blob: 3ca0223b2106b1bdb51a1fb7ff93bd16dc2adbb8 [file] [log] [blame]
Nick Kralevich5bcf3982013-06-28 10:34:09 -07001/*
2 * Copyright (C) 2013 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
Yabin Cui9df70402014-11-05 18:01:01 -080018#include "BionicDeathTest.h"
Nick Kralevich5bcf3982013-06-28 10:34:09 -070019
Yabin Cui9df70402014-11-05 18:01:01 -080020#include <fcntl.h>
21#include <malloc.h>
Elliott Hughes4674e382015-02-02 09:15:19 -080022#include <poll.h>
Yabin Cui9df70402014-11-05 18:01:01 -080023#include <signal.h>
24#include <stdarg.h>
25#include <string.h>
26#include <sys/socket.h>
27#include <sys/stat.h>
28#include <sys/types.h>
Yabin Cuif4fe6932015-02-03 17:52:32 -080029#include <time.h>
Yabin Cui9df70402014-11-05 18:01:01 -080030
Elliott Hughesd036e942015-02-02 11:18:58 -080031#if __BIONIC__
32#define ASSERT_FORTIFY(expr) ASSERT_EXIT(expr, testing::KilledBySignal(SIGABRT), "FORTIFY")
33#else
34#define ASSERT_FORTIFY(expr) ASSERT_EXIT(expr, testing::KilledBySignal(SIGABRT), "")
35#endif
36
Yabin Cui9df70402014-11-05 18:01:01 -080037// Fortify test code needs to run multiple times, so TEST_NAME macro is used to
38// distinguish different tests. TEST_NAME is defined in compilation command.
Nick Kralevich5bcf3982013-06-28 10:34:09 -070039#define DEATHTEST_PASTER(name) name##_DeathTest
40#define DEATHTEST_EVALUATOR(name) DEATHTEST_PASTER(name)
41#define DEATHTEST DEATHTEST_EVALUATOR(TEST_NAME)
42
Yabin Cui9df70402014-11-05 18:01:01 -080043class DEATHTEST : public BionicDeathTest {};
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070044
Nick Kralevich5bcf3982013-06-28 10:34:09 -070045#if defined(_FORTIFY_SOURCE) && _FORTIFY_SOURCE == 2
46struct foo {
47 char empty[0];
48 char one[1];
49 char a[10];
50 char b[10];
51};
52
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070053TEST_F(DEATHTEST, stpncpy_fortified2) {
Christopher Ferris950a58e2014-04-04 14:38:18 -070054 foo myfoo;
55 int copy_amt = atoi("11");
Elliott Hughesd036e942015-02-02 11:18:58 -080056 ASSERT_FORTIFY(stpncpy(myfoo.a, "01234567890", copy_amt));
Christopher Ferris950a58e2014-04-04 14:38:18 -070057}
Christopher Ferris950a58e2014-04-04 14:38:18 -070058
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070059TEST_F(DEATHTEST, stpncpy2_fortified2) {
Christopher Ferris950a58e2014-04-04 14:38:18 -070060 foo myfoo;
61 memset(&myfoo, 0, sizeof(myfoo));
62 myfoo.one[0] = 'A'; // not null terminated string
Elliott Hughesd036e942015-02-02 11:18:58 -080063 ASSERT_FORTIFY(stpncpy(myfoo.b, myfoo.one, sizeof(myfoo.b)));
Christopher Ferris950a58e2014-04-04 14:38:18 -070064}
Christopher Ferris950a58e2014-04-04 14:38:18 -070065
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070066TEST_F(DEATHTEST, strncpy_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -070067 foo myfoo;
68 int copy_amt = atoi("11");
Elliott Hughesd036e942015-02-02 11:18:58 -080069 ASSERT_FORTIFY(strncpy(myfoo.a, "01234567890", copy_amt));
Nick Kralevich5bcf3982013-06-28 10:34:09 -070070}
Nick Kralevich5bcf3982013-06-28 10:34:09 -070071
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070072TEST_F(DEATHTEST, strncpy2_fortified2) {
Nick Kralevich93501d32013-08-28 10:47:43 -070073 foo myfoo;
74 memset(&myfoo, 0, sizeof(myfoo));
75 myfoo.one[0] = 'A'; // not null terminated string
Elliott Hughesd036e942015-02-02 11:18:58 -080076 ASSERT_FORTIFY(strncpy(myfoo.b, myfoo.one, sizeof(myfoo.b)));
Nick Kralevich93501d32013-08-28 10:47:43 -070077}
Nick Kralevich93501d32013-08-28 10:47:43 -070078
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070079TEST_F(DEATHTEST, sprintf_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -070080 foo myfoo;
81 char source_buf[15];
82 memcpy(source_buf, "12345678901234", 15);
Elliott Hughesd036e942015-02-02 11:18:58 -080083 ASSERT_FORTIFY(sprintf(myfoo.a, "%s", source_buf));
Nick Kralevich5bcf3982013-06-28 10:34:09 -070084}
Nick Kralevich5bcf3982013-06-28 10:34:09 -070085
Nick Kralevich884a3de2014-10-06 00:39:47 +000086TEST_F(DEATHTEST, sprintf2_fortified2) {
Nick Kralevich884a3de2014-10-06 00:39:47 +000087 foo myfoo;
Elliott Hughesd036e942015-02-02 11:18:58 -080088 ASSERT_FORTIFY(sprintf(myfoo.a, "0123456789"));
Nick Kralevich884a3de2014-10-06 00:39:47 +000089}
Nick Kralevich884a3de2014-10-06 00:39:47 +000090
Nick Kralevich5bcf3982013-06-28 10:34:09 -070091static int vsprintf_helper2(const char *fmt, ...) {
92 foo myfoo;
93 va_list va;
94 int result;
95
96 va_start(va, fmt);
97 result = vsprintf(myfoo.a, fmt, va); // should crash here
98 va_end(va);
99 return result;
100}
101
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700102TEST_F(DEATHTEST, vsprintf_fortified2) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800103 ASSERT_FORTIFY(vsprintf_helper2("%s", "0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700104}
105
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700106TEST_F(DEATHTEST, vsprintf2_fortified2) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800107 ASSERT_FORTIFY(vsprintf_helper2("0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700108}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700109
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700110static int vsnprintf_helper2(const char *fmt, ...) {
111 foo myfoo;
112 va_list va;
113 int result;
114 size_t size = atoi("11");
115
116 va_start(va, fmt);
117 result = vsnprintf(myfoo.a, size, fmt, va); // should crash here
118 va_end(va);
119 return result;
120}
121
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700122TEST_F(DEATHTEST, vsnprintf_fortified2) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800123 ASSERT_FORTIFY(vsnprintf_helper2("%s", "0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700124}
125
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700126TEST_F(DEATHTEST, vsnprintf2_fortified2) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800127 ASSERT_FORTIFY(vsnprintf_helper2("0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700128}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700129
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700130// zero sized target with "\0" source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700131TEST_F(DEATHTEST, stpcpy_fortified2) {
Christopher Ferris950a58e2014-04-04 14:38:18 -0700132#if defined(__BIONIC__)
Christopher Ferris950a58e2014-04-04 14:38:18 -0700133 foo myfoo;
134 char* src = strdup("");
Elliott Hughesd036e942015-02-02 11:18:58 -0800135 ASSERT_FORTIFY(stpcpy(myfoo.empty, src));
Christopher Ferris950a58e2014-04-04 14:38:18 -0700136 free(src);
137#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800138 GTEST_SKIP() << "stpcpy not available";
Christopher Ferris950a58e2014-04-04 14:38:18 -0700139#endif // __BIONIC__
140}
Christopher Ferris950a58e2014-04-04 14:38:18 -0700141
Christopher Ferris950a58e2014-04-04 14:38:18 -0700142// zero sized target with "\0" source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700143TEST_F(DEATHTEST, strcpy_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800144#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700145 foo myfoo;
146 char* src = strdup("");
Elliott Hughesd036e942015-02-02 11:18:58 -0800147 ASSERT_FORTIFY(strcpy(myfoo.empty, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700148 free(src);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800149#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800150 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800151#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700152}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700153
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700154// zero sized target with longer source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700155TEST_F(DEATHTEST, strcpy2_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800156#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700157 foo myfoo;
