blob: 7e1ae4811961735116950658d1807d4f92d74b36 [file] [log] [blame]
Nick Kralevich5bcf3982013-06-28 10:34:09 -07001/*
2 * Copyright (C) 2013 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
Nick Kralevich5bcf3982013-06-28 10:34:09 -070018
Yabin Cui9df70402014-11-05 18:01:01 -080019#include <fcntl.h>
20#include <malloc.h>
Elliott Hughes4674e382015-02-02 09:15:19 -080021#include <poll.h>
Yabin Cui9df70402014-11-05 18:01:01 -080022#include <signal.h>
23#include <stdarg.h>
24#include <string.h>
25#include <sys/socket.h>
26#include <sys/stat.h>
27#include <sys/types.h>
Yabin Cuif4fe6932015-02-03 17:52:32 -080028#include <time.h>
Yabin Cui9df70402014-11-05 18:01:01 -080029
Elliott Hughes141b9172021-04-09 17:13:09 -070030#include <android-base/silent_death_test.h>
31
Peter Collingbournedd126162025-03-25 17:32:35 -070032#include "DoNotOptimize.h"
33
Elliott Hughese7943f82023-09-28 08:20:20 -070034#if defined(__BIONIC__)
Elliott Hughesd036e942015-02-02 11:18:58 -080035#define ASSERT_FORTIFY(expr) ASSERT_EXIT(expr, testing::KilledBySignal(SIGABRT), "FORTIFY")
36#else
37#define ASSERT_FORTIFY(expr) ASSERT_EXIT(expr, testing::KilledBySignal(SIGABRT), "")
38#endif
39
Peter Collingbournedd126162025-03-25 17:32:35 -070040#if __has_feature(hwaddress_sanitizer)
41#define ASSERT_FORTIFY_OR_HWASAN(expr) ASSERT_EXIT(expr, testing::KilledBySignal(SIGABRT), "HWAddressSanitizer")
42#else
43#define ASSERT_FORTIFY_OR_HWASAN ASSERT_FORTIFY
44#endif
45
Yabin Cui9df70402014-11-05 18:01:01 -080046// Fortify test code needs to run multiple times, so TEST_NAME macro is used to
47// distinguish different tests. TEST_NAME is defined in compilation command.
Nick Kralevich5bcf3982013-06-28 10:34:09 -070048#define DEATHTEST_PASTER(name) name##_DeathTest
49#define DEATHTEST_EVALUATOR(name) DEATHTEST_PASTER(name)
50#define DEATHTEST DEATHTEST_EVALUATOR(TEST_NAME)
51
Elliott Hughes141b9172021-04-09 17:13:09 -070052using DEATHTEST = SilentDeathTest;
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070053
Elliott Hughes6fc9aa72025-03-14 12:40:40 -070054#if defined(_FORTIFY_SOURCE) && _FORTIFY_SOURCE >= 2
Nick Kralevich5bcf3982013-06-28 10:34:09 -070055struct foo {
56 char empty[0];
57 char one[1];
58 char a[10];
59 char b[10];
60};
61
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070062TEST_F(DEATHTEST, stpncpy_fortified2) {
Christopher Ferris950a58e2014-04-04 14:38:18 -070063 foo myfoo;
Elliott Hughes58666732025-01-28 13:15:01 -080064 volatile int copy_amt = 11;
Elliott Hughesd036e942015-02-02 11:18:58 -080065 ASSERT_FORTIFY(stpncpy(myfoo.a, "01234567890", copy_amt));
Christopher Ferris950a58e2014-04-04 14:38:18 -070066}
Christopher Ferris950a58e2014-04-04 14:38:18 -070067
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070068TEST_F(DEATHTEST, stpncpy2_fortified2) {
Christopher Ferris2a391882024-12-19 13:44:35 -080069 foo myfoo = {};
Christopher Ferris950a58e2014-04-04 14:38:18 -070070 myfoo.one[0] = 'A'; // not null terminated string
Elliott Hughesd036e942015-02-02 11:18:58 -080071 ASSERT_FORTIFY(stpncpy(myfoo.b, myfoo.one, sizeof(myfoo.b)));
Christopher Ferris950a58e2014-04-04 14:38:18 -070072}
Christopher Ferris950a58e2014-04-04 14:38:18 -070073
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070074TEST_F(DEATHTEST, strncpy_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -070075 foo myfoo;
Elliott Hughes58666732025-01-28 13:15:01 -080076 volatile int copy_amt = 11;
Elliott Hughesd036e942015-02-02 11:18:58 -080077 ASSERT_FORTIFY(strncpy(myfoo.a, "01234567890", copy_amt));
Nick Kralevich5bcf3982013-06-28 10:34:09 -070078}
Nick Kralevich5bcf3982013-06-28 10:34:09 -070079
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070080TEST_F(DEATHTEST, strncpy2_fortified2) {
Christopher Ferris2a391882024-12-19 13:44:35 -080081 foo myfoo = {};
Nick Kralevich93501d32013-08-28 10:47:43 -070082 myfoo.one[0] = 'A'; // not null terminated string
Elliott Hughesd036e942015-02-02 11:18:58 -080083 ASSERT_FORTIFY(strncpy(myfoo.b, myfoo.one, sizeof(myfoo.b)));
Nick Kralevich93501d32013-08-28 10:47:43 -070084}
Nick Kralevich93501d32013-08-28 10:47:43 -070085
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070086TEST_F(DEATHTEST, sprintf_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -070087 foo myfoo;
88 char source_buf[15];
89 memcpy(source_buf, "12345678901234", 15);
Elliott Hughesd036e942015-02-02 11:18:58 -080090 ASSERT_FORTIFY(sprintf(myfoo.a, "%s", source_buf));
Nick Kralevich5bcf3982013-06-28 10:34:09 -070091}
Nick Kralevich5bcf3982013-06-28 10:34:09 -070092
Nick Kralevich884a3de2014-10-06 00:39:47 +000093TEST_F(DEATHTEST, sprintf2_fortified2) {
Nick Kralevich884a3de2014-10-06 00:39:47 +000094 foo myfoo;
Elliott Hughesd036e942015-02-02 11:18:58 -080095 ASSERT_FORTIFY(sprintf(myfoo.a, "0123456789"));
Nick Kralevich884a3de2014-10-06 00:39:47 +000096}
Nick Kralevich884a3de2014-10-06 00:39:47 +000097
Elliott Hughes58666732025-01-28 13:15:01 -080098static int vsprintf_helper2(const char* fmt, ...) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -070099 va_list va;
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700100 va_start(va, fmt);
Elliott Hughes58666732025-01-28 13:15:01 -0800101 foo myfoo;
102 int result = vsprintf(myfoo.a, fmt, va); // should crash here
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700103 va_end(va);
104 return result;
105}
106
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700107TEST_F(DEATHTEST, vsprintf_fortified2) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800108 ASSERT_FORTIFY(vsprintf_helper2("%s", "0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700109}
110
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700111TEST_F(DEATHTEST, vsprintf2_fortified2) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800112 ASSERT_FORTIFY(vsprintf_helper2("0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700113}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700114
Elliott Hughes58666732025-01-28 13:15:01 -0800115static int vsnprintf_helper2(const char* fmt, ...) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700116 va_list va;
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700117 va_start(va, fmt);
Elliott Hughes58666732025-01-28 13:15:01 -0800118 foo myfoo;
119 volatile size_t size = 11;
120 int result = vsnprintf(myfoo.a, size, fmt, va); // should crash here
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700121 va_end(va);
122 return result;
123}
124
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700125TEST_F(DEATHTEST, vsnprintf_fortified2) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800126 ASSERT_FORTIFY(vsnprintf_helper2("%s", "0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700127}
128
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700129TEST_F(DEATHTEST, vsnprintf2_fortified2) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800130 ASSERT_FORTIFY(vsnprintf_helper2("0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700131}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700132
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700133// zero sized target with "\0" source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700134TEST_F(DEATHTEST, stpcpy_fortified2) {
Christopher Ferris950a58e2014-04-04 14:38:18 -0700135#if defined(__BIONIC__)
Christopher Ferris950a58e2014-04-04 14:38:18 -0700136 foo myfoo;
137 char* src = strdup("");
Elliott Hughesd036e942015-02-02 11:18:58 -0800138 ASSERT_FORTIFY(stpcpy(myfoo.empty, src));
Christopher Ferris950a58e2014-04-04 14:38:18 -0700139 free(src);
140#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800141 GTEST_SKIP() << "stpcpy not available";
Christopher Ferris950a58e2014-04-04 14:38:18 -0700142#endif // __BIONIC__
143}
Christopher Ferris950a58e2014-04-04 14:38:18 -0700144
Christopher Ferris950a58e2014-04-04 14:38:18 -0700145// zero sized target with "\0" source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700146TEST_F(DEATHTEST, strcpy_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800147#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700148 foo myfoo;
149 char* src = strdup("");
Elliott Hughesd036e942015-02-02 11:18:58 -0800150 ASSERT_FORTIFY(strcpy(myfoo.empty, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700151 free(src);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800152#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800153 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800154#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700155}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700156
