[Bug middle-end/78294] [5/6/7 Regression] -fsanitize=thread broken by ignoring __attribute__((tls_model("initial-exec")))

2016-11-15 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78294 --- Comment #16 from Dmitry Vyukov --- So is it a bug in gcc or in tsan runtime? I thought that an attribute attached to a definition must affect declaration as well.

[Bug middle-end/78294] [5/6/7 Regression] -fsanitize=thread broken by ignoring __attribute__((tls_model("initial-exec")))

2016-11-22 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78294 --- Comment #23 from Dmitry Vyukov --- Markus, Changes to sanitizer runtimes are not committed into gcc tree. The upstream is in llvm tree. Changes must go there first, then they are backported to gcc tree. Your change will be overwritten on nex

[Bug middle-end/78294] [5/6/7 Regression] -fsanitize=thread broken by ignoring __attribute__((tls_model("initial-exec")))

2016-11-22 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78294 --- Comment #25 from Dmitry Vyukov --- > The question is if we want to change this or not and in what way. I would say that we need to change something, because current behavior is counter-intuitive. In tsan runtime we have a declaration with t

[Bug middle-end/78294] [5/6/7 Regression] -fsanitize=thread broken by ignoring __attribute__((tls_model("initial-exec")))

2016-11-22 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=78294 --- Comment #26 from Dmitry Vyukov --- > I was under the impression that upstream wouldn't be interested in this patch, because llvm uses static compiler-rt libs and clang doesn't run into this issue. Upstream is not interested from this point o

[Bug sanitizer/55561] TSAN: provide a TSAN instrumented libgomp

2014-05-09 Thread dvyukov at google dot com
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=55561 --- Comment #46 from Dmitry Vyukov --- Roland, why do you think that what you see is false positives? I think these are real, potentially harmful, races. Please test with gcc 4.9, and file bugs if you still see any races.

[Bug sanitizer/55561] TSAN: provide a TSAN instrumented libgomp

2014-05-14 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=55561 --- Comment #49 from Dmitry Vyukov --- > However, my first idea would be that, since libgomp is not sanitized, not all > races in 'user land' would be detected. I'm just guessing ... If libgomp does not access user data (which I suspect it does

[Bug go/61204] New: gccgo: ICE in in fold_convert_loc

2014-05-16 Thread dvyukov at google dot com
Assignee: ian at airs dot com Reporter: dvyukov at google dot com $ gccgo -v Using built-in specs. COLLECT_GCC=gccgo COLLECT_LTO_WRAPPER=libexec/gcc/x86_64-unknown-linux-gnu/4.10.0/lto-wrapper Target: x86_64-unknown-linux-gnu Configured with: ../configure --enable-languages=c,c++,go

[Bug go/61205] New: gccgo: ICE in fold_binary_loc

2014-05-16 Thread dvyukov at google dot com
Assignee: ian at airs dot com Reporter: dvyukov at google dot com $ gccgo -v Using built-in specs. COLLECT_GCC=gccgo COLLECT_LTO_WRAPPER=libexec/gcc/x86_64-unknown-linux-gnu/4.10.0/lto-wrapper Target: x86_64-unknown-linux-gnu Configured with: ../configure --enable-languages=c,c++,go --disable

[Bug go/61226] New: gccgo: hangs in sort_var_inits

2014-05-19 Thread dvyukov at google dot com
Assignee: ian at airs dot com Reporter: dvyukov at google dot com Created attachment 32818 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=32818&action=edit reproducer $ gccgo -v Using built-in specs. COLLECT_GCC=gccgo COLLECT_LTO_WRAPPER=libexec/gcc/x86_64-unknown-linux-gnu/4.1

[Bug go/61244] New: gccgo: ICE in write_specific_type_functions

2014-05-20 Thread dvyukov at google dot com
Assignee: ian at airs dot com Reporter: dvyukov at google dot com Created attachment 32824 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=32824&action=edit reproducer $ gccgo -v Using built-in specs. COLLECT_GCC=gccgo COLLECT_LTO_WRAPPER=libexec/gcc/x86_64-unknow

