From patchwork Wed Jan 31 14:17:00 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tamar Christina X-Patchwork-Id: 194776 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7301:2087:b0:106:209c:c626 with SMTP id gs7csp1918873dyb; Wed, 31 Jan 2024 06:18:05 -0800 (PST) X-Google-Smtp-Source: AGHT+IFsGis2PkKfX4VRiN+mFLNewfleIjVJP9YQzwaX4MPpiwZwfcDzUc+P9g7Gtg2XkRgE6Ys9 X-Received: by 2002:a05:622a:249:b0:42a:ad1a:5684 with SMTP id c9-20020a05622a024900b0042aad1a5684mr2141846qtx.44.1706710685033; Wed, 31 Jan 2024 06:18:05 -0800 (PST) ARC-Seal: i=4; a=rsa-sha256; t=1706710685; cv=pass; d=google.com; s=arc-20160816; b=ukqn151cL1+pbT5yyUIgb+3KhbENJ3pt7ZwwwHNh+TuzW0Ib0tdrEYcFPqd4EOTfhm CScyjtmxIsM1apWnwyjoBFEgo9rlGysC9Ledy98NxqqJAO44zYclb8kHIK+sRM1RvIVI 9Rmx3b8li5hx90I2gUD1ZLkAvFno/SW0+lmknquBJsyv8wBU1WmqMCLvc8L+0AEpg+vX c2WbVrtiznwboiYFII6bxjmc/VWdvoLyXfOSiBp8OQoZNTe4Eweix8QaWXCj+ou8s0lM 1XSyPFnzhMxx5WJBslW7HJPByg0khUwbgpS4kxl77hUD+erN/FG1uH9sfeSrIJrvKXa7 9qGA== ARC-Message-Signature: i=4; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:original-authentication-results :nodisclaimer:mime-version:content-disposition:message-id:subject:cc :to:from:date:authentication-results-original:dkim-signature :dkim-signature:arc-filter:dmarc-filter:delivered-to; bh=U0HWFPN8Ayqelzsbe9Gb6EHzzyNneRtaleHOlK0W6NU=; fh=BYD00DnJqv85pZ5froDYoi0+wQ9j5A17pboybhRJNhE=; b=C8QLfts6p/9iUFJT8saDbDAa14hufZIo1u9ID+IE59IZ8P/DEVDMK2CxyCTRTq8sOj RDWzfPUAhbll6O08wucbD9QcDEsqrnbger6snJuvQQApxTPcSUXi2ZLpa7k2vupCwmK2 ewqUsPjPySCW56rmlAyDORau1RasptdffjTvsYkJyIq5zn/jTSWbAbpkddO0o4tDcc3o qUzTiWm9/r1cQsPuBsqwfNuKpPIfZd0ylgRnAdWNFbV428CxQCOwj9GCLQN3zZEb4kb/ uh7gxEZYRuB/Wb08phuJaq7WFLTz4qne646xpLtYY2jNmAzEj9CVjjquBHdOIwvzvLqc ofUA==; dara=google.com ARC-Authentication-Results: i=4; mx.google.com; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=4acvS02U; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=4acvS02U; arc=pass (i=3); spf=pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 8.43.85.97 as permitted sender) smtp.mailfrom="gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com X-Forwarded-Encrypted: i=3; AJvYcCW3HDP9VQmkG/xNrqaoGCQ3EXfAil2YqWsnPmn6JjJ68bH+HWB/ggxHJQ4ELrMuuNct83ctZyR5dwg9Ey1J2i5jCwZ0cA== Received: from server2.sourceware.org (server2.sourceware.org. [8.43.85.97]) by mx.google.com with ESMTPS id d11-20020ac85d8b000000b0042a9b0a2469si8397071qtx.373.2024.01.31.06.18.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 31 Jan 2024 06:18:05 -0800 (PST) Received-SPF: pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 8.43.85.97 as permitted sender) client-ip=8.43.85.97; Authentication-Results: mx.google.com; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=4acvS02U; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=4acvS02U; arc=pass (i=3); spf=pass (google.com: domain of gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org designates 8.43.85.97 as permitted sender) smtp.mailfrom="gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id E33AC3857C44 for ; Wed, 31 Jan 2024 14:18:02 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-db5eur01on2051.outbound.protection.outlook.com [40.107.15.51]) by sourceware.org (Postfix) with ESMTPS id 785623858013 for ; Wed, 31 Jan 2024 14:17:16 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 