search for: lowshadow

Displaying 9 results from an estimated 9 matches for "lowshadow".

2011 Jun 17
3
[LLVMdev] LLVM-based address sanity checker
...g > > won't work or will require different offset. > > I got a bit confused there, TBH. How do you guarantee that that part > of memory will be allocated? On 32-bit, the shadow region is: [0x28000000, 0x3fffffff]HighShadow[0x24000000, 0x27ffffff]ShadowGap[0x20000000, 0x23ffffff]LowShadow This is 0.5G total. So, I mmap all these three shadow subregions and 'mprotect' the ShadowGap. This is done at startup. If the mmap fails, an assert will fire. On 64-bit, the shadow looks like this: [0x0000140000000000, 0x00001fffffffffff]HighShadow[0x0000120000000000, 0x000013ffffffffff]...
2011 Jun 17
0
[LLVMdev] LLVM-based address sanity checker
...<kcc at google.com> wrote: > Maybe the fallback code should just use a function call. Much simpler for > documentation purposes. Sounds good. On 32-bit, the shadow region is: > [0x28000000, 0x3fffffff] HighShadow [0x24000000, 0x27ffffff] ShadowGap [0x20000000, > 0x23ffffff] LowShadow > > This is 0.5G total. So, I mmap all these three shadow subregions and > 'mprotect' the ShadowGap. > This is done at startup. If the mmap fails, an assert will fire. > I see. On embedded platforms that won't work with all cases. Most implementations have fragmented me...
2011 Jun 17
3
[LLVMdev] LLVM-based address sanity checker
...8 53 69 00 00 callq 409830 <__asan_report_error_2> << is_write and size is encoded in the function name --kcc > > > On 32-bit, the shadow region is: >> [0x28000000, 0x3fffffff] HighShadow [0x24000000, 0x27ffffff] ShadowGap [0x20000000, >> 0x23ffffff] LowShadow >> >> This is 0.5G total. So, I mmap all these three shadow subregions and >> 'mprotect' the ShadowGap. >> This is done at startup. If the mmap fails, an assert will fire. >> > > > I see. On embedded platforms that won't work with all cases. Most &...
2011 Jun 21
0
[LLVMdev] LLVM-based address sanity checker
..._report_error_2> << is_write and size is encoded in the function > name > > > --kcc > > >> >> >> On 32-bit, the shadow region is: >>> [0x28000000, 0x3fffffff] HighShadow [0x24000000, 0x27ffffff] ShadowGap [0x20000000, >>> 0x23ffffff] LowShadow >>> >>> This is 0.5G total. So, I mmap all these three shadow subregions and >>> 'mprotect' the ShadowGap. >>> This is done at startup. If the mmap fails, an assert will fire. >>> >> >> >> I see. On embedded platforms that won...
2014 May 30
3
[LLVMdev] Porting ASan to AArch64
...ntercept '__isoc99_vfprintf' ==29184==AddressSanitizer: libc interceptors initialized || `[0x002000000000, 0x007fffffffff]` || HighMem || || `[0x001400000000, 0x001fffffffff]` || HighShadow || || `[0x001200000000, 0x0013ffffffff]` || ShadowGap || || `[0x001000000000, 0x0011ffffffff]` || LowShadow || || `[0x000000000000, 0x000fffffffff]` || LowMem || MemToShadow(shadow): 0x001200000000 0x00123fffffff 0x001280000000 0x0013ffffffff redzone=16 max_redzone=2048 quarantine_size=256M malloc_context_size=30 SHADOW_SCALE: 3 SHADOW_GRANULARITY: 8 SHADOW_OFFSET: 1000000000 ==29184==ERROR: Address...
2020 Feb 03
2
ASAN not finding any bugs?
...osity=1 - how can I debug this issue? ==3401806==AddressSanitizer: libc interceptors initialized || `[0x10007fff8000, 0x7fffffffffff]` || HighMem || || `[0x02008fff7000, 0x10007fff7fff]` || HighShadow || || `[0x00008fff7000, 0x02008fff6fff]` || ShadowGap || || `[0x00007fff8000, 0x00008fff6fff]` || LowShadow || || `[0x000000000000, 0x00007fff7fff]` || LowMem || MemToShadow(shadow): 0x00008fff7000 0x000091ff6dff 0x004091ff6e00 0x02008fff6fff redzone=16 max_redzone=2048 quarantine_size_mb=256M thread_local_quarantine_size_kb=1024K malloc_context_size=30 SHADOW_SCALE: 3 SHADOW_GRANULARITY: 8 SHADOW_OFFSET...
2011 Jun 17
0
[LLVMdev] LLVM-based address sanity checker
On 17 June 2011 08:55, Kostya Serebryany <kcc at google.com> wrote: > I am rather reluctant to add 'generic' code that handles unknown/untested > platforms because the memory mapping is very platform specific anyway. Indeed, but the point of that is more for helping writing platform-specific versions than actually using it as a general-purpose routine. Kinda documentation of
2020 Feb 03
2
ASAN not finding any bugs?
...t; ==3401806==AddressSanitizer: libc interceptors initialized >> || `[0x10007fff8000, 0x7fffffffffff]` || HighMem || >> || `[0x02008fff7000, 0x10007fff7fff]` || HighShadow || >> || `[0x00008fff7000, 0x02008fff6fff]` || ShadowGap || >> || `[0x00007fff8000, 0x00008fff6fff]` || LowShadow || >> || `[0x000000000000, 0x00007fff7fff]` || LowMem || >> MemToShadow(shadow): 0x00008fff7000 0x000091ff6dff 0x004091ff6e00 0x02008fff6fff >> redzone=16 >> max_redzone=2048 >> quarantine_size_mb=256M >> thread_local_quarantine_size_kb=1024K >> malloc_cont...
2011 Jun 17
2
[LLVMdev] LLVM-based address sanity checker
On Fri, Jun 17, 2011 at 11:48 AM, Renato Golin <rengolin at systemcall.org>wrote: > On 16 June 2011 20:57, Kostya Serebryany <kcc at google.com> wrote: > >> I see, maybe you could leave your C implementation as a fall back. > > > > Not easy, because it will require a fallback code in the run time > library. > > But yes, possible. > > I was