| /* |
| * Copyright (C) 2013 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include <gtest/gtest.h> |
| |
| #include <fcntl.h> |
| #include <malloc.h> |
| #include <poll.h> |
| #include <signal.h> |
| #include <stdarg.h> |
| #include <string.h> |
| #include <sys/socket.h> |
| #include <sys/stat.h> |
| #include <sys/types.h> |
| #include <time.h> |
| |
| #include <android-base/silent_death_test.h> |
| |
| #if defined(__BIONIC__) |
| #define ASSERT_FORTIFY(expr) ASSERT_EXIT(expr, testing::KilledBySignal(SIGABRT), "FORTIFY") |
| #else |
| #define ASSERT_FORTIFY(expr) ASSERT_EXIT(expr, testing::KilledBySignal(SIGABRT), "") |
| #endif |
| |
| // Fortify test code needs to run multiple times, so TEST_NAME macro is used to |
| // distinguish different tests. TEST_NAME is defined in compilation command. |
| #define DEATHTEST_PASTER(name) name##_DeathTest |
| #define DEATHTEST_EVALUATOR(name) DEATHTEST_PASTER(name) |
| #define DEATHTEST DEATHTEST_EVALUATOR(TEST_NAME) |
| |
| using DEATHTEST = SilentDeathTest; |
| |
| #if defined(_FORTIFY_SOURCE) && _FORTIFY_SOURCE == 2 |
| struct foo { |
| char empty[0]; |
| char one[1]; |
| char a[10]; |
| char b[10]; |
| }; |
| |
| TEST_F(DEATHTEST, stpncpy_fortified2) { |
| foo myfoo; |
| volatile int copy_amt = 11; |
| ASSERT_FORTIFY(stpncpy(myfoo.a, "01234567890", copy_amt)); |
| } |
| |
| TEST_F(DEATHTEST, stpncpy2_fortified2) { |
| foo myfoo = {}; |
| myfoo.one[0] = 'A'; // not null terminated string |
| ASSERT_FORTIFY(stpncpy(myfoo.b, myfoo.one, sizeof(myfoo.b))); |
| } |
| |
| TEST_F(DEATHTEST, strncpy_fortified2) { |
| foo myfoo; |
| volatile int copy_amt = 11; |
| ASSERT_FORTIFY(strncpy(myfoo.a, "01234567890", copy_amt)); |
| } |
| |
| TEST_F(DEATHTEST, strncpy2_fortified2) { |
| foo myfoo = {}; |
| myfoo.one[0] = 'A'; // not null terminated string |
| ASSERT_FORTIFY(strncpy(myfoo.b, myfoo.one, sizeof(myfoo.b))); |
| } |
| |
| TEST_F(DEATHTEST, sprintf_fortified2) { |
| foo myfoo; |
| char source_buf[15]; |
| memcpy(source_buf, "12345678901234", 15); |
| ASSERT_FORTIFY(sprintf(myfoo.a, "%s", source_buf)); |
| } |
| |
| TEST_F(DEATHTEST, sprintf2_fortified2) { |
| foo myfoo; |
| ASSERT_FORTIFY(sprintf(myfoo.a, "0123456789")); |
| } |
| |
| static int vsprintf_helper2(const char* fmt, ...) { |
| va_list va; |
| va_start(va, fmt); |
| foo myfoo; |
| int result = vsprintf(myfoo.a, fmt, va); // should crash here |
| va_end(va); |
| return result; |
| } |
| |
| TEST_F(DEATHTEST, vsprintf_fortified2) { |
| ASSERT_FORTIFY(vsprintf_helper2("%s", "0123456789")); |
| } |
| |
| TEST_F(DEATHTEST, vsprintf2_fortified2) { |
| ASSERT_FORTIFY(vsprintf_helper2("0123456789")); |
| } |
| |
| static int vsnprintf_helper2(const char* fmt, ...) { |
| va_list va; |
| va_start(va, fmt); |
| foo myfoo; |
| volatile size_t size = 11; |
| int result = vsnprintf(myfoo.a, size, fmt, va); // should crash here |
| va_end(va); |
| return result; |
| } |
| |
| TEST_F(DEATHTEST, vsnprintf_fortified2) { |
| ASSERT_FORTIFY(vsnprintf_helper2("%s", "0123456789")); |
| } |
| |
| TEST_F(DEATHTEST, vsnprintf2_fortified2) { |
| ASSERT_FORTIFY(vsnprintf_helper2("0123456789")); |
| } |
| |
| // zero sized target with "\0" source (should fail) |
| TEST_F(DEATHTEST, stpcpy_fortified2) { |
| #if defined(__BIONIC__) |
| foo myfoo; |
| char* src = strdup(""); |
| ASSERT_FORTIFY(stpcpy(myfoo.empty, src)); |
| free(src); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "stpcpy not available"; |
| #endif // __BIONIC__ |
| } |
| |
| // zero sized target with "\0" source (should fail) |
| TEST_F(DEATHTEST, strcpy_fortified2) { |
| #if defined(__BIONIC__) |
| foo myfoo; |
| char* src = strdup(""); |
| ASSERT_FORTIFY(strcpy(myfoo.empty, src)); |
| free(src); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "glibc is broken"; |
| #endif // __BIONIC__ |
| } |
| |
| // zero sized target with longer source (should fail) |
| TEST_F(DEATHTEST, strcpy2_fortified2) { |
| #if defined(__BIONIC__) |
| foo myfoo; |
| char* src = strdup("1"); |
| ASSERT_FORTIFY(strcpy(myfoo.empty, src)); |
| free(src); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "glibc is broken"; |
| #endif // __BIONIC__ |
| } |
| |
| // one byte target with longer source (should fail) |
| TEST_F(DEATHTEST, strcpy3_fortified2) { |
| #if defined(__BIONIC__) |
| foo myfoo; |
| char* src = strdup("12"); |
| ASSERT_FORTIFY(strcpy(myfoo.one, src)); |
| free(src); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "glibc is broken"; |
| #endif // __BIONIC__ |
| } |
| |
| TEST_F(DEATHTEST, strchr_fortified2) { |
| #if defined(__BIONIC__) |
| foo myfoo; |
| memcpy(myfoo.a, "0123456789", sizeof(myfoo.a)); |
| myfoo.b[0] = '\0'; |
| ASSERT_FORTIFY(printf("%s", strchr(myfoo.a, 'a'))); |
| ASSERT_FORTIFY(printf("%s", strchr(static_cast<const char*>(myfoo.a), 'a'))); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "glibc is broken"; |
| #endif // __BIONIC__ |
| } |
| |
| TEST_F(DEATHTEST, strrchr_fortified2) { |
| #if defined(__BIONIC__) |
| foo myfoo; |
| memcpy(myfoo.a, "0123456789", 10); |
| memcpy(myfoo.b, "01234", 6); |
| ASSERT_FORTIFY(printf("%s", strrchr(myfoo.a, 'a'))); |
| ASSERT_FORTIFY(printf("%s", strrchr(static_cast<const char*>(myfoo.a), 'a'))); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "glibc is broken"; |
| #endif // __BIONIC__ |
| } |
| |
| TEST_F(DEATHTEST, memchr_fortified2) { |
| #if defined(__BIONIC__) |
| foo myfoo; |
| volatile int asize = sizeof(myfoo.a) + 1; |
| memcpy(myfoo.a, "0123456789", sizeof(myfoo.a)); |
| ASSERT_FORTIFY(printf("%s", static_cast<const char*>(memchr(myfoo.a, 'a', asize)))); |
| ASSERT_FORTIFY(printf( |
| "%s", static_cast<const char*>(memchr(static_cast<const void*>(myfoo.a), 'a', asize)))); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "glibc is broken"; |
| #endif // __BIONIC__ |
| } |
| |
| TEST_F(DEATHTEST, memrchr_fortified2) { |
| #if defined(__BIONIC__) |
| foo myfoo; |
| volatile int asize = sizeof(myfoo.a) + 1; |
| memcpy(myfoo.a, "0123456789", sizeof(myfoo.a)); |
| ASSERT_FORTIFY(printf("%s", static_cast<const char*>(memrchr(myfoo.a, 'a', asize)))); |
| ASSERT_FORTIFY(printf( |
| "%s", static_cast<const char*>(memrchr(static_cast<const void*>(myfoo.a), 'a', asize)))); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "glibc is broken"; |
| #endif // __BIONIC__ |
| } |
| |
| TEST_F(DEATHTEST, strlcpy_fortified2) { |
| #if defined(__BIONIC__) |
| foo myfoo; |
| strcpy(myfoo.a, "01"); |
| size_t n = strlen(myfoo.a); |
| ASSERT_FORTIFY(strlcpy(myfoo.one, myfoo.a, n)); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "strlcpy not available"; |
| #endif // __BIONIC__ |
| } |
| |
| TEST_F(DEATHTEST, strlcat_fortified2) { |
| #if defined(__BIONIC__) |
| foo myfoo; |
| strcpy(myfoo.a, "01"); |
| myfoo.one[0] = '\0'; |
| size_t n = strlen(myfoo.a); |
| ASSERT_FORTIFY(strlcat(myfoo.one, myfoo.a, n)); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "strlcat not available"; |
| #endif // __BIONIC__ |
| } |
| |
| TEST_F(DEATHTEST, strncat_fortified2) { |
| foo myfoo; |
| volatile size_t n = 10; |
| strncpy(myfoo.a, "012345678", n); |
| ASSERT_FORTIFY(strncat(myfoo.a, "9", n)); |
| } |
| |
| TEST_F(DEATHTEST, strncat2_fortified2) { |
| foo myfoo; |
| myfoo.a[0] = '\0'; |
| volatile size_t n = 10; |
| ASSERT_FORTIFY(strncat(myfoo.a, "0123456789", n)); |
