Displaying 20 results from an estimated 3000 matches similar to: "[LLVMdev] can GlobalAlias point to a middle of a structure?"
2011 Jun 17
0
[LLVMdev] can GlobalAlias point to a middle of a structure?
Hi Kostya,
> In order to find out-of-bound accesses to global objects with AddressSanitizer
> (http://code.google.com/p/address-sanitizer/wiki/AddressSanitizer)
> I need to create redzones to the left and to the right of every global variable.
>
> I tried the following:
> Before:
> @Extern = global [10 x i8] zeroinitializer, align 1
> After:
> %0 = type { [32 x
2013 Oct 30
0
[LLVMdev] [RFC] Alias should not point to declarations
On Oct 30, 2013, at 12:35 PM, Rafael Espíndola <rafael.espindola at gmail.com> wrote:
> A long time ago (before r97733) we used to model the weakref attribute
> by outputting a new declaration and a weak alias to it. This was
> fairly buggy and we now implement weakref directly in clang, with the
> same logic an assembler uses to implement .weakref (which is what gcc
>
2013 Oct 30
1
[LLVMdev] [RFC] Alias should not point to declarations
On 30 October 2013 15:50, Chris Lattner <clattner at apple.com> wrote:
>
> On Oct 30, 2013, at 12:35 PM, Rafael Espíndola <rafael.espindola at gmail.com> wrote:
>
>> A long time ago (before r97733) we used to model the weakref attribute
>> by outputting a new declaration and a weak alias to it. This was
>> fairly buggy and we now implement weakref directly in
2013 Oct 30
4
[LLVMdev] [RFC] Alias should not point to declarations
A long time ago (before r97733) we used to model the weakref attribute
by outputting a new declaration and a weak alias to it. This was
fairly buggy and we now implement weakref directly in clang, with the
same logic an assembler uses to implement .weakref (which is what gcc
prints).
One thing that was left from that old implementation is that we still
have alias to declarations and they are a
2017 Nov 08
3
[RFC] ASan: patches to support 32-byte shadow granularity
I've finished my initial set of patches to make 32-byte shadow
granularity work on x86. Here is a summary of the changes from last
week:
- As discussed, I added a full redzone after every stack variable.
- We discussed adding a -fsanitize-address-granularity=N flag, but I
found the following existing flag has been sufficient for my
purposes: -asan-mapping-scale N. If anyone thinks I
2017 Oct 31
1
[RFC] ASan: patches to support 32-byte shadow granularity
+ more asan folks, please CC them to the code reviews.
Also please make sure llvm-commits is CC-ed (cfe-commits for clang changes)
On Tue, Oct 31, 2017 at 2:29 PM, Walter Lee <waltl at google.com> wrote:
> I've prepared a preliminary set of patches that makes ASan work with
> 32-byte shadow granularity, and I would like to get some feedback on
> those patches as well as my
2011 Jul 26
2
[LLVMdev] LLVM-based address sanity checker
On Jun 21, 2011, at 8:05 AM, Kostya Serebryany wrote:
> Hi,
> What would be our next steps in getting ASan into the LLVM trunk?
> I'd like to do it in two steps, first for the LLVM part with minimal tests and then for the run-time library and all tests.
> The current ASan's source repository will probably stay the primary home for the run-time library and tests as we plan
2012 Jun 18
4
[LLVMdev] MemorySanitizer, a tool that finds uninitialized reads and more
Hello llvmdev,
I would like to propose and discuss yet another dynamic tool, which we call
MemorySanitizer (msan).
The main goal of the tool is to detect uses of uninitialized memory (the
major feature of Valgrind/Memcheck not covered by AddressSanitizer).
It will also find use-after-destruction-but-before-free in C++.
The algorithm of the tool is similar to that of Memcheck (
2011 Jul 26
0
[LLVMdev] LLVM-based address sanity checker
On Tue, Jul 26, 2011 at 10:20 AM, Chris Lattner <clattner at apple.com> wrote:
>
> On Jun 21, 2011, at 8:05 AM, Kostya Serebryany wrote:
>
> > Hi,
> > What would be our next steps in getting ASan into the LLVM trunk?
> > I'd like to do it in two steps, first for the LLVM part with minimal
> tests and then for the run-time library and all tests.
> >
2018 Sep 21
2
Added AllocaInsts are relocated in stack
Hi Tim,
Thanks for your reply. However, I have seen that addressSanitizer has done
this by placing redzones around each local variable. But i have not figured
out yet how they have done it, I was wondering if there is a switch or a
method by which I can reset the slotNumbering given to each instruction. By
doing so, LLVM would place them in the expected order I guess.
Best regards,
Saman
On
2011 Aug 01
2
[LLVMdev] LLVM-based address sanity checker
Any updates on this?
