search for: asan_options

Displaying 20 results from an estimated 46 matches for "asan_options".

2014 Dec 05
3
[LLVMdev] [RFC] Parsing runtime flags in sanitizers (ASan/LSan/UBSan)
.... It all works fine until we have a single sanitizer - e.g. for TSan or MSan. The situation gets crazy when we combine multiple sanitizers in a single process, for instance use ASan+LSan+UBSan (the default use case in some setups). Each tool has its own defaults for common flag values, and each of ASAN_OPTIONS, LSAN_OPTIONS and UBSAN_OPTIONS can define both tool-specific and common flags. These environment variables are parsed at different time, sometimes in undefined order. We can easily end up in situation where ASan initializes some parts of sanitizer_common assuming certain values of common runtime f...
2014 Dec 08
2
[LLVMdev] [RFC] Parsing runtime flags in sanitizers (ASan/LSan/UBSan)
...e.g. for TSan or MSan. > > > > The situation gets crazy when we combine multiple sanitizers in a single > > process, for instance use ASan+LSan+UBSan (the default use case in some > > setups). Each tool has its own defaults for common flag values, and each > of > > ASAN_OPTIONS, LSAN_OPTIONS and UBSAN_OPTIONS can define both > tool-specific > > and common flags. These environment variables are parsed at different > time, > > sometimes in undefined order. We can easily end up in situation where > ASan > > initializes some parts of sanitizer_commo...
2014 Apr 22
5
[LLVMdev] Building sanitizers for Android
...e flags are not added and clang finds the libs via its hardcoded '-L' flag. Yury wrote: > It's not that easy. Some tests require passing environment variables As Evgeniy mentioned, it's a short enough list of variables that you can whitelist them. LD_PRELOAD, LD_LIBRARY_PATH, ASAN_OPTIONS, etc. Evgeniy wrote: > Greg, do you copy binaries to the device on %clang or on %run? %run. Can you point me to a case where you needed to override %clang for that? Thanks, Greg On Mon, Apr 21, 2014 at 12:54 AM, Evgeniy Stepanov <eugenis at google.com> wrote: > Both %run and my sy...
2013 Jun 04
2
[LLVMdev] Address Sanitizer on Android
...ge its Android.mk it compiles in a few seconds and without needing any additional dependencies. When I run 'djpeg' on JellyBean, ASan reports the error message below. Can you please help me interpret it? Do you know what I might be doing wrong? $ adb shell "cd /data/data && ASAN_OPTIONS=debug=1,verbosity=1 LD_PRELOAD=libclang_rt.asan-arm-android.so LD_LIBRARY_PATH=. ./djpeg ./testimg.jpg" ==28210==Parsed ASAN_OPTIONS: debug=1,verbosity=1 ==28210==AddressSanitizer: libc interceptors initialized || `[0x20000000, 0xffffffff]` || HighMem || || `[0x04000000, 0x1fffffff]` || Hi...
2013 Aug 19
2
[LLVMdev] [cfe-dev] -fsanitize=address on centos 6.4
+llvmdev (llvm-dev does not exist) On Mon, Aug 19, 2013 at 12:58 PM, Sergey Matveev <earthdok at google.com>wrote: > > First, could you please run the test with env.var. > ASAN_OPTIONS=verbosity=1 > > No need for that, actually, since this is a familiar issue. Sharma, could > you please paste the output of "ldd --version" here? > > Sergey > > > On Mon, Aug 19, 2013 at 12:53 PM, Kostya Serebryany <kcc at google.com>wrote: > >> +llvm...
2013 Jun 04
0
[LLVMdev] Address Sanitizer on Android
...a few seconds and without needing any additional > dependencies. > > When I run 'djpeg' on JellyBean, ASan reports the error message below. > Can you please help me interpret it? Do you know what I might be > doing wrong? > > $ adb shell "cd /data/data && ASAN_OPTIONS=debug=1,verbosity=1 > LD_PRELOAD=libclang_rt.asan-arm-android.so LD_LIBRARY_PATH=. ./djpeg > ./testimg.jpg" > > ==28210==Parsed ASAN_OPTIONS: debug=1,verbosity=1 > ==28210==AddressSanitizer: libc interceptors initialized > || `[0x20000000, 0xffffffff]` || HighMem || > |...
