[asan] Avoid hooking memchr() on Windows64
authorEtienne Bergeron <etienneb@google.com>
Thu, 14 Jul 2016 22:29:22 +0000 (22:29 +0000)
committerEtienne Bergeron <etienneb@google.com>
Thu, 14 Jul 2016 22:29:22 +0000 (22:29 +0000)
commitc52ae0e8d163d83b386dece18c67d770e9385ffa
tree0050e5b04cb7280a245422db7ca573cd4d69d6a0
parent4e0ff9c46b13bc89b00c1e8d3886c7bdd792d3a0
[asan] Avoid hooking memchr() on Windows64

There is not enough padding in front of memchr(), and, the first 6 bytes
contains a branch instruction. Basically the current interception will
not work on memchr().

It was disabled before, but was missing the part to disable it for
INTERCEPT_LIBRARY_FUNCTION.

Patch by Wei Wang

Differential Revision: https://reviews.llvm.org/D22371

llvm-svn: 275494
compiler-rt/lib/asan/asan_win_dll_thunk.cc
compiler-rt/lib/sanitizer_common/sanitizer_platform_interceptors.h