Michael Kolupaev
ce7eca0615
DWARF input format ( #55450 )
...
* Add ReadBufferFromFileBase::isRegularLocalFile()
* DWARF input format
* Review comments
* Changed things around ENABLE_EMBEDDED_COMPILER build setting
* Added 'ranges' column
* no-msan no-ubsan
2023-10-16 17:00:07 -07:00
Robert Schulze
3a3a00f95e
Bump minimal required compiler to Clang 16
2023-09-18 17:44:04 +00:00
Robert Schulze
4d06246cd4
Merge branch 'master' into clean-out-msan-suppression
2023-05-22 17:25:29 +02:00
Amos Bird
6b4dcbd3ed
Use PROJECT_*_DIR instead of CMAKE_*_DIR.
2023-05-18 23:23:39 +08:00
Robert Schulze
c28bb963b5
Remove -fsanitize-blacklist
2023-05-13 15:48:36 +00:00
Azat Khuzhin
184efcb77a
Get back -fno-sanitize-address-use-after-scope quirk for llvm/clang-15
...
Signed-off-by: Azat Khuzhin <a.khuzhin@semrush.com>
2023-05-09 20:35:43 +02:00
Azat Khuzhin
e278081344
Revert "Merge pull request #43195 from ClickHouse/workaround-for-llvm-bug"
...
With clang 16 this workaround should not be required anymore.
This reverts commit 992729f3c0
, reversing
changes made to d885b3cc4c
.
2023-05-08 22:54:04 +02:00
Robert Schulze
150ea22a12
CMake: Remove dead code paths
2023-04-26 19:40:59 +00:00
alesapin
bb21461145
Try to fix with pie
2023-04-25 15:45:23 +02:00
Robert Schulze
1477887259
Initial removal of logic under COMPILER_GCC
2023-04-11 16:27:32 +00:00
Robert Schulze
27f5aad49e
What happens if I remove 156 lines of code?
2023-01-03 18:51:16 +00:00
Alexey Milovidov
f5270a6ebe
A workaround for LLVM bug, https://github.com/llvm/llvm-project/issues/58633
2022-11-13 04:51:46 +01:00
Nikita Mikhaylov
8fcbef938b
Fix typo in cmake code related to fuzzing ( #42627 )
2022-10-24 23:01:06 +02:00
Azat Khuzhin
4a0facd341
Remove MAKE_STATIC_LIBRARIES (in favor of USE_STATIC_LIBRARIES)
...
There is no more MAKE_*, so remove this alias.
Signed-off-by: Azat Khuzhin <a.khuzhin@semrush.com>
2022-01-24 17:28:33 +03:00
Nikita Mikhaylov
f0f4737676
Added -no-sanitize=unsigned-integer-overflow build flag ( #31881 )
2021-11-27 17:39:13 +03:00
Azat Khuzhin
d83ea5844f
Enable use-after-destruction detection in MSan
...
Refs: https://clang.llvm.org/docs/MemorySanitizer.html#use-after-destruction-detection
2021-04-28 23:02:52 +03:00
Azat Khuzhin
c862ae0c42
Explicitly link with -llib$SANITIZER for gcc
...
gcc with -nodefaultlibs does not add sanitizers library during linkage
with -static-libasan and similar, fix this, by add them explicitly.
From the gcc(1) about -nodefaultlibs:
Do not use the standard system libraries when linking. Only the
libraries you specify are passed to the linker, and options specifying
linkage of the system libraries, such as -static-libgcc or
-shared-libgcc, are ignored. The standard startup files are used
normally, unless -nostartfiles is used.
Plus checked it manually, w/o -nodefaultlibs everything works without
this explicit linkage.
After this patch UBSAN under gcc compiled successfully.
v2: freebsd and darwin
2020-12-16 21:31:03 +03:00
Azat Khuzhin
90df89b504
cmake/sanitizers.cmake: tiny refactoring
2020-12-16 21:31:03 +03:00
Azat Khuzhin
8de0c0e8fc
Fix warning message for unusupported -fsanitize-blacklist
2020-12-15 02:29:09 +03:00
Azat Khuzhin
519d89dc9f
Do not pass -fsanitize-blacklist for gcc (it does not support it) for UBSAN
2020-12-15 02:24:28 +03:00
Alexey Milovidov
5e502c52b3
Merge branch 'master' into AES_encrypt_decrypt
2020-10-14 16:30:23 +03:00
myrrc
c78d9f9f38
moved the generators to docs/ folder
2020-09-19 19:42:36 +03:00
Alexey Milovidov
799a675b5d
Merge branch 'master' into AES_encrypt_decrypt
2020-09-17 21:42:51 +03:00
myrrc
7cd5c0d34f
Merge remote-tracking branch 'upstream/master' into feature/cmake-flags-doc-generator
2020-09-17 19:17:09 +03:00
myrrc
ac606dca77
updated cmake/ files, added some comments
2020-09-17 18:37:23 +03:00
Azat Khuzhin
0f4fdcbf38
Pass -fsanitize-blacklist for TSAN only under clang (gcc does not support this)
...
