- Aug 29, 2012
-
-
Alexander Potapenko authored
For invalid pointers passed to free_common check whether they are actually skewed to hold an additional CFAllocatorRef. If so, fix the pointer and pass it to asan_free. See http://code.google.com/p/address-sanitizer/issues/detail?id=70 for more background. llvm-svn: 162839
-
Kostya Serebryany authored
[asan/tsan] use InternalScopedBuffer instead of stack arrays. Use mmap inseted of InternalAlloc in InternalScopedBuffer llvm-svn: 162834
-
Kostya Serebryany authored
[tsan] fix tsan's Makefile.old -- our build bot still uses it (hopefully, will soon migrate to cmake completely) llvm-svn: 162832
-
Kostya Serebryany authored
[asan] fix asan's Makefile.old -- our build bot still uses it (hopefully, will soon migrate to cmake completely) llvm-svn: 162831
-
Chandler Carruth authored
library. These headers are intended to be available to user code when built with AddressSanitizer (or one of the other sanitizer's in the future) to interface with the runtime library. As such, they form stable external C interfaces, and the headers shouldn't be located within the implementation. I've pulled them out into what seem like fairly obvious locations and names, but I'm wide open to further bikeshedding of these names and locations. I've updated the code and the build system to cope with the new locations, both CMake and Makefile. Please let me know if this breaks anyone's build. The eventual goal is to install these headers along side the Clang builtin headers when we build the ASan runtime and install it. My current thinking is to locate them at: <prefix>/lib/clang/X.Y/include/sanitizer/common_interface_defs.h <prefix>/lib/clang/X.Y/include/sanitizer/asan_interface.h <prefix>/lib/clang/X.Y/include/sanitizer/... But maybe others have different suggestions? Fixing the style of the #include between these headers at least unblocks experimentation with installing them as they now should work when installed in these locations. llvm-svn: 162822
-
Chandler Carruth authored
This hoists most of the CFLAGS into a common variable. It also adds detection for -Wno-c99-extensions and uses it to silence a pile of warnings. Finally, it switches to the proper flag -rdynamic. With this, the cmake build is warning free on my bootstrap Linux build. llvm-svn: 162809
-
- Aug 28, 2012
-
-
Kostya Serebryany authored
llvm-svn: 162762
-
Kostya Serebryany authored
llvm-svn: 162760
-
Kostya Serebryany authored
llvm-svn: 162759
-
Kostya Serebryany authored
llvm-svn: 162758
-
Kostya Serebryany authored
llvm-svn: 162757
-
Kostya Serebryany authored
llvm-svn: 162754
-
Kostya Serebryany authored
llvm-svn: 162752
-
Alexey Samsonov authored
llvm-svn: 162750
-
Kostya Serebryany authored
llvm-svn: 162748
-
Kostya Serebryany authored
llvm-svn: 162747
-
Kostya Serebryany authored
llvm-svn: 162746
-
Kostya Serebryany authored
[asan] improve SetErrorReportCallbackTest to actually catch missing functionality in __asan_set_error_report_callback llvm-svn: 162745
-
Alexey Samsonov authored
llvm-svn: 162742
-
Alexey Samsonov authored
llvm-svn: 162739
-
- Aug 27, 2012
-
-
Alexey Samsonov authored
llvm-svn: 162676
-
Evgeniy Stepanov authored
llvm-svn: 162675
-
Alexey Samsonov authored
llvm-svn: 162674
-
Alexey Samsonov authored
[Sanitizer] Use low-level allocator in flag parsing to avoid calling malloc() before ASan/TSan initialization is done llvm-svn: 162673
-
Alexey Samsonov authored
[Sanitizer] Rename ProcessMaps to MemoryMappingLayout and fix Windows build by providing stub implementation llvm-svn: 162671
-
Alexey Samsonov authored
llvm-svn: 162670
-
Evgeniy Stepanov authored
llvm-svn: 162666
-
Alexey Samsonov authored
llvm-svn: 162663
-
- Aug 24, 2012
-
-
Dmitry Vyukov authored
llvm-svn: 162561
-
Alexander Potapenko authored
Remove a spare newline from asan_rtl.cc llvm-svn: 162548
-
Alexander Potapenko authored
(which, in turn, is required for our interceptors to take effect), re-exec the program with DYLD_INSERT_LIBRARIES set. llvm-svn: 162547
-
Alexander Potapenko authored
Add add_clang_runtime_shared_library() CMake function and use it to put the shared ASan runtime in the appropriate place. llvm-svn: 162546
-
- Aug 23, 2012
-
-
Dmitry Vyukov authored
useful if you don't see the second stack trace llvm-svn: 162456
-
Dmitry Vyukov authored
Deallocate: drain blocks to central cache if cached too much (instead of never drain). Allocate: batch allocate fixed amount of blocks (instead of all blocks). This significantly reduces memory consumption of large heavy-multithreaded programs. llvm-svn: 162447
-
Alexey Samsonov authored
[Sanitizer] Add external symbolizer binary. Next steps - include it in CMake build (produce 32-bit and 64-bit version of it, make sure we can compile LLVM sources with our own flags) and add tests for it. llvm-svn: 162442
-
Alexander Potapenko authored
(kudos to Anna Zaks for a good example). This simplifies the code much and lets us not implement internal parts of libdispatch. All ASan tests from t32 and t64 should pass with the dylib runtime now. llvm-svn: 162439
-
Alexey Samsonov authored
[Sanitizer] Switch the symbolization strategy that would be used by sanitizer tools family: as compiling in-process symbolizer into runtime involves certain difficulties, we may instead launch an external symbolizer program (fork + execl) in a subprocess and communicate with it via pipe. llvm-svn: 162437
-
- Aug 22, 2012
-
-
Alexey Samsonov authored
llvm-svn: 162359
-
Alexey Samsonov authored
[ASan] get rid of ASAN_USE_EXTERNAL_SYMBOLIZER compiler def in favor of __asan_set_symbolize_callback interface function. Now the user doesn't have to recompile ASan runtime to provide its own symbolizer llvm-svn: 162358
-
Alexey Samsonov authored
[ASan] make ASan malloc/free hooks weak interface functions, overridable by user. Now the user can control malloc/free hooks without recompiling ASan runtime llvm-svn: 162355
-