In particular, I'd like to see concrete patches proposed for review and
inclusion into LLVM. I think having actual patches on the table and under
review will help a great deal. Kostya, let me know if I can help prepare
them. A few general comments as well inline...
On Tue, Jul 26, 2011 at 1:57 AM, Kostya Serebryany <kcc at google.com> wrote:
> On Tue, Jul 26,
2012 Jun 19
0
[LLVMdev] MemorySanitizer, a tool that finds uninitialized reads and more
I've just sent a code review request to llvm-commits.
--kcc
On Mon, Jun 18, 2012 at 2:39 PM, Kostya Serebryany <kcc at google.com> wrote:
> Hello llvmdev,
>
> I would like to propose and discuss yet another dynamic tool, which we
> call MemorySanitizer (msan).
> The main goal of the tool is to detect uses of uninitialized memory (the
> major feature of
2018 Sep 05
2
AddressSanitizer on SPECCPU2006
Hi
I am using SanitizerCoverage feature supported by clang to get the
basicblock coverage.
my tested binaries are spec cpu2006. I compiled the binary with the option
COPTIMIZE = -O0 -fsanitize=address -fsanitize-coverage=bb -flto
-fno-strict-aliasing -std=gnu89 -gdwarf-3
After the compiling process is end. I run the 400.perlbench. with the
command
ASAN_OPTIONS=coverage=1 ./perlbench.
2018 Sep 05
2
AddressSanitizer on SPECCPU2006
Hi
If so, is it able to disable this check. All I need is just to get the BB
coverage information
Regards
Muhui
Alexander Potapenko <glider at google.com>于2018年9月5日 周三下午6:57写道:
> This is a known problem in SPECCPU2006, see
> https://github.com/google/sanitizers/wiki/AddressSanitizerFoundBugs
> On Wed, Sep 5, 2018 at 7:36 AM Muhui Jiang via llvm-dev
> <llvm-dev at
2014 May 30
3
[LLVMdev] Porting ASan to AArch64
Hello,
I have been working on porting ASan to AArch64. I am building compiler-rt
in "standalone mode" targeting aarch64. My build is successful, but I get
the following runtime error when I run an ASan enabled executable through
qemu-aarch64:
==29184==Parsed ASAN_OPTIONS: verbosity=1
==29184==AddressSanitizer: failed to intercept '__isoc99_printf'
==29184==AddressSanitizer:
2015 Nov 14
2
Inexplicable ASAN report. Code generation bug?
On Thu, Nov 12, 2015 at 8:42 PM, Kostya Serebryany <kcc at google.com> wrote:
> 2 questions:
> - Do you see this with the fresh llvm trunk?
> - Can you prepare a minimized example?
Pretty recent, I updated a couple days ago. I tried to minimize the
attached but at the same time I didn't want to lose too many unions
and casts in case it didn't trigger any more.
$ clang
2018 Sep 05
2
AddressSanitizer on SPECCPU2006
Hi Alex
Thanks for your email. But it seems not work. I removed the
-fsanitize=address flag.
The global buffer overflow message doesn't show. However, no *.sancov file
is created after I run perlbench. Thus, I could not get the BB coverage. Do
you have any ideas? Many Thanks
Regards
Muhui
Alexander Potapenko <glider at google.com> 于2018年9月5日周三 下午7:14写道:
> Hi Muhui,
>
> If
2017 Feb 07
2
Using ASAN on C code called from other languages
Kostya Serebryany wrote:
> I don't know anything about haskell, but if you post a minimal reproducer
> here
> we *may* be able to help.
Its just so happens that I do have something here:
https://github.com/erikd-ambiata/haskell-sanitize
The Readme should have all the information you need. Any problems,
please let mw know.
Cheers,
Erik
--
2015 Nov 12
3
Inexplicable ASAN report. Code generation bug?
I'm struggling to explain an ASAN report I'm now getting that I didn't
get previously on the same code. In fact the report only happens with
-O2 and not when I remove the -O flags which makes it hard to debug
and makes me suspect it's dependent on exactly which instructions the
code generation decides to access the bytes involved. Afaict the C
code shouldn't be accessing the
2011 Jun 16
2
[LLVMdev] LLVM-based address sanity checker
On Thu, Jun 16, 2011 at 11:00 PM, Chris Lattner <clattner at apple.com> wrote:
>
> On Jun 16, 2011, at 1:27 AM, Kostya Serebryany wrote:
>
> Hello again,
>
> The tool we announced 1.5 months ago has matured quite a bit.
> In addition to heap out-of-bound and use-after-free bugs it also finds
> stack overruns/underruns.
> AddressSanitizer is being actively used by