Displaying 11 results from an estimated 11 matches for "shadowgap".
2011 Jun 17
3
[LLVMdev] LLVM-based address sanity checker
...platforms where this
> mapping
> > won't work or will require different offset.
>
> I got a bit confused there, TBH. How do you guarantee that that part
> of memory will be allocated?
On 32-bit, the shadow region is:
[0x28000000, 0x3fffffff]HighShadow[0x24000000, 0x27ffffff]ShadowGap[0x20000000,
0x23ffffff]LowShadow
This is 0.5G total. So, I mmap all these three shadow subregions and
'mprotect' the ShadowGap.
This is done at startup. If the mmap fails, an assert will fire.
On 64-bit, the shadow looks like this:
[0x0000140000000000, 0x00001fffffffffff]HighShadow[0x0000...
2011 Jun 17
0
[LLVMdev] LLVM-based address sanity checker
On 17 June 2011 09:14, Kostya Serebryany <kcc at google.com> wrote:
> Maybe the fallback code should just use a function call. Much simpler for
> documentation purposes.
Sounds good.
On 32-bit, the shadow region is:
> [0x28000000, 0x3fffffff] HighShadow [0x24000000, 0x27ffffff] ShadowGap [0x20000000,
> 0x23ffffff] LowShadow
>
> This is 0.5G total. So, I mmap all these three shadow subregions and
> 'mprotect' the ShadowGap.
> This is done at startup. If the mmap fails, an assert will fire.
>
I see. On embedded platforms that won't work with all cases....
2011 Jun 17
3
[LLVMdev] LLVM-based address sanity checker
...r to __asan_report_error_2
402ed8: e8 53 69 00 00 callq 409830
<__asan_report_error_2> << is_write and size is encoded in the function
name
--kcc
>
>
> On 32-bit, the shadow region is:
>> [0x28000000, 0x3fffffff] HighShadow [0x24000000, 0x27ffffff] ShadowGap [0x20000000,
>> 0x23ffffff] LowShadow
>>
>> This is 0.5G total. So, I mmap all these three shadow subregions and
>> 'mprotect' the ShadowGap.
>> This is done at startup. If the mmap fails, an assert will fire.
>>
>
>
> I see. On embedded platform...
2011 Jun 21
0
[LLVMdev] LLVM-based address sanity checker
...69 00 00 callq 409830
> <__asan_report_error_2> << is_write and size is encoded in the function
> name
>
>
> --kcc
>
>
>>
>>
>> On 32-bit, the shadow region is:
>>> [0x28000000, 0x3fffffff] HighShadow [0x24000000, 0x27ffffff] ShadowGap [0x20000000,
>>> 0x23ffffff] LowShadow
>>>
>>> This is 0.5G total. So, I mmap all these three shadow subregions and
>>> 'mprotect' the ShadowGap.
>>> This is done at startup. If the mmap fails, an assert will fire.
>>>
>>
>>...
2011 Jun 17
0
[LLVMdev] LLVM-based address sanity checker
On 17 June 2011 08:55, Kostya Serebryany <kcc at google.com> wrote:
> I am rather reluctant to add 'generic' code that handles unknown/untested
> platforms because the memory mapping is very platform specific anyway.
Indeed, but the point of that is more for helping writing
platform-specific versions than actually using it as a general-purpose
routine. Kinda documentation of
2011 Jun 17
2
[LLVMdev] LLVM-based address sanity checker
On Fri, Jun 17, 2011 at 11:48 AM, Renato Golin <rengolin at systemcall.org>wrote:
> On 16 June 2011 20:57, Kostya Serebryany <kcc at google.com> wrote:
> >> I see, maybe you could leave your C implementation as a fall back.
> >
> > Not easy, because it will require a fallback code in the run time
> library.
> > But yes, possible.
