"llvm/test/CodeGen/BPF/mem_offset_be.ll" did not exist on "56db14516450f980e69034f7d8a7be1e1f133c52"
- Jun 07, 2017
-
-
Vitaly Buka authored
GNU version of strerror_r returns a result pointer that doesn't match the input buffer. The result pointer is in fact a pointer to some internal storage. TSAN was recording a write to this location, which was incorrect. Fixed https://github.com/google/sanitizers/issues/696 llvm-svn: 304858
-
- Jun 01, 2017
-
-
Pierre Gousseau authored
Recommit of r302781 with Vitaly Buka's fix for non zero terminated strings. Differential Revision: https://reviews.llvm.org/D31457 llvm-svn: 304399
-
- May 18, 2017
-
-
Daniel Jasper authored
The Msan unit tests are still broken and by this point, I think we should start over. llvm-svn: 303339
-
- May 11, 2017
-
-
Pierre Gousseau authored
Fix undeclared __interceptor_malloc in esan_interceptors.cc Fix undeclared strnlen on OSX Differential Revision: https://reviews.llvm.org/D31457 llvm-svn: 302781
-
- May 03, 2017
-
-
Maxim Ostapenko authored
This patch addresses https://github.com/google/sanitizers/issues/804. Users can use mcheck and mprobe functions to verify heap state so we should intercept them to avoid breakage of valid code. Differential Revision: https://reviews.llvm.org/D32589 llvm-svn: 302001
-
- May 02, 2017
-
-
Pierre Gousseau authored
llvm-svn: 301909
-
Pierre Gousseau authored
Differential Revision: https://reviews.llvm.org/D31457 llvm-svn: 301904
-
- Apr 24, 2017
-
-
Evgeniy Stepanov authored
This fixes a regression in r297315. llvm-svn: 301243
-
- Apr 21, 2017
-
-
Vitaly Buka authored
Summary: strchr interceptor does not need to call strlen if strict_string_checks is not enabled. Unnecessary strlen calls affect python parser performance. Reviewers: eugenis, kcc Subscribers: llvm-commits, kubamracek Differential Revision: https://reviews.llvm.org/D32264 llvm-svn: 301027
-
Diana Picus authored
At least one of the ARM bots is still broken: Command Output (stderr): -- /home/buildslave/buildslave/clang-cmake-armv7-a15-full/llvm/projects/compiler-rt/test/asan/TestCases/Posix/strchr.c:31:12: error: expected string not found in input // CHECK: strchr.c:[[@LINE-2]] ^ <stdin>:3:59: note: scanning from here ==16297==ERROR: AddressSanitizer: SEGV on unknown address 0xb5add000 (pc 0xb6dccaa4 bp 0xbe8c19c8 sp 0xbe8c1570 T0) ^ <stdin>:3:59: note: with expression "@LINE-2" equal to "29" ==16297==ERROR: AddressSanitizer: SEGV on unknown address 0xb5add000 (pc 0xb6dccaa4 bp 0xbe8c19c8 sp 0xbe8c1570 T0) ^ <stdin>:5:57: note: possible intended match here #0 0xb6dccaa3 in strlen /build/glibc-f8FFOS/glibc-2.23/string/../sysdeps/arm/armv6t2/strlen.S:82 Try to fix by reverting r300889 and subsequent fixes: Revert "[asan] Fix test by removing "The signal is caused" check." Revert "[asan] Fix test on ppc64le-linux by checking "UNKNOWN memory access"" Revert "[asan] Match BUS and SIGV to fix test on Darwin" Revert "[asan] Optimize strchr for strict_string_checks=false" llvm-svn: 300955
-
Kostya Serebryany authored
Summary: The textdomain function accepts a NULL parameter (and should then return the current message domain). Add a check for this and include ASAN tests. Link: https://github.com/google/sanitizers/issues/787 Reviewers: m.guseva, kcc Reviewed By: kcc Subscribers: kubamracek Differential Revision: https://reviews.llvm.org/D32318 llvm-svn: 300924
-
- Apr 20, 2017
-
-
Vitaly Buka authored
Summary: strchr interceptor does not need to call strlen if strict_string_checks is not enabled. Unnecessary strlen calls affect python parser performance. Reviewers: eugenis, kcc Subscribers: llvm-commits, kubamracek Differential Revision: https://reviews.llvm.org/D32264 llvm-svn: 300889
-
- Apr 12, 2017
-
-
Kostya Serebryany authored
[msan] fix iconv interceptor. before the fix the interceptor failed to mark memory as initialized if iconv returned -1. Found in a hard way while fuzzing libxml2 :( llvm-svn: 300010
-
- Mar 30, 2017
-
-
