From 219893297b88009a17a28fe656f9ed7fc4c62ae3 Mon Sep 17 00:00:00 2001 From: Thurston Dang Date: Tue, 12 Aug 2025 09:37:10 -0700 Subject: [PATCH] [sanitizer] Downgrade TestPTrace() Reports to VReport (#152350) Requested in https://github.com/llvm/llvm-project/pull/152072#discussion_r2257892739 --- .../sanitizer_stoptheworld_linux_libcdep.cpp | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cpp b/compiler-rt/lib/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cpp index 5fde65ea48c4..2bf547f4a721 100644 --- a/compiler-rt/lib/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cpp +++ b/compiler-rt/lib/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cpp @@ -413,11 +413,12 @@ static void TestPTrace() { // internal_fork() on SPARC actually calls __fork(). We can't safely fork, // because it's possible seccomp has been configured to disallow fork() but // allow clone(). - Report("WARNING: skipping TestPTrace() because this is SPARC\n"); - Report( - "If seccomp blocks ptrace, LeakSanitizer may hang without further " - "notice\n"); - Report( + VReport(1, "WARNING: skipping TestPTrace() because this is SPARC\n"); + VReport(1, + "If seccomp blocks ptrace, LeakSanitizer may hang without further " + "notice\n"); + VReport( + 1, "If seccomp does not block ptrace, you can safely ignore this warning\n"); # else // Heuristic: only check the first time this is called. This is not always @@ -438,7 +439,7 @@ static void TestPTrace() { if (pid < 0) { int rverrno; if (internal_iserror(pid, &rverrno)) - Report("WARNING: TestPTrace() failed to fork (errno %d)\n", rverrno); + VReport(0, "WARNING: TestPTrace() failed to fork (errno %d)\n", rverrno); // We don't abort the sanitizer - it's still worth letting the sanitizer // try.