On 14 February 2013 05:24, Konstantin Serebryany
<konstantin.s.serebry...@gmail.com> wrote:
> Hi Christophe,
>
> Are you talking about ARM Linux?

Yes.

> It will be easier for us (asan developers) to fix this upstream first.
> Could you please file a bug at https://code.google.com/p/address-sanitizer/ ?
OK, just entered as #160


>> ** shadow start 0x1ffff000 shadow_end 0x3fffffff
>> ==30022== Process memory map follows:
>>     0x00000000-0x00008000
>>     0x00008000-0x00009000    /home/lyon/src/tests/sanitizer.armhf
>>     0x00009000-0x00010000
>>     0x00010000-0x00011000    /home/lyon/src/tests/sanitizer.armhf
>
> 0x00011000-0xf4f50000   << where is this crazy mapping come from?
>
I don't know :-) It's probably a qemu feature....

Christophe.

Reply via email to