1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
|
/* { dg-skip-if "requires hosted libstdc++ for stdlib malloc" { ! hostedlib } } */
#include <stdlib.h>
#include <string.h>
#include <stdint.h>
#include <stdio.h>
/* Wanalyzer-out-of-bounds tests for buffer overflows. */
/* Avoid folding of memcpy. */
typedef void * (*memcpy_t) (void *dst, const void *src, size_t n);
static memcpy_t __attribute__((noinline))
get_memcpy (void)
{
return memcpy;
}
/* Taken from CWE-787. */
void test1 (void)
{
int id_sequence[3];
id_sequence[0] = 123;
id_sequence[1] = 234;
id_sequence[2] = 345;
id_sequence[3] = 456; /* { dg-line test1 } */
/* { dg-warning "stack-based buffer overflow" "warning" { target *-*-* } test1 } */
/* { dg-message "write of 4 bytes to beyond the end of 'id_sequence'" "num bad bytes note" { target *-*-* } test1 } */
/* { dg-message "valid subscripts for 'id_sequence' are '\\\[0\\\]' to '\\\[2\\\]'" "valid subscript note" { target *-*-* } test1 } */
}
void test2 (void)
{
int n = 4;
int arr[4];
for (int i = n - 1; i >= 0; i--)
arr[i] = i;
}
void test3 (void)
{
int n = 4;
int arr[4];
for (int i = n; i >= 0; i--)
arr[i] = i; /* { dg-line test3 } */
/* { dg-warning "stack-based buffer overflow" "warning" { target *-*-* } test3 } */
/* { dg-message "write of 4 bytes to beyond the end of 'arr'" "num bad bytes note" { target *-*-* } test3 } */
/* { dg-message "valid subscripts for 'arr' are '\\\[0\\\]' to '\\\[3\\\]'" "valid subscript note" { target *-*-* } test3 } */
}
void test4 (void)
{
int *arr = (int *)malloc (4 * sizeof (int));
if (!arr)
return;
int *last_el = arr + 3;
*last_el = 3;
free (arr);
}
void test5 (void)
{
int *arr = (int *)malloc (4 * sizeof (int));
if (!arr)
return;
int *last_el = arr + 4;
*last_el = 4; /* { dg-line test5 } */
free (arr);
/* { dg-warning "heap-based buffer overflow" "warning" { target *-*-* } test5 } */
/* { dg-message "" "note" { target *-*-* } test5 } */
}
/* Taken from "A Provenance-aware Memory Object Model for C". */
int y = 2, x = 1; /* { dg-message "capacity" } */
void test6 (void)
{
int *p = &x + 1;
int *q = &y;
printf ("Addresses: p=% p q=% p \n" , (void *) p, (void *) q);
if (memcmp (&p , &q , sizeof (p)) == 0)
{
*p = 11; /* { dg-line test6b } */
printf ("x=%d y=%d *p=%d *q=%d\n" , x, y, *p, *q); /* { dg-line test6c } */
}
/* { dg-warning "buffer overflow" "warning" { target *-*-* } test6b } */
/* { dg-message "" "note" { target *-*-* } test6b } */
/* { dg-warning "buffer over-read" "warning" { target *-*-* } test6c } */
/* { dg-message "" "note" { target *-*-* } test6c } */
}
extern int is_valid (void);
int returnChunkSize (int *ptr)
{
/* If chunk info is valid, return the size of usable memory,
else, return -1 to indicate an error. */
return is_valid () ? sizeof (*ptr) : -1;
}
/* Taken from CWE-787. */
void test7 (void)
{
memcpy_t fn = get_memcpy ();
int destBuf[4];
int srcBuf[4];
fn (destBuf, srcBuf, returnChunkSize (destBuf)); /* { dg-line test7 } */
// TODO: Should we handle widening_svalues as a follow-up?
/* { dg-warning "over-read" "warning" { xfail *-*-* } test7 } */
/* { dg-warning "use of uninitialized value" "uninit warning" { target *-*-* } test7 } */
/* { dg-warning "overflow" "warning" { xfail *-*-* } test7 } */
}
|