[cfe-commits] r161440 - in /cfe/trunk: include/clang/Basic/DiagnosticSemaKinds.td test/Analysis/cstring-syntax.c
Matt Beaumont-Gay
matthewbg at google.com
Wed Aug 8 10:39:10 PDT 2012
On Wed, Aug 8, 2012 at 10:34 AM, Anna Zaks <ganna at apple.com> wrote:
>
> On Aug 7, 2012, at 12:01 PM, Matt Beaumont-Gay wrote:
>
>> Should we have similar treatment for strncpy?
>>
>> Also, a nit:
>> void f(char* s, char* d) {
>> strncat(d, s, sizeof(d));
>> }
>>
>> test.cc:5:17: warning: the value of the size argument in 'strncat' is
>> too large, might lead to a buffer overflow [-Wstrncat-size]
>> strncat(d, s, sizeof(d));
>> ^~~~~~~~~
>>
>> Here, sizeof(d) is not necessarily too large, just wrong.
>
> It is too large in this case - it should be at least 1 less than sizeof(d), even if d is empty.
My point is that d is a pointer here, not an array.
>
> Anna.
>>
>> On Tue, Aug 7, 2012 at 11:36 AM, Anna Zaks <ganna at apple.com> wrote:
>>> Author: zaks
>>> Date: Tue Aug 7 13:36:58 2012
>>> New Revision: 161440
>>>
>>> URL: http://llvm.org/viewvc/llvm-project?rev=161440&view=rev
>>> Log:
>>> Turn on strncat-size warning implemented a while ago.
>>>
>>> Warns on anti-patterns/typos in the 'size' argument to strncat. The
>>> correct size argument should look like the following:
>>> - strncat(dst, src, sizeof(dst) - strlen(dest) - 1);
>>>
>>> We warn on:
>>> - sizeof(dst)
>>> - sizeof(src)
>>> - sizeof(dst) - strlen(dst)
>>> - sizeof(src) - anything
>>>
>>> (This has been implemented in void Sema::CheckStrncatArguments().)
>>>
>>> Modified:
>>> cfe/trunk/include/clang/Basic/DiagnosticSemaKinds.td
>>> cfe/trunk/test/Analysis/cstring-syntax.c
>>>
>>> Modified: cfe/trunk/include/clang/Basic/DiagnosticSemaKinds.td
>>> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/include/clang/Basic/DiagnosticSemaKinds.td?rev=161440&r1=161439&r2=161440&view=diff
>>> ==============================================================================
>>> --- cfe/trunk/include/clang/Basic/DiagnosticSemaKinds.td (original)
>>> +++ cfe/trunk/include/clang/Basic/DiagnosticSemaKinds.td Tue Aug 7 13:36:58 2012
>>> @@ -373,9 +373,9 @@
>>>
>>> def warn_strncat_large_size : Warning<
>>> "the value of the size argument in 'strncat' is too large, might lead to a "
>>> - "buffer overflow">, InGroup<StrncatSize>, DefaultIgnore;
>>> + "buffer overflow">, InGroup<StrncatSize>, DefaultWarnNoWerror;
>>> def warn_strncat_src_size : Warning<"size argument in 'strncat' call appears "
>>> - "to be size of the source">, InGroup<StrncatSize>, DefaultIgnore;
>>> + "to be size of the source">, InGroup<StrncatSize>, DefaultWarnNoWerror;
>>> def note_strncat_wrong_size : Note<
>>> "change the argument to be the free space in the destination buffer minus "
>>> "the terminating null byte">;
>>>
>>> Modified: cfe/trunk/test/Analysis/cstring-syntax.c
>>> URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Analysis/cstring-syntax.c?rev=161440&r1=161439&r2=161440&view=diff
>>> ==============================================================================
>>> --- cfe/trunk/test/Analysis/cstring-syntax.c (original)
>>> +++ cfe/trunk/test/Analysis/cstring-syntax.c Tue Aug 7 13:36:58 2012
>>> @@ -1,4 +1,4 @@
>>> -// RUN: %clang_cc1 -analyze -analyzer-checker=unix.cstring.BadSizeArg -analyzer-store=region -Wno-strlcpy-strlcat-size -Wno-sizeof-array-argument -Wno-sizeof-pointer-memaccess -verify %s
>>> +// RUN: %clang_cc1 -analyze -analyzer-checker=unix.cstring.BadSizeArg -analyzer-store=region -Wno-strncat-size -Wno-strlcpy-strlcat-size -Wno-sizeof-array-argument -Wno-sizeof-pointer-memaccess -verify %s
>>>
>>> typedef __SIZE_TYPE__ size_t;
>>> char *strncat(char *, const char *, size_t);
>>>
>>>
>>> _______________________________________________
>>> cfe-commits mailing list
>>> cfe-commits at cs.uiuc.edu
>>> http://lists.cs.uiuc.edu/mailman/listinfo/cfe-commits
>
More information about the cfe-commits
mailing list