blob: f6a92831d7392a8dadffb99ee33f157a3767d292 [file] [log] [blame]
Ted Kremeneke0a58072009-09-18 22:37:37 +00001// NOTE: Use '-fobjc-gc' to test the analysis being run twice, and multiple reports are not issued.
Ted Kremenek565e4652010-02-05 02:06:54 +00002// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -analyzer-experimental-internal-checks -analyzer-check-objc-mem -analyzer-store=basic -fobjc-gc -analyzer-constraints=basic -verify -fblocks -Wno-unreachable-code %s
3// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -analyzer-experimental-internal-checks -analyzer-check-objc-mem -analyzer-store=basic -analyzer-constraints=range -verify -fblocks -Wno-unreachable-code %s
4// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -analyzer-experimental-internal-checks -analyzer-check-objc-mem -analyzer-store=region -analyzer-constraints=basic -verify -fblocks -Wno-unreachable-code %s
5// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -analyzer-experimental-internal-checks -analyzer-check-objc-mem -analyzer-store=region -analyzer-constraints=range -verify -fblocks -Wno-unreachable-code %s
6// RUN: %clang_cc1 -triple x86_64-apple-darwin10 -analyze -analyzer-experimental-internal-checks -analyzer-check-objc-mem -analyzer-store=basic -fobjc-gc -analyzer-constraints=basic -verify -fblocks -Wno-unreachable-code %s
7// RUN: %clang_cc1 -triple x86_64-apple-darwin10 -analyze -analyzer-experimental-internal-checks -analyzer-check-objc-mem -analyzer-store=basic -analyzer-constraints=range -verify -fblocks -Wno-unreachable-code %s
8// RUN: %clang_cc1 -triple x86_64-apple-darwin10 -analyze -analyzer-experimental-internal-checks -analyzer-check-objc-mem -analyzer-store=region -analyzer-constraints=basic -verify -fblocks -Wno-unreachable-code %s
9// RUN: %clang_cc1 -triple x86_64-apple-darwin10 -analyze -analyzer-experimental-internal-checks -analyzer-check-objc-mem -analyzer-store=region -analyzer-constraints=range -verify -fblocks -Wno-unreachable-code %s
Ted Kremenek2dabd422009-01-22 18:53:15 +000010
Ted Kremenekf0af7772010-05-26 21:36:54 +000011#ifndef __clang_analyzer__
12#error __clang__analyzer__ not defined
13#endif
14
Ted Kremenek19e1f0b2009-08-01 06:17:29 +000015typedef struct objc_ivar *Ivar;
Ted Kremenekf684d562009-03-05 18:08:28 +000016typedef struct objc_selector *SEL;
17typedef signed char BOOL;
18typedef int NSInteger;
19typedef unsigned int NSUInteger;
20typedef struct _NSZone NSZone;
Ted Kremenek59978882009-07-08 22:42:46 +000021@class NSInvocation, NSArray, NSMethodSignature, NSCoder, NSString, NSEnumerator;
Ted Kremenek19e1f0b2009-08-01 06:17:29 +000022@protocol NSObject
23- (BOOL)isEqual:(id)object;
24- (id)autorelease;
25@end
26@protocol NSCopying
27- (id)copyWithZone:(NSZone *)zone;
28@end
Ted Kremenekf684d562009-03-05 18:08:28 +000029@protocol NSMutableCopying - (id)mutableCopyWithZone:(NSZone *)zone; @end
Ted Kremenek19e1f0b2009-08-01 06:17:29 +000030@protocol NSCoding
31- (void)encodeWithCoder:(NSCoder *)aCoder;
32@end
33@interface NSObject <NSObject> {}
34- (id)init;
35+ (id)allocWithZone:(NSZone *)zone;
36@end
Ted Kremenekf684d562009-03-05 18:08:28 +000037extern id NSAllocateObject(Class aClass, NSUInteger extraBytes, NSZone *zone);
38@interface NSString : NSObject <NSCopying, NSMutableCopying, NSCoding>
39- (NSUInteger)length;
40+ (id)stringWithUTF8String:(const char *)nullTerminatedCString;
41@end extern NSString * const NSBundleDidLoadNotification;
Ted Kremenek19e1f0b2009-08-01 06:17:29 +000042@interface NSValue : NSObject <NSCopying, NSCoding>
43- (void)getValue:(void *)value;
44@end
45@interface NSNumber : NSValue
46- (char)charValue;
47- (id)initWithBool:(BOOL)value;
48@end
Ted Kremenekf684d562009-03-05 18:08:28 +000049@interface NSAssertionHandler : NSObject {}
50+ (NSAssertionHandler *)currentHandler;
51- (void)handleFailureInMethod:(SEL)selector object:(id)object file:(NSString *)fileName lineNumber:(NSInteger)line description:(NSString *)format,...;
52@end
53extern NSString * const NSConnectionReplyMode;
Ted Kremenek693de5d2009-03-23 15:42:58 +000054typedef float CGFloat;
55typedef struct _NSPoint {
56 CGFloat x;
57 CGFloat y;
58} NSPoint;
59typedef struct _NSSize {
60 CGFloat width;
61 CGFloat height;
62} NSSize;
63typedef struct _NSRect {
64 NSPoint origin;
65 NSSize size;
66} NSRect;
Ted Kremenek9f67ede2008-10-01 05:05:46 +000067
68// Reduced test case from crash in <rdar://problem/6253157>
Ted Kremenek9f67ede2008-10-01 05:05:46 +000069@interface A @end
70@implementation A
71- (void)foo:(void (^)(NSObject *x))block {
72 if (!((block != ((void *)0)))) {}
73}
74@end
75
Ted Kremenek6dfe2f52008-10-18 22:20:20 +000076// Reduced test case from crash in PR 2796;
77// http://llvm.org/bugs/show_bug.cgi?id=2796
78
79unsigned foo(unsigned x) { return __alignof__((x)) + sizeof(x); }
Ted Kremenek9253b0f2008-10-20 23:14:31 +000080
81// Improvement to path-sensitivity involving compound assignments.
