string: Disable stack protector for memset in early static initialization
[glibc.git] / debug / Makefile
blob3903cc97a37063541e1fbf0d294b510865ca811b
1 # Copyright (C) 1998-2024 Free Software Foundation, Inc.
2 # Copyright The GNU Toolchain Authors.
3 # This file is part of the GNU C Library.
5 # The GNU C Library is free software; you can redistribute it and/or
6 # modify it under the terms of the GNU Lesser General Public
7 # License as published by the Free Software Foundation; either
8 # version 2.1 of the License, or (at your option) any later version.
10 # The GNU C Library is distributed in the hope that it will be useful,
11 # but WITHOUT ANY WARRANTY; without even the implied warranty of
12 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 # Lesser General Public License for more details.
15 # You should have received a copy of the GNU Lesser General Public
16 # License along with the GNU C Library; if not, see
17 # <https://www.gnu.org/licenses/>.
20 # Sub-makefile for debug portion of the library.
22 subdir := debug
24 include ../Makeconfig
26 headers := execinfo.h
28 # Note that ptsname_r_chk and getlogin_r are not here, but in
29 # login/Makefile instead. If that subdir is omitted from the
30 # build, its _FORTIFY_SOURCE support will be too.
31 routines = \
32 $(static-only-routines) \
33 ____longjmp_chk \
34 asprintf_chk \
35 backtrace \
36 backtracesyms \
37 backtracesymsfd \
38 chk_fail \
39 confstr_chk \
40 dprintf_chk \
41 explicit_bzero_chk \
42 fdelt_chk \
43 fgets_chk \
44 fgets_u_chk \
45 fgetws_chk \
46 fgetws_u_chk \
47 fortify_fail \
48 fprintf_chk \
49 fread_chk \
50 fread_u_chk \
51 fwprintf_chk \
52 getcwd_chk \
53 getdomainname_chk \
54 getgroups_chk \
55 gethostname_chk \
56 gets_chk \
57 getwd_chk \
58 longjmp_chk \
59 mbsnrtowcs_chk \
60 mbsrtowcs_chk \
61 mbstowcs_chk \
62 memcpy_chk \
63 memmove_chk \
64 mempcpy_chk \
65 memset_chk \
66 noophooks \
67 obprintf_chk \
68 poll_chk \
69 ppoll_chk \
70 pread64_chk \
71 pread_chk \
72 printf_chk \
73 read_chk \
74 readlink_chk \
75 readlinkat_chk \
76 readonly-area \
77 realpath_chk \
78 recv_chk \
79 recvfrom_chk \
80 snprintf_chk \
81 sprintf_chk \
82 stack_chk_fail \
83 stpcpy_chk \
84 stpncpy_chk \
85 strcat_chk \
86 strcpy_chk \
87 strlcat_chk \
88 strlcpy_chk \
89 strncat_chk \
90 strncpy_chk \
91 swprintf_chk \
92 ttyname_r_chk \
93 vasprintf_chk \
94 vdprintf_chk \
95 vfprintf_chk \
96 vfwprintf_chk \
97 vobprintf_chk \
98 vprintf_chk \
99 vsnprintf_chk \
100 vsprintf_chk \
101 vswprintf_chk \
102 vwprintf_chk \
103 wcpcpy_chk \
104 wcpncpy_chk \
105 wcrtomb_chk \
106 wcscat_chk \
107 wcscpy_chk \
108 wcslcat_chk \
109 wcslcpy_chk \
110 wcsncat_chk \
111 wcsncpy_chk \
112 wcsnrtombs_chk \
113 wcsrtombs_chk \
114 wcstombs_chk \
115 wctomb_chk \
116 wmemcpy_chk \
117 wmemmove_chk \
118 wmempcpy_chk \
119 wmemset_chk \
120 wprintf_chk \
121 # routines
122 static-only-routines := stack_chk_fail_local
124 # Don't add stack_chk_fail_local.o to libc.a since __stack_chk_fail_local
125 # is an alias of __stack_chk_fail in stack_chk_fail.o.
