public inbox for gcc-bugs@sourceware.org
help / color / mirror / Atom feed
* [Bug sanitizer/91707] [10/11 Regression] spurious stringop-overflow warning with -fsanitize=undefined
[not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
@ 2020-05-07 11:56 ` jakub at gcc dot gnu.org
2020-07-23 6:51 ` rguenth at gcc dot gnu.org
` (6 subsequent siblings)
7 siblings, 0 replies; 8+ messages in thread
From: jakub at gcc dot gnu.org @ 2020-05-07 11:56 UTC (permalink / raw)
To: gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707
Jakub Jelinek <jakub at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Target Milestone|10.0 |10.2
--- Comment #7 from Jakub Jelinek <jakub at gcc dot gnu.org> ---
GCC 10.1 has been released.
^ permalink raw reply [flat|nested] 8+ messages in thread
* [Bug sanitizer/91707] [10/11 Regression] spurious stringop-overflow warning with -fsanitize=undefined
[not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
2020-05-07 11:56 ` [Bug sanitizer/91707] [10/11 Regression] spurious stringop-overflow warning with -fsanitize=undefined jakub at gcc dot gnu.org
@ 2020-07-23 6:51 ` rguenth at gcc dot gnu.org
2021-01-22 0:44 ` msebor at gcc dot gnu.org
` (5 subsequent siblings)
7 siblings, 0 replies; 8+ messages in thread
From: rguenth at gcc dot gnu.org @ 2020-07-23 6:51 UTC (permalink / raw)
To: gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707
Richard Biener <rguenth at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Target Milestone|10.2 |10.3
--- Comment #8 from Richard Biener <rguenth at gcc dot gnu.org> ---
GCC 10.2 is released, adjusting target milestone.
^ permalink raw reply [flat|nested] 8+ messages in thread
* [Bug sanitizer/91707] [10/11 Regression] spurious stringop-overflow warning with -fsanitize=undefined
[not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
2020-05-07 11:56 ` [Bug sanitizer/91707] [10/11 Regression] spurious stringop-overflow warning with -fsanitize=undefined jakub at gcc dot gnu.org
2020-07-23 6:51 ` rguenth at gcc dot gnu.org
@ 2021-01-22 0:44 ` msebor at gcc dot gnu.org
2021-04-08 12:02 ` rguenth at gcc dot gnu.org
` (4 subsequent siblings)
7 siblings, 0 replies; 8+ messages in thread
From: msebor at gcc dot gnu.org @ 2021-01-22 0:44 UTC (permalink / raw)
To: gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707
Martin Sebor <msebor at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Last reconfirmed|2019-09-09 00:00:00 |2021-1-21
Known to fail|10.0 |10.2.0, 11.0
--- Comment #9 from Martin Sebor <msebor at gcc dot gnu.org> ---
No change in GCC 11.
^ permalink raw reply [flat|nested] 8+ messages in thread
* [Bug sanitizer/91707] [10/11 Regression] spurious stringop-overflow warning with -fsanitize=undefined
[not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
` (2 preceding siblings ...)
2021-01-22 0:44 ` msebor at gcc dot gnu.org
@ 2021-04-08 12:02 ` rguenth at gcc dot gnu.org
2021-12-15 21:49 ` [Bug sanitizer/91707] [10/11/12 " msebor at gcc dot gnu.org
` (3 subsequent siblings)
7 siblings, 0 replies; 8+ messages in thread
From: rguenth at gcc dot gnu.org @ 2021-04-08 12:02 UTC (permalink / raw)
To: gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707
Richard Biener <rguenth at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Target Milestone|10.3 |10.4
--- Comment #10 from Richard Biener <rguenth at gcc dot gnu.org> ---
GCC 10.3 is being released, retargeting bugs to GCC 10.4.
^ permalink raw reply [flat|nested] 8+ messages in thread
* [Bug sanitizer/91707] [10/11/12 Regression] spurious stringop-overflow warning with -fsanitize=undefined
[not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
` (3 preceding siblings ...)
2021-04-08 12:02 ` rguenth at gcc dot gnu.org
@ 2021-12-15 21:49 ` msebor at gcc dot gnu.org
2021-12-15 22:59 ` msebor at gcc dot gnu.org
` (2 subsequent siblings)
7 siblings, 0 replies; 8+ messages in thread
From: msebor at gcc dot gnu.org @ 2021-12-15 21:49 UTC (permalink / raw)
To: gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707
Martin Sebor <msebor at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Last reconfirmed|2021-01-21 00:00:00 |2021-12-15
Known to fail|11.0 |11.2.0, 12.0
--- Comment #11 from Martin Sebor <msebor at gcc dot gnu.org> ---
GCC 11 still issues the same -Wstringop-overflow as GCC 10 plus another one for
the call to md_copy_dims():
In function ‘real_from_complex_dims’,
inlined from ‘md_test’ at pr91707.c:14:4:
pr91707.c:7:13: warning: writing 8 bytes into a region of size 0
[-Wstringop-overflow=]
7 | odims[0] = 2;
| ~~~~~~~~~^~~
pr91707.c: In function ‘md_test’:
pr91707.c:13:9: note: destination object ‘dimsR.8’ of size 0
13 | long dimsR[D + 1];
| ^~~~~
In function ‘real_from_complex_dims’,
inlined from ‘md_test’ at pr91707.c:14:4:
pr91707.c:8:4: warning: ‘md_copy_dims’ accessing 34359738360 bytes in a region
of size 0 [-Wstringop-overflow=]
8 | md_copy_dims(D, odims + 1, idims);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
pr91707.c: In function ‘md_test’:
pr91707.c:8:4: note: referencing argument 2 of type ‘long int *’
pr91707.c:2:13: note: in a call to function ‘md_copy_dims’
2 | extern void md_copy_dims(unsigned int D, long odims[D], const long
idims[D]);
| ^~~~~~~~~~~~
The second warning is for the md_copy_dims() call in the following IL:
<bb 5> [count: 0]:
md_copy_dims (4294967295, &MEM <unsigned char[0:18446744073709551615]> [(void
*)&dimsR.8 + 8B], idims_13(D));
__builtin___ubsan_handle_vla_bound_not_positive (&*.Lubsan_data1, 0);
<bb 6> [local count: 1073741824]:
dimsR.8 ={v} {CLOBBER};
return;
The first warning is gone in GCC 12 and only the second one remains. It's
triggered by the same md_copy_dims() call with the first argument in excess of
the size of the arrays passed to the function:
<bb 7> [count: 0]:
_29 = dimsR.1_23 + 8;
md_copy_dims (4294967295, _29, idims_13(D));
__builtin___ubsan_handle_vla_bound_not_positive (&*.Lubsan_data1, 0);
^ permalink raw reply [flat|nested] 8+ messages in thread
* [Bug sanitizer/91707] [10/11/12 Regression] spurious stringop-overflow warning with -fsanitize=undefined
[not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
` (4 preceding siblings ...)
