blob: ada0cc10690575ddb8b379a8c7438d4b651b9fdb [file] [log] [blame]
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store region -verify %s
char const *p;
void f0() {
char const str[] = "This will change";
p = str; // expected-warning{{Address of stack memory associated with local variable 'str' is still referred to by the global variable 'p' upon returning to the caller. This will be a dangling reference}}
}
void f1() {
char const str[] = "This will change";
p = str;
p = 0; // no-warning
}
void f2() {
p = (const char *) __builtin_alloca(12); // expected-warning{{Address of stack memory allocated by call to alloca() on line 17 is still referred to by the global variable 'p' upon returning to the caller. This will be a dangling reference}}
}
// PR 7383 - previosly the stack address checker would crash on this example
// because it would attempt to do a direct load from 'pr7383_list'.
static int pr7383(__const char *__)
{
return 0;
}
extern __const char *__const pr7383_list[];
// Test that we catch multiple returns via globals when analyzing a function.
void test_multi_return() {
static int *a, *b;
int x;
a = &x;
b = &x; // expected-warning{{Address of stack memory associated with local variable 'x' is still referred to by the global variable 'a' upon returning}} expected-warning{{Address of stack memory associated with local variable 'x' is still referred to by the global variable 'b' upon returning}}
}