forked from OSchip/llvm-project
241 lines
6.8 KiB
C
241 lines
6.8 KiB
C
// RUN: %clang_cc1 -analyze -analyzer-checker=core.experimental.CString -analyzer-checker=core.experimental.UnreachableCode -analyzer-check-objc-mem -analyzer-store=region -verify %s
|
|
// RUN: %clang_cc1 -analyze -DUSE_BUILTINS -analyzer-checker=core.experimental.CString -analyzer-checker=core.experimental.UnreachableCode -analyzer-check-objc-mem -analyzer-store=region -verify %s
|
|
// RUN: %clang_cc1 -analyze -DVARIANT -analyzer-checker=core.experimental.CString -analyzer-checker=core.experimental.UnreachableCode -analyzer-check-objc-mem -analyzer-store=region -verify %s
|
|
// RUN: %clang_cc1 -analyze -DUSE_BUILTINS -DVARIANT -analyzer-checker=core.experimental.CString -analyzer-checker=core.experimental.UnreachableCode -analyzer-check-objc-mem -analyzer-store=region -verify %s
|
|
|
|
//===----------------------------------------------------------------------===
|
|
// Declarations
|
|
//===----------------------------------------------------------------------===
|
|
|
|
// Some functions are so similar to each other that they follow the same code
|
|
// path, such as memcpy and __memcpy_chk, or memcmp and bcmp. If VARIANT is
|
|
// defined, make sure to use the variants instead to make sure they are still
|
|
// checked by the analyzer.
|
|
|
|
// Some functions are implemented as builtins. These should be #defined as
|
|
// BUILTIN(f), which will prepend "__builtin_" if USE_BUILTINS is defined.
|
|
|
|
// Functions that have variants and are also availabe as builtins should be
|
|
// declared carefully! See memcpy() for an example.
|
|
|
|
#ifdef USE_BUILTINS
|
|
# define BUILTIN(f) __builtin_ ## f
|
|
#else /* USE_BUILTINS */
|
|
# define BUILTIN(f) f
|
|
#endif /* USE_BUILTINS */
|
|
|
|
#define NULL 0
|
|
typedef typeof(sizeof(int)) size_t;
|
|
|
|
//===----------------------------------------------------------------------===
|
|
// strlen()
|
|
//===----------------------------------------------------------------------===
|
|
|
|
#define strlen BUILTIN(strlen)
|
|
size_t strlen(const char *s);
|
|
|
|
void strlen_constant0() {
|
|
if (strlen("123") != 3)
|
|
(void)*(char*)0; // no-warning
|
|
}
|
|
|
|
void strlen_constant1() {
|
|
const char *a = "123";
|
|
if (strlen(a) != 3)
|
|
(void)*(char*)0; // no-warning
|
|
}
|
|
|
|
void strlen_constant2(char x) {
|
|
char a[] = "123";
|
|
if (strlen(a) != 3)
|
|
(void)*(char*)0; // no-warning
|
|
a[0] = x;
|
|
if (strlen(a) != 3)
|
|
(void)*(char*)0; // expected-warning{{null}}
|
|
}
|
|
|
|
size_t strlen_null() {
|
|
return strlen(0); // expected-warning{{Null pointer argument in call to byte string function}}
|
|
}
|
|
|
|
size_t strlen_fn() {
|
|
return strlen((char*)&strlen_fn); // expected-warning{{Argument to byte string function is the address of the function 'strlen_fn', which is not a null-terminated string}}
|
|
}
|
|
|
|
size_t strlen_nonloc() {
|
|
label:
|
|
return strlen((char*)&&label); // expected-warning{{Argument to byte string function is the address of the label 'label', which is not a null-terminated string}}
|
|
}
|
|
|
|
void strlen_subregion() {
|
|
struct two_strings { char a[2], b[2] };
|
|
extern void use_two_strings(struct two_strings *);
|
|
|
|
struct two_strings z;
|
|
use_two_strings(&z);
|
|
|
|
size_t a = strlen(z.a);
|
|
z.b[0] = 5;
|
|
size_t b = strlen(z.a);
|
|
if (a == 0 && b != 0)
|
|
(void)*(char*)0; // expected-warning{{never executed}}
|
|
|
|
use_two_strings(&z);
|
|
|
|
size_t c = strlen(z.a);
|
|
if (a == 0 && c != 0)
|
|
(void)*(char*)0; // expected-warning{{null}}
|
|
}
|
|
|
|
extern void use_string(char *);
|
|
void strlen_argument(char *x) {
|
|
size_t a = strlen(x);
|
|
size_t b = strlen(x);
|
|
if (a == 0 && b != 0)
|
|
(void)*(char*)0; // expected-warning{{never executed}}
|
|
|
|
use_string(x);
|
|
|
|
size_t c = strlen(x);
|
|
if (a == 0 && c != 0)
|
|
(void)*(char*)0; // expected-warning{{null}}
|
|
}
|
|
|
|
extern char global_str[];
|
|
void strlen_global() {
|
|
size_t a = strlen(global_str);
|
|
size_t b = strlen(global_str);
|
|
if (a == 0 && b != 0)
|
|
(void)*(char*)0; // expected-warning{{never executed}}
|
|
|
|
// Call a function with unknown effects, which should invalidate globals.
