blob: 0b3ca1be8e2c50613f22dfe98d9fa7e25343bb96 [file] [log] [blame]
Ted Kremeneke0a58072009-09-18 22:37:37 +00001// NOTE: Use '-fobjc-gc' to test the analysis being run twice, and multiple reports are not issued.
Ted Kremeneka8180e52012-01-20 06:00:17 +00002// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -analyzer-checker=core,experimental.deadcode.IdempotentOperations,experimental.core,osx.cocoa.AtSync -analyzer-store=region -analyzer-constraints=basic -verify -fblocks -Wno-unreachable-code -Wno-null-dereference %s
3// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -analyzer-checker=core,experimental.deadcode.IdempotentOperations,experimental.core,osx.cocoa.AtSync -analyzer-store=region -analyzer-constraints=range -verify -fblocks -Wno-unreachable-code -Wno-null-dereference %s
4// RUN: %clang_cc1 -triple x86_64-apple-darwin10 -analyze -analyzer-checker=core,experimental.deadcode.IdempotentOperations,experimental.core,osx.cocoa.AtSync -analyzer-store=region -analyzer-constraints=basic -verify -fblocks -Wno-unreachable-code -Wno-null-dereference %s
5// RUN: %clang_cc1 -triple x86_64-apple-darwin10 -analyze -analyzer-checker=core,experimental.deadcode.IdempotentOperations,experimental.core,osx.cocoa.AtSync -analyzer-store=region -analyzer-constraints=range -verify -fblocks -Wno-unreachable-code -Wno-null-dereference %s
Ted Kremenek2dabd422009-01-22 18:53:15 +00006
Ted Kremenekf0af7772010-05-26 21:36:54 +00007#ifndef __clang_analyzer__
Dylan Noblesmithb44b9662011-12-18 18:07:42 +00008#error __clang_analyzer__ not defined
Ted Kremenekf0af7772010-05-26 21:36:54 +00009#endif
10
Ted Kremenek19e1f0b2009-08-01 06:17:29 +000011typedef struct objc_ivar *Ivar;
Ted Kremenekf684d562009-03-05 18:08:28 +000012typedef struct objc_selector *SEL;
13typedef signed char BOOL;
14typedef int NSInteger;
15typedef unsigned int NSUInteger;
16typedef struct _NSZone NSZone;
Ted Kremenek59978882009-07-08 22:42:46 +000017@class NSInvocation, NSArray, NSMethodSignature, NSCoder, NSString, NSEnumerator;
Ted Kremenek19e1f0b2009-08-01 06:17:29 +000018@protocol NSObject
19- (BOOL)isEqual:(id)object;
20- (id)autorelease;
21@end
22@protocol NSCopying
23- (id)copyWithZone:(NSZone *)zone;
24@end
Ted Kremenekf684d562009-03-05 18:08:28 +000025@protocol NSMutableCopying - (id)mutableCopyWithZone:(NSZone *)zone; @end
Ted Kremenek19e1f0b2009-08-01 06:17:29 +000026@protocol NSCoding
27- (void)encodeWithCoder:(NSCoder *)aCoder;
28@end
29@interface NSObject <NSObject> {}
30- (id)init;
31+ (id)allocWithZone:(NSZone *)zone;
32@end
Ted Kremenekf684d562009-03-05 18:08:28 +000033extern id NSAllocateObject(Class aClass, NSUInteger extraBytes, NSZone *zone);
34@interface NSString : NSObject <NSCopying, NSMutableCopying, NSCoding>
35- (NSUInteger)length;
36+ (id)stringWithUTF8String:(const char *)nullTerminatedCString;
37@end extern NSString * const NSBundleDidLoadNotification;
Ted Kremenek19e1f0b2009-08-01 06:17:29 +000038@interface NSValue : NSObject <NSCopying, NSCoding>
39- (void)getValue:(void *)value;
40@end
41@interface NSNumber : NSValue
42- (char)charValue;
43- (id)initWithBool:(BOOL)value;
44@end
Ted Kremenekf684d562009-03-05 18:08:28 +000045@interface NSAssertionHandler : NSObject {}
46+ (NSAssertionHandler *)currentHandler;
47- (void)handleFailureInMethod:(SEL)selector object:(id)object file:(NSString *)fileName lineNumber:(NSInteger)line description:(NSString *)format,...;
48@end
49extern NSString * const NSConnectionReplyMode;
Ted Kremenek693de5d2009-03-23 15:42:58 +000050typedef float CGFloat;
51typedef struct _NSPoint {
52 CGFloat x;
53 CGFloat y;
54} NSPoint;
55typedef struct _NSSize {
56 CGFloat width;
57 CGFloat height;
58} NSSize;
59typedef struct _NSRect {
60 NSPoint origin;
61 NSSize size;
62} NSRect;
Ted Kremenek9f67ede2008-10-01 05:05:46 +000063
64// Reduced test case from crash in <rdar://problem/6253157>
Ted Kremenek9f67ede2008-10-01 05:05:46 +000065@interface A @end
66@implementation A
67- (void)foo:(void (^)(NSObject *x))block {
68 if (!((block != ((void *)0)))) {}
69}
70@end
71
Ted Kremenek6dfe2f52008-10-18 22:20:20 +000072// Reduced test case from crash in PR 2796;
73// http://llvm.org/bugs/show_bug.cgi?id=2796
74
75unsigned foo(unsigned x) { return __alignof__((x)) + sizeof(x); }
Ted Kremenek9253b0f2008-10-20 23:14:31 +000076
77// Improvement to path-sensitivity involving compound assignments.
78// Addresses false positive in <rdar://problem/6268365>
79//
80
81unsigned r6268365Aux();
82
83void r6268365() {
84 unsigned x = 0;
Ted Kremenek3e5637f2010-07-27 18:49:08 +000085 x &= r6268365Aux(); // expected-warning{{The left operand to '&=' is always 0}}
Ted Kremenek9253b0f2008-10-20 23:14:31 +000086 unsigned j = 0;
87
88 if (x == 0) ++j;
Ted Kremenek3e5637f2010-07-27 18:49:08 +000089 if (x == 0) x = x / j; // expected-warning{{Assigned value is always the same as the existing value}} expected-warning{{The right operand to '/' is always 1}}
Ted Kremenek9253b0f2008-10-20 23:14:31 +000090}
91
Ted Kremenekc13b6e22008-10-20 23:40:25 +000092void divzeroassume(unsigned x, unsigned j) {
93 x /= j;
Chris Lattner7ef655a2010-01-12 21:23:57 +000094 if (j == 0) x /= 0; // no static-analyzer warning expected-warning {{division by zero is undefined}}
95 if (j == 0) x /= j; // no static-analyzer warning
96 if (j == 0) x = x / 0; // no static-analyzer warning expected-warning {{division by zero is undefined}}
Ted Kremenekc13b6e22008-10-20 23:40:25 +000097}
98
99void divzeroassumeB(unsigned x, unsigned j) {
100 x = x / j;
Chris Lattner7ef655a2010-01-12 21:23:57 +0000101 if (j == 0) x /= 0; // no static-analyzer warning expected-warning {{division by zero is undefined}}
102 if (j == 0) x /= j; // no static-analyzer warning
103 if (j == 0) x = x / 0; // no static-analyzer warning expected-warning {{division by zero is undefined}}
Ted Kremenekc13b6e22008-10-20 23:40:25 +0000104}
105
Ted Kremenek76dba7b2008-11-13 05:05:34 +0000106// InitListExpr processing
107
108typedef float __m128 __attribute__((__vector_size__(16), __may_alias__));
109__m128 return128() {
Ted Kremenek062e2f92008-11-13 06:10:40 +0000110 // This compound literal has a Vector type. We currently just
111 // return UnknownVal.
