1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core,debug.ExprInspection -analyzer-store=region -analyzer-constraints=range -verify -Wno-null-dereference %s
2
3 void clang_analyzer_eval(bool);
4
5 typedef typeof(sizeof(int)) size_t;
6 void malloc (size_t);
7
f1()8 void f1() {
9 int const &i = 3;
10 int b = i;
11
12 int *p = 0;
13
14 if (b != 3)
15 *p = 1; // no-warning
16 }
17
18 char* ptr();
19 char& ref();
20
21 // These next two tests just shouldn't crash.
t1()22 char t1 () {
23 ref() = 'c';
24 return '0';
25 }
26
27 // just a sanity test, the same behavior as t1()
t2()28 char t2 () {
29 *ptr() = 'c';
30 return '0';
31 }
32
33 // Each of the tests below is repeated with pointers as well as references.
34 // This is mostly a sanity check, but then again, both should work!
t3()35 char t3 () {
36 char& r = ref();
37 r = 'c'; // no-warning
38 if (r) return r;
39 return *(char*)0; // no-warning
40 }
41
t4()42 char t4 () {
43 char* p = ptr();
44 *p = 'c'; // no-warning
45 if (*p) return *p;
46 return *(char*)0; // no-warning
47 }
48
t5(char & r)49 char t5 (char& r) {
50 r = 'c'; // no-warning
51 if (r) return r;
52 return *(char*)0; // no-warning
53 }
54
t6(char * p)55 char t6 (char* p) {
56 *p = 'c'; // no-warning
57 if (*p) return *p;
58 return *(char*)0; // no-warning
59 }
60
61
62 // PR13440 / <rdar://problem/11977113>
63 // Test that the array-to-pointer decay works for array references as well.
64 // More generally, when we want an lvalue for a reference field, we still need
65 // to do one level of load.
66 namespace PR13440 {
67 typedef int T[1];
68 struct S {
69 T &x;
70
mPR13440::S71 int *m() { return x; }
72 };
73
74 struct S2 {
75 int (&x)[1];
76
mPR13440::S277 int *m() { return x; }
78
testArrayToPointerDecayWithNonTypedValueRegionPR13440::S279 void testArrayToPointerDecayWithNonTypedValueRegion() {
80 int *p = x;
81 int *q = x;
82 clang_analyzer_eval(p[0] == q[0]); // expected-warning{{TRUE}}
83 }
84
85 };
86
test()87 void test() {
88 int a[1];
89 S s = { a };
90 S2 s2 = { a };
91
92 if (s.x != a) return;
93 if (s2.x != a) return;
94
95 a[0] = 42;
96 clang_analyzer_eval(s.x[0] == 42); // expected-warning{{TRUE}}
97 clang_analyzer_eval(s2.x[0] == 42); // expected-warning{{TRUE}}
98 }
99 }
100
testNullReference()101 void testNullReference() {
102 int *x = 0;
103 int &y = *x; // expected-warning{{Dereference of null pointer}}
104 y = 5;
105 }
106
testRetroactiveNullReference(int * x)107 void testRetroactiveNullReference(int *x) {
108 // According to the C++ standard, there is no such thing as a
109 // "null reference". So the 'if' statement ought to be dead code.
110 // However, Clang (and other compilers) don't actually check that a pointer
111 // value is non-null in the implementation of references, so it is possible
112 // to produce a supposed "null reference" at runtime. The analyzer should
113 // still warn when it can prove such errors.
114 int &y = *x;
115 if (x != 0)
116 return;
117 y = 5; // expected-warning{{Dereference of null pointer}}
118 }
119
testReferenceAddress(int & x)120 void testReferenceAddress(int &x) {
121 clang_analyzer_eval(&x != 0); // expected-warning{{TRUE}}
122 clang_analyzer_eval(&ref() != 0); // expected-warning{{TRUE}}
123
124 struct S { int &x; };
125
126 extern S getS();
127 clang_analyzer_eval(&getS().x != 0); // expected-warning{{TRUE}}
128
129 extern S *getSP();
130 clang_analyzer_eval(&getSP()->x != 0); // expected-warning{{TRUE}}
131 }
132
133
testFunctionPointerReturn(void * opaque)134 void testFunctionPointerReturn(void *opaque) {
135 typedef int &(*RefFn)();
136
137 RefFn getRef = (RefFn)opaque;
138
139 // Don't crash writing to or reading from this reference.
140 int &x = getRef();
141 x = 42;
142 clang_analyzer_eval(x == 42); // expected-warning{{TRUE}}
143 }
144
testReturnNullReference()145 int &testReturnNullReference() {
146 int *x = 0;
147 return *x; // expected-warning{{Returning null reference}}
148 }
149
refFromPointer()150 char &refFromPointer() {
151 return *ptr();
152 }
153
testReturnReference()154 void testReturnReference() {
155 clang_analyzer_eval(ptr() == 0); // expected-warning{{UNKNOWN}}
156 clang_analyzer_eval(&refFromPointer() == 0); // expected-warning{{FALSE}}
157 }
158
intRefParam(int & r)159 void intRefParam(int &r) {
160 ;
161 }
162
test(int * ptr)163 void test(int *ptr) {
164 clang_analyzer_eval(ptr == 0); // expected-warning{{UNKNOWN}}
165
166 extern void use(int &ref);
167 use(*ptr);
168
169 clang_analyzer_eval(ptr == 0); // expected-warning{{FALSE}}
170 }
171
testIntRefParam()172 void testIntRefParam() {
173 int i = 0;
174 intRefParam(i); // no-warning
175 }
176
refParam(int & byteIndex)177 int refParam(int &byteIndex) {
178 return byteIndex;
179 }
180
testRefParam(int * p)181 void testRefParam(int *p) {
182 if (p)
183 ;
184 refParam(*p); // expected-warning {{Forming reference to null pointer}}
185 }
186
ptrRefParam(int * & byteIndex)187 int ptrRefParam(int *&byteIndex) {
188 return *byteIndex; // expected-warning {{Dereference of null pointer}}
189 }
testRefParam2()190 void testRefParam2() {
191 int *p = 0;
192 int *&rp = p;
193 ptrRefParam(rp);
194 }
195
maybeNull()196 int *maybeNull() {
197 extern bool coin();
198 static int x;
199 return coin() ? &x : 0;
200 }
201
use(int & x)202 void use(int &x) {
203 x = 1; // no-warning
204 }
205
testSuppression()206 void testSuppression() {
207 use(*maybeNull());
208 }
209
210 namespace rdar11212286 {
211 class B{};
212
test()213 B test() {
214 B *x = 0;
215 return *x; // expected-warning {{Forming reference to null pointer}}
216 }
217
testif(B * x)218 B testif(B *x) {
219 if (x)
220 ;
221 return *x; // expected-warning {{Forming reference to null pointer}}
222 }
223
idc(B * x)224 void idc(B *x) {
225 if (x)
226 ;
227 }
228
testidc(B * x)229 B testidc(B *x) {
230 idc(x);
231 return *x; // no-warning
232 }
233 }
234
235 namespace PR15694 {
236 class C {
237 bool bit : 1;
bar(const T & obj)238 template <class T> void bar(const T &obj) {}
foo()239 void foo() {
240 bar(bit); // don't crash
241 }
242 };
243 }
244