Re: [PATCH] use pointer size rather than array size when storing the former (PR 93829)

2020-02-28 Thread Jeff Law
On Wed, 2020-02-26 at 16:18 -0700, Martin Sebor wrote: > On 2/26/20 3:09 PM, Jeff Law wrote: > > On Wed, 2020-02-19 at 17:26 -0700, Martin Sebor wrote: > > > The buffer overflow detection for multi-char stores uses the size > > > of a source array even when what's actually being accessed (read > >

Re: [PATCH] use pointer size rather than array size when storing the former (PR 93829)

2020-02-26 Thread Martin Sebor
On 2/26/20 3:09 PM, Jeff Law wrote: On Wed, 2020-02-19 at 17:26 -0700, Martin Sebor wrote: The buffer overflow detection for multi-char stores uses the size of a source array even when what's actually being accessed (read and stored) is a pointer to the array. That leads to incorrect warnings i

Re: [PATCH] use pointer size rather than array size when storing the former (PR 93829)

2020-02-26 Thread Jeff Law
On Wed, 2020-02-19 at 17:26 -0700, Martin Sebor wrote: > The buffer overflow detection for multi-char stores uses the size > of a source array even when what's actually being accessed (read > and stored) is a pointer to the array. That leads to incorrect > warnings in some cases. > > The attached

Re: [PATCH] use pointer size rather than array size when storing the former (PR 93829)

2020-02-19 Thread Bernhard Reutner-Fischer
On 20 February 2020 01:26:58 CET, Martin Sebor wrote: + Sets *NULTREM if the representation contains a zero byte, and sets s/NULTREM/NULTERM/ thanks,

[PATCH] use pointer size rather than array size when storing the former (PR 93829)

2020-02-19 Thread Martin Sebor
The buffer overflow detection for multi-char stores uses the size of a source array even when what's actually being accessed (read and stored) is a pointer to the array. That leads to incorrect warnings in some cases. The attached patch corrects the function that computes the size of the access