From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-ed1-x52b.google.com (mail-ed1-x52b.google.com [IPv6:2a00:1450:4864:20::52b]) by sourceware.org (Postfix) with ESMTPS id A36FB3858429 for ; Mon, 3 Jan 2022 14:06:18 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org A36FB3858429 Received: by mail-ed1-x52b.google.com with SMTP id m21so137526636edc.0 for ; Mon, 03 Jan 2022 06:06:18 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=WkjuaFEjd3z9F2e4kVYaEHWZf1xLBA5i3y8ZZv2OrGY=; b=jkzCYa72djnpbMnruDnsCldTf1TfHOxd/XYQJmCcZGMr42NOL7j9CzuMMyXBHhWpTw Xru3ET2utkuMg8+wdYHi0215Cg7Ab2bofv6LOJlTqys4P1Ua7INI0vaMPLqPYxwHJhEN G2CDAnXk5apTM0XVKCyhAvQchCvJXY2HTi+sUFQ/Vx73alRxaeFmBO0a5FPgbCCpy8IB VygposHuAa3sGvV7wCcrP/4DViIvRwtEiKQfp786iENJjfyhN4uql7sAY6kRO/51uuS7 EcIikWoIhtdPVTUokqBhEBC6HtqbKZyAnEbbjHA/TwyPBSx/uF7hr/dQ9HMINOxyLXXo qNqw== X-Gm-Message-State: AOAM533a2yb8T4yTaTepz0p8dwbazVrjXNheNGRul2q0FakaK/7udnma Xuv+rjl7SYalvi2Vz8Woa/QFfAuRKfBH7PNq9OY= X-Google-Smtp-Source: ABdhPJzkjToipVa4wdsIgTNLuETkkodBTe2bmi5mt9ViQAOlc9F9LQmZ+zpK6rLVNy9iS7q37w1oZBkd3jI7rP0IWdg= X-Received: by 2002:a17:907:6091:: with SMTP id ht17mr38263739ejc.407.1641218777590; Mon, 03 Jan 2022 06:06:17 -0800 (PST) MIME-Version: 1.0 References: <20211217224510.7938-1-hjl.tools@gmail.com> In-Reply-To: <20211217224510.7938-1-hjl.tools@gmail.com> From: Richard Biener Date: Mon, 3 Jan 2022 15:06:06 +0100 Message-ID: Subject: Re: [GCC-11] [PATCH] libsanitizer: Cherry-pick LLVM release/13.x commit d96358a28193 To: "H.J. Lu" Cc: GCC Patches Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-8.0 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FREEMAIL_FROM, GIT_PATCH_0, KAM_NUMSUBJECT, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP autolearn=ham autolearn_force=no version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jan 2022 14:06:19 -0000 On Fri, Dec 17, 2021 at 11:45 PM H.J. Lu via Gcc-patches wrote: > > OK for release branches? OK - I assume the size is not leaked as ABI detail? > > H.J. > --- > Cherry-pick from LLVM release/13.x branch: > > commit d96358a2819399a2abb60ad3b26444ab7b4409cf > Author: Micha=C5=82 G=C3=B3rny > Date: Mon Dec 13 22:28:26 2021 +0100 > > [compiler-rt] Increase kDlsymAllocPoolSize to fix test failures > > Increase kDlsymAllocPoolSize on the release branch as discussed on bu= g > 51620, as an alternative to backporting > cb0e14ce6dcdd614a7207f4ce6fcf81a164471ab and its dependencies. > The minimum size is 8192, as needed for the following test to pass: > > AddressSanitizer-i386-linux :: TestCases/Linux/long-object-path.cpp > > Fixes #51620 > > PR sanitizer/102911 > * asan/asan_malloc_linux.cpp (kDlsymAllocPoolSize): Set it to > 8192 on Linux. > --- > libsanitizer/asan/asan_malloc_linux.cpp | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/libsanitizer/asan/asan_malloc_linux.cpp b/libsanitizer/asan/= asan_malloc_linux.cpp > index 9c3f0a5338e..7a5776b29ed 100644 > --- a/libsanitizer/asan/asan_malloc_linux.cpp > +++ b/libsanitizer/asan/asan_malloc_linux.cpp > @@ -31,7 +31,7 @@ using namespace __asan; > > static uptr allocated_for_dlsym; > static uptr last_dlsym_alloc_size_in_words; > -static const uptr kDlsymAllocPoolSize =3D SANITIZER_RTEMS ? 4096 : 1024; > +static const uptr kDlsymAllocPoolSize =3D SANITIZER_RTEMS ? 4096 : 8192; > static uptr alloc_memory_for_dlsym[kDlsymAllocPoolSize]; > > static inline bool IsInDlsymAllocPool(const void *ptr) { > -- > 2.33.1 >