Status: New
Owner: ----
Labels: Type-Defect Priority-Medium

New issue 317 by jhietaniemi: -fsanitize=address doesn't detect simple stack access violation
http://code.google.com/p/address-sanitizer/issues/detail?id=317

* What steps will reproduce the problem?

1.  The following code:

int main() {
  char b[100];
  b[100] = 0;
}

compiles (with a warning, which is nice, but imagine that the b[100] is something less static and less obvious).

2. clang-mp-3.5 -O1 -g -fsanitize=address -o x x.c

3. Running the executable does nothing (more importantly, doesn't trigger a sanitizer fault).

* What is the expected output? What do you see instead?

I expected the sanitizer to trap the error and spit out a failure in runtime.

* What version of the product are you using? On what operating system?

Tried both clang 3.5 (macports in OS X) and clang 3.4 (in ubuntu trusty 14.04, 64-bit x86), the same (non-)results.

* Please provide any additional information below.



--
You received this message because this project is configured to send all issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings

--
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to