Bitwise shifts include left-shift operations of the form shift-expression <<
additive-expression and right-shift operations of the form shift-expression >>
additive-expression. The standard integer promotions are first performed on the operands, each of which has an integer type. The type of the result is that of the promoted left operand. If the value of the right operand is negative or is greater than or equal to the width of the promoted left operand, the behavior is undefined. (See undefined behavior 48.
Non-Compliant Code Example (left shift)
Wiki Markup |
---|
The result of {{E1 << E2}} is {{E1}} left-shifted {{E2}} bit positions; vacated bits are filled with zeros. If {{E1}} has an unsigned type, the value of the result is {{E1 * 2 ^E2^}}, reduced modulo one more than the maximum value representable in the result type. As a result, left shift operations can result in an integer overflow condition (see \[[INT32-C|INT32-C. Ensure that integer operations do not result in an overflow]\]). If {{E1}} has a signed type and nonnegative value, and {{E1 * 2 ^E2^}} is representable in the result type, then that is the resulting value; otherwise, the behavior is undefined. |
)
Do not shift an expression by a negative number of bits or by a number greater than or equal to the precision of the promoted left operand. The precision of an integer type is the number of bits it uses to represent values, excluding any sign and padding bits. For unsigned integer types, the width and the precision are the same; whereas for signed integer types, the width is one greater than the precision. This rule uses precision instead of width because, in almost every case, an attempt to shift by a number of bits greater than or equal to the precision of the operand indicates a bug (logic error). A logic error is different from overflow, in which there is simply a representational deficiency. In general, shifts should be performed only on unsigned operands. (See INT13-C. Use bitwise operators only on unsigned operands.)
Noncompliant Code Example (Left Shift, Unsigned Type)
The result of E1 << E2
is E1
left-shifted E2
bit positions; vacated bits are filled with zeros. The following diagram illustrates the left-shift operation.
According to the C Standard, if E1
has an unsigned type, the value of the result is E1
* 2
E2
, reduced modulo 1 more than the maximum value representable in the result type.
This noncompliant code example fails to ensure that the right operand is less than the precision of the promoted left operand:
Code Block | ||||
---|---|---|---|---|
| ||||
void func(unsigned int ui_a, unsigned int ui_b) {
unsigned int uresult = ui_a << ui_b;
/* ... */
} |
Compliant Solution (Left Shift, Unsigned Type)
This compliant solution eliminates the possibility of shifting by greater than or equal to the number of bits that exist in the precision of the left operand:
Code Block | ||||
---|---|---|---|---|
| ||||
#include <limits.h>
#include <stddef.h>
#include <inttypes.h>
extern size_t popcount(uintmax_t);
#define PRECISION(x) popcount(x)
void func(unsigned int ui_a, unsigned int ui_b) {
unsigned int uresult = 0;
if (ui_b >= PRECISION(UINT_MAX)) {
/* Handle error */
} else {
uresult = ui_a << ui_b;
}
/* ... */
} |
The
macro and PRECISION()
popcount()
function provide the correct precision for any integer type. (See INT35-C. Use correct integer precisions.)
Modulo behavior resulting from left-shifting an unsigned integer type is permitted by exception INT30-EX3 to INT30-C. Ensure that unsigned integer operations do not wrap.
Noncompliant Code Example (Left Shift, Signed Type)
The result of E1 << E2
is E1
left-shifted E2
bit positions; vacated bits are filled with zeros. If E1
has a signed type and nonnegative value, and E1
* 2
E2
is representable in the result type, then that is the resulting value; otherwise, the behavior is undefined.
This noncompliant code example fails The following code can result in undefined behavior because there is no check to ensure that left and right operands have nonnegative values , and that the right operand is greater less than or equal to the width precision of the promoted left operand. This example does check for signed integer overflow in compliance with INT32-C. Ensure that operations on signed integers do not result in overflow.
