diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-21 11:54:28 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-21 11:54:28 +0000 |
commit | e6918187568dbd01842d8d1d2c808ce16a894239 (patch) | |
tree | 64f88b554b444a49f656b6c656111a145cbbaa28 /src/crimson/osd/lsan_suppressions.cc | |
parent | Initial commit. (diff) | |
download | ceph-e6918187568dbd01842d8d1d2c808ce16a894239.tar.xz ceph-e6918187568dbd01842d8d1d2c808ce16a894239.zip |
Adding upstream version 18.2.2.upstream/18.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/crimson/osd/lsan_suppressions.cc')
-rw-r--r-- | src/crimson/osd/lsan_suppressions.cc | 20 |
1 files changed, 20 insertions, 0 deletions
diff --git a/src/crimson/osd/lsan_suppressions.cc b/src/crimson/osd/lsan_suppressions.cc new file mode 100644 index 000000000..53b7eb630 --- /dev/null +++ b/src/crimson/osd/lsan_suppressions.cc @@ -0,0 +1,20 @@ +#ifndef _NDEBUG +// The callbacks we define here will be called from the sanitizer runtime, but +// aren't referenced from the Chrome executable. We must ensure that those +// callbacks are not sanitizer-instrumented, and that they aren't stripped by +// the linker. +#define SANITIZER_HOOK_ATTRIBUTE \ + extern "C" \ + __attribute__((no_sanitize("address", "thread", "undefined"))) \ + __attribute__((visibility("default"))) \ + __attribute__((used)) + +static char kLSanDefaultSuppressions[] = + "leak:InitModule\n" + "leak:MallocExtension::Initialize\n" + "leak:MallocExtension::Register\n"; + +SANITIZER_HOOK_ATTRIBUTE const char *__lsan_default_suppressions() { + return kLSanDefaultSuppressions; +} +#endif // ! _NDEBUG |