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700157// zero sized target with longer source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700158TEST_F(DEATHTEST, strcpy2_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800159#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700160 foo myfoo;
161 char* src = strdup("1");
Elliott Hughesd036e942015-02-02 11:18:58 -0800162 ASSERT_FORTIFY(strcpy(myfoo.empty, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700163 free(src);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800164#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800165 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800166#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700167}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700168
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700169// one byte target with longer source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700170TEST_F(DEATHTEST, strcpy3_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800171#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700172 foo myfoo;
173 char* src = strdup("12");
Elliott Hughesd036e942015-02-02 11:18:58 -0800174 ASSERT_FORTIFY(strcpy(myfoo.one, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700175 free(src);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800176#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800177 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800178#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700179}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700180
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700181TEST_F(DEATHTEST, strchr_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800182#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700183 foo myfoo;
184 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a));
185 myfoo.b[0] = '\0';
Elliott Hughesd036e942015-02-02 11:18:58 -0800186 ASSERT_FORTIFY(printf("%s", strchr(myfoo.a, 'a')));
George Burgess IVbd3d2082017-04-04 17:34:02 -0700187 ASSERT_FORTIFY(printf("%s", strchr(static_cast<const char*>(myfoo.a), 'a')));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800188#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800189 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800190#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700191}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700192
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700193TEST_F(DEATHTEST, strrchr_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800194#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700195 foo myfoo;
196 memcpy(myfoo.a, "0123456789", 10);
197 memcpy(myfoo.b, "01234", 6);
Elliott Hughesd036e942015-02-02 11:18:58 -0800198 ASSERT_FORTIFY(printf("%s", strrchr(myfoo.a, 'a')));
George Burgess IVbd3d2082017-04-04 17:34:02 -0700199 ASSERT_FORTIFY(printf("%s", strrchr(static_cast<const char*>(myfoo.a), 'a')));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800200#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800201 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800202#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700203}
George Burgess IVbd3d2082017-04-04 17:34:02 -0700204
205TEST_F(DEATHTEST, memchr_fortified2) {
206#if defined(__BIONIC__)
207 foo myfoo;
208 volatile int asize = sizeof(myfoo.a) + 1;
209 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a));
Stephen Hines62165a12020-08-18 01:38:14 -0700210 ASSERT_FORTIFY(printf("%s", static_cast<const char*>(memchr(myfoo.a, 'a', asize))));
211 ASSERT_FORTIFY(printf(
212 "%s", static_cast<const char*>(memchr(static_cast<const void*>(myfoo.a), 'a', asize))));
George Burgess IVbd3d2082017-04-04 17:34:02 -0700213#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800214 GTEST_SKIP() << "glibc is broken";
George Burgess IVbd3d2082017-04-04 17:34:02 -0700215#endif // __BIONIC__
216}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700217
Elliott Hughes55a8cc22017-11-08 21:22:44 -0800218TEST_F(DEATHTEST, memrchr_fortified2) {
219#if defined(__BIONIC__)
220 foo myfoo;
221 volatile int asize = sizeof(myfoo.a) + 1;
222 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a));
Stephen Hines62165a12020-08-18 01:38:14 -0700223 ASSERT_FORTIFY(printf("%s", static_cast<const char*>(memrchr(myfoo.a, 'a', asize))));
224 ASSERT_FORTIFY(printf(
225 "%s", static_cast<const char*>(memrchr(static_cast<const void*>(myfoo.a), 'a', asize))));
Elliott Hughes55a8cc22017-11-08 21:22:44 -0800226#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800227 GTEST_SKIP() << "glibc is broken";
Elliott Hughes55a8cc22017-11-08 21:22:44 -0800228#endif // __BIONIC__
229}
230
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700231TEST_F(DEATHTEST, strlcpy_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800232#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700233 foo myfoo;
234 strcpy(myfoo.a, "01");
235 size_t n = strlen(myfoo.a);
Elliott Hughesd036e942015-02-02 11:18:58 -0800236 ASSERT_FORTIFY(strlcpy(myfoo.one, myfoo.a, n));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800237#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800238 GTEST_SKIP() << "strlcpy not available";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800239#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700240}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700241
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700242TEST_F(DEATHTEST, strlcat_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800243#if defined(__BIONIC__)
Nick Kralevicha6cde392013-06-29 08:15:25 -0700244 foo myfoo;
245 strcpy(myfoo.a, "01");
246 myfoo.one[0] = '\0';
247 size_t n = strlen(myfoo.a);
Elliott Hughesd036e942015-02-02 11:18:58 -0800248 ASSERT_FORTIFY(strlcat(myfoo.one, myfoo.a, n));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800249#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800250 GTEST_SKIP() << "strlcat not available";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800251#endif // __BIONIC__
Nick Kralevicha6cde392013-06-29 08:15:25 -0700252}
Nick Kralevicha6cde392013-06-29 08:15:25 -0700253
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700254TEST_F(DEATHTEST, strncat_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700255 foo myfoo;
Elliott Hughes58666732025-01-28 13:15:01 -0800256 volatile size_t n = 10;
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700257 strncpy(myfoo.a, "012345678", n);
Elliott Hughesd036e942015-02-02 11:18:58 -0800258 ASSERT_FORTIFY(strncat(myfoo.a, "9", n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700259}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700260
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700261TEST_F(DEATHTEST, strncat2_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700262 foo myfoo;
263 myfoo.a[0] = '\0';
Elliott Hughes58666732025-01-28 13:15:01 -0800264 volatile size_t n = 10;
Elliott Hughesd036e942015-02-02 11:18:58 -0800265 ASSERT_FORTIFY(strncat(myfoo.a, "0123456789", n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700266}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700267
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700268TEST_F(DEATHTEST, strncat3_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700269 foo myfoo;
270 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a)); // unterminated string
271 myfoo.b[0] = '\0';
Elliott Hughes58666732025-01-28 13:15:01 -0800272 volatile size_t n = 10;
Elliott Hughesd036e942015-02-02 11:18:58 -0800273 ASSERT_FORTIFY(strncat(myfoo.b, myfoo.a, n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700274}
275
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700276TEST_F(DEATHTEST, strcat_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700277 char src[11];
278 strcpy(src, "0123456789");
279 foo myfoo;
280 myfoo.a[0] = '\0';
Elliott Hughesd036e942015-02-02 11:18:58 -0800281 ASSERT_FORTIFY(strcat(myfoo.a, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700282}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700283
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700284TEST_F(DEATHTEST, strcat2_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700285 foo myfoo;
286 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a)); // unterminated string
287 myfoo.b[0] = '\0';
Elliott Hughesd036e942015-02-02 11:18:58 -0800288 ASSERT_FORTIFY(strcat(myfoo.b, myfoo.a));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700289}
290
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700291TEST_F(DEATHTEST, snprintf_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700292 foo myfoo;
293 strcpy(myfoo.a, "012345678");
294 size_t n = strlen(myfoo.a) + 2;
Elliott Hughesd036e942015-02-02 11:18:58 -0800295 ASSERT_FORTIFY(snprintf(myfoo.b, n, "a%s", myfoo.a));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700296}
297
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700298TEST_F(DEATHTEST, bzero_fortified2) {
Nick Kralevicha6cde392013-06-29 08:15:25 -0700299 foo myfoo;
300 memcpy(myfoo.b, "0123456789", sizeof(myfoo.b));
Elliott Hughes58666732025-01-28 13:15:01 -0800301 volatile size_t n = 11;
Elliott Hughesd036e942015-02-02 11:18:58 -0800302 ASSERT_FORTIFY(bzero(myfoo.b, n));
Nick Kralevicha6cde392013-06-29 08:15:25 -0700303}
304
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700305#endif /* defined(_FORTIFY_SOURCE) && _FORTIFY_SOURCE=2 */
306
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700307// multibyte target where we over fill (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700308TEST_F(DEATHTEST, strcpy_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800309#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700310 char buf[10];
Elliott Hughes58666732025-01-28 13:15:01 -0800311 char* orig = strdup("0123456789");
Elliott Hughesd036e942015-02-02 11:18:58 -0800312 ASSERT_FORTIFY(strcpy(buf, orig));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700313 free(orig);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800314#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800315 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800316#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700317}
318
319// zero sized target with "\0" source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700320TEST_F(DEATHTEST, strcpy2_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800321#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700322 char buf[0];
Elliott Hughes58666732025-01-28 13:15:01 -0800323 char* orig = strdup("");
Elliott Hughesd036e942015-02-02 11:18:58 -0800324 ASSERT_FORTIFY(strcpy(buf, orig));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700325 free(orig);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800326#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800327 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800328#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700329}
330
331// zero sized target with longer source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700332TEST_F(DEATHTEST, strcpy3_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800333#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700334 char buf[0];
Elliott Hughes58666732025-01-28 13:15:01 -0800335 char* orig = strdup("1");
Elliott Hughesd036e942015-02-02 11:18:58 -0800336 ASSERT_FORTIFY(strcpy(buf, orig));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700337 free(orig);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800338#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800339 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800340#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700341}
342
343// one byte target with longer source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700344TEST_F(DEATHTEST, strcpy4_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800345#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700346 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800347 char* orig = strdup("12");
Elliott Hughesd036e942015-02-02 11:18:58 -0800348 ASSERT_FORTIFY(strcpy(buf, orig));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700349 free(orig);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800350#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800351 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800352#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700353}
354
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700355TEST_F(DEATHTEST, strlen_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800356#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700357 char buf[10];
358 memcpy(buf, "0123456789", sizeof(buf));
Elliott Hughesd036e942015-02-02 11:18:58 -0800359 ASSERT_FORTIFY(printf("%zd", strlen(buf)));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800360#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800361 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800362#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700363}
364
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700365TEST_F(DEATHTEST, strchr_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800366#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700367 char buf[10];
368 memcpy(buf, "0123456789", sizeof(buf));
Elliott Hughesd036e942015-02-02 11:18:58 -0800369 ASSERT_FORTIFY(printf("%s", strchr(buf, 'a')));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800370#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800371 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800372#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700373}
374
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700375TEST_F(DEATHTEST, strrchr_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800376#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700377 char buf[10];
378 memcpy(buf, "0123456789", sizeof(buf));
Elliott Hughesd036e942015-02-02 11:18:58 -0800379 ASSERT_FORTIFY(printf("%s", strrchr(buf, 'a')));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800380#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800381 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800382#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700383}
384
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700385TEST_F(DEATHTEST, strlcpy_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800386#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700387 char bufa[15];
388 char bufb[10];
389 strcpy(bufa, "01234567890123");
390 size_t n = strlen(bufa);
Elliott Hughesd036e942015-02-02 11:18:58 -0800391 ASSERT_FORTIFY(strlcpy(bufb, bufa, n));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800392#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800393 GTEST_SKIP() << "strlcpy not available";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800394#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700395}
396
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700397TEST_F(DEATHTEST, strlcat_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800398#if defined(__BIONIC__)
Nick Kralevicha6cde392013-06-29 08:15:25 -0700399 char bufa[15];
400 char bufb[10];
401 bufb[0] = '\0';
402 strcpy(bufa, "01234567890123");
403 size_t n = strlen(bufa);
Elliott Hughesd036e942015-02-02 11:18:58 -0800404 ASSERT_FORTIFY(strlcat(bufb, bufa, n));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800405#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800406 GTEST_SKIP() << "strlcat not available";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800407#endif // __BIONIC__
Nick Kralevicha6cde392013-06-29 08:15:25 -0700408}
409
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700410TEST_F(DEATHTEST, sprintf_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700411 char buf[10];
412 char source_buf[15];
413 memcpy(source_buf, "12345678901234", 15);
Elliott Hughesd036e942015-02-02 11:18:58 -0800414 ASSERT_FORTIFY(sprintf(buf, "%s", source_buf));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700415}
416
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700417TEST_F(DEATHTEST, sprintf_malloc_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -0800418 char* buf = static_cast<char*>(malloc(10));
Nick Kralevichb91791d2013-10-02 14:14:40 -0700419 char source_buf[11];
420 memcpy(source_buf, "1234567890", 11);
Elliott Hughesd036e942015-02-02 11:18:58 -0800421 ASSERT_FORTIFY(sprintf(buf, "%s", source_buf));
Nick Kralevichb91791d2013-10-02 14:14:40 -0700422 free(buf);
423}
Nick Kralevichb91791d2013-10-02 14:14:40 -0700424
Nick Kralevich884a3de2014-10-06 00:39:47 +0000425TEST_F(DEATHTEST, sprintf2_fortified) {
Peter Collingbournedd126162025-03-25 17:32:35 -0700426 // glibc's fortified implementation of sprintf is smart enough to be able to detect this bug at
427 // compile time, but we want to check if it can also be detected at runtime.
428#pragma clang diagnostic push
429#pragma clang diagnostic ignored "-Wformat-overflow"
Nick Kralevich884a3de2014-10-06 00:39:47 +0000430 char buf[5];
Elliott Hughesd036e942015-02-02 11:18:58 -0800431 ASSERT_FORTIFY(sprintf(buf, "aaaaa"));
Peter Collingbournedd126162025-03-25 17:32:35 -0700432#pragma clang diagnostic pop
Nick Kralevich884a3de2014-10-06 00:39:47 +0000433}
434
Elliott Hughes58666732025-01-28 13:15:01 -0800435static int vsprintf_helper(const char* fmt, ...) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700436 va_list va;
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700437 va_start(va, fmt);
Elliott Hughes58666732025-01-28 13:15:01 -0800438 char buf[10];
439 int result = vsprintf(buf, fmt, va); // should crash here
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700440 va_end(va);
441 return result;
442}
443
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700444TEST_F(DEATHTEST, vsprintf_fortified) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800445 ASSERT_FORTIFY(vsprintf_helper("%s", "0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700446}
447
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700448TEST_F(DEATHTEST, vsprintf2_fortified) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800449 ASSERT_FORTIFY(vsprintf_helper("0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700450}
451
Elliott Hughes58666732025-01-28 13:15:01 -0800452static int vsnprintf_helper(const char* fmt, ...) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700453 va_list va;
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700454 va_start(va, fmt);
Elliott Hughes58666732025-01-28 13:15:01 -0800455 char buf[10];
456 volatile size_t size = 11;
457 int result = vsnprintf(buf, size, fmt, va); // should crash here
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700458 va_end(va);
459 return result;
460}
461
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700462TEST_F(DEATHTEST, vsnprintf_fortified) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800463 ASSERT_FORTIFY(vsnprintf_helper("%s", "0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700464}
465
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700466TEST_F(DEATHTEST, vsnprintf2_fortified) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800467 ASSERT_FORTIFY(vsnprintf_helper("0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700468}
469
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700470TEST_F(DEATHTEST, strncat_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700471 char buf[10];
Elliott Hughes58666732025-01-28 13:15:01 -0800472 volatile size_t n = 10;
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700473 strncpy(buf, "012345678", n);
Elliott Hughesd036e942015-02-02 11:18:58 -0800474 ASSERT_FORTIFY(strncat(buf, "9", n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700475}
476
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700477TEST_F(DEATHTEST, strncat2_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700478 char buf[10];
479 buf[0] = '\0';
Elliott Hughes58666732025-01-28 13:15:01 -0800480 volatile size_t n = 10;
Elliott Hughesd036e942015-02-02 11:18:58 -0800481 ASSERT_FORTIFY(strncat(buf, "0123456789", n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700482}
483
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700484TEST_F(DEATHTEST, strcat_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700485 char src[11];
486 strcpy(src, "0123456789");
487 char buf[10];
488 buf[0] = '\0';
Elliott Hughesd036e942015-02-02 11:18:58 -0800489 ASSERT_FORTIFY(strcat(buf, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700490}
491
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700492TEST_F(DEATHTEST, memmove_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700493 char buf[20];
494 strcpy(buf, "0123456789");
Elliott Hughes58666732025-01-28 13:15:01 -0800495 volatile size_t n = 10;
Peter Collingbournedd126162025-03-25 17:32:35 -0700496 ASSERT_FORTIFY_OR_HWASAN(DoNotOptimize(memmove(buf + 11, buf, n)));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700497}
498
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700499TEST_F(DEATHTEST, memcpy_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700500 char bufa[10];
501 char bufb[10];
502 strcpy(bufa, "012345678");
Elliott Hughes58666732025-01-28 13:15:01 -0800503 volatile size_t n = 11;
Peter Collingbournedd126162025-03-25 17:32:35 -0700504 ASSERT_FORTIFY_OR_HWASAN(DoNotOptimize(memcpy(bufb, bufa, n)));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700505}
506
Elliott Hughes62e59642016-03-01 11:22:42 -0800507TEST_F(DEATHTEST, memset_fortified) {
508 char buf[10];
Elliott Hughes58666732025-01-28 13:15:01 -0800509 volatile size_t n = 11;
Peter Collingbournedd126162025-03-25 17:32:35 -0700510 ASSERT_FORTIFY_OR_HWASAN(DoNotOptimize(memset(buf, 0, n)));
Elliott Hughes62e59642016-03-01 11:22:42 -0800511}
512
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700513TEST_F(DEATHTEST, stpncpy_fortified) {
Christopher Ferris950a58e2014-04-04 14:38:18 -0700514 char bufa[15];
515 char bufb[10];
516 strcpy(bufa, "01234567890123");
517 size_t n = strlen(bufa);
Elliott Hughesd036e942015-02-02 11:18:58 -0800518 ASSERT_FORTIFY(stpncpy(bufb, bufa, n));
Christopher Ferris950a58e2014-04-04 14:38:18 -0700519}
520
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700521TEST_F(DEATHTEST, stpncpy2_fortified) {
Christopher Ferris950a58e2014-04-04 14:38:18 -0700522 char dest[11];
523 char src[10];
524 memcpy(src, "0123456789", sizeof(src)); // src is not null terminated
Elliott Hughesd036e942015-02-02 11:18:58 -0800525 ASSERT_FORTIFY(stpncpy(dest, src, sizeof(dest)));
Christopher Ferris950a58e2014-04-04 14:38:18 -0700526}
527
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700528TEST_F(DEATHTEST, strncpy_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700529 char bufa[15];
530 char bufb[10];
531 strcpy(bufa, "01234567890123");
532 size_t n = strlen(bufa);
Elliott Hughesd036e942015-02-02 11:18:58 -0800533 ASSERT_FORTIFY(strncpy(bufb, bufa, n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700534}
535
Christopher Ferris950a58e2014-04-04 14:38:18 -0700536
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700537TEST_F(DEATHTEST, strncpy2_fortified) {
Nick Kralevich93501d32013-08-28 10:47:43 -0700538 char dest[11];
539 char src[10];
540 memcpy(src, "0123456789", sizeof(src)); // src is not null terminated
Elliott Hughesd036e942015-02-02 11:18:58 -0800541 ASSERT_FORTIFY(strncpy(dest, src, sizeof(dest)));
Nick Kralevich93501d32013-08-28 10:47:43 -0700542}
543
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700544TEST_F(DEATHTEST, snprintf_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700545 char bufa[15];
546 char bufb[10];
547 strcpy(bufa, "0123456789");
548 size_t n = strlen(bufa) + 1;
Elliott Hughesd036e942015-02-02 11:18:58 -0800549 ASSERT_FORTIFY(snprintf(bufb, n, "%s", bufa));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700550}
551
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700552TEST_F(DEATHTEST, bzero_fortified) {
Nick Kralevicha6cde392013-06-29 08:15:25 -0700553 char buf[10];
554 memcpy(buf, "0123456789", sizeof(buf));
Elliott Hughes58666732025-01-28 13:15:01 -0800555 size_t n = 11;
Elliott Hughesd036e942015-02-02 11:18:58 -0800556 ASSERT_FORTIFY(bzero(buf, n));
Nick Kralevicha6cde392013-06-29 08:15:25 -0700557}
558
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700559TEST_F(DEATHTEST, umask_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -0800560 volatile mode_t mask = 01777;
Elliott Hughesd036e942015-02-02 11:18:58 -0800561 ASSERT_FORTIFY(umask(mask));
Nick Kralevicha6cde392013-06-29 08:15:25 -0700562}
563
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700564TEST_F(DEATHTEST, recv_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -0800565 volatile size_t data_len = 11;
Nick Kralevich60f4f9a2013-09-24 16:32:07 -0700566 char buf[10];
Elliott Hughesd036e942015-02-02 11:18:58 -0800567 ASSERT_FORTIFY(recv(0, buf, data_len, 0));
Nick Kralevich60f4f9a2013-09-24 16:32:07 -0700568}
569
Daniel Micay95b59c52017-02-13 17:27:59 -0800570TEST_F(DEATHTEST, send_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -0800571 volatile size_t data_len = 11;
Daniel Micay95b59c52017-02-13 17:27:59 -0800572 char buf[10] = {0};
573 ASSERT_FORTIFY(send(0, buf, data_len, 0));
574}
575
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700576TEST_F(DEATHTEST, FD_ISSET_fortified) {
Elliott Hughes063525c2014-05-13 11:19:57 -0700577#if defined(__BIONIC__) // glibc catches this at compile-time.
