blob: f85b65fcd643c3ee39c569877cdede2402b27390 [file] [log] [blame]
Nick Kralevich5bcf3982013-06-28 10:34:09 -07001/*
2 * Copyright (C) 2013 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
Nick Kralevich5bcf3982013-06-28 10:34:09 -070018
Yabin Cui9df70402014-11-05 18:01:01 -080019#include <fcntl.h>
20#include <malloc.h>
Elliott Hughes4674e382015-02-02 09:15:19 -080021#include <poll.h>
Yabin Cui9df70402014-11-05 18:01:01 -080022#include <signal.h>
23#include <stdarg.h>
24#include <string.h>
25#include <sys/socket.h>
26#include <sys/stat.h>
27#include <sys/types.h>
Yabin Cuif4fe6932015-02-03 17:52:32 -080028#include <time.h>
Yabin Cui9df70402014-11-05 18:01:01 -080029
Elliott Hughes141b9172021-04-09 17:13:09 -070030#include <android-base/silent_death_test.h>
Elliott Hughes734a0c92025-08-12 10:33:24 -070031#include <android-base/test_utils.h>
Peter Collingbournedd126162025-03-25 17:32:35 -070032
Elliott Hughese7943f82023-09-28 08:20:20 -070033#if defined(__BIONIC__)
Elliott Hughesd036e942015-02-02 11:18:58 -080034#define ASSERT_FORTIFY(expr) ASSERT_EXIT(expr, testing::KilledBySignal(SIGABRT), "FORTIFY")
35#else
36#define ASSERT_FORTIFY(expr) ASSERT_EXIT(expr, testing::KilledBySignal(SIGABRT), "")
37#endif
38
Peter Collingbournedd126162025-03-25 17:32:35 -070039#if __has_feature(hwaddress_sanitizer)
40#define ASSERT_FORTIFY_OR_HWASAN(expr) ASSERT_EXIT(expr, testing::KilledBySignal(SIGABRT), "HWAddressSanitizer")
41#else
42#define ASSERT_FORTIFY_OR_HWASAN ASSERT_FORTIFY
43#endif
44
Yabin Cui9df70402014-11-05 18:01:01 -080045// Fortify test code needs to run multiple times, so TEST_NAME macro is used to
46// distinguish different tests. TEST_NAME is defined in compilation command.
Nick Kralevich5bcf3982013-06-28 10:34:09 -070047#define DEATHTEST_PASTER(name) name##_DeathTest
48#define DEATHTEST_EVALUATOR(name) DEATHTEST_PASTER(name)
49#define DEATHTEST DEATHTEST_EVALUATOR(TEST_NAME)
50
Elliott Hughes141b9172021-04-09 17:13:09 -070051using DEATHTEST = SilentDeathTest;
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070052
Elliott Hughes6fc9aa72025-03-14 12:40:40 -070053#if defined(_FORTIFY_SOURCE) && _FORTIFY_SOURCE >= 2
Nick Kralevich5bcf3982013-06-28 10:34:09 -070054struct foo {
55 char empty[0];
56 char one[1];
57 char a[10];
58 char b[10];
59};
60
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070061TEST_F(DEATHTEST, stpncpy_fortified2) {
Christopher Ferris950a58e2014-04-04 14:38:18 -070062 foo myfoo;
Elliott Hughes58666732025-01-28 13:15:01 -080063 volatile int copy_amt = 11;
Elliott Hughesd036e942015-02-02 11:18:58 -080064 ASSERT_FORTIFY(stpncpy(myfoo.a, "01234567890", copy_amt));
Christopher Ferris950a58e2014-04-04 14:38:18 -070065}
Christopher Ferris950a58e2014-04-04 14:38:18 -070066
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070067TEST_F(DEATHTEST, stpncpy2_fortified2) {
Christopher Ferris2a391882024-12-19 13:44:35 -080068 foo myfoo = {};
Christopher Ferris950a58e2014-04-04 14:38:18 -070069 myfoo.one[0] = 'A'; // not null terminated string
Elliott Hughesd036e942015-02-02 11:18:58 -080070 ASSERT_FORTIFY(stpncpy(myfoo.b, myfoo.one, sizeof(myfoo.b)));
Christopher Ferris950a58e2014-04-04 14:38:18 -070071}
Christopher Ferris950a58e2014-04-04 14:38:18 -070072
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070073TEST_F(DEATHTEST, strncpy_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -070074 foo myfoo;
Elliott Hughes58666732025-01-28 13:15:01 -080075 volatile int copy_amt = 11;
Elliott Hughesd036e942015-02-02 11:18:58 -080076 ASSERT_FORTIFY(strncpy(myfoo.a, "01234567890", copy_amt));
Nick Kralevich5bcf3982013-06-28 10:34:09 -070077}
Nick Kralevich5bcf3982013-06-28 10:34:09 -070078
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070079TEST_F(DEATHTEST, strncpy2_fortified2) {
Christopher Ferris2a391882024-12-19 13:44:35 -080080 foo myfoo = {};
Nick Kralevich93501d32013-08-28 10:47:43 -070081 myfoo.one[0] = 'A'; // not null terminated string
Elliott Hughesd036e942015-02-02 11:18:58 -080082 ASSERT_FORTIFY(strncpy(myfoo.b, myfoo.one, sizeof(myfoo.b)));
Nick Kralevich93501d32013-08-28 10:47:43 -070083}
Nick Kralevich93501d32013-08-28 10:47:43 -070084
Nick Kralevichbe0e43b2014-07-23 13:56:23 -070085TEST_F(DEATHTEST, sprintf_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -070086 foo myfoo;
87 char source_buf[15];
88 memcpy(source_buf, "12345678901234", 15);
Elliott Hughesd036e942015-02-02 11:18:58 -080089 ASSERT_FORTIFY(sprintf(myfoo.a, "%s", source_buf));
Nick Kralevich5bcf3982013-06-28 10:34:09 -070090}
Nick Kralevich5bcf3982013-06-28 10:34:09 -070091
Nick Kralevich884a3de2014-10-06 00:39:47 +000092TEST_F(DEATHTEST, sprintf2_fortified2) {
Nick Kralevich884a3de2014-10-06 00:39:47 +000093 foo myfoo;
Elliott Hughesd036e942015-02-02 11:18:58 -080094 ASSERT_FORTIFY(sprintf(myfoo.a, "0123456789"));
Nick Kralevich884a3de2014-10-06 00:39:47 +000095}
Nick Kralevich884a3de2014-10-06 00:39:47 +000096
Elliott Hughes58666732025-01-28 13:15:01 -080097static int vsprintf_helper2(const char* fmt, ...) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -070098 va_list va;
Nick Kralevich5bcf3982013-06-28 10:34:09 -070099 va_start(va, fmt);
Elliott Hughes58666732025-01-28 13:15:01 -0800100 foo myfoo;
101 int result = vsprintf(myfoo.a, fmt, va); // should crash here
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700102 va_end(va);
103 return result;
104}
105
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700106TEST_F(DEATHTEST, vsprintf_fortified2) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800107 ASSERT_FORTIFY(vsprintf_helper2("%s", "0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700108}
109
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700110TEST_F(DEATHTEST, vsprintf2_fortified2) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800111 ASSERT_FORTIFY(vsprintf_helper2("0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700112}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700113
Elliott Hughes58666732025-01-28 13:15:01 -0800114static int vsnprintf_helper2(const char* fmt, ...) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700115 va_list va;
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700116 va_start(va, fmt);
Elliott Hughes58666732025-01-28 13:15:01 -0800117 foo myfoo;
118 volatile size_t size = 11;
119 int result = vsnprintf(myfoo.a, size, fmt, va); // should crash here
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700120 va_end(va);
121 return result;
122}
123
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700124TEST_F(DEATHTEST, vsnprintf_fortified2) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800125 ASSERT_FORTIFY(vsnprintf_helper2("%s", "0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700126}
127
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700128TEST_F(DEATHTEST, vsnprintf2_fortified2) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800129 ASSERT_FORTIFY(vsnprintf_helper2("0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700130}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700131
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700132// zero sized target with "\0" source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700133TEST_F(DEATHTEST, stpcpy_fortified2) {
Christopher Ferris950a58e2014-04-04 14:38:18 -0700134#if defined(__BIONIC__)
Christopher Ferris950a58e2014-04-04 14:38:18 -0700135 foo myfoo;
136 char* src = strdup("");
Elliott Hughesd036e942015-02-02 11:18:58 -0800137 ASSERT_FORTIFY(stpcpy(myfoo.empty, src));
Christopher Ferris950a58e2014-04-04 14:38:18 -0700138 free(src);
139#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800140 GTEST_SKIP() << "stpcpy not available";
Christopher Ferris950a58e2014-04-04 14:38:18 -0700141#endif // __BIONIC__
142}
Christopher Ferris950a58e2014-04-04 14:38:18 -0700143
Christopher Ferris950a58e2014-04-04 14:38:18 -0700144// zero sized target with "\0" source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700145TEST_F(DEATHTEST, strcpy_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800146#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700147 foo myfoo;
148 char* src = strdup("");
Elliott Hughesd036e942015-02-02 11:18:58 -0800149 ASSERT_FORTIFY(strcpy(myfoo.empty, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700150 free(src);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800151#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800152 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800153#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700154}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700155
