summaryrefslogtreecommitdiff
path: root/include/sanitizer/msan_interface.h
diff options
context:
space:
mode:
authorEvgeniy Stepanov <eugeni.stepanov@gmail.com>2013-01-30 13:12:08 +0000
committerEvgeniy Stepanov <eugeni.stepanov@gmail.com>2013-01-30 13:12:08 +0000
commit250f221ae0dee295098da8aa631977b6c2ebc99b (patch)
tree010dfc71527a1a498b1fa1dc7930452ae59fbc0d /include/sanitizer/msan_interface.h
parent48ecaf475c7084125ec1985f0ad7efc1b4b8306e (diff)
downloadcompiler-rt-250f221ae0dee295098da8aa631977b6c2ebc99b.tar.gz
compiler-rt-250f221ae0dee295098da8aa631977b6c2ebc99b.tar.bz2
compiler-rt-250f221ae0dee295098da8aa631977b6c2ebc99b.tar.xz
[sanitizer] Further split private and public sanitizer headers.
And make msan_interface.h C-compatible. git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@173928 91177308-0d34-0410-b5e6-96231b3b80d8
Diffstat (limited to 'include/sanitizer/msan_interface.h')
-rw-r--r--include/sanitizer/msan_interface.h61
1 files changed, 21 insertions, 40 deletions
diff --git a/include/sanitizer/msan_interface.h b/include/sanitizer/msan_interface.h
index 9887b61a..ceba6611 100644
--- a/include/sanitizer/msan_interface.h
+++ b/include/sanitizer/msan_interface.h
@@ -16,10 +16,6 @@
#include <sanitizer/common_interface_defs.h>
-using __sanitizer::uptr;
-using __sanitizer::sptr;
-using __sanitizer::u32;
-
#ifdef __cplusplus
extern "C" {
#endif
@@ -27,47 +23,37 @@ extern "C" {
#if __has_feature(memory_sanitizer)
/* Returns a string describing a stack origin.
Return NULL if the origin is invalid, or is not a stack origin. */
- SANITIZER_INTERFACE_ATTRIBUTE
- const char *__msan_get_origin_descr_if_stack(u32 id);
+ const char *__msan_get_origin_descr_if_stack(uint32_t id);
/* Set raw origin for the memory range. */
- SANITIZER_INTERFACE_ATTRIBUTE
- void __msan_set_origin(void *a, uptr size, u32 origin);
+ void __msan_set_origin(void *a, size_t size, uint32_t origin);
/* Get raw origin for an address. */
- SANITIZER_INTERFACE_ATTRIBUTE
- u32 __msan_get_origin(void *a);
+ uint32_t __msan_get_origin(void *a);
/* Returns non-zero if tracking origins. */
- SANITIZER_INTERFACE_ATTRIBUTE
int __msan_get_track_origins();
/* Returns the origin id of the latest UMR in the calling thread. */
- SANITIZER_INTERFACE_ATTRIBUTE
- u32 __msan_get_umr_origin();
+ uint32_t __msan_get_umr_origin();
/* Make memory region fully initialized (without changing its contents). */
- SANITIZER_INTERFACE_ATTRIBUTE
- void __msan_unpoison(void *a, uptr size);
+ void __msan_unpoison(void *a, size_t size);
/* Make memory region fully uninitialized (without changing its contents). */
- SANITIZER_INTERFACE_ATTRIBUTE
- void __msan_poison(void *a, uptr size);
+ void __msan_poison(void *a, size_t size);
/* Make memory region partially uninitialized (without changing its contents).
*/
- SANITIZER_INTERFACE_ATTRIBUTE
- void __msan_partial_poison(void* data, void* shadow, uptr size);
+ void __msan_partial_poison(void* data, void* shadow, size_t size);
/* Returns the offset of the first (at least partially) poisoned byte in the
memory range, or -1 if the whole range is good. */
- SANITIZER_INTERFACE_ATTRIBUTE
- sptr __msan_test_shadow(const void *x, uptr size);
+ intptr_t __msan_test_shadow(const void *x, size_t size);
/* Set exit code when error(s) were detected.
Value of 0 means don't change the program exit code. */
- SANITIZER_INTERFACE_ATTRIBUTE
void __msan_set_exit_code(int exit_code);
/* For testing:
@@ -75,42 +61,37 @@ extern "C" {
... some buggy code ...
__msan_set_expect_umr(0);
The last line will verify that a UMR happened. */
- SANITIZER_INTERFACE_ATTRIBUTE
void __msan_set_expect_umr(int expect_umr);
/* Print shadow and origin for the memory range to stdout in a human-readable
format. */
- SANITIZER_INTERFACE_ATTRIBUTE
- void __msan_print_shadow(const void *x, uptr size);
+ void __msan_print_shadow(const void *x, size_t size);
/* Print current function arguments shadow and origin to stdout in a
human-readable format. */
- SANITIZER_INTERFACE_ATTRIBUTE
void __msan_print_param_shadow();
/* Returns true if running under a dynamic tool (DynamoRio-based). */
- SANITIZER_INTERFACE_ATTRIBUTE
int __msan_has_dynamic_component();
/* Tell MSan about newly allocated memory (ex.: custom allocator).
Memory will be marked uninitialized, with origin at the call site. */
- SANITIZER_INTERFACE_ATTRIBUTE
- void __msan_allocated_memory(void* data, uptr size);
+ void __msan_allocated_memory(void* data, size_t size);
#else // __has_feature(memory_sanitizer)
-#define __msan_get_origin_descr_if_stack(u32 id) ((const char*)0)
-#define __msan_set_origin(void *a, uptr size, u32 origin)
-#define __msan_get_origin(void *a) ((u32)-1)
+#define __msan_get_origin_descr_if_stack(id) ((const char*)0)
+#define __msan_set_origin(a, size, origin)
+#define __msan_get_origin(a) ((uint32_t)-1)
#define __msan_get_track_origins() (0)
-#define __msan_get_umr_origin() ((u32)-1)
-#define __msan_unpoison(void *a, uptr size)
-#define __msan_poison(void *a, uptr size)
-#define __msan_partial_poison(void* data, void* shadow, uptr size)
-#define __msan_test_shadow(const void *x, uptr size) ((sptr)-1)
-#define __msan_set_exit_code(int exit_code)
-#define __msan_set_expect_umr(int expect_umr)
-#define __msan_print_shadow(const void *x, uptr size)
+#define __msan_get_umr_origin() ((uint32_t)-1)
+#define __msan_unpoison(a, size)
+#define __msan_poison(a, size)
+#define __msan_partial_poison(data, shadow, size)
+#define __msan_test_shadow(x, size) ((intptr_t)-1)
+#define __msan_set_exit_code(exit_code)
+#define __msan_set_expect_umr(expect_umr)
+#define __msan_print_shadow(x, size)
#define __msan_print_param_shadow()
#define __msan_has_dynamic_component() (0)
#define __msan_allocated_memory(data, size)