Christopher Ferris2a391882024-12-19 13:44:35 -0800578 fd_set set = {};
Elliott Hughesd036e942015-02-02 11:18:58 -0800579 ASSERT_FORTIFY(FD_ISSET(-1, &set));
Elliott Hughes409588c2014-04-23 23:02:43 -0700580#endif
Nick Kralevich90201d52013-10-02 16:11:30 -0700581}
582
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700583TEST_F(DEATHTEST, FD_ISSET_2_fortified) {
Nick Kralevich7943df62013-10-03 14:08:39 -0700584 char buf[1];
585 fd_set* set = (fd_set*) buf;
Elliott Hughesd036e942015-02-02 11:18:58 -0800586 ASSERT_FORTIFY(FD_ISSET(0, set));
Nick Kralevich7943df62013-10-03 14:08:39 -0700587}
588
Daniel Micay9101b002015-05-20 15:31:26 -0400589TEST_F(DEATHTEST, getcwd_fortified) {
590 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800591 volatile size_t n = 2;
592 ASSERT_FORTIFY(getcwd(buf, n));
Daniel Micay9101b002015-05-20 15:31:26 -0400593}
594
Daniel Micaye7e1c872015-04-16 09:07:45 -0400595TEST_F(DEATHTEST, pread_fortified) {
596 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800597 volatile size_t n = 2;
Daniel Micaye7e1c872015-04-16 09:07:45 -0400598 int fd = open("/dev/null", O_RDONLY);
Elliott Hughes58666732025-01-28 13:15:01 -0800599 ASSERT_FORTIFY(pread(fd, buf, n, 0));
Daniel Micaye7e1c872015-04-16 09:07:45 -0400600 close(fd);
601}
602
603TEST_F(DEATHTEST, pread64_fortified) {
604 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800605 volatile size_t n = 2;
Daniel Micaye7e1c872015-04-16 09:07:45 -0400606 int fd = open("/dev/null", O_RDONLY);
Elliott Hughes58666732025-01-28 13:15:01 -0800607 ASSERT_FORTIFY(pread64(fd, buf, n, 0));
Daniel Micaye7e1c872015-04-16 09:07:45 -0400608 close(fd);
609}
610
Daniel Micayafdd1542015-07-20 21:37:29 -0400611TEST_F(DEATHTEST, pwrite_fortified) {
612 char buf[1] = {0};
Elliott Hughes58666732025-01-28 13:15:01 -0800613 volatile size_t n = 2;
Daniel Micayafdd1542015-07-20 21:37:29 -0400614 int fd = open("/dev/null", O_WRONLY);
Elliott Hughes58666732025-01-28 13:15:01 -0800615 ASSERT_FORTIFY(pwrite(fd, buf, n, 0));
Daniel Micayafdd1542015-07-20 21:37:29 -0400616 close(fd);
617}
618
619TEST_F(DEATHTEST, pwrite64_fortified) {
620 char buf[1] = {0};
Elliott Hughes58666732025-01-28 13:15:01 -0800621 volatile size_t n = 2;
Daniel Micayafdd1542015-07-20 21:37:29 -0400622 int fd = open("/dev/null", O_WRONLY);
Elliott Hughes58666732025-01-28 13:15:01 -0800623 ASSERT_FORTIFY(pwrite64(fd, buf, n, 0));
Daniel Micayafdd1542015-07-20 21:37:29 -0400624 close(fd);
625}
626
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700627TEST_F(DEATHTEST, read_fortified) {
Nick Kralevichb036b5c2013-10-09 20:16:34 -0700628 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800629 volatile size_t n = 2;
Nick Kralevichb036b5c2013-10-09 20:16:34 -0700630 int fd = open("/dev/null", O_RDONLY);
Elliott Hughes58666732025-01-28 13:15:01 -0800631 ASSERT_FORTIFY(read(fd, buf, n));
Nick Kralevichb036b5c2013-10-09 20:16:34 -0700632 close(fd);
633}
634
Daniel Micayafdd1542015-07-20 21:37:29 -0400635TEST_F(DEATHTEST, write_fortified) {
636 char buf[1] = {0};
Elliott Hughes58666732025-01-28 13:15:01 -0800637 volatile size_t n = 2;
Daniel Micayafdd1542015-07-20 21:37:29 -0400638 int fd = open("/dev/null", O_WRONLY);
Elliott Hughes58666732025-01-28 13:15:01 -0800639 ASSERT_FORTIFY(write(fd, buf, n));
Daniel Micayafdd1542015-07-20 21:37:29 -0400640 close(fd);
641}
642
Daniel Micayfed26592015-07-18 13:55:51 -0400643TEST_F(DEATHTEST, fread_fortified) {
644 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800645 volatile size_t n = 2;
Daniel Micayfed26592015-07-18 13:55:51 -0400646 FILE* fp = fopen("/dev/null", "r");
Elliott Hughes58666732025-01-28 13:15:01 -0800647 ASSERT_FORTIFY(fread(buf, 1, n, fp));
Daniel Micayfed26592015-07-18 13:55:51 -0400648 fclose(fp);
649}
650
651TEST_F(DEATHTEST, fwrite_fortified) {
652 char buf[1] = {0};
Elliott Hughes58666732025-01-28 13:15:01 -0800653 volatile size_t n = 2;
Daniel Micayfed26592015-07-18 13:55:51 -0400654 FILE* fp = fopen("/dev/null", "w");
Elliott Hughes58666732025-01-28 13:15:01 -0800655 ASSERT_FORTIFY(fwrite(buf, 1, n, fp));
Daniel Micayfed26592015-07-18 13:55:51 -0400656 fclose(fp);
657}
658
Daniel Micay42281882015-04-17 11:26:36 -0400659TEST_F(DEATHTEST, readlink_fortified) {
660 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800661 volatile size_t n = 2;
662 ASSERT_FORTIFY(readlink("/dev/null", buf, n));
Daniel Micay42281882015-04-17 11:26:36 -0400663}
664
665TEST_F(DEATHTEST, readlinkat_fortified) {
666 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800667 volatile size_t n = 2;
