<feed xmlns='http://www.w3.org/2005/Atom'>
<title>bcm5719-llvm/compiler-rt/lib/asan, branch meklort-10.0.1</title>
<subtitle>Project Ortega BCM5719 LLVM</subtitle>
<id>https://git.raptorcs.com/git/bcm5719-llvm/atom?h=meklort-10.0.1</id>
<link rel='self' href='https://git.raptorcs.com/git/bcm5719-llvm/atom?h=meklort-10.0.1'/>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bcm5719-llvm/'/>
<updated>2019-11-04T19:55:51+00:00</updated>
<entry>
<title>Remove unused variables, as suggested by @mcgov.</title>
<updated>2019-11-04T19:55:51+00:00</updated>
<author>
<name>Alexandre Ganea</name>
<email>alexandre.ganea@ubisoft.com</email>
</author>
<published>2019-11-04T19:55:51+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bcm5719-llvm/commit/?id=efad56b2be9b9f7d5b62d1f06541192fa6b537ee'/>
<id>urn:sha1:efad56b2be9b9f7d5b62d1f06541192fa6b537ee</id>
<content type='text'>
Fixes warning: unused variable 'XXX' [-Wunused-const-variable]
</content>
</entry>
<entry>
<title>[asan] Fix lint failure in asan_interface.h</title>
<updated>2019-10-31T20:58:55+00:00</updated>
<author>
<name>Evgenii Stepanov</name>
<email>eugenis@google.com</email>
</author>
<published>2019-10-31T20:58:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bcm5719-llvm/commit/?id=cd751bcd5206b9fb3d9a46802294ffcbfb80661f'/>
<id>urn:sha1:cd751bcd5206b9fb3d9a46802294ffcbfb80661f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>[asan] Provide an interface to update an allocation stack trace.</title>
<updated>2019-10-31T20:54:46+00:00</updated>
<author>
<name>Evgenii Stepanov</name>
<email>eugenis@google.com</email>
</author>
<published>2019-10-19T00:17:48+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bcm5719-llvm/commit/?id=13e04607f75bdf0e4de08b6f240501c15e8891f1'/>
<id>urn:sha1:13e04607f75bdf0e4de08b6f240501c15e8891f1</id>
<content type='text'>
Summary:
Sometimes an allocation stack trace is not very informative. Provide a
way to replace it with a stack trace of the user's choice.

Reviewers: pcc, kcc

Subscribers: #sanitizers, llvm-commits

Tags: #sanitizers, #llvm

Differential Revision: https://reviews.llvm.org/D69208
</content>
</entry>
<entry>
<title>[sanitizer_common] Create max_allocation_size_mb flag.</title>
<updated>2019-10-30T18:26:05+00:00</updated>
<author>
<name>Matt Morehouse</name>
<email>mascasa@google.com</email>
</author>
<published>2019-10-30T18:17:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bcm5719-llvm/commit/?id=7904bd9409b86afbec763d0d95cb75ccef559379'/>
<id>urn:sha1:7904bd9409b86afbec763d0d95cb75ccef559379</id>
<content type='text'>
Summary:
The flag allows the user to specify a maximum allocation size that the
sanitizers will honor.  Any larger allocations will return nullptr or
crash depending on allocator_may_return_null.

Reviewers: kcc, eugenis

Reviewed By: kcc, eugenis

Subscribers: #sanitizers, llvm-commits

Tags: #sanitizers, #llvm

Differential Revision: https://reviews.llvm.org/D69576
</content>
</entry>
<entry>
<title>Reland "[ASan] Do not misrepresent high value address dereferences as null dereferences"</title>
<updated>2019-10-10T17:19:58+00:00</updated>
<author>
<name>Julian Lettner</name>
<email>jlettner@apple.com</email>
</author>
<published>2019-10-10T17:19:58+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bcm5719-llvm/commit/?id=99c9d7bd6369a7505b86d7ea75a573265436e34a'/>
<id>urn:sha1:99c9d7bd6369a7505b86d7ea75a573265436e34a</id>
<content type='text'>
Updated: Removed offending TODO comment.

Dereferences with addresses above the 48-bit hardware addressable range
produce "invalid instruction" (instead of "invalid access") hardware
exceptions (there is no hardware address decoding logic for those bits),
and the address provided by this exception is the address of the
instruction (not the faulting address).  The kernel maps the "invalid
instruction" to SEGV, but fails to provide the real fault address.

