http://gcc.gnu.org/bugzilla/show_bug.cgi?id=55485
Eric Botcazou <ebotcazou at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|UNCONFIRMED |NEW
Last reconfirmed| |2012-11-27
Component|ada |sanitizer
CC| |dodji at gcc dot gnu.org,
| |dvyukov at gcc dot gnu.org,
| |ebotcazou at gcc dot
| |gnu.org, jakub at gcc dot
| |gnu.org, kcc at gcc dot
| |gnu.org
Ever Confirmed|0 |1
Summary|stack-buffer-overflow in |probable false positive on
|sem_ch8.adb |__builtin_setjmp/__builtin_
| |longjmp
--- Comment #1 from Eric Botcazou <ebotcazou at gcc dot gnu.org> 2012-11-27
16:12:57 UTC ---
It looks rather like AddressSanitizer is confused by the __builtin_setjmp based
exception handling scheme, as hinted at by:
Address 0x7fff47f1b588 is located at offset 72 in frame
<ada__exceptions__raise_current_excep> of T0's stack:
This frame has 1 object(s):
[32, 40) 'id'
HINT: this may be a false positive if your program uses some custom stack
unwind mechanism or swapcontext
(longjmp and C++ exceptions *are* supported)
So, does AddressSanitizer support __builtin_setjmp/__builtin_longjmp?