785623858013 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 785623858013 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=40.107.15.51 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1706710638; cv=pass; b=DaM1IgClfDkC3Qy1oZgS1rxR8Ff/0EVdJwGhdHVxO6gC7CeEVL13zrF4FOHPVNr0ANHtouYxq1tI0snOgkLQaX2c/BgFnZfFwJH0lV+enXK3znez4+L9Fq38vcZBHmS5q3+QK+w98gW6jrtZ13czabTquYJaguoP+SflhVrzl7s= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1706710638; c=relaxed/simple; bh=hMdhFj71ep+M6zJ0A9nflj3qIHaaqLPb7yykyNKFISU=; h=DKIM-Signature:DKIM-Signature:Date:From:To:Subject:Message-ID: MIME-Version; b=PTLk/H0VvuJlFaq/+pEf8vFqhlFNxvWWSSShvKn2k5coSaIZl6UbHyJ0vX5VznOctpfGWVvmAb9K3uhHiSzYD3NCNq08Fb+B6irjHPF1ByUNYSZmO6Q60bDtssTPLNCaW5wZQ+hLDvRv0J0+6KWiQikEArt0FfLzTdfrhnj68rA= ARC-Authentication-Results: i=3; server2.sourceware.org ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=DksHdYQqoNt6teCveN0wDrLutHgzICnQYSufgvSIOfFo5OnPdGDeM3eWTms8xSXFigWGo+MOaoUortLdDvvuqFfl/7LWWUAsmRUfii3/m8n0pvJY8uuPw0CRag5f1Jv8CaJOD+C3brCQkpgf+MnpTE1vdJXx5gDWtwBBV9EXgE1lMH83lmBr6c2wC+ZkvI/uFGqBtW50aUMJWt8jomaCgflXzkbSJ+NnXBHF7l6iC3EhAquS7c5AvQfczrKZcoot0GTMh8/dU+/I9oJXKmK4CYIQ7zBo+l1fNkbvq6MZOjZKpSZBPCEx0++PWwUMaIs6zMaGRIV/OYJM7M0XKAGLdQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=U0HWFPN8Ayqelzsbe9Gb6EHzzyNneRtaleHOlK0W6NU=; b=BxMYky8aepPcX6nO18LAYv6gyoqyXqoMg8N/8mUV+9Z5GA1WzTmR6jbw6jLky7y2VrHCo81LSDMs4vSjlaKX6jQ5h74kV/MmI22T0E/0I7R5npfPMmM60GUUED1QjCvqNmnXQqT6VD3Lg9igGVyTUGiDvyAbs1BXeAwelcGo3rvb6k/rmUz+mUMDQCQx3UJgDMM6/O8K2yc8tqZW6gn0CjZVGMn/Ay05h9sHSU2V9ZV3qW9F+1ih1jShRAZjAeemgNcR6fMwBPjrF88/Oixa+ihPt6GSEow1FefM9ctt/B38kmC1L44DA5POunIjz2CO4gQHL9RC1wZd/jSMuFn0sQ== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=U0HWFPN8Ayqelzsbe9Gb6EHzzyNneRtaleHOlK0W6NU=; b=4acvS02UVmKZhOz3dMJkqdq/CqX0Zh/ESX/7VFozNf+mQhanANLwCThjrEC/e0AArF/eSqtt3/1o6/EvicsgnhQPlKJc7CauDzs13VkN+NAuAiaqUPc+bf+g4xbjNVRK9VHfx4MfovC/nQraUy4PCQgCjLBsvr8RovLJnuy8/IE= Received: from DB9PR06CA0030.eurprd06.prod.outlook.com (2603:10a6:10:1db::35) by PAWPR08MB10210.eurprd08.prod.outlook.com (2603:10a6:102:367::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7249.23; Wed, 31 Jan 2024 14:17:13 +0000 Received: from DU6PEPF00009525.eurprd02.prod.outlook.com (2603:10a6:10:1db:cafe::c5) by DB9PR06CA0030.outlook.office365.com (2603:10a6:10:1db::35) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7228.34 via Frontend Transport; Wed, 31 Jan 2024 14:17:12 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DU6PEPF00009525.mail.protection.outlook.com (10.167.8.6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7249.19 via Frontend Transport; Wed, 31 Jan 2024 14:17:12 +0000 Received: ("Tessian outbound 31df1b57f90c:v228"); Wed, 31 Jan 2024 14:17:12 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 199772e4b8b72f93 X-CR-MTA-TID: 64aa7808 Received: from 7a40c3bedbed.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id F947B2EF-2B76-4118-ABF1-2A0E17A5122A.1; Wed, 31 Jan 2024 14:17:05 +0000 Received: from EUR02-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 7a40c3bedbed.