[Bug sanitizer/91115] stack-buffer-overflow on memset local variable when creating thread on ARM Linux
marxin at gcc dot gnu.org
gcc-bugzilla@gcc.gnu.org
Tue Jul 9 06:40:00 GMT 2019
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91115
Martin Liška <marxin at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|UNCONFIRMED |WAITING
Last reconfirmed| |2019-07-09
Ever confirmed|0 |1
--- Comment #2 from Martin Liška <marxin at gcc dot gnu.org> ---
Would it be please possible to provide a test-case?
Note that memset is aware of shadow memory and it should properly mark it. You
can also do a debugging session where you can put a hardware breakpoint to the
shadow memory location which then causes the ASAN error.
More information about the Gcc-bugs
mailing list