82// Addresses false positive in <rdar://problem/6268365>
83//
84
85unsigned r6268365Aux();
86
87void r6268365() {
88 unsigned x = 0;
Ted Kremenek3e5637f2010-07-27 18:49:08 +000089 x &= r6268365Aux(); // expected-warning{{The left operand to '&=' is always 0}}
Ted Kremenek9253b0f2008-10-20 23:14:31 +000090 unsigned j = 0;
91
92 if (x == 0) ++j;
Ted Kremenek3e5637f2010-07-27 18:49:08 +000093 if (x == 0) x = x / j; // expected-warning{{Assigned value is always the same as the existing value}} expected-warning{{The right operand to '/' is always 1}}
Ted Kremenek9253b0f2008-10-20 23:14:31 +000094}
95
Ted Kremenekc13b6e22008-10-20 23:40:25 +000096void divzeroassume(unsigned x, unsigned j) {
97 x /= j;
Chris Lattner7ef655a2010-01-12 21:23:57 +000098 if (j == 0) x /= 0; // no static-analyzer warning expected-warning {{division by zero is undefined}}
99 if (j == 0) x /= j; // no static-analyzer warning
100 if (j == 0) x = x / 0; // no static-analyzer warning expected-warning {{division by zero is undefined}}
Ted Kremenekc13b6e22008-10-20 23:40:25 +0000101}
102
103void divzeroassumeB(unsigned x, unsigned j) {
104 x = x / j;
Chris Lattner7ef655a2010-01-12 21:23:57 +0000105 if (j == 0) x /= 0; // no static-analyzer warning expected-warning {{division by zero is undefined}}
106 if (j == 0) x /= j; // no static-analyzer warning
107 if (j == 0) x = x / 0; // no static-analyzer warning expected-warning {{division by zero is undefined}}
Ted Kremenekc13b6e22008-10-20 23:40:25 +0000108}
109
Ted Kremenek76dba7b2008-11-13 05:05:34 +0000110// InitListExpr processing
111
112typedef float __m128 __attribute__((__vector_size__(16), __may_alias__));
113__m128 return128() {
Ted Kremenek062e2f92008-11-13 06:10:40 +0000114 // This compound literal has a Vector type. We currently just
115 // return UnknownVal.
Ted Kremenek76dba7b2008-11-13 05:05:34 +0000116 return __extension__(__m128) { 0.0f, 0.0f, 0.0f, 0.0f };
117}
118
Ted Kremenek062e2f92008-11-13 06:10:40 +0000119typedef long long __v2di __attribute__ ((__vector_size__ (16)));
120typedef long long __m128i __attribute__ ((__vector_size__ (16), __may_alias__));
121__m128i vec128i(long long __q1, long long __q0) {
122 // This compound literal returns true for both isVectorType() and
123 // isIntegerType().
124 return __extension__ (__m128i)(__v2di){ __q0, __q1 };
125}
126
Ted Kremenek8322d6a2008-12-09 00:14:48 +0000127// Zero-sized VLAs.
128void check_zero_sized_VLA(int x) {
129 if (x)
130 return;
131
Ted Kremenekae784472009-11-05 08:30:12 +0000132 int vla[x]; // expected-warning{{Declared variable-length array (VLA) has zero size}}
Ted Kremenek159d2482008-12-09 00:44:16 +0000133}
134
135void check_uninit_sized_VLA() {
136 int x;
Ted Kremenekae784472009-11-05 08:30:12 +0000137 int vla[x]; // expected-warning{{Declared variable-length array (VLA) uses a garbage value as its size}}
Ted Kremenek8322d6a2008-12-09 00:14:48 +0000138}
Ted Kremenek062e2f92008-11-13 06:10:40 +0000139
Ted Kremenek55f7bcb2008-12-15 18:51:00 +0000140// sizeof(void)
141// - Tests a regression reported in PR 3211: http://llvm.org/bugs/show_bug.cgi?id=3211
142void handle_sizeof_void(unsigned flag) {
143 int* p = 0;
144
145 if (flag) {
146 if (sizeof(void) == 1)
147 return;
148 // Infeasible.
149 *p = 1; // no-warning
150 }
151
152 void* q;
153
154 if (!flag) {
155 if (sizeof(*q) == 1)
156 return;
157 // Infeasibe.
158 *p = 1; // no-warning
159 }
160
161 // Infeasible.
162 *p = 1; // no-warning
163}
164
Ted Kremenek3f214b32009-10-29 05:33:39 +0000165// check deference of undefined values
166void check_deref_undef(void) {
167 int *p;
168 *p = 0xDEADBEEF; // expected-warning{{Dereference of undefined pointer value}}
169}
170
Ted Kremenekd76d47e2009-01-27 18:29:03 +0000171// PR 3422
172void pr3422_helper(char *p);
173void pr3422() {
174 char buf[100];
175 char *q = &buf[10];
176 pr3422_helper(&q[1]);
177}
178
Ted Kremeneka3d1eb82009-02-14 05:55:08 +0000179// PR 3543 (handle empty statement expressions)
Mike Stump006105d2009-07-21 18:59:16 +0000180void pr_3543(void) {
Ted Kremeneka3d1eb82009-02-14 05:55:08 +0000181 ({});
182}
183
Ted Kremenek265a3052009-02-24 02:23:11 +0000184// <rdar://problem/6611677>
185// This test case test the use of a vector type within an array subscript
186// expression.
