- Sep 03, 2013
-
-
Kostya Serebryany authored
llvm-svn: 189814
-
Kostya Serebryany authored
llvm-svn: 189806
-
Sergey Matveev authored
llvm-svn: 189804
-
Kostya Serebryany authored
llvm-svn: 189783
-
- Aug 16, 2013
-
-
Timur Iskhodzhanov authored
llvm-svn: 188545
-
- Aug 13, 2013
-
-
Timur Iskhodzhanov authored
Define SANITIZER_INTERFACE_ATTRIBUTE on Windows and fix all the places where SANITIZER_INTERFACE_ATTRIBUTE or SANITIZER_ATTRIBUTE_WEAK are used llvm-svn: 188261
-
- Jun 26, 2013
-
-
Kostya Serebryany authored
[asan] initialize fake_stack lazily and increase its maximal size. This makes -fsanitize=address,use-after-return more robust: all SPEC tests pass now. In the default mode thread stacks become a bit smaller. llvm-svn: 184934
-
- May 29, 2013
-
-
Timur Iskhodzhanov authored
llvm-svn: 182857
-
- May 22, 2013
-
-
Kostya Serebryany authored
llvm-svn: 182477
-
- May 06, 2013
-
-
Sergey Matveev authored
Some flags that are common to ASan/MSan/TSan/LSan have been moved to sanitizer_common. llvm-svn: 181193
-
- Apr 11, 2013
-
-
Alexey Samsonov authored
llvm-svn: 179274
-
- Apr 10, 2013
-
-
Alexey Samsonov authored
llvm-svn: 179161
-
- Apr 05, 2013
-
-
Kostya Serebryany authored
[sanitizer] found a bug by code inspection: CHECK(a=b) instead of CHECK(a==b). Was puzzled why lint did not catch it. Turns out this check was disabled for asan source. fix all cases and enable the check llvm-svn: 178872
-
Alexey Samsonov authored
[Sanitizer] Use a common mutex to prevent mixing reports from different sanitizers. This fixes PR15516 llvm-svn: 178853
-
- Apr 01, 2013
-
-
Alexey Samsonov authored
llvm-svn: 178458
-
- Mar 27, 2013
-
-
Alexey Samsonov authored
llvm-svn: 178131
-
- Mar 26, 2013
-
-
Kostya Serebryany authored
[asan] print thread number while reporting invalid-free and double-free; add tests; also add a test for use-after-poison llvm-svn: 177993
-
- Mar 22, 2013
-
-
Kostya Serebryany authored
Before: the function name was stored by the compiler as a constant string and the run-time was printing it. Now: the PC is stored instead and the run-time prints the full symbolized frame. This adds a couple of instructions into every function with non-empty stack frame, but also reduces the binary size because we store less strings (I saw 2% size reduction). This change bumps the asan ABI version to v3. compiler-rt part, llvm part will follow. Example of report (now): ==31711==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffa77cf1c5 at pc 0x41feb0 bp 0x7fffa77cefb0 sp 0x7fffa77cefa8 READ of size 1 at 0x7fffa77cf1c5 thread T0 #0 0x41feaf in Frame0(int, char*, char*, char*) stack-oob-frames.cc:20 #1 0x41f7ff in Frame1(int, char*, char*) stack-oob-frames.cc:24 #2 0x41f477 in Frame2(int, char*) stack-oob-frames.cc:28 #3 0x41f194 in Frame3(int) stack-oob-frames.cc:32 #4 0x41eee0 in main stack-oob-frames.cc:38 #5 0x7f0c5566f76c (/lib/x86_64-linux-gnu/libc.so.6+0x2176c) #6 0x41eb1c (/usr/local/google/kcc/llvm_cmake/a.out+0x41eb1c) Address 0x7fffa77cf1c5 is located in stack of thread T0 at offset 293 in frame #0 0x41f87f in Frame0(int, char*, char*, char*) stack-oob-frames.cc:12 <<<<<<<<<<<<<< this is new This frame has 6 object(s): [32, 36) 'frame.addr' [96, 104) 'a.addr' [160, 168) 'b.addr' [224, 232) 'c.addr' [288, 292) 's' [352, 360) 'd' llvm-svn: 177723
-
- Mar 21, 2013
-
-
Alexey Samsonov authored
[ASan] Switch ASan to generic ThreadRegistry from sanitizer_common. Delete ASan-specific AsanThreadRegistry. llvm-svn: 177634
