diff options
author | Adhemerval Zanella <adhemerval.zanella@linaro.org> | 2015-09-15 13:22:54 +0000 |
---|---|---|
committer | Adhemerval Zanella <adhemerval.zanella@linaro.org> | 2015-09-15 13:22:54 +0000 |
commit | 172cc32ef3d3b33d413f3dc9896c50677b65fd45 (patch) | |
tree | a2397f46dc107055af0ad967fbd676a36d66186f | |
parent | 18d4b0dab73100607f6b772053c1fe1f1141b8b6 (diff) | |
download | bcm5719-llvm-172cc32ef3d3b33d413f3dc9896c50677b65fd45.tar.gz bcm5719-llvm-172cc32ef3d3b33d413f3dc9896c50677b65fd45.zip |
[sanitizer] Move CheckVMASize after flag initialization
llvm-svn: 247684
-rw-r--r-- | compiler-rt/lib/asan/asan_rtl.cc | 3 | ||||
-rw-r--r-- | compiler-rt/lib/dfsan/dfsan.cc | 3 | ||||
-rw-r--r-- | compiler-rt/lib/msan/msan.cc | 5 | ||||
-rw-r--r-- | compiler-rt/lib/tsan/rtl/tsan_rtl.cc | 4 |
4 files changed, 8 insertions, 7 deletions
diff --git a/compiler-rt/lib/asan/asan_rtl.cc b/compiler-rt/lib/asan/asan_rtl.cc index 80f7872a2e8..effb68020c5 100644 --- a/compiler-rt/lib/asan/asan_rtl.cc +++ b/compiler-rt/lib/asan/asan_rtl.cc @@ -377,6 +377,8 @@ static void AsanInitInternal() { // initialization steps look at flags(). InitializeFlags(); + CheckVMASize(); + AsanCheckIncompatibleRT(); AsanCheckDynamicRTPrereqs(); @@ -585,7 +587,6 @@ void NOINLINE __asan_set_death_callback(void (*callback)(void)) { // Initialize as requested from instrumented application code. // We use this call as a trigger to wake up ASan from deactivated state. void __asan_init() { - CheckVMASize(); AsanActivate(); AsanInitInternal(); } diff --git a/compiler-rt/lib/dfsan/dfsan.cc b/compiler-rt/lib/dfsan/dfsan.cc index 8023d32630a..f4bef921a30 100644 --- a/compiler-rt/lib/dfsan/dfsan.cc +++ b/compiler-rt/lib/dfsan/dfsan.cc @@ -399,6 +399,8 @@ static void dfsan_fini() { } static void dfsan_init(int argc, char **argv, char **envp) { + InitializeFlags(); + CheckVMASize(); MmapFixedNoReserve(kShadowAddr, kUnusedAddr - kShadowAddr); @@ -412,7 +414,6 @@ static void dfsan_init(int argc, char **argv, char **envp) { if (!(init_addr >= kUnusedAddr && init_addr < kAppAddr)) MmapNoAccess(kUnusedAddr, kAppAddr - kUnusedAddr); - InitializeFlags(); InitializeInterceptors(); // Register the fini callback to run when the program terminates successfully diff --git a/compiler-rt/lib/msan/msan.cc b/compiler-rt/lib/msan/msan.cc index 32bcaa36083..7b40051d3b2 100644 --- a/compiler-rt/lib/msan/msan.cc +++ b/compiler-rt/lib/msan/msan.cc @@ -375,12 +375,13 @@ void __msan_init() { msan_init_is_running = 1; SanitizerToolName = "MemorySanitizer"; - CheckVMASize(); - InitTlsSize(); CacheBinaryName(); InitializeFlags(); + + CheckVMASize(); + __sanitizer_set_report_path(common_flags()->log_path); InitializeInterceptors(); diff --git a/compiler-rt/lib/tsan/rtl/tsan_rtl.cc b/compiler-rt/lib/tsan/rtl/tsan_rtl.cc index 9f8d0b6d690..24ccc51a21e 100644 --- a/compiler-rt/lib/tsan/rtl/tsan_rtl.cc +++ b/compiler-rt/lib/tsan/rtl/tsan_rtl.cc @@ -312,9 +312,6 @@ void Initialize(ThreadState *thr) { if (is_initialized) return; is_initialized = true; - - CheckVMASize(); - // We are not ready to handle interceptors yet. ScopedIgnoreInterceptors ignore; SanitizerToolName = "ThreadSanitizer"; @@ -325,6 +322,7 @@ void Initialize(ThreadState *thr) { const char *options = GetEnv(kTsanOptionsEnv); CacheBinaryName(); InitializeFlags(&ctx->flags, options); + CheckVMASize(); #ifndef SANITIZER_GO InitializeAllocator(); #endif |