Skip to content
  1. Feb 27, 2013
    • Kostya Serebryany's avatar
      add Linux syscall wrappers and ThreadLister to sanitizer_common · f0b8f989
      Kostya Serebryany authored
      ThreadLister is a Linux-specific class for obtaining the thread IDs of a process from procfs (/proc/<pid>/task/). It will be used by leak checking code.
      Also add several syscall wrappers which will be required by the same code that uses ThreadLister, but are not used in ThreadLister itself.
      Patch by Sergey Matveev
      
      llvm-svn: 176179
      f0b8f989
  2. Feb 20, 2013
  3. Feb 19, 2013
    • Evgeniy Stepanov's avatar
      [msan] Fix ReExec on linux. · adaca585
      Evgeniy Stepanov authored
      execle(argv[0], ...) is wrong, because argv[0] may contain a PATH-resolvable
      program name. Execute /proc/self/exe instead.
      
      llvm-svn: 175504
      adaca585
  4. Feb 14, 2013
  5. Feb 04, 2013
  6. Feb 01, 2013
  7. Jan 30, 2013
  8. Jan 17, 2013
  9. Jan 15, 2013
  10. Jan 14, 2013
  11. Jan 09, 2013
  12. Dec 14, 2012
  13. Dec 13, 2012
  14. Dec 10, 2012
  15. Dec 07, 2012
  16. Dec 05, 2012
  17. Dec 03, 2012
  18. Dec 01, 2012
    • Alexander Potapenko's avatar
      Add caching to the MemoryMappingLayout class on Linux. This is necessary for... · 78114258
      Alexander Potapenko authored
      Add caching to the MemoryMappingLayout class on Linux. This is necessary for the cases when a sandbox prevents ASan from reading the mappings
      from /proc/self/maps.
      The mappings are currently being cached on each access to /proc/self/maps. In the future we'll need to add an API that allows the client to notify ASan about the sandbox.
      
      llvm-svn: 169076
      78114258
  19. Nov 21, 2012
  20. Nov 20, 2012
  21. Nov 19, 2012
  22. Nov 14, 2012
  23. Nov 09, 2012
  24. Oct 02, 2012
  25. Sep 17, 2012
  26. Sep 05, 2012
  27. Aug 27, 2012
  28. Aug 14, 2012
  29. Jul 19, 2012
  30. Jul 03, 2012
    • Alexey Samsonov's avatar
      [Sanitizer] Extend a symbolizer code. Implemented for Linux only. Use... · 961276af
      Alexey Samsonov authored
      [Sanitizer] Extend a symbolizer code. Implemented for Linux only. Use dl_iterate_phdr to get virtual addresses of mapped module sections. To symbolize an address from a module, map this module to memory and obtain pointers to debug info sections. Later these pointers can be passed to constructor of DWARF context-in-memory from LLVM DebugInfo lib.
      
      llvm-svn: 159652
      961276af
  31. Jun 29, 2012
Loading