Displaying 20 results from an estimated 300 matches similar to: "Segfault after compiling wget with dfsan"
2013 Jul 13
2
[LLVMdev] Special case list files; a bug and a slowness issue
Hi,
I need to be able to use a special case list file containing thousands
of entries (namely, a list of libc symbols, to be used when using
DFSan with an uninstrumented libc). Initially I built the symbol
list like this:
fun:sym1=uninstrumented
fun:sym2=uninstrumented
fun:sym3=uninstrumented
...
fun:sym6000=uninstrumented
What I found was that, despite various bits of documentation [1,2],
the
2013 Jul 16
0
[LLVMdev] Special case list files; a bug and a slowness issue
Hi Peter!
On Sat, Jul 13, 2013 at 4:38 AM, Peter Collingbourne <peter at pcc.me.uk>wrote:
> Hi,
>
> I need to be able to use a special case list file containing thousands
> of entries (namely, a list of libc symbols, to be used when using
> DFSan with an uninstrumented libc). Initially I built the symbol
> list like this:
>
> fun:sym1=uninstrumented
>
2014 Oct 07
2
[LLVMdev] Debug Info and DFSan
On Tue, Oct 7, 2014 at 12:18 PM, David Blaikie <dblaikie at gmail.com> wrote:
>
>
> On Tue, Oct 7, 2014 at 12:10 PM, David Blaikie <dblaikie at gmail.com> wrote:
>
>>
>>
>> On Tue, Oct 7, 2014 at 11:48 AM, Peter Collingbourne <peter at pcc.me.uk>
>> wrote:
>>
>>> On Tue, Oct 07, 2014 at 10:04:30AM -0700, David Blaikie wrote:
2014 Oct 07
2
[LLVMdev] Debug Info and DFSan
On Tue, Oct 7, 2014 at 2:51 PM, Peter Collingbourne <peter at pcc.me.uk> wrote:
> Looks good, thanks!
>
> Can you write the test case, please? You probably have more experience
> writing debug info tests than I do.
>
Sure - though how would I get the pre-dfsan .ll file to produce this
behavior? I've tried compiling to a .ll file without dfsan, then feeling
that .ll
2014 Oct 07
2
[LLVMdev] Debug Info and DFSan
Here's a basic patch which would solve it in sort of the same way as the
other optimizations I was fixing (just special case the debug info & fix it
up). I can work up a test case for this as well, or you can, if you
like/this seems reasonable.
On Tue, Oct 7, 2014 at 2:30 PM, Peter Collingbourne <peter at pcc.me.uk> wrote:
> On Tue, Oct 07, 2014 at 12:20:55PM -0700, David
2014 Oct 07
2
[LLVMdev] Debug Info and DFSan
On Tue, Oct 7, 2014 at 11:48 AM, Peter Collingbourne <peter at pcc.me.uk>
wrote:
> On Tue, Oct 07, 2014 at 10:04:30AM -0700, David Blaikie wrote:
> > Hi Peter,
> >
> > After discovering several bugs in ArgumentPromotion and
> > DeadArgumentElimination where llvm::Functions were replaced with similar
> > functions (with the same name) to transform their type
2014 Oct 07
2
[LLVMdev] Debug Info and DFSan
Hi Peter,
After discovering several bugs in ArgumentPromotion and
DeadArgumentElimination where llvm::Functions were replaced with similar
functions (with the same name) to transform their type in some way, I
started looking at all calls to llvm::Function::takeName to see if there
were any other debug info quality bugs in similar callers.
One such caller is the DataFlowSanitizer, and I don't
2019 Apr 16
2
"compiler-rt" - DataFlowSanitizer
Hi all,
I have some questions about "DataFlowSanitizer" from "compiler-rt".
I want to know how I can test the "DataFlowSanitizer"?
Can I configure it to label only some values, i.e, the return values from specific functions?
Also, how can I print these labels?
Thanks,
Dareen
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2017 Jun 03
2
Compiling program with dfsan at IR
I tried running step 5 with clang -fsanitize=dataflow instead of gcc but it
gave the following error:
relocation R_X86_64_32 against `desc' can not be used when making a shared
object; recompile with -fPIC
error adding symbols: Bad value
clang-5.0: error: linker command failed with exit code 1 (use -v to see
invocation)
So I also tried adding -fPIC option at step 1 when converting .c program
2015 Sep 10
2
LibFuzzer and platforms availability
r247321 refactors the code so that it should build on Mac.
I haven't actually tested it on Mac -- so please help me and send follow up
patches if needed.
check-fuzzer will still fail because some of the libFuzzer tests require
dfsan.
I'd use some help from someone with a Mac to modify
lib/Fuzzer/test/CMakeLists.txt so that it does not run dfsan-dependent
tests on Mac.
Thanks,
--kcc
On
2015 Jan 15
2
[LLVMdev] DataFlowSanitizer using wrong memory layout
Hi all,
Any one tried using DataFlowSanitizer on Linux x86_64?
