diff options
author | Harald Anlauf <anlauf@gmx.de> | 2020-05-30 20:50:59 +0200 |
---|---|---|
committer | Giuliano Belinassi <giuliano.belinassi@usp.br> | 2020-08-17 13:09:25 -0300 |
commit | d0012ce634dcc89cf045f8324fc3df77f53fa719 (patch) | |
tree | 763626dee63f357f9331a37bdf283709abf99abf /gcc | |
parent | b0f06e250264df26f8086ceadfb9ffe2b25c2e4e (diff) | |
download | gcc-d0012ce634dcc89cf045f8324fc3df77f53fa719.zip gcc-d0012ce634dcc89cf045f8324fc3df77f53fa719.tar.gz gcc-d0012ce634dcc89cf045f8324fc3df77f53fa719.tar.bz2 |
PR fortran/95090 - ICE: identifier overflow
Implement buffer overrun check for temporary that holds mangled names.
2020-05-30 Harald Anlauf <anlauf@gmx.de>
gcc/fortran/
PR fortran/95090
* class.c (get_unique_type_string): Use buffer overrun check.
Diffstat (limited to 'gcc')
-rw-r--r-- | gcc/fortran/class.c | 9 |
1 files changed, 8 insertions, 1 deletions
diff --git a/gcc/fortran/class.c b/gcc/fortran/class.c index db39562..afd8885 100644 --- a/gcc/fortran/class.c +++ b/gcc/fortran/class.c @@ -484,7 +484,14 @@ get_unique_type_string (char *string, gfc_symbol *derived) if (derived->attr.unlimited_polymorphic) strcpy (dt_name, "STAR"); else - strncpy (dt_name, gfc_dt_upper_string (derived->name), sizeof (dt_name)); + { + const char *upper = gfc_dt_upper_string (derived->name); + size_t len = strnlen (upper, sizeof (dt_name)); + if (len >= sizeof (dt_name)) + gfc_internal_error ("get_unique_type_string: identifier overflow"); + memcpy (dt_name, upper, len); + dt_name[len] = '\0'; + } if (derived->attr.unlimited_polymorphic) sprintf (string, "_%s", dt_name); else if (derived->module) |