On Fri, Feb 09, 2018 at 07:01:08PM +0100, Richard Biener wrote: > >which indeed fixes the testcase and seems not to break asan.exp. > > Huh. Need to double check why that makes sense ;)
I think it does, for both ASAN_CHECK and ASAN_MARK the pointer argument is the second one, the first one is an integer argument with flags. And ASAN_MARK, both poison and unpoison, works kind like a clobber on the referenced variable, before unpoison it is generally inaccessible and after poison too. Jakub