Code Block | ||||
---|---|---|---|---|
| ||||
#include <limits.h> int si1, si2, sresult; unsigned int ui1, ui2, uresult; sresult = si1 << si2; uresult = ui1 << ui2; |
Compliant Solution (left shift)
Wiki Markup |
---|
This compliant solution eliminates the possibility of undefined behavior resulting from a left shift operation on signed and unsigned integers. Smaller sized integers are promoted according to the integer promotion rules \[[INT02-A|INT02-A. Understand integer conversion rules]\]. |
#include <stddef.h>
#include <inttypes.h>
void func(signed long si_a, signed long si_b) {
signed long result;
if (si_a > (LONG_MAX >> si_b)) {
/* Handle error */
} else {
result = si_a << si_b;
}
/* ... */
} |
Shift operators and other bitwise operators should be used only with unsigned integer operands in accordance with INT13-C. Use bitwise operators only on unsigned operands.
Compliant Solution (Left Shift, Signed Type)
In addition to the check for overflow, this compliant solution ensures that both the left and right operands have nonnegative values and that the right operand is less than the precision of the promoted left operand:
Code Block | ||||
---|---|---|---|---|
| ||||
#include <limits.h>
#include <stddef.h>
#include <inttypes.h>
extern size_t popcount(uintmax_t);
#define PRECISION(x) popcount(x)
void func(signed long si_a, signed long si_b) {
signed long result;
if ((si_a | ||||
Code Block | ||||
| ||||
int si1, si2, sresult; unsigned int ui1, ui2, uresult; if ( (si1 < 0) || (si2si_b < 0) || (si2 (si_b >= sizeofPRECISION(int)*CHAR_BITULONG_MAX)) || si1 (si_a > (INTLONG_MAX >> si2si_b)) ) { /* handleHandle error condition */ } else { sresult = si1 << si2; } if ( (ui2 >= sizeof(unsigned int)*CHAR_BIT) || (ui1 > (UINT_MAX / (1 << ui2))) ) { result = si_a << si_b; } /* handle error condition */ } else { uresult = ui1 << ui2; } |
In C99, the CHAR_BIT
macro defines the number of bits for smallest object that is not a bit-field (byte). A byte, therefore, contains CHAR_BIT
bits.
...
... */
}
|
Noncompliant Code Example (Right Shift)
The result of E1 >> E2
is E1
}} right-shifted E2
bit positions. If E1
has an unsigned type or if E1
has a signed type and a nonnegative value, the value of the result is the integral part of the quotient of E1
/ 2
E2
. If E1
has a signed type and a negative value, theresulting the resulting value is implementation-defined.This code can result in an unsigned overflow during the shift operation of the unsigned operands ui1
and ui2
. If this behavior is unanticipated, the resulting value may be used to allocate insufficient memory for a subsequent operation or in some other manner that could lead to an exploitable vulnerability. and can be either an arithmetic (signed) shift
or a logical (unsigned) shift
This noncompliant code example fails to test whether the right operand is greater than or equal to the precision of the promoted left operand, allowing undefined behavior:
Code Block | ||||
---|---|---|---|---|
| ||||
void func(unsigned signed int si1, si2, result; result = ui1 >> ui2; |
...
ui_a, unsigned int ui_b) {
unsigned int uresult = ui_a >> ui_b;
/* ... */
} |
When working with signed operands, making assumptions about whether a right shift is implemented as an arithmetic (signed) shift or a logical (unsigned) shift can also lead to vulnerabilities. (See INT13-C. Use bitwise operators only on unsigned operands.)
Compliant Solution (Right Shift)
This compliant solution tests the suspect shift operation to guarantee there is no possibility of unsigned overflow.eliminates the possibility of shifting by greater than or equal to the number of bits that exist in the precision of the left operand:
Code Block | |||||
---|---|---|---|---|---|
| |||||
#include <limits.h> #include <stddef.h> #include <inttypes.h> extern size_t popcount(uintmax_t); #define PRECISION(x) popcount(x) void func( unsigned int ui1ui_a, ui2, result; if ( (ui2 < 0) || (ui2 unsigned int ui_b) { unsigned int uresult = 0; if (ui_b >= sizeof(unsigned int)*CHAR_BIT) PRECISION(UINT_MAX)) { /* handleHandle error condition */ } result else { uresult = ui1 >> ui2; |
References
...
ui_a >> ui_b;
}
/* ... */
} |
Implementation Details
GCC has no options to handle shifts by negative amounts or by amounts outside the width of the type predictably or to trap on them; they are always treated as undefined. Processors may reduce the shift amount modulo the width of the type. For example, 32-bit right shifts are implemented using the following instruction on x86-32:
Code Block |
---|
sarl %cl, %eax
|
The sarl
instruction takes a bit mask of the least significant 5 bits from %cl
to produce a value in the range [0, 31] and then shift %eax
that many bits:
Code Block |
---|
// 64-bit right shifts on IA-32 platforms become
shrdl %edx, %eax
sarl %cl, %edx
|
where %eax
stores the least significant bits in the doubleword to be shifted, and %edx
stores the most significant bits.
Risk Assessment
Although shifting a negative number of bits or shifting a number of bits greater than or equal to the width of the promoted left operand is undefined behavior in C, the risk is generally low because processors frequently reduce the shift amount modulo the width of the type.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
INT34-C | Low | Unlikely | Medium | P2 | L3 |
Automated Detection
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
Astrée |
| precision-shift-width | Fully checked | ||||||
Axivion Bauhaus Suite |
| CertC-INT34 | Can detect shifts by a negative or an excessive number of bits and right shifts on negative values. | ||||||
CodeSonar |
| LANG.ARITH.BIGSHIFT | Shift amount exceeds bit width | ||||||
Compass/ROSE | Can detect violations of this rule. Unsigned operands are detected when checking for INT13-C. Use bitwise operators only on unsigned operands | ||||||||
Coverity |
| BAD_SHIFT | Implemented | ||||||
Cppcheck |
| shiftNegative, shiftTooManyBits | Context sensitive analysis | ||||||
Cppcheck Premium |
| shiftNegative, shiftTooManyBits premium-cert-int34-c | Context sensitive analysis Warns whenever Cppcheck sees a negative shift for a POD expression (The warning for shifting too many bits is written only if Cppcheck has sufficient type information and you use --platform to specify the sizes of the standard types.) | ||||||
ECLAIR |
| CC2.INT34 | Partially implemented | ||||||
Helix QAC |
| C0499, C2790, C++2790, C++3003 DF2791, DF2792, DF2793 | |||||||
Klocwork |
| MISRA.SHIFT.RANGE.2012 | |||||||
LDRA tool suite |
| 51 S, 403 S, 479 S | Partially implemented | ||||||
Parasoft C/C++test |
| CERT_C-INT34-a | Avoid incorrect shift operations | ||||||
Polyspace Bug Finder |
| Checks for:
Rule partially covered. | |||||||
PVS-Studio |
| V610 | |||||||
RuleChecker |
| precision-shift-width-constant | Partially checked | ||||||
TrustInSoft Analyzer |
| shift | Exhaustively verified (see one compliant and one non-compliant example). |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
Key here (explains table format and definitions)
Taxonomy | Taxonomy item | Relationship |
---|---|---|
CERT C | INT13-C. Use bitwise operators only on unsigned operands | Prior to 2018-01-12: CERT: Unspecified Relationship |
CERT C | INT35-C. Use correct integer precisions | Prior to 2018-01-12: CERT: Unspecified Relationship |
CERT C | INT32-C. Ensure that operations on signed integers do not result in overflow | Prior to 2018-01-12: CERT: Unspecified Relationship |
ISO/IEC TR 24772:2013 | Arithmetic Wrap-Around Error [FIF] | Prior to 2018-01-12: CERT: Unspecified Relationship |
CWE 2.11 | CWE-682 | 2017-07-07: CERT: Rule subset of CWE |
CWE 2.11 | CWE-758 | 2017-07-07: CERT: Rule subset of CWE |
CERT-CWE Mapping Notes
Key here for mapping notes
CWE-758 and INT34-C
Independent( INT34-C, INT36-C, MEM30-C, MSC37-C, FLP32-C, EXP33-C, EXP30-C, ERR34-C, ARR32-C)
CWE-758 = Union( INT34-C, list) where list =
- Undefined behavior that results from anything other than incorrect bit shifting
CWE-682 and INT34-C
Independent( INT34-C, FLP32-C, INT33-C) CWE-682 = Union( INT34-C, list) where list =
- Incorrect calculations that do not involve out-of-range bit shifts
Bibliography
...
[C99 Rationale 2003] | 6.5.7, "Bitwise Shift Operators" |
[Dowd 2006] | Chapter 6, "C Language Issues" |
[Seacord 2013b] | Chapter 5, "Integer Security" |
[Viega 2005] |
Section 5.2.7, "Integer |
...
Overflow" |
...
...