Go to file
Chris Lattner 26008e07de implement rdar://5739832 - operator new should check for overflow in multiply,
causing clang to compile this code into something that correctly throws a
length error, fixing a potential integer overflow security attack:

void *test(long N) {
  return new int[N];
}

int main() {
  test(1L << 62);
}

We do this even when exceptions are disabled, because it is better for the
code to abort than for the attack to succeed.

This is heavily based on a patch that Fariborz wrote.

llvm-svn: 108915
2010-07-20 20:19:24 +00:00
clang implement rdar://5739832 - operator new should check for overflow in multiply, 2010-07-20 20:19:24 +00:00
compiler-rt Hand-tuning of single-precision soft-float comparison routines for ARM 2010-07-08 17:45:05 +00:00
libcxx A good start on extended posix regex. Loops working. Alternation working. Also update by-chapter completeness summary. 2010-07-16 19:08:36 +00:00
lldb Fix assertion conditions. 2010-07-20 18:41:11 +00:00
llvm Remove setDbgMetadata and getDbgMetadata; their users have been 2010-07-20 20:18:21 +00:00