From mboxrd@z Thu Jan 1 00:00:00 1970
Return-Path:
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
by sourceware.org (Postfix) with ESMTP id A1B4D3857809
for ; Tue, 22 Feb 2022 09:49:34 +0000 (GMT)
DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org A1B4D3857809
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 5F6F31063;
Tue, 22 Feb 2022 01:49:34 -0800 (PST)
Received: from localhost (unknown [10.32.98.88])
by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id C785C3F5A1;
Tue, 22 Feb 2022 01:49:33 -0800 (PST)
From: Richard Sandiford
To: gcc-patches@gcc.gnu.org
Mail-Followup-To: gcc-patches@gcc.gnu.org, gerald@pfeifer.com,
richard.sandiford@arm.com
Subject: Re: [PATCH 1/2] wwwdocs: Group sanitiser changes together
References:
Date: Tue, 22 Feb 2022 09:49:32 +0000
In-Reply-To: (Richard Sandiford's message of "Tue,
22 Feb 2022 09:45:44 +0000")
Message-ID:
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.3 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain
X-Spam-Status: No, score=-12.4 required=5.0 tests=BAYES_00, GIT_PATCH_0,
KAM_DMARC_STATUS, SPF_HELO_NONE, SPF_PASS, TXREP,
T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.4
X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on
server2.sourceware.org
X-BeenThere: gcc-patches@gcc.gnu.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Gcc-patches mailing list
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Tue, 22 Feb 2022 09:49:36 -0000
Richard Sandiford writes:
> Group the ThreadSanitizer and HardwareAssistedAddressSanitizer
> changes under a single top-level bullet point. This makes it
> easier to add a third sanitiser-related change.
>
> No (intended) change to the actual text or wording. (TBH I don't
> understand the ThreadSanitizer bit: is it describing three changes
> (KCSAN + two new options), four changes (other environments),
> or one big inter-related change?)
>
> OK to install?
Err, scratch that. Clearly I've not had tea this morning, and forgot
which version we're about to release :-)
Richard
>
> Richard
>
> ---
> htdocs/gcc-11/changes.html | 63 ++++++++++++++++++++++----------------
> 1 file changed, 36 insertions(+), 27 deletions(-)
>
> diff --git a/htdocs/gcc-11/changes.html b/htdocs/gcc-11/changes.html
> index 8e6d4ec8..cc3ae989 100644
> --- a/htdocs/gcc-11/changes.html
> +++ b/htdocs/gcc-11/changes.html
> @@ -69,18 +69,6 @@ You may also want to check out our
> General Improvements
>
>
> - -
> -
> - ThreadSanitizer improvements to support alternative runtimes and
> - environments. The
> - Linux Kernel Concurrency Sanitizer (KCSAN) is now supported.
> -
> - - Add
--param tsan-distinguish-volatile
to optionally emit
> - instrumentation distinguishing volatile accesses.
> - - Add
--param tsan-instrument-func-entry-exit
to optionally
> - control if function entries and exits should be instrumented.
> -
> -
> -
>
> In previous releases of GCC, the "column numbers" emitted in diagnostics
> @@ -121,22 +109,43 @@ You may also want to check out our
>
>
> -
> -
> - Introduce
> - Hardware-assisted AddressSanitizer support. This sanitizer currently
> - only works for the AArch64 target. It helps debug address problems
> - similarly to
> -
> - AddressSanitizer but is based on partial hardware assistance and
> - provides probabilistic protection to use less RAM at run time.
> -
> - Hardware-assisted AddressSanitizer is not production-ready for user
> - space, and is provided mainly for use compiling the Linux Kernel.
> -
> - To use this sanitizer the command line arguments are:
> + Sanitizer improvements:
>
> - -fsanitize=hwaddress
to instrument userspace code.
> - -fsanitize=kernel-hwaddress
to instrument kernel code.
> + -
> +
> + ThreadSanitizer improvements to support alternative runtimes
> + and environments. The
> +
> + Linux Kernel Concurrency Sanitizer (KCSAN) is now supported.
> +
> + - Add
--param tsan-distinguish-volatile
to optionally
> + emit instrumentation distinguishing volatile accesses.
> + - Add
--param tsan-instrument-func-entry-exit
to
> + optionally control if function entries and exits should be
> + instrumented.
> +
> +
> + -
> +
> + Introduce
> + Hardware-assisted AddressSanitizer support. This sanitizer currently
> + only works for the AArch64 target. It helps debug address problems
> + similarly to
> +
> + AddressSanitizer but is based on partial hardware assistance and
> + provides probabilistic protection to use less RAM at run time.
> +
> + Hardware-assisted AddressSanitizer is not production-ready for user
> + space, and is provided mainly for use compiling the Linux Kernel.
> +
> +
> + To use this sanitizer the command line arguments are:
> +
> + -fsanitize=hwaddress
to instrument userspace code.
> + -fsanitize=kernel-hwaddress
to instrument kernel code.
> +
> +
> +
>
>
>