https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64964

            Bug ID: 64964
           Summary: -D_FORTIFY_SOURCE=2 passes incorrect length to _chk
                    functions in some cases
           Product: gcc
           Version: 5.0
            Status: UNCONFIRMED
          Severity: normal
          Priority: P3
         Component: c
          Assignee: unassigned at gcc dot gnu.org
          Reporter: nszabolcs at gmail dot com

in the following simple testcase the valid length of x.a+1 is 1, but 2 is
passed to __strcpy_chk according to the asm (gcc-4.8 gets it right, glibc
debug/tst-chk3 and debug/tst-chk6 testcases fail now with gcc built from trunk)

at runtime x.b[0] gets clobbered with 0 and there is no failure reported.

$ cat chk.c
#include <string.h>

int main()
{
    char *volatile s = "A";
    struct { char a[2]; char b[1]; } x;
    strcpy(x.a+1, s);
    return 0;
}
$ gcc -D_FORTIFY_SOURCE=2 -O -S chk.c
$ cat chk.s
    .file    "chk.c"
    .section    .rodata.str1.1,"aMS",@progbits,1
.LC0:
    .string    "A"
    .text
    .globl    main
    .type    main, @function
main:
.LFB22:
    .cfi_startproc
    subq    $24, %rsp
    .cfi_def_cfa_offset 32
    movq    $.LC0, 8(%rsp)
    movq    8(%rsp), %rsi
    movl    $2, %edx
    leaq    1(%rsp), %rdi
    call    __strcpy_chk
    movl    $0, %eax
    addq    $24, %rsp
    .cfi_def_cfa_offset 8
    ret
    .cfi_endproc
.LFE22:
    .size    main, .-main
    .ident    "GCC: (GNU) 5.0.0 20150205 (experimental)"
    .section    .note.GNU-stack,"",@progbits

Reply via email to