search for: shadowcallstack

Displaying 6 results from an estimated 6 matches for "shadowcallstack".

2019 Jan 08
2
How to link against specific targets? (Porting ShadowCallStack to new PM)
Hi all, I'm in the process of trying to port ShadowCallStack from the legacy pass manager to the new one. I ran into an issue though where it seems I cannot link against anything I added in ShadowCallStack.cpp when trying to build c-index-test (via just running ninja check-all). I think the reason for this is because nothing under lib/Target/X86/ is a part o...
2019 Jan 08
2
How to link against specific targets? (Porting ShadowCallStack to new PM)
...which holds an instance to the first class. The new PM analysis holds an instance of this first class also. I'm not sure though if there are new PM equivalents for the addPreserved analyses that MachineFunctionPass has under it's getAnalysisUsage. I can't figure out though how to port ShadowCallStack specifically, assuming I completed all the necessary work for enabling MachineFunctionPass in new PM, but I imagine that I may have missed a few things that I didn't account for. I can share what I have currently if you would like to see. - Leonard On Tue, Jan 8, 2019 at 10:37 AM Craig Topper...
2018 Apr 09
0
LLVM Weekly - #223, Apr 9th 2018
...s been committed. As previously [described](http://lists.llvm.org/pipermail/llvm-dev/2018-March/121814.html) on llvm-dev, this tool allows the automatic measurement of instruction scheduling properties such as latency and the number of micro-ops. [r329156](https://reviews.llvm.org/rL329156). * The ShadowCallStack pass has been added. Functions marked with the `shadowcallstack` attribute will be instrumented to check in the prolog/epilog that the return address has not been corrupted during execution. This is supported on both X86-64 and AArch64. [r329139](https://reviews.llvm.org/rL329139),[r329236](https:/...
2018 Jul 11
3
static stack depth analysis tool
...izes by matching up function names, and use this annotated call graph to find the execution path with the largest stack. Backends: We plan to support the x86-64 and aarch64 architectures; adding other architectures should be straight-forward. Fancy stacks: We plan to support using SafeStack & ShadowCallStack. Hand-written assembly: The Zircon codebase contains a nontrivial amount of hand-written assembly which uses stack space. We will manually audit the stack usage of assembly code, and provide it to the analysis in a lookup table. Indirect Function Calls & Recursion: We hope to not run into too...
2019 Sep 17
2
Building LLVM with LLVM with no dependence on GCC
...ion: GNU ld -- Linker detection: GNU ld -- Builtin supported architectures: x86_64 -- Generated Sanitizer SUPPORTED_TOOLS list on "Linux" is "asan;lsan;msan;tsan;ubsan" -- sanitizer_common tests on "Linux" will run against "asan;lsan;msan;tsan;ubsan" -- check-shadowcallstack does nothing. -- Looking for sys/resource.h -- Looking for sys/resource.h - found -- Clang version: 9.0.0 -- Performing Test CXX_SUPPORTS_NO_NESTED_ANON_TYPES_FLAG -- Performing Test CXX_SUPPORTS_NO_NESTED_ANON_TYPES_FLAG - Failed -- Looking for include file sys/inotify.h -- Looking for include fil...
2019 Sep 20
2
Building LLVM with LLVM with no dependence on GCC
...detection: LLD -- Linker detection: LLD -- Builtin supported architectures: x86_64 -- Generated Sanitizer SUPPORTED_TOOLS list on "Linux" is "asan;lsan;msan;tsan;ubsan" -- sanitizer_common tests on "Linux" will run against "asan;lsan;msan;tsan;ubsan" -- check-shadowcallstack does nothing. -- Looking for sys/resource.h -- Looking for sys/resource.h - found -- Clang version: 9.0.0 -- Performing Test CXX_SUPPORTS_NO_NESTED_ANON_TYPES_FLAG -- Performing Test CXX_SUPPORTS_NO_NESTED_ANON_TYPES_FLAG - Success -- Looking for include file sys/inotify.h -- Looking for include fi...