Displaying 20 results from an estimated 7000 matches similar to: "[LLVMdev] Proposed Enhancement to AddressSanitizer: Initialization Order"
2012 Mar 24
1
Append to file in loop
My files are on disk and they are regular text files named
file_1 file_2 file_3 file_4 and file_5 with extension .saam
The separator is sep='' (ie, white space)
I want to append 'XFile' at the end of those files. XFile is also on disk.
file.append("file_1.saam", "XFile.saam"); file.append("file_2.saam",
"XFile.saam")...
works but it
2005 Sep 14
4
*** saving files ***
Hi,
I need help :o(
I want that my function saves result files in a for()-loop while it runs
automatically.
the filenames must be saved like:
file_1 -> for 1. result
file_2 -> for 2. result
file_3 -> for 3. result
and
.
.
.
file_n -> for n. result
the file names are the same identified by _1, _2
2006 Mar 23
1
Multiple file uploads
I have a form with multiple file upload fields (1-10), of which 2-10
are optional. So i need to cycle thru all file fields and pick only
those that have a file attached. Selecting only one file in the form,
the paramters look simple: "image"=>{"file_1"=>#<File:/tmp/CGI344.4>,
"file_2"=>"", "file_3"=>""}, so I
2008 Nov 18
2
sequencially merge multiple files in a folder
Dear all,
If the question is too easy, please forgive me since I am only few weeks old in R.
I have worked on this question a few days and still cannot figure it out.
Here I have a folder with more than 50 tab-delimited files. Each file has a few hundreds of thousands rows/subjects, and the number of columns/variables of each file varies.The 1st row consists of all the variable names.
Now I
2002 Jul 01
0
recursive scp fails on ReliantUNIX 5.43 (using OpenSSH 3.4p1)
Hi,
I have tried to make a recursive scp from a ReliantUNIX machine to an other UNIX machine and got an infinite loop on the source machine.
A "normal" scp works well.
Also strange is, that the first two letters of the directory respectively file name are missing in the output below.
The destination machine produces a directory structure with growing subdirectory names.
Below you can
2009 Jul 21
0
Accessing list object from within a function as a list element
Hi -
I have a list (call it 'mylist') with the following elements: (i) a
function (call it 'myfunc' and expressed as 'mylist$myfunc') and (ii)
a variable (call it 'myvar' and expressed as 'mylist$myvar'). Since I
use mylist as a pseudo-class (I assign mylist to multiple different R
objects), I would like to access the mylist R object from within the
2018 Sep 05
2
AddressSanitizer on SPECCPU2006
Hi
I am using SanitizerCoverage feature supported by clang to get the
basicblock coverage.
my tested binaries are spec cpu2006. I compiled the binary with the option
COPTIMIZE = -O0 -fsanitize=address -fsanitize-coverage=bb -flto
-fno-strict-aliasing -std=gnu89 -gdwarf-3
After the compiling process is end. I run the 400.perlbench. with the
command
ASAN_OPTIONS=coverage=1 ./perlbench.
2003 Nov 14
1
smclient-excludes
Hello, samba-users,
I am using Amanda to backup WinNT-shares.
Amanda uses smbclient to generate smbtar-archives which it then writes
to tape.
As you all know there are various files on Windows-system-partitions
that don?t need to be on backup.
For example stuff like
pagefile.sys
System Volume Information
hiberfil.sys
and the registry files.
So there is a need to exclude files from getting
2007 Aug 30
1
can not encode a raw video file with "encoder_example"
hi all,
i tried to encode a .yuv file with the encoder_example.c
but it give an error message as follows
./encoder_example -v 1 file_1.yuv > file_1.ogg
Input file file_1.yuv is neither a WAV nor YUV4MPEG2 file.
so the error message is understandable for anyone.
when this file is play with mplayer it shows as follow
2018 Sep 05
2
AddressSanitizer on SPECCPU2006
Hi
If so, is it able to disable this check. All I need is just to get the BB
coverage information
Regards
Muhui
Alexander Potapenko <glider at google.com>于2018年9月5日 周三下午6:57写道:
> This is a known problem in SPECCPU2006, see
> https://github.com/google/sanitizers/wiki/AddressSanitizerFoundBugs
> On Wed, Sep 5, 2018 at 7:36 AM Muhui Jiang via llvm-dev
> <llvm-dev at
2012 Nov 06
2
[LLVMdev] undefined symbols in AddressSanitizer tests on darwin
At 167457 on x86_64-apple-darwin12, I am seeing a slew of AddressSanitizer failures due to
unresolved symbols such as...
