diff options
| author | Alexey Kardashevskiy <aik@linux.ibm.com> | 2020-05-26 12:33:42 +1000 |
|---|---|---|
| committer | Dmitry Vyukov <dvyukov@google.com> | 2020-06-12 05:54:26 +0200 |
| commit | c6ec8ed9ced064dbe21ef57ca2b231a0e3a4ce86 (patch) | |
| tree | d7b43e345563b861a1893a329fe10496f8643819 | |
| parent | 588020678f34b89925fcfbcaf8f635c5850e8e7a (diff) | |
cover/report: Extend call instruction parser for PPE64 little endian
This adds one more pattern in the list of recognized once as this is
what they look like in objdump:
c0000000001c21a8: f9 d2 11 48 bl c0000000002df4a0 <__sanitizer_cov_trace_pc>
Signed-off-by: Alexey Kardashevskiy <aik@linux.ibm.com>
| -rw-r--r-- | pkg/cover/report.go | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/pkg/cover/report.go b/pkg/cover/report.go index e820ccebe..754649fda 100644 --- a/pkg/cover/report.go +++ b/pkg/cover/report.go @@ -510,7 +510,10 @@ func archCallInsn(target *targets.Target) ([][]byte, [][]byte) { // c00000000006d904: bl c000000000350780 <.__sanitizer_cov_trace_pc> // This is only known to occur in the test: // 838: bl 824 <__sanitizer_cov_trace_pc+0x8> + // This occurs on PPC64LE: + // c0000000001c21a8: bl c0000000002df4a0 <__sanitizer_cov_trace_pc> return [][]byte{[]byte("\tbl ")}, [][]byte{ + []byte("<__sanitizer_cov_trace_pc>"), []byte("<__sanitizer_cov_trace_pc+0x8>"), []byte(" <.__sanitizer_cov_trace_pc>"), } |
