blob: c6198c6651b5535ea1806f324fbc020c35e05c31 [file] [log] [blame]
Dan Albert2fbb1b62014-10-08 11:21:32 -07001/*
2 * Copyright (C) 2014 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
George Burgess IVc7bd90f2017-08-23 17:32:48 -070017/*
18 * If this test fails, you can see the compiler's output by erasing a few args from the failing
19 * command. Specifically, delete everything before the path/to/the/compiler, then delete the first
20 * arg after the path/to/the/compiler. For example, given the following command:
21 *
22 * bionic/tests/file-check-cxx out/host/linux-x86/bin/FileCheck \
23 * prebuilts/clang/host/linux-x86/clang-4053586/bin/clang++ CLANG -I bionic/tests -I ...
24 *
25 * If you delete everything before clang++ and delete "CLANG" (or "GCC" if gcc is failing), then
26 * you'll end up with:
27 *
28 * prebuilts/clang/host/linux-x86/clang-4053586/bin/clang++ -I bionic/tests -I ...
29 *
30 * Which is the command that FileCheck executes.
31 */
32
Dan Albert2fbb1b62014-10-08 11:21:32 -070033#undef _FORTIFY_SOURCE
34#define _FORTIFY_SOURCE 2
Yabin Cui20f22682015-03-03 20:27:58 -080035#include <fcntl.h>
36#include <netinet/in.h>
37#include <poll.h>
38#include <stdarg.h>
Dan Albert2fbb1b62014-10-08 11:21:32 -070039#include <stdio.h>
Daniel Micayafdd1542015-07-20 21:37:29 -040040#include <stdlib.h>
Yabin Cui20f22682015-03-03 20:27:58 -080041#include <string.h>
42#include <sys/socket.h>
43#include <sys/stat.h>
44#include <time.h>
45#include <unistd.h>
Dan Albert2fbb1b62014-10-08 11:21:32 -070046
47void test_sprintf() {
48 char buf[4];
49
50 // NOLINTNEXTLINE(whitespace/line_length)
Elliott Hughesb4b15c62014-10-08 13:21:29 -070051 // GCC: warning: call to int __builtin___sprintf_chk(char*, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer
George Burgess IV7cc779f2017-02-09 00:00:31 -080052 // CLANG: error: call to unavailable function 'sprintf': format string will always overflow destination buffer
Yabin Cui20f22682015-03-03 20:27:58 -080053 sprintf(buf, "foobar"); // NOLINT(runtime/printf)
Dan Albert2fbb1b62014-10-08 11:21:32 -070054
55 // NOLINTNEXTLINE(whitespace/line_length)
Elliott Hughesb4b15c62014-10-08 13:21:29 -070056 // GCC: warning: call to int __builtin___sprintf_chk(char*, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer
Dan Albert2fbb1b62014-10-08 11:21:32 -070057 // clang should emit a warning, but doesn't
Yabin Cui20f22682015-03-03 20:27:58 -080058 sprintf(buf, "%s", "foobar"); // NOLINT(runtime/printf)
Dan Albert2fbb1b62014-10-08 11:21:32 -070059}
60
61void test_snprintf() {
62 char buf[4];
63
64 // NOLINTNEXTLINE(whitespace/line_length)
Elliott Hughesb4b15c62014-10-08 13:21:29 -070065 // GCC: warning: call to int __builtin___snprintf_chk(char*, {{(long )?}}unsigned int, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer
George Burgess IV7cc779f2017-02-09 00:00:31 -080066 // CLANG: error: call to unavailable function 'snprintf': format string will always overflow destination buffer
Yabin Cui20f22682015-03-03 20:27:58 -080067 snprintf(buf, 5, "foobar"); // NOLINT(runtime/printf)
