mirror of
https://forge.sourceware.org/marek/gcc.git
synced 2026-02-22 12:00:11 -05:00
Check stack canary before throwing exception to avoid stack corruption. gcc/ PR middle-end/58245 * calls.cc: Include "tree-eh.h". (expand_call): Check stack canary before throwing exception. gcc/testsuite/ PR middle-end/58245 * g++.dg/fstack-protector-strong.C: Adjusted. * g++.dg/pr58245-1.C: New test.
89 lines
1.3 KiB
C
89 lines
1.3 KiB
C
/* Test that stack protection is done on chosen functions. */
|
|
|
|
/* { dg-do compile { target i?86-*-* x86_64-*-* } } */
|
|
/* { dg-options "-O2 -fstack-protector-strong" } */
|
|
|
|
/* This test checks the presence of __stack_chk_fail function in assembler.
|
|
* Compiler generates _stack_chk_fail_local (wrapper) calls instead for PIC.
|
|
*/
|
|
/* { dg-require-effective-target nonpic } */
|
|
|
|
class A
|
|
{
|
|
public:
|
|
A() {}
|
|
~A() {}
|
|
void method();
|
|
int state;
|
|
};
|
|
|
|
/* Frame address exposed to A::method via "this". */
|
|
int
|
|
foo1 ()
|
|
{
|
|
A a;
|
|
a.method ();
|
|
return a.state;
|
|
}
|
|
|
|
/* Possible destroying foo2's stack via &a. */
|
|
int
|
|
global_func (A& a);
|
|
|
|
/* Frame address exposed to global_func. */
|
|
int foo2 ()
|
|
{
|
|
A a;
|
|
return global_func (a);
|
|
}
|
|
|
|
/* Frame addressed exposed through return slot. */
|
|
|
|
struct B
|
|
{
|
|
/* Discourage passing this struct in registers. */
|
|
int a1, a2, a3, a4, a5, a6, a7, a8, a9, a10;
|
|
int method ();
|
|
B return_slot();
|
|
};
|
|
|
|
B global_func ();
|
|
void noop ();
|
|
|
|
int foo3 ()
|
|
{
|
|
return global_func ().a1;
|
|
}
|
|
|
|
int foo4 ()
|
|
{
|
|
try {
|
|
noop ();
|
|
return 0;
|
|
} catch (...) {
|
|
return global_func ().a1;
|
|
}
|
|
}
|
|
|
|
int foo5 ()
|
|
{
|
|
try {
|
|
return global_func ().a1;
|
|
} catch (...) {
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
int foo6 ()
|
|
{
|
|
B b;
|
|
return b.method ();
|
|
}
|
|
|
|
int foo7 (B *p)
|
|
{
|
|
return p->return_slot ().a1;
|
|
}
|
|
|
|
/* { dg-final { scan-assembler-times "stack_chk_fail" 8 } } */
|