Re: libsanitizer merge from upstream r208536

2014-05-26 Thread Yury Gribov
On 05/26/2014 01:19 PM, Konstantin Serebryany wrote: This is implemented in llvm, just need a flag flip. It also needs a performance improvement in the run-time. This is in my TODO, just didn't have time. FYI I have a patch that adds -asan-instrumentation-with-call-threshold for GCC (will

[PATCH] Support asan-instrumentation-with-call-threshold in GCC

2014-05-26 Thread Yury Gribov
implementations more similar would require bigger rewrite of Asan which I would prefer to avoid. The patch consists of two parts: * asan_negative_params_1.diff - support for negative parameters * asan_calls_1.diff - the proper Bootstrapped/regtested on x64. -Y 2014-04-26 Yury Gribov y.gri

Re: [PATCH] Support asan-instrumentation-with-call-threshold in GCC

2014-05-26 Thread Yury Gribov
Making implementations more similar would require bigger rewrite of Asan of GCC Asan

Re: [PATCH] Support asan-instrumentation-with-call-threshold in GCC

2014-05-26 Thread Yury Gribov
* asan_negative_params_1.diff - support for negative parameters I don't like this. Why do you need it? That's only for compatibility with LLVM. I know that's not usually considered an argument in gcc-patches but things like this would surely make developer's life harder. *

Re: [PATCH] Support asan-instrumentation-with-call-threshold in GCC

2014-05-26 Thread Yury Gribov
- using instrumentation via calls adds extra 1.5x-2.x slowdown On x64. - it would be nice to have the name prefix configurable from command line (${PREFIX}_load1 instead of __asan_load1) because kasan uses different names already. Yeah, I noticed corresponding option in LLVM. AFAIK

Re: [PATCH] Support asan-instrumentation-with-call-threshold in GCC

2014-05-26 Thread Yury Gribov
On 05/27/2014 09:43 AM, Konstantin Serebryany wrote: - using instrumentation via calls adds extra 1.5x-2.x slowdown On x64. Interesting. can you share your ARM numbers? That wasn't an objection - I just made sure to specify the platform (x64 ABI is somewhat special).

Re: [PATCH] Inline asm asan instrumentation

2014-05-29 Thread Yury Gribov
The fact that some region appears in m doesn't mean the inline asm actually accesses it, it could not touch it at all, or only some part of it. Do we have precise semantics of m written somewhere? My understanding was that even though asm may not touch buffer at all (like e.g. in our tests),

Re: [PATCH] Do not build libsanitizer also for powerpc*-*-linux*

2014-06-01 Thread Yury Gribov
There was some discussion on what to do, but has there been a decision on how to fix this yet? Or is it fixed upstream and we just need to merge that fix too? Yuri needs to send the patch to llvm-commits. I think I already did that: D3911 -Y

Re: [PATCH] Do not build libsanitizer also for powerpc*-*-linux*

2014-06-02 Thread Yury Gribov
Looks like now function does not return anything for ARM case? I'd say we should replace this pc = ... with return like all other cases, the code is just asking for trouble. --- libsanitizer/sanitizer_common/sanitizer_stacktrace.cc (revision 209878) +++

Re: [PATCH] Do not build libsanitizer also for powerpc*-*-linux*

2014-06-02 Thread Yury Gribov
On 06/02/2014 11:56 AM, Jakub Jelinek wrote: Looks like now function does not return anything for ARM case? I'd say we should replace this pc = ... with return like all other cases, the code is just asking for trouble. But it should be return (pc ~(uptr)1) - 1; right? Yes, I had

Re: [PATCH] Do not build libsanitizer also for powerpc*-*-linux*

2014-06-02 Thread Yury Gribov
Why the -1 ? No ARM or Thumb instruction is 1 byte long. Instructions are 4 bytes long if in ARM state and could be 2 or 4 bytes if Thumb state. The -1 just points to the middle of previous instruction, so that supposedly it can be looked up in debug info etc. Right, that works quite well

Re: [PATCH] Do not build libsanitizer also for powerpc*-*-linux*

2014-06-03 Thread Yury Gribov
I took that patch and applied it to the gcc sources, but I still see the error on ppc: ... [bergner@makalu-lp1 asan]$

[PATCH] Support asan-instrumentation-with-call-threshold in GCC (second try)

2014-06-03 Thread Yury Gribov
runtimes on large functions with huge (over 10K) number of memory accesses (http://llvm.org/bugs/show_bug.cgi?id=12653) * a step to full Kasan support in GCC * reduce code size overhead Bootstrapped/regtested on x64. -Y 2014-06-03 Yury Gribov y.gri...@samsung.com New asan-instrumentation-with-call

Re: [PATCH] Support asan-instrumentation-with-call-threshold in GCC (second try)

2014-06-03 Thread Yury Gribov
Any reason why the BUILT_IN_* names so differ from the actual function names? I.e. why not use BUILT_IN_ASAN_{LOAD,STORE}{1,2,4,8,16,N} (no underscore before N, no CHECK_)? Makes sense. Wouldn't it be better to do ... so that you don't risk signed overflow? Maybe also Yeah, that looks

Re: [PATCH] Do not build libsanitizer also for powerpc*-*-linux*

2014-06-03 Thread Yury Gribov
It adds -lasan early, but after the libraries and object files that are explicitly added to the linker command. Since -lm is explicitly added to the linker command, the implicitly added -lasan comes after. The -v command is below. Hm, -lasan manages to override user-specified -lm on gcc

Re: [PATCH] Support asan-instrumentation-with-call-threshold in GCC (second try)

2014-06-05 Thread Yury Gribov
is now unified for const/variable lengths but I'd still prefer to treat the use_calls case specially because calling single __asan_loadN is more space-efficient than emitting two separate calls with a length check. -Y 2014-06-06 Yury Gribov y.gri...@samsung.com New asan-instrumentation

Re: [PATCH] Support asan-instrumentation-with-call-threshold in GCC (second try)

2014-06-08 Thread Yury Gribov
1) instrument_mem_region_access/instrument_strlen should use a single build_check_stmt call instead of two that they do now, I agree with instrument_mem_region_access but the strlen case is quite different because checks are inserted at different sides of instrumented insn. Adding yet

Re: [PATCH] Support asan-instrumentation-with-call-threshold in GCC (second try)

2014-06-09 Thread Yury Gribov
Build_check_stmt is now unified for const/variable lengths but I'd still prefer to treat the use_calls case specially because calling single __asan_loadN is more space-efficient than emitting two separate calls with a length check. That is not what I meant. 1)

Re: [PATCH] Add patch for debugging compiler ICEs

2014-06-10 Thread Yury Gribov
This is the resurrected patch with added GCC version information into generated repro file. I wonder whether we should also set ADDR_NO_RANDOMIZE and ADDR_COMPAT_LAYOUT in addition to -frandom-seed (according to https://gcc.gnu.org/wiki/Randomization). -Y

Re: [PATCH] Support asan-instrumentation-with-call-threshold in GCC (second try)

2014-06-11 Thread Yury Gribov
, plus for NULL len also size_in_bytes, for non-NULL len probably nothing, we don't know if len isn't zero. Like this? -Y 2014-06-11 Yury Gribov y.gri...@samsung.com New asan-instrumentation-with-call-threshold parameter. gcc/ * asan.c (check_func): New function. (maybe_create_ssa_name

Re: [PATCH] Support asan-instrumentation-with-call-threshold in GCC (second try)

2014-06-16 Thread Yury Gribov
On 06/16/2014 12:23 PM, Jakub Jelinek wrote: 2014-06-11 Yury Gribov y.gri...@samsung.com New asan-instrumentation-with-call-threshold parameter. Ok, thanks. Done in r211699.

Re: [PATCH] Support asan-instrumentation-with-call-threshold in GCC (second try)

2014-06-16 Thread Yury Gribov
On 06/16/2014 02:34 PM, Dominique Dhumieres wrote: Done in r211699. This breaks bootstrap on x86_64-apple-darwin13: Hm, perhaps I didn't run full bootstrap after last round of review. Does attached patch solve the problem for you? I've started bootstrap but it'll take couple of hours to

Re: [PATCH] Support asan-instrumentation-with-call-threshold in GCC (second try)

2014-06-16 Thread Yury Gribov
On 06/16/2014 04:52 PM, Dominique Dhumieres wrote: I have done the change to tree t = NULL_TREE; then bootstrap fails with Bootstrap comparison failure! gcc/plugin.o differs gcc/toplev.o differs Interesting, I didn't know that asan.c runs during normal bootstrap. -Y

Re: [PATCH] Support asan-instrumentation-with-call-threshold in GCC (second try)

2014-06-16 Thread Yury Gribov
On 06/16/2014 04:47 PM, Yury Gribov wrote: On 06/16/2014 02:34 PM, Dominique Dhumieres wrote: Done in r211699. This breaks bootstrap on x86_64-apple-darwin13: Hm, perhaps I didn't run full bootstrap after last round of review. Does attached patch solve the problem for you? I've started

Re: [PATCH] Support asan-instrumentation-with-call-threshold in GCC (second try)

2014-06-16 Thread Yury Gribov
Bootstrapped successfully on x64 with proposed patch. The original commit indeed failed to bootstrap (https://gcc.gnu.org/ml/gcc-testresults/2014-06/msg01419.html). Ok to commit fix? Ok (with proper ChangeLog entry). r211713. -Y

Re: [PATCH][PING] Fix for PR 61422

2014-06-17 Thread Yury Gribov
Have already been done in r211699. Does it work for you? Adding a test would still be useful. -Y

[PATCH][PING] Fix for PR59600 (prohibit inlining if no_sanitize_address)

2014-01-27 Thread Yury Gribov
Original Message Subject: [PATCH] Fix for PR59600 Date: Tue, 21 Jan 2014 14:42:31 +0400 From: Yury Gribov y.gri...@samsung.com To: GCC Patches gcc-patches@gcc.gnu.org Hi, This patch fixes the problem reported in http://gcc.gnu.org/bugzilla/show_bug.cgi?id=59600 : functions

