| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
| |
llvm-svn: 243480
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Specifically:
- Disable int128 tests on Windows, as MSVC cl.exe does not support
int128, so we might not have been able to build the runtime
with int128 support.
- XFAIL the vptr tests as we lack Microsoft ABI support.
- XFAIL enum.cpp as UBSan fails to add the correct instrumentation code
for some reason.
- Modify certain tests that build executables multiple times to use
unique names for each executable. This works around a race condition
observed on Windows.
- Implement IsAccessibleMemoryRange for Windows to fix the last
misaligned.cpp test.
- Introduce a substitution for testing crashes on Windows using
KillTheDoctor.
Differential Revision: http://reviews.llvm.org/D10864
llvm-svn: 241303
|
|
|
|
| |
llvm-svn: 239027
|
|
|
|
|
|
| |
Differential Revision: http://reviews.llvm.org/D10213
llvm-svn: 239020
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This is done by creating a named shared memory region, unlinking it
and setting up a private (i.e. copy-on-write) mapping of that instead
of a regular anonymous mapping. I've experimented with regular
(sparse) files, but they can not be scaled to the size of MSan shadow
mapping, at least on Linux/X86_64 and ext3 fs.
Controlled by a common flag, decorate_proc_maps, disabled by default.
This patch has a few shortcomings:
* not all mappings are annotated, especially in TSan.
* our handling of memset() of shadow via mmap() puts small anonymous
mappings inside larger named mappings, which looks ugly and can, in
theory, hit the mapping number limit.
llvm-svn: 238621
|
|
|
|
| |
llvm-svn: 235591
|
|
|
|
| |
llvm-svn: 235590
|
|
|
|
|
|
|
| |
On Windows, we have to know if a memory to be protected is mapped or not.
On POSIX, Mprotect was semantically different from mprotect most people know.
llvm-svn: 234602
|
|
|
|
| |
llvm-svn: 234494
|
|
|
|
| |
llvm-svn: 234490
|
|
|
|
| |
llvm-svn: 234487
|
|
|
|
| |
llvm-svn: 234485
|
|
|
|
| |
llvm-svn: 234482
|
|
|
|
| |
llvm-svn: 234481
|
|
|
|
| |
llvm-svn: 234423
|
|
|
|
|
|
| |
sanitizer_posix.h
llvm-svn: 234418
|
|
|
|
| |
llvm-svn: 234410
|
|
|
|
| |
llvm-svn: 234151
|
|
|
|
|
|
| |
Reviewed at http://reviews.llvm.org/D8805
llvm-svn: 234150
|
|
|
|
| |
llvm-svn: 233918
|
|
|
|
| |
llvm-svn: 233707
|
|
|
|
|
|
|
|
| |
OpenFile.
This is to fix mapping coverage files into memory on OSX.
llvm-svn: 232936
|
|
|
|
| |
llvm-svn: 230980
|
|
|
|
|
|
|
|
|
|
| |
executable
The ASanified executable could be launched from different locations. When we
cannot find the suppression file relative to the current directory, try to
see if the specified path is relative to the location of the executable.
llvm-svn: 230723
|
|
|
|
|
|
|
| |
The function uses EnumProcessModules, which requires psapi.lib,
which is not linked with tsan on windows.
llvm-svn: 229390
|
|
|
|
| |
llvm-svn: 228702
|
|
|
|
|
|
| |
Differential Revision: http://reviews.llvm.org/D7294
llvm-svn: 227959
|
|
|
|
| |
llvm-svn: 227803
|
|
|
|
| |
llvm-svn: 226825
|
|
|
|
| |
llvm-svn: 226636
|
|
|
|
| |
llvm-svn: 224988
|
|
|
|
|
|
| |
memory range
llvm-svn: 224987
|
|
|
|
| |
llvm-svn: 224863
|
|
|
|
|
|
| |
to make it easier to debug startup shadow mapping failures
llvm-svn: 224856
|
|
|
|
|
|
| |
This will prevent ASan bots from hanging / timing out
llvm-svn: 224852
|
|
|
|
| |
llvm-svn: 224366
|
|
|
|
| |
llvm-svn: 224353
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Summary:
- Make sure mmap() is never called inside RawWrite function.
