- May 28, 2013
-
-
Peter Collingbourne authored
Differential Revision: http://llvm-reviews.chandlerc.com/D872 llvm-svn: 182765
-
- May 27, 2013
-
-
Peter Collingbourne authored
llvm-svn: 182743
-
- May 23, 2013
-
-
Alexander Potapenko authored
[ASan] Introduce SymbolizerPrepareForSandboxing(), which is a no-op on every platform except Linux (because we don't support sandboxing anywhere else yet) On Linux we pre-cache the value of readlink("/proc/self/exe"), so that it can be later used when the sandbox has been turned on. llvm-svn: 182579
-
- May 21, 2013
-
-
Peter Collingbourne authored
llvm-svn: 182372
-
- May 15, 2013
-
-
Kostya Serebryany authored
llvm-svn: 181881
-
- May 14, 2013
-
-
Sergey Matveev authored
llvm-svn: 181791
-
- Mar 19, 2013
-
-
Dmitry Vyukov authored
llvm-svn: 177388
-
- Jan 29, 2013
-
-
Dmitry Vyukov authored
tsan: add IsSymbolizerAvailable() function for querying for presence of internal/external symbolizer llvm-svn: 173783
-
- Jan 11, 2013
-
-
Dmitry Vyukov authored
llvm-svn: 172181
-
- Dec 20, 2012
-
-
Richard Smith authored
llvm-svn: 170666
-
- Dec 03, 2012
-
-
Dmitry Vyukov authored
llvm-svn: 169122
-
- Oct 17, 2012
-
-
Alexey Samsonov authored
llvm-svn: 166098
-
- Sep 06, 2012
-
-
Alexey Samsonov authored
llvm-svn: 163296
-
- Sep 04, 2012
-
-
Alexey Samsonov authored
llvm-svn: 163140
-
- Aug 23, 2012
-
-
Alexey Samsonov authored
[Sanitizer] Switch the symbolization strategy that would be used by sanitizer tools family: as compiling in-process symbolizer into runtime involves certain difficulties, we may instead launch an external symbolizer program (fork + execl) in a subprocess and communicate with it via pipe. llvm-svn: 162437
-
- Jul 31, 2012
-
-
Alexey Samsonov authored
[Sanitizer] Wrapper around llvm::DIContext from LLVM DebugInfo library. If a macro SANITIZER_USES_LLVM_LIBS is defined (by default it is not), then sanitizer runtime includes llvm headers and tries to use LLVM libs for in-process symbolization. To make it functional, we have to link with these LLVM libs - either pass them to linker from Clang driver, or link them into static ASan runtime when we build it. llvm-svn: 161045
-
- Jul 19, 2012
-
-
Alexey Samsonov authored
[Sanitizer] When obtaining the data for loaded modules, add address ranges of loadable segments only. Looks like address range of PT_TLS segment may intersect with loadable segments of other modules. llvm-svn: 160498
-
- Jul 05, 2012
-
-
Alexey Samsonov authored
llvm-svn: 159748
-
- Jul 03, 2012
-
-
Alexey Samsonov authored
[Sanitizer] Extend a symbolizer code. Implemented for Linux only. Use dl_iterate_phdr to get virtual addresses of mapped module sections. To symbolize an address from a module, map this module to memory and obtain pointers to debug info sections. Later these pointers can be passed to constructor of DWARF context-in-memory from LLVM DebugInfo lib. llvm-svn: 159652
-
- Jun 15, 2012
-
-
Alexey Samsonov authored
llvm-svn: 158522
-
- Jun 05, 2012
-
-
Alexey Samsonov authored
llvm-svn: 158001
-
- Jun 04, 2012
-
-
Alexey Samsonov authored
llvm-svn: 157919
-
- Jun 01, 2012
-
-
Alexey Samsonov authored
Stub files for common symbolizer for AddressSanitizer and ThreadSanitizer tools. It is an analogue of addr2line utility and should allow to map instruction address to a location in source code at run-time. It should use debug information (in DWARF) in a binary, and hopefully it would be possible to re-use code from llvm/DebugInfo/DIContext.h llvm-svn: 157806
-