[Bug sanitizer/91115] stack-buffer-overflow on memset local variable when creating thread on ARM Linux

marxin at gcc dot gnu.org gcc-bugzilla@gcc.gnu.org
Tue Jul 9 06:40:00 GMT 2019


https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91115

Martin Liška <marxin at gcc dot gnu.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|UNCONFIRMED                 |WAITING
   Last reconfirmed|                            |2019-07-09
     Ever confirmed|0                           |1

--- Comment #2 from Martin Liška <marxin at gcc dot gnu.org> ---
Would it be please possible to provide a test-case?
Note that memset is aware of shadow memory and it should properly mark it. You
can also do a debugging session where you can put a hardware breakpoint to the
shadow memory location which then causes the ASAN error.


More information about the Gcc-bugs mailing list