File: null-deref-static.m

package info (click to toggle)
llvm-toolchain-14 1%3A14.0.6-16
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 1,496,368 kB
  • sloc: cpp: 5,593,980; ansic: 986,873; asm: 585,869; python: 184,223; objc: 72,530; lisp: 31,119; f90: 27,793; javascript: 9,780; pascal: 9,762; sh: 9,482; perl: 7,468; ml: 5,432; awk: 3,523; makefile: 2,547; xml: 953; cs: 573; fortran: 567
file content (35 lines) | stat: -rw-r--r-- 913 bytes parent folder | download | duplicates (16)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
// RUN: %clang_cc1 -w -fblocks -analyze -analyzer-checker=core,deadcode,alpha.core,debug.ExprInspection -verify %s

void *malloc(unsigned long);
void clang_analyzer_warnIfReached();

void test_static_from_block() {
  static int *x;
  ^{
    *x; // no-warning
  };
}

void test_static_within_block() {
  ^{
    static int *x;
    *x; // expected-warning{{Dereference of null pointer}}
  };
}

void test_static_control_flow(int y) {
  static int *x;
  if (x) {
    // FIXME: Should be reachable.
    clang_analyzer_warnIfReached(); // no-warning
  }
  if (y) {
    // We are not sure if this branch is possible, because the developer
    // may argue that function is always called with y == 1 for the first time.
    // In this case, we can only advise the developer to add assertions
    // for suppressing such path.
    *x; // expected-warning{{Dereference of null pointer}}
  } else {
    x = malloc(1);
  }
}