Overflow sanitization in frameworks/ and system/.
Enables signed and unsigned integer overflow sanitization on-by-default for modules in frameworks/ and system/ by using the integer_overflow sanitization setting. This applies sanitization to dynamically linked binaries and shared libraries, and comes with a default set of regex for functions to exclude from sanitization. (see build/soong/cc/config/integer_overflow_blacklist.txt) Prepare to enable minimal runtime diagnostics for integer overflow sanitization on userdebug and eng builds. Adds an additional Make and product variable pair to apply integer overflow sanitization by default to additional code paths. Bug: 30969751 Bug: 63927620 Test: Included paths are being sanitized. Test: CTS test suite run on Pixel, runtime errors resolved. Test: Performance impact in benchmarks acceptable. Test: Boot-up successful on current Google devices. Test: Teamfooded in diagnostics mode on Pixel for a month. Test: Phone calls, camera photos + videos, bluetooth pairing. Test: Wifi, work profiles, streaming videos, app installation. Test: Split-screen, airplane mode, battery saver. Test: Toggling accessibility settings. Change-Id: Icc7a558c86f8655267afb4ca01b316773325c91a
Loading
Please register or sign in to comment