* [Tarantool-patches] [PATCH luajit 0/2] Add ASan support in LuaJIT
@ 2023-07-12 21:09 Igor Munkin via Tarantool-patches
2023-07-12 21:09 ` [Tarantool-patches] [PATCH luajit 1/2] build: introduce LUAJIT_USE_ASAN option Igor Munkin via Tarantool-patches
2023-07-12 21:09 ` [Tarantool-patches] [PATCH luajit 2/2] ci: introduce testing workflow with sanitizers Igor Munkin via Tarantool-patches
0 siblings, 2 replies; 10+ messages in thread
From: Igor Munkin via Tarantool-patches @ 2023-07-12 21:09 UTC (permalink / raw)
To: Sergey Kaplun, Sergey Bronnikov; +Cc: tarantool-patches
This series enables ASan support back for LuaJIT repository. The only
thing that was missing the whole time was the option per se (and the
corresponding compile flags, obviously). Anyway, when the option has
been finally added, the dedicated CI workflow has been added too in
scope of the second patch in the series. All other info can be found in
the corresponding patches.
Issue: https://github.com/tarantool/tarantool/issues/5878
Branch: https://github.com/tarantool/luajit/tree/hackaton/gh-5878-enable-ASAN
Tarantool related changes and CI can be found in #8846[1].
Igor Munkin (2):
build: introduce LUAJIT_USE_ASAN option
ci: introduce testing workflow with sanitizers
.github/actions/setup-sanitizers/README.md | 12 ++++
.github/actions/setup-sanitizers/action.yml | 24 +++++++
.github/workflows/sanitizers-testing.yml | 79 +++++++++++++++++++++
CMakeLists.txt | 16 ++---
4 files changed, 122 insertions(+), 9 deletions(-)
create mode 100644 .github/actions/setup-sanitizers/README.md
create mode 100644 .github/actions/setup-sanitizers/action.yml
create mode 100644 .github/workflows/sanitizers-testing.yml
[1]: https://github.com/tarantool/tarantool/pull/8846
--
2.30.2
^ permalink raw reply [flat|nested] 10+ messages in thread
* [Tarantool-patches] [PATCH luajit 1/2] build: introduce LUAJIT_USE_ASAN option
2023-07-12 21:09 [Tarantool-patches] [PATCH luajit 0/2] Add ASan support in LuaJIT Igor Munkin via Tarantool-patches
@ 2023-07-12 21:09 ` Igor Munkin via Tarantool-patches
2023-07-13 10:47 ` Sergey Kaplun via Tarantool-patches
2023-07-13 11:52 ` Sergey Bronnikov via Tarantool-patches
2023-07-12 21:09 ` [Tarantool-patches] [PATCH luajit 2/2] ci: introduce testing workflow with sanitizers Igor Munkin via Tarantool-patches
1 sibling, 2 replies; 10+ messages in thread
From: Igor Munkin via Tarantool-patches @ 2023-07-12 21:09 UTC (permalink / raw)
To: Sergey Kaplun, Sergey Bronnikov; +Cc: tarantool-patches
There was nether a special option nor a variable to configure the
sanitizers support via the build system since the commit
052c1a32a5e74b337686eee229d089d576775931 ("Add preliminary ASAN
support") where ASan support had been introduced. We finally decided to
use this feature in LuaJIT CI, so for convenient build configuration
LUAJIT_USE_ASAN option is added to the root CMakeLists.txt.
Resolves tarantool/tarantool#5878
Co-authored-by: Sergey Kaplun <skaplun@tarantool.org>
Signed-off-by: Igor Munkin <imun@tarantool.org>
---
CMakeLists.txt | 16 +++++++---------
1 file changed, 7 insertions(+), 9 deletions(-)
diff --git a/CMakeLists.txt b/CMakeLists.txt
index 6ef24bba..f113a53d 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -269,15 +269,13 @@ if(LUA_USE_ASSERT)
AppendFlags(TARGET_C_FLAGS -DLUA_USE_ASSERT)
endif()
-# TODO: Implement a configuration option to enable ASAN.
-# There are two entries of LUAJIT_USE_ASAN define:
-# $ grep -rnF 'LUAJIT_USE_ASAN' .
-# ./src/lj_str.c:15:#if LUAJIT_USE_ASAN
-# ./src/host/buildvm.c:36:#if LUAJIT_USE_ASAN
-# At the same time this flag is not provided by LuaJIT original
-# build system (i.e. src/Makefile.original) so there are no
-# related compiler and linker flags passed. This should be done
-# the right way later.
+# Turn on AddressSanitizer support. As a result, all artefacts
+# (i.e. buildvm, LuaJIT, testing infrastructure) are built with
+# ASan enabled.
+option(LUAJIT_USE_ASAN "Build LuaJIT with AddressSanitizer" OFF)
+if(LUAJIT_USE_ASAN)
+ AppendFlags(CMAKE_C_FLAGS -DLUAJIT_USE_ASAN -fsanitize=address)
+endif()
# --- Main source tree ---------------------------------------------------------
--
2.30.2
^ permalink raw reply [flat|nested] 10+ messages in thread
* [Tarantool-patches] [PATCH luajit 2/2] ci: introduce testing workflow with sanitizers
2023-07-12 21:09 [Tarantool-patches] [PATCH luajit 0/2] Add ASan support in LuaJIT Igor Munkin via Tarantool-patches
2023-07-12 21:09 ` [Tarantool-patches] [PATCH luajit 1/2] build: introduce LUAJIT_USE_ASAN option Igor Munkin via Tarantool-patches
@ 2023-07-12 21:09 ` Igor Munkin via Tarantool-patches
2023-07-13 12:12 ` Sergey Bronnikov via Tarantool-patches
2023-07-13 16:09 ` Sergey Kaplun via Tarantool-patches
1 sibling, 2 replies; 10+ messages in thread
From: Igor Munkin via Tarantool-patches @ 2023-07-12 21:09 UTC (permalink / raw)
To: Sergey Kaplun, Sergey Bronnikov; +Cc: tarantool-patches
This commit adds GitHub workflow running all available LuaJIT tests with
LUAJIT_USE_ASAN option enabled. For now, sanitizers workflow works only
for Linux/x86_64 as the most scaling setup in our CI. I believe we will
be able to add other platforms being supported, when ARM64 and macOS
runners starvation is defeated. There is also a separate GitHub Action
introduced for convenient setup of the environment.
Follows up tarantool/tarantool#5878
Signed-off-by: Igor Munkin <imun@tarantool.org>
---
.github/actions/setup-sanitizers/README.md | 12 ++++
.github/actions/setup-sanitizers/action.yml | 24 +++++++
.github/workflows/sanitizers-testing.yml | 79 +++++++++++++++++++++
3 files changed, 115 insertions(+)
create mode 100644 .github/actions/setup-sanitizers/README.md
create mode 100644 .github/actions/setup-sanitizers/action.yml
create mode 100644 .github/workflows/sanitizers-testing.yml
diff --git a/.github/actions/setup-sanitizers/README.md b/.github/actions/setup-sanitizers/README.md
new file mode 100644
index 00000000..3aa9e214
--- /dev/null
+++ b/.github/actions/setup-sanitizers/README.md
@@ -0,0 +1,12 @@
+# Setup environment for sanitizers on Linux
+
+Action setups the environment on Linux runners (install requirements, setup the
+workflow environment, etc) for testing with sanitizers enabled.
+
+## How to use Github Action from Github workflow
+
+Add the following code to the running steps before LuaJIT configuration:
+```
+- uses: ./.github/actions/setup-sanitizers
+ if: ${{ matrix.OS == 'Linux' }}
+```
diff --git a/.github/actions/setup-sanitizers/action.yml b/.github/actions/setup-sanitizers/action.yml
new file mode 100644
index 00000000..ca6b6b9f
--- /dev/null
+++ b/.github/actions/setup-sanitizers/action.yml
@@ -0,0 +1,24 @@
+name: Setup CI environment for testing with sanitizers on Linux
+description: Common part to tweak Linux CI runner environment for sanitizers
+runs:
+ using: composite
+ steps:
+ - name: Setup CI environment
+ uses: ./.github/actions/setup
+ - name: Set CMAKE_BUILD_PARALLEL_LEVEL
+ run: |
+ # Set CMAKE_BUILD_PARALLEL_LEVEL environment variable to
+ # limit the number of parallel jobs for build/test step.
+ NPROC=$(nproc)
+ echo CMAKE_BUILD_PARALLEL_LEVEL=$(($NPROC + 1)) | tee -a $GITHUB_ENV
+ shell: bash
+ - name: Install build and test dependencies
+ run: |
+ apt -y update
+ apt -y install clang-11 cmake ninja-build make perl
+ shell: bash
+ - name: Set Clang as a default toolchain
+ run: |
+ echo CC=clang-11 | tee -a $GITHUB_ENV
+ echo CXX=clang++-11 | tee -a $GITHUB_ENV
+ shell: bash
diff --git a/.github/workflows/sanitizers-testing.yml b/.github/workflows/sanitizers-testing.yml
new file mode 100644
index 00000000..ab8e5dc7
--- /dev/null
+++ b/.github/workflows/sanitizers-testing.yml
@@ -0,0 +1,79 @@
+name: Sanitizers testing
+
+on:
+ push:
+ branches-ignore:
+ - '**-notest'
+ - 'upstream-**'
+ tags-ignore:
+ - '**'
+
+concurrency:
+ # An update of a developer branch cancels the previously
+ # scheduled workflow run for this branch. However, the default
+ # branch, and long-term branch (tarantool/release/2.11,
+ # tarantool/release/2.10, etc) workflow runs are never canceled.
+ #
+ # We use a trick here: define the concurrency group as 'workflow
+ # run ID' + # 'workflow run attempt' because it is a unique
+ # combination for any run. So it effectively discards grouping.
+ #
+ # XXX: we cannot use `github.sha` as a unique identifier because
+ # pushing a tag may cancel a run that works on a branch push
+ # event.
+ group: ${{ startsWith(github.ref, 'refs/heads/tarantool/')
+ && format('{0}-{1}', github.run_id, github.run_attempt)
+ || format('{0}-{1}', github.workflow, github.ref) }}
+ cancel-in-progress: true
+
+jobs:
+ test-asan:
+ strategy:
+ fail-fast: false
+ matrix:
+ # XXX: Let's start with only Linux/x86_64
+ BUILDTYPE: [Debug, Release]
+ GC64: [ON, OFF]
+ include:
+ - BUILDTYPE: Debug
+ CMAKEFLAGS: -DCMAKE_BUILD_TYPE=Debug -DLUA_USE_ASSERT=ON -DLUA_USE_APICHECK=ON
+ - BUILDTYPE: Release
+ CMAKEFLAGS: -DCMAKE_BUILD_TYPE=RelWithDebInfo
+ runs-on: [self-hosted, regular, Linux, x86_64]
+ name: >
+ LuaJIT with ASan (Linux/x86_64)
+ ${{ matrix.BUILDTYPE }}
+ GC64:${{ matrix.GC64 }}
+ steps:
+ - uses: actions/checkout@v3
+ with:
+ fetch-depth: 0
+ submodules: recursive
+ - name: setup Linux for sanitizers
+ uses: ./.github/actions/setup-sanitizers
+ - name: configure
+ run: >
+ cmake -S . -B ${{ env.BUILDDIR }}
+ -G Ninja
+ ${{ matrix.CMAKEFLAGS }}
+ -DLUAJIT_ENABLE_GC64=${{ matrix.GC64 }}
+ -DLUAJIT_USE_ASAN=ON
+ - name: build
+ run: cmake --build . --parallel
+ working-directory: ${{ env.BUILDDIR }}
+ - name: test
+ env:
+ # Enable as much checks as possible. See more info here:
+ # https://github.com/google/sanitizers/wiki/AddressSanitizerFlags
+ ASAN_OPTIONS: " \
+ detect_invalid_pointer_pairs=1: \
+ detect_leaks=1: \
+ detect_stack_use_after_return=1: \
+ dump_instruction_bytes=1: \
+ heap_profile=0: \
+ print_suppressions=0 \
+ symbolize=1: \
+ unmap_shadow_on_exit=1: \
+ "
+ run: cmake --build . --parallel --target LuaJIT-test
+ working-directory: ${{ env.BUILDDIR }}
--
2.30.2
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [Tarantool-patches] [PATCH luajit 1/2] build: introduce LUAJIT_USE_ASAN option
2023-07-12 21:09 ` [Tarantool-patches] [PATCH luajit 1/2] build: introduce LUAJIT_USE_ASAN option Igor Munkin via Tarantool-patches
@ 2023-07-13 10:47 ` Sergey Kaplun via Tarantool-patches
2023-07-13 11:52 ` Sergey Bronnikov via Tarantool-patches
1 sibling, 0 replies; 10+ messages in thread
From: Sergey Kaplun via Tarantool-patches @ 2023-07-13 10:47 UTC (permalink / raw)
To: Igor Munkin; +Cc: tarantool-patches
Hi, Igor!
Thanks for the patch!
LGTM!
--
Best regards,
Sergey Kaplun
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [Tarantool-patches] [PATCH luajit 1/2] build: introduce LUAJIT_USE_ASAN option
2023-07-12 21:09 ` [Tarantool-patches] [PATCH luajit 1/2] build: introduce LUAJIT_USE_ASAN option Igor Munkin via Tarantool-patches
2023-07-13 10:47 ` Sergey Kaplun via Tarantool-patches
@ 2023-07-13 11:52 ` Sergey Bronnikov via Tarantool-patches
2023-07-21 8:13 ` Igor Munkin via Tarantool-patches
1 sibling, 1 reply; 10+ messages in thread
From: Sergey Bronnikov via Tarantool-patches @ 2023-07-13 11:52 UTC (permalink / raw)
To: Igor Munkin, Sergey Kaplun; +Cc: tarantool-patches
Hi, Igor!
Thanks for the patch! This patch LGTM after fixing a typo.
Sergey
On 7/13/23 00:09, Igor Munkin wrote:
> There was nether a special option nor a variable to configure the
Typo: nether -> neither
> sanitizers support via the build system since the commit
> 052c1a32a5e74b337686eee229d089d576775931 ("Add preliminary ASAN
> support") where ASan support had been introduced. We finally decided to
> use this feature in LuaJIT CI, so for convenient build configuration
> LUAJIT_USE_ASAN option is added to the root CMakeLists.txt.
>
> Resolves tarantool/tarantool#5878
>
> Co-authored-by: Sergey Kaplun <skaplun@tarantool.org>
> Signed-off-by: Igor Munkin <imun@tarantool.org>
> ---
> CMakeLists.txt | 16 +++++++---------
> 1 file changed, 7 insertions(+), 9 deletions(-)
>
> diff --git a/CMakeLists.txt b/CMakeLists.txt
> index 6ef24bba..f113a53d 100644
> --- a/CMakeLists.txt
> +++ b/CMakeLists.txt
> @@ -269,15 +269,13 @@ if(LUA_USE_ASSERT)
> AppendFlags(TARGET_C_FLAGS -DLUA_USE_ASSERT)
> endif()
>
> -# TODO: Implement a configuration option to enable ASAN.
> -# There are two entries of LUAJIT_USE_ASAN define:
> -# $ grep -rnF 'LUAJIT_USE_ASAN' .
> -# ./src/lj_str.c:15:#if LUAJIT_USE_ASAN
> -# ./src/host/buildvm.c:36:#if LUAJIT_USE_ASAN
> -# At the same time this flag is not provided by LuaJIT original
> -# build system (i.e. src/Makefile.original) so there are no
> -# related compiler and linker flags passed. This should be done
> -# the right way later.
> +# Turn on AddressSanitizer support. As a result, all artefacts
> +# (i.e. buildvm, LuaJIT, testing infrastructure) are built with
> +# ASan enabled.
> +option(LUAJIT_USE_ASAN "Build LuaJIT with AddressSanitizer" OFF)
> +if(LUAJIT_USE_ASAN)
> + AppendFlags(CMAKE_C_FLAGS -DLUAJIT_USE_ASAN -fsanitize=address)
> +endif()
>
> # --- Main source tree ---------------------------------------------------------
>
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [Tarantool-patches] [PATCH luajit 2/2] ci: introduce testing workflow with sanitizers
2023-07-12 21:09 ` [Tarantool-patches] [PATCH luajit 2/2] ci: introduce testing workflow with sanitizers Igor Munkin via Tarantool-patches
@ 2023-07-13 12:12 ` Sergey Bronnikov via Tarantool-patches
2023-07-21 8:14 ` Igor Munkin via Tarantool-patches
2023-07-13 16:09 ` Sergey Kaplun via Tarantool-patches
1 sibling, 1 reply; 10+ messages in thread
From: Sergey Bronnikov via Tarantool-patches @ 2023-07-13 12:12 UTC (permalink / raw)
To: Igor Munkin, Sergey Kaplun; +Cc: tarantool-patches
Thanks for the patch! LGTM with minor comments below
Sergey
On 7/13/23 00:09, Igor Munkin wrote:
> This commit adds GitHub workflow running all available LuaJIT tests with
> LUAJIT_USE_ASAN option enabled. For now, sanitizers workflow works only
> for Linux/x86_64 as the most scaling setup in our CI. I believe we will
> be able to add other platforms being supported, when ARM64 and macOS
beware that ARM64 is absent in a list of supported platforms [1]
https://clang.llvm.org/docs/AddressSanitizer.html#supported-platforms
<snipped>
> + - name: test
> + env:
> + # Enable as much checks as possible. See more info here:
However, some checks are *disabled*, for example "print_suppressions"
and "heap_profile" are disabled. Is it intentionally?
> + # https://github.com/google/sanitizers/wiki/AddressSanitizerFlags
there are also LeakSanitizer flags here
https://github.com/google/sanitizers/wiki/AddressSanitizerLeakSanitizer#flags
> + ASAN_OPTIONS: " \
> + detect_invalid_pointer_pairs=1: \
> + detect_leaks=1: \
> + detect_stack_use_after_return=1: \
> + dump_instruction_bytes=1: \
> + heap_profile=0: \
> + print_suppressions=0 \
> + symbolize=1: \
> + unmap_shadow_on_exit=1: \
> + "
> + run: cmake --build . --parallel --target LuaJIT-test
> + working-directory: ${{ env.BUILDDIR }}
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [Tarantool-patches] [PATCH luajit 2/2] ci: introduce testing workflow with sanitizers
2023-07-12 21:09 ` [Tarantool-patches] [PATCH luajit 2/2] ci: introduce testing workflow with sanitizers Igor Munkin via Tarantool-patches
2023-07-13 12:12 ` Sergey Bronnikov via Tarantool-patches
@ 2023-07-13 16:09 ` Sergey Kaplun via Tarantool-patches
2023-07-21 8:13 ` Igor Munkin via Tarantool-patches
1 sibling, 1 reply; 10+ messages in thread
From: Sergey Kaplun via Tarantool-patches @ 2023-07-13 16:09 UTC (permalink / raw)
To: Igor Munkin; +Cc: tarantool-patches
Hi, Igor!
The patch LGTM as general, just a single note, also mentioned by Sergey
offline:
Should we also enable LUAJIT_USE_SYSMALLOC for our CI workflow to make
the ASan instrumentation usefull?
On 12.07.23, Igor Munkin wrote:
> This commit adds GitHub workflow running all available LuaJIT tests with
> LUAJIT_USE_ASAN option enabled. For now, sanitizers workflow works only
> for Linux/x86_64 as the most scaling setup in our CI. I believe we will
> be able to add other platforms being supported, when ARM64 and macOS
> runners starvation is defeated. There is also a separate GitHub Action
> introduced for convenient setup of the environment.
>
> Follows up tarantool/tarantool#5878
>
> Signed-off-by: Igor Munkin <imun@tarantool.org>
<snipped>
>
--
Best regards,
Sergey Kaplun
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [Tarantool-patches] [PATCH luajit 1/2] build: introduce LUAJIT_USE_ASAN option
2023-07-13 11:52 ` Sergey Bronnikov via Tarantool-patches
@ 2023-07-21 8:13 ` Igor Munkin via Tarantool-patches
0 siblings, 0 replies; 10+ messages in thread
From: Igor Munkin via Tarantool-patches @ 2023-07-21 8:13 UTC (permalink / raw)
To: Sergey Bronnikov; +Cc: tarantool-patches
Sergey,
Thanks for your review! I've fixed the typo you're mentioning. See the
second version of the series[1] for updates.
[1]: https://lists.tarantool.org/tarantool-patches/cover.1689925402.git.imun@tarantool.org/T/#t
--
Best regards,
IM
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [Tarantool-patches] [PATCH luajit 2/2] ci: introduce testing workflow with sanitizers
2023-07-13 16:09 ` Sergey Kaplun via Tarantool-patches
@ 2023-07-21 8:13 ` Igor Munkin via Tarantool-patches
0 siblings, 0 replies; 10+ messages in thread
From: Igor Munkin via Tarantool-patches @ 2023-07-21 8:13 UTC (permalink / raw)
To: Sergey Kaplun; +Cc: tarantool-patches
Sergey,
Thanks for your review!
On 13.07.23, Sergey Kaplun wrote:
> Hi, Igor!
> The patch LGTM as general, just a single note, also mentioned by Sergey
> offline:
>
> Should we also enable LUAJIT_USE_SYSMALLOC for our CI workflow to make
> the ASan instrumentation usefull?
I added the warning in CMake, if LUAJIT_USE_ASAN is enabled without
LUAJIT_USE_SYSMALLOC, and enabled it in CI. See the second version of
the series[1] for updates.
