Allow wildcards in -fsanitize-sections.
2015-04-22 Yury Gribov <y.gribov@samsung.com> Allow wildcards in -fsanitize-sections. gcc/ * asan.c (set_sanitized_sections): Parse incoming arg. (section_sanitized_p): Support wildcards. * doc/invoke.texi (-fsanitize-sections): Update description. gcc/testsuite/ * c-c++-common/asan/user-section-1.c: New test. * c-c++-common/asan/user-section-2.c: New test. * c-c++-common/asan/user-section-3.c: New test. From-SVN: r222322
This commit is contained in:
parent
5cf3629251
commit
860503d8cc
7 changed files with 69 additions and 15 deletions
|
@ -1,3 +1,9 @@
|
|||
2015-04-22 Yury Gribov <y.gribov@samsung.com>
|
||||
|
||||
* doc/invoke.texi (-fsanitize-sections): Update description.
|
||||
* asan.c (set_sanitized_sections): Parse incoming arg.
|
||||
(section_sanitized_p): Support wildcards.
|
||||
|
||||
2015-04-22 Tom de Vries <tom@codesourcery.com>
|
||||
|
||||
PR tree-optimization/65823
|
||||
|
|
36
gcc/asan.c
36
gcc/asan.c
|
@ -88,6 +88,7 @@ along with GCC; see the file COPYING3. If not see
|
|||
#include "ubsan.h"
|
||||
#include "params.h"
|
||||
#include "builtins.h"
|
||||
#include "fnmatch.h"
|
||||
|
||||
/* AddressSanitizer finds out-of-bounds and use-after-free bugs
|
||||
with <2x slowdown on average.
|
||||
|
@ -272,7 +273,7 @@ along with GCC; see the file COPYING3. If not see
|
|||
|
||||
static unsigned HOST_WIDE_INT asan_shadow_offset_value;
|
||||
static bool asan_shadow_offset_computed;
|
||||
static const char *sanitized_sections;
|
||||
static vec<char *> sanitized_sections;
|
||||
|
||||
/* Sets shadow offset to value in string VAL. */
|
||||
|
||||
|
@ -298,9 +299,22 @@ set_asan_shadow_offset (const char *val)
|
|||
/* Set list of user-defined sections that need to be sanitized. */
|
||||
|
||||
void
|
||||
set_sanitized_sections (const char *secs)
|
||||
set_sanitized_sections (const char *sections)
|
||||
{
|
||||
sanitized_sections = secs;
|
||||
char *pat;
|
||||
unsigned i;
|
||||
FOR_EACH_VEC_ELT (sanitized_sections, i, pat)
|
||||
free (pat);
|
||||
sanitized_sections.truncate (0);
|
||||
|
||||
for (const char *s = sections; *s; )
|
||||
{
|
||||
const char *end;
|
||||
for (end = s; *end && *end != ','; ++end);
|
||||
size_t len = end - s;
|
||||
sanitized_sections.safe_push (xstrndup (s, len));
|
||||
s = *end ? end + 1 : end;
|
||||
}
|
||||
}
|
||||
|
||||
/* Checks whether section SEC should be sanitized. */
|
||||
|
@ -308,17 +322,11 @@ set_sanitized_sections (const char *secs)
|
|||
static bool
|
||||
section_sanitized_p (const char *sec)
|
||||
{
|
||||
if (!sanitized_sections)
|
||||
return false;
|
||||
size_t len = strlen (sec);
|
||||
const char *p = sanitized_sections;
|
||||
while ((p = strstr (p, sec)))
|
||||
{
|
||||
if ((p == sanitized_sections || p[-1] == ',')
|
||||
&& (p[len] == 0 || p[len] == ','))
|
||||
return true;
|
||||
++p;
|
||||
}
|
||||
char *pat;
|
||||
unsigned i;
|
||||
FOR_EACH_VEC_ELT (sanitized_sections, i, pat)
|
||||
if (fnmatch (pat, sec, FNM_PERIOD) == 0)
|
||||
return true;
|
||||
return false;
|
||||
}
|
||||
|
||||
|
|
|
@ -5806,7 +5806,8 @@ Kernel AddressSanitizer.