| } |
| |
| TEST_F(DEATHTEST, strncat3_fortified2) { |
| foo myfoo; |
| memcpy(myfoo.a, "0123456789", sizeof(myfoo.a)); // unterminated string |
| myfoo.b[0] = '\0'; |
| volatile size_t n = 10; |
| ASSERT_FORTIFY(strncat(myfoo.b, myfoo.a, n)); |
| } |
| |
| TEST_F(DEATHTEST, strcat_fortified2) { |
| char src[11]; |
| strcpy(src, "0123456789"); |
| foo myfoo; |
| myfoo.a[0] = '\0'; |
| ASSERT_FORTIFY(strcat(myfoo.a, src)); |
| } |
| |
| TEST_F(DEATHTEST, strcat2_fortified2) { |
| foo myfoo; |
| memcpy(myfoo.a, "0123456789", sizeof(myfoo.a)); // unterminated string |
| myfoo.b[0] = '\0'; |
| ASSERT_FORTIFY(strcat(myfoo.b, myfoo.a)); |
| } |
| |
| TEST_F(DEATHTEST, snprintf_fortified2) { |
| foo myfoo; |
| strcpy(myfoo.a, "012345678"); |
| size_t n = strlen(myfoo.a) + 2; |
| ASSERT_FORTIFY(snprintf(myfoo.b, n, "a%s", myfoo.a)); |
| } |
| |
| TEST_F(DEATHTEST, bzero_fortified2) { |
| foo myfoo; |
| memcpy(myfoo.b, "0123456789", sizeof(myfoo.b)); |
| volatile size_t n = 11; |
| ASSERT_FORTIFY(bzero(myfoo.b, n)); |
| } |
| |
| #endif /* defined(_FORTIFY_SOURCE) && _FORTIFY_SOURCE=2 */ |
| |
| // multibyte target where we over fill (should fail) |
| TEST_F(DEATHTEST, strcpy_fortified) { |
| #if defined(__BIONIC__) |
| char buf[10]; |
| char* orig = strdup("0123456789"); |
| ASSERT_FORTIFY(strcpy(buf, orig)); |
| free(orig); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "glibc is broken"; |
| #endif // __BIONIC__ |
| } |
| |
| // zero sized target with "\0" source (should fail) |
| TEST_F(DEATHTEST, strcpy2_fortified) { |
| #if defined(__BIONIC__) |
| char buf[0]; |
| char* orig = strdup(""); |
| ASSERT_FORTIFY(strcpy(buf, orig)); |
| free(orig); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "glibc is broken"; |
| #endif // __BIONIC__ |
| } |
| |
| // zero sized target with longer source (should fail) |
| TEST_F(DEATHTEST, strcpy3_fortified) { |
| #if defined(__BIONIC__) |
| char buf[0]; |
| char* orig = strdup("1"); |
| ASSERT_FORTIFY(strcpy(buf, orig)); |
| free(orig); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "glibc is broken"; |
| #endif // __BIONIC__ |
| } |
| |
| // one byte target with longer source (should fail) |
| TEST_F(DEATHTEST, strcpy4_fortified) { |
| #if defined(__BIONIC__) |
| char buf[1]; |
| char* orig = strdup("12"); |
| ASSERT_FORTIFY(strcpy(buf, orig)); |
| free(orig); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "glibc is broken"; |
| #endif // __BIONIC__ |
| } |
| |
| TEST_F(DEATHTEST, strlen_fortified) { |
| #if defined(__BIONIC__) |
| char buf[10]; |
| memcpy(buf, "0123456789", sizeof(buf)); |
| ASSERT_FORTIFY(printf("%zd", strlen(buf))); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "glibc is broken"; |
| #endif // __BIONIC__ |
| } |
| |
| TEST_F(DEATHTEST, strchr_fortified) { |
| #if defined(__BIONIC__) |
| char buf[10]; |
| memcpy(buf, "0123456789", sizeof(buf)); |
| ASSERT_FORTIFY(printf("%s", strchr(buf, 'a'))); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "glibc is broken"; |
| #endif // __BIONIC__ |
| } |
| |
| TEST_F(DEATHTEST, strrchr_fortified) { |
| #if defined(__BIONIC__) |
| char buf[10]; |
| memcpy(buf, "0123456789", sizeof(buf)); |
| ASSERT_FORTIFY(printf("%s", strrchr(buf, 'a'))); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "glibc is broken"; |
| #endif // __BIONIC__ |
| } |
| |
| TEST_F(DEATHTEST, strlcpy_fortified) { |
| #if defined(__BIONIC__) |
| char bufa[15]; |
| char bufb[10]; |
| strcpy(bufa, "01234567890123"); |
| size_t n = strlen(bufa); |
| ASSERT_FORTIFY(strlcpy(bufb, bufa, n)); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "strlcpy not available"; |
| #endif // __BIONIC__ |
| } |
