| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
to reflect the new license.
We understand that people may be surprised that we're moving the header
entirely to discuss the new license. We checked this carefully with the
Foundation's lawyer and we believe this is the correct approach.
Essentially, all code in the project is now made available by the LLVM
project under our new license, so you will see that the license headers
include that license only. Some of our contributors have contributed
code under our old license, and accordingly, we have retained a copy of
our old license notice in the top-level files in each project and
repository.
llvm-svn: 351636
|
|
|
|
|
|
|
| |
These functions are always used to initialize singleton flags(), as
well as other global data (common_flags()).
llvm-svn: 228894
|
|
|
|
|
|
|
| |
The new parser is a lot stricter about syntax, reports unrecognized
flags, and will make it easier to implemented some of the planned features.
llvm-svn: 226169
|
|
|
|
|
|
|
|
|
|
|
| |
This mirrors r225239 to all the rest sanitizers:
ASan, DFSan, LSan, MSan, TSan, UBSan.
Now the runtime flag type, name, default value and
description is located in the single place in the
.inc file.
llvm-svn: 225327
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
ASan flag
As mentioned in
https://code.google.com/p/address-sanitizer/issues/detail?id=365, when the
re-exec that adds the required DYLD_INSERT_LIBRARIES variable fails, ASan
currently continues to run, but things are broken (some memory can be
overwritten, interceptors don't work, ...). This patch aborts if the execv()
fails and prints an error message that DYLD_INSERT_LIBRARIES is required. It
also removes the "alllow_reexec" flag, since using it causes the same issues.
Reviewed at http://reviews.llvm.org/D6752
llvm-svn: 224712
|
|
|
|
| |
llvm-svn: 224450
|
|
|
|
|
|
|
|
| |
instruction upon SIGSEGV
When dump_instruction_bytes=1 and the instruction pointer doesn't point to the zero page, ASan prints 16 bytes starting at the instruction point.
llvm-svn: 218243
|
|
|
|
| |
llvm-svn: 215479
|
|
|
|
|
|
| |
PR19838 (Left OOB accesses on new[]-allocated arrays with array cookies are not detected). No tests yet. They will follow once I commit the clang part.
llvm-svn: 214711
|
|
|
|
|
|
| |
the report more verbose
llvm-svn: 214299
|
|
|
|
|
|
| |
-Xclang -fsized-deallocation). Not yet on Mac. Also, remove some unused code.
llvm-svn: 214296
|
|
|
|
|
|
| |
The implementation lives in sanitizer_common and will need to access that flag.
llvm-svn: 208566
|
|
|
|
|
|
| |
=1 detects only those where the variable sizes are different. BTW, the detector seems to be working well and finding nice bugs. Early adopters are welcome.
llvm-svn: 207415
|
|
|
|
|
|
| |
outside of a tiny test, may need tuning.
llvm-svn: 207210
|
|
|
|
| |
llvm-svn: 206753
|
|
|
|
| |
llvm-svn: 204440
|
|
|
|
|
|
| |
when two unrelated pointers are compared or subtracted). This implementation has both false positives and false negatives and is not tuned for performance. A bug report for a proper implementation will follow.
llvm-svn: 202389
|
|
|
|
|
|
| |
This change is a part of refactoring intended to have common signal handling behavior in all tools.
llvm-svn: 200295
|
|
|
|
|
|
|
|
|
|
|
|
| |
This change adds ASAN_OPTIONS=start_deactivated=1 flag. When present, ASan will
start in "deactivated" mode, with no heap poisoning, no quarantine, no stack
trace gathering, and minimal redzones. All this features come back when
__asan_init is called for the constructor of an instrumented library.
The primary use case for this feature is Android. Code itself is not
Android-specific, and this patch includes a Linux test for it.
llvm-svn: 199377
|
|
|
|
| |
llvm-svn: 198873
|
|
|
|
|
|
| |
min_uar_stack_size_log/max_uar_stack_size_log
llvm-svn: 197370
|
|
|
|
|
|
| |
uar_noreserve=1 will save some memory but also negatively affect performance
llvm-svn: 197233
|
|
|
|
|
|
|
|
| |
I still don't know what is causing our bootstrapped LTO buildbots to fail,
but llvm r194701 seems to be OK and I can't imagine that these changes could
cause the problem.
llvm-svn: 194790
|
|
|
|
|
|
|
|
|
| |
Apple's bootstrapped LTO builds have been failing, and these changes (along
with llvm 194701) are the only things on the blamelist. I will either reapply
these changes or help debug the problem, depending on whether this fixes the
buildbots.
llvm-svn: 194779
|
|
|
|
| |
llvm-svn: 194702
|
|
|
|
| |
llvm-svn: 193868
|
|
|
|
| |
llvm-svn: 192793
|
|
|
|
| |
llvm-svn: 192701
|
|
|
|
|
|
| |
FakeStack; don't crash when the fake stack is exhausted, move some code to .cc file
llvm-svn: 191510
|
|
|
|
|
|
| |
output for fake stack
llvm-svn: 190932
|
|
|
|
|
|
| |
Also move detect_leaks to common flags.
llvm-svn: 186821
|
|
|
|
| |
llvm-svn: 184836
|
|
|
|
| |
llvm-svn: 182384
|
|
|
|
|
|
|
| |
Some flags that are common to ASan/MSan/TSan/LSan have been moved to
sanitizer_common.
llvm-svn: 181193
|
|
|
|
|
|
| |
installed by ASan
llvm-svn: 180255
|
|
|
|
|
|
|
|
|
|
| |
This change adds ASan runtime option "strict-init-order" (off by default)
that makes init-order checker bark if global initializer accesses any global from different
translation unit (even if the latter is already initialized). strict init-order checking
doesn't play well with, e.g. LLVM registration machineries, and causes issue
https://code.google.com/p/address-sanitizer/issues/detail?id=178.
llvm-svn: 179843
|
|
|
|
| |
llvm-svn: 179307
|
|
|
|
| |
llvm-svn: 178758
|
|
|
|
|
|
| |
max_malloc_fill_size and malloc_fill_byte
llvm-svn: 178757
|
|
|
|
|
|
|
|
|
| |
of accessibility checks in memcmp.
1: memcmp(p1, p2, n) always checks n bytes
0: memcmp checks up to n bytes depending on whether the memory contents differ.
llvm-svn: 176256
|
|
|
|
|
|
| |
providing ASAN_DEFAULT_OPTIONS macro
llvm-svn: 175512
|
|
|
|
|
|
| |
See https://code.google.com/p/address-sanitizer/issues/detail?id=10 for the context.
llvm-svn: 174629
|
|
|
|
|
|
| |
And make msan_interface.h C-compatible.
llvm-svn: 173928
|
|
|
|
|
|
| |
(1)
llvm-svn: 173671
|
|
|
|
|
|
| |
traces instead of storing them in the redzones
llvm-svn: 171099
|
|
|
|
|
|
| |
finds malloc/delete, new/free, new/delete[], etc mismatches
llvm-svn: 170869
|
|
|
|
|
|
| |
implemenet malloc_stats() on Linux
llvm-svn: 170685
|
|
|
|
|
|
| |
allow using the slow CFI-based unwinder
llvm-svn: 170117
|
|
|
|
|
|
| |
file PATH.PID instead of stderr
llvm-svn: 163872
|
|
|
|
|
|
| |
prints all full thread creation paths for threads involved in ASan error report
llvm-svn: 163200
|