diff options
author | Elliott Hughes <enh@google.com> | 2016-04-01 21:02:25 -0700 |
---|---|---|
committer | Elliott Hughes <enh@google.com> | 2016-04-01 21:02:25 -0700 |
commit | 17fdd028da5569ba6e29c338381b60d2d8a499c8 (patch) | |
tree | 234c799a3e92860521a62b00d2b83695c88f3af3 /tests/stack_protector_test_helper.cpp | |
parent | 2152a8ca3550ff0c9c998bfd4d6ab741758063ec (diff) |
Remove a workaround from stack_protector_test that's not needed in master.
The compiler in master doesn't leave a gap between the buffer and the stack
guard canary.
Bug: http://b/27815668
Change-Id: Iae6681683881055c2719d661a2179f5305c23135
Diffstat (limited to 'tests/stack_protector_test_helper.cpp')
-rw-r--r-- | tests/stack_protector_test_helper.cpp | 5 |
1 files changed, 0 insertions, 5 deletions
diff --git a/tests/stack_protector_test_helper.cpp b/tests/stack_protector_test_helper.cpp index 53a5e05de..3f15a123f 100644 --- a/tests/stack_protector_test_helper.cpp +++ b/tests/stack_protector_test_helper.cpp @@ -22,10 +22,5 @@ __attribute__((noinline)) void modify_stack_protector_test() { // Without volatile, the generic x86/x86-64 targets don't write to the stack. volatile char* p = buf; int size = static_cast<int>(sizeof(buf) + 1); -#if __x86_64__ - // The generic x86-64 target leaves an 8-byte gap between `buf` and the stack guard. - // We only need to corrupt one byte though. - size += 8; -#endif while ((p - buf) < size) *p++ = '\0'; } |