forked from OSchip/llvm-project
c8dda336bb
In short, CVE-2016-2143 will crash the machine if a process uses both >4TB virtual addresses and fork(). ASan, TSan, and MSan will, by necessity, map a sizable chunk of virtual address space, which is much larger than 4TB. Even worse, sanitizers will always use fork() for llvm-symbolizer when a bug is detected. Disable all three by aborting on process initialization if the running kernel version is not known to contain a fix. Unfortunately, there's no reliable way to detect the fix without crashing the kernel. So, we rely on whitelisting - I've included a list of upstream kernel versions that will work. In case someone uses a distribution kernel or applied the fix themselves, an override switch is also included. Differential Revision: http://reviews.llvm.org/D18915 llvm-svn: 266297 |
||
---|---|---|
.. | ||
scripts | ||
tests | ||
.clang-format | ||
CMakeLists.txt | ||
README.txt | ||
asan.syms.extra | ||
asan_activation.cc | ||
asan_activation.h | ||
asan_activation_flags.inc | ||
asan_allocator.cc | ||
asan_allocator.h | ||
asan_blacklist.txt | ||
asan_debugging.cc | ||
asan_fake_stack.cc | ||
asan_fake_stack.h | ||
asan_flags.cc | ||
asan_flags.h | ||
asan_flags.inc | ||
asan_globals.cc | ||
asan_init_version.h | ||
asan_interceptors.cc | ||
asan_interceptors.h | ||
asan_interface_internal.h | ||
asan_internal.h | ||
asan_linux.cc | ||
asan_lock.h | ||
asan_mac.cc | ||
asan_malloc_linux.cc | ||
asan_malloc_mac.cc | ||
asan_malloc_win.cc | ||
asan_mapping.h | ||
asan_new_delete.cc | ||
asan_poisoning.cc | ||
asan_poisoning.h | ||
asan_posix.cc | ||
asan_preinit.cc | ||
asan_report.cc | ||
asan_report.h | ||
asan_rtl.cc | ||
asan_scariness_score.h | ||
asan_stack.cc | ||
asan_stack.h | ||
asan_stats.cc | ||
asan_stats.h | ||
asan_suppressions.cc | ||
asan_suppressions.h | ||
asan_thread.cc | ||
asan_thread.h | ||
asan_win.cc | ||
asan_win_dll_thunk.cc | ||
asan_win_dynamic_runtime_thunk.cc |
README.txt
AddressSanitizer RT ================================ This directory contains sources of the AddressSanitizer (ASan) runtime library. Directory structure: README.txt : This file. Makefile.mk : File for make-based build. CMakeLists.txt : File for cmake-based build. asan_*.{cc,h} : Sources of the asan runtime library. scripts/* : Helper scripts. tests/* : ASan unit tests. Also ASan runtime needs the following libraries: lib/interception/ : Machinery used to intercept function calls. lib/sanitizer_common/ : Code shared between various sanitizers. ASan runtime currently also embeds part of LeakSanitizer runtime for leak detection (lib/lsan/lsan_common.{cc,h}). ASan runtime can only be built by CMake. You can run ASan tests from the root of your CMake build tree: make check-asan For more instructions see: https://github.com/google/sanitizers/wiki/AddressSanitizerHowToBuild