Displaying 2 results from an estimated 2 matches for "red_zone".
2013 Jun 04
2
[LLVMdev] Address Sanitizer on Android
...ed ASAN_OPTIONS: debug=1,verbosity=1
==28210==AddressSanitizer: libc interceptors initialized
|| `[0x20000000, 0xffffffff]` || HighMem ||
|| `[0x04000000, 0x1fffffff]` || HighShadow ||
|| `[0x00040000, 0x03ffffff]` || ShadowGap ||
MemToShadow(shadow): 0x00000000 0x00000000 0x00800000 0x03ffffff
red_zone=16
malloc_context_size=30
SHADOW_SCALE: 3
SHADOW_GRANULARITY: 8
SHADOW_OFFSET: 0
==28210==Shadow memory range interleaves with an existing memory
mapping. ASan cannot proceed correctly. ABORTING.
==28210==Process memory map follows:
0x00008000-0x0000f000 /data/data/djpeg
0x0000f000-0x00...
2013 Jun 04
0
[LLVMdev] Address Sanitizer on Android
...sity=1
> ==28210==AddressSanitizer: libc interceptors initialized
> || `[0x20000000, 0xffffffff]` || HighMem ||
> || `[0x04000000, 0x1fffffff]` || HighShadow ||
> || `[0x00040000, 0x03ffffff]` || ShadowGap ||
> MemToShadow(shadow): 0x00000000 0x00000000 0x00800000 0x03ffffff
> red_zone=16
> malloc_context_size=30
> SHADOW_SCALE: 3
> SHADOW_GRANULARITY: 8
> SHADOW_OFFSET: 0
> ==28210==Shadow memory range interleaves with an existing memory
> mapping. ASan cannot proceed correctly. ABORTING.
> ==28210==Process memory map follows:
> 0x00008000-0x0000f000...