An object that is accessed through a restrict
-qualified pointer has a special association with that pointer. This association requires that all accesses to that object use, directly or indirectly, the value of that particular pointer. The intended use of the restrict qualifier is to promote optimization, and deleting all instances of the qualifier from a program does not change its meaning (that is, observable behavior). In the absence of this qualifier, other pointers can alias this object. Caching the value in an object designated through a restrict
-qualified pointer is safe at the beginning of the block in which the pointer is declared , because no preexisting aliases may also be used to reference that object. The cached value must be restored to the object by the end of the block, where preexisting aliases again become available. New aliases may be formed within the block, but these must all depend on the value of the restrict
-qualified pointer so that they can be identified and adjusted to refer to the cached value. For a restrict
-qualified pointer at file scope, the block is the body of each function in the file [Walls 2006]. Developers should be aware that C++ does not support the restrict
qualifier, but some C++ compiler vendors support implementations support an equivalent qualifier as an extension.
The C Standard [ISO/IEC 9899:20112024] identifies the following undefined behavior:
A restrict-qualified pointer is assigned a value based on another restricted pointer whose associated block neither began execution before the block associated with this pointer, nor ended before the assignment (6.7.34.12).
This is an oversimplification, however, and it is important to review the formal definition of restrict in subclause 6.7.3.1 of the C Standard to properly understand undefined behaviors associated with the use of restrict
-qualified pointers.
Overlapping Objects
The restrict
qualifier requires that the pointers do not reference overlapping objects. If the objects referenced by arguments to functions overlap (meaning the objects share some common memory addresses), the behavior is undefined.
Noncompliant Code Example
In this noncompliant This code example , assignments between restricted is noncompliant because an assignment is made between two restrict
-qualified pointers in the same scope is disallowed.:
Code Block | ||||
---|---|---|---|---|
| ||||
int * restrict a; int * restrict b; extern int c[]; int main(void) { c[0] = 17; c[1] = 18; a = &c[0]; b = &c[1]; a = b; /* Undefined behavior */ /* ... */ } |
Note that that undefined behavior occurs only when a
is assigned to b
. It is valid for a
and b
to point into the same array object because what matters is which elements are accessed. Provided , provided the range of elements accessed through one of the pointers does not overlap with the range of elements accessed through the other pointer, there is no undefined behavior.
Compliant Solution
One way to eliminate the undefined behavior is simply to remove the restrict-
qualification from the affected pointers:
Code Block | ||||
---|---|---|---|---|
| ||||
int * a; int * b; extern int c[]; int main(void) { c[0] = 17; c[1] = 18; a = &c[0]; b = &c[1]; a = b; /* Valid definedDefined behavior */ /* ... */ } |
restrict
-Qualified Function Parameters
When calling functions that have restrict
-qualified function parameters, it is important that pointers important that the pointer arguments do not reference overlapping objects if one or more of the objects the pointers are used to modify memory. ThusConsequently, it is important to understand the semantics of the function being called.
Noncompliant Code Example
In this noncompliant code example, the function f()
accepts three parameters. The function copies n
integers from the int
array referenced by the restrict
-qualified pointer p
to the int
array referenced by the restrict
-qualified pointer q
. Because the object destination array is modified during each execution of the function (for which n
is nonzero), if an object the array is accessed through one of the pointer parameters, it cannot also be accessed through the other. Declaring these function parameters as restrict
-qualified pointers allows aggressive optimization by the compiler but can also result in undefined behavior if these pointers refer to overlapping objects.
Code Block | ||||
---|---|---|---|---|
| ||||
#include <stddef.h> void f(size_t n, int * restrict p, const int * restrict q) { while (n-- > 0) { *p++ = *q++; } } void g(void) { extern int d[100]; /* ... */ f(50, d + 1, d); /* Undefined behavior */ } |
The function g()
declares an array d
consisting of 100 int
values and then invokes f()
to copy memory from one area of the array to another. This call has undefined behavior because each of d[1]
through d[49]
is accessed through both p
and q
.
Compliant Solution
In this compliant solution, the function f()
is unchanged but the programmer has ensured that none of the calls to f()
result in undefined behavior. The call of to f()
in g()
is valid because the storage allocated to d
is effectively divided into two disjoint objects.
Code Block | ||||
---|---|---|---|---|
| ||||
#include <stdlib<stddef.h> void f(size_t n, int * restrict p, const int * restrict q) { while (n-- > 0) { *p++ = *q++; } } void g(void) { extern int d[100]; /* ... */ f(50, d + 50, d); /* ValidDefined defined behavior */ } |
Noncompliant Code Example
In this noncompliant code example, the function add()
adds the integer array referenced by the restrict
-qualified pointers lhs to the integer array referenced by the restrict
-qualified pointer rhs
and stores the result in the restrict
-qualified pointer referenced by res
. The call add(100, a, a, a)
The function f()
declares an array a
consisting of 100 int
values and then invokes add()
to copy memory from one area of the array to another. The call add(100, a, a, a)
has undefined behavior because the object modified by res
is accessed by lhs and rhs
.
