forked from OSchip/llvm-project
3efd1c516c
Summary: This patch (on top of the previous two (https://reviews.llvm.org/D40898 and https://reviews.llvm.org/D40899) complete the compiler-rt side of the the Solaris sanitizer port. It contains the following sets of changes: * For the time being, the port is for 32-bit x86 only, so reject the various tests on x86_64. * When compiling as C++, <setjmp.h> resp. <iso/setjmp_iso.h> only declares _setjmp and _longjmp inside namespace std. * MAP_FILE is a Windows feature. While e.g. Linux <sys/mman.h> provides a no-op compat define, Solaris does not. * test/asan/TestCases/Posix/coverage.cc was initially failing like this: /vol/gcc/src/llvm/llvm/local/projects/compiler-rt/lib/sanitizer_common/scripts/sancov.py: 4 files merged; 2 PCs total rm: cannot remove '/var/gcc/llvm/local/projects/compiler-rt/test/asan/I386SunOSConfig/TestCases/Posix/Output/coverage': Invalid argument Further digging revealed that the rm was trying to remove the running test's working directory which failed as observed. cd'ing out of the dir before let the test pass. * Two tests needed a declaration of alloca. I've now copied the existing code from test/asan/TestCases/alloca_constant_size.cc, but it may be more profitable and maintainable to have a common testsuite header where such code is collected. * Similarly, Solaris' printf %p format doesn't include the leading 0x. * In test/asan/TestCases/malloc-no-intercept.c, I had to undef __EXTENSIONS__ (predefined by clang for no apparent reason) to avoid conflicting declarations for memalign. * test/ubsan/TestCases/Float/cast-overflow.cpp has different platform dependent ways to define BYTE_ORDER and friends. Why not just use __BYTE_ORDER__ and friends as predefined by clang and gcc? Patch by Rainer Orth. Reviewers: kcc, alekseyshl Reviewed By: alekseyshl Subscribers: srhines, kubamracek, mgorny, krytarowski, fedor.sergeev, JDevlieghere, llvm-commits, #sanitizers Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D40900 llvm-svn: 322635 |
||
---|---|---|
.. | ||
scripts | ||
tests | ||
.clang-format | ||
CMakeLists.txt | ||
README.txt | ||
asan.syms.extra | ||
asan_activation.cc | ||
asan_activation.h | ||
asan_activation_flags.inc | ||
asan_allocator.cc | ||
asan_allocator.h | ||
asan_blacklist.txt | ||
asan_debugging.cc | ||
asan_descriptions.cc | ||
asan_descriptions.h | ||
asan_errors.cc | ||
asan_errors.h | ||
asan_fake_stack.cc | ||
asan_fake_stack.h | ||
asan_flags.cc | ||
asan_flags.h | ||
asan_flags.inc | ||
asan_fuchsia.cc | ||
asan_globals.cc | ||
asan_globals_win.cc | ||
asan_init_version.h | ||
asan_interceptors.cc | ||
asan_interceptors.h | ||
asan_interceptors_memintrinsics.cc | ||
asan_interceptors_memintrinsics.h | ||
asan_interface.inc | ||
asan_interface_internal.h | ||
asan_internal.h | ||
asan_linux.cc | ||
asan_lock.h | ||
asan_mac.cc | ||
asan_malloc_linux.cc | ||
asan_malloc_mac.cc | ||
asan_malloc_win.cc | ||
asan_mapping.h | ||
asan_memory_profile.cc | ||
asan_new_delete.cc | ||
asan_poisoning.cc | ||
asan_poisoning.h | ||
asan_posix.cc | ||
asan_preinit.cc | ||
asan_premap_shadow.cc | ||
asan_premap_shadow.h | ||
asan_report.cc | ||
asan_report.h | ||
asan_rtl.cc | ||
asan_scariness_score.h | ||
asan_shadow_setup.cc | ||
asan_stack.cc | ||
asan_stack.h | ||
asan_stats.cc | ||
asan_stats.h | ||
asan_suppressions.cc | ||
asan_suppressions.h | ||
asan_thread.cc | ||
asan_thread.h | ||
asan_win.cc | ||
asan_win_dll_thunk.cc | ||
asan_win_dynamic_runtime_thunk.cc | ||
asan_win_weak_interception.cc | ||
weak_symbols.txt |
README.txt
AddressSanitizer RT ================================ This directory contains sources of the AddressSanitizer (ASan) runtime library. Directory structure: README.txt : This file. Makefile.mk : File for make-based build. CMakeLists.txt : File for cmake-based build. asan_*.{cc,h} : Sources of the asan runtime library. scripts/* : Helper scripts. tests/* : ASan unit tests. Also ASan runtime needs the following libraries: lib/interception/ : Machinery used to intercept function calls. lib/sanitizer_common/ : Code shared between various sanitizers. ASan runtime currently also embeds part of LeakSanitizer runtime for leak detection (lib/lsan/lsan_common.{cc,h}). ASan runtime can only be built by CMake. You can run ASan tests from the root of your CMake build tree: make check-asan For more instructions see: https://github.com/google/sanitizers/wiki/AddressSanitizerHowToBuild