From patchwork Fri Sep 20 20:45:42 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kamil Rytarowski X-Patchwork-Id: 1165441 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=gcc.gnu.org (client-ip=209.132.180.131; helo=sourceware.org; envelope-from=gcc-patches-return-509379-incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=gmx.com Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=gcc.gnu.org header.i=@gcc.gnu.org header.b="pO0Zbmbo"; dkim=fail reason="signature verification failed" (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.b="WbgbCRcx"; dkim-atps=neutral Received: from sourceware.org (server1.sourceware.org [209.132.180.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 46Zm3j27J6z9s00 for ; Sat, 21 Sep 2019 06:46:57 +1000 (AEST) DomainKey-Signature: a=rsa-sha1; c=nofws; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:cc:subject:date:message-id:mime-version :content-transfer-encoding; q=dns; s=default; b=QcoRTz3kE8UgInRf cdhN4pRhm6U2Uk6TO1s6t7gZxxKwG88phzOxXBMfhD4gOgJjofg75i1ps+SfcK0l 2PCraCshc2MW67PVJhN9BEDa/Bf9YgsJ12hx7q07R2K10BCzXK5NVxInmzOnT8Z4 SIh6o+bvP470dZaADnEzDsLxx9I= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:cc:subject:date:message-id:mime-version :content-transfer-encoding; s=default; bh=1/Ipm4xaLsKzMNUA0L832S 0tUBA=; b=pO0ZbmboxUxrvOtnUqLbeQ20ykvs1+jfAIjOvdSaypTfEdz18pXf1g n2QIQoKaDa99fNKWM0Bm3Vufjh1BqpXQCQKNC16t8fmLZQDOTK366gIGuU5qT6Vy 2JJniAzPwujzTz02x5ODSxlQ7fYJXP90NNjsMT7ZSlMVjHqk5Qxz4= Received: (qmail 57754 invoked by alias); 20 Sep 2019 20:46:50 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Delivered-To: mailing list gcc-patches@gcc.gnu.org Received: (qmail 57746 invoked by uid 89); 20 Sep 2019 20:46:49 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-15.0 required=5.0 tests=AWL, BAYES_00, FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FROM, GIT_PATCH_0, GIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, RCVD_IN_DNSWL_NONE, SPF_PASS autolearn=ham version=3.3.1 spammy= X-HELO: mout.gmx.net Received: from mout.gmx.net (HELO mout.gmx.net) (212.227.15.15) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Fri, 20 Sep 2019 20:46:48 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1569012398; bh=pd5scUc7th/1Jg+kq0ezuKjk8P3JYC2WAtF+ZO5mLKs=; h=X-UI-Sender-Class:From:To:Cc:Subject:Date; b=WbgbCRcx6eEbJF+ihBNDLn0nP4h+oRDWPpnIKtMcSMY5A1p8P0DkNjLasrqzk+FKG Xri0nFhK6HPiVE2RN28GcDiL2LNOQcXgmhqHxGfd9Gn6/SB3Rp+ZrCjmh+WyB6fi9K 0TA8rLvi85sf+KUW6H5APYgoAUE0bFCkKa4kKnZw= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from localhost.localdomain ([89.71.135.231]) by mail.gmx.com (mrgmx005 [212.227.17.184]) with ESMTPSA (Nemesis) id 1MD9T1-1iJuF50y93-009CYb; Fri, 20 Sep 2019 22:46:38 +0200 From: Kamil Rytarowski To: gcc-patches@gcc.gnu.org Cc: dvyukov@google.com, kcc@google.com, vitalybuka@google.com, jakub@redhat.com Subject: [PATCH] 2019-09-20 Kamil Rytarowski Date: Fri, 20 Sep 2019 22:45:42 +0200 Message-Id: <20190920204541.610-1-n54@gmx.com> MIME-Version: 1.0 X-IsSubscribed: yes GCC version of https://reviews.llvm.org/D67719 From 422827582d84e078df2a8e303d807c830a155ab5 Mon Sep 17 00:00:00 2001 From: Kamil Rytarowski Date: Fri, 20 Sep 2019 22:02:09 +0200 Subject: [PATCH] 2019-09-20 Kamil Rytarowski * cppbuiltin.c (define_builtin_macros_for_compilation_flags): Add new builtin __SANITIZE_LEAK__ macros for fsanitize=leak switch. * doc/cpp.texi: Document new macros. * c-c++-common/lsan/sanitize-leak-macro.c: New test. --- gcc/ChangeLog | 6 ++++++ gcc/cppbuiltin.c | 3 +++ gcc/doc/cpp.texi | 3 +++ gcc/testsuite/ChangeLog | 4 ++++ .../c-c++-common/lsan/sanitize-lsan-macro.c | 12 ++++++++++++ 5 files changed, 28 insertions(+) create mode 100644 gcc/testsuite/c-c++-common/lsan/sanitize-lsan-macro.c -- 2.23.0 diff --git a/gcc/ChangeLog b/gcc/ChangeLog index 76269e17eb0..1bddb4835a0 100644 --- a/gcc/ChangeLog +++ b/gcc/ChangeLog @@ -1,3 +1,9 @@ +2019-09-20 Kamil Rytarowski + + * cppbuiltin.c (define_builtin_macros_for_compilation_flags): Add new + builtin __SANITIZE_LEAK__ macros for fsanitize=leak switch. + * doc/cpp.texi: Document new macros. + 2019-09-20 Richard Biener Uros Bizjak diff --git a/gcc/cppbuiltin.c b/gcc/cppbuiltin.c index 60e5bedc366..5a1b6555c53 100644 --- a/gcc/cppbuiltin.c +++ b/gcc/cppbuiltin.c @@ -93,6 +93,9 @@ define_builtin_macros_for_compilation_flags (cpp_reader *pfile) if (flag_sanitize & SANITIZE_ADDRESS) cpp_define (pfile, "__SANITIZE_ADDRESS__"); + if (flag_sanitize & SANITIZE_LEAK) + cpp_define (pfile, "__SANITIZE_LEAK__"); + if (flag_sanitize & SANITIZE_THREAD) cpp_define (pfile, "__SANITIZE_THREAD__"); diff --git a/gcc/doc/cpp.texi b/gcc/doc/cpp.texi index f2de39a270c..74861eaf9c5 100644 --- a/gcc/doc/cpp.texi +++ b/gcc/doc/cpp.texi @@ -2359,6 +2359,9 @@ in use. This macro is defined, with value 1, when @option{-fsanitize=address} or @option{-fsanitize=kernel-address} are in use. +@item __SANITIZE_LEAK__ +This macro is defined, with value 1, when @option{-fsanitize=leak} is in use. + @item __SANITIZE_THREAD__ This macro is defined, with value 1, when @option{-fsanitize=thread} is in use. diff --git a/gcc/testsuite/ChangeLog b/gcc/testsuite/ChangeLog index 05c25ee28ce..4b37e1f3643 100644 --- a/gcc/testsuite/ChangeLog +++ b/gcc/testsuite/ChangeLog @@ -1,3 +1,7 @@ +2019-09-20 Kamil Rytarowski + + * c-c++-common/lsan/sanitize-leak-macro.c: New test. + 2019-09-20 Iain Sandoe * gcc.target/i386/naked-1.c: Alter options to use non- diff --git a/gcc/testsuite/c-c++-common/lsan/sanitize-lsan-macro.c b/gcc/testsuite/c-c++-common/lsan/sanitize-lsan-macro.c new file mode 100644 index 00000000000..c588aa32e86 --- /dev/null +++ b/gcc/testsuite/c-c++-common/lsan/sanitize-lsan-macro.c @@ -0,0 +1,12 @@ +/* Check that -fsanitize=leak options defines __SANITIZE_LEAK__ macros. */ +/* { dg-do compile } */ +/* { dg-skip-if "" { *-*-* } { "*" } { "-O0" } } */ + +int +main () +{ +#ifndef __SANITIZE_LEAK__ + bad construction +#endif + return 0; +}