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 31 Jan 2024 14:17:05 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=A2AD1qKVsN3JH9zJqGnYHQqHxY4ZbG2Rf8Z11t55NIsyuNb0uF9iYvDCQMZE7j8A44WMYoizMjf5Cdh/kINfP/FEADTM9MaAxQcYgvhdiz/QIRtHm6J2dVVPMNWIgzrzJWD9kehhIGyWiV/vN/zknUIWxl9eMnuuDtuBieSes59LZmuuPKdK1xxnExf4lFR9WkkefCO2j33zQhDJ1bmAuofA7iTrwq+psosk8W9F8gWT+Wi+jc3XZI6sXxm8fPv5pdUBtYOIipJPDcyPf2519DXQgIYb4AOtysDVRP59GCOWfebJLaH0ZqqTOxMZn6FZ4mIfFV4dAN3cXrxeqZuhbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=U0HWFPN8Ayqelzsbe9Gb6EHzzyNneRtaleHOlK0W6NU=; b=LQwkskb8jnD2Gbnp/e5pectKDTM/w8NFjfR81M2tx7AexaIeFdQYL0inJn/uPRDtTceD7EQZMEvwIRU/qDnX0deKr24s0I9NOW4bSJrsK2VWcmW6S9JNjB5dqaeZ40LOIsYM2fGfFi6c0ZvSFsGWONTConDnksnl37OF/xa6/NbGKyZjuywG20ylFNK9QkC45PE8a4aQp325At2fq4WBwIMOUHiFO171BHMhEPRu6mLlh5kiUnQ3fW8rVqOgLsM+FBlxsgsQaxJwiP3uEN8424b4FLiGQpNKTK5zRndTLK+5Ca5SfwUITS5AQCRCKB8dgel0iU9lEuS3l88Ca0KsuQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=U0HWFPN8Ayqelzsbe9Gb6EHzzyNneRtaleHOlK0W6NU=; b=4acvS02UVmKZhOz3dMJkqdq/CqX0Zh/ESX/7VFozNf+mQhanANLwCThjrEC/e0AArF/eSqtt3/1o6/EvicsgnhQPlKJc7CauDzs13VkN+NAuAiaqUPc+bf+g4xbjNVRK9VHfx4MfovC/nQraUy4PCQgCjLBsvr8RovLJnuy8/IE= Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; Received: from VI1PR08MB5325.eurprd08.prod.outlook.com (2603:10a6:803:13e::17) by PAWPR08MB10090.eurprd08.prod.outlook.com (2603:10a6:102:367::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7228.25; Wed, 31 Jan 2024 14:17:02 +0000 Received: from VI1PR08MB5325.eurprd08.prod.outlook.com ([fe80::810c:8495:3f0a:ef8]) by VI1PR08MB5325.eurprd08.prod.outlook.com ([fe80::810c:8495:3f0a:ef8%7]) with mapi id 15.20.7228.029; Wed, 31 Jan 2024 14:17:02 +0000 Date: Wed, 31 Jan 2024 14:17:00 +0000 From: Tamar Christina To: gcc-patches@gcc.gnu.org Cc: nd@arm.com, jakub@redhat.com, dodji@redhat.com, kcc@google.com, dvyukov@google.com Subject: [PATCH 1/2][libsanitizer] hwasan: Remove testsuite check for a complaint message [PR112644] Message-ID: Content-Disposition: inline X-ClientProxiedBy: LNXP265CA0086.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:76::26) To VI1PR08MB5325.eurprd08.prod.outlook.com (2603:10a6:803:13e::17) MIME-Version: 1.0 X-MS-TrafficTypeDiagnostic: VI1PR08MB5325:EE_|PAWPR08MB10090:EE_|DU6PEPF00009525:EE_|PAWPR08MB10210:EE_ X-MS-Office365-Filtering-Correlation-Id: 0634a6d0-59be-42d3-47d0-08dc226751b2 x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR08MB5325.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(366004)(396003)(136003)(39860400002)(376002)(346002)(230922051799003)(186009)(1800799012)(64100799003)(451199024)(6486002)(966005)(478600001)(5660300002)(44832011)(36756003)(86362001)(66946007)(66476007)(66556008)(316002)(235185007)(6916009)(2906002)(8676002)(41300700001)(38100700002)(4326008)(8936002)(15650500001)(33964004)(44144004)(6506007)(83380400001)(6512007)(2616005)(26005)(4216001)(2700100001); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAWPR08MB10090 Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DU6PEPF00009525.eurprd02.