Is there a dynamic checking utility that can flag the following bug? Valgrind cannot. Can Purify or Insure++? This is on Linux Ubuntu latest version.
struct A {
char buff1[8];
int jj;
char buff2[8];
int ii;
char buff3[8];
} a;
main(int argc, char *args[])
{
// Set intermediate fields to known flag value
a.ii = a.jj = 0xdeadbeef;
// Write 8 char string into 8 byte buffer - null will overflow into neighboring int field. ERROR
sprintf(a.buff2, "ABCDEFGH");
}
Not to my knowledge. Most (or rather: all?) memory verification tools work in a way that embeds read- and write protected pages as guard zones between and around variables in order to provoke traps on accesses beyond the legally allocated areas.
Without severely disturbing structure alignment and integrity, this cannot be easily done in the middle of a structure.
EDIT: Another point is: There is constructs where writing over structure member bounds is perfectly legal and the only reasonable possibility to achieve what you want. One example is copying structures to the heap:
This writes beyond structure member bounds as well, but is the only reasonable (and perfectly legal) way to get the structure onto the heap (apart from tedious and slow member-wise copy).
Another example would be
This is a perfectly valid constuct that allows you to clear an array of structures on the heap - And it does not even write aross internal struct boundaries, but also between structs.
In some sense, even calloc() would write beyond structure member bounds....
And, as a definite answer from the (admittedly older) Purify User Manual I happend to find in one of my desk drawers:
That counts as a "no" for me.