public inbox for gcc-cvs@sourceware.org
help / color / mirror / Atom feed
* [gcc r13-1166] Daily bump.
@ 2022-06-19 0:17 GCC Administrator
0 siblings, 0 replies; only message in thread
From: GCC Administrator @ 2022-06-19 0:17 UTC (permalink / raw)
To: gcc-cvs
https://gcc.gnu.org/g:4390e7bfbc641a52c6192b448768dafdf4565527
commit r13-1166-g4390e7bfbc641a52c6192b448768dafdf4565527
Author: GCC Administrator <gccadmin@gcc.gnu.org>
Date: Sun Jun 19 00:16:23 2022 +0000
Daily bump.
Diff:
---
gcc/ChangeLog | 62 +++++++++++++++++++++++++++++++++++++++++++++++++
gcc/DATESTAMP | 2 +-
gcc/c-family/ChangeLog | 11 +++++++++
gcc/cp/ChangeLog | 6 +++++
gcc/fortran/ChangeLog | 8 +++++++
gcc/testsuite/ChangeLog | 32 +++++++++++++++++++++++++
6 files changed, 120 insertions(+), 1 deletion(-)
diff --git a/gcc/ChangeLog b/gcc/ChangeLog
index ac77b6ac4e2..cf564d17368 100644
--- a/gcc/ChangeLog
+++ b/gcc/ChangeLog
@@ -1,3 +1,65 @@
+2022-06-18 Jakub Jelinek <jakub@redhat.com>
+
+ * common.opt (flag_sanitize_trap): New variable.
+ (fsanitize-trap=, fsanitize-trap): New options.
+ (fsanitize-undefined-trap-on-error): Change into deprecated alias
+ for -fsanitize-trap=all.
+ * opts.h (struct sanitizer_opts_s): Add can_trap member.
+ * opts.cc (finish_options): Complain about unsupported
+ -fsanitize-trap= options.
+ (sanitizer_opts): Add can_trap values to all entries.
+ (get_closest_sanitizer_option): Ignore -fsanitize-trap=
+ options which have can_trap false.
+ (parse_sanitizer_options): Add support for -fsanitize-trap=.
+ For -fsanitize-trap=all, enable
+ SANITIZE_UNDEFINED | SANITIZE_UNDEFINED_NONDEFAULT. Disallow
+ -fsanitize-trap=vptr here.
+ (common_handle_option): Handle OPT_fsanitize_trap_ and
+ OPT_fsanitize_trap.
+ * sanopt.cc (maybe_optimize_ubsan_null_ifn): Check
+ flag_sanitize_trap & SANITIZE_{NULL,ALIGNMENT} instead of
+ flag_sanitize_undefined_trap_on_error.
+ * gcc.cc (sanitize_spec_function): Use
+ flag_sanitize & ~flag_sanitize_trap instead of flag_sanitize
+ and drop use of flag_sanitize_undefined_trap_on_error in
+ "undefined" handling.
+ * ubsan.cc (ubsan_instrument_unreachable): Use
+ flag_sanitize_trap & SANITIZE_??? instead of
+ flag_sanitize_undefined_trap_on_error.
+ (ubsan_expand_bounds_ifn, ubsan_expand_null_ifn,
+ ubsan_expand_objsize_ifn, ubsan_expand_ptr_ifn,
+ ubsan_build_overflow_builtin, instrument_bool_enum_load,
+ ubsan_instrument_float_cast, instrument_nonnull_arg,
+ instrument_nonnull_return, instrument_builtin): Likewise.
+ * doc/invoke.texi (-fsanitize-trap=, -fsanitize-trap): Document.
+ (-fsanitize-undefined-trap-on-error): Document as deprecated
+ alias of -fsanitize-trap.
+
+2022-06-18 Jakub Jelinek <jakub@redhat.com>
+
+ PR middle-end/105998
+ * varasm.cc (narrowing_initializer_constant_valid_p): Check
+ SCALAR_INT_MODE_P instead of INTEGRAL_MODE_P, also break on
+ ! INTEGRAL_TYPE_P and do the same check also on op{0,1}'s type.
+
+2022-06-18 Roger Sayle <roger@nextmovesoftware.com>
+
+ PR tree-optimization/105835
+ * match.pd (convert (mult zero_one_valued_p@1 INTEGER_CST@2)):
+ Narrow integer multiplication by a zero_one_valued_p operand.
+ (convert (cond @1 INTEGER_CST@2 INTEGER_CST@3)): Push integer
+ conversions inside COND_EXPR where both data operands are
+ integer constants.
+
+2022-06-18 Takayuki 'January June' Suwa <jjsuwa_sys3175@yahoo.co.jp>
+
+ * config/xtensa/constraints.md (Y):
+ Change to include integer constants until reload begins.
+ * config/xtensa/predicates.md (move_operand): Ditto.
+ * config/xtensa/xtensa.cc (xtensa_emit_move_sequence):
+ Change to allow storing integer constants into litpool only after
+ reload begins.
+
2022-06-17 Uroš Bizjak <ubizjak@gmail.com>
PR target/105209
diff --git a/gcc/DATESTAMP b/gcc/DATESTAMP
index 00d863e8d83..ff3ede7eb96 100644
--- a/gcc/DATESTAMP
+++ b/gcc/DATESTAMP
@@ -1 +1 @@
-20220618
+20220619
diff --git a/gcc/c-family/ChangeLog b/gcc/c-family/ChangeLog
index 1040d4ad864..a605c3c797e 100644
--- a/gcc/c-family/ChangeLog
+++ b/gcc/c-family/ChangeLog
@@ -1,3 +1,14 @@
+2022-06-18 Jakub Jelinek <jakub@redhat.com>
+
+ * c-ubsan.cc (ubsan_instrument_division, ubsan_instrument_shift):
+ Use flag_sanitize_trap & SANITIZE_??? instead of
+ flag_sanitize_undefined_trap_on_error. If 2 sanitizers are involved
+ and flag_sanitize_trap differs for them, emit __builtin_trap only
+ for the comparison where trap is requested.
+ (ubsan_instrument_vla, ubsan_instrument_return): Use
+ lag_sanitize_trap & SANITIZE_??? instead of
+ flag_sanitize_undefined_trap_on_error.
+
2022-06-13 Jason Merrill <jason@redhat.com>
* c-ubsan.cc (ubsan_instrument_return): Use BUILTINS_LOCATION.
diff --git a/gcc/cp/ChangeLog b/gcc/cp/ChangeLog
index e7fb2224824..5c1c306fff9 100644
--- a/gcc/cp/ChangeLog
+++ b/gcc/cp/ChangeLog
@@ -1,3 +1,9 @@
+2022-06-18 Jakub Jelinek <jakub@redhat.com>
+
+ * cp-ubsan.cc (cp_ubsan_instrument_vptr_p): Use
+ flag_sanitize_trap & SANITIZE_VPTR instead of
+ flag_sanitize_undefined_trap_on_error.
+
2022-06-17 Jakub Jelinek <jakub@redhat.com>
PR c++/106001
diff --git a/gcc/fortran/ChangeLog b/gcc/fortran/ChangeLog
index 27d445a9175..b6689441704 100644
--- a/gcc/fortran/ChangeLog
+++ b/gcc/fortran/ChangeLog
@@ -1,3 +1,11 @@
+2022-06-18 Harald Anlauf <anlauf@gmx.de>
+
+ PR fortran/105986
+ * simplify.cc (gfc_simplify_btest): Add check for POS argument.
+ (gfc_simplify_ibclr): Add check for POS argument.
+ (gfc_simplify_ibits): Add check for POS and LEN arguments.
+ (gfc_simplify_ibset): Add check for POS argument.
+
2022-06-08 Tobias Burnus <tobias@codesourcery.com>
* openmp.cc (gfc_match_omp_clauses): Check also parent namespace
diff --git a/gcc/testsuite/ChangeLog b/gcc/testsuite/ChangeLog
index cd1e992b0d6..d77961e74db 100644
--- a/gcc/testsuite/ChangeLog
+++ b/gcc/testsuite/ChangeLog
@@ -1,3 +1,35 @@
+2022-06-18 Harald Anlauf <anlauf@gmx.de>
+
+ PR fortran/105986
+ * gfortran.dg/check_bits_3.f90: New test.
+
+2022-06-18 Jakub Jelinek <jakub@redhat.com>
+
+ * c-c++-common/ubsan/nonnull-4.c: Use -fsanitize-trap=all
+ instead of -fsanitize-undefined-trap-on-error.
+ * c-c++-common/ubsan/div-by-zero-4.c: Use
+ -fsanitize-trap=signed-integer-overflow instead of
+ -fsanitize-undefined-trap-on-error.
+ * c-c++-common/ubsan/overflow-add-4.c: Use -fsanitize-trap=undefined
+ instead of -fsanitize-undefined-trap-on-error.
+ * c-c++-common/ubsan/pr56956.c: Likewise.
+ * c-c++-common/ubsan/pr68142.c: Likewise.
+ * c-c++-common/ubsan/pr80932.c: Use
+ -fno-sanitize-trap=all -fsanitize-trap=shift,undefined
+ instead of -fsanitize-undefined-trap-on-error.
+ * c-c++-common/ubsan/align-8.c: Use -fsanitize-trap=alignment
+ instead of -fsanitize-undefined-trap-on-error.
+
+2022-06-18 Jakub Jelinek <jakub@redhat.com>
+
+ PR middle-end/105998
+ * c-c++-common/pr105998.c: New test.
+
+2022-06-18 Roger Sayle <roger@nextmovesoftware.com>
+
+ PR tree-optimization/105835
+ * gcc.dg/pr105835.c: New test case.
+
2022-06-17 Jakub Jelinek <jakub@redhat.com>
PR c++/106001
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2022-06-19 0:17 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-06-19 0:17 [gcc r13-1166] Daily bump GCC Administrator
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).