Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merging the arm-neon branch #3

Merged
merged 29 commits into from
Sep 9, 2015
Merged

Merging the arm-neon branch #3

merged 29 commits into from
Sep 9, 2015

Conversation

FrancescAlted
Copy link
Member

The support for shuffle is here, although the bitshuffle still needs some love. But everything is setup decently (the NEON acceleration sources follows the internal Blosc format), so it is better to merge now before this starts to differ too much from master.

LucianMarc and others added 29 commits August 31, 2015 16:36
Sync with Blosc/c-blosc2
Workaround while fixing the neon-bitshuffling
Sync with base repository
FrancescAlted added a commit that referenced this pull request Sep 9, 2015
Merging the arm-neon branch
@FrancescAlted FrancescAlted merged commit 0b92af2 into master Sep 9, 2015
@FrancescAlted FrancescAlted deleted the arm-neon branch September 9, 2015 09:58
LucianMarc added a commit that referenced this pull request Sep 10, 2015
Syc with base repository
nmoinvaz added a commit to nmoinvaz/c-blosc2 that referenced this pull request Nov 22, 2020
==108==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000a7 at pc 0x0000005e37a0 bp 0x7ffebe8902b0 sp 0x7ffebe8902a8
READ of size 1 at 0x6020000000a7 thread T0
SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds)
    #0 0x5e379f in swap_store /src/c-blosc2/blosc/frame.c:50:27
    Blosc#1 0x5e379f in blosc2_frame_from_sframe /src/c-blosc2/blosc/frame.c:782:3
    Blosc#2 0x5d8032 in blosc2_schunk_open_sframe /src/c-blosc2/blosc/schunk.c:259:25
    Blosc#3 0x561ad8 in LLVMFuzzerTestOneInput /src/c-blosc2/tests/fuzz/fuzz_decompress_frame.c:23:27
    Blosc#4 0x466741 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15
    Blosc#5 0x467d56 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:792:3
    Blosc#6 0x468209 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:845:3
    Blosc#7 0x45667b in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:906:6
    Blosc#8 0x480722 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
    Blosc#9 0x7f2d2bfbf83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
    Blosc#10 0x42b4d8 in _start (/tmp/not-out/decompress_frame_fuzzer+0x42b4d8)

DEDUP_TOKEN: swap_store--blosc2_frame_from_sframe--blosc2_schunk_open_sframe
0x6020000000a7 is located 9 bytes to the left of 8-byte region [0x6020000000b0,0x6020000000b8)
allocated by thread T0 here:
    #0 0x52ee6d in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:145:3
    Blosc#1 0x5e337a in swap_store /src/c-blosc2/blosc/frame.c:44:21
    Blosc#2 0x5e337a in blosc2_frame_from_sframe /src/c-blosc2/blosc/frame.c:782:3
    Blosc#3 0x5d8032 in blosc2_schunk_open_sframe /src/c-blosc2/blosc/schunk.c:259:25
    Blosc#4 0x561ad8 in LLVMFuzzerTestOneInput /src/c-blosc2/tests/fuzz/fuzz_decompress_frame.c:23:27
    Blosc#5 0x466741 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15
    Blosc#6 0x467d56 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:792:3
    Blosc#7 0x468209 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:845:3
    Blosc#8 0x45667b in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:906:6
    Blosc#9 0x480722 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
    Blosc#10 0x7f2d2bfbf83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
nmoinvaz added a commit to nmoinvaz/c-blosc2 that referenced this pull request Nov 22, 2020
…4_t).

