| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
|
|
| |
triggering a buffer overflow in strlen and memcpy.
This change fixes printf-2.c and printf-4.c under OSX.
llvm-svn: 200756
|
|
|
|
|
|
| |
memcpy (which triggers the error report before printf does).
llvm-svn: 200751
|
|
|
|
| |
llvm-svn: 200700
|
|
|
|
| |
llvm-svn: 200698
|
|
|
|
|
|
|
| |
This is covered by AddressSanitizer.UAF_* tests in asan_test
with start_deactivated=1.
llvm-svn: 200696
|
|
|
|
| |
llvm-svn: 200686
|
|
|
|
|
|
| |
-fno-function-sections is broken in Clang.
llvm-svn: 200684
|
|
|
|
|
|
|
| |
It breaks when a binary is linked with --gc-sections: parts of sanitizer
interface get thrown away and inaccessible from dlopen-ed libs.
llvm-svn: 200683
|
|
|
|
|
|
| |
__asan::AsanOnSIGSEGV() on Windows.
llvm-svn: 200554
|
|
|
|
|
|
|
|
| |
code stripping on Linux.
See https://code.google.com/p/address-sanitizer/issues/detail?id=260 for more info.
llvm-svn: 200553
|
|
|
|
| |
llvm-svn: 200550
|
|
|
|
|
|
|
| |
This change is a part of refactoring intended to have common signal handling behavior in all tools.
This particular CL moves InstallSignalHandlers() into sanitizer_common (making it InstallDeadlySignalHandlers()), but doesn't enable default signal handlers for any tool other than ASan.
llvm-svn: 200542
|
|
|
|
| |
llvm-svn: 200537
|
|
|
|
| |
llvm-svn: 200485
|
|
|
|
| |
llvm-svn: 200474
|
|
|
|
|
|
| |
https://code.google.com/p/address-sanitizer/issues/detail?id=259
llvm-svn: 200468
|
|
|
|
|
|
| |
__attribute__((tls_model(initial-exec))))
llvm-svn: 200463
|
|
|
|
|
|
| |
causes trouble; few more debugging
llvm-svn: 200462
|
|
|
|
| |
llvm-svn: 200387
|
|
|
|
|
|
| |
interesting, actual usage will come later. See https://groups.google.com/forum/#!topic/address-sanitizer/BfwYD8HMxTM for background
llvm-svn: 200384
|
|
|
|
| |
llvm-svn: 200382
|
|
|
|
|
|
| |
handling and thus should not be moved to common.
llvm-svn: 200319
|
|
|
|
| |
llvm-svn: 200312
|
|
|
|
|
|
|
| |
This change is a part of refactoring intended to have common signal handling behavior in all tools.
Note that this particular change doesn't enable use_sigaltstack support in every tool.
llvm-svn: 200310
|
|
|
|
|
|
| |
This change is a part of refactoring intended to have common signal handling behavior in all tools.
llvm-svn: 200295
|
|
|
|
| |
llvm-svn: 200199
|
|
|
|
| |
llvm-svn: 200009
|
|
|
|
|
|
| |
actually written symbols from real snprintf call.
llvm-svn: 199899
|
|
|
|
| |
llvm-svn: 199888
|
|
|
|
|
|
| |
This change duplicates all ASan output to system log on Android.
llvm-svn: 199887
|
|
|
|
| |
llvm-svn: 199878
|
|
|
|
| |
llvm-svn: 199877
|
|
|
|
|
|
|
|
|
|
|
| |
New/delete implementations in system libraries almost always are built without
frame pointers. As we switched to frame pointer based unwinder on ARM, they no
longer work for us, resulting in broken allocation/deallocation stacks.
Note that this does not work with statically linked
libstdc++/libc++/libstlport.
llvm-svn: 199872
|
|
|
|
|
|
|
|
| |
implement correct atomic load/store for ARM
add test for atomic load/store
http://llvm-reviews.chandlerc.com/D2582
llvm-svn: 199802
|
|
|
|
|
|
|
|
|
|
| |
Intercept and sanitize arguments passed to printf functions in ASan and TSan
(don't do this in MSan for now). The checks are controlled by runtime flag
(off by default for now).
Patch http://llvm-reviews.chandlerc.com/D2480 by Yuri Gribov!
llvm-svn: 199729
|
|
|
|
|
|
| |
https://code.google.com/p/address-sanitizer/issues/detail?id=258
llvm-svn: 199723
|
|
|
|
|
|
| |
they are too optimistic due to https://code.google.com/p/address-sanitizer/issues/detail?id=258.
llvm-svn: 199715
|
|
|
|
|
|
| |
SEGV when asan run-time is built with gcc 4.8.2 on 32-bit arch)
llvm-svn: 199544
|
|
|
|
| |
llvm-svn: 199390
|
|
|
|
| |
llvm-svn: 199380
|
|
|
|
| |
llvm-svn: 199379
|
|
|
|
|
|
|
|
|
|
|
|
| |
This change adds ASAN_OPTIONS=start_deactivated=1 flag. When present, ASan will
start in "deactivated" mode, with no heap poisoning, no quarantine, no stack
trace gathering, and minimal redzones. All this features come back when
__asan_init is called for the constructor of an instrumented library.
The primary use case for this feature is Android. Code itself is not
Android-specific, and this patch includes a Linux test for it.
llvm-svn: 199377
|
|
|
|
| |
llvm-svn: 199373
|
|
|
|
| |
llvm-svn: 199370
|
|
|
|
|
|
| |
https://code.google.com/p/address-sanitizer/issues/detail?id=257
llvm-svn: 198932
|
|
|
|
| |
llvm-svn: 198873
|
|
|
|
|
|
|
|
| |
asan_interceptors.h
Fixes https://code.google.com/p/address-sanitizer/issues/detail?id=188.
llvm-svn: 198048
|
|
|
|
|
|
| |
SANITIZER_CAN_USE_ALLOCATOR64=0). No functionality change by default is intended
llvm-svn: 198044
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Per Nick Kledzik (http://llvm.org/bugs/show_bug.cgi?id=17976):
"""
For MacOSX, the labels in __cstring section should be 'L' labels, and the labels
in the __const section should be non-L or 'l' labels. The later ('l') will cause
the linker to remove the label in the final executable.
"""
, so we need to ensure that the globals emitted by ASan have appropriate labels.
llvm-svn: 198022
|
|
|
|
|
|
|
|
| |
http://llvm.org/bugs/show_bug.cgi?id=17976
by setting the correct linkage (as stated in the bug).
llvm-svn: 198018
|