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700156// zero sized target with longer source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700157TEST_F(DEATHTEST, strcpy2_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800158#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700159 foo myfoo;
160 char* src = strdup("1");
Elliott Hughesd036e942015-02-02 11:18:58 -0800161 ASSERT_FORTIFY(strcpy(myfoo.empty, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700162 free(src);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800163#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800164 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800165#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700166}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700167
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700168// one byte target with longer source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700169TEST_F(DEATHTEST, strcpy3_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800170#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700171 foo myfoo;
172 char* src = strdup("12");
Elliott Hughesd036e942015-02-02 11:18:58 -0800173 ASSERT_FORTIFY(strcpy(myfoo.one, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700174 free(src);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800175#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800176 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800177#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700178}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700179
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700180TEST_F(DEATHTEST, strchr_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800181#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700182 foo myfoo;
183 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a));
184 myfoo.b[0] = '\0';
Elliott Hughesd036e942015-02-02 11:18:58 -0800185 ASSERT_FORTIFY(printf("%s", strchr(myfoo.a, 'a')));
George Burgess IVbd3d2082017-04-04 17:34:02 -0700186 ASSERT_FORTIFY(printf("%s", strchr(static_cast<const char*>(myfoo.a), 'a')));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800187#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800188 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800189#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700190}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700191
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700192TEST_F(DEATHTEST, strrchr_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800193#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700194 foo myfoo;
195 memcpy(myfoo.a, "0123456789", 10);
196 memcpy(myfoo.b, "01234", 6);
Elliott Hughesd036e942015-02-02 11:18:58 -0800197 ASSERT_FORTIFY(printf("%s", strrchr(myfoo.a, 'a')));
George Burgess IVbd3d2082017-04-04 17:34:02 -0700198 ASSERT_FORTIFY(printf("%s", strrchr(static_cast<const char*>(myfoo.a), 'a')));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800199#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800200 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800201#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700202}
George Burgess IVbd3d2082017-04-04 17:34:02 -0700203
204TEST_F(DEATHTEST, memchr_fortified2) {
205#if defined(__BIONIC__)
206 foo myfoo;
207 volatile int asize = sizeof(myfoo.a) + 1;
208 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a));
Stephen Hines62165a12020-08-18 01:38:14 -0700209 ASSERT_FORTIFY(printf("%s", static_cast<const char*>(memchr(myfoo.a, 'a', asize))));
210 ASSERT_FORTIFY(printf(
211 "%s", static_cast<const char*>(memchr(static_cast<const void*>(myfoo.a), 'a', asize))));
George Burgess IVbd3d2082017-04-04 17:34:02 -0700212#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800213 GTEST_SKIP() << "glibc is broken";
George Burgess IVbd3d2082017-04-04 17:34:02 -0700214#endif // __BIONIC__
215}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700216
Elliott Hughes55a8cc22017-11-08 21:22:44 -0800217TEST_F(DEATHTEST, memrchr_fortified2) {
218#if defined(__BIONIC__)
219 foo myfoo;
220 volatile int asize = sizeof(myfoo.a) + 1;
221 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a));
Stephen Hines62165a12020-08-18 01:38:14 -0700222 ASSERT_FORTIFY(printf("%s", static_cast<const char*>(memrchr(myfoo.a, 'a', asize))));
223 ASSERT_FORTIFY(printf(
224 "%s", static_cast<const char*>(memrchr(static_cast<const void*>(myfoo.a), 'a', asize))));
Elliott Hughes55a8cc22017-11-08 21:22:44 -0800225#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800226 GTEST_SKIP() << "glibc is broken";
Elliott Hughes55a8cc22017-11-08 21:22:44 -0800227#endif // __BIONIC__
228}
229
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700230TEST_F(DEATHTEST, strlcpy_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800231#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700232 foo myfoo;
233 strcpy(myfoo.a, "01");
234 size_t n = strlen(myfoo.a);
Elliott Hughesd036e942015-02-02 11:18:58 -0800235 ASSERT_FORTIFY(strlcpy(myfoo.one, myfoo.a, n));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800236#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800237 GTEST_SKIP() << "strlcpy not available";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800238#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700239}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700240
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700241TEST_F(DEATHTEST, strlcat_fortified2) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800242#if defined(__BIONIC__)
Nick Kralevicha6cde392013-06-29 08:15:25 -0700243 foo myfoo;
244 strcpy(myfoo.a, "01");
245 myfoo.one[0] = '\0';
246 size_t n = strlen(myfoo.a);
Elliott Hughesd036e942015-02-02 11:18:58 -0800247 ASSERT_FORTIFY(strlcat(myfoo.one, myfoo.a, n));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800248#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800249 GTEST_SKIP() << "strlcat not available";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800250#endif // __BIONIC__
Nick Kralevicha6cde392013-06-29 08:15:25 -0700251}
Nick Kralevicha6cde392013-06-29 08:15:25 -0700252
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700253TEST_F(DEATHTEST, strncat_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700254 foo myfoo;
Elliott Hughes58666732025-01-28 13:15:01 -0800255 volatile size_t n = 10;
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700256 strncpy(myfoo.a, "012345678", n);
Elliott Hughesd036e942015-02-02 11:18:58 -0800257 ASSERT_FORTIFY(strncat(myfoo.a, "9", n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700258}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700259
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700260TEST_F(DEATHTEST, strncat2_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700261 foo myfoo;
262 myfoo.a[0] = '\0';
Elliott Hughes58666732025-01-28 13:15:01 -0800263 volatile size_t n = 10;
Elliott Hughesd036e942015-02-02 11:18:58 -0800264 ASSERT_FORTIFY(strncat(myfoo.a, "0123456789", n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700265}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700266
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700267TEST_F(DEATHTEST, strncat3_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700268 foo myfoo;
269 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a)); // unterminated string
270 myfoo.b[0] = '\0';
Elliott Hughes58666732025-01-28 13:15:01 -0800271 volatile size_t n = 10;
Elliott Hughesd036e942015-02-02 11:18:58 -0800272 ASSERT_FORTIFY(strncat(myfoo.b, myfoo.a, n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700273}
274
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700275TEST_F(DEATHTEST, strcat_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700276 char src[11];
277 strcpy(src, "0123456789");
278 foo myfoo;
279 myfoo.a[0] = '\0';
Elliott Hughesd036e942015-02-02 11:18:58 -0800280 ASSERT_FORTIFY(strcat(myfoo.a, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700281}
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700282
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700283TEST_F(DEATHTEST, strcat2_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700284 foo myfoo;
285 memcpy(myfoo.a, "0123456789", sizeof(myfoo.a)); // unterminated string
286 myfoo.b[0] = '\0';
Elliott Hughesd036e942015-02-02 11:18:58 -0800287 ASSERT_FORTIFY(strcat(myfoo.b, myfoo.a));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700288}
289
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700290TEST_F(DEATHTEST, snprintf_fortified2) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700291 foo myfoo;
292 strcpy(myfoo.a, "012345678");
293 size_t n = strlen(myfoo.a) + 2;
Elliott Hughesd036e942015-02-02 11:18:58 -0800294 ASSERT_FORTIFY(snprintf(myfoo.b, n, "a%s", myfoo.a));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700295}
296
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700297TEST_F(DEATHTEST, bzero_fortified2) {
Nick Kralevicha6cde392013-06-29 08:15:25 -0700298 foo myfoo;
299 memcpy(myfoo.b, "0123456789", sizeof(myfoo.b));
Elliott Hughes58666732025-01-28 13:15:01 -0800300 volatile size_t n = 11;
Elliott Hughesd036e942015-02-02 11:18:58 -0800301 ASSERT_FORTIFY(bzero(myfoo.b, n));
Nick Kralevicha6cde392013-06-29 08:15:25 -0700302}
303
Sharjeel Khan6b439512025-05-16 23:23:13 +0000304#endif /* defined(_FORTIFY_SOURCE) && _FORTIFY_SOURCE>=2 */
305
306#if defined(_FORTIFY_SOURCE) && _FORTIFY_SOURCE >= 3
307
308TEST_F(DEATHTEST, dynamic_object_size_malloc) {
309#if __BIONIC__ // glibc doesn't use __builtin_dynamic_object_size
310 // Volatile because we have to fool both the frontend and the optimizer.
311 volatile int i = 32;
312 volatile int j = i + 1;
313 void* mem = malloc(i);
314 ASSERT_FORTIFY(memset(mem, 0, j));
315 free(mem);
316#endif
317}
318
319#endif /* defined(_FORTIFY_SOURCE) && _FORTIFY_SOURCE>=3 */
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700320
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700321// multibyte target where we over fill (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700322TEST_F(DEATHTEST, strcpy_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800323#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700324 char buf[10];
Elliott Hughes58666732025-01-28 13:15:01 -0800325 char* orig = strdup("0123456789");
Elliott Hughesd036e942015-02-02 11:18:58 -0800326 ASSERT_FORTIFY(strcpy(buf, orig));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700327 free(orig);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800328#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800329 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800330#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700331}
332
333// zero sized target with "\0" source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700334TEST_F(DEATHTEST, strcpy2_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800335#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700336 char buf[0];
Elliott Hughes58666732025-01-28 13:15:01 -0800337 char* orig = strdup("");
Elliott Hughesd036e942015-02-02 11:18:58 -0800338 ASSERT_FORTIFY(strcpy(buf, orig));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700339 free(orig);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800340#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800341 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800342#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700343}
344
345// zero sized target with longer source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700346TEST_F(DEATHTEST, strcpy3_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800347#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700348 char buf[0];
Elliott Hughes58666732025-01-28 13:15:01 -0800349 char* orig = strdup("1");
Elliott Hughesd036e942015-02-02 11:18:58 -0800350 ASSERT_FORTIFY(strcpy(buf, orig));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700351 free(orig);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800352#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800353 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800354#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700355}
356
357// one byte target with longer source (should fail)
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700358TEST_F(DEATHTEST, strcpy4_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800359#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700360 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800361 char* orig = strdup("12");
Elliott Hughesd036e942015-02-02 11:18:58 -0800362 ASSERT_FORTIFY(strcpy(buf, orig));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700363 free(orig);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800364#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800365 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800366#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700367}
368
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700369TEST_F(DEATHTEST, strlen_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800370#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700371 char buf[10];
372 memcpy(buf, "0123456789", sizeof(buf));
Elliott Hughesd036e942015-02-02 11:18:58 -0800373 ASSERT_FORTIFY(printf("%zd", strlen(buf)));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800374#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800375 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800376#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700377}
378
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700379TEST_F(DEATHTEST, strchr_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800380#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700381 char buf[10];
382 memcpy(buf, "0123456789", sizeof(buf));
Elliott Hughesd036e942015-02-02 11:18:58 -0800383 ASSERT_FORTIFY(printf("%s", strchr(buf, 'a')));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800384#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800385 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800386#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700387}
388
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700389TEST_F(DEATHTEST, strrchr_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800390#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700391 char buf[10];
392 memcpy(buf, "0123456789", sizeof(buf));
Elliott Hughesd036e942015-02-02 11:18:58 -0800393 ASSERT_FORTIFY(printf("%s", strrchr(buf, 'a')));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800394#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800395 GTEST_SKIP() << "glibc is broken";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800396#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700397}
398
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700399TEST_F(DEATHTEST, strlcpy_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800400#if defined(__BIONIC__)
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700401 char bufa[15];
402 char bufb[10];
403 strcpy(bufa, "01234567890123");
404 size_t n = strlen(bufa);
Elliott Hughesd036e942015-02-02 11:18:58 -0800405 ASSERT_FORTIFY(strlcpy(bufb, bufa, n));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800406#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800407 GTEST_SKIP() << "strlcpy not available";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800408#endif // __BIONIC__
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700409}
410
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700411TEST_F(DEATHTEST, strlcat_fortified) {
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800412#if defined(__BIONIC__)
Nick Kralevicha6cde392013-06-29 08:15:25 -0700413 char bufa[15];
414 char bufb[10];
415 bufb[0] = '\0';
416 strcpy(bufa, "01234567890123");
417 size_t n = strlen(bufa);
Elliott Hughesd036e942015-02-02 11:18:58 -0800418 ASSERT_FORTIFY(strlcat(bufb, bufa, n));
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800419#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800420 GTEST_SKIP() << "strlcat not available";
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800421#endif // __BIONIC__
Nick Kralevicha6cde392013-06-29 08:15:25 -0700422}
423
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700424TEST_F(DEATHTEST, sprintf_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700425 char buf[10];
426 char source_buf[15];
427 memcpy(source_buf, "12345678901234", 15);
Elliott Hughesd036e942015-02-02 11:18:58 -0800428 ASSERT_FORTIFY(sprintf(buf, "%s", source_buf));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700429}
430
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700431TEST_F(DEATHTEST, sprintf_malloc_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -0800432 char* buf = static_cast<char*>(malloc(10));
Nick Kralevichb91791d2013-10-02 14:14:40 -0700433 char source_buf[11];
434 memcpy(source_buf, "1234567890", 11);
Elliott Hughesd036e942015-02-02 11:18:58 -0800435 ASSERT_FORTIFY(sprintf(buf, "%s", source_buf));
Nick Kralevichb91791d2013-10-02 14:14:40 -0700436 free(buf);
437}
Nick Kralevichb91791d2013-10-02 14:14:40 -0700438
Nick Kralevich884a3de2014-10-06 00:39:47 +0000439TEST_F(DEATHTEST, sprintf2_fortified) {
Peter Collingbournedd126162025-03-25 17:32:35 -0700440 // glibc's fortified implementation of sprintf is smart enough to be able to detect this bug at
441 // compile time, but we want to check if it can also be detected at runtime.
442#pragma clang diagnostic push
443#pragma clang diagnostic ignored "-Wformat-overflow"
Nick Kralevich884a3de2014-10-06 00:39:47 +0000444 char buf[5];
Elliott Hughesd036e942015-02-02 11:18:58 -0800445 ASSERT_FORTIFY(sprintf(buf, "aaaaa"));
Peter Collingbournedd126162025-03-25 17:32:35 -0700446#pragma clang diagnostic pop
Nick Kralevich884a3de2014-10-06 00:39:47 +0000447}
448
Elliott Hughes58666732025-01-28 13:15:01 -0800449static int vsprintf_helper(const char* fmt, ...) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700450 va_list va;
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700451 va_start(va, fmt);
Elliott Hughes58666732025-01-28 13:15:01 -0800452 char buf[10];
453 int result = vsprintf(buf, fmt, va); // should crash here
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700454 va_end(va);
455 return result;
456}
457
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700458TEST_F(DEATHTEST, vsprintf_fortified) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800459 ASSERT_FORTIFY(vsprintf_helper("%s", "0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700460}
461
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700462TEST_F(DEATHTEST, vsprintf2_fortified) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800463 ASSERT_FORTIFY(vsprintf_helper("0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700464}
465
Elliott Hughes58666732025-01-28 13:15:01 -0800466static int vsnprintf_helper(const char* fmt, ...) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700467 va_list va;
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700468 va_start(va, fmt);
Elliott Hughes58666732025-01-28 13:15:01 -0800469 char buf[10];
470 volatile size_t size = 11;
471 int result = vsnprintf(buf, size, fmt, va); // should crash here
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700472 va_end(va);
473 return result;
474}
475
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700476TEST_F(DEATHTEST, vsnprintf_fortified) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800477 ASSERT_FORTIFY(vsnprintf_helper("%s", "0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700478}
479
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700480TEST_F(DEATHTEST, vsnprintf2_fortified) {
Elliott Hughesd036e942015-02-02 11:18:58 -0800481 ASSERT_FORTIFY(vsnprintf_helper("0123456789"));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700482}
483
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700484TEST_F(DEATHTEST, strncat_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700485 char buf[10];
Elliott Hughes58666732025-01-28 13:15:01 -0800486 volatile size_t n = 10;
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700487 strncpy(buf, "012345678", n);
Elliott Hughesd036e942015-02-02 11:18:58 -0800488 ASSERT_FORTIFY(strncat(buf, "9", n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700489}
490
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700491TEST_F(DEATHTEST, strncat2_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700492 char buf[10];
493 buf[0] = '\0';
Elliott Hughes58666732025-01-28 13:15:01 -0800494 volatile size_t n = 10;
Elliott Hughesd036e942015-02-02 11:18:58 -0800495 ASSERT_FORTIFY(strncat(buf, "0123456789", n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700496}
497
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700498TEST_F(DEATHTEST, strcat_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700499 char src[11];
500 strcpy(src, "0123456789");
501 char buf[10];
502 buf[0] = '\0';
Elliott Hughesd036e942015-02-02 11:18:58 -0800503 ASSERT_FORTIFY(strcat(buf, src));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700504}
505
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700506TEST_F(DEATHTEST, memmove_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700507 char buf[20];
508 strcpy(buf, "0123456789");
Elliott Hughes58666732025-01-28 13:15:01 -0800509 volatile size_t n = 10;
Elliott Hughes734a0c92025-08-12 10:33:24 -0700510 ASSERT_FORTIFY_OR_HWASAN(android::base::DoNotOptimize(memmove(buf + 11, buf, n)));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700511}
512
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700513TEST_F(DEATHTEST, memcpy_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700514 char bufa[10];
515 char bufb[10];
516 strcpy(bufa, "012345678");
Elliott Hughes58666732025-01-28 13:15:01 -0800517 volatile size_t n = 11;
Elliott Hughes734a0c92025-08-12 10:33:24 -0700518 ASSERT_FORTIFY_OR_HWASAN(android::base::DoNotOptimize(memcpy(bufb, bufa, n)));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700519}
520
Elliott Hughes62e59642016-03-01 11:22:42 -0800521TEST_F(DEATHTEST, memset_fortified) {
522 char buf[10];
Elliott Hughes58666732025-01-28 13:15:01 -0800523 volatile size_t n = 11;
Elliott Hughes734a0c92025-08-12 10:33:24 -0700524 ASSERT_FORTIFY_OR_HWASAN(android::base::DoNotOptimize(memset(buf, 0, n)));
Elliott Hughes62e59642016-03-01 11:22:42 -0800525}
526
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700527TEST_F(DEATHTEST, stpncpy_fortified) {
Christopher Ferris950a58e2014-04-04 14:38:18 -0700528 char bufa[15];
529 char bufb[10];
530 strcpy(bufa, "01234567890123");
531 size_t n = strlen(bufa);
Elliott Hughesd036e942015-02-02 11:18:58 -0800532 ASSERT_FORTIFY(stpncpy(bufb, bufa, n));
Christopher Ferris950a58e2014-04-04 14:38:18 -0700533}
534
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700535TEST_F(DEATHTEST, stpncpy2_fortified) {
Christopher Ferris950a58e2014-04-04 14:38:18 -0700536 char dest[11];
537 char src[10];
538 memcpy(src, "0123456789", sizeof(src)); // src is not null terminated
Elliott Hughesd036e942015-02-02 11:18:58 -0800539 ASSERT_FORTIFY(stpncpy(dest, src, sizeof(dest)));
Christopher Ferris950a58e2014-04-04 14:38:18 -0700540}
541
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700542TEST_F(DEATHTEST, strncpy_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700543 char bufa[15];
544 char bufb[10];
545 strcpy(bufa, "01234567890123");
546 size_t n = strlen(bufa);
Elliott Hughesd036e942015-02-02 11:18:58 -0800547 ASSERT_FORTIFY(strncpy(bufb, bufa, n));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700548}
549
Christopher Ferris950a58e2014-04-04 14:38:18 -0700550
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700551TEST_F(DEATHTEST, strncpy2_fortified) {
Nick Kralevich93501d32013-08-28 10:47:43 -0700552 char dest[11];
553 char src[10];
554 memcpy(src, "0123456789", sizeof(src)); // src is not null terminated
Elliott Hughesd036e942015-02-02 11:18:58 -0800555 ASSERT_FORTIFY(strncpy(dest, src, sizeof(dest)));
Nick Kralevich93501d32013-08-28 10:47:43 -0700556}
557
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700558TEST_F(DEATHTEST, snprintf_fortified) {
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700559 char bufa[15];
560 char bufb[10];
561 strcpy(bufa, "0123456789");
562 size_t n = strlen(bufa) + 1;
Elliott Hughesd036e942015-02-02 11:18:58 -0800563 ASSERT_FORTIFY(snprintf(bufb, n, "%s", bufa));
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700564}
565
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700566TEST_F(DEATHTEST, bzero_fortified) {
Nick Kralevicha6cde392013-06-29 08:15:25 -0700567 char buf[10];
568 memcpy(buf, "0123456789", sizeof(buf));
Elliott Hughes58666732025-01-28 13:15:01 -0800569 size_t n = 11;
Elliott Hughesd036e942015-02-02 11:18:58 -0800570 ASSERT_FORTIFY(bzero(buf, n));
Nick Kralevicha6cde392013-06-29 08:15:25 -0700571}
572
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700573TEST_F(DEATHTEST, umask_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -0800574 volatile mode_t mask = 01777;
Elliott Hughesd036e942015-02-02 11:18:58 -0800575 ASSERT_FORTIFY(umask(mask));
Nick Kralevicha6cde392013-06-29 08:15:25 -0700576}
577
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700578TEST_F(DEATHTEST, recv_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -0800579 volatile size_t data_len = 11;
Nick Kralevich60f4f9a2013-09-24 16:32:07 -0700580 char buf[10];
Elliott Hughesd036e942015-02-02 11:18:58 -0800581 ASSERT_FORTIFY(recv(0, buf, data_len, 0));
Nick Kralevich60f4f9a2013-09-24 16:32:07 -0700582}
583
Daniel Micay95b59c52017-02-13 17:27:59 -0800584TEST_F(DEATHTEST, send_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -0800585 volatile size_t data_len = 11;
Daniel Micay95b59c52017-02-13 17:27:59 -0800586 char buf[10] = {0};
587 ASSERT_FORTIFY(send(0, buf, data_len, 0));
588}
589
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700590TEST_F(DEATHTEST, FD_ISSET_fortified) {
Elliott Hughes063525c2014-05-13 11:19:57 -0700591#if defined(__BIONIC__) // glibc catches this at compile-time.