Ted Kremenek76dba7b2008-11-13 05:05:34 +0000112 return __extension__(__m128) { 0.0f, 0.0f, 0.0f, 0.0f };
113}
114
Ted Kremenek062e2f92008-11-13 06:10:40 +0000115typedef long long __v2di __attribute__ ((__vector_size__ (16)));
116typedef long long __m128i __attribute__ ((__vector_size__ (16), __may_alias__));
117__m128i vec128i(long long __q1, long long __q0) {
118 // This compound literal returns true for both isVectorType() and
119 // isIntegerType().
120 return __extension__ (__m128i)(__v2di){ __q0, __q1 };
121}
122
Ted Kremenek8322d6a2008-12-09 00:14:48 +0000123// Zero-sized VLAs.
124void check_zero_sized_VLA(int x) {
125 if (x)
126 return;
127
Ted Kremenekae784472009-11-05 08:30:12 +0000128 int vla[x]; // expected-warning{{Declared variable-length array (VLA) has zero size}}
Ted Kremenek159d2482008-12-09 00:44:16 +0000129}
130
131void check_uninit_sized_VLA() {
132 int x;
Ted Kremenekae784472009-11-05 08:30:12 +0000133 int vla[x]; // expected-warning{{Declared variable-length array (VLA) uses a garbage value as its size}}
Ted Kremenek8322d6a2008-12-09 00:14:48 +0000134}
Ted Kremenek062e2f92008-11-13 06:10:40 +0000135
Ted Kremenek55f7bcb2008-12-15 18:51:00 +0000136// sizeof(void)
137// - Tests a regression reported in PR 3211: http://llvm.org/bugs/show_bug.cgi?id=3211
138void handle_sizeof_void(unsigned flag) {
139 int* p = 0;
140
141 if (flag) {
142 if (sizeof(void) == 1)
143 return;
144 // Infeasible.
145 *p = 1; // no-warning
146 }
147
148 void* q;
149
150 if (!flag) {
151 if (sizeof(*q) == 1)
152 return;
153 // Infeasibe.
154 *p = 1; // no-warning
155 }
156
157 // Infeasible.
158 *p = 1; // no-warning
159}
160
Ted Kremenek3f214b32009-10-29 05:33:39 +0000161// check deference of undefined values
162void check_deref_undef(void) {
163 int *p;
164 *p = 0xDEADBEEF; // expected-warning{{Dereference of undefined pointer value}}
165}
166
Ted Kremenekd76d47e2009-01-27 18:29:03 +0000167// PR 3422
168void pr3422_helper(char *p);
169void pr3422() {
170 char buf[100];
171 char *q = &buf[10];
172 pr3422_helper(&q[1]);
173}
174
Ted Kremeneka3d1eb82009-02-14 05:55:08 +0000175// PR 3543 (handle empty statement expressions)
Mike Stump006105d2009-07-21 18:59:16 +0000176void pr_3543(void) {
Ted Kremeneka3d1eb82009-02-14 05:55:08 +0000177 ({});
178}
179
Ted Kremenek265a3052009-02-24 02:23:11 +0000180// <rdar://problem/6611677>
181// This test case test the use of a vector type within an array subscript
182// expression.
183typedef long long __a64vector __attribute__((__vector_size__(8)));
184typedef long long __a128vector __attribute__((__vector_size__(16)));
185static inline __a64vector __attribute__((__always_inline__, __nodebug__))
186my_test_mm_movepi64_pi64(__a128vector a) {
187 return (__a64vector)a[0];
188}
189
Ted Kremenekf684d562009-03-05 18:08:28 +0000190// Test basic tracking of ivars associated with 'self'.
191@interface SelfIvarTest : NSObject {
192 int flag;
193}
194- (void)test_self_tracking;
195@end
196
197@implementation SelfIvarTest
198- (void)test_self_tracking {
199 char *p = 0;
200 char c;
201
202 if (flag)
203 p = "hello";
204
205 if (flag)
206 c = *p; // no-warning
207}
208@end
Ted Kremeneka3d1eb82009-02-14 05:55:08 +0000209
Ted Kremenek7de20fe2009-03-11 02:29:48 +0000210// PR 3770
211char pr3770(int x) {
212 int y = x & 0x2;
213 char *p = 0;
214 if (y == 1)
215 p = "hello";
216
217 if (y == 1)
218 return p[0]; // no-warning
219
220 return 'a';
221}
222
Ted Kremenek344d4c82009-03-11 18:17:16 +0000223// PR 3772
Ted Kremenekfa6228d2009-03-11 02:52:39 +0000224// - We just want to test that this doesn't crash the analyzer.
225typedef struct st ST;
226struct st { char *name; };
227extern ST *Cur_Pu;
228
Ted Kremenek344d4c82009-03-11 18:17:16 +0000229void pr3772(void)
Ted Kremenekfa6228d2009-03-11 02:52:39 +0000230{
231 static ST *last_Cur_Pu;
232 if (last_Cur_Pu == Cur_Pu) {
233 return;
234 }
235}
236
Ted Kremenek344d4c82009-03-11 18:17:16 +0000237// PR 3780 - This tests that StmtIterator isn't broken for VLAs in DeclGroups.
238void pr3780(int sz) { typedef double MAT[sz][sz]; }
Ted Kremenekfa6228d2009-03-11 02:52:39 +0000239
Ted Kremenekec099f12009-03-18 22:10:22 +0000240// <rdar://problem/6695527> - Test that we don't symbolicate doubles before
241// we are ready to do something with them.
242int rdar6695527(double x) {
243 if (!x) { return 0; }
244 return 1;
245}
Ted Kremenek693de5d2009-03-23 15:42:58 +0000246
247// <rdar://problem/6708148> - Test that we properly invalidate structs
248// passed-by-reference to a function.
249void pr6708148_invalidate(NSRect *x);
250void pr6708148_use(NSRect x);
251void pr6708148_test(void) {
252 NSRect x;
253 pr6708148_invalidate(&x);
254 pr6708148_use(x); // no-warning
255}
256
Ted Kremenekb7252322009-04-10 00:01:14 +0000257// Handle both kinds of noreturn attributes for pruning paths.
258void rdar_6777003_noret() __attribute__((noreturn));
259void rdar_6777003_analyzer_noret() __attribute__((analyzer_noreturn));
260
261void rdar_6777003(int x) {
262 int *p = 0;
263
264 if (x == 1) {
265 rdar_6777003_noret();
266 *p = 1; // no-warning;
267 }
268
269 if (x == 2) {
270 rdar_6777003_analyzer_noret();
271 *p = 1; // no-warning;
272 }
273
274 *p = 1; // expected-warning{{Dereference of null pointer}}
275}
276
Anna Zaks2cbe7912011-12-20 22:35:30 +0000277// Check that the pointer-to-conts arguments do not get invalidated by Obj C
278// interfaces. radar://10595327
279int rdar_10595327(char *str) {
280 char fl = str[0];
281 int *p = 0;
282 NSString *s = [NSString stringWithUTF8String:str];
283 if (str[0] != fl)
284 return *p; // no-warning
285 return 0;
286}
287
Ted Kremenekaf48fdd2009-04-21 22:38:05 +0000288// For pointer arithmetic, --/++ should be treated as preserving non-nullness,
289// regardless of how well the underlying StoreManager reasons about pointer
290// arithmetic.
