aboutsummaryrefslogtreecommitdiff
path: root/gcc/asan.h
diff options
context:
space:
mode:
authorJakub Jelinek <jakub@redhat.com>2012-12-03 18:28:10 +0100
committerJakub Jelinek <jakub@gcc.gnu.org>2012-12-03 18:28:10 +0100
commit0e668eaf774f01c3c8938840576652b0d21ad3ca (patch)
tree55f4cd1c97e18b820a954968b02285db3ceae803 /gcc/asan.h
parentf41e5bd19ddc48d291b01a270623c379568d325d (diff)
downloadgcc-0e668eaf774f01c3c8938840576652b0d21ad3ca.zip
gcc-0e668eaf774f01c3c8938840576652b0d21ad3ca.tar.gz
gcc-0e668eaf774f01c3c8938840576652b0d21ad3ca.tar.bz2
sanitizer.def: Add Address Sanitizer builtins.
* sanitizer.def: Add Address Sanitizer builtins. Rename BUILT_IN_TSAN_READ_* to BUILT_IN_TSAN_READ* and BUILT_IN_TSAN_WRITE_* to BUILT_IN_TSAN_WRITE*. * Makefile.in (asan.o): Depend on langhooks.h. (tsan.o): Depend on asan.h. * asan.h (initialize_sanitizer_builtins): New prototype. * asan.c: Include langhooks.h. (report_error_func): Use builtin_decl_implicit of corresponding BUILT_IN_ASAN_REPORT_{LOAD,STORE}*. (asan_init_func): Removed. (initialize_sanitizer_builtins): New function. (asan_finish_file): Call it. Use builtin_decl_implicit on BUILT_IN_ASAN_{INIT,{,UN}REGISTER_GLOBALS}. (asan_instrument): Call initialize_sanitizer_builtins. * builtins.def (DEF_SANITIZER_BUILTIN): Change condition to (flag_asan || flag_tsan). * tsan.c: Include asan.h and tsan.h. (get_memory_access_decl): Rename BUILT_IN_TSAN_{READ,WRITE}_* to BUILT_IN_TSAN_{READ,WRITE}*. (tsan_pass): Call initialize_sanitizer_builtins. (tsan_gate, tsan_gate_O0): Don't check if builtin_decl_implicit_p (BUILT_IN_TSAN_INIT) is true. (tsan_finish_file): Call initialize_sanitizer_builtins. * builtin-types.def (BT_FN_VOID_PTR_PTRMODE): New fn type. From-SVN: r194103
Diffstat (limited to 'gcc/asan.h')
-rw-r--r--gcc/asan.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/gcc/asan.h b/gcc/asan.h
index d9368a8..36f2f43 100644
--- a/gcc/asan.h
+++ b/gcc/asan.h
@@ -24,6 +24,7 @@ along with GCC; see the file COPYING3. If not see
extern void asan_finish_file (void);
extern rtx asan_emit_stack_protection (rtx, HOST_WIDE_INT *, tree *, int);
extern bool asan_protect_global (tree);
+extern void initialize_sanitizer_builtins (void);
/* Alias set for accessing the shadow memory. */
extern alias_set_type asan_shadow_set;