Hello all,
Compiling for RISC-V, I've ran into an error like this:

tmp.c:15:3: error: 'memcpy' writing 4 bytes into a region of size 0 overflows 
the destination [-Werror=stringop-overflow=]
   15 |   memcpy(&str2->c, &str1->c, sizeof(str2->c));
      |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The error can be triggered by a pretty simple function:

void foo(m_struct_t *str1) {
  m_struct_t *str2 = (m_struct_t *)0x123400;
  memcpy(&str2->c, &str1->c, sizeof(str2->c));
}

Debugging the case, I've found the following remark in gcc/pointer-query.cc:

/* Pointer constants other than null are most likely the result
   of erroneous null pointer addition/subtraction.  Unless zero
   is a valid address set size to zero.  For null pointers, set
   size to the maximum for now since those may be the result of
   jump threading.  */

I'd prefer not to disable this warning, as it seems very helpful, but in 
embedded SW we have just too many cases we have to set an address explicitly. I 
understand the concern about erroneous null pointer addition/subtraction, but I 
think these could be detected in other analysis, while stringop overflow would 
still work for other cases.
I see that the warning can be silenced by zero_address_valid, which is only set 
for x86 non-generic address space for now. I'm not sure if this enabling zero 
addresses all over the place is right for RISC-V or other potentially embedded 
targets.

What do you think?

Thanks
        Guy

Reply via email to