291// <rdar://problem/6777209>
Ted Kremenekaf48fdd2009-04-21 22:38:05 +0000292void rdar_6777209(char *p) {
293 if (p == 0)
294 return;
295
296 ++p;
297
298 // This branch should always be infeasible.
299 if (p == 0)
300 *p = 'c'; // no-warning
301}
Ted Kremenekb3cfd582009-04-23 17:49:43 +0000302
303// PR 4033. A symbolic 'void *' pointer can be used as the address for a
304// computed goto.
305typedef void *Opcode;
306Opcode pr_4033_getOpcode();
307void pr_4033(void) {
John McCallb60a77e2010-08-01 00:26:45 +0000308 void *lbl = &&next_opcode;
Ted Kremenekb3cfd582009-04-23 17:49:43 +0000309next_opcode:
310 {
311 Opcode op = pr_4033_getOpcode();
312 if (op) goto *op;
313 }
314}
315
Ted Kremenek956a37d2009-05-01 23:35:18 +0000316// Test invalidating pointers-to-pointers with slightly different types. This
317// example came from a recent false positive due to a regression where the
318// branch condition was falsely reported as being uninitialized.
319void invalidate_by_ref(char **x);
320int test_invalidate_by_ref() {
321 unsigned short y;
322 invalidate_by_ref((char**) &y);
323 if (y) // no-warning
324 return 1;
325 return 0;
326}
327
Ted Kremeneked47fc62009-07-03 00:10:50 +0000328// Test for <rdar://problem/7027684>. This just tests that the CFG is
329// constructed correctly. Previously, the successor block of the entrance
330// was the block containing the merge for '?', which would trigger an
331// assertion failure.
332int rdar_7027684_aux();
Anders Carlsson5d1d7ae2010-09-03 00:25:02 +0000333int rdar_7027684_aux_2() __attribute__((noreturn));
Ted Kremeneked47fc62009-07-03 00:10:50 +0000334void rdar_7027684(int x, int y) {
335 {}; // this empty compound statement is critical.
336 (rdar_7027684_aux() ? rdar_7027684_aux_2() : (void) 0);
337}
338
Ted Kremenek411af402009-07-06 22:23:45 +0000339// Test that we handle casts of string literals to arbitrary types.
340unsigned const char *string_literal_test1() {
341 return (const unsigned char*) "hello";
342}
343
344const float *string_literal_test2() {
345 return (const float*) "hello";
346}
347
Ted Kremenek169077d2009-07-06 23:47:19 +0000348// Test that we handle casts *from* incomplete struct types.
349extern const struct _FooAssertStruct _cmd;
350void test_cast_from_incomplete_struct_aux(volatile const void *x);
351void test_cast_from_incomplete_struct() {
352 test_cast_from_incomplete_struct_aux(&_cmd);
353}
Ted Kremeneked47fc62009-07-03 00:10:50 +0000354
Ted Kremenek59978882009-07-08 22:42:46 +0000355// Test for <rdar://problem/7034511>
356// "ValueManager::makeIntVal(uint64_t X, QualType T) should return a 'Loc'
357// when 'T' is a pointer"
358//
359// Previously this case would crash.
360void test_rdar_7034511(NSArray *y) {
361 NSObject *x;
362 for (x in y) {}
363 if (x == ((void*) 0)) {}
364}
365
Ted Kremenek8d344ae2009-07-10 21:24:45 +0000366// Handle casts of function pointers (CodeTextRegions) to arbitrary pointer
367// types. This was previously causing a crash in CastRegion.
368void handle_funcptr_voidptr_casts() {
Ted Kremenek3f9811b2009-07-10 21:11:16 +0000369 void **ptr;
370 typedef void *PVOID;
Ted Kremenek8d344ae2009-07-10 21:24:45 +0000371 typedef void *PCHAR;
Ted Kremenek3f9811b2009-07-10 21:11:16 +0000372 typedef long INT_PTR, *PINT_PTR;
373 typedef INT_PTR (*FARPROC)();
Ted Kremenek8d344ae2009-07-10 21:24:45 +0000374 FARPROC handle_funcptr_voidptr_casts_aux();
375 PVOID handle_funcptr_voidptr_casts_aux_2(PVOID volatile *x);
376 PVOID handle_funcptr_voidptr_casts_aux_3(PCHAR volatile *x);
Ted Kremenek3f9811b2009-07-10 21:11:16 +0000377
Ted Kremenek8d344ae2009-07-10 21:24:45 +0000378 ptr = (void**) handle_funcptr_voidptr_casts_aux();
379 handle_funcptr_voidptr_casts_aux_2(ptr);
380 handle_funcptr_voidptr_casts_aux_3(ptr);
Ted Kremenek3f9811b2009-07-10 21:11:16 +0000381}
382
Ted Kremenek31ef2b62009-07-10 21:43:30 +0000383// RegionStore::Retrieve previously crashed on this example. This example
384// was previously in the test file 'xfail_regionstore_wine_crash.c'.
385void testA() {
386 long x = 0;
387 char *y = (char *) &x;
388 if (!*y)
389 return;
390}
391
Ted Kremenek43d74a52009-07-11 04:38:49 +0000392// RegionStoreManager previously crashed on this example. The problem is that
393// the value bound to the field of b->grue after the call to testB_aux is
394// a symbolic region. The second '*__gruep__' involves performing a load
395// from a 'int*' that really is a 'void**'. The loaded location must be
396// implicitly converted to an integer that wraps a location. Previosly we would
397// get a crash here due to an assertion failure.
398typedef struct _BStruct { void *grue; } BStruct;
399void testB_aux(void *ptr);
400void testB(BStruct *b) {
401 {
402 int *__gruep__ = ((int *)&((b)->grue));
403 int __gruev__ = *__gruep__;
404 testB_aux(__gruep__);
405 }
406 {
407 int *__gruep__ = ((int *)&((b)->grue));
408 int __gruev__ = *__gruep__;
409 if (~0 != __gruev__) {}
410 }
411}
412
Ted Kremenek54ca9b12009-07-13 21:55:12 +0000413void test_trivial_symbolic_comparison(int *x) {
414 int test_trivial_symbolic_comparison_aux();
415 int a = test_trivial_symbolic_comparison_aux();
416 int b = a;
Tom Care9edd4d02010-08-27 22:50:47 +0000417 if (a != b) { // expected-warning{{Both operands to '!=' always have the same value}}
Ted Kremenek54ca9b12009-07-13 21:55:12 +0000418 int *p = 0;
419 *p = 0xDEADBEEF; // no-warning
420 }
421
422 a = a == 1;
423 b = b == 1;
Tom Care9edd4d02010-08-27 22:50:47 +0000424 if (a != b) { // expected-warning{{Both operands to '!=' always have the same value}}
Ted Kremenek54ca9b12009-07-13 21:55:12 +0000425 int *p = 0;
426 *p = 0xDEADBEEF; // no-warning
427 }
428}
429
Ted Kremenekfde2efe2009-07-15 22:09:25 +0000430// Test for:
431// <rdar://problem/7062158> false positive null dereference due to
432// BasicStoreManager not tracking *static* globals
433//
434// This just tests the proper tracking of symbolic values for globals (both
435// static and non-static).
