https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114923
Alexander Monakov <amonakov at gcc dot gnu.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |amonakov at gcc dot gnu.org --- Comment #2 from Alexander Monakov <amonakov at gcc dot gnu.org> --- 'volatile' is not viral like that. If 'buf' can be accessed outside of the abstract machine, it needs to be volatile itself. Alternatively, an empty asm with a memory clobber, asm("":::"memory"), will imply a possible access to 'buf' via its escaped address.