From a58f8a087b8d60cdb3e072233fcc8abd81906c72 Mon Sep 17 00:00:00 2001 From: Thomas Roos Date: Wed, 22 Jan 2025 13:44:07 +0100 Subject: [PATCH] gcc-sanitizers.inc: Workaround for aarch64 When using the -fsanitize=address CXX_FLAG for a program compiled for aarch64 / arm64 This is happing: MemorySanitizer: CHECK failed: sanitizer_allocator_primary64.h:133 "((kSpaceBeg)) == ((address_range.Init(TotalSpaceSize, PrimaryAllocatorName, kSpaceBeg)))" (0xe00000000000, 0xfffffffffffffff4) (tid=51745) With -DSANITIZER_CAN_USE_ALLOCATOR64=0 this is not happening and potenial bugs are detected. ARM32 does not require this patch. More info about the issue in this thread: https://github.com/llvm/llvm-project/issues/65144 (From OE-Core rev: 12442b9b6df06317174066854935b1d6a4f1865d) Signed-off-by: Thomas Roos Signed-off-by: Richard Purdie Signed-off-by: Ross Burton --- meta/recipes-devtools/gcc/gcc-sanitizers.inc | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/meta/recipes-devtools/gcc/gcc-sanitizers.inc b/meta/recipes-devtools/gcc/gcc-sanitizers.inc index 4163e87e1f..6c81d30243 100644 --- a/meta/recipes-devtools/gcc/gcc-sanitizers.inc +++ b/meta/recipes-devtools/gcc/gcc-sanitizers.inc @@ -11,6 +11,10 @@ EXTRA_OECONF_PATHS = "\ --with-build-sysroot=${STAGING_DIR_TARGET} \ " +# Workaround for this issue: https://github.com/llvm/llvm-project/issues/65144 on aarch64 +# compiler-rt/sanitizers/aarch64: CHECK failed: sanitizer_allocator_primary64.h:133 +CXXFLAGS:append:aarch64 = " -DSANITIZER_CAN_USE_ALLOCATOR64=0" + do_configure () { rm -rf ${B}/${TARGET_SYS}/libsanitizer/ mkdir -p ${B}/${TARGET_SYS}/libsanitizer/