| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Summary:
This is required for linking DLLs with large functions exceeding
san-instrumentation-with-call-threshold. One such function is
vp9_fdct16x16_sse2 in libvpx.
Reviewers: timurrrr
Subscribers: llvm-commits
Differential Revision: http://reviews.llvm.org/D4758
llvm-svn: 214532
|
|
|
|
|
|
| |
Patch by Yuri Gorshenin.
llvm-svn: 214396
|
|
|
|
|
|
| |
the report more verbose
llvm-svn: 214299
|
|
|
|
|
|
| |
-Xclang -fsized-deallocation). Not yet on Mac. Also, remove some unused code.
llvm-svn: 214296
|
|
|
|
|
|
|
|
|
|
|
| |
Get rid of Symbolizer::Init(path_to_external) in favor of
thread-safe Symbolizer::GetOrInit(), and use the latter version
everywhere. Implicitly depend on the value of external_symbolizer_path
runtime flag instead of passing it around manually.
No functionality change.
llvm-svn: 214005
|
|
|
|
|
|
|
|
|
|
| |
across sanitizers.
Get rid of ASAN_USE_PREINIT_ARRAY and LSAN_USE_PREINIT_ARRAY - just always
use .preinit_array if it's available. This mode seems stable enough, and
we've been relying on default values of these macro for a long time.
llvm-svn: 213980
|
|
|
|
|
|
|
|
| |
initialization takes place on FreeBSD
Differential Revision: http://reviews.llvm.org/D4496
llvm-svn: 213941
|
|
|
|
| |
llvm-svn: 213656
|
|
|
|
| |
llvm-svn: 213654
|
|
|
|
|
|
| |
Also add a longjmp() test
llvm-svn: 213649
|
|
|
|
| |
llvm-svn: 213583
|
|
|
|
|
|
| |
Differential Revision: http://reviews.llvm.org/D4560
llvm-svn: 213370
|
|
|
|
| |
llvm-svn: 213264
|
|
|
|
|
|
|
|
| |
Format of __libc_malloc_dispatch has changed in Android L.
While we are moving towards a solution that does not depend on bionic
internals, here is something to support both K* and L releases.
llvm-svn: 213263
|
|
|
|
|
|
|
|
|
|
| |
debugging API
Refactoring the DescribeAddressIfStack function in asan_report.cc to be able to reuse it for http://reviews.llvm.org/D4527.
Reviewed at http://reviews.llvm.org/D4545.
llvm-svn: 213215
|
|
|
|
|
|
| |
scripts that import asan_symbolize to symbolize their reports line by line.
llvm-svn: 213136
|
|
|
|
|
|
|
|
| |
memory mapping info
Reviewed at http://reviews.llvm.org/D4466
llvm-svn: 213080
|
|
|
|
|
|
|
|
|
|
| |
declaration back to asan_interface_internal.h
This fixes the issues we've uncovered after landing r212815.
Reviewed at http://reviews.llvm.org/D4500
llvm-svn: 213053
|
|
|
|
|
|
| |
Demangle names of involved globals. Print a more consistent summary line.
llvm-svn: 212857
|
|
|
|
| |
llvm-svn: 212823
|
|
|
|
|
|
|
|
| |
This fixes '___asan_init_v4 already defined' errors when linking some of Chromium DLLs.
Looks like one of the DLL is using a .lib produced while linking another DLL and it exploded after r212699.
I'm trying to come up with a small testcase...
llvm-svn: 212815
|
|
|
|
| |
llvm-svn: 212809
|
|
|
|
|
|
| |
Reviewed at http://reviews.llvm.org/D4471
llvm-svn: 212807
|
|
|
|
|
|
| |
Reviewed at http://reviews.llvm.org/D4459
llvm-svn: 212699
|
|
|
|
|
|
|
|
| |
interceptors.
Patch by Kuba Brecka!
llvm-svn: 212664
|
|
|
|
| |
llvm-svn: 212471
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Introduce new public header <sanitizer/allocator_interface.h> and a set
of functions __sanitizer_get_ownership(), __sanitizer_malloc_hook() etc.
that will eventually replace their tool-specific equivalents
(__asan_get_ownership(), __msan_get_ownership() etc.). Tool-specific
functions are now deprecated and implemented as stubs redirecting
to __sanitizer_ versions (which are implemented differently in each tool).
Replace all uses of __xsan_ versions with __sanitizer_ versions in unit
and lit tests.
llvm-svn: 212469
|
|
|
|
|
|
|
|
| |
Remove helper functions that were used in assembly instrumentation.
Patch by Yuri Gorshenin.
llvm-svn: 212456
|
|
|
|
| |
llvm-svn: 212322
|
|
|
|
|
|
|
|
|
|
|
|
| |
Large part of this change is required due to
https://code.google.com/p/android/issues/detail?id=61799
dlsym() crashes when symbol resolution fails, which means
we have to limit the interceptor list instead of relying on
runtime detection.
There are minor differencies in system headers, too.
llvm-svn: 212273
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
See https://code.google.com/p/address-sanitizer/issues/detail?id=299 for the
original feature request.
Introduce llvm.asan.globals metadata, which Clang (or any other frontend)
may use to report extra information about global variables to ASan
instrumentation pass in the backend. This metadata replaces
llvm.asan.dynamically_initialized_globals that was used to detect init-order
bugs. llvm.asan.globals contains the following data for each global:
1) source location (file/line/column info);
2) whether it is dynamically initialized;
3) whether it is blacklisted (shouldn't be instrumented).
Source location data is then emitted in the binary and can be picked up
by ASan runtime in case it needs to print error report involving some global.
For example:
0x... is located 4 bytes to the right of global variable 'C::array' defined in '/path/to/file:17:8' (0x...) of size 40
These source locations are printed even if the binary doesn't have any
debug info.
This is an ABI-breaking change. ASan initialization is renamed to
__asan_init_v4(). Pre-built libraries compiled with older Clang will not work
with the fresh runtime.
llvm-svn: 212188
|
|
|
|
|
|
| |
the globals have been registered (thus show the name of shared library or exe to which the global belongs). The reports become a bit too verbose but I do not see any *simple* way to make them more compact. This should be especially helpful when the ODR happens because the same .cc file is used twice in the project in differend DSOs
llvm-svn: 211343
|
|
|
|
|
|
| |
mode
llvm-svn: 210988
|
|
|
|
|
|
|
| |
These functions are being removed from Android because they were removed
from POSIX 2004.
llvm-svn: 210962
|
|
|
|
| |
llvm-svn: 210452
|
|
|
|
|
|
|
| |
Don't fail if __libc_malloc_dispatch is missing; continue running
with normal linux interceptors instead.
llvm-svn: 210322
|
|
|
|
|
|
| |
because that may actually try to use fake_stack_ (still don't know how). Yet another case where we desperately want https://sourceware.org/glibc/wiki/ThreadPropertiesAPI
llvm-svn: 210315
|
|
|
|
|
|
| |
In standalone build asan-rt is stored in yet another path.
llvm-svn: 210259
|
|
|
|
| |
llvm-svn: 210255
|
|
|
|
| |
llvm-svn: 210216
|
|
|
|
|
|
|
|
|
|
| |
Reset coverage data on fork().
For memory-mapped mode (coverage_direct=1) this helps avoid loss of data
(before this change two processes would write to the same file simultaneously).
For normal mode, this reduces coverage dump size, because PCs from the parent
process are no longer inherited by the child.
llvm-svn: 210180
|
|
|
|
|
|
| |
https://code.google.com/p/address-sanitizer/wiki/OneDefinitionRuleViolation . This feature has been working quite well so far, found a few bugs and zero false positives. The main problem is that there could be lots of true positives and users will have to disable this checking until the bugs are fixed.
llvm-svn: 210106
|
|
|
|
|
|
| |
to avoid a null function call in cout/cerr constructors
llvm-svn: 210030
|
|
|
|
| |
llvm-svn: 210012
|
|
|
|
|
|
|
|
| |
CMake variable
Reviewed at http://reviews.llvm.org/D3952
llvm-svn: 209889
|
|
|
|
|
|
| |
linker optimizations
llvm-svn: 209881
|
|
|
|
|
|
| |
Patch by Peter Bergner.
llvm-svn: 209879
|
|
|
|
|
|
|
|
| |
And fixed typos in the ASan readme.
Differential Revision: http://reviews.llvm.org/D3927
llvm-svn: 209778
|
|
|
|
|
|
|
|
| |
Windows-only tests explicitly use clang-cl.
Reviewed at http://reviews.llvm.org/D3893
llvm-svn: 209719
|
|
|
|
| |
llvm-svn: 209718
|