Maxim Ostapenko authored
{M, T, E}San have fread and fwrite interceptors, let's move them to sanitizer_common to enable ASan checks as well. Differential Revision: https://reviews.llvm.org/D31456 llvm-svn: 299061
-
Kostya Serebryany authored
[sanitizers] Fix get_groups interceptor in sanitizer (https://reviews.llvm.org/D31332, patch by Martin Liška) llvm-svn: 299036
-
- Mar 26, 2017
-
-
Dmitry Vyukov authored
There are several problems with the current annotations (AnnotateRWLockCreate and friends): - they don't fully support deadlock detection (we need a hook _before_ mutex lock) - they don't support insertion of random artificial delays to perturb execution (again we need a hook _before_ mutex lock) - they don't support setting extended mutex attributes like read/write reentrancy (only "linker init" was bolted on) - they don't support setting mutex attributes if a mutex don't have a "constructor" (e.g. static, Java, Go mutexes) - they don't ignore synchronization inside of lock/unlock operations which leads to slowdown and false negatives The new annotations solve of the above problems. See tsan_interface.h for the interface specification and comments. Reviewed in https://reviews.llvm.org/D31093 llvm-svn: 298809
-
- Mar 23, 2017
-
-
Alex Shlyapnikov authored
Summary: This change addresses https://github.com/google/sanitizers/issues/766. I tested the change with make check-asan and the newly added test case. Reviewers: ygribov, kcc, alekseyshl Subscribers: kubamracek, llvm-commits Patch by mrigger Differential Revision: https://reviews.llvm.org/D30384 llvm-svn: 298650
-
- Mar 16, 2017
-
-
Evgeniy Stepanov authored
llvm-svn: 297923
-
- Mar 09, 2017
-
-
Maxim Ostapenko authored
People keep hitting on spurious failures in malloc/free routines when using sanitizers with shared libraries dlopened with RTLD_DEEPBIND (see https://github.com/google/sanitizers/issues/611 for details). Let's check for this flag and bail out with warning message instead of failing in random places. Differential Revision: https://reviews.llvm.org/D30504 llvm-svn: 297370
-
- Mar 08, 2017
-
-
Francis Ricci authored
There are two possible return values for strerror_r: On OS X, the return value is always `int`. On Linux, the return value can be either `char *` or `int`, depending on the value of: `(_POSIX_C_SOURCE >= 200112L || _XOPEN_SOURCE >= 600) && ! _GNU_SOURCE` Because OS X interceptors require a matching function signature, split out the two cases into separate interceptors, using the above information to determine the correct signature for a given build. llvm-svn: 297315
-
- Feb 10, 2017
-
-
Kostya Serebryany authored
Summary: Symbol __tls_get_addr_internal is a GLIBC_PRIVATE private symbol on s390{,x}, the glibc folks aren't very happy about asan using it. Additionally, only recent glibc versions have it, older versions just have __tls_get_offset and nothing else. The patch doesn't drop the __tls_get_addr_internal interception altogether, but changes it so that it calls real __tls_get_offset function instead (and much more importantly, that __tls_get_offset interception calls the real __tls_get_offset function). This way it should work also on glibc 2.18 and earlier. See http://gcc.gnu.org/PR79341 for further details. Reviewers: kcc, koriakin Reviewed By: kcc, koriakin Subscribers: kubamracek, mehdi_amini Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D29735 llvm-svn: 294790
-
- Feb 01, 2017
-
-
Justin Bogner authored
This basically already worked other than weak symbols needing definitions on darwin. llvm-svn: 293741
-
- Dec 27, 2016
-
-
Vitaly Buka authored
llvm-svn: 290629
-
Vitaly Buka authored
[compiler-rt] Move logic which replace memcpy interceptor with memmove from asan to sanitizer_common. Reviewers: eugenis Subscribers: kubabrecka, dberris, llvm-commits Differential Revision: https://reviews.llvm.org/D28074 llvm-svn: 290626
-
- Dec 23, 2016
-
-
Vitaly Buka authored