Dan Albert2fbb1b62014-10-08 11:21:32 -070068
69 // NOLINTNEXTLINE(whitespace/line_length)
Elliott Hughesb4b15c62014-10-08 13:21:29 -070070 // GCC: warning: call to int __builtin___snprintf_chk(char*, {{(long )?}}unsigned int, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer
Dan Albert2fbb1b62014-10-08 11:21:32 -070071 // clang should emit a warning, but doesn't
Yabin Cui20f22682015-03-03 20:27:58 -080072 snprintf(buf, 5, "%s", "foobar"); // NOLINT(runtime/printf)
Dan Albert2fbb1b62014-10-08 11:21:32 -070073
74 // NOLINTNEXTLINE(whitespace/line_length)
Elliott Hughesb4b15c62014-10-08 13:21:29 -070075 // GCC: warning: call to int __builtin___snprintf_chk(char*, {{(long )?}}unsigned int, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer
Dan Albert2fbb1b62014-10-08 11:21:32 -070076 // clang should emit a warning, but doesn't
Yabin Cui20f22682015-03-03 20:27:58 -080077 snprintf(buf, 5, " %s ", "foobar"); // NOLINT(runtime/printf)
Dan Albert2fbb1b62014-10-08 11:21:32 -070078
79 // NOLINTNEXTLINE(whitespace/line_length)
Elliott Hughesb4b15c62014-10-08 13:21:29 -070080 // GCC: warning: call to int __builtin___snprintf_chk(char*, {{(long )?}}unsigned int, int, {{(long )?}}unsigned int, const char*, ...) will always overflow destination buffer
Dan Albert2fbb1b62014-10-08 11:21:32 -070081 // clang should emit a warning, but doesn't
Yabin Cui20f22682015-03-03 20:27:58 -080082 snprintf(buf, 5, "%d", 100000); // NOLINT(runtime/printf)
83}
84
85void test_memcpy() {
86 char buf[4];
87
88 // NOLINTNEXTLINE(whitespace/line_length)
89 // GCC: warning: call to void* __builtin___memcpy_chk(void*, const void*, {{(long )?}}unsigned int, {{(long )?}}unsigned int) will always overflow destination buffer
George Burgess IVb6300462017-07-31 21:29:42 -070090 // CLANG: error: 'memcpy' called with size bigger than buffer
George Burgess IV7cc779f2017-02-09 00:00:31 -080091 memcpy(buf, "foobar", sizeof("foobar") + 100);
Yabin Cui20f22682015-03-03 20:27:58 -080092}
93
94void test_memmove() {
95 char buf[4];
96
97 // NOLINTNEXTLINE(whitespace/line_length)
98 // GCC: warning: call to void* __builtin___memmove_chk(void*, const void*, {{(long )?}}unsigned int, {{(long )?}}unsigned int) will always overflow destination buffer
George Burgess IVb6300462017-07-31 21:29:42 -070099 // CLANG: error: 'memmove' called with size bigger than buffer
Yabin Cui20f22682015-03-03 20:27:58 -0800100 memmove(buf, "foobar", sizeof("foobar"));
101}
102
103void test_memset() {
104 char buf[4];
105
106 // NOLINTNEXTLINE(whitespace/line_length)
107 // GCC: warning: call to void* __builtin___memset_chk(void*, int, {{(long )?}}unsigned int, {{(long )?}}unsigned int) will always overflow destination buffer
George Burgess IVb6300462017-07-31 21:29:42 -0700108 // CLANG: error: 'memset' called with size bigger than buffer
Yabin Cui20f22682015-03-03 20:27:58 -0800109 memset(buf, 0, 6);
110}
111
112void test_strcpy() {
113 char buf[4];
114
115 // NOLINTNEXTLINE(whitespace/line_length)