Code Block | ||||
---|---|---|---|---|
| ||||
#include <stddef.h> void add(size_t n, int * restrict res, const int * restrict lhs, const int * restrict rhs) { for (size_t i = 0; i < n; ++i) { res[i] = lhs[i] + rhs[i]; } } void f(void) { int a[100]; add(100, a, a, a); /* Undefined behavior */ } |
The function f()
declares an array a
consisting of 100 int
values and then invokes add()
to copy memory from one area of the array to another. This call has undefined behavior because each of a[1]
through a[49]
is accessed through both lhs and rhs
.
Compliant Solution
In this compliant solution, an unmodified object is aliased through two restricted pointers. Because a
and b
are disjoint arrays, a call of the form add(100, a, b, b)
has defined behavior, because array b
is not modified within function add
.
Compliant Solution
In this compliant solution, an unmodified object is aliased through two restricted pointers. Because a
and b
are disjoint arrays, a call of the form add(100, a, b, b)
has defined behavior, because array b
is not modified within function add
.
Code Block | ||||
---|---|---|---|---|
| ||||
#include <stddef.h>
void add(size_t n, int *restrict res, const int *restrict lhs,
const int *restrict rhs) {
for (size_t i = 0; i < n; ++i) {
res[i] = lhs[i] | ||||
Code Block | ||||
| ||||
#include <stddef.h> void add(size_t n, int * restrict res, int * restrict lhs, int * restrict rhs) { for (size_t i = 0; i < n; ++i) { res[i] = lhs[i] + rhs[i]; } } void f(void) { int a[100]; int b[100]; add(100, a, b, b); /* ValidDefined defined behavior */ } |
Invoking Library Functions with restrict
-Qualified Pointers
Ensure that restrict
-qualified source and destination pointers do not reference overlapping objects when invoking library functions. For example, the following table lists C Standard standard library functions that copy memory from a source object referenced by a restrict
-qualified pointer to a destination object that is also referenced by a restrict
-qualified pointer:
Standard C | Annex K |
---|---|
strcpy() | strcpy_s() |
strncpy() | strncpy_s() |
strcat() | strcat_s() |
strncat() | strncat_s() |
memcpy() | memcpy_s() |
strtok_s() |
If the objects referenced by arguments to functions overlap (meaning the objects share some common memory addresses), the behavior is undefined. (See also undefined behavior 68 in Appendix J of the C Standard.) The result of the functions is unknown, and data may be corrupted. As a result, these functions must never be passed pointers to overlapping objects. If data must be copied between objects that share common memory addresses, a copy function guaranteed to work on overlapping memory, such as memmove()
, should be used.
Noncompliant Code Example
In this noncompliant code example, the values of objects referenced by ptr1
and ptr2
become unpredictable after the call to memcpy()
because their memory areas overlap:
Code Block | ||||
---|---|---|---|---|
| ||||
#include <string.h> void func(void) { char c_str[]= "test string"; char *ptr1 = c_str; char *ptr2; ptr2 = ptr1 + 3; /* Undefined behavior duebecause toof overlapping objects */ memcpy(ptr2, ptr1, 6); /* ... */ } |
Compliant Solution
In this compliant solution, the call to memcpy()
is replaced with a call to memmove()
. The memmove()
function performs the same operation as memcpy()
when the memory regions do not overlap. When the memory regions do overlap, the n characters from the object pointed to by the source (ptr1
) are first copied into a temporary array of n characters that does not overlap the objects pointed to by the destination (ptr2
) or the source. The n characters from the temporary array are then copied into the object pointed to by the destination.
Code Block | ||||
---|---|---|---|---|
| ||||
#include <string.h>
void func(void) {
char c_str[]= "test string";
char *ptr1 = c_str;
char *ptr2;
ptr2 = ptr1 + 3;
memmove(ptr2, ptr1, 6); /* Replace call to memcpy() */
/* ... */
} |
Similar solutions using memmove()
can replace the string functions as long as care is taken regarding the byte size of the characters and proper null-termination of the copied string.
Calling Functions with restrict
-Qualified Pointer to a const
-Qualified Type
Ensure that functions that accept a restrict
-qualified pointer to a const
-qualified type do not modify the object referenced by that pointer. Formatted input and output standard library functions frequently fit this description. The following table lists of some of the common functions for which the format argument is a restrict
-qualified pointer to a const
-qualified type.
Standard C | Annex K |
---|---|
printf() | printf_s() |
scanf() | scanf_s() |
sprintf() | sprintf_s() |
snprintf() | snprintf_s() |
For formatted output functions such as printf()
, it is unlikely that a programmer would modify the format string. However, an attacker may attempt to do so if a program violates FIO30-C. Exclude user input from format strings and passes tainted values as part of the format string.
Noncompliant Code Example
In this noncompliant code example, the programmer is attempting to overwrite the format string with a string value read in from stdin
such as "%d%f 1 3.3"
and use the resulting modified string of "%s%d%f"
to input the subsequent values of 1
and 3.3
:
Code Block | ||||
---|---|---|---|---|
| ||||
#include <stdio.h> void func(void) { int i; float x; char format[100] = "%s"; /* Undefined behavior */ int n = scanf(format, format + 2, &i, &x); /* ... */ } |
Compliant Solution
The same intended results can be achieved as shown in are achieved by this compliant solution:
Code Block | ||||
---|---|---|---|---|
| ||||
#include <stdio.h> void func(void) { int i; float x; int n = scanf("%d%f", &i, &x); /* Valid definedDefined behavior */ /* ... */ } |
Outer-to-
...
Inner Assignments between Restricted Pointers
The assignment between restricted restrict
-qualified pointers declared in an inner nested block from an outer block has well- defined behavior.
Noncompliant Code Example
The assignment of restrict
-qualified pointers to other restrict
-qualified pointers within the same block has undefined behavior:
Code Block | ||||
---|---|---|---|---|
| ||||
void func(void) { int * restrict p1; int * restrict q1; int * restrict p2 = p1; /* Undefined behavior */ int * restrict q2 = q1; /* Undefined behavior */ } |
Compliant Solution
The same intended results can be achieved using a an inner nested block, as shown in this compliant solution:
Code Block | ||||
---|---|---|---|---|
| ||||
void func(void) { int * restrict p1; int * restrict q1; { /* Added inner block */ int * restrict p2 = p1; /* Valid, well-defined behavior */ int * restrict q2 = q1; /* Valid, well-defined behavior */ } } |
Risk Assessment
The incorrect use of restrict
-qualified pointers can result in undefined behavior that might be exploited to cause data integrity violations.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
EXP43-C | Medium | Probable | High | P4 | L3 |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Automated Detection
...
Tool
...
Version
...
Checker
...
Description
...
...
*/
}
} |
Risk Assessment
The incorrect use of restrict
-qualified pointers can result in undefined behavior that might be exploited to cause data integrity violations.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
EXP43-C | Medium | Probable | High | P4 | L3 |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Automated Detection
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
Astrée |
| restrict | Supported indirectly via MISRA C 2012 Rule 8.14. | ||||||
CodeSonar |
| LANG.TYPE.RESTRICT | Restrict qualifier used | ||||||
Coverity |
| MISRA C 2012 Rule 8.14 | Partially implemented | ||||||
Cppcheck Premium |
| premium-cert-exp43-c | Partially implemented | ||||||
GCC | 8.1 | -Wrestrict | Fully implemented | ||||||
Helix QAC |
| C1057 | |||||||
Klocwork |
| MISRA.TYPE.RESTRICT.QUAL.2012 | |||||||
LDRA tool suite |
| 480 S, 489 S, 613 S | Enhanced enforcement | ||||||
Parasoft C/C++test |
| CERT_C-EXP43-a | The restrict type qualifier shall not be used | ||||||
PC-lint Plus |
| 586 | Assistance provided: reports use of the restrict keyword | ||||||
Polyspace Bug Finder |
| Checks for copy of overlapping memory (rule partially covered) | |||||||
RuleChecker |
| restrict | Supported indirectly via MISRA C 2012 Rule 8.14. | ||||||
SonarQube C/C++ Plugin |
| S1836 | Implements MISRA C:2012 Rule 8.14 to flag uses of restrict |
Related Guidelines
Key here (explains table format and definitions)
...
480 S 489 S
...
Related Guidelines
Taxonomy | Taxonomy item | Relationship |
---|
CERT C Secure Coding Standard | FIO30-C. Exclude user input from format |
strings | Prior to 2018-01-12: CERT: Unspecified Relationship | |
ISO/IEC TR 24772:2013 | Passing Parameters and Return Values [CSJ] | Prior to 2018-01-12: CERT: Unspecified Relationship |
ISO/IEC TS |
17961 | Passing pointers into the same object as arguments to different restrict-qualified parameters [restrict] | Prior to 2018-01-12: CERT: Unspecified Relationship |
MISRA C:2012 | Rule 8.14 (required)1 | Prior to 2018-01-12: CERT: Unspecified Relationship |
- MISRA Rule 8.14 prohibits the use of the restrict keyword except in C standard library functions.
Bibliography
...