On 14 February 2013 05:24, Konstantin Serebryany <konstantin.s.serebry...@gmail.com> wrote: > Hi Christophe, > > Are you talking about ARM Linux?
Yes. > It will be easier for us (asan developers) to fix this upstream first. > Could you please file a bug at https://code.google.com/p/address-sanitizer/ ? OK, just entered as #160 >> ** shadow start 0x1ffff000 shadow_end 0x3fffffff >> ==30022== Process memory map follows: >> 0x00000000-0x00008000 >> 0x00008000-0x00009000 /home/lyon/src/tests/sanitizer.armhf >> 0x00009000-0x00010000 >> 0x00010000-0x00011000 /home/lyon/src/tests/sanitizer.armhf > > 0x00011000-0xf4f50000 << where is this crazy mapping come from? > I don't know :-) It's probably a qemu feature.... Christophe.