[PATCH][PING] Fix handling of context diff patches in mklog

2014-01-28 Thread Yury Gribov
Original Message Subject: [PATCH] Fix handling of context diff patches in mklog Date: Wed, 22 Jan 2014 18:36:23 +0400 From: Yury Gribov y.gri...@samsung.com To: GCC Patches gcc-patches@gcc.gnu.org, Diego Novillo dnovi...@google.com CC: Viacheslav Garbuzov v.garbu

Re: [PATCH] Fix handling of context diff patches in mklog

2014-01-29 Thread Yury Gribov
Diego wrote: Ok to commit? OK. Thanks. Done in r207265. -Y

Re: [PATCH, ARM][PING] Reintroduce minipool ranges for zero-extension insn patterns

2014-02-03 Thread Yury Gribov
Additionally I'm not really sure why there is an additional load from the constant pool here - what is the constant in this case ? Given it is atmost a 16 bit constant surely that should be loaded with a single mov(w) instruction in armv7 land. I've made some investigations with 4.8. The

Re: [PATCH, ARM][PING] Reintroduce minipool ranges for zero-extension insn patterns

2014-02-03 Thread Yury Gribov
Uggh - what a mess. Surely that zero_extend:SI (const_int 1) should be replaced by a move somewhere. Actually the whole (zero_extend:SI (subreg:HI ...)) part is replaced by (const_int 1). It still ends up in constant pool though. -Y

Re: [PATCH, ARM][PING] Reintroduce minipool ranges for zero-extension insn patterns

2014-02-03 Thread Yury Gribov
The subreg being replaced is believable, but not the zero_extend. That would mean we had a simple movhi pattern, not a zero-extend pattern. Sorry, you are right. It's just subreg without zero_extend! -Y

Re: [PATCH, ARM][PING] Reintroduce minipool ranges for zero-extension insn patterns

2014-02-03 Thread Yury Gribov
Uggh - what a mess. Surely that zero_extend:SI (const_int 1) should be replaced by a move somewhere. So I'm all for fixing this but I don't really know where to start. Do you have any suggestions? Julian's patch now looks more like a workaround... -Y

[PATCH][PING^2] Fix for PR59600 (prohibit inlining if no_sanitize_address)

2014-02-03 Thread Yury Gribov
Original Message Subject: [PATCH][PING] Fix for PR59600 (prohibit inlining if no_sanitize_address) Date: Tue, 28 Jan 2014 09:13:10 +0400 From: Yury Gribov y.gri...@samsung.com To: GCC Patches gcc-patches@gcc.gnu.org Original Message Subject: [PATCH] Fix

Re: [PATCH][PING^2] Fix for PR59600 (prohibit inlining if no_sanitize_address)

2014-02-04 Thread Yury Gribov
Richard wrote: I think you can't rely on pointer equivalence of the lookup_attribute result so you want instead of Thanks, makes sense. Please also name CIF_OPTION_MISMATCH as CIF_ATTRIBUTE_MISMATCH and say function attribute mismatch in the description. Done. What about updated patch?

Re: [PATCH][PING^2] Fix for PR59600 (prohibit inlining if no_sanitize_address)

2014-02-04 Thread Yury Gribov
Richard wrote: What about updated patch? Ok if it passes bootstrap and regtesting. It does, commited in r207497. -Y

Re: [ARM][PATCH] Vectorizer generates unaligned access when -mno-unaligned-access is enabled

2014-02-05 Thread Yury Gribov
Ramana wrote: The error is caused by unaligned vector load via two vldr instructions: So, does this mean that we get unaligned vector loads when munaligned-access is on, using vldr instructions ? No, when -munaligned-access is on, the backend will enable movmisalign patterns that generate

Re: [ARM][PATCH] Vectorizer generates unaligned access when -mno-unaligned-access is enabled

2014-02-06 Thread Yury Gribov
Kugan wrote: Ok if no regressions. Tested it on qemu for arm-none-linux-gnueabi and there is no new regressions. I am sorry I didn’t mention it when I posted the patch. Commited in r207533. Thanks! -Y

Re: [ARM][PATCH] Vectorizer generates unaligned access when -mno-unaligned-access is enabled

2014-02-06 Thread Yury Gribov
As can be seen here: http://cbuild.validation.linaro.org/build/cross-validation/gcc/207533/report-build-info.html this has caused some regressions on armv5t targets. IMHO this is expected: with this patch we prohibited unaligned loads on all platforms with -mno-unaligned-access. Perhaps we

Re: [ARM][PATCH] Vectorizer generates unaligned access when -mno-unaligned-access is enabled

2014-02-06 Thread Yury Gribov
we prohibited unaligned loads Sorry, meant to say vectorization of unaligned loads. -Y

Re: How my codes comply with gcc code formatting?

2014-03-04 Thread Yury Gribov
I'm not sure what you asking for here. But to learn how to format your code, I think just look at the GCC source code and model your code after that. I am not understanding the standard.For example,should I use \t instead of space?Should I use 4 spaces as indent or 2? My understanding

Re: How my codes comply with gcc code formatting?