187typedef long long __a64vector __attribute__((__vector_size__(8)));
188typedef long long __a128vector __attribute__((__vector_size__(16)));
189static inline __a64vector __attribute__((__always_inline__, __nodebug__))
190my_test_mm_movepi64_pi64(__a128vector a) {
191 return (__a64vector)a[0];
192}
193
Ted Kremenekf684d562009-03-05 18:08:28 +0000194// Test basic tracking of ivars associated with 'self'.
195@interface SelfIvarTest : NSObject {
196 int flag;
197}
198- (void)test_self_tracking;
199@end
200
201@implementation SelfIvarTest
202- (void)test_self_tracking {
203 char *p = 0;
204 char c;
205
206 if (flag)
207 p = "hello";
208
209 if (flag)
210 c = *p; // no-warning
211}
212@end
Ted Kremeneka3d1eb82009-02-14 05:55:08 +0000213
Ted Kremenek7de20fe2009-03-11 02:29:48 +0000214// PR 3770
215char pr3770(int x) {
216 int y = x & 0x2;
217 char *p = 0;
218 if (y == 1)
219 p = "hello";
220
221 if (y == 1)
222 return p[0]; // no-warning
223
224 return 'a';
225}
226
Ted Kremenek344d4c82009-03-11 18:17:16 +0000227// PR 3772
Ted Kremenekfa6228d2009-03-11 02:52:39 +0000228// - We just want to test that this doesn't crash the analyzer.
229typedef struct st ST;
230struct st { char *name; };
231extern ST *Cur_Pu;
232
Ted Kremenek344d4c82009-03-11 18:17:16 +0000233void pr3772(void)
Ted Kremenekfa6228d2009-03-11 02:52:39 +0000234{
235 static ST *last_Cur_Pu;
236 if (last_Cur_Pu == Cur_Pu) {
237 return;
238 }
239}
240
Ted Kremenek344d4c82009-03-11 18:17:16 +0000241// PR 3780 - This tests that StmtIterator isn't broken for VLAs in DeclGroups.
242void pr3780(int sz) { typedef double MAT[sz][sz]; }
Ted Kremenekfa6228d2009-03-11 02:52:39 +0000243
Ted Kremenekec099f12009-03-18 22:10:22 +0000244// <rdar://problem/6695527> - Test that we don't symbolicate doubles before
245// we are ready to do something with them.
246int rdar6695527(double x) {
247 if (!x) { return 0; }
248 return 1;
249}
Ted Kremenek693de5d2009-03-23 15:42:58 +0000250
251// <rdar://problem/6708148> - Test that we properly invalidate structs
252// passed-by-reference to a function.
253void pr6708148_invalidate(NSRect *x);
254void pr6708148_use(NSRect x);
255void pr6708148_test(void) {
256 NSRect x;
257 pr6708148_invalidate(&x);
258 pr6708148_use(x); // no-warning
259}
260
Ted Kremenekb7252322009-04-10 00:01:14 +0000261// Handle both kinds of noreturn attributes for pruning paths.
262void rdar_6777003_noret() __attribute__((noreturn));
263void rdar_6777003_analyzer_noret() __attribute__((analyzer_noreturn));
264
265void rdar_6777003(int x) {
266 int *p = 0;
267
268 if (x == 1) {
269 rdar_6777003_noret();
270 *p = 1; // no-warning;
271 }
272
273 if (x == 2) {
274 rdar_6777003_analyzer_noret();
275 *p = 1; // no-warning;
276 }
277
278 *p = 1; // expected-warning{{Dereference of null pointer}}
279}
280
Ted Kremenekaf48fdd2009-04-21 22:38:05 +0000281// For pointer arithmetic, --/++ should be treated as preserving non-nullness,
282// regardless of how well the underlying StoreManager reasons about pointer
283// arithmetic.
284// <rdar://problem/6777209>
Ted Kremenekaf48fdd2009-04-21 22:38:05 +0000285void rdar_6777209(char *p) {
286 if (p == 0)
287 return;
288
289 ++p;
290
291 // This branch should always be infeasible.
292 if (p == 0)
293 *p = 'c'; // no-warning
294}
Ted Kremenekb3cfd582009-04-23 17:49:43 +0000295
296// PR 4033. A symbolic 'void *' pointer can be used as the address for a
297// computed goto.
298typedef void *Opcode;
299Opcode pr_4033_getOpcode();
300void pr_4033(void) {
John McCallb60a77e2010-08-01 00:26:45 +0000301 void *lbl = &&next_opcode;
Ted Kremenekb3cfd582009-04-23 17:49:43 +0000302next_opcode:
303 {
304 Opcode op = pr_4033_getOpcode();
305 if (op) goto *op;
306 }
307}
308
Ted Kremenek956a37d2009-05-01 23:35:18 +0000309// Test invalidating pointers-to-pointers with slightly different types. This
310// example came from a recent false positive due to a regression where the
311// branch condition was falsely reported as being uninitialized.
312void invalidate_by_ref(char **x);
313int test_invalidate_by_ref() {
314 unsigned short y;
315 invalidate_by_ref((char**) &y);
316 if (y) // no-warning
317 return 1;
318 return 0;
319}
320
Ted Kremeneked47fc62009-07-03 00:10:50 +0000321// Test for <rdar://problem/7027684>. This just tests that the CFG is
322// constructed correctly. Previously, the successor block of the entrance
323// was the block containing the merge for '?', which would trigger an
324// assertion failure.
325int rdar_7027684_aux();
326int rdar_7027684_aux_2() __attribute__((noreturn));
327void rdar_7027684(int x, int y) {
328 {}; // this empty compound statement is critical.
329 (rdar_7027684_aux() ? rdar_7027684_aux_2() : (void) 0);
330}
331
Ted Kremenek411af402009-07-06 22:23:45 +0000332// Test that we handle casts of string literals to arbitrary types.
333unsigned const char *string_literal_test1() {
334 return (const unsigned char*) "hello";
335}
336
337const float *string_literal_test2() {
338 return (const float*) "hello";
339}
340
Ted Kremenek169077d2009-07-06 23:47:19 +0000341// Test that we handle casts *from* incomplete struct types.
342extern const struct _FooAssertStruct _cmd;
343void test_cast_from_incomplete_struct_aux(volatile const void *x);
344void test_cast_from_incomplete_struct() {
345 test_cast_from_incomplete_struct_aux(&_cmd);
346}
Ted Kremeneked47fc62009-07-03 00:10:50 +0000347
Ted Kremenek59978882009-07-08 22:42:46 +0000348// Test for <rdar://problem/7034511>
349// "ValueManager::makeIntVal(uint64_t X, QualType T) should return a 'Loc'
350// when 'T' is a pointer"
351//
352// Previously this case would crash.
353void test_rdar_7034511(NSArray *y) {
354 NSObject *x;
355 for (x in y) {}
356 if (x == ((void*) 0)) {}
357}
358
Ted Kremenek8d344ae2009-07-10 21:24:45 +0000359// Handle casts of function pointers (CodeTextRegions) to arbitrary pointer
360// types. This was previously causing a crash in CastRegion.
361void handle_funcptr_voidptr_casts() {
Ted Kremenek3f9811b2009-07-10 21:11:16 +0000362 void **ptr;
363 typedef void *PVOID;
Ted Kremenek8d344ae2009-07-10 21:24:45 +0000364 typedef void *PCHAR;
Ted Kremenek3f9811b2009-07-10 21:11:16 +0000365 typedef long INT_PTR, *PINT_PTR;
366 typedef INT_PTR (*FARPROC)();
Ted Kremenek8d344ae2009-07-10 21:24:45 +0000367 FARPROC handle_funcptr_voidptr_casts_aux();
368 PVOID handle_funcptr_voidptr_casts_aux_2(PVOID volatile *x);
369 PVOID handle_funcptr_voidptr_casts_aux_3(PCHAR volatile *x);
Ted Kremenek3f9811b2009-07-10 21:11:16 +0000370
Ted Kremenek8d344ae2009-07-10 21:24:45 +0000371 ptr = (void**) handle_funcptr_voidptr_casts_aux();
372 handle_funcptr_voidptr_casts_aux_2(ptr);
373 handle_funcptr_voidptr_casts_aux_3(ptr);
Ted Kremenek3f9811b2009-07-10 21:11:16 +0000374}
375
Ted Kremenek31ef2b62009-07-10 21:43:30 +0000376// RegionStore::Retrieve previously crashed on this example. This example
377// was previously in the test file 'xfail_regionstore_wine_crash.c'.
378void testA() {
379 long x = 0;
380 char *y = (char *) &x;
381 if (!*y)
382 return;
383}
384
Ted Kremenek43d74a52009-07-11 04:38:49 +0000385// RegionStoreManager previously crashed on this example. The problem is that
386// the value bound to the field of b->grue after the call to testB_aux is
387// a symbolic region. The second '*__gruep__' involves performing a load
388// from a 'int*' that really is a 'void**'. The loaded location must be
389// implicitly converted to an integer that wraps a location. Previosly we would
390// get a crash here due to an assertion failure.
391typedef struct _BStruct { void *grue; } BStruct;
392void testB_aux(void *ptr);
393void testB(BStruct *b) {
394 {
395 int *__gruep__ = ((int *)&((b)->grue));
396 int __gruev__ = *__gruep__;
397 testB_aux(__gruep__);
398 }
399 {
400 int *__gruep__ = ((int *)&((b)->grue));
401 int __gruev__ = *__gruep__;
402 if (~0 != __gruev__) {}
403 }
404}
405
Ted Kremenek54ca9b12009-07-13 21:55:12 +0000406void test_trivial_symbolic_comparison(int *x) {
407 int test_trivial_symbolic_comparison_aux();
408 int a = test_trivial_symbolic_comparison_aux();
409 int b = a;
410 if (a != b) {
411 int *p = 0;
412 *p = 0xDEADBEEF; // no-warning
413 }
414
415 a = a == 1;
416 b = b == 1;
417 if (a != b) {
418 int *p = 0;
419 *p = 0xDEADBEEF; // no-warning
420 }
421}
422
Ted Kremenekfde2efe2009-07-15 22:09:25 +0000423// Test for:
424// <rdar://problem/7062158> false positive null dereference due to
425// BasicStoreManager not tracking *static* globals
426//
427// This just tests the proper tracking of symbolic values for globals (both
428// static and non-static).
429//
430static int* x_rdar_7062158;
431void rdar_7062158() {
432 int *current = x_rdar_7062158;
433 if (current == x_rdar_7062158)
434 return;
435
436 int *p = 0;
437 *p = 0xDEADBEEF; // no-warning
438}
439
440int* x_rdar_7062158_2;
441void rdar_7062158_2() {
442 int *current = x_rdar_7062158_2;
443 if (current == x_rdar_7062158_2)
444 return;
445
446 int *p = 0;
447 *p = 0xDEADBEEF; // no-warning
448}
449
Ted Kremenek46537392009-07-16 01:33:37 +0000450// This test reproduces a case for a crash when analyzing ClamAV using
451// RegionStoreManager (the crash doesn't exhibit in BasicStoreManager because
452// it isn't doing anything smart about arrays). The problem is that on the
453// second line, 'p = &p[i]', p is assigned an ElementRegion whose index
454// is a 16-bit integer. On the third line, a new ElementRegion is created
455// based on the previous region, but there the region uses a 32-bit integer,
456// resulting in a clash of values (an assertion failure at best). We resolve
457// this problem by implicitly converting index values to 'int' when the
458// ElementRegion is created.
459unsigned char test_array_index_bitwidth(const unsigned char *p) {
460 unsigned short i = 0;
461 for (i = 0; i < 2; i++) p = &p[i];
462 return p[i+1];
463}
464
Ted Kremenek63b9cfe2009-07-18 06:27:51 +0000465// This case tests that CastRegion handles casts involving BlockPointerTypes.
466// It should not crash.
467void test_block_cast() {
468 id test_block_cast_aux();
469 (void (^)(void *))test_block_cast_aux(); // expected-warning{{expression result unused}}
470}
471
Chris Lattnere0303582010-01-09 20:43:19 +0000472int OSAtomicCompareAndSwap32Barrier();
473
Ted Kremenek293769a2009-07-20 21:00:55 +0000474// Test comparison of 'id' instance variable to a null void* constant after
475// performing an OSAtomicCompareAndSwap32Barrier.
476// This previously was a crash in RegionStoreManager.
477@interface TestIdNull {
478 id x;
479}
480-(int)foo;
481@end
482@implementation TestIdNull
483-(int)foo {
484 OSAtomicCompareAndSwap32Barrier(0, (signed)2, (signed*)&x);
485 if (x == (void*) 0) { return 0; }
486 return 1;
487}
488@end
489
Ted Kremenek32c3fa42009-07-21 21:03:30 +0000490// PR 4594 - This was a crash when handling casts in SimpleSValuator.
491void PR4594() {
492 char *buf[1];
493 char **foo = buf;
494 *foo = "test";
495}
Ted Kremenek0b331e32009-07-22 04:23:20 +0000496
497// Test invalidation logic where an integer is casted to an array with a
498// different sign and then invalidated.
499void test_invalidate_cast_int() {
500 void test_invalidate_cast_int_aux(unsigned *i);
501 signed i;
502 test_invalidate_cast_int_aux((unsigned*) &i);
503 if (i < 0)
504 return;
505}
506
Chris Lattnere0303582010-01-09 20:43:19 +0000507int ivar_getOffset();
508
Ted Kremenek19e1f0b2009-08-01 06:17:29 +0000509// Reduced from a crash involving the cast of an Objective-C symbolic region to
510// 'char *'
511static NSNumber *test_ivar_offset(id self, SEL _cmd, Ivar inIvar) {
512 return [[[NSNumber allocWithZone:((void*)0)] initWithBool:*(_Bool *)((char *)self + ivar_getOffset(inIvar))] autorelease];
513}
Ted Kremenek9a108eb2009-08-02 04:12:53 +0000514
515// Reduced from a crash in StoreManager::CastRegion involving a divide-by-zero.
516// This resulted from not properly handling region casts to 'const void*'.
517void test_cast_const_voidptr() {
518 char x[10];
519 char *p = &x[1];
520 const void* q = p;
521}
Ted Kremenek968f0a62009-08-03 21:41:46 +0000522
523// Reduced from a crash when analyzing Wine. This test handles loads from
524// function addresses.
525typedef long (*FARPROC)();
526FARPROC test_load_func(FARPROC origfun) {
527 if (!*(unsigned char*) origfun)
528 return origfun;
529 return 0;
530}
Ted Kremenek48775d52009-08-03 23:22:53 +0000531
532// Test passing-by-value an initialized struct variable.
533struct test_pass_val {
534 int x;
535 int y;
536};
537void test_pass_val_aux(struct test_pass_val s);
538void test_pass_val() {
539 struct test_pass_val s;
540 s.x = 1;
Ted Kremenek8eec7c02009-08-04 00:58:45 +0000541 s.y = 2;
Ted Kremenek48775d52009-08-03 23:22:53 +0000542 test_pass_val_aux(s);
543}
544
Ted Kremenek4ed45982009-08-05 05:31:02 +0000545// This is a reduced test case of a false positive that previously appeared
546// in RegionStoreManager. Previously the array access resulted in dereferencing
547// an undefined value.
548int test_array_compound(int *q, int *r, int *z) {
549 int *array[] = { q, r, z };
550 int j = 0;
551 for (unsigned i = 0; i < 3 ; ++i)
552 if (*array[i]) ++j; // no-warning
553 return j;
554}
555
Ted Kremenek1894dce2009-08-25 20:51:30 +0000556// This test case previously crashed with -analyzer-store=basic because the
557// symbolic value stored in 'x' wouldn't be implicitly casted to a signed value
558// during the comparison.
559int rdar_7124210(unsigned int x) {
560 enum { SOME_CONSTANT = 123 };
561 int compare = ((signed) SOME_CONSTANT) == *((signed *) &x);
562 return compare ? 0 : 1; // Forces the evaluation of the symbolic constraint.
563}
564
Ted Kremenekab2f43c2009-08-25 23:29:04 +0000565void pr4781(unsigned long *raw1) {
566 unsigned long *cook, *raw0;
567 unsigned long dough[32];
568 int i;
569 cook = dough;
570 for( i = 0; i < 16; i++, raw1++ ) {
571 raw0 = raw1++;
572 *cook = (*raw0 & 0x00fc0000L) << 6;
573 *cook |= (*raw0 & 0x00000fc0L) << 10;
574 }
575}
576
Ted Kremenekcfcd7fd2009-09-09 20:36:12 +0000577// <rdar://problem/7185647> - 'self' should be treated as being non-null
578// upon entry to an objective-c method.
