llvm-project/compiler-rt/lib/asan
Alexander Potapenko cfb2a6b074 Remove the extra semicolon reported by the buildbot.
llvm-svn: 161954
2012-08-15 15:59:18 +00:00
..
lit_tests [ASan] lit tests: use nm instead of llvm-nm, until llvm-nm becomes usable on Mac. Port output test change in r161948 to lit 2012-08-15 14:33:30 +00:00
output_tests Check for filenames and numbers to detect possible problems with asan_symbolize.py on -fPIE binaries. 2012-08-15 14:00:09 +00:00
scripts Pass offset of the frame address within the binary to addr2line instead of the absolute address. 2012-08-15 13:58:24 +00:00
tests [asan] better diagnostics for mmap failure 2012-08-14 15:18:40 +00:00
CMakeLists.txt [ASan] CMake support for building ASan runtime as a universal binary on Mac 2012-08-10 14:45:52 +00:00
Makefile.mk [Sanitizer] Make ASan/TSan sources depend on headers from interception library 2012-08-01 14:55:49 +00:00
Makefile.old [asan] move tests from asan_interface_test.cc to asan_noinst_test.cc. Now all these tests do not require instrumentation and work directly with asan rt 2012-06-25 14:23:07 +00:00
README.txt Delete sysinfo/* and all references to it. 2012-01-18 11:42:30 +00:00
asan_allocator.cc Use SANITIZER_INTERFACE_ATTRIBUTE instead of __attribute__((visibility("default"))) 2012-08-15 11:57:52 +00:00
asan_allocator.h [ASan] move some functions that describe addresses to asan_report.cc 2012-08-09 09:06:52 +00:00
asan_flags.h [ASan] move declaration of __asan_default_options to interface header 2012-08-15 07:11:14 +00:00
asan_globals.cc [ASan] move code that describes globals to asan_report.cc 2012-08-09 09:27:24 +00:00
asan_intercepted_functions.h Remove the extra semicolon reported by the buildbot. 2012-08-15 15:59:18 +00:00
asan_interceptors.cc Introduce asan_intercepted_functions.h which contains the declarations wrapped functions and their wrappers. 2012-08-15 15:24:48 +00:00
asan_interceptors.h Lots of trivial changes to remove extraneous semicolons throughout ASan. 2012-06-25 06:53:10 +00:00
asan_interface.h [ASan] move declaration of __asan_default_options to interface header 2012-08-15 07:11:14 +00:00
asan_internal.h [ASan] move some functions that describe addresses to asan_report.cc 2012-08-09 09:06:52 +00:00
asan_linux.cc Intercept CFAllocator for each thread in the program. 2012-07-23 14:07:58 +00:00
asan_lock.h tsan/asan: unify ScopedLock 2012-06-29 17:10:08 +00:00
asan_mac.cc Move the prototype of __CFInitialize to asan_mac.h so that asan_malloc_mac.cc may use it in the dynamic library mode. 2012-08-15 12:23:36 +00:00
asan_mac.h Move the prototype of __CFInitialize to asan_mac.h so that asan_malloc_mac.cc may use it in the dynamic library mode. 2012-08-15 12:23:36 +00:00
asan_malloc_linux.cc [ASan] fix names of malloc/free replacements on Android 2012-08-06 15:13:22 +00:00
asan_malloc_mac.cc Remove the setjmp.h dependency, fix the comment. 2012-08-10 12:46:39 +00:00
asan_malloc_win.cc Remove file-type tags for .cc files in ASan run-time library 2012-06-04 13:50:10 +00:00
asan_mapping.h For wild addresses in the shadow or shadow gap areas print an error message instead of crashing on a check. 2012-07-23 08:22:27 +00:00
asan_new_delete.cc Remove file-type tags for .cc files in ASan run-time library 2012-06-04 13:50:10 +00:00
asan_poisoning.cc [ASan] Use common flags parsing machinery. 2012-07-09 14:36:04 +00:00
asan_posix.cc [ASan] Create new files asan_report.{h,cc} as a preparation for refactoring of ASan error reporting code. 2012-08-09 07:40:58 +00:00
asan_printf.cc [Sanitizer] Renaming: SNPrintf -> internal_snprintf (and move it to sanitizer libc) 2012-06-19 09:21:57 +00:00
asan_report.cc [ASan] Add __asan_set_on_error_callback() interface function that allows user to set a callback to be called right when ASan detects an error 2012-08-13 11:23:40 +00:00
asan_report.h [ASan] share code executed at the beginning/end of printing error reports 2012-08-10 15:13:05 +00:00
asan_rtl.cc Use SANITIZER_INTERFACE_ATTRIBUTE instead of __attribute__((visibility("default"))) 2012-08-15 11:57:52 +00:00
asan_stack.cc Patch the frame address regardless of the frame number. 2012-08-15 13:23:03 +00:00
asan_stack.h [ASan] Use common flags parsing machinery. 2012-07-09 14:36:04 +00:00
asan_stats.cc [Sanitizer]: Introduce a common internal printf function. For now, also use tool-specific wrappers TsanPrintf (its output is controlled by TSan flags) and AsanPrintf (which copies its results to the ASan-private buffer). Supported formats: %[z]{d,u,x}, %s, %p. Re-write all format strings in TSan according to this format (this should have no effect on 64-bit platforms). 2012-06-06 13:11:29 +00:00
asan_stats.h [asan] more renaming 2012-05-31 14:35:53 +00:00
asan_thread.cc Intercept CFAllocator for each thread in the program. 2012-07-23 14:07:58 +00:00
asan_thread.h [asan] get rid of the last operator new call in asan rtl 2012-07-17 07:20:13 +00:00
asan_thread_registry.cc [ASan] Use common flags parsing machinery. 2012-07-09 14:36:04 +00:00
asan_thread_registry.h [ASan] cmake cleanup: make tab/space padding in CMakeLists consistent, silence/fix some pedantic warnings 2012-07-02 06:48:10 +00:00
asan_win.cc Intercept CFAllocator for each thread in the program. 2012-07-23 14:07:58 +00:00

README.txt

AddressSanitizer RT
================================
This directory contains sources of the AddressSanitizer (asan) run-time library.
We are in the process of integrating AddressSanitizer with LLVM, stay tuned.

Directory structre:

README.txt       : This file.
Makefile.mk      : Currently a stub for a proper makefile. not usable.
Makefile.old     : Old out-of-tree makefile, the only usable one so far.
asan_*.{cc,h}    : Sources of the asan run-time lirbary.
mach_override/*  : Utility to override functions on Darwin (MIT License).
scripts/*        : Helper scripts.

Temporary build instructions (verified on linux):

cd lib/asan
make -f Makefile.old get_third_party  # gets googletest and cpplint
make -f Makefile.old test -j 8 CLANG_BUILD=/path/to/Release+Asserts
# Optional:
# make -f Makefile.old install # installs clang and rt to lib/asan_clang_linux

For more info see http://code.google.com/p/address-sanitizer/