436//
437static int* x_rdar_7062158;
438void rdar_7062158() {
439 int *current = x_rdar_7062158;
440 if (current == x_rdar_7062158)
441 return;
442
443 int *p = 0;
444 *p = 0xDEADBEEF; // no-warning
445}
446
447int* x_rdar_7062158_2;
448void rdar_7062158_2() {
449 int *current = x_rdar_7062158_2;
450 if (current == x_rdar_7062158_2)
451 return;
452
453 int *p = 0;
454 *p = 0xDEADBEEF; // no-warning
455}
456
Ted Kremenek46537392009-07-16 01:33:37 +0000457// This test reproduces a case for a crash when analyzing ClamAV using
458// RegionStoreManager (the crash doesn't exhibit in BasicStoreManager because
459// it isn't doing anything smart about arrays). The problem is that on the
460// second line, 'p = &p[i]', p is assigned an ElementRegion whose index
461// is a 16-bit integer. On the third line, a new ElementRegion is created
462// based on the previous region, but there the region uses a 32-bit integer,
463// resulting in a clash of values (an assertion failure at best). We resolve
464// this problem by implicitly converting index values to 'int' when the
465// ElementRegion is created.
466unsigned char test_array_index_bitwidth(const unsigned char *p) {
467 unsigned short i = 0;
Tom Care6216dc02010-08-30 19:25:43 +0000468 for (i = 0; i < 2; i++) p = &p[i];
Ted Kremenek46537392009-07-16 01:33:37 +0000469 return p[i+1];
470}
471
Ted Kremenek63b9cfe2009-07-18 06:27:51 +0000472// This case tests that CastRegion handles casts involving BlockPointerTypes.
473// It should not crash.
474void test_block_cast() {
475 id test_block_cast_aux();
Argyrios Kyrtzidis1b2ad2f2010-09-19 23:03:35 +0000476 (void (^)(void *))test_block_cast_aux(); // expected-warning{{expression result unused}}
Ted Kremenek63b9cfe2009-07-18 06:27:51 +0000477}
478
Chris Lattnere0303582010-01-09 20:43:19 +0000479int OSAtomicCompareAndSwap32Barrier();
480
Ted Kremenek293769a2009-07-20 21:00:55 +0000481// Test comparison of 'id' instance variable to a null void* constant after
482// performing an OSAtomicCompareAndSwap32Barrier.
483// This previously was a crash in RegionStoreManager.
484@interface TestIdNull {
485 id x;
486}
487-(int)foo;
488@end
489@implementation TestIdNull
490-(int)foo {
491 OSAtomicCompareAndSwap32Barrier(0, (signed)2, (signed*)&x);
492 if (x == (void*) 0) { return 0; }
493 return 1;
494}
495@end
496
Ted Kremenek32c3fa42009-07-21 21:03:30 +0000497// PR 4594 - This was a crash when handling casts in SimpleSValuator.
498void PR4594() {
499 char *buf[1];
500 char **foo = buf;
501 *foo = "test";
502}
Ted Kremenek0b331e32009-07-22 04:23:20 +0000503
504// Test invalidation logic where an integer is casted to an array with a
505// different sign and then invalidated.
506void test_invalidate_cast_int() {
507 void test_invalidate_cast_int_aux(unsigned *i);
508 signed i;
509 test_invalidate_cast_int_aux((unsigned*) &i);
510 if (i < 0)
511 return;
512}
513
Chris Lattnere0303582010-01-09 20:43:19 +0000514int ivar_getOffset();
515
Ted Kremenek19e1f0b2009-08-01 06:17:29 +0000516// Reduced from a crash involving the cast of an Objective-C symbolic region to
517// 'char *'
518static NSNumber *test_ivar_offset(id self, SEL _cmd, Ivar inIvar) {
519 return [[[NSNumber allocWithZone:((void*)0)] initWithBool:*(_Bool *)((char *)self + ivar_getOffset(inIvar))] autorelease];
520}
Ted Kremenek9a108eb2009-08-02 04:12:53 +0000521
522// Reduced from a crash in StoreManager::CastRegion involving a divide-by-zero.
523// This resulted from not properly handling region casts to 'const void*'.
524void test_cast_const_voidptr() {
525 char x[10];
526 char *p = &x[1];
527 const void* q = p;
528}
Ted Kremenek968f0a62009-08-03 21:41:46 +0000529
530// Reduced from a crash when analyzing Wine. This test handles loads from
531// function addresses.
532typedef long (*FARPROC)();
533FARPROC test_load_func(FARPROC origfun) {
534 if (!*(unsigned char*) origfun)
535 return origfun;
536 return 0;
537}
Ted Kremenek48775d52009-08-03 23:22:53 +0000538
539// Test passing-by-value an initialized struct variable.
540struct test_pass_val {
541 int x;
542 int y;
543};
544void test_pass_val_aux(struct test_pass_val s);
545void test_pass_val() {
546 struct test_pass_val s;
547 s.x = 1;
Ted Kremenek8eec7c02009-08-04 00:58:45 +0000548 s.y = 2;
Ted Kremenek48775d52009-08-03 23:22:53 +0000549 test_pass_val_aux(s);
550}
551
Ted Kremenek4ed45982009-08-05 05:31:02 +0000552// This is a reduced test case of a false positive that previously appeared
553// in RegionStoreManager. Previously the array access resulted in dereferencing
554// an undefined value.
555int test_array_compound(int *q, int *r, int *z) {
556 int *array[] = { q, r, z };
557 int j = 0;
558 for (unsigned i = 0; i < 3 ; ++i)
559 if (*array[i]) ++j; // no-warning
560 return j;
561}
562
Ted Kremenek1894dce2009-08-25 20:51:30 +0000563// symbolic value stored in 'x' wouldn't be implicitly casted to a signed value
564// during the comparison.
565int rdar_7124210(unsigned int x) {
566 enum { SOME_CONSTANT = 123 };
567 int compare = ((signed) SOME_CONSTANT) == *((signed *) &x);
568 return compare ? 0 : 1; // Forces the evaluation of the symbolic constraint.
569}
570
Ted Kremenekab2f43c2009-08-25 23:29:04 +0000571void pr4781(unsigned long *raw1) {
572 unsigned long *cook, *raw0;
573 unsigned long dough[32];
574 int i;
575 cook = dough;
576 for( i = 0; i < 16; i++, raw1++ ) {
577 raw0 = raw1++;
578 *cook = (*raw0 & 0x00fc0000L) << 6;
579 *cook |= (*raw0 & 0x00000fc0L) << 10;
580 }
581}
582
Ted Kremenekcfcd7fd2009-09-09 20:36:12 +0000583// <rdar://problem/7185647> - 'self' should be treated as being non-null
584// upon entry to an objective-c method.
585@interface RDar7185647
586- (id)foo;
587@end
588@implementation RDar7185647
589- (id) foo {
590 if (self)
591 return self;
Chris Lattner8b5dec32010-07-07 06:14:23 +0000592 *((volatile int *) 0x0) = 0xDEADBEEF; // no-warning
Ted Kremenekcfcd7fd2009-09-09 20:36:12 +0000593 return self;
594}
595@end
Ted Kremeneke2b57442009-09-15 00:40:32 +0000596
597// Test reasoning of __builtin_offsetof;
598struct test_offsetof_A {
599 int x;
600 int y;
601};
602struct test_offsetof_B {
603 int w;
604 int z;
605};
606void test_offsetof_1() {
607 if (__builtin_offsetof(struct test_offsetof_A, x) ==
608 __builtin_offsetof(struct test_offsetof_B, w))
609 return;
610 int *p = 0;
611 *p = 0xDEADBEEF; // no-warning
612}
613void test_offsetof_2() {
614 if (__builtin_offsetof(struct test_offsetof_A, y) ==
615 __builtin_offsetof(struct test_offsetof_B, z))
616 return;
617 int *p = 0;
618 *p = 0xDEADBEEF; // no-warning
619}
620void test_offsetof_3() {
621 if (__builtin_offsetof(struct test_offsetof_A, y) -
622 __builtin_offsetof(struct test_offsetof_A, x)
623 ==
624 __builtin_offsetof(struct test_offsetof_B, z) -
625 __builtin_offsetof(struct test_offsetof_B, w))
626 return;
627 int *p = 0;
628 *p = 0xDEADBEEF; // no-warning
629}
630void test_offsetof_4() {
631 if (__builtin_offsetof(struct test_offsetof_A, y) ==
632 __builtin_offsetof(struct test_offsetof_B, w))
633 return;
634 int *p = 0;
635 *p = 0xDEADBEEF; // expected-warning{{Dereference of null pointer}}
636}
637
Ted Kremenekc32b2442009-09-21 23:22:11 +0000638// <rdar://problem/6829164> "nil receiver" false positive: make tracking
639// of the MemRegion for 'self' path-sensitive
640@interface RDar6829164 : NSObject {
641 double x; int y;
642}
643- (id) init;
644@end
645
646id rdar_6829164_1();
647double rdar_6829164_2();
648
649@implementation RDar6829164
650- (id) init {
651 if((self = [super init]) != 0) {
652 id z = rdar_6829164_1();
653 y = (z != 0);
654 if (y)
655 x = rdar_6829164_2();
656 }
657 return self;
658}
659@end
Ted Kremenekcc969fd2009-09-22 04:48:39 +0000660
661// <rdar://problem/7242015> - Invalidate values passed-by-reference
662// to functions when the pointer to the value is passed as an integer.
663void test_7242015_aux(unsigned long);
664int rdar_7242015() {
665 int x;
666 test_7242015_aux((unsigned long) &x); // no-warning
667 return x; // Previously we return and uninitialized value when
668 // using RegionStore.
669}
670
Ted Kremenekcf549592009-09-22 21:19:14 +0000671// <rdar://problem/7242006> [RegionStore] compound literal assignment with
672// floats not honored
673CGFloat rdar7242006(CGFloat x) {
674 NSSize y = (NSSize){x, 10};
675 return y.width; // no-warning
676}
677
Ted Kremenek657406d2009-09-23 01:30:01 +0000678// PR 4988 - This test exhibits a case where a function can be referenced
679// when not explicitly used in an "lvalue" context (as far as the analyzer is
680// concerned). This previously triggered a crash due to an invalid assertion.
681void pr_4988(void) {
Argyrios Kyrtzidis1b2ad2f2010-09-19 23:03:35 +0000682 pr_4988; // expected-warning{{expression result unused}}
Ted Kremenek657406d2009-09-23 01:30:01 +0000683}
684
Ted Kremenek022a1252009-09-26 17:18:44 +0000685// <rdar://problem/7152418> - A 'signed char' is used as a flag, which is
686// implicitly converted to an int.
687void *rdar7152418_bar();
688@interface RDar7152418 {
689 signed char x;
690}
691-(char)foo;
692@end;
693@implementation RDar7152418
694-(char)foo {
695 char *p = 0;
696 void *result = 0;
697 if (x) {
698 result = rdar7152418_bar();
699 p = "hello";
700 }
701 if (!result) {
702 result = rdar7152418_bar();
703 if (result && x)
704 return *p; // no-warning
705 }
706 return 1;
707}
708
Ted Kremenek9b020342009-10-17 07:39:35 +0000709//===----------------------------------------------------------------------===//
Ted Kremenekb1d04222009-10-06 03:44:49 +0000710// Test constant-folding of symbolic values, automatically handling type
Ted Kremenek9b020342009-10-17 07:39:35 +0000711// conversions of the symbol as necessary.
712//===----------------------------------------------------------------------===//
713
Ted Kremenek9b020342009-10-17 07:39:35 +0000714// Previously this would crash once we started eagerly evaluating symbols whose
715// values were constrained to a single value.
716void test_symbol_fold_1(signed char x) {
Ted Kremenekb1d04222009-10-06 03:44:49 +0000717 while (1) {
718 if (x == ((signed char) 0)) {}
719 }
720}
721
Ted Kremenek9b020342009-10-17 07:39:35 +0000722// This previously caused a crash because it triggered an assertion in APSInt.
723void test_symbol_fold_2(unsigned int * p, unsigned int n,
724 const unsigned int * grumpkin, unsigned int dn) {
Ted Kremenekb5deae52009-10-16 20:46:24 +0000725 unsigned int i;
726 unsigned int tempsub[8];
727 unsigned int *solgrumpkin = tempsub + n;
728 for (i = 0; i < n; i++)
729 solgrumpkin[i] = (i < dn) ? ~grumpkin[i] : 0xFFFFFFFF;
730 for (i <<= 5; i < (n << 5); i++) {}
731}
Ted Kremenekb1d04222009-10-06 03:44:49 +0000732
Ted Kremenek9b020342009-10-17 07:39:35 +0000733// This previously caused a crash because it triggered an assertion in APSInt.
734// 'x' would evaluate to a 8-bit constant (because of the return value of
735// test_symbol_fold_3_aux()) which would not get properly promoted to an
736// integer.
737char test_symbol_fold_3_aux(void);
738unsigned test_symbol_fold_3(void) {
739 unsigned x = test_symbol_fold_3_aux();
740 if (x == 54)
741 return (x << 8) | 0x5;
742 return 0;
Ted Kremenekde7d8002009-11-11 06:43:42 +0000743}
744
745//===----------------------------------------------------------------------===//
746// Tests for the warning of casting a non-struct type to a struct type
747//===----------------------------------------------------------------------===//
748
749typedef struct {unsigned int v;} NSSwappedFloat;
750
751NSSwappedFloat test_cast_nonstruct_to_struct(float x) {
752 struct hodor {
753 float number;
754 NSSwappedFloat sf;
755 };
756 return ((struct hodor *)&x)->sf; // expected-warning{{Casting a non-structure type to a structure type and accessing a field can lead to memory access errors or data corruption}}
757}
758
759NSSwappedFloat test_cast_nonstruct_to_union(float x) {
760 union bran {
761 float number;
762 NSSwappedFloat sf;
763 };
764 return ((union bran *)&x)->sf; // no-warning
765}
Ted Kremenek9b020342009-10-17 07:39:35 +0000766
Zhongxing Xud6944852009-11-11 13:42:54 +0000767void test_undefined_array_subscript() {
768 int i, a[10];
769 int *p = &a[i]; // expected-warning{{Array subscript is undefined}}
770}
Fariborz Jahanian63e963c2009-11-16 18:57:01 +0000771@end
Ted Kremenek64fa8582009-11-21 00:49:41 +0000772
773//===----------------------------------------------------------------------===//
Ted Kremenek998c1332009-11-23 17:58:48 +0000774// Test using an uninitialized value as a branch condition.
