- Aug 09, 2012
-
-
Alexey Samsonov authored
llvm-svn: 161570
-
Alexey Samsonov authored
llvm-svn: 161569
-
Alexey Samsonov authored
[ASan] Create new files asan_report.{h,cc} as a preparation for refactoring of ASan error reporting code. Currently ASan reports many kinds of errors, and the code that actually prints error messages can be found inside allocator, OS-specific files, interceptors code etc. An example of maintenance troubles this situation causes: There is currently an ASan interface function that registers callback which should take the char buffer with error report printed by ASan. This function is now broken, as one has to insert callback calls to all the places in ASan code where the error reports are printed, surprisingly it is not only "__asan_report_error" function... llvm-svn: 161568
-
- Aug 07, 2012
-
-
Alexey Samsonov authored
llvm-svn: 161412
-
Alexey Samsonov authored
llvm-svn: 161411
-
Alexey Samsonov authored
llvm-svn: 161406
-
- Aug 06, 2012
-
-
Alexey Samsonov authored
llvm-svn: 161322
-
Alexey Samsonov authored
[ASan] add new ASan option 'strip_path_prefix' to remove useless prefices from filenames in stack traces llvm-svn: 161321
-
Alexander Potapenko authored
AllocationSize(ptr) should check that |ptr| actually points to the beginning of the chunk it belongs to. Fixes http://code.google.com/p/address-sanitizer/issues/detail?id=86 llvm-svn: 161320
-
- Aug 02, 2012
-
-
Alexander Potapenko authored
llvm-svn: 161181
-
Alexander Potapenko authored
Some refactoring for asan_symbolize.py: introduced the Symbolizer class and implemented DarwinSymbolizer for atos-based symbolization, BreakpadSymbolizer for breakpad-based symbolization (files produced by the dump_syms tool, http://code.google.com/p/google-breakpad/source/browse/#svn%2Ftrunk%2Fsrc%2Ftools%2Fmac%2Fdump_syms) and ChainSymbolizer to allow falling back if a symbolizer hadn't succeeded. Fixed pylint warnings. llvm-svn: 161176
-
Alexander Potapenko authored
Make strcat() and strncat() more standard-compliant (check for invalid parameters even if zero bytes is copied, more accurate overlap check) Fix the tests that were relying on the incorrect behavior. llvm-svn: 161167
-
- Aug 01, 2012
-
-
Alexey Samsonov authored
llvm-svn: 161113
-
Alexey Samsonov authored
[ASan] cleanup interceptors code - prefer ASAN_INTERCEPT_FUNCTION_NAME macro to _WIN32, __APPLE__ etc. llvm-svn: 161109
-
- Jul 31, 2012
-
-
Alexey Samsonov authored
First tiny move towards integrating AddressSanitizer regressions test into LLVM lit-based testing infrastructure. The goal is to be able to run ASan tests by simply running "make check-asan" command from CMake build tree: * tests should use fresh clang binary from current build tree. * tests should use the same RUN-lines syntax as llvm/clang reg tests. Next steps: - restricting tests to machines where target is equal to host, i.e. where we can produce working binaries. - moving AddressSanitizer unit tests to lit as well. llvm-svn: 161050
-
Alexander Potapenko authored
llvm-svn: 161046
-
- Jul 30, 2012
-
-
Alexey Samsonov authored
llvm-svn: 160957
-
- Jul 27, 2012
-
-
Kostya Serebryany authored
llvm-svn: 160853
-
- Jul 25, 2012
-
-
Alexey Samsonov authored
cmake for compiler-rt: add a function to set output dirs for compiler runtimes equal to directory used by Clang driver. Use it for ASan runtime. Also, make sure that ASan unit tests depend on the ASan runtime. llvm-svn: 160721
-
Kostya Serebryany authored
[asan] don't return from a never-return function. fix a test that had a chain of bugs instead of just one llvm-svn: 160719
-
Alexey Samsonov authored
llvm-svn: 160718
-
Alexander Potapenko authored
Users may define it to override the default ASan options. This function has to be marked with __attribute__((no_address_safety_analysis)), because it is called before ASan is fully initialized. Add an output test checking the __asan_default_options functionality. llvm-svn: 160712
-
- Jul 24, 2012
-
-
Alexey Samsonov authored
llvm-svn: 160671
-
Alexey Samsonov authored
[ASan] hacking cmake build: after generating asan runtime, copy it to the Clang lib directory where Clang driver expects to find it. llvm-svn: 160669
-
Alexey Samsonov authored
[ASan] Support for cmake build of ASan unittests in 32-bit LLVM build. Currently, to run ASan unit tests both for 32- and 64 bits one has to maintain two distinct LLVM builds. In a bright future, we'd like to use a single build for this llvm-svn: 160666
-
- Jul 23, 2012
-
-
Alexander Potapenko authored
Test that child threads use the ASan allocator, that allocated memory can be passed to another thread and deallocated on it. This should fix http://code.google.com/p/address-sanitizer/issues/detail?id=81 llvm-svn: 160630
-
Alexey Samsonov authored
llvm-svn: 160624
-
Alexander Potapenko authored
For wild addresses in the shadow or shadow gap areas print an error message instead of crashing on a check. Add AddressSanitizer.MemsetWildAddressTest that makes sure a proper error message is printed. llvm-svn: 160620
-
- Jul 19, 2012
-
-
Alexey Samsonov authored
[ASan] subtract one from PCs in ASan error reports (as they originally contain return addresses). Make output tests stricter. llvm-svn: 160508
-
Alexander Potapenko authored
llvm-svn: 160502
-
- Jul 17, 2012
-
-
Kostya Serebryany authored
llvm-svn: 160347
-
- Jul 10, 2012
-
-
Alexey Samsonov authored
llvm-svn: 159988
-
Alexey Samsonov authored
llvm-svn: 159985
-
- Jul 09, 2012
-
-
Alexey Samsonov authored
llvm-svn: 159934
-
Alexey Samsonov authored
llvm-svn: 159933
-
- Jul 06, 2012
-
-
Alexander Potapenko authored
llvm-svn: 159824
-
Alexander Potapenko authored
do so by factoring the CFAllocator logic into ReplaceCFAllocator(), which is called from either the __CFInitialize wrapper or __asan_init(), depending on which of them is called later. llvm-svn: 159822
-
Alexander Potapenko authored
A portable way to check whether __CFInitialize has been called: compare kCFAllocatorSystemDefault._base._cfisa to 0. This should fix http://code.google.com/p/address-sanitizer/issues/detail?id=87 on both Lion and Snow Leopard. llvm-svn: 159821
-
Alexander Potapenko authored
This change may cause http://code.google.com/p/address-sanitizer/issues/detail?id=87 to re-appear on Lion. llvm-svn: 159819
-
- Jul 05, 2012
-
-
http://code.google.com/p/address-sanitizer/issues/detail?id=87Alexander Potapenko authored
Fix http://code.google.com/p/address-sanitizer/issues/detail?id=87 by making sure we replace the default CFAllocator only after __CFInitialize has been called. llvm-svn: 159749
-