Christopher Ferris2a391882024-12-19 13:44:35 -0800592 fd_set set = {};
Elliott Hughesd036e942015-02-02 11:18:58 -0800593 ASSERT_FORTIFY(FD_ISSET(-1, &set));
Elliott Hughes409588c2014-04-23 23:02:43 -0700594#endif
Nick Kralevich90201d52013-10-02 16:11:30 -0700595}
596
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700597TEST_F(DEATHTEST, FD_ISSET_2_fortified) {
Nick Kralevich7943df62013-10-03 14:08:39 -0700598 char buf[1];
599 fd_set* set = (fd_set*) buf;
Elliott Hughesd036e942015-02-02 11:18:58 -0800600 ASSERT_FORTIFY(FD_ISSET(0, set));
Nick Kralevich7943df62013-10-03 14:08:39 -0700601}
602
Daniel Micay9101b002015-05-20 15:31:26 -0400603TEST_F(DEATHTEST, getcwd_fortified) {
604 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800605 volatile size_t n = 2;
606 ASSERT_FORTIFY(getcwd(buf, n));
Daniel Micay9101b002015-05-20 15:31:26 -0400607}
608
Daniel Micaye7e1c872015-04-16 09:07:45 -0400609TEST_F(DEATHTEST, pread_fortified) {
610 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800611 volatile size_t n = 2;
Daniel Micaye7e1c872015-04-16 09:07:45 -0400612 int fd = open("/dev/null", O_RDONLY);
Elliott Hughes58666732025-01-28 13:15:01 -0800613 ASSERT_FORTIFY(pread(fd, buf, n, 0));
Daniel Micaye7e1c872015-04-16 09:07:45 -0400614 close(fd);
615}
616
617TEST_F(DEATHTEST, pread64_fortified) {
618 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800619 volatile size_t n = 2;
Daniel Micaye7e1c872015-04-16 09:07:45 -0400620 int fd = open("/dev/null", O_RDONLY);
Elliott Hughes58666732025-01-28 13:15:01 -0800621 ASSERT_FORTIFY(pread64(fd, buf, n, 0));
Daniel Micaye7e1c872015-04-16 09:07:45 -0400622 close(fd);
623}
624
Daniel Micayafdd1542015-07-20 21:37:29 -0400625TEST_F(DEATHTEST, pwrite_fortified) {
626 char buf[1] = {0};
Elliott Hughes58666732025-01-28 13:15:01 -0800627 volatile size_t n = 2;
Daniel Micayafdd1542015-07-20 21:37:29 -0400628 int fd = open("/dev/null", O_WRONLY);
Elliott Hughes58666732025-01-28 13:15:01 -0800629 ASSERT_FORTIFY(pwrite(fd, buf, n, 0));
Daniel Micayafdd1542015-07-20 21:37:29 -0400630 close(fd);
631}
632
633TEST_F(DEATHTEST, pwrite64_fortified) {
634 char buf[1] = {0};
Elliott Hughes58666732025-01-28 13:15:01 -0800635 volatile size_t n = 2;
Daniel Micayafdd1542015-07-20 21:37:29 -0400636 int fd = open("/dev/null", O_WRONLY);
Elliott Hughes58666732025-01-28 13:15:01 -0800637 ASSERT_FORTIFY(pwrite64(fd, buf, n, 0));
Daniel Micayafdd1542015-07-20 21:37:29 -0400638 close(fd);
639}
640
Nick Kralevichbe0e43b2014-07-23 13:56:23 -0700641TEST_F(DEATHTEST, read_fortified) {
Nick Kralevichb036b5c2013-10-09 20:16:34 -0700642 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800643 volatile size_t n = 2;
Nick Kralevichb036b5c2013-10-09 20:16:34 -0700644 int fd = open("/dev/null", O_RDONLY);
Elliott Hughes58666732025-01-28 13:15:01 -0800645 ASSERT_FORTIFY(read(fd, buf, n));
Nick Kralevichb036b5c2013-10-09 20:16:34 -0700646 close(fd);
647}
648
Daniel Micayafdd1542015-07-20 21:37:29 -0400649TEST_F(DEATHTEST, write_fortified) {
650 char buf[1] = {0};
Elliott Hughes58666732025-01-28 13:15:01 -0800651 volatile size_t n = 2;
Daniel Micayafdd1542015-07-20 21:37:29 -0400652 int fd = open("/dev/null", O_WRONLY);
Elliott Hughes58666732025-01-28 13:15:01 -0800653 ASSERT_FORTIFY(write(fd, buf, n));
Daniel Micayafdd1542015-07-20 21:37:29 -0400654 close(fd);
655}
656
Daniel Micayfed26592015-07-18 13:55:51 -0400657TEST_F(DEATHTEST, fread_fortified) {
658 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800659 volatile size_t n = 2;
Daniel Micayfed26592015-07-18 13:55:51 -0400660 FILE* fp = fopen("/dev/null", "r");
Elliott Hughes58666732025-01-28 13:15:01 -0800661 ASSERT_FORTIFY(fread(buf, 1, n, fp));
Daniel Micayfed26592015-07-18 13:55:51 -0400662 fclose(fp);
663}
664
665TEST_F(DEATHTEST, fwrite_fortified) {
666 char buf[1] = {0};
Elliott Hughes58666732025-01-28 13:15:01 -0800667 volatile size_t n = 2;
Daniel Micayfed26592015-07-18 13:55:51 -0400668 FILE* fp = fopen("/dev/null", "w");
Elliott Hughes58666732025-01-28 13:15:01 -0800669 ASSERT_FORTIFY(fwrite(buf, 1, n, fp));
Daniel Micayfed26592015-07-18 13:55:51 -0400670 fclose(fp);
671}
672
Daniel Micay42281882015-04-17 11:26:36 -0400673TEST_F(DEATHTEST, readlink_fortified) {
674 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800675 volatile size_t n = 2;
676 ASSERT_FORTIFY(readlink("/dev/null", buf, n));
Daniel Micay42281882015-04-17 11:26:36 -0400677}
678
679TEST_F(DEATHTEST, readlinkat_fortified) {
680 char buf[1];
Elliott Hughes58666732025-01-28 13:15:01 -0800681 volatile size_t n = 2;
