Status: New
Owner: ----
Labels: Type-Defect Priority-Medium

New issue 339 by [email protected]: ASAN and interaction with GNU Smalltalk JIT
https://code.google.com/p/address-sanitizer/issues/detail?id=339

What steps will reproduce the problem?
1. From the C-stack we call into a "trampoline" that will take the first argument and jump to the address that was passed. 2. When the first C method is being called that is using a stack variable there will be stack-overflow

I would like to know if this is a known problem and what the JIT should do to indicate the new start of the C-stack?


The runtime code is here:
http://git.savannah.gnu.org/gitweb/?p=smalltalk.git;a=blob;f=libgst/xlat.c;h=47978ac156a56f537885679f1c590a9d516c008a;hb=HEAD#l434

And a call from the JIT to C code can be seen here:

http://git.savannah.gnu.org/gitweb/?p=smalltalk.git;a=blob;f=libgst/xlat.c;h=47978ac156a56f537885679f1c590a9d516c008a;hb=HEAD#l2964


--
You received this message because this project is configured to send all issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings

--
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to