mirror of
https://github.com/darlinghq/darling-compiler-rt.git
synced 2024-11-27 05:40:31 +00:00
Re-apply r241217 with build fixes:
- Disable building of the interceptor library on 64-bit Windows. - Mangle names in /alternatename directive for 32-bit Windows. git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@241224 91177308-0d34-0410-b5e6-96231b3b80d8
This commit is contained in:
parent
5e8af5dbfb
commit
f78932b4e5
@ -181,7 +181,11 @@ else()
|
||||
test_target_arch(i686 __i686__ "-m32")
|
||||
test_target_arch(i386 __i386__ "-m32")
|
||||
else()
|
||||
test_target_arch(i386 "" "")
|
||||
if (CMAKE_SIZEOF_VOID_P EQUAL 4)
|
||||
test_target_arch(i386 "" "")
|
||||
else()
|
||||
test_target_arch(x86_64 "" "")
|
||||
endif()
|
||||
endif()
|
||||
elseif("${LLVM_NATIVE_ARCH}" STREQUAL "PowerPC")
|
||||
TEST_BIG_ENDIAN(HOST_IS_BIG_ENDIAN)
|
||||
@ -267,13 +271,21 @@ endif()
|
||||
|
||||
if (SANITIZER_COMMON_SUPPORTED_ARCH AND NOT LLVM_USE_SANITIZER AND
|
||||
(OS_NAME MATCHES "Android|Darwin|Linux|FreeBSD" OR
|
||||
(OS_NAME MATCHES "Windows" AND MSVC AND CMAKE_SIZEOF_VOID_P EQUAL 4)))
|
||||
(OS_NAME MATCHES "Windows" AND MSVC)))
|
||||
set(COMPILER_RT_HAS_SANITIZER_COMMON TRUE)
|
||||
else()
|
||||
set(COMPILER_RT_HAS_SANITIZER_COMMON FALSE)
|
||||
endif()
|
||||
|
||||
if (COMPILER_RT_HAS_SANITIZER_COMMON AND ASAN_SUPPORTED_ARCH)
|
||||
if (COMPILER_RT_HAS_SANITIZER_COMMON AND
|
||||
(NOT OS_NAME MATCHES "Windows" OR CMAKE_SIZEOF_VOID_P EQUAL 4))
|
||||
set(COMPILER_RT_HAS_INTERCEPTION TRUE)
|
||||
else()
|
||||
set(COMPILER_RT_HAS_INTERCEPTION FALSE)
|
||||
endif()
|
||||
|
||||
if (COMPILER_RT_HAS_SANITIZER_COMMON AND ASAN_SUPPORTED_ARCH AND
|
||||
(NOT OS_NAME MATCHES "Windows" OR CMAKE_SIZEOF_VOID_P EQUAL 4))
|
||||
set(COMPILER_RT_HAS_ASAN TRUE)
|
||||
else()
|
||||
set(COMPILER_RT_HAS_ASAN FALSE)
|
||||
@ -323,7 +335,7 @@ else()
|
||||
endif()
|
||||
|
||||
if (COMPILER_RT_HAS_SANITIZER_COMMON AND UBSAN_SUPPORTED_ARCH AND
|
||||
OS_NAME MATCHES "Darwin|Linux|FreeBSD")
|
||||
OS_NAME MATCHES "Darwin|Linux|FreeBSD|Windows")
|
||||
set(COMPILER_RT_HAS_UBSAN TRUE)
|
||||
else()
|
||||
set(COMPILER_RT_HAS_UBSAN FALSE)
|
||||
|
@ -4,8 +4,11 @@
|
||||
include(AddCompilerRT)
|
||||
include(SanitizerUtils)
|
||||
|
||||
if(COMPILER_RT_HAS_SANITIZER_COMMON)
|
||||
if(COMPILER_RT_HAS_INTERCEPTION)
|
||||
add_subdirectory(interception)
|
||||
endif()
|
||||
|
||||
if(COMPILER_RT_HAS_SANITIZER_COMMON)
|
||||
add_subdirectory(sanitizer_common)
|
||||
add_subdirectory(lsan)
|
||||
add_subdirectory(ubsan)
|
||||
|
@ -21,6 +21,15 @@ extern "C" void _mm_mfence();
|
||||
#pragma intrinsic(_mm_mfence)
|
||||
extern "C" void _mm_pause();
|
||||
#pragma intrinsic(_mm_pause)
|
||||
extern "C" char _InterlockedExchange8( // NOLINT
|
||||
char volatile *Addend, char Value); // NOLINT
|
||||
#pragma intrinsic(_InterlockedExchange8)
|
||||
extern "C" short _InterlockedExchange16( // NOLINT
|
||||
short volatile *Addend, short Value); // NOLINT
|
||||
#pragma intrinsic(_InterlockedExchange16)
|
||||
extern "C" long _InterlockedExchange( // NOLINT
|
||||
long volatile *Addend, long Value); // NOLINT
|
||||
#pragma intrinsic(_InterlockedExchange)
|
||||
extern "C" long _InterlockedExchangeAdd( // NOLINT
|
||||
long volatile * Addend, long Value); // NOLINT
|
||||
#pragma intrinsic(_InterlockedExchangeAdd)
|
||||
@ -145,28 +154,25 @@ INLINE u8 atomic_exchange(volatile atomic_uint8_t *a,
|
||||
u8 v, memory_order mo) {
|
||||
(void)mo;
|
||||
DCHECK(!((uptr)a % sizeof(*a)));
|
||||
__asm {
|
||||
mov eax, a
|
||||
mov cl, v
|
||||
