From d28c99001b6b0690195a16de13239441178e2abf Mon Sep 17 00:00:00 2001 From: Cristian Cadar Date: Tue, 13 Oct 2020 16:12:20 +0100 Subject: Added test checking that a simple overflow is caught via -D_FORTIFY_SOURCE --- test/Runtime/FreeStanding/memcpy_chk_err.c | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 test/Runtime/FreeStanding/memcpy_chk_err.c (limited to 'test') diff --git a/test/Runtime/FreeStanding/memcpy_chk_err.c b/test/Runtime/FreeStanding/memcpy_chk_err.c new file mode 100644 index 00000000..b6071469 --- /dev/null +++ b/test/Runtime/FreeStanding/memcpy_chk_err.c @@ -0,0 +1,27 @@ +// This test checks that __memcpy_chk find the kind of errors it was +// designed to find + +// It requires clang >= 10, otherwise a direct call to memcpy is +// emitted instead of to __memcpy_chk +// REQUIRES: geq-llvm-10.0 + +// RUN: %clang %s -emit-llvm -O2 -g -c -D_FORTIFY_SOURCE=1 -o %t2.bc +// RUN: rm -rf %t.klee-out +// RUN: %klee --output-dir=%t.klee-out %t2.bc + +// RUN: test -f %t.klee-out/test000001.ptr.err +// RUN: FileCheck --input-file %t.klee-out/test000001.ptr.err %s +// CHECK: memcpy overflow + +#include "klee/klee.h" + +#include +#include +#include + +int main() { + char d[5]; + char* s = "1234567890"; + + memcpy(d, s, 10); +} -- cgit 1.4.1