Yabin Cuif3bd3052015-03-04 21:43:14 -0800116 // GCC: warning: call to {{(char\* __builtin___strcpy_chk\(char\*, const char\*, unsigned int\))|(void\* __builtin___memcpy_chk\(void\*, const void\*, (long )?unsigned int, (long )?unsigned int\))}} will always overflow destination buffer
George Burgess IVb6300462017-07-31 21:29:42 -0700117 // CLANG: error: 'strcpy' called with string bigger than buffer
Yabin Cui20f22682015-03-03 20:27:58 -0800118 strcpy(buf, "foobar"); // NOLINT(runtime/printf)
George Burgess IVb6300462017-07-31 21:29:42 -0700119
120 // NOLINTNEXTLINE(whitespace/line_length)
121 // GCC: warning: call to {{(char\* __builtin___strcpy_chk\(char\*, const char\*, unsigned int\))|(void\* __builtin___memcpy_chk\(void\*, const void\*, (long )?unsigned int, (long )?unsigned int\))}} will always overflow destination buffer
122 // CLANG: error: 'strcpy' called with string bigger than buffer
123 strcpy(buf, "quux");
Yabin Cui20f22682015-03-03 20:27:58 -0800124}
125
126void test_stpcpy() {
127 char buf[4];
128
129 // NOLINTNEXTLINE(whitespace/line_length)
130 // GCC: warning: call to char* __builtin___stpcpy_chk(char*, const char*, {{(long )?}}unsigned int) will always overflow destination buffer
George Burgess IVb6300462017-07-31 21:29:42 -0700131 // CLANG: error: 'stpcpy' called with string bigger than buffer
Yabin Cui20f22682015-03-03 20:27:58 -0800132 stpcpy(buf, "foobar");
George Burgess IVb6300462017-07-31 21:29:42 -0700133
134 // NOLINTNEXTLINE(whitespace/line_length)
135 // GCC: warning: call to char* __builtin___stpcpy_chk(char*, const char*, {{(long )?}}unsigned int) will always overflow destination buffer
136 // CLANG: error: 'stpcpy' called with string bigger than buffer
137 stpcpy(buf, "quux");
Yabin Cui20f22682015-03-03 20:27:58 -0800138}
139
140void test_strncpy() {
141 char buf[4];
142
143 // NOLINTNEXTLINE(whitespace/line_length)
144 // GCC: warning: call to char* __builtin___strncpy_chk(char*, const char*, {{(long )?}}unsigned int, {{(long )?}}unsigned int) will always overflow destination buffer
145 // clang should emit a warning, but doesn't
146 strncpy(buf, "foobar", sizeof("foobar"));
147}
148
149void test_strcat() {
150 char buf[4] = "";
151
152 // NOLINTNEXTLINE(whitespace/line_length)
Yabin Cuif3bd3052015-03-04 21:43:14 -0800153 // GCC: warning: call to {{(char\* __builtin___strcat_chk\(char\*, const char\*, unsigned int\))|(void\* __builtin___memcpy_chk\(void\*, const void\*, (long )?unsigned int, (long )?unsigned int\))}} will always overflow destination buffer
Yabin Cui20f22682015-03-03 20:27:58 -0800154 // clang should emit a warning, but doesn't
155 strcat(buf, "foobar"); // NOLINT(runtime/printf)
156}
157
158void test_strncat() {
159 char buf[4] = "";
160
161 // NOLINTNEXTLINE(whitespace/line_length)
Yabin Cuif3bd3052015-03-04 21:43:14 -0800162 // GCC: warning: call to {{(char\* __builtin___strcat_chk\(char\*, const char\*, unsigned int\))|(void\* __builtin___memcpy_chk\(void\*, const void\*, (long )?unsigned int, (long )?unsigned int\))}} will always overflow destination buffer
Yabin Cui20f22682015-03-03 20:27:58 -0800163 // gcc output warning with __builtin___strcat_chk for __builtin___strncat_chk.
164 // clang should emit a warning, but doesn't
165 strncat(buf, "foobar", sizeof("foobar"));
166}
167
168void test_vsprintf(const char* fmt, ...) {
169 va_list va;
170 char buf[4];
171 va_start(va, fmt);
172
173 // NOLINTNEXTLINE(whitespace/line_length)
Yabin Cuid9647592015-03-05 00:39:09 -0800174 // GCC: warning: call to int __builtin___vsprintf_chk(char*, int, {{(long )?}}unsigned int, const char*, {{(__va_list)|(void\*)|(char\*)|(__va_list_tag\*)}}) will always overflow destination buffer
Yabin Cui20f22682015-03-03 20:27:58 -0800175 // clang should emit a warning, but doesn't
176 vsprintf(buf, "foobar", va);
177 va_end(va);
178}
179
180void test_vsnprintf(const char* fmt, ...) {
181 va_list va;
182 char buf[4];
183 va_start(va, fmt);
184
185 // NOLINTNEXTLINE(whitespace/line_length)
Yabin Cuid9647592015-03-05 00:39:09 -0800186 // GCC: warning: call to int __builtin___vsnprintf_chk(char*, {{(long )?}}unsigned int, int, {{(long )?}}unsigned int, const char*, {{(__va_list)|(void\*)|(char\*)|(__va_list_tag\*)}}) will always overflow destination buffer
Yabin Cui20f22682015-03-03 20:27:58 -0800187 // clang should emit a warning, but doesn't
188 vsnprintf(buf, 5, "foobar", va); // NOLINT(runtime/printf)
189
190 va_end(va);
191}
192
193void test_fgets() {
194 char buf[4];
195
196 // NOLINTNEXTLINE(whitespace/line_length)
197 // GCC: error: call to '__fgets_too_small_error' declared with attribute error: fgets called with size less than zero
George Burgess IV23dbf822017-07-31 21:23:34 -0700198 // CLANG: error: in call to 'fgets', size should not be negative
Yabin Cui20f22682015-03-03 20:27:58 -0800199 fgets(buf, -1, stdin);
200
201 // NOLINTNEXTLINE(whitespace/line_length)
202 // GCC: error: call to '__fgets_too_big_error' declared with attribute error: fgets called with size bigger than buffer
George Burgess IV23dbf822017-07-31 21:23:34 -0700203 // CLANG: error: in call to 'fgets', size is larger than the destination buffer
Yabin Cui20f22682015-03-03 20:27:58 -0800204 fgets(buf, 6, stdin);
205}
206
207void test_recvfrom() {
208 char buf[4];
209 sockaddr_in addr;
210
211 // NOLINTNEXTLINE(whitespace/line_length)
George Burgess IV54f5d832017-07-31 21:21:10 -0700212 // GCC: error: call to '__recvfrom_error' declared with attribute error: 'recvfrom' called with size bigger than buffer
213 // CLANG: error: 'recvfrom' called with size bigger than buffer
Yabin Cui20f22682015-03-03 20:27:58 -0800214 recvfrom(0, buf, 6, 0, reinterpret_cast<sockaddr*>(&addr), NULL);
215}
216
George Burgess IV54f5d832017-07-31 21:21:10 -0700217void test_recv() {
218 char buf[4] = {0};
219
220 // NOLINTNEXTLINE(whitespace/line_length)
221 // GCC: error: call to '__recvfrom_error' declared with attribute error: 'recvfrom' called with size bigger than buffer
222 // CLANG: error: 'recv' called with size bigger than buffer
223 recv(0, buf, 6, 0);
224}
225
Yabin Cui20f22682015-03-03 20:27:58 -0800226void test_umask() {
227 // NOLINTNEXTLINE(whitespace/line_length)
George Burgess IV52dde5f2017-07-31 21:16:05 -0700228 // GCC: error: call to '__umask_invalid_mode' declared with attribute error: 'umask' called with invalid mode
229 // CLANG: error: 'umask' called with invalid mode
Yabin Cui20f22682015-03-03 20:27:58 -0800230 umask(01777);