|
|
use_string(0);
|
|
|
|
size_t c = strlen(global_str);
|
|
if (a == 0 && c != 0)
|
|
(void)*(char*)0; // expected-warning{{null}}
|
|
}
|
|
|
|
void strlen_indirect(char *x) {
|
|
size_t a = strlen(x);
|
|
char *p = x;
|
|
char **p2 = &p;
|
|
size_t b = strlen(x);
|
|
if (a == 0 && b != 0)
|
|
(void)*(char*)0; // expected-warning{{never executed}}
|
|
|
|
extern void use_string_ptr(char*const*);
|
|
use_string_ptr(p2);
|
|
|
|
size_t c = strlen(x);
|
|
if (a == 0 && c != 0)
|
|
(void)*(char*)0; // expected-warning{{null}}
|
|
}
|
|
|
|
void strlen_liveness(const char *x) {
|
|
if (strlen(x) < 5)
|
|
return;
|
|
if (strlen(x) < 5)
|
|
(void)*(char*)0; // no-warning
|
|
}
|
|
|
|
//===----------------------------------------------------------------------===
|
|
// strcpy()
|
|
//===----------------------------------------------------------------------===
|
|
|
|
#ifdef VARIANT
|
|
|
|
#define __strcpy_chk BUILTIN(__strcpy_chk)
|
|
char *__strcpy_chk(char *restrict s1, const char *restrict s2, size_t destlen);
|
|
|
|
#define strcpy(a,b) __strcpy_chk(a,b,(size_t)-1)
|
|
|
|
#else /* VARIANT */
|
|
|
|
#define strcpy BUILTIN(strcpy)
|
|
char *strcpy(char *restrict s1, const char *restrict s2);
|
|
|
|
#endif /* VARIANT */
|
|
|
|
|
|
void strcpy_null_dst(char *x) {
|
|
strcpy(NULL, x); // expected-warning{{Null pointer argument in call to byte string function}}
|
|
}
|
|
|
|
void strcpy_null_src(char *x) {
|
|
strcpy(x, NULL); // expected-warning{{Null pointer argument in call to byte string function}}
|
|
}
|
|
|
|
void strcpy_fn(char *x) {
|
|
strcpy(x, (char*)&strcpy_fn); // expected-warning{{Argument to byte string function is the address of the function 'strcpy_fn', which is not a null-terminated string}}
|
|
}
|
|
|
|
void strcpy_effects(char *x, char *y) {
|
|
char a = x[0];
|
|
|
|
if (strcpy(x, y) != x)
|
|
(void)*(char*)0; // no-warning
|
|
|
|
if (strlen(x) != strlen(y))
|
|
(void)*(char*)0; // no-warning
|
|
|
|
if (a != x[0])
|
|
(void)*(char*)0; // expected-warning{{null}}
|
|
}
|
|
|
|
void strcpy_overflow(char *y) {
|
|
char x[4];
|
|
if (strlen(y) == 4)
|
|
strcpy(x, y); // expected-warning{{Byte string function overflows destination buffer}}
|
|
}
|
|
|
|
void strcpy_no_overflow(char *y) {
|
|
char x[4];
|
|
if (strlen(y) == 3)
|
|
strcpy(x, y); // no-warning
|
|
}
|
|
|
|
//===----------------------------------------------------------------------===
|
|
// stpcpy()
|
|
//===----------------------------------------------------------------------===
|
|
|
|
#ifdef VARIANT
|
|
|
|
#define __stpcpy_chk BUILTIN(__stpcpy_chk)
|
|
char *__stpcpy_chk(char *restrict s1, const char *restrict s2, size_t destlen);
|
|
|
|
#define stpcpy(a,b) __stpcpy_chk(a,b,(size_t)-1)
|
|
|
|
#else /* VARIANT */
|
|
|
|
#define stpcpy BUILTIN(stpcpy)
|
|
char *stpcpy(char *restrict s1, const char *restrict s2);
|
|
|
|
#endif /* VARIANT */
|
|
|
|
|
|
void stpcpy_effect(char *x, char *y) {
|
|
char a = x[0];
|
|
|
|
if (stpcpy(x, y) != &x[strlen(y)])
|
|
(void)*(char*)0; // no-warning
|
|
|
|
if (strlen(x) != strlen(y))
|
|
(void)*(char*)0; // no-warning
|
|
|
|
if (a != x[0])
|
|
(void)*(char*)0; // expected-warning{{null}}
|
|
}
|
|
|
|
void stpcpy_overflow(char *y) {
|
|
char x[4];
|
|
if (strlen(y) == 4)
|
|
stpcpy(x, y); // expected-warning{{Byte string function overflows destination buffer}}
|
|
}
|
|
|
|
void stpcpy_no_overflow(char *y) {
|
|
char x[4];
|
|
if (strlen(y) == 3)
|
|
stpcpy(x, y); // no-warning
|
|
}
|