2010-10-31 12:31:11 +01:00
|
|
|
/*
|
|
|
|
* Cppcheck - A tool for static C/C++ code analysis
|
2012-01-01 00:05:37 +01:00
|
|
|
* Copyright (C) 2007-2012 Daniel Marjamäki and Cppcheck team.
|
2010-10-31 12:31:11 +01:00
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
//---------------------------------------------------------------------------
|
|
|
|
#include "checkuninitvar.h"
|
|
|
|
#include "mathlib.h"
|
|
|
|
#include "executionpath.h"
|
|
|
|
#include "checknullpointer.h" // CheckNullPointer::parseFunctionCall
|
2011-12-13 21:57:27 +01:00
|
|
|
#include "symboldatabase.h"
|
2010-10-31 12:31:11 +01:00
|
|
|
#include <algorithm>
|
|
|
|
//---------------------------------------------------------------------------
|
|
|
|
|
|
|
|
// Register this check class (by creating a static instance of it)
|
2011-10-13 20:53:06 +02:00
|
|
|
namespace {
|
2011-11-30 18:57:52 +01:00
|
|
|
CheckUninitVar instance;
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
//---------------------------------------------------------------------------
|
|
|
|
|
|
|
|
/// @addtogroup Checks
|
|
|
|
/// @{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief %Check that uninitialized variables aren't used (using ExecutionPath)
|
|
|
|
* */
|
2011-10-13 20:53:06 +02:00
|
|
|
class UninitVar : public ExecutionPath {
|
2010-10-31 12:31:11 +01:00
|
|
|
public:
|
|
|
|
/** Startup constructor */
|
2011-10-28 22:10:19 +02:00
|
|
|
explicit UninitVar(Check *c)
|
2011-10-13 20:53:06 +02:00
|
|
|
: ExecutionPath(c, 0), pointer(false), array(false), alloc(false), strncpy_(false), memset_nonzero(false) {
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
/** Create a copy of this check */
|
2011-10-13 20:53:06 +02:00
|
|
|
ExecutionPath *copy() {
|
2010-10-31 12:31:11 +01:00
|
|
|
return new UninitVar(*this);
|
|
|
|
}
|
|
|
|
|
|
|
|
/** no implementation => compiler error if used */
|
|
|
|
void operator=(const UninitVar &);
|
|
|
|
|
|
|
|
/** internal constructor for creating extra checks */
|
|
|
|
UninitVar(Check *c, unsigned int v, const std::string &name, bool p, bool a)
|
2011-10-13 20:53:06 +02:00
|
|
|
: ExecutionPath(c, v), varname(name), pointer(p), array(a), alloc(false), strncpy_(false), memset_nonzero(false) {
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/** is other execution path equal? */
|
2011-10-13 20:53:06 +02:00
|
|
|
bool is_equal(const ExecutionPath *e) const {
|
2010-10-31 12:31:11 +01:00
|
|
|
const UninitVar *c = static_cast<const UninitVar *>(e);
|
2011-09-05 19:42:48 +02:00
|
|
|
return (varname == c->varname && pointer == c->pointer && array == c->array && alloc == c->alloc && strncpy_ == c->strncpy_ && memset_nonzero == c->memset_nonzero);
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/** variable name for this check */
|
|
|
|
const std::string varname;
|
|
|
|
|
|
|
|
/** is this variable a pointer? */
|
|
|
|
const bool pointer;
|
|
|
|
|
|
|
|
/** is this variable an array? */
|
|
|
|
const bool array;
|
|
|
|
|
|
|
|
/** is this variable allocated? */
|
|
|
|
bool alloc;
|
|
|
|
|
|
|
|
/** is this variable initialized with strncpy (not always zero-terminated) */
|
|
|
|
bool strncpy_;
|
|
|
|
|
2011-09-05 19:42:48 +02:00
|
|
|
/** is this variable initialized but not zero-terminated (memset) */
|
|
|
|
bool memset_nonzero;
|
|
|
|
|
2010-10-31 12:31:11 +01:00
|
|
|
/** allocating pointer. For example : p = malloc(10); */
|
2011-10-13 20:53:06 +02:00
|
|
|
static void alloc_pointer(std::list<ExecutionPath *> &checks, unsigned int varid) {
|
2011-01-01 18:24:27 +01:00
|
|
|
// loop through the checks and perform a allocation if the
|
|
|
|
// variable id matches
|
2010-10-31 12:31:11 +01:00
|
|
|
std::list<ExecutionPath *>::const_iterator it;
|
2011-10-13 20:53:06 +02:00
|
|
|
for (it = checks.begin(); it != checks.end(); ++it) {
|
2010-10-31 12:31:11 +01:00
|
|
|
UninitVar *c = dynamic_cast<UninitVar *>(*it);
|
2012-05-14 18:34:39 +02:00
|
|
|
if (c && c->varId == varid) {
|
|
|
|
if (c->pointer)
|
|
|
|
c->alloc = true;
|
|
|
|
else
|
|
|
|
bailOutVar(checks, varid);
|
|
|
|
break;
|
|
|
|
}
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Initializing a pointer value. For example: *p = 0; */
|
2011-10-13 20:53:06 +02:00
|
|
|
static void init_pointer(std::list<ExecutionPath *> &checks, const Token *tok) {
|
2010-10-31 12:31:11 +01:00
|
|
|
const unsigned int varid(tok->varId());
|
|
|
|
if (!varid)
|
|
|
|
return;
|
|
|
|
|
2011-01-01 18:24:27 +01:00
|
|
|
// loop through the checks and perform a initialization if the
|
|
|
|
// variable id matches
|
2010-10-31 12:31:11 +01:00
|
|
|
std::list<ExecutionPath *>::iterator it = checks.begin();
|
2011-10-13 20:53:06 +02:00
|
|
|
while (it != checks.end()) {
|
2010-10-31 12:31:11 +01:00
|
|
|
UninitVar *c = dynamic_cast<UninitVar *>(*it);
|
2011-10-13 20:53:06 +02:00
|
|
|
if (c && c->varId == varid) {
|
|
|
|
if (c->alloc || c->array) {
|
2010-10-31 12:31:11 +01:00
|
|
|
delete c;
|
|
|
|
checks.erase(it++);
|
|
|
|
continue;
|
2011-10-13 20:53:06 +02:00
|
|
|
} else {
|
2010-10-31 12:31:11 +01:00
|
|
|
use_pointer(checks, tok);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
++it;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Deallocate a pointer. For example: free(p); */
|
2011-10-13 20:53:06 +02:00
|
|
|
static void dealloc_pointer(std::list<ExecutionPath *> &checks, const Token *tok) {
|
2010-10-31 12:31:11 +01:00
|
|
|
const unsigned int varid(tok->varId());
|
|
|
|
if (!varid)
|
|
|
|
return;
|
|
|
|
|
2011-01-01 18:24:27 +01:00
|
|
|
// loop through the checks and perform a deallocation if the
|
|
|
|
// variable id matches
|
2010-10-31 12:31:11 +01:00
|
|
|
std::list<ExecutionPath *>::const_iterator it;
|
2011-10-13 20:53:06 +02:00
|
|
|
for (it = checks.begin(); it != checks.end(); ++it) {
|
2010-10-31 12:31:11 +01:00
|
|
|
UninitVar *c = dynamic_cast<UninitVar *>(*it);
|
2011-10-13 20:53:06 +02:00
|
|
|
if (c && c->varId == varid) {
|
2011-01-01 18:24:27 +01:00
|
|
|
// unallocated pointer variable => error
|
2011-10-13 20:53:06 +02:00
|
|
|
if (c->pointer && !c->alloc) {
|
2010-10-31 12:31:11 +01:00
|
|
|
CheckUninitVar *checkUninitVar = dynamic_cast<CheckUninitVar *>(c->owner);
|
2011-10-13 20:53:06 +02:00
|
|
|
if (checkUninitVar) {
|
2010-10-31 12:31:11 +01:00
|
|
|
checkUninitVar->uninitvarError(tok, c->varname);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
c->alloc = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Pointer assignment: p = x;
|
|
|
|
* if p is a pointer and x is an array/pointer then bail out
|
|
|
|
* \param checks all available checks
|
|
|
|
* \param tok1 the "p" token
|
|
|
|
* \param tok2 the "x" token
|
|
|
|
*/
|
2011-10-13 20:53:06 +02:00
|
|
|
static void pointer_assignment(std::list<ExecutionPath *> &checks, const Token *tok1, const Token *tok2) {
|
2011-01-01 18:24:27 +01:00
|
|
|
// Variable id for "left hand side" variable
|
2010-10-31 12:31:11 +01:00
|
|
|
const unsigned int varid1(tok1->varId());
|
|
|
|
if (varid1 == 0)
|
|
|
|
return;
|
|
|
|
|
2011-01-01 18:24:27 +01:00
|
|
|
// Variable id for "right hand side" variable
|
2010-10-31 12:31:11 +01:00
|
|
|
const unsigned int varid2(tok2->varId());
|
|
|
|
if (varid2 == 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
std::list<ExecutionPath *>::const_iterator it;
|
|
|
|
|
|
|
|
// bail out if first variable is a pointer
|
2011-10-13 20:53:06 +02:00
|
|
|
for (it = checks.begin(); it != checks.end(); ++it) {
|
2010-10-31 12:31:11 +01:00
|
|
|
UninitVar *c = dynamic_cast<UninitVar *>(*it);
|
2011-10-13 20:53:06 +02:00
|
|
|
if (c && c->varId == varid1 && c->pointer) {
|
2010-10-31 12:31:11 +01:00
|
|
|
bailOutVar(checks, varid1);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// bail out if second variable is a array/pointer
|
2011-10-13 20:53:06 +02:00
|
|
|
for (it = checks.begin(); it != checks.end(); ++it) {
|
2010-10-31 12:31:11 +01:00
|
|
|
UninitVar *c = dynamic_cast<UninitVar *>(*it);
|
2011-10-13 20:53:06 +02:00
|
|
|
if (c && c->varId == varid2 && (c->pointer || c->array)) {
|
2010-10-31 12:31:11 +01:00
|
|
|
bailOutVar(checks, varid2);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/** Initialize an array with strncpy. */
|
2011-10-13 20:53:06 +02:00
|
|
|
static void init_strncpy(std::list<ExecutionPath *> &checks, const Token *tok) {
|
2010-10-31 12:31:11 +01:00
|
|
|
const unsigned int varid(tok->varId());
|
|
|
|
if (!varid)
|
|
|
|
return;
|
|
|
|
|
|
|
|
std::list<ExecutionPath *>::const_iterator it;
|
2011-10-13 20:53:06 +02:00
|
|
|
for (it = checks.begin(); it != checks.end(); ++it) {
|
2010-10-31 12:31:11 +01:00
|
|
|
UninitVar *c = dynamic_cast<UninitVar *>(*it);
|
2011-10-13 20:53:06 +02:00
|
|
|
if (c && c->varId == varid) {
|
2010-10-31 12:31:11 +01:00
|
|
|
c->strncpy_ = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-09-05 19:42:48 +02:00
|
|
|
/** Initialize an array with memset (not zero). */
|
2011-10-13 20:53:06 +02:00
|
|
|
static void init_memset_nonzero(std::list<ExecutionPath *> &checks, const Token *tok) {
|
2011-09-05 19:42:48 +02:00
|
|
|
const unsigned int varid(tok->varId());
|
|
|
|
if (!varid)
|
|
|
|
return;
|
|
|
|
|
|
|
|
std::list<ExecutionPath *>::const_iterator it;
|
2011-10-13 20:53:06 +02:00
|
|
|
for (it = checks.begin(); it != checks.end(); ++it) {
|
2011-09-05 19:42:48 +02:00
|
|
|
UninitVar *c = dynamic_cast<UninitVar *>(*it);
|
2011-10-13 20:53:06 +02:00
|
|
|
if (c && c->varId == varid) {
|
2011-09-05 19:42:48 +02:00
|
|
|
c->memset_nonzero = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-10-31 12:31:11 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* use - called from the use* functions below.
|
|
|
|
* @param checks all available checks
|
|
|
|
* @param tok variable token
|
|
|
|
* @param mode specific behaviour
|
|
|
|
* @return if error is found, true is returned
|
|
|
|
*/
|
2011-10-13 20:53:06 +02:00
|
|
|
static bool use(std::list<ExecutionPath *> &checks, const Token *tok, const int mode) {
|
2010-10-31 12:31:11 +01:00
|
|
|
const unsigned int varid(tok->varId());
|
|
|
|
if (varid == 0)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
std::list<ExecutionPath *>::const_iterator it;
|
2011-10-13 20:53:06 +02:00
|
|
|
for (it = checks.begin(); it != checks.end(); ++it) {
|
2010-10-31 12:31:11 +01:00
|
|
|
UninitVar *c = dynamic_cast<UninitVar *>(*it);
|
2011-10-13 20:53:06 +02:00
|
|
|
if (c && c->varId == varid) {
|
2010-10-31 12:31:11 +01:00
|
|
|
// mode 0 : the variable is used "directly"
|
|
|
|
// example: .. = var;
|
|
|
|
// it is ok to read the address of an uninitialized array.
|
|
|
|
// it is ok to read the address of an allocated pointer
|
|
|
|
if (mode == 0 && (c->array || (c->pointer && c->alloc)))
|
|
|
|
continue;
|
|
|
|
|
2011-10-29 19:11:42 +02:00
|
|
|
// mode 2 : reading array data with mem.. function. It's ok if the
|
|
|
|
// array is not 0-terminated
|
|
|
|
if (mode == 2 && c->strncpy_)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
// mode 3 : bad usage of pointer. if it's not a pointer then the usage is ok.
|
2010-10-31 12:31:11 +01:00
|
|
|
// example: ptr->foo();
|
2011-10-29 19:11:42 +02:00
|
|
|
if (mode == 3 && !c->pointer)
|
2010-10-31 12:31:11 +01:00
|
|
|
continue;
|
|
|
|
|
2011-10-29 19:11:42 +02:00
|
|
|
// mode 4 : using dead pointer is invalid.
|
|
|
|
if (mode == 4 && (!c->pointer || c->alloc))
|
2010-10-31 12:31:11 +01:00
|
|
|
continue;
|
|
|
|
|
2011-10-29 19:11:42 +02:00
|
|
|
// mode 5 : reading uninitialized array or pointer is invalid.
|
|
|
|
if (mode == 5 && (!c->array && !c->pointer))
|
2010-10-31 12:31:11 +01:00
|
|
|
continue;
|
|
|
|
|
|
|
|
CheckUninitVar *checkUninitVar = dynamic_cast<CheckUninitVar *>(c->owner);
|
2011-10-13 20:53:06 +02:00
|
|
|
if (checkUninitVar) {
|
2011-09-05 19:42:48 +02:00
|
|
|
if (c->strncpy_ || c->memset_nonzero)
|
|
|
|
checkUninitVar->uninitstringError(tok, c->varname, c->strncpy_);
|
2010-10-31 12:31:11 +01:00
|
|
|
else if (c->pointer && c->alloc)
|
|
|
|
checkUninitVar->uninitdataError(tok, c->varname);
|
|
|
|
else
|
|
|
|
checkUninitVar->uninitvarError(tok, c->varname);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// No error found
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Reading variable. Use this function in situations when it is
|
|
|
|
* invalid to read the data of the variable but not the address.
|
|
|
|
* @param checks all available checks
|
|
|
|
* @param tok variable token
|
|
|
|
* @return if error is found, true is returned
|
|
|
|
*/
|
2011-10-13 20:53:06 +02:00
|
|
|
static bool use(std::list<ExecutionPath *> &checks, const Token *tok) {
|
2010-10-31 12:31:11 +01:00
|
|
|
return use(checks, tok, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Reading array elements. If the variable is not an array then the usage is ok.
|
|
|
|
* @param checks all available checks
|
|
|
|
* @param tok variable token
|
|
|
|
*/
|
2011-10-13 20:53:06 +02:00
|
|
|
static void use_array(std::list<ExecutionPath *> &checks, const Token *tok) {
|
2010-10-31 12:31:11 +01:00
|
|
|
use(checks, tok, 1);
|
|
|
|
}
|
|
|
|
|
2011-10-29 19:11:42 +02:00
|
|
|
/**
|
|
|
|
* Reading array elements with a "mem.." function. It's ok if the array is not 0-terminated.
|
|
|
|
* @param checks all available checks
|
|
|
|
* @param tok variable token
|
|
|
|
*/
|
|
|
|
static void use_array_mem(std::list<ExecutionPath *> &checks, const Token *tok) {
|
|
|
|
use(checks, tok, 2);
|
|
|
|
}
|
|
|
|
|
2010-10-31 12:31:11 +01:00
|
|
|
/**
|
|
|
|
* Bad pointer usage. If the variable is not a pointer then the usage is ok.
|
|
|
|
* @param checks all available checks
|
|
|
|
* @param tok variable token
|
|
|
|
* @return if error is found, true is returned
|
|
|
|
*/
|
2011-10-13 20:53:06 +02:00
|
|
|
static bool use_pointer(std::list<ExecutionPath *> &checks, const Token *tok) {
|
2011-10-29 19:11:42 +02:00
|
|
|
return use(checks, tok, 3);
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Using variable.. if it's a dead pointer the usage is invalid.
|
|
|
|
* @param checks all available checks
|
|
|
|
* @param tok variable token
|
|
|
|
* @return if error is found, true is returned
|
|
|
|
*/
|
2011-10-13 20:53:06 +02:00
|
|
|
static bool use_dead_pointer(std::list<ExecutionPath *> &checks, const Token *tok) {
|
2011-10-29 19:11:42 +02:00
|
|
|
return use(checks, tok, 4);
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Using variable.. reading from uninitialized array or pointer data is invalid.