xchg [eax], cl // NOLINT
|
||||
mov v, cl
|
||||
}
|
||||
return v;
|
||||
return (u8)_InterlockedExchange8((volatile char*)&a->val_dont_use, v);
|
||||
}
|
||||
|
||||
INLINE u16 atomic_exchange(volatile atomic_uint16_t *a,
|
||||
u16 v, memory_order mo) {
|
||||
(void)mo;
|
||||
DCHECK(!((uptr)a % sizeof(*a)));
|
||||
__asm {
|
||||
mov eax, a
|
||||
mov cx, v
|
||||
xchg [eax], cx // NOLINT
|
||||
mov v, cx
|
||||
}
|
||||
return v;
|
||||
return (u16)_InterlockedExchange16((volatile short*)&a->val_dont_use, v);
|
||||
}
|
||||
|
||||
INLINE u32 atomic_exchange(volatile atomic_uint32_t *a,
|
||||
u32 v, memory_order mo) {
|
||||
(void)mo;
|
||||
DCHECK(!((uptr)a % sizeof(*a)));
|
||||
return (u32)_InterlockedExchange((volatile long*)&a->val_dont_use, v);
|
||||
}
|
||||
|
||||
#ifndef _WIN64
|
||||
|
||||
INLINE bool atomic_compare_exchange_strong(volatile atomic_uint8_t *a,
|
||||
u8 *cmp,
|
||||
u8 xchgv,
|
||||
@ -188,6 +194,8 @@ INLINE bool atomic_compare_exchange_strong(volatile atomic_uint8_t *a,
|
||||
return false;
|
||||
}
|
||||
|
||||
#endif
|
||||
|
||||
INLINE bool atomic_compare_exchange_strong(volatile atomic_uintptr_t *a,
|
||||
uptr *cmp,
|
||||
uptr xchg,
|
||||
|
@ -383,7 +383,7 @@ INLINE uptr RoundUpToPowerOfTwo(uptr size) {
|
||||
uptr up = MostSignificantSetBitIndex(size);
|
||||
CHECK(size < (1ULL << (up + 1)));
|
||||
CHECK(size > (1ULL << up));
|
||||
return 1UL << (up + 1);
|
||||
return 1ULL << (up + 1);
|
||||
}
|
||||
|
||||
INLINE uptr RoundUpTo(uptr size, uptr boundary) {
|
||||
@ -659,8 +659,7 @@ void MaybeStartBackgroudThread();
|
||||
// memset/memcpy/etc.
|
||||
static inline void SanitizerBreakOptimization(void *arg) {
|
||||
#if _MSC_VER
|
||||
// FIXME: make sure this is actually enough.
|
||||
__asm;
|
||||
_ReadWriteBarrier();
|
||||
#else
|
||||
__asm__ __volatile__("" : : "r" (arg) : "memory");
|
||||
#endif
|
||||
|
@ -186,7 +186,11 @@ static void renderText(const char *Message, const Diag::Arg *Args) {
|
||||
// FIXME: Support floating-point formatting in sanitizer_common's
|
||||
// printf, and stop using snprintf here.
|
||||
char Buffer[32];
|
||||
#if SANITIZER_WINDOWS
|
||||
sprintf_s(Buffer, sizeof(Buffer), "%Lg", (long double)A.Float);
|
||||
#else
|
||||
snprintf(Buffer, sizeof(Buffer), "%Lg", (long double)A.Float);
|
||||
#endif
|
||||
Printf("%s", Buffer);
|
||||
break;
|
||||
}
|
||||
|
@ -64,11 +64,22 @@ void InitializeFlags() {
|
||||
|
||||
} // namespace __ubsan
|
||||
|
||||
#if !SANITIZER_SUPPORTS_WEAK_HOOKS
|
||||
extern "C" {
|
||||
|
||||
#if !SANITIZER_SUPPORTS_WEAK_HOOKS
|
||||
SANITIZER_INTERFACE_ATTRIBUTE SANITIZER_WEAK_ATTRIBUTE
|
||||
const char *__ubsan_default_options() { return ""; }
|
||||
} // extern "C"
|
||||
#endif
|
||||
|
||||
#if SANITIZER_WINDOWS
|
||||
const char *__ubsan_default_default_options() { return ""; }
|
||||
# ifdef _WIN64
|
||||
# pragma comment(linker, "/alternatename:__ubsan_default_options=__ubsan_default_default_options")
|
||||
# else
|
||||
# pragma comment(linker, "/alternatename:___ubsan_default_options=___ubsan_default_default_options")
|
||||
# endif
|
||||
#endif
|
||||
|
||||
} // extern "C"
|
||||
|
||||
#endif // CAN_SANITIZE_UB
|
||||
|
@ -18,6 +18,8 @@
|
||||
(defined(__x86_64__) || defined(__i386__) || defined(__arm__) || \
|
||||
defined(__aarch64__) || defined(__mips__) || defined(__powerpc64__))
|
||||
# define CAN_SANITIZE_UB 1
|
||||
#elif defined(_WIN32)
|
||||
# define CAN_SANITIZE_UB 1
|
||||
#else
|
||||
# define CAN_SANITIZE_UB 0
|
||||
#endif
|
||||
|
Loading…
Reference in New Issue
Block a user