| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
| |
move GetRSS to sanitizer_linux_libcdep.cc (no change in the function itself)
llvm-svn: 227416
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Summary:
On Linux in some situations we can get SIGBUS instead of SIGSEGV on
stack overflow, so asan should handle SIGBUS as well as SIGSEGV.
https://code.google.com/p/address-sanitizer/issues/detail?id=369
Reviewers: samsonov, glider
Reviewed By: glider
Subscribers: glider, llvm-commits
Differential Revision: http://reviews.llvm.org/D6923
llvm-svn: 225630
|
|
|
|
| |
llvm-svn: 225336
|
|
|
|
|
|
| |
Ouch.
llvm-svn: 224819
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Summary:
The numbers in /proc/self/statm are in pages, not in fixed 4k units.
This fixes Linux/hard_rss_limit_mb_test.cc on my PowerPC64 box which
has 64k pages.
Reviewers: kcc, willschm
Reviewed By: willschm
Subscribers: llvm-commits
Differential Revision: http://reviews.llvm.org/D6717
llvm-svn: 224522
|
|
|
|
| |
llvm-svn: 224353
|
|
|
|
| |
llvm-svn: 224326
|
|
|
|
|
|
| |
GetRSS is used in Go build.
llvm-svn: 224023
|
|
|
|
| |
llvm-svn: 223730
|
|
|
|
| |
llvm-svn: 223157
|
|
|
|
|
|
| |
When SANITIZER_USES_CANONICAL_LINUX_SYSCALLS the function misses return statement.
llvm-svn: 222532
|
|
|
|
| |
llvm-svn: 221936
|
|
|
|
| |
llvm-svn: 221912
|
|
|
|
|
|
|
|
| |
analysis of sanitized systems logs.
Reviewed at http://reviews.llvm.org/D5724
llvm-svn: 221896
|
|
|
|
|
|
|
| |
Writing to system log requires libc interceptors to be initialized.
Fixes crashes with verbosity=1 on newer Android builds.
llvm-svn: 217764
|
|
|
|
|
|
| |
Differential Revision: http://reviews.llvm.org/D4229
llvm-svn: 212690
|
|
|
|
|
|
| |
freebsd does not have /proc/self/environ
llvm-svn: 211417
|
|
|
|
| |
llvm-svn: 211385
|
|
|
|
| |
llvm-svn: 209805
|
|
|
|
| |
llvm-svn: 209773
|
|
|
|
|
|
|
|
|
|
|
| |
This way does not require a __sanitizer_cov_dump() call. That's
important on Android, where apps can be killed at arbitrary time.
We write raw PCs to disk instead of module offsets; we also write
memory layout to a separate file. This increases dump size by the
factor of 2 on 64-bit systems.
llvm-svn: 209653
|
|
|
|
|
|
|
|
| |
Patch by Gideon Billings.
Differential Revision: http://reviews.llvm.org/D3903
llvm-svn: 209641
|
|
|
|
| |
llvm-svn: 209281
|
|
|
|
|
|
|
|
|
| |
For Linux/x86-64, pointers passed to internal_syscall should be casted
to uptr first. Otherwise, they won't be properly extended to 64-bit for
x32.
Patch by H.J. Lu
llvm-svn: 209278
|
|
|
|
| |
llvm-svn: 209136
|
|
|
|
|
|
|
|
|
|
|
| |
Summary:
Sandboxed code may now pass additional arguments to
__sanitizer_sandbox_on_notify() to force all coverage data to be dumped to a
single file (the default is one file per module). The user may supply a file or
socket to write to. The latter option can be used to broker out the file writing
functionality. If -1 is passed, we pre-open a file.
llvm-svn: 209121
|
|
|
|
| |
llvm-svn: 208714
|
|
|
|
|
|
| |
This should fix https://code.google.com/p/thread-sanitizer/issues/detail?id=61
llvm-svn: 208707
|
|
|
|
| |
llvm-svn: 203238
|
|
|
|
|
|
| |
Patch by Viktor Kutuzov!
llvm-svn: 203227
|
|
|
|
|
|
|
| |
__android_log_write has an implicit message length limit.
Print one line at a time.
llvm-svn: 202250
|
|
|
|
| |
llvm-svn: 201303
|
|
|
|
| |
llvm-svn: 200550
|
|
|
|
|
|
|
| |
This change is a part of refactoring intended to have common signal handling behavior in all tools.
This particular CL moves InstallSignalHandlers() into sanitizer_common (making it InstallDeadlySignalHandlers()), but doesn't enable default signal handlers for any tool other than ASan.
llvm-svn: 200542
|
|
|
|
| |
llvm-svn: 200536
|
|
|
|
|
|
|
|
|
|
|
| |
__sanitizer_kernel_* ones.
Also rename internal_sigaction() into internal_sigaction_norestorer(), as this function doesn't fully
implement the sigaction() functionality on Linux.
This change is a part of refactoring intended to have common signal handling behavior in all tools.
llvm-svn: 200535
|
|
|
|
|
|
| |
This change duplicates all ASan output to system log on Android.
llvm-svn: 199887
|
|
|
|
|
|
| |
source files.
llvm-svn: 198003
|
|
|
|
|
|
| |
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=59018)
llvm-svn: 194155
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This moves away from creating the symbolizer object and initializing the
external symbolizer as separate steps. Those steps now always take place
together.
Sanitizers with a legacy requirement to specify their own symbolizer path
should use InitSymbolizer to initialize the symbolizer with the desired
path, and GetSymbolizer to access the symbolizer. Sanitizers with no
such requirement (e.g. UBSan) can use GetOrInitSymbolizer with no need for
initialization.
The symbolizer interface has been made thread-safe (as far as I can
tell) by protecting its member functions with mutexes.
Finally, the symbolizer interface no longer relies on weak externals, the
introduction of which was probably a mistake on my part.
Differential Revision: http://llvm-reviews.chandlerc.com/D1985
llvm-svn: 193448
|
|
|
|
|
|
|
| |
Otherwise, the compiler may use memset in non-optimized builds, which is
forbidden in the nolibc part of the runtime.
llvm-svn: 193098
|
|
|
|
|
|
| |
sanitizer_platform_limits_posix.h
llvm-svn: 192695
|
|
|
|
|
|
|
| |
use them in stoptheworld
fixes applications that intercept sigaction/sigprocmask
llvm-svn: 192686
|
|
|
|
|
|
|
|
|
| |
Fixes build on clang 3.2, which doesn't support cfi_undefined. This change
doesn't seem to break the slow unwinder. Even if it does, the worst thing that
could happen is that we would not see a backtrace when a fatal error happens
under StopTheWorld.
llvm-svn: 192196
|
|
|
|
|
|
| |
by inspection.
llvm-svn: 190828
|
|
|
|
|
|
| |
Go build
llvm-svn: 190513
|
|
|
|
|
|
| |
functions. Move some code around to get rid of extra source files
llvm-svn: 190410
|
|
|
|
| |
llvm-svn: 189790
|
|
|
|
|
|
| |
Provide a generic way for the tools to generate memory profiles from contents of /proc/self/maps
llvm-svn: 189789
|
|
|
|
|
|
|
|
|
|
|
| |
Add a wrapper for the clone syscall for use in StopTheWorld. We
implement it only for x86_64, so stop building StopTheWorld for other platforms
(no one uses it outside x86_64 anyway).
See https://code.google.com/p/address-sanitizer/issues/detail?id=214 for why we
can't use the glibc clone() wrapper.
llvm-svn: 189753
|