blob: 8a283626d0f570a69202d2cd0ccef28b4f7328e1 [file] [log] [blame]
/* Copyright (C) 2004, 2005 Free Software Foundation.
Ensure builtin __sprintf_chk performs correctly. */
extern void abort (void);
typedef __SIZE_TYPE__ size_t;
extern size_t strlen(const char *);
extern void *memcpy (void *, const void *, size_t);
extern char *strcpy (char *, const char *);
extern int memcmp (const void *, const void *, size_t);
extern void *memset (void *, int, size_t);
extern int sprintf (char *, const char *, ...);
#include "chk.h"
LOCAL const char s1[] = "123";
char p[32] = "";
char *s2 = "defg";
char *s3 = "FGH";
char *s4;
size_t l1 = 1;
static char buffer[32];
char * volatile ptr = "barf"; /* prevent constant propagation to happen when whole program assumptions are made. */
void
__attribute__((noinline))
test1 (void)
{
chk_calls = 0;
sprintf_disallowed = 1;
memset (buffer, 'A', 32);
sprintf (buffer, "foo");
if (memcmp (buffer, "foo", 4) || buffer[4] != 'A')
abort ();
memset (buffer, 'A', 32);
if (sprintf (buffer, "foo") != 3)
abort ();
if (memcmp (buffer, "foo", 4) || buffer[4] != 'A')
abort ();
memset (buffer, 'A', 32);
sprintf (buffer, "%s", "bar");
if (memcmp (buffer, "bar", 4) || buffer[4] != 'A')
abort ();
memset (buffer, 'A', 32);
if (sprintf (buffer, "%s", "bar") != 3)
abort ();
if (memcmp (buffer, "bar", 4) || buffer[4] != 'A')
abort ();
if (chk_calls)
abort ();
sprintf_disallowed = 0;
memset (buffer, 'A', 32);
sprintf (buffer, "%s", ptr);
if (memcmp (buffer, "barf", 5) || buffer[5] != 'A')
abort ();
memset (buffer, 'A', 32);
sprintf (buffer, "%d - %c", (int) l1 + 27, *ptr);
if (memcmp (buffer, "28 - b\0AAAAA", 12))
abort ();
if (chk_calls != 2)
abort ();
chk_calls = 0;
sprintf (s4, "%d - %c", (int) l1 - 17, ptr[1]);
if (memcmp (s4, "-16 - a", 8))
abort ();
if (chk_calls)
abort ();
}
/* Test whether compile time checking is done where it should
and so is runtime object size checking. */
void
__attribute__((noinline))
test2 (void)
{
struct A { char buf1[10]; char buf2[10]; } a;
char *r = l1 == 1 ? &a.buf1[5] : &a.buf2[4];
char buf3[20];
int i;
/* The following calls should do runtime checking
- source length is not known, but destination is. */
chk_calls = 0;
sprintf (a.buf1 + 2, "%s", s3 + 3);
sprintf (r, "%s%c", s3 + 3, s3[3]);
r = l1 == 1 ? __builtin_alloca (4) : &a.buf2[7];
sprintf (r, "%c %s", s2[2], s2 + 4);
sprintf (r + 2, s3 + 3);
r = buf3;
for (i = 0; i < 4; ++i)
{
if (i == l1 - 1)
r = &a.buf1[1];
else if (i == l1)
r = &a.buf2[7];
else if (i == l1 + 1)
r = &buf3[5];
else if (i == l1 + 2)
r = &a.buf1[9];
}
sprintf (r, s2 + 4);
if (chk_calls != 5)
abort ();
/* Following have known destination and known source length,
so if optimizing certainly shouldn't result in the checking
variants. */
chk_calls = 0;
sprintf_disallowed = 1;
sprintf (a.buf1 + 2, "");
sprintf (r, "a");
r = l1 == 1 ? __builtin_alloca (4) : &a.buf2[7];
sprintf (r, "%s", s1 + 1);
r = buf3;
for (i = 0; i < 4; ++i)
{
if (i == l1 - 1)
r = &a.buf1[1];
else if (i == l1)
r = &a.buf2[7];
else if (i == l1 + 1)
r = &buf3[5];
else if (i == l1 + 2)
r = &a.buf1[9];
}
sprintf (r, "%s", "");
sprintf_disallowed = 0;
/* Unknown destination and source, no checking. */
sprintf (s4, "%s %d", s3, 0);
if (chk_calls)
abort ();
}
/* Test whether runtime and/or compile time checking catches
buffer overflows. */
void
__attribute__((noinline))
test3 (void)
{
struct A { char buf1[10]; char buf2[10]; } a;
char buf3[20];
chk_fail_allowed = 1;
/* Runtime checks. */
if (__builtin_setjmp (chk_fail_buf) == 0)
{
sprintf (&a.buf2[9], "%c%s", s2[3], s2 + 4);
abort ();
}
if (__builtin_setjmp (chk_fail_buf) == 0)
{
sprintf (&a.buf2[7], "%s%c", s3 + strlen (s3) - 2, *s3);
abort ();
}
if (__builtin_setjmp (chk_fail_buf) == 0)
{
sprintf (&a.buf2[7], "%d", (int) l1 + 9999);
abort ();
}
/* This should be detectable at compile time already. */
if (__builtin_setjmp (chk_fail_buf) == 0)
{
sprintf (&buf3[19], "a");
abort ();
}
if (__builtin_setjmp (chk_fail_buf) == 0)
{
sprintf (&buf3[17], "%s", "abc");
abort ();
}
chk_fail_allowed = 0;
}
void
main_test (void)
{
#ifndef __OPTIMIZE__
/* Object size checking is only intended for -O[s123]. */
return;
#endif
__asm ("" : "=r" (s2) : "0" (s2));
__asm ("" : "=r" (s3) : "0" (s3));
__asm ("" : "=r" (l1) : "0" (l1));
s4 = p;
test1 ();
test2 ();
test3 ();
}