Home | History | Annotate | Download | only in Analysis
      1 // RUN: %clang_cc1  -analyze -analyzer-checker=alpha.security.taint,core,alpha.security.ArrayBoundV2 -Wno-format-security -verify %s
      2 
      3 int scanf(const char *restrict format, ...);
      4 int getchar(void);
      5 
      6 typedef struct _FILE FILE;
      7 extern FILE *stdin;
      8 int fscanf(FILE *restrict stream, const char *restrict format, ...);
      9 int sprintf(char *str, const char *format, ...);
     10 void setproctitle(const char *fmt, ...);
     11 typedef __typeof(sizeof(int)) size_t;
     12 
     13 // Define string functions. Use builtin for some of them. They all default to
     14 // the processing in the taint checker.
     15 #define strcpy(dest, src) \
     16   ((__builtin_object_size(dest, 0) != -1ULL) \
     17    ? __builtin___strcpy_chk (dest, src, __builtin_object_size(dest, 1)) \
     18    : __inline_strcpy_chk(dest, src))
     19 
     20 static char *__inline_strcpy_chk (char *dest, const char *src) {
     21   return __builtin___strcpy_chk(dest, src, __builtin_object_size(dest, 1));
     22 }
     23 char *stpcpy(char *restrict s1, const char *restrict s2);
     24 char *strncpy( char * destination, const char * source, size_t num );
     25 char *strndup(const char *s, size_t n);
     26 char *strncat(char *restrict s1, const char *restrict s2, size_t n);
     27 
     28 void *malloc(size_t);
     29 void *calloc(size_t nmemb, size_t size);
     30 void bcopy(void *s1, void *s2, size_t n);
     31 
     32 #define BUFSIZE 10
     33 
     34 int Buffer[BUFSIZE];
     35 void bufferScanfDirect(void)
     36 {
     37   int n;
     38   scanf("%d", &n);
     39   Buffer[n] = 1; // expected-warning {{Out of bound memory access }}
     40 }
     41 
     42 void bufferScanfArithmetic1(int x) {
     43   int n;
     44   scanf("%d", &n);
     45   int m = (n - 3);
     46   Buffer[m] = 1; // expected-warning {{Out of bound memory access }}
     47 }
     48 
     49 void bufferScanfArithmetic2(int x) {
     50   int n;
     51   scanf("%d", &n);
     52   int m = 100 - (n + 3) * x;
     53   Buffer[m] = 1; // expected-warning {{Out of bound memory access }}
     54 }
     55 
     56 void bufferScanfAssignment(int x) {
     57   int n;
     58   scanf("%d", &n);
     59   int m;
     60   if (x > 0) {
     61     m = n;
     62     Buffer[m] = 1; // expected-warning {{Out of bound memory access }}
     63   }
     64 }
     65 
     66 void scanfArg() {
     67   int t = 0;
     68   scanf("%d", t); // expected-warning {{format specifies type 'int *' but the argument has type 'int'}}
     69 }
     70 
     71 void bufferGetchar(int x) {
     72   int m = getchar();
     73   Buffer[m] = 1;  //expected-warning {{Out of bound memory access (index is tainted)}}
     74 }
     75 
     76 void testUncontrolledFormatString(char **p) {
     77   char s[80];
     78   fscanf(stdin, "%s", s);
     79   char buf[128];
     80   sprintf(buf,s); // expected-warning {{Uncontrolled Format String}}
     81   setproctitle(s, 3); // expected-warning {{Uncontrolled Format String}}
     82 
     83   // Test taint propagation through strcpy and family.
     84   char scpy[80];
     85   strcpy(scpy, s);
     86   sprintf(buf,scpy); // expected-warning {{Uncontrolled Format String}}
     87 
     88   stpcpy(*(++p), s); // this generates __inline.
     89   setproctitle(*(p), 3); // expected-warning {{Uncontrolled Format String}}
     90 
     91   char spcpy[80];
     92   stpcpy(spcpy, s);
     93   setproctitle(spcpy, 3); // expected-warning {{Uncontrolled Format String}}
     94 
     95   char *spcpyret;
     96   spcpyret = stpcpy(spcpy, s);
     97   setproctitle(spcpyret, 3); // expected-warning {{Uncontrolled Format String}}
     98 
     99   char sncpy[80];
    100   strncpy(sncpy, s, 20);
    101   setproctitle(sncpy, 3); // expected-warning {{Uncontrolled Format String}}
    102 
    103   char *dup;
    104   dup = strndup(s, 20);
    105   setproctitle(dup, 3); // expected-warning {{Uncontrolled Format String}}
    106 
    107 }
    108 
    109 int system(const char *command);
    110 void testTaintSystemCall() {
    111   char buffer[156];
    112   char addr[128];
    113   scanf("%s", addr);
    114   system(addr); // expected-warning {{Untrusted data is passed to a system call}}
    115 
    116   // Test that spintf transfers taint.