775//===----------------------------------------------------------------------===//
776
777int test_uninit_branch(void) {
778 int x;
779 if (x) // expected-warning{{Branch condition evaluates to a garbage value}}
780 return 1;
781 return 0;
782}
783
784int test_uninit_branch_b(void) {
785 int x;
786 return x ? 1 : 0; // expected-warning{{Branch condition evaluates to a garbage value}}
787}
788
Ted Kremenek616cf052009-11-23 18:12:03 +0000789int test_uninit_branch_c(void) {
790 int x;
791 if ((short)x) // expected-warning{{Branch condition evaluates to a garbage value}}
792 return 1;
793 return 0;
794}
Ted Kremenek998c1332009-11-23 17:58:48 +0000795
796//===----------------------------------------------------------------------===//
Ted Kremenek64fa8582009-11-21 00:49:41 +0000797// Test passing an undefined value in a message or function call.
798//===----------------------------------------------------------------------===//
799
800void test_bad_call_aux(int x);
801void test_bad_call(void) {
802 int y;
Ted Kremenek818b4332010-09-09 22:51:55 +0000803 test_bad_call_aux(y); // expected-warning{{Function call argument is an uninitialized value}}
Ted Kremenek64fa8582009-11-21 00:49:41 +0000804}
805
806@interface TestBadArg {}
807- (void) testBadArg:(int) x;
808@end
809
810void test_bad_msg(TestBadArg *p) {
811 int y;
Ted Kremenek818b4332010-09-09 22:51:55 +0000812 [p testBadArg:y]; // expected-warning{{Argument in message expression is an uninitialized value}}
Ted Kremenek64fa8582009-11-21 00:49:41 +0000813}
814
Ted Kremenekc213b482010-01-15 07:56:51 +0000815//===----------------------------------------------------------------------===//
816// PR 6033 - Test emitting the correct output in a warning where we use '%'
817// with operands that are undefined.
818//===----------------------------------------------------------------------===//
819
820int pr6033(int x) {
821 int y;
822 return x % y; // expected-warning{{The right operand of '%' is a garbage value}}
823}
824
Zhongxing Xu45eb4062010-01-19 12:11:55 +0000825struct trie {
826 struct trie* next;
827};
828
829struct kwset {
830 struct trie *trie;
Ted Kremenekac518ec2011-02-11 20:13:27 +0000831 unsigned char y[10];
Zhongxing Xu45eb4062010-01-19 12:11:55 +0000832 struct trie* next[10];
833 int d;
834};
835
836typedef struct trie trie_t;
837typedef struct kwset kwset_t;
838
839void f(kwset_t *kws, char const *p, char const *q) {
840 struct trie const *trie;
841 struct trie * const *next = kws->next;
842 register unsigned char c;
843 register char const *end = p;
844 register char const *lim = q;
845 register int d = 1;
Ted Kremenekac518ec2011-02-11 20:13:27 +0000846 register unsigned char const *y = kws->y;
Zhongxing Xu45eb4062010-01-19 12:11:55 +0000847
Ted Kremenekac518ec2011-02-11 20:13:27 +0000848 d = y[c = (end+=d)[-1]]; // no-warning
Zhongxing Xu45eb4062010-01-19 12:11:55 +0000849 trie = next[c];
850}
Ted Kremenek61e8e1b2010-02-02 02:01:51 +0000851
852//===----------------------------------------------------------------------===//
853// <rdar://problem/7593875> When handling sizeof(VLA) it leads to a hole in
854// the ExplodedGraph (causing a false positive)
855//===----------------------------------------------------------------------===//
856
857int rdar_7593875_aux(int x);
858int rdar_7593875(int n) {
859 int z[n > 10 ? 10 : n]; // VLA.
860 int v;
861 v = rdar_7593875_aux(sizeof(z));
862 // Previously we got a false positive about 'v' being uninitialized.
863 return v; // no-warning
864}
Ted Kremenekf6817042010-02-02 21:11:40 +0000865
866//===----------------------------------------------------------------------===//
867// Handle casts from symbolic regions (packaged as integers) to doubles.
868// Previously this caused an assertion failure.
869//===----------------------------------------------------------------------===//
870
871void *foo_rev95119();
872void baz_rev95119(double x);
873void bar_rev95119() {
874 // foo_rev95119() returns a symbolic pointer. It is then
875 // cast to an int which is then cast to a double.
876 int value = (int) foo_rev95119();
877 baz_rev95119((double)value);
878}
879
Ted Kremenek5b290652010-02-03 04:16:00 +0000880//===----------------------------------------------------------------------===//
881// Handle loading a symbolic pointer from a symbolic region that was
882// invalidated by a call to an unknown function.
883//===----------------------------------------------------------------------===//
884
885void bar_rev95192(int **x);
886void foo_rev95192(int **x) {
887 *x = 0;
888 bar_rev95192(x);
889 // Not a null dereference.
890 **x = 1; // no-warning
891}
892
Ted Kremenek40c37e12010-02-04 00:47:48 +0000893//===----------------------------------------------------------------------===//
894// Handle casts of a function to a function pointer with a different return
895// value. We don't yet emit an error for such cases, but we now we at least
896// don't crash when the return value gets interpreted in a way that
897// violates our invariants.
898//===----------------------------------------------------------------------===//
899
900void *foo_rev95267();
901int bar_rev95267() {
902 char (*Callback_rev95267)(void) = (char (*)(void)) foo_rev95267;
903 if ((*Callback_rev95267)() == (char) 0)
904 return 1;
905 return 0;
906}
Ted Kremenek95a01122010-02-04 04:18:55 +0000907
908// Same as previous case, but handle casts to 'void'.
909int bar_rev95274() {
910 void (*Callback_rev95274)(void) = (void (*)(void)) foo_rev95267;
911 (*Callback_rev95274)();
912 return 0;
913}
914
Ted Kremenek4dc15662010-02-06 03:57:59 +0000915void rdar7582031_test_static_init_zero() {
916 static unsigned x;
917 if (x == 0)
918 return;
919 int *p = 0;
920 *p = 0xDEADBEEF;
921}
Ted Kremenek81861ab2010-02-06 04:04:46 +0000922void rdar7582031_test_static_init_zero_b() {
923 static void* x;
924 if (x == 0)
925 return;
926 int *p = 0;
927 *p = 0xDEADBEEF;
928}
Ted Kremenek8ec4aac2010-02-09 19:11:53 +0000929
930//===----------------------------------------------------------------------===//
931// Test handling of parameters that are structs that contain floats and //
932// nested fields. //
933//===----------------------------------------------------------------------===//
934
935struct s_rev95547_nested { float x, y; };
936struct s_rev95547 {
937 struct s_rev95547_nested z1;
938 struct s_rev95547_nested z2;
939};
940float foo_rev95547(struct s_rev95547 w) {
941 return w.z1.x + 20.0; // no-warning
942}
943void foo_rev95547_b(struct s_rev95547 w) {
944 struct s_rev95547 w2 = w;
945 w2.z1.x += 20.0; // no-warning
946}
Ted Kremenek862b24f2010-04-29 01:10:26 +0000947
948//===----------------------------------------------------------------------===//
949// Test handling statement expressions that don't populate a CFG block that
950// is used to represent the computation of the RHS of a logical operator.
