https://sourceware.org/bugzilla/show_bug.cgi?id=24829
Alan Modra <amodra at gmail dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |amodra at gmail dot com
--- Comment #10 from Alan Modra <amodra at gmail dot com> ---
> I get the "block_start + uvalue" can overflow, but won't this trigger the
> "data < block_start" part of the test?
Not necessarily. The pointers may only be 32 bit, which with a 64-bit uvalue
leads to many values of uvalue > 4G that wrap to a "valid" range. Pointer
comparisons are a pain. It's much better in this situation to calculate the
max valid size left then compare that with uvalue.
--
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
bug-binutils mailing list
[email protected]
https://lists.gnu.org/mailman/listinfo/bug-binutils