Status: New
Owner: ----
Labels: Type-Defect Priority-Medium
New issue 317 by jhietaniemi: -fsanitize=address doesn't detect simple
stack access violation
http://code.google.com/p/address-sanitizer/issues/detail?id=317
* What steps will reproduce the problem?
1. The following code:
int main() {
char b[100];
b[100] = 0;
}
compiles (with a warning, which is nice, but imagine that the b[100] is
something less static and less obvious).
2. clang-mp-3.5 -O1 -g -fsanitize=address -o x x.c
3. Running the executable does nothing (more importantly, doesn't trigger a
sanitizer fault).
* What is the expected output? What do you see instead?
I expected the sanitizer to trap the error and spit out a failure in
runtime.
* What version of the product are you using? On what operating system?
Tried both clang 3.5 (macports in OS X) and clang 3.4 (in ubuntu trusty
14.04, 64-bit x86), the same (non-)results.
* Please provide any additional information below.
--
You received this message because this project is configured to send all
issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings
--
You received this message because you are subscribed to the Google Groups
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.