similar to: [LLVMdev] Proposed Enhancement to AddressSanitizer: Initialization Order

Displaying 20 results from an estimated 7000 matches similar to: "[LLVMdev] Proposed Enhancement to AddressSanitizer: Initialization Order"

2012 Mar 24
1
Append to file in loop
My files are on disk and they are regular text files named file_1 file_2 file_3 file_4 and file_5 with extension .saam The separator is sep='' (ie, white space) I want to append 'XFile' at the end of those files. XFile is also on disk. file.append("file_1.saam", "XFile.saam"); file.append("file_2.saam", "XFile.saam")... works but it
2005 Sep 14
4
*** saving files ***
Hi, I need help :o( I want that my function saves result files in a for()-loop while it runs automatically. the filenames must be saved like: file_1 -> for 1. result file_2 -> for 2. result file_3 -> for 3. result and . . . file_n -> for n. result the file names are the same identified by _1, _2
2006 Mar 23
1
Multiple file uploads
I have a form with multiple file upload fields (1-10), of which 2-10 are optional. So i need to cycle thru all file fields and pick only those that have a file attached. Selecting only one file in the form, the paramters look simple: "image"=>{"file_1"=>#<File:/tmp/CGI344.4>, "file_2"=>"", "file_3"=>""}, so I
2008 Nov 18
2
sequencially merge multiple files in a folder
Dear all, If the question is too easy, please forgive me since I am only few weeks old in R. I have worked on this question a few days and still cannot figure it out. Here I have a folder with more than 50 tab-delimited files. Each file has a few hundreds of thousands rows/subjects, and the number of columns/variables of each file varies.The 1st row consists of all the variable names. Now I
2002 Jul 01
0
recursive scp fails on ReliantUNIX 5.43 (using OpenSSH 3.4p1)
Hi, I have tried to make a recursive scp from a ReliantUNIX machine to an other UNIX machine and got an infinite loop on the source machine. A "normal" scp works well. Also strange is, that the first two letters of the directory respectively file name are missing in the output below. The destination machine produces a directory structure with growing subdirectory names. Below you can
2009 Jul 21
0
Accessing list object from within a function as a list element
Hi - I have a list (call it 'mylist') with the following elements: (i) a function (call it 'myfunc' and expressed as 'mylist$myfunc') and (ii) a variable (call it 'myvar' and expressed as 'mylist$myvar'). Since I use mylist as a pseudo-class (I assign mylist to multiple different R objects), I would like to access the mylist R object from within the
2018 Sep 05
2
AddressSanitizer on SPECCPU2006
Hi I am using SanitizerCoverage feature supported by clang to get the basicblock coverage. my tested binaries are spec cpu2006. I compiled the binary with the option COPTIMIZE = -O0 -fsanitize=address -fsanitize-coverage=bb -flto -fno-strict-aliasing -std=gnu89 -gdwarf-3 After the compiling process is end. I run the 400.perlbench. with the command ASAN_OPTIONS=coverage=1 ./perlbench.
2003 Nov 14
1
smclient-excludes
Hello, samba-users, I am using Amanda to backup WinNT-shares. Amanda uses smbclient to generate smbtar-archives which it then writes to tape. As you all know there are various files on Windows-system-partitions that don?t need to be on backup. For example stuff like pagefile.sys System Volume Information hiberfil.sys and the registry files. So there is a need to exclude files from getting
2007 Aug 30
1
can not encode a raw video file with "encoder_example"
hi all, i tried to encode a .yuv file with the encoder_example.c but it give an error message as follows ./encoder_example -v 1 file_1.yuv > file_1.ogg Input file file_1.yuv is neither a WAV nor YUV4MPEG2 file. so the error message is understandable for anyone. when this file is play with mplayer it shows as follow
2018 Sep 05
2
AddressSanitizer on SPECCPU2006
Hi If so, is it able to disable this check. All I need is just to get the BB coverage information Regards Muhui Alexander Potapenko <glider at google.com>于2018年9月5日 周三下午6:57写道: > This is a known problem in SPECCPU2006, see > https://github.com/google/sanitizers/wiki/AddressSanitizerFoundBugs > On Wed, Sep 5, 2018 at 7:36 AM Muhui Jiang via llvm-dev > <llvm-dev at
2012 Nov 06
2