579@interface RDar7185647
580- (id)foo;
581@end
582@implementation RDar7185647
583- (id) foo {
584 if (self)
585 return self;
Chris Lattner8b5dec32010-07-07 06:14:23 +0000586 *((volatile int *) 0x0) = 0xDEADBEEF; // no-warning
Ted Kremenekcfcd7fd2009-09-09 20:36:12 +0000587 return self;
588}
589@end
Ted Kremeneke2b57442009-09-15 00:40:32 +0000590
591// Test reasoning of __builtin_offsetof;
592struct test_offsetof_A {
593 int x;
594 int y;
595};
596struct test_offsetof_B {
597 int w;
598 int z;
599};
600void test_offsetof_1() {
601 if (__builtin_offsetof(struct test_offsetof_A, x) ==
602 __builtin_offsetof(struct test_offsetof_B, w))
603 return;
604 int *p = 0;
605 *p = 0xDEADBEEF; // no-warning
606}
607void test_offsetof_2() {
608 if (__builtin_offsetof(struct test_offsetof_A, y) ==
609 __builtin_offsetof(struct test_offsetof_B, z))
610 return;
611 int *p = 0;
612 *p = 0xDEADBEEF; // no-warning
613}
614void test_offsetof_3() {
615 if (__builtin_offsetof(struct test_offsetof_A, y) -
616 __builtin_offsetof(struct test_offsetof_A, x)
617 ==
618 __builtin_offsetof(struct test_offsetof_B, z) -
619 __builtin_offsetof(struct test_offsetof_B, w))
620 return;
621 int *p = 0;
622 *p = 0xDEADBEEF; // no-warning
623}
624void test_offsetof_4() {
625 if (__builtin_offsetof(struct test_offsetof_A, y) ==
626 __builtin_offsetof(struct test_offsetof_B, w))
627 return;
628 int *p = 0;
629 *p = 0xDEADBEEF; // expected-warning{{Dereference of null pointer}}
630}
631
Ted Kremenekc32b2442009-09-21 23:22:11 +0000632// <rdar://problem/6829164> "nil receiver" false positive: make tracking
633// of the MemRegion for 'self' path-sensitive
634@interface RDar6829164 : NSObject {
635 double x; int y;
636}
637- (id) init;
638@end
639
640id rdar_6829164_1();
641double rdar_6829164_2();
642
643@implementation RDar6829164
644- (id) init {
645 if((self = [super init]) != 0) {
646 id z = rdar_6829164_1();
647 y = (z != 0);
648 if (y)
649 x = rdar_6829164_2();
650 }
651 return self;
652}
653@end
Ted Kremenekcc969fd2009-09-22 04:48:39 +0000654
655// <rdar://problem/7242015> - Invalidate values passed-by-reference
656// to functions when the pointer to the value is passed as an integer.
657void test_7242015_aux(unsigned long);
658int rdar_7242015() {
659 int x;
660 test_7242015_aux((unsigned long) &x); // no-warning
661 return x; // Previously we return and uninitialized value when
662 // using RegionStore.
663}
664
Ted Kremenekcf549592009-09-22 21:19:14 +0000665// <rdar://problem/7242006> [RegionStore] compound literal assignment with
666// floats not honored
667CGFloat rdar7242006(CGFloat x) {
668 NSSize y = (NSSize){x, 10};
669 return y.width; // no-warning
670}
671
Ted Kremenek657406d2009-09-23 01:30:01 +0000672// PR 4988 - This test exhibits a case where a function can be referenced
673// when not explicitly used in an "lvalue" context (as far as the analyzer is
674// concerned). This previously triggered a crash due to an invalid assertion.
675void pr_4988(void) {
676 pr_4988; // expected-warning{{expression result unused}}
677}
678
Ted Kremenek022a1252009-09-26 17:18:44 +0000679// <rdar://problem/7152418> - A 'signed char' is used as a flag, which is
680// implicitly converted to an int.
681void *rdar7152418_bar();
682@interface RDar7152418 {
683 signed char x;
684}
685-(char)foo;
686@end;
687@implementation RDar7152418
688-(char)foo {
689 char *p = 0;
690 void *result = 0;
691 if (x) {
692 result = rdar7152418_bar();
693 p = "hello";
694 }
695 if (!result) {
696 result = rdar7152418_bar();
697 if (result && x)
698 return *p; // no-warning
699 }
700 return 1;
701}
702
Ted Kremenek9b020342009-10-17 07:39:35 +0000703//===----------------------------------------------------------------------===//
Ted Kremenekb1d04222009-10-06 03:44:49 +0000704// Test constant-folding of symbolic values, automatically handling type
Ted Kremenek9b020342009-10-17 07:39:35 +0000705// conversions of the symbol as necessary.
706//===----------------------------------------------------------------------===//
707
Ted Kremenek9b020342009-10-17 07:39:35 +0000708// Previously this would crash once we started eagerly evaluating symbols whose
709// values were constrained to a single value.
710void test_symbol_fold_1(signed char x) {
Ted Kremenekb1d04222009-10-06 03:44:49 +0000711 while (1) {
712 if (x == ((signed char) 0)) {}
713 }
714}
715
Ted Kremenek9b020342009-10-17 07:39:35 +0000716// This previously caused a crash because it triggered an assertion in APSInt.
717void test_symbol_fold_2(unsigned int * p, unsigned int n,
718 const unsigned int * grumpkin, unsigned int dn) {
Ted Kremenekb5deae52009-10-16 20:46:24 +0000719 unsigned int i;
720 unsigned int tempsub[8];
721 unsigned int *solgrumpkin = tempsub + n;
722 for (i = 0; i < n; i++)
723 solgrumpkin[i] = (i < dn) ? ~grumpkin[i] : 0xFFFFFFFF;
724 for (i <<= 5; i < (n << 5); i++) {}
725}
Ted Kremenekb1d04222009-10-06 03:44:49 +0000726
Ted Kremenek9b020342009-10-17 07:39:35 +0000727// This previously caused a crash because it triggered an assertion in APSInt.
728// 'x' would evaluate to a 8-bit constant (because of the return value of
729// test_symbol_fold_3_aux()) which would not get properly promoted to an
730// integer.
731char test_symbol_fold_3_aux(void);
732unsigned test_symbol_fold_3(void) {
733 unsigned x = test_symbol_fold_3_aux();
734 if (x == 54)
735 return (x << 8) | 0x5;
736 return 0;
Ted Kremenekde7d8002009-11-11 06:43:42 +0000737}
738
739//===----------------------------------------------------------------------===//
740// Tests for the warning of casting a non-struct type to a struct type
741//===----------------------------------------------------------------------===//
742
743typedef struct {unsigned int v;} NSSwappedFloat;
744
745NSSwappedFloat test_cast_nonstruct_to_struct(float x) {
746 struct hodor {
747 float number;
748 NSSwappedFloat sf;
749 };
750 return ((struct hodor *)&x)->sf; // expected-warning{{Casting a non-structure type to a structure type and accessing a field can lead to memory access errors or data corruption}}
751}
752
753NSSwappedFloat test_cast_nonstruct_to_union(float x) {
754 union bran {
755 float number;
756 NSSwappedFloat sf;
757 };
758 return ((union bran *)&x)->sf; // no-warning
759}
Ted Kremenek9b020342009-10-17 07:39:35 +0000760
Zhongxing Xud6944852009-11-11 13:42:54 +0000761void test_undefined_array_subscript() {
762 int i, a[10];
763 int *p = &a[i]; // expected-warning{{Array subscript is undefined}}
764}
Fariborz Jahanian63e963c2009-11-16 18:57:01 +0000765@end
Ted Kremenek64fa8582009-11-21 00:49:41 +0000766
767//===----------------------------------------------------------------------===//
Ted Kremenek998c1332009-11-23 17:58:48 +0000768// Test using an uninitialized value as a branch condition.
769//===----------------------------------------------------------------------===//
770
771int test_uninit_branch(void) {
772 int x;
773 if (x) // expected-warning{{Branch condition evaluates to a garbage value}}
774 return 1;
775 return 0;
776}
777
778int test_uninit_branch_b(void) {
779 int x;
780 return x ? 1 : 0; // expected-warning{{Branch condition evaluates to a garbage value}}
781}
782
Ted Kremenek616cf052009-11-23 18:12:03 +0000783int test_uninit_branch_c(void) {
784 int x;
785 if ((short)x) // expected-warning{{Branch condition evaluates to a garbage value}}
786 return 1;
787 return 0;
788}
Ted Kremenek998c1332009-11-23 17:58:48 +0000789
790//===----------------------------------------------------------------------===//
Ted Kremenek64fa8582009-11-21 00:49:41 +0000791// Test passing an undefined value in a message or function call.
792//===----------------------------------------------------------------------===//
793
794void test_bad_call_aux(int x);
795void test_bad_call(void) {
796 int y;
797 test_bad_call_aux(y); // expected-warning{{Pass-by-value argument in function call is undefined}}
798}
799
800@interface TestBadArg {}
801- (void) testBadArg:(int) x;
802@end
803
804void test_bad_msg(TestBadArg *p) {
805 int y;
806 [p testBadArg:y]; // expected-warning{{Pass-by-value argument in message expression is undefined}}
807}
808
Ted Kremenekc213b482010-01-15 07:56:51 +0000809//===----------------------------------------------------------------------===//
810// PR 6033 - Test emitting the correct output in a warning where we use '%'
811// with operands that are undefined.
812//===----------------------------------------------------------------------===//
813
814int pr6033(int x) {
815 int y;
816 return x % y; // expected-warning{{The right operand of '%' is a garbage value}}
817}
818
Zhongxing Xu45eb4062010-01-19 12:11:55 +0000819struct trie {
820 struct trie* next;
821};
822
823struct kwset {
824 struct trie *trie;
825 unsigned char delta[10];
826 struct trie* next[10];
827 int d;
828};
829
830typedef struct trie trie_t;
831typedef struct kwset kwset_t;
832
833void f(kwset_t *kws, char const *p, char const *q) {
834 struct trie const *trie;
835 struct trie * const *next = kws->next;
836 register unsigned char c;
837 register char const *end = p;
838 register char const *lim = q;
839 register int d = 1;
840 register unsigned char const *delta = kws->delta;
841
842 d = delta[c = (end+=d)[-1]]; // no-warning
843 trie = next[c];
844}
Ted Kremenek61e8e1b2010-02-02 02:01:51 +0000845
846//===----------------------------------------------------------------------===//
847// <rdar://problem/7593875> When handling sizeof(VLA) it leads to a hole in
848// the ExplodedGraph (causing a false positive)
849//===----------------------------------------------------------------------===//
850
851int rdar_7593875_aux(int x);
852int rdar_7593875(int n) {
853 int z[n > 10 ? 10 : n]; // VLA.
854 int v;
855 v = rdar_7593875_aux(sizeof(z));
856 // Previously we got a false positive about 'v' being uninitialized.
857 return v; // no-warning
858}
Ted Kremenekf6817042010-02-02 21:11:40 +0000859
860//===----------------------------------------------------------------------===//
861// Handle casts from symbolic regions (packaged as integers) to doubles.
862// Previously this caused an assertion failure.
863//===----------------------------------------------------------------------===//
864
865void *foo_rev95119();
866void baz_rev95119(double x);
867void bar_rev95119() {
868 // foo_rev95119() returns a symbolic pointer. It is then
869 // cast to an int which is then cast to a double.
870 int value = (int) foo_rev95119();
871 baz_rev95119((double)value);
872}
873
Ted Kremenek5b290652010-02-03 04:16:00 +0000874//===----------------------------------------------------------------------===//
875// Handle loading a symbolic pointer from a symbolic region that was
876// invalidated by a call to an unknown function.
877//===----------------------------------------------------------------------===//
878
879void bar_rev95192(int **x);
880void foo_rev95192(int **x) {
881 *x = 0;
882 bar_rev95192(x);
883 // Not a null dereference.
884 **x = 1; // no-warning
885}
886
Ted Kremenek40c37e12010-02-04 00:47:48 +0000887//===----------------------------------------------------------------------===//
888// Handle casts of a function to a function pointer with a different return
889// value. We don't yet emit an error for such cases, but we now we at least
890// don't crash when the return value gets interpreted in a way that
891// violates our invariants.
892//===----------------------------------------------------------------------===//
893
894void *foo_rev95267();
895int bar_rev95267() {
896 char (*Callback_rev95267)(void) = (char (*)(void)) foo_rev95267;
897 if ((*Callback_rev95267)() == (char) 0)
898 return 1;
899 return 0;
900}
Ted Kremenek95a01122010-02-04 04:18:55 +0000901
902// Same as previous case, but handle casts to 'void'.
903int bar_rev95274() {
904 void (*Callback_rev95274)(void) = (void (*)(void)) foo_rev95267;
905 (*Callback_rev95274)();
906 return 0;
907}
908
Ted Kremenek4dc15662010-02-06 03:57:59 +0000909void rdar7582031_test_static_init_zero() {
910 static unsigned x;
911 if (x == 0)
912 return;
913 int *p = 0;
914 *p = 0xDEADBEEF;
915}
Ted Kremenek81861ab2010-02-06 04:04:46 +0000916void rdar7582031_test_static_init_zero_b() {
917 static void* x;
918 if (x == 0)
919 return;
920 int *p = 0;
921 *p = 0xDEADBEEF;
922}
Ted Kremenek8ec4aac2010-02-09 19:11:53 +0000923
924//===----------------------------------------------------------------------===//
925// Test handling of parameters that are structs that contain floats and //
926// nested fields. //
927//===----------------------------------------------------------------------===//
928
929struct s_rev95547_nested { float x, y; };
930struct s_rev95547 {
931 struct s_rev95547_nested z1;
932 struct s_rev95547_nested z2;
933};
934float foo_rev95547(struct s_rev95547 w) {
935 return w.z1.x + 20.0; // no-warning
936}
937void foo_rev95547_b(struct s_rev95547 w) {
938 struct s_rev95547 w2 = w;
939 w2.z1.x += 20.0; // no-warning
940}
Ted Kremenek862b24f2010-04-29 01:10:26 +0000941
942//===----------------------------------------------------------------------===//
943// Test handling statement expressions that don't populate a CFG block that
944// is used to represent the computation of the RHS of a logical operator.
945// This previously triggered a crash.
946//===----------------------------------------------------------------------===//
947
948void pr6938() {
949 if (1 && ({
950 while (0);
951 0;
952 }) == 0) {
953 }
954}
955
956void pr6938_b() {
957 if (1 && *({ // expected-warning{{Dereference of null pointer}}
958 while (0) {}
959 ({
960 (int *) 0;
961 });
962 }) == 0) {
963 }
964}
Ted Kremenekfadebba2010-05-13 16:38:08 +0000965
966//===----------------------------------------------------------------------===//
967// <rdar://problem/7979430> - The CFG for code containing an empty
968// @synchronized block was previously broken (and would crash the analyzer).
969//===----------------------------------------------------------------------===//
970
971void r7979430(id x) {
972 @synchronized(x) {}
973}
974
Ted Kremenekfcd783d2010-06-15 00:55:40 +0000975//===----------------------------------------------------------------------===
976// PR 7361 - Test that functions wrapped in macro instantiations are analyzed.
977//===----------------------------------------------------------------------===
978#define MAKE_TEST_FN() \
979 void test_pr7361 (char a) {\
980 char* b = 0x0; *b = a;\
981 }
982
983MAKE_TEST_FN() // expected-warning{{null pointer}}
984
Jordy Rose5ca129c2010-06-27 01:20:56 +0000985//===----------------------------------------------------------------------===
986// PR 7491 - Test that symbolic expressions can be used as conditions.
987//===----------------------------------------------------------------------===
988
989void pr7491 () {
990 extern int getint();
991 int a = getint()-1;
992 if (a) {
993 return;
994 }
995 if (!a) {
996 return;
997 } else {
998 // Should be unreachable
999 (void)*(char*)0; // no-warning
1000 }
1001}
1002
Ted Kremenekdcee3ce2010-07-01 20:16:50 +00001003//===----------------------------------------------------------------------===
1004// PR 7475 - Test that assumptions about global variables are reset after
1005// calling a global function.
1006//===----------------------------------------------------------------------===
1007
1008int *pr7475_someGlobal;
1009void pr7475_setUpGlobal();
1010
1011void pr7475() {
1012 if (pr7475_someGlobal == 0)
1013 pr7475_setUpGlobal();
1014 *pr7475_someGlobal = 0; // no-warning
1015}
1016
1017void pr7475_warn() {
1018 static int *someStatic = 0;
1019 if (someStatic == 0)
1020 pr7475_setUpGlobal();
1021 *someStatic = 0; // expected-warning{{null pointer}}
1022}
1023
Ted Kremenekcb077882010-07-17 01:28:55 +00001024// <rdar://problem/8202272> - __imag passed non-complex should not crash
1025float f0(_Complex float x) {
1026 float l0 = __real x;
1027 return __real l0 + __imag l0;
1028}
1029
Jordy Rosea277e772010-08-09 20:31:57 +00001030
1031//===----------------------------------------------------------------------===
1032// Test that we can reduce symbols to constants whether they are on the left
1033// or right side of an expression.
1034//===----------------------------------------------------------------------===
1035
1036void reduce_to_constant(int x, int y) {
1037 if (x != 20)
1038 return;
1039
1040 int a = x + y;
1041 int b = y + x;
1042
1043 if (y == -20 && a != 0)
1044 (void)*(char*)0; // no-warning
1045 if (y == -20 && b != 0)
1046 (void)*(char*)0; // no-warning
1047}