2014-03-04 Thread Yury Gribov
That is not true. The indentation style is: http://www.gnu.org/prep/standards/standards.html#Formatting ... The above also mentions particular options for GNU indent which set various rules. Ah, good to know. So, are contributors expected to run indent on their changes before sending patches?

Re: [RFC] Do not consider volatile asms as optimization barriers #1

2014-03-10 Thread Yury Gribov
Richard wrote: The thread seems to have died down, so should I go ahead and install it? Looks like all reviews were more or less positive... -Y

Re: [RFC] Do not consider volatile asms as optimization barriers #1

2014-03-25 Thread Yury Gribov
Jakub Jelinek wrote: Richard Sandiford wrote: OK, how about this? It looks like the builtins.c and stmt.c stuff wasn't merged until 4.9, and at this stage it seemed safer to just add the same use/clobber sequence to both places. Please wait a little bit, the patch has been committed to the

Re: [PATCH] Environment variables forwarding

2014-03-25 Thread Yury Gribov
Cc-ing Jakub cause he's the author of original set-target-env-var support in GCC testsuite. On 03/24/2014 01:46 PM, Maxim Ostapenko wrote: Adding Dejagnu list this time. On 03/24/2014 12:28 PM, Maxim Ostapenko wrote: Hi all, When porting Lsan on arm, I ran into problem with testing, because

[PATCHv5][PING^2] Vimrc config with GNU formatting

2014-10-21 Thread Yury Gribov
On 10/13/2014 02:26 PM, Yury Gribov wrote: On 10/02/2014 09:14 PM, Yury Gribov wrote: On 09/17/2014 09:08 PM, Yury Gribov wrote: On 09/16/2014 08:38 PM, Yury Gribov wrote: Hi all, This is the third version of the patch. A list of changes since last version: * move config to contrib

Re: [PATCH] -fsanitize-recover=list

2014-10-22 Thread Yury Gribov
On 10/17/2014 08:13 PM, Jakub Jelinek wrote: On Mon, Oct 13, 2014 at 02:47:07PM +0400, Yury Gribov wrote: On 09/30/2014 09:39 PM, Jakub Jelinek wrote: LGTM, will hack it up soon in GCC then. Do you plan to work on this in near future? Here is only very lightly tested patch, didn't get

[PATCHv4] Enable -fsanitize-recover for KASan

2014-10-23 Thread Yury Gribov
Hi all, On 09/29/2014 09:21 PM, Yury Gribov wrote: This patch enables -fsanitize-recover for KASan by default. This causes KASan to continue execution after error in case of inline instrumentation. This feature is needed because - reports during early bootstrap won't even be printed - needed

Re: [PATCHv4] Enable -fsanitize-recover for KASan

2014-10-23 Thread Yury Gribov
On 10/23/2014 11:13 AM, Jakub Jelinek wrote: On Thu, Oct 23, 2014 at 11:11:29AM +0400, Yury Gribov wrote: Hi all, On 09/29/2014 09:21 PM, Yury Gribov wrote: This patch enables -fsanitize-recover for KASan by default. This causes KASan to continue execution after error in case of inline

Re: [PATCHv2] Don't expand string/memory builtins if ASan is enabled.

2014-10-23 Thread Yury Gribov
On 10/21/2014 05:26 PM, Maxim Ostapenko wrote: Hi, this is the second version of the patch. Here the major changes from the previous one: [snip] case BUILT_IN_BCMP: + *intercepted_p = false; The code which identifies interceptors seems to be duplicated in expand_builtin. What

Re: [PATCHv4] Enable -fsanitize-recover for KASan

2014-10-23 Thread Yury Gribov
On 10/23/2014 02:20 PM, Andrey Ryabinin wrote: On 10/23/2014 02:00 PM, Jakub Jelinek wrote: On Thu, Oct 23, 2014 at 11:55:32AM +0200, Jakub Jelinek wrote: On Thu, Oct 23, 2014 at 01:51:12PM +0400, Andrey Ryabinin wrote: IMO we don't need different versions of __asan_load* and

Re: [PATCHv4] Enable -fsanitize-recover for KASan

2014-10-23 Thread Yury Gribov
On 10/23/2014 02:16 PM, Jakub Jelinek wrote: On Thu, Oct 23, 2014 at 02:09:47PM +0400, Andrey Ryabinin wrote: On 10/23/2014 01:55 PM, Jakub Jelinek wrote: On Thu, Oct 23, 2014 at 01:51:12PM +0400, Andrey Ryabinin wrote: IMO we don't need different versions of __asan_load* and

Re: [PATCHv4] Enable -fsanitize-recover for KASan

2014-10-24 Thread Yury Gribov
On 10/23/2014 03:10 PM, Andrey Ryabinin wrote: On 10/23/2014 02:38 PM, Jakub Jelinek wrote: On Thu, Oct 23, 2014 at 02:33:42PM +0400, Yury Gribov wrote: Actually this is a historical artifact. If inlining proves to be significantly faster, they may want to switch. Ok. So, at that point

Re: [PATCHv4] Enable -fsanitize-recover for KASan

2014-10-24 Thread Yury Gribov
On 10/24/2014 01:44 PM, Dmitry Vyukov wrote: On Fri, Oct 24, 2014 at 12:28 PM, Yury Gribov y.gri...@samsung.com wrote: On 10/23/2014 03:10 PM, Andrey Ryabinin wrote: On 10/23/2014 02:38 PM, Jakub Jelinek wrote: On Thu, Oct 23, 2014 at 02:33:42PM +0400, Yury Gribov wrote: Actually

[PATCHv5][Kasan] Allow to override Asan shadow offset from command line

2014-10-24 Thread Yury Gribov
Hi all, On 10/17/2014 11:53 AM, Yury Gribov wrote: On 09/29/2014 09:21 PM, Yury Gribov wrote: Kasan developers has asked for an option to override offset of Asan shadow memory region. This should simplify experimenting with memory layouts on 64-bit architectures. New patch which checks

[PATCH v5] Enable -fsanitize-recover for KASan

2014-10-28 Thread Yury Gribov
Hi all, On 10/23/2014 11:11 AM, Yury Gribov wrote: This patch enables -fsanitize-recover for KASan by default. This causes KASan to continue execution after error in case of inline instrumentation. This feature is needed because - reports during early bootstrap won't even be printed - needed

Re: [PATCH v5] Enable -fsanitize-recover for KASan

2014-10-28 Thread Yury Gribov
On 10/28/2014 12:26 PM, Jakub Jelinek wrote: On Tue, Oct 28, 2014 at 11:46:31AM +0300, Yury Gribov wrote: 2014-10-23 Yury Gribov y.gri...@samsung.com gcc/ * asan.c (report_error_func): Add noabort path. (check_func): Ditto. Formatting. (asan_expand_check_ifn): Handle

Re: [PATCH, IPA ICF] Fix PR63696.

2014-10-31 Thread Yury Gribov
On 10/31/2014 11:35 AM, Maxim Ostapenko wrote: Hi, this tiny patch fixes PR63696 (alloc-dealloc-mismatch in ipa-icf.c). Tested on x86_64-unknown-linux-gnu, ok to commit? Could you add PR comment to ChangeLog? -Y

Re: [PATCH] Optimize UBSAN_NULL checks, add sanopt.c

2014-11-05 Thread Yury Gribov
On 11/03/2014 05:27 PM, Marek Polacek wrote: Another shot at optimizing redundant UBSAN_NULL statements. This time we walk the dominator tree - that should result in more effective optimization - and keep a list of UBSAN_NULL statements that dominate the current block, see the comment before

Re: [PATCH] Optimize UBSAN_NULL checks, add sanopt.c

2014-11-05 Thread Yury Gribov
On 11/05/2014 12:33 PM, Jakub Jelinek wrote: On Wed, Nov 05, 2014 at 12:19:22PM +0300, Yury Gribov wrote: On 11/03/2014 05:27 PM, Marek Polacek wrote: Another shot at optimizing redundant UBSAN_NULL statements. This time we walk the dominator tree - that should result in more effective

Re: [PATCH] Optimize UBSAN_NULL checks, add sanopt.c

2014-11-05 Thread Yury Gribov
On 11/05/2014 02:23 PM, Marek Polacek wrote: On Wed, Nov 05, 2014 at 11:50:20AM +0100, Jakub Jelinek wrote: On Wed, Nov 05, 2014 at 11:29:19AM +0100, Marek Polacek wrote: On Wed, Nov 05, 2014 at 12:54:37PM +0300, Yury Gribov wrote: Are you going to work on ASan soon? I could rebase my

Re: [PATCH] Optimize UBSAN_NULL checks, add sanopt.c

2014-11-05 Thread Yury Gribov
On 11/05/2014 03:21 PM, Jakub Jelinek wrote: On Wed, Nov 05, 2014 at 03:16:49PM +0300, Yury Gribov wrote: On 11/05/2014 02:23 PM, Marek Polacek wrote: On Wed, Nov 05, 2014 at 11:50:20AM +0100, Jakub Jelinek wrote: On Wed, Nov 05, 2014 at 11:29:19AM +0100, Marek Polacek wrote: On Wed, Nov 05

Re: [PATCH] Optimize UBSAN_NULL checks, add sanopt.c

2014-11-05 Thread Yury Gribov
On 11/05/2014 03:34 PM, Yury Gribov wrote: On 11/05/2014 03:21 PM, Jakub Jelinek wrote: On Wed, Nov 05, 2014 at 03:16:49PM +0300, Yury Gribov wrote: On 11/05/2014 02:23 PM, Marek Polacek wrote: On Wed, Nov 05, 2014 at 11:50:20AM +0100, Jakub Jelinek wrote: On Wed, Nov 05, 2014 at 11:29:19AM

Re: [PATCH] Optimize UBSAN_NULL checks, add sanopt.c

2014-11-05 Thread Yury Gribov
On 11/05/2014 04:23 PM, Jakub Jelinek wrote: On Wed, Nov 05, 2014 at 04:13:01PM +0300, Yury Gribov wrote: Wouldn't it break most uses of __asan_poison_memory_region ? Most probably but I wonder if we should ask people to simply do asm volatile with memory clobber in this case? And we