[LLVMdev] undefined symbols in AddressSanitizer tests on darwin
At 167457 on x86_64-apple-darwin12, I am seeing a slew of AddressSanitizer failures due to unresolved symbols such as... Exit Code: 1 Command Output (stderr): -- Undefined symbols for architecture x86_64: "___asan_init", referenced from: _asan.module_ctor in shared-lib-test-so-moBSTe.o "___asan_register_globals", referenced from: _asan.module_ctor in
2012 Nov 06
0
[LLVMdev] undefined symbols in AddressSanitizer tests on darwin
The fix is under review. --kcc On Tue, Nov 6, 2012 at 6:08 AM, Jack Howarth <howarth at bromo.med.uc.edu>wrote: > At 167457 on x86_64-apple-darwin12, I am seeing a slew of > AddressSanitizer failures due to > unresolved symbols such as... > > Exit Code: 1 > Command Output (stderr): > -- > Undefined symbols for architecture x86_64: > "___asan_init",
2012 Nov 06
1
[LLVMdev] undefined symbols in AddressSanitizer tests on darwin
Fix is in (r167460). On Tue, Nov 6, 2012 at 6:18 PM, Kostya Serebryany <kcc at google.com> wrote: > The fix is under review. > > --kcc > > > On Tue, Nov 6, 2012 at 6:08 AM, Jack Howarth <howarth at bromo.med.uc.edu>wrote: > >> At 167457 on x86_64-apple-darwin12, I am seeing a slew of >> AddressSanitizer failures due to >> unresolved symbols
2018 Sep 05
2
AddressSanitizer on SPECCPU2006
Hi Alex Thanks for your email. But it seems not work. I removed the -fsanitize=address flag. The global buffer overflow message doesn't show. However, no *.sancov file is created after I run perlbench. Thus, I could not get the BB coverage. Do you have any ideas? Many Thanks Regards Muhui Alexander Potapenko <glider at google.com> 于2018年9月5日周三 下午7:14写道: > Hi Muhui, > > If
2011 Dec 16
3
[LLVMdev] load widening conflicts with AddressSanitizer
Hello, We've just got a bug report from Mozilla folks about AddressSanitizer false positive with -O2. Turns out there is a conflict between load widening and AddressSanitizer. Simple reproducer: % cat load_widening.c && echo ========= && clang -O2 -c load_widening.c -flto && llvm-dis load_widening.o && cat load_widening.o.ll void init(char *); int foo() {
2011 Dec 16
0
[LLVMdev] load widening conflicts with AddressSanitizer
On 12/16/11 12:24 PM, Kostya Serebryany wrote: > Hello, > > We've just got a bug report from Mozilla folks about AddressSanitizer > false positive with -O2. > Turns out there is a conflict between load widening and AddressSanitizer. > > Simple reproducer: > % cat load_widening.c&& echo =========&& clang -O2 -c load_widening.c -flto&&
2011 Dec 16
2
[LLVMdev] load widening conflicts with AddressSanitizer
On Fri, Dec 16, 2011 at 12:19 PM, John Criswell <criswell at illinois.edu> wrote: > On 12/16/11 12:24 PM, Kostya Serebryany wrote: > > Hello, > > We've just got a bug report from Mozilla folks about AddressSanitizer false > positive with -O2. > Turns out there is a conflict between load widening and AddressSanitizer. > > Simple reproducer: > > % cat
2013 Apr 18
3
Linux distribution with gcc 4.8 and AddressSanitizer ?
Dear R developers, I've got an information from Prof. Ripley regarding a bug found with AdressSanitizer in one of our packages. It is now fixed, thank you for this information. Now, I would like to run AddressSanitizer myself before submitting the patched package to CRAN. Is there a recommendation of a suitable Linux distribution with gcc 4.8, ideally an ISO image or (even better) a
2014 Sep 25
4
[LLVMdev] AddressSanitizer flags in LLVM 3.5
Hello, LLVM developers I would like to ask about the changes in the "nonpublic" AddressSanitizer flags in llvm 3.5. Prior to 3.5 (namely, on 3.4.2) there was a compile-time flag to control the shadow offset. For example, one could do the following to force the large offset: -mllvm -asan-mapping-offset-log=44 Now, it has been removed and on x86_64 linux the smaller offset is always
2017 Nov 08
3
[RFC] ASan: patches to support 32-byte shadow granularity
I've finished my initial set of patches to make 32-byte shadow granularity work on x86. Here is a summary of the changes from last week: - As discussed, I added a full redzone after every stack variable. - We discussed adding a -fsanitize-address-granularity=N flag, but I found the following existing flag has been sufficient for my purposes: -asan-mapping-scale N. If anyone thinks I