aboutsummaryrefslogtreecommitdiff
path: root/gcc
diff options
context:
space:
mode:
authorJason Merrill <jason@redhat.com>2021-12-10 11:21:50 -0500
committerJason Merrill <jason@redhat.com>2021-12-10 23:58:13 -0500
commit2e8067041d1d69da02bd7578f58abc11eb35a04b (patch)
tree5b3b28b4f30f602d6f8e96592a560f9803b3e08d /gcc
parent0bceef1671adee52e9cc409d82e5f5590fed8d45 (diff)
downloadgcc-2e8067041d1d69da02bd7578f58abc11eb35a04b.zip
gcc-2e8067041d1d69da02bd7578f58abc11eb35a04b.tar.gz
gcc-2e8067041d1d69da02bd7578f58abc11eb35a04b.tar.bz2
libstdc++: check length in string append [PR103534]
In the testcase for 103534 we get a warning about append leading to memcpy of a very large number of bytes overflowing the buffer. This turns out to be because we weren't calling _M_check_length for string append. Rather than do that directly, let's go through the public pointer append that calls it. PR c++/103534 libstdc++-v3/ChangeLog: * include/bits/basic_string.h (append (basic_string)): Call pointer append instead of _M_append directly. gcc/testsuite/ChangeLog: * g++.dg/warn/Wstringop-overflow-8.C: New test.
Diffstat (limited to 'gcc')
-rw-r--r--gcc/testsuite/g++.dg/warn/Wstringop-overflow-8.C10
1 files changed, 10 insertions, 0 deletions
diff --git a/gcc/testsuite/g++.dg/warn/Wstringop-overflow-8.C b/gcc/testsuite/g++.dg/warn/Wstringop-overflow-8.C
new file mode 100644
index 0000000..d0ef5e7
--- /dev/null
+++ b/gcc/testsuite/g++.dg/warn/Wstringop-overflow-8.C
@@ -0,0 +1,10 @@
+// PR c++/103534
+// { dg-additional-options "-O -Wall" }
+
+#include <string>
+
+std::string foo(std::string x)
+{
+ // This used to get a bogus -Wstringop-overflow warning.
+ return std::string("1234567890123456") + x;
+}