This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug malloc/20644] RFE: valgrind interoperation with fortification


https://sourceware.org/bugzilla/show_bug.cgi?id=20644

--- Comment #2 from Mark Wielaard <mjw at redhat dot com> ---
(In reply to Florian Weimer from comment #1)
> (In reply to Frank Ch. Eigler from comment #0)
> > It would be handy if glibc could detect that it is running under valgrind
> > (see RUNNING_ON_VALGRIND in /usr/include/valgrind.h) when running its
> > fortify checks.  valgrind can produce higher quality error messages than
> > glibc for errors, but only if valgrind sees the erroneous string/buffer ops.
> 
> Is this unconditionally true, or does this apply only if buffers are on the
> heap?
>
> I thought that for stack allocations, valgrind has poor boundary information.

memcheck does not perform bounds checking for stack (or global arrays).
It does track stack size and definedness of stack values.

-- 
You are receiving this mail because:
You are on the CC list for the bug.

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]