==108==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000a7 at pc 0x0000005e37a0 bp 0x7ffebe8902b0 sp 0x7ffebe8902a8
READ of size 1 at 0x6020000000a7 thread T0
SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds)
    #0 0x5e379f in swap_store /src/c-blosc2/blosc/frame.c:50:27
    Blosc#1 0x5e379f in blosc2_frame_from_sframe /src/c-blosc2/blosc/frame.c:782:3
    Blosc#2 0x5d8032 in blosc2_schunk_open_sframe /src/c-blosc2/blosc/schunk.c:259:25
    Blosc#3 0x561ad8 in LLVMFuzzerTestOneInput /src/c-blosc2/tests/fuzz/fuzz_decompress_frame.c:23:27
    Blosc#4 0x466741 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15
    Blosc#5 0x467d56 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:792:3
    Blosc#6 0x468209 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:845:3
    Blosc#7 0x45667b in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:906:6
    Blosc#8 0x480722 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
    Blosc#9 0x7f2d2bfbf83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
    Blosc#10 0x42b4d8 in _start (/tmp/not-out/decompress_frame_fuzzer+0x42b4d8)

DEDUP_TOKEN: swap_store--blosc2_frame_from_sframe--blosc2_schunk_open_sframe
0x6020000000a7 is located 9 bytes to the left of 8-byte region [0x6020000000b0,0x6020000000b8)
allocated by thread T0 here:
    #0 0x52ee6d in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:145:3
    Blosc#1 0x5e337a in swap_store /src/c-blosc2/blosc/frame.c:44:21
    Blosc#2 0x5e337a in blosc2_frame_from_sframe /src/c-blosc2/blosc/frame.c:782:3
    Blosc#3 0x5d8032 in blosc2_schunk_open_sframe /src/c-blosc2/blosc/schunk.c:259:25
    Blosc#4 0x561ad8 in LLVMFuzzerTestOneInput /src/c-blosc2/tests/fuzz/fuzz_decompress_frame.c:23:27
    Blosc#5 0x466741 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15
    Blosc#6 0x467d56 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:792:3
    Blosc#7 0x468209 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:845:3
    Blosc#8 0x45667b in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:906:6
    Blosc#9 0x480722 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
    Blosc#10 0x7f2d2bfbf83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
nmoinvaz added a commit to nmoinvaz/c-blosc2 that referenced this pull request Nov 22, 2020
…4_t).

==108==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000a7 at pc 0x0000005e37a0 bp 0x7ffebe8902b0 sp 0x7ffebe8902a8
READ of size 1 at 0x6020000000a7 thread T0
SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds)
    #0 0x5e379f in swap_store /src/c-blosc2/blosc/frame.c:50:27
    Blosc#1 0x5e379f in blosc2_frame_from_sframe /src/c-blosc2/blosc/frame.c:782:3
    Blosc#2 0x5d8032 in blosc2_schunk_open_sframe /src/c-blosc2/blosc/schunk.c:259:25
    Blosc#3 0x561ad8 in LLVMFuzzerTestOneInput /src/c-blosc2/tests/fuzz/fuzz_decompress_frame.c:23:27
    Blosc#4 0x466741 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15
    Blosc#5 0x467d56 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:792:3
    Blosc#6 0x468209 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:845:3
    Blosc#7 0x45667b in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:906:6
    Blosc#8 0x480722 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
    Blosc#9 0x7f2d2bfbf83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
    Blosc#10 0x42b4d8 in _start (/tmp/not-out/decompress_frame_fuzzer+0x42b4d8)

DEDUP_TOKEN: swap_store--blosc2_frame_from_sframe--blosc2_schunk_open_sframe
0x6020000000a7 is located 9 bytes to the left of 8-byte region [0x6020000000b0,0x6020000000b8)
allocated by thread T0 here:
    #0 0x52ee6d in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:145:3
    Blosc#1 0x5e337a in swap_store /src/c-blosc2/blosc/frame.c:44:21
    Blosc#2 0x5e337a in blosc2_frame_from_sframe /src/c-blosc2/blosc/frame.c:782:3
    Blosc#3 0x5d8032 in blosc2_schunk_open_sframe /src/c-blosc2/blosc/schunk.c:259:25
    Blosc#4 0x561ad8 in LLVMFuzzerTestOneInput /src/c-blosc2/tests/fuzz/fuzz_decompress_frame.c:23:27
    Blosc#5 0x466741 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15
    Blosc#6 0x467d56 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:792:3
    Blosc#7 0x468209 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:845:3
    Blosc#8 0x45667b in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:906:6
    Blosc#9 0x480722 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
    Blosc#10 0x7f2d2bfbf83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
nmoinvaz added a commit to nmoinvaz/c-blosc2 that referenced this pull request Nov 22, 2020
==108==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000a7 at pc 0x0000005e37a0 bp 0x7ffebe8902b0 sp 0x7ffebe8902a8
READ of size 1 at 0x6020000000a7 thread T0
SCARINESS: 22 (1-byte-read-heap-buffer-overflow-far-from-bounds)
    #0 0x5e379f in swap_store /src/c-blosc2/blosc/frame.c:50:27
    Blosc#1 0x5e379f in blosc2_frame_from_sframe /src/c-blosc2/blosc/frame.c:782:3
    Blosc#2 0x5d8032 in blosc2_schunk_open_sframe /src/c-blosc2/blosc/schunk.c:259:25
    Blosc#3 0x561ad8 in LLVMFuzzerTestOneInput /src/c-blosc2/tests/fuzz/fuzz_decompress_frame.c:23:27
    Blosc#4 0x466741 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15
    Blosc#5 0x467d56 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:792:3
    Blosc#6 0x468209 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:845:3
    Blosc#7 0x45667b in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:906:6
    Blosc#8 0x480722 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
    Blosc#9 0x7f2d2bfbf83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
    Blosc#10 0x42b4d8 in _start (/tmp/not-out/decompress_frame_fuzzer+0x42b4d8)

DEDUP_TOKEN: swap_store--blosc2_frame_from_sframe--blosc2_schunk_open_sframe
0x6020000000a7 is located 9 bytes to the left of 8-byte region [0x6020000000b0,0x6020000000b8)
allocated by thread T0 here:
    #0 0x52ee6d in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:145:3
    Blosc#1 0x5e337a in swap_store /src/c-blosc2/blosc/frame.c:44:21
    Blosc#2 0x5e337a in blosc2_frame_from_sframe /src/c-blosc2/blosc/frame.c:782:3
    Blosc#3 0x5d8032 in blosc2_schunk_open_sframe /src/c-blosc2/blosc/schunk.c:259:25
    Blosc#4 0x561ad8 in LLVMFuzzerTestOneInput /src/c-blosc2/tests/fuzz/fuzz_decompress_frame.c:23:27
    Blosc#5 0x466741 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15
    Blosc#6 0x467d56 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:792:3
    Blosc#7 0x468209 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:845:3
    Blosc#8 0x45667b in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:906:6
    Blosc#9 0x480722 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
    Blosc#10 0x7f2d2bfbf83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
nmoinvaz added a commit to nmoinvaz/c-blosc2 that referenced this pull request Nov 22, 2020
Direct leak of 26720 byte(s) in 1 object(s) allocated from:
    #0 0x52e56d in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:145:3
    Blosc#1 0x78622a in ZSTD_malloc /src/c-blosc2/internal-complibs/zstd-1.4.5/common/zstd_common.c:60:12
    Blosc#2 0xa48397 in ZSTD_createDDict_advanced /src/c-blosc2/internal-complibs/zstd-1.4.5/decompress/zstd_ddict.c:152:49
    Blosc#3 0xa48eaf in ZSTD_createDDict /src/c-blosc2/internal-complibs/zstd-1.4.5/decompress/zstd_ddict.c:173:12
    Blosc#4 0x5b7684 in initialize_context_decompression /src/c-blosc2/blosc/blosc2.c:1615:27
    Blosc#5 0x5b7684 in blosc_run_decompression_with_context /src/c-blosc2/blosc/blosc2.c:2120:11
    Blosc#6 0x5b7f1b in blosc2_decompress /src/c-blosc2/blosc/blosc2.c:2211:12
    Blosc#7 0x5613c3 in LLVMFuzzerTestOneInput /src/c-blosc2/tests/fuzz/fuzz_decompress_chunk.c:34:5
    Blosc#8 0x465e41 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15
    Blosc#9 0x46534a in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:505:3
    Blosc#10 0x467057 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:745:19
    Blosc#11 0x467c05 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:883:5
    Blosc#12 0x455d7b in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:906:6
    Blosc#13 0x47fe22 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10
    Blosc#14 0x7f708964e83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants