https://gcc.gnu.org/bugzilla/show_bug.cgi?id=95556
Bug ID: 95556
Summary: Not replacing __builtin___memcpy_chk() as documented
Product: gcc
Version: 7.5.0
Status: UNCONFIRMED
Severity: normal
Priority: P3
Component: c
Assignee: unassigned at gcc dot gnu.org
Reporter: pg...@j-davis.com
Target Milestone: ---
Created attachment 48686
--> https://gcc.gnu.org/bugzilla/attachment.cgi?id=48686&action=edit
Example 2
GCC's Object Size Checking doc says:
"There are built-in functions added for many common
string operation functions, e.g., for memcpy
__builtin___memcpy_chk built-in is provided. This
built-in has an additional last argument, which is
the number of bytes remaining in the object the dest
argument points to or (size_t) -1 if the size is not
known. The built-in functions are optimized into the
normal string functions like memcpy if the last
argument is (size_t) -1 or if it is known at compile
time that the destination object will not be
overflowed..."
https://gcc.gnu.org/onlinedocs/gcc/Object-Size-Checking.html
In the attached example1.c, __builtin___memcpy_chk() is optimized into the
normal memcpy(), as expected.
But in a slightly different example2.c, it is not, despite an object size of
-1.
When the checked version is left in place (like example2.c), it causes a
significant regression in my case.
This is important because Ubuntu 18.04 uses _FORTIFY_SOURCE, which ends up
using __builtin___memcpy_chk() for memcpy. If gcc is arbitrarily leaving it in
place when it should be (according to the docs) optimized away, that affects a
lot of code.
I'm seeing this on Ubuntu 18.04 with both:
gcc (Ubuntu 7.5.0-3ubuntu1~18.04) 7.5.0
gcc-9 (Ubuntu 9.2.1-19ubuntu1~18.04.york0) 9.2.1 20191109
It happens with or without -fno-builtin-memcpy (which is not a surprise, since
I am directly calling the builtin version anyway).
Compiled using:
gcc-9 -O2 -c -S -o example1.S example1.c
gcc-9 -O2 -c -S -o example2.S example2.c
example1.S:50:
callmemcpy@PLT
example2.S:75:
rep movsq