126 elide-routines.o := stack_chk_fail_local
128 # Building the stack-protector failure routines with stack protection
129 # is not required since we have already failed a stack check and are
130 # exiting the process. However, the local aliases which jump to the
131 # real routines should still be compiled with stack protection
132 # (stack_chk_fail_local.c), so that the statically linked parts of the
133 # library have the expected flags.
135 CFLAGS-stack_chk_fail.c += $(no-stack-protector)
137 CFLAGS-backtrace.c += -fno-omit-frame-pointer -funwind-tables
138 CFLAGS-sprintf_chk.c += $(libio-mtsafe)
139 CFLAGS-snprintf_chk.c += $(libio-mtsafe)
140 CFLAGS-vsprintf_chk.c += $(libio-mtsafe)
141 CFLAGS-vsnprintf_chk.c += $(libio-mtsafe)
142 CFLAGS-asprintf_chk.c += $(libio-mtsafe)
143 CFLAGS-vasprintf_chk.c += $(libio-mtsafe)
144 CFLAGS-obprintf_chk.c += $(libio-mtsafe)
145 CFLAGS-dprintf_chk.c += $(libio-mtsafe) -fexceptions
146 CFLAGS-vdprintf_chk.c += $(libio-mtsafe) -fexceptions
147 CFLAGS-printf_chk.c += $(libio-mtsafe) -fexceptions
148 CFLAGS-fprintf_chk.c += $(libio-mtsafe) -fexceptions
149 CFLAGS-vprintf_chk.c += $(libio-mtsafe) -fexceptions
150 CFLAGS-vfprintf_chk.c += $(libio-mtsafe) -fexceptions
151 CFLAGS-gets_chk.c += $(libio-mtsafe) -fexceptions
152 CFLAGS-fgets_chk.c += $(libio-mtsafe) -fexceptions
153 CFLAGS-fgets_u_chk.c += $(libio-mtsafe) -fexceptions
154 CFLAGS-fread_chk.c += $(libio-mtsafe) -fexceptions
155 CFLAGS-fread_u_chk.c += $(libio-mtsafe) -fexceptions
156 CFLAGS-swprintf_chk.c += $(libio-mtsafe)
157 CFLAGS-vswprintf_chk.c += $(libio-mtsafe)
158 CFLAGS-wprintf_chk.c += $(libio-mtsafe) -fexceptions
159 CFLAGS-fwprintf_chk.c += $(libio-mtsafe) -fexceptions
160 CFLAGS-vwprintf_chk.c += $(libio-mtsafe) -fexceptions
161 CFLAGS-vfwprintf_chk.c += $(libio-mtsafe) -fexceptions
162 CFLAGS-fgetws_chk.c += $(libio-mtsafe) -fexceptions
163 CFLAGS-fgetws_u_chk.c += $(libio-mtsafe) -fexceptions
164 CFLAGS-read_chk.c += -fexceptions -fasynchronous-unwind-tables
165 CFLAGS-pread_chk.c += -fexceptions -fasynchronous-unwind-tables
166 CFLAGS-pread64_chk.c += -fexceptions -fasynchronous-unwind-tables
167 CFLAGS-recv_chk.c += -fexceptions -fasynchronous-unwind-tables
168 CFLAGS-recvfrom_chk.c += -fexceptions -fasynchronous-unwind-tables
170 # Need to make sure the settings here override what configure might have
171 # set up for us, so keep the CFLAGS/CPPFLAGS split logical as the order is:
172 # <user CFLAGS> <test CFLAGS> <user CPPFLAGS> <test CPPFLAGS>
173 CFLAGS-tst-longjmp_chk.c += -fexceptions -fasynchronous-unwind-tables
174 CPPFLAGS-tst-longjmp_chk.c += $(no-fortify-source),-D_FORTIFY_SOURCE=1
175 CFLAGS-tst-longjmp_chk2.c += -fexceptions -fasynchronous-unwind-tables
176 CPPFLAGS-tst-longjmp_chk2.c += $(no-fortify-source),-D_FORTIFY_SOURCE=1
177 CFLAGS-tst-longjmp_chk3.c += -fexceptions -fasynchronous-unwind-tables
178 CPPFLAGS-tst-longjmp_chk3.c += $(no-fortify-source),-D_FORTIFY_SOURCE=1
179 CPPFLAGS-tst-realpath-chk.c += $(no-fortify-source),-D_FORTIFY_SOURCE=2
180 CPPFLAGS-tst-chk-cancel.c += $(no-fortify-source),-D_FORTIFY_SOURCE=2
181 CFLAGS-tst-sprintf-fortify-rdonly.c += $(no-fortify-source),-D_FORTIFY_SOURCE=2
182 CFLAGS-tst-fortify-syslog.c += $(no-fortify-source),-D_FORTIFY_SOURCE=2
183 CFLAGS-tst-fortify-wide.c += $(no-fortify-source),-D_FORTIFY_SOURCE=2
185 # _FORTIFY_SOURCE tests.