Re: [PATCH] Fix for mklog

2014-11-06 Thread Yury Gribov
On 11/06/2014 11:00 AM, Marat Zakirov wrote: - if ($doubtfunc) { - $idx = $line_idx; + $idx = $line_idx; # Skip line info in context diffs. - while ($is_context_diff $diff_lines[$idx + 1] =~ /^[-\*]{3} [0-9]/) { - ++$idx; -

Re: [PATCH] Fix for mklog

2014-11-06 Thread Yury Gribov
On 11/06/2014 12:07 PM, Yury Gribov wrote: On 11/06/2014 11:00 AM, Marat Zakirov wrote: -if ($doubtfunc) { -$idx = $line_idx; +$idx = $line_idx; # Skip line info in context diffs. -while ($is_context_diff $diff_lines[$idx + 1] =~ /^[-\*]{3} [0-9

[PATCHv5][PING^3] Vimrc config with GNU formatting

2014-11-06 Thread Yury Gribov
On 10/21/2014 07:24 PM, Yury Gribov wrote: On 10/13/2014 02:26 PM, Yury Gribov wrote: On 10/02/2014 09:14 PM, Yury Gribov wrote: On 09/17/2014 09:08 PM, Yury Gribov wrote: On 09/16/2014 08:38 PM, Yury Gribov wrote: Hi all, This is the third version of the patch. A list of changes since

[PATCH][PING] Fix Asan ICEs on unexpected types (PR62140, PR61897)

2014-09-01 Thread Yury Gribov
--- From: Yury Gribov Sent: Friday, August 22, 2014 12:47PM To: GCC Patches Cc: Jakub Jelinek, Marek Polacek, t...@alumni.duke.edu, sabrina...@gmail.com Subject: [PATCH] Fix Asan ICEs on unexpected types (PR62140, PR61897) On 08/22/2014 12:47 PM, Yury

Re: [PINGv2][PATCH] Fix for PR 61875

2014-09-02 Thread Yury Gribov
On 09/01/2014 08:28 PM, Jakub Jelinek wrote: This situation occurs when somebody decides to build GCC with -fexeptions and -frtti which are forbidden for libsanitizer. I don't see a reason for this, simply don't do that, libsanitizer AFAIK isn't the only library where it is highly undesirable

Vimrc config with GNU formatting

2014-09-04 Thread Yury Gribov
Ok to commit? -Y commit dd961868f625f2f3b3ac9c4349284904cdd56ad1 Author: Yury Gribov y.gri...@samsung.com Date: Thu Sep 4 16:55:44 2014 +0400 2014-09-04 Laurynas Biveinis laurynas.bivei...@gmail.com Yury Gribov y.gri...@samsung.com * .local.vimrc: New file. diff

[PATCH] Enable -fsanitize-recover for KASan

2014-09-05 Thread Yury Gribov
for every test - needed for interactive work on desktop Bootstrapped and regtested on x64. Ok to commit? -Y commit d470f4d1214cbcbebb818778e6f554b346ee43d5 Author: Yury Gribov y.gri...@samsung.com Date: Fri Aug 29 16:43:42 2014 +0400 2014-09-05 Yury Gribov y.gri...@samsung.com gcc

Re: [PATCH] Enable -fsanitize-recover for KASan

2014-09-05 Thread Yury Gribov
On 09/05/2014 11:32 AM, Dmitry Vyukov wrote: Can we do it w/o doubling number of runtime entry points? I didn't find a good way to achieve this. See, normal asan reporting functions have a noreturn attribute (defined in sanitizer.def) which can't be changed depending on cmdline flag. Looks

Re: [PATCH] Enable -fsanitize-recover for KASan

2014-09-05 Thread Yury Gribov
On 09/05/2014 12:23 PM, Dmitry Vyukov wrote: I didn't find a good way to achieve this. See, normal asan reporting functions have a noreturn attribute (defined in sanitizer.def) which can't be changed depending on cmdline flag. I have not looked at the code in detail. But it looks weird to me

Re: [PATCH] Enable -fsanitize-recover for KASan

2014-09-05 Thread Yury Gribov
On 09/05/2014 12:59 PM, Andrey Ryabinin wrote: And how does it work if someone wants to try -fsanitize=address -fsanitize-recover. Seems you didn't touch libsanitzer in this patch, so I guess this will cause link time error, right ? Exactly, Asan team does not want recovery mode for

Re: [PATCH] Enable -fsanitize-recover for KASan

2014-09-05 Thread Yury Gribov
On 09/05/2014 01:28 PM, Jakub Jelinek wrote: Though, for that option the default is yes for ubsan purposes, while asan wants a default to no, so it is unclear how to solve that. Either different option for asan recovery, or tristate option etc. Currently I force set it on encountering