Because of this ASan lies and says that those cases are null
dereferences.  This downgrades the severity of a found bug in terms of
security.  In the ASan signal handler, we can not provide the real
faulting address, but at least we can try not to lie.

rdar://50366151

Reviewed By: vitalybuka

Differential Revision: https://reviews.llvm.org/D68676

&gt; llvm-svn: 374265

llvm-svn: 374384
</content>
</entry>
<entry>
<title>Revert "[ASan] Do not misrepresent high value address dereferences as null dereferences"</title>
<updated>2019-10-10T10:56:52+00:00</updated>
<author>
<name>Russell Gallop</name>
<email>russell.gallop@gmail.com</email>
</author>
<published>2019-10-10T10:56:52+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bcm5719-llvm/commit/?id=c48e0873af43eb245cdcca7b9822d2ff8646231c'/>
<id>urn:sha1:c48e0873af43eb245cdcca7b9822d2ff8646231c</id>
<content type='text'>
As it was breaking bots running sanitizer lint check

This reverts r374265 (git b577efe4567f1f6a711ad36e1d17280dd1c4f009)

llvm-svn: 374308
</content>
</entry>
<entry>
<title>[ASan] Do not misrepresent high value address dereferences as null dereferences</title>
<updated>2019-10-10T00:33:04+00:00</updated>
<author>
<name>Julian Lettner</name>
<email>jlettner@apple.com</email>
</author>
<published>2019-10-10T00:33:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bcm5719-llvm/commit/?id=b577efe4567f1f6a711ad36e1d17280dd1c4f009'/>
<id>urn:sha1:b577efe4567f1f6a711ad36e1d17280dd1c4f009</id>
<content type='text'>
Dereferences with addresses above the 48-bit hardware addressable range
produce "invalid instruction" (instead of "invalid access") hardware
exceptions (there is no hardware address decoding logic for those bits),
and the address provided by this exception is the address of the
instruction (not the faulting address).  The kernel maps the "invalid
instruction" to SEGV, but fails to provide the real fault address.

Because of this ASan lies and says that those cases are null
dereferences.  This downgrades the severity of a found bug in terms of
security.  In the ASan signal handler, we can not provide the real
faulting address, but at least we can try not to lie.

rdar://50366151

Reviewed By: vitalybuka

Differential Revision: https://reviews.llvm.org/D68676

llvm-svn: 374265
</content>
</entry>
<entry>
<title>[compiler-rt] Use GetNextInstructionPc in signal handlers</title>
<updated>2019-10-02T21:20:37+00:00</updated>
<author>
<name>Vitaly Buka</name>
<email>vitalybuka@google.com</email>
</author>
<published>2019-10-02T21:20:37+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bcm5719-llvm/commit/?id=d39e7e2cf156f5f444637fb3d26e98d33b1bfc19'/>
<id>urn:sha1:d39e7e2cf156f5f444637fb3d26e98d33b1bfc19</id>
<content type='text'>
Summary:
All other stack trace callers assume that PC contains return address.
HWAsan already use GetNextInstructionPc in similar code.

PR43339

Reviewers: eugenis, kcc, jfb

Subscribers: dexonsmith, dberris, #sanitizers, llvm-commits

Tags: #sanitizers, #llvm

Differential Revision: https://reviews.llvm.org/D68313

llvm-svn: 373529
</content>
</entry>
<entry>
<title>[compiler-rt] Fix lint check failure on comments</title>
<updated>2019-09-22T15:31:03+00:00</updated>
<author>
<name>Jinsong Ji</name>
<email>jji@us.ibm.com</email>
</author>
<published>2019-09-22T15:31:03+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bcm5719-llvm/commit/?id=e2af0e5ee830693fee0ddf609885508df1e06f45'/>
<id>urn:sha1:e2af0e5ee830693fee0ddf609885508df1e06f45</id>
<content type='text'>
This fixes buildbot failures for https://reviews.llvm.org/rL372459.
(at least on PowerPC/Z )

The fix is generated by running clang-format on the error lines only.

llvm-svn: 372511
</content>
</entry>
<entry>
<title>Add __lsan::ScopedInterceptorDisabler for strerror(3)</title>
<updated>2019-09-21T07:45:02+00:00</updated>
<author>
<name>Kamil Rytarowski</name>
<email>n54@gmx.com</email>
</author>
<published>2019-09-21T07:45:02+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/bcm5719-llvm/commit/?id=1b58389428ed07a7322ba9c2bcaeec99807f9457'/>
<id>urn:sha1:1b58389428ed07a7322ba9c2bcaeec99807f9457</id>
<content type='text'>
Summary:
strerror(3) on NetBSD uses internally TSD with a destructor that is never
fired for exit(3). It's correctly called for pthread_exit(3) scenarios.

This is a case when a leak on exit(3) is expected, unavoidable and harmless.

Reviewers: joerg, vitalybuka, dvyukov, mgorny

Reviewed By: vitalybuka

Subscribers: dmgreen, kristof.beyls, jfb, llvm-commits, #sanitizers

Tags: #sanitizers, #llvm

Differential Revision: https://reviews.llvm.org/D67337

llvm-svn: 372461
</content>
</entry>
</feed>
