This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug malloc/20644] RFE: valgrind interoperation with fortification


https://sourceware.org/bugzilla/show_bug.cgi?id=20644

Florian Weimer <fweimer at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
              Flags|                            |security-

--- Comment #1 from Florian Weimer <fweimer at redhat dot com> ---
(In reply to Frank Ch. Eigler from comment #0)
> It would be handy if glibc could detect that it is running under valgrind
> (see RUNNING_ON_VALGRIND in /usr/include/valgrind.h) when running its
> fortify checks.  valgrind can produce higher quality error messages than
> glibc for errors, but only if valgrind sees the erroneous string/buffer ops.

Is this unconditionally true, or does this apply only if buffers are on the
heap?

I thought that for stack allocations, valgrind has poor boundary information.

-- 
You are receiving this mail because:
You are on the CC list for the bug.

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]