Re: [PATCH] avoid a spurious -Wstringop-overflow due to multiple MEM_REFs (PR 92014)

2019-10-08 Thread Martin Sebor
On 10/7/19 6:58 PM, Martin Sebor wrote: Last week's enhancement to detect one-byte buffer overflows exposed a bug that let the warning use the size of a prior MEM_REF access and "override" the size of the actual store to the character array. When the store was smaller than the prior access (e.g.,

[PATCH] avoid a spurious -Wstringop-overflow due to multiple MEM_REFs (PR 92014)

2019-10-07 Thread Martin Sebor
Last week's enhancement to detect one-byte buffer overflows exposed a bug that let the warning use the size of a prior MEM_REF access and "override" the size of the actual store to the character array. When the store was smaller than the prior access (e.g., one byte, vs an 8-byte null pointer read