hurd: Fix static initialization with -fstack-protector-strong
authorSamuel Thibault <samuel.thibault@ens-lyon.org>
Sun, 27 Aug 2017 20:26:49 +0000 (22:26 +0200)
committerSamuel Thibault <samuel.thibault@ens-lyon.org>
Sun, 27 Aug 2017 20:29:43 +0000 (22:29 +0200)
commit99ee4d26dc07c3eadfbf6793db26ef9dfb1551e5
tree44121c6237d1bfbf27d9508c51328207f94c8802
parent97e02ad23392f929862d6a04643e7f2fd91baebc
hurd: Fix static initialization with -fstack-protector-strong

When linked statically, TLS initialization is not achieved before
mach_init and alike, so ssp accesses to tcbhead's stack_guard would
crash.  We can just avoid using ssp in the few functions needed before
TLS is set up.

* mach/Makefile (CFLAGS-mach_init.o, CFLAGS-RPC_vm_statistics.o,
CFLAGS-RPC_vm_map.o, CFLAGS-RPC_vm_protect.o,
CFLAGS-RPC_i386_set_gdt.o, CFLAGS-RPC_i386_set_ldt.o,
CFLAGS-RPC_task_get_special_port.o): Add $(no-stack-protector).
* hurd/Makefile (CFLAGS-hurdstartup.o,
CFLAGS-RPC_exec_startup_get_info.o): Add $(no-stack-protector).
ChangeLog
hurd/Makefile
mach/Makefile