#!/bin/sh # SPDX-License-Identifier: GPL-2.0-only set -e # Argument 1: Source file to build. IN="$1" shift # Extract just the filename for error messages below. FILE="${IN##*/}" # Extract the function name for error messages below. FUNC="${FILE#*-}" FUNC="${FUNC%%-*}" FUNC="${FUNC%%.*}" # Extract the symbol to test for in build/symbol test below. WANT="__${FILE%%-*}" # Argument 2: Where to write the build log. OUT="$1" shift TMP="${OUT}.tmp" # Argument 3: Path to "nm" tool. NM="$1" shift # Remaining arguments are: $(CC) $(c_flags) # Clean up temporary file at exit. __cleanup() { rm -f "$TMP" } trap __cleanup EXIT # Function names in warnings are wrapped in backticks under UTF-8 locales. # Run the commands with LANG=C so that grep output will not change. export LANG=C status= # Attempt to build a source that is expected to fail with a specific warning. if "$@" -Werror -c "$IN" -o "$OUT".o 2> "$TMP" ; then # If the build succeeds, either the test has failed or the # warning may only happen at link time (Clang). In that case, # make sure the expected symbol is unresolved in the symbol list. # If so, FORTIFY is working for this case. if ! $NM -A "$OUT".o | grep -m1 "\bU ${WANT}$" >>"$TMP" ; then status="warning: unsafe ${FUNC}() usage lacked '$WANT' symbol in $IN" fi else # If the build failed, check for the warning in the stderr. # GCC: # ./include/linux/fortify-string.h:316:25: error: call to '__write_overflow_field' declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror=attribute-warning] # Clang 14: # ./include/linux/fortify-string.h:316:4: error: call to __write_overflow_field declared with 'warning' attribute: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror,-Wattribute-warning] if ! grep -Eq -m1 "error: call to .?\b${WANT}\b.?" "$TMP" ; then status="warning: unsafe ${FUNC}() usage lacked '$WANT' warning in $IN" fi fi if [ -n "$status" ]; then # Report on failure results, including compilation warnings. echo "$status" | tee "$OUT" >&2 else # Report on good results, and save any compilation output to log. echo "ok: unsafe ${FUNC}() usage correctly detected with '$WANT' in $IN" >"$OUT" fi cat "$TMP" >>"$OUT" range</option> </select> <input class='txt' type='search' size='10' name='q' value=''/> <input type='submit' value='search'/> </form> </td></tr></table> <div class='path'>path: <a href='/cgit/git.armlinux.org.uk/linux-net-next.git/log/?id=2c3a368127e1b56b32e147971ab804176ff4c9f3'>root</a>/<a href='/cgit/git.armlinux.org.uk/linux-net-next.git/log/net?id=2c3a368127e1b56b32e147971ab804176ff4c9f3'>net</a>/<a href='/cgit/git.armlinux.org.uk/linux-net-next.git/log/net/mac80211?id=2c3a368127e1b56b32e147971ab804176ff4c9f3'>mac80211</a></div><div class='content'><table class='list nowrap'><tr class='nohover'><th class='left'>Age</th><th class='left'>Commit message (<a href='/cgit/git.armlinux.org.uk/linux-net-next.git/log/net/mac80211?id=2c3a368127e1b56b32e147971ab804176ff4c9f3&showmsg=1'>Expand</a>)</th><th class='left'>Author</th></tr>