668 ASSERT_FORTIFY(readlinkat(AT_FDCWD, "/dev/null", buf, n));
Daniel Micay42281882015-04-17 11:26:36 -0400669}
670
zijunzhaoe1833e52023-04-26 21:43:30 +0000671TEST(TEST_NAME, snprintf_nullptr_valid) {
672 ASSERT_EQ(10, snprintf(nullptr, 0, "0123456789"));
673}
674
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700675extern "C" char* __strncat_chk(char*, const char*, size_t, size_t);
676extern "C" char* __strcat_chk(char*, const char*, size_t);
677
678TEST(TEST_NAME, strncat) {
679 char buf[10];
680 memset(buf, 'A', sizeof(buf));
681 buf[0] = 'a';
682 buf[1] = '\0';
683 char* res = __strncat_chk(buf, "01234", sizeof(buf) - strlen(buf) - 1, sizeof(buf));
684 ASSERT_EQ(buf, res);
685 ASSERT_EQ('a', buf[0]);
686 ASSERT_EQ('0', buf[1]);
687 ASSERT_EQ('1', buf[2]);
688 ASSERT_EQ('2', buf[3]);
689 ASSERT_EQ('3', buf[4]);
690 ASSERT_EQ('4', buf[5]);
691 ASSERT_EQ('\0', buf[6]);
692 ASSERT_EQ('A', buf[7]);
693 ASSERT_EQ('A', buf[8]);
694 ASSERT_EQ('A', buf[9]);
695}
696
697TEST(TEST_NAME, strncat2) {
698 char buf[10];
699 memset(buf, 'A', sizeof(buf));
700 buf[0] = 'a';
701 buf[1] = '\0';
702 char* res = __strncat_chk(buf, "0123456789", 5, sizeof(buf));
703 ASSERT_EQ(buf, res);
704 ASSERT_EQ('a', buf[0]);
705 ASSERT_EQ('0', buf[1]);
706 ASSERT_EQ('1', buf[2]);
707 ASSERT_EQ('2', buf[3]);
708 ASSERT_EQ('3', buf[4]);
709 ASSERT_EQ('4', buf[5]);
710 ASSERT_EQ('\0', buf[6]);
711 ASSERT_EQ('A', buf[7]);
712 ASSERT_EQ('A', buf[8]);
713 ASSERT_EQ('A', buf[9]);
714}
715
716TEST(TEST_NAME, strncat3) {
717 char buf[10];
718 memset(buf, 'A', sizeof(buf));
719 buf[0] = '\0';
720 char* res = __strncat_chk(buf, "0123456789", 5, sizeof(buf));
721 ASSERT_EQ(buf, res);
722 ASSERT_EQ('0', buf[0]);
723 ASSERT_EQ('1', buf[1]);
724 ASSERT_EQ('2', buf[2]);
725 ASSERT_EQ('3', buf[3]);
726 ASSERT_EQ('4', buf[4]);
727 ASSERT_EQ('\0', buf[5]);
728 ASSERT_EQ('A', buf[6]);
729 ASSERT_EQ('A', buf[7]);
730 ASSERT_EQ('A', buf[8]);
731 ASSERT_EQ('A', buf[9]);
732}
733
734TEST(TEST_NAME, strncat4) {
735 char buf[10];
736 memset(buf, 'A', sizeof(buf));
737 buf[9] = '\0';
738 char* res = __strncat_chk(buf, "", 5, sizeof(buf));
739 ASSERT_EQ(buf, res);
740 ASSERT_EQ('A', buf[0]);
741 ASSERT_EQ('A', buf[1]);
742 ASSERT_EQ('A', buf[2]);
743 ASSERT_EQ('A', buf[3]);
744 ASSERT_EQ('A', buf[4]);
745 ASSERT_EQ('A', buf[5]);
746 ASSERT_EQ('A', buf[6]);
747 ASSERT_EQ('A', buf[7]);
748 ASSERT_EQ('A', buf[8]);
749 ASSERT_EQ('\0', buf[9]);
750}
751
752TEST(TEST_NAME, strncat5) {
753 char buf[10];
754 memset(buf, 'A', sizeof(buf));
755 buf[0] = 'a';
756 buf[1] = '\0';
757 char* res = __strncat_chk(buf, "01234567", 8, sizeof(buf));
758 ASSERT_EQ(buf, res);
759 ASSERT_EQ('a', buf[0]);
760 ASSERT_EQ('0', buf[1]);
761 ASSERT_EQ('1', buf[2]);
762 ASSERT_EQ('2', buf[3]);
763 ASSERT_EQ('3', buf[4]);
764 ASSERT_EQ('4', buf[5]);
765 ASSERT_EQ('5', buf[6]);
766 ASSERT_EQ('6', buf[7]);
767 ASSERT_EQ('7', buf[8]);
768 ASSERT_EQ('\0', buf[9]);
769}
770
771TEST(TEST_NAME, strncat6) {
772 char buf[10];
773 memset(buf, 'A', sizeof(buf));
774 buf[0] = 'a';
775 buf[1] = '\0';
776 char* res = __strncat_chk(buf, "01234567", 9, sizeof(buf));
777 ASSERT_EQ(buf, res);
778 ASSERT_EQ('a', buf[0]);
779 ASSERT_EQ('0', buf[1]);
780 ASSERT_EQ('1', buf[2]);
781 ASSERT_EQ('2', buf[3]);
782 ASSERT_EQ('3', buf[4]);
783 ASSERT_EQ('4', buf[5]);
784 ASSERT_EQ('5', buf[6]);
785 ASSERT_EQ('6', buf[7]);
786 ASSERT_EQ('7', buf[8]);
787 ASSERT_EQ('\0', buf[9]);
788}
789
790
791TEST(TEST_NAME, strcat) {
792 char buf[10];
793 memset(buf, 'A', sizeof(buf));
794 buf[0] = 'a';
795 buf[1] = '\0';
796 char* res = __strcat_chk(buf, "01234", sizeof(buf));
797 ASSERT_EQ(buf, res);
798 ASSERT_EQ('a', buf[0]);
799 ASSERT_EQ('0', buf[1]);
800 ASSERT_EQ('1', buf[2]);
801 ASSERT_EQ('2', buf[3]);
802 ASSERT_EQ('3', buf[4]);
803 ASSERT_EQ('4', buf[5]);
804 ASSERT_EQ('\0', buf[6]);
805 ASSERT_EQ('A', buf[7]);
806 ASSERT_EQ('A', buf[8]);
807 ASSERT_EQ('A', buf[9]);
808}
809
810TEST(TEST_NAME, strcat2) {
811 char buf[10];
812 memset(buf, 'A', sizeof(buf));
813 buf[0] = 'a';
814 buf[1] = '\0';
815 char* res = __strcat_chk(buf, "01234567", sizeof(buf));
816 ASSERT_EQ(buf, res);
817 ASSERT_EQ('a', buf[0]);
818 ASSERT_EQ('0', buf[1]);
819 ASSERT_EQ('1', buf[2]);
820 ASSERT_EQ('2', buf[3]);
821 ASSERT_EQ('3', buf[4]);
822 ASSERT_EQ('4', buf[5]);
823 ASSERT_EQ('5', buf[6]);
824 ASSERT_EQ('6', buf[7]);
825 ASSERT_EQ('7', buf[8]);
826 ASSERT_EQ('\0', buf[9]);
827}
Nick Kralevich93501d32013-08-28 10:47:43 -0700828
Christopher Ferris950a58e2014-04-04 14:38:18 -0700829TEST(TEST_NAME, stpncpy) {
830 char src[10];
831 char dst[10];
832 memcpy(src, "0123456789", sizeof(src)); // non null terminated string
833 stpncpy(dst, src, sizeof(dst));
834 ASSERT_EQ('0', dst[0]);
835 ASSERT_EQ('1', dst[1]);
836 ASSERT_EQ('2', dst[2]);
837 ASSERT_EQ('3', dst[3]);
838 ASSERT_EQ('4', dst[4]);
839 ASSERT_EQ('5', dst[5]);
840 ASSERT_EQ('6', dst[6]);
841 ASSERT_EQ('7', dst[7]);
842 ASSERT_EQ('8', dst[8]);
843 ASSERT_EQ('9', dst[9]);
844}
845
846TEST(TEST_NAME, stpncpy2) {
847 char src[10];
848 char dst[15];
849 memcpy(src, "012345678\0", sizeof(src));
850 stpncpy(dst, src, sizeof(dst));
851 ASSERT_EQ('0', dst[0]);
852 ASSERT_EQ('1', dst[1]);
853 ASSERT_EQ('2', dst[2]);
854 ASSERT_EQ('3', dst[3]);
855 ASSERT_EQ('4', dst[4]);
856 ASSERT_EQ('5', dst[5]);
857 ASSERT_EQ('6', dst[6]);
858 ASSERT_EQ('7', dst[7]);
859 ASSERT_EQ('8', dst[8]);
860 ASSERT_EQ('\0', dst[9]);
861 ASSERT_EQ('\0', dst[10]);
862 ASSERT_EQ('\0', dst[11]);
863 ASSERT_EQ('\0', dst[12]);
864 ASSERT_EQ('\0', dst[13]);
865 ASSERT_EQ('\0', dst[14]);
866}
867
Nick Kralevich93501d32013-08-28 10:47:43 -0700868TEST(TEST_NAME, strncpy) {
869 char src[10];
870 char dst[10];
871 memcpy(src, "0123456789", sizeof(src)); // non null terminated string
872 strncpy(dst, src, sizeof(dst));
873 ASSERT_EQ('0', dst[0]);
874 ASSERT_EQ('1', dst[1]);
875 ASSERT_EQ('2', dst[2]);
876 ASSERT_EQ('3', dst[3]);
877 ASSERT_EQ('4', dst[4]);
878 ASSERT_EQ('5', dst[5]);
879 ASSERT_EQ('6', dst[6]);
880 ASSERT_EQ('7', dst[7]);
881 ASSERT_EQ('8', dst[8]);
882 ASSERT_EQ('9', dst[9]);
883}
884
885TEST(TEST_NAME, strncpy2) {
886 char src[10];
887 char dst[15];
888 memcpy(src, "012345678\0", sizeof(src));
889 strncpy(dst, src, sizeof(dst));
890 ASSERT_EQ('0', dst[0]);
891 ASSERT_EQ('1', dst[1]);
892 ASSERT_EQ('2', dst[2]);
893 ASSERT_EQ('3', dst[3]);
894 ASSERT_EQ('4', dst[4]);
895 ASSERT_EQ('5', dst[5]);
896 ASSERT_EQ('6', dst[6]);
897 ASSERT_EQ('7', dst[7]);
898 ASSERT_EQ('8', dst[8]);
899 ASSERT_EQ('\0', dst[9]);
900 ASSERT_EQ('\0', dst[10]);
901 ASSERT_EQ('\0', dst[11]);
902 ASSERT_EQ('\0', dst[12]);
903 ASSERT_EQ('\0', dst[13]);
904 ASSERT_EQ('\0', dst[14]);
905}
Christopher Ferris16e185c2013-09-10 16:56:34 -0700906
907TEST(TEST_NAME, strcat_chk_max_int_size) {
908 char buf[10];
909 memset(buf, 'A', sizeof(buf));
910 buf[0] = 'a';
911 buf[1] = '\0';
Elliott Hughes58666732025-01-28 13:15:01 -0800912 volatile size_t n = -1;
913 char* res = __strcat_chk(buf, "01234567", n);
Christopher Ferris16e185c2013-09-10 16:56:34 -0700914 ASSERT_EQ(buf, res);
915 ASSERT_EQ('a', buf[0]);
916 ASSERT_EQ('0', buf[1]);
917 ASSERT_EQ('1', buf[2]);
918 ASSERT_EQ('2', buf[3]);
919 ASSERT_EQ('3', buf[4]);
920 ASSERT_EQ('4', buf[5]);
921 ASSERT_EQ('5', buf[6]);
922 ASSERT_EQ('6', buf[7]);
923 ASSERT_EQ('7', buf[8]);
924 ASSERT_EQ('\0', buf[9]);
925}
926
George Burgess IV849c0b92019-06-10 16:22:09 -0700927TEST(TEST_NAME, mempcpy_chk) {
928 const char input_str[] = "abcdefg";
929 size_t input_str_size = strlen(input_str) + 1;
930
931 char buf1[10] = {};
932 char buf2[10] = {};
933
934 __builtin_mempcpy(buf1, input_str, input_str_size);
935 __builtin___mempcpy_chk(buf2, input_str, input_str_size, __bos0(buf2));
936
937 ASSERT_EQ(memcmp(buf1, buf2, sizeof(buf2)), 0);
938
939 void *builtin_ptr = __builtin_mempcpy(buf1, input_str, input_str_size);
940 void *fortify_ptr = __builtin___mempcpy_chk(buf1, input_str, input_str_size, __bos0(buf2));
941
942 ASSERT_EQ(builtin_ptr, fortify_ptr);
943}
944
Christopher Ferris950a58e2014-04-04 14:38:18 -0700945extern "C" char* __stpcpy_chk(char*, const char*, size_t);
946
947TEST(TEST_NAME, stpcpy_chk_max_int_size) {
948 char buf[10];
Elliott Hughes58666732025-01-28 13:15:01 -0800949 volatile size_t n = -1;
950 char* res = __stpcpy_chk(buf, "012345678", n);
Christopher Ferris950a58e2014-04-04 14:38:18 -0700951 ASSERT_EQ(buf + strlen("012345678"), res);
952 ASSERT_STREQ("012345678", buf);
953}
954
Christopher Ferris16e185c2013-09-10 16:56:34 -0700955extern "C" char* __strcpy_chk(char*, const char*, size_t);
956
957TEST(TEST_NAME, strcpy_chk_max_int_size) {
958 char buf[10];
Elliott Hughes58666732025-01-28 13:15:01 -0800959 volatile size_t n = -1;
960 char* res = __strcpy_chk(buf, "012345678", n);
Christopher Ferris16e185c2013-09-10 16:56:34 -0700961 ASSERT_EQ(buf, res);
Christopher Ferris950a58e2014-04-04 14:38:18 -0700962 ASSERT_STREQ("012345678", buf);
Christopher Ferris16e185c2013-09-10 16:56:34 -0700963}
964
965extern "C" void* __memcpy_chk(void*, const void*, size_t, size_t);
966
Daniel Verkampdf4e06c2025-01-24 14:08:16 -0800967TEST(TEST_NAME, memcpy_chk_smaller) {
968 char buf[10] = "XXXXXXXXX";
