[Bug c/90376] New: spurious -Warray-bounds on memset() of several struct's subobjects

2019-05-07 Thread ryabinin.a.a at gmail dot com
Priority: P3 Component: c Assignee: unassigned at gcc dot gnu.org Reporter: ryabinin.a.a at gmail dot com Target Milestone: --- This is new on gcc 9. # cat array_bounds.c struct trace_iterator { char a; int seq; long b; }; void f(void

[Bug sanitizer/84210] __ubsan_handle_builtin_unreachable shoun't be const

2018-02-05 Thread ryabinin.a.a at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=84210 --- Comment #2 from Andrey Ryabinin --- (In reply to Richard Biener from comment #1) > Confirmed. Note that I'm not sure it makes no sense - it just means the > function has no side-effect besides not returning ;) > Well, GCC docs say that

[Bug sanitizer/84210] New: __ubsan_handle_builtin_unreachable shoun't be const

2018-02-05 Thread ryabinin.a.a at gmail dot com
: sanitizer Assignee: unassigned at gcc dot gnu.org Reporter: ryabinin.a.a at gmail dot com CC: dodji at gcc dot gnu.org, dvyukov at gcc dot gnu.org, jakub at gcc dot gnu.org, kcc at gcc dot gnu.org, marxin at gcc dot gnu.org Target

[Bug sanitizer/81040] asan false negative if parameter of a global function passed by reference

2017-07-03 Thread ryabinin.a.a at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81040 --- Comment #15 from Andrey Ryabinin --- (In reply to Martin Liška from comment #14) > Fixed on trunk. Thanks. However there is slight problem with this. Instrumentation is missing without -fsanitize-address-use-after-scope option. IMO, it

[Bug sanitizer/81040] asan false negative if parameter of a global function passed by reference

2017-06-13 Thread ryabinin.a.a at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81040 --- Comment #7 from Andrey Ryabinin --- (In reply to Martin Liška from comment #6) > Can't see that clang++ is capable of catching your first test-case: > > $ clang++ pr81040.cpp -fsanitize=address && ./a.out > pr81040.cpp:3:9: warning:

[Bug sanitizer/81040] asan false negative if parameter of a global function passed by reference

2017-06-13 Thread ryabinin.a.a at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81040 --- Comment #4 from Andrey Ryabinin --- (In reply to Martin Liška from comment #3) > As mentioned by Richard, currently ASAN is able to protect function > variables that live on stack. In your case the function foo is called with > constant that

[Bug sanitizer/81040] New: asan false negative if parameter of a global function passed by reference

2017-06-09 Thread ryabinin.a.a at gmail dot com
Priority: P3 Component: sanitizer Assignee: unassigned at gcc dot gnu.org Reporter: ryabinin.a.a at gmail dot com CC: dodji at gcc dot gnu.org, dvyukov at gcc dot gnu.org, jakub at gcc dot gnu.org, kcc at gcc dot gnu.org

[Bug sanitizer/69863] New: no_sanitize_address doesn't disable stack instrumentation

2016-02-18 Thread ryabinin.a.a at gmail dot com
Priority: P3 Component: sanitizer Assignee: unassigned at gcc dot gnu.org Reporter: ryabinin.a.a at gmail dot com CC: dodji at gcc dot gnu.org, dvyukov at gcc dot gnu.org, jakub at gcc dot gnu.org, kcc at gcc dot gnu.org Target

[Bug sanitizer/67513] ASAN: Not optimal shadow value check (unlikely condition checked in fast path)

2015-09-10 Thread ryabinin.a.a at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67513 --- Comment #4 from Andrey Ryabinin --- (In reply to Andrey Ryabinin from comment #3) > (In reply to Yury Gribov from comment #1) > > (In reply to Andrey Ryabinin from comment #0) > > > (shadow value is usually zero). > > > > What makes you

[Bug sanitizer/67513] ASAN: Not optimal shadow value check (unlikely condition checked in fast path)

2015-09-10 Thread ryabinin.a.a at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67513 --- Comment #3 from Andrey Ryabinin --- (In reply to Yury Gribov from comment #1) > (In reply to Andrey Ryabinin from comment #0) > > (shadow value is usually zero). > > What makes you think so? AFAIU for less-than-8-byte scalars it's always >

[Bug sanitizer/67513] New: ASAN: Not optimal shadow value check (unlikely condition checked in fast path)

2015-09-09 Thread ryabinin.a.a at gmail dot com
: normal Priority: P3 Component: sanitizer Assignee: unassigned at gcc dot gnu.org Reporter: ryabinin.a.a at gmail dot com CC: dodji at gcc dot gnu.org, dvyukov at gcc dot gnu.org, jakub at gcc dot gnu.org, kcc at gcc dot

[Bug ipa/67368] Inlining failed due to no_sanitize_address and always_inline conflict

2015-09-08 Thread ryabinin.a.a at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67368 Andrey Ryabinin changed: What|Removed |Added CC||ryabinin.a.a at gmail dot com

[Bug sanitizer/63802] UBSan doesn't catch misaligned access if address is 16-bytes (or more) aligned

2014-11-18 Thread ryabinin.a.a at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63802 Andrey Ryabinin ryabinin.a.a at gmail dot com changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED

[Bug sanitizer/63802] New: UBSan doesn't catch misaligned access if address is 16-bytes (or more) aligned

2014-11-10 Thread ryabinin.a.a at gmail dot com
: normal Priority: P3 Component: sanitizer Assignee: unassigned at gcc dot gnu.org Reporter: ryabinin.a.a at gmail dot com CC: dodji at gcc dot gnu.org, dvyukov at gcc dot gnu.org, jakub at gcc dot gnu.org, kcc at gcc dot

[Bug middle-end/61848] [5 Regression] a previous declaration causes the section attribute to be lost

2014-09-03 Thread ryabinin.a.a at gmail dot com
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61848 --- Comment #8 from Andrey Ryabinin ryabinin.a.a at gmail dot com --- Hi, may I ask what's the status of this? Besides of section mismatches in linux kernel it also breaks kernel's modules. Variable __this_module doesn't get into section