[sanitizer] Don't run malloc hooks for stacktraces
authorVitaly Buka <vitalybuka@google.com>
Sat, 9 Apr 2022 02:53:41 +0000 (19:53 -0700)
committerVitaly Buka <vitalybuka@google.com>
Wed, 13 Apr 2022 18:44:38 +0000 (11:44 -0700)
commit6345d7f2a829faea56ad522a7d5180043f862a5c
tree652440fb0714c54766524c9782fea8d382fae6c5
parenta3b73b60be4467d2194d3c95e7b943f1644cf92b
[sanitizer] Don't run malloc hooks for stacktraces

Usually when we generated stacktraces the process is in error state, so
running hooks may crash the process and prevent meaningfull error report.

Symbolizer, unwinder and pthread are potential source of mallocs.

https://b.corp.google.com/issues/228110771

Reviewed By: kda

Differential Revision: https://reviews.llvm.org/D123566
compiler-rt/lib/msan/msan_allocator.cpp
compiler-rt/lib/sanitizer_common/sanitizer_common.cpp
compiler-rt/lib/sanitizer_common/sanitizer_common.h
compiler-rt/lib/sanitizer_common/sanitizer_fuchsia.cpp
compiler-rt/lib/sanitizer_common/sanitizer_linux_libcdep.cpp
compiler-rt/lib/sanitizer_common/sanitizer_mac.cpp
compiler-rt/lib/sanitizer_common/sanitizer_symbolizer.h
compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_markup.cpp
compiler-rt/lib/sanitizer_common/sanitizer_unwind_linux_libcdep.cpp
compiler-rt/test/sanitizer_common/TestCases/malloc_hook_skip.cpp [new file with mode: 0644]