Commit 38b28c6e by Thomas Preud'homme Committed by Thomas Preud'homme

Improve fstack_protector effective target

Effective target fstack_protector fails to return an error for
newlib-based target (such as arm-none-eabi targets) which does not
support stack protector. This is due to the test being too simplist for
stack protection code to be generated by GCC: it does not contain a
local buffer and does not read unknown input.

This commit adds a small local buffer with a copy of the filename to
trigger stack protector code to be generated. The filename is used
instead of the full path so as to ensure the size will fit in the local
buffer.

2017-12-07  Thomas Preud'homme  <thomas.preudhomme@arm.com>

    gcc/testsuite/
    * lib/target-supports.exp (check_effective_target_fstack_protector):
    Copy filename in local buffer to trigger stack protection.

From-SVN: r255484
parent d3861707
2017-12-07 Thomas Preud'homme <thomas.preudhomme@arm.com>
* lib/target-supports.exp (check_effective_target_fstack_protector):
Copy filename in local buffer to trigger stack protection.
2017-12-07 Joseph Myers <joseph@codesourcery.com>
* gcc.dg/c11-align-7.c, gcc.dg/c11-align-8.c,
......
......@@ -1064,7 +1064,11 @@ proc check_effective_target_static {} {
# Return 1 if the target supports -fstack-protector
proc check_effective_target_fstack_protector {} {
return [check_runtime fstack_protector {
int main (void) { return 0; }
#include <string.h>
int main (int argc, char *argv[]) {
char buf[64];
return !strcpy (buf, strrchr (argv[0], '/'));
}
} "-fstack-protector"]
}
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment