================
@@ -0,0 +1,34 @@
+// RUN: %clang_analyze_cc1
+// -analyzer-checker=optin.taint,core,security.ArrayBound -analyzer-config
+// assume-controlled-environment=true -analyzer-output=text -verify %s
+
+// This file is for testing enhanced diagnostics produced by the
+// GenericTaintChecker
+
+typedef __typeof(sizeof(int)) size_t;
+int scanf(const char *restrict format, ...);
+int system(const char *command);
+size_t strlen(const char *str);
+char *strncat(char *destination, const char *source, size_t num);
+
+// This is to test that in trusted env the diagnostics are constructed so that
+// argc or argv are not marked as taint origin.
+int main(int argc, char *argv[]) {
+ if (argc < 1) // expected-note {{'argc' is >= 1}}
+ // expected-note@-1 {{Taking false branch}}
+ return 1;
+ char cmd[2048] = "/bin/cat ";
+ char filename[1024];
+ scanf("%s",
+ filename); // expected-note {{Taint originated here}}
+ // expected-note@-1 {{Taint propagated to the 2nd argument}}
+ strncat(filename, argv[1],
+ sizeof(filename) - -strlen(argv[1]) -
+ 1); // expected-note {{Taint propagated to the 1st argument}}
+ strncat(cmd, filename,
+ sizeof(cmd) - strlen(cmd) -
+ 1); // expected-note {{Taint propagated to the 1st argument}}
----------------
NagyDonat wrote:
```suggestion
scanf("%s", filename);
// expected-note@-1 {{Taint originated here}}
// expected-note@-2 {{Taint propagated to the 2nd argument}}
strncat(filename, argv[1], sizeof(filename) - -strlen(argv[1]) - 1);
// expected-note@-1 {{Taint propagated to the 1st argument}}
strncat(cmd, filename, sizeof(cmd) - strlen(cmd) - 1);
// expected-note@-1 {{Taint propagated to the 1st argument}}
```
Ugh, this formatting was really ugly... clang-format is not always your
friend...
https://github.com/llvm/llvm-project/pull/178054
_______________________________________________
cfe-commits mailing list
[email protected]
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits