Add malloc predictor (PR middle-end/83023).
[official-gcc.git] / gcc / testsuite / gcc.dg / pr85388-1.c
blob8176118e71e778f5c6732d7b7da2aff5ef1a6ed5
1 /* This test needs to use setrlimit to set the stack size, so it can
2 only run on Unix. */
3 /* { dg-do run { target { i?86-*-linux* i?86-*-gnu* x86_64-*-linux* } } } */
4 /* { dg-require-effective-target cet } */
5 /* { dg-require-effective-target split_stack } */
6 /* { dg-options "-fsplit-stack -fcf-protection" } */
8 #include <stdlib.h>
9 #include <sys/types.h>
10 #include <sys/resource.h>
12 /* Use a noinline function to ensure that the buffer is not removed
13 from the stack. */
14 static void use_buffer (char *buf) __attribute__ ((noinline));
15 static void
16 use_buffer (char *buf)
18 buf[0] = '\0';
21 /* Each recursive call uses 10,000 bytes. We call it 1000 times,
22 using a total of 10,000,000 bytes. If -fsplit-stack is not
23 working, that will overflow our stack limit. */
25 static void
26 down (int i)
28 char buf[10000];
30 if (i > 0)
32 use_buffer (buf);
33 down (i - 1);
37 int
38 main (void)
40 struct rlimit r;
42 /* We set a stack limit because we are usually invoked via make, and
43 make sets the stack limit to be as large as possible. */
44 r.rlim_cur = 8192 * 1024;
45 r.rlim_max = 8192 * 1024;
46 if (setrlimit (RLIMIT_STACK, &r) != 0)
47 abort ();
48 down (1000);
49 return 0;