This is the mail archive of the
gcc-bugs@gcc.gnu.org
mailing list for the GCC project.
[Bug sanitizer/81598] -fsanitize=enum does not detect range violation
- From: "jakub at gcc dot gnu.org" <gcc-bugzilla at gcc dot gnu dot org>
- To: gcc-bugs at gcc dot gnu dot org
- Date: Fri, 28 Jul 2017 09:31:49 +0000
- Subject: [Bug sanitizer/81598] -fsanitize=enum does not detect range violation
- Auto-submitted: auto-generated
- References: <bug-81598-4@http.gcc.gnu.org/bugzilla/>
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81598
--- Comment #1 from Jakub Jelinek <jakub at gcc dot gnu.org> ---
This isn't a load, it is a cast, we sanitize just loads from memory.
>From the almost non-existent testsuite coverage in LLVM it is hard to find out
what exactly they decided to implement (-fsanitize=enum has a single testcase
with a single memory load there, -fsanitize=bool 2 testcases with a single
memory load each).