Maxim Ostapenko writes:
> @@ -293,17 +302,15 @@ alloc_stack_frame_space (HOST_WIDE_INT size, unsigned
> HOST_WIDE_INT align)
>new_frame_offset = frame_offset;
Think this assignment is dead after your change.
>if (FRAME_GROWS_DOWNWARD)
> {
> - new_frame_offset -= size + frame_p
On 02/25/2015 05:40 PM, Maxim Ostapenko wrote:
On 02/16/2015 10:58 AM, Maxim Ostapenko wrote:
Hi,
when testing I noticed, that if compile with both -fsanitize=address and
-fstack-protector for 32-bit architectures and run with
ASAN_OPTIONS=detect_stack_use_after_return=1, libsanitizer fails w
On 02/25/2015 05:40 PM, Maxim Ostapenko wrote:
On 02/16/2015 10:58 AM, Maxim Ostapenko wrote:
Hi,
when testing I noticed, that if compile with both -fsanitize=address and
-fstack-protector for 32-bit architectures and run with
ASAN_OPTIONS=detect_stack_use_after_return=1, libsanitizer fails wi
On 02/16/2015 10:58 AM, Maxim Ostapenko wrote:
Hi,
when testing I noticed, that if compile with both -fsanitize=address and
-fstack-protector for 32-bit architectures and run with
ASAN_OPTIONS=detect_stack_use_after_return=1, libsanitizer fails with:
==7299==AddressSanitizer CHECK failed:
/ho
Ping.
Original Message
Subject: [PATCH PR64820] Fix ASan UAR detection fails on 32-bit targets
if SSP is enabled.
Date: Mon, 09 Feb 2015 14:03:54 +0400
From: Maxim Ostapenko
To: GCC Patches
CC: Yury Gribov , Slava Garbuzov
Hi,
when testing I noticed, that
Hi,
when testing I noticed, that if compile with both -fsanitize=address and
-fstack-protector for 32-bit architectures and run with
ASAN_OPTIONS=detect_stack_use_after_return=1, libsanitizer fails with:
==7299==AddressSanitizer CHECK failed:
/home/max/workspace/downloads/gcc/libsanitizer/a