summaryrefslogtreecommitdiff
path: root/sanitizers.c
diff options
context:
space:
mode:
authorAnestis Bechtsoudis <anestis@census-labs.com>2017-01-29 09:40:03 +0200
committerAnestis Bechtsoudis <anestis@census-labs.com>2017-01-29 09:40:03 +0200
commitc2722eee4ee0ecb511f66869869e52e362008ad6 (patch)
treea9b97e3fe3bd4f6cd896867e0ff41bf04c0b04e8 /sanitizers.c
parent1514d8cdeb41f507aec6840a0d9cb51ecb59cb73 (diff)
downloadhonggfuzz-c2722eee4ee0ecb511f66869869e52e362008ad6.tar.gz
Update comments
Signed-off-by: Anestis Bechtsoudis <anestis@census-labs.com>
Diffstat (limited to 'sanitizers.c')
-rw-r--r--sanitizers.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/sanitizers.c b/sanitizers.c
index a0bf9346..f0a6ceb0 100644
--- a/sanitizers.c
+++ b/sanitizers.c
@@ -20,24 +20,24 @@
#define STR(x) XSTR(x)
/*
- * All clang sanitizers except ASan can be activated for target binaries
- * with or without the matching runtime libraries (libcompiler_rt). If runtime
+ * All clang sanitizers, except ASan, can be activated for target binaries
+ * with or without the matching runtime library (libcompiler_rt). If runtime
* libraries are included in target fuzzing environment, we can benefit from the
* various Die() callbacks and abort/exit logic manipulation. However, some
- * setups (e.g. Android production ARM/ARM64 devices) enable sanitizers such as
- * UBSan without the runtime libraries. As such they default ftrap is activated
- * which is for most cases a SIGABRT. For such cases user needs to enable SIGABRT
- * monitoring flag, otherwise these crashes will be missed.
+ * setups (e.g. Android production ARM/ARM64 devices) enable sanitizers, such as
+ * UBSan, without the runtime libraries. As such, their default ftrap is activated
+ * which is for most cases a SIGABRT. For these cases end-user needs to enable
+ * SIGABRT monitoring flag, otherwise these crashes will be missed.
*
- * Normally SIGABRT is not a monitored signal for Android OS, since it produces
+ * Normally SIGABRT is not a wanted signal to monitor for Android, since it produces
* lots of useless crashes due to way Android process termination hacks work. As
* a result the sanitizer's 'abort_on_error' flag cannot be utilized since it
* invokes abort() internally. In order to not lose crashes a custom exitcode can
* be registered and monitored. Since exitcode is a global flag, it's assumed
* that target is compiled with only one sanitizer type enabled at a time.
*
- * For cases where clang runtime library linking is not an option SIGABRT should
- * be monitored even for noise targets, such as the Android OS, since not
+ * For cases where clang runtime library linking is not an option, SIGABRT should
+ * be monitored even for noisy targets, such as the Android OS, since no viable
* alternative exists.
*
* There might be cases where ASan instrumented targets crash while generating