| |
| TEST_F(DEATHTEST, strlcat_fortified) { |
| #if defined(__BIONIC__) |
| char bufa[15]; |
| char bufb[10]; |
| bufb[0] = '\0'; |
| strcpy(bufa, "01234567890123"); |
| size_t n = strlen(bufa); |
| ASSERT_FORTIFY(strlcat(bufb, bufa, n)); |
| #else // __BIONIC__ |
| GTEST_SKIP() << "strlcat not available"; |
| #endif // __BIONIC__ |
| } |
| |
| TEST_F(DEATHTEST, sprintf_fortified) { |
| char buf[10]; |
| char source_buf[15]; |
| memcpy(source_buf, "12345678901234", 15); |
| ASSERT_FORTIFY(sprintf(buf, "%s", source_buf)); |
| } |
| |
| TEST_F(DEATHTEST, sprintf_malloc_fortified) { |
| char* buf = static_cast<char*>(malloc(10)); |
| char source_buf[11]; |
| memcpy(source_buf, "1234567890", 11); |
| ASSERT_FORTIFY(sprintf(buf, "%s", source_buf)); |
| free(buf); |
| } |
| |
| TEST_F(DEATHTEST, sprintf2_fortified) { |
| char buf[5]; |
| ASSERT_FORTIFY(sprintf(buf, "aaaaa")); |
| } |
| |
| static int vsprintf_helper(const char* fmt, ...) { |
| va_list va; |
| va_start(va, fmt); |
| char buf[10]; |
| int result = vsprintf(buf, fmt, va); // should crash here |
| va_end(va); |
| return result; |
| } |
| |
| TEST_F(DEATHTEST, vsprintf_fortified) { |
| ASSERT_FORTIFY(vsprintf_helper("%s", "0123456789")); |
| } |
| |
| TEST_F(DEATHTEST, vsprintf2_fortified) { |
| ASSERT_FORTIFY(vsprintf_helper("0123456789")); |
| } |
| |
| static int vsnprintf_helper(const char* fmt, ...) { |
| va_list va; |
| va_start(va, fmt); |
| char buf[10]; |
| volatile size_t size = 11; |
| int result = vsnprintf(buf, size, fmt, va); // should crash here |
| va_end(va); |
| return result; |
| } |
| |
| TEST_F(DEATHTEST, vsnprintf_fortified) { |
| ASSERT_FORTIFY(vsnprintf_helper("%s", "0123456789")); |
| } |
| |
| TEST_F(DEATHTEST, vsnprintf2_fortified) { |
| ASSERT_FORTIFY(vsnprintf_helper("0123456789")); |
| } |
| |
| TEST_F(DEATHTEST, strncat_fortified) { |
| char buf[10]; |
| volatile size_t n = 10; |
| strncpy(buf, "012345678", n); |
| ASSERT_FORTIFY(strncat(buf, "9", n)); |
| } |
| |
| TEST_F(DEATHTEST, strncat2_fortified) { |
| char buf[10]; |
| buf[0] = '\0'; |
| volatile size_t n = 10; |
| ASSERT_FORTIFY(strncat(buf, "0123456789", n)); |
| } |
| |
| TEST_F(DEATHTEST, strcat_fortified) { |
| char src[11]; |
| strcpy(src, "0123456789"); |
| char buf[10]; |
| buf[0] = '\0'; |
| ASSERT_FORTIFY(strcat(buf, src)); |
| } |
| |
| TEST_F(DEATHTEST, memmove_fortified) { |
| char buf[20]; |
| strcpy(buf, "0123456789"); |
| volatile size_t n = 10; |
| ASSERT_FORTIFY(memmove(buf + 11, buf, n)); |
| } |
| |
| TEST_F(DEATHTEST, memcpy_fortified) { |
| char bufa[10]; |
| char bufb[10]; |
| strcpy(bufa, "012345678"); |
| volatile size_t n = 11; |
| ASSERT_FORTIFY(memcpy(bufb, bufa, n)); |
| } |
| |
| TEST_F(DEATHTEST, memset_fortified) { |
| char buf[10]; |
| volatile size_t n = 11; |
| ASSERT_FORTIFY(memset(buf, 0, n)); |
| } |
| |
| TEST_F(DEATHTEST, stpncpy_fortified) { |
| char bufa[15]; |
| char bufb[10]; |
| strcpy(bufa, "01234567890123"); |
| size_t n = strlen(bufa); |
| ASSERT_FORTIFY(stpncpy(bufb, bufa, n)); |
| } |
| |
| TEST_F(DEATHTEST, stpncpy2_fortified) { |
| char dest[11]; |
| char src[10]; |
| memcpy(src, "0123456789", sizeof(src)); // src is not null terminated |
| ASSERT_FORTIFY(stpncpy(dest, src, sizeof(dest))); |
| } |
| |
| TEST_F(DEATHTEST, strncpy_fortified) { |
| char bufa[15]; |
| char bufb[10]; |
| strcpy(bufa, "01234567890123"); |
| size_t n = strlen(bufa); |
| ASSERT_FORTIFY(strncpy(bufb, bufa, n)); |
| } |
| |
| |
| TEST_F(DEATHTEST, strncpy2_fortified) { |
| char dest[11]; |
| char src[10]; |
| memcpy(src, "0123456789", sizeof(src)); // src is not null terminated |
| ASSERT_FORTIFY(strncpy(dest, src, sizeof(dest))); |
