public inbox for gcc-bugs@sourceware.org help / color / mirror / Atom feed
From: "msebor at gcc dot gnu.org" <gcc-bugzilla@gcc.gnu.org> To: gcc-bugs@gcc.gnu.org Subject: [Bug c++/103534] [12 regression] Spurious -Wstringop-overflow warning with std::string concatencation Date: Thu, 02 Dec 2021 23:19:46 +0000 [thread overview] Message-ID: <bug-103534-4-jfeFrGjDyu@http.gcc.gnu.org/bugzilla/> (raw) In-Reply-To: <bug-103534-4@http.gcc.gnu.org/bugzilla/> https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103534 --- Comment #4 from Martin Sebor <msebor at gcc dot gnu.org> --- Yes, the warning does disappear when malloc() and free() are used instead of operator new and delete. foo() also ends up much better optimized, even at -O1: __attribute__((abi_tag ("cxx11"))) struct string foo () { struct string & _7(D); char * _69; <bb 2> [local count: 1073741824]: _69 = __builtin_malloc (17); __builtin_memcpy (_69, "1234567890123456", 16); MEM[(char_type &)_69 + 16] = 0; MEM[(struct basic_string *)_7(D)]._M_dataplus._M_p = _69; MEM[(struct basic_string *)_7(D)].D.33183._M_allocated_capacity = 16; MEM[(struct basic_string *)_7(D)]._M_string_length = 16; return _7(D); } The -O1 dump in comment #1 doesn't look right, I may have messed something up. The same issue happens at -O2 where the dump is as follows: =========== BB 3 ============ Imports: n_5(D) Exports: _1 n_5(D) _1 : n_5(D)(I) n_5(D) int [-INF, -1][1, +INF] <bb 3> [local count: 536870913]: _1 = (sizetype) n_5(D); if (_1 == 1) goto <bb 4>; [51.12%] else goto <bb 5>; [48.88%] _1 : sizetype [1, 2147483647][18446744071562067968, +INF] 3->4 (T) _1 : sizetype [1, 1] 3->4 (T) n_5(D) : int [1, 1] 3->5 (F) _1 : sizetype [2, 2147483647][18446744071562067968, +INF] 3->5 (F) n_5(D) : int [-INF, -1][2, +INF] =========== BB 4 ============ <bb 4> [local count: 274448412]: MEM[(char *)&b] = 0; goto <bb 6>; [100.00%] =========== BB 5 ============ <bb 5> [local count: 262422500]: __builtin_memcpy (&b, &a, _1);
next prev parent reply other threads:[~2021-12-02 23:19 UTC|newest] Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top 2021-12-02 19:47 [Bug c++/103534] New: " sss@li-snyder.org 2021-12-02 21:03 ` [Bug c++/103534] " msebor at gcc dot gnu.org 2021-12-02 21:53 ` pinskia at gcc dot gnu.org 2021-12-02 23:02 ` redi at gcc dot gnu.org 2021-12-02 23:19 ` msebor at gcc dot gnu.org [this message] 2021-12-06 8:16 ` rguenth at gcc dot gnu.org 2021-12-10 16:29 ` jason at gcc dot gnu.org 2021-12-10 16:30 ` jason at gcc dot gnu.org 2021-12-10 16:37 ` jason at gcc dot gnu.org 2021-12-10 16:53 ` msebor at gcc dot gnu.org 2021-12-10 17:04 ` jakub at gcc dot gnu.org 2021-12-11 4:58 ` cvs-commit at gcc dot gnu.org 2021-12-13 16:11 ` jason at gcc dot gnu.org 2021-12-13 16:11 ` jason at gcc dot gnu.org
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=bug-103534-4-jfeFrGjDyu@http.gcc.gnu.org/bugzilla/ \ --to=gcc-bugzilla@gcc.gnu.org \ --cc=gcc-bugs@gcc.gnu.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).