158 char* src = strdup("1");
Elliott Hughesd036e942015-02-02 11:18:58 -0800159 ASSERT_FORTIFY(strcpy(myfoo.empty, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700160 free(src);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800161#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800162 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800163#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700164}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700165
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700166// one byte target with longer source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700167TEST_F(DEATHTEST, strcpy3_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800168#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700169 foo myfoo;
170 char* src = strdup("12");
Elliott Hughesd036e942015-02-02 11:18:58 -0800171 ASSERT_FORTIFY(strcpy(myfoo.one, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700172 free(src);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800173#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800174 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800175#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700176}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700177
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700178TEST_F(DEATHTEST, strchr_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800179#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700180 foo myfoo;
181 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a));
182 myfoo.b[0] = '\0';
Elliott Hughesd036e942015-02-02 11:18:58 -0800183 ASSERT_FORTIFY(printf("%s", strchr(myfoo.a, 'a')));
George Burgess IVbd3d2082017-04-04 17:34:02 -0700184 ASSERT_FORTIFY(printf("%s", strchr(static_cast<const char*>(myfoo.a), 'a')));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800185#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800186 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800187#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700188}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700189
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700190TEST_F(DEATHTEST, strrchr_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800191#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700192 foo myfoo;
193 memcpy(myfoo.a, "0123456789", 10);
194 memcpy(myfoo.b, "01234", 6);
Elliott Hughesd036e942015-02-02 11:18:58 -0800195 ASSERT_FORTIFY(printf("%s", strrchr(myfoo.a, 'a')));
George Burgess IVbd3d2082017-04-04 17:34:02 -0700196 ASSERT_FORTIFY(printf("%s", strrchr(static_cast<const char*>(myfoo.a), 'a')));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800197#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800198 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800199#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700200}
George Burgess IVbd3d2082017-04-04 17:34:02 -0700201
202TEST_F(DEATHTEST, memchr_fortified2) {
203#if defined(__BIONIC__)
204 foo myfoo;
205 volatile int asize = sizeof(myfoo.a) + 1;
206 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a));
Stephen Hines62165a12020-08-18 01:38:14 -0700207 ASSERT_FORTIFY(printf("%s", static_cast<const char*>(memchr(myfoo.a, 'a', asize))));
208 ASSERT_FORTIFY(printf(
209 "%s", static_cast<const char*>(memchr(static_cast<const void*>(myfoo.a), 'a', asize))));
George Burgess IVbd3d2082017-04-04 17:34:02 -0700210#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800211 GTEST_SKIP() << "glibc is broken";
George Burgess IVbd3d2082017-04-04 17:34:02 -0700212#endif // __BIONIC__
213}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700214
Elliott Hughes55a8cc22017-11-08 21:22:44 -0800215TEST_F(DEATHTEST, memrchr_fortified2) {
216#if defined(__BIONIC__)
217 foo myfoo;
218 volatile int asize = sizeof(myfoo.a) + 1;
219 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a));
Stephen Hines62165a12020-08-18 01:38:14 -0700220 ASSERT_FORTIFY(printf("%s", static_cast<const char*>(memrchr(myfoo.a, 'a', asize))));
221 ASSERT_FORTIFY(printf(
222 "%s", static_cast<const char*>(memrchr(static_cast<const void*>(myfoo.a), 'a', asize))));
Elliott Hughes55a8cc22017-11-08 21:22:44 -0800223#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800224 GTEST_SKIP() << "glibc is broken";
Elliott Hughes55a8cc22017-11-08 21:22:44 -0800225#endif // __BIONIC__
226}
227
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700228TEST_F(DEATHTEST, strlcpy_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800229#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700230 foo myfoo;
231 strcpy(myfoo.a, "01");
232 size_t n = strlen(myfoo.a);
Elliott Hughesd036e942015-02-02 11:18:58 -0800233 ASSERT_FORTIFY(strlcpy(myfoo.one, myfoo.a, n));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800234#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800235 GTEST_SKIP() << "strlcpy not available";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800236#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700237}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700238
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700239TEST_F(DEATHTEST, strlcat_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800240#if defined(__BIONIC__)
Nick Kralevicha6cde392013-06-29 08:15:25 -0700241 foo myfoo;
242 strcpy(myfoo.a, "01");
243 myfoo.one[0] = '\0';
244 size_t n = strlen(myfoo.a);
Elliott Hughesd036e942015-02-02 11:18:58 -0800245 ASSERT_FORTIFY(strlcat(myfoo.one, myfoo.a, n));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800246#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800247 GTEST_SKIP() << "strlcat not available";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800248#endif // __BIONIC__
Nick Kralevicha6cde392013-06-29 08:15:25 -0700249}
Nick Kralevicha6cde392013-06-29 08:15:25 -0700250
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700251TEST_F(DEATHTEST, strncat_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700252 foo myfoo;
253 size_t n = atoi("10"); // avoid compiler optimizations
254 strncpy(myfoo.a, "012345678", n);
Elliott Hughesd036e942015-02-02 11:18:58 -0800255 ASSERT_FORTIFY(strncat(myfoo.a, "9", n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700256}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700257
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700258TEST_F(DEATHTEST, strncat2_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700259 foo myfoo;
260 myfoo.a[0] = '\0';
261 size_t n = atoi("10"); // avoid compiler optimizations
Elliott Hughesd036e942015-02-02 11:18:58 -0800262 ASSERT_FORTIFY(strncat(myfoo.a, "0123456789", n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700263}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700264
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700265TEST_F(DEATHTEST, strncat3_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700266 foo myfoo;
267 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a)); // unterminated string
268 myfoo.b[0] = '\0';
269 size_t n = atoi("10"); // avoid compiler optimizations
Elliott Hughesd036e942015-02-02 11:18:58 -0800270 ASSERT_FORTIFY(strncat(myfoo.b, myfoo.a, n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700271}
272
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700273TEST_F(DEATHTEST, strcat_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700274 char src[11];
275 strcpy(src, "0123456789");
276 foo myfoo;
277 myfoo.a[0] = '\0';
Elliott Hughesd036e942015-02-02 11:18:58 -0800278 ASSERT_FORTIFY(strcat(myfoo.a, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700279}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700280
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700281TEST_F(DEATHTEST, strcat2_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700282 foo myfoo;
