diff options
author | Dan Albert <danalbert@google.com> | 2014-10-08 11:21:32 -0700 |
---|---|---|
committer | Dan Albert <danalbert@google.com> | 2014-10-08 13:02:53 -0700 |
commit | 2fbb1b653ee46b6dee715ae7c085f094f505390d (patch) | |
tree | ac0ff862c84a3478874a2ca1c3f7df7fea465033 /tests/fortify_sprintf_warnings.cpp | |
parent | 5a3ca374583f7605672d9e8f9098011de240f7c4 (diff) | |
download | android_bionic-2fbb1b653ee46b6dee715ae7c085f094f505390d.tar.gz android_bionic-2fbb1b653ee46b6dee715ae7c085f094f505390d.tar.bz2 android_bionic-2fbb1b653ee46b6dee715ae7c085f094f505390d.zip |
Add basic compile time tests for sn?printf.
Bug: 17782583
Change-Id: I6443537c643d1cc6b4a8f2dab5c364f2fbc1faa3
Diffstat (limited to 'tests/fortify_sprintf_warnings.cpp')
-rw-r--r-- | tests/fortify_sprintf_warnings.cpp | 57 |
1 files changed, 57 insertions, 0 deletions
diff --git a/tests/fortify_sprintf_warnings.cpp b/tests/fortify_sprintf_warnings.cpp new file mode 100644 index 000000000..2333c3e23 --- /dev/null +++ b/tests/fortify_sprintf_warnings.cpp @@ -0,0 +1,57 @@ +/* + * Copyright (C) 2014 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#undef _FORTIFY_SOURCE +#define _FORTIFY_SOURCE 2 +#include <stdio.h> + +void test_sprintf() { + char buf[4]; + + // NOLINTNEXTLINE(whitespace/line_length) + // GCC: warning: call to int __builtin___sprintf_chk(char*, int, unsigned int, const char*, ...) will always overflow destination buffer + // clang should emit a warning, but doesn't + sprintf(buf, "foobar"); // NOLINT(runtime/printf) + + // NOLINTNEXTLINE(whitespace/line_length) + // GCC: warning: call to int __builtin___sprintf_chk(char*, int, unsigned int, const char*, ...) will always overflow destination buffer + // clang should emit a warning, but doesn't + sprintf(buf, "%s", "foobar"); // NOLINT(runtime/printf) +} + +void test_snprintf() { + char buf[4]; + + // NOLINTNEXTLINE(whitespace/line_length) + // GCC: warning: call to int __builtin___snprintf_chk(char*, unsigned int, int, unsigned int, const char*, ...) will always overflow destination buffer + // clang should emit a warning, but doesn't + snprintf(buf, 5, "foobar"); // NOLINT(runtime/printf) + + // NOLINTNEXTLINE(whitespace/line_length) + // GCC: warning: call to int __builtin___snprintf_chk(char*, unsigned int, int, unsigned int, const char*, ...) will always overflow destination buffer + // clang should emit a warning, but doesn't + snprintf(buf, 5, "%s", "foobar"); // NOLINT(runtime/printf) + + // NOLINTNEXTLINE(whitespace/line_length) + // GCC: warning: call to int __builtin___snprintf_chk(char*, unsigned int, int, unsigned int, const char*, ...) will always overflow destination buffer + // clang should emit a warning, but doesn't + snprintf(buf, 5, " %s ", "foobar"); // NOLINT(runtime/printf) + + // NOLINTNEXTLINE(whitespace/line_length) + // GCC: warning: call to int __builtin___snprintf_chk(char*, unsigned int, int, unsigned int, const char*, ...) will always overflow destination buffer + // clang should emit a warning, but doesn't + snprintf(buf, 5, "%d", 100000); // NOLINT(runtime/printf) +} |