Charusso added inline comments.

================
Comment at: clang/lib/StaticAnalyzer/Checkers/cert/StrChecker.cpp:124
+  if (const SymbolicRegion *SR = DestMR->getSymbolicBase())
+    if (const Expr *SizeExpr = getDynamicSizeExpr(C.getState(), SR))
+      return exprToStr(SizeExpr, C);
----------------
NoQ wrote:
> Again, you will have to highlight the allocation site with a note. Therefore 
> you will have to write a bug visitor that traverses the size expression at 
> some point (or, equivalently, a note tag when the size expression is 
> evaluated). Therefore you don't need to store the expression in the program 
> state.
Yes, you have pointed out the necessary visitor, but it needs more thinking.

I have a memory region which could be any kind of "memory block region" 
therefore I have no idea where is the size expression. We are supporting ~20 
different allocations, which is nothing compared to the wild with the not so 
uncommon 5+ parameter allocators. Therefore I still do not want to reverse 
engineer a small MallocChecker + ExprEngine + BuiltinFunctionChecker inside my 
checker. They provide the necessary `DynamicSizeInfo` easily, which could be 
used in at least 4 checkers at the moment (which I have pointed out earlier in 
D68725).

If I have the size expression in the dynamic size map, and I can clearly point 
out the destination buffer, it is a lot more simplified to traverse the graph 
where the buffer and its size comes from.


================
Comment at: clang/lib/StaticAnalyzer/Checkers/cert/StrChecker.cpp:184
+  if (IsFix) {
+    if (Optional<std::string> SizeStr = getSizeExprAsString(Call, CallC, C)) {
+      renameFunctionFix(UseSafeFunctions ? "gets_s" : "fgets", Call, *Report);
----------------
NoQ wrote:
> Also, which is probably more important, you will never be able to provide a 
> fixit for the malloced memory case, because there may be multiple execution 
> paths that reach the current point with different size expressions (in fact, 
> not necessarily all of them are malloced).
> 
> Eg.:
> ```lang=c
> char *x = 0;
> char y[10];
> 
> if (coin()) {
>   x = malloc(20);
> } else {
>   x = y;
> }
> 
> gets(x);
> ```
> 
> If you suggest replacing `gets(x)` with `gets_s(x, 20)`, you'll still have a 
> buffer overflow on the else-branch on which `x` points to an array of 10 
> bytes.
This checker going to evolve a lot, and all of the checked function calls have 
issues like that. I do not even think what else issues they have. I would like 
to cover the false alarm suppression when we are about to alarm. Is it would be 
okay? I really would like to see alarms first.

For example, I have seen stuff in the wild so that I can state out 8-param 
allocators and we need to rely on the checkers provide information about 
allocation.


================
Comment at: clang/test/Analysis/cert/str31-alloc.cpp:42
+  // expected-warning@-1 {{'gets' could write outside of 'buf3'}}
+  // CHECK-FIXES: if (gets_s(buf3 + 1, sizeof(buf3))) {}
+}
----------------
NoQ wrote:
> The fix is not correct. It should be `sizeof(buf3) - 1`, otherwise you still 
> have a buffer overflow.
Good catch, thanks! I was really into the pretty-printing, we should not fix-it.


Repository:
  rC Clang

CHANGES SINCE LAST ACTION
  https://reviews.llvm.org/D69813/new/

https://reviews.llvm.org/D69813



_______________________________________________
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits

Reply via email to