Comment #1 on issue 339 by [email protected]: ASAN and interaction with GNU Smalltalk JIT
https://code.google.com/p/address-sanitizer/issues/detail?id=339

I would like to know if this is a known problem

I don't think so. Stack is poisoned at function prologue (via Asan instrumentation code) and unpoisoned at epilogue. So unless your JIT does some magic with stack frames or there are some noreturn functions this could indicate a real bug.

Could you provide ASan error message? Also details on C/JIT interface (especially stack handling) would help.


--
You received this message because this project is configured to send all issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings

--
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to