于
      commit 637dd2d3 introduced the checks
      for RTLD_DEFAULT and RTLD_NEXT here, claiming they fixed a regression,
      but the above conditional block clearly already covered these cases,
      and removing the checks produces no difference in the generated code.
      97b72d22
  2. 21 4月, 2015 2 次提交
  3. 20 4月, 2015 5 次提交
    • R
      add optional global visibility override · de2b67f8
      Rich Felker 提交于
      this is implemented via the build system and does not affect source
      files. the idea is to use protected or hidden visibility to prevent
      the compiler from pessimizing function calls within a shared (or
      position-independent static) libc in the form of overhead setting up
      for a call through the PLT. the ld-time symbol binding via the
      -Bsymbolic-functions option already optimized out the PLT itself, but
      not the code in the caller needed to support a call through the PLT.
      on some archs this overhead can be substantial; on others it's
      trivial.
      de2b67f8
    • R
      remove invalid PLT calls from or1k asm · 51fc77c7
      Rich Felker 提交于
      analogous to commit 646cb9a4 for sh.
      51fc77c7
    • R
      remove possible-textrels from powerpc asm · cf1a9d9d
      Rich Felker 提交于
      these are perfectly fine with ld-time symbol binding, but otherwise
      result in textrels. they cannot be replaced with @PLT jump targets
      because the PLT thunks require a GOT register to be setup, so use a
      hidden alias instead.
      cf1a9d9d
    • R
      remove invalid PLT calls from microblaze asm · a880e6ce
      Rich Felker 提交于
      analogous to commit 646cb9a4 for sh.
      a880e6ce
    • R
      remove invalid PLT calls from sh asm · 646cb9a4
      Rich Felker 提交于
      these are perfectly fine with ld-time symbol binding, but if the calls
      go through a PLT thunk, they are invalid because the caller does not
      setup a GOT register. use a hidden alias to bypass the issue.
      646cb9a4
  4. 19 4月, 2015 4 次提交
  5. 18 4月, 2015 15 次提交
    • S
      math: fix pow(+-0,-inf) not to raise divbyzero flag · cb5c057c
      Szabolcs Nagy 提交于
      this reverts the commit f29fea00
      which was based on a bug in C99 and POSIX and did not match IEEE-754
      http://www.open-std.org/jtc1/sc22/wg14/www/docs/n1515.pdf
      cb5c057c
    • R
      apply hidden visibility to tlsdesc accessor functions · 1b1cafa5
      Rich Felker 提交于
      these functions are never called directly; only their addresses are
      used, so PLT indirections should never happen unless a broken
      application tries to redefine them, but it's still best to make them
      hidden.
      1b1cafa5
    • S
      comment fixes in aarch64 tlsdesc asm · ca7977b5
      Szabolcs Nagy 提交于
      ca7977b5
    • R
      ensure debugger hook for dynamic linker does not point to a PLT slot · 326e126f
      Rich Felker 提交于
      this change is made in preparation to support linking without
      -Bsymbolic-functions.
      326e126f
    • S
      add PR_*_FP_MODE prctl options · 02e5d564
      Szabolcs Nagy 提交于
      new in linux v4.0, commit 9791554b45a2acc28247f66a5fd5bbc212a6b8c8
      used to work around a floating-point abi issue on mips
      02e5d564
    • S
      add PR_MPX_*_MANAGEMENT prctl options · 658aefdf
      Szabolcs Nagy 提交于
      new in linux v3.19, commit fe3d197f84319d3bce379a9c0dc17b1f48ad358c
      used for on-demand kernel allocation of bounds tables for mpx on x86
      658aefdf
    • S
      add IP_CHECKSUM socket option to netinet/in.h · 1bfeb1dc
      Szabolcs Nagy 提交于
      new in linux v4.0, commit ad6f939ab193750cc94a265f58e007fb598c97b7
      1bfeb1dc
    • S
      add execveat syscall number to microblaze · 87c62d06
      Szabolcs Nagy 提交于
      syscall number was reserved in linux v4.0, kernel commit
      add4b1b02da7e7ec35c34dd04d351ac53f3f0dd8
      87c62d06
    • R
      improve ctype.h macros to diagnose errors · 2ca55a93
      Rich Felker 提交于
      the casts of the argument to unsigned int suppressed diagnosis of
      errors like passing a pointer instead of a character. putting the
      actual function call in an unreachable branch restores any diagnostics
      that would be present if the macros didn't exist and functions were
      used.
      2ca55a93
    • R
      19bcdeeb
    • R
      fix mips fesetenv(FE_DFL_ENV) again · 8b0d66d2
      Rich Felker 提交于
      commit 5fc14878 attempted to fix it,
      but neglected the fact that mips has branch delay slots.
      8b0d66d2
    • R
      fix PLT call offset in sh dlsym asm · aecdbb30
      Rich Felker 提交于
      the braf instruction's destination register is an offset from the
      address of the braf instruction plus 4 (or equivalently, the address
      of the next instruction after the delay slot). the code for dlsym was
      incorrectly computing the offset to pass using the address of the
      delay slot itself. in other places, a label was placed after the delay
      slot, but I find this confusing. putting the label on the branch
      instruction itself, and manually adding 4, makes it more clear which
      branch the offset in the constant pool goes with.
      aecdbb30
    • R
      fix sh build regressions in asm · 33615cd5
      Rich Felker 提交于
      even hidden functions need @PLT symbol references; otherwise an
      absolute address is produced instead of a PC-relative one.
      33615cd5
    • R
      fix sh __set_thread_area uninitialized return value · 64fbd15f
      Rich Felker 提交于
      this caused the dynamic linker/startup code to abort when r0 happened
      to contain a negative value.
      64fbd15f
    • R
      redesign sigsetjmp so that signal mask is restored after longjmp · 583e5512
      Rich Felker 提交于
      the conventional way to implement sigsetjmp is to save the signal mask
      then tail-call to setjmp; siglongjmp then restores the signal mask and
      calls longjmp. the problem with this approach is that a signal already
      pending, or arriving between unmasking of signals and restoration of
      the saved stack pointer, will have its signal handler run on the stack
      that was active before siglongjmp was called. this can lead to
      unbounded stack usage when siglongjmp is used to leave a signal
      handler.
      
      in the new design, sigsetjmp saves its own return address inside the
      extended part of the sigjmp_buf (outside the __jmp_buf part used by
      setjmp) then calls setjmp to save a jmp_buf inside its own execution.
      it then tail-calls to __sigsetjmp_tail, which uses the return value of
      setjmp to determine whether to save the current signal mask or restore
      a previously-saved mask.
      
      as an added bonus, this design makes it so that siglongjmp and longjmp
      are identical. this is useful because the __longjmp_chk function we
      need to add for ABI-compatibility assumes siglongjmp and longjmp are
      the same, but for different reasons -- it was designed assuming either
      can access a flag just past the __jmp_buf indicating whether the
      signal masked was saved, and act on that flag. however, early versions
      of musl did not have space past the __jmp_buf for the non-sigjmp_buf
      version of jmp_buf, so our setjmp cannot store such a flag without
      risking clobbering memory on (very) old binaries.
      583e5512
  6. 15 4月, 2015 3 次提交
    • R
      use hidden __tls_get_new for tls/tlsdesc lookup fallback cases · 81e18eb3
      Rich Felker 提交于
      previously, the dynamic tlsdesc lookup functions and the i386
      special-ABI ___tls_get_addr (3 underscores) function called
      __tls_get_addr when the slot they wanted was not already setup;
      __tls_get_addr would then in turn also see that it's not setup and
      call __tls_get_new.
      
      calling __tls_get_new directly is both more efficient and avoids the
      issue of calling a non-hidden (public API/ABI) function from asm.
      
      for the special i386 function, a weak reference to __tls_get_new is
      used since this function is not defined when static linking (the code
      path that needs it is unreachable in static-linked programs).
      81e18eb3
    • R
      cleanup use of visibility attributes in pthread_cancel.c · 9c738dc1
      Rich Felker 提交于
      applying the attribute to a weak_alias macro was a hack. instead use a
      separate declaration to apply the visibility, and consolidate
      declarations together to avoid having visibility mess all over the
      file.
      9c738dc1
    • R
      7405cd1e
  7. 14 4月, 2015 7 次提交
    • R
      72b25ddb
    • R
      consistently use hidden visibility for cancellable syscall internals · cbc02ba2
      Rich Felker 提交于
      in a few places, non-hidden symbols were referenced from asm in ways
      that assumed ld-time binding. while these is no semantic reason these
      symbols need to be hidden, fixing the references without making them
      hidden was going to be ugly, and hidden reduces some bloat anyway.
      
      in the asm files, .global/.hidden directives have been moved to the
      top to unclutter the actual code.
      cbc02ba2
    • R
      fix inconsistent visibility for internal __tls_get_new function · bc081f62
      Rich Felker 提交于
      at the point of call it was declared hidden, but the definition was
      not hidden. for some toolchains this inconsistency produced textrels
      without ld-time binding.
      bc081f62
    • R
      use hidden visibility for i386 asm-internal __vsyscall symbol · da7ccf82
      Rich Felker 提交于
      otherwise the call instruction in the inline syscall asm results in
      textrels without ld-time binding.
      da7ccf82
    • R
      make _dlstart_c function use hidden visibility · f1faa0e1
      Rich Felker 提交于
      otherwise the call/jump from the crt_arch.h asm may not resolve
      correctly without -Bsymbolic-functions.
      f1faa0e1
    • R
      remove initializers for decoded aux/dyn arrays in dynamic linker · f4f9562c
      Rich Felker 提交于
      the zero initialization is redundant since decode_vec does its own
      clearing, and it increases the risk that buggy compilers will generate
      calls to memset. as long as symbols are bound at ld time, such a call
      will not break anything, but it may be desirable to turn off ld-time
      binding in the future.
      f4f9562c
    • R
      allow libc itself to be built with stack protector enabled · 1ef849c6
      Rich Felker 提交于
      this was already essentially possible as a result of the previous
      commits changing the dynamic linker/thread pointer bootstrap process.
      this commit mainly adds build system infrastructure:
      
      configure no longer attempts to disable stack protector. instead it
      simply determines how so the makefile can disable stack protector for
      a few translation units used during early startup.
      
      stack protector is also disabled for memcpy and memset since compilers
      (incorrectly) generate calls to them on some archs to implement
      struct initialization and assignment, and such calls may creep into
      early initialization.
      
      no explicit attempt to enable stack protector is made by configure at
      this time; any stack protector option supported by the compiler can be
      passed to configure in CFLAGS, and if the compiler uses stack
      protector by default, this default is respected.
      1ef849c6