2017 Mar 07
2
sancov reporting all locations as <invalid>:0
...fuzzer using libFuzzer and I wanted to take a look at how my coverage was doing, as per the instructions here: http://llvm.org/docs/LibFuzzer.html#how-good-is-my-fuzzer First of all, I suspect the instructions there are out of date, but passing -dump_coverage=1 to the binary rather than setting ASAN_OPTIONS generated a .sancov file for me. However, when I inspect this with the sancov tool, all of the line numbers it reports are "<invalid>:0". I can list the covered and uncovered functions successfully, but without locations it's really hard to do anything with that information. I...
2015 Jan 14
2
[LLVMdev] How do I add suppressions to LSan when testing LLVM with ASan enabled?
I get leaks from a system library: ==16272==ERROR: LeakSanitizer: detected memory leaks Direct leak of 148 byte(s) in 2 object(s) allocated from: #0 0x4a3172 in __interceptor_malloc .../build/../projects/compiler-rt/lib/asan/asan_malloc_linux.cc:40:3 #1 0x7f575d8df1fe in wcsdup (/lib64/libedit.so.0+0x1c1fe) I don't think I can fix this... ;] -Chandler -------------- next part
2014 Oct 08
3
[LLVMdev] More ARM asan failures - Line number
On 7 October 2014 20:55, Evgeniy Stepanov <eugenis at google.com> wrote: > Can you elaborate on this? Does it ever clean those lines? These > numbers are correct on multiple other platforms. I wonder if it's some > codegen peculiarity that leads to this off-by-one mistake? Can you go > down to the individual compile/run invocation and verify that line > numbers match (or
2017 Mar 07
2
sancov reporting all locations as <invalid>:0
...wanted to take a look at > how my coverage was doing, as per the instructions here: > > http://llvm.org/docs/LibFuzzer.html#how-good-is-my-fuzzer > > First of all, I suspect the instructions there are out of date, but > passing -dump_coverage=1 to the binary rather than setting ASAN_OPTIONS > generated a .sancov file for me. > > However, when I inspect this with the sancov tool, all of the line > numbers it reports are "<invalid>:0". I can list the covered and > uncovered functions successfully, but without locations it's really hard > to do anyth...
2013 Aug 19
2
[LLVMdev] [cfe-dev] -fsanitize=address on centos 6.4
...sh; llvmdev at cs.uiuc.edu Subject: Re: [cfe-dev] -fsanitize=address on centos 6.4 +llvmdev (llvm-dev does not exist) On Mon, Aug 19, 2013 at 12:58 PM, Sergey Matveev <earthdok at google.com<mailto:earthdok at google.com>> wrote: > First, could you please run the test with env.var. ASAN_OPTIONS=verbosity=1 No need for that, actually, since this is a familiar issue. Sharma, could you please paste the output of "ldd --version" here? Sergey On Mon, Aug 19, 2013 at 12:53 PM, Kostya Serebryany <kcc at google.com<mailto:kcc at google.com>> wrote: +llvm-dev, earthdok at...
2017 Mar 07
2
sancov reporting all locations as <invalid>:0
...wanted to take a look at > how my coverage was doing, as per the instructions here: > > http://llvm.org/docs/LibFuzzer.html#how-good-is-my-fuzzer > > First of all, I suspect the instructions there are out of date, but > passing -dump_coverage=1 to the binary rather than setting ASAN_OPTIONS > generated a .sancov file for me. > > However, when I inspect this with the sancov tool, all of the line > numbers it reports are "<invalid>:0". I can list the covered and > uncovered functions successfully, but without locations it's really hard > to do anyth...
2014 May 30
3
[LLVMdev] Porting ASan to AArch64
Hello, I have been working on porting ASan to AArch64. I am building compiler-rt in "standalone mode" targeting aarch64. My build is successful, but I get the following runtime error when I run an ASan enabled executable through qemu-aarch64: ==29184==Parsed ASAN_OPTIONS: verbosity=1 ==29184==AddressSanitizer: failed to intercept '__isoc99_printf' ==29184==AddressSanitizer: failed to intercept '__isoc99_sprintf' ==29184==AddressSanitizer: failed to intercept '__isoc99_snprintf' ==29184==AddressSanitizer: failed to intercept '__isoc99_fpr...
