File: null-deref-static.m

package info (click to toggle)
llvm-toolchain-21 1%3A21.1.0-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 2,235,796 kB
  • sloc: cpp: 7,617,614; ansic: 1,433,901; asm: 1,058,726; python: 252,096; f90: 94,671; objc: 70,753; lisp: 42,813; pascal: 18,401; sh: 10,032; ml: 5,111; perl: 4,720; awk: 3,523; makefile: 3,401; javascript: 2,272; xml: 892; fortran: 770
file content (35 lines) | stat: -rw-r--r-- 924 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
// RUN: %clang_analyze_cc1 -w -fblocks -analyzer-checker=core,deadcode,alpha.core,debug.ExprInspection -verify %s

void *malloc(unsigned long);
void clang_analyzer_warnIfReached(void);

void test_static_from_block(void) {
  static int *x;
  ^{
    *x; // no-warning
  };
}

void test_static_within_block(void) {
  ^{
    static int *x;
    *x; // expected-warning{{Dereference of null pointer}}
  };
}

void test_static_control_flow(int y) {
  static int *x;
  if (x) {
    // FIXME: Should be reachable.
    clang_analyzer_warnIfReached(); // no-warning
  }
  if (y) {
    // We are not sure if this branch is possible, because the developer
    // may argue that function is always called with y == 1 for the first time.
    // In this case, we can only advise the developer to add assertions
    // for suppressing such path.
    *x; // expected-warning{{Dereference of null pointer}}
  } else {
    x = malloc(1);
  }
}