[Bug middle-end/77608] missing protection on trivially detectable runtime buffer overflow

siddhesh at gcc dot gnu.org gcc-bugzilla@gcc.gnu.org
Fri Jan 7 04:18:13 GMT 2022


https://gcc.gnu.org/bugzilla/show_bug.cgi?id=77608

Siddhesh Poyarekar <siddhesh at gcc dot gnu.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |ASSIGNED

--- Comment #7 from Siddhesh Poyarekar <siddhesh at gcc dot gnu.org> ---
I've posted a patch:

https://gcc.gnu.org/pipermail/gcc-patches/2022-January/587698.html

which returns the whole size of an object (that's a thing now, since __bos
started handling negative offsets) if the offset is not a constant.  It goes on
top of the dynamic object sizes patchset.

Volatile offsets will need more rework (basically delay the side effects check
into tree-object-size), so I'll do that after all of these patches are through.


More information about the Gcc-bugs mailing list