| } |
| |
| TEST_F(DEATHTEST, snprintf_fortified) { |
| char bufa[15]; |
| char bufb[10]; |
| strcpy(bufa, "0123456789"); |
| size_t n = strlen(bufa) + 1; |
| ASSERT_FORTIFY(snprintf(bufb, n, "%s", bufa)); |
| } |
| |
| TEST_F(DEATHTEST, bzero_fortified) { |
| char buf[10]; |
| memcpy(buf, "0123456789", sizeof(buf)); |
| size_t n = 11; |
| ASSERT_FORTIFY(bzero(buf, n)); |
| } |
| |
| TEST_F(DEATHTEST, umask_fortified) { |
| volatile mode_t mask = 01777; |
| ASSERT_FORTIFY(umask(mask)); |
| } |
| |
| TEST_F(DEATHTEST, recv_fortified) { |
| volatile size_t data_len = 11; |
| char buf[10]; |
| ASSERT_FORTIFY(recv(0, buf, data_len, 0)); |
| } |
| |
| TEST_F(DEATHTEST, send_fortified) { |
| volatile size_t data_len = 11; |
| char buf[10] = {0}; |
| ASSERT_FORTIFY(send(0, buf, data_len, 0)); |
| } |
| |
| TEST_F(DEATHTEST, FD_ISSET_fortified) { |
| #if defined(__BIONIC__) // glibc catches this at compile-time. |
| fd_set set = {}; |
| ASSERT_FORTIFY(FD_ISSET(-1, &set)); |
| #endif |
| } |
| |
| TEST_F(DEATHTEST, FD_ISSET_2_fortified) { |
| char buf[1]; |
| fd_set* set = (fd_set*) buf; |
| ASSERT_FORTIFY(FD_ISSET(0, set)); |
| } |
| |
| TEST_F(DEATHTEST, getcwd_fortified) { |
| char buf[1]; |
| volatile size_t n = 2; |
| ASSERT_FORTIFY(getcwd(buf, n)); |
| } |
| |
| TEST_F(DEATHTEST, pread_fortified) { |
| char buf[1]; |
| volatile size_t n = 2; |
| int fd = open("/dev/null", O_RDONLY); |
| ASSERT_FORTIFY(pread(fd, buf, n, 0)); |
| close(fd); |
| } |
| |
| TEST_F(DEATHTEST, pread64_fortified) { |
| char buf[1]; |
| volatile size_t n = 2; |
| int fd = open("/dev/null", O_RDONLY); |
| ASSERT_FORTIFY(pread64(fd, buf, n, 0)); |
| close(fd); |
| } |
| |
| TEST_F(DEATHTEST, pwrite_fortified) { |
| char buf[1] = {0}; |
| volatile size_t n = 2; |
| int fd = open("/dev/null", O_WRONLY); |
| ASSERT_FORTIFY(pwrite(fd, buf, n, 0)); |
| close(fd); |
| } |
| |
| TEST_F(DEATHTEST, pwrite64_fortified) { |
| char buf[1] = {0}; |
| volatile size_t n = 2; |
| int fd = open("/dev/null", O_WRONLY); |
| ASSERT_FORTIFY(pwrite64(fd, buf, n, 0)); |
| close(fd); |
| } |
| |
| TEST_F(DEATHTEST, read_fortified) { |
| char buf[1]; |
| volatile size_t n = 2; |
| int fd = open("/dev/null", O_RDONLY); |
| ASSERT_FORTIFY(read(fd, buf, n)); |
| close(fd); |
| } |
| |
| TEST_F(DEATHTEST, write_fortified) { |
| char buf[1] = {0}; |
| volatile size_t n = 2; |
| int fd = open("/dev/null", O_WRONLY); |
| ASSERT_FORTIFY(write(fd, buf, n)); |
| close(fd); |
| } |
| |
| TEST_F(DEATHTEST, fread_fortified) { |
| char buf[1]; |
| volatile size_t n = 2; |
| FILE* fp = fopen("/dev/null", "r"); |
| ASSERT_FORTIFY(fread(buf, 1, n, fp)); |
| fclose(fp); |
| } |
| |
| TEST_F(DEATHTEST, fwrite_fortified) { |
| char buf[1] = {0}; |
| volatile size_t n = 2; |
| FILE* fp = fopen("/dev/null", "w"); |
| ASSERT_FORTIFY(fwrite(buf, 1, n, fp)); |
| fclose(fp); |
| } |
| |
| TEST_F(DEATHTEST, readlink_fortified) { |
| char buf[1]; |
| volatile size_t n = 2; |
| ASSERT_FORTIFY(readlink("/dev/null", buf, n)); |
| } |
| |
| TEST_F(DEATHTEST, readlinkat_fortified) { |
| char buf[1]; |
| volatile size_t n = 2; |
| ASSERT_FORTIFY(readlinkat(AT_FDCWD, "/dev/null", buf, n)); |
| } |
| |
| TEST(TEST_NAME, snprintf_nullptr_valid) { |
| ASSERT_EQ(10, snprintf(nullptr, 0, "0123456789")); |
| } |
| |
| extern "C" char* __strncat_chk(char*, const char*, size_t, size_t); |
| extern "C" char* __strcat_chk(char*, const char*, size_t); |
| |
| TEST(TEST_NAME, strncat) { |
| char buf[10]; |
| memset(buf, 'A', sizeof(buf)); |
| buf[0] = 'a'; |
| buf[1] = '\0'; |
| char* res = __strncat_chk(buf, "01234", sizeof(buf) - strlen(buf) - 1, sizeof(buf)); |
