diff options
| author | Derek Bruening <bruening@google.com> | 2016-06-13 16:16:49 +0000 |
|---|---|---|
| committer | Derek Bruening <bruening@google.com> | 2016-06-13 16:16:49 +0000 |
| commit | db176c11dc3d78b3cfbf623eb3fe71532a80a91f (patch) | |
| tree | 4e0309bf88704ea6f5a4eed95cddf00a92a6c391 /compiler-rt/lib/esan | |
| parent | e93f6d69233851e374819dd9066b2c72104e0ac7 (diff) | |
| download | bcm5719-llvm-db176c11dc3d78b3cfbf623eb3fe71532a80a91f.tar.gz bcm5719-llvm-db176c11dc3d78b3cfbf623eb3fe71532a80a91f.zip | |
Revert "[sanitizer][esan] Add internal_sigaction_syscall"
This reverts commit r272553.
The iOS build fails to link.
llvm-svn: 272557
Diffstat (limited to 'compiler-rt/lib/esan')
| -rw-r--r-- | compiler-rt/lib/esan/esan.cpp | 3 | ||||
| -rw-r--r-- | compiler-rt/lib/esan/esan_interceptors.cpp | 6 | ||||
| -rw-r--r-- | compiler-rt/lib/esan/working_set.cpp | 5 | ||||
| -rw-r--r-- | compiler-rt/lib/esan/working_set.h | 1 |
4 files changed, 1 insertions, 14 deletions
diff --git a/compiler-rt/lib/esan/esan.cpp b/compiler-rt/lib/esan/esan.cpp index e6d6aff3184..e7399e219e6 100644 --- a/compiler-rt/lib/esan/esan.cpp +++ b/compiler-rt/lib/esan/esan.cpp @@ -197,9 +197,6 @@ void initializeLibrary(ToolType Tool) { } initializeShadow(); - if (__esan_which_tool == ESAN_WorkingSet) - initializeShadowWorkingSet(); - initializeInterceptors(); if (__esan_which_tool == ESAN_CacheFrag) { diff --git a/compiler-rt/lib/esan/esan_interceptors.cpp b/compiler-rt/lib/esan/esan_interceptors.cpp index 7aefeb6646e..5d4edb51d99 100644 --- a/compiler-rt/lib/esan/esan_interceptors.cpp +++ b/compiler-rt/lib/esan/esan_interceptors.cpp @@ -17,7 +17,6 @@ #include "interception/interception.h" #include "sanitizer_common/sanitizer_common.h" #include "sanitizer_common/sanitizer_libc.h" -#include "sanitizer_common/sanitizer_linux.h" #include "sanitizer_common/sanitizer_stacktrace.h" using namespace __esan; // NOLINT @@ -398,11 +397,6 @@ INTERCEPTOR(int, sigaction, int signum, const struct sigaction *act, // This is required to properly use internal_sigaction. namespace __sanitizer { int real_sigaction(int signum, const void *act, void *oldact) { - if (REAL(sigaction) == nullptr) { - // With an instrumented allocator, this is called during interceptor init - // and we need a raw syscall solution. - return internal_sigaction_syscall(signum, act, oldact); - } return REAL(sigaction)(signum, (const struct sigaction *)act, (struct sigaction *)oldact); } diff --git a/compiler-rt/lib/esan/working_set.cpp b/compiler-rt/lib/esan/working_set.cpp index 622fd29e846..9e7520f492e 100644 --- a/compiler-rt/lib/esan/working_set.cpp +++ b/compiler-rt/lib/esan/working_set.cpp @@ -182,13 +182,10 @@ static void takeSample(void *Arg) { } } -// Initialization that must be done before any instrumented code is executed. -void initializeShadowWorkingSet() { +void initializeWorkingSet() { CHECK(getFlags()->cache_line_size == CacheLineSize); registerMemoryFaultHandler(); -} -void initializeWorkingSet() { if (getFlags()->record_snapshots) { for (u32 i = 0; i < NumFreq; ++i) SizePerFreq[i].initialize(CircularBufferSizes[i]); diff --git a/compiler-rt/lib/esan/working_set.h b/compiler-rt/lib/esan/working_set.h index 034dfe6d991..3750a480a11 100644 --- a/compiler-rt/lib/esan/working_set.h +++ b/compiler-rt/lib/esan/working_set.h @@ -21,7 +21,6 @@ namespace __esan { void initializeWorkingSet(); -void initializeShadowWorkingSet(); int finalizeWorkingSet(); void processRangeAccessWorkingSet(uptr PC, uptr Addr, SIZE_T Size, bool IsWrite); |