- Wrap a bunch of standalone globals in a ReportFile object.
- Make sure accesses to these globals are thread-safe.
- Fix report_path functionality on Windows, where
__sanitizer_set_report_path() would break program.
I've started this yak shaving in order to make
"CommonFlags::mmap_limit_mb" immutable. Currently we drop this flag
to zero before printing an error message.
Test Plan: regression test suite
Reviewers: kcc, glider
Subscribers: llvm-commits
Differential Revision: http://reviews.llvm.org/D6595
llvm-svn: 224031
|
|
|
|
| |
llvm-svn: 223730
|
|
|
|
| |
llvm-svn: 221912
|
|
|
|
|
|
|
|
| |
analysis of sanitized systems logs.
Reviewed at http://reviews.llvm.org/D5724
llvm-svn: 221896
|
|
|
|
| |
llvm-svn: 220643
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
introduce a BufferedStackTrace class, which owns this array.
Summary:
This change splits __sanitizer::StackTrace class into a lightweight
__sanitizer::StackTrace, which doesn't own array of PCs, and BufferedStackTrace,
which owns it. This would allow us to simplify the interface of StackDepot,
and eventually merge __sanitizer::StackTrace with __tsan::StackTrace.
Test Plan: regression test suite.
Reviewers: kcc, dvyukov
Reviewed By: dvyukov
Subscribers: llvm-commits
Differential Revision: http://reviews.llvm.org/D5985
llvm-svn: 220635
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Summary:
UBSan needs to check if memory snippet it's going to print resides
in addressable memory. Similar check might be helpful in ASan with
dump_instruction_bytes option (see http://reviews.llvm.org/D5167).
Instead of scanning /proc/self/maps manually, delegate this check to
the OS kernel: try to write this memory in a syscall and assume that
memory is inaccessible if the syscall failed (e.g. with EFAULT).
Fixes PR20721.
Test Plan: compiler-rt test suite
Reviewers: eugenis, glider
Reviewed By: glider
Subscribers: emaste, ygribov, llvm-commits, glider, rsmith
Differential Revision: http://reviews.llvm.org/D5253
llvm-svn: 217971
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Currently it fails with:
# Testing race detector.
race_windows_amd64.syso:gotsan.cc:(.text+0x4d89): undefined reference to `__imp_SymGetModuleBase64'
race_windows_amd64.syso:gotsan.cc:(.text+0x4d90): undefined reference to `__imp_SymFunctionTableAccess64'
race_windows_amd64.syso:gotsan.cc:(.text+0x4dd8): undefined reference to `__imp_StackWalk64'
x86_64-w64-mingw32/bin/ld.exe: race_windows_amd64.syso
: bad reloc address 0x10 in section `.data'
collect2.exe: error: ld returned 1 exit status
llvm-svn: 216875
|
|
|
|
|
|
| |
sanitizer_common
llvm-svn: 215481
|
|
|
|
|
|
| |
Reviewed at http://reviews.llvm.org/D4471
llvm-svn: 212807
|
|
|
|
| |
llvm-svn: 209717
|
|
|
|
|
|
|
|
|
|
|
| |
Summary:
Sandboxed code may now pass additional arguments to
__sanitizer_sandbox_on_notify() to force all coverage data to be dumped to a
single file (the default is one file per module). The user may supply a file or
socket to write to. The latter option can be used to broker out the file writing
functionality. If -1 is passed, we pre-open a file.
llvm-svn: 209121
|
|
|
|
|
|
| |
Reviewed at http://reviews.llvm.org/D3610
llvm-svn: 208070
|