| ASSERT_EQ(buf, res); |
| ASSERT_EQ('a', buf[0]); |
| ASSERT_EQ('0', buf[1]); |
| ASSERT_EQ('1', buf[2]); |
| ASSERT_EQ('2', buf[3]); |
| ASSERT_EQ('3', buf[4]); |
| ASSERT_EQ('4', buf[5]); |
| ASSERT_EQ('\0', buf[6]); |
| ASSERT_EQ('A', buf[7]); |
| ASSERT_EQ('A', buf[8]); |
| ASSERT_EQ('A', buf[9]); |
| } |
| |
| TEST(TEST_NAME, strncat2) { |
| char buf[10]; |
| memset(buf, 'A', sizeof(buf)); |
| buf[0] = 'a'; |
| buf[1] = '\0'; |
| char* res = __strncat_chk(buf, "0123456789", 5, sizeof(buf)); |
| ASSERT_EQ(buf, res); |
| ASSERT_EQ('a', buf[0]); |
| ASSERT_EQ('0', buf[1]); |
| ASSERT_EQ('1', buf[2]); |
| ASSERT_EQ('2', buf[3]); |
| ASSERT_EQ('3', buf[4]); |
| ASSERT_EQ('4', buf[5]); |
| ASSERT_EQ('\0', buf[6]); |
| ASSERT_EQ('A', buf[7]); |
| ASSERT_EQ('A', buf[8]); |
| ASSERT_EQ('A', buf[9]); |
| } |
| |
| TEST(TEST_NAME, strncat3) { |
| char buf[10]; |
| memset(buf, 'A', sizeof(buf)); |
| buf[0] = '\0'; |
| char* res = __strncat_chk(buf, "0123456789", 5, sizeof(buf)); |
| ASSERT_EQ(buf, res); |
| ASSERT_EQ('0', buf[0]); |
| ASSERT_EQ('1', buf[1]); |
| ASSERT_EQ('2', buf[2]); |
| ASSERT_EQ('3', buf[3]); |
| ASSERT_EQ('4', buf[4]); |
| ASSERT_EQ('\0', buf[5]); |
| ASSERT_EQ('A', buf[6]); |
| ASSERT_EQ('A', buf[7]); |
| ASSERT_EQ('A', buf[8]); |
| ASSERT_EQ('A', buf[9]); |
| } |
| |
| TEST(TEST_NAME, strncat4) { |
| char buf[10]; |
| memset(buf, 'A', sizeof(buf)); |
| buf[9] = '\0'; |
| char* res = __strncat_chk(buf, "", 5, sizeof(buf)); |
| ASSERT_EQ(buf, res); |
| ASSERT_EQ('A', buf[0]); |
| ASSERT_EQ('A', buf[1]); |
| ASSERT_EQ('A', buf[2]); |
| ASSERT_EQ('A', buf[3]); |
| ASSERT_EQ('A', buf[4]); |
| ASSERT_EQ('A', buf[5]); |
| ASSERT_EQ('A', buf[6]); |
| ASSERT_EQ('A', buf[7]); |
| ASSERT_EQ('A', buf[8]); |
| ASSERT_EQ('\0', buf[9]); |
| } |
| |
| TEST(TEST_NAME, strncat5) { |
| char buf[10]; |
| memset(buf, 'A', sizeof(buf)); |
| buf[0] = 'a'; |
| buf[1] = '\0'; |
| char* res = __strncat_chk(buf, "01234567", 8, sizeof(buf)); |
| ASSERT_EQ(buf, res); |
| ASSERT_EQ('a', buf[0]); |
| ASSERT_EQ('0', buf[1]); |
| ASSERT_EQ('1', buf[2]); |
| ASSERT_EQ('2', buf[3]); |
| ASSERT_EQ('3', buf[4]); |
| ASSERT_EQ('4', buf[5]); |
| ASSERT_EQ('5', buf[6]); |
| ASSERT_EQ('6', buf[7]); |
| ASSERT_EQ('7', buf[8]); |
| ASSERT_EQ('\0', buf[9]); |
| } |
| |
| TEST(TEST_NAME, strncat6) { |
| char buf[10]; |
| memset(buf, 'A', sizeof(buf)); |
| buf[0] = 'a'; |
| buf[1] = '\0'; |
| char* res = __strncat_chk(buf, "01234567", 9, sizeof(buf)); |
| ASSERT_EQ(buf, res); |
| ASSERT_EQ('a', buf[0]); |
| ASSERT_EQ('0', buf[1]); |
| ASSERT_EQ('1', buf[2]); |
| ASSERT_EQ('2', buf[3]); |
| ASSERT_EQ('3', buf[4]); |
| ASSERT_EQ('4', buf[5]); |
| ASSERT_EQ('5', buf[6]); |
| ASSERT_EQ('6', buf[7]); |
| ASSERT_EQ('7', buf[8]); |
| ASSERT_EQ('\0', buf[9]); |
| } |
| |
| |
| TEST(TEST_NAME, strcat) { |
| char buf[10]; |
| memset(buf, 'A', sizeof(buf)); |
| buf[0] = 'a'; |
| buf[1] = '\0'; |
| char* res = __strcat_chk(buf, "01234", sizeof(buf)); |
| ASSERT_EQ(buf, res); |
| ASSERT_EQ('a', buf[0]); |
| ASSERT_EQ('0', buf[1]); |
| ASSERT_EQ('1', buf[2]); |
| ASSERT_EQ('2', buf[3]); |
| ASSERT_EQ('3', buf[4]); |
| ASSERT_EQ('4', buf[5]); |
| ASSERT_EQ('\0', buf[6]); |
| ASSERT_EQ('A', buf[7]); |
| ASSERT_EQ('A', buf[8]); |
| ASSERT_EQ('A', buf[9]); |
| } |
| |
| TEST(TEST_NAME, strcat2) { |
| char buf[10]; |
| memset(buf, 'A', sizeof(buf)); |
| buf[0] = 'a'; |
| buf[1] = '\0'; |
| char* res = __strcat_chk(buf, "01234567", sizeof(buf)); |
| ASSERT_EQ(buf, res); |
| ASSERT_EQ('a', buf[0]); |
| ASSERT_EQ('0', buf[1]); |
| ASSERT_EQ('1', buf[2]); |
| ASSERT_EQ('2', buf[3]); |
| ASSERT_EQ('3', buf[4]); |
| ASSERT_EQ('4', buf[5]); |