Elliott Hughes58666732025-01-28 13:15:01 -0800969 volatile size_t n = 5;
Daniel Verkampdf4e06c2025-01-24 14:08:16 -0800970 void* res = __memcpy_chk(buf, "012346578", n, sizeof(buf));
971 ASSERT_EQ((void*)buf, res);
972 ASSERT_EQ('0', buf[0]);
973 ASSERT_EQ('1', buf[1]);
974 ASSERT_EQ('2', buf[2]);
975 ASSERT_EQ('3', buf[3]);
976 ASSERT_EQ('4', buf[4]);
977 ASSERT_EQ('X', buf[5]);
978 ASSERT_EQ('X', buf[6]);
979 ASSERT_EQ('X', buf[7]);
980 ASSERT_EQ('X', buf[8]);
981 ASSERT_EQ('\0', buf[9]);
982}
983
984TEST(TEST_NAME, memcpy_chk_exact_size) {
985 char buf[10] = "XXXXXXXXX";
Elliott Hughes58666732025-01-28 13:15:01 -0800986 volatile size_t n = 10;
Daniel Verkampdf4e06c2025-01-24 14:08:16 -0800987 void* res = __memcpy_chk(buf, "012345678", n, sizeof(buf));
988 ASSERT_EQ((void*)buf, res);
989 ASSERT_EQ('0', buf[0]);
990 ASSERT_EQ('1', buf[1]);
991 ASSERT_EQ('2', buf[2]);
992 ASSERT_EQ('3', buf[3]);
993 ASSERT_EQ('4', buf[4]);
994 ASSERT_EQ('5', buf[5]);
995 ASSERT_EQ('6', buf[6]);
996 ASSERT_EQ('7', buf[7]);
997 ASSERT_EQ('8', buf[8]);
998 ASSERT_EQ('\0', buf[9]);
999}
1000
Christopher Ferris16e185c2013-09-10 16:56:34 -07001001TEST(TEST_NAME, memcpy_chk_max_int_size) {
1002 char buf[10];
Elliott Hughes58666732025-01-28 13:15:01 -08001003 volatile size_t n = -1;
1004 void* res = __memcpy_chk(buf, "012345678", sizeof(buf), n);
Christopher Ferris16e185c2013-09-10 16:56:34 -07001005 ASSERT_EQ((void*)buf, res);
1006 ASSERT_EQ('0', buf[0]);
1007 ASSERT_EQ('1', buf[1]);
1008 ASSERT_EQ('2', buf[2]);
1009 ASSERT_EQ('3', buf[3]);
1010 ASSERT_EQ('4', buf[4]);
1011 ASSERT_EQ('5', buf[5]);
1012 ASSERT_EQ('6', buf[6]);
1013 ASSERT_EQ('7', buf[7]);
1014 ASSERT_EQ('8', buf[8]);
1015 ASSERT_EQ('\0', buf[9]);
1016}
Stephen Hines6e380722013-10-11 00:45:24 -07001017
1018// Verify that macro expansion is done properly for sprintf/snprintf (which
1019// are defined as macros in stdio.h under clang).
1020#define CONTENTS "macro expansion"
1021#define BUF_AND_SIZE(A) A, sizeof(A)
1022#define BUF_AND_CONTENTS(A) A, CONTENTS
1023#define BUF_AND_SIZE_AND_CONTENTS(A) A, sizeof(A), CONTENTS
1024TEST(TEST_NAME, s_n_printf_macro_expansion) {
1025 char buf[BUFSIZ];
1026 snprintf(BUF_AND_SIZE(buf), CONTENTS);
1027 EXPECT_STREQ(CONTENTS, buf);
1028
1029 snprintf(BUF_AND_SIZE_AND_CONTENTS(buf));
1030 EXPECT_STREQ(CONTENTS, buf);
1031
1032 sprintf(BUF_AND_CONTENTS(buf));
1033 EXPECT_STREQ(CONTENTS, buf);
1034}
Elliott Hughes4674e382015-02-02 09:15:19 -08001035
1036TEST_F(DEATHTEST, poll_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -08001037 volatile nfds_t fd_count = 2;
Elliott Hughes4674e382015-02-02 09:15:19 -08001038 pollfd buf[1] = {{0, POLLIN, 0}};
Yabin Cuif4fe6932015-02-03 17:52:32 -08001039 // Set timeout to zero to prevent waiting in poll when fortify test fails.
1040 ASSERT_FORTIFY(poll(buf, fd_count, 0));
Elliott Hughes4674e382015-02-02 09:15:19 -08001041}
1042
1043TEST_F(DEATHTEST, ppoll_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -08001044 volatile nfds_t fd_count = 2;
Elliott Hughes4674e382015-02-02 09:15:19 -08001045 pollfd buf[1] = {{0, POLLIN, 0}};
Elliott Hughes58666732025-01-28 13:15:01 -08001046 // Set timeout to zero to prevent waiting in ppoll if fortify test fails.
1047 timespec timeout = {};
Elliott Hughesb83bf142018-03-22 11:01:25 -07001048 ASSERT_FORTIFY(ppoll(buf, fd_count, &timeout, nullptr));
1049}
1050
1051TEST_F(DEATHTEST, ppoll64_fortified) {
Elliott Hughese7943f82023-09-28 08:20:20 -07001052#if defined(__BIONIC__) // glibc doesn't have ppoll64.
Elliott Hughes58666732025-01-28 13:15:01 -08001053 volatile nfds_t fd_count = 2;
Elliott Hughesb83bf142018-03-22 11:01:25 -07001054 pollfd buf[1] = {{0, POLLIN, 0}};
Elliott Hughes58666732025-01-28 13:15:01 -08001055 // Set timeout to zero to prevent waiting in ppoll if fortify test fails.
1056 timespec timeout= {};
Elliott Hughesb83bf142018-03-22 11:01:25 -07001057 ASSERT_FORTIFY(ppoll64(buf, fd_count, &timeout, nullptr));
1058#endif
Elliott Hughes4674e382015-02-02 09:15:19 -08001059}
Elliott Hughesb115aef2017-08-04 09:34:19 -07001060
1061TEST_F(DEATHTEST, open_O_CREAT_without_mode_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -08001062 volatile int flags = O_CREAT;
Elliott Hughesb115aef2017-08-04 09:34:19 -07001063 ASSERT_FORTIFY(open("", flags));
1064}
1065
1066TEST_F(DEATHTEST, open_O_TMPFILE_without_mode_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -08001067 volatile int flags = O_TMPFILE;
Elliott Hughesb115aef2017-08-04 09:34:19 -07001068 ASSERT_FORTIFY(open("", flags));
Elliott Hughesb115aef2017-08-04 09:34:19 -07001069}