231}
232
233void test_read() {
234 char buf[4];
235 // NOLINTNEXTLINE(whitespace/line_length)
236 // GCC: error: call to '__read_dest_size_error' declared with attribute error: read called with size bigger than destination
George Burgess IV16c17392017-07-31 21:30:47 -0700237 // CLANG: error: in call to 'read', 'count' bytes overflows the given object
Yabin Cui20f22682015-03-03 20:27:58 -0800238 read(0, buf, 6);
239}
240
241void test_open() {
242 // NOLINTNEXTLINE(whitespace/line_length)
Elliott Hughesb115aef2017-08-04 09:34:19 -0700243 // GCC: error: call to '__creat_missing_mode' declared with attribute error: called with O_CREAT or O_TMPFILE, but missing mode
244 // CLANG: error: 'open' called with O_CREAT or O_TMPFILE, but missing mode
Yabin Cui20f22682015-03-03 20:27:58 -0800245 open("/dev/null", O_CREAT);
246
Elliott Hughesb115aef2017-08-04 09:34:19 -0700247 // GCC: error: call to '__creat_missing_mode' declared with attribute error: called with O_CREAT or O_TMPFILE, but missing mode
248 // CLANG: error: 'open' called with O_CREAT or O_TMPFILE, but missing mode
249 open("/dev/null", O_TMPFILE);
250
Yabin Cui20f22682015-03-03 20:27:58 -0800251 // NOLINTNEXTLINE(whitespace/line_length)
252 // GCC: error: call to '__creat_too_many_args' declared with attribute error: too many arguments
George Burgess IV7cc779f2017-02-09 00:00:31 -0800253 // CLANG: error: call to unavailable function 'open': too many arguments
Yabin Cui20f22682015-03-03 20:27:58 -0800254 open("/dev/null", O_CREAT, 0, 0);
George Burgess IV4e37d532017-08-03 17:11:35 -0700255
Elliott Hughesb115aef2017-08-04 09:34:19 -0700256 // GCC: error: call to '__creat_too_many_args' declared with attribute error: too many arguments
257 // CLANG: error: call to unavailable function 'open': too many arguments
258 open("/dev/null", O_TMPFILE, 0, 0);
259
George Burgess IV4e37d532017-08-03 17:11:35 -0700260 // CLANG: warning: 'open' has superfluous mode bits; missing O_CREAT?
261 open("/dev/null", O_RDONLY, 0644);
262
263 // CLANG: warning: 'open' has superfluous mode bits; missing O_CREAT?
264 open("/dev/null", O_DIRECTORY, 0644);
Yabin Cui20f22682015-03-03 20:27:58 -0800265}
266
267void test_poll() {
268 pollfd fds[1];
269 // NOLINTNEXTLINE(whitespace/line_length)
270 // GCC: error: call to '__poll_too_small_error' declared with attribute error: poll: pollfd array smaller than fd count
George Burgess IV52dde5f2017-07-31 21:16:05 -0700271 // CLANG: error: in call to 'poll', fd_count is larger than the given buffer
Yabin Cui20f22682015-03-03 20:27:58 -0800272 poll(fds, 2, 0);
273}
274
275void test_ppoll() {
276 pollfd fds[1];
277 timespec timeout;
278 // NOLINTNEXTLINE(whitespace/line_length)
279 // GCC: error: call to '__ppoll_too_small_error' declared with attribute error: ppoll: pollfd array smaller than fd count
George Burgess IV52dde5f2017-07-31 21:16:05 -0700280 // CLANG: error: in call to 'ppoll', fd_count is larger than the given buffer
Yabin Cui20f22682015-03-03 20:27:58 -0800281 ppoll(fds, 2, &timeout, NULL);
Dan Albert2fbb1b62014-10-08 11:21:32 -0700282}
Daniel Micayfed26592015-07-18 13:55:51 -0400283
284void test_fread_overflow() {
285 char buf[4];
286 // NOLINTNEXTLINE(whitespace/line_length)
