https://gcc.gnu.org/bugzilla/show_bug.cgi?id=115590

--- Comment #3 from nrk at disroot dot org ---
> I am not 100% sure want to keep these around even at -O0 since they don't 
> have any behavior effect.

I'd strongly argue that if you're using sanitizers, you'd want these to be
caught :)

Also worth noting that bad array deref gets caught even if they don't have any
effect:

        [/tmp]~> cat test.c
        int main(void)
        {
                int v[1];
                v[1];
                return 0;
        }
        [/tmp]~> gcc -fsanitize=address,undefined -O0 -o test ./test.c &&
./test
        test.c:4:3: runtime error: index 1 out of bounds for type 'int [1]'

Reply via email to