https://gcc.gnu.org/bugzilla/show_bug.cgi?id=77608
--- Comment #8 from Siddhesh Poyarekar ---
The test case for pr 103961 exposed a flaw in my patch, where assuming
wholesize isn't always safe or at least would need more careful consideration.
I need to think this through some more.
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=77608
Siddhesh Poyarekar changed:
What|Removed |Added
Status|NEW |ASSIGNED
--- Comment #7 from
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=77608
Siddhesh Poyarekar changed:
What|Removed |Added
CC||siddhesh at gcc dot gnu.org
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=77608
Kees Cook changed:
What|Removed |Added
CC||kees at outflux dot net
--- Comment #5 from
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=77608
Martin Sebor changed:
What|Removed |Added
Keywords||diagnostic, patch
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=77608
--- Comment #3 from Martin Sebor ---
Author: msebor
Date: Tue Dec 19 19:14:57 2017
New Revision: 255836
URL: https://gcc.gnu.org/viewcvs?rev=255836=gcc=rev
Log:
PR middle-end/77608 - missing protection on trivially detectable runtime buffer
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=77608
Martin Sebor changed:
What|Removed |Added
Known to fail||4.9.3, 5.3.0, 6.2.0, 7.0
--- Comment #2
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=77608
Martin Sebor changed:
What|Removed |Added
Status|UNCONFIRMED |ASSIGNED
Last reconfirmed|