summaryrefslogtreecommitdiff
path: root/gcc/asan.c
diff options
context:
space:
mode:
authorygribov <ygribov@138bc75d-0d04-0410-961f-82ee72b054a4>2015-04-22 11:44:26 +0000
committerygribov <ygribov@138bc75d-0d04-0410-961f-82ee72b054a4>2015-04-22 11:44:26 +0000
commit5cd86e488dbc88b0b37d4dafec3e0680b518c826 (patch)
tree2fa8400720fb57497963cddeeb781ee766598e6f /gcc/asan.c
parent0fd9bea85e7f9f3979a01686cb7fbe97887b5a33 (diff)
downloadgcc-5cd86e488dbc88b0b37d4dafec3e0680b518c826.tar.gz
2015-04-22 Yury Gribov <y.gribov@samsung.com>
Allow wildcards in -fsanitize-sections. gcc/ * asan.c (set_sanitized_sections): Parse incoming arg. (section_sanitized_p): Support wildcards. * doc/invoke.texi (-fsanitize-sections): Update description. gcc/testsuite/ * c-c++-common/asan/user-section-1.c: New test. * c-c++-common/asan/user-section-2.c: New test. * c-c++-common/asan/user-section-3.c: New test. git-svn-id: svn+ssh://gcc.gnu.org/svn/gcc/trunk@222322 138bc75d-0d04-0410-961f-82ee72b054a4
Diffstat (limited to 'gcc/asan.c')
-rw-r--r--gcc/asan.c36
1 files changed, 22 insertions, 14 deletions
diff --git a/gcc/asan.c b/gcc/asan.c
index cd6ccdc9070..479301ad2f0 100644
--- a/gcc/asan.c
+++ b/gcc/asan.c
@@ -88,6 +88,7 @@ along with GCC; see the file COPYING3. If not see
#include "ubsan.h"
#include "params.h"
#include "builtins.h"
+#include "fnmatch.h"
/* AddressSanitizer finds out-of-bounds and use-after-free bugs
with <2x slowdown on average.
@@ -272,7 +273,7 @@ along with GCC; see the file COPYING3. If not see
static unsigned HOST_WIDE_INT asan_shadow_offset_value;
static bool asan_shadow_offset_computed;
-static const char *sanitized_sections;
+static vec<char *> sanitized_sections;
/* Sets shadow offset to value in string VAL. */
@@ -298,9 +299,22 @@ set_asan_shadow_offset (const char *val)
/* Set list of user-defined sections that need to be sanitized. */
void
-set_sanitized_sections (const char *secs)
+set_sanitized_sections (const char *sections)
{
- sanitized_sections = secs;
+ char *pat;
+ unsigned i;
+ FOR_EACH_VEC_ELT (sanitized_sections, i, pat)
+ free (pat);
+ sanitized_sections.truncate (0);
+
+ for (const char *s = sections; *s; )
+ {
+ const char *end;
+ for (end = s; *end && *end != ','; ++end);
+ size_t len = end - s;
+ sanitized_sections.safe_push (xstrndup (s, len));
+ s = *end ? end + 1 : end;
+ }
}
/* Checks whether section SEC should be sanitized. */
@@ -308,17 +322,11 @@ set_sanitized_sections (const char *secs)
static bool
section_sanitized_p (const char *sec)
{
- if (!sanitized_sections)
- return false;
- size_t len = strlen (sec);
- const char *p = sanitized_sections;
- while ((p = strstr (p, sec)))
- {
- if ((p == sanitized_sections || p[-1] == ',')
- && (p[len] == 0 || p[len] == ','))
- return true;
- ++p;
- }
+ char *pat;
+ unsigned i;
+ FOR_EACH_VEC_ELT (sanitized_sections, i, pat)
+ if (fnmatch (pat, sec, FNM_PERIOD) == 0)
+ return true;
return false;
}