>
> I was
2014 May 30
3
[LLVMdev] Porting ASan to AArch64
...9_vsnprintf'
==29184==AddressSanitizer: failed to intercept '__isoc99_vfprintf'
==29184==AddressSanitizer: libc interceptors initialized
|| `[0x002000000000, 0x007fffffffff]` || HighMem ||
|| `[0x001400000000, 0x001fffffffff]` || HighShadow ||
|| `[0x001200000000, 0x0013ffffffff]` || ShadowGap ||
|| `[0x001000000000, 0x0011ffffffff]` || LowShadow ||
|| `[0x000000000000, 0x000fffffffff]` || LowMem ||
MemToShadow(shadow): 0x001200000000 0x00123fffffff 0x001280000000
0x0013ffffffff
redzone=16
max_redzone=2048
quarantine_size=256M
malloc_context_size=30
SHADOW_SCALE: 3
SHADOW_GRANULARI...
2013 Jun 04
2
[LLVMdev] Address Sanitizer on Android
...san-arm-android.so LD_LIBRARY_PATH=. ./djpeg
./testimg.jpg"
==28210==Parsed ASAN_OPTIONS: debug=1,verbosity=1
==28210==AddressSanitizer: libc interceptors initialized
|| `[0x20000000, 0xffffffff]` || HighMem ||
|| `[0x04000000, 0x1fffffff]` || HighShadow ||
|| `[0x00040000, 0x03ffffff]` || ShadowGap ||
MemToShadow(shadow): 0x00000000 0x00000000 0x00800000 0x03ffffff
red_zone=16
malloc_context_size=30
SHADOW_SCALE: 3
SHADOW_GRANULARITY: 8
SHADOW_OFFSET: 0
==28210==Shadow memory range interleaves with an existing memory
mapping. ASan cannot proceed correctly. ABORTING.
==28210==Process memory m...
2020 Feb 03
2
ASAN not finding any bugs?
...hello hello.cpp
This is the output from setting verbosity=1 - how can I debug this issue?
==3401806==AddressSanitizer: libc interceptors initialized
|| `[0x10007fff8000, 0x7fffffffffff]` || HighMem ||
|| `[0x02008fff7000, 0x10007fff7fff]` || HighShadow ||
|| `[0x00008fff7000, 0x02008fff6fff]` || ShadowGap ||
|| `[0x00007fff8000, 0x00008fff6fff]` || LowShadow ||
|| `[0x000000000000, 0x00007fff7fff]` || LowMem ||
MemToShadow(shadow): 0x00008fff7000 0x000091ff6dff 0x004091ff6e00 0x02008fff6fff
redzone=16
max_redzone=2048
quarantine_size_mb=256M
thread_local_quarantine_size_kb=1024K
malloc_context_size=...
2020 Feb 03
2
ASAN not finding any bugs?
...tting verbosity=1 - how can I debug this issue?
>>
>> ==3401806==AddressSanitizer: libc interceptors initialized
>> || `[0x10007fff8000, 0x7fffffffffff]` || HighMem ||
>> || `[0x02008fff7000, 0x10007fff7fff]` || HighShadow ||
>> || `[0x00008fff7000, 0x02008fff6fff]` || ShadowGap ||
>> || `[0x00007fff8000, 0x00008fff6fff]` || LowShadow ||
>> || `[0x000000000000, 0x00007fff7fff]` || LowMem ||
>> MemToShadow(shadow): 0x00008fff7000 0x000091ff6dff 0x004091ff6e00 0x02008fff6fff
>> redzone=16
>> max_redzone=2048
>> quarantine_size_mb=256M
>...
2013 Jun 04
0
[LLVMdev] Address Sanitizer on Android
...=. ./djpeg
> ./testimg.jpg"
>
> ==28210==Parsed ASAN_OPTIONS: debug=1,verbosity=1
> ==28210==AddressSanitizer: libc interceptors initialized
> || `[0x20000000, 0xffffffff]` || HighMem ||
> || `[0x04000000, 0x1fffffff]` || HighShadow ||
> || `[0x00040000, 0x03ffffff]` || ShadowGap ||
> MemToShadow(shadow): 0x00000000 0x00000000 0x00800000 0x03ffffff
> red_zone=16
> malloc_context_size=30
> SHADOW_SCALE: 3
> SHADOW_GRANULARITY: 8
> SHADOW_OFFSET: 0
> ==28210==Shadow memory range interleaves with an existing memory
> mapping. ASan cannot proceed correc...