This is the mail archive of the
gcc-bugs@gcc.gnu.org
mailing list for the GCC project.
[Bug sanitizer/71498] ubsan bounds checking influenced by surrounding code
- From: "burnus at gcc dot gnu.org" <gcc-bugzilla at gcc dot gnu dot org>
- To: gcc-bugs at gcc dot gnu dot org
- Date: Mon, 13 Jun 2016 08:18:45 +0000
- Subject: [Bug sanitizer/71498] ubsan bounds checking influenced by surrounding code
- Auto-submitted: auto-generated
- References: <bug-71498-4 at http dot gcc dot gnu dot org/bugzilla/>
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=71498
Tobias Burnus <burnus at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |burnus at gcc dot gnu.org
--- Comment #1 from Tobias Burnus <burnus at gcc dot gnu.org> ---
Still occurs with current trunk. The same can be observed by the following;
passing a 'static const' string seems to inhibit the instrumentation.
int a[100];
extern void call(const char * fn);
int testje (int core)
{
static const char FUNCTION[] = "testje";
call(FUNCTION);
return a[core];
}