Go to file
Kostya Serebryany 4ee6904288 [clang/asan] call __asan_poison_cxx_array_cookie after operator new[]
Summary:
PR19838
When operator new[] is called and an array cookie is created
we want asan to detect buffer overflow bugs that touch the cookie.
For that we need to
  a) poison the shadow for the array cookie (call __asan_poison_cxx_array_cookie).
  b) ignore the legal accesses to the cookie generated by clang (add 'nosanitize' metadata)

Reviewers: timurrrr, samsonov, rsmith

Reviewed By: rsmith

Subscribers: cfe-commits

Differential Revision: http://reviews.llvm.org/D4774

llvm-svn: 216434
2014-08-26 02:29:59 +00:00
clang [clang/asan] call __asan_poison_cxx_array_cookie after operator new[] 2014-08-26 02:29:59 +00:00
clang-tools-extra Update for LLVM api change 2014-08-25 18:17:00 +00:00
compiler-rt [sanitizer] move mlock interceptor from asan/tsan/msan to common; no functionality change intended 2014-08-25 20:57:59 +00:00
debuginfo-tests
libclc Revert "Implement generic mad_sat" 2014-08-23 14:06:01 +00:00
libcxx Replace 'noexcept' with '_NOEXCEPT' in <shared_mutex>. This allows us to build the dylib with MSVC, which doesn't support noexcept (sheesh\!). Thanks to K-ballo for the report. 2014-08-25 14:53:16 +00:00
libcxxabi
lld [PECOFF] Add /HighEntropyVA. 2014-08-25 22:23:34 +00:00
lldb Remove trailing whitespace from lines in UnwindAssembly-x86.cpp. No other changes. 2014-08-25 23:46:06 +00:00
llvm Revert "AArch64: use std::vector for temp array" 2014-08-26 02:03:43 +00:00
openmp
polly Update for LLVM api change 2014-08-25 18:16:52 +00:00