283 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a)); // unterminated string
284 myfoo.b[0] = '\0';
Elliott Hughesd036e942015-02-02 11:18:58 -0800285 ASSERT_FORTIFY(strcat(myfoo.b, myfoo.a));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700286}
287
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700288TEST_F(DEATHTEST, snprintf_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700289 foo myfoo;
290 strcpy(myfoo.a, "012345678");
291 size_t n = strlen(myfoo.a) + 2;
Elliott Hughesd036e942015-02-02 11:18:58 -0800292 ASSERT_FORTIFY(snprintf(myfoo.b, n, "a%s", myfoo.a));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700293}
294
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700295TEST_F(DEATHTEST, bzero_fortified2) {
Nick Kralevicha6cde392013-06-29 08:15:25 -0700296 foo myfoo;
297 memcpy(myfoo.b, "0123456789", sizeof(myfoo.b));
298 size_t n = atoi("11");
Elliott Hughesd036e942015-02-02 11:18:58 -0800299 ASSERT_FORTIFY(bzero(myfoo.b, n));
Nick Kralevicha6cde392013-06-29 08:15:25 -0700300}
301
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700302#endif /* defined(_FORTIFY_SOURCE) && _FORTIFY_SOURCE=2 */
303
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700304// multibyte target where we over fill (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700305TEST_F(DEATHTEST, strcpy_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800306#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700307 char buf[10];
308 char *orig = strdup("0123456789");
Elliott Hughesd036e942015-02-02 11:18:58 -0800309 ASSERT_FORTIFY(strcpy(buf, orig));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700310 free(orig);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800311#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800312 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800313#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700314}
315
316// zero sized target with "\0" source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700317TEST_F(DEATHTEST, strcpy2_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800318#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700319 char buf[0];
320 char *orig = strdup("");
Elliott Hughesd036e942015-02-02 11:18:58 -0800321 ASSERT_FORTIFY(strcpy(buf, orig));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700322 free(orig);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800323#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800324 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800325#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700326}
327
328// zero sized target with longer source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700329TEST_F(DEATHTEST, strcpy3_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800330#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700331 char buf[0];
332 char *orig = strdup("1");
Elliott Hughesd036e942015-02-02 11:18:58 -0800333 ASSERT_FORTIFY(strcpy(buf, orig));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700334 free(orig);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800335#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800336 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800337#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700338}
339
340// one byte target with longer source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700341TEST_F(DEATHTEST, strcpy4_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800342#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700343 char buf[1];
344 char *orig = strdup("12");
Elliott Hughesd036e942015-02-02 11:18:58 -0800345 ASSERT_FORTIFY(strcpy(buf, orig));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700346 free(orig);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800347#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800348 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800349#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700350}
351
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700352TEST_F(DEATHTEST, strlen_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800353#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700354 char buf[10];
355 memcpy(buf, "0123456789", sizeof(buf));
Elliott Hughesd036e942015-02-02 11:18:58 -0800356 ASSERT_FORTIFY(printf("%zd", strlen(buf)));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800357#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800358 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800359#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700360}
361
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700362TEST_F(DEATHTEST, strchr_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800363#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700364 char buf[10];
365 memcpy(buf, "0123456789", sizeof(buf));
Elliott Hughesd036e942015-02-02 11:18:58 -0800366 ASSERT_FORTIFY(printf("%s", strchr(buf, 'a')));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800367#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800368 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800369#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700370}
371
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700372TEST_F(DEATHTEST, strrchr_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800373#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700374 char buf[10];
375 memcpy(buf, "0123456789", sizeof(buf));
Elliott Hughesd036e942015-02-02 11:18:58 -0800376 ASSERT_FORTIFY(printf("%s", strrchr(buf, 'a')));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800377#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800378 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800379#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700380}
381
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700382TEST_F(DEATHTEST, strlcpy_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800383#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700384 char bufa[15];
385 char bufb[10];
386 strcpy(bufa, "01234567890123");
387 size_t n = strlen(bufa);
Elliott Hughesd036e942015-02-02 11:18:58 -0800388 ASSERT_FORTIFY(strlcpy(bufb, bufa, n));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800389#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800390 GTEST_SKIP() << "strlcpy not available";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800391#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700392}
393
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700394TEST_F(DEATHTEST, strlcat_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800395#if defined(__BIONIC__)
Nick Kralevicha6cde392013-06-29 08:15:25 -0700396 char bufa[15];
397 char bufb[10];
398 bufb[0] = '\0';
399 strcpy(bufa, "01234567890123");
400 size_t n = strlen(bufa);
Elliott Hughesd036e942015-02-02 11:18:58 -0800401 ASSERT_FORTIFY(strlcat(bufb, bufa, n));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800402#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800403 GTEST_SKIP() << "strlcat not available";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800404#endif // __BIONIC__
Nick Kralevicha6cde392013-06-29 08:15:25 -0700405}
406
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700407TEST_F(DEATHTEST, sprintf_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700408 char buf[10];
409 char source_buf[15];
410 memcpy(source_buf, "12345678901234", 15);
Elliott Hughesd036e942015-02-02 11:18:58 -0800411 ASSERT_FORTIFY(sprintf(buf, "%s", source_buf));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700412}
413
George Burgess IVe9c0e822018-03-22 11:22:59 -0700414#if !__has_attribute(alloc_size)
Yi Kong2d3122c2017-04-30 15:08:05 -0700415// TODO: remove this after Clang prebuilt rebase.