287 // GCC: error: call to '__fread_overflow' declared with attribute error: fread called with overflowing size * count
George Burgess IV23dbf822017-07-31 21:23:34 -0700288 // CLANG: error: in call to 'fread', size * count overflows
Daniel Micayfed26592015-07-18 13:55:51 -0400289 fread(buf, 2, (size_t)-1, stdin);
290}
291
292void test_fread_too_big() {
293 char buf[4];
294 // NOLINTNEXTLINE(whitespace/line_length)
295 // GCC: error: call to '__fread_too_big_error' declared with attribute error: fread called with size * count bigger than buffer
George Burgess IV23dbf822017-07-31 21:23:34 -0700296 // NOLINTNEXTLINE(whitespace/line_length)
297 // CLANG: error: in call to 'fread', size * count is too large for the given buffer
Daniel Micayfed26592015-07-18 13:55:51 -0400298 fread(buf, 1, 5, stdin);
299}
300
301void test_fwrite_overflow() {
Daniel Micayafdd1542015-07-20 21:37:29 -0400302 char buf[4] = {0};
Daniel Micayfed26592015-07-18 13:55:51 -0400303 // NOLINTNEXTLINE(whitespace/line_length)
304 // GCC: error: call to '__fwrite_overflow' declared with attribute error: fwrite called with overflowing size * count
George Burgess IV23dbf822017-07-31 21:23:34 -0700305 // CLANG: error: in call to 'fwrite', size * count overflows
Daniel Micayfed26592015-07-18 13:55:51 -0400306 fwrite(buf, 2, (size_t)-1, stdout);
307}
308
309void test_fwrite_too_big() {
310 char buf[4] = {0};
311 // NOLINTNEXTLINE(whitespace/line_length)
312 // GCC: error: call to '__fwrite_too_big_error' declared with attribute error: fwrite called with size * count bigger than buffer
George Burgess IV23dbf822017-07-31 21:23:34 -0700313 // NOLINTNEXTLINE(whitespace/line_length)
314 // CLANG: error: in call to 'fwrite', size * count is too large for the given buffer
Daniel Micayfed26592015-07-18 13:55:51 -0400315 fwrite(buf, 1, 5, stdout);
316}
Daniel Micay9101b002015-05-20 15:31:26 -0400317
318void test_getcwd() {
319 char buf[4];
320 // NOLINTNEXTLINE(whitespace/line_length)
321 // GCC: error: call to '__getcwd_dest_size_error' declared with attribute error: getcwd called with size bigger than destination
George Burgess IV16c17392017-07-31 21:30:47 -0700322 // CLANG: error: in call to 'getcwd', 'size' bytes overflows the given object
Daniel Micay9101b002015-05-20 15:31:26 -0400323 getcwd(buf, 5);
324}
Daniel Micayafdd1542015-07-20 21:37:29 -0400325
326void test_pwrite64_size() {
327 char buf[4] = {0};
328 // NOLINTNEXTLINE(whitespace/line_length)
329 // GCC: error: call to '__pwrite64_dest_size_error' declared with attribute error: pwrite64 called with size bigger than destination
George Burgess IV16c17392017-07-31 21:30:47 -0700330 // CLANG: error: in call to 'pwrite64', 'count' bytes overflows the given object
Daniel Micayafdd1542015-07-20 21:37:29 -0400331 pwrite64(STDOUT_FILENO, buf, 5, 0);
332}
333
George Burgess IV7cc779f2017-02-09 00:00:31 -0800334void test_pwrite64_too_big_malloc() {
Daniel Micayafdd1542015-07-20 21:37:29 -0400335 void *buf = calloc(atoi("5"), 1);
336 // NOLINTNEXTLINE(whitespace/line_length)
337 // GCC: error: call to '__pwrite64_count_toobig_error' declared with attribute error: pwrite64 called with count > SSIZE_MAX
George Burgess IV7cc779f2017-02-09 00:00:31 -0800338 // clang should emit a warning, but probably never will.
