diff options
author | Ilya Leoshkevich <iii@linux.ibm.com> | 2020-03-26 13:35:09 +0100 |
---|---|---|
committer | Ulrich Weigand <ulrich.weigand@de.ibm.com> | 2020-03-26 13:35:09 +0100 |
commit | 2ca7fe3796475ec5afc1c804a3f92abbfa4cb2f9 (patch) | |
tree | f29bfaa0e71dff4d37906c82ba75736cf599c387 /clang/lib/FrontendTool/ExecuteCompilerInvocation.cpp | |
parent | dc37287320cc074a49d73035674891be06c65a42 (diff) | |
download | llvm-2ca7fe3796475ec5afc1c804a3f92abbfa4cb2f9.zip llvm-2ca7fe3796475ec5afc1c804a3f92abbfa4cb2f9.tar.gz llvm-2ca7fe3796475ec5afc1c804a3f92abbfa4cb2f9.tar.bz2 |
[compiler-rt] Use uname syscall in GetKernelAreaSize()
Commit 5f5fb56c68e4 ("[compiler-rt] Intercept the uname() function")
broke clang-cmake-thumbv7-full-sh build:
http://lab.llvm.org:8011/builders/clang-cmake-thumbv7-full-sh/builds/4296
This also affects i386.
The reason is that intercepted uname() is called by GetKernelAreaSize()
during ASAN initialization on 32-bit platforms, but the respective
interceptor is not initialized yet at this point, leading to null
pointer dereference.
Introduce internal_uname() wrapper around uname syscall, and use it in
GetKernelAreaSize() and in FixedCVE_2016_2143().
Author: Ilya Leoshkevich
Reviewed By: Evgenii Stepanov
Differential Revision: https://reviews.llvm.org/D76776
Diffstat (limited to 'clang/lib/FrontendTool/ExecuteCompilerInvocation.cpp')
0 files changed, 0 insertions, 0 deletions