2014 Oct 08
2
[LLVMdev] More ARM asan failures - Line number
On 8 October 2014 11:18, Evgeniy Stepanov <eugenis at google.com> wrote: > Something you could try: ASAN_OPTIONS=fast_unwind_on_malloc=0 should > switch to cfi unwinder and fix the stack trace, but that's not a > solution to the problem. Is this when compiling Clang? The file? or running the final binary? --renato
2020 Feb 03
2
ASAN not finding any bugs?
Hello, I am building sanitizers for our different platforms and trying to use it in an example program, but while it seems like ASAN is running it's init functions (see stdout below with ASAN_OPTIONS=verbosity=1) it never catches anything in the program. This is LLVM 8.0.1 btw. I was using this small test case: int main(int argc, char** argv) { int *array = new int[100]; delete [] array; return array[argc]; // BOOM } I am compiling with: clang++ -resource-dir <path to sanitizers&...
2016 Feb 11
3
Buildling with/without AddressSanitizer causes divergent execution behaviour
...an you somehow verify that this heap-use-after-free is happening? > E.g. print all the pointer values coming from memory::allocate, coming into > memory::deallocate, and coming into sat::clause::operator[] > > If curious, check what size of quarantine is required to catch this bug > (ASAN_OPTIONS=quarantine_size_mb=N, default=256) > Valgrind may have smaller default quarantine and thus misses this bug. I was lazy and just told valgrind to execute the program (built by gcc without ASan) with the largest quarantine it supported. ``` LD_LIBRARY_PATH=`pwd` valgrind --freelist-vol=100000000...
2013 Aug 19
0
[LLVMdev] [cfe-dev] -fsanitize=address on centos 6.4
...dev] -fsanitize=address on centos 6.4**** > > **** > > +llvmdev (llvm-dev does not exist)**** > > **** > > On Mon, Aug 19, 2013 at 12:58 PM, Sergey Matveev <earthdok at google.com> > wrote:**** > > > First, could you please run the test with env.var. > ASAN_OPTIONS=verbosity=1 **** > > **** > > No need for that, actually, since this is a familiar issue. Sharma, could > you please paste the output of "ldd --version" here?**** > > **** > > Sergey**** > > **** > > On Mon, Aug 19, 2013 at 12:53 PM, Kostya Serebr...
2015 Sep 05
3
Some feedback on Libfuzzer
...mmitted) > > Also, one more thing, currently Libfuzzer does not catch SIGABRT and > treat it as a fatal event. I've added a SIGABRT handler to my own code > and moved StaticDeathCallback to public so I can call it from there. > > Again, this is asan, not libFuzzer. You need ASAN_OPTIONS=handle_abort=1 I hope to make it the default soon-ish. > -- > greg > _______________________________________________ > LLVM Developers mailing list > llvm-dev at lists.llvm.org > http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-dev > -------------- next part --------------...
2013 Aug 19
0
[LLVMdev] [cfe-dev] -fsanitize=address on centos 6.4
...dev] -fsanitize=address on centos 6.4**** > > ** ** > > +llvmdev (llvm-dev does not exist)**** > > ** ** > > On Mon, Aug 19, 2013 at 12:58 PM, Sergey Matveev <earthdok at google.com> > wrote:**** > > > First, could you please run the test with env.var. > ASAN_OPTIONS=verbosity=1 **** > > **** > > No need for that, actually, since this is a familiar issue. Sharma, could > you please paste the output of "ldd --version" here?**** > > ** ** > > Sergey**** > > ** ** > > On Mon, Aug 19, 2013 at 12:53 PM, Kostya Serebr...
2013 Aug 19
1
[LLVMdev] [cfe-dev] -fsanitize=address on centos 6.4
...llvmdev at cs.uiuc.edu> Subject: Re: [cfe-dev] -fsanitize=address on centos 6.4 +llvmdev (llvm-dev does not exist) On Mon, Aug 19, 2013 at 12:58 PM, Sergey Matveev <earthdok at google.com<mailto:earthdok at google.com>> wrote: > First, could you please run the test with env.var. ASAN_OPTIONS=verbosity=1 No need for that, actually, since this is a familiar issue. Sharma, could you please paste the output of "ldd --version" here? Sergey On Mon, Aug 19, 2013 at 12:53 PM, Kostya Serebryany <kcc at google.com<mailto:kcc at google.com>> wrote: +llvm-dev, earthdok at...