Bitwise operators include the complement operator ~, bitwise shift operators >> and <<, bitwise AND operator &, bitwise exclusive OR operator ^, and bitwise inclusive OR operator | and compound assignment operators >>=, <<=, &=, ^= and |=. Bitwise operators should only be used with only with unsigned integer operands, as the results of some bitwise operations on signed integers is implementation defined.integers are implementation-defined.
The C11 standard, section 6.5, paragraph 4 [ISO/IEC 9899:2011], states:
Some operators (the unary operator ~ , and the binary operators <<, >>, &, ^, and |, collectively described as bitwise operators) shall have operands that have integral type. These operators return values that depend on the internal representations of integers, and thus have implementation-defined and undefined aspects for signed types.
Furthermore, the bitwise shift operators << and >> are undefined under many circumstances, and are implementation-defined for signed integers for more circumstances; see rule INT34-C. Do not shift an expression by a negative number of bits or by greater than or equal to the number of bits that exist in the operand for more information.
Implementation details
The Microsoft C compiler documentation says that:
Bitwise operations on signed integers work the same as bitwise operations on unsigned integers.
On-line GCC documentation about the implementation of bitwise operations on signed integers says:
Bitwise operators act on the representation of the value including both the sign and value bits, where the sign bit is considered immediately above the highest-value value bit.
Noncompliant Code Example (Right Shift)
The right-shift operation may be implemented as either an arithmetic (signed) shift or a logical (unsigned) shift. If E1 in the expression E1 >> E2 has a signed type and a negative value, the resulting value is implementation-defined. Also, be careful to avoid undefined behavior while performing a bitwise shift can result in undefined behavior. (See guideline INT34-C. Do not shift an expression by a negative number of bits or more bits than or by greater than or equal to the number of bits that exist in the operand.)unmigrated-wiki-markup
This noncompliant code example can result in an error condition on [implementations|BB. Definitions#implementation] in which an arithmetic shift is performed, and the sign bit is propagated as the number is shifted \[ [Dowd 2006|AA. Bibliography#Dowd 06]\].]:
| Code Block | ||||
|---|---|---|---|---|
| ||||
int rc = 0; int stringify = 0x80000000; char buf[sizeof("256")]; rc = snprintf(buf, sizeof(buf), "%u", stringify >> 24); if (rc == -1 || rc >= sizeof(buf)) { /* handleHandle error */ } |
In this example, stringify >> 24 evaluates to 0xFFFFFF80, or 4,294,967,168. When converted to a string, the resulting value "4294967168" is too large to store in buf and is truncated by snprintf().
If this code had been implemented using sprintf() instead of snprintf(), this noncompliant code example would have resulted in a buffer overflow.
Compliant Solution (
...
Right Shift)
In this compliant solution, stringify is declared as an unsigned integer. The value of the result of the right-shift operation is the integral part of the quotient of stringify / 2^24.2 ^ 24:
| Code Block | ||||
|---|---|---|---|---|
| ||||
int rc = 0; unsigned int stringify = 0x80000000; char buf[sizeof("256")]; rc = snprintf(buf, sizeof(buf), "%u", stringify >> 24); if (rc == -1 || rc >= sizeof(buf)) { /* handleHandle error */ } |
Also, consider using the sprintf_s() function defined in ISO/IEC TR 24731-1, instead of snprintf(), to provide some additional checks. (See guideline STR07-C. Use TR 24731 for remediation of existing string manipulation code.)
Exceptions
INT13-C-EX1: When used as bit flags, it is acceptable to use preprocessor macros or enumeration constants as arguments to the & and | operators even if the value is not explicitly declared as unsigned.
| Code Block | ||||
|---|---|---|---|---|
| ||||
fd = open(file_name, UO_WRONLY | UO_CREAT | UO_EXCL | UO_TRUNC, 0600);
|
INT13-C-EX2: If the right hand -side operand to a shift operator is known at compile time, it is acceptable for the value to be represented with a signed type provided it is positive.
| Code Block | ||||
|---|---|---|---|---|
| ||||
#define SHIFT 24
foo = 15u >> SHIFT;
|
...
Performing bitwise operations on signed numbers can lead to buffer overflows and the execution of arbitrary code by an attacker in some cases, unexpected or implementation-defined behavior in others.
Recommendation | Severity | Likelihood | Detectable |
|---|
Repairable | Priority | Level |
|---|---|---|
INT13-C | High |
Unlikely |
Yes |
No | P6 | L2 |
Automated Detection
Tool | Version | Checker | Description |
|---|
| Astrée |
|
|
|
| Section |
|---|
Fortify SCA |
| Section |
|---|
V. 5.0 |
| Section |
|---|
with the CERT C Rule Pack can detect violations of this recommendation |
| Section |
|---|
Splint |
| bitop-type | Fully checked | ||||||||
| Axivion Bauhaus Suite |
| CertC-INT13 | |||||||
| CodeSonar |
| LANG.TYPE.IOT | Inappropriate operand type | ||||||
| Compass/ROSE | Can |
| Section |
|---|
Compass/ROSE |
detect violations of this rule. In particular, it flags bitwise operations that involved variables not declared with | |||||||||
| CC2.INT13 | Fully implemented | |||||||
| Helix QAC |
| C4532, C4533, C4534, C4543, C4544 | |||||||
| Klocwork |
| MISRA.BITS.NOT_UNSIGNED MISRA.BITS.NOT_UNSIGNED.PREP | |||||||
| LDRA tool suite |
| 50 S | Fully implemented | ||||||
| Parasoft C/C++test |
| CERT_C-INT13-a CERT_C-INT13-b | Operands of bitwise and complement operators shall have an unsigned type Operands of shift operators shall have an unsigned type | ||||||
| PC-lint Plus |
| 9233 | Partially supported: reports use of a bitwise operator on an expression with a signed MISRA C 2004 underlying type | ||||||
| Checks for bitwise operation on negative value (rec. fully covered) | ||||||||
| RuleChecker |
| bitop-type | Fully checked | ||||||
| SonarQube C/C++ Plugin |
| ||||||||
| Splint |
|
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
...
...
Bibliography
...
| ISO/IEC TR 24772:2013 | Bit Representations [STR] Arithmetic Wrap-around Error [FIF] Sign Extension Error [XZI] |
| MITRE CWE | CWE-682, Incorrect calculation |
Bibliography
| [Dowd 2006] | Chapter 6, "C Language Issues" |
| [C99 Rationale 2003] | Subclause 6.5.7, |
...
| "Bitwise Shift Operators" |
...
shift operators" \[[ISO/IEC 9899:1999|AA. Bibliography#ISO/IEC 9899-1999]\] Section 6.5.7, "Bitwise shift operators" \[[ISO/IEC PDTR 24772|AA. Bibliography#ISO/IEC PDTR 24772]\] "STR Bit Representations," "XYY Wrap-around Error," and "XZI Sign Extension Error" \[[MITRE 2007|AA. Bibliography#MITRE 07]\] [CWE ID 682|http://cwe.mitre.org/data/definitions/682.html], "Incorrect Calculation" 04. Integers (INT)