682 ASSERT_FORTIFY(readlinkat(AT_FDCWD, "/dev/null", buf, n));
Daniel Micay42281882015-04-17 11:26:36 -0400683}
684
zijunzhaoe1833e52023-04-26 21:43:30 +0000685TEST(TEST_NAME, snprintf_nullptr_valid) {
686 ASSERT_EQ(10, snprintf(nullptr, 0, "0123456789"));
687}
688
Nick Kralevich5bcf3982013-06-28 10:34:09 -0700689extern "C" char* __strncat_chk(char*, const char*, size_t, size_t);
690extern "C" char* __strcat_chk(char*, const char*, size_t);
691
692TEST(TEST_NAME, strncat) {
693 char buf[10];
694 memset(buf, 'A', sizeof(buf));
695 buf[0] = 'a';
696 buf[1] = '\0';
697 char* res = __strncat_chk(buf, "01234", sizeof(buf) - strlen(buf) - 1, sizeof(buf));
698 ASSERT_EQ(buf, res);
699 ASSERT_EQ('a', buf[0]);
700 ASSERT_EQ('0', buf[1]);
701 ASSERT_EQ('1', buf[2]);
702 ASSERT_EQ('2', buf[3]);
703 ASSERT_EQ('3', buf[4]);
704 ASSERT_EQ('4', buf[5]);
705 ASSERT_EQ('\0', buf[6]);
706 ASSERT_EQ('A', buf[7]);
707 ASSERT_EQ('A', buf[8]);
708 ASSERT_EQ('A', buf[9]);
709}
710
711TEST(TEST_NAME, strncat2) {
712 char buf[10];
713 memset(buf, 'A', sizeof(buf));
714 buf[0] = 'a';
715 buf[1] = '\0';
716 char* res = __strncat_chk(buf, "0123456789", 5, sizeof(buf));
717 ASSERT_EQ(buf, res);
718 ASSERT_EQ('a', buf[0]);
719 ASSERT_EQ('0', buf[1]);
720 ASSERT_EQ('1', buf[2]);
721 ASSERT_EQ('2', buf[3]);
722 ASSERT_EQ('3', buf[4]);
723 ASSERT_EQ('4', buf[5]);
724 ASSERT_EQ('\0', buf[6]);
725 ASSERT_EQ('A', buf[7]);
726 ASSERT_EQ('A', buf[8]);
727 ASSERT_EQ('A', buf[9]);
728}
729
730TEST(TEST_NAME, strncat3) {
731 char buf[10];
732 memset(buf, 'A', sizeof(buf));
733 buf[0] = '\0';
734 char* res = __strncat_chk(buf, "0123456789", 5, sizeof(buf));
735 ASSERT_EQ(buf, res);
736 ASSERT_EQ('0', buf[0]);
737 ASSERT_EQ('1', buf[1]);
738 ASSERT_EQ('2', buf[2]);
739 ASSERT_EQ('3', buf[3]);
740 ASSERT_EQ('4', buf[4]);
741 ASSERT_EQ('\0', buf[5]);
742 ASSERT_EQ('A', buf[6]);
743 ASSERT_EQ('A', buf[7]);
744 ASSERT_EQ('A', buf[8]);
745 ASSERT_EQ('A', buf[9]);
746}
747
748TEST(TEST_NAME, strncat4) {
749 char buf[10];
750 memset(buf, 'A', sizeof(buf));
751 buf[9] = '\0';
752 char* res = __strncat_chk(buf, "", 5, sizeof(buf));
753 ASSERT_EQ(buf, res);
754 ASSERT_EQ('A', buf[0]);
755 ASSERT_EQ('A', buf[1]);
756 ASSERT_EQ('A', buf[2]);
757 ASSERT_EQ('A', buf[3]);
758 ASSERT_EQ('A', buf[4]);
759 ASSERT_EQ('A', buf[5]);
760 ASSERT_EQ('A', buf[6]);
761 ASSERT_EQ('A', buf[7]);
762 ASSERT_EQ('A', buf[8]);
763 ASSERT_EQ('\0', buf[9]);
764}
765
766TEST(TEST_NAME, strncat5) {
767 char buf[10];
768 memset(buf, 'A', sizeof(buf));
769 buf[0] = 'a';
770 buf[1] = '\0';
771 char* res = __strncat_chk(buf, "01234567", 8, sizeof(buf));
772 ASSERT_EQ(buf, res);
773 ASSERT_EQ('a', buf[0]);
774 ASSERT_EQ('0', buf[1]);
775 ASSERT_EQ('1', buf[2]);
776 ASSERT_EQ('2', buf[3]);
777 ASSERT_EQ('3', buf[4]);
778 ASSERT_EQ('4', buf[5]);
779 ASSERT_EQ('5', buf[6]);
780 ASSERT_EQ('6', buf[7]);
781 ASSERT_EQ('7', buf[8]);
782 ASSERT_EQ('\0', buf[9]);
783}
784
785TEST(TEST_NAME, strncat6) {
786 char buf[10];
787 memset(buf, 'A', sizeof(buf));
788 buf[0] = 'a';
789 buf[1] = '\0';
790 char* res = __strncat_chk(buf, "01234567", 9, sizeof(buf));
791 ASSERT_EQ(buf, res);
792 ASSERT_EQ('a', buf[0]);
793 ASSERT_EQ('0', buf[1]);
794 ASSERT_EQ('1', buf[2]);
795 ASSERT_EQ('2', buf[3]);
796 ASSERT_EQ('3', buf[4]);
797 ASSERT_EQ('4', buf[5]);
798 ASSERT_EQ('5', buf[6]);
799 ASSERT_EQ('6', buf[7]);
800 ASSERT_EQ('7', buf[8]);
801 ASSERT_EQ('\0', buf[9]);
802}
803
804
805TEST(TEST_NAME, strcat) {
806 char buf[10];
807 memset(buf, 'A', sizeof(buf));
808 buf[0] = 'a';
809 buf[1] = '\0';
810 char* res = __strcat_chk(buf, "01234", sizeof(buf));
811 ASSERT_EQ(buf, res);
812 ASSERT_EQ('a', buf[0]);
813 ASSERT_EQ('0', buf[1]);
814 ASSERT_EQ('1', buf[2]);
815 ASSERT_EQ('2', buf[3]);
816 ASSERT_EQ('3', buf[4]);
817 ASSERT_EQ('4', buf[5]);
818 ASSERT_EQ('\0', buf[6]);
819 ASSERT_EQ('A', buf[7]);
820 ASSERT_EQ('A', buf[8]);
821 ASSERT_EQ('A', buf[9]);
822}
823
824TEST(TEST_NAME, strcat2) {
825 char buf[10];
826 memset(buf, 'A', sizeof(buf));
827 buf[0] = 'a';
828 buf[1] = '\0';
829 char* res = __strcat_chk(buf, "01234567", sizeof(buf));
830 ASSERT_EQ(buf, res);
831 ASSERT_EQ('a', buf[0]);
832 ASSERT_EQ('0', buf[1]);
833 ASSERT_EQ('1', buf[2]);
834 ASSERT_EQ('2', buf[3]);
835 ASSERT_EQ('3', buf[4]);
836 ASSERT_EQ('4', buf[5]);
837 ASSERT_EQ('5', buf[6]);
838 ASSERT_EQ('6', buf[7]);
839 ASSERT_EQ('7', buf[8]);
840 ASSERT_EQ('\0', buf[9]);
841}
Nick Kralevich93501d32013-08-28 10:47:43 -0700842
Christopher Ferris950a58e2014-04-04 14:38:18 -0700843TEST(TEST_NAME, stpncpy) {
844 char src[10];
845 char dst[10];
846 memcpy(src, "0123456789", sizeof(src)); // non null terminated string
847 stpncpy(dst, src, sizeof(dst));
848 ASSERT_EQ('0', dst[0]);
849 ASSERT_EQ('1', dst[1]);
850 ASSERT_EQ('2', dst[2]);
851 ASSERT_EQ('3', dst[3]);
852 ASSERT_EQ('4', dst[4]);
853 ASSERT_EQ('5', dst[5]);
854 ASSERT_EQ('6', dst[6]);
855 ASSERT_EQ('7', dst[7]);
856 ASSERT_EQ('8', dst[8]);
857 ASSERT_EQ('9', dst[9]);
858}
859
860TEST(TEST_NAME, stpncpy2) {
861 char src[10];
862 char dst[15];
863 memcpy(src, "012345678\0", sizeof(src));
864 stpncpy(dst, src, sizeof(dst));
865 ASSERT_EQ('0', dst[0]);
866 ASSERT_EQ('1', dst[1]);
867 ASSERT_EQ('2', dst[2]);
868 ASSERT_EQ('3', dst[3]);
869 ASSERT_EQ('4', dst[4]);
870 ASSERT_EQ('5', dst[5]);
871 ASSERT_EQ('6', dst[6]);
872 ASSERT_EQ('7', dst[7]);
873 ASSERT_EQ('8', dst[8]);
874 ASSERT_EQ('\0', dst[9]);
875 ASSERT_EQ('\0', dst[10]);
876 ASSERT_EQ('\0', dst[11]);
877 ASSERT_EQ('\0', dst[12]);
878 ASSERT_EQ('\0', dst[13]);
879 ASSERT_EQ('\0', dst[14]);
880}
881
Nick Kralevich93501d32013-08-28 10:47:43 -0700882TEST(TEST_NAME, strncpy) {
883 char src[10];
884 char dst[10];
885 memcpy(src, "0123456789", sizeof(src)); // non null terminated string
886 strncpy(dst, src, sizeof(dst));
887 ASSERT_EQ('0', dst[0]);
888 ASSERT_EQ('1', dst[1]);
889 ASSERT_EQ('2', dst[2]);
890 ASSERT_EQ('3', dst[3]);
891 ASSERT_EQ('4', dst[4]);
892 ASSERT_EQ('5', dst[5]);
893 ASSERT_EQ('6', dst[6]);
894 ASSERT_EQ('7', dst[7]);
895 ASSERT_EQ('8', dst[8]);
896 ASSERT_EQ('9', dst[9]);
897}
898
899TEST(TEST_NAME, strncpy2) {
900 char src[10];
901 char dst[15];
902 memcpy(src, "012345678\0", sizeof(src));
903 strncpy(dst, src, sizeof(dst));
904 ASSERT_EQ('0', dst[0]);
905 ASSERT_EQ('1', dst[1]);
906 ASSERT_EQ('2', dst[2]);
907 ASSERT_EQ('3', dst[3]);
908 ASSERT_EQ('4', dst[4]);
909 ASSERT_EQ('5', dst[5]);
910 ASSERT_EQ('6', dst[6]);
911 ASSERT_EQ('7', dst[7]);
912 ASSERT_EQ('8', dst[8]);
913 ASSERT_EQ('\0', dst[9]);
914 ASSERT_EQ('\0', dst[10]);
915 ASSERT_EQ('\0', dst[11]);
916 ASSERT_EQ('\0', dst[12]);
917 ASSERT_EQ('\0', dst[13]);
918 ASSERT_EQ('\0', dst[14]);
919}
Christopher Ferris16e185c2013-09-10 16:56:34 -0700920
921TEST(TEST_NAME, strcat_chk_max_int_size) {
922 char buf[10];
923 memset(buf, 'A', sizeof(buf));
924 buf[0] = 'a';
925 buf[1] = '\0';
Elliott Hughes58666732025-01-28 13:15:01 -0800926 volatile size_t n = -1;
927 char* res = __strcat_chk(buf, "01234567", n);
Christopher Ferris16e185c2013-09-10 16:56:34 -0700928 ASSERT_EQ(buf, res);
929 ASSERT_EQ('a', buf[0]);
930 ASSERT_EQ('0', buf[1]);
931 ASSERT_EQ('1', buf[2]);
932 ASSERT_EQ('2', buf[3]);
933 ASSERT_EQ('3', buf[4]);
934 ASSERT_EQ('4', buf[5]);
935 ASSERT_EQ('5', buf[6]);
936 ASSERT_EQ('6', buf[7]);
937 ASSERT_EQ('7', buf[8]);
938 ASSERT_EQ('\0', buf[9]);
939}
940
George Burgess IV849c0b92019-06-10 16:22:09 -0700941TEST(TEST_NAME, mempcpy_chk) {
942 const char input_str[] = "abcdefg";
943 size_t input_str_size = strlen(input_str) + 1;
944
945 char buf1[10] = {};
946 char buf2[10] = {};
947
948 __builtin_mempcpy(buf1, input_str, input_str_size);
949 __builtin___mempcpy_chk(buf2, input_str, input_str_size, __bos0(buf2));
950
951 ASSERT_EQ(memcmp(buf1, buf2, sizeof(buf2)), 0);
952
953 void *builtin_ptr = __builtin_mempcpy(buf1, input_str, input_str_size);
954 void *fortify_ptr = __builtin___mempcpy_chk(buf1, input_str, input_str_size, __bos0(buf2));
955
956 ASSERT_EQ(builtin_ptr, fortify_ptr);
957}
958
Christopher Ferris950a58e2014-04-04 14:38:18 -0700959extern "C" char* __stpcpy_chk(char*, const char*, size_t);
960
961TEST(TEST_NAME, stpcpy_chk_max_int_size) {
962 char buf[10];
Elliott Hughes58666732025-01-28 13:15:01 -0800963 volatile size_t n = -1;
964 char* res = __stpcpy_chk(buf, "012345678", n);
Christopher Ferris950a58e2014-04-04 14:38:18 -0700965 ASSERT_EQ(buf + strlen("012345678"), res);
966 ASSERT_STREQ("012345678", buf);
967}
968
Christopher Ferris16e185c2013-09-10 16:56:34 -0700969extern "C" char* __strcpy_chk(char*, const char*, size_t);
970
971TEST(TEST_NAME, strcpy_chk_max_int_size) {
972 char buf[10];
Elliott Hughes58666732025-01-28 13:15:01 -0800973 volatile size_t n = -1;
974 char* res = __strcpy_chk(buf, "012345678", n);
Christopher Ferris16e185c2013-09-10 16:56:34 -0700975 ASSERT_EQ(buf, res);
Christopher Ferris950a58e2014-04-04 14:38:18 -0700976 ASSERT_STREQ("012345678", buf);
Christopher Ferris16e185c2013-09-10 16:56:34 -0700977}
978
979extern "C" void* __memcpy_chk(void*, const void*, size_t, size_t);
980
Daniel Verkampdf4e06c2025-01-24 14:08:16 -0800981TEST(TEST_NAME, memcpy_chk_smaller) {
982 char buf[10] = "XXXXXXXXX";
