From patchwork Tue Feb 22 09:45:44 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Richard Sandiford X-Patchwork-Id: 51282 Return-Path: X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 7B4413858025 for ; Tue, 22 Feb 2022 09:46:16 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 7B4413858025 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gcc.gnu.org; s=default; t=1645523176; bh=abMRXWll5ZQQtTmBpKOZjUYwMJ5fKkvwhCOs66J2BiY=; h=To:Subject:Date:List-Id:List-Unsubscribe:List-Archive:List-Post: List-Help:List-Subscribe:From:Reply-To:From; b=sxG5pYd/z1NwmANBntkqDyx79d1cCGm2omzlj6J57IXv/kQp/6P1MfYDTm1xKR2vm y9K9wRgCHqnsyGDSF+f1FenNVuyVVIq0B6T2SKwrjni0hcTAaZU8bX6FUjyf/VDH0+ 6lTMDRdA9L3vpFY0pvDaWVoxffIubbFagA+/Fn44= X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by sourceware.org (Postfix) with ESMTP id E8C333858025 for ; Tue, 22 Feb 2022 09:45:46 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org E8C333858025 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 7C6C81063; Tue, 22 Feb 2022 01:45:46 -0800 (PST) Received: from localhost (unknown [10.32.98.88]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id C0BEA3F5A1; Tue, 22 Feb 2022 01:45:45 -0800 (PST) To: gcc-patches@gcc.gnu.org Mail-Followup-To: gcc-patches@gcc.gnu.org, gerald@pfeifer.com, richard.sandiford@arm.com Subject: [PATCH 1/2] wwwdocs: Group sanitiser changes together Date: Tue, 22 Feb 2022 09:45:44 +0000 Message-ID: User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.3 (gnu/linux) MIME-Version: 1.0 X-Spam-Status: No, score=-12.4 required=5.0 tests=BAYES_00, GIT_PATCH_0, KAM_DMARC_STATUS, SPF_HELO_NONE, SPF_PASS, TXREP, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-Patchwork-Original-From: Richard Sandiford via Gcc-patches From: Richard Sandiford Reply-To: Richard Sandiford Errors-To: gcc-patches-bounces+patchwork=sourceware.org@gcc.gnu.org Sender: "Gcc-patches" Group the ThreadSanitizer and HardwareAssistedAddressSanitizer changes under a single top-level bullet point. This makes it easier to add a third sanitiser-related change. No (intended) change to the actual text or wording. (TBH I don't understand the ThreadSanitizer bit: is it describing three changes (KCSAN + two new options), four changes (other environments), or one big inter-related change?) OK to install? Richard --- htdocs/gcc-11/changes.html | 63 ++++++++++++++++++++++---------------- 1 file changed, 36 insertions(+), 27 deletions(-) diff --git a/htdocs/gcc-11/changes.html b/htdocs/gcc-11/changes.html index 8e6d4ec8..cc3ae989 100644 --- a/htdocs/gcc-11/changes.html +++ b/htdocs/gcc-11/changes.html @@ -69,18 +69,6 @@ You may also want to check out our

General Improvements

    -
  • - - ThreadSanitizer improvements to support alternative runtimes and - environments. The - Linux Kernel Concurrency Sanitizer (KCSAN) is now supported. -
      -
    • Add --param tsan-distinguish-volatile to optionally emit - instrumentation distinguishing volatile accesses.
    • -
    • Add --param tsan-instrument-func-entry-exit to optionally - control if function entries and exits should be instrumented.
    • -
    -
  • In previous releases of GCC, the "column numbers" emitted in diagnostics @@ -121,22 +109,43 @@ You may also want to check out our

  • -

    - Introduce - Hardware-assisted AddressSanitizer support. This sanitizer currently - only works for the AArch64 target. It helps debug address problems - similarly to - - AddressSanitizer but is based on partial hardware assistance and - provides probabilistic protection to use less RAM at run time. - - Hardware-assisted AddressSanitizer is not production-ready for user - space, and is provided mainly for use compiling the Linux Kernel. -

    - To use this sanitizer the command line arguments are: + Sanitizer improvements:
      -
    • -fsanitize=hwaddress to instrument userspace code.
    • -
    • -fsanitize=kernel-hwaddress to instrument kernel code.
    • +
    • + + ThreadSanitizer improvements to support alternative runtimes + and environments. The + + Linux Kernel Concurrency Sanitizer (KCSAN) is now supported. +
        +
      • Add --param tsan-distinguish-volatile to optionally + emit instrumentation distinguishing volatile accesses.
      • +
      • Add --param tsan-instrument-func-entry-exit to + optionally control if function entries and exits should be + instrumented.
      • +
      +
    • +
    • +

      + Introduce + Hardware-assisted AddressSanitizer support. This sanitizer currently + only works for the AArch64 target. It helps debug address problems + similarly to + + AddressSanitizer but is based on partial hardware assistance and + provides probabilistic protection to use less RAM at run time. + + Hardware-assisted AddressSanitizer is not production-ready for user + space, and is provided mainly for use compiling the Linux Kernel. +

      +

      + To use this sanitizer the command line arguments are: +

        +
      • -fsanitize=hwaddress to instrument userspace code.
      • +
      • -fsanitize=kernel-hwaddress to instrument kernel code.
      • +
      +

      +