On February 9, 2018 7:07:45 PM GMT+01:00, Jakub Jelinek <ja...@redhat.com> wrote: >On Fri, Feb 09, 2018 at 07:01:08PM +0100, Richard Biener wrote: >> >which indeed fixes the testcase and seems not to break asan.exp. >> >> Huh. Need to double check why that makes sense ;) > >I think it does, for both ASAN_CHECK and ASAN_MARK the pointer argument >is the second one, the first one is an integer argument with flags. >And ASAN_MARK, both poison and unpoison, works kind like a clobber on >the >referenced variable, before unpoison it is generally inaccessible and >after >poison too.
Ah, indeed. Richard. > Jakub