Status: Accepted
Owner: [email protected]
CC: [email protected]
Labels: Type-Defect Priority-Medium

New issue 262 by [email protected]: Detect stack overflow in SEGV handler
http://code.google.com/p/address-sanitizer/issues/detail?id=262

With sigaltstack we can more or less reliably detect stack overflow condition by comparing access address to SP and to (known) stack limits.

On the main thread stack limits may be off, but still, any access near SP (+-1 page) must be a stack overflow.

--
You received this message because this project is configured to send all issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings

--
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to