Re: Vimrc config with GNU formatting

2014-09-05 Thread Yury Gribov
On 09/04/2014 05:22 PM, Richard Biener wrote: For some reason I use set shiftwidth=4 set tabstop=8 set autoindent set cinoptions={.5s,g0,p5,t0,(0,^-0.5s,n-0.5s I note some differences to your + setlocal cinoptions=4,n-2,{2,^-2,:2,=2,g0,h2,p5,t0,+2,(0,u0,w1,m1 Ah, the vimfu. So the

Re: Vimrc config with GNU formatting

2014-09-05 Thread Yury Gribov
On 09/05/2014 12:22 AM, Bernhard Reutner-Fischer wrote: Not sure from whom i borrowed this, perhaps even from you richi, but the gcc_style.vim pasted in the mail below seems to be floating around ;) https://gcc.gnu.org/ml/gcc-patches/2012-12/msg01228.html Nice! Interestingly enough this gives

Re: Vimrc config with GNU formatting

2014-09-06 Thread Yury Gribov
Segher Boessenkool segher at kernel.crashing.org writes: On Fri, Sep 05, 2014 at 07:10:02PM +0400, Yury Gribov wrote: Now I don't quite like the idea of plugin: Anything that will make this enabled automatically will meet a lot of resistance. Make something nice for contrib/ instead? Hm

Re: Vimrc config with GNU formatting

2014-09-06 Thread Yury Gribov
Bernhard Reutner-Fischer rep.dot.nop at gmail.com writes: * gcc_style.vim enables GNU style globally, for all projects How come? Please explain? My understanding was that maybe_gcc_style gets run on all opened files and this could cause problems with non-GCC projects. But given that you

[PATCH][Kasan] Allow to override Asan shadow offset from command line

2014-09-08 Thread Yury Gribov
Author: Yury Gribov y.gri...@samsung.com Date: Fri Aug 29 11:58:03 2014 +0400 Allow to override Asan shadow offset. 2014-09-08 Yury Gribov y.gri...@samsung.com gcc/ * asan.c (set_asan_shadow_offset): New function. (asan_shadow_offset): Likewise

Re: [PATCH] RE: gcc parallel make check

2014-09-09 Thread Yury Gribov
On 09/09/2014 10:51 AM, VandeVondele Joost wrote: Attached is an extended version of the patch, it brings a 100% improvement in make -j32 -k check-gcc First of all, many thanks for working on this. +# ls -1 | ../../../contrib/generate_tcl_patterns.sh 300 dg.exp=gfortran.dg/ How does this

Re: [PATCH] RE: gcc parallel make check

2014-09-09 Thread Yury Gribov
On 09/09/2014 06:14 PM, VandeVondele Joost wrote: I certainly don't want to claim that the patch I have now is perfect, it is rather an incremental improvement on the current setup. I'd second this. Writing patterns manually seems rather inefficient and error-prone (not undoable of course but

Re: [PATCH] RE: gcc parallel make check

2014-09-09 Thread Yury Gribov
On 09/09/2014 06:33 PM, Jakub Jelinek wrote: On Tue, Sep 09, 2014 at 06:27:10PM +0400, Yury Gribov wrote: On 09/09/2014 06:14 PM, VandeVondele Joost wrote: I certainly don't want to claim that the patch I have now is perfect, it is rather an incremental improvement on the current setup. I'd

[PATCHv2] Vimrc config with GNU formatting

2014-09-10 Thread Yury Gribov
in root folder per user's request I personally prefer 2) because this would IMHO improve the quality of patches (e.g. no more silly tab-whitespace formatting bugs). Thoughts? Ok to commit? -Y commit 879cd3e9bdcab780a9b96aff759ef684e3597d0c Author: Yury Gribov y.gri...@samsung.com Date: Thu

Re: [PATCHv2] Vimrc config with GNU formatting

2014-09-10 Thread Yury Gribov
I personally prefer 2) Sorry, I meant 1) of course that is enable vimrc config by default. -Y

Re: [PATCHv2] Vimrc config with GNU formatting

2014-09-10 Thread Yury Gribov
Segher Boessenkool segher at kernel.crashing.org writes: I am saying it is very anti-social to make people's editor behave differently from what they are used to. ... The Emacs dir-locals file simply configures some settings for files with certain major modes in that dir. For example, ours

Re: [PATCHv2] Vimrc config with GNU formatting

2014-09-11 Thread Yury Gribov
On 09/11/2014 01:14 PM, pins...@gmail.com wrote: I don't like auto formatting in any editor. Ok, so +1 for moving to contrib/. And some folks already have to deal with two more formatting styles already: Linux kernel and gnu. So if you add auto formatting to one, some folks are going to get

Re: [PATCHv2] Vimrc config with GNU formatting

2014-09-11 Thread Yury Gribov
On 09/11/2014 01:18 PM, Richard Biener wrote: On Thu, Sep 11, 2014 at 11:06 AM, Richard Biener richard.guent...@gmail.com wrote: On Wed, Sep 10, 2014 at 10:09 AM, Yury Gribovy.gri...@samsung.com wrote: Hi all, This is a second version of patch which adds a Vim config (.local.vimrc) to root

