The array will decay into a pointer, creating an unexpected result. sizeof(array + int) is an easy to make typo for sizeof(array) + int. This was motivated by a NetBSD security bug, used sizeof(key - r) instead of sizeof(key) - r, reducing entropy in a random number generator. http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/kern/subr_cprng.c.diff?r1=1.14&r2=1.15&only_with_tag=MAIN&f=h Differential Revision: http://llvm-reviews.chandlerc.com/D571 llvm-svn: 178371
19 lines
526 B
C
19 lines
526 B
C
// RUN: %clang_cc1 %s -fsyntax-only -verify -std=c89 -Wno-sizeof-array-decay
|
|
// expected-no-diagnostics
|
|
// rdar://6095180
|
|
|
|
struct s { char c[17]; };
|
|
extern struct s foo(void);
|
|
|
|
struct s a, b, c;
|
|
|
|
int A[sizeof((foo().c)) == 17 ? 1 : -1];
|
|
int B[sizeof((a.c)) == 17 ? 1 : -1];
|
|
|
|
|
|
// comma does not promote array/function in c90 unless they are lvalues.
|
|
int W[sizeof(0, a.c) == sizeof(char*) ? 1 : -1];
|
|
int X[sizeof(0, (foo().c)) == 17 ? 1 : -1];
|
|
int Y[sizeof(0, (a,b).c) == 17 ? 1 : -1];
|
|
int Z[sizeof(0, (a=b).c) == 17 ? 1 : -1];
|