Avoid injecting sanitizer runtimes into staticlibs (#64629).
This commit is contained in:
parent
a16dca337d
commit
a2feb9c6cc
3 changed files with 21 additions and 5 deletions
|
|
@ -738,10 +738,10 @@ impl<'a> CrateLoader<'a> {
|
|||
if !self.sess.crate_types.borrow().iter().all(|ct| {
|
||||
match *ct {
|
||||
// Link the runtime
|
||||
config::CrateType::Staticlib |
|
||||
config::CrateType::Executable => true,
|
||||
// This crate will be compiled with the required
|
||||
// instrumentation pass
|
||||
config::CrateType::Staticlib |
|
||||
config::CrateType::Rlib |
|
||||
config::CrateType::Dylib |
|
||||
config::CrateType::Cdylib =>
|
||||
|
|
|
|||
|
|
@ -4,12 +4,18 @@
|
|||
|
||||
-include ../tools.mk
|
||||
|
||||
# This test builds a staticlib, then an executable that links to it.
|
||||
# The staticlib and executable both are compiled with address sanitizer,
|
||||
# and we assert that a fault in the staticlib is correctly detected.
|
||||
# This test first builds a staticlib with AddressSanitizer and checks that
|
||||
# linking it to an executable fails due to the missing sanitizer runtime.
|
||||
# It then builds an executable linking to the staticlib and checks that
|
||||
# the fault in the staticlib is detected correctly.
|
||||
|
||||
# Note that checking for the link failure actually checks two things at once:
|
||||
# 1) That the library has the sanitizer intrumentation
|
||||
# 2) and that library does not have the sanitizer runtime
|
||||
|
||||
all:
|
||||
$(RUSTC) -g -Z sanitizer=address --crate-type staticlib --target $(TARGET) library.rs
|
||||
$(CC) program.c $(call STATICLIB,library) $(call OUT_EXE,program) $(EXTRACFLAGS) $(EXTRACXXFLAGS)
|
||||
! $(CC) program.c $(call STATICLIB,library) $(call OUT_EXE,program) $(EXTRACFLAGS) $(EXTRACXXFLAGS)
|
||||
$(RUSTC) -g -Z sanitizer=address --crate-type bin --target $(TARGET) -L . program.rs
|
||||
LD_LIBRARY_PATH=$(TMPDIR) $(TMPDIR)/program 2>&1 | $(CGREP) stack-buffer-overflow
|
||||
|
||||
|
|
|
|||
|
|
@ -0,0 +1,10 @@
|
|||
#[link(name = "library")]
|
||||
extern {
|
||||
fn overflow();
|
||||
}
|
||||
|
||||
fn main() {
|
||||
unsafe {
|
||||
overflow();
|
||||
}
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue