1// RUN: %clang_cc1 -analyze -analyzer-checker=core,debug.ExprInspection -verify -w -std=c++03 %s 2// RUN: %clang_cc1 -analyze -analyzer-checker=core,debug.ExprInspection -verify -w -std=c++11 %s 3// RUN: %clang_cc1 -analyze -analyzer-checker=core,debug.ExprInspection -DTEMPORARY_DTORS -verify -w -analyzer-config cfg-temporary-dtors=true %s -std=c++11 4 5extern bool clang_analyzer_eval(bool); 6extern bool clang_analyzer_warnIfReached(); 7 8struct Trivial { 9 Trivial(int x) : value(x) {} 10 int value; 11}; 12 13struct NonTrivial : public Trivial { 14 NonTrivial(int x) : Trivial(x) {} 15 ~NonTrivial(); 16}; 17 18 19Trivial getTrivial() { 20 return Trivial(42); // no-warning 21} 22 23const Trivial &getTrivialRef() { 24 return Trivial(42); // expected-warning {{Address of stack memory associated with temporary object of type 'Trivial' returned to caller}} 25} 26 27 28NonTrivial getNonTrivial() { 29 return NonTrivial(42); // no-warning 30} 31 32const NonTrivial &getNonTrivialRef() { 33 return NonTrivial(42); // expected-warning {{Address of stack memory associated with temporary object of type 'NonTrivial' returned to caller}} 34} 35 36namespace rdar13265460 { 37 struct TrivialSubclass : public Trivial { 38 TrivialSubclass(int x) : Trivial(x), anotherValue(-x) {} 39 int anotherValue; 40 }; 41 42 TrivialSubclass getTrivialSub() { 43 TrivialSubclass obj(1); 44 obj.value = 42; 45 obj.anotherValue = -42; 46 return obj; 47 } 48 49 void testImmediate() { 50 TrivialSubclass obj = getTrivialSub(); 51 52 clang_analyzer_eval(obj.value == 42); // expected-warning{{TRUE}} 53 clang_analyzer_eval(obj.anotherValue == -42); // expected-warning{{TRUE}} 54 55 clang_analyzer_eval(getTrivialSub().value == 42); // expected-warning{{TRUE}} 56 clang_analyzer_eval(getTrivialSub().anotherValue == -42); // expected-warning{{TRUE}} 57 } 58 59 void testMaterializeTemporaryExpr() { 60 const TrivialSubclass &ref = getTrivialSub(); 61 clang_analyzer_eval(ref.value == 42); // expected-warning{{TRUE}} 62 63 const Trivial &baseRef = getTrivialSub(); 64 clang_analyzer_eval(baseRef.value == 42); // expected-warning{{TRUE}} 65 } 66} 67 68namespace rdar13281951 { 69 struct Derived : public Trivial { 70 Derived(int value) : Trivial(value), value2(-value) {} 71 int value2; 72 }; 73 74 void test() { 75 Derived obj(1); 76 obj.value = 42; 77 const Trivial * const &pointerRef = &obj; 78 clang_analyzer_eval(pointerRef->value == 42); // expected-warning{{TRUE}} 79 } 80} 81 82namespace compound_literals { 83 struct POD { 84 int x, y; 85 }; 86 struct HasCtor { 87 HasCtor(int x, int y) : x(x), y(y) {} 88 int x, y; 89 }; 90 struct HasDtor { 91 int x, y; 92 ~HasDtor(); 93 }; 94 struct HasCtorDtor { 95 HasCtorDtor(int x, int y) : x(x), y(y) {} 96 ~HasCtorDtor(); 97 int x, y; 98 }; 99 100 void test() { 101 clang_analyzer_eval(((POD){1, 42}).y == 42); // expected-warning{{TRUE}} 102 clang_analyzer_eval(((HasDtor){1, 42}).y == 42); // expected-warning{{TRUE}} 103 104#if __cplusplus >= 201103L 105 clang_analyzer_eval(((HasCtor){1, 42}).y == 42); // expected-warning{{TRUE}} 106 107 // FIXME: should be TRUE, but we don't inline the constructors of 108 // temporaries because we can't model their destructors yet. 109 clang_analyzer_eval(((HasCtorDtor){1, 42}).y == 42); // expected-warning{{UNKNOWN}} 110#endif 111 } 112} 113 114namespace destructors { 115 struct Dtor { 116 ~Dtor(); 117 }; 118 extern bool coin(); 119 extern bool check(const Dtor &); 120 121 void testPR16664andPR18159Crash() { 122 // Regression test: we used to assert here when tmp dtors are enabled. 123 // PR16664 and PR18159 124 if (coin() && (coin() || coin() || check(Dtor()))) { 125 Dtor(); 126 } 127 } 128 129#ifdef TEMPORARY_DTORS 130 struct NoReturnDtor { 131 ~NoReturnDtor() __attribute__((noreturn)); 132 }; 133 134 void noReturnTemp(int *x) { 135 if (! x) NoReturnDtor(); 136 *x = 47; // no warning 137 } 138 139 void noReturnInline(int **x) { 140 NoReturnDtor(); 141 } 142 143 void callNoReturn() { 144 int *x; 145 noReturnInline(&x); 146 *x = 47; // no warning 147 } 148 149 extern bool check(const NoReturnDtor &); 150 151 void testConsistencyIf(int i) { 152 if (i != 5) 153 return; 154 if (i == 5 && (i == 4 || check(NoReturnDtor()) || i == 5)) { 155 clang_analyzer_eval(true); // no warning, unreachable code 156 } 157 } 158 159 void testConsistencyTernary(int i) { 160 (i == 5 && (i == 4 || check(NoReturnDtor()) || i == 5)) ? 1 : 0; 161 162 clang_analyzer_eval(true); // expected-warning{{TRUE}} 163 164 if (i != 5) 165 return; 166 167 (i == 5 && (i == 4 || check(NoReturnDtor()) || i == 5)) ? 1 : 0; 168 169 clang_analyzer_eval(true); // no warning, unreachable code 170 } 171 172 // Regression test: we used to assert here. 173 // PR16664 and PR18159 174 void testConsistencyNested(int i) { 175 extern bool compute(bool); 176 177 if (i == 5 && (i == 4 || i == 5 || check(NoReturnDtor()))) 178 clang_analyzer_eval(true); // expected-warning{{TRUE}} 179 180 if (i == 5 && (i == 4 || i == 5 || check(NoReturnDtor()))) 181 clang_analyzer_eval(true); // expected-warning{{TRUE}} 182 183 if (i != 5) 184 return; 185 186 if (compute(i == 5 && 187 (i == 4 || compute(true) || 188 compute(i == 5 && (i == 4 || check(NoReturnDtor()))))) || 189 i != 4) { 190 clang_analyzer_eval(true); // expected-warning{{TRUE}} 191 } 192 193 if (compute(i == 5 && 194 (i == 4 || i == 4 || 195 compute(i == 5 && (i == 4 || check(NoReturnDtor()))))) || 196 i != 4) { 197 clang_analyzer_eval(true); // no warning, unreachable code 198 } 199 } 200 201 // PR16664 and PR18159 202 void testConsistencyNestedSimple(bool value) { 203 if (value) { 204 if (!value || check(NoReturnDtor())) { 205 clang_analyzer_eval(true); // no warning, unreachable code 206 } 207 } 208 } 209 210 // PR16664 and PR18159 211 void testConsistencyNestedComplex(bool value) { 212 if (value) { 213 if (!value || !value || check(NoReturnDtor())) { 214 clang_analyzer_eval(true); // no warning, unreachable code 215 } 216 } 217 } 218 219 // PR16664 and PR18159 220 void testConsistencyNestedWarning(bool value) { 221 if (value) { 222 if (!value || value || check(NoReturnDtor())) { 223 clang_analyzer_eval(true); // expected-warning{{TRUE}} 224 } 225 } 226 } 227 // PR16664 and PR18159 228 void testConsistencyNestedComplexMidBranch(bool value) { 229 if (value) { 230 if (!value || !value || check(NoReturnDtor()) || value) { 231 clang_analyzer_eval(true); // no warning, unreachable code 232 } 233 } 234 } 235 236 // PR16664 and PR18159 237 void testConsistencyNestedComplexNestedBranch(bool value) { 238 if (value) { 239 if (!value || (!value || check(NoReturnDtor()) || value)) { 240 clang_analyzer_eval(true); // no warning, unreachable code 241 } 242 } 243 } 244 245 // PR16664 and PR18159 246 void testConsistencyNestedVariableModification(bool value) { 247 bool other = true; 248 if (value) { 249 if (!other || !value || (other = false) || check(NoReturnDtor()) || 250 !other) { 251 clang_analyzer_eval(true); // no warning, unreachable code 252 } 253 } 254 } 255 256 void testTernaryNoReturnTrueBranch(bool value) { 257 if (value) { 258 bool b = value && (value ? check(NoReturnDtor()) : true); 259 clang_analyzer_eval(true); // no warning, unreachable code 260 } 261 } 262 void testTernaryNoReturnFalseBranch(bool value) { 263 if (value) { 264 bool b = !value && !value ? true : check(NoReturnDtor()); 265 clang_analyzer_eval(true); // no warning, unreachable code 266 } 267 } 268 void testTernaryIgnoreNoreturnBranch(bool value) { 269 if (value) { 270 bool b = !value && !value ? check(NoReturnDtor()) : true; 271 clang_analyzer_eval(true); // expected-warning{{TRUE}} 272 } 273 } 274 void testTernaryTrueBranchReached(bool value) { 275 value ? clang_analyzer_warnIfReached() : // expected-warning{{REACHABLE}} 276 check(NoReturnDtor()); 277 } 278 void testTernaryFalseBranchReached(bool value) { 279 value ? check(NoReturnDtor()) : 280 clang_analyzer_warnIfReached(); // expected-warning{{REACHABLE}} 281 } 282 283 void testLoop() { 284 for (int i = 0; i < 10; ++i) { 285 if (i < 3 && (i >= 2 || check(NoReturnDtor()))) { 286 clang_analyzer_eval(true); // no warning, unreachable code 287 } 288 } 289 } 290 291 bool testRecursiveFrames(bool isInner) { 292 if (isInner || 293 (clang_analyzer_warnIfReached(), false) || // expected-warning{{REACHABLE}} 294 check(NoReturnDtor()) || 295 testRecursiveFrames(true)) { 296 clang_analyzer_warnIfReached(); // expected-warning{{REACHABLE}} 297 } 298 } 299 void testRecursiveFramesStart() { testRecursiveFrames(false); } 300 301 void testLambdas() { 302 []() { check(NoReturnDtor()); } != nullptr || check(Dtor()); 303 } 304 305 void testGnuExpressionStatements(int v) { 306 ({ ++v; v == 10 || check(NoReturnDtor()); v == 42; }) || v == 23; 307 clang_analyzer_warnIfReached(); // expected-warning{{REACHABLE}} 308 309 ({ ++v; check(NoReturnDtor()); v == 42; }) || v == 23; 310 clang_analyzer_warnIfReached(); // no warning, unreachable code 311 } 312 313 void testGnuExpressionStatementsDestructionPoint(int v) { 314 // In normal context, the temporary destructor runs at the end of the full 315 // statement, thus the last statement is reached. 316 (++v, check(NoReturnDtor()), v == 42), 317 clang_analyzer_warnIfReached(); // expected-warning{{REACHABLE}} 318 319 // GNU expression statements execute temporary destructors within the 320 // blocks, thus the last statement is not reached. 321 ({ ++v; check(NoReturnDtor()); v == 42; }), 322 clang_analyzer_warnIfReached(); // no warning, unreachable code 323 } 324 325 void testMultipleTemporaries(bool value) { 326 if (value) { 327 // FIXME: Find a way to verify construction order. 328 // ~Dtor should run before ~NoReturnDtor() because construction order is 329 // guaranteed by comma operator. 330 if (!value || check((NoReturnDtor(), Dtor())) || value) { 331 clang_analyzer_eval(true); // no warning, unreachable code 332 } 333 } 334 } 335 336 void testBinaryOperatorShortcut(bool value) { 337 if (value) { 338 if (false && false && check(NoReturnDtor()) && true) { 339 clang_analyzer_eval(true); 340 } 341 } 342 } 343 344 void testIfAtEndOfLoop() { 345 int y = 0; 346 while (true) { 347 if (y > 0) { 348 clang_analyzer_warnIfReached(); // expected-warning{{REACHABLE}} 349 } 350 ++y; 351 // Test that the CFG gets hooked up correctly when temporary destructors 352 // are handled after a statically known branch condition. 353 if (true) (void)0; else (void)check(NoReturnDtor()); 354 } 355 } 356 357 void testTernaryAtEndOfLoop() { 358 int y = 0; 359 while (true) { 360 if (y > 0) { 361 clang_analyzer_warnIfReached(); // expected-warning{{REACHABLE}} 362 } 363 ++y; 364 // Test that the CFG gets hooked up correctly when temporary destructors 365 // are handled after a statically known branch condition. 366 true ? (void)0 : (void)check(NoReturnDtor()); 367 } 368 } 369 370 void testNoReturnInComplexCondition() { 371 check(Dtor()) && 372 (check(NoReturnDtor()) || check(NoReturnDtor())) && check(Dtor()); 373 clang_analyzer_warnIfReached(); // expected-warning{{REACHABLE}} 374 } 375 376 void testSequencingOfConditionalTempDtors(bool b) { 377 b || (check(Dtor()), check(NoReturnDtor())); 378 clang_analyzer_warnIfReached(); // expected-warning{{REACHABLE}} 379 } 380 381 void testSequencingOfConditionalTempDtors2(bool b) { 382 (b || check(Dtor())), check(NoReturnDtor()); 383 clang_analyzer_warnIfReached(); // no warning, unreachable code 384 } 385 386 void testSequencingOfConditionalTempDtorsWithinBinaryOperators(bool b) { 387 b || (check(Dtor()) + check(NoReturnDtor())); 388 clang_analyzer_warnIfReached(); // expected-warning{{REACHABLE}} 389 } 390 391 void f(Dtor d = Dtor()); 392 void testDefaultParameters() { 393 f(); 394 } 395 396 struct DefaultParam { 397 DefaultParam(int, const Dtor& d = Dtor()); 398 ~DefaultParam(); 399 }; 400 void testDefaultParamConstructorsInLoops() { 401 while (true) { 402 // FIXME: This exact pattern triggers the temporary cleanup logic 403 // to fail when adding a 'clean' state. 404 DefaultParam(42); 405 DefaultParam(42); 406 } 407 } 408 void testDefaultParamConstructorsInTernariesInLoops(bool value) { 409 while (true) { 410 // FIXME: This exact pattern triggers the temporary cleanup logic 411 // to visit the bind-temporary logic with a state that already has that 412 // temporary marked as executed. 413 value ? DefaultParam(42) : DefaultParam(42); 414 } 415 } 416#endif // TEMPORARY_DTORS 417} 418 419void testStaticMaterializeTemporaryExpr() { 420 static const Trivial &ref = getTrivial(); 421 clang_analyzer_eval(ref.value == 42); // expected-warning{{TRUE}} 422 423 static const Trivial &directRef = Trivial(42); 424 clang_analyzer_eval(directRef.value == 42); // expected-warning{{TRUE}} 425 426#if __has_feature(cxx_thread_local) 427 thread_local static const Trivial &threadRef = getTrivial(); 428 clang_analyzer_eval(threadRef.value == 42); // expected-warning{{TRUE}} 429 430 thread_local static const Trivial &threadDirectRef = Trivial(42); 431 clang_analyzer_eval(threadDirectRef.value == 42); // expected-warning{{TRUE}} 432#endif 433} 434 435namespace PR16629 { 436 struct A { 437 explicit A(int* p_) : p(p_) {} 438 int* p; 439 }; 440 441 extern void escape(const A*[]); 442 extern void check(int); 443 444 void callEscape(const A& a) { 445 const A* args[] = { &a }; 446 escape(args); 447 } 448 449 void testNoWarning() { 450 int x; 451 callEscape(A(&x)); 452 check(x); // Analyzer used to give a "x is uninitialized warning" here 453 } 454 455 void set(const A*a[]) { 456 *a[0]->p = 47; 457 } 458 459 void callSet(const A& a) { 460 const A* args[] = { &a }; 461 set(args); 462 } 463 464 void testConsistency() { 465 int x; 466 callSet(A(&x)); 467 clang_analyzer_eval(x == 47); // expected-warning{{TRUE}} 468 } 469} 470