You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
http://lab.llvm.org:8011/builders/sanitizer-x86_64-linux/builds/13369/steps/run%20asan%20tests%20%5BAndroid%2Fx86-K%5D/logs/stdio
We've got hardcoded shadow mapping in asm instrumentation code.
Android uses zero-based shadow, unlike Linux.
We should share and reuse AddressSanitizerPass's knowledge about shadow mappings on
various platforms.
Reported by eugenis@google.com on 2014-10-10 12:23:14
The text was updated successfully, but these errors were encountered:
The url in the original message does not work anymore, here is a recent more recent
run of the same test: http://lab.llvm.org:8011/builders/sanitizer-x86_64-linux/builds/14766/steps/run%20asan%20tests%20%5BAndroid%2Fx86-K%5D/logs/stdio
Reported by krasin@google.com on 2014-12-20 03:21:35
cmake in asan/tests checks for CAN_TARGET_I386, but android is I686
instrumentation of rep movs uses EBX as a scratch register. On x86 EBX is a PIC register. On Android we link ASan runtime as a shared library, and crash when entering the PLT stub for __asan_report_load with bad EBX.
Originally reported on Google Code with ID 353
Reported by
eugenis@google.com
on 2014-10-10 12:23:14The text was updated successfully, but these errors were encountered: