Richard Sandiford <richard.sandif...@arm.com> writes:
> Group the ThreadSanitizer and HardwareAssistedAddressSanitizer
> changes under a single top-level bullet point.  This makes it
> easier to add a third sanitiser-related change.
>
> No (intended) change to the actual text or wording.  (TBH I don't
> understand the ThreadSanitizer bit: is it describing three changes
> (KCSAN + two new options), four changes (other environments),
> or one big inter-related change?)
>
> OK to install?

Err, scratch that.  Clearly I've not had tea this morning, and forgot
which version we're about to release :-)

Richard

>
> Richard
>
> ---
>  htdocs/gcc-11/changes.html | 63 ++++++++++++++++++++++----------------
>  1 file changed, 36 insertions(+), 27 deletions(-)
>
> diff --git a/htdocs/gcc-11/changes.html b/htdocs/gcc-11/changes.html
> index 8e6d4ec8..cc3ae989 100644
> --- a/htdocs/gcc-11/changes.html
> +++ b/htdocs/gcc-11/changes.html
> @@ -69,18 +69,6 @@ You may also want to check out our
>  <h2 id="general">General Improvements</h2>
>  
>  <ul>
> -  <li>
> -    <a 
> href="https://github.com/google/sanitizers/wiki/ThreadSanitizerCppManual";>
> -    ThreadSanitizer</a> improvements to support alternative runtimes and
> -    environments. The <a 
> href="https://www.kernel.org/doc/html/latest/dev-tools/kcsan.html";>
> -    Linux Kernel Concurrency Sanitizer (KCSAN)</a> is now supported.
> -    <ul>
> -      <li>Add <code>--param tsan-distinguish-volatile</code> to optionally 
> emit
> -          instrumentation distinguishing volatile accesses.</li>
> -      <li>Add <code>--param tsan-instrument-func-entry-exit</code> to 
> optionally
> -          control if function entries and exits should be instrumented.</li>
> -    </ul>
> -  </li>
>    <li>
>      <p>
>        In previous releases of GCC, the "column numbers" emitted in 
> diagnostics
> @@ -121,22 +109,43 @@ You may also want to check out our
>      </p>
>    </li>
>    <li>
> -    <p>
> -    Introduce <a 
> href="https://clang.llvm.org/docs/HardwareAssistedAddressSanitizerDesign.html";>
> -      Hardware-assisted AddressSanitizer</a> support.  This sanitizer 
> currently
> -    only works for the AArch64 target.  It helps debug address problems
> -    similarly to
> -    <a href="https://github.com/google/sanitizers/wiki/AddressSanitizer";>
> -      AddressSanitizer</a> but is based on partial hardware assistance and
> -    provides probabilistic protection to use less RAM at run time.
> -    <a 
> href="https://clang.llvm.org/docs/HardwareAssistedAddressSanitizerDesign.html";>
> -      Hardware-assisted AddressSanitizer</a> is not production-ready for user
> -    space, and is provided mainly for use compiling the Linux Kernel.
> -    </p>
> -    To use this sanitizer the command line arguments are:
> +    Sanitizer improvements:
>      <ul>
> -      <li><code>-fsanitize=hwaddress</code> to instrument userspace 
> code.</li>
> -      <li><code>-fsanitize=kernel-hwaddress</code> to instrument kernel 
> code.</li>
> +      <li>
> +     <a 
> href="https://github.com/google/sanitizers/wiki/ThreadSanitizerCppManual";>
> +     ThreadSanitizer</a> improvements to support alternative runtimes
> +     and environments.  The
> +     <a href="https://www.kernel.org/doc/html/latest/dev-tools/kcsan.html";>
> +     Linux Kernel Concurrency Sanitizer (KCSAN)</a> is now supported.
> +     <ul>
> +       <li>Add <code>--param tsan-distinguish-volatile</code> to optionally
> +           emit instrumentation distinguishing volatile accesses.</li>
> +       <li>Add <code>--param tsan-instrument-func-entry-exit</code> to
> +           optionally control if function entries and exits should be
> +           instrumented.</li>
> +     </ul>
> +      </li>
> +      <li>
> +     <p>
> +       Introduce <a 
> href="https://clang.llvm.org/docs/HardwareAssistedAddressSanitizerDesign.html";>
> +       Hardware-assisted AddressSanitizer</a> support.  This sanitizer 
> currently
> +       only works for the AArch64 target.  It helps debug address problems
> +       similarly to
> +       <a href="https://github.com/google/sanitizers/wiki/AddressSanitizer";>
> +       AddressSanitizer</a> but is based on partial hardware assistance and
> +       provides probabilistic protection to use less RAM at run time.
> +       <a 
> href="https://clang.llvm.org/docs/HardwareAssistedAddressSanitizerDesign.html";>
> +       Hardware-assisted AddressSanitizer</a> is not production-ready for 
> user
> +       space, and is provided mainly for use compiling the Linux Kernel.
> +     </p>
> +     <p>
> +       To use this sanitizer the command line arguments are:
> +       <ul>
> +         <li><code>-fsanitize=hwaddress</code> to instrument userspace 
> code.</li>
> +         <li><code>-fsanitize=kernel-hwaddress</code> to instrument kernel 
> code.</li>
> +       </ul>
> +     </p>
> +      </li>
>      </ul>
>    </li>
>    <li>

Reply via email to