Re: [PATCHv2] Vimrc config with GNU formatting

2014-09-11 Thread Yury Gribov
On 09/11/2014 02:10 PM, Yury Gribov wrote: On 09/11/2014 01:18 PM, Richard Biener wrote: On Thu, Sep 11, 2014 at 11:06 AM, Richard Biener richard.guent...@gmail.com wrote: On Wed, Sep 10, 2014 at 10:09 AM, Yury Gribovy.gri...@samsung.com wrote: Hi all, This is a second version of patch which

[PATCH][PING] Enable -fsanitize-recover for KASan

2014-09-15 Thread Yury Gribov
On 09/05/2014 10:54 AM, Yury Gribov wrote: Hi all, This patch enables -fsanitize-recover for KASan by default. This causes KASan to continue execution after error in case of inline instrumentation. This feature is needed because - reports during early bootstrap won't even be printed - needed

[PATCH][Kasan][PING] Allow to override Asan shadow offset from command line

2014-09-15 Thread Yury Gribov
On 09/08/2014 06:29 PM, Yury Gribov wrote: Hi all, Kasan developers has asked for an option to override offset of Asan shadow memory region. This should simplify experimenting with memory layouts on 64-bit architectures. I've bootstrapped and regtested this on x64. Ok to commit? -Y commit

Re: [PATCHv2] Vimrc config with GNU formatting

2014-09-15 Thread Yury Gribov
On 09/14/2014 02:30 PM, Alexander Monakov wrote: On Thu, 11 Sep 2014, Yury Gribov wrote: Ok, it tooks some time. Basically we want brace symbol to behave differently in two contexts: 1) not add any additional offset when not following control flow operator: void f () { int x

Re: [PATCH 2/2] add static typed insn_deleted_p

2014-09-15 Thread Yury Gribov
On 09/12/2014 05:17 AM, Trevor Saunders wrote: On Thu, Sep 11, 2014 at 08:06:02PM -0400, David Malcolm wrote: FWIW, in case it's helpful, I have a script here that I use to help make ChangeLog entries: https://github.com/davidmalcolm/gcc-refactoring-scripts/blob/master/generate-changelog.py

[PATCHv3] Vimrc config with GNU formatting

2014-09-16 Thread Yury Gribov
bad formatting } } but it seems to be the best we can get with Vim's cindent (and I don't think anyone seriously considers writing a custom indentexpr). Ok to commit? -Y commit 67219512dac9a5cc14eea8f157222a226044dd72 Author: Yury Gribov y.gri...@samsung.com Date: Thu Sep 4 16:55:44 2014

Re: [PATCHv3] Vimrc config with GNU formatting

2014-09-17 Thread Yury Gribov
On 09/17/2014 05:01 PM, Segher Boessenkool wrote: You can make Vim automatically adapt settings, but you cannot make the Vim user adapt to that. How about making Vim user adapt to GNU coding style though? Not that I want to start flame again. Sure. If you have the localrc thing installed,

Re: [PATCHv3] Vimrc config with GNU formatting

2014-09-17 Thread Yury Gribov
Sure. If you have the localrc thing installed, anyone who can write files you can read can make your vim do *anything* (and I mean *anything*). I thought that modern versions of localrc run .local.vimrc scripts in a sandbox? Ok, looks like Markus Braun's

[PATCHv4] Vimrc config with GNU formatting

2014-09-17 Thread Yury Gribov
On 09/16/2014 08:38 PM, Yury Gribov wrote: Hi all, This is the third version of the patch. A list of changes since last version: * move config to contrib so that it's _not_ enabled by default (current score is 2/1 in favor of no Vim config by default) * update Makefile.in to make .local.vimrc

Re: [PATCHv4] Vimrc config with GNU formatting

2014-09-18 Thread Yury Gribov
On 09/18/2014 07:52 AM, Segher Boessenkool wrote: +# Local Vim config + +vimrc: + (cd $(srcdir); $(LN_S) contrib/vimrc .local.vimrc; $(LN_S) contrib/vimrc .lvimrc) + This is another target than what the doc (in the script itself) mentions. Right, I've forgot to fix it before sending the

Re: [PATCH][Kasan][PING] Allow to override Asan shadow offset from command line

2014-09-18 Thread Yury Gribov
On 09/18/2014 03:01 PM, Jakub Jelinek wrote: On Mon, Sep 15, 2014 at 01:46:14PM +0400, Yury Gribov wrote: On 09/08/2014 06:29 PM, Yury Gribov wrote: Kasan developers has asked for an option to override offset of Asan shadow memory region. This should simplify experimenting with memory layouts

Re: [PATCH][PING] Enable -fsanitize-recover for KASan

2014-09-18 Thread Yury Gribov
Added Marek to comment on proposed UBSan option change. On 09/18/2014 02:52 PM, Jakub Jelinek wrote: --- a/gcc/opts.c +++ b/gcc/opts.c @@ -1551,6 +1551,12 @@ common_handle_option (struct gcc_options *opts, | SANITIZE_RETURNS_NONNULL_ATTRIBUTE))

<    1   2   3   4   >