[Bug go/61246] New: gccgo: ICE in do_determine_types [GoSmith]

2014-05-20 Thread dvyukov at google dot com
Assignee: ian at airs dot com Reporter: dvyukov at google dot com $ gccgo -v Using built-in specs. COLLECT_GCC=gccgo COLLECT_LTO_WRAPPER=libexec/gcc/x86_64-unknown-linux-gnu/4.10.0/lto-wrapper Target: x86_64-unknown-linux-gnu Configured with: ../configure --enable-languages=c,c

[Bug go/61246] gccgo: ICE in do_determine_types [GoSmith]

2014-05-20 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61246 --- Comment #1 from Dmitry Vyukov --- Created attachment 32825 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=32825&action=edit reproducer

[Bug go/61248] New: gccgo: spurious "error: too many arguments" [GoSmith]

2014-05-20 Thread dvyukov at google dot com
iority: P3 Component: go Assignee: ian at airs dot com Reporter: dvyukov at google dot com gcc version 4.10.0 20140516 (experimental) (GCC) Program: package main func main() { var f func(int, interface{}) go f(0, recover()) } $ go build -compiler=gccgo args.go args.go:5

[Bug go/61253] New: gccgo: spurious "error: expected '<-' or '='" [GoSmith]

2014-05-20 Thread dvyukov at google dot com
FIRMED Severity: normal Priority: P3 Component: go Assignee: ian at airs dot com Reporter: dvyukov at google dot com gcc version 4.10.0 20140516 (experimental) (GCC) The program is: package main func main() { c := make(chan int) v := new(int) b := ne

[Bug go/61254] New: gccgo: spurious "error: slice end must be integer" [GoSmith]

2014-05-20 Thread dvyukov at google dot com
ty: normal Priority: P3 Component: go Assignee: ian at airs dot com Reporter: dvyukov at google dot com gcc version 4.10.0 20140516 (experimental) (GCC) The program is: package main func main() { ((([][]int{})[:])[0])[0]++ } $ go build -compiler=gccgo /tmp/index

[Bug go/61255] New: gccgo: spurious "error: argument 2 has incompatible type" [GoSmith]

2014-05-20 Thread dvyukov at google dot com
ty: normal Priority: P3 Component: go Assignee: ian at airs dot com Reporter: dvyukov at google dot com gcc version 4.10.0 20140516 (experimental) (GCC) The program is: package main func main() { append([]byte{}, 0)[0]++ } $ go build -compiler=gccgo src.g

[Bug go/61258] New: gccgo: assertion failure go-map-delete.c:37

2014-05-20 Thread dvyukov at google dot com
Assignee: ian at airs dot com Reporter: dvyukov at google dot com gcc version 4.10.0 20140516 (experimental) (GCC) The program is: package main func main() { delete(make(map[[0]bool]int), [0]bool{}) } $ go run -compiler=gccgo crash.go ../../../libgo/runtime/go-map

[Bug go/61263] New: gccgo: fatal error: schedule: holding locks [GoSmith]

2014-05-21 Thread dvyukov at google dot com
Component: go Assignee: ian at airs dot com Reporter: dvyukov at google dot com gcc version 4.10.0 20140516 (experimental) (GCC) The program is: package main import "runtime" import "time" import "os" func init() { runtime.GOMAXPROCS(

[Bug go/61264] New: gccgo: ICE in __normal_iterator [GoSmith]

2014-05-21 Thread dvyukov at google dot com
Assignee: ian at airs dot com Reporter: dvyukov at google dot com Created attachment 32839 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=32839&action=edit reproducer gcc version 4.10.0 20140516 (experimental) (GCC) The program is attached. $ go build -compile

[Bug go/61265] New: gccgo: ICE in verify_gimple_in_seq [GoSmith]

