Open
Description
With PR #107405, a couple of ASan tests that depend on printf
interception FAIL
on 32-bit Linux/sparc64:
AddressSanitizer-sparc-linux :: TestCases/printf-2.c
AddressSanitizer-sparc-linux :: TestCases/printf-3.c
AddressSanitizer-sparc-linux :: TestCases/printf-4.c
AddressSanitizer-sparc-linux :: TestCases/printf-5.c
AddressSanitizer-sparc-linux-dynamic :: TestCases/printf-2.c
AddressSanitizer-sparc-linux-dynamic :: TestCases/printf-3.c
AddressSanitizer-sparc-linux-dynamic :: TestCases/printf-4.c
AddressSanitizer-sparc-linux-dynamic :: TestCases/printf-5.c
SanitizerCommon-asan-sparc-Linux :: Linux/unexpected_format_specifier_test.cpp
The issue is always the same: the interceptor doesn't run, which is no wonder given that the executables contains calls to __nldbl_print
(no long double) instead of the expected __interceptor_printf
.