[Bug sanitizer/109444] Possible array overflow without diagnosis in memcpy

2023-04-07 Thread pinskia at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=109444 Andrew Pinski changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|---

[Bug sanitizer/109444] Possible array overflow without diagnosis in memcpy if called within a virtual method scenario

2023-04-07 Thread mohamed.selim at dxc dot com via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=109444 --- Comment #2 from Mohamed --- I guess you meant Bar, since Bar has the array member. But then for the sanitizer to intervene and diagnose are there conditions for alignment??

[Bug sanitizer/109444] Possible array overflow without diagnosis in memcpy if called within a virtual method scenario

2023-04-06 Thread pinskia at gcc dot gnu.org via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=109444 --- Comment #1 from Andrew Pinski --- There is padding bytes for Foo because the alignment of Foo needs to be the same alignment as a pointer.