search for: __asan_poison_memory_region

Displaying 4 results from an estimated 4 matches for "__asan_poison_memory_region".

2015 Nov 10
2
Docs for leak checker (and other sanitizers)?
On Mon, Nov 9, 2015 at 7:20 PM, Kostya Serebryany <kcc at google.com> wrote: > Most likely, you need > https://github.com/google/sanitizers/wiki/AddressSanitizerLeakSanitizer Thanks! > I don't think lsan supports this mode directly, > but why do you think that the init-time allocations are going to be > "leaked"? > If there is some object still pointing to
2017 Nov 08
3
[RFC] ASan: patches to support 32-byte shadow granularity
...tests/asan_asm_test.cc compiler-rt/test/asan/TestCases/Linux/asan-asm-stacktrace-test.cc - Prelinking not supported: compiler-rt/test/asan/TestCases/Linux/asan_prelink_test.cc - Intra-object padding not supported: compiler-rt/test/asan/TestCases/intra-object-overflow.cc - Calls __asan_poison_memory_region in middle of shadow byte: compiler-rt/lib/asan/tests/asan_interface_test.cc SimplePoisonMemoryRegionTest OverlappingPoisonMemoryRegionTest PoisoningStressTest compiler-rt/test/asan/TestCases/small_memcpy_test.cc compiler-rt/test/asan/TestCases/strtol_strict.c compi...
2017 Oct 31
2
[RFC] ASan: patches to support 32-byte shadow granularity
...ors: it seems sensible not to insert 32-byte sentinels between every object, but the result is that some stack overflow gets reported as unknown or use-after-scope. I have a patch that improves on the default behavior, but there remains cases where the error reports will not be as good. - __asan_poison_memory_region is now more limited. A typical case that doesn't work is the poisoning of 8-byte or 16-byte that maps to the middle of a shadow byte. For testing, I have a few questions: - Would it make sense to provide an internal compiler flag to set the shadow granularity, so that there we can at l...
2017 Oct 31
1
[RFC] ASan: patches to support 32-byte shadow granularity
...I have a patch that > improves on the default behavior, but there remains cases where the > error reports will not be as good. > Hmm. Not sure what's the problem here. It's totally fine to insert 32-byte redzone around stack objects. (in 32-byte granularity mode) > > - __asan_poison_memory_region is now more limited. A typical case > that doesn't work is the poisoning of 8-byte or 16-byte that maps to > the middle of a shadow byte. > yep. > > For testing, I have a few questions: > > - Would it make sense to provide an internal compiler flag to set the >...