Viewing file: fstack-protector-strong.C (1.33 KB) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
/* Test that stack protection is done on chosen functions. */
/* { dg-do compile { target i?86-*-* x86_64-*-* } } */ /* { dg-options "-O2 -fstack-protector-strong" } */
/* This test checks the presence of __stack_chk_fail function in assembler. * Compiler generates _stack_chk_fail_local (wrapper) calls instead for PIC. */ /* { dg-require-effective-target nonpic } */
class A { public: A() {} ~A() {} void method(); int state; };
/* Frame address exposed to A::method via "this". */ int foo1 () { A a; a.method (); return a.state; }
/* Possible destroying foo2's stack via &a. */ int global_func (A& a);
/* Frame address exposed to global_func. */ int foo2 () { A a; return global_func (a); }
/* Frame addressed exposed through return slot. */
struct B { /* Discourage passing this struct in registers. */ int a1, a2, a3, a4, a5, a6, a7, a8, a9, a10; int method (); B return_slot(); };
B global_func (); void noop ();
int foo3 () { return global_func ().a1; }
int foo4 () { try { noop (); return 0; } catch (...) { return global_func ().a1; } }
int foo5 () { try { return global_func ().a1; } catch (...) { return 0; } }
int foo6 () { B b; return b.method (); }
int foo7 (B *p) { return p->return_slot ().a1; }
/* { dg-final { scan-assembler-times "stack_chk_fail" 7 } } */
|