================
@@ -1,130 +0,0 @@
-// RUN: %clang_analyze_cc1 -Wno-array-bounds -verify %s \
-// RUN:   -analyzer-checker=core \
-// RUN:   -analyzer-checker=unix \
-// RUN:   -analyzer-checker=security.ArrayBound \
-// RUN:   -analyzer-config unix.DynamicMemoryModeling:Optimistic=true
-
-typedef __typeof(sizeof(int)) size_t;
-void *malloc(size_t);
-void *calloc(size_t, size_t);
-
-char f1(void) {
-  char* s = "abcd";
-  char c = s[4]; // no-warning
-  return s[5] + c; // expected-warning{{Out of bound access to memory after}}
-}
-
-void f2(void) {
-  int *p = malloc(12);
-  p[3] = 4; // expected-warning{{Out of bound access to memory after}}
-}
-
-struct three_words {
-  int c[3];
-};
-
-struct seven_words {
-  int c[7];
-};
-
-void f3(void) {
-  struct three_words a, *p;
-  p = &a;
-  p[0] = a; // no-warning
-  p[1] = a; // expected-warning{{Out of bound access to memory after}}
-}
-
-void f4(void) {
-  struct seven_words c;
-  struct three_words a, *p = (struct three_words *)&c;
-  p[0] = a; // no-warning
-  p[1] = a; // no-warning
-  p[2] = a; // should warn
-  // FIXME: This is an overflow, but currently security.ArrayBound only checks
-  // that the _beginning_ of the accessed element is within bounds.
-}
-
-void f5(void) {
-  char *p = calloc(2,2);
-  p[3] = '.'; // no-warning
-  p[4] = '!'; // expected-warning{{Out of bound access}}
-}
-
-void f6(void) {
-  char a[2];
-  int *b = (int*)a;
-  b[1] = 3; // expected-warning{{Out of bound access}}
-}
-
-void f7(void) {
-  struct three_words a;
-  a.c[3] = 1; // expected-warning{{Out of bound access}}
-}
-
-void vla(int a) {
-  if (a == 5) {
-    int x[a];
-    x[4] = 4; // no-warning
-    x[5] = 5; // expected-warning{{Out of bound access}}
-  }
-}
-
-void alloca_region(int a) {
-  if (a == 5) {
-    char *x = __builtin_alloca(a);
-    x[4] = 4; // no-warning
-    x[5] = 5; // expected-warning{{Out of bound access}}
-  }
-}
-
-int symbolic_index(int a) {
-  int x[2] = {1, 2};
-  if (a == 2) {
-    return x[a]; // expected-warning{{Out of bound access}}
-  }
-  return 0;
-}
-
-int symbolic_index2(int a) {
-  int x[2] = {1, 2};
-  if (a < 0) {
-    return x[a]; // expected-warning{{Out of bound access}}
-  }
-  return 0;
-}
-
-int overflow_binary_search(double in) {
-  int eee = 16;
-  if (in < 1e-8 || in > 1e23) {
-    return 0;
-  } else {
-    static const double ins[] = {1e-8, 1e-7, 1e-6, 1e-5, 1e-4, 1e-3, 1e-2, 
1e-1,
-                                 1e0, 1e1, 1e2, 1e3, 1e4, 1e5, 1e6, 1e7,
-                                 1e8, 1e9, 1e10, 1e11, 1e12, 1e13, 1e14, 1e15,
-                                 1e16, 1e17, 1e18, 1e19, 1e20, 1e21, 1e22};
-    if (in < ins[eee]) {
-      eee -= 8;
-    } else {
-      eee += 8;
-    }
-    if (in < ins[eee]) {
-      eee -= 4;
-    } else {
-      eee += 4;
-    }
-    if (in < ins[eee]) {
-      eee -= 2;
-    } else {
-      eee += 2;
-    }
-    if (in < ins[eee]) {
-      eee -= 1;
-    } else {
-      eee += 1;
-    }
-    if (in < ins[eee]) { // expected-warning {{Out of bound access}}
-      eee -= 1;
-    }
-  }
-  return eee;
-}
----------------
NagyDonat wrote:

This test case is long and convoluted, but does not provide anything 
interesting from the point of view of the array bound checker.

The bug report is a very straightforward one: the value of `eee` can be 16 + 8 
+ 4 + 2 + 1 = 31 (on the branch that always takes `else`) while the length of 
the array is only 31 (8 elements with negative exponents + 1 + 22 with positive 
exponents). This is difficult to spot and understand for a human reader, but 
does not require unusual effort from the analyzer -- which is exactly the 
opposite of a good testcase.

By the way this case was added by commit 
https://github.com/llvm/llvm-project/commit/2d10fdd4ec48f751bdb1a81c2e0142daa1f6a2c0
 in 2012 without any reasoning or correlated code change.

https://github.com/llvm/llvm-project/pull/128508
_______________________________________________
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits

Reply via email to