Join GitHub today
GitHub is home to over 31 million developers working together to host and review code, manage projects, and build software together.
Sign upTracking issue for sanitizer support #39699
Comments
japaric
added
B-unstable
T-tools
labels
Feb 9, 2017
japaric
referenced this issue
Feb 9, 2017
Merged
LeakSanitizer, ThreadSanitizer, AddressSanitizer and MemorySanitizer support #38699
pmarcelll
referenced this issue
Mar 5, 2017
Closed
Add build options for running tests under thread sanitizer #1930
kennytm
referenced this issue
Apr 26, 2017
Merged
Support AddressSanitizer and ThreadSanitizer on x86_64-apple-darwin #41352
This comment has been minimized.
This comment has been minimized.
|
Just for record. Currently only 4 sanitizers are enabled (asan, lsan, msan, tsan), and only in As of the LLVM 4.0 merge (rust-lang/compiler-rt@c8a8767), compiler-rt actually supports much more targets than rustc do, and also some additional sanitizers (e.g. esan) can be enabled in the future.
(not all of these are sanitizers, some of them are just tools or libraries that depend on the common sanitizer runtime) |
This comment has been minimized.
This comment has been minimized.
|
Is there any plan for stabilization here? Even if it remains x86_64-only for now, with only a few of the available sanitizers, it will still be quite useful to have. I have users that want this (rhbz1447423), but now that -Z is forbidden I want to wait for properly-supported sanitizer options. |
This comment has been minimized.
This comment has been minimized.
|
Hi, If I understand this issue, you would like to block certain -Z features from coming to stable rust. Sanitisers seems to be one of these. We have a very good use case for them though. When you have a C + Rust with FFI, and the C code is linked to libasan, the rust component will fail to link as it's missing libasan. For us it's important to get sanitisers into rust stable as we have an extensive C code based (that is well sanitised), and having this option available to us will help to determine if our Rust + C integration is behaving correctly. I hope this helps explain our use case, as for us this is a blocker to our project adopting Rust today. Thanks you! |
This comment has been minimized.
This comment has been minimized.
|
FWIW, it's not just certain -Z features, but -Z as a whole being blocked as unstable now. |
alexcrichton
added
T-dev-tools
and removed
T-tools
labels
May 22, 2017
kennytm
referenced this issue
Jun 7, 2017
Closed
AddressSanitizer: false positives with structs/tuples that end with Zero Sized Types #39882
This comment has been minimized.
This comment has been minimized.
|
#42711 PR for dylib asan support. |
Mark-Simulacrum
added
the
C-tracking-issue
label
Jul 22, 2017
This comment has been minimized.
This comment has been minimized.
|
Hi, I don't see any activity here. We really need this for our quality assurance workflow to be stabilised. What is outstanding and required for this to be made available in stable rustc? Thanks! |
japaric commentedFeb 9, 2017
•
edited by Manishearth
Currently we have:
A rustc flag,
-Z sanitizer, to sanitize rlibs (it adds an extra LLVM pass/attribute) and executables (it links to the sanitizer runtime). Added in #38699.A few violations (false positives?) in the test runner
rustc --test) #39608rustc --test) #39610Known issues
Things that we may want to add: