From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 9241 invoked by alias); 10 Apr 2014 16:01:37 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Received: (qmail 9229 invoked by uid 89); 10 Apr 2014 16:01:36 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-4.0 required=5.0 tests=AWL,BAYES_00,RP_MATCHES_RCVD,SPF_HELO_PASS,SPF_PASS autolearn=ham version=3.3.2 X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Thu, 10 Apr 2014 16:01:36 +0000 Received: from int-mx01.intmail.prod.int.phx2.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id s3AG1YU8027547 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 10 Apr 2014 12:01:34 -0400 Received: from greed.delorie.com (ovpn-113-46.phx2.redhat.com [10.3.113.46]) by int-mx01.intmail.prod.int.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id s3AG1X8n007762 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 10 Apr 2014 12:01:34 -0400 Received: from greed.delorie.com (greed.delorie.com [127.0.0.1]) by greed.delorie.com (8.14.4/8.14.4) with ESMTP id s3AG1WfG012679; Thu, 10 Apr 2014 12:01:32 -0400 Received: (from dj@localhost) by greed.delorie.com (8.14.4/8.14.4/Submit) id s3AG1VSv012678; Thu, 10 Apr 2014 12:01:31 -0400 Date: Thu, 10 Apr 2014 16:01:00 -0000 Message-Id: <201404101601.s3AG1VSv012678@greed.delorie.com> From: DJ Delorie To: Jakub Jelinek CC: bonzini@gnu.org, aoliva@redhat.com, Ralf.Wildenhues@gmx.de, rguenther@suse.de, gcc-patches@gcc.gnu.org In-reply-to: <20140410055906.GP1817@tucnak.redhat.com> (message from Jakub Jelinek on Thu, 10 Apr 2014 07:59:06 +0200) Subject: Re: Patch ping References: <20140409130721.GK1817@tucnak.redhat.com> <201404092229.s39MTmXp015920@greed.delorie.com> <20140410055906.GP1817@tucnak.redhat.com> X-IsSubscribed: yes X-SW-Source: 2014-04/txt/msg00510.txt.bz2 > But ubsan is a new feature in 4.9, and it is a bootstrap failure > with that feature. I will leave it up to the release manager to decide if they want this non-regression patch applied before the branch, then. > This is for the host libiberty only, and only when gcc is configured > a certain way. The intent is to have libiberty that is going to be > linked into all the build and host tools instrumented, so that we > actually catch bugs in libiberty or bugs in host/build tools calling > libiberty functions as much as possible, but for the lto-plugin, > which is dlopened by the linker which we don't have a control on, we > need host libiberty without the address sanitization because > otherwise it would only work properly if the linker itself has been > address sanitized. So, if libiberty isn't built with sanitization, it would still *work* but not be instrumented?