File: strlen-1.c

package info (click to toggle)
gcc-arm-none-eabi 15%3A14.2.rel1-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 1,099,328 kB
  • sloc: cpp: 3,627,108; ansic: 2,571,498; ada: 834,230; f90: 235,082; makefile: 79,231; asm: 74,984; xml: 51,692; exp: 39,736; sh: 33,298; objc: 15,629; python: 15,069; fortran: 14,429; pascal: 7,003; awk: 5,070; perl: 3,106; ml: 285; lisp: 253; lex: 204; haskell: 135
file content (106 lines) | stat: -rw-r--r-- 2,894 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
/* See e.g. https://en.cppreference.com/w/c/string/byte/strlen */

#include "analyzer-decls.h"

typedef __SIZE_TYPE__ size_t;

static size_t __attribute__((noinline))
call_strlen_1 (const char *p)
{
  return __builtin_strlen (p);
}

void test_string (void)
{
  __analyzer_eval (call_strlen_1 ("abc") == 3); /* { dg-warning "TRUE" } */
}

static size_t __attribute__((noinline))
call_strlen_2 (const char *p)
{
  return __builtin_strlen (p); /* { dg-warning "stack-based buffer over-read" } */
}

void test_unterminated (void)
{
  const char buf[3] = "abc";
  __analyzer_eval (call_strlen_2 (buf) == 3); /* { dg-warning "UNKNOWN" } */
}

void test_uninitialized (void)
{
  char buf[16];
  __builtin_strlen (buf); /* { dg-warning "use of uninitialized value 'buf\\\[0\\\]'" } */
}

void test_partially_initialized (void)
{
  char buf[16];
  buf[0] = 'a';
  __builtin_strlen (buf); /* { dg-warning "use of uninitialized value 'buf\\\[1\\\]'" } */
}

extern size_t strlen (const char *str);

size_t
test_passthrough (const char *str)
{
  return strlen (str);
}

/* TODO
   - complain if NULL str
   - should it be tainted if str's bytes are tainted?
*/

static size_t __attribute__((noinline))
call_strlen_3 (const char *p)
{
  return __builtin_strlen (p);
}

void test_array_initialization_from_shorter_literal (void)
{
  const char buf[10] = "abc";
  __analyzer_eval (call_strlen_3 (buf) == 3); /* { dg-warning "TRUE" } */
  __analyzer_eval (call_strlen_3 (buf + 5) == 0); /* { dg-warning "TRUE" } */
  __analyzer_eval (buf[5] == 0); /* { dg-warning "TRUE" } */
}

static size_t __attribute__((noinline))
call_strlen_4 (const char *p)
{
  return __builtin_strlen (p); /* { dg-warning "stack-based buffer over-read" } */
}

char test_array_initialization_from_longer_literal (void)
{
  const char buf[3] = "abcdefg"; /* { dg-warning "initializer-string for array of 'char' is too long" } */
  __analyzer_eval (call_strlen_4 (buf) == 3); /* { dg-warning "UNKNOWN" } */
  return buf[5]; /* { dg-warning "stack-based buffer over-read" } */
}

static size_t __attribute__((noinline))
call_strlen_5 (const char *p)
{
  return __builtin_strlen (p);
}

static size_t __attribute__((noinline))
call_strlen_5a (const char *p)
{
  return __builtin_strlen (p); /* { dg-warning "stack-based buffer over-read" } */
}

char test_array_initialization_implicit_length (void)
{
  const char buf[] = "abc";
  __analyzer_eval (call_strlen_5 (buf) == 3); /* { dg-warning "TRUE" } */
  __analyzer_eval (call_strlen_5 (buf + 2) == 1); /* { dg-warning "TRUE" } */
  __analyzer_eval (call_strlen_5 (buf + 3) == 0); /* { dg-warning "TRUE" } */
  __analyzer_eval (buf[0] == 'a'); /* { dg-warning "TRUE" } */
  __analyzer_eval (buf[3] == 0); /* { dg-warning "TRUE" } */
  __analyzer_eval (call_strlen_5a (buf + 4) == 0); /* { dg-warning "UNKNOWN" } */
  return buf[4]; /* { dg-warning "stack-based buffer over-read" } */
}