/* { dg-do compile } */
/* { dg-options "-O2" } */
typedef __SIZE_TYPE__ size_t;
extern inline __attribute__((gnu_inline, always_inline, artificial)) void *
memcpy (void *__restrict dest, const void *__restrict src, size_t len)
{
return __builtin___memcpy_chk (dest, /* { dg-warning "will always overflow
destination buffer" } */
src, len, __builtin_object_size (dest, 0));
}
struct S { char buf[10]; } s;
void
foo (void)
{
char buf[12];
char *p = buf + 4;
struct S *q = (struct S *) p;
memcpy (q, &s, sizeof (s));
}
/* { dg-final { scan-assembler "__memcpy_chk" } } */
FAILs since I've added new memcpy folding. The memcpy is folded before it is
inlined and so it isn't warned on, nor checked at runtime. Testing a patch
that will help this as well as e.g. the memset swapped arguments warning.
--
Summary: [4.4 Regression] memcpy folding breaks -
D_FORTIFY_SOURCE=2 protection
Product: gcc
Version: 4.4.0
Status: UNCONFIRMED
Severity: normal
Priority: P3
Component: middle-end
AssignedTo: jakub at gcc dot gnu dot org
ReportedBy: jakub at gcc dot gnu dot org
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=38454