Add support for __sanitizer_cov_trace_pc to sancov.py
authorDmitriy Nikiforov <d.nikiforov@partner.samsung.com>
Thu, 8 Jun 2017 12:07:26 +0000 (15:07 +0300)
committerMaria Guseva <m.guseva@samsung.com>
Tue, 11 Jul 2017 02:46:03 +0000 (11:46 +0900)
scripts/sancov.py

index e2eba36a802fff1797c03709ddf6694109aba417..d1180fb7b75ecdbb126c49782491ba625d4a7d75 100755 (executable)
@@ -190,11 +190,11 @@ def RawUnpack(files):
 
 def GetInstrumentedPCs(binary):
   # This looks scary, but all it does is extract all offsets where we call:
-  # - __sanitizer_cov() or __sanitizer_cov_with_check(),
+  # - __sanitizer_cov(), __sanitizer_cov_with_check() or __sanitizer_cov_trace_pc(),
   # - with call or callq,
   # - directly or via PLT.
   cmd = "objdump -d %s | " \
-        "grep '^\s\+[0-9a-f]\+:.*\scall\(q\|\)\s\+[0-9a-f]\+ <__sanitizer_cov\(_with_check\|\)\(@plt\|\)>' | " \
+        "grep '^\s\+[0-9a-f]\+:.*\scall\(q\|\)\s\+[0-9a-f]\+ <__sanitizer_cov\(_with_check\|\)\(_trace_pc\|\)\(@plt\|\)>' | " \
         "grep '^\s\+[0-9a-f]\+' -o" % binary
   proc = subprocess.Popen(cmd, stdin=subprocess.PIPE, stdout=subprocess.PIPE,
                           shell=True)