Commit 3a266bcd by Martin Liska Committed by Martin Liska

Do not error for no_sanitize attributes (PR sanitizer/82490).

2017-10-11  Martin Liska  <mliska@suse.cz>

	PR sanitizer/82490
	* opts.c (parse_no_sanitize_attribute): Do not use error_value
	variable.
	* opts.h (parse_no_sanitize_attribute): Remove last argument.
2017-10-11  Martin Liska  <mliska@suse.cz>

	PR sanitizer/82490
	* c-attribs.c (handle_no_sanitize_attribute): Report directly
	Wattributes warning.
2017-10-11  Martin Liska  <mliska@suse.cz>

	PR sanitizer/82490
	* c-c++-common/ubsan/attrib-5.c: New test.

From-SVN: r253640
parent 050dcb6a
2017-10-11 Martin Liska <mliska@suse.cz>
PR sanitizer/82490
* opts.c (parse_no_sanitize_attribute): Do not use error_value
variable.
* opts.h (parse_no_sanitize_attribute): Remove last argument.
2017-10-11 Martin Liska <mliska@suse.cz>
* print-rtl.c (print_insn): Move declaration of idbuf
to same scope as name.
2017-10-11 Martin Liska <mliska@suse.cz>
PR sanitizer/82490
* c-attribs.c (handle_no_sanitize_attribute): Report directly
Wattributes warning.
2017-10-10 Richard Sandiford <richard.sandiford@linaro.org>
* c-ada-spec.c (dump_generic_ada_node): Use wi::to_wide when
......
......@@ -613,15 +613,8 @@ handle_no_sanitize_attribute (tree *node, tree name, tree args, int,
return NULL_TREE;
}
char *error_value = NULL;
char *string = ASTRDUP (TREE_STRING_POINTER (id));
unsigned int flags = parse_no_sanitize_attribute (string, &error_value);
if (error_value)
{
error ("wrong argument: \"%s\"", error_value);
return NULL_TREE;
}
unsigned int flags = parse_no_sanitize_attribute (string);
add_no_sanitize_value (*node, flags);
......
......@@ -1700,11 +1700,10 @@ parse_sanitizer_options (const char *p, location_t loc, int scode,
}
/* Parse string values of no_sanitize attribute passed in VALUE.
Values are separated with comma. Wrong argument is stored to
WRONG_ARGUMENT variable. */
Values are separated with comma. */
unsigned int
parse_no_sanitize_attribute (char *value, char **wrong_argument)
parse_no_sanitize_attribute (char *value)
{
unsigned int flags = 0;
unsigned int i;
......@@ -1722,7 +1721,8 @@ parse_no_sanitize_attribute (char *value, char **wrong_argument)
}
if (sanitizer_opts[i].name == NULL)
*wrong_argument = q;
warning (OPT_Wattributes,
"%<%s%> attribute directive ignored", q);
q = strtok (NULL, ",");
}
......
......@@ -390,7 +390,7 @@ extern void handle_common_deferred_options (void);
unsigned int parse_sanitizer_options (const char *, location_t, int,
unsigned int, int, bool);
unsigned int parse_no_sanitize_attribute (char *value, char **wrong_argument);
unsigned int parse_no_sanitize_attribute (char *value);
extern bool common_handle_option (struct gcc_options *opts,
struct gcc_options *opts_set,
const struct cl_decoded_option *decoded,
......
2017-10-11 Martin Liska <mliska@suse.cz>
PR sanitizer/82490
* c-c++-common/ubsan/attrib-5.c: New test.
2017-10-11 Martin Liska <mliska@suse.cz>
Revert r253637:
PR sanitizer/82484
......
/* { dg-do compile } */
/* { dg-options "-fsanitize=undefined" } */
__attribute__((no_sanitize("foobar")))
static void
float_cast2 (void)
{ /* { dg-warning "attribute directive ignored" } */
volatile double d = 300;
volatile signed char c;
c = d;
}
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment