search for: pusl

Displaying 3 results from an estimated 3 matches for "pusl".

Did you mean: pushl
2016 Jun 17
2
Attempt to modify memory sanitizer for support of X86
...if (a[argc]) printf("xx\n"); return 0; } which I compiled with the command clang -fsanitize=memory -m32 -fPIE -pie -fno-omit-frame-pointer -g -Wl,-Map,example32.map example.c -oexample32.out I get now a segmentation fault during the execution: (gdb) r Starting program: /home/pusl/code/example32.out [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Program received signal SIGSEGV, Segmentation fault. 0x565e14f9 in main (argc=1448445640, argv=0xf7f1d3dc) at example.c:4 I tried to figure out th...
2018 Apr 17
2
iterative read - write
...Suggestions? Tnx, Bruce* * *# This works* *#read in a data file * *>Corbre_2 <- read.table("E:/Acoustic Parameters/~Emballonuridae/Data by genus/~Corbre/Corbre_2.txt",header=T,sep="\t",quote="")* *# create and calculate a new variable for time between call pusles * *Corbre_2 [c("TBC")] <- recode.variables(Corbre_2[c("TBC")] , "0 -> NA;")* *# Create new BW variable for band width then change data file name* *BW<-within(Corbre_2,BW<-Fmax-Fmin)* *# Create 2 new variables for fundamental H1 and third harmonic H3...
2018 May 25
0
Known limitation or intra-object-overflow not working?
Hello, normally buffer overflows are detected by address sanitizer. Then I recognized, that this is not the case, if the array is located inside a structure. Thus I created a small example (test.c): struct xxx {    int a;    int buffer[10];    int b; }; int main(void) {    struct xxx var;    int buffer[10];    int count;    for (count = 0; count <=10; count++) {