Updates:
        Status: Duplicate
        Mergedinto: 138

Comment #3 on issue 347 by [email protected]: asan does not detect stack buffer overflow for alloca(const)
https://code.google.com/p/address-sanitizer/issues/detail?id=347

Today clang's asan does not instrument variable sized allocas.
This can be done and would be a nice thing to have, by is a low priority for us at this point. Maybe once we start instrumenting glibc with clang's asan this will become more interesting.
Patches are welcome, as always. :)

Dupping against issue 138

--
You received this message because this project is configured to send all issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings

--
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to