    117   sprintf(buffer, "/bin/mail %s < /tmp/email", addr);
    118   system(buffer); // expected-warning {{Untrusted data is passed to a system call}}
    119 }
    120 
    121 void testTaintSystemCall2() {
    122   // Test that snpintf transfers taint.
    123   char buffern[156];
    124   char addr[128];
    125   scanf("%s", addr);
    126   __builtin_snprintf(buffern, 10, "/bin/mail %s < /tmp/email", addr);
    127   system(buffern); // expected-warning {{Untrusted data is passed to a system call}}
    128 }
    129 
    130 void testTaintSystemCall3() {
    131   char buffern2[156];
    132   int numt;
    133   char addr[128];
    134   scanf("%s %d", addr, &numt);
    135   __builtin_snprintf(buffern2, numt, "/bin/mail %s < /tmp/email", "abcd");
    136   system(buffern2); // expected-warning {{Untrusted data is passed to a system call}}
    137 }
    138 
    139 void testTaintedBufferSize() {
    140   size_t ts;
    141   scanf("%zd", &ts);
    142 
    143   int *buf1 = (int*)malloc(ts*sizeof(int)); // expected-warning {{Untrusted data is used to specify the buffer size}}
    144   char *dst = (char*)calloc(ts, sizeof(char)); //expected-warning {{Untrusted data is used to specify the buffer size}}
    145   bcopy(buf1, dst, ts); // expected-warning {{Untrusted data is used to specify the buffer size}}
    146   __builtin_memcpy(dst, buf1, (ts + 4)*sizeof(char)); // expected-warning {{Untrusted data is used to specify the buffer size}}
    147 
    148   // If both buffers are trusted, do not issue a warning.
    149   char *dst2 = (char*)malloc(ts*sizeof(char)); // expected-warning {{Untrusted data is used to specify the buffer size}}
    150   strncat(dst2, dst, ts); // no-warning
    151 }
    152 
    153 #define AF_UNIX   1   /* local to host (pipes) */
    154 #define AF_INET   2   /* internetwork: UDP, TCP, etc. */
    155 #define AF_LOCAL  AF_UNIX   /* backward compatibility */
    156 #define SOCK_STREAM 1
    157 int socket(int, int, int);
    158 size_t read(int, void *, size_t);
    159 int  execl(const char *, const char *, ...);
    160 
    161 void testSocket() {
    162   int sock;
    163   char buffer[100];
    164 
    165   sock = socket(AF_INET, SOCK_STREAM, 0);
    166   read(sock, buffer, 100);
    167   execl(buffer, "filename", 0); // expected-warning {{Untrusted data is passed to a system call}}
    168 
    169   sock = socket(AF_LOCAL, SOCK_STREAM, 0);
    170   read(sock, buffer, 100);
    171   execl(buffer, "filename", 0); // no-warning
    172 }
    173 
    174 int testDivByZero() {
    175   int x;
    176   scanf("%d", &x);
    177   return 5/x; // expected-warning {{Division by a tainted value, possibly zero}}
    178 }
    179 
    180 // Zero-sized VLAs.
    181 void testTaintedVLASize() {
    182   int x;
    183   scanf("%d", &x);
    184   int vla[x]; // expected-warning{{Declared variable-length array (VLA) has tainted size}}
    185 }
    186 
    187 // This computation used to take a very long time.
    188 #define longcmp(a,b,c) { \
    189   a -= c;  a ^= c;  c += b; b -= a;  b ^= (a<<6) | (a >> (32-b));  a += c; c -= b;  c ^= b;  b += a; \
    190   a -= c;  a ^= c;  c += b; b -= a;  b ^= a;  a += c; c -= b;  c ^= b;  b += a; }
    191 
    192 unsigned radar11369570_hanging(const unsigned char *arr, int l) {
    193   unsigned a, b, c;
    194   a = b = c = 0x9899e3 + l;
    195   while (l >= 6) {
    196     unsigned t;
    197     scanf("%d", &t);
    198     a += b;
    199     a ^= a;
    200     a += (arr[3] + ((unsigned) arr[2] << 8) + ((unsigned) arr[1] << 16) + ((unsigned) arr[0] << 24));
    201     longcmp(a, t, c);
    202     l -= 12;
    203   }
    204   return 5/a; // expected-warning {{Division by a tainted value, possibly zero}}
    205 }
    206 
    207 // Check that we do not assert of the following code.
    208 int SymSymExprWithDiffTypes(void* p) {
    209   int i;
    210   scanf("%d", &i);
    211   int j = (i % (int)(long)p);
    212   return 5/j; // expected-warning {{Division by a tainted value, possibly zero}}
    213 }
    214 
    215 
    216 void constraintManagerShouldTreatAsOpaque(int rhs) {
    217   int i;
    218   scanf("%d", &i);
    219   // This comparison used to hit an assertion in the constraint manager,
    220   // which didn't handle NonLoc sym-sym comparisons.
    221   if (i < rhs)
    222     return;
    223   if (i < rhs)
    224     *(volatile int *) 0; // no-warning
    225 }
    226