[PATCH] D61145: [NFC][Sanitizer] Change "return type" of INTERCEPT_FUNCTION to void
Julian Lettner via Phabricator via llvm-commits
llvm-commits at lists.llvm.org
Tue Apr 30 13:57:14 PDT 2019
yln marked an inline comment as done.
yln added inline comments.
================
Comment at: compiler-rt/trunk/lib/asan/asan_interceptors.h:125-127
+ INTERCEPT_FUNCTION(name); \
+ bool same = (& (name) == & WRAP(name)); \
+ if ((!same || !REAL(name))) \
----------------
vitalybuka wrote:
> rnk wrote:
> > I don't think this change is functionally correct on Windows. The interception mechanism on Windows is based on hotpatching, so the address comparison will always fail. This has created a minor regression in that now any asanified binary run with ASAN_OPTIONS=verbosity=1 emits "failed to intercept *" for every asan-specific interceptor. Checking the reteurn value was the correct thing to do for Windows. I want to revert this, WDYT?
> Oh, I forgot about windows that didn't noticed that the check moved from LINUX_OR_FREEBSD into everything.
> I guess it should be fine to revert it. but this needs to be reverted as well D61205
> I guess yln@ is in different timezone.
Can we try to fix this for Windows instead of reverting altogether. I will provide a patch asap.
Repository:
rL LLVM
CHANGES SINCE LAST ACTION
https://reviews.llvm.org/D61145/new/
https://reviews.llvm.org/D61145
More information about the llvm-commits
mailing list