|
|||
|
||||
@item -fsanitize-sections=@var{s1,s2,...}
|
||||
@opindex fsanitize-sections
|
||||
Sanitize global variables in selected user-defined sections.
|
||||
Sanitize global variables in selected user-defined sections. @var{si} may
|
||||
contain wildcards.
|
||||
|
||||
@item -fsanitize-recover@r{[}=@var{opts}@r{]}
|
||||
@opindex fsanitize-recover
|
||||
|
|
|
@ -1,3 +1,9 @@
|
|||
2015-04-22 Yury Gribov <y.gribov@samsung.com>
|
||||
|
||||
* c-c++-common/asan/user-section-1.c: New test.
|
||||
* c-c++-common/asan/user-section-2.c: New test.
|
||||
* c-c++-common/asan/user-section-3.c: New test.
|
||||
|
||||
2015-04-22 Hale Wang <hale.wang@arm.com>
|
||||
Terry Guo <terry.guo@arm.com>
|
||||
|
||||
|
|
11
gcc/testsuite/c-c++-common/asan/user-section-1.c
Normal file
11
gcc/testsuite/c-c++-common/asan/user-section-1.c
Normal file
|
@ -0,0 +1,11 @@
|
|||
/* { dg-do compile } */
|
||||
/* { dg-options "-fsanitize=address -fsanitize-sections=.xxx,.yyy -fdump-tree-sanopt" } */
|
||||
/* { dg-skip-if "" { *-*-* } { "-flto" } { "" } } */
|
||||
|
||||
int x __attribute__((section(".xxx"))) = 1;
|
||||
int y __attribute__((section(".yyy"))) = 1;
|
||||
int z __attribute__((section(".zzz"))) = 1;
|
||||
|
||||
/* { dg-final { scan-tree-dump "__builtin___asan_unregister_globals \\(.*, 2\\);" "sanopt" } } */
|
||||
/* { dg-final { cleanup-tree-dump "sanopt" } } */
|
||||
|
11
gcc/testsuite/c-c++-common/asan/user-section-2.c
Normal file
11
gcc/testsuite/c-c++-common/asan/user-section-2.c
Normal file
|
@ -0,0 +1,11 @@
|
|||
/* { dg-do compile } */
|
||||
/* { dg-options "-fsanitize=address -fsanitize-sections=.x* -fdump-tree-sanopt" } */
|
||||
/* { dg-skip-if "" { *-*-* } { "-flto" } { "" } } */
|
||||
|
||||
int x __attribute__((section(".x1"))) = 1;
|
||||
int y __attribute__((section(".x2"))) = 1;
|
||||
int z __attribute__((section(".x3"))) = 1;
|
||||
|
||||
/* { dg-final { scan-tree-dump "__builtin___asan_unregister_globals \\(.*, 3\\);" "sanopt" } } */
|
||||
/* { dg-final { cleanup-tree-dump "sanopt" } } */
|
||||
|
11
gcc/testsuite/c-c++-common/asan/user-section-3.c
Normal file
11
gcc/testsuite/c-c++-common/asan/user-section-3.c
Normal file
|
@ -0,0 +1,11 @@
|
|||
/* { dg-do compile } */
|
||||
/* { dg-options "-fsanitize=address -fsanitize-sections=.x* -fsanitize-sections=.y* -fdump-tree-sanopt" } */
|
||||
/* { dg-skip-if "" { *-*-* } { "-flto" } { "" } } */
|
||||
|
||||
int x __attribute__((section(".x1"))) = 1;
|
||||
int y __attribute__((section(".x2"))) = 1;
|
||||
int z __attribute__((section(".y1"))) = 1;
|
||||
|
||||
/* { dg-final { scan-tree-dump "__builtin___asan_unregister_globals \\(.*, 1\\);" "sanopt" } } */
|
||||
/* { dg-final { cleanup-tree-dump "sanopt" } } */
|
||||
|
Loading…
Add table
Reference in a new issue