>
> On 12.07.23, Igor Munkin wrote:
> > This commit adds GitHub workflow running all available LuaJIT tests with
> > LUAJIT_USE_ASAN option enabled. For now, sanitizers workflow works only
> > for Linux/x86_64 as the most scaling setup in our CI. I believe we will
> > be able to add other platforms being supported, when ARM64 and macOS
> > runners starvation is defeated. There is also a separate GitHub Action
> > introduced for convenient setup of the environment.
> >
> > Follows up tarantool/tarantool#5878
> >
> > Signed-off-by: Igor Munkin <imun@tarantool.org>
>
> <snipped>
>
> >
>
> --
> Best regards,
> Sergey Kaplun
[1]: https://lists.tarantool.org/tarantool-patches/cover.1689925402.git.imun@tarantool.org/T/#t
--
Best regards,
IM
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [Tarantool-patches] [PATCH luajit 2/2] ci: introduce testing workflow with sanitizers
2023-07-13 12:12 ` Sergey Bronnikov via Tarantool-patches
@ 2023-07-21 8:14 ` Igor Munkin via Tarantool-patches
0 siblings, 0 replies; 10+ messages in thread
From: Igor Munkin via Tarantool-patches @ 2023-07-21 8:14 UTC (permalink / raw)
To: Sergey Bronnikov; +Cc: tarantool-patches
Sergey,
Thanks for the patch! See my replies below, and the second version of
the series[1] for updates.
On 13.07.23, Sergey Bronnikov wrote:
> Thanks for the patch! LGTM with minor comments below
>
> Sergey
>
> On 7/13/23 00:09, Igor Munkin wrote:
> > This commit adds GitHub workflow running all available LuaJIT tests with
> > LUAJIT_USE_ASAN option enabled. For now, sanitizers workflow works only
> > for Linux/x86_64 as the most scaling setup in our CI. I believe we will
> > be able to add other platforms being supported, when ARM64 and macOS
>
> beware that ARM64 is absent in a list of supported platforms [1]
>
> https://clang.llvm.org/docs/AddressSanitizer.html#supported-platforms
Thanks for mentioning: removed this from commit message.
>
> <snipped>
>
> > + - name: test
> > + env:
> > + # Enable as much checks as possible. See more info here:
>
> However, some checks are *disabled*, for example "print_suppressions"
>
> and "heap_profile" are disabled. Is it intentionally?
"print_suppressions" is disabled intentionally, to not spoil the output
of the test; "heap_profile" is also disabled in Tarantool, and it is
experimental, so I'm afraid introducing flaky failures when enable it.
If you can suggest particular flags to be enabled, feel free to share in
the second version of the series[1].
>
> > + # https://github.com/google/sanitizers/wiki/AddressSanitizerFlags
> there are also LeakSanitizer flags here
> https://github.com/google/sanitizers/wiki/AddressSanitizerLeakSanitizer#flags
> > + ASAN_OPTIONS: " \
> > + detect_invalid_pointer_pairs=1: \
> > + detect_leaks=1: \
> > + detect_stack_use_after_return=1: \
> > + dump_instruction_bytes=1: \
> > + heap_profile=0: \
> > + print_suppressions=0 \
> > + symbolize=1: \
> > + unmap_shadow_on_exit=1: \
> > + "
> > + run: cmake --build . --parallel --target LuaJIT-test
> > + working-directory: ${{ env.BUILDDIR }}
[1]: https://lists.tarantool.org/tarantool-patches/cover.1689925402.git.imun@tarantool.org/T/#t
--
Best regards,
IM
^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2023-07-21 8:27 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-07-12 21:09 [Tarantool-patches] [PATCH luajit 0/2] Add ASan support in LuaJIT Igor Munkin via Tarantool-patches
2023-07-12 21:09 ` [Tarantool-patches] [PATCH luajit 1/2] build: introduce LUAJIT_USE_ASAN option Igor Munkin via Tarantool-patches
2023-07-13 10:47 ` Sergey Kaplun via Tarantool-patches
2023-07-13 11:52 ` Sergey Bronnikov via Tarantool-patches
2023-07-21 8:13 ` Igor Munkin via Tarantool-patches
2023-07-12 21:09 ` [Tarantool-patches] [PATCH luajit 2/2] ci: introduce testing workflow with sanitizers Igor Munkin via Tarantool-patches
2023-07-13 12:12 ` Sergey Bronnikov via Tarantool-patches
2023-07-21 8:14 ` Igor Munkin via Tarantool-patches
2023-07-13 16:09 ` Sergey Kaplun via Tarantool-patches
2023-07-21 8:13 ` Igor Munkin via Tarantool-patches
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox