[Bug middle-end/77608] missing protection on trivially detectable runtime buffer overflow
siddhesh at gcc dot gnu.org
gcc-bugzilla@gcc.gnu.org
Fri Jan 7 04:18:13 GMT 2022
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=77608
Siddhesh Poyarekar <siddhesh at gcc dot gnu.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
--- Comment #7 from Siddhesh Poyarekar <siddhesh at gcc dot gnu.org> ---
I've posted a patch:
https://gcc.gnu.org/pipermail/gcc-patches/2022-January/587698.html
which returns the whole size of an object (that's a thing now, since __bos
started handling negative offsets) if the offset is not a constant. It goes on
top of the dynamic object sizes patchset.
Volatile offsets will need more rework (basically delay the side effects check
into tree-object-size), so I'll do that after all of these patches are through.
More information about the Gcc-bugs
mailing list