)]}'
{
  "log": [
    {
      "commit": "7cc670637005e88e00be467c6c387112644a9209",
      "tree": "0141df753769639688cc216287be3f7f76d5cbdf",
      "parents": [
        "352853a53525ecb2a120dfa4e9aa03b3970df8ee"
      ],
      "author": {
        "name": "Evgenii Stepanov",
        "email": "eugenis@google.com",
        "time": "Tue Feb 05 18:43:34 2019 -0800"
      },
      "committer": {
        "name": "Evgenii Stepanov",
        "email": "eugenis@google.com",
        "time": "Wed Feb 06 13:59:16 2019 -0800"
      },
      "message": "Cleanup bionic tests with hwasan.\n\nThe tests were patched earlier to run with tagging heap allocator.\nThis change enables hwasan code instrumentation in the tests themselves,\nand fixes the issues that arise, mainly in the code that:\n* compares addresses of unrelated stack variables\n* compares address of a stack variable with stack limits as found in\n  /proc/self/maps\n* writes address of a stack variable to a hardware watchpoint register\netc.\n\nNote that static tests are broken at the moment, like all static\nbinaries. Dynamic tests pass 100% with this change.\n\nBug: 114279110, 124007027\nTest: SANITIZE_TARGET\u003dhwaddress; run dynamic bionic tests\n\nChange-Id: I68b8df9dd3e30b47734ddc083811a75a7f27deaa\n"
    },
    {
      "commit": "acd6f4f9f5d248345231542df91947b44a309c26",
      "tree": "56ebc05a9af0de40af4c624e722ca2e489d0c7f1",
      "parents": [
        "96bd339c51194bf56781ccc738fde8babd618fc6"
      ],
      "author": {
        "name": "Evgenii Stepanov",
        "email": "eugenis@google.com",
        "time": "Tue Nov 06 16:48:27 2018 -0800"
      },
      "committer": {
        "name": "Evgenii Stepanov",
        "email": "eugenis@google.com",
        "time": "Tue Nov 06 16:59:25 2018 -0800"
      },
      "message": "Disable a few bionic tests under HWASan.\n\n* HWASan report invalid use of the allocator api (like alignment not\nbeing power of two, or allocation size too large) in a way tests do not\nexpect.\n* Code in .preinit_array runs before HWASan shadow is initialized and\nneeds to be excluded from instrumentation.\n* It looks that mm system calls (mmap/mprotect/etc) will not allow\ntagged pointers. In fact, the use of mprotect on malloc()ed memory is\ndoubtful - one can imagine some kind of speculative load from such\nmemory, as compiler knows that it is addressable.\n\nBug: 114279110\nTest: bionic-unit-tests with hwasan\n\nChange-Id: I6ba4b46a0d554de77c923ad134cf156ce4ddba1b\n"
    },
    {
      "commit": "fdfcfce7c6392d32f95a9f776ecd13da205b906c",
      "tree": "2195834870f5c0ecda99c8f6354f974211eb6d66",
      "parents": [
        "1399759118f50071d499f88b18828e36aa2bad00"
      ],
      "author": {
        "name": "Christopher Ferris",
        "email": "cferris@google.com",
        "time": "Wed Sep 23 22:09:09 2015 -0700"
      },
      "committer": {
        "name": "Christopher Ferris",
        "email": "cferris@google.com",
        "time": "Thu Sep 24 14:17:36 2015 -0700"
      },
      "message": "Fix over read in strcpy/stpcpy/strcat.\n\nThis bug will happen when these circumstances are met:\n\n- Destination address \u0026 0x7 \u003d\u003d 1, strlen of src is 11, 12, 13.\n- Destination address \u0026 0x7 \u003d\u003d 2, strlen of src is 10, 11, 12.\n- Destination address \u0026 0x7 \u003d\u003d 3, strlen of src is 9, 10, 11.\n- Destination address \u0026 0x7 \u003d\u003d 4, strlen of src is 8, 9, 10.\n\nIn these cases, the dest alignment code does a ldr which reads 4 bytes,\nand it will read past the end of the source. In most cases, this is\nprobably benign, but if this crosses into a new page it could cause a\ncrash.\n\nFix the labels in the cortex-a9 strcat.\n\nModify the overread test to vary the dst alignment to expost this bug.\nAlso, shrink the strcat/strlcat overread cases since the dst alignment\nvariation increases the runtime too much.\n\nBug: 24345899\nChange-Id: Ib34a559bfcebd89861985b29cae6c1e47b5b5855\n"
    },
    {
      "commit": "4d44675283e6c92d3294592be4fce7c9d89c19b6",
      "tree": "8f579e86be057eba09185e7b5ebe91739c78008a",
      "parents": [
        "90de6820f736de1239b218ea2b63d15c38505e93"
      ],
      "author": {
        "name": "Pirama Arumuga Nainar",
        "email": "pirama@google.com",
        "time": "Thu Jul 09 10:15:15 2015 -0700"
      },
      "committer": {
        "name": "Pirama Arumuga Nainar",
        "email": "pirama@google.com",
        "time": "Thu Jul 09 10:15:15 2015 -0700"
      },
      "message": "Use delete[] to de-allocate pointers from new[]\n\nUpstream clang has a new diagnostic, \u0027-Wmismatched-new-delete\u0027 to\ngenerate a warning (that becomes an error with -Werror) when delete is\nused to deallocate pointers created with \u0027new[]\u0027.  This patch fixes\n\u0027delete\u0027s that trigger this warning/error.\n\nChange-Id: Id7b6f6c2df3e860e576de55e2f61f3d2be3a3986\n"
    },
    {
      "commit": "e5bbb6b6ab662503f06ceb20fa841d2e558d596d",
      "tree": "c031e82ae3400ce97aa416185c9118812569434c",
      "parents": [
        "ed45970ac5a182e512669cfa5c15b9f4fa783ad7"
      ],
      "author": {
        "name": "Christopher Ferris",
        "email": "cferris@google.com",
        "time": "Tue Dec 03 18:39:10 2013 -0800"
      },
      "committer": {
        "name": "Christopher Ferris",
        "email": "cferris@google.com",
        "time": "Tue Dec 03 18:42:41 2013 -0800"
      },
      "message": "Add strcmp/memcmp testing.\n\nBug: 9797008\nChange-Id: I11b1da060d29f7dacbb53f20a3e2082395b5bd8a\n"
    },
    {
      "commit": "b687ad3c3491fffe22507cafc9347e10cbf6bd31",
      "tree": "d854ac3533adc7268002f2ad299f4a6a9140b464",
      "parents": [
        "05ec00bf62ac168c9787a3d0640879ab3e502fe5"
      ],
      "author": {
        "name": "Christopher Ferris",
        "email": "cferris@google.com",
        "time": "Wed Nov 06 17:32:11 2013 -0800"
      },
      "committer": {
        "name": "Christopher Ferris",
        "email": "cferris@google.com",
        "time": "Fri Nov 15 10:36:21 2013 -0800"
      },
      "message": "Add new tests for memory/string routines.\n\nCreate a few generic testing functions to allow any memory/string tests\nto be created.\n\nAdd alignment tests for memcpy/memset/strcat/strcpy/strlen.\n\nAdd an overread test for memcpy/strcat/strcpy/strlen. This test attempts\nto verify that the functions do not read past the end of their buffers\n(src buffer in the case of src/dst functions).\n\nBug: 9797008\n\nChange-Id: Ib3223ca1b99e729ae8229adc2d03f4dc3103d97c\n"
    }
  ]
}
