美文网首页
2020-01-13 Splint C语言内存调试

2020-01-13 Splint C语言内存调试

作者: 14cat | 来源:发表于2020-01-13 21:29 被阅读0次

    0. 快速回忆

    Linux 安装 splint

    yum install -y splint
    
    // 检测文件 *.c
    splint *.c 
    

    常会出现的问题

    1. 空指针报错
    2. 类型转换报错
    3. 释放有其他指针引用的空间
    4. 最后一个指针指引丢失,但空间没有释放
    5. 数组越界,访问超出申请的 buffer 大小范围

    1. splint 介绍

    针对C语言的开源程序静态分析工具 -- splint

    2. splint消息

    检测文件*.c

    splint *.c
    

    测试文件 splint_msg.c

    //splint_msg.c
    int func_splint_msg1(void)
    {
        int a;
        return 0;
    }
    int func_splint_msg2(void)
    {
        int* a = (int*)malloc(sizeof(int));
        a = NULL;
        return 0;
    }
    
    Splint 3.1.2 --- 11 Oct 2015
    
    // 给出告警所在函数名,在函数的第一个警告消息报告前打印;
    splint_msg.c: (in function func_splint_msg1)        
    // 消息的正文,文件名、行号、列号显示在的警告的正文前;
    splint_msg.c:4:6: Variable a declared but not used
    // 有关该可疑错误的详细信息,包含一些怎样去掉这个消息的信息;
      A variable is declared but never used. Use /*@unused@*/ in front of
      declaration to suppress message. (Use -varuse to inhibit warning)
    // 第二条
    splint_msg.c: (in function func_splint_msg2)
    splint_msg.c:10:2: Fresh storage a (type int *) not released before assignment:
                          a = NULL
      A memory leak has been detected. Storage allocated locally is not released
      before the last reference to it is lost. (Use -mustfreefresh to inhibit
      warning)
      // 给出格外的位置信息,这里消息给出了是在哪里申请了这个可能泄露的内存。
       splint_msg.c:9:38: Fresh storage a created
    
    

    2. 检查控制

    splint提供了三种方式可进行检查的控制,分别是.splintrc配置文件、flags标志和格式化注释。

    1. flags

    splint 支持几百个标志用来控制检查和消息报告

    使用时标志前加’+‘或’-’,'+'标志开启这个标志,'-'表示关闭此标志

    splint -showcol a.c   //在检测a.c时,告警消息中列数不被打印
    splint -varuse  a.c   //在检测a.c时,告警消息中未使用变量告警不被打印
    

    2. .splintrc配置文件

    在使用源码安装splint之后,.splintrc 文件将被安装在主目录下

    .splintrc 文件中对一些标志作了默认的设定,命令行中指定的 flags 标志会覆盖 .splintrc 文件中的标志。

    3. 格式化注释

    格式化注释提供一个类型、变量或函数的格外的信息,可以控制标志设置,增加检查效果,所有格式化注释都以/@开始,@/结束,比如在函数参数前加/@null@/,表示该参数可能是NULL,做检测时,splint会加强对该参数的值的检测。

    3. 检测分析内容

    1. 引用空指针(Null Dereferences)

    在Unix操作系统中,解引用空指针将导致我们在程序运行时产生段错误(Segmentation fault)

    // null.c
    int func_null(void)
    {
        int *a = NULL;
        return *a;
    }
    
    Splint 3.1.2 --- 11 Oct 2015
    
    null.c: (in function func_null)
    null.c:3:11: Unrecognized identifier: null
      Identifier used in code has not been declared. (Use -unrecog to inhibit
      warning)
    null.c:4:9: Return value type int * does not match declared type int: a
      Types are incompatible. (Use -type to inhibit warning)
    
    Finished checking --- 2 code warnings
    
    

    2. 类型(Types)

    我们在编程中经常用到强制类型转换,将有符号值转换为无符号值、大范围类型值赋值给小范围类型

    void splint_types(void)
    {
        short a = 0;
        long b = 32768;
        a = b;
        return;
    }
    
     
    
    int main() {
        return 1;
    }
    
    Splint 3.1.2 --- 11 Oct 2015
    
    types.c: (in function splint_types)
    types.c:5:2: Assignment of long int to short int: a = b
      To ignore type qualifiers in type comparisons use +ignorequals.
    
    Finished checking --- 1 code warning
    

    3. 内存管理(Memory Management)

    C语言程序中,将近半数的bug归功于内存管理问题,关乎内存的bug难以发现并且会给程序带来致命的破坏。

    由内存释放所产生的问题,我们可以将其分为两种

    1. 当尚有其他指针引用的时候,释放一块空间

    void memory(void)
    {
        int *a = (int *)malloc(sizeof(int));
        int *b = a;
        free(a);
        *b = 0;
        return;
    }
    
    int main() {
        return 1;
    }
    

    在上面这个例子中,指针a与b指向同一块内存,但在内存释放之后仍对b指向的内容进行赋值操作

    Splint 3.1.2 --- 11 Oct 2015
    
    memory.c: (in function memory)
    memory.c:6:3: Variable b used after being released
      Memory is used after it has been released (either by passing as an only param
      or assigning to an only global). (Use -usereleased to inhibit warning)
       memory.c:5:7: Storage b released
    memory.c:6:3: Dereference of possibly null pointer b: *b
      A possibly null pointer is dereferenced.  Value is either the result of a
      function which may return null (in which case, code should check it is not
      null), or a global, parameter or structure field declared with the null
      qualifier. (Use -nullderef to inhibit warning)
       memory.c:4:11: Storage b may become null
    
    Finished checking --- 2 code warnings
    
    

    第一个指出我们使用了b指针,而它所指向的内存已被释放

    第二个是对解引用空指针的告警

    2. 当最后一个指针引用丢失的时候,其指向的空间尚未释放

    void memory2(void)
    {
        int *a = (int *)malloc(sizeof(int));
        a = NULL;
        return;
    
    }
    
    int main() {
        return 1;
    }
    

    这个例子中内存尚未释放,就将指向它的唯一指针赋值为NULL

    Splint 3.1.2 --- 11 Oct 2015
    
    memory2.c: (in function memory2)
    memory2.c:4:2: Fresh storage a (type int *) not released before assignment:
                      a = NULL
      A memory leak has been detected. Storage allocated locally is not released
      before the last reference to it is lost. (Use -mustfreefresh to inhibit
      warning)
       memory2.c:3:38: Fresh storage a created
    
    Finished checking --- 1 code warning
    
    

    splint抛出一个告警:类型为 int* 的 a 在进行 a = NULL 赋值前没有释放新分配的空间。

    4. 缓存边界(Buffer Sizes)

    splint 会对数组边界、字符串边界作检测,使用时需要加上 +bounds 的标志

    void bound1(void)
    {
        int a[10];
        a[10] = 0;
        return ;
    }
    
    int main() {
        return 1;
    }
    

    1. 数组越界

    # splint +bounds size1.c
    
    Splint 3.1.2 --- 11 Oct 2015
    
    size1.c: (in function bound1)
    size1.c:4:2: Likely out-of-bounds store: a[10]
        Unable to resolve constraint:
        requires 9 >= 10
         needed to satisfy precondition:
        requires maxSet(a @ size1.c:4:2) >= 10
      A memory write may write to an address beyond the allocated buffer. (Use
      -likelyboundswrite to inhibit warning)
    
    Finished checking --- 1 code warning
    

    2. 可能出现越界错误

    void bounds2(char *str)
    {
        char *tmp = getenv("HOME");
        if(tmp != NULL) 
        {
            strcpy(str, tmp);
        }
        return;
    }
    
    int main() {
        return 1;
    }
    

    告警消息提示我们:在使用strcpy(str, tmp)进行字符串复制时,可能出现越界错误

    因为str的大小可能不足以容纳环境变量“HOME”对应的字符串。绿色字体的内容指示了如何消除告警消息。

    # splint +bounds size2.c
    
    Splint 3.1.2 --- 11 Oct 2015
    
    size2.c: (in function bounds2)
    size2.c:6:3: Possible out-of-bounds store: strcpy(str, tmp)
        Unable to resolve constraint:
        requires maxSet(str @ size2.c:6:10) >= maxRead(getenv("HOME") @
        size2.c:3:14)
         needed to satisfy precondition:
        requires maxSet(str @ size2.c:6:10) >= maxRead(tmp @ size2.c:6:15)
         derived from strcpy precondition: requires maxSet(<parameter 1>) >=
        maxRead(<parameter 2>)
      A memory write may write to an address beyond the allocated buffer. (Use
      -boundswrite to inhibit warning)
    
    Finished checking --- 1 code warning
    
    

    Splint介绍

    代码静态分析工具——splint的学习与使用

    splint 手册

    相关文章

      网友评论

          本文标题:2020-01-13 Splint C语言内存调试

          本文链接:https://www.haomeiwen.com/subject/bgwnactx.html