Re: UBSan suppressions on embedded system

2016-05-03 Thread 'Alexey Samsonov' via address-sanitizer
On Tue, May 3, 2016 at 10:49 AM, Konstantin Serebryany < konstantin.s.serebry...@gmail.com> wrote: > > > On Tue, May 3, 2016 at 1:03 AM, 'Ilya' via address-sanitizer < > address-sanitizer@googlegroups.com> wrote: > >> Hello everybody, >> first of all: thanks for reading. I have questions regarding

Re: False positive with boost::any_range with non-reference Reference type?

2015-06-19 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
+Kuba, Anna in case they have any ideas, or are able to reproduce it under Apple Clang. On Thu, Jun 18, 2015 at 9:37 AM, Stefan Haller wrote: > I'm getting a container overflow failure that I think is a false > positive; but I don't understand what's going on, so I'm posting here > instead of f

Re: Failure on large allocation

2015-06-05 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
On Fri, Jun 5, 2015 at 11:33 AM, Yuri Gribov wrote: > On Fri, Jun 5, 2015 at 9:21 PM, 'Alexey Samsonov' via address-sanitizer < > address-sanitizer@googlegroups.com> wrote: > >> Wow, the world of 1Tb RAM machines is here. >> 1) You can try to allocate 1

Re: Failure on large allocation

2015-06-05 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
Wow, the world of 1Tb RAM machines is here. 1) You can try to allocate 156Gb of memory with mmap() instead of malloc(). 2) 64Gb is a hard limit on allocation size in ASan runtime. You can try to bump this limit (kMaxAllowedMallocSize in lib/asan/asan_allocator.cc) and rebuilt it from source. On Fr

Re: unknown-crash with __asan_memset

2015-06-05 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
Looks like the position of Java heap (0xdfff8000) interferes with ASan shadow memory mappings. See memory layout in projects/compiler-rt/lib/asan/asan_mapping.h. __asan_region_is_poisoned arguments seem to be a red herring - it's possible that debug info is incorrect. On Fri, Jun 5, 2015 at 5:53

Re: Issue - your application is linked against incompatible ASan runtimes.

2015-05-26 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
Also, try "-fsanitize=address -shared-libasan", instead of passing "-lasan" manually. On Tue, May 26, 2015 at 3:39 PM, 'Evgeniy Stepanov' via address-sanitizer < address-sanitizer@googlegroups.com> wrote: > Looks like your clang installation is broken. /usr/local/bin/clang is > 3.6.1, but the lib

Re: Blacklist function from a library loaded with dlopen

2015-05-22 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
Hi Konrad, Blacklist doesn't work for disabling memory leaks. I think you should try suppressions instead ( https://code.google.com/p/address-sanitizer/wiki/LeakSanitizer). You can add the following line to suppressions.txt "leak:*mylib.so", and then run your program with LSAN_OPTIONS=suppressions

Re: Sanitized binary built with GCC 4.8.2 -fsanitize=address ignores ASAN_OPTIONS.

2015-04-29 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
Hi, On Wed, Apr 29, 2015 at 11:41 AM, Niel Orcutt wrote: > I built a simple sanitized binary built with GCC 4.8.2 -fsanitize=address. > The binary works and fails as it should. However, if I do "export > ASAN_OPTIONS=help=1", and run the binary, the binary runs and fails in the > same way, but

Re: Executable names in Asan tests

2015-04-20 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
On Mon, Apr 20, 2015 at 6:39 AM, Ivan A. Kosarev wrote: > Thanks, Alexey. Unfortunately, editing the output won't work for tests > where the "/proc/self/exe" is generated in place of the object file for > symbolization purposes, like this: > > FAIL: AddressSanitizer-i386-freebsd :: TestCases/Pos

Re: Executable names in Asan tests

2015-04-14 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
Hi Ivan, Sorry for the late response. That's unfortunate that we can't reliably get executable name on FreeBSD... I would abstain from adding yet another runtime flag or interface function for that purpose, though. I'd rather fix the test to pass on FreeBSD. For instance, if you that the name of

