f4a2713ac8
Change-Id: Ia40e9ffdf29b5dab2f122f673ff6802a58bc690f
113 lines
3.5 KiB
C
113 lines
3.5 KiB
C
// RUN: %clang_cc1 -analyze -analyzer-checker=core,unix.cstring,debug.ExprInspection -analyzer-store=region -verify %s
|
|
// RUN: %clang_cc1 -analyze -DUSE_BUILTINS -analyzer-checker=core,unix.cstring,debug.ExprInspection -analyzer-store=region -verify %s
|
|
// XFAIL: *
|
|
|
|
// This file is for tests that may eventually go into string.c, or may be
|
|
// deleted outright. At one point these tests passed, but only because we
|
|
// weren't correctly modelling the behavior of the relevant string functions.
|
|
// The tests aren't incorrect, but require the analyzer to be smarter about
|
|
// conjured values than it currently is.
|
|
|
|
//===----------------------------------------------------------------------===
|
|
// Declarations
|
|
//===----------------------------------------------------------------------===
|
|
|
|
// Some functions are so similar to each other that they follow the same code
|
|
// path, such as memcpy and __memcpy_chk, or memcmp and bcmp. If VARIANT is
|
|
// defined, make sure to use the variants instead to make sure they are still
|
|
// checked by the analyzer.
|
|
|
|
// Some functions are implemented as builtins. These should be #defined as
|
|
// BUILTIN(f), which will prepend "__builtin_" if USE_BUILTINS is defined.
|
|
|
|
// Functions that have variants and are also available as builtins should be
|
|
// declared carefully! See memcpy() for an example.
|
|
|
|
#ifdef USE_BUILTINS
|
|
# define BUILTIN(f) __builtin_ ## f
|
|
#else /* USE_BUILTINS */
|
|
# define BUILTIN(f) f
|
|
#endif /* USE_BUILTINS */
|
|
|
|
#define NULL 0
|
|
typedef typeof(sizeof(int)) size_t;
|
|
|
|
void clang_analyzer_eval(int);
|
|
|
|
//===----------------------------------------------------------------------===
|
|
// strnlen()
|
|
//===----------------------------------------------------------------------===
|
|
|
|
#define strnlen BUILTIN(strnlen)
|
|
size_t strnlen(const char *s, size_t maxlen);
|
|
|
|
void strnlen_liveness(const char *x) {
|
|
if (strnlen(x, 10) < 5)
|
|
return;
|
|
clang_analyzer_eval(strnlen(x, 10) < 5); // expected-warning{{FALSE}}
|
|
}
|
|
|
|
void strnlen_subregion() {
|
|
struct two_stringsn { char a[2], b[2]; };
|
|
extern void use_two_stringsn(struct two_stringsn *);
|
|
|
|
struct two_stringsn z;
|
|
use_two_stringsn(&z);
|
|
|
|
size_t a = strnlen(z.a, 10);
|
|
z.b[0] = 5;
|
|
size_t b = strnlen(z.a, 10);
|
|
if (a == 0)
|
|
clang_analyzer_eval(b == 0); // expected-warning{{TRUE}}
|
|
|
|
use_two_stringsn(&z);
|
|
|
|
size_t c = strnlen(z.a, 10);
|
|
if (a == 0)
|
|
clang_analyzer_eval(c == 0); // expected-warning{{UNKNOWN}}
|
|
}
|
|
|
|
extern void use_stringn(char *);
|
|
void strnlen_argument(char *x) {
|
|
size_t a = strnlen(x, 10);
|
|
size_t b = strnlen(x, 10);
|
|
if (a == 0)
|
|
clang_analyzer_eval(b == 0); // expected-warning{{TRUE}}
|
|
|
|
use_stringn(x);
|
|
|
|
size_t c = strnlen(x, 10);
|
|
if (a == 0)
|
|
clang_analyzer_eval(c == 0); // expected-warning{{UNKNOWN}}
|
|
}
|
|
|
|
extern char global_strn[];
|
|
void strnlen_global() {
|
|
size_t a = strnlen(global_strn, 10);
|
|
size_t b = strnlen(global_strn, 10);
|
|
if (a == 0)
|
|
clang_analyzer_eval(b == 0); // expected-warning{{TRUE}}
|
|
|
|
// Call a function with unknown effects, which should invalidate globals.
|
|
use_stringn(0);
|
|
|
|
size_t c = strnlen(global_strn, 10);
|
|
if (a == 0)
|
|
clang_analyzer_eval(c == 0); // expected-warning{{UNKNOWN}}
|
|
}
|
|
|
|
void strnlen_indirect(char *x) {
|
|
size_t a = strnlen(x, 10);
|
|
char *p = x;
|
|
char **p2 = &p;
|
|
size_t b = strnlen(x, 10);
|
|
if (a == 0)
|
|
clang_analyzer_eval(b == 0); // expected-warning{{TRUE}}
|
|
|
|
extern void use_stringn_ptr(char*const*);
|
|
use_stringn_ptr(p2);
|
|
|
|
size_t c = strnlen(x, 10);
|
|
if (a == 0)
|
|
clang_analyzer_eval(c == 0); // expected-warning{{UNKNOWN}}
|
|
}
|