blob: abe2cae5a06bf237e7237352cce4ba208a4278cc [file] [log] [blame]
Nick Kralevich5bcf3982013-06-28 10:34:09 -07001/*
2 * Copyright (C) 2013 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
18#include <string.h>
19#include <stdarg.h>
Nick Kralevicha6cde392013-06-29 08:15:25 -070020#include <sys/types.h>
21#include <sys/stat.h>
Nick Kralevich60f4f9a2013-09-24 16:32:07 -070022#include <sys/socket.h>
Nick Kralevichb91791d2013-10-02 14:14:40 -070023#include <malloc.h>
Nick Kralevich5bcf3982013-06-28 10:34:09 -070024
25// We have to say "DeathTest" here so gtest knows to run this test (which exits)
26// in its own process. Unfortunately, the C preprocessor doesn't give us an
27// easy way to concatenate strings, so we need to use the complicated method
28// below. *sigh*
29#define DEATHTEST_PASTER(name) name##_DeathTest
30#define DEATHTEST_EVALUATOR(name) DEATHTEST_PASTER(name)
31#define DEATHTEST DEATHTEST_EVALUATOR(TEST_NAME)
32
33#if defined(_FORTIFY_SOURCE) && _FORTIFY_SOURCE == 2
34struct foo {
35 char empty[0];
36 char one[1];
37 char a[10];
38 char b[10];
39};
40
41#ifndef __clang__
42// This test is disabled in clang because clang doesn't properly detect
43// this buffer overflow. TODO: Fix clang.
44TEST(DEATHTEST, strncpy_fortified2) {
45 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
46 foo myfoo;
47 int copy_amt = atoi("11");
48 ASSERT_EXIT(strncpy(myfoo.a, "01234567890", copy_amt),
49 testing::KilledBySignal(SIGABRT), "");
50}
51#endif
52
53#ifndef __clang__
54// This test is disabled in clang because clang doesn't properly detect
55// this buffer overflow. TODO: Fix clang.
Nick Kralevich93501d32013-08-28 10:47:43 -070056TEST(DEATHTEST, strncpy2_fortified2) {
57 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
58 foo myfoo;
59 memset(&myfoo, 0, sizeof(myfoo));
60 myfoo.one[0] = 'A'; // not null terminated string
61 ASSERT_EXIT(strncpy(myfoo.b, myfoo.one, sizeof(myfoo.b)),
62 testing::KilledBySignal(SIGABRT), "");
63}
64#endif
65
66#ifndef __clang__
67// This test is disabled in clang because clang doesn't properly detect
68// this buffer overflow. TODO: Fix clang.
Nick Kralevich5bcf3982013-06-28 10:34:09 -070069TEST(DEATHTEST, sprintf_fortified2) {
70 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
71 foo myfoo;
72 char source_buf[15];
73 memcpy(source_buf, "12345678901234", 15);
74 ASSERT_EXIT(sprintf(myfoo.a, "%s", source_buf),
75 testing::KilledBySignal(SIGABRT), "");
76}
77#endif
78
79#ifndef __clang__
80// This test is disabled in clang because clang doesn't properly detect
81// this buffer overflow. TODO: Fix clang.
82TEST(DEATHTEST, sprintf2_fortified2) {
83 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
84 foo myfoo;
85 ASSERT_EXIT(sprintf(myfoo.a, "0123456789"),
86 testing::KilledBySignal(SIGABRT), "");
87}
88#endif
89
90#ifndef __clang__
91// These tests are disabled in clang because clang doesn't properly detect
92// this buffer overflow. TODO: Fix clang.
93static int vsprintf_helper2(const char *fmt, ...) {
94 foo myfoo;
95 va_list va;
96 int result;
97
98 va_start(va, fmt);
99 result = vsprintf(myfoo.a, fmt, va); // should crash here
100 va_end(va);
101 return result;
102}
103
104TEST(DEATHTEST, vsprintf_fortified2) {
105 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
106 ASSERT_EXIT(vsprintf_helper2("%s", "0123456789"), testing::KilledBySignal(SIGABRT), "");
107}
108
109TEST(DEATHTEST, vsprintf2_fortified2) {
110 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
111 ASSERT_EXIT(vsprintf_helper2("0123456789"), testing::KilledBySignal(SIGABRT), "");
112}
113#endif
114
115#ifndef __clang__
116// These tests are disabled in clang because clang doesn't properly detect
117// this buffer overflow. TODO: Fix clang.