Reviewers: eugenis Subscribers: kubabrecka, dberris, llvm-commits Differential Revision: https://reviews.llvm.org/D28072 llvm-svn: 290396
-
Vitaly Buka authored
Summary: We setup these interceptors twice which hangs test on windows. Reviewers: eugenis Subscribers: llvm-commits, kubabrecka Differential Revision: https://reviews.llvm.org/D28070 llvm-svn: 290393
-
- Dec 22, 2016
-
-
Vitaly Buka authored
Summary: According https://reviews.llvm.org/D27659#625093 WRAP adds confusing stack frame. Reviewers: eugenis Subscribers: kubabrecka, llvm-commits Differential Revision: https://reviews.llvm.org/D28039 llvm-svn: 290382
-
- Dec 15, 2016
-
-
Evgeniy Stepanov authored
Differential Revision: https://reviews.llvm.org/D27791 llvm-svn: 289878
-
Hans Wennborg authored
Revert r289690 "[sanitizer] intercept bstring functions, patch by Kuang-che Wu (https://reviews.llvm.org/D27659)" It breaks programs on Mac. See comments on the code review for details. llvm-svn: 289864
-
- Dec 14, 2016
-
-
- Nov 28, 2016
-
-
Marcin Koscielnicki authored
See D19555 for rationale. As it turns out, this treatment is also necessary for scanf/printf. Differential Revision: https://reviews.llvm.org/D27118 llvm-svn: 288064
-
- Nov 12, 2016
-
-
Vitaly Buka authored
Summary: In non-strict mode we will check memory access for both strings from beginning to either: 1. 0-char 2. size 3. different chars In strict mode we will check from beginning to either: 1. 0-char 2. size Previously in strict mode we always checked up to the 0-char. Reviewers: kcc, eugenis Subscribers: llvm-commits, kubabrecka Differential Revision: https://reviews.llvm.org/D26574 llvm-svn: 286708
-
- Oct 22, 2016
-
-
Kostya Serebryany authored
llvm-svn: 284901
-
- Sep 10, 2016
-
-
Keno Fischer authored
Reviewers: eugenis Subscribers: kubabrecka, llvm-commits Differential Revision: https://reviews.llvm.org/D24375 llvm-svn: 281116
-
- Jul 27, 2016
-
-
Etienne Bergeron authored
Summary: This patch is re-introducing the code to fix the dynamic hooking on windows and to fix a compiler warning on Apple. Related patches: * https://reviews.llvm.org/D22641 * https://reviews.llvm.org/D22610 * https://reviews.llvm.org/rL276311 * https://reviews.llvm.org/rL276490 Both architecture are using different techniques to hook on library functions (memchr, strcpy,...). On Apple, the function is not dynamically hooked and the symbol always points to a valid function (i.e. can't be null). The REAL macro returns the symbol. On windows, the function is dynamically patch and the REAL(...) function may or may not be null. It depend on whether or not the function was hooked correctly. Also, on windows memcpy and memmove are the same. ``` #if !defined(__APPLE__) [...] # define REAL(x) __interception::PTR_TO_REAL(x) # define ASSIGN_REAL(dst, src) REAL(dst) = REAL(src) [...] #else // __APPLE__ [...] # define REAL(x) x # define ASSIGN_REAL(x, y) [...] #endif // __APPLE__ Reviewers: rnk Subscribers: kcc, hans, kubabrecka, llvm-commits, bruno, chrisha Differential Revision: https://reviews.llvm.org/D22758 llvm-svn: 276885
-
- Jul 24, 2016
-
-
Bruno Cardoso Lopes authored
Some bots are not happy with the change. This reverts commit d307ca28083065851ad969444f3c063562f2d4bd. llvm-svn: 276541
-
Bruno Cardoso Lopes authored
sanitizer_common_interceptors.inc:667:12: warning: address of function 'memchr' will always evaluate to 'true' [-Wpointer-bool-conversion] if (REAL(memchr)) { ~~ ^~~~~~ llvm-svn: 276539
-
- Jul 21, 2016
-
-
Etienne Bergeron authored
Summary: This patch is fixing running interception unittests for memcpy/memmove on windows 64. Reviewers: rnk Subscribers: llvm-commits, wang0109, kubabrecka, chrisha Differential Revision: https://reviews.llvm.org/D22641 llvm-svn: 276324
-
- Jul 19, 2016
-
-
Etienne Bergeron authored
llvm-svn: 275984
-
- Jul 15, 2016
-
-
Kostya Serebryany authored
[sanitizers] add interceptor for memmem; add weak hooks for strncasecmp, strcasecmp, strstr, strcasestr, memmem llvm-svn: 275621
-