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: da1b3e5a-c0ed-47aa-1398-08dc22674b7a X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: WPsFsjAgezjX9mQ2n05pukhpzHKkiFewHt0rEw7t3uEXwW2XK75ZiBmi16kyW9f+35kXxexZUj/dMInloHKBAPvEGmGHIy5PhqnSy64xUjhP8H4ZOdQepwd/q/Unbo2Se1GMUFCIEDxcuSxkklue9DZ53nKPn03QvSur/pM7n/OVQlewIo6qNdeI2g8rkIeR2XralFOfv9lZSg3YGtF3XT0pXfjtFSuUUW8fTuXItoSSXaZJm+lpf1h5vMavkQsyEzXmZqm1GbmhFDnleInNf5FDaY0IGw5JxU+rsNRm+VRUFYuKz5Qxu5AtAiq1Ea9HovXTwnp/fWRAP9M9vbazc9vmEP9Y4KhYfYi6T2r3fS7i9pYMUKaNn2uQ79mQ6d9xeZM5ePDN05EOfzf9KBCAPvzzZpMhMlVojc27Gvhx6mEt/p4fmFzV1m0lHejT5UTZfUmHU8/2X7mzQscwqH572aQoo0mloFJZi2iwitRhJkFTA2dqHBfm6UTH9+E4N5ZAn2hC+wkA3Ft6fFvTX7XyznqPhUleiOeBhZCMUT+N8cPwKZy2uPw5cXIYpzYnAmsA9rtkOjS6OHEYm9sXchukCWXldN1b76AvZlmhJskUfWOwv9e1l3CqSmwgoUYTVn6gxE3lpJZZwhWSlK6P5qfWzoAynpKtxZSJcgTH7LRuSiep336EAoueD+Rk4H4wFrxet8YzQssSAteDbZB/oAZ5T0qlDbme7ufpyqe7tIAu6xzAXqgtq7KRXeVUtzXgBlx6Elf48QS5XDKRblavqUIBO5+7oi/0t/xS/f1cV8zwf30= X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230031)(4636009)(346002)(39860400002)(376002)(396003)(136003)(230922051799003)(451199024)(1800799012)(82310400011)(64100799003)(186009)(40470700004)(36840700001)(46966006)(41300700001)(83380400001)(47076005)(26005)(107886003)(2616005)(336012)(6512007)(356005)(81166007)(36860700001)(966005)(44832011)(8936002)(235185007)(4326008)(8676002)(5660300002)(15650500001)(6506007)(2906002)(6486002)(478600001)(33964004)(44144004)(70586007)(82740400003)(316002)(6916009)(70206006)(86362001)(36756003)(40480700001)(40460700003)(4216001)(2700100001); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Jan 2024 14:17:12.7381 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 0634a6d0-59be-42d3-47d0-08dc226751b2 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DU6PEPF00009525.eurprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAWPR08MB10210 X-Spam-Status: No, score=-11.9 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, FORGED_SPF_HELO, GIT_PATCH_0, KAM_DMARC_NONE, KAM_LOTSOFHASH, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS, SPF_NONE, TXREP, T_SCC_BODY_TEXT_LINE, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces+ouuuleilei=gmail.com@gcc.gnu.org X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1789615863426501960 X-GMAIL-MSGID: 1789615863426501960 Hi All, Recent libhwasan updates[1] intercept various string and memory functions. These functions have checking in them, which means there's no need to inline the checking. This patch marks said functions as intercepted, and adjusts a testcase to handle the difference. It also looks for HWASAN in a check in expand_builtin. This check originally is there to avoid using expand to inline the behaviour of builtins like memset which are intercepted by ASAN and hence which we rely on the function call staying as a function call. With the new reliance on function calls in HWASAN we need to do the same thing for HWASAN too. HWASAN and ASAN don't seem to however instrument the same functions. Looking into libsanitizer/sanitizer_common/sanitizer_common_interceptors_memintrinsics.inc it looks like the common ones are memset, memmove and memcpy. The rest of the routines for asan seem to be defined in compiler-rt/lib/asan/asan_interceptors.h however compiler-rt/lib/hwasan/ does not have such a file but it does have compiler-rt/lib/hwasan/hwasan_platform_interceptors.h which it looks like is forcing off everything but memset, memmove, memcpy, memcmp and bcmp. As such I've taken those as the final list that hwasan currently supports. This also means that on future updates this list should be cross checked. [1] https://discourse.llvm.org/t/hwasan-question-about-the-recent-interceptors-being-added/75351 Bootstrapped Regtested on aarch64-none-linux-gnu and