George Burgess IV5f8a6732017-04-06 11:26:11 -0700416#else
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700417TEST_F(DEATHTEST, sprintf_malloc_fortified) {
Nick Kralevichb91791d2013-10-02 14:14:40 -0700418 char* buf = (char *) malloc(10);
419 char source_buf[11];
420 memcpy(source_buf, "1234567890", 11);
Elliott Hughesd036e942015-02-02 11:18:58 -0800421 ASSERT_FORTIFY(sprintf(buf, "%s", source_buf));
Nick Kralevichb91791d2013-10-02 14:14:40 -0700422 free(buf);
423}
424#endif
425
Nick Kralevich884a3de2014-10-06 00:39:47 +0000426TEST_F(DEATHTEST, sprintf2_fortified) {
Nick Kralevich884a3de2014-10-06 00:39:47 +0000427 char buf[5];
Elliott Hughesd036e942015-02-02 11:18:58 -0800428 ASSERT_FORTIFY(sprintf(buf, "aaaaa"));
Nick Kralevich884a3de2014-10-06 00:39:47 +0000429}
430
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700431static int vsprintf_helper(const char *fmt, ...) {
432 char buf[10];
433 va_list va;
434 int result;
435
436 va_start(va, fmt);
437 result = vsprintf(buf, fmt, va); // should crash here
438 va_end(va);
439 return result;
440}
441
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700442TEST_F(DEATHTEST, vsprintf_fortified) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800443 ASSERT_FORTIFY(vsprintf_helper("%s", "0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700444}
445
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700446TEST_F(DEATHTEST, vsprintf2_fortified) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800447 ASSERT_FORTIFY(vsprintf_helper("0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700448}
449
450static int vsnprintf_helper(const char *fmt, ...) {
451 char buf[10];
452 va_list va;
453 int result;
454 size_t size = atoi("11");
455
456 va_start(va, fmt);
457 result = vsnprintf(buf, size, fmt, va); // should crash here
458 va_end(va);
459 return result;
460}
461
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700462TEST_F(DEATHTEST, vsnprintf_fortified) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800463 ASSERT_FORTIFY(vsnprintf_helper("%s", "0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700464}
465
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700466TEST_F(DEATHTEST, vsnprintf2_fortified) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800467 ASSERT_FORTIFY(vsnprintf_helper("0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700468}
469
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700470TEST_F(DEATHTEST, strncat_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700471 char buf[10];
472 size_t n = atoi("10"); // avoid compiler optimizations
473 strncpy(buf, "012345678", n);
Elliott Hughesd036e942015-02-02 11:18:58 -0800474 ASSERT_FORTIFY(strncat(buf, "9", n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700475}
476
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700477TEST_F(DEATHTEST, strncat2_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700478 char buf[10];
479 buf[0] = '\0';
480 size_t n = atoi("10"); // avoid compiler optimizations
Elliott Hughesd036e942015-02-02 11:18:58 -0800481 ASSERT_FORTIFY(strncat(buf, "0123456789", n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700482}
483
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700484TEST_F(DEATHTEST, strcat_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700485 char src[11];
486 strcpy(src, "0123456789");
487 char buf[10];
488 buf[0] = '\0';
Elliott Hughesd036e942015-02-02 11:18:58 -0800489 ASSERT_FORTIFY(strcat(buf, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700490}
491
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700492TEST_F(DEATHTEST, memmove_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700493 char buf[20];
494 strcpy(buf, "0123456789");
495 size_t n = atoi("10");
Elliott Hughesd036e942015-02-02 11:18:58 -0800496 ASSERT_FORTIFY(memmove(buf + 11, buf, n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700497}
498
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700499TEST_F(DEATHTEST, memcpy_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700500 char bufa[10];
501 char bufb[10];
502 strcpy(bufa, "012345678");
503 size_t n = atoi("11");
Elliott Hughesd036e942015-02-02 11:18:58 -0800504 ASSERT_FORTIFY(memcpy(bufb, bufa, n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700505}
506
Elliott Hughes62e59642016-03-01 11:22:42 -0800507TEST_F(DEATHTEST, memset_fortified) {
508 char buf[10];
509 size_t n = atoi("11");
510 ASSERT_FORTIFY(memset(buf, 0, n));
511}
512
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700513TEST_F(DEATHTEST, stpncpy_fortified) {
Christopher Ferris950a58e2014-04-04 14:38:18 -0700514 char bufa[15];
515 char bufb[10];
516 strcpy(bufa, "01234567890123");
517 size_t n = strlen(bufa);
Elliott Hughesd036e942015-02-02 11:18:58 -0800518 ASSERT_FORTIFY(stpncpy(bufb, bufa, n));
Christopher Ferris950a58e2014-04-04 14:38:18 -0700519}
520
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700521TEST_F(DEATHTEST, stpncpy2_fortified) {
Christopher Ferris950a58e2014-04-04 14:38:18 -0700522 char dest[11];
523 char src[10];
524 memcpy(src, "0123456789", sizeof(src)); // src is not null terminated
Elliott Hughesd036e942015-02-02 11:18:58 -0800525 ASSERT_FORTIFY(stpncpy(dest, src, sizeof(dest)));
Christopher Ferris950a58e2014-04-04 14:38:18 -0700526}
527
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700528TEST_F(DEATHTEST, strncpy_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700529 char bufa[15];
530 char bufb[10];
531 strcpy(bufa, "01234567890123");
532 size_t n = strlen(bufa);
Elliott Hughesd036e942015-02-02 11:18:58 -0800533 ASSERT_FORTIFY(strncpy(bufb, bufa, n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700534}
535
Christopher Ferris950a58e2014-04-04 14:38:18 -0700536
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700537TEST_F(DEATHTEST, strncpy2_fortified) {
Nick Kralevich93501d32013-08-28 10:47:43 -0700538 char dest[11];
539 char src[10];
540 memcpy(src, "0123456789", sizeof(src)); // src is not null terminated
Elliott Hughesd036e942015-02-02 11:18:58 -0800541 ASSERT_FORTIFY(strncpy(dest, src, sizeof(dest)));
Nick Kralevich93501d32013-08-28 10:47:43 -0700542}
543
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700544TEST_F(DEATHTEST, snprintf_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700545 char bufa[15];
546 char bufb[10];
547 strcpy(bufa, "0123456789");
548 size_t n = strlen(bufa) + 1;
Elliott Hughesd036e942015-02-02 11:18:58 -0800549 ASSERT_FORTIFY(snprintf(bufb, n, "%s", bufa));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700550}
551
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700552TEST_F(DEATHTEST, bzero_fortified) {
Nick Kralevicha6cde392013-06-29 08:15:25 -0700553 char buf[10];
554 memcpy(buf, "0123456789", sizeof(buf));
555 size_t n = atoi("11");
Elliott Hughesd036e942015-02-02 11:18:58 -0800556 ASSERT_FORTIFY(bzero(buf, n));
Nick Kralevicha6cde392013-06-29 08:15:25 -0700557}
558
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700559TEST_F(DEATHTEST, umask_fortified) {
Nick Kralevicha6cde392013-06-29 08:15:25 -0700560 mode_t mask = atoi("1023"); // 01777 in octal
Elliott Hughesd036e942015-02-02 11:18:58 -0800561 ASSERT_FORTIFY(umask(mask));
Nick Kralevicha6cde392013-06-29 08:15:25 -0700562}
563
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700564TEST_F(DEATHTEST, recv_fortified) {
Nick Kralevich60f4f9a2013-09-24 16:32:07 -0700565 size_t data_len = atoi("11"); // suppress compiler optimizations
566 char buf[10];
Elliott Hughesd036e942015-02-02 11:18:58 -0800567 ASSERT_FORTIFY(recv(0, buf, data_len, 0));
Nick Kralevich60f4f9a2013-09-24 16:32:07 -0700568}
569
Daniel Micay95b59c52017-02-13 17:27:59 -0800570TEST_F(DEATHTEST, send_fortified) {
571 size_t data_len = atoi("11"); // suppress compiler optimizations
572 char buf[10] = {0};
573 ASSERT_FORTIFY(send(0, buf, data_len, 0));
574}
575
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700576TEST_F(DEATHTEST, FD_ISSET_fortified) {
Elliott Hughes063525c2014-05-13 11:19:57 -0700577#if defined(__BIONIC__) // glibc catches this at compile-time.
Nick Kralevich90201d52013-10-02 16:11:30 -0700578 fd_set set;
579 memset(&set, 0, sizeof(set));
Elliott Hughesd036e942015-02-02 11:18:58 -0800580 ASSERT_FORTIFY(FD_ISSET(-1, &set));
Elliott Hughes409588c2014-04-23 23:02:43 -0700581#endif
Nick Kralevich90201d52013-10-02 16:11:30 -0700582}
583
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700584TEST_F(DEATHTEST, FD_ISSET_2_fortified) {
Nick Kralevich7943df62013-10-03 14:08:39 -0700585 char buf[1];
586 fd_set* set = (fd_set*) buf;
Elliott Hughesd036e942015-02-02 11:18:58 -0800587 ASSERT_FORTIFY(FD_ISSET(0, set));
Nick Kralevich7943df62013-10-03 14:08:39 -0700588}
589
Daniel Micay9101b002015-05-20 15:31:26 -0400590TEST_F(DEATHTEST, getcwd_fortified) {
591 char buf[1];
592 size_t ct = atoi("2"); // prevent optimizations
593 ASSERT_FORTIFY(getcwd(buf, ct));
594}
595
Daniel Micaye7e1c872015-04-16 09:07:45 -0400596TEST_F(DEATHTEST, pread_fortified) {
597 char buf[1];
598 size_t ct = atoi("2"); // prevent optimizations
599 int fd = open("/dev/null", O_RDONLY);
600 ASSERT_FORTIFY(pread(fd, buf, ct, 0));
601 close(fd);
602}
603
604TEST_F(DEATHTEST, pread64_fortified) {
605 char buf[1];
606 size_t ct = atoi("2"); // prevent optimizations
607 int fd = open("/dev/null", O_RDONLY);
608 ASSERT_FORTIFY(pread64(fd, buf, ct, 0));
609 close(fd);
610}
611
Daniel Micayafdd1542015-07-20 21:37:29 -0400612TEST_F(DEATHTEST, pwrite_fortified) {
613 char buf[1] = {0};
614 size_t ct = atoi("2"); // prevent optimizations
615 int fd = open("/dev/null", O_WRONLY);
616 ASSERT_FORTIFY(pwrite(fd, buf, ct, 0));
617 close(fd);
618}
619
620TEST_F(DEATHTEST, pwrite64_fortified) {
621 char buf[1] = {0};
622 size_t ct = atoi("2"); // prevent optimizations
623 int fd = open("/dev/null", O_WRONLY);
624 ASSERT_FORTIFY(pwrite64(fd, buf, ct, 0));
625 close(fd);
626}
627
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700628TEST_F(DEATHTEST, read_fortified) {
Nick Kralevichb036b5c2013-10-09 20:16:34 -0700629 char buf[1];
630 size_t ct = atoi("2"); // prevent optimizations
631 int fd = open("/dev/null", O_RDONLY);
Elliott Hughesd036e942015-02-02 11:18:58 -0800632 ASSERT_FORTIFY(read(fd, buf, ct));
Nick Kralevichb036b5c2013-10-09 20:16:34 -0700633 close(fd);
634}
635
Daniel Micayafdd1542015-07-20 21:37:29 -0400636TEST_F(DEATHTEST, write_fortified) {
637 char buf[1] = {0};
638 size_t ct = atoi("2"); // prevent optimizations
639 int fd = open("/dev/null", O_WRONLY);
640 ASSERT_EXIT(write(fd, buf, ct), testing::KilledBySignal(SIGABRT), "");
641 close(fd);
642}
643
Daniel Micayfed26592015-07-18 13:55:51 -0400644TEST_F(DEATHTEST, fread_fortified) {
645 char buf[1];
646 size_t ct = atoi("2"); // prevent optimizations
647 FILE* fp = fopen("/dev/null", "r");
648 ASSERT_FORTIFY(fread(buf, 1, ct, fp));
649 fclose(fp);
650}
651
652TEST_F(DEATHTEST, fwrite_fortified) {
653 char buf[1] = {0};
654 size_t ct = atoi("2"); // prevent optimizations
655 FILE* fp = fopen("/dev/null", "w");
656 ASSERT_FORTIFY(fwrite(buf, 1, ct, fp));
657 fclose(fp);
658}
659
Daniel Micay42281882015-04-17 11:26:36 -0400660TEST_F(DEATHTEST, readlink_fortified) {
661 char buf[1];
662 size_t ct = atoi("2"); // prevent optimizations
663 ASSERT_FORTIFY(readlink("/dev/null", buf, ct));
664}
665
666TEST_F(DEATHTEST, readlinkat_fortified) {
667 char buf[1];
668 size_t ct = atoi("2"); // prevent optimizations
669 ASSERT_FORTIFY(readlinkat(AT_FDCWD, "/dev/null", buf, ct));
670}
671
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700672extern "C" char* __strncat_chk(char*, const char*, size_t, size_t);
673extern "C" char* __strcat_chk(char*, const char*, size_t);
674
675TEST(TEST_NAME, strncat) {
676 char buf[10];
677 memset(buf, 'A', sizeof(buf));
678 buf[0] = 'a';
679 buf[1] = '\0';
680 char* res = __strncat_chk(buf, "01234", sizeof(buf) - strlen(buf) - 1, sizeof(buf));
681 ASSERT_EQ(buf, res);
682 ASSERT_EQ('a', buf[0]);
683 ASSERT_EQ('0', buf[1]);
684 ASSERT_EQ('1', buf[2]);
685 ASSERT_EQ('2', buf[3]);
686 ASSERT_EQ('3', buf[4]);
687 ASSERT_EQ('4', buf[5]);
688 ASSERT_EQ('\0', buf[6]);
689 ASSERT_EQ('A', buf[7]);
690 ASSERT_EQ('A', buf[8]);
691 ASSERT_EQ('A', buf[9]);
692}
693
694TEST(TEST_NAME, strncat2) {
695 char buf[10];
696 memset(buf, 'A', sizeof(buf));
697 buf[0] = 'a';
698 buf[1] = '\0';
699 char* res = __strncat_chk(buf, "0123456789", 5, sizeof(buf));
700 ASSERT_EQ(buf, res);
701 ASSERT_EQ('a', buf[0]);
702 ASSERT_EQ('0', buf[1]);
703 ASSERT_EQ('1', buf[2]);
704 ASSERT_EQ('2', buf[3]);
705 ASSERT_EQ('3', buf[4]);
706 ASSERT_EQ('4', buf[5]);
707 ASSERT_EQ('\0', buf[6]);
708 ASSERT_EQ('A', buf[7]);
709 ASSERT_EQ('A', buf[8]);
710 ASSERT_EQ('A', buf[9]);
711}
712
713TEST(TEST_NAME, strncat3) {
714 char buf[10];
715 memset(buf, 'A', sizeof(buf));
716 buf[0] = '\0';
717 char* res = __strncat_chk(buf, "0123456789", 5, sizeof(buf));
718 ASSERT_EQ(buf, res);
719 ASSERT_EQ('0', buf[0]);
720 ASSERT_EQ('1', buf[1]);
721 ASSERT_EQ('2', buf[2]);
722 ASSERT_EQ('3', buf[3]);
723 ASSERT_EQ('4', buf[4]);
724 ASSERT_EQ('\0', buf[5]);
725 ASSERT_EQ('A', buf[6]);
726 ASSERT_EQ('A', buf[7]);
727 ASSERT_EQ('A', buf[8]);
728 ASSERT_EQ('A', buf[9]);
729}
730
731TEST(TEST_NAME, strncat4) {
732 char buf[10];
733 memset(buf, 'A', sizeof(buf));
734 buf[9] = '\0';
735 char* res = __strncat_chk(buf, "", 5, sizeof(buf));
736 ASSERT_EQ(buf, res);
737 ASSERT_EQ('A', buf[0]);
738 ASSERT_EQ('A', buf[1]);
739 ASSERT_EQ('A', buf[2]);
740 ASSERT_EQ('A', buf[3]);
741 ASSERT_EQ('A', buf[4]);
742 ASSERT_EQ('A', buf[5]);
743 ASSERT_EQ('A', buf[6]);
744 ASSERT_EQ('A', buf[7]);
745 ASSERT_EQ('A', buf[8]);
746 ASSERT_EQ('\0', buf[9]);
747}
748
749TEST(TEST_NAME, strncat5) {
750 char buf[10];
751 memset(buf, 'A', sizeof(buf));
752 buf[0] = 'a';
753 buf[1] = '\0';
754 char* res = __strncat_chk(buf, "01234567", 8, sizeof(buf));
755 ASSERT_EQ(buf, res);
756 ASSERT_EQ('a', buf[0]);
757 ASSERT_EQ('0', buf[1]);
758 ASSERT_EQ('1', buf[2]);
759 ASSERT_EQ('2', buf[3]);
760 ASSERT_EQ('3', buf[4]);
761 ASSERT_EQ('4', buf[5]);
762 ASSERT_EQ('5', buf[6]);
763 ASSERT_EQ('6', buf[7]);
764 ASSERT_EQ('7', buf[8]);
765 ASSERT_EQ('\0', buf[9]);
766}
767
768TEST(TEST_NAME, strncat6) {
769 char buf[10];
770 memset(buf, 'A', sizeof(buf));
771 buf[0] = 'a';
772 buf[1] = '\0';
773 char* res = __strncat_chk(buf, "01234567", 9, sizeof(buf));
774 ASSERT_EQ(buf, res);
775 ASSERT_EQ('a', buf[0]);
776 ASSERT_EQ('0', buf[1]);
777 ASSERT_EQ('1', buf[2]);
778 ASSERT_EQ('2', buf[3]);
779 ASSERT_EQ('3', buf[4]);
780 ASSERT_EQ('4', buf[5]);
781 ASSERT_EQ('5', buf[6]);
782 ASSERT_EQ('6', buf[7]);
783 ASSERT_EQ('7', buf[8]);
784 ASSERT_EQ('\0', buf[9]);
785}
786
787
788TEST(TEST_NAME, strcat) {
789 char buf[10];
790 memset(buf, 'A', sizeof(buf));
791 buf[0] = 'a';
792 buf[1] = '\0';
793 char* res = __strcat_chk(buf, "01234", sizeof(buf));
794 ASSERT_EQ(buf, res);
795 ASSERT_EQ('a', buf[0]);
796 ASSERT_EQ('0', buf[1]);
797 ASSERT_EQ('1', buf[2]);
798 ASSERT_EQ('2', buf[3]);
799 ASSERT_EQ('3', buf[4]);
800 ASSERT_EQ('4', buf[5]);
801 ASSERT_EQ('\0', buf[6]);
802 ASSERT_EQ('A', buf[7]);
803 ASSERT_EQ('A', buf[8]);
804 ASSERT_EQ('A', buf[9]);
805}
806
807TEST(TEST_NAME, strcat2) {
808 char buf[10];
809 memset(buf, 'A', sizeof(buf));
810 buf[0] = 'a';
811 buf[1] = '\0';
812 char* res = __strcat_chk(buf, "01234567", sizeof(buf));
813 ASSERT_EQ(buf, res);
814 ASSERT_EQ('a', buf[0]);
815 ASSERT_EQ('0', buf[1]);
816 ASSERT_EQ('1', buf[2]);
817 ASSERT_EQ('2', buf[3]);
818 ASSERT_EQ('3', buf[4]);
819 ASSERT_EQ('4', buf[5]);
820 ASSERT_EQ('5', buf[6]);
821 ASSERT_EQ('6', buf[7]);
822 ASSERT_EQ('7', buf[8]);
823 ASSERT_EQ('\0', buf[9]);
824}
Nick Kralevich93501d32013-08-28 10:47:43 -0700825
Christopher Ferris950a58e2014-04-04 14:38:18 -0700826TEST(TEST_NAME, stpncpy) {
827 char src[10];
828 char dst[10];
829 memcpy(src, "0123456789", sizeof(src)); // non null terminated string
830 stpncpy(dst, src, sizeof(dst));
831 ASSERT_EQ('0', dst[0]);
832 ASSERT_EQ('1', dst[1]);
833 ASSERT_EQ('2', dst[2]);
834 ASSERT_EQ('3', dst[3]);
835 ASSERT_EQ('4', dst[4]);
836 ASSERT_EQ('5', dst[5]);
837 ASSERT_EQ('6', dst[6]);
838 ASSERT_EQ('7', dst[7]);
839 ASSERT_EQ('8', dst[8]);
840 ASSERT_EQ('9', dst[9]);
841}
842
843TEST(TEST_NAME, stpncpy2) {
844 char src[10];
845 char dst[15];
846 memcpy(src, "012345678\0", sizeof(src));
847 stpncpy(dst, src, sizeof(dst));
848 ASSERT_EQ('0', dst[0]);
849 ASSERT_EQ('1', dst[1]);
850 ASSERT_EQ('2', dst[2]);
851 ASSERT_EQ('3', dst[3]);
852 ASSERT_EQ('4', dst[4]);
853 ASSERT_EQ('5', dst[5]);
854 ASSERT_EQ('6', dst[6]);
855 ASSERT_EQ('7', dst[7]);
856 ASSERT_EQ('8', dst[8]);
857 ASSERT_EQ('\0', dst[9]);
858 ASSERT_EQ('\0', dst[10]);
859 ASSERT_EQ('\0', dst[11]);
860 ASSERT_EQ('\0', dst[12]);
861 ASSERT_EQ('\0', dst[13]);
862 ASSERT_EQ('\0', dst[14]);
863}
864
Nick Kralevich93501d32013-08-28 10:47:43 -0700865TEST(TEST_NAME, strncpy) {
866 char src[10];
867 char dst[10];
868 memcpy(src, "0123456789", sizeof(src)); // non null terminated string
869 strncpy(dst, src, sizeof(dst));
870 ASSERT_EQ('0', dst[0]);
871 ASSERT_EQ('1', dst[1]);
872 ASSERT_EQ('2', dst[2]);
873 ASSERT_EQ('3', dst[3]);
874 ASSERT_EQ('4', dst[4]);
875 ASSERT_EQ('5', dst[5]);
876 ASSERT_EQ('6', dst[6]);
877 ASSERT_EQ('7', dst[7]);
878 ASSERT_EQ('8', dst[8]);
879 ASSERT_EQ('9', dst[9]);
880}
881
882TEST(TEST_NAME, strncpy2) {
883 char src[10];
884 char dst[15];
885 memcpy(src, "012345678\0", sizeof(src));
886 strncpy(dst, src, sizeof(dst));
887 ASSERT_EQ('0', dst[0]);
888 ASSERT_EQ('1', dst[1]);
889 ASSERT_EQ('2', dst[2]);
890 ASSERT_EQ('3', dst[3]);
891 ASSERT_EQ('4', dst[4]);
892 ASSERT_EQ('5', dst[5]);
893 ASSERT_EQ('6', dst[6]);
894 ASSERT_EQ('7', dst[7]);
895 ASSERT_EQ('8', dst[8]);
896 ASSERT_EQ('\0', dst[9]);
897 ASSERT_EQ('\0', dst[10]);
898 ASSERT_EQ('\0', dst[11]);
899 ASSERT_EQ('\0', dst[12]);
900 ASSERT_EQ('\0', dst[13]);
901 ASSERT_EQ('\0', dst[14]);
902}
Christopher Ferris16e185c2013-09-10 16:56:34 -0700903
904TEST(TEST_NAME, strcat_chk_max_int_size) {
905 char buf[10];
906 memset(buf, 'A', sizeof(buf));
907 buf[0] = 'a';
908 buf[1] = '\0';
909 char* res = __strcat_chk(buf, "01234567", (size_t)-1);
910 ASSERT_EQ(buf, res);
911 ASSERT_EQ('a', buf[0]);
912 ASSERT_EQ('0', buf[1]);
913 ASSERT_EQ('1', buf[2]);
