From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 12007 invoked by alias); 10 Mar 2017 13:14:07 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Received: (qmail 11754 invoked by uid 89); 10 Mar 2017 13:14:05 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.9 required=5.0 tests=BAYES_00,RP_MATCHES_RCVD,SPF_HELO_PASS autolearn=ham version=3.3.2 spammy=Ready X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Fri, 10 Mar 2017 13:14:03 +0000 Received: from int-mx11.intmail.prod.int.phx2.redhat.com (int-mx11.intmail.prod.int.phx2.redhat.com [10.5.11.24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id C8B7D7E9D3; Fri, 10 Mar 2017 13:14:03 +0000 (UTC) Received: from tucnak.zalov.cz (ovpn-117-76.ams2.redhat.com [10.36.117.76]) by int-mx11.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id v2ADE2pu027656 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 10 Mar 2017 08:14:03 -0500 Received: from tucnak.zalov.cz (localhost [127.0.0.1]) by tucnak.zalov.cz (8.15.2/8.15.2) with ESMTP id v2ADDx7h010505; Fri, 10 Mar 2017 14:13:59 +0100 Received: (from jakub@localhost) by tucnak.zalov.cz (8.15.2/8.15.2/Submit) id v2ADDuYT010504; Fri, 10 Mar 2017 14:13:56 +0100 Date: Fri, 10 Mar 2017 13:14:00 -0000 From: Jakub Jelinek To: Martin =?utf-8?B?TGnFoWth?= Cc: gcc-patches@gcc.gnu.org Subject: Re: [PATCH] MPX: Fix option handling. Message-ID: <20170310131356.GW22703@tucnak> Reply-To: Jakub Jelinek References: <3e6191d0bdfcf0e287b17e580407863e01aa39da.1488881229.git.mliska@suse.cz> <20170307162114.GN22703@tucnak> <7102c1d7-6d08-79fa-292c-b33e3f790bce@suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <7102c1d7-6d08-79fa-292c-b33e3f790bce@suse.cz> User-Agent: Mutt/1.7.1 (2016-10-04) X-IsSubscribed: yes X-SW-Source: 2017-03/txt/msg00525.txt.bz2 On Fri, Mar 10, 2017 at 02:09:20PM +0100, Martin Liška wrote: > Hello. > > This is follow-up patch which I agreed on with Jakub. > It enables CHKP with LSAN and majority of UBSAN options. > > Patch can bootstrap on x86_64-linux-gnu and survives regression tests. > > Ready to be installed? > Martin > >From a410d5e4e028d34dc00b4aa637cdcd3986b971d8 Mon Sep 17 00:00:00 2001 > From: marxin > Date: Fri, 10 Mar 2017 11:05:27 +0100 > Subject: [PATCH] MPX: Fix option handling. > > gcc/ChangeLog: > > 2017-03-10 Martin Liska > > PR target/65705 > PR target/69804 > * toplev.c (process_options): Enable MPX with LSAN and UBSAN > (except -fsanitize=bounds and -fsanitize=bounds-strict). Please avoid the ()s, that is confusing with ()s used to surround function etc. names. Just use UBSAN, except ... strict. > * tree-chkp.c (chkp_walk_pointer_assignments): Verify that > FIELD != NULL. > + error_at (UNKNOWN_LOCATION, > + "-fcheck-pointer-bounds is not supported with " > + "-fsanitize=bounds-strict"); > + flag_check_pointer_bounds = 0; Given the recent i18n discussions, perhaps this ought to be %<-fcheck-pointer-bounds%> and %<-fsanitize=bounds-strict%> and similarly elsewhere (of course not for Address/Thread Sanitizer words). Ok for trunk either way. Jakub