search for: shadow_offset

Displaying 9 results from an estimated 9 matches for "shadow_offset".

2014 Jul 10
3
[LLVMdev] Proposal: ASan debugging API
...int __asan_get_free_stack(void *addr, void **trace, size_t *frame_count, void **top_frame_bp, int *thread_id); // Useful for calling from the debugger to get the current shadow memory // mapping. void __asan_get_shadow_mapping(size_t *shadow_scale, size_t *shadow_offset); Hi, I would like to improve the debugging experience for ASan. The idea is to have a couple of useful commands in LLDB (probably implemented as Python scripts) that could help the user when they are debugging an ASan-enabled binary. We already have some debugging API (asan_interface.h): //...
2014 May 30
3
[LLVMdev] Porting ASan to AArch64
...| `[0x001000000000, 0x0011ffffffff]` || LowShadow || || `[0x000000000000, 0x000fffffffff]` || LowMem || MemToShadow(shadow): 0x001200000000 0x00123fffffff 0x001280000000 0x0013ffffffff redzone=16 max_redzone=2048 quarantine_size=256M malloc_context_size=30 SHADOW_SCALE: 3 SHADOW_GRANULARITY: 8 SHADOW_OFFSET: 1000000000 ==29184==ERROR: AddressSanitizer failed to allocate 0xc00000000 (51539607552) bytes at address 1400000000 (errno: 12) ==29184==ReserveShadowMemoryRange failed while trying to map 0xc00000000 bytes. Perhaps you're using ulimit -v This appears to be the same issue discussed in this t...
2013 Jun 04
2
[LLVMdev] Address Sanitizer on Android
...rceptors initialized || `[0x20000000, 0xffffffff]` || HighMem || || `[0x04000000, 0x1fffffff]` || HighShadow || || `[0x00040000, 0x03ffffff]` || ShadowGap || MemToShadow(shadow): 0x00000000 0x00000000 0x00800000 0x03ffffff red_zone=16 malloc_context_size=30 SHADOW_SCALE: 3 SHADOW_GRANULARITY: 8 SHADOW_OFFSET: 0 ==28210==Shadow memory range interleaves with an existing memory mapping. ASan cannot proceed correctly. ABORTING. ==28210==Process memory map follows: 0x00008000-0x0000f000 /data/data/djpeg 0x0000f000-0x00010000 /data/data/djpeg 0x00010000-0x00011000 0x40094000-0x400a700...
2020 Feb 03
2
ASAN not finding any bugs?
...|| LowShadow || || `[0x000000000000, 0x00007fff7fff]` || LowMem || MemToShadow(shadow): 0x00008fff7000 0x000091ff6dff 0x004091ff6e00 0x02008fff6fff redzone=16 max_redzone=2048 quarantine_size_mb=256M thread_local_quarantine_size_kb=1024K malloc_context_size=30 SHADOW_SCALE: 3 SHADOW_GRANULARITY: 8 SHADOW_OFFSET: 0x7fff8000 ==3401806==Installed the sigaction for signal 11 ==3401806==Installed the sigaction for signal 7 ==3401806==Installed the sigaction for signal 8 ==3401806==T0: stack [0x7fff3bf5c000,0x7fff3c75c000) size 0x800000; local=0x7fff3c759244 ==3401806==AddressSanitizer Init done ➜ readelf -d h...
2020 Feb 03
2
ASAN not finding any bugs?
...oShadow(shadow): 0x00008fff7000 0x000091ff6dff 0x004091ff6e00 0x02008fff6fff >> redzone=16 >> max_redzone=2048 >> quarantine_size_mb=256M >> thread_local_quarantine_size_kb=1024K >> malloc_context_size=30 >> SHADOW_SCALE: 3 >> SHADOW_GRANULARITY: 8 >> SHADOW_OFFSET: 0x7fff8000 >> ==3401806==Installed the sigaction for signal 11 >> ==3401806==Installed the sigaction for signal 7 >> ==3401806==Installed the sigaction for signal 8 >> ==3401806==T0: stack [0x7fff3bf5c000,0x7fff3c75c000) size 0x800000; >> local=0x7fff3c759244 >>...
2013 Jun 04
0
[LLVMdev] Address Sanitizer on Android
...ffffffff]` || HighMem || > || `[0x04000000, 0x1fffffff]` || HighShadow || > || `[0x00040000, 0x03ffffff]` || ShadowGap || > MemToShadow(shadow): 0x00000000 0x00000000 0x00800000 0x03ffffff > red_zone=16 > malloc_context_size=30 > SHADOW_SCALE: 3 > SHADOW_GRANULARITY: 8 > SHADOW_OFFSET: 0 > ==28210==Shadow memory range interleaves with an existing memory > mapping. ASan cannot proceed correctly. ABORTING. > ==28210==Process memory map follows: > 0x00008000-0x0000f000 /data/data/djpeg > 0x0000f000-0x00010000 /data/data/djpeg > 0x00010000-0x0001...
2015 Sep 29
2
Dynamic VMA in Sanitizers for AArch64
On 25 September 2015 at 20:11, Jakub Jelinek <jakub at redhat.com> wrote: > Note, in our distros we are shipping 42-bit VMA and are using patch on > top of vanilla libsanitizer (with the 1UL << 36 shadow offset) and I don't > remember any bugs reported against this not working (and the testsuite works > too). So, assuming 39-bit VMA works too, that would show that at
2015 Sep 25
3
Dynamic VMA in Sanitizers for AArch64
Hi folks, After long talks with lots of people, I think we have a winning strategy to deal with the variable nature of VMA address in AArch64. It seems that the best way forward is to try the dynamic calculation at runtime, evaluate the performance, and then, only if the hit is too great, think about compile-time alternatives. I'd like to know if everyone is in agreement, so we could get
2014 Sep 25
4
[LLVMdev] AddressSanitizer flags in LLVM 3.5
Hello, LLVM developers I would like to ask about the changes in the "nonpublic" AddressSanitizer flags in llvm 3.5. Prior to 3.5 (namely, on 3.4.2) there was a compile-time flag to control the shadow offset. For example, one could do the following to force the large offset: -mllvm -asan-mapping-offset-log=44 Now, it has been removed and on x86_64 linux the smaller offset is always