Displaying 3 results from an estimated 3 matches for "pusl".
Did you mean:
pushl
2016 Jun 17
2
Attempt to modify memory sanitizer for support of X86
...if (a[argc])
printf("xx\n");
return 0;
}
which I compiled with the command
clang -fsanitize=memory -m32 -fPIE -pie -fno-omit-frame-pointer -g -Wl,-Map,example32.map example.c -oexample32.out
I get now a segmentation fault during the execution:
(gdb) r
Starting program: /home/pusl/code/example32.out
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Program received signal SIGSEGV, Segmentation fault.
0x565e14f9 in main (argc=1448445640, argv=0xf7f1d3dc) at example.c:4
I tried to figure out th...
2018 Apr 17
2
iterative read - write
...Suggestions?
Tnx,
Bruce*
*
*# This works*
*#read in a data file
*
*>Corbre_2 <- read.table("E:/Acoustic Parameters/~Emballonuridae/Data by
genus/~Corbre/Corbre_2.txt",header=T,sep="\t",quote="")*
*# create and calculate a new variable for time between call pusles
*
*Corbre_2 [c("TBC")] <- recode.variables(Corbre_2[c("TBC")] , "0 -> NA;")*
*# Create new BW variable for band width then change data file name*
*BW<-within(Corbre_2,BW<-Fmax-Fmin)*
*# Create 2 new variables for fundamental H1 and third harmonic H3...
2018 May 25
0
Known limitation or intra-object-overflow not working?
Hello,
normally buffer overflows are detected by address sanitizer. Then I
recognized, that this is not the case, if the array is located inside a
structure. Thus I created a small example (test.c):
struct xxx {
int a;
int buffer[10];
int b;
};
int main(void) {
struct xxx var;
int buffer[10];
int count;
for (count = 0; count <=10; count++) {