I tried on:
3.13.0-44-generic #73~precise1-Ubuntu SMP Wed Dec 17 00:39:15 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
It assumes wrong memory layout and remaps application code segment as shadow memory, thus causing SIGSEV (Segmentation fault).
Is this know? and fix under way?
-Thanks,
Aravind
-------------- next part
2015 Jul 08
2
[LLVMdev] DataFlowSanitizer only for Linux
FWIW see also http://lists.cs.uiuc.edu/pipermail/cfe-dev/2015-June/043301.html
As far as I understand DFSan functionality isn't required for
libFuzzer to work, so it should be safe to disable DFSan support on
Mac.
On Wed, Jul 8, 2015 at 7:45 AM, Kostya Serebryany <kcc at google.com> wrote:
> +pcc , glider
>
> On Mon, Jul 6, 2015 at 12:59 PM, Juan Ceasar <juan.d.ceasar at
2015 Sep 09
3
LibFuzzer and platforms availability
Hi there.
I’m trying to use LibFuzzer on OSX and face some issues:
I checked out LibFuzzer documentation[1] and managed to proceed until the final step of the first example.
Now I see linker errors related to dfsan, dfsan’s documentation[2] states explicitly “DataFlowSanitizer is a work in progress, currently under development for x86_64 Linux.”.
Does it mean that LibFuzzer available only on
2017 Jun 16
2
How does sanitizers in compiler-rt work?
Can anybody give me any pointer on how compiler-rt, especially the
sanitizers work? Do they operate on IR as any other LLVM pass? Or are they
integral part of the frontend itself? I couldn't spot any documentation on
the internals of compiler-rt project? What happens (sequence of actions)
when I pass -fsanitizer=dataflow to clang?
Precisely, I intend to alter the behaviour of DFSan to suit my
2015 Jul 10
2
[LLVMdev] DataFlowSanitizer only for Linux
Kostya,
I took a quick stab at patching libFuzzer for Apple, but so far I'm
thinking something else is incorrect. Patch is attached but when I went to
reproduce the examples, the toy example went fine, but with PCRE and
Heartbleed I noticed the coverage statistics were pretty poor, and didn't
find anything. Admittedly I moved onto Heartbleed pretty quickly so PCRE
probably isn't the
2013 Aug 22
2
[LLVMdev] [RFC PATCH] X32 ABI support for Clang/compiler-rt (compiler-rt patch)
X32 support patch for compiler-rt. Applies against current trunk.
--- projects/compiler-rt/make/platform/clang_linux.mk~ 2013-08-21
06:27:38.000000000 +0000
+++ projects/compiler-rt/make/platform/clang_linux.mk 2013-08-21
11:16:55.891621025 +0000
@@ -41,7 +41,18 @@
SupportedArches += x86_64
endif
else
- SupportedArches := x86_64
+ # x86-64 arch has two ABIs 64 bit x86-64 and 32 bit
2019 Jun 09
2
Question about the mailing list.
I'm trying to build the example C++ file on the DFSan sanitizer page:
https://clang.llvm.org/docs/DataFlowSanitizer.html
However, i'ts complaining about unknown types (intptr_t, uint16_t,
uint32_t, uint64_t).
I got it to build after adding typedefs from stdint.h and sys/types.h to
the sanitizer/common_interface_defs.h header file:
typedef __intptr_t intptr_t;
typedef u_int16_t uint16_t;
2015 Apr 01
2
[LLVMdev] Missing libclang_rt.san-x86_64.a file for Compiler-rt
Hi everyone,
(Sorry if I'm asking at the wrong mail listing, but compiler-rt page
tells I'd better write on llvm-dev rather than cfe-dev/cfe-users.)
I've just built LLVM/Clang+Compiler-rt (Compiler-rt is put inside
llvm/projects folder) and tried the -fsanitize option. But strangely the
link failed since it cannot find *libclang_rt.san-x86_64.a*. The error
message is as
2015 Jul 06
2
[LLVMdev] DataFlowSanitizer only for Linux
Afternoon,
I had an issue with trying to link a program with the DataFlowSanitizer
functionality, this is from the libFuzzer project, and I was seeing:
clang++ -fsanitize=address -fsanitize-coverage=edge test_fuzzer.cc Fuzzer*.o
Undefined symbols for architecture x86_64:
"_dfsan_create_label", referenced from:
fuzzer::TraceState::DFSanCmpCallback(unsigned long, unsigned
2014 Dec 01
2
[LLVMdev] non-x86 sanitizer buildbots: no rule to make target check-lsan etc.
Hi,
Currently the first stage ("run sanitizer tests in gcc build") of the
sanitizer-ppc64-linux1 buildbot is only failing because of:
+ cd clang_build
+ make -j16 check-lsan
make: *** No rule to make target `check-lsan'. Stop.
+ echo @@@STEP_FAILURE@@@
@@@STEP_FAILURE@@@
+ cd clang_build
+ make -j16 check-msan
make: *** No rule to make target `check-msan'. Stop.
+ echo