diff options
author | H.J. Lu <hjl.tools@gmail.com> | 2024-10-04 16:21:15 +0800 |
---|---|---|
committer | H.J. Lu <hjl.tools@gmail.com> | 2024-10-05 03:22:00 +0800 |
commit | 7d2845da112214f064e7b24531cc67e256b5177e (patch) | |
tree | ce80b35c81ab3bc7c9f5a5375e83160bdee63aa8 /gcc | |
parent | 20ce363c557d6458ec3193ab4e7df760fbe34976 (diff) | |
download | gcc-7d2845da112214f064e7b24531cc67e256b5177e.zip gcc-7d2845da112214f064e7b24531cc67e256b5177e.tar.gz gcc-7d2845da112214f064e7b24531cc67e256b5177e.tar.bz2 |
x86: Disable stack protector for naked functions
Since naked functions should not enable stack protector, define
TARGET_STACK_PROTECT_RUNTIME_ENABLED_P to disable stack protector
for naked functions.
gcc/
PR target/116962
* config/i386/i386.cc (ix86_stack_protect_runtime_enabled_p): New
function.
(TARGET_STACK_PROTECT_RUNTIME_ENABLED_P): New.
gcc/testsuite/
PR target/116962
* gcc.target/i386/pr116962.c: New file.
Signed-off-by: H.J. Lu <hjl.tools@gmail.com>
Diffstat (limited to 'gcc')
-rw-r--r-- | gcc/config/i386/i386.cc | 11 | ||||
-rw-r--r-- | gcc/testsuite/gcc.target/i386/pr116962.c | 10 |
2 files changed, 21 insertions, 0 deletions
diff --git a/gcc/config/i386/i386.cc b/gcc/config/i386/i386.cc index ad2e7b4..90a564b 100644 --- a/gcc/config/i386/i386.cc +++ b/gcc/config/i386/i386.cc @@ -24435,6 +24435,13 @@ ix86_stack_protect_guard (void) return default_stack_protect_guard (); } +static bool +ix86_stack_protect_runtime_enabled_p (void) +{ + /* Naked functions should not enable stack protector. */ + return !ix86_function_naked (current_function_decl); +} + /* For 32-bit code we can save PIC register setup by using __stack_chk_fail_local hidden function instead of calling __stack_chk_fail directly. 64-bit code doesn't need to setup any PIC @@ -26821,6 +26828,10 @@ ix86_libgcc_floating_mode_supported_p #undef TARGET_STACK_PROTECT_GUARD #define TARGET_STACK_PROTECT_GUARD ix86_stack_protect_guard +#undef TARGET_STACK_PROTECT_RUNTIME_ENABLED_P +#define TARGET_STACK_PROTECT_RUNTIME_ENABLED_P \ + ix86_stack_protect_runtime_enabled_p + #if !TARGET_MACHO #undef TARGET_STACK_PROTECT_FAIL #define TARGET_STACK_PROTECT_FAIL ix86_stack_protect_fail diff --git a/gcc/testsuite/gcc.target/i386/pr116962.c b/gcc/testsuite/gcc.target/i386/pr116962.c new file mode 100644 index 0000000..ced16ee --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/pr116962.c @@ -0,0 +1,10 @@ +/* { dg-do compile { target fstack_protector } } */ +/* { dg-options "-O2 -fstack-protector-all" } */ +/* { dg-final { scan-assembler-not "__stack_chk_fail" } } */ + +__attribute__ ((naked)) +void +foo (void) +{ + asm ("ret"); +} |