blob: b5464c2f06ae5fb4865742cbde74d19497377308 [file] [log] [blame]
/* PR middle-end/82646 - bogus -Wstringop-overflow with -D_FORTIFY_SOURCE=2
on strncpy with range to a member array
{ dg-do compile }
{ dg-options "-O2 -Wstringop-overflow -ftrack-macro-expansion=0" } */
#define bos(p) __builtin_object_size (p, 1)
struct S {
char a[5];
void (*pf)(void);
};
/* Verify that none of the string function calls below triggers a warning. */
char* test_stpncpy_const_nowarn (struct S *p)
{
int n = sizeof p->a;
return __builtin_stpncpy (p->a, "123456", n);
}
char* test_strncpy_const_nowarn (struct S *p)
{
int n = sizeof p->a;
return __builtin_strncpy (p->a, "1234567", n);
}
char* test_stpncpy_chk_const_nowarn (struct S *p)
{
int n = sizeof p->a;
return __builtin___stpncpy_chk (p->a, "12345678", n, bos (p->a));
}
char* test_strncpy_chk_const_nowarn (struct S *p)
{
int n = sizeof p->a;
return __builtin___strncpy_chk (p->a, "123456789", n, bos (p->a));
}
char* test_stpncpy_range_nowarn (struct S *p, int n)
{
if (n < sizeof p->a)
n = sizeof p->a;
return __builtin_stpncpy (p->a, "123456", n);
}
char* test_strncpy_range_nowarn (struct S *p, int n)
{
if (n < sizeof p->a)
n = sizeof p->a;
return __builtin_strncpy (p->a, "1234567", n);
}
char* test_stpncpy_chk_range_nowarn (struct S *p, int n)
{
if (n < sizeof p->a)
n = sizeof p->a;
return __builtin___stpncpy_chk (p->a, "12345678", n, bos (p->a)); /* { dg-bogus "\\\[-Wstringop-overflow=]" } */
}
char* test_strncpy_chk_range_nowarn (struct S *p, int n)
{
if (n < sizeof p->a)
n = sizeof p->a;
return __builtin___strncpy_chk (p->a, "123456789", n, bos (p->a)); /* { dg-bogus "\\\[-Wstringop-overflow=]" } */
}
/* Verify that all of the string function calls below trigger a warning. */
char* test_stpncpy_const_warn (struct S *p)
{
int n = sizeof p->a;
++n;
return __builtin_stpncpy (p->a, "123456", n); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}
char* test_strncpy_const_warn (struct S *p)
{
int n = sizeof p->a;
/* A call to strncpy() with a known string and small bound is folded
into memcpy() which defeats the warning in this case since memcpy
uses Object Size Type 0, i.e., the largest object that p->a may
be a part of. Use a larger bound to get around this here. */
n += 11;
return __builtin_strncpy (p->a, "1234567", n); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}
char* test_stpncpy_chk_const_warn (struct S *p)
{
int n = sizeof p->a;
++n;
return __builtin___stpncpy_chk (p->a, "12345678", n, bos (p->a)); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}
char* test_strncpy_chk_const_warn (struct S *p)
{
int n = sizeof p->a;
++n;
return __builtin___strncpy_chk (p->a, "123456789", n, bos (p->a)); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}
char* test_stpncpy_range_warn (struct S *p, int n)
{
if (n < sizeof p->a + 1)
n = sizeof p->a + 1;
return __builtin_stpncpy (p->a, "123456", n); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}
char* test_strncpy_range_warn (struct S *p, int n)
{
if (n < sizeof p->a + 1)
n = sizeof p->a + 1;
return __builtin_strncpy (p->a, "1234567", n); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}
char* test_stpncpy_chk_range_warn (struct S *p, int n)
{
if (n < sizeof p->a + 1)
n = sizeof p->a + 1;
return __builtin___stpncpy_chk (p->a, "12345678", n, bos (p->a)); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}
char* test_strncpy_chk_range_warn (struct S *p, int n)
{
if (n < sizeof p->a + 1)
n = sizeof p->a + 1;
return __builtin___strncpy_chk (p->a, "123456789", n, bos (p->a)); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
}