Exit Code: 1
Command Output (stderr):
--
Undefined symbols for architecture x86_64:
"___asan_init", referenced from:
_asan.module_ctor in shared-lib-test-so-moBSTe.o
"___asan_register_globals", referenced from:
_asan.module_ctor in
2012 Nov 06
0
[LLVMdev] undefined symbols in AddressSanitizer tests on darwin
The fix is under review.
--kcc
On Tue, Nov 6, 2012 at 6:08 AM, Jack Howarth <howarth at bromo.med.uc.edu>wrote:
> At 167457 on x86_64-apple-darwin12, I am seeing a slew of
> AddressSanitizer failures due to
> unresolved symbols such as...
>
> Exit Code: 1
> Command Output (stderr):
> --
> Undefined symbols for architecture x86_64:
> "___asan_init",
2012 Nov 06
1
[LLVMdev] undefined symbols in AddressSanitizer tests on darwin
Fix is in (r167460).
On Tue, Nov 6, 2012 at 6:18 PM, Kostya Serebryany <kcc at google.com> wrote:
> The fix is under review.
>
> --kcc
>
>
> On Tue, Nov 6, 2012 at 6:08 AM, Jack Howarth <howarth at bromo.med.uc.edu>wrote:
>
>> At 167457 on x86_64-apple-darwin12, I am seeing a slew of
>> AddressSanitizer failures due to
>> unresolved symbols
2018 Sep 05
2
AddressSanitizer on SPECCPU2006
Hi Alex
Thanks for your email. But it seems not work. I removed the
-fsanitize=address flag.
The global buffer overflow message doesn't show. However, no *.sancov file
is created after I run perlbench. Thus, I could not get the BB coverage. Do
you have any ideas? Many Thanks
Regards
Muhui
Alexander Potapenko <glider at google.com> 于2018年9月5日周三 下午7:14写道:
> Hi Muhui,
>
> If
2011 Dec 16
3
[LLVMdev] load widening conflicts with AddressSanitizer
Hello,
We've just got a bug report from Mozilla folks about AddressSanitizer false
positive with -O2.
Turns out there is a conflict between load widening and AddressSanitizer.
Simple reproducer:
% cat load_widening.c && echo ========= && clang -O2 -c
load_widening.c -flto && llvm-dis load_widening.o && cat
load_widening.o.ll
void init(char *);
int foo() {
2011 Dec 16
0
[LLVMdev] load widening conflicts with AddressSanitizer
On 12/16/11 12:24 PM, Kostya Serebryany wrote:
> Hello,
>
> We've just got a bug report from Mozilla folks about AddressSanitizer
> false positive with -O2.
> Turns out there is a conflict between load widening and AddressSanitizer.
>
> Simple reproducer:
> % cat load_widening.c&& echo =========&& clang -O2 -c load_widening.c -flto&&
2011 Dec 16
2
[LLVMdev] load widening conflicts with AddressSanitizer
On Fri, Dec 16, 2011 at 12:19 PM, John Criswell <criswell at illinois.edu> wrote:
> On 12/16/11 12:24 PM, Kostya Serebryany wrote:
>
> Hello,
>
> We've just got a bug report from Mozilla folks about AddressSanitizer false
> positive with -O2.
> Turns out there is a conflict between load widening and AddressSanitizer.
>
> Simple reproducer:
>
> % cat
2013 Apr 18
3
Linux distribution with gcc 4.8 and AddressSanitizer ?
Dear R developers,
I've got an information from Prof. Ripley regarding a bug found with
AdressSanitizer in one of our packages. It is now fixed, thank you for
this information.
Now, I would like to run AddressSanitizer myself before submitting the
patched package to CRAN.
Is there a recommendation of a suitable Linux distribution with gcc 4.8,
ideally an ISO image or (even better) a
2014 Sep 25
4
[LLVMdev] AddressSanitizer flags in LLVM 3.5
Hello, LLVM developers
I would like to ask about the changes in the "nonpublic"
AddressSanitizer flags in llvm 3.5.
Prior to 3.5 (namely, on 3.4.2) there was a compile-time flag to
control the shadow offset. For example, one could do the following to
force the large offset:
-mllvm -asan-mapping-offset-log=44
Now, it has been removed and on x86_64 linux the smaller offset is always
2017 Nov 08
3
[RFC] ASan: patches to support 32-byte shadow granularity
I've finished my initial set of patches to make 32-byte shadow
granularity work on x86. Here is a summary of the changes from last
week:
- As discussed, I added a full redzone after every stack variable.
- We discussed adding a -fsanitize-address-granularity=N flag, but I
found the following existing flag has been sufficient for my
purposes: -asan-mapping-scale N. If anyone thinks I