From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 48) id D7FEF385801A; Sat, 27 Mar 2021 13:47:01 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org D7FEF385801A From: "muecker at gwdg dot de" To: gcc-bugs@gcc.gnu.org Subject: [Bug c/99797] New: accessing uninitialized automatic variables Date: Sat, 27 Mar 2021 13:47:01 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: gcc X-Bugzilla-Component: c X-Bugzilla-Version: 11.0 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: muecker at gwdg dot de X-Bugzilla-Status: UNCONFIRMED X-Bugzilla-Resolution: X-Bugzilla-Priority: P3 X-Bugzilla-Assigned-To: unassigned at gcc dot gnu.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version bug_status bug_severity priority component assigned_to reporter target_milestone Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://gcc.gnu.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: gcc-bugs@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-bugs mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 27 Mar 2021 13:47:02 -0000 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=3D99797 Bug ID: 99797 Summary: accessing uninitialized automatic variables Product: gcc Version: 11.0 Status: UNCONFIRMED Severity: normal Priority: P3 Component: c Assignee: unassigned at gcc dot gnu.org Reporter: muecker at gwdg dot de Target Milestone: --- Consider the following example which accesses an uninitialized variable: static volatile int d =3D 0; void bar(int c); void foo(void) { char c; //&c; //char *p =3D &c; if (!c) bar(0); if (d) c =3D 1; if (c) bar(1); } GCC produces code where 'bar' is called twice. According to the C standard,= the code is UB so this is technically OK. Still I think it is dangerous and I w= ould prefer a more consistent behavior.=20 When taking the address and assigning it to 'p' GCC produces code which actually checks the variable 'd'. I am not sure why this happens (it is unnecessary). Still when taking the address of 'c' the code is not UB and t= he generated code is OK. Finally, when taking the address and not assigning it, the code is the same= as for the first case where 'bar' is called twice. This seems incorrect as the code is not UB (according to my reading of the C standard). Ideally, I think GCC should reject code when it is clearly UB (address not taken). If it does not reject the code, I think it should assume an unspeci= fied yet consistent value is read. Producing code that assumes c =3D=3D 0 and c = !=3D 0 at different points in time (without intervening write) is really dangerous and should be avoided.=