2014-05-21 Thread dvyukov at google dot com
Assignee: ian at airs dot com Reporter: dvyukov at google dot com Created attachment 32840 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=32840&action=edit reproducer gcc version 4.10.0 20140516 (experimental) (GCC) The reproducer is attached (you need to set GO

[Bug go/61273] New: gccgo: ICE in Unsafe_type_conversion_expression::do_get_backend [GoSmith]

2014-05-21 Thread dvyukov at google dot com
Severity: normal Priority: P3 Component: go Assignee: ian at airs dot com Reporter: dvyukov at google dot com gccgo (GCC) 4.10.0 20140516 (experimental) The program is: package main func main() { c := make(chan bool, 1) for ; false; c <- fa

[Bug go/61307] New: gccgo: ICE in Create_function_descriptors::expression [GoSmith]

2014-05-25 Thread dvyukov at google dot com
Priority: P3 Component: go Assignee: ian at airs dot com Reporter: dvyukov at google dot com CC: cmang at google dot com Created attachment 32850 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=32850&action=edit reproducer gcc version

[Bug go/61308] New: gccgo: ICE in Expression::check_bounds [GoSmith]

2014-05-25 Thread dvyukov at google dot com
: go Assignee: ian at airs dot com Reporter: dvyukov at google dot com CC: cmang at google dot com Created attachment 32851 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=32851&action=edit reproducer gcc version 4.10.0 20140516 (experimental) (GCC

[Bug go/61316] New: gccgo: spurious "incompatible types in assignment" error [GoSmith]

2014-05-26 Thread dvyukov at google dot com
ty: normal Priority: P3 Component: go Assignee: ian at airs dot com Reporter: dvyukov at google dot com CC: cmang at google dot com gcc version 4.10.0 20140516 (experimental) (GCC) The program is: package main func main() { func() {

[Bug go/61322] New: gccgo: spurious "incompatible type for field 2 in struct construction" error [GoSmith]

2014-05-26 Thread dvyukov at google dot com
NCONFIRMED Severity: normal Priority: P3 Component: go Assignee: ian at airs dot com Reporter: dvyukov at google dot com CC: cmang at google dot com gcc version 4.10.0 20140516 (experimental) (GCC) The program is: package main func main() {

[Bug sanitizer/61955] libsanitizer fails to compile on RHEL4

2015-05-21 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61955 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug sanitizer/61955] libsanitizer fails to compile on RHEL4

2015-05-21 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61955 --- Comment #8 from Dmitry Vyukov --- Kostya, Alexey, Eugeniy, please land this fix to llvm tree while I am OOO.

[Bug sanitizer/60055] Invalid binding of __tsan_default_options

2014-02-04 Thread dvyukov at google dot com
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=60055 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment #3

[Bug sanitizer/67575] New: tsan: double instrumentation of x++

2015-09-14 Thread dvyukov at google dot com
Assignee: unassigned at gcc dot gnu.org Reporter: dvyukov at google dot com CC: dodji at gcc dot gnu.org, dvyukov at gcc dot gnu.org, jakub at gcc dot gnu.org, kcc at gcc dot gnu.org Target Milestone: --- This come up during work on

[Bug sanitizer/68260] false positive with tsan

2015-11-09 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=68260 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug sanitizer/68338] tsan report error about c++11 static local initialize

2015-11-13 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=68338 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug sanitizer/63850] Building TSAN for Aarch64 results in assembler Error

2015-01-18 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63850 --- Comment #5 from Dmitry Vyukov --- I suspect that configure and Makefiles are gcc-specific, that is needs to be submitted to gcc diredctly. And for tsan_rtl.h we have a change in flight that does essentially the same (for mips64 support): http

[Bug sanitizer/63850] Building TSAN for Aarch64 results in assembler Error

2015-01-19 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63850 --- Comment #8 from Dmitry Vyukov --- On Tue, Jan 20, 2015 at 9:06 AM, vekumar at gcc dot gnu.org wrote: > https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63850 > > --- Comment #7 from vekumar at gcc dot gnu.org --- > (In reply to clyon from commen

[Bug sanitizer/63559] -fsanitize=thread sets no preprocessor flags

2014-10-16 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63559 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug sanitizer/63559] -fsanitize=thread sets no preprocessor flags

2014-10-16 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63559 --- Comment #3 from Dmitry Vyukov --- Ah, OK, thanks. FWIW, TBB is open-source. However it uses hand-rolled atomic operations, so tsan won't work out-of-the box anyway.

[Bug sanitizer/63850] Building TSAN for Aarch64 results in assembler Error

2014-11-13 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63850 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug sanitizer/63850] Building TSAN for Aarch64 results in assembler Error

2014-11-13 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63850 --- Comment #3 from Dmitry Vyukov --- Sure, you can do local experimentation in gcc. Yes, gcc Makefile will need to be updated as well. But I am more concerned about shadow memory layout. Tsan mapping is somewhat different from asan.

[Bug sanitizer/64013] [5 Regression] libsanitizer fails to build

2014-11-21 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64013 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug sanitizer/59302] tsan: Unexpected mmap in InternalAllocator!

2014-12-12 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=59302 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug sanitizer/59410] tsan tests fail with address randomization disabled

2014-12-12 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=59410 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug sanitizer/64265] [5 Regression] r217669 broke tsan

2014-12-12 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64265 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug sanitizer/64265] [5 Regression] r217669 broke tsan

2014-12-12 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64265 --- Comment #11 from Dmitry Vyukov --- >Doing it in gimplify_function_tree is pretty straightforward That's good! >So, the question is just if you want to do it that way... Kostya, can you say anything about llvm? On the tsan issue you said: "

[Bug sanitizer/64265] [5 Regression] r217669 broke tsan

2014-12-12 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64265 --- Comment #13 from Dmitry Vyukov --- > ... we actually don't want any __tsan_func_{entry,exit} calls if there are no > memory accesses in the function... ... and no calls to other functions, because these functions can contain memory accesses

[Bug go/61244] gccgo: ICE in write_specific_type_functions [GoSmith]

2014-12-12 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61244 --- Comment #2 from Dmitry Vyukov --- Chris, when you fix these, please also add tests to the main Go repo. These are code patterns that we never saw before. Collections of these patterns will be a great asset for regression testing and any futur

[Bug sanitizer/64265] [5 Regression] r217669 broke tsan

2014-12-12 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64265 --- Comment #17 from Dmitry Vyukov --- Great. Jakub, then you can go for gcc support whenever you have time. It's not super priority as we managed to live without exceptions support so far.

[Bug sanitizer/64265] [5 Regression] r217669 broke tsan

2014-12-12 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64265 --- Comment #20 from Dmitry Vyukov --- No, TSAN_GO is not defined for C/C++ tsan. It's only for race detector for Go language.

[Bug sanitizer/64337] ThreadSanitizer: std::thread + lambda false positive

2014-12-17 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64337 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug sanitizer/64350] TSAN fails after stress-testing for a while

2014-12-18 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64350 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug target/58066] GCC mis-compiles access to TLS variable with -fPIC on x86_64

2014-12-18 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=58066 --- Comment #8 from Dmitry Vyukov --- Is there any progress on this? Is it fixed? I've hit this issue in ThreadSanitizer. It intercepts __tls_get_addr and then code that uses MOVDQA [rbp] crashes. I remember that I hit it previously in some othe

[Bug sanitizer/59410] tsan tests fail with address randomization disabled

2014-12-22 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=59410 --- Comment #39 from Dmitry Vyukov --- >Isomalloc works best when we can assure it as large a range of common, >unoccupied virtual address space as possible. Thus, it's much happier when >ASLR is disabled. I do not follow you here. How does AS

[Bug sanitizer/59410] tsan tests fail with address randomization disabled

2014-12-22 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=59410 --- Comment #40 from Dmitry Vyukov --- Phil, please move the discussion to: https://groups.google.com/forum/#!forum/thread-sanitizer This is not gcc specific, and more people will be able to see it in the tsan group.

[Bug go/61308] gccgo: ICE in Expression::check_bounds [GoSmith]

2014-07-08 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61308 --- Comment #2 from Dmitry Vyukov --- It would be great to accompany these fixes with regression tests. We have significant amount of Go code in std lib and tests, but still we discover new code patterns. Any new compiler functionality (like race

[Bug sanitizer/55561] TSAN: provide a TSAN instrumented libgomp

2014-07-09 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=55561 --- Comment #53 from Dmitry Vyukov --- If we instrument libgomp with tsan, this can introduce lots of extraneous synchronization which is useful only for verification of libgomp itself, but harmful for libgomp users (as it will lead to false posi

[Bug libstdc++/62313] New: Data race in debug iterators

2014-08-30 Thread dvyukov at google dot com
++ Assignee: unassigned at gcc dot gnu.org Reporter: dvyukov at google dot com $ g++ -v gcc version 5.0.0 20140830 (experimental) (GCC) The program is: === #include #include #include std::list::iterator iter, iter2; void *thread(void *arg) { for (int i = 0; i < 100

[Bug libstdc++/62313] Data race in debug iterators

2014-08-30 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=62313 --- Comment #2 from Dmitry Vyukov --- The additional thread only touches iter, and the main thread does not touch iter nor invalidate it. So there is nothing to protect here. The program does not contain data races per se.

[Bug libstdc++/62313] Data race in debug iterators

2014-09-01 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=62313 --- Comment #6 from Dmitry Vyukov --- > The tests for the debug mode don't generally involve threads, so that isn't > likely to help. Then you can run any heavily multithreaded program that extensively uses stl and is currently race-free. That

[Bug libstdc++/62313] Data race in debug iterators

2014-09-01 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=62313 --- Comment #9 from Dmitry Vyukov --- Don't forget about destructor -- the iterator must be removed from list before it destruction starts.

[Bug sanitizer/63251] New: tsan: corrupted shadow stack

2014-09-12 Thread dvyukov at google dot com
Assignee: unassigned at gcc dot gnu.org Reporter: dvyukov at google dot com CC: dodji at gcc dot gnu.org, dvyukov at gcc dot gnu.org, jakub at gcc dot gnu.org, kcc at gcc dot gnu.org Created attachment 33486 --> https://gcc.gnu.org/bugzi

[Bug middle-end/63273] New: atomic operations lead to inefficient code

2014-09-15 Thread dvyukov at google dot com
-end Assignee: unassigned at gcc dot gnu.org Reporter: dvyukov at google dot com Created attachment 33498 --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=33498&action=edit reproducer gcc version 5.0.0 20140830 (experimental) (GCC) Build the attached reproducer

[Bug middle-end/63273] atomic operations lead to inefficient code

2014-09-16 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63273 --- Comment #2 from Dmitry Vyukov --- > Which is because to me it's not exactly clear as for what other operations an atomic load/store is a barrier for. That's trivial to answer -- memory_order_relaxed is barrier for nothing. > But eventually

[Bug middle-end/63273] atomic operations lead to inefficient code

2014-09-16 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63273 --- Comment #4 from Dmitry Vyukov --- For the record, this bug is the result of my attempt to use std atomic operations in ThreadSanitizer runtime. We do a bunch of relaxed loads and stores during processing of every memory access in the target p

[Bug middle-end/63273] atomic operations lead to inefficient code

2014-09-16 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63273 --- Comment #6 from Dmitry Vyukov --- The real world situation is: replace atomic_load/store implementation with relaxed atomic builtins here: https://gcc.gnu.org/viewcvs/gcc/trunk/libsanitizer/sanitizer_common/sanitizer_atomic_clang_x86.h?view=m

[Bug libstdc++/62313] Data race in debug iterators

2014-09-23 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=62313 --- Comment #11 from Dmitry Vyukov --- Just test it with g++ test.cc -Wall -lpthread -fsanitize=thread -pie -fPIE -D_GLIBCXX_DEBUG -g -O2 There is nothing else I can do on top of that.