951// This previously triggered a crash.
952//===----------------------------------------------------------------------===//
953
954void pr6938() {
955 if (1 && ({
956 while (0);
957 0;
958 }) == 0) {
959 }
960}
961
962void pr6938_b() {
963 if (1 && *({ // expected-warning{{Dereference of null pointer}}
964 while (0) {}
965 ({
966 (int *) 0;
967 });
968 }) == 0) {
969 }
970}
Ted Kremenekfadebba2010-05-13 16:38:08 +0000971
972//===----------------------------------------------------------------------===//
973// <rdar://problem/7979430> - The CFG for code containing an empty
974// @synchronized block was previously broken (and would crash the analyzer).
975//===----------------------------------------------------------------------===//
976
977void r7979430(id x) {
978 @synchronized(x) {}
979}
980
Ted Kremenekfcd783d2010-06-15 00:55:40 +0000981//===----------------------------------------------------------------------===
982// PR 7361 - Test that functions wrapped in macro instantiations are analyzed.
983//===----------------------------------------------------------------------===
984#define MAKE_TEST_FN() \
985 void test_pr7361 (char a) {\
986 char* b = 0x0; *b = a;\
987 }
988
989MAKE_TEST_FN() // expected-warning{{null pointer}}
990
Jordy Rose5ca129c2010-06-27 01:20:56 +0000991//===----------------------------------------------------------------------===
992// PR 7491 - Test that symbolic expressions can be used as conditions.
993//===----------------------------------------------------------------------===
994
995void pr7491 () {
996 extern int getint();
997 int a = getint()-1;
998 if (a) {
999 return;
1000 }
1001 if (!a) {
1002 return;
1003 } else {
1004 // Should be unreachable
1005 (void)*(char*)0; // no-warning
1006 }
1007}
1008
Ted Kremenekdcee3ce2010-07-01 20:16:50 +00001009//===----------------------------------------------------------------------===
1010// PR 7475 - Test that assumptions about global variables are reset after
1011// calling a global function.
1012//===----------------------------------------------------------------------===
1013
1014int *pr7475_someGlobal;
1015void pr7475_setUpGlobal();
1016
1017void pr7475() {
1018 if (pr7475_someGlobal == 0)
1019 pr7475_setUpGlobal();
1020 *pr7475_someGlobal = 0; // no-warning
1021}
1022
1023void pr7475_warn() {
1024 static int *someStatic = 0;
1025 if (someStatic == 0)
1026 pr7475_setUpGlobal();
1027 *someStatic = 0; // expected-warning{{null pointer}}
1028}
1029
Ted Kremenekcb077882010-07-17 01:28:55 +00001030// <rdar://problem/8202272> - __imag passed non-complex should not crash
1031float f0(_Complex float x) {
1032 float l0 = __real x;
1033 return __real l0 + __imag l0;
1034}
1035
Jordy Rosea277e772010-08-09 20:31:57 +00001036
1037//===----------------------------------------------------------------------===
1038// Test that we can reduce symbols to constants whether they are on the left
1039// or right side of an expression.
1040//===----------------------------------------------------------------------===
1041
1042void reduce_to_constant(int x, int y) {
1043 if (x != 20)
1044 return;
1045
1046 int a = x + y;
1047 int b = y + x;
1048
1049 if (y == -20 && a != 0)
1050 (void)*(char*)0; // no-warning
1051 if (y == -20 && b != 0)
1052 (void)*(char*)0; // no-warning
1053}
Ted Kremenek34feff62010-08-26 22:19:33 +00001054
1055// <rdar://problem/8360854> - Test that code after a switch statement with no
1056// 'case:' labels is correctly evaluated.
1057void r8360854(int n) {
1058 switch (n) {
1059 default: ;
1060 }
1061 int *p = 0;
1062 *p = 0xDEADBEEF; // expected-warning{{null pointer}}
1063}
1064
Ted Kremenekf69cf182010-09-01 20:35:38 +00001065// PR 8050 - crash in CastSizeChecker when pointee is an incomplete type
1066typedef long unsigned int __darwin_size_t;
1067typedef __darwin_size_t size_t;
1068void *malloc(size_t);
1069
1070struct PR8050;
1071
1072void pr8050(struct PR8050 **arg)
1073{
1074 *arg = malloc(1);
1075}
1076
Ted Kremenek977a58a2010-09-09 00:40:43 +00001077// <rdar://problem/5880430> Switch on enum should not consider default case live
1078// if all enum values are covered
1079enum Cases { C1, C2, C3, C4 };
1080void test_enum_cases(enum Cases C) {
1081 switch (C) {
1082 case C1:
1083 case C2:
1084 case C4:
1085 case C3:
1086 return;
1087 }
1088 int *p = 0;
1089 *p = 0xDEADBEEF; // no-warning
1090}
1091
1092void test_enum_cases_positive(enum Cases C) {
1093 switch (C) { // expected-warning{{enumeration value 'C4' not handled in switch}}
1094 case C1:
1095 case C2:
1096 case C3:
1097 return;
1098 }
1099 int *p = 0;
1100 *p = 0xDEADBEEF; // expected-warning{{Dereference of null pointer}}
1101}
1102
Ted Kremenek4f6aa772010-09-10 03:05:40 +00001103// <rdar://problem/6351970> rule request: warn if synchronization mutex can be nil
1104void rdar6351970() {
1105 id x = 0;
1106 @synchronized(x) {} // expected-warning{{Nil value used as mutex for @synchronized() (no synchronization will occur)}}
1107}
1108
1109void rdar6351970_b(id x) {
1110 if (!x)
1111 @synchronized(x) {} // expected-warning{{Nil value used as mutex for @synchronized() (no synchronization will occur)}}
1112}
1113
1114void rdar6351970_c() {
1115 id x;
1116 @synchronized(x) {} // expected-warning{{Uninitialized value used as mutex for @synchronized}}
1117}
Ted Kremenek977a58a2010-09-09 00:40:43 +00001118
Ted Kremenek1adee4b2010-10-21 15:38:55 +00001119@interface Rdar8578650
1120- (id) foo8578650;
1121@end
1122
1123void rdar8578650(id x) {
1124 @synchronized (x) {
1125 [x foo8578650];
1126 }
1127 // At this point we should assume that 'x' is not nil, not
1128 // the inverse.
1129 @synchronized (x) { // no-warning
1130 }
1131}
1132
Ted Kremenek0853c7f2010-09-10 20:20:49 +00001133// <rdar://problem/6352035> rule request: direct structure member access null pointer dereference
1134@interface RDar6352035 {
1135 int c;
1136}
1137- (void)foo;
1138- (void)bar;
1139@end
1140
1141@implementation RDar6352035
1142- (void)foo {
1143 RDar6352035 *friend = 0;
1144 friend->c = 7; // expected-warning{{Instance variable access (via 'friend') results in a null pointer dereference}}
1145}
1146- (void)bar {
1147 self = 0;
1148 c = 7; // expected-warning{{Instance variable access (via 'self') results in a null pointer dereference}}
1149}
1150@end
1151
Ted Kremenek8f3b8342010-09-15 07:01:20 +00001152// PR 8149 - GNU statement expression in condition of ForStmt.
