search for: __msan_retval_tls

Displaying 9 results from an estimated 9 matches for "__msan_retval_tls".

2018 Feb 22
2
Memory sanitizer porting
...er: — still tries to partially instrument the blacklisted code; — does not check whether its global memory storage variables are already defined. The second issue, present in MemorySanitizer::initializeCallbacks, adds a second copy of storage global variables when compiling msan.cc (e.g. __emutls_v.__msan_retval_tls.63, __emutls_v.__msan_param_tls.65), and this results in an undefined reference during the linkage. Here the question is what was initially intended to be done. I know that compiling blacklisted asan runtime code with -fsanitize=address is just fine, and this is what Apple actually does in XNU KAS...
2018 Feb 22
0
Memory sanitizer porting
...ially instrument the blacklisted code; > — does not check whether its global memory storage variables are already > defined. > The second issue, present in MemorySanitizer::initializeCallbacks, adds a > second copy of storage global variables when compiling msan.cc (e.g. > __emutls_v.__msan_retval_tls.63, __emutls_v.__msan_param_tls.65), and this > results in an undefined reference during the linkage. > > Here the question is what was initially intended to be done. I know that > compiling blacklisted asan runtime code with -fsanitize=address is just > fine, and this is what Apple...
2018 Feb 25
1
Memory sanitizer porting
...blacklisted code; >> — does not check whether its global memory storage variables are already >> defined. >> The second issue, present in MemorySanitizer::initializeCallbacks, adds a >> second copy of storage global variables when compiling msan.cc (e.g. >> __emutls_v.__msan_retval_tls.63, __emutls_v.__msan_param_tls.65), and this >> results in an undefined reference during the linkage. >> >> Here the question is what was initially intended to be done. I know that >> compiling blacklisted asan runtime code with -fsanitize=address is just >> fine, an...
2016 Jul 13
2
[LLVM/Clang v3.8.1] Missing Git branches/tags and source-tarballs?
On Wed, Jul 13, 2016 at 04:48:51PM +0200, Sedat Dilek via llvm-dev wrote: > [ CCed all people who were involved in this thread ] > > Hi Tom, > > personally, I am interested to test the prebuilt-toolchains for > Ubuntu/xenial alias 16.04 LTS and Debian/Jessie v8.5.0 AMD64. > The available toolchains are incomplete and thus useless. > > Just as a fact: There is still no
2014 Feb 03
2
[LLVMdev] Weird msan problem
...tr (i64 add (i64 ptrtoint ([1000 x i64]* > @__msan_param_tls to i64), i64 16) to i64*), align 8, !dbg !7 > store i32 0, i32* inttoptr (i64 add (i64 ptrtoint ([1000 x i32]* > @__msan_param_origin_tls to i64), i64 16) to i32*), align 4, !dbg !7 > store i32 0, i32* bitcast ([8 x i64]* @__msan_retval_tls to i32*), align > 8, !dbg !7 > %118 = call i32 %117(i32* %116, i64 %87, i64 %107), !dbg !7, !julia_type > !9 > > > > On Sun, Feb 2, 2014 at 6:18 AM, Evgeniy Stepanov <eugeni.stepanov at gmail.com> > wrote: >> >> How is ccall() implemented? If it manually...
2014 Feb 05
2
[LLVMdev] Weird msan problem
...64]* >> > @__msan_param_tls to i64), i64 16) to i64*), align 8, !dbg !7 >> > store i32 0, i32* inttoptr (i64 add (i64 ptrtoint ([1000 x i32]* >> > @__msan_param_origin_tls to i64), i64 16) to i32*), align 4, !dbg !7 >> > store i32 0, i32* bitcast ([8 x i64]* @__msan_retval_tls to i32*), >> align >> > 8, !dbg !7 >> > %118 = call i32 %117(i32* %116, i64 %87, i64 %107), !dbg !7, >> !julia_type >> > !9 >> > >> > >> > >> > On Sun, Feb 2, 2014 at 6:18 AM, Evgeniy Stepanov < >> eugeni.stepanov...
2014 Feb 07
2
[LLVMdev] Weird msan problem
...param_tls to i64), i64 16) to i64*), align 8, !dbg !7 > >>> > store i32 0, i32* inttoptr (i64 add (i64 ptrtoint ([1000 x i32]* > >>> > @__msan_param_origin_tls to i64), i64 16) to i32*), align 4, !dbg !7 > >>> > store i32 0, i32* bitcast ([8 x i64]* @__msan_retval_tls to i32*), > >>> > align > >>> > 8, !dbg !7 > >>> > %118 = call i32 %117(i32* %116, i64 %87, i64 %107), !dbg !7, > >>> > !julia_type > >>> > !9 > >>> > > >>> > > >>> > > >&...
2014 Feb 02
2
[LLVMdev] Weird msan problem
How is ccall() implemented? If it manually sets up a stack frame, then it also needs to store argument shadow values in paramtls. I don't think there is an overflow, unless you have a _lot_ of arguments in a function call. On Sun, Feb 2, 2014 at 9:26 AM, Keno Fischer <kfischer at college.harvard.edu> wrote: > Also, I was looking at the instrumented LLVM code and I noticed that the
2014 Mar 07
3
[LLVMdev] [RFC] Add second "failure" AtomicOrdering to cmpxchg instruction
...mpxchg i32* %p, i32 %a, i32 %b seq_cst + %0 = cmpxchg i32* %p, i32 %a, i32 %b seq_cst seq_cst ret i32 %0 } @@ -46,16 +46,16 @@ entry: ; CHECK: icmp ; CHECK: br ; CHECK: @__msan_warning -; CHECK: cmpxchg {{.*}} seq_cst +; CHECK: cmpxchg {{.*}} seq_cst seq_cst ; CHECK: store i32 0, {{.*}} @__msan_retval_tls ; CHECK: ret i32 -; relaxed cmpxchg: bump up to "release" +; relaxed cmpxchg: bump up to "release monotonic" define i32 @CmpxchgMonotonic(i32* %p, i32 %a, i32 %b) sanitize_memory { entry: - %0 = cmpxchg i32* %p, i32 %a, i32 %b monotonic + %0 = cmpxchg i32* %p, i32 %a,...