no issues. Ok for master? Thanks, Tamar gcc/ChangeLog: PR sanitizer/112644 * asan.h (asan_intercepted_p): Incercept memset, memmove, memcpy and memcmp. * builtins.cc (expand_builtin): Include HWASAN when checking for builtin inlining. gcc/testsuite/ChangeLog: PR sanitizer/112644 * c-c++-common/hwasan/builtin-special-handling.c: Update testcase. Co-Authored-By: Matthew Malcomson --- inline copy of patch -- diff --git a/gcc/asan.h b/gcc/asan.h index 82811bdbe697665652aba89f2ee1c3ac07970df9..d1bf8b1e701b15525c6a900d324f2aebfb778cba 100644 --- diff --git a/gcc/asan.h b/gcc/asan.h index 82811bdbe697665652aba89f2ee1c3ac07970df9..d1bf8b1e701b15525c6a900d324f2aebfb778cba 100644 --- a/gcc/asan.h +++ b/gcc/asan.h @@ -185,8 +185,13 @@ extern hash_set *asan_handled_variables; inline bool asan_intercepted_p (enum built_in_function fcode) { + /* This list should be kept up-to-date with upstream's version at + compiler-rt/lib/hwasan/hwasan_platform_interceptors.h. */ if (hwasan_sanitize_p ()) - return false; + return fcode == BUILT_IN_MEMCMP + || fcode == BUILT_IN_MEMCPY + || fcode == BUILT_IN_MEMMOVE + || fcode == BUILT_IN_MEMSET; return fcode == BUILT_IN_INDEX || fcode == BUILT_IN_MEMCHR diff --git a/gcc/builtins.cc b/gcc/builtins.cc index a0bd82c7981c05caf2764de70c62fe83bef9ad29..12cc7a54e99555d0f4b21fa2cc32ffa7bb548f18 100644 --- a/gcc/builtins.cc +++ b/gcc/builtins.cc @@ -7792,7 +7792,8 @@ expand_builtin (tree exp, rtx target, rtx subtarget, machine_mode mode, default: break; } - if (sanitize_flags_p (SANITIZE_ADDRESS) && asan_intercepted_p (fcode)) + if (sanitize_flags_p (SANITIZE_ADDRESS | SANITIZE_HWADDRESS) + && asan_intercepted_p (fcode)) return expand_call (exp, target, ignore); /* When not optimizing, generate calls to library functions for a certain diff --git a/gcc/testsuite/c-c++-common/hwasan/builtin-special-handling.c b/gcc/testsuite/c-c++-common/hwasan/builtin-special-handling.c index a7a6d91693ae48c20f33ab28f28d27b01af4722c..f975baaaa1cc397bc0d6fd475dbfed5ccc8ac386 100644 --- a/gcc/testsuite/c-c++-common/hwasan/builtin-special-handling.c +++ b/gcc/testsuite/c-c++-common/hwasan/builtin-special-handling.c @@ -8,24 +8,24 @@ /* { dg-skip-if "" { *-*-* } { "-flto" } { "-flto-partition=none" } } */ typedef __SIZE_TYPE__ size_t; -/* Functions to observe that HWASAN instruments memory builtins in the expected - manner. */ +/* HWASAN used to instrument calls to memset, memcpy, and memmove. It no + longer does this. Many other string and memory builtins are intercepted by + the runtime (and hence the codegen need not do anything). */ void * __attribute__((noinline)) memset_builtin (void *dest, int value, size_t len) { return __builtin_memset (dest, value, len); } -/* HWASAN avoids strlen because it doesn't know the size of the memory access - until *after* the function call. */ size_t __attribute__ ((noinline)) strlen_builtin (char *element) { return __builtin_strlen (element); } -/* First test ensures that the HWASAN_CHECK was emitted before the - memset. Second test ensures there was only HWASAN_CHECK (which demonstrates - that strlen was not instrumented). */ -/* { dg-final { scan-tree-dump-times "HWASAN_CHECK.