diff options
| author | Kamil Rytarowski <n54@gmx.com> | 2018-06-05 07:29:23 +0000 |
|---|---|---|
| committer | Kamil Rytarowski <n54@gmx.com> | 2018-06-05 07:29:23 +0000 |
| commit | 7d260775f34f215b873f8b6c0528d0edc8d3ea0a (patch) | |
| tree | 7614e1fe33b2a869e84bd7918d31a03e07b7f547 /llvm/lib/Target/XCore/XCoreMachineFunctionInfo.h | |
| parent | f17b33d6c6678bf2aad114b046b227c3ceaa500e (diff) | |
| download | bcm5719-llvm-7d260775f34f215b873f8b6c0528d0edc8d3ea0a.tar.gz bcm5719-llvm-7d260775f34f215b873f8b6c0528d0edc8d3ea0a.zip | |
Introduce CheckASLR() in sanitizers
Summary:
At least the ASan, MSan, TSan sanitizers require disabled ASLR on a NetBSD.
Introduce a generic CheckASLR() routine, that implements a check for the
current process. This flag depends on the global or per-process settings.
There is no simple way to disable ASLR in the build process from the
level of a sanitizer or during the runtime execution.
With ASLR enabled sanitizers that operate over the process virtual address
space can misbehave usually breaking with cryptic messages.
This check is dummy for !NetBSD.
Sponsored by <The NetBSD Foundation>
Reviewers: vitalybuka, joerg
Reviewed By: vitalybuka
Subscribers: cryptoad, kubamracek, llvm-commits, #sanitizers
Tags: #sanitizers
Differential Revision: https://reviews.llvm.org/D47442
llvm-svn: 333985
Diffstat (limited to 'llvm/lib/Target/XCore/XCoreMachineFunctionInfo.h')
0 files changed, 0 insertions, 0 deletions

