[Bug sanitizer/91115] stack-buffer-overflow on memset local variable when creating thread on ARM Linux
marxin at gcc dot gnu.org
gcc-bugzilla@gcc.gnu.org
Wed Jul 10 12:32:00 GMT 2019
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91115
--- Comment #4 from Martin Liška <marxin at gcc dot gnu.org> ---
(In reply to Fred Hsueh from comment #3)
> The actual SP and shadow byte location varies a bit between each run. Other
> than that, the signature looks very similar. Another thing to note is that
> the program has a high thread count, perhaps ~140.
That makes it very difficult to reproduce. Do you have any 2 runs that have the
'[f2]' shadow memory at the same location.
>
> Any tips, preferences, or good starting points to look at for creating the
> testcase? I can't find any in ASAN or ARM related pre-existing cases.
>
> thanks!
Is the reproducer an open-source software? I would somehow reduce # of threads.
More information about the Gcc-bugs
mailing list