forked from OSchip/llvm-project
				
			
		
			
				
	
	
		
			120 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			120 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			C
		
	
	
	
| // RUN: %clang_cc1 -fsyntax-only -verify %s
 | |
| // RUN: %clang_cc1 -fsyntax-only -triple x86_64-apple-darwin9 -verify %s
 | |
| // RUN: %clang_cc1 -DDYNAMIC -fsyntax-only -triple x86_64-apple-darwin9 -verify %s
 | |
| 
 | |
| #ifndef DYNAMIC
 | |
| #define OBJECT_SIZE_BUILTIN __builtin_object_size
 | |
| #else
 | |
| #define OBJECT_SIZE_BUILTIN __builtin_dynamic_object_size
 | |
| #endif
 | |
| 
 | |
| int a[10];
 | |
| 
 | |
| int f0() {
 | |
|   return OBJECT_SIZE_BUILTIN(&a); // expected-error {{too few arguments to function}}
 | |
| }
 | |
| int f1() {
 | |
|   return (OBJECT_SIZE_BUILTIN(&a, 0) + 
 | |
|           OBJECT_SIZE_BUILTIN(&a, 1) + 
 | |
|           OBJECT_SIZE_BUILTIN(&a, 2) + 
 | |
|           OBJECT_SIZE_BUILTIN(&a, 3));
 | |
| }
 | |
| int f2() {
 | |
|   return OBJECT_SIZE_BUILTIN(&a, -1); // expected-error {{argument value -1 is outside the valid range [0, 3]}}
 | |
| }
 | |
| int f3() {
 | |
|   return OBJECT_SIZE_BUILTIN(&a, 4); // expected-error {{argument value 4 is outside the valid range [0, 3]}}
 | |
| }
 | |
| 
 | |
| 
 | |
| // rdar://6252231 - cannot call vsnprintf with va_list on x86_64
 | |
| void f4(const char *fmt, ...) {
 | |
|  __builtin_va_list args;
 | |
|  __builtin___vsnprintf_chk (0, 42, 0, 11, fmt, args); // expected-warning {{'vsnprintf' will always overflow; destination buffer has size 11, but size argument is 42}}
 | |
| }
 | |
| 
 | |
| // rdar://18334276
 | |
| typedef __typeof__(sizeof(int)) size_t;
 | |
| void * memcset(void *restrict dst, int src, size_t n);
 | |
| void * memcpy(void *restrict dst, const void *restrict src, size_t n);
 | |
| 
 | |
| #define memset(dest, src, len) __builtin___memset_chk(dest, src, len, OBJECT_SIZE_BUILTIN(dest, 0))
 | |
| #define memcpy(dest, src, len) __builtin___memcpy_chk(dest, src, len, OBJECT_SIZE_BUILTIN(dest, 0))
 | |
| #define memcpy1(dest, src, len) __builtin___memcpy_chk(dest, src, len, OBJECT_SIZE_BUILTIN(dest, 4))
 | |
| #define NULL ((void *)0)
 | |
| 
 | |
| void f5(void)
 | |
| {
 | |
|   char buf[10];
 | |
|   memset((void *)0x100000000ULL, 0, 0x1000);
 | |
|   memcpy((char *)NULL + 0x10000, buf, 0x10);
 | |
|   memcpy1((char *)NULL + 0x10000, buf, 0x10); // expected-error {{argument value 4 is outside the valid range [0, 3]}}
 | |
| }
 | |
| 
 | |
| // rdar://18431336
 | |
| void f6(void)
 | |
| {
 | |
|   char b[5];
 | |
|   char buf[10];
 | |
|   __builtin___memccpy_chk (buf, b, '\0', sizeof(b), OBJECT_SIZE_BUILTIN (buf, 0));
 | |
|   __builtin___memccpy_chk (b, buf, '\0', sizeof(buf), OBJECT_SIZE_BUILTIN (b, 0));  // expected-warning {{'memccpy' will always overflow; destination buffer has size 5, but size argument is 10}}
 | |
| }
 | |
| 
 | |
| int pr28314(void) {
 | |
|   struct {
 | |
|     struct InvalidField a; // expected-error{{has incomplete type}} expected-note 3{{forward declaration of 'struct InvalidField'}}
 | |
|     char b[0];
 | |
|   } *p;
 | |
| 
 | |
|   struct {
 | |
|     struct InvalidField a; // expected-error{{has incomplete type}}
 | |
|     char b[1];
 | |
|   } *p2;
 | |
| 
 | |
|   struct {
 | |
|     struct InvalidField a; // expected-error{{has incomplete type}}
 | |
|     char b[2];
 | |
|   } *p3;
 | |
| 
 | |
|   int a = 0;
 | |
|   a += OBJECT_SIZE_BUILTIN(&p->a, 0);
 | |
|   a += OBJECT_SIZE_BUILTIN(p->b, 0);
 | |
|   a += OBJECT_SIZE_BUILTIN(p2->b, 0);
 | |
|   a += OBJECT_SIZE_BUILTIN(p3->b, 0);
 | |
|   return a;
 | |
| }
 | |
| 
 | |
| int pr31843() {
 | |
|   int n = 0;
 | |
| 
 | |
|   struct { int f; } a;
 | |
|   int b;
 | |
|   n += OBJECT_SIZE_BUILTIN(({&(b ? &a : &a)->f; pr31843;}), 0); // expected-warning{{expression result unused}}
 | |
| 
 | |
|   struct statfs { char f_mntonname[1024];};
 | |
|   struct statfs *outStatFSBuf;
 | |
|   n += OBJECT_SIZE_BUILTIN(outStatFSBuf->f_mntonname ? "" : "", 1); // expected-warning{{address of array}}
 | |
|   n += OBJECT_SIZE_BUILTIN(outStatFSBuf->f_mntonname ?: "", 1);
 | |
| 
 | |
|   return n;
 | |
| }
 | |
| 
 | |
| typedef struct {
 | |
|   char string[512];
 | |
| } NestedArrayStruct;
 | |
| 
 | |
| typedef struct {
 | |
|   int x;
 | |
|   NestedArrayStruct session[];
 | |
| } IncompleteArrayStruct;
 | |
| 
 | |
| void rd36094951_IAS_builtin_object_size_assertion(IncompleteArrayStruct *p) {
 | |
| #define rd36094951_CHECK(mode)                                                 \
 | |
|   __builtin___strlcpy_chk(p->session[0].string, "ab", 2,                       \
 | |
|                           OBJECT_SIZE_BUILTIN(p->session[0].string, mode))
 | |
|   rd36094951_CHECK(0);
 | |
|   rd36094951_CHECK(1);
 | |
|   rd36094951_CHECK(2);
 | |
|   rd36094951_CHECK(3);
 | |
| }
 |