You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
210 lines
4.8 KiB
210 lines
4.8 KiB
// RUN: rm -f %t
|
|
// RUN: %clang_analyze_cc1 -fblocks -analyzer-checker=core,unix.Malloc -analyzer-output=plist -verify -o %t -analyzer-config eagerly-assume=false %s
|
|
// RUN: tail -n +11 %t | %normalize_plist | diff -ub %S/Inputs/expected-plists/malloc-plist.c.plist -
|
|
|
|
typedef __typeof(sizeof(int)) size_t;
|
|
void *malloc(size_t);
|
|
void free(void *);
|
|
void *realloc(void *ptr, size_t size);
|
|
|
|
void diagnosticTest(int in) {
|
|
if (in > 5) {
|
|
int *p = malloc(12);
|
|
*p = 0;
|
|
(*p)++;
|
|
}
|
|
in++; // expected-warning {{leak}}
|
|
}
|
|
|
|
void myArrayAllocation() {
|
|
int **A;
|
|
A = malloc(2*sizeof(int*));
|
|
A[0] = 0;
|
|
}//expected-warning{{Potential leak}}
|
|
|
|
void reallocDiagnostics() {
|
|
char * buf = malloc(100);
|
|
char * tmp;
|
|
tmp = (char*)realloc(buf, 0x1000000);
|
|
if (!tmp) {
|
|
return;// expected-warning {{leak}}
|
|
}
|
|
buf = tmp;
|
|
free(buf);
|
|
}
|
|
|
|
void *wrapper() {
|
|
void *x = malloc(100);
|
|
// This is intentionally done to test diagnostic emission.
|
|
if (x)
|
|
return x;
|
|
return 0;
|
|
}
|
|
|
|
void test_wrapper() {
|
|
void *buf = wrapper();
|
|
(void) buf;
|
|
}//expected-warning{{Potential leak}}
|
|
|
|
// Test what happens when the same call frees and allocated memory.
|
|
// Also tests the stack hint for parameters, when they are passed directly or via pointer.
|
|
void my_free(void *x) {
|
|
free(x);
|
|
}
|
|
void my_malloc_and_free(void **x) {
|
|
*x = malloc(100);
|
|
if (*x)
|
|
my_free(*x);
|
|
return;
|
|
}
|
|
void *test_double_action_call() {
|
|
void *buf;
|
|
my_malloc_and_free(&buf);
|
|
return buf; //expected-warning{{Use of memory after it is freed}}
|
|
}
|
|
|
|
// Test stack hint for 'reallocation failed'.
|
|
char *my_realloc(char *buf) {
|
|
char *tmp;
|
|
tmp = (char*)realloc(buf, 0x1000000);
|
|
if (!tmp) {
|
|
return tmp;
|
|
}
|
|
return tmp;
|
|
}
|
|
void reallocIntra() {
|
|
char *buf = (char *)malloc(100);
|
|
buf = my_realloc(buf);
|
|
free(buf);//expected-warning{{Potential leak}}
|
|
}
|
|
|
|
// Test stack hint when returning a result.
|
|
static char *malloc_wrapper_ret() {
|
|
return (char*)malloc(12);
|
|
}
|
|
void use_ret() {
|
|
char *v;
|
|
v = malloc_wrapper_ret();
|
|
}//expected-warning{{Potential leak}}
|
|
|
|
// Passing a block as a parameter to an inlined call for which we generate
|
|
// a stack hint message caused crashes.
|
|
// rdar://problem/21291971
|
|
void myfree_takingblock(void (^ignored)(void), int *p) {
|
|
free(p);
|
|
}
|
|
|
|
void call_myfree_takingblock() {
|
|
void (^some_block)(void) = ^void(void) { };
|
|
|
|
int *p = malloc(sizeof(int));
|
|
myfree_takingblock(some_block, p);
|
|
*p = 3;//expected-warning{{Use of memory after it is freed}}
|
|
}
|
|
|
|
// Test that we refer to the last symbol used in the leak diagnostic.
|
|
void LeakedSymbol(int in) {
|
|
int *m = 0;
|
|
int *p;
|
|
p = (int*)malloc(12);
|
|
*p = 0;
|
|
(*p)++;
|
|
m = p;
|
|
p = 0;
|
|
(*m)++;
|
|
in++;//expected-warning{{Potential leak}}
|
|
}
|
|
|
|
// Tests that exercise running remove dead bindings at Call exit.
|
|
static void function_with_leak1() {
|
|
char *x = (char*)malloc(12);
|
|
} //expected-warning{{Potential leak}}
|
|
void use_function_with_leak1() {
|
|
function_with_leak1();
|
|
int y = 0;
|
|
}
|
|
|
|
static void function_with_leak2() {
|
|
char *x = (char*)malloc(12);
|
|
int m = 0; //expected-warning{{Potential leak}}
|
|
}
|
|
void use_function_with_leak2() {
|
|
function_with_leak2();
|
|
}
|
|
|
|
static void function_with_leak3(int y) {
|
|
char *x = (char*)malloc(12);
|
|
if (y)
|
|
y++;
|
|
}//expected-warning{{Potential leak}}
|
|
void use_function_with_leak3(int y) {
|
|
function_with_leak3(y);
|
|
}
|
|
|
|
static void function_with_leak4(int y) {
|
|
char *x = (char*)malloc(12);
|
|
if (y)
|
|
y++;
|
|
else
|
|
y--;//expected-warning{{Potential leak}}
|
|
}
|
|
void use_function_with_leak4(int y) {
|
|
function_with_leak4(y);
|
|
}
|
|
|
|
int anotherFunction5() {
|
|
return 5;
|
|
}
|
|
static int function_with_leak5() {
|
|
char *x = (char*)malloc(12);
|
|
return anotherFunction5();//expected-warning{{Potential leak}}
|
|
}
|
|
void use_function_with_leak5() {
|
|
function_with_leak5();
|
|
}
|
|
|
|
void anotherFunction6(int m) {
|
|
m++;
|
|
}
|
|
static void function_with_leak6() {
|
|
char *x = (char*)malloc(12);
|
|
anotherFunction6(3);//expected-warning{{Potential leak}}
|
|
}
|
|
void use_function_with_leak6() {
|
|
function_with_leak6();
|
|
}
|
|
|
|
static void empty_function(){
|
|
}
|
|
void use_empty_function() {
|
|
empty_function();
|
|
}
|
|
static char *function_with_leak7() {
|
|
return (char*)malloc(12);
|
|
}
|
|
void use_function_with_leak7() {
|
|
function_with_leak7();
|
|
}//expected-warning{{Potential memory leak}}
|
|
|
|
// Test that we do not print the name of a variable not visible from where
|
|
// the issue is reported.
|
|
int *my_malloc() {
|
|
int *p = malloc(12);
|
|
return p;
|
|
}
|
|
void testOnlyRefferToVisibleVariables() {
|
|
my_malloc();
|
|
} // expected-warning{{Potential memory leak}}
|
|
|
|
struct PointerWrapper{
|
|
int*p;
|
|
};
|
|
int *my_malloc_into_struct() {
|
|
struct PointerWrapper w;
|
|
w.p = malloc(12);
|
|
return w.p;
|
|
}
|
|
void testMyMalloc() {
|
|
my_malloc_into_struct();
|
|
} // expected-warning{{Potential memory leak}}
|