Elliott Hughes58666732025-01-28 13:15:01 -0800983 volatile size_t n = 5;
Daniel Verkampdf4e06c2025-01-24 14:08:16 -0800984 void* res = __memcpy_chk(buf, "012346578", n, sizeof(buf));
985 ASSERT_EQ((void*)buf, res);
986 ASSERT_EQ('0', buf[0]);
987 ASSERT_EQ('1', buf[1]);
988 ASSERT_EQ('2', buf[2]);
989 ASSERT_EQ('3', buf[3]);
990 ASSERT_EQ('4', buf[4]);
991 ASSERT_EQ('X', buf[5]);
992 ASSERT_EQ('X', buf[6]);
993 ASSERT_EQ('X', buf[7]);
994 ASSERT_EQ('X', buf[8]);
995 ASSERT_EQ('\0', buf[9]);
996}
997
998TEST(TEST_NAME, memcpy_chk_exact_size) {
999 char buf[10] = "XXXXXXXXX";
Elliott Hughes58666732025-01-28 13:15:01 -08001000 volatile size_t n = 10;
Daniel Verkampdf4e06c2025-01-24 14:08:16 -08001001 void* res = __memcpy_chk(buf, "012345678", n, sizeof(buf));
1002 ASSERT_EQ((void*)buf, res);
1003 ASSERT_EQ('0', buf[0]);
1004 ASSERT_EQ('1', buf[1]);
1005 ASSERT_EQ('2', buf[2]);
1006 ASSERT_EQ('3', buf[3]);
1007 ASSERT_EQ('4', buf[4]);
1008 ASSERT_EQ('5', buf[5]);
1009 ASSERT_EQ('6', buf[6]);
1010 ASSERT_EQ('7', buf[7]);
1011 ASSERT_EQ('8', buf[8]);
1012 ASSERT_EQ('\0', buf[9]);
1013}
1014
Christopher Ferris16e185c2013-09-10 16:56:34 -07001015TEST(TEST_NAME, memcpy_chk_max_int_size) {
1016 char buf[10];
Elliott Hughes58666732025-01-28 13:15:01 -08001017 volatile size_t n = -1;
1018 void* res = __memcpy_chk(buf, "012345678", sizeof(buf), n);
Christopher Ferris16e185c2013-09-10 16:56:34 -07001019 ASSERT_EQ((void*)buf, res);
1020 ASSERT_EQ('0', buf[0]);
1021 ASSERT_EQ('1', buf[1]);
1022 ASSERT_EQ('2', buf[2]);
1023 ASSERT_EQ('3', buf[3]);
1024 ASSERT_EQ('4', buf[4]);
1025 ASSERT_EQ('5', buf[5]);
1026 ASSERT_EQ('6', buf[6]);
1027 ASSERT_EQ('7', buf[7]);
1028 ASSERT_EQ('8', buf[8]);
1029 ASSERT_EQ('\0', buf[9]);
1030}
Stephen Hines6e380722013-10-11 00:45:24 -07001031
1032// Verify that macro expansion is done properly for sprintf/snprintf (which
1033// are defined as macros in stdio.h under clang).
1034#define CONTENTS "macro expansion"
1035#define BUF_AND_SIZE(A) A, sizeof(A)
1036#define BUF_AND_CONTENTS(A) A, CONTENTS
1037#define BUF_AND_SIZE_AND_CONTENTS(A) A, sizeof(A), CONTENTS
1038TEST(TEST_NAME, s_n_printf_macro_expansion) {
1039 char buf[BUFSIZ];
1040 snprintf(BUF_AND_SIZE(buf), CONTENTS);
1041 EXPECT_STREQ(CONTENTS, buf);
1042
1043 snprintf(BUF_AND_SIZE_AND_CONTENTS(buf));
1044 EXPECT_STREQ(CONTENTS, buf);
1045
1046 sprintf(BUF_AND_CONTENTS(buf));
1047 EXPECT_STREQ(CONTENTS, buf);
1048}
Elliott Hughes4674e382015-02-02 09:15:19 -08001049
1050TEST_F(DEATHTEST, poll_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -08001051 volatile nfds_t fd_count = 2;
Elliott Hughes4674e382015-02-02 09:15:19 -08001052 pollfd buf[1] = {{0, POLLIN, 0}};
Yabin Cuif4fe6932015-02-03 17:52:32 -08001053 // Set timeout to zero to prevent waiting in poll when fortify test fails.
1054 ASSERT_FORTIFY(poll(buf, fd_count, 0));
Elliott Hughes4674e382015-02-02 09:15:19 -08001055}
1056
1057TEST_F(DEATHTEST, ppoll_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -08001058 volatile nfds_t fd_count = 2;
Elliott Hughes4674e382015-02-02 09:15:19 -08001059 pollfd buf[1] = {{0, POLLIN, 0}};
Elliott Hughes58666732025-01-28 13:15:01 -08001060 // Set timeout to zero to prevent waiting in ppoll if fortify test fails.
1061 timespec timeout = {};
Elliott Hughesb83bf142018-03-22 11:01:25 -07001062 ASSERT_FORTIFY(ppoll(buf, fd_count, &timeout, nullptr));
1063}
1064
1065TEST_F(DEATHTEST, ppoll64_fortified) {
Elliott Hughese7943f82023-09-28 08:20:20 -07001066#if defined(__BIONIC__) // glibc doesn't have ppoll64.
Elliott Hughes58666732025-01-28 13:15:01 -08001067 volatile nfds_t fd_count = 2;
Elliott Hughesb83bf142018-03-22 11:01:25 -07001068 pollfd buf[1] = {{0, POLLIN, 0}};
Elliott Hughes58666732025-01-28 13:15:01 -08001069 // Set timeout to zero to prevent waiting in ppoll if fortify test fails.
1070 timespec timeout= {};
Elliott Hughesb83bf142018-03-22 11:01:25 -07001071 ASSERT_FORTIFY(ppoll64(buf, fd_count, &timeout, nullptr));
1072#endif
Elliott Hughes4674e382015-02-02 09:15:19 -08001073}
Elliott Hughesb115aef2017-08-04 09:34:19 -07001074
1075TEST_F(DEATHTEST, open_O_CREAT_without_mode_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -08001076 volatile int flags = O_CREAT;
Elliott Hughesb115aef2017-08-04 09:34:19 -07001077 ASSERT_FORTIFY(open("", flags));
1078}
1079
1080TEST_F(DEATHTEST, open_O_TMPFILE_without_mode_fortified) {
Elliott Hughes58666732025-01-28 13:15:01 -08001081 volatile int flags = O_TMPFILE;
Elliott Hughesb115aef2017-08-04 09:34:19 -07001082 ASSERT_FORTIFY(open("", flags));
Elliott Hughesb115aef2017-08-04 09:34:19 -07001083}