view gcc/testsuite/gcc.dg/builtin-stringop-chk-9.c @ 131:84e7813d76e9

gcc-8.2
author mir3636
date Thu, 25 Oct 2018 07:37:49 +0900
parents
children
line wrap: on
line source

/* PR middle-end/82646 - bogus -Wstringop-overflow with -D_FORTIFY_SOURCE=2
   on strncpy with range to a member array
   { dg-do compile }
   { dg-options "-O2 -Wstringop-overflow -ftrack-macro-expansion=0" } */

#define bos(p)   __builtin_object_size (p, 1)

struct S {
  char a[5];
  void (*pf)(void);
};

/* Verify that none of the string function calls below triggers a warning.  */

char* test_stpncpy_const_nowarn (struct S *p)
{
  int n = sizeof p->a;

  return __builtin_stpncpy (p->a, "123456", n);
}

char* test_strncpy_const_nowarn (struct S *p)
{
  int n = sizeof p->a;

  return __builtin_strncpy (p->a, "1234567", n);
}

char* test_stpncpy_chk_const_nowarn (struct S *p)
{
  int n = sizeof p->a;

  return __builtin___stpncpy_chk (p->a, "12345678", n, bos (p->a));
}

char* test_strncpy_chk_const_nowarn (struct S *p)
{
  int n = sizeof p->a;

  return __builtin___strncpy_chk (p->a, "123456789", n, bos (p->a));
}


char* test_stpncpy_range_nowarn (struct S *p, int n)
{
  if (n < sizeof p->a)
    n = sizeof p->a;

  return __builtin_stpncpy (p->a, "123456", n);
}

char* test_strncpy_range_nowarn (struct S *p, int n)
{
  if (n < sizeof p->a)
    n = sizeof p->a;

  return __builtin_strncpy (p->a, "1234567", n);
}

char* test_stpncpy_chk_range_nowarn (struct S *p, int n)
{
  if (n < sizeof p->a)
    n = sizeof p->a;

  return __builtin___stpncpy_chk (p->a, "12345678", n, bos (p->a));   /* { dg-bogus "\\\[-Wstringop-overflow=]" } */
}

char* test_strncpy_chk_range_nowarn (struct S *p, int n)
{
  if (n < sizeof p->a)
    n = sizeof p->a;

  return __builtin___strncpy_chk (p->a, "123456789", n, bos (p->a));  /* { dg-bogus "\\\[-Wstringop-overflow=]" } */
}


/* Verify that all of the string function calls below trigger a warning.  */

char* test_stpncpy_const_warn (struct S *p)
{
  int n = sizeof p->a;

  ++n;

  return __builtin_stpncpy (p->a, "123456", n);                       /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}

char* test_strncpy_const_warn (struct S *p)
{
  int n = sizeof p->a;

  /* A call to strncpy() with a known string and small bound is folded
     into memcpy() which defeats the warning in this case since memcpy
     uses Object Size Type 0, i.e., the largest object that p->a may
     be a part of.  Use a larger bound to get around this here.  */
  n += 11;

  return __builtin_strncpy (p->a, "1234567", n);                      /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}

char* test_stpncpy_chk_const_warn (struct S *p)
{
  int n = sizeof p->a;

  ++n;

  return __builtin___stpncpy_chk (p->a, "12345678", n, bos (p->a));   /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}

char* test_strncpy_chk_const_warn (struct S *p)
{
  int n = sizeof p->a;

  ++n;

  return __builtin___strncpy_chk (p->a, "123456789", n, bos (p->a));  /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}


char* test_stpncpy_range_warn (struct S *p, int n)
{
  if (n < sizeof p->a + 1)
    n = sizeof p->a + 1;

  return __builtin_stpncpy (p->a, "123456", n);                       /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}

char* test_strncpy_range_warn (struct S *p, int n)
{
  if (n < sizeof p->a + 1)
    n = sizeof p->a + 1;

  return __builtin_strncpy (p->a, "1234567", n);                      /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}

char* test_stpncpy_chk_range_warn (struct S *p, int n)
{
  if (n < sizeof p->a + 1)
    n = sizeof p->a + 1;

  return __builtin___stpncpy_chk (p->a, "12345678", n, bos (p->a));   /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}

char* test_strncpy_chk_range_warn (struct S *p, int n)
{
  if (n < sizeof p->a + 1)
    n = sizeof p->a + 1;

  return __builtin___strncpy_chk (p->a, "123456789", n, bos (p->a));  /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}