Status: New
Owner: ----
Labels: Type-Defect Priority-Medium
New issue 339 by [email protected]: ASAN and interaction with GNU
Smalltalk JIT
https://code.google.com/p/address-sanitizer/issues/detail?id=339
What steps will reproduce the problem?
1. From the C-stack we call into a "trampoline" that will take the first
argument and jump to the address that was passed.
2. When the first C method is being called that is using a stack variable
there will be stack-overflow
I would like to know if this is a known problem and what the JIT should do
to indicate the new start of the C-stack?
The runtime code is here:
http://git.savannah.gnu.org/gitweb/?p=smalltalk.git;a=blob;f=libgst/xlat.c;h=47978ac156a56f537885679f1c590a9d516c008a;hb=HEAD#l434
And a call from the JIT to C code can be seen here:
http://git.savannah.gnu.org/gitweb/?p=smalltalk.git;a=blob;f=libgst/xlat.c;h=47978ac156a56f537885679f1c590a9d516c008a;hb=HEAD#l2964
--
You received this message because this project is configured to send all
issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings
--
You received this message because you are subscribed to the Google Groups
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.