You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
about -fsanitize=address, Is this tool unable to detect executable files compiled through Android NDK tools, resulting in incorrect source code line numbers?
as follow is run file by Android NDK tools created,it not support the error information of line number in source code.
==32438==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x005e32e70120 at pc 0x0057ff787cb0 bp 0x007fc60e0390 sp 0x007fc60e0388
READ of size 4 at 0x005e32e70120 thread T0
#0 0x57ff787cac (/data/local/tmp/bin/sanitize_test+0x1acac) (BuildId: c6b8a47b854e4ce8c9dd0e7f1bea122507cade45) #1 0x7c37c966e8 (/apex/com.android.runtime/lib64/bionic/libc.so+0x546e8) (BuildId: e2d9c5ba32145bb6e11e59494ee68593) #2 0x57ff787848 (/data/local/tmp/bin/sanitize_test+0x1a848) (BuildId: c6b8a47b854e4ce8c9dd0e7f1bea122507cade45)
0x005e32e70120 is located 40 bytes after 40-byte region [0x005e32e700d0,0x005e32e700f8)
allocated by thread T0 here:
#0 0x7c332ecfa8 (/system/lib64/libclang_rt.asan-aarch64-android.so+0xe7fa8) (BuildId: 076a3aa118eaf0d7275c7f5323293b645dde2fcb) #1 0x57ff787ad0 (/data/local/tmp/bin/sanitize_test+0x1aad0) (BuildId: c6b8a47b854e4ce8c9dd0e7f1bea122507cade45) #2 0x7c37c966e8 (/apex/com.android.runtime/lib64/bionic/libc.so+0x546e8) (BuildId: e2d9c5ba32145bb6e11e59494ee68593) #3 0x57ff787848 (/data/local/tmp/bin/sanitize_test+0x1a848) (BuildId: c6b8a47b854e4ce8c9dd0e7f1bea122507cade45)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/data/local/tmp/bin/sanitize_test+0x1acac) (BuildId: c6b8a47b854e4ce8c9dd0e7f1bea122507cade45)
Shadow bytes around the buggy address:
0x005e32e6fe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x005e32e6ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x005e32e6ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x005e32e70000: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00
0x005e32e70080: fa fa 00 00 00 00 00 04 fa fa 00 00 00 00 00 fa
=>0x005e32e70100: fa fa fa fa[fa]fa fa fa fa fa fa fa fa fa fa fa
The text was updated successfully, but these errors were encountered:
about -fsanitize=address, Is this tool unable to detect executable files compiled through Android NDK tools, resulting in incorrect source code line numbers?
as follow is run file by Android NDK tools created,it not support the error information of line number in source code.
==32438==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x005e32e70120 at pc 0x0057ff787cb0 bp 0x007fc60e0390 sp 0x007fc60e0388
READ of size 4 at 0x005e32e70120 thread T0
#0 0x57ff787cac (/data/local/tmp/bin/sanitize_test+0x1acac) (BuildId: c6b8a47b854e4ce8c9dd0e7f1bea122507cade45)
#1 0x7c37c966e8 (/apex/com.android.runtime/lib64/bionic/libc.so+0x546e8) (BuildId: e2d9c5ba32145bb6e11e59494ee68593)
#2 0x57ff787848 (/data/local/tmp/bin/sanitize_test+0x1a848) (BuildId: c6b8a47b854e4ce8c9dd0e7f1bea122507cade45)
0x005e32e70120 is located 40 bytes after 40-byte region [0x005e32e700d0,0x005e32e700f8)
allocated by thread T0 here:
#0 0x7c332ecfa8 (/system/lib64/libclang_rt.asan-aarch64-android.so+0xe7fa8) (BuildId: 076a3aa118eaf0d7275c7f5323293b645dde2fcb)
#1 0x57ff787ad0 (/data/local/tmp/bin/sanitize_test+0x1aad0) (BuildId: c6b8a47b854e4ce8c9dd0e7f1bea122507cade45)
#2 0x7c37c966e8 (/apex/com.android.runtime/lib64/bionic/libc.so+0x546e8) (BuildId: e2d9c5ba32145bb6e11e59494ee68593)
#3 0x57ff787848 (/data/local/tmp/bin/sanitize_test+0x1a848) (BuildId: c6b8a47b854e4ce8c9dd0e7f1bea122507cade45)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/data/local/tmp/bin/sanitize_test+0x1acac) (BuildId: c6b8a47b854e4ce8c9dd0e7f1bea122507cade45)
Shadow bytes around the buggy address:
0x005e32e6fe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x005e32e6ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x005e32e6ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x005e32e70000: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00
0x005e32e70080: fa fa 00 00 00 00 00 04 fa fa 00 00 00 00 00 fa
=>0x005e32e70100: fa fa fa fa[fa]fa fa fa fa fa fa fa fa fa fa fa
The text was updated successfully, but these errors were encountered: