[clang] [llvm] [analyzer] Delete `alpha.security.MallocOverflow` (PR #103059)
Artem Dergachev via cfe-commits
cfe-commits at lists.llvm.org
Tue Aug 13 12:40:12 PDT 2024
haoNoQ wrote:
> Instead of actually tracking the symbolic values and the known constraints on them, this checker blindly gropes the AST and uses heuristics like "this variable was seen in a comparison operator expression that is not a loop condition, so it's probably not too large" (which was improved in a separate commit to at least ignore comparison operators that appear after the actual `malloc()` call).
Yeah this should either be a "taint analysis" thing.
Or a coding-convention thing that only works when the users are provided with a clear alternative, such as "please always use overflow-checked builtins when computing the size for malloc".
https://github.com/llvm/llvm-project/pull/103059
More information about the cfe-commits
mailing list