339 pwrite64(STDOUT_FILENO, buf, SIZE_MAX, 0);
340}
341
342void test_pwrite64_too_big() {
343 char buf[4] = {0};
344 // NOLINTNEXTLINE(whitespace/line_length)
345 // GCC: error: call to '__pwrite64_count_toobig_error' declared with attribute error: pwrite64 called with count > SSIZE_MAX
George Burgess IV16c17392017-07-31 21:30:47 -0700346 // CLANG: error: in call to 'pwrite64', 'count' must be <= SSIZE_MAX
Daniel Micayafdd1542015-07-20 21:37:29 -0400347 pwrite64(STDOUT_FILENO, buf, SIZE_MAX, 0);
348}
349
350void test_write_size() {
351 char buf[4] = {0};
352 // NOLINTNEXTLINE(whitespace/line_length)
353 // GCC: error: call to '__write_dest_size_error' declared with attribute error: write called with size bigger than destination
George Burgess IV16c17392017-07-31 21:30:47 -0700354 // CLANG: error: in call to 'write', 'count' bytes overflows the given object
Daniel Micayafdd1542015-07-20 21:37:29 -0400355 write(STDOUT_FILENO, buf, 5);
356}
George Burgess IV7cc779f2017-02-09 00:00:31 -0800357
358void test_memset_args_flipped() {
359 char from[4] = {0};
360 // NOLINTNEXTLINE(whitespace/line_length)
George Burgess IVb6300462017-07-31 21:29:42 -0700361 // CLANG: 'memset' will set 0 bytes; maybe the arguments got flipped?
George Burgess IV7cc779f2017-02-09 00:00:31 -0800362 memset(from, sizeof(from), 0);
363}
Daniel Micay95b59c52017-02-13 17:27:59 -0800364
365void test_sendto() {
366 char buf[4] = {0};
367 sockaddr_in addr;
368
369 // NOLINTNEXTLINE(whitespace/line_length)
George Burgess IV54f5d832017-07-31 21:21:10 -0700370 // GCC: error: call to '__sendto_error' declared with attribute error: 'sendto' called with size bigger than buffer
371 // CLANG: error: 'sendto' called with size bigger than buffer
Daniel Micay95b59c52017-02-13 17:27:59 -0800372 sendto(0, buf, 6, 0, reinterpret_cast<sockaddr*>(&addr), sizeof(sockaddr_in));
373}
374
375void test_send() {
376 char buf[4] = {0};
377
378 // NOLINTNEXTLINE(whitespace/line_length)
George Burgess IV54f5d832017-07-31 21:21:10 -0700379 // GCC: error: call to '__sendto_error' declared with attribute error: 'sendto' called with size bigger than buffer
380 // CLANG: error: 'send' called with size bigger than buffer
Daniel Micay95b59c52017-02-13 17:27:59 -0800381 send(0, buf, 6, 0);
382}
George Burgess IV54f5d832017-07-31 21:21:10 -0700383
384void test_realpath() {
385 char buf[4] = {0};
386 // NOLINTNEXTLINE(whitespace/line_length)
387 // GCC: error: call to '__realpath_size_error' declared with attribute error: 'realpath' output parameter must be NULL or a pointer to a buffer with >= PATH_MAX bytes
388 // NOLINTNEXTLINE(whitespace/line_length)
389 // CLANG: error: 'realpath' output parameter must be NULL or a pointer to a buffer with >= PATH_MAX bytes
390 realpath(".", buf);
391
392 // This is fine.
393 realpath(".", NULL);
394
George Burgess IV95bd4882017-08-14 14:48:55 -0700395 char bigbuf[PATH_MAX];
396 // CLANG: error: 'realpath': NULL path is never correct; flipped arguments?
397 realpath(NULL, bigbuf);
George Burgess IV54f5d832017-07-31 21:21:10 -0700398}