From 554fd8c5195424bdbcabf5de30fdc183aba391bd Mon Sep 17 00:00:00 2001 From: upstream source tree Date: Sun, 15 Mar 2015 20:14:05 -0400 Subject: obtained gcc-4.6.4.tar.bz2 from upstream website; verified gcc-4.6.4.tar.bz2.sig; imported gcc-4.6.4 source tree from verified upstream tarball. downloading a git-generated archive based on the 'upstream' tag should provide you with a source tree that is binary identical to the one extracted from the above tarball. if you have obtained the source via the command 'git clone', however, do note that line-endings of files in your working directory might differ from line-endings of the respective files in the upstream repository. --- gcc/testsuite/gcc.dg/attr-alloc_size.c | 36 ++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 gcc/testsuite/gcc.dg/attr-alloc_size.c (limited to 'gcc/testsuite/gcc.dg/attr-alloc_size.c') diff --git a/gcc/testsuite/gcc.dg/attr-alloc_size.c b/gcc/testsuite/gcc.dg/attr-alloc_size.c new file mode 100644 index 000000000..47d7c0050 --- /dev/null +++ b/gcc/testsuite/gcc.dg/attr-alloc_size.c @@ -0,0 +1,36 @@ +/* { dg-do compile } */ +/* { dg-options "-O2 -Wall" } */ + +extern void abort (void); + +#include "../gcc.c-torture/execute/builtins/chk.h" + +extern char *mallocminus1(int size) __attribute__((alloc_size(-1))); /* { dg-warning "parameter outside range" } */ +extern char *malloc0(int size) __attribute__((alloc_size(0))); /* { dg-warning "parameter outside range" } */ +extern char *malloc1(int size) __attribute__((alloc_size(1))); +extern char *malloc2(int empty, int size) __attribute__((alloc_size(2))); +extern char *calloc1(int size, int elements) __attribute__((alloc_size(1,2))); +extern char *calloc2(int size, int empty, int elements) __attribute__((alloc_size(1,3))); +extern char *balloc1(void *size) __attribute__((alloc_size(1))); + +void +test (void) +{ + char *p; + + p = malloc0 (6); + strcpy (p, "Hello"); + p = malloc1 (6); + strcpy (p, "Hello"); + strcpy (p, "Hello World"); /* { dg-warning "will always overflow" "strcpy" } */ + p = malloc2 (__INT_MAX__ >= 1700000 ? 424242 : __INT_MAX__ / 4, 6); + strcpy (p, "World"); + strcpy (p, "Hello World"); /* { dg-warning "will always overflow" "strcpy" } */ + p = calloc1 (2, 5); + strcpy (p, "World"); + strcpy (p, "Hello World"); /* { dg-warning "will always overflow" "strcpy" } */ + p = calloc2 (2, __INT_MAX__ >= 1700000 ? 424242 : __INT_MAX__ / 4, 5); + strcpy (p, "World"); + strcpy (p, "Hello World"); /* { dg-warning "will always overflow" "strcpy" } */ +} + -- cgit v1.2.3