Compiler projects using llvm
// RUN: %clang_analyze_cc1 -verify %s \
// RUN: -analyzer-checker=core,alpha.unix.cstring


// This file is generally for the alpha.unix.cstring.UninitializedRead Checker, the reason for putting it into
// the separate file because the checker is break the some existing test cases in bstring.c file , so we don't 
// wanna mess up with some existing test case so it's better to create separate file for it, this file also include 
// the broken test for the reference in future about the broken tests.


typedef typeof(sizeof(int)) size_t;

void clang_analyzer_eval(int);

void *memcpy(void *restrict s1, const void *restrict s2, size_t n);

void top(char *dst) {
  char buf[10];
  memcpy(dst, buf, 10); // expected-warning{{Bytes string function accesses uninitialized/garbage values}}
  (void)buf;
}

//===----------------------------------------------------------------------===
// mempcpy()
//===----------------------------------------------------------------------===

void *mempcpy(void *restrict s1, const void *restrict s2, size_t n);

void mempcpy14() {
  int src[] = {1, 2, 3, 4};
  int dst[5] = {0};
  int *p;

  p = mempcpy(dst, src, 4 * sizeof(int)); // expected-warning{{Bytes string function accesses uninitialized/garbage values}}
   // FIXME: This behaviour is actually surprising and needs to be fixed, 
   // mempcpy seems to consider the very last byte of the src buffer uninitialized
   // and returning undef unfortunately. It should have returned unknown or a conjured value instead.

  clang_analyzer_eval(p == &dst[4]); // no-warning (above is fatal)
}

struct st {
  int i;
  int j;
};


void mempcpy15() {
  struct st s1 = {0};
  struct st s2;
  struct st *p1;
  struct st *p2;

  p1 = (&s2) + 1;
  p2 = mempcpy(&s2, &s1, sizeof(struct st)); // expected-warning{{Bytes string function accesses uninitialized/garbage values}}
  // FIXME: It seems same as mempcpy14() case.
  
  clang_analyzer_eval(p1 == p2); // no-warning (above is fatal)
}