186 # Auto-generate tests for _FORTIFY_SOURCE for different levels, compilers and
187 # preprocessor conditions based on tst-fortify.c.
189 # To add a new test condition, define a cflags-$(cond) make variable to set
190 # CFLAGS for the file.
192 tests-all-chk = tst-fortify
193 tests-c-def-chk =
194 tests-cc-def-chk =
195 tests-c-time64-chk =
196 tests-cc-time64-chk =
198 CFLAGS-tst-fortify.c += -Wno-format -Wno-deprecated-declarations -Wno-error
200 # No additional flags for the default tests.
201 define cflags-default
202 endef
204 define cflags-lfs
205 CFLAGS-tst-fortify-$(1)-lfs-$(2)-$(3).$(1) += -D_FILE_OFFSET_BITS=64
206 endef
208 define cflags-nongnu
209 CFLAGS-tst-fortify-$(1)-nongnu-$(2)-$(3).$(1) += -D_LARGEFILE64_SOURCE=1
210 endef
212 src-chk-nongnu = \#undef _GNU_SOURCE
214 # We know these tests have problems with format strings, this is what
215 # we are testing. Disable that warning. They are also testing
216 # deprecated functions (notably gets) so disable that warning as well.
217 # And they also generate warnings from warning attributes, which
218 # cannot be disabled via pragmas, so require -Wno-error to be used.
219 define gen-chk-test
220 tests-$(1)-$(4)-chk += tst-fortify-$(1)-$(2)-$(3)-$(4)
221 CFLAGS-tst-fortify-$(1)-$(2)-$(3)-$(4).$(1) += $(no-fortify-source),-D_FORTIFY_SOURCE=$(3) -Wno-format \
222 -Wno-deprecated-declarations \
223 -Wno-error
224 $(eval $(call cflags-$(2),$(1),$(3),$(4)))
225 $(objpfx)tst-fortify-$(1)-$(2)-$(3)-$(4).$(1): tst-fortify.c Makefile
226 ( echo "/* Autogenerated from Makefile. */"; \
227 echo "$(src-chk-$(2))"; \
228 echo "#include \"tst-fortify.c\"" ) > $$@.tmp
229 mv $$@.tmp $$@
230 endef
232 chk-extensions = c cc
233 chk-types = default lfs nongnu
234 # 64 bit time_t implies LFS.
235 chk-types-time64 = default nongnu
236 chk-levels = 1 2 3
238 $(foreach e,$(chk-extensions), \
239 $(foreach t,$(chk-types), \
240 $(foreach l,$(chk-levels), \
241 $(eval $(call gen-chk-test,$(e),$(t),$(l),def)))))
243 tests-all-chk += $(tests-c-def-chk) $(tests-cc-def-chk)
245 $(foreach e,$(chk-extensions), \
246 $(foreach t,$(chk-types-time64), \
247 $(foreach l,$(chk-levels), \
248 $(eval $(call gen-chk-test,$(e),$(t),$(l),time64)))))
250 tests-all-time64-chk += $(tests-c-time64-chk) $(tests-cc-time64-chk)
252 define link-cc
253 LDLIBS-$(1) = -lstdc++
254 endef
255 $(foreach t,$(tests-cc-def-chk), $(eval $(call link-cc,$(t))))
256 $(foreach t,$(tests-cc-time64-chk), $(eval $(call link-cc,$(t))))
258 # backtrace_symbols only works if we link with -rdynamic. backtrace
259 # requires unwind tables on most architectures.
