From b9700367fa3ab754909f3b2930b432c34a74a691 Mon Sep 17 00:00:00 2001 From: "H.J. Lu" Date: Wed, 12 Nov 2014 12:54:00 +0000 Subject: [PATCH] Avoid tail call in c-c++-common/asan/strlen-overflow-1.c PR testsuite/63830 * c-c++-common/asan/strlen-overflow-1.c (main): Avoid tail call. From-SVN: r217417 --- gcc/testsuite/ChangeLog | 5 +++++ gcc/testsuite/c-c++-common/asan/strlen-overflow-1.c | 2 +- 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/gcc/testsuite/ChangeLog b/gcc/testsuite/ChangeLog index 9ec99af67cb..c72e75f781c 100644 --- a/gcc/testsuite/ChangeLog +++ b/gcc/testsuite/ChangeLog @@ -1,3 +1,8 @@ +2014-11-12 H.J. Lu + + PR testsuite/63830 + * c-c++-common/asan/strlen-overflow-1.c (main): Avoid tail call. + 2014-11-12 Jakub Jelinek PR c/59708 diff --git a/gcc/testsuite/c-c++-common/asan/strlen-overflow-1.c b/gcc/testsuite/c-c++-common/asan/strlen-overflow-1.c index 0f49286306a..33696ed6518 100644 --- a/gcc/testsuite/c-c++-common/asan/strlen-overflow-1.c +++ b/gcc/testsuite/c-c++-common/asan/strlen-overflow-1.c @@ -16,7 +16,7 @@ int main () { char *p = &a[0]; asm ("" : "+r"(p)); __asan_poison_memory_region ((char *)&a[1], 1); - return __builtin_strlen (a); + return __builtin_strlen (a) + 1; } /* { dg-output "READ of size 2 at 0x\[0-9a-f\]+ thread T0.*(\n|\r\n|\r)" } */ -- 2.30.2