Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1077)

Unified Diff: Source/heap/AddressSanitizer.h

Issue 141713008: Use new ASAN APIs for scanning ASAN fake stacks during garbage collection. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Minor style changes. Created 6 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | Source/heap/ThreadState.h » ('j') | Source/heap/ThreadState.h » ('J')
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: Source/heap/AddressSanitizer.h
diff --git a/Source/heap/AddressSanitizer.h b/Source/heap/AddressSanitizer.h
index 2104217426f27bec0a2d67de870fcff81bc476b6..2908ea7aa2f171587e86843736bb39cc7b9e51ef 100644
--- a/Source/heap/AddressSanitizer.h
+++ b/Source/heap/AddressSanitizer.h
@@ -35,32 +35,8 @@
// Windows).
// FIXME: Add Windows support here.
#if defined(ADDRESS_SANITIZER) && !OS(WIN)
kcc1 2014/02/06 13:44:06 remember that this part depends on https://code.g
Mads Ager (chromium) 2014/02/06 14:15:17 Yes, I will. I'll land the change to use this head
-extern "C" {
- // Marks memory region [addr, addr+size) as unaddressable.
- // This memory must be previously allocated by the user program. Accessing
- // addresses in this region from instrumented code is forbidden until
- // this region is unpoisoned. This function is not guaranteed to poison
- // the whole region - it may poison only subregion of [addr, addr+size) due
- // to ASan alignment restrictions.
- // Method is NOT thread-safe in the sense that no two threads can
- // (un)poison memory in the same memory region simultaneously.
- void __asan_poison_memory_region(void const volatile*, size_t);
- // Marks memory region [addr, addr+size) as addressable.
- // This memory must be previously allocated by the user program. Accessing
- // addresses in this region is allowed until this region is poisoned again.
- // This function may unpoison a superregion of [addr, addr+size) due to
- // ASan alignment restrictions.
- // Method is NOT thread-safe in the sense that no two threads can
- // (un)poison memory in the same memory region simultaneously.
- void __asan_unpoison_memory_region(void const volatile*, size_t);
-
- // User code should use macros instead of functions.
-#define ASAN_POISON_MEMORY_REGION(addr, size) \
- __asan_poison_memory_region((addr), (size))
-#define ASAN_UNPOISON_MEMORY_REGION(addr, size) \
- __asan_unpoison_memory_region((addr), (size))
+#include <sanitizer/asan_interface.h>
#define NO_SANITIZE_ADDRESS __attribute__((no_sanitize_address))
-}
#else
#define ASAN_POISON_MEMORY_REGION(addr, size) \
((void)(addr), (void)(size))
« no previous file with comments | « no previous file | Source/heap/ThreadState.h » ('j') | Source/heap/ThreadState.h » ('J')

Powered by Google App Engine
This is Rietveld 408576698