blob: 2cde0139c2029110dc835aa4cd754f5c4a94a3da [file] [log] [blame]
Anna Zaksf0267f52012-08-07 18:36:58 +00001// RUN: %clang_cc1 -analyze -analyzer-checker=unix.cstring.BadSizeArg -analyzer-store=region -Wno-strncat-size -Wno-strlcpy-strlcat-size -Wno-sizeof-array-argument -Wno-sizeof-pointer-memaccess -verify %s
Anna Zaks87b6ff02012-01-31 19:33:39 +00002
3typedef __SIZE_TYPE__ size_t;
4char *strncat(char *, const char *, size_t);
5size_t strlen (const char *s);
6
7void testStrncat(const char *src) {
8 char dest[10];
9 strncat(dest, "AAAAAAAAAAAAAAAAAAAAAAAAAAAAA", sizeof(dest) - 1); // expected-warning {{Potential buffer overflow. Replace with 'sizeof(dest) - strlen(dest) - 1' or use a safer 'strlcat' API}}
10 strncat(dest, "AAAAAAAAAAAAAAAAAAAAAAAAAAA", sizeof(dest)); // expected-warning {{Potential buffer overflow. Replace with}}
11 strncat(dest, "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA", sizeof(dest) - strlen(dest)); // expected-warning {{Potential buffer overflow. Replace with}}
12 strncat(dest, src, sizeof(src)); // expected-warning {{Potential buffer overflow. Replace with}}
Gabor Horvath3b008532017-02-02 08:20:54 +000013 // Should not crash when sizeof has a type argument.
14 strncat(dest, "AAAAAAAAAAAAAAAAAAAAAAAAAAA", sizeof(char));
Anna Zaks87b6ff02012-01-31 19:33:39 +000015}