[LLVMbugs] [Bug 20473] New: AddressSanitizer reports false positive global-buffer-overflow.
bugzilla-daemon at llvm.org
bugzilla-daemon at llvm.org
Mon Jul 28 07:16:25 PDT 2014
http://llvm.org/bugs/show_bug.cgi?id=20473
Bug ID: 20473
Summary: AddressSanitizer reports false positive
global-buffer-overflow.
Product: clang
Version: trunk
Hardware: PC
OS: Linux
Status: NEW
Severity: normal
Priority: P
Component: Static Analyzer
Assignee: kremenek at apple.com
Reporter: piotr.szeplik at nsn.com
CC: llvmbugs at cs.uiuc.edu
Classification: Unclassified
Created attachment 12834
--> http://llvm.org/bugs/attachment.cgi?id=12834&action=edit
Build command and fault report.
Hello,
The following code:
struct test
{
char a[2];
char b[3];
};
void foo(const test& in) {}
int main()
{
foo(test{"", ""});
}
runs with an error (see attached file) when compiled with address sanitizer.
Clang version:
Debian clang version 3.5.0-+rc1-1 (tags/RELEASE_35/rc1) (based on LLVM 3.5.0)
Target: x86_64-pc-linux-gnu
Thread model: posix
Best regards,
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20140728/c4e8a265/attachment.html>
More information about the llvm-bugs
mailing list