118static int vsnprintf_helper2(const char *fmt, ...) {
119 foo myfoo;
120 va_list va;
121 int result;
122 size_t size = atoi("11");
123
124 va_start(va, fmt);
125 result = vsnprintf(myfoo.a, size, fmt, va); // should crash here
126 va_end(va);
127 return result;
128}
129
130TEST(DEATHTEST, vsnprintf_fortified2) {
131 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
132 ASSERT_EXIT(vsnprintf_helper2("%s", "0123456789"), testing::KilledBySignal(SIGABRT), "");
133}
134
135TEST(DEATHTEST, vsnprintf2_fortified2) {
136 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
137 ASSERT_EXIT(vsnprintf_helper2("0123456789"), testing::KilledBySignal(SIGABRT), "");
138}
139#endif
140
141#if __BIONIC__
142
143#ifndef __clang__
144// zero sized target with "\0" source (should fail)
145// This test is disabled in clang because clang doesn't properly detect
146// this buffer overflow. TODO: Fix clang.
147TEST(DEATHTEST, strcpy_fortified2) {
148 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
149 foo myfoo;
150 char* src = strdup("");
151 ASSERT_EXIT(strcpy(myfoo.empty, src),
152 testing::KilledBySignal(SIGABRT), "");
153 free(src);
154}
155#endif
156
157#ifndef __clang__
158// zero sized target with longer source (should fail)
159// This test is disabled in clang because clang doesn't properly detect
160// this buffer overflow. TODO: Fix clang.
161TEST(DEATHTEST, strcpy2_fortified2) {
162 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
163 foo myfoo;
164 char* src = strdup("1");
165 ASSERT_EXIT(strcpy(myfoo.empty, src),
166 testing::KilledBySignal(SIGABRT), "");
167 free(src);
168}
169#endif
170
171#ifndef __clang__
172// one byte target with longer source (should fail)
173// This test is disabled in clang because clang doesn't properly detect
174// this buffer overflow. TODO: Fix clang.
175TEST(DEATHTEST, strcpy3_fortified2) {
176 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
177 foo myfoo;
178 char* src = strdup("12");
179 ASSERT_EXIT(strcpy(myfoo.one, src),
180 testing::KilledBySignal(SIGABRT), "");
181 free(src);
182}
183#endif
184
185#ifndef __clang__
186// This test is disabled in clang because clang doesn't properly detect
187// this buffer overflow. TODO: Fix clang.
188TEST(DEATHTEST, strchr_fortified2) {
189 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
190 foo myfoo;
191 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a));
192 myfoo.b[0] = '\0';
193 ASSERT_EXIT(printf("%s", strchr(myfoo.a, 'a')),
194 testing::KilledBySignal(SIGABRT), "");
195}
196#endif
197
198#ifndef __clang__
199// This test is disabled in clang because clang doesn't properly detect
200// this buffer overflow. TODO: Fix clang.
201TEST(DEATHTEST, strrchr_fortified2) {
202 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
203 foo myfoo;
204 memcpy(myfoo.a, "0123456789", 10);
205 memcpy(myfoo.b, "01234", 6);
206 ASSERT_EXIT(printf("%s", strrchr(myfoo.a, 'a')),
207 testing::KilledBySignal(SIGABRT), "");
208}
209#endif
210
211#ifndef __clang__
212// This test is disabled in clang because clang doesn't properly detect
213// this buffer overflow. TODO: Fix clang.
214TEST(DEATHTEST, strlcpy_fortified2) {
215 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
216 foo myfoo;
217 strcpy(myfoo.a, "01");
218 size_t n = strlen(myfoo.a);
219 ASSERT_EXIT(strlcpy(myfoo.one, myfoo.a, n),
220 testing::KilledBySignal(SIGABRT), "");
221}
222#endif
223
Nick Kralevicha6cde392013-06-29 08:15:25 -0700224#ifndef __clang__
225// This test is disabled in clang because clang doesn't properly detect
226// this buffer overflow. TODO: Fix clang.
227TEST(DEATHTEST, strlcat_fortified2) {
228 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
229 foo myfoo;
230 strcpy(myfoo.a, "01");
231 myfoo.one[0] = '\0';
232 size_t n = strlen(myfoo.a);
233 ASSERT_EXIT(strlcat(myfoo.one, myfoo.a, n),
234 testing::KilledBySignal(SIGABRT), "");
235}
236#endif
237
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700238#endif /* __BIONIC__ */
239
240#ifndef __clang__
241// This test is disabled in clang because clang doesn't properly detect
242// this buffer overflow. TODO: Fix clang.
243TEST(DEATHTEST, strncat_fortified2) {
244 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
245 foo myfoo;
246 size_t n = atoi("10"); // avoid compiler optimizations
247 strncpy(myfoo.a, "012345678", n);
248 ASSERT_EXIT(strncat(myfoo.a, "9", n), testing::KilledBySignal(SIGABRT), "");
249}
250#endif
251
252#ifndef __clang__
253// This test is disabled in clang because clang doesn't properly detect
254// this buffer overflow. TODO: Fix clang.
255TEST(DEATHTEST, strncat2_fortified2) {
256 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
257 foo myfoo;
258 myfoo.a[0] = '\0';
259 size_t n = atoi("10"); // avoid compiler optimizations
260 ASSERT_EXIT(strncat(myfoo.a, "0123456789", n), testing::KilledBySignal(SIGABRT), "");
261}
262#endif
263
264TEST(DEATHTEST, strncat3_fortified2) {
265 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
266 foo myfoo;
267 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a)); // unterminated string
268 myfoo.b[0] = '\0';
269 size_t n = atoi("10"); // avoid compiler optimizations
270 ASSERT_EXIT(strncat(myfoo.b, myfoo.a, n), testing::KilledBySignal(SIGABRT), "");
271}
272
273#ifndef __clang__
274// This test is disabled in clang because clang doesn't properly detect
275// this buffer overflow. TODO: Fix clang.
276TEST(DEATHTEST, strcat_fortified2) {
277 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
278 char src[11];
279 strcpy(src, "0123456789");
280 foo myfoo;
281 myfoo.a[0] = '\0';
282 ASSERT_EXIT(strcat(myfoo.a, src), testing::KilledBySignal(SIGABRT), "");
283}
284#endif
285
286TEST(DEATHTEST, strcat2_fortified2) {
287 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
288 foo myfoo;
289 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a)); // unterminated string
290 myfoo.b[0] = '\0';
291 ASSERT_EXIT(strcat(myfoo.b, myfoo.a), testing::KilledBySignal(SIGABRT), "");
292}
293
294TEST(DEATHTEST, snprintf_fortified2) {
295 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
296 foo myfoo;
297 strcpy(myfoo.a, "012345678");
298 size_t n = strlen(myfoo.a) + 2;
299 ASSERT_EXIT(snprintf(myfoo.b, n, "a%s", myfoo.a), testing::KilledBySignal(SIGABRT), "");
300}
301
Nick Kralevicha6cde392013-06-29 08:15:25 -0700302TEST(DEATHTEST, bzero_fortified2) {
303 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
304 foo myfoo;
305 memcpy(myfoo.b, "0123456789", sizeof(myfoo.b));
306 size_t n = atoi("11");
307 ASSERT_EXIT(bzero(myfoo.b, n), testing::KilledBySignal(SIGABRT), "");
308}
309
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700310#endif /* defined(_FORTIFY_SOURCE) && _FORTIFY_SOURCE=2 */
311
312#if __BIONIC__
313// multibyte target where we over fill (should fail)
