117 lines
5.5 KiB
C
117 lines
5.5 KiB
C
|
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.security.taint,core,alpha.security.ArrayBoundV2 -analyzer-output=text -verify %s
|
||
|
|
||
|
// This file is for testing enhanced diagnostics produced by the GenericTaintChecker
|
||
|
|
||
|
typedef __typeof(sizeof(int)) size_t;
|
||
|
struct _IO_FILE;
|
||
|
typedef struct _IO_FILE FILE;
|
||
|
|
||
|
int scanf(const char *restrict format, ...);
|
||
|
int system(const char *command);
|
||
|
char* getenv( const char* env_var );
|
||
|
size_t strlen( const char* str );
|
||
|
int atoi( const char* str );
|
||
|
void *malloc(size_t size );
|
||
|
void free( void *ptr );
|
||
|
char *fgets(char *str, int n, FILE *stream);
|
||
|
extern FILE *stdin;
|
||
|
|
||
|
void taintDiagnostic(void)
|
||
|
{
|
||
|
char buf[128];
|
||
|
scanf("%s", buf); // expected-note {{Taint originated here}}
|
||
|
// expected-note@-1 {{Taint propagated to the 2nd argument}}
|
||
|
system(buf); // expected-warning {{Untrusted data is passed to a system call}} // expected-note {{Untrusted data is passed to a system call (CERT/STR02-C. Sanitize data passed to complex subsystems)}}
|
||
|
}
|
||
|
|
||
|
int taintDiagnosticOutOfBound(void) {
|
||
|
int index;
|
||
|
int Array[] = {1, 2, 3, 4, 5};
|
||
|
scanf("%d", &index); // expected-note {{Taint originated here}}
|
||
|
// expected-note@-1 {{Taint propagated to the 2nd argument}}
|
||
|
return Array[index]; // expected-warning {{Potential out of bound access to 'Array' with tainted index}}
|
||
|
// expected-note@-1 {{Access of 'Array' with a tainted index that may be too large}}
|
||
|
}
|
||
|
|
||
|
int taintDiagnosticDivZero(int operand) {
|
||
|
scanf("%d", &operand); // expected-note {{Value assigned to 'operand'}}
|
||
|
// expected-note@-1 {{Taint originated here}}
|
||
|
// expected-note@-2 {{Taint propagated to the 2nd argument}}
|
||
|
return 10 / operand; // expected-warning {{Division by a tainted value, possibly zero}}
|
||
|
// expected-note@-1 {{Division by a tainted value, possibly zero}}
|
||
|
}
|
||
|
|
||
|
void taintDiagnosticVLA(void) {
|
||
|
int x;
|
||
|
scanf("%d", &x); // expected-note {{Value assigned to 'x'}}
|
||
|
// expected-note@-1 {{Taint originated here}}
|
||
|
// expected-note@-2 {{Taint propagated to the 2nd argument}}
|
||
|
int vla[x]; // expected-warning {{Declared variable-length array (VLA) has tainted size}}
|
||
|
// expected-note@-1 {{Declared variable-length array (VLA) has tainted size}}
|
||
|
}
|
||
|
|
||
|
|
||
|
// Tests if the originated note is correctly placed even if the path is
|
||
|
// propagating through variables and expressions
|
||
|
char *taintDiagnosticPropagation(){
|
||
|
char *pathbuf;
|
||
|
char *size=getenv("SIZE"); // expected-note {{Taint originated here}}
|
||
|
// expected-note@-1 {{Taint propagated to the return value}}
|
||
|
if (size){ // expected-note {{Assuming 'size' is non-null}}
|
||
|
// expected-note@-1 {{Taking true branch}}
|
||
|
pathbuf=(char*) malloc(atoi(size)); // expected-warning{{Untrusted data is used to specify the buffer size}}
|
||
|
// expected-note@-1{{Untrusted data is used to specify the buffer size}}
|
||
|
// expected-note@-2 {{Taint propagated to the return value}}
|
||
|
return pathbuf;
|
||
|
}
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
// Taint origin should be marked correctly even if there are multiple taint
|
||
|
// sources in the function
|
||
|
char *taintDiagnosticPropagation2(){
|
||
|
char *pathbuf;
|
||
|
char *user_env2=getenv("USER_ENV_VAR2");//unrelated taint source
|
||
|
char *size=getenv("SIZE"); // expected-note {{Taint originated here}}
|
||
|
// expected-note@-1 {{Taint propagated to the return value}}
|
||
|
char *user_env=getenv("USER_ENV_VAR");//unrelated taint source
|
||
|
if (size){ // expected-note {{Assuming 'size' is non-null}}
|
||
|
// expected-note@-1 {{Taking true branch}}
|
||
|
pathbuf=(char*) malloc(atoi(size)+1); // expected-warning{{Untrusted data is used to specify the buffer size}}
|
||
|
// expected-note@-1{{Untrusted data is used to specify the buffer size}}
|
||
|
// expected-note@-2 {{Taint propagated to the return value}}
|
||
|
return pathbuf;
|
||
|
}
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
void testReadStdIn(){
|
||
|
char buf[1024];
|
||
|
fgets(buf, sizeof(buf), stdin);// expected-note {{Taint originated here}}
|
||
|
// expected-note@-1 {{Taint propagated to the 1st argument}}
|
||
|
system(buf);// expected-warning {{Untrusted data is passed to a system call}}
|
||
|
// expected-note@-1 {{Untrusted data is passed to a system call (CERT/STR02-C. Sanitize data passed to complex subsystems)}}
|
||
|
|
||
|
}
|
||
|
|
||
|
void multipleTaintSources(void) {
|
||
|
int x,y,z;
|
||
|
scanf("%d", &x); // expected-note {{Taint originated here}}
|
||
|
// expected-note@-1 {{Taint propagated to the 2nd argument}}
|
||
|
scanf("%d", &y); // expected-note {{Taint originated here}}
|
||
|
// expected-note@-1 {{Taint propagated to the 2nd argument}}
|
||
|
scanf("%d", &z);
|
||
|
int* ptr = (int*) malloc(y + x); // expected-warning {{Untrusted data is used to specify the buffer size}}
|
||
|
// expected-note@-1{{Untrusted data is used to specify the buffer size}}
|
||
|
free (ptr);
|
||
|
}
|
||
|
|
||
|
void multipleTaintedArgs(void) {
|
||
|
int x,y;
|
||
|
scanf("%d %d", &x, &y); // expected-note {{Taint originated here}}
|
||
|
// expected-note@-1 {{Taint propagated to the 2nd argument, 3rd argument}}
|
||
|
int* ptr = (int*) malloc(x + y); // expected-warning {{Untrusted data is used to specify the buffer size}}
|
||
|
// expected-note@-1{{Untrusted data is used to specify the buffer size}}
|
||
|
free (ptr);
|
||
|
}
|