diff options
author | Florian Weimer <fweimer@redhat.com> | 2019-07-22 14:02:40 +0200 |
---|---|---|
committer | Florian Weimer <fweimer@redhat.com> | 2019-07-22 14:02:40 +0200 |
commit | d5873c6e794d8bd9e68c3675341b80c91030ebae (patch) | |
tree | 38255f8b8b75a135ca8ddafa7cb8e145e6a40745 | |
parent | c1d1e0c9f242f03521ef023a0e2cac071b5f0133 (diff) | |
download | glibc-fw/gcc-10-fixes.tar.gz glibc-fw/gcc-10-fixes.tar.xz glibc-fw/gcc-10-fixes.zip |
nptl: Use uintptr_t for address diagnostic in nptl/tst-pthread-getattr fw/gcc-10-fixes
Recent GCC versions warn about the attempt to return the address of a local variable: tst-pthread-getattr.c: In function ‘allocate_and_test’: tst-pthread-getattr.c:54:10: error: function returns address of local variable [-Werror=return-local-addr] 54 | return mem; | ^~~ In file included from ../include/alloca.h:3, from tst-pthread-getattr.c:26: ../stdlib/alloca.h:35:23: note: declared here 35 | # define alloca(size) __builtin_alloca (size) | ^~~~~~~~~~~~~~~~~~~~~~~ tst-pthread-getattr.c:51:9: note: in expansion of macro ‘alloca’ 51 | mem = alloca ((size_t) (mem - target)); | ^~~~~~ The address itself is used in a check in the caller, so using uintptr_t instead is reasonable.
-rw-r--r-- | ChangeLog | 6 | ||||
-rw-r--r-- | nptl/tst-pthread-getattr.c | 11 |
2 files changed, 11 insertions, 6 deletions
diff --git a/ChangeLog b/ChangeLog index c6dbb2e817..e30cf048b6 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,5 +1,11 @@ 2019-07-22 Florian Weimer <fweimer@redhat.com> + * nptl/tst-pthread-getattr.c (allocate_and_test): Change return + type to uintptr_t. + (check_stack_top): Adjust. + +2019-07-22 Florian Weimer <fweimer@redhat.com> + * sysdeps/unix/sysv/linux/bits/socket.h [__USE_MISC]: Include <linux/sockios.h>. diff --git a/nptl/tst-pthread-getattr.c b/nptl/tst-pthread-getattr.c index a954778767..e3634ea0a7 100644 --- a/nptl/tst-pthread-getattr.c +++ b/nptl/tst-pthread-getattr.c @@ -43,7 +43,7 @@ static size_t pagesize; /* Check if the page in which TARGET lies is accessible. This will segfault if it fails. */ -static volatile char * +static volatile uintptr_t allocate_and_test (char *target) { volatile char *mem = (char *) &mem; @@ -51,7 +51,7 @@ allocate_and_test (char *target) mem = alloca ((size_t) (mem - target)); *mem = 42; - return mem; + return (uintptr_t) mem; } static int @@ -84,7 +84,6 @@ check_stack_top (void) { struct rlimit stack_limit; void *stackaddr; - volatile void *mem; size_t stacksize = 0; int ret; uintptr_t pagemask = ~(pagesize - 1); @@ -130,14 +129,14 @@ check_stack_top (void) stack and test access there. It is however sufficient to simply check if the top page is accessible, so we target our access halfway up the top page. Thanks Chris Metcalf for this idea. */ - mem = allocate_and_test (stackaddr + pagesize / 2); + uintptr_t mem = allocate_and_test (stackaddr + pagesize / 2); /* Before we celebrate, make sure we actually did test the same page. */ - if (((uintptr_t) stackaddr & pagemask) != ((uintptr_t) mem & pagemask)) + if (((uintptr_t) stackaddr & pagemask) != (mem & pagemask)) { printf ("We successfully wrote into the wrong page.\n" "Expected %#" PRIxPTR ", but got %#" PRIxPTR "\n", - (uintptr_t) stackaddr & pagemask, (uintptr_t) mem & pagemask); + (uintptr_t) stackaddr & pagemask, mem & pagemask); return 1; } |