You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What version of the product are you using? On what operating system?
Clang 3.7, x86_64-unknown-linux-gnu
Please provide any additional information below.
Performing static analysis for ASan via Coverity Prevent tool, I've noticed, that thread_stats.malloced_by_size[class_id]
from can be overflowed in Allocate function from asan_allocator.cc.
Here:
$ cat lib/asan/asan_allocator.cc
....................................
uptr class_id =
Min(kNumberOfSizeClasses, SizeClassMap::ClassID(needed_size));
thread_stats.malloced_by_size[class_id]++;
If class_id == kNumberOfSizeClasses == 255, than we access thread_stats.malloced_by_size[255]
and overflow thread_stats.malloced_by_size array.
Reported by chefMax7 on 2015-06-26 18:21:11
The text was updated successfully, but these errors were encountered:
Originally reported on Google Code with ID 397
Reported by
chefMax7
on 2015-06-26 18:21:11The text was updated successfully, but these errors were encountered: