/* { dg-do compile } */
/* { dg-options "-O2" } */

typedef __SIZE_TYPE__ size_t;

extern inline __attribute__((gnu_inline, always_inline, artificial)) void *
memcpy (void *__restrict dest, const void *__restrict src, size_t len)
{
  return __builtin___memcpy_chk (dest, /* { dg-warning "will always overflow
destination buffer" } */
 src, len, __builtin_object_size (dest, 0));
}

struct S { char buf[10]; } s;

void
foo (void)
{
  char buf[12];
  char *p = buf + 4;
  struct S *q = (struct S *) p;
  memcpy (q, &s, sizeof (s));
}

/* { dg-final { scan-assembler "__memcpy_chk" } } */

FAILs since I've added new memcpy folding.  The memcpy is folded before it is
inlined and so it isn't warned on, nor checked at runtime.  Testing a patch
that will help this as well as e.g. the memset swapped arguments warning.


-- 
           Summary: [4.4 Regression] memcpy folding breaks -
                    D_FORTIFY_SOURCE=2 protection
           Product: gcc
           Version: 4.4.0
            Status: UNCONFIRMED
          Severity: normal
          Priority: P3
         Component: middle-end
        AssignedTo: jakub at gcc dot gnu dot org
        ReportedBy: jakub at gcc dot gnu dot org


http://gcc.gnu.org/bugzilla/show_bug.cgi?id=38454

Reply via email to