[Bug sanitizer/68580] FAIL: c-c++-common/tsan/pr65400-1.c -O0 execution test

2015-11-27 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=68580 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug testsuite/68751] FAIL: gcc.dg/sancov/asan.c (test for excess errors)

2015-12-07 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=68751 --- Comment #2 from Dmitry Vyukov --- Mailed a fix yesterday: https://gcc.gnu.org/ml/gcc-patches/2015-12/msg00671.html

[Bug testsuite/68751] FAIL: gcc.dg/sancov/asan.c (test for excess errors)

2015-12-07 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=68751 --- Comment #3 from Dmitry Vyukov --- Committed fix as 231364.

[Bug testsuite/68751] FAIL: gcc.dg/sancov/asan.c (test for excess errors)

2015-12-07 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=68751 --- Comment #4 from Dmitry Vyukov --- Do I have rights to change status? Can't find how to close this...

[Bug sanitizer/68824] [6 Regression] libtsan is missing the __interceptor___tls_get_addr symbol without bumping the soname

2015-12-10 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=68824 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug sanitizer/69204] ThreadSanitizer: False positive on std::promise usage

2016-01-09 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69204 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug sanitizer/69204] ThreadSanitizer: False positive on std::promise usage

2016-01-10 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69204 --- Comment #6 from Dmitry Vyukov --- The problem is that gcc does not instrument atomic operations for some reason. Here is disasm of future::set_result: Dump of assembler code for function std::__future_base::_State_baseV2::_M_set_result(std:

[Bug sanitizer/69204] ThreadSanitizer: False positive on std::promise usage

2016-01-17 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69204 --- Comment #11 from Dmitry Vyukov --- > No it just exposes the problem of using futex system calls with TSAN. What is that problem? Future does not use futex for synchronization, only for wait optimization. So I don't see how it can cause false

[Bug sanitizer/68824] [6 Regression] libtsan is missing the __interceptor___tls_get_addr symbol without bumping the soname

2016-01-18 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=68824 --- Comment #5 from Dmitry Vyukov --- In 3) did you mean -mstackrealign? 1) looks like the simplest option. Are there any downsides?

[Bug sanitizer/68824] [6 Regression] libtsan is missing the __interceptor___tls_get_addr symbol without bumping the soname

2016-01-18 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=68824 --- Comment #7 from Dmitry Vyukov --- I will land such fix in clang. Thanks!

[Bug sanitizer/68824] [6 Regression] libtsan is missing the __interceptor___tls_get_addr symbol without bumping the soname

2016-01-18 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=68824 --- Comment #8 from Dmitry Vyukov --- Jakub, does the following patch look good to you? Just don't want to intermix tsan and sanitizer_common interceptor macros. I think it's better to define and initialize an interceptor in a single file. Inde

[Bug sanitizer/68824] [6 Regression] libtsan is missing the __interceptor___tls_get_addr symbol without bumping the soname

2016-01-19 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=68824 --- Comment #10 from Dmitry Vyukov --- Submitted in: http://llvm.org/viewvc/llvm-project?view=revision&revision=258119

[Bug sanitizer/67009] libsanitizer: shift overflow warnings when boot strapping 32 bit library

2015-07-26 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67009 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug sanitizer/67204] documentation for sanitizer missing/incomplete

2015-08-17 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67204 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

[Bug sanitizer/67286] asan doen't work on Android(32bit ARM)

2015-08-20 Thread dvyukov at google dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67286 --- Comment #4 from Dmitry Vyukov --- Yes, asan should work on android/arm32. There is some ongoing work on arm64. +eugeni can provide more details.

[Bug sanitizer/103466] [12 Regression] SIGILL on machine without avx support when using thread sanitizer

2021-11-29 Thread dvyukov at google dot com via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103466 Dmitry Vyukov changed: What|Removed |Added CC||dvyukov at google dot com --- Comment

<    1   2