diff options
author | Artem Dergachev <artem.dergachev@gmail.com> | 2018-11-30 03:27:50 +0000 |
---|---|---|
committer | Artem Dergachev <artem.dergachev@gmail.com> | 2018-11-30 03:27:50 +0000 |
commit | 447f4b58b06fc1427e4ef437165513949dac5b08 (patch) | |
tree | 63e1ea491d2a35e5905aa9eade6dc79f17409a8a /test/Analysis/pr22954.c | |
parent | 4d6bda0df4d29a0f572dd297dec208b85aea9202 (diff) |
[analyzer] Fix the "Zombie Symbols" bug.
It's an old bug that consists in stale references to symbols remaining in the
GDM if they disappear from other program state sections as a result of any
operation that isn't the actual dead symbol collection. The most common example
here is:
FILE *fp = fopen("myfile.txt", "w");
fp = 0; // leak of file descriptor
In this example the leak were not detected previously because the symbol
disappears from the public part of the program state due to evaluating
the assignment. For that reason the checker never receives a notification
that the symbol is dead, and never reports a leak.
This patch not only causes leak false negatives, but also a number of other
problems, including false positives on some checkers.
What's worse, even though the program state contains a finite number of symbols,
the set of symbols that dies is potentially infinite. This means that is
impossible to compute the set of all dead symbols to pass off to the checkers
for cleaning up their part of the GDM.
No longer compute the dead set at all. Disallow iterating over dead symbols.
Disallow querying if any symbols are dead. Remove the API for marking symbols
as dead, as it is no longer necessary. Update checkers accordingly.
Differential Revision: https://reviews.llvm.org/D18860
git-svn-id: https://llvm.org/svn/llvm-project/cfe/trunk@347953 91177308-0d34-0410-b5e6-96231b3b80d8
Diffstat (limited to 'test/Analysis/pr22954.c')
-rw-r--r-- | test/Analysis/pr22954.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/test/Analysis/pr22954.c b/test/Analysis/pr22954.c index c58a8aa714..6d5b04417a 100644 --- a/test/Analysis/pr22954.c +++ b/test/Analysis/pr22954.c @@ -585,7 +585,7 @@ int f28(int i, int j, int k, int l) { m28[j].s3[k] = 1; struct ll * l28 = (struct ll*)(&m28[1]); l28->s1[l] = 2; - char input[] = {'a', 'b', 'c', 'd'}; + char input[] = {'a', 'b', 'c', 'd'}; // expected-warning{{Potential leak of memory pointed to by field 's4'}} memcpy(l28->s1, input, 4); clang_analyzer_eval(m28[0].s3[0] == 1); // expected-warning{{UNKNOWN}} clang_analyzer_eval(m28[0].s3[1] == 1); // expected-warning{{UNKNOWN}} |