And no such check for -fsnaitize=memory, since gcc does not support it
anyway.
2020-09-10 02:07:28 +03:00
Vasily Nemkov
b147ffcd43
encrypt, aes_encrypt_mysql, decrypt, aes_decrypt_mysql functions
...
Functions to encrypt/decrypt any input data with OpenSSL's ciphers
with custom key, iv, and add (-gcm mode only).
_mysql versions are 100% compatitable with corresponding MySQL functions
Supported modes depend on OpenSSL version, but generally are:
aes-{128,192,56}-{ecb,cbc,cfb1,cfb8,cfb128,ofb,gcm}
Please note that in a -gcm mode a 16-byte tag is appended to the ciphertext
on encryption and is expected to be found at the end of ciphertext on decryption.
Added tests that verify compatibility with MySQL functions,
and test vectors for GCM mode from OpenSSL.
Added masking rules for aes_X funtions
Rules are installed by default to config.d/query_masking_rules.xml
2020-09-01 12:42:15 +03:00
Alexey Milovidov
99e64729bb
Remove obsolete TSan suppressions
2020-05-11 10:05:46 +03:00
Eldar Zaitov
d7a037c26b
split fuzzers and sanitizers
2020-04-25 10:12:38 +03:00
Ivan
97f2a2213e
Move all folders inside /dbms one level up ( #9974 )
...
* Move some code outside dbms/src folder
* Fix paths
2020-04-02 02:51:21 +03:00
tavplubix
3b770d8b1b
Fix stateless tests with msan ( #9531 )
...
* try run tests
* try fix build
* try enable other libraries
* suppress some msan warnings
* Update msan_suppressions.txt
* Update msan_suppressions.txt
* use function names in suppressions list
* update submodule
2020-03-08 12:32:22 +03:00
Alexey Milovidov
59d9bfa71e
Enable Avro with Memory Sanitizer
2020-01-23 21:47:17 +03:00
Alexey Milovidov
76e04b9843
Merge branch 'avro' of https://github.com/oandrew/ClickHouse into oandrew-avro
2020-01-18 21:23:55 +03:00
Alexey Milovidov
c0a5c664a9
Replace readline to replxx: docs and corrections
2020-01-18 18:44:08 +03:00
Andrew Onyshchuk
7320447f92
Add Avro formats
...
Add Avro file input/output formats
Add AvroConfluent input format (for Kafka)
2020-01-08 03:18:00 -06:00
Alexey Milovidov
a7ef9e911a
Fixed UBSan check in CI
2019-12-18 18:30:23 +03:00
Alexey Milovidov
c8e19f8bc8
Enable ICU for build with Memory Sanitizer
2019-12-15 20:53:16 +03:00
Alexander Kuzmenkov
f0ed2bd233
Suppress an msan false positive in exception handling.
...
See https://github.com/google/sanitizers/issues/1155
2019-12-12 21:28:58 +03:00
Amos Bird
dbc352fdf9
glibc 2.29 compatibility
2019-09-30 12:28:50 +08:00
Alexander Kuzmenkov
6e32553e01
Add a comment about MemorySanitizer options.
2019-09-24 22:00:47 +03:00
Alexander Kuzmenkov
8ca6d6ed5d
Prepare for MemorySanitizer build in CI.
...
This is a preparatory commit just to get the msan build running in some
shape. It disables many external libraries that are not yet tested.
2019-09-23 21:11:28 +03:00
alexey-milovidov
b0dd36db7c
Update sanitize.cmake
2019-09-23 00:22:22 +03:00
alexey-milovidov
c5f9b4ad0a
Update sanitize.cmake
2019-09-23 00:21:41 +03:00
Eldar Zaitov
b174833bdf
Initial fuzzing support with libfuzzer
2019-09-22 13:34:09 +03:00
Alexey Milovidov
9b901c50a3
Fixed error with libcxx build #3949
2018-12-29 02:42:39 +03:00
Alexey Milovidov
6d2206e25b
Preparations for MSan [#CLICKHOUSE-2]
2018-12-28 07:40:28 +03:00
Alexey Milovidov
bd9cd5c61b
Using libcxx as a submodule [#CLICKHOUSE-2]
2018-12-28 06:25:04 +03:00
Alexey Milovidov
7b1d6df25f
Merge remote-tracking branch 'origin/master' into ubsan-fixes-3
2018-09-02 23:42:15 +03:00
Alexey Milovidov
198dd78100
Added -fno-sanitize-recover [#CLICKHOUSE-2]
2018-09-02 22:47:04 +03:00
Alexey Milovidov
5ff8b2da04
Added useful option with ASan [#CLICKHOUSE-2]
2018-09-02 22:44:34 +03:00