Re: Small patch for run_spec_clang_asan.sh

2015-02-11 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
On Tue, Feb 3, 2015 at 2:39 AM, Yury Gribov wrote: > On 01/23/2015 09:18 AM, Yury Gribov wrote: > >> Hi all, >> >> This patch sets up proper library path for SPEC benchmarks (otherwise >> some tests fail because trunk libstdc++ uses some new symbols) and also >> allows users to specify monitor_sp

Re: Symbolizers and OS X

2014-12-04 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
Hi, On Wed, Dec 3, 2014 at 3:59 PM, Kuba Brecka wrote: > Hi everyone, > > I'd like to ask about the various symbolizers that are used by ASan and > sanitizer_common, and then propose some changes to get better OS X support. > > If I understand correctly, the general llvm-symbolizer (and its inte

Re: Mac: how to print variables' value when debugging a asan-ified executable?

2014-11-03 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
Hi, Try to run the code with trunk LLVM/Clang. If the problem remains with the latest Clang, then you'd have to wait a bit more - I have a tentative change that is expected to improve debug info for local variables, but it's not in the trunk yet. On Fri, Oct 31, 2014 at 5:01 PM, texsetter wrote:

Re: AddressSanitizer and issue suppression

2014-09-26 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
;t. > Sure. The relevant parts are ACCESS_MEMORY_RANGE and CHECK_RANGES_OVERLAP macro in asan_interceptors.cc > On Sep 26, 2014 8:52 AM, "'Alexey Samsonov' via address-sanitizer" < > address-sanitizer@googlegroups.com> wrote: > >> >> On Thu, Sep 2

Re: AddressSanitizer and issue suppression

2014-09-25 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
h strcasecmp) Sure. But it would be great to be able to disable interceptors in ASan while still keeping __asan_report_error noreturn. > > On Thu, Sep 25, 2014 at 6:17 PM, 'Alexey Samsonov' via > address-sanitizer wrote: > > Can you add a new suppression kind that would d

Re: AddressSanitizer and issue suppression

2014-09-25 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
when a suppression > > matches the report that didn't originate from an interceptor) > SGTM > > > > > On Thu, Sep 25, 2014 at 4:08 AM, 'Alexey Samsonov' via > > address-sanitizer wrote: > >> I haven't looked at the code in a while, but this s

Re: AddressSanitizer and issue suppression

2014-09-24 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
I haven't looked at the code in a while, but this should be possible. We already have a global suppression context in sanitizer_common. On Wed, Sep 24, 2014 at 4:47 PM, Konstantin Serebryany < konstantin.s.serebry...@gmail.com> wrote: > We probably can reuse lib/sanitizer_common/sanitizer_suppres

Re: Mac: how to print variables' value when debugging a asan-ified executable?

2014-07-16 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
Hi, This looks like https://code.google.com/p/address-sanitizer/issues/detail?id=235. Recently (but, I guess, after llvm-3.4.1) there were improvements in debug information for local variables in ASan builds. Can you try tip-of-trunk Clang on that example? On Tue, Jul 15, 2014 at 6:41 PM, Shiny

Re: Future of -fsanitize-recover

2014-06-10 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
On Tue, Jun 10, 2014 at 3:42 AM, 'Evgeniy Stepanov' via address-sanitizer < address-sanitizer@googlegroups.com> wrote: > On Tue, Jun 10, 2014 at 1:26 PM, Konstantin Serebryany > wrote: > > On Tue, Jun 10, 2014 at 12:50 PM, Yuri Gribov > wrote: > >>> there are downsides: one bug may trigger anoth

Re: Issue 235 in address-sanitizer: compiling with asan generates wrong DWARF

2014-05-27 Thread &#x27;Alexey Samsonov&#x27; via address-sanitizer
Hi Martin, Thanks for experimenting. On Sun, May 25, 2014 at 5:39 AM, Martin Ri wrote: > The patch applied cleanly, but I'm still seeing problems. > > 189 UnsignedType GetBiased() const > 190 { > 191 UnsignedType const& key = reinterpret_cast const&>(value_); > 192