1 /* PR middle-end/82646 - bogus -Wstringop-overflow with -D_FORTIFY_SOURCE=2
2 on strncpy with range to a member array
4 { dg-options "-O2 -Wstringop-overflow -ftrack-macro-expansion=0" } */
6 #define bos(p) __builtin_object_size (p, 1)
13 /* Verify that none of the string function calls below triggers a warning. */
15 char* test_stpncpy_const_nowarn (struct S
*p
)
19 return __builtin_stpncpy (p
->a
, "123456", n
);
22 char* test_strncpy_const_nowarn (struct S
*p
)
26 return __builtin_strncpy (p
->a
, "1234567", n
);
29 char* test_stpncpy_chk_const_nowarn (struct S
*p
)
33 return __builtin___stpncpy_chk (p
->a
, "12345678", n
, bos (p
->a
));
36 char* test_strncpy_chk_const_nowarn (struct S
*p
)
40 return __builtin___strncpy_chk (p
->a
, "123456789", n
, bos (p
->a
));
44 char* test_stpncpy_range_nowarn (struct S
*p
, int n
)
49 return __builtin_stpncpy (p
->a
, "123456", n
);
52 char* test_strncpy_range_nowarn (struct S
*p
, int n
)
57 return __builtin_strncpy (p
->a
, "1234567", n
);
60 char* test_stpncpy_chk_range_nowarn (struct S
*p
, int n
)
65 return __builtin___stpncpy_chk (p
->a
, "12345678", n
, bos (p
->a
)); /* { dg-bogus "\\\[-Wstringop-overflow=]" } */
68 char* test_strncpy_chk_range_nowarn (struct S
*p
, int n
)
73 return __builtin___strncpy_chk (p
->a
, "123456789", n
, bos (p
->a
)); /* { dg-bogus "\\\[-Wstringop-overflow=]" } */
77 /* Verify that all of the string function calls below trigger a warning. */
79 char* test_stpncpy_const_warn (struct S
*p
)
85 return __builtin_stpncpy (p
->a
, "123456", n
); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
88 char* test_strncpy_const_warn (struct S
*p
)
92 /* A call to strncpy() with a known string and small bound is folded
93 into memcpy() which defeats the warning in this case since memcpy
94 uses Object Size Type 0, i.e., the largest object that p->a may
95 be a part of. Use a larger bound to get around this here. */
98 return __builtin_strncpy (p
->a
, "1234567", n
); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
101 char* test_stpncpy_chk_const_warn (struct S
*p
)
107 return __builtin___stpncpy_chk (p
->a
, "12345678", n
, bos (p
->a
)); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
110 char* test_strncpy_chk_const_warn (struct S
*p
)
116 return __builtin___strncpy_chk (p
->a
, "123456789", n
, bos (p
->a
)); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
120 char* test_stpncpy_range_warn (struct S
*p
, int n
)
122 if (n
< sizeof p
->a
+ 1)
125 return __builtin_stpncpy (p
->a
, "123456", n
); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
128 char* test_strncpy_range_warn (struct S
*p
, int n
)
130 if (n
< sizeof p
->a
+ 1)
133 return __builtin_strncpy (p
->a
, "1234567", n
); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
136 char* test_stpncpy_chk_range_warn (struct S
*p
, int n
)
138 if (n
< sizeof p
->a
+ 1)
141 return __builtin___stpncpy_chk (p
->a
, "12345678", n
, bos (p
->a
)); /* { dg-warning "\\\[-Wstringop-overflow=]" } */
144 char* test_strncpy_chk_range_warn (struct S
*p
, int n
)
146 if (n
< sizeof p
->a
+ 1)
149 return __builtin___strncpy_chk (p
->a
, "123456789", n
, bos (p
->a
)); /* { dg-warning "\\\[-Wstringop-overflow=]" } */