https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61547

            Bug ID: 61547
           Summary: Invalid sanitization of trailing byte in
                    __builtin_strlen
           Product: gcc
           Version: 4.10.0
            Status: UNCONFIRMED
          Severity: normal
          Priority: P3
         Component: sanitizer
          Assignee: unassigned at gcc dot gnu.org
          Reporter: y.gribov at samsung dot com
                CC: dodji at gcc dot gnu.org, dvyukov at gcc dot gnu.org,
                    jakub at gcc dot gnu.org, kcc at gcc dot gnu.org

Created attachment 32963
  --> https://gcc.gnu.org/bugzilla/attachment.cgi?id=32963&action=edit
Reprocase

The attached testcase performs an overflow in strlen call. Current GCC fails to
detect it because of invalid instrumentation of trailing byte:
$ gcc repro.c -fsanitize=address -O1 -static-libasan
$ ./a.out
$ echo $?
0

Reply via email to