|
|
|
|
* Example: = x[0];
|
|
|
|
* @param checks all available checks
|
|
|
|
* @param tok variable token
|
|
|
|
* @return if error is found, true is returned
|
|
|
|
*/
|
2011-10-13 20:53:06 +02:00
|
|
|
static bool use_array_or_pointer_data(std::list<ExecutionPath *> &checks, const Token *tok) {
|
2011-10-29 19:11:42 +02:00
|
|
|
return use(checks, tok, 5);
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/** declaring a variable */
|
2011-10-13 20:53:06 +02:00
|
|
|
void declare(std::list<ExecutionPath *> &checks, const Token *vartok, const Token &tok, const bool p, const bool a) const {
|
2010-10-31 12:31:11 +01:00
|
|
|
if (vartok->varId() == 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
// Suppress warnings if variable in inner scope has same name as variable in outer scope
|
2011-10-13 20:53:06 +02:00
|
|
|
if (!tok.isStandardType()) {
|
2010-10-31 12:31:11 +01:00
|
|
|
std::set<unsigned int> dup;
|
2011-10-13 20:53:06 +02:00
|
|
|
for (std::list<ExecutionPath *>::const_iterator it = checks.begin(); it != checks.end(); ++it) {
|
2010-10-31 12:31:11 +01:00
|
|
|
UninitVar *c = dynamic_cast<UninitVar *>(*it);
|
|
|
|
if (c && c->varname == vartok->str() && c->varId != vartok->varId())
|
|
|
|
dup.insert(c->varId);
|
|
|
|
}
|
2011-10-13 20:53:06 +02:00
|
|
|
if (!dup.empty()) {
|
2010-10-31 12:31:11 +01:00
|
|
|
for (std::set<unsigned int>::const_iterator it = dup.begin(); it != dup.end(); ++it)
|
|
|
|
bailOutVar(checks, *it);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (a || p || tok.isStandardType())
|
|
|
|
checks.push_back(new UninitVar(owner, vartok->varId(), vartok->str(), p, a));
|
|
|
|
}
|
|
|
|
|
2010-11-05 19:24:14 +01:00
|
|
|
/**
|
|
|
|
* Parse right hand side expression in statement
|
|
|
|
* @param tok2 start token of rhs
|
|
|
|
* @param checks the execution paths
|
|
|
|
*/
|
2011-10-13 20:53:06 +02:00
|
|
|
void parserhs(const Token *tok2, std::list<ExecutionPath *> &checks) const {
|
2010-11-05 19:24:14 +01:00
|
|
|
// check variable usages in rhs/index
|
2011-10-13 20:53:06 +02:00
|
|
|
while (NULL != (tok2 = tok2->next())) {
|
2010-11-05 19:24:14 +01:00
|
|
|
if (Token::Match(tok2, "[;)=?]"))
|
|
|
|
break;
|
|
|
|
if (Token::Match(tok2, "%var% ("))
|
|
|
|
break;
|
|
|
|
if (tok2->varId() &&
|
|
|
|
!Token::Match(tok2->previous(), "&|::") &&
|
2011-05-05 21:26:18 +02:00
|
|
|
!Token::simpleMatch(tok2->tokAt(-2), "& (") &&
|
2011-10-13 20:53:06 +02:00
|
|
|
!Token::simpleMatch(tok2->next(), "=")) {
|
2010-11-05 19:24:14 +01:00
|
|
|
// Multiple assignments..
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok2->next(), ".|[")) {
|
2010-11-05 19:24:14 +01:00
|
|
|
const Token * tok3 = tok2;
|
2011-10-13 20:53:06 +02:00
|
|
|
while (tok3) {
|
2010-11-30 18:40:36 +01:00
|
|
|
if (Token::Match(tok3->next(), ". %var%"))
|
|
|
|
tok3 = tok3->tokAt(2);
|
|
|
|
else if (tok3->strAt(1) == "[")
|
|
|
|
tok3 = tok3->next()->link();
|
|
|
|
else
|
|
|
|
break;
|
|
|
|
}
|
2010-12-01 18:05:57 +01:00
|
|
|
if (tok3 && tok3->strAt(1) == "=")
|
2010-11-05 19:24:14 +01:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
bool foundError;
|
|
|
|
if (tok2->previous()->str() == "*" || tok2->next()->str() == "[")
|
|
|
|
foundError = use_array_or_pointer_data(checks, tok2);
|
|
|
|
else
|
|
|
|
foundError = use(checks, tok2);
|
|
|
|
|
|
|
|
// prevent duplicate error messages
|
2011-10-13 20:53:06 +02:00
|
|
|
if (foundError) {
|
2010-11-05 19:24:14 +01:00
|
|
|
bailOutVar(checks, tok2->varId());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2010-10-31 12:31:11 +01:00
|
|
|
/** parse tokens. @sa ExecutionPath::parse */
|
2011-10-13 20:53:06 +02:00
|
|
|
const Token *parse(const Token &tok, std::list<ExecutionPath *> &checks) const {
|
2010-10-31 12:31:11 +01:00
|
|
|
// Variable declaration..
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok.previous(), "[;{}] %var%") && tok.str() != "return") {
|
2010-10-31 12:31:11 +01:00
|
|
|
if (Token::Match(&tok, "enum %type% {"))
|
2011-11-20 14:22:39 +01:00
|
|
|
return tok.linkAt(2);
|
2010-10-31 12:31:11 +01:00
|
|
|
|
|
|
|
const Token * vartok = &tok;
|
|
|
|
while (Token::Match(vartok, "const|struct"))
|
|
|
|
vartok = vartok->next();
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(vartok, "%type% *| %var% ;")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
vartok = vartok->next();
|
|
|
|
const bool p(vartok->str() == "*");
|
|
|
|
if (p)
|
|
|
|
vartok = vartok->next();
|
|
|
|
declare(checks, vartok, tok, p, false);
|
|
|
|
return vartok;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Variable declaration for array..
|
2010-11-10 20:20:05 +01:00
|
|
|
if (Token::Match(vartok, "%type% %var% [") &&
|
2010-12-17 21:20:04 +01:00
|
|
|
vartok->isStandardType() &&
|
2011-11-20 14:22:39 +01:00
|
|
|
Token::simpleMatch(vartok->linkAt(2), "] ;")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
vartok = vartok->next();
|
|
|
|
declare(checks, vartok, tok, false, true);
|
|
|
|
return vartok->next()->link();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Template pointer variable..
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(vartok, "%type% ::|<")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
while (Token::Match(vartok, "%type% ::"))
|
|
|
|
vartok = vartok->tokAt(2);
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(vartok, "%type% < %type%")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
vartok = vartok->tokAt(3);
|
|
|
|
while (vartok && (vartok->str() == "*" || vartok->isName()))
|
|
|
|
vartok = vartok->next();
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(vartok, "> * %var% ;")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
declare(checks, vartok->tokAt(2), tok, true, false);
|
|
|
|
return vartok->tokAt(2);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (tok.str() == "return") {
|
2011-09-20 21:00:05 +02:00
|
|
|
// is there assignment or ternary operator in the return statement?
|
2011-07-24 22:41:40 +02:00
|
|
|
bool assignment = false;
|
2011-10-13 20:53:06 +02:00
|
|
|
for (const Token *tok2 = tok.next(); tok2 && tok2->str() != ";"; tok2 = tok2->next()) {
|
|
|
|
if (tok2->str() == "=" || tok2->str() == ">>" || tok2->str() == "?" || Token::Match(tok2, "(|, &")) {
|
2011-07-24 22:41:40 +02:00
|
|
|
assignment = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2011-07-24 22:26:11 +02:00
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (!assignment) {
|
|
|
|
for (const Token *tok2 = tok.next(); tok2 && tok2->str() != ";"; tok2 = tok2->next()) {
|
2011-07-24 22:41:40 +02:00
|
|
|
if (tok2->isName() && tok2->strAt(1) == "(")
|
|
|
|
tok2 = tok2->next()->link();
|
|
|
|
|
|
|
|
else if (tok2->varId())
|
|
|
|
use(checks, tok2);
|
|
|
|
}
|
2011-07-24 22:26:11 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (tok.varId()) {
|
2010-11-12 17:38:25 +01:00
|
|
|
// array variable passed as function parameter..
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok.previous(), "[(,] %var% [+-,)]")) {
|
2012-01-21 20:42:41 +01:00
|
|
|
// skip ')'..
|
|
|
|
const Token *tok2 = tok.next();
|
|
|
|
while (tok2 && tok2->str() == ")")
|
|
|
|
tok2 = tok2->next();
|
|
|
|
|
|
|
|
// variable is assigned like: "( %var% ) .. ="
|
|
|
|
if (Token::Match(tok.previous(), "( %var% )") && tok2 && tok2->str() == "=")
|
2011-10-30 18:19:09 +01:00
|
|
|
ExecutionPath::bailOutVar(checks, tok.varId());
|
|
|
|
else
|
|
|
|
use(checks, &tok);
|
2010-12-18 10:06:21 +01:00
|
|
|
//use_array(checks, &tok);
|
2010-11-12 17:38:25 +01:00
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
|
2010-10-31 12:31:11 +01:00
|
|
|
// Used..
