[valgrind] [Bug 360571] Error about the Android Runtime reading below the stack pointer on ARM

2016-10-12 Thread Anton Kirilov via KDE Bugzilla
https://bugs.kde.org/show_bug.cgi?id=360571 --- Comment #10 from Anton Kirilov --- I tried the fix both on Aarch32 and Aarch64, and it worked. I just modified lines 35-36 of the test program to either: __asm__ __volatile__("sub r0, sp, #8192\n\tldr %0, [r0, #0]"

[valgrind] [Bug 360571] Error about the Android Runtime reading below the stack pointer on ARM

2016-08-09 Thread Anton Kirilov via KDE Bugzilla
https://bugs.kde.org/show_bug.cgi?id=360571 --- Comment #6 from Anton Kirilov --- Just a theoretical question. -- You are receiving this mail because: You are watching all bug changes.

[valgrind] [Bug 360571] Error about the Android Runtime reading below the stack pointer on ARM

2016-08-09 Thread Anton Kirilov via KDE Bugzilla
https://bugs.kde.org/show_bug.cgi?id=360571 --- Comment #4 from Anton Kirilov --- (In reply to Julian Seward from comment #3) > An alternative is to introduce a new flag, something like this (eg) > > --ignore-accesses-below-sp-range=- > > so that just the specified

[valgrind] [Bug 360574] Wrong parameter type for an ashmem ioctl() call on Android and ARM64

2016-08-04 Thread Anton Kirilov via KDE Bugzilla
https://bugs.kde.org/show_bug.cgi?id=360574 --- Comment #4 from Anton Kirilov --- I have tested the patch, and it makes the error message disappear. -- You are receiving this mail because: You are watching all bug changes.

[valgrind] [Bug 360574] Wrong parameter type for an ashmem ioctl() call on Android and ARM64

2016-08-03 Thread Anton Kirilov via KDE Bugzilla
https://bugs.kde.org/show_bug.cgi?id=360574 --- Comment #2 from Anton Kirilov --- Yes, I can. -- You are receiving this mail because: You are watching all bug changes.

[valgrind] [Bug 360571] Error about the Android Runtime reading below the stack pointer on ARM

2016-08-03 Thread Anton Kirilov via KDE Bugzilla
https://bugs.kde.org/show_bug.cgi?id=360571 --- Comment #2 from Anton Kirilov --- Yes, that is correct. ART also sets up a signal handler for SIGSEGV. -- You are receiving this mail because: You are watching all bug changes.

[valgrind] [Bug 360574] Wrong parameter type for an ashmem ioctl() call on Android and ARM64

2016-03-15 Thread Anton Kirilov via KDE Bugzilla
https://bugs.kde.org/show_bug.cgi?id=360574 Anton Kirilov changed: What|Removed |Added CC|

[valgrind] [Bug 360574] New: Wrong parameter type for an ashmem ioctl() call on Android and ARM64

2016-03-15 Thread Anton Kirilov via KDE Bugzilla
https://bugs.kde.org/show_bug.cgi?id=360574 Bug ID: 360574 Summary: Wrong parameter type for an ashmem ioctl() call on Android and ARM64 Product: valgrind Version: 3.11.0 Platform: Android OS: unspecified

[valgrind] [Bug 360571] Error about the Android Runtime reading below the stack pointer on ARM

2016-03-15 Thread Anton Kirilov via KDE Bugzilla
https://bugs.kde.org/show_bug.cgi?id=360571 Anton Kirilov changed: What|Removed |Added CC|

[valgrind] [Bug 360571] New: Error about the Android Runtime reading below the stack pointer on ARM

2016-03-15 Thread Anton Kirilov via KDE Bugzilla
https://bugs.kde.org/show_bug.cgi?id=360571 Bug ID: 360571 Summary: Error about the Android Runtime reading below the stack pointer on ARM Product: valgrind Version: 3.11.0 Platform: Android OS: unspecified