| ASSERT_EQ('5', buf[6]); |
| ASSERT_EQ('6', buf[7]); |
| ASSERT_EQ('7', buf[8]); |
| ASSERT_EQ('\0', buf[9]); |
| } |
| |
| TEST(TEST_NAME, stpncpy) { |
| char src[10]; |
| char dst[10]; |
| memcpy(src, "0123456789", sizeof(src)); // non null terminated string |
| stpncpy(dst, src, sizeof(dst)); |
| ASSERT_EQ('0', dst[0]); |
| ASSERT_EQ('1', dst[1]); |
| ASSERT_EQ('2', dst[2]); |
| ASSERT_EQ('3', dst[3]); |
| ASSERT_EQ('4', dst[4]); |
| ASSERT_EQ('5', dst[5]); |
| ASSERT_EQ('6', dst[6]); |
| ASSERT_EQ('7', dst[7]); |
| ASSERT_EQ('8', dst[8]); |
| ASSERT_EQ('9', dst[9]); |
| } |
| |
| TEST(TEST_NAME, stpncpy2) { |
| char src[10]; |
| char dst[15]; |
| memcpy(src, "012345678\0", sizeof(src)); |
| stpncpy(dst, src, sizeof(dst)); |
| ASSERT_EQ('0', dst[0]); |
| ASSERT_EQ('1', dst[1]); |
| ASSERT_EQ('2', dst[2]); |
| ASSERT_EQ('3', dst[3]); |
| ASSERT_EQ('4', dst[4]); |
| ASSERT_EQ('5', dst[5]); |
| ASSERT_EQ('6', dst[6]); |
| ASSERT_EQ('7', dst[7]); |
| ASSERT_EQ('8', dst[8]); |
| ASSERT_EQ('\0', dst[9]); |
| ASSERT_EQ('\0', dst[10]); |
| ASSERT_EQ('\0', dst[11]); |
| ASSERT_EQ('\0', dst[12]); |
| ASSERT_EQ('\0', dst[13]); |
| ASSERT_EQ('\0', dst[14]); |
| } |
| |
| TEST(TEST_NAME, strncpy) { |
| char src[10]; |
| char dst[10]; |
| memcpy(src, "0123456789", sizeof(src)); // non null terminated string |
| strncpy(dst, src, sizeof(dst)); |
| ASSERT_EQ('0', dst[0]); |
| ASSERT_EQ('1', dst[1]); |
| ASSERT_EQ('2', dst[2]); |
| ASSERT_EQ('3', dst[3]); |
| ASSERT_EQ('4', dst[4]); |
| ASSERT_EQ('5', dst[5]); |
| ASSERT_EQ('6', dst[6]); |
| ASSERT_EQ('7', dst[7]); |
| ASSERT_EQ('8', dst[8]); |
| ASSERT_EQ('9', dst[9]); |
| } |
| |
| TEST(TEST_NAME, strncpy2) { |
| char src[10]; |
| char dst[15]; |
| memcpy(src, "012345678\0", sizeof(src)); |
| strncpy(dst, src, sizeof(dst)); |
| ASSERT_EQ('0', dst[0]); |
| ASSERT_EQ('1', dst[1]); |
| ASSERT_EQ('2', dst[2]); |
| ASSERT_EQ('3', dst[3]); |
| ASSERT_EQ('4', dst[4]); |
| ASSERT_EQ('5', dst[5]); |
| ASSERT_EQ('6', dst[6]); |
| ASSERT_EQ('7', dst[7]); |
| ASSERT_EQ('8', dst[8]); |
| ASSERT_EQ('\0', dst[9]); |
| ASSERT_EQ('\0', dst[10]); |
| ASSERT_EQ('\0', dst[11]); |
| ASSERT_EQ('\0', dst[12]); |
| ASSERT_EQ('\0', dst[13]); |
| ASSERT_EQ('\0', dst[14]); |
| } |
| |
| TEST(TEST_NAME, strcat_chk_max_int_size) { |
| char buf[10]; |
| memset(buf, 'A', sizeof(buf)); |
| buf[0] = 'a'; |
| buf[1] = '\0'; |
| volatile size_t n = -1; |
| char* res = __strcat_chk(buf, "01234567", n); |
| ASSERT_EQ(buf, res); |
| ASSERT_EQ('a', buf[0]); |
| ASSERT_EQ('0', buf[1]); |
| ASSERT_EQ('1', buf[2]); |
| ASSERT_EQ('2', buf[3]); |
| ASSERT_EQ('3', buf[4]); |
| ASSERT_EQ('4', buf[5]); |
| ASSERT_EQ('5', buf[6]); |
| ASSERT_EQ('6', buf[7]); |
| ASSERT_EQ('7', buf[8]); |
| ASSERT_EQ('\0', buf[9]); |
| } |
| |
| TEST(TEST_NAME, mempcpy_chk) { |
| const char input_str[] = "abcdefg"; |
| size_t input_str_size = strlen(input_str) + 1; |
| |
| char buf1[10] = {}; |
| char buf2[10] = {}; |
| |
| __builtin_mempcpy(buf1, input_str, input_str_size); |
| __builtin___mempcpy_chk(buf2, input_str, input_str_size, __bos0(buf2)); |
| |
| ASSERT_EQ(memcmp(buf1, buf2, sizeof(buf2)), 0); |
| |
| void *builtin_ptr = __builtin_mempcpy(buf1, input_str, input_str_size); |
| void *fortify_ptr = __builtin___mempcpy_chk(buf1, input_str, input_str_size, __bos0(buf2)); |
| |
| ASSERT_EQ(builtin_ptr, fortify_ptr); |
| } |
| |
| extern "C" char* __stpcpy_chk(char*, const char*, size_t); |
| |
| TEST(TEST_NAME, stpcpy_chk_max_int_size) { |
| char buf[10]; |
| volatile size_t n = -1; |
| char* res = __stpcpy_chk(buf, "012345678", n); |
| ASSERT_EQ(buf + strlen("012345678"), res); |
| ASSERT_STREQ("012345678", buf); |
