summaryrefslogtreecommitdiffstats
path: root/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer.h
Commit message (Collapse)AuthorAgeFilesLines
...
* Demangle names using pluggable internal symbolizer if possibleAlexey Samsonov2013-06-281-1/+3
| | | | llvm-svn: 185146
* [Sanitizer] support running external llvm-symbolizer on MacAlexey Samsonov2013-06-111-0/+2
| | | | llvm-svn: 183730
* [nolibc] Unweak SymbolizerPrepareForSandboxing and move it to ↵Peter Collingbourne2013-05-291-1/+1
| | | | | | | | | | libc-independent part. Fixes the Go build. Differential Revision: http://llvm-reviews.chandlerc.com/D877 llvm-svn: 182851
* [nolibc] Make SymbolizerPrepareForSandboxing weak and optional.Peter Collingbourne2013-05-281-1/+1
| | | | | | Differential Revision: http://llvm-reviews.chandlerc.com/D872 llvm-svn: 182765
* [nolibc] Make AddressInfo::Clear a weak function.Peter Collingbourne2013-05-271-1/+1
| | | | llvm-svn: 182743
* [ASan] Introduce SymbolizerPrepareForSandboxing(), which is a no-op on every ↵Alexander Potapenko2013-05-231-0/+2
| | | | | | | | platform except Linux (because we don't support sandboxing anywhere else yet) On Linux we pre-cache the value of readlink("/proc/self/exe"), so that it can be later used when the sandbox has been turned on. llvm-svn: 182579
* [nolibc] Move symbolizer to RTSanitizerCommonLibc, and make it optional ↵Peter Collingbourne2013-05-211-1/+2
| | | | | | using a weak symbol. llvm-svn: 182372
* [asan] fix powerpc build and one test; fix lintKostya Serebryany2013-05-151-1/+1
| | | | llvm-svn: 181881
* [sanitizer] Filtering in GetListOfModules.Sergey Matveev2013-05-141-2/+5
| | | | llvm-svn: 181791
* tsan: symbolizer "flush caches" functinalityDmitry Vyukov2013-03-191-0/+1
| | | | llvm-svn: 177388
* tsan: add IsSymbolizerAvailable() function for querying for presence of ↵Dmitry Vyukov2013-01-291-0/+2
| | | | | | internal/external symbolizer llvm-svn: 173783
* tsan: symbolize global variablesDmitry Vyukov2013-01-111-1/+10
| | | | llvm-svn: 172181
* Move C++ name demangling support from ubsan into sanitizer_common.Richard Smith2012-12-201-0/+3
| | | | llvm-svn: 170666
* tsan: describe global vars (module+offset for now)Dmitry Vyukov2012-12-031-0/+1
| | | | llvm-svn: 169122
* [Sanitizer] symbolizer: increase the maximal number of shared libraries to 16KAlexey Samsonov2012-10-171-1/+1
| | | | llvm-svn: 166098
* [Sanitizer] remove unused fieldAlexey Samsonov2012-09-061-1/+0
| | | | llvm-svn: 163296
* [Sanitizer] Support for reading inlined frames from llvm-symbolizerAlexey Samsonov2012-09-041-0/+7
| | | | llvm-svn: 163140
* [Sanitizer] Switch the symbolization strategy that would be used by ↵Alexey Samsonov2012-08-231-31/+15
| | | | | | sanitizer tools family: as compiling in-process symbolizer into runtime involves certain difficulties, we may instead launch an external symbolizer program (fork + execl) in a subprocess and communicate with it via pipe. llvm-svn: 162437
* [Sanitizer] Wrapper around llvm::DIContext from LLVM DebugInfo library. If a ↵Alexey Samsonov2012-07-311-1/+10
| | | | | | macro SANITIZER_USES_LLVM_LIBS is defined (by default it is not), then sanitizer runtime includes llvm headers and tries to use LLVM libs for in-process symbolization. To make it functional, we have to link with these LLVM libs - either pass them to linker from Clang driver, or link them into static ASan runtime when we build it. llvm-svn: 161045
* [Sanitizer] When obtaining the data for loaded modules, add address ranges ↵Alexey Samsonov2012-07-191-2/+2
| | | | | | of loadable segments only. Looks like address range of PT_TLS segment may intersect with loadable segments of other modules. llvm-svn: 160498
* [ASan] Add a default constructor for DWARFSection to initialize it with zeros.Alexey Samsonov2012-07-051-0/+4
| | | | llvm-svn: 159748
* [Sanitizer] Extend a symbolizer code. Implemented for Linux only. Use ↵Alexey Samsonov2012-07-031-0/+39
| | | | | | dl_iterate_phdr to get virtual addresses of mapped module sections. To symbolize an address from a module, map this module to memory and obtain pointers to debug info sections. Later these pointers can be passed to constructor of DWARF context-in-memory from LLVM DebugInfo lib. llvm-svn: 159652
* [Sanitizer] Use ProcessMaps in symbolizer to get module name and offset for ↵Alexey Samsonov2012-06-151-12/+9
| | | | | | instruction address llvm-svn: 158522
* [Sanitizer] rename sanitizer_defs.h to sanitizer_internal_defs.hAlexey Samsonov2012-06-051-1/+1
| | | | llvm-svn: 158001
* [Sanitizer_common] fix filenames in commentsAlexey Samsonov2012-06-041-1/+1
| | | | llvm-svn: 157919
* Stub files for common symbolizer for AddressSanitizer and ThreadSanitizer tools.Alexey Samsonov2012-06-011-0/+60
It is an analogue of addr2line utility and should allow to map instruction address to a location in source code at run-time. It should use debug information (in DWARF) in a binary, and hopefully it would be possible to re-use code from llvm/DebugInfo/DIContext.h llvm-svn: 157806
OpenPOWER on IntegriCloud