-
- Mar 20, 2013
-
-
Alexey Samsonov authored
[ASan] Move GetCurrentThread/SetCurrentThread from AsanThreadRegistry class into plain functions: they don't actually use registry llvm-svn: 177501
-
- Mar 18, 2013
-
-
Kostya Serebryany authored
[asan] while generating the description of a global variable, emit the module name in a separate field, thus not duplicating this information if every description. This decreases the binary size (observed up to 3%). https://code.google.com/p/address-sanitizer/issues/detail?id=168 . This changes the asan API version. compiler-rt part, llvm-part will follow llvm-svn: 177253
-
- Feb 20, 2013
-
-
Alexey Samsonov authored
llvm-svn: 175622
-
- Feb 06, 2013
-
-
Kostya Serebryany authored
[asan] print a short one-line report summary after the full report. Currently, works only if symbolization happens in-process. llvm-svn: 174501
-
- Feb 05, 2013
-
-
Evgeniy Stepanov authored
In case of partial right OOB, ASan was reporting X is located 0 bytes to the right of [A, B) where X was actually inside [A, B). With this change, ASan will report B as the error address in such case. llvm-svn: 174373
-
- Jan 28, 2013
-
-
Kostya Serebryany authored
llvm-svn: 173671
-
- Jan 23, 2013
-
-
Kostya Serebryany authored
llvm-svn: 173251
-
- Dec 29, 2012
-
-
Kostya Serebryany authored
[asan] add a new interface function __asan_describe_address, useful for running asan-ified binary under a debugger (e.g. gdb) llvm-svn: 171217
-
- Dec 26, 2012
-
-
Alexey Samsonov authored
llvm-svn: 171112
-
- Dec 21, 2012
-
-
Kostya Serebryany authored
[asan] add a flag alloc_dealloc_mismatch (off by default for now) which finds malloc/delete, new/free, new/delete[], etc mismatches llvm-svn: 170869
-
- Dec 20, 2012
-
-
Alexey Samsonov authored
llvm-svn: 170701
-
- Dec 19, 2012
-
-
Kostya Serebryany authored
llvm-svn: 170520
-
- Dec 18, 2012
-
-
Kostya Serebryany authored
llvm-svn: 170418
-
- Dec 13, 2012
-
-
Kostya Serebryany authored
[asan] add two asan flags: fast_unwind_on_fatal and fast_unwind_on_malloc to allow using the slow CFI-based unwinder llvm-svn: 170117
-
- Dec 07, 2012
-
-
Alexey Samsonov authored
ASan: change the strategy we use for installing malloc/free/symbolization hooks on Linux: don't provide a default no-op implementations for hooks in runtime, and optionally call hooks if they are provided by the user. Don't force weak interface functions into runtime. llvm-svn: 169641
-
Kostya Serebryany authored
[asan] intercept prctl(PR_SET_NAME) and set the thread name. Output the thread names (if non-empty) in asan reports llvm-svn: 169601
-
- Dec 04, 2012
-
-
Alexey Samsonov authored
ASan: add new interface functions - __asan_(un)poison_stack_memory. Calls to these functions are inserted by the instrumentation pass in use-after-scope mode llvm-svn: 169201
-
- Nov 23, 2012
-
-
Alexey Samsonov authored
llvm-svn: 168508
-
- Nov 21, 2012
-
-
Kostya Serebryany authored
[asan/tsan] do not use __WORDSIZE macro, as it is glibc-private thing. Instead, define our own SANITIZER_WORDSIZE llvm-svn: 168424
-
- Nov 19, 2012
-
-
Alexey Samsonov authored
[ASan] use raw Exit() to kill the program in case ASan finds an error while reporting the error in the same thread llvm-svn: 168308
-
- Nov 15, 2012
-
-
Alexander Potapenko authored
[ASan] Revert r168040 and r168043 and take a cleaner solution suggested by Kostya: return the known frame name for fake stack instead of looking it up. llvm-svn: 168046
-