From fe7f65b081d5d0b32270cb1a82e2ee9a0391a6d1 Mon Sep 17 00:00:00 2001 From: Russell Gallop Date: Thu, 10 Oct 2019 10:56:52 +0000 Subject: Revert "[ASan] Do not misrepresent high value address dereferences as null dereferences" As it was breaking bots running sanitizer lint check This reverts r374265 (git b577efe4567f1f6a711ad36e1d17280dd1c4f009) git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@374308 91177308-0d34-0410-b5e6-96231b3b80d8 --- lib/sanitizer_common/sanitizer_win.cpp | 5 ----- 1 file changed, 5 deletions(-) (limited to 'lib/sanitizer_common/sanitizer_win.cpp') diff --git a/lib/sanitizer_common/sanitizer_win.cpp b/lib/sanitizer_common/sanitizer_win.cpp index 95e788217..ce2a4314a 100644 --- a/lib/sanitizer_common/sanitizer_win.cpp +++ b/lib/sanitizer_common/sanitizer_win.cpp @@ -945,11 +945,6 @@ bool SignalContext::IsMemoryAccess() const { return GetWriteFlag() != SignalContext::UNKNOWN; } -bool SignalContext::IsTrueFaultingAddress() const { - // TODO: Provide real implementation for this. See Linux and Mac variants. - return IsMemoryAccess(); -} - SignalContext::WriteFlag SignalContext::GetWriteFlag() const { EXCEPTION_RECORD *exception_record = (EXCEPTION_RECORD *)siginfo; // The contents of this array are documented at -- cgit v1.2.1