blob: 675bab5a6e1ac6d8ce0c07daf8b844ccca8543c4 [file] [log] [blame]
/* Copyright (C) 2004, 2005 Free Software Foundation.
Ensure builtin __strcpy_chk performs correctly. */
extern void abort (void);
typedef __SIZE_TYPE__ size_t;
extern size_t strlen(const char *);
extern void *memcpy (void *, const void *, size_t);
extern char *strcpy (char *, const char *);
extern int memcmp (const void *, const void *, size_t);
#include "chk.h"
LOCAL const char s1[] = "123";
char p[32] = "";
char *s2 = "defg";
char *s3 = "FGH";
char *s4;
size_t l1 = 1;
void
__attribute__((noinline))
test1 (void)
{
chk_calls = 0;
#ifndef __OPTIMIZE_SIZE__
strcpy_disallowed = 1;
#else
strcpy_disallowed = 0;
#endif
if (strcpy (p, "abcde") != p || memcmp (p, "abcde", 6))
abort ();
if (strcpy (p + 16, "vwxyz" + 1) != p + 16 || memcmp (p + 16, "wxyz", 5))
abort ();
if (strcpy (p + 1, "") != p + 1 || memcmp (p, "a\0cde", 6))
abort ();
if (strcpy (p + 3, "fghij") != p + 3 || memcmp (p, "a\0cfghij", 9))
abort ();
/* Test at least one instance of the __builtin_ style. We do this
to ensure that it works and that the prototype is correct. */
if (__builtin_strcpy (p, "abcde") != p || memcmp (p, "abcde", 6))
abort ();
strcpy_disallowed = 0;
if (chk_calls)
abort ();
}
#ifndef MAX_OFFSET
#define MAX_OFFSET (sizeof (long long))
#endif
#ifndef MAX_COPY
#define MAX_COPY (10 * sizeof (long long))
#endif
#ifndef MAX_EXTRA
#define MAX_EXTRA (sizeof (long long))
#endif
#define MAX_LENGTH (MAX_OFFSET + MAX_COPY + 1 + MAX_EXTRA)
/* Use a sequence length that is not divisible by two, to make it more
likely to detect when words are mixed up. */
#define SEQUENCE_LENGTH 31
static union {
char buf[MAX_LENGTH];
long long align_int;
long double align_fp;
} u1, u2;
void
__attribute__((noinline))
test2 (void)
{
int off1, off2, len, i;
char *p, *q, c;
for (off1 = 0; off1 < MAX_OFFSET; off1++)
for (off2 = 0; off2 < MAX_OFFSET; off2++)
for (len = 1; len < MAX_COPY; len++)
{
for (i = 0, c = 'A'; i < MAX_LENGTH; i++, c++)
{
u1.buf[i] = 'a';
if (c >= 'A' + SEQUENCE_LENGTH)
c = 'A';
u2.buf[i] = c;
}
u2.buf[off2 + len] = '\0';
p = strcpy (u1.buf + off1, u2.buf + off2);
if (p != u1.buf + off1)
abort ();
q = u1.buf;
for (i = 0; i < off1; i++, q++)
if (*q != 'a')
abort ();
for (i = 0, c = 'A' + off2; i < len; i++, q++, c++)
{
if (c >= 'A' + SEQUENCE_LENGTH)
c = 'A';
if (*q != c)
abort ();
}
if (*q++ != '\0')
abort ();
for (i = 0; i < MAX_EXTRA; i++, q++)
if (*q != 'a')
abort ();
}
}
/* Test whether compile time checking is done where it should
and so is runtime object size checking. */
void
__attribute__((noinline))
test3 (void)
{
struct A { char buf1[10]; char buf2[10]; } a;
char *r = l1 == 1 ? &a.buf1[5] : &a.buf2[4];
char buf3[20];
int i;
const char *l;
/* The following calls should do runtime checking
- source length is not known, but destination is. */
chk_calls = 0;
strcpy (a.buf1 + 2, s3 + 3);
strcpy (r, s3 + 2);
r = l1 == 1 ? __builtin_alloca (4) : &a.buf2[7];
strcpy (r, s2 + 2);
strcpy (r + 2, s3 + 3);
r = buf3;
for (i = 0; i < 4; ++i)
{
if (i == l1 - 1)
r = &a.buf1[1];
else if (i == l1)
r = &a.buf2[7];
else if (i == l1 + 1)
r = &buf3[5];
else if (i == l1 + 2)
r = &a.buf1[9];
}
strcpy (r, s2 + 4);
if (chk_calls != 5)
abort ();
/* Following have known destination and known source length,
so if optimizing certainly shouldn't result in the checking
variants. */
chk_calls = 0;
strcpy (a.buf1 + 2, "");
strcpy (r, "a");
r = l1 == 1 ? __builtin_alloca (4) : &a.buf2[7];
strcpy (r, s1 + 1);
r = buf3;
l = "abc";
for (i = 0; i < 4; ++i)
{
if (i == l1 - 1)
r = &a.buf1[1], l = "e";
else if (i == l1)
r = &a.buf2[7], l = "gh";
else if (i == l1 + 1)
r = &buf3[5], l = "jkl";
else if (i == l1 + 2)
r = &a.buf1[9], l = "";
}
strcpy (r, "");
/* Here, strlen (l) + 1 is known to be at most 4 and
__builtin_object_size (&buf3[16], 0) is 4, so this doesn't need
runtime checking. */
strcpy (&buf3[16], l);
/* Unknown destination and source, no checking. */
strcpy (s4, s3);
if (chk_calls)
abort ();
chk_calls = 0;
}
/* Test whether runtime and/or compile time checking catches
buffer overflows. */
void
__attribute__((noinline))
test4 (void)
{
struct A { char buf1[10]; char buf2[10]; } a;
char buf3[20];
chk_fail_allowed = 1;
/* Runtime checks. */
if (__builtin_setjmp (chk_fail_buf) == 0)
{
strcpy (&a.buf2[9], s2 + 3);
abort ();
}
if (__builtin_setjmp (chk_fail_buf) == 0)
{
strcpy (&a.buf2[7], s3 + strlen (s3) - 3);
abort ();
}
/* This should be detectable at compile time already. */
if (__builtin_setjmp (chk_fail_buf) == 0)
{
strcpy (&buf3[19], "a");
abort ();
}
chk_fail_allowed = 0;
}
void
main_test (void)
{
#ifndef __OPTIMIZE__
/* Object size checking is only intended for -O[s123]. */
return;
#endif
__asm ("" : "=r" (s2) : "0" (s2));
__asm ("" : "=r" (s3) : "0" (s3));
__asm ("" : "=r" (l1) : "0" (l1));
test1 ();
test2 ();
s4 = p;
test3 ();
test4 ();
}