From patchwork Tue Feb 22 09:45:44 2022
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Patchwork-Submitter: Richard Sandiford
X-Patchwork-Id: 1595897
Return-Path:
X-Original-To: incoming@patchwork.ozlabs.org
Delivered-To: patchwork-incoming@bilbo.ozlabs.org
Authentication-Results: bilbo.ozlabs.org;
dkim=pass (1024-bit key;
unprotected) header.d=gcc.gnu.org header.i=@gcc.gnu.org header.a=rsa-sha256
header.s=default header.b=yIBMaTqO;
dkim-atps=neutral
Authentication-Results: ozlabs.org;
spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org
(client-ip=2620:52:3:1:0:246e:9693:128c; helo=sourceware.org;
envelope-from=gcc-patches-bounces+incoming=patchwork.ozlabs.org@gcc.gnu.org;
receiver=)
Received: from sourceware.org (server2.sourceware.org
[IPv6:2620:52:3:1:0:246e:9693:128c])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest
SHA256)
(No client certificate requested)
by bilbo.ozlabs.org (Postfix) with ESMTPS id 4K2vSm4lCwz9sGF
for ; Tue, 22 Feb 2022 20:46:30 +1100 (AEDT)
Received: from server2.sourceware.org (localhost [IPv6:::1])
by sourceware.org (Postfix) with ESMTP id 426363851C26
for ; Tue, 22 Feb 2022 09:46:28 +0000 (GMT)
DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 426363851C26
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gcc.gnu.org;
s=default; t=1645523188;
bh=abMRXWll5ZQQtTmBpKOZjUYwMJ5fKkvwhCOs66J2BiY=;
h=To:Subject:Date:List-Id:List-Unsubscribe:List-Archive:List-Post:
List-Help:List-Subscribe:From:Reply-To:From;
b=yIBMaTqOSAoEH6hHdCYB1pUUYIsYbIcyzRpOcPm34qGot3SYWpxK/FFX8+79d3kRf
1oJpQTR9e2wgYlN5WtPKDijmPSBMAnr2UsG4eTnbPEoUo/qFjyvYDQmju67iF74ibB
lxuD72N3Y1bME1cP3SPykSZ2J5Dzk3GwiJX3ig6A=
X-Original-To: gcc-patches@gcc.gnu.org
Delivered-To: gcc-patches@gcc.gnu.org
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
by sourceware.org (Postfix) with ESMTP id E8C333858025
for ; Tue, 22 Feb 2022 09:45:46 +0000 (GMT)
DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org E8C333858025
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 7C6C81063;
Tue, 22 Feb 2022 01:45:46 -0800 (PST)
Received: from localhost (unknown [10.32.98.88])
by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id C0BEA3F5A1;
Tue, 22 Feb 2022 01:45:45 -0800 (PST)
To: gcc-patches@gcc.gnu.org
Mail-Followup-To: gcc-patches@gcc.gnu.org, gerald@pfeifer.com,
richard.sandiford@arm.com
Subject: [PATCH 1/2] wwwdocs: Group sanitiser changes together
Date: Tue, 22 Feb 2022 09:45:44 +0000
Message-ID:
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.3 (gnu/linux)
MIME-Version: 1.0
X-Spam-Status: No, score=-12.4 required=5.0 tests=BAYES_00, GIT_PATCH_0,
KAM_DMARC_STATUS, SPF_HELO_NONE, SPF_PASS, TXREP,
T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.4
X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on
server2.sourceware.org
X-BeenThere: gcc-patches@gcc.gnu.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Gcc-patches mailing list
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-Patchwork-Original-From: Richard Sandiford via Gcc-patches
From: Richard Sandiford
Reply-To: Richard Sandiford
Errors-To: gcc-patches-bounces+incoming=patchwork.ozlabs.org@gcc.gnu.org
Sender: "Gcc-patches"
Group the ThreadSanitizer and HardwareAssistedAddressSanitizer
changes under a single top-level bullet point. This makes it
easier to add a third sanitiser-related change.
No (intended) change to the actual text or wording. (TBH I don't
understand the ThreadSanitizer bit: is it describing three changes
(KCSAN + two new options), four changes (other environments),
or one big inter-related change?)
OK to install?
Richard
---
htdocs/gcc-11/changes.html | 63 ++++++++++++++++++++++----------------
1 file changed, 36 insertions(+), 27 deletions(-)
diff --git a/htdocs/gcc-11/changes.html b/htdocs/gcc-11/changes.html
index 8e6d4ec8..cc3ae989 100644
--- a/htdocs/gcc-11/changes.html
+++ b/htdocs/gcc-11/changes.html
@@ -69,18 +69,6 @@ You may also want to check out our
General Improvements
- -
-
- ThreadSanitizer improvements to support alternative runtimes and
- environments. The
- Linux Kernel Concurrency Sanitizer (KCSAN) is now supported.
-
- - Add
--param tsan-distinguish-volatile
to optionally emit
- instrumentation distinguishing volatile accesses.
- - Add
--param tsan-instrument-func-entry-exit
to optionally
- control if function entries and exits should be instrumented.
-
-
-
In previous releases of GCC, the "column numbers" emitted in diagnostics
@@ -121,22 +109,43 @@ You may also want to check out our
-
-
- Introduce
- Hardware-assisted AddressSanitizer support. This sanitizer currently
- only works for the AArch64 target. It helps debug address problems
- similarly to
-
- AddressSanitizer but is based on partial hardware assistance and
- provides probabilistic protection to use less RAM at run time.
-
- Hardware-assisted AddressSanitizer is not production-ready for user
- space, and is provided mainly for use compiling the Linux Kernel.
-
- To use this sanitizer the command line arguments are:
+ Sanitizer improvements:
- -fsanitize=hwaddress
to instrument userspace code.
- -fsanitize=kernel-hwaddress
to instrument kernel code.
+ -
+
+ ThreadSanitizer improvements to support alternative runtimes
+ and environments. The
+
+ Linux Kernel Concurrency Sanitizer (KCSAN) is now supported.
+
+ - Add
--param tsan-distinguish-volatile
to optionally
+ emit instrumentation distinguishing volatile accesses.
+ - Add
--param tsan-instrument-func-entry-exit
to
+ optionally control if function entries and exits should be
+ instrumented.
+
+
+ -
+
+ Introduce
+ Hardware-assisted AddressSanitizer support. This sanitizer currently
+ only works for the AArch64 target. It helps debug address problems
+ similarly to
+
+ AddressSanitizer but is based on partial hardware assistance and
+ provides probabilistic protection to use less RAM at run time.
+
+ Hardware-assisted AddressSanitizer is not production-ready for user
+ space, and is provided mainly for use compiling the Linux Kernel.
+
+
+ To use this sanitizer the command line arguments are:
+
+ -fsanitize=hwaddress
to instrument userspace code.
+ -fsanitize=kernel-hwaddress
to instrument kernel code.
+
+
+