914 ASSERT_EQ('2', buf[3]);
915 ASSERT_EQ('3', buf[4]);
916 ASSERT_EQ('4', buf[5]);
917 ASSERT_EQ('5', buf[6]);
918 ASSERT_EQ('6', buf[7]);
919 ASSERT_EQ('7', buf[8]);
920 ASSERT_EQ('\0', buf[9]);
921}
922
George Burgess IV849c0b92019-06-10 16:22:09 -0700923TEST(TEST_NAME, mempcpy_chk) {
924 const char input_str[] = "abcdefg";
925 size_t input_str_size = strlen(input_str) + 1;
926
927 char buf1[10] = {};
928 char buf2[10] = {};
929
930 __builtin_mempcpy(buf1, input_str, input_str_size);
931 __builtin___mempcpy_chk(buf2, input_str, input_str_size, __bos0(buf2));
932
933 ASSERT_EQ(memcmp(buf1, buf2, sizeof(buf2)), 0);
934
935 void *builtin_ptr = __builtin_mempcpy(buf1, input_str, input_str_size);
936 void *fortify_ptr = __builtin___mempcpy_chk(buf1, input_str, input_str_size, __bos0(buf2));
937
938 ASSERT_EQ(builtin_ptr, fortify_ptr);
939}
940
Christopher Ferris950a58e2014-04-04 14:38:18 -0700941extern "C" char* __stpcpy_chk(char*, const char*, size_t);
942
943TEST(TEST_NAME, stpcpy_chk_max_int_size) {
944 char buf[10];
945 char* res = __stpcpy_chk(buf, "012345678", (size_t)-1);
946 ASSERT_EQ(buf + strlen("012345678"), res);
947 ASSERT_STREQ("012345678", buf);
948}
949
Christopher Ferris16e185c2013-09-10 16:56:34 -0700950extern "C" char* __strcpy_chk(char*, const char*, size_t);
951
952TEST(TEST_NAME, strcpy_chk_max_int_size) {
953 char buf[10];
954 char* res = __strcpy_chk(buf, "012345678", (size_t)-1);
955 ASSERT_EQ(buf, res);
Christopher Ferris950a58e2014-04-04 14:38:18 -0700956 ASSERT_STREQ("012345678", buf);
Christopher Ferris16e185c2013-09-10 16:56:34 -0700957}
958
959extern "C" void* __memcpy_chk(void*, const void*, size_t, size_t);
960
961TEST(TEST_NAME, memcpy_chk_max_int_size) {
962 char buf[10];
963 void* res = __memcpy_chk(buf, "012345678", sizeof(buf), (size_t)-1);
964 ASSERT_EQ((void*)buf, res);
965 ASSERT_EQ('0', buf[0]);
966 ASSERT_EQ('1', buf[1]);
967 ASSERT_EQ('2', buf[2]);
968 ASSERT_EQ('3', buf[3]);
969 ASSERT_EQ('4', buf[4]);
970 ASSERT_EQ('5', buf[5]);
971 ASSERT_EQ('6', buf[6]);
972 ASSERT_EQ('7', buf[7]);
973 ASSERT_EQ('8', buf[8]);
974 ASSERT_EQ('\0', buf[9]);
975}
Stephen Hines6e380722013-10-11 00:45:24 -0700976
977// Verify that macro expansion is done properly for sprintf/snprintf (which
978// are defined as macros in stdio.h under clang).
979#define CONTENTS "macro expansion"
980#define BUF_AND_SIZE(A) A, sizeof(A)
981#define BUF_AND_CONTENTS(A) A, CONTENTS
982#define BUF_AND_SIZE_AND_CONTENTS(A) A, sizeof(A), CONTENTS
983TEST(TEST_NAME, s_n_printf_macro_expansion) {
984 char buf[BUFSIZ];
985 snprintf(BUF_AND_SIZE(buf), CONTENTS);
986 EXPECT_STREQ(CONTENTS, buf);
987
988 snprintf(BUF_AND_SIZE_AND_CONTENTS(buf));
989 EXPECT_STREQ(CONTENTS, buf);
990
991 sprintf(BUF_AND_CONTENTS(buf));
992 EXPECT_STREQ(CONTENTS, buf);
993}
Elliott Hughes4674e382015-02-02 09:15:19 -0800994
995TEST_F(DEATHTEST, poll_fortified) {
996 nfds_t fd_count = atoi("2"); // suppress compiler optimizations
997 pollfd buf[1] = {{0, POLLIN, 0}};
Yabin Cuif4fe6932015-02-03 17:52:32 -0800998 // Set timeout to zero to prevent waiting in poll when fortify test fails.
999 ASSERT_FORTIFY(poll(buf, fd_count, 0));
Elliott Hughes4674e382015-02-02 09:15:19 -08001000}
1001
1002TEST_F(DEATHTEST, ppoll_fortified) {
1003 nfds_t fd_count = atoi("2"); // suppress compiler optimizations
1004 pollfd buf[1] = {{0, POLLIN, 0}};
Yabin Cuif4fe6932015-02-03 17:52:32 -08001005 // Set timeout to zero to prevent waiting in ppoll when fortify test fails.
1006 timespec timeout;
1007 timeout.tv_sec = timeout.tv_nsec = 0;
Elliott Hughesb83bf142018-03-22 11:01:25 -07001008 ASSERT_FORTIFY(ppoll(buf, fd_count, &timeout, nullptr));
1009}
1010
1011TEST_F(DEATHTEST, ppoll64_fortified) {
1012#if __BIONIC__ // glibc doesn't have ppoll64.
1013 nfds_t fd_count = atoi("2"); // suppress compiler optimizations
1014 pollfd buf[1] = {{0, POLLIN, 0}};
1015 // Set timeout to zero to prevent waiting in ppoll when fortify test fails.
1016 timespec timeout;
1017 timeout.tv_sec = timeout.tv_nsec = 0;
1018 ASSERT_FORTIFY(ppoll64(buf, fd_count, &timeout, nullptr));
1019#endif
Elliott Hughes4674e382015-02-02 09:15:19 -08001020}
Elliott Hughesb115aef2017-08-04 09:34:19 -07001021
1022TEST_F(DEATHTEST, open_O_CREAT_without_mode_fortified) {
1023 int flags = O_CREAT; // Fool the compiler.
1024 ASSERT_FORTIFY(open("", flags));
1025}
1026
1027TEST_F(DEATHTEST, open_O_TMPFILE_without_mode_fortified) {
1028#if __BIONIC__ // Our glibc is too old for O_TMPFILE.
1029 int flags = O_TMPFILE; // Fool the compiler.
1030 ASSERT_FORTIFY(open("", flags));
1031#endif
1032}