Could be a situation when a specific DSO was built with FORTIFY_SOURCE option. In case asan-ed binary link against that DSO, libasan can't handle the possible memory error because does not have interceptors for spinrtf_chk, snprintf_chk, vprintf_chk, vsnprintf_chk, __fprintf_chk functions.
Details
Diff Detail
- Repository
- rCRT Compiler Runtime
Event Timeline
test/asan/TestCases/Linux/printf-fortify-2.c | ||
---|---|---|
13 | Maybe just: char write_buffer[1]; |
lib/sanitizer_common/sanitizer_platform_interceptors.h | ||
---|---|---|
168 | Thanks, I've fixed that. | |
test/asan/TestCases/Linux/printf-fortify-2.c | ||
13 | IMHO, in this test case the DSO is building without ASan's instrumentation, therefore the memory on the stack could not be "poisoned" with "redzones", in this case ASan could not handle the error. Sorry if I miss something, please correct me if I'm wrong. Thanks. |
Hi, I've committed this on behalf of Denis. @denis13 Will ping you if some buildbots complain about this change.
Why #ifndef here?