public inbox for gcc-bugs@sourceware.org
help / color / mirror / Atom feed
* [Bug sanitizer/91707] [10/11 Regression] spurious stringop-overflow warning with -fsanitize=undefined
       [not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
@ 2020-05-07 11:56 ` jakub at gcc dot gnu.org
  2020-07-23  6:51 ` rguenth at gcc dot gnu.org
                   ` (6 subsequent siblings)
  7 siblings, 0 replies; 8+ messages in thread
From: jakub at gcc dot gnu.org @ 2020-05-07 11:56 UTC (permalink / raw)
  To: gcc-bugs

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707

Jakub Jelinek <jakub at gcc dot gnu.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Target Milestone|10.0                        |10.2

--- Comment #7 from Jakub Jelinek <jakub at gcc dot gnu.org> ---
GCC 10.1 has been released.

^ permalink raw reply	[flat|nested] 8+ messages in thread

* [Bug sanitizer/91707] [10/11 Regression] spurious stringop-overflow warning with -fsanitize=undefined
       [not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
  2020-05-07 11:56 ` [Bug sanitizer/91707] [10/11 Regression] spurious stringop-overflow warning with -fsanitize=undefined jakub at gcc dot gnu.org
@ 2020-07-23  6:51 ` rguenth at gcc dot gnu.org
  2021-01-22  0:44 ` msebor at gcc dot gnu.org
                   ` (5 subsequent siblings)
  7 siblings, 0 replies; 8+ messages in thread
From: rguenth at gcc dot gnu.org @ 2020-07-23  6:51 UTC (permalink / raw)
  To: gcc-bugs

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707

Richard Biener <rguenth at gcc dot gnu.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Target Milestone|10.2                        |10.3

--- Comment #8 from Richard Biener <rguenth at gcc dot gnu.org> ---
GCC 10.2 is released, adjusting target milestone.

^ permalink raw reply	[flat|nested] 8+ messages in thread

* [Bug sanitizer/91707] [10/11 Regression] spurious stringop-overflow warning with -fsanitize=undefined
       [not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
  2020-05-07 11:56 ` [Bug sanitizer/91707] [10/11 Regression] spurious stringop-overflow warning with -fsanitize=undefined jakub at gcc dot gnu.org
  2020-07-23  6:51 ` rguenth at gcc dot gnu.org
@ 2021-01-22  0:44 ` msebor at gcc dot gnu.org
  2021-04-08 12:02 ` rguenth at gcc dot gnu.org
                   ` (4 subsequent siblings)
  7 siblings, 0 replies; 8+ messages in thread
From: msebor at gcc dot gnu.org @ 2021-01-22  0:44 UTC (permalink / raw)
  To: gcc-bugs

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707

Martin Sebor <msebor at gcc dot gnu.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Last reconfirmed|2019-09-09 00:00:00         |2021-1-21
      Known to fail|10.0                        |10.2.0, 11.0

--- Comment #9 from Martin Sebor <msebor at gcc dot gnu.org> ---
No change in GCC 11.

^ permalink raw reply	[flat|nested] 8+ messages in thread

* [Bug sanitizer/91707] [10/11 Regression] spurious stringop-overflow warning with -fsanitize=undefined
       [not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
                   ` (2 preceding siblings ...)
  2021-01-22  0:44 ` msebor at gcc dot gnu.org
@ 2021-04-08 12:02 ` rguenth at gcc dot gnu.org
  2021-12-15 21:49 ` [Bug sanitizer/91707] [10/11/12 " msebor at gcc dot gnu.org
                   ` (3 subsequent siblings)
  7 siblings, 0 replies; 8+ messages in thread
From: rguenth at gcc dot gnu.org @ 2021-04-08 12:02 UTC (permalink / raw)
  To: gcc-bugs

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707

Richard Biener <rguenth at gcc dot gnu.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Target Milestone|10.3                        |10.4

--- Comment #10 from Richard Biener <rguenth at gcc dot gnu.org> ---
GCC 10.3 is being released, retargeting bugs to GCC 10.4.

^ permalink raw reply	[flat|nested] 8+ messages in thread

* [Bug sanitizer/91707] [10/11/12 Regression] spurious stringop-overflow warning with -fsanitize=undefined
       [not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
                   ` (3 preceding siblings ...)
  2021-04-08 12:02 ` rguenth at gcc dot gnu.org
@ 2021-12-15 21:49 ` msebor at gcc dot gnu.org
  2021-12-15 22:59 ` msebor at gcc dot gnu.org
                   ` (2 subsequent siblings)
  7 siblings, 0 replies; 8+ messages in thread
From: msebor at gcc dot gnu.org @ 2021-12-15 21:49 UTC (permalink / raw)
  To: gcc-bugs

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707

Martin Sebor <msebor at gcc dot gnu.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Last reconfirmed|2021-01-21 00:00:00         |2021-12-15
      Known to fail|11.0                        |11.2.0, 12.0

--- Comment #11 from Martin Sebor <msebor at gcc dot gnu.org> ---
GCC 11 still issues the same -Wstringop-overflow as GCC 10 plus another one for
the call to md_copy_dims():

In function ‘real_from_complex_dims’,
    inlined from ‘md_test’ at pr91707.c:14:4:
pr91707.c:7:13: warning: writing 8 bytes into a region of size 0
[-Wstringop-overflow=]
    7 |    odims[0] = 2;
      |    ~~~~~~~~~^~~
pr91707.c: In function ‘md_test’:
pr91707.c:13:9: note: destination object ‘dimsR.8’ of size 0
   13 |    long dimsR[D + 1];
      |         ^~~~~
In function ‘real_from_complex_dims’,
    inlined from ‘md_test’ at pr91707.c:14:4:
pr91707.c:8:4: warning: ‘md_copy_dims’ accessing 34359738360 bytes in a region
of size 0 [-Wstringop-overflow=]
    8 |    md_copy_dims(D, odims + 1, idims);
      |    ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
pr91707.c: In function ‘md_test’:
pr91707.c:8:4: note: referencing argument 2 of type ‘long int *’
pr91707.c:2:13: note: in a call to function ‘md_copy_dims’
    2 | extern void md_copy_dims(unsigned int D, long odims[D], const long
idims[D]);
      |             ^~~~~~~~~~~~

The second warning is for the md_copy_dims() call in the following IL:

  <bb 5> [count: 0]:
  md_copy_dims (4294967295, &MEM <unsigned char[0:18446744073709551615]> [(void
*)&dimsR.8 + 8B], idims_13(D));
  __builtin___ubsan_handle_vla_bound_not_positive (&*.Lubsan_data1, 0);

  <bb 6> [local count: 1073741824]:
  dimsR.8 ={v} {CLOBBER};
  return;

The first warning is gone in GCC 12 and only the second one remains.  It's
triggered by the same md_copy_dims() call with the first argument in excess of
the size of the arrays passed to the function:

  <bb 7> [count: 0]:
  _29 = dimsR.1_23 + 8;
  md_copy_dims (4294967295, _29, idims_13(D));
  __builtin___ubsan_handle_vla_bound_not_positive (&*.Lubsan_data1, 0);

^ permalink raw reply	[flat|nested] 8+ messages in thread

* [Bug sanitizer/91707] [10/11/12 Regression] spurious stringop-overflow warning with -fsanitize=undefined
       [not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
                   ` (4 preceding siblings ...)
  2021-12-15 21:49 ` [Bug sanitizer/91707] [10/11/12 " msebor at gcc dot gnu.org
@ 2021-12-15 22:59 ` msebor at gcc dot gnu.org
  2022-06-28 10:38 ` [Bug sanitizer/91707] [10/11/12/13 " jakub at gcc dot gnu.org
  2023-07-07 10:35 ` [Bug sanitizer/91707] [11/12/13/14 " rguenth at gcc dot gnu.org
  7 siblings, 0 replies; 8+ messages in thread
From: msebor at gcc dot gnu.org @ 2021-12-15 22:59 UTC (permalink / raw)
  To: gcc-bugs

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707

--- Comment #12 from Martin Sebor <msebor at gcc dot gnu.org> ---
Here's a slightly simplified test case for GCC 12:

$ cat z.c && gcc -O2 -S -Wall -fsanitize=undefined z.c
extern void f (unsigned n, long[n], const long[n]);

void g (unsigned n, const long a[n])
{
   long b[n + 1];
   f (n, b + 1, a);

   long c[n + 1];
   (void)c;
}
z.c: In function ‘g’:
z.c:6:4: warning: ‘f’ accessing 34359738360 bytes in a region of size 0
[-Wstringop-overflow=]
    6 |    f (n, b + 1, a);
      |    ^~~~~~~~~~~~~~~
z.c:6:4: note: referencing argument 2 of type ‘long int[]’
z.c:6:4: note: referencing argument 3 of type ‘const long int[]’
z.c:1:13: note: in a call to function ‘f’
    1 | extern void f (unsigned n, long[n], const long[n]);
      |             ^

^ permalink raw reply	[flat|nested] 8+ messages in thread

* [Bug sanitizer/91707] [10/11/12/13 Regression] spurious stringop-overflow warning with -fsanitize=undefined
       [not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
                   ` (5 preceding siblings ...)
  2021-12-15 22:59 ` msebor at gcc dot gnu.org
@ 2022-06-28 10:38 ` jakub at gcc dot gnu.org
  2023-07-07 10:35 ` [Bug sanitizer/91707] [11/12/13/14 " rguenth at gcc dot gnu.org
  7 siblings, 0 replies; 8+ messages in thread
From: jakub at gcc dot gnu.org @ 2022-06-28 10:38 UTC (permalink / raw)
  To: gcc-bugs

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707

Jakub Jelinek <jakub at gcc dot gnu.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Target Milestone|10.4                        |10.5

--- Comment #13 from Jakub Jelinek <jakub at gcc dot gnu.org> ---
GCC 10.4 is being released, retargeting bugs to GCC 10.5.

^ permalink raw reply	[flat|nested] 8+ messages in thread

* [Bug sanitizer/91707] [11/12/13/14 Regression] spurious stringop-overflow warning with -fsanitize=undefined
       [not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
                   ` (6 preceding siblings ...)
  2022-06-28 10:38 ` [Bug sanitizer/91707] [10/11/12/13 " jakub at gcc dot gnu.org
@ 2023-07-07 10:35 ` rguenth at gcc dot gnu.org
  7 siblings, 0 replies; 8+ messages in thread
From: rguenth at gcc dot gnu.org @ 2023-07-07 10:35 UTC (permalink / raw)
  To: gcc-bugs

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91707

Richard Biener <rguenth at gcc dot gnu.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Target Milestone|10.5                        |11.5

--- Comment #14 from Richard Biener <rguenth at gcc dot gnu.org> ---
GCC 10 branch is being closed.

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2023-07-07 10:35 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <bug-91707-4@http.gcc.gnu.org/bugzilla/>
2020-05-07 11:56 ` [Bug sanitizer/91707] [10/11 Regression] spurious stringop-overflow warning with -fsanitize=undefined jakub at gcc dot gnu.org
2020-07-23  6:51 ` rguenth at gcc dot gnu.org
2021-01-22  0:44 ` msebor at gcc dot gnu.org
2021-04-08 12:02 ` rguenth at gcc dot gnu.org
2021-12-15 21:49 ` [Bug sanitizer/91707] [10/11/12 " msebor at gcc dot gnu.org
2021-12-15 22:59 ` msebor at gcc dot gnu.org
2022-06-28 10:38 ` [Bug sanitizer/91707] [10/11/12/13 " jakub at gcc dot gnu.org
2023-07-07 10:35 ` [Bug sanitizer/91707] [11/12/13/14 " rguenth at gcc dot gnu.org

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).