314TEST(DEATHTEST, strcpy_fortified) {
315 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
316 char buf[10];
317 char *orig = strdup("0123456789");
318 ASSERT_EXIT(strcpy(buf, orig), testing::KilledBySignal(SIGABRT), "");
319 free(orig);
320}
321
322// zero sized target with "\0" source (should fail)
323TEST(DEATHTEST, strcpy2_fortified) {
324 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
325 char buf[0];
326 char *orig = strdup("");
327 ASSERT_EXIT(strcpy(buf, orig), testing::KilledBySignal(SIGABRT), "");
328 free(orig);
329}
330
331// zero sized target with longer source (should fail)
332TEST(DEATHTEST, strcpy3_fortified) {
333 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
334 char buf[0];
335 char *orig = strdup("1");
336 ASSERT_EXIT(strcpy(buf, orig), testing::KilledBySignal(SIGABRT), "");
337 free(orig);
338}
339
340// one byte target with longer source (should fail)
341TEST(DEATHTEST, strcpy4_fortified) {
342 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
343 char buf[1];
344 char *orig = strdup("12");
345 ASSERT_EXIT(strcpy(buf, orig), testing::KilledBySignal(SIGABRT), "");
346 free(orig);
347}
348
349TEST(DEATHTEST, strlen_fortified) {
350 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
351 char buf[10];
352 memcpy(buf, "0123456789", sizeof(buf));
Elliott Hughes5b9310e2013-10-02 16:59:05 -0700353 ASSERT_EXIT(printf("%zd", strlen(buf)), testing::KilledBySignal(SIGABRT), "");
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700354}
355
356TEST(DEATHTEST, strchr_fortified) {
357 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
358 char buf[10];
359 memcpy(buf, "0123456789", sizeof(buf));
360 ASSERT_EXIT(printf("%s", strchr(buf, 'a')), testing::KilledBySignal(SIGABRT), "");
361}
362
363TEST(DEATHTEST, strrchr_fortified) {
364 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
365 char buf[10];
366 memcpy(buf, "0123456789", sizeof(buf));
367 ASSERT_EXIT(printf("%s", strrchr(buf, 'a')), testing::KilledBySignal(SIGABRT), "");
368}
369
370TEST(DEATHTEST, strlcpy_fortified) {
371 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
372 char bufa[15];
373 char bufb[10];
374 strcpy(bufa, "01234567890123");
375 size_t n = strlen(bufa);
376 ASSERT_EXIT(strlcpy(bufb, bufa, n), testing::KilledBySignal(SIGABRT), "");
377}
378
Nick Kralevicha6cde392013-06-29 08:15:25 -0700379TEST(DEATHTEST, strlcat_fortified) {
380 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
381 char bufa[15];
382 char bufb[10];
383 bufb[0] = '\0';
384 strcpy(bufa, "01234567890123");
385 size_t n = strlen(bufa);
386 ASSERT_EXIT(strlcat(bufb, bufa, n), testing::KilledBySignal(SIGABRT), "");
387}
388
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700389#endif
390
391TEST(DEATHTEST, sprintf_fortified) {
392 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
393 char buf[10];
394 char source_buf[15];
395 memcpy(source_buf, "12345678901234", 15);
396 ASSERT_EXIT(sprintf(buf, "%s", source_buf), testing::KilledBySignal(SIGABRT), "");
397}
398
Nick Kralevichb91791d2013-10-02 14:14:40 -0700399#ifndef __clang__
400// This test is disabled in clang because clang doesn't properly detect
401// this buffer overflow. TODO: Fix clang.