*memset" 1 "asan1" } } */ -/* { dg-final { scan-tree-dump-times "HWASAN_CHECK" 1 "asan1" } } */ +/* First check here ensures there is no inline instrumentation generated for + these builtins. Second checks that we end up calling memset (i.e. that it's + not optimised into an inline operation, which would happen without the + instrumentation). */ +/* { dg-final { scan-tree-dump-not "HWASAN_CHECK" "asan1" } } */ +/* { dg-final { scan-assembler-times "\tmemset\\M" 1 } } */ --- a/gcc/asan.h +++ b/gcc/asan.h @@ -185,8 +185,13 @@ extern hash_set *asan_handled_variables; inline bool asan_intercepted_p (enum built_in_function fcode) { + /* This list should be kept up-to-date with upstream's version at + compiler-rt/lib/hwasan/hwasan_platform_interceptors.h. */ if (hwasan_sanitize_p ()) - return false; + return fcode == BUILT_IN_MEMCMP + || fcode == BUILT_IN_MEMCPY + || fcode == BUILT_IN_MEMMOVE + || fcode == BUILT_IN_MEMSET; return fcode == BUILT_IN_INDEX || fcode == BUILT_IN_MEMCHR diff --git a/gcc/builtins.cc b/gcc/builtins.cc index a0bd82c7981c05caf2764de70c62fe83bef9ad29..12cc7a54e99555d0f4b21fa2cc32ffa7bb548f18 100644 --- a/gcc/builtins.cc +++ b/gcc/builtins.cc @@ -7792,7 +7792,8 @@ expand_builtin (tree exp, rtx target, rtx subtarget, machine_mode mode, default: break; } - if (sanitize_flags_p (SANITIZE_ADDRESS) && asan_intercepted_p (fcode)) + if (sanitize_flags_p (SANITIZE_ADDRESS | SANITIZE_HWADDRESS) + && asan_intercepted_p (fcode)) return expand_call (exp, target, ignore); /* When not optimizing, generate calls to library functions for a certain diff --git a/gcc/testsuite/c-c++-common/hwasan/builtin-special-handling.c b/gcc/testsuite/c-c++-common/hwasan/builtin-special-handling.c index a7a6d91693ae48c20f33ab28f28d27b01af4722c..f975baaaa1cc397bc0d6fd475dbfed5ccc8ac386 100644 --- a/gcc/testsuite/c-c++-common/hwasan/builtin-special-handling.c +++ b/gcc/testsuite/c-c++-common/hwasan/builtin-special-handling.c @@ -8,24 +8,24 @@ /* { dg-skip-if "" { *-*-* } { "-flto" } { "-flto-partition=none" } } */ typedef __SIZE_TYPE__ size_t; -/* Functions to observe that HWASAN instruments memory builtins in the expected - manner. */ +/* HWASAN used to instrument calls to memset, memcpy, and memmove. It no + longer does this. Many other string and memory builtins are intercepted by + the runtime (and hence the codegen need not do anything). */ void * __attribute__((noinline)) memset_builtin (void *dest, int value, size_t len) { return __builtin_memset (dest, value, len); } -/* HWASAN avoids strlen because it doesn't know the size of the memory access - until *after* the function call. */ size_t __attribute__ ((noinline)) strlen_builtin (char *element) { return __builtin_strlen (element); } -/* First test ensures that the HWASAN_CHECK was emitted before the - memset. Second test ensures there was only HWASAN_CHECK (which demonstrates - that strlen was not instrumented). */ -/* { dg-final { scan-tree-dump-times "HWASAN_CHECK.*memset" 1 "asan1" } } */ -/* { dg-final { scan-tree-dump-times "HWASAN_CHECK" 1 "asan1" } } */ +/* First check here ensures there is no inline instrumentation generated for + these builtins. Second checks that we end up calling memset (i.e. that it's + not optimised into an inline operation, which would happen without the + instrumentation). */ +/* { dg-final { scan-tree-dump-not "HWASAN_CHECK" "asan1" } } */ +/* { dg-final { scan-assembler-times "\tmemset\\M" 1 } } */