File: vsnprintf.cpp

package info (click to toggle)
llvm-toolchain-20 1%3A20.1.6-1~exp1
  • links: PTS, VCS
  • area: main
  • in suites: experimental
  • size: 2,111,304 kB
  • sloc: cpp: 7,438,677; ansic: 1,393,822; asm: 1,012,926; python: 241,650; f90: 86,635; objc: 75,479; lisp: 42,144; pascal: 17,286; sh: 10,027; ml: 5,082; perl: 4,730; awk: 3,523; makefile: 3,349; javascript: 2,251; xml: 892; fortran: 672
file content (34 lines) | stat: -rw-r--r-- 868 bytes parent folder | download | duplicates (14)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
// Test that the common part implementation of *printf interceptors does not
// cause negative-size-param false positives.

// RUN: %clangxx -O2 %s -o %t
// RUN: %env_tool_opts=check_printf=1 %run %t 2>&1

// FIXME: The maximum supported allocation size is too platform-specific:
// REQUIRES: x86_64-target-arch

// FIXME: printf is not intercepted on Windows yet.
// UNSUPPORTED: target={{.*windows-msvc.*}}

#include <stdarg.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>

void write(char *buf, int buf_size, const char *fmt, ...) {
  va_list args;
  va_start(args, fmt);
  vsnprintf(buf, buf_size, fmt, args);
  va_end(args);
}

int main() {
  char buffer[100];
  const size_t kStrSize = 1UL << 31;
  char *x = (char *)malloc(kStrSize);
  memset(x, '=', kStrSize - 1);
  x[kStrSize - 1] = 0;
  write(buffer, 100, "%s\n", x);
  free(x);
  return 0;
}