1153// This previously triggered an assertion failure in CFGBuilder.
1154void pr8149(void) {
1155 for (; ({ do { } while (0); 0; });) { }
1156}
1157
Ted Kremenek0d4f7672010-10-25 20:20:56 +00001158// PR 8458 - Make sure @synchronized doesn't crash with properties.
1159@interface PR8458 {}
1160@property(readonly) id lock;
1161@end
1162
1163static
1164void __PR8458(PR8458 *x) {
1165 @synchronized(x.lock) {} // no-warning
1166}
1167
Ted Kremenekc1143e52010-10-26 00:06:17 +00001168// PR 8440 - False null dereference during store to array-in-field-in-global.
1169// This test case previously resulted in a bogus null deref warning from
1170// incorrect lazy symbolication logic in RegionStore.
1171static struct {
1172 int num;
1173 char **data;
1174} saved_pr8440;
1175
1176char *foo_pr8440();
1177char **bar_pr8440();
1178void baz_pr8440(int n)
1179{
1180 saved_pr8440.num = n;
1181 if (saved_pr8440.data)
1182 return;
1183 saved_pr8440.data = bar_pr8440();
1184 for (int i = 0 ; i < n ; i ++)
1185 saved_pr8440.data[i] = foo_pr8440(); // no-warning
1186}
1187
Ted Kremenek29836f92010-11-11 23:10:10 +00001188// Support direct accesses to non-null memory. Reported in:
1189// PR 5272
1190// <rdar://problem/6839683>
1191int test_direct_address_load() {
1192 int *p = (int*) 0x4000;
1193 return *p; // no-warning
1194}
1195
1196void pr5272_test() {
1197 struct pr5272 { int var2; };
1198 (*(struct pr5272*)0xBC000000).var2 = 0; // no-warning
1199 (*(struct pr5272*)0xBC000000).var2 += 2; // no-warning
1200}
1201
Ted Kremenek948163b2010-11-15 20:09:42 +00001202// Support casting the return value of function to another different type
1203// This previously caused a crash, although we likely need more precise
1204// reasoning here. <rdar://problem/8663544>
1205void* rdar8663544();
1206typedef struct {} Val8663544;
1207Val8663544 bazR8663544() {
1208 Val8663544(*func) () = (Val8663544(*) ()) rdar8663544;
1209 return func();
1210}
1211
Ted Kremeneke4ae4dc2010-11-15 22:59:22 +00001212// PR 8619 - Handle ternary expressions with a call to a noreturn function.
1213// This previously resulted in a crash.
1214void pr8619_noreturn(int x) __attribute__((noreturn));
1215
1216void pr8619(int a, int b, int c) {
1217 a ?: pr8619_noreturn(b || c);
1218}
1219
1220
Ted Kremenekac518ec2011-02-11 20:13:27 +00001221// PR 8646 - crash in the analyzer when handling unions.
1222union pr8648_union {
1223 signed long long pr8648_union_field;
1224};
1225void pr8648() {
1226 long long y;
1227 union pr8648_union x = { .pr8648_union_field = 0LL };
1228 y = x.pr8648_union_field;
1229
1230 union pr8648_union z;
1231 z = (union pr8648_union) { .pr8648_union_field = 0LL };
1232
1233 union pr8648_union w;
1234 w = ({ (union pr8648_union) { .pr8648_union_field = 0LL }; });
1235
1236 // crash, no assignment
1237 (void) ({ (union pr8648_union) { .pr8648_union_field = 0LL }; }).pr8648_union_field;
1238
1239 // crash with assignment
1240 y = ({ (union pr8648_union) { .pr8648_union_field = 0LL }; }).pr8648_union_field;
1241}
Ted Kremenek6b12da92011-02-21 22:11:26 +00001242
1243// PR 9269 - don't assert when building the following CFG. The for statement
1244// contains a condition with multiple basic blocks, and the value of the
1245// statement expression is then indexed as part of a bigger condition expression.
1246// This example exposed a bug in child traversal in the CFGBuilder.
1247void pr9269() {
1248 struct s { char *bar[10]; } baz[2] = { 0 };
1249 unsigned i = 0;
1250 for (i = 0;
1251 (* ({ while(0); ({ &baz[0]; }); })).bar[0] != 0;
1252 ++i) {}
1253}
1254
Ted Kremenekf226d182011-02-24 03:09:15 +00001255// Test evaluation of GNU-style ?:.
1256int pr9287(int type) { return type ? : 0; } // no-warning
1257
1258void pr9287_b(int type, int *p) {
1259 int x = type ? : 0;
1260 if (x) {
1261 p = 0;
1262 }
1263 if (type) {
1264 *p = 0xDEADBEEF; // expected-warning {{null pointer}}
1265 }
1266}
1267
1268void pr9287_c(int type, int *p) {
1269 int x = type ? : 0;
1270 if (x) {
1271 p = 0;
1272 }
1273 if (!type) {
1274 *p = 0xDEADBEEF; // no-warning
1275 }
1276}
1277
Ted Kremeneke71f3d52011-03-01 23:12:55 +00001278void test_switch() {
1279 switch (4) {
1280 case 1: {
1281 int *p = 0;
1282 *p = 0xDEADBEEF; // no-warning
1283 break;
1284 }
1285 case 4: {
1286 int *p = 0;
1287 *p = 0xDEADBEEF; // expected-warning {{null}}
1288 break;
1289 }
1290 default: {
1291 int *p = 0;
1292 *p = 0xDEADBEEF; // no-warning
1293 break;
1294 }
1295 }
Ted Kremeneke9cd9c02011-03-13 03:48:04 +00001296}
1297
1298// PR 9467. Tests various CFG optimizations. This previously crashed.
1299static void test(unsigned int bit_mask)
1300{
1301 unsigned int bit_index;
1302 for (bit_index = 0;
1303 bit_index < 24;
1304 bit_index++) {
1305 switch ((0x01 << bit_index) & bit_mask) {
1306 case 0x100000: ;
1307 }
1308 }
1309}
Ted Kremenekbc869de2011-05-10 18:42:15 +00001310
1311// Don't crash on code containing __label__.
1312int radar9414427_aux();
1313void radar9414427() {
1314 __label__ mylabel;
1315 if (radar9414427_aux()) {
1316 mylabel: do {}
1317 while (0);
1318 }
1319}
1320
Ted Kremenek6e744db2011-05-19 00:56:53 +00001321// Analyze methods in @implementation (category)
1322@interface RDar9465344
1323@end
1324
1325@implementation RDar9465344 (MyCategory)
1326- (void) testcategoryImpl {
1327 int *p = 0x0;
1328 *p = 0xDEADBEEF; // expected-warning {{null}}
1329}
1330@end
1331
1332@implementation RDar9465344
1333@end
1334
Ted Kremenekccf1bfd2011-11-14 19:36:08 +00001335// Don't crash when analyzing access to 'self' within a block.
1336@interface Rdar10380300Base
1337- (void) foo;
1338@end
1339@interface Rdar10380300 : Rdar10380300Base @end
1340@implementation Rdar10380300
1341- (void)foo {
1342 ^{
1343 [super foo];
1344 }();
1345}
1346@end
1347