Hello all, Compiling for RISC-V, I've ran into an error like this: tmp.c:15:3: error: 'memcpy' writing 4 bytes into a region of size 0 overflows the destination [-Werror=stringop-overflow=] 15 | memcpy(&str2->c, &str1->c, sizeof(str2->c)); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The error can be triggered by a pretty simple function: void foo(m_struct_t *str1) { m_struct_t *str2 = (m_struct_t *)0x123400; memcpy(&str2->c, &str1->c, sizeof(str2->c)); } Debugging the case, I've found the following remark in gcc/pointer-query.cc: /* Pointer constants other than null are most likely the result of erroneous null pointer addition/subtraction. Unless zero is a valid address set size to zero. For null pointers, set size to the maximum for now since those may be the result of jump threading. */ I'd prefer not to disable this warning, as it seems very helpful, but in embedded SW we have just too many cases we have to set an address explicitly. I understand the concern about erroneous null pointer addition/subtraction, but I think these could be detected in other analysis, while stringop overflow would still work for other cases. I see that the warning can be silenced by zero_address_valid, which is only set for x86 non-generic address space for now. I'm not sure if this enabling zero addresses all over the place is right for RISC-V or other potentially embedded targets. What do you think? Thanks Guy