402TEST(DEATHTEST, sprintf_malloc_fortified) {
403 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
404 char* buf = (char *) malloc(10);
405 char source_buf[11];
406 memcpy(source_buf, "1234567890", 11);
407 ASSERT_EXIT(sprintf(buf, "%s", source_buf), testing::KilledBySignal(SIGABRT), "");
408 free(buf);
409}
410#endif
411
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700412TEST(DEATHTEST, sprintf2_fortified) {
413 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
414 char buf[5];
415 ASSERT_EXIT(sprintf(buf, "aaaaa"), testing::KilledBySignal(SIGABRT), "");
416}
417
418static int vsprintf_helper(const char *fmt, ...) {
419 char buf[10];
420 va_list va;
421 int result;
422
423 va_start(va, fmt);
424 result = vsprintf(buf, fmt, va); // should crash here
425 va_end(va);
426 return result;
427}
428
429TEST(DEATHTEST, vsprintf_fortified) {
430 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
431 ASSERT_EXIT(vsprintf_helper("%s", "0123456789"), testing::KilledBySignal(SIGABRT), "");
432}
433
434TEST(DEATHTEST, vsprintf2_fortified) {
435 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
436 ASSERT_EXIT(vsprintf_helper("0123456789"), testing::KilledBySignal(SIGABRT), "");
437}
438
439static int vsnprintf_helper(const char *fmt, ...) {
440 char buf[10];
441 va_list va;
442 int result;
443 size_t size = atoi("11");
444
445 va_start(va, fmt);
446 result = vsnprintf(buf, size, fmt, va); // should crash here
447 va_end(va);
448 return result;
449}
450
451TEST(DEATHTEST, vsnprintf_fortified) {
452 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
453 ASSERT_EXIT(vsnprintf_helper("%s", "0123456789"), testing::KilledBySignal(SIGABRT), "");
454}
455
456TEST(DEATHTEST, vsnprintf2_fortified) {
457 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
458 ASSERT_EXIT(vsnprintf_helper("0123456789"), testing::KilledBySignal(SIGABRT), "");
459}
460
461TEST(DEATHTEST, strncat_fortified) {
462 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
463 char buf[10];
464 size_t n = atoi("10"); // avoid compiler optimizations
465 strncpy(buf, "012345678", n);
466 ASSERT_EXIT(strncat(buf, "9", n), testing::KilledBySignal(SIGABRT), "");
467}
468
469TEST(DEATHTEST, strncat2_fortified) {
470 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
471 char buf[10];
472 buf[0] = '\0';
473 size_t n = atoi("10"); // avoid compiler optimizations
474 ASSERT_EXIT(strncat(buf, "0123456789", n), testing::KilledBySignal(SIGABRT), "");
475}
476
477TEST(DEATHTEST, strcat_fortified) {
478 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
479 char src[11];
480 strcpy(src, "0123456789");
481 char buf[10];
482 buf[0] = '\0';
483 ASSERT_EXIT(strcat(buf, src), testing::KilledBySignal(SIGABRT), "");
484}
485
486TEST(DEATHTEST, memmove_fortified) {
487 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
488 char buf[20];
489 strcpy(buf, "0123456789");
490 size_t n = atoi("10");
491 ASSERT_EXIT(memmove(buf + 11, buf, n), testing::KilledBySignal(SIGABRT), "");
492}
493
494TEST(DEATHTEST, memcpy_fortified) {
495 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
496 char bufa[10];
497 char bufb[10];
498 strcpy(bufa, "012345678");
499 size_t n = atoi("11");
500 ASSERT_EXIT(memcpy(bufb, bufa, n), testing::KilledBySignal(SIGABRT), "");
501}
502
503TEST(DEATHTEST, strncpy_fortified) {
504 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
505 char bufa[15];
506 char bufb[10];
507 strcpy(bufa, "01234567890123");
508 size_t n = strlen(bufa);
509 ASSERT_EXIT(strncpy(bufb, bufa, n), testing::KilledBySignal(SIGABRT), "");
510}
511
Nick Kralevich93501d32013-08-28 10:47:43 -0700512TEST(DEATHTEST, strncpy2_fortified) {
513 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
514 char dest[11];
515 char src[10];
516 memcpy(src, "0123456789", sizeof(src)); // src is not null terminated
517 ASSERT_EXIT(strncpy(dest, src, sizeof(dest)), testing::KilledBySignal(SIGABRT), "");
518}
519
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700520TEST(DEATHTEST, snprintf_fortified) {
521 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
522 char bufa[15];
523 char bufb[10];
524 strcpy(bufa, "0123456789");
525 size_t n = strlen(bufa) + 1;
526 ASSERT_EXIT(snprintf(bufb, n, "%s", bufa), testing::KilledBySignal(SIGABRT), "");
527}
528
Nick Kralevicha6cde392013-06-29 08:15:25 -0700529TEST(DEATHTEST, bzero_fortified) {
530 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
531 char buf[10];
532 memcpy(buf, "0123456789", sizeof(buf));
533 size_t n = atoi("11");
534 ASSERT_EXIT(bzero(buf, n), testing::KilledBySignal(SIGABRT), "");
535}
536
537TEST(DEATHTEST, umask_fortified) {
538 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
539 mode_t mask = atoi("1023"); // 01777 in octal
540 ASSERT_EXIT(umask(mask), testing::KilledBySignal(SIGABRT), "");
541}
542
Nick Kralevich60f4f9a2013-09-24 16:32:07 -0700543TEST(DEATHTEST, recv_fortified) {
544 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
545 size_t data_len = atoi("11"); // suppress compiler optimizations
546 char buf[10];
547 ASSERT_EXIT(recv(0, buf, data_len, 0), testing::KilledBySignal(SIGABRT), "");
548}
549
Nick Kralevich90201d52013-10-02 16:11:30 -0700550TEST(DEATHTEST, FD_ISSET_fortified) {
551 ::testing::FLAGS_gtest_death_test_style = "threadsafe";
552 fd_set set;
553 memset(&set, 0, sizeof(set));
554 ASSERT_EXIT(FD_ISSET(-1, &set), testing::KilledBySignal(SIGABRT), "");
555}
556
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700557extern "C" char* __strncat_chk(char*, const char*, size_t, size_t);
558extern "C" char* __strcat_chk(char*, const char*, size_t);
559
560TEST(TEST_NAME, strncat) {
561 char buf[10];
562 memset(buf, 'A', sizeof(buf));
563 buf[0] = 'a';
564 buf[1] = '\0';
565 char* res = __strncat_chk(buf, "01234", sizeof(buf) - strlen(buf) - 1, sizeof(buf));
566 ASSERT_EQ(buf, res);
567 ASSERT_EQ('a', buf[0]);
568 ASSERT_EQ('0', buf[1]);
569 ASSERT_EQ('1', buf[2]);
570 ASSERT_EQ('2', buf[3]);
571 ASSERT_EQ('3', buf[4]);
572 ASSERT_EQ('4', buf[5]);
573 ASSERT_EQ('\0', buf[6]);
574 ASSERT_EQ('A', buf[7]);
575 ASSERT_EQ('A', buf[8]);
576 ASSERT_EQ('A', buf[9]);
577}
578
579TEST(TEST_NAME, strncat2) {
580 char buf[10];
581 memset(buf, 'A', sizeof(buf));
582 buf[0] = 'a';
583 buf[1] = '\0';
584 char* res = __strncat_chk(buf, "0123456789", 5, sizeof(buf));
585 ASSERT_EQ(buf, res);
586 ASSERT_EQ('a', buf[0]);
587 ASSERT_EQ('0', buf[1]);
588 ASSERT_EQ('1', buf[2]);
589 ASSERT_EQ('2', buf[3]);
590 ASSERT_EQ('3', buf[4]);
591 ASSERT_EQ('4', buf[5]);
592 ASSERT_EQ('\0', buf[6]);
593 ASSERT_EQ('A', buf[7]);
594 ASSERT_EQ('A', buf[8]);
595 ASSERT_EQ('A', buf[9]);
596}
597
598TEST(TEST_NAME, strncat3) {
599 char buf[10];
600 memset(buf, 'A', sizeof(buf));
601 buf[0] = '\0';
602 char* res = __strncat_chk(buf, "0123456789", 5, sizeof(buf));
603 ASSERT_EQ(buf, res);
604 ASSERT_EQ('0', buf[0]);
605 ASSERT_EQ('1', buf[1]);
606 ASSERT_EQ('2', buf[2]);
607 ASSERT_EQ('3', buf[3]);
608 ASSERT_EQ('4', buf[4]);
609 ASSERT_EQ('\0', buf[5]);
610 ASSERT_EQ('A', buf[6]);
611 ASSERT_EQ('A', buf[7]);
612 ASSERT_EQ('A', buf[8]);
613 ASSERT_EQ('A', buf[9]);
614}
615
616TEST(TEST_NAME, strncat4) {
617 char buf[10];
618 memset(buf, 'A', sizeof(buf));
619 buf[9] = '\0';
620 char* res = __strncat_chk(buf, "", 5, sizeof(buf));
621 ASSERT_EQ(buf, res);
622 ASSERT_EQ('A', buf[0]);
623 ASSERT_EQ('A', buf[1]);
624 ASSERT_EQ('A', buf[2]);
625 ASSERT_EQ('A', buf[3]);
626 ASSERT_EQ('A', buf[4]);
627 ASSERT_EQ('A', buf[5]);
628 ASSERT_EQ('A', buf[6]);
629 ASSERT_EQ('A', buf[7]);
630 ASSERT_EQ('A', buf[8]);
631 ASSERT_EQ('\0', buf[9]);
632}
633
634TEST(TEST_NAME, strncat5) {
635 char buf[10];
636 memset(buf, 'A', sizeof(buf));
637 buf[0] = 'a';
638 buf[1] = '\0';
639 char* res = __strncat_chk(buf, "01234567", 8, sizeof(buf));
640 ASSERT_EQ(buf, res);
641 ASSERT_EQ('a', buf[0]);
642 ASSERT_EQ('0', buf[1]);
643 ASSERT_EQ('1', buf[2]);
644 ASSERT_EQ('2', buf[3]);
645 ASSERT_EQ('3', buf[4]);
646 ASSERT_EQ('4', buf[5]);
647 ASSERT_EQ('5', buf[6]);
648 ASSERT_EQ('6', buf[7]);
649 ASSERT_EQ('7', buf[8]);
650 ASSERT_EQ('\0', buf[9]);
651}
652
653TEST(TEST_NAME, strncat6) {
654 char buf[10];
655 memset(buf, 'A', sizeof(buf));
656 buf[0] = 'a';
657 buf[1] = '\0';
658 char* res = __strncat_chk(buf, "01234567", 9, sizeof(buf));
659 ASSERT_EQ(buf, res);
660 ASSERT_EQ('a', buf[0]);
661 ASSERT_EQ('0', buf[1]);
662 ASSERT_EQ('1', buf[2]);
663 ASSERT_EQ('2', buf[3]);
664 ASSERT_EQ('3', buf[4]);
665 ASSERT_EQ('4', buf[5]);
666 ASSERT_EQ('5', buf[6]);
667 ASSERT_EQ('6', buf[7]);
668 ASSERT_EQ('7', buf[8]);
669 ASSERT_EQ('\0', buf[9]);
670}
671
672
673TEST(TEST_NAME, strcat) {
674 char buf[10];
675 memset(buf, 'A', sizeof(buf));
676 buf[0] = 'a';
677 buf[1] = '\0';
678 char* res = __strcat_chk(buf, "01234", sizeof(buf));
679 ASSERT_EQ(buf, res);
680 ASSERT_EQ('a', buf[0]);
681 ASSERT_EQ('0', buf[1]);
682 ASSERT_EQ('1', buf[2]);
683 ASSERT_EQ('2', buf[3]);
684 ASSERT_EQ('3', buf[4]);
685 ASSERT_EQ('4', buf[5]);
686 ASSERT_EQ('\0', buf[6]);
687 ASSERT_EQ('A', buf[7]);
688 ASSERT_EQ('A', buf[8]);
689 ASSERT_EQ('A', buf[9]);
690}
691
692TEST(TEST_NAME, strcat2) {
693 char buf[10];
694 memset(buf, 'A', sizeof(buf));
695 buf[0] = 'a';
696 buf[1] = '\0';
697 char* res = __strcat_chk(buf, "01234567", sizeof(buf));
698 ASSERT_EQ(buf, res);
699 ASSERT_EQ('a', buf[0]);
700 ASSERT_EQ('0', buf[1]);
701 ASSERT_EQ('1', buf[2]);
702 ASSERT_EQ('2', buf[3]);
703 ASSERT_EQ('3', buf[4]);
704 ASSERT_EQ('4', buf[5]);
705 ASSERT_EQ('5', buf[6]);
706 ASSERT_EQ('6', buf[7]);
707 ASSERT_EQ('7', buf[8]);
708 ASSERT_EQ('\0', buf[9]);
709}
Nick Kralevich93501d32013-08-28 10:47:43 -0700710
711TEST(TEST_NAME, strncpy) {
712 char src[10];
713 char dst[10];
714 memcpy(src, "0123456789", sizeof(src)); // non null terminated string
715 strncpy(dst, src, sizeof(dst));
716 ASSERT_EQ('0', dst[0]);
717 ASSERT_EQ('1', dst[1]);
718 ASSERT_EQ('2', dst[2]);
719 ASSERT_EQ('3', dst[3]);
720 ASSERT_EQ('4', dst[4]);
721 ASSERT_EQ('5', dst[5]);
722 ASSERT_EQ('6', dst[6]);
723 ASSERT_EQ('7', dst[7]);
724 ASSERT_EQ('8', dst[8]);
725 ASSERT_EQ('9', dst[9]);
726}
727
728TEST(TEST_NAME, strncpy2) {
729 char src[10];
730 char dst[15];
731 memcpy(src, "012345678\0", sizeof(src));
732 strncpy(dst, src, sizeof(dst));
733 ASSERT_EQ('0', dst[0]);
734 ASSERT_EQ('1', dst[1]);
735 ASSERT_EQ('2', dst[2]);
736 ASSERT_EQ('3', dst[3]);
737 ASSERT_EQ('4', dst[4]);
738 ASSERT_EQ('5', dst[5]);
739 ASSERT_EQ('6', dst[6]);
740 ASSERT_EQ('7', dst[7]);
741 ASSERT_EQ('8', dst[8]);
742 ASSERT_EQ('\0', dst[9]);
743 ASSERT_EQ('\0', dst[10]);
744 ASSERT_EQ('\0', dst[11]);
745 ASSERT_EQ('\0', dst[12]);
746 ASSERT_EQ('\0', dst[13]);
747 ASSERT_EQ('\0', dst[14]);
748}
Christopher Ferris16e185c2013-09-10 16:56:34 -0700749
750TEST(TEST_NAME, strcat_chk_max_int_size) {
751 char buf[10];
752 memset(buf, 'A', sizeof(buf));
753 buf[0] = 'a';
754 buf[1] = '\0';
755 char* res = __strcat_chk(buf, "01234567", (size_t)-1);
756 ASSERT_EQ(buf, res);
757 ASSERT_EQ('a', buf[0]);
758 ASSERT_EQ('0', buf[1]);
759 ASSERT_EQ('1', buf[2]);
760 ASSERT_EQ('2', buf[3]);
761 ASSERT_EQ('3', buf[4]);
762 ASSERT_EQ('4', buf[5]);
763 ASSERT_EQ('5', buf[6]);
764 ASSERT_EQ('6', buf[7]);
765 ASSERT_EQ('7', buf[8]);
766 ASSERT_EQ('\0', buf[9]);
767}
768
769extern "C" char* __strcpy_chk(char*, const char*, size_t);
770
771TEST(TEST_NAME, strcpy_chk_max_int_size) {
772 char buf[10];
773 char* res = __strcpy_chk(buf, "012345678", (size_t)-1);
774 ASSERT_EQ(buf, res);
775 ASSERT_EQ('0', buf[0]);
776 ASSERT_EQ('1', buf[1]);
777 ASSERT_EQ('2', buf[2]);
778 ASSERT_EQ('3', buf[3]);
779 ASSERT_EQ('4', buf[4]);
780 ASSERT_EQ('5', buf[5]);
781 ASSERT_EQ('6', buf[6]);
782 ASSERT_EQ('7', buf[7]);
783 ASSERT_EQ('8', buf[8]);
784 ASSERT_EQ('\0', buf[9]);
785}
786
787extern "C" void* __memcpy_chk(void*, const void*, size_t, size_t);
788
789TEST(TEST_NAME, memcpy_chk_max_int_size) {
790 char buf[10];
791 void* res = __memcpy_chk(buf, "012345678", sizeof(buf), (size_t)-1);
792 ASSERT_EQ((void*)buf, res);
793 ASSERT_EQ('0', buf[0]);
794 ASSERT_EQ('1', buf[1]);
795 ASSERT_EQ('2', buf[2]);
796 ASSERT_EQ('3', buf[3]);
797 ASSERT_EQ('4', buf[4]);
798 ASSERT_EQ('5', buf[5]);
799 ASSERT_EQ('6', buf[6]);
800 ASSERT_EQ('7', buf[7]);
801 ASSERT_EQ('8', buf[8]);
802 ASSERT_EQ('\0', buf[9]);
803}