2021-12-15 21:49 ` [Bug sanitizer/91707] [10/11/12 " msebor at gcc dot gnu.org
@ 2021-12-15 22:59 ` msebor at gcc dot gnu.org
2022-06-28 10:38 ` [Bug sanitizer/91707] [10/11/12/13 " jakub at gcc dot gnu.org
2023-07-07 10:35 ` [Bug sanitizer/91707] [11/12/13/14 " rguenth at gcc dot gnu.org
7 siblings, 0 replies; 8+ messages in thread
From: msebor at gcc dot gnu.org @ 2021-12-15 22:59 UTC (permalink / raw)
To: gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707
--- Comment #12 from Martin Sebor <msebor at gcc dot gnu.org> ---
Here's a slightly simplified test case for GCC 12:
$ cat z.c && gcc -O2 -S -Wall -fsanitize=undefined z.c
extern void f (unsigned n, long[n], const long[n]);
void g (unsigned n, const long a[n])
{
long b[n + 1];
f (n, b + 1, a);
long c[n + 1];
(void)c;
}
z.c: In function ‘g’:
z.c:6:4: warning: ‘f’ accessing 34359738360 bytes in a region of size 0
[-Wstringop-overflow=]
6 | f (n, b + 1, a);
| ^~~~~~~~~~~~~~~
z.c:6:4: note: referencing argument 2 of type ‘long int[]’
z.c:6:4: note: referencing argument 3 of type ‘const long int[]’
z.c:1:13: note: in a call to function ‘f’
1 | extern void f (unsigned n, long[n], const long[n]);
| ^
^ permalink raw reply [flat|nested] 8+ messages in thread
* [Bug sanitizer/91707] [10/11/12/13 Regression] spurious stringop-overflow warning with -fsanitize=undefined
[not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
` (5 preceding siblings ...)
2021-12-15 22:59 ` msebor at gcc dot gnu.org
@ 2022-06-28 10:38 ` jakub at gcc dot gnu.org
2023-07-07 10:35 ` [Bug sanitizer/91707] [11/12/13/14 " rguenth at gcc dot gnu.org
7 siblings, 0 replies; 8+ messages in thread
From: jakub at gcc dot gnu.org @ 2022-06-28 10:38 UTC (permalink / raw)
To: gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707
Jakub Jelinek <jakub at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Target Milestone|10.4 |10.5
--- Comment #13 from Jakub Jelinek <jakub at gcc dot gnu.org> ---
GCC 10.4 is being released, retargeting bugs to GCC 10.5.
^ permalink raw reply [flat|nested] 8+ messages in thread
* [Bug sanitizer/91707] [11/12/13/14 Regression] spurious stringop-overflow warning with -fsanitize=undefined
[not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
` (6 preceding siblings ...)
2022-06-28 10:38 ` [Bug sanitizer/91707] [10/11/12/13 " jakub at gcc dot gnu.org
@ 2023-07-07 10:35 ` rguenth at gcc dot gnu.org
7 siblings, 0 replies; 8+ messages in thread
From: rguenth at gcc dot gnu.org @ 2023-07-07 10:35 UTC (permalink / raw)
To: gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707
Richard Biener <rguenth at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Target Milestone|10.5 |11.5
--- Comment #14 from Richard Biener <rguenth at gcc dot gnu.org> ---
GCC 10 branch is being closed.
^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2023-07-07 10:35 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
[not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
2020-05-07 11:56 ` [Bug sanitizer/91707] [10/11 Regression] spurious stringop-overflow warning with -fsanitize=undefined jakub at gcc dot gnu.org
2020-07-23 6:51 ` rguenth at gcc dot gnu.org
2021-01-22 0:44 ` msebor at gcc dot gnu.org
2021-04-08 12:02 ` rguenth at gcc dot gnu.org
2021-12-15 21:49 ` [Bug sanitizer/91707] [10/11/12 " msebor at gcc dot gnu.org
2021-12-15 22:59 ` msebor at gcc dot gnu.org
2022-06-28 10:38 ` [Bug sanitizer/91707] [10/11/12/13 " jakub at gcc dot gnu.org
2023-07-07 10:35 ` [Bug sanitizer/91707] [11/12/13/14 " rguenth at gcc dot gnu.org
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).