gcc/lto-plugin
Matthew Malcomson 170e618ef5 libsanitizer: Add option to bootstrap using HWASAN
This is an analogous option to --bootstrap-asan to configure.  It allows
bootstrapping GCC using HWASAN.

For the same reasons as for ASAN we have to avoid using the HWASAN
sanitizer when compiling libiberty and the lto-plugin.

Also add a function to query whether -fsanitize=hwaddress has been
passed.

ChangeLog:

	* configure: Regenerate.
	* configure.ac: Add --bootstrap-hwasan option.

config/ChangeLog:

	* bootstrap-hwasan.mk: New file.

gcc/ChangeLog:

	* doc/install.texi: Document new option.

libiberty/ChangeLog:

	* configure: Regenerate.
	* configure.ac: Avoid using sanitizer.

lto-plugin/ChangeLog:

	* Makefile.am: Avoid using sanitizer.
	* Makefile.in: Regenerate.
2020-11-25 16:35:37 +00:00
..
ChangeLog Daily bump. 2020-09-11 00:16:28 +00:00
Makefile.am libsanitizer: Add option to bootstrap using HWASAN 2020-11-25 16:35:37 +00:00
Makefile.in libsanitizer: Add option to bootstrap using HWASAN 2020-11-25 16:35:37 +00:00
aclocal.m4 Enable Intel CET in liblto_plugin.so on Intel CET enabled host 2020-04-25 10:07:16 -07:00
config.h.in
configure Require CET support only for the final GCC build 2020-07-30 05:36:24 -07:00
configure.ac Enable Intel CET in liblto_plugin.so on Intel CET enabled host 2020-04-25 10:07:16 -07:00
lto-plugin.c If the lto plugin encounters a file with multiple symbol sections, each of which also has a v1 symbol extension section[1] then it will attempt to read the extension data for *every* symbol from each of the extension sections. This results in reading off the end of a buffer with the associated memory corruption that that entails. This patch fixes that problem. 2020-09-09 15:54:20 +01:00