From 1b89b8f062f42c782ca528be2a8239019141947f Mon Sep 17 00:00:00 2001 From: Ilya Enkovich Date: Thu, 12 Mar 2015 09:23:06 +0000 Subject: [PATCH] re PR target/65044 (ICE: SIGSEGV in contains_struct_check with -fsanitize=address -fcheck-pointer-bounds) gcc/ PR target/65044 * toplev.c (process_options): Restrict Pointer Bounds Checker usage with Address Sanitizer. gcc/testsuite/ PR target/65044 * gcc.target/i386/pr65044.c: New. From-SVN: r221379 --- gcc/ChangeLog | 6 ++++++ gcc/testsuite/ChangeLog | 5 +++++ gcc/testsuite/gcc.target/i386/pr65044.c | 12 ++++++++++++ gcc/toplev.c | 12 +++++++++++- 4 files changed, 34 insertions(+), 1 deletion(-) create mode 100644 gcc/testsuite/gcc.target/i386/pr65044.c diff --git a/gcc/ChangeLog b/gcc/ChangeLog index e800af18757..3a913208208 100644 --- a/gcc/ChangeLog +++ b/gcc/ChangeLog @@ -1,3 +1,9 @@ +2015-03-12 Ilya Enkovich + + PR target/65044 + * toplev.c (process_options): Restrict Pointer Bounds Checker + usage with Address Sanitizer. + 2015-03-12 Richard Biener * tree-cfg.c (gimple_split_block): Remove loop finding stmt diff --git a/gcc/testsuite/ChangeLog b/gcc/testsuite/ChangeLog index 04c01f2f569..485a3f8c302 100644 --- a/gcc/testsuite/ChangeLog +++ b/gcc/testsuite/ChangeLog @@ -1,3 +1,8 @@ +2015-03-12 Ilya Enkovich + + PR target/65044 + * gcc.target/i386/pr65044.c: New. + 2015-03-12 Tom de Vries PR rtl-optimization/64895 diff --git a/gcc/testsuite/gcc.target/i386/pr65044.c b/gcc/testsuite/gcc.target/i386/pr65044.c new file mode 100644 index 00000000000..4f318d62f88 --- /dev/null +++ b/gcc/testsuite/gcc.target/i386/pr65044.c @@ -0,0 +1,12 @@ +/* { dg-error "-fcheck-pointer-bounds is not supported with Address Sanitizer" } */ +/* { dg-do compile } */ +/* { dg-require-effective-target mpx } */ +/* { dg-options "-fcheck-pointer-bounds -mmpx -fsanitize=address" } */ + +extern int x[]; + +void +foo () +{ + x[0] = 0; +} diff --git a/gcc/toplev.c b/gcc/toplev.c index 99cf1806905..b06eed3e997 100644 --- a/gcc/toplev.c +++ b/gcc/toplev.c @@ -1375,7 +1375,17 @@ process_options (void) if (flag_check_pointer_bounds) { if (targetm.chkp_bound_mode () == VOIDmode) - error ("-fcheck-pointer-bounds is not supported for this target"); + { + error ("-fcheck-pointer-bounds is not supported for this target"); + flag_check_pointer_bounds = 0; + } + + if (flag_sanitize & SANITIZE_ADDRESS) + { + error ("-fcheck-pointer-bounds is not supported with " + "Address Sanitizer"); + flag_check_pointer_bounds = 0; + } } /* One region RA really helps to decrease the code size. */