[LLVMbugs] [Bug 20473] New: AddressSanitizer reports false positive global-buffer-overflow.

bugzilla-daemon at llvm.org bugzilla-daemon at llvm.org
Mon Jul 28 07:16:25 PDT 2014


http://llvm.org/bugs/show_bug.cgi?id=20473

            Bug ID: 20473
           Summary: AddressSanitizer reports false positive
                    global-buffer-overflow.
           Product: clang
           Version: trunk
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P
         Component: Static Analyzer
          Assignee: kremenek at apple.com
          Reporter: piotr.szeplik at nsn.com
                CC: llvmbugs at cs.uiuc.edu
    Classification: Unclassified

Created attachment 12834
  --> http://llvm.org/bugs/attachment.cgi?id=12834&action=edit
Build command and fault report.

Hello,

The following code:

struct test
{
    char a[2];
    char b[3];
};

void foo(const test& in) {}

int main()
{
    foo(test{"", ""});
}

runs with an error (see attached file) when compiled with address sanitizer.

Clang version:
Debian clang version 3.5.0-+rc1-1 (tags/RELEASE_35/rc1) (based on LLVM 3.5.0)
Target: x86_64-pc-linux-gnu
Thread model: posix

Best regards,

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20140728/c4e8a265/attachment.html>


More information about the llvm-bugs mailing list