summaryrefslogtreecommitdiffstats
path: root/compiler-rt/lib/asan/output_tests
Commit message (Collapse)AuthorAgeFilesLines
* [ASan] Nuke output_tests/ in favor of lit_tests/. Stop using Makefile.old.Alexey Samsonov2012-09-0621-604/+0
| | | | llvm-svn: 163294
* Relocate the external headers provided by ASan and the common sanitizerChandler Carruth2012-08-291-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | library. These headers are intended to be available to user code when built with AddressSanitizer (or one of the other sanitizer's in the future) to interface with the runtime library. As such, they form stable external C interfaces, and the headers shouldn't be located within the implementation. I've pulled them out into what seem like fairly obvious locations and names, but I'm wide open to further bikeshedding of these names and locations. I've updated the code and the build system to cope with the new locations, both CMake and Makefile. Please let me know if this breaks anyone's build. The eventual goal is to install these headers along side the Clang builtin headers when we build the ASan runtime and install it. My current thinking is to locate them at: <prefix>/lib/clang/X.Y/include/sanitizer/common_interface_defs.h <prefix>/lib/clang/X.Y/include/sanitizer/asan_interface.h <prefix>/lib/clang/X.Y/include/sanitizer/... But maybe others have different suggestions? Fixing the style of the #include between these headers at least unblocks experimentation with installing them as they now should work when installed in these locations. llvm-svn: 162822
* [ASan] get rid of ASAN_USE_EXTERNAL_SYMBOLIZER compiler def in favor of ↵Alexey Samsonov2012-08-221-1/+1
| | | | | | __asan_set_symbolize_callback interface function. Now the user doesn't have to recompile ASan runtime to provide its own symbolizer llvm-svn: 162358
* Check for filenames and numbers to detect possible problems with ↵Alexander Potapenko2012-08-151-0/+4
| | | | | | asan_symbolize.py on -fPIE binaries. llvm-svn: 161948
* [ASan] move declaration of __asan_default_options to interface headerAlexey Samsonov2012-08-151-1/+1
| | | | llvm-svn: 161932
* [ASan] share code executed at the beginning/end of printing error reportsAlexey Samsonov2012-08-101-1/+1
| | | | llvm-svn: 161666
* Add a test checking that all the "__asan_" interface functions are present ↵Alexander Potapenko2012-08-091-0/+13
| | | | | | | | in a binary built with -dead_strip. Fix force_interface_symbols() so that none of the interface symbols is stripped. llvm-svn: 161582
* [ASan] add new ASan option 'strip_path_prefix' to remove useless prefices ↵Alexey Samsonov2012-08-062-0/+8
| | | | | | from filenames in stack traces llvm-svn: 161321
* Make __asan_default_options a weak function that returns a const char*.Alexander Potapenko2012-07-252-0/+14
| | | | | | | | | Users may define it to override the default ASan options. This function has to be marked with __attribute__((no_address_safety_analysis)), because it is called before ASan is fully initialized. Add an output test checking the __asan_default_options functionality. llvm-svn: 160712
* [ASan] subtract one from PCs in ASan error reports (as they originally ↵Alexey Samsonov2012-07-196-11/+10
| | | | | | contain return addresses). Make output tests stricter. llvm-svn: 160508
* Fix the output tests on DarwinAlexander Potapenko2012-06-201-1/+1
| | | | llvm-svn: 158870
* Fix the wildcards for two output tests on Darwin.Alexander Potapenko2012-05-312-3/+9
| | | | | | It turns out that atos does not print the symbol names for static C++ functions correctly (one of the two leading underscores is omitted), so they remain mangled. llvm-svn: 157742
* asan/tsan: rename interceptors from __xsan_xxx to __interceptor_xxxDmitry Vyukov2012-05-282-4/+4
| | | | llvm-svn: 157569
* asan: fix testsDmitry Vyukov2012-05-253-5/+5
| | | | | | depending on -m32/-m64 addr2line says either e.g. __xsan_strnlen or just strnlen llvm-svn: 157464
* asan/tsan: weak interceptorsDmitry Vyukov2012-05-247-8/+66
| | | | | | | | | The idea isthat asan/tsan can survive if user intercepts the same functions. At the same time user has an ability to call back into asan/tsan runtime. See the following tests for examples: asan/output_tests/interception_failure_test-linux.cc asan/output_tests/interception_test-linux.cc asan/output_tests/interception_malloc_test-linux.cc llvm-svn: 157388
* [asan] minor fix: pass flag -g to output tests as a part of CXXFLAGSAlexey Samsonov2012-04-121-3/+3
| | | | llvm-svn: 154589
* [ASan] fix output tests - r154570 changed debug info for static functions ↵Alexey Samsonov2012-04-121-1/+1
| | | | | | and now they are symbolized a bit differently llvm-svn: 154581
* [asan] fix unwinding inside libc intercepors (asan issue #46)Kostya Serebryany2012-03-151-0/+2
| | | | llvm-svn: 152768
* [asan] output test for memcmpKostya Serebryany2012-03-131-0/+8
| | | | llvm-svn: 152594
* AddressSanitizer: don't use /tmp for temporary file in output tests.Alexey Samsonov2012-02-211-1/+3
| | | | llvm-svn: 151042
* AddressSanitizer: re-enable lint for output testsAlexey Samsonov2012-02-134-4/+8
| | | | llvm-svn: 150386
* AddressSanitizer: fix llvm headers in output testsAlexey Samsonov2012-02-134-4/+4
| | | | llvm-svn: 150385
* AddressSanitizer: remove match_output.py, split expected output into ↵Alexey Samsonov2012-02-1314-144/+97
| | | | | | OS-specific and OS-independent parts llvm-svn: 150384
* AddressSanitizer: Convert templates for output tests to FileCheck format and ↵Alexey Samsonov2012-02-1329-111/+119
| | | | | | move them inside sources llvm-svn: 150375
* AddressSanitizer: fix path to FileCheck in makefilesAlexey Samsonov2012-02-131-1/+1
| | | | llvm-svn: 150368
* AddressSanitizer: move output tests to a separate directoryAlexey Samsonov2012-02-1333-0/+525
llvm-svn: 150367
OpenPOWER on IntegriCloud