]> git.ipfire.org Git - thirdparty/gcc.git/commit - gcc/sanitizer.def
sanitizer.def (BUILT_IN_ASAN_BEFORE_DYNAMIC_INIT, [...]): New.
authorJakub Jelinek <jakub@redhat.com>
Fri, 22 Nov 2013 20:04:45 +0000 (21:04 +0100)
committerJakub Jelinek <jakub@gcc.gnu.org>
Fri, 22 Nov 2013 20:04:45 +0000 (21:04 +0100)
commit59b36ecf239ba0164f55a2ac2cd37154d7963dd9
treed11dfc57c47e4f7387f7f22a57a8e10b78aab3e1
parent3e749749392a1d8e0db2ddc311239ccbc200a09f
sanitizer.def (BUILT_IN_ASAN_BEFORE_DYNAMIC_INIT, [...]): New.

* sanitizer.def (BUILT_IN_ASAN_BEFORE_DYNAMIC_INIT,
BUILT_IN_ASAN_AFTER_DYNAMIC_INIT): New.
* asan.c (instrument_derefs): Handle also VAR_DECL loads/stores.
Don't instrument accesses to VAR_DECLs which are known to fit
into their bounds and the vars are known to have shadow bytes
indicating allowed access.
(asan_dynamic_init_call): New function.
(asan_add_global): If vnode->dynamically_initialized,
set __has_dynamic_init to 1 instead of 0.
(initialize_sanitizer_builtins): Add BT_FN_VOID_CONST_PTR var.
* asan.h (asan_dynamic_init_call): New prototype.
* cgraph.h (varpool_node): Add dynamically_initialized bitfield.
cp/
* decl2.c: Include asan.h.
(one_static_initialization_or_destruction): If -fsanitize=address,
init is non-NULL and guard is NULL, set
vnode->dynamically_initialized.
(do_static_initialization_or_destruction): Call
__asan_{before,after}_dynamic_init around the static initialization.
testsuite/
* c-c++-common/asan/no-redundant-instrumentation-1.c: Tweak to avoid
optimizing away some __asan_report* calls.

From-SVN: r205282
gcc/ChangeLog
gcc/asan.c
gcc/asan.h
gcc/cgraph.h
gcc/cp/ChangeLog
gcc/cp/decl2.c
gcc/sanitizer.def
gcc/testsuite/ChangeLog
gcc/testsuite/c-c++-common/asan/no-redundant-instrumentation-1.c