260 CFLAGS-tst-backtrace2.c += -funwind-tables
261 CFLAGS-tst-backtrace3.c += -funwind-tables
262 CFLAGS-tst-backtrace4.c += -funwind-tables
263 CFLAGS-tst-backtrace5.c += -funwind-tables
264 CFLAGS-tst-backtrace6.c += -funwind-tables
265 LDFLAGS-tst-backtrace2 = -rdynamic
266 LDFLAGS-tst-backtrace3 = -rdynamic
267 LDFLAGS-tst-backtrace4 = -rdynamic
268 LDFLAGS-tst-backtrace5 = -rdynamic
269 LDFLAGS-tst-backtrace6 = -rdynamic
271 CFLAGS-tst-ssp-1.c += -fstack-protector-all
273 # Disable compiler optimizations around vsprintf (the function under test).
274 CFLAGS-tst-sprintf-fortify-unchecked.c = \
275 -fno-builtin-vsprintf -fno-builtin-__vsprintf_chk
277 tests = \
278 $(tests-all-chk) \
279 backtrace-tst \
280 test-stpcpy_chk \
281 test-strcpy_chk \
282 tst-backtrace2 \
283 tst-backtrace3 \
284 tst-backtrace4 \
285 tst-backtrace5 \
286 tst-backtrace6 \
287 tst-fortify-wide \
288 tst-longjmp_chk \
289 tst-longjmp_chk2 \
290 tst-realpath-chk \
291 tst-sprintf-fortify-rdonly \
292 tst-sprintf-fortify-unchecked \
293 # tests
295 tests-time64 += \
296 $(tests-all-time64-chk) \
297 # tests-time64
299 tests-container += \
300 tst-fortify-syslog \
301 # tests-container
303 ifeq ($(have-ssp),yes)
304 tests += tst-ssp-1
305 endif
307 ifeq ($(have-thread-library), yes)
308 tests += tst-chk-cancel
309 endif
311 ifeq (,$(CXX))
312 tests-unsupported = $(tests-cc-def-chk) $(tests-cc-time64-chk)
313 endif
315 extra-libs = libpcprofile
316 extra-libs-others = $(extra-libs)
318 libpcprofile-routines = pcprofile
319 libpcprofile-inhibit-o = $(filter-out .os,$(object-suffixes))
321 others = pcprofiledump
322 install-bin = pcprofiledump
323 install-bin-script = xtrace
325 generated += xtrace
327 include ../Rules
329 ifeq ($(run-built-tests),yes)
330 LOCALES := de_DE.UTF-8
331 include ../gen-locales.mk
333 define chk-gen-locales
334 $(objpfx)$(1).out: $(gen-locales)
335 endef
336 $(foreach t, $(tests-all-chk), $(eval $(call chk-gen-locales,$(t))))
337 $(foreach t, $(tests-all-time64-chk), $(eval $(call chk-gen-locales,$(t))))
338 endif
340 sLIBdir := $(shell echo $(slibdir) | sed 's,lib\(\|64\)$$,\\\\$$LIB,')
342 $(objpfx)pcprofiledump: $(objpfx)pcprofiledump.o
344 $(objpfx)xtrace: xtrace.sh
345 rm -f $@.new
346 sed -e 's|@VERSION@|$(version)|' -e 's|@SLIBDIR@|$(sLIBdir)|' \
347 -e 's|@BINDIR@|$(bindir)|' -e 's|@PKGVERSION@|$(PKGVERSION)|' \
348 -e 's|@REPORT_BUGS_TO@|$(REPORT_BUGS_TO)|' $^ > $@.new \
349 && rm -f $@ && mv $@.new $@ && chmod +x $@
351 $(objpfx)tst-chk-cancel: $(shared-thread-library)