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok.previous(), "[[(,+-*/|=] %var% ]|)|,|;|%op%")) {
|
2012-03-16 17:28:05 +01:00
|
|
|
// Taking address of array..
|
|
|
|
std::list<ExecutionPath *>::const_iterator it;
|
|
|
|
for (it = checks.begin(); it != checks.end(); ++it) {
|
|
|
|
UninitVar *c = dynamic_cast<UninitVar *>(*it);
|
|
|
|
if (c && c->varId == tok.varId()) {
|
|
|
|
if (c->array)
|
|
|
|
bailOutVar(checks, tok.varId());
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-09-03 18:53:14 +02:00
|
|
|
// initialize reference variable
|
|
|
|
if (Token::Match(tok.tokAt(-3), "& %var% ="))
|
|
|
|
bailOutVar(checks, tok.varId());
|
|
|
|
else
|
|
|
|
use(checks, &tok);
|
2010-10-31 12:31:11 +01:00
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
|
2012-04-25 09:56:07 +02:00
|
|
|
if ((tok.previous() && tok.previous()->type() == Token::eIncDecOp) || (tok.next() && tok.next()->type() == Token::eIncDecOp)) {
|
2010-10-31 12:31:11 +01:00
|
|
|
use(checks, &tok);
|
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok.previous(), "[;{}] %var% [=[.]")) {
|
|
|
|
if (tok.next()->str() == ".") {
|
|
|
|
if (use_dead_pointer(checks, &tok)) {
|
2010-10-31 12:31:11 +01:00
|
|
|
return &tok;
|
|
|
|
}
|
2011-10-13 20:53:06 +02:00
|
|
|
} else {
|
2010-11-05 19:24:14 +01:00
|
|
|
const Token *tok2 = tok.next();
|
2012-04-24 19:50:54 +02:00
|
|
|
|
|
|
|
if (tok2->str() == "[") {
|
|
|
|
const Token *tok3 = tok2->link();
|
|
|
|
while (Token::simpleMatch(tok3, "] ["))
|
|
|
|
tok3 = tok3->next()->link();
|
|
|
|
|
|
|
|
// Possible initialization
|
|
|
|
if (Token::simpleMatch(tok3, "] >>"))
|
2011-04-26 20:26:09 +02:00
|
|
|
return &tok;
|
|
|
|
|
2012-04-24 19:50:54 +02:00
|
|
|
if (Token::simpleMatch(tok3, "] =")) {
|
|
|
|
if (use_dead_pointer(checks, &tok)) {
|
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
|
|
|
|
parserhs(tok2, checks);
|
|
|
|
tok2 = tok3->next();
|
|
|
|
}
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
2012-04-24 19:50:54 +02:00
|
|
|
|
2010-11-05 19:24:14 +01:00
|
|
|
parserhs(tok2, checks);
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// pointer aliasing?
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok.tokAt(2), "%var% ;")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
pointer_assignment(checks, &tok, tok.tokAt(2));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::simpleMatch(tok.next(), "(")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
use_pointer(checks, &tok);
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok.tokAt(-2), "[;{}] *")) {
|
|
|
|
if (Token::simpleMatch(tok.next(), "=")) {
|
2010-11-05 17:04:41 +01:00
|
|
|
// is the pointer used in the rhs?
|
|
|
|
bool used = false;
|
2011-10-13 20:53:06 +02:00
|
|
|
for (const Token *tok2 = tok.tokAt(2); tok2; tok2 = tok2->next()) {
|
2010-11-05 17:04:41 +01:00
|
|
|
if (Token::Match(tok2, "[,;=(]"))
|
|
|
|
break;
|
2011-10-13 20:53:06 +02:00
|
|
|
else if (Token::Match(tok2, "* %varid%", tok.varId())) {
|
2010-11-05 17:04:41 +01:00
|
|
|
used = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (used)
|
|
|
|
use_pointer(checks, &tok);
|
|
|
|
else
|
|
|
|
init_pointer(checks, &tok);
|
2011-10-13 20:53:06 +02:00
|
|
|
} else {
|
2010-10-31 12:31:11 +01:00
|
|
|
use_pointer(checks, &tok);
|
2010-11-05 17:04:41 +01:00
|
|
|
}
|
2010-10-31 12:31:11 +01:00
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok.next(), "= malloc|kmalloc") || Token::simpleMatch(tok.next(), "= new char [")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
alloc_pointer(checks, tok.varId());
|
2011-11-13 13:10:59 +01:00
|
|
|
if (tok.strAt(3) == "(")
|
2010-10-31 12:31:11 +01:00
|
|
|
return tok.tokAt(3);
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
else if (Token::Match(tok.previous(), "<<|>>") || Token::simpleMatch(tok.next(), "=")) {
|
2011-09-04 12:53:53 +02:00
|
|
|
// TODO: Don't bail out for "<<" and ">>" if these are
|
|
|
|
// just computations
|
2010-10-31 12:31:11 +01:00
|
|
|
ExecutionPath::bailOutVar(checks, tok.varId());
|
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::simpleMatch(tok.next(), "[")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
const Token *tok2 = tok.next()->link();
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::simpleMatch(tok2 ? tok2->next() : 0, "=")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
ExecutionPath::bailOutVar(checks, tok.varId());
|
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (Token::simpleMatch(tok.previous(), "delete") ||
|
2011-10-13 20:53:06 +02:00
|
|
|
Token::simpleMatch(tok.tokAt(-3), "delete [ ]")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
dealloc_pointer(checks, &tok);
|
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(&tok, "%var% (") && uvarFunctions.find(tok.str()) == uvarFunctions.end()) {
|
2010-12-30 21:30:46 +01:00
|
|
|
// sizeof/typeof doesn't dereference. A function name that is all uppercase
|
|
|
|
// might be an unexpanded macro that uses sizeof/typeof
|
2011-01-05 20:44:04 +01:00
|
|
|
if (Token::Match(&tok, "sizeof|typeof ("))
|
2010-10-31 12:31:11 +01:00
|
|
|
return tok.next()->link();
|
|
|
|
|
|
|
|
// deallocate pointer
|
2011-09-28 20:46:09 +02:00
|
|
|
if (Token::Match(&tok, "free|kfree|fclose ( %var% )") ||
|
2011-10-13 20:53:06 +02:00
|
|
|
Token::Match(&tok, "realloc ( %var%")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
dealloc_pointer(checks, tok.tokAt(2));
|
|
|
|
return tok.tokAt(3);
|
|
|
|
}
|
|
|
|
|
|
|
|
// parse usage..
|
|
|
|
{
|
|
|
|
std::list<const Token *> var;
|
|
|
|
CheckNullPointer::parseFunctionCall(tok, var, 1);
|
2011-10-13 20:53:06 +02:00
|
|
|
for (std::list<const Token *>::const_iterator it = var.begin(); it != var.end(); ++it) {
|
2011-12-23 08:44:28 +01:00
|
|
|
// does iterator point at first function parameter?
|
|
|
|
const bool firstPar(*it == tok.tokAt(2));
|
|
|
|
|
2011-10-29 19:11:42 +02:00
|
|
|
// is function memset/memcpy/etc?
|
|
|
|
if (tok.str().compare(0,3,"mem") == 0)
|
|
|
|
use_array_mem(checks, *it);
|
2011-12-23 08:44:28 +01:00
|
|
|
|
|
|
|
// second parameter for strncpy/strncat/etc
|
|
|
|
else if (!firstPar && tok.str().compare(0,4,"strn") == 0)
|
|
|
|
use_array_mem(checks, *it);
|
|
|
|
|
2011-10-29 19:11:42 +02:00
|
|
|
else
|
|
|
|
use_array(checks, *it);
|
|
|
|
|
2011-02-26 20:08:37 +01:00
|
|
|
use_dead_pointer(checks, *it);
|
|
|
|
}
|
2010-10-31 12:31:11 +01:00
|
|
|
|
|
|
|
// Using uninitialized pointer is bad if using null pointer is bad
|
|
|
|
std::list<const Token *> var2;
|
|
|
|
CheckNullPointer::parseFunctionCall(tok, var2, 0);
|
2011-10-13 20:53:06 +02:00
|
|
|
for (std::list<const Token *>::const_iterator it = var2.begin(); it != var2.end(); ++it) {
|
2010-10-31 12:31:11 +01:00
|
|
|
if (std::find(var.begin(), var.end(), *it) == var.end())
|
|
|
|
use_dead_pointer(checks, *it);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// strncpy doesn't 0-terminate first parameter
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(&tok, "strncpy ( %var% ,")) {
|
|
|
|
if (Token::Match(tok.tokAt(4), "%str% ,")) {
|
|
|
|
if (Token::Match(tok.tokAt(6), "%num% )")) {
|
2010-12-31 09:51:27 +01:00
|
|
|
const std::size_t len = Token::getStrLength(tok.tokAt(4));
|
2010-11-20 10:05:33 +01:00
|
|
|
const MathLib::bigint sz = MathLib::toLongNumber(tok.strAt(6));
|
2011-10-13 20:53:06 +02:00
|
|
|
if (sz >= 0 && len >= static_cast<unsigned long>(sz)) {
|
2010-10-31 12:31:11 +01:00
|
|
|
init_strncpy(checks, tok.tokAt(2));
|
|
|
|
return tok.next()->link();
|
|
|
|
}
|
|
|
|
}
|
2011-10-13 20:53:06 +02:00
|
|
|
} else {
|
2010-10-31 12:31:11 +01:00
|
|
|
init_strncpy(checks, tok.tokAt(2));
|
|
|
|
return tok.next()->link();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-09-05 19:42:48 +02:00
|
|
|
// memset (not zero terminated)..
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(&tok, "memset ( %var% , !!0 , %num% )")) {
|
2011-09-05 19:42:48 +02:00
|
|
|
init_memset_nonzero(checks, tok.tokAt(2));
|
|
|
|
return tok.next()->link();
|
|
|
|
}
|
|
|
|
|
2011-12-13 21:42:38 +01:00
|
|
|
if (Token::Match(&tok, "asm ( %str% )")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
ExecutionPath::bailOut(checks);
|
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
|
|
|
|
// is the variable passed as a parameter to some function?
|
|
|
|
unsigned int parlevel = 0;
|
|
|
|
std::set<unsigned int> bailouts;
|
2011-10-13 20:53:06 +02:00
|
|
|
for (const Token *tok2 = tok.next(); tok2; tok2 = tok2->next()) {
|
2010-10-31 12:31:11 +01:00
|
|
|
if (tok2->str() == "(")
|
|
|
|
++parlevel;
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
else if (tok2->str() == ")") {
|
2010-10-31 12:31:11 +01:00
|
|
|
if (parlevel <= 1)
|
|
|
|
break;
|
|
|
|
--parlevel;
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
else if (Token::Match(tok2, "sizeof|typeof (")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
tok2 = tok2->next()->link();
|
|
|
|
if (!tok2)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2010-12-30 21:30:46 +01:00
|
|
|
// ticket #2367 : unexpanded macro that uses sizeof|typeof?
|
2011-10-13 20:53:06 +02:00
|
|
|
else if (Token::Match(tok2, "%type% (") && CheckNullPointer::isUpper(tok2->str())) {
|
2010-12-30 21:30:46 +01:00
|
|
|
tok2 = tok2->next()->link();
|
|
|
|
if (!tok2)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
else if (tok2->varId()) {
|
|
|
|
if (Token::Match(tok2->tokAt(-2), "[(,] *") || Token::Match(tok2->next(), ". %var%")) {
|
2011-01-05 20:44:04 +01:00
|
|
|
// find function call..
|
|
|
|
const Token *functionCall = tok2;
|
2011-12-01 10:48:14 +01:00
|
|
|
while (NULL != (functionCall = functionCall ? functionCall->previous() : 0)) {
|
2011-01-05 20:44:04 +01:00
|
|
|
if (functionCall->str() == "(")
|
|
|
|
break;
|
|
|
|
if (functionCall->str() == ")")
|
|
|
|
functionCall = functionCall->link();
|
|
|
|
}
|
|
|
|
|
|
|
|
functionCall = functionCall ? functionCall->previous() : 0;
|
2011-10-13 20:53:06 +02:00
|
|
|
if (functionCall) {
|
2011-01-17 19:23:00 +01:00
|
|
|
if (functionCall->isName() && !CheckNullPointer::isUpper(functionCall->str()) && use_dead_pointer(checks, tok2))
|
2011-01-05 20:44:04 +01:00
|
|
|
ExecutionPath::bailOutVar(checks, tok2->varId());
|
|
|
|
}
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// it is possible that the variable is initialized here
|
2010-11-13 15:10:17 +01:00
|
|
|
if (Token::Match(tok2->previous(), "[(,] %var% [,)]"))
|
2010-10-31 12:31:11 +01:00
|
|
|
bailouts.insert(tok2->varId());
|
|
|
|
|
|
|
|
// array initialization..
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok2->previous(), "[,(] %var% [+-]")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
// if var is array, bailout
|
2011-10-13 20:53:06 +02:00
|
|
|
for (std::list<ExecutionPath *>::const_iterator it = checks.begin(); it != checks.end(); ++it) {
|
|
|
|
if ((*it)->varId == tok2->varId()) {
|
2010-10-31 12:31:11 +01:00
|
|
|
const UninitVar *c = dynamic_cast<const UninitVar *>(*it);
|
2010-11-13 15:10:17 +01:00
|
|
|
if (c && (c->array || (c->pointer && c->alloc)))
|
2010-10-31 12:31:11 +01:00
|
|
|
bailouts.insert(tok2->varId());
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for (std::set<unsigned int>::const_iterator it = bailouts.begin(); it != bailouts.end(); ++it)
|
|
|
|
ExecutionPath::bailOutVar(checks, *it);
|
|
|
|
}
|
|
|
|
|
|
|
|
// function call via function pointer
|
2011-10-30 17:41:05 +01:00
|
|
|
if (Token::Match(&tok, "( * %var% ) (") ||
|
2011-10-30 17:22:30 +01:00
|
|
|
(Token::Match(&tok, "( *| %var% .|::") && Token::Match(tok.link()->tokAt(-2), ".|:: %var% ) ("))) {
|
2010-10-31 12:31:11 +01:00
|
|
|
// is the variable passed as a parameter to some function?
|
2012-04-21 23:05:37 +02:00
|
|
|
const Token *tok2 = tok.link()->next();
|
2012-05-07 15:34:47 +02:00
|
|
|
for (const Token* const end2 = tok2->link(); tok2 != end2; tok2 = tok2->next()) {
|
2012-04-21 23:05:37 +02:00
|
|
|
if (tok2->varId()) {
|
2010-10-31 12:31:11 +01:00
|
|
|
// it is possible that the variable is initialized here
|
|
|
|
ExecutionPath::bailOutVar(checks, tok2->varId());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (tok.str() == "return") {
|
2010-10-31 12:31:11 +01:00
|
|
|
// Todo: if (!array && ..
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok.next(), "%var% ;")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
use(checks, tok.next());
|
2011-10-13 20:53:06 +02:00
|
|
|
} else if (Token::Match(tok.next(), "%var% [")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
use_array_or_pointer_data(checks, tok.next());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (tok.varId()) {
|
|
|
|
if (Token::simpleMatch(tok.previous(), "=")) {
|
|
|
|
if (Token::Match(tok.tokAt(-3), "& %var% =")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
bailOutVar(checks, tok.varId());
|
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (!Token::Match(tok.tokAt(-3), ". %var% =")) {
|
|
|
|
if (!Token::Match(tok.tokAt(-3), "[;{}] %var% =")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
use(checks, &tok);
|
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
|
|
|
|
const unsigned int varid2 = tok.tokAt(-2)->varId();
|
2011-10-13 20:53:06 +02:00
|
|
|
if (varid2) {
|
2010-10-31 12:31:11 +01:00
|
|
|
{
|
|
|
|
use(checks, &tok);
|
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::simpleMatch(tok.next(), ".")) {
|
2010-11-27 17:34:54 +01:00
|
|
|
bailOutVar(checks, tok.varId());
|
2010-10-31 12:31:11 +01:00
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::simpleMatch(tok.next(), "[")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
ExecutionPath::bailOutVar(checks, tok.varId());
|
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok.tokAt(-2), "[,(=] *")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
use_pointer(checks, &tok);
|
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::simpleMatch(tok.previous(), "&")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
ExecutionPath::bailOutVar(checks, tok.varId());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Parse "for"
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(&tok, "[;{}] for (")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
// initialized variables
|
|
|
|
std::set<unsigned int> varid1;
|
|
|
|
varid1.insert(0);
|
|
|
|
|
|
|
|
// Parse token
|
|
|
|
const Token *tok2;
|
|
|
|
|
|
|
|
// parse setup
|
2011-10-13 20:53:06 +02:00
|
|
|
for (tok2 = tok.tokAt(3); tok2 != tok.link(); tok2 = tok2->next()) {
|
2010-10-31 12:31:11 +01:00
|
|
|
if (tok2->str() == ";")
|
|
|
|
break;
|
|
|
|
if (tok2->varId())
|
|
|
|
varid1.insert(tok2->varId());
|
|
|
|
}
|
2010-11-24 18:08:21 +01:00
|
|
|
if (tok2 == tok.link())
|
|
|
|
return &tok;
|
2010-10-31 12:31:11 +01:00
|
|
|
|
|
|
|
// parse condition
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok2, "; %var% <|<=|>=|> %num% ;")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
// If the variable hasn't been initialized then call "use"
|
|
|
|
if (varid1.find(tok2->next()->varId()) == varid1.end())
|
|
|
|
use(checks, tok2->next());
|
|
|
|
}
|
|
|
|
|
|
|
|
// goto stepcode
|
|
|
|
tok2 = tok2->next();
|
|
|
|
while (tok2 && tok2->str() != ";")
|
|
|
|
tok2 = tok2->next();
|
|
|
|
|
|
|
|
// parse the stepcode
|
|
|
|
if (Token::Match(tok2, "; ++|-- %var% ) {") ||
|
2011-10-13 20:53:06 +02:00
|
|
|
Token::Match(tok2, "; %var% ++|-- ) {")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
// get id of variable..
|
|
|
|
unsigned int varid = tok2->next()->varId();
|
|
|
|
if (!varid)
|
|
|
|
varid = tok2->tokAt(2)->varId();
|
|
|
|
|
|
|
|
// Check that the variable hasn't been initialized and
|
|
|
|
// that it isn't initialized in the body..
|
2011-10-13 20:53:06 +02:00
|
|
|
if (varid1.find(varid) == varid1.end()) {
|
2012-01-15 12:31:49 +01:00
|
|
|
for (const Token *tok3 = tok2->tokAt(5); tok3 && tok3 != tok2->linkAt(4); tok3 = tok3->next()) {
|
2011-10-13 20:53:06 +02:00
|
|
|
if (tok3->varId() == varid) {
|
2010-10-31 12:31:11 +01:00
|
|
|
varid = 0; // variable is used.. maybe it's initialized. clear the variable id.
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the variable isn't initialized in the body call "use"
|
2011-10-13 20:53:06 +02:00
|
|
|
if (varid != 0) {
|
2010-10-31 12:31:11 +01:00
|
|
|
// goto variable
|
|
|
|
tok2 = tok2->next();
|
|
|
|
if (!tok2->varId())
|
|
|
|
tok2 = tok2->next();
|
|
|
|
|
|
|
|
// call "use"
|
|
|
|
use(checks, tok2);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return &tok;
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
bool parseCondition(const Token &tok, std::list<ExecutionPath *> &checks) {
|
2010-10-31 12:31:11 +01:00
|
|
|
if (tok.varId() && Token::Match(&tok, "%var% <|<=|==|!=|)"))
|
|
|
|
use(checks, &tok);
|
|
|
|
|
|
|
|
else if (Token::Match(&tok, "!| %var% ["))
|
|
|
|
use_array_or_pointer_data(checks, tok.str() == "!" ? tok.next() : &tok);
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
else if (Token::Match(&tok, "!| %var% (")) {
|
2011-10-29 19:11:42 +02:00
|
|
|
const Token * const ftok = (tok.str() == "!") ? tok.next() : &tok;
|
2010-10-31 12:31:11 +01:00
|
|
|
std::list<const Token *> var;
|
2011-10-29 19:11:42 +02:00
|
|
|
CheckNullPointer::parseFunctionCall(*ftok, var, 1);
|
|
|
|
for (std::list<const Token *>::const_iterator it = var.begin(); it != var.end(); ++it) {
|
|
|
|
// is function memset/memcpy/etc?
|
|
|
|
if (ftok->str().compare(0,3,"mem") == 0)
|
|
|
|
use_array_mem(checks, *it);
|
|
|
|
else
|
|
|
|
use_array(checks, *it);
|
|
|
|
}
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
else if (Token::Match(&tok, "! %var% )")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
use(checks, &tok);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ExecutionPath::parseCondition(tok, checks);
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
void parseLoopBody(const Token *tok, std::list<ExecutionPath *> &checks) const {
|
|
|
|
while (tok) {
|
2010-10-31 12:31:11 +01:00
|
|
|
if (tok->str() == "{" || tok->str() == "}" || tok->str() == "for")
|
|
|
|
return;
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::simpleMatch(tok, "if (")) {
|
2010-12-23 09:15:45 +01:00
|
|
|
// bail out all variables that are used in the condition
|
2012-05-07 15:34:47 +02:00
|
|
|
const Token* const end2 = tok->linkAt(1);
|
|
|
|
for (const Token *tok2 = tok->tokAt(2); tok2 != end2; tok2 = tok2->next()) {
|
2012-04-21 23:05:37 +02:00
|
|
|
if (tok2->varId())
|
2010-12-23 09:15:45 +01:00
|
|
|
ExecutionPath::bailOutVar(checks, tok2->varId());
|
|
|
|
}
|
|
|
|
}
|
2010-10-31 12:31:11 +01:00
|
|
|
const Token *next = parse(*tok, checks);
|
2010-11-13 08:03:59 +01:00
|
|
|
tok = next->next();
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public:
|
|
|
|
|
|
|
|
/** Functions that don't handle uninitialized variables well */
|
|
|
|
static std::set<std::string> uvarFunctions;
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
static void analyseFunctions(const Token * const tokens, std::set<std::string> &func) {
|
|
|
|
for (const Token *tok = tokens; tok; tok = tok->next()) {
|
|
|
|
if (tok->str() == "{") {
|
2010-10-31 12:31:11 +01:00
|
|
|
tok = tok->link();
|
|
|
|
continue;
|
|
|
|
}
|
2011-10-13 20:53:06 +02:00
|
|
|
if (tok->str() != "::" && Token::Match(tok->next(), "%var% ( %type%")) {
|
2011-11-20 14:22:39 +01:00
|
|
|
if (!Token::Match(tok->linkAt(2), ") [{;]"))
|
2010-10-31 12:31:11 +01:00
|
|
|
continue;
|
|
|
|
const Token *tok2 = tok->tokAt(3);
|
2011-10-13 20:53:06 +02:00
|
|
|
while (tok2 && tok2->str() != ")") {
|
2010-10-31 12:31:11 +01:00
|
|
|
if (tok2->str() == ",")
|
|
|
|
tok2 = tok2->next();
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok2, "%type% %var% ,|)") && tok2->isStandardType()) {
|
2010-10-31 12:31:11 +01:00
|
|
|
tok2 = tok2->tokAt(2);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (tok2->isStandardType() && Token::Match(tok2, "%type% & %var% ,|)")) {
|
2010-10-31 12:31:11 +01:00
|
|
|
const unsigned int varid(tok2->tokAt(2)->varId());
|
|
|
|
|
|
|
|
// flags for read/write
|
|
|
|
bool r = false, w = false;
|
|
|
|
|
|
|
|
// check how the variable is used in the function
|
|
|
|
unsigned int indentlevel = 0;
|
2011-10-13 20:53:06 +02:00
|
|
|
for (const Token *tok3 = tok2; tok3; tok3 = tok3->next()) {
|
2010-10-31 12:31:11 +01:00
|
|
|
if (tok3->str() == "{")
|
|
|
|
++indentlevel;
|
2011-10-13 20:53:06 +02:00
|
|
|
else if (tok3->str() == "}") {
|
2010-10-31 12:31:11 +01:00
|
|
|
if (indentlevel <= 1)
|
|
|
|
break;
|
|
|
|
--indentlevel;
|
2011-10-13 20:53:06 +02:00
|
|
|
} else if (indentlevel == 0 && tok3->str() == ";")
|
2010-10-31 12:31:11 +01:00
|
|
|
break;
|
2011-10-13 20:53:06 +02:00
|
|
|
else if (indentlevel >= 1 && tok3->varId() == varid) {
|
2012-04-25 09:56:07 +02:00
|
|
|
if (tok3->previous()->type() == Token::eIncDecOp ||
|
|
|
|
tok3->next()->type() == Token::eIncDecOp) {
|
2010-10-31 12:31:11 +01:00
|
|
|
r = true;
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
else {
|
2010-10-31 12:31:11 +01:00
|
|
|
w = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!r || w)
|
|
|
|
break;
|
|
|
|
|
|
|
|
tok2 = tok2->tokAt(3);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok2, "const %type% &|*| const| %var% ,|)") && tok2->next()->isStandardType()) {
|
2010-10-31 12:31:11 +01:00
|
|
|
tok2 = tok2->tokAt(3);
|
|
|
|
while (tok2->isName())
|
|
|
|
tok2 = tok2->next();
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2011-10-13 20:53:06 +02:00
|
|
|
if (Token::Match(tok2, "const %type% %var% [ ] ,|)") && tok2->next()->isStandardType()) {
|
2010-11-12 17:14:37 +01:00
|
|
|
tok2 = tok2->tokAt(5);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2011-07-27 10:34:12 +02:00
|
|
|
/// @todo enable this code. if pointer is written in function then dead pointer is invalid but valid pointer is ok.
|
|
|
|
/*
|
2011-07-04 21:04:32 +02:00
|
|
|
if (Token::Match(tok2, "const| struct| %type% * %var% ,|)"))
|
|
|
|
{
|
|
|
|
while (tok2->isName())
|
|
|
|
tok2 = tok2->next();
|
|
|
|
tok2 = tok2->tokAt(2);
|
|
|
|
continue;
|
|
|
|
}
|
2011-07-27 10:34:12 +02:00
|
|
|
*/
|
2011-07-04 21:04:32 +02:00
|
|
|
|
2010-10-31 12:31:11 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
// found simple function..
|
2011-07-28 08:12:21 +02:00
|
|
|
if (tok2 && tok2->link() == tok->tokAt(2))
|
2010-10-31 12:31:11 +01:00
|
|
|
func.insert(tok->next()->str());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
/** Functions that don't handle uninitialized variables well */
|
|
|
|
std::set<std::string> UninitVar::uvarFunctions;
|
|
|
|
|
|
|
|
|
|
|
|
/// @}
|
|
|
|
|
|
|
|
|
|
|
|
void CheckUninitVar::analyse(const Token * const tokens, std::set<std::string> &func) const
|
|
|
|
{
|
|
|
|
UninitVar::analyseFunctions(tokens, func);
|
|
|
|
}
|
|
|
|
|
|
|
|
void CheckUninitVar::saveAnalysisData(const std::set<std::string> &data) const
|
|
|
|
{
|
|
|
|
UninitVar::uvarFunctions.insert(data.begin(), data.end());
|
|
|
|
}
|
|
|
|
|
|
|
|
void CheckUninitVar::executionPaths()
|
|
|
|
{
|
|
|
|
// check if variable is accessed uninitialized..
|
|
|
|
{
|
|
|
|
// no writing if multiple threads are used (TODO: thread safe analysis?)
|
|
|
|
if (_settings->_jobs == 1)
|
|
|
|
UninitVar::analyseFunctions(_tokenizer->tokens(), UninitVar::uvarFunctions);
|
|
|
|
|
|
|
|
UninitVar c(this);
|
2012-01-26 16:50:59 +01:00
|
|
|
checkExecutionPaths(_tokenizer->getSymbolDatabase(), &c);
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-12-13 21:57:27 +01:00
|
|
|
|
|
|
|
void CheckUninitVar::check()
|
|
|
|
{
|
|
|
|
const SymbolDatabase *symbolDatabase = _tokenizer->getSymbolDatabase();
|
|
|
|
std::list<Scope>::const_iterator func_scope;
|
|
|
|
|
|
|
|
// scan every function
|
|
|
|
for (func_scope = symbolDatabase->scopeList.begin(); func_scope != symbolDatabase->scopeList.end(); ++func_scope) {
|
|
|
|
// only check functions
|
|
|
|
if (func_scope->type == Scope::eFunction) {
|
|
|
|
for (const Token *tok = func_scope->classStart; tok && tok != func_scope->classEnd; tok = tok->next()) {
|
2011-12-26 14:01:46 +01:00
|
|
|
|
|
|
|
if (Token::Match(tok, "[;{}] %type% !!;")) {
|
|
|
|
bool stdtype = false;
|
|
|
|
bool pointer = false;
|
|
|
|
tok = tok->next();
|
|
|
|
while (tok->isName() || tok->str() == "*") {
|
|
|
|
if (tok->isStandardType())
|
|
|
|
stdtype = true;
|
|
|
|
else if (tok->str() == "*")
|
|
|
|
pointer = true;
|
2011-12-26 22:14:52 +01:00
|
|
|
else if (Token::Match(tok, "struct %type%"))
|
|
|
|
tok = tok->next();
|
|
|
|
else {
|
|
|
|
if (tok->isName() && tok->next()->str() == ";" &&
|
|
|
|
(stdtype || pointer)) {
|
2011-12-26 14:01:46 +01:00
|
|
|
checkScopeForVariable(tok->next(), tok->varId(), pointer, NULL);
|
2011-12-26 22:14:52 +01:00
|
|
|
}
|
2011-12-26 14:01:46 +01:00
|
|
|
break;
|
2011-12-26 22:14:52 +01:00
|
|
|
}
|
2011-12-26 14:01:46 +01:00
|
|
|
tok = tok->next();
|
|
|
|
}
|
2011-12-13 21:57:27 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-12-26 14:01:46 +01:00
|
|
|
bool CheckUninitVar::checkScopeForVariable(const Token *tok, const unsigned int varid, bool ispointer, bool * const possibleInit)
|
2011-12-13 21:57:27 +01:00
|
|
|
{
|
|
|
|
if (varid == 0)
|
|
|
|
return false;
|
|
|
|
|
2011-12-26 12:36:35 +01:00
|
|
|
const bool suppressErrors(possibleInit && *possibleInit);
|
|
|
|
|
|
|
|
if (possibleInit)
|
|
|
|
*possibleInit = false;
|
|
|
|
|
2011-12-13 21:57:27 +01:00
|
|
|
bool ret = false;
|
|
|
|
|
|
|
|
unsigned int number_of_if = 0;
|
|
|
|
|
2012-02-06 07:32:29 +01:00
|
|
|
// variables that are known to be non-zero
|
|
|
|
std::set<unsigned int> notzero;
|
|
|
|
|
2011-12-13 21:57:27 +01:00
|
|
|
for (; tok; tok = tok->next()) {
|
|
|
|
// End of scope..
|
|
|
|
if (tok->str() == "}") {
|
2011-12-26 12:36:35 +01:00
|
|
|
if (number_of_if && possibleInit)
|
|
|
|
*possibleInit = true;
|
2011-12-16 19:56:13 +01:00
|
|
|
|
2011-12-13 21:57:27 +01:00
|
|
|
// might be a noreturn function..
|
2011-12-27 18:00:12 +01:00
|
|
|
if (_tokenizer->IsScopeNoReturn(tok))
|
|
|
|
return true;
|
2011-12-13 21:57:27 +01:00
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2011-12-26 17:52:32 +01:00
|
|
|
// Unconditional inner scope..
|
|
|
|
if (tok->str() == "{" && Token::Match(tok->previous(), "[;{}]")) {
|
|
|
|
if (checkScopeForVariable(tok->next(), varid, ispointer, possibleInit))
|
|
|
|
return true;
|
|
|
|
tok = tok->link();
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2012-02-06 07:32:29 +01:00
|
|
|
// assignment with nonzero constant..
|
2012-02-06 19:26:28 +01:00
|
|
|
if (Token::Match(tok->previous(), "[;{}] %var% = - %var% ;") && tok->varId() > 0)
|
|
|
|
notzero.insert(tok->varId());
|
2012-02-06 07:32:29 +01:00
|
|
|
|
2011-12-13 21:57:27 +01:00
|
|
|
// Inner scope..
|
2011-12-28 16:49:05 +01:00
|
|
|
if (Token::simpleMatch(tok, "if (")) {
|
2011-12-26 18:32:42 +01:00
|
|
|
// initialization / usage in condition..
|
2011-12-26 18:56:40 +01:00
|
|
|
if (checkIfForWhileHead(tok->next(), varid, ispointer, suppressErrors, bool(number_of_if == 0)))
|
2011-12-26 18:32:42 +01:00
|
|
|
return true;
|
2011-12-14 17:17:24 +01:00
|
|
|
|
2012-02-06 07:32:29 +01:00
|
|
|
// checking if a not-zero variable is zero => bail out
|
|
|
|
if (Token::Match(tok, "if ( %var% )") && notzero.find(tok->tokAt(2)->varId()) != notzero.end())
|
|
|
|
return true; // this scope is not fully analysed => return true
|
|
|
|
|
2011-12-13 21:57:27 +01:00
|
|
|
// goto the {
|
|
|
|
tok = tok->next()->link()->next();
|
|
|
|
|
2012-01-13 23:30:43 +01:00
|
|
|
if (!tok)
|
|
|
|
break;
|
|
|
|
if (tok->str() == "{") {
|
|
|
|
bool possibleInitIf(number_of_if > 0 || suppressErrors);
|
|
|
|
const bool initif = checkScopeForVariable(tok->next(), varid, ispointer, &possibleInitIf);
|
2011-12-13 21:57:27 +01:00
|
|
|
|
2012-01-13 23:30:43 +01:00
|
|
|
// goto the }
|
|
|
|
tok = tok->link();
|
2011-12-13 21:57:27 +01:00
|
|
|
|
2012-01-13 23:30:43 +01:00
|
|
|
if (!Token::simpleMatch(tok, "} else {")) {
|
|
|
|
if (initif || possibleInitIf) {
|
|
|
|
++number_of_if;
|
|
|
|
if (number_of_if >= 2)
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// goto the {
|
|
|
|
tok = tok->tokAt(2);
|
2011-12-13 21:57:27 +01:00
|
|
|
|
2012-01-13 23:30:43 +01:00
|
|
|
bool possibleInitElse(number_of_if > 0 || suppressErrors);
|
|
|
|
const bool initelse = checkScopeForVariable(tok->next(), varid, ispointer, &possibleInitElse);
|
2011-12-13 21:57:27 +01:00
|
|
|
|
2012-01-13 23:30:43 +01:00
|
|
|
// goto the }
|
|
|
|
tok = tok->link();
|
2011-12-13 21:57:27 +01:00
|
|
|
|
2012-01-13 23:30:43 +01:00
|
|
|
if (initif && initelse)
|
|
|
|
return true;
|
2011-12-13 21:57:27 +01:00
|
|
|
|
2012-01-13 23:30:43 +01:00
|
|
|
if (initif || initelse || possibleInitElse)
|
|
|
|
++number_of_if;
|
|
|
|
}
|
2011-12-13 21:57:27 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-12-17 07:56:46 +01:00
|
|
|
// = { .. }
|
|
|
|
if (Token::simpleMatch(tok, "= {")) {
|
|
|
|
// end token
|
|
|
|
const Token *end = tok->next()->link();
|
|
|
|
|
|
|
|
// If address of variable is taken in the block then bail out
|
|
|
|
if (Token::findmatch(tok->tokAt(2), "& %varid%", end, varid))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
// Skip block
|
|
|
|
tok = end;
|
|
|
|
continue;
|
|
|
|
}
|
2011-12-16 18:04:10 +01:00
|
|
|
|
2011-12-17 09:51:45 +01:00
|
|
|
// skip sizeof / offsetof
|
2011-12-27 17:03:48 +01:00
|
|
|
if (Token::Match(tok, "sizeof|typeof|offsetof|decltype ("))
|
2011-12-17 09:51:45 +01:00
|
|
|
tok = tok->next()->link();
|
|
|
|
|
2011-12-26 18:32:42 +01:00
|
|
|
// for..
|
|
|
|
if (Token::simpleMatch(tok, "for (")) {
|
2011-12-27 08:18:05 +01:00
|
|
|
// is variable initialized in for-head (don't report errors yet)?
|
|
|
|
if (checkIfForWhileHead(tok->next(), varid, ispointer, true, false))
|
|
|
|
return true;
|
|
|
|
|
2011-12-26 18:32:42 +01:00
|
|
|
// goto the {
|
|
|
|
const Token *tok2 = tok->next()->link()->next();
|
|
|
|
|
2012-01-13 23:30:43 +01:00
|
|
|
if (tok2 && tok2->str() == "{") {
|
|
|
|
bool possibleinit = true;
|
|
|
|
bool init = checkScopeForVariable(tok2->next(), varid, ispointer, &possibleinit);
|
2011-12-26 18:32:42 +01:00
|
|
|
|
2012-01-13 23:30:43 +01:00
|
|
|
// variable is initialized in the loop..
|
|
|
|
if (possibleinit || init)
|
|
|
|
return true;
|
2011-12-26 18:32:42 +01:00
|
|
|
|
2012-01-13 23:30:43 +01:00
|
|
|
// is variable used in for-head?
|
|
|
|
if (!suppressErrors) {
|
|
|
|
checkIfForWhileHead(tok->next(), varid, ispointer, false, bool(number_of_if == 0));
|
|
|
|
}
|
2011-12-27 08:18:05 +01:00
|
|
|
}
|
2011-12-26 18:32:42 +01:00
|
|
|
}
|
|
|
|
|
2011-12-15 18:30:59 +01:00
|
|
|
// TODO: handle loops, try, etc
|
2011-12-26 18:32:42 +01:00
|
|
|
if (Token::simpleMatch(tok, ") {") || Token::Match(tok, "%var% {")) {
|
2011-12-15 20:29:57 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// bailout if there is assembler code
|
|
|
|
if (Token::simpleMatch(tok, "asm (")) {
|
|
|
|
return true;
|
2011-12-14 18:54:03 +01:00
|
|
|
}
|
|
|
|
|
2011-12-26 16:46:10 +01:00
|
|
|
if (Token::Match(tok, "return|break|continue|throw|goto"))
|
2011-12-13 21:57:27 +01:00
|
|
|
ret = true;
|
2011-12-15 20:05:11 +01:00
|
|
|
else if (ret && tok->str() == ";")
|
2011-12-15 20:15:37 +01:00
|
|
|
return true;
|
2011-12-13 21:57:27 +01:00
|
|
|
|
|
|
|
// variable is seen..
|
2012-01-13 23:30:43 +01:00
|
|
|
if (tok && tok->varId() == varid) {
|
2011-12-13 21:57:27 +01:00
|
|
|
// Use variable
|
2011-12-26 14:01:46 +01:00
|
|
|
if (!suppressErrors && isVariableUsage(tok, ispointer))
|
2011-12-14 06:00:17 +01:00
|
|
|
uninitvarError(tok, tok->str());
|
|
|
|
|
2011-12-13 21:57:27 +01:00
|
|
|
else
|
|
|
|
// assume that variable is assigned
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-12-26 18:56:40 +01:00
|
|
|
bool CheckUninitVar::checkIfForWhileHead(const Token *startparanthesis, unsigned int varid, bool ispointer, bool suppressErrors, bool isuninit)
|
2011-12-26 18:32:42 +01:00
|
|
|
{
|
|
|
|
const Token * const endpar = startparanthesis->link();
|
|
|
|
for (const Token *tok = startparanthesis->next(); tok && tok != endpar; tok = tok->next()) {
|
|
|
|
if (tok->varId() == varid) {
|
2011-12-27 08:18:05 +01:00
|
|
|
if (isVariableUsage(tok, ispointer)) {
|
|
|
|
if (!suppressErrors)
|
|
|
|
uninitvarError(tok, tok->str());
|
|
|
|
else
|
|
|
|
continue;
|
|
|
|
}
|
2011-12-26 18:32:42 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
if (Token::Match(tok, "sizeof|decltype|offsetof ("))
|
|
|
|
tok = tok->next()->link();
|
2011-12-26 18:56:40 +01:00
|
|
|
if (!isuninit && tok->str() == "&&")
|
2011-12-26 18:32:42 +01:00
|
|
|
suppressErrors = true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2011-12-26 14:01:46 +01:00
|
|
|
bool CheckUninitVar::isVariableUsage(const Token *vartok, bool pointer) const
|
2011-12-14 18:28:30 +01:00
|
|
|
{
|
|
|
|
if (vartok->previous()->str() == "return")
|
|
|
|
return true;
|
|
|
|
|
|
|
|
if (Token::Match(vartok->previous(), "++|--|%op%")) {
|
2011-12-15 16:55:55 +01:00
|
|
|
if (vartok->previous()->str() == ">>" && _tokenizer->isCPP()) {
|
|
|
|
// assume that variable is initialized
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-01-02 11:25:13 +01:00
|
|
|
if (vartok->previous()->str() != "&" || !Token::Match(vartok->tokAt(-2), "[(,=?:]")) {
|
2011-12-14 18:28:30 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-12-26 14:01:46 +01:00
|
|
|
bool unknown = false;
|
2012-01-25 15:16:22 +01:00
|
|
|
if (pointer && CheckNullPointer::isPointerDeRef(vartok, unknown, _tokenizer->getSymbolDatabase())) {
|
2011-12-27 10:18:49 +01:00
|
|
|
// function parameter?
|
|
|
|
bool functionParameter = false;
|
|
|
|
if (Token::Match(vartok->tokAt(-2), "%var% (") || vartok->previous()->str() == ",")
|
|
|
|
functionParameter = true;
|
|
|
|
|
|
|
|
// if this is not a function parameter report this dereference as variable usage
|
|
|
|
if (!functionParameter)
|
|
|
|
return true;
|
|
|
|
}
|
2011-12-26 14:01:46 +01:00
|
|
|
|
2011-12-16 20:34:44 +01:00
|
|
|
if (Token::Match(vartok->next(), "++|--|%op%"))
|
|
|
|
return true;
|
|
|
|
|
2011-12-16 18:12:47 +01:00
|
|
|
if (vartok->strAt(1) == "]")
|
2011-12-14 19:56:58 +01:00
|
|
|
return true;
|
|
|
|
|
2011-12-14 18:28:30 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2011-12-13 21:57:27 +01:00
|
|
|
|
2011-09-05 19:42:48 +02:00
|
|
|
void CheckUninitVar::uninitstringError(const Token *tok, const std::string &varname, bool strncpy_)
|
2010-10-31 12:31:11 +01:00
|
|
|
{
|
2011-09-05 19:42:48 +02:00
|
|
|
reportError(tok, Severity::error, "uninitstring", "Dangerous usage of '" + varname + "'" + (strncpy_ ? " (strncpy doesn't always 0-terminate it)" : " (not 0-terminated)"));
|
2010-10-31 12:31:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void CheckUninitVar::uninitdataError(const Token *tok, const std::string &varname)
|
|
|
|
{
|
|
|
|
reportError(tok, Severity::error, "uninitdata", "Data is allocated but not initialized: " + varname);
|
|
|
|
}
|
|
|
|
|
|
|
|
void CheckUninitVar::uninitvarError(const Token *tok, const std::string &varname)
|
|
|
|
{
|
|
|
|
reportError(tok, Severity::error, "uninitvar", "Uninitialized variable: " + varname);
|
|
|
|
}
|