| } |
| |
| extern "C" char* __strcpy_chk(char*, const char*, size_t); |
| |
| TEST(TEST_NAME, strcpy_chk_max_int_size) { |
| char buf[10]; |
| volatile size_t n = -1; |
| char* res = __strcpy_chk(buf, "012345678", n); |
| ASSERT_EQ(buf, res); |
| ASSERT_STREQ("012345678", buf); |
| } |
| |
| extern "C" void* __memcpy_chk(void*, const void*, size_t, size_t); |
| |
| TEST(TEST_NAME, memcpy_chk_smaller) { |
| char buf[10] = "XXXXXXXXX"; |
| volatile size_t n = 5; |
| void* res = __memcpy_chk(buf, "012346578", n, sizeof(buf)); |
| ASSERT_EQ((void*)buf, res); |
| ASSERT_EQ('0', buf[0]); |
| ASSERT_EQ('1', buf[1]); |
| ASSERT_EQ('2', buf[2]); |
| ASSERT_EQ('3', buf[3]); |
| ASSERT_EQ('4', buf[4]); |
| ASSERT_EQ('X', buf[5]); |
| ASSERT_EQ('X', buf[6]); |
| ASSERT_EQ('X', buf[7]); |
| ASSERT_EQ('X', buf[8]); |
| ASSERT_EQ('\0', buf[9]); |
| } |
| |
| TEST(TEST_NAME, memcpy_chk_exact_size) { |
| char buf[10] = "XXXXXXXXX"; |
| volatile size_t n = 10; |
| void* res = __memcpy_chk(buf, "012345678", n, sizeof(buf)); |
| ASSERT_EQ((void*)buf, res); |
| ASSERT_EQ('0', buf[0]); |
| ASSERT_EQ('1', buf[1]); |
| ASSERT_EQ('2', buf[2]); |
| ASSERT_EQ('3', buf[3]); |
| ASSERT_EQ('4', buf[4]); |
| ASSERT_EQ('5', buf[5]); |
| ASSERT_EQ('6', buf[6]); |
| ASSERT_EQ('7', buf[7]); |
| ASSERT_EQ('8', buf[8]); |
| ASSERT_EQ('\0', buf[9]); |
| } |
| |
| TEST(TEST_NAME, memcpy_chk_max_int_size) { |
| char buf[10]; |
| volatile size_t n = -1; |
| void* res = __memcpy_chk(buf, "012345678", sizeof(buf), n); |
| ASSERT_EQ((void*)buf, res); |
| ASSERT_EQ('0', buf[0]); |
| ASSERT_EQ('1', buf[1]); |
| ASSERT_EQ('2', buf[2]); |
| ASSERT_EQ('3', buf[3]); |
| ASSERT_EQ('4', buf[4]); |
| ASSERT_EQ('5', buf[5]); |
| ASSERT_EQ('6', buf[6]); |
| ASSERT_EQ('7', buf[7]); |
| ASSERT_EQ('8', buf[8]); |
| ASSERT_EQ('\0', buf[9]); |
| } |
| |
| // Verify that macro expansion is done properly for sprintf/snprintf (which |
| // are defined as macros in stdio.h under clang). |
| #define CONTENTS "macro expansion" |
| #define BUF_AND_SIZE(A) A, sizeof(A) |
| #define BUF_AND_CONTENTS(A) A, CONTENTS |
| #define BUF_AND_SIZE_AND_CONTENTS(A) A, sizeof(A), CONTENTS |
| TEST(TEST_NAME, s_n_printf_macro_expansion) { |
| char buf[BUFSIZ]; |
| snprintf(BUF_AND_SIZE(buf), CONTENTS); |
| EXPECT_STREQ(CONTENTS, buf); |
| |
| snprintf(BUF_AND_SIZE_AND_CONTENTS(buf)); |
| EXPECT_STREQ(CONTENTS, buf); |
| |
| sprintf(BUF_AND_CONTENTS(buf)); |
| EXPECT_STREQ(CONTENTS, buf); |
| } |
| |
| TEST_F(DEATHTEST, poll_fortified) { |
| volatile nfds_t fd_count = 2; |
| pollfd buf[1] = {{0, POLLIN, 0}}; |
| // Set timeout to zero to prevent waiting in poll when fortify test fails. |
| ASSERT_FORTIFY(poll(buf, fd_count, 0)); |
| } |
| |
| TEST_F(DEATHTEST, ppoll_fortified) { |
| volatile nfds_t fd_count = 2; |
| pollfd buf[1] = {{0, POLLIN, 0}}; |
| // Set timeout to zero to prevent waiting in ppoll if fortify test fails. |
| timespec timeout = {}; |
| ASSERT_FORTIFY(ppoll(buf, fd_count, &timeout, nullptr)); |
| } |
| |
| TEST_F(DEATHTEST, ppoll64_fortified) { |
| #if defined(__BIONIC__) // glibc doesn't have ppoll64. |
| volatile nfds_t fd_count = 2; |
| pollfd buf[1] = {{0, POLLIN, 0}}; |
| // Set timeout to zero to prevent waiting in ppoll if fortify test fails. |
| timespec timeout= {}; |
| ASSERT_FORTIFY(ppoll64(buf, fd_count, &timeout, nullptr)); |
| #endif |
| } |
| |
| TEST_F(DEATHTEST, open_O_CREAT_without_mode_fortified) { |
| volatile int flags = O_CREAT; |
| ASSERT_FORTIFY(open("", flags)); |
| } |
| |
| TEST_F(DEATHTEST, open_O_TMPFILE_without_mode_fortified) { |
| volatile int flags = O_TMPFILE; |
| ASSERT_FORTIFY(open("", flags)); |
| } |