summaryrefslogtreecommitdiff
path: root/gcc/testsuite/gcc.dg/builtin-stringop-chk-1.c
diff options
context:
space:
mode:
authorupstream source tree <ports@midipix.org>2015-03-15 20:14:05 -0400
committerupstream source tree <ports@midipix.org>2015-03-15 20:14:05 -0400
commit554fd8c5195424bdbcabf5de30fdc183aba391bd (patch)
tree976dc5ab7fddf506dadce60ae936f43f58787092 /gcc/testsuite/gcc.dg/builtin-stringop-chk-1.c
downloadcbb-gcc-4.6.4-554fd8c5195424bdbcabf5de30fdc183aba391bd.tar.bz2
cbb-gcc-4.6.4-554fd8c5195424bdbcabf5de30fdc183aba391bd.tar.xz
obtained gcc-4.6.4.tar.bz2 from upstream website;upstream
verified gcc-4.6.4.tar.bz2.sig; imported gcc-4.6.4 source tree from verified upstream tarball. downloading a git-generated archive based on the 'upstream' tag should provide you with a source tree that is binary identical to the one extracted from the above tarball. if you have obtained the source via the command 'git clone', however, do note that line-endings of files in your working directory might differ from line-endings of the respective files in the upstream repository.
Diffstat (limited to 'gcc/testsuite/gcc.dg/builtin-stringop-chk-1.c')
-rw-r--r--gcc/testsuite/gcc.dg/builtin-stringop-chk-1.c114
1 files changed, 114 insertions, 0 deletions
diff --git a/gcc/testsuite/gcc.dg/builtin-stringop-chk-1.c b/gcc/testsuite/gcc.dg/builtin-stringop-chk-1.c
new file mode 100644
index 000000000..e9fb7db52
--- /dev/null
+++ b/gcc/testsuite/gcc.dg/builtin-stringop-chk-1.c
@@ -0,0 +1,114 @@
+/* Test whether buffer overflow warnings for __*_chk builtins
+ are emitted properly. */
+/* { dg-do compile } */
+/* { dg-options "-O2 -std=gnu99" } */
+/* { dg-options "-mstructure-size-boundary=8 -O2 -std=gnu99" { target arm*-*-* } } */
+
+extern void abort (void);
+
+#include "../gcc.c-torture/execute/builtins/chk.h"
+#include <stdarg.h>
+
+volatile void *vx;
+char buf1[20];
+int x;
+
+void
+test (int arg, ...)
+{
+ char buf2[20];
+ va_list ap;
+ char *p = &buf1[10], *q;
+
+ memcpy (&buf2[19], "ab", 1);
+ memcpy (&buf2[19], "ab", 2); /* { dg-warning "will always overflow" "memcpy" } */
+ vx = mempcpy (&buf2[19], "ab", 1);
+ vx = mempcpy (&buf2[19], "ab", 2); /* { dg-warning "will always overflow" "mempcpy" } */
+ memmove (&buf2[18], &buf1[10], 2);
+ memmove (&buf2[18], &buf1[10], 3); /* { dg-warning "will always overflow" "memmove" } */
+ memset (&buf2[16], 'a', 4);
+ memset (&buf2[15], 'b', 6); /* { dg-warning "will always overflow" "memset" } */
+ strcpy (&buf2[18], "a");
+ strcpy (&buf2[18], "ab"); /* { dg-warning "will always overflow" "strcpy" } */
+ vx = stpcpy (&buf2[18], "a");
+ vx = stpcpy (&buf2[18], "ab"); /* { dg-warning "will always overflow" "stpcpy" } */
+ strncpy (&buf2[18], "a", 2);
+ strncpy (&buf2[18], "a", 3); /* { dg-warning "will always overflow" "strncpy" } */
+ strncpy (&buf2[18], "abc", 2);
+ strncpy (&buf2[18], "abc", 3); /* { dg-warning "will always overflow" "strncpy" } */
+ memset (buf2, '\0', sizeof (buf2));
+ strcat (&buf2[18], "a");
+ memset (buf2, '\0', sizeof (buf2));
+ strcat (&buf2[18], "ab"); /* { dg-warning "will always overflow" "strcat" } */
+ sprintf (&buf2[18], "%s", buf1);
+ sprintf (&buf2[18], "%s", "a");
+ sprintf (&buf2[18], "%s", "ab"); /* { dg-warning "will always overflow" "sprintf" } */
+ sprintf (&buf2[18], "a");
+ sprintf (&buf2[18], "ab"); /* { dg-warning "will always overflow" "sprintf" } */
+ snprintf (&buf2[18], 2, "%d", x);
+ /* N argument to snprintf is the size of the buffer.
+ Although this particular call wouldn't overflow buf2,
+ incorrect buffer size was passed to it and therefore
+ we want a warning and runtime failure. */
+ snprintf (&buf2[18], 3, "%d", x); /* { dg-warning "will always overflow" "snprintf" } */
+ va_start (ap, arg);
+ vsprintf (&buf2[18], "a", ap);
+ va_end (ap);
+ va_start (ap, arg);
+ vsprintf (&buf2[18], "ab", ap); /* { dg-warning "will always overflow" "vsprintf" } */
+ va_end (ap);
+ va_start (ap, arg);
+ vsnprintf (&buf2[18], 2, "%s", ap);
+ va_end (ap);
+ va_start (ap, arg);
+ /* See snprintf above. */
+ vsnprintf (&buf2[18], 3, "%s", ap); /* { dg-warning "will always overflow" "vsnprintf" } */
+ va_end (ap);
+
+ p = p + 10;
+ memset (p, 'd', 0);
+ q = strcpy (p, ""); /* { dg-warning "will always overflow" "strcpy" } */
+
+ /* This invokes undefined behaviour, since we are past the end of buf1. */
+ p = p + 10;
+ memset (p, 'd', 1); /* { dg-warning "will always overflow" "memset" } */
+
+ memset (q, 'd', 0);
+ memset (q, 'd', 1); /* { dg-warning "will always overflow" "memset" } */
+ q = q - 10;
+ memset (q, 'd', 10);
+}
+
+char *str = "ABCDEFG";
+typedef struct { char b[16]; } H;
+
+/* Some brown paper bag bugs found in real applications.
+ This test is here merely for amusement. */
+
+void
+test2 (const H h)
+{
+ char c;
+ strncpy (&c, str, 3); /* { dg-warning "will always overflow" "strncpy" } */
+
+ struct { char b[4]; } x;
+ sprintf (x.b, "%s", "ABCD"); /* { dg-warning "will always overflow" "sprintf" } */
+
+ unsigned int i;
+ memcpy (&i, &h, sizeof (h)); /* { dg-warning "will always overflow" "memcpy" } */
+
+ unsigned char buf[21];
+ memset (buf + 16, 0, 8); /* { dg-warning "will always overflow" "memset" } */
+
+ typedef struct { int i, j, k, l; } S;
+ S *s[3];
+ memset (s, 0, sizeof (S) * 3); /* { dg-warning "will always overflow" "memset" } */
+
+ struct T { char a[8]; char b[4]; char c[10]; } t;
+ stpcpy (t.c,"Testing..."); /* { dg-warning "will always overflow" "stpcpy" } */
+
+ char b1[7];
+ char b2[4];
+ memset (b